Merge branch 'release/0.10' of https://github.com/cryfs/cryfs into release/0.10
This commit is contained in:
commit
12ce925213
@ -7,6 +7,9 @@ Fixed bugs:
|
|||||||
Improvements:
|
Improvements:
|
||||||
* Better logging when local state can't be loaded
|
* Better logging when local state can't be loaded
|
||||||
|
|
||||||
|
Other:
|
||||||
|
* Updated to crypto++ 8.2
|
||||||
|
|
||||||
|
|
||||||
Version 0.10.1
|
Version 0.10.1
|
||||||
---------------
|
---------------
|
||||||
|
4
vendor/README
vendored
4
vendor/README
vendored
@ -2,6 +2,6 @@ This directory contains external projects, taken from the following locations:
|
|||||||
googletest: https://github.com/google/googletest/tree/4e4df226fc197c0dda6e37f5c8c3845ca1e73a49
|
googletest: https://github.com/google/googletest/tree/4e4df226fc197c0dda6e37f5c8c3845ca1e73a49
|
||||||
- changed: added NOLINT comment as workaround for clang-tidy warning https://github.com/google/googletest/issues/853
|
- changed: added NOLINT comment as workaround for clang-tidy warning https://github.com/google/googletest/issues/853
|
||||||
spdlog: https://github.com/gabime/spdlog/tree/v0.16.3/include/spdlog
|
spdlog: https://github.com/gabime/spdlog/tree/v0.16.3/include/spdlog
|
||||||
cryptopp: https://github.com/weidai11/cryptopp/tree/CRYPTOPP_8_1_0
|
cryptopp: https://github.com/weidai11/cryptopp/tree/CRYPTOPP_8_2_0
|
||||||
- changed: added CMakeLists.txt and cryptopp-config.cmake from https://github.com/noloader/cryptopp-cmake/tree/07a064d57d97477cb055f994a498f45425df0c1d
|
- changed: added CMakeLists.txt and cryptopp-config.cmake from https://github.com/noloader/cryptopp-cmake/tree/CRYPTOPP_8_2_0
|
||||||
- changed: commented out line including winapifamily.h in CMakeLists.txt
|
- changed: commented out line including winapifamily.h in CMakeLists.txt
|
||||||
|
1600
vendor/cryptopp/vendor_cryptopp/CMakeLists.txt
vendored
1600
vendor/cryptopp/vendor_cryptopp/CMakeLists.txt
vendored
File diff suppressed because it is too large
Load Diff
2
vendor/cryptopp/vendor_cryptopp/Doxyfile
vendored
2
vendor/cryptopp/vendor_cryptopp/Doxyfile
vendored
@ -41,7 +41,7 @@ PROJECT_NAME = Crypto++
|
|||||||
# could be handy for archiving the generated documentation or if some version
|
# could be handy for archiving the generated documentation or if some version
|
||||||
# control system is used.
|
# control system is used.
|
||||||
|
|
||||||
PROJECT_NUMBER = 8.1
|
PROJECT_NUMBER = 8.2
|
||||||
|
|
||||||
# Using the PROJECT_BRIEF tag one can provide an optional one line description
|
# Using the PROJECT_BRIEF tag one can provide an optional one line description
|
||||||
# for a project that appears at the top of each page and should give viewer a
|
# for a project that appears at the top of each page and should give viewer a
|
||||||
|
1
vendor/cryptopp/vendor_cryptopp/Filelist.txt
vendored
1
vendor/cryptopp/vendor_cryptopp/Filelist.txt
vendored
@ -542,6 +542,7 @@ TestVectors/shacal2.txt
|
|||||||
TestVectors/simeck.txt
|
TestVectors/simeck.txt
|
||||||
TestVectors/simon.txt
|
TestVectors/simon.txt
|
||||||
TestVectors/siphash.txt
|
TestVectors/siphash.txt
|
||||||
|
TestVectors/skipjack.txt
|
||||||
TestVectors/sm3.txt
|
TestVectors/sm3.txt
|
||||||
TestVectors/sm4.txt
|
TestVectors/sm4.txt
|
||||||
TestVectors/sosemanuk.txt
|
TestVectors/sosemanuk.txt
|
||||||
|
97
vendor/cryptopp/vendor_cryptopp/GNUmakefile
vendored
97
vendor/cryptopp/vendor_cryptopp/GNUmakefile
vendored
@ -10,8 +10,6 @@ SHELL = /bin/sh
|
|||||||
|
|
||||||
# If needed
|
# If needed
|
||||||
TMPDIR ?= /tmp
|
TMPDIR ?= /tmp
|
||||||
# Used for ARMv7 and NEON.
|
|
||||||
FP_ABI ?= hard
|
|
||||||
# Used for feature tests
|
# Used for feature tests
|
||||||
TOUT ?= a.out
|
TOUT ?= a.out
|
||||||
TOUT := $(strip $(TOUT))
|
TOUT := $(strip $(TOUT))
|
||||||
@ -53,8 +51,6 @@ IS_SPARC64 := $(shell echo "$(HOSTX)" | $(GREP) -i -c -E 'sun|sparc64')
|
|||||||
IS_ARM32 := $(shell echo "$(HOSTX)" | $(GREP) -i -c -E 'arm|armhf|arm7l|eabihf')
|
IS_ARM32 := $(shell echo "$(HOSTX)" | $(GREP) -i -c -E 'arm|armhf|arm7l|eabihf')
|
||||||
IS_ARMV8 := $(shell echo "$(HOSTX)" | $(GREP) -i -c -E 'aarch32|aarch64|arm64|armv8')
|
IS_ARMV8 := $(shell echo "$(HOSTX)" | $(GREP) -i -c -E 'aarch32|aarch64|arm64|armv8')
|
||||||
|
|
||||||
IS_NEON := $(shell $(CXX) $(CXXFLAGS) -dumpmachine 2>/dev/null | $(GREP) -i -c -E 'armv7|armhf|arm7l|eabihf|armv8|aarch32|aarch64')
|
|
||||||
|
|
||||||
# Attempt to determine platform
|
# Attempt to determine platform
|
||||||
SYSTEMX := $(shell $(CXX) $(CXXFLAGS) -dumpmachine 2>/dev/null)
|
SYSTEMX := $(shell $(CXX) $(CXXFLAGS) -dumpmachine 2>/dev/null)
|
||||||
ifeq ($(SYSTEMX),)
|
ifeq ($(SYSTEMX),)
|
||||||
@ -439,37 +435,37 @@ endif
|
|||||||
##### ARM A-32, Aach64 and NEON #####
|
##### ARM A-32, Aach64 and NEON #####
|
||||||
###########################################################
|
###########################################################
|
||||||
|
|
||||||
ifneq ($(IS_ARM32)$(IS_ARMV8)$(IS_NEON),000)
|
ifneq ($(IS_ARM32)$(IS_ARMV8),00)
|
||||||
ifeq ($(DETECT_FEATURES),1)
|
ifeq ($(DETECT_FEATURES),1)
|
||||||
|
|
||||||
ifeq ($(IS_ARM32)$(IS_NEON),11)
|
ifneq ($(IS_ARM32),0)
|
||||||
|
|
||||||
TPROG = TestPrograms/test_arm_neon.cxx
|
TPROG = TestPrograms/test_arm_neon.cxx
|
||||||
TOPT = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
TOPT = -march=armv7-a -mfpu=neon
|
||||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||||
ifeq ($(strip $(HAVE_OPT)),0)
|
ifeq ($(strip $(HAVE_OPT)),0)
|
||||||
NEON_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
NEON_FLAG = -march=armv7-a -mfpu=neon
|
||||||
ARIA_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
ARIA_FLAG = -march=armv7-a -mfpu=neon
|
||||||
AES_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
AES_FLAG = -march=armv7-a -mfpu=neon
|
||||||
CRC_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
CRC_FLAG = -march=armv7-a -mfpu=neon
|
||||||
GCM_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
GCM_FLAG = -march=armv7-a -mfpu=neon
|
||||||
BLAKE2B_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
BLAKE2B_FLAG = -march=armv7-a -mfpu=neon
|
||||||
BLAKE2S_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
BLAKE2S_FLAG = -march=armv7-a -mfpu=neon
|
||||||
CHACHA_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
CHACHA_FLAG = -march=armv7-a -mfpu=neon
|
||||||
CHAM_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
CHAM_FLAG = -march=armv7-a -mfpu=neon
|
||||||
LEA_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
LEA_FLAG = -march=armv7-a -mfpu=neon
|
||||||
SHA_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
SHA_FLAG = -march=armv7-a -mfpu=neon
|
||||||
SIMECK_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
SIMECK_FLAG = -march=armv7-a -mfpu=neon
|
||||||
SIMON64_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
SIMON64_FLAG = -march=armv7-a -mfpu=neon
|
||||||
SIMON128_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
SIMON128_FLAG = -march=armv7-a -mfpu=neon
|
||||||
SPECK64_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
SPECK64_FLAG = -march=armv7-a -mfpu=neon
|
||||||
SPECK128_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
SPECK128_FLAG = -march=armv7-a -mfpu=neon
|
||||||
SM4_FLAG = -march=armv7-a -mfloat-abi=$(FP_ABI) -mfpu=neon
|
SM4_FLAG = -march=armv7-a -mfpu=neon
|
||||||
else
|
else
|
||||||
CXXFLAGS += -DCRYPTOPP_DISABLE_ASM
|
CXXFLAGS += -DCRYPTOPP_DISABLE_ASM
|
||||||
endif
|
endif
|
||||||
|
|
||||||
# IS_NEON
|
# IS_ARM32
|
||||||
endif
|
endif
|
||||||
|
|
||||||
ifeq ($(IS_ARMV8),1)
|
ifeq ($(IS_ARMV8),1)
|
||||||
@ -485,7 +481,7 @@ ifeq ($(IS_ARMV8),1)
|
|||||||
|
|
||||||
TPROG = TestPrograms/test_arm_asimd.cxx
|
TPROG = TestPrograms/test_arm_asimd.cxx
|
||||||
TOPT = -march=armv8-a
|
TOPT = -march=armv8-a
|
||||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||||
ifeq ($(strip $(HAVE_OPT)),0)
|
ifeq ($(strip $(HAVE_OPT)),0)
|
||||||
ASIMD_FLAG = -march=armv8-a
|
ASIMD_FLAG = -march=armv8-a
|
||||||
ARIA_FLAG = -march=armv8-a
|
ARIA_FLAG = -march=armv8-a
|
||||||
@ -508,7 +504,7 @@ ifeq ($(IS_ARMV8),1)
|
|||||||
ifneq ($(ASIMD_FLAG),)
|
ifneq ($(ASIMD_FLAG),)
|
||||||
TPROG = TestPrograms/test_arm_crc.cxx
|
TPROG = TestPrograms/test_arm_crc.cxx
|
||||||
TOPT = -march=armv8-a+crc
|
TOPT = -march=armv8-a+crc
|
||||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||||
ifeq ($(strip $(HAVE_OPT)),0)
|
ifeq ($(strip $(HAVE_OPT)),0)
|
||||||
CRC_FLAG = -march=armv8-a+crc
|
CRC_FLAG = -march=armv8-a+crc
|
||||||
else
|
else
|
||||||
@ -517,7 +513,7 @@ ifeq ($(IS_ARMV8),1)
|
|||||||
|
|
||||||
TPROG = TestPrograms/test_arm_aes.cxx
|
TPROG = TestPrograms/test_arm_aes.cxx
|
||||||
TOPT = -march=armv8-a+crypto
|
TOPT = -march=armv8-a+crypto
|
||||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||||
ifeq ($(strip $(HAVE_OPT)),0)
|
ifeq ($(strip $(HAVE_OPT)),0)
|
||||||
AES_FLAG = -march=armv8-a+crypto
|
AES_FLAG = -march=armv8-a+crypto
|
||||||
else
|
else
|
||||||
@ -526,7 +522,7 @@ ifeq ($(IS_ARMV8),1)
|
|||||||
|
|
||||||
TPROG = TestPrograms/test_arm_pmull.cxx
|
TPROG = TestPrograms/test_arm_pmull.cxx
|
||||||
TOPT = -march=armv8-a+crypto
|
TOPT = -march=armv8-a+crypto
|
||||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||||
ifeq ($(strip $(HAVE_OPT)),0)
|
ifeq ($(strip $(HAVE_OPT)),0)
|
||||||
GCM_FLAG = -march=armv8-a+crypto
|
GCM_FLAG = -march=armv8-a+crypto
|
||||||
GF2N_FLAG = -march=armv8-a+crypto
|
GF2N_FLAG = -march=armv8-a+crypto
|
||||||
@ -536,7 +532,7 @@ ifeq ($(IS_ARMV8),1)
|
|||||||
|
|
||||||
TPROG = TestPrograms/test_arm_sha.cxx
|
TPROG = TestPrograms/test_arm_sha.cxx
|
||||||
TOPT = -march=armv8-a+crypto
|
TOPT = -march=armv8-a+crypto
|
||||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||||
ifeq ($(strip $(HAVE_OPT)),0)
|
ifeq ($(strip $(HAVE_OPT)),0)
|
||||||
SHA_FLAG = -march=armv8-a+crypto
|
SHA_FLAG = -march=armv8-a+crypto
|
||||||
else
|
else
|
||||||
@ -545,7 +541,7 @@ ifeq ($(IS_ARMV8),1)
|
|||||||
|
|
||||||
TPROG = TestPrograms/test_arm_sm3.cxx
|
TPROG = TestPrograms/test_arm_sm3.cxx
|
||||||
TOPT = -march=armv8.4-a+crypto
|
TOPT = -march=armv8.4-a+crypto
|
||||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||||
ifeq ($(strip $(HAVE_OPT)),0)
|
ifeq ($(strip $(HAVE_OPT)),0)
|
||||||
SM3_FLAG = -march=armv8.4-a+crypto
|
SM3_FLAG = -march=armv8.4-a+crypto
|
||||||
SM4_FLAG = -march=armv8.4-a+crypto
|
SM4_FLAG = -march=armv8.4-a+crypto
|
||||||
@ -553,7 +549,7 @@ ifeq ($(IS_ARMV8),1)
|
|||||||
|
|
||||||
TPROG = TestPrograms/test_arm_sha3.cxx
|
TPROG = TestPrograms/test_arm_sha3.cxx
|
||||||
TOPT = -march=armv8.4-a+crypto
|
TOPT = -march=armv8.4-a+crypto
|
||||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||||
ifeq ($(strip $(HAVE_OPT)),0)
|
ifeq ($(strip $(HAVE_OPT)),0)
|
||||||
SHA3_FLAG = -march=armv8.4-a+crypto
|
SHA3_FLAG = -march=armv8.4-a+crypto
|
||||||
endif
|
endif
|
||||||
@ -567,7 +563,7 @@ endif
|
|||||||
# DETECT_FEATURES
|
# DETECT_FEATURES
|
||||||
endif
|
endif
|
||||||
|
|
||||||
# IS_ARM32, IS_ARMV8, IS_NEON
|
# IS_ARM32, IS_ARMV8
|
||||||
endif
|
endif
|
||||||
|
|
||||||
###########################################################
|
###########################################################
|
||||||
@ -622,13 +618,21 @@ ifeq ($(DETECT_FEATURES),1)
|
|||||||
TOPT = $(POWER8_FLAG)
|
TOPT = $(POWER8_FLAG)
|
||||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||||
ifeq ($(strip $(HAVE_OPT)),0)
|
ifeq ($(strip $(HAVE_OPT)),0)
|
||||||
|
AES_FLAG = $(POWER8_FLAG)
|
||||||
|
ARIA_FLAG = $(POWER8_FLAG)
|
||||||
BLAKE2B_FLAG = $(POWER8_FLAG)
|
BLAKE2B_FLAG = $(POWER8_FLAG)
|
||||||
|
BLAKE2S_FLAG = $(POWER8_FLAG)
|
||||||
|
CHACHA_FLAG = $(POWER8_FLAG)
|
||||||
|
CHAM_FLAG = $(POWER8_FLAG)
|
||||||
CRC_FLAG = $(POWER8_FLAG)
|
CRC_FLAG = $(POWER8_FLAG)
|
||||||
GCM_FLAG = $(POWER8_FLAG)
|
GCM_FLAG = $(POWER8_FLAG)
|
||||||
GF2N_FLAG = $(POWER8_FLAG)
|
GF2N_FLAG = $(POWER8_FLAG)
|
||||||
AES_FLAG = $(POWER8_FLAG)
|
LEA_FLAG = $(POWER8_FLAG)
|
||||||
SHA_FLAG = $(POWER8_FLAG)
|
SHA_FLAG = $(POWER8_FLAG)
|
||||||
SHACAL2_FLAG = $(POWER8_FLAG)
|
SHACAL2_FLAG = $(POWER8_FLAG)
|
||||||
|
SIMECK_FLAG = $(POWER8_FLAG)
|
||||||
|
SIMON64_FLAG = $(POWER8_FLAG)
|
||||||
|
SPECK64_FLAG = $(POWER8_FLAG)
|
||||||
SIMON128_FLAG = $(POWER8_FLAG)
|
SIMON128_FLAG = $(POWER8_FLAG)
|
||||||
SPECK128_FLAG = $(POWER8_FLAG)
|
SPECK128_FLAG = $(POWER8_FLAG)
|
||||||
else
|
else
|
||||||
@ -641,16 +645,7 @@ ifeq ($(DETECT_FEATURES),1)
|
|||||||
TPROG = TestPrograms/test_ppc_power7.cxx
|
TPROG = TestPrograms/test_ppc_power7.cxx
|
||||||
TOPT = $(POWER7_FLAG)
|
TOPT = $(POWER7_FLAG)
|
||||||
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||||
ifeq ($(strip $(HAVE_OPT)),0)
|
ifneq ($(strip $(HAVE_OPT)),0)
|
||||||
ARIA_FLAG = $(POWER7_FLAG)
|
|
||||||
BLAKE2S_FLAG = $(POWER7_FLAG)
|
|
||||||
CHACHA_FLAG = $(POWER7_FLAG)
|
|
||||||
CHAM_FLAG = $(POWER7_FLAG)
|
|
||||||
LEA_FLAG = $(POWER7_FLAG)
|
|
||||||
SIMECK_FLAG = $(POWER7_FLAG)
|
|
||||||
SIMON64_FLAG = $(POWER7_FLAG)
|
|
||||||
SPECK64_FLAG = $(POWER7_FLAG)
|
|
||||||
else
|
|
||||||
POWER7_FLAG =
|
POWER7_FLAG =
|
||||||
endif
|
endif
|
||||||
|
|
||||||
@ -693,18 +688,12 @@ ifeq ($(DETECT_FEATURES),1)
|
|||||||
#####################################################################
|
#####################################################################
|
||||||
# Fixups for algorithms that can drop to a lower ISA, if needed
|
# Fixups for algorithms that can drop to a lower ISA, if needed
|
||||||
|
|
||||||
# Drop to Power7 if Power8 is not available.
|
# Drop to Power4 if Power8 not available
|
||||||
ifeq ($(POWER8_FLAG),)
|
ifeq ($(POWER8_FLAG),)
|
||||||
ifneq ($(POWER7_FLAG),)
|
|
||||||
GCM_FLAG = $(POWER7_FLAG)
|
|
||||||
endif
|
|
||||||
endif
|
|
||||||
|
|
||||||
# Drop to Power4 if Power7 not available
|
|
||||||
ifeq ($(POWER7_FLAG),)
|
|
||||||
ifneq ($(ALTIVEC_FLAG),)
|
ifneq ($(ALTIVEC_FLAG),)
|
||||||
BLAKE2S_FLAG = $(ALTIVEC_FLAG)
|
BLAKE2S_FLAG = $(ALTIVEC_FLAG)
|
||||||
CHACHA_FLAG = $(ALTIVEC_FLAG)
|
CHACHA_FLAG = $(ALTIVEC_FLAG)
|
||||||
|
GCM_FLAG = $(ALTIVEC_FLAG)
|
||||||
SIMON64_FLAG = $(ALTIVEC_FLAG)
|
SIMON64_FLAG = $(ALTIVEC_FLAG)
|
||||||
SPECK64_FLAG = $(ALTIVEC_FLAG)
|
SPECK64_FLAG = $(ALTIVEC_FLAG)
|
||||||
endif
|
endif
|
||||||
@ -1349,7 +1338,7 @@ libcryptopp.pc:
