* Thu May 29 2025 angel.yankov@suse.com
- Security fix [bsc#1224280, CVE-2024-28285]
* potential leak of secret key of ElGamal encryption via fault injection
* Added patch libcryptopp-CVE-2024-28285.patch
* https://github.com/weidai11/cryptopp/issues/1262
* Mon Feb 03 2025 guillaume.gardet@opensuse.org
- Rename patch to patchlevel to avoid confusion on check and avoid:
line 75: Patch number not specified: patch
* Thu Jan 04 2024 pgajdos@suse.com
- security update
- added patches
fix CVE-2023-50981 [bsc#1218222], issue on ModularSquareRoot function leads to potential DoS
https://github.com/weidai11/cryptopp/pull/1255
+ libcryptopp-CVE-2023-50981.patch
* Thu Dec 21 2023 pgajdos@suse.com
- version update to 8.9.0
* Crypto++ 8.9 was released on October 1, 2023. The 8.9 release
was a minor, unplanned release. There were no CVEs and one
memory error.
* The 8.9 release was driven by the fix for `ProcessData`, and
the failures when `inString==outString`. Also see GH #1231,
Rabbit Produces null Keystream When inString == outString.
* Release notes
* ===========
* minor release, recompile of programs required
* expanded community input and support
* 88 unique contributors as of this release
* add additional tests to datatest.cpp
* fix SIMON128 Asan finding on POWER8
* fix AES/CFB and AES/CTR modes self test failures when using
Cryptogams AES on ARMv7
* fix ARIA/CTR mode self test failures when inString==outString
* fix HIGHT/CTR mode self test failures when
inString==outString
* fix Rabbit/CTR mode self test failures when
inString==outString
* fix HC128/CTR and HC256/CTR mode self test failures when
inString==outString
* fix Prime Table and dangling reference to a temporary
* fix Singleton::Ref() when using C++11 memory fences
* remove unneeded call to Crop() in Randomize()
- modified patches
% libcryptopp-shared.patch (refreshed)
- modified sources
% baselibs.conf
- added patches
fix CVE-2023-50980 [bsc#1218219], DoS via malformed DER public key file
+ libcryptopp-CVE-2023-50980.patch
* Sun Jul 16 2023 dmueller@suse.com
- update to 8.8.0:
* minor release, recompile of programs required
* expanded community input and support
* 88 unique contributors as of this release
* fix crash in cryptest.exe when invoked with no options
* fix crash in library due to GCC removing live code
* fix RSA with key size 16 may provide an invalid key
* fix failure to build on 32-bit x86
* fix failure to build on iPhone Simulator for arm64
* fix failure to build on Windows arm64
* test for SSSE3 before using the ISA
* fix include of when using MSVC
* improve performance of CRC32C_Update_SSE42 for x86-64
* update documentation
* Wed Aug 10 2022 bwiedemann@suse.com
- Enable SSE2 to fix i586 build
* Tue Aug 09 2022 bwiedemann@suse.com
- Update to 8.7.0
- https://cryptopp.com/release870.html
* fix RSA key generation for small moduli (GH #1136)
* fix AES-GCM with AESNI but without CLMUL (GH #1132)
* rework CFB_CipherTemplate::ProcessData and AdditiveCipherTemplate::ProcessData (GH #1088, GH #1103)
+ restored performance and avoided performance penalty of a temp buffer
* fix undersized SecBlock buffer in Integer bit operations (GH #1072)
* work around several GCC 11 & 12 problems
* Sat Sep 25 2021 davejplater@gmail.com
- Update to 8.6.0
-upstream changes:
* This release clears CVE-2021-40530 and fixes a problem with
ChaCha20 AVX2 implementation.
* The CVE was due to ElGamal encryption using a work estimate to
size encryption exponents instead subgroup order.
* The ChaCha20 issue was due to mishandling a carry in the AVX2
code path. The ChaCha20 issue was difficult to duplicate, so
most users should not experience it.
