aboutsummaryrefslogtreecommitdiffstats
path: root/src/lib
Commit message (Collapse)AuthorAgeFilesLines
* Fix some misc additional clang-tidy warningsJack Lloyd2022-02-067-27/+48
|
* Use C++17's concat namespace featureJack Lloyd2022-02-0651-241/+51
|
* Remove static from data in anonymous namespacesJack Lloyd2022-02-068-13/+13
|
* Use msgless static_assert instead of empty stringJack Lloyd2022-02-061-1/+1
|
* Clean up early conditions of Lucas primality checkJack Lloyd2022-02-061-6/+3
|
* Constify these variablesJack Lloyd2022-02-061-3/+3
|
* Avoid function-like macro in GOSTJack Lloyd2022-02-061-30/+37
|
* Compile fixJack Lloyd2022-02-061-1/+1
|
* Some fixes for modernize-loop-convertJack Lloyd2022-02-0619-101/+107
|
* Fix clang-tidy readability-named-parameterJack Lloyd2022-02-0653-113/+116
|
* More perf fixesJack Lloyd2022-02-065-6/+6
|
* Fix clang-tidy readability-container-size-empty warningsJack Lloyd2022-02-0655-115/+120
|
* Fix clang-tidy performance warningsJack Lloyd2022-02-0655-113/+114
|
* Apply fixes for clang-analyzerJack Lloyd2022-02-047-27/+9
|
* Text_Policy ignores 25519 if unsupported by buildHannes Rantzsch2022-02-011-0/+5
| | | | Co-authored-by: René Meusel <[email protected]>
* Avoid uses of volatile deprecated in C++20Jack Lloyd2022-01-276-9/+10
|
* Fix some Clang warningsJack Lloyd2022-01-279-15/+14
| | | | See GH #2886
* Check OSXSAVE and AVX flags before enabling AVX2 support.Alexander Bluhm2022-01-121-2/+8
| | | | | | | OpenBSD on i386 architecture does not save the extended FPU state and does not set this feature in the CPU. In this case AVX2 instructions cause an illegal instruction exception. Botan must also check the flags set by the OS in the CPU.
* No need for a conditional hereJack Lloyd2022-01-101-4/+1
|
* SystemRNG update for macOs.David CARLIER2021-12-231-0/+24
| | | | | | | | | From Yosemite, there is a new native API, the little potential issue with arc4random is possible errors (even tough most of the time unlikely happening) are ignored. The `__builtin_available` would be another way to detect its availability if preferred.
* In zfec avoid inversion if not necessaryJack Lloyd2021-12-221-4/+15
|
* Various ZFEC inprovementsJack Lloyd2021-12-214-111/+137
| | | | | | | * New encoding API * Express SSE2 version using SIMD_4x32 * Remove useless callback param * Rewrite some awkward code in the matrix inversion
* Add missing includeJack Lloyd2021-12-181-0/+1
|
* Merge pull request #2864 from reneme/fix/emscriptenRené Meusel2021-12-171-2/+0
|\ | | | | Improve emscripten build target
| * FIX: m_mutex is not used in Certificate_Store_In_SQLRené Meusel2021-12-161-2/+0
| | | | | | | | Co-Authored-By: Hannes Rantzsch <[email protected]>
* | Add a zfec-compatible forward error correction implementationJack Lloyd2021-12-167-0/+1426
| | | | | | | | Based on https://github.com/randombit/fecpp
* | Merge GH #2862 Fix GH #2861Jack Lloyd2021-12-141-0/+3
|\ \
| * | Fix GH #2861 Anything under 512 bits == 0 securityJack Lloyd2021-12-131-0/+3
| |/ | | | | | | CADO NFS can factor 512 bit RSA keys in under a day.
