forked from pool/libsodium
Compare commits
4 Commits
| Author | SHA256 | Date | |
|---|---|---|---|
| 184188b9ed | |||
| 96dd4950eb | |||
| ecb99d1c1c | |||
| 97e7836fd8 |
BIN
libsodium-1.0.20.tar.gz
LFS
BIN
libsodium-1.0.20.tar.gz
LFS
Binary file not shown.
Binary file not shown.
BIN
libsodium-1.0.21.tar.gz
LFS
Normal file
BIN
libsodium-1.0.21.tar.gz
LFS
Normal file
Binary file not shown.
BIN
libsodium-1.0.21.tar.gz.sig
Normal file
BIN
libsodium-1.0.21.tar.gz.sig
Normal file
Binary file not shown.
49
libsodium-Fix-compilation-with-GCC-on-aarch64.patch
Normal file
49
libsodium-Fix-compilation-with-GCC-on-aarch64.patch
Normal file
@@ -0,0 +1,49 @@
|
|||||||
|
From 6702f69bef6044163acc7715e6ac7e430890ce78 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Frank Denis <github@pureftpd.org>
|
||||||
|
Date: Wed, 7 Jan 2026 12:00:49 +0100
|
||||||
|
Subject: [PATCH] Fix compilation with GCC on aarch64
|
||||||
|
|
||||||
|
Use unsigned NEON intrinsics everywhere
|
||||||
|
|
||||||
|
Fixes #1502
|
||||||
|
|
||||||
|
Signed-off-by: Lucas Mulling <lucas.mulling@suse.com>
|
||||||
|
---
|
||||||
|
src/libsodium/crypto_ipcrypt/ipcrypt_armcrypto.c | 14 +++++++-------
|
||||||
|
1 file changed, 7 insertions(+), 7 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/src/libsodium/crypto_ipcrypt/ipcrypt_armcrypto.c b/src/libsodium/crypto_ipcrypt/ipcrypt_armcrypto.c
|
||||||
|
index c5a27e92..bad4ce38 100644
|
||||||
|
--- a/src/libsodium/crypto_ipcrypt/ipcrypt_armcrypto.c
|
||||||
|
+++ b/src/libsodium/crypto_ipcrypt/ipcrypt_armcrypto.c
|
||||||
|
@@ -37,7 +37,7 @@ typedef uint64x2_t BlockVec;
|
||||||
|
# define XOR128_3(a, b, c) veorq_u64(veorq_u64((a), (b)), (c))
|
||||||
|
# define SET64x2(a, b) vsetq_lane_u64((uint64_t) (a), vmovq_n_u64((uint64_t) (b)), 1)
|
||||||
|
# define BYTESHL128(a, b) \
|
||||||
|
- vreinterpretq_u64_u8(vextq_s8(vdupq_n_s8(0), vreinterpretq_s8_u64(a), 16 - (b)))
|
||||||
|
+ vreinterpretq_u64_u8(vextq_u8(vdupq_n_u8(0), vreinterpretq_u8_u64(a), 16 - (b)))
|
||||||
|
|
||||||
|
# define AES_XENCRYPT(block_vec, rkey) \
|
||||||
|
vreinterpretq_u64_u8( \
|
||||||
|
@@ -348,12 +348,12 @@ pfx_set_bit(uint8_t ip16[16], const unsigned int bit_index, const uint8_t bit_va
|
||||||
|
static void
|
||||||
|
pfx_shift_left(uint8_t ip16[16])
|
||||||
|
{
|
||||||
|
- BlockVec v = LOAD128(ip16);
|
||||||
|
- const BlockVec shl = vshlq_n_u8(vreinterpretq_u8_u64(v), 1);
|
||||||
|
- const BlockVec msb = vshrq_n_u8(vreinterpretq_u8_u64(v), 7);
|
||||||
|
- const BlockVec zero = vdupq_n_u8(0);
|
||||||
|
- const BlockVec carries = vextq_u8(vreinterpretq_u8_u64(msb), zero, 1);
|
||||||
|
- v = vreinterpretq_u64_u8(vorrq_u8(shl, carries));
|
||||||
|
+ BlockVec v = LOAD128(ip16);
|
||||||
|
+ const uint8x16_t shl = vshlq_n_u8(vreinterpretq_u8_u64(v), 1);
|
||||||
|
+ const uint8x16_t msb = vshrq_n_u8(vreinterpretq_u8_u64(v), 7);
|
||||||
|
+ const uint8x16_t zero = vdupq_n_u8(0);
|
||||||
