summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* Add linux-mips32be target for new platformOpenSSL-fips-2_0_16OpenSSL-fips-2_0-stableSteve Marquess2017-08-302-1/+9
| | | | | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Andy Polyakov <appro@openssl.org> (Merged from https://github.com/openssl/openssl/pull/3300) (cherry picked from commit d674242a884368083bf1044cc4e6e30d8f452a50)
* c6x/* "facelift":OpenSSL-fips-2_0_15Andy Polyakov2017-08-309-4/+115
| | | | | | | | | | | | | | - make scripts executable; - "parameterize" platform selection in c6x/do_fips; - add c6x/fips_algvs.mak; - add c6x/run6x.js launcher for more recent CCS versions; Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Stephen Henson <steve@openssl.org> (Merged from https://github.com/openssl/openssl/pull/4265) (cherry picked from commit 781280094ad389e8958631b97e70f498becbd9cb)
* Add some C64x assembly modules [by minor adjustments of C64x+ modules].Andy Polyakov2017-08-306-0/+3011
| | | | | | | | | | | | | | | | AES, SHA256 and SHA512 modules can actually replace corresponding C64x+ modules. This is because C64x+ instructions don't actually provide "killer-argument" advantage in these modules. As for SHA1, even though its performance exactly same, C64x+ module is more responsive to interrupts, i.e. doesn't inhibit them for as long periods as C64x module. Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Stephen Henson <steve@openssl.org> (Merged from https://github.com/openssl/openssl/pull/4265) (cherry picked from commit 5526e5791f1426553b6f4806d1ac82efd6ab33bc)
* Update to match latest CAVSOpenSSL-fips-2_0_14Steve Marquess2016-11-141-16/+0
| | | | Reviewed-by: Stephen Henson <steve@openssl.org>
* FIPS MIPS assembly pack refresh.Andy Polyakov2016-11-145-516/+165
| | | | | | | Backport CVE-2014-3570 bug and postability fixes. Reviewed-by: Rich Salz <rsalz@openssl.org> (cherry picked from commit 10fa6736b137ad55bfcb0e72b4587ec419f1b13e)
* PowerPC assembly pack: add POWER8 support.OpenSSL-fips-2_0_13Andy Polyakov2016-06-2121-36/+5096
| | | | | Reviewed-by: Dr. Stephen Henson <steve@openssl.org> (cherry picked from commit 4577871ca393275ac0436b2b08f1a75661ced314)
* Add target for i686 cross compilationOpenSSL-fips-2_0_12Steve Marquess2016-02-152-0/+6
| | | | Reviewed-by: Stephen Henson <steve@openssl.org>
* Add new iOS subdirectoryOpenSSL-fips-2_0_11Steve Marquess2015-07-041-1/+1
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Stephen Henson <steve@openssl.org>
* Add new VxWorks x86 platformAndy Polyakov2015-07-042-1/+3
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Stephen Henson <steve@openssl.org>
* util/incore update that allows FINGERPRINT_premain-free build.OpenSSL-fips-2_0_10Andy Polyakov2015-05-132-3/+6
| | | | | | | | | | | | As for complementary fips.c modification. Goal is to ensure that FIPS_signature does not end up in .bss segment, one guaranteed to be zeroed upon program start-up. One would expect explicitly initialized values to end up in .data segment, but it turned out that values explicitly initialized with zeros can end up in .bss. The modification does not affect program flow, because first byte was the only one of significance [to FINGERPRINT_premain]. Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* Add support for Android 5, both 32- and 64-bit cases.Andy Polyakov2015-05-135-3/+6
| | | | | | | | | | | | Special note about additional -pie flag in android-armv7. The initial reason for adding it is that Android 5 refuses to execute non-PIE binaries. But what about older systems and previously validated platforms? It should be noted that flag is not used when compiling object code, fipscanister.o in this context, only when linking applications, *supplementary* fips_algvs used during validation procedure. Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* Additional vxWorks target.Andy Polyakov2015-05-133-0/+67
| | | | Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* fipsalgtest.pl update.Andy Polyakov2015-05-131-37/+1
| | | | Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* Configure: add ios-cross target with ARM assembly support.Andy Polyakov2015-05-134-2/+20
| | | | Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* Add iOS-specific armv4cpud.S module.Andy Polyakov2015-05-131-0/+210
| | | | | | | | Normally it would be generated from a perlasm module, but doing so would affect existing armv4cpuid.S, which in turn would formally void previously validated platforms. Hense separate module is generated. Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* Adapt ARM assembly pack for iOS.Andy Polyakov2015-05-137-21/+136
| | | | | | | | | This is achieved by filtering perlasm output through arm-xlate.pl. But note that it's done only if "flavour" argument is not 'void'. As 'void' is default value for other ARM targets, permasm output is not actually filtered on previously validated platforms. Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* crypto/modes/modes_lcl.h: let STRICT_ALIGNMENT be on iOS.Andy Polyakov2015-05-131-7/+10
| | | | | | | | | | | | | While ARMv7 in general is capable of unaligned access, not all instructions actually are. And trouble is that compiler doesn't seem to differentiate those capable and incapable of unaligned access. As result exceptions could be observed in xts128.c and ccm128.c modules. Contemporary Linux kernels handle such exceptions by performing requested operation and resuming execution as is if it succeeded. While on iOS exception is fatal. Correct solution is to let STRICT_ALIGNMENT be on all ARM platforms, but doing so is in formal conflict with FIPS maintenance policy. Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* Add iOS-specific fips_algvs application.Andy Polyakov2015-05-137-0/+1252
| | | | Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* Configure: engage ARMv8 assembly pack in ios64-cross target.Andy Polyakov2015-05-132-3/+38
| | | | Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* Engage ARMv8 assembly pack.Andy Polyakov2015-05-134-6/+177
| | | | Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* Add ARMv8 assembly pack.Andy Polyakov2015-05-1310-0/+2359
| | | | Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* support for iOS 7.x/ARMv8OpenSSL-fips-2_0_9Dr. Stephen Henson2014-10-242-0/+4
| | | | | Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Steve Marquess <marquess@openssl.org
* Update fipsalgtest.pl to cope with changes in file names and formatDr. Stephen Henson2014-10-241-30/+86
| | | | | | | | | | | | | | | | | X9.31 tests need to look in files for '9.31' RSA-PSS tests may contain additonal text as well as "salt len: n". We now just look at the start of a filename for a match. Separate ECDSA2 test list. Reorder test to handle new formats: for example PQGVer for DSA2 can be detected based on file format but if this fails revert to PQGVER. For future debugging add a --debug-detect option which prints out more details of the test detection including the first few lines of each request file. Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Steve Marquess <marquess@openssl.org
* Remove Dual EC DRBG again...OpenSSL-fips-2_0_8Dr. Stephen Henson2014-07-118-2265/+2
| | | | Dual EC DRBG removal now accepted for 2.0.8 onwards.
