Merge branch 'release/0.10' of https://github.com/cryfs/cryfs into release/0.10
This commit is contained in:
commit
12ce925213
@ -7,6 +7,9 @@ Fixed bugs:
|
||||
Improvements:
|
||||
* Better logging when local state can't be loaded
|
||||
|
||||
Other:
|
||||
* Updated to crypto++ 8.2
|
||||
|
||||
|
||||
Version 0.10.1
|
||||
---------------
|
||||
|
4
vendor/README
vendored
4
vendor/README
vendored
@ -2,6 +2,6 @@ This directory contains external projects, taken from the following locations:
|
||||
googletest: https://github.com/google/googletest/tree/4e4df226fc197c0dda6e37f5c8c3845ca1e73a49
|
||||
- changed: added NOLINT comment as workaround for clang-tidy warning https://github.com/google/googletest/issues/853
|
||||
spdlog: https://github.com/gabime/spdlog/tree/v0.16.3/include/spdlog
|
||||
cryptopp: https://github.com/weidai11/cryptopp/tree/CRYPTOPP_8_1_0
|
||||
- changed: added CMakeLists.txt and cryptopp-config.cmake from https://github.com/noloader/cryptopp-cmake/tree/07a064d57d97477cb055f994a498f45425df0c1d
|
||||
cryptopp: https://github.com/weidai11/cryptopp/tree/CRYPTOPP_8_2_0
|
||||
- changed: added CMakeLists.txt and cryptopp-config.cmake from https://github.com/noloader/cryptopp-cmake/tree/CRYPTOPP_8_2_0
|
||||
- changed: commented out line including winapifamily.h in CMakeLists.txt
|
||||
|
1600
vendor/cryptopp/vendor_cryptopp/CMakeLists.txt
vendored
1600
vendor/cryptopp/vendor_cryptopp/CMakeLists.txt
vendored
File diff suppressed because it is too large
Load Diff
2
vendor/cryptopp/vendor_cryptopp/Doxyfile
vendored
2
vendor/cryptopp/vendor_cryptopp/Doxyfile
vendored
@ -41,7 +41,7 @@ PROJECT_NAME = Crypto++
|
||||
# could be handy for archiving the generated documentation or if some version
|
||||
# control system is used.
|
||||
|
||||
PROJECT_NUMBER = 8.1
|
||||
PROJECT_NUMBER = 8.2
|
||||
|
||||
# Using the PROJECT_BRIEF tag one can provide an optional one line description
|
||||
# for a project that appears at the top of each page and should give viewer a
|
||||
|
1
vendor/cryptopp/vendor_cryptopp/Filelist.txt
vendored
1
vendor/cryptopp/vendor_cryptopp/Filelist.txt
vendored
@ -542,6 +542,7 @@ TestVectors/shacal2.txt
|
||||
TestVectors/simeck.txt
|
||||
TestVectors/simon.txt
|
||||
TestVectors/siphash.txt
|
||||
TestVectors/skipjack.txt
|
||||
TestVectors/sm3.txt
|
||||
TestVectors/sm4.txt
|
||||
TestVectors/sosemanuk.txt
|
||||
|
97
vendor/cryptopp/vendor_cryptopp/GNUmakefile
vendored
97
vendor/cryptopp/vendor_cryptopp/GNUmakefile
vendored
@ -10,8 +10,6 @@ SHELL = /bin/sh
|
||||
|
||||
# If needed
|
||||
TMPDIR ?= /tmp
|
||||
# Used for ARMv7 and NEON.
|
||||
FP_ABI ?= hard
|
||||
# Used for feature tests
|
||||
TOUT ?= a.out
|
||||
TOUT := $(strip $(TOUT))
|
||||
@ -53,8 +51,6 @@ IS_SPARC64 := $(shell echo "$(HOSTX)" | $(GREP) -i -c -E 'sun|sparc64')
|
||||
IS_ARM32 := $(shell echo "$(HOSTX)" | $(GREP) -i -c -E 'arm|armhf|arm7l|eabihf')
|
||||
IS_ARMV8 := $(shell echo "$(HOSTX)" | $(GREP) -i -c -E 'aarch32|aarch64|arm64|armv8')
|
||||
|
||||
IS_NEON := $(shell $(CXX) $(CXXFLAGS) -dumpmachine 2>/dev/null | $(GREP) -i -c -E 'armv7|armhf|arm7l|eabihf|armv8|aarch32|aarch64')
|
||||
|
||||
# Attempt to determine platform
|
||||
SYSTEMX := $(shell $(CXX) $(CXXFLAGS) -dumpmachine 2>/dev/null)
|
||||
ifeq ($(SYSTEMX),)
|
||||
@ -439,37 +435,37 @@ endif
|
||||
##### ARM A-32, Aach64 and NEON #####
|
||||
###########################################################
|
||||
|
||||
ifneq ($(IS_ARM32)$(IS_ARMV8)$(IS_NEON),000)
|
||||
ifneq ($(IS_ARM32)$(IS_ARMV8),00)
|
||||
ifeq ($(DETECT_FEATURES),1)
|
||||
|
||||
ifeq ($(IS_ARM32)$(IS_NEON),11)
|
||||
ifneq ($(IS_ARM32),0)
|
||||
|
||||
TPROG = TestPrograms/test_arm_neon.cxx
|
||||
TOPT = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
||||
TOPT = -march=armv7-a -mfpu=neon
|
||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
ifeq ($(strip $(HAVE_OPT)),0)
|
||||
NEON_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
||||
ARIA_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
||||
AES_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
||||
CRC_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
||||
GCM_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
||||
BLAKE2B_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
||||
BLAKE2S_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
||||
CHACHA_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
||||
CHAM_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
||||
LEA_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
||||
SHA_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
||||
SIMECK_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
||||
SIMON64_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
||||
SIMON128_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
||||
SPECK64_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
||||
SPECK128_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
||||
SM4_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
||||
NEON_FLAG = -march=armv7-a -mfpu=neon
|
||||
ARIA_FLAG = -march=armv7-a -mfpu=neon
|
||||
AES_FLAG = -march=armv7-a -mfpu=neon
|
||||
CRC_FLAG = -march=armv7-a -mfpu=neon
|
||||
GCM_FLAG = -march=armv7-a -mfpu=neon
|
||||
BLAKE2B_FLAG = -march=armv7-a -mfpu=neon
|
||||
BLAKE2S_FLAG = -march=armv7-a -mfpu=neon
|
||||
CHACHA_FLAG = -march=armv7-a -mfpu=neon
|
||||
CHAM_FLAG = -march=armv7-a -mfpu=neon
|
||||
LEA_FLAG = -march=armv7-a -mfpu=neon
|
||||
SHA_FLAG = -march=armv7-a -mfpu=neon
|
||||
SIMECK_FLAG = -march=armv7-a -mfpu=neon
|
||||
SIMON64_FLAG = -march=armv7-a -mfpu=neon
|
||||
SIMON128_FLAG = -march=armv7-a -mfpu=neon
|
||||
SPECK64_FLAG = -march=armv7-a -mfpu=neon
|
||||
SPECK128_FLAG = -march=armv7-a -mfpu=neon
|
||||
SM4_FLAG = -march=armv7-a -mfpu=neon
|
||||
else
|
||||
CXXFLAGS += -DCRYPTOPP_DISABLE_ASM
|
||||
endif
|
||||
|
||||
# IS_NEON
|
||||
# IS_ARM32
|
||||
endif
|
||||
|
||||
ifeq ($(IS_ARMV8),1)
|
||||
@ -485,7 +481,7 @@ ifeq ($(IS_ARMV8),1)
|
||||
|
||||
TPROG = TestPrograms/test_arm_asimd.cxx
|
||||
TOPT = -march=armv8-a
|
||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
ifeq ($(strip $(HAVE_OPT)),0)
|
||||
ASIMD_FLAG = -march=armv8-a
|
||||
ARIA_FLAG = -march=armv8-a
|
||||
@ -508,7 +504,7 @@ ifeq ($(IS_ARMV8),1)
|
||||
ifneq ($(ASIMD_FLAG),)
|
||||
TPROG = TestPrograms/test_arm_crc.cxx
|
||||
TOPT = -march=armv8-a+crc
|
||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
ifeq ($(strip $(HAVE_OPT)),0)
|
||||
CRC_FLAG = -march=armv8-a+crc
|
||||
else
|
||||
@ -517,7 +513,7 @@ ifeq ($(IS_ARMV8),1)
|
||||
|
||||
TPROG = TestPrograms/test_arm_aes.cxx
|
||||
TOPT = -march=armv8-a+crypto
|
||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
ifeq ($(strip $(HAVE_OPT)),0)
|
||||
AES_FLAG = -march=armv8-a+crypto
|
||||
else
|
||||
@ -526,7 +522,7 @@ ifeq ($(IS_ARMV8),1)
|
||||
|
||||
TPROG = TestPrograms/test_arm_pmull.cxx
|
||||
TOPT = -march=armv8-a+crypto
|
||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
ifeq ($(strip $(HAVE_OPT)),0)
|
||||
GCM_FLAG = -march=armv8-a+crypto
|
||||
GF2N_FLAG = -march=armv8-a+crypto
|
||||
@ -536,7 +532,7 @@ ifeq ($(IS_ARMV8),1)
|
||||
|
||||
TPROG = TestPrograms/test_arm_sha.cxx
|
||||
TOPT = -march=armv8-a+crypto
|
||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
ifeq ($(strip $(HAVE_OPT)),0)
|
||||
SHA_FLAG = -march=armv8-a+crypto
|
||||
else
|
||||
@ -545,7 +541,7 @@ ifeq ($(IS_ARMV8),1)
|
||||
|
||||
TPROG = TestPrograms/test_arm_sm3.cxx
|
||||
TOPT = -march=armv8.4-a+crypto
|
||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
ifeq ($(strip $(HAVE_OPT)),0)
|
||||
SM3_FLAG = -march=armv8.4-a+crypto
|
||||
SM4_FLAG = -march=armv8.4-a+crypto
|
||||
@ -553,7 +549,7 @@ ifeq ($(IS_ARMV8),1)
|
||||
|
||||
TPROG = TestPrograms/test_arm_sha3.cxx
|
||||
TOPT = -march=armv8.4-a+crypto
|
||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
ifeq ($(strip $(HAVE_OPT)),0)
|
||||
SHA3_FLAG = -march=armv8.4-a+crypto
|
||||
endif
|
||||
@ -567,7 +563,7 @@ endif
|
||||
# DETECT_FEATURES
|
||||
endif
|
||||
|
||||
# IS_ARM32, IS_ARMV8, IS_NEON
|
||||
# IS_ARM32, IS_ARMV8
|
||||
endif
|
||||
|
||||
###########################################################
|
||||
@ -622,13 +618,21 @@ ifeq ($(DETECT_FEATURES),1)
|
||||
TOPT = $(POWER8_FLAG)
|
||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
ifeq ($(strip $(HAVE_OPT)),0)
|
||||
AES_FLAG = $(POWER8_FLAG)
|
||||
ARIA_FLAG = $(POWER8_FLAG)
|
||||
BLAKE2B_FLAG = $(POWER8_FLAG)
|
||||
BLAKE2S_FLAG = $(POWER8_FLAG)
|
||||
CHACHA_FLAG = $(POWER8_FLAG)
|
||||
CHAM_FLAG = $(POWER8_FLAG)
|
||||
CRC_FLAG = $(POWER8_FLAG)
|
||||
GCM_FLAG = $(POWER8_FLAG)
|
||||
GF2N_FLAG = $(POWER8_FLAG)
|
||||
AES_FLAG = $(POWER8_FLAG)
|
||||
LEA_FLAG = $(POWER8_FLAG)
|
||||
SHA_FLAG = $(POWER8_FLAG)
|
||||
SHACAL2_FLAG = $(POWER8_FLAG)
|
||||
SIMECK_FLAG = $(POWER8_FLAG)
|
||||
SIMON64_FLAG = $(POWER8_FLAG)
|
||||
SPECK64_FLAG = $(POWER8_FLAG)
|
||||
SIMON128_FLAG = $(POWER8_FLAG)
|
||||
SPECK128_FLAG = $(POWER8_FLAG)
|
||||
else
|
||||
@ -641,16 +645,7 @@ ifeq ($(DETECT_FEATURES),1)
|
||||
TPROG = TestPrograms/test_ppc_power7.cxx
|
||||
TOPT = $(POWER7_FLAG)
|
||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
ifeq ($(strip $(HAVE_OPT)),0)
|
||||
ARIA_FLAG = $(POWER7_FLAG)
|
||||
BLAKE2S_FLAG = $(POWER7_FLAG)
|
||||
CHACHA_FLAG = $(POWER7_FLAG)
|
||||
CHAM_FLAG = $(POWER7_FLAG)
|
||||
LEA_FLAG = $(POWER7_FLAG)
|
||||
SIMECK_FLAG = $(POWER7_FLAG)
|
||||
SIMON64_FLAG = $(POWER7_FLAG)
|
||||
SPECK64_FLAG = $(POWER7_FLAG)
|
||||
else
|
||||
ifneq ($(strip $(HAVE_OPT)),0)
|
||||
POWER7_FLAG =
|
||||
endif
|
||||
|
||||
@ -693,18 +688,12 @@ ifeq ($(DETECT_FEATURES),1)
|
||||
#####################################################################
|
||||
# Fixups for algorithms that can drop to a lower ISA, if needed
|
||||
|
||||
# Drop to Power7 if Power8 is not available.
|
||||
# Drop to Power4 if Power8 not available
|
||||
ifeq ($(POWER8_FLAG),)
|
||||
ifneq ($(POWER7_FLAG),)
|
||||
GCM_FLAG = $(POWER7_FLAG)
|
||||
endif
|
||||
endif
|
||||
|
||||
# Drop to Power4 if Power7 not available
|
||||
ifeq ($(POWER7_FLAG),)
|
||||
ifneq ($(ALTIVEC_FLAG),)
|
||||
BLAKE2S_FLAG = $(ALTIVEC_FLAG)
|
||||
CHACHA_FLAG = $(ALTIVEC_FLAG)
|
||||
GCM_FLAG = $(ALTIVEC_FLAG)
|
||||
SIMON64_FLAG = $(ALTIVEC_FLAG)
|
||||
SPECK64_FLAG = $(ALTIVEC_FLAG)
|
||||
endif
|
||||
@ -1349,7 +1338,7 @@ libcryptopp.pc:
