summaryrefslogtreecommitdiffstats
path: root/lib/libcrypto/bn
AgeCommit message (Expand)AuthorFilesLines
2020-09-12Unindent a bit of code that performs a few too many checks totb1-10/+8
2020-09-12Avoid an out-of-bounds access in BN_rand()tb1-3/+8
2019-08-25Change generating and checking of primes so that the error rate ofschwarze1-18/+73
2019-08-20make BN_CTX_end(NULL) a NOOP for compatibility with documented behaviourschwarze1-1/+4
2019-06-17Make BN_num_bits_word() constant time.tb1-47/+17
2019-03-23Add range checks to varios ASN1_INTEGER functions to ensure thebeck1-1/+3
2019-01-20Fix BN_is_prime_* calls in libcrypto, the API returns -1 on error.tb1-10/+20
2018-11-06Flip reversed test in bn_rand_interval().tb1-2/+2
2018-11-05Introduce bn_rand_interval() that allows specifying an interval [a, b)tb2-2/+30
2018-07-23Use a size_t instead of an int for the byte count in BN_swap_ct().tb2-8/+11
2018-07-23Clean up our disgusting implementations of BN_{,u}{add,sub}(), followingtb1-155/+65
2018-07-13Eliminate the weird condition in the BN_swap_ct() API that at most one bittb1-3/+3
2018-07-11Sync commentkn1-3/+5
2018-07-11Turn yesterday's optimistic ! in an XXX comment into a more cautious ?tb1-2/+2
2018-07-10Provide BN_swap_ct(), a constant time function that conditionally swapstb2-2/+53
2018-06-10fix odd whitespacetb1-3/+3
2018-05-12Use explicit_bzero() rather than memset() when clearing a BIGNUM.jsing1-2/+2
2018-02-20Provide BN_GENCB_new(), BN_GENCB_free() and BN_GENCB_get_arg()jsing2-2/+32
2018-02-20Provide BN_get_rfc2409_prime_*() and BN_get_rfc3526_prime_*().jsing2-2/+58
2017-05-02use freezero() instead of memset/explicit_bzero + free. Substantiallyderaadt4-28/+14
2017-01-29Send the function codes from the error functions to the bit bucket,beck17-118/+70
2017-01-25Construct a BN_gcd_nonct, based on BN_mod_inverse_no_branch, as suggestedbeck4-5/+165
2017-01-21use BN_div_nonct where it is safe to do so.beck1-2/+2
2017-01-21Add ct and nonct versions of BN_mod_inverse for internal usebeck6-17/+43
2017-01-21Split out BN_div and BN_mod into ct and nonct versions for Internal use.beck10-33/+61
2017-01-21Make explicit _ct and _nonct versions of bn_mod_exp funcitons thatbeck6-22/+78
2017-01-21/usr/bin/unifdef -D MONT_MUL_MOD -D MONT_EXP_WORD -D RECP_MUL_MOD -m bn_exp.cbeck1-23/+2
2017-01-04Remove superfluous datatype that is 32 by default. Clang complainspatrick1-1/+1
2016-12-21Explicitly export a list of symbols from libcrypto.jsing3-124/+119
2016-11-08Reduce the ternary operator abuseguenther1-3/+8
2016-11-05Stop abusing the ternary operator to decide which function to call in amiod1-3/+6
2016-11-04Replace all uses of magic numbers when operating on OPENSSL_ia32_P[] bymiod4-12/+13
2016-10-17If BN_div_word() fails (by returning (BN_ULONG)-1) or if the divisionguenther1-4/+8
2016-09-04Less S390.jsing3-1176/+0
2016-09-04Less IA64.jsing2-2406/+0
2016-09-03switch to a constant-time gather procedure for amd64 mont5 asmbcook1-197/+312
2016-09-03add constant-time MOD_EXP_CTIME_COPY_FROM_PREBUF.bcook1-16/+55
2016-09-03BN_mod_exp_mont_consttime: check for zero modulus.bcook1-9/+33
2016-09-03BN_mod_exp_mont_consttime: check for zero modulus.bcook1-4/+5
2016-09-03Avoid undefined-behavior right-shifting by a word-size # of bits.bcook1-3/+2
2016-07-18don't mix code and decls, ok tedu@bcook1-2/+3
2016-07-17use memset to initialize the unionbcook1-2/+4
2016-07-17Initialize buffers before use, noted by Kinichiro Inoguchi.bcook1-7/+7
2016-07-05On systems where we do not have BN_ULLONG defined (most 64-bit systems),bcook2-9/+37
2016-03-15'accomodate' -> 'accommodate' in comments.krw1-2/+2
2016-03-12Add error handling to the remaining calls to bn_wexpand().bcook1-4/+7
2016-03-04graduate bn_expand() to a real function. the openssl version of thisderaadt2-4/+16
2016-03-04Revert bn_expand until there's consensus on a fix.doug1-14/+3
2016-03-02Add bounds checking for BN_hex2bn/BN_dec2bn.doug2-10/+26
2015-12-24More adress -> addressmmcc1-1/+1