aboutsummaryrefslogtreecommitdiffstats
path: root/src/lib
Commit message (Collapse)AuthorAgeFilesLines
* Merge GH #2061 Add header deprecation warningsJack Lloyd2019-09-08164-47/+410
|\
| * Walk back on deprecating theseJack Lloyd2019-09-061-2/+8
| |
| * MoarJack Lloyd2019-09-062-1/+3
| |
| * Deprecate many publically available headersJack Lloyd2019-09-06162-45/+400
| |
* | Disable vperm AES on big-endian systemsJack Lloyd2019-09-071-0/+2
| | | | | | | | | | All the constants need to be tweaked and possibly other changes are required.
* | Add support for vector permute AES using AltiVecJack Lloyd2019-09-073-0/+28
| | | | | | | | Slower than T-tables on the machines I've tried, but constant time.
* | Unroll xor_buf by 32 bytesJack Lloyd2019-09-061-37/+46
| | | | | | | | Improves overall ChaCha and AES-NI GCM by 1-3%
* | Optimizations for CTR_BE::add_counterJack Lloyd2019-09-061-14/+9
| | | | | | | | This is in the hot path for GCM
* | In aes_vperm avoid loading from data segmentJack Lloyd2019-09-061-17/+12
| | | | | | | | I do not understand the mechanism but this is slightly faster.
* | Style tweaksJack Lloyd2019-09-061-25/+34
|/
* Remove the scalar SIMD_4x32 implementationJack Lloyd2019-09-052-160/+34
| | | | | | On platforms without a SIMD engine, the scalar version does offer some slight performance increase due to unrolling but is probably not worth it in terms of code size.
* Merge GH #2096 Unroll POWER8 AES instructions by 4xJack Lloyd2019-09-043-110/+350
|\
| * Unroll POWER8 AES instructions by 4xJack Lloyd2019-09-041-105/+328
| | | | | | | | Improves performance by 20-30% on POWER9
| * Fix gcc warnings in Altivec SIMD_4x32 codeJack Lloyd2019-09-041-5/+10
| |
| * Avoid dynamic endian dispatch if we don't need itJack Lloyd2019-09-041-0/+12
| |
* | Make ssse3/sse2 dependencies explicit rather than implicitJack Lloyd2019-09-046-0/+8
| | | | | | | | Previously --disable-sse2/--disable-ssse3 would not work as expected
* | Add build supportJack Lloyd2019-09-041-2/+13
| |
* | Some cleanupsJack Lloyd2019-09-041-54/+52
| |
* | Unroll blocks by 2xJack Lloyd2019-09-032-70/+188
| |
* | Avoid runtime endian dispatch when value is known staticallyJack Lloyd2019-09-011-8/+34
| |
* | Support NEON for AES vector permutesJack Lloyd2019-09-015-110/+169
|/ | | | Rename aes_ssse3 -> aes_vperm
* Merge GH #2093 Abstract the SSSE3 code for vector permute AESJack Lloyd2019-09-013-614/+512
|\
| * Build fixesJack Lloyd2019-08-312-3/+2
| |
| * Abstract the AES SSSE3 implementation to support other SIMDJack Lloyd2019-08-313-613/+512
| |
* | Fix warning - always_inline attribute wants also inlineJack Lloyd2019-08-311-1/+1
|/
* Merge GH #2092 Add BOTAN_FORCE_INLINE to fix BLAKE2b MSVC performance issueJack Lloyd2019-08-312-3/+20
|\
| * Add BOTAN_FORCE_INLINE and use it in BLAKE2bJack Lloyd2019-08-312-3/+20
| | | | | | | | Closes #2089
* | Fix PBKDF2 with zero iterationsJack Lloyd2019-08-311-0/+6
|/ | | | | | | | | | | It would go into a very long loop. OpenSSL treats iterations==0 same as iterations==1 but this seems confusing. Instead just reject it. Unrelated, fix a divide by zero if asked to tune with 0 byte output. Closes GH #2088
* Fixes and tweaks from feedbackDavid Carlier2019-08-282-27/+25
|
* locked pages, making the tag id possibly configurable.David Carlier2019-08-282-8/+31
|
* Use inline asm to avoid GCC bug. Handle RNG failureJack Lloyd2019-08-272-13/+42
|
* Add support for POWER9 DARN RNGJack Lloyd2019-08-277-0/+92
|
* Fix a carry handling bug in StreebogJack Lloyd2019-08-261-3/+4
| | | | Closes #2082
* Fix a bug in CAST-128 affecting 11, 13, 14, or 15 byte keysJack Lloyd2019-08-261-2/+5
| | | | | | | | With keys not a multiple of 4 bytes, the zero bytes ended up in the wrong place. In the unlikely event anyone was affected by this they could just use the equivalent 16 byte key. Closes #2081
* Bump Argon2 version to indicate support for long outputsJack Lloyd2019-08-241-1/+1
|
* Merge GH #2080 Remove use of pow_mod.h interfaces from within libraryJack Lloyd2019-08-2410-241/+202
|\
| * Fix buildJack Lloyd2019-08-242-1/+3
| |
| * Inline the fixed window and Montgomery strategies into pow_mod.cppJack Lloyd2019-08-236-198/+133
| |
| * Remove pow_mod.h from power_mod implementationJack Lloyd2019-08-231-19/+23
| |
| * Remove pow_mod.h from ElGamalJack Lloyd2019-08-231-12/+25
| |
| * Remove pow_mod.h from Diffie-HellmanJack Lloyd2019-08-231-7/+17
| |
| * Remove use of pow_mod.h from PKCS11 RSA codeJack Lloyd2019-08-231-4/+1
| |
* | Fix LGTM alertJack Lloyd2019-08-231-1/+6
| |
* | Support long outputs from Argon2Jack Lloyd2019-08-231-3/+26
|/ | | | Closes #2078
* Merge GH #2070 Precompute RSA Montgomery paramsJack Lloyd2019-08-234-182/+324
|\
| * Fix python testJack Lloyd2019-08-171-0/+2
| |
| * Fixes for PKCS11Jack Lloyd2019-08-172-19/+19
| |
| * Have RSA key precompute Montgomery parametersJack Lloyd2019-08-172-163/+303
| | | | | | | | | | | | | | | | | | If the application caches the PK_Signer or similar, then the performance is basically identical to what is done now. However for applications which create a new PK_Signer object per signature, then this improves performance by about 30%. Notably this includes the TLS layer.
* | Fix bad compare in BigInt <<=Jack Lloyd2019-08-231-1/+1
| | | | | | | | Caused an extra allocation for no reason in some cases.
* | Small BigInt optimizationsJack Lloyd2019-08-224-14/+15
| | | | | | | | Based on profiling RSA key generation