summaryrefslogtreecommitdiff
path: root/crypto
Commit message (Collapse)AuthorAgeFilesLines
...
* sha1-mips.pl: fix typo.appro2011-10-201-1/+1
|
* add authentication parameter to FIPS_module_mode_setsteve2011-10-191-1/+2
|
* vxworks-mips: unify and add assembler.appro2011-10-195-13/+28
|
* Remove superseded MIPS assembler modules.appro2011-10-192-2528/+0
|
* arm_arch.h: add missing pre-defined macro, __ARM_ARCH_5TEJ__.appro2011-10-191-1/+2
|
* BN_BLINDING multi-threading fix.bodo2011-10-192-43/+74
| | | | Submitted by: Emilia Kasper (Google)
* Fix warnings.bodo2011-10-198-67/+86
| | | | Also, use the common Configure mechanism for enabling/disabling the 64-bit ECC code.
* Improve optional 64-bit NIST-P224 implementation, and add NIST-P256 andbodo2011-10-1810-614/+5286
| | | | | | | NIST-P521. (Now -DEC_NISTP_64_GCC_128 enables all three of these; -DEC_NISTP224_64_GCC_128 no longer works.) Submitted by: Google Inc.
* evp/e_aes.c: fold AES-NI modes that heavily rely on indirect callsappro2011-10-181-233/+128
| | | | (trade 2% small-block performance), engage bit-sliced AES in GCM.
* x86_64-xlate.pl: make vpaes-x86_64.pl and rc4-md5-x86_64 work with ml64,appro2011-10-181-2/+3
| | | | | fix bug in .crt section alignment. PR: 2620, 2624
* bsaes-x86_64.pl: make it work with ml64.appro2011-10-181-18/+35
|
* [bs|vp]aes-x86[_64].pl: typos and clarifications.appro2011-10-183-6/+6
|
* c_allc.c: add aes-xts to loop.appro2011-10-181-0/+2
|
* bn_mont.c: get corner cases right in updated BN_from_montgomery_word.appro2011-10-171-6/+6
|
* bn_exp.c: further optimizations using more ideas fromappro2011-10-172-114/+157
| | | | http://eprint.iacr.org/2011/239.
* x86_64-mont.pl: minor optimization.appro2011-10-171-18/+13
|
* bn_mont.c: simplify BN_from_montgomery_word.appro2011-10-171-84/+26
|
* bn_shift.c: minimize reallocations, which allows BN_FLG_STATIC_DATA toappro2011-10-171-12/+15
| | | | be shifted in specific cases.
* Engage bsaes-x86_64.pl, bit-sliced AES.appro2011-10-172-22/+64
|
* L=3072, N=256 provides 128 bits of security not 112.steve2011-10-161-1/+1
|
* Add android-x86.appro2011-10-152-2/+11
|
* more vxworks patchessteve2011-10-143-2/+11
|
* e_aes.c: fix bug in aesni_gcm_tls_cipher.appro2011-10-141-0/+1
|
* aesni-x86[_64].pl: fix bug in CCM code.appro2011-10-142-9/+7
|
* Remove eng_aesni.c as AES-NI support is integrated directly at EVP.appro2011-10-134-536/+2
|
* Oops - ectest.c finds further problems beyond those exposed by bntext.cbodo2011-10-131-0/+2
|
* Avoid failed assertion in BN_DEBUG buildsbodo2011-10-131-0/+3
|
* Make CTR mode behaviour consistent with other modes:bodo2011-10-133-14/+5
| | | | | | | | - clear ctx->num in EVP_CipherInit_ex - adapt e_eas.c changes from http://cvs.openssl.org/chngview?cn=19816 for eng_aesni.c Submitted by: Emilia Kasper
* Fix OPENSSL_BN_ASM_MONT5 for corner cases; add a test.bodo2011-10-133-4/+98
| | | | Submitted by: Emilia Kasper
* Remove o_init.o special case from Makefile: this doesn't work.steve2011-10-121-17/+0
|
* update pkey method initialisation and copysteve2011-10-112-0/+10
|
* print out subgroup order if presentsteve2011-10-111-0/+2
|
* def_rsa_finish not used any more.steve2011-10-101-2/+0
|
* remove some debugging codesteve2011-10-101-5/+0
|
* fix leak properly this time...steve2011-10-101-8/+16
|
* fix memory leakssteve2011-10-091-2/+5
|
* PR: 2482steve2011-10-091-3/+32
| | | | | | | Submitted by: Rob Austein <sra@hactrn.net> Reviewed by: steve Don't allow inverted ranges in RFC3779 code, discovered by Frank Ellermann.
