87bed01b | 27-Oct-2023 |
Kurt Roeckx |
Update to latest fuzz corpora Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22531) |
ada33e98 | 25-Oct-2023 |
Matt Caswell |
Add a separate README for the guide demos Point users at the actual guide, and also explain about LD_LIBRARY_PATH Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tom
Add a separate README for the guide demos Point users at the actual guide, and also explain about LD_LIBRARY_PATH Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22505)
show more ...
|
f666599f | 25-Oct-2023 |
Matt Caswell |
Add a reference for HTTP/3 We also add reference for ALPN ids Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https:/
Add a reference for HTTP/3 We also add reference for ALPN ids Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22505)
show more ...
|
899c910e | 25-Oct-2023 |
Matt Caswell |
Add a reference to the demos subfolder Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull
Add a reference to the demos subfolder Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22505)
show more ...
|
aefb5294 | 25-Oct-2023 |
Matt Caswell |
Update to the demos README file Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22505) |
355fd1f4 | 25-Oct-2023 |
Matt Caswell |
Update README-QUIC.md We move some of the "why QUIC" content into the guide and just provide a summary in README-QUIC.md. We also clarify how to use s_client with QUIC.
Update README-QUIC.md We move some of the "why QUIC" content into the guide and just provide a summary in README-QUIC.md. We also clarify how to use s_client with QUIC. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22505)
show more ...
|
0181a1a4 | 25-Oct-2023 |
Matt Caswell |
Refresh the README.md file Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22505) |
186b3f6a | 26-Oct-2023 |
Richard Levitte |
Prepare for 3.3 Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Matt Caswell <m
Prepare for 3.3 Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22525)
show more ...
|
09298141 | 21-Oct-2023 |
Dr. David von Oheimb |
EVP_PKEY_get_size.pod and provider-keymgmt.pod: document their relation Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landa
EVP_PKEY_get_size.pod and provider-keymgmt.pod: document their relation Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22459)
show more ...
|
ae643b32 | 20-Oct-2023 |
Dr. David von Oheimb |
EVP_PKEY_get_{bits,security_bits,size}(): add missing error queue entry on failure Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by:
EVP_PKEY_get_{bits,security_bits,size}(): add missing error queue entry on failure Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22459)
show more ...
|
d7ad09da | 20-Oct-2023 |
Dr. David von Oheimb |
CMS and PKCS7: fix handlling of EVP_PKEY_get_size() failure Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@o
CMS and PKCS7: fix handlling of EVP_PKEY_get_size() failure Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22459)
show more ...
|
f03ce9e0 | 25-Sep-2023 |
Phoebe Chen |
Provide additional AES-ECB test patterns to enhance test coverage. To enhance test coverage for AES-ECB mode, we provided longer additional testing patterns for AES-128/192/256-ECB.
Provide additional AES-ECB test patterns to enhance test coverage. To enhance test coverage for AES-ECB mode, we provided longer additional testing patterns for AES-128/192/256-ECB. Signed-off-by: Phoebe Chen <phoebe.chen@sifive.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21923)
show more ...
|
751a2219 | 25-Sep-2023 |
Phoebe Chen |
riscv: Provide vector crypto implementation of AES-ECB mode. This patch provides stream and multi-block implementations for AES-128-ECB, AES-192-ECB, and AES-256-ECB to accelerate AES-EC
riscv: Provide vector crypto implementation of AES-ECB mode. This patch provides stream and multi-block implementations for AES-128-ECB, AES-192-ECB, and AES-256-ECB to accelerate AES-ECB. Also, refactor functions to share the same variable declaration in aes-riscv64-zvkned.pl. Signed-off-by: Phoebe Chen <phoebe.chen@sifive.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21923)
show more ...
|
1c25bc2e | 11-Sep-2023 |
Jerry Shih |
riscv: Support sm3 on platforms with vlen >= 128. This patch updates the OSSSL_HWSM3_block_data_order_zvksh and enables SM3 on platforms with VLEN >= 128. Signed-off-by: Jerry S
riscv: Support sm3 on platforms with vlen >= 128. This patch updates the OSSSL_HWSM3_block_data_order_zvksh and enables SM3 on platforms with VLEN >= 128. Signed-off-by: Jerry Shih <jerry.shih@sifive.com> Signed-off-by: Phoebe Chen <phoebe.chen@sifive.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21923)
show more ...
|
fbe63483 | 14-Sep-2023 |
Phoebe Chen |
Provide additional AES-XTS test patterns to enhance test coverage. To enhance test coverage for AES-XTS mode, we provided longer additional testing patterns from BoringSSL for AES-XTS te
Provide additional AES-XTS test patterns to enhance test coverage. To enhance test coverage for AES-XTS mode, we provided longer additional testing patterns from BoringSSL for AES-XTS testing. Signed-off-by: Jerry Shih <jerry.shih@sifive.com> Signed-off-by: Phoebe Chen <phoebe.chen@sifive.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21923)
show more ...
|
3e56c0ef | 25-Sep-2023 |
Jerry Shih |
riscv: Provide vector crypto implementation of AES-128/256-XTS mode. To accelerate the performance of the AES-XTS mode, in this patch, we have the specialized multi-block implementation
riscv: Provide vector crypto implementation of AES-128/256-XTS mode. To accelerate the performance of the AES-XTS mode, in this patch, we have the specialized multi-block implementation for AES-128-XTS and AES-256-XTS. Signed-off-by: Jerry Shih <jerry.shih@sifive.com> Signed-off-by: Phoebe Chen <phoebe.chen@sifive.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21923)
show more ...
