head 1.17; access; symbols pkgsrc-2023Q4:1.17.0.10 pkgsrc-2023Q4-base:1.17 pkgsrc-2023Q3:1.17.0.8 pkgsrc-2023Q3-base:1.17 pkgsrc-2023Q2:1.17.0.6 pkgsrc-2023Q2-base:1.17 pkgsrc-2023Q1:1.17.0.4 pkgsrc-2023Q1-base:1.17 pkgsrc-2022Q4:1.17.0.2 pkgsrc-2022Q4-base:1.17 pkgsrc-2022Q3:1.16.0.8 pkgsrc-2022Q3-base:1.16 pkgsrc-2022Q2:1.16.0.6 pkgsrc-2022Q2-base:1.16 pkgsrc-2022Q1:1.16.0.4 pkgsrc-2022Q1-base:1.16 pkgsrc-2021Q4:1.16.0.2 pkgsrc-2021Q4-base:1.16 pkgsrc-2021Q3:1.14.0.14 pkgsrc-2021Q3-base:1.14 pkgsrc-2021Q2:1.14.0.12 pkgsrc-2021Q2-base:1.14 pkgsrc-2021Q1:1.14.0.10 pkgsrc-2021Q1-base:1.14 pkgsrc-2020Q4:1.14.0.8 pkgsrc-2020Q4-base:1.14 pkgsrc-2020Q3:1.14.0.6 pkgsrc-2020Q3-base:1.14 pkgsrc-2020Q2:1.14.0.4 pkgsrc-2020Q2-base:1.14 pkgsrc-2020Q1:1.14.0.2 pkgsrc-2020Q1-base:1.14 pkgsrc-2019Q4:1.13.0.8 pkgsrc-2019Q4-base:1.13 pkgsrc-2019Q3:1.13.0.4 pkgsrc-2019Q3-base:1.13 pkgsrc-2019Q2:1.13.0.2 pkgsrc-2019Q2-base:1.13 pkgsrc-2019Q1:1.12.0.18 pkgsrc-2019Q1-base:1.12 pkgsrc-2018Q4:1.12.0.16 pkgsrc-2018Q4-base:1.12 pkgsrc-2018Q3:1.12.0.14 pkgsrc-2018Q3-base:1.12 pkgsrc-2018Q2:1.12.0.12 pkgsrc-2018Q2-base:1.12 pkgsrc-2018Q1:1.12.0.10 pkgsrc-2018Q1-base:1.12 pkgsrc-2017Q4:1.12.0.8 pkgsrc-2017Q4-base:1.12 pkgsrc-2017Q3:1.12.0.6 pkgsrc-2017Q3-base:1.12 pkgsrc-2017Q2:1.12.0.2 pkgsrc-2017Q2-base:1.12 pkgsrc-2017Q1:1.11.0.12 pkgsrc-2017Q1-base:1.11 pkgsrc-2016Q4:1.11.0.10 pkgsrc-2016Q4-base:1.11 pkgsrc-2016Q3:1.11.0.8 pkgsrc-2016Q3-base:1.11 pkgsrc-2016Q2:1.11.0.6 pkgsrc-2016Q2-base:1.11 pkgsrc-2016Q1:1.11.0.4 pkgsrc-2016Q1-base:1.11 pkgsrc-2015Q4:1.11.0.2 pkgsrc-2015Q4-base:1.11 pkgsrc-2015Q3:1.10.0.18 pkgsrc-2015Q3-base:1.10 pkgsrc-2015Q2:1.10.0.16 pkgsrc-2015Q2-base:1.10 pkgsrc-2015Q1:1.10.0.14 pkgsrc-2015Q1-base:1.10 pkgsrc-2014Q4:1.10.0.12 pkgsrc-2014Q4-base:1.10 pkgsrc-2014Q3:1.10.0.10 pkgsrc-2014Q3-base:1.10 pkgsrc-2014Q2:1.10.0.8 pkgsrc-2014Q2-base:1.10 pkgsrc-2014Q1:1.10.0.6 pkgsrc-2014Q1-base:1.10 pkgsrc-2013Q4:1.10.0.4 pkgsrc-2013Q4-base:1.10 pkgsrc-2013Q3:1.10.0.2 pkgsrc-2013Q3-base:1.10 pkgsrc-2013Q2:1.7.0.2 pkgsrc-2013Q2-base:1.7 pkgsrc-2013Q1:1.6.0.4 pkgsrc-2013Q1-base:1.6 pkgsrc-2012Q4:1.6.0.2 pkgsrc-2012Q4-base:1.6 pkgsrc-2012Q3:1.5.0.4 pkgsrc-2012Q3-base:1.5 pkgsrc-2012Q2:1.5.0.2 pkgsrc-2012Q2-base:1.5 pkgsrc-2012Q1:1.4.0.40 pkgsrc-2012Q1-base:1.4 pkgsrc-2011Q4:1.4.0.38 pkgsrc-2011Q4-base:1.4 pkgsrc-2011Q3:1.4.0.36 pkgsrc-2011Q3-base:1.4 pkgsrc-2011Q2:1.4.0.34 pkgsrc-2011Q2-base:1.4 pkgsrc-2011Q1:1.4.0.32 pkgsrc-2011Q1-base:1.4 pkgsrc-2010Q4:1.4.0.30 pkgsrc-2010Q4-base:1.4 pkgsrc-2010Q3:1.4.0.28 pkgsrc-2010Q3-base:1.4 pkgsrc-2010Q2:1.4.0.26 pkgsrc-2010Q2-base:1.4 pkgsrc-2010Q1:1.4.0.24 pkgsrc-2010Q1-base:1.4 pkgsrc-2009Q4:1.4.0.22 pkgsrc-2009Q4-base:1.4 pkgsrc-2009Q3:1.4.0.20 pkgsrc-2009Q3-base:1.4 pkgsrc-2009Q2:1.4.0.18 pkgsrc-2009Q2-base:1.4 pkgsrc-2009Q1:1.4.0.16 pkgsrc-2009Q1-base:1.4 pkgsrc-2008Q4:1.4.0.14 pkgsrc-2008Q4-base:1.4 pkgsrc-2008Q3:1.4.0.12 pkgsrc-2008Q3-base:1.4 cube-native-xorg:1.4.0.10 cube-native-xorg-base:1.4 pkgsrc-2008Q2:1.4.0.8 pkgsrc-2008Q2-base:1.4 cwrapper:1.4.0.6 pkgsrc-2008Q1:1.4.0.4 pkgsrc-2008Q1-base:1.4 pkgsrc-2007Q4:1.4.0.2 pkgsrc-2007Q4-base:1.4 pkgsrc-2007Q3:1.3.0.22 pkgsrc-2007Q3-base:1.3 pkgsrc-2007Q2:1.3.0.20 pkgsrc-2007Q2-base:1.3 pkgsrc-2007Q1:1.3.0.18 pkgsrc-2007Q1-base:1.3 