summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/bn (follow)
Commit message (Expand)AuthorAgeFilesLines
* Unindent a bit of code that performs a few too many checks totb2020-09-121-10/+8
* Avoid an out-of-bounds access in BN_rand()tb2020-09-121-3/+8
* Change generating and checking of primes so that the error rate ofschwarze2019-08-251-18/+73
* make BN_CTX_end(NULL) a NOOP for compatibility with documented behaviourschwarze2019-08-201-1/+4
* Make BN_num_bits_word() constant time.tb2019-06-171-48/+18
* Add range checks to varios ASN1_INTEGER functions to ensure thebeck2019-03-231-1/+3
* Fix BN_is_prime_* calls in libcrypto, the API returns -1 on error.tb2019-01-201-10/+20
* Flip reversed test in bn_rand_interval().tb2018-11-061-2/+2
* Introduce bn_rand_interval() that allows specifying an interval [a, b)tb2018-11-052-2/+30
* Use a size_t instead of an int for the byte count in BN_swap_ct().tb2018-07-232-8/+11
* Clean up our disgusting implementations of BN_{,u}{add,sub}(), followingtb2018-07-231-157/+67
* Eliminate the weird condition in the BN_swap_ct() API that at most one bittb2018-07-131-3/+3
* Sync commentkn2018-07-111-3/+5
* Turn yesterday's optimistic ! in an XXX comment into a more cautious ?tb2018-07-111-2/+2
* Provide BN_swap_ct(), a constant time function that conditionally swapstb2018-07-102-2/+53
* fix odd whitespacetb2018-06-101-3/+3
* Use explicit_bzero() rather than memset() when clearing a BIGNUM.jsing2018-05-121-2/+2
* Provide BN_GENCB_new(), BN_GENCB_free() and BN_GENCB_get_arg()jsing2018-02-202-2/+32
* Provide BN_get_rfc2409_prime_*() and BN_get_rfc3526_prime_*().jsing2018-02-202-2/+58
* use freezero() instead of memset/explicit_bzero + free. Substantiallyderaadt2017-05-024-28/+14
* Send the function codes from the error functions to the bit bucket,beck2017-01-2917-118/+70
* Construct a BN_gcd_nonct, based on BN_mod_inverse_no_branch, as suggestedbeck2017-01-254-5/+165
* use BN_div_nonct where it is safe to do so.beck2017-01-211-2/+2
* Add ct and nonct versions of BN_mod_inverse for internal usebeck2017-01-216-17/+43
* Split out BN_div and BN_mod into ct and nonct versions for Internal use.beck2017-01-2110-33/+61
* Make explicit _ct and _nonct versions of bn_mod_exp funcitons thatbeck2017-01-216-22/+78
* /usr/bin/unifdef -D MONT_MUL_MOD -D MONT_EXP_WORD -D RECP_MUL_MOD -m bn_exp.cbeck2017-01-211-23/+2
* Remove superfluous datatype that is 32 by default. Clang complainspatrick2017-01-041-1/+1
* Explicitly export a list of symbols from libcrypto.jsing2016-12-213-124/+119
* Reduce the ternary operator abuseguenther2016-11-081-3/+8
* Stop abusing the ternary operator to decide which function to call in amiod2016-11-051-3/+6
* Replace all uses of magic numbers when operating on OPENSSL_ia32_P[] bymiod2016-11-044-12/+13
* If BN_div_word() fails (by returning (BN_ULONG)-1) or if the divisionguenther2016-10-171-4/+8
* Less S390.jsing2016-09-043-1176/+0
* Less IA64.jsing2016-09-042-2406/+0
* switch to a constant-time gather procedure for amd64 mont5 asmbcook2016-09-031-199/+314
* add constant-time MOD_EXP_CTIME_COPY_FROM_PREBUF.bcook2016-09-031-16/+55
* BN_mod_exp_mont_consttime: check for zero modulus.bcook2016-09-031-9/+33
* BN_mod_exp_mont_consttime: check for zero modulus.bcook2016-09-031-4/+5
* Avoid undefined-behavior right-shifting by a word-size # of bits.bcook2016-09-031-3/+2
* don't mix code and decls, ok tedu@bcook2016-07-181-2/+3
* use memset to initialize the unionbcook2016-07-171-2/+4
* Initialize buffers before use, noted by Kinichiro Inoguchi.bcook2016-07-171-7/+7
* On systems where we do not have BN_ULLONG defined (most 64-bit systems),bcook2016-07-052-9/+37
* 'accomodate' -> 'accommodate' in comments.krw2016-03-151-2/+2
* Add error handling to the remaining calls to bn_wexpand().bcook2016-03-121-4/+7
* graduate bn_expand() to a real function. the openssl version of thisderaadt2016-03-042-4/+16
* Revert bn_expand until there's consensus on a fix.doug2016-03-041-14/+3
* Add bounds checking for BN_hex2bn/BN_dec2bn.doug2016-03-022-10/+26
* More adress -> addressmmcc2015-12-241-1/+1