|
|||||||
@echo '' >> libcryptopp.pc
|
@echo '' >> libcryptopp.pc
|
||||||
@echo 'Name: Crypto++' >> libcryptopp.pc
|
@echo 'Name: Crypto++' >> libcryptopp.pc
|
||||||
@echo 'Description: Crypto++ cryptographic library' >> libcryptopp.pc
|
@echo 'Description: Crypto++ cryptographic library' >> libcryptopp.pc
|
||||||
@echo 'Version: 8.1' >> libcryptopp.pc
|
@echo 'Version: 8.2' >> libcryptopp.pc
|
||||||
@echo 'URL: https://cryptopp.com/' >> libcryptopp.pc
|
@echo 'URL: https://cryptopp.com/' >> libcryptopp.pc
|
||||||
@echo '' >> libcryptopp.pc
|
@echo '' >> libcryptopp.pc
|
||||||
@echo 'Cflags: -I$${includedir}' >> libcryptopp.pc
|
@echo 'Cflags: -I$${includedir}' >> libcryptopp.pc
|
||||||
@ -1430,7 +1419,7 @@ endif # Dependencies
|
|||||||
|
|
||||||
# Cryptogams ARM asm implementation.
|
# Cryptogams ARM asm implementation.
|
||||||
aes_armv4.o : aes_armv4.S
|
aes_armv4.o : aes_armv4.S
|
||||||
$(CC) $(strip $(CXXFLAGS) $(CRYPTOGAMS_AES_FLAG) -mfloat-abi=$(FP_ABI) -c) $<
|
$(CC) $(strip $(CXXFLAGS) $(CRYPTOGAMS_AES_FLAG) -c) $<
|
||||||
|
|
||||||
# SSSE3 or NEON available
|
# SSSE3 or NEON available
|
||||||
aria_simd.o : aria_simd.cpp
|
aria_simd.o : aria_simd.cpp
|
||||||
|
@ -384,10 +384,10 @@ ifeq ($(IS_ARM32),1)
|
|||||||
SM4_FLAG = $(NEON_FLAG)
|
SM4_FLAG = $(NEON_FLAG)
|
||||||
else
|
else
|
||||||
NEON_FLAG =
|
NEON_FLAG =
|
||||||
CXXFLAGS += -DCRYPTOPP_DISABLE_NEON
|
CXXFLAGS += -DCRYPTOPP_DISABLE_ASM
|
||||||
endif
|
endif
|
||||||
|
|
||||||
# IS_NEON
|
# IS_ARM32
|
||||||
endif
|
endif
|
||||||
|
|
||||||
ifeq ($(IS_ARMV8),1)
|
ifeq ($(IS_ARMV8),1)
|
||||||
@ -417,7 +417,7 @@ ifeq ($(IS_ARMV8),1)
|
|||||||
|
|
||||||
TPROG = TestPrograms/test_arm_asimd.cxx
|
TPROG = TestPrograms/test_arm_asimd.cxx
|
||||||
TOPT = $(ASIMD_FLAG)
|
TOPT = $(ASIMD_FLAG)
|
||||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||||
ifeq ($(strip $(HAVE_OPT)),0)
|
ifeq ($(strip $(HAVE_OPT)),0)
|
||||||
ARIA_FLAG = $(ASIMD_FLAG)
|
ARIA_FLAG = $(ASIMD_FLAG)
|
||||||
BLAKE2B_FLAG = $(ASIMD_FLAG)
|
BLAKE2B_FLAG = $(ASIMD_FLAG)
|
||||||
@ -439,7 +439,7 @@ ifeq ($(IS_ARMV8),1)
|
|||||||
|
|
||||||
TPROG = TestPrograms/test_arm_crc.cxx
|
TPROG = TestPrograms/test_arm_crc.cxx
|
||||||
TOPT = $(CRC_FLAG)
|
TOPT = $(CRC_FLAG)
|
||||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||||
ifneq ($(strip $(HAVE_OPT)),0)
|
ifneq ($(strip $(HAVE_OPT)),0)
|
||||||
CRC_FLAG =
|
CRC_FLAG =
|
||||||
CXXFLAGS += -DCRYPTOPP_ARM_CRC32_AVAILABLE=0
|
CXXFLAGS += -DCRYPTOPP_ARM_CRC32_AVAILABLE=0
|
||||||
@ -447,7 +447,7 @@ ifeq ($(IS_ARMV8),1)
|
|||||||
|
|
||||||
TPROG = TestPrograms/test_arm_aes.cxx
|
TPROG = TestPrograms/test_arm_aes.cxx
|
||||||
TOPT = $(AES_FLAG)
|
TOPT = $(AES_FLAG)
|
||||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||||
ifneq ($(strip $(HAVE_OPT)),0)
|
ifneq ($(strip $(HAVE_OPT)),0)
|
||||||
AES_FLAG =
|
AES_FLAG =
|
||||||
CXXFLAGS += -DCRYPTOPP_ARM_AES_AVAILABLE=0
|
CXXFLAGS += -DCRYPTOPP_ARM_AES_AVAILABLE=0
|
||||||
@ -455,7 +455,7 @@ ifeq ($(IS_ARMV8),1)
|
|||||||
|
|
||||||
TPROG = TestPrograms/test_arm_pmull.cxx
|
TPROG = TestPrograms/test_arm_pmull.cxx
|
||||||
TOPT = $(PMULL_FLAG)
|
TOPT = $(PMULL_FLAG)
|
||||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||||
ifneq ($(strip $(HAVE_OPT)),0)
|
ifneq ($(strip $(HAVE_OPT)),0)
|
||||||
PMULL_FLAG =
|
PMULL_FLAG =
|
||||||
CXXFLAGS += -DCRYPTOPP_ARM_PMULL_AVAILABLE=0
|
CXXFLAGS += -DCRYPTOPP_ARM_PMULL_AVAILABLE=0
|
||||||
@ -463,7 +463,7 @@ ifeq ($(IS_ARMV8),1)
|
|||||||
|
|
||||||
TPROG = TestPrograms/test_arm_sha.cxx
|
TPROG = TestPrograms/test_arm_sha.cxx
|
||||||
TOPT = $(SHA_FLAG)
|
TOPT = $(SHA_FLAG)
|
||||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||||
ifneq ($(strip $(HAVE_OPT)),0)
|
ifneq ($(strip $(HAVE_OPT)),0)
|
||||||
SHA_FLAG =
|
SHA_FLAG =
|
||||||
CXXFLAGS += -DCRYPTOPP_ARM_SHA_AVAILABLE=0
|
CXXFLAGS += -DCRYPTOPP_ARM_SHA_AVAILABLE=0
|
||||||
@ -471,7 +471,7 @@ ifeq ($(IS_ARMV8),1)
|
|||||||
|
|
||||||
TPROG = TestPrograms/test_arm_sm3.cxx
|
TPROG = TestPrograms/test_arm_sm3.cxx
|
||||||
TOPT = -march=armv8.4-a+crypto
|
TOPT = -march=armv8.4-a+crypto
|
||||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||||
ifeq ($(strip $(HAVE_OPT)),0)
|
ifeq ($(strip $(HAVE_OPT)),0)
|
||||||
SM3_FLAG = -march=armv8.4-a+crypto
|
SM3_FLAG = -march=armv8.4-a+crypto
|
||||||
SM4_FLAG = -march=armv8.4-a+crypto
|
SM4_FLAG = -march=armv8.4-a+crypto
|
||||||
@ -479,7 +479,7 @@ ifeq ($(IS_ARMV8),1)
|
|||||||
|
|
||||||
TPROG = TestPrograms/test_arm_sha3.cxx
|
TPROG = TestPrograms/test_arm_sha3.cxx
|
||||||
TOPT = -march=armv8.4-a+crypto
|
TOPT = -march=armv8.4-a+crypto
|
||||||
HAVE_OPT = $(shell $(CXX) $(CXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
HAVE_OPT = $(shell $(CXX) $(TCXXFLAGS) $(ACLE_FLAG) $(ZOPT) $(TOPT) $(TPROG) -o $(TOUT) 2>&1 | tr ' ' '\n' | wc -l)
|
||||||
ifeq ($(strip $(HAVE_OPT)),0)
|
ifeq ($(strip $(HAVE_OPT)),0)
|
||||||
SHA3_FLAG = -march=armv8.4-a+crypto
|
SHA3_FLAG = -march=armv8.4-a+crypto
|
||||||
SHA512_FLAG = -march=armv8.4-a+crypto
|
SHA512_FLAG = -march=armv8.4-a+crypto
|
||||||
|
17
vendor/cryptopp/vendor_cryptopp/History.txt
vendored
17
vendor/cryptopp/vendor_cryptopp/History.txt
vendored
@ -455,10 +455,10 @@ last several releases.
|
|||||||
8.1.0 - February 22, 2019
|
8.1.0 - February 22, 2019
|
||||||
- minor release, no recompile of programs required
|
- minor release, no recompile of programs required
|
||||||
- expanded community input and support
|
- expanded community input and support
|
||||||
56 unique contributors as of this release
|
* 56 unique contributors as of this release
|
||||||
- fix OS X PowerPC builds with Clang
|
- fix OS X PowerPC builds with Clang
|
||||||
- add Microsoft ARM64 support
|
- add Microsoft ARM64 support
|
||||||
- fix iPhone Simulator build due to missign symbols
|
- fix iPhone Simulator build due to missing symbols
|
||||||
- add CRYPTOPP_BUGGY_SIMD_LOAD_AND_STORE
|
- add CRYPTOPP_BUGGY_SIMD_LOAD_AND_STORE
|
||||||
- add carryless multiplies for NIST b233 and k233 curves
|
- add carryless multiplies for NIST b233 and k233 curves
|
||||||
- fix OpenMP build due to use of OpenMP 4 with down-level compilers
|
- fix OpenMP build due to use of OpenMP 4 with down-level compilers
|
||||||
@ -467,3 +467,16 @@ last several releases.
|
|||||||
- add SHAKE-128 and SHAKE-256
|
- add SHAKE-128 and SHAKE-256
|
||||||
- fix AVX2 build due to _mm256_broadcastsi128_si256
|
- fix AVX2 build due to _mm256_broadcastsi128_si256
|
||||||
- add IETF ChaCha, XChaCha, ChaChaPoly1305 and XChaChaPoly1305
|
- add IETF ChaCha, XChaCha, ChaChaPoly1305 and XChaChaPoly1305
|
||||||
|
|
||||||
|
8.2.0 - April 28, 2019
|
||||||
|
- minor release, no recompile of programs required
|
||||||
|
- expanded community input and support
|
||||||
|
* 56 unique contributors as of this release
|
||||||
|
- use PowerPC unaligned loads and stores with Power8
|
||||||
|
- add SKIPJACK test vectors
|
||||||
|
- fix SHAKE-128 and SHAKE-256 compile
|
||||||
|
- removed IS_NEON from Makefile
|
||||||
|
- fix Aarch64 build on Fedora 29
|
||||||
|
- fix missing GF2NT_233_Multiply_Reduce_CLMUL in FIPS DLL
|
||||||
|
- add missing BLAKE2 constructors
|
||||||
|
- fix missing BlockSize() in BLAKE2 classes
|
||||||
|
32
vendor/cryptopp/vendor_cryptopp/Readme.txt
vendored
32
vendor/cryptopp/vendor_cryptopp/Readme.txt
vendored
@ -1,5 +1,5 @@
|
|||||||
Crypto++: free C++ Class Library of Cryptographic Schemes
|
Crypto++: free C++ Class Library of Cryptographic Schemes
|
||||||
Version 8.0 - DEC/28/2018
|
Version 8.2 - APR/28/2019
|
||||||
|
|
||||||
Crypto++ Library is a free C++ class library of cryptographic schemes.
|
Crypto++ Library is a free C++ class library of cryptographic schemes.
|
||||||
Currently the library contains the following algorithms:
|
Currently the library contains the following algorithms:
|
||||||
@ -290,8 +290,36 @@ documentation is one of the highest returns on investment.
|
|||||||
The items in this section comprise the most recent history. Please see History.txt
|
The items in this section comprise the most recent history. Please see History.txt
|
||||||
for the record back to Crypto++ 1.0.
|
for the record back to Crypto++ 1.0.
|
||||||
|
|
||||||
8.0.0 - December 28, 2018
|
8.2.0 - April 28, 2019
|
||||||
|
- minor release, no recompile of programs required
|
||||||
|
- expanded community input and support
|
||||||
|
* 56 unique contributors as of this release
|
||||||
|
- use PowerPC unaligned loads and stores with Power8
|
||||||
|
- add SKIPJACK test vectors
|
||||||
|
- fix SHAKE-128 and SHAKE-256 compile
|
||||||
|
- removed IS_NEON from Makefile
|
||||||
|
- fix Aarch64 build on Fedora 29
|
||||||
|
- fix missing GF2NT_233_Multiply_Reduce_CLMUL in FIPS DLL
|
||||||
|
- add missing BLAKE2 constructors
|
||||||
|
- fix missing BlockSize() in BLAKE2 classes
|
||||||
|
|
||||||
|
8.1.0 - February 22, 2019
|
||||||
|
- minor release, no recompile of programs required
|
||||||
|
- expanded community input and support
|
||||||
|
* 56 unique contributors as of this release
|
||||||
|
- fix OS X PowerPC builds with Clang
|
||||||
|
- add Microsoft ARM64 support
|
||||||
|
- fix iPhone Simulator build due to missing symbols
|
||||||
|
- add CRYPTOPP_BUGGY_SIMD_LOAD_AND_STORE
|
||||||
|
- add carryless multiplies for NIST b233 and k233 curves
|
||||||
|
- fix OpenMP build due to use of OpenMP 4 with down-level compilers
|
||||||
|
- add SignStream and VerifyStream for ed25519 and large files
|
||||||
|
- fix missing AlgorithmProvider in PanamaHash
|
||||||
|
- add SHAKE-128 and SHAKE-256
|
||||||
|
- fix AVX2 build due to _mm256_broadcastsi128_si256
|
||||||
|
- add IETF ChaCha, XChaCha, ChaChaPoly1305 and XChaChaPoly1305
|
||||||
|
|
||||||
|
8.0.0 - December 28, 2018
|
||||||
- major release, recompile of programs required
|
- major release, recompile of programs required
|
||||||
- expanded community input and support
|
- expanded community input and support
|
||||||
* 54 unique contributors as of this release
|
* 54 unique contributors as of this release
|
||||||
|
@ -4,11 +4,14 @@
|
|||||||
# building the docs. Before running the script, copy it to the root
|
# building the docs. Before running the script, copy it to the root
|
||||||
# directory. After running this script, you can 'make docs'
|
# directory. After running this script, you can 'make docs'
|
||||||
|
|
||||||
sed 's|Library 8.1 API|Library 8.0 API|g' cryptlib.h > cryptlib.h.new
|
sed 's|Library 8.2 API|Library 8.1 API|g' cryptlib.h > cryptlib.h.new
|
||||||
mv cryptlib.h.new cryptlib.h
|
mv cryptlib.h.new cryptlib.h
|
||||||
|
|
||||||
sed 's|= 8.1|= 8.0|g' Doxyfile > Doxyfile.new
|
sed 's|= 8.2|= 8.1|g' Doxyfile > Doxyfile.new
|
||||||
mv Doxyfile.new Doxyfile
|
mv Doxyfile.new Doxyfile
|
||||||
|
|
||||||
sed 's|CRYPTOPP_VERSION 810|CRYPTOPP_VERSION 800|g' config.h > config.h.new
|
sed 's|CRYPTOPP_MINOR 2|CRYPTOPP_MINOR 1|g' config.h > config.h.new
|
||||||
|
mv config.h.new config.h
|
||||||
|
|
||||||
|
sed 's|CRYPTOPP_VERSION 820|CRYPTOPP_VERSION 810|g' config.h > config.h.new
|
||||||
mv config.h.new config.h
|
mv config.h.new config.h
|
||||||
|
@ -26,7 +26,7 @@ trap cleanup EXIT
|
|||||||
############################################
|
############################################
|
||||||
# Tags to test
|
# Tags to test
|
||||||
|
|
||||||
OLD_VERSION_TAG=CRYPTOPP_8_0_0
|
OLD_VERSION_TAG=CRYPTOPP_8_1_0
|
||||||
NEW_VERSION_TAG=master
|
NEW_VERSION_TAG=master
|
||||||
|
|
||||||
############################################
|
############################################
|
||||||
|
@ -49,6 +49,7 @@ Test: TestVectors/sha.txt
|
|||||||
Test: TestVectors/simeck.txt
|
Test: TestVectors/simeck.txt
|
||||||
Test: TestVectors/simon.txt
|
Test: TestVectors/simon.txt
|
||||||
Test: TestVectors/siphash.txt
|
Test: TestVectors/siphash.txt
|
||||||
|
Test: TestVectors/skipjack.txt
|
||||||
Test: TestVectors/sm3.txt
|
Test: TestVectors/sm3.txt
|
||||||
Test: TestVectors/sm4.txt
|
Test: TestVectors/sm4.txt
|
||||||
Test: TestVectors/sosemanuk.txt
|
Test: TestVectors/sosemanuk.txt
|
||||||
|
1046
vendor/cryptopp/vendor_cryptopp/TestVectors/skipjack.txt
vendored
Normal file
1046
vendor/cryptopp/vendor_cryptopp/TestVectors/skipjack.txt
vendored
Normal file
File diff suppressed because it is too large
Load Diff
42
vendor/cryptopp/vendor_cryptopp/blake2.cpp
vendored
42
vendor/cryptopp/vendor_cryptopp/blake2.cpp
vendored
@ -38,8 +38,8 @@
|
|||||||
// https://github.com/weidai11/cryptopp/issues/743
|
// https://github.com/weidai11/cryptopp/issues/743
|
||||||
#if defined(__xlC__) && (__xlC__ < 0x0d01)
|
#if defined(__xlC__) && (__xlC__ < 0x0d01)
|
||||||
# define CRYPTOPP_DISABLE_ALTIVEC 1
|
# define CRYPTOPP_DISABLE_ALTIVEC 1
|
||||||
# define CRYPTOPP_POWER7_ALTIVEC 1
|
|
||||||
# undef CRYPTOPP_POWER7_AVAILABLE
|
# undef CRYPTOPP_POWER7_AVAILABLE
|
||||||
|
# undef CRYPTOPP_POWER8_AVAILABLE
|
||||||
# undef CRYPTOPP_ALTIVEC_AVAILABLE
|
# undef CRYPTOPP_ALTIVEC_AVAILABLE
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@ -171,8 +171,8 @@ extern void BLAKE2_Compress32_NEON(const byte* input, BLAKE2s_State& state);
|
|||||||
extern void BLAKE2_Compress64_NEON(const byte* input, BLAKE2b_State& state);
|
extern void BLAKE2_Compress64_NEON(const byte* input, BLAKE2b_State& state);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if CRYPTOPP_POWER7_AVAILABLE
|
#if CRYPTOPP_POWER8_AVAILABLE
|
||||||
extern void BLAKE2_Compress32_POWER7(const byte* input, BLAKE2s_State& state);
|
extern void BLAKE2_Compress32_POWER8(const byte* input, BLAKE2s_State& state);
|
||||||
#elif CRYPTOPP_ALTIVEC_AVAILABLE
|
#elif CRYPTOPP_ALTIVEC_AVAILABLE
|
||||||
extern void BLAKE2_Compress32_ALTIVEC(const byte* input, BLAKE2s_State& state);
|
extern void BLAKE2_Compress32_ALTIVEC(const byte* input, BLAKE2s_State& state);
|
||||||
#endif
|
#endif
|
||||||
@ -233,8 +233,8 @@ unsigned int BLAKE2s::OptimalDataAlignment() const
|
|||||||
return 4;
|
return 4;
|
||||||
else
|
else
|
||||||
#endif
|
#endif
|
||||||
#if (CRYPTOPP_POWER7_AVAILABLE)
|
#if (CRYPTOPP_POWER8_AVAILABLE)
|
||||||
if (HasPower7())
|
if (HasPower8())
|
||||||
return 16;
|
return 16;
|
||||||
else
|
else
|
||||||
#elif (CRYPTOPP_ALTIVEC_AVAILABLE)
|
#elif (CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||||
@ -257,9 +257,9 @@ std::string BLAKE2s::AlgorithmProvider() const
|
|||||||
return "NEON";
|
return "NEON";
|
||||||
else
|
else
|
||||||
#endif
|
#endif
|
||||||
#if (CRYPTOPP_POWER7_AVAILABLE)
|
#if (CRYPTOPP_POWER8_AVAILABLE)
|
||||||
if (HasPower7())
|
if (HasPower8())
|
||||||
return "Power7";
|
return "Power8";
|
||||||
else
|
else
|
||||||
#elif (CRYPTOPP_ALTIVEC_AVAILABLE)
|
#elif (CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||||
if (HasAltivec())
|
if (HasAltivec())
|
||||||
@ -343,6 +343,26 @@ BLAKE2b::BLAKE2b(bool treeMode, unsigned int digestSize)
|
|||||||
(Name::TreeMode(), treeMode));
|
(Name::TreeMode(), treeMode));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
BLAKE2s::BLAKE2s(unsigned int digestSize)
|
||||||
|
: m_digestSize(digestSize), m_keyLength(0), m_treeMode(false)
|
||||||
|
{
|
||||||
|
CRYPTOPP_ASSERT(digestSize <= DIGESTSIZE);
|
||||||
|
|
||||||
|
UncheckedSetKey(NULLPTR, 0, MakeParameters
|
||||||
|
(Name::DigestSize(), (int)digestSize)
|
||||||
|
(Name::TreeMode(), false));
|
||||||
|
}
|
||||||
|
|
||||||
|
BLAKE2b::BLAKE2b(unsigned int digestSize)
|
||||||
|
: m_digestSize(digestSize), m_keyLength(0), m_treeMode(false)
|
||||||
|
{
|
||||||
|
CRYPTOPP_ASSERT(digestSize <= DIGESTSIZE);
|
||||||
|
|
||||||
|
UncheckedSetKey(NULLPTR, 0, MakeParameters
|
||||||
|
(Name::DigestSize(), (int)digestSize)
|
||||||
|
(Name::TreeMode(), false));
|
||||||
|
}
|
||||||
|
|
||||||
BLAKE2s::BLAKE2s(const byte *key, size_t keyLength, const byte* salt, size_t saltLength,
|
BLAKE2s::BLAKE2s(const byte *key, size_t keyLength, const byte* salt, size_t saltLength,
|
||||||
const byte* personalization, size_t personalizationLength, bool treeMode, unsigned int digestSize)
|
const byte* personalization, size_t personalizationLength, bool treeMode, unsigned int digestSize)
|
||||||
: m_digestSize(digestSize), m_keyLength(static_cast<unsigned int>(keyLength)), m_treeMode(treeMode)
|
: m_digestSize(digestSize), m_keyLength(static_cast<unsigned int>(keyLength)), m_treeMode(treeMode)
|
||||||
@ -670,10 +690,10 @@ void BLAKE2s::Compress(const byte *input)
|
|||||||
return BLAKE2_Compress32_NEON(input, m_state);
|
return BLAKE2_Compress32_NEON(input, m_state);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
#if CRYPTOPP_POWER7_AVAILABLE
|
#if CRYPTOPP_POWER8_AVAILABLE
|
||||||
if(HasPower7())
|
if(HasPower8())
|
||||||
{
|
{
|
||||||
return BLAKE2_Compress32_POWER7(input, m_state);
|
return BLAKE2_Compress32_POWER8(input, m_state);
|
||||||
}
|
}
|
||||||
#elif CRYPTOPP_ALTIVEC_AVAILABLE
|
#elif CRYPTOPP_ALTIVEC_AVAILABLE
|
||||||
if(HasAltivec())
|
if(HasAltivec())
|
||||||
|
22
vendor/cryptopp/vendor_cryptopp/blake2.h
vendored
22
vendor/cryptopp/vendor_cryptopp/blake2.h
vendored
@ -256,17 +256,25 @@ public:
|
|||||||
/// \brief Construct a BLAKE2s hash
|
/// \brief Construct a BLAKE2s hash
|
||||||
/// \param digestSize the digest size, in bytes
|
/// \param digestSize the digest size, in bytes
|
||||||
/// \param treeMode flag indicating tree mode
|
/// \param treeMode flag indicating tree mode
|
||||||
|
/// \since Crypto++ 5.6.4
|
||||||
BLAKE2s(bool treeMode=false, unsigned int digestSize = DIGESTSIZE);
|
BLAKE2s(bool treeMode=false, unsigned int digestSize = DIGESTSIZE);
|
||||||
|
|
||||||
|
/// \brief Construct a BLAKE2s hash
|
||||||
|
/// \param digestSize the digest size, in bytes
|
||||||
|
/// \details treeMode flag is set to false
|
||||||
|
/// \since Crypto++ 8.2
|
||||||
|
BLAKE2s(unsigned int digestSize);
|
||||||
|
|
||||||
/// \brief Construct a BLAKE2s hash
|
/// \brief Construct a BLAKE2s hash
|
||||||
/// \param key a byte array used to key the cipher
|
/// \param key a byte array used to key the cipher
|
||||||
/// \param keyLength the size of the byte array
|
/// \param keyLength the size of the byte array
|
||||||
/// \param salt a byte array used as salt
|
/// \param salt a byte array used as salt
|
||||||
/// \param saltLength the size of the byte array
|
/// \param saltLength the size of the byte array
|
||||||
/// \param personalization a byte array used as prsonalization string
|
/// \param personalization a byte array used as personalization string
|
||||||
/// \param personalizationLength the size of the byte array
|
/// \param personalizationLength the size of the byte array
|
||||||
/// \param treeMode flag indicating tree mode
|
/// \param treeMode flag indicating tree mode
|
||||||
/// \param digestSize the digest size, in bytes
|
/// \param digestSize the digest size, in bytes
|
||||||
|
/// \since Crypto++ 5.6.4
|
||||||
BLAKE2s(const byte *key, size_t keyLength, const byte* salt = NULLPTR, size_t saltLength = 0,
|
BLAKE2s(const byte *key, size_t keyLength, const byte* salt = NULLPTR, size_t saltLength = 0,
|
||||||
const byte* personalization = NULLPTR, size_t personalizationLength = 0,
|
const byte* personalization = NULLPTR, size_t personalizationLength = 0,
|
||||||
bool treeMode=false, unsigned int digestSize = DIGESTSIZE);
|
bool treeMode=false, unsigned int digestSize = DIGESTSIZE);
|
||||||
@ -278,6 +286,7 @@ public:
|
|||||||
/// Message Authentication Code (MAC)</A>. For example, "BLAKE2b-512" and "BLAKE2s-256".
