summaryrefslogtreecommitdiffstats
path: root/crypto/bn/bn_nist.c
AgeCommit message (Collapse)Author
2012-10-04Add support for Windows CE and C64+ to FIPS module.Dr. Stephen Henson
2011-09-14Allow for dynamic base in Win64 FIPS module.Andy Polyakov
2011-05-11bn_nist.c: fix shadowing warnings.Andy Polyakov
2011-05-09Optimized bn_nist.c. Performance improvement varies from one benchmarkAndy Polyakov
and platform to another. It was measured to deliver 20-30% better performance on x86 platforms and 30-40% on x86_64, on nistp384 benchmark.
2011-03-19After some adjustments, apply the changes OpenSSL 1.0.0d on OpenVMSRichard Levitte
submitted by Steven M. Schweda <sms@antinode.info>
2011-02-14New function BN_nist_mod_func which returns an appropriate functionDr. Stephen Henson
if the passed prime is a NIST prime.
2008-12-29Fix "possible loss of data" Win64 compiler warnings.Andy Polyakov
2008-11-12Revert the size_t modifications from HEAD that had led to moreGeoff Thorpe
knock-on work than expected - they've been extracted into a patch series that can be completed elsewhere, or in a different branch, before merging back to HEAD.
2008-11-01size_tification.Ben Laurie
2008-10-16Fix argument order in BN_nnmod call and implement rigorous boundaryAndy Polyakov
condition check.
2008-10-15Remove redundant BN_ucmp, fix boundary condition in BN_nist_mod_224 andAndy Polyakov
reimplement BN_nist_mod_521.
2008-09-15Fix build warnings.Geoff Thorpe
2008-09-14Some precautions to avoid potential security-relevant problems.Bodo Möller
2008-04-24Add 64-bit support to BN_nist_mod_244 and engage BN_nist_mod_* on 64-bitAndy Polyakov
platforms.
2008-04-23Takanori Yanagisawa has shown how to correctly use pre-computed values.Andy Polyakov
So in a sense this commit reverts few latest ones fixing bugs in original code and improving it, most notably adding 64-bit support [though not in BN_nist_mod_224 yet]. PR: 1593
2008-04-18Resolve __DECC warning and keep disclaiming support for 16-bit platforms.Andy Polyakov
2008-04-18Fix remaining BN_nist_mod_*.Andy Polyakov
PR: 1593
2008-04-09Clarifying comment.Andy Polyakov
2008-04-09Do BN_nist_mod_384 by the book, as cheating doesn't work. Other functionsAndy Polyakov
will be revised too. PR: 1593
2008-04-01Fix fast reduction on NIST curves (as well BN_NIST_ADD_ONE macro).Andy Polyakov
PR: 1593
2005-06-29Brought forward from 0.9.8 - 64 bit warning fixes and fussy compiler fixes.Ben Laurie
2005-05-29TypoRichard Levitte
2005-05-24DEC C complains about bad subscript, but we know better, so let's shut it up.Richard Levitte
2005-05-03rewrite of bn_nist.c, disable support for some curves on 64 bit platformsNils Larsch
for now (it was broken anyway)
2004-03-13Convert openssl code not to assume the deprecated form of BN_zero().Geoff Thorpe
Remove certain redundant BN_zero() initialisations, because BN_CTX_get(), BN_init(), [etc] already initialise to zero. Correct error checking in bn_sqr.c, and be less wishy-wash about how/why the result's 'top' value is set (note also, 'max' is always > 0 at this point).
2004-03-09Minimise the amount of code dependent on BN_DEBUG_RAND. In particular,Geoff Thorpe
redefine bn_clear_top2max() to be a NOP in the non-debugging case, and remove some unnecessary usages in bn_nist.c. Submitted by: Nils Larsch Reviewed by: Geoff Thorpe, Ulf Möller
2004-01-25Even though C specification explicitly says that constant type "stretches"Andy Polyakov
automatically to accomodate the value, some compilers fail to do so. Most notably 0x0123456789ABCDEF should come out as long long in 32-bit context, but HP compiler truncates it to 32-bit value. Which in turn breaks GF(2^m) arithmetics in hpux-parisc2-cc build. Therefore this fix...
2003-11-05This is a revert of my previous commit to "improve" the declaration ofGeoff Thorpe
constant BIGNUMs. It turns out that this trips up different but equally useful compiler warnings to -Wcast-qual, and so wasn't worth the ugliness it created. (Thanks to Ulf for the forehead-slap.)
2003-11-05typo in commentUlf Möller
2003-11-04Put the first stage of my bignum debugging adventures into CVS. This codeGeoff Thorpe
is itself experimental, and in addition may cause execution to break on existing openssl "bugs" that previously were harmless or at least invisible.
2003-11-04This is the least unacceptable way I've found for declaring the bignum dataGeoff Thorpe
and structures as constant without having to cast away const at any point. There is still plenty of other code that makes gcc's "-Wcast-qual" unhappy, but crypto/bn/ is now ok. Purists are welcome to suggest alternatives.
2003-10-29Some provisional bignum debugging has begun to detect inconsistent BIGNUMGeoff Thorpe
structures being passed in to or out of API functions, and this corrects a couple of cases found so far. Also, lop off a couple of bytes of white-space.
2002-10-28clean up new code for NIST primesBodo Möller
create new lock CRYPTO_LOCK_BN to avoid race condition
2002-10-28fast reduction for NIST curvesBodo Möller
Submitted by: Nils Larsch