summaryrefslogtreecommitdiffstats
path: root/crypto/evp/e_aes_cbc_hmac_sha1.c
AgeCommit message (Collapse)Author
2013-10-12evp/e_aes_cbc_hmac_sha*.c: limit multi-block fragmentation to 1KB.Andy Polyakov
Excessive fragmentation put additional burden (of addtional MAC calculations) on the other size and limiting fragments it to 1KB limits the overhead to ~6%.
2013-10-08evp/e_aes_cbc_hmac_sha*.c: harmonize names, fix bugs.Andy Polyakov
2013-10-03evp/e_aes_cbc_hmac_sha*.c: multi-block glue code.Andy Polyakov
2013-03-18e_aes_cbc_hmac_sha1.c: fix rare bad record mac on AES-NI plaforms.Andy Polyakov
PR: 3002
2013-02-08e_aes_cbc_hmac_sha1.c: align calculated MAC at cache line.Andy Polyakov
It also ensures that valgring is happy.
2013-02-06e_aes_cbc_hmac_sha1.c: cleanse temporary copy of HMAC secret.Andy Polyakov
(cherry picked from commit 529d27ea472fc2c7ba9190a15a58cb84012d4ec6)
2013-02-06e_aes_cbc_hmac_sha1.c: address the CBC decrypt timing issues.Andy Polyakov
Address CBC decrypt timing issues and reenable the AESNI+SHA1 stitch. (cherry picked from commit 125093b59f3c2a2d33785b5563d929d0472f1721)
2012-04-15e_aes_cbc_hmac_sha1.c: handle zero-length payload and engage empty fragAndy Polyakov
countermeasure. PR: 2778
2011-09-01Stop warnings.Dr. Stephen Henson
2011-08-23Add RC4-MD5 and AESNI-SHA1 "stitched" implementations.Andy Polyakov