* Add linux-x86_64-cross target.OpenSSL-fips-2_0_7Dr. Stephen Henson2014-05-122-0/+6
|
* Revert "Remove Dual EC DRBG from FIPS module."Dr. Stephen Henson2014-05-128-2/+2265
| | | | | | | Revert Dual EC DRBG removal commit as it was not accepted for 2.0.7 version of the module. This reverts commit 200f249b8c3b6439e0200d01caadc24806f1a983.
* QNX6-armv4 support.OpenSSL-fips-2_0_6Dr. Stephen Henson2013-12-163-1/+4
|
* Remove Dual EC DRBG from FIPS module.Dr. Stephen Henson2013-12-168-2265/+2
|
* eCos ARMv4/5 supportOpenSSL-fips-2_0_5Dr. Stephen Henson2013-12-163-0/+8
|
* sha1-armv4-large.pl: comply with ABI.Andy Polyakov2013-12-161-1/+1
| | | | (cherry picked from commit 1a9d60d2e3b02d5e1954fc71c92bf3a6af691495)
* Don't require tag before ciphertext in AESGCM modeDr. Stephen Henson2013-12-161-2/+2
| | | | (cherry picked from commit 964eaad78ccdc6c4537664924e6082b08cc1c8ee)
* Add MIPS support.OpenSSL-fips-2_0_4Dr. Stephen Henson2013-12-161-1/+2
|
* Support for WinEC7.OpenSSL-fips-2_0_3Dr. Stephen Henson2013-04-101-2/+8
|
* Add BSD-ppc85xx support and avoid copying overlapping buffers in fips_dssvs.cOpenSSL-fips-2_0_2Dr. Stephen Henson2012-10-144-13/+27
|
* update CHANGESOpenSSL-fips-2_0_1Dr. Stephen Henson2012-10-041-0/+24
|
* Add support for Windows CE and C64+ to FIPS module.Dr. Stephen Henson2012-10-0447-97/+4749
|
* file msincore was added on branch OpenSSL-fips-2_0-stable on 2012-10-04 ↵Dr. Stephen Henson2012-05-230-0/+0
| | | | 13:27:10 +0000
* file hmac_sha1.pl was added on branch OpenSSL-fips-2_0-stable on 2012-10-04 ↵Dr. Stephen Henson2012-05-230-0/+0
| | | | 13:27:10 +0000
* revert fipslink.pl unlink retry changeOpenSSL-fips-2_0-rc9OpenSSL-fips-2_0Dr. Stephen Henson2012-01-182-12/+2
|
* give a hand old assemblers assembling loop instruction. (original by Andy)Dr. Stephen Henson2012-01-181-4/+2
|
* typoOpenSSL-fips-2_0-rc8Dr. Stephen Henson2012-01-031-2/+2
|
* Prepare RC8Dr. Stephen Henson2012-01-031-1/+1
|
* unlink target and retry to avoid intermittent Win32 failuresDr. Stephen Henson2012-01-031-0/+9
|
* set version to rc8-devDr. Stephen Henson2011-12-121-2/+2
|
* Prepare for RC7.OpenSSL-fips-2_0-rc7Dr. Stephen Henson2011-12-121-2/+2
|
* Retry rename operation with a slight delay to workaround problems onDr. Stephen Henson2011-12-101-1/+8
| | | | some versions of Windows.
* use different names for asm temp files to avoid problems on some platformsDr. Stephen Henson2011-12-101-8/+11
|
* Close file streams in FIPS algorithm test utilities.Dr. Stephen Henson2011-12-082-0/+8
|
* prepare for RC6OpenSSL-fips-2_0-rc6Dr. Stephen Henson2011-12-041-1/+1
|
* For FIPS builds we don't use the normal test files (and in the restrictedDr. Stephen Henson2011-12-041-1/+1
| | | | | tarball some don't exist) so set TEST='' to avoid linking to them. This also avoids problems on platforms that copy instead of symlink.