|
/// Message Authentication Code (MAC)</A>. For example, "BLAKE2b-512" and "BLAKE2s-256".
|
||||||
std::string AlgorithmName() const {return std::string(BLAKE2s_Info::StaticAlgorithmName()) + "-" + IntToString(DigestSize()*8);}
|
std::string AlgorithmName() const {return std::string(BLAKE2s_Info::StaticAlgorithmName()) + "-" + IntToString(DigestSize()*8);}
|
||||||
|
|
||||||
|
unsigned int BlockSize() const {return BLOCKSIZE;}
|
||||||
unsigned int DigestSize() const {return m_digestSize;}
|
unsigned int DigestSize() const {return m_digestSize;}
|
||||||
unsigned int OptimalDataAlignment() const;
|
unsigned int OptimalDataAlignment() const;
|
||||||
|
|
||||||
@ -354,17 +363,25 @@ public:
|
|||||||
/// \brief Construct a BLAKE2b hash
|
/// \brief Construct a BLAKE2b hash
|
||||||
/// \param digestSize the digest size, in bytes
|
/// \param digestSize the digest size, in bytes
|
||||||
/// \param treeMode flag indicating tree mode
|
/// \param treeMode flag indicating tree mode
|
||||||
|
/// \since Crypto++ 5.6.4
|
||||||
BLAKE2b(bool treeMode=false, unsigned int digestSize = DIGESTSIZE);
|
BLAKE2b(bool treeMode=false, unsigned int digestSize = DIGESTSIZE);
|
||||||
|
|
||||||
|
/// \brief Construct a BLAKE2s hash
|
||||||
|
/// \param digestSize the digest size, in bytes
|
||||||
|
/// \details treeMode flag is set to false
|
||||||
|
/// \since Crypto++ 8.2
|
||||||
|
BLAKE2b(unsigned int digestSize);
|
||||||
|
|
||||||
/// \brief Construct a BLAKE2b hash
|
/// \brief Construct a BLAKE2b hash
|
||||||
/// \param key a byte array used to key the cipher
|
/// \param key a byte array used to key the cipher
|
||||||
/// \param keyLength the size of the byte array
|
/// \param keyLength the size of the byte array
|
||||||
/// \param salt a byte array used as salt
|
/// \param salt a byte array used as salt
|
||||||
/// \param saltLength the size of the byte array
|
/// \param saltLength the size of the byte array
|
||||||
/// \param personalization a byte array used as prsonalization string
|
/// \param personalization a byte array used as personalization string
|
||||||
/// \param personalizationLength the size of the byte array
|
/// \param personalizationLength the size of the byte array
|
||||||
/// \param treeMode flag indicating tree mode
|
/// \param treeMode flag indicating tree mode
|
||||||
/// \param digestSize the digest size, in bytes
|
/// \param digestSize the digest size, in bytes
|
||||||
|
/// \since Crypto++ 5.6.4
|
||||||
BLAKE2b(const byte *key, size_t keyLength, const byte* salt = NULLPTR, size_t saltLength = 0,
|
BLAKE2b(const byte *key, size_t keyLength, const byte* salt = NULLPTR, size_t saltLength = 0,
|
||||||
const byte* personalization = NULLPTR, size_t personalizationLength = 0,
|
const byte* personalization = NULLPTR, size_t personalizationLength = 0,
|
||||||
bool treeMode=false, unsigned int digestSize = DIGESTSIZE);
|
bool treeMode=false, unsigned int digestSize = DIGESTSIZE);
|
||||||
@ -376,6 +393,7 @@ public:
|
|||||||
/// Message Authentication Code (MAC)</A>. For example, "BLAKE2b-512" and "BLAKE2s-256".
|
/// Message Authentication Code (MAC)</A>. For example, "BLAKE2b-512" and "BLAKE2s-256".
|
||||||
std::string AlgorithmName() const {return std::string(BLAKE2b_Info::StaticAlgorithmName()) + "-" + IntToString(DigestSize()*8);}
|
std::string AlgorithmName() const {return std::string(BLAKE2b_Info::StaticAlgorithmName()) + "-" + IntToString(DigestSize()*8);}
|
||||||
|
|
||||||
|
unsigned int BlockSize() const {return BLOCKSIZE;}
|
||||||
unsigned int DigestSize() const {return m_digestSize;}
|
unsigned int DigestSize() const {return m_digestSize;}
|
||||||
unsigned int OptimalDataAlignment() const;
|
unsigned int OptimalDataAlignment() const;
|
||||||
|
|
||||||
|
@ -29,6 +29,7 @@
|
|||||||
#if defined(__xlC__) && (__xlC__ < 0x0d01)
|
#if defined(__xlC__) && (__xlC__ < 0x0d01)
|
||||||
# define CRYPTOPP_DISABLE_ALTIVEC 1
|
# define CRYPTOPP_DISABLE_ALTIVEC 1
|
||||||
# undef CRYPTOPP_POWER7_AVAILABLE
|
# undef CRYPTOPP_POWER7_AVAILABLE
|
||||||
|
# undef CRYPTOPP_POWER8_AVAILABLE
|
||||||
# undef CRYPTOPP_ALTIVEC_AVAILABLE
|
# undef CRYPTOPP_ALTIVEC_AVAILABLE
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
12
vendor/cryptopp/vendor_cryptopp/blake2s_simd.cpp
vendored
12
vendor/cryptopp/vendor_cryptopp/blake2s_simd.cpp
vendored
@ -38,8 +38,8 @@
|
|||||||
// https://github.com/weidai11/cryptopp/issues/743
|
// https://github.com/weidai11/cryptopp/issues/743
|
||||||
#if defined(__xlC__) && (__xlC__ < 0x0d01)
|
#if defined(__xlC__) && (__xlC__ < 0x0d01)
|
||||||
# define CRYPTOPP_DISABLE_ALTIVEC 1
|
# define CRYPTOPP_DISABLE_ALTIVEC 1
|
||||||
# define CRYPTOPP_POWER7_ALTIVEC 1
|
|
||||||
# undef CRYPTOPP_POWER7_AVAILABLE
|
# undef CRYPTOPP_POWER7_AVAILABLE
|
||||||
|
# undef CRYPTOPP_POWER8_AVAILABLE
|
||||||
# undef CRYPTOPP_ALTIVEC_AVAILABLE
|
# undef CRYPTOPP_ALTIVEC_AVAILABLE
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@ -692,7 +692,7 @@ void BLAKE2_Compress32_NEON(const byte* input, BLAKE2s_State& state)
|
|||||||
}
|
}
|
||||||
#endif // CRYPTOPP_ARM_NEON_AVAILABLE
|
#endif // CRYPTOPP_ARM_NEON_AVAILABLE
|
||||||
|
|
||||||
#if (CRYPTOPP_POWER7_AVAILABLE || CRYPTOPP_ALTIVEC_AVAILABLE)
|
#if (CRYPTOPP_POWER8_AVAILABLE || CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||||
|
|
||||||
inline uint32x4_p VecLoad32(const void* p)
|
inline uint32x4_p VecLoad32(const void* p)
|
||||||
{
|
{
|
||||||
@ -838,7 +838,7 @@ inline uint32x4_p VectorSet32(const uint32x4_p a, const uint32x4_p b,
|
|||||||
const uint32x4_p t0 = VectorSet32<W,X>(a, b);
|
const uint32x4_p t0 = VectorSet32<W,X>(a, b);
|
||||||
const uint32x4_p t1 = VectorSet32<Y,Z>(c, d);
|
const uint32x4_p t1 = VectorSet32<Y,Z>(c, d);
|
||||||
|
|
||||||
// Power7 follows SSE2's implementation, and this is _mm_set_epi32.
|
// PowerPC follows SSE2's implementation, and this is _mm_set_epi32.
|
||||||
const uint8x16_p mask = {20,21,22,23, 16,17,18,19, 4,5,6,7, 0,1,2,3};
|
const uint8x16_p mask = {20,21,22,23, 16,17,18,19, 4,5,6,7, 0,1,2,3};
|
||||||
return VecPermute(t0, t1, mask);
|
return VecPermute(t0, t1, mask);
|
||||||
}
|
}
|
||||||
@ -1015,11 +1015,11 @@ void BLAKE2_Compress32_CORE(const byte* input, BLAKE2s_State& state)
|
|||||||
VecStore32LE(state.h()+0, VecXor(ff0, VecXor(row1, row3)));
|
VecStore32LE(state.h()+0, VecXor(ff0, VecXor(row1, row3)));
|
||||||
VecStore32LE(state.h()+4, VecXor(ff1, VecXor(row2, row4)));
|
VecStore32LE(state.h()+4, VecXor(ff1, VecXor(row2, row4)));
|
||||||
}
|
}
|
||||||
#endif // CRYPTOPP_POWER7_AVAILABLE || CRYPTOPP_ALTIVEC_AVAILABLE
|
#endif // CRYPTOPP_POWER8_AVAILABLE || CRYPTOPP_ALTIVEC_AVAILABLE
|
||||||
|
|
||||||
#if (CRYPTOPP_POWER7_AVAILABLE)
|
#if (CRYPTOPP_POWER8_AVAILABLE)
|
||||||
|
|
||||||
void BLAKE2_Compress32_POWER7(const byte* input, BLAKE2s_State& state)
|
void BLAKE2_Compress32_POWER8(const byte* input, BLAKE2s_State& state)
|
||||||
{
|
{
|
||||||
BLAKE2_Compress32_CORE(input, state);
|
BLAKE2_Compress32_CORE(input, state);
|
||||||
}
|
}
|
||||||
|
16
vendor/cryptopp/vendor_cryptopp/chacha.cpp
vendored
16
vendor/cryptopp/vendor_cryptopp/chacha.cpp
vendored
@ -28,8 +28,8 @@ extern void ChaCha_OperateKeystream_AVX2(const word32 *state, const byte* input,
|
|||||||
extern void ChaCha_OperateKeystream_SSE2(const word32 *state, const byte* input, byte *output, unsigned int rounds);
|
extern void ChaCha_OperateKeystream_SSE2(const word32 *state, const byte* input, byte *output, unsigned int rounds);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if (CRYPTOPP_POWER7_AVAILABLE)
|
#if (CRYPTOPP_POWER8_AVAILABLE)
|
||||||
extern void ChaCha_OperateKeystream_POWER7(const word32 *state, const byte* input, byte *output, unsigned int rounds);
|
extern void ChaCha_OperateKeystream_POWER8(const word32 *state, const byte* input, byte *output, unsigned int rounds);
|
||||||
#elif (CRYPTOPP_ALTIVEC_AVAILABLE)
|
#elif (CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||||
extern void ChaCha_OperateKeystream_ALTIVEC(const word32 *state, const byte* input, byte *output, unsigned int rounds);
|
extern void ChaCha_OperateKeystream_ALTIVEC(const word32 *state, const byte* input, byte *output, unsigned int rounds);
|
||||||
#endif
|
#endif
|
||||||
@ -153,13 +153,13 @@ void ChaCha_OperateKeystream(KeystreamOperation operation,
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if (CRYPTOPP_POWER7_AVAILABLE)
|
#if (CRYPTOPP_POWER8_AVAILABLE)
|
||||||
if (HasPower7())
|
if (HasPower8())
|
||||||
{
|
{
|
||||||
while (iterationCount >= 4 && MultiBlockSafe(state[12], 4))
|
while (iterationCount >= 4 && MultiBlockSafe(state[12], 4))
|
||||||
{
|
{
|
||||||
const bool xorInput = (operation & INPUT_NULL) != INPUT_NULL;
|
const bool xorInput = (operation & INPUT_NULL) != INPUT_NULL;
|
||||||
ChaCha_OperateKeystream_POWER7(state, xorInput ? input : NULLPTR, output, rounds);
|
ChaCha_OperateKeystream_POWER8(state, xorInput ? input : NULLPTR, output, rounds);
|
||||||
|
|
||||||
// MultiBlockSafe avoids overflow on the counter words
|
// MultiBlockSafe avoids overflow on the counter words
|
||||||
state[12] += 4;
|
state[12] += 4;
|
||||||
@ -267,9 +267,9 @@ std::string ChaCha_AlgorithmProvider()
|
|||||||
return "NEON";
|
return "NEON";
|
||||||
else
|
else
|
||||||
#endif
|
#endif
|
||||||
#if (CRYPTOPP_POWER7_AVAILABLE)
|
#if (CRYPTOPP_POWER8_AVAILABLE)
|
||||||
if (HasPower7())
|
if (HasPower8())
|
||||||
return "Power7";
|
return "Power8";
|
||||||
else
|
else
|
||||||
#elif (CRYPTOPP_ALTIVEC_AVAILABLE)
|
#elif (CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||||
if (HasAltivec())
|
if (HasAltivec())
|
||||||
|
10
vendor/cryptopp/vendor_cryptopp/chacha_simd.cpp
vendored
10
vendor/cryptopp/vendor_cryptopp/chacha_simd.cpp
vendored
@ -209,7 +209,7 @@ inline __m128i RotateLeft<16>(const __m128i val)
|
|||||||
|
|
||||||
#if (CRYPTOPP_ALTIVEC_AVAILABLE)
|
#if (CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||||
|
|
||||||
// ChaCha_OperateKeystream_POWER7 is optimized for POWER7. However, Altivec
|
// ChaCha_OperateKeystream_POWER8 is optimized for POWER7. However, Altivec
|
||||||
// is supported by using vec_ld and vec_st, and using a composite VecAdd
|
// is supported by using vec_ld and vec_st, and using a composite VecAdd
|
||||||
// that supports 64-bit element adds. vec_ld and vec_st add significant
|
// that supports 64-bit element adds. vec_ld and vec_st add significant
|
||||||
// overhead when memory is not aligned. Despite the drawbacks Altivec
|
// overhead when memory is not aligned. Despite the drawbacks Altivec
|
||||||
@ -827,7 +827,7 @@ void ChaCha_OperateKeystream_SSE2(const word32 *state, const byte* input, byte *
|
|||||||
|
|
||||||
#endif // CRYPTOPP_SSE2_INTRIN_AVAILABLE
|
#endif // CRYPTOPP_SSE2_INTRIN_AVAILABLE
|
||||||
|
|
||||||
#if (CRYPTOPP_POWER7_AVAILABLE || CRYPTOPP_ALTIVEC_AVAILABLE)
|
#if (CRYPTOPP_POWER8_AVAILABLE || CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||||
|
|
||||||
// ChaCha_OperateKeystream_CORE will use either POWER7 or ALTIVEC,
|
// ChaCha_OperateKeystream_CORE will use either POWER7 or ALTIVEC,
|
||||||
// depending on the flags used to compile this source file. The
|
// depending on the flags used to compile this source file. The
|
||||||
@ -1096,11 +1096,11 @@ inline void ChaCha_OperateKeystream_CORE(const word32 *state, const byte* input,
|
|||||||
VecStore32LE(output + 15*16, r3_3);
|
VecStore32LE(output + 15*16, r3_3);
|
||||||
}
|
}
|
||||||
|
|
||||||
#endif // CRYPTOPP_POWER7_AVAILABLE || CRYPTOPP_ALTIVEC_AVAILABLE
|
#endif // CRYPTOPP_POWER8_AVAILABLE || CRYPTOPP_ALTIVEC_AVAILABLE
|
||||||
|
|
||||||
#if (CRYPTOPP_POWER7_AVAILABLE)
|
#if (CRYPTOPP_POWER8_AVAILABLE)
|
||||||
|
|
||||||
void ChaCha_OperateKeystream_POWER7(const word32 *state, const byte* input, byte *output, unsigned int rounds)
|
void ChaCha_OperateKeystream_POWER8(const word32 *state, const byte* input, byte *output, unsigned int rounds)
|
||||||
{
|
{
|
||||||
ChaCha_OperateKeystream_CORE(state, input, output, rounds);
|
ChaCha_OperateKeystream_CORE(state, input, output, rounds);
|
||||||
}
|
}
|
||||||
|
23
vendor/cryptopp/vendor_cryptopp/config.h
vendored
23
vendor/cryptopp/vendor_cryptopp/config.h
vendored
@ -74,24 +74,6 @@
|
|||||||
// Also see https://bugs.llvm.org/show_bug.cgi?id=39895 .
