aboutsummaryrefslogtreecommitdiffstats
path: root/src/build-data
Commit message (Collapse)AuthorAgeFilesLines
* Be less forgiving in maintainer modeJack Lloyd2017-09-172-2/+2
|
* Script the Windows CI buildJack Lloyd2017-09-082-3/+6
|
* Exclude build/* from Sonar analysisJack Lloyd2017-09-071-0/+2
| | | | Otherwise it marks all of our header files as 'duplicates' ...
* Refactor RNGs to support Windows PhoneJack Lloyd2017-09-025-10/+32
| | | | | | | | | | | | | | | | | | | This OS has its own crypto API and does not support CryptGenRandom. Splits System_RNG_Impl into distinct declarations one per implementation type. Easier to read now that we are up to 4 distinct versions. Removes the CryptoAPI entropy source, and replaces it with an entropy source that calls the system RNG. This is nominally a bit less flexible in that the entropy source allowed polling multiple providers (though we didn't actually make use of that). Plus side is it works on all systems. Currently the dev_random entropy source is still there because we do actually use it to poll both /dev/random and /dev/urandom, and it might be useful (on certain systems) to also poll a HW RNG, which are often assigned their own device node. This could debatably also be removed in favor of just reading the system RNG.
* Sort isa_extensions lists [ci skip]Simon Warta2017-09-024-14/+11
| | | | this removes the duplicate "sha" in x86_64
* Change http://botan.randombit.net to https URIsJack Lloyd2017-09-011-1/+1
| | | | | | Not a big deal since the site already uses HSTS, but whatever. [ci skip]
* Add support for fuzzing with KLEEJack Lloyd2017-08-301-2/+2
| | | | | | For the fuzzers, builds an object and then links in a second step, because we need that to link the fuzzer binaries for LLVM. (Clang will emit bitcode for us, but doesn't want to link it.)
* Add support for LLVM bitcode targetJack Lloyd2017-08-306-13/+17
|
* Try to get Sonar to look at header filesJack Lloyd2017-08-291-1/+2
|
* Rename (and fix) Sonar targetJack Lloyd2017-08-291-4/+4
|
* Further fixes to ci build scriptJack Lloyd2017-08-291-1/+3
|
* Merge GH #1158 Add build mode for fuzzer testsJack Lloyd2017-08-293-0/+21
|\
| * Create new fuzzer build modeJack Lloyd2017-08-253-0/+21
| |
* | Fix Doxygen build [ci skip]Jack Lloyd2017-08-271-1/+4
| |
* | Add compatibility comment for getauxval on AndroidSimon Warta2017-08-271-0/+2
|/
* Add http_util to module policies (GH #1109)René Korthaus2017-08-073-0/+3
| | | | | | http_util is required by the x509 module to perform online OCSP checks, which should be defaulted to ON. Without being part of the policy, it would be disabled.
* Merge GH #1139 Replace --destdir flag with DESTDIR env variableJack Lloyd2017-08-073-3/+3
|\
| * Turn --destdir option into an environment variable, fixes #1101, fixes #996, ↵Zoltan Gyarmati2017-08-043-3/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | supersedes #997 This commit removes the (broken) --destdir command line option and introduces the DESTDIR environment variable for the 'make install' target. When it's set, the installation will take place in the DESTDIR directory, under the prefix set by --prefix, with all of the internal references (pkgconfig file, etc) containing only the prefix. This behavior is more standard (as in autotools and co.), so makes packaging easier. Based on work of danimo and zgyarmati
* | Merge GH #1138 Add support for Windows sockets in http_util and TLS command ↵Jack Lloyd2017-08-071-0/+1
|\ \ | | | | | | | | | line utils
| * | Add support for Windows sockets to http_utilRené Korthaus2017-08-041-0/+1
| |/ | | | | | | | | | | Based on the work by @slicer4ever, adds support for Windows sockets to http_util. As a bonus, we get Windows support for tls_client and tls_server CLI.
