Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Remove the scalar SIMD_4x32 implementation | Jack Lloyd | 2019-09-05 | 4 | -160/+37 |
| | | | | | | On platforms without a SIMD engine, the scalar version does offer some slight performance increase due to unrolling but is probably not worth it in terms of code size. | ||||
* | Merge GH #2096 Unroll POWER8 AES instructions by 4x | Jack Lloyd | 2019-09-04 | 3 | -110/+350 |
|\ | |||||
| * | Unroll POWER8 AES instructions by 4x | Jack Lloyd | 2019-09-04 | 1 | -105/+328 |
| | | | | | | | | Improves performance by 20-30% on POWER9 | ||||
| * | Fix gcc warnings in Altivec SIMD_4x32 code | Jack Lloyd | 2019-09-04 | 1 | -5/+10 |
| | | |||||
| * | Avoid dynamic endian dispatch if we don't need it | Jack Lloyd | 2019-09-04 | 1 | -0/+12 |
| | | |||||
* | | Make ssse3/sse2 dependencies explicit rather than implicit | Jack Lloyd | 2019-09-04 | 8 | -2/+10 |
| | | | | | | | | Previously --disable-sse2/--disable-ssse3 would not work as expected | ||||
* | | Add build support | Jack Lloyd | 2019-09-04 | 1 | -2/+13 |
| | | |||||
* | | Some cleanups | Jack Lloyd | 2019-09-04 | 1 | -54/+52 |
| | | |||||
* | | Unroll blocks by 2x | Jack Lloyd | 2019-09-03 | 2 | -70/+188 |
| | | |||||
* | | Avoid runtime endian dispatch when value is known statically | Jack Lloyd | 2019-09-01 | 1 | -8/+34 |
| | | |||||
* | | Support NEON for AES vector permutes | Jack Lloyd | 2019-09-01 | 8 | -113/+172 |
|/ | | | | Rename aes_ssse3 -> aes_vperm | ||||
* | Fix path to PKCS11 library | Jack Lloyd | 2019-09-01 | 1 | -1/+1 |
| | | | | The ppa puts it in a different location than the Ubuntu upstream package. | ||||
* | Merge GH #2093 Abstract the SSSE3 code for vector permute AES | Jack Lloyd | 2019-09-01 | 3 | -614/+512 |
|\ | |||||
| * | Build fixes | Jack Lloyd | 2019-08-31 | 2 | -3/+2 |
| | | |||||
| * | Abstract the AES SSSE3 implementation to support other SIMD | Jack Lloyd | 2019-08-31 | 3 | -613/+512 |
| | | |||||
* | | Fix warning - always_inline attribute wants also inline | Jack Lloyd | 2019-08-31 | 1 | -1/+1 |
|/ | |||||
* | Merge GH #2092 Add BOTAN_FORCE_INLINE to fix BLAKE2b MSVC performance issue | Jack Lloyd | 2019-08-31 | 2 | -3/+20 |
|\ | |||||
| * | Add BOTAN_FORCE_INLINE and use it in BLAKE2b | Jack Lloyd | 2019-08-31 | 2 | -3/+20 |
| | | | | | | | | Closes #2089 | ||||
* | | Merge GH #2091 Use a vendor package for SoftHSM | Jack Lloyd | 2019-08-31 | 3 | -14/+25 |
|\ \ | |||||
| * | | Use SoftHSM from Ubuntu package repository | Jack Lloyd | 2019-08-30 | 3 | -14/+25 |
| |/ | |||||
* | | Merge GH #2090 Fix PBKDF long loop when iterations == 0 | Jack Lloyd | 2019-08-31 | 2 | -0/+12 |
|\ \ | |||||
| * | | Fix PBKDF2 with zero iterations | Jack Lloyd | 2019-08-31 | 2 | -0/+12 |
| |/ | | | | | | | | | | | | | | | | | | | | | It would go into a very long loop. OpenSSL treats iterations==0 same as iterations==1 but this seems confusing. Instead just reject it. Unrelated, fix a divide by zero if asked to tune with 0 byte output. Closes GH #2088 | ||||
* / | Don't assume any particular kind of RNG is available in the cli | Jack Lloyd | 2019-08-30 | 5 | -71/+52 |
|/ | | | | Closes #2085 | ||||
* | Don't strictly require auto_rng in tls_proxy | Jack Lloyd | 2019-08-28 | 1 | -2/+11 |