|
+ const uint8x16_t carries = vextq_u8(msb, zero, 1);
|
||||||
|
+ v = vreinterpretq_u64_u8(vorrq_u8(shl, carries));
|
||||||
|
STORE128(ip16, v);
|
||||||
|
}
|
||||||
|
|
||||||
|
--
|
||||||
|
2.52.0
|
||||||
|
|
||||||
@@ -1,3 +1,36 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Jan 8 13:04:50 UTC 2026 - Lucas Mulling <lucas.mulling@suse.com>
|
||||||
|
|
||||||
|
- Update to 1.0.21 (bsc#1256070, CVE-2025-15444, bsc#1255764, CVE-2025-69277):
|
||||||
|
* The new crypto_ipcrypt_* functions implement mechanisms for securely
|
||||||
|
encrypting and anonymizing IP addresses.
|
||||||
|
* The sodium_bin2ip and sodium_ip2bin helper functions have been added to
|
||||||
|
complement the crypto_ipcrypt_* functions and easily convert addresses
|
||||||
|
between bytes and strings.
|
||||||
|
* XOF: the crypto_xof_shake* and crypto_xof_turboshake* functions are
|
||||||
|
* standard
|
||||||
|
extendable output functions. From input of any length, they can derive
|
||||||
|
output of any length with the same properties as hash functions. These
|
||||||
|
primitives are required by many post-quantum mechanisms, but can also be
|
||||||
|
used for a wide range of applications, including key derivation, session
|
||||||
|
encryption and more.
|
||||||
|
* Performance of AES256-GCM and AEGIS on ARM has been improved with some
|
||||||
|
compilers
|
||||||
|
* Security: optblockers have been introduced in critical code paths to prevent
|
||||||
|
compilers from introducing unwanted side channels via conditional jumps. This
|
||||||
|
was observed on RISC-V targets with specific compilers and options.
|
||||||
|
* Security: crypto_core_ed25519_is_valid_point() now properly rejects
|
||||||
|
small-order points that are not in the main subgroup
|
||||||
|
* ((nonnull)) attributes have been relaxed on some crypto_stream* functions to
|
||||||
|
allow NULL output buffers when the output length is zero
|
||||||
|
* A cross-compilation issue with old clang versions has been fixed
|
||||||
|
* crypto_aead_aes256gcm_is_available is exported to JavaScript
|
||||||
|
* Security: memory fences have been added after MAC verification in AEAD to
|
||||||
|
prevent speculative access to plaintext before authentication is complete
|
||||||
|
* Assembly files now include .gnu.property notes for proper IBT and Shadow
|
||||||
|
Stack support when building with CET instrumentation.
|
||||||
|
- Add patch libsodium-Fix-compilation-with-GCC-on-aarch64.patch
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sat May 25 16:54:11 UTC 2024 - Andreas Stieger <andreas.stieger@gmx.de>
|
Sat May 25 16:54:11 UTC 2024 - Andreas Stieger <andreas.stieger@gmx.de>
|
||||||
|
|
||||||
@@ -29,23 +62,23 @@ Sun Jun 16 10:04:32 UTC 2019 - ecsos@opensuse.org
|
|||||||
- Enterprise versions of Visual Studio are now supported.
|
- Enterprise versions of Visual Studio are now supported.
|
||||||
- Visual Studio 2019 is now supported.
