Ruby-GPGME is a Ruby language binding of GPGME (GnuPG Made Easy). GnuPG
Made Easy (GPGME) is a library designed to make access to GnuPG easier
for applications. It provides a High-Level Crypto API for encryption,
decryption, signing, signature verification and key management.
it's a requirement for the hiera-eyaml-gpg backend.
Quite some help from and OK jeremy@
Fast ASN.1 parser and serializer with definitions for private keys, public
keys, certificates, CRL, OCSP, CMS, PKCS#3, PKCS#7, PKCS#8, PKCS#12, PKCS#5,
X.509 and TSP.
Not yet wired to the build.
ok sthen@, jca@.
The hackage security library provides both server and client utilities
for securing the Hackage package server (http://hackage.haskell.org/).
It is based on The Update Framework (http://theupdateframework.com/),
a set of recommendations developed by security researchers at various
universities in the US as well as developers on the Tor project
(https://www.torproject.org/).
The current implementation supports only index signing, thereby
enabling untrusted mirrors. It does not yet provide facilities for
author package signing.
Not yet wired to the build.
ok sthen@, jca@.
A practical incremental and one-pass, pure API to the SHA-256 hash
algorithm (including HMAC support) with performance close to the
fastest implementations available in other languages.
The implementation is made in C with a haskell FFI wrapper that
hides the C implementation.
Not yet wired to the build.
ok sthen@, jca@.
This package provides a simple, fast, self-contained copy of the
Ed25519 public-key signature system with a clean interface. It also
includes support for detached signatures, and thorough documentation
on the design and implementation, including usage guidelines.
sshlockout needs root privileges to modify pf tables. If running as
_syslogd (the default for syslogd children), the failure is silent.
Requested by sunil@
qca-qt5 can't use plugins from qca (built against qt4).
If need be, we'll enable more plugins as subpackages someday
(gnupg,cyrus-sasl & pkcs11 are available)
ok rsadowski@
https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-01
mentions 3 security issues, at least CVE-2017-2784 (Freeing of memory
allocated on stack when validating a public key with a secp224k1 curve)
affects mbedtls-2.2.1.
Packaging:
- bump major of shared libs since symbols have been removed
- tweak license marker
- kill code in testsuite that fails to build with our stdio
implementation (can't take the address of stdout, the C standard
warns about that)
- kill some debug flags set by cmake
Make test passes on amd64 and arm, also tests & ok juanfra@