• Home
  • History
  • Annotate
  • only in /external/openssl/crypto/sha/
History log of /external/openssl/crypto/sha/
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
3f9e6ada2c9f7183a41081263585e6a70bbd9f59 19-Jun-2014 Kenny Root <kroot@google.com> Update ARM assembly patch

Change-Id: I9facdfa167df5fd95a9f573045093d4e4c5dc345
sm/sha1-armv4-large.S
sm/sha1-armv4-large.pl
sm/sha1-armv8.S
sm/sha1-armv8.pl
sm/sha256-armv4.S
sm/sha256-armv4.pl
sm/sha256-armv8.S
sm/sha512-armv4.S
sm/sha512-armv4.pl
sm/sha512-armv8.S
sm/sha512-armv8.pl
c34190ed12e47436253524e764732bbb7990dcae 28-May-2014 Kenny Root <kroot@google.com> Fix x86 and x86_64 assembly generation

The CFLAGS need to be passed to the x86 assembly generating script so it
can select the right features.

Also add define flags to both x86 and x86_64 so it uses the VPAES and
BSAES implementations if applicable.

Change-Id: Iea2de77609be9c8595e6db0e4542fdff90b60611
sm/sha1-586.S
sm/sha512-586.S
ff41a4bc41ae1e1391f9b05117623ff70b985983 07-Jan-2014 Kenny Root <kroot@google.com> Import OpenSSL 1.0.1f

Upgrade to the new OpenSSL 1.0.1f release. SHA-1 hash of file:
9ef09e97dfc9f14ac2c042f3b7e301098794fc0f openssl-1.0.1f.tar.gz

Some changes had to be made to the existing source:

Fixed the import script to work with "sh -x" for debugging problems.

Update some of the files from patches/ to work with 1.0.1f, because
1.0.1f fixes have used some of the constants that were used (0x20L was
changed to 0x80L and 0x40L was changed to 0x100L).

Delete the "Makefile.save" files that are newly present in the
OpenSSL 1.0.1f release tarball.

Change-Id: Ib0f13b91e863157da23ec1d736ff2d788897d9f1
sm/sha1-parisc.pl
sm/sha1-x86_64.pl
sm/sha256-mips.S
sm/sha512-mips.pl
sm/sha512-parisc.pl
ha512.c
1762a559ef393f9c15300398433598989033385f 19-Feb-2013 David 'Digit' Turner <digit@android.com> Convert ISO-8859-1 files to UTF-8.

This patch modifies import_openssl.sh to convert all untarred OpenSSL
source files that are in ISO-8859-1 encoding into UTF-8.

The main reason for this is that the Chromium review tool doesn't support
anything else (i.e. "git cl upload" will barf with a mysterious Python
exception if the uploaded diff files aren't UTF-8).

This makes it easier to import the Android sources into the Chromium tree,
and should have no impact on the build products.

Change-Id: I43df753c41f5d9ed853a4252d7d05c5bbced98b4
sm/sha1-586.pl
sm/sha256-586.pl
sm/sha512-586.pl
04ef91b390dfcc6125913e2f2af502d23d7a5112 05-Feb-2013 Brian Carlstrom <bdc@google.com> openssl-1.0.1d upgrade

Change-Id: Ie980c8834cf2c843858182d98d1f60c65a2a9b70
sm/sha1-armv4-large.S
sm/sha1-armv4-large.pl
sm/sha1-ia64.pl
sm/sha1-sparcv9a.pl
sm/sha1-x86_64.pl
sm/sha512-586.pl
sm/sha512-x86_64.pl
ha1_one.c
ha1dgst.c
ha256.c
ha_dgst.c
ha_locl.h
153b100b9bdd15db2ad0c0963e299ed6841a794d 23-Jan-2013 David 'Digit' Turner <digit@android.com> Fix x86_64 assembly file generation.

The "sha512-x86_64.pl" script actually needs the name of the output
file as its second parameter to determine whether to generate SHA-256
or SHA-512 routines.

This patch does the following:

- Fix import_openssl.sh to invoke the script properly
- Add the generation of sha256-x86_64.S as well.

Note that this patch is the result of running:

./import_openssl.sh import /path/to/openssl-1.0.1c.tar.gz

Which means that no other source files were impacted by the change.

Only needed for the Chromium x86_64 "linux_redux" build and the
SPDY host proxy program (flip_in_mem_edsm_server).

