Up to [cvs.NetBSD.org] / pkgsrc / security / libgcrypt
Request diff between arbitrary revisions
Keyword substitution: kv
Default branch: MAIN
libgcrypt: Disable ASM on all Darwin. It completely breaks on x86_64 as well as arm64. Bump PKGREVISION.
Fix security/libgcrypt on Darwin/AArch64
security/libgcrypt: Update to 1.11.0 Changelog: Noteworthy changes in version 1.11.0 (2024-06-19) [C25/A5/R0] ------------------------------------------------- * New and extended interfaces: - Add an API for Key Encapsulation Mechanism (KEM). [T6755] - Add Streamlined NTRU Prime sntrup761 algorithm. [rCcf9923e1a5] - Add Kyber algorithm according to FIPS 203 ipd 2023-08-24. [rC18e5c0d268] - Add Classic McEliece algorithm. [rC003367b912] - Add One-Step KDF with hash and MAC. [T5964] - Add KDF algorithm HKDF of RFC-5869. [T5964] - Add KDF algorithm X963KDF for use in CMS. [rC3abac420b3] - Add GMAC-SM4 and Poly1305-SM4. [rCd1ccc409d4] - Add ARIA block cipher algorithm. [rC316c6d7715] - Add explicit FIPS indicators for MD and MAC algorithms. [T6376] - Add support for SHAKE as MGF in RSA. [T6557] - Add gcry_md_read support for SHAKE algorithms. [T6539] - Add gcry_md_hash_buffers_ext function. [T7035] - Add cSHAKE hash algorithm. [rC065b3f4e02] - Support internal generation of IV for AEAD cipher mode. [T4873] * Performance: - Add SM3 ARMv8/AArch64/CE assembly implementation. [rCfe891ff4a3] - Add SM4 ARMv8/AArch64 assembly implementation. [rCd8825601f1] - Add SM4 GFNI/AVX2 and GFI/AVX512 implementation. [rC5095d60af4,rCeaed633c16] - Add SM4 ARMv9 SVE CE assembly implementation. [rC2dc2654006] - Add PowerPC vector implementation of SM4. [rC0b2da804ee] - Optimize ChaCha20 and Poly1305 for PPC P10 LE. [T6006] - Add CTR32LE bulk acceleration for AES on PPC. [rC84f2e2d0b5] - Add generic bulk acceleration for CTR32LE mode (GCM-SIV) for SM4 and Camellia. [rCcf956793af] - Add GFNI/AVX2 implementation of Camellia. [rC4e6896eb9f] - Add AVX2 and AVX512 accelerated implementations for GHASH (GCM) and POLYVAL (GCM-SIV). [rCd857e85cb4, rCe6f3600193] - Add AVX512 implementation for SHA512. [rC089223aa3b] - Add AVX512 implementation for Serpent. [rCce95b6ec35] - Add AVX512 implementation for Poly1305 and ChaCha20 [rCcd3ed49770, rC9a63cfd617] - Add AVX512 accelerated implementation for SHA3 and Blake2 [rCbeaad75f46,rC909daa700e] - Add VAES/AVX2 accelerated i386 implementation for AES. [rC4a42a042bc] - Add bulk processing for XTS mode of Camellia and SM4. [rC32b18cdb87, rCaad3381e93] - Accelerate XTS and ECB modes for Twofish and Serpent. [rCd078a928f5,rC8a1fe5f78f] - Add AArch64 crypto/SHA512 extension implementation for SHA512. [rCe51d3b8330] - Add AArch64 crypto-extension implementation for Camellia. [rC898c857206] - Accelerate OCB authentication on AMD with AVX2. [rC6b47e85d65] * Bug fixes: - For PowerPC check for missing optimization level for vector register usage. [T5785] - Fix EdDSA secret key check. [T6511] - Fix decoding of PKCS#1-v1.5 and OAEP padding. [rC34c2042792] - Allow use of PKCS#1-v1.5 with SHA3 algorithms. [T6976] - Fix AESWRAP padding length check. [T7130] * Other: - Allow empty password for Argon2 KDF. [rCa20700c55f] - Various constant time operation imporvements. - Add "bp256", "bp384", "bp512" aliases for Brainpool curves. - Support for the random server has been removed. [T5811] - The control code GCRYCTL_ENABLE_M_GUARD is deprecated and not supported any more. Please use valgrind or other tools. [T5822] - Logging is now done via the libgpg-error logging functions. [rCab0bdc72c7]
libgcrypt: Fix building on Darwin/ppc.
libgcrypt: updated to 1.10.3 Noteworthy changes in version 1.10.3 (2023-11-14) ------------------------------------------------- * Bug fixes: - Fix public key computation for other EdDSA curves. - Remove out of core handler diagnostic in FIPS mode. - Check that the digest size is not zero in gcry_pk_sign_md and gcry_pk_verify_md. - Make store an s-exp with \0 is considered to be binary. - Various constant-time improvements. * Portability: - Use getrandom call only when supported by the platform. - Change the default for --with-libtool-modification to never.
security/libgcrypt: Make this cross-compile.
