libcrypto++.git
3 years agoManual merge of version 8.6.0-3+rpi1 and 8.7.0+git220824-1 to produce 8.7.0+git220824... bookworm-staging archive/raspbian/8.7.0+git220824-1+rpi1 raspbian/8.7.0+git220824-1+rpi1
Peter Michael Green [Tue, 15 Nov 2022 00:07:53 +0000 (00:07 +0000)]
Manual merge of version 8.6.0-3+rpi1 and 8.7.0+git220824-1 to produce 8.7.0+git220824-1+rpi1

3 years agoMerge libcrypto++ (8.7.0+git220824-1) import into refs/heads/workingbranch
Laszlo Boszormenyi (GCS) [Thu, 25 Aug 2022 17:44:25 +0000 (18:44 +0100)]
Merge libcrypto++ (8.7.0+git220824-1) import into refs/heads/workingbranch

3 years agouse crypto++ instead of cryptopp
Laszlo Boszormenyi (GCS) [Thu, 25 Aug 2022 17:44:25 +0000 (18:44 +0100)]
use crypto++ instead of cryptopp

Forwarded: not-needed
Last-Update: 2022-08-24

Gbp-Pq: Name fix_library_name.patch

3 years agolibcrypto++ (8.7.0+git220824-1) unstable; urgency=medium
Laszlo Boszormenyi (GCS) [Thu, 25 Aug 2022 17:44:25 +0000 (18:44 +0100)]
libcrypto++ (8.7.0+git220824-1) unstable; urgency=medium

  * New git snapshot release.

[dgit import unpatched libcrypto++ 8.7.0+git220824-1]

3 years agoImport libcrypto++_8.7.0+git220824.orig.tar.gz
Laszlo Boszormenyi (GCS) [Thu, 25 Aug 2022 17:44:25 +0000 (18:44 +0100)]
Import libcrypto++_8.7.0+git220824.orig.tar.gz

[dgit import orig libcrypto++_8.7.0+git220824.orig.tar.gz]

3 years agoImport libcrypto++_8.7.0+git220824-1.debian.tar.xz
Laszlo Boszormenyi (GCS) [Thu, 25 Aug 2022 17:44:25 +0000 (18:44 +0100)]
Import libcrypto++_8.7.0+git220824-1.debian.tar.xz

[dgit import tarball libcrypto++ 8.7.0+git220824-1 libcrypto++_8.7.0+git220824-1.debian.tar.xz]

3 years agoMerge libcrypto++ (8.6.0-3+rpi1) import into refs/heads/workingbranch
Peter Michael Green [Sat, 19 Mar 2022 22:09:41 +0000 (22:09 +0000)]
Merge libcrypto++ (8.6.0-3+rpi1) import into refs/heads/workingbranch

3 years agopass -march=armv7+fp when building "armv4" assembler files.
Peter Michael Green [Sat, 19 Mar 2022 22:09:41 +0000 (22:09 +0000)]
pass -march=armv7+fp when building "armv4" assembler files.

despite the names these only seem to be used for armv7, and contain
neon implementations which won't be built if no -march is specified

Gbp-Pq: Name use-fp-with-march.patch

3 years agouse crypto++ instead of cryptopp
Laszlo Boszormenyi (GCS) [Sat, 19 Mar 2022 22:09:41 +0000 (22:09 +0000)]
use crypto++ instead of cryptopp

Forwarded: not-needed
Last-Update: 2022-02-12

Gbp-Pq: Name fix_library_name.patch

3 years ago[PATCH] Don't use -march=armv7 when compiler already offers it (GH #1094)
Jeffrey Walton [Thu, 10 Feb 2022 23:56:24 +0000 (18:56 -0500)]
[PATCH] Don't use -march=armv7 when compiler already offers it (GH #1094)

Gbp-Pq: Name armhf_FTBFS_fix.patch

3 years agoGNUmakefile_update
Laszlo Boszormenyi (GCS) [Sat, 19 Mar 2022 22:09:41 +0000 (22:09 +0000)]
GNUmakefile_update

Gbp-Pq: Name GNUmakefile_update.patch

3 years agolibcrypto++ (8.6.0-3+rpi1) bookworm-staging; urgency=medium
Peter Michael Green [Sat, 19 Mar 2022 22:09:41 +0000 (22:09 +0000)]
libcrypto++ (8.6.0-3+rpi1) bookworm-staging; urgency=medium

  * Upload to raspbian despite detection of armv7 contaimination,
    investigation of the code shows that the armv7/neon code seems
    to be safely behind runtime CPU testection.
  * Pass -march=armv7+fp instead of -march=armv7 when building "armv4"
    assembler files. Despite the names these files only seem to be used
    on armv7.

