summaryrefslogtreecommitdiffstats
path: root/crypto/ec (follow)
Commit message (Expand)AuthorAgeFilesLines
* Make the EC code available from inside the FIPS providerMatt Caswell2019-08-0626-188/+459
* make RSA and DSA operations throw MISSING_PRIVATE_KEY if needed, adapt ECDSADavid von Oheimb2019-07-312-4/+12
* Remove tab characters from C source files.Pauli2019-07-161-2/+2
* Regenerate mkerr filesRich Salz2019-07-161-278/+1
* Convert asn1_dsa.c to use the WPACKET API insteadMatt Caswell2019-07-111-16/+28
* Add simple ASN.1 utils for DSA signature DER.David Makepeace2019-07-111-6/+57
* Replace long dash characters with normal ascii minusBernd Edlinger2019-07-091-1/+1
* Fix TyposAntoine Cœur2019-07-025-6/+6
* Support SM2 certificate signingPaul Yang2019-06-281-1/+2
* EC only uses approved curves in FIPS mode.Shane Lontis2019-06-252-18/+100
* Remove OPENSSL_memcmp.Pauli2019-06-211-5/+4
* Move ec_asm_src file information to build.info filesRichard Levitte2019-06-171-1/+46
* Fix various mistakes in ec_GFp_nistp_recode_scalar_bits comment.David Benjamin2019-06-011-12/+12
* EVP_Digest*: enable SHA3 pre-hashing for ECDSAPatrick Steuer2019-05-221-1/+5
* Added X963KDF APIShane Lontis2019-05-161-49/+15
* Fix calling convention bug in ecp_nistz256_ord_sqr_montDavid Benjamin2019-04-144-4/+4
* Don't use coordinate blinding when scalar is group orderBernd Edlinger2019-04-141-2/+2
* ec key validation checks updatedShane Lontis2019-04-111-12/+77
* doc fixupsShane Lontis2019-04-112-4/+4
* Separate the lookup testNicola Tuveri2019-04-112-2/+3
* added code to validate EC named curve parametersShane Lontis2019-04-115-26/+175
* Fixed linux_x86_icc compiler errors in EC code related to __uint128_t/__int128_tShane Lontis2019-04-112-3/+6
* EC keygen updates + changed ecdsa_sign to use BN_secure_newShane Lontis2019-04-092-16/+47
* fixed public range check in ec_GF2m_simple_oct2pointShane Lontis2019-03-301-4/+5
* Make the array zeroing explicit using memset.Pauli2019-03-291-1/+3
* Added NULL check to BN_clear() & BN_CTX_end()Shane Lontis2019-03-196-14/+7
* Clear the point S before freeing in ec_scalar_mul_ladderBernd Edlinger2019-03-181-1/+1
* Clear the secret point in ecdh_simple_compute_keyBernd Edlinger2019-03-181-1/+1
* fix truncation of integers on 32bit AIXShane Lontis2019-03-114-429/+1437
* Avoid an underflow in ecp_nistp521.cMatt Caswell2019-03-071-3/+8
* constify *_dup() and *i2d_*() and related functions as far as possible, intro...David von Oheimb2019-03-062-12/+12
* Fix the default digest algorthm of SM2Paul Yang2019-02-271-1/+6
* Rearrange the inclusion of curve448/curve448_lcl.hRichard Levitte2019-02-252-1/+1
* Fix some CFI issues in x86_64 assemblyDavid Benjamin2019-02-171-0/+34
* SCA hardening for mod. field inversion in EC_GROUPBilly Brumley2019-02-1710-4/+137
* ARM64 assembly pack: make it Windows-friendly.Andy Polyakov2019-02-161-3/+3
* ARM assembly pack: make it Windows-friendly.Andy Polyakov2019-02-161-1/+3
* Add EC_GROUP_get0_fieldDavid Asraf2019-02-151-0/+5
* AArch64 assembly pack: authenticate return addresses.Andy Polyakov2019-02-121-1/+27
* Remove unnecessary trailing whitespaceSam Roberts2019-02-051-7/+7
* Build: Remove BEGINRAW / ENDRAW / OVERRIDERichard Levitte2019-01-311-5/+0
* Fix compilation with `-DREF_PRINT`Anna Henningsen2019-01-131-1/+1
* Disallow Ed448 signature malleabilityMatt Caswell2018-12-111-2/+28
* curve25519.c: improve formula alignmentDr. Matthias St. Pierre2018-12-061-523/+513
* curve25519.c: reformat code to follow coding guidelinesDr. Matthias St. Pierre2018-12-061-2228/+2344
* Following the license change, modify the boilerplates in crypto/ec/Richard Levitte2018-12-0657-57/+57
* Refactor the computation of API version limitsRichard Levitte2018-12-063-5/+5
* Switch future deprecation version from 1.2.0 to 3.0Richard Levitte2018-12-062-4/+4
* Disallow Ed25519 signature maleabilityMatt Caswell2018-12-031-10/+43
* Stop marking default digest for EC keys as mandatoryDavid Woodhouse2018-11-101-1/+1