libgcrypt: updated to 1.10.2 Noteworthy changes in version 1.10.2 (2023-04-06) [C24/A4/R2] ------------------------------------------------- * Bug fixes: - Fix Argon2 for the case output > 64. [rC13b5454d26] - Fix missing HWF_PPC_ARCH_3_10 in HW feature. [rCe073f0ed44] - Fix RSA key generation failure in forced FIPS mode. [T5919] - Fix gcry_pk_hash_verify for explicit hash. [T6066] - Fix a wrong result of gcry_mpi_invm. [T5970] - Allow building with --disable-asm for HPPA. [T5976] - Fix Jitter RNG for building native on Windows. [T5891] - Allow building with -Oz. [T6432] - Enable the fast path to ChaCha20 only when supported. [T6384] - Use size_t to avoid counter overflow in Keccak when directly feeding more than 4GiB. [T6217] * Other: - Do not use secure memory for a DRBG instance. [T5933] - Do not allow PKCS#1.5 padding for encryption in FIPS mode. [T5918] - Fix the behaviour for child process re-seeding in the DRBG. [rC019a40c990] - Allow verification of small RSA signatures in FIPS mode. [T5975] - Allow the use of a shorter salt for KDFs in FIPS mode. [T6039] - Run digest+sign self tests for RSA and ECC in FIPS mode. [rC06c9350165] - Add function-name based FIPS indicator function. GCRYCTL_FIPS_SERVICE_INDICATOR_FUNCTION. This is not considered an ABI changes because the new FIPS features were not yet approved. [rC822ee57f07] - Improve PCT in FIPS mode. [rC285bf54b1a, rC4963c127ae, T6397] - Use getrandom (GRND_RANDOM) in FIPS mode. [rCcf10c74bd9] - Disable RSA-OAEP padding in FIPS mode. [rCe5bfda492a] - Check minimum allowed key size in PBKDF in FIPS mode. [T6039,T6219] - Get maximum 32B of entropy at once in FIPS mode. [rCce0df08bba] - Prefer gpgrt-config when available. [T5034] - Mark AESWRAP as approved FIPS algorithm. [T5512] - Prevent usage of long salt for PSS in FIPS mode. [rCfdd2a8b332] - Prevent usage of X9.31 keygen in FIPS mode. [rC392e0ccd25] - Remove GCM mode from the allowed FIPS indicators. [rC1540698389] - Add explicit FIPS indicators for hash and MAC algorithms. [T6376]
Add missing pkg-config override for libgcrypt
libgcrypt: updated to 1.10.1 Noteworthy changes in version 1.10.1 (2022-03-28) ------------------------------------------------- * Bug fixes: - Fix minor memory leaks in FIPS mode. - Build fixes for MUSL libc. * Other: - More portable integrity check in FIPS mode. - Add X9.62 OIDs to sha256 and sha512 modules.
libgcrypt: update to 1.10.0. Noteworthy changes in version 1.10.0 (2022-02-01) [C24/A4/R0] ------------------------------------------------- * New and extended interfaces: - New control codes to check for FIPS 140-3 approved algorithms. - New control code to switch into non-FIPS mode. - New cipher modes SIV and GCM-SIV as specified by RFC-5297. - Extended cipher mode AESWRAP with padding as specified by RFC-5649. [T5752] - New set of KDF functions. - New KDF modes Argon2 and Balloon. - New functions for combining hashing and signing/verification. [T4894] * Performance: - Improved support for PowerPC architectures. - Improved ECC performance on zSeries/s390x by using accelerated scalar multiplication. - Many more assembler performance improvements for several architectures. * Bug fixes: - Fix Elgamal encryption for other implementations. [R5328,CVE-2021-40528] - Fix alignment problem on macOS. [T5440] - Check the input length of the point in ECDH. [T5423] - Fix an abort in gcry_pk_get_param for "Curve25519". [T5490] * Other features: - The control code GCRYCTL_SET_ENFORCED_FIPS_FLAG is ignored because it is useless with the FIPS 140-3 related changes. - Update of the jitter entropy RNG code. [T5523] - Simplification of the entropy gatherer when using the getentropy system call.
libgcrypt: update to 1.9.4. Noteworthy changes in version 1.9.4 (2021-08-22) [C23/A3/R4] ------------------------------------------------ * Bug fixes: - Fix Elgamal encryption for other implementations. [#5328,CVE-2021-33560] - Fix alignment problem on macOS. [#5440] - Check the input length of the point in ECDH. [#5423] - Fix an abort in gcry_pk_get_param for "Curve25519". [#5490] * Other features: - Add GCM and CCM to OID mapping table for AES. [a83fb13a3b]
libgcrypt: updated to 1.9.3 Noteworthy changes in version 1.9.3 (2021-04-19) ------------------------------------------------ * Bug fixes: - Fix build problems on i386 using gcc-4.7. - Fix checksum calculation in OCB decryption for AES on s390. - Fix a regression in gcry_mpi_ec_add related to certain usages of curve 25519. - Fix a symbol not found problem on Apple M1. - Fix for Apple iOS getentropy peculiarity. - Make keygrip computation work for compressed points. * Performance: - Add x86_64 VAES/AVX2 accelerated implementation of Camellia. - Add x86_64 VAES/AVX2 accelerated implementation of AES. - Add VPMSUMD acceleration for GCM mode on PPC. * Internal changes. - Harden MPI conditional code against EM leakage. - Harden Elgamal by introducing exponent blinding. - Fix memory leaks in the error code paths of EdDSA.
libgcrypt: updated to 1.9.2 Noteworthy changes in version 1.9.2 (2021-02-17) ------------------------------------------------ * Bug fixes: - Fix build problem for macOS in the random code. - Fix building with --disable-asm on x86. - Check public key for ECDSA verify operation. - Make sure gcry_get_config (NULL) returns a nul-terminated string. - Fix a memory leak in the ECDH code. - Fix a reading beyond end of input buffer in SHA2-avx2. * Other features: - New test driver to allow for standalone regression tests.
