aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/bn/bn_err.c
Commit message (Collapse)AuthorAgeFilesLines
* Check for errors allocating the error strings.Kurt Roeckx2016-07-201-1/+2
| | | | | Reviewed-by: Richard Levitte <levitte@openssl.org> GH: #1330
* Remove unused error/function codes.Rich Salz2016-05-231-9/+1
| | | | | | | | Add script to find unused err/reason codes Remove unused reason codes. Remove entries for unused functions Reviewed-by: Matt Caswell <matt@openssl.org>
* Manual fixes after copyright consolidationRich Salz2016-05-171-51/+6
| | | | Reviewed-by: Richard Levitte <levitte@openssl.org>
* Remove /* foo.c */ commentsRich Salz2016-01-261-1/+0
| | | | | | | | | | | | This was done by the following find . -name '*.[ch]' | /tmp/pl where /tmp/pl is the following three-line script: print unless $. == 1 && m@/\* .*\.[ch] \*/@; close ARGV if eof; # Close file to reset $. And then some hand-editing of other files. Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
* Rebuild error source files.Dr. Stephen Henson2015-11-051-2/+2
| | | | | | | Rebuild error source files: the new mkerr.pl functionality will now pick up and translate static function names properly. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Reject negative shifts for BN_rshift and BN_lshiftMatt Caswell2015-05-221-0/+3
| | | | | | | | | | | The functions BN_rshift and BN_lshift shift their arguments to the right or left by a specified number of bits. Unpredicatable results (including crashes) can occur if a negative number is supplied for the shift value. Thanks to Mateusz Kocielski (LogicalTrust), Marek Kroemeke and Filip Palian for discovering and reporting this issue. Reviewed-by: Kurt Roeckx <kurt@openssl.org>
* Error checking and memory leak fixes in NISTZ256.Emilia Kasper2015-04-271-1/+2
| | | | Reviewed-by: Richard Levitte <levitte@openssl.org>
* Run util/openssl-format-source -v -c .Matt Caswell2015-01-221-82/+82
| | | | Reviewed-by: Tim Hudson <tjh@openssl.org>
* Prepare for bn opaquify. Implement internal helper functions.Matt Caswell2014-12-081-1/+3
| | | | Reviewed-by: Tim Hudson <tjh@openssl.org>
* Add secure DSA nonce flag.Adam Langley2013-06-131-1/+2
| | | | | | This change adds the option to calculate (EC)DSA nonces by hashing the message and private key along with entropy to avoid leaking the private key if the PRNG fails.
* Ensure that, when generating small primes, the result is actually of theAdam Langley2013-06-041-0/+3
| | | | | | | | | | | requested size. Fixes OpenSSL #2701. This change does not address the cases of generating safe primes, or where the |add| parameter is non-NULL. Conflicts: crypto/bn/bn.h crypto/bn/bn_err.c
* fix error codesBodo Möller2007-04-191-1/+3
|
* Update from 0.9.8 stable. Eliminate duplicate error codes.Dr. Stephen Henson2006-11-211-7/+4
|
* Implement fixed-window exponentiation to mitigate hyper-threadingBodo Möller2005-05-161-2/+5
| | | | | | | | | | | | timing attacks. BN_FLG_EXP_CONSTTIME requests this algorithm, and this done by default for RSA/DSA/DH private key computations unless RSA_FLAG_NO_EXP_CONSTTIME/DSA_FLAG_NO_EXP_CONSTTIME/ DH_FLAG_NO_EXP_CONSTTIME is set. Submitted by: Matthew D Wood Reviewed by: Bodo Moeller
* Fix more error codes.Bodo Möller2005-05-111-2/+2
| | | | | (Also improve util/ck_errf.pl script, and occasionally fix source code formatting.)
* some updates for the blinding code; summary:Nils Larsch2005-04-261-0/+1
| | | | | | | | | | | - possibility of re-creation of the blinding parameters after a fixed number of uses (suggested by Bodo) - calculatition of the rsa::e in case it's absent and p and q are present (see bug report #785) - improve the performance when if one rsa structure is shared by more than a thread (see bug report #555) - fix the problem described in bug report #827 - hide the definition ot the BN_BLINDING structure in bn_blind.c
* Fix various incorrect error function codes.Bodo Möller2005-04-261-1/+4
| | | | ("perl util/ck_errf.pl */*.c */*/*.c" still reports many more.)
