Commit Graph

3864 Commits (6f64671e4ae3092206ed8b853e6336f8db75fbcc)

Author SHA1 Message Date
Jeffrey Walton ffc0198991
Update documentation 2018-07-04 03:55:58 -04:00
Jeffrey Walton d00777e1d7
Add Rabbit stream cipher (GH #678) 2018-07-04 03:47:28 -04:00
Jeffrey Walton 94e0b3c954
Update documentation 2018-07-03 23:35:36 -04:00
Jeffrey Walton 65806e5ee9
Switch back to _mm_load_sd to load subkeys
We performed an intermediate copy while attempting to isolate GH #677.
2018-07-03 23:13:40 -04:00
Jeffrey Walton 78ece1b2aa
Fix temporary array size (GH #675)
cryptest.sh and UBsan caught a "secblock.h:389:4: runtime error: load of value 206, which is not a valid value for type 'bool'". m_t[4] is accessed in UncheckedSetKey. The extra m_t[] element was inadvertently removed when ProcessAndXorBlock no longer used it.
2018-07-03 22:41:04 -04:00
Jeffrey Walton f8f6afd1fa
Use IsZero()/NotZero() for 0 denominator test 2018-07-03 22:04:27 -04:00
Jeffrey Walton ac1439de59
Update documentation 2018-07-01 22:25:07 -04:00
Jeffrey Walton 904e8ce283
Remove code to accomodate variable block size (GH #535)
This should have occured when we yanked the variable block size experiment
2018-07-01 22:20:45 -04:00
Jeffrey Walton 3b92255b8b
Add recipe to trim trailing whitespace 2018-07-01 21:45:01 -04:00
Jeffrey Walton 7bfeb4f3a2
Add recipe to call dos2unix if available 2018-07-01 21:38:47 -04:00
Jeffrey Walton aa80c7d4ac
Fix bad CHAM-64/ECB decryption with Clang at -O1 (GH #677)
This changes both the encryption and decryption loops to perform 4 rounds per iteration rather than 8 rounds. Decryption was necessary for this bug. Encryption was included to keep things symmetrical in case of future maintenance
2018-07-01 11:01:34 -04:00
Jeffrey Walton 1d7358e971
Switch to _mm_loadu_si128 for SIMECK key loading 2018-07-01 08:47:09 -04:00
Jeffrey Walton 350a47f8b3
Clear unused variable warnings 2018-07-01 08:09:54 -04:00
Jeffrey Walton 9a6a0cbc9e
Used fixed rounds in encrypt and decrypt functions 2018-07-01 07:10:39 -04:00
Jeffrey Walton 7eaccfa47b
Update comments 2018-07-01 04:03:30 -04:00
Jeffrey Walton d6cde47bbd
Update documentation 2018-07-01 03:53:45 -04:00
Jeffrey Walton da32ed4679
Fix versioning that cross-pollinated when building docs 2018-07-01 03:46:11 -04:00
Jeffrey Walton c58ea35e23
Update documentation 2018-07-01 03:42:17 -04:00
Jeffrey Walton 64d15aff66
Update documentation 2018-07-01 03:29:12 -04:00
Jeffrey Walton b35df75890
Update attribution for SIMECK 2018-07-01 03:21:42 -04:00
Jeffrey Walton 01f11727ad
Fix bench1.cpp from SIMECK testing 2018-07-01 03:14:53 -04:00
Jeffrey Walton 08e6137082
Add SIMECK-64 SSSE3 implementation (GH #675) 2018-07-01 03:11:00 -04:00
Jeffrey Walton 4a7814be7e
Remove alignment of double for 64-bit template 2018-07-01 02:00:10 -04:00
Jeffrey Walton 810f5c1859
