Commit Graph

2200 Commits (4d562aaac77269add8a84b7c643c9c2022e425fd)

Author SHA1 Message Date
Jeffrey Walton 652c154759
Change UUIDs for VS solution and projects 2016-10-02 20:32:47 -04:00
Jeffrey Walton 277b8a3c4e
Clear C4100 "unreferenced formal parameter" warning on pSetNewHandler 2016-10-02 20:11:12 -04:00
Jeffrey Walton 82b13e23ca
Add "Crypto++ DLL" to OutputDebugString messages (Issue 314)
Visual Studio 2010 was opt-in; which Visual Studio 2012 is opt-out
2016-10-02 19:22:49 -04:00
Jeffrey Walton 2413c0e041
Opt-out of ASLR (Issue 314)
Visual Studio 2010 was opt-in; which Visual Studio 2012 is opt-out
2016-10-02 18:53:50 -04:00
Jeffrey Walton 1dd0b07a1e
Improve OutputDebugString messages (Issue 314) 2016-10-02 18:40:28 -04:00
Jeffrey Walton e3c4ccb0fc
Add newline to OutputDebugString (Issue 314) 2016-10-02 18:03:30 -04:00
Jeffrey Walton 578b0e2a07
Add information for expected and load address for FIPS DLL module (Issue 314) 2016-10-02 17:52:08 -04:00
Jeffrey Walton 55bbc55a7e
Report computed MAC (Issue 314) 2016-10-02 16:20:25 -04:00
Jeffrey Walton 3ea28efa69
Use Warning Level 4 (Issue 314) 2016-10-02 15:20:55 -04:00
Jeffrey Walton 5e3d0097fa
Visual Studio 2010 project files cleanup (Issue 314) 2016-10-02 14:39:58 -04:00
Jeffrey Walton fd278c2e8b
Guard on DEBUG_NEW and stub-out for precompiled headers 2016-10-02 03:10:06 -04:00
Jeffrey Walton 8a6d18853d
Guard DEBUG_NEW for Visual Studio and leak detection 2016-10-02 02:52:10 -04:00
Jeffrey Walton bcb7dffd5e
Update Windows test script 2016-10-02 02:12:50 -04:00
Jeffrey Walton e09d8a2491
Fix Cygwin compile due to missing <signal.h> 2016-10-01 22:12:08 -04:00
Jeffrey Walton 856d3d5508
Fixed Perl string expansion 2016-10-01 16:22:59 -04:00
Jeffrey Walton 46a4385db5
Add cryptest-windows.pl script 2016-10-01 14:44:40 -04:00
Jeffrey Walton 625a6dd09a
Clear warnings under Visual Studio 2012 2016-10-01 12:04:57 -04:00
Jeffrey Walton 43313e6c0f
Add missing ossig.h to file list for ZIP file[A 2016-10-01 05:39:26 -04:00
Jeffrey Walton 50736d8c1f
Clear warnings under Visual Studio 2008 2016-10-01 05:24:45 -04:00
Jeffrey Walton d40c7fb56b
Fix compile under Visual Studio 2008 2016-10-01 05:17:02 -04:00
Jeffrey Walton 395b163450
Fix compile under Visual Studio 2003 2016-10-01 04:42:42 -04:00
Jeffrey Walton 9b64112a11
Whitespace cleanup 2016-10-01 02:02:51 -04:00
Jeffrey Walton b7061f5b6e
Clear Coverity "Uninitialized pointer field (UNINIT_CTOR)"
CID 148083
2016-10-01 01:24:19 -04:00
Jeffrey Walton 8d840ecd8e
Clear Coverity "Missing break in switch (MISSING_BREAK)"
CID 147882, 147880, 147879, 147876
2016-10-01 00:51:33 -04:00
Jeffrey Walton fd64929389
Add benchmark tests 2016-09-30 16:58:27 -04:00
Jeffrey Walton e2943d4530
Add coverity-macosx.txt instructions 2016-09-30 15:47:47 -04:00
Jeffrey Walton 19ebf769e7
Add debug instrumentation to Rijndael
We added asserts due to Coverity findings. We beieve the findings were false positives
2016-09-30 13:14:29 -04:00
Jeffrey Walton 2b328e8f8b
Fix AES and X86 compile on Solaris 2016-09-30 09:31:23 -04:00
Jeffrey Walton 2efedfb5ab
Reset config.h that cross-pollinated from AES dev-branch 2016-09-30 01:19:44 -04:00
Jeffrey Walton 3a096ebc9b
Removed benchmark tests that cross-pollinated from AES dev-branch 2016-09-30 01:14:15 -04:00
Jeffrey Walton 4c1b5472cc Cutover to SecByteBlock member for AES (Issue 302, CVE-2016-7544) 2016-09-30 01:09:21 -04:00
Jeffrey Walton 5a0a2187f2
Remove unneeded m_eofReceived initialization (Issue 312) 2016-09-29 23:03:39 -04:00
Jeffrey Walton 11fc3df369
Coverity finding CID 148134: Uninitialized scalar field (UNINIT_CTOR) (Issue 312) 2016-09-29 22:34:33 -04:00
Jeffrey Walton cb4ba3f7b9
Coverity finding CID 148138: Uninitialized scalar field (UNINIT_CTOR) (Issue 312) 2016-09-29 22:17:55 -04:00
Jeffrey Walton 717a3002be
Remove unneeded asserts 2016-09-29 21:57:33 -04:00
Jeffrey Walton 8518d22760
Change to file scope statics for Zero(), One(), Two() (Thanks DB, Issue 310) 2016-09-29 21:10:11 -04:00
Jeffrey Walton 1c30ffc64a
Remove compare on "result >= WAIT_OBJECT_0" (Issue 311) 2016-09-29 15:47:53 -04:00
Jeffrey Walton 639a11c74a
Update coverity-windows.txt to clean old artifacts 2016-09-29 15:29:31 -04:00
Jeffrey Walton 5fc3e8a395
Remove assert on "dwResult >= WAIT_OBJECT_0" (Issue 311) 2016-09-29 15:15:34 -04:00
Jeffrey Walton afe391571b
Make Singleton<Integer> static with function scope (Issue 310)
This may not fix the issue. Drilling into the issue from the web-based dashboard, Coverity is targeting:

