Package: libcrypto++ / 5.6.1-6+deb7u2
Metadata
Package | Version | Patches format |
---|---|---|
libcrypto++ | 5.6.1-6+deb7u2 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
strict gcc43 include.diff | (download) |
misc.h |
1 1 + 0 - 0 ! |
--- |
doxygen setup.diff | (download) |
Doxyfile |
9 4 + 5 - 0 ! |
--- |
doxygen main link.diff | (download) |
cryptlib.h |
1 0 + 1 - 0 ! |
--- |
cryptest data files location.diff | (download) |
bench2.cpp |
60 30 + 30 - 0 ! |
--- |
debian config.diff | (download) |
config.h |
18 8 + 10 - 0 ! |
upstream changes introduced in version 5.6.0-6 This patch has been created by dpkg-source during the package build. Here's the last changelog entry, hopefully it gives details on why those changes were made: . libcrypto++ (5.6.0-6) unstable; urgency=low . * Fix sha256 assembly problem with signed address comparison, thanks to Ken Raeburn. (Closes: #585930) * Converted to dpkg-source format 3.0 (quilt). * Use mercurial-buildpackage for repository maintenance, so old repository does not exist any more. * Bumped Standards-Version to 3.8.4, no change. * Use misc:Depends debhelper macro for all packages. . The person named in the Author field signed this changelog entry. |
panama armel.diff | (download) |
panama.cpp |
33 16 + 17 - 0 ! |
--- |
salsa.patch | (download) |
salsa.cpp |
21 11 + 10 - 0 ! |
--- |
gcc 4.7 ftbfs.diff | (download) |
algebra.cpp |
2 1 + 1 - 0 ! |
<short summary of the patch> TODO: Put a short summary on the line above and replace this paragraph with a longer explanation of this change. Complete the meta-information with other relevant fields (see below for details). To make it easier, the information below has been extracted from the changelog. Adjust it or drop it. . libcrypto++ (5.6.1-5.1) unstable; urgency=low . * Fix build failure with gcc-4.7. Closes: #668700. |
CVE 2015 2141.patch | (download) |
rw.cpp |
8 7 + 1 - 0 ! |
[patch] fix for cve-2015-2141. thanks to evgeny sidorov for reporting. Squaring to satisfy Jacobi requirements suggested by JPM. |
CVE 2016 3995.patch | (download) |
rijndael.cpp |
14 9 + 5 - 0 ! |
[patch] fix the rijndael timing attack counter measure |