libgcrypt: update to 1.9.1. Comment out some old workarounds for configure script/compiler issues, and trust the upstream configure script again until proven wrong. Remove hacks.mk, the grep does not match anything any longer. Noteworthy changes in version 1.9.1 (2021-01-29) [C23/A3/R1] ------------------------------------------------ * Bug fixes: - Fix exploitable bug in hash functions introduced with 1.9.0. [#5275] - Return an error if a negative MPI is used with sexp scan functions. [#4964] - Check for operational FIPS in the random and KDF functions. [#5243] - Fix compile error on ARMv7 with NEON disabled. [#5251] - Fix self-test in KDF module. [#5254] - Improve assembler checks for better LTO support. [#5255] - Fix assember problem on macOS running on M1. [#5157] - Support older macOS without posix_spawn. [#5159] - Fix 32-bit cross build on x86. [#5257] - Fix non-NEON ARM assembly implementation for SHA512. [#5263] - Fix build problems with the cipher_bulk_ops_t typedef. [#5264] - Fix Ed25519 private key handling for preceding ZEROs. [#5267] - Fix overflow in modular inverse implementation. [#5269] - Fix register access for AVX/AVX2 implementations of Blake2. [#5271]. * Performance: - Add optimized cipher and hash functions for s390x/zSeries. - Use hardware bit counting functionx when available. * Internal changes: - The macOS getentropy syscall is used when available. [#5268] - Update DSA functions to match FIPS 186-3. [30ed9593f6] - New self-tests for CMACs and KDFs. [385a89e35b,7a0da24925] - Add bulk cipher functions for OFB and GCM modes. [f12b6788f2,f4e63e92dc] Release-info: https://dev.gnupg.org/T5259
libgcrypt: update to 1.9.0. Noteworthy changes in version 1.9.0 (2021-01-19) [C23/A3/R0] ------------------------------------------------ * New and extended interfaces: - New curves Ed448, X448, and SM2. - New cipher mode EAX. - New cipher algo SM4. - New hash algo SM3. - New hash algo variants SHA512/224 and SHA512/256. - New MAC algos for Blake-2 algorithms, the new SHA512 variants, SM3, SM4 and for a GOST variant. - New convenience function gcry_mpi_get_ui. - gcry_sexp_extract_param understands new format specifiers to directly store to integers and strings. - New function gcry_ecc_mul_point and curve constants for Curve448 and Curve25519. [#4293] - New function gcry_ecc_get_algo_keylen. - New control code GCRYCTL_AUTO_EXPAND_SECMEM to allow growing the secure memory area. Also in 1.8.2 as an undocumented feature. * Performance: - Optimized implementations for Aarch64. - Faster implementations for Poly1305 and ChaCha. Also for PowerPC. [b9a471ccf5,172ad09cbe,#4460] - Optimized implementations of AES and SHA-256 on PowerPC. [#4529,#4530] - Improved use of AES-NI to speed up AES-XTS (6 times faster). [a00c5b2988] - Improved use of AES-NI for OCB. [eacbd59b13,e924ce456d] - Speedup AES-XTS on ARMv8/CE (2.5 times faster). [93503c127a] - New AVX and AVX2 implementations for Blake-2 (1.3/1.4 times faster). [af7fc732f9, da58a62ac1] - Use Intel SHA extension for SHA-1 and SHA-256 (4.0/3.7 times faster). [d02958bd30, 0b3ec359e2] - Use ARMv7/NEON accelerated GCM implementation (3 times faster). [2445cf7431] - Use of i386/SSSE3 for SHA-512 (4.5 times faster on Ryzen 7). [b52dde8609] - Use 64 bit ARMv8/CE PMULL for CRC (7 times faster). [14c8a593ed] - Improve CAST5 (40% to 70% faster). [4ec566b368] - Improve Blowfish (60% to 80% faster). [ced7508c85] * Bug fixes: - Fix infinite loop due to applications using fork the wrong way. [#3491][also in 1.8.4] - Fix possible leak of a few bits of secret primes to pageable memory. [#3848][also in 1.8.4] - Fix possible hang in the RNG (1.8.3 only). [#4034][also in 1.8.4] - Several minor fixes. [#4102,#4208,#4209,#4210,#4211,#4212] [also in 1.8.4] - On Linux always make use of getrandom if possible and then use its /dev/urandom behaviour. [#3894][also in 1.8.4] - Use blinding for ECDSA signing to mitigate a novel side-channel attack. [#4011,CVE-2018-0495] [also in 1.8.3, 1.7.10] - Fix incorrect counter overflow handling for GCM when using an IV size other than 96 bit. [#3764] [also in 1.8.3, 1.7.10] - Fix incorrect output of AES-keywrap mode for in-place encryption on some platforms. [also in 1.8.3, 1.7.10] - Fix the gcry_mpi_ec_curve_point point validation function. [also in 1.8.3, 1.7.10] - Fix rare assertion failure in gcry_prime_check. [also in 1.8.3] - Do not use /dev/srandom on OpenBSD. [also in 1.8.2] - Fix test suite failure on systems with large pages. [#3351] [also in 1.8.2] - Fix test suite to not use mmap on Windows. [also in 1.8.2] - Fix fatal out of secure memory status in the s-expression parser on heavy loaded systems. [also in 1.8.2] - Fix build problems on OpenIndiana et al. [#4818, also in 1.8.6] - Fix GCM bug on arm64 which troubles for example OMEMO. [#4986, also in 1.8.6] - Detect a div-by-zero in a debug helper tool. [#4868, also in 1.8.6] - Use a constant time mpi_inv and related changes. [#4869, partly also in 1.8.6] - Fix mpi_copy to correctly handle flags of opaque MPIs. [also in 1.8.6] - Fix mpi_cmp to consider +0 and -0 the same. [also in 1.8.6] - Fix extra entropy collection via clock_gettime. Note that this fallback code path is not used on any decent hardware. [#4966, also in 1.8.7] - Support opaque MPI with gcry_mpi_print. [#4872, also in 1.8.7] - Allow for a Unicode random seed file on Windows. [#5098, also in 1.8.7] * Other features: - Add OIDs from RFC-8410 as aliases for Ed25519 and Curve25519. [also in 1.8.6] - Add mitigation against ECC timing attack CVE-2019-13626. [#4626] - Internal cleanup of the ECC implementation. - Support reading EC point in compressed format for some curves. [#4951]
libgcrypt: update to 1.8.7. Noteworthy changes in version 1.8.7 (2020-10-23) [C22/A2/R8] ------------------------------------------------ * Bug fixes: - Support opaque MPI with gcry_mpi_print. [#4872] - Fix extra entropy collection via clock_gettime. Note that this fallback code path is not used on any decent hardware. [#4966] - Allow for a Unicode random seed file on Windows. [#5098]
libgcrypt: update to 1.8.6. Noteworthy changes in version 1.8.6 (2020-07-06) [C22/A2/R6] ------------------------------------------------ * Bug fixes: - Fix build problems on OpenIndiana et al. [#4818] - Fix GCM bug on arm64 which troubles for example OMEMO. [#4986] - Fix wrong code execution in Poly1305 ARM/NEON implementation. [#4833] - Detect a div-by-zero in a debug helper tool. [#4868] - Use a constant time mpi_inv in some cases and change the order mpi_invm is called. [#4869] - Fix mpi_copy to correctly handle flags of opaque MPIs. - Fix mpi_cmp to consider +0 and -0 the same. * Other features: - Add OIDs from RFC-8410 as aliases for Ed25519 and Curve25519.
