Commit History

Autor SHA1 Mensaxe Data
  Richard Levitte b39fc56061 Identify and move common internal libcrypto header files %!s(int64=9) %!d(string=hai) anos
  Matt Caswell 0f113f3ee4 Run util/openssl-format-source -v -c . %!s(int64=9) %!d(string=hai) anos
  Matt Caswell c80fd6b215 Further comment changes for reformat (master) %!s(int64=9) %!d(string=hai) anos
  Tim Hudson 1d97c84351 mark all block comments that need format preserving so that %!s(int64=10) %!d(string=hai) anos
  Emilia Kasper a015758d11 Check for invalid divisors in BN_div. %!s(int64=10) %!d(string=hai) anos
  Dr. Stephen Henson 73e45b2dd1 remove OPENSSL_FIPSAPI %!s(int64=10) %!d(string=hai) anos
  Doug Goldstein 448155e9bb RT2163: Remove some unneeded #include's %!s(int64=10) %!d(string=hai) anos
  Andy Polyakov bf3dfe7fee bn_div.c: remove duplicate code by merging BN_div and BN_div_no_branch. %!s(int64=13) %!d(string=hai) anos
  Dr. Stephen Henson f41154b206 #undef bn_div_words as it is defined for FIPS builds. %!s(int64=13) %!d(string=hai) anos
  Dr. Stephen Henson 48da9b8f2a Fix warning. %!s(int64=13) %!d(string=hai) anos
  Dr. Stephen Henson 14ae26f2e4 Transfer error redirection to fips.h, add OPENSSL_FIPSAPI to source files %!s(int64=13) %!d(string=hai) anos
  Bodo Möller 2d9dcd4ff0 Always check bn_wexpend() return values for failure (CVE-2009-3245). %!s(int64=14) %!d(string=hai) anos
  Dr. Stephen Henson d70323f1c5 Submitted by: Peter Gutmann <pgut001@cs.auckland.ac.nz> %!s(int64=15) %!d(string=hai) anos
  Geoff Thorpe 6343829a39 Revert the size_t modifications from HEAD that had led to more %!s(int64=16) %!d(string=hai) anos
  Ben Laurie 4d6e1e4f29 size_tification. %!s(int64=16) %!d(string=hai) anos
  Bodo Möller f8d6be3f81 Some precautions to avoid potential security-relevant problems. %!s(int64=16) %!d(string=hai) anos
  Dr. Stephen Henson 56c7754cab Avoid warnings. %!s(int64=16) %!d(string=hai) anos
  Andy Polyakov 55525742f4 Privatize BN_*_no_branch. %!s(int64=17) %!d(string=hai) anos
  Bodo Möller 24a8c25ab5 fix error codes %!s(int64=17) %!d(string=hai) anos
  Bodo Möller d1e7d1d96c don't violate the bn_check_top assertion in BN_mod_inverse_no_branch() %!s(int64=17) %!d(string=hai) anos
  Bodo Möller b002265ee3 make BN_FLG_CONSTTIME semantics more fool-proof %!s(int64=17) %!d(string=hai) anos
  Bodo Möller bd31fb2145 Change to mitigate branch prediction attacks %!s(int64=17) %!d(string=hai) anos
  Nils Larsch 8215e7a938 fix warnings when building openssl with the following compiler options: %!s(int64=19) %!d(string=hai) anos
  Geoff Thorpe 9e051bac13 Document a change I'd already made, and at the same time, correct the %!s(int64=20) %!d(string=hai) anos
  Geoff Thorpe a8aa764d3c Minimise the amount of code dependent on BN_DEBUG_RAND. In particular, %!s(int64=20) %!d(string=hai) anos
  Geoff Thorpe 9e989810ba BN_div() cleanup: replace the use of BN_sub and BN_add with bn_sub_words %!s(int64=21) %!d(string=hai) anos
  Geoff Thorpe 5c0c22803e Put more debug screening in BN_div() and correct a comment. %!s(int64=21) %!d(string=hai) anos
  Geoff Thorpe d870740cd7 Put the first stage of my bignum debugging adventures into CVS. This code %!s(int64=21) %!d(string=hai) anos
  Geoff Thorpe a9fd78f9da bn_div() does some pretty nasty things with temporary variables, %!s(int64=21) %!d(string=hai) anos
  Geoff Thorpe c4db1a8b5c This fixes a couple of cases where an inconsistent BIGNUM could be passed as %!s(int64=21) %!d(string=hai) anos