summaryrefslogtreecommitdiffstats
path: root/crypto/bn/bn_rand.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Remove /* foo.c */ commentsRich Salz2016-01-261-1/+0
* Continue standardising malloc style for libcryptoMatt Caswell2015-11-091-1/+1
* Fix off-by-one in BN_randMatt Caswell2015-05-231-1/+6
* Identify and move common internal libcrypto header filesRichard Levitte2015-05-141-1/+1
* free null cleanup finaleRich Salz2015-05-011-2/+1
* free cleanup almost the finaleRich Salz2015-04-301-4/+1
* remove malloc castsRich Salz2015-04-281-1/+1
* RAND_bytes updatesMatt Caswell2015-03-251-2/+3
* Final (for me, for now) dead code cleanupRich Salz2015-02-091-4/+0
* OPENSSL_NO_xxx cleanup: SHARich Salz2015-01-271-2/+0
* Run util/openssl-format-source -v -c .Matt Caswell2015-01-221-253/+241
* remove OPENSSL_FIPSAPIDr. Stephen Henson2014-12-081-1/+1
* remove FIPS module code from crypto/bnDr. Stephen Henson2014-12-081-8/+0
* Add secure DSA nonce flag.Adam Langley2013-06-131-0/+70
* Rename FIPS_mode_set and FIPS_mode. Theses symbols will be defined inDr. Stephen Henson2011-05-111-1/+1
* In FIPS mode only use "Generation by Testing Candidates" equivalent.Dr. Stephen Henson2011-02-111-0/+8
* Move all FIPSAPI renames into fips.h header file, include early inDr. Stephen Henson2011-01-271-5/+2
* Redirect FIPS memory allocation to FIPS_malloc() routine, removeDr. Stephen Henson2011-01-271-0/+5
* Revert the size_t modifications from HEAD that had led to moreGeoff Thorpe2008-11-121-5/+4
* size_tification.Ben Laurie2008-11-011-4/+5
* Constification.Ben Laurie2008-10-201-3/+3
* Fix various incorrect error function codes.Bodo Möller2005-04-261-1/+1
* RAND_add() wants a double as it's last argument.Richard Levitte2004-03-251-1/+1
* Convert openssl code not to assume the deprecated form of BN_zero().Geoff Thorpe2004-03-141-3/+1
* Put the first stage of my bignum debugging adventures into CVS. This codeGeoff Thorpe2003-11-041-0/+2
* A few more memset()s converted to OPENSSL_cleanse().Richard Levitte2002-11-291-1/+1
* Let BN_rand_range() abort with an error after 100 iterationsBodo Möller2002-08-021-0/+14
* fix BN_rand_rangeBodo Möller2001-12-141-11/+13
* Use uniformly chosen witnesses for Miller-Rabin testBodo Möller2001-09-031-3/+68
* Fix BN_[pseudo_]rand: 'mask' must be used even if top=-1.Bodo Möller2001-02-201-4/+3
* BN_rand_range() needs a BN_rand() variant that doesn't set the MSB.Ulf Möller2001-02-201-12/+15
* Simplify BN_rand_rangeBodo Möller2001-02-101-7/+3
* Another comment change. (Previous comment does not applyBodo Möller2001-02-081-2/+2
* Change comments. (The expected number of iterations in BN_rand_rangeBodo Möller2001-02-081-2/+2
* oops -- remove observation codeBodo Möller2001-02-081-4/+0
* Integrate my implementation of a countermeasure againstBodo Möller2001-02-081-6/+55
* Bleichenbacher's DSA attackUlf Möller2001-02-071-0/+11
* New function BN_bntest_rand() to detect more BN library bugs.Ulf Möller2000-12-021-0/+28
* Return bignum '0' when BN_rand is asked for a 0 bit random number.Bodo Möller2000-07-021-0/+6
* There have been a number of complaints from a number of sources that namesRichard Levitte2000-06-021-2/+2
* A couple of things were reversed for BN_pseudo_rand ...Bodo Möller2000-01-271-2/+2
* Document DSA and SHA.Ulf Möller2000-01-271-3/+21
* Precautions against using the PRNG uninitialized: RAND_bytes() nowUlf Möller2000-01-131-2/+3
* Change #include filenames from <foo.h> to <openssl.h>.Bodo Möller1999-04-241-1/+1
* Change functions to ANSI C.Ulf Möller1999-04-191-5/+1
* More exactitude with function arguments.Ben Laurie1999-02-101-1/+1
* Import of old SSLeay release: SSLeay 0.9.0bRalf S. Engelschall1998-12-211-1/+1
* Import of old SSLeay release: SSLeay 0.8.1bRalf S. Engelschall1998-12-211-0/+121