pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/security/botan3
Module Name: pkgsrc
Committed By: nros
Date: Fri Nov 1 07:22:45 UTC 2024
Modified Files:
pkgsrc/security/botan3: Makefile Makefile.common PLIST buildlink3.mk
distinfo
Removed Files:
pkgsrc/security/botan3/patches: patch-src_lib_utils_simd_simd__32.h
Log Message:
Update botan3 and its python binding to version 3.6.1
This version includes the patch to fix build on non-vsx
powerpc cpus by he.
Changes from release notes:
Version 3.6.1, 2024-10-26
* Fix a bug in x86 CPUID detection introduced in 3.6.0 which would
cause crashes on systems which have BMI1 but not BMI2.
(GH #4402 #4401)
* Fix a bug in SLH-DSA signing, which did not default to the FIPS
required randomized variant. (GH #4398)
* Modify how elliptic curve blinding is performed, reducing the number
of self-additions that may occur during multiplication. (GH #4408)
* In speed command line utility, also iterate keygen several times.
(GH #4381)
Version 3.6.0, 2024-10-21
* Fully integrate and further optimize the new ECC library first
introduced in 3.5.0. For common curves, operations are 2 to 3
times faster. This also introduces a new API for low level EC
operations, such a point multiplication, using EC_Scalar and
EC_AffinePoint types.
(GH #4042 #4113 #4147 #4190 #4191 #4113 #4143 #4171 #4203 #4205 #4207
#4209 #4210 #4211 #4212 #4213 #4215 #4217 #4218 #4221 #4225 #4226
#4235 #4237 #4240 #4242 #4256 #4257 #4261 #4264 #4276 #4284 #4300)
* Add support for FIPS 203 ML-KEM, the NIST standardized version of
Kyber (GH #3893)
* Add support for FIPS 204 ML-DSA, the NIST standardized version of
Dilithium (GH #4270)
* Add support for FIPS 205 SLH-DSA, the NIST standardized version of
SPHINCS+ (GH #4291)
* Add support for TPM2 hardware (GH #4337 #4357 #4361)
* Add support for jitterentropy RNG (GH #4325)
* Constant time programming improvements including CT::Option
(GH #4175 #4197 #4198 #4204 #4207 #4254 #4260)
* Improve performance of hex (GH #4275) and base64 (GH #4271)
* In ECDSA blind the constant time inversion of the nonce, as an extra
precaution against side channel attacks. (GH #4259)
* Add support for AVX2-VAES instructions (GH #4286 #4287)
* Add GFNI-AVX2 acceleration for SM4 (GH #4289)
* Add support for elliptic curve numsp512d1 (GH #4251)
* Apply const-time checking annotations to Dilithium and Kyber
(GH #4223), X448/Ed448 (GH #4204), FrodoKEM (GH #4198),
LMS (GH #4272)
* Refactor internals of Dilithium and Kyber to share common elements
(GH #4024)
* Add a test suite for validating the const-time annotations (GH #4182)
* Internal refactorings of public key encryption to improve memory
safety and side channel resistance. (GH #4238 #4239)
* Cache the DER encoding of the OID format of an elliptic curve
(GH #4193)
* Correct inconsistencies with use of BOTAN_CLEAR_CPUID where dependent
instruction sets were not always disabled. (GH #4290)
* Deprecate the x25519/Kyber-512-r3 TLS ciphersuite. (GH #4347)
* Add CI nightly test using Intel SDE to test AVX-512 (GH #4296)
* Fix armv7/aarch64 CPU feature detection on FreeBSD (GH #4315)
* Add support for armv7/aarch64/ppc64 CPU feature detection on OpenBSD,
using a new API added in OpenBSD 7.6 (GH #4312)
* Fix a bug in the speed cli utility which caused it to report
incorrect values, especially for ciphers/hashes with small input
sizes. (GH #4311)
* Fix a bug where CMake and pkg-config files might be installed to the
wrong path (GH #4236 #4231)
* Fix certificate validation when the trust root is a self-signed MD2
cert. (GH #4247 #4248)
* Internal "strong types" improvments (GH #4170)
* Refactor the speed cli utility (GH #4364 #4367 #4369)
* Fix a test that was somewhat brittle and would fail if a specific
certificate was not in the system trust root store. (GH #4280)
* Update some documentation comments (GH #4185)
* In Argon2, avoid instantiating a thread pool when p == 1
(GH #4195 #4199)
* Disable the thread pool by default on Emscripten target
(GH #4195 #4199)
* Add compile time option to disable all use of inline assembly
(GH #4273 #4265)
Version 3.5.0, 2024-07-08
* CVE-2024-34702: Fix a DoS caused by excessive name constraints.