|
// Also see https://bugs.llvm.org/show_bug.cgi?id=39895 .
|
||||||
// #define CRYPTOPP_DISABLE_MIXED_ASM 1
|
// #define CRYPTOPP_DISABLE_MIXED_ASM 1
|
||||||
|
|
||||||
// Several compilers discard SIMD code that loads unaligned data. The symptom
|
|
||||||
// is often self test failures and UBsan findings for unaligned loads. For
|
|
||||||
// example, Power7 can load unaligned data using vec_vsx_ld but some versions
|
|
||||||
// of GCC and Clang require 16-byte aligned data when using the builtin.
|
|
||||||
// It is not limited to SSE and PowerPC code. Define this to disable
|
|
||||||
// Crypto++ code that uses potentially problematic builtins or intrinsics.
|
|
||||||
// Also see https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88234 and
|
|
||||||
// https://bugs.llvm.org/show_bug.cgi?id=39704
|
|
||||||
// #define CRYPTOPP_BUGGY_SIMD_LOAD_AND_STORE 1
|
|
||||||
|
|
||||||
// This list will probably grow over time as more compilers are identified.
|
|
||||||
#if defined(CRYPTOPP_BUGGY_SIMD_LOAD_AND_STORE)
|
|
||||||
# define CRYPTOPP_DISABLE_LEA_SIMD 1
|
|
||||||
# define CRYPTOPP_DISABLE_SIMON_SIMD 1
|
|
||||||
# define CRYPTOPP_DISABLE_SPECK_SIMD 1
|
|
||||||
# define CRYPTOPP_DISABLE_SM4_SIMD 1
|
|
||||||
#endif
|
|
||||||
|
|
||||||
// Define CRYPTOPP_NO_CXX11 to avoid C++11 related features shown at the
|
// Define CRYPTOPP_NO_CXX11 to avoid C++11 related features shown at the
|
||||||
// end of this file. Some compilers and standard C++ headers advertise C++11
|
// end of this file. Some compilers and standard C++ headers advertise C++11
|
||||||
// but they are really just C++03 with some additional C++11 headers and
|
// but they are really just C++03 with some additional C++11 headers and
|
||||||
@ -116,7 +98,10 @@
|
|||||||
// the version of the library the headers came from. It is not
|
// the version of the library the headers came from. It is not
|
||||||
// necessarily the version of the library built as a shared object if
|
// necessarily the version of the library built as a shared object if
|
||||||
// versions are inadvertently mixed and matched.
|
// versions are inadvertently mixed and matched.
|
||||||
#define CRYPTOPP_VERSION 810
|
#define CRYPTOPP_MAJOR 8
|
||||||
|
#define CRYPTOPP_MINOR 2
|
||||||
|
#define CRYPTOPP_REVISION 0
|
||||||
|
#define CRYPTOPP_VERSION 820
|
||||||
|
|
||||||
// Define this if you want to set a prefix for TestData/ and TestVectors/
|
// Define this if you want to set a prefix for TestData/ and TestVectors/
|
||||||
// Be sure to add the trailing slash since its simple concatenation.
|
// Be sure to add the trailing slash since its simple concatenation.
|
||||||
|
4
vendor/cryptopp/vendor_cryptopp/cpu.cpp
vendored
4
vendor/cryptopp/vendor_cryptopp/cpu.cpp
vendored
@ -341,8 +341,8 @@ void DetectX86Features()
|
|||||||
word64 xcr0 = a | static_cast<word64>(d) << 32;
|
word64 xcr0 = a | static_cast<word64>(d) << 32;
|
||||||
g_hasAVX = (xcr0 & YMM_FLAG) == YMM_FLAG;
|
g_hasAVX = (xcr0 & YMM_FLAG) == YMM_FLAG;
|
||||||
|
|
||||||
// Visual Studio 2008 and below lack xgetbv
|
// Visual Studio 2010 and below lack xgetbv
|
||||||
#elif defined(_MSC_VER) && _MSC_VER <= 1500 && defined(_M_IX86)
|
#elif defined(_MSC_VER) && _MSC_VER <= 1600 && defined(_M_IX86)
|
||||||
word32 a=0, d=0;
|
word32 a=0, d=0;
|
||||||
__asm {
|
__asm {
|
||||||
push eax
|
push eax
|
||||||
|
@ -212,6 +212,7 @@
|
|||||||
<ClCompile Include="gcm.cpp" />
|
<ClCompile Include="gcm.cpp" />
|
||||||
<ClCompile Include="gcm_simd.cpp" />
|
<ClCompile Include="gcm_simd.cpp" />
|
||||||
<ClCompile Include="gf2n.cpp" />
|
<ClCompile Include="gf2n.cpp" />
|
||||||
|
<ClCompile Include="gf2n_simd.cpp" />
|
||||||
<ClCompile Include="gfpcrypt.cpp" />
|
<ClCompile Include="gfpcrypt.cpp" />
|
||||||
<ClCompile Include="hex.cpp" />
|
<ClCompile Include="hex.cpp" />
|
||||||
<ClCompile Include="hmac.cpp" />
|
<ClCompile Include="hmac.cpp" />
|
||||||
|
@ -98,6 +98,9 @@
|
|||||||
<ClCompile Include="gf2n.cpp">
|
<ClCompile Include="gf2n.cpp">
|
||||||
<Filter>Source Files</Filter>
|
<Filter>Source Files</Filter>
|
||||||
</ClCompile>
|
</ClCompile>
|
||||||
|
<ClCompile Include="gf2n_simd.cpp">
|
||||||
|
<Filter>Source Files</Filter>
|
||||||
|
</ClCompile>
|
||||||
<ClCompile Include="gfpcrypt.cpp">
|
<ClCompile Include="gfpcrypt.cpp">
|
||||||
<Filter>Source Files</Filter>
|
<Filter>Source Files</Filter>
|
||||||
</ClCompile>
|
</ClCompile>
|
||||||
|
62
vendor/cryptopp/vendor_cryptopp/cryptest.nmake
vendored
62
vendor/cryptopp/vendor_cryptopp/cryptest.nmake
vendored
@ -69,21 +69,22 @@ LIB_SRCS = \
|
|||||||
gcm_simd.cpp gf256.cpp gf2_32.cpp gf2n.cpp gf2n_simd.cpp gfpcrypt.cpp \
|
gcm_simd.cpp gf256.cpp gf2_32.cpp gf2n.cpp gf2n_simd.cpp gfpcrypt.cpp \
|
||||||
gost.cpp gzip.cpp hc128.cpp hc256.cpp hex.cpp hight.cpp hmac.cpp \
|
gost.cpp gzip.cpp hc128.cpp hc256.cpp hex.cpp hight.cpp hmac.cpp \
|
||||||
hrtimer.cpp ida.cpp idea.cpp iterhash.cpp kalyna.cpp kalynatab.cpp \
|
hrtimer.cpp ida.cpp idea.cpp iterhash.cpp kalyna.cpp kalynatab.cpp \
|
||||||
keccak.cpp keccakc.cpp lea.cpp lea_simd.cpp luc.cpp mars.cpp marss.cpp \
|
keccak.cpp keccak_core.cpp keccak_simd.cpp lea.cpp lea_simd.cpp luc.cpp \
|
||||||
md2.cpp md4.cpp md5.cpp misc.cpp modes.cpp mqueue.cpp mqv.cpp \
|
mars.cpp marss.cpp md2.cpp md4.cpp md5.cpp misc.cpp modes.cpp mqueue.cpp \
|
||||||
nbtheory.cpp neon_simd.cpp oaep.cpp osrng.cpp padlkrng.cpp panama.cpp \
|
mqv.cpp nbtheory.cpp neon_simd.cpp oaep.cpp osrng.cpp padlkrng.cpp \
|
||||||
pkcspad.cpp poly1305.cpp polynomi.cpp ppc_power7.cpp ppc_power8.cpp \
|
panama.cpp pkcspad.cpp poly1305.cpp polynomi.cpp ppc_power7.cpp \
|
||||||
ppc_power9.cpp ppc_simd.cpp pssr.cpp pubkey.cpp queue.cpp rabbit.cpp \
|
ppc_power8.cpp ppc_power9.cpp ppc_simd.cpp pssr.cpp pubkey.cpp queue.cpp \
|
||||||
rabin.cpp randpool.cpp rc2.cpp rc5.cpp rc6.cpp rdrand.cpp rdtables.cpp \
|
rabbit.cpp rabin.cpp randpool.cpp rc2.cpp rc5.cpp rc6.cpp rdrand.cpp \
|
||||||
rijndael.cpp rijndael_simd.cpp ripemd.cpp rng.cpp rsa.cpp rw.cpp \
|
rdtables.cpp rijndael.cpp rijndael_simd.cpp ripemd.cpp rng.cpp rsa.cpp \
|
||||||
safer.cpp salsa.cpp scrypt.cpp seal.cpp seed.cpp serpent.cpp sha.cpp \
|
rw.cpp safer.cpp salsa.cpp scrypt.cpp seal.cpp seed.cpp serpent.cpp \
|
||||||
sha3.cpp sha_simd.cpp shacal2.cpp shacal2_simd.cpp shark.cpp sharkbox.cpp \
|
sha.cpp sha3.cpp sha_simd.cpp shacal2.cpp shacal2_simd.cpp shake.cpp \
|
||||||
simeck.cpp simeck_simd.cpp simon.cpp simon128_simd.cpp simon64_simd.cpp \
|
shark.cpp sharkbox.cpp simeck.cpp simeck_simd.cpp simon.cpp \
|
||||||
skipjack.cpp sm3.cpp sm4.cpp sm4_simd.cpp sosemanuk.cpp speck.cpp \
|
simon128_simd.cpp simon64_simd.cpp skipjack.cpp sm3.cpp sm4.cpp \
|
||||||
speck128_simd.cpp speck64_simd.cpp square.cpp squaretb.cpp sse_simd.cpp \
|
sm4_simd.cpp sosemanuk.cpp speck.cpp speck128_simd.cpp speck64_simd.cpp \
|
||||||
strciphr.cpp tea.cpp tftables.cpp threefish.cpp tiger.cpp tigertab.cpp \
|
square.cpp squaretb.cpp sse_simd.cpp strciphr.cpp tea.cpp tftables.cpp \
|
||||||
ttmac.cpp tweetnacl.cpp twofish.cpp vmac.cpp wake.cpp whrlpool.cpp \
|
threefish.cpp tiger.cpp tigertab.cpp ttmac.cpp tweetnacl.cpp twofish.cpp \
|
||||||
xed25519.cpp xtr.cpp xtrcrypt.cpp zdeflate.cpp zinflate.cpp zlib.cpp
|
vmac.cpp wake.cpp whrlpool.cpp xed25519.cpp xtr.cpp xtrcrypt.cpp \
|
||||||
|
zdeflate.cpp zinflate.cpp zlib.cpp
|
||||||
|
|
||||||
LIB_OBJS = \
|
LIB_OBJS = \
|
||||||
cryptlib.obj cpu.obj integer.obj 3way.obj adler32.obj algebra.obj \
|
cryptlib.obj cpu.obj integer.obj 3way.obj adler32.obj algebra.obj \
|
||||||
@ -99,21 +100,22 @@ LIB_OBJS = \
|
|||||||
gcm_simd.obj gf256.obj gf2_32.obj gf2n.obj gf2n_simd.obj gfpcrypt.obj \
|
gcm_simd.obj gf256.obj gf2_32.obj gf2n.obj gf2n_simd.obj gfpcrypt.obj \
|
||||||
gost.obj gzip.obj hc128.obj hc256.obj hex.obj hight.obj hmac.obj \
|
gost.obj gzip.obj hc128.obj hc256.obj hex.obj hight.obj hmac.obj \
|
||||||
hrtimer.obj ida.obj idea.obj iterhash.obj kalyna.obj kalynatab.obj \
|
hrtimer.obj ida.obj idea.obj iterhash.obj kalyna.obj kalynatab.obj \
|
||||||
keccak.obj keccakc.obj lea.obj lea_simd.obj luc.obj mars.obj marss.obj \
|
keccak.obj keccak_core.obj keccak_simd.obj lea.obj lea_simd.obj luc.obj \
|
||||||
md2.obj md4.obj md5.obj misc.obj modes.obj mqueue.obj mqv.obj \
|
mars.obj marss.obj md2.obj md4.obj md5.obj misc.obj modes.obj mqueue.obj \
|
||||||
nbtheory.obj neon_simd.obj oaep.obj osrng.obj padlkrng.obj panama.obj \
|
mqv.obj nbtheory.obj neon_simd.obj oaep.obj osrng.obj padlkrng.obj \
|
||||||
pkcspad.obj poly1305.obj polynomi.obj ppc_power7.obj ppc_power8.obj \
|
panama.obj pkcspad.obj poly1305.obj polynomi.obj ppc_power7.obj \
|
||||||
ppc_power9.obj ppc_simd.obj pssr.obj pubkey.obj queue.obj rabbit.obj \
|
ppc_power8.obj ppc_power9.obj ppc_simd.obj pssr.obj pubkey.obj queue.obj \
|
||||||
rabin.obj randpool.obj rc2.obj rc5.obj rc6.obj rdrand.obj rdtables.obj \
|
rabbit.obj rabin.obj randpool.obj rc2.obj rc5.obj rc6.obj rdrand.obj \
|
||||||
rijndael.obj rijndael_simd.obj ripemd.obj rng.obj rsa.obj rw.obj \
|
rdtables.obj rijndael.obj rijndael_simd.obj ripemd.obj rng.obj rsa.obj \
|
||||||
safer.obj salsa.obj scrypt.obj seal.obj seed.obj serpent.obj sha.obj \
|
rw.obj safer.obj salsa.obj scrypt.obj seal.obj seed.obj serpent.obj \
|
||||||
sha3.obj sha_simd.obj shacal2.obj shacal2_simd.obj shark.obj sharkbox.obj \
|
sha.obj sha3.obj sha_simd.obj shacal2.obj shacal2_simd.obj shake.obj \
|
||||||
simeck.obj simeck_simd.obj simon.obj simon128_simd.obj simon64_simd.obj \
|
shark.obj sharkbox.obj simeck.obj simeck_simd.obj simon.obj \
|
||||||
skipjack.obj sm3.obj sm4.obj sm4_simd.obj sosemanuk.obj speck.obj \
|
simon128_simd.obj simon64_simd.obj skipjack.obj sm3.obj sm4.obj \
|
||||||
speck128_simd.obj speck64_simd.obj square.obj squaretb.obj sse_simd.obj \
|
sm4_simd.obj sosemanuk.obj speck.obj speck128_simd.obj speck64_simd.obj \
|
||||||
strciphr.obj tea.obj tftables.obj threefish.obj tiger.obj tigertab.obj \
|
square.obj squaretb.obj sse_simd.obj strciphr.obj tea.obj tftables.obj \
|
||||||
ttmac.obj tweetnacl.obj twofish.obj vmac.obj wake.obj whrlpool.obj \
|
threefish.obj tiger.obj tigertab.obj ttmac.obj tweetnacl.obj twofish.obj \
|
||||||
xed25519.obj xtr.obj xtrcrypt.obj zdeflate.obj zinflate.obj zlib.obj
|
vmac.obj wake.obj whrlpool.obj xed25519.obj xtr.obj xtrcrypt.obj \
|
||||||
|
zdeflate.obj zinflate.obj zlib.obj
|
||||||
|
|
||||||
ASM_OBJS = \
|
ASM_OBJS = \
|
||||||
rdrand-x86.obj rdrand-x64.obj x64masm.obj x64dll.obj
|
rdrand-x86.obj rdrand-x64.obj x64masm.obj x64dll.obj
|
||||||
|
2
vendor/cryptopp/vendor_cryptopp/cryptlib.h
vendored
2
vendor/cryptopp/vendor_cryptopp/cryptlib.h
vendored
@ -3,7 +3,7 @@
|
|||||||
/// \file cryptlib.h
|
/// \file cryptlib.h
|
||||||
/// \brief Abstract base classes that provide a uniform interface to this library.
|
/// \brief Abstract base classes that provide a uniform interface to this library.
