Message ID | 20220406130612.4974-1-adolf.belka@ipfire.org |
---|---|
State | Accepted |
Commit | 2a8de00c6fbc7625d385ebd04ad466ee8a024a12 |
Headers |
Return-Path: <development-bounces@lists.ipfire.org> Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4KYPsP5xsPz3x1w for <patchwork@web04.haj.ipfire.org>; Wed, 6 Apr 2022 13:06:17 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4KYPsP3Tcfzdm; Wed, 6 Apr 2022 13:06:17 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4KYPsP31ZLz2yd6; Wed, 6 Apr 2022 13:06:17 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4KYPsN5wNJz2xhV for <development@lists.ipfire.org>; Wed, 6 Apr 2022 13:06:16 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4KYPsN4gXhzZ5; Wed, 6 Apr 2022 13:06:16 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1649250376; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=9bCttb2W9iMmbN/54NSUIHTGR1oCc0+fpOql7if+aVw=; b=pvxyefNnZSoVBjW1Yhs6M8RqJ+UcQrz9VDCoABANlEgJ5pbesvt4eJh4mJUBwHXEsHpWnQ 1zf4hFWKU7mT6jAw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1649250376; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=9bCttb2W9iMmbN/54NSUIHTGR1oCc0+fpOql7if+aVw=; b=HPXxWUoNaIh9GsJh+Py3OZYBw4QEMMrFBwc0olI1oUb/1DO7FxqjiR2TER5sVGy6PgxDNw PZPnpWP+aQ0Hb7fGIKRSpU4f022HuUTTZqUNVtB7ziv0It1ZUgb+4uGbMRPGiN6ILSrHFa UfiF+YR70t18FtGC0B9OwLQf9X4N5tpSUzdn35l1rsdZTpWWeBl2gPdTnOC+o5SubNckk5 PpQaZpRMd5lRbeDS5EQZ+Ro94240IUF9vPoiqHkLuErar/l2Awd+abJGL1/s89WTXXCh48 opYzIoLyt8apEgJB01LooYvcdbCXmvpYxItSQVb5QGtphEaDAxTioPxhiT1+tg== From: Adolf Belka <adolf.belka@ipfire.org> To: development@lists.ipfire.org Subject: [PATCH] libgcrypt: Update to version 1.10.1 Date: Wed, 6 Apr 2022 15:06:12 +0200 Message-Id: <20220406130612.4974-1-adolf.belka@ipfire.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: IPFire development talk <development.lists.ipfire.org> List-Unsubscribe: <https://lists.ipfire.org/mailman/options/development>, <mailto:development-request@lists.ipfire.org?subject=unsubscribe> List-Archive: <http://lists.ipfire.org/pipermail/development/> List-Post: <mailto:development@lists.ipfire.org> List-Help: <mailto:development-request@lists.ipfire.org?subject=help> List-Subscribe: <https://lists.ipfire.org/mailman/listinfo/development>, <mailto:development-request@lists.ipfire.org?subject=subscribe> Errors-To: development-bounces@lists.ipfire.org Sender: "Development" <development-bounces@lists.ipfire.org> |
Series |
libgcrypt: Update to version 1.10.1
|
|
Commit Message
Adolf Belka
April 6, 2022, 1:06 p.m. UTC
- Update from 1.9.4 to 1.10.1
- Update of rootfile
- Changelog
Noteworthy changes in version 1.10.1 (2022-03-28) [C24/A4/R1]
* Bug fixes:
- Fix minor memory leaks in FIPS mode.
- Build fixes for MUSL libc. [rCffaef0be61]
* Other:
- More portable integrity check in FIPS mode. [rC9fa4c8946a,T5835]
- Add X9.62 OIDs to sha256 and sha512 modules. [rC52fd2305ba]
Noteworthy changes in version 1.10.0 (2022-02-01) [C24/A4/R0]
* New and extended interfaces:
- New control codes to check for FIPS 140-3 approved algorithms.
- New control code to switch into non-FIPS mode.
- New cipher modes SIV and GCM-SIV as specified by RFC-5297.
- Extended cipher mode AESWRAP with padding as specified by
RFC-5649. [T5752]
- New set of KDF functions.
- New KDF modes Argon2 and Balloon.
- New functions for combining hashing and signing/verification. [T4894]
* Performance:
- Improved support for PowerPC architectures.
- Improved ECC performance on zSeries/s390x by using accelerated
scalar multiplication.
- Many more assembler performance improvements for several
architectures.
* Bug fixes:
- Fix Elgamal encryption for other implementations.
