| Crates.io | dinoxor |
| lib.rs | dinoxor |
| version | 0.3.0 |
| created_at | 2025-09-05 14:18:49.117852+00 |
| updated_at | 2025-09-05 14:18:49.117852+00 |
| description | Re-implements bitwise operations as abstractions in aarch64 neon registers. |
| homepage | https://awfulsec.com/generative_testing_inline_assembly_in_rust.html |
| repository | https://github.com/graves/dinoxor.git |
| max_upload_size | |
| id | 1825622 |
| size | 1,681,383 |
Why?
🥴 I was somehow bored and stressed at the same time.

This project demonstrates the use of inline assembly in Rust to implement and benchmark cryptographic algorithms, with a focus on confusing reverse engineers. It includes:
dinoxor module for obfuscated XOR operations using inline ARM64 assembly and NEON registers.chacha20 module for implementing the ChaCha20 stream cipher.The project showcases how to:
asm! macro for inline assemblyv0, w0)quickcheck for testing.Performs performance comparisons:
dinoxor(x, y) vs regular eor x ^ y.ChaCha20::process_with_dinoxor vs standard ChaCha20 implementation.Add this to your Cargo.toml:
[dependencies]
dinoxor = "*"
use dinoxor::dinoxor::dinoxor;
let result = dinoxor(0b11101011, 0b11111111);
assert_eq!(result, 0b10100);
cargo bench)~6.29 ns/iter~7,095.95 ns/iterThis project is released under the MIT License.