Commit Graph

69 Commits

Author SHA1 Message Date
dbacc71870 [*] Reformat these lines 2024-05-27 15:47:18 +01:00
54904957f2 [+] IRandomDevice.NextArrayVec2Fast
[+] IRandomDevice.NextArrayVec3Fast
[+] IRandomDevice.NextArrayVec4Fast
[+] AuRNG.RngArrayVec2Fast
[+] AuRNG.RngArrayVec3Fast
[+] AuRNG.RngArrayVec4Fast
2024-04-24 15:27:19 +01:00
0a90fd1a25 [*] Force compile time optimizations under RNG 2024-04-23 22:24:07 +01:00
442a5f31eb [+] AuRNG::RngArrayI32RangeFast
[+] AuRNG::RngArrayU32RangeFast
[+] AuRNG::RngArrayI64RangeFast
[+] AuRNG::RngArrayU64RangeFast
[+] IRandomDevice::NextArrayI32RangeFast
[+] IRandomDevice::NextArrayU32RangeFast
[+] IRandomDevice::NextArrayI64RangeFast
[+] IRandomDevice::NextArrayU64RangeFast
2024-04-22 22:05:01 +01:00
5f9681c9e3 [+] AuRNG::IRandomDevice::NextU64Range
[+] AuRNG::IRandomDevice::NextI64Range
[+] AuRNG::IRandomDevice::NextVec2
[+] AuRNG::IRandomDevice::NextVec2Sorted
[+] AuRNG::IRandomDevice::NextVec3
[+] AuRNG::IRandomDevice::NextVec3Sorted
[+] AuRNG::IRandomDevice::NextVec4
[+] AuRNG::IRandomDevice::NextVec4Sorted
[+] AuRNG::IRandomDevice::NextArrayI64Range
[+] AuRNG::IRandomDevice::NextArrayU64Range
[+] AuRNG::IRandomDevice::NextArrayU32Mask
[+] AuRNG::IRandomDevice::NextArrayU64Mask
[+] AuRNG::IRandomDevice::NextArrayI64
[+] AuRNG::IRandomDevice::NextArrayU64
[+] AuRNG::IRandomDevice::NextArrayVec2
[+] AuRNG::IRandomDevice::NextArrayVec2Sorted
[+] AuRNG::IRandomDevice::NextArrayVec3
[+] AuRNG::IRandomDevice::NextArrayVec3Sorted
[+] AuRNG::IRandomDevice::NextArrayVec4
[+] AuRNG::IRandomDevice::NextArrayVec4Sorted
[+] AuRNG::IRandomDevice::NextArrayVec4SortedFast
[+] AuRNG::IRandomDevice::NextArrayVec3SortedFast
[+] AuRNG::IRandomDevice::NextArrayVec2SortedFast
[+] AuRNG::IRandomDevice::NextArrayDoubleRangeFast
[+] AuRNG::IRandomDevice::NextArrayDecimalsFast
[+] AuRNG::RngU64Range
[+] AuRNG::RngI64Range
[+] AuRNG::RngVec2
[+] AuRNG::RngVec2Sorted
[+] AuRNG::RngVec3
[+] AuRNG::RngVec3Sorted
[+] AuRNG::RngVec4
[+] AuRNG::RngVec4Sorted
[+] AuRNG::RngArrayI64Range
[+] AuRNG::RngArrayU64Range
[+] AuRNG::RngArrayU32Mask
[+] AuRNG::RngArrayU64Mask
[+] AuRNG::RngArrayI64
[+] AuRNG::RngArrayU64
[+] AuRNG::RngArrayVec2
[+] AuRNG::RngArrayVec2Sorted
[+] AuRNG::RngArrayVec3
[+] AuRNG::RngArrayVec3Sorted
[+] AuRNG::RngArrayVec4
[+] AuRNG::RngArrayVec4Sorted
[+] AuRNG::RngArrayVec4SortedFast
[+] AuRNG::RngArrayVec3SortedFast
[+] AuRNG::RngArrayVec2SortedFast
[+] AuRNG::RngArrayDoubleRangeFast
[+] AuRNG::RngArrayDecimalsFast
2024-04-22 06:02:56 +01:00
616fc54531 [*] Hash WELL outputs (ABI break once again >:( )
[*] Rework/Fix WELL_NextBytes (large) improperly accounting for small buffers (this internal function is publicly visible. WELL_NextLong isn't going to save us)
2024-04-18 05:06:40 +01:00
631fad8fd0 [+] ERngStringCharacters::eLowerAlphaNumericCharacters
[+] ERngStringCharacters::eUpperAlphaNumericCharacters
2024-03-11 17:33:36 +00:00
e199172428 [+] AuRNG::SetSecureRNGBackendOverload
[+] AuRNG::GetSecureRNGBackendOverload
[+] AuRNG::GetSecureRNGBackend
2024-02-25 19:42:11 +00:00
22a6338da4 [*] Use AuRoundUpPow2 in AuRNG 2024-01-11 09:17:56 +00:00
