{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":363209918,"defaultBranch":"master","name":"openssl","ownerLogin":"tom-cosgrove-arm","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2021-04-30T17:14:57.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/81633263?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1711527440.0","currentOid":""},"activityList":{"items":[{"before":null,"after":"0bc996aacd667b040ac531271b20cc3e10a2486d","ref":"refs/heads/fix-bti-in-bsaes-asm","pushedAt":"2024-03-27T08:17:20.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"},"commit":{"message":"aarch64: fix BTI in bsaes assembly code\n\nChange-Id: I63f0fb2af5eb9cea515dec96485325f8efd50511","shortMessageHtmlLink":"aarch64: fix BTI in bsaes assembly code"}},{"before":null,"after":"64399d80149f422bc0214a23ca5ac784120ae011","ref":"refs/heads/fix-error-finalizing-cipher-loop","pushedAt":"2024-03-06T11:18:28.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"},"commit":{"message":"Fix \"Error finalizing cipher loop\" when running openssl speed -evp -decrypt\n\nWhen using CCM, openssl speed uses the loop function EVP_Update_loop_ccm() which\nsets a (fake) tag when decrypting. When using -aead (which benchmarks a different\nsequence than normal, to be comparable to TLS operation), the loop function\nEVP_Update_loop_aead() is used, which also sets a tag when decrypting.\n\nHowever, when using defaults, the loop function EVP_Update_loop() is used, which\ndoes not set a tag on decryption, leading to \"Error finalizing cipher loop\".\n\nTo fix this, set a fake tag value if we're doing decryption on an AEAD cipher in\nEVP_Update_loop(). We don't check the return value: this shouldn't really be able\nto fail, and if it does, the following EVP_DecryptUpdate() is almost certain to\nfail, so that can catch it.\n\nThe decryption is certain to fail (well, almost certain, but with a very low\nprobability of success), but this is no worse than at present. This minimal\nchange means that future benchmarking data should be comparable to previous\nbenchmarking data.\n\n(This is benchmarking code: don't write real apps like this!)\n\nFixes #23657\n\nChange-Id: Id581cf30503c1eb766464e315b1f33914040dcf7","shortMessageHtmlLink":"Fix \"Error finalizing cipher loop\" when running openssl speed -evp -d…"}},{"before":null,"after":"602d8596ebe9fa7bb93bb0fdf980d017a288e535","ref":"refs/heads/fix-overflow-in-bnrand-issue-23704","pushedAt":"2024-02-29T22:40:45.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"},"commit":{"message":"Fix overflow in bnrand()\n\nFixes #23704\n\nChange-Id: I0352fdf7cbca6c9db5f2d662e0a29ac318111382","shortMessageHtmlLink":"Fix overflow in bnrand()"}},{"before":null,"after":"370dba4e43bd4080526997e9652d855f6e847bd6","ref":"refs/heads/support-microsoft-cobalt-100","pushedAt":"2024-02-21T11:18:18.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"},"commit":{"message":"Apply the AES-GCM unroll8 optimisation to Microsoft Azure Cobalt 100\n\nPerformance improvements range from 18% to 32%.\n\nChange-Id: Ifb89eeac3c0625a582a25ff07cf7f9c9ec8f5ba6","shortMessageHtmlLink":"Apply the AES-GCM unroll8 optimisation to Microsoft Azure Cobalt 100"}},{"before":null,"after":"e7c4b63e4ce52eb8f58b41a28e0ab975fa7c810e","ref":"refs/heads/fix-aesv8-armx.pl-callee-saved-registers","pushedAt":"2024-01-08T13:49:49.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"},"commit":{"message":"Preserve callee-saved registers in aarch64 AES-CTR code\n\nThe AES-CTR assembly code uses v8-v15 registers, they are\ncallee-saved registers, they must be preserved before the\nuse and restored after the use.\n\nChange-Id: If9192d1f0f3cea7295f4b0d72ace88e6e8067493","shortMessageHtmlLink":"Preserve callee-saved registers in aarch64 AES-CTR code"}},{"before":"4c590768a6d5f0bce5c0acd6ba29361ccd55d1b8","after":null,"ref":"refs/heads/armcap-apple-silicon-m3","pushedAt":"2023-11-27T11:22:01.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"}},{"before":null,"after":"4c590768a6d5f0bce5c0acd6ba29361ccd55d1b8","ref":"refs/heads/armcap-apple-silicon-m3","pushedAt":"2023-11-10T08:50:24.