Overview

Request 402491 accepted

- update to 0.14
* Fix serialization of DH and ECDH
* Reduce size of SHA3 context instead of allocating all-size fit memory. save up to
72 bytes of memory per context for SHA3-512.
* Add a Seed capability to the main DRG, to be able to debug/reproduce randomized
program where you would want to disable the randomness.
* Add support for Cipher-based Message Authentication Code (CMAC) (Kei Hibino)
* CHANGE Change the SharedKey for Crypto.PubKey.DH and Crypto.PubKey.ECC.DH, from
an Integer newtype to a ScrubbedBytes newtype. Prevent mistake where the bytes
representation is generated without the right padding (when needed).
* CHANGE Keep The field size in bits, in the Params in Crypto.PubKey.DH, moving
from 2 elements to 3 elements in the structure.

- update to 0.13
* SECURITY Fix buffer overflow issue in SHA384, copying 16 extra bytes from
the SHA512 context to the destination memory pointer leading to memory
corruption, segfault
* Fix compilation issue with Ed448 on 32 bits machine.

- update to 0.11
* Truncate hashing correctly for DSA
* Add support for HKDF (RFC 5869)
* Add support for Ed448
* Extends support for Blake2s to 224 bits version.
* Compilation fix with AESNI and ghci compiling C source in a weird order.
* Fix example compilation, typo, and warning

- update to 0.10
- drop blake2-fix.patch
* Add reference implementation of blake2 for non-SSE2 platfom

Request History
Ondřej Súkup's avatar

mimi_vx created request

- update to 0.14
* Fix serialization of DH and ECDH
* Reduce size of SHA3 context instead of allocating all-size fit memory. save up to
72 bytes of memory per context for SHA3-512.
* Add a Seed capability to the main DRG, to be able to debug/reproduce randomized
program where you would want to disable the randomness.
* Add support for Cipher-based Message Authentication Code (CMAC) (Kei Hibino)
* CHANGE Change the SharedKey for Crypto.PubKey.DH and Crypto.PubKey.ECC.DH, from
an Integer newtype to a ScrubbedBytes newtype. Prevent mistake where the bytes
representation is generated without the right padding (when needed).
* CHANGE Keep The field size in bits, in the Params in Crypto.PubKey.DH, moving
from 2 elements to 3 elements in the structure.

- update to 0.13
* SECURITY Fix buffer overflow issue in SHA384, copying 16 extra bytes from
the SHA512 context to the destination memory pointer leading to memory
corruption, segfault
* Fix compilation issue with Ed448 on 32 bits machine.

- update to 0.11
* Truncate hashing correctly for DSA
* Add support for HKDF (RFC 5869)
* Add support for Ed448
* Extends support for Blake2s to 224 bits version.
* Compilation fix with AESNI and ghci compiling C source in a weird order.
* Fix example compilation, typo, and warning

- update to 0.10
- drop blake2-fix.patch
* Add reference implementation of blake2 for non-SSE2 platfom


Leap Reviewbot's avatar

leaper added lnussel as a reviewer


Leap Reviewbot's avatar

leaper accepted review

review failed
Origin project changed(was openSUSE:Leap:42.1)
source is in Factory though


Ludwig Nussel's avatar

lnussel_factory added as a reviewer

Being evaluated by staging project "openSUSE:Leap:42.2:Staging:adi:8"


Ludwig Nussel's avatar

lnussel_factory accepted review

Picked openSUSE:Leap:42.2:Staging:adi:8


Ludwig Nussel's avatar

lnussel accepted review

ok


Max Lin's avatar

mlin7442 accepted review

ready to accept


Max Lin's avatar

mlin7442 approved review

ready to accept


Ludwig Nussel's avatar

lnussel_factory accepted request

Accept to openSUSE:Leap:42.2

openSUSE Build Service is sponsored by