(GH #4186)
* CVE-2024-39312: Fix a name constraint processing error, where if
permitted and excluded rules both applied to a certificate, only
the permitted rules would be checked.
* Add a new much faster elliptic curve implementation. In this release,
this implementation is only used for hash2curve. (GH #3979)
* Add support for LMS hash based signatures (GH #3716 #4059)
* Add support for SSLKEYLOGFILE logging (GH #4043)
* Optimize processing in FFI botan_cipher_update (GH #3951)
* Add Public_Key::raw_public_key_bits (GH #3985)
* Optimize XTS mode (GH #4047)
* Optimize name constraint processing (GH #4047)
* Optimize FrodoKEM-AES (GH #4176 #4174 #4173)
* The build system now distinguishes between LLVM Clang and XCodes
Clang fork. For the latter, use compiler target xcode. (GH #4010)
* Fix a bug in scrypt autotune where, if it was called with a nominal
maximum memory limit of zero (meant to indicate no limit) would only
ever return parameters using 1 MB.
* Constant time programming improvements including CT::value_barrier
and CT::Choice (GH #4154 #4115 #4096 #4108)
* Refactor and optimize AlternativeName. This includes a new API.
The old API is retained but deprecated. (GH #4034)
* Kyber internals refactoring (GH #3887)
* Generate Kuznyechik tables at compile time instead of hard coding
them. (GH #4017)
* Enable using sysctlbyname on iOS (GH #4018)
* Previously Curve25519 was used to refer to key exchange over the
Montgomery curve modulo 2**255-19. This is now called X25519 in all
cases. Typedefs and a deprecated header are retained for
compatibility with older versions. (GH #4012)
* Fix several bugs related to encoding and decoding ASN.1 object
identifiers when the second arc is larger than 40. (GH #4063 #4023)
* Avoid sending IP addresses in the Server Name Indicator TLS extension,
if an IP address is used to initialize the TLS_Server_Info struct.
(GH #4059)
* During X.509 certificate verification, first verify the entire
sequence of signatures, then do other validation. (GH #4045)
* In DTLS fix a bug affecting retransmission of client hellos. (GH #4037)
* Fix a number of bugs related to name constraint processing. (GH #4074)
* Add support for parsing TNAuthList (secure telephony identity
credentials extension) from RFC 8226. (GH #4116)
* Add One-Step KDF from SP 800-56C (GH #4121)
* Fix a bug in RFC 6979 mode ECDSA. This only caused problems when
testing with certain curves and does not have any security or interop
implications. (GH #4040)
* Previously elliptic curve private keys could be of any size, with the
effective key reduced modulo the group order. Now during decoding the
private key must be in the specified bound. (GH #4040)
* Elliptic curve groups now verify that the prime and group order are
related in the manner expected. (GH #4039 #4041)
* Add a script to run the Limbo X.509 path validation test suite.
* Update the BoGo TLS test suite (GH #4078)
* Deprecate various low level BigInt and elliptic curve interfaces
(GH #4038 #4056)
* In 3.3.0, support for application specific curves in EC_Group with
parameters larger than 521 bits was deprecated. This release expands
that deprecation to further restrict future use of application
specific curves (see deprecated.rst for details). Add a new EC_Group
constructor which enforces these restrictions. (GH #4038)
* Fix a bug when creating a PKCS10 request or X.509 self signed
certificate when SubjectAlternativeName was included in the provided
extensions. If this occurred, any other values (eg opts.dns) would
be ignored. (GH #4032)
* Various low level multi precision integer refactorings and
improvements. (GH #4156 #4149 #4007 #4008 #3989 #3987)
* Increase the maximum supported key length of KMAC to 192 bytes
(GH #4109)
* Improve the utilities for checked (overflow safe) addition and
multiplication. (GH #3999)
* Optimize parsing of IPv4 dotted quad strings (GH #4058)
* A system for marking modules as deprecated was introduced in 3.4.0,
but it did not mark any modules as deprecated. This has now been
applied to various modules, which will then be disabled if
--disable-deprecated-features option is used at build time.