|
||||
@echo '' >> libcryptopp.pc
|
||||
@echo 'Name: Crypto++' >> libcryptopp.pc
|
||||
@echo 'Description: Crypto++ cryptographic library' >> libcryptopp.pc
|
||||
@echo 'Version: 8.1' >> libcryptopp.pc
|
||||
@echo 'Version: 8.2' >> libcryptopp.pc
|
||||
@echo 'URL: https://cryptopp.com/' >> libcryptopp.pc
|
||||
@echo '' >> libcryptopp.pc
|
||||
@echo 'Cflags: -I$${includedir}' >> libcryptopp.pc
|
||||
@ -1430,7 +1419,7 @@ endif # Dependencies
|
||||
|
||||
# Cryptogams ARM asm implementation.
|
||||
aes_armv4.o : aes_armv4.S
|
||||
$(CC) $(strip $(CXXFLAGS) $(CRYPTOGAMS_AES_FLAG) -mfloat-abi=$(FP_ABI) -c) $<
|
||||
$(CC) $(strip $(CXXFLAGS) $(CRYPTOGAMS_AES_FLAG) -c) $<
|
||||
|
||||
# SSSE3 or NEON available
|
||||
aria_simd.o : aria_simd.cpp
|
||||
|
@ -384,10 +384,10 @@ ifeq ($(IS_ARM32),1)
|
||||
SM4_FLAG = $(NEON_FLAG)
|
||||
else
|
||||
NEON_FLAG =
|
||||
CXXFLAGS += -DCRYPTOPP_DISABLE_NEON
|
||||
CXXFLAGS += -DCRYPTOPP_DISABLE_ASM
|
||||
endif
|
||||
|
||||
# IS_NEON
|
||||
# IS_ARM32
|
||||
endif
|
||||
|
||||
ifeq ($(IS_ARMV8),1)
|
||||
@ -417,7 +417,7 @@ ifeq ($(IS_ARMV8),1)
|
||||
|
||||
TPROG = TestPrograms/test_arm_asimd.cxx
|
||||
TOPT = $(ASIMD_FLAG)
|
||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
ifeq ($(strip $(HAVE_OPT)),0)
|
||||
ARIA_FLAG = $(ASIMD_FLAG)
|
||||
BLAKE2B_FLAG = $(ASIMD_FLAG)
|
||||
@ -439,7 +439,7 @@ ifeq ($(IS_ARMV8),1)
|
||||
|
||||
TPROG = TestPrograms/test_arm_crc.cxx
|
||||
TOPT = $(CRC_FLAG)
|
||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
ifneq ($(strip $(HAVE_OPT)),0)
|
||||
CRC_FLAG =
|
||||
CXXFLAGS += -DCRYPTOPP_ARM_CRC32_AVAILABLE=0
|
||||
@ -447,7 +447,7 @@ ifeq ($(IS_ARMV8),1)
|
||||
|
||||
TPROG = TestPrograms/test_arm_aes.cxx
|
||||
TOPT = $(AES_FLAG)
|
||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
ifneq ($(strip $(HAVE_OPT)),0)
|
||||
AES_FLAG =
|
||||
CXXFLAGS += -DCRYPTOPP_ARM_AES_AVAILABLE=0
|
||||
@ -455,7 +455,7 @@ ifeq ($(IS_ARMV8),1)
|
||||
|
||||
TPROG = TestPrograms/test_arm_pmull.cxx
|
||||
TOPT = $(PMULL_FLAG)
|
||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
ifneq ($(strip $(HAVE_OPT)),0)
|
||||
PMULL_FLAG =
|
||||
CXXFLAGS += -DCRYPTOPP_ARM_PMULL_AVAILABLE=0
|
||||
@ -463,7 +463,7 @@ ifeq ($(IS_ARMV8),1)
|
||||
|
||||
TPROG = TestPrograms/test_arm_sha.cxx
|
||||
TOPT = $(SHA_FLAG)
|
||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
ifneq ($(strip $(HAVE_OPT)),0)
|
||||
SHA_FLAG =
|
||||
CXXFLAGS += -DCRYPTOPP_ARM_SHA_AVAILABLE=0
|
||||
@ -471,7 +471,7 @@ ifeq ($(IS_ARMV8),1)
|
||||
|
||||
TPROG = TestPrograms/test_arm_sm3.cxx
|
||||
TOPT = -march=armv8.4-a+crypto
|
||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
ifeq ($(strip $(HAVE_OPT)),0)
|
||||
SM3_FLAG = -march=armv8.4-a+crypto
|
||||
SM4_FLAG = -march=armv8.4-a+crypto
|
||||
@ -479,7 +479,7 @@ ifeq ($(IS_ARMV8),1)
|
||||
|
||||
TPROG = TestPrograms/test_arm_sha3.cxx
|
||||
TOPT = -march=armv8.4-a+crypto
|
||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||
ifeq ($(strip $(HAVE_OPT)),0)
|
||||
SHA3_FLAG = -march=armv8.4-a+crypto
|
||||
SHA512_FLAG = -march=armv8.4-a+crypto
|
||||
|
17
vendor/cryptopp/vendor_cryptopp/History.txt
vendored
17
vendor/cryptopp/vendor_cryptopp/History.txt
vendored
@ -455,10 +455,10 @@ last several releases.
|
||||
8.1.0 - February 22, 2019
|
||||
- minor release, no recompile of programs required
|
||||
- expanded community input and support
|
||||
56 unique contributors as of this release
|
||||
* 56 unique contributors as of this release
|
||||
- fix OS X PowerPC builds with Clang
|
||||
- add Microsoft ARM64 support
|
||||
- fix iPhone Simulator build due to missign symbols
|
||||
- fix iPhone Simulator build due to missing symbols
|
||||
- add CRYPTOPP_BUGGY_SIMD_LOAD_AND_STORE
|
||||
- add carryless multiplies for NIST b233 and k233 curves
|
||||
- fix OpenMP build due to use of OpenMP 4 with down-level compilers
|
||||
@ -467,3 +467,16 @@ last several releases.
|
||||
- add SHAKE-128 and SHAKE-256
|
||||
- fix AVX2 build due to _mm256_broadcastsi128_si256
|
||||
- add IETF ChaCha, XChaCha, ChaChaPoly1305 and XChaChaPoly1305
|
||||
|
||||
8.2.0 - April 28, 2019
|
||||
- minor release, no recompile of programs required
|
||||
- expanded community input and support
|
||||
* 56 unique contributors as of this release
|
||||
- use PowerPC unaligned loads and stores with Power8
|
||||
- add SKIPJACK test vectors
|
||||
- fix SHAKE-128 and SHAKE-256 compile
|
||||
- removed IS_NEON from Makefile
|
||||
- fix Aarch64 build on Fedora 29
|
||||
- fix missing GF2NT_233_Multiply_Reduce_CLMUL in FIPS DLL
|
||||
- add missing BLAKE2 constructors
|
||||
- fix missing BlockSize() in BLAKE2 classes
|
||||
|
32
vendor/cryptopp/vendor_cryptopp/Readme.txt
vendored
32
vendor/cryptopp/vendor_cryptopp/Readme.txt
vendored
@ -1,5 +1,5 @@
|
||||
Crypto++: free C++ Class Library of Cryptographic Schemes
|
||||
Version 8.0 - DEC/28/2018
|
||||
Version 8.2 - APR/28/2019
|
||||
|
||||
Crypto++ Library is a free C++ class library of cryptographic schemes.
|
||||
Currently the library contains the following algorithms:
|
||||
@ -290,8 +290,36 @@ documentation is one of the highest returns on investment.
|
||||
The items in this section comprise the most recent history. Please see History.txt
|
||||
for the record back to Crypto++ 1.0.
|
||||
|
||||
8.0.0 - December 28, 2018
|
||||
8.2.0 - April 28, 2019
|
||||
- minor release, no recompile of programs required
|
||||
- expanded community input and support
|
||||
* 56 unique contributors as of this release
|
||||
- use PowerPC unaligned loads and stores with Power8
|
||||
- add SKIPJACK test vectors
|
||||
- fix SHAKE-128 and SHAKE-256 compile
|
||||
- removed IS_NEON from Makefile
|
||||
- fix Aarch64 build on Fedora 29
|
||||
- fix missing GF2NT_233_Multiply_Reduce_CLMUL in FIPS DLL
|
||||
- add missing BLAKE2 constructors
|
||||
- fix missing BlockSize() in BLAKE2 classes
|
||||
|
||||
8.1.0 - February 22, 2019
|
||||
- minor release, no recompile of programs required
|
||||
- expanded community input and support
|
||||
* 56 unique contributors as of this release
|
||||
- fix OS X PowerPC builds with Clang
|
||||
- add Microsoft ARM64 support
|
||||
- fix iPhone Simulator build due to missing symbols
|
||||
- add CRYPTOPP_BUGGY_SIMD_LOAD_AND_STORE
|
||||
- add carryless multiplies for NIST b233 and k233 curves
|
||||
- fix OpenMP build due to use of OpenMP 4 with down-level compilers
|
||||
- add SignStream and VerifyStream for ed25519 and large files
|
||||
- fix missing AlgorithmProvider in PanamaHash
|
||||
- add SHAKE-128 and SHAKE-256
|
||||
- fix AVX2 build due to _mm256_broadcastsi128_si256
|
||||
- add IETF ChaCha, XChaCha, ChaChaPoly1305 and XChaChaPoly1305
|
||||
|
||||
8.0.0 - December 28, 2018
|
||||
- major release, recompile of programs required
|
||||
- expanded community input and support
|
||||
* 54 unique contributors as of this release
|
||||
|
@ -4,11 +4,14 @@
|
||||
# building the docs. Before running the script, copy it to the root
|
||||
# directory. After running this script, you can 'make docs'
|
||||
|
||||
sed 's|Library 8.1 API|Library 8.0 API|g' cryptlib.h > cryptlib.h.new
|
||||
sed 's|Library 8.2 API|Library 8.1 API|g' cryptlib.h > cryptlib.h.new
|
||||
mv cryptlib.h.new cryptlib.h
|
||||
|
||||
sed 's|= 8.1|= 8.0|g' Doxyfile > Doxyfile.new
|
||||
sed 's|= 8.2|= 8.1|g' Doxyfile > Doxyfile.new
|
||||
mv Doxyfile.new Doxyfile
|
||||
|
||||
sed 's|CRYPTOPP_VERSION 810|CRYPTOPP_VERSION 800|g' config.h > config.h.new
|
||||
sed 's|CRYPTOPP_MINOR 2|CRYPTOPP_MINOR 1|g' config.h > config.h.new
|
||||
mv config.h.new config.h
|
||||
|
||||
sed 's|CRYPTOPP_VERSION 820|CRYPTOPP_VERSION 810|g' config.h > config.h.new
|
||||
mv config.h.new config.h
|
||||
|
@ -26,7 +26,7 @@ trap cleanup EXIT
|
||||
############################################
|
||||
# Tags to test
|
||||
|
||||
OLD_VERSION_TAG=CRYPTOPP_8_0_0
|
||||
OLD_VERSION_TAG=CRYPTOPP_8_1_0
|
||||
NEW_VERSION_TAG=master
|
||||
|
||||
############################################
|
||||
|
@ -49,6 +49,7 @@ Test: TestVectors/sha.txt
|
||||
Test: TestVectors/simeck.txt
|
||||
Test: TestVectors/simon.txt
|
||||
Test: TestVectors/siphash.txt
|
||||
Test: TestVectors/skipjack.txt
|
||||
Test: TestVectors/sm3.txt
|
||||
Test: TestVectors/sm4.txt
|
||||
Test: TestVectors/sosemanuk.txt
|
||||
|
1046
vendor/cryptopp/vendor_cryptopp/TestVectors/skipjack.txt
vendored
Normal file
1046
vendor/cryptopp/vendor_cryptopp/TestVectors/skipjack.txt
vendored
Normal file
File diff suppressed because it is too large
Load Diff
42
vendor/cryptopp/vendor_cryptopp/blake2.cpp
vendored
42
vendor/cryptopp/vendor_cryptopp/blake2.cpp
vendored
@ -38,8 +38,8 @@
|
||||
// https://github.com/weidai11/cryptopp/issues/743
|
||||
#if defined(__xlC__) && (__xlC__ < 0x0d01)
|
||||
# define CRYPTOPP_DISABLE_ALTIVEC 1
|
||||
# define CRYPTOPP_POWER7_ALTIVEC 1
|
||||
# undef CRYPTOPP_POWER7_AVAILABLE
|
||||
# undef CRYPTOPP_POWER8_AVAILABLE
|
||||
# undef CRYPTOPP_ALTIVEC_AVAILABLE
|
||||
#endif
|
||||
|
||||
@ -171,8 +171,8 @@ extern void BLAKE2_Compress32_NEON(const byte* input, BLAKE2s_State& state);
|
||||
extern void BLAKE2_Compress64_NEON(const byte* input, BLAKE2b_State& state);
|
||||
#endif
|
||||
|
||||
#if CRYPTOPP_POWER7_AVAILABLE
|
||||
extern void BLAKE2_Compress32_POWER7(const byte* input, BLAKE2s_State& state);
|
||||
#if CRYPTOPP_POWER8_AVAILABLE
|
||||
extern void BLAKE2_Compress32_POWER8(const byte* input, BLAKE2s_State& state);
|
||||
#elif CRYPTOPP_ALTIVEC_AVAILABLE
|
||||
extern void BLAKE2_Compress32_ALTIVEC(const byte* input, BLAKE2s_State& state);
|
||||
#endif
|
||||
@ -233,8 +233,8 @@ unsigned int BLAKE2s::OptimalDataAlignment() const
|
||||
return 4;
|
||||
else
|
||||
#endif
|
||||
#if (CRYPTOPP_POWER7_AVAILABLE)
|
||||
if (HasPower7())
|
||||
#if (CRYPTOPP_POWER8_AVAILABLE)
|
||||
if (HasPower8())
|
||||
return 16;
|
||||
else
|
||||
#elif (CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||
@ -257,9 +257,9 @@ std::string BLAKE2s::AlgorithmProvider() const
|
||||
return "NEON";
|
||||
else
|
||||
#endif
|
||||
#if (CRYPTOPP_POWER7_AVAILABLE)
|
||||
if (HasPower7())
|
||||
return "Power7";
|
||||
#if (CRYPTOPP_POWER8_AVAILABLE)
|
||||
if (HasPower8())
|
||||
return "Power8";
|
||||
else
|
||||
#elif (CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||
if (HasAltivec())
|
||||
@ -343,6 +343,26 @@ BLAKE2b::BLAKE2b(bool treeMode, unsigned int digestSize)
|
||||
(Name::TreeMode(), treeMode));
|
||||
}
|
||||
|
||||
BLAKE2s::BLAKE2s(unsigned int digestSize)
|
||||
: m_digestSize(digestSize), m_keyLength(0), m_treeMode(false)
|
||||
{
|
||||
CRYPTOPP_ASSERT(digestSize <= DIGESTSIZE);
|
||||
|
||||
UncheckedSetKey(NULLPTR, 0, MakeParameters
|
||||
(Name::DigestSize(), (int)digestSize)
|
||||
(Name::TreeMode(), false));
|
||||
}
|
||||
|
||||
BLAKE2b::BLAKE2b(unsigned int digestSize)
|
||||
: m_digestSize(digestSize), m_keyLength(0), m_treeMode(false)
|
||||
{
|
||||
CRYPTOPP_ASSERT(digestSize <= DIGESTSIZE);
|
||||
|
||||
UncheckedSetKey(NULLPTR, 0, MakeParameters
|
||||
(Name::DigestSize(), (int)digestSize)
|
||||
(Name::TreeMode(), false));
|
||||
}
|
||||
|
||||
BLAKE2s::BLAKE2s(const byte *key, size_t keyLength, const byte* salt, size_t saltLength,
|
||||
const byte* personalization, size_t personalizationLength, bool treeMode, unsigned int digestSize)
|
||||
: m_digestSize(digestSize), m_keyLength(static_cast<unsigned int>(keyLength)), m_treeMode(treeMode)
|
||||
@ -670,10 +690,10 @@ void BLAKE2s::Compress(const byte *input)
|
||||
return BLAKE2_Compress32_NEON(input, m_state);
|
||||
}
|
||||
#endif
|
||||
#if CRYPTOPP_POWER7_AVAILABLE
|
||||
if(HasPower7())
|
||||
#if CRYPTOPP_POWER8_AVAILABLE
|
||||
if(HasPower8())
|
||||
{
|
||||
return BLAKE2_Compress32_POWER7(input, m_state);
|
||||
return BLAKE2_Compress32_POWER8(input, m_state);
|
||||
}
|
||||
#elif CRYPTOPP_ALTIVEC_AVAILABLE
|
||||
if(HasAltivec())
|
||||
|
22
vendor/cryptopp/vendor_cryptopp/blake2.h
vendored
22
vendor/cryptopp/vendor_cryptopp/blake2.h
vendored
@ -256,17 +256,25 @@ public:
|
||||
/// \brief Construct a BLAKE2s hash
|
||||
/// \param digestSize the digest size, in bytes
|
||||
/// \param treeMode flag indicating tree mode
|
||||
/// \since Crypto++ 5.6.4
|
||||
BLAKE2s(bool treeMode=false, unsigned int digestSize = DIGESTSIZE);
|
||||
|
||||
/// \brief Construct a BLAKE2s hash
|
||||
/// \param digestSize the digest size, in bytes
|
||||
/// \details treeMode flag is set to false
|
||||
/// \since Crypto++ 8.2
|
||||
BLAKE2s(unsigned int digestSize);
|
||||
|
||||
/// \brief Construct a BLAKE2s hash
|
||||
/// \param key a byte array used to key the cipher
|
||||
/// \param keyLength the size of the byte array
|
||||
/// \param salt a byte array used as salt
|
||||
/// \param saltLength the size of the byte array
|
||||
/// \param personalization a byte array used as prsonalization string
|
||||
/// \param personalization a byte array used as personalization string
|
||||
/// \param personalizationLength the size of the byte array
|
||||
/// \param treeMode flag indicating tree mode
|
||||
/// \param digestSize the digest size, in bytes
|
||||
/// \since Crypto++ 5.6.4
|
||||
BLAKE2s(const byte *key, size_t keyLength, const byte* salt = NULLPTR, size_t saltLength = 0,
|
||||
const byte* personalization = NULLPTR, size_t personalizationLength = 0,
|
||||
bool treeMode=false, unsigned int digestSize = DIGESTSIZE);
|
||||
@ -278,6 +286,7 @@ public:
|
||||
/// Message Authentication Code (MAC)</A>. For example, "BLAKE2b-512" and "BLAKE2s-256".
