* Install all headers (closes: #866100).
* Update watch file (closes: #862876).
* Update Standards-Version to 4.0.0 and debhelper level to 10 .
[dgit import unpatched libcrypto++ 5.6.4-8]
--- /dev/null
--- /dev/null
++AUTOMAKE_OPTIONS = foreign
++lib_LTLIBRARIES = libcrypto++.la
++libcrypto___la_LIBADD = -lpthread
++libcrypto___la_LDFLAGS = -version-info 6:0:0
++libcrypto___la_SOURCES = \
++ 3way.cpp \
++ adler32.cpp \
++ algebra.cpp \
++ algparam.cpp \
++ arc4.cpp \
++ asn.cpp \
++ authenc.cpp \
++ base32.cpp \
++ base64.cpp \
++ basecode.cpp \
++ bfinit.cpp \
++ blowfish.cpp \
++ blumshub.cpp \
++ camellia.cpp \
++ cast.cpp \
++ casts.cpp \
++ cbcmac.cpp \
++ ccm.cpp \
++ channels.cpp \
++ cmac.cpp \
++ cpu.cpp \
++ crc.cpp \
++ cryptlib.cpp \
++ default.cpp \
++ des.cpp \
++ dessp.cpp \
++ dh.cpp \
++ dh2.cpp \
++ dll.cpp \
++ dsa.cpp \
++ eax.cpp \
++ ec2n.cpp \
++ eccrypto.cpp \
++ ecp.cpp \
++ elgamal.cpp \
++ emsa2.cpp \
++ eprecomp.cpp \
++ esign.cpp \
++ files.cpp \
++ filters.cpp \
++ fips140.cpp \
++ fipstest.cpp \
++ gcm.cpp \
++ gf256.cpp \
++ gf2_32.cpp \
++ gf2n.cpp \
++ gfpcrypt.cpp \
++ gost.cpp \
++ gzip.cpp \
++ hex.cpp \
++ hmac.cpp \
++ hrtimer.cpp \
++ ida.cpp \
++ idea.cpp \
++ integer.cpp \
++ iterhash.cpp \
++ keccak.cpp \
++ luc.cpp \
++ md2.cpp \
++ md4.cpp \
++ md5.cpp \
++ misc.cpp \
++ modes.cpp \
++ mqueue.cpp \
++ mqv.cpp \
++ nbtheory.cpp \
++ network.cpp \
++ oaep.cpp \
++ osrng.cpp \
++ panama.cpp \
++ pch.cpp \
++ pkcspad.cpp \
++ polynomi.cpp \
++ pssr.cpp \
++ pubkey.cpp \
++ queue.cpp \
++ rabin.cpp \
++ randpool.cpp \
++ rc2.cpp \
++ rc5.cpp \
++ rc6.cpp \
++ rdrand.cpp \
++ rdtables.cpp \
++ rijndael.cpp \
++ ripemd.cpp \
++ rng.cpp \
++ rsa.cpp \
++ rw.cpp \
++ safer.cpp \
++ salsa.cpp \
++ seal.cpp \
++ seed.cpp \
++ serpent.cpp \
++ sha.cpp \
++ sha3.cpp \
++ shacal2.cpp \
++ shark.cpp \
++ sharkbox.cpp \
++ simple.cpp \
++ skipjack.cpp \
++ socketft.cpp \
++ sosemanuk.cpp \
++ square.cpp \
++ squaretb.cpp \
++ strciphr.cpp \
++ tea.cpp \
++ tftables.cpp \
++ tiger.cpp \
++ tigertab.cpp \
++ trdlocal.cpp \
++ ttmac.cpp \
++ twofish.cpp \
++ vmac.cpp \
++ wait.cpp \
++ wake.cpp \
++ whrlpool.cpp \
++ winpipes.cpp \
++ xtr.cpp \
++ xtrcrypt.cpp \
++ zdeflate.cpp \
++ zinflate.cpp \
++ zlib.cpp \
++ mars.cpp \
++ marss.cpp
++
++pkginclude_HEADERS = \
++ 3way.h \
++ adler32.h \
++ aes.h \
++ algebra.h \
++ algparam.h \
++ arc4.h \
++ argnames.h \
++ asn.h \
++ authenc.h \
++ base32.h \
++ base64.h \
++ basecode.h \
++ bench.h \
++ blake2.h \
++ blowfish.h \
++ blumshub.h \
++ camellia.h \
++ cast.h \
++ cbcmac.h \
++ ccm.h \
++ chacha.h \
++ channels.h \
++ cmac.h \
++ config.h \
++ cpu.h \
++ crc.h \
++ cryptlib.h \
++ default.h \
++ des.h \
++ dh2.h \
++ dh.h \
++ dll.h \
++ dmac.h \
++ dsa.h \
++ eax.h \
++ ec2n.h \
++ eccrypto.h \
++ ecp.h \
++ elgamal.h \
++ emsa2.h \
++ eprecomp.h \
++ esign.h \
++ factory.h \
++ files.h \
++ filters.h \
++ fips140.h \
++ fltrimpl.h \
++ fhmqv.h \
++ gcm.h \
++ gf2_32.h \
++ gf256.h \
++ gf2n.h \
++ gfpcrypt.h \
++ gost.h \
++ gzip.h \
++ hex.h \
++ hkdf.h \
++ hmac.h \
++ hmqv.h \
++ hrtimer.h \
++ ida.h \
++ idea.h \
++ integer.h \
++ iterhash.h \
++ keccak.h \
++ local.h \
++ lubyrack.h \
++ luc.h \
++ md2.h \
++ md4.h \
++ md5.h \
++ mdc.h \
++ mersenne.h \
++ misc.h \
++ modarith.h \
++ modes.h \
++ modexppc.h \
++ mqueue.h \
++ mqv.h \
++ nbtheory.h \
++ network.h \
++ nr.h \
++ oaep.h \
++ oids.h \
++ osrng.h \
++ panama.h \
++ pch.h \
++ pkcspad.h \
++ polynomi.h \
++ pssr.h \
++ pubkey.h \
++ pwdbased.h \
++ queue.h \
++ rabin.h \
++ randpool.h \
++ rc2.h \
++ rc5.h \
++ rc6.h \
++ rdrand.h \
++ resource.h \
++ rijndael.h \
++ ripemd.h \
++ rng.h \
++ rsa.h \
++ rw.h \
++ safer.h \
++ salsa.h \
++ seal.h \
++ secblock.h \
++ seckey.h \
++ seed.h \
++ serpent.h \
++ serpentp.h \
++ shacal2.h \
++ sha.h \
++ sha3.h \
++ shark.h \
++ simple.h \
++ skipjack.h \
++ smartptr.h \
++ socketft.h \
++ sosemanuk.h \
++ square.h \
++ stdcpp.h \
++ strciphr.h \
++ tea.h \
++ tiger.h \
++ trdlocal.h \
++ trunhash.h \
++ ttmac.h \
++ twofish.h \
++ validate.h \
++ vmac.h \
++ wait.h \
++ wake.h \
++ whrlpool.h \
++ winpipes.h \
++ words.h \
++ xtrcrypt.h \
++ xtr.h \
++ zdeflate.h \
++ zinflate.h \
++ zlib.h \
++ mars.h
++
++
++noinst_HEADERS = \
++ local.h \
++ resource.h \
++ serpentp.h
++ validate.h
++
++bin_PROGRAMS = cryptest cryptestcwd
++cryptest_CXXFLAGS = $(CXXFLAGS) -DPACKAGE_DATA_DIR='"/usr/share/crypto++/"'
++cryptest_SOURCES = \
++ bench1.cpp \
++ bench2.cpp \
++ blake2.cpp \
++ chacha.cpp \
++ test.cpp \
++ validat1.cpp \
++ validat2.cpp \
++ validat3.cpp \
++ datatest.cpp \
++ regtest.cpp \
++ fipsalgt.cpp \
++ dlltest.cpp
++nodist_cryptest_SOURCES = adhoc.cpp
++cryptest_LDADD = $(lib_LTLIBRARIES)
++cryptestcwd_CXXFLAGS = $(CXXFLAGS) -DPACKAGE_DATA_DIR='""'
++cryptestcwd_SOURCES = \
++ bench1.cpp \
++ bench2.cpp \
++ blake2.cpp \
++ chacha.cpp \
++ test.cpp \
++ validat1.cpp \
++ validat2.cpp \
++ validat3.cpp \
++ datatest.cpp \
++ regtest.cpp \
++ fipsalgt.cpp \
++ dlltest.cpp
++nodist_cryptestcwd_SOURCES = adhoc.cpp
++CLEANFILES = adhoc.cpp
++cryptestcwd_LDADD = $(lib_LTLIBRARIES)
++
++adhoc.cpp: Makefile
++ if test -f adhoc.cpp; then \
++ touch adhoc.cpp; \
++ else \
++ cp adhoc.cpp.proto adhoc.cpp; \
++ fi
--- /dev/null
--- /dev/null
++AC_INIT([Crypto++], [5.6.4], [cryptopp-users@googlegroups.com])
++AM_INIT_AUTOMAKE
++AC_CONFIG_SRCDIR(configure.ac)
++AC_CONFIG_HEADER([local.h])
++AM_MAINTAINER_MODE
++
++AC_PROG_CXX
++AC_PROG_LIBTOOL
++AC_PROG_INSTALL
++
++AC_C_BIGENDIAN
++
++AC_CONFIG_FILES([Makefile libcrypto++.pc])
++AC_CONFIG_MACRO_DIR([m4])
++AC_OUTPUT
--- /dev/null
--- /dev/null
++prefix=@prefix@
++exec_prefix=@exec_prefix@
++libdir=@libdir@
++includedir=@includedir@
++
++Name: libcrypto++
++Description: General purpose cryptographic shared library
++URL: http://www.cryptopp.com
++Version: @VERSION@
++Requires:
++Libs: -lcrypto++
++Cflags:
--- /dev/null
--- /dev/null
++libcrypto++ (5.6.4-8) unstable; urgency=medium
++
++ * Install all headers (closes: #866100).
++ * Update watch file (closes: #862876).
++ * Update Standards-Version to 4.0.0 and debhelper level to 10 .
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Tue, 27 Jun 2017 19:04:20 +0000
++
++libcrypto++ (5.6.4-7) unstable; urgency=high
++
++ * Backport security fix for out-of-bounds read in zinflate.
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Mon, 05 Jun 2017 06:55:28 +0000
++
++libcrypto++ (5.6.4-6) unstable; urgency=medium
++
++ * Backport additional ASN.1 validations.
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Sun, 25 Dec 2016 08:46:52 +0000
++
++libcrypto++ (5.6.4-5) unstable; urgency=high
++
++ * Fix CVE-2016-9939: possible DoS in ASN.1 decoders (closes: #848009).
