Jeffrey Walton
652c154759
Change UUIDs for VS solution and projects
2016-10-02 20:32:47 -04:00
Jeffrey Walton
277b8a3c4e
Clear C4100 "unreferenced formal parameter" warning on pSetNewHandler
2016-10-02 20:11:12 -04:00
Jeffrey Walton
82b13e23ca
Add "Crypto++ DLL" to OutputDebugString messages (Issue 314)
...
Visual Studio 2010 was opt-in; which Visual Studio 2012 is opt-out
2016-10-02 19:22:49 -04:00
Jeffrey Walton
2413c0e041
Opt-out of ASLR (Issue 314)
...
Visual Studio 2010 was opt-in; which Visual Studio 2012 is opt-out
2016-10-02 18:53:50 -04:00
Jeffrey Walton
1dd0b07a1e
Improve OutputDebugString messages (Issue 314)
2016-10-02 18:40:28 -04:00
Jeffrey Walton
e3c4ccb0fc
Add newline to OutputDebugString (Issue 314)
2016-10-02 18:03:30 -04:00
Jeffrey Walton
578b0e2a07
Add information for expected and load address for FIPS DLL module (Issue 314)
2016-10-02 17:52:08 -04:00
Jeffrey Walton
55bbc55a7e
Report computed MAC (Issue 314)
2016-10-02 16:20:25 -04:00
Jeffrey Walton
3ea28efa69
Use Warning Level 4 (Issue 314)
2016-10-02 15:20:55 -04:00
Jeffrey Walton
5e3d0097fa
Visual Studio 2010 project files cleanup (Issue 314)
2016-10-02 14:39:58 -04:00
Jeffrey Walton
fd278c2e8b
Guard on DEBUG_NEW and stub-out for precompiled headers
2016-10-02 03:10:06 -04:00
Jeffrey Walton
8a6d18853d
Guard DEBUG_NEW for Visual Studio and leak detection
2016-10-02 02:52:10 -04:00
Jeffrey Walton
bcb7dffd5e
Update Windows test script
2016-10-02 02:12:50 -04:00
Jeffrey Walton
e09d8a2491
Fix Cygwin compile due to missing <signal.h>
2016-10-01 22:12:08 -04:00
Jeffrey Walton
856d3d5508
Fixed Perl string expansion
2016-10-01 16:22:59 -04:00
Jeffrey Walton
46a4385db5
Add cryptest-windows.pl script
2016-10-01 14:44:40 -04:00
Jeffrey Walton
625a6dd09a
Clear warnings under Visual Studio 2012
2016-10-01 12:04:57 -04:00
Jeffrey Walton
43313e6c0f
Add missing ossig.h to file list for ZIP file[A
2016-10-01 05:39:26 -04:00
Jeffrey Walton
50736d8c1f
Clear warnings under Visual Studio 2008
2016-10-01 05:24:45 -04:00
Jeffrey Walton
d40c7fb56b
Fix compile under Visual Studio 2008
2016-10-01 05:17:02 -04:00
Jeffrey Walton
395b163450
Fix compile under Visual Studio 2003
2016-10-01 04:42:42 -04:00
Jeffrey Walton
9b64112a11
Whitespace cleanup
2016-10-01 02:02:51 -04:00
Jeffrey Walton
b7061f5b6e
Clear Coverity "Uninitialized pointer field (UNINIT_CTOR)"
...
CID 148083
2016-10-01 01:24:19 -04:00
Jeffrey Walton
8d840ecd8e
Clear Coverity "Missing break in switch (MISSING_BREAK)"
...
CID 147882, 147880, 147879, 147876
2016-10-01 00:51:33 -04:00
Jeffrey Walton
fd64929389
Add benchmark tests
2016-09-30 16:58:27 -04:00
Jeffrey Walton
e2943d4530
Add coverity-macosx.txt instructions
2016-09-30 15:47:47 -04:00
Jeffrey Walton
19ebf769e7
Add debug instrumentation to Rijndael
...
