- 12 1月, 2016 2 次提交
-
-
由 Richard Levitte 提交于
They all stop including evp_locl.h, so we also take care of their adaptation to opaque EVP_CIPHER_CTX, as was promised in an earlier commit. Reviewed-by: NRich Salz <rsalz@openssl.org>
-
由 Richard Levitte 提交于
Note: there's a larger number of implementations in crypto/evp/ that aren't affected because they include evp_locl.h. They will be handled in a separate commit. Reviewed-by: NRich Salz <rsalz@openssl.org>
-
- 16 11月, 2015 1 次提交
-
-
由 Andy Polyakov 提交于
It was also found that stich performs suboptimally on AMD Jaguar, hence execution is limited to XOP-capable and Intel processors. Reviewed-by: NKurt Roeckx <kurt@openssl.org>
-
- 24 10月, 2015 1 次提交
-
-
由 Alessandro Ghedini 提交于
RT#4081 Reviewed-by: NRich Salz <rsalz@openssl.org> Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 11 6月, 2015 1 次提交
-
-
由 Andy Polyakov 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 01 5月, 2015 1 次提交
-
-
由 Matt Caswell 提交于
The various implementations of EVP_CTRL_AEAD_TLS_AAD expect a buffer of at least 13 bytes long. Add sanity checks to ensure that the length is at least that. Also add a new constant (EVP_AEAD_TLS1_AAD_LEN) to evp.h to represent this length. Thanks to Kevin Wojtysiak (Int3 Solutions) and Paramjot Oberoi (Int3 Solutions) for reporting this issue. Reviewed-by: NAndy Polyakov <appro@openssl.org>
-
- 28 1月, 2015 1 次提交
-
-
由 Rich Salz 提交于
Remove support for SHA0 and DSS0 (they were broken), and remove the ability to attempt to build without SHA (it didn't work). For simplicity, remove the option of not building various SHA algorithms; you could argue that SHA_224/256/384/512 should be kept, since they're like crypto algorithms, but I decided to go the other way. So these options are gone: GENUINE_DSA OPENSSL_NO_SHA0 OPENSSL_NO_SHA OPENSSL_NO_SHA1 OPENSSL_NO_SHA224 OPENSSL_NO_SHA256 OPENSSL_NO_SHA384 OPENSSL_NO_SHA512 Reviewed-by: NRichard Levitte <levitte@openssl.org>
-
- 22 1月, 2015 3 次提交
-
-
由 Matt Caswell 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Matt Caswell 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
由 Matt Caswell 提交于
Reviewed-by: NTim Hudson <tjh@openssl.org>
-
- 21 8月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
Reviewed-by: NDr. Stephen Henson <steve@openssl.org>
-
- 05 7月, 2014 1 次提交
-
-
由 Ben Laurie 提交于
-
- 18 6月, 2014 2 次提交
-
-
- 15 6月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 15 2月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 13 2月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 05 2月, 2014 2 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
- 04 1月, 2014 1 次提交
-
-
由 Andy Polyakov 提交于
but keep it disabled, too little gain... Add some Atom-specific optimization.
-
- 13 10月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
Excessive fragmentation put additional burden (of addtional MAC calculations) on the other size and limiting fragments it to 1KB limits the overhead to ~6%.
-
- 09 10月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 03 10月, 2013 2 次提交
-
-
由 Andy Polyakov 提交于
-
由 Andy Polyakov 提交于
-
- 05 6月, 2013 1 次提交
-
-
由 Ben Laurie 提交于
-
- 14 5月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
-
- 19 3月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
PR: 3002
-
- 08 2月, 2013 1 次提交
-
-
由 Andy Polyakov 提交于
It also ensures that valgring is happy.
-
- 06 2月, 2013 2 次提交
-
-
由 Andy Polyakov 提交于
(cherry picked from commit 529d27ea472fc2c7ba9190a15a58cb84012d4ec6)
-
由 Andy Polyakov 提交于
Address CBC decrypt timing issues and reenable the AESNI+SHA1 stitch. (cherry picked from commit 125093b59f3c2a2d33785b5563d929d0472f1721)
-
- 15 4月, 2012 1 次提交
-
-
由 Andy Polyakov 提交于
countermeasure. PR: 2778
-
- 01 9月, 2011 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 24 8月, 2011 1 次提交
-
-
由 Andy Polyakov 提交于
-