54904957f2
[+] IRandomDevice.NextArrayVec2Fast
...
[+] IRandomDevice.NextArrayVec3Fast
[+] IRandomDevice.NextArrayVec4Fast
[+] AuRNG.RngArrayVec2Fast
[+] AuRNG.RngArrayVec3Fast
[+] AuRNG.RngArrayVec4Fast
2024-04-24 15:27:19 +01:00
0a90fd1a25
[*] Force compile time optimizations under RNG
2024-04-23 22:24:07 +01:00
442a5f31eb
[+] AuRNG::RngArrayI32RangeFast
...
[+] AuRNG::RngArrayU32RangeFast
[+] AuRNG::RngArrayI64RangeFast
[+] AuRNG::RngArrayU64RangeFast
[+] IRandomDevice::NextArrayI32RangeFast
[+] IRandomDevice::NextArrayU32RangeFast
[+] IRandomDevice::NextArrayI64RangeFast
[+] IRandomDevice::NextArrayU64RangeFast
2024-04-22 22:05:01 +01:00
5f9681c9e3
[+] AuRNG::IRandomDevice::NextU64Range
...
[+] AuRNG::IRandomDevice::NextI64Range
[+] AuRNG::IRandomDevice::NextVec2
[+] AuRNG::IRandomDevice::NextVec2Sorted
[+] AuRNG::IRandomDevice::NextVec3
[+] AuRNG::IRandomDevice::NextVec3Sorted
[+] AuRNG::IRandomDevice::NextVec4
[+] AuRNG::IRandomDevice::NextVec4Sorted
[+] AuRNG::IRandomDevice::NextArrayI64Range
[+] AuRNG::IRandomDevice::NextArrayU64Range
[+] AuRNG::IRandomDevice::NextArrayU32Mask
[+] AuRNG::IRandomDevice::NextArrayU64Mask
[+] AuRNG::IRandomDevice::NextArrayI64
[+] AuRNG::IRandomDevice::NextArrayU64
[+] AuRNG::IRandomDevice::NextArrayVec2
[+] AuRNG::IRandomDevice::NextArrayVec2Sorted
[+] AuRNG::IRandomDevice::NextArrayVec3
[+] AuRNG::IRandomDevice::NextArrayVec3Sorted
[+] AuRNG::IRandomDevice::NextArrayVec4
[+] AuRNG::IRandomDevice::NextArrayVec4Sorted
[+] AuRNG::IRandomDevice::NextArrayVec4SortedFast
[+] AuRNG::IRandomDevice::NextArrayVec3SortedFast
[+] AuRNG::IRandomDevice::NextArrayVec2SortedFast
[+] AuRNG::IRandomDevice::NextArrayDoubleRangeFast
[+] AuRNG::IRandomDevice::NextArrayDecimalsFast
[+] AuRNG::RngU64Range
[+] AuRNG::RngI64Range
[+] AuRNG::RngVec2
[+] AuRNG::RngVec2Sorted
[+] AuRNG::RngVec3
[+] AuRNG::RngVec3Sorted
[+] AuRNG::RngVec4
[+] AuRNG::RngVec4Sorted
[+] AuRNG::RngArrayI64Range
[+] AuRNG::RngArrayU64Range
[+] AuRNG::RngArrayU32Mask
[+] AuRNG::RngArrayU64Mask
[+] AuRNG::RngArrayI64
[+] AuRNG::RngArrayU64
[+] AuRNG::RngArrayVec2
[+] AuRNG::RngArrayVec2Sorted
[+] AuRNG::RngArrayVec3
[+] AuRNG::RngArrayVec3Sorted
[+] AuRNG::RngArrayVec4
[+] AuRNG::RngArrayVec4Sorted
[+] AuRNG::RngArrayVec4SortedFast
[+] AuRNG::RngArrayVec3SortedFast
[+] AuRNG::RngArrayVec2SortedFast
[+] AuRNG::RngArrayDoubleRangeFast
[+] AuRNG::RngArrayDecimalsFast
2024-04-22 06:02:56 +01:00
616fc54531
[*] Hash WELL outputs (ABI break once again >:( )
...
[*] Rework/Fix WELL_NextBytes (large) improperly accounting for small buffers (this internal function is publicly visible. WELL_NextLong isn't going to save us)
2024-04-18 05:06:40 +01:00
631fad8fd0
[+] ERngStringCharacters::eLowerAlphaNumericCharacters
...
[+] ERngStringCharacters::eUpperAlphaNumericCharacters
2024-03-11 17:33:36 +00:00
e199172428
[+] AuRNG::SetSecureRNGBackendOverload
...