[dgit import unpatched libcrypto++ 8.6.0-3+rpi1]

3 years agoImport libcrypto++_8.6.0-3+rpi1.debian.tar.xz
Peter Michael Green [Sat, 19 Mar 2022 22:09:41 +0000 (22:09 +0000)]
Import libcrypto++_8.6.0-3+rpi1.debian.tar.xz

[dgit import tarball libcrypto++ 8.6.0-3+rpi1 libcrypto++_8.6.0-3+rpi1.debian.tar.xz]

3 years agoMerge libcrypto++ (8.6.0-3) import into refs/heads/workingbranch
Laszlo Boszormenyi (GCS) [Sat, 12 Feb 2022 09:39:14 +0000 (09:39 +0000)]
Merge libcrypto++ (8.6.0-3) import into refs/heads/workingbranch

3 years agouse crypto++ instead of cryptopp
Laszlo Boszormenyi (GCS) [Sat, 12 Feb 2022 09:39:14 +0000 (09:39 +0000)]
use crypto++ instead of cryptopp

Forwarded: not-needed
Last-Update: 2022-02-12

Gbp-Pq: Name fix_library_name.patch

3 years ago[PATCH] Don't use -march=armv7 when compiler already offers it (GH #1094)
Jeffrey Walton [Thu, 10 Feb 2022 23:56:24 +0000 (18:56 -0500)]
[PATCH] Don't use -march=armv7 when compiler already offers it (GH #1094)

Gbp-Pq: Name armhf_FTBFS_fix.patch

3 years agoGNUmakefile_update
Laszlo Boszormenyi (GCS) [Sat, 12 Feb 2022 09:39:14 +0000 (09:39 +0000)]
GNUmakefile_update

Gbp-Pq: Name GNUmakefile_update.patch

3 years agolibcrypto++ (8.6.0-3) unstable; urgency=medium
Laszlo Boszormenyi (GCS) [Sat, 12 Feb 2022 09:39:14 +0000 (09:39 +0000)]
libcrypto++ (8.6.0-3) unstable; urgency=medium

  * Fix armhf FTBFS (closes: #1001995).

[dgit import unpatched libcrypto++ 8.6.0-3]

3 years agoImport libcrypto++_8.6.0-3.debian.tar.xz
Laszlo Boszormenyi (GCS) [Sat, 12 Feb 2022 09:39:14 +0000 (09:39 +0000)]
Import libcrypto++_8.6.0-3.debian.tar.xz

[dgit import tarball libcrypto++ 8.6.0-3 libcrypto++_8.6.0-3.debian.tar.xz]

4 years agoImport libcrypto++_8.6.0.orig.tar.gz
Laszlo Boszormenyi (GCS) [Sat, 25 Sep 2021 09:23:06 +0000 (10:23 +0100)]
Import libcrypto++_8.6.0.orig.tar.gz

[dgit import orig libcrypto++_8.6.0.orig.tar.gz]

4 years agoMerge libcrypto++ (8.4.0-1) import into refs/heads/workingbranch
Laszlo Boszormenyi (GCS) [Sat, 2 Jan 2021 07:22:09 +0000 (07:22 +0000)]
Merge libcrypto++ (8.4.0-1) import into refs/heads/workingbranch

4 years agouse crypto++ instead of cryptopp
Laszlo Boszormenyi (GCS) [Sat, 2 Jan 2021 07:22:09 +0000 (07:22 +0000)]
use crypto++ instead of cryptopp

Forwarded: not-needed
Last-Update: 2021-01-02

Gbp-Pq: Name fix_library_name.patch

4 years agolibcrypto++ (8.4.0-1) unstable; urgency=medium
Laszlo Boszormenyi (GCS) [Sat, 2 Jan 2021 07:22:09 +0000 (07:22 +0000)]
libcrypto++ (8.4.0-1) unstable; urgency=medium

  * New upstream release.
  * Update patches.

