Andy Polyakov
|
5b198d5eea
|
x86gas.pl: relax .init segment alignment.
|
2011-10-22 10:49:52 +00:00 |
|
Dr. Stephen Henson
|
8d742dd561
|
Update error codes.
|
2011-10-21 11:46:16 +00:00 |
|
Andy Polyakov
|
033a25cef5
|
armcap.c: auto-setup processor capability vector.
|
2011-10-20 20:52:26 +00:00 |
|
Andy Polyakov
|
d528caa725
|
sha1-mips.pl: fix typo.
|
2011-10-20 08:39:29 +00:00 |
|
Dr. Stephen Henson
|
5e4eb9954b
|
add authentication parameter to FIPS_module_mode_set
|
2011-10-19 22:34:53 +00:00 |
|
Andy Polyakov
|
227a822ab6
|
vxworks-mips: unify and add assembler.
|
2011-10-19 21:49:20 +00:00 |
|
Andy Polyakov
|
a9cf0b81fa
|
Remove superseded MIPS assembler modules.
|
2011-10-19 21:42:21 +00:00 |
|
Andy Polyakov
|
3ee4d41fe1
|
arm_arch.h: add missing pre-defined macro, __ARM_ARCH_5TEJ__.
|
2011-10-19 18:57:03 +00:00 |
|
Bodo Möller
|
e5641d7f05
|
BN_BLINDING multi-threading fix.
Submitted by: Emilia Kasper (Google)
|
2011-10-19 14:59:27 +00:00 |
|
Bodo Möller
|
e0d6132b8c
|
Fix warnings.
Also, use the common Configure mechanism for enabling/disabling the 64-bit ECC code.
|
2011-10-19 08:59:53 +00:00 |
|
Bodo Möller
|
3e00b4c9db
|
Improve optional 64-bit NIST-P224 implementation, and add NIST-P256 and
NIST-P521. (Now -DEC_NISTP_64_GCC_128 enables all three of these;
-DEC_NISTP224_64_GCC_128 no longer works.)
Submitted by: Google Inc.
|
2011-10-18 19:43:16 +00:00 |
|
Andy Polyakov
|
07904e0c6c
|
evp/e_aes.c: fold AES-NI modes that heavily rely on indirect calls
(trade 2% small-block performance), engage bit-sliced AES in GCM.
|
2011-10-18 13:37:26 +00:00 |
|
Andy Polyakov
|
4010b341b7
|
x86_64-xlate.pl: make vpaes-x86_64.pl and rc4-md5-x86_64 work with ml64,
fix bug in .crt section alignment.
PR: 2620, 2624
|
2011-10-18 09:50:23 +00:00 |
|
Andy Polyakov
|
5a326467dc
|
bsaes-x86_64.pl: make it work with ml64.
|
2011-10-18 09:22:04 +00:00 |
|
Andy Polyakov
|
3b7c14bb90
|
[bs|vp]aes-x86[_64].pl: typos and clarifications.
|
2011-10-18 08:03:02 +00:00 |
|
Andy Polyakov
|
e2473dcc7d
|
c_allc.c: add aes-xts to loop.
|
2011-10-18 07:53:50 +00:00 |
|
Andy Polyakov
|
78f288d5c9
|
bn_mont.c: get corner cases right in updated BN_from_montgomery_word.
|
2011-10-17 23:35:00 +00:00 |
|
Andy Polyakov
|
8329e2e776
|
bn_exp.c: further optimizations using more ideas from
http://eprint.iacr.org/2011/239.
|
2011-10-17 17:41:49 +00:00 |
|
Andy Polyakov
|
3f66f2040a
|
x86_64-mont.pl: minor optimization.
|
2011-10-17 17:39:59 +00:00 |
|
Andy Polyakov
|
2534891874
|
bn_mont.c: simplify BN_from_montgomery_word.
|
2011-10-17 17:24:28 +00:00 |
|
Andy Polyakov
|
79ba545c09
|
bn_shift.c: minimize reallocations, which allows BN_FLG_STATIC_DATA to
be shifted in specific cases.
|
2011-10-17 17:20:48 +00:00 |
|
Andy Polyakov
|
993adc0531
|
Engage bsaes-x86_64.pl, bit-sliced AES.
|
2011-10-17 17:10:54 +00:00 |
|
Dr. Stephen Henson
|
bc1b04d255
|
L=3072, N=256 provides 128 bits of security not 112.