[+] AuRNG::GetSecureRNGBackendOverload
[+] AuRNG::GetSecureRNGBackend
2024-02-25 19:42:11 +00:00
22a6338da4
[*] Use AuRoundUpPow2 in AuRNG
2024-01-11 09:17:56 +00:00
72a3513a04
[+] New stream adapters
...
[+] IRandomDevice::ToStreamReader
[+] AuIO::Adapters::NewRandomAdapter
[+] AuIO::Adapters::NewNOPsReadAdapter
[+] AuIO::Adapters::NewNOPsSeekingAdapter
[+] AuIO::Adapters::NewNOPsWriteAdapter
[+] AuIO::Adapters::NewZerosReadAdapter
[+] AuIO::Adapters::NewZerosSeekingAdapter
2024-01-03 23:54:46 +00:00
c16a0b1600
[+] IRandomDevice::NextArrayI32Range
...
[+] IRandomDevice::NextArrayU32Range
[+] IRandomDevice::NextArrayDoubleRange
[+] IRandomDevice::NextArrayI32
[+] IRandomDevice::NextArrayU32
[+] IRandomDevice::NextArrayDouble
[+] IRandomDevice::NextArrayDecimals
[+] IRandomDevice::NextArrayUUIDs
[*] IRandomDevice minor refactoring for consistency
[*] Improve decimals once again (perf/deterministic)
2024-01-01 14:49:35 +00:00
7b59cab36e
[*] eepy
2023-12-31 22:39:31 +00:00
063aa5c548
[+] IRandomDevice::NextUUID
2023-12-29 22:59:34 +00:00
e9651eead3
[*] Linux build regressons
2023-12-04 21:13:25 +00:00
9ba049d485
[*] Refactor "Jiffies" to "Frequency"
2023-12-01 04:49:18 +00:00
0c1c6d7c24
[*] Formatting regressions (+ 1x double-based RNG regression)
2023-12-01 03:43:06 +00:00
cab8627ffd
[*] (AuRandom) Resolve bad floating point distribution
2023-12-01 03:12:04 +00:00
2d58f8fdef
[-] Remove #if 0s from AuRandomDevice (finished working on the rng upgrades)
2023-11-18 11:19:57 +00:00
37adbad397
[*] IM NOT MAD. YOURE MAD ( b88c61c1
cont)
2023-11-18 01:45:12 +00:00
b88c61c16d
[*] Amend 999f3e69
2023-11-17 12:41:08 +00:00
999f3e69ca
[*] RNG (PLAYBACK ABI-BREAK!!!): preemptively silence the turbo autists that are going to complain about modulo bias
...
(...well, mostly. this will be good enough.)
[*] Improve fast RNG device perf
2023-11-15 17:53:37 +00:00
73f6f6ea1e
[*] Reintroduce this function pointer test branch
2023-10-21 07:23:56 +01:00
8fd4ef0a71
[*] Allocless RNG devices
2023-10-17 10:03:15 +01:00
f798c59cb8
[*] Fixed missed and double mimalloc init, via allocation under SwInfo, being probed by alternative nt clock query logic, under the fallback rng algorithm, possibly under another tls thread_only race condition
2023-10-08 15:00:52 +01:00
f585d41ba3
[*] 478cb2b1
?
2023-10-07 17:12:54 +01:00
a7a45aaf4b
[*] Using bcrypt continues to be a dumpsterfire mistake
2023-10-07 16:56:33 +01:00
478cb2b185
[*] Improve RNG fallback performance (early process init canaries) by properly accounting for < 10 Mhz clocks
2023-10-07 14:50:32 +01:00
cf7be329d6
[*] Update fallback RNG entropy: reduce expected tick resolution
2023-09-09 13:50:26 +01:00
be32e2777f
[*] 3; chosen by dice roll. mimalloc heap seed regression: 115ee1a9ec
2023-08-29 01:07:59 +01:00
836edbabdd
[+] Linux and BSD specific RNG
...
[*] Improved UNIX rng read check
2023-08-18 22:38:17 +01:00
4240966512
[*] Two trivial changes (not fixing or improving anything)
2023-08-18 15:53:38 +01:00
1f173a8799
[*] Begin resolving 8 months of Linux neglect
2023-08-11 16:51:42 +01:00
115ee1a9ec
[*] Improve time based RNG failover implementation
2023-07-13 05:58:53 +01:00
adefbbe16b
[*] Harden time based RNG
...
[*] RNG needs specific optimal paths for Win10 and older oses
[+] Internal RtlGenRandom
2023-07-11 18:02:40 +01:00
66b948697b
[+] Missing x509 members
...