|
||||||
|
|
||||||
/*! \mainpage Crypto++ Library 8.1 API Reference
|
/*! \mainpage Crypto++ Library 8.2 API Reference
|
||||||
<dl>
|
<dl>
|
||||||
<dt>Abstract Base Classes<dd>
|
<dt>Abstract Base Classes<dd>
|
||||||
cryptlib.h
|
cryptlib.h
|
||||||
|
@ -1 +1 @@
|
|||||||
include("${CMAKE_CURRENT_LIST_DIR}/cryptopp-targets.cmake")
|
include("${CMAKE_CURRENT_LIST_DIR}/cryptopp-targets.cmake")
|
||||||
|
10
vendor/cryptopp/vendor_cryptopp/cryptopp.rc
vendored
10
vendor/cryptopp/vendor_cryptopp/cryptopp.rc
vendored
@ -27,8 +27,8 @@ LANGUAGE LANG_ENGLISH, SUBLANG_ENGLISH_US
|
|||||||
//
|
//
|
||||||
|
|
||||||
VS_VERSION_INFO VERSIONINFO
|
VS_VERSION_INFO VERSIONINFO
|
||||||
FILEVERSION 8,1,0,0
|
FILEVERSION 8,2,0,0
|
||||||
PRODUCTVERSION 8,1,0,0
|
PRODUCTVERSION 8,2,0,0
|
||||||
FILEFLAGSMASK 0x3fL
|
FILEFLAGSMASK 0x3fL
|
||||||
#ifdef _DEBUG
|
#ifdef _DEBUG
|
||||||
FILEFLAGS 0x1L
|
FILEFLAGS 0x1L
|
||||||
@ -46,13 +46,13 @@ BEGIN
|
|||||||
VALUE "Comments", "Free crypto library, more information available at www.cryptopp.com"
|
VALUE "Comments", "Free crypto library, more information available at www.cryptopp.com"
|
||||||
VALUE "CompanyName", "Wei Dai"
|
VALUE "CompanyName", "Wei Dai"
|
||||||
VALUE "FileDescription", "Crypto++® Library DLL"
|
VALUE "FileDescription", "Crypto++® Library DLL"
|
||||||
VALUE "FileVersion", "8, 1, 0, 0"
|
VALUE "FileVersion", "8, 2, 0, 0"
|
||||||
VALUE "InternalName", "cryptopp"
|
VALUE "InternalName", "cryptopp"
|
||||||
VALUE "LegalCopyright", "Copyright© 1995-2018 by Wei Dai"
|
VALUE "LegalCopyright", "Copyright© 1995-2019 by Wei Dai"
|
||||||
VALUE "LegalTrademarks", "Crypto++®"
|
VALUE "LegalTrademarks", "Crypto++®"
|
||||||
VALUE "OriginalFilename", "cryptopp.dll"
|
VALUE "OriginalFilename", "cryptopp.dll"
|
||||||
VALUE "ProductName", "Crypto++® Library"
|
VALUE "ProductName", "Crypto++® Library"
|
||||||
VALUE "ProductVersion", "8, 1, 0, 0"
|
VALUE "ProductVersion", "8, 2, 0, 0"
|
||||||
END
|
END
|
||||||
END
|
END
|
||||||
BLOCK "VarFileInfo"
|
BLOCK "VarFileInfo"
|
||||||
|
29
vendor/cryptopp/vendor_cryptopp/datatest.cpp
vendored
29
vendor/cryptopp/vendor_cryptopp/datatest.cpp
vendored
@ -8,7 +8,6 @@
|
|||||||
#include "factory.h"
|
#include "factory.h"
|
||||||
#include "integer.h"
|
#include "integer.h"
|
||||||
#include "filters.h"
|
#include "filters.h"
|
||||||
#include "hex.h"
|
|
||||||
#include "randpool.h"
|
#include "randpool.h"
|
||||||
#include "files.h"
|
#include "files.h"
|
||||||
#include "trunhash.h"
|
#include "trunhash.h"
|
||||||
@ -16,6 +15,8 @@
|
|||||||
#include "smartptr.h"
|
#include "smartptr.h"
|
||||||
#include "validate.h"
|
#include "validate.h"
|
||||||
#include "stdcpp.h"
|
#include "stdcpp.h"
|
||||||
|
#include "misc.h"
|
||||||
|
#include "hex.h"
|
||||||
#include "trap.h"
|
#include "trap.h"
|
||||||
|
|
||||||
#include <iostream>
|
#include <iostream>
|
||||||
@ -208,7 +209,7 @@ void PutDecodedDatumInto(const TestData &data, const char *name, BufferedTransfo
|
|||||||
|
|
||||||
while (repeat--)
|
while (repeat--)
|
||||||
{
|
{
|
||||||
q.Put(reinterpret_cast<const byte*>(&s2[0]), s2.size());
|
q.Put(ConstBytePtr(s2), BytePtrSize(s2));
|
||||||
RandomizedTransfer(q, target, false);
|
RandomizedTransfer(q, target, false);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -265,10 +266,11 @@ public:
|
|||||||
*reinterpret_cast<int *>(pValue) = atoi(value.c_str());
|
*reinterpret_cast<int *>(pValue) = atoi(value.c_str());
|
||||||
else if (valueType == typeid(word64))
|
else if (valueType == typeid(word64))
|
||||||
{
|
{
|
||||||
std::string x(value); errno = 0;
|
std::string x(value.empty() ? "0" : value);
|
||||||
const char* beg = &x[0];
|
const char* beg = &x[0];
|
||||||
char* end = &x[0] + value.size();
|
char* end = &x[0] + value.size();
|
||||||
|
|
||||||
|
errno = 0;
|
||||||
*reinterpret_cast<word64*>(pValue) = STRTOUL64(beg, &end, 0);
|
*reinterpret_cast<word64*>(pValue) = STRTOUL64(beg, &end, 0);
|
||||||
if (errno != 0)
|
if (errno != 0)
|
||||||
return false;
|
return false;
|
||||||
@ -279,7 +281,7 @@ public:
|
|||||||
{
|
{
|
||||||
m_temp.clear();
|
m_temp.clear();
|
||||||
PutDecodedDatumInto(m_data, name, StringSink(m_temp).Ref());
|
PutDecodedDatumInto(m_data, name, StringSink(m_temp).Ref());
|
||||||
reinterpret_cast<ConstByteArrayParameter *>(pValue)->Assign(reinterpret_cast<const byte *>(&m_temp[0]), m_temp.size(), false);
|
reinterpret_cast<ConstByteArrayParameter *>(pValue)->Assign(BytePtr(m_temp), BytePtrSize(m_temp), false);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
throw ValueTypeMismatch(name, typeid(std::string), valueType);
|
throw ValueTypeMismatch(name, typeid(std::string), valueType);
|
||||||
@ -496,8 +498,8 @@ void TestSymmetricCipher(TestData &v, const NameValuePairs &overrideParameters)
|
|||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
encryptor->SetKey(reinterpret_cast<const byte*>(&key[0]), key.size(), pairs);
|
encryptor->SetKey(ConstBytePtr(key), BytePtrSize(key), pairs);
|
||||||
decryptor->SetKey(reinterpret_cast<const byte*>(&key[0]), key.size(), pairs);
|
decryptor->SetKey(ConstBytePtr(key), BytePtrSize(key), pairs);
|
||||||
}
|
}
|
||||||
|
|
||||||
word64 seek64 = pairs.GetWord64ValueWithDefault("Seek64", 0);
|
word64 seek64 = pairs.GetWord64ValueWithDefault("Seek64", 0);
|
||||||
@ -547,13 +549,13 @@ void TestSymmetricCipher(TestData &v, const NameValuePairs &overrideParameters)
|
|||||||
encrypted.reserve(10000 * plaintext.size());
|
encrypted.reserve(10000 * plaintext.size());
|
||||||
for (int j=0; j<10000; j++)
|
for (int j=0; j<10000; j++)
|
||||||
{
|
{
|
||||||
cipher->ProcessString(reinterpret_cast<byte*>(&buf[0]), buf.size());
|
cipher->ProcessString(BytePtr(buf), BytePtrSize(buf));
|
||||||
encrypted.append(buf.begin(), buf.end());
|
encrypted.append(buf.begin(), buf.end());
|
||||||
}
|
}
|
||||||
|
|
||||||
encrypted.erase(0, encrypted.size() - keybuf.size());
|
encrypted.erase(0, encrypted.size() - keybuf.size());
|
||||||
xorbuf(reinterpret_cast<byte*>(&keybuf[0]), reinterpret_cast<const byte*>(&encrypted[0]), keybuf.size());
|
xorbuf(BytePtr(keybuf), BytePtr(encrypted), BytePtrSize(keybuf));
|
||||||
cipher->SetKey(reinterpret_cast<const byte*>(&keybuf[0]), keybuf.size());
|
cipher->SetKey(BytePtr(keybuf), BytePtrSize(keybuf));
|
||||||
}
|
}
|
||||||
|
|
||||||
encrypted.assign(buf.begin(), buf.end());
|
encrypted.assign(buf.begin(), buf.end());
|
||||||
@ -641,8 +643,8 @@ void TestAuthenticatedSymmetricCipher(TestData &v, const NameValuePairs &overrid
|
|||||||
member_ptr<AuthenticatedSymmetricCipher> encryptor, decryptor;
|
member_ptr<AuthenticatedSymmetricCipher> encryptor, decryptor;
|
||||||
encryptor.reset(ObjectFactoryRegistry<AuthenticatedSymmetricCipher, ENCRYPTION>::Registry().CreateObject(name.c_str()));
|
encryptor.reset(ObjectFactoryRegistry<AuthenticatedSymmetricCipher, ENCRYPTION>::Registry().CreateObject(name.c_str()));
|
||||||
decryptor.reset(ObjectFactoryRegistry<AuthenticatedSymmetricCipher, DECRYPTION>::Registry().CreateObject(name.c_str()));
|
decryptor.reset(ObjectFactoryRegistry<AuthenticatedSymmetricCipher, DECRYPTION>::Registry().CreateObject(name.c_str()));
|
||||||
encryptor->SetKey(reinterpret_cast<const byte*>(&key[0]), key.size(), pairs);
|
encryptor->SetKey(ConstBytePtr(key), BytePtrSize(key), pairs);
|
||||||
decryptor->SetKey(reinterpret_cast<const byte*>(&key[0]), key.size(), pairs);
|
decryptor->SetKey(ConstBytePtr(key), BytePtrSize(key), pairs);
|
||||||
|
|
||||||
// Code coverage
|
// Code coverage
|
||||||
(void)encryptor->AlgorithmName();
|
(void)encryptor->AlgorithmName();
|
||||||
@ -736,7 +738,7 @@ void TestDigestOrMAC(TestData &v, bool testDigest)
|
|||||||
mac.reset(ObjectFactoryRegistry<MessageAuthenticationCode>::Registry().CreateObject(name.c_str()));
|
mac.reset(ObjectFactoryRegistry<MessageAuthenticationCode>::Registry().CreateObject(name.c_str()));
|
||||||
pHash = mac.get();
|
pHash = mac.get();
|
||||||
std::string key = GetDecodedDatum(v, "Key");
|
std::string key = GetDecodedDatum(v, "Key");
|
||||||
mac->SetKey(reinterpret_cast<const byte *>(&key[0]), key.size(), pairs);
|
mac->SetKey(ConstBytePtr(key), BytePtrSize(key), pairs);
|
||||||
|
|
||||||
// Code coverage
|
// Code coverage
|
||||||
(void)mac->AlgorithmName();
|
(void)mac->AlgorithmName();
|
||||||
@ -779,8 +781,7 @@ void TestKeyDerivationFunction(TestData &v)
|
|||||||
kdf.reset(ObjectFactoryRegistry<KeyDerivationFunction>::Registry().CreateObject(name.c_str()));
|
kdf.reset(ObjectFactoryRegistry<KeyDerivationFunction>::Registry().CreateObject(name.c_str()));
|
||||||
|
|
||||||
std::string calculated; calculated.resize(expected.size());
|
std::string calculated; calculated.resize(expected.size());
|
||||||
kdf->DeriveKey(reinterpret_cast<byte*>(&calculated[0]), calculated.size(),
|
kdf->DeriveKey(BytePtr(calculated), BytePtrSize(calculated), BytePtr(secret), BytePtrSize(secret), pairs);
|
||||||
reinterpret_cast<const byte*>(&secret[0]), secret.size(), pairs);
|
|
||||||
|
|
||||||
if(calculated != expected)
|
if(calculated != expected)
|
||||||
{
|
{
|
||||||
|
2
vendor/cryptopp/vendor_cryptopp/filters.h
vendored
2
vendor/cryptopp/vendor_cryptopp/filters.h
vendored
@ -474,7 +474,7 @@ struct BlockPaddingSchemeDef
|
|||||||
/// \brief 0's padding added to a block
|
/// \brief 0's padding added to a block
|
||||||
/// \since Crypto++ 5.0
|
/// \since Crypto++ 5.0
|
||||||
ZEROS_PADDING,
|
ZEROS_PADDING,
|
||||||
/// \brief PKCS #5 padding added to a block
|
/// \brief PKCS padding added to a block
|
||||||
/// \since Crypto++ 5.0
|
/// \since Crypto++ 5.0
|
||||||
PKCS_PADDING,
|
PKCS_PADDING,
|
||||||
/// \brief 1 and 0's padding added to a block
|
/// \brief 1 and 0's padding added to a block
|
||||||
|
22
vendor/cryptopp/vendor_cryptopp/gcm.cpp
vendored
22
vendor/cryptopp/vendor_cryptopp/gcm.cpp
vendored
@ -75,8 +75,8 @@ extern void GCM_Xor16_SSE2(byte *a, const byte *b, const byte *c);
|
|||||||
extern void GCM_Xor16_NEON(byte *a, const byte *b, const byte *c);
|
extern void GCM_Xor16_NEON(byte *a, const byte *b, const byte *c);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if CRYPTOPP_POWER7_AVAILABLE
|
#if CRYPTOPP_POWER8_AVAILABLE
|
||||||
extern void GCM_Xor16_POWER7(byte *a, const byte *b, const byte *c);
|
extern void GCM_Xor16_POWER8(byte *a, const byte *b, const byte *c);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if CRYPTOPP_CLMUL_AVAILABLE
|
#if CRYPTOPP_CLMUL_AVAILABLE
|
||||||
@ -213,11 +213,11 @@ void GCM_Base::SetKeyWithoutResync(const byte *userKey, size_t keylength, const
|
|||||||
for (k=1; k<j; k++)
|
for (k=1; k<j; k++)
|
||||||
GCM_Xor16_NEON(mulTable+i*256*16+(j+k)*16, mulTable+i*256*16+j*16, mulTable+i*256*16+k*16);
|
GCM_Xor16_NEON(mulTable+i*256*16+(j+k)*16, mulTable+i*256*16+j*16, mulTable+i*256*16+k*16);
|
||||||
else
|
else
|
||||||
#elif CRYPTOPP_POWER7_AVAILABLE
|
#elif CRYPTOPP_POWER8_AVAILABLE
|
||||||
if (HasPower7())
|
if (HasPower8())
|
||||||
for (j=2; j<=0x80; j*=2)
|
for (j=2; j<=0x80; j*=2)
|
||||||
for (k=1; k<j; k++)
|
for (k=1; k<j; k++)
|
||||||
GCM_Xor16_POWER7(mulTable+i*256*16+(j+k)*16, mulTable+i*256*16+j*16, mulTable+i*256*16+k*16);
|
GCM_Xor16_POWER8(mulTable+i*256*16+(j+k)*16, mulTable+i*256*16+j*16, mulTable+i*256*16+k*16);
|
||||||
else
|
else
|
||||||
#endif
|
#endif
|
||||||
for (j=2; j<=0x80; j*=2)
|
for (j=2; j<=0x80; j*=2)
|
||||||
@ -277,13 +277,13 @@ void GCM_Base::SetKeyWithoutResync(const byte *userKey, size_t keylength, const
|
|||||||
GCM_Xor16_NEON(mulTable+1024+i*256+(j+k)*16, mulTable+1024+i*256+j*16, mulTable+1024+i*256+k*16);
|
GCM_Xor16_NEON(mulTable+1024+i*256+(j+k)*16, mulTable+1024+i*256+j*16, mulTable+1024+i*256+k*16);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
#elif CRYPTOPP_POWER7_AVAILABLE
|
#elif CRYPTOPP_POWER8_AVAILABLE
|
||||||
if (HasPower7())
|
if (HasPower8())
|
||||||
for (j=2; j<=8; j*=2)
|
for (j=2; j<=8; j*=2)
|
||||||
for (k=1; k<j; k++)
|
for (k=1; k<j; k++)
|
||||||
{
|
{
|
||||||
GCM_Xor16_POWER7(mulTable+i*256+(j+k)*16, mulTable+i*256+j*16, mulTable+i*256+k*16);
|
GCM_Xor16_POWER8(mulTable+i*256+(j+k)*16, mulTable+i*256+j*16, mulTable+i*256+k*16);
|
||||||
GCM_Xor16_POWER7(mulTable+1024+i*256+(j+k)*16, mulTable+1024+i*256+j*16, mulTable+1024+i*256+k*16);
|
GCM_Xor16_POWER8(mulTable+1024+i*256+(j+k)*16, mulTable+1024+i*256+j*16, mulTable+1024+i*256+k*16);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
#endif
|
#endif
|
||||||
@ -369,8 +369,8 @@ unsigned int GCM_Base::OptimalDataAlignment() const
|
|||||||
HasSSE2() ? 16 :
|
HasSSE2() ? 16 :
|
||||||
#elif CRYPTOPP_ARM_NEON_AVAILABLE
|
#elif CRYPTOPP_ARM_NEON_AVAILABLE
|
||||||
HasNEON() ? 4 :
|
HasNEON() ? 4 :
|
||||||
#elif CRYPTOPP_POWER7_AVAILABLE
|
#elif CRYPTOPP_POWER8_AVAILABLE
|
||||||
HasPower7() ? 16 :
|
HasPower8() ? 16 :
|
||||||
#endif
|
#endif
|
||||||
GetBlockCipher().OptimalDataAlignment();
|
GetBlockCipher().OptimalDataAlignment();
|
||||||
}
|
}
|
||||||
|
6
vendor/cryptopp/vendor_cryptopp/gcm_simd.cpp
vendored
6
vendor/cryptopp/vendor_cryptopp/gcm_simd.cpp
vendored
@ -569,12 +569,12 @@ void GCM_ReverseHashBufferIfNeeded_CLMUL(byte *hashBuffer)
|
|||||||
|
|
||||||
// ***************************** POWER8 ***************************** //
|
// ***************************** POWER8 ***************************** //
|
||||||
|
|
||||||
#if CRYPTOPP_POWER7_AVAILABLE
|
#if CRYPTOPP_POWER8_AVAILABLE
|
||||||
void GCM_Xor16_POWER7(byte *a, const byte *b, const byte *c)
|
void GCM_Xor16_POWER8(byte *a, const byte *b, const byte *c)
|
||||||
{
|
{
|
||||||
VecStore(VecXor(VecLoad(b), VecLoad(c)), a);
|
VecStore(VecXor(VecLoad(b), VecLoad(c)), a);
|
||||||
}
|
}
|
||||||
#endif // CRYPTOPP_POWER7_AVAILABLE
|
#endif // CRYPTOPP_POWER8_AVAILABLE
|
||||||
|
|
||||||
#if CRYPTOPP_POWER8_VMULL_AVAILABLE
|
#if CRYPTOPP_POWER8_VMULL_AVAILABLE
|
||||||
|
|
||||||
|
@ -21,6 +21,8 @@
|
|||||||
#include "pch.h"
|
#include "pch.h"
|
||||||
#include "config.h"
|
#include "config.h"
|
||||||
|
|
||||||
|
#ifndef CRYPTOPP_IMPORTS
|
||||||
|
|
||||||
#include "gf2n.h"
|
#include "gf2n.h"
|
||||||
|
|
||||||
#if (CRYPTOPP_CLMUL_AVAILABLE)
|
#if (CRYPTOPP_CLMUL_AVAILABLE)
|
||||||
@ -608,3 +610,5 @@ GF2NT_233_Square_Reduce_POWER8(const word* pA, word* pC)
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
NAMESPACE_END
|
NAMESPACE_END
|
||||||
|
|
||||||
|
#endif // CRYPTOPP_IMPORTS
|
13
vendor/cryptopp/vendor_cryptopp/integer.cpp
vendored
13
vendor/cryptopp/vendor_cryptopp/integer.cpp
vendored
@ -3537,9 +3537,9 @@ class KDF2_RNG : public RandomNumberGenerator
|
|||||||
{
|
{
|
||||||
public:
|
public:
|
||||||
KDF2_RNG(const byte *seed, size_t seedSize)
|
KDF2_RNG(const byte *seed, size_t seedSize)
|
||||||
: m_counter(0), m_counterAndSeed(seedSize + 4)
|
: m_counter(0), m_counterAndSeed(ClampSize(seedSize) + 4)
|
||||||
{
|
{
|
||||||
memcpy(m_counterAndSeed + 4, seed, seedSize);
|
memcpy(m_counterAndSeed + 4, seed, ClampSize(seedSize));
|
||||||
}
|
}
|
||||||
|
|
||||||
void GenerateBlock(byte *output, size_t size)
|
void GenerateBlock(byte *output, size_t size)
|
||||||
@ -3550,6 +3550,15 @@ public:
|
|||||||
P1363_KDF2<SHA1>::DeriveKey(output, size, m_counterAndSeed, m_counterAndSeed.size(), NULLPTR, 0);
|
P1363_KDF2<SHA1>::DeriveKey(output, size, m_counterAndSeed, m_counterAndSeed.size(), NULLPTR, 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// UBsan finding, -Wstringop-overflow
|
||||||
|
inline size_t ClampSize(size_t req) const
|
||||||
|
{
|
||||||
|
// Clamp at 16 MB
|
||||||
|
if (req > 16U*1024*1024)
|
||||||
|
return 16U*1024*1024;
|
||||||
|
return req;
|
||||||
|
}
|
||||||
|
|
||||||
private:
|
private:
|
||||||
word32 m_counter;
|
word32 m_counter;
|
||||||
SecByteBlock m_counterAndSeed;
|
SecByteBlock m_counterAndSeed;
|
||||||
|
10
vendor/cryptopp/vendor_cryptopp/keccak_simd.cpp
vendored
10
vendor/cryptopp/vendor_cryptopp/keccak_simd.cpp
vendored
@ -12,8 +12,8 @@
|
|||||||
// KeccakF1600x2_SSE is ParallelHash128. The SSE2 ParallelHash128
|
// KeccakF1600x2_SSE is ParallelHash128. The SSE2 ParallelHash128
|
||||||
// implementation was extracted from XKCP using the following command.
|
// implementation was extracted from XKCP using the following command.
|
||||||
//
|
//
|
||||||
// gcc -I lib/common -I lib/low/KeccakP-1600/Optimized \
|
// gcc -I lib/common -I lib/low/KeccakP-1600/Optimized
|
||||||
// -I lib/low/KeccakP-1600-times2/SIMD128/SSE2ufull \
|
// -I lib/low/KeccakP-1600-times2/SIMD128/SSE2ufull
|
||||||
// lib/low/KeccakP-1600-times2/SIMD128/KeccakP-1600-times2-SIMD128.c -E
|
// lib/low/KeccakP-1600-times2/SIMD128/KeccakP-1600-times2-SIMD128.c -E
|
||||||
|
|
||||||
#include "pch.h"
|
#include "pch.h"
|
||||||
@ -23,7 +23,7 @@
|
|||||||
|
|
||||||
#if (CRYPTOPP_SSSE3_AVAILABLE)
|
#if (CRYPTOPP_SSSE3_AVAILABLE)
|
||||||
# include <emmintrin.h>
|
# include <emmintrin.h>
|
||||||
# include <immintrin.h>
|
# include <tmmintrin.h>
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
// Squash MS LNK4221 and libtool warnings
|
// Squash MS LNK4221 and libtool warnings
|
||||||
@ -39,8 +39,8 @@ extern void KeccakF1600x2_SSE(word64 *state);
|
|||||||
// The F1600 round constants
|
// The F1600 round constants
|
||||||
extern const word64 KeccakF1600Constants[24];
|
extern const word64 KeccakF1600Constants[24];
|
||||||
|
|
||||||
const word64 rho8[2] = {0x0605040302010007, 0x0E0D0C0B0A09080F};
|
const word64 rho8[2] = {W64LIT(0x0605040302010007), W64LIT(0x0E0D0C0B0A09080F)};
|
||||||
const word64 rho56[2] = {0x0007060504030201, 0x080F0E0D0C0B0A09};
|
const word64 rho56[2] = {W64LIT(0x0007060504030201), W64LIT(0x080F0E0D0C0B0A09)};
|
||||||
|
|
||||||
#define V128 __m128i
|
#define V128 __m128i
|
||||||
#define CV128 const __m128i
|
#define CV128 const __m128i
|
||||||
|
32
vendor/cryptopp/vendor_cryptopp/misc.h
vendored
32
vendor/cryptopp/vendor_cryptopp/misc.h
vendored
@ -388,6 +388,38 @@ inline size_t PtrByteDiff(const PTR pointer1, const PTR pointer2)
|
|||||||
return (size_t)(reinterpret_cast<uintptr_t>(pointer1) - reinterpret_cast<uintptr_t>(pointer2));
|
return (size_t)(reinterpret_cast<uintptr_t>(pointer1) - reinterpret_cast<uintptr_t>(pointer2));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// \brief Pointer to the first element of a string
|
||||||
|
/// \param str std::string
|
||||||
|
/// \details BytePtr returns NULL pointer for an empty string.
