aboutsummaryrefslogtreecommitdiff
path: root/crypto/bn/bn_prime.c
AgeCommit message (Expand)AuthorFilesLines
2017-08-03Add RAND_priv_bytes() for private keysRich Salz1-4/+4
2017-07-03BN_pseudo_rand is really BN_randRich Salz1-1/+1
2017-06-26Fix inaccurate comments in bn_prime.cPaul Yang1-4/+2
2017-04-21Numbers greater than 1 are usually non-negative.David Benjamin1-18/+6
2017-04-20Small primes are primes too.Adam Langley1-1/+1
2017-02-28Remove dead code in bnMatt Caswell1-124/+0
2016-11-15Check return value of some BN functions.Rich Salz1-1/+2
2016-08-10Change callers to use the new constants.Rich Salz1-5/+6
2016-06-29Whitespace cleanup in cryptoFdaSilvaYY1-1/+1
2016-06-25Handle BN_mod_word failures.David Benjamin1-11/+30
2016-06-18Useless header include of openssl/rand.hFdaSilvaYY1-1/+0
2016-06-13Add some missing return value checksMatt Caswell1-3/+5
2016-05-17Copyright consolidation 06/10Rich Salz1-107/+8
2016-04-28Don't leak memory on error in BN_generate_prime_exMatt Caswell1-3/+4
2016-01-28Restore NUMPRIMES as a numeric literalViktor Dukhovni1-2/+0
2016-01-27Remove EIGHT_BIT and SIXTEEN_BITRich Salz1-6/+2
2016-01-26Remove /* foo.c */ commentsRich Salz1-1/+0
2015-09-05RT3955: Reduce some stack usageRich Salz1-5/+9
2015-05-14Identify and move common internal libcrypto header filesRichard Levitte1-1/+1
2015-04-30free NULL cleanup 7Rich Salz1-5/+3
2015-03-17Fix probable_prime over large shiftMatt Caswell1-1/+11
2015-01-22Re-align some comments after running the reformat script.Matt Caswell1-11/+11
2015-01-22Run util/openssl-format-source -v -c .Matt Caswell1-520/+538
2014-12-30mark all block comments that need format preserving so thatTim Hudson1-2/+4
2014-06-01Tidy up, don't exceed the number of requested bits.Ben Laurie1-38/+41
2014-06-01Constify and reduce coprime random bits to allow for multiplier.Ben Laurie1-5/+8
2014-06-01Add a test to check we're really generating probable primes.Felix Laurie von Massenbach1-2/+2
2014-06-01Remove unused BIGNUMs.Felix Laurie von Massenbach1-7/+0
2014-06-01Refactor the first prime index.Felix Laurie von Massenbach1-3/+3
2014-06-01Try skipping over the adding and just picking a new random number.Felix Laurie von Massenbach1-30/+109
2014-06-01Generate safe primes not divisible by 3, 5 or 7.Felix Laurie von Massenbach1-6/+16
2014-06-01Add a method to generate a prime that is guaranteed not to be divisible by 3 ...Felix Laurie von Massenbach1-29/+55
2014-06-01Remove static from probable_prime_dh.Felix Laurie von Massenbach1-42/+40
2014-06-01Remove indentation from the goto targets.Felix Laurie von Massenbach1-3/+5
2013-06-04Ensure that, when generating small primes, the result is actually of theAdam Langley1-10/+61
2007-09-18Minimize stack utilization in probable_prime.Andy Polyakov1-2/+2
2006-09-18Ensure that the addition mods[i]+delta cannot overflow in probable_prime().Bodo Möller1-6/+3
2006-01-132 is a primeNils Larsch1-1/+2
2004-03-25Adjust various bignum functions to use BN_CTX for variables instead ofGeoff Thorpe1-6/+11
2003-11-04Put the first stage of my bignum debugging adventures into CVS. This codeGeoff Thorpe1-0/+5
2003-02-01Old-style callbacks can be NULL!Ben Laurie1-0/+2
2003-01-10Make sure everything that may be freed is allocated or initiated.Richard Levitte1-1/+1
2002-12-08Nils Larsch submitted;Geoff Thorpe1-2/+2
2002-12-08This is a first-cut at improving the callback mechanisms used inGeoff Thorpe1-31/+49
2001-09-04OpenSSL copyright notices ...Bodo Möller1-1/+1
2001-09-03Correct a typo.Geoff Thorpe1-1/+1
2001-09-03Use uniformly chosen witnesses for Miller-Rabin testBodo Möller1-5/+5
2000-11-06Constify the BIGNUM routines a bit more. The only trouble were theRichard Levitte1-8/+9
2000-02-05New functions BN_CTX_start(), BN_CTX_get(), BN_CTX_end() to accessUlf Möller1-17/+22
2000-02-03ispell (and minor modifications)Ulf Möller1-2/+2