zig/lib/std/crypto
Frank Denis 119fc318a7 std/crypto/chacha20: add round-reduced versions & cleanup internals
See https://eprint.iacr.org/2019/1492.pdf for justification.

8 rounds ChaCha20 provides a 2.5x speedup, and is still believed
to be safe.

Round-reduced versions are actually deployed (ex: Android filesystem
encryption), and thanks to the magic of comptime, it doesn't take much
to support them.

This also makes the ChaCha20 code more consistent with the Salsa20 code,
removing internal functions that were not part of the public API any more.

No breaking changes; the public API remains backwards compatible.
2021-03-17 11:25:51 -07:00
..
25519 Use a unified error set for std/crypto/* 2021-03-14 20:51:31 +01:00
aes
aegis.zig Use a unified error set for std/crypto/* 2021-03-14 20:51:31 +01:00
aes_gcm.zig Use a unified error set for std/crypto/* 2021-03-14 20:51:31 +01:00
aes_ocb.zig Use a unified error set for std/crypto/* 2021-03-14 20:51:31 +01:00
aes.zig
bcrypt.zig Use a unified error set for std/crypto/* 2021-03-14 20:51:31 +01:00
benchmark.zig std/crypto/chacha20: add round-reduced versions & cleanup internals 2021-03-17 11:25:51 -07:00
blake2.zig
blake3.zig
chacha20.zig std/crypto/chacha20: add round-reduced versions & cleanup internals 2021-03-17 11:25:51 -07:00
error.zig Use a unified error set for std/crypto/* 2021-03-14 20:51:31 +01:00
ghash.zig
gimli.zig Use a unified error set for std/crypto/* 2021-03-14 20:51:31 +01:00
hkdf.zig
hmac.zig
isap.zig Use a unified error set for std/crypto/* 2021-03-14 20:51:31 +01:00
md5.zig
modes.zig
pbkdf2.zig pbkdf2: use std.math.divCeil() 2021-03-17 10:11:47 +01:00
poly1305.zig
salsa20.zig Use a unified error set for std/crypto/* 2021-03-14 20:51:31 +01:00
sha1.zig
sha2.zig
sha3.zig
siphash.zig
test.zig
tlcsprng.zig
utils.zig