Andy Polyakov
a2eb9688a4
Kill unused macro and reimplement it for that single context it can
...
actually be used, namely x86* platforms [because they don't bomb on
unaligned access]. This resulted in 30-40% [depending on message
length] improvement for SHA-256 compiled with gcc and running on P4.
In the lack of assembler implementation I give the compiler all the
help it can possibly get:-)
2004-05-31 12:06:27 +00:00
Richard Levitte
af2bf07404
SHA224_Update() and SHA224_Final() aren't implemented, and since
...
SHA224() uses SHA256_Update() and SHA256_Final() instead, let's just
create aliases in form of macros.
make update
2004-05-30 16:58:33 +00:00
Andy Polyakov
8d9fb0f04a
gcc -Wcast-qual clean-up.
2004-05-29 19:11:29 +00:00
Andy Polyakov
674ee8b72d
Make sure we return 0 if test passed.
2004-05-28 21:42:40 +00:00
Andy Polyakov
1809e858bb
Eliminate compiler warnings and throw in performance table.
2004-05-28 10:15:58 +00:00
Andy Polyakov
da8348e938
SHA-224 test vectors added.
2004-05-27 19:46:07 +00:00
Richard Levitte
ef16f45081
Since num is now a size_t, it's not necssary to check for less than 0,
...
AND it avoids warnings on certain systems.
2004-05-27 09:20:42 +00:00
Richard Levitte
4d692e1ba0
Synchronise VMS with the Unixly Malefiles.
2004-05-26 17:05:51 +00:00
Richard Levitte
f2bfbcef76
make update
2004-05-25 09:41:00 +00:00
Andy Polyakov
63077bd40c
SHA-256/-512 update. A bug fix, SHA-512 tune-up for AMD64, hook for SSE2
...
code, Makefile update.
2004-05-20 21:24:41 +00:00
Andy Polyakov
df364f1b00
Stress collector/padding function.
2004-05-20 21:20:19 +00:00
Andy Polyakov
bc767216d9
Final API adaptation. Final, "all openssl" performance numbers [not mixture
...
of different implementations]. Real-life performance improvement is rated
at 2-3x, not 6x as preliminary announced.
2004-05-20 21:18:09 +00:00
Dr. Stephen Henson
eda52e175a
Delete obsolete and unimplemented function.
2004-05-19 17:05:02 +00:00
Richard Levitte
c4fc8b5bf4
X509_policy_lib_init is declared but not defined, so it raises havoc
...
when trying to build a shared library on VMS or Windows...
2004-05-19 14:19:51 +00:00
Richard Levitte
5affe206e1
Define FIPS_*_SIZE_T for AES, DSA and RSA as well, in preparation for
...
size_t-ification of those algorithms in future version of OpenSSL...
2004-05-19 14:16:33 +00:00
Geoff Thorpe
9c52d2cc75
After the latest round of header-hacking, regenerate the dependencies in
...
the Makefiles. NB: this commit is probably going to generate a huge posting
and it is highly uninteresting to read.
2004-05-17 19:26:06 +00:00
Geoff Thorpe
0f814687b9
Deprecate the recursive includes of bn.h from various API headers (asn1.h,
...
dh.h, dsa.h, ec.h, ecdh.h, ecdsa.h, rsa.h), as the opaque bignum types are
already declared in ossl_typ.h. Add explicit includes for bn.h in those C
files that need access to structure internals or API functions+macros.
2004-05-17 19:14:22 +00:00
Geoff Thorpe
298a2f9e58
Because of recent reductions in header interdependencies, these files need
...
to include crypto.h directly.
2004-05-17 19:01:15 +00:00
Geoff Thorpe
ac0d0a5ecd
I can't verify this directly, but recent changes will probably require that
...
the cryptodev implementation include bn.h directly (when building with
OPENSSL_NO_DEPRECATED that is).
2004-05-17 18:58:47 +00:00
Geoff Thorpe
508999fa7d
Deprecate some recursive includes from the store.h API header, and put back
...
required includes back via the internal header and str_lib.c.
2004-05-17 18:49:06 +00:00
Geoff Thorpe
210a21bc8d
Reduce dependencies on crypto.h by moving the opaque definition of
...
CRYPTO_EX_DATA and the new/free/dup callback prototypes to ossl_typ.h.
2004-05-17 18:39:00 +00:00
Geoff Thorpe
678c1e025b
Moving opaque definitions to ossl_typ.h lets us reduce header dependencies.
...
Deprecate inclusion of crypto.h from ui.h.
2004-05-17 18:01:28 +00:00
Andy Polyakov
1ab61a9179
Make reservations for FIPS code in HEAD branch, so that the moment FIPS
...
comes in we have required macros in place.
2004-05-17 15:49:13 +00:00
Andy Polyakov
1f4eccaaa5
Make reservations in FIPS code for upcoming size_t-fication of OpenSSL API.
...
And couple of bug-fixes in fips/rand code [return without lock release and
incorrect return value in fips_rand_bytes].