* ? crypto/aes/aes-armv4.Ssteve2011-10-062-16/+25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ? crypto/aes/aesni-sha1-x86_64.s ? crypto/aes/aesni-x86_64.s ? crypto/aes/foo.pl ? crypto/aes/vpaes-x86_64.s ? crypto/bn/.bn_lib.c.swp ? crypto/bn/armv4-gf2m.S ? crypto/bn/diffs ? crypto/bn/modexp512-x86_64.s ? crypto/bn/x86_64-gf2m.s ? crypto/bn/x86_64-mont5.s ? crypto/ec/bc.txt ? crypto/ec/diffs ? crypto/modes/a.out ? crypto/modes/diffs ? crypto/modes/ghash-armv4.S ? crypto/modes/ghash-x86_64.s ? crypto/modes/op.h ? crypto/modes/tst.c ? crypto/modes/x.h ? crypto/objects/.obj_xref.txt.swp ? crypto/rand/diffs ? crypto/sha/sha-512 ? crypto/sha/sha1-armv4-large.S ? crypto/sha/sha256-armv4.S ? crypto/sha/sha512-armv4.S Index: crypto/objects/obj_xref.c =================================================================== RCS file: /v/openssl/cvs/openssl/crypto/objects/obj_xref.c,v retrieving revision 1.9 diff -u -r1.9 obj_xref.c --- crypto/objects/obj_xref.c 5 Nov 2008 18:38:58 -0000 1.9 +++ crypto/objects/obj_xref.c 6 Oct 2011 20:30:21 -0000 @@ -110,8 +110,10 @@ #endif if (rv == NULL) return 0; - *pdig_nid = rv->hash_id; - *ppkey_nid = rv->pkey_id; + if (pdig_nid) + *pdig_nid = rv->hash_id; + if (ppkey_nid) + *ppkey_nid = rv->pkey_id; return 1; } @@ -144,7 +146,8 @@ #endif if (rv == NULL) return 0; - *psignid = (*rv)->sign_id; + if (psignid) + *psignid = (*rv)->sign_id; return 1; } Index: crypto/x509/x509type.c =================================================================== RCS file: /v/openssl/cvs/openssl/crypto/x509/x509type.c,v retrieving revision 1.10 diff -u -r1.10 x509type.c --- crypto/x509/x509type.c 26 Oct 2007 12:06:33 -0000 1.10 +++ crypto/x509/x509type.c 6 Oct 2011 20:36:04 -0000 @@ -100,20 +100,26 @@ break; } - i=X509_get_signature_type(x); - switch (i) + i=OBJ_obj2nid(x->sig_alg->algorithm); + if (i && OBJ_find_sigid_algs(i, NULL, &i)) { - case EVP_PKEY_RSA: - ret|=EVP_PKS_RSA; - break; - case EVP_PKEY_DSA: - ret|=EVP_PKS_DSA; - break; - case EVP_PKEY_EC: - ret|=EVP_PKS_EC; - break; - default: - break; + + switch (i) + { + case NID_rsaEncryption: + case NID_rsa: + ret|=EVP_PKS_RSA; + break; + case NID_dsa: + case NID_dsa_2: + ret|=EVP_PKS_DSA; + break; + case NID_X9_62_id_ecPublicKey: + ret|=EVP_PKS_EC; + break; + default: + break; + } } if (EVP_PKEY_size(pk) <= 1024/8)/* /8 because it's 1024 bits we look
* bsaes-x86_64.pl: add due credit.appro2011-09-271-4/+4
|
* Add bit-sliced AES x86_64 assembler, see ↵appro2011-09-251-0/+1184
| | | | http://homes.esat.kuleuven.be/~ekasper/#software for background information. It's not integrated into build system yet.
* PR: 2606steve2011-09-231-1/+1
| | | | | | | Submitted by: Christoph Viethen <cv@kawo2.rwth-aachen.de> Reviewed by: steve Handle timezones correctly in UTCTime.
* Update error codes.steve2011-09-211-0/+2
|
* Make latest assembler additions (vpaes and e_padlock) work in Windows build.appro2011-09-181-1/+1
|
* sha256-586.pl: minor optimization, +0-2% on all CPUs, +7% on Westmere.appro2011-09-171-27/+25
|
* sha512-x86_64.pl: +15% better performance on Westmere and incidentally Atom.appro2011-09-171-46/+40
| | | | Other Intel processors +5%, Opteron -2%.
* Sync error codes with 1.0.1-stable.steve2011-09-171-2/+4
|
* Integrate Vector Permutation AES into build system.appro2011-09-154-47/+156
|
* Allow for dynamic base in Win64 FIPS module.appro2011-09-1418-1/+116
|
* vpaes-x86[_64]*.pl: fix typo.appro2011-09-122-2/+2
|
* Add so called Vector Permutation AES x86[_64] assembler, seeappro2011-09-123-6/+2109
| | | | | http://crypto.stanford.edu/vpaes/ for background information. It's not integrated into build system yet.