Revisions of intel-ipsec-mb
Ana Guerrero (anag+factory)
accepted
request 1127317
from
Tomasz Kantecki (tkanteck)
(revision 4)
- Update to v1.5: * CMake MinGW support added. * QUIC CHACHA20-POLY1305 and CHACHA20 HP API added. * AVX2-VAES AES-CTR and AES-GCM implementations added. * SSE SM4-ECB and SM4-CBC implementations added. * x86-64 SM3 and SM3-HMAC implementations added. * Self-Test callback functionality added with message corrupt option. * Implemented a workaround for false load-block condition in SSE AES-CBC implementations. * Optimized CRC32 algorithms, AES-GCM AVX2 and AES-GCM AVX512 implementations. * Updated ACVP app (imb-acvp) to support libacvp v2.0+. * Test vector format standardized for various algorithms (CBC/CFB/CTR/ECB/DES/GCM/CCM/CHACHA20-POLY/SNOW3G/ZUC/KASUMI/SNOW-V). * Extended xvalid app to test burst API. * Burst API is used by default in imb-perf tool. - Fixed issues: * CMake files ignore LIB_INSTALL_DIR and incorrectly put the shared libraries in /usr/lib (issue #125) * The CMakefile does not install the headers (normal Makefile does) (issue #126) * File ./test/acvp-app/utils.o is not removed after "make clean" (issue #130) * nasm can not find .inc .asm files when building with CMake (issue #131) - More details at https://github.com/intel/intel-ipsec-mb/releases/tag/v1.5
Dominique Leuenberger (dimstar_suse)
accepted
request 1103128
from
Tomasz Kantecki (tkanteck)
(revision 3)
- Update to v1.4: * POLY1305 AVX2 with AVX-IFMA instructions added. * Optimized GHASH component in AVX512 VAES (type2) AES-GCM implementation. * Implemented a workaround for false load-block condition in SSE and AVX2 AES-GCM implementations. * Removed AVX AES-GCM implementation, its API symbols map to the SSE implementation. * QUIC header protection API added. * QUIC AES-GCM-128/256 AEAD API added. * Removed v0.53 (and older) compatibility symbol mapping (NO_COMPAT_IMB_API_053 not defined). * ZUC AVX2-GFNI implementation added. * SHA-NI instructions enabled to use in SHA1/224/256 direct API * New API (imb_set_session) added to be used with burst API, helping speeding up the crypto scheduling. * New API added to calculate IPAD/OPAD for SHAx-HMAC. * New direct API added to calculate DES-CFB and AES-CFB-256 on a single block. - Fixed issues: * MB_MGR corruption at initialization * Performance scaling - More details at https://github.com/intel/intel-ipsec-mb/releases/tag/v1.4
Richard Brown (RBrownFactory)
accepted
request 1008205
from
Stephen Mcintyre (smcintyr)
(revision 2)
Dominique Leuenberger (dimstar_suse)
accepted
request 966844
from
Stephen Mcintyre (smcintyr)
(revision 1)
Displaying all 4 revisions