(GH #4050)
* Fix a bug in configure.py that caused --with-stack-protector to not
work. (GH #3996)
* Upgrade CI to use XCode 15.2 on x86-64 and XCode 15.3 on aarch64.
(GH #4005)
* Update most CI builds to run on Ubuntu 24.04 (GH #4098)
* Various clang-tidy fixes (GH #4070 #4075)
* Fixes for GCC 14 (GH #4046)
* Fix Roughtime to not reference a deprecated Cloudflare server.
(GH #4002 #3937)
Version 3.4.0, 2024-04-08
* Add Ed448 signatures and X448 key exchange (GH #3933)
* X.509 certificate verification now can optionally ignore the
expiration date of root certificates. (GH #3938)
* Support for hybrid EC point encoding is now deprecated. (GH #3981)
* Support for creating EC_Group objects with parameters larger than
521 bits is now deprecated (GH #3980)
* Add new build options to disable deprecated features, and to enable
experimental features. (GH #3910)
* Fix a bug affecting use of SIV and CCM ciphers in the FFI interface.
(GH #3971)
* Add new FFI interface botan_cipher_requires_entire_message (GH #3969)
* Internal refactorings of the mp layer to support a new elliptic curve
library. (GH #3973 #3977 #3962 #3957 #3964 #3956 #3961 #3950)
* Use a new method for constant time division in Kyber to avoid a
possible side channel where the compiler inserts use of a variable
time division. (GH #3959)
* Refactor test RNG usage to improve reproducibility. (GH #3920)
* Add std::span interfaces to BigInt (GH #3866)
* Refactorings and improvements to low level load/store utility
functions. (GH #3869)
* Fix the amalgamation build on ARM64 (GH #3931)
* Add Mac ARM based CI build (GH #3931)
* Fix a thread serialization bug that caused sporadic test failures.
(GH #3922)
* Update GH Actions to v4 (GH #3923)
* Add examples of password based encryption and HTTPS+ASIO client.
(GH #3935 #3910)
To generate a diff of this commit:
cvs rdiff -u -r1.13 -r1.14 pkgsrc/security/botan3/Makefile
cvs rdiff -u -r1.5 -r1.6 pkgsrc/security/botan3/Makefile.common \
pkgsrc/security/botan3/PLIST
cvs rdiff -u -r1.6 -r1.7 pkgsrc/security/botan3/buildlink3.mk \
pkgsrc/security/botan3/distinfo
cvs rdiff -u -r1.1 -r0 \
pkgsrc/security/botan3/patches/patch-src_lib_utils_simd_simd__32.h
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/security/botan3/Makefile
diff -u pkgsrc/security/botan3/Makefile:1.13 pkgsrc/security/botan3/Makefile:1.14
--- pkgsrc/security/botan3/Makefile:1.13 Fri Nov 1 00:53:26 2024
+++ pkgsrc/security/botan3/Makefile Fri Nov 1 07:22:45 2024
@@ -1,6 +1,5 @@
-# $NetBSD: Makefile,v 1.13 2024/11/01 00:53:26 wiz Exp $
+# $NetBSD: Makefile,v 1.14 2024/11/01 07:22:45 nros Exp $
-PKGREVISION= 3
.include "Makefile.common"
PKGNAME= ${DISTNAME:S/Botan/botan3/}
Index: pkgsrc/security/botan3/Makefile.common
