Commit Graph

3063 Commits (d04bcf101557102266f8dd403169f32950b252bd)

Author SHA1 Message Date
Jeffrey Walton d04bcf1015
Remove ios-tv from allow_failures 2017-08-17 03:57:15 -04:00
Jeffrey Walton 1cc963fe5b Sync with Upstream master 2017-08-17 03:00:41 -04:00
Jeffrey Walton 7779fa3e7a
Fix NEON detection on Aarch32 and Aarch64
I wish GCC would get its head out of its ass and define the apprpriate defines. NEON/ASIMD cannot be disgorged from Aarch32/Aarch64 just like SSE2 cannot be disgorged from x86_64. They are core instruction sets
2017-08-17 02:15:42 -04:00
Jeffrey Walton 6e35e7387a
Add debug configuration to Travis 2017-08-17 01:47:08 -04:00
Jeffrey Walton 8bbcad315f
Fix runtime check for GCM_ReverseHashBufferIfNeeded_PMULL 2017-08-17 01:36:44 -04:00
Jeffrey Walton e4cadb5603 Sync with upstream master 2017-08-17 00:28:27 -04:00
Jeffrey Walton 4fb54ba150
Fix GCM and carryless multiplies
When converting to split-sources, we disgorged ReverseHashBufferIfNeeded from Intel CLMUL and ARM PMULL operations. The problem is, they are linked. The only time a buffer needs reversing is when CLMUL or PMULL is in effect.
However, we made GCM_ReverseHashBufferIfNeeded_CLMUL and GCM_ReverseHashBufferIfNeeded_PMULL available wheneever SSSE3 or NEON was available, which was incorrect. They should only be used when CLMUL or PMULL is being used
2017-08-17 00:26:29 -04:00
Jeffrey Walton f099d2df91
Remove ios-tv from allow_failures 2017-08-16 23:15:23 -04:00
Jeffrey Walton 3887c919c3
Clear unused variable warnings under MSVC 2017-08-16 22:56:36 -04:00
Jeffrey Walton fb5e731fd9 Sync with Upstream master 2017-08-16 22:17:09 -04:00
Jeffrey Walton 609b0ca9e8
Disable Carryless Multiplies for Clang
Clang causes too many problems. Early versions of the compiler simply crashes. Later versions of the compiler still have trouble with Intel ASM and still produce incorrect results on occassion. Additionally, we have to special case the integrated assemvler. Its making a mess of the code and causing self test failures
2017-08-16 22:16:53 -04:00
Jeffrey Walton 371ec39b4f
Update comments 2017-08-16 22:16:34 -04:00
Jeffrey Walton df280a509a
Disable Carryless Multiplies for Clang
Clang causes too many problems. Early versions of the compiler simply crashes. Later versions of the compiler still have trouble with Intel ASM and still produce incorrect results on occassion. Additionally, we have to special case the integrated assemvler. Its making a mess of the code and causing self test failures
2017-08-16 22:10:53 -04:00
Jeffrey Walton 1450847e40
Update comments 2017-08-16 21:43:31 -04:00
Jeffrey Walton df178bd8ee Sync with Upstream master 2017-08-16 20:53:17 -04:00
Jeffrey Walton 5a32fbbeba
Fix "warning: binding dereferenced null pointer to reference has undefined behavior"
This shows up under debug builds when testing instantiations.

