You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: BUILD.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,15 +25,14 @@
25
25
-[CMake\*](https://cmake.org/download) 3.18 or higher
26
26
- Python 3.8.1
27
27
- The Netwide Assembler (NASM) 2.15
28
-
- OpenSSL\* 3.0.8 or higher
28
+
- OpenSSL\* 3.0.8 or higher **OR** BoringSSL*[45cf810d](https://github.com/google/boringssl/archive/45cf810dbdbd767f09f8cb0b0fcccd342c39041f.tar.gz)**OR** Tongsuo* 8.2.1
29
+
29
30
30
31
### Linux* OS
31
32
-[Common tools](#common-tools)
32
33
- Intel® C++ Compiler Classic 2021.9 for Linux\* OS
33
-
- GCC 8.3
34
-
- GCC 9.1
35
-
- GCC 10.1
36
-
- GCC 11.1
34
+
- GCC 8.5
35
+
- GCC 11.4
37
36
- Clang 9.0
38
37
- Clang 12.0
39
38
- GNU binutils 2.32
@@ -217,6 +216,8 @@ To build the Intel IPP Cryptography library on macOS\*, complete the following s
217
216
218
217
- Example for Linux\* OS and the Intel® 64 architecture:
219
218
`-DPLATFORM_LIST="w7;n8;y8;e9;l9;k0"`
219
+
- `-DNO_CRYPTO_MB:BOOL=TRUE` - optional, turns off the build of [Crypto Multi Buffer library](./sources/ippcp/crypto_mb/Readme.md) and, as a consequence, removes all dependencies on OpenSSL library.
220
+
- `-DBABASSL:BOOL=on`, `-DBORINGSSL:BOOL=on` - required only if forks of OpenSSL library are used to resolve OpenSSL dependencies - Tongsuo and BoringSSL respectively. These flags make sense when [Crypto Multi Buffer library](./sources/ippcp/crypto_mb/Readme.md) is built.
220
221
- `-DIPPCP_CUSTOM_BUILD="<CPU features list>"` - optional, works only if`-DMERGED_BLD:BOOL=off` is set, i.e. only for 1CPU libraries. Enables the CPU feature dispatching mask at compile-time based on the provided list.
221
222
222
223
- Currently supported by the library custom features dispatching:
Copy file name to clipboardExpand all lines: CHANGELOG.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,6 +2,9 @@
2
2
3
3
This is a list of notable changes to Intel(R) IPP Cryptography, in reverse chronological order.
4
4
5
+
## Intel(R) IPP Cryptography 2021.11
6
+
- Minimal supported BoringSSL version was increased to [45cf810d](https://github.com/google/boringssl/archive/45cf810dbdbd767f09f8cb0b0fcccd342c39041f.tar.gz) tag.
7
+
5
8
## Intel(R) IPP Cryptography 2021.10
6
9
- Added the verification part of eXtended Merkle Signature Scheme (XMSS) algorithm.
7
10
- Added FIPS-compliance mode for the library. More information can be found in the [Intel(R) IPP Cryptography FIPS Guide](./README_FIPS.md).
Copy file name to clipboardExpand all lines: CONST_TIME_EXECUTION_TESTING.md
+2-10Lines changed: 2 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,18 +5,10 @@
5
5
-[Scope for crypto_mb library](#cryptomb)
6
6
7
7
## General information <divid = 'general'>
8
-
- Testing is conducted under Linux for 64-bit Intel® IPP Cryptography built with the following compilers:
9
-
- Intel® C++ Compiler 19.1
10
-
- Intel® C++ Compiler Classic 2021.9
11
-
- GCC 8.3
12
-
- GCC 9.1
13
-
- GCC 10.1
14
-
- GCC 11.1
15
-
- Clang 9.0
16
-
- Clang 12.0
8
+
- Testing is conducted under Linux for 64-bit Intel® IPP Cryptography built with the compilers listed in [Build](./BUILD.md).
17
9
- Tested platforms: w7, n8, y8, e9, l9, k0 (see the supported platforms list [here](./OVERVIEW.md#target-optimization-codes-in-function-names)).
18
10
- Testing scope described below is guaranteed to pass for **`release`** branches. This is not guaranteed for the **`develop`** branch ([branches description](./OVERVIEW.md#branches-description))
19
-
- Information about Pin-Based Constant Execution Checker can be found [here](https://github.com/intel/pin_based_cec)
11
+
- Information about Pin-Based Constant Execution Checker can be found [here](https://github.com/intel/pin_based_cec)
0 commit comments