diff -u pkgsrc/security/botan3/Makefile.common:1.5 pkgsrc/security/botan3/Makefile.common:1.6
--- pkgsrc/security/botan3/Makefile.common:1.5 Sun Feb 25 14:58:00 2024
+++ pkgsrc/security/botan3/Makefile.common Fri Nov 1 07:22:45 2024
@@ -1,8 +1,8 @@
-# $NetBSD: Makefile.common,v 1.5 2024/02/25 14:58:00 wiz Exp $
+# $NetBSD: Makefile.common,v 1.6 2024/11/01 07:22:45 nros Exp $
#
# used by security/py-botan3/Makefile
-DISTNAME= Botan-3.3.0
+DISTNAME= Botan-3.6.1
CATEGORIES= security
MASTER_SITES= https://botan.randombit.net/releases/
EXTRACT_SUFX= .tar.xz
Index: pkgsrc/security/botan3/PLIST
diff -u pkgsrc/security/botan3/PLIST:1.5 pkgsrc/security/botan3/PLIST:1.6
--- pkgsrc/security/botan3/PLIST:1.5 Sun Feb 25 14:58:00 2024
+++ pkgsrc/security/botan3/PLIST Fri Nov 1 07:22:45 2024
@@ -1,4 +1,4 @@
-@comment $NetBSD: PLIST,v 1.5 2024/02/25 14:58:00 wiz Exp $
+@comment $NetBSD: PLIST,v 1.6 2024/11/01 07:22:45 nros Exp $
bin/botan3
include/botan-3/botan/aead.h
include/botan-3/botan/allocator.h
@@ -47,8 +47,10 @@ include/botan-3/botan/dilithium.h
include/botan-3/botan/dl_group.h
include/botan-3/botan/dlies.h
include/botan-3/botan/dsa.h
+include/botan-3/botan/ec_apoint.h
include/botan-3/botan/ec_group.h
include/botan-3/botan/ec_point.h
+include/botan-3/botan/ec_scalar.h
include/botan-3/botan/ecc_key.h
include/botan-3/botan/ecdh.h
include/botan-3/botan/ecdsa.h
@@ -56,6 +58,7 @@ include/botan-3/botan/ecgdsa.h
include/botan-3/botan/ecies.h
include/botan-3/botan/eckcdsa.h
include/botan-3/botan/ed25519.h
+include/botan-3/botan/ed448.h
include/botan-3/botan/elgamal.h
include/botan-3/botan/entropy_src.h
include/botan-3/botan/exceptn.h
@@ -70,12 +73,15 @@ include/botan-3/botan/gost_3410.h
include/botan-3/botan/hash.h
include/botan-3/botan/hex.h
include/botan-3/botan/hmac_drbg.h
+include/botan-3/botan/hss_lms.h
include/botan-3/botan/kdf.h
include/botan-3/botan/kyber.h
include/botan-3/botan/lzma.h
include/botan-3/botan/mac.h
include/botan-3/botan/mceliece.h
include/botan-3/botan/mem_ops.h
+include/botan-3/botan/ml_dsa.h
+include/botan-3/botan/ml_kem.h
include/botan-3/botan/mutex.h
include/botan-3/botan/nist_keywrap.h
include/botan-3/botan/numthry.h
@@ -120,6 +126,7 @@ include/botan-3/botan/roughtime.h
include/botan-3/botan/rsa.h
include/botan-3/botan/scrypt.h
include/botan-3/botan/secmem.h
+include/botan-3/botan/slh_dsa.h
include/botan-3/botan/sm2.h
include/botan-3/botan/sodium.h
include/botan-3/botan/sp_parameters.h
@@ -163,6 +170,8 @@ include/botan-3/botan/tss.h
include/botan-3/botan/types.h
include/botan-3/botan/uuid.h
include/botan-3/botan/version.h
+include/botan-3/botan/x25519.h
+include/botan-3/botan/x448.h
include/botan-3/botan/x509_ca.h
include/botan-3/botan/x509_crl.h
