openssl/crypto/ec
Shane Lontis 10c25644e3 EC only uses approved curves in FIPS mode.
Once there are buildable fips tests, some tests that are data driven
from files will need to be modified to exclude non approved curves in
fips mode.

These changes were tested by temporarily adding #define FIPS_MODE 1 to
all the modified source files.

Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com>
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/9081)
2019-06-25 12:00:25 +10:00
..
asm Fix calling convention bug in ecp_nistz256_ord_sqr_mont 2019-04-14 12:55:53 +02:00
curve448 Fixed linux_x86_icc compiler errors in EC code related to __uint128_t/__int128_t 2019-04-11 08:40:40 +10:00
build.info Move ec_asm_src file information to build.info files 2019-06-17 16:08:52 +02:00
curve25519.c Fixed linux_x86_icc compiler errors in EC code related to __uint128_t/__int128_t 2019-04-11 08:40:40 +10:00
ec2_oct.c fixed public range check in ec_GF2m_simple_oct2point 2019-03-30 14:49:00 +01:00
ec2_smpl.c Added NULL check to BN_clear() & BN_CTX_end() 2019-03-19 07:25:48 +01:00
ec_ameth.c Fix the default digest algorthm of SM2 2019-02-27 10:05:17 +08:00
ec_asn1.c constify *_dup() and *i2d_*() and related functions as far as possible, introducing DECLARE_ASN1_DUP_FUNCTION 2019-03-06 16:10:09 +00:00
ec_check.c EC only uses approved curves in FIPS mode. 2019-06-25 12:00:25 +10:00
ec_curve.c EC only uses approved curves in FIPS mode. 2019-06-25 12:00:25 +10:00
ec_cvt.c Following the license change, modify the boilerplates in crypto/ec/ 2018-12-06 14:51:47 +01:00
ec_err.c SCA hardening for mod. field inversion in EC_GROUP 2019-02-17 21:02:36 +02:00
ec_key.c ec key validation checks updated 2019-04-11 20:37:13 +10:00
ec_kmeth.c Following the license change, modify the boilerplates in crypto/ec/ 2018-12-06 14:51:47 +01:00
ec_lcl.h added code to validate EC named curve parameters 2019-04-11 12:05:38 +03:00
ec_lib.c Separate the lookup test 2019-04-11 12:05:38 +03:00
ec_mult.c Don't use coordinate blinding when scalar is group order 2019-04-14 11:24:08 +02:00
ec_oct.c Following the license change, modify the boilerplates in crypto/ec/ 2018-12-06 14:51:47 +01:00
ec_pmeth.c EVP_Digest*: enable SHA3 pre-hashing for ECDSA 2019-05-22 16:49:45 +02:00
ec_print.c Following the license change, modify the boilerplates in crypto/ec/ 2018-12-06 14:51:47 +01:00
ecdh_kdf.c Added X963KDF API 2019-05-16 11:43:41 +10:00
ecdh_ossl.c Added NULL check to BN_clear() & BN_CTX_end() 2019-03-19 07:25:48 +01:00
ecdsa_ossl.c EC keygen updates + changed ecdsa_sign to use BN_secure_new 2019-04-09 03:44:13 +03:00
ecdsa_sign.c Following the license change, modify the boilerplates in crypto/ec/ 2018-12-06 14:51:47 +01:00
ecdsa_vrf.c Following the license change, modify the boilerplates in crypto/ec/ 2018-12-06 14:51:47 +01:00
eck_prn.c Following the license change, modify the boilerplates in crypto/ec/ 2018-12-06 14:51:47 +01:00
ecp_mont.c SCA hardening for mod. field inversion in EC_GROUP 2019-02-17 21:02:36 +02:00
ecp_nist.c SCA hardening for mod. field inversion in EC_GROUP 2019-02-17 21:02:36 +02:00
ecp_nistp224.c Make the array zeroing explicit using memset. 2019-03-29 20:52:00 +10:00
ecp_nistp256.c SCA hardening for mod. field inversion in EC_GROUP 2019-02-17 21:02:36 +02:00
ecp_nistp521.c Avoid an underflow in ecp_nistp521.c 2019-03-07 14:42:33 +00:00
ecp_nistputil.c Fix various mistakes in ec_GFp_nistp_recode_scalar_bits comment. 2019-05-31 18:14:50 -04:00
ecp_nistz256_table.c Following the license change, modify the boilerplates in crypto/ec/ 2018-12-06 14:51:47 +01:00
ecp_nistz256.c Fix calling convention bug in ecp_nistz256_ord_sqr_mont 2019-04-14 12:55:53 +02:00
ecp_oct.c Following the license change, modify the boilerplates in crypto/ec/ 2018-12-06 14:51:47 +01:00
ecp_smpl.c Added NULL check to BN_clear() & BN_CTX_end() 2019-03-19 07:25:48 +01:00
ecx_meth.c Rearrange the inclusion of curve448/curve448_lcl.h 2019-02-25 19:38:06 +01:00