{"id":13417969,"url":"https://github.com/weidai11/cryptopp","last_synced_at":"2025-05-12T15:33:22.626Z","repository":{"id":33190757,"uuid":"36832736","full_name":"weidai11/cryptopp","owner":"weidai11","description":"free C++ class library of cryptographic schemes","archived":false,"fork":false,"pushed_at":"2024-08-01T06:15:57.000Z","size":28432,"stargazers_count":5079,"open_issues_count":66,"forks_count":1546,"subscribers_count":194,"default_branch":"master","last_synced_at":"2025-04-23T17:18:40.093Z","etag":null,"topics":["c-plus-plus","crypto","cryptography"],"latest_commit_sha":null,"homepage":"https://cryptopp.com","language":"C++","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/weidai11.png","metadata":{"files":{"readme":"Readme.txt","changelog":"History.txt","contributing":null,"funding":null,"license":"License.txt","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":"Security.md","support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2015-06-03T21:53:52.000Z","updated_at":"2025-04-22T07:39:27.000Z","dependencies_parsed_at":"2023-09-29T08:33:47.701Z","dependency_job_id":"f74167fb-4e6e-4d24-8d92-63f731856687","html_url":"https://github.com/weidai11/cryptopp","commit_stats":null,"previous_names":[],"tags_count":29,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/weidai11%2Fcryptopp","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/weidai11%2Fcryptopp/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/weidai11%2Fcryptopp/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/weidai11%2Fcryptopp/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/weidai11","download_url":"https://codeload.github.com/weidai11/cryptopp/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":253766147,"owners_count":21960854,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["c-plus-plus","crypto","cryptography"],"created_at":"2024-07-30T22:00:56.431Z","updated_at":"2025-05-12T15:33:22.598Z","avatar_url":"https://github.com/weidai11.png","language":"C++","readme":"Crypto++: free C++ Class Library of Cryptographic Schemes\r\nVersion 8.9 - October 1, 2023\r\n\r\nCrypto++ Library is a free C++ class library of cryptographic schemes.\r\nCurrently the library contains the following algorithms:\r\n\r\n                   algorithm type  name\r\n\r\n authenticated encryption schemes  GCM, CCM, EAX, ChaCha20Poly1305 and\r\n                                   XChaCha20Poly1305\r\n\r\n        high speed stream ciphers  ChaCha (8/12/20), ChaCha (IETF), Panama, Salsa20,\r\n                                   Sosemanuk, XSalsa20, XChaCha20\r\n\r\n           AES and AES candidates  AES (Rijndael), RC6, MARS, Twofish, Serpent,\r\n                                   CAST-256\r\n\r\n                                   ARIA, Blowfish, Camellia, CHAM, HIGHT, IDEA,\r\n                                   Kalyna (128/256/512), LEA, SEED, RC5, SHACAL-2,\r\n              other block ciphers  SIMON (64/128), Skipjack, SPECK (64/128),\r\n                                   Simeck, SM4, Threefish (256/512/1024),\r\n                                   Triple-DES (DES-EDE2 and DES-EDE3), TEA, XTEA\r\n\r\n  block cipher modes of operation  ECB, CBC, CBC ciphertext stealing (CTS),\r\n                                   CFB, OFB, counter mode (CTR), XTS\r\n\r\n     message authentication codes  BLAKE2s, BLAKE2b, CMAC, CBC-MAC, DMAC, GMAC, HMAC,\r\n                                   Poly1305, Poly1305 (IETF), SipHash, Two-Track-MAC,\r\n                                   VMAC\r\n\r\n                                   BLAKE2s, BLAKE2b, Keccack (F1600), LSH (256/512),\r\n                   hash functions  SHA-1, SHA-2 (224/256/384/512), SHA-3 (224/256),\r\n                                   SHA-3 (384/512), SHAKE (128/256), SipHash, SM3, Tiger,\r\n                                   RIPEMD (128/160/256/320), WHIRLPOOL\r\n\r\n                                   RSA, DSA, Deterministic DSA, ElGamal,\r\n          public-key cryptography  Nyberg-Rueppel (NR), Rabin-Williams (RW), LUC,\r\n                                   LUCELG, EC-based German Digital Signature (ECGDSA),\r\n                                   DLIES (variants of DHAES), ESIGN\r\n\r\n   padding schemes for public-key  PKCS#1 v2.0, OAEP, PSS, PSSR, IEEE P1363\r\n                          systems  EMSA2 and EMSA5\r\n\r\n                                   Diffie-Hellman (DH), Unified Diffie-Hellman (DH2),\r\n            key agreement schemes  Menezes-Qu-Vanstone (MQV), Hashed MQV (HMQV),\r\n                                   Fully Hashed MQV (FHMQV), LUCDIF, XTR-DH\r\n\r\n      elliptic curve cryptography  ECDSA, Deterministic ECDSA, ed25519, ECNR, ECIES,\r\n                                   ECDH, ECMQV, x25519\r\n\r\n          insecure or obsolescent  MD2, MD4, MD5, Panama Hash, DES, ARC4, SEAL\r\nalgorithms retained for backwards  3.0, WAKE-OFB, DESX (DES-XEX3), RC2,\r\n     compatibility and historical  SAFER, 3-WAY, GOST, SHARK, CAST-128, Square\r\n                            value\r\n\r\nOther features include:\r\n\r\n  * pseudo random number generators (PRNG): ANSI X9.17 appendix C, RandomPool,\r\n    DARN, VIA Padlock, RDRAND, RDSEED, NIST Hash and HMAC DRBGs\r\n  * password based key derivation functions: PBKDF1 and PBKDF2 from PKCS #5,\r\n    PBKDF from PKCS #12 appendix B, HKDF from RFC 5869, Scrypt from RFC 7914\r\n  * Shamir's secret sharing scheme and Rabin's information dispersal algorithm\r\n    (IDA)\r\n  * fast multi-precision integer (bignum) and polynomial operations\r\n  * finite field arithmetics, including GF(p) and GF(2^n)\r\n  * prime number generation and verification\r\n  * useful non-cryptographic algorithms\r\n      + DEFLATE (RFC 1951) compression/decompression with gzip (RFC 1952) and\r\n        zlib (RFC 1950) format support\r\n      + Hex, base-32, base-64, URL safe base-64 encoding and decoding\r\n      + 32-bit CRC, CRC-C and Adler32 checksum\r\n  * class wrappers for these platform and operating system features (optional):\r\n      + high resolution timers on Windows, Unix, and Mac OS\r\n      + /dev/random, /dev/urandom, /dev/srandom\r\n      + Microsoft's CryptGenRandom or BCryptGenRandom on Windows\r\n  * A high level interface for most of the above, using a filter/pipeline\r\n    metaphor\r\n  * benchmarks and validation testing\r\n  * x86, x64 (x86-64), x32 (ILP32), ARM-32, Aarch32, Aarch64 and Power8\r\n    in-core code for the commonly used algorithms\r\n      + run-time CPU feature detection and code selection\r\n      + supports GCC-style and MSVC-style inline assembly, and MASM for x64\r\n      + x86, x64 (x86-64), x32 provides MMX, SSE2, and SSE4 implementations\r\n      + ARM-32, Aarch32 and Aarch64 provides NEON, ASIMD and ARMv8 implementations\r\n      + Power8 provides in-core AES using NX Crypto Acceleration\r\n\r\nThe Crypto++ library was originally written by Wei Dai. The library is now\r\nmaintained by several team members and the community. You are welcome to use it\r\nfor any purpose without paying anyone, but see License.txt for the fine print.\r\n\r\nThe following compilers are supported for this release. Please visit\r\nhttp://www.cryptopp.com the most up to date build instructions and porting notes.\r\n\r\n  * Visual Studio 2003 - 2022\r\n  * GCC 3.3 - 13.1\r\n  * Apple Clang 4.3 - 12.0\r\n  * LLVM Clang 2.9 - 14.0\r\n  * C++ Builder 2015\r\n  * Intel C++ Compiler 9 - 16.0\r\n  * Sun Studio 12u1 - 12.7\r\n  * IBM XL C/C++ 10.0 - 14.0\r\n\r\n*** Important Usage Notes ***\r\n\r\n1. If a constructor for A takes a pointer to an object B (except primitive\r\ntypes such as int and char), then A owns B and will delete B at A's\r\ndestruction.  If a constructor for A takes a reference to an object B,\r\nthen the caller retains ownership of B and should not destroy it until\r\nA no longer needs it.\r\n\r\n2. Crypto++ is thread safe at the class level. This means you can use\r\nCrypto++ safely in a multithreaded application, but you must provide\r\nsynchronization when multiple threads access a common Crypto++ object.