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"},"commit":{"message":"Enable AES and SHA3 optimisations on Apple Silicon M3-based macOS systems\n\nAES gets a performance enhancement of 19-36%, similar to the M1 and M2.\n\nSHA3 gets an improvement of 4-7% on buffers 256 bytes or larger.\n\nTested on an M3 Pro, but the CPU cores are the same on M3 and M3 Max.\n\nChange-Id: I2bf40bbde824823bb8cf2efd1bd945da9f23a703","shortMessageHtmlLink":"Enable AES and SHA3 optimisations on Apple Silicon M3-based macOS sys…"}},{"before":"5689a0c3987b5daa22c52190533e3208b9a36cec","after":"a83d580260e3038187a1ac6d1766b2b75f49520b","ref":"refs/heads/move-align32-64-into-internal-common.h","pushedAt":"2023-09-01T08:24:23.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"},"commit":{"message":"Move ALIGN32 and ALIGN64 into common.h, and fix for clang-cl.exe\n\nclang-cl.exe defines __clang__ and _MSC_VER but not __GNUC__, so a clang-\nspecific guard is needed to get the correct ALIGNxx versions.\n\nFixes #21914\n\nChange-Id: Icdc047b182ad1ba61c7b1b06a1e951eda1a0c33d","shortMessageHtmlLink":"Move ALIGN32 and ALIGN64 into common.h, and fix for clang-cl.exe"}},{"before":"4b7917d5fe1dd049dd52bf48f73b85367421e55c","after":"5689a0c3987b5daa22c52190533e3208b9a36cec","ref":"refs/heads/move-align32-64-into-internal-common.h","pushedAt":"2023-08-31T21:57:30.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"},"commit":{"message":"Move ALIGN32 and ALIGN64 into common.h\n\nAlso make them compatible with clang-cl.exe (which defines __clang__ and\n_MSC_VER but not __GNUC__).\n\nFixes #21914\n\nChange-Id: Icdc047b182ad1ba61c7b1b06a1e951eda1a0c33d\nJira: SECLIB-799","shortMessageHtmlLink":"Move ALIGN32 and ALIGN64 into common.h"}},{"before":"4f6a33355ed26fb87d7cc1d8703bd4a0b59baa7f","after":"4b7917d5fe1dd049dd52bf48f73b85367421e55c","ref":"refs/heads/move-align32-64-into-internal-common.h","pushedAt":"2023-08-31T21:50:48.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"},"commit":{"message":"Move ALIGN32 and ALIGN64 into common.h\n\nAlso make them compatible with clang-cl.exe (which defines __clang__ and\n_MSC_VER but not __GNUC__).\n\nFixes #21914","shortMessageHtmlLink":"Move ALIGN32 and ALIGN64 into common.h"}},{"before":null,"after":"4f6a33355ed26fb87d7cc1d8703bd4a0b59baa7f","ref":"refs/heads/move-align32-64-into-internal-common.h","pushedAt":"2023-08-31T21:24:24.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"},"commit":{"message":"Move ALIGN32 and ALIGN64 into common.h\n\nFixes #21914","shortMessageHtmlLink":"Move ALIGN32 and ALIGN64 into common.h"}},{"before":"fa1a5ac595641dc12b5d667f338ab4c0156986ec","after":"e4a6f2fe12e87b242f8746b0a3dd0472d7d9f0cc","ref":"refs/heads/ssl3_to_tls_message_comments","pushedAt":"2023-08-31T14:10:20.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"},"commit":{"message":"Replace ssl3_get_message() with tls_get_message_header() and/or tls_get_message_body()\n\nUpdate commit messages that previously used ssl3_get_message()\nto now use tls_get_message_header() and tls_get_message_body()\ndue to the split in OpenSSL 1.1.0.\n\nCLA: trivial\n\nFixes #21582\n\nSigned-off-by: Sumitra Sharma ","shortMessageHtmlLink":"Replace ssl3_get_message() with tls_get_message_header() and/or tls_g…"}},{"before":null,"after":"fa1a5ac595641dc12b5d667f338ab4c0156986ec","ref":"refs/heads/ssl3_to_tls_message_comments","pushedAt":"2023-08-31T14:08:49.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"},"commit":{"message":"Update accurate function names in CHANGES.md\n\nSigned-off-by: Sumitra Sharma ","shortMessageHtmlLink":"Update accurate function names in CHANGES.md"}},{"before":null,"after":"ff106f9b4a81b4f4da6b34d1b19701520ea0e1f1","ref":"refs/heads/fix-arm-xlate-pl","pushedAt":"2023-08-04T11:07:50.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"},"commit":{"message":"Fix handling of the \"0:\" label in arm-xlate.pl\n\nWhen $label == \"0\", $label is not truthy, so `if ($label)` thinks there isn't\na label. Correct this by looking at the result of the s/// command.\n\nVerified that there are no changes in the .S files created during a normal\nbuild, and that the \"0:\" labels appear in the translation given in the error\nreport (and they are the only difference in the before and after output).