- 11 6月, 2013 6 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
- 05 6月, 2013 6 次提交
-
-
由 Dr. Stephen Henson 提交于
Fix PSS signature printing: consistently use 0x prefix for hex values for padding length and trailer fields.
-
由 Dr. Stephen Henson 提交于
-
由 Adam Langley 提交于
requested size. Fixes OpenSSL #2701. This change does not address the cases of generating safe primes, or where the |add| parameter is non-NULL. Conflicts: crypto/bn/bn.h crypto/bn/bn_err.c
-
由 Adam Langley 提交于
-
由 Adam Langley 提交于
eliminating them as dead code. Both volatile and "memory" are used because of some concern that the compiler may still cache values across the asm block without it, and because this was such a painful debugging session that I wanted to ensure that it's never repeated.
-
由 Ben Laurie 提交于
-
- 04 6月, 2013 1 次提交
-
-
由 Ben Laurie 提交于
-
- 01 6月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 26 5月, 2013 4 次提交
-
-
由 Andy Polyakov 提交于
PR: 3042
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
(and pending AVX2 changes).
-
由 Andy Polyakov 提交于
-
- 14 5月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 13 5月, 2013 2 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
- 05 5月, 2013 2 次提交
-
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
- 02 5月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Reencode certificates in X509_sign_ctx as well as X509_sign. This was causing a problem in the x509 application when it modified an existing certificate.
-
- 23 4月, 2013 2 次提交
-
-
由 Andy Polyakov 提交于
Submitted by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Contributor claims ~50% improvement in CTR and ~9% in CBC decrypt on Cortex-A15.
-
由 Andy Polyakov 提交于
-
- 14 4月, 2013 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
While ARMv7 in general is capable of unaligned access, not all instructions actually are. And trouble is that compiler doesn't seem to differentiate those capable and incapable of unaligned access. Side effect is that kernel goes into endless loop retrying same instruction triggering unaligned trap. Problem was observed in xts128.c and ccm128.c modules. It's possible to resolve it by using (volatile u32*) casts, but letting STRICT_ALIGNMENT be feels more appropriate.
-
- 09 4月, 2013 4 次提交
-
-
由 Dr. Stephen Henson 提交于
Check for Suite B support using method flags instead of version numbers: anything supporting TLS 1.2 cipher suites will also support Suite B. Return an error if an attempt to use DTLS 1.0 is made in Suite B mode.
-
由 Dr. Stephen Henson 提交于
If we successfully match a cookie don't set return value to 2 as this results in other error conditions returning 2 as well. Instead set return value to -2 which can be checked later if everything else is OK.
-
由 Dr. Stephen Henson 提交于
Add new methods DTLS_*_method() which support both DTLS 1.0 and DTLS 1.2 and pick the highest version the peer supports during negotiation. As with SSL/TLS options can change this behaviour specifically SSL_OP_NO_DTLSv1 and SSL_OP_NO_DTLSv1_2.
-
由 Dr. Stephen Henson 提交于
-
- 08 4月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Don't use Win32 specific options in mk1mf.pl to build assembly language files.
-
- 07 4月, 2013 2 次提交
-
-
由 Ben Laurie 提交于
turn out to be made somewhere by existing Makefiles.
-
由 Ben Laurie 提交于
-
- 06 4月, 2013 4 次提交
-
-
由 Ben Laurie 提交于
-
由 Dr. Stephen Henson 提交于
Only use -MMD and .sinclude in copy builds: other platforms don't support them.
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-