Path to this page:
NOTICE: This package has been removed from pkgsrc./
wip/botan,
Portable, easy to use, and efficient C++ crypto library
Branch: CURRENT,
Version: 1.8.6,
Package name: botan-1.8.6,
Maintainer: pettaiBotan (formerly OpenCL) aims to be a portable, easy to use, and efficient
C++ crypto library. It currently supports the following algorithms and primes:
* Public key encryption algorithms RSA, ElGamal, DLIES (OAEP, PKCS #1 v1.5)
* Public key signature algorithms RSA, DSA, ECDSA, Nyberg-Rueppel,
Rabin-Williams (PSS, PKCS #1 v1.5, X9.31)
* Key agreement techniques Diffie-Hellman and ECKAEG
* Block cipher modes ECB, CBC, CBC/CTS, CFB, OFB, CTR and EAX
* AES (Rijndael) and AES candidates Serpent, Twofish, MARS, CAST-256, RC6
* DES, and variants 3DES and DESX
* Stream ciphers ARC4, Salsa20, Turing, and WiderWake4+1
* National/telecom block ciphers SEED, KASUMI, MISTY1, GOST 28147, Skipjack
* Other block ciphers including Blowfish, CAST-128, IDEA, Noekeon, TEA,
XTEA, RC2, RC5, SAFER-SK, and Square
* Block cipher constructions Luby-Rackoff and Lion
* Authentication codes HMAC, CMAC (aka OMAC1), CBC-MAC, ANSI X9.19 DES-MAC,
* Hash functions SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, Whirlpool, Tiger
RIPEMD-160, RIPEMD-128, HAS-160, GOST 34.11, MD2, MD4, MD5, FORK-256
* Checksums Adler32, CRC24, CRC32
* X.509 certificates (+ generating new self-signed and CA certs), X.509 CRLs
* PKCS #10 certificate requests
* Card Verifiable Certificates (used in ePassports)
* PBKDFs: PBKDF1 from PKCS #5 v1.5, PBKDF2 from PKCS #5 v2.0 OpenPGP S2K
* KDF1 and KDF2 from IEEE 1363
* PRFs from ANSI X9.42, SSL v3.0, TLS v1.0
Required to run:[
lang/python25]
Required to build:[
devel/pkg-config]
Master sites:
SHA1: 8a7ad28222c8f2ae1819be312e3f6bac8f2b33c1
RMD160: 57b4a7442a83a7369c4752f71bf74f2e6792a26c
Filesize: 3383.123 KB
Version history: (Expand)
- (2009-09-30) Package deleted from pkgsrc
- (2009-09-06) Updated to version: botan-1.8.6
- (2009-08-03) Updated to version: botan-1.8.5
- (2009-04-09) Package added to pkgsrc.se, version botan-1.8.1 (created)
CVS history: (Expand)
2009-09-30 12:29:22 by Fredrik Pettai | Files touched by this commit (10) | |
Log message:
Removed wip/botan, newer release imported in security/botan
|
2009-09-26 21:50:53 by Fredrik Pettai | Files touched by this commit (1) |
Log message:
Updated buildlink3.mk to current version
|
2009-09-05 20:46:29 by Aleksej Saushev | Files touched by this commit (6) |
Log message:
Update to 1.8.6.
Convert to use Python configure script.
Fix PREFIX and DESTDIR usage, support user-destdir.
It should be finished, but someone has to test it.
|
2009-08-03 00:16:36 by Fredrik Pettai | Files touched by this commit (2) |
Log message:
Added DragonFly build support via patch from Patrick Georgi (private email)
|
2009-08-02 23:59:35 by Fredrik Pettai | Files touched by this commit (3) |
Log message:
Botan 1.8.5: Fix build portability problems, Skein bug
The python configure script, introduced in version 1.8.3, now runs on stock \
CPython 2.4.
Previously Skein-512 would crash if asked to hash a zero-length input vector. \
This has been fixed.
Thanks to testing performed on the GCC compile farm, various small build \
problems on HP-PA, SPARC, and ARM processors have been detected and fixed. Check \
the build log for information on which platforms have been tested recently
|
2009-05-19 11:00:04 by Thomas Klausner | Files touched by this commit (67) |
Log message:
Use standard location for LICENSE line (in MAINTAINER/HOMEPAGE/COMMENT
block). Uncomment some commented out LICENSE lines while here.
|
2009-04-08 09:44:51 by Fredrik Pettai | Files touched by this commit (6) | |
Log message:
Import botan-1.8.1 as wip/botan.
Botan (formerly OpenCL) aims to be a portable, easy to use, and efficient
C++ crypto library. It currently supports the following algorithms and primes:
* Public key encryption algorithms RSA, ElGamal, DLIES (OAEP, PKCS #1 v1.5)
* Public key signature algorithms RSA, DSA, ECDSA, Nyberg-Rueppel,
Rabin-Williams (PSS, PKCS #1 v1.5, X9.31)
* Key agreement techniques Diffie-Hellman and ECKAEG
* Block cipher modes ECB, CBC, CBC/CTS, CFB, OFB, CTR and EAX
* AES (Rijndael) and AES candidates Serpent, Twofish, MARS, CAST-256, RC6
* DES, and variants 3DES and DESX
* Stream ciphers ARC4, Salsa20, Turing, and WiderWake4+1
* National/telecom block ciphers SEED, KASUMI, MISTY1, GOST 28147, Skipjack
* Other block ciphers including Blowfish, CAST-128, IDEA, Noekeon, TEA,
XTEA, RC2, RC5, SAFER-SK, and Square
* Block cipher constructions Luby-Rackoff and Lion
* Authentication codes HMAC, CMAC (aka OMAC1), CBC-MAC, ANSI X9.19 DES-MAC,
* Hash functions SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, Whirlpool, Tiger
RIPEMD-160, RIPEMD-128, HAS-160, GOST 34.11, MD2, MD4, MD5, FORK-256
* Checksums Adler32, CRC24, CRC32
* X.509 certificates (+ generating new self-signed and CA certs), X.509 CRLs
* PKCS #10 certificate requests
* Card Verifiable Certificates (used in ePassports)
* PBKDFs: PBKDF1 from PKCS #5 v1.5, PBKDF2 from PKCS #5 v2.0 OpenPGP S2K
* KDF1 and KDF2 from IEEE 1363
* PRFs from ANSI X9.42, SSL v3.0, TLS v1.0
|