summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/reallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2023-04-06Use RCS tag instead of an incorrect path.tb1-1/+1
2023-04-06Move a comment to the proper placetb1-6/+5
2023-04-06wycheproof: fix copy-paste error in previoustb1-2/+2
2023-04-06wycheproof: use EVP_MD instead of importing "hash"tb1-70/+52
2023-04-06Check and assign on one linetb1-3/+2
2023-04-06Zap extra empty linetb1-2/+1
2023-04-05Add a few missing bracestb1-4/+7
ok jsing
2023-04-05Set up the RSA's _method_mod_n before the initial blindingtb1-11/+13
As observed by Bernd Edlinger, the main part of the RSA timing leak that was recently made public is that the initial blinding isn't done with Montgomery exponentiation but rather with plain exponentiation. Pull up the initialization of the cached Montgomery context to ensure we use Montgomery exponentiation. Do this for private_{de,en}crypt(). Interestingly, the latter was fixed in OpenSSL a while ago by Andy Polyakov as part of the "smooth CRT-RSA" addition. If this code was anything but completely insane this would never have been an issue in the first place. But it's libcrypto... ok jsing
2023-04-05Sprinkle a few BTI instructions into the arm64 assembly files and passkettenis2-1/+8
-mmark-bti-property to indicate those now have BTI support. ok jsing@, deraadt@
2023-04-05bn_mod_sqrt: Improve a handful of comments and a printftb1-5/+9
2023-04-05Improve regress coverage for BN_mod_sqrt()tb1-3/+2783
This now covers all the main branches of both the old and new BN_mod_sqrt() implementation except for negative p.
2023-04-05Simplify mod_sqrt_test() a bittb1-35/+16
2023-04-05bn_mod_sqrt test: Use a #define rather than hard coded 100tb1-3/+5
2023-04-05Add coverage for the truly non-deterministic path of Tonelli-Shankstb1-4/+1625
Regress coverage of all of BN_mod_sqrt() is still lacking after this. This will improve in forthcoming commits.
2023-04-05Introduce variation in location of junked bytes; ok tb@otto1-3/+8
2023-04-04A refactoring back in 2016 in which magic numbers where extracted intoanton1-0/+1
named constants accidentally dropped an instruction causing detection of eXtended operations (XOP) on AMD hardware to break. ok miod@ tb@
2023-04-04In preparation for better documenting BIO info callbacks, improve theschwarze1-9/+115
description of BIO_ctrl(3) and its three siblings. Given the vast range of effects these functions can have, the text is unavoidably still vague, but at least some information can be provided. While here, fix one wrong parameter type and three inconsistent parameter names in the SYNOPSIS.
2023-04-04Clean bn_mod_sqrt up a littletb1-28/+53
This makes it look a bit more like other tests and also prepares the addition of further test cases and different tests.
2023-04-03Compress euclid() a littletb1-49/+28
This function is spread out over way too many lines and has too much repetition. Once this is made a little more compact, it becomes clearer that this is a somewhat obfuscated version of binary gcd (it is not constant time therefore cryptographically unsound. It is not used internally). This will likely go away later. ok jsing
2023-04-03Link bn_gcd test to regresstb1-1/+3