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Fri, 23 Dec 2016 20:54:36 +0000
++
++libcrypto++ (5.6.4-4) unstable; urgency=medium
++
++ * Apply upstream fix for Integer class ABI break (closes: #845460).
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Fri, 02 Dec 2016 17:00:47 +0000
++
++libcrypto++ (5.6.4-3) unstable; urgency=medium
++
++ * Backport upstream fix for potential zeroizer removal.
++ * Backport upstream fix for Hurd build.
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Tue, 01 Nov 2016 11:27:35 +0000
++
++libcrypto++ (5.6.4-2) unstable; urgency=low
++
++ * Add missed headers to libcrypto++-dev (closes: #841443).
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Sun, 23 Oct 2016 16:46:44 +0200
++
++libcrypto++ (5.6.4-1) unstable; urgency=low
++
++ * New upstream release.
++ * Remove cryptest-data-files-location.diff as applied upstream.
++ * Remove backported patches as this release contains those.
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Sat, 08 Oct 2016 16:27:30 +0000
++
++libcrypto++ (5.6.3-8) unstable; urgency=high
++
++ * Fix CVE-2016-7420 with compiling -DNDEBUG to prevent sensitive information
++ leakage to core dumps when an assert() happens.
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Fri, 16 Sep 2016 15:42:32 +0000
++
++libcrypto++ (5.6.3-7) unstable; urgency=low
++
++ * Prevent binary testing when only architecture independent packages are
++ built (closes: #821176).
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Fri, 15 Jul 2016 20:11:19 +0000
++
++libcrypto++ (5.6.3-6) unstable; urgency=high
++
++ * Backport last bit of CVE-2016-3995 fix, the Rijndael timing attack
++ counter measure.
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Wed, 13 Apr 2016 16:40:13 +0000
++
++libcrypto++ (5.6.3-5) unstable; urgency=medium
++
++ * Fix the Rijndael timing attack counter measure.
++ * Fix FTBFS on M68k machines.
++ * Update Standards-Version to 3.9.8 .
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Sun, 10 Apr 2016 09:14:31 +0000
++
++libcrypto++ (5.6.3-4) unstable; urgency=low
++
++ * Start the transition with upload to Sid.
++ * Builds on x32 (closes: #813659).
++ * Update Standards-Version to 3.9.7 .
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Sun, 03 Apr 2016 11:33:16 +0000
++
++libcrypto++ (5.6.3-3) experimental; urgency=low
++
++ * Backport upstream fixes:
++ - fixed hang on ARM platforms in Integer::DivideThreeWordsByTwo,
++ - work around issue on ARMEL in MultiplyTop and GCC,
++ - increase range for GCC workaround on ARMEL,
++ - fixed SecBlock append.
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Sat, 09 Jan 2016 09:15:35 +0100
++
++libcrypto++ (5.6.3-2) experimental; urgency=low
++
++ * Only fix -doc package HTML path if it's built.
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Sat, 21 Nov 2015 13:27:54 +0100
++
++libcrypto++ (5.6.3-1) experimental; urgency=low
++
++ * New major upstream release (closes: #739157).
++ * Keep rebuildable.
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Sat, 21 Nov 2015 09:25:03 +0100
++
++libcrypto++ (5.6.3~rc6-1) experimental; urgency=low
++
++ * New major upstream release candidate version.
++ * Add CRYPTOPP_NO_UNALIGNED_DATA_ACCESS preprocessor flag to CXXFLAGS .
++ * Add rdrand.cpp to library sources to compile.
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Thu, 29 Oct 2015 19:44:06 +0100
++
++libcrypto++ (5.6.3~rc4-1) experimental; urgency=low
++
++ * New major upstream release candidate version.
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Mon, 21 Sep 2015 20:10:14 +0200
++
++libcrypto++ (5.6.3~rc3-1) experimental; urgency=low
++
++ * New major upstream release candidate version.
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Wed, 16 Sep 2015 19:47:57 +0200
++
++libcrypto++ (5.6.3~rc2-2) experimental; urgency=low
++
++ * Make co-installable with older versions.
++ * Run doxygen only in the indep target.
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Mon, 14 Sep 2015 20:06:20 +0200
++
++libcrypto++ (5.6.3~rc2-1) experimental; urgency=low
++
++ * New major upstream release release candidate version.
++ * ABI transition from libcrypto++9v5 to libcrypto++6 .
++ * Rewrite packaging and copyright.
++ * Build with CRYPTOPP_INIT_PRIORITY=250 .
++ * Symlink jquery.js to the packaged one.
++ * Add watch file.
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Sun, 13 Sep 2015 15:55:30 +0200
++
++libcrypto++ (5.6.1-9) unstable; urgency=low
++
++ * Compile integer.cpp with -O1 on armel to prevent FTBFS (closes: #796297).
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Sat, 12 Sep 2015 10:17:29 +0200
++
++libcrypto++ (5.6.1-8) unstable; urgency=medium
++
++ * Rename library to libcrypto++9v5 and the debug one to libcrypto++9-dbg
++ for GCC 5 transition.
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Wed, 12 Aug 2015 18:43:04 +0200
++
++libcrypto++ (5.6.1-7) unstable; urgency=high
++
++ * Fix CVE-2015-2141.
++ * Update Standards-Version to 3.9.6 and debhelper level to 9 .
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.org> Sun, 28 Jun 2015 12:34:20 +0000
++
++libcrypto++ (5.6.1-6) unstable; urgency=low
++
++ * Fix build failure with gcc-4.7 (closes: #668700) by adding missing 'this'
++ references. Thanks to Matthias Klose <doko@debian.org> .
++ * Update packaging bits.
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.hu> Sat, 14 Apr 2012 20:21:41 +0200
++
++libcrypto++ (5.6.1-5) unstable; urgency=low
++
++ * New maintainer (closes: #628935).
++ * salsa.patch from upstream to fix testcase FTBFS (closes: #628298).
++
++ -- Laszlo Boszormenyi (GCS) <gcs@debian.hu> Sat, 04 Jun 2011 20:15:34 +0200
++
++libcrypto++ (5.6.1-4) unstable; urgency=low
++
++ * Fix Pananma so that it works on armel, thanks to Wei Dai.
++ (Closes: #619856)
++
++ -- Jens Peter Secher <jps@debian.org> Mon, 25 Apr 2011 21:13:50 +0200
++
++libcrypto++ (5.6.1-3) unstable; urgency=low
++
++ * Make debug packages conflict with each other because they all include
++ usr/bin/cryptest.
++ (Closes: #619527)
++ * Removed obsolete README.source now that the package is in dpkg format
++ 3.0 (quilt).
++
++ -- Jens Peter Secher <jps@debian.org> Sun, 27 Mar 2011 23:56:51 +0200
++
++libcrypto++ (5.6.1-2) unstable; urgency=low
++
++ * Build for Wheezy, no change.
++ (Closes: #599639)
++
++ -- Jens Peter Secher <jps@debian.org> Tue, 22 Mar 2011 04:51:04 +0100
++
++libcrypto++ (5.6.1-1) experimental; urgency=low
++
++ * New release, which changes the API of the library, so bumping the SO
++ version to 9.
++ * Patch for sha256 assembly is now included upstream.
++ * Bumped Standards-Version to 3.9.1, no change.
++
++ -- Jens Peter Secher <jps@debian.org> Tue, 10 Aug 2010 21:26:54 +0200
++
++libcrypto++ (5.6.0-6) unstable; urgency=low
++
++ * Fix sha256 assembly problem with signed address comparison, thanks to
++ Ken Raeburn.
++ (Closes: #585930)
++ * Converted to dpkg-source format 3.0 (quilt).
++ * Use mercurial-buildpackage for repository maintenance, so old
++ repository does not exist any more.
++ * Bumped Standards-Version to 3.8.4, no change.
++ * Use misc:Depends debhelper macro for all packages.
++ * Introduced a realclean target in debian/rules for cleaning up an
++ interrupted build.
++ * Build-depend on a proper quilt-handling version of dpkg-source instead
++ of quilt itself.
++
++ -- Jens Peter Secher <jps@debian.org> Wed, 16 Jun 2010 23:50:50 +0200
++
++libcrypto++ (5.6.0-5) unstable; urgency=low
++
++ * Fix build failure on Hurd by using POSIX threads, thanks to Samuel
++ Thibault.
++ (Closes: #550786)
++
++ -- Jens Peter Secher <jps@debian.org> Fri, 16 Oct 2009 20:06:13 +0200
++
++libcrypto++ (5.6.0-4) unstable; urgency=low
++
++ * Inlcude missing testvector for AES, thanks to Nelson A. de Oliveira.
++ (Closes: #549150)
++ * Do not include .la file per request from Kartik Mistry.
++
++ -- Jens Peter Secher <jps@debian.org> Thu, 01 Oct 2009 22:08:44 +0200
++
++libcrypto++ (5.6.0-3) unstable; urgency=low
++
++ * Depend on generic automake package (at the time of writing version 11).
++ (Closes: #543028)
++ * Update the various package descriptions.
++ (Closes: #531814)
++ * Upgrate to debhelper version 7, using dh_prep instead of dh_clean -k.
++ * Updated Standards-Version to 3.8.3, but retaining GNU style variables
++ because they are passed to automake scripts. Also correct
++ "hppa-linux" to "hppa-linux-gnu".
++
++ -- Jens Peter Secher <jps@debian.org> Sat, 22 Aug 2009 19:55:04 +0200
++
++libcrypto++ (5.6.0-2) unstable; urgency=low
++
++ * Added a package with debug symbols.
++ * Drop the DCRYPTOPP_DISABLE_ASM flag to avoid segfault in amule on
++ i386.
++ (Closes: #525071)
++
++ -- Jens Peter Secher <jps@debian.org> Tue, 28 Apr 2009 23:23:21 +0200
++
++libcrypto++ (5.6.0-1) unstable; urgency=low
++
++ * New upstream version.
++ + Includes incompatible changes, so bumping the shared library number to 8
++ (libtool version info 8:0:0).
++ + The test data is now in its own directory, so this TestData directory
++ is handled in debian/rules the same way that TestVectors is.
++ * Link with pthread to avoid warning from dpkg-shlibdeps.
++ * Avoid running the test suite twice by giving it its own target: check.
++
++ -- Jens Peter Secher <jps@debian.org> Tue, 07 Apr 2009 02:52:06 +0200
++
++libcrypto++ (5.5.2-3) unstable; urgency=low
++
++ * Use quilt instead of dpatch for patches, and describe how to use
++ quilt in Debian.source (thanks to Russ Allbery).
++ * Added a Vcs-Hg control filed to indicate the location of the public
++ repository.
++ * Bumped Standards-Version to 3.8.1.
