Age | Commit message (Collapse) | Author | |
---|---|---|---|
2008-09-06 | import of OpenSSL 0.9.8h | Damien Miller | |
2008-02-26 | fix memory leak (in one case of unaligned buffers); from Markus Kvetter | Theo de Raadt | |
ok markus | |||
2006-06-27 | resolve conflicts | Damien Miller | |
2006-06-08 | potential fd leak (we will fix this before we move to cloning) | Theo de Raadt | |
2005-05-23 | no need to byteswap for AES_ASM, from tom@ | Markus Friedl | |
2005-04-29 | resolve conflicts | Damien Miller | |
2005-04-29 | import of openssl-0.9.7g; tested on platforms from alpha to zaurus, ok deraadt@ | Damien Miller | |
2005-01-29 | adjust comment, open_dev_crypto() returns -1 on error. | Hans-Joerg Hoexer | |
ok markus@ | |||
2005-01-26 | on error set correct pointer to NULL. | Hans-Joerg Hoexer | |
From phk@freebsd.org ok markus@ | |||
2004-06-15 | machdep.xcrypt now has a different meaning: Instead of > 0 indicating | Theo de Raadt | |
that AES is there, we now have 3 flag bits: C3_HAS_AES, C3_HAS_SHA (SHA1 & SHA256), and C3_HAS_MM (RSA). Change this code to only look at C3_HAS_AES for now. | |||
2004-04-08 | merge 0.9.7d | Markus Friedl | |
2004-02-04 | remove some debug code and cleanup.. | Theo de Raadt | |
2004-02-03 | OK, this time the AES soft keys work with ssh and such. I spent over 3 | Theo de Raadt | |
hours learning that OpenSSL's internal functions for AES extended keys generate screwy byte order swapped data.. | |||
2004-02-03 | oops, software key gen bug | Theo de Raadt | |
2004-02-03 | Switch to using software generated extended keys (because the cpu cannot | Theo de Raadt | |
yet generate 192 & 256 bit keys). Ensure that 192 and 256 are in the nids table. This also accelerates performance for 128 a tiny bit: type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes aes-128-cbc 34921.48k 129617.82k 362059.93k 623649.81k 790397.77k aes-192-cbc 26227.43k 99215.33k 283242.84k 509881.15k 665323.22k aes-256-cbc 26133.22k 97458.06k 265990.84k 457824.69k 579835.09k | |||
2004-02-03 | If on an i386, detect existance of the VIA C3 xcrypt-* using sysctl of | Theo de Raadt | |
the machdep.xcrypt node. If they exist, use the xcrypt-cbc instruction to accelerate aes-{128,192,256}-cbc, for more than 100x performance increase. This code has no effect on any cpu... Tested thus far using openssl speed command, and of course, ssh. 778MB/sec AES-128-CBC performance at 8192 byte block size. | |||
2003-11-13 | remove obsolete files | Markus Friedl | |
2003-11-11 | merge 0.9.7c; minor bugsfixes; | Markus Friedl | |
API addition: ERR_release_err_state_table [make includes before you build libssl/libcrypto] | |||
2003-08-07 | support AES with 192 and 256 bit keys, too. | Markus Friedl | |
tested with kern.cryptodevallowsoft=1; ok deraadt@ | |||
2003-06-03 | nuke term 3, since we're all in ~deraadt/terms and I clued in now. | Bob Beck | |
2003-05-12 | merge 0.9.7b with local changes; crank majors for libssl/libcrypto | Markus Friedl | |
2003-05-11 | import 0.9.7b (without idea and rc5) | Markus Friedl | |
2003-04-08 | remove printf("bar\n"); | Markus Friedl | |
2003-04-06 | sprintf->snprintf. deraadt@ suggestions and ok | Hakan Olsson | |
2002-09-14 | merge with openssl-0.9.7-stable-SNAP-20020911, | Markus Friedl | |
new minor for libcrypto (_X509_REQ_print_ex) tested by miod@, pb@ | |||
2002-09-10 | merge openssl-0.9.7-beta3, tested on vax by miod@ | Markus Friedl | |
2002-09-05 | merge with 0.9.7-beta1 | Markus Friedl | |
2002-09-04 | sync formatting with 0.9.7 | Markus Friedl | |
2002-09-03 | remove whitespace changes (keep diffs to 0.9.7-beta1 minimal) | Markus Friedl | |
2002-09-03 | unused files, not part of OpenSSL 0.9.7 | Markus Friedl | |
2002-07-30 | sync with http://www.openssl.org/news/patch_20020730_0_9_7.txt | Markus Friedl | |
(adds fix for unused kerberos and engine code, and some more assertions, as well as a 64bit integer string fix for conf_mod.c) | |||
2002-07-16 | correct memset arguments; from Moritz Jodeit <moritz@jodeit.org> via PR/2822. | Federico G. Schwindt | |
2002-06-20 | remove support for RC4 via /dev/crypto, suggested by Niels; ok provos@ | Markus Friedl | |
2002-06-19 | do not syslog from libraries! | Theo de Raadt | |
2002-06-19 | KNF, -Wall, and other cleanups. still does not failover 100% correctly | Theo de Raadt | |
for operations when /dev/crypto is missing, for instance in chroot | |||
2002-06-19 | stupid stupid bug ja ja ja ja | Theo de Raadt | |
2002-06-18 | unbreak sshd with privsep: open /dev/crypto, keep fd, and call | Markus Friedl | |
CRIOGET per EVP_Init(); ok niklas@, miod@ | |||
2002-06-18 | per-evp state is now sizeof(struct dev_crypto_state) instead sizeof(struct ↵ | Markus Friedl | |
session_op) | |||
2002-06-13 | keep a FD per EVP_init, use a global FD for all asym operations; | Markus Friedl | |
ok beck@ | |||
2002-06-11 | KNF | Theo de Raadt | |
2002-06-11 | add "dsa_dsa_mod_exp" - This mimics the software dsa_mod_exp funtion | Bob Beck | |
using two mod_exp operations - otherwise we use BN_mod_exp2 entirely in software, which makes dsa verifications glacially slow while signatures, (which use mod_exp) are fast. This lets cards that can only do bn_mod_exp decently offload most of dsa. | |||
2002-06-11 | Make DSA work now... at least for things that can do bn_mod_exp. | Bob Beck | |
2002-06-11 | Make asymmetric crypto work in userland | Bob Beck | |
this will only be used if you both have a card that supports it with a working driver and you set sysctl kern.userasymcrypto=1 | |||
2002-06-09 | Pass the right arguments for RSA, DSA, and modexp operations. Fix the | Angelos D. Keromytis | |
translation between the crypto framework's format and the BN structure. | |||
2002-06-07 | Merge OpenSSL 0.9.7-stable-20020605, | Bob Beck | |
correctly autogenerate obj_mac.h | |||
2002-05-25 | do not assume scripts are executable | Theo de Raadt | |
2002-05-16 | add aes/bf/cast; ok deraadt@ | Markus Friedl | |
2002-05-16 | use hw_cryptodev | Theo de Raadt | |
2002-05-15 | import openssl-0.9.7-beta1 | Bob Beck | |
2002-05-15 | OpenSSL 0.9.7 stable 2002 05 08 merge | Bob Beck | |