| Commit message (Collapse) | Author | Age | Files | Lines | |
|---|---|---|---|---|---|
| * | Remove `core:mem` import from `core:crypto`. | Jeroen van Rijn | 3 days | 1 | -4/+39 |
| | | |||||
| * | core/crypto: Start work on the NIST curves | Yawning Angel | 2026-01-28 | 1 | -0/+3 |
| | | |||||
| * | core/crypto/_subtle: Refactor out common helpers | Yawning Angel | 2026-01-28 | 1 | -1/+12 |
| | | |||||
| * | base/runtime: Add `rand_bytes` and `HAS_RAND_BYTES` | Yawning Angel | 2025-11-29 | 1 | -1/+5 |
| | | | | | | | Having the OS/runtime provide a cryptographic entropy source is the right thing to do, and we need it to initialize the default random number generator. | ||||
| * | Further overhaul of package line comments. | Jeroen van Rijn | 2025-10-09 | 1 | -1/+1 |
| | | |||||
| * | More package lines | Jeroen van Rijn | 2025-10-09 | 1 | -4/+1 |
| | | |||||
| * | core/crypto: Fix/add some documentation (NFC) | Yawning Angel | 2024-07-16 | 1 | -1/+5 |
| | | |||||
| * | fix `@(optimization_mode)` usage in builtin collections | Laytan Laats | 2024-07-08 | 1 | -1/+1 |
| | | |||||
| * | `to_random_generator` -> `random_generator` | gingerBill | 2024-06-15 | 1 | -1/+1 |
| | | |||||
| * | Add `Reset` mode | gingerBill | 2024-06-15 | 1 | -0/+2 |
| | | |||||
| * | Add `runtime.Random_Generator` interface | gingerBill | 2024-06-15 | 1 | -0/+20 |
| | | |||||
| * | core/crypto: Add a `HAS_RAND_BYTES` constant | Yawning Angel | 2024-04-23 | 1 | -6/+3 |
| | | |||||
| * | core/crypto: Add `has_rand_bytes` | Yawning Angel | 2024-04-09 | 1 | -0/+10 |
| | | | | | | This allows runtime detection as to if `rand_bytes` is supported or not, and lets us enable the test-case on all of the supported targets. | ||||
| * | core/crypto: Disable optimization for the ct byte compare | Yawning Angel | 2023-04-08 | 1 | -0/+1 |
| | | | | | | Hedge against the possibility of a compiler getting clever enough to optimize this pattern as well. | ||||
| * | crypto: Add rand_bytes | Yawning Angel | 2021-11-17 | 1 | -0/+11 |
| | | | | | | | | This adds `rand_bytes(dst: []byte)` which fills the destination buffer with entropy from the cryptographic random number generator. This takes the "simple is best" approach and just directly returns the OS CSPRNG output instead of doing anything fancy (a la OpenBSD's arc4random). | ||||
| * | core/crypto: Add constant-time memory comparison routines | Yawning Angel | 2021-11-17 | 1 | -0/+41 |
| Using a constant-time comparison is required when comparing things like MACs, password digests, and etc to avoid exposing sensitive data via trivial timing attacks. These routines could also live under core:mem, but they are somewhat specialized, and are likely only useful for cryptographic applications. | |||||