Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: golang/crypto
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v0.25.0
Choose a base ref
...
head repository: golang/crypto
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v0.27.0
Choose a head ref
  • 19 commits
  • 45 files changed
  • 6 contributors

Commits on Jul 9, 2024

  1. x509roots/fallback: update bundle

    This is an automated CL which updates the NSS root bundle.
    
    Change-Id: I552ff9800e32294b25cc04ccc8fca3404ae3b93c
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/597095
    Auto-Submit: Gopher Robot <gobot@golang.org>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Carlos Amedee <carlos@golang.org>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    gopherbot committed Jul 9, 2024
    Configuration menu
    Copy the full SHA
    d66d9c3 View commit details
    Browse the repository at this point in the history

Commits on Jul 16, 2024

  1. x509roots/fallback/internal/goissue52287: delete

    By now Go 1.19 isn't supported, so there's no need to work around
    go.dev/issue/52287 in this module anymore.
    
    For golang/go#57792.
    For golang/go#52287.
    
    Change-Id: I3999cdb9ca419a2ab897c9143a4ec31f59da7d80
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/598495
    TryBot-Result: Gopher Robot <gobot@golang.org>
    Run-TryBot: Dmitri Shuralyov <dmitshur@golang.org>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    Auto-Submit: Dmitri Shuralyov <dmitshur@google.com>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    dmitshur authored and gopherbot committed Jul 16, 2024
    Configuration menu
    Copy the full SHA
    f2bc3a6 View commit details
    Browse the repository at this point in the history
  2. LICENSE: update per Google Legal

    Very minor tweaks:
     - Remove (c) pseudosymbol.
     - Remove "All Rights Reserved."
     - Change "Google Inc." (no longer exists) to "Google LLC".
    
    [git-generate]
    echo '
    ,s/\(c\) //
    ,s/ All rights reserved.//
    ,s/Google Inc./Google LLC/
    w
    q
    ' | sam -d LICENSE
    
    Change-Id: I6e885650c5701597f57dbf00c2abdcc7b393a703
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/598520
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Ian Lance Taylor <iant@google.com>
    Auto-Submit: Russ Cox <rsc@golang.org>
    rsc authored and gopherbot committed Jul 16, 2024
    Configuration menu
    Copy the full SHA
    80fd972 View commit details
    Browse the repository at this point in the history
  3. sha3: Avo port of keccakf_amd64.s

    This implementation utilizes the same registers found in the reference
    implementation, aiming to produce a minimal semantic diff between the
    Avo-generated output and the original hand-written assembly.
    
    To verify the Avo implementation, the reference and Avo-generated
    assembly files are fed to `go tool asm`, capturing the debug output into
    corresponding temp files. The debug output contains supplementary
    metadata (line numbers, instruction offsets, and source file references)
    that must be removed in order to obtain a semantic diff of the two
    files. This is accomplished via a small utility script written in awk.
    
    Commands used to verify Avo output:
    
    BASE="d66d9c31b4ae80d173d1187a9e40c188788dbdbc"
    go tool asm -o /dev/null -debug \
      <(git cat-file -p "$BASE":sha3/keccakf_amd64.s) \
      > /tmp/reference.s
    
    go tool asm -o /dev/null -debug \
      sha3/keccakf_amd64.s \
      > /tmp/avo.s
    
    normalize(){
      awk '{
        $1=$2=$3="";
        print substr($0,4)
      }'
    }
    
    diff <(normalize < /tmp/reference.s) <(normalize < /tmp/avo.s)
    
    Change-Id: I1c0ea516531355263b83d3b66a37df090e293cea
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/594655
    Reviewed-by: Cherry Mui <cherryyz@google.com>
    Reviewed-by: Filippo Valsorda <filippo@golang.org>
    Reviewed-by: Russell Webb <russell.webb@protonmail.com>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Auto-Submit: Filippo Valsorda <filippo@golang.org>
    Garrett-Bodley authored and gopherbot committed Jul 16, 2024
    Configuration menu
    Copy the full SHA
    e983fa2 View commit details
    Browse the repository at this point in the history

Commits on Jul 17, 2024

  1. ssh: remove go 1.21+ dependency on slices

    Fixes golang/go#68469
    
    Change-Id: Ieea3c444b0458d169a6ff224e59b3b815264de89
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/598775
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Nicola Murino <nicola.murino@gmail.com>
    Auto-Submit: Nicola Murino <nicola.murino@gmail.com>
    Reviewed-by: Cherry Mui <cherryyz@google.com>
    Reviewed-by: Carlos Amedee <carlos@golang.org>
    imirkin authored and gopherbot committed Jul 17, 2024
    Configuration menu
    Copy the full SHA
    6879722 View commit details
    Browse the repository at this point in the history