++
++ -- Jens Peter Secher <jps@debian.org> Tue, 07 Apr 2009 00:51:49 +0200
++
++libcrypto++ (5.5.2-2) unstable; urgency=low
++
++ * Produce a pkg-config file for the development package.
++ (Closes: #473090)
++ * Use doc-bas section Programming.
++
++ -- Jens Peter Secher <jps@debian.org> Sat, 29 Mar 2008 17:37:32 +0100
++
++libcrypto++ (5.5.2-1) unstable; urgency=low
++
++ * New upstream version.
++ * Increased SONAME from 6 to 7 because of API changes.
++ * Fixed GCC 4.3 header include problem.
++ (Closes: #455627)
++ * Created symlinks from libcryptopp* to libcrypto++*, as requested in
++ bug #448766.
++ * Bumped debhelper version to 5.
++ * Bumped Standards-Version to 3.7.3.
++
++ -- Jens Peter Secher <jps@debian.org> Tue, 11 Dec 2007 19:06:15 +0100
++
++libcrypto++ (5.5-5) unstable; urgency=low
++
++ * Create a symlink to /usr/include/cryptopp -> crypto++ to aid
++ portability of client code.
++ (Closes: #448766)
++ * Bumped automake to 1.10 instead of 1.9 .
++
++ -- Jens Peter Secher <jps@debian.org> Sun, 11 Nov 2007 21:51:53 +0100
++
++libcrypto++ (5.5-4) unstable; urgency=low
++
++ * Use POSIX threads on GNU/kFreeBSD, thanks to Petr Salinger.
++ (Closes: #433672)
++
++ -- Jens Peter Secher <jps@debian.org> Sun, 19 Aug 2007 10:02:37 +0200
++
++libcrypto++ (5.5-3) unstable; urgency=high
++
++ * Do not compile with -msse2 to avoid crash on Pentium II, thanks
++ to Adeodato Simó. Hence the high urgency.
++ (Closes: #428150)
++ * Use ${binary:Version} instead of ${Source-Version} to facilitate
++ binNMU.
++ * Do not ignore 'make clean' errors.
++
++ -- Jens Peter Secher <jps@debian.org> Sat, 30 Jun 2007 16:39:14 +0200
++
++libcrypto++ (5.5-2) unstable; urgency=low
++
++ * Use CURDIR throughout debian/rules to avoid buildd failures.
++
++ -- Jens Peter Secher <jps@debian.org> Tue, 29 May 2007 20:29:08 +0200
++
++libcrypto++ (5.5-1) unstable; urgency=low
++
++ * New upstream release.
++ * Bumped SO name to 6.0.0 because of new namespaces and removed algorithms.
++ * Updated man page and build scripts.
++ * Only use header files to generate documentation because Doxygen
++ otherwise chokes.
++
++ -- Jens Peter Secher <jps@debian.org> Sat, 12 May 2007 12:50:30 +0200
++
++libcrypto++ (5.4-1) experimental; urgency=low
++
++ * New upstream release.
++ * Removed all patches that have now been included upstream.
++ * Now that things are stable with both Crypto++ and GCC, the shared
++ library has a proper SO name.
++
++ -- Jens Peter Secher <jps@debian.org> Fri, 15 Dec 2006 23:32:46 +0100
++
++libcrypto++ (5.2.1c2a-3) unstable; urgency=low
++
++ * Patch source so that it compiles with GCC 4.1 . More specifically,
++ avoid mixing implicit calls to base classes and free-standing
++ functions.
++ (Closes: #356170)
++ * Use LDFLAGS=-pthread to fix linking errors.
++
++ -- Jens Peter Secher <jps@debian.org> Thu, 16 Mar 2006 23:08:48 +0100
++
++libcrypto++ (5.2.1c2a-2) unstable; urgency=low
++
++ * Build-depend on a version of g++ that fixes PR c++/21123 which
++ resulted in internal compiler errors on m68k, arm, and hppa
++ (Closes: #343003)
++ * Include an override to stop Lintian complaining about the name of the
++ shared library.
++ * Removed link in main headline of Doxygen generated documentaion since
++ Doxygen insists on escaping it.
++
++ -- Jens Peter Secher <jps@debian.org> Tue, 13 Dec 2005 20:40:25 +0100
++
++libcrypto++ (5.2.1c2a-1) unstable; urgency=low
++
++ * Rebuild and name change due to libstdc++6 mt-allocator transition.
++ (Closes: #339201)
++
++ -- Jens Peter Secher <jps@debian.org> Sat, 19 Nov 2005 23:56:27 +0100
++
++libcrypto++ (5.2.1c2-8) unstable; urgency=low
++
++ * Force autoreconf to use automake1.9 so that it is possible to have
++ several automake versions installed.
++
++ -- Jens Peter Secher <jps@debian.org> Sat, 1 Oct 2005 16:11:18 +0200
++
++libcrypto++ (5.2.1c2-7) unstable; urgency=low
++
++ * Use the upstream-provided way of doing manual template instantiation
++ on architectures where it is necessary to use GCC3.4.
++
++ -- Jens Peter Secher <jps@debian.org> Mon, 26 Sep 2005 19:08:30 +0200
++
++libcrypto++ (5.2.1c2-6) unstable; urgency=low
++
++ * Circumvent GCC4 internal compiler error on m68k, arm, and hppa by
++ using GCC3.4 on those architectures, thanks to Adeodato Simó.
++ (Closes: #328975)
++
++ -- Jens Peter Secher <jps@debian.org> Tue, 20 Sep 2005 20:46:29 +0200
++
++libcrypto++ (5.2.1c2-5) unstable; urgency=low
++
++ * Fixed the debian/rules so that the binary-arch target can be built in
++ isolation.
++ (Closes: #323161)
++ * Added a doc-base file for the libcrypto++-doc package.
++
++ -- Jens Peter Secher <jps@debian.org> Mon, 15 Aug 2005 22:18:05 +0200
++
++libcrypto++ (5.2.1c2-4) unstable; urgency=low
++
++ * Really take care of endianess this time by letting config.status
++ manipulate config.h .
++ * Split the documentation into a libcrypto++-doc package.
++
++ -- Jens Peter Secher <jps@debian.org> Wed, 10 Aug 2005 23:47:51 +0200
++
++libcrypto++ (5.2.1c2-3) unstable; urgency=low
++
++ * Take care of architecture endianess by using AC_C_BIGENDIAN in
++ configure.ac . Should fix building for s390 and mipsel.
++
++ -- Jens Peter Secher <jps@debian.org> Mon, 8 Aug 2005 21:25:50 +0200
++
++libcrypto++ (5.2.1c2-2) unstable; urgency=low
++
++ * Stopped including autotools generated scripts, and instead
++ build-depends on automaken to avoid strange problems with libtool that
++ causes problems for the build daemons.
++ * Fix cryptest so that it always can find its data files, and put it in
++ the libcrypto++-utils package again.
++
++ -- Jens Peter Secher <jps@debian.org> Sat, 6 Aug 2005 16:34:56 +0200
++
++libcrypto++ (5.2.1c2-1) unstable; urgency=low
++
++ * New maintainer.
++ (Closes: #288433)
++ * Complete re-autotoolising of the package to retain pristine upstream
++ source and to only build-depend on libtool.
++ * The crypto++-util package has been merged into the crypto++-dev
++ package and is thus dead.
++ * Applied patches from Ben Hutchings to avoid compile warnings
++ (Closes: #286114)
++ * Circumvented anonymous-enum and template-instantiations problems with
++ GCC 4. Thanks to Florian Weimer and Jozef Matula for guiding me in
++ the right direction.
++ (Closes: #318518)
++ * Started using dpatch since some of the above patches probably could
++ make it upstream.
++
++ -- Jens Peter Secher <jps@debian.org> Sun, 31 Jul 2005 02:07:29 +0200
++
++libcrypto++ (5.2.1a-1) unstable; urgency=high
++
++ * Urgency set to high because lastest upload was unclean
++ * Rename libcrypto++-5.2.1.orig.tar.gz in libcrypto++-5.2.1a.orig.tar.gz
++
++ -- Pierre Machard <pmachard@debian.org> Fri, 27 Aug 2004 12:35:05 +0200
++
++libcrypto++ (5.2.1-2) unstable; urgency=high
++
++ * Added TestVectors to example dir
++ * Add symlink from cryptopp_config.h to config.h (closes: #244980)
++ * Hack configure.in to fit with new upstream version. This hack is
++ far from being complete and quite uggly.
++ * Update manpage
++ * Automaticaly update config.{sub,guess}
++
++ -- Pierre Machard <pmachard@debian.org> Sat, 21 Aug 2004 08:59:37 +0200
++
++libcrypto++ (5.2.1-1) unstable; urgency=high
++
++ * Adding myself as package uploaders
++ * Urgency set to high because of #244892
++ * New upstream release (closes: #244892, #247922, #245921, #261074)
++
++ -- Pierre Machard <pmachard@debian.org> Fri, 20 Aug 2004 05:22:28 +0200
++
++libcrypto++ (5.1-5) unstable; urgency=low
++
++ * Remove the final arch specific (rather than feature specifc) tests in
++ crypto_config.h,
++ Closes: #238220
++ * Add symlinks libcrypto++.{a,la,so} pointing to
++ libcrypto++5.1.{a,la,so} so that users can act like the ABI of this
++ library doesn't change with every major release,
++ Closes: #241148
++
++ -- Stephen Zander <gibreel@debian.org> Mon, 19 Apr 2004 18:10:28 -0700
++
++libcrypto++ (5.1-4) unstable; urgency=low
++
++ * Build with -fno-strict-aliasing. This should fix the segfaults on
++ non-i386 architectures.
++ * Add -ffunction-sections for hppa build,
++ Closes: #238220
++
++ -- Stephen Zander <gibreel@debian.org> Fri, 19 Mar 2004 02:06:08 -0800
++
++libcrypto++ (5.1-3) unstable; urgency=low
++
++ * Move datatest.cpp from libcrypto++5.1.so to the cryptest source to
++ really fix the GlobalRNG bug,
++ Closes: #236539
++
++ -- Stephen Zander <gibreel@debian.org> Sun, 14 Mar 2004 20:23:16 -0800
++
++libcrypto++ (5.1-2) unstable; urgency=low
++
++ * Remove validate.h from the libcrypto++5.1.so headers; it should only
++ be used by cryptest,
++ Closes: #236539
++ * Include test.cpp as an example of how to invoke the various Crypto++
++ routines,
++ Closes: #236844
++ * Allow cryptest to look for validation files in the current directory
++ as well as /usr/share/crypto++,
++ Closes: #236968
++
++ -- Stephen Zander <gibreel@debian.org> Sat, 13 Mar 2004 00:59:54 -0800
++
++libcrypto++ (5.1-1) unstable; urgency=low
++
++ * Drop the gcc-3.2 dependency as gcc-3.2 should be everywhere by now. This
++ also fixes the build failure on ARM.