2004-05-17 15:37:26 +00:00
Geoff Thorpe
d6dda126b7
Make some more API types opaquely available from ossl_typ.h, meaning the
...
corresponding headers are only required for API functions or structure
details. This now includes the bignum types and BUF_MEM. Subsequent commits
will remove various dependencies on bn.h and buffer.h and update the
makefile dependencies.
2004-05-15 18:32:08 +00:00
Geoff Thorpe
7771b6c5b5
This file implements various functions that have since been redefined as
...
macros. I'm removing this from the NO_DEPRECATED build.
2004-05-15 18:26:15 +00:00
Ben Laurie
9ac9a29407
Fix self-tests, ban some things in FIPS mode, fix copyrights.
2004-05-15 17:51:26 +00:00
Andy Polyakov
9e0aad9fd6
size_t-fication of message digest APIs. We should size_t-fy more APIs...
2004-05-15 11:29:55 +00:00
Richard Levitte
1c7a0e2856
Reimplement old functions, so older software that link to libcrypto
...
don't crash and burn.
2004-05-14 17:56:30 +00:00
Richard Levitte
bac2e26a9e
Reimplement old functions, so older software that link to libcrypto
...
don't crash and burn.
2004-05-14 17:55:59 +00:00
Richard Levitte
dbf2ac31c9
Synchronise o_str.c between 0.9.8-dev and 0.9.7-stable.
2004-05-13 22:40:08 +00:00
Richard Levitte
abd23881c1
Synchronise o_str.c between 0.9.8-dev and 0.9.7-stable.
2004-05-13 22:39:56 +00:00
Andy Polyakov
c842261b1b
SHA-224/-256/-384/-512 implementation. This is just sheer code commit.
...
Makefile modifications, make test, etc. will appear later...
2004-05-13 13:48:33 +00:00
Ben Laurie
72d75ee206
Blow up in people's faces if they don't reseed.
2004-05-12 14:11:10 +00:00
Richard Levitte
49bc4c1023
make update
2004-05-12 10:17:15 +00:00
Richard Levitte
0e92f7738a
Forgot to update the Makefile with the o_str stuff...
2004-05-12 10:17:02 +00:00
Richard Levitte
d529f2a8f7
The functions OPENSSL_strcasen?cmp() were forgotten when merging the
...
FIPS branch into this. It's needed at least for certain OpenVMS
versions, and should really be used in a more general way.
2004-05-12 10:09:00 +00:00
Richard Levitte
90cce79346
Makefile.ssl changed name to Makefile.
2004-05-12 08:28:00 +00:00
Ben Laurie
3642f632d3
Pull FIPS back into stable.
2004-05-11 12:46:24 +00:00
Andy Polyakov
1e6bccc240
SSE2 SHA512_Transform implementation. No, it's not used anywhere yet and
...
is subject to change as C implementation is added...
2004-05-06 10:41:07 +00:00
Andy Polyakov
d3adc3d3ed
SSE2 accelerated bn_mul_add_words. Code is currently disabled till proper
...
config and run-time support is added.
PR: 788
Submitted by: <dean@arctic.org>
Reviewed by: <appro>
Obtained from: http://arctic.org/~dean/crypto/rsa.html
2004-05-06 10:36:49 +00:00
Andy Polyakov
10e7d6d526
Support for IA-32 SSE2 instruction set.
2004-05-06 10:31:09 +00:00
Richard Levitte
430d7afd80
When the pointer 'from' changes, it's stored length needs to change as
...
well.
Notified by Frank Kardel <kardel@acm.org> in PR 879.
2004-05-06 09:33:22 +00:00
Richard Levitte
3b8ba6b610
When the pointer 'from' changes, it's stored length needs to change as
...
well.
Notified by Frank Kardel <kardel@acm.org> in PR 879.
2004-05-06 09:31:31 +00:00
Geoff Thorpe
ca982e4870
Fix realloc usage in ec_curve.c
...
Submitted by: Nils Larsch
Reviewed by: Geoff Thorpe
2004-05-04 20:08:55 +00:00
Geoff Thorpe
08e1cbc62c
The new BN_CTX code makes this sort of abuse unnecessary.
2004-04-28 18:34:39 +00:00
Andy Polyakov
dd55880644
Improved PowerPC support. Proper ./config support for ppc targets,
...
especially for AIX. But most important BIGNUM assembler implementation
submitted by IBM.
Submitted by: Peter Waltenberg <pwalten@au1.ibm.com>
Reviewed by: appro
2004-04-27 22:05:50 +00:00
Dr. Stephen Henson
bd1640bb01
Make ASN1 code work again...
2004-04-27 18:33:40 +00:00
Geoff Thorpe
081991ac01
With the new dynamic BN_CTX implementation, there should be no need for
...
additional contexts.
2004-04-27 13:24:51 +00:00
Geoff Thorpe
8a85c341fe
The problem of rsa key-generation getting stuck in a loop for (pointlessly)
...
small key sizes seems to result from the code continually regenerating the
same prime value once the range is small enough. From my tests, this change
fixes the problem by setting an escape velocity of 3 repeats for the second
of the two primes.
PR: 874
2004-04-26 15:38:44 +00:00