Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: resilar/sqleet
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v0.30.1
Choose a base ref
...
head repository: resilar/sqleet
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: master
Choose a head ref
  • 4 commits
  • 7 files changed
  • 1 contributor

Commits on Dec 10, 2019

  1. Configuration menu
    Copy the full SHA
    ea466e4 View commit details
    Browse the repository at this point in the history

Commits on Jan 28, 2020

  1. Add SQLite version 3.31.1

    resilar committed Jan 28, 2020
    Configuration menu
    Copy the full SHA
    126faf8 View commit details
    Browse the repository at this point in the history

Commits on Aug 29, 2021

  1. Remove poly1305 *(volatile uint32_t *)&r0 = 0 crap

    This was supposed to trick compilers to avoid leaking secret (one-time)
    key material to stack in poly1305(). The trick indeed worked on few test
    compilers, but unfortunately generated utter shit with other compilers.
    However, I refactored and rearranged the poly1305 code a bit in order to
    make it harder for compiler(s) to generate code that leaks poly1305 otk
    material via stack memory. Register spilling still happens though, so
    there is not much we can do fully protect poly1305 one-time keys from
    stack memory disclosure attacks etc.
    
    Nonetheless, this is a minor issue and all C crypto libraries suffer
    from the same issue. Fortunately, poly1305 keys are one-time only so the
    impact is low even if the attacker somehow manages to get access to the
    keys. Basically a compromised poly1305 one-time key would allow message
    forgery, but not decryption. Switching from random poly1305 one-time
    keys to deterministic (hash-based) one-time keys would prevent forgery
    attacks as well.
    resilar committed Aug 29, 2021
    Configuration menu
    Copy the full SHA
    3e7cd11 View commit details
    Browse the repository at this point in the history

Commits on May 3, 2023

  1. Configuration menu
    Copy the full SHA
    dc83591 View commit details
    Browse the repository at this point in the history
Loading