|
||||
std::string AlgorithmName() const {return std::string(BLAKE2s_Info::StaticAlgorithmName()) + "-" + IntToString(DigestSize()*8);}
|
||||
|
||||
unsigned int BlockSize() const {return BLOCKSIZE;}
|
||||
unsigned int DigestSize() const {return m_digestSize;}
|
||||
unsigned int OptimalDataAlignment() const;
|
||||
|
||||
@ -354,17 +363,25 @@ public:
|
||||
/// \brief Construct a BLAKE2b hash
|
||||
/// \param digestSize the digest size, in bytes
|
||||
/// \param treeMode flag indicating tree mode
|
||||
/// \since Crypto++ 5.6.4
|
||||
BLAKE2b(bool treeMode=false, unsigned int digestSize = DIGESTSIZE);
|
||||
|
||||
/// \brief Construct a BLAKE2s hash
|
||||
/// \param digestSize the digest size, in bytes
|
||||
/// \details treeMode flag is set to false
|
||||
/// \since Crypto++ 8.2
|
||||
BLAKE2b(unsigned int digestSize);
|
||||
|
||||
/// \brief Construct a BLAKE2b hash
|
||||
/// \param key a byte array used to key the cipher
|
||||
/// \param keyLength the size of the byte array
|
||||
/// \param salt a byte array used as salt
|
||||
/// \param saltLength the size of the byte array
|
||||
/// \param personalization a byte array used as prsonalization string
|
||||
/// \param personalization a byte array used as personalization string
|
||||
/// \param personalizationLength the size of the byte array
|
||||
/// \param treeMode flag indicating tree mode
|
||||
/// \param digestSize the digest size, in bytes
|
||||
/// \since Crypto++ 5.6.4
|
||||
BLAKE2b(const byte *key, size_t keyLength, const byte* salt = NULLPTR, size_t saltLength = 0,
|
||||
const byte* personalization = NULLPTR, size_t personalizationLength = 0,
|
||||
bool treeMode=false, unsigned int digestSize = DIGESTSIZE);
|
||||
@ -376,6 +393,7 @@ public:
|
||||
/// Message Authentication Code (MAC)</A>. For example, "BLAKE2b-512" and "BLAKE2s-256".
|
||||
std::string AlgorithmName() const {return std::string(BLAKE2b_Info::StaticAlgorithmName()) + "-" + IntToString(DigestSize()*8);}
|
||||
|
||||
unsigned int BlockSize() const {return BLOCKSIZE;}
|
||||
unsigned int DigestSize() const {return m_digestSize;}
|
||||
unsigned int OptimalDataAlignment() const;
|
||||
|
||||
|
@ -29,6 +29,7 @@
|
||||
#if defined(__xlC__) && (__xlC__ < 0x0d01)
|
||||
# define CRYPTOPP_DISABLE_ALTIVEC 1
|
||||
# undef CRYPTOPP_POWER7_AVAILABLE
|
||||
# undef CRYPTOPP_POWER8_AVAILABLE
|
||||
# undef CRYPTOPP_ALTIVEC_AVAILABLE
|
||||
#endif
|
||||
|
||||
|
12
vendor/cryptopp/vendor_cryptopp/blake2s_simd.cpp
vendored
12
vendor/cryptopp/vendor_cryptopp/blake2s_simd.cpp
vendored
@ -38,8 +38,8 @@
|
||||
// https://github.com/weidai11/cryptopp/issues/743
|
||||
#if defined(__xlC__) && (__xlC__ < 0x0d01)
|
||||
# define CRYPTOPP_DISABLE_ALTIVEC 1
|
||||
# define CRYPTOPP_POWER7_ALTIVEC 1
|
||||
# undef CRYPTOPP_POWER7_AVAILABLE
|
||||
# undef CRYPTOPP_POWER8_AVAILABLE
|
||||
# undef CRYPTOPP_ALTIVEC_AVAILABLE
|
||||
#endif
|
||||
|
||||
@ -692,7 +692,7 @@ void BLAKE2_Compress32_NEON(const byte* input, BLAKE2s_State& state)
|
||||
}
|
||||
#endif // CRYPTOPP_ARM_NEON_AVAILABLE
|
||||
|
||||
#if (CRYPTOPP_POWER7_AVAILABLE || CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||
#if (CRYPTOPP_POWER8_AVAILABLE || CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||
|
||||
inline uint32x4_p VecLoad32(const void* p)
|
||||
{
|
||||
@ -838,7 +838,7 @@ inline uint32x4_p VectorSet32(const uint32x4_p a, const uint32x4_p b,
|
||||
const uint32x4_p t0 = VectorSet32<W,X>(a, b);
|
||||
const uint32x4_p t1 = VectorSet32<Y,Z>(c, d);
|
||||
|
||||
// Power7 follows SSE2's implementation, and this is _mm_set_epi32.
|
||||
// PowerPC follows SSE2's implementation, and this is _mm_set_epi32.
|
||||
const uint8x16_p mask = {20,21,22,23, 16,17,18,19, 4,5,6,7, 0,1,2,3};
|
||||
return VecPermute(t0, t1, mask);
|
||||
}
|
||||
@ -1015,11 +1015,11 @@ void BLAKE2_Compress32_CORE(const byte* input, BLAKE2s_State& state)
|
||||
VecStore32LE(state.h()+0, VecXor(ff0, VecXor(row1, row3)));
|
||||
VecStore32LE(state.h()+4, VecXor(ff1, VecXor(row2, row4)));
|
||||
}
|
||||
#endif // CRYPTOPP_POWER7_AVAILABLE || CRYPTOPP_ALTIVEC_AVAILABLE
|
||||
#endif // CRYPTOPP_POWER8_AVAILABLE || CRYPTOPP_ALTIVEC_AVAILABLE
|
||||
|
||||
#if (CRYPTOPP_POWER7_AVAILABLE)
|
||||
#if (CRYPTOPP_POWER8_AVAILABLE)
|
||||
|
||||
void BLAKE2_Compress32_POWER7(const byte* input, BLAKE2s_State& state)
|
||||
void BLAKE2_Compress32_POWER8(const byte* input, BLAKE2s_State& state)
|
||||
{
|
||||
BLAKE2_Compress32_CORE(input, state);
|
||||
}
|
||||
|
16
vendor/cryptopp/vendor_cryptopp/chacha.cpp
vendored
16
vendor/cryptopp/vendor_cryptopp/chacha.cpp
vendored
@ -28,8 +28,8 @@ extern void ChaCha_OperateKeystream_AVX2(const word32 *state, const byte* input,
|
||||
extern void ChaCha_OperateKeystream_SSE2(const word32 *state, const byte* input, byte *output, unsigned int rounds);
|
||||
#endif
|
||||
|
||||
#if (CRYPTOPP_POWER7_AVAILABLE)
|
||||
extern void ChaCha_OperateKeystream_POWER7(const word32 *state, const byte* input, byte *output, unsigned int rounds);
|
||||
#if (CRYPTOPP_POWER8_AVAILABLE)
|
||||
extern void ChaCha_OperateKeystream_POWER8(const word32 *state, const byte* input, byte *output, unsigned int rounds);
|
||||
#elif (CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||
extern void ChaCha_OperateKeystream_ALTIVEC(const word32 *state, const byte* input, byte *output, unsigned int rounds);
|
||||
#endif
|
||||
@ -153,13 +153,13 @@ void ChaCha_OperateKeystream(KeystreamOperation operation,
|
||||
}
|
||||
#endif
|
||||
|
||||
#if (CRYPTOPP_POWER7_AVAILABLE)
|
||||
if (HasPower7())
|
||||
#if (CRYPTOPP_POWER8_AVAILABLE)
|
||||
if (HasPower8())
|
||||
{
|
||||
while (iterationCount >= 4 && MultiBlockSafe(state[12], 4))
|
||||
{
|
||||
const bool xorInput = (operation & INPUT_NULL) != INPUT_NULL;
|
||||
ChaCha_OperateKeystream_POWER7(state, xorInput ? input : NULLPTR, output, rounds);
|
||||
ChaCha_OperateKeystream_POWER8(state, xorInput ? input : NULLPTR, output, rounds);
|
||||
|
||||
// MultiBlockSafe avoids overflow on the counter words
|
||||
state[12] += 4;
|
||||
@ -267,9 +267,9 @@ std::string ChaCha_AlgorithmProvider()
|
||||
return "NEON";
|
||||
else
|
||||
#endif
|
||||
#if (CRYPTOPP_POWER7_AVAILABLE)
|
||||
if (HasPower7())
|
||||
return "Power7";
|
||||
#if (CRYPTOPP_POWER8_AVAILABLE)
|
||||
if (HasPower8())
|
||||
return "Power8";
|
||||
else
|
||||
#elif (CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||
if (HasAltivec())
|
||||
|
10
vendor/cryptopp/vendor_cryptopp/chacha_simd.cpp
vendored
10
vendor/cryptopp/vendor_cryptopp/chacha_simd.cpp
vendored
@ -209,7 +209,7 @@ inline __m128i RotateLeft<16>(const __m128i val)
|
||||
|
||||
#if (CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||
|
||||
// ChaCha_OperateKeystream_POWER7 is optimized for POWER7. However, Altivec
|
||||
// ChaCha_OperateKeystream_POWER8 is optimized for POWER7. However, Altivec
|
||||
// is supported by using vec_ld and vec_st, and using a composite VecAdd
|
||||
// that supports 64-bit element adds. vec_ld and vec_st add significant
|
||||
// overhead when memory is not aligned. Despite the drawbacks Altivec
|
||||
@ -827,7 +827,7 @@ void ChaCha_OperateKeystream_SSE2(const word32 *state, const byte* input, byte *
|
||||
|
||||
#endif // CRYPTOPP_SSE2_INTRIN_AVAILABLE
|
||||
|
||||
#if (CRYPTOPP_POWER7_AVAILABLE || CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||
#if (CRYPTOPP_POWER8_AVAILABLE || CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||
|
||||
// ChaCha_OperateKeystream_CORE will use either POWER7 or ALTIVEC,
|
||||
// depending on the flags used to compile this source file. The
|
||||
@ -1096,11 +1096,11 @@ inline void ChaCha_OperateKeystream_CORE(const word32 *state, const byte* input,
|
||||
VecStore32LE(output + 15*16, r3_3);
|
||||
}
|
||||
|
||||
#endif // CRYPTOPP_POWER7_AVAILABLE || CRYPTOPP_ALTIVEC_AVAILABLE
|
||||
#endif // CRYPTOPP_POWER8_AVAILABLE || CRYPTOPP_ALTIVEC_AVAILABLE
|
||||
|
||||
#if (CRYPTOPP_POWER7_AVAILABLE)
|
||||
#if (CRYPTOPP_POWER8_AVAILABLE)
|
||||
|
||||
void ChaCha_OperateKeystream_POWER7(const word32 *state, const byte* input, byte *output, unsigned int rounds)
|
||||
void ChaCha_OperateKeystream_POWER8(const word32 *state, const byte* input, byte *output, unsigned int rounds)
|
||||
{
|
||||
ChaCha_OperateKeystream_CORE(state, input, output, rounds);
|
||||
}
|
||||
|
23
vendor/cryptopp/vendor_cryptopp/config.h
vendored
23
vendor/cryptopp/vendor_cryptopp/config.h
vendored
@ -74,24 +74,6 @@
|
||||
// Also see https://bugs.llvm.org/show_bug.cgi?id=39895 .
|
||||
// #define CRYPTOPP_DISABLE_MIXED_ASM 1
|
||||
|
||||
// Several compilers discard SIMD code that loads unaligned data. The symptom
|
||||
// is often self test failures and UBsan findings for unaligned loads. For
|
||||
// example, Power7 can load unaligned data using vec_vsx_ld but some versions
|
||||
// of GCC and Clang require 16-byte aligned data when using the builtin.
|
||||
// It is not limited to SSE and PowerPC code. Define this to disable
|
||||
// Crypto++ code that uses potentially problematic builtins or intrinsics.
|
||||
// Also see https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88234 and
|
||||
// https://bugs.llvm.org/show_bug.cgi?id=39704
|
||||
// #define CRYPTOPP_BUGGY_SIMD_LOAD_AND_STORE 1
|
||||
|
||||
// This list will probably grow over time as more compilers are identified.
|
||||
#if defined(CRYPTOPP_BUGGY_SIMD_LOAD_AND_STORE)
|
||||
# define CRYPTOPP_DISABLE_LEA_SIMD 1
|
||||
# define CRYPTOPP_DISABLE_SIMON_SIMD 1
|
||||
# define CRYPTOPP_DISABLE_SPECK_SIMD 1
|
||||
# define CRYPTOPP_DISABLE_SM4_SIMD 1
|
||||
#endif
|
||||
|
||||
// Define CRYPTOPP_NO_CXX11 to avoid C++11 related features shown at the
|
||||
// end of this file. Some compilers and standard C++ headers advertise C++11
|
||||
// but they are really just C++03 with some additional C++11 headers and
|
||||
@ -116,7 +98,10 @@
|
||||
// the version of the library the headers came from. It is not
|
||||
// necessarily the version of the library built as a shared object if
|
||||
// versions are inadvertently mixed and matched.