* Wed Mar 17 2021 dmueller@suse.com
- update to 8.5.0:
* minor release, no recompile of programs required
* expanded community input and support
* 70 unique contributors as of this release
* port to Apple M1 hardware
* Sat Jan 02 2021 davejplater@gmail.com
- Update to version 8.4.0 and remove obsolete patches:
0001-Fix-TCXXFLAGS-using-openSUSE-standard-flags-GH-865.patch,
0001-Fix-missing-if-statement.patch and cve-2019-14318.patch
- Upstream changes:
* fix use of macro CRYPTOPP_ALIGN_DATA
* fix potential out-of-bounds read in ECDSA
* fix std::bad_alloc when using ByteQueue in pipeline
* fix missing CRYPTOPP_CXX17_EXCEPTIONS with Clang
* fix potential out-of-bounds read in GCM mode
* add configure.sh when preprocessor macros fail
* fix potential out-of-bounds read in SipHash
* fix compile error on POWER9 due to vec_xl_be
* fix K233 curve on POWER8
* add Cirrus CI testing
* fix broken encryption for some 64-bit ciphers
* disable RDRAND and RDSEED for some AMD processors
* fix BLAKE2 hash calculation using Salt and Personalization
* add XTS mode
* fix circular dependency between misc.h and secblock.h
* add Certificate interface
* fix recursion in AES::Encryption without AESNI
* add missing OID for ElGamal encryption
* fix missing override in KeyDerivationFunction-derived classes
* fix RDSEED assemble under MSVC
* fix elliptic curve timing leaks (CVE-2019-14318)
* add link-library variable to Makefiles
* fix SIZE_MAX definition in misc.h
* add GetWord64 and PutWord64 to BufferedTransformation
* use HKDF in AutoSeededX917RNG::Reseed
* fix Asan finding in VMAC on i686 in inline asm
* fix undeclared identifier _mm_roti_epi64 on Gentoo
* fix ECIES and GetSymmetricKeyLength
* fix possible divide by zero in PKCS5_PBKDF2_HMAC
* refine ASN.1 encoders and decoders
* disable BMI2 code paths in Integer class
* fix use of CRYPTOPP_CLANG_VERSION
* add NEON SHA1, SHA256 and SHA512 from Cryptogams
* add ARM SHA1, SHA256 and SHA512 from Cryptogams
* fix reference binding to misaligned address in xed25519
* clear asserts in TestDataNameValuePairs
* fix SIGILL on POWER8 when compiling with GCC 10
* fix potential out-of-bounds write in FixedSizeAllocatorWithCleanup
* revert changes for constant-time elliptic curve algorithms
Version: 5.6.5-bp150.2.4
* Sat May 20 2017 bwiedemann@suse.com
- Add reproducible.patch to sort input files to make build fully reproducible
* Fri Mar 03 2017 davejplater@gmail.com
- Added patch field to soname due to library not following proper
API/ABI versioning to fix boo#1027192.
- Removed crypto.pc and generate it in the spec file to ensure
proper version and directories.
- Changed libcryptopp-shared.patch.
- Renamed library package and obsoleted old name.
- added precheckin_baselibs.sh and updated baselibs.conf
* Thu Feb 23 2017 adam@mizerski.pl
- update to 5.6.5
* Rebase libcryptopp-shared.patch
* Rebase 0001-disable_os_rng_test.patch
- enable openmp usage
* Thu Feb 02 2017 jengelh@inai.de
- Add obsoletes tag for dropped static lib
* Sat Jan 28 2017 jengelh@inai.de
- Remove libcryptoo-devel-static, this seems unused in Factory.
* Sat Jan 28 2017 jengelh@inai.de
- Update descriptions
* Mon Sep 12 2016 bwiedemann@suse.com
- Update to 5.6.4
* Use proper openSUSE-style library naming
* Drop upstream libcryptopp-s390.patch
* Drop upstream libcryptopp-m68k.patch
* Drop upstream libcryptopp-CVE-2015-2141.patch
* Drop upstream cryptopp-gcc6.patch
* Rebase libcryptopp-shared.patch
* Rebase 0001-disable_os_rng_test.patch
* Mon Jun 20 2016 i@marguerite.su
- add patch cryptopp-gcc6.patch
* fix boo#985143
* fix narrowing conversion from unsigned int to int inside {}
* Wed Jul 08 2015 bwiedemann@suse.com
- prevent timing attack to get secret key (bnc#936435, CVE-2015-2141)
add libcryptopp-CVE-2015-2141.patch
* Fri Aug 15 2014 sfalken@opensuse.org
- Added 0001-disable_os_rng_test.patch
Fixes buildfailure on openSUSE_Factory x86_64 within OBS environment,
due to OS supplied Random Number Generator taking too long to respond
* Thu Apr 03 2014 schwab@suse.de
- libcryptopp-m68k.patch: define IS_LITTLE_ENDIAN on m68k
* Wed Dec 18 2013 ro@suse.de
- define as big endian on s390/s390x (libcryptopp-s390.patch)
* Wed Aug 28 2013 dmueller@suse.com
- remove noninstallable 32bit -devel baselibs
* Fri Mar 01 2013 adam@mizerski.pl
- update to 5.6.2
- changed license to Boost Software License 1.0
- added SHA-3 (Keccak)
- updated DSA to FIPS 186-3 (see DSA2 class)
- fixed Blowfish minimum keylength to be 4 bytes (32 bits)
- fixed Salsa validation failure when compiling with GCC 4.6
- fixed infinite recursion when on x64, assembly disabled, and
no AESNI
- ported to MSVC 2012, GCC 4.7, Clang 3.2, Solaris Studio 12.3,
Intel C++ Compiler 13.0
- removed libcryptopp-gcc47.patch - fixed upstream
- rebased libcryptopp-shared.patch
- added devel-static subpackage
- updated license tag
* Sun Oct 14 2012 adam@mizerski.pl
- added baselibs.conf
- spec file improved
* Sat Mar 17 2012 dimstar@opensuse.org
- Add libcryptopp-gcc47.patch: Fix build with gcc 4.7.
* Sun Feb 05 2012 jengelh@medozas.de
- Proper shared library versioning
* Mon Oct 17 2011 jengelh@medozas.de
- Remove bogus Conflict against libcrypto++0 (cf. shlib guidelines)
* Fri Oct 14 2011 toddrme2178@gmail.com
- Added pkg-config file from fedora project
- Cleaned up spec file formatting
* Sun Jul 10 2011 meissner@suse.de
- add -lpthread for tests