Commits on Jul 22, 2024

  1. ssh: don't use dsa keys in integration tests

    DSA has been disabled by default since OpenSSH 9.8, so tests
    fail with newer versions of OpenSSH
    
    Change-Id: I57b9abde8845cd05116a637a21cbbb8af740b2e0
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/599955
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    Auto-Submit: Nicola Murino <nicola.murino@gmail.com>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    drakkan authored and gopherbot committed Jul 22, 2024
    Configuration menu
    Copy the full SHA
    bb80217 View commit details
    Browse the repository at this point in the history

Commits on Jul 26, 2024

  1. ssh: add support for unpadded RSA signatures

    The original SSH RFC 4253 explicitly disallows padding. This applies to
    ssh-rsa signatures.
    
    The updated SSH RFC 8332 which defines the SHA2 RSA signature variants
    explicitly calls out the existence of signers who produce short
    signatures and specifies that verifiers may allow this behavior.
    
    In practice, PuTTY 0.81 and prior versions, as well as SSH.NET prior to
    2024.1.0 always generated short signatures. Furthermore, PuTTY is
    embedded in other software like WinSCP and FileZilla, which are updated
    on their own schedules as well. This leads to occasional unexplained
    login errors, when using RSA keys.
    
    OpenSSH server allows these short signatures for all RSA algorithms.
    
    Fixes golang/go#68286
    
    Change-Id: Ia60ece21bf9c111c490fac0c066443ed5ff7dd29
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/598534
    Reviewed-by: Nicola Murino <nicola.murino@gmail.com>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    Auto-Submit: Nicola Murino <nicola.murino@gmail.com>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    imirkin authored and gopherbot committed Jul 26, 2024
    Configuration menu
    Copy the full SHA
    3375612 View commit details
    Browse the repository at this point in the history

Commits on Aug 6, 2024

  1. go.mod: update golang.org/x dependencies

    Update golang.org/x dependencies to their latest tagged versions.
    
    Change-Id: Iae75e5fcbcfe3709820dd66638a763f662f8d939
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/603396
    Auto-Submit: Gopher Robot <gobot@golang.org>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    Reviewed-by: David Chase <drchase@google.com>
    gopherbot committed Aug 6, 2024
    Configuration menu
    Copy the full SHA
    5bcd010 View commit details
    Browse the repository at this point in the history
  2. ssh/agent: ensure to not add duplicated keys

    When adding a new key, if we already have a Signer with the same public
    key, we now replace it with the new one instead of duplicating it.
    
    Before this change we had this:
    
    $ ssh-add -l
    3072 SHA256:bsBRHC/xgiqBJdSuvSTNpJNLTISP/G356jNMCRYC5Es nicola@p1 (RSA)
    3072 SHA256:bsBRHC/xgiqBJdSuvSTNpJNLTISP/G356jNMCRYC5Es nicola@p1 (RSA-CERT)
    
    $ ssh-add /home/nicola/ssh_certs/id_rsa
    Identity added: /home/nicola/ssh_certs/id_rsa (nicola@p1)
    Certificate added: /home/nicola/ssh_certs/id_rsa-cert.pub (myid)
    
    $ ssh-add -l
    3072 SHA256:bsBRHC/xgiqBJdSuvSTNpJNLTISP/G356jNMCRYC5Es nicola@p1 (RSA)
    3072 SHA256:bsBRHC/xgiqBJdSuvSTNpJNLTISP/G356jNMCRYC5Es nicola@p1 (RSA-CERT)
    3072 SHA256:bsBRHC/xgiqBJdSuvSTNpJNLTISP/G356jNMCRYC5Es nicola@p1 (RSA)
    3072 SHA256:bsBRHC/xgiqBJdSuvSTNpJNLTISP/G356jNMCRYC5Es nicola@p1 (RSA-CERT)
    
    Change-Id: Iad1b1a6dc94f68f53f05d7d1172f0017839976fc
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/602955
    Reviewed-by: Filippo Valsorda <filippo@golang.org>
    Auto-Submit: Nicola Murino <nicola.murino@gmail.com>
    Reviewed-by: David Chase <drchase@google.com>
    Reviewed-by: Michael Knyszek <mknyszek@google.com>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    drakkan authored and gopherbot committed Aug 6, 2024
    Configuration menu
    Copy the full SHA
    b2d3a6a View commit details
    Browse the repository at this point in the history

Commits on Sep 3, 2024

  1. x509roots/fallback: update bundle

    This is an automated CL which updates the NSS root bundle.
    
