aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Make some changes to the SSE2 implementation of SHA-1 for compatability withlloyd2009-09-131-62/+46
| | | | Visual C++.
* Update for 1.9.0 release 2009-09-091.9.0lloyd2009-09-103-3/+6
|
* Add example of the package transformlloyd2009-09-101-0/+61
|
* propagate from branch 'net.randombit.botan.1_8' (head ↵lloyd2009-09-103-4/+4
|\ | | | | | | | | | | c7f7c5092848b9c230d1757c74ed25ee9ea52262) to branch 'net.randombit.botan' (head a1315b63e5c3a6101df388c70ad69dc039437fe8)
| * Update configures, readme, logfile for 1.8.7 release 2009-09-091.8.7lloyd2009-09-104-7/+7
| |
* | Add parallel block toggles for CBC and CFB (decrypt direction only)lloyd2009-09-101-1/+7
| |
* | Add a couple of Serpent/XTS test vectors (SQLite data pages)lloyd2009-09-101-0/+273
| |
* | The first argument of Library_State::set_option was accidentally beinglloyd2009-09-092-2/+2
| | | | | | | | | | passed as a 'const std::string' instead of a const reference. Can't fix in 1.8 since it is ABI breaking.
* | Throw Internal_Error instead of Algorithm_Not_Found if no usable RNGlloyd2009-09-081-1/+1
| | | | | | | | is enabled in the build.
* | Add a log line telling the user that we are assuming unaligned memorylloyd2009-09-081-4/+19
| | | | | | | | | | | | | | | | | | | | accesses, if we are. Add new options --with-unaligned-mem and --without-unaligned-mem to override the arch-specific guess. The only usage I specifically know for this is to allow unaligned accesses on m68k machines, when use on Coldfire is not expected. Other cases where most CPUs of a particular type support unaligned accesses but a specific target doesn't (or it is very slow) can also use this.
* | Add *s before comment lines in file headerslloyd2009-09-084-8/+8
| |
* | propagate from branch 'net.randombit.botan.1_8' (head ↵lloyd2009-09-046-4/+24
|\| | | | | | | | | | | 75371777750b63ef94693602202c5104f217a987) to branch 'net.randombit.botan' (head 3f53f01c349eeee89288b1922fbde45b283c958c)
| * Add a new option --no-autoload to configure.py. This will produce a minimallloyd2009-09-047-4/+26
| | | | | | | | | | | | | | | | | | | | | | build (only libstate, utils, plus dependencies), which can be extended with use of --enable-modules. To add new modules to the set of always-loaded, use 'load_on always' in info.txt Also fix a few small build problems that popped up when doing a minimal build. Requested by a user.
* | According to the Linux sources, S/390 and PowerPC can both do unalignedlloyd2009-09-044-0/+12
| | | | | | | | | | | | memory accesses. Since this can be a pretty big win, enable it for them. The m68k apparently also can, except in its (modern) Coldfire version, but it's always big endian so mark that as such.
* | Wrap benchmark_rw call in BOTAN_HAS_RW macro checklloyd2009-09-041-0/+2
| |
* | propagate from branch 'net.randombit.botan.1_8' (head ↵lloyd2009-08-314-7/+19
|\| | | | | | | | | | | c2624292793f396cf940403e0d12073a9b2c7b17) to branch 'net.randombit.botan' (head 07a71effa1ba495b6ea57b2490ad38bf58a23bd0)
| * Remove redunant buffer create calls in XTSlloyd2009-08-281-4/+0
| |
| * In XTS, reset the buffer positions at the end of a message.lloyd2009-08-271-0/+4
| |
| * Thomas Moschny mentioned that OpenSSL 1.0 betas disable MD2 by default.lloyd2009-08-271-0/+10
| | | | | | | | Wrap the EVP_ calls in OPENSSL_NO_XXX checks to handle this.
| * Move 1.8 releases to a branch. Flip version numbers to 1.8.7-prelloyd2009-08-134-7/+9
| |
* | Add Rivest's package transformlloyd2009-08-314-0/+192
| |
* | Move configure.pl to doc/scriptslloyd2009-08-311-0/+0
| |
* | Combine the 4 sbox calculations in the key schedule so that all four arelloyd2009-08-312-25/+25
| | | | | | | | | | computed in parallel. Not a huge win but slightly faster (which affects things like Lion when using Turing), most likely due to more available ILP
* | Hoist creation of buffer in Lion encrypt looplloyd2009-08-311-4/+4
| |
* | Remove unneeded include in xtea.cpplloyd2009-08-271-1/+0
| |
* | Instead of each SSE2 implementation specifying which compilers + CPUs itlloyd2009-08-273-25/+8
| | | | | | | | | | works on, have sse2_eng rely on a specific compiler/arch; each sse2 impl depends on the engine anyway, so they will only be loaded if OK.
* | Remove support for HTML benchmark output. Easier/simpler to parse thelloyd2009-08-144-63/+24
| | | | | | | | | | output with a script after the fact to generate such things, especially as often for HTML I want to do multiple side-by-side results.
