Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

v0.8.3 #991

Merged
merged 195 commits into from
Dec 29, 2024
Merged

v0.8.3 #991

merged 195 commits into from
Dec 29, 2024

Conversation

Cyan4973
Copy link
Owner

scribam and others added 30 commits July 12, 2023 22:30
cmake: bump minimum required to version 3.5.0
after bit tracing stage
and added runtime tests for collision tester.
though it's hardly useful,
but it allows CI to run runtime tests.
Improve performance of the collision test filter
using XXH3_ prefix.

Can be used both to encode and check.
dedicated to producing and checking XXH3_* checksums.
and updated man pages.
Added a GNU-like format for XXH3 checksum
Apply format for all doxygen documents.
Every document has the following structure.
Signature of the function

@brief description
@params parameters
@pre    preconditions
@returns possible return values
@note	notes
@See-also
Bumps [actions/checkout](https://github.com/actions/checkout) from 3 to 4.
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](actions/checkout@v3...3df4ab1)

---
updated-dependencies:
- dependency-name: actions/checkout
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <[email protected]>
…ns/checkout-4

build(deps): bump actions/checkout from 3 to 4
In case no files are passed, i.e. only standard input is read,
The "rpath" promise could be dropped at a later point,
but that needs more patching.

https://man.openbsd.org/pledge.2
Bumps [actions/checkout](https://github.com/actions/checkout) from 4.0.0 to 4.1.0.
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](actions/checkout@3df4ab1...8ade135)

---
updated-dependencies:
- dependency-name: actions/checkout
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
…ns/checkout-4.1.0

build(deps): bump actions/checkout from 4.0.0 to 4.1.0
Flagging supply-chain security issues
Bumps [actions/checkout](https://github.com/actions/checkout) from 4.0.0 to 4.1.0.
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](actions/checkout@v4...8ade135)

---
updated-dependencies:
- dependency-name: actions/checkout
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
Cyan4973 and others added 26 commits December 26, 2024 02:21
the file statement just changed
xxhsum with auto-dispatch displays the locally detected vector extension
via #include "xxhash.h"
to fix double-include issues in xsum_arch.c
if the program is compiled with, for example, -mavx2,
then the resulting binary will simply require this instruction set to run.
enable by default runtime detection of vector extension on x86/64 target
some compiler versions may require it.
Added -Og test to mingw on Github Actions
…DISPATCH

disabled by default (in contrast with `DISPATCH`, which is enabled by default, for `xxhsum`).
LIBXXH_DISPATCH: control runtime vector dispatch in `libxxhash`
update cmake minimum version to 3.10
 - Fix the state structs to use unsigned char, update names
 - Extract the algorithm steps into inline subroutines
 - Fix a theoretical integer overflow bug
 - Reroll XXH64 on 32-bit (it is going to run like crap anyway)
they are suspicious that some tests on unsigned values might wrap around.
They should not, but let's write these branches differently to also cover these cases.
Extract finalization from XXH3 hashLong
@github-advanced-security
Copy link

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

.github/workflows/ci.yml Dismissed Show dismissed Hide dismissed
.github/workflows/ci.yml Dismissed Show dismissed Hide dismissed
.github/workflows/ci.yml Dismissed Show dismissed Hide dismissed
@Cyan4973 Cyan4973 self-assigned this Dec 29, 2024
@Cyan4973 Cyan4973 merged commit e626a72 into release Dec 29, 2024
128 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.