Skip to content
  1. Mar 09, 2016
  2. Mar 08, 2016
  3. Feb 20, 2016
    • Richard Levitte's avatar
      Always build library object files with shared library cflags · 45502bfe
      Richard Levitte authored
      
      
      This takes us away from the idea that we know exactly how our static
      libraries are going to get used.  Instead, we make them available to
      build shareable things with, be it other shared libraries or DSOs.
      
      On the other hand, we also have greater control of when the shared
      library cflags.  They will never be used with object files meant got
      binaries, such as apps/openssl or test/test*.
      
      With unified, we take this a bit further and prepare for having to
      deal with extra cflags specifically to be used with DSOs (dynamic
      engines), libraries and binaries (applications).
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      45502bfe
  4. Feb 18, 2016
  5. Feb 13, 2016
  6. Feb 10, 2016
  7. Feb 05, 2016
  8. Feb 01, 2016
  9. Jan 29, 2016
  10. Jan 26, 2016
    • Rich Salz's avatar
      Remove /* foo.c */ comments · 34980760
      Rich Salz authored
      
      
      This was done by the following
              find . -name '*.[ch]' | /tmp/pl
      where /tmp/pl is the following three-line script:
              print unless $. == 1 && m@/\* .*\.[ch] \*/@;
              close ARGV if eof; # Close file to reset $.
      
      And then some hand-editing of other files.
      
      Reviewed-by: default avatarViktor Dukhovni <viktor@openssl.org>
      34980760
  11. Jan 20, 2016
  12. Jan 17, 2016
  13. Jan 12, 2016
  14. Dec 18, 2015
  15. Dec 13, 2015
  16. Dec 10, 2015
  17. Dec 07, 2015
  18. Nov 23, 2015
  19. Nov 18, 2015
  20. Nov 16, 2015
  21. Oct 23, 2015
  22. Sep 26, 2015
  23. Sep 25, 2015
  24. Aug 10, 2015
  25. Jul 13, 2015
  26. May 22, 2015
    • Richard Levitte's avatar
      Fix the update target and remove duplicate file updates · 0f539dc1
      Richard Levitte authored
      
      
      We had updates of certain header files in both Makefile.org and the
      Makefile in the directory the header file lived in.  This is error
      prone and also sometimes generates slightly different results (usually
      just a comment that differs) depending on which way the update was
      done.
      
      This removes the file update targets from the top level Makefile, adds
      an update: target in all Makefiles and has it depend on the depend: or
      local_depend: targets, whichever is appropriate, so we don't get a
      double run through the whole file tree.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      0f539dc1
  27. May 14, 2015
  28. May 13, 2015
  29. Apr 20, 2015
  30. Apr 02, 2015
    • Andy Polyakov's avatar
      aes/asm/aesv8-armx.pl: optimize for Cortex-A5x. · 94376ccc
      Andy Polyakov authored
      
      
      ARM has optimized Cortex-A5x pipeline to favour pairs of complementary
      AES instructions. While modified code improves performance of post-r0p0
      Cortex-A53 performance by >40% (for CBC decrypt and CTR), it hurts
      original r0p0. We favour later revisions, because one can't prevent
      future from coming. Improvement on post-r0p0 Cortex-A57 exceeds 50%,
      while new code is not slower on r0p0, or Apple A7 for that matter.
      
      [Update even SHA results for latest Cortex-A53.]
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      94376ccc
  31. Mar 31, 2015
  32. Mar 28, 2015
  33. Mar 14, 2015
    • Emilia Kasper's avatar
      Fix undefined behaviour in shifts. · 8b37e5c1
      Emilia Kasper authored
      
      
      Td4 and Te4 are arrays of u8. A u8 << int promotes the u8 to an int first then shifts.
      If the mathematical result of a shift (as modelled by lhs * 2^{rhs}) is not representable
      in an integer, behaviour is undefined. In other words, you can't shift into the sign bit
      of a signed integer. Fix this by casting to u32 whenever we're shifting left by 24.
      
      (For consistency, cast other shifts, too.)
      
      Caught by -fsanitize=shift
      
      Submitted by Nick Lewycky (Google)
      
      Reviewed-by: default avatarAndy Polyakov <appro@openssl.org>
      8b37e5c1
  34. Feb 24, 2015