Change-Id: Ia40737f5952c7b156bd51844571e4f759910a6a1
sm/sha256-x86_64.S
sm/sha512-x86_64.S
20777798f5184ef65e59bb5eb91ac9e839d7afeb 10-Dec-2012 David 'Digit' Turner <digit@android.com> Add x86_64 assembly files.

This patch modifies import_openssl.sh to also generate assembly
files for x86_64 (using the appropriate Perl scripts).

These new sources are not used by the Android build, but by the
Chromium "linux_redux" build which uses OpenSSL has its SSL engine.

Change-Id: I3d1435de17f2de10633a71b9197b6cec328e93a7
sm/sha1-x86_64.S
sm/sha512-x86_64.S
9838b9f4b038825b061a6b323842f9d23729eac0 05-Oct-2012 David 'Digit' Turner <digit@google.com> Rename assembly files with .S extensions.

The openssl files were generated with an .s extension,
which tells GCC that they normally don't need to be sent
to the pre-processor (i.e. they are passed directly to the
assembler).

Unfortunately, all these files _do_ need to be preprocessed,
which is why 'LOCAL_AS_CFLAGS := -x assembler-with-cpp' was
required in Crypto.mk.

As simpler way to solve the issue is simply to use an .S
extension when generating the assembly files. GCC knows
that these must be pre-processed first.

So the patch does:

- Rename all .s files to .S
- Remove the use of -x assembler-with-cpp from Crypto.mk
- Modify import_openssl.sh to directly generate .S files
(tested)

Context: This makes it easier to reuse the exact same sources
for Chrome on Android. Its gyp build system doesn't
have a feature comparable to LOCAL_AS_CFLAGS.

Change-Id: I708d9fbcf8d42b5c39a7d30df2b03ed79a3e62f0
sm/sha1-586.S
sm/sha1-586.s
sm/sha1-armv4-large.S
sm/sha1-armv4-large.s
sm/sha1-mips.S
sm/sha1-mips.s
sm/sha256-586.S
sm/sha256-586.s
sm/sha256-armv4.S
sm/sha256-armv4.s
sm/sha256-mips.S
sm/sha256-mips.s
sm/sha512-586.S
sm/sha512-586.s
sm/sha512-armv4.S
sm/sha512-armv4.s
c58cd0fd2cebb61b0e0f200e01562c542525ef46 13-Sep-2012 Catalin Ionita <catalin.ionita@intel.com> Enable openssl crypto optimizations for x86 platform

Asm files attached to this patch were generated from the
current OpenSSL version.

Change-Id: I05ef67a6e34016ef94a0ef23ca264bcac805b1cc
Signed-off-by: Catalin Ionita <catalin.ionita@intel.com>
sm/sha1-586.s
sm/sha256-586.s
sm/sha512-586.s
2178392bec7b69d0f469bce29f653c9fbd09b614 02-Aug-2012 Chris Dearman <chris@mips.com> [MIPS] Append private_ to AES_set_encrypt_key and AES_set_decrypt_key for MIPS.
Update import script to generate o32 .s files for MIPS.

Release 1.0.1 of openssl renamed the C and assembler routines for
AES_set_encrypt_key() and AES_set_decrypt_key(), but forgot to do this in the
Mips assembler version. The following mips_private.patch fixes that
problem in the upstream source, until such time as it is fixed upstream.

The upstream version of openssl builds for a "n32" Mips abi used on SGI
workstations. Android's import_openssl.sh script is now modified to
build for the "o32" abi used throughout Mips Android. That change is
permanent, and will not be upstreamed.

Signed-off-by: Raghu Gandham <raghu@mips.com>

Change-Id: Iec5ce7f11a74a3674e96057f2ce97d8ba9238464
sm/sha256-mips.s
392aa7cc7d2b122614c5393c3e357da07fd07af3 16-Mar-2012 Brian Carlstrom <bdc@google.com> openssl-1.0.1 upgrade

