aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
* Remove the scalar SIMD_4x32 implementationJack Lloyd2019-09-054-160/+37
| | | | | | On platforms without a SIMD engine, the scalar version does offer some slight performance increase due to unrolling but is probably not worth it in terms of code size.
* Merge GH #2096 Unroll POWER8 AES instructions by 4xJack Lloyd2019-09-043-110/+350
|\
| * Unroll POWER8 AES instructions by 4xJack Lloyd2019-09-041-105/+328
| | | | | | | | Improves performance by 20-30% on POWER9
| * Fix gcc warnings in Altivec SIMD_4x32 codeJack Lloyd2019-09-041-5/+10
| |
| * Avoid dynamic endian dispatch if we don't need itJack Lloyd2019-09-041-0/+12
| |
* | Make ssse3/sse2 dependencies explicit rather than implicitJack Lloyd2019-09-048-2/+10
| | | | | | | | Previously --disable-sse2/--disable-ssse3 would not work as expected
* | Add build supportJack Lloyd2019-09-041-2/+13
| |
* | Some cleanupsJack Lloyd2019-09-041-54/+52
| |
* | Unroll blocks by 2xJack Lloyd2019-09-032-70/+188
| |
* | Avoid runtime endian dispatch when value is known staticallyJack Lloyd2019-09-011-8/+34
| |
* | Support NEON for AES vector permutesJack Lloyd2019-09-018-113/+172
|/ | | | Rename aes_ssse3 -> aes_vperm
* Fix path to PKCS11 libraryJack Lloyd2019-09-011-1/+1
| | | | The ppa puts it in a different location than the Ubuntu upstream package.
* Merge GH #2093 Abstract the SSSE3 code for vector permute AESJack Lloyd2019-09-013-614/+512
|\
| * Build fixesJack Lloyd2019-08-312-3/+2
| |
| * Abstract the AES SSSE3 implementation to support other SIMDJack Lloyd2019-08-313-613/+512
| |
* | Fix warning - always_inline attribute wants also inlineJack Lloyd2019-08-311-1/+1
|/
* Merge GH #2092 Add BOTAN_FORCE_INLINE to fix BLAKE2b MSVC performance issueJack Lloyd2019-08-312-3/+20
|\
| * Add BOTAN_FORCE_INLINE and use it in BLAKE2bJack Lloyd2019-08-312-3/+20
| | | | | | | | Closes #2089
* | Merge GH #2091 Use a vendor package for SoftHSMJack Lloyd2019-08-313-14/+25
|\ \
| * | Use SoftHSM from Ubuntu package repositoryJack Lloyd2019-08-303-14/+25
| |/
* | Merge GH #2090 Fix PBKDF long loop when iterations == 0Jack Lloyd2019-08-312-0/+12
|\ \
| * | Fix PBKDF2 with zero iterationsJack Lloyd2019-08-312-0/+12
| |/ | | | | | | | | | | | | | | | | | | | | It would go into a very long loop. OpenSSL treats iterations==0 same as iterations==1 but this seems confusing. Instead just reject it. Unrelated, fix a divide by zero if asked to tune with 0 byte output. Closes GH #2088
* / Don't assume any particular kind of RNG is available in the cliJack Lloyd2019-08-305-71/+52
|/ | | | Closes #2085
* Don't strictly require auto_rng in tls_proxyJack Lloyd2019-08-281-2/+11
| | | | | | | Follow behavior of tls_http_server and use either system or auto_rng depending on availability. See #2085
* Fixes and tweaks from feedbackDavid Carlier2019-08-282-27/+25
|
* locked pages, making the tag id possibly configurable.David Carlier2019-08-282-8/+31
|
* Fix test to account for compression reportJack Lloyd2019-08-271-2/+6
|
* Merge GH #2026 Add support for POWER9 hardware RNGJack Lloyd2019-08-2710-1/+124
|\
| * Use inline asm to avoid GCC bug. Handle RNG failureJack Lloyd2019-08-272-13/+42
| |
| * Add support for POWER9 DARN RNGJack Lloyd2019-08-2710-1/+95
| |
* | Add a cmdlet which allows sampling/testing raw entropy sourcesJack Lloyd2019-08-272-0/+128
|/
* Fix a carry handling bug in StreebogJack Lloyd2019-08-262-3/+16
| | | | Closes #2082
* Fix a bug in CAST-128 affecting 11, 13, 14, or 15 byte keysJack Lloyd2019-08-263-2/+35
| | | | | | | | With keys not a multiple of 4 bytes, the zero bytes ended up in the wrong place. In the unlikely event anyone was affected by this they could just use the equivalent 16 byte key. Closes #2081
* Bump Argon2 version to indicate support for long outputsJack Lloyd2019-08-241-1/+1
|
* Merge GH #2080 Remove use of pow_mod.h interfaces from within libraryJack Lloyd2019-08-2412-251/+202
|\
| * Fix buildJack Lloyd2019-08-242-1/+3
| |
| * Inline the fixed window and Montgomery strategies into pow_mod.cppJack Lloyd2019-08-236-198/+133
| |
| * Remove pow_mod.h from power_mod implementationJack Lloyd2019-08-231-19/+23
| |
| * Remove pow_mod.h from ElGamalJack Lloyd2019-08-231-12/+25
| |
| * Remove pow_mod.h from Diffie-HellmanJack Lloyd2019-08-231-7/+17
| |
| * Remove modexp based inversion from speed testJack Lloyd2019-08-231-9/+0
| | | | | | | | Not competitive so not interesting
| * Remove unused includeJack Lloyd2019-08-231-1/+0
| |
| * Remove use of pow_mod.h from PKCS11 RSA codeJack Lloyd2019-08-231-4/+1
| |
* | Fix LGTM alertJack Lloyd2019-08-231-1/+6
| |
* | Support long outputs from Argon2Jack Lloyd2019-08-232-3/+2260
|/ | | | Closes #2078
* Merge GH #2070 Precompute RSA Montgomery paramsJack Lloyd2019-08-235-184/+328
|\
| * Fix python testJack Lloyd2019-08-172-2/+6
| |
| * Fixes for PKCS11Jack Lloyd2019-08-172-19/+19
| |
| * Have RSA key precompute Montgomery parametersJack Lloyd2019-08-172-163/+303
| | | | | | | | | | | | | | | | | | If the application caches the PK_Signer or similar, then the performance is basically identical to what is done now. However for applications which create a new PK_Signer object per signature, then this improves performance by about 30%. Notably this includes the TLS layer.
* | Fix bad compare in BigInt <<=Jack Lloyd2019-08-231-1/+1
| | | | | | | | Caused an extra allocation for no reason in some cases.