aboutsummaryrefslogtreecommitdiff
path: root/src/common/aes.c
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2008-02-12 20:20:52 +0000
committerNick Mathewson <nickm@torproject.org>2008-02-12 20:20:52 +0000
commitf3eaeb99a3e3f11d3227778f4a0191c923df992b (patch)
treea9fed8c6e04bffc5d2649f71568099403af69978 /src/common/aes.c
parentdc94b1a226c21b5ac337d79f51bc10cd91b42e04 (diff)
downloadtor-f3eaeb99a3e3f11d3227778f4a0191c923df992b.tar.gz
tor-f3eaeb99a3e3f11d3227778f4a0191c923df992b.zip
r18051@catbus: nickm | 2008-02-12 15:20:43 -0500
Re-tune mempool parametes based on testing on peacetime: use smaller chuncks, free them a little more aggressively, and try very hard to concentrate allocations on fuller chunks. Also, lots of new documentation. svn:r13484
Diffstat (limited to 'src/common/aes.c')
-rw-r--r--src/common/aes.c6
1 files changed, 6 insertions, 0 deletions
diff --git a/src/common/aes.c b/src/common/aes.c
index 96d5ca4126..d1698604cd 100644
--- a/src/common/aes.c
+++ b/src/common/aes.c
@@ -28,8 +28,13 @@ const char aes_c_id[] = "$Id$";
/* We have 3 strategies for getting AES: Via OpenSSL's AES_encrypt function,
* via OpenSSL's EVP_EncryptUpdate function, or via the built-in AES
* implementation below. */
+
+/** Defined iff we're using openssl's AES functions for AES. */
#undef USE_OPENSSL_AES
+/** Defined iff we're using openssl's EVP code for AES. */
#undef USE_OPENSSL_EVP
+/** Defined iff we're using Tor's internal AES implementation, defined
+ * below. */
#undef USE_BUILTIN_AES
/* Figure out our CPU type. We use this to pick an AES implementation.
@@ -130,6 +135,7 @@ static void rijndaelEncrypt(const u32 rk[/*4*(Nr + 1)*/], int Nr,
/*======================================================================*/
/* Interface to AES code, and counter implementation */
+/** Implements an aes counter-mode cipher. */
struct aes_cnt_cipher {
/** This next element (howevever it's defined) is the AES key. */
#if defined(USE_OPENSSL_EVP)