summary |
shortlog | log |
commit |
commitdiff |
tree
first ⋅ prev ⋅ next
Raspbian automatic forward porter [Sun, 2 Jun 2024 07:36:45 +0000 (08:36 +0100)]
Merge version 8.9.0-1+rpi1 and 8.9.0-1.1 to produce 8.9.0-1.1+rpi1
Benjamin Drung [Wed, 28 Feb 2024 10:39:14 +0000 (10:39 +0000)]
Merge libcrypto++ (8.9.0-1.1) import into refs/heads/workingbranch
Laszlo Boszormenyi (GCS) [Wed, 28 Feb 2024 10:39:14 +0000 (10:39 +0000)]
use crypto++ instead of cryptopp
Forwarded: not-needed
Last-Update: 2023-10-01
Gbp-Pq: Name fix_library_name.patch
Benjamin Drung [Wed, 28 Feb 2024 10:39:14 +0000 (10:39 +0000)]
libcrypto++ (8.9.0-1.1) unstable; urgency=medium
* Non-maintainer upload.
* Rename libraries for 64-bit time_t transition. Closes: #
1062265
[dgit import unpatched libcrypto++ 8.9.0-1.1]
Benjamin Drung [Wed, 28 Feb 2024 10:39:14 +0000 (10:39 +0000)]
Import libcrypto++_8.9.0-1.1.debian.tar.xz
[dgit import tarball libcrypto++ 8.9.0-1.1 libcrypto++_8.9.0-1.1.debian.tar.xz]
Peter Michael Green [Sat, 6 Jan 2024 13:43:29 +0000 (13:43 +0000)]
update quilt patch.
Peter Michael Green [Sat, 6 Jan 2024 13:37:51 +0000 (13:37 +0000)]
Manual merge of version 8.7.0+git220824-1+rpi1 and 8.9.0-1 to produce 8.9.0-1+rpi1
Laszlo Boszormenyi (GCS) [Mon, 2 Oct 2023 15:51:51 +0000 (16:51 +0100)]
Merge libcrypto++ (8.9.0-1) import into refs/heads/workingbranch
Laszlo Boszormenyi (GCS) [Mon, 2 Oct 2023 15:51:51 +0000 (17:51 +0200)]
Import libcrypto++_8.9.0.orig.tar.gz
[dgit import orig libcrypto++_8.9.0.orig.tar.gz]
Laszlo Boszormenyi (GCS) [Mon, 2 Oct 2023 15:51:51 +0000 (16:51 +0100)]
use crypto++ instead of cryptopp
Forwarded: not-needed
Last-Update: 2023-10-01
Gbp-Pq: Name fix_library_name.patch
Laszlo Boszormenyi (GCS) [Mon, 2 Oct 2023 15:51:51 +0000 (16:51 +0100)]
libcrypto++ (8.9.0-1) unstable; urgency=medium
* New upstream release.
[dgit import unpatched libcrypto++ 8.9.0-1]
Laszlo Boszormenyi (GCS) [Mon, 2 Oct 2023 15:51:51 +0000 (16:51 +0100)]
Import libcrypto++_8.9.0.orig.tar.gz
[dgit import orig libcrypto++_8.9.0.orig.tar.gz]
Laszlo Boszormenyi (GCS) [Mon, 2 Oct 2023 15:51:51 +0000 (16:51 +0100)]
Import libcrypto++_8.9.0-1.debian.tar.xz
[dgit import tarball libcrypto++ 8.9.0-1 libcrypto++_8.9.0-1.debian.tar.xz]
Laszlo Boszormenyi (GCS) [Thu, 7 Sep 2023 07:25:20 +0000 (08:25 +0100)]
Merge libcrypto++ (8.8.0-2) import into refs/heads/workingbranch
Laszlo Boszormenyi (GCS) [Thu, 7 Sep 2023 07:25:20 +0000 (08:25 +0100)]
<short summary of the patch>
TODO: Put a short summary on the line above and replace this paragraph
with a longer explanation of this change. Complete the meta-information
with other relevant fields (see below for details). To make it easier, the
information below has been extracted from the changelog. Adjust it or drop
it.
libcrypto++ (8.8.0-1) UNRELEASED; urgency=medium
*
Gbp-Pq: Name test.patch
Laszlo Boszormenyi (GCS) [Thu, 7 Sep 2023 07:25:20 +0000 (08:25 +0100)]
libcrypto++ (8.8.0-2) unstable; urgency=medium
* Update watch file.
* Update Standards-Version to 4.6.2 .
