aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Expand)AuthorAgeFilesLines
* A new warning in glibc triggers if memset is called with a constant sizelloyd2009-01-311-8/+8
* merge of '17ebb8fd6cdfe0a743092b2bf5b039a351cc23be'lloyd2009-01-214-6/+19
|\
| * Use printf instead of echo -n in botan-config, as according to bug reportslloyd2009-01-191-1/+1
| * In the Unix entropy source fast poll, clear the stat buf beforelloyd2009-01-031-0/+1
| * Fix a memory leak in PKCS #8 load_key and encrypt_key that wouldlloyd2008-12-121-5/+9
| * Add a ref to a paper describing a chosen ciphertext attack on OAEPlloyd2008-12-081-0/+8
| * DL_Group constructor taking three BigInts had the order of q and g swappedlloyd2008-12-081-1/+1
* | Argh. Using printf in botan-config didn't work either, because somelloyd2009-01-211-3/+3
|/
* Rickard Bondesson reported on botan-devel about some problems buildinglloyd2008-12-024-19/+7
* Fix name of function in exception throwlloyd2008-11-301-1/+1
* In EMSA3_Raw::raw_data, clear message buffer (reset) before returninglloyd2008-11-281-1/+3
* Allow asking for EMSA3(Raw) in get_emsa (returning a new EMSA3_Raw object)lloyd2008-11-281-0/+4
* Add a variant of EMSA3 called EMSA3_Raw which does not hash the data orlloyd2008-11-282-46/+123
* Add SHA-224 hash ids for EMSA2/X9.31 and EMSA3/PKCS #1 v1.5 public keylloyd2008-11-281-3/+14
* Rickard Bondesson reported on the mailing list that he had noticedlloyd2008-11-281-11/+13
* Add Doxygen comment for Timer::clock. Fix @return in benchmark.h and x509_ca.hlloyd2008-11-253-2/+6
* If the read succeceed in EGD_EntropySource::slow_poll, the loop wouldlloyd2008-11-251-0/+2
* Disable using OpenSSL's AES - it is causing crashes for an unknown reason.lloyd2008-11-241-0/+6
* Fix a roundoff error in the block cipher benchmarkslloyd2008-11-241-16/+17
* In Pooling_Allocator::get_more_core, limit in_bytes to at most 1 MiB tolloyd2008-11-242-3/+4
* In pkg-config, don't link against a specific version number (eg -lbotan-1.8.0)lloyd2008-11-241-1/+1
* Make X509_Store::CRL_Info public for IBM XLC 0.9 for Celllloyd2008-11-241-10/+14
* Wrap code and struct definitions internal to sha1_sse2_imp.cpp in anlloyd2008-11-241-0/+4
* In es_ftw, remove check for if the return value of read() is largerlloyd2008-11-241-1/+1
* Modify es_ftw to use xor_into_buflloyd2008-11-231-4/+4
* Reduce size of I/O buffer in HMAC_RNG from 128 to 96 bytes. Unlikely that anylloyd2008-11-231-1/+1
* Previously es_unix would always try to get 16K, then return. Now itlloyd2008-11-231-4/+3
* Add an Algorithm_Factory& argument to Engine::get_cipher to avoid alloyd2008-11-234-8/+13
* Remove openssl/gnump engine dep on libstate, no longer a deplloyd2008-11-232-8/+0
* Limit the output size of fast polls by the BeOS, Unix, and Win32 entropylloyd2008-11-233-0/+3
* Use a simple run length encoding in xor_into_buf, so long blocks of spaces,lloyd2008-11-232-3/+22
* Compile fixlloyd2008-11-231-2/+2
* Remove now unused buf_es modulelloyd2008-11-233-134/+0
* Update BeOS entropy poller to also derive directly from EntropySourcelloyd2008-11-233-35/+46
* Fix return types in declarationlloyd2008-11-231-2/+3
* Convert Win32 stats polling entropy source to use xor_into_buf. Untested.lloyd2008-11-233-44/+59
* Fix indexing of ids array. Don't zeroize stat/rusage bufs before uselloyd2008-11-231-8/+4
* Use template version of xor_into_buf wherever useful in es_unix.cpplloyd2008-11-231-3/+3
* Pass by const reference so larger structs can be used with xor_into_buf templatelloyd2008-11-231-1/+1
* Use template version of xor_into_buf in es_unixlloyd2008-11-231-1/+1
* Move xor_into_buf to xor_buf.cpp. Also add a new template wrapper forlloyd2008-11-233-10/+39
* Change unix_procs entropy source to be a plain EntropySource instead oflloyd2008-11-233-24/+47
* In Randpool and HMAC_RNG, zeroize the I/O buffer used for holding polledlloyd2008-11-232-0/+5
* Add xor_into_buf. Add Doxygen comments for xor_buflloyd2008-11-231-10/+32
* Revert change that added multiblock support to SSE2 SHA-1. Was causinglloyd2008-11-233-206/+183
* Dean Gaudet's original version of the SHA-1 SSE2 code supported multiplelloyd2008-11-233-183/+206
* Do a minor optimization in some of the compression functions, loadinglloyd2008-11-237-121/+145
* Update SHA1_IA32 to use compress_nlloyd2008-11-231-2/+6
* I had not anticipated this being really worthwhile, but it turns outlloyd2008-11-2333-746/+876
* Fix integer overflow in benchmarslloyd2008-11-231-4/+4