|
2011-10-16 12:31:49 +00:00 |
|
Andy Polyakov
|
8fcdb1e60f
|
Add android-x86.
|
2011-10-15 08:32:16 +00:00 |
|
Dr. Stephen Henson
|
ffbfbef943
|
more vxworks patches
|
2011-10-14 22:04:14 +00:00 |
|
Andy Polyakov
|
027026df9f
|
e_aes.c: fix bug in aesni_gcm_tls_cipher.
|
2011-10-14 09:32:06 +00:00 |
|
Andy Polyakov
|
9ee5916d97
|
aesni-x86[_64].pl: fix bug in CCM code.
|
2011-10-14 09:15:19 +00:00 |
|
Andy Polyakov
|
af9b610cef
|
Remove eng_aesni.c as AES-NI support is integrated directly at EVP.
|
2011-10-13 19:46:44 +00:00 |
|
Bodo Möller
|
4f2015742d
|
Oops - ectest.c finds further problems beyond those exposed by bntext.c
|
2011-10-13 14:29:59 +00:00 |
|
Bodo Möller
|
0a06ad76a1
|
Avoid failed assertion in BN_DEBUG builds
|
2011-10-13 14:21:39 +00:00 |
|
Bodo Möller
|
bf6d2f986d
|
Make CTR mode behaviour consistent with other modes:
- clear ctx->num in EVP_CipherInit_ex
- adapt e_eas.c changes from http://cvs.openssl.org/chngview?cn=19816
for eng_aesni.c
Submitted by: Emilia Kasper
|
2011-10-13 13:41:34 +00:00 |
|
Bodo Möller
|
cdfe0fdde6
|
Fix OPENSSL_BN_ASM_MONT5 for corner cases; add a test.
Submitted by: Emilia Kasper
|
2011-10-13 12:35:10 +00:00 |
|
Dr. Stephen Henson
|
7fc78f11e8
|
Remove o_init.o special case from Makefile: this doesn't work.
|
2011-10-12 17:27:08 +00:00 |
|
Dr. Stephen Henson
|
3231e42d72
|
update pkey method initialisation and copy
|
2011-10-11 18:15:31 +00:00 |
|
Dr. Stephen Henson
|
cd366cf7ec
|
print out subgroup order if present
|
2011-10-11 17:44:26 +00:00 |
|
Dr. Stephen Henson
|
a59163f6b6
|
def_rsa_finish not used any more.
|
2011-10-10 20:35:09 +00:00 |
|
Dr. Stephen Henson
|
fe4394cf1d
|
remove some debugging code
|
2011-10-10 19:09:01 +00:00 |
|
Dr. Stephen Henson
|
84a75ba38c
|
fix leak properly this time...
|
2011-10-10 14:08:55 +00:00 |
|
Dr. Stephen Henson
|
42753a4f67
|
fix memory leaks
|
2011-10-09 23:08:15 +00:00 |
|
Dr. Stephen Henson
|
58b75e9c26
|
PR: 2482
Submitted by: Rob Austein <sra@hactrn.net>
Reviewed by: steve
Don't allow inverted ranges in RFC3779 code, discovered by Frank Ellermann.