\r\n\r\n*** MSVC-Specific Information ***\r\n\r\nTo compile Crypto++ with MSVC, open \"cryptest.sln\" (for MSVC 2003 - 2015)\r\nand build one or more of the following projects:\r\n\r\ncryptest Non-DLL-Import Configuration - This builds the full static library\r\n  along with a full test driver.\r\ncryptest DLL-Import Configuration - This builds a static library containing\r\n  only algorithms not in the DLL, along with a full test driver that uses\r\n  both the DLL and the static library.\r\ncryptdll - This builds the DLL. Please note that if you wish to use Crypto++\r\n  as a FIPS validated module, you must use a pre-built DLL that has undergone\r\n  the FIPS validation process instead of building your own.\r\ndlltest - This builds a sample application that only uses the DLL.\r\n\r\nThe DLL used to provide FIPS validated cryptography. The library was moved\r\nto the CMVP's [Historical Validation List](http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-historical.htm).\r\nThe library and the DLL are no longer considered\r\nvalidated. You should no longer use the DLL.\r\n\r\nTo use the Crypto++ DLL in your application, #include \"dll.h\" before including\r\nany other Crypto++ header files, and place the DLL in the same directory as\r\nyour .exe file. dll.h includes the line #pragma comment(lib, \"cryptopp\")\r\nso you don't have to explicitly list the import library in your project\r\nsettings. To use a static library form of Crypto++, make the \"cryptlib\"\r\nproject a dependency of your application project, or specify it as\r\nan additional library to link with in your project settings.\r\nIn either case you should check the compiler options to\r\nmake sure that the library and your application are using the same C++\r\nrun-time libraries and calling conventions.\r\n\r\n*** DLL Memory Management ***\r\n\r\nBecause it's possible for the Crypto++ DLL to delete objects allocated\r\nby the calling application, they must use the same C++ memory heap. Three\r\nmethods are provided to achieve this.\r\n1.  The calling application can tell Crypto++ what heap to use. This method\r\n    is required when the calling application uses a non-standard heap.\r\n2.  Crypto++ can tell the calling application what heap to use. This method\r\n    is required when the calling application uses a statically linked C++ Run\r\n    Time Library. (Method 1 does not work in this case because the Crypto++ DLL\r\n    is initialized before the calling application's heap is initialized.)\r\n3.  Crypto++ can automatically use the heap provided by the calling application's\r\n    dynamically linked C++ Run Time Library. The calling application must\r\n    make sure that the dynamically linked C++ Run Time Library is initialized\r\n    before Crypto++ is loaded. (At this time it is not clear if it is possible\r\n    to control the order in which DLLs are initialized on Windows 9x machines,\r\n    so it might be best to avoid using this method.)\r\n\r\nWhen Crypto++ attaches to a new process, it searches all modules loaded\r\ninto the process space for exported functions \"GetNewAndDeleteForCryptoPP\"\r\nand \"SetNewAndDeleteFromCryptoPP\". If one of these functions is found,\r\nCrypto++ uses methods 1 or 2, respectively, by calling the function.\r\nOtherwise, method 3 is used.\r\n\r\n*** Linux and Unix-like Specific Information ***\r\n\r\nA makefile is included for you to compile Crypto++ with GCC and compatibles.\r\nMake sure you are using GNU Make and GNU ld. The make process will produce\r\ntwo files, libcryptopp.a and cryptest.exe. Run \"cryptest.exe v\" for the\r\nvalidation suite and \"cryptest.exe tv all\" for additional test vectors.\r\n\r\nThe makefile uses '-DNDEBUG -g2 -O2' CXXFLAGS by default. If you use an\r\nalternate build system, like Autotools or CMake, then ensure the build system\r\nincludes '-DNDEBUG' for production or release builds. The Crypto++ library uses\r\nasserts for debugging and diagnostics during development; it does not\r\nrely on them to crash a program at runtime.