bouncycastle/_constraints

11 lines
187 B
Plaintext
Raw Normal View History

- Update to 1.79: * Defects Fixed: - Leading zeroes were sometimes dropped from Ed25519 signatures leading to verification errors in the PGP API. - Default version string for Armored Output is now set correctly in 18on build. - The Elephant cipher would fail on large messages. - CMSSignedData.replaceSigners() would re-encode the digest algorithms block, occassionally dropping ones where NULL had been previously added as an algorithm parameter. The method now attempts to only use the original digest algorithm identifiers. - ERSInputStreamData would fail to generate the correct hash if called a second time with a different hash algorithm. - A downcast in the CrlCache which would cause FTP based CRLs to fail to load has been removed. - ECUtil.getNamedCurveOid() now trims curve names of excess space before look up. - The PhotonBeetle and Xoodyak digests did not reset properly after a doFinal() call. - Malformed AlgorithmIdentifiers in CertIDs could cause caching issues in the OCSP cache. - With Java 21 a provider service class will now be returned with a null class name where previously a null would have been returned for a service. This can cause a NullPointerException to be thrown by the BC provider if a non-existant service is requested. - CMS: OtherKeyAttribute.keyAttr now treated as optional. - CMS: EnvelopedData and AuthEnvelopedData could calculate the wrong versions. - The default version header for PGP armored output did not carry the correct version string. - In some situations the algorithm lookup for creating PGPDigestCalculators would fail due to truncation of the algorithm name. OBS-URL: https://build.opensuse.org/package/show/Java:packages/bouncycastle?expand=0&rev=106
2024-11-04 13:04:14 +01:00
<constraints>
<hardware>
<physicalmemory>
<size unit="M">4096</size>
</physicalmemory>
<disk>
<size unit="G">10</size>
</disk>
</hardware>
</constraints>