* Rebuild error codes.Dr. Stephen Henson2005-04-121-52/+55
|
* Improve error handling if decompression of an ec point fails, and cleanupGeoff Thorpe2004-07-061-0/+1
| | | | | | | ec_curve.c (unify comments, etc). Submitted by: Nils Larsch Reviewed by: Bodo Moeller, Geoff Thorpe
* Make sure we get the definition of OPENSSL_NO_ERR.Richard Levitte2003-03-201-0/+1
|
* Binary field arithmetic contributed by Sun Microsystems.Bodo Möller2002-08-021-1/+9
| | | | | | | | The 'OPENSSL_NO_SUN_DIV' default is still subject to change, so I didn't bother to finish the CHANGES entry yet. Submitted by: Douglas Stebila <douglas.stebila@sun.com>, Sheueling Chang <sheueling.chang@sun.com> (CHANGES entry by Bodo Moeller)
* Make all configuration macros available for application by makingRichard Levitte2001-02-191-2/+2
| | | | | | | | | | | | sure they are available in opensslconf.h, by giving them names starting with "OPENSSL_" to avoid conflicts with other packages and by making sure e_os2.h will cover all platform-specific cases together with opensslconf.h. I've checked fairly well that nothing breaks with this (apart from external software that will adapt if they have used something like NO_KRB5), but I can't guarantee it completely, so a review of this change would be a good thing.
* Integrate my implementation of a countermeasure againstBodo Möller2001-02-081-0/+2
| | | | | | | | | | | | | | Bleichenbacher's DSA attack. With this implementation, the expected number of iterations never exceeds 2. New semantics for BN_rand_range(): BN_rand_range(r, min, range) now generates r such that min <= r < min+range. (Previously, BN_rand_range(r, min, max) generated r such that min <= r < max. It is more convenient to have the range; also the previous prototype was misleading because max was larger than the actual maximum.)
* Change error message to "bignum too long"Bodo Möller2000-12-041-1/+1
|
* Don't allow BIGNUMs to become so large that computations with dmaxBodo Möller2000-12-031-0/+1
| | | | might overflow.
* BN_sqrtBodo Möller2000-11-301-0/+4
|
* Expand expspeed.c to make BN_kronecker timings.Bodo Möller2000-11-291-0/+1
| | | | | | This caused a segmentation fault in calls to malloc, so I cleaned up bn_lib.c a little so that it is easier to see what is going on. The bug turned out to be an off-by-one error in BN_bin2bn.
* More BN_mod_... functions.Bodo Möller2000-11-261-0/+2
|
* Slightly faster DSA verification (BN_mod_exp2_mont),Bodo Möller2000-06-081-1/+2
| | | | marginally faster BN_mod_exp for 1024 bit exponents.
* Speed up DH with small generator.Bodo Möller2000-06-071-0/+1
|
* Preserve reason strings in automatically build tables.Bodo Möller2000-03-051-1/+2
|
* Generate just one error code if iterated SSL_CTX_get() fails.Bodo Möller2000-02-051-1/+1
| | | | Avoid enabled 'assert()' in production library.
* New functions BN_CTX_start(), BN_CTX_get(), BN_CTX_end() to accessUlf Möller2000-02-051-0/+2
| | | | | temporary BIGNUMs. BN_CTX still uses a fixed number of BIGNUMs, but the BN_CTX implementation could now easily be changed.
* Complete rewrite of the error code generation script. It now runs as a singleDr. Stephen Henson1999-04-241-54/+56
| | | | | | | script, translates function codes better and doesn't need the K&R function prototypes to work (NB. the K&R prototypes can't be wiped just yet: they are still needed by the DEF generator...). I also ran the script with the -rewrite option to update all the header and source files.
* Change #include filenames from <foo.h> to <openssl.h>.Bodo Möller1999-04-231-2/+2
| | | | | | Submitted by: Reviewed by: PR:
* Change functions to ANSI C.Ulf Möller1999-04-191-1/+1
|
* Fix typos in error codes.Ulf Möller1999-04-191-1/+1
|
* Fixes to BN code. Previously the default was to define BN_RECURSIONMark J. Cox1999-01-281-2/+0
| | | | | | | | | but the BN code had some problems that would cause failures when doing certificate verification and some other functions. Submitted by: Eric A Young from a C2Net version of SSLeay Reviewed by: Mark J Cox PR:
* Various cleanups and fixed by Marc and Ralf to start the OpenTLS projectRalf S. Engelschall1998-12-221-0/+2
|
* Import of old SSLeay release: SSLeay 0.9.1b (unreleased)Ralf S. Engelschall1998-12-211-2/+5
|
* Import of old SSLeay release: SSLeay 0.9.0bRalf S. Engelschall1998-12-211-5/+18
|
* Import of old SSLeay release: SSLeay 0.8.1bRalf S. Engelschall1998-12-211-0/+98