++ * Rename the library from libcrypto++.so.5 to libcrypto++5.1.so.0 as
++ upstream does not maintain binary compatibility and having the 5.1
++ package provide libcrypto++.so.6 strikes me as too confusing.
++ * New upstream version,
++ Closes: #213953
++ * Include full paths to data files used by the cryptest validation
++ routines,
++ Closes: #198696
++ * Add MD4 to the output of 'cryptest b' and segregate the hashing
++ algorithms from the encryption algorithms,
++ Closes: #198698
++ * Include Doxygen generated documents in the libcrypto++-dev package,
++ Closes: #211725
++
++ -- Stephen Zander <gibreel@debian.org> Tue, 17 Feb 2004 12:41:29 -0800
++
++libcrypto++ (5.0-3) unstable; urgency=low
++
++ * Add generic 64bit arch support, rather than hard-coded alpha supoprt,
++ Closes: #181457
++
++ -- Stephen Zander <gibreel@debian.org> Sat, 15 Mar 2003 17:47:27 -0800
++
++libcrypto++ (5.0-2) unstable; urgency=low
++
++ * Convert the gcc-3.2 build depends to a g++-3.2, they way it should be
++ Closes: #175085
++ * Clean up cryptlib.h slightly so it's not so noisy under -Wall,
++ Closes: #175180
++
++ -- Stephen Zander <gibreel@debian.org> Tue, 7 Jan 2003 01:24:07 -0800
++
++libcrypto++ (5.0-1) unstable; urgency=low
++
++ * Package moved to main.
++ * New upstream version,
++ Closes: #174217
++ * All files now have appropriate copyright entries and debian/copyright
++ accurately reflects the contents of this package,
++ Closes: #153926
++ * cryptest now successfully runs to completion,
++ Closes: #153929
++ * Fix a typo in the cryptest manpage,
++ Closes: #153932
++
++ -- Stephen Zander <gibreel@debian.org> Fri, 27 Dec 2002 11:23:06 -0800
++
++libcrypto++ (4.2-1) unstable; urgency=low
++
++ * New package,
++ Closes: #79131
++
++ -- Stephen Zander <gibreel@debian.org> Fri, 5 Jul 2002 09:45:26 -0700
++
--- /dev/null
--- /dev/null
++Makefile.am
++Makefile.in
++aclocal.m4
++compile
++config.guess
++config.sub
++config.status
++configure
++configure.ac
++depcomp
++install-sh
++local.h.in
++ltmain.sh
++m4/libtool.m4
++m4/ltoptions.m4
++m4/ltsugar.m4
++m4/ltversion.m4
++m4/lt~obsolete.m4
++missing
--- /dev/null
--- /dev/null
++10
--- /dev/null
--- /dev/null
++Source: libcrypto++
++Section: libs
++Priority: optional
++Maintainer: Laszlo Boszormenyi (GCS) <gcs@debian.org>
++Standards-Version: 4.0.0
++Build-Depends: debhelper (>= 10), automake, autoconf, libtool
++Build-Depends-Indep: doxygen
++Homepage: http://www.cryptopp.com
++
++Package: libcrypto++6
++Architecture: any
++Section: libs
++Depends: ${shlibs:Depends}, ${misc:Depends}
++Description: General purpose cryptographic library - shared library
++ General purpose cryptographic library for C++.
++ .
++ This package contains the shared libraries and should only be
++ installed if other packages depend on it.
++
++Package: libcrypto++6-dbg
++Architecture: any
++Section: debug
++Priority: extra
++Depends: libcrypto++6 (= ${binary:Version}), ${misc:Depends}
++Description: General purpose cryptographic library - debug symbols
++ General purpose cryptographic library for C++.
++ .
++ This package contains the debug symbols for the shared library and
++ should only be installed if you debugging a program that uses the
++ shared library.
++
++Package: libcrypto++-dev
++Architecture: any
++Section: libdevel
++Depends: libcrypto++6 (= ${binary:Version}), ${misc:Depends}
++Description: General purpose cryptographic library - C++ development
++ Crypto++ is library for creating C++ programs which use cryptographic
++ algorithms. The library uses a Pipes & Filters architecture with heavy
++ use of templates and abstract base classes. The cryptographic
++ tools include:
++ * Authenticated encryption schemes (GCM, CCM, EAX),
++ * High speed stream ciphers (Panama, Sosemanuk, Salsa20, XSalsa20),
++ * AES and candidates (Rijndael, RC6, MARS, Twofish, Serpent, CAST-256),
++ * Other symmetric block ciphers (IDEA, Triple-DES, Camellia, SEED,
++ RC5, Blowfish, TEA, XTEA, Skipjack, SHACAL-2),
++ * Block cipher modes of operation (ECB, CBC, CTS, CFB, OFB, CTR),
++ * Message authentication codes (VMAC, HMAC, CMAC, CBC-MAC, DMAC,
++ Two-Track-MAC),
++ * Hash functions (SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, Tiger,
++ WHIRLPOOL, RIPEMD-128, RIPEMD-256, RIPEMD-160, RIPEMD-320),
++ * Public-key cryptography (RSA, DSA, ElGamal, NR, RW, LUC, LUCELG,
++ DLIES, ESIGN),
++ * Padding schemes for public-key systems (PKCS#1, OAEP, PSS, PSSR,
++ EMSA2, EMSA5),
++ * Key agreement schemes (DH, MQV, LUCDIF, XTR-DH),
++ * Elliptic curve cryptography (ECDSA, ECNR, ECIES, ECDH, ECMQV),
++ * Backwards compatibility algorithms (MD2, MD4, MD5, Panama Hash, DES,
++ ARC4, SEAL 3.0, WAKE, WAKE-OFB, DESX, RC2, SAFER, 3-WAY, GOST,
++ SHARK, CAST-128, Square),
++ * Pseudo-random number generators,
++ and a whole lot more. Alternative libraries are libgcrypt and
++ nettle.
++ .
++ This package contains the header files needed for developing using
++ the Crypto++ class library and the static library with libtool
++ supoport.
++
++Package: libcrypto++-utils
++Architecture: any
++Section: utils
++Depends: ${shlibs:Depends}, ${misc:Depends}
++Conflicts: libcrypto++-dev (= 5.2.1c2-1)
++Description: General purpose cryptographic library - utilities and data files
++ Crypto++ is library for creating C++ programs which use cryptographic
++ algorithms. The library uses a Pipes & Filters architecture with heavy
++ use of templates and abstract base classes. The cryptographic
++ tools include:
++ * Authenticated encryption schemes (GCM, CCM, EAX),
++ * High speed stream ciphers (Panama, Sosemanuk, Salsa20, XSalsa20),
++ * AES and candidates (Rijndael, RC6, MARS, Twofish, Serpent, CAST-256),
++ * Other symmetric block ciphers (IDEA, Triple-DES, Camellia, SEED,
++ RC5, Blowfish, TEA, XTEA, Skipjack, SHACAL-2),
++ * Block cipher modes of operation (ECB, CBC, CTS, CFB, OFB, CTR),
++ * Message authentication codes (VMAC, HMAC, CMAC, CBC-MAC, DMAC,
++ Two-Track-MAC),
++ * Hash functions (SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, Tiger,
++ WHIRLPOOL, RIPEMD-128, RIPEMD-256, RIPEMD-160, RIPEMD-320),
++ * Public-key cryptography (RSA, DSA, ElGamal, NR, RW, LUC, LUCELG,
++ DLIES, ESIGN),
++ * Padding schemes for public-key systems (PKCS#1, OAEP, PSS, PSSR,
++ EMSA2, EMSA5),
++ * Key agreement schemes (DH, MQV, LUCDIF, XTR-DH),
++ * Elliptic curve cryptography (ECDSA, ECNR, ECIES, ECDH, ECMQV),
++ * Backwards compatibility algorithms (MD2, MD4, MD5, Panama Hash, DES,
++ ARC4, SEAL 3.0, WAKE, WAKE-OFB, DESX, RC2, SAFER, 3-WAY, GOST,
++ SHARK, CAST-128, Square),
++ * Pseudo-random number generators,
++ and a whole lot more. Alternative libraries are libgcrypt and
++ nettle.
++ .
++ This package includes a utility for benchmarking and using the
++ various Crypto++ routines from the command line. It also includes
++ the test vectors for validating both the Crypto++ implementation and
++ other implementations of these routines.
++
++Package: libcrypto++-doc
++Architecture: all
++Section: doc
++Depends: ${misc:Depends}, libjs-jquery
++Conflicts: libcrypto++-dev (<= 5.2.1c2-3)
++Enhances: libcrypto++-dev
++Description: General purpose cryptographic library - documentation
++ Crypto++ is library for creating C++ programs which use cryptographic
++ algorithms. The library uses a Pipes & Filters architecture with heavy
++ use of templates and abstract base classes. The cryptographic
++ tools include:
++ * Authenticated encryption schemes (GCM, CCM, EAX),
++ * High speed stream ciphers (Panama, Sosemanuk, Salsa20, XSalsa20),
++ * AES and candidates (Rijndael, RC6, MARS, Twofish, Serpent, CAST-256),
++ * Other symmetric block ciphers (IDEA, Triple-DES, Camellia, SEED,
++ RC5, Blowfish, TEA, XTEA, Skipjack, SHACAL-2),
++ * Block cipher modes of operation (ECB, CBC, CTS, CFB, OFB, CTR),
++ * Message authentication codes (VMAC, HMAC, CMAC, CBC-MAC, DMAC,
++ Two-Track-MAC),
++ * Hash functions (SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, Tiger,
++ WHIRLPOOL, RIPEMD-128, RIPEMD-256, RIPEMD-160, RIPEMD-320),
++ * Public-key cryptography (RSA, DSA, ElGamal, NR, RW, LUC, LUCELG,
++ DLIES, ESIGN),
++ * Padding schemes for public-key systems (PKCS#1, OAEP, PSS, PSSR,
++ EMSA2, EMSA5),
++ * Key agreement schemes (DH, MQV, LUCDIF, XTR-DH),
++ * Elliptic curve cryptography (ECDSA, ECNR, ECIES, ECDH, ECMQV),
++ * Backwards compatibility algorithms (MD2, MD4, MD5, Panama Hash, DES,
++ ARC4, SEAL 3.0, WAKE, WAKE-OFB, DESX, RC2, SAFER, 3-WAY, GOST,
++ SHARK, CAST-128, Square),
++ * Pseudo-random number generators,
++ and a whole lot more. Alternative libraries are libgcrypt and
++ nettle.
++ .
++ This package includes the HTML reference guide to the source code.