\r\n\r\nIf an assert triggers in production software, then unprotected sensitive\r\ninformation could be egressed from the program to the filesystem or the\r\nplatform's error reporting program, like Apport on Ubuntu or CrashReporter\r\non Apple.\r\n\r\nThe makefile orders object files to help remediate problems associated with\r\nC++ static initialization order. The library does not use custom linker scripts.\r\nIf you use an alternate build system, like Autotools or CMake, and collect source\r\nfiles into a list, then ensure these three are at the head of the list: 'cryptlib.cpp\r\ncpu.cpp integer.cpp \u003cother sources\u003e'. They should be linked in the same order:\r\n'cryptlib.o cpu.o integer.o \u003cother objects\u003e'.\r\n\r\nIf your linker supports initialization attributes, like init_priority, then you can\r\ndefine CRYPTOPP_INIT_PRIORITY to control object initialization order. Set it to a\r\nvalue like 250. User programs can use CRYPTOPP_USER_PRIORITY to avoid conflicts with\r\nlibrary values. Initialization attributes are more reliable than object file ordering,\r\nbut its not ubiquitously supported by linkers.\r\n\r\nThe makefile links to the static version of the Crypto++ library to avoid binary\r\nplanting and other LD_PRELOAD tricks. You should use the static version of the\r\nlibrary in your programs to help avoid unwanted redirections.\r\n\r\n*** Side Channel Attacks ***\r\n\r\nCrypto++ attempts to resist side channel attacks using various remediations.\r\nThe remediations are applied as a best effort but are probably incomplete. They\r\nare incomplete due to cpu speculation bugs like Spectre, Meltdown, Foreshadow.\r\nThe attacks target both cpu caches and internal buffers. Intel generally refers\r\nto internal buffer attacks as \"Microarchitectural Data Sampling\" (MDS).\r\n\r\nThe library uses hardware instructions when possible for block ciphers, hashes\r\nand other operations. The hardware acceleration remediates some timing\r\nattacks. The library also uses cache-aware algorithms and access patterns\r\nto minimize leakage cache evictions.\r\n\r\nElliptic curves over binary fields are believed to leak information. The task is a\r\nwork in progress. We don't believe binary fields are used in production, so we feel it\r\nis a low risk at the moment.\r\n\r\nCrypto++ does not engage Specter remediations at this time. The GCC options\r\nfor Specter are -mfunction-return=thunk and -mindirect-branch=thunk, and the\r\nlibrary uses them during testing. If you want the Specter workarounds then add\r\nthe GCC options to your CXXFLAGS when building the library.\r\n\r\nTo help resist attacks you should disable hyperthreading on cpus. If you\r\nsuspect or find an information leak then please report it.\r\n\r\n*** Documentation and Support ***\r\n\r\nCrypto++ is documented through inline comments in header files, which are\r\nprocessed through Doxygen to produce an HTML reference manual. You can find\r\na link to the manual from http://www.cryptopp.com. Also at that site is\r\nthe Crypto++ FAQ, which you should browse through before attempting to\r\nuse this library, because it will likely answer many of questions that\r\nmay come up. Finally, the site provides the wiki which has many topics\r\nand code examples.\r\n\r\nIf you run into any problems, please try the Crypto++ mailing list.\r\nThe subscription information and the list archive are available on\r\nhttp://www.cryptopp.com.\r\n\r\n*** Source Code and Contributing ***\r\n\r\nThe source code and its planned changes are available at the following locations.\r\n\r\n  * The Crypto++ GitHub repository allows you to view the latest (unreleased)\r\n    Crypto++ source code via the Linux kernel's git beginning around June 2015.\r\n    Its also serves as an incubator to nurture and grow the library.\r\n  * The former Crypto++ SourceForge repository allows you to view the Crypto++\r\n    source code via Apache's subversion until about July 2015. At that time,\r\n    SourceForge had infrastructure problems and a cutover to GutHub was performed.