Bug: 6168278

Change-Id: I648f9172828120df5d19a14425e9ceec92647921
sm/sha1-586.pl
sm/sha1-alpha.pl
sm/sha1-armv4-large.pl
sm/sha1-armv4-large.s
sm/sha1-ia64.pl
sm/sha1-parisc.pl
sm/sha1-ppc.pl
sm/sha1-s390x.pl
sm/sha1-x86_64.pl
sm/sha256-586.pl
sm/sha256-armv4.pl
sm/sha256-armv4.s
sm/sha512-armv4.pl
sm/sha512-armv4.s
sm/sha512-parisc.pl
sm/sha512-ppc.pl
sm/sha512-s390x.pl
sm/sha512-sparcv9.pl
sm/sha512-x86_64.pl
ha.h
ha1dgst.c
ha256.c
ha512.c
ha_dgst.c
ha_locl.h
b83a02d94f9ba66fc5da46c2e27572674ea17931 21-Feb-2012 Petar Jovanovic <petar.jovanovic@rt-rk.com> From 67b1ae72527c9e173ace98e805e8b9c090455873 Mon Sep 17 00:00:00 2001
Subject: [MIPS] MIPS assembler pack update

Asm changes have been taken from http://cvs.openssl.org/chngview?cn=21708
These should discarded when the code base moves to OpenSSL 1.0.1 or above.

Additional changes have also been added to the Android make files, so it builds
correctly for MIPS architecture.

Change-Id: Ifc139e624d50510727180b03b15e15f7bbeda4d1
Signed-Off-By: Petar Jovanovic <petarj@mips.com>
sm/sha1-mips.pl
sm/sha1-mips.s
sm/sha256-mips.s
sm/sha512-mips.pl
ce96fb211b9a44bbd7fb5ef7ed0e6c1244045c2e 29-Nov-2011 Ben Cheng <bccheng@google.com> Adjust SP before content is written below it.

From Valgrind:
I/valgrind( 1837): ==1838== Invalid write of size 4
I/valgrind( 1837): ==1838== at 0x4E312A4: sha1_block_data_order
(sha1-armv4-large.s:109)
I/valgrind( 1837): ==1838== Address 0xbdd6abb8 is just below the stack
ptr. To suppress, use: --workaround-gcc296-bugs=yes

This is probably just a cosmetic fix to make Valgrind happy.

BUG: 5505776
Change-Id: Ice2fa65ab753a7c4cb92f531179db8b200f8b2c5
sm/sha1-armv4-large.pl
sm/sha1-armv4-large.s
43c12e3d4f9bbbbd4a8ba7b149686437514bc6b6 16-Nov-2010 Brian Carlstrom <bdc@google.com> Upgrade to openssl-1.0.0b

Bug: 3201137
Change-Id: I20cd6bed7717e5982abc3734e9a6522067f2908e
sm/sha1-armv4-large.pl
sm/sha1-armv4-large.s
sm/sha1-sparcv9.pl
sm/sha1-sparcv9a.pl
sm/sha256-armv4.pl
sm/sha256-armv4.s
sm/sha512-armv4.pl
sm/sha512-armv4.s
sm/sha512-sparcv9.pl
c37be730bf5139f96c16a95faae9e916b6162869 17-Sep-2010 Brian Carlstrom <bdc@google.com> Remove SHA0 from openssl

Recent a bug was found that would have been much more obvious if not
for the confusion that "sha" means "SHA-0" in openssl and "SHA" means
"SHA-1" to Java programmers. Removing SHA-0 should be not be an
interoperability issue, it was never really used, was apparently
flawed, so like MD2 we will just remove it.

Bug: 2997009

Change-Id: I630c851fb2f5f344ef7a2c62c7092843cb40818c
ha_one.c
221304ee937bc0910948a8be1320cb8cc4eb6d36 15-Apr-2010 Brian Carlstrom <bdc@google.com> openssl-1.0.0 upgrade

external/openssl

Updated version to 1.0.0
openssl.version

Updated small records patch for 1.0.0. This is probably the most significant change.
patches/small_records.patch

Removed bad_version.patch since fix is included in 0.9.8n and beyond
patches/README
patches/bad_version.patch
openssl.config

Changed import_openssl.sh to generate armv4 asm with the 1.0.0
scripts, not our backported 0.9.9-dev backported version in
patches/arm-asm.patch.
import_openssl.sh
openssl.config
patches/README
patches/arm-asm.patch

Added -DOPENSSL_NO_STORE to match ./Configure output
Added -DOPENSSL_NO_WHIRLPOOL (no-whrlpool) to skip new optional cipher
android-config.mk
openssl.config

Fixed import to remove include directory during import like other
imported directories (apps, ssl, crypto)
import_openssl.sh