--- /dev/null
--- /dev/null
++Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
++Upstream-Name: Crypto++
++Source: http://sourceforge.net/projects/cryptopp/files/cryptopp/
++
++Files: *
++Copyright: (C) 1995-2013 by Wei Dai
++License: Boost
++
++Files: 3way.cpp
++Copyright: Joan Daemen
++License: public-domain
++
++Files: cast.cpp
++Copyright: Leonard Janke,
++ Steve Reid
++License: public-domain
++
++Files: seal.cpp
++Copyright: Leonard Janke
++License: public-domain
++
++Files: des.cpp
++Copyright: Phil Karn
++License: public-domain
++
++Files: md2.cpp
++ md4.cpp
++Copyright: Andrew M. Kuchling
++License: public-domain
++
++Files: md5.cpp
++Copyright: Colin Plumb
++License: public-domain
++
++Files: rc6.cpp
++Copyright: Seal Woods
++License: public-domain
++
++Files: rijndael.cpp
++Copyright: Chris Morgan,
++ Paulo Baretto
++License: public-domain
++
++Files: skipjack.cpp
++ square.cpp
++Copyright: Paulo Baretto
++License: public-domain
++
++Files: safer.cpp
++Copyright: Richard De Moliner
++License: public-domain
++
++Files: twofish.cpp
++Copyright: Matthew Skala
++License: public-domain
++
++Files: camellia.cpp
++ shacal2.cpp
++ ttmac.cpp
++ whrlpool.cpp
++ ripemd.cpp
++Copyright: Kevin Springle
++License: public-domain
++
++License: public-domain
++ No license required for any purpose; the work is not subject to copyright
++ in any jurisdiction.
++
++Files: debian/*
++Copyright: (C) 2011- Laszlo Boszormenyi (GCS) <gcs@debian.org>,
++ (C) 2005-2010 Jens Peter Secher <jps@debian.org>,
++ (C) 2004 Pierre Machard <pmachard@debian.org>,
++ (C) 2000-2002 Stephen Zander <gibreel@debian.org>
++License: Boost
++
++License: Boost
++ Boost Software License - Version 1.0
++ ------------------------------------
++ .
++ Boost Software License - Version 1.0 - August 17th, 2003
++ .
++ Permission is hereby granted, free of charge, to any person or organization
++ obtaining a copy of the software and accompanying documentation covered by
++ this license (the "Software") to use, reproduce, display, distribute,
++ execute, and transmit the Software, and to prepare derivative works of the
++ Software, and to permit third-parties to whom the Software is furnished to
++ do so, all subject to the following:
++ .
++ The copyright notices in the Software and this entire statement, including
++ the above license grant, this restriction and the following disclaimer,
++ must be included in all copies of the Software, in whole or in part, and
++ all derivative works of the Software, unless such copies or derivative
++ works are solely in the form of machine-executable object code generated by
++ a source language processor.
++ .
++ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
++ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
++ FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT
++ SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE
++ FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE,
++ ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
++ DEALINGS IN THE SOFTWARE.
--- /dev/null
--- /dev/null
++.TH cryptest 1 local
++.SH NAME
++cryptest \- Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives
++.SH SYNOPSIS
++.B cryptest
++[\fIOPTION\fR]
++.SH DESCRIPTION
++cryptest takes the following options
++.TP
++.B g
++generate an RSA key
++.TP
++.B h
++display usage information
++.TP
++.B r
++encrypt and decrypt a string using RSA
++.TP
++.BI rs " privatekeyfile messagefile signaturefile"
++sign a file using RSA
++.TP
++.BI rv " publickeyfile messagefile signaturefile"
++verify a signature of a file using RSA
++.TP
++.BI m " file"
++calculate MD5, SHA, and RIPEMD-160 message digests
++.TP
++.B t
++encrypt and decrypt a string using DES-EDE in CBC mode
++.TP
++.BI e|d " input output"
++encrypt or decrypt a file
++.TP
++.BI ss " <threshold> <number-of-shares> file"
++secret share a file (shares will be named file.000, file.001, etc)
++.TP
++.BI sr " file share1 share2 [....]"
++reconstruct a secret-shared file (number of shares given must be equal
++to threshold)
++.TP
++.BI id " <threshold> <number-of-shares> file"
++information disperse a file (shares will be named file.000, file.001, etc)
++.TP
++.BI ir " file share1 share2 [....]"
++reconstruct an information-dispersed file (number of shares given must
++be equal to threshold)
++.TP
++.BI z " <compression-level> input output"
++gzip a file
++.TP
++.BI u " input output"
++gunzip a file
++.TP
++.BI ae " input output"
++encrypt a file with AES in CTR mode
++.TP
++.BI e64 " input output"
++base64 encode a file
++.TP
++.BI d64 " input output"
++base64 decode a file
++.TP
++.BI e16 " input output"
++hex encode a file
++.TP
++.BI d16 " input output"
++hex decode a file
++.TP
++.BI ft " source-port destination-host destination-port"
++forward a TCP connection
++.TP
++.BI fips
++run the FIPS 140-2 sample application
++.TP
++.BI fips-rand
++generate 100000 random files using FIPS Approved X.917 RNG
++.TP
++.BI mt " input"
++run Maurer's randomness test on a file
++.TP
++.B v
++run validation tests
++.TP
++.B V
++display version number
++.TP
++.BI b " [time for each benchmark in seconds] [frequency of CPU in gigahertz]"
++run benchmarks
++.TP
++.BI tv " filename"
++run test vector file (available in TestVectors example subdirectory)
++.SH AUTHOR
++This man page was created by Stephen Zander, Pierre Machard and Jens
++Peter Secher for the Debian distribution. It is licenced under the
++same terms as the rest of the Crypto++ library, written by Wei Dai.
--- /dev/null
--- /dev/null
++Readme.txt
--- /dev/null
--- /dev/null
++usr/include/crypto--/*.h usr/include/crypto++
++usr/lib/*/*.a
++usr/lib/*/*.so
++usr/lib/*/pkgconfig/*.pc
--- /dev/null
--- /dev/null
++/usr/include/crypto++ /usr/include/cryptopp
++/usr/lib/ARCH/libcrypto++.a /usr/lib/ARCH/libcryptopp.a
++/usr/lib/ARCH/libcrypto++.so /usr/lib/ARCH/libcryptopp.so
--- /dev/null
--- /dev/null
++Document: libcrypto++
++Title: Crypto++ library reference manual
++Author: Wei Dai
++Abstract: Reference manual for the general purpose cryptographic library
++ Crypto++ for the C++ language.
++Section: Programming
++
++Format: HTML
++Index: /usr/share/doc/libcrypto++-doc/html/index.html
++Files: /usr/share/doc/libcrypto++-doc/html/*.html
--- /dev/null
--- /dev/null
++html-docs/
--- /dev/null
--- /dev/null
++/usr/share/javascript/jquery/jquery.js /usr/share/doc/libcrypto++-doc/html/jquery.js
--- /dev/null
--- /dev/null
++usr/bin/cryptest
++usr/share/crypto--/TestData usr/share/crypto++
++usr/share/crypto--/TestVectors usr/share/crypto++
--- /dev/null
--- /dev/null
++debian/cryptest.1
--- /dev/null
--- /dev/null
++usr/lib/*/*.so.*
--- /dev/null
--- /dev/null
++/usr/lib/ARCH/libcrypto++.so.6 /usr/lib/ARCH/libcryptopp.so.6
--- /dev/null
--- /dev/null
++From 9fca0c28023a177106cf58a3de6da610f185a6e4 Mon Sep 17 00:00:00 2001
++From: Jeffrey Walton <noloader@gmail.com>
++Date: Fri, 8 Jan 2016 15:43:09 -0500
++Subject: [PATCH] Work around issue on ARMEL in MultiplyTop and GCC. ARMHF is
++ OK
++
++---
++ integer.cpp | 14 ++++++++++++++
++ 1 file changed, 14 insertions(+)
++
++diff --git a/integer.cpp b/integer.cpp
++index fcb14ce..e767bd9 100644
++--- a/integer.cpp
+++++ b/integer.cpp
++@@ -67,6 +67,16 @@
++ # define CRYPTOPP_INTEGER_SSE2 (CRYPTOPP_BOOL_SSE2_ASM_AVAILABLE && CRYPTOPP_BOOL_X86)\r
++ #endif\r
++ \r
+++// Debian QEMU/ARMEL issue in MultiplyTop; see http://github.com/weidai11/cryptopp/issues/31.\r
+++#if __ARMEL__ && (CRYPTOPP_GCC_VERSION >= 50200) && (CRYPTOPP_GCC_VERSION < 50300) && __OPTIMIZE__\r
+++# define WORKAROUND_ARMEL_BUG 1\r
+++#endif\r
+++\r
+++#if WORKAROUND_ARMEL_BUG\r
+++# pragma GCC push_options\r
+++# pragma GCC optimize("O1")\r
+++#endif\r
+++\r
++ NAMESPACE_BEGIN(CryptoPP)\r
++ \r
++ bool AssignIntToInteger(const std::type_info &valueType, void *pInteger, const void *pInt)\r
++@@ -4549,4 +4559,8 @@ std::string IntToString<unsigned long long>(unsigned long long value, unsigned i
++ \r
++ NAMESPACE_END\r
++ \r
+++#if WORKAROUND_ARMEL_BUG\r
+++# pragma GCC pop_options\r
+++#endif\r
+++\r
++ #endif\r
--- /dev/null
--- /dev/null
++From dce2317195a7d9aa77b159fd1beddaf8358f6243 Mon Sep 17 00:00:00 2001
++From: Jeffrey Walton <noloader@gmail.com>
++Date: Sat, 9 Jan 2016 00:09:06 -0500
++Subject: [PATCH] Increase range for GCC workaround on ARMEL. After speaking
++ with AP from GCC, he states some issues are still likely present in Master,
++ which is GCC 6.0
++
++---
++ integer.cpp | 2 +-
++ 1 file changed, 1 insertion(+), 1 deletion(-)
++
++diff --git a/integer.cpp b/integer.cpp
++index e767bd9..de5df00 100644
++--- a/integer.cpp
+++++ b/integer.cpp
++@@ -68,7 +68,7 @@
++ #endif\r
++ \r
++ // Debian QEMU/ARMEL issue in MultiplyTop; see http://github.com/weidai11/cryptopp/issues/31.\r
++-#if __ARMEL__ && (CRYPTOPP_GCC_VERSION >= 50200) && (CRYPTOPP_GCC_VERSION < 50300) && __OPTIMIZE__\r
+++#if __ARMEL__ && (CRYPTOPP_GCC_VERSION >= 40900) && (CRYPTOPP_GCC_VERSION < 70000) && __OPTIMIZE__\r
++ # define WORKAROUND_ARMEL_BUG 1\r
++ #endif\r
++ \r
--- /dev/null
--- /dev/null
++From b19332a69fbd7b82f0e08c18f55a6880487d55e9 Mon Sep 17 00:00:00 2001
++From: Jeffrey Walton <noloader@gmail.com>
++Date: Sat, 24 Dec 2016 04:55:21 -0500
++Subject: [PATCH] Add additional validations based on X.690 rules
++
++The library was a tad bit fast and loose with respect to parsing some of the ASN.1 presented to it. It was kind of like we used Alternate Encoding Rules (AER), which was more relaxed than BER, CER or DER. This commit closes most of the gaps.