|
- Visual Studio 2019 is now supported.
|
||||||
- 32-bit binaries for Visual Studio 2010 are now provided.
|
- 32-bit binaries for Visual Studio 2010 are now provided.
|
||||||
- A test designed to trigger an OOM condition didn't work on
|
- A test designed to trigger an OOM condition didn't work on
|
||||||
Linux systems with memory overcommit turned on. It has been
|
Linux systems with memory overcommit turned on. It has been
|
||||||
removed in order to fix Ansible builds.
|
removed in order to fix Ansible builds.
|
||||||
- Emscripten: print and printErr functions are overridden to send
|
- Emscripten: print and printErr functions are overridden to send
|
||||||
errors to the console, if there is one.
|
errors to the console, if there is one.
|
||||||
- Emscripten: UTF8ToString() is now exported since
|
- Emscripten: UTF8ToString() is now exported since
|
||||||
Pointer_stringify() has been deprecated.
|
Pointer_stringify() has been deprecated.
|
||||||
- Libsodium version detection has been fixed in the CMake recipe.
|
- Libsodium version detection has been fixed in the CMake recipe.
|
||||||
- Generic hashing got a 10% speedup on AVX2.
|
- Generic hashing got a 10% speedup on AVX2.
|
||||||
- New target: WebAssembly/WASI
|
- New target: WebAssembly/WASI
|
||||||
(compile with dist-builds/wasm32-wasi.sh).
|
(compile with dist-builds/wasm32-wasi.sh).
|
||||||
- New functions to map a hash to an edwards25519 point
|
- New functions to map a hash to an edwards25519 point
|
||||||
or get a random point:
|
or get a random point:
|
||||||
core_ed25519_from_hash() and core_ed25519_random().
|
core_ed25519_from_hash() and core_ed25519_random().
|
||||||
- crypto_core_ed25519_scalar_mul() has been implemented for
|
- crypto_core_ed25519_scalar_mul() has been implemented for
|
||||||
scalar*scalar (mod L) multiplication.
|
scalar*scalar (mod L) multiplication.
|
||||||
- Support for the Ristretto group has been implemented for
|
- Support for the Ristretto group has been implemented for
|
||||||
interoperability with wasm-crypto.
|
interoperability with wasm-crypto.
|
||||||
- Improvements have been made to the test suite.
|
- Improvements have been made to the test suite.
|
||||||
- Portability improvements have been made.
|
- Portability improvements have been made.
|
||||||
@@ -61,36 +94,36 @@ Sun Jun 16 10:04:32 UTC 2019 - ecsos@opensuse.org
|
|||||||
Sat Feb 2 10:06:12 UTC 2019 - ecsos@opensuse.org
|
Sat Feb 2 10:06:12 UTC 2019 - ecsos@opensuse.org
|
||||||
|
|
||||||
- Update to 1.0.17
|
- Update to 1.0.17
|
||||||
- Bug fix: sodium_pad() didn't properly support block sizes
|
- Bug fix: sodium_pad() didn't properly support block sizes
|
||||||
>= 256 bytes.
|
>= 256 bytes.
|
||||||
- JS/WebAssembly: some old iOS versions can't instantiate the
|
- JS/WebAssembly: some old iOS versions can't instantiate the
|
||||||
WebAssembly module; fall back to Javascript on these.
|
WebAssembly module; fall back to Javascript on these.
|
||||||
- JS/WebAssembly: compatibility with newer Emscripten versions.
|
- JS/WebAssembly: compatibility with newer Emscripten versions.
|
||||||
- Bug fix: crypto_pwhash_scryptsalsa208sha256_str_verify() and
|
- Bug fix: crypto_pwhash_scryptsalsa208sha256_str_verify() and
|
||||||
crypto_pwhash_scryptsalsa208sha256_str_needs_rehash()didn't
|
crypto_pwhash_scryptsalsa208sha256_str_needs_rehash()didn't
|
||||||
returnEINVAL` on input strings with a short length, unlike
|
returnEINVAL` on input strings with a short length, unlike
|
||||||
their high-level counterpart.
