summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* Clean up our disgusting implementations of BN_{,u}{add,sub}(), followingtb2018-07-231-157/+67
* Implement RSASSA-PKCS1-v1_5 as specified in RFC 8017.tb2018-07-231-120/+148
* avoid using argv[0] for printing to stderrtb2018-07-231-2/+2
* Bob's license was missing, add it.tb2018-07-181-1/+16
* some more style fixestb2018-07-171-19/+19
* Add missing $OpenBSD$ markers.tb2018-07-1741-22/+42
* remove unused, empty filetb2018-07-171-0/+0
* Replace getprogname() to argv[0] in bnaddsubinoguchi2018-07-171-3/+2
* Document behavior change of EC_POINTs_mul() again.tb2018-07-161-4/+22
* Recommit Billy Brumley's ECC constant time patch with a fix for sparc64tb2018-07-166-47/+341
* re-commit the removal of the EC_POINTs_mul() regression tests with num > 1tb2018-07-151-161/+27
* recommit label indentation part of the backout; clearly unrelated to thetb2018-07-1519-91/+93
* $OpenBSD$tb2018-07-151-0/+1
* Also revert regression tests so that EC_POINTs_mul() with longer vectorstb2018-07-151-26/+160
* back out ecc constant time changesjsg2018-07-1521-448/+137
* openssl app timers: TM_START -> TM_RESET, TM_STOP -> TM_GETcheloha2018-07-134-15/+15
* Eliminate the weird condition in the BN_swap_ct() API that at most one bittb2018-07-131-3/+3
* Sync commentkn2018-07-111-3/+5
* Document behavior change of EC_POINTs_mul(3) from EC constant time changes.tb2018-07-111-4/+22
* Turn yesterday's optimistic ! in an XXX comment into a more cautious ?tb2018-07-111-2/+2
* Update EC regression tests.tb2018-07-111-160/+26
* Indent labels by a space so they don't obliterate function names in diffs.tb2018-07-1019-91/+93
* ECC constant time scalar multiplication support. First step in overhaulingtb2018-07-105-46/+337
* Provide BN_swap_ct(), a constant time function that conditionally swapstb2018-07-102-2/+53
* Factor out a bit of ugly code that truncates the digest to the order_bitstb2018-07-101-32/+32
* $OpenBSD$tb2018-07-102-1/+2
* Now that all *_free() functions are NULL safe, we can generate thetb2018-07-105-239/+123
* +addsubtb2018-07-101-1/+2
* Add simple regression tests for BN_{,u}{add,sub}(3). With input from jcatb2018-07-102-0/+248
* Move a detail on tls_connect(3) to its documentation and be a bit moretb2018-07-091-5/+7
* wording tweak for tls_init() from jsingtb2018-07-091-4/+4
* sync with const changes in x509.h r1.68.tb2018-07-091-4/+4
* sync with const changes in evp.h r1.64.tb2018-07-091-3/+3
* sync with const changes in bio.h r1.44.tb2018-07-091-3/+3
* sync with const changes in bio.h r1.45.tb2018-07-091-10/+10
* import the relevant parts of a new ASN1_INTEGER_get(3) manual pageschwarze2018-07-082-1/+240
* Simplify and shorten the description of tls_init(3),schwarze2018-07-081-4/+4
* This code is already painful enough to look at. Putting the braces at thetb2018-06-161-74/+64
* Tiny tweak to the blinding comment.tb2018-06-161-2/+4
* Basic cleanup. Handle the possibly NULL ctx_in in ecdsa_sign_setup() withtb2018-06-151-67/+62
* Clean up some whitespace and polish a few comments. Reduces noise intb2018-06-151-24/+21
* Use a blinding value when generating an ECDSA signature, in order totb2018-06-141-14/+65
* Use a blinding value when generating a DSA signature, in order to reducejsing2018-06-141-9/+39
* Clarify the digest truncation comment in DSA signature generation.jsing2018-06-141-3/+4
* Pull up the code that converts the digest to a BIGNUM - this only needsjsing2018-06-141-10/+10
* Fix a potential leak/incorrect return value in DSA signature generation.jsing2018-06-141-4/+6
* Call DSA_SIG_new() instead of hand rolling the same.jsing2018-06-141-5/+2
* DSA_SIG_new() amounts to a single calloc() call.jsing2018-06-141-10/+3
* style(9), comments and whitespace.jsing2018-06-131-30/+32
* Avoid a timing side-channel leak when generating DSA and ECDSA signatures.jsing2018-06-132-7/+4