From: Laszlo Boszormenyi (GCS) Date: Tue, 29 Apr 2025 19:12:05 +0000 (+0200) Subject: libcrypto++ (8.9.0-2) unstable; urgency=high X-Git-Tag: archive/raspbian/8.9.0-2+rpi1^2~4 X-Git-Url: https://dgit.raspbian.org/?a=commitdiff_plain;h=ba8f95c020ffdee9a3dc182e14e5c73bd5086973;p=libcrypto%2B%2B.git libcrypto++ (8.9.0-2) unstable; urgency=high * Update gf2n documentation. * Fix CVE-2023-50980: denial of service (application crash) via DER public-key data (closes: #1059311). [dgit import unpatched libcrypto++ 8.9.0-2] --- ba8f95c020ffdee9a3dc182e14e5c73bd5086973 diff --cc debian/changelog index 0000000,0000000..6220d46 new file mode 100644 --- /dev/null +++ b/debian/changelog @@@ -1,0 -1,0 +1,764 @@@ ++libcrypto++ (8.9.0-2) unstable; urgency=high ++ ++ * Update gf2n documentation. ++ * Fix CVE-2023-50980: denial of service (application crash) via DER ++ public-key data (closes: #1059311). ++ ++ -- Laszlo Boszormenyi (GCS) Tue, 29 Apr 2025 21:12:05 +0200 ++ ++libcrypto++ (8.9.0-1.1) unstable; urgency=medium ++ ++ * Non-maintainer upload. ++ * Rename libraries for 64-bit time_t transition. Closes: #1062265 ++ ++ -- Benjamin Drung Wed, 28 Feb 2024 10:39:14 +0000 ++ ++libcrypto++ (8.9.0-1) unstable; urgency=medium ++ ++ * New upstream release. ++ ++ -- Laszlo Boszormenyi (GCS) Mon, 02 Oct 2023 17:51:51 +0200 ++ ++libcrypto++ (8.8.0-2) unstable; urgency=medium ++ ++ * Update watch file. ++ * Update Standards-Version to 4.6.2 . ++ ++ -- Laszlo Boszormenyi (GCS) Thu, 07 Sep 2023 07:25:20 +0000 ++ ++libcrypto++ (8.8.0-1) unstable; urgency=medium ++ ++ * New upstream release. ++ ++ [ Helmut Grohne ] ++ * Fix FTCBFS: Export build tools for all targets (closes: #1018923). ++ ++ ++ -- Laszlo Boszormenyi (GCS) Fri, 07 Jul 2023 17:20:07 +0200 ++ ++libcrypto++ (8.7.0+git220824-1) unstable; urgency=medium ++ ++ * New git snapshot release. ++ ++ -- Laszlo Boszormenyi (GCS) Thu, 25 Aug 2022 19:44:25 +0200 ++ ++libcrypto++ (8.7.0-1) unstable; urgency=medium ++ ++ * New upstream release (closes: #1012974). ++ * Add -fno-devirtualize to CXXFLAGS for GCC 12 not to remove code member ++ function needed for self-testing. ++ ++ -- Laszlo Boszormenyi (GCS) Sat, 13 Aug 2022 07:22:58 +0200 ++ ++libcrypto++ (8.6.0-3) unstable; urgency=medium ++ ++ * Fix armhf FTBFS (closes: #1001995). ++ ++ -- Laszlo Boszormenyi (GCS) Sat, 12 Feb 2022 10:39:14 +0100 ++ ++libcrypto++ (8.6.0-2) unstable; urgency=medium ++ ++ * Fix armel and armhf link breakage. ++ * Update Standards-Version to 4.6.0 . ++ ++ -- Laszlo Boszormenyi (GCS) Sat, 25 Sep 2021 19:44:37 +0200 ++ ++libcrypto++ (8.6.0-1) unstable; urgency=high ++ ++ * New upstream release. ++ * Fix CVE-2021-40530: ElGamal encryption using a work estimate to size ++ encryption exponents instead subgroup order (closes: #993841). ++ ++ -- Laszlo Boszormenyi (GCS) Sat, 25 Sep 2021 11:23:06 +0200 ++ ++libcrypto++ (8.5.0-1) unstable; urgency=medium ++ ++ * New upstream release. ++ ++ -- Laszlo Boszormenyi (GCS) Tue, 07 Sep 2021 22:41:51 +0200 ++ ++libcrypto++ (8.4.0-1) unstable; urgency=medium ++ ++ * New upstream release. ++ * Update patches. ++ ++ -- Laszlo Boszormenyi (GCS) Sat, 02 Jan 2021 08:22:09 +0100 ++ ++libcrypto++ (8.3.0-3) unstable; urgency=medium ++ ++ * Upload to Sid. ++ ++ -- Laszlo Boszormenyi (GCS) Fri, 25 Dec 2020 18:16:54 +0100 ++ ++libcrypto++ (8.3.0-2) experimental; urgency=medium ++ ++ * Backport upstream fix for SIGILL on PowerPC. ++ ++ -- Laszlo Boszormenyi (GCS) Tue, 22 Dec 2020 20:38:25 +0100 ++ ++libcrypto++ (8.3.0-1) experimental; urgency=medium ++ ++ * New upstream release. ++ * Update debhelper level to 13 . ++ * Update Standards-Version to 4.5.1 . ++ ++ -- Laszlo Boszormenyi (GCS) Sun, 20 Dec 2020 17:35:29 +0100 ++ ++libcrypto++ (8.2.0-2) experimental; urgency=medium ++ ++ * Fix CVE-2019-14318: timing side channel in ECDSA signature generation ++ (closes: #934326). ++ ++ -- Laszlo Boszormenyi (GCS) Sun, 11 Aug 2019 16:57:18 +0000 ++ ++libcrypto++ (8.2.0-1) experimental; urgency=medium ++ ++ * New upstream release. ++ ++ -- Laszlo Boszormenyi (GCS) Mon, 29 Apr 2019 17:00:27 +0000 ++ ++libcrypto++ (8.1.0-2) experimental; urgency=medium ++ ++ * Backport upstream fix of remove early NEON qualification tests. ++ ++ -- Laszlo Boszormenyi (GCS) Sat, 02 Mar 2019 20:11:43 +0000 ++ ++libcrypto++ (8.1.0-1) experimental; urgency=medium ++ ++ * New upstream release. ++ ++ -- Laszlo Boszormenyi (GCS) Wed, 27 Feb 2019 00:39:55 +0000 ++ ++libcrypto++ (8.0.0-1) experimental; urgency=medium ++ ++ * New upstream release. ++ * Use upstream build system. ++ * Library transition to version 8 of soname. ++ * Update Standards-Version to 4.3.0 . ++ ++ -- Laszlo Boszormenyi (GCS) Fri, 28 Dec 2018 12:18:20 +0000 ++ ++libcrypto++ (7.0.0-1) experimental; urgency=medium ++ ++ * New upstream release. ++ * Library transition to version 2 of soname. ++ ++ -- Laszlo Boszormenyi (GCS) Sun, 08 Apr 2018 12:04:05 +0000 ++ ++libcrypto++ (6.1.0-2) experimental; urgency=medium ++ ++ * Update library compatibility symlink (closes: #891662). ++ * Remove debug_info from libcrypto++.a library (closes: #880637). ++ * Make the package multiarch (closes: #879822). ++ ++ -- Laszlo Boszormenyi (GCS) Tue, 27 Feb 2018 21:31:37 +0000 ++ ++libcrypto++ (6.1.0-1) experimental; urgency=medium ++ ++ * New upstream release. ++ * Library transition to version 1 of soname. ++ * Update debhelper level to 11 . ++ * Update Standards-Version to 4.1.3: ++ - remove libcrypto++6-dbg package and use the auto-generated one. ++ ++ -- Laszlo Boszormenyi (GCS) Thu, 22 Feb 2018 16:51:10 +0000 ++ ++libcrypto++ (5.6.4-8) unstable; urgency=medium ++ ++ * Install all headers (closes: #866100). ++ * Update watch file (closes: #862876). ++ * Update Standards-Version to 4.0.0 and debhelper level to 10 . ++ ++ -- Laszlo Boszormenyi (GCS) Tue, 27 Jun 2017 19:04:20 +0000 ++ ++libcrypto++ (5.6.4-7) unstable; urgency=high ++ ++ * Backport security fix for out-of-bounds read in zinflate. ++ ++ -- Laszlo Boszormenyi (GCS) Mon, 05 Jun 2017 06:55:28 +0000 ++ ++libcrypto++ (5.6.4-6) unstable; urgency=medium ++ ++ * Backport additional ASN.1 validations. ++ ++ -- Laszlo Boszormenyi (GCS) Sun, 25 Dec 2016 08:46:52 +0000 ++ ++libcrypto++ (5.6.4-5) unstable; urgency=high ++ ++ * Fix CVE-2016-9939: possible DoS in ASN.1 decoders (closes: #848009). ++ ++ -- Laszlo Boszormenyi (GCS) Fri, 23 Dec 2016 20:54:36 +0000 ++ ++libcrypto++ (5.6.4-4) unstable; urgency=medium ++ ++ * Apply upstream fix for Integer class ABI break (closes: #845460). ++ ++ -- Laszlo Boszormenyi (GCS) Fri, 02 Dec 2016 17:00:47 +0000 ++ ++libcrypto++ (5.6.4-3) unstable; urgency=medium ++ ++ * Backport upstream fix for potential zeroizer removal. ++ * Backport upstream fix for Hurd build. ++ ++ -- Laszlo Boszormenyi (GCS) Tue, 01 Nov 2016 11:27:35 +0000 ++ ++libcrypto++ (5.6.4-2) unstable; urgency=low ++ ++ * Add missed headers to libcrypto++-dev (closes: #841443). ++ ++ -- Laszlo Boszormenyi (GCS) Sun, 23 Oct 2016 16:46:44 +0200 ++ ++libcrypto++ (5.6.4-1) unstable; urgency=low ++ ++ * New upstream release. ++ * Remove cryptest-data-files-location.diff as applied upstream. ++ * Remove backported patches as this release contains those. ++ ++ -- Laszlo Boszormenyi (GCS) Sat, 08 Oct 2016 16:27:30 +0000 ++ ++libcrypto++ (5.6.3-8) unstable; urgency=high ++ ++ * Fix CVE-2016-7420 with compiling -DNDEBUG to prevent sensitive information ++ leakage to core dumps when an assert() happens. ++ ++ -- Laszlo Boszormenyi (GCS) Fri, 16 Sep 2016 15:42:32 +0000 ++ ++libcrypto++ (5.6.3-7) unstable; urgency=low ++ ++ * Prevent binary testing when only architecture independent packages are ++ built (closes: #821176). ++ ++ -- Laszlo Boszormenyi (GCS) Fri, 15 Jul 2016 20:11:19 +0000 ++ ++libcrypto++ (5.6.3-6) unstable; urgency=high ++ ++ * Backport last bit of CVE-2016-3995 fix, the Rijndael timing attack ++ counter measure. ++ ++ -- Laszlo Boszormenyi (GCS) Wed, 13 Apr 2016 16:40:13 +0000 ++ ++libcrypto++ (5.6.3-5) unstable; urgency=medium ++ ++ * Fix the Rijndael timing attack counter measure. ++ * Fix FTBFS on M68k machines. ++ * Update Standards-Version to 3.9.8 . ++ ++ -- Laszlo Boszormenyi (GCS) Sun, 10 Apr 2016 09:14:31 +0000 ++ ++libcrypto++ (5.6.3-4) unstable; urgency=low ++ ++ * Start the transition with upload to Sid. ++ * Builds on x32 (closes: #813659). ++ * Update Standards-Version to 3.9.7 . ++ ++ -- Laszlo Boszormenyi (GCS) Sun, 03 Apr 2016 11:33:16 +0000 ++ ++libcrypto++ (5.6.3-3) experimental; urgency=low ++ ++ * Backport upstream fixes: ++ - fixed hang on ARM platforms in Integer::DivideThreeWordsByTwo, ++ - work around issue on ARMEL in MultiplyTop and GCC, ++ - increase range for GCC workaround on ARMEL, ++ - fixed SecBlock append. ++ ++ -- Laszlo Boszormenyi (GCS) Sat, 09 Jan 2016 09:15:35 +0100 ++ ++libcrypto++ (5.6.3-2) experimental; urgency=low ++ ++ * Only fix -doc package HTML path if it's built. ++ ++ -- Laszlo Boszormenyi (GCS) Sat, 21 Nov 2015 13:27:54 +0100 ++ ++libcrypto++ (5.6.3-1) experimental; urgency=low ++ ++ * New major upstream release (closes: #739157). ++ * Keep rebuildable. ++ ++ -- Laszlo Boszormenyi (GCS) Sat, 21 Nov 2015 09:25:03 +0100 ++ ++libcrypto++ (5.6.3~rc6-1) experimental; urgency=low ++ ++ * New major upstream release candidate version. ++ * Add CRYPTOPP_NO_UNALIGNED_DATA_ACCESS preprocessor flag to CXXFLAGS . ++ * Add rdrand.cpp to library sources to compile. ++ ++ -- Laszlo Boszormenyi (GCS) Thu, 29 Oct 2015 19:44:06 +0100 ++ ++libcrypto++ (5.6.3~rc4-1) experimental; urgency=low ++ ++ * New major upstream release candidate version. ++ ++ -- Laszlo Boszormenyi (GCS) Mon, 21 Sep 2015 20:10:14 +0200 ++ ++libcrypto++ (5.6.3~rc3-1) experimental; urgency=low ++ ++ * New major upstream release candidate version. ++ ++ -- Laszlo Boszormenyi (GCS) Wed, 16 Sep 2015 19:47:57 +0200 ++ ++libcrypto++ (5.6.3~rc2-2) experimental; urgency=low ++ ++ * Make co-installable with older versions. ++ * Run doxygen only in the indep target. ++ ++ -- Laszlo Boszormenyi (GCS) Mon, 14 Sep 2015 20:06:20 +0200 ++ ++libcrypto++ (5.6.3~rc2-1) experimental; urgency=low ++ ++ * New major upstream release release candidate version. ++ * ABI transition from libcrypto++9v5 to libcrypto++6 . ++ * Rewrite packaging and copyright. ++ * Build with CRYPTOPP_INIT_PRIORITY=250 . ++ * Symlink jquery.js to the packaged one. ++ * Add watch file. ++ ++ -- Laszlo Boszormenyi (GCS) Sun, 13 Sep 2015 15:55:30 +0200 ++ ++libcrypto++ (5.6.1-9) unstable; urgency=low ++ ++ * Compile integer.cpp with -O1 on armel to prevent FTBFS (closes: #796297). ++ ++ -- Laszlo Boszormenyi (GCS) Sat, 12 Sep 2015 10:17:29 +0200 ++ ++libcrypto++ (5.6.1-8) unstable; urgency=medium ++ ++ * Rename library to libcrypto++9v5 and the debug one to libcrypto++9-dbg ++ for GCC 5 transition. ++ ++ -- Laszlo Boszormenyi (GCS) Wed, 12 Aug 2015 18:43:04 +0200 ++ ++libcrypto++ (5.6.1-7) unstable; urgency=high ++ ++ * Fix CVE-2015-2141. ++ * Update Standards-Version to 3.9.6 and debhelper level to 9 . ++ ++ -- Laszlo Boszormenyi (GCS) Sun, 28 Jun 2015 12:34:20 +0000 ++ ++libcrypto++ (5.6.1-6) unstable; urgency=low ++ ++ * Fix build failure with gcc-4.7 (closes: #668700) by adding missing 'this' ++ references. Thanks to Matthias Klose . ++ * Update packaging bits. ++ ++ -- Laszlo Boszormenyi (GCS) Sat, 14 Apr 2012 20:21:41 +0200 ++ ++libcrypto++ (5.6.1-5) unstable; urgency=low ++ ++ * New maintainer (closes: #628935). ++ * salsa.patch from upstream to fix testcase FTBFS (closes: #628298). ++ ++ -- Laszlo Boszormenyi (GCS) Sat, 04 Jun 2011 20:15:34 +0200 ++ ++libcrypto++ (5.6.1-4) unstable; urgency=low ++ ++ * Fix Pananma so that it works on armel, thanks to Wei Dai. ++ (Closes: #619856) ++ ++ -- Jens Peter Secher Mon, 25 Apr 2011 21:13:50 +0200 ++ ++libcrypto++ (5.6.1-3) unstable; urgency=low ++ ++ * Make debug packages conflict with each other because they all include ++ usr/bin/cryptest. ++ (Closes: #619527) ++ * Removed obsolete README.source now that the package is in dpkg format ++ 3.0 (quilt). ++ ++ -- Jens Peter Secher Sun, 27 Mar 2011 23:56:51 +0200 ++ ++libcrypto++ (5.6.1-2) unstable; urgency=low ++ ++ * Build for Wheezy, no change. ++ (Closes: #599639) ++ ++ -- Jens Peter Secher Tue, 22 Mar 2011 04:51:04 +0100 ++ ++libcrypto++ (5.6.1-1) experimental; urgency=low ++ ++ * New release, which changes the API of the library, so bumping the SO ++ version to 9. ++ * Patch for sha256 assembly is now included upstream. ++ * Bumped Standards-Version to 3.9.1, no change. ++ ++ -- Jens Peter Secher Tue, 10 Aug 2010 21:26:54 +0200 ++ ++libcrypto++ (5.6.0-6) unstable; urgency=low ++ ++ * Fix sha256 assembly problem with signed address comparison, thanks to ++ Ken Raeburn. ++ (Closes: #585930) ++ * Converted to dpkg-source format 3.0 (quilt). ++ * Use mercurial-buildpackage for repository maintenance, so old ++ repository does not exist any more. ++ * Bumped Standards-Version to 3.8.4, no change. ++ * Use misc:Depends debhelper macro for all packages. ++ * Introduced a realclean target in debian/rules for cleaning up an ++ interrupted build. ++ * Build-depend on a proper quilt-handling version of dpkg-source instead ++ of quilt itself. ++ ++ -- Jens Peter Secher Wed, 16 Jun 2010 23:50:50 +0200 ++ ++libcrypto++ (5.6.0-5) unstable; urgency=low ++ ++ * Fix build failure on Hurd by using POSIX threads, thanks to Samuel ++ Thibault. ++ (Closes: #550786) ++ ++ -- Jens Peter Secher Fri, 16 Oct 2009 20:06:13 +0200 ++ ++libcrypto++ (5.6.0-4) unstable; urgency=low ++ ++ * Inlcude missing testvector for AES, thanks to Nelson A. de Oliveira. ++ (Closes: #549150) ++ * Do not include .la file per request from Kartik Mistry. ++ ++ -- Jens Peter Secher Thu, 01 Oct 2009 22:08:44 +0200 ++ ++libcrypto++ (5.6.0-3) unstable; urgency=low ++ ++ * Depend on generic automake package (at the time of writing version 11). ++ (Closes: #543028) ++ * Update the various package descriptions. ++ (Closes: #531814) ++ * Upgrate to debhelper version 7, using dh_prep instead of dh_clean -k. ++ * Updated Standards-Version to 3.8.3, but retaining GNU style variables ++ because they are passed to automake scripts. Also correct ++ "hppa-linux" to "hppa-linux-gnu". ++ ++ -- Jens Peter Secher Sat, 22 Aug 2009 19:55:04 +0200 ++ ++libcrypto++ (5.6.0-2) unstable; urgency=low ++ ++ * Added a package with debug symbols. ++ * Drop the DCRYPTOPP_DISABLE_ASM flag to avoid segfault in amule on ++ i386. ++ (Closes: #525071) ++ ++ -- Jens Peter Secher Tue, 28 Apr 2009 23:23:21 +0200 ++ ++libcrypto++ (5.6.0-1) unstable; urgency=low ++ ++ * New upstream version. ++ + Includes incompatible changes, so bumping the shared library number to 8 ++ (libtool version info 8:0:0). ++ + The test data is now in its own directory, so this TestData directory ++ is handled in debian/rules the same way that TestVectors is. ++ * Link with pthread to avoid warning from dpkg-shlibdeps. ++ * Avoid running the test suite twice by giving it its own target: check. ++ ++ -- Jens Peter Secher Tue, 07 Apr 2009 02:52:06 +0200 ++ ++libcrypto++ (5.5.2-3) unstable; urgency=low ++ ++ * Use quilt instead of dpatch for patches, and describe how to use ++ quilt in Debian.source (thanks to Russ Allbery). ++ * Added a Vcs-Hg control filed to indicate the location of the public ++ repository. ++ * Bumped Standards-Version to 3.8.1. ++ ++ -- Jens Peter Secher Tue, 07 Apr 2009 00:51:49 +0200 ++ ++libcrypto++ (5.5.2-2) unstable; urgency=low ++ ++ * Produce a pkg-config file for the development package. ++ (Closes: #473090) ++ * Use doc-bas section Programming. ++ ++ -- Jens Peter Secher Sat, 29 Mar 2008 17:37:32 +0100 ++ ++libcrypto++ (5.5.2-1) unstable; urgency=low ++ ++ * New upstream version. ++ * Increased SONAME from 6 to 7 because of API changes. ++ * Fixed GCC 4.3 header include problem. ++ (Closes: #455627) ++ * Created symlinks from libcryptopp* to libcrypto++*, as requested in ++ bug #448766. ++ * Bumped debhelper version to 5. ++ * Bumped Standards-Version to 3.7.3. ++ ++ -- Jens Peter Secher Tue, 11 Dec 2007 19:06:15 +0100 ++ ++libcrypto++ (5.5-5) unstable; urgency=low ++ ++ * Create a symlink to /usr/include/cryptopp -> crypto++ to aid ++ portability of client code. ++ (Closes: #448766) ++ * Bumped automake to 1.10 instead of 1.9 . ++ ++ -- Jens Peter Secher Sun, 11 Nov 2007 21:51:53 +0100 ++ ++libcrypto++ (5.5-4) unstable; urgency=low ++ ++ * Use POSIX threads on GNU/kFreeBSD, thanks to Petr Salinger. ++ (Closes: #433672) ++ ++ -- Jens Peter Secher Sun, 19 Aug 2007 10:02:37 +0200 ++ ++libcrypto++ (5.5-3) unstable; urgency=high ++ ++ * Do not compile with -msse2 to avoid crash on Pentium II, thanks ++ to Adeodato Simó. Hence the high urgency. ++ (Closes: #428150) ++ * Use ${binary:Version} instead of ${Source-Version} to