[*] Added POSIX-like rng fd close on deinit
[*] Added verbose arg checks for unix env vars
2023-07-10 20:58:12 +01:00
14d60ee2d0
[*] Wanna drop threaten to drop older APIs from the Windows Runtime? Alright, we're being pushed towards Windows XP support by accident.
2023-07-09 11:26:41 +01:00
4086fc94bb
[*] bug fix: RNG strings werent deterministic
2023-04-28 04:59:09 +01:00
124038df62
[*] Refactor public headers
...
[+] AuConsole::Commands::RemoveCommand
[+] EExtendedUsage::eServerAuth
[+] SysPanic2 for SysSafeLine hints (backtrace may contain optimized SysPanics, making tracing the true origin difficult)
[*] Reworked SysAssertions
[*] AuParse::EncodeHex now takes AuMemoryViewRead
[*] AuRng::ReadSecureRNG now takes AuMemoryViewWrite
[*] AuRng::ReadFastRNG now takes AuMemoryViewWrite
2023-01-15 06:05:22 +00:00
dcc9205ea6
[+] IRandomDevice::ToSeed()
2022-12-28 20:30:15 +00:00
1e4082c02f
[+] Linux datagrams
...
[+] NetSocketBind::uDefaultInputStreamSize
[+] NetDatagramBind::uDefaultInputStreamSize
2022-12-16 17:18:12 +00:00
f0fcec0cb7
[+] _CLOEXEC on F-tier operating systems predating SMP and processes
2022-12-16 03:48:04 +00:00
766be57a46
[+] Linux build [again]
...
[+] ProcessSectionViewReserved.Unix.cpp
[*] Fix missing ::Flush() member on ViewWriter
2022-12-16 00:41:01 +00:00
cbad382b6a
[+] Windows 7 support
2022-12-14 01:35:18 +00:00
898c0ced37
[*] Refactoring in progress...
2022-11-17 08:03:20 +00:00
efc02d24f7
[*] Refactor RandomDef: bSecure, ::SetQuickRng()
...
[*] Default initialize net protocols to zero (tcp)
[*] Warning under AuUInt8 &ByteBuffer::operator[](AuUInt idx)
2022-09-27 17:30:26 +01:00
8a2947ffc5
[+] RMD128+BScFwd based HashCash (bcrypt DoS mitigation, acc creation, antibot, etc)
...
[*] Refactor bcrypt api: HashPW[Ex] -> HashPassword[Ex]
[+] ByteBuffer::GetOrAllocateLinearWriteable
[+] ByteBuffer::Can[Read/Write](n)
[+] ByteBuffer::GetLinear[Read/Writable]able(n)
[*] Split RNG.cpp into two files
[+] EHashType::eSHA2_48 (_32, _64 was already in place. missed 48/384 bit)
[+] AuCrypto::HMAC and IHMACContext
(AuHashing)
[+] EHashType::eSHA3_28
[+] EHashType::eSHA3_32
[+] EHashType::eSHA3_48
[+] EHashType::eSHA3_64
(AuCrypto)
[+] EHashType::eSHA2_48_384
[+] EHashType::eSHA2_64_512
[+] EHashType::eSHA3_28_224
[+] EHashType::eSHA3_32_256
[+] EHashType::eSHA3_48_384
[+] EHashType::eSHA3_64_512
[*] (IRandomDevice) class -> struct
[*] Bugfix: cast in Promise<SuccessValue_t, ErrorValue_t>::WriteIntoError
[+] Missing AuHashing namespace alias
[*] Time util: pad ms when fraction of a second to 3 digits
2022-09-19 02:34:57 +01:00
17b1a738ca
[*] Solve a few compiler warnings. Mostly unrealistic u32 <-> u64 casts in element iteration and string operations we can reasonably ignore
2022-06-14 17:12:21 +01:00
4bf581cd37
[*] RandomDef explicit default-ctor followed by forced null of the structure to seed with fast rng
2022-05-27 20:45:00 +01:00
ca0ca747aa
[*] Caught major RNG string regression
2022-04-16 19:09:30 +01:00
9fe22062f8
[*] Revert fast rng ABI. Messing with the entropy doesn't make much sense considering the perf tradeoff
2022-04-11 20:28:18 +01:00
cf219eabaa
[+] Initial attempt at an epoll backend
...
[+] Added comments in nt opener
[*] Fixed rng close
[*] Fixed possible aarch64 crash where unix thread ep function didnt return a value
2022-04-09 16:53:14 +01:00