[Bug 206556] Update security/libsodium to 1.0.5

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Sun Jan 24 06:17:00 UTC 2016


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=206556

            Bug ID: 206556
           Summary: Update security/libsodium to 1.0.5
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: vsevolod at FreeBSD.org
          Reporter: w.schwarzenfeld at aon.at
          Assignee: vsevolod at FreeBSD.org
             Flags: maintainer-feedback?(vsevolod at FreeBSD.org)

Created attachment 166041
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=166041&action=edit
poudriere_security_libsodium-1.0.5.log

Update security/libsodium to 1.0.5.
ChangeLog

* Version 1.0.5
 - Compilation issues on some platforms were fixed: missing alignment
directives were added (required at least on RHEL-6/i386), a workaround
for a VRP bug on gcc/armv7 was added, and the library can now be compiled
with the SunPro compiler.
 - Javascript target: io.js is not supported any more. Use nodejs.

* Version 1.0.4
 - Support for AES256-GCM has been added. This requires
a CPU with the aesni and pclmul extensions, and is accessible via the
crypto_aead_aes256gcm_*() functions.
 - The Javascript target doesn't use eval() any more, so that the
library can be used in Chrome packaged applications.
 - QNX and CloudABI are now supported.
 - Support for NaCl has finally been added.
 - ChaCha20 with an extended (96 bit) nonce and a 32-bit counter has
been implemented as crypto_stream_chacha20_ietf(),
crypto_stream_chacha20_ietf_xor() and crypto_stream_chacha20_ietf_xor_ic().
An IETF-compatible version of ChaCha20Poly1305 is available as
crypto_aead_chacha20poly1305_ietf_npubbytes(),
crypto_aead_chacha20poly1305_ietf_encrypt() and
crypto_aead_chacha20poly1305_ietf_decrypt().
 - The sodium_increment() helper function has been added, to increment
an arbitrary large number (such as a nonce).
 - The sodium_compare() helper function has been added, to compare
arbitrary large numbers (such as nonces, in order to prevent replay
attacks).

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-ports-bugs mailing list