Pullup ticket #6035 - requested by nia security/libgcrypt: security fix Revisions pulled up: - security/libgcrypt/Makefile 1.97 - security/libgcrypt/PLIST 1.12 - security/libgcrypt/distinfo 1.82 --- Module Name: pkgsrc Committed By: nia Date: Mon Sep 2 12:10:54 UTC 2019 Modified Files: pkgsrc/security/libgcrypt: Makefile PLIST distinfo Log Message: libgcrypt: Update to 1.8.5 Noteworthy changes in version 1.8.5 (2019-08-29) [C22/A2/R5] ------------------------------------------------ * Bug fixes: - Add mitigation against an ECDSA timing attack. [#4626,CVE-2019-13627] - Improve ECDSA unblinding. * Other features: - Provide a pkg-config file for libgcrypt. Release-info: https://dev.gnupg.org/T4683
libgcrypt: Update to 1.8.5 Noteworthy changes in version 1.8.5 (2019-08-29) [C22/A2/R5] ------------------------------------------------ * Bug fixes: - Add mitigation against an ECDSA timing attack. [#4626,CVE-2019-13627] - Improve ECDSA unblinding. * Other features: - Provide a pkg-config file for libgcrypt. Release-info: https://dev.gnupg.org/T4683
libgcrypt: updated to 1.8.4 Noteworthy changes in version 1.8.4: * Bug fixes: - Fix infinite loop due to applications using fork the wrong way. - Fix possible leak of a few bits of secret primes to pageable memory. - Fix possible hang in the RNG (1.8.3 only). - Several minor fixes. * Performance: - On Linux always make use of getrandom if possible and then use its /dev/urandom behaviour.
libgcrypt: updated to 1.8.3 version 1.8.3: Bug fixes: - Use blinding for ECDSA signing to mitigate a novel side-channel attack. - Fix incorrect counter overflow handling for GCM when using an IV size other than 96 bit. - Fix incorrect output of AES-keywrap mode for in-place encryption on some platforms. - Fix the gcry_mpi_ec_curve_point point validation function. - Fix rare assertion failure in gcry_prime_check.
*: gd.tuwien.ac.at/ftp.tuwien.ac.at is gone, remove it from various mastersites
libgcrypt: updated to 1.8.2 Noteworthy changes in version 1.8.2: * Bug fixes: - Do not use /dev/srandom on OpenBSD. - Fix test suite failure on systems with large pages. - Fix test suite to not use mmap on Windows. - Fix fatal out of secure memory status in the s-expression parser on heavy loaded systems. * Other: - Backport the auto expand secmem feature from master for use by the forthcoming GnuPG 2.2.4.
version 1.8.1: Bug fixes: - Mitigate a local side-channel attack on Curve25519 dubbed "May the Fourth be With You". [CVE-2017-0379] [also in 1.7.9] - Add more extra bytes to the pool after reading a seed file. - Add the OID SHA384WithECDSA from RFC-7427 to SHA-384. - Fix build problems with the Jitter RNG - Fix assembler code build problems on Rasbian (ARMv8/AArch32-CE).
version 1.8.0: * New interfaces: - New cipher mode XTS - New hash function Blake-2 - New function gcry_mpi_point_copy. - New function gcry_get_config. - GCRYCTL_REINIT_SYSCALL_CLAMP allows to init nPth after Libgcrypt. - New gobal configuration file /etc/gcrypt/random.conf. * Extended interfaces: - GCRYCTL_PRINT_CONFIG does now also print build information for libgpg-error and the used compiler version. - GCRY_CIPHER_MODE_CFB8 is now supported. - Add Stribog OIDs. * Performance: - A jitter based entropy collector is now used in addition to the other entropy collectors. - Optimized gcry_md_hash_buffers for SHA-256 and SHA-512. - More ARMv8/AArch32 improvements for AES, GCM, SHA-256, and SHA-1. - Add ARMv8/AArch32 assembly implementation for Twofish and Camellia. - Add bulk processing implementation for ARMv8/AArch32. - Improve the DRBG performance and sync the code with the Linux version. * Internal changes: - Libgpg-error 1.25 is now required. This avoids stalling of nPth threads due to contention on internal Libgcrypt locks (e.g. the random pool lock). - The system call clamp of libgpg-error is now used to wrap the blocking read of /dev/random. This allows other nPth threads to run while Libgcrypt is gathering entropy. - When secure memory is requested by the MPI functions or by gcry_xmalloc_secure, they do not anymore lead to a fatal error if the secure memory pool is used up. Instead new pools are allocated as needed. These new pools are not protected against being swapped out (mlock can't be used). However, these days this is considered a minor issue and can easily be mitigated by using encrypted swap space. * Bug fixes: - Fix AES CTR self-check detected failure in the SSSE3 based implementation. - Remove gratuitous select before the getrandom syscall. - Fix regression in mlock detection. - Fix GOST 28147 CryptoPro-B S-box. - Fix error code handling of mlock calls. - Fix possible timing attack on EdDSA session key. - Fix long standing bug in secure memory implementation which could lead to a segv on free. - Mitigate a flush+reload side-channel attack on RSA secret keys dubbed "Sliding right into disaster".