Updated UNNEEDED_SOURCES. Pruned Makefiles which we don't use.
openssl.config

Updated to build newly required files
patches/apps_Android.mk
patches/crypto_Android.mk

Disable some new openssl tools
patches/progs.patch

Updated upgrade testing notes to include running BigInteger tests
README.android

Automatically imported
android.testssl/
apps/
crypto/
e_os.h
e_os2.h
include/
ssl/

dalvik

Change makeCipherList to skip SSLv2 ciphers that 1.0.0 now returns
so there are not duplicate ciphersuite names in getEnabledCipherSuites.
libcore/x-net/src/main/native/org_apache_harmony_xnet_provider_jsse_NativeCrypto.cpp

Updated OpenSSLSocketImpl_cipherauthenticationmethod for new
SSL_CIPHER algorithms -> algorithm_auth (and const-ness)
libcore/x-net/src/main/native/org_apache_harmony_xnet_provider_jsse_NativeCrypto.cpp

Update to const SSL_CIPHER in OpenSSLSessionImpl_getCipherSuite (and cipherauthenticationmethod)
libcore/x-net/src/main/native/org_apache_harmony_xnet_provider_jsse_NativeCrypto.cpp

test_EnabledCipherSuites on both SSLSocketTest and
SSLServerSocketTest caught the makeCipherList problem. However the
asserts where a bit out of sync and didn't give good messages
because they didn't actually show what was going on. As part of
debugging the issue they found, I tried to make align the asserts
and improve their output for the future.

libcore/x-net/src/test/java/tests/api/javax/net/ssl/SSLServerSocketTest.java
libcore/x-net/src/test/java/tests/api/javax/net/ssl/SSLSocketTest.java

vendor/google

Add const to X509V3_EXT_METHOD* for 1.0.0 compatibility
libraries/libjingle/talk/base/openssladapter.cc

Change-Id: I90fb1566dede6034eebc96d2b0dcf4533d9643bf
akefile
sm/sha1-586.pl
sm/sha1-armv4-large.pl
sm/sha1-armv4-large.s
sm/sha1-ppc.pl
sm/sha1-s390x.pl
sm/sha1-sparcv9.pl
sm/sha1-sparcv9a.pl
sm/sha1-thumb.pl
sm/sha1-x86_64.pl
sm/sha256-586.pl
sm/sha256-armv4.pl
sm/sha256-armv4.s
sm/sha512-586.pl
sm/sha512-armv4.pl
sm/sha512-armv4.s
sm/sha512-ppc.pl
sm/sha512-s390x.pl
sm/sha512-sparcv9.pl
sm/sha512-sse2.pl
sm/sha512-x86_64.pl
ha.h
ha1_one.c
ha1dgst.c
ha1s.cpp
ha256.c
ha512.c
ha_dgst.c
ha_locl.h
hatest.c
98d58bb80c64b02a33662f0ea80351d4a1535267 09-Mar-2010 Brian Carlstrom <bdc@google.com> Summary: upgrading to openssl-0.9.8m and adding new testssl.sh

Testing Summary:
- Passed new android.testssl/testssl.sh
- General testing with BrowserActivity based program

Details:

Expanded detail in README.android about how to build and test openssl
upgrades based on my first experience.

modified: README.android

Significant rework of import_openssl.sh script that does most of
the work of the upgrade. Most of the existing code became the main
and import functions. The newly regenerate code helps regenerate
patch files, building on the fact that import now keeps and
original unmodified read-only source tree for use for patch
generation. Patch generation relies on additions to openssl.config
for defining which patches include which files. Note that
sometimes a file may be patched multiple times, in that case
manual review is still necessary to prune the patch after
auto-regeneration. Other enhancements to import_openssl.sh include
generating android.testssl and printing Makefile defines for
android-config.mk review.

modified: import_openssl.sh

Test support files for openssl/

Add support for building /system/bin/ssltest as test executible for
use by testssl script. Need confirmation that this is the right way
to define such a test binary.

modified: patches/ssl_Android.mk

Driver script that generates user and CA keys and certs on the
device with /system/bin/openssl before running testssl. Based on
openssl/test/testss for generation and openssl/test/Makefile
test_ssl for test execution.

new file: patches/testssl.sh

Note all following android.testssl files are automatically
imported from openssl, although possible with modifications by
import_openssl.sh

testssl script imported from openssl/test that does the bulk of
the testing. Includes new tests patched in for our additions.