* / Add Streebog hash (GOST R 34.11-2012).Daniel Wyatt2017-08-043-0/+5
|/
* Add ChaCha_RNGJack Lloyd2017-07-312-0/+6
|
* Merge GH #1133 Fix MSVC compiler detection fixing #1125Jack Lloyd2017-07-311-0/+8
|\
| * Use _MSC_VER to get MSVC versionSimon Warta2017-07-301-0/+8
| |
* | Fix warnings from clangs -Wdocumentation flagJack Lloyd2017-07-281-1/+1
|/
* Update modern and nist policies with recent additionsJack Lloyd2017-06-302-0/+20
|
* Merge GH #1082 Add support for SM2 signature schemeJack Lloyd2017-06-302-0/+7
|\
| * Add SM2 signature schemeJack Lloyd2017-06-292-0/+8
| | | | | | | | | | | | From https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02 This is a contribution from Ribose Inc (@riboseinc).
* | Update BSI module policyRené Korthaus2017-06-301-0/+3
|/ | | | | Prohibit SM4 block cipher, ed25519 signature scheme and NIST SP800-56A KDF.
* Moved to draft-ietf-curdle-pkix assigned OIDsFrancis Dupont2017-06-121-2/+2
|
* Enable Ed25519 in 'modern' policyJack Lloyd2017-06-091-0/+1
|
* Add Ed25519 key type and testsJack Lloyd2017-06-071-0/+1
| | | | This work was sponsored by Ribose Inc
* Merge GH #826 Add support for Intel SHA instructionsJack Lloyd2017-05-191-0/+1
|\
| * Add support for Intel SHA-1/SHA-2 instructionsJack Lloyd2017-05-191-0/+1
| | | | | | | | Based on GH #807 and #808
* | Add SM3 OIDs and PKCSv1.5 hash prefixJack Lloyd2017-05-191-0/+3
|/
* Make template variable misc_config more specificSimon Warta2017-04-181-1/+1
|
* Merge GH #966 Add SM3 hash functionJack Lloyd2017-04-052-0/+2
|\
| * Update BSI and NIST policies to prohibit SM3 hash.Daniel Wyatt2017-04-032-0/+2
| |
* | configure: encode submodel prefix into single valueSimon Warta2017-04-042-11/+11
| | | | | | | | to reuse dictionary parsing
* | Merge GH #940 Add flags for MSVC for code size optimizationJack Lloyd2017-04-041-2/+2
|\ \ | |/ |/|
| * Add some MSVC compiler flagsDaniel Neus2017-04-041-2/+2
| | | | | | | | | | | | | | | | /Oi enabled in release builds: generates intrinsic functions for appropriate function calls https://msdn.microsoft.com/en-us/library/f99tchzc.aspx /Os if `--optimize-for-size` is used: tells the compiler to favor optimizations for size over optimizations for speed https://msdn.microsoft.com/en-us/library/f9534wye.aspx
* | Use arc4random(3) as system rng on OpenBSD.Alexander Bluhm2017-03-301-0/+1
| | | | | | | | | | | | | | | | | | OpenBSD provides the arc4random(3) function in libc for user land programs that need good random data. Use this to implement the Botan system random number generator. It has the advantage over /dev/urandom that it works without file descriptors and in chroot(2) environment. Internally libc is currently using a ChaCha20 cipher as PRNG and getentropy(2) to reseed itself automatically.
* | Use getentropy(2) as random source.Alexander Bluhm2017-03-291-1/+1
|/ | | | | | | | Gather entropy from system call getentropy(2). This is available since in OpenBSD 5.6 and Solaris 11.3. It can provide up to 256 bytes entropy from the kernel without blocking. As a system call it does not need a file descriptor and works in chroot(2) environments without device nodes.
* Merge GH #929 Add ppc64le target [ci skip]Jack Lloyd2017-03-221-0/+22
|\
| * Add ppc64le (POWER8 little endian) as supported cpuGustavo Serra Scalet2017-03-201-0/+22
| |
* | Fix DragonflyBSD fs accessJack Lloyd2017-03-191-0/+2
|/ | | | GH #887
* OpenBSD does not have 3 digit soname and library symlinks.Alexander Bluhm2017-03-131-1/+3
| | | | | Set library name for openbsd to libbotan-2.so.0.0 and do not install symlinks.
* Converge on a single side channel silent ec mp alg: randomizedNever2017-02-221-12/+5
| | | | | Montgomery ladder with order.bits()/2 bit scalar blinding and point randomization
* Make it possible to disable stack smashing protection.Jack Lloyd2017-02-043-3/+5
| | | | | | Also reflect anything in ABI flags into pkg-config Libs field. GH #863
* Add support for Aarch32 NEON flagsJack Lloyd2017-01-291-1/+4
| | | | configure.py already supports this arch-specific ISA flag syntax.