{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":36832736,"defaultBranch":"master","name":"cryptopp","ownerLogin":"weidai11","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2015-06-03T21:53:52.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/1622188?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1696179869.0","currentOid":""},"activityList":{"items":[{"before":"c2bd7efb49610c97cbd2e2258654bd51f741112d","after":"9bb6680cfaedd3d46eff082ede8d0c76be6a2145","ref":"refs/heads/master","pushedAt":"2024-04-25T05:33:56.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Clear GCC overflow warning","shortMessageHtmlLink":"Clear GCC overflow warning"}},{"before":"782057f5f18fbdad2bd2b291fb1ec558a8ab8225","after":"c2bd7efb49610c97cbd2e2258654bd51f741112d","ref":"refs/heads/master","pushedAt":"2024-04-23T14:04:08.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"chore: fix typos (#1274)\n\nSigned-off-by: snoppy ","shortMessageHtmlLink":"chore: fix typos (#1274)"}},{"before":"442d9ee4351787eec6e0efa7a302dc02e4b22278","after":"782057f5f18fbdad2bd2b291fb1ec558a8ab8225","ref":"refs/heads/master","pushedAt":"2024-02-07T05:03:48.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Add OID::operator> for PEM Pack","shortMessageHtmlLink":"Add OID::operator> for PEM Pack"}},{"before":"5cf87aed6647709220eee728c48032591aa2dff4","after":"442d9ee4351787eec6e0efa7a302dc02e4b22278","ref":"refs/heads/master","pushedAt":"2024-02-07T01:48:22.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Update documentation","shortMessageHtmlLink":"Update documentation"}},{"before":"93208e83937a351babdfd9cfa07d7908ba15f68b","after":"5cf87aed6647709220eee728c48032591aa2dff4","ref":"refs/heads/master","pushedAt":"2024-02-05T15:54:56.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Set MAKEJOBS in cryptest-pem.sh","shortMessageHtmlLink":"Set MAKEJOBS in cryptest-pem.sh"}},{"before":"641ae35258de397774744b8b17ef6632c3fa48b3","after":"93208e83937a351babdfd9cfa07d7908ba15f68b","ref":"refs/heads/master","pushedAt":"2023-11-20T07:41:42.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Update comments","shortMessageHtmlLink":"Update comments"}},{"before":"eb383b8e1622c07da2d5d6599a8b0e17a0deee0f","after":"641ae35258de397774744b8b17ef6632c3fa48b3","ref":"refs/heads/master","pushedAt":"2023-11-20T06:36:26.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Validate PolynomialMod2 coefficients\nThanks to Bing Shi","shortMessageHtmlLink":"Validate PolynomialMod2 coefficients"}},{"before":"3e3b8af96d4d957b77588be91df7715efbe2ed69","after":"eb383b8e1622c07da2d5d6599a8b0e17a0deee0f","ref":"refs/heads/master","pushedAt":"2023-11-20T01:32:27.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Update docs\nThanks to Bing Shi","shortMessageHtmlLink":"Update docs"}},{"before":"c0e15c066e181121acd1d8b37f8bcb501b5c63f6","after":"3e3b8af96d4d957b77588be91df7715efbe2ed69","ref":"refs/heads/master","pushedAt":"2023-11-06T19:58:30.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Add check for 128-bit pointers\nThanks to Andy Polyakov","shortMessageHtmlLink":"Add check for 128-bit pointers"}},{"before":"1e20219ecddc64cf23e04f5cb990c49e1b0074c3","after":"c0e15c066e181121acd1d8b37f8bcb501b5c63f6","ref":"refs/heads/master","pushedAt":"2023-11-06T15:13:16.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Add check for 128-bit pointers\nThanks to Andy Polyakov","shortMessageHtmlLink":"Add check for 128-bit pointers"}},{"before":"af7d1050bf2287072edd629be133da458a3cf978","after":"1e20219ecddc64cf23e04f5cb990c49e1b0074c3","ref":"refs/heads/master","pushedAt":"2023-10-22T00:01:27.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Add separate ASM file for XGETBV64 and CPUID64 to Visual Studio cryptdll project (GH #1240)\nAlso see the comment in Commit 043208515799, where OgreTransporter made a comment about the deprecated cryptdll.vcxproj project.","shortMessageHtmlLink":"Add separate ASM file for XGETBV64 and CPUID64 to Visual Studio crypt…"}},{"before":"19f0e3aa1e6370a272d6b063f17ab4e3220ec052","after":"af7d1050bf2287072edd629be133da458a3cf978","ref":"refs/heads/master","pushedAt":"2023-10-12T06:28:35.