[R5328,CVE-2021-40528]
- Fix alignment problem on macOS. [T5440]
- Check the input length of the point in ECDH. [T5423]
- Fix an abort in gcry_pk_get_param for "Curve25519". [T5490]
* Other features:
- The control code GCRYCTL_SET_ENFORCED_FIPS_FLAG is ignored
because it is useless with the FIPS 140-3 related changes.
- Update of the jitter entropy RNG code. [T5523]
- Simplification of the entropy gatherer when using the getentropy
system call.
* Interface changes relative to the 1.10.0 release:
GCRYCTL_SET_DECRYPTION_TAG NEW control code.
GCRYCTL_FIPS_SERVICE_INDICATOR_CIPHER NEW control code.
GCRYCTL_FIPS_SERVICE_INDICATOR_KDF NEW control code.
GCRYCTL_NO_FIPS_MODE = 83 NEW control code.
GCRY_CIPHER_MODE_SIV NEW mode.
GCRY_CIPHER_MODE_GCM_SIV NEW mode.
GCRY_CIPHER_EXTENDED NEW flag.
GCRY_SIV_BLOCK_LEN NEW macro.
gcry_cipher_set_decryption_tag NEW macro.
GCRY_KDF_ARGON2 NEW constant.
GCRY_KDF_BALLOON NEW constant.
GCRY_KDF_ARGON2D NEW constant.
GCRY_KDF_ARGON2I NEW constant.
GCRY_KDF_ARGON2ID NEW constant.
gcry_kdf_hd_t NEW type.
gcry_kdf_job_fn_t NEW type.
gcry_kdf_dispatch_job_fn_t NEW type.
gcry_kdf_wait_all_jobs_fn_t NEW type.
struct gcry_kdf_thread_ops NEW struct.
gcry_kdf_open NEW function.
gcry_kdf_compute NEW function.
gcry_kdf_final NEW function.
gcry_kdf_close NEW function.
gcry_pk_hash_sign NEW function.
gcry_pk_hash_verify NEW function.
gcry_pk_random_override_new NEW function.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
---
config/rootfiles/common/libgcrypt | 2 +-
lfs/libgcrypt | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
Comments
Reviewed-by: Peter Müller <peter.mueller@ipfire.org> > - Update from 1.9.4 to 1.10.1 > - Update of rootfile > - Changelog > Noteworthy changes in version 1.10.1 (2022-03-28) [C24/A4/R1] > * Bug fixes: > - Fix minor memory leaks in FIPS mode. > - Build fixes for MUSL libc. [rCffaef0be61] > * Other: > - More portable integrity check in FIPS mode. [rC9fa4c8946a,T5835] > - Add X9.62 OIDs to sha256 and sha512 modules. [rC52fd2305ba] > Noteworthy changes in version 1.10.0 (2022-02-01) [C24/A4/R0] > * New and extended interfaces: > - New control codes to check for FIPS 140-3 approved algorithms. > - New control code to switch into non-FIPS mode. > - New cipher modes SIV and GCM-SIV as specified by RFC-5297. > - Extended cipher mode AESWRAP with padding as specified by > RFC-5649. [T5752] > - New set of KDF functions. > - New KDF modes Argon2 and Balloon. > - New functions for combining hashing and signing/verification. [T4894] > * Performance: > - Improved support for PowerPC architectures. > - Improved ECC performance on zSeries/s390x by using accelerated > scalar multiplication. > - Many more assembler performance improvements for several > architectures. > * Bug fixes: > - Fix Elgamal encryption for other implementations. > [R5328,CVE-2021-40528] > - Fix alignment problem on macOS. [T5440] > - Check the input length of the point in ECDH. [T5423] > - Fix an abort in gcry_pk_get_param for "Curve25519". [T5490] > * Other features: > - The control code GCRYCTL_SET_ENFORCED_FIPS_FLAG is ignored > because it is useless with the FIPS 140-3 related changes. > - Update of the jitter entropy RNG code. [T5523] > - Simplification of the entropy gatherer when using the getentropy > system call. > * Interface changes relative to the 