|
their high-level counterpart.
|
||||||
- Added a workaround for Visual Studio 2010 bug causing CPU
|
- Added a workaround for Visual Studio 2010 bug causing CPU
|
||||||
features not to be detected.
|
features not to be detected.
|
||||||
- Portability improvements.
|
- Portability improvements.
|
||||||
- Test vectors from Project Wycheproof have been added.
|
- Test vectors from Project Wycheproof have been added.
|
||||||
- New low-level APIs for arithmetic mod the order of the prime
|
- New low-level APIs for arithmetic mod the order of the prime
|
||||||
order group:
|
order group:
|
||||||
- crypto_core_ed25519_scalar_random(),
|
- crypto_core_ed25519_scalar_random(),
|
||||||
crypto_core_ed25519_scalar_reduce(),
|
crypto_core_ed25519_scalar_reduce(),
|
||||||
- crypto_core_ed25519_scalar_invert(),
|
- crypto_core_ed25519_scalar_invert(),
|
||||||
crypto_core_ed25519_scalar_negate(),
|
crypto_core_ed25519_scalar_negate(),
|
||||||
- crypto_core_ed25519_scalar_complement(),
|
- crypto_core_ed25519_scalar_complement(),
|
||||||
crypto_core_ed25519_scalar_add() and
|
crypto_core_ed25519_scalar_add() and
|
||||||
crypto_core_ed25519_scalar_sub().
|
crypto_core_ed25519_scalar_sub().
|
||||||
- New low-level APIs for scalar multiplication without clamping:
|
- New low-level APIs for scalar multiplication without clamping:
|
||||||
crypto_scalarmult_ed25519_base_noclamp() and
|
crypto_scalarmult_ed25519_base_noclamp() and
|
||||||
crypto_scalarmult_ed25519_noclamp().
|
crypto_scalarmult_ed25519_noclamp().
|
||||||
These new APIs are especially useful for blinding.
|
These new APIs are especially useful for blinding.
|
||||||
- sodium_sub() has been implemented.
|
- sodium_sub() has been implemented.
|
||||||
- Support for WatchOS has been added.
|
- Support for WatchOS has been added.
|
||||||
- getrandom(2) is now used on FreeBSD 12+.
|
- getrandom(2) is now used on FreeBSD 12+.
|
||||||
- The nonnull attribute has been added to all relevant
|
- The nonnull attribute has been added to all relevant
|
||||||
prototypes.
|
prototypes.
|
||||||
- More reliable AVX512 detection.
|
- More reliable AVX512 detection.
|
||||||
- Javascript/Webassembly builds now use dynamic memory growth.
|
- Javascript/Webassembly builds now use dynamic memory growth.
|
||||||
@@ -195,7 +228,7 @@ Thu Sep 28 19:54:43 UTC 2017 - idonmez@suse.com
|
|||||||
* The crypto_pwhash_str_needs_rehash() function was added to check
|
* The crypto_pwhash_str_needs_rehash() function was added to check
|
||||||
if a password hash string matches the given parameters, or if it
|
if a password hash string matches the given parameters, or if it
|
||||||
needs an update.
|
needs an update.
|
||||||
|
|
||||||
Updates from 1.0.13
|
Updates from 1.0.13
|
||||||
* An AVX2 optimized implementation of the Argon2 round function was added.
|
* An AVX2 optimized implementation of the Argon2 round function was added.
|
||||||
* The Argon2id variant of Argon2 has been implemented. The high-level
|
* The Argon2id variant of Argon2 has been implemented. The high-level
|
||||||
@@ -237,7 +270,7 @@ Mon Mar 13 09:17:43 UTC 2017 - idonmez@suse.com
|
|||||||
This function can especially be useful to write reproducible tests.
|
This function can especially be useful to write reproducible tests.
|
||||||
* A preliminary crypto_kx_*() API was added to compute shared
|
* A preliminary crypto_kx_*() API was added to compute shared
|
||||||
session keys.
|
session keys.
|
||||||
* AVX2 detection is more reliable.
|
* AVX2 detection is more reliable.