facilitate ++ binNMU. ++ * Do not ignore 'make clean' errors. ++ ++ -- Jens Peter Secher Sat, 30 Jun 2007 16:39:14 +0200 ++ ++libcrypto++ (5.5-2) unstable; urgency=low ++ ++ * Use CURDIR throughout debian/rules to avoid buildd failures. ++ ++ -- Jens Peter Secher Tue, 29 May 2007 20:29:08 +0200 ++ ++libcrypto++ (5.5-1) unstable; urgency=low ++ ++ * New upstream release. ++ * Bumped SO name to 6.0.0 because of new namespaces and removed algorithms. ++ * Updated man page and build scripts. ++ * Only use header files to generate documentation because Doxygen ++ otherwise chokes. ++ ++ -- Jens Peter Secher Sat, 12 May 2007 12:50:30 +0200 ++ ++libcrypto++ (5.4-1) experimental; urgency=low ++ ++ * New upstream release. ++ * Removed all patches that have now been included upstream. ++ * Now that things are stable with both Crypto++ and GCC, the shared ++ library has a proper SO name. ++ ++ -- Jens Peter Secher Fri, 15 Dec 2006 23:32:46 +0100 ++ ++libcrypto++ (5.2.1c2a-3) unstable; urgency=low ++ ++ * Patch source so that it compiles with GCC 4.1 . More specifically, ++ avoid mixing implicit calls to base classes and free-standing ++ functions. ++ (Closes: #356170) ++ * Use LDFLAGS=-pthread to fix linking errors. ++ ++ -- Jens Peter Secher Thu, 16 Mar 2006 23:08:48 +0100 ++ ++libcrypto++ (5.2.1c2a-2) unstable; urgency=low ++ ++ * Build-depend on a version of g++ that fixes PR c++/21123 which ++ resulted in internal compiler errors on m68k, arm, and hppa ++ (Closes: #343003) ++ * Include an override to stop Lintian complaining about the name of the ++ shared library. ++ * Removed link in main headline of Doxygen generated documentaion since ++ Doxygen insists on escaping it. ++ ++ -- Jens Peter Secher Tue, 13 Dec 2005 20:40:25 +0100 ++ ++libcrypto++ (5.2.1c2a-1) unstable; urgency=low ++ ++ * Rebuild and name change due to libstdc++6 mt-allocator transition. ++ (Closes: #339201) ++ ++ -- Jens Peter Secher Sat, 19 Nov 2005 23:56:27 +0100 ++ ++libcrypto++ (5.2.1c2-8) unstable; urgency=low ++ ++ * Force autoreconf to use automake1.9 so that it is possible to have ++ several automake versions installed. ++ ++ -- Jens Peter Secher Sat, 1 Oct 2005 16:11:18 +0200 ++ ++libcrypto++ (5.2.1c2-7) unstable; urgency=low ++ ++ * Use the upstream-provided way of doing manual template instantiation ++ on architectures where it is necessary to use GCC3.4. ++ ++ -- Jens Peter Secher Mon, 26 Sep 2005 19:08:30 +0200 ++ ++libcrypto++ (5.2.1c2-6) unstable; urgency=low ++ ++ * Circumvent GCC4 internal compiler error on m68k, arm, and hppa by ++ using GCC3.4 on those architectures, thanks to Adeodato Simó. ++ (Closes: #328975) ++ ++ -- Jens Peter Secher Tue, 20 Sep 2005 20:46:29 +0200 ++ ++libcrypto++ (5.2.1c2-5) unstable; urgency=low ++ ++ * Fixed the debian/rules so that the binary-arch target can be built in ++ isolation. ++ (Closes: #323161) ++ * Added a doc-base file for the libcrypto++-doc package. ++ ++ -- Jens Peter Secher Mon, 15 Aug 2005 22:18:05 +0200 ++ ++libcrypto++ (5.2.1c2-4) unstable; urgency=low ++ ++ * Really take care of endianess this time by letting config.status ++ manipulate config.h . ++ * Split the documentation into a libcrypto++-doc package. ++ ++ -- Jens Peter Secher Wed, 10 Aug 2005 23:47:51 +0200 ++ ++libcrypto++ (5.2.1c2-3) unstable; urgency=low ++ ++ * Take care of architecture endianess by using AC_C_BIGENDIAN in ++ configure.ac . Should fix building for s390 and mipsel. ++ ++ -- Jens Peter Secher Mon, 8 Aug 2005 21:25:50 +0200 ++ ++libcrypto++ (5.2.1c2-2) unstable; urgency=low ++ ++ * Stopped including autotools generated scripts, and instead ++ build-depends on automaken to avoid strange problems with libtool that ++ causes problems for the build daemons. ++ * Fix cryptest so that it always can find its data files, and put it in ++ the libcrypto++-utils package again. ++ ++ -- Jens Peter Secher Sat, 6 Aug 2005 16:34:56 +0200 ++ ++libcrypto++ (5.2.1c2-1) unstable; urgency=low ++ ++ * New maintainer. ++ (Closes: #288433) ++ * Complete re-autotoolising of the package to retain pristine upstream ++ source and to only build-depend on libtool. ++ * The crypto++-util package has been merged into the crypto++-dev ++ package and is thus dead. ++ * Applied patches from Ben Hutchings to avoid compile warnings ++ (Closes: #286114) ++ * Circumvented anonymous-enum and template-instantiations problems with ++ GCC 4. Thanks to Florian Weimer and Jozef Matula for guiding me in ++ the right direction. ++ (Closes: #318518) ++ * Started using dpatch since some of the above patches probably could ++ make it upstream. ++ ++ -- Jens Peter Secher Sun, 31 Jul 2005 02:07:29 +0200 ++ ++libcrypto++ (5.2.1a-1) unstable; urgency=high ++ ++ * Urgency set to high because lastest upload was unclean ++ * Rename libcrypto++-5.2.1.orig.tar.gz in libcrypto++-5.2.1a.orig.tar.gz ++ ++ -- Pierre Machard Fri, 27 Aug 2004 12:35:05 +0200 ++ ++libcrypto++ (5.2.1-2) unstable; urgency=high ++ ++ * Added TestVectors to example dir ++ * Add symlink from cryptopp_config.h to config.h (closes: #244980) ++ * Hack configure.in to fit with new upstream version. This hack is ++ far from being complete and quite uggly. ++ * Update manpage ++ * Automaticaly update config.{sub,guess} ++ ++ -- Pierre Machard Sat, 21 Aug 2004 08:59:37 +0200 ++ ++libcrypto++ (5.2.1-1) unstable; urgency=high ++ ++ * Adding myself as package uploaders ++ * Urgency set to high because of #244892 ++ * New upstream release (closes: #244892, #247922, #245921, #261074) ++ ++ -- Pierre Machard Fri, 20 Aug 2004 05:22:28 +0200 ++ ++libcrypto++ (5.1-5) unstable; urgency=low ++ ++ * Remove the final arch specific (rather than feature specifc) tests in ++ crypto_config.h, ++ Closes: #238220 ++ * Add symlinks libcrypto++.{a,la,so} pointing to ++ libcrypto++5.1.{a,la,so} so that users can act like the ABI of this ++ library doesn't change with every major release, ++ Closes: #241148 ++ ++ -- Stephen Zander Mon, 19 Apr 2004 18:10:28 -0700 ++ ++libcrypto++ (5.1-4) unstable; urgency=low ++ ++ * Build with -fno-strict-aliasing. This should fix the segfaults on ++ non-i386 architectures. ++ * Add -ffunction-sections for hppa build, ++ Closes: #238220 ++ ++ -- Stephen Zander Fri, 19 Mar 2004 02:06:08 -0800 ++ ++libcrypto++ (5.1-3) unstable; urgency=low ++ ++ * Move datatest.cpp from libcrypto++5.1.so to the cryptest source to ++ really fix the GlobalRNG bug, ++ Closes: #236539 ++ ++ -- Stephen Zander Sun, 14 Mar 2004 20:23:16 -0800 ++ ++libcrypto++ (5.1-2) unstable; urgency=low ++ ++ * Remove validate.h from the libcrypto++5.1.so headers; it should only ++ be used by cryptest, ++ Closes: #236539 ++ * Include test.cpp as an example of how to invoke the various Crypto++ ++ routines, ++ Closes: #236844 ++ * Allow cryptest to look for validation files in the current directory ++ as well as /usr/share/crypto++, ++ Closes: #236968 ++ ++ -- Stephen Zander Sat, 13 Mar 2004 00:59:54 -0800 ++ ++libcrypto++ (5.1-1) unstable; urgency=low ++ ++ * Drop the gcc-3.2 dependency as gcc-3.2 should be everywhere by now. This ++ also fixes the build failure on ARM. ++ * Rename the library from libcrypto++.so.5 to libcrypto++5.1.so.0 as ++ upstream does not maintain binary compatibility and having the 5.1 ++ package provide libcrypto++.so.6 strikes me as too confusing. ++ * New upstream version, ++ Closes: #213953 ++ * Include full paths to data files used by the cryptest validation ++ routines, ++ Closes: #198696 ++ * Add MD4 to the output of 'cryptest b' and segregate the hashing ++ algorithms from the encryption algorithms, ++ Closes: #198698 ++ * Include Doxygen generated documents in the libcrypto++-dev package, ++ Closes: #211725 ++ ++ -- Stephen Zander Tue, 17 Feb 2004 12:41:29 -0800 ++ ++libcrypto++ (5.0-3) unstable; urgency=low ++ ++ * Add generic 64bit arch support, rather than hard-coded alpha supoprt, ++ Closes: #181457 ++ ++ -- Stephen Zander Sat, 15 Mar 2003 17:47:27 -0800 ++ ++libcrypto++ (5.0-2) unstable; urgency=low ++ ++ * Convert the gcc-3.2 build depends to a g++-3.2, they way it should be ++ Closes: #175085 ++ * Clean up cryptlib.h slightly so it's not so noisy under -Wall, ++ Closes: #175180 ++ ++ -- Stephen Zander Tue, 7 Jan 2003 01:24:07 -0800 ++ ++libcrypto++ (5.0-1) unstable; urgency=low ++ ++ * Package moved to main. ++ * New upstream version, ++ Closes: #174217 ++ * All files now have