    Change-Id: I95cf0b3e86f1e013d486a0bbd050a8b4bea5d6e9
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/610060
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Auto-Submit: Gopher Robot <gobot@golang.org>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    gopherbot committed Sep 3, 2024
    Configuration menu
    Copy the full SHA
    bf5f14f View commit details
    Browse the repository at this point in the history

Commits on Sep 4, 2024

  1. argon2: Avo port of blamka_amd64.s

    This implementation utilizes the same registers found in the reference
    implementation, aiming to produce a minimal semantic diff between the
    Avo-generated output and the original hand-written assembly.
    
    To verify the Avo implementation, the reference and Avo-generated
    assembly files are fed to `go tool asm`, capturing the debug output into
    corresponding temp files. The debug output contains supplementary
    metadata (line numbers, instruction offsets, and source file references)
    that must be removed in order to obtain a semantic diff of the two
    files. This is accomplished via a small utility script written in awk.
    
    Commands used to verify Avo output:
    
    GOROOT=$(go env GOROOT)
    ASM_PATH="argon2/blamka_amd64.s"
    REFERENCE="b2d3a6a4b4d36521cd7f653879cf6981e7c5c340"
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      <(git cat-file -p "$REFERENCE:$ASM_PATH") \
      > /tmp/reference.s
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      "$ASM_PATH" \
      > /tmp/avo.s
    
    normalize(){
      awk '{
        $1=$2=$3="";
        print substr($0,4)
      }'
    }
    
    diff <(normalize < /tmp/reference.s) <(normalize < /tmp/avo.s)
    
    Change-Id: I3567eb80ef80dff248225f17470122c0a4e6951e
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/600315
    Reviewed-by: Filippo Valsorda <filippo@golang.org>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Garrett-Bodley authored and rolandshoemaker committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    38a0b5d View commit details
    Browse the repository at this point in the history
  2. blake2s: port blake2s_amd64.s to Avo

    This implementation utilizes the same registers found in the reference
    implementation, aiming to produce a minimal semantic diff between the
    Avo-generated output and the original hand-written assembly.
    
    To verify the Avo implementation, the reference and Avo-generated
    assembly files are fed to `go tool asm`, capturing the debug output into
    corresponding temp files. The debug output contains supplementary
    metadata (line numbers, instruction offsets, and source file references)
    that must be removed in order to obtain a semantic diff of the two
    files. This is accomplished via a small utility script written in awk.
    
    Commands used to verify Avo output:
    
    GOROOT=$(go env GOROOT)
    ASM_PATH="blake2s/blake2s_amd64.s"
    REFERENCE="b2d3a6a4b4d36521cd7f653879cf6981e7c5c340"
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      <(git cat-file -p "$REFERENCE:$ASM_PATH") \
      > /tmp/reference.s
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      "$ASM_PATH" \
      > /tmp/avo.s
    
    normalize(){
      awk '{
        $1=$2=$3="";
        print substr($0,4)
      }'
    }
    
    diff <(normalize < /tmp/reference.s) <(normalize < /tmp/avo.s)
    
    Change-Id: Ica8bf9f0b42dc93714aa54e783fa74ed19e6b9f4
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/601216
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    Reviewed-by: Filippo Valsorda <filippo@golang.org>
    Garrett-Bodley authored and rolandshoemaker committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    38ed1bc View commit details
    Browse the repository at this point in the history
  3. blake2b: port blake2bAVX2_amd64.s to Avo

    This implementation utilizes the same registers found in the reference
    implementation, aiming to produce a minimal semantic diff between the
    Avo-generated output and the original hand-written assembly.
    
    To verify the Avo implementation, the reference and Avo-generated
    assembly files are fed to `go tool asm`, capturing the debug output into
    corresponding temp files. The debug output contains supplementary
    metadata (line numbers, instruction offsets, and source file references)
    that must be removed in order to obtain a semantic diff of the two
    files. This is accomplished via a small utility script written in awk.
    