72a3513a04 [+] New stream adapters
[+] IRandomDevice::ToStreamReader
[+] AuIO::Adapters::NewRandomAdapter
[+] AuIO::Adapters::NewNOPsReadAdapter
[+] AuIO::Adapters::NewNOPsSeekingAdapter
[+] AuIO::Adapters::NewNOPsWriteAdapter
[+] AuIO::Adapters::NewZerosReadAdapter
[+] AuIO::Adapters::NewZerosSeekingAdapter
2024-01-03 23:54:46 +00:00
c16a0b1600 [+] IRandomDevice::NextArrayI32Range
[+] IRandomDevice::NextArrayU32Range
[+] IRandomDevice::NextArrayDoubleRange
[+] IRandomDevice::NextArrayI32
[+] IRandomDevice::NextArrayU32
[+] IRandomDevice::NextArrayDouble
[+] IRandomDevice::NextArrayDecimals
[+] IRandomDevice::NextArrayUUIDs
[*] IRandomDevice minor refactoring for consistency
[*] Improve decimals once again (perf/deterministic)
2024-01-01 14:49:35 +00:00
7b59cab36e [*] eepy 2023-12-31 22:39:31 +00:00
063aa5c548 [+] IRandomDevice::NextUUID 2023-12-29 22:59:34 +00:00
e9651eead3 [*] Linux build regressons 2023-12-04 21:13:25 +00:00
9ba049d485 [*] Refactor "Jiffies" to "Frequency" 2023-12-01 04:49:18 +00:00
0c1c6d7c24 [*] Formatting regressions (+ 1x double-based RNG regression) 2023-12-01 03:43:06 +00:00
cab8627ffd [*] (AuRandom) Resolve bad floating point distribution 2023-12-01 03:12:04 +00:00
2d58f8fdef [-] Remove #if 0s from AuRandomDevice (finished working on the rng upgrades) 2023-11-18 11:19:57 +00:00
37adbad397 [*] IM NOT MAD. YOURE MAD (b88c61c1 cont) 2023-11-18 01:45:12 +00:00
b88c61c16d [*] Amend 999f3e69 2023-11-17 12:41:08 +00:00
999f3e69ca [*] RNG (PLAYBACK ABI-BREAK!!!): preemptively silence the turbo autists that are going to complain about modulo bias
(...well, mostly. this will be good enough.)
[*] Improve fast RNG device perf
2023-11-15 17:53:37 +00:00
73f6f6ea1e [*] Reintroduce this function pointer test branch 2023-10-21 07:23:56 +01:00
8fd4ef0a71 [*] Allocless RNG devices 2023-10-17 10:03:15 +01:00
f798c59cb8 [*] Fixed missed and double mimalloc init, via allocation under SwInfo, being probed by alternative nt clock query logic, under the fallback rng algorithm, possibly under another tls thread_only race condition 2023-10-08 15:00:52 +01:00
f585d41ba3 [*] 478cb2b1 ? 2023-10-07 17:12:54 +01:00
a7a45aaf4b [*] Using bcrypt continues to be a dumpsterfire mistake 2023-10-07 16:56:33 +01:00
478cb2b185 [*] Improve RNG fallback performance (early process init canaries) by properly accounting for < 10 Mhz clocks 2023-10-07 14:50:32 +01:00
cf7be329d6 [*] Update fallback RNG entropy: reduce expected tick resolution 2023-09-09 13:50:26 +01:00
be32e2777f [*] 3; chosen by dice roll. mimalloc heap seed regression: 115ee1a9ec 2023-08-29 01:07:59 +01:00
836edbabdd [+] Linux and BSD specific RNG
[*] Improved UNIX rng read check
2023-08-18 22:38:17 +01:00
4240966512 [*] Two trivial changes (not fixing or improving anything) 2023-08-18 15:53:38 +01:00
1f173a8799 [*] Begin resolving 8 months of Linux neglect 2023-08-11 16:51:42 +01:00
115ee1a9ec [*] Improve time based RNG failover implementation 2023-07-13 05:58:53 +01:00
adefbbe16b [*] Harden time based RNG
[*] RNG needs specific optimal paths for Win10 and older oses
[+] Internal RtlGenRandom
2023-07-11 18:02:40 +01:00
