- 03 10月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 16 9月, 2013 1 次提交
-
-
由 Ard Biesheuvel 提交于
Signed-off-by: NArd Biesheuvel <ard.biesheuvel@linaro.org>
-
- 06 9月, 2013 1 次提交
-
-
- 05 8月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Check and set AlgorithmIdenfier parameters for key wrap algorithms. Currently these just set parameters to NULL.
-
- 03 8月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
Bug would emerge when XTS is added to bsaes-armv7.pl. Pointed out by Ard Biesheuvel of Linaro.
-
- 18 7月, 2013 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Add hooks to support key agreement recipient info type (KARI) using algorithm specific code in the relevant public key ASN1 method.
-
由 Dr. Stephen Henson 提交于
Add support for key wrap algorithms via EVP interface. Generalise AES wrap algorithm and add to modes, making existing AES wrap algorithm a special case. Move test code to evptests.txt
-
- 22 6月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 13 6月, 2013 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 05 6月, 2013 1 次提交
-
-
由 Ben Laurie 提交于
-
- 04 6月, 2013 1 次提交
-
-
由 Ben Laurie 提交于
-
- 14 5月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 23 4月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
Submitted by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Contributor claims ~50% improvement in CTR and ~9% in CBC decrypt on Cortex-A15.
-
- 06 4月, 2013 1 次提交
-
-
由 Ben Laurie 提交于
-
- 04 4月, 2013 2 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
- 31 3月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 30 3月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 19 3月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
PR: 3002
-
- 07 3月, 2013 3 次提交
-
-
由 Andy Polyakov 提交于
-
由 Dr. Stephen Henson 提交于
Add code to support GCM an CCM modes in evp_test. On encrypt this will compare the expected ciphertext and tag. On decrypt it will compare the expected plaintext: tag comparison is done internally. Add a simple CCM test case and convert all tests from crypto/modes/gcm128.c
-
由 Dr. Stephen Henson 提交于
-
- 22 2月, 2013 1 次提交
-
-
由 Ben Laurie 提交于
-
- 08 2月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
It also ensures that valgring is happy.
-
- 06 2月, 2013 3 次提交
-
-
由 Andy Polyakov 提交于
(cherry picked from commit 529d27ea472fc2c7ba9190a15a58cb84012d4ec6)
-
由 Andy Polyakov 提交于
Address CBC decrypt timing issues and reenable the AESNI+SHA1 stitch. (cherry picked from commit 125093b59f3c2a2d33785b5563d929d0472f1721)
-
由 Ben Laurie 提交于
This patch makes the decoding of SSLv3 and TLS CBC records constant time. Without this, a timing side-channel can be used to build a padding oracle and mount Vaudenay's attack. This patch also disables the stitched AESNI+SHA mode pending a similar fix to that code. In order to be easy to backport, this change is implemented in ssl/, rather than as a generic AEAD mode. In the future this should be changed around so that HMAC isn't in ssl/, but crypto/ as FIPS expects. (cherry picked from commit e130841bccfc0bb9da254dc84e23bc6a1c78a64e)
-
- 19 1月, 2013 1 次提交
-
-
由 Ben Laurie 提交于
-
- 25 11月, 2012 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 19 11月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 05 11月, 2012 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Andy Polyakov 提交于
leave comment about CTR mode.
-
由 Ben Laurie 提交于
-
- 19 10月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 17 10月, 2012 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 12 10月, 2012 1 次提交
-
-
由 Andy Polyakov 提交于
Submitted by: David Miller
-
- 07 10月, 2012 1 次提交
-
-
由 Andy Polyakov 提交于
Submitted by: David Miller
-
- 15 9月, 2012 1 次提交
-
-
由 Andy Polyakov 提交于
PR: 2874 Submitted by: Tomas Mraz
-
- 04 7月, 2012 2 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Reported by: David McCullough <david_mccullough@mcafee.com> Restore fips configuration module from 0.9.8.
-