#
b1a07c38 |
| 01-May-2016 |
Andy Polyakov |
Remove obsolete defined(__INTEL__) condition. This macro was defined by no-longer-supported __MWERKS__ compiler. Reviewed-by: Richard Levitte <levitte@openssl.org>
|
#
5158c763 |
| 13-Apr-2016 |
Matt Caswell |
Remove OPENSSL_NO_AES guards no-aes is no longer a Configure option and therefore the OPENSSL_NO_AES guards can be removed. Reviewed-by: Richard Levitte <levitte@openssl.org>
|
Revision tags: OpenSSL_1_1_0-pre4 |
|
#
44ab2dfd |
| 07-Mar-2016 |
Matt Caswell |
Rename EVP_CIPHER_CTX_cipher_data to EVP_CIPHER_CTX_get_cipher_data We had the function EVP_CIPHER_CTX_cipher_data which is newly added for 1.1.0. As we now also need an EVP_CIPHER_CTX_s
Rename EVP_CIPHER_CTX_cipher_data to EVP_CIPHER_CTX_get_cipher_data We had the function EVP_CIPHER_CTX_cipher_data which is newly added for 1.1.0. As we now also need an EVP_CIPHER_CTX_set_cipher_data it makes more sense for the former to be called EVP_CIPHER_CTX_get_cipher_data. Reviewed-by: Tim Hudson <tjh@openssl.org>
show more ...
|
Revision tags: OpenSSL_1_0_1s, OpenSSL_1_0_2g, OpenSSL_1_1_0-pre3, OpenSSL-fips-2_0_12, OpenSSL_1_0_1r, OpenSSL_1_0_2f, OpenSSL_1_1_0-pre2 |
|
#
6435f0f6 |
| 18-Dec-2015 |
Richard Levitte |
Adapt builtin cipher implementations to opaque EVP_CIPHER They all stop including evp_locl.h, so we also take care of their adaptation to opaque EVP_CIPHER_CTX, as was promised in an ear
Adapt builtin cipher implementations to opaque EVP_CIPHER They all stop including evp_locl.h, so we also take care of their adaptation to opaque EVP_CIPHER_CTX, as was promised in an earlier commit. Reviewed-by: Rich Salz <rsalz@openssl.org>
show more ...
|
#
936166af |
| 13-Dec-2015 |
Richard Levitte |
Adapt cipher implementations to opaque EVP_CIPHER_CTX Note: there's a larger number of implementations in crypto/evp/ that aren't affected because they include evp_locl.h. They will be
Adapt cipher implementations to opaque EVP_CIPHER_CTX Note: there's a larger number of implementations in crypto/evp/ that aren't affected because they include evp_locl.h. They will be handled in a separate commit. Reviewed-by: Rich Salz <rsalz@openssl.org>
show more ...
|
Revision tags: OpenSSL_1_1_0-pre1, OpenSSL_0_9_8zh, OpenSSL_1_0_0t, OpenSSL_1_0_1q, OpenSSL_1_0_2e, OpenSSL_1_0_1p, OpenSSL_1_0_2d, OpenSSL-fips-2_0_11, OpenSSL_1_0_1o, OpenSSL_1_0_2c, OpenSSL_0_9_8zg, OpenSSL_1_0_0s, OpenSSL_1_0_1n, OpenSSL_1_0_2b |
|
#
f0fa5c83 |
| 11-Jun-2015 |
Andy Polyakov |
e_aes_cbc_hmac_sha*.c: address linker warning about OPENSSL_ia32cap_P size mismatch. Reviewed-by: Tim Hudson <tjh@openssl.org>
|
Revision tags: OpenSSL-fips-2_0_10 |
|
#
c8269881 |
| 27-Apr-2015 |
Matt Caswell |
Sanity check EVP_CTRL_AEAD_TLS_AAD The various implementations of EVP_CTRL_AEAD_TLS_AAD expect a buffer of at least 13 bytes long. Add sanity checks to ensure that the length is at l
Sanity check EVP_CTRL_AEAD_TLS_AAD The various implementations of EVP_CTRL_AEAD_TLS_AAD expect a buffer of at least 13 bytes long. Add sanity checks to ensure that the length is at least that. Also add a new constant (EVP_AEAD_TLS1_AAD_LEN) to evp.h to represent this length. Thanks to Kevin Wojtysiak (Int3 Solutions) and Paramjot Oberoi (Int3 Solutions) for reporting this issue. Reviewed-by: Andy Polyakov <appro@openssl.org>
show more ...