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sat Aug 6 04:31:24 UTC 2016 - i@marguerite.su
|
Sat Aug 6 04:31:24 UTC 2016 - i@marguerite.su
|
||||||
@@ -318,7 +351,7 @@ Mon Nov 2 10:53:04 UTC 2015 - idonmez@suse.com
|
|||||||
|
|
||||||
- Update to 1.0.6
|
- Update to 1.0.6
|
||||||
* Optimized implementations of Blake2 have been added for modern
|
* Optimized implementations of Blake2 have been added for modern
|
||||||
Intel platforms. crypto_generichash() is now faster than MD5 and
|
Intel platforms. crypto_generichash() is now faster than MD5 and
|
||||||
SHA1 implementations while being far more secure.
|
SHA1 implementations while being far more secure.
|
||||||
* The crypto_sign_edwards25519sha512batch_*() functions have been
|
* The crypto_sign_edwards25519sha512batch_*() functions have been
|
||||||
tagged as deprecated.
|
tagged as deprecated.
|
||||||
@@ -330,7 +363,7 @@ Mon Nov 2 10:53:04 UTC 2015 - idonmez@suse.com
|
|||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Wed Oct 21 07:06:19 UTC 2015 - idonmez@suse.com
|
Wed Oct 21 07:06:19 UTC 2015 - idonmez@suse.com
|
||||||
|
|
||||||
- Now that gcc 5.2 is available on TW, remove the ARMv7 workaround.
|
- Now that gcc 5.2 is available on TW, remove the ARMv7 workaround.
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sun Oct 18 15:09:15 UTC 2015 - idonmez@suse.com
|
Sun Oct 18 15:09:15 UTC 2015 - idonmez@suse.com
|
||||||
@@ -343,7 +376,7 @@ Sun Oct 18 15:09:15 UTC 2015 - idonmez@suse.com
|
|||||||
been implemented as crypto_stream_chacha20_ietf(),
|
been implemented as crypto_stream_chacha20_ietf(),
|
||||||
crypto_stream_chacha20_ietf_xor() and crypto_stream_chacha20_ietf_xor_ic().
|
crypto_stream_chacha20_ietf_xor() and crypto_stream_chacha20_ietf_xor_ic().
|
||||||
An IETF-compatible version of ChaCha20Poly1305 is available as
|
An IETF-compatible version of ChaCha20Poly1305 is available as
|
||||||
crypto_aead_chacha20poly1305_ietf_npubbytes(),
|
crypto_aead_chacha20poly1305_ietf_npubbytes(),
|
||||||
crypto_aead_chacha20poly1305_ietf_encrypt() and
|
crypto_aead_chacha20poly1305_ietf_encrypt() and
|
||||||
crypto_aead_chacha20poly1305_ietf_decrypt().
|
crypto_aead_chacha20poly1305_ietf_decrypt().
|
||||||
* The sodium_increment() helper function has been added, to increment
|
* The sodium_increment() helper function has been added, to increment
|
||||||
@@ -355,23 +388,23 @@ Sun Oct 18 15:09:15 UTC 2015 - idonmez@suse.com
|
|||||||
Wed May 13 15:09:50 UTC 2015 - mpluskal@suse.com
|
Wed May 13 15:09:50 UTC 2015 - mpluskal@suse.com
|
||||||
|
|
||||||
- Update to 1.0.3
|
- Update to 1.0.3
|
||||||
* In addition to sodium_bin2hex(), sodium_hex2bin() is now a
|
* In addition to sodium_bin2hex(), sodium_hex2bin() is now a
|
||||||
constant-time function.
|
constant-time function.
|
||||||
* crypto_stream_xsalsa20_ic() has been added.