66b948697b [+] Missing x509 members
[*] Added POSIX-like rng fd close on deinit
[*] Added verbose arg checks for unix env vars
2023-07-10 20:58:12 +01:00
14d60ee2d0 [*] Wanna drop threaten to drop older APIs from the Windows Runtime? Alright, we're being pushed towards Windows XP support by accident. 2023-07-09 11:26:41 +01:00
4086fc94bb [*] bug fix: RNG strings werent deterministic 2023-04-28 04:59:09 +01:00
124038df62 [*] Refactor public headers
[+] AuConsole::Commands::RemoveCommand
[+] EExtendedUsage::eServerAuth
[+] SysPanic2 for SysSafeLine hints (backtrace may contain optimized SysPanics, making tracing the true origin difficult)
[*] Reworked SysAssertions
[*] AuParse::EncodeHex now takes AuMemoryViewRead
[*] AuRng::ReadSecureRNG now takes AuMemoryViewWrite
[*] AuRng::ReadFastRNG now takes AuMemoryViewWrite
2023-01-15 06:05:22 +00:00
dcc9205ea6 [+] IRandomDevice::ToSeed() 2022-12-28 20:30:15 +00:00
1e4082c02f [+] Linux datagrams
[+] NetSocketBind::uDefaultInputStreamSize
[+] NetDatagramBind::uDefaultInputStreamSize
2022-12-16 17:18:12 +00:00
f0fcec0cb7 [+] _CLOEXEC on F-tier operating systems predating SMP and processes 2022-12-16 03:48:04 +00:00
766be57a46 [+] Linux build [again]
[+] ProcessSectionViewReserved.Unix.cpp
[*] Fix missing ::Flush() member on ViewWriter
2022-12-16 00:41:01 +00:00
cbad382b6a [+] Windows 7 support 2022-12-14 01:35:18 +00:00
898c0ced37 [*] Refactoring in progress... 2022-11-17 08:03:20 +00:00
efc02d24f7 [*] Refactor RandomDef: bSecure, ::SetQuickRng()
[*] Default initialize net protocols to zero (tcp)
[*] Warning under AuUInt8 &ByteBuffer::operator[](AuUInt idx)
2022-09-27 17:30:26 +01:00
8a2947ffc5 [+] RMD128+BScFwd based HashCash (bcrypt DoS mitigation, acc creation, antibot, etc)
[*] Refactor bcrypt api: HashPW[Ex] -> HashPassword[Ex]
[+] ByteBuffer::GetOrAllocateLinearWriteable
[+] ByteBuffer::Can[Read/Write](n)
[+] ByteBuffer::GetLinear[Read/Writable]able(n)
[*] Split RNG.cpp into two files
[+] EHashType::eSHA2_48 (_32, _64 was already in place. missed 48/384 bit)
[+] AuCrypto::HMAC and IHMACContext
(AuHashing)
[+] EHashType::eSHA3_28
[+] EHashType::eSHA3_32
[+] EHashType::eSHA3_48
[+] EHashType::eSHA3_64
(AuCrypto)
[+] EHashType::eSHA2_48_384
[+] EHashType::eSHA2_64_512
[+] EHashType::eSHA3_28_224
[+] EHashType::eSHA3_32_256
[+] EHashType::eSHA3_48_384
[+] EHashType::eSHA3_64_512
[*] (IRandomDevice) class -> struct
[*] Bugfix: cast in Promise<SuccessValue_t, ErrorValue_t>::WriteIntoError
[+] Missing AuHashing namespace alias
[*] Time util: pad ms when fraction of a second to 3 digits
2022-09-19 02:34:57 +01:00
17b1a738ca [*] Solve a few compiler warnings. Mostly unrealistic u32 <-> u64 casts in element iteration and string operations we can reasonably ignore 2022-06-14 17:12:21 +01:00
4bf581cd37 [*] RandomDef explicit default-ctor followed by forced null of the structure to seed with fast rng 2022-05-27 20:45:00 +01:00
ca0ca747aa [*] Caught major RNG string regression 2022-04-16 19:09:30 +01:00
9fe22062f8 [*] Revert fast rng ABI. Messing with the entropy doesn't make much sense considering the perf tradeoff 2022-04-11 20:28:18 +01:00