Commit Graph

3711 Commits

Author SHA1 Message Date
Jeffrey Walton
65806e5ee9
Switch back to _mm_load_sd to load subkeys
We performed an intermediate copy while attempting to isolate GH #677.
2018-07-03 23:13:40 -04:00
Jeffrey Walton
78ece1b2aa
Fix temporary array size (GH #675)
cryptest.sh and UBsan caught a "secblock.h:389:4: runtime error: load of value 206, which is not a valid value for type 'bool'". m_t[4] is accessed in UncheckedSetKey. The extra m_t[] element was inadvertently removed when ProcessAndXorBlock no longer used it.
2018-07-03 22:41:04 -04:00
Jeffrey Walton
f8f6afd1fa
Use IsZero()/NotZero() for 0 denominator test 2018-07-03 22:04:27 -04:00
Jeffrey Walton
ac1439de59
Update documentation 2018-07-01 22:25:07 -04:00
Jeffrey Walton
904e8ce283
Remove code to accomodate variable block size (GH #535)
This should have occured when we yanked the variable block size experiment
2018-07-01 22:20:45 -04:00
Jeffrey Walton
3b92255b8b
Add recipe to trim trailing whitespace 2018-07-01 21:45:01 -04:00
Jeffrey Walton
7bfeb4f3a2
Add recipe to call dos2unix if available 2018-07-01 21:38:47 -04:00
Jeffrey Walton
aa80c7d4ac
Fix bad CHAM-64/ECB decryption with Clang at -O1 (GH #677)
This changes both the encryption and decryption loops to perform 4 rounds per iteration rather than 8 rounds. Decryption was necessary for this bug. Encryption was included to keep things symmetrical in case of future maintenance
2018-07-01 11:01:34 -04:00
Jeffrey Walton
1d7358e971
Switch to _mm_loadu_si128 for SIMECK key loading 2018-07-01 08:47:09 -04:00
Jeffrey Walton
350a47f8b3
Clear unused variable warnings 2018-07-01 08:09:54 -04:00
Jeffrey Walton
9a6a0cbc9e
Used fixed rounds in encrypt and decrypt functions 2018-07-01 07:10:39 -04:00
Jeffrey Walton
7eaccfa47b
Update comments 2018-07-01 04:03:30 -04:00
Jeffrey Walton
d6cde47bbd
Update documentation 2018-07-01 03:53:45 -04:00
Jeffrey Walton
da32ed4679
Fix versioning that cross-pollinated when building docs 2018-07-01 03:46:11 -04:00
Jeffrey Walton
c58ea35e23
Update documentation 2018-07-01 03:42:17 -04:00
Jeffrey Walton
64d15aff66
Update documentation 2018-07-01 03:29:12 -04:00
Jeffrey Walton
b35df75890
Update attribution for SIMECK 2018-07-01 03:21:42 -04:00
Jeffrey Walton
01f11727ad
Fix bench1.cpp from SIMECK testing 2018-07-01 03:14:53 -04:00
Jeffrey Walton
08e6137082
Add SIMECK-64 SSSE3 implementation (GH #675) 2018-07-01 03:11:00 -04:00
Jeffrey Walton
4a7814be7e
Remove alignment of double for 64-bit template 2018-07-01 02:00:10 -04:00
Jeffrey Walton
810f5c1859
Remove GCC_NO_UBSAN and double casts 2018-07-01 01:23:35 -04:00
Jeffrey Walton
7f86f498d6
Remove GCC_NO_UBSAN attribute 2018-07-01 01:02:33 -04:00
Jeffrey Walton
011a66d03b
Clear sign compare warning 2018-07-01 01:01:36 -04:00
Jeffrey Walton
3d29f99af7
Clear warnings at -Wall -Wextra 2018-06-30 19:40:47 -04:00
Jeffrey Walton
1be58db828
Avoid casting among datatypes in CHAM
Clang 5.0 and 6.0 at -O1 is producing code that fails for CHAM-64/ECB
2018-06-30 18:48:20 -04:00
Jeffrey Walton
5fd0e98a41
Add additional SIMECK tests (GH #675) 2018-06-30 09:48:09 -04:00
Jeffrey Walton
8b3c472333
Add additional SIMECK tests (GH #675) 2018-06-30 09:41:38 -04:00
Jeffrey Walton
61f635b837
Add additional SIMECK tests (GH #675) 2018-06-30 08:25:32 -04:00
Jeffrey Walton
7fdb66d46e
Fix cryptest-cmake message 2018-06-30 04:30:58 -04:00
Jeffrey Walton
ac036496d3
Add Simeck lightweight block cipher (GH #675)
Add Simeck lightweight block cipher (GH #675)
2018-06-30 02:43:12 -04:00
Jeffrey Walton
e18de4d5f9
Re-engage SSE2 ASM for SHA-256 (GH# 674)
I'm not usre where exactly the break occured, but it was probably due to the BASE+SIMD rewrite. Thanks to tesbayda for tracking it down.
