summaryrefslogtreecommitdiff
path: root/ecp.h
Commit message (Collapse)AuthorAgeFilesLines
* Fix typosJeffrey Walton2021-02-031-1/+1
|
* Use \return and \throw consitently in the docsJeffrey Walton2020-12-071-2/+2
|
* Restore ECP ABI (GH #869)Jeffrey Walton2019-08-091-36/+0
| | | | Placing AdditionFunction as an inner class of ECP broke the ABI. We need to maintain the ABI so distros can patch Crypto++ 8.2.
* Fix ECP leakage in Add() and Double() (GH #869, PR #871)Jeffrey Walton2019-08-051-0/+36
| | | | | | | This check-in provides the fix for leaks in ECP's Add() and Double(). The fixes were taken from Joost Renes, Craig Costello, and Lejla Batina's [Complete addition formulas for prime order elliptic curves](https://eprint.iacr.org/2015/1060.pdf). The Pull Request includes two additional changes that were related to testing the primary fix. First, an `AuthenticatedKeyAgreementWithRolesValidate` interface was added. It allows us to test key agreement when roles are involved. Roles are "client", "server", "initiator", "recipient", etc. Second, `SetGlobalSeed` was added to `test.cpp` to help with reproducible results. We had code in two different places that set the seed value for the random number generator. But it was sloppy and doing a poor job since results could not be reproduced under some circumstances.
* Clear lgtm finding in ECP classJeffrey Walton2019-06-051-5/+17
|
* Update documentationJeffrey Walton2018-01-231-1/+7
|
* Remove unneeded Doxygen directiveJeffrey Walton2018-01-191-3/+0
|
* Change Doxygen comment style from //! to ///Jeffrey Walton2017-11-291-26/+26
| | | | Also see https://groups.google.com/forum/#!topic/cryptopp-users/A7-Xt5Knlzw
* Revert "Revert "Clear Visual Studio warnings (Issue 412)""Jeffrey Walton2017-06-021-0/+9
| | | | This reverts commit c3871aec948013c1a4d5613050c659520f59e2e4.
* Revert "Clear Visual Studio warnings (Issue 412)"Jeffrey Walton2017-06-021-9/+0
| | | | This reverts commit eb3b27a6a543. The change broke GCC 4.8 and unknown version of Clang on OS X. UB reported the OS X break, and JW found duplicated the break on a ARM CubieTruck with GCC 4.8.
* Clear Visual Studio warnings (Issue 412)Jeffrey Walton2017-05-301-0/+9
|
* Change file preamble to include "originally written by Wei Dai"Jeffrey Walton2017-01-271-1/+1
| | | | We have made a fair number of changes, and we don't want WD to receive credit for issues he was not part of
* Removed MAINTAIN_BACKWARDS_COMPATIBILITY_562 (Issue 70)Jeffrey Walton2016-12-031-4/+0
|
* Add ecpoint.h header file. Add EncodedPoint interface. Add documntationJeffrey Walton2016-11-041-29/+2
|
* Updated documentationJeffrey Walton2016-10-181-7/+35
|
* Updated CRYPTOPP_ASSERT based on commentsJeffrey Walton2016-10-171-14/+14
| | | | Also see https://github.com/weidai11/cryptopp/commit/399a1546de71f41598c15edada28e7f0d616f541#commitcomment-19448453
* Whitespace checkinJeffrey Walton2016-09-101-3/+3
|
* Added "algebra.h" include for "make deps" recipeJeffrey Walton2015-12-041-0/+1
|
* Crypto++ 5.6.3 check-inCRYPTOPP_5_6_3Jeffrey Walton2015-11-221-2/+1
|
* Revert botched "Crypto++ 5.6.3 check-in". Corruption due to VMware adding ↵Jeffrey Walton2015-11-221-4/+2
| | | | | | garbage to the end of some source files during drag and drop from guest to host. This reverts commit c45435812225aa68d122c7de246e5f60b509766c.
* Crypto++ 5.6.3 check-inJeffrey Walton2015-11-201-2/+4
|
* Cleared issues 11,12,13 (Clang integrated assembler), 58 (RC rollup), 66 ↵Jeffrey Walton2015-11-181-0/+6
| | | | (Coverity rollup)
* CRYPTOPP 5.6.3 RC6 checkinJeffrey Walton2015-11-051-130/+140
|
* Included "integer.h" in source files with Integer dependencies so make would ↵Jeffrey Walton2015-07-301-0/+2
| | | | rebuild stale object files
* Cleared virtual destructor warning by explicitly adding themJeffrey Walton2015-07-171-0/+2
|
* port to MSVC .NET 2005 beta 2weidai2005-07-121-2/+2
|
* fix documentation, fix PanamaMAC, fix algorithm namesweidai2004-07-221-1/+1
|
* create DLL version, fix GetNextIV() bug in CTR and OFB modesweidai2003-07-041-3/+15
|
* Initial revisionweidai2002-10-041-0/+114