|
||||
#define CRYPTOPP_VERSION 810
|
||||
#define CRYPTOPP_MAJOR 8
|
||||
#define CRYPTOPP_MINOR 2
|
||||
#define CRYPTOPP_REVISION 0
|
||||
#define CRYPTOPP_VERSION 820
|
||||
|
||||
// Define this if you want to set a prefix for TestData/ and TestVectors/
|
||||
// Be sure to add the trailing slash since its simple concatenation.
|
||||
|
4
vendor/cryptopp/vendor_cryptopp/cpu.cpp
vendored
4
vendor/cryptopp/vendor_cryptopp/cpu.cpp
vendored
@ -341,8 +341,8 @@ void DetectX86Features()
|
||||
word64 xcr0 = a | static_cast<word64>(d) << 32;
|
||||
g_hasAVX = (xcr0 & YMM_FLAG) == YMM_FLAG;
|
||||
|
||||
// Visual Studio 2008 and below lack xgetbv
|
||||
#elif defined(_MSC_VER) && _MSC_VER <= 1500 && defined(_M_IX86)
|
||||
// Visual Studio 2010 and below lack xgetbv
|
||||
#elif defined(_MSC_VER) && _MSC_VER <= 1600 && defined(_M_IX86)
|
||||
word32 a=0, d=0;
|
||||
__asm {
|
||||
push eax
|
||||
|
@ -212,6 +212,7 @@
|
||||
<ClCompile Include="gcm.cpp" />
|
||||
<ClCompile Include="gcm_simd.cpp" />
|
||||
<ClCompile Include="gf2n.cpp" />
|
||||
<ClCompile Include="gf2n_simd.cpp" />
|
||||
<ClCompile Include="gfpcrypt.cpp" />
|
||||
<ClCompile Include="hex.cpp" />
|
||||
<ClCompile Include="hmac.cpp" />
|
||||
|
@ -98,6 +98,9 @@
|
||||
<ClCompile Include="gf2n.cpp">
|
||||
<Filter>Source Files</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="gf2n_simd.cpp">
|
||||
<Filter>Source Files</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="gfpcrypt.cpp">
|
||||
<Filter>Source Files</Filter>
|
||||
</ClCompile>
|
||||
|
62
vendor/cryptopp/vendor_cryptopp/cryptest.nmake
vendored
62
vendor/cryptopp/vendor_cryptopp/cryptest.nmake
vendored
@ -69,21 +69,22 @@ LIB_SRCS = \
|
||||
gcm_simd.cpp gf256.cpp gf2_32.cpp gf2n.cpp gf2n_simd.cpp gfpcrypt.cpp \
|
||||
gost.cpp gzip.cpp hc128.cpp hc256.cpp hex.cpp hight.cpp hmac.cpp \
|
||||
hrtimer.cpp ida.cpp idea.cpp iterhash.cpp kalyna.cpp kalynatab.cpp \
|
||||
keccak.cpp keccakc.cpp lea.cpp lea_simd.cpp luc.cpp mars.cpp marss.cpp \
|
||||
md2.cpp md4.cpp md5.cpp misc.cpp modes.cpp mqueue.cpp mqv.cpp \
|
||||
nbtheory.cpp neon_simd.cpp oaep.cpp osrng.cpp padlkrng.cpp panama.cpp \
|
||||
pkcspad.cpp poly1305.cpp polynomi.cpp ppc_power7.cpp ppc_power8.cpp \
|
||||
ppc_power9.cpp ppc_simd.cpp pssr.cpp pubkey.cpp queue.cpp rabbit.cpp \
|
||||
rabin.cpp randpool.cpp rc2.cpp rc5.cpp rc6.cpp rdrand.cpp rdtables.cpp \
|
||||
rijndael.cpp rijndael_simd.cpp ripemd.cpp rng.cpp rsa.cpp rw.cpp \
|
||||
safer.cpp salsa.cpp scrypt.cpp seal.cpp seed.cpp serpent.cpp sha.cpp \
|
||||
sha3.cpp sha_simd.cpp shacal2.cpp shacal2_simd.cpp shark.cpp sharkbox.cpp \
|
||||
simeck.cpp simeck_simd.cpp simon.cpp simon128_simd.cpp simon64_simd.cpp \
|
||||
skipjack.cpp sm3.cpp sm4.cpp sm4_simd.cpp sosemanuk.cpp speck.cpp \
|
||||
speck128_simd.cpp speck64_simd.cpp square.cpp squaretb.cpp sse_simd.cpp \
|
||||
strciphr.cpp tea.cpp tftables.cpp threefish.cpp tiger.cpp tigertab.cpp \
|
||||
ttmac.cpp tweetnacl.cpp twofish.cpp vmac.cpp wake.cpp whrlpool.cpp \
|
||||
xed25519.cpp xtr.cpp xtrcrypt.cpp zdeflate.cpp zinflate.cpp zlib.cpp
|
||||
keccak.cpp keccak_core.cpp keccak_simd.cpp lea.cpp lea_simd.cpp luc.cpp \
|
||||
mars.cpp marss.cpp md2.cpp md4.cpp md5.cpp misc.cpp modes.cpp mqueue.cpp \
|
||||
mqv.cpp nbtheory.cpp neon_simd.cpp oaep.cpp osrng.cpp padlkrng.cpp \
|
||||
panama.cpp pkcspad.cpp poly1305.cpp polynomi.cpp ppc_power7.cpp \
|
||||
ppc_power8.cpp ppc_power9.cpp ppc_simd.cpp pssr.cpp pubkey.cpp queue.cpp \
|
||||
rabbit.cpp rabin.cpp randpool.cpp rc2.cpp rc5.cpp rc6.cpp rdrand.cpp \
|
||||
rdtables.cpp rijndael.cpp rijndael_simd.cpp ripemd.cpp rng.cpp rsa.cpp \
|
||||
rw.cpp safer.cpp salsa.cpp scrypt.cpp seal.cpp seed.cpp serpent.cpp \
|
||||
sha.cpp sha3.cpp sha_simd.cpp shacal2.cpp shacal2_simd.cpp shake.cpp \
|
||||
shark.cpp sharkbox.cpp simeck.cpp simeck_simd.cpp simon.cpp \
|
||||
simon128_simd.cpp simon64_simd.cpp skipjack.cpp sm3.cpp sm4.cpp \
|
||||
sm4_simd.cpp sosemanuk.cpp speck.cpp speck128_simd.cpp speck64_simd.cpp \
|
||||
square.cpp squaretb.cpp sse_simd.cpp strciphr.cpp tea.cpp tftables.cpp \
|
||||
threefish.cpp tiger.cpp tigertab.cpp ttmac.cpp tweetnacl.cpp twofish.cpp \
|
||||
vmac.cpp wake.cpp whrlpool.cpp xed25519.cpp xtr.cpp xtrcrypt.cpp \
|
||||
zdeflate.cpp zinflate.cpp zlib.cpp
|
||||
|
||||
LIB_OBJS = \
|
||||
cryptlib.obj cpu.obj integer.obj 3way.obj adler32.obj algebra.obj \
|
||||
@ -99,21 +100,22 @@ LIB_OBJS = \
|
||||
gcm_simd.obj gf256.obj gf2_32.obj gf2n.obj gf2n_simd.obj gfpcrypt.obj \
|
||||
gost.obj gzip.obj hc128.obj hc256.obj hex.obj hight.obj hmac.obj \
|
||||
hrtimer.obj ida.obj idea.obj iterhash.obj kalyna.obj kalynatab.obj \
|
||||
keccak.obj keccakc.obj lea.obj lea_simd.obj luc.obj mars.obj marss.obj \
|
||||
md2.obj md4.obj md5.obj misc.obj modes.obj mqueue.obj mqv.obj \
|
||||
nbtheory.obj neon_simd.obj oaep.obj osrng.obj padlkrng.obj panama.obj \
|
||||
pkcspad.obj poly1305.obj polynomi.obj ppc_power7.obj ppc_power8.obj \
|
||||
ppc_power9.obj ppc_simd.obj pssr.obj pubkey.obj queue.obj rabbit.obj \
|
||||
rabin.obj randpool.obj rc2.obj rc5.obj rc6.obj rdrand.obj rdtables.obj \
|
||||
rijndael.obj rijndael_simd.obj ripemd.obj rng.obj rsa.obj rw.obj \
|
||||
safer.obj salsa.obj scrypt.obj seal.obj seed.obj serpent.obj sha.obj \
|
||||
sha3.obj sha_simd.obj shacal2.obj shacal2_simd.obj shark.obj sharkbox.obj \
|
||||
simeck.obj simeck_simd.obj simon.obj simon128_simd.obj simon64_simd.obj \
|
||||
skipjack.obj sm3.obj sm4.obj sm4_simd.obj sosemanuk.obj speck.obj \
|
||||
speck128_simd.obj speck64_simd.obj square.obj squaretb.obj sse_simd.obj \
|
||||
strciphr.obj tea.obj tftables.obj threefish.obj tiger.obj tigertab.obj \
|
||||
ttmac.obj tweetnacl.obj twofish.obj vmac.obj wake.obj whrlpool.obj \
|
||||
xed25519.obj xtr.obj xtrcrypt.obj zdeflate.obj zinflate.obj zlib.obj
|
||||
keccak.obj keccak_core.obj keccak_simd.obj lea.obj lea_simd.obj luc.obj \
|
||||
mars.obj marss.obj md2.obj md4.obj md5.obj misc.obj modes.obj mqueue.obj \
|
||||
mqv.obj nbtheory.obj neon_simd.obj oaep.obj osrng.obj padlkrng.obj \
|
||||
panama.obj pkcspad.obj poly1305.obj polynomi.obj ppc_power7.obj \
|
||||
ppc_power8.obj ppc_power9.obj ppc_simd.obj pssr.obj pubkey.obj queue.obj \
|
||||
rabbit.obj rabin.obj randpool.obj rc2.obj rc5.obj rc6.obj rdrand.obj \
|
||||
rdtables.obj rijndael.obj rijndael_simd.obj ripemd.obj rng.obj rsa.obj \
|
||||
rw.obj safer.obj salsa.obj scrypt.obj seal.obj seed.obj serpent.obj \
|
||||
sha.obj sha3.obj sha_simd.obj shacal2.obj shacal2_simd.obj shake.obj \
|
||||
shark.obj sharkbox.obj simeck.obj simeck_simd.obj simon.obj \
|
||||
simon128_simd.obj simon64_simd.obj skipjack.obj sm3.obj sm4.obj \
|
||||
sm4_simd.obj sosemanuk.obj speck.obj speck128_simd.obj speck64_simd.obj \
|
||||
square.obj squaretb.obj sse_simd.obj strciphr.obj tea.obj tftables.obj \
|
||||
threefish.obj tiger.obj tigertab.obj ttmac.obj tweetnacl.obj twofish.obj \
|
||||
vmac.obj wake.obj whrlpool.obj xed25519.obj xtr.obj xtrcrypt.obj \
|
||||
zdeflate.obj zinflate.obj zlib.obj
|
||||
|
||||
ASM_OBJS = \
|
||||
rdrand-x86.obj rdrand-x64.obj x64masm.obj x64dll.obj
|
||||
|
2
vendor/cryptopp/vendor_cryptopp/cryptlib.h
vendored
2
vendor/cryptopp/vendor_cryptopp/cryptlib.h
vendored
@ -3,7 +3,7 @@
|
||||
/// \file cryptlib.h
|
||||
/// \brief Abstract base classes that provide a uniform interface to this library.