changes in version 1.7.8: Bug fixes: - Mitigate a flush+reload side-channel attack on RSA secret keys dubbed "Sliding right into disaster". For details see <https://eprint.iacr.org/2017/627>. [CVE-2017-7526]
Updated libgcrypt to 1.7.7. Noteworthy changes in version 1.7.7 (2017-06-02) [C21/A1/R7] ------------------------------------------------ * Bug fixes: - Fix possible timing attack on EdDSA session key. - Fix long standing bug in secure memory implementation which could lead to a segv on free. [bug#3027]
Updated libgcrypt to 1.7.6. All tests pass. Noteworthy changes in version 1.7.6 (2017-01-18) [C21/A1/R6] ------------------------------------------------ * Bug fixes: - Fix AES CTR self-check detected failure in the SSSE3 based implementation. - Remove gratuitous select before the getrandom syscall.
Convert all occurrences (353 by my count) of MASTER_SITES= site1 \ site2 style continuation lines to be simple repeated MASTER_SITES+= site1 MASTER_SITES+= site2 lines. As previewed on tech-pkg. With thanks to rillig for fixing pkglint accordingly.
Updated libgcrypt to 1.7.5. Noteworthy changes in version 1.7.5 (2016-12-15) [C21/A1/R5] ------------------------------------------------ * Bug fixes: - Fix regression in mlock detection [bug#2870].
Updated libgcrypt to 1.7.4. Noteworthy changes in version 1.7.4 (2016-12-09) [C21/A1/R4] ------------------------------------------------ * Performance: - More ARMv8/AArch32 improvements for AES, GCM, SHA-256, and SHA-1. - Add ARMv8/AArch32 assembly implementation for Twofish and Camellia. - Add bulk processing implementation for ARMv8/AArch32. - Add Stribog OIDs. - Improve the DRBG performance and sync the code with the Linux version. * Internal changes: - When secure memory is requested by the MPI functions or by gcry_xmalloc_secure, they do not anymore lead to a fatal error if the secure memory pool is used up. Instead new pools are allocated as needed. These new pools are not protected against being swapped out (mlock can't be used). However, these days this is considered a minor issue and can easily be mitigated by using encrypted swap space. * Bug fixes: - Fix GOST 28147 CryptoPro-B S-box. - Fix error code handling of mlock calls.
Pullup ticket #5100 - requested by maya security/gnupg: security fix security/libgcrypt: security fix, build fix Revisions pulled up: - security/gnupg/Makefile 1.134 - security/gnupg/distinfo 1.70 - security/libgcrypt/Makefile 1.82-1.84 - security/libgcrypt/buildlink3.mk 1.18 - security/libgcrypt/distinfo 1.67-1.68 - security/libgcrypt/patches/patch-aa 1.9 --- Module Name: pkgsrc Committed By: maya Date: Wed Aug 17 23:05:19 UTC 2016 Modified Files: pkgsrc/security/gnupg: Makefile distinfo Log Message: Update gnupg to 1.4.21 Changelog: 2016-08-17 Werner Koch <wk%gnupg.org@localhost> Release 1.4.21. gpg: Add dummy option --with-subkey-fingerprint. * g10/gpg.c (opts): Add dummy option. build: Create a swdb file during "make distcheck". * Makefile.am (distcheck-hook): New. 2016-08-17 Ineiev <ineiev%gnu.org@localhost> po: Update Russian translation. 2016-08-17 Werner Koch <wk%gnupg.org@localhost> random: Hash continuous areas in the csprng pool. * cipher/random.c (mix_pool): Store the first hash at the end of the pool. cipher: Improve readability by using a macro. * cipher/random.c (mix_pool): Use DIGESTLEN instead of 20. 2016-08-09 Daniel Kahn Gillmor <dkg%fifthhorseman.net@localhost> gpg: Avoid publishing the GnuPG version by default. * g10/gpg.c (main): initialize opt.emit_version to 0 * doc/gpg.texi: document different default for --emit-version 2016-08-04 Daniel Kahn Gillmor <dkg%fifthhorseman.net@localhost> Clean up "allow to" * README, cipher/cipher.c, cipher/pubkey.c, doc/gpg.texi: replace "allow to" with clearer text In standard English, the normal construction is "${XXX} allows ${YYY} to" -- that is, the subject (${XXX}) of the sentence is allowing the object (${YYY}) to do something. When the object is missing, the phrasing sounds awkward, even if the object is implied by context. There's almost always a better construction that isn't as awkward. These changes should make the language a bit clearer. Fix spelling: "occured" should be "occurred" * checks/armor.test, cipher/des.c, g10/ccid-driver.c, g10/pkclist.c, util/regcomp.c, util/regex_internal.c: correct the spelling of "occured" to "occurred" 2016-08-04 NIIBE Yutaka <gniibe%fsij.org@localhost> g10: Fix checking key for signature validation. * g10/sig-check.c (signature_check2): Not only subkey, but also primary key should have flags.valid=1. 