Age | Commit message (Collapse) | Author |
|
Colin Percival (this would have caused more problems than solved,
and isn't really necessary anyway)
|
|
(CVE-2006-4339)
Submitted by: Ben Laurie, Google Security Team
Reviewed by: bmoeller, mjc, shenson
|
|
|
|
|
|
PR: 1380
|
|
pedantic mode.
|
|
|
|
|
|
Fix warnings.
|
|
Submitted by: Corinna Vinschen
|
|
|
|
|
|
check for SSE bit instead of MMX, as pshufw was introduces in PIII, minor
optimization, typos...
|
|
|
|
|
|
|
|
|
|
256 byte S-box. AES_cbc_encrypt needs further work as it should also use
slow routines when processing smaller amount of data.
|
|
verify logic to try to use an unexpired CRL if possible.
|
|
|
|
|
|
|
|
Submitted by: NTT
|
|
them.
|
|
strong impact on decrypt performance, 20-25%. One probably should consider
switching between slower and faster routines depending on how much data
we were asked to process.
|
|
|
|
|
|
|
|
|
|
|
|
those referencing compact, 256-byte, S-boxes.
|
|
supplied list.
|
|
|
|
Send ctrls to EVP_PKEY_METHOD during signing of PKCS7 structure so
customisation is possible.
|
|
|
|
PR: 1071
|
|
|
|
|
|
|
|
|
|
EVP_PKEY_cmp().
|
|
|
|
|
|
|
|
large FD: it's non-blocking mode anyway
|
|
only chance for T[ed]4 to get evicted in this module is when its cache
"overlaps" with last 128 bits of key schedule.
|
|
prefetch could have been moved closer to Td4 references. Something for
later consideration...
|
|
|
|
the source.
|
|
|