[dgit import unpatched libcrypto++ 8.8.0-2]
Laszlo Boszormenyi (GCS) [Thu, 7 Sep 2023 07:25:20 +0000 (08:25 +0100)]
Import libcrypto++_8.8.0-2.debian.tar.xz
[dgit import tarball libcrypto++ 8.8.0-2 libcrypto++_8.8.0-2.debian.tar.xz]
Laszlo Boszormenyi (GCS) [Fri, 7 Jul 2023 15:20:07 +0000 (16:20 +0100)]
Import libcrypto++_8.8.0.orig.tar.gz
[dgit import orig libcrypto++_8.8.0.orig.tar.gz]
Peter Michael Green [Tue, 15 Nov 2022 00:07:53 +0000 (00:07 +0000)]
Manual merge of version 8.6.0-3+rpi1 and 8.7.0+git220824-1 to produce 8.7.0+git220824-1+rpi1
Laszlo Boszormenyi (GCS) [Thu, 25 Aug 2022 17:44:25 +0000 (18:44 +0100)]
Merge libcrypto++ (8.7.0+git220824-1) import into refs/heads/workingbranch
Laszlo Boszormenyi (GCS) [Thu, 25 Aug 2022 17:44:25 +0000 (18:44 +0100)]
use crypto++ instead of cryptopp
Forwarded: not-needed
Last-Update: 2022-08-24
Gbp-Pq: Name fix_library_name.patch
Laszlo Boszormenyi (GCS) [Thu, 25 Aug 2022 17:44:25 +0000 (18:44 +0100)]
libcrypto++ (8.7.0+git220824-1) unstable; urgency=medium
* New git snapshot release.
[dgit import unpatched libcrypto++ 8.7.0+git220824-1]
Laszlo Boszormenyi (GCS) [Thu, 25 Aug 2022 17:44:25 +0000 (18:44 +0100)]
Import libcrypto++_8.7.0+git220824.orig.tar.gz
[dgit import orig libcrypto++_8.7.0+git220824.orig.tar.gz]
Laszlo Boszormenyi (GCS) [Thu, 25 Aug 2022 17:44:25 +0000 (18:44 +0100)]
Import libcrypto++_8.7.0+git220824-1.debian.tar.xz
[dgit import tarball libcrypto++ 8.7.0+git220824-1 libcrypto++_8.7.0+git220824-1.debian.tar.xz]
Peter Michael Green [Sat, 19 Mar 2022 22:09:41 +0000 (22:09 +0000)]
Merge libcrypto++ (8.6.0-3+rpi1) import into refs/heads/workingbranch
Peter Michael Green [Sat, 19 Mar 2022 22:09:41 +0000 (22:09 +0000)]
pass -march=armv7+fp when building "armv4" assembler files.
despite the names these only seem to be used for armv7, and contain
neon implementations which won't be built if no -march is specified
Gbp-Pq: Name use-fp-with-march.patch
Laszlo Boszormenyi (GCS) [Sat, 19 Mar 2022 22:09:41 +0000 (22:09 +0000)]
use crypto++ instead of cryptopp
Forwarded: not-needed
Last-Update: 2022-02-12
Gbp-Pq: Name fix_library_name.patch
Jeffrey Walton [Thu, 10 Feb 2022 23:56:24 +0000 (18:56 -0500)]
[PATCH] Don't use -march=armv7 when compiler already offers it (GH #1094)
Gbp-Pq: Name armhf_FTBFS_fix.patch
Laszlo Boszormenyi (GCS) [Sat, 19 Mar 2022 22:09:41 +0000 (22:09 +0000)]
GNUmakefile_update
Gbp-Pq: Name GNUmakefile_update.patch
Peter Michael Green [Sat, 19 Mar 2022 22:09:41 +0000 (22:09 +0000)]
libcrypto++ (8.6.0-3+rpi1) bookworm-staging; urgency=medium
* Upload to raspbian despite detection of armv7 contaimination,
investigation of the code shows that the armv7/neon code seems
to be safely behind runtime CPU testection.
* Pass -march=armv7+fp instead of -march=armv7 when building "armv4"
assembler files. Despite the names these files only seem to be used
on armv7.
