openssl/crypto/sha
Andy Polyakov a2eb9688a4 Kill unused macro and reimplement it for that single context it can
actually be used, namely x86* platforms [because they don't bomb on
unaligned access]. This resulted in 30-40% [depending on message
length] improvement for SHA-256 compiled with gcc and running on P4.
In the lack of assembler implementation I give the compiler all the
help it can possibly get:-)
2004-05-31 12:06:27 +00:00
..
asm Kill unused macro and reimplement it for that single context it can 2004-05-31 12:06:27 +00:00
.cvsignore
Makefile.ssl make update 2004-05-25 09:41:00 +00:00
sha1_one.c size_t-fication of message digest APIs. We should size_t-fy more APIs... 2004-05-15 11:29:55 +00:00
sha1.c
sha1dgst.c Make all configuration macros available for application by making 2001-02-19 16:06:34 +00:00
sha1s.cpp
sha1test.c Netware-specific changes, 2003-11-28 13:10:58 +00:00
sha256.c SHA-256/-512 update. A bug fix, SHA-512 tune-up for AMD64, hook for SSE2 2004-05-20 21:24:41 +00:00
sha256t.c Make sure we return 0 if test passed. 2004-05-28 21:42:40 +00:00
sha512.c gcc -Wcast-qual clean-up. 2004-05-29 19:11:29 +00:00
sha512t.c Make sure we return 0 if test passed. 2004-05-28 21:42:40 +00:00
sha_dgst.c Make all configuration macros available for application by making 2001-02-19 16:06:34 +00:00
sha_locl.h Since num is now a size_t, it's not necssary to check for less than 0, 2004-05-27 09:20:42 +00:00
sha_one.c size_t-fication of message digest APIs. We should size_t-fy more APIs... 2004-05-15 11:29:55 +00:00
sha.c
sha.h SHA224_Update() and SHA224_Final() aren't implemented, and since 2004-05-30 16:58:33 +00:00
shatest.c Netware-specific changes, 2003-11-28 13:10:58 +00:00