- User Since
- May 28 2018, 4:57 PM (56 w, 1 d)
Sun, Jun 23
Werner, I interpreted jwilik's patch as admission of a problem from upstream, and reported it as such to CVE. I felt that since this does not effect the main platforms (ARM and x86_64) it would not be a big deal. If I interpreted wrong, I am sorry.
I assigned the CVE, but yes it needs more facts.
Sat, Jun 22
I will work on OCB mode, eventually. Perhaps you could review what I have, but leave T4529 open until OCB mode is completed.
Wed, Jun 19
fix building with hard ware acceleration off.
fix running with hardware acceleration off.
Sat, Jun 8
Regarding OCB: I do not want to touch a patent-encumbered algorithm (3 more years) which claims to force only GPL usage of libgcrypt.
correctly generate the asm for it's "linux quirk" mode (fix build on big-endian)
It turns out that the upstream cryptogams is broken on ppc64 big-endian elfv1. I reported this upstream https://github.com/dot-asm/cryptogams/issues/5 (openssl version works fine)
Fri, Jun 7
Thu, Jun 6
fix ctr mode when counter overflows.
resolve merge conflicts
Good catch on using the counter to foil "smart" algorithms.
Wed, Jun 5
The openssl version is a 64-bit counter (at least for ppc8), not 32-bit.
Tue, Jun 4
Benchmarks with the block ciphers is here https://dev.gnupg.org/D493
include missing file.
added CTR mode support
Mon, Jun 3
Thu, May 30
Tue, May 28
I do not have a PoC (or much interest in making one, I have too many more important things to do), but I believe this to be correct, based heavily on PPC knowledge of Nicolas König <firstname.lastname@example.org> . This attack also applies to AMD, Intel, and ARM.
fix build with a fixup that got applied twice. better benchmarks
Mon, May 27
May 24 2019
Fix alignment needs of vcrypto instructions.
Didn't do sufficient testing.
Actually include modified perlasm file.
May 20 2019
I'm looking into doing a pretty epic hack of using the switch_endian syscall to speed this up.
Would the maintainers accept having perl in the repository? Linux does it.