\r\n  * The Roadmap on the wiki provides the general direction the library is heading.\r\n    It includes planned features and releases, and even some wishlist items.\r\n\r\nContributions of all types are welcomed. Contributions include the following.\r\n\r\n  * Bug finding and fixes\r\n  * Features and enhancements\r\n  * Test scripts and test cases\r\n  * Branch and release testing\r\n  * Documentation and updates\r\n\r\nIf you think you have found a bug in the library, then you should discuss it on the\r\nUsers mailing list. Discussing it will help bring the issue to the attention of folks\r\nwho can help resolve the issue. If you want to contribute a bug fix to the library,\r\nthen make a Pull Request or make a Diff available somewhere. Also see Bug Reports on\r\nthe wiki.\r\n\r\nFeatures and enhancements are welcomed additions to the library. This category tends\r\nto be time consuming because algorithms and their test cases need to be reviewed and\r\nmerged. Please be mindful of the test cases, and attempt to procure them from an\r\nindependent source.\r\n\r\nThe library cherishes test scripts and test cases. They ensure the library is fit and\r\nthey help uncover issues with the library before users experience them. If you have\r\nsome time, then write some test cases, especially the ones that are intended to break\r\nthings.\r\n\r\nBranch and release testing is your chance to ensure Master (and planned merges) meets\r\nyour expectations and perform as expected. If you have a few spare cycles, then please\r\ntest Master on your favorite platform. We need more testing on MinGW, Windows Phone,\r\nWindows Store, Solaris 10 (and below), and modern iOS and OS X (including TV and\r\nWatch builds).\r\n\r\nDocumentation and updates includes both the inline source code annotations using\r\nDoxygen, and the online information provided in the wiki. The wiki is more verbose and\r\nusually provides more contextual information than the API reference. Besides testing,\r\ndocumentation is one of the highest returns on investment.\r\n\r\n*** History ***\r\n\r\nThe items in this section comprise the most recent history. Please see History.txt\r\nfor the record back to Crypto++ 1.0.\r\n\r\n8.9.0 - October 1, 2023\r\n      - minor release, recompile of programs required\r\n      - expanded community input and support\r\n        * 88 unique contributors as of this release\r\n      - fix SIMON128 Asan finding on POWER8\r\n      - fix AES/CFB and AES/CTR modes self test failures when using Cryptogams AES on ARMv7\r\n      - fix ARIA/CTR mode self test failures when inString==outString\r\n      - fix HIGHT/CTR mode self test failures when inString==outString\r\n      - fix Rabbit/CTR mode self test failures when inString==outString\r\n      - fix Prime Table and dangling reference to a temporary\u003e\r\n      - fix Singleton::Ref when using C++11 memory fences\r\n      - remove unneeded call to Crop() in Randomize()\r\n\r\n8.8.0 - June 25, 2023\r\n      - minor release, recompile of programs required\r\n      - expanded community input and support\r\n        * 88 unique contributors as of this release\r\n      - fix crash in cryptest.exe when invoked with no options\r\n      - fix crash in library due to GCC removing live code\r\n      - fix RSA with key size 16 may provide an invalid key\r\n      - fix failure to build on 32-bit x86\r\n      - fix failure to build on iPhone Simulator for arm64\r\n      - fix failure to build on Windows arm64\r\n      - test for SSSE3 before using the ISA\r\n      - fix include of \u003cx86intrin.h\u003e when using MSVC\r\n      - improve performance of CRC32C_Update_SSE42 for x86-64\r\n      - update documentation\r\n\r\n8.7.0 - August 7, 2022\r\n      - minor release, recompile of programs required\r\n      - expanded community input and support\r\n        * 81 unique contributors as of this release\r\n      - fix RSA key generation for small