| | | | | | | | Follow behavior of tls_http_server and use either system or auto_rng depending on availability. See #2085 | ||||
* | Fixes and tweaks from feedback | David Carlier | 2019-08-28 | 2 | -27/+25 |
| | |||||
* | locked pages, making the tag id possibly configurable. | David Carlier | 2019-08-28 | 2 | -8/+31 |
| | |||||
* | Fix test to account for compression report | Jack Lloyd | 2019-08-27 | 1 | -2/+6 |
| | |||||
* | Merge GH #2026 Add support for POWER9 hardware RNG | Jack Lloyd | 2019-08-27 | 10 | -1/+124 |
|\ | |||||
| * | Use inline asm to avoid GCC bug. Handle RNG failure | Jack Lloyd | 2019-08-27 | 2 | -13/+42 |
| | | |||||
| * | Add support for POWER9 DARN RNG | Jack Lloyd | 2019-08-27 | 10 | -1/+95 |
| | | |||||
* | | Add a cmdlet which allows sampling/testing raw entropy sources | Jack Lloyd | 2019-08-27 | 2 | -0/+128 |
|/ | |||||
* | Fix a carry handling bug in Streebog | Jack Lloyd | 2019-08-26 | 2 | -3/+16 |
| | | | | Closes #2082 | ||||
* | Fix a bug in CAST-128 affecting 11, 13, 14, or 15 byte keys | Jack Lloyd | 2019-08-26 | 3 | -2/+35 |
| | | | | | | | | With keys not a multiple of 4 bytes, the zero bytes ended up in the wrong place. In the unlikely event anyone was affected by this they could just use the equivalent 16 byte key. Closes #2081 | ||||
* | Bump Argon2 version to indicate support for long outputs | Jack Lloyd | 2019-08-24 | 1 | -1/+1 |
| | |||||
* | Merge GH #2080 Remove use of pow_mod.h interfaces from within library | Jack Lloyd | 2019-08-24 | 12 | -251/+202 |
|\ | |||||
| * | Fix build | Jack Lloyd | 2019-08-24 | 2 | -1/+3 |
| | | |||||
| * | Inline the fixed window and Montgomery strategies into pow_mod.cpp | Jack Lloyd | 2019-08-23 | 6 | -198/+133 |
| | | |||||
| * | Remove pow_mod.h from power_mod implementation | Jack Lloyd | 2019-08-23 | 1 | -19/+23 |
| | | |||||
| * | Remove pow_mod.h from ElGamal | Jack Lloyd | 2019-08-23 | 1 | -12/+25 |
| | | |||||
| * | Remove pow_mod.h from Diffie-Hellman | Jack Lloyd | 2019-08-23 | 1 | -7/+17 |
| | | |||||
| * | Remove modexp based inversion from speed test | Jack Lloyd | 2019-08-23 | 1 | -9/+0 |
| | | | | | | | | Not competitive so not interesting | ||||
| * | Remove unused include | Jack Lloyd | 2019-08-23 | 1 | -1/+0 |
| | | |||||
| * | Remove use of pow_mod.h from PKCS11 RSA code | Jack Lloyd | 2019-08-23 | 1 | -4/+1 |
| | | |||||
* | | Fix LGTM alert | Jack Lloyd | 2019-08-23 | 1 | -1/+6 |
| | | |||||
* | | Support long outputs from Argon2 | Jack Lloyd | 2019-08-23 | 2 | -3/+2260 |
|/ | | | | Closes #2078 | ||||
* | Merge GH #2070 Precompute RSA Montgomery params | Jack Lloyd | 2019-08-23 | 5 | -184/+328 |
|\ | |||||
| * | Fix python test | Jack Lloyd | 2019-08-17 | 2 | -2/+6 |
| | | |||||
| * | Fixes for PKCS11 | Jack Lloyd | 2019-08-17 | 2 | -19/+19 |
| | | |||||
| * | Have RSA key precompute Montgomery parameters | Jack Lloyd | 2019-08-17 | 2 | -163/+303 |
| | | | | | | | | | | | | | | | | | | If the application caches the PK_Signer or similar, then the performance is basically identical to what is done now. However for applications which create a new PK_Signer object per signature, then this improves performance by about 30%. Notably this includes the TLS layer. | ||||
* | | Fix bad compare in BigInt <<= | Jack Lloyd | 2019-08-23 | 1 | -1/+1 |
| | | | | | | | | Caused an extra allocation for no reason in some cases. |