Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Merge GH #2061 Add header deprecation warnings | Jack Lloyd | 2019-09-08 | 164 | -47/+410 |
|\ | |||||
| * | Walk back on deprecating these | Jack Lloyd | 2019-09-06 | 1 | -2/+8 |
| | | |||||
| * | Moar | Jack Lloyd | 2019-09-06 | 2 | -1/+3 |
| | | |||||
| * | Deprecate many publically available headers | Jack Lloyd | 2019-09-06 | 162 | -45/+400 |
| | | |||||
* | | Disable vperm AES on big-endian systems | Jack Lloyd | 2019-09-07 | 1 | -0/+2 |
| | | | | | | | | | | All the constants need to be tweaked and possibly other changes are required. | ||||
* | | Add support for vector permute AES using AltiVec | Jack Lloyd | 2019-09-07 | 3 | -0/+28 |
| | | | | | | | | Slower than T-tables on the machines I've tried, but constant time. | ||||
* | | Unroll xor_buf by 32 bytes | Jack Lloyd | 2019-09-06 | 1 | -37/+46 |
| | | | | | | | | Improves overall ChaCha and AES-NI GCM by 1-3% | ||||
* | | Optimizations for CTR_BE::add_counter | Jack Lloyd | 2019-09-06 | 1 | -14/+9 |
| | | | | | | | | This is in the hot path for GCM | ||||
* | | In aes_vperm avoid loading from data segment | Jack Lloyd | 2019-09-06 | 1 | -17/+12 |
| | | | | | | | | I do not understand the mechanism but this is slightly faster. | ||||
* | | Style tweaks | Jack Lloyd | 2019-09-06 | 1 | -25/+34 |
|/ | |||||
* | Remove the scalar SIMD_4x32 implementation | Jack Lloyd | 2019-09-05 | 2 | -160/+34 |
| | | | | | | On platforms without a SIMD engine, the scalar version does offer some slight performance increase due to unrolling but is probably not worth it in terms of code size. | ||||
* | Merge GH #2096 Unroll POWER8 AES instructions by 4x | Jack Lloyd | 2019-09-04 | 3 | -110/+350 |
|\ | |||||
| * | Unroll POWER8 AES instructions by 4x | Jack Lloyd | 2019-09-04 | 1 | -105/+328 |
| | | | | | | | | Improves performance by 20-30% on POWER9 | ||||
| * | Fix gcc warnings in Altivec SIMD_4x32 code | Jack Lloyd | 2019-09-04 | 1 | -5/+10 |
| | | |||||
| * | Avoid dynamic endian dispatch if we don't need it | Jack Lloyd | 2019-09-04 | 1 | -0/+12 |
| | | |||||
* | | Make ssse3/sse2 dependencies explicit rather than implicit | Jack Lloyd | 2019-09-04 | 6 | -0/+8 |
| | | | | | | | | Previously --disable-sse2/--disable-ssse3 would not work as expected | ||||
* | | Add build support | Jack Lloyd | 2019-09-04 | 1 | -2/+13 |
| | | |||||
* | | Some cleanups | Jack Lloyd | 2019-09-04 | 1 | -54/+52 |
| | | |||||
* | | Unroll blocks by 2x | Jack Lloyd | 2019-09-03 | 2 | -70/+188 |
| | | |||||
* | | Avoid runtime endian dispatch when value is known statically | Jack Lloyd | 2019-09-01 | 1 | -8/+34 |
| | | |||||
* | | Support NEON for AES vector permutes | Jack Lloyd | 2019-09-01 | 5 | -110/+169 |
|/ | | | | Rename aes_ssse3 -> aes_vperm | ||||
* | Merge GH #2093 Abstract the SSSE3 code for vector permute AES | Jack Lloyd | 2019-09-01 | 3 | -614/+512 |
|\ | |||||
| * | Build fixes | Jack Lloyd | 2019-08-31 | 2 | -3/+2 |
| | | |||||
| * | Abstract the AES SSSE3 implementation to support other SIMD | Jack Lloyd | 2019-08-31 | 3 | -613/+512 |
| | | |||||
* | | Fix warning - always_inline attribute wants also inline | Jack Lloyd | 2019-08-31 | 1 | -1/+1 |
|/ | |||||
* | Merge GH #2092 Add BOTAN_FORCE_INLINE to fix BLAKE2b MSVC performance issue | Jack Lloyd | 2019-08-31 | 2 | -3/+20 |