We added asserts due to Coverity findings. We beieve the findings were false positives
2016-09-30 13:14:29 -04:00
Jeffrey Walton
2b328e8f8b
Fix AES and X86 compile on Solaris
2016-09-30 09:31:23 -04:00
Jeffrey Walton
2efedfb5ab
Reset config.h that cross-pollinated from AES dev-branch
2016-09-30 01:19:44 -04:00
Jeffrey Walton
3a096ebc9b
Removed benchmark tests that cross-pollinated from AES dev-branch
2016-09-30 01:14:15 -04:00
Jeffrey Walton
4c1b5472cc
Cutover to SecByteBlock member for AES (Issue 302, CVE-2016-7544)
2016-09-30 01:09:21 -04:00
Jeffrey Walton
5a0a2187f2
Remove unneeded m_eofReceived initialization (Issue 312)
2016-09-29 23:03:39 -04:00
Jeffrey Walton
11fc3df369
Coverity finding CID 148134: Uninitialized scalar field (UNINIT_CTOR) (Issue 312)
2016-09-29 22:34:33 -04:00
Jeffrey Walton
cb4ba3f7b9
Coverity finding CID 148138: Uninitialized scalar field (UNINIT_CTOR) (Issue 312)
2016-09-29 22:17:55 -04:00
Jeffrey Walton
717a3002be
Remove unneeded asserts
2016-09-29 21:57:33 -04:00
Jeffrey Walton
8518d22760
Change to file scope statics for Zero(), One(), Two() (Thanks DB, Issue 310)
2016-09-29 21:10:11 -04:00
Jeffrey Walton
1c30ffc64a
Remove compare on "result >= WAIT_OBJECT_0" (Issue 311)
2016-09-29 15:47:53 -04:00
Jeffrey Walton
639a11c74a
Update coverity-windows.txt to clean old artifacts
2016-09-29 15:29:31 -04:00
Jeffrey Walton
5fc3e8a395
Remove assert on "dwResult >= WAIT_OBJECT_0" (Issue 311)
2016-09-29 15:15:34 -04:00
Jeffrey Walton
afe391571b
Make Singleton<Integer> static with function scope (Issue 310)
...
This may not fix the issue. Drilling into the issue from the web-based dashboard, Coverity is targeting:
1. noescape: CryptoPP::Integer::operator =(CryptoPP::Integer const &) does not free or save its parameter t.
3049 Integer& Integer::operator=(const Integer& t)
3050 {
3051 if (this != &t)
3052 {
3053 if (reg.size() != t.reg.size() || t.reg[t.reg.size()/2] == 0)
3054 reg.New(RoundupSize(t.WordCount()));
3055 CopyWords(reg, t.reg, reg.size());
3056 sign = t.sign;
3057 }
3058 return *this;
3059 }
2016-09-29 14:31:54 -04:00
Jeffrey Walton
f61b9eda2e
Add Coverity modeling file
2016-09-29 13:09:10 -04:00
Jeffrey Walton
6a13f4f308
Add coverity-windows.txt script and instructions
2016-09-29 05:57:10 -04:00
Jeffrey Walton
794e071b1a
Add coverity-linux.txt with copy/paste recipe for scanning under Linux
2016-09-28 22:20:36 -04:00
Jeffrey Walton
6af5b8424f
Removed likely and unlikely macros
...
Benchmarking showed the use of the macros slowed things down. Profile guided bracnh reordering, committed at dc99266599a0e72d, provided a better benefit
2016-09-28 18:18:55 -04:00
Jeffrey Walton
6560635405
Merge Cmake changes for -DNDEBUG and -g from Florian (Issue 276, 277, CVE-2016-7420)
2016-09-27 21:03:07 -04:00
Jeffrey Walton
42481b231a
Merge CMake chenges to address -DNDEBUG and -g from Florian (Issue 276, 277, CVE-2016-7420)
2016-09-27 20:59:22 -04:00
Jeffrey Walton
6bf0d32279
Used CRYPTOPP_UNLIKELY on gf2n.cpp hotspot
2016-09-27 20:58:17 -04:00
Jeffrey Walton
7ae1267673
Add CRYPTOPP_LIKELY and CRYPTOPP_UNLIKELY macros
2016-09-27 20:47:31 -04:00
Jeffrey Walton
8d227675a9
Coverity finding CID 147829 Bad bit shift operation (BAD_SHIFT)
...
I'm fairly certian this is a false positive. Checking GF2NT::MultiplicativeInverse under code coverage shows its exercised 555,735 times. We will clear it anayway to squash the finding
For those not aware, on Linux and Unix, you can issue 'make coverage' and get code coverage statistics
2016-09-27 20:20:54 -04:00
Jeffrey Walton
c3e45b2e51
Updated
2016-09-27 19:34:46 -04:00