summaryrefslogtreecommitdiffstats
path: root/lib/libssl/src/crypto (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* resolve conflictsdjm2005-04-29169-681/+2554
|
* import of openssl-0.9.7g; tested on platforms from alpha to zaurus, ok deraadt@djm2005-04-2959-24/+13442
|
* typomiod2005-04-251-2/+2
|
* fix lies about snprintfderaadt2005-04-231-2/+3
|
* enable openssl DSO (typo, it's -DDSO_DLFCN not -DSO_DLFCN); Douglas Santosmarkus2005-03-301-3/+3
|
* belive -> believemiod2005-03-292-2/+2
|
* adjust comment, open_dev_crypto() returns -1 on error.hshoexer2005-01-291-1/+1
| | | | ok markus@
* on error set correct pointer to NULL.hshoexer2005-01-261-2/+2
| | | | | | From phk@freebsd.org ok markus@
* machdep.xcrypt now has a different meaning: Instead of > 0 indicatingderaadt2004-06-151-14/+16
| | | | | | that AES is there, we now have 3 flag bits: C3_HAS_AES, C3_HAS_SHA (SHA1 & SHA256), and C3_HAS_MM (RSA). Change this code to only look at C3_HAS_AES for now.
* update missing pieces from 0.9.7d; ok henningmarkus2004-04-253-11/+67
| | | | crank minor for API extensions
* from openssl, 1.50.2.9, make S/MIME encrypt work again.markus2004-04-251-4/+9
|
* backout for nowmarkus2004-04-083-67/+11
|
* merge 0.9.7dmarkus2004-04-0868-461/+482
|
* import openssl-0.9.7dmarkus2004-04-077-14/+237
|
* Unbreak rmd160. Was broken on sparc64 when compiled with gcc3. Fix and reporthshoexer2004-03-221-2/+2
| | | | | | | | | | by Simon Kellner. XXX This is only a temporary work-around and we still need a REAL fix for XXX this issue. Testing on different archs by marc@ tdvall@ millert@ otto@ ho@ miod@ hshoexer@ ok deraadt@
* Insert missing ABORT if EC_GROUP_copy() fails.tom2004-03-211-1/+1
| | | | ok markus@
* return(00); -> return(0); markus@ okaaron2004-03-171-2/+2
|
* Cleanup and shrink ACSS_KEY a bit. Thus crank library minor.hshoexer2004-02-133-19/+24
| | | | | | Change cipher modes to more generic names and add an additional mode. ok deraadt@ markus@
* remove some debug code and cleanup..deraadt2004-02-041-18/+6
|
* OK, this time the AES soft keys work with ssh and such. I spent over 3deraadt2004-02-031-16/+63
| | | | | hours learning that OpenSSL's internal functions for AES extended keys generate screwy byte order swapped data..
* oops, software key gen bugderaadt2004-02-031-35/+10
|
* Switch to using software generated extended keys (because the cpu cannotderaadt2004-02-031-10/+35
| | | | | | | | | | yet generate 192 & 256 bit keys). Ensure that 192 and 256 are in the nids table. This also accelerates performance for 128 a tiny bit: type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes aes-128-cbc 34921.48k 129617.82k 362059.93k 623649.81k 790397.77k aes-192-cbc 26227.43k 99215.33k 283242.84k 509881.15k 665323.22k aes-256-cbc 26133.22k 97458.06k 265990.84k 457824.69k 579835.09k
* If on an i386, detect existance of the VIA C3 xcrypt-* using sysctl ofderaadt2004-02-031-4/+174
| | | | | | | | the machdep.xcrypt node. If they exist, use the xcrypt-cbc instruction to accelerate aes-{128,192,256}-cbc, for more than 100x performance increase. This code has no effect on any cpu... Tested thus far using openssl speed command, and of course, ssh. 778MB/sec AES-128-CBC performance at 8192 byte block size.
* Use correct cvs id string.hshoexer2004-01-233-3/+3
| | | | ok deraadt@
* remove junk return at endderaadt2004-01-231-2/+0
|
* enable acss.hshoexer2004-01-231-0/+4
| | | | | | | ok @deraadt @markus Also bump minor version. ok @deraadt
* evp api and manual page for acsshshoexer2004-01-231-0/+85
| | | | ok deraadt@ markus@
* Add acss to libcrypto.hshoexer2004-01-233-0/+307
| | | | ok deraadt@ markus@
* use bn_asm_vax.S (from netbsd); test + ok by miodmarkus2003-11-188-10/+55
| | | | | | | | use asm code for i386, except for the CBC code, because it is not clean PIC code. add <machime/asm.h> support to x86unix.pl tested by: nick (on 30386), henning, djm, tedu, jmc and more; no shlib minor crank necessary, only internal symbols changed.
* remove obsolete filesmarkus2003-11-132-690/+0
|
* merge 0.9.7c; minor bugsfixes;markus2003-11-1147-167/+421
| | | | | API addition: ERR_release_err_state_table [make includes before you build libssl/libcrypto]
* import 0.9.7cmarkus2003-11-112-0/+618
|
* don't destroy old pointer if realloc fails; from Daniel Lucq; ok deraadt@markus2003-10-251-3/+7
|
* security fix from http://www.openssl.org/news/secadv_20030930.txtmarkus2003-09-303-2/+11
| | | | see also http://cvs.openssl.org/chngview?cn=11471
* Revert BN_cmp() change. Its arguments are const. Spotted by miod@.otto2003-09-291-3/+0
| | | | ok deraadt@
* Return immediately if argument to BN_sub_word is zero.otto2003-09-251-0/+3
| | | | ok markus@ deraadt@
* Use BN_is_zero(), not x->top == 0 to test if a BN is zero.otto2003-09-251-3/+3
| | | | ok markus@ deraadt@
* Add extra calls to bn_fix_top() in BN_cmp(), since some functions mayotto2003-09-251-0/+3
| | | | | | leave an invalid BN. ok markus@ deraadt@
* Do not produce a corrupt BIGNUM when adding 0 to 0 using BN_add_word().otto2003-08-211-0/+3
| | | | ok markus@
* support AES with 192 and 256 bit keys, too.markus2003-08-071-58/+60
| | | | tested with kern.cryptodevallowsoft=1; ok deraadt@
* Remove some double semicolons (hmm, do two semis equal a maxi?).millert2003-08-063-3/+3
| | | | I've skipped the GNU stuff for now. From Patrick Latifi.
* obsoletemarkus2003-06-135-1618/+0
|
* nuke term 3, since we're all in ~deraadt/terms and I clued in now.beck2003-06-031-3/+0
|
* merge 0.9.7b with local changes; crank majors for libssl/libcryptomarkus2003-05-12241-2002/+2334
|
* import 0.9.7b (without idea and rc5)markus2003-05-1144-125/+3168
|
* remove printf("bar\n");markus2003-04-081-1/+0
|
* sprintf->snprintf. deraadt@ suggestions and okho2003-04-067-36/+49
|
* Trivial sprintf() -> snprintf() changes. ok deraadt@ho2003-04-0513-47/+65
|
* more strcpy & sprintf murder; ho okderaadt2003-04-041-3/+3
|
* Correct off-by-one error in previous commit. millert@ ok.ho2003-04-031-2/+3
|