|
||||
|
||||
/*! \mainpage Crypto++ Library 8.1 API Reference
|
||||
/*! \mainpage Crypto++ Library 8.2 API Reference
|
||||
<dl>
|
||||
<dt>Abstract Base Classes<dd>
|
||||
cryptlib.h
|
||||
|
@ -1 +1 @@
|
||||
include("${CMAKE_CURRENT_LIST_DIR}/cryptopp-targets.cmake")
|
||||
include("${CMAKE_CURRENT_LIST_DIR}/cryptopp-targets.cmake")
|
||||
|
10
vendor/cryptopp/vendor_cryptopp/cryptopp.rc
vendored
10
vendor/cryptopp/vendor_cryptopp/cryptopp.rc
vendored
@ -27,8 +27,8 @@ LANGUAGE LANG_ENGLISH, SUBLANG_ENGLISH_US
|
||||
//
|
||||
|
||||
VS_VERSION_INFO VERSIONINFO
|
||||
FILEVERSION 8,1,0,0
|
||||
PRODUCTVERSION 8,1,0,0
|
||||
FILEVERSION 8,2,0,0
|
||||
PRODUCTVERSION 8,2,0,0
|
||||
FILEFLAGSMASK 0x3fL
|
||||
#ifdef _DEBUG
|
||||
FILEFLAGS 0x1L
|
||||
@ -46,13 +46,13 @@ BEGIN
|
||||
VALUE "Comments", "Free crypto library, more information available at www.cryptopp.com"
|
||||
VALUE "CompanyName", "Wei Dai"
|
||||
VALUE "FileDescription", "Crypto++® Library DLL"
|
||||
VALUE "FileVersion", "8, 1, 0, 0"
|
||||
VALUE "FileVersion", "8, 2, 0, 0"
|
||||
VALUE "InternalName", "cryptopp"
|
||||
VALUE "LegalCopyright", "Copyright© 1995-2018 by Wei Dai"
|
||||
VALUE "LegalCopyright", "Copyright© 1995-2019 by Wei Dai"
|
||||
VALUE "LegalTrademarks", "Crypto++®"
|
||||
VALUE "OriginalFilename", "cryptopp.dll"
|
||||
VALUE "ProductName", "Crypto++® Library"
|
||||
VALUE "ProductVersion", "8, 1, 0, 0"
|
||||
VALUE "ProductVersion", "8, 2, 0, 0"
|
||||
END
|
||||
END
|
||||
BLOCK "VarFileInfo"
|
||||
|
29
vendor/cryptopp/vendor_cryptopp/datatest.cpp
vendored
29
vendor/cryptopp/vendor_cryptopp/datatest.cpp
vendored
@ -8,7 +8,6 @@
|
||||
#include "factory.h"
|
||||
#include "integer.h"
|
||||
#include "filters.h"
|
||||
#include "hex.h"
|
||||
#include "randpool.h"
|
||||
#include "files.h"
|
||||
#include "trunhash.h"
|
||||
@ -16,6 +15,8 @@
|
||||
#include "smartptr.h"
|
||||
#include "validate.h"
|
||||
#include "stdcpp.h"
|
||||
#include "misc.h"
|
||||
#include "hex.h"
|
||||
#include "trap.h"
|
||||
|
||||
#include <iostream>
|
||||
@ -208,7 +209,7 @@ void PutDecodedDatumInto(const TestData &data, const char *name, BufferedTransfo
|
||||
|
||||
while (repeat--)
|
||||
{
|
||||
q.Put(reinterpret_cast<const byte*>(&s2[0]), s2.size());
|
||||
q.Put(ConstBytePtr(s2), BytePtrSize(s2));
|
||||
RandomizedTransfer(q, target, false);
|
||||
}
|
||||
}
|
||||
@ -265,10 +266,11 @@ public:
|
||||
*reinterpret_cast<int *>(pValue) = atoi(value.c_str());
|
||||
else if (valueType == typeid(word64))
|
||||
{
|
||||
std::string x(value); errno = 0;
|
||||
std::string x(value.empty() ? "0" : value);
|
||||
const char* beg = &x[0];
|
||||
char* end = &x[0] + value.size();
|
||||
|
||||
errno = 0;
|
||||
*reinterpret_cast<word64*>(pValue) = STRTOUL64(beg, &end, 0);
|
||||
if (errno != 0)
|
||||
return false;
|
||||
@ -279,7 +281,7 @@ public:
|
||||
{
|
||||
m_temp.clear();
|
||||
PutDecodedDatumInto(m_data, name, StringSink(m_temp).Ref());
|
||||
reinterpret_cast<ConstByteArrayParameter *>(pValue)->Assign(reinterpret_cast<const byte *>(&m_temp[0]), m_temp.size(), false);
|
||||
reinterpret_cast<ConstByteArrayParameter *>(pValue)->Assign(BytePtr(m_temp), BytePtrSize(m_temp), false);
|
||||
}
|
||||
else
|
||||
throw ValueTypeMismatch(name, typeid(std::string), valueType);
|
||||
@ -496,8 +498,8 @@ void TestSymmetricCipher(TestData &v, const NameValuePairs &overrideParameters)
|
||||
}
|
||||
else
|
||||
{
|
||||
encryptor->SetKey(reinterpret_cast<const byte*>(&key[0]), key.size(), pairs);
|
||||
decryptor->SetKey(reinterpret_cast<const byte*>(&key[0]), key.size(), pairs);
|
||||
encryptor->SetKey(ConstBytePtr(key), BytePtrSize(key), pairs);
|
||||
decryptor->SetKey(ConstBytePtr(key), BytePtrSize(key), pairs);
|
||||
}
|
||||
|
||||
word64 seek64 = pairs.GetWord64ValueWithDefault("Seek64", 0);
|
||||
@ -547,13 +549,13 @@ void TestSymmetricCipher(TestData &v, const NameValuePairs &overrideParameters)
|
||||
encrypted.reserve(10000 * plaintext.size());
|
||||
for (int j=0; j<10000; j++)
|
||||
{
|
||||
cipher->ProcessString(reinterpret_cast<byte*>(&buf[0]), buf.size());
|
||||
cipher->ProcessString(BytePtr(buf), BytePtrSize(buf));
|
||||
encrypted.append(buf.begin(), buf.end());
|
||||
}
|
||||
|
||||
encrypted.erase(0, encrypted.size() - keybuf.size());
|
||||
xorbuf(reinterpret_cast<byte*>(&keybuf[0]), reinterpret_cast<const byte*>(&encrypted[0]), keybuf.size());
|
||||
cipher->SetKey(reinterpret_cast<const byte*>(&keybuf[0]), keybuf.size());
|
||||
xorbuf(BytePtr(keybuf), BytePtr(encrypted), BytePtrSize(keybuf));
|
||||
cipher->SetKey(BytePtr(keybuf), BytePtrSize(keybuf));
|
||||
}
|
||||
|
||||
encrypted.assign(buf.begin(), buf.end());
|
||||
@ -641,8 +643,8 @@ void TestAuthenticatedSymmetricCipher(TestData &v, const NameValuePairs &overrid
|
||||
member_ptr<AuthenticatedSymmetricCipher> encryptor, decryptor;
|
||||
encryptor.reset(ObjectFactoryRegistry<AuthenticatedSymmetricCipher, ENCRYPTION>::Registry().CreateObject(name.c_str()));
|
||||
decryptor.reset(ObjectFactoryRegistry<AuthenticatedSymmetricCipher, DECRYPTION>::Registry().CreateObject(name.c_str()));
|
||||
encryptor->SetKey(reinterpret_cast<const byte*>(&key[0]), key.size(), pairs);
|
||||
decryptor->SetKey(reinterpret_cast<const byte*>(&key[0]), key.size(), pairs);
|
||||
encryptor->SetKey(ConstBytePtr(key), BytePtrSize(key), pairs);
|
||||
decryptor->SetKey(ConstBytePtr(key), BytePtrSize(key), pairs);
|
||||
|
||||
// Code coverage
|
||||
(void)encryptor->AlgorithmName();
|
||||
@ -736,7 +738,7 @@ void TestDigestOrMAC(TestData &v, bool testDigest)
|
||||
mac.reset(ObjectFactoryRegistry<MessageAuthenticationCode>::Registry().CreateObject(name.c_str()));
|
||||
pHash = mac.get();
|
||||
std::string key = GetDecodedDatum(v, "Key");
|
||||
mac->SetKey(reinterpret_cast<const byte *>(&key[0]), key.size(), pairs);
|
||||
mac->SetKey(ConstBytePtr(key), BytePtrSize(key), pairs);
|
||||
|
||||
// Code coverage
|
||||
(void)mac->AlgorithmName();
|
||||
@ -779,8 +781,7 @@ void TestKeyDerivationFunction(TestData &v)
|
||||
kdf.reset(ObjectFactoryRegistry<KeyDerivationFunction>::Registry().CreateObject(name.c_str()));
|
||||
|
||||
std::string calculated; calculated.resize(expected.size());
|
||||
kdf->DeriveKey(reinterpret_cast<byte*>(&calculated[0]), calculated.size(),
|
||||
reinterpret_cast<const byte*>(&secret[0]), secret.size(), pairs);
|
||||
kdf->DeriveKey(BytePtr(calculated), BytePtrSize(calculated), BytePtr(secret), BytePtrSize(secret), pairs);
|
||||
|
||||
if(calculated != expected)
|
||||
{
|
||||
|
2
vendor/cryptopp/vendor_cryptopp/filters.h
vendored
2
vendor/cryptopp/vendor_cryptopp/filters.h
vendored
@ -474,7 +474,7 @@ struct BlockPaddingSchemeDef
|
||||
/// \brief 0's padding added to a block
|
||||
/// \since Crypto++ 5.0
|
||||
ZEROS_PADDING,
|
||||
/// \brief PKCS #5 padding added to a block
|
||||
/// \brief PKCS padding added to a block
|
||||
/// \since Crypto++ 5.0
|
||||
PKCS_PADDING,
|
||||
/// \brief 1 and 0's padding added to a block
|
||||
|
22
vendor/cryptopp/vendor_cryptopp/gcm.cpp
vendored
22
vendor/cryptopp/vendor_cryptopp/gcm.cpp
vendored
@ -75,8 +75,8 @@ extern void GCM_Xor16_SSE2(byte *a, const byte *b, const byte *c);
|
||||
extern void GCM_Xor16_NEON(byte *a, const byte *b, const byte *c);
|
||||
#endif
|
||||
|
||||
#if CRYPTOPP_POWER7_AVAILABLE
|
||||
extern void GCM_Xor16_POWER7(byte *a, const byte *b, const byte *c);
|
||||
#if CRYPTOPP_POWER8_AVAILABLE
|
||||
extern void GCM_Xor16_POWER8(byte *a, const byte *b, const byte *c);
|
||||
#endif
|
||||
|
||||
#if CRYPTOPP_CLMUL_AVAILABLE
|
||||
@ -213,11 +213,11 @@ void GCM_Base::SetKeyWithoutResync(const byte *userKey, size_t keylength, const
|
||||
for (k=1; k<j; k++)
|
||||
GCM_Xor16_NEON(mulTable+i*256*16+(j+k)*16, mulTable+i*256*16+j*16, mulTable+i*256*16+k*16);
|
||||
else
|
||||
#elif CRYPTOPP_POWER7_AVAILABLE
|
||||
if (HasPower7())
|
||||
#elif CRYPTOPP_POWER8_AVAILABLE
|
||||
if (HasPower8())
|
||||
for (j=2; j<=0x80; j*=2)
|
||||
for (k=1; k<j; k++)
|
||||
GCM_Xor16_POWER7(mulTable+i*256*16+(j+k)*16, mulTable+i*256*16+j*16, mulTable+i*256*16+k*16);
|
||||
GCM_Xor16_POWER8(mulTable+i*256*16+(j+k)*16, mulTable+i*256*16+j*16, mulTable+i*256*16+k*16);
|
||||
else
|
||||
#endif
|
||||
for (j=2; j<=0x80; j*=2)
|
||||
@ -277,13 +277,13 @@ void GCM_Base::SetKeyWithoutResync(const byte *userKey, size_t keylength, const
|
||||
GCM_Xor16_NEON(mulTable+1024+i*256+(j+k)*16, mulTable+1024+i*256+j*16, mulTable+1024+i*256+k*16);
|
||||
}
|
||||
else
|
||||
#elif CRYPTOPP_POWER7_AVAILABLE
|
||||
if (HasPower7())
|
||||
#elif CRYPTOPP_POWER8_AVAILABLE
|
||||
if (HasPower8())
|
||||
for (j=2; j<=8; j*=2)
|
||||
for (k=1; k<j; k++)
|
||||
{
|
||||
GCM_Xor16_POWER7(mulTable+i*256+(j+k)*16, mulTable+i*256+j*16, mulTable+i*256+k*16);
|
||||
GCM_Xor16_POWER7(mulTable+1024+i*256+(j+k)*16, mulTable+1024+i*256+j*16, mulTable+1024+i*256+k*16);
|
||||
GCM_Xor16_POWER8(mulTable+i*256+(j+k)*16, mulTable+i*256+j*16, mulTable+i*256+k*16);
|
||||
GCM_Xor16_POWER8(mulTable+1024+i*256+(j+k)*16, mulTable+1024+i*256+j*16, mulTable+1024+i*256+k*16);
|
||||
}
|
||||
else
|
||||
#endif
|
||||
@ -369,8 +369,8 @@ unsigned int GCM_Base::OptimalDataAlignment() const
|
||||
HasSSE2() ? 16 :
|
||||
#elif CRYPTOPP_ARM_NEON_AVAILABLE
|
||||
HasNEON() ? 4 :
|
||||
#elif CRYPTOPP_POWER7_AVAILABLE
|
||||
HasPower7() ? 16 :
|
||||
#elif CRYPTOPP_POWER8_AVAILABLE
|
||||
HasPower8() ? 16 :
|
||||
#endif
|
||||
GetBlockCipher().OptimalDataAlignment();
|
||||
}
|
||||
|
6
vendor/cryptopp/vendor_cryptopp/gcm_simd.cpp
vendored
6
vendor/cryptopp/vendor_cryptopp/gcm_simd.cpp
vendored
@ -569,12 +569,12 @@ void GCM_ReverseHashBufferIfNeeded_CLMUL(byte *hashBuffer)
|
||||
|
||||
// ***************************** POWER8 ***************************** //
|
||||
|
||||
#if CRYPTOPP_POWER7_AVAILABLE
|
||||
void GCM_Xor16_POWER7(byte *a, const byte *b, const byte *c)
|
||||
#if CRYPTOPP_POWER8_AVAILABLE
|
||||
void GCM_Xor16_POWER8(byte *a, const byte *b, const byte *c)
|
||||
{
|
||||
VecStore(VecXor(VecLoad(b), VecLoad(c)), a);
|
||||
}
|
||||
#endif // CRYPTOPP_POWER7_AVAILABLE
|
||||
#endif // CRYPTOPP_POWER8_AVAILABLE
|
||||
|
||||
#if CRYPTOPP_POWER8_VMULL_AVAILABLE
|
||||
|
||||
|
@ -21,6 +21,8 @@
|
||||
#include "pch.h"
|
||||
#include "config.h"
|
||||
|
||||
#ifndef CRYPTOPP_IMPORTS
|
||||
|
||||
#include "gf2n.h"
|
||||
|
||||
#if (CRYPTOPP_CLMUL_AVAILABLE)
|
||||
@ -608,3 +610,5 @@ GF2NT_233_Square_Reduce_POWER8(const word* pA, word* pC)
|
||||
#endif
|
||||
|
||||
NAMESPACE_END
|
||||
|
||||
#endif // CRYPTOPP_IMPORTS
|
13
vendor/cryptopp/vendor_cryptopp/integer.cpp
vendored
13
vendor/cryptopp/vendor_cryptopp/integer.cpp
vendored
@ -3537,9 +3537,9 @@ class KDF2_RNG : public RandomNumberGenerator
|
||||
{
|
||||
public:
|
||||
KDF2_RNG(const byte *seed, size_t seedSize)
|
||||
: m_counter(0), m_counterAndSeed(seedSize + 4)
|
||||
: m_counter(0), m_counterAndSeed(ClampSize(seedSize) + 4)
|
||||
{
|
||||
memcpy(m_counterAndSeed + 4, seed, seedSize);
|
||||
memcpy(m_counterAndSeed + 4, seed, ClampSize(seedSize));
|
||||
}
|
||||
|
||||
void GenerateBlock(byte *output, size_t size)
|
||||
@ -3550,6 +3550,15 @@ public:
|
||||
P1363_KDF2<SHA1>::DeriveKey(output, size, m_counterAndSeed, m_counterAndSeed.size(), NULLPTR, 0);
|
||||
}
|
||||
|
||||
// UBsan finding, -Wstringop-overflow
|
||||
inline size_t ClampSize(size_t req) const
|
||||
{
|
||||
// Clamp at 16 MB
|
||||
if (req > 16U*1024*1024)
|
||||
return 16U*1024*1024;
|
||||
return req;
|
||||
}
|
||||
|
||||
private:
|
||||
word32 m_counter;
|
||||
SecByteBlock m_counterAndSeed;
|
||||
|
10
vendor/cryptopp/vendor_cryptopp/keccak_simd.cpp
vendored
10
vendor/cryptopp/vendor_cryptopp/keccak_simd.cpp
vendored
@ -12,8 +12,8 @@
|
||||
// KeccakF1600x2_SSE is ParallelHash128. The SSE2 ParallelHash128
|
||||
// implementation was extracted from XKCP using the following command.
|
||||
//
|
||||
// gcc -I lib/common -I lib/low/KeccakP-1600/Optimized \
|
||||
// -I lib/low/KeccakP-1600-times2/SIMD128/SSE2ufull \
|
||||
// gcc -I lib/common -I lib/low/KeccakP-1600/Optimized
|
||||
// -I lib/low/KeccakP-1600-times2/SIMD128/SSE2ufull
|
||||
// lib/low/KeccakP-1600-times2/SIMD128/KeccakP-1600-times2-SIMD128.c -E
|
||||
|
||||
#include "pch.h"
|
||||
@ -23,7 +23,7 @@
|
||||
|
||||
#if (CRYPTOPP_SSSE3_AVAILABLE)
|
||||
# include <emmintrin.h>
|
||||
# include <immintrin.h>
|
||||
# include <tmmintrin.h>
|
||||
#endif
|
||||
|
||||
// Squash MS LNK4221 and libtool warnings
|
||||
@ -39,8 +39,8 @@ extern void KeccakF1600x2_SSE(word64 *state);
|
||||
// The F1600 round constants
|
||||
extern const word64 KeccakF1600Constants[24];
|
||||
|
||||
const word64 rho8[2] = {0x0605040302010007, 0x0E0D0C0B0A09080F};
|
||||
const word64 rho56[2] = {0x0007060504030201, 0x080F0E0D0C0B0A09};
|
||||
const word64 rho8[2] = {W64LIT(0x0605040302010007), W64LIT(0x0E0D0C0B0A09080F)};
|
||||
const word64 rho56[2] = {W64LIT(0x0007060504030201), W64LIT(0x080F0E0D0C0B0A09)};
|
||||
|
||||
#define V128 __m128i
|
||||
#define CV128 const __m128i
|
||||
|
32
vendor/cryptopp/vendor_cryptopp/misc.h
vendored
32
vendor/cryptopp/vendor_cryptopp/misc.h
vendored
@ -388,6 +388,38 @@ inline size_t PtrByteDiff(const PTR pointer1, const PTR pointer2)
|
||||
return (size_t)(reinterpret_cast<uintptr_t>(pointer1) - reinterpret_cast<uintptr_t>(pointer2));
|
||||
}
|
||||
|
||||
/// \brief Pointer to the first element of a string
|
||||
/// \param str std::string
|
||||
/// \details BytePtr returns NULL pointer for an empty string.