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Fix CPU feature detection on older Celerons","shortMessageHtmlLink":"Fix CPU feature detection on older Celerons"}},{"before":"043208515799c06d570d8d6f9b81c324a33832a2","after":"19f0e3aa1e6370a272d6b063f17ab4e3220ec052","ref":"refs/heads/master","pushedAt":"2023-10-06T04:46:41.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Try fix build on MSYS2 using Clang in CLANG64 environment (GH #1241)\nMore Clang troubles...","shortMessageHtmlLink":"Try fix build on MSYS2 using Clang in CLANG64 environment (GH #1241)"}},{"before":"3405dcee96da59f389657b33de58eb0b122b72bd","after":"043208515799c06d570d8d6f9b81c324a33832a2","ref":"refs/heads/master","pushedAt":"2023-10-06T04:33:47.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Add separate ASM file for XGETBV64 and CPUID64 (GH #1240)\nThis will allow us to define CRYPTOPP_DISABLE_ASM and completely avoid building x64dll.asm and x64masm.asm","shortMessageHtmlLink":"Add separate ASM file for XGETBV64 and CPUID64 (GH #1240)"}},{"before":"49fef81923d9e9ed6706c7ad3a503bfc2aeceedc","after":"3405dcee96da59f389657b33de58eb0b122b72bd","ref":"refs/heads/master","pushedAt":"2023-10-02T15:58:31.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Guard use of zip and unzip\nUncovered on the newly minted GCC119, which is an AIX box.","shortMessageHtmlLink":"Guard use of zip and unzip"}},{"before":"121014baf0e80fa1fc386b7d1ff379d243377dd8","after":"49fef81923d9e9ed6706c7ad3a503bfc2aeceedc","ref":"refs/heads/master","pushedAt":"2023-10-02T09:57:00.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Update comments for CRYPTOPP_DISABLE_ASM","shortMessageHtmlLink":"Update comments for CRYPTOPP_DISABLE_ASM"}},{"before":"843d74c7c97f9e19a615b8ff3c0ca06599ca501b","after":"121014baf0e80fa1fc386b7d1ff379d243377dd8","ref":"refs/heads/master","pushedAt":"2023-10-02T09:25:50.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Return 0-values for XGETBV64 and CPUID64 when CRYPTOPP_DISABLE_ASM is in effect (GH #1240)\nSome folks were defining CRYPTOPP_DISABLE_ASM and not building the *.asm files on WIndows. That happened to work until we refactored code for XGetBV and CpuId.\n\nThese alternate build systems are going to be the death of us...","shortMessageHtmlLink":"Return 0-values for XGETBV64 and CPUID64 when CRYPTOPP_DISABLE_ASM is…"}},{"before":"45f8a77f4e79e66dc32daf5aad1e4b171d0d85c7","after":"843d74c7c97f9e19a615b8ff3c0ca06599ca501b","ref":"refs/heads/master","pushedAt":"2023-10-01T16:40:45.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Prepare for Crypto++ 8.9 release","shortMessageHtmlLink":"Prepare for Crypto++ 8.9 release"}},{"before":"34151a54f66c145a4d3e43bc63d138408c887892","after":"45f8a77f4e79e66dc32daf5aad1e4b171d0d85c7","ref":"refs/heads/master","pushedAt":"2023-10-01T03:16:10.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Fix SIMON128 when running on POWER8 and above (GH #1237)\nThis was an Asan failure uncovered by cryptest.sh","shortMessageHtmlLink":"Fix SIMON128 when running on POWER8 and above (GH #1237)"}},{"before":"47222de4b72295229e123480fc76f0ba5c9f9236","after":"34151a54f66c145a4d3e43bc63d138408c887892","ref":"refs/heads/master","pushedAt":"2023-10-01T02:00:32.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Update comments","shortMessageHtmlLink":"Update comments"}},{"before":"1143c7c2ccda748a133b5ee6d9a7183a03f9e92f","after":"47222de4b72295229e123480fc76f0ba5c9f9236","ref":"refs/heads/master","pushedAt":"2023-09-30T17:53:03.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Clear elevated warnings in ARIA and HIGHT\nRelated to fixes from GH #1235 and GH #1234","shortMessageHtmlLink":"Clear elevated warnings in ARIA and HIGHT"}},{"before":"d3d23002f607007a6d05e26563e55aef001017e2","after":"1143c7c2ccda748a133b5ee6d9a7183a03f9e92f","ref":"refs/heads/master","pushedAt":"2023-09-30T10:06:16.