[dgit import unpatched libcrypto++ 8.6.0-3+rpi1]
Peter Michael Green [Sat, 19 Mar 2022 22:09:41 +0000 (22:09 +0000)]
Import libcrypto++_8.6.0-3+rpi1.debian.tar.xz
[dgit import tarball libcrypto++ 8.6.0-3+rpi1 libcrypto++_8.6.0-3+rpi1.debian.tar.xz]
Laszlo Boszormenyi (GCS) [Sat, 12 Feb 2022 09:39:14 +0000 (09:39 +0000)]
Merge libcrypto++ (8.6.0-3) import into refs/heads/workingbranch
Laszlo Boszormenyi (GCS) [Sat, 12 Feb 2022 09:39:14 +0000 (09:39 +0000)]
use crypto++ instead of cryptopp
Forwarded: not-needed
Last-Update: 2022-02-12
Gbp-Pq: Name fix_library_name.patch
Jeffrey Walton [Thu, 10 Feb 2022 23:56:24 +0000 (18:56 -0500)]
[PATCH] Don't use -march=armv7 when compiler already offers it (GH #1094)
Gbp-Pq: Name armhf_FTBFS_fix.patch
Laszlo Boszormenyi (GCS) [Sat, 12 Feb 2022 09:39:14 +0000 (09:39 +0000)]
GNUmakefile_update
Gbp-Pq: Name GNUmakefile_update.patch
Laszlo Boszormenyi (GCS) [Sat, 12 Feb 2022 09:39:14 +0000 (09:39 +0000)]
libcrypto++ (8.6.0-3) unstable; urgency=medium
* Fix armhf FTBFS (closes: #
1001995).
[dgit import unpatched libcrypto++ 8.6.0-3]
Laszlo Boszormenyi (GCS) [Sat, 12 Feb 2022 09:39:14 +0000 (09:39 +0000)]
Import libcrypto++_8.6.0-3.debian.tar.xz
[dgit import tarball libcrypto++ 8.6.0-3 libcrypto++_8.6.0-3.debian.tar.xz]
Laszlo Boszormenyi (GCS) [Sat, 25 Sep 2021 09:23:06 +0000 (10:23 +0100)]
Import libcrypto++_8.6.0.orig.tar.gz
[dgit import orig libcrypto++_8.6.0.orig.tar.gz]
Laszlo Boszormenyi (GCS) [Sat, 2 Jan 2021 07:22:09 +0000 (07:22 +0000)]
Merge libcrypto++ (8.4.0-1) import into refs/heads/workingbranch
Laszlo Boszormenyi (GCS) [Sat, 2 Jan 2021 07:22:09 +0000 (07:22 +0000)]
use crypto++ instead of cryptopp
Forwarded: not-needed
Last-Update: 2021-01-02
Gbp-Pq: Name fix_library_name.patch
Laszlo Boszormenyi (GCS) [Sat, 2 Jan 2021 07:22:09 +0000 (07:22 +0000)]
libcrypto++ (8.4.0-1) unstable; urgency=medium
* New upstream release.
* Update patches.
[dgit import unpatched libcrypto++ 8.4.0-1]
Laszlo Boszormenyi (GCS) [Sat, 2 Jan 2021 07:22:09 +0000 (07:22 +0000)]
Import libcrypto++_8.4.0.orig.tar.gz
[dgit import orig libcrypto++_8.4.0.orig.tar.gz]
Laszlo Boszormenyi (GCS) [Sat, 2 Jan 2021 07:22:09 +0000 (07:22 +0000)]
Import libcrypto++_8.4.0-1.debian.tar.xz
[dgit import tarball libcrypto++ 8.4.0-1 libcrypto++_8.4.0-1.debian.tar.xz]
Laszlo Boszormenyi (GCS) [Tue, 27 Jun 2017 19:04:20 +0000 (20:04 +0100)]
Merge libcrypto++ (5.6.4-8) import into refs/heads/workingbranch
Jeffrey Walton [Tue, 27 Jun 2017 19:04:20 +0000 (20:04 +0100)]
Add Inflator::BadDistanceErr exception
Origin: upstream, https://github.com/weidai11/cryptopp/commit/
07dbcc3d9644b18e05c1776db2a57fe04d780965
Bug: https://github.com/weidai11/cryptopp/issues/414
Last-Update: 2017-06-05
The improved validation and excpetion clears the Address Sanitizer and
Undefined Behavior Sanitizer findings
Gbp-Pq: Name zinflate-564.diff
Jeffrey Walton [Sat, 24 Dec 2016 09:55:21 +0000 (04:55 -0500)]
[PATCH] Add additional validations based on X.690 rules
The library was a tad bit fast and loose with respect to parsing some of the ASN.1 presented to it. It was kind of like we used Alternate Encoding Rules (AER), which was more relaxed than BER, CER or DER. This commit closes most of the gaps.