|
Revision tags: OpenSSL_0_9_8zf, OpenSSL_1_0_0r, OpenSSL_1_0_1m, OpenSSL_1_0_2a |
|
#
474e469b |
| 27-Jan-2015 |
Rich Salz |
OPENSSL_NO_xxx cleanup: SHA Remove support for SHA0 and DSS0 (they were broken), and remove the ability to attempt to build without SHA (it didn't work). For simplicity, remove the o
OPENSSL_NO_xxx cleanup: SHA Remove support for SHA0 and DSS0 (they were broken), and remove the ability to attempt to build without SHA (it didn't work). For simplicity, remove the option of not building various SHA algorithms; you could argue that SHA_224/256/384/512 should be kept, since they're like crypto algorithms, but I decided to go the other way. So these options are gone: GENUINE_DSA OPENSSL_NO_SHA0 OPENSSL_NO_SHA OPENSSL_NO_SHA1 OPENSSL_NO_SHA224 OPENSSL_NO_SHA256 OPENSSL_NO_SHA384 OPENSSL_NO_SHA512 Reviewed-by: Richard Levitte <levitte@openssl.org>
show more ...
|
Revision tags: OpenSSL_1_0_2, master-post-auto-reformat |
|
#
0f113f3e |
| 22-Jan-2015 |
Matt Caswell |
Run util/openssl-format-source -v -c . Reviewed-by: Tim Hudson <tjh@openssl.org>
|
Revision tags: OpenSSL_1_0_2-post-auto-reformat, OpenSSL_0_9_8-post-auto-reformat, OpenSSL_0_9_8-pre-auto-reformat, OpenSSL_1_0_0-post-auto-reformat, OpenSSL_1_0_0-pre-auto-reformat, OpenSSL_1_0_1-post-auto-reformat, OpenSSL_1_0_1-pre-auto-reformat |
|
#
68d39f3c |
| 21-Jan-2015 |
Matt Caswell |
Move more comments that confuse indent Reviewed-by: Tim Hudson <tjh@openssl.org>
|
Revision tags: master-post-reformat, OpenSSL_0_9_8-pre-reformat, OpenSSL_0_9_8ze, OpenSSL_1_0_0-pre-reformat, OpenSSL_1_0_0q, OpenSSL_1_0_1-pre-reformat, OpenSSL_1_0_1l, master-pre-reformat, OpenSSL_1_0_2-pre-reformat, OpenSSL_0_9_8zd, OpenSSL_1_0_0p, OpenSSL_1_0_1k, OpenSSL_0_9_8-post-reformat, OpenSSL-fips-2_0_9, OpenSSL_1_0_1j, OpenSSL_1_0_0o, OpenSSL_0_9_8zc, OpenSSL_1_0_2-beta3 |
|
#
2893a302 |
| 20-Aug-2014 |
Andy Polyakov |
crypto/evp/e_aes_cbc_hmac_sha[1|256].c: fix compiler warnings. Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
|
Revision tags: OpenSSL_0_9_8zb, OpenSSL_1_0_0n, OpenSSL_1_0_1i, OpenSSL_1_0_2-beta2, OpenSSL-fips-2_0_8 |
|
#
1f61d8b5 |
| 15-Jun-2014 |
Felix Laurie von Massenbach |
Fix shadow declaration.