    Commands used to verify Avo output:
    
    GOROOT=$(go env GOROOT)
    ASM_PATH="blake2b/blake2bAVX2_amd64.s"
    REFERENCE="b2d3a6a4b4d36521cd7f653879cf6981e7c5c340"
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      <(git cat-file -p "$REFERENCE:$ASM_PATH") \
      > /tmp/reference.s
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      "$ASM_PATH" \
      > /tmp/avo.s
    
    normalize(){
      awk '{
        $1=$2=$3="";
        print substr($0,4)
      }'
    }
    
    diff <(normalize < /tmp/reference.s) <(normalize < /tmp/avo.s)
    
    Change-Id: Ia2af1b82c871e26b89bd9a2d9fb187cc49e18341
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/600836
    Reviewed-by: Filippo Valsorda <filippo@golang.org>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Garrett-Bodley authored and rolandshoemaker committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    0484c26 View commit details
    Browse the repository at this point in the history
  4. blake2b: port blake2b_amd64.s to Avo

    This implementation utilizes the same registers found in the reference
    implementation, aiming to produce a minimal semantic diff between the
    Avo-generated output and the original hand-written assembly.
    
    To verify the Avo implementation, the reference and Avo-generated
    assembly files are fed to `go tool asm`, capturing the debug output into
    corresponding temp files. The debug output contains supplementary
    metadata (line numbers, instruction offsets, and source file references)
    that must be removed in order to obtain a semantic diff of the two
    files. This is accomplished via a small utility script written in awk.
    
    Commands used to verify Avo output:
    
    GOROOT=$(go env GOROOT)
    ASM_PATH="blake2b/blake2b_amd64.s"
    REFERENCE="b2d3a6a4b4d36521cd7f653879cf6981e7c5c340"
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      <(git cat-file -p "$REFERENCE:$ASM_PATH") \
      > /tmp/reference.s
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      "$ASM_PATH" \
      > /tmp/avo.s
    
    normalize(){
      awk '{
        $1=$2=$3="";
        print substr($0,4)
      }'
    }
    
    diff <(normalize < /tmp/reference.s) <(normalize < /tmp/avo.s)
    
    Change-Id: I6dd59fb0b0365674aa5e43b69a57ea60fbcc4ba1
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/600456
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Filippo Valsorda <filippo@golang.org>
    Garrett-Bodley authored and rolandshoemaker committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    82942cf View commit details
    Browse the repository at this point in the history
  5. salsa20/salsa: Port salsa20_amd64.s to Avo

    This implementation utilizes the same registers found in the reference
    implementation, aiming to produce a minimal semantic diff between the
    Avo-generated output and the original hand-written assembly.
    
    To verify the Avo implementation, the reference and Avo-generated
    assembly files are fed to `go tool asm`, capturing the debug output into
    corresponding temp files. The debug output contains supplementary
    metadata (line numbers, instruction offsets, and source file references)
    that must be removed in order to obtain a semantic diff of the two
    files. This is accomplished via a small utility script written in awk.
    
    Commands used to verify Avo output:
    
    GOROOT=$(go env GOROOT)
    REFERENCE="b2d3a6a4b4d36521cd7f653879cf6981e7c5c340"
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      <(git cat-file -p "$REFERENCE":salsa20/salsa/salsa20_amd64.s) \
      > /tmp/reference.s
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      salsa20/salsa/salsa20_amd64.s \
      > /tmp/avo.s
    
    normalize(){
      awk '{
        $1=$2=$3="";
        print substr($0,4)
      }'
    }
    
    diff <(normalize < /tmp/reference.s) <(normalize < /tmp/avo.s)
    
    Change-Id: Ica0bb06f8b074ad566a979d33ddc81d8a38491b1
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/601217
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Filippo Valsorda <filippo@golang.org>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    Garrett-Bodley authored and rolandshoemaker committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    620dfbc View commit details
    Browse the repository at this point in the history
  6. chacha20poly1305: Avo port of chacha20poly1305_amd64.s

    This implementation utilizes the same registers found in the reference
    implementation, aiming to produce a minimal semantic diff between the
    Avo-generated output and the original hand-written assembly.
    
    To verify the Avo implementation, the reference and Avo-generated
    assembly files are fed to `go tool asm`, capturing the debug output into
    corresponding temp files. The debug output contains supplementary
    metadata (line numbers, instruction offsets, and source file references)
    that must be removed in order to obtain a semantic diff of the two
    files. This is accomplished via a small utility script written in awk.
    