[dgit import unpatched libcrypto++ 8.4.0-1]

4 years agoImport libcrypto++_8.4.0.orig.tar.gz
Laszlo Boszormenyi (GCS) [Sat, 2 Jan 2021 07:22:09 +0000 (07:22 +0000)]
Import libcrypto++_8.4.0.orig.tar.gz

[dgit import orig libcrypto++_8.4.0.orig.tar.gz]

4 years agoImport libcrypto++_8.4.0-1.debian.tar.xz
Laszlo Boszormenyi (GCS) [Sat, 2 Jan 2021 07:22:09 +0000 (07:22 +0000)]
Import libcrypto++_8.4.0-1.debian.tar.xz

[dgit import tarball libcrypto++ 8.4.0-1 libcrypto++_8.4.0-1.debian.tar.xz]

8 years agoMerge libcrypto++ (5.6.4-8) import into refs/heads/workingbranch
Laszlo Boszormenyi (GCS) [Tue, 27 Jun 2017 19:04:20 +0000 (20:04 +0100)]
Merge libcrypto++ (5.6.4-8) import into refs/heads/workingbranch

8 years agoAdd Inflator::BadDistanceErr exception
Jeffrey Walton [Tue, 27 Jun 2017 19:04:20 +0000 (20:04 +0100)]
Add Inflator::BadDistanceErr exception

Origin: upstream, https://github.com/weidai11/cryptopp/commit/07dbcc3d9644b18e05c1776db2a57fe04d780965
Bug: https://github.com/weidai11/cryptopp/issues/414
Last-Update: 2017-06-05

The improved validation and excpetion clears the Address Sanitizer and
Undefined Behavior Sanitizer findings

Gbp-Pq: Name zinflate-564.diff

8 years ago[PATCH] Add additional validations based on X.690 rules
Jeffrey Walton [Sat, 24 Dec 2016 09:55:21 +0000 (04:55 -0500)]
[PATCH] Add additional validations based on X.690 rules

The library was a tad bit fast and loose with respect to parsing some of the ASN.1 presented to it. It was kind of like we used Alternate Encoding Rules (AER), which was more relaxed than BER, CER or DER. This commit closes most of the gaps.

The changes are distantly related to Issue 346. Issue 346 caught a CVE bcause of the transient DoS. These fixes did not surface with negative effcts. Rather, the library was a bit too accomodating to the point it was not conforming

Gbp-Pq: Name Additional_ASN.1_validations.patch

8 years ago[PATCH] Fix possible DoS in ASN.1 decoders (CVE-2016-9939)
Gergely Nagy [Wed, 14 Dec 2016 12:19:01 +0000 (13:19 +0100)]
[PATCH] Fix possible DoS in ASN.1 decoders (CVE-2016-9939)

Gbp-Pq: Name CVE-2016-9939.patch

8 years agointeger
Laszlo Boszormenyi (GCS) [Tue, 27 Jun 2017 19:04:20 +0000 (20:04 +0100)]
integer

Gbp-Pq: Name integer.diff

8 years ago[PATCH] Fix compile under Debian Hurd (i386) Debian Hurd defines __MACH__, and it...
Jeffrey Walton [Fri, 28 Oct 2016 04:33:43 +0000 (00:33 -0400)]
[PATCH] Fix compile under Debian Hurd (i386) Debian Hurd defines __MACH__, and it was picking up "#define CRYPTOPP_SECTION_INIT __attribute__((section (__DATA,__data)))" intended for Apple linkers

Gbp-Pq: Name Hurd-compile-fix.patch

8 years ago[PATCH] Fix potential zeroizer removal (Issue 331)
Jeffrey Walton [Tue, 1 Nov 2016 02:34:59 +0000 (22:34 -0400)]
[PATCH] Fix potential zeroizer removal (Issue 331)

Gbp-Pq: Name Fix_potential_zeroizer_removal.patch

8 years agolibcrypto++ (5.6.4-8) unstable; urgency=medium
Laszlo Boszormenyi (GCS) [Tue, 27 Jun 2017 19:04:20 +0000 (20:04 +0100)]
libcrypto++ (5.6.4-8) unstable; urgency=medium

  * Install all headers (closes: #866100).
  * Update watch file (closes: #862876).
  * Update Standards-Version to 4.0.0 and debhelper level to 10 .