|
2011-10-09 00:56:52 +00:00 |
|
Dr. Stephen Henson
|
66bb328e11
|
? crypto/aes/aes-armv4.S
? crypto/aes/aesni-sha1-x86_64.s
? crypto/aes/aesni-x86_64.s
? crypto/aes/foo.pl
? crypto/aes/vpaes-x86_64.s
? crypto/bn/.bn_lib.c.swp
? crypto/bn/armv4-gf2m.S
? crypto/bn/diffs
? crypto/bn/modexp512-x86_64.s
? crypto/bn/x86_64-gf2m.s
? crypto/bn/x86_64-mont5.s
? crypto/ec/bc.txt
? crypto/ec/diffs
? crypto/modes/a.out
? crypto/modes/diffs
? crypto/modes/ghash-armv4.S
? crypto/modes/ghash-x86_64.s
? crypto/modes/op.h
? crypto/modes/tst.c
? crypto/modes/x.h
? crypto/objects/.obj_xref.txt.swp
? crypto/rand/diffs
? crypto/sha/sha-512
? crypto/sha/sha1-armv4-large.S
? crypto/sha/sha256-armv4.S
? crypto/sha/sha512-armv4.S
Index: crypto/objects/obj_xref.c
===================================================================
RCS file: /v/openssl/cvs/openssl/crypto/objects/obj_xref.c,v
retrieving revision 1.9
diff -u -r1.9 obj_xref.c
--- crypto/objects/obj_xref.c 5 Nov 2008 18:38:58 -0000 1.9
+++ crypto/objects/obj_xref.c 6 Oct 2011 20:30:21 -0000
@@ -110,8 +110,10 @@
#endif
if (rv == NULL)
return 0;
- *pdig_nid = rv->hash_id;
- *ppkey_nid = rv->pkey_id;
+ if (pdig_nid)
+ *pdig_nid = rv->hash_id;
+ if (ppkey_nid)
+ *ppkey_nid = rv->pkey_id;
return 1;
}
@@ -144,7 +146,8 @@
#endif
if (rv == NULL)
return 0;
- *psignid = (*rv)->sign_id;
+ if (psignid)
+ *psignid = (*rv)->sign_id;
return 1;
}
Index: crypto/x509/x509type.c
===================================================================
RCS file: /v/openssl/cvs/openssl/crypto/x509/x509type.c,v
retrieving revision 1.10
diff -u -r1.10 x509type.c
--- crypto/x509/x509type.c 26 Oct 2007 12:06:33 -0000 1.10
+++ crypto/x509/x509type.c 6 Oct 2011 20:36:04 -0000
@@ -100,20 +100,26 @@
break;
}
- i=X509_get_signature_type(x);
- switch (i)
+ i=OBJ_obj2nid(x->sig_alg->algorithm);
+ if (i && OBJ_find_sigid_algs(i, NULL, &i))
{
- case EVP_PKEY_RSA:
- ret|=EVP_PKS_RSA;
- break;
- case EVP_PKEY_DSA:
- ret|=EVP_PKS_DSA;
- break;
- case EVP_PKEY_EC:
- ret|=EVP_PKS_EC;
- break;
- default:
- break;
+
+ switch (i)
+ {
+ case NID_rsaEncryption:
+ case NID_rsa:
+ ret|=EVP_PKS_RSA;
+ break;
+ case NID_dsa:
+ case NID_dsa_2:
+ ret|=EVP_PKS_DSA;
+ break;
+ case NID_X9_62_id_ecPublicKey:
+ ret|=EVP_PKS_EC;
+ break;
+ default:
+ break;
+ }
}
if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look
|
2011-10-06 20:44:02 +00:00 |
|
Andy Polyakov
|
112726486d
|
bsaes-x86_64.pl: add due credit.
|
2011-09-27 19:34:40 +00:00 |
|
Andy Polyakov
|
4ec93a10bd
|
Add bit-sliced AES x86_64 assembler, see http://homes.esat.kuleuven.be/~ekasper/#software for background information. It's not integrated into build system yet.
|
2011-09-25 15:31:51 +00:00 |
|
Dr. Stephen Henson
|
c2035bffe7
|
PR: 2606
Submitted by: Christoph Viethen <cv@kawo2.rwth-aachen.de>
Reviewed by: steve
Handle timezones correctly in UTCTime.
|
2011-09-23 13:39:23 +00:00 |
|
Dr. Stephen Henson
|
e74ac3f830
|
Update error codes.
|
2011-09-21 16:17:18 +00:00 |
|
Andy Polyakov
|
2b1f17f83f
|
Make latest assembler additions (vpaes and e_padlock) work in Windows build.
|
2011-09-18 15:40:11 +00:00 |
|
Andy Polyakov
|
7470276a25
|
sha256-586.pl: minor optimization, +0-2% on all CPUs, +7% on Westmere.
|
2011-09-17 12:57:33 +00:00 |
|
Andy Polyakov
|
d2fd65f6f6
|
sha512-x86_64.pl: +15% better performance on Westmere and incidentally Atom.
Other Intel processors +5%, Opteron -2%.
|
2011-09-17 11:30:28 +00:00 |
|
Dr. Stephen Henson
|
819cf4b886
|
Sync error codes with 1.0.1-stable.
|
2011-09-17 00:17:46 +00:00 |
|
Andy Polyakov
|
8ca28da0a7
|
Integrate Vector Permutation AES into build system.
|
2011-09-15 20:22:59 +00:00 |
|