appropriate copyright entries and debian/copyright ++ accurately reflects the contents of this package, ++ Closes: #153926 ++ * cryptest now successfully runs to completion, ++ Closes: #153929 ++ * Fix a typo in the cryptest manpage, ++ Closes: #153932 ++ ++ -- Stephen Zander Fri, 27 Dec 2002 11:23:06 -0800 ++ ++libcrypto++ (4.2-1) unstable; urgency=low ++ ++ * New package, ++ Closes: #79131 ++ ++ -- Stephen Zander Fri, 5 Jul 2002 09:45:26 -0700 diff --cc debian/clean index 0000000,0000000..d87bc97 new file mode 100644 --- /dev/null +++ b/debian/clean @@@ -1,0 -1,0 +1,19 @@@ ++Makefile.am ++Makefile.in ++aclocal.m4 ++compile ++config.guess ++config.sub ++config.status ++configure ++configure.ac ++depcomp ++install-sh ++local.h.in ++ltmain.sh ++m4/libtool.m4 ++m4/ltoptions.m4 ++m4/ltsugar.m4 ++m4/ltversion.m4 ++m4/lt~obsolete.m4 ++missing diff --cc debian/control index 0000000,0000000..bfc0f9a new file mode 100644 --- /dev/null +++ b/debian/control @@@ -1,0 -1,0 +1,135 @@@ ++Source: libcrypto++ ++Section: libs ++Priority: optional ++Maintainer: Laszlo Boszormenyi (GCS) ++Standards-Version: 4.6.2 ++Build-Depends: dpkg-dev (>= 1.22.5), debhelper-compat (= 13), automake, autoconf, libtool ++Build-Depends-Indep: doxygen ++Homepage: https://www.cryptopp.com ++Rules-Requires-Root: no ++ ++Package: libcrypto++8t64 ++Provides: ${t64:Provides} ++Replaces: libcrypto++8 ++Breaks: libcrypto++8 (<< ${source:Version}) ++Architecture: any ++Multi-Arch: same ++Section: libs ++Depends: ${shlibs:Depends}, ${misc:Depends} ++Description: General purpose cryptographic library - shared library ++ General purpose cryptographic library for C++. ++ . ++ This package contains the shared libraries and should only be ++ installed if other packages depend on it. ++ ++Package: libcrypto++-dev ++Architecture: any ++Multi-Arch: same ++Section: libdevel ++Depends: libcrypto++8t64 (= ${binary:Version}), ${misc:Depends} ++Description: General purpose cryptographic library - C++ development ++ Crypto++ is library for creating C++ programs which use cryptographic ++ algorithms. The library uses a Pipes & Filters architecture with heavy ++ use of templates and abstract base classes. The cryptographic ++ tools include: ++ * Authenticated encryption schemes (GCM, CCM, EAX), ++ * High speed stream ciphers (Panama, Sosemanuk, Salsa20, XSalsa20), ++ * AES and candidates (Rijndael, RC6, MARS, Twofish, Serpent, CAST-256), ++ * Other symmetric block ciphers (IDEA, Triple-DES, Camellia, SEED, ++ RC5, Blowfish, TEA, XTEA, Skipjack, SHACAL-2), ++ * Block cipher modes of operation (ECB, CBC, CTS, CFB, OFB, CTR), ++ * Message authentication codes (VMAC, HMAC, CMAC, CBC-MAC, DMAC, ++ Two-Track-MAC), ++ * Hash functions (SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, Tiger, ++ WHIRLPOOL, RIPEMD-128, RIPEMD-256, RIPEMD-160, RIPEMD-320), ++ * Public-key cryptography (RSA, DSA, ElGamal, NR, RW, LUC, LUCELG, ++ DLIES, ESIGN), ++ * Padding schemes for public-key systems (PKCS#1, OAEP, PSS, PSSR, ++ EMSA2, EMSA5), ++ * Key agreement schemes (DH, MQV, LUCDIF, XTR-DH), ++ * Elliptic curve cryptography (ECDSA, ECNR, ECIES, ECDH, ECMQV), ++ * Backwards compatibility algorithms (MD2, MD4, MD5, Panama Hash, DES, ++ ARC4, SEAL 3.0, WAKE, WAKE-OFB, DESX, RC2, SAFER, 3-WAY, GOST, ++ SHARK, CAST-128, Square), ++ * Pseudo-random number generators, ++ and a whole lot more. Alternative libraries are libgcrypt and ++ nettle. ++ . ++ This package contains the header files needed for developing using ++ the Crypto++ class library and the static library with libtool ++ supoport. ++ ++Package: libcrypto++-utils ++Architecture: any ++Section: utils ++Depends: ${shlibs:Depends}, ${misc:Depends} ++Conflicts: libcrypto++-dev (= 5.2.1c2-1) ++Description: General purpose cryptographic library - utilities and data files ++ Crypto++ is library for creating C++ programs which use cryptographic ++ algorithms. The library uses a Pipes & Filters architecture with heavy ++ use of templates and abstract base classes. The cryptographic ++ tools include: ++ * Authenticated encryption schemes (GCM, CCM, EAX), ++ * High speed stream ciphers (Panama, Sosemanuk, Salsa20, XSalsa20), ++ * AES and candidates (Rijndael, RC6, MARS, Twofish, Serpent, CAST-256), ++ * Other symmetric block ciphers (IDEA, Triple-DES, Camellia, SEED, ++ RC5, Blowfish, TEA, XTEA, Skipjack, SHACAL-2), ++ * Block cipher modes of operation (ECB, CBC, CTS, CFB, OFB, CTR), ++ * Message authentication codes (VMAC, HMAC, CMAC, CBC-MAC, DMAC, ++ Two-Track-MAC), ++ * Hash functions (SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, Tiger, ++ WHIRLPOOL, RIPEMD-128, RIPEMD-256, RIPEMD-160, RIPEMD-320), ++ * Public-key cryptography (RSA, DSA, ElGamal, NR, RW, LUC, LUCELG, ++ DLIES, ESIGN), ++ * Padding schemes for public-key systems (PKCS#1, OAEP, PSS, PSSR, ++ EMSA2, EMSA5), ++ * Key agreement schemes (DH, MQV, LUCDIF, XTR-DH), ++ * Elliptic curve cryptography (ECDSA, ECNR, ECIES, ECDH, ECMQV), ++ * Backwards compatibility algorithms (MD2, MD4, MD5, Panama Hash, DES, ++ ARC4, SEAL 3.0, WAKE, WAKE-OFB, DESX, RC2, SAFER, 3-WAY, GOST, ++ SHARK, CAST-128, Square), ++ * Pseudo-random number generators, ++ and a whole lot more. Alternative libraries are libgcrypt and ++ nettle. ++ . ++ This package includes a utility for benchmarking and using the ++ various Crypto++ routines from the command line. It also includes ++ the test vectors for validating both the Crypto++ implementation and ++ other implementations of these routines. ++ ++Package: libcrypto++-doc ++Architecture: all ++Multi-Arch: foreign ++Section: doc ++Depends: ${misc:Depends}, libjs-jquery ++Conflicts: libcrypto++-dev (<= 5.2.1c2-3) ++Enhances: libcrypto++-dev ++Description: General purpose cryptographic library - documentation ++ Crypto++ is library for creating C++ programs which use cryptographic ++ algorithms. The library uses a Pipes & Filters architecture with heavy ++ use of templates and abstract base classes. The cryptographic ++ tools include: ++ * Authenticated encryption schemes (GCM, CCM, EAX), ++ * High speed stream ciphers (Panama, Sosemanuk, Salsa20, XSalsa20), ++ * AES and candidates (Rijndael, RC6, MARS, Twofish, Serpent, CAST-256), ++ * Other symmetric block ciphers (IDEA, Triple-DES, Camellia, SEED, ++ RC5, Blowfish, TEA, XTEA, Skipjack, SHACAL-2), ++ * Block cipher modes of operation (ECB, CBC, CTS, CFB, OFB, CTR), ++ * Message authentication codes (VMAC, HMAC, CMAC, CBC-MAC, DMAC, ++ Two-Track-MAC), ++ * Hash functions (SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, Tiger, ++ WHIRLPOOL, RIPEMD-128, RIPEMD-256, RIPEMD-160, RIPEMD-320), ++ * Public-key cryptography (RSA, DSA, ElGamal, NR, RW, LUC, LUCELG, ++ DLIES, ESIGN), ++ * Padding schemes for public-key systems (PKCS#1, OAEP, PSS, PSSR, ++ EMSA2, EMSA5), ++ * Key agreement schemes (DH, MQV, LUCDIF, XTR-DH), ++ * Elliptic curve cryptography (ECDSA, ECNR, ECIES, ECDH, ECMQV), ++ * Backwards compatibility algorithms (MD2, MD4, MD5, Panama Hash, DES, ++ ARC4, SEAL 3.0, WAKE, WAKE-OFB, DESX, RC2, SAFER, 3-WAY, GOST, ++ SHARK, CAST-128, Square), ++ * Pseudo-random number generators, ++ and a whole lot more. Alternative libraries are libgcrypt and ++ nettle. ++ . ++ This package includes the HTML reference guide to the source code. diff --cc debian/copyright index 0000000,0000000..f5e2d70 new file mode 100644 --- /dev/null +++ b/debian/copyright @@@ -1,0 -1,0 +1,102 @@@ ++Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ ++Upstream-Name: Crypto++ ++Source: https://sourceforge.net/projects/cryptopp/files/cryptopp/ ++ ++Files: * ++Copyright: (C) 1995-2013 by Wei Dai ++License: Boost ++ ++Files: 3way.cpp ++Copyright: Joan Daemen ++License: public-domain ++ ++Files: cast.cpp ++Copyright: Leonard Janke, ++ Steve Reid ++License: public-domain ++ ++Files: seal.cpp ++Copyright: Leonard Janke ++License: public-domain ++ ++Files: des.cpp ++Copyright: Phil Karn ++License: public-domain ++ ++Files: md2.cpp ++ md4.cpp ++Copyright: Andrew M. Kuchling ++License: public-domain ++ ++Files: md5.cpp ++Copyright: Colin Plumb ++License: public-domain ++ ++Files: rc6.cpp ++Copyright: Seal Woods ++License: public-domain ++ ++Files: rijndael.cpp ++Copyright: Chris Morgan, ++ Paulo Baretto ++License: public-domain ++ ++Files: skipjack.cpp ++ square.cpp ++Copyright: Paulo Baretto ++License: public-domain ++ ++Files: safer.cpp ++Copyright: Richard De Moliner ++License: public-domain ++ ++Files: twofish.cpp ++Copyright: Matthew Skala ++License: public-domain ++ ++Files: camellia.cpp ++ shacal2.cpp ++ ttmac.cpp ++ whrlpool.cpp ++ ripemd.cpp ++Copyright: Kevin Springle ++License: public-domain ++ ++License: public-domain ++ No license required for any purpose; the work is not subject to copyright ++ in any jurisdiction. ++ ++Files: debian/* ++Copyright: (C) 2011- Laszlo Boszormenyi (GCS) , ++ (C) 2005-2010 Jens Peter Secher , ++ (C) 2004 Pierre Machard , ++ (C) 2000-2002 Stephen Zander ++License: Boost ++ ++License: Boost ++ Boost Software License - Version 1.0 ++ ------------------------------------ ++ . ++ Boost Software License - Version 1.0 - August 17th, 2003 ++ . ++ Permission is hereby granted, free of charge, to any person or organization ++ obtaining a copy of the software and accompanying documentation covered by ++ this license (the "Software") to use, reproduce, display, distribute, ++ execute, and transmit the Software, and to prepare derivative works of the ++ Software, and to permit third-parties to whom the Software is furnished to ++ do so, all subject to the following: ++ . ++ The copyright notices in the Software and this entire statement, including ++ the above license grant, this restriction and the following disclaimer, ++ must be included in all copies of the Software, in whole or in part, and ++ all derivative works of the Software, unless such copies or derivative ++ works are solely in the form of machine-executable object code generated by ++ a source language processor. ++ . ++ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR ++ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, ++ FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT ++ SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE ++ FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, ++ ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER ++ DEALINGS IN THE SOFTWARE. diff --cc debian/cryptest.1 index 0000000,0000000..5ec028f new file mode 100644 --- /dev/null +++ b/debian/cryptest.1 @@@ -1,0 -1,0 +1,95 @@@ ++.TH cryptest 1 local ++.SH NAME ++cryptest \- Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives ++.SH SYNOPSIS ++.B cryptest ++[\fIOPTION\fR] ++.SH DESCRIPTION ++cryptest takes the following options ++.TP ++.B g ++generate an RSA key ++.TP ++.B h ++display usage information ++.TP ++.B r ++encrypt and decrypt a string using RSA ++.TP ++.BI rs " privatekeyfile messagefile signaturefile" ++sign a file using RSA ++.TP ++.BI rv " publickeyfile messagefile signaturefile" ++verify a signature of a file using RSA ++.TP ++.BI m " file" ++calculate MD5, SHA, and RIPEMD-160 message digests ++.TP ++.B t ++encrypt and decrypt a string using DES-EDE in CBC mode ++.TP ++.BI e|d " input output" ++encrypt or decrypt a file ++.TP ++.BI ss " file" ++secret share a file (shares will be named file.000, file.001, etc) ++.TP ++.BI sr " file share1 share2 [....]" ++reconstruct a secret-shared file (number of shares given must be equal ++to threshold) ++.TP ++.BI id " file" ++information disperse a file (shares will be named file.000, file.001, etc) ++.TP ++.BI ir " file share1 share2 [....]" ++reconstruct an information-dispersed file (number of shares given must ++be equal to threshold) ++.TP ++.BI z " input output" ++gzip a file ++.TP ++.BI u " input output" ++gunzip a file ++.TP ++.BI ae " input output" ++encrypt a file with AES in CTR mode ++.TP ++.BI e64 " input output" ++base64 encode a file ++.TP ++.BI d64 " input output" ++base64 decode a file ++.TP ++.BI e16 " input output" ++hex encode a file ++.TP ++.BI d16 " input output" ++hex decode a file ++.TP ++.BI ft " source-port destination-host destination-port" ++forward a TCP connection ++.TP ++.BI fips ++run the FIPS 140-2 sample application ++.TP ++.BI fips-rand ++generate 100000 random files using FIPS Approved X.917 RNG ++.TP ++.BI mt " input" ++run Maurer's randomness test on a file ++.TP ++.B v ++run validation tests ++.TP ++.B V ++display version number ++.TP ++.BI b " [time for each benchmark in seconds] [frequency of CPU in gigahertz]" ++run benchmarks ++.TP ++.BI tv " filename" ++run test vector file (available in TestVectors example subdirectory) ++.SH AUTHOR ++This man page was created by Stephen Zander, Pierre Machard and Jens ++Peter Secher for the Debian distribution. It is licenced under the ++same terms as the rest of the Crypto++ library, written by Wei Dai. diff --cc debian/fix_library_name.sh index 0000000,0000000..4220145 new file mode 100644 --- /dev/null +++ b/debian/fix_library_name.sh @@@ -1,0 -1,0 +1,6 @@@ ++sed -i 's/)\/cryptopp/)\/crypto++/' GNUmakefile ++sed -i 's/-lcryptopp/-lcrypto++/' GNUmakefile ++sed -i 's/libcryptopp.a/libcrypto++.a/' GNUmakefile ++sed -i 's/libcryptopp.pc/libcrypto++.pc/' GNUmakefile ++sed -i 's/libcryptopp.so/libcrypto++.so/g' GNUmakefile ++sed -i 's/cryptest.exe/cryptest/' GNUmakefile diff --cc debian/libcrypto++-dev.docs index 0000000,0000000..b8907ed new file mode 100644 --- /dev/null +++ b/debian/libcrypto++-dev.docs @@@ -1,0 -1,0 +1,1 @@@ ++Readme.txt diff --cc debian/libcrypto++-dev.install index 0000000,0000000..df9fbac new file mode 100644 --- /dev/null +++ b/debian/libcrypto++-dev.install @@@ -1,0 -1,0 +1,4 @@@ ++usr/include/ ++usr/lib/*/*.a ++usr/lib/*/*.so ++usr/lib/*/pkgconfig/*.pc diff --cc debian/libcrypto++-dev.links.in index 0000000,0000000..a93e83a new file mode 100644 --- /dev/null +++ b/debian/libcrypto++-dev.links.in @@@ -1,0 -1,0 +1,3 @@@ ++/usr/include/crypto++ /usr/include/cryptopp ++/usr/lib/ARCH/libcrypto++.a /usr/lib/ARCH/libcryptopp.a ++/usr/lib/ARCH/libcrypto++.so /usr/lib/ARCH/libcryptopp.so diff --cc debian/libcrypto++-doc.doc-base index 0000000,0000000..c2a9394 new file mode 100644 --- /dev/null +++ b/debian/libcrypto++-doc.doc-base @@@ -1,0 -1,0 +1,10 @@@ ++Document: libcrypto++ ++Title: Crypto++ library reference manual ++Author: Wei Dai ++Abstract: Reference manual for the general purpose cryptographic library ++ Crypto++ for the C++ language. ++Section: Programming ++ ++Format: HTML ++Index: /usr/share/doc/libcrypto++-dev/html/index.html ++Files: /usr/share/doc/libcrypto++-dev/html/*.html diff --cc debian/libcrypto++-doc.docs index 0000000,0000000..c5c554d new file mode 100644 --- /dev/null +++ b/debian/libcrypto++-doc.docs @@@ -1,0 -1,0 +1,1 @@@ ++html-docs/ diff --cc debian/libcrypto++-doc.links index 0000000,0000000..044fa58 new file mode 100644 --- /dev/null +++ b/debian/libcrypto++-doc.links @@@ -1,0 -1,0 +1,1 @@@ ++/usr/share/javascript/jquery/jquery.js /usr/share/doc/libcrypto++-doc/html/jquery.js diff --cc debian/libcrypto++-utils.install index 0000000,0000000..c12bd0f new file mode 100644 --- /dev/null +++ b/debian/libcrypto++-utils.install @@@ -1,0 -1,0 +1,3 @@@ ++usr/bin ++usr/share/crypto--/TestData usr/share/crypto++ ++usr/share/crypto--/TestVectors usr/share/crypto++ diff --cc debian/libcrypto++-utils.manpages index 0000000,0000000..1f2587e new file mode 100644 --- /dev/null +++ b/debian/libcrypto++-utils.manpages @@@ -1,0 -1,0 +1,1 @@@ ++debian/cryptest.1 diff --cc debian/libcrypto++8t64.install index 0000000,0000000..3de3b10 new file mode 100644 --- /dev/null +++ b/debian/libcrypto++8t64.install @@@ -1,0 -1,0 +1,1 @@@ ++usr/lib/*/*.so.