Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2017-08-21 | Remove OPENSSL_assert() usage from crypto/bn | Matt Caswell | 1 | -1/+1 | |
Reviewed-by: Andy Polyakov <appro@openssl.org> (Merged from https://github.com/openssl/openssl/pull/3740) | |||||
2016-05-17 | Copyright consolidation 06/10 | Rich Salz | 1 | -53/+5 | |
Reviewed-by: Richard Levitte <levitte@openssl.org> | |||||
2016-02-05 | GH601: Various spelling fixes. | FdaSilvaYY | 1 | -1/+1 | |
Signed-off-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> | |||||
2016-01-26 | Remove /* foo.c */ comments | Rich Salz | 1 | -1/+0 | |
This was done by the following find . -name '*.[ch]' | /tmp/pl where /tmp/pl is the following three-line script: print unless $. == 1 && m@/\* .*\.[ch] \*/@; close ARGV if eof; # Close file to reset $. And then some hand-editing of other files. Reviewed-by: Viktor Dukhovni <viktor@openssl.org> | |||||
2015-05-14 | Identify and move common internal libcrypto header files | Richard Levitte | 1 | -1/+1 | |
There are header files in crypto/ that are used by a number of crypto/ submodules. Move those to crypto/include/internal and adapt the affected source code and Makefiles. The header files that got moved are: crypto/cryptolib.h crypto/md32_common.h Reviewed-by: Rich Salz <rsalz@openssl.org> | |||||
2015-05-03 | Add OSSL_NELEM macro. | Dr. Stephen Henson | 1 | -10/+10 | |
Add OSSL_NELEM macro to e_os.h to determine the number of elements in an array. Reviewed-by: Tim Hudson <tjh@openssl.org> | |||||
2015-01-22 | Run util/openssl-format-source -v -c . | Matt Caswell | 1 | -966/+1119 | |
Reviewed-by: Tim Hudson <tjh@openssl.org> | |||||
2014-12-08 | Remove fips_constseg references. | Dr. Stephen Henson | 1 | -20/+0 | |
Reviewed-by: Tim Hudson <tjh@openssl.org> | |||||
2014-09-30 | crypto/bn/bn_nist.c: bring original failing code back for reference. | Andy Polyakov | 1 | -0/+11 | |
RT: 3541 Reviewed-by: Emilia Kasper <emilia@openssl.org> | |||||
2014-09-25 | crypto/bn/bn_nist.c: work around MSC ARM compiler bug. | Andy Polyakov | 1 | -3/+3 | |
RT: 3541 Reviewed-by: Emilia Kasper <emilia@openssl.org> | |||||
2013-02-14 | bn_nist.c: work around clang 3.0 bug. | Andy Polyakov | 1 | -12/+8 | |
2012-07-02 | bn_nist.c: compensate for VC bug [with optimization off!]. | Andy Polyakov | 1 | -5/+10 | |
PR: 2837 | |||||
2012-02-02 | bn_nist.c: make new optimized code dependent on BN_LLONG. | Andy Polyakov | 1 | -1/+1 | |
2012-01-06 | bn_nist.c: harmonize buf in BN_nist_mod_256 with other mod functions. | Andy Polyakov | 1 | -13/+19 | |
2011-11-13 | bn_nist.c: fix strict-aliasing compiler warning. | Andy Polyakov | 1 | -33/+41 | |
2011-09-14 | Allow for dynamic base in Win64 FIPS module. | Andy Polyakov | 1 | -0/+20 | |
2011-05-11 | bn_nist.c: fix shadowing warnings. | Andy Polyakov | 1 | -173/+173 | |
2011-05-09 | Optimized bn_nist.c. Performance improvement varies from one benchmark | Andy Polyakov | 1 | -13/+263 | |
and platform to another. It was measured to deliver 20-30% better performance on x86 platforms and 30-40% on x86_64, on nistp384 benchmark. | |||||
2011-03-19 | After some adjustments, apply the changes OpenSSL 1.0.0d on OpenVMS | Richard Levitte | 1 | -28/+36 | |
submitted by Steven M. Schweda <sms@antinode.info> | |||||
2011-02-14 | New function BN_nist_mod_func which returns an appropriate function | Dr. Stephen Henson | 1 | -0/+15 | |
if the passed prime is a NIST prime. | |||||
2008-12-29 | Fix "possible loss of data" Win64 compiler warnings. | Andy Polyakov | 1 | -31/+31 | |
2008-11-12 | Revert the size_t modifications from HEAD that had led to more | Geoff Thorpe | 1 | -3/+2 | |
knock-on work than expected - they've been extracted into a patch series that can be completed elsewhere, or in a different branch, before merging back to HEAD. | |||||
2008-11-01 | size_tification. | Ben Laurie | 1 | -2/+3 | |
2008-10-16 | Fix argument order in BN_nnmod call and implement rigorous boundary | Andy Polyakov | 1 | -10/+99 | |
condition check. | |||||
2008-10-15 | Remove redundant BN_ucmp, fix boundary condition in BN_nist_mod_224 and | Andy Polyakov | 1 | -75/+44 | |
reimplement BN_nist_mod_521. | |||||
2008-09-15 | Fix build warnings. | Geoff Thorpe | 1 | -1/+0 | |
