SHA256
1
0
forked from pool/libsodium

Accepting request 529173 from devel:libraries:c_c++

- Update to version 1.0.14
  * Internal consistency checks failing and primitives used with
    dangerous/out-of-bounds/invalid parameters used to call abort(3).
    Now, a custom handler that doesn't return can be set with the
    set_sodium_misuse() function. It still aborts by default or if
    the handler ever returns. This is not a replacement for non-fatal,
    expected runtime errors. This handler will be only called in
    unexpected situations due to potential bugs in the library or in
    language bindings.
  * *_MESSAGEBYTES_MAX macros (and the corresponding _messagebytes_max()
    symbols) have been added to represent the maximum message size that
    can be safely handled by a primitive. Language bindings are
    encouraged to check user inputs against these maximum lengths.
  * The test suite has been extended to cover more edge cases.
  * crypto_sign_ed25519_pk_to_curve25519() now rejects points that
    are not on the curve, or not in the main subgroup.
  * Further changes have been made to ensure that smart compilers
    will not optimize out code that we don't want to be optimized.
  * The sodium_runtime_has_* symbols for CPU features detection are
    now defined as weak symbols, i.e. they can be replaced with an
    application-defined implementation. This can be useful to
    disable AVX* when temperature/power consumption is a concern.
  * crypto_kx_*() now aborts if called with no non-NULL pointers
    to store keys to.
  * SSE2 implementations of crypto_verify_*() have been added.
  * Passwords can be hashed using a specific algorithm with the new
    crypto_pwhash_str_alg() function.
  * Due to popular demand, base64 encoding (sodium_bin2base64())
    and decoding (sodium_base642bin()) have been implemented.
  * A new crypto_secretstream_*() API was added to safely encrypt

OBS-URL: https://build.opensuse.org/request/show/529173
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libsodium?expand=0&rev=20
This commit is contained in:
Dominique Leuenberger 2017-10-01 14:59:58 +00:00 committed by Git OBS Bridge
commit 62197d4f29
4 changed files with 61 additions and 10 deletions

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:b8648f1bb3a54b0251cf4ffa4f0d76ded13977d4fa7517d988f4c902dd8e2f95
size 1887284

3
libsodium-1.0.14.tar.gz Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:3cfc84d097fdc891b40d291f2ac2c3f99f71a87e36b20cc755c6fa0e97a77ee7
size 1876526

View File

@ -1,3 +1,54 @@
-------------------------------------------------------------------
Thu Sep 28 19:54:43 UTC 2017 - idonmez@suse.com
- Update to version 1.0.14
* Internal consistency checks failing and primitives used with
dangerous/out-of-bounds/invalid parameters used to call abort(3).
Now, a custom handler that doesn't return can be set with the
set_sodium_misuse() function. It still aborts by default or if
the handler ever returns. This is not a replacement for non-fatal,
expected runtime errors. This handler will be only called in
unexpected situations due to potential bugs in the library or in
language bindings.
* *_MESSAGEBYTES_MAX macros (and the corresponding _messagebytes_max()
symbols) have been added to represent the maximum message size that
can be safely handled by a primitive. Language bindings are
encouraged to check user inputs against these maximum lengths.
* The test suite has been extended to cover more edge cases.
* crypto_sign_ed25519_pk_to_curve25519() now rejects points that
are not on the curve, or not in the main subgroup.
* Further changes have been made to ensure that smart compilers
will not optimize out code that we don't want to be optimized.
* The sodium_runtime_has_* symbols for CPU features detection are
now defined as weak symbols, i.e. they can be replaced with an
application-defined implementation. This can be useful to
disable AVX* when temperature/power consumption is a concern.
* crypto_kx_*() now aborts if called with no non-NULL pointers
to store keys to.
* SSE2 implementations of crypto_verify_*() have been added.
* Passwords can be hashed using a specific algorithm with the new
crypto_pwhash_str_alg() function.
* Due to popular demand, base64 encoding (sodium_bin2base64())
and decoding (sodium_base642bin()) have been implemented.
* A new crypto_secretstream_*() API was added to safely encrypt
files and multi-part messages.
* The sodium_pad() and sodium_unpad() helper functions have been
added in order to add & remove padding.
* An AVX512 optimized implementation of Argon2 has been added.
* The crypto_pwhash_str_needs_rehash() function was added to check
if a password hash string matches the given parameters, or if it
needs an update.
Updates from 1.0.13
* An AVX2 optimized implementation of the Argon2 round function was added.
* The Argon2id variant of Argon2 has been implemented. The high-level
crypto_pwhash_str_verify() function automatically detects the
algorithm and can verify both Argon2i and Argon2id hashed passwords.
The default algorithm for newly hashed passwords remains Argon2i
in this version to avoid breaking compatibility with verifiers
running libsodium <= 1.0.12.
* A crypto_box_curve25519xchacha20poly1305_seal*() function set was implemented.
-------------------------------------------------------------------
Mon Mar 13 09:17:43 UTC 2017 - idonmez@suse.com

View File

@ -18,7 +18,7 @@
%define lname libsodium18
Name: libsodium
Version: 1.0.12
Version: 1.0.14
Release: 0
Summary: Portable NaCl-based crypto library
License: ISC
@ -62,12 +62,12 @@ to compile and develop applications that use libsodium.
%build
%if 0%{?suse_version} > 1320
%ifarch %{ix86} x86_64
export CFLAGS="%{optflags} -flto"
export LDFLAGS="-flto"
%endif
%endif
#%if 0%{?suse_version} > 1320
#%ifarch %{ix86} x86_64
#export CFLAGS="%{optflags} -flto"
#export LDFLAGS="-flto"
#%endif
#%endif
%configure --disable-static
make %{?_smp_mflags} V=1