summaryrefslogtreecommitdiff
path: root/gfpcrypt.h
Commit message (Collapse)AuthorAgeFilesLines
* Use std namespace for memset, memcpy, memcmp (#1204)Jeffrey Walton2023-04-151-1/+1
|
* Fix typos (PR# 1099)Dimitris Apostolou2022-01-041-1/+1
|
* Update documentationJeffrey Walton2021-09-241-2/+4
|
* Use subgroup order in ElGamal encryption (GH #1059, CVE-2021-40530)Jeffrey Walton2021-09-231-0/+30
|
* Update documentationJeffrey Walton2021-04-111-3/+7
|
* Update documentationJeffrey Walton2021-04-111-58/+58
|
* Update documentationJeffrey Walton2021-04-111-1/+5
|
* Use \return and \throw consitently in the docsJeffrey Walton2020-12-071-16/+16
|
* Update documentationJeffrey Walton2019-09-261-15/+56
|
* Update documentationJeffrey Walton2019-09-261-5/+52
|
* Update documentationJeffrey Walton2019-08-271-4/+51
|
* Add legacy ECIES ECP cryptosystem and kat (GH #856)Jeffrey Walton2019-07-031-5/+3
|
* Revert #857 for nowMouse2019-07-021-2/+4
| | | | | | | Travis CI fails "deep tests" of DLIES with #857 applied. Let's revert it for now and get back to ```c++ cipherKey = key + MAC::DEDAULT_KEYLENGTH; ``` and see if it improves the situation.
* Complete change from DEFAULT_KEYLENGTH to DIGESTSIZE in DLAESMouse2019-07-021-2/+2
| | | Change from `MAC::DEFAULT_KEYLENGTH` to `MAC::DIGESTSIZE` in `DL_EncryptionAlgorithm_Xor` was only partially done. This was discovered when null hash was used. This, along with the proposed fix, was discovered by Andrew Wason (thanks!).
* Make 2048-bit modulus default for DSA (GH #571)Jeffrey Walton2018-01-231-3/+21
|
* Remove unneeded Doxygen directiveJeffrey Walton2018-01-191-20/+0
|
* Remove DL_PrivateKey_GFP_OldFormat (GH #567)Jeffrey Walton2018-01-191-102/+0
|
* Fix error in bits2octets: should use the base point's bit count, instead of ↵Linmao Song2018-01-101-1/+1
| | | | the hash value's. Also add test case for GetRandom, with original data from RFC6979 (#560)
* Change Doxygen comment style from //! to ///Jeffrey Walton2017-11-291-191/+191
| | | | Also see https://groups.google.com/forum/#!topic/cryptopp-users/A7-Xt5Knlzw
* Update documentationJeffrey Walton2017-11-261-4/+4
|
* Fix "X causes a section type conflict with Y" for GCC on AIX (GH #499)Jeffrey Walton2017-09-141-1/+5
| | | | We have no idea what caused the issue or why it fixed it
* Update documentationJeffrey Walton2017-07-271-1/+1
| | | | This cleanup was performed using Clang and -Wdocumentation -Wno-documentation-deprecated-sync
* Revert "Revert "Clear Visual Studio warnings (Issue 412)""Jeffrey Walton2017-06-021-1/+1
| | | | This reverts commit c3871aec948013c1a4d5613050c659520f59e2e4.
* Revert "Clear Visual Studio warnings (Issue 412)"Jeffrey Walton2017-06-021-1/+1
| | | | This reverts commit eb3b27a6a543. The change broke GCC 4.8 and unknown version of Clang on OS X. UB reported the OS X break, and JW found duplicated the break on a ARM CubieTruck with GCC 4.8.
* Clear Visual Studio warnings (Issue 412)Jeffrey Walton2017-05-301-1/+1
|
* Removed "typedef SHA1 SHA" (Issue 369)Jeffrey Walton2017-04-241-2/+2
| | | | | | This should have happened when we removed most of MAINTAIN_BACKWARDS_COMPATIBILITY artifacts. Its not practical move SHA1 into Weak:: namespace or "typedef SHA256 SHA" because SHA1 is too intertwined at the moment. In the interim, maybe we can place SHA1 in both CryptoPP:: and Weak:: namespaces. This will allow us to transition into Weak::SHA1 over time, and signal to users SHA1 should be avoided.