2016-08-03 Justus Winter <justus%g10code.com@localhost> Partially revert "g10: Fix another race condition for trustdb access." This amends db246f8b which accidentally included the compiled translation files. 2016-07-09 NIIBE Yutaka <gniibe%fsij.org@localhost> gpgv: Tweak default options for extra security. * g10/gpgv.c (main): Set opt.no_sig _cache, so that it doesn't depend on cached status. Similarly, set opt.flags.require_cross_cert for backsig validation for subkey signature. 2016-07-06 NIIBE Yutaka <gniibe%fsij.org@localhost> g10: Fix keysize with --expert. * g10/keygen.c (ask_keysize): It's 768 only for DSA. 2016-06-28 NIIBE Yutaka <gniibe%fsij.org@localhost> g10: Fix --list-packets. * g10/gpg.c (main): Call set_packet_list_mode after assignment of opt.list_packets. * g10/mainproc.c (do_proc_packets): Don't stop processing with --list-packets as the comment says. * g10/options.h (list_packets): Fix the comment. * g10/parse-packet.c: Fix the condition for opt.list_packets. 2016-06-15 Niibe Yutaka <gniibe%fsij.org@localhost> g10: Fix another race condition for trustdb access. * g10/tdbio.c (create_version_record): Call create_hashtable to always make hashtable, together with the version record. (get_trusthashrec): Remove call to create_hashtable. 2016-02-12 NIIBE Yutaka <gniibe%fsij.org@localhost> g10: Make sure to have the directory for trustdb. * g10/tdbio.c (tdbio_set_dbname): Return earlier if !CREATE. Check the directory and create it if none before calling take_write_lock. 2016-02-01 Werner Koch <wk%gnupg.org@localhost> Fix possible sign extension problem with newer compilers. * cipher/des.c (READ_64BIT_DATA): Cast to u32 before shifting by 24. * cipher/blowfish.c (do_encrypt_block): Ditto. (do_decrypt_block): Ditto. * cipher/camellia.c (CAMELLIA_RR8): Ditto. * cipher/cast5.c (do_encrypt_block): Ditto. (do_decrypt_block): Ditto. (do_cast_setkey): Ditto. * cipher/twofish.c (INPACK): Ditto. * util/iobuf.c (block_filter): Ditto. 2016-01-26 NIIBE Yutaka <gniibe%fsij.org@localhost> g10: Fix iobuf API of filter function for alignment. * include/iobuf.h (struct iobuf_struct): Remove DESC. * util/iobuf.c (iobuf_desc): New. (print_chain, iobuf_close, iobuf_open, iobuf_fdopen, iobuf_sockopen) (iobuf_create, iobuf_append, iobuf_openrw, iobuf_ioctl) (iobuf_push_filter2, pop_filter, underflow): Use iobuf_desc. (file_filter, sock_filter, block_filter): Fill the description. * g10/armor.c, g10/cipher.c, g10/compress-bz2.c, g10/compress.c, g10/encode.c, g10/encr-data.c, g10/mdfilter.c, g10/pipemode.c, g10/progress.c, g10/textfilter.c: Likewise. 2016-01-15 Werner Koch <wk%gnupg.org@localhost> Fix possible AIX problem with sysconf in rndunix. * cipher/rndunix.c [HAVE_STDINT_H]: Include stdint.h. (start_gatherer): Detect misbehaving sysconf. 2016-01-13 NIIBE Yutaka <gniibe%fsij.org@localhost> Fix to support git worktree. * Makefile.am: Use -e for testing .git. 2015-12-21 NIIBE Yutaka <gniibe%fsij.org@localhost> po: Update Japanese translation. --- Module Name: pkgsrc Committed By: maya Date: Wed Aug 17 23:13:11 UTC 2016 Modified Files: pkgsrc/security/libgcrypt: Makefile buildlink3.mk distinfo Log Message: Update libgcrypt to 1.7.3 Changelog: 2016-08-17 Werner Koch <wk%gnupg.org@localhost> Release 1.7.3. * configure.ac: Set LT version to C21/A1/R3. random: Hash continuous areas in the csprng pool. * random/random-csprng.c (mix_pool): Store the first hash at the end of the pool. random: Improve the diagram showing the random mixing. * random/random-csprng.c (mix_pool): Use DIGESTLEN instead of 20. 2016-07-19 Jussi Kivilinna <jussi.kivilinna%iki.fi@localhost> crc-intel-pclmul: split assembly block to ease register pressure. * cipher/crc-intel-pclmul.c (crc32_less_than_16): Split inline assembly block handling 4 byte input into multiple blocks. rijndael-aesni: split assembly block to ease register pressure. * cipher/rijndael-aesni.c (do_aesni_ctr_4): Use single register constraint for passing 'bige_addb' to assembly block; split first inline assembly block into two parts. 