Age | Commit message (Collapse) | Author | |
---|---|---|---|
2012-10-04 | Add support for Windows CE and C64+ to FIPS module. | Dr. Stephen Henson | |
2011-09-14 | Allow for dynamic base in Win64 FIPS module. | Andy Polyakov | |
2011-05-11 | bn_nist.c: fix shadowing warnings. | Andy Polyakov | |
2011-05-09 | Optimized bn_nist.c. Performance improvement varies from one benchmark | Andy Polyakov | |
and platform to another. It was measured to deliver 20-30% better performance on x86 platforms and 30-40% on x86_64, on nistp384 benchmark. | |||
2011-03-19 | After some adjustments, apply the changes OpenSSL 1.0.0d on OpenVMS | Richard Levitte | |
submitted by Steven M. Schweda <sms@antinode.info> | |||
2011-02-14 | New function BN_nist_mod_func which returns an appropriate function | Dr. Stephen Henson | |
if the passed prime is a NIST prime. | |||
2008-12-29 | Fix "possible loss of data" Win64 compiler warnings. | Andy Polyakov | |
2008-11-12 | Revert the size_t modifications from HEAD that had led to more | Geoff Thorpe | |
knock-on work than expected - they've been extracted into a patch series that can be completed elsewhere, or in a different branch, before merging back to HEAD. | |||
2008-11-01 | size_tification. | Ben Laurie | |
2008-10-16 | Fix argument order in BN_nnmod call and implement rigorous boundary | Andy Polyakov | |
condition check. | |||
2008-10-15 | Remove redundant BN_ucmp, fix boundary condition in BN_nist_mod_224 and | Andy Polyakov | |
reimplement BN_nist_mod_521. | |||
2008-09-15 | Fix build warnings. | Geoff Thorpe | |
2008-09-14 | Some precautions to avoid potential security-relevant problems. | Bodo Möller | |
2008-04-24 | Add 64-bit support to BN_nist_mod_244 and engage BN_nist_mod_* on 64-bit | Andy Polyakov | |
platforms. | |||
2008-04-23 | Takanori Yanagisawa has shown how to correctly use pre-computed values. | Andy Polyakov | |
So in a sense this commit reverts few latest ones fixing bugs in original code and improving it, most notably adding 64-bit support [though not in BN_nist_mod_224 yet]. PR: 1593 | |||
2008-04-18 | Resolve __DECC warning and keep disclaiming support for 16-bit platforms. | Andy Polyakov | |
2008-04-18 | Fix remaining BN_nist_mod_*. | Andy Polyakov | |
PR: 1593 | |||
2008-04-09 | Clarifying comment. | Andy Polyakov | |
2008-04-09 | Do BN_nist_mod_384 by the book, as cheating doesn't work. Other functions | Andy Polyakov | |
will be revised too. PR: 1593 | |||
2008-04-01 | Fix fast reduction on NIST curves (as well BN_NIST_ADD_ONE macro). | Andy Polyakov | |
PR: 1593 | |||
2005-06-29 | Brought forward from 0.9.8 - 64 bit warning fixes and fussy compiler fixes. | Ben Laurie | |
2005-05-29 | Typo | Richard Levitte | |
2005-05-24 | DEC C complains about bad subscript, but we know better, so let's shut it up. | Richard Levitte | |
2005-05-03 | rewrite of bn_nist.c, disable support for some curves on 64 bit platforms | Nils Larsch | |
for now (it was broken anyway) | |||
2004-03-13 | Convert openssl code not to assume the deprecated form of BN_zero(). | Geoff Thorpe | |
Remove certain redundant BN_zero() initialisations, because BN_CTX_get(), BN_init(), [etc] already initialise to zero. Correct error checking in bn_sqr.c, and be less wishy-wash about how/why the result's 'top' value is set (note also, 'max' is always > 0 at this point). | |||
2004-03-09 | Minimise the amount of code dependent on BN_DEBUG_RAND. In particular, | Geoff Thorpe | |
redefine bn_clear_top2max() to be a NOP in the non-debugging case, and remove some unnecessary usages in bn_nist.c. Submitted by: Nils Larsch Reviewed by: Geoff Thorpe, Ulf Möller | |||
2004-01-25 | Even though C specification explicitly says that constant type "stretches" | Andy Polyakov | |
automatically to accomodate the value, some compilers fail to do so. Most notably 0x0123456789ABCDEF should come out as long long in 32-bit context, but HP compiler truncates it to 32-bit value. Which in turn breaks GF(2^m) arithmetics in hpux-parisc2-cc build. Therefore this fix... | |||
2003-11-05 | This is a revert of my previous commit to "improve" the declaration of | Geoff Thorpe | |
constant BIGNUMs. It turns out that this trips up different but equally useful compiler warnings to -Wcast-qual, and so wasn't worth the ugliness it created. (Thanks to Ulf for the forehead-slap.) | |||
2003-11-05 | typo in comment | Ulf Möller | |
2003-11-04 | Put the first stage of my bignum debugging adventures into CVS. This code | Geoff Thorpe | |
is itself experimental, and in addition may cause execution to break on existing openssl "bugs" that previously were harmless or at least invisible. | |||
2003-11-04 | This is the least unacceptable way I've found for declaring the bignum data | Geoff Thorpe | |
and structures as constant without having to cast away const at any point. There is still plenty of other code that makes gcc's "-Wcast-qual" unhappy, but crypto/bn/ is now ok. Purists are welcome to suggest alternatives. | |||
2003-10-29 | Some provisional bignum debugging has begun to detect inconsistent BIGNUM | Geoff Thorpe | |
structures being passed in to or out of API functions, and this corrects a couple of cases found so far. Also, lop off a couple of bytes of white-space. | |||
2002-10-28 | clean up new code for NIST primes | Bodo Möller | |
create new lock CRYPTO_LOCK_BN to avoid race condition | |||
2002-10-28 | fast reduction for NIST curves | Bodo Möller | |
Submitted by: Nils Larsch |