Path to this page:
./
security/botan3,
Portable, easy to use, and efficient C++ crypto library (v3)
Branch: CURRENT,
Version: 3.6.1nb1,
Package name: botan3-3.6.1nb1,
Maintainer: nrosBotan is a crypto library written in C++. It provides a variety of
cryptographic algorithms, including common ones such as AES, MD5, SHA,
HMAC, RSA, Diffie-Hellman, DSA, and ECDSA, as well as many others that
are more obscure or specialized. It also offers X.509v3 certificates
and CRLs, and PKCS #10 certificate requests. A message processing
system that uses a filter/pipeline metaphor allows for many common
cryptographic tasks to be completed with just a few lines of code.
Assembly optimizations for common CPUs, including x86, x86-64, and
PowerPC, offers further speedups for critical tasks such as SHA-1
hashing and multiple precision integer operations.
This package contains major version 3 of the library.
Master sites:
Filesize: 7404.164 KB
Version history: (Expand)
- (2024-11-01) Updated to version: botan3-3.6.1nb1
- (2024-11-01) Updated to version: botan3-3.6.1
- (2024-11-01) Updated to version: botan3-3.3.0nb3
- (2024-10-04) Updated to version: botan3-3.3.0nb2
- (2024-05-29) Updated to version: botan3-3.3.0nb1
- (2024-02-25) Updated to version: botan3-3.3.0
CVS history: (Expand)
2024-03-30 13:40:21 by Havard Eidnes | Files touched by this commit (2) |
Log message:
security/botan: fix build on 32-bit powerpc systems (non-VSX).
Ref. https://github.com/randombit/botan/issues/3958
|
2024-03-04 16:12:15 by Thomas Klausner | Files touched by this commit (1) |
Log message:
botan3: uses sqlite3_changes64, so needs sqlite3 3.37.0
|
2024-02-25 16:02:42 by Thomas Klausner | Files touched by this commit (2) |
Log message:
*: recursive bump for botan3
|
2024-02-25 15:59:34 by Thomas Klausner | Files touched by this commit (1) |
Log message:
botan3: remove merged patch
|
2024-02-25 15:58:00 by Thomas Klausner | Files touched by this commit (5) | |
Log message:
*botan3: update to 3.3.0
Version 3.3.0, 2024-02-20
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
* Fix a potential denial of service caused by accepting arbitrary
length primes as potential elliptic curve parameters in ASN.1
encodings. With very large inputs the primality verification
can become computationally expensive. Now any prime field larger
than 1024 bits is rejected immediately. Reported by Bing Shi.
(GH #3913)
* Add FrodoKEM post-quantum KEM (GH #3679 #3807 #3892)
* Add support for Blake2s (GH #3796)
* Add support for RFC 7250 in TLS 1.3 to allow authenticating peers
using raw public keys (GH #3771)
* Update the BSI TLS policy to match the latest TR, particularly
enabling support for TLS 1.3 (GH #3809)
* Add AsymmetricKey::generate_another() to generate a new key of the
same type and parameters as an existing key (GH #3770 #3786)
* Add Private_Key::remaining_operations() that indicates the number of
remaining signatures for stateful hash-based signatures (GH #3821)
* Add implementation of EC_PrivateKey::check_key() (GH #3782 #3804)
* Add hardware acceleration for SHA-512 on ARMv8 (GH #3860 #3864)
* X.509 certificates that contain Authority Information Access (AIA)
extensions can now be encoded (GH #3784)
* Various functions defined in ``mem_ops.h`` are now deprecated
for public use (GH #3759 #3752 #3757)
* The ASIO TLS stream can now be used with C++20 coroutines (GH #3764)
* New public header asio_compat.h to check compatibility of the ASIO
TLS stream with the available boost version (1.73.0+) (GH #3765)
* Flatten input buffer sequences in the ASIO TLS stream to avoid
creating unnecessarily small TLS records (GH #3839)
* Hard-rename the potentially harmful build configuration flag
--terminate-on-asserts to --unsafe-terminate-on-asserts (GH #3755)
* Use modern SQLite3 APIs with integer width annotations from SQLite3 3.37
(GH #3788 #3793)
* Generate and install a CMake package config file (botan-config.cmake)
(GH #3722 #3827 #3830 #3825)
* Add TLS::Channel::is_handshake_complete() predicate method (GH #3762)
* Add support for setting thread names on Haiku OS and DragonflyBSD
(GH #3758 #3785)
* Use /Zc:throwingNew with MSVC (GH #3858)
* Work around a warning in GCC 13 (GH #3852)
* Add a CLI utility for testing RSA side channels using the MARVIN
toolkit (GH #3749)
* CLI utility 'tls_http_server' is now based on Boost Beast
(GH #3763 #3791)
* CLI utility 'tls_client_hello' can detect and handle TLS 1.3 messages
(GH #3820)
* Add a detailed migration guide for users of OpenSSL 1.1 (GH #3815)
* Various updates to the documentation and code examples
(GH #3777 #3805 #3802 #3794 #3815 #3823 #3828 #3842 #3841 #3849 #3745)
* Fixes and improvements to the build experience using ``ninja``
(GH #3751 #3750 #3769 #3798 #3848)
* Fix handling of cofactors when performing scalar blinding in EC (GH #3803)
* Fix potential timing side channels in Kyber (GH #3846 #3874)
* Fix a potential dangling reference resulting in a crash in the OCB
mode of operation (GH #3814)
* Fix validity checks in the construction of the ASIO TLS stream
(GH #3766)
* Fix error code handling in ASIO TLS stream (GH #3795 #3801 #3773)
* Fix a TLS 1.3 assertion failure that would trigger if the
application callback returned an empty certificate chain. (GH #3754)
* Fix a RFC 7919 conformance bug introduced in 3.2.0, where the TLS
server would fail to reject a client hello that advertised (only)
FFDHE groups that are not known to us. (GH #3743 #3742 #3729)
* Fix that modifications made in TLS::Callbacks::tls_modify_extensions()
for the TLS 1.3 Certificate message were not being applied. (GH #3792)
* Fix string mapping of the PKCS#11 mechanism RSA signing mechanism that
use SHA-384 (GH #3868)
* Fix a build issue on NetBSD (GH #3767)
* Fix the configure.py to avoid recursing out of our source tree (GH #3748)
* Fix various clang-tidy warnings (GH #3822)
* Fix CLI tests on windows and enable them in CI (GH #3845)
* Use ``BufferStuffer`` and ``concat`` helpers in public key code
(GH #3756 #3753)
* Add a nightly test to ensure hybrid TLS 1.3 PQ/T compatibility with
external implementations (GH #3740)
* Internal memory operation helpers are now memory container agnostic
using C++20 ranges (GH #3715 #3707)
* Public and internal headers are now clearly separated in the build
directory. That restricts the examples build target to public headers.
(GH #3880)
* House keeping for better code formatting with clang-format
(GH #3862 #3865)
* Build documentation in CI and fail on warnings or errors (GH #3838)
* Work around a GitHub Actions CI issue (actions/runner-images#8659)
(GH #3783 #3833 #3888)
|
2023-12-29 19:25:02 by Adam Ciarcinski | Files touched by this commit (254) |
Log message:
revbump for boost-libs
|
2023-11-08 14:21:43 by Thomas Klausner | Files touched by this commit (2377) |
Log message:
*: recursive bump for icu 74.1
|
2023-10-19 17:21:40 by Thomas Klausner | Files touched by this commit (3) |
Log message:
botan3: add upstream bug report URL
|