moduli\r\n      - fix AES-GCM with AESNI but without CLMUL\r\n      - fix Clang warning with C++17\r\n      - fix MinGW builds due to use of O_NOFOLLOW\r\n      - rework CFB_CipherTemplate::ProcessData and AdditiveCipherTemplate::ProcessData\r\n        * restored performance and avoided performance penalty of a temp buffer\r\n      - fix undersized SecBlock buffer in Integer bit operations\r\n      - work around several GCC 11 \u0026 12 problems\r\n\r\n8.6.0 - September 21, 2021\r\n      - minor release, recompile of programs required\r\n      - expanded community input and support\r\n        * 74 unique contributors as of this release\r\n      - fix ElGamal encryption\r\n      - fix ChaCha20 AVX2 implementation\r\n      - add octal and decimal literal prefix parsing to Integer\r\n      - add missing overload in ed25519Signer and ed25519Verifier\r\n      - make SHA-NI independent of AVX and AVX2\r\n      - fix OldRandomPool GenerateWord32\r\n      - use CPPFLAGS during feature testing\r\n      - fix compile on CentOS 5\r\n      - fix compile on FreeBSD\r\n      - fix feature testing on ARM A-32 and Aarch64\r\n      - enable inline ASM for CRC and PMULL on Apple M1\r\n      - fix Intel oneAPI compile\r\n      - rename test files with *.cpp extension\r\n      - fix GCC compile error due to missing _mm256_set_m128i\r\n      - add LSH-256 and LSH-512 hash functions\r\n      - add ECIES_P1363 for backwards compatibility\r\n      - fix AdditiveCipherTemplate\u003cT\u003e ProcessData\r\n      - remove CRYPTOPP_NO_CXX11 define\r\n      - add -fno-common for Darwin builds\r\n      - update documentation\r\n\r\n8.5.0 - March 7, 2021\r\n      - minor release, no recompile of programs required\r\n      - expanded community input and support\r\n        * 70 unique contributors as of this release\r\n      - port to Apple M1 hardware\r\n\r\n8.4.0 - January 2, 2021\r\n      - minor release, recompile of programs required\r\n      - expanded community input and support\r\n        * 67 unique contributors as of this release\r\n      - fix SIGILL on POWER8 when compiling with GCC 10\r\n      - fix potential out-of-bounds write in FixedSizeAllocatorWithCleanup\r\n      - fix compile on AIX POWER7 with IBM XLC 12.01\r\n      - fix compile on Solaris with SunCC 12.6\r\n      - revert changes for constant-time elliptic curve algorithms\r\n      - fix makefile clean and distclean recipes\r\n\r\n8.3.0 - December 20, 2020\r\n      - minor release, recompile of programs required\r\n      - expanded community input and support\r\n        * 66 unique contributors as of this release\r\n      - fix use of macro CRYPTOPP_ALIGN_DATA\r\n      - fix potential out-of-bounds read in ECDSA\r\n      - fix std::bad_alloc when using ByteQueue in pipeline\r\n      - fix missing CRYPTOPP_CXX17_EXCEPTIONS with Clang\r\n      - fix potential out-of-bounds read in GCM mode\r\n      - add configure.sh when preprocessor macros fail\r\n      - fix potential out-of-bounds read in SipHash\r\n      - fix compile error on POWER9 due to vec_xl_be\r\n      - fix K233 curve on POWER8\r\n      - add Cirrus CI testing\r\n      - fix broken encryption for some 64-bit ciphers\r\n      - fix Android cpu-features.c using C++ compiler\r\n      - disable RDRAND and RDSEED for some AMD processors\r\n      - fix BLAKE2 hash calculation using Salt and Personalization\r\n      - refresh Android and iOS build scripts\r\n      - add XTS mode\r\n      - fix circular dependency between misc.h and secblock.h\r\n      - add Certificate interface\r\n      - fix recursion in AES::Encryption without AESNI\r\n      - add missing OID for ElGamal encryption\r\n      - fix missing override in KeyDerivationFunction-derived classes\r\n      - fix RDSEED assemble under MSVC\r\n      - fix elliptic curve timing leaks (CVE-2019-14318)\r\n      - add link-library variable to Makefiles\r\n      - fix SIZE_MAX definition in misc.h\r\n      - add GetWord64 and PutWord64 to BufferedTransformation\r\n      - use HKDF in AutoSeededX917RNG::Reseed\r\n      - fix Asan finding in VMAC on i686 in inline asm\r\n      - fix undeclared identifier _mm_roti_epi64 on Gentoo\r\n      - fix ECIES and GetSymmetricKeyLength\r\n      - fix possible divide by zero in PKCS5_PBKDF2_HMAC\r\n      - refine ASN.1 encoders and decoders\r\n      - disable BMI2 code paths in Integer class\r\n      - fix use of CRYPTOPP_CLANG_VERSION\r\n      - add NEON SHA1, SHA256 and SHA512 from Cryptogams\r\n      - add ARM SHA1, SHA256 and SHA512 from Cryptogams\r\n      - make config.h more autoconf friendly\r\n      - handle Clang triplet armv8l-unknown-linux-gnueabihf\r\n      - fix reference binding to misaligned address in xed25519\r\n      - clear asserts in TestDataNameValuePairs\r\n\r\n8.2.0 - April 28, 2019\r\n      - minor release, no recompile of programs required\r\n      - expanded community input and support\r\n        * 56 unique contributors as of this release\r\n      - use PowerPC unaligned loads and stores with Power8\r\n      - add SKIPJACK test vectors\r\n      - fix SHAKE-128 and SHAKE-256 compile\r\n      - removed IS_NEON from Makefile\r\n      - fix Aarch64 build on Fedora 29\r\n      - fix missing GF2NT_233_Multiply_Reduce_CLMUL in FIPS DLL\r\n      - add missing BLAKE2 constructors\r\n      - fix missing BlockSize() in BLAKE2 classes\r\n\r\n8.1.0 - February 22, 2019\r\n      - minor release, no recompile of programs required\r\n      - expanded community input and support\r\n        * 56 unique contributors as of this release\r\n      - fix OS X PowerPC builds with Clang\r\n      - add Microsoft ARM64 support\r\n      - fix iPhone Simulator build due to missing symbols\r\n      - add CRYPTOPP_BUGGY_SIMD_LOAD_AND_STORE\r\n      - add carryless multiplies for NIST b233 and k233 curves\r\n      - fix OpenMP build due to use of OpenMP 4 with down-level compilers\r\n      - add SignStream and VerifyStream for ed25519 and large files\r\n      - fix missing AlgorithmProvider in PanamaHash\r\n      - add SHAKE-128 and SHAKE-256\r\n      - fix AVX2 build due to _mm256_broadcastsi128_si256\r\n      - add IETF ChaCha, XChaCha, ChaChaPoly1305 and XChaChaPoly1305\r\n\r\n8.0.0 - December 28, 2018\r\n      - major release, recompile of programs required\r\n      - expanded community input and support\r\n         * 54 unique contributors as of this release\r\n      - add x25519 key exchange and ed25519 signature scheme\r\n      - add limited Asymmetric Key Package support from RFC 5958\r\n      - add Power9 DARN random number generator support\r\n      - add CHAM, HC-128, HC-256, Hight, LEA, Rabbit, Simeck\r\n      - fix FixedSizeAllocatorWithCleanup may be unaligned on some platforms\r\n      - cutover to GNU Make-based cpu feature tests\r\n      - rename files with dashes to underscores\r\n      - fix LegacyDecryptor and LegacyDecryptorWithMAC use wrong MAC\r\n      - fix incorrect AES/CBC decryption on Windows\r\n      - avoid Singleton\u003cT\u003e when possible, avoid std::call_once completely\r\n      - fix SPARC alignment problems due to GetAlignmentOf\u003cT\u003e() on word64\r\n      - add ARM AES asm implementation from Cryptogams\r\n      - remove CRYPTOPP_ALLOW_UNALIGNED_DATA_ACCESS support\r\n\r\nJune 2015 - Changing of the guard. Wei Dai turned the library over to the\r\n        community. The first community release was Crypto++ 5.6.3. Wei is\r\n        no longer involved with the daily operations of the project. Wei\r\n        still provides guidance when we have questions.\r\n\r\nOriginally written by Wei Dai, maintained by the Crypto++ Project\r\n","funding_links":[],"categories":["TODO scan for Android support in followings","C++","Cryptography","Crypto","库和框架","Frameworks and Libs","Maths","Program"],"sub_categories":["UI Test Automation Scripting","C++","C/C++"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fweidai11%2Fcryptopp","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fweidai11%2Fcryptopp","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fweidai11%2Fcryptopp/lists"}