Commit History

Author SHA1 Message Date
  Andy Polyakov 299ab428ce Fix remaining BN_nist_mod_*. 16 years ago
  Andy Polyakov d4122504a2 Clarifying comment. 16 years ago
  Andy Polyakov 2c4226c42b Do BN_nist_mod_384 by the book, as cheating doesn't work. Other functions 16 years ago
  Andy Polyakov 2819ffb520 Fix fast reduction on NIST curves (as well BN_NIST_ADD_ONE macro). 16 years ago
  Ben Laurie a51a97262d Brought forward from 0.9.8 - 64 bit warning fixes and fussy compiler fixes. 19 years ago
  Richard Levitte 9426364be9 Typo 19 years ago
  Richard Levitte b172dec864 DEC C complains about bad subscript, but we know better, so let's shut it up. 19 years ago
  Nils Larsch fcb41c0ee8 rewrite of bn_nist.c, disable support for some curves on 64 bit platforms 19 years ago
  Geoff Thorpe b6358c89a1 Convert openssl code not to assume the deprecated form of BN_zero(). 20 years ago
  Geoff Thorpe a8aa764d3c Minimise the amount of code dependent on BN_DEBUG_RAND. In particular, 20 years ago
  Andy Polyakov 27b2b78f90 Even though C specification explicitly says that constant type "stretches" 21 years ago
  Geoff Thorpe 0ef85c7f45 This is a revert of my previous commit to "improve" the declaration of 21 years ago
  Ulf Möller 078dd1a0f9 typo in comment 21 years ago
  Geoff Thorpe d870740cd7 Put the first stage of my bignum debugging adventures into CVS. This code 21 years ago
  Geoff Thorpe c465e7941e This is the least unacceptable way I've found for declaring the bignum data 21 years ago
  Geoff Thorpe 31166ec8f3 Some provisional bignum debugging has begun to detect inconsistent BIGNUM 21 years ago
  Bodo Möller 19b8d06a79 clean up new code for NIST primes 22 years ago
  Bodo Möller 5c6bf03117 fast reduction for NIST curves 22 years ago