2016-07-14 Jussi Kivilinna <jussi.kivilinna%iki.fi@localhost> Add ARMv8/AArch32 Crypto Extension implementation of AES. * cipher/Makefile.am: Add 'rijndael-armv8-ce.c' and 'rijndael-armv-aarch32-ce.S'. * cipher/rijndael-armv8-aarch32-ce.S: New. * cipher/rijndael-armv8-ce.c: New. * cipher/rijndael-internal.h (USE_ARM_CE): New. (RIJNDAEL_context_s): Add 'use_arm_ce'. * cipher/rijndael.c [USE_ARM_CE] (_gcry_aes_armv8_ce_setkey) (_gcry_aes_armv8_ce_prepare_decryption) (_gcry_aes_armv8_ce_encrypt, _gcry_aes_armv8_ce_decrypt) (_gcry_aes_armv8_ce_cfb_enc, _gcry_aes_armv8_ce_cbc_enc) (_gcry_aes_armv8_ce_ctr_enc, _gcry_aes_armv8_ce_cfb_dec) (_gcry_aes_armv8_ce_cbc_dec, _gcry_aes_armv8_ce_ocb_crypt) (_gcry_aes_armv8_ce_ocb_auth): New. (do_setkey) [USE_ARM_CE]: Add ARM CE/AES HW feature check and key setup for ARM CE. (prepare_decryption, _gcry_aes_cfb_enc, _gcry_aes_cbc_enc) (_gcry_aes_ctr_enc, _gcry_aes_cfb_dec, _gcry_aes_cbc_dec) (_gcry_aes_ocb_crypt, _gcry_aes_ocb_auth) [USE_ARM_CE]: Add ARM CE support. * configure.ac: Add 'rijndael-armv8-ce.lo' and 'rijndael-armv8-aarch32-ce.lo'. Add ARMv8/AArch32 Crypto Extension implementation of GCM. * cipher/Makefile.am: Add 'cipher-gcm-armv8-aarch32-ce.S'. * cipher/cipher-gcm-armv8-aarch32-ce.S: New. * cipher/cipher-gcm.c [GCM_USE_ARM_PMULL] (_gcry_ghash_setup_armv8_ce_pmull, _gcry_ghash_armv8_ce_pmull) (ghash_setup_armv8_ce_pmull, ghash_armv8_ce_pmull): New. (setupM) [GCM_USE_ARM_PMULL]: Enable ARM PMULL implementation if HWF_ARM_PULL HW feature flag is enabled. * cipher/cipher-gcm.h (GCM_USE_ARM_PMULL): New. Add ARMv8/AArch32 Crypto Extension implemenation of SHA-256. * cipher/Makefile.am: Add 'sha256-armv8-aarch32-ce.S'. * cipher/sha256-armv8-aarch32-ce.S: New. * cipher/sha256.c (USE_ARM_CE): New. (sha256_init, sha224_init): Check features for HWF_ARM_SHA1. [USE_ARM_CE] (_gcry_sha256_transform_armv8_ce): New. (transform) [USE_ARM_CE]: Use ARMv8 CE implementation if HW supports. (SHA256_CONTEXT): Add 'use_arm_ce'. * configure.ac: Add 'sha256-armv8-aarch32-ce.lo'. Add ARMv8/AArch32 Crypto Extension implementation of SHA-1. * cipher/Makefile.am: Add 'sha1-armv8-aarch32-ce.S'. * cipher/sha1-armv7-neon.S (_gcry_sha1_transform_armv7_neon): Add missing size. * cipher/sha1-armv8-aarch32-ce.S: New. * cipher/sha1.c (USE_ARM_CE): New. (sha1_init): Check features for HWF_ARM_SHA1. [USE_ARM_CE] (_gcry_sha1_transform_armv8_ce): New. (transform) [USE_ARM_CE]: Use ARMv8 CE implementation if HW supports it. * cipher/sha1.h (SHA1_CONTEXT): Add 'use_arm_ce'. * configure.ac: Add 'sha1-armv8-aarch32-ce.lo'. Add HW feature check for ARMv8 AArch64 and crypto extensions. * configure.ac: Add '--disable-arm-crypto-support'; enable hwf-arm module on 64-bit ARM. (armcryptosupport, gcry_cv_gcc_inline_aarch32_crypto) (gcry_cv_inline_asm_aarch64_neon) (gcry_cv_gcc_inline_asm_aarch64_crypto): New. * src/g10lib.h (HWF_ARM_AES, HWF_ARM_SHA1, HWF_ARM_SHA2) (HWF_ARM_PMULL): New. * src/hwf-arm.c [__aarch64__]: Enable building in AArch64 mode. (feature_map_s): New. [__arm__] (AT_HWCAP, AT_HWCAP2, HWCAP2_AES, HWCAP2_PMULL) (HWCAP2_SHA1, HWCAP2_SHA2, arm_features): New. [__aarch64__] (AT_HWCAP, AT_HWCAP2, HWCAP_ASIMD, HWCAP_AES) (HWCAP_PMULL, HWCAP_SHA1, HWCAP_SHA2, arm_features): New. (get_hwcap): Add reading of 'AT_HWCAP2'; Change auxv use 'unsigned long'. (detect_arm_at_hwcap): Add mapping of HWCAP/HWCAP2 to HWF flags. (detect_arm_proc_cpuinfo): Add mapping of CPU features to HWF flags. (_gcry_hwf_detect_arm): Use __ARM_NEON instead of legacy __ARM_NEON__. * src/hwfeatures.c (hwflist): Add 'arm-aes', 'arm-sha1', 'arm-sha2' and 'arm-pmull'. --- Module Name: pkgsrc Committed By: wiz Date: Sat Aug 20 19:22:37 UTC 2016 Modified Files: pkgsrc/security/libgcrypt: Makefile Log Message: Depends on libgpg-error-1.13. >From David H. Gutteridge in PR 51430. --- Module Name: pkgsrc Committed By: fhajny Date: Thu Sep 1 10:19:30 UTC 2016 Modified Files: pkgsrc/security/libgcrypt: Makefile distinfo pkgsrc/security/libgcrypt/patches: patch-aa Log Message: Use COMPILER_RPATH_FLAG properly. Reconciles libgcrypt-config with Darwin linker. Fixes joyent/pkgsrc#400. Bump PKGREVISION.
Use COMPILER_RPATH_FLAG properly. Reconciles libgcrypt-config with Darwin linker. Fixes joyent/pkgsrc#400. Bump PKGREVISION.
Depends on libgpg-error-1.13. From David H. Gutteridge in PR 51430.
