Package: libtomcrypt Version: 1.17-6 Severity: serious libtomcrypt fails to build because of LaTeX errors. (Note that a new LaTeX entered unstable recently.)
It seems you cannot use "[here]" anymore to indicate float placement; the correct usage is "[h]", as documented e.g. here: https://en.wikibooks.org/wiki/LaTeX/Floats,_Figures_and_Captions I sent an email to the LaTeX maintainers asking if this change was intentional, but let's assume it is. Below is a patch. Martin > sbuild (Debian sbuild) 0.64.1 (13 Oct 2013) on m400-c2n1.hlinux.usa.hp.com ... > [39] [40] > Chapter 4. > [41] [42] [43] [44] > > ! LaTeX Error: Unknown float option `e'. > > See the LaTeX manual or LaTeX Companion for explanation. > Type H <return> for immediate help. > ... > > l.2064 \begin{figure}[here] > > ? > ! Emergency stop. > ... > > l.2064 \begin{figure}[here] > > Output written on crypt.dvi (50 pages, 150880 bytes). > Transcript written on crypt.log. -- Martin Michlmayr Linux for HP Helion OpenStack, Hewlett-Packard
Description: LaTeX build fix Author: Martin Michlmayr --- libtomcrypt-1.17.orig/crypt.tex +++ libtomcrypt-1.17/crypt.tex @@ -2056,7 +2061,7 @@ int unregister_hash(const struct _hash_d The following hashes are provided as of this release within the LibTomCrypt library: \index{Hash descriptor table} -\begin{figure}[here] +\begin{figure}[h] \begin{center} \begin{tabular}{|c|c|c|} \hline \textbf{Name} & \textbf{Descriptor Name} & \textbf{Size of Message Digest (bytes)} \\ @@ -2920,7 +2925,7 @@ descriptor twice, and will return the in will return \textbf{CRYPT\_OK} if the PRNG was found and removed. Otherwise, it returns \textbf{CRYPT\_ERROR}. \subsection{PRNGs Provided} -\begin{figure}[here] +\begin{figure}[h] \begin{center} \begin{small} \begin{tabular}{|c|c|l|} @@ -4085,7 +4090,7 @@ The variable \textit{prng} is an active \textit{group\_size} the more difficult a forgery becomes upto a limit. The value of $group\_size$ is limited by $15 < group\_size < 1024$ and $modulus\_size - group\_size < 512$. Suggested values for the pairs are as follows. -\begin{figure}[here] +\begin{figure}[h] \begin{center} \begin{tabular}{|c|c|c|} \hline \textbf{Bits of Security} & \textbf{group\_size} & \textbf{modulus\_size} \\ @@ -4301,7 +4306,7 @@ LTC_SET_ASN1(sequence, x++, LTC_ASN1_NUL \end{verbatim} \end{small} -\begin{figure}[here] +\begin{figure}[h] \begin{center} \begin{small} \begin{tabular}{|l|l|} @@ -5042,7 +5047,7 @@ e^{1.923 \cdot ln(n)^{1 \over 3} \cdot l Note that $n$ is not the bit-length but the magnitude. For example, for a 1024-bit key $n = 2^{1024}$. The work required is: -\begin{figure}[here] +\begin{figure}[h] \begin{center} \begin{tabular}{|c|c|} \hline RSA/DH Key Size (bits) & Work Factor ($log_2$) \\ @@ -5062,7 +5067,7 @@ is: The work factor for ECC keys is much higher since the best attack is still fully exponential. Given a key of magnitude $n$ it requires $\sqrt n$ work. The following table summarizes the work required: -\begin{figure}[here] +\begin{figure}[h] \begin{center} \begin{tabular}{|c|c|} \hline ECC Key Size (bits) & Work Factor ($log_2$) \\