summaryrefslogtreecommitdiff
path: root/src/mongo/crypto/symmetric_crypto.cpp
Commit message (Collapse)AuthorAgeFilesLines
* SERVER-66203 move MONGO_LOGV2_DEFAULT_COMPONENT defs below includesBilly Donahue2022-05-061-1/+3
|
* SERVER-63186 Add AES-CTR support for OpenSSLsergey.galtsev2022-02-091-0/+6
|
* SERVER-60391 Remove CreateKeyEntropySource initializerFaustoleyva542021-10-191-1/+0
|
* SERVER-60224 Add SetupOpenSSL as prerequisite for AuditManager initializerGabriel Marks2021-10-081-0/+1
|
* SERVER-40811 make initializers throwyBilly Donahue2020-12-081-3/+1
| | | | | | | - Consolidate init-related headers (just init.h and initializer.h) - Factor out a separate DependencyGraph component - Remove MONGO_DEFAULT_PREREQUISITES, MONGO_NO_PREREQUISITES, MONGO_NO_DEPENDENTS. - Document the role of the "default" initializer.
* SERVER-47735 change mongo source over to logv2Billy Donahue2020-04-261-1/+1
| | | | | | - Remove several legacy logger/ files - Convert all MONGO_LOG_DEFAULT_COMPONENT to the LOGV2 version. - Globally replace logger::{LogSeverity,LogComponent} => logv2::
* SERVER-45567 removing util/log.h where I canGabriel Russell2020-02-211-1/+0
| | | | | | | o converting some log lines that were missed o fixing some missing includes create mode 100644 src/mongo/transport/ismaster_metrics.cpp
* SERVER-43641 upgrade random.hBilly Donahue2019-10-091-14/+1
| | | | This reverts commit a40b196bd3cecd0b66a6323f57e6f08efe0af392.
* Revert "SERVER-43641 upgrade random.h"James Wahlin2019-10-021-1/+14
| | | | This reverts commit 96da177c6ae7b7ed0f29983ad033d8a59524b0b2.
* SERVER-43641 upgrade random.hBilly Donahue2019-10-021-14/+1
| | | | | | | | | | | | | | | | | | | | | Respecify PseudoRandom and SecureRandom as template instances of a `mongo::RandomBase<Urbg>` (Urbg is a UniformRandomBitGenerator). They will only vary in which algorithm they use for their source bits, and should otherwise support the same exact operations (e.g. `nextCanonicalDouble`). Fix range and stats errors in the implementations of those RandomBase methods, and specify them in terms of the vetted `<random>` facilities. Test uniformity of nextInt32(max), which uses an inappropriate ( x % max) operation. Verify that refactor fixes this issue. Just keep a shared urandom file descriptor open. SecureRandom add fill, remove create, fix callers Obsoletes SERVER-43643 Re: SecureRandom 8kiB buffering
* SERVER-41644 Expose explicit encryption helpers in community shellMark Benvenuto2019-06-181-0/+107