2018-06-29 21:02:53 -04:00
Jeffrey Walton
9a75d09ca4
Add cleanup function to cryptest-cmake.sh 2018-06-29 19:43:31 -04:00
Jeffrey Walton
598e371b8a
Add cryptest-cmake.sh 2018-06-29 19:28:16 -04:00
Jeffrey Walton
574097bd6f
Add cryptest-autotools.sh 2018-06-29 17:04:22 -04:00
Jeffrey Walton
b613522794
Fix copy/paste error 2018-06-25 15:38:50 -04:00
Jeffrey Walton
f5c86217c0
Use default alignment for GetBlock 2018-06-24 16:05:37 -04:00
Jeffrey Walton
afd3b5c596
Place HIGHT F0 and F1 in unnamed namespace 2018-06-24 01:39:09 -04:00
Jeffrey Walton
b53842bcdc
Fix CRYPTOPP_DISABLE_ASM build 2018-06-24 01:22:37 -04:00
Jeffrey Walton
d12229d463
Fix bench1.cpp from HIGHT testing 2018-06-24 01:01:39 -04:00
Jeffrey Walton
2f5b110b52
Add HIGHT lightweight block cipher (GH #672) 2018-06-24 00:54:16 -04:00
Jeffrey Walton
32e2be647a
Make CHAM_Info public 2018-06-23 21:21:42 -04:00
Jeffrey Walton
404e6cfae3
Remove CRYPTOPP_LEA_ARM_SPLAT_ROUNDKEYS
GCC 8 was producing bad decryption results for CBC mode on x86. NEON and Aarch64 was fine. We lose 0.6 cpb so LEA runs around 3.5 cpb instead of 2.9 cpb. It would be nice to pinpoint the GCC issue but it is kind of difficult at the moment.
2018-06-23 20:55:17 -04:00
Jeffrey Walton
3af3b8019b
Add additional LEA test vectors (GH #669) 2018-06-23 17:58:12 -04:00
Jeffrey Walton
72d5d42746
Add additional LEA test vectors (GH #669) 2018-06-23 17:38:07 -04:00
Jeffrey Walton
d9797c414a
Add CRYPTOPP_LEA_ARM_SPLAT_ROUNDKEYS for LEA 2018-06-23 14:19:18 -04:00
Jeffrey Walton
2d0d87b57a
Use pre-splatted key table for LEA NEON and Aarch64 2018-06-23 13:47:59 -04:00
Jeffrey Walton
09c8ae2835
Use inline for LEA_Encryption and LEA_Decryption 2018-06-23 12:58:55 -04:00
Jeffrey Walton
8279fab432
Fix AdvancedProcessBlocks128_6x1_NEON template name 2018-06-23 12:35:06 -04:00
Jeffrey Walton
527613df22
Update documentation 2018-06-23 12:27:25 -04:00
Jeffrey Walton
d0b5dac162
Update comments 2018-06-23 04:49:10 -04:00