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Speedup ARIA ARIA_GSRK\nNow that the function is using an array of word32 for round keys, we don't need the PutWord gyrations.","shortMessageHtmlLink":"Speedup ARIA ARIA_GSRK"}},{"before":"9ac69079440e1410f204f03f1d9cbd111a6236ca","after":"d3d23002f607007a6d05e26563e55aef001017e2","ref":"refs/heads/master","pushedAt":"2023-09-30T09:47:23.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Use SecWordBlock for ARIA round keys\nThis may allow the compiler to optimize ARIA_GSRK. Instead of a memcpy, the memory can be used as a word32.","shortMessageHtmlLink":"Use SecWordBlock for ARIA round keys"}},{"before":"dde8e9fa23bc4c07e5b85ea94da724ab615c6949","after":"9ac69079440e1410f204f03f1d9cbd111a6236ca","ref":"refs/heads/master","pushedAt":"2023-09-30T08:56:46.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Remove shady word32* casts in ARIA","shortMessageHtmlLink":"Remove shady word32* casts in ARIA"}},{"before":"5250ab2bf2b0e140cd3374db73319a87797905d0","after":"dde8e9fa23bc4c07e5b85ea94da724ab615c6949","ref":"refs/heads/master","pushedAt":"2023-09-30T07:26:36.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Fix ARIA when XOR'ing final block (GH #1235)\nThis is another mystery to me. I do not know why unrolling the XOR into building of outBlock fixes this problem.","shortMessageHtmlLink":"Fix ARIA when XOR'ing final block (GH #1235)"}},{"before":"8d3e357c9caa780970ea3b7d0dc1aec75027f276","after":"5250ab2bf2b0e140cd3374db73319a87797905d0","ref":"refs/heads/master","pushedAt":"2023-09-30T07:11:30.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Remove ARIA SIMD code (GH #1235)\nARIA SIMD code existed to perform an XOR and the end of encryption and decryption. It was a lot of work to save for the final XOR.\nWorse, the final XOR seemed to be causing problems as described in GH #1235. Once we unrolled the XOR and used them when building outBlock, the 1235 issue went away.","shortMessageHtmlLink":"Remove ARIA SIMD code (GH #1235)"}},{"before":"2e23f6482a1a384e03d555b3387681905c585bc0","after":"8d3e357c9caa780970ea3b7d0dc1aec75027f276","ref":"refs/heads/master","pushedAt":"2023-09-30T06:50:01.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Add asserts to CFB_ModePolicy::SetFeedbackSize","shortMessageHtmlLink":"Add asserts to CFB_ModePolicy::SetFeedbackSize"}},{"before":"82451cd274f65b2f64891e91373fe7d383052d24","after":"2e23f6482a1a384e03d555b3387681905c585bc0","ref":"refs/heads/master","pushedAt":"2023-09-29T19:40:22.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Remove volatile cast gyrations in strciphr.cpp (GH #1231)\nIt turns out we went down a rabbit hole when we added the volatile cast gyrations in an attempt to change the compiler behavior. We are seeing the same failures from AES, Rabbit, HIGHT, HC-128 and HC-256 with and without the gyrations.\nWe were able to work out the problems with Rabbit, HIGHT, HC-128 and HC-256. See GH #1231 and GH #1234.\nWe are also not able to successfully cut-in Cryptogams AES on ARMv7, so it is now disabled. See GH #1236.\nSince the volatile casts were not a solution, we are backing it out along with associated comments.","shortMessageHtmlLink":"Remove volatile cast gyrations in strciphr.cpp (GH #1231)"}},{"before":"76fb12688b630861294f408e1d0284fa69e3bbe6","after":"82451cd274f65b2f64891e91373fe7d383052d24","ref":"refs/heads/master","pushedAt":"2023-09-29T14:54:58.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Add cryptopp.rc to list of trimmed files (GH #1233)","shortMessageHtmlLink":"Add cryptopp.rc to list of trimmed files (GH #1233)"}},{"before":"c6a16ea57396658108f819447de60f8ae296d642","after":"76fb12688b630861294f408e1d0284fa69e3bbe6","ref":"refs/heads/master","pushedAt":"2023-09-29T06:46:37.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"noloader","name":"Jeffrey Walton","path":"/noloader","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3538226?s=80&v=4"},"commit":{"message":"Fix HIGHT/CTR mode self test failures when inString==outString (GH #1234)","shortMessageHtmlLink":"Fix HIGHT/CTR mode self test failures when inString==outString (GH #1234"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEOctjPwA","startCursor":null,"endCursor":null}},"title":"Activity · weidai11/cryptopp"}