include/botan-3/botan/x509_ext.h
@@ -180,8 +189,8 @@ lib/cmake/Botan-${PKGVERSION}/botan-conf
lib/cmake/Botan-${PKGVERSION}/botan-config.cmake
lib/libbotan-3.a
lib/libbotan-3.so
-lib/libbotan-3.so.3
-lib/libbotan-3.so.3.3.0
+lib/libbotan-3.so.6
+lib/libbotan-3.so.6.6.1
lib/pkgconfig/botan-3.pc
share/doc/${PKGNAME}/authors.txt
share/doc/${PKGNAME}/handbook/abi.rst
@@ -233,6 +242,7 @@ share/doc/${PKGNAME}/handbook/dev_ref/co
share/doc/${PKGNAME}/handbook/dev_ref/contributing.rst
share/doc/${PKGNAME}/handbook/dev_ref/fuzzing.rst
share/doc/${PKGNAME}/handbook/dev_ref/mistakes.rst
+share/doc/${PKGNAME}/handbook/dev_ref/next_major.rst
share/doc/${PKGNAME}/handbook/dev_ref/oids.rst
share/doc/${PKGNAME}/handbook/dev_ref/os.rst
share/doc/${PKGNAME}/handbook/dev_ref/reading_list.rst
Index: pkgsrc/security/botan3/buildlink3.mk
diff -u pkgsrc/security/botan3/buildlink3.mk:1.6 pkgsrc/security/botan3/buildlink3.mk:1.7
--- pkgsrc/security/botan3/buildlink3.mk:1.6 Fri Oct 4 03:49:34 2024
+++ pkgsrc/security/botan3/buildlink3.mk Fri Nov 1 07:22:45 2024
@@ -1,4 +1,4 @@
-# $NetBSD: buildlink3.mk,v 1.6 2024/10/04 03:49:34 ryoon Exp $
+# $NetBSD: buildlink3.mk,v 1.7 2024/11/01 07:22:45 nros Exp $
BUILDLINK_TREE+= botan3
@@ -6,7 +6,7 @@ BUILDLINK_TREE+= botan3
BOTAN3_BUILDLINK3_MK:=
BUILDLINK_API_DEPENDS.botan3+= botan3>=3.0.0
-BUILDLINK_ABI_DEPENDS.botan3?= botan3>=3.3.0nb2
+BUILDLINK_ABI_DEPENDS.botan3?= botan3>=3.6.1
BUILDLINK_PKGSRCDIR.botan3?= ../../security/botan3
.include "../../devel/boost-libs/buildlink3.mk"
Index: pkgsrc/security/botan3/distinfo
diff -u pkgsrc/security/botan3/distinfo:1.6 pkgsrc/security/botan3/distinfo:1.7
--- pkgsrc/security/botan3/distinfo:1.6 Sat Mar 30 12:40:21 2024
+++ pkgsrc/security/botan3/distinfo Fri Nov 1 07:22:45 2024
@@ -1,7 +1,6 @@
-$NetBSD: distinfo,v 1.6 2024/03/30 12:40:21 he Exp $
+$NetBSD: distinfo,v 1.7 2024/11/01 07:22:45 nros Exp $
-BLAKE2s (Botan-3.3.0.tar.xz) = d590464efbb88c78d7bb9661a9a436b0f6ad878f2eefef1b12f4a2fa4a55d6e3
-SHA512 (Botan-3.3.0.tar.xz) = 90930add225a2b4376046b3ed0177c71e7d19e983fb2b99c40751de5e6c3959b520eaa1e836782eb02ebc8aff8e9a4fd928f585de5e6b1798a8ad4aa0464f19b
-Size (Botan-3.3.0.tar.xz) = 7164024 bytes
-SHA1 (patch-src_lib_utils_simd_simd__32.h) = 5547adde559696927279414b9ff6e27b10ea0b6b
+BLAKE2s (Botan-3.6.1.tar.xz) = b3168adf972bcd88107fe963edce95a4503f911e0037c4ee0ddc522109194361
+SHA512 (Botan-3.6.1.tar.xz) = 06327c55bee5e0d2e142f81b997dd8a1ef98f61ef920b57f6eb4e80ebf6b3de1c62373b889d4a32e62509495792e0b46d5dcc82a6446266974b4d4ead8d9f287
+Size (Botan-3.6.1.tar.xz) = 7581864 bytes
SHA1 (patch-src_scripts_install.py) = c8ac2a6315e0e53a0292447e8e6b967572de9d24
Home |
Main Index |
Thread Index |
Old Index