aboutsummaryrefslogtreecommitdiffstats
path: root/doc
Commit message (Collapse)AuthorAgeFilesLines
* doc update of macos fat binary process for mac M1.David CARLIER2022-02-051-2/+9
|
* Deprecate current McEliece [ci skip]Jack Lloyd2022-01-271-0/+4
|
* Remove ref to mailing lists [ci skip]Jack Lloyd2022-01-101-3/+0
| | | | | randombit is dead (sorry!) and metzdowd is not great, crypto.SE is much better for Q&A or review-this-design things.
* Update zfec docs [ci skip]Jack Lloyd2022-01-091-0/+10
|
* Minor update to the build docsJack Lloyd2021-12-221-5/+10
|
* Another zfec doc fixJack Lloyd2021-12-221-1/+1
|
* Fix zfec callback docJack Lloyd2021-12-221-2/+2
|
* Various ZFEC inprovementsJack Lloyd2021-12-211-11/+16
| | | | | | | * New encoding API * Express SSE2 version using SIMD_4x32 * Remove useless callback param * Rewrite some awkward code in the matrix inversion
* Merge pull request #2864 from reneme/fix/emscriptenRené Meusel2021-12-171-8/+4
|\ | | | | Improve emscripten build target
| * update documentation of how to build via emscriptenRené Meusel2021-12-141-8/+4
| | | | | | | | Co-Authored-By: Hannes Rantzsch <[email protected]>
* | Add a zfec-compatible forward error correction implementationJack Lloyd2021-12-162-0/+48
|/ | | | Based on https://github.com/randombit/fecpp
* Remove the OpenSSL providerJack Lloyd2021-10-286-28/+11
| | | | | | | | Starting in OpenSSL 3.0, most of the functionality which we need to implement the OpenSSL provider is deprecated. Rather than reimplement the whole provider in order to allow it to continue to work in the future, just remove it. Efforts would be better spent doing more optimization work rather than chasing OpenSSL's API changes.
* Fix a couple of trivial typos alloverPeter Meerwald-Stadler2021-10-012-3/+3
|
* More todos [ci skip]Jack Lloyd2021-05-301-1/+2
|
* Deprecate support for RSA/EMSA1Jack Lloyd2021-05-221-0/+2
| | | | It's non-standard and not widely supported
* Remove OpenMP supportJack Lloyd2021-05-191-5/+0
|
* Minor updates to the side channels doc [ci skip]Jack Lloyd2021-05-071-2/+3
|
* Check off a todoJack Lloyd2021-04-251-1/+0
|
* Allow disabling the thread pool at runtime via env variableJack Lloyd2021-04-211-1/+4
| | | | | | Currently this requires a manual reconfigure and recompilation. Not a complete fix for GH #2608 but at least a more convenient workaround.
* Mention PBKDF deprecationJack Lloyd2021-04-151-5/+5
|
* Update the docs about cloneJack Lloyd2021-04-154-3/+15
|
* PBKDF1 has been removedJack Lloyd2021-04-151-1/+0
|
* Merge GH #2707 Add PasswordHash derive API for using AD or secret keyJack Lloyd2021-04-081-0/+10
|\
| * Add derive_key variant supporting AD and secret keyJack Lloyd2021-04-081-0/+10
| |
* | Another todoJack Lloyd2021-04-081-0/+1
|/
* Update the password hashing docsJack Lloyd2021-04-071-82/+106
|
* Remove headers from deprecation listJack Lloyd2021-04-061-2/+0
| | | | These are not publically installed anymore
* Clarify DHE deprecationJack Lloyd2021-04-061-1/+1
|
* Merge GH #2684 Avoid raw pointers in compression codeJack Lloyd2021-04-031-3/+10
|\
| * Remove use of explicit new from compression APIsJack Lloyd2021-04-031-3/+10
| |
* | Mention TLS 1.0/1.1 removal in migration guide [ci skip]Jack Lloyd2021-04-031-0/+1
|/
* Another todoJack Lloyd2021-04-021-0/+1
|
* Update deprecated listJack Lloyd2021-04-021-2/+5
|
* Update side channels docJack Lloyd2021-03-311-10/+6
|
* Enable session caching in TLS API docJack Lloyd2021-03-071-1/+1
|
* Correct TLS docs (GH #2637)Jack Lloyd2021-03-031-4/+4
|
* Clarify macOS supportJack Lloyd2021-03-031-6/+6
|
* Merge GH #2636 Remove /dev/random entropy sourceJack Lloyd2021-03-021-10/+16
|\
| * Remove the entropy source reading /dev/randomJack Lloyd2021-03-011-10/+16
| | | | | | | | | | | | | | | | | | | | | | Instead if System_RNG is backed by /dev/urandom, have the RNG block once on init on a read of /dev/random. That guarantees that we are seeded on old Linux kernels. On basically every other platform besides old Linux this code was redundant with the entropy source that just reads from the system RNG since typically on such systems, /dev/random, /dev/urandom, arc4random, and getentropy all source from the same RNG.
* | Add CVE for non-ct codec decodingJack Lloyd2021-02-281-0/+14
| |
* | OCB is no longer patented!Jack Lloyd2021-02-271-2/+2
|/
* update rst docsthe2021-02-151-7/+5
|
* Document risk of cross-protocol attacksJack Lloyd2021-02-132-1/+22
|
* Remove support for SHA-1 signatures in TLS 1.2Jack Lloyd2021-02-131-2/+0
|
* Add getrandom and BCryptGenRandom to RNG docsRené Fischer2021-01-261-2/+4
|
* PBKDF2 doc updatesJack Lloyd2021-01-231-4/+39
| | | | | | Mention Bcrypt-PBKDF, add some recommendations, etc Closes #2597
* Fix documentation formattingJack Lloyd2021-01-231-1/+1
| | | | Closes #2594
* Some updates to the migration guideJack Lloyd2021-01-211-7/+42
|
* Rewrite the encryption cli to support any cipherJack Lloyd2021-01-151-3/+4
|
* Update migration guideJack Lloyd2021-01-111-0/+5
|