* | Move version #s to 1.9.0-prelloyd2009-08-134-9/+13
| |
* | Include basefilt.h in filters.hlloyd2009-08-131-0/+2
| |
* | propagate from branch 'net.randombit.botan.encrypt-n' (head ↵lloyd2009-08-139-24/+293
|\| | | | | | | | | | | 378e7464abc6b3efcf9cb433f7fcec0adfbb9de0) to branch 'net.randombit.botan' (head dd9bdcc0cab8b761a1c9861f3a4fc625488c2ef5)
| * Fix hardcoded paths in dist script. Use configure.py instead of cofigure.pllloyd2009-08-131-3/+3
| | | | | | | | to get the version #
| * Update version #s, logfile, readme for 1.8.6 release 2009-08-131.8.6lloyd2009-08-134-7/+12
| |
| * Add a new interface CryptoBox which provides basic password-based encryptionlloyd2009-08-134-0/+260
| | | | | | | | | | | | | | | | | | | | in a reasonable way. Low on features, which is rather intentional. There is a version code included in the format so further extensions are possible, if warranted. Inspired by the n-th mailing list request for such a class. Realized it was probably better that I design such code than random people who just want 'something that works'.
| * I typo'ed s390x in the check for 64-bit vs other archlloyd2009-08-121-1/+1
| |
| * Partially fix the problems in dependency analysis in configure.pl. It doesn'tlloyd2009-08-121-13/+17
| | | | | | | | | | | | handle recursive dependencies, so explicitly disabling, say, ecc_key, doesn't disable cvc as it should. However it does fix the problem of building with --with-tr1=none, which was the main problem people were having WRT to this.
* | Use a much faster counter increment system, noticable speedups (~15%)lloyd2009-08-121-20/+21
| | | | | | | | for both Serpent and AES-128 in CTR mode.
* | Add some longer Serpent CTR vectorslloyd2009-08-121-0/+460
| |
* | In benchmark.cpp, use encrypt_n when benchmarking block cipherslloyd2009-08-121-2/+1
| |
* | For handling the last few blocks in Serpent_SSE2, invoke encrypt_n withlloyd2009-08-121-12/+2
| | | | | | | | | | however many blocks remain, rather than looping calling encrypt_n with a block size of 1 each time.
* | propagate from branch 'net.randombit.botan' (head ↵lloyd2009-08-121-0/+5
|\| | | | | | | | | | | ea6531b1e5b0aa67db295a3d3617265b912aa3a1) to branch 'net.randombit.botan.encrypt-n' (head 563c4447d6fa61869158874c2dbfa6e9be106803)
| * Warn if an unknown file is given as a source in portable_symlink - catcheslloyd2009-08-121-0/+5
| | | | | | | | bad info.txt files
* | Add SSE2 Serpent decryptionlloyd2009-08-122-1/+307
| |
* | Small code cleanups in SSE2 Serpentlloyd2009-08-122-192/+195
| |
* | Use SSE2 unpack instructions instead of unions for input/output conversion.lloyd2009-08-122-300/+263
| | | | | | | | | | About 10% faster than previous. Currently 112 MiB/s in ECB mode, versus about 40 MiB/s in scalar mode, on my 2.4 GHz Core2
* | Add full 4-way SSE2 Serpent encryption. Load/store operations are vialloyd2009-08-123-47/+290
| | | | | | | | | | unions and can be made much faster using interleave operations I think. Currently ~2.5x faster in ECB or CTR mode on a Core2, which isn't too bad.
* | Make encrypt_n public for all BlockCipher implementations - unlike thelloyd2009-08-1131-58/+355
| | | | | | | | | | | | enc/dec functions it replaces, these are public interfaces. Add the first bits of a SSE2 implementation of Serpent. Currently incomplete.
* | Modify Keyed_Filter so it is a pure interfacelloyd2009-08-1117-150/+418
| | | | | | | | | | | | | | | | | | | | Modify ECB to use parallel encryption/decryption where possible Add toggles in build.h specifying how many blocks to process in parallel. Defaults to 8 blocks for all modes, which is sufficient that any likely parallelism can be extracted (via SIMD or concurrent execution) but not so much as to seem likely to cause cache problems (8*128 bits = 128 bytes, or two x86 cache lines)
* | Change the BlockCipher interface to support multi-block encryption andlloyd2009-08-1156-1321/+1742
|/ | | | | | | | | decryption. Currently only used for counter mode. Doesn't offer much advantage as-is (though might help slightly, in terms of cache effects), but allows for SIMD implementations to process multiple blocks in parallel when possible. Particularly thinking here of Serpent; TEA/XTEA also seem promising in this sense, as is Threefish once that is implemented as a standalone block cipher.
* Add 'Distributed under the terms of the Botan license' notices to the .Slloyd2009-08-118-41/+57
| | | | | files. Were missed by the automated script that added them to the cpp/h files, it appears.
* Add a set of Serpent/CTR tests. The primary reason for this is becauselloyd2009-08-101-0/+541
| | | | | Serpent seems very nicely suited to a SSE2 SIMD implementation, and CTR mode can handle multiple blocks in parallel. Input lens 1 to 128 bytes.