Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: golang/crypto
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v0.26.0
Choose a base ref
...
head repository: golang/crypto
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v0.28.0
Choose a head ref
  • 15 commits
  • 40 files changed
  • 6 contributors

Commits on Aug 6, 2024

  1. ssh/agent: ensure to not add duplicated keys

    When adding a new key, if we already have a Signer with the same public
    key, we now replace it with the new one instead of duplicating it.
    
    Before this change we had this:
    
    $ ssh-add -l
    3072 SHA256:bsBRHC/xgiqBJdSuvSTNpJNLTISP/G356jNMCRYC5Es nicola@p1 (RSA)
    3072 SHA256:bsBRHC/xgiqBJdSuvSTNpJNLTISP/G356jNMCRYC5Es nicola@p1 (RSA-CERT)
    
    $ ssh-add /home/nicola/ssh_certs/id_rsa
    Identity added: /home/nicola/ssh_certs/id_rsa (nicola@p1)
    Certificate added: /home/nicola/ssh_certs/id_rsa-cert.pub (myid)
    
    $ ssh-add -l
    3072 SHA256:bsBRHC/xgiqBJdSuvSTNpJNLTISP/G356jNMCRYC5Es nicola@p1 (RSA)
    3072 SHA256:bsBRHC/xgiqBJdSuvSTNpJNLTISP/G356jNMCRYC5Es nicola@p1 (RSA-CERT)
    3072 SHA256:bsBRHC/xgiqBJdSuvSTNpJNLTISP/G356jNMCRYC5Es nicola@p1 (RSA)
    3072 SHA256:bsBRHC/xgiqBJdSuvSTNpJNLTISP/G356jNMCRYC5Es nicola@p1 (RSA-CERT)
    
    Change-Id: Iad1b1a6dc94f68f53f05d7d1172f0017839976fc
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/602955
    Reviewed-by: Filippo Valsorda <filippo@golang.org>
    Auto-Submit: Nicola Murino <nicola.murino@gmail.com>
    Reviewed-by: David Chase <drchase@google.com>
    Reviewed-by: Michael Knyszek <mknyszek@google.com>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    drakkan authored and gopherbot committed Aug 6, 2024
    Configuration menu
    Copy the full SHA
    b2d3a6a View commit details
    Browse the repository at this point in the history

Commits on Sep 3, 2024

  1. x509roots/fallback: update bundle

    This is an automated CL which updates the NSS root bundle.
    
    Change-Id: I95cf0b3e86f1e013d486a0bbd050a8b4bea5d6e9
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/610060
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Auto-Submit: Gopher Robot <gobot@golang.org>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    gopherbot committed Sep 3, 2024
    Configuration menu
    Copy the full SHA
    bf5f14f View commit details
    Browse the repository at this point in the history

Commits on Sep 4, 2024

  1. argon2: Avo port of blamka_amd64.s

    This implementation utilizes the same registers found in the reference
    implementation, aiming to produce a minimal semantic diff between the
    Avo-generated output and the original hand-written assembly.
    
    To verify the Avo implementation, the reference and Avo-generated
    assembly files are fed to `go tool asm`, capturing the debug output into
    corresponding temp files. The debug output contains supplementary
    metadata (line numbers, instruction offsets, and source file references)
    that must be removed in order to obtain a semantic diff of the two
    files. This is accomplished via a small utility script written in awk.
    
    Commands used to verify Avo output:
    
    GOROOT=$(go env GOROOT)
    ASM_PATH="argon2/blamka_amd64.s"
    REFERENCE="b2d3a6a4b4d36521cd7f653879cf6981e7c5c340"
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      <(git cat-file -p "$REFERENCE:$ASM_PATH") \
      > /tmp/reference.s
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      "$ASM_PATH" \
      > /tmp/avo.s
    
    normalize(){
      awk '{
        $1=$2=$3="";
        print substr($0,4)
      }'
    }
    
    diff <(normalize < /tmp/reference.s) <(normalize < /tmp/avo.s)
    
    Change-Id: I3567eb80ef80dff248225f17470122c0a4e6951e
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/600315
    Reviewed-by: Filippo Valsorda <filippo@golang.org>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Garrett-Bodley authored and rolandshoemaker committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    38a0b5d View commit details
    Browse the repository at this point in the history
  2. blake2s: port blake2s_amd64.s to Avo

    This implementation utilizes the same registers found in the reference
    implementation, aiming to produce a minimal semantic diff between the
    Avo-generated output and the original hand-written assembly.
    
