./security/libgcrypt, GNU cryptographic library

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 1.8.1, Package name: libgcrypt-1.8.1, Maintainer: pkgsrc-users

This is a general purpose cryptographic library based on the code from GnuPG.
It provides functions for all cryptograhic building blocks: symmetric ciphers
(AES, DES, Blowfish, CAST5, Twofish, Arcfour), hash algorithms (MD4, MD5,
RIPE-MD160, SHA-1, TIGER-192), MACs (HMAC for all hash algorithms), public key
algorithms (RSA, ElGamal, DSA), large integer functions, random numbers and a
lot of supporting functions.


Required to build:
[pkgtools/cwrappers]

Master sites:

SHA1: dd35f00da45602afe81e01f4d60c40bbdd826fe6
RMD160: 5132a2f4ff4531048e9cabbaa98d0cdfbe2f895c
Filesize: 2897.797 KB

Version history: (Expand)


CVS history: (Expand)


   2017-08-27 14:38:36 by Adam Ciarcinski | Files touched by this commit (2)
Log message:
version 1.8.1:

Bug fixes:
   - Mitigate a local side-channel attack on Curve25519 dubbed "May
     the Fourth be With You".  [CVE-2017-0379] [also in 1.7.9]
   - Add more extra bytes to the pool after reading a seed file.
   - Add the OID SHA384WithECDSA from RFC-7427 to SHA-384.
   - Fix build problems with the Jitter RNG
   - Fix assembler code build problems on Rasbian (ARMv8/AArch32-CE).
   2017-07-23 19:27:52 by Adam Ciarcinski | Files touched by this commit (2)
Log message:
version 1.8.0:

 * New interfaces:
   - New cipher mode XTS
   - New hash function Blake-2
   - New function gcry_mpi_point_copy.
   - New function gcry_get_config.
   - GCRYCTL_REINIT_SYSCALL_CLAMP allows to init nPth after Libgcrypt.
   - New gobal configuration file /etc/gcrypt/random.conf.

 * Extended interfaces:
   - GCRYCTL_PRINT_CONFIG does now also print build information for
     libgpg-error and the used compiler version.
   - GCRY_CIPHER_MODE_CFB8 is now supported.
   - Add Stribog OIDs.

 * Performance:
   - A jitter based entropy collector is now used in addition to the
     other entropy collectors.
   - Optimized gcry_md_hash_buffers for SHA-256 and SHA-512.
   - More ARMv8/AArch32 improvements for AES, GCM, SHA-256, and SHA-1.
   - Add ARMv8/AArch32 assembly implementation for Twofish and
     Camellia.
   - Add bulk processing implementation for ARMv8/AArch32.
   - Improve the DRBG performance and sync the code with the Linux
     version.

 * Internal changes:
   - Libgpg-error 1.25 is now required.  This avoids stalling of nPth
     threads due to contention on internal Libgcrypt locks (e.g. the
     random pool lock).
   - The system call clamp of libgpg-error is now used to wrap the
     blocking read of /dev/random.  This allows other nPth threads to
     run while Libgcrypt is gathering entropy.
   - When secure memory is requested by the MPI functions or by
     gcry_xmalloc_secure, they do not anymore lead to a fatal error if
     the secure memory pool is used up.  Instead new pools are
     allocated as needed.  These new pools are not protected against
     being swapped out (mlock can't be used).  However, these days
     this is considered a minor issue and can easily be mitigated by
     using encrypted swap space.

 * Bug fixes:
   - Fix AES CTR self-check detected failure in the SSSE3 based
     implementation.
   - Remove gratuitous select before the getrandom syscall.
   - Fix regression in mlock detection.
   - Fix GOST 28147 CryptoPro-B S-box.
   - Fix error code handling of mlock calls.
   - Fix possible timing attack on EdDSA session key.
   - Fix long standing bug in secure memory implementation which could
     lead to a segv on free.
   - Mitigate a flush+reload side-channel attack on RSA secret keys
     dubbed "Sliding right into disaster".
   2017-07-04 08:55:53 by Adam Ciarcinski | Files touched by this commit (2)
Log message:
changes in version 1.7.8:
Bug fixes:
- Mitigate a flush+reload side-channel attack on RSA secret keys
  dubbed "Sliding right into disaster".  For details see
  <https://eprint.iacr.org/2017/627>.  [CVE-2017-7526]
   2017-06-14 22:18:27 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Updated libgcrypt to 1.7.7.

Noteworthy changes in version 1.7.7 (2017-06-02)  [C21/A1/R7]
------------------------------------------------

 * Bug fixes:

   - Fix possible timing attack on EdDSA session key.

   - Fix long standing bug in secure memory implementation which could
     lead to a segv on free. [bug#3027]
   2017-01-22 13:55:29 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Updated libgcrypt to 1.7.6.

All tests pass.

Noteworthy changes in version 1.7.6 (2017-01-18)  [C21/A1/R6]
------------------------------------------------

 * Bug fixes:

   - Fix AES CTR self-check detected failure in the SSSE3 based
     implementation.

   - Remove gratuitous select before the getrandom syscall.
   2017-01-19 19:52:30 by Alistair G. Crooks | Files touched by this commit (352)
Log message:
Convert all occurrences (353 by my count) of

	MASTER_SITES= 	site1 \
			site2

style continuation lines to be simple repeated

	MASTER_SITES+= site1
	MASTER_SITES+= site2

lines. As previewed on tech-pkg. With thanks to rillig for fixing pkglint
accordingly.
   2016-12-30 01:41:35 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Updated libgcrypt to 1.7.5.

Noteworthy changes in version 1.7.5 (2016-12-15)  [C21/A1/R5]
------------------------------------------------

 * Bug fixes:

   - Fix regression in mlock detection [bug#2870].
   2016-12-12 15:19:39 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Updated libgcrypt to 1.7.4.

Noteworthy changes in version 1.7.4 (2016-12-09)  [C21/A1/R4]
------------------------------------------------

 * Performance:

   - More ARMv8/AArch32 improvements for AES, GCM, SHA-256, and SHA-1.

   - Add ARMv8/AArch32 assembly implementation for Twofish and
     Camellia.

   - Add bulk processing implementation for ARMv8/AArch32.

   - Add Stribog OIDs.

   - Improve the DRBG performance and sync the code with the Linux
     version.

 * Internal changes:

   - When secure memory is requested by the MPI functions or by
     gcry_xmalloc_secure, they do not anymore lead to a fatal error if
     the secure memory pool is used up.  Instead new pools are
     allocated as needed.  These new pools are not protected against
     being swapped out (mlock can't be used).  However, these days
     this is considered a minor issue and can easily be mitigated by
     using encrypted swap space.

 * Bug fixes:

   - Fix GOST 28147 CryptoPro-B S-box.

   - Fix error code handling of mlock calls.