    1. noescape: CryptoPP::Integer::operator =(CryptoPP::Integer const &) does not free or save its parameter t.

3049 Integer& Integer::operator=(const Integer& t)
3050 {
3051   if (this != &t)
3052   {
3053     if (reg.size() != t.reg.size() || t.reg[t.reg.size()/2] == 0)
3054       reg.New(RoundupSize(t.WordCount()));
3055     CopyWords(reg, t.reg, reg.size());
3056     sign = t.sign;
3057   }
3058   return *this;
3059 }
2016-09-29 14:31:54 -04:00
Jeffrey Walton f61b9eda2e
Add Coverity modeling file 2016-09-29 13:09:10 -04:00
Jeffrey Walton 6a13f4f308 Add coverity-windows.txt script and instructions 2016-09-29 05:57:10 -04:00
Jeffrey Walton 794e071b1a
Add coverity-linux.txt with copy/paste recipe for scanning under Linux 2016-09-28 22:20:36 -04:00
Jeffrey Walton 6af5b8424f
Removed likely and unlikely macros
Benchmarking showed the use of the macros slowed things down. Profile guided bracnh reordering, committed at dc99266599a0e72d, provided a better benefit
2016-09-28 18:18:55 -04:00
Jeffrey Walton 6560635405
Merge Cmake changes for -DNDEBUG and -g from Florian (Issue 276, 277, CVE-2016-7420) 2016-09-27 21:03:07 -04:00
Jeffrey Walton 42481b231a Merge CMake chenges to address -DNDEBUG and -g from Florian (Issue 276, 277, CVE-2016-7420) 2016-09-27 20:59:22 -04:00
Jeffrey Walton 6bf0d32279
Used CRYPTOPP_UNLIKELY on gf2n.cpp hotspot 2016-09-27 20:58:17 -04:00
Jeffrey Walton 7ae1267673 Add CRYPTOPP_LIKELY and CRYPTOPP_UNLIKELY macros 2016-09-27 20:47:31 -04:00
Jeffrey Walton 8d227675a9
Coverity finding CID 147829 Bad bit shift operation (BAD_SHIFT)
I'm fairly certian this is a false positive. Checking GF2NT::MultiplicativeInverse under code coverage shows its exercised 555,735 times. We will clear it anayway to squash the finding
For those not aware, on Linux and Unix, you can issue 'make coverage' and get code coverage statistics
2016-09-27 20:20:54 -04:00
Jeffrey Walton c3e45b2e51
Updated 2016-09-27 19:34:46 -04:00