Revision tags: OpenSSL_1_1_0-pre4 |
|
#
0a86f668 |
| 15-Mar-2016 |
Emilia Kasper |
On Windows, page walking is known as __chkstk. Reviewed-by: Andy Polyakov <appro@openssl.org>
|
#
1bf80d93 |
| 15-Mar-2016 |
Emilia Kasper |
Explain *cough*-dows Reviewed-by: Andy Polyakov <appro@openssl.org>
|
#
adc4f1fc |
| 04-Mar-2016 |
Andy Polyakov |
bn/asm/x86[_64]-mont*.pl: complement alloca with page-walking. Some OSes, *cough*-dows, insist on stack being "wired" to physical memory in strictly sequential manner, i.e. if stack
bn/asm/x86[_64]-mont*.pl: complement alloca with page-walking. Some OSes, *cough*-dows, insist on stack being "wired" to physical memory in strictly sequential manner, i.e. if stack allocation spans two pages, then reference to farmost one can be punishable by SEGV. But page walking can do good even on other OSes, because it guarantees that villain thread hits the guard page before it can make damage to innocent one... Reviewed-by: Rich Salz <rsalz@openssl.org>
show more ...
|
Revision tags: OpenSSL_1_0_1s, OpenSSL_1_0_2g, OpenSSL_1_1_0-pre3, OpenSSL-fips-2_0_12, OpenSSL_1_0_1r, OpenSSL_1_0_2f |
|
#
317be638 |
| 26-Jan-2016 |
Andy Polyakov |
bn/asm/x86_64-mont5.pl: unify gather procedure in hardly used path and reorganize/harmonize post-conditions. Additional hardening following on from CVE-2016-0702 Reviewed-by: Ri
bn/asm/x86_64-mont5.pl: unify gather procedure in hardly used path and reorganize/harmonize post-conditions. Additional hardening following on from CVE-2016-0702 Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
show more ...
|
#
8fc8f486 |
| 25-Jan-2016 |
Andy Polyakov |
crypto/bn/x86_64-mont5.pl: constant-time gather procedure. At the same time remove miniscule bias in final subtraction. Performance penalty varies from platform to platform, and even wit
crypto/bn/x86_64-mont5.pl: constant-time gather procedure. At the same time remove miniscule bias in final subtraction. Performance penalty varies from platform to platform, and even with key length. For rsa2048 sign it was observed to be 4% for Sandy Bridge and 7% on Broadwell. CVE-2016-0702 Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
show more ...
|
Revision tags: OpenSSL_1_1_0-pre2, OpenSSL_1_1_0-pre1 |
|
#
b9749432 |
| 07-Dec-2015 |
Andy Polyakov |
x86_64 assembly pack: tune clang version detection even further. RT#4171 Reviewed-by: Kurt Roeckx <kurt@openssl.org>
|
Revision tags: OpenSSL_0_9_8zh, OpenSSL_1_0_0t, OpenSSL_1_0_1q, OpenSSL_1_0_2e |
|
#
29851264 |
| 01-Dec-2015 |
Andy Polyakov |
bn/asm/x86_64-mont5.pl: fix carry propagating bug (CVE-2015-3193). Reviewed-by: Richard Levitte <levitte@openssl.org>
|
#
76eba0d9 |
| 21-Nov-2015 |
Andy Polyakov |
x86_64 assembly pack: tune clang version detection. RT#4142 Reviewed-by: Richard Levitte <levitte@openssl.org>
|
Revision tags: OpenSSL_1_0_1p, OpenSSL_1_0_2d, OpenSSL-fips-2_0_11, OpenSSL_1_0_1o, OpenSSL_1_0_2c, OpenSSL_0_9_8zg, OpenSSL_1_0_0s, OpenSSL_1_0_1n, OpenSSL_1_0_2b |
|
#
69567687 |
| 20-May-2015 |
Andy Polyakov |
bn/asm/x86_64-mont5.pl: fix valgrind error. bn_get_bits5 was overstepping array boundary by 1 byte. It was exclusively read overstep and data could not have been used. The only potential
bn/asm/x86_64-mont5.pl: fix valgrind error. bn_get_bits5 was overstepping array boundary by 1 byte. It was exclusively read overstep and data could not have been used. The only potential problem would be if array happens to end on the very edge of last accesible page. Reviewed-by: Richard Levitte <levitte@openssl.org>
show more ...
|
Revision tags: OpenSSL-fips-2_0_10, OpenSSL_0_9_8zf, OpenSSL_1_0_0r, OpenSSL_1_0_1m, OpenSSL_1_0_2a, OpenSSL_1_0_2, master-post-auto-reformat, OpenSSL_1_0_2-post-auto-reformat, OpenSSL_0_9_8-post-auto-reformat, OpenSSL_0_9_8-pre-auto-reformat, OpenSSL_1_0_0-post-auto-reformat, OpenSSL_1_0_0-pre-auto-reformat, OpenSSL_1_0_1-post-auto-reformat, OpenSSL_1_0_1-pre-auto-reformat, master-post-reformat, OpenSSL_0_9_8-pre-reformat, OpenSSL_0_9_8ze, OpenSSL_1_0_0-pre-reformat, OpenSSL_1_0_0q, OpenSSL_1_0_1-pre-reformat, OpenSSL_1_0_1l, master-pre-reformat, OpenSSL_1_0_2-pre-reformat, OpenSSL_0_9_8zd, OpenSSL_1_0_0p, OpenSSL_1_0_1k, OpenSSL_0_9_8-post-reformat, OpenSSL-fips-2_0_9, OpenSSL_1_0_1j, OpenSSL_1_0_0o, OpenSSL_0_9_8zc, OpenSSL_1_0_2-beta3 |
|
#
569e2d12 |
| 11-Sep-2014 |
Andy Polyakov |
crypto/bn/asm/x86_64-mont*.pl: add missing clang detection. Reviewed-by: Rich Salz <rsalz@openssl.org>
|
Revision tags: OpenSSL_0_9_8zb, OpenSSL_1_0_0n, OpenSSL_1_0_1i, OpenSSL_1_0_2-beta2, OpenSSL-fips-2_0_8 |
|
#
1b0fe79f |
| 09-Jul-2014 |
Andy Polyakov |
x86_64 assembly pack: improve masm support.
