- 02 3月, 2017 1 次提交
-
-
由 Andy Polyakov 提交于
Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 25 1月, 2017 1 次提交
-
-
由 Todd Short 提交于
Remove duplicate defines from EVP source files. Most of them were in evp.h, which is always included. Add new ones evp_int.h EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK is now always defined in evp.h, so remove conditionals on it Reviewed-by: NRich Salz <rsalz@openssl.org> Reviewed-by: NRichard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2201)
-
- 20 6月, 2016 1 次提交
-
-
由 Kurt Cancemi 提交于
Reviewed-by: NAndy Polyakov <appro@openssl.org> Reviewed-by: NRich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1231)
-
- 18 5月, 2016 1 次提交
-
-
由 Rich Salz 提交于
Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 03 5月, 2016 1 次提交
-
-
由 Kurt Roeckx 提交于
Reviewed-by: NEmilia Käsper <emilia@openssl.org> CVE-2016-2107 MR: #2572
-
- 02 5月, 2016 1 次提交
-
-
由 Andy Polyakov 提交于
This macro was defined by no-longer-supported __MWERKS__ compiler. Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 14 4月, 2016 1 次提交
-
-
由 Matt Caswell 提交于
no-aes is no longer a Configure option and therefore the OPENSSL_NO_AES guards can be removed. Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 08 3月, 2016 1 次提交
-
-
由 Matt Caswell 提交于
We had the function EVP_CIPHER_CTX_cipher_data which is newly added for 1.1.0. As we now also need an EVP_CIPHER_CTX_set_cipher_data it makes more sense for the former to be called EVP_CIPHER_CTX_get_cipher_data. Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 12 1月, 2016 2 次提交
-
-
由 Richard Levitte 提交于
They all stop including evp_locl.h, so we also take care of their adaptation to opaque EVP_CIPHER_CTX, as was promised in an earlier commit. Reviewed-by: NRich Salz <rsalz@openssl.org>
-
由 Richard Levitte 提交于
Note: there's a larger number of implementations in crypto/evp/ that aren't affected because they include evp_locl.h. They will be handled in a separate commit. Reviewed-by: NRich Salz <rsalz@openssl.org>
-
- 16 11月, 2015 1 次提交
-
-
由 Andy Polyakov 提交于
It was also found that stich performs suboptimally on AMD Jaguar, hence execution is limited to XOP-capable and Intel processors. Reviewed-by: NKurt Roeckx <kurt@openssl.org>
-
- 24 10月, 2015 1 次提交
-
-
由 Alessandro Ghedini 提交于
RT#4081 Reviewed-by: NRich Salz <rsalz@openssl.org> Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 11 6月, 2015 1 次提交
-
-
由 Andy Polyakov 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 01 5月, 2015 1 次提交
-
-
由 Matt Caswell 提交于
The various implementations of EVP_CTRL_AEAD_TLS_AAD expect a buffer of at least 13 bytes long. Add sanity checks to ensure that the length is at least that. Also add a new constant (EVP_AEAD_TLS1_AAD_LEN) to evp.h to represent this length. Thanks to Kevin Wojtysiak (Int3 Solutions) and Paramjot Oberoi (Int3 Solutions) for reporting this issue. Reviewed-by: NAndy Polyakov <appro@openssl.org>
-
- 28 1月, 2015 1 次提交
-
-
由 Rich Salz 提交于
Remove support for SHA0 and DSS0 (they were broken), and remove the ability to attempt to build without SHA (it didn't work). For simplicity, remove the option of not building various SHA algorithms; you could argue that SHA_224/256/384/512 should be kept, since they're like crypto algorithms, but I decided to go the other way. So these options are gone: GENUINE_DSA OPENSSL_NO_SHA0 OPENSSL_NO_SHA OPENSSL_NO_SHA1 OPENSSL_NO_SHA224 OPENSSL_NO_SHA256 OPENSSL_NO_SHA384 OPENSSL_NO_SHA512 Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 22 1月, 2015 3 次提交
-
-
由 Matt Caswell 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Matt Caswell 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Matt Caswell 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 21 8月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
-
- 05 7月, 2014 1 次提交
-
-
由 Ben Laurie 提交于
-
- 18 6月, 2014 2 次提交
-
-
- 15 6月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 15 2月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 13 2月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 05 2月, 2014 2 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
- 04 1月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
but keep it disabled, too little gain... Add some Atom-specific optimization.
-
- 13 10月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
Excessive fragmentation put additional burden (of addtional MAC calculations) on the other size and limiting fragments it to 1KB limits the overhead to ~6%.
-
- 09 10月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 03 10月, 2013 2 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
- 05 6月, 2013 1 次提交
-
-
由 Ben Laurie 提交于
-
- 14 5月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 19 3月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
PR: 3002
-
- 08 2月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
It also ensures that valgring is happy.
-
- 06 2月, 2013 2 次提交
-
-
由 Andy Polyakov 提交于
(cherry picked from commit 529d27ea472fc2c7ba9190a15a58cb84012d4ec6)
-
由 Andy Polyakov 提交于
Address CBC decrypt timing issues and reenable the AESNI+SHA1 stitch. (cherry picked from commit 125093b59f3c2a2d33785b5563d929d0472f1721)
-
- 15 4月, 2012 1 次提交
-
-
由 Andy Polyakov 提交于
countermeasure. PR: 2778
-
- 01 9月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-