* diff --cc debian/libcrypto++8t64.links.in index 0000000,0000000..1c367ca new file mode 100644 --- /dev/null +++ b/debian/libcrypto++8t64.links.in @@@ -1,0 -1,0 +1,1 @@@ ++/usr/lib/ARCH/libcrypto++.so.8 /usr/lib/ARCH/libcryptopp.so.8 diff --cc debian/libcrypto++8t64.lintian-overrides index 0000000,0000000..bce7f0e new file mode 100644 --- /dev/null +++ b/debian/libcrypto++8t64.lintian-overrides @@@ -1,0 -1,0 +1,1 @@@ ++libcrypto++8t64: package-name-doesnt-match-sonames libcrypto++8 diff --cc debian/not-installed index 0000000,0000000..0cd52f3 new file mode 100644 --- /dev/null +++ b/debian/not-installed @@@ -1,0 -1,0 +1,2 @@@ ++usr/share/crypto++/TestData/ ++usr/share/crypto++/TestVectors/ diff --cc debian/patches/CVE-2023-50980.patch index 0000000,0000000..91d4101 new file mode 100644 --- /dev/null +++ b/debian/patches/CVE-2023-50980.patch @@@ -1,0 -1,0 +1,71 @@@ ++From 641ae35258de397774744b8b17ef6632c3fa48b3 Mon Sep 17 00:00:00 2001 ++From: Jeffrey Walton ++Date: Mon, 20 Nov 2023 01:36:15 -0500 ++Subject: [PATCH] Validate PolynomialMod2 coefficients Thanks to Bing Shi ++ ++--- ++ gf2n.cpp | 20 ++++++++++++++++++++ ++ 1 file changed, 20 insertions(+) ++ ++diff --git a/gf2n.cpp b/gf2n.cpp ++index 8993baaed..87d9961b2 100644 ++--- a/gf2n.cpp +++++ b/gf2n.cpp ++@@ -135,9 +135,14 @@ PolynomialMod2 PolynomialMod2::Monomial(size_t i) ++ ++ PolynomialMod2 PolynomialMod2::Trinomial(size_t t0, size_t t1, size_t t2) ++ { +++ // Asserts and checks due to Bing Shi ++ CRYPTOPP_ASSERT(t0 > t1); ++ CRYPTOPP_ASSERT(t1 > t2); ++ +++ // The test is odd because of ECIES. The basis is t0, but the other coefficients are not in descending order. +++ if (t1 > t0 || t2 > t0) +++ throw InvalidArgument("PolynomialMod2: coefficients must be in descending order"); +++ ++ PolynomialMod2 r((word)0, t0+1); ++ r.SetBit(t0); ++ r.SetBit(t1); ++@@ -147,11 +152,16 @@ PolynomialMod2 PolynomialMod2::Trinomial(size_t t0, size_t t1, size_t t2) ++ ++ PolynomialMod2 PolynomialMod2::Pentanomial(size_t t0, size_t t1, size_t t2, size_t t3, size_t t4) ++ { +++ // Asserts and checks due to Bing Shi ++ CRYPTOPP_ASSERT(t0 > t1); ++ CRYPTOPP_ASSERT(t1 > t2); ++ CRYPTOPP_ASSERT(t2 > t3); ++ CRYPTOPP_ASSERT(t3 > t4); ++ +++ // The test is odd because of ECIES. The basis is t0, but the other coefficients are not in descending order. +++ if (t1 > t0 || t2 > t0 || t3 > t0 || t4 > t0) +++ throw InvalidArgument("PolynomialMod2: coefficients must be in descending order"); +++ ++ PolynomialMod2 r((word)0, t0+1); ++ r.SetBit(t0); ++ r.SetBit(t1); ++@@ -663,7 +673,12 @@ GF2NT::GF2NT(unsigned int c0, unsigned int c1, unsigned int c2) ++ , t0(c0), t1(c1) ++ , result((word)0, m) ++ { +++ // Asserts and checks due to Bing Shi ++ CRYPTOPP_ASSERT(c0 > c1 && c1 > c2 && c2==0); +++ +++ // The test is odd because of ECIES. The basis is c0, but the other coefficients are not in descending order. +++ if (c1 > c0 || c2 > c0) +++ throw InvalidArgument("GF2NT: coefficients must be in descending order"); ++ } ++ ++ const GF2NT::Element& GF2NT::MultiplicativeInverse(const Element &a) const ++@@ -972,7 +987,12 @@ GF2NP * BERDecodeGF2NP(BufferedTransformation &bt) ++ GF2NT233::GF2NT233(unsigned int c0, unsigned int c1, unsigned int c2) ++ : GF2NT(c0, c1, c2) ++ { +++ // Asserts and checks due to Bing Shi ++ CRYPTOPP_ASSERT(c0 > c1 && c1 > c2 && c2==0); +++ +++ // The test is odd because of ECIES. The basis is c0, but the other coefficients are not in descending order. +++ if (c1 > c0 || c2 > c0) +++ throw InvalidArgument("GF2NT: coefficients must be in descending order"); ++ } ++ ++ const GF2NT::Element& GF2NT233::Multiply(const Element &a, const Element &b) const diff --cc debian/patches/fix_library_name.patch index 0000000,0000000..1d9a3c8 new file mode 100644 --- /dev/null +++ b/debian/patches/fix_library_name.patch @@@ -1,0 -1,0 +1,372 @@@ ++Description: use crypto++ instead of cryptopp ++Author: Laszlo Boszormenyi (GCS) ++Forwarded: not-needed ++Last-Update: 2023-10-01 ++ ++--- ++ ++--- a/GNUmakefile +++++ b/GNUmakefile ++@@ -13,10 +13,10 @@ TMPDIR ?= /tmp ++ TOUT ?= a.out ++ TOUT := $(strip $(TOUT)) ++ ++-# Allow override for the cryptest.exe recipe. Change to ++-# ./libcryptopp.so or ./libcryptopp.dylib to suit your +++# Allow override for the cryptest recipe. Change to +++# ./libcrypto++.so or ./libcryptopp.dylib to suit your ++ # taste. https://github.com/weidai11/cryptopp/issues/866 ++-LINK_LIBRARY ?= libcryptopp.a +++LINK_LIBRARY ?= libcrypto++.a ++ LINK_LIBRARY_PATH ?= ./ ++ ++ # Command and arguments ++@@ -1151,7 +1151,7 @@ SOLIB_COMPAT_SUFFIX=.$(LIB_MAJOR) ++ ifneq ($(IS_LINUX)$(IS_HURD),00) ++ # Linux uses full version suffix for shared library ++ SOLIB_VERSION_SUFFIX=.$(LIB_MAJOR).$(LIB_MINOR).$(LIB_PATCH) ++-SOLIB_FLAGS=-Wl,-soname,libcryptopp.so$(SOLIB_COMPAT_SUFFIX) +++SOLIB_FLAGS=-Wl,-soname,libcrypto++.so$(SOLIB_COMPAT_SUFFIX) ++ endif ++ # Solaris uses -Wl,-h ++ ifeq ($(IS_SUN),1) ++@@ -1159,7 +1159,7 @@ ifeq ($(IS_SUN),1) ++ # The minor version allows previous version to remain and not overwritten. ++ # https://blogs.oracle.com/solaris/how-to-name-a-solaris-shared-object-v2 ++ SOLIB_VERSION_SUFFIX=.$(LIB_MAJOR).$(LIB_MINOR) ++-SOLIB_FLAGS=-Wl,-h,libcryptopp.so$(SOLIB_COMPAT_SUFFIX) +++SOLIB_FLAGS=-Wl,-h,libcrypto++.so$(SOLIB_COMPAT_SUFFIX) ++ endif # IS_SUN ++ endif # HAS_SOLIB_VERSION ++ ++@@ -1290,36 +1290,36 @@ LDFLAGS := $(strip $(CRYPTOPP_LDFLAGS) ++ ++ # Default builds program with static library only ++ .PHONY: default ++-default: cryptest.exe +++default: cryptest ++ ++ .PHONY: all static dynamic ++-all: static dynamic cryptest.exe +++all: static dynamic cryptest ++ ++ ifneq ($(IS_DARWIN),0) ++-static: libcryptopp.a +++static: libcrypto++.a ++ shared dynamic dylib: libcryptopp.dylib ++ else ++-static: libcryptopp.a ++-shared dynamic: libcryptopp.so$(SOLIB_VERSION_SUFFIX) +++static: libcrypto++.a +++shared dynamic: libcrypto++.so$(SOLIB_VERSION_SUFFIX) ++ endif ++ ++ # CXXFLAGS are tuned earlier. ++ .PHONY: native no-asm asan ubsan ++-native no-asm asan ubsan: cryptest.exe +++native no-asm asan ubsan: cryptest ++ ++ # CXXFLAGS are tuned earlier. Applications must use linker flags ++ # -Wl,--gc-sections (Linux and Unix) or -Wl,-dead_strip (OS X) ++ .PHONY: lean ++-lean: static dynamic cryptest.exe +++lean: static dynamic cryptest ++ ++ # May want to export CXXFLAGS="-g3 -O1" ++ .PHONY: lcov coverage ++-lcov coverage: cryptest.exe +++lcov coverage: cryptest ++ @-$(RM) -r ./TestCoverage/ ++ lcov --base-directory . --directory . --zerocounters -q ++- ./cryptest.exe v ++- ./cryptest.exe tv all ++- ./cryptest.exe b 0.25 +++ ./cryptest v +++ ./cryptest tv all +++ ./cryptest b 0.25 ++ lcov --base-directory . --directory . -c -o cryptest.info ++ lcov --remove cryptest.info "adhoc.*" -o cryptest.info ++ lcov --remove cryptest.info "fips140.*" -o cryptest.info ++@@ -1329,20 +1329,20 @@ lcov coverage: cryptest.exe ++ ++ # Travis CI and CodeCov rule ++ .PHONY: gcov codecov ++-gcov codecov: cryptest.exe +++gcov codecov: cryptest ++ @-$(RM) -r ./TestCoverage/ ++- ./cryptest.exe v ++- ./cryptest.exe tv all +++ ./cryptest v +++ ./cryptest tv all ++ gcov -r $(SRCS) ++ ++ # Should use CXXFLAGS="-g3 -O1" ++ .PHONY: valgrind ++-valgrind: cryptest.exe ++- valgrind --track-origins=yes --suppressions=cryptopp.supp ./cryptest.exe v +++valgrind: cryptest +++ valgrind --track-origins=yes --suppressions=cryptopp.supp ./cryptest v ++ ++ .PHONY: test check ++-test check: cryptest.exe ++- ./cryptest.exe v +++test check: cryptest +++ ./cryptest v ++ ++ # Used to generate list of source files for Autotools, CMakeList, Android.mk, etc ++ .PHONY: sources ++@@ -1383,12 +1383,12 @@ docs html: ++ .PHONY: clean ++ clean: ++ -$(RM) adhoc.cpp.o adhoc.cpp.proto.o $(CLEAN_OBJS) rdrand-*.o ++- @-$(RM) libcryptopp.a libcryptopp.dylib cryptopp.dll libcryptopp.dll.a libcryptopp.import.a ++- @-$(RM) libcryptopp.so libcryptopp.so$(SOLIB_COMPAT_SUFFIX) libcryptopp.so$(SOLIB_VERSION_SUFFIX) ++- @-$(RM) cryptest.exe dlltest.exe cryptest.import.exe cryptest.dat ct et +++ @-$(RM) libcrypto++.a libcryptopp.dylib cryptopp.dll libcryptopp.dll.a libcryptopp.import.a +++ @-$(RM) libcrypto++.so libcrypto++.so$(SOLIB_COMPAT_SUFFIX) libcrypto++.so$(SOLIB_VERSION_SUFFIX) +++ @-$(RM) cryptest dlltest.exe cryptest.import.exe cryptest.dat ct et ++ @-$(RM) *.la *.lo *.gcov *.gcno *.gcda *.stackdump core core-* ++ @-$(RM) /tmp/adhoc.exe ++- @-$(RM) -r /tmp/cryptopp_test/ +++ @-$(RM) -r /tmp/crypto++_test/ ++ @-$(RM) -r *.exe.dSYM/ *.dylib.dSYM/ ++ @-$(RM) -r cov-int/ ++ ++@@ -1397,7 +1397,7 @@ autotools-clean: ++ @-$(RM) -f bootstrap.sh configure.ac configure configure.in Makefile.am Makefile.in Makefile ++ @-$(RM) -f config.guess config.status config.sub config.h.in compile depcomp ++ @-$(RM) -f install-sh stamp-h1 ar-lib *.lo *.la *.m4 local.* lt*.sh missing ++- @-$(RM) -f cryptest cryptestcwd libtool* libcryptopp.la libcryptopp.pc* +++ @-$(RM) -f cryptest cryptestcwd libtool* libcrypto++.la libcrypto++.pc* ++ @-$(RM) -rf build-aux/ m4/ auto*.cache/ .deps/ .libs/ ++ ++ .PHONY: android-clean ++@@ -1409,40 +1409,40 @@ android-clean: ++ distclean: clean autotools-clean android-clean ++ -$(RM) adhoc.cpp adhoc.cpp.copied GNUmakefile.deps benchmarks.html cryptest.txt ++ -$(RM) cryptest_all.info cryptest_debug.info cryptest_noasm.info cryptest_base.info cryptest.info cryptest_release.info ++- @-$(RM) cryptest-*.txt cryptopp.tgz libcryptopp.pc *.o *.bc *.ii *~ ++- @-$(RM) -r cryptlib.lib cryptest.exe *.suo *.sdf *.pdb Win32/ x64/ ipch/ +++ @-$(RM) cryptest-*.txt cryptopp.tgz libcrypto++.pc *.o *.bc *.ii *~ +++ @-$(RM) -r cryptlib.lib cryptest *.suo *.sdf *.pdb Win32/ x64/ ipch/ ++ @-$(RM) -r $(LIBOBJS:.o=.obj) $(TESTOBJS:.o=.obj) ++ @-$(RM) -r $(LIBOBJS:.o=.lst) $(TESTOBJS:.o=.lst) ++ @-$(RM) -r TestCoverage/ ref*/ ++ @-$(RM) cryptopp$(LIB_VER)\.