summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/x86cpuid.pl (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Replace all uses of magic numbers when operating on OPENSSL_ia32_P[] bymiod2016-11-041-23/+33
| | | | | | | | | | | | | | | meaningful constants in a private header file, so that reviewers can actually get a chance to figure out what the code is attempting to do without knowing all cpuid bits. While there, turn it from an array of two 32-bit ints into a properly aligned 64-bit int. Use of OPENSSL_ia32_P is now restricted to the assembler parts. C code will now always use OPENSSL_cpu_caps() and check for the proper bits in the whole 64-bit word it returns. i386 tests and ok jsing@
* In OPENSSL_wipe_cpu() on i386, which noone uses anyway, check the propermiod2016-11-041-1/+1
| | | | | | flag for the presence of a FPU before deciding to wipe the fpu registers. ok jsing@
* Remove OPENSSL_instrument_halt and OPENSSL_far_spin, which both mightmiod2014-06-201-70/+0
| | | | have been used under DJGPP in the previous century (if at all).
* A few months back there was a big community fuss regarding direct-usederaadt2014-06-021-12/+0
| | | | | | | | | | | | of the intel RDRAND instruction. Consensus was RDRAND should probably only be used as an additional source of entropy in a mixer. Guess which library bends over backwards to provide easy access to RDRAND? Yep. Guess which applications are using this support? Not even one... but still, this is being placed as a trap for someone. Send this support straight to the abyss. ok kettenis
* So it turns out that libcrypto on i386 platforms, unconditionaly compiles thismiod2014-04-221-39/+0
| | | | | | | | | | | | | little gem called OPENSSL_indirect_call(), supposedly to be ``handy under Win32''. In my view, this is a free-win ROP entry point. Why try and return to libc when you can return to libcrypto with an easy to use interface? Better not give that much attack surface, and remove this undocumented entry point. ok beck@ tedu@
* Remove oh-so-important-from-a-security-pov OpenSSL_rtdsc() function.miod2014-04-171-11/+0
|
* Ok, there was a need for OPENSSL_cleanse() instead of bzero() to preventmiod2014-04-171-34/+0
| | | | | | | | | | | supposedly smart compilers from optimizing memory cleanups away. Understood. Ok, in case of an hypothetically super smart compiler, OPENSSL_cleanse() had to be convoluted enough for the compiler not to recognize that this was actually bzero() in disguise. Understood. But then why there had been optimized assembler versions of OPENSSL_cleanse() is beyond me. Did someone not trust the C obfuscation?
* Import OpenSSL 1.0.1gmiod2014-04-131-2/+4
|
* import OpenSSL-1.0.1cdjm2012-10-131-17/+61
|
* import OpenSSL-1.0.0adjm2010-10-011-11/+98
|
* import of OpenSSL 0.9.8hdjm2008-09-061-0/+225