summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/md32_common.h (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Remove md32_common.h since it is now (finally) unused.jsing2024-03-281-309/+0
|
* Remove MD32_REG_T.jsing2023-08-101-33/+1
| | | | | | | | | This is a hack that is only enabled on a handful of 64 bit platforms, as a workaround for poor compiler optimisation. If you're running an archiac compiler on an archiac architecture, then you can deal with slightly lower performance. ok tb@
* Add HASH_NO_UPDATE and HASH_NO_TRANSFORM to md32_common.hjsing2023-05-271-5/+7
| | | | | | | This makes it possible to still use minimal parts of md32_common.h, while disabling the update and transform functions. ok beck@ tb@
* Provide and use crypto_ro{l,r}_u{32,64}().jsing2023-04-121-10/+4
| | | | | | | | | | | | | | | Various code in libcrypto needs bitwise rotation - rather than defining different versions across the code base, provide a common set that can be reused. Any sensible compiler optimises these to a single instruction where the architecture supports it, which means we can ditch the inline assembly. On the chance that we need to provide a platform specific versions, this follows the approach used in BN where a MD crypto_arch.h header could be added in the future, which would then provide more specific versions of these functions. ok tb@
* spelling fixes; from paul tagliamontejmc2022-12-261-2/+2
| | | | | | | i removed the arithmetics -> arithmetic changes, as i felt they were not clearly correct ok tb
* Remove I386_ONLY define. It was only used to prefer amiod2016-11-041-3/+3
| | | | | | | faster-on-genuine-80386-but-slower-on-80486-onwards innstruction sequence in the SHA512 code, and had not been enabled in years, if at all. ok tom@ bcook@
* Less S390.jsing2016-09-041-15/+1
| | | | ok deraadt@
* Allow digest routines to provide their own HASH_FINAL routine; will bemiod2014-11-091-3/+5
| | | | | | necessary for upcoming GOST code. From Dmitry Eremin-Solenikov
* digests: *_LONG_LOG2 is not used, stop talking about it.bcook2014-10-201-4/+2
| | | | | | | | Modified patch from Dmitry Eremin-Solenikov leave the sole public define in ripemd.h ok deraadt@ miod@
* remove return value from HOST_c2l/l2c macrosbcook2014-08-181-32/+32
| | | | | | | | | | | These macros and asm inlines simulate a function returning a value, but nothing ever uses this return value. Remove the pseudo-returns and (void) casts discarding the unused values. This, maybe unsurprisingly, speeds things up a bit. It also removes the GCC 4.9 warnings about unused values. ok miod@ deraadt@
* Replace intrinsic ROTATE macros with an inline.bcook2014-08-121-41/+10
| | | | | Without the cast/mask, the compiler is allowed to optimize this directly to the correct CPU intrinsic for rotate.
* Explicitly include <openssl/opensslconf.h> in every file that referencesjsing2014-07-101-1/+3
| | | | | | | | | an OPENSSL_NO_* define. This avoids relying on something else pulling it in for us, plus it fixes several cases where the #ifndef OPENSSL_NO_XYZ is never going to do anything, since OPENSSL_NO_XYZ will never defined, due to the fact that opensslconf.h has not been included. This also includes some miscellaneous sorting/tidying of headers.
* tags as requested by miod and teduderaadt2014-06-121-1/+1
|
* Unifdef -UPEDANTIC. ok beck@ tedu@miod2014-04-231-22/+16
|
* More KNF.jsing2014-04-201-2/+2
|
* There are no plans to ever build this with the Metrojerks compiler.miod2014-04-171-12/+1
|
* Remove support for big-endian i386 and amd64.miod2014-04-171-5/+0
| | | | | | | | | | | | | Before someone suggests the OpenSSL people are junkies, here is what they mention about this: /* Most will argue that x86_64 is always little-endian. Well, * yes, but then we have stratus.com who has modified gcc to * "emulate" big-endian on x86. Is there evidence that they * [or somebody else] won't do same for x86_64? Naturally no. * And this line is waiting ready for that brave soul:-) */ So, yes, they are on drugs. But they are not alone, the stratus.com people are, too.
* First pass at applying KNF to the OpenSSL code, which almost makes itjsing2014-04-151-55/+50
| | | | | readable. This pass is whitespace only and can readily be verified using tr and md5.
* openssl-1.0.0e: resolve conflictsdjm2011-11-031-4/+11
|
* resolve conflicts, fix local changesdjm2010-10-011-6/+6
|
* update to openssl-0.9.8i; tested by several, especially krw@djm2009-01-051-1/+1
|
* resolve conflictsdjm2008-09-061-357/+116
|
* resolve conflictsdjm2005-04-291-1/+13
|
* merge 0.9.7b with local changes; crank majors for libssl/libcryptomarkus2003-05-121-5/+33
|
* OpenSSL 0.9.7 stable 2002 05 08 mergebeck2002-05-151-10/+12
|
* OpenSSL 0.9.5 mergebeck2000-03-191-14/+27
| | | | | | *warning* this bumps shared lib minors for libssl and libcrypto from 2.1 to 2.2 if you are using the ssl26 packages for ssh and other things to work you will need to get new ones (see ~beck/libsslsnap/<arch>) on cvs or ~beck/src-patent.tar.gz on cvs
* OpenSSL 0.9.4 mergebeck1999-09-291-0/+594