|
#
ce00c64d |
| 14-Jun-2014 |
Andy Polyakov |
evp/e_aes_cbc_sha[1|256].c: fix -DPEDANTIC build.
|
Revision tags: OpenSSL_1_0_1h, OpenSSL_1_0_0m, OpenSSL_0_9_8za, OpenSSL-fips-2_0_7, OpenSSL_1_0_1g, OpenSSL_1_0_2-beta1 |
|
#
70113432 |
| 14-Feb-2014 |
Andy Polyakov |
ssl/s3_pkt.c: detect RAND_bytes error in multi-block.
|
#
9587429f |
| 13-Feb-2014 |
Andy Polyakov |
evp/e_aes_cbc_hmac_sha*.c: improve cache locality.
|
#
5a42c8f0 |
| 05-Feb-2014 |
Andy Polyakov |
e_aes_cbc_hmac_sha[1|256].c: fix compiler warning.
|
#
0d5096fb |
| 05-Feb-2014 |
Andy Polyakov |
evp/e_aes_cbc_hmac_sha*.c: additional CTRL to query buffer requirements.
|
Revision tags: OpenSSL_1_0_0l, OpenSSL_1_0_1f |
|
#
2f3af3dc |
| 03-Jan-2014 |
Andy Polyakov |
aesni-sha1-x86_64.pl: add stiched decrypt procedure, but keep it disabled, too little gain... Add some Atom-specific optimization.
|
Revision tags: OpenSSL-fips-2_0_6, OpenSSL-fips-2_0_5, OpenSSL-fips-2_0_4 |
|
#
b4f0abd2 |
| 12-Oct-2013 |
Andy Polyakov |
evp/e_aes_cbc_hmac_sha*.c: limit multi-block fragmentation to 1KB. Excessive fragmentation put additional burden (of addtional MAC calculations) on the other size and limiting fragments
evp/e_aes_cbc_hmac_sha*.c: limit multi-block fragmentation to 1KB. Excessive fragmentation put additional burden (of addtional MAC calculations) on the other size and limiting fragments it to 1KB limits the overhead to ~6%.
show more ...
|
#
a69c0a1b |
| 08-Oct-2013 |
Andy Polyakov |
evp/e_aes_cbc_hmac_sha*.c: harmonize names, fix bugs.
|
#
7f893258 |
| 02-Oct-2013 |
Andy Polyakov |
evp/e_aes_cbc_hmac_sha*.c: multi-block glue code.
|
Revision tags: OpenSSL-fips-2_0_3 |
|
#
5c600465 |
| 18-Mar-2013 |
Andy Polyakov |
e_aes_cbc_hmac_sha1.c: fix rare bad record mac on AES-NI plaforms. PR: 3002
|
Revision tags: OpenSSL_1_0_1e |
|
#
2141e6f3 |
| 08-Feb-2013 |
Andy Polyakov |
e_aes_cbc_hmac_sha1.c: align calculated MAC at cache line. It also ensures that valgring is happy.
|
Revision tags: OpenSSL_0_9_8y, OpenSSL_1_0_0k, OpenSSL_1_0_1d |
|
#
1041ab69 |
| 03-Feb-2013 |
Andy Polyakov |
e_aes_cbc_hmac_sha1.c: cleanse temporary copy of HMAC secret. (cherry picked from commit 529d27ea472fc2c7ba9190a15a58cb84012d4ec6)
|
#
9970308c |
| 02-Feb-2013 |
Andy Polyakov |
e_aes_cbc_hmac_sha1.c: address the CBC decrypt timing issues. Address CBC decrypt timing issues and reenable the AESNI+SHA1 stitch. (cherry picked from commit 125093b59f3c2a2d33785b5563d
e_aes_cbc_hmac_sha1.c: address the CBC decrypt timing issues. Address CBC decrypt timing issues and reenable the AESNI+SHA1 stitch. (cherry picked from commit 125093b59f3c2a2d33785b5563d929d0472f1721)
show more ...
|