++
++The changes are distantly related to Issue 346. Issue 346 caught a CVE bcause of the transient DoS. These fixes did not surface with negative effcts. Rather, the library was a bit too accomodating to the point it was not conforming
++---
++ asn.cpp | 11 ++++++-----
++ asn.h | 32 +++++++++++++++++++++-----------
++ 2 files changed, 27 insertions(+), 16 deletions(-)
++
++diff --git a/asn.cpp b/asn.cpp
++index 2e923ef..79b4cbc 100644
++--- a/asn.cpp
+++++ b/asn.cpp
++@@ -123,7 +123,7 @@ size_t BERDecodeOctetString(BufferedTransformation &bt, SecByteBlock &str)
++ size_t bc;\r
++ if (!BERLengthDecode(bt, bc))\r
++ BERDecodeError();\r
++- if (bc > bt.MaxRetrievable())\r
+++ if (bc > bt.MaxRetrievable()) // Issue 346\r
++ BERDecodeError();\r
++ \r
++ str.New(bc);\r
++@@ -141,7 +141,7 @@ size_t BERDecodeOctetString(BufferedTransformation &bt, BufferedTransformation &
++ size_t bc;\r
++ if (!BERLengthDecode(bt, bc))\r
++ BERDecodeError();\r
++- if (bc > bt.MaxRetrievable())\r
+++ if (bc > bt.MaxRetrievable()) // Issue 346\r
++ BERDecodeError();\r
++ \r
++ bt.TransferTo(str, bc);\r
++@@ -165,7 +165,7 @@ size_t BERDecodeTextString(BufferedTransformation &bt, std::string &str, byte as
++ size_t bc;\r
++ if (!BERLengthDecode(bt, bc))\r
++ BERDecodeError();\r
++- if (bc > bt.MaxRetrievable())\r
+++ if (bc > bt.MaxRetrievable()) // Issue 346\r
++ BERDecodeError();\r
++ \r
++ SecByteBlock temp(bc);\r
++@@ -196,11 +196,12 @@ size_t BERDecodeBitString(BufferedTransformation &bt, SecByteBlock &str, unsigne
++ BERDecodeError();\r
++ if (bc == 0)\r
++ BERDecodeError();\r
++- if (bc > bt.MaxRetrievable())\r
+++ if (bc > bt.MaxRetrievable()) // Issue 346\r
++ BERDecodeError();\r
++ \r
+++ // X.690, 8.6.2.2: "The number [of unused bits] shall be in the range zero to seven"\r
++ byte unused;\r
++- if (!bt.Get(unused))\r
+++ if (!bt.Get(unused) || unused > 7)\r
++ BERDecodeError();\r
++ unusedBits = unused;\r
++ str.resize(bc-1);\r
++diff --git a/asn.h b/asn.h
++index 33f0dd0..002d849 100644
++--- a/asn.h
+++++ b/asn.h
++@@ -48,13 +48,14 @@ enum ASNTag
++ //! \note These tags and flags are not complete\r
++ enum ASNIdFlag\r
++ {\r
++- UNIVERSAL = 0x00,\r
++-// DATA = 0x01,\r
++-// HEADER = 0x02,\r
++- CONSTRUCTED = 0x20,\r
++- APPLICATION = 0x40,\r
++- CONTEXT_SPECIFIC = 0x80,\r
++- PRIVATE = 0xc0\r
+++ UNIVERSAL = 0x00,\r
+++// DATA = 0x01,\r
+++// HEADER = 0x02,\r
+++ PRIMITIVE = 0x00,\r
+++ CONSTRUCTED = 0x20,\r
+++ APPLICATION = 0x40,\r
+++ CONTEXT_SPECIFIC = 0x80,\r
+++ PRIVATE = 0xc0\r
++ };\r
++ \r
++ //! \brief Raises a BERDecodeErr\r
++@@ -466,9 +467,9 @@ size_t DEREncodeUnsigned(BufferedTransformation &out, T w, byte asnTag = INTEGER
++ }\r
++ \r
++ //! \brief BER Decode unsigned value\r
++-//! \tparam T class or type\r
+++//! \tparam T fundamental C++ type\r
++ //! \param in BufferedTransformation object\r
++-//! \param w unsigned value to encode\r
+++//! \param w the decoded value\r
++ //! \param asnTag the ASN.1 type\r
++ //! \param minValue the minimum expected value\r
++ //! \param maxValue the maximum expected value\r
++@@ -476,7 +477,7 @@ size_t DEREncodeUnsigned(BufferedTransformation &out, T w, byte asnTag = INTEGER
++ //! \details DEREncodeUnsigned() can be used with INTEGER, BOOLEAN, and ENUM\r
++ template <class T>\r
++ void BERDecodeUnsigned(BufferedTransformation &in, T &w, byte asnTag = INTEGER,\r
++- T minValue = 0, T maxValue = ((std::numeric_limits<T>::max)()))\r
+++ T minValue = 0, T maxValue = T(0xffffffff))\r
++ {\r
++ byte b;\r
++ if (!in.Get(b) || b != asnTag)\r
++@@ -486,7 +487,11 @@ void BERDecodeUnsigned(BufferedTransformation &in, T &w, byte asnTag = INTEGER,
++ bool definite = BERLengthDecode(in, bc);\r
++ if (!definite)\r
++ BERDecodeError();\r
++- if (bc > in.MaxRetrievable())\r
+++ if (bc > in.MaxRetrievable()) // Issue 346\r
+++ BERDecodeError();\r
+++ if (asnTag == BOOLEAN && bc != 1) // X.690, 8.2.1\r
+++ BERDecodeError();\r
+++ if ((asnTag == INTEGER || asnTag == ENUMERATED) && bc == 0) // X.690, 8.3.1 and 8.4\r
++ BERDecodeError();\r
++ \r
++ SecByteBlock buf(bc);\r
++@@ -494,6 +499,11 @@ void BERDecodeUnsigned(BufferedTransformation &in, T &w, byte asnTag = INTEGER,
++ if (bc != in.Get(buf, bc))\r
++ BERDecodeError();\r
++ \r
+++ // This consumes leading 0 octets. According to X.690, 8.3.2, it could be non-conforming behavior.\r
+++ // X.690, 8.3.2 says "the bits of the first octet and bit 8 of the second octet ... (a) shall\r
+++ // not all be ones and (b) shall not all be zeros ... These rules ensure that an integer value\r
+++ // is always encoded in the smallest possible number of octet".\r
+++ // We invented AER (Alternate Encoding Rules), which is more relaxed than BER, CER, and DER.\r
++ const byte *ptr = buf;\r
++ while (bc > sizeof(w) && *ptr == 0)\r
++ {\r
--- /dev/null
--- /dev/null
++From 3d9181d7bdd8e491f745dbc9e34bd20b6f6da069 Mon Sep 17 00:00:00 2001
++From: Gergely Nagy <ngg@tresorit.com>
++Date: Wed, 14 Dec 2016 13:19:01 +0100
++Subject: [PATCH] Fix possible DoS in ASN.1 decoders (CVE-2016-9939)
++
++---
++ asn.cpp | 10 ++++++++++
++ asn.h | 2 ++
++ 2 files changed, 12 insertions(+)
++
++diff --git a/asn.cpp b/asn.cpp
++index 297ff01..2e923ef 100644
++--- a/asn.cpp
+++++ b/asn.cpp
++@@ -123,6 +123,8 @@ size_t BERDecodeOctetString(BufferedTransformation &bt, SecByteBlock &str)
++ size_t bc;\r
++ if (!BERLengthDecode(bt, bc))\r
++ BERDecodeError();\r
+++ if (bc > bt.MaxRetrievable())\r
+++ BERDecodeError();\r
++ \r
++ str.New(bc);\r
++ if (bc != bt.Get(str, bc))\r
++@@ -139,6 +141,8 @@ size_t BERDecodeOctetString(BufferedTransformation &bt, BufferedTransformation &
++ size_t bc;\r
++ if (!BERLengthDecode(bt, bc))\r
++ BERDecodeError();\r
+++ if (bc > bt.MaxRetrievable())\r
+++ BERDecodeError();\r
++ \r
++ bt.TransferTo(str, bc);\r
++ return bc;\r
++@@ -161,6 +165,8 @@ size_t BERDecodeTextString(BufferedTransformation &bt, std::string &str, byte as
++ size_t bc;\r
++ if (!BERLengthDecode(bt, bc))\r
++ BERDecodeError();\r
+++ if (bc > bt.MaxRetrievable())\r
+++ BERDecodeError();\r
++ \r
++ SecByteBlock temp(bc);\r
++ if (bc != bt.Get(temp, bc))\r
++@@ -188,6 +194,10 @@ size_t BERDecodeBitString(BufferedTransformation &bt, SecByteBlock &str, unsigne
++ size_t bc;\r
++ if (!BERLengthDecode(bt, bc))\r
++ BERDecodeError();\r
+++ if (bc == 0)\r
+++ BERDecodeError();\r
+++ if (bc > bt.MaxRetrievable())\r
+++ BERDecodeError();\r
++ \r
++ byte unused;\r
++ if (!bt.Get(unused))\r
++diff --git a/asn.h b/asn.h
++index ed9de52..33f0dd0 100644
++--- a/asn.h
+++++ b/asn.h
++@@ -486,6 +486,8 @@ void BERDecodeUnsigned(BufferedTransformation &in, T &w, byte asnTag = INTEGER,
++ bool definite = BERLengthDecode(in, bc);\r
++ if (!definite)\r
++ BERDecodeError();\r
+++ if (bc > in.MaxRetrievable())\r
+++ BERDecodeError();\r
++ \r
++ SecByteBlock buf(bc);\r
++ \r
--- /dev/null
--- /dev/null
++From 856c7c56ad2ebc9a534ec4136f6eca38a83950e2 Mon Sep 17 00:00:00 2001
++From: Jeffrey Walton <noloader@gmail.com>
++Date: Mon, 31 Oct 2016 22:34:59 -0400
++Subject: [PATCH] Fix potential zeroizer removal (Issue 331)
++
++---
++ cast.cpp | 2 +-
++ 1 file changed, 1 insertion(+), 1 deletion(-)
++
++diff --git a/cast.cpp b/cast.cpp
++index 88162c0..6c1babb 100644
++--- a/cast.cpp
+++++ b/cast.cpp
++@@ -290,7 +290,7 @@ void CAST256::Base::UncheckedSetKey(const byte *userKey, unsigned int keylength,
++ }\r
++ }\r
++ \r
++- memset(kappa, 0, sizeof(kappa));\r
+++ SecureWipeBuffer(kappa, 8);\r
++ }\r
++ \r
++ NAMESPACE_END\r
--- /dev/null
--- /dev/null
++From 84b602cc7d9a3a56e188aed595865b27c2f9f2fc Mon Sep 17 00:00:00 2001
++From: Jeffrey Walton <noloader@gmail.com>
++Date: Fri, 28 Oct 2016 00:33:43 -0400
++Subject: [PATCH] Fix compile under Debian Hurd (i386) Debian Hurd defines
++ __MACH__, and it was picking up "#define CRYPTOPP_SECTION_INIT
++ __attribute__((section (__DATA,__data)))" intended for Apple linkers
++
++---
++ config.compat | 4 ++--
++ config.h | 4 ++--
++ 2 files changed, 4 insertions(+), 4 deletions(-)
++
++diff --git a/config.h b/config.h
++index 86b98ae..39ab7e4 100644
++--- a/config.h
+++++ b/config.h
++@@ -337,9 +337,9 @@ NAMESPACE_END
++ #endif\r
++ \r
++ // The section attribute attempts to initialize CPU flags to avoid Valgrind findings above -O1\r
++-#if ((__MACH__ >= 1) && ((CRYPTOPP_LLVM_CLANG_VERSION >= 30600) || (CRYPTOPP_APPLE_CLANG_VERSION >= 70100) || (CRYPTOPP_GCC_VERSION >= 40300)))\r
+++#if ((defined(__MACH__) && defined(__APPLE__)) && ((CRYPTOPP_LLVM_CLANG_VERSION >= 30600) || (CRYPTOPP_APPLE_CLANG_VERSION >= 70100) || (CRYPTOPP_GCC_VERSION >= 40300)))\r
++ #define CRYPTOPP_SECTION_INIT __attribute__((section ("__DATA,__data")))\r
++-#elif ((__ELF__ >= 1) && (CRYPTOPP_GCC_VERSION >= 40300))\r
+++#elif (defined(__ELF__) && (CRYPTOPP_GCC_VERSION >= 40300))\r
++ #define CRYPTOPP_SECTION_INIT __attribute__((section ("nocommon")))\r
++ #else\r
++ #define CRYPTOPP_SECTION_INIT\r
--- /dev/null
--- /dev/null
++Description: Upstream changes introduced in version 5.6.0-6
++ This patch has been created by dpkg-source during the package build.
