aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Split up util.h into 3 fileslloyd2009-09-1729-41/+50
| | | | | | | - rounding.h (round_up, round_down) - workfactor.h (dl_work_factor) - timer.h (system_time) And update all users of the previous util.h
* Move memory locking function decls to mlock.hlloyd2009-09-176-26/+47
| | | | Inline round_up and round_down
* Update OpenSSL engine with encrypt_n interface for block ciphers.lloyd2009-09-172-12/+46
| | | | | | Add support for SHA-2 and SEED. Wrap block cipher usage in checks for OPENSSL_NO_XXX
* Remove some debug code from benchmark examplelloyd2009-09-151-6/+0
|
* In BMW-512, don't use the stack, instead use class SecureBuffers to reducelloyd2009-09-152-70/+70
| | | | info leakage.
* Add an implementation of Blue Midnight Wish (512 bit version only)lloyd2009-09-158-24/+2164
|
* propagate from branch 'net.randombit.botan.1_8' (head ↵lloyd2009-09-15106-1641/+4092
|\ | | | | | | | | | | ef51dd2869ed38dae3aeb1c3b931ca9d595580e1) to branch 'net.randombit.botan' (head fc1942640045423f411fd865cbd584090b28d7eb)
| * Update version #s to 1.9.1-prelloyd2009-09-133-4/+7
| |
| * Enable SSE2 engine under VC++lloyd2009-09-131-0/+1
| |
| * Make some changes to the SSE2 implementation of SHA-1 for compatability withlloyd2009-09-131-62/+46
| | | | | | | | Visual C++.
| * Update for 1.9.0 release 2009-09-091.9.0lloyd2009-09-103-3/+6
| |
| * Add example of the package transformlloyd2009-09-101-0/+61
| |
| * propagate from branch 'net.randombit.botan.1_8' (head ↵lloyd2009-09-103-4/+4
| |\ | | | | | | | | | | | | | | | c7f7c5092848b9c230d1757c74ed25ee9ea52262) to branch 'net.randombit.botan' (head a1315b63e5c3a6101df388c70ad69dc039437fe8)
| * | Add parallel block toggles for CBC and CFB (decrypt direction only)lloyd2009-09-101-1/+7
| | |
| * | Add a couple of Serpent/XTS test vectors (SQLite data pages)lloyd2009-09-101-0/+273
| | |
| * | The first argument of Library_State::set_option was accidentally beinglloyd2009-09-092-2/+2
| | | | | | | | | | | | | | | passed as a 'const std::string' instead of a const reference. Can't fix in 1.8 since it is ABI breaking.
| * | Throw Internal_Error instead of Algorithm_Not_Found if no usable RNGlloyd2009-09-081-1/+1
| | | | | | | | | | | | is enabled in the build.
| * | Add a log line telling the user that we are assuming unaligned memorylloyd2009-09-081-4/+19
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | accesses, if we are. Add new options --with-unaligned-mem and --without-unaligned-mem to override the arch-specific guess. The only usage I specifically know for this is to allow unaligned accesses on m68k machines, when use on Coldfire is not expected. Other cases where most CPUs of a particular type support unaligned accesses but a specific target doesn't (or it is very slow) can also use this.
| * | Add *s before comment lines in file headerslloyd2009-09-084-8/+8
| | |
| * | propagate from branch 'net.randombit.botan.1_8' (head ↵lloyd2009-09-046-4/+24
| |\ \ | | | | | | | | | | | | | | | | | | | | 75371777750b63ef94693602202c5104f217a987) to branch 'net.randombit.botan' (head 3f53f01c349eeee89288b1922fbde45b283c958c)
| * | | According to the Linux sources, S/390 and PowerPC can both do unalignedlloyd2009-09-044-0/+12
| | | | | | | | | | | | | | | | | | | | | | | | memory accesses. Since this can be a pretty big win, enable it for them. The m68k apparently also can, except in its (modern) Coldfire version, but it's always big endian so mark that as such.
| * | | Wrap benchmark_rw call in BOTAN_HAS_RW macro checklloyd2009-09-041-0/+2
| | | |
| * | | propagate from branch 'net.randombit.botan.1_8' (head ↵lloyd2009-08-314-7/+19
| |\ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | c2624292793f396cf940403e0d12073a9b2c7b17) to branch 'net.randombit.botan' (head 07a71effa1ba495b6ea57b2490ad38bf58a23bd0)
| * | | | Add Rivest's package transformlloyd2009-08-314-0/+192
| | | | |
| * | | | Move configure.pl to doc/scriptslloyd2009-08-311-0/+0
| | | | |
| * | | | Combine the 4 sbox calculations in the key schedule so that all four arelloyd2009-08-312-25/+25
| | | | | | | | | | | | | | | | | | | | | | | | | computed in parallel. Not a huge win but slightly faster (which affects things like Lion when using Turing), most likely due to more available ILP
| * | | | Hoist creation of buffer in Lion encrypt looplloyd2009-08-311-4/+4
| | | | |
| * | | | Remove unneeded include in xtea.cpplloyd2009-08-271-1/+0
| | | | |
| * | | | Instead of each SSE2 implementation specifying which compilers + CPUs itlloyd2009-08-273-25/+8
| | | | | | | | | | | | | | | | | | | | | | | | | works on, have sse2_eng rely on a specific compiler/arch; each sse2 impl depends on the engine anyway, so they will only be loaded if OK.
