Commit Graph

1923 Commits

Author SHA1 Message Date
Frank Denis
f95a79065b api.h removal 2015-11-21 12:56:46 +01:00
Frank Denis
3a4cdb9c3d More api.h removal 2015-11-21 12:45:27 +01:00
Frank Denis
e33a505823 api.h removal 2015-11-21 12:36:42 +01:00
Frank Denis
16f12c1af3 More api.h removal 2015-11-21 12:35:02 +01:00
Frank Denis
fd0c47025f More api.h removal 2015-11-21 12:24:59 +01:00
Frank Denis
e5a6057724 Remove api.h reference 2015-11-21 12:17:46 +01:00
Frank Denis
db5eda696e crypto_hash/sha{256,512}/cp/api.h removal 2015-11-21 12:16:30 +01:00
Frank Denis
b7fdeb5ed3 Stop hiding function names with macros in salsa20 2015-11-21 09:07:52 +01:00
Frank Denis
68917b01cf Limit safe_read() to SSIZE_MAX bytes 2015-11-21 08:33:08 +01:00
Frank Denis
a39ab96afa Use __uint128_t only if HAVE_TI_MODE is defined 2015-11-21 08:03:14 +01:00
Frank Denis
b554ac4f26 Temporarily remove Coverity Scan button, as Coverity Scan is down 2015-11-21 07:14:47 +01:00
Frank Denis
271f1fba41 Remove CVS $Id 2015-11-20 22:39:09 +01:00
Frank Denis
0f030428ff Update the Visual Studio 2013 solution 2015-11-20 15:46:31 +01:00
Frank Denis
f40a432bf5 More informative messages about missing package 2015-11-19 17:06:23 +01:00
Frank Denis
d8eacd3260 Mark randombytes_implementation functions static 2015-11-19 16:04:42 +01:00
Frank Denis
5a90e15eac Update the Visual Studio 2012 solution 2015-11-19 15:36:51 +01:00
Frank Denis
37834dab69 Merge pull request #322 from mc10/patch-1
README: Use the svg Travis image
2015-11-18 23:15:05 +01:00
Kevin Ji
2c585808d9 README: Use the svg Travis image 2015-11-18 13:55:40 -08:00
Frank Denis
05ad4b62b9 Update the Visual Studio 2010 solution 2015-11-17 18:31:57 +01:00
Frank Denis
b71254275e Revert "Use SSSE3 instructions even on Visual Studio with a 32-bit target"
This reverts commit 7371f0dca4.
2015-11-17 18:23:22 +01:00
Frank Denis
10151cdc8c Remove extra comma 2015-11-17 11:24:37 +01:00
Frank Denis
23a00c003f Do not export randombytes_set_implementation() in Javascript 2015-11-17 11:12:40 +01:00
Frank Denis
5e17a7adf8 Check that scalarmult() returns -1 with a point of small order
325606250916557431795983626356110631294008115727848805560023387167927233504
is a point of order 8
2015-11-17 11:07:37 +01:00
Frank Denis
1e33a0beab Update ChangeLog 2015-11-17 11:07:37 +01:00
Frank Denis
2bc5874874 Check that the output of X25519 is not the all-zero value
Return -1 if this happens, and mark crypto_scalarmult() as warn_unused_result
Mark dependent functions with warn_unused_result as well
2015-11-17 11:07:33 +01:00
Frank Denis
bdd2cdb3ac Consistency 2015-11-17 00:38:17 +01:00
Frank Denis
55f6eb83f8 Keep it simple 2015-11-16 23:47:33 +01:00
Frank Denis
9337ecfa60 Add tests for sodium_add(), more tests for sodium_increment() and is_zero() 2015-11-16 23:22:01 +01:00
Frank Denis
27466ded16 Indent 2015-11-16 23:19:24 +01:00
Frank Denis
07c42492e5 Repair sodium_is_zero() 2015-11-16 23:17:42 +01:00
Frank Denis
397d50664a Faster sodium_is_zero() and sodium_increment() helpers
Also add sodium_add(), since people tend to reimplement this in order to
add constants to nonces.
2015-11-16 22:14:27 +01:00
Frank Denis
b74f644d3f Replace CPU_ALIGNED_ACCESS_REQUIRED with CPU_UNALIGNED_ACCESS
Instead of defining a macro when aligned memory access is required,
define one when unaligned memory access is supported.

Safer when cross-compiling or not using autoconf
2015-11-16 22:01:19 +01:00
Frank Denis
7371f0dca4 Use SSSE3 instructions even on Visual Studio with a 32-bit target 2015-11-16 16:26:02 +01:00
Frank Denis
0ad21a218c Return CPU features in Visual Studio builds
Please note that on other platforms, we keep checking if intrinsics are available.
has_*() means that not only a CPU feature is present, but also that Sodium can
use it.
2015-11-16 16:16:54 +01:00
Frank Denis
eb8119d65c Enable 128-bit arithmetic if __int128 is available 2015-11-15 18:16:15 +01:00
Frank Denis
347464d3fd Update ChangeLog 2015-11-15 18:15:05 +01:00
Frank Denis
08a61e16d0 Update the top level VS solution 2015-11-15 18:01:17 +01:00
Frank Denis
f9169ac55b Add a compile-time size check 2015-11-14 16:56:47 +01:00
Frank Denis
707562cd4b Update ChangeLog 2015-11-14 16:46:54 +01:00
Frank Denis
cf3064b08f More explicit casts. Unaligned accesses are fine on these architectures. 2015-11-14 16:22:28 +01:00
Frank Denis
27048b06aa Clear the state after poly1305_finish() 2015-11-14 16:22:28 +01:00
Frank Denis
e4167d66fe Do not require assembly code to increment with carry 2015-11-14 16:22:24 +01:00
Frank Denis
dd238f518d Bump major 2015-11-14 15:33:15 +01:00
Frank Denis
0af177d1bf Indent 2015-11-14 15:28:29 +01:00
Frank Denis
096ea8a91d Handle partial blocks in poly1305_sse2 2015-11-14 15:23:25 +01:00
Frank Denis
2742547a27 Link poly1305_sse2
Breakage is expected as partial blocks are not handled yet
2015-11-14 14:34:34 +01:00
Frank Denis
a964055487 Make the poly1305_sse2 code more consistent with the other implementation 2015-11-14 13:57:25 +01:00
Frank Denis
6b7811471b Import vanilla poly1305_sse2 2015-11-14 13:55:40 +01:00
Frank Denis
121978e2c3 Different ways to avoid inlining 2015-11-14 10:27:08 +01:00
Frank Denis
bd4c5c0d17 Remove crypto_onetimeauth_poly1305_donna_implementation_name() prototype 2015-11-14 01:57:46 +01:00