|
Revision tags: OpenSSL_1_0_1h, OpenSSL_1_0_0m, OpenSSL_0_9_8za, OpenSSL-fips-2_0_7, OpenSSL_1_0_1g, OpenSSL_1_0_2-beta1 |
|
#
eedab524 |
| 09-Jan-2014 |
Andy Polyakov |
bn/asm/x86_64-mont5.pl: fix compilation error on Solaris.
|
Revision tags: OpenSSL_1_0_0l, OpenSSL_1_0_1f, OpenSSL-fips-2_0_6, OpenSSL-fips-2_0_5, OpenSSL-fips-2_0_4 |
|
#
ec9cc70f |
| 09-Dec-2013 |
Andy Polyakov |
bn/asm/x86_64-mont5.pl: add MULX/AD*X code path. This also eliminates code duplication between x86_64-mont and x86_64-mont and optimizes even original non-MULX code.
|
#
c5d5f5bd |
| 03-Dec-2013 |
Andy Polyakov |
bn/asm/x86_64-mont5.pl: comply with Win64 ABI. PR: 3189 Submitted by: Oscar Ciurana
|
#
30b9c234 |
| 14-Oct-2013 |
Andy Polyakov |
bn/asm/*x86_64*.pl: correct assembler requirement for ad*x.
|
#
a5bb5bca |
| 02-Oct-2013 |
Andy Polyakov |
bn/asm/x86_64-mont*.pl: add MULX/ADCX/ADOX code path.
|
Revision tags: OpenSSL-fips-2_0_3, OpenSSL_1_0_1e, OpenSSL_0_9_8y, OpenSSL_1_0_0k, OpenSSL_1_0_1d |
|
#
4568182a |
| 02-Feb-2013 |
Andy Polyakov |
x86_64 assembly pack: keep making Windows build more robust. PR: 2963 and a number of others
|
Revision tags: OpenSSL-fips-2_0-pl1, OpenSSL-fips-2_0_2, OpenSSL-fips-2_0_1 |
|
#
6251989e |
| 27-Jun-2012 |
Andy Polyakov |
x86_64 assembly pack: make it possible to compile with Perl located on path with spaces. PR: 2835
|
Revision tags: OpenSSL_1_0_1c, OpenSSL_1_0_0j, OpenSSL_0_9_8x, OpenSSL_1_0_1b, OpenSSL_0_9_8w, OpenSSL_1_0_1a, OpenSSL_0_9_8v, OpenSSL_1_0_0i, OpenSSL_1_0_1, OpenSSL_1_0_0h, OpenSSL_0_9_8u, OpenSSL_1_0_1-beta3, OpenSSL_1_0_1-beta2, OpenSSL-fips-2_0, OpenSSL_1_0_0g, OpenSSL_0_9_8t, OpenSSL_0_9_8s, OpenSSL_1_0_0f, OpenSSL-fips-2_0-rc8, OpenSSL_1_0_1-beta1, OpenSSL-fips-2_0-rc7, OpenSSL-fips-2_0-rc6, OpenSSL-fips-2_0-rc5, OpenSSL-fips-2_0-rc4, OpenSSL-fips-2_0-rc3, OpenSSL-fips-2_0-rc2, OpenSSL-fips-2_0-rc1 |
|
#
8329e2e7 |
| 17-Oct-2011 |
Andy Polyakov |
bn_exp.c: further optimizations using more ideas from http://eprint.iacr.org/2011/239.
|
#
cdfe0fdd |
| 13-Oct-2011 |
Bodo Möller |
Fix OPENSSL_BN_ASM_MONT5 for corner cases; add a test. Submitted by: Emilia Kasper
|
Revision tags: OpenSSL-fips-1_2_3, OpenSSL-fips-1_2_2, OpenSSL-fips-1_2_1, OpenSSL_1_0_0e |
|
#
e7d1363d |
| 14-Aug-2011 |
Andy Polyakov |
x86_64-mont5.pl: add missing Win64 support.
|
#
361512da |
| 12-Aug-2011 |
Andy Polyakov |
This commit completes recent modular exponentiation optimizations on x86_64 platform. It targets specifically RSA1024 sign (using ideas from http://eprint.iacr.org/2011/239) and adds more tha
This commit completes recent modular exponentiation optimizations on x86_64 platform. It targets specifically RSA1024 sign (using ideas from http://eprint.iacr.org/2011/239) and adds more than 10% on most platforms. Overall performance improvement relative to 1.0.0 is ~40% in average, with best result of 54% on Westmere. Incidentally ~40% is average improvement even for longer key lengths.
show more ...
|