| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
| |
|
|
|
|
| |
Otherwise it marks all of our header files as 'duplicates' ...
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This OS has its own crypto API and does not support CryptGenRandom.
Splits System_RNG_Impl into distinct declarations one per implementation
type. Easier to read now that we are up to 4 distinct versions.
Removes the CryptoAPI entropy source, and replaces it with an entropy
source that calls the system RNG. This is nominally a bit less flexible
in that the entropy source allowed polling multiple providers (though
we didn't actually make use of that). Plus side is it works on all
systems.
Currently the dev_random entropy source is still there because we do
actually use it to poll both /dev/random and /dev/urandom, and it
might be useful (on certain systems) to also poll a HW RNG, which
are often assigned their own device node. This could debatably also
be removed in favor of just reading the system RNG.
|
|
|
|
| |
this removes the duplicate "sha" in x86_64
|
|
|
|
|
|
| |
Not a big deal since the site already uses HSTS, but whatever.
[ci skip]
|
|
|
|
|
|
| |
For the fuzzers, builds an object and then links in a second step,
because we need that to link the fuzzer binaries for LLVM. (Clang
will emit bitcode for us, but doesn't want to link it.)
|
| |
|
| |
|
| |
|
| |
|
|\ |
|
| | |
|
| | |
|
|/ |
|
|
|
|
|
|
| |
http_util is required by the x509 module to perform
online OCSP checks, which should be defaulted to ON.
Without being part of the policy, it would be disabled.
|
|\ |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
supersedes #997
This commit removes the (broken) --destdir command line option and introduces
the DESTDIR environment variable for the 'make install' target. When it's set,
the installation will take place in the DESTDIR directory, under the prefix set
by --prefix, with all of the internal references (pkgconfig file, etc)
containing only the prefix. This behavior is more standard (as in autotools and
co.), so makes packaging easier.
Based on work of danimo and zgyarmati
|
|\ \
| | |
| | |
| | | |
line utils
|
| |/
| |
| |
| |
| |
| | |
Based on the work by @slicer4ever, adds support for
Windows sockets to http_util. As a bonus, we get Windows support
for tls_client and tls_server CLI.
|
|/ |
|
| |
|
|\ |
|
| | |
|
|/ |
|
| |
|
|\ |
|
| |
| |
| |
| |
| |
| | |
From https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02
This is a contribution from Ribose Inc (@riboseinc).
|
|/
|
|
|
| |
Prohibit SM4 block cipher, ed25519 signature scheme
and NIST SP800-56A KDF.
|
| |
|
| |
|
|
|
|
| |
This work was sponsored by Ribose Inc
|
|\ |
|
| |
| |
| |
| | |
Based on GH #807 and #808
|
|/ |
|
| |
|
|\ |
|
| | |
|
| |
| |
| |
| | |
to reuse dictionary parsing
|
|\ \
| |/
|/| |
|
| |
| |
| |
| |
| |
| |
| |
| | |
/Oi enabled in release builds: generates intrinsic functions for appropriate function calls
https://msdn.microsoft.com/en-us/library/f99tchzc.aspx
/Os if `--optimize-for-size` is used: tells the compiler to favor optimizations for size over optimizations for speed
https://msdn.microsoft.com/en-us/library/f9534wye.aspx
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
OpenBSD provides the arc4random(3) function in libc for user land
programs that need good random data. Use this to implement the
Botan system random number generator. It has the advantage over
/dev/urandom that it works without file descriptors and in chroot(2)
environment. Internally libc is currently using a ChaCha20 cipher
as PRNG and getentropy(2) to reseed itself automatically.
|
|/
|
|
|
|
|
|
| |
Gather entropy from system call getentropy(2). This is available
since in OpenBSD 5.6 and Solaris 11.3. It can provide up to 256
bytes entropy from the kernel without blocking. As a system call
it does not need a file descriptor and works in chroot(2) environments
without device nodes.
|
|\ |
|
| | |
|
|/
|
|
| |
GH #887
|
|
|
|
|
| |
Set library name for openbsd to libbotan-2.so.0.0 and do not install
symlinks.
|
|
|
|
|
| |
Montgomery ladder with order.bits()/2 bit scalar blinding and point
randomization
|
|
|
|
|
|
| |
Also reflect anything in ABI flags into pkg-config Libs field.
GH #863
|
|
|
|
| |
configure.py already supports this arch-specific ISA flag syntax.
|