* | Merge GH #2860 Cleanup SHA-3 Clang workaroundJack Lloyd2021-12-143-198/+132
|\ \ | |/ |/|
| * Add header guardJack Lloyd2021-12-111-0/+5
| |
| * Cleanup SHA-3 Clang workaroundJack Lloyd2021-12-113-198/+127
| |
* | Merge GH #2755 Check TLS record type immediately on receiptJack Lloyd2021-12-111-6/+26
|\ \
| * | Check the TLS record type immediately on decodingJack Lloyd2021-12-111-6/+26
| |/ | | | | | | | | | | | | We would have rejected this later on anyway but there is no reason not to immediately close. GH #2754
* / Minor format tweaks [ci skip]Jack Lloyd2021-12-111-6/+6
|/
* Merge GH #2827 Remove OpenSSL providerJack Lloyd2021-12-1125-1749/+12
|\
| * Remove the OpenSSL providerJack Lloyd2021-10-2825-1749/+12
| | | | | | | | | | | | | | | | Starting in OpenSSL 3.0, most of the functionality which we need to implement the OpenSSL provider is deprecated. Rather than reimplement the whole provider in order to allow it to continue to work in the future, just remove it. Efforts would be better spent doing more optimization work rather than chasing OpenSSL's API changes.
* | Merge pull request #2854 from tenzap/master-cstdlibRené Meusel2021-11-231-0/+1
|\ \ | | | | | | add missing header: cstdlib
| * | add missing header: cstdlibtenzap2021-11-231-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | for compilation on older systems (like macos 10.11) Needed for std::free() & std::calloc() on older systems [1] That file is included indirectly on newer systems. [1] https://en.cppreference.com/w/cpp/memory/c/free
* | | Fix compilation issue on older mac (< 10.12)tenzap2021-11-171-0/+4
|/ / | | | | | | | | | | | | | | | | | | | | | | | | | | Error was: In file included from src/lib/entropy/getentropy/getentropy.cpp:13: /usr/include/sys/random.h:37:32: error: unknown type name 'u_int' void read_random(void* buffer, u_int numBytes); ^ /usr/include/sys/random.h:38:33: error: unknown type name 'u_int' void read_frandom(void* buffer, u_int numBytes); ^ /usr/include/sys/random.h:39:33: error: unknown type name 'u_int' int write_random(void* buffer, u_int numBytes); ^
* | Merge pull request #2831 from reneme/fix/potential_segfaultRené Meusel2021-11-169-33/+62
|\ \ | | | | | | FIX: potential segfault in TLS::Ciphersuite::to_string()
| * | FIX: review commentRené Meusel2021-11-151-1/+1
| | | | | | | | | | | | Co-Authored-By: Hannes Rantzsch <[email protected]>
| * | detect unknown ciphers when parsing TLS sessionRené Meusel2021-10-291-1/+9
| | |
| * | remove default c'tor from TLS::CiphersuiteRené Meusel2021-10-283-22/+22
| | |
| * | Ciphersuite::by_id() ::from_name() return a std::optionalRené Meusel2021-10-288-20/+41
| | |
* | | Remove OS::get_cpu_total and make OS::get_cpu_available more resiliantJack Lloyd2021-10-282-18/+21
| |/ |/| | | | | GH #2830
* | FIX: amalgamation build (SHA3 BMI2)René Meusel2021-10-281-2/+2
|/
* Merge GH #2822 Disable OpenSSL support for algos deprecated in OpenSSL 3.0Jack Lloyd2021-10-202-32/+0
|\
| * Disable OpenSSL support for algorithms deprecated in OpenSSL 3.0Jack Lloyd2021-10-202-32/+0
| | | | | | | | | | Alternately we could enable the legacy provider but as a library, we don't want to do this since doing so would have a global affect.
* | Merge GH #2803 Workaround miscompilation of SHA-3 in Clang 12 + XCode 13Jack Lloyd2021-10-202-10/+56
|\ \ | |/ |/|
| * workaround a miscompilation issue in clang 12 (XCode 13)René Meusel2021-10-192-10/+56
| |