|
||||||
|
/// \return Pointer to the first element of a string
|
||||||
|
inline byte* BytePtr(std::string& str)
|
||||||
|
{
|
||||||
|
// Caller wants a writeable pointer
|
||||||
|
CRYPTOPP_ASSERT(str.empty() == false);
|
||||||
|
|
||||||
|
if (str.empty())
|
||||||
|
return NULLPTR;
|
||||||
|
return reinterpret_cast<byte*>(&str[0]);
|
||||||
|
}
|
||||||
|
|
||||||
|
/// \brief Const pointer to the first element of a string
|
||||||
|
/// \param str std::string
|
||||||
|
/// \details ConstBytePtr returns non-NULL pointer for an empty string.
|
||||||
|
/// \return Pointer to the first element of a string
|
||||||
|
inline const byte* ConstBytePtr(const std::string& str)
|
||||||
|
{
|
||||||
|
// Use c_str() so a pointer is always available
|
||||||
|
return reinterpret_cast<const byte*>(str.c_str());
|
||||||
|
}
|
||||||
|
|
||||||
|
/// \brief Size of a string
|
||||||
|
/// \param str std::string
|
||||||
|
/// \return size of a string
|
||||||
|
inline size_t BytePtrSize(const std::string& str)
|
||||||
|
{
|
||||||
|
return str.size();
|
||||||
|
}
|
||||||
|
|
||||||
#if (!__STDC_WANT_SECURE_LIB__ && !defined(_MEMORY_S_DEFINED)) || defined(CRYPTOPP_WANT_SECURE_LIB)
|
#if (!__STDC_WANT_SECURE_LIB__ && !defined(_MEMORY_S_DEFINED)) || defined(CRYPTOPP_WANT_SECURE_LIB)
|
||||||
|
|
||||||
/// \brief Bounds checking replacement for memcpy()
|
/// \brief Bounds checking replacement for memcpy()
|
||||||
|
54
vendor/cryptopp/vendor_cryptopp/ppc_simd.h
vendored
54
vendor/cryptopp/vendor_cryptopp/ppc_simd.h
vendored
@ -57,7 +57,7 @@
|
|||||||
//
|
//
|
||||||
// inline uint32x4_p VecLoad(const byte src[16])
|
// inline uint32x4_p VecLoad(const byte src[16])
|
||||||
// {
|
// {
|
||||||
// #if defined(_ARCH_PWR7)
|
// #if defined(_ARCH_PWR8)
|
||||||
// return (uint32x4_p) *(uint8x16_p*)((byte*)src);
|
// return (uint32x4_p) *(uint8x16_p*)((byte*)src);
|
||||||
// #else
|
// #else
|
||||||
// return VecLoad_ALTIVEC(src);
|
// return VecLoad_ALTIVEC(src);
|
||||||
@ -128,7 +128,7 @@ typedef __vector unsigned short uint16x8_p;
|
|||||||
/// \since Crypto++ 6.0
|
/// \since Crypto++ 6.0
|
||||||
typedef __vector unsigned int uint32x4_p;
|
typedef __vector unsigned int uint32x4_p;
|
||||||
|
|
||||||
#if defined(_ARCH_PWR7) || defined(CRYPTOPP_DOXYGEN_PROCESSING)
|
#if defined(_ARCH_PWR8) || defined(CRYPTOPP_DOXYGEN_PROCESSING)
|
||||||
/// \brief Vector of 64-bit elements
|
/// \brief Vector of 64-bit elements
|
||||||
/// \details uint64x2_p is available on POWER7 and above. Some supporting
|
/// \details uint64x2_p is available on POWER7 and above. Some supporting
|
||||||
/// functions, like 64-bit <tt>vec_add</tt> (<tt>vaddudm</tt>), did not
|
/// functions, like 64-bit <tt>vec_add</tt> (<tt>vaddudm</tt>), did not
|
||||||
@ -137,7 +137,7 @@ typedef __vector unsigned int uint32x4_p;
|
|||||||
/// __vector unsigned long long
|
/// __vector unsigned long long
|
||||||
/// \since Crypto++ 6.0
|
/// \since Crypto++ 6.0
|
||||||
typedef __vector unsigned long long uint64x2_p;
|
typedef __vector unsigned long long uint64x2_p;
|
||||||
#endif // _ARCH_PWR7
|
#endif // _ARCH_PWR8
|
||||||
|
|
||||||
/// \brief The 0 vector
|
/// \brief The 0 vector
|
||||||
/// \returns a 32-bit vector of 0's
|
/// \returns a 32-bit vector of 0's
|
||||||
@ -252,7 +252,7 @@ inline uint32x4_p VecLoad_ALTIVEC(int off, const byte src[16])
|
|||||||
/// \since Crypto++ 6.0
|
/// \since Crypto++ 6.0
|
||||||
inline uint32x4_p VecLoad(const byte src[16])
|
inline uint32x4_p VecLoad(const byte src[16])
|
||||||
{
|
{
|
||||||
#if defined(_ARCH_PWR7)
|
#if defined(_ARCH_PWR8)
|
||||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||||
return (uint32x4_p)vec_xlw4(0, (byte*)src);
|
return (uint32x4_p)vec_xlw4(0, (byte*)src);
|
||||||
# elif defined(__xlc__) || defined(__xlC__) || defined(__clang__)
|
# elif defined(__xlc__) || defined(__xlC__) || defined(__clang__)
|
||||||
@ -280,7 +280,7 @@ inline uint32x4_p VecLoad(const byte src[16])
|
|||||||
/// \since Crypto++ 6.0
|
/// \since Crypto++ 6.0
|
||||||
inline uint32x4_p VecLoad(int off, const byte src[16])
|
inline uint32x4_p VecLoad(int off, const byte src[16])
|
||||||
{
|
{
|
||||||
#if defined(_ARCH_PWR7)
|
#if defined(_ARCH_PWR8)
|
||||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||||
return (uint32x4_p)vec_xlw4(off, (byte*)src);
|
return (uint32x4_p)vec_xlw4(off, (byte*)src);
|
||||||
# elif defined(__xlc__) || defined(__xlC__) || defined(__clang__)
|
# elif defined(__xlc__) || defined(__xlC__) || defined(__clang__)
|
||||||
@ -328,7 +328,7 @@ inline uint32x4_p VecLoad(int off, const word32 src[4])
|
|||||||
return VecLoad(off, (const byte*)src);
|
return VecLoad(off, (const byte*)src);
|
||||||
}
|
}
|
||||||
|
|
||||||
#if defined(_ARCH_PWR7) || defined(CRYPTOPP_DOXYGEN_PROCESSING)
|
#if defined(_ARCH_PWR8) || defined(CRYPTOPP_DOXYGEN_PROCESSING)
|
||||||
|
|
||||||
/// \brief Loads a vector from a word array
|
/// \brief Loads a vector from a word array
|
||||||
/// \param src the word array
|
/// \param src the word array
|
||||||
@ -367,7 +367,7 @@ inline uint64x2_p VecLoad(int off, const word64 src[2])
|
|||||||
return (uint64x2_p)VecLoad(off, (const byte*)src);
|
return (uint64x2_p)VecLoad(off, (const byte*)src);
|
||||||
}
|
}
|
||||||
|
|
||||||
#endif // _ARCH_PWR7
|
#endif // _ARCH_PWR8
|
||||||
|
|
||||||
/// \brief Loads a vector from an aligned byte array
|
/// \brief Loads a vector from an aligned byte array
|
||||||
/// \param src the byte array
|
/// \param src the byte array
|
||||||
@ -382,7 +382,7 @@ inline uint64x2_p VecLoad(int off, const word64 src[2])
|
|||||||
/// \since Crypto++ 8.0
|
/// \since Crypto++ 8.0
|
||||||
inline uint32x4_p VecLoadAligned(const byte src[16])
|
inline uint32x4_p VecLoadAligned(const byte src[16])
|
||||||
{
|
{
|
||||||
#if defined(_ARCH_PWR7)
|
#if defined(_ARCH_PWR8)
|
||||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||||
return (uint32x4_p)vec_xlw4(0, (byte*)src);
|
return (uint32x4_p)vec_xlw4(0, (byte*)src);
|
||||||
# elif defined(__xlc__) || defined(__xlC__) || defined(__clang__)
|
# elif defined(__xlc__) || defined(__xlC__) || defined(__clang__)
|
||||||
@ -390,10 +390,10 @@ inline uint32x4_p VecLoadAligned(const byte src[16])
|
|||||||
# else
|
# else
|
||||||
return (uint32x4_p)vec_vsx_ld(0, (byte*)src);
|
return (uint32x4_p)vec_vsx_ld(0, (byte*)src);
|
||||||
# endif
|
# endif
|
||||||
#else // _ARCH_PWR7
|
#else // _ARCH_PWR8
|
||||||
CRYPTOPP_ASSERT(((uintptr_t)src) % 16 == 0);
|
CRYPTOPP_ASSERT(((uintptr_t)src) % 16 == 0);
|
||||||
return (uint32x4_p)vec_ld(0, (byte*)src);
|
return (uint32x4_p)vec_ld(0, (byte*)src);
|
||||||
#endif // _ARCH_PWR7
|
#endif // _ARCH_PWR8
|
||||||
}
|
}
|
||||||
|
|
||||||
/// \brief Loads a vector from an aligned byte array
|
/// \brief Loads a vector from an aligned byte array
|
||||||
@ -410,7 +410,7 @@ inline uint32x4_p VecLoadAligned(const byte src[16])
|
|||||||
/// \since Crypto++ 8.0
|
/// \since Crypto++ 8.0
|
||||||
inline uint32x4_p VecLoadAligned(int off, const byte src[16])
|
inline uint32x4_p VecLoadAligned(int off, const byte src[16])
|
||||||
{
|
{
|
||||||
#if defined(_ARCH_PWR7)
|
#if defined(_ARCH_PWR8)
|
||||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||||
return (uint32x4_p)vec_xlw4(off, (byte*)src);
|
return (uint32x4_p)vec_xlw4(off, (byte*)src);
|
||||||
# elif defined(__xlc__) || defined(__xlC__) || defined(__clang__)
|
# elif defined(__xlc__) || defined(__xlC__) || defined(__clang__)
|
||||||
@ -418,10 +418,10 @@ inline uint32x4_p VecLoadAligned(int off, const byte src[16])
|
|||||||
# else
|
# else
|
||||||
return (uint32x4_p)vec_vsx_ld(off, (byte*)src);
|
return (uint32x4_p)vec_vsx_ld(off, (byte*)src);
|
||||||
# endif
|
# endif
|
||||||
#else // _ARCH_PWR7
|
#else // _ARCH_PWR8
|
||||||
CRYPTOPP_ASSERT((((uintptr_t)src)+off) % 16 == 0);
|
CRYPTOPP_ASSERT((((uintptr_t)src)+off) % 16 == 0);
|
||||||
return (uint32x4_p)vec_ld(off, (byte*)src);
|
return (uint32x4_p)vec_ld(off, (byte*)src);
|
||||||
#endif // _ARCH_PWR7
|
#endif // _ARCH_PWR8
|
||||||
}
|
}
|
||||||
|
|
||||||
/// \brief Loads a vector from a byte array
|
/// \brief Loads a vector from a byte array
|
||||||
@ -439,7 +439,7 @@ inline uint32x4_p VecLoadAligned(int off, const byte src[16])
|
|||||||
/// \since Crypto++ 6.0
|
/// \since Crypto++ 6.0
|
||||||
inline uint32x4_p VecLoadBE(const byte src[16])
|
inline uint32x4_p VecLoadBE(const byte src[16])
|
||||||
{
|
{
|
||||||
#if defined(_ARCH_PWR7)
|
#if defined(_ARCH_PWR8)
|
||||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||||
# if (CRYPTOPP_BIG_ENDIAN)
|
# if (CRYPTOPP_BIG_ENDIAN)
|
||||||
return (uint32x4_p)vec_xlw4(0, (byte*)src);
|
return (uint32x4_p)vec_xlw4(0, (byte*)src);
|
||||||
@ -455,13 +455,13 @@ inline uint32x4_p VecLoadBE(const byte src[16])
|
|||||||
return (uint32x4_p)VecReverse(vec_vsx_ld(0, (byte*)src));
|
return (uint32x4_p)VecReverse(vec_vsx_ld(0, (byte*)src));
|
||||||
# endif
|
# endif
|
||||||
# endif
|
# endif
|
||||||
#else // _ARCH_PWR7
|
#else // _ARCH_PWR8
|
||||||
# if (CRYPTOPP_BIG_ENDIAN)
|
# if (CRYPTOPP_BIG_ENDIAN)
|
||||||
return (uint32x4_p)VecLoad((const byte*)src);
|
return (uint32x4_p)VecLoad((const byte*)src);
|
||||||
# else
|
# else
|
||||||
return (uint32x4_p)VecReverse(VecLoad((const byte*)src));
|
return (uint32x4_p)VecReverse(VecLoad((const byte*)src));
|
||||||
# endif
|
# endif
|
||||||
#endif // _ARCH_PWR7
|
#endif // _ARCH_PWR8
|
||||||
}
|
}
|
||||||
|
|
||||||
/// \brief Loads a vector from a byte array
|
/// \brief Loads a vector from a byte array
|
||||||
@ -480,7 +480,7 @@ inline uint32x4_p VecLoadBE(const byte src[16])
|
|||||||
/// \since Crypto++ 6.0
|
/// \since Crypto++ 6.0
|
||||||
inline uint32x4_p VecLoadBE(int off, const byte src[16])
|
inline uint32x4_p VecLoadBE(int off, const byte src[16])
|
||||||
{
|
{
|
||||||
#if defined(_ARCH_PWR7)
|
#if defined(_ARCH_PWR8)
|
||||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||||
# if (CRYPTOPP_BIG_ENDIAN)
|
# if (CRYPTOPP_BIG_ENDIAN)
|
||||||
return (uint32x4_p)vec_xlw4(off, (byte*)src);
|
return (uint32x4_p)vec_xlw4(off, (byte*)src);
|
||||||
@ -496,13 +496,13 @@ inline uint32x4_p VecLoadBE(int off, const byte src[16])
|
|||||||
return (uint32x4_p)VecReverse(vec_vsx_ld(off, (byte*)src));
|
return (uint32x4_p)VecReverse(vec_vsx_ld(off, (byte*)src));
|
||||||
# endif
|
# endif
|
||||||
# endif
|
# endif
|
||||||
#else // _ARCH_PWR7
|
#else // _ARCH_PWR8
|
||||||
# if (CRYPTOPP_BIG_ENDIAN)
|
# if (CRYPTOPP_BIG_ENDIAN)
|
||||||
return (uint32x4_p)VecLoad(off, (const byte*)src);
|
return (uint32x4_p)VecLoad(off, (const byte*)src);
|
||||||
# else
|
# else
|
||||||
return (uint32x4_p)VecReverse(VecLoad(off, (const byte*)src));
|
return (uint32x4_p)VecReverse(VecLoad(off, (const byte*)src));
|
||||||
# endif
|
# endif
|
||||||
#endif // _ARCH_PWR7
|
#endif // _ARCH_PWR8
|
||||||
}
|
}
|
||||||
|
|
||||||
//@}
|
//@}
|
||||||
@ -604,7 +604,7 @@ inline void VecStore_ALTIVEC(const T data, int off, byte dest[16])
|
|||||||
template<class T>
|
template<class T>
|
||||||
inline void VecStore(const T data, byte dest[16])
|
inline void VecStore(const T data, byte dest[16])
|
||||||
{
|
{
|
||||||
#if defined(_ARCH_PWR7)
|
#if defined(_ARCH_PWR8)
|
||||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||||
vec_xstw4((uint8x16_p)data, 0, (byte*)dest);
|
vec_xstw4((uint8x16_p)data, 0, (byte*)dest);
|
||||||
# elif defined(__xlc__) || defined(__xlC__) || defined(__clang__)
|
# elif defined(__xlc__) || defined(__xlC__) || defined(__clang__)
|
||||||
@ -635,7 +635,7 @@ inline void VecStore(const T data, byte dest[16])
|
|||||||
template<class T>
|
template<class T>
|
||||||
inline void VecStore(const T data, int off, byte dest[16])
|
inline void VecStore(const T data, int off, byte dest[16])
|
||||||
{
|
{
|
||||||
#if defined(_ARCH_PWR7)
|
#if defined(_ARCH_PWR8)
|
||||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||||
vec_xstw4((uint8x16_p)data, off, (byte*)dest);
|
vec_xstw4((uint8x16_p)data, off, (byte*)dest);
|
||||||
# elif defined(__xlc__) || defined(__xlC__) || defined(__clang__)
|
# elif defined(__xlc__) || defined(__xlC__) || defined(__clang__)
|
||||||
@ -750,7 +750,7 @@ inline void VecStore(const T data, int off, word64 dest[2])
|
|||||||
template <class T>
|
template <class T>
|
||||||
inline void VecStoreBE(const T data, byte dest[16])
|
inline void VecStoreBE(const T data, byte dest[16])
|
||||||
{
|
{
|
||||||
#if defined(_ARCH_PWR7)
|
#if defined(_ARCH_PWR8)
|
||||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||||
# if (CRYPTOPP_BIG_ENDIAN)
|
# if (CRYPTOPP_BIG_ENDIAN)
|
||||||
vec_xstw4((uint8x16_p)data, 0, (byte*)dest);
|
vec_xstw4((uint8x16_p)data, 0, (byte*)dest);
|
||||||
@ -766,13 +766,13 @@ inline void VecStoreBE(const T data, byte dest[16])
|
|||||||
vec_vsx_st((uint8x16_p)VecReverse(data), 0, (byte*)dest);
|
vec_vsx_st((uint8x16_p)VecReverse(data), 0, (byte*)dest);
|
||||||
# endif
|
# endif
|
||||||
# endif
|
# endif
|
||||||
#else // _ARCH_PWR7
|
#else // _ARCH_PWR8
|
||||||
# if (CRYPTOPP_BIG_ENDIAN)
|
# if (CRYPTOPP_BIG_ENDIAN)
|
||||||
VecStore_ALTIVEC((uint8x16_p)data, 0, (byte*)dest);
|
VecStore_ALTIVEC((uint8x16_p)data, 0, (byte*)dest);
|
||||||
# else
|
# else
|
||||||
VecStore_ALTIVEC((uint8x16_p)VecReverse(data), 0, (byte*)dest);
|
VecStore_ALTIVEC((uint8x16_p)VecReverse(data), 0, (byte*)dest);
|
||||||
# endif
|
# endif
|
||||||
#endif // _ARCH_PWR7
|
#endif // _ARCH_PWR8
|
||||||
}
|
}
|
||||||
|
|
||||||
/// \brief Stores a vector to a byte array
|
/// \brief Stores a vector to a byte array
|
||||||
@ -794,7 +794,7 @@ inline void VecStoreBE(const T data, byte dest[16])
|
|||||||
template <class T>
|
template <class T>
|
||||||
inline void VecStoreBE(const T data, int off, byte dest[16])
|
inline void VecStoreBE(const T data, int off, byte dest[16])
|
||||||
{
|
{
|
||||||
#if defined(_ARCH_PWR7)
|
#if defined(_ARCH_PWR8)
|
||||||
# if defined(__early_xlc__) || defined(__early_xlC__)
|
# if defined(__early_xlc__) || defined(__early_xlC__)
|
||||||
# if (CRYPTOPP_BIG_ENDIAN)
|
# if (CRYPTOPP_BIG_ENDIAN)
|
||||||
vec_xstw4((uint8x16_p)data, off, (byte*)dest);
|
vec_xstw4((uint8x16_p)data, off, (byte*)dest);
|
||||||
@ -810,13 +810,13 @@ inline void VecStoreBE(const T data, int off, byte dest[16])
|
|||||||
vec_vsx_st((uint8x16_p)VecReverse(data), off, (byte*)dest);
|
vec_vsx_st((uint8x16_p)VecReverse(data), off, (byte*)dest);
|
||||||
# endif
|
# endif
|
||||||
# endif
|
# endif
|
||||||
#else // _ARCH_PWR7
|
#else // _ARCH_PWR8
|
||||||
# if (CRYPTOPP_BIG_ENDIAN)
|
# if (CRYPTOPP_BIG_ENDIAN)
|
||||||
VecStore_ALTIVEC((uint8x16_p)data, off, (byte*)dest);
|
VecStore_ALTIVEC((uint8x16_p)data, off, (byte*)dest);
|
||||||
# else
|
# else
|
||||||
VecStore_ALTIVEC((uint8x16_p)VecReverse(data), off, (byte*)dest);
|
VecStore_ALTIVEC((uint8x16_p)VecReverse(data), off, (byte*)dest);
|
||||||
# endif
|
# endif
|
||||||
#endif // _ARCH_PWR7
|
#endif // _ARCH_PWR8
|
||||||
}
|
}
|
||||||
|
|
||||||
/// \brief Stores a vector to a word array
|
/// \brief Stores a vector to a word array
|
||||||
|
2
vendor/cryptopp/vendor_cryptopp/regtest3.cpp
vendored
2
vendor/cryptopp/vendor_cryptopp/regtest3.cpp
vendored
@ -92,7 +92,9 @@ void RegisterFactories4()
|
|||||||
RegisterSymmetricCipherDefaultFactories<CTR_Mode<TEA> >();
|
RegisterSymmetricCipherDefaultFactories<CTR_Mode<TEA> >();
|
||||||
RegisterSymmetricCipherDefaultFactories<CTR_Mode<XTEA> >();
|
RegisterSymmetricCipherDefaultFactories<CTR_Mode<XTEA> >();
|
||||||
RegisterSymmetricCipherDefaultFactories<CTR_Mode<CAST128> >();
|
RegisterSymmetricCipherDefaultFactories<CTR_Mode<CAST128> >();
|
||||||
|
RegisterSymmetricCipherDefaultFactories<ECB_Mode<SKIPJACK> >();
|
||||||
RegisterSymmetricCipherDefaultFactories<CTR_Mode<SKIPJACK> >();
|
RegisterSymmetricCipherDefaultFactories<CTR_Mode<SKIPJACK> >();
|
||||||
|
RegisterSymmetricCipherDefaultFactories<CBC_Mode<SKIPJACK> >();
|
||||||
RegisterSymmetricCipherDefaultFactories<CTR_Mode<Blowfish> >();
|
RegisterSymmetricCipherDefaultFactories<CTR_Mode<Blowfish> >();
|
||||||
RegisterSymmetricCipherDefaultFactories<ECB_Mode<SEED> >();
|
RegisterSymmetricCipherDefaultFactories<ECB_Mode<SEED> >();
|
||||||
RegisterSymmetricCipherDefaultFactories<CTR_Mode<SEED> >();
|
RegisterSymmetricCipherDefaultFactories<CTR_Mode<SEED> >();
|
||||||
|
2
vendor/cryptopp/vendor_cryptopp/seckey.h
vendored
2
vendor/cryptopp/vendor_cryptopp/seckey.h
vendored
@ -14,7 +14,7 @@
|
|||||||
|
|
||||||
#if CRYPTOPP_MSC_VERSION
|
#if CRYPTOPP_MSC_VERSION
|
||||||
# pragma warning(push)
|
# pragma warning(push)
|
||||||
# pragma warning(disable: 4189)
|
# pragma warning(disable: 4189 4296)
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
// Issue 340
|
// Issue 340
|
||||||
|
4
vendor/cryptopp/vendor_cryptopp/shake.h
vendored
4
vendor/cryptopp/vendor_cryptopp/shake.h
vendored
@ -125,7 +125,7 @@ public:
|
|||||||
/// requires the output size in advance because the algoirthm uses
|
/// requires the output size in advance because the algoirthm uses
|
||||||
/// output size as a parameter to the hash function.
|
/// output size as a parameter to the hash function.
|
||||||
/// \since Crypto++ 8.1
|
/// \since Crypto++ 8.1
|
||||||
SHAKE128(unsigned int outputSize) : SHAKE_Final(outputSize) {}
|
SHAKE128(unsigned int outputSize) : SHAKE_Final<128>(outputSize) {}
|
||||||
};
|
};
|
||||||
|
|
||||||
/// \brief SHAKE256 message digest
|
/// \brief SHAKE256 message digest
|
||||||
@ -155,7 +155,7 @@ public:
|
|||||||
/// requires the output size in advance because the algoirthm uses
|
/// requires the output size in advance because the algoirthm uses
|
||||||
/// output size as a parameter to the hash function.
|
/// output size as a parameter to the hash function.
|
||||||
/// \since Crypto++ 8.1
|
/// \since Crypto++ 8.1
|
||||||
SHAKE256(unsigned int outputSize) : SHAKE_Final(outputSize) {}
|
SHAKE256(unsigned int outputSize) : SHAKE_Final<256>(outputSize) {}
|
||||||
};
|
};
|
||||||
|
|
||||||
NAMESPACE_END
|
NAMESPACE_END
|
||||||
|
6
vendor/cryptopp/vendor_cryptopp/simon.cpp
vendored
6
vendor/cryptopp/vendor_cryptopp/simon.cpp
vendored
@ -255,9 +255,9 @@ std::string SIMON64::Base::AlgorithmProvider() const
|
|||||||
if (HasNEON())
|
if (HasNEON())
|
||||||
return "NEON";
|
return "NEON";
|
||||||
# endif
|
# endif
|
||||||
# if (CRYPTOPP_POWER7_AVAILABLE)
|
# if (CRYPTOPP_POWER8_AVAILABLE)
|
||||||
if (HasPower7())
|
if (HasPower8())
|
||||||
return "Power7";
|
return "Power8";
|
||||||
# endif
|
# endif
|
||||||
# if (CRYPTOPP_ALTIVEC_AVAILABLE)
|
# if (CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||||
if (HasAltivec())
|
if (HasAltivec())
|
||||||
|
@ -44,7 +44,7 @@
|
|||||||
# include <arm_acle.h>
|
# include <arm_acle.h>
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(CRYPTOPP_POWER7_AVAILABLE)
|
#if defined(CRYPTOPP_POWER8_AVAILABLE)
|
||||||
# include "adv_simd.h"
|
# include "adv_simd.h"
|
||||||
# include "ppc_simd.h"
|
# include "ppc_simd.h"
|
||||||
#endif
|
#endif
|
||||||
@ -108,13 +108,8 @@ inline uint64x2_t RotateRight64(const uint64x2_t& val)
|
|||||||
template <>
|
template <>
|
||||||
inline uint64x2_t RotateLeft64<8>(const uint64x2_t& val)
|
inline uint64x2_t RotateLeft64<8>(const uint64x2_t& val)
|
||||||
{
|
{
|
||||||
#if (CRYPTOPP_BIG_ENDIAN)
|
|
||||||
const uint8_t maskb[16] = { 14,13,12,11, 10,9,8,15, 6,5,4,3, 2,1,0,7 };
|
|
||||||
const uint8x16_t mask = vld1q_u8(maskb);
|
|
||||||
#else
|
|
||||||
const uint8_t maskb[16] = { 7,0,1,2, 3,4,5,6, 15,8,9,10, 11,12,13,14 };
|
const uint8_t maskb[16] = { 7,0,1,2, 3,4,5,6, 15,8,9,10, 11,12,13,14 };
|
||||||
const uint8x16_t mask = vld1q_u8(maskb);
|
const uint8x16_t mask = vld1q_u8(maskb);
|
||||||
#endif
|
|
||||||
|
|
||||||
return vreinterpretq_u64_u8(
|
return vreinterpretq_u64_u8(
|
||||||
vqtbl1q_u8(vreinterpretq_u8_u64(val), mask));
|
vqtbl1q_u8(vreinterpretq_u8_u64(val), mask));
|
||||||
@ -124,13 +119,8 @@ inline uint64x2_t RotateLeft64<8>(const uint64x2_t& val)
|
|||||||
template <>
|
template <>
|
||||||
inline uint64x2_t RotateRight64<8>(const uint64x2_t& val)
|
inline uint64x2_t RotateRight64<8>(const uint64x2_t& val)
|
||||||
{
|
{
|
||||||
#if (CRYPTOPP_BIG_ENDIAN)
|
|
||||||
const uint8_t maskb[16] = { 8,15,14,13, 12,11,10,9, 0,7,6,5, 4,3,2,1 };
|
|
||||||
const uint8x16_t mask = vld1q_u8(maskb);
|
|
||||||
#else
|
|
||||||
const uint8_t maskb[16] = { 1,2,3,4, 5,6,7,0, 9,10,11,12, 13,14,15,8 };
|
const uint8_t maskb[16] = { 1,2,3,4, 5,6,7,0, 9,10,11,12, 13,14,15,8 };
|
||||||
const uint8x16_t mask = vld1q_u8(maskb);
|
const uint8x16_t mask = vld1q_u8(maskb);
|
||||||
#endif
|
|
||||||
|
|
||||||
return vreinterpretq_u64_u8(
|
return vreinterpretq_u64_u8(
|
||||||
vqtbl1q_u8(vreinterpretq_u8_u64(val), mask));
|
vqtbl1q_u8(vreinterpretq_u8_u64(val), mask));
|
||||||
|
26
vendor/cryptopp/vendor_cryptopp/simon64_simd.cpp
vendored
26
vendor/cryptopp/vendor_cryptopp/simon64_simd.cpp
vendored
@ -106,13 +106,8 @@ inline uint32x4_t RotateRight32(const uint32x4_t& val)
|
|||||||
template <>
|
template <>
|
||||||
inline uint32x4_t RotateLeft32<8>(const uint32x4_t& val)
|
inline uint32x4_t RotateLeft32<8>(const uint32x4_t& val)
|
||||||
{
|
{
|
||||||
#if (CRYPTOPP_BIG_ENDIAN)
|
|
||||||
const uint8_t maskb[16] = { 14,13,12,15, 10,9,8,11, 6,5,4,7, 2,1,0,3 };
|
|
||||||
const uint8x16_t mask = vld1q_u8(maskb);
|
|
||||||
#else
|
|
||||||
const uint8_t maskb[16] = { 3,0,1,2, 7,4,5,6, 11,8,9,10, 15,12,13,14 };
|
const uint8_t maskb[16] = { 3,0,1,2, 7,4,5,6, 11,8,9,10, 15,12,13,14 };
|
||||||
const uint8x16_t mask = vld1q_u8(maskb);
|
const uint8x16_t mask = vld1q_u8(maskb);
|
||||||
#endif
|
|
||||||
|
|
||||||
return vreinterpretq_u32_u8(
|
return vreinterpretq_u32_u8(
|
||||||
vqtbl1q_u8(vreinterpretq_u8_u32(val), mask));
|
vqtbl1q_u8(vreinterpretq_u8_u32(val), mask));
|
||||||
@ -122,13 +117,8 @@ inline uint32x4_t RotateLeft32<8>(const uint32x4_t& val)
|
|||||||
template <>
|
template <>
|
||||||
inline uint32x4_t RotateRight32<8>(const uint32x4_t& val)
|
inline uint32x4_t RotateRight32<8>(const uint32x4_t& val)
|
||||||
{
|
{
|
||||||
#if (CRYPTOPP_BIG_ENDIAN)
|
|
||||||
const uint8_t maskb[16] = { 12,15,14,13, 8,11,10,9, 4,7,6,5, 0,3,2,1 };
|
|
||||||
const uint8x16_t mask = vld1q_u8(maskb);
|
|
||||||
#else
|
|
||||||
const uint8_t maskb[16] = { 1,2,3,0, 5,6,7,4, 9,10,11,8, 13,14,14,12 };
|
const uint8_t maskb[16] = { 1,2,3,0, 5,6,7,4, 9,10,11,8, 13,14,14,12 };
|
||||||
const uint8x16_t mask = vld1q_u8(maskb);
|
const uint8x16_t mask = vld1q_u8(maskb);
|
||||||
#endif
|
|
||||||
|
|
||||||
return vreinterpretq_u32_u8(
|
return vreinterpretq_u32_u8(
|
||||||
vqtbl1q_u8(vreinterpretq_u8_u32(val), mask));
|
vqtbl1q_u8(vreinterpretq_u8_u32(val), mask));
|
||||||
@ -576,7 +566,7 @@ inline void SIMON64_Enc_Block(uint32x4_p &block0, uint32x4_p &block1,
|
|||||||
|
|
||||||
for (int i = 0; i < static_cast<int>(rounds & ~1)-1; i += 2)
|
for (int i = 0; i < static_cast<int>(rounds & ~1)-1; i += 2)
|
||||||
{
|
{
|
||||||
#if CRYPTOPP_POWER7_AVAILABLE
|
#if CRYPTOPP_POWER8_AVAILABLE
|
||||||
const uint32x4_p rk1 = vec_splats(subkeys[i]);
|
const uint32x4_p rk1 = vec_splats(subkeys[i]);
|
||||||
const uint32x4_p rk2 = vec_splats(subkeys[i+1]);
|
const uint32x4_p rk2 = vec_splats(subkeys[i+1]);
|
||||||
#else
|
#else
|
||||||
@ -592,7 +582,7 @@ inline void SIMON64_Enc_Block(uint32x4_p &block0, uint32x4_p &block1,
|
|||||||
|
|
||||||
if (rounds & 1)
|
if (rounds & 1)
|
||||||
{
|
{
|
||||||
#if CRYPTOPP_POWER7_AVAILABLE
|
#if CRYPTOPP_POWER8_AVAILABLE
|
||||||
const uint32x4_p rk = vec_splats(subkeys[rounds-1]);
|
const uint32x4_p rk = vec_splats(subkeys[rounds-1]);
|
||||||
#else
|
#else
|
||||||
const uint8x16_p m = {0,1,2,3, 0,1,2,3, 0,1,2,3, 0,1,2,3};
|
const uint8x16_p m = {0,1,2,3, 0,1,2,3, 0,1,2,3, 0,1,2,3};
|
||||||
@ -634,7 +624,7 @@ inline void SIMON64_Dec_Block(uint32x4_p &block0, uint32x4_p &block1,
|
|||||||
if (rounds & 1)
|
if (rounds & 1)
|
||||||
{
|
{
|
||||||
std::swap(x1, y1);
|
std::swap(x1, y1);
|
||||||
#if CRYPTOPP_POWER7_AVAILABLE
|
#if CRYPTOPP_POWER8_AVAILABLE
|
||||||
const uint32x4_p rk = vec_splats(subkeys[rounds-1]);
|
const uint32x4_p rk = vec_splats(subkeys[rounds-1]);
|
||||||
#else
|
#else
|
||||||
const uint8x16_p m = {0,1,2,3, 0,1,2,3, 0,1,2,3, 0,1,2,3};
|
const uint8x16_p m = {0,1,2,3, 0,1,2,3, 0,1,2,3, 0,1,2,3};
|
||||||
@ -647,7 +637,7 @@ inline void SIMON64_Dec_Block(uint32x4_p &block0, uint32x4_p &block1,
|
|||||||
|
|
||||||
for (int i = static_cast<int>(rounds-2); i >= 0; i -= 2)
|
for (int i = static_cast<int>(rounds-2); i >= 0; i -= 2)
|
||||||
{
|
{
|
||||||
#if CRYPTOPP_POWER7_AVAILABLE
|
#if CRYPTOPP_POWER8_AVAILABLE
|
||||||
const uint32x4_p rk1 = vec_splats(subkeys[i+1]);
|
const uint32x4_p rk1 = vec_splats(subkeys[i+1]);
|
||||||
const uint32x4_p rk2 = vec_splats(subkeys[i]);
|
const uint32x4_p rk2 = vec_splats(subkeys[i]);
|
||||||
#else
|
#else
|
||||||
@ -696,7 +686,7 @@ inline void SIMON64_Enc_6_Blocks(uint32x4_p &block0, uint32x4_p &block1,
|
|||||||
|
|
||||||
for (int i = 0; i < static_cast<int>(rounds & ~1)-1; i += 2)
|
for (int i = 0; i < static_cast<int>(rounds & ~1)-1; i += 2)
|
||||||
{
|
{
|
||||||
#if CRYPTOPP_POWER7_AVAILABLE
|
#if CRYPTOPP_POWER8_AVAILABLE
|
||||||
const uint32x4_p rk1 = vec_splats(subkeys[i]);
|
const uint32x4_p rk1 = vec_splats(subkeys[i]);
|
||||||
const uint32x4_p rk2 = vec_splats(subkeys[i+1]);
|
const uint32x4_p rk2 = vec_splats(subkeys[i+1]);
|
||||||
#else
|
#else
|
||||||
@ -717,7 +707,7 @@ inline void SIMON64_Enc_6_Blocks(uint32x4_p &block0, uint32x4_p &block1,
|
|||||||
|
|
||||||
if (rounds & 1)
|
if (rounds & 1)
|
||||||
{
|
{
|
||||||
#if CRYPTOPP_POWER7_AVAILABLE
|
#if CRYPTOPP_POWER8_AVAILABLE
|
||||||
const uint32x4_p rk = vec_splats(subkeys[rounds-1]);
|
const uint32x4_p rk = vec_splats(subkeys[rounds-1]);
|
||||||
#else
|
#else
|
||||||
const uint8x16_p m = {0,1,2,3, 0,1,2,3, 0,1,2,3, 0,1,2,3};
|
const uint8x16_p m = {0,1,2,3, 0,1,2,3, 0,1,2,3, 0,1,2,3};
|
||||||
@ -771,7 +761,7 @@ inline void SIMON64_Dec_6_Blocks(uint32x4_p &block0, uint32x4_p &block1,
|
|||||||
{
|
{
|
||||||
std::swap(x1, y1); std::swap(x2, y2); std::swap(x3, y3);
|
std::swap(x1, y1); std::swap(x2, y2); std::swap(x3, y3);
|
||||||
|
|
||||||
#if CRYPTOPP_POWER7_AVAILABLE
|
#if CRYPTOPP_POWER8_AVAILABLE
|
||||||
const uint32x4_p rk = vec_splats(subkeys[rounds-1]);
|
const uint32x4_p rk = vec_splats(subkeys[rounds-1]);
|
||||||
#else
|
#else
|
||||||
const uint8x16_p m = {0,1,2,3, 0,1,2,3, 0,1,2,3, 0,1,2,3};
|
const uint8x16_p m = {0,1,2,3, 0,1,2,3, 0,1,2,3, 0,1,2,3};
|
||||||
@ -786,7 +776,7 @@ inline void SIMON64_Dec_6_Blocks(uint32x4_p &block0, uint32x4_p &block1,
|
|||||||
|
|
||||||
for (int i = static_cast<int>(rounds-2); i >= 0; i -= 2)
|
for (int i = static_cast<int>(rounds-2); i >= 0; i -= 2)
|
||||||
{
|
{
|
||||||
#if CRYPTOPP_POWER7_AVAILABLE
|
#if CRYPTOPP_POWER8_AVAILABLE
|
||||||
const uint32x4_p rk1 = vec_splats(subkeys[i+1]);
|
const uint32x4_p rk1 = vec_splats(subkeys[i+1]);
|
||||||
const uint32x4_p rk2 = vec_splats(subkeys[i]);
|
const uint32x4_p rk2 = vec_splats(subkeys[i]);
|
||||||
#else
|
#else
|
||||||
|
13
vendor/cryptopp/vendor_cryptopp/skipjack.h
vendored
13
vendor/cryptopp/vendor_cryptopp/skipjack.h
vendored
@ -2,6 +2,12 @@
|
|||||||
|
|
||||||
/// \file skipjack.h
|
/// \file skipjack.h
|
||||||
/// \brief Classes for the SKIPJACK block cipher
|
/// \brief Classes for the SKIPJACK block cipher
|
||||||
|
/// \details The Crypto++ implementation conforms to SKIPJACK and KEA
|
||||||
|
/// Algorithm Specifications published by NIST in May 1998. The library passes
|
||||||
|
/// known answer tests available in NIST SP800-17, Table 6, pp. 140-42.
|
||||||
|
/// \sa <a href ="http://csrc.nist.gov/encryption/skipjack/skipjack.pdf">SKIPJACK
|
||||||
|
/// and KEA Algorithm Specifications</a> (May 1998), <a
|
||||||
|
/// href="http://www.cryptopp.com/wiki/SKIPJACK">SKIPJACK</a> on the Crypto++ wiki
|
||||||
|
|
||||||
#ifndef CRYPTOPP_SKIPJACK_H
|
#ifndef CRYPTOPP_SKIPJACK_H
|
||||||
#define CRYPTOPP_SKIPJACK_H
|
#define CRYPTOPP_SKIPJACK_H
|
||||||
@ -18,7 +24,12 @@ struct SKIPJACK_Info : public FixedBlockSize<8>, public FixedKeyLength<10>
|
|||||||
};
|
};
|
||||||
|
|
||||||
/// \brief SKIPJACK block cipher
|
/// \brief SKIPJACK block cipher
|
||||||
/// \sa <a href="http://www.cryptopp.com/wiki/SKIPJACK">SKIPJACK</a>
|
/// \details The Crypto++ implementation conforms to SKIPJACK and KEA
|
||||||
|
/// Algorithm Specifications published by NIST in May 1998. The library passes
|
||||||
|
/// known answer tests available in NIST SP800-17, Table 6, pp. 140-42.
|
||||||
|
/// \sa <a href ="http://csrc.nist.gov/encryption/skipjack/skipjack.pdf">SKIPJACK
|
||||||
|
/// and KEA Algorithm Specifications</a> (May 1998), <a
|
||||||
|
/// href="http://www.cryptopp.com/wiki/SKIPJACK">SKIPJACK</a> on the Crypto++ wiki
|
||||||
class SKIPJACK : public SKIPJACK_Info, public BlockCipherDocumentation
|
class SKIPJACK : public SKIPJACK_Info, public BlockCipherDocumentation
|
||||||
{
|
{
|
||||||
/// \brief SKIPJACK block cipher default operation
|
/// \brief SKIPJACK block cipher default operation
|
||||||
|
6
vendor/cryptopp/vendor_cryptopp/speck.cpp
vendored
6
vendor/cryptopp/vendor_cryptopp/speck.cpp
vendored
@ -235,9 +235,9 @@ std::string SPECK64::Base::AlgorithmProvider() const
|
|||||||
if (HasNEON())
|
if (HasNEON())
|
||||||
return "NEON";
|
return "NEON";
|
||||||
# endif
|
# endif
|
||||||
# if (CRYPTOPP_POWER7_AVAILABLE)
|
# if (CRYPTOPP_POWER8_AVAILABLE)
|
||||||
if (HasPower7())
|
if (HasPower8())
|
||||||
return "Power7";
|
return "Power8";
|
||||||
# endif
|
# endif
|
||||||
# if (CRYPTOPP_ALTIVEC_AVAILABLE)
|
# if (CRYPTOPP_ALTIVEC_AVAILABLE)
|
||||||
if (HasAltivec())
|
if (HasAltivec())
|
||||||
|
@ -107,13 +107,8 @@ inline uint64x2_t RotateRight64(const uint64x2_t& val)
|
|||||||
template <>
|
template <>
|
||||||
inline uint64x2_t RotateLeft64<8>(const uint64x2_t& val)
|
inline uint64x2_t RotateLeft64<8>(const uint64x2_t& val)
|
||||||
{
|
{
|
||||||
#if (CRYPTOPP_BIG_ENDIAN)
|
|
||||||
const uint8_t maskb[16] = { 14,13,12,11, 10,9,8,15, 6,5,4,3, 2,1,0,7 };
|
|
||||||
const uint8x16_t mask = vld1q_u8(maskb);
|
|
||||||
#else
|
|
||||||
const uint8_t maskb[16] = { 7,0,1,2, 3,4,5,6, 15,8,9,10, 11,12,13,14 };
|
const uint8_t maskb[16] = { 7,0,1,2, 3,4,5,6, 15,8,9,10, 11,12,13,14 };
|
||||||
const uint8x16_t mask = vld1q_u8(maskb);
|
const uint8x16_t mask = vld1q_u8(maskb);
|
||||||
#endif
|
|
||||||
|
|
||||||
return vreinterpretq_u64_u8(
|
return vreinterpretq_u64_u8(
|
||||||
vqtbl1q_u8(vreinterpretq_u8_u64(val), mask));
|
vqtbl1q_u8(vreinterpretq_u8_u64(val), mask));
|
||||||
@ -123,13 +118,8 @@ inline uint64x2_t RotateLeft64<8>(const uint64x2_t& val)
|
|||||||
template <>
|
template <>
|
||||||
inline uint64x2_t RotateRight64<8>(const uint64x2_t& val)
|
inline uint64x2_t RotateRight64<8>(const uint64x2_t& val)
|
||||||
{
|
{
|
||||||
#if (CRYPTOPP_BIG_ENDIAN)
|
|
||||||
const uint8_t maskb[16] = { 8,15,14,13, 12,11,10,9, 0,7,6,5, 4,3,2,1 };
|
|
||||||
const uint8x16_t mask = vld1q_u8(maskb);
|
|
||||||
#else
|
|
||||||
const uint8_t maskb[16] = { 1,2,3,4, 5,6,7,0, 9,10,11,12, 13,14,15,8 };
|
const uint8_t maskb[16] = { 1,2,3,4, 5,6,7,0, 9,10,11,12, 13,14,15,8 };
|
||||||
const uint8x16_t mask = vld1q_u8(maskb);
|
const uint8x16_t mask = vld1q_u8(maskb);
|
||||||
#endif
|
|
||||||
|
|
||||||
return vreinterpretq_u64_u8(
|
return vreinterpretq_u64_u8(
|
||||||
vqtbl1q_u8(vreinterpretq_u8_u64(val), mask));
|
vqtbl1q_u8(vreinterpretq_u8_u64(val), mask));
|
||||||
|
18
vendor/cryptopp/vendor_cryptopp/speck64_simd.cpp
vendored
18
vendor/cryptopp/vendor_cryptopp/speck64_simd.cpp
vendored
@ -105,13 +105,8 @@ inline uint32x4_t RotateRight32(const uint32x4_t& val)
|
|||||||
template <>
|
template <>
|
||||||
inline uint32x4_t RotateLeft32<8>(const uint32x4_t& val)
|
inline uint32x4_t RotateLeft32<8>(const uint32x4_t& val)
|
||||||
{
|
{
|
||||||
#if (CRYPTOPP_BIG_ENDIAN)
|
|
||||||
const uint8_t maskb[16] = { 14,13,12,15, 10,9,8,11, 6,5,4,7, 2,1,0,3 };
|
|
||||||
const uint8x16_t mask = vld1q_u8(maskb);
|
|
||||||
#else
|
|
||||||
const uint8_t maskb[16] = { 3,0,1,2, 7,4,5,6, 11,8,9,10, 15,12,13,14 };
|
const uint8_t maskb[16] = { 3,0,1,2, 7,4,5,6, 11,8,9,10, 15,12,13,14 };
|
||||||
const uint8x16_t mask = vld1q_u8(maskb);
|
const uint8x16_t mask = vld1q_u8(maskb);
|
||||||
#endif
|
|
||||||
|
|
||||||
return vreinterpretq_u32_u8(
|
return vreinterpretq_u32_u8(
|
||||||
vqtbl1q_u8(vreinterpretq_u8_u32(val), mask));
|
vqtbl1q_u8(vreinterpretq_u8_u32(val), mask));
|
||||||
@ -121,13 +116,8 @@ inline uint32x4_t RotateLeft32<8>(const uint32x4_t& val)
|
|||||||
template <>
|
template <>
|
||||||
inline uint32x4_t RotateRight32<8>(const uint32x4_t& val)
|
inline uint32x4_t RotateRight32<8>(const uint32x4_t& val)
|
||||||
{
|
{
|
||||||
#if (CRYPTOPP_BIG_ENDIAN)
|
|
||||||
const uint8_t maskb[16] = { 12,15,14,13, 8,11,10,9, 4,7,6,5, 0,3,2,1 };
|
|
||||||
const uint8x16_t mask = vld1q_u8(maskb);
|
|
||||||
#else
|
|
||||||
const uint8_t maskb[16] = { 1,2,3,0, 5,6,7,4, 9,10,11,8, 13,14,15,12 };
|
const uint8_t maskb[16] = { 1,2,3,0, 5,6,7,4, 9,10,11,8, 13,14,15,12 };
|
||||||
const uint8x16_t mask = vld1q_u8(maskb);
|
const uint8x16_t mask = vld1q_u8(maskb);
|
||||||
#endif
|
|
||||||
|
|
||||||
return vreinterpretq_u32_u8(
|
return vreinterpretq_u32_u8(
|
||||||
vqtbl1q_u8(vreinterpretq_u8_u32(val), mask));
|
vqtbl1q_u8(vreinterpretq_u8_u32(val), mask));
|
||||||
@ -517,7 +507,7 @@ void SPECK64_Enc_Block(uint32x4_p &block0, uint32x4_p &block1,
|
|||||||
|
|
||||||
for (int i=0; i < static_cast<int>(rounds); ++i)
|
for (int i=0; i < static_cast<int>(rounds); ++i)
|
||||||
{
|
{
|
||||||
#if CRYPTOPP_POWER7_AVAILABLE
|
#if CRYPTOPP_POWER8_AVAILABLE
|
||||||
const uint32x4_p rk = vec_splats(subkeys[i]);
|
const uint32x4_p rk = vec_splats(subkeys[i]);
|
||||||
#else
|
#else
|
||||||
// subkeys has extra elements so memory backs the last subkey
|
// subkeys has extra elements so memory backs the last subkey
|
||||||
@ -564,7 +554,7 @@ void SPECK64_Dec_Block(uint32x4_p &block0, uint32x4_p &block1,
|
|||||||
|
|
||||||
for (int i = static_cast<int>(rounds-1); i >= 0; --i)
|
for (int i = static_cast<int>(rounds-1); i >= 0; --i)
|
||||||
{
|
{
|
||||||
#if CRYPTOPP_POWER7_AVAILABLE
|
#if CRYPTOPP_POWER8_AVAILABLE
|
||||||
const uint32x4_p rk = vec_splats(subkeys[i]);
|
const uint32x4_p rk = vec_splats(subkeys[i]);
|
||||||
#else
|
#else
|
||||||
// subkeys has extra elements so memory backs the last subkey
|
// subkeys has extra elements so memory backs the last subkey
|
||||||
@ -616,7 +606,7 @@ void SPECK64_Enc_6_Blocks(uint32x4_p &block0, uint32x4_p &block1,
|
|||||||
|
|
||||||
for (int i=0; i < static_cast<int>(rounds); ++i)
|
for (int i=0; i < static_cast<int>(rounds); ++i)
|
||||||
{
|
{
|
||||||
#if CRYPTOPP_POWER7_AVAILABLE
|
#if CRYPTOPP_POWER8_AVAILABLE
|
||||||
const uint32x4_p rk = vec_splats(subkeys[i]);
|
const uint32x4_p rk = vec_splats(subkeys[i]);
|
||||||
#else
|
#else
|
||||||
// subkeys has extra elements so memory backs the last subkey
|
// subkeys has extra elements so memory backs the last subkey
|
||||||
@ -685,7 +675,7 @@ void SPECK64_Dec_6_Blocks(uint32x4_p &block0, uint32x4_p &block1,
|
|||||||
|
|
||||||
for (int i = static_cast<int>(rounds-1); i >= 0; --i)
|
for (int i = static_cast<int>(rounds-1); i >= 0; --i)
|
||||||
{
|
{
|
||||||
#if CRYPTOPP_POWER7_AVAILABLE
|
#if CRYPTOPP_POWER8_AVAILABLE
|
||||||
const uint32x4_p rk = vec_splats(subkeys[i]);
|
const uint32x4_p rk = vec_splats(subkeys[i]);
|
||||||
#else
|
#else
|
||||||
// subkeys has extra elements so memory backs the last subkey
|
// subkeys has extra elements so memory backs the last subkey
|
||||||
|
58
vendor/cryptopp/vendor_cryptopp/validat5.cpp
vendored
58
vendor/cryptopp/vendor_cryptopp/validat5.cpp
vendored
@ -265,13 +265,13 @@ bool ValidateSHAKE_XOF()
|
|||||||
|
|
||||||
StringSource(msg, true, new HexDecoder(new StringSink(m)));
|
StringSource(msg, true, new HexDecoder(new StringSink(m)));
|
||||||
StringSource(out, true, new HexDecoder(new StringSink(o)));
|
StringSource(out, true, new HexDecoder(new StringSink(o)));
|
||||||
r.reserve(o.size());
|
r.resize(o.size());
|
||||||
|
|
||||||
SHAKE128 hash((unsigned int)r.size());
|
SHAKE128 hash((unsigned int)o.size());
|
||||||
hash.Update((const byte*)&m[0], m.size());
|
hash.Update(ConstBytePtr(m), BytePtrSize(m));
|
||||||
hash.TruncatedFinal((byte*)&o[0], o.size());
|
hash.TruncatedFinal(BytePtr(r), BytePtrSize(r));
|
||||||
|
|
||||||
fail = (std::memcmp(r.data(), r.data(), o.size()) != 0);
|
fail = (std::memcmp(r.data(), o.data(), o.size()) != 0);
|
||||||
pass = pass & !fail;
|
pass = pass & !fail;
|
||||||
|
|
||||||
if (fail)
|
if (fail)
|
||||||
@ -292,13 +292,13 @@ bool ValidateSHAKE_XOF()
|
|||||||
|
|
||||||
StringSource(msg, true, new HexDecoder(new StringSink(m)));
|
StringSource(msg, true, new HexDecoder(new StringSink(m)));
|
||||||
StringSource(out, true, new HexDecoder(new StringSink(o)));
|
StringSource(out, true, new HexDecoder(new StringSink(o)));
|
||||||
r.reserve(o.size());
|
r.resize(o.size());
|
||||||
|
|
||||||
SHAKE128 hash((unsigned int)r.size());
|
SHAKE128 hash((unsigned int)o.size());
|
||||||
hash.Update((const byte*)&m[0], m.size());
|
hash.Update(ConstBytePtr(m), BytePtrSize(m));
|
||||||
hash.TruncatedFinal((byte*)&o[0], o.size());
|
hash.TruncatedFinal(BytePtr(r), BytePtrSize(r));
|
||||||
|
|
||||||
fail = (std::memcmp(r.data(), r.data(), o.size()) != 0);
|
fail = (std::memcmp(r.data(), o.data(), o.size()) != 0);
|
||||||
pass = pass & !fail;
|
pass = pass & !fail;
|
||||||
|
|
||||||
if (fail)
|
if (fail)
|
||||||
@ -317,13 +317,13 @@ bool ValidateSHAKE_XOF()
|
|||||||
|
|
||||||
StringSource(msg, true, new HexDecoder(new StringSink(m)));
|
StringSource(msg, true, new HexDecoder(new StringSink(m)));
|
||||||
StringSource(out, true, new HexDecoder(new StringSink(o)));
|
StringSource(out, true, new HexDecoder(new StringSink(o)));
|
||||||
r.reserve(o.size());
|
r.resize(o.size());
|
||||||
|
|
||||||
SHAKE256 hash((unsigned int)r.size());
|
SHAKE256 hash((unsigned int)o.size());
|
||||||
hash.Update((const byte*)&m[0], m.size());
|
hash.Update(ConstBytePtr(m), BytePtrSize(m));
|
||||||
hash.TruncatedFinal((byte*)&o[0], o.size());
|
hash.TruncatedFinal(BytePtr(r), BytePtrSize(r));
|
||||||
|
|
||||||
fail = (std::memcmp(r.data(), r.data(), o.size()) != 0);
|
fail = (std::memcmp(r.data(), o.data(), o.size()) != 0);
|
||||||
pass = pass & !fail;
|
pass = pass & !fail;
|
||||||
|
|
||||||
if (fail)
|
if (fail)
|
||||||
@ -347,13 +347,13 @@ bool ValidateSHAKE_XOF()
|
|||||||
|
|
||||||
StringSource(msg, true, new HexDecoder(new StringSink(m)));
|
StringSource(msg, true, new HexDecoder(new StringSink(m)));
|
||||||
StringSource(out, true, new HexDecoder(new StringSink(o)));
|
StringSource(out, true, new HexDecoder(new StringSink(o)));
|
||||||
r.reserve(o.size());
|
r.resize(o.size());
|
||||||
|
|
||||||
SHAKE256 hash((unsigned int)r.size());
|
SHAKE256 hash((unsigned int)o.size());
|
||||||
hash.Update((const byte*)&m[0], m.size());
|
hash.Update(ConstBytePtr(m), BytePtrSize(m));
|
||||||
hash.TruncatedFinal((byte*)&o[0], o.size());
|
hash.TruncatedFinal(BytePtr(r), BytePtrSize(r));
|
||||||
|
|
||||||
fail = (std::memcmp(r.data(), r.data(), o.size()) != 0);
|
fail = (std::memcmp(r.data(), o.data(), o.size()) != 0);
|
||||||
pass = pass & !fail;
|
pass = pass & !fail;
|
||||||
|
|
||||||
if (fail)
|
if (fail)
|
||||||
@ -362,7 +362,7 @@ bool ValidateSHAKE_XOF()
|
|||||||
pass = pass && !fail;
|
pass = pass && !fail;
|
||||||
}
|
}
|
||||||
|
|
||||||
std::cout << (!pass ? "FAILED " : "passed ") << " SHAKE XOF message digests" << std::endl;
|
std::cout << (!pass ? "FAILED " : "passed ") << "SHAKE XOF message digests" << std::endl;
|
||||||
|
|
||||||
return pass;
|
return pass;
|
||||||
}
|
}
|
||||||
@ -729,11 +729,11 @@ bool TestPBKDF(KeyDerivationFunction &pbkdf, const PBKDF_TestTuple *testSet, uns
|
|||||||
|
|
||||||
double timeInSeconds = 0.0f;
|
double timeInSeconds = 0.0f;
|
||||||
AlgorithmParameters params = MakeParameters("Purpose", (int)tuple.purpose)
|
AlgorithmParameters params = MakeParameters("Purpose", (int)tuple.purpose)
|
||||||
(Name::Salt(), ConstByteArrayParameter((const byte*)&salt[0], salt.size()))
|
(Name::Salt(), ConstByteArrayParameter(ConstBytePtr(salt), BytePtrSize(salt)))
|
||||||
("Iterations", (int)tuple.iterations)("TimeInSeconds", timeInSeconds);
|
("Iterations", (int)tuple.iterations)("TimeInSeconds", timeInSeconds);
|
||||||
|
|
||||||
SecByteBlock derived(derivedKey.size());
|
SecByteBlock derived(derivedKey.size());
|
||||||
pbkdf.DeriveKey(derived, derived.size(), (const byte *)password.data(), password.size(), params);
|
pbkdf.DeriveKey(derived, derived.size(), ConstBytePtr(password), BytePtrSize(password), params);
|
||||||
bool fail = !!memcmp(derived, derivedKey.data(), derived.size()) != 0;
|
bool fail = !!memcmp(derived, derivedKey.data(), derived.size()) != 0;
|
||||||
pass = pass && !fail;
|
pass = pass && !fail;
|
||||||
|
|
||||||
@ -815,13 +815,13 @@ bool TestHKDF(KeyDerivationFunction &kdf, const HKDF_TestTuple *testSet, unsigne
|
|||||||
|
|
||||||
AlgorithmParameters params;
|
AlgorithmParameters params;
|
||||||
if (tuple.hexSalt)
|
if (tuple.hexSalt)
|
||||||
params(Name::Salt(), ConstByteArrayParameter((const byte*)&salt[0], salt.size()));
|
params(Name::Salt(), ConstByteArrayParameter(ConstBytePtr(salt), BytePtrSize(salt)));
|
||||||
if (tuple.hexSalt)
|
if (tuple.hexSalt)
|
||||||
params("Info", ConstByteArrayParameter((const byte*)&info[0], info.size()));
|
params("Info", ConstByteArrayParameter(ConstBytePtr(info), BytePtrSize(info)));
|
||||||
|
|
||||||
kdf.DeriveKey((byte*)&derived[0], derived.size(), (const byte*)&secret[0], secret.size(), params);
|
kdf.DeriveKey(derived, derived.size(), ConstBytePtr(secret), BytePtrSize(secret), params);
|
||||||
|
|
||||||
bool fail = !VerifyBufsEqual(derived, (const byte*)&expected[0], derived.size());
|
bool fail = !VerifyBufsEqual(derived, ConstBytePtr(expected), BytePtrSize(expected));
|
||||||
pass = pass && !fail;
|
pass = pass && !fail;
|
||||||
|
|
||||||
HexEncoder enc(new FileSink(std::cout));
|
HexEncoder enc(new FileSink(std::cout));
|
||||||
@ -946,10 +946,10 @@ bool TestScrypt(KeyDerivationFunction &pbkdf, const Scrypt_TestTuple *testSet, u
|
|||||||
|
|
||||||
AlgorithmParameters params = MakeParameters("Cost", (word64)tuple.n)
|
AlgorithmParameters params = MakeParameters("Cost", (word64)tuple.n)
|
||||||
("BlockSize", (word64)tuple.r)("Parallelization", (word64)tuple.p)
|
("BlockSize", (word64)tuple.r)("Parallelization", (word64)tuple.p)
|
||||||
(Name::Salt(), ConstByteArrayParameter((const byte*)&salt[0], salt.size()));
|
(Name::Salt(), ConstByteArrayParameter(ConstBytePtr(salt), BytePtrSize(salt)));
|
||||||
|
|
||||||
SecByteBlock derived(expect.size());
|
SecByteBlock derived(expect.size());
|
||||||
pbkdf.DeriveKey(derived, derived.size(), (const byte *)password.data(), password.size(), params);
|
pbkdf.DeriveKey(derived, derived.size(), ConstBytePtr(password), BytePtrSize(password), params);
|
||||||
bool fail = !!memcmp(derived, expect.data(), expect.size()) != 0;
|
bool fail = !!memcmp(derived, expect.data(), expect.size()) != 0;
|
||||||
pass = pass && !fail;
|
pass = pass && !fail;
|
||||||
|
|
||||||
|
7
vendor/cryptopp/vendor_cryptopp/xed25519.h
vendored
7
vendor/cryptopp/vendor_cryptopp/xed25519.h
vendored
@ -66,6 +66,13 @@ public:
|
|||||||
|
|
||||||
virtual ~x25519() {}
|
virtual ~x25519() {}
|
||||||
|
|
||||||
|
/// \brief Create a x25519 object
|
||||||
|
/// \details This constructor creates an empty x25519 object. It is
|
||||||
|
/// intended for use in loading existing parameters, like CryptoBox
|
||||||
|
/// parameters. If you are perfoming key agreement you should use a
|
||||||
|
/// constructor that generates random parameters on construction.
|
||||||
|
x25519() {}
|
||||||
|
|
||||||
/// \brief Create a x25519 object
|
/// \brief Create a x25519 object
|
||||||
/// \param y public key
|
/// \param y public key
|
||||||
/// \param x private key
|
/// \param x private key
|
||||||
|
Loading…
Reference in New Issue
Block a user