summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/bn (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* actually include the prerequisite dependency for BIO instead of doing nastynessbeck2015-10-161-5/+2
* remove excessive brackets on pointer mathderaadt2015-09-281-8/+8
* Redo 1.25, without the NULL deref.miod2015-09-271-22/+31
* Revert bn_print.c:r1.25 ("handle negative-zero in BN_bn2dec() too") forsthen2015-09-181-31/+22
* Handle negative-zero in BN_bn2dec() too, just like in BN_print().deraadt2015-09-131-22/+31
* BN does support negative-zero -- BN_print() sets the standard here.deraadt2015-09-131-3/+3
* Remove workaround for old SIMICS toolchain.miod2015-09-121-45/+1
* Remove horribly old and outdated `documentation' for the assembly code.miod2015-09-121-27/+0
* Fixup inter-bank movq/movd operations, emit bytes for pclmulqdq again.bcook2015-09-112-12/+12
* Correct spelling of OPENSSL_cleanse.jsing2015-09-103-8/+9
* typosmiod2015-08-181-1/+1
* Avoid an infinite loop that can be triggered by parsing an ASN.1jsing2015-06-111-3/+8
* Add missing BN_CTX_end() calls.doug2015-04-293-11/+15
* Fix indentation that incorrectly implies a different control flow.doug2015-03-212-6/+9
* Fix CVE-2014-3570: properly calculate the square of a BIGNUM value.bcook2015-02-253-654/+303
* If BN_rand() or BN_pseudo_rand() are called with a NULL rnd argument,jsing2015-02-191-3/+8
* Potential NULL dereference in the error path; Coverity CID 21720miod2015-02-141-2/+2
* Fix tests that got incorrectly inverted with the BN_CTX_get() return checkjsing2015-02-141-5/+5
* Remove unnecessary include of assert.hmiod2015-02-102-4/+2
* BN_CTX_get() can fail - consistently check its return value.jsing2015-02-0912-110/+140
* Delete a lot of #if 0 code in libressl.doug2015-02-071-12/+1
* deregister; no binary changejsg2014-10-286-23/+23
* Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().jsing2014-10-222-22/+10
* None of these need to include <openssl/rand.h>jsing2014-10-182-6/+2
* if (x) FOO_free(x) -> FOO_free(x).miod2014-07-125-23/+14
* typosmiod2014-07-121-1/+1
* Apparently better fix for OpenSSL PR #3397 (Joyent bug #7704), from OpenSSLmiod2014-07-111-2/+2
* Make sure BN_sqr never returns negative numbers.miod2014-07-111-1/+2
* Only import cryptlib.h in the four source files that actually need it.jsing2014-07-1125-57/+70
* Explicitly include <openssl/opensslconf.h> in every file that referencesjsing2014-07-1011-14/+44
* Stop including standard headers via cryptlib.h - pull in the headers thatjsing2014-07-108-13/+25
* Remove leading underscore from _BYTE_ORDER and _{LITTLE,BIG}_ENDIAN, to bemiod2014-07-091-2/+2
* remove unused, private version strings except SSL_version_strbcook2014-07-091-3/+1
* When building a BN on the stack in BN_div(), make sure to initialize all itsmiod2014-06-271-1/+2
* hand-KNF macro the do { } while loopsderaadt2014-06-272-11/+16
* Fix incorrect bounds check in amd64 assembly version of bn_mul_mont();miod2014-06-202-4/+4
* tags as requested by miod and teduderaadt2014-06-1232-30/+32
* malloc() result does not need a cast.deraadt2014-06-075-6/+6
* s/assember/assembler/ before someone gets offended. At the lastderaadt2014-06-068-13/+13
* Get the public headers from the official place with <openssl/ >deraadt2014-05-311-1/+1
* more: no need for null check before freederaadt2014-05-301-2/+1
* ok, next pass after review: when possible, put the reallocarray argumentsderaadt2014-05-292-6/+6
* convert 53 malloc(a*b) to reallocarray(NULL, a, b). that is 53deraadt2014-05-294-10/+10
* Everything sane has stdio, and FILE *. we don't need ifdefs for this.beck2014-05-292-6/+0
* calloc instead of malloc/memset. from Benjamin Baiertedu2014-05-251-2/+1
* Almost nothing actually needs to include <openssl/e_os2.h>, however byjsing2014-05-241-1/+2
* Replace (sometimes conditional) use of alloca with malloc, and clearingmiod2014-05-232-39/+16
* if (x) free(x) -> free(x); semantic patch generated with coccinelle, carefullymiod2014-05-222-12/+6
* Stop being a dummy... presumably these are left overs from pedantic modejsing2014-05-151-2/+0
* knfectomie.jsing2014-05-081-653/+818