aboutsummaryrefslogtreecommitdiffstats
path: root/src/lib
Commit message (Collapse)AuthorAgeFilesLines
* Make ssse3/sse2 dependencies explicit rather than implicitJack Lloyd2019-09-046-0/+8
| | | | Previously --disable-sse2/--disable-ssse3 would not work as expected
* Add build supportJack Lloyd2019-09-041-2/+13
|
* Some cleanupsJack Lloyd2019-09-041-54/+52
|
* Unroll blocks by 2xJack Lloyd2019-09-032-70/+188
|
* Avoid runtime endian dispatch when value is known staticallyJack Lloyd2019-09-011-8/+34
|
* Support NEON for AES vector permutesJack Lloyd2019-09-015-110/+169
| | | | Rename aes_ssse3 -> aes_vperm
* Merge GH #2093 Abstract the SSSE3 code for vector permute AESJack Lloyd2019-09-013-614/+512
|\
| * Build fixesJack Lloyd2019-08-312-3/+2
| |
| * Abstract the AES SSSE3 implementation to support other SIMDJack Lloyd2019-08-313-613/+512
| |
* | Fix warning - always_inline attribute wants also inlineJack Lloyd2019-08-311-1/+1
|/
* Merge GH #2092 Add BOTAN_FORCE_INLINE to fix BLAKE2b MSVC performance issueJack Lloyd2019-08-312-3/+20
|\
| * Add BOTAN_FORCE_INLINE and use it in BLAKE2bJack Lloyd2019-08-312-3/+20
| | | | | | | | Closes #2089
* | Fix PBKDF2 with zero iterationsJack Lloyd2019-08-311-0/+6
|/ | | | | | | | | | | It would go into a very long loop. OpenSSL treats iterations==0 same as iterations==1 but this seems confusing. Instead just reject it. Unrelated, fix a divide by zero if asked to tune with 0 byte output. Closes GH #2088
* Fixes and tweaks from feedbackDavid Carlier2019-08-282-27/+25
|
* locked pages, making the tag id possibly configurable.David Carlier2019-08-282-8/+31
|
* Use inline asm to avoid GCC bug. Handle RNG failureJack Lloyd2019-08-272-13/+42
|
* Add support for POWER9 DARN RNGJack Lloyd2019-08-277-0/+92
|
* Fix a carry handling bug in StreebogJack Lloyd2019-08-261-3/+4
| | | | Closes #2082
* Fix a bug in CAST-128 affecting 11, 13, 14, or 15 byte keysJack Lloyd2019-08-261-2/+5
| | | | | | | | With keys not a multiple of 4 bytes, the zero bytes ended up in the wrong place. In the unlikely event anyone was affected by this they could just use the equivalent 16 byte key. Closes #2081
* Bump Argon2 version to indicate support for long outputsJack Lloyd2019-08-241-1/+1
|
* Merge GH #2080 Remove use of pow_mod.h interfaces from within libraryJack Lloyd2019-08-2410-241/+202
|\
| * Fix buildJack Lloyd2019-08-242-1/+3
| |
| * Inline the fixed window and Montgomery strategies into pow_mod.cppJack Lloyd2019-08-236-198/+133
| |
| * Remove pow_mod.h from power_mod implementationJack Lloyd2019-08-231-19/+23
| |
| * Remove pow_mod.h from ElGamalJack Lloyd2019-08-231-12/+25
| |
| * Remove pow_mod.h from Diffie-HellmanJack Lloyd2019-08-231-7/+17
| |
| * Remove use of pow_mod.h from PKCS11 RSA codeJack Lloyd2019-08-231-4/+1
| |
* | Fix LGTM alertJack Lloyd2019-08-231-1/+6
| |
* | Support long outputs from Argon2Jack Lloyd2019-08-231-3/+26
|/ | | | Closes #2078
* Merge GH #2070 Precompute RSA Montgomery paramsJack Lloyd2019-08-234-182/+324
|\
| * Fix python testJack Lloyd2019-08-171-0/+2
| |
| * Fixes for PKCS11Jack Lloyd2019-08-172-19/+19
| |
| * Have RSA key precompute Montgomery parametersJack Lloyd2019-08-172-163/+303
| | | | | | | | | | | | | | | | | | If the application caches the PK_Signer or similar, then the performance is basically identical to what is done now. However for applications which create a new PK_Signer object per signature, then this improves performance by about 30%. Notably this includes the TLS layer.
* | Fix bad compare in BigInt <<=Jack Lloyd2019-08-231-1/+1
| | | | | | | | Caused an extra allocation for no reason in some cases.
* | Small BigInt optimizationsJack Lloyd2019-08-224-14/+15
| | | | | | | | Based on profiling RSA key generation
* | Merge GH #2051 Have cli sign util update stateful keysJack Lloyd2019-08-202-0/+4
|\ \
| * | Add Private_Key::stateful_operation and use it in cli signerJack Lloyd2019-07-302-0/+4
| | |
* | | Merge GH #2007 Improve RDRAND reseeding logicJack Lloyd2019-08-204-127/+172
|\ \ \
| * | | Use RDRAND in such a way that an internal reseed is performedJack Lloyd2019-08-164-127/+172
| | | | | | | | | | | | | | | | | | | | | | | | At least according to Intel's docs. Closes #447
* | | | Merge GH #2075 Serialize PKCS11 testsJack Lloyd2019-08-201-0/+2
|\ \ \ \
| * | | | Serialize the PKCS11 testsJack Lloyd2019-08-201-0/+2
| | | | | | | | | | | | | | | | | | | | See #2072
* | | | | Deprecate some more redundant ffi functionsJack Lloyd2019-08-191-10/+31
|/ / / /
* | | / Add function comment [ci skip]Jack Lloyd2019-08-171-0/+6
| |_|/ |/| |
* | | Avoid using old pow_mod interface in RSAJack Lloyd2019-08-172-7/+14
| | | | | | | | | | | | | | | On its own gives a modest speedup (3-5%) to RSA sign/decrypt, and it is needed for another more complicated optimization.
* | | Fix indentationJack Lloyd2019-08-171-2/+2
|/ /
* | Avoid spurious throw/catchJack Lloyd2019-08-161-5/+5
| |
* | FixJack Lloyd2019-08-052-3/+3
| |
* | Merge GH #2057 OID cleanupsJack Lloyd2019-08-0537-299/+322
|\ \
| * | FixesJack Lloyd2019-08-042-5/+5
| | |
| * | Avoid unnecessary parse of the OID string in DN upper boundsJack Lloyd2019-08-041-15/+17
| | |