|\ | |||||
| * | Add BOTAN_FORCE_INLINE and use it in BLAKE2b | Jack Lloyd | 2019-08-31 | 2 | -3/+20 |
| | | | | | | | | Closes #2089 | ||||
* | | Fix PBKDF2 with zero iterations | Jack Lloyd | 2019-08-31 | 1 | -0/+6 |
|/ | | | | | | | | | | | It would go into a very long loop. OpenSSL treats iterations==0 same as iterations==1 but this seems confusing. Instead just reject it. Unrelated, fix a divide by zero if asked to tune with 0 byte output. Closes GH #2088 | ||||
* | Fixes and tweaks from feedback | David Carlier | 2019-08-28 | 2 | -27/+25 |
| | |||||
* | locked pages, making the tag id possibly configurable. | David Carlier | 2019-08-28 | 2 | -8/+31 |
| | |||||
* | Use inline asm to avoid GCC bug. Handle RNG failure | Jack Lloyd | 2019-08-27 | 2 | -13/+42 |
| | |||||
* | Add support for POWER9 DARN RNG | Jack Lloyd | 2019-08-27 | 7 | -0/+92 |
| | |||||
* | Fix a carry handling bug in Streebog | Jack Lloyd | 2019-08-26 | 1 | -3/+4 |
| | | | | Closes #2082 | ||||
* | Fix a bug in CAST-128 affecting 11, 13, 14, or 15 byte keys | Jack Lloyd | 2019-08-26 | 1 | -2/+5 |
| | | | | | | | | With keys not a multiple of 4 bytes, the zero bytes ended up in the wrong place. In the unlikely event anyone was affected by this they could just use the equivalent 16 byte key. Closes #2081 | ||||
* | Bump Argon2 version to indicate support for long outputs | Jack Lloyd | 2019-08-24 | 1 | -1/+1 |
| | |||||
* | Merge GH #2080 Remove use of pow_mod.h interfaces from within library | Jack Lloyd | 2019-08-24 | 10 | -241/+202 |
|\ | |||||
| * | Fix build | Jack Lloyd | 2019-08-24 | 2 | -1/+3 |
| | | |||||
| * | Inline the fixed window and Montgomery strategies into pow_mod.cpp | Jack Lloyd | 2019-08-23 | 6 | -198/+133 |
| | | |||||
| * | Remove pow_mod.h from power_mod implementation | Jack Lloyd | 2019-08-23 | 1 | -19/+23 |
| | | |||||
| * | Remove pow_mod.h from ElGamal | Jack Lloyd | 2019-08-23 | 1 | -12/+25 |
| | | |||||
| * | Remove pow_mod.h from Diffie-Hellman | Jack Lloyd | 2019-08-23 | 1 | -7/+17 |
| | | |||||
| * | Remove use of pow_mod.h from PKCS11 RSA code | Jack Lloyd | 2019-08-23 | 1 | -4/+1 |
| | | |||||
* | | Fix LGTM alert | Jack Lloyd | 2019-08-23 | 1 | -1/+6 |
| | | |||||
* | | Support long outputs from Argon2 | Jack Lloyd | 2019-08-23 | 1 | -3/+26 |
|/ | | | | Closes #2078 | ||||
* | Merge GH #2070 Precompute RSA Montgomery params | Jack Lloyd | 2019-08-23 | 4 | -182/+324 |
|\ | |||||
| * | Fix python test | Jack Lloyd | 2019-08-17 | 1 | -0/+2 |
| | | |||||
| * | Fixes for PKCS11 | Jack Lloyd | 2019-08-17 | 2 | -19/+19 |
| | | |||||
| * | Have RSA key precompute Montgomery parameters | Jack Lloyd | 2019-08-17 | 2 | -163/+303 |
| | | | | | | | | | | | | | | | | | | If the application caches the PK_Signer or similar, then the performance is basically identical to what is done now. However for applications which create a new PK_Signer object per signature, then this improves performance by about 30%. Notably this includes the TLS layer. | ||||
* | | Fix bad compare in BigInt <<= | Jack Lloyd | 2019-08-23 | 1 | -1/+1 |
| | | | | | | | | Caused an extra allocation for no reason in some cases. | ||||
* | | Small BigInt optimizations | Jack Lloyd | 2019-08-22 | 4 | -14/+15 |
| | | | | | | | | Based on profiling RSA key generation |