* Add C++ nullptr support (Issue 383)Jeffrey Walton2017-03-011-1/+1
|
* Change next version from 5.7 to 6.0Jeffrey Walton2017-02-211-1/+1
| | | | Crypto++ 5.7 was the increment after the 5.6.5 release. Crypto++ 6.0 accurately reflects compatibility
* Add BuildVersion and RuntimeVersion functions (Issue 371)Jeffrey Walton2017-01-281-1/+1
| | | | These function are intended to catch mining and matching of library versions. BuildVersion provides CRYPTOPP_VERSION when the shared object was built. RuntimeVersion provides CRYPTOPP_VERSION the app compiled against, which could be different than the shared object's version
* Change file preamble to include "originally written by Wei Dai"Jeffrey Walton2017-01-271-1/+1
| | | | We have made a fair number of changes, and we don't want WD to receive credit for issues he was not part of
* Use ASCII character for commentJeffrey Walton2017-01-221-1/+1
|
* Comments and whitespace checkinJeffrey Walton2017-01-201-621/+625
|
* Switch ECGDSA equation to slightly speed-up signingJeffrey Walton2016-12-131-1/+1
|
* Add German digital signature algorithm (ECGDSA) (Issue 113)Jeffrey Walton2016-12-131-0/+37
| | | | Also see ISO/IEC 15946 and http://www.teletrust.de/fileadmin/files/oid/ecgdsa_final.pdf
* Updated documentation (Issue 121)Jeffrey Walton2016-12-111-2/+3
|
* Add Deterministic DSA and ECDSA Signatures (Issue 121)Jeffrey Walton2016-12-111-4/+189
| | | | Based on Douglas Roark PR 131
* Updated documentation (Issue 328)Jeffrey Walton2016-12-031-10/+49
|
* Updated documentation (Issue 328)Jeffrey Walton2016-12-031-0/+31
|
* Removed VC++ 5.0 and 6.0 workarounds (Issue 342)Jeffrey Walton2016-12-031-1/+1
|
* Removed MAINTAIN_BACKWARDS_COMPATIBILITY_562 (Issue 70)Jeffrey Walton2016-12-031-68/+7
|
* Increment version to 5.7 due to ABI break *Issue 337)Jeffrey Walton2016-12-011-1/+1
| | | | We still need to supply a patch for those maintaining 5.6.x
* Fix: GCC warning "type qualifiers ignored on function return type".Ralph Tandetzky2016-12-011-2/+2
| | | | This pedantic message appeared all over the code. Also removed one warning about an unused variable in release build.
* Add CRYPTOPP_STATIC_CONSTEXPR macroJeffrey Walton2016-11-131-2/+2
|
* Updated documentation for Crypto++ 1.0 algorithmsJeffrey Walton2016-10-261-1/+3
|
* Updated documentationJeffrey Walton2016-10-181-10/+11
|
* Align with BouncyCastle and Botan for DLIES and ECIES. Updated documentationJeffrey Walton2016-10-181-80/+166
|
* Add CRYPTOPP_ASSERT (Issue 277, CVE-2016-7420)Jeffrey Walton2016-09-161-2/+2
| | | | trap.h and CRYPTOPP_ASSERT has existed for over a year in Master. We deferred on the cut-over waiting for a minor version bump (5.7). We have to use it now due to CVE-2016-7420
* Whitespace checkinJeffrey Walton2016-09-101-26/+26
|
* Add constexpr-ness to StaticAlgorithmName member functionJeffrey Walton2016-09-071-2/+2
|
* Cleared issues 11,12,13 (Clang integrated assembler), 58 (RC rollup), 66 ↵Jeffrey Walton2015-11-181-2/+6
| | | | (Coverity rollup)