    Parameter metadata not found in the reference assembly file has been
    added, leading to a diff on the lines where those symbols are
    referenced.
    
    Commands used to verify Avo output:
    
    GOROOT=$(go env GOROOT)
    ASM_PATH="chacha20poly1305/chacha20poly1305_amd64.s"
    REFERENCE="b2d3a6a4b4d36521cd7f653879cf6981e7c5c340"
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      <(git cat-file -p "$REFERENCE:$ASM_PATH") \
      > /tmp/reference.s
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      "$ASM_PATH" \
      > /tmp/avo.s
    
    normalize(){
      awk '{
        $1=$2=$3="";
        print substr($0,4)
      }'
    }
    
    diff <(normalize < /tmp/reference.s) <(normalize < /tmp/avo.s)
    
    155,157c155,157
    < MOVQ dst(FP), DI
    < MOVQ key+24(FP), R8
    < MOVQ src+48(FP), SI
    ---
    > MOVQ dst_base(FP), DI
    > MOVQ key_base+24(FP), R8
    > MOVQ src_base+48(FP), SI
    159c159
    < MOVQ ad+72(FP), CX
    ---
    > MOVQ ad_base+72(FP), CX
    4684,4686c4684,4686
    < MOVQ dst(FP), DI
    < MOVQ key+24(FP), R8
    < MOVQ src+48(FP), SI
    ---
    > MOVQ dst_base(FP), DI
    > MOVQ key_base+24(FP), R8
    > MOVQ src_base+48(FP), SI
    4688c4688
    < MOVQ ad+72(FP), CX
    ---
    > MOVQ ad_base+72(FP), CX
    
    Change-Id: Ia3a8e70b7440944ee739499c41ddceb70e054ef9
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/601442
    Reviewed-by: Filippo Valsorda <filippo@golang.org>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    Garrett-Bodley authored and rolandshoemaker committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    7eace71 View commit details
    Browse the repository at this point in the history
  7. internal/poly1305: Port sum_amd64.s to Avo

    This implementation utilizes the same registers found in the reference
    implementation, aiming to produce a minimal semantic diff between the
    Avo-generated output and the original hand-written assembly.
    
    To verify the Avo implementation, the reference and Avo-generated
    assembly files are fed to `go tool asm`, capturing the debug output into
    corresponding temp files. The debug output contains supplementary
    metadata (line numbers, instruction offsets, and source file references)
    that must be removed in order to obtain a semantic diff of the two
    files. This is accomplished via a small utility script written in awk.
    
    Commands used to verify Avo output:
    
    GOROOT=$(go env GOROOT)
    ASM_PATH="internal/poly1305/sum_amd64.s"
    REFERENCE="b2d3a6a4b4d36521cd7f653879cf6981e7c5c340"
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      <(git cat-file -p "$REFERENCE:$ASM_PATH") \
      > /tmp/reference.s
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      "$ASM_PATH" \
      > /tmp/avo.s
    
    normalize(){
      awk '{
        $1=$2=$3="";
        print substr($0,4)
      }'
    }
    
    diff <(normalize < /tmp/reference.s) <(normalize < /tmp/avo.s)
    
    Change-Id: I80212c95d1b05335d7f6b73a3030b6f812f6105b
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/600035
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Reviewed-by: Filippo Valsorda <filippo@golang.org>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Garrett-Bodley authored and rolandshoemaker committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    bcb0f91 View commit details
    Browse the repository at this point in the history
  8. go.mod: update golang.org/x dependencies

    Update golang.org/x dependencies to their latest tagged versions.
    
    Change-Id: I94bb1c6a4bb08aff8c146e84a9d4b3e353f098c2
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/610638
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    Reviewed-by: Michael Pratt <mpratt@google.com>
    Auto-Submit: Gopher Robot <gobot@golang.org>
    gopherbot committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    b35ab4f View commit details
    Browse the repository at this point in the history
  9. all: fix printf(var) mistakes detected by latest printf checker

    These were problematic but previously easy to miss. They're now
    easy to spot thanks to build failures at Go tip as of CL 610736.
    
    For golang/go#68796.
    
    Change-Id: I167f2cce2376b4070460389c673d973e4521d3dc
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/610797
    Auto-Submit: Dmitri Shuralyov <dmitshur@golang.org>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Alan Donovan <adonovan@google.com>
    dmitshur authored and gopherbot committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    c9da6b9 View commit details
    Browse the repository at this point in the history
Loading