Remove GCC_NO_UBSAN and double casts 2018-07-01 01:23:35 -04:00
Jeffrey Walton 7f86f498d6
Remove GCC_NO_UBSAN attribute 2018-07-01 01:02:33 -04:00
Jeffrey Walton 011a66d03b
Clear sign compare warning 2018-07-01 01:01:36 -04:00
Jeffrey Walton 3d29f99af7
Clear warnings at -Wall -Wextra 2018-06-30 19:40:47 -04:00
Jeffrey Walton 1be58db828
Avoid casting among datatypes in CHAM
Clang 5.0 and 6.0 at -O1 is producing code that fails for CHAM-64/ECB
2018-06-30 18:48:20 -04:00
Jeffrey Walton 5fd0e98a41
Add additional SIMECK tests (GH #675) 2018-06-30 09:48:09 -04:00
Jeffrey Walton 8b3c472333
Add additional SIMECK tests (GH #675) 2018-06-30 09:41:38 -04:00
Jeffrey Walton 61f635b837
Add additional SIMECK tests (GH #675) 2018-06-30 08:25:32 -04:00
Jeffrey Walton 7fdb66d46e
Fix cryptest-cmake message 2018-06-30 04:30:58 -04:00
Jeffrey Walton ac036496d3
Add Simeck lightweight block cipher (GH #675)
Add Simeck lightweight block cipher (GH #675)
2018-06-30 02:43:12 -04:00
Jeffrey Walton e18de4d5f9
Re-engage SSE2 ASM for SHA-256 (GH# 674)
I'm not usre where exactly the break occured, but it was probably due to the BASE+SIMD rewrite. Thanks to tesbayda for tracking it down.
2018-06-29 21:02:53 -04:00
Jeffrey Walton 9a75d09ca4
Add cleanup function to cryptest-cmake.sh 2018-06-29 19:43:31 -04:00
Jeffrey Walton 598e371b8a
Add cryptest-cmake.sh 2018-06-29 19:28:16 -04:00
Jeffrey Walton 574097bd6f
Add cryptest-autotools.sh 2018-06-29 17:04:22 -04:00
Jeffrey Walton b613522794
Fix copy/paste error 2018-06-25 15:38:50 -04:00
Jeffrey Walton f5c86217c0
Use default alignment for GetBlock 2018-06-24 16:05:37 -04:00
Jeffrey Walton afd3b5c596
Place HIGHT F0 and F1 in unnamed namespace 2018-06-24 01:39:09 -04:00
Jeffrey Walton b53842bcdc
Fix CRYPTOPP_DISABLE_ASM build 2018-06-24 01:22:37 -04:00
Jeffrey Walton d12229d463
Fix bench1.cpp from HIGHT testing 2018-06-24 01:01:39 -04:00
Jeffrey Walton 2f5b110b52
Add HIGHT lightweight block cipher (GH #672) 2018-06-24 00:54:16 -04:00
Jeffrey Walton 32e2be647a
Make CHAM_Info public 2018-06-23 21:21:42 -04:00
Jeffrey Walton 404e6cfae3
Remove CRYPTOPP_LEA_ARM_SPLAT_ROUNDKEYS
GCC 8 was producing bad decryption results for CBC mode on x86. NEON and Aarch64 was fine. We lose 0.6 cpb so LEA runs around 3.5 cpb instead of 2.9 cpb. It would be nice to pinpoint the GCC issue but it is kind of difficult at the moment.
2018-06-23 20:55:17 -04:00
Jeffrey Walton 3af3b8019b
Add additional LEA test vectors (GH #669) 2018-06-23 17:58:12 -04:00
Jeffrey Walton 72d5d42746
Add additional LEA test vectors (GH #669) 2018-06-23 17:38:07 -04:00
Jeffrey Walton d9797c414a
Add CRYPTOPP_LEA_ARM_SPLAT_ROUNDKEYS for LEA 2018-06-23 14:19:18 -04:00
Jeffrey Walton 2d0d87b57a
Use pre-splatted key table for LEA NEON and Aarch64 2018-06-23 13:47:59 -04:00
Jeffrey Walton 09c8ae2835
Use inline for LEA_Encryption and LEA_Decryption 2018-06-23 12:58:55 -04:00