1.10.0 release: > GCRYCTL_SET_DECRYPTION_TAG NEW control code. > GCRYCTL_FIPS_SERVICE_INDICATOR_CIPHER NEW control code. > GCRYCTL_FIPS_SERVICE_INDICATOR_KDF NEW control code. > GCRYCTL_NO_FIPS_MODE = 83 NEW control code. > GCRY_CIPHER_MODE_SIV NEW mode. > GCRY_CIPHER_MODE_GCM_SIV NEW mode. > GCRY_CIPHER_EXTENDED NEW flag. > GCRY_SIV_BLOCK_LEN NEW macro. > gcry_cipher_set_decryption_tag NEW macro. > GCRY_KDF_ARGON2 NEW constant. > GCRY_KDF_BALLOON NEW constant. > GCRY_KDF_ARGON2D NEW constant. > GCRY_KDF_ARGON2I NEW constant. > GCRY_KDF_ARGON2ID NEW constant. > gcry_kdf_hd_t NEW type. > gcry_kdf_job_fn_t NEW type. > gcry_kdf_dispatch_job_fn_t NEW type. > gcry_kdf_wait_all_jobs_fn_t NEW type. > struct gcry_kdf_thread_ops NEW struct. > gcry_kdf_open NEW function. > gcry_kdf_compute NEW function. > gcry_kdf_final NEW function. > gcry_kdf_close NEW function. > gcry_pk_hash_sign NEW function. > gcry_pk_hash_verify NEW function. > gcry_pk_random_override_new NEW function. > > Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> > --- > config/rootfiles/common/libgcrypt | 2 +- > lfs/libgcrypt | 4 ++-- > 2 files changed, 3 insertions(+), 3 deletions(-) > > diff --git a/config/rootfiles/common/libgcrypt b/config/rootfiles/common/libgcrypt > index 8ca5cb325..8e7f74392 100644 > --- a/config/rootfiles/common/libgcrypt > +++ b/config/rootfiles/common/libgcrypt > @@ -6,7 +6,7 @@ > #usr/lib/libgcrypt.la > #usr/lib/libgcrypt.so > usr/lib/libgcrypt.so.20 > -usr/lib/libgcrypt.so.20.3.4 > +usr/lib/libgcrypt.so.20.4.1 > #usr/lib/pkgconfig/libgcrypt.pc > #usr/share/aclocal/libgcrypt.m4 > #usr/share/info/gcrypt.info > diff --git a/lfs/libgcrypt b/lfs/libgcrypt > index 04ced7775..bf81a0645 100644 > --- a/lfs/libgcrypt > +++ b/lfs/libgcrypt > @@ -24,7 +24,7 @@ > > include Config > > -VER = 1.9.4 > +VER = 1.10.1 > > THISAPP = libgcrypt-$(VER) > DL_FILE = $(THISAPP).tar.bz2 > @@ -40,7 +40,7 @@ objects = $(DL_FILE) > > $(DL_FILE) = $(DL_FROM)/$(DL_FILE) > > -$(DL_FILE)_BLAKE2 = b8244bc12a68955797b0c2b474ac5c95df1014231f7180a2ffa113e3aacedc98eed60ee1e4b30b032a5fcd6a04855ae07142c223906d5db9c28328a71e014f33 > +$(DL_FILE)_BLAKE2 = 46f30459891183b6d9ec18f1c7907fee0ad156c7dd75044f3db2b4d1c19dc6f30b2dfa6f85bc82adc9243aaba913e40fb6faf77d2226ca5a33897220d032437a > > install : $(TARGET) >
diff --git a/config/rootfiles/common/libgcrypt b/config/rootfiles/common/libgcrypt index 8ca5cb325..8e7f74392 100644 --- a/config/rootfiles/common/libgcrypt +++ b/config/rootfiles/common/libgcrypt @@ -6,7 +6,7 @@ #usr/lib/libgcrypt.la #usr/lib/libgcrypt.so usr/lib/libgcrypt.so.20 -usr/lib/libgcrypt.so.20.3.4 +usr/lib/libgcrypt.so.20.4.1 #usr/lib/pkgconfig/libgcrypt.pc #usr/share/aclocal/libgcrypt.m4 #usr/share/info/gcrypt.info diff --git a/lfs/libgcrypt b/lfs/libgcrypt index 04ced7775..bf81a0645 100644 --- a/lfs/libgcrypt +++ b/lfs/libgcrypt @@ -24,7 +24,7 @@ include Config -VER = 1.9.4 +VER = 1.10.1 THISAPP = libgcrypt-$(VER) DL_FILE = $(THISAPP).tar.bz2 @@ -40,7 +40,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_BLAKE2 = b8244bc12a68955797b0c2b474ac5c95df1014231f7180a2ffa113e3aacedc98eed60ee1e4b30b032a5fcd6a04855ae07142c223906d5db9c28328a71e014f33 +$(DL_FILE)_BLAKE2 = 46f30459891183b6d9ec18f1c7907fee0ad156c7dd75044f3db2b4d1c19dc6f30b2dfa6f85bc82adc9243aaba913e40fb6faf77d2226ca5a33897220d032437a install : $(TARGET)