|
||||
/// \return Pointer to the first element of a string
|
||||
inline byte* BytePtr(std::string& str)
|
||||
{
|
||||
// Caller wants a writeable pointer
|
||||
CRYPTOPP_ASSERT(str.empty() == false);
|
||||
|
||||
if (str.empty())
|
||||
return NULLPTR;
|
||||
return reinterpret_cast<byte*>(&str[0]);
|
||||
}
|
||||
|
||||
/// \brief Const pointer to the first element of a string
|
||||
/// \param str std::string
|
||||
/// \details ConstBytePtr returns non-NULL pointer for an empty string.
|
||||
/// \return Pointer to the first element of a string
|
||||
inline const byte* ConstBytePtr(const std::string& str)
|
||||
{
|
||||
// Use c_str() so a pointer is always available
|
||||
return reinterpret_cast<const byte*>(str.c_str());
|
||||
}
|
||||
|
||||
/// \brief Size of a string
|
||||
/// \param str std::string
|
||||
/// \return size of a string
|
||||
inline size_t BytePtrSize(const std::string& str)
|
||||
{
|
||||
return str.size();
|
||||
}
|
||||
|
||||
#if (!__STDC_WANT_SECURE_LIB__ && !defined(_MEMORY_S_DEFINED)) || defined(CRYPTOPP_WANT_SECURE_LIB)
|
||||
|
||||
/// \brief Bounds checking replacement for memcpy()
|
||||
|
54
vendor/cryptopp/vendor_cryptopp/ppc_simd.h
vendored
54
vendor/cryptopp/vendor_cryptopp/ppc_simd.h
vendored
@ -57,7 +57,7 @@
|
||||
//
|
||||
// inline uint32x4_p VecLoad(const byte src[16])
|
||||
// {
|
||||
// #if defined(_ARCH_PWR7)
|
||||
// #if defined(_ARCH_PWR8)
|
||||
// return (uint32x4_p) *(uint8x16_p*)((byte*)src);
|
||||
// #else
|
||||
// return VecLoad_ALTIVEC(src);
|
||||
@ -128,7 +128,7 @@ typedef __vector unsigned short uint16x8_p;
|
||||
/// \since Crypto++ 6.0
|
||||
typedef __vector unsigned int uint32x4_p;
|
||||
|
||||
#if defined(_ARCH_PWR7) || defined(CRYPTOPP_DOXYGEN_PROCESSING)
|
||||
#if defined(_ARCH_PWR8) || defined(CRYPTOPP_DOXYGEN_PROCESSING)
|
||||
/// \brief Vector of 64-bit elements
|
||||
/// \details uint64x2_p is available on POWER7 and above. Some supporting
|
||||
/// functions, like 64-bit <tt>vec_add</tt> (<tt>vaddudm</tt>), did not
|
||||
@ -137,7 +137,7 @@ typedef __vector unsigned int uint32x4_p;
|
||||
/// __vector unsigned long long
|
||||
/// \since Crypto++ 6.0
|
||||
typedef __vector unsigned long long uint64x2_p;
|
||||
#endif // _ARCH_PWR7
|
||||
#endif // _ARCH_PWR8
|
||||
|
||||
/// \brief The 0 vector
|
||||
/// \returns a 32-bit vector of 0's
|
||||
@ -252,7 +252,7 @@ inline uint32x4_p VecLoad_ALTIVEC(int off, const byte src[16])
|
||||
/// \since Crypto++ 6.0
|
||||
inline uint32x4_p VecLoad(const byte src[16])
|
||||
{
|
||||
#if defined(_ARCH_PWR7)
|
||||
#if defined(_ARCH_PWR8)
|
||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||
return (uint32x4_p)vec_xlw4(0, (byte*)src);
|
||||
# elif defined(__xlc__) || defined(__xlC__) || defined(__clang__)
|
||||
@ -280,7 +280,7 @@ inline uint32x4_p VecLoad(const byte src[16])
|
||||
/// \since Crypto++ 6.0
|
||||
inline uint32x4_p VecLoad(int off, const byte src[16])
|
||||
{
|
||||
#if defined(_ARCH_PWR7)
|
||||
#if defined(_ARCH_PWR8)
|
||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||
return (uint32x4_p)vec_xlw4(off, (byte*)src);
|
||||
# elif defined(__xlc__) || defined(__xlC__) || defined(__clang__)
|
||||
@ -328,7 +328,7 @@ inline uint32x4_p VecLoad(int off, const word32 src[4])
|
||||
return VecLoad(off, (const byte*)src);
|
||||
}
|
||||
|
||||
#if defined(_ARCH_PWR7) || defined(CRYPTOPP_DOXYGEN_PROCESSING)
|
||||
#if defined(_ARCH_PWR8) || defined(CRYPTOPP_DOXYGEN_PROCESSING)
|
||||
|
||||
/// \brief Loads a vector from a word array
|
||||
/// \param src the word array
|
||||
@ -367,7 +367,7 @@ inline uint64x2_p VecLoad(int off, const word64 src[2])
|
||||
return (uint64x2_p)VecLoad(off, (const byte*)src);
|
||||
}
|
||||
|
||||
#endif // _ARCH_PWR7
|
||||
#endif // _ARCH_PWR8
|
||||
|
||||
/// \brief Loads a vector from an aligned byte array
|
||||
/// \param src the byte array
|
||||
@ -382,7 +382,7 @@ inline uint64x2_p VecLoad(int off, const word64 src[2])
|
||||
/// \since Crypto++ 8.0
|
||||
inline uint32x4_p VecLoadAligned(const byte src[16])
|
||||
{
|
||||
#if defined(_ARCH_PWR7)
|
||||
#if defined(_ARCH_PWR8)
|
||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||
return (uint32x4_p)vec_xlw4(0, (byte*)src);
|
||||
# elif defined(__xlc__) || defined(__xlC__) || defined(__clang__)
|
||||
@ -390,10 +390,10 @@ inline uint32x4_p VecLoadAligned(const byte src[16])
|
||||
# else
|
||||
return (uint32x4_p)vec_vsx_ld(0, (byte*)src);
|
||||
# endif
|
||||
#else // _ARCH_PWR7
|
||||
#else // _ARCH_PWR8
|
||||
CRYPTOPP_ASSERT(((uintptr_t)src) % 16 == 0);
|
||||
return (uint32x4_p)vec_ld(0, (byte*)src);
|
||||
#endif // _ARCH_PWR7
|
||||
#endif // _ARCH_PWR8
|
||||
}
|
||||
|
||||
/// \brief Loads a vector from an aligned byte array
|
||||
@ -410,7 +410,7 @@ inline uint32x4_p VecLoadAligned(const byte src[16])
|
||||
/// \since Crypto++ 8.0
|
||||
inline uint32x4_p VecLoadAligned(int off, const byte src[16])
|
||||
{
|
||||
#if defined(_ARCH_PWR7)
|
||||
#if defined(_ARCH_PWR8)
|
||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||
return (uint32x4_p)vec_xlw4(off, (byte*)src);
|
||||
# elif defined(__xlc__) || defined(__xlC__) || defined(__clang__)
|
||||
@ -418,10 +418,10 @@ inline uint32x4_p VecLoadAligned(int off, const byte src[16])
|
||||
# else
|
||||
return (uint32x4_p)vec_vsx_ld(off, (byte*)src);
|
||||
# endif
|
||||
#else // _ARCH_PWR7
|
||||
#else // _ARCH_PWR8
|
||||
CRYPTOPP_ASSERT((((uintptr_t)src)+off) % 16 == 0);
|
||||
return (uint32x4_p)vec_ld(off, (byte*)src);
|
||||
#endif // _ARCH_PWR7
|
||||
#endif // _ARCH_PWR8
|
||||
}
|
||||
|
||||
/// \brief Loads a vector from a byte array
|
||||
@ -439,7 +439,7 @@ inline uint32x4_p VecLoadAligned(int off, const byte src[16])
|
||||
/// \since Crypto++ 6.0
|
||||
inline uint32x4_p VecLoadBE(const byte src[16])
|
||||
{
|
||||
#if defined(_ARCH_PWR7)
|
||||
#if defined(_ARCH_PWR8)
|
||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||
# if (CRYPTOPP_BIG_ENDIAN)
|
||||
return (uint32x4_p)vec_xlw4(0, (byte*)src);
|
||||
@ -455,13 +455,13 @@ inline uint32x4_p VecLoadBE(const byte src[16])
|
||||
return (uint32x4_p)VecReverse(vec_vsx_ld(0, (byte*)src));
|
||||
# endif
|
||||
# endif
|
||||
#else // _ARCH_PWR7
|
||||
#else // _ARCH_PWR8
|
||||
# if (CRYPTOPP_BIG_ENDIAN)
|
||||
return (uint32x4_p)VecLoad((const byte*)src);
|
||||
# else
|
||||
return (uint32x4_p)VecReverse(VecLoad((const byte*)src));
|
||||
# endif
|
||||
#endif // _ARCH_PWR7
|
||||
#endif // _ARCH_PWR8
|
||||
}
|
||||
|
||||
/// \brief Loads a vector from a byte array
|
||||
@ -480,7 +480,7 @@ inline uint32x4_p VecLoadBE(const byte src[16])
|
||||
/// \since Crypto++ 6.0
|
||||
inline uint32x4_p VecLoadBE(int off, const byte src[16])
|
||||
{
|
||||
#if defined(_ARCH_PWR7)
|
||||
#if defined(_ARCH_PWR8)
|
||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||
# if (CRYPTOPP_BIG_ENDIAN)
|
||||
return (uint32x4_p)vec_xlw4(off, (byte*)src);
|
||||
@ -496,13 +496,13 @@ inline uint32x4_p VecLoadBE(int off, const byte src[16])
|
||||
return (uint32x4_p)VecReverse(vec_vsx_ld(off, (byte*)src));
|
||||
# endif
|
||||
# endif
|
||||
#else // _ARCH_PWR7
|
||||
#else // _ARCH_PWR8
|
||||
# if (CRYPTOPP_BIG_ENDIAN)
|
||||
return (uint32x4_p)VecLoad(off, (const byte*)src);
|
||||
# else
|
||||
return (uint32x4_p)VecReverse(VecLoad(off, (const byte*)src));
|
||||
# endif
|
||||
#endif // _ARCH_PWR7
|
||||
#endif // _ARCH_PWR8
|
||||
}
|
||||
|
||||
//@}
|
||||
@ -604,7 +604,7 @@ inline void VecStore_ALTIVEC(const T data, int off, byte dest[16])
|
||||
template<class T>
|
||||
inline void VecStore(const T data, byte dest[16])
|
||||
{
|
||||
#if defined(_ARCH_PWR7)
|
||||
#if defined(_ARCH_PWR8)
|
||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||
vec_xstw4((uint8x16_p)data, 0, (byte*)dest);
|
||||
# elif defined(__xlc__) || defined(__xlC__) || defined(__clang__)
|
||||
@ -635,7 +635,7 @@ inline void VecStore(const T data, byte dest[16])
|
||||
template<class T>
|
||||
inline void VecStore(const T data, int off, byte dest[16])
|
||||
{
|
||||
#if defined(_ARCH_PWR7)
|
||||
#if defined(_ARCH_PWR8)
|
||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||
vec_xstw4((uint8x16_p)data, off, (byte*)dest);
|
||||
# elif defined(__xlc__) || defined(__xlC__) || defined(__clang__)
|
||||
@ -750,7 +750,7 @@ inline void VecStore(const T data, int off, word64 dest[2])
|
||||
template <class T>
|
||||
inline void VecStoreBE(const T data, byte dest[16])
|
||||
{
|
||||
#if defined(_ARCH_PWR7)
|
||||
#if defined(_ARCH_PWR8)
|
||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||
# if (CRYPTOPP_BIG_ENDIAN)
|
||||
vec_xstw4((uint8x16_p)data, 0, (byte*)dest);
|
||||
@ -766,13 +766,13 @@ inline void VecStoreBE(const T data, byte dest[16])
|
||||
vec_vsx_st((uint8x16_p)VecReverse(data), 0, (byte*)dest);
|
||||
# endif
|
||||
# endif
|
||||
#else // _ARCH_PWR7
|
||||
#else // _ARCH_PWR8
|
||||
# if (CRYPTOPP_BIG_ENDIAN)
|
||||
VecStore_ALTIVEC((uint8x16_p)data, 0, (byte*)dest);
|
||||
# else
|
||||
VecStore_ALTIVEC((uint8x16_p)VecReverse(data), 0, (byte*)dest);
|
||||
# endif
|
||||
#endif // _ARCH_PWR7
|
||||
#endif // _ARCH_PWR8
|
||||
}
|
||||
|
||||
/// \brief Stores a vector to a byte array
|
||||
@ -794,7 +794,7 @@ inline void VecStoreBE(const T data, byte dest[16])
|
||||
template <class T>
|
||||
inline void VecStoreBE(const T data, int off, byte dest[16])
|
||||
{
|
||||
#if defined(_ARCH_PWR7)
|
||||
#if defined(_ARCH_PWR8)
|
||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||
# if (CRYPTOPP_BIG_ENDIAN)
|
||||
vec_xstw4((uint8x16_p)data, off, (byte*)dest);
|
||||
@ -810,13 +810,13 @@ inline void VecStoreBE(const T data, int off, byte dest[16])
|
||||
vec_vsx_st((uint8x16_p)VecReverse(data), off, (byte*)dest);
|
||||
# endif
|
||||
# endif
|
||||
#else // _ARCH_PWR7
|
||||
#else // _ARCH_PWR8
|
||||
# if (CRYPTOPP_BIG_ENDIAN)
|
||||
VecStore_ALTIVEC((uint8x16_p)data, off, (byte*)dest);
|
||||
# else
|
||||
VecStore_ALTIVEC((uint8x16_p)VecReverse(data), off, (byte*)dest);
|
||||
# endif
|
||||
#endif // _ARCH_PWR7
|
||||
#endif // _ARCH_PWR8
|
||||
}
|
||||
|
||||
/// \brief Stores a vector to a word array
|
||||
|
2
vendor/cryptopp/vendor_cryptopp/regtest3.cpp
vendored
2
vendor/cryptopp/vendor_cryptopp/regtest3.cpp
vendored
@ -92,7 +92,9 @@ void RegisterFactories4()
|
||||
RegisterSymmetricCipherDefaultFactories<CTR_Mode<TEA> >();
|
||||
RegisterSymmetricCipherDefaultFactories<CTR_Mode<XTEA> >();
|
||||
RegisterSymmetricCipherDefaultFactories<CTR_Mode<CAST128> >();
|
||||
RegisterSymmetricCipherDefaultFactories<ECB_Mode<SKIPJACK> >();
|
||||
RegisterSymmetricCipherDefaultFactories<CTR_Mode<SKIPJACK> >();
|
||||
RegisterSymmetricCipherDefaultFactories<CBC_Mode<SKIPJACK> >();
|
||||
RegisterSymmetricCipherDefaultFactories<CTR_Mode<Blowfish> >();
|
||||
RegisterSymmetricCipherDefaultFactories<ECB_Mode<SEED> >();
|
||||
RegisterSymmetricCipherDefaultFactories<CTR_Mode<SEED> >();
|
||||
|
2
vendor/cryptopp/vendor_cryptopp/seckey.h
vendored
2
vendor/cryptopp/vendor_cryptopp/seckey.h
vendored
@ -14,7 +14,7 @@
|
||||
|
||||
#if CRYPTOPP_MSC_VERSION
|
||||
# pragma warning(push)
|
||||
# pragma warning(disable: 4189)
|
||||
# pragma warning(disable: 4189 4296)
|
||||
#endif
|
||||
|
||||
// Issue 340
|
||||
|
4
vendor/cryptopp/vendor_cryptopp/shake.h
vendored
4
vendor/cryptopp/vendor_cryptopp/shake.h
vendored
@ -125,7 +125,7 @@ public:
|
||||
/// requires the output size in advance because the algoirthm uses
|
||||
/// output size as a parameter to the hash function.
