Compare commits
1 Commits
| Author | SHA256 | Date | |
|---|---|---|---|
| 9d067f9f3d |
BIN
0.10.1.tar.gz
LFS
Normal file
BIN
0.10.1.tar.gz
LFS
Normal file
Binary file not shown.
BIN
0.12.0.tar.gz
LFS
BIN
0.12.0.tar.gz
LFS
Binary file not shown.
@@ -1,2 +1,2 @@
|
||||
liboqs7
|
||||
liboqs5
|
||||
liboqs-devel
|
||||
|
||||
@@ -1,78 +1,3 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Dec 10 07:51:25 UTC 2024 - Marcus Meissner <meissner@suse.com>
|
||||
|
||||
- Updated to 0.12.0:
|
||||
- This release updates the ML-DSA implementation to the [final
|
||||
FIPS 204](https://csrc.nist.gov/pubs/fips/204/final) version. This
|
||||
release still includes the NIST Round 3 version of Dilithium for
|
||||
interoperability purposes, but we plan to remove Dilithium Round 3 in
|
||||
a future release.
|
||||
|
||||
- This will be the last release of liboqs to include Kyber (that is,
|
||||
the NIST Round 3 version of Kyber, prior to its standardization by NIST
|
||||
as ML-KEM in FIPS 203). Applications should switch to ML-KEM (FIPS 203).
|
||||
|
||||
- The addition of ML-DSA FIPS 204 final version to liboqs has
|
||||
introduced a new signature API which includes a context string
|
||||
parameter. We are planning to remove the old version of the API
|
||||
without a context string in the next release to streamline the
|
||||
API and bring it in line with NIST specifications. Users who
|
||||
have an opinion on this removal are invited to provide input at
|
||||
https://github.com/open-quantum-safe/liboqs/issues/2001.
|
||||
|
||||
Security issues:
|
||||
|
||||
- CVE-2024-54137: Fixed bug in HQC decapsulation that leads to incorrect
|
||||
shared secret value during decapsulation when called with an invalid
|
||||
ciphertext. (bsc#1234292)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sun Sep 29 09:48:19 UTC 2024 - Marcus Meissner <meissner@suse.com>
|
||||
|
||||
- Updated to 0.11.0:
|
||||
* This release updates ML-KEM implementations to their final FIPS 203
|
||||
https://csrc.nist.gov/pubs/fips/203/final versions .
|
||||
* This release still includes the NIST Round 3 version of Kyber for
|
||||
interoperability purposes, but we plan to remove Kyber Round 3 in a
|
||||
future release.
|
||||
* Additionally, this release adds support for MAYO and CROSS
|
||||
digital signature schemes from [NIST Additional Signatures Round 1
|
||||
https://csrc.nist.gov/Projects/pqc-dig-sig/round-1-additional-signatures
|
||||
along with stateful hash-based signature schemes XMSS
|
||||
https://datatracker.ietf.org/doc/html/rfc8391 and LMS
|
||||
https://datatracker.ietf.org/doc/html/rfc8554.
|
||||
* Finally, this release provides formally verified
|
||||
implementations of Kyber-512 and Kyber-768 from libjade
|
||||
https://github.com/formosa-crypto/libjade/releases/tag/release%2F2023.05-2
|
||||
|
||||
* LMS and XMSS are disabled by default due to the security risks associated with their use in software.
|
||||
See the note on stateful hash-based signatures in CONFIGURE.md
|
||||
|
||||
* Key encapsulation mechanisms:
|
||||
|
||||
- Kyber: Added formally-verified portable C and AVX2 implementations
|
||||
of Kyber-512 and Kyber-768 from libjade.
|
||||
- ML-KEM: Updated portable C and AVX2 implementations of ML-KEM-512,
|
||||
ML-KEM-768, and ML-KEM-1024 to FIP 203 version.
|
||||
- Kyber: Patched ARM64 implementations of Kyber-512, Kyber-768, and
|
||||
Kyber-1024 to work with AddressSanitizer.
|
||||
|
||||
* Digital signature schemes:
|
||||
|
||||
- LMS/XMSS: Added implementations of stateful hash-based signature
|
||||
schemes: XMSS and LMS
|
||||
- MAYO: Added portable C and AVX2 implementations of MAYO signature
|
||||
scheme from NIST Additional Signatures Round 1.
|
||||
- CROSS: Added portable C and AVX2 implementations of CROSS signature
|
||||
scheme from NIST Additional Signatures Round 1.
|
||||
|
||||
* Other changes:
|
||||
|
||||
- Added callback API to use custom implementations of AES, SHA2, and SHA3.
|
||||
- Refactor SHA3 implementation to use OpenSSL's EVP_DigestSqueeze() API.
|
||||
|
||||
- new library major version 6
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Jun 11 08:39:32 UTC 2024 - Marcus Meissner <meissner@suse.com>
|
||||
|
||||
|
||||
16
liboqs.spec
16
liboqs.spec
@@ -17,7 +17,7 @@
|
||||
|
||||
|
||||
Name: liboqs
|
||||
Version: 0.12.0
|
||||
Version: 0.10.1
|
||||
Release: 0
|
||||
Summary: C library for quantum-resistant cryptographic algorithms
|
||||
License: MIT
|
||||
@@ -35,18 +35,18 @@ BuildRequires: libopenssl-devel
|
||||
liboqs is a C library for quantum-resistant cryptographic algorithms.
|
||||
See the bundled README.md for particular limitations on intended use.
|
||||
|
||||
%package -n liboqs7
|
||||
%package -n liboqs5
|
||||
Summary: C library for quantum-resistant cryptographic algorithms
|
||||
Group: System/Libraries
|
||||
|
||||
%description -n liboqs7
|
||||
%description -n liboqs5
|
||||
liboqs is a C library for quantum-resistant cryptographic algorithms.
|
||||
See the bundled README.md for particular limitations on intended use.
|
||||
|
||||
%package devel
|
||||
Summary: Headers for liboqs, a library for quantum-resistant cryptography
|
||||
Group: Development/Languages/C and C++
|
||||
Requires: liboqs7 = %{version}
|
||||
Requires: liboqs5 = %{version}
|
||||
|
||||
%description devel
|
||||
liboqs is a C library for quantum-resistant cryptographic algorithms.
|
||||
@@ -78,13 +78,13 @@ mv %{buildroot}%{_prefix}/local/* %{buildroot}%{_prefix}
|
||||
|
||||
rmdir %{buildroot}%{_prefix}/local/
|
||||
|
||||
%post -n liboqs7 -p /sbin/ldconfig
|
||||
%postun -n liboqs7 -p /sbin/ldconfig
|
||||
%post -n liboqs5 -p /sbin/ldconfig
|
||||
%postun -n liboqs5 -p /sbin/ldconfig
|
||||
|
||||
%files -n liboqs7
|
||||
%files -n liboqs5
|
||||
%license LICENSE.txt
|
||||
%{_libdir}/liboqs.so.%version
|
||||
%{_libdir}/liboqs.so.7
|
||||
%{_libdir}/liboqs.so.5
|
||||
%doc README.md
|
||||
|
||||
%files devel
|
||||
|
||||
Reference in New Issue
Block a user