summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/bn (follow)
Commit message (Expand)AuthorAgeFilesLines
* Provide BN_GENCB_new(), BN_GENCB_free() and BN_GENCB_get_arg()jsing2018-02-202-2/+32
* Provide BN_get_rfc2409_prime_*() and BN_get_rfc3526_prime_*().jsing2018-02-202-2/+58
* use freezero() instead of memset/explicit_bzero + free. Substantiallyderaadt2017-05-024-28/+14
* Send the function codes from the error functions to the bit bucket,beck2017-01-2917-118/+70
* Construct a BN_gcd_nonct, based on BN_mod_inverse_no_branch, as suggestedbeck2017-01-254-5/+165
* use BN_div_nonct where it is safe to do so.beck2017-01-211-2/+2
* Add ct and nonct versions of BN_mod_inverse for internal usebeck2017-01-216-17/+43
* Split out BN_div and BN_mod into ct and nonct versions for Internal use.beck2017-01-2110-33/+61
* Make explicit _ct and _nonct versions of bn_mod_exp funcitons thatbeck2017-01-216-22/+78
* /usr/bin/unifdef -D MONT_MUL_MOD -D MONT_EXP_WORD -D RECP_MUL_MOD -m bn_exp.cbeck2017-01-211-23/+2
* Remove superfluous datatype that is 32 by default. Clang complainspatrick2017-01-041-1/+1
* Explicitly export a list of symbols from libcrypto.jsing2016-12-213-124/+119
* Reduce the ternary operator abuseguenther2016-11-081-3/+8
* Stop abusing the ternary operator to decide which function to call in amiod2016-11-051-3/+6
* Replace all uses of magic numbers when operating on OPENSSL_ia32_P[] bymiod2016-11-044-12/+13
* If BN_div_word() fails (by returning (BN_ULONG)-1) or if the divisionguenther2016-10-171-4/+8
* Less S390.jsing2016-09-043-1176/+0
* Less IA64.jsing2016-09-042-2406/+0
* switch to a constant-time gather procedure for amd64 mont5 asmbcook2016-09-031-199/+314
* add constant-time MOD_EXP_CTIME_COPY_FROM_PREBUF.bcook2016-09-031-16/+55
* BN_mod_exp_mont_consttime: check for zero modulus.bcook2016-09-031-9/+33
* BN_mod_exp_mont_consttime: check for zero modulus.bcook2016-09-031-4/+5
* Avoid undefined-behavior right-shifting by a word-size # of bits.bcook2016-09-031-3/+2
* don't mix code and decls, ok tedu@bcook2016-07-181-2/+3
* use memset to initialize the unionbcook2016-07-171-2/+4
* Initialize buffers before use, noted by Kinichiro Inoguchi.bcook2016-07-171-7/+7
* On systems where we do not have BN_ULLONG defined (most 64-bit systems),bcook2016-07-052-9/+37
* 'accomodate' -> 'accommodate' in comments.krw2016-03-151-2/+2
* Add error handling to the remaining calls to bn_wexpand().bcook2016-03-121-4/+7
* graduate bn_expand() to a real function. the openssl version of thisderaadt2016-03-042-4/+16
* Revert bn_expand until there's consensus on a fix.doug2016-03-041-14/+3
* Add bounds checking for BN_hex2bn/BN_dec2bn.doug2016-03-022-10/+26
* More adress -> addressmmcc2015-12-241-1/+1
* Fix gcc version preprocessor checks to cope with gcc 5.x and beyond;miod2015-11-061-2/+2
* Reject too small bits value in BN_generate_prime_ex(), so that it does not riskmiod2015-10-213-4/+22
* actually include the prerequisite dependency for BIO instead of doing nastynessbeck2015-10-161-5/+2
* remove excessive brackets on pointer mathderaadt2015-09-281-8/+8
* Redo 1.25, without the NULL deref.miod2015-09-271-22/+31
* Revert bn_print.c:r1.25 ("handle negative-zero in BN_bn2dec() too") forsthen2015-09-181-31/+22
* Handle negative-zero in BN_bn2dec() too, just like in BN_print().deraadt2015-09-131-22/+31
* BN does support negative-zero -- BN_print() sets the standard here.deraadt2015-09-131-3/+3
* Remove workaround for old SIMICS toolchain.miod2015-09-121-45/+1
* Remove horribly old and outdated `documentation' for the assembly code.miod2015-09-121-27/+0
* Fixup inter-bank movq/movd operations, emit bytes for pclmulqdq again.bcook2015-09-112-12/+12
* Correct spelling of OPENSSL_cleanse.jsing2015-09-103-8/+9
* typosmiod2015-08-181-1/+1
* Avoid an infinite loop that can be triggered by parsing an ASN.1jsing2015-06-111-3/+8
* Add missing BN_CTX_end() calls.doug2015-04-293-11/+15
* Fix indentation that incorrectly implies a different control flow.doug2015-03-212-6/+9
* Fix CVE-2014-3570: properly calculate the square of a BIGNUM value.bcook2015-02-253-654/+303