|
||||
/// \since Crypto++ 8.1
|
||||
SHAKE128(unsigned int outputSize) : SHAKE_Final(outputSize) {}
|
||||
SHAKE128(unsigned int outputSize) : SHAKE_Final<128>(outputSize) {}
|
||||
};
|
||||
|
||||
/// \brief SHAKE256 message digest
|
||||
@ -155,7 +155,7 @@ public:
|
||||
/// requires the output size in advance because the algoirthm uses
|
||||
/// output size as a parameter to the hash function.
|
||||
/// \since Crypto++ 8.1
|
||||
SHAKE256(unsigned int outputSize) : SHAKE_Final(outputSize) {}
|
||||
SHAKE256(unsigned int outputSize) : SHAKE_Final<256>(outputSize) {}
|
||||
};
|
||||
|
||||
NAMESPACE_END
|
||||
|
6
vendor/cryptopp/vendor_cryptopp/simon.cpp
vendored
6
vendor/cryptopp/vendor_cryptopp/simon.cpp
vendored
@ -255,9 +255,9 @@ std::string SIMON64::Base::AlgorithmProvider() const
|
||||
if (HasNEON())
|
||||
return "NEON";
|
||||
# endif
|
||||
# if (CRYPTOPP_POWER7_AVAILABLE)
|
||||
if (HasPower7())
|
||||
return "Power7";
|
||||
# if (CRYPTOPP_POWER8_AVAILABLE)
|
||||
if (HasPower8())
|
||||
return "Power8";
|
||||
# endif
|
||||
# if (CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||
if (HasAltivec())
|
||||
|
@ -44,7 +44,7 @@
|
||||
# include <arm_acle.h>
|
||||
#endif
|
||||
|
||||
#if defined(CRYPTOPP_POWER7_AVAILABLE)
|
||||
#if defined(CRYPTOPP_POWER8_AVAILABLE)
|
||||
# include "adv_simd.h"
|
||||
# include "ppc_simd.h"
|
||||
#endif
|
||||
@ -108,13 +108,8 @@ inline uint64x2_t RotateRight64(const uint64x2_t& val)
|
||||
template <>
|
||||
inline uint64x2_t RotateLeft64<8>(const uint64x2_t& val)
|
||||
{
|
||||
#if (CRYPTOPP_BIG_ENDIAN)
|
||||
const uint8_t maskb[16] = { 14,13,12,11, 10,9,8,15, 6,5,4,3, 2,1,0,7 };
|
||||
const uint8x16_t mask = vld1q_u8(maskb);
|
||||
#else
|
||||
const uint8_t maskb[16] = { 7,0,1,2, 3,4,5,6, 15,8,9,10, 11,12,13,14 };
|
||||
const uint8x16_t mask = vld1q_u8(maskb);
|
||||
#endif
|
||||
|
||||
return vreinterpretq_u64_u8(
|
||||
vqtbl1q_u8(vreinterpretq_u8_u64(val), mask));
|
||||
@ -124,13 +119,8 @@ inline uint64x2_t RotateLeft64<8>(const uint64x2_t& val)
|
||||
template <>
|
||||
inline uint64x2_t RotateRight64<8>(const uint64x2_t& val)
|
||||
{
|
||||
#if (CRYPTOPP_BIG_ENDIAN)
|
||||
const uint8_t maskb[16] = { 8,15,14,13, 12,11,10,9, 0,7,6,5, 4,3,2,1 };
|
||||
const uint8x16_t mask = vld1q_u8(maskb);
|
||||
#else
|
||||
const uint8_t maskb[16] = { 1,2,3,4, 5,6,7,0, 9,10,11,12, 13,14,15,8 };
|
||||
const uint8x16_t mask = vld1q_u8(maskb);
|
||||
#endif
|
||||
|
||||
return vreinterpretq_u64_u8(
|
||||
vqtbl1q_u8(vreinterpretq_u8_u64(val), mask));
|
||||
|
26
vendor/cryptopp/vendor_cryptopp/simon64_simd.cpp
vendored
26
vendor/cryptopp/vendor_cryptopp/simon64_simd.cpp
vendored
@ -106,13 +106,8 @@ inline uint32x4_t RotateRight32(const uint32x4_t& val)
|
||||
template <>
|
||||
inline uint32x4_t RotateLeft32<8>(const uint32x4_t& val)
|
||||
{
|
||||
#if (CRYPTOPP_BIG_ENDIAN)
|
||||
const uint8_t maskb[16] = { 14,13,12,15, 10,9,8,11, 6,5,4,7, 2,1,0,3 };
|
||||
const uint8x16_t mask = vld1q_u8(maskb);
|
||||
#else
|
||||
const uint8_t maskb[16] = { 3,0,1,2, 7,4,5,6, 11,8,9,10, 15,12,13,14 };
|
||||
const uint8x16_t mask = vld1q_u8(maskb);
|
||||
#endif
|
||||
|
||||
return vreinterpretq_u32_u8(
|
||||
vqtbl1q_u8(vreinterpretq_u8_u32(val), mask));
|
||||
@ -122,13 +117,8 @@ inline uint32x4_t RotateLeft32<8>(const uint32x4_t& val)
|
||||
template <>
|
||||
inline uint32x4_t RotateRight32<8>(const uint32x4_t& val)
|
||||
{
|
||||
#if (CRYPTOPP_BIG_ENDIAN)
|
||||
const uint8_t maskb[16] = { 12,15,14,13, 8,11,10,9, 4,7,6,5, 0,3,2,1 };
|
||||
const uint8x16_t mask = vld1q_u8(maskb);
|
||||
#else
|
||||
const uint8_t maskb[16] = { 1,2,3,0, 5,6,7,4, 9,10,11,8, 13,14,14,12 };
|
||||
const uint8x16_t mask = vld1q_u8(maskb);
|
||||
#endif
|
||||
|
||||
return vreinterpretq_u32_u8(
|
||||
vqtbl1q_u8(vreinterpretq_u8_u32(val), mask));
|
||||
@ -576,7 +566,7 @@ inline void SIMON64_Enc_Block(uint32x4_p &block0, uint32x4_p &block1,
|
||||
|
||||
for (int i = 0; i < static_cast<int>(rounds & ~1)-1; i += 2)
|
||||
{
|
||||
#if CRYPTOPP_POWER7_AVAILABLE
|
||||
#if CRYPTOPP_POWER8_AVAILABLE
|
||||
const uint32x4_p rk1 = vec_splats(subkeys[i]);
|
||||
const uint32x4_p rk2 = vec_splats(subkeys[i+1]);
|
||||
#else
|
||||
@ -592,7 +582,7 @@ inline void SIMON64_Enc_Block(uint32x4_p &block0, uint32x4_p &block1,
|
||||
|
||||
if (rounds & 1)
|
||||
{
|
||||
#if CRYPTOPP_POWER7_AVAILABLE
|
||||
#if CRYPTOPP_POWER8_AVAILABLE
|
||||
const uint32x4_p rk = vec_splats(subkeys[rounds-1]);
|
||||
#else
|
||||
const uint8x16_p m = {0,1,2,3, 0,1,2,3, 0,1,2,3, 0,1,2,3};
|
||||
@ -634,7 +624,7 @@ inline void SIMON64_Dec_Block(uint32x4_p &block0, uint32x4_p &block1,
|
||||
if (rounds & 1)
|
||||
{
|
||||
std::swap(x1, y1);
|
||||
#if CRYPTOPP_POWER7_AVAILABLE
|
||||
#if CRYPTOPP_POWER8_AVAILABLE
|
||||
const uint32x4_p rk = vec_splats(subkeys[rounds-1]);
|
||||
#else
|
||||
const uint8x16_p m = {0,1,2,3, 0,1,2,3, 0,1,2,3, 0,1,2,3};
|
||||
@ -647,7 +637,7 @@ inline void SIMON64_Dec_Block(uint32x4_p &block0, uint32x4_p &block1,
|
||||
|
||||
for (int i = static_cast<int>(rounds-2); i >= 0; i -= 2)
|
||||
{
|
||||
#if CRYPTOPP_POWER7_AVAILABLE
|
||||
#if CRYPTOPP_POWER8_AVAILABLE
|
||||
const uint32x4_p rk1 = vec_splats(subkeys[i+1]);
|
||||
const uint32x4_p rk2 = vec_splats(subkeys[i]);
|
||||
#else
|
||||
@ -696,7 +686,7 @@ inline void SIMON64_Enc_6_Blocks(uint32x4_p &block0, uint32x4_p &block1,
|
||||
|
||||
for (int i = 0; i < static_cast<int>(rounds & ~1)-1; i += 2)
|
||||
{
|
||||
#if CRYPTOPP_POWER7_AVAILABLE
|
||||
#if CRYPTOPP_POWER8_AVAILABLE
|
||||
const uint32x4_p rk1 = vec_splats(subkeys[i]);
|
||||
const uint32x4_p rk2 = vec_splats(subkeys[i+1]);
|
||||
#else
|
||||
@ -717,7 +707,7 @@ inline void SIMON64_Enc_6_Blocks(uint32x4_p &block0, uint32x4_p &block1,
|
||||
|
||||
if (rounds & 1)
|
||||
{
|
||||
#if CRYPTOPP_POWER7_AVAILABLE
|
||||
#if CRYPTOPP_POWER8_AVAILABLE
|
||||
const uint32x4_p rk = vec_splats(subkeys[rounds-1]);
|
||||
#else
|
||||
const uint8x16_p m = {0,1,2,3, 0,1,2,3, 0,1,2,3, 0,1,2,3};
|
||||
@ -771,7 +761,7 @@ inline void SIMON64_Dec_6_Blocks(uint32x4_p &block0, uint32x4_p &block1,
|
||||
{
|
||||
std::swap(x1, y1); std::swap(x2, y2); std::swap(x3, y3);
|
||||
|
||||
#if CRYPTOPP_POWER7_AVAILABLE
|
||||
#if CRYPTOPP_POWER8_AVAILABLE
|
||||
const uint32x4_p rk = vec_splats(subkeys[rounds-1]);
|
||||
#else
|
||||
const uint8x16_p m = {0,1,2,3, 0,1,2,3, 0,1,2,3, 0,1,2,3};
|
||||
@ -786,7 +776,7 @@ inline void SIMON64_Dec_6_Blocks(uint32x4_p &block0, uint32x4_p &block1,
|
||||
|
||||
for (int i = static_cast<int>(rounds-2); i >= 0; i -= 2)
|
||||
{
|
||||
#if CRYPTOPP_POWER7_AVAILABLE
|
||||
#if CRYPTOPP_POWER8_AVAILABLE
|
||||
const uint32x4_p rk1 = vec_splats(subkeys[i+1]);
|
||||
const uint32x4_p rk2 = vec_splats(subkeys[i]);
|
||||
#else
|
||||
|
13
vendor/cryptopp/vendor_cryptopp/skipjack.h
vendored
13
vendor/cryptopp/vendor_cryptopp/skipjack.h
vendored
@ -2,6 +2,12 @@
|
||||
|
||||
/// \file skipjack.h
|
||||
/// \brief Classes for the SKIPJACK block cipher
|
||||
/// \details The Crypto++ implementation conforms to SKIPJACK and KEA
|
||||
/// Algorithm Specifications published by NIST in May 1998. The library passes
|
||||
/// known answer tests available in NIST SP800-17, Table 6, pp. 140-42.
|
||||
/// \sa <a href ="http://csrc.nist.gov/encryption/skipjack/skipjack.pdf">SKIPJACK
|
||||
/// and KEA Algorithm Specifications</a> (May 1998), <a
|
||||
/// href="http://www.cryptopp.com/wiki/SKIPJACK">SKIPJACK</a> on the Crypto++ wiki
|
||||
|
||||
#ifndef CRYPTOPP_SKIPJACK_H
|
||||
#define CRYPTOPP_SKIPJACK_H
|
||||
@ -18,7 +24,12 @@ struct SKIPJACK_Info : public FixedBlockSize<8>, public FixedKeyLength<10>
|
||||
};
|
||||
|
||||
/// \brief SKIPJACK block cipher
|
||||
/// \sa <a href="http://www.cryptopp.com/wiki/SKIPJACK">SKIPJACK</a>
|
||||
/// \details The Crypto++ implementation conforms to SKIPJACK and KEA
|
||||
/// Algorithm Specifications published by NIST in May 1998. The library passes
|
||||
/// known answer tests available in NIST SP800-17, Table 6, pp. 140-42.