|
* crypto_stream_xsalsa20_ic() has been added.
|
||||||
* crypto_generichash_statebytes(), crypto_auth_*_statebytes()
|
* crypto_generichash_statebytes(), crypto_auth_*_statebytes()
|
||||||
and crypto_hash_*_statebytes() have been added in order to
|
and crypto_hash_*_statebytes() have been added in order to
|
||||||
retrieve the size of structures keeping states from foreign
|
retrieve the size of structures keeping states from foreign
|
||||||
languages.
|
languages.
|
||||||
* The JavaScript target doesn't require /dev/urandom or an
|
* The JavaScript target doesn't require /dev/urandom or an
|
||||||
external randombytes() implementation any more. Other minor
|
external randombytes() implementation any more. Other minor
|
||||||
Emscripten-related improvements have been made in order to
|
Emscripten-related improvements have been made in order to
|
||||||
support libsodium.js
|
support libsodium.js
|
||||||
* Custom randombytes implementations do not need to provide
|
* Custom randombytes implementations do not need to provide
|
||||||
their own implementation of randombytes_uniform() any more.
|
their own implementation of randombytes_uniform() any more.
|
||||||
randombytes_stir() and randombytes_close() can also be NULL
|
randombytes_stir() and randombytes_close() can also be NULL
|
||||||
pointers if they are not required.
|
pointers if they are not required.
|
||||||
* On Linux, getrandom(2) is being used instead of directly
|
* On Linux, getrandom(2) is being used instead of directly
|
||||||
accessing /dev/urandom, if the kernel supports this system
|
accessing /dev/urandom, if the kernel supports this system
|
||||||
call.
|
call.
|
||||||
* crypto_box_seal() and crypto_box_seal_open() have been added.
|
* crypto_box_seal() and crypto_box_seal_open() have been added.
|
||||||
* A solutions for Visual Studio 2015 was added.
|
* A solutions for Visual Studio 2015 was added.
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
#
|
#
|
||||||
# spec file for package libsodium
|
# spec file for package libsodium
|
||||||
#
|
#
|
||||||
# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
|
# Copyright (c) 2026 SUSE LLC and contributors
|
||||||
# Copyright (c) 2024 Andreas Stieger <Andreas.Stieger@gmx.de>
|
# Copyright (c) 2024 Andreas Stieger <Andreas.Stieger@gmx.de>
|
||||||
#
|
#
|
||||||
# All modifications and additions to the file contributed by third parties
|
# All modifications and additions to the file contributed by third parties
|
||||||
@@ -20,7 +20,7 @@
|
|||||||
%define sover 26
|
%define sover 26
|
||||||
%define lname %{name}%{sover}
|
%define lname %{name}%{sover}
|
||||||
Name: libsodium
|
Name: libsodium
|
||||||
Version: 1.0.20
|
Version: 1.0.21
|
||||||
Release: 0
|
Release: 0
|
||||||
Summary: Portable NaCl-based crypto library
|
Summary: Portable NaCl-based crypto library
|
||||||
License: ISC
|
License: ISC
|
||||||
@@ -30,6 +30,7 @@ Source0: https://download.libsodium.org/libsodium/releases/%{name}-%{vers
|
|||||||
Source1: https://download.libsodium.org/libsodium/releases/%{name}-%{version}.tar.gz.sig
|
Source1: https://download.libsodium.org/libsodium/releases/%{name}-%{version}.tar.gz.sig
|
||||||
Source2: %{name}.keyring
|
Source2: %{name}.keyring
|
||||||
Source99: baselibs.conf
|
Source99: baselibs.conf
|
||||||
|
Patch0: libsodium-Fix-compilation-with-GCC-on-aarch64.patch
|
||||||
BuildRequires: pkgconfig
|
BuildRequires: pkgconfig
|
||||||
|
|
||||||
%description
|
%description
|
||||||
|
|||||||
Reference in New Issue
Block a user