Commit Graph

4122 Commits (352083b1d06f73ea571ff4804d4169630e3eab88)

Author SHA1 Message Date
Jeffrey Walton 352083b1d0
Cleanup HC128 and HC256 OperateKeystream 2018-10-25 08:24:13 -04:00
Jeffrey Walton ba5ca6b8cd
Add XOP aware BLAKE2b and BLAKE2s 2018-10-25 06:35:43 -04:00
Jeffrey Walton f33b19bf00
Add XOP aware Salsa20 2018-10-25 05:24:02 -04:00
Jeffrey Walton daa07255ec
Fix ambiguous symbol BTEA::StaticAlgorithmName (GH #726) 2018-10-25 02:16:15 -04:00
Jeffrey Walton ecbf791015
Remove unneeded SIMON128 functions in simon64-simd.cpp
This looks like artifacts from when we split simon-simd.cpp into simon64-simd.cpp and simon128-simd.cpp.
2018-10-24 19:02:20 -04:00
Jeffrey Walton 67f421174c
Add XOP aware SIMECK 2018-10-24 17:49:04 -04:00
Jeffrey Walton babdf8b38b
Add XOP aware CHAM and LEA 2018-10-24 17:12:03 -04:00
Jeffrey Walton 210995b867
Add XOP aware SIMON and SPECK 2018-10-24 16:55:59 -04:00
Jeffrey Walton ed4d57cecb
Add XOP aware ChaCha
ChaCha is about 50% faster using XOP for the rotates on AMD machines
2018-10-24 16:15:13 -04:00
Jeffrey Walton b4c4c5aa14
Add SSSE3 rotates when available
This change obtains the remaining 0.1 to 0.15 cpb. It should be engaged with -march=native
2018-10-24 15:34:54 -04:00
Jeffrey Walton c43c47e590
Fix _mm_roti_epi32 and _mm_roti_epi64 redefined on Fedora ar -O0 2018-10-24 13:32:53 -04:00
Jeffrey Walton 18dcbdf514
Move input xor to ChaCha_OperateKeystream_SSE2
This picks up about 0.2 cpb in ChaCha::OperateKeystream. It may not sound like much but it puts SSE2 intrinsics version on par with the ASM version of Salsa20. Salsa20 leads ChaCha by 0.1 to 0.15 cpb, which equates to about 50 MB/s.
2018-10-24 11:00:35 -04:00
Jeffrey Walton d230999b40
Fix ChaCha compile on ARM and MIPS 2018-10-24 01:11:45 -04:00
Jeffrey Walton 6a5d2ab03d
Remove unneeded params from ChaCha_OperateKeystream_SSE2 2018-10-23 08:52:29 -04:00
Jeffrey Walton 028a9f0494
Remove old comments from chacha.cpp
This should have been done at 916c4484a2
2018-10-23 08:12:02 -04:00
Jeffrey Walton 4ad8fa9efe
Fix cryptest.vcxproj.user after 916c4484a2 check-in 2018-10-23 08:05:24 -04:00
Jeffrey Walton 916c4484a2
Add ChaCha SSE2 implementation
Thanks to Jack Lloyd and Botan for allowing us to use the implementation.