    To verify the Avo implementation, the reference and Avo-generated
    assembly files are fed to `go tool asm`, capturing the debug output into
    corresponding temp files. The debug output contains supplementary
    metadata (line numbers, instruction offsets, and source file references)
    that must be removed in order to obtain a semantic diff of the two
    files. This is accomplished via a small utility script written in awk.
    
    Commands used to verify Avo output:
    
    GOROOT=$(go env GOROOT)
    ASM_PATH="blake2s/blake2s_amd64.s"
    REFERENCE="b2d3a6a4b4d36521cd7f653879cf6981e7c5c340"
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      <(git cat-file -p "$REFERENCE:$ASM_PATH") \
      > /tmp/reference.s
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      "$ASM_PATH" \
      > /tmp/avo.s
    
    normalize(){
      awk '{
        $1=$2=$3="";
        print substr($0,4)
      }'
    }
    
    diff <(normalize < /tmp/reference.s) <(normalize < /tmp/avo.s)
    
    Change-Id: Ica8bf9f0b42dc93714aa54e783fa74ed19e6b9f4
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/601216
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    Reviewed-by: Filippo Valsorda <filippo@golang.org>
    Garrett-Bodley authored and rolandshoemaker committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    38ed1bc View commit details
    Browse the repository at this point in the history
  3. blake2b: port blake2bAVX2_amd64.s to Avo

    This implementation utilizes the same registers found in the reference
    implementation, aiming to produce a minimal semantic diff between the
    Avo-generated output and the original hand-written assembly.
    
    To verify the Avo implementation, the reference and Avo-generated
    assembly files are fed to `go tool asm`, capturing the debug output into
    corresponding temp files. The debug output contains supplementary
    metadata (line numbers, instruction offsets, and source file references)
    that must be removed in order to obtain a semantic diff of the two
    files. This is accomplished via a small utility script written in awk.
    
    Commands used to verify Avo output:
    
    GOROOT=$(go env GOROOT)
    ASM_PATH="blake2b/blake2bAVX2_amd64.s"
    REFERENCE="b2d3a6a4b4d36521cd7f653879cf6981e7c5c340"
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      <(git cat-file -p "$REFERENCE:$ASM_PATH") \
      > /tmp/reference.s
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      "$ASM_PATH" \
      > /tmp/avo.s
    
    normalize(){
      awk '{
        $1=$2=$3="";
        print substr($0,4)
      }'
    }
    
    diff <(normalize < /tmp/reference.s) <(normalize < /tmp/avo.s)
    
    Change-Id: Ia2af1b82c871e26b89bd9a2d9fb187cc49e18341
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/600836
    Reviewed-by: Filippo Valsorda <filippo@golang.org>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Garrett-Bodley authored and rolandshoemaker committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    0484c26 View commit details
    Browse the repository at this point in the history
  4. blake2b: port blake2b_amd64.s to Avo

    This implementation utilizes the same registers found in the reference
    implementation, aiming to produce a minimal semantic diff between the
    Avo-generated output and the original hand-written assembly.
    
    To verify the Avo implementation, the reference and Avo-generated
    assembly files are fed to `go tool asm`, capturing the debug output into
    corresponding temp files. The debug output contains supplementary
    metadata (line numbers, instruction offsets, and source file references)
    that must be removed in order to obtain a semantic diff of the two
    files. This is accomplished via a small utility script written in awk.
    
    Commands used to verify Avo output:
    
    GOROOT=$(go env GOROOT)
    ASM_PATH="blake2b/blake2b_amd64.s"
    REFERENCE="b2d3a6a4b4d36521cd7f653879cf6981e7c5c340"
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      <(git cat-file -p "$REFERENCE:$ASM_PATH") \
      > /tmp/reference.s
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      "$ASM_PATH" \
      > /tmp/avo.s
    
    normalize(){
      awk '{
        $1=$2=$3="";
        print substr($0,4)
      }'
    }
    
    diff <(normalize < /tmp/reference.s) <(normalize < /tmp/avo.s)
    
    Change-Id: I6dd59fb0b0365674aa5e43b69a57ea60fbcc4ba1
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/600456
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Filippo Valsorda <filippo@golang.org>
    Garrett-Bodley authored and rolandshoemaker committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    82942cf View commit details
    Browse the repository at this point in the history
  5. salsa20/salsa: Port salsa20_amd64.s to Avo

    This implementation utilizes the same registers found in the reference
    implementation, aiming to produce a minimal semantic diff between the
    Avo-generated output and the original hand-written assembly.
    
    To verify the Avo implementation, the reference and Avo-generated
    assembly files are fed to `go tool asm`, capturing the debug output into
    corresponding temp files. The debug output contains supplementary
    metadata (line numbers, instruction offsets, and source file references)
    that must be removed in order to obtain a semantic diff of the two
    files. This is accomplished via a small utility script written in awk.
    
