summaryrefslogtreecommitdiff
path: root/TestVectors
Commit message (Collapse)AuthorAgeFilesLines
* Prepare for Crypto++ 8.2 releaseJeffrey Walton2019-04-281-563/+563
|
* Add SKIPJACK/CBC test vectors (GH #824)Jeffrey Walton2019-04-272-0/+564
| | | | Generated using Botan 1.11.17, https://github.com/noloader/cryptopp-test/tree/master/SKIPJACK
* Add SKIPJACK test vectors from SP800-17, Table 6, pp. 140-42 (GH #824)Jeffrey Walton2019-04-271-0/+483
|
* Add SHAKE-128 and SHAKE-256 (GH #805, PR #806)Jeffrey Walton2019-02-122-0/+1207
|
* Add additional XChaCha20/Poly1305 test vectors (GH #724)Jeffrey Walton2019-02-081-0/+4745
| | | | These test vectors were generated with Botan
* Add additional ChaCha20/Poly1305 test vectors (GH #724)Jeffrey Walton2019-02-081-0/+4609
| | | | These test vectors were generated with Botan
* Add IETF XChaCha20Poly1305 (GH #727, PR #795)Jeffrey Walton2019-02-061-0/+27
|
* Add IETF XChaCha (GH #727, PR #794)Jeffrey Walton2019-02-062-0/+76
|
* Fix ChaCha20/Poly1305 when using filters (GH #724)Jeffrey Walton2019-01-303-0/+65
|
* Add Poly1305TLS algorithm (GH #727)Jeffrey Walton2019-01-272-0/+1688
| | | | This is the IETF's rendition of Poly1305 that forgoes AES and the nonce, and uses 16-bytes of the key directly to mac the message
* Add tamper comment to Poly1305(AES) testsJeffrey Walton2019-01-261-1586/+1574
|
* Add Poly1305(AES) test vectorsJeffrey Walton2019-01-262-34/+2277
|
* Update commentsJeffrey Walton2019-01-251-1/+1
|
* Add additional ChaChaTLS test vectorsJeffrey Walton2019-01-251-0/+95
| | | | These test vectors were generated from a modified Bernstein reference implementation.
* Add additional ChaChaTLS test vectorsJeffrey Walton2019-01-251-0/+96
| | | | These test vectors were generated from a modified Bernstein reference implementation.
* Enable ChaCha-TLS tests in test vectorsJeffrey Walton2019-01-251-1/+1
|
* Add additional ChaChaTLS test vectors from RFC 7539Jeffrey Walton2019-01-241-0/+53
|
* Add ChaChaTLS implementation (GH #265)Jeffrey Walton2019-01-241-32/+88
| | | | We tweaked ChaCha to arrive at the IETF's implementation specified by RFC 7539. We are not sure how to handle block counter wrap. At the moment the caller is responsible for managing it. We were not able to find a reference implementation so we disable SIMD implementations like SSE, AVX, NEON and Power4. We need the wide block tests for corner cases to ensure our implementation is correct.
* Add Test vectors and data to VS project filesJeffrey Walton2018-12-151-0/+0
|
* Whitespace check-inJeffrey Walton2018-11-051-1/+1
| | | | Look, we can finally use whitespace to add breaks and make these somewhat readable.
* Add additional Salsa test vectorsJeffrey Walton2018-11-051-0/+133
|
* Add additional test vectorsJeffrey Walton2018-11-041-31/+288
|
* Whitespace check-inJeffrey Walton2018-11-041-59/+59
|
* Add additional ChaCha20 test vectors (GH #732)Jeffrey Walton2018-11-041-0/+153
| | | | The additional tests ensure we cross the 32-bit boundary used by the state counters
* Add ability to Seek64 in test framework (GH #732)Jeffrey Walton2018-11-041-1/+3
| | | | Also see https://github.com/randombit/botan/pull/1728
* Add ChaCha SSE2 implementationJeffrey Walton2018-10-231-1/+67
| | | | | | | | Thanks to Jack Lloyd and Botan for allowing us to use the implementation. The numbers for SSE2 are very good. When compared with Salsa20 ASM the results are: * Salsa20 2.55 cpb; ChaCha/20 2.90 cpb * Salsa20/12 1.61 cpb; ChaCha/12 1.90 cpb * Salsa20/8 1.34 cpb; ChaCha/8 1.5 cpb
* Add additional ChaCha testsJeffrey Walton2018-10-231-0/+178
|
* Make ChaCha an Salsa use the same design patternJeffrey Walton2018-08-171-3/+3
|
* Backout ChaCha changes to Crypto++ 7.0Jeffrey Walton2018-07-251-3/+3
| | | | These changes made it in by accident at Commit b74a6f444568. We were going to try to let them ride but they broke versioning. They may be added later but we should avoid the change at this time.
* Fixed failed ChaCha testsJeffrey Walton2018-07-061-4/+6
| | | | We switched to the pattern used for Salsa but did not update the name in the test vector file
* Update commentsJeffrey Walton2018-07-051-4/+1
|
* Add HC-256 stream cipher (GH #680)Jeffrey Walton2018-07-052-0/+2331
|
* Add additional HC-128 test vectors (GH #679)Jeffrey Walton2018-07-051-0/+16
|
* Add HC-128 stream cipher (GH #679)Jeffrey Walton2018-07-052-2/+635
|
* Update commentsJeffrey Walton2018-07-041-0/+6
|
* Add additional Rabbit test vectors (GH #678)Jeffrey Walton2018-07-041-0/+1905
|
* Add Rabbit stream cipher (GH #678)Jeffrey Walton2018-07-042-0/+70
|
* Add additional SIMECK tests (GH #675)Jeffrey Walton2018-06-301-0/+85
|
* Add additional SIMECK tests (GH #675)Jeffrey Walton2018-06-301-0/+85
|
* Add Simeck lightweight block cipher (GH #675)Jeffrey Walton2018-06-302-0/+148
| | | Add Simeck lightweight block cipher (GH #675)
* Fix copy/paste errorJeffrey Walton2018-06-251-14/+14
|
* Add HIGHT lightweight block cipher (GH #672)Jeffrey Walton2018-06-242-1/+109
|
* Add additional LEA test vectors (GH #669)Jeffrey Walton2018-06-231-0/+249
|
* Add additional LEA test vectors (GH #669)Jeffrey Walton2018-06-231-3/+251
|
* Add additional CHAM test vectors (PR #670)Jeffrey Walton2018-06-191-0/+256
| | | | This is in preparation for SSE and large block processing. CTR mode is used because AdvancedProcessBlocks128_4x1_SSE
* Add CHAM lightweight block cipher (PR #670)Jeffrey Walton2018-06-172-0/+216
| | | Add CHAM lightweight block cipher
* Add LEA lightweight block cipher (GH #669)Jeffrey Walton2018-06-172-0/+217
|
* Add KeyDerivationFunction interface (GH #610, PR #611)Jeffrey Walton2018-03-292-25/+24
|
* Updated source commentJeffrey Walton2018-02-202-10/+10
|
* Add Simon and Speck test vectors to All group (GH #585)Jeffrey Walton2018-02-191-0/+2
|