2 Commits

Author SHA256 Message Date
1e09d856bb Accepting request 1238292 from devel:libraries:c_c++
- Update to v2.0:
  * YASM support removed.
  * CMake: CET support added, man page installation fix, FreeBSD support added.
  * Replaced Makefiles with CMake as default build system.
  * Updated style check to clang-format version 18.
  * AES-GCM: reduced binary size, small packet optimization, removed AVX512 type 1, improved AVX2 type 1, new AVX2 type 2 added.
  * DES, 3DES/TDES and DES-DOCSIS: binary size reduction, reduced stack frame size, re-used common transpose macros.
  * Fixed LFSR update in single buffer ZUC API implementation.
  * SM4: added SM4-CTR and SM4-GCM SSE code, added AVX2-SM4-NI code for SM4-GCM, SM4-CTR, SM4-CBC and SM4-ECB.
  * SHA2-512/384 & and HMAC-SHA2-512/384: added AVX2-SHA512-NI single-buffer and x2 multi-buffer code.
  * SM3 and SM3-HMAC: added SM3-NI implementations.
  * Added AES-CFB SSE type 1 and AVX512 type 2 implementations.
  * Removed AESNI emulation support.
  * Removed AVX Type 2 implementation.
  * Removed AES-CMAC, AES-CCM, AES-CBC and AES-ECB x4 and by4 implementations from SSE type 1.
  * Removed AVX type 1 implementations: SHA/MD5, CHACHA20-POLY1305, SNOW3G and KASUMI.
  * Removed AVX architecture type.
  * Changed SHA1 on AVX2 type 4 architecture to use multi-buffer implementation.
  * Added check for XSAVE and OSXSAVE CPUID features for any AVX architecture type.
  * Extended cipher burst API support with: AES-ECB, AES-CFB.
  * Extended hash burst API support with: SHA1, SHA2-384/512, AES-CMAC.
  * Added AEAD burst API with AES-CCM support.
  * Added new API to retrieve optimal minimum burst size for hash, cipher and AEAD API's.
- Fixed issues:
  * Version 1.5 fails to build on FreeBSD 13.2 (amd64) using CMake (issue #136)
  * Make CMake builds behave more "normal" (issue #141)
  * printf in lib code prevents using ipsec-mb in SGX environment (issue #142)
  * EEA3(ZUC) 1 Buffer implementation LFSR update can result in invalid LFSR state, causing incorrect keystream generation (issue #144)
  * Possible regression: init_mb_mgr_avx() corrupts state on Windows (issue #147)
  * Crash seen on VMware with dpdk crypto using ipsec-mb library (issue #153)

OBS-URL: https://build.opensuse.org/request/show/1238292
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/intel-ipsec-mb?expand=0&rev=5
2025-01-16 19:23:55 +00:00
Tomasz Kantecki
e7a446f6da - Update to v2.0:
* YASM support removed.
  * CMake: CET support added, man page installation fix, FreeBSD support added.
  * Replaced Makefiles with CMake as default build system.
  * Updated style check to clang-format version 18.
  * AES-GCM: reduced binary size, small packet optimization, removed AVX512 type 1, improved AVX2 type 1, new AVX2 type 2 added.
  * DES, 3DES/TDES and DES-DOCSIS: binary size reduction, reduced stack frame size, re-used common transpose macros.
  * Fixed LFSR update in single buffer ZUC API implementation.
  * SM4: added SM4-CTR and SM4-GCM SSE code, added AVX2-SM4-NI code for SM4-GCM, SM4-CTR, SM4-CBC and SM4-ECB.
  * SHA2-512/384 & and HMAC-SHA2-512/384: added AVX2-SHA512-NI single-buffer and x2 multi-buffer code.
  * SM3 and SM3-HMAC: added SM3-NI implementations.
  * Added AES-CFB SSE type 1 and AVX512 type 2 implementations.
  * Removed AESNI emulation support.
  * Removed AVX Type 2 implementation.
  * Removed AES-CMAC, AES-CCM, AES-CBC and AES-ECB x4 and by4 implementations from SSE type 1.
  * Removed AVX type 1 implementations: SHA/MD5, CHACHA20-POLY1305, SNOW3G and KASUMI.
  * Removed AVX architecture type.
  * Changed SHA1 on AVX2 type 4 architecture to use multi-buffer implementation.
  * Added check for XSAVE and OSXSAVE CPUID features for any AVX architecture type.
  * Extended cipher burst API support with: AES-ECB, AES-CFB.
  * Extended hash burst API support with: SHA1, SHA2-384/512, AES-CMAC.
  * Added AEAD burst API with AES-CCM support.
  * Added new API to retrieve optimal minimum burst size for hash, cipher and AEAD API's.
- Fixed issues:
  * Version 1.5 fails to build on FreeBSD 13.2 (amd64) using CMake (issue #136)
  * Make CMake builds behave more "normal" (issue #141)
  * printf in lib code prevents using ipsec-mb in SGX environment (issue #142)
  * EEA3(ZUC) 1 Buffer implementation LFSR update can result in invalid LFSR state, causing incorrect keystream generation (issue #144)
  * Possible regression: init_mb_mgr_avx() corrupts state on Windows (issue #147)
  * Crash seen on VMware with dpdk crypto using ipsec-mb library (issue #153)

OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/intel-ipsec-mb?expand=0&rev=24
2025-01-16 15:37:04 +00:00
4 changed files with 41 additions and 6 deletions

View File

@@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:abe166f61487cdf12c093e945058b01085750b6eb6705a3011c3b5aa8a57b1a6
size 2275352

View File

@@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:20860295c6c765bf55cbd739fff71996de32dbb5bb527da93f49233ce348f8cf
size 2559162

View File

@@ -1,3 +1,38 @@
-------------------------------------------------------------------
Thu Jan 16 15:35:49 UTC 2025 - Tomasz Kantecki <tomasz.kantecki@intel.com>
- Update to v2.0:
* YASM support removed.
* CMake: CET support added, man page installation fix, FreeBSD support added.
* Replaced Makefiles with CMake as default build system.
* Updated style check to clang-format version 18.
* AES-GCM: reduced binary size, small packet optimization, removed AVX512 type 1, improved AVX2 type 1, new AVX2 type 2 added.
* DES, 3DES/TDES and DES-DOCSIS: binary size reduction, reduced stack frame size, re-used common transpose macros.
* Fixed LFSR update in single buffer ZUC API implementation.
* SM4: added SM4-CTR and SM4-GCM SSE code, added AVX2-SM4-NI code for SM4-GCM, SM4-CTR, SM4-CBC and SM4-ECB.
* SHA2-512/384 & and HMAC-SHA2-512/384: added AVX2-SHA512-NI single-buffer and x2 multi-buffer code.
* SM3 and SM3-HMAC: added SM3-NI implementations.
* Added AES-CFB SSE type 1 and AVX512 type 2 implementations.
* Removed AESNI emulation support.
* Removed AVX Type 2 implementation.
* Removed AES-CMAC, AES-CCM, AES-CBC and AES-ECB x4 and by4 implementations from SSE type 1.
* Removed AVX type 1 implementations: SHA/MD5, CHACHA20-POLY1305, SNOW3G and KASUMI.
* Removed AVX architecture type.
* Changed SHA1 on AVX2 type 4 architecture to use multi-buffer implementation.
* Added check for XSAVE and OSXSAVE CPUID features for any AVX architecture type.
* Extended cipher burst API support with: AES-ECB, AES-CFB.
* Extended hash burst API support with: SHA1, SHA2-384/512, AES-CMAC.
* Added AEAD burst API with AES-CCM support.
* Added new API to retrieve optimal minimum burst size for hash, cipher and AEAD API's.
- Fixed issues:
* Version 1.5 fails to build on FreeBSD 13.2 (amd64) using CMake (issue #136)
* Make CMake builds behave more "normal" (issue #141)
* printf in lib code prevents using ipsec-mb in SGX environment (issue #142)
* EEA3(ZUC) 1 Buffer implementation LFSR update can result in invalid LFSR state, causing incorrect keystream generation (issue #144)
* Possible regression: init_mb_mgr_avx() corrupts state on Windows (issue #147)
* Crash seen on VMware with dpdk crypto using ipsec-mb library (issue #153)
- More details at https://github.com/intel/intel-ipsec-mb/releases/tag/v2.0
-------------------------------------------------------------------
Fri Nov 17 13:58:40 UTC 2023 - Tomasz Kantecki <tomasz.kantecki@intel.com>

View File

@@ -1,7 +1,7 @@
#
# spec file for package intel-ipsec-mb
#
# Copyright (c) 2023 SUSE LLC
# Copyright (c) 2025 SUSE LLC
# Copyright (c) 2022, Intel Corporation
#
# All modifications and additions to the file contributed by third parties
@@ -17,8 +17,8 @@
#
%global major 1
%global minor 5
%global major 2
%global minor 0
%global patch 0
# GitHub properties