    Commands used to verify Avo output:
    
    GOROOT=$(go env GOROOT)
    REFERENCE="b2d3a6a4b4d36521cd7f653879cf6981e7c5c340"
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      <(git cat-file -p "$REFERENCE":salsa20/salsa/salsa20_amd64.s) \
      > /tmp/reference.s
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      salsa20/salsa/salsa20_amd64.s \
      > /tmp/avo.s
    
    normalize(){
      awk '{
        $1=$2=$3="";
        print substr($0,4)
      }'
    }
    
    diff <(normalize < /tmp/reference.s) <(normalize < /tmp/avo.s)
    
    Change-Id: Ica0bb06f8b074ad566a979d33ddc81d8a38491b1
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/601217
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Filippo Valsorda <filippo@golang.org>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    Garrett-Bodley authored and rolandshoemaker committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    620dfbc View commit details
    Browse the repository at this point in the history
  6. chacha20poly1305: Avo port of chacha20poly1305_amd64.s

    This implementation utilizes the same registers found in the reference
    implementation, aiming to produce a minimal semantic diff between the
    Avo-generated output and the original hand-written assembly.
    
    To verify the Avo implementation, the reference and Avo-generated
    assembly files are fed to `go tool asm`, capturing the debug output into
    corresponding temp files. The debug output contains supplementary
    metadata (line numbers, instruction offsets, and source file references)
    that must be removed in order to obtain a semantic diff of the two
    files. This is accomplished via a small utility script written in awk.
    
    Parameter metadata not found in the reference assembly file has been
    added, leading to a diff on the lines where those symbols are
    referenced.
    
    Commands used to verify Avo output:
    
    GOROOT=$(go env GOROOT)
    ASM_PATH="chacha20poly1305/chacha20poly1305_amd64.s"
    REFERENCE="b2d3a6a4b4d36521cd7f653879cf6981e7c5c340"
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      <(git cat-file -p "$REFERENCE:$ASM_PATH") \
      > /tmp/reference.s
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      "$ASM_PATH" \
      > /tmp/avo.s
    
    normalize(){
      awk '{
        $1=$2=$3="";
        print substr($0,4)
      }'
    }
    
    diff <(normalize < /tmp/reference.s) <(normalize < /tmp/avo.s)
    
    155,157c155,157
    < MOVQ dst(FP), DI
    < MOVQ key+24(FP), R8
    < MOVQ src+48(FP), SI
    ---
    > MOVQ dst_base(FP), DI
    > MOVQ key_base+24(FP), R8
    > MOVQ src_base+48(FP), SI
    159c159
    < MOVQ ad+72(FP), CX
    ---
    > MOVQ ad_base+72(FP), CX
    4684,4686c4684,4686
    < MOVQ dst(FP), DI
    < MOVQ key+24(FP), R8
    < MOVQ src+48(FP), SI
    ---
    > MOVQ dst_base(FP), DI
    > MOVQ key_base+24(FP), R8
    > MOVQ src_base+48(FP), SI
    4688c4688
    < MOVQ ad+72(FP), CX
    ---
    > MOVQ ad_base+72(FP), CX
    
    Change-Id: Ia3a8e70b7440944ee739499c41ddceb70e054ef9
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/601442
    Reviewed-by: Filippo Valsorda <filippo@golang.org>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    Garrett-Bodley authored and rolandshoemaker committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    7eace71 View commit details
    Browse the repository at this point in the history
  7. internal/poly1305: Port sum_amd64.s to Avo

    This implementation utilizes the same registers found in the reference
    implementation, aiming to produce a minimal semantic diff between the
    Avo-generated output and the original hand-written assembly.
    
    To verify the Avo implementation, the reference and Avo-generated
    assembly files are fed to `go tool asm`, capturing the debug output into
    corresponding temp files. The debug output contains supplementary
    metadata (line numbers, instruction offsets, and source file references)
    that must be removed in order to obtain a semantic diff of the two
    files. This is accomplished via a small utility script written in awk.
    
