public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: Adolf Belka <adolf.belka@ipfire.org>
To: development@lists.ipfire.org
Subject: [PATCH] libgcrypt: Update to version 1.10.2
Date: Wed, 19 Apr 2023 14:31:37 +0200	[thread overview]
Message-ID: <20230419123141.2778769-1-adolf.belka@ipfire.org> (raw)

[-- Attachment #1: Type: text/plain, Size: 4287 bytes --]

- Update from version 1.10.1 to 1.10.2
- Update of rootfile
- Changelog
	Noteworthy changes in version 1.10.2 (2023-04-06)  [C24/A4/R2]
	 * Bug fixes:
	   - Fix Argon2 for the case output > 64.  [rC13b5454d26]
	   - Fix missing HWF_PPC_ARCH_3_10 in HW feature.  [rCe073f0ed44]
	   - Fix RSA key generation failure in forced FIPS mode.  [T5919]
	   - Fix gcry_pk_hash_verify for explicit hash.  [T6066]
	   - Fix a wrong result of gcry_mpi_invm.  [T5970]
	   - Allow building with --disable-asm for HPPA.  [T5976]
	   - Fix Jitter RNG for building native on Windows.  [T5891]
	   - Allow building with -Oz.  [T6432]
	   - Enable the fast path to ChaCha20 only when supported.  [T6384]
	   - Use size_t to avoid counter overflow in Keccak when directly
	     feeding more than 4GiB.  [T6217]
	 * Other:
	   - Do not use secure memory for a DRBG instance.  [T5933]
	   - Do not allow PKCS#1.5 padding for encryption in FIPS mode.
	     [T5918]
	   - Fix the behaviour for child process re-seeding in the DRBG.
	     [rC019a40c990]
	   - Allow verification of small RSA signatures in FIPS mode.  [T5975]
	   - Allow the use of a shorter salt for KDFs in FIPS mode.  [T6039]
	   - Run digest+sign self tests for RSA and ECC in FIPS mode.
	     [rC06c9350165]
	   - Add function-name based FIPS indicator function.
	     GCRYCTL_FIPS_SERVICE_INDICATOR_FUNCTION.  This is not considered
	     an ABI changes because the new FIPS features were not yet
	     approved.  [rC822ee57f07]
	   - Improve PCT in FIPS mode.  [rC285bf54b1a, rC4963c127ae, T6397]
	   - Use getrandom (GRND_RANDOM) in FIPS mode.  [rCcf10c74bd9]
	   - Disable RSA-OAEP padding in FIPS mode.  [rCe5bfda492a]
	   - Check minimum allowed key size in PBKDF in FIPS mode.
	     [T6039,T6219]
	   - Get maximum 32B of entropy at once in FIPS mode.  [rCce0df08bba]
	   - Prefer gpgrt-config when available.  [T5034]
	   - Mark AESWRAP as approved FIPS algorithm.  [T5512]
	   - Prevent usage of long salt for PSS in FIPS mode.  [rCfdd2a8b332]
	   - Prevent usage of X9.31 keygen in FIPS mode.  [rC392e0ccd25]
	   - Remove GCM mode from the allowed FIPS indicators.  [rC1540698389]
	   - Add explicit FIPS indicators for hash and MAC algorithms. [T6376]

Signed-off-by: Adolf Belka <adolf.belka(a)ipfire.org>
---
 config/rootfiles/common/libgcrypt | 2 +-
 lfs/libgcrypt                     | 6 +++---
 2 files changed, 4 insertions(+), 4 deletions(-)

diff --git a/config/rootfiles/common/libgcrypt b/config/rootfiles/common/libgcrypt
index 8e7f74392..fe687dab5 100644
--- a/config/rootfiles/common/libgcrypt
+++ b/config/rootfiles/common/libgcrypt
@@ -6,7 +6,7 @@
 #usr/lib/libgcrypt.la
 #usr/lib/libgcrypt.so
 usr/lib/libgcrypt.so.20
-usr/lib/libgcrypt.so.20.4.1
+usr/lib/libgcrypt.so.20.4.2
 #usr/lib/pkgconfig/libgcrypt.pc
 #usr/share/aclocal/libgcrypt.m4
 #usr/share/info/gcrypt.info
diff --git a/lfs/libgcrypt b/lfs/libgcrypt
index bf81a0645..a79f5bed2 100644
--- a/lfs/libgcrypt
+++ b/lfs/libgcrypt
@@ -1,7 +1,7 @@
 ###############################################################################
 #                                                                             #
 # IPFire.org - A linux based firewall                                         #
-# Copyright (C) 2007-2021  IPFire Team  <info(a)ipfire.org>                     #
+# Copyright (C) 2007-2023  IPFire Team  <info(a)ipfire.org>                     #
 #                                                                             #
 # This program is free software: you can redistribute it and/or modify        #
 # it under the terms of the GNU General Public License as published by        #
@@ -24,7 +24,7 @@
 
 include Config
 
-VER        = 1.10.1
+VER        = 1.10.2
 
 THISAPP    = libgcrypt-$(VER)
 DL_FILE    = $(THISAPP).tar.bz2
@@ -40,7 +40,7 @@ objects = $(DL_FILE)
 
 $(DL_FILE) = $(DL_FROM)/$(DL_FILE)
 
-$(DL_FILE)_BLAKE2 = 46f30459891183b6d9ec18f1c7907fee0ad156c7dd75044f3db2b4d1c19dc6f30b2dfa6f85bc82adc9243aaba913e40fb6faf77d2226ca5a33897220d032437a
+$(DL_FILE)_BLAKE2 = c86b29648664aae3fb694b20ad258828d2cecbb09db2b83df00fbdebd5d74228c92015c50f659c250cb0768ccaef7949294d9b7cdcd47e1387b7dce81d35da19
 
 install : $(TARGET)
 
-- 
2.40.0


             reply	other threads:[~2023-04-19 12:31 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-04-19 12:31 Adolf Belka [this message]
2023-04-19 12:31 ` [PATCH] libgpg-error: Update to version 1.47 Adolf Belka
2023-04-19 12:31 ` [PATCH] parted: Update to version 3.6 Adolf Belka
2023-04-19 12:31 ` [PATCH] samba: Update to version 4.18.1 Adolf Belka
2023-04-19 12:31 ` [PATCH] sdl2: Update to version 2.26.5 Adolf Belka

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20230419123141.2778769-1-adolf.belka@ipfire.org \
    --to=adolf.belka@ipfire.org \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox