Intel(R) Multi-Buffer Crypto for IPsec Library
https://github.com/intel/intel-ipsec-mb
The library provides software crypto acceleration primarily targeting packet processing applications. It can be used for application such as: IPsec, TLS, Wireless (RAN), Cable or MPEG DRM
- Developed at devel:libraries:c_c++
-
2
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory/intel-ipsec-mb && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
intel-ipsec-mb-1.4.tar.gz | 0002187918 2.09 MB | |
intel-ipsec-mb.changes | 0000001754 1.71 KB | |
intel-ipsec-mb.spec | 0000003365 3.29 KB |
Revision 3 (latest revision is 4)
Dominique Leuenberger (dimstar_suse)
accepted
request 1103128
from
Tomasz Kantecki (tkanteck)
(revision 3)
- Update to v1.4: * POLY1305 AVX2 with AVX-IFMA instructions added. * Optimized GHASH component in AVX512 VAES (type2) AES-GCM implementation. * Implemented a workaround for false load-block condition in SSE and AVX2 AES-GCM implementations. * Removed AVX AES-GCM implementation, its API symbols map to the SSE implementation. * QUIC header protection API added. * QUIC AES-GCM-128/256 AEAD API added. * Removed v0.53 (and older) compatibility symbol mapping (NO_COMPAT_IMB_API_053 not defined). * ZUC AVX2-GFNI implementation added. * SHA-NI instructions enabled to use in SHA1/224/256 direct API * New API (imb_set_session) added to be used with burst API, helping speeding up the crypto scheduling. * New API added to calculate IPAD/OPAD for SHAx-HMAC. * New direct API added to calculate DES-CFB and AES-CFB-256 on a single block. - Fixed issues: * MB_MGR corruption at initialization * Performance scaling - More details at https://github.com/intel/intel-ipsec-mb/releases/tag/v1.4
Comments 0