The numbers for SSE2 are very good. When compared with Salsa20 ASM the results are:
  * Salsa20 2.55 cpb; ChaCha/20 2.90 cpb
  * Salsa20/12 1.61 cpb; ChaCha/12 1.90 cpb
  * Salsa20/8 1.34 cpb; ChaCha/8 1.5 cpb
2018-10-23 07:57:59 -04:00
Jeffrey Walton 35b874b527
Add additional ChaCha tests 2018-10-23 07:35:41 -04:00
Jeffrey Walton dc840e49a6
Make datatest.cpp more tolerant of comments 2018-10-23 07:09:22 -04:00
Jeffrey Walton 322cda8e6e
Whitespace check-in 2018-10-23 07:08:33 -04:00
Jeffrey Walton 88af6d7230
Remove extraneous folder from PR (GH #723) 2018-10-22 07:53:23 -04:00
orangefour 253f1ba5da Fix unused variable warnings (GH #723) 2018-10-22 07:50:04 -04:00
Jeffrey Walton 8790467fac
Fix constants buffers in TestPadlockRNG 2018-10-21 12:23:31 -04:00
Jeffrey Walton e0d37b22f8
Remove unused variable from TestPadlockRNG 2018-10-21 11:48:41 -04:00
Jeffrey Walton 5e19ac7e48
Update comments in Doxygen config file 2018-10-20 22:55:21 -04:00
Jeffrey Walton 1d0c659fd7
Fix compile error when NO_OS_DEPENDENCE 2018-10-20 07:36:11 -04:00
Jeffrey Walton 1de4f39f86
Add CRYPTOPP_DISABLE_ASM for Google Native Client (GH #719) 2018-10-20 06:31:51 -04:00
Jeffrey Walton 3063c6e1d9
Whitespace check-in 2018-10-20 06:11:46 -04:00
Jeffrey Walton 180b39facc
Disable SecureWipe specializations when CRYPTOPP_DISABLE_ASM (GH #719) 2018-10-20 05:54:49 -04:00
Jeffrey Walton c315c669b7
Disable server-side Doxygen search
This may be contributing to OOM kills in our low-memory environment
2018-10-19 22:19:49 -04:00
Jeffrey Walton c0471236f4
Use version 7.0 rather than 6.2
We had to perform a major version bump due to an ABI break
2018-10-19 20:43:23 -04:00
Jeffrey Walton 9be27c86c6
Fix TestMersenne validation 2018-10-19 07:17:05 -04:00
Jeffrey Walton cab699d7c8
Bail early from test script if initial tests fail 2018-10-19 07:16:35 -04:00
Jeffrey Walton 26fcdb55cd
Add additional RNG tests 2018-10-19 04:57:10 -04:00
Jeffrey Walton ce4af5b85f
Add Test_RandomNumberGenerator function
Copy and paste gone wrong... This cleaned up a lot of tests by folding the code into one function.
2018-10-18 08:59:00 -04:00
Jeffrey Walton 6462152534
Clear MS LNK4221 and libtool warnings 2018-10-17 04:27:54 -04:00
Jeffrey Walton ca08d63a10
Add SIMON and SPECK to validation suite 2018-10-14 10:45:46 -04:00
Jeffrey Walton d6eaa5098e
Remove DEFAULT_BLOCKSIZE constants (GH #535)
This should have been removed around January 2018 with the other functions.
2018-10-14 09:18:45 -04:00
Jeffrey Walton 23279dcd45
Update documentation 2018-10-14 08:21:56 -04:00
Jeffrey Walton 7bd9ffcaca
Remove StaticGetValidBlockSize (GH #535)
This should have been removed around January 2018 with the other functions.
2018-10-14 08:01:25 -04:00
Jeffrey Walton 6660982a55
Allow Cryptogam's AES thunk to be inlined 2018-10-14 07:39:08 -04:00
Jeffrey Walton 4e78abe584
Use HertzToString for friendly CPU speed 2018-10-14 03:50:13 -04:00
Jeffrey Walton c65cd7c365
Use Cycles/Byte for table heading 2018-10-14 02:49:22 -04:00
Jeffrey Walton 0d6c86bae6
Update comments 2018-10-14 00:30:23 -04:00
Jeffrey Walton 49d852ee8c
Enable same buffer for in and out on ARM A-32 (GH #683) 2018-10-13 22:16:59 -04:00
Jeffrey Walton 1acbedd4f8
Fix spelling and grammar 2018-10-13 22:15:41 -04:00
Jeffrey Walton cc5baa9c33
Fix typo in AdvancedProcessBlocks64_6x2_NEON
AdvancedProcessBlocks64_6x2_NEON was only used by Simon and Speck. It was causing failures in wide-block tests for CBC decryption only.
2018-10-13 19:20:08 -04:00
Jeffrey Walton fb303f5180
Fix unset MAKE variable in test scripts 2018-09-26 16:22:19 -04:00
Jeffrey Walton 1d5eaf5268
Fix test scripts on ancient Bash
This showed up on Solaris 9 with Bash 2.05. Also see https://unix.stackexchange.com/q/468579/56041
2018-09-12 13:06:28 -04:00
Jeffrey Walton 590f8573c4
Fix LegacyDecryptor and LegacyDecryptorWithMAC (GH #714)
The classes used the wrong hash with the MAC. The legacy gear should have used SHA1, not SHA256.
2018-09-10 21:55:08 -04:00