++ Here's the last changelog entry, hopefully it gives details on why
++ those changes were made:
++ .
++ libcrypto++ (5.6.0-6) unstable; urgency=low
++ .
++ * Fix sha256 assembly problem with signed address comparison, thanks to
++ Ken Raeburn.
++ (Closes: #585930)
++ * Converted to dpkg-source format 3.0 (quilt).
++ * Use mercurial-buildpackage for repository maintenance, so old
++ repository does not exist any more.
++ * Bumped Standards-Version to 3.8.4, no change.
++ * Use misc:Depends debhelper macro for all packages.
++ .
++ The person named in the Author field signed this changelog entry.
++Author: Jens Peter Secher <jps@debian.org>
++Bug-Debian: http://bugs.debian.org/585930
++
++---
++The information above should follow the Patch Tagging Guidelines, please
++checkout http://dep.debian.net/deps/dep3/ to learn about the format. Here
++are templates for supplementary fields that you might want to add:
++
++Origin: <vendor|upstream|other>, <url of original patch>
++Bug: <url in upstream bugtracker>
++Bug-Debian: http://bugs.debian.org/<bugnumber>
++Bug-Ubuntu: https://launchpad.net/bugs/<bugnumber>
++Forwarded: <no|not-needed|url proving that it has been forwarded>
++Reviewed-By: <name and email of someone who approved the patch>
++Last-Update: <YYYY-MM-DD>
++
++Index: libcrypto++/config.h
++===================================================================
++--- libcrypto++.orig/config.h 2010-08-09 20:42:43.000000000 +0200
+++++ libcrypto++/config.h 2010-08-09 20:43:10.000000000 +0200
++@@ -1,18 +1,16 @@
+++/* config.h. Generated from config.h.in by configure. */
+++// Debian note: This is a copy of the original config.h file except for the two
+++// endianness undefs below; they are substituted by the autoconf process
+++// according to the build architecture.
+++
++ #ifndef CRYPTOPP_CONFIG_H
++ #define CRYPTOPP_CONFIG_H
++
++ // ***************** Important Settings ********************
++
++-// define this if running on a big-endian CPU
++-#if !defined(IS_LITTLE_ENDIAN) && (defined(__BIG_ENDIAN__) || defined(__sparc) || defined(__sparc__) || defined(__hppa__) || defined(__MIPSEB__) || defined(__ARMEB__) || (defined(__MWERKS__) && !defined(__INTEL__)))
++-# define IS_BIG_ENDIAN
++-#endif
++-
++-// define this if running on a little-endian CPU
++-// big endian will be assumed if IS_LITTLE_ENDIAN is not defined
++-#ifndef IS_BIG_ENDIAN
++-# define IS_LITTLE_ENDIAN
++-#endif
+++// Endianness
+++/* #undef IS_BIG_ENDIAN */
+++#define IS_LITTLE_ENDIAN /**/
++
++ // define this if you want to disable all OS-dependent features,
++ // such as sockets and OS-provided random number generators
--- /dev/null
--- /dev/null
++## doxygen-main-link.diff by Jens Peter Secher <jps@debian.org>
++##
++## Exclude links, either because they do not exists or because
++## Doxygen fails to recognise them.
++
++Index: libcrypto++/cryptlib.h
++===================================================================
++--- libcrypto++.orig/cryptlib.h 2010-08-09 20:42:43.000000000 +0200
+++++ libcrypto++/cryptlib.h 2010-08-09 20:43:01.000000000 +0200
++@@ -71,7 +71,6 @@
++ </dl>
++
++ <p>This reference manual is a work in progress. Some classes are still lacking detailed descriptions.
++-<p>Click <a href="CryptoPPRef.zip">here</a> to download a zip archive containing this manual.
++ <p>Thanks to Ryan Phillips for providing the Doxygen configuration file
++ and getting me started with this manual.
++ */
--- /dev/null
--- /dev/null
++## doxygen-setup.diff by Jens Peter Secher <jps@debian.org>
++##
++## Doxygen cannot handle all the source code, so only index the
++## include files.
++
++Index: libcrypto++/Doxyfile
++===================================================================
++--- libcrypto++.orig/Doxyfile 2010-08-09 20:42:43.000000000 +0200
+++++ libcrypto++/Doxyfile 2010-08-09 20:42:54.000000000 +0200
++@@ -170,7 +170,7 @@
++ # The TAB_SIZE tag can be used to set the number of spaces in a tab.
++ # Doxygen uses this value to replace tabs by spaces in code fragments.
++
++-TAB_SIZE = 8
+++TAB_SIZE = 4
++
++ # This tag can be used to specify a number of aliases that acts
++ # as commands in the documentation. An alias has the form "name=value".
++@@ -598,8 +598,7 @@
++ # *.c *.cc *.cxx *.cpp *.c++ *.java *.ii *.ixx *.ipp *.i++ *.inl *.h *.hh *.hxx
++ # *.hpp *.h++ *.idl *.odl *.cs *.php *.php3 *.inc *.m *.mm *.py *.f90
++
++-FILE_PATTERNS = *.h \
++- *.cpp
+++FILE_PATTERNS = *.h
++
++ # The RECURSIVE tag can be used to turn specify whether or not subdirectories
++ # should be searched for input files as well. Possible values are YES and NO.
++@@ -611,7 +610,7 @@
++ # excluded from the INPUT source files. This way you can easily exclude a
++ # subdirectory from a directory tree whose root is specified with the INPUT tag.
++
++-EXCLUDE = adhoc.cpp
+++EXCLUDE = winpipes.h validate.h bench.h
++
++ # The EXCLUDE_SYMLINKS tag can be used select whether or not files or
++ # directories that are symbolic links (a Unix filesystem feature) are excluded
++@@ -759,7 +758,7 @@
++ # the COLS_IN_ALPHA_INDEX tag can be used to specify the number of columns
++ # in which this list will be split (can be a number in the range [1..20])
++
++-COLS_IN_ALPHA_INDEX = 3
+++COLS_IN_ALPHA_INDEX = 2
++
++ # In case all classes in a project start with a common prefix, all
++ # classes will be put under the same header in the alphabetical index.
