Path to this page:
NOTICE: This package has been removed from pkgsrc./
security/botan-devel,
Portable, easy to use, and efficient C++ crypto library
Branch: CURRENT,
Version: 2.19.1,
Package name: botan-2.19.1,
Maintainer: joergBotan is a crypto library written in C++. It provides a variety of
cryptographic algorithms, including common ones such as AES, MD5, SHA,
HMAC, RSA, Diffie-Hellman, DSA, and ECDSA, as well as many others that
are more obscure or specialized. It also offers X.509v3 certificates
and CRLs, and PKCS #10 certificate requests. A message processing
system that uses a filter/pipeline metaphor allows for many common
cryptographic tasks to be completed with just a few lines of code.
Assembly optimizations for common CPUs, including x86, x86-64, and
PowerPC, offers further speedups for critical tasks such as SHA-1
hashing and multiple precision integer operations.
The development version contains a much improved TLS infrastructure.
It also depends on C++11.
Required to run:[
devel/boost-libs]
Required to build:[
devel/boost-headers] [
pkgtools/cwrappers] [
lang/python37]
Master sites:
Filesize: 5945.684 KB
Version history: (Expand)
- (2022-04-02) Package deleted from pkgsrc
- (2022-04-01) Updated to version: botan-2.19.1
- (2022-01-10) Updated to version: botan-2.17.3nb3
- (2021-09-29) Updated to version: botan-2.17.3nb2
- (2021-04-21) Updated to version: botan-2.17.3nb1
- (2021-03-07) Updated to version: botan-2.17.3
CVS history: (Expand)
2022-04-01 10:07:29 by Thomas Klausner | Files touched by this commit (33) | |
Log message:
*: finish move of botan to versioned directories
|
2022-04-01 01:30:17 by Thomas Klausner | Files touched by this commit (6) |
Log message:
*: recursive bump for botan-devel shlib bump
|
2022-04-01 01:24:23 by Thomas Klausner | Files touched by this commit (4) | |
Log message:
botan: update to 2.19.1.
Version 2.19.1, 2022-01-21
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
* Fix a compilation problem affecting macOS XCode (GH #2880)
* Fix a build problem preventing amalgamation builds in 2.19.0
(GH #2879)
Version 2.19.0, 2022-01-19
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
* Add a forward error correction code compatible with the
zfec library (GH #2868 #2866)
* Improve Emscripten build (GH #2864)
* Always use ``-L`` before build flags (GH #2858 2848)
* Fix compilation issue on earlier macOS versions (GH #2851)
* Add a GCC 4.8 CI target to prevent build regressions (GH #2869)
* Add support for Loongarch64 (GH #2877)
* Check OSXSAVE flag before using AVX2 instructions (GH #2878)
Version 2.18.2, 2021-10-25
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
* Avoid using short exponents when encrypting in ElGamal, as some PGP
implementations generate keys with parameters that are weak when
short exponents are used (GH #2794)
* Fix a low risk OAEP decryption side channel (GH #2797)
* Work around a miscompilation of SHA-3 caused by a bug in Clang 12
and XCode 13. (GH #2826)
* Remove support in OpenSSL provider for algorithms which are
disabled by default in OpenSSL 3.0 (GH #2823, #2814)
* Add CI based on GitHub actions to replace Travis CI (GH #2632)
* Fix the online OCSP test, as the certificate involved had expired.
(GH #2799)
* Fix some test failures induced by the expiration of the trust root
"DST Root CA X3" (GH #2820)
Version 2.18.1, 2021-05-09
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
* Fix a build regression in 2.18.0 which caused linker flags which
contain ``-l`` within them (such as ``-fuse-linker-plugin``) to
be misinterpreted. (GH #2715)
* Fix a bug which caused decoding a certificate which contained
more than one name in a single RDN. (GH #2611 #2630 #2724)
* Fix a bug which caused OID lookup failures when run in a locale
which uses thousands separators (pt_BR was reported as having
this issue). (GH #2732 #2730 #2237)
* DNS names in name constraints were compared with case sensitivity, which
could cause valid certificates to be rejected. (GH #2739 #2735)
* X.509 name constraint extensions were rejected if non-critical. RFC 5280
requires conforming CAs issue such extensions as critical, but not all
certificates are compliant, and all other known implementations do not
require this. (GH #2739 #2736)
* X.509 name constraints were incorrectly applied to the certificate which
included the constraint. (GH #2739 #2737)
Version 2.18.0, 2021-04-15
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
* Add support for implementing custom RNG objects through the
FFI interface (GH #2627 #2600)
* Improve safegcd bounds, improving runtime performance (GH #2628 #2619)
* Fix a bug introduced in 2.9.0 where BigInt::operator< would return
an incorrect result if both operands were negative. (GH #2641 #2638)
* Reject non-TLS messages as quickly as possible without waiting for
a full record. (GH #2676)
* Add build support for RISC-V 32
* Fixes for TLS::Stream::async_shutdown (GH #2673)
* Fix a regression introduced in 2.17.0 where LDFLAGS which add an extra
library (such as ``-latomic`` needed on SPARC) were not always applied
effectively. (GH #2622 #2623 #2625)
|
2022-01-10 02:46:47 by Ryo ONODERA | Files touched by this commit (273) |
Log message:
*: Recursive revbump from boost 1.78.0
|
2021-10-26 13:18:07 by Nia Alarie | Files touched by this commit (605) |
Log message:
security: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes
Unfetchable distfiles (fetched conditionally?):
./security/cyrus-sasl/distinfo \
cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2
|
2021-10-07 16:54:50 by Nia Alarie | Files touched by this commit (606) |
Log message:
security: Remove SHA1 hashes for distfiles
|
2021-10-01 14:13:08 by Nia Alarie | Files touched by this commit (2) |
Log message:
botan-devel: Fix PLIST on non-x86.
|
2021-09-29 21:01:31 by Adam Ciarcinski | Files touched by this commit (872) |
Log message:
revbump for boost-libs
|