summaryrefslogtreecommitdiffstats
path: root/crypto/bn/bn_mont.c
Commit message (Expand)AuthorAgeFilesLines
* Run util/openssl-format-source -v -c .Matt Caswell2015-01-221-567/+630
* bignum: allow concurrent BN_MONT_CTX_set_locked()Geoff Thorpe2014-05-061-20/+26
* Avoid BN_MONT_CTX incompatibility.Bodo Möller2008-05-021-9/+35
* Unobtrusive backport of 32-bit x86 Montgomery improvements from 0.9.9-dev:Bodo Möller2008-05-011-0/+198
* fix BIGNUM flag handlingBodo Möller2008-02-271-0/+2
* Add framework for bn_mul_mont [from 098-fips].Andy Polyakov2007-11-111-0/+15
* Make sure that BN_from_montgomery keeps the BIGNUMS in proper formatBodo Möller2007-09-181-0/+2
* bn_mont.c fix [from HEAD].Andy Polyakov2007-06-291-25/+19
* Eliminate conditional final subtraction in Montgomery multiplicationAndy Polyakov2007-06-111-13/+71
* Another thread-safety fixBodo Möller2006-06-161-6/+8
* Thread-safety fixesBodo Möller2006-06-141-10/+75
* Fix possible race condition.Dr. Stephen Henson2005-11-111-6/+6
* set correct bn->top valueNils Larsch2005-07-211-1/+1
* Port BN_MONT_CTX_set_locked() from stable branch.Dr. Stephen Henson2005-04-261-0/+18
* Add lots of checks for memory allocation failure, error codes to indicateDr. Stephen Henson2004-12-051-1/+1
* Adjust various bignum functions to use BN_CTX for variables instead ofGeoff Thorpe2004-03-251-17/+18
* Convert openssl code not to assume the deprecated form of BN_zero().Geoff Thorpe2004-03-131-3/+3
* Put the first stage of my bignum debugging adventures into CVS. This codeGeoff Thorpe2003-11-041-1/+3
* Check the return values where memory allocation failures may happen.Richard Levitte2002-05-301-3/+3
* Implement EC_GFp_mont_method.Bodo Möller2001-03-081-3/+3
* Fix some things that look like bugs.Bodo Möller2000-12-071-19/+25
* More constification of the BN library.Richard Levitte2000-11-161-2/+2
* Make Rijndael work! Those long flights have some good points.Ben Laurie2000-11-121-1/+1
* tmp2 is not used in BN_mod_mul_montgomery.Bodo Möller2000-11-091-4/+1
* Constify the BIGNUM routines a bit more. The only trouble were theRichard Levitte2000-11-061-1/+1
* Totally remove the supposedly 'faster' variant inBodo Möller2000-09-191-29/+0
* Document BN_mod_mul_montgomery bug;Bodo Möller2000-09-191-2/+3
* Disable buggy code variant in BN_mod_mul_montgomery that was enabledBodo Möller2000-09-191-1/+20
* Bug fix: Montgomery multiplication could produce results with the wrongUlf Möller2000-09-141-0/+1
* Changes needed for Tandem NSK, supplied by Scott Uroff (scott@xypro.com).Dr. Stephen Henson2000-08-041-1/+16
* Don't let top go below zero!Ben Laurie2000-07-011-1/+1
* use faster versionUlf Möller2000-06-211-1/+1
* There have been a number of complaints from a number of sources that namesRichard Levitte2000-06-011-2/+2
* Bug fix.Ulf Möller2000-03-011-3/+4
* Use MONT_WORD macro to control if the word-based or the bignumUlf Möller2000-02-051-114/+95
* New functions BN_CTX_start(), BN_CTX_get(), BN_CTX_end() to accessUlf Möller2000-02-051-9/+14
* comment was wrong.Ulf Möller2000-01-271-1/+1
* typo in a commentBodo Möller2000-01-271-1/+1
* Update comments to provide a better approximation of reality.Bodo Möller2000-01-271-1/+2
* Add a pointer to a paper (is the algorithm in section 4.2 theBodo Möller2000-01-271-3/+4
* Update references.Bodo Möller2000-01-271-2/+2
* Run ispell.Ulf Möller2000-01-271-95/+38
* Some constification and stacks that slipped through the cracks (how?).Ben Laurie1999-06-041-3/+3
* Change functions to ANSI C.Ulf Möller1999-04-191-20/+9
* BN_RECURSION causes the stuff in bn_mont.c to fall over for large keys. ForDr. Stephen Henson1999-02-261-4/+4
* Remember good pointers to Montgomery multiplication algorithmRalf S. Engelschall1999-02-251-0/+6
* Accept NULL in *_free.Ben Laurie1999-01-071-0/+3
* Various cleanups and fixed by Marc and Ralf to start the OpenTLS projectRalf S. Engelschall1998-12-221-1/+1
* Import of old SSLeay release: SSLeay 0.9.1b (unreleased)Ralf S. Engelschall1998-12-211-154/+257
* Import of old SSLeay release: SSLeay 0.9.0bRalf S. Engelschall1998-12-211-21/+47