summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* Eliminate the weird condition in the BN_swap_ct() API that at most one bittb2018-07-131-3/+3
* Sync commentkn2018-07-111-3/+5
* Document behavior change of EC_POINTs_mul(3) from EC constant time changes.tb2018-07-111-4/+22
* Turn yesterday's optimistic ! in an XXX comment into a more cautious ?tb2018-07-111-2/+2
* Update EC regression tests.tb2018-07-111-160/+26
* Indent labels by a space so they don't obliterate function names in diffs.tb2018-07-1019-91/+93
* ECC constant time scalar multiplication support. First step in overhaulingtb2018-07-105-46/+337
* Provide BN_swap_ct(), a constant time function that conditionally swapstb2018-07-102-2/+53
* Factor out a bit of ugly code that truncates the digest to the order_bitstb2018-07-101-32/+32
* $OpenBSD$tb2018-07-102-1/+2
* Now that all *_free() functions are NULL safe, we can generate thetb2018-07-105-239/+123
* +addsubtb2018-07-101-1/+2
* Add simple regression tests for BN_{,u}{add,sub}(3). With input from jcatb2018-07-102-0/+248
* Move a detail on tls_connect(3) to its documentation and be a bit moretb2018-07-091-5/+7
* wording tweak for tls_init() from jsingtb2018-07-091-4/+4
* sync with const changes in x509.h r1.68.tb2018-07-091-4/+4
* sync with const changes in evp.h r1.64.tb2018-07-091-3/+3
* sync with const changes in bio.h r1.44.tb2018-07-091-3/+3
* sync with const changes in bio.h r1.45.tb2018-07-091-10/+10
* import the relevant parts of a new ASN1_INTEGER_get(3) manual pageschwarze2018-07-082-1/+240
* Simplify and shorten the description of tls_init(3),schwarze2018-07-081-4/+4
* This code is already painful enough to look at. Putting the braces at thetb2018-06-161-74/+64
* Tiny tweak to the blinding comment.tb2018-06-161-2/+4
* Basic cleanup. Handle the possibly NULL ctx_in in ecdsa_sign_setup() withtb2018-06-151-67/+62
* Clean up some whitespace and polish a few comments. Reduces noise intb2018-06-151-24/+21
* Use a blinding value when generating an ECDSA signature, in order totb2018-06-141-14/+65
* Use a blinding value when generating a DSA signature, in order to reducejsing2018-06-141-9/+39
* Clarify the digest truncation comment in DSA signature generation.jsing2018-06-141-3/+4
* Pull up the code that converts the digest to a BIGNUM - this only needsjsing2018-06-141-10/+10
* Fix a potential leak/incorrect return value in DSA signature generation.jsing2018-06-141-4/+6
* Call DSA_SIG_new() instead of hand rolling the same.jsing2018-06-141-5/+2
* DSA_SIG_new() amounts to a single calloc() call.jsing2018-06-141-10/+3
* style(9), comments and whitespace.jsing2018-06-131-30/+32
* Avoid a timing side-channel leak when generating DSA and ECDSA signatures.jsing2018-06-132-7/+4
* zap stray tabsthen2018-06-121-2/+2
* Reject excessively large primes in DH key generation. Problem reportedsthen2018-06-121-1/+6
* fix odd whitespacetb2018-06-101-3/+3
* Remove a handrolled GOST_le2bn().jsing2018-06-101-8/+4
* Now that all of the server-side client key exchange processing functionsjsing2018-06-101-53/+40
* Allocate a dedicated buffer for use when deriving a shared key duringjsing2018-06-031-10/+18
* Check the return value from DH_size() in ssl3_send_client_kex_dhe().jsing2018-06-031-4/+6
* Convert ssl3_get_client_kex_ecdhe_ecp() to CBS.jsing2018-06-021-44/+42
* Update regress for DES cipher suite removal.jsing2018-06-022-49/+41
* Remove the three remaining single DES cipher suites.jsing2018-06-021-49/+1
* Zero the client random so that it is easier to spot unintended differences.jsing2018-06-021-0/+1
* Add a const qualifier to the argument of UI_method_get_closer(),tb2018-06-022-14/+14
* Add const to the argument of the following callback getters:tb2018-06-022-18/+18
* Add const to both arguments of X509_certificate_type() and clean uptb2018-05-302-17/+10
* Add a const qualifier to the argument of EVP_PKEY_size().tb2018-05-302-4/+4
* Add a const qualifier to the `name' argument oftb2018-05-302-6/+8