Update libgcrypt to 1.7.3 Changelog: 2016-08-17 Werner Koch <wk@gnupg.org> Release 1.7.3. * configure.ac: Set LT version to C21/A1/R3. random: Hash continuous areas in the csprng pool. * random/random-csprng.c (mix_pool): Store the first hash at the end of the pool. random: Improve the diagram showing the random mixing. * random/random-csprng.c (mix_pool): Use DIGESTLEN instead of 20. 2016-07-19 Jussi Kivilinna <jussi.kivilinna@iki.fi> crc-intel-pclmul: split assembly block to ease register pressure. * cipher/crc-intel-pclmul.c (crc32_less_than_16): Split inline assembly block handling 4 byte input into multiple blocks. rijndael-aesni: split assembly block to ease register pressure. * cipher/rijndael-aesni.c (do_aesni_ctr_4): Use single register constraint for passing 'bige_addb' to assembly block; split first inline assembly block into two parts. 2016-07-14 Jussi Kivilinna <jussi.kivilinna@iki.fi> Add ARMv8/AArch32 Crypto Extension implementation of AES. * cipher/Makefile.am: Add 'rijndael-armv8-ce.c' and 'rijndael-armv-aarch32-ce.S'. * cipher/rijndael-armv8-aarch32-ce.S: New. * cipher/rijndael-armv8-ce.c: New. * cipher/rijndael-internal.h (USE_ARM_CE): New. (RIJNDAEL_context_s): Add 'use_arm_ce'. * cipher/rijndael.c [USE_ARM_CE] (_gcry_aes_armv8_ce_setkey) (_gcry_aes_armv8_ce_prepare_decryption) (_gcry_aes_armv8_ce_encrypt, _gcry_aes_armv8_ce_decrypt) (_gcry_aes_armv8_ce_cfb_enc, _gcry_aes_armv8_ce_cbc_enc) (_gcry_aes_armv8_ce_ctr_enc, _gcry_aes_armv8_ce_cfb_dec) (_gcry_aes_armv8_ce_cbc_dec, _gcry_aes_armv8_ce_ocb_crypt) (_gcry_aes_armv8_ce_ocb_auth): New. (do_setkey) [USE_ARM_CE]: Add ARM CE/AES HW feature check and key setup for ARM CE. (prepare_decryption, _gcry_aes_cfb_enc, _gcry_aes_cbc_enc) (_gcry_aes_ctr_enc, _gcry_aes_cfb_dec, _gcry_aes_cbc_dec) (_gcry_aes_ocb_crypt, _gcry_aes_ocb_auth) [USE_ARM_CE]: Add ARM CE support. * configure.ac: Add 'rijndael-armv8-ce.lo' and 'rijndael-armv8-aarch32-ce.lo'. Add ARMv8/AArch32 Crypto Extension implementation of GCM. * cipher/Makefile.am: Add 'cipher-gcm-armv8-aarch32-ce.S'. * cipher/cipher-gcm-armv8-aarch32-ce.S: New. * cipher/cipher-gcm.c [GCM_USE_ARM_PMULL] (_gcry_ghash_setup_armv8_ce_pmull, _gcry_ghash_armv8_ce_pmull) (ghash_setup_armv8_ce_pmull, ghash_armv8_ce_pmull): New. (setupM) [GCM_USE_ARM_PMULL]: Enable ARM PMULL implementation if HWF_ARM_PULL HW feature flag is enabled. * cipher/cipher-gcm.h (GCM_USE_ARM_PMULL): New. Add ARMv8/AArch32 Crypto Extension implemenation of SHA-256. * cipher/Makefile.am: Add 'sha256-armv8-aarch32-ce.S'. * cipher/sha256-armv8-aarch32-ce.S: New. * cipher/sha256.c (USE_ARM_CE): New. (sha256_init, sha224_init): Check features for HWF_ARM_SHA1. [USE_ARM_CE] (_gcry_sha256_transform_armv8_ce): New. (transform) [USE_ARM_CE]: Use ARMv8 CE implementation if HW supports. (SHA256_CONTEXT): Add 'use_arm_ce'. * configure.ac: Add 'sha256-armv8-aarch32-ce.lo'. Add ARMv8/AArch32 Crypto Extension implementation of SHA-1. * cipher/Makefile.am: Add 'sha1-armv8-aarch32-ce.S'. * cipher/sha1-armv7-neon.S (_gcry_sha1_transform_armv7_neon): Add missing size. * cipher/sha1-armv8-aarch32-ce.S: New. * cipher/sha1.c (USE_ARM_CE): New. (sha1_init): Check features for HWF_ARM_SHA1. [USE_ARM_CE] (_gcry_sha1_transform_armv8_ce): New. (transform) [USE_ARM_CE]: Use ARMv8 CE implementation if HW supports it. * cipher/sha1.h (SHA1_CONTEXT): Add 'use_arm_ce'. * configure.ac: Add 'sha1-armv8-aarch32-ce.lo'. Add HW feature check for ARMv8 AArch64 and crypto extensions. * configure.ac: Add '--disable-arm-crypto-support'; enable hwf-arm module on 64-bit ARM. (armcryptosupport, gcry_cv_gcc_inline_aarch32_crypto) (gcry_cv_inline_asm_aarch64_neon) (gcry_cv_gcc_inline_asm_aarch64_crypto): New. * src/g10lib.h (HWF_ARM_AES, HWF_ARM_SHA1, HWF_ARM_SHA2) (HWF_ARM_PMULL): New. * src/hwf-arm.c [__aarch64__]: Enable building in AArch64 mode. (feature_map_s): New. [__arm__] (AT_HWCAP, AT_HWCAP2, HWCAP2_AES, HWCAP2_PMULL) (HWCAP2_SHA1, HWCAP2_SHA2, arm_features): New. [__aarch64__] (AT_HWCAP, AT_HWCAP2, HWCAP_ASIMD, HWCAP_AES) (HWCAP_PMULL, HWCAP_SHA1, HWCAP_SHA2, arm_features): New. (get_hwcap): Add reading of 'AT_HWCAP2'; Change auxv use 'unsigned long'. (detect_arm_at_hwcap): Add mapping of HWCAP/HWCAP2 to HWF flags. (detect_arm_proc_cpuinfo): Add mapping of CPU features to HWF flags. (_gcry_hwf_detect_arm): Use __ARM_NEON instead of legacy __ARM_NEON__. * src/hwfeatures.c (hwflist): Add 'arm-aes', 'arm-sha1', 