pkgsrc-2006Q4:1.3.0.16 pkgsrc-2006Q4-base:1.3 pkgsrc-2006Q3:1.3.0.14 pkgsrc-2006Q3-base:1.3 pkgsrc-2006Q2:1.3.0.12 pkgsrc-2006Q2-base:1.3 pkgsrc-2006Q1:1.3.0.10 pkgsrc-2006Q1-base:1.3 pkgsrc-2005Q4:1.3.0.8 pkgsrc-2005Q4-base:1.3 pkgsrc-2005Q3:1.3.0.6 pkgsrc-2005Q3-base:1.3 pkgsrc-2005Q2:1.3.0.4 pkgsrc-2005Q2-base:1.3 pkgsrc-2005Q1:1.3.0.2 pkgsrc-2005Q1-base:1.3 pkgsrc-2004Q4:1.1.1.1.0.4 pkgsrc-2004Q4-base:1.1.1.1 pkgsrc-2004Q3:1.1.1.1.0.2 pkgsrc-2004Q3-base:1.1.1.1 pkgsrc-base:1.1.1.1 TNF:1.1.1; locks; strict; comment @# @; 1.17 date 2022.10.02.16.20.26; author nros; state Exp; branches; next 1.16; commitid NKVz6xqSE4Y87aWD; 1.16 date 2021.10.26.11.17.02; author nia; state Exp; branches; next 1.15; commitid PNswNV9GDLZeojeD; 1.15 date 2021.10.07.14.53.45; author nia; state Exp; branches; next 1.14; commitid nfjKlj1wTplMcTbD; 1.14 date 2020.03.22.17.52.51; author tnn; state Exp; branches; next 1.13; commitid iQULNLwUgIddkq1C; 1.13 date 2019.06.05.19.06.07; author adam; state Exp; branches; next 1.12; commitid ixUMiZMfW6JX42qB; 1.12 date 2017.05.18.21.20.23; author adam; state Exp; branches; next 1.11; commitid pe77fsOPyb91SURz; 1.11 date 2015.11.04.01.17.42; author agc; state Exp; branches 1.11.12.1; next 1.10; commitid agUNgZr58GM2fIHy; 1.10 date 2013.08.24.08.16.12; author ryoon; state Exp; branches; next 1.9; commitid jTEqKwdoNyzllG2x; 1.9 date 2013.08.22.13.15.04; author ryoon; state Exp; branches; next 1.8; commitid S6URagUONSIL3s2x; 1.8 date 2013.08.22.12.53.14; author ryoon; state Exp; branches; next 1.7; commitid lhDdj7tdIxJoWr2x; 1.7 date 2013.06.12.12.00.08; author ryoon; state Exp; branches; next 1.6; commitid MPvXF3X4mlbEVjTw; 1.6 date 2012.12.22.02.29.36; author joerg; state Exp; branches; next 1.5; 1.5 date 2012.04.17.17.46.30; author joerg; state Exp; branches; next 1.4; 1.4 date 2007.12.01.04.17.51; author rillig; state Exp; branches; next 1.3; 1.3 date 2005.03.19.16.48.21; author wiz; state Exp; branches; next 1.2; 1.2 date 2005.02.24.13.10.05; author agc; state Exp; branches; next 1.1; 1.1 date 2004.07.26.15.18.44; author minskim; state Exp; branches 1.1.1.1; next ; 1.11.12.1 date 2017.05.29.18.37.28; author bsiegert; state Exp; branches; next ; commitid ZAV7DzDznRKiCjTz; 1.1.1.1 date 2004.07.26.15.18.44; author minskim; state Exp; branches; next ; desc @@ 1.17 log @Update security/crypto++ to version 8.7.0 Changes according to Changelog: 8.7.0 - August 7, 2022 - minor release, recompile of programs required - expanded community input and support * 81 unique contributors as of this release - fix RSA key generation for small moduli - fix AES-GCM with AESNI but without CLMUL - fix Clang warning with C++17 - fix MinGW builds due to use of O_NOFOLLOW - rework CFB_CipherTemplate::ProcessData and AdditiveCipherTemplate::ProcessData * restored performance and avoided performance penalty of a temp buffer - fix undersized SecBlock buffer in Integer bit operations - work around several GCC 11 & 12 problems 8.6.0 - September 21, 2021 - minor release, recompile of programs required - expanded community input and support * 74 unique contributors as of this release - fix ElGamal encryption - fix ChaCha20 AVX2 implementation - add octal and decimal literal prefix parsing to Integer - add missing overload in