[Bug 206556] Update security/libsodium to 1.0.5
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Sun Jan 24 06:17:00 UTC 2016
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=206556
Bug ID: 206556
Summary: Update security/libsodium to 1.0.5
Product: Ports & Packages
Version: Latest
Hardware: Any
OS: Any
Status: New
Severity: Affects Only Me
Priority: ---
Component: Individual Port(s)
Assignee: vsevolod at FreeBSD.org
Reporter: w.schwarzenfeld at aon.at
Assignee: vsevolod at FreeBSD.org
Flags: maintainer-feedback?(vsevolod at FreeBSD.org)
Created attachment 166041
--> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=166041&action=edit
poudriere_security_libsodium-1.0.5.log
Update security/libsodium to 1.0.5.
ChangeLog
* Version 1.0.5
- Compilation issues on some platforms were fixed: missing alignment
directives were added (required at least on RHEL-6/i386), a workaround
for a VRP bug on gcc/armv7 was added, and the library can now be compiled
with the SunPro compiler.
- Javascript target: io.js is not supported any more. Use nodejs.
* Version 1.0.4
- Support for AES256-GCM has been added. This requires
a CPU with the aesni and pclmul extensions, and is accessible via the
crypto_aead_aes256gcm_*() functions.
- The Javascript target doesn't use eval() any more, so that the
library can be used in Chrome packaged applications.
- QNX and CloudABI are now supported.
- Support for NaCl has finally been added.
- ChaCha20 with an extended (96 bit) nonce and a 32-bit counter has
been implemented as crypto_stream_chacha20_ietf(),
crypto_stream_chacha20_ietf_xor() and crypto_stream_chacha20_ietf_xor_ic().
An IETF-compatible version of ChaCha20Poly1305 is available as
crypto_aead_chacha20poly1305_ietf_npubbytes(),
crypto_aead_chacha20poly1305_ietf_encrypt() and
crypto_aead_chacha20poly1305_ietf_decrypt().
- The sodium_increment() helper function has been added, to increment
an arbitrary large number (such as a nonce).
- The sodium_compare() helper function has been added, to compare
arbitrary large numbers (such as nonces, in order to prevent replay
attacks).
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list