summaryrefslogtreecommitdiff
path: root/src/lib/libssl/src/crypto/rsa (follow)
Commit message (Expand)AuthorAgeFilesLines
* Remove the libssl/src directorybeck2016-09-0321-5926/+0
* call BN_init on temporaries to avoid use-before-set warningsbcook2016-07-072-2/+12
* Remove flags for disabling constant-time operations.bcook2016-06-304-129/+70
* Fix for OpenSSL CVE-2015-3194beck2015-12-031-2/+2
* Replace M_ASN1_OCTET_STRING_(free|new) with ASN1_OCTET_STRING_(free|new).jsing2015-09-301-2/+2
* Correct spelling of OPENSSL_cleanse.jsing2015-09-103-11/+12
* Drop stupid (int) casts for the arguments of malloc() and friends. This ismiod2015-07-192-6/+6
* Replace remaining CRYPTO_memcmp() calls with timingsafe_memcmp().jsing2015-06-201-2/+2
* Remove obsolete MDC-2DES from libcrypto.doug2015-06-202-29/+3
* Fix bad indenting in LibreSSL.doug2015-06-131-2/+2
* Regenmiod2015-02-151-52/+59
* Check for allocation error in RSA_eay_mod_exp(). Coverity CID 25217.miod2015-02-142-2/+7
* Expand ASN1_CHOICE*, ASN1_SEQUENCE* and associated macros, making thejsing2015-02-141-25/+161
* Guenther has plans for OPENSSL_NO_CMS, so revert this for the moment.beck2015-02-112-2/+39
* get rid of OPENSSL_NO_CMS code we do not use.beck2015-02-112-39/+2
* Enable building with -DOPENSSL_NO_DEPRECATED.doug2015-02-112-2/+4
* Expand the -IMPLEMENT_ASN1_ENCODE_FUNCTIONS_(const_)?fname macros so thatjsing2015-02-101-3/+27
* Expand the IMPLEMENT_ASN1_FUNCTIONS macro so that the code is visible andjsing2015-02-091-2/+26
* BN_CTX_get() can fail - consistently check its return value.jsing2015-02-093-14/+17
* Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().jsing2014-10-224-24/+16
* None of these need to include <openssl/rand.h>jsing2014-10-185-10/+5
* Make sure all error conditions in RSA_padding_add_PKCS1_PSS_mgf1() causemiod2014-07-131-3/+4
* if (x) FOO_free(x) -> FOO_free(x).miod2014-07-122-5/+4
* In RSA_eay_private_encrypt(), correctly return the smaller BN; OpenSSLmiod2014-07-111-2/+2
* Remove duplicate 0x for salt len in output; Martin Kaiser via OpenSSL trunk.miod2014-07-111-2/+2
* Only import cryptlib.h in the four source files that actually need it.jsing2014-07-1117-53/+60
* Explicitly include <openssl/opensslconf.h> in every file that referencesjsing2014-07-109-9/+33
* Stop including standard headers via cryptlib.h - pull in the headers thatjsing2014-07-109-11/+28
* RSA_setup_blinding() gets a BN with BN_CTX_get(), returns `out of memory'miod2014-07-101-6/+1
* Tweak some comments. We do not really need to know that "New!" flags werejsing2014-07-101-9/+8
* Stop playing with the RSA_FLAG_BLINDING flag. It does nothing.jsing2014-07-101-3/+1
* delete some casts. ok miodtedu2014-07-105-15/+15
* Remove RSA_FLAG_NO_EXP_CONSTTIME, which was deprecated 12+ years ago.jsing2014-07-101-13/+1
* BN_free, BN_clear_free, BN_CTX_free, BN_BLINDING_free and BN_MONT_CTX_freejsing2014-07-106-55/+32
* Use a while loop instead of an ifdowhile loop.jsing2014-07-102-12/+10
* ASN1_STRING_free can handle NULL, so callers don't need to check. ok miodtedu2014-07-091-3/+2
* Make comments readable.jsing2014-07-091-27/+33
* More KNF.jsing2014-07-0919-322/+331
* KNF.jsing2014-07-092-123/+108
* Unifdef -UPKCS_TESTVECT - we don't want the random data used in OAEP paddingmiod2014-07-091-6/+1
* remove unused, private version strings except SSL_version_strbcook2014-07-091-3/+1
* Be more strict in RSA_padding_check_X931(), and thus avoid a possiblemiod2014-07-091-2/+2
* In the old days (not in this century), SSLeay 0.4.5 would create X.509 RSAmiod2014-07-091-14/+3
* Remove RSA_memory_lock(). This undocumented function sort-of serializes yourmiod2014-07-092-51/+2
* RSA_NULL used to be a compile option allowing the RSA interfaces to bemiod2014-07-094-176/+4
* KNFmiod2014-07-0919-1967/+1959
* replace atoi() calls with strtol(). Follow the idiomatic pattern in ourderaadt2014-06-121-13/+32
* tags as requested by miod and teduderaadt2014-06-1222-21/+22
* c-file-style hints, begone; ok beckderaadt2014-06-111-1/+1
* malloc() result does not need a cast.deraadt2014-06-074-6/+6