[dgit import unpatched libcrypto++ 5.6.4-8]

8 years agoImport libcrypto++_5.6.4-8.debian.tar.xz
Laszlo Boszormenyi (GCS) [Tue, 27 Jun 2017 19:04:20 +0000 (20:04 +0100)]
Import libcrypto++_5.6.4-8.debian.tar.xz

[dgit import tarball libcrypto++ 5.6.4-8 libcrypto++_5.6.4-8.debian.tar.xz]

8 years agoAdd Inflator::BadDistanceErr exception
Jeffrey Walton [Mon, 5 Jun 2017 06:55:28 +0000 (07:55 +0100)]
Add Inflator::BadDistanceErr exception

Origin: upstream, https://github.com/weidai11/cryptopp/commit/07dbcc3d9644b18e05c1776db2a57fe04d780965
Bug: https://github.com/weidai11/cryptopp/issues/414
Last-Update: 2017-06-05

The improved validation and excpetion clears the Address Sanitizer and
Undefined Behavior Sanitizer findings

Gbp-Pq: Name zinflate-564.diff

8 years ago[PATCH] Add additional validations based on X.690 rules
Jeffrey Walton [Sat, 24 Dec 2016 09:55:21 +0000 (04:55 -0500)]
[PATCH] Add additional validations based on X.690 rules

The library was a tad bit fast and loose with respect to parsing some of the ASN.1 presented to it. It was kind of like we used Alternate Encoding Rules (AER), which was more relaxed than BER, CER or DER. This commit closes most of the gaps.

The changes are distantly related to Issue 346. Issue 346 caught a CVE bcause of the transient DoS. These fixes did not surface with negative effcts. Rather, the library was a bit too accomodating to the point it was not conforming

Gbp-Pq: Name Additional_ASN.1_validations.patch

8 years ago[PATCH] Fix possible DoS in ASN.1 decoders (CVE-2016-9939)
Gergely Nagy [Wed, 14 Dec 2016 12:19:01 +0000 (13:19 +0100)]
[PATCH] Fix possible DoS in ASN.1 decoders (CVE-2016-9939)

Gbp-Pq: Name CVE-2016-9939.patch

8 years agointeger
Laszlo Boszormenyi (GCS) [Mon, 5 Jun 2017 06:55:28 +0000 (07:55 +0100)]
integer

Gbp-Pq: Name integer.diff

8 years ago[PATCH] Fix compile under Debian Hurd (i386) Debian Hurd defines __MACH__, and it...
Jeffrey Walton [Fri, 28 Oct 2016 04:33:43 +0000 (00:33 -0400)]
[PATCH] Fix compile under Debian Hurd (i386) Debian Hurd defines __MACH__, and it was picking up "#define CRYPTOPP_SECTION_INIT __attribute__((section (__DATA,__data)))" intended for Apple linkers

Gbp-Pq: Name Hurd-compile-fix.patch

8 years ago[PATCH] Fix potential zeroizer removal (Issue 331)
Jeffrey Walton [Tue, 1 Nov 2016 02:34:59 +0000 (22:34 -0400)]
[PATCH] Fix potential zeroizer removal (Issue 331)

Gbp-Pq: Name Fix_potential_zeroizer_removal.patch

8 years agolibcrypto++ (5.6.4-7) unstable; urgency=high
Laszlo Boszormenyi (GCS) [Mon, 5 Jun 2017 06:55:28 +0000 (07:55 +0100)]
libcrypto++ (5.6.4-7) unstable; urgency=high

  * Backport security fix for out-of-bounds read in zinflate.

[dgit import unpatched libcrypto++ 5.6.4-7]

8 years agoImport libcrypto++_5.6.4-7.debian.tar.xz
Laszlo Boszormenyi (GCS) [Mon, 5 Jun 2017 06:55:28 +0000 (07:55 +0100)]
Import libcrypto++_5.6.4-7.debian.tar.xz

[dgit import tarball libcrypto++ 5.6.4-7 libcrypto++_5.6.4-7.debian.tar.xz]

9 years agoImport libcrypto++_5.6.4.orig.tar.xz
Laszlo Boszormenyi (GCS) [Sat, 8 Oct 2016 16:27:30 +0000 (17:27 +0100)]
Import libcrypto++_5.6.4.orig.tar.xz

[dgit import orig libcrypto++_5.6.4.orig.tar.xz]