|
||||
/// \sa <a href ="http://csrc.nist.gov/encryption/skipjack/skipjack.pdf">SKIPJACK
|
||||
/// and KEA Algorithm Specifications</a> (May 1998), <a
|
||||
/// href="http://www.cryptopp.com/wiki/SKIPJACK">SKIPJACK</a> on the Crypto++ wiki
|
||||
class SKIPJACK : public SKIPJACK_Info, public BlockCipherDocumentation
|
||||
{
|
||||
/// \brief SKIPJACK block cipher default operation
|
||||
|
6
vendor/cryptopp/vendor_cryptopp/speck.cpp
vendored
6
vendor/cryptopp/vendor_cryptopp/speck.cpp
vendored
@ -235,9 +235,9 @@ std::string SPECK64::Base::AlgorithmProvider() const
|
||||
if (HasNEON())
|
||||
return "NEON";
|
||||
# endif
|
||||
# if (CRYPTOPP_POWER7_AVAILABLE)
|
||||
if (HasPower7())
|
||||
return "Power7";
|
||||
# if (CRYPTOPP_POWER8_AVAILABLE)
|
||||
if (HasPower8())
|
||||
return "Power8";
|
||||
# endif
|
||||
# if (CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||
if (HasAltivec())
|
||||
|
@ -107,13 +107,8 @@ inline uint64x2_t RotateRight64(const uint64x2_t& val)
|
||||
template <>
|
||||
inline uint64x2_t RotateLeft64<8>(const uint64x2_t& val)
|
||||
{
|
||||
#if (CRYPTOPP_BIG_ENDIAN)
|
||||
const uint8_t maskb[16] = { 14,13,12,11, 10,9,8,15, 6,5,4,3, 2,1,0,7 };
|
||||
const uint8x16_t mask = vld1q_u8(maskb);
|
||||
#else
|
||||
const uint8_t maskb[16] = { 7,0,1,2, 3,4,5,6, 15,8,9,10, 11,12,13,14 };
|
||||
const uint8x16_t mask = vld1q_u8(maskb);
|
||||
#endif
|
||||
|
||||
return vreinterpretq_u64_u8(
|
||||
vqtbl1q_u8(vreinterpretq_u8_u64(val), mask));
|
||||
@ -123,13 +118,8 @@ inline uint64x2_t RotateLeft64<8>(const uint64x2_t& val)
|
||||
template <>
|
||||
inline uint64x2_t RotateRight64<8>(const uint64x2_t& val)
|
||||
{
|
||||
#if (CRYPTOPP_BIG_ENDIAN)
|
||||
const uint8_t maskb[16] = { 8,15,14,13, 12,11,10,9, 0,7,6,5, 4,3,2,1 };
|
||||
const uint8x16_t mask = vld1q_u8(maskb);
|
||||
#else
|
||||
const uint8_t maskb[16] = { 1,2,3,4, 5,6,7,0, 9,10,11,12, 13,14,15,8 };
|
||||
const uint8x16_t mask = vld1q_u8(maskb);
|
||||
#endif
|
||||
|
||||
return vreinterpretq_u64_u8(
|
||||
vqtbl1q_u8(vreinterpretq_u8_u64(val), mask));
|
||||
|
18
vendor/cryptopp/vendor_cryptopp/speck64_simd.cpp
vendored
18
vendor/cryptopp/vendor_cryptopp/speck64_simd.cpp
vendored
@ -105,13 +105,8 @@ inline uint32x4_t RotateRight32(const uint32x4_t& val)
|
||||
template <>
|
||||
inline uint32x4_t RotateLeft32<8>(const uint32x4_t& val)
|
||||
{
|
||||
#if (CRYPTOPP_BIG_ENDIAN)
|
||||
const uint8_t maskb[16] = { 14,13,12,15, 10,9,8,11, 6,5,4,7, 2,1,0,3 };
|
||||
const uint8x16_t mask = vld1q_u8(maskb);
|
||||
#else
|
||||
const uint8_t maskb[16] = { 3,0,1,2, 7,4,5,6, 11,8,9,10, 15,12,13,14 };
|
||||
const uint8x16_t mask = vld1q_u8(maskb);
|
||||
#endif
|
||||
|
||||
return vreinterpretq_u32_u8(
|
||||
vqtbl1q_u8(vreinterpretq_u8_u32(val), mask));
|
||||
@ -121,13 +116,8 @@ inline uint32x4_t RotateLeft32<8>(const uint32x4_t& val)
|
||||
template <>
|
||||
inline uint32x4_t RotateRight32<8>(const uint32x4_t& val)
|
||||
{
|
||||
#if (CRYPTOPP_BIG_ENDIAN)
|
||||
const uint8_t maskb[16] = { 12,15,14,13, 8,11,10,9, 4,7,6,5, 0,3,2,1 };
|
||||
const uint8x16_t mask = vld1q_u8(maskb);
|
||||
#else
|
||||
const uint8_t maskb[16] = { 1,2,3,0, 5,6,7,4, 9,10,11,8, 13,14,15,12 };
|
||||
const uint8x16_t mask = vld1q_u8(maskb);
|
||||
#endif
|
||||
|
||||
return vreinterpretq_u32_u8(
|
||||
vqtbl1q_u8(vreinterpretq_u8_u32(val), mask));
|
||||
@ -517,7 +507,7 @@ void SPECK64_Enc_Block(uint32x4_p &block0, uint32x4_p &block1,
|
||||
|
||||
for (int i=0; i < static_cast<int>(rounds); ++i)
|
||||
{
|
||||
#if CRYPTOPP_POWER7_AVAILABLE
|
||||
#if CRYPTOPP_POWER8_AVAILABLE
|
||||
const uint32x4_p rk = vec_splats(subkeys[i]);
|
||||
#else
|
||||
// subkeys has extra elements so memory backs the last subkey
|
||||
@ -564,7 +554,7 @@ void SPECK64_Dec_Block(uint32x4_p &block0, uint32x4_p &block1,
|
||||
|
||||
for (int i = static_cast<int>(rounds-1); i >= 0; --i)
|
||||
{
|
||||
#if CRYPTOPP_POWER7_AVAILABLE
|
||||
#if CRYPTOPP_POWER8_AVAILABLE
|
||||
const uint32x4_p rk = vec_splats(subkeys[i]);
|
||||
#else
|
||||
// subkeys has extra elements so memory backs the last subkey
|
||||
@ -616,7 +606,7 @@ void SPECK64_Enc_6_Blocks(uint32x4_p &block0, uint32x4_p &block1,
|
||||
|
||||
for (int i=0; i < static_cast<int>(rounds); ++i)
|
||||
{
|
||||
#if CRYPTOPP_POWER7_AVAILABLE
|
||||
#if CRYPTOPP_POWER8_AVAILABLE
|
||||
const uint32x4_p rk = vec_splats(subkeys[i]);
|
||||
#else
|
||||
// subkeys has extra elements so memory backs the last subkey
|
||||
@ -685,7 +675,7 @@ void SPECK64_Dec_6_Blocks(uint32x4_p &block0, uint32x4_p &block1,
|
||||
|
||||
for (int i = static_cast<int>(rounds-1); i >= 0; --i)
|
||||
{
|
||||
#if CRYPTOPP_POWER7_AVAILABLE
|
||||
#if CRYPTOPP_POWER8_AVAILABLE
|
||||
const uint32x4_p rk = vec_splats(subkeys[i]);
|
||||
#else
|
||||
// subkeys has extra elements so memory backs the last subkey
|
||||
|
58
vendor/cryptopp/vendor_cryptopp/validat5.cpp
vendored
58
vendor/cryptopp/vendor_cryptopp/validat5.cpp
vendored
@ -265,13 +265,13 @@ bool ValidateSHAKE_XOF()
|
||||
|
||||
StringSource(msg, true, new HexDecoder(new StringSink(m)));
|
||||
StringSource(out, true, new HexDecoder(new StringSink(o)));
|
||||
r.reserve(o.size());
|
||||
r.resize(o.size());
|
||||
|
||||
SHAKE128 hash((unsigned int)r.size());
|
||||
hash.Update((const byte*)&m[0], m.size());
|
||||
hash.TruncatedFinal((byte*)&o[0], o.size());
|
||||
SHAKE128 hash((unsigned int)o.size());
|
||||
hash.Update(ConstBytePtr(m), BytePtrSize(m));
|
||||
hash.TruncatedFinal(BytePtr(r), BytePtrSize(r));
|
||||
|
||||
fail = (std::memcmp(r.data(), r.data(), o.size()) != 0);
|
||||
fail = (std::memcmp(r.data(), o.data(), o.size()) != 0);
|
||||
pass = pass & !fail;
|
||||
|
||||
if (fail)
|
||||
@ -292,13 +292,13 @@ bool ValidateSHAKE_XOF()
|
||||
|
||||
StringSource(msg, true, new HexDecoder(new StringSink(m)));
|
||||
StringSource(out, true, new HexDecoder(new StringSink(o)));
|
||||
r.reserve(o.size());
|
||||
r.resize(o.size());
|
||||
|
||||
SHAKE128 hash((unsigned int)r.size());
|
||||
hash.Update((const byte*)&m[0], m.size());
|
||||
hash.TruncatedFinal((byte*)&o[0], o.size());
|
||||
SHAKE128 hash((unsigned int)o.size());
|
||||
hash.Update(ConstBytePtr(m), BytePtrSize(m));
|
||||
hash.TruncatedFinal(BytePtr(r), BytePtrSize(r));
|
||||
|
||||
fail = (std::memcmp(r.data(), r.data(), o.size()) != 0);
|
||||
fail = (std::memcmp(r.data(), o.data(), o.size()) != 0);
|
||||
pass = pass & !fail;
|
||||
|
||||
if (fail)
|
||||
@ -317,13 +317,13 @@ bool ValidateSHAKE_XOF()
|
||||
|
||||
StringSource(msg, true, new HexDecoder(new StringSink(m)));
|
||||
StringSource(out, true, new HexDecoder(new StringSink(o)));
|
||||
r.reserve(o.size());
|
||||
r.resize(o.size());
|
||||
|
||||
SHAKE256 hash((unsigned int)r.size());
|
||||
hash.Update((const byte*)&m[0], m.size());
|
||||
hash.TruncatedFinal((byte*)&o[0], o.size());
|
||||
SHAKE256 hash((unsigned int)o.size());
|
||||
hash.Update(ConstBytePtr(m), BytePtrSize(m));
|
||||
hash.TruncatedFinal(BytePtr(r), BytePtrSize(r));
|
||||
|
||||
fail = (std::memcmp(r.data(), r.data(), o.size()) != 0);
|
||||
fail = (std::memcmp(r.data(), o.data(), o.size()) != 0);
|
||||
pass = pass & !fail;
|
||||
|
||||
if (fail)
|
||||
@ -347,13 +347,13 @@ bool ValidateSHAKE_XOF()
|
||||
|
||||
StringSource(msg, true, new HexDecoder(new StringSink(m)));
|
||||
StringSource(out, true, new HexDecoder(new StringSink(o)));
|
||||
r.reserve(o.size());
|
||||
r.resize(o.size());
|
||||
|
||||
SHAKE256 hash((unsigned int)r.size());
|
||||
hash.Update((const byte*)&m[0], m.size());
|
||||
hash.TruncatedFinal((byte*)&o[0], o.size());
|
||||
SHAKE256 hash((unsigned int)o.size());
|
||||
hash.Update(ConstBytePtr(m), BytePtrSize(m));
|
||||
hash.TruncatedFinal(BytePtr(r), BytePtrSize(r));
|
||||
|
||||
fail = (std::memcmp(r.data(), r.data(), o.size()) != 0);
|
||||
fail = (std::memcmp(r.data(), o.data(), o.size()) != 0);
|
||||
pass = pass & !fail;
|
||||
|
||||
if (fail)
|
||||
@ -362,7 +362,7 @@ bool ValidateSHAKE_XOF()
|
||||
pass = pass && !fail;
|
||||
}
|
||||
|
||||
std::cout << (!pass ? "FAILED " : "passed ") << " SHAKE XOF message digests" << std::endl;
|
||||
std::cout << (!pass ? "FAILED " : "passed ") << "SHAKE XOF message digests" << std::endl;
|
||||
|
||||
return pass;
|
||||
}
|
||||
@ -729,11 +729,11 @@ bool TestPBKDF(KeyDerivationFunction &pbkdf, const PBKDF_TestTuple *testSet, uns
|
||||
|
||||
double timeInSeconds = 0.0f;
|
||||
AlgorithmParameters params = MakeParameters("Purpose", (int)tuple.purpose)
|
||||
(Name::Salt(), ConstByteArrayParameter((const byte*)&salt[0], salt.size()))
|
||||
(Name::Salt(), ConstByteArrayParameter(ConstBytePtr(salt), BytePtrSize(salt)))
|
||||
("Iterations", (int)tuple.iterations)("TimeInSeconds", timeInSeconds);
|
||||
|
||||
SecByteBlock derived(derivedKey.size());
|
||||
pbkdf.DeriveKey(derived, derived.size(), (const byte *)password.data(), password.size(), params);
|
||||
pbkdf.DeriveKey(derived, derived.size(), ConstBytePtr(password), BytePtrSize(password), params);
|
||||
bool fail = !!memcmp(derived, derivedKey.data(), derived.size()) != 0;
|
||||
pass = pass && !fail;
|
||||
|
||||
@ -815,13 +815,13 @@ bool TestHKDF(KeyDerivationFunction &kdf, const HKDF_TestTuple *testSet, unsigne
|
||||
|
||||
AlgorithmParameters params;
|
||||
if (tuple.hexSalt)
|
||||
params(Name::Salt(), ConstByteArrayParameter((const byte*)&salt[0], salt.size()));
|
||||
params(Name::Salt(), ConstByteArrayParameter(ConstBytePtr(salt), BytePtrSize(salt)));
|
||||
if (tuple.hexSalt)
|
||||
params("Info", ConstByteArrayParameter((const byte*)&info[0], info.size()));
|
||||
params("Info", ConstByteArrayParameter(ConstBytePtr(info), BytePtrSize(info)));
|
||||
|
||||
kdf.DeriveKey((byte*)&derived[0], derived.size(), (const byte*)&secret[0], secret.size(), params);
|
||||
kdf.DeriveKey(derived, derived.size(), ConstBytePtr(secret), BytePtrSize(secret), params);
|
||||
|
||||
bool fail = !VerifyBufsEqual(derived, (const byte*)&expected[0], derived.size());
|
||||
bool fail = !VerifyBufsEqual(derived, ConstBytePtr(expected), BytePtrSize(expected));
|
||||
pass = pass && !fail;
|
||||
|
||||
HexEncoder enc(new FileSink(std::cout));
|
||||
@ -946,10 +946,10 @@ bool TestScrypt(KeyDerivationFunction &pbkdf, const Scrypt_TestTuple *testSet, u
|
||||
|
||||
AlgorithmParameters params = MakeParameters("Cost", (word64)tuple.n)
|
||||
("BlockSize", (word64)tuple.r)("Parallelization", (word64)tuple.p)
|
||||
(Name::Salt(), ConstByteArrayParameter((const byte*)&salt[0], salt.size()));
|
||||
(Name::Salt(), ConstByteArrayParameter(ConstBytePtr(salt), BytePtrSize(salt)));
|
||||
|
||||
SecByteBlock derived(expect.size());
|
||||
pbkdf.DeriveKey(derived, derived.size(), (const byte *)password.data(), password.size(), params);
|
||||
pbkdf.DeriveKey(derived, derived.size(), ConstBytePtr(password), BytePtrSize(password), params);
|
||||
bool fail = !!memcmp(derived, expect.data(), expect.size()) != 0;
|
||||
pass = pass && !fail;
|
||||
|
||||
|
7
vendor/cryptopp/vendor_cryptopp/xed25519.h
vendored
7
vendor/cryptopp/vendor_cryptopp/xed25519.h
vendored
@ -66,6 +66,13 @@ public:
|
||||
|
||||
virtual ~x25519() {}
|
||||
|
||||
/// \brief Create a x25519 object
|
||||
/// \details This constructor creates an empty x25519 object. It is
|
||||
/// intended for use in loading existing parameters, like CryptoBox
|
||||
/// parameters. If you are perfoming key agreement you should use a
|
||||
/// constructor that generates random parameters on construction.
|
||||
x25519() {}
|
||||
|
||||
/// \brief Create a x25519 object
|
||||
/// \param y public key
|
||||
/// \param x private key
|
||||
|
Loading…
Reference in New Issue
Block a user