* CryptoPPRef.zip ++ ++-# Install cryptest.exe, libcryptopp.a, libcryptopp.so and libcryptopp.pc. +++# Install cryptest, libcrypto++.a, libcrypto++.so and libcrypto++.pc. ++ # The library install was broken-out into its own recipe at GH #653. ++ .PHONY: install ++-install: cryptest.exe install-lib +++install: cryptest install-lib ++ @-$(MKDIR) $(DESTDIR)$(BINDIR) ++- $(CP) cryptest.exe $(DESTDIR)$(BINDIR) ++- $(CHMOD) u=rwx,go=rx $(DESTDIR)$(BINDIR)/cryptest.exe ++- @-$(MKDIR) $(DESTDIR)$(DATADIR)/cryptopp/TestData ++- @-$(MKDIR) $(DESTDIR)$(DATADIR)/cryptopp/TestVectors ++- $(CP) TestData/*.dat $(DESTDIR)$(DATADIR)/cryptopp/TestData ++- $(CHMOD) u=rw,go=r $(DESTDIR)$(DATADIR)/cryptopp/TestData/*.dat ++- $(CP) TestVectors/*.txt $(DESTDIR)$(DATADIR)/cryptopp/TestVectors ++- $(CHMOD) u=rw,go=r $(DESTDIR)$(DATADIR)/cryptopp/TestVectors/*.txt +++ $(CP) cryptest $(DESTDIR)$(BINDIR) +++ $(CHMOD) u=rwx,go=rx $(DESTDIR)$(BINDIR)/cryptest +++ @-$(MKDIR) $(DESTDIR)$(DATADIR)/crypto++/TestData +++ @-$(MKDIR) $(DESTDIR)$(DATADIR)/crypto++/TestVectors +++ $(CP) TestData/*.dat $(DESTDIR)$(DATADIR)/crypto++/TestData +++ $(CHMOD) u=rw,go=r $(DESTDIR)$(DATADIR)/crypto++/TestData/*.dat +++ $(CP) TestVectors/*.txt $(DESTDIR)$(DATADIR)/crypto++/TestVectors +++ $(CHMOD) u=rw,go=r $(DESTDIR)$(DATADIR)/crypto++/TestVectors/*.txt ++ ++-# A recipe to install only the library, and not cryptest.exe. Also +++# A recipe to install only the library, and not cryptest. Also ++ # see https://github.com/weidai11/cryptopp/issues/653. Some users ++-# already have a libcryptopp.pc. Install the *.pc file if the file ++-# is present. If you want one, then issue 'make libcryptopp.pc'. +++# already have a libcrypto++.pc. Install the *.pc file if the file +++# is present. If you want one, then issue 'make libcrypto++.pc'. ++ .PHONY: install-lib ++ install-lib: ++- @-$(MKDIR) $(DESTDIR)$(INCLUDEDIR)/cryptopp ++- $(CP) *.h $(DESTDIR)$(INCLUDEDIR)/cryptopp ++- $(CHMOD) u=rw,go=r $(DESTDIR)$(INCLUDEDIR)/cryptopp/*.h ++-ifneq ($(wildcard libcryptopp.a),) +++ @-$(MKDIR) $(DESTDIR)$(INCLUDEDIR)/crypto++ +++ $(CP) *.h $(DESTDIR)$(INCLUDEDIR)/crypto++ +++ $(CHMOD) u=rw,go=r $(DESTDIR)$(INCLUDEDIR)/crypto++/*.h +++ifneq ($(wildcard libcrypto++.a),) ++ @-$(MKDIR) $(DESTDIR)$(LIBDIR) ++- $(CP) libcryptopp.a $(DESTDIR)$(LIBDIR) ++- $(CHMOD) u=rw,go=r $(DESTDIR)$(LIBDIR)/libcryptopp.a +++ $(CP) libcrypto++.a $(DESTDIR)$(LIBDIR) +++ $(CHMOD) u=rw,go=r $(DESTDIR)$(LIBDIR)/libcrypto++.a ++ endif ++ ifneq ($(wildcard libcryptopp.dylib),) ++ @-$(MKDIR) $(DESTDIR)$(LIBDIR) ++@@ -1450,64 +1450,64 @@ ifneq ($(wildcard libcryptopp.dylib),) ++ $(CHMOD) u=rwx,go=rx $(DESTDIR)$(LIBDIR)/libcryptopp.dylib ++ -install_name_tool -id $(DESTDIR)$(LIBDIR)/libcryptopp.dylib $(DESTDIR)$(LIBDIR)/libcryptopp.dylib ++ endif ++-ifneq ($(wildcard libcryptopp.so$(SOLIB_VERSION_SUFFIX)),) +++ifneq ($(wildcard libcrypto++.so$(SOLIB_VERSION_SUFFIX)),) ++ @-$(MKDIR) $(DESTDIR)$(LIBDIR) ++- $(CP) libcryptopp.so$(SOLIB_VERSION_SUFFIX) $(DESTDIR)$(LIBDIR) ++- $(CHMOD) u=rwx,go=rx $(DESTDIR)$(LIBDIR)/libcryptopp.so$(SOLIB_VERSION_SUFFIX) +++ $(CP) libcrypto++.so$(SOLIB_VERSION_SUFFIX) $(DESTDIR)$(LIBDIR) +++ $(CHMOD) u=rwx,go=rx $(DESTDIR)$(LIBDIR)/libcrypto++.so$(SOLIB_VERSION_SUFFIX) ++ ifeq ($(HAS_SOLIB_VERSION),1) ++- -$(LN) libcryptopp.so$(SOLIB_VERSION_SUFFIX) $(DESTDIR)$(LIBDIR)/libcryptopp.so ++- -$(LN) libcryptopp.so$(SOLIB_VERSION_SUFFIX) $(DESTDIR)$(LIBDIR)/libcryptopp.so$(SOLIB_COMPAT_SUFFIX) +++ -$(LN) libcrypto++.so$(SOLIB_VERSION_SUFFIX) $(DESTDIR)$(LIBDIR)/libcrypto++.so +++ -$(LN) libcrypto++.so$(SOLIB_VERSION_SUFFIX) $(DESTDIR)$(LIBDIR)/libcrypto++.so$(SOLIB_COMPAT_SUFFIX) ++ $(LDCONF) $(DESTDIR)$(LIBDIR) ++ endif ++ endif ++-ifneq ($(wildcard libcryptopp.pc),) +++ifneq ($(wildcard libcrypto++.pc),) ++ @-$(MKDIR) $(DESTDIR)$(LIBDIR)/pkgconfig ++- $(CP) libcryptopp.pc $(DESTDIR)$(LIBDIR)/pkgconfig ++- $(CHMOD) u=rw,go=r $(DESTDIR)$(LIBDIR)/pkgconfig/libcryptopp.pc +++ $(CP) libcrypto++.pc $(DESTDIR)$(LIBDIR)/pkgconfig +++ $(CHMOD) u=rw,go=r $(DESTDIR)$(LIBDIR)/pkgconfig/libcrypto++.pc ++ endif ++ ++ .PHONY: remove uninstall ++ remove uninstall: ++- -$(RM) -r $(DESTDIR)$(INCLUDEDIR)/cryptopp ++- -$(RM) $(DESTDIR)$(LIBDIR)/libcryptopp.a ++- -$(RM) $(DESTDIR)$(BINDIR)/cryptest.exe +++ -$(RM) -r $(DESTDIR)$(INCLUDEDIR)/crypto++ +++ -$(RM) $(DESTDIR)$(LIBDIR)/libcrypto++.a +++ -$(RM) $(DESTDIR)$(BINDIR)/cryptest ++ ifneq ($(wildcard $(DESTDIR)$(LIBDIR)/libcryptopp.dylib),) ++ -$(RM) $(DESTDIR)$(LIBDIR)/libcryptopp.dylib ++ endif ++-ifneq ($(wildcard $(DESTDIR)$(LIBDIR)/libcryptopp.so),) ++- -$(RM) $(DESTDIR)$(LIBDIR)/libcryptopp.so +++ifneq ($(wildcard $(DESTDIR)$(LIBDIR)/libcrypto++.so),) +++ -$(RM) $(DESTDIR)$(LIBDIR)/libcrypto++.so ++ endif ++- @-$(RM) $(DESTDIR)$(LIBDIR)/libcryptopp.so$(SOLIB_VERSION_SUFFIX) ++- @-$(RM) $(DESTDIR)$(LIBDIR)/libcryptopp.so$(SOLIB_COMPAT_SUFFIX) ++- @-$(RM) $(DESTDIR)$(LIBDIR)/pkgconfig/libcryptopp.pc ++- @-$(RM) -r $(DESTDIR)$(DATADIR)/cryptopp +++ @-$(RM) $(DESTDIR)$(LIBDIR)/libcrypto++.so$(SOLIB_VERSION_SUFFIX) +++ @-$(RM) $(DESTDIR)$(LIBDIR)/libcrypto++.so$(SOLIB_COMPAT_SUFFIX) +++ @-$(RM) $(DESTDIR)$(LIBDIR)/pkgconfig/libcrypto++.pc +++ @-$(RM) -r $(DESTDIR)$(DATADIR)/crypto++ ++ ++-libcryptopp.a: $(LIBOBJS) | osx_warning +++libcrypto++.a: $(LIBOBJS) | osx_warning ++ $(AR) $(ARFLAGS) $@ $(LIBOBJS) ++ ifeq ($(IS_SUN),0) ++ $(RANLIB) $@ ++ endif ++ ++ ifeq ($(HAS_SOLIB_VERSION),1) ++-.PHONY: libcryptopp.so ++-libcryptopp.so: libcryptopp.so$(SOLIB_VERSION_SUFFIX) | so_warning +++.PHONY: libcrypto++.so +++libcrypto++.so: libcrypto++.so$(SOLIB_VERSION_SUFFIX) | so_warning ++ endif ++ ++-libcryptopp.so$(SOLIB_VERSION_SUFFIX): $(LIBOBJS) +++libcrypto++.so$(SOLIB_VERSION_SUFFIX): $(LIBOBJS) ++ ifeq ($(XLC_COMPILER),1) ++ $(CXX) -qmkshrobj $(SOLIB_FLAGS) -o $@ $(CXXFLAGS) $(LDFLAGS) $(LIBOBJS) $(LDLIBS) ++ else ++ $(CXX) -shared $(SOLIB_FLAGS) -o $@ $(CXXFLAGS) $(LDFLAGS) $(LIBOBJS) $(LDLIBS) ++ endif ++ ifeq ($(HAS_SOLIB_VERSION),1) ++- -$(LN) libcryptopp.so$(SOLIB_VERSION_SUFFIX) libcryptopp.so ++- -$(LN) libcryptopp.so$(SOLIB_VERSION_SUFFIX) libcryptopp.so$(SOLIB_COMPAT_SUFFIX) +++ -$(LN) libcrypto++.so$(SOLIB_VERSION_SUFFIX) libcrypto++.so +++ -$(LN) libcrypto++.so$(SOLIB_VERSION_SUFFIX) libcrypto++.so$(SOLIB_COMPAT_SUFFIX) ++ endif ++ ++ libcryptopp.dylib: $(LIBOBJS) | osx_warning ++ $(CXX) -dynamiclib -o $@ $(CXXFLAGS) -install_name "$@" -current_version "$(LIB_MAJOR).$(LIB_MINOR).$(LIB_PATCH)" -compatibility_version "$(LIB_MAJOR).$(LIB_MINOR)" -headerpad_max_install_names $(LDFLAGS) $(LIBOBJS) ++ ++-cryptest.exe: $(LINK_LIBRARY) $(TESTOBJS) | osx_warning +++cryptest: $(LINK_LIBRARY) $(TESTOBJS) | osx_warning ++ $(CXX) -o $@ $(CXXFLAGS) $(TESTOBJS) $(LINK_LIBRARY_PATH)$(LINK_LIBRARY) $(LDFLAGS) $(LDLIBS) ++ ++ # Makes it faster to test changes ++@@ -1531,24 +1531,24 @@ cryptest.import.exe: cryptopp.dll libcry ++ dlltest.exe: cryptopp.dll $(DLLTESTOBJS) ++ $(CXX) -o $@ $(CXXFLAGS) $(DLLTESTOBJS) -L. -lcryptopp.dll $(LDFLAGS) $(LDLIBS) ++ ++-# Some users already have a libcryptopp.pc. We install it if the file ++-# is present. If you want one, then issue 'make libcryptopp.pc'. Be sure +++# Some users already have a libcrypto++.pc. We install it if the file +++# is present. If you want one, then issue 'make libcrypto++.pc'. Be sure ++ # to use/verify PREFIX and LIBDIR below after writing the file. ++-cryptopp.pc libcryptopp.pc: ++- @echo '# Crypto++ package configuration file' > libcryptopp.pc ++- @echo '' >> libcryptopp.pc ++- @echo 'prefix=$(PC_PREFIX)' >> libcryptopp.pc ++- @echo 'libdir=$(PC_LIBDIR)' >> libcryptopp.pc ++- @echo 'includedir=$(PC_INCLUDEDIR)' >> libcryptopp.pc ++- @echo 'datadir=$(PC_DATADIR)' >> libcryptopp.pc ++- @echo '' >> libcryptopp.pc ++- @echo 'Name: Crypto++' >> libcryptopp.pc ++- @echo 'Description: Crypto++ cryptographic library' >> libcryptopp.pc ++- @echo 'Version: 8.9' >> libcryptopp.pc ++- @echo 'URL: https://cryptopp.com/' >> libcryptopp.pc ++- @echo '' >> libcryptopp.pc ++- @echo 'Cflags: -I$${includedir}' >> libcryptopp.pc ++- @echo 'Libs: -L$${libdir} -lcryptopp' >> libcryptopp.pc +++cryptopp.pc libcrypto++.pc: +++ @echo '# Crypto++ package configuration file' > libcrypto++.pc +++ @echo '' >> libcrypto++.pc +++ @echo 'prefix=$(PC_PREFIX)' >> libcrypto++.pc +++ @echo 'libdir=$(PC_LIBDIR)' >> libcrypto++.pc +++ @echo 'includedir=$(PC_INCLUDEDIR)' >> libcrypto++.pc +++ @echo 'datadir=$(PC_DATADIR)' >> libcrypto++.pc +++ @echo '' >> libcrypto++.pc +++ @echo 'Name: Crypto++' >> libcrypto++.pc +++ @echo 'Description: Crypto++ cryptographic library' >> libcrypto++.pc +++ @echo 'Version: 8.9' >> libcrypto++.pc +++ @echo 'URL: https://crypto++.com/' >> libcrypto++.pc +++ @echo '' >> libcrypto++.pc +++ @echo 'Cflags: -I$${includedir}' >> libcrypto++.pc +++ @echo 'Libs: -L$${libdir} -lcryptopp' >> libcrypto++.pc ++ ++ # This recipe prepares the distro files ++ TEXT_FILES := *.h *.cpp *.S GNUmakefile GNUmakefile-cross License.txt Readme.txt Install.txt Filelist.txt Doxyfile cryptest* cryptlib* dlltest* cryptdll* *.sln *.vcxproj *.filters cryptopp.rc TestVectors/*.txt TestData/*.dat TestPrograms/*.cpp ++@@ -1596,25 +1596,25 @@ zip dist: | distclean convert ++ .PHONY: iso ++ iso: | zip ++ ifneq ($(IS_DARWIN),0) ++- $(MKDIR) $(PWD)/cryptopp$(LIB_VER) ++- $(CP) cryptopp$(LIB_VER).zip $(PWD)/cryptopp$(LIB_VER) ++- hdiutil makehybrid -iso -joliet -o cryptopp$(LIB_VER).iso $(PWD)/cryptopp$(LIB_VER) ++- @-$(RM) -r $(PWD)/cryptopp$(LIB_VER) +++ $(MKDIR) $(PWD)/crypto++$(LIB_VER) +++ $(CP) cryptopp$(LIB_VER).zip $(PWD)/crypto++$(LIB_VER) +++ hdiutil makehybrid -iso -joliet -o cryptopp$(LIB_VER).iso $(PWD)/crypto++$(LIB_VER) +++ @-$(RM) -r $(PWD)/crypto++$(LIB_VER) ++ else ++ ifneq ($(IS_LINUX)$(IS_HURD),00) ++- $(MKDIR) $(PWD)/cryptopp$(LIB_VER) ++- $(CP) cryptopp$(LIB_VER).zip $(PWD)/cryptopp$(LIB_VER) ++- genisoimage -q -o cryptopp$(LIB_VER).iso $(PWD)/cryptopp$(LIB_VER) ++- @-$(RM) -r $(PWD)/cryptopp$(LIB_VER) +++ $(MKDIR) $(PWD)/crypto++$(LIB_VER) +++ $(CP) cryptopp$(LIB_VER).zip $(PWD)/crypto++$(LIB_VER) +++ genisoimage -q -o cryptopp$(LIB_VER).iso $(PWD)/crypto++$(LIB_VER) +++ @-$(RM) -r $(PWD)/crypto++$(LIB_VER) ++ endif # Hurd ++ endif # Darwin ++ ++ # CRYPTOPP_CPU_FREQ in GHz ++ CRYPTOPP_CPU_FREQ ?= 0.0 ++ .PHONY: bench benchmark benchmarks ++-bench benchmark benchmarks: cryptest.exe +++bench benchmark benchmarks: cryptest ++ @-$(RM) -f benchmarks.html ++- ./cryptest.exe b 2 $(CRYPTOPP_CPU_FREQ) +++ ./cryptest b 2 $(CRYPTOPP_CPU_FREQ) ++ ++ adhoc.cpp: adhoc.cpp.proto ++ ifeq ($(wildcard adhoc.cpp),) diff --cc debian/patches/series index 0000000,0000000..d3523d2 new file mode 100644 --- /dev/null +++ b/debian/patches/series @@@ -1,0 -1,0 +1,3 @@@ ++fix_library_name.patch ++update_gf2n_docs.patch ++CVE-2023-50980.patch diff --cc debian/patches/update_gf2n_docs.patch index 0000000,0000000..d1b513e new file mode 100644 --- /dev/null +++ b/debian/patches/update_gf2n_docs.patch @@@ -1,0 -1,0 +1,52 @@@ ++From eb383b8e1622c07da2d5d6599a8b0e17a0deee0f Mon Sep 17 00:00:00 2001 ++From: Jeffrey Walton ++Date: Sun, 19 Nov 2023 20:32:16 -0500 ++Subject: [PATCH] Update docs Thanks to Bing Shi ++ ++--- ++ gf2n.cpp | 8 ++++++++ ++ gf2n.h | 2 ++ ++ 2 files changed, 10 insertions(+) ++ ++diff --git a/gf2n.cpp b/gf2n.cpp ++index 452e69825..8993baaed 100644 ++--- a/gf2n.cpp +++++ b/gf2n.cpp ++@@ -135,6 +135,9 @@ PolynomialMod2 PolynomialMod2::Monomial(size_t i) ++ ++ PolynomialMod2 PolynomialMod2::Trinomial(size_t t0, size_t t1, size_t t2) ++ { +++ CRYPTOPP_ASSERT(t0 > t1); +++ CRYPTOPP_ASSERT(t1 > t2); +++ ++ PolynomialMod2 r((word)0, t0+1); ++ r.SetBit(t0); ++ r.SetBit(t1); ++@@ -144,6 +147,11 @@ PolynomialMod2 PolynomialMod2::Trinomial(size_t t0, size_t t1, size_t t2) ++ ++ PolynomialMod2 PolynomialMod2::Pentanomial(size_t t0, size_t t1, size_t t2, size_t t3, size_t t4) ++ { +++ CRYPTOPP_ASSERT(t0 > t1); +++ CRYPTOPP_ASSERT(t1 > t2); +++ CRYPTOPP_ASSERT(t2 > t3); +++ CRYPTOPP_ASSERT(t3 > t4); +++ ++ PolynomialMod2 r((word)0, t0+1); ++ r.SetBit(t0); ++ r.SetBit(t1); ++diff --git a/gf2n.h b/gf2n.h ++index 4aef31ee4..38e2a910f 100644 ++--- a/gf2n.h +++++ b/gf2n.h ++@@ -69,9 +69,11 @@ class CRYPTOPP_DLL PolynomialMod2 ++ static PolynomialMod2 CRYPTOPP_API Monomial(size_t i); ++ /// \brief Provides x^t0 + x^t1 + x^t2 ++ /// \return x^t0 + x^t1 + x^t2 +++ /// \pre The coefficients should be provided in descending order. That is,
t0 > t1 > t2
.
++ 		static PolynomialMod2 CRYPTOPP_API Trinomial(size_t t0, size_t t1, size_t t2);
++ 		/// \brief Provides x^t0 + x^t1 + x^t2 + x^t3 + x^t4
++ 		/// \return x^t0 + x^t1 + x^t2 + x^t3 + x^t4
+++		/// \pre The coefficients should be provided in descending order. That is, 
t0 > t1 > t2 > t3 > t4
.
++ 		static PolynomialMod2 CRYPTOPP_API Pentanomial(size_t t0, size_t t1, size_t t2, size_t t3, size_t t4);
++ 		/// \brief Provides x^(n-1) + ... + x + 1
++ 		/// \return x^(n-1) + ... + x + 1
diff --cc debian/rules
index 0000000,0000000..6adb381
new file mode 100755
--- /dev/null
+++ b/debian/rules
@@@ -1,0 -1,0 +1,82 @@@
++#!/usr/bin/make -f
++# -*- makefile -*-
++
++# Uncomment this to turn on verbose mode.
++#export DH_VERBOSE=1
++
++DOC_PKG_DIR = $(CURDIR)/debian/libcrypto++-doc/
++
++DPKG_EXPORT_BUILDTOOLS=1
++include /usr/share/dpkg/architecture.mk
++include /usr/share/dpkg/buildtools.mk
++
++ifneq ($(filter $(DEB_HOST_ARCH),armel powerpc),)
++        export DEB_LDFLAGS_MAINT_APPEND= -latomic
++endif
++
++SONAME=8t64
++
++PREFIX=/usr
++LIBDIR=$(PREFIX)/lib/$(DEB_HOST_MULTIARCH)/
++
++override_dh_auto_clean:
++	dh_auto_clean
++	rm -f $(CURDIR)/libcrypto++.pc.in $(CURDIR)/config.log
++	rm -rf $(CURDIR)/html-docs/
++	# these will be re-generated
++	rm -f $(CURDIR)/debian/libcrypto++$(SONAME).links \
++		$(CURDIR)/debian/libcrypto++-dev.links
++
++override_dh_auto_build-arch:
++	PREFIX=$(PREFIX) LIBDIR=$(LIBDIR) dh_auto_build -a \
++	       -- all libcrypto++.pc
++
++override_dh_auto_build-indep:
++	doxygen
++
++override_dh_auto_install:
++	# use automake
++	PREFIX=$(PREFIX) LIBDIR=$(LIBDIR) dh_auto_install
++	# install test files
++	mkdir -p $(CURDIR)/debian/tmp/usr/share/crypto--/
++	cp -a $(CURDIR)/TestVectors $(CURDIR)/debian/tmp/usr/share/crypto--/
++	chmod a-x $(CURDIR)/debian/tmp/usr/share/crypto--/TestVectors/*.txt
++	cp -a $(CURDIR)/TestData $(CURDIR)/debian/tmp/usr/share/crypto--/
++	# install pkg-config file
++	mkdir -p $(CURDIR)/debian/tmp/usr/lib/${DEB_HOST_MULTIARCH}/pkgconfig/
++#	cp -a $(CURDIR)/*.pc \
++		$(CURDIR)/debian/tmp/usr/lib/${DEB_HOST_MULTIARCH}/pkgconfig/
++	# generate links files
++	sed s/ARCH/${DEB_HOST_MULTIARCH}/g \
++		$(CURDIR)/debian/libcrypto++$(SONAME).links.in \
++		>$(CURDIR)/debian/libcrypto++$(SONAME).links
++	sed s/ARCH/${DEB_HOST_MULTIARCH}/g \
++		$(CURDIR)/debian/libcrypto++-dev.links.in \
++		>$(CURDIR)/debian/libcrypto++-dev.links
++
++override_dh_auto_test-arch:
++ifeq (,$(filter nocheck,$(DEB_BUILD_OPTIONS)))
++	$(CURDIR)/cryptest v
++endif
++
++override_dh_auto_test-indep:
++
++override_dh_installdocs:
++	dh_installdocs
++	if [ -d "$(DOC_PKG_DIR)/usr/share/doc/libcrypto++-dev/html-docs" ]; then \
++		mv $(DOC_PKG_DIR)/usr/share/doc/libcrypto++-dev/html-docs \
++		$(DOC_PKG_DIR)/usr/share/doc/libcrypto++-dev/html; \
++	fi
++
++# skip files failing with "Unknown DWARF DW_OP_255" (see bug#949296)
++override_dh_dwz:
++	dh_dwz --exclude=usr/bin/cryptest \
++		--exclude=usr/lib/$(DEB_HOST_MULTIARCH)/libcrypto++.so.8.6.0
++
++%:
++	dh $@
++
++.PHONY: override_dh_auto_clean override_dh_auto_build-arch \
++	override_dh_auto_build-indep override_dh_auto_install \
++	override_dh_installdocs override_dh_dwz \
++	override_dh_auto_test-arch override_dh_auto_test-indep
diff --cc debian/source/format
index 0000000,0000000..163aaf8
new file mode 100644
--- /dev/null
+++ b/debian/source/format
@@@ -1,0 -1,0 +1,1 @@@
++3.0 (quilt)
diff --cc debian/watch
index 0000000,0000000..c2aad4d
new file mode 100644
--- /dev/null
+++ b/debian/watch
@@@ -1,0 -1,0 +1,5 @@@
++version=4
++opts=uversionmangle=s/(\d)_(\d)_(\d)/$1.$2.$3/;s/(\d)_(\d)/$1.$2/;s/(\d)[_\.\-\+]?((rc|pre|dev|beta|alpha|b|a)[\-\.]?\d*)$/$1~$2/i,\
++dversionmangle=s/\+(debian|dfsg|ds|deb)(\.?\d+)?$//i \
++https://github.com/weidai11/cryptopp/tags \
++(?:|.*/)CRYPTOPP_(\d\S*)@ARCHIVE_EXT@