new file: android.testssl/testssl

CA and user certificate configuration files from openssl.
Automatically imported from openssl/test/

new file: android.testssl/CAss.cnf
new file: android.testssl/Uss.cnf

certificate and key test file imported from openssl/apps

new file: android.testssl/server2.pem

Actual 0.9.8m upgrade specific bits

Trying to bring ngm's small records support into 0.9.8m. Needs
signoff by ngm although it does pass testing.

modified: patches/small_records.patch

Update openssl.config for 0.9.8m. Expanded lists of undeeded
directories and files for easier update and review, adding new
excludes. Also added new definitions to support "import_openssl.sh
regenerate" for patch updating.

modified: openssl.config

Updated OPENSSL_VERSION to 0.9.8m

modified: openssl.version

Automatically imported/patched files. Seems like it could be
further pruned in by openssl.config UNNEEDED_SOURCES, but extra
stuff doesn't end up impacting device.

modified: apps/...
modified: crypto/...
modified: include/...
modified: ssl/...

Other Android build stuff.

Note for these patches/... is source, .../Android.mk is derived.

Split LOCAL_CFLAGS additions into lines based on openssl/Makefile
source for easier comparison when upgrading. I knowingly left the
lines long and unwrapped for easy vdiff with openssl/Makefile

modified: android-config.mk

Removed local -DOPENSSL_NO_ECDH already in android-config.mk.

modified: patches/apps_Android.mk

Sync up with changes that had crept into derived crypto/Android.mk

modified: patches/crypto_Android.mk

Change-Id: I73204c56cdaccfc45d03a9c8088a6a93003d7ce6
ha512.c
e45f106cb6b47af1f21efe76e933bdea2f5dd1ca 30-Sep-2009 Nagendra Modadugu <ngm@google.com> Upgrade to openssl-0.9.8k.
The source tree (and the size of the compiled library)
can be reduced further. This will be done in a future
commit.
akefile
sm/sha1-586.pl
sm/sha1-ia64.pl
sm/sha1-x86_64.pl
sm/sha512-x86_64.pl
ha.h
ha1_one.c
ha1dgst.c
ha256.c
ha512.c
ha_dgst.c
ha_locl.h
656d9c7f52f88b3a3daccafa7655dec086c4756e 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
akefile
sm/README
sm/sha1-586.pl
sm/sha1-ia64.pl
sm/sha1-x86_64.pl
sm/sha512-ia64.pl
sm/sha512-sse2.pl
sm/sha512-x86_64.pl
ha.c
ha.h
ha1.c
ha1_one.c
ha1dgst.c
ha1s.cpp
ha1test.c
ha256.c
ha256t.c
ha512.c
ha512t.c
ha_dgst.c
ha_locl.h
ha_one.c
hatest.c
d2cbe6ee0fd4269543a9a243f2b0963ce6f46280 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
akefile
sm/README
sm/sha1-586.pl
sm/sha1-ia64.pl
sm/sha1-x86_64.pl
sm/sha512-ia64.pl
sm/sha512-sse2.pl
sm/sha512-x86_64.pl
ha.c
ha.h
ha1.c
ha1_one.c
ha1dgst.c
ha1s.cpp
ha1test.c
ha256.c
ha256t.c
ha512.c
ha512t.c
ha_dgst.c
ha_locl.h
ha_one.c
hatest.c
f48372ded3bb76c2598392aa58abe6e2eb7432d2 21-Oct-2008 The Android Open Source Project <initial-contribution@android.com> Initial Contribution
sm/sha1-x86_64.pl
sm/sha512-x86_64.pl
bdfb8ad83da0647e9b9a32792598e8ce7ba3ef4d 12-Jan-1970 Upstream <upstream-import@none> external/openssl 0.9.8h
akefile
sm/README
sm/sha1-586.pl
sm/sha1-ia64.pl
sm/sha1-x86_64.pl
sm/sha512-ia64.pl
sm/sha512-sse2.pl
sm/sha512-x86_64.pl
ha.c
ha.h
ha1.c
ha1_one.c
ha1dgst.c
ha1s.cpp
ha1test.c
ha256.c
ha256t.c
ha512.c
ha512t.c
ha_dgst.c
ha_locl.h
ha_one.c
hatest.c