| * | | | Remove support for HTML benchmark output. Easier/simpler to parse thelloyd2009-08-144-63/+24
| | | | | | | | | | | | | | | | | | | | | | | | | output with a script after the fact to generate such things, especially as often for HTML I want to do multiple side-by-side results.
| * | | | Move version #s to 1.9.0-prelloyd2009-08-134-9/+13
| | | | |
| * | | | Include basefilt.h in filters.hlloyd2009-08-131-0/+2
| | | | |
| * | | | propagate from branch 'net.randombit.botan.encrypt-n' (head ↵lloyd2009-08-139-24/+293
| |\ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 378e7464abc6b3efcf9cb433f7fcec0adfbb9de0) to branch 'net.randombit.botan' (head dd9bdcc0cab8b761a1c9861f3a4fc625488c2ef5)
| * | | | | Use a much faster counter increment system, noticable speedups (~15%)lloyd2009-08-121-20/+21
| | | | | | | | | | | | | | | | | | | | | | | | for both Serpent and AES-128 in CTR mode.
| * | | | | Add some longer Serpent CTR vectorslloyd2009-08-121-0/+460
| | | | | |
| * | | | | In benchmark.cpp, use encrypt_n when benchmarking block cipherslloyd2009-08-121-2/+1
| | | | | |
| * | | | | For handling the last few blocks in Serpent_SSE2, invoke encrypt_n withlloyd2009-08-121-12/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | however many blocks remain, rather than looping calling encrypt_n with a block size of 1 each time.
| * | | | | propagate from branch 'net.randombit.botan' (head ↵lloyd2009-08-121-0/+5
| |\ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ea6531b1e5b0aa67db295a3d3617265b912aa3a1) to branch 'net.randombit.botan.encrypt-n' (head 563c4447d6fa61869158874c2dbfa6e9be106803)
| * | | | | | Add SSE2 Serpent decryptionlloyd2009-08-122-1/+307
| | | | | | |
| * | | | | | Small code cleanups in SSE2 Serpentlloyd2009-08-122-192/+195
| | | | | | |
| * | | | | | Use SSE2 unpack instructions instead of unions for input/output conversion.lloyd2009-08-122-300/+263
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | About 10% faster than previous. Currently 112 MiB/s in ECB mode, versus about 40 MiB/s in scalar mode, on my 2.4 GHz Core2
| * | | | | | Add full 4-way SSE2 Serpent encryption. Load/store operations are vialloyd2009-08-123-47/+290
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | unions and can be made much faster using interleave operations I think. Currently ~2.5x faster in ECB or CTR mode on a Core2, which isn't too bad.
| * | | | | | Make encrypt_n public for all BlockCipher implementations - unlike thelloyd2009-08-1131-58/+355
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | enc/dec functions it replaces, these are public interfaces. Add the first bits of a SSE2 implementation of Serpent. Currently incomplete.
| * | | | | | Modify Keyed_Filter so it is a pure interfacelloyd2009-08-1117-150/+418
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Modify ECB to use parallel encryption/decryption where possible Add toggles in build.h specifying how many blocks to process in parallel. Defaults to 8 blocks for all modes, which is sufficient that any likely parallelism can be extracted (via SIMD or concurrent execution) but not so much as to seem likely to cause cache problems (8*128 bits = 128 bytes, or two x86 cache lines)
| * | | | | | Change the BlockCipher interface to support multi-block encryption andlloyd2009-08-1156-1321/+1742
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | decryption. Currently only used for counter mode. Doesn't offer much advantage as-is (though might help slightly, in terms of cache effects), but allows for SIMD implementations to process multiple blocks in parallel when possible. Particularly thinking here of Serpent; TEA/XTEA also seem promising in this sense, as is Threefish once that is implemented as a standalone block cipher.
* | | | | | | Change Skein-512 to match the tweaked 1.2 specification. Round constantslloyd2009-09-153-18462/+1646
| | | | | | | | | | | | | | | | | | | | | | | | | | | | in the Threefish cipher have changed to increase diffusion.
* | | | | | | Bump version to 1.8.8-devlloyd2009-09-153-4/+6
| | | | | | |
* | | | | | | Have dist script pull from nrb.1_8 in this branchlloyd2009-09-111-1/+1
| |_|_|_|_|/ |/| | | | |
* | | | | | Update configures, readme, logfile for 1.8.7 release 2009-09-091.8.7lloyd2009-09-104-7/+7
| |_|_|_|/ |/| | | |
* | | | | Add a new option --no-autoload to configure.py. This will produce a minimallloyd2009-09-047-4/+26
| |_|_|/ |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | build (only libstate, utils, plus dependencies), which can be extended with use of --enable-modules. To add new modules to the set of always-loaded, use 'load_on always' in info.txt Also fix a few small build problems that popped up when doing a minimal build. Requested by a user.