2008-09-14 | Some precautions to avoid potential security-relevant problems. | Bodo Möller | 1 | -49/+134 | |
2008-04-24 | Add 64-bit support to BN_nist_mod_244 and engage BN_nist_mod_* on 64-bit | Andy Polyakov | 1 | -6/+20 | |
platforms. | |||||
2008-04-23 | Takanori Yanagisawa has shown how to correctly use pre-computed values. | Andy Polyakov | 1 | -231/+219 | |
So in a sense this commit reverts few latest ones fixing bugs in original code and improving it, most notably adding 64-bit support [though not in BN_nist_mod_224 yet]. PR: 1593 | |||||
2008-04-18 | Resolve __DECC warning and keep disclaiming support for 16-bit platforms. | Andy Polyakov | 1 | -69/+3 | |
2008-04-18 | Fix remaining BN_nist_mod_*. | Andy Polyakov | 1 | -106/+121 | |
PR: 1593 | |||||
2008-04-09 | Clarifying comment. | Andy Polyakov | 1 | -1/+9 | |
2008-04-09 | Do BN_nist_mod_384 by the book, as cheating doesn't work. Other functions | Andy Polyakov | 1 | -59/+63 | |
will be revised too. PR: 1593 | |||||
2008-04-01 | Fix fast reduction on NIST curves (as well BN_NIST_ADD_ONE macro). | Andy Polyakov | 1 | -96/+52 | |
PR: 1593 | |||||
2005-06-29 | Brought forward from 0.9.8 - 64 bit warning fixes and fussy compiler fixes. | Ben Laurie | 1 | -0/+6 | |
2005-05-29 | Typo | Richard Levitte | 1 | -2/+2 | |
2005-05-24 | DEC C complains about bad subscript, but we know better, so let's shut it up. | Richard Levitte | 1 | -0/+9 | |
2005-05-03 | rewrite of bn_nist.c, disable support for some curves on 64 bit platforms | Nils Larsch | 1 | -321/+231 | |
for now (it was broken anyway) | |||||
2004-03-13 | Convert openssl code not to assume the deprecated form of BN_zero(). | Geoff Thorpe | 1 | -4/+16 | |
Remove certain redundant BN_zero() initialisations, because BN_CTX_get(), BN_init(), [etc] already initialise to zero. Correct error checking in bn_sqr.c, and be less wishy-wash about how/why the result's 'top' value is set (note also, 'max' is always > 0 at this point). | |||||
2004-03-09 | Minimise the amount of code dependent on BN_DEBUG_RAND. In particular, | Geoff Thorpe | 1 | -17/+0 | |
redefine bn_clear_top2max() to be a NOP in the non-debugging case, and remove some unnecessary usages in bn_nist.c. Submitted by: Nils Larsch Reviewed by: Geoff Thorpe, Ulf Möller | |||||
2004-01-25 | Even though C specification explicitly says that constant type "stretches" | Andy Polyakov | 1 | -13/+19 | |
automatically to accomodate the value, some compilers fail to do so. Most notably 0x0123456789ABCDEF should come out as long long in 32-bit context, but HP compiler truncates it to 32-bit value. Which in turn breaks GF(2^m) arithmetics in hpux-parisc2-cc build. Therefore this fix... | |||||
2003-11-05 | This is a revert of my previous commit to "improve" the declaration of | Geoff Thorpe | 1 | -16/+15 | |
constant BIGNUMs. It turns out that this trips up different but equally useful compiler warnings to -Wcast-qual, and so wasn't worth the ugliness it created. (Thanks to Ulf for the forehead-slap.) | |||||
2003-11-05 | typo in comment | Ulf Möller | 1 | -1/+1 | |
2003-11-04 | Put the first stage of my bignum debugging adventures into CVS. This code | Geoff Thorpe | 1 | -10/+15 | |
is itself experimental, and in addition may cause execution to break on existing openssl "bugs" that previously were harmless or at least invisible. | |||||
2003-11-04 | This is the least unacceptable way I've found for declaring the bignum data | Geoff Thorpe | 1 | -15/+16 | |
and structures as constant without having to cast away const at any point. There is still plenty of other code that makes gcc's "-Wcast-qual" unhappy, but crypto/bn/ is now ok. Purists are welcome to suggest alternatives. | |||||
2003-10-29 | Some provisional bignum debugging has begun to detect inconsistent BIGNUM | Geoff Thorpe | 1 | -1/+2 | |
structures being passed in to or out of API functions, and this corrects a couple of cases found so far. Also, lop off a couple of bytes of white-space. | |||||
2002-10-28 | clean up new code for NIST primes | Bodo Möller | 1 | -13/+28 | |
create new lock CRYPTO_LOCK_BN to avoid race condition | |||||
2002-10-28 | fast reduction for NIST curves | Bodo Möller | 1 | -0/+828 | |
Submitted by: Nils Larsch |