The changes are distantly related to Issue 346. Issue 346 caught a CVE bcause of the transient DoS. These fixes did not surface with negative effcts. Rather, the library was a bit too accomodating to the point it was not conforming
Gbp-Pq: Name Additional_ASN.1_validations.patch
Gergely Nagy [Wed, 14 Dec 2016 12:19:01 +0000 (13:19 +0100)]
[PATCH] Fix possible DoS in ASN.1 decoders (CVE-2016-9939)
Gbp-Pq: Name CVE-2016-9939.patch
Laszlo Boszormenyi (GCS) [Tue, 27 Jun 2017 19:04:20 +0000 (20:04 +0100)]
integer
Gbp-Pq: Name integer.diff
Jeffrey Walton [Fri, 28 Oct 2016 04:33:43 +0000 (00:33 -0400)]
[PATCH] Fix compile under Debian Hurd (i386) Debian Hurd defines __MACH__, and it was picking up "#define CRYPTOPP_SECTION_INIT __attribute__((section (__DATA,__data)))" intended for Apple linkers
Gbp-Pq: Name Hurd-compile-fix.patch
Jeffrey Walton [Tue, 1 Nov 2016 02:34:59 +0000 (22:34 -0400)]
[PATCH] Fix potential zeroizer removal (Issue 331)
Gbp-Pq: Name Fix_potential_zeroizer_removal.patch
Laszlo Boszormenyi (GCS) [Tue, 27 Jun 2017 19:04:20 +0000 (20:04 +0100)]
libcrypto++ (5.6.4-8) unstable; urgency=medium
* Install all headers (closes: #866100).
* Update watch file (closes: #862876).
* Update Standards-Version to 4.0.0 and debhelper level to 10 .
[dgit import unpatched libcrypto++ 5.6.4-8]
Laszlo Boszormenyi (GCS) [Tue, 27 Jun 2017 19:04:20 +0000 (20:04 +0100)]
Import libcrypto++_5.6.4-8.debian.tar.xz
[dgit import tarball libcrypto++ 5.6.4-8 libcrypto++_5.6.4-8.debian.tar.xz]
Jeffrey Walton [Mon, 5 Jun 2017 06:55:28 +0000 (07:55 +0100)]
Add Inflator::BadDistanceErr exception
Origin: upstream, https://github.com/weidai11/cryptopp/commit/
07dbcc3d9644b18e05c1776db2a57fe04d780965
Bug: https://github.com/weidai11/cryptopp/issues/414
Last-Update: 2017-06-05
The improved validation and excpetion clears the Address Sanitizer and
Undefined Behavior Sanitizer findings
Gbp-Pq: Name zinflate-564.diff
Jeffrey Walton [Sat, 24 Dec 2016 09:55:21 +0000 (04:55 -0500)]
[PATCH] Add additional validations based on X.690 rules
The library was a tad bit fast and loose with respect to parsing some of the ASN.1 presented to it. It was kind of like we used Alternate Encoding Rules (AER), which was more relaxed than BER, CER or DER. This commit closes most of the gaps.
The changes are distantly related to Issue 346. Issue 346 caught a CVE bcause of the transient DoS. These fixes did not surface with negative effcts. Rather, the library was a bit too accomodating to the point it was not conforming
Gbp-Pq: Name Additional_ASN.1_validations.patch
Gergely Nagy [Wed, 14 Dec 2016 12:19:01 +0000 (13:19 +0100)]
[PATCH] Fix possible DoS in ASN.1 decoders (CVE-2016-9939)
Gbp-Pq: Name CVE-2016-9939.patch
Laszlo Boszormenyi (GCS) [Mon, 5 Jun 2017 06:55:28 +0000 (07:55 +0100)]
integer
Gbp-Pq: Name integer.diff
Jeffrey Walton [Fri, 28 Oct 2016 04:33:43 +0000 (00:33 -0400)]
[PATCH] Fix compile under Debian Hurd (i386) Debian Hurd defines __MACH__, and it was picking up "#define CRYPTOPP_SECTION_INIT __attribute__((section (__DATA,__data)))" intended for Apple linkers
Gbp-Pq: Name Hurd-compile-fix.patch
Jeffrey Walton [Tue, 1 Nov 2016 02:34:59 +0000 (22:34 -0400)]
[PATCH] Fix potential zeroizer removal (Issue 331)
Gbp-Pq: Name Fix_potential_zeroizer_removal.patch
Laszlo Boszormenyi (GCS) [Mon, 5 Jun 2017 06:55:28 +0000 (07:55 +0100)]
libcrypto++ (5.6.4-7) unstable; urgency=high
* Backport security fix for out-of-bounds read in zinflate.
[dgit import unpatched libcrypto++ 5.6.4-7]
Laszlo Boszormenyi (GCS) [Mon, 5 Jun 2017 06:55:28 +0000 (07:55 +0100)]
Import libcrypto++_5.6.4-7.debian.tar.xz
[dgit import tarball libcrypto++ 5.6.4-7 libcrypto++_5.6.4-7.debian.tar.xz]
Laszlo Boszormenyi (GCS) [Sat, 8 Oct 2016 16:27:30 +0000 (17:27 +0100)]
Import libcrypto++_5.6.4.orig.tar.xz
[dgit import orig libcrypto++_5.6.4.orig.tar.xz]