--- /dev/null
--- /dev/null
++diff --git a/integer.cpp b/integer.cpp
++index 671852d..02c0c87 100644
++--- a/integer.cpp
+++++ b/integer.cpp
++@@ -2929,6 +2929,11 @@ signed long Integer::ConvertToLong() const
++ return sign==POSITIVE ? value : -(signed long)value;\r
++ }\r
++ \r
+++Integer::Integer(BufferedTransformation &encodedInteger, size_t byteCount, Signedness s)\r
+++{\r
+++ Decode(encodedInteger, byteCount, s);\r
+++}\r
+++\r
++ Integer::Integer(BufferedTransformation &encodedInteger, size_t byteCount, Signedness s, ByteOrder o)\r
++ {\r
++ assert(o == BIG_ENDIAN_ORDER || o == LITTLE_ENDIAN_ORDER);\r
++@@ -2946,6 +2951,11 @@ Integer::Integer(BufferedTransformation &encodedInteger, size_t byteCount, Signe
++ Decode(encodedInteger, byteCount, s);\r
++ }\r
++ \r
+++Integer::Integer(const byte *encodedInteger, size_t byteCount, Signedness s)\r
+++{\r
+++ Decode(encodedInteger, byteCount, s);\r
+++}\r
+++\r
++ Integer::Integer(const byte *encodedInteger, size_t byteCount, Signedness s, ByteOrder o)\r
++ {\r
++ assert(o == BIG_ENDIAN_ORDER || o == LITTLE_ENDIAN_ORDER);\r
++@@ -3104,7 +3114,7 @@ Integer::Integer(word value, size_t length)
++ }\r
++ \r
++ template <class T>\r
++-static Integer StringToInteger(const T *str, ByteOrder order)\r
+++static Integer StringToInteger(const T *str, ByteOrder order = BIG_ENDIAN_ORDER)\r
++ {\r
++ assert( order == BIG_ENDIAN_ORDER || order == LITTLE_ENDIAN_ORDER );\r
++ \r
++@@ -3238,12 +3248,24 @@ static Integer StringToInteger(const T *str, ByteOrder order)
++ return v;\r
++ }\r
++ \r
+++Integer::Integer(const char *str)\r
+++ : reg(2), sign(POSITIVE)\r
+++{\r
+++ *this = StringToInteger(str);\r
+++}\r
+++\r
++ Integer::Integer(const char *str, ByteOrder order)\r
++ : reg(2), sign(POSITIVE)\r
++ {\r
++ *this = StringToInteger(str,order);\r
++ }\r
++ \r
+++Integer::Integer(const wchar_t *str)\r
+++ : reg(2), sign(POSITIVE)\r
+++{\r
+++ *this = StringToInteger(str);\r
+++}\r
+++\r
++ Integer::Integer(const wchar_t *str, ByteOrder order)\r
++ : reg(2), sign(POSITIVE)\r
++ {\r
++diff --git a/integer.h b/integer.h
++index f289779..f5773bd 100644
++--- a/integer.h
+++++ b/integer.h
++@@ -120,7 +120,8 @@ public:
++ //! insensitive suffix of 'h', 'o', or 'b'. No suffix means base 10.\r
++ //! \details Byte order was added at Crypto++ 5.7 to allow use of little-endian\r
++ //! integers with curve25519, Poly1305 and Microsoft CAPI.\r
++- explicit Integer(const char *str, ByteOrder order = BIG_ENDIAN_ORDER);\r
+++ explicit Integer(const char *str);\r
+++ explicit Integer(const char *str, ByteOrder order);\r
++ \r
++ //! \brief Convert from a wide C-string\r
++ //! \param str wide C-string value\r
++@@ -129,7 +130,8 @@ public:
++ //! insensitive suffix of 'h', 'o', or 'b'. No suffix means base 10.\r
++ //! \details Byte order was added at Crypto++ 5.7 to allow use of little-endian\r
++ //! integers with curve25519, Poly1305 and Microsoft CAPI.\r
++- explicit Integer(const wchar_t *str, ByteOrder order = BIG_ENDIAN_ORDER);\r
+++ explicit Integer(const wchar_t *str);\r
+++ explicit Integer(const wchar_t *str, ByteOrder order);\r
++ \r
++ //! \brief Convert from a big-endian byte array\r
++ //! \param encodedInteger big-endian byte array\r
++@@ -138,7 +140,8 @@ public:
++ //! \param order byte order\r
++ //! \details Byte order was added at Crypto++ 5.7 to allow use of little-endian\r
++ //! integers with curve25519, Poly1305 and Microsoft CAPI.\r
++- Integer(const byte *encodedInteger, size_t byteCount, Signedness sign=UNSIGNED, ByteOrder order = BIG_ENDIAN_ORDER);\r
+++ Integer(const byte *encodedInteger, size_t byteCount, Signedness sign=UNSIGNED);\r
+++ Integer(const byte *encodedInteger, size_t byteCount, Signedness sign, ByteOrder order);\r
++ \r
++ //! \brief Convert from a big-endian array\r
++ //! \param bt BufferedTransformation object with big-endian byte array\r
++@@ -147,7 +150,8 @@ public:
++ //! \param order byte order\r
++ //! \details Byte order was added at Crypto++ 5.7 to allow use of little-endian\r
++ //! integers with curve25519, Poly1305 and Microsoft CAPI.\r
++- Integer(BufferedTransformation &bt, size_t byteCount, Signedness sign=UNSIGNED, ByteOrder order = BIG_ENDIAN_ORDER);\r
+++ Integer(BufferedTransformation &bt, size_t byteCount, Signedness sign=UNSIGNED);\r
+++ Integer(BufferedTransformation &bt, size_t byteCount, Signedness sign, ByteOrder order);\r
++ \r
++ //! \brief Convert from a BER encoded byte array\r
++ //! \param bt BufferedTransformation object with BER encoded byte array\r
--- /dev/null
--- /dev/null
++#doxygen-setup.diff
++#doxygen-main-link.diff
++#debian-config.diff
++#02-Work_around_issue_on_ARMEL_in_MultiplyTop_and_GCC.patch
++#03-Increase_range_for_GCC_workaround_on_ARMEL.patch
++Fix_potential_zeroizer_removal.patch
++Hurd-compile-fix.patch
++integer.diff
++CVE-2016-9939.patch
++Additional_ASN.1_validations.patch
++zinflate-564.diff
--- /dev/null
--- /dev/null
++Description: Add Inflator::BadDistanceErr exception
++ The improved validation and excpetion clears the Address Sanitizer and
++ Undefined Behavior Sanitizer findings
++Author: Jeffrey Walton <noloader@gmail.com>
++Origin: upstream, https://github.com/weidai11/cryptopp/commit/07dbcc3d9644b18e05c1776db2a57fe04d780965
++Bug: https://github.com/weidai11/cryptopp/issues/414
++Last-Update: 2017-06-05
++
++---
++
++--- libcrypto++-5.6.4.orig/zinflate.cpp
+++++ libcrypto++-5.6.4/zinflate.cpp
++@@ -550,12 +550,16 @@ bool Inflator::DecodeBody()
++ break;\r
++ }\r
++ case DISTANCE_BITS:\r
+++ if (m_distance >= sizeof(distanceExtraBits)/sizeof(distanceExtraBits[0]))\r
+++ throw BadDistanceErr();\r
++ bits = distanceExtraBits[m_distance];\r
++ if (!m_reader.FillBuffer(bits))\r
++ {\r
++ m_nextDecode = DISTANCE_BITS;\r
++ break;\r
++ }\r
+++ if (m_distance >= sizeof(distanceStarts)/sizeof(distanceStarts[0]))\r
+++ throw BadDistanceErr();\r
++ m_distance = m_reader.GetBits(bits) + distanceStarts[m_distance];\r
++ OutputPast(m_literal, m_distance);\r
++ }\r
++--- libcrypto++-5.6.4.orig/zinflate.h
+++++ libcrypto++-5.6.4/zinflate.h
++@@ -96,6 +96,7 @@ public:
++ };\r
++ class UnexpectedEndErr : public Err {public: UnexpectedEndErr() : Err(INVALID_DATA_FORMAT, "Inflator: unexpected end of compressed block") {}};\r
++ class BadBlockErr : public Err {public: BadBlockErr() : Err(INVALID_DATA_FORMAT, "Inflator: error in compressed block") {}};\r
+++ class BadDistanceErr : public Err {public: BadDistanceErr() : Err(INVALID_DATA_FORMAT, "Inflator: error in bit distance") {}};\r
++ \r
++ //! \brief RFC 1951 Decompressor\r
++ //! \param attachment the filter's attached transformation\r
--- /dev/null
--- /dev/null
++#!/usr/bin/make -f
++# -*- makefile -*-
++
++# Uncomment this to turn on verbose mode.
++#export DH_VERBOSE=1
++
++DEB_HOST_MULTIARCH ?= $(shell dpkg-architecture -qDEB_HOST_MULTIARCH)
++DOC_PKG_DIR = $(CURDIR)/debian/libcrypto++-doc/
++
++CXXFLAGS+=-DCRYPTOPP_INIT_PRIORITY=250 -DCRYPTOPP_NO_UNALIGNED_DATA_ACCESS \
++ -DNDEBUG
++
++override_dh_auto_clean:
++ dh_auto_clean
++ rm -f $(CURDIR)/libcrypto++.pc.in $(CURDIR)/config.log
++ rm -rf $(CURDIR)/html-docs/
++ # these will be re-generated
++ rm -f $(CURDIR)/debian/libcrypto++6.links \
++ $(CURDIR)/debian/libcrypto++-dev.links
++
++override_dh_auto_configure:
++ rm -f $(CURDIR)/GNUmakefile
++ cp -f $(CURDIR)/debian/autotools/configure.ac \
++ $(CURDIR)/debian/autotools/libcrypto++.pc.in \
++ $(CURDIR)/debian/autotools/Makefile.am \
++ $(CURDIR)
++ autoreconf --verbose --force --install
++ dh_auto_configure
++
++override_dh_auto_build-indep:
++ doxygen
++
++override_dh_auto_install:
++ # use automake
++ dh_auto_install
++ # install test files
++ mkdir -p $(CURDIR)/debian/tmp/usr/share/crypto--/
++ cp -a $(CURDIR)/TestVectors $(CURDIR)/debian/tmp/usr/share/crypto--/
++ chmod a-x $(CURDIR)/debian/tmp/usr/share/crypto--/TestVectors/*.txt
++ cp -a $(CURDIR)/TestData $(CURDIR)/debian/tmp/usr/share/crypto--/
++ # install pkg-config file
++ mkdir -p $(CURDIR)/debian/tmp/usr/lib/${DEB_HOST_MULTIARCH}/pkgconfig/
++ cp -a $(CURDIR)/*.pc \
++ $(CURDIR)/debian/tmp/usr/lib/${DEB_HOST_MULTIARCH}/pkgconfig/
++ # generate links files
++ sed s/ARCH/${DEB_HOST_MULTIARCH}/g \
++ $(CURDIR)/debian/libcrypto++6.links.in \
++ >$(CURDIR)/debian/libcrypto++6.links
++ sed s/ARCH/${DEB_HOST_MULTIARCH}/g \
++ $(CURDIR)/debian/libcrypto++-dev.links.in \
++ >$(CURDIR)/debian/libcrypto++-dev.links
++
++override_dh_strip:
++ dh_strip --dbg-package=libcrypto++6-dbg
++
++override_dh_auto_test-arch:
++ifeq (,$(filter nocheck,$(DEB_BUILD_OPTIONS)))
++ # Code to run the package test suite.
++ $(CURDIR)/cryptestcwd v
++endif
++
++override_dh_auto_test-indep:
++
++override_dh_installdocs:
++ dh_installdocs
++ if [ -d "$(DOC_PKG_DIR)/usr/share/doc/libcrypto++-doc/html-docs" ]; then \
++ mv $(DOC_PKG_DIR)/usr/share/doc/libcrypto++-doc/html-docs \
++ $(DOC_PKG_DIR)/usr/share/doc/libcrypto++-doc/html; \
++ fi
++
++%:
++ dh $@ --parallel
++
++.PHONY: override_dh_auto_clean override_dh_auto_configure \
++ override_dh_auto_build-indep override_dh_auto_install \
++ override_dh_strip override_dh_installdocs \
++ override_dh_auto_test-arch override_dh_auto_test-indep
--- /dev/null
--- /dev/null
++3.0 (quilt)
--- /dev/null
--- /dev/null
++version=3
++opts=uversionmangle=s/^(\d)_?(\d)_?(\d)$/$1.$2.$3/;s/^(\d)_?(\d)$/$1.$2/ \
++https://github.com/weidai11/cryptopp/releases .*/CRYPTOPP_(\d[\d_]+)\.(?:tar\.xz|txz|tar\.bz2|tbz2|tar\.gz|tgz|zip)