./security/botan, Portable, easy to use, and efficient C++ crypto library

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 1.10.16, Package name: botan-1.10.16, Maintainer: pkgsrc-users

Botan is a crypto library written in C++. It provides a variety of
cryptographic algorithms, including common ones such as AES, MD5, SHA,
HMAC, RSA, Diffie-Hellman, DSA, and ECDSA, as well as many others that
are more obscure or specialized. It also offers X.509v3 certificates
and CRLs, and PKCS #10 certificate requests. A message processing
system that uses a filter/pipeline metaphor allows for many common
cryptographic tasks to be completed with just a few lines of code.
Assembly optimizations for common CPUs, including x86, x86-64, and
PowerPC, offers further speedups for critical tasks such as SHA-1
hashing and multiple precision integer operations.

Botan is licensed under the same permissive terms as NetBSD itself.


Required to build:
[lang/python27] [pkgtools/cwrappers]

Master sites:

SHA1: 697144c34b1bf77c5b2bc1ff4d08f69ee718782b
RMD160: 72f02a2817109f90cb99045107f8385825d6fc1a
Filesize: 2647.634 KB

Version history: (Expand)


CVS history: (Expand)


   2017-04-10 22:26:31 by Joerg Sonnenberger | Files touched by this commit (3) | Package updated
Log message:
Update Botan to 1.10.16:
    Fix a bug in X509 DN string comparisons that could result in out of
    bound reads. This could result in information leakage, denial of
    service, or potentially incorrect certificate validation results.
    (CVE-2017-2801)

    Avoid throwing during a destructor since this is undefined in
    C++11 and rarely a good idea. (GH #930)

    Fix a bug causing modular exponentiations done modulo even numbers
    to almost always be incorrect, unless the values were small. This
    bug is not known to affect any cryptographic operation in Botan. (GH
    #754)

    Avoid use of C++11 std::to_string in some code added in 1.10.14
    (GH #747 #834)

    Fix integer overflow during BER decoding, found by Falko Strenzke.
    This bug is not thought to be directly exploitable but upgrading ASAP
    is advised. (CVE-2016-9132)

    Fix two cases where (in error situations) an exception would be thrown
    from a destructor, causing a call to std::terminate.

    When RC4 is disabled in the build, also prevent it from being included
    in the OpenSSL provider. (GH #638)
   2017-01-01 15:44:09 by Thomas Klausner | Files touched by this commit (577)
Log message:
Add python-3.6 to incompatible versions.
   2016-11-11 20:46:48 by Joerg Sonnenberger | Files touched by this commit (3) | Package updated
Log message:
Update to Botan-1.10.13:
- Use constant time modular inverse algorithm to avoid possible side
  channel attack against ECDSA (CVE-2016-2849)
- Use constant time PKCS #1 unpadding to avoid possible side channel
  attack against RSA decryption (CVE-2015-7827)
   2016-07-09 15:04:18 by Thomas Klausner | Files touched by this commit (599)
Log message:
Remove python33: adapt all packages that refer to it.
   2016-06-19 07:26:37 by Mark Davies | Files touched by this commit (1)
Log message:
Don't try to use sphinx if found.
   2016-06-09 10:20:44 by Havard Eidnes | Files touched by this commit (4)
Log message:
Follow joerg's advice, use i386 as PLIST variable and revert to
just one PLIST.  Installs cleanly on NetBSD/i386 and NetBSD/amd64.
   2016-06-09 09:20:57 by Havard Eidnes | Files touched by this commit (4)
Log message:
Separate out files only installed on SunOS.
Make a temporary hack for non-SunOS, not yet fully verified;
this somehow needs to mirror what the package's configure.py
figures out, and expressing that properly and portably in
pkgsrc seems hard.
   2016-06-08 10:19:52 by Havard Eidnes | Files touched by this commit (1)
Log message:
Try to reconcile PLIST with what's installed, taking care to preserve
the PLIST.x86* entries.  The sse2 entries are however gone, but a few
new ones have appeared (md4_x86_32.h etc.)  Installs cleanly now on
NetBSD/i386 6.1.5.