\n\nFixes #21647\n\nChange-Id: I5f2440100c62360bf4bdb7c7ece8dddd32553c79","shortMessageHtmlLink":"Fix handling of the \"0:\" label in arm-xlate.pl"}},{"before":null,"after":"c5b4d06d574c86e44c466a269c7f2b55d539a342","ref":"refs/heads/backport-armcap-changes-to-3.1","pushedAt":"2023-07-28T07:30:14.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"},"commit":{"message":"Backport crypto/armcap.c from master branch at 7b508cd1e1 together with .pl fixes\n\nMakes the SIGILL-based code easier to read, and doesn't use it on Apple Silicon\nor where getauxval() is present, thereby improving stability when debugging on\nDarwin (macOS/iOS/etc) and in multi-threaded programs (both Darwin and Linux).\n\nFixes #21541\n\nChange-Id: I07912f0ddcbfe15bf3c1550533855a6583d21b67","shortMessageHtmlLink":"Backport crypto/armcap.c from master branch at 7b508cd together with …"}},{"before":"447b00ed0483a9b78baef1fff94296ef9dc81219","after":null,"ref":"refs/heads/fix-no-use-ipv6","pushedAt":"2023-07-24T08:28:00.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"}},{"before":null,"after":"447b00ed0483a9b78baef1fff94296ef9dc81219","ref":"refs/heads/fix-no-use-ipv6","pushedAt":"2023-07-20T05:35:54.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"},"commit":{"message":"Fix build when configured with -DOPENSSL_USE_IPV6=0\n\nChange-Id: I57723835b0a7d20609d8c4ed2988123f975a927d","shortMessageHtmlLink":"Fix build when configured with -DOPENSSL_USE_IPV6=0"}},{"before":"c6e01bad2fa64276330b180de55fcb5d879a2ee7","after":null,"ref":"refs/heads/dont-do-SIGILL-capability-detection-on-apple-silicon","pushedAt":"2023-06-26T17:51:30.386Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"}},{"before":null,"after":"c6e01bad2fa64276330b180de55fcb5d879a2ee7","ref":"refs/heads/dont-do-SIGILL-capability-detection-on-apple-silicon","pushedAt":"2023-06-22T02:33:42.415Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"},"commit":{"message":"Don't do SIGILL capability detection on Apple Silicon\n\nFixes #20753","shortMessageHtmlLink":"Don't do SIGILL capability detection on Apple Silicon"}},{"before":"c099da44ccd2e375aacf039a85d78b08b0f7b36e","after":null,"ref":"refs/heads/armcap_p-there-can-be-only-one","pushedAt":"2023-03-29T12:39:32.308Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"}},{"before":null,"after":"d6e2c1c3282a5ca1a5846ec974c92bcea52ad838","ref":"refs/heads/arm-sm4-check-should-be-aarch64-not-arm_max_arch_8-3.1","pushedAt":"2023-03-28T11:14:24.209Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"},"commit":{"message":"SM4 check should be for __aarch64__, not __ARM_MAX_ARCH__ >= 8\n\n(And then __arm__ and __arm tests are redundant)\n\nFixes #20604 for 3.1 branch","shortMessageHtmlLink":"SM4 check should be for __aarch64__, not __ARM_MAX_ARCH__ >= 8"}},{"before":null,"after":"c099da44ccd2e375aacf039a85d78b08b0f7b36e","ref":"refs/heads/armcap_p-there-can-be-only-one","pushedAt":"2023-03-28T07:08:48.355Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"},"commit":{"message":"Ensure there's only one copy of OPENSSL_armcap_P in libcrypto.a\n\nChange-Id: Ia94e528a2d55934435de6a2949784c52eb38d82f","shortMessageHtmlLink":"Ensure there's only one copy of OPENSSL_armcap_P in libcrypto.a"}},{"before":null,"after":"4e66d540b2eaa8700ceaf76324cea7872939b9ce","ref":"refs/heads/arm-sm4-check-should-be-aarch64-not-arm_max_arch_8","pushedAt":"2023-03-28T07:00:58.081Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tom-cosgrove-arm","name":"Tom Cosgrove","path":"/tom-cosgrove-arm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81633263?s=80&v=4"},"commit":{"message":"SM4 check should be for __aarch64__, not __ARM_MAX_ARCH__ >= 8\n\n(And then __arm__ and __arm tests are redundant)\n\nFixes #20604\n\nChange-Id: I4308e75b7fbf3be7b46490c3ea4125e2d91b00b8","shortMessageHtmlLink":"SM4 check should be for __aarch64__, not __ARM_MAX_ARCH__ >= 8"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEIHJLOAA","startCursor":null,"endCursor":null}},"title":"Activity · tom-cosgrove-arm/openssl"}