summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/bn (follow)
Commit message (Expand)AuthorAgeFilesLines
* Fix infinite loop in BN_mod_sqrt()tb2022-03-151-14/+15
* Avoid a NULL dereference in BN_mod_exp2_mont()tb2022-02-071-2/+2
* Check for zero modulus in BN_MONT_CTX_set().tb2022-02-071-1/+4
* Add and fix check for BN functions return valueinoguchi2022-01-201-4/+5
* Add check for BN functions return valueinoguchi2022-01-201-3/+5
* Move BN structs to bn_lcl.htb2022-01-142-50/+46
* Unifdef LIBRESSL_OPAQUE_* and LIBRESSL_NEXT_APItb2022-01-141-65/+1
* Pull BN_{new,init,clear,clear_free,free} up to the top of bn_lib.cjsing2021-12-271-58/+58
* Consistently call BN_init() before BN_with_flags()tb2021-12-261-13/+27
* Annotate the structs to be moved to bn_lcl.h in the next bumptb2021-12-041-1/+5
* Use BN_is_negative(p) instead of p->neg in one place.tb2021-12-041-2/+2
* Implement the BN_to_montgomery() macro as a functiontb2021-12-042-2/+13
* Implement the BN_is_negative macro as a functiontb2021-12-042-2/+13
* Provide function implementations for various BN_* macrostb2021-12-042-4/+54
* Provide replacement functions for the BN_{get,set,with}_flags() macros.tb2021-12-042-2/+34
* Provide replacement functions for the BN_GENCB_set{,_old}() macrostb2021-12-042-3/+33
* typo in commenttb2021-11-181-2/+2
* Switch to <endian.h> from <machine/endian.h> for better portability.bcook2021-11-091-3/+2
* Expose BN_bn2{,le}binpad() and BN_lebin2bn() in <openssl/bn.h>tb2021-09-101-3/+1
* Expose BN_RAND_* in <openssl/bn.h>tb2021-09-101-3/+1
* Prepare to provide BN_RAND_* flags for BN_rand_range()tb2021-09-101-1/+12
* Prepare to provide BN_bn2{,le}binpad() and BN_lebin2bn()tb2021-09-082-9/+137
* whitespacetb2021-08-312-7/+7
* Unindent a bit of code that performs a few too many checks totb2020-09-121-10/+8
* Avoid an out-of-bounds access in BN_rand()tb2020-09-121-3/+8
* Change generating and checking of primes so that the error rate ofschwarze2019-08-251-18/+73
* make BN_CTX_end(NULL) a NOOP for compatibility with documented behaviourschwarze2019-08-201-1/+4
* Make BN_num_bits_word() constant time.tb2019-06-171-48/+18
* Add range checks to varios ASN1_INTEGER functions to ensure thebeck2019-03-231-1/+3
* Fix BN_is_prime_* calls in libcrypto, the API returns -1 on error.tb2019-01-201-10/+20
* Flip reversed test in bn_rand_interval().tb2018-11-061-2/+2
* Introduce bn_rand_interval() that allows specifying an interval [a, b)tb2018-11-052-2/+30
* Use a size_t instead of an int for the byte count in BN_swap_ct().tb2018-07-232-8/+11
* Clean up our disgusting implementations of BN_{,u}{add,sub}(), followingtb2018-07-231-157/+67
* Eliminate the weird condition in the BN_swap_ct() API that at most one bittb2018-07-131-3/+3
* Sync commentkn2018-07-111-3/+5
* Turn yesterday's optimistic ! in an XXX comment into a more cautious ?tb2018-07-111-2/+2
* Provide BN_swap_ct(), a constant time function that conditionally swapstb2018-07-102-2/+53
* fix odd whitespacetb2018-06-101-3/+3
* Use explicit_bzero() rather than memset() when clearing a BIGNUM.jsing2018-05-121-2/+2
* Provide BN_GENCB_new(), BN_GENCB_free() and BN_GENCB_get_arg()jsing2018-02-202-2/+32
* Provide BN_get_rfc2409_prime_*() and BN_get_rfc3526_prime_*().jsing2018-02-202-2/+58
* use freezero() instead of memset/explicit_bzero + free. Substantiallyderaadt2017-05-024-28/+14
* Send the function codes from the error functions to the bit bucket,beck2017-01-2917-118/+70
* Construct a BN_gcd_nonct, based on BN_mod_inverse_no_branch, as suggestedbeck2017-01-254-5/+165
* use BN_div_nonct where it is safe to do so.beck2017-01-211-2/+2
* Add ct and nonct versions of BN_mod_inverse for internal usebeck2017-01-216-17/+43
* Split out BN_div and BN_mod into ct and nonct versions for Internal use.beck2017-01-2110-33/+61
* Make explicit _ct and _nonct versions of bn_mod_exp funcitons thatbeck2017-01-216-22/+78
* /usr/bin/unifdef -D MONT_MUL_MOD -D MONT_EXP_WORD -D RECP_MUL_MOD -m bn_exp.cbeck2017-01-211-23/+2