 warning: binding dereferenced null pointer to reference has
      undefined behavior [-Wnull-dereference]
        DH2 dh(*(SimpleKeyAgreementDomain*)NULLPTR);
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
2017-08-16 20:49:03 -04:00
Jeffrey Walton 86ff6976dd Sync with Upstream master 2017-08-16 14:57:40 -04:00
Jeffrey Walton b8e794cc6d
Add SHACAL2 optimizations
Thanks to Botan for providing these
2017-08-16 14:33:31 -04:00
Jeffrey Walton edad2ccbcb
Add SHACAL2 optimizations
Thanks to Botan for providing these
2017-08-16 14:29:33 -04:00
Jeffrey Walton 745edc3148 Sync with Upstream master 2017-08-16 12:27:23 -04:00
Jeffrey Walton c40a4dc9f7
Fix Clang warning on missing template definitions 2017-08-16 12:21:07 -04:00
Jeffrey Walton 8f4b0dc081
Suppress C4251 and C4275 warnings in project files (Issue 412) 2017-08-16 11:24:48 -04:00
Jeffrey Walton b0baf7c246
Suppress C4251 and C4275 warnings in project files (Issue 412) 2017-08-16 11:21:24 -04:00
Jeffrey Walton 80ea2e2d14 Sync with Upstream master 2017-08-16 10:43:59 -04:00
Jeffrey Walton b0b749f392
Fold shuffles after loads for SHACAL2 2017-08-16 10:40:00 -04:00
Jeffrey Walton 8480125ef6
Fix compiler feature detection under Clang
Apparently Clang is too dumb to realize we are interested in C++ defines when we use clagng++ and add -std=c++03. Without the -x c++, it fails with a complaint that -std=c++03 cannot be used with C and ObjC files
2017-08-16 09:43:11 -04:00
Jeffrey Walton 429a49859a
Fold shuffles after loads for SHACAL2 2017-08-16 09:07:01 -04:00
Jeffrey Walton 2090d0b0a6
Fix sources after sync with upstream master 2017-08-16 06:18:53 -04:00
Jeffrey Walton 20463e9524 Sync with upstream master 2017-08-16 06:16:15 -04:00
Jeffrey Walton 1ab1e08ac5
Add Intel SHA implementation for SHACAL2 encryption
The implementation came from Jack Lloyd and the Botan team. Jack and the Botan was gracious and allowed us to use Botan's x86_encrypt_blocks function. They also allowed us to release it under the Crypto++ licensing terms. Also see https://github.com/randombit/botan/pull/1151/files
2017-08-16 06:13:06 -04:00
Jeffrey Walton e394313071 Sync with Upstream master 2017-08-16 05:44:38 -04:00
Jeffrey Walton b311aabc31
Update documentation 2017-08-16 05:42:58 -04:00
Jeffrey Walton e19fad007f
Fix library version number in script 2017-08-16 05:36:11 -04:00
Jeffrey Walton 8b21a196dd
Fix library version number 2017-08-16 05:19:41 -04:00
Jeffrey Walton c5c6a6af5c
Fix Doxygen constant documentation 2017-08-16 05:11:37 -04:00
Jeffrey Walton 121a47abce
Update documentation 2017-08-16 04:58:19 -04:00
Jeffrey Walton e08fa3a084 Sync with Upstream master 2017-08-16 04:50:42 -04:00
Jeffrey Walton cbfe2ac6e2
Add Intel SHA implementation for SHACAL2 encryption
The implementation came from Jack Lloyd and the Botan team. Botan was gracious and allowed us to use the x86_encrypt_blocks function, and release it under the Crypto++ licensing terms. Also see https://github.com/randombit/botan/pull/1151/files
2017-08-16 03:47:06 -04:00
Jeffrey Walton 08c37e5887
Update comments in Rijndael head comments 2017-08-15 14:26:30 -04:00
Jeffrey Walton f2a303c30b
Cut-over to Wei's wide AES encryption for ARMv8
Wei's AESNI routines use ARMV8_Enc_Block, ARMV8_Enc_4_Blocks, ARMV8_Dec_Block, ARMV8_Dec_4_Blocks. They increased performance for ECB, CTR and CBC mode. Formerly ECB mode was rinning at 2.3 cpb. After the cut-over ECB dropped to 1.1 cpb.
2017-08-15 12:11:17 -04:00
Jeffrey Walton 4a31b367f2 Sync with Upstream master 2017-08-15 08:52:01 -04:00
Jeffrey Walton 6f36c7deae
Cleared UBsan finding in Default's GenerateKeyIV
passed:  128 deflates and inflates
passed:  128 zlib decompress and compress
default.cpp:69:2: runtime error: null pointer passed as argument 2, which is declared to never be null
/usr/include/x86_64-linux-gnu/bits/string3.h:53:71: runtime error: null pointer passed as argument 2, which is declared to never be null

Information Dispersal and Secret Sharing...
2017-08-15 08:51:03 -04:00
Jeffrey Walton 092b3cb467
Backed off assert.
Its too noisy
2017-08-15 04:42:12 -04:00
Jeffrey Walton 14eef92c8c Sync with Upstream master 2017-08-15 03:15:53 -04:00
Jeffrey Walton 659b47108a
Fix Address Sanitizer findings on GCC117
GCC117 is a Aarch64/ARM64 server with AMD's ARM chip and GCC 7.10. It looks like GCC is performing some std::string optimizations that generates a finding. We did not witness the finding on other platforms, like other Aarch64 devices and x86_64.

We will need to check if taking the address of element-0 is still approved way to get the non-const pointer to the elements
2017-08-15 03:11:03 -04:00
Jeffrey Walton 0110f8397f
Add ELEMS_MAX for SecBlock (Issue 346)
Reset the mark on additional class methods
2017-08-15 03:07:30 -04:00
Jeffrey Walton 876142b1b6
Update with latest sources and reproducible build 2017-08-15 03:05:45 -04:00
Jeffrey Walton 536e8f5236
Test SecBlock for ELEMS_MAX changes (Issue 346) 2017-08-15 02:14:09 -04:00
Jeffrey Walton 40a95bde63 Sync with Upstream master 2017-08-15 01:24:43 -04:00
Jeffrey Walton cebeedfefd
Fix Address Sanitizer findings on GCC117
GCC117 is a Aarch64/ARM64 server powered by AMD's ARM chip. It runs GCC 7.10. It looks like GCC is performing some std::string optimizations that generates a finding. We have not witnessed the finding on other platforms
2017-08-15 01:15:08 -04:00