8
0

Commit Graph

  • 1e09d856bb Accepting request 1238292 from devel:libraries:c_c++ main factory Ana Guerrero 2025-01-16 19:23:55 +00:00
  • e7a446f6da - Update to v2.0: * YASM support removed. * CMake: CET support added, man page installation fix, FreeBSD support added. * Replaced Makefiles with CMake as default build system. * Updated style check to clang-format version 18. * AES-GCM: reduced binary size, small packet optimization, removed AVX512 type 1, improved AVX2 type 1, new AVX2 type 2 added. * DES, 3DES/TDES and DES-DOCSIS: binary size reduction, reduced stack frame size, re-used common transpose macros. * Fixed LFSR update in single buffer ZUC API implementation. * SM4: added SM4-CTR and SM4-GCM SSE code, added AVX2-SM4-NI code for SM4-GCM, SM4-CTR, SM4-CBC and SM4-ECB. * SHA2-512/384 & and HMAC-SHA2-512/384: added AVX2-SHA512-NI single-buffer and x2 multi-buffer code. * SM3 and SM3-HMAC: added SM3-NI implementations. * Added AES-CFB SSE type 1 and AVX512 type 2 implementations. * Removed AESNI emulation support. * Removed AVX Type 2 implementation. * Removed AES-CMAC, AES-CCM, AES-CBC and AES-ECB x4 and by4 implementations from SSE type 1. * Removed AVX type 1 implementations: SHA/MD5, CHACHA20-POLY1305, SNOW3G and KASUMI. * Removed AVX architecture type. * Changed SHA1 on AVX2 type 4 architecture to use multi-buffer implementation. * Added check for XSAVE and OSXSAVE CPUID features for any AVX architecture type. * Extended cipher burst API support with: AES-ECB, AES-CFB. * Extended hash burst API support with: SHA1, SHA2-384/512, AES-CMAC. * Added AEAD burst API with AES-CCM support. * Added new API to retrieve optimal minimum burst size for hash, cipher and AEAD API's. - Fixed issues: * Version 1.5 fails to build on FreeBSD 13.2 (amd64) using CMake (issue #136) * Make CMake builds behave more "normal" (issue #141) * printf in lib code prevents using ipsec-mb in SGX environment (issue #142) * EEA3(ZUC) 1 Buffer implementation LFSR update can result in invalid LFSR state, causing incorrect keystream generation (issue #144) * Possible regression: init_mb_mgr_avx() corrupts state on Windows (issue #147) * Crash seen on VMware with dpdk crypto using ipsec-mb library (issue #153) devel Tomasz Kantecki 2025-01-16 15:37:04 +00:00
  • 7910c2558d Accepting request 1127317 from devel:libraries:c_c++ Ana Guerrero 2023-11-17 19:51:06 +00:00
  • 7500f2513b v1.5 update Tomasz Kantecki 2023-11-17 14:01:08 +00:00
  • aedad3bfd1 v1.5 update Tomasz Kantecki 2023-11-17 13:28:04 +00:00
  • 50796b56e2 Accepting request 1103128 from devel:libraries:c_c++ Dominique Leuenberger 2023-08-09 15:26:07 +00:00
  • af200c1227 * POLY1305 AVX2 with AVX-IFMA instructions added. * Optimized GHASH component in AVX512 VAES (type2) AES-GCM implementation. * Implemented a workaround for false load-block condition in SSE and AVX2 AES-GCM implementations. * Removed AVX AES-GCM implementation, its API symbols map to the SSE implementation. * QUIC header protection API added. * QUIC AES-GCM-128/256 AEAD API added. * Removed v0.53 (and older) compatibility symbol mapping (NO_COMPAT_IMB_API_053 not defined). * ZUC AVX2-GFNI implementation added. * SHA-NI instructions enabled to use in SHA1/224/256 direct API * New API (imb_set_session) added to be used with burst API, helping speeding up the crypto scheduling. * New API added to calculate IPAD/OPAD for SHAx-HMAC. * New direct API added to calculate DES-CFB and AES-CFB-256 on a single block. - Fixed issues: * MB_MGR corruption at initialization * Performance scaling Tomasz Kantecki 2023-08-09 11:12:30 +00:00
  • 0d6bf371fa - Update to v1.4: + POLY1305 AVX2 with AVX-IFMA instructions added. + Optimized GHASH component in AVX512 VAES (type2) AES-GCM implementation. + Implemented a workaround for false load-block condition in SSE and AVX2 AES-GCM implementations. + Removed AVX AES-GCM implementation, its API symbols map to the SSE implementation. + QUIC header protection API added. + QUIC AES-GCM-128/256 AEAD API added. + Removed v0.53 (and older) compatibility symbol mapping (NO_COMPAT_IMB_API_053 not defined). + ZUC AVX2-GFNI implementation added. + SHA-NI instructions enabled to use in SHA1/224/256 direct API + New API (imb_set_session) added to be used with burst API, helping speeding up the crypto scheduling. + New API added to calculate IPAD/OPAD for SHAx-HMAC. + New direct API added to calculate DES-CFB and AES-CFB-256 on a single block. + Fixed issues: ++ MB_MGR corruption at initialization ++ performance scaling - More details at https://github.com/intel/intel-ipsec-mb/releases/tag/v1.4 Tomasz Kantecki 2023-08-09 10:39:40 +00:00
  • 7463b87d39 - Update for release package v1.4 Tomasz Kantecki 2023-08-09 08:37:35 +00:00
  • e62bfd32b9 - Update for release package v.14 Tomasz Kantecki 2023-08-08 23:25:06 +00:00
  • 01df09a62c - Update for release package v1.4 Tomasz Kantecki 2023-08-08 23:09:41 +00:00
  • 05318cf228 Accepting request 1008205 from devel:libraries:c_c++ Richard Brown 2022-10-06 05:42:27 +00:00
  • 057e566252 Accepting request 1008202 from home:smcintyr:branches:devel:libraries:c_c++ Stephen Mcintyre 2022-10-05 13:00:42 +00:00
  • ad45d391bb Accepting request 966844 from devel:libraries:c_c++ Dominique Leuenberger 2022-04-04 17:26:59 +00:00
  • 1b82c25c74 OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/intel-ipsec-mb?expand=0&rev=11 Stephen Mcintyre 2022-04-04 14:20:43 +00:00
  • 38f80a10d3 Accepting request 966272 from home:jengelh:branches:devel:libraries:c_c++ Stephen Mcintyre 2022-03-31 19:31:01 +00:00
  • 4177ace953 OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/intel-ipsec-mb?expand=0&rev=9 Stephen Mcintyre 2022-03-31 17:07:32 +00:00
  • d6d93ebe2d OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/intel-ipsec-mb?expand=0&rev=8 Stephen Mcintyre 2022-03-30 14:53:04 +00:00
  • 7cc5ad1b77 OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/intel-ipsec-mb?expand=0&rev=7 Stephen Mcintyre 2022-03-30 14:50:34 +00:00
  • 24f546ecbb OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/intel-ipsec-mb?expand=0&rev=6 Stephen Mcintyre 2022-03-30 14:46:39 +00:00
  • 415d30a13b OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/intel-ipsec-mb?expand=0&rev=5 Stephen Mcintyre 2022-03-30 14:45:39 +00:00
  • dc606e096a OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/intel-ipsec-mb?expand=0&rev=4 Stephen Mcintyre 2022-03-30 14:44:42 +00:00
  • 58663d3d3d OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/intel-ipsec-mb?expand=0&rev=3 Stephen Mcintyre 2022-03-30 13:39:30 +00:00
  • 327fa6ef9f Accepting request 964714 from home:jengelh:branches:devel:libraries:c_c++ Stephen Mcintyre 2022-03-24 20:18:16 +00:00
  • 8d761b5cec Accepting request 964704 from home:smcintyr Marcus Meissner 2022-03-24 16:25:18 +00:00