    Commands used to verify Avo output:
    
    GOROOT=$(go env GOROOT)
    ASM_PATH="internal/poly1305/sum_amd64.s"
    REFERENCE="b2d3a6a4b4d36521cd7f653879cf6981e7c5c340"
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      <(git cat-file -p "$REFERENCE:$ASM_PATH") \
      > /tmp/reference.s
    
    go tool asm -o /dev/null -I "$GOROOT"/src/runtime -debug \
      "$ASM_PATH" \
      > /tmp/avo.s
    
    normalize(){
      awk '{
        $1=$2=$3="";
        print substr($0,4)
      }'
    }
    
    diff <(normalize < /tmp/reference.s) <(normalize < /tmp/avo.s)
    
    Change-Id: I80212c95d1b05335d7f6b73a3030b6f812f6105b
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/600035
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Reviewed-by: Filippo Valsorda <filippo@golang.org>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Garrett-Bodley authored and rolandshoemaker committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    bcb0f91 View commit details
    Browse the repository at this point in the history
  8. go.mod: update golang.org/x dependencies

    Update golang.org/x dependencies to their latest tagged versions.
    
    Change-Id: I94bb1c6a4bb08aff8c146e84a9d4b3e353f098c2
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/610638
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    Reviewed-by: Michael Pratt <mpratt@google.com>
    Auto-Submit: Gopher Robot <gobot@golang.org>
    gopherbot committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    b35ab4f View commit details
    Browse the repository at this point in the history
  9. all: fix printf(var) mistakes detected by latest printf checker

    These were problematic but previously easy to miss. They're now
    easy to spot thanks to build failures at Go tip as of CL 610736.
    
    For golang/go#68796.
    
    Change-Id: I167f2cce2376b4070460389c673d973e4521d3dc
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/610797
    Auto-Submit: Dmitri Shuralyov <dmitshur@golang.org>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Alan Donovan <adonovan@google.com>
    dmitshur authored and gopherbot committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    c9da6b9 View commit details
    Browse the repository at this point in the history

Commits on Sep 10, 2024

  1. bn256: add missing symbols in comment

    Change-Id: Ibd48a070bd8ce35ef5795a8b73bc4ecac43a993e
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/611735
    Run-TryBot: shuang cui <imcusg@gmail.com>
    Commit-Queue: Ian Lance Taylor <iant@google.com>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Auto-Submit: Ian Lance Taylor <iant@google.com>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    TryBot-Result: Gopher Robot <gobot@golang.org>
    Reviewed-by: Ian Lance Taylor <iant@google.com>
    cuishuang authored and gopherbot committed Sep 10, 2024
    Configuration menu
    Copy the full SHA
    9e92970 View commit details
    Browse the repository at this point in the history

Commits on Sep 16, 2024

  1. ssh: return ServerAuthError after too many auth failures

    if a client is disconnected due to too many authentication attempts
    we should return a ServerAuthError instead of a generic error.
    
    Some users check the error returned by NewServerConn to determine
    whether or not a client attempted to authenticate.
    
    Fixes golang/go#69191
    
    Change-Id: If68fcecdefd6c810fe9df8256b1216e320d8a916
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/566398
    Reviewed-by: Filippo Valsorda <filippo@golang.org>
    Reviewed-by: Tim King <taking@google.com>
    Auto-Submit: Nicola Murino <nicola.murino@gmail.com>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Carlos Amedee <carlos@golang.org>
    drakkan authored and gopherbot committed Sep 16, 2024
    Configuration menu
    Copy the full SHA
    42ee18b View commit details
    Browse the repository at this point in the history

Commits on Sep 30, 2024

  1. sha3: fix cSHAKE initialization for extremely large N and or S

    While both impractical and unlikely, the multiplication could overflow
    on 32-bit architectures.
    
    The 64-bit architecture case is unaffected by both the maximum length
    of Go slices being too small to trigger the overflow (everything except
    s390), and it being safe to assume no machine has more than 2 EiB of
    memory.
    
    Fixes golang/go#66232
    
    Change-Id: I19c15d42d2d6af35e296697159d43d02f513e614
    GitHub-Last-Rev: 503e180
    GitHub-Pull-Request: #286
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/570876
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: David Chase <drchase@google.com>
    Reviewed-by: Filippo Valsorda <filippo@golang.org>
    Auto-Submit: Filippo Valsorda <filippo@golang.org>
    Reviewed-by: Michael Knyszek <mknyszek@google.com>
    Yawning authored and gopherbot committed Sep 30, 2024
    Configuration menu
    Copy the full SHA
    a0819fb View commit details
    Browse the repository at this point in the history

Commits on Oct 4, 2024

  1. go.mod: update golang.org/x dependencies

    Update golang.org/x dependencies to their latest tagged versions.
    
    Change-Id: Id321d3b5909ecb66c0311ba86008509c7895863b
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/617958
    Auto-Submit: Gopher Robot <gobot@golang.org>
    Reviewed-by: David Chase <drchase@google.com>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
    gopherbot committed Oct 4, 2024
    Configuration menu
    Copy the full SHA
    adef4cc View commit details
    Browse the repository at this point in the history
Loading