|
a5871e95 | 25-Sep-2023 |
Jerry Shih |
Fix the aes-xts key-length checking condition and hw declaration. The argument `key-length` includes 2 sets of keys. All declarations should under `PROV_CIPHER_HW_declare_xts()` mac
Fix the aes-xts key-length checking condition and hw declaration. The argument `key-length` includes 2 sets of keys. All declarations should under `PROV_CIPHER_HW_declare_xts()` macro. Signed-off-by: Jerry Shih <jerry.shih@sifive.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21923)
show more ...
|
ebecf322 | 14-Sep-2023 |
Phoebe Chen |
Provide additional AES-GCM test patterns to enhance test coverage. To enhance test coverage for AES-GCM mode, we provided longer additional testing patterns for AES-GCM testing.
Provide additional AES-GCM test patterns to enhance test coverage. To enhance test coverage for AES-GCM mode, we provided longer additional testing patterns for AES-GCM testing. Signed-off-by: Phoebe Chen <phoebe.chen@sifive.com> Signed-off-by: Jerry Shih <jerry.shih@sifive.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21923)
show more ...
|
d056e90e | 25-Sep-2023 |
Jerry Shih |
riscv: Provide vector crypto implementation of AES-GCM mode. To accelerate the performance of the AES-GCM mode, in this patch, we have the specialized multi-block implementations for AES
riscv: Provide vector crypto implementation of AES-GCM mode. To accelerate the performance of the AES-GCM mode, in this patch, we have the specialized multi-block implementations for AES-128-GCM, AES-192-GCM and AES-256-GCM. Signed-off-by: Phoebe Chen <phoebe.chen@sifive.com> Signed-off-by: Jerry Shih <jerry.shih@sifive.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21923)
show more ...
|
7468a3db | 25-Sep-2023 |
Jerry Shih |
Minor changes of the GCM-related code. Unify the return value for `CRYPTO_gcm128_decrypt` as `CRYPTO_gcm128_encrypt`. Signed-off-by: Jerry Shih <jerry.shih@sifive.com> Signed-of
Minor changes of the GCM-related code. Unify the return value for `CRYPTO_gcm128_decrypt` as `CRYPTO_gcm128_encrypt`. Signed-off-by: Jerry Shih <jerry.shih@sifive.com> Signed-off-by: Phoebe Chen <phoebe.chen@sifive.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21923)
show more ...
|
18ed3a58 | 12-Sep-2023 |
Phoebe Chen |
riscv: Provide vector crypto implementation of AES-CTR mode. Support zvbb-zvkned based rvv AES-128/192/256-CTR encryption. Signed-off-by: Phoebe Chen <phoebe.chen@sifive.com>
riscv: Provide vector crypto implementation of AES-CTR mode. Support zvbb-zvkned based rvv AES-128/192/256-CTR encryption. Signed-off-by: Phoebe Chen <phoebe.chen@sifive.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21923)
show more ...
|
837f7df8 | 07-Sep-2023 |
Phoebe Chen |
riscv: Support SHA-512 family on platforms with vlen >= 128. This patch supports SHA-512, SHA-512/224, SHA-512/256 on platforms with vlen greater than 128, Signed-off-by: Phoebe
riscv: Support SHA-512 family on platforms with vlen >= 128. This patch supports SHA-512, SHA-512/224, SHA-512/256 on platforms with vlen greater than 128, Signed-off-by: Phoebe Chen <phoebe.chen@sifive.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21923)
show more ...
|
a1668660 | 07-Sep-2023 |
Phoebe Chen |
riscv: Code optimization for SHA-256. Keep SHA-256 constant values in registers to save the loading time. Move the constant loading for sha256 into a separate subroutine. By cre
riscv: Code optimization for SHA-256. Keep SHA-256 constant values in registers to save the loading time. Move the constant loading for sha256 into a separate subroutine. By creating a dedicated sub routine for loading sha256 constants, the code can be made more modular and easier to modify in the future. Relaxing the SHA256 constraint, zvknhb also supports SHA256. Simplify the H and mask initialization flows. Signed-off-by: Phoebe Chen <phoebe.chen@sifive.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21923)
show more ...
|
fcf68127 | 11-Jul-2023 |
Jerry Shih |
riscv: Provide a vector implementation of CHACHA20 cipher. Use rvv and zvbb extensions for CHACHA20 cipher. Signed-off-by: Jerry Shih <jerry.shih@sifive.com> Signed-off-by: Phoe
riscv: Provide a vector implementation of CHACHA20 cipher. Use rvv and zvbb extensions for CHACHA20 cipher. Signed-off-by: Jerry Shih <jerry.shih@sifive.com> Signed-off-by: Phoebe Chen <phoebe.chen@sifive.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21923)
show more ...
|
7914a0de | 02-Jun-2023 |
Phoebe Chen |
Provide additional AES-CBC test patterns to enhance test coverage. To enhance test coverage for AES-CBC mode, we provided longer additional test patterns for AES-CBC testing. Si
Provide additional AES-CBC test patterns to enhance test coverage. To enhance test coverage for AES-CBC mode, we provided longer additional test patterns for AES-CBC testing. Signed-off-by: Phoebe Chen <phoebe.chen@sifive.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21923)
show more ...
|