ed25519Signer and ed25519Verifier - make SHA-NI independent of AVX and AVX2 - fix OldRandomPool GenerateWord32 - use CPPFLAGS during feature testing - fix compile on CentOS 5 - fix compile on FreeBSD - fix feature testing on ARM A-32 and Aarch64 - enable inline ASM for CRC and PMULL on Apple M1 - fix Intel oneAPI compile - rename test files with *.cpp extension - fix GCC compile error due to missing _mm256_set_m128i - add LSH-256 and LSH-512 hash functions - add ECIES_P1363 for backwards compatibility - fix AdditiveCipherTemplate ProcessData - remove CRYPTOPP_NO_CXX11 define - add -fno-common for Darwin builds - update documentation 8.5.0 - March 7, 2021 - minor release, no recompile of programs required - expanded community input and support * 70 unique contributors as of this release - port to Apple M1 hardware 8.4.0 - January 2, 2021 - minor release, recompile of programs required - expanded community input and support * 67 unique contributors as of this release - fix SIGILL on POWER8 when compiling with GCC 10 - fix potential out-of-bounds write in FixedSizeAllocatorWithCleanup - fix compile on AIX POWER7 with IBM XLC 12.01 - fix compile on Solaris with SunCC 12.6 - revert changes for constant-time elliptic curve algorithms - fix makefile clean and distclean recipes 8.3.0 - December 20, 2020 - minor release, recompile of programs required - expanded community input and support * 66 unique contributors as of this release - fix use of macro CRYPTOPP_ALIGN_DATA - fix potential out-of-bounds read in ECDSA - fix std::bad_alloc when using ByteQueue in pipeline - fix missing CRYPTOPP_CXX17_EXCEPTIONS with Clang - fix potential out-of-bounds read in GCM mode - add configure.sh when preprocessor macros fail - fix potential out-of-bounds read in SipHash - fix compile error on POWER9 due to vec_xl_be - fix K233 curve on POWER8 - add Cirrus CI testing - fix broken encryption for some 64-bit ciphers - fix Android cpu-features.c using C++ compiler - disable RDRAND and RDSEED for some AMD processors - fix BLAKE2 hash calculation using Salt and Personalization - refresh Android and iOS build scripts - add XTS mode - fix circular dependency between misc.h and secblock.h - add Certificate interface - fix recursion in AES::Encryption without AESNI - add missing OID for ElGamal encryption - fix missing override in KeyDerivationFunction-derived classes - fix RDSEED assemble under MSVC - fix elliptic curve timing leaks (CVE-2019-14318) - add link-library variable to Makefiles - fix SIZE_MAX definition in misc.h - add GetWord64 and PutWord64 to BufferedTransformation - use HKDF in AutoSeededX917RNG::Reseed - fix Asan finding in VMAC on i686 in inline asm - fix undeclared identifier _mm_roti_epi64 on Gentoo - fix ECIES and GetSymmetricKeyLength - fix possible divide by zero in PKCS5_PBKDF2_HMAC - refine ASN.1 encoders and decoders - disable BMI2 code paths in Integer class - fix use of CRYPTOPP_CLANG_VERSION - add NEON SHA1, SHA256 and SHA512 from Cryptogams - add ARM SHA1, SHA256 and SHA512 from Cryptogams - make config.h more autoconf friendly - handle Clang triplet armv8l-unknown-linux-gnueabihf - fix reference binding to misaligned address in xed25519 - clear asserts in TestDataNameValuePairs @ text @$NetBSD: distinfo,v 1.16 2021/10/26 11:17:02 nia Exp $ BLAKE2s (cryptopp870.zip) = fd5a150b2213d7cec9f559ff64b56daed853f49a64a83a42dbe3c95415171a6e SHA512 (cryptopp870.zip) = cb85e10118b247be016b40ecf79cf3ff933a174e2e3d9280c426e57eb1ad936db42eafc19a30ec9bf5d7f08c335b1fee4dc149e1bda00d44d40d84d010f6af11 Size (cryptopp870.zip) = 9277791 bytes SHA1 (patch-GNUmakefile) = 7d9ed45142c7da319cdf76e01fc97cb064a282c6 @ 1.16 log @security: Replace RMD160 checksums with BLAKE2s checksums All checksums have been double-checked against existing RMD160 and SHA512 hashes Unfetchable distfiles (fetched conditionally?): ./security/cyrus-sasl/distinfo cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2 @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.15 2021/10/07 14:53:45 nia Exp $ d3 4 a6 4 BLAKE2s (cryptopp820.zip) = ef59ff24ff3b62b64cde97904243ac4958b001825c87d97ffdc8d19d908f7e6c SHA512 (cryptopp820.zip) = 753513a4ec8dd0fff2f551853ce6bd265d82219c28b033565b565b5e567fbee17adb419f4cde58a97e62b7d6533f4099aa4996cd0ba4775c6a2e7ae63a879da5 Size (cryptopp820.zip) = 8859815 bytes SHA1 (patch-GNUmakefile) = 1f33abf6889a094cf249ca25bead7c533e9ba5aa @ 1.15 log @security: Remove SHA1 hashes for distfiles @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.14 2020/03/22 17:52:51 tnn Exp $ d3 1 a3 1 RMD160 (cryptopp820.zip) = cdb5f1b9152cfccc35c5cca3027437e60cf63dea @ 1.14 log @crypto++: homogenize shared library rules. Don't bomb if ldconfig not found. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.13 2019/06/05 19:06:07 adam Exp $ a2 1 SHA1 (cryptopp820.zip) = b042d2f0c93410abdec7c12bcd92787d019f8da1 @ 1.13 log @crypto++: updated to 8.2.0 Version 8.2.0 minor release, no recompile of programs required expanded community input and support 56 unique contributors as of this release use PowerPC unaligned loads and stores with Power8 add SKIPJACK test vectors fix SHAKE-128 and SHAKE-256 compile removed IS_NEON from Makefile fix Aarch64 build on Fedora 29 fix missing GF2NT_233_Multiply_Reduce_CLMUL in FIPS DLL add missing BLAKE2 constructors fix missing BlockSize() in BLAKE2 classes Version 8.1.0 minor release, no recompile of programs required expanded community input and support 56 unique contributors as of this release fix OS X PowerPC builds with Clang add Microsoft ARM64 support fix iPhone Simulator build due to missign symbols add CRYPTOPP_BUGGY_SIMD_LOAD_AND_STORE add carryless multiplies for NIST b233 and k233 curves fix OpenMP build due to use of OpenMP 4 with down-level compilers add SignStream and VerifyStream for ed25519 and large files fix missing AlgorithmProvider in PanamaHash add SHAKE-128 and SHAKE-256 fix AVX2 build due to _mm256_broadcastsi128_si256 add IETF ChaCha, XChaCha, ChaChaPoly1305 and XChaChaPoly1305 Version 8.0.0 major release, recompile of programs required expanded community input and support 54 unique contributors as of this release add x25519 key exchange and ed25519 signature scheme add limited Asymmetric Key Package support from RFC 5958 add Power9 DARN random number generator support add CHAM, HC-128, HC-256, Hight, LEA, Rabbit, Simeck fix FixedSizeAllocatorWithCleanup may be unaligned on some platforms cutover to GNU Make-based cpu feature tests rename files with dashes to underscores fix LegacyDecryptor and LegacyDecryptorWithMAC use wrong MAC fix incorrect AES/CBC decryption on Windows avoid Singleton when possible, avoid std::call_once completely fix SPARC alignment problems due to GetAlignmentOf() on word64 add ARM AES asm implementation from Cryptogams remove CRYPTOPP_ALLOW_UNALIGNED_DATA_ACCESS support @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.12 2017/05/18 21:20:23 adam Exp $ d7 1 a7 1 SHA1 (patch-GNUmakefile) = 9a3a0d09a458730c6c9a5d9300c96417261173bc @ 1.12 log @Crypto++ 5.6.5 The 5.6.5 release was mostly a maintenance release. The release included two CVE fixes. The first, CVE-2016-7420, was a procedural finding due to external build systems failing to define NDEBUG for release builds. The gap was the project's failure to tell users to define NDEBUG. The second, CVE-2016-7544, was a potential memory corruption on Windows platforms when using Microsoft compilers due to use of _malloca and _freea. Due to CVE-2016-7420 and the possibility for an unwanted assert to egress data, users and distros are encouraged to recompile the library and all dependent programs. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.11 2015/11/04 01:17:42 agc Exp $ d3 5 a7 5 SHA1 (cryptopp565.zip) = a74f207a315b6a133af9640a45bde9d6e378af4d RMD160 (cryptopp565.zip) = 4c13bb99dd205d54598527386e88b0dd436fc524 SHA512 (cryptopp565.zip) = f13718d02ca69b0129aaf9e767c9d2e0333aa7538355f9c63d9eaf1ff369062084a18dc01489439ebf37797b3ea81b01beb072057d47ec962bfb824ddc72abc7 Size (cryptopp565.zip) = 4220843 bytes SHA1 (patch-GNUmakefile) = a83b221092685721c30ba00d152e11a73cf20f1e @ 1.11 log @Add SHA512 digests for distfiles for security category Problems found locating distfiles: Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz Package libidea: missing distfile libidea-0.8.2b.tar.gz Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2 Package uvscan: missing distfile vlp4510e.tar.Z Otherwise, existing SHA1 digests verified and found to be the same on the machine holding the existing distfiles (morden). All existing SHA1 digests retained for now as an audit trail. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.10 2013/08/24 08:16:12 ryoon Exp $ d3 5 a7 6 SHA1 (cryptopp562.zip) = ddc18ae41c2c940317cd6efe81871686846fa293 RMD160 (cryptopp562.zip) = b41af768b3a5ba927dac44ec554dc2095e21b1bb SHA512 (cryptopp562.zip) = 016ca7ebad1091d67ad0bc5ccb7549d96d4af6b563d9d5a612cae27b3d1a3514c41b954e319fed91c820e8c701e3aa43da186e0864bf959ce4afd1539248ebbe Size (cryptopp562.zip) = 1137964 bytes SHA1 (patch-aa) = 9828c7da35f62bc696ee3c529b20ed3faee9b55b SHA1 (patch-config.h) = d89c38eeaa51494c14fd6b6e7e6f436177bcfe0f @ 1.11.12.1 log @Pullup ticket #5457 - requested by sevan security/crypto++: security fix Revisions pulled up: - security/crypto++/Makefile 1.21 - security/crypto++/PLIST 1.7 - security/crypto++/buildlink3.mk 1.13 - security/crypto++/distinfo 1.12 - security/crypto++/patches/patch-GNUmakefile 1.1 - security/crypto++/patches/patch-aa deleted - security/crypto++/patches/patch-config.h deleted --- Module Name: pkgsrc Committed By: adam Date: Thu May 18 21:20:23 UTC 2017 Modified Files: pkgsrc/security/crypto++: Makefile PLIST buildlink3.mk distinfo Added Files: pkgsrc/security/crypto++/patches: patch-GNUmakefile Removed Files: pkgsrc/security/crypto++/patches: patch-aa patch-config.h Log Message: Crypto++ 5.6.5 The 5.6.5 release was mostly a maintenance release. The release included two CVE fixes. The first, CVE-2016-7420, was a procedural finding due to external build systems failing to define NDEBUG for release builds. The gap was the project's failure to tell users to define NDEBUG. The second, CVE-2016-7544, was a potential memory corruption on Windows platforms when using Microsoft compilers due to use of _malloca and _freea. Due to CVE-2016-7420 and the possibility for an unwanted assert to egress data, users and distros are encouraged to recompile the library and all dependent programs. @ text @d1 1 a1 1 $NetBSD$ d3 6 a8 5 SHA1 (cryptopp565.zip) = a74f207a315b6a133af9640a45bde9d6e378af4d RMD160 (cryptopp565.zip) = 4c13bb99dd205d54598527386e88b0dd436fc524 SHA512 (cryptopp565.zip) = f13718d02ca69b0129aaf9e767c9d2e0333aa7538355f9c63d9eaf1ff369062084a18dc01489439ebf37797b3ea81b01beb072057d47ec962bfb824ddc72abc7 Size (cryptopp565.zip) = 4220843 bytes SHA1 (patch-GNUmakefile) = a83b221092685721c30ba00d152e11a73cf20f1e @ 1.10 log @Bump PKGREVISION. Fix PR pkg/48134 with patch from Onno van der Linden. Fix build of net/amule. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.9 2013/08/22 13:15:04 ryoon Exp $ d5 1 @ 1.9 log @Bump PKGREVISION. Remove -march=native for portable binary. For PR pkg/48134. Thank you, joerg@@. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.8 2013/08/22 12:53:14 ryoon Exp $ d7 1 @ 1.8 log @Fix build on NetBSD/i386 6.1's gcc 4.5.3. For PR pkg/48134. * Convert check of gcc 4.2 or later to 4.6 or later. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.7 2013/06/12 12:00:08 ryoon Exp $ d6 1 a6 1 SHA1 (patch-aa) = 5897457ab2a8ca894ef88a6d7a4968c6503a4d1e @ 1.7 log @Update to 5.6.2 * Update buildlink3.mk. Changelog: 5.6.0 - added AuthenticatedSymmetricCipher interface class and Filter wrappers - added CCM, GCM (with SSE2 assembly), EAX, CMAC, XSalsa20, and SEED - added support for variable length IVs - added OIDs for Brainpool elliptic curve parameters - improved AES and SHA-256 speed on x86 and x64 - changed BlockTransformation interface to no longer assume data alignment - fixed incorrect VMAC computation on message lengths that are >64 mod 128 (x86 assembly version is not affected) - fixed compiler error in vmac.cpp on x86 with GCC -fPIC - fixed run-time validation error on x86-64 with GCC 4.3.2 -O2 - fixed HashFilter bug when putMessage=true - fixed AES-CTR data alignment bug that causes incorrect encryption on ARM - removed WORD64_AVAILABLE; compiler support for 64-bit int is now required - ported to GCC 4.3, C++Builder 2009, Sun CC 5.10, Intel C++ Compiler 11 5.6.1 - added support for AES-NI and CLMUL instruction sets in AES and GMAC/GCM - removed WAKE-CFB - fixed several bugs in the SHA-256 x86/x64 assembly code: * incorrect hash on non-SSE2 x86 machines on non-aligned input * incorrect hash on x86 machines when input crosses 0x80000000 * incorrect hash on x64 when compiled with GCC with optimizations enabled - fixed bugs in AES x86 and x64 assembly causing crashes in some MSVC build configurations - switched to a public domain implementation of MARS - ported to MSVC 2010, GCC 4.5.1, Sun Studio 12u1, C++Builder 2010, Intel C++ Compiler 11.1 - renamed the MSVC DLL project to "cryptopp" for compatibility with MSVC 2010 5.6.2 - changed license to Boost Software License 1.0 - added SHA-3 (Keccak) - updated DSA to FIPS 186-3 (see DSA2 class) - fixed Blowfish minimum keylength to be 4 bytes (32 bits) - fixed Salsa validation failure when compiling with GCC 4.6 - fixed infinite recursion when on x64, assembly disabled, and no AESNI - ported to MSVC 2012, GCC 4.7, Clang 3.2, Solaris Studio 12.3, Intel C++ Compiler 13.0 @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.6 2012/12/22 02:29:36 joerg Exp $ d6 1 a6 1 SHA1 (patch-aa) = 99569a955773758526969c9893dfbb08aacfdc4d @ 1.6 log @Fix template look up. Don't declare constants with non-default constructor. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.5 2012/04/17 17:46:30 joerg Exp $ d3 4 a6 12 SHA1 (cryptopp552.zip) = 18efe451b3c682f40db75dc2b09cb448a835e7d6 RMD160 (cryptopp552.zip) = 8929795b654d7186b2b38714d22a57ea01862dbd Size (cryptopp552.zip) = 992073 bytes SHA1 (patch-aa) = 777f0cec232cf696ea1a9dd04fa626f3e76442c1 SHA1 (patch-algebra.cpp) = c2f915338c8fff332611d060a0fa38e1410c9e68 SHA1 (patch-cryptlib.cpp) = 870d877c49e2e166046ede37855451c7094b5bb4 SHA1 (patch-cryptlib.h) = 805d0404695f8ccde13eeeaf6a638f3611ef6650 SHA1 (patch-eccrypto.cpp) = 5a35804b58b99d0d811e92f01c2350a6723443e1 SHA1 (patch-eccrypto.h) = 8d2fe42a1cc1b4731fcd821b0b3a8a6ee59b1a32 SHA1 (patch-panama.cpp) = 483b7153d3b5433b34981d7eb4895e37c7d9a1b7 SHA1 (patch-secblock.h) = 5e0e3c5b48424e4232a88efc2244a9bd5df0fc5a SHA1 (patch-simple.h) = 1a268509a6bc96dcaa61e83cc2fcb7ed1f7eb180 @ 1.5 log @Fix some errors in C++ usage. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.4 2007/12/01 04:17:51 rillig Exp $ d7 5 @ 1.4 log @Updated crypto++ to 5.5.2. Changes since 5.2.1: 5.2.2 - added SHA-224 - put SHA-256, SHA-384, SHA-512, RSASSA-PSS into DLL 5.2.3 - fixed issues with FIPS algorithm test vectors - put RSASSA-ISO into DLL 5.3 - ported to MSVC 2005 with support for x86-64 - added defense against AES timing attacks, and more AES test vectors - changed StaticAlgorithmName() of Rijndael to "AES", CTR to "CTR" 5.4 - added Salsa20 - updated Whirlpool to version 3.0 - ported to GCC 4.1, Sun C++ 5.8, and Borland C++Builder 2006 5.5 - added VMAC and Sosemanuk (with x86-64 and SSE2 assembly) - improved speed of integer arithmetic, AES, SHA-512, Tiger, Salsa20, Whirlpool, and PANAMA cipher using assembly (x86-64, MMX, SSE2) - optimized Camellia and added defense against timing attacks - updated benchmarks code to show cycles per byte and to time key/IV setup - started using OpenMP for increased multi-core speed - enabled GCC optimization flags by default in GNUmakefile - added blinding and computational error checking for RW signing - changed RandomPool, X917RNG, GetNextIV, DSA/NR/ECDSA/ECNR to reduce the risk of reusing random numbers and IVs after virtual machine state rollback - changed default FIPS mode RNG from AutoSeededX917RNG to AutoSeededX917RNG - fixed PANAMA cipher interface to accept 256-bit key and 256-bit IV - moved MD2, MD4, MD5, PanamaHash, ARC4, WAKE_CFB into the namespace "Weak" - removed HAVAL, MD5-MAC, XMAC 5.5.1 - fixed VMAC validation failure on 32-bit big-endian machines 5.5.2 - ported x64 assembly language code for AES, Salsa20, Sosemanuk, and Panama to MSVC 2005 (using MASM since MSVC doesn't support inline assembly on x64) - fixed Salsa20 initialization crash on non-SSE2 machines - fixed Whirlpool crash on Pentium 2 machines - fixed possible branch prediction analysis (BPA) vulnerability in MontgomeryReduce(), which may affect security of RSA, RW, LUC - fixed link error with MSVC 2003 when using "debug DLL" form of runtime library - fixed crash in SSE2_Add on P4 machines when compiled with MSVC 6.0 SP5 with Processor Pack - added support for newly released compilers: MSVC 2008, GCC 4.2, Sun CC 5.9, Intel C++ Compiler 10.0, and Borland C++Builder 2007 @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.3 2005/03/19 16:48:21 wiz Exp $ d7 3 @ 1.3 log @Update to 5.2.1. Provided by Stefan Krüger in PR 28740. 5.2 - merged in changes for 5.01 - 5.0.4 - added support for using encoding parameters and key derivation parameters with public key encryption (implemented by OAEP and DL/ECIES) - added Camellia, SHACAL-2, Two-Track-MAC, Whirlpool, RIPEMD-320, RIPEMD-128, RIPEMD-256, Base-32 coding - added ThreadUserTimer for timing thread CPU usage - added option for password-based key derivation functions to iterate until a mimimum elapsed thread CPU time is reached - added option (on by default) for DEFLATE compression to detect uncompressible files and process them more quickly - improved compatibility and performance on 64-bit platforms, including Alpha, IA-64, x86-64, PPC64, Sparc64, and MIPS64 - fixed ONE_AND_ZEROS_PADDING to use 0x80 instead 0x01 as padding. - fixed encoding/decoding of PKCS #8 privateKeyInfo to properly handle optional attributes 5.2.1 - fixed bug in the "dlltest" DLL testing program - fixed compiling with STLport using VC .NET - fixed compiling with -fPIC using GCC - fixed compiling with -msse2 on systems without memalign() - fixed inability to instantiate PanamaMAC - fixed problems with inline documentation @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.2 2005/02/24 13:10:05 agc Exp $ d3 4 a6 5 SHA1 (cryptopp521.zip) = 4b84311d1cbde04df5d88b5375d29c2e35ccb89c RMD160 (cryptopp521.zip) = 7c4d3cf702a1cf38f2a19cb5cebf170dabc23a35 Size (cryptopp521.zip) = 1010937 bytes SHA1 (patch-aa) = 85d1f8323e8d0f32ebb7a3070ecbb01ae3908f00 SHA1 (patch-ab) = 16b27d0566a162e8412db9d4f0186cc15f4c9980 @ 1.2 log @Add RMD160 digests. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.1.1.1 2004/07/26 15:18:44 minskim Exp $ d3 5 a7 5 SHA1 (crypto51.zip) = 95905714c85f6fb563e66edb5478818df787fe2d RMD160 (crypto51.zip) = 8b7420c421be39e9976f1ce2a80840d7ed6b38ef Size (crypto51.zip) = 829560 bytes SHA1 (patch-aa) = f66abaac76ea6db3f94a8d3616114b7d893d8793 SHA1 (patch-ab) = e9ec34d4dd5093c021cc27ea6233e87dc6262221 @ 1.1 log @Initial revision @ text @d1 1 a1 1 $NetBSD$ d4 1 @ 1.1.1.1 log @Import crypto++ from pkgsrc-wip. Packaged by Sergio Jimenez and slightly modified by me. Crypto++ Library is a free C++ class library of cryptographic schemes. One purpose of Crypto++ is to act as a repository of public domain (not copyrighted) source code. Although the library is copyrighted as a compilation, the individual files in it (except for a few exceptions listed in the license) are in the public domain. @ text @@