Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Remove the scalar SIMD_4x32 implementation | Jack Lloyd | 2019-09-05 | 2 | -160/+34 |
| | | | | | | On platforms without a SIMD engine, the scalar version does offer some slight performance increase due to unrolling but is probably not worth it in terms of code size. | ||||
* | Merge GH #2096 Unroll POWER8 AES instructions by 4x | Jack Lloyd | 2019-09-04 | 3 | -110/+350 |
|\ | |||||
| * | Unroll POWER8 AES instructions by 4x | Jack Lloyd | 2019-09-04 | 1 | -105/+328 |
| | | | | | | | | Improves performance by 20-30% on POWER9 | ||||
| * | Fix gcc warnings in Altivec SIMD_4x32 code | Jack Lloyd | 2019-09-04 | 1 | -5/+10 |
| | | |||||
| * | Avoid dynamic endian dispatch if we don't need it | Jack Lloyd | 2019-09-04 | 1 | -0/+12 |
| | | |||||
* | | Make ssse3/sse2 dependencies explicit rather than implicit | Jack Lloyd | 2019-09-04 | 6 | -0/+8 |
| | | | | | | | | Previously --disable-sse2/--disable-ssse3 would not work as expected | ||||
* | | Add build support | Jack Lloyd | 2019-09-04 | 1 | -2/+13 |
| | | |||||
* | | Some cleanups | Jack Lloyd | 2019-09-04 | 1 | -54/+52 |
| | | |||||
* | | Unroll blocks by 2x | Jack Lloyd | 2019-09-03 | 2 | -70/+188 |
| | | |||||
* | | Avoid runtime endian dispatch when value is known statically | Jack Lloyd | 2019-09-01 | 1 | -8/+34 |
| | | |||||
* | | Support NEON for AES vector permutes | Jack Lloyd | 2019-09-01 | 5 | -110/+169 |
|/ | | | | Rename aes_ssse3 -> aes_vperm | ||||
* | Merge GH #2093 Abstract the SSSE3 code for vector permute AES | Jack Lloyd | 2019-09-01 | 3 | -614/+512 |
|\ | |||||
| * | Build fixes | Jack Lloyd | 2019-08-31 | 2 | -3/+2 |
| | | |||||
| * | Abstract the AES SSSE3 implementation to support other SIMD | Jack Lloyd | 2019-08-31 | 3 | -613/+512 |
| | | |||||
* | | Fix warning - always_inline attribute wants also inline | Jack Lloyd | 2019-08-31 | 1 | -1/+1 |
|/ | |||||
* | Merge GH #2092 Add BOTAN_FORCE_INLINE to fix BLAKE2b MSVC performance issue | Jack Lloyd | 2019-08-31 | 2 | -3/+20 |
|\ | |||||
| * | Add BOTAN_FORCE_INLINE and use it in BLAKE2b | Jack Lloyd | 2019-08-31 | 2 | -3/+20 |
| | | | | | | | | Closes #2089 | ||||
* | | Fix PBKDF2 with zero iterations | Jack Lloyd | 2019-08-31 | 1 | -0/+6 |
|/ | | | | | | | | | | | It would go into a very long loop. OpenSSL treats iterations==0 same as iterations==1 but this seems confusing. Instead just reject it. Unrelated, fix a divide by zero if asked to tune with 0 byte output. Closes GH #2088 | ||||
* | Fixes and tweaks from feedback | David Carlier | 2019-08-28 | 2 | -27/+25 |
| | |||||
* | locked pages, making the tag id possibly configurable. | David Carlier | 2019-08-28 | 2 | -8/+31 |
| | |||||
* | Use inline asm to avoid GCC bug. Handle RNG failure | Jack Lloyd | 2019-08-27 | 2 | -13/+42 |
| | |||||
* | Add support for POWER9 DARN RNG | Jack Lloyd | 2019-08-27 | 7 | -0/+92 |
| | |||||
* | Fix a carry handling bug in Streebog | Jack Lloyd | 2019-08-26 | 1 | -3/+4 |
| | | | | Closes #2082 | ||||
* | Fix a bug in CAST-128 affecting 11, 13, 14, or 15 byte keys | Jack Lloyd | 2019-08-26 | 1 | -2/+5 |
| | | | | | | | | With keys not a multiple of 4 bytes, the zero bytes ended up in the wrong place. In the unlikely event anyone was affected by this they could just use the equivalent 16 byte key. Closes #2081 | ||||
* | Bump Argon2 version to indicate support for long outputs | Jack Lloyd | 2019-08-24 | 1 | -1/+1 |
| | |||||
* | Merge GH #2080 Remove use of pow_mod.h interfaces from within library | Jack Lloyd | 2019-08-24 | 10 | -241/+202 |
|\ | |||||
| * | Fix build | Jack Lloyd | 2019-08-24 | 2 | -1/+3 |
| | | |||||
| * | Inline the fixed window and Montgomery strategies into pow_mod.cpp | Jack Lloyd | 2019-08-23 | 6 | -198/+133 |
| | | |||||
| * | Remove pow_mod.h from power_mod implementation | Jack Lloyd | 2019-08-23 | 1 | -19/+23 |
| | | |||||
| * | Remove pow_mod.h from ElGamal | Jack Lloyd | 2019-08-23 | 1 | -12/+25 |
| | | |||||
| * | Remove pow_mod.h from Diffie-Hellman | Jack Lloyd | 2019-08-23 | 1 | -7/+17 |
| | | |||||
| * | Remove use of pow_mod.h from PKCS11 RSA code | Jack Lloyd | 2019-08-23 | 1 | -4/+1 |
| | | |||||
* | | Fix LGTM alert | Jack Lloyd | 2019-08-23 | 1 | -1/+6 |
| | | |||||
* | | Support long outputs from Argon2 | Jack Lloyd | 2019-08-23 | 1 | -3/+26 |
|/ | | | | Closes #2078 | ||||
* | Merge GH #2070 Precompute RSA Montgomery params | Jack Lloyd | 2019-08-23 | 4 | -182/+324 |
|\ | |||||
| * | Fix python test | Jack Lloyd | 2019-08-17 | 1 | -0/+2 |
| | | |||||
| * | Fixes for PKCS11 | Jack Lloyd | 2019-08-17 | 2 | -19/+19 |
| | | |||||
| * | Have RSA key precompute Montgomery parameters | Jack Lloyd | 2019-08-17 | 2 | -163/+303 |
| | | | | | | | | | | | | | | | | | | If the application caches the PK_Signer or similar, then the performance is basically identical to what is done now. However for applications which create a new PK_Signer object per signature, then this improves performance by about 30%. Notably this includes the TLS layer. | ||||
* | | Fix bad compare in BigInt <<= | Jack Lloyd | 2019-08-23 | 1 | -1/+1 |
| | | | | | | | | Caused an extra allocation for no reason in some cases. | ||||
* | | Small BigInt optimizations | Jack Lloyd | 2019-08-22 | 4 | -14/+15 |
| | | | | | | | | Based on profiling RSA key generation | ||||
* | | Merge GH #2051 Have cli sign util update stateful keys | Jack Lloyd | 2019-08-20 | 2 | -0/+4 |
|\ \ | |||||
| * | | Add Private_Key::stateful_operation and use it in cli signer | Jack Lloyd | 2019-07-30 | 2 | -0/+4 |
| | | | |||||
* | | | Merge GH #2007 Improve RDRAND reseeding logic | Jack Lloyd | 2019-08-20 | 4 | -127/+172 |
|\ \ \ | |||||
| * | | | Use RDRAND in such a way that an internal reseed is performed | Jack Lloyd | 2019-08-16 | 4 | -127/+172 |
| | | | | | | | | | | | | | | | | | | | | | | | | At least according to Intel's docs. Closes #447 | ||||
* | | | | Merge GH #2075 Serialize PKCS11 tests | Jack Lloyd | 2019-08-20 | 1 | -0/+2 |
|\ \ \ \ | |||||
| * | | | | Serialize the PKCS11 tests | Jack Lloyd | 2019-08-20 | 1 | -0/+2 |
| | | | | | | | | | | | | | | | | | | | | See #2072 | ||||
* | | | | | Deprecate some more redundant ffi functions | Jack Lloyd | 2019-08-19 | 1 | -10/+31 |
|/ / / / | |||||
* | | / | Add function comment [ci skip] | Jack Lloyd | 2019-08-17 | 1 | -0/+6 |
| |_|/ |/| | | |||||
* | | | Avoid using old pow_mod interface in RSA | Jack Lloyd | 2019-08-17 | 2 | -7/+14 |
| | | | | | | | | | | | | | | | On its own gives a modest speedup (3-5%) to RSA sign/decrypt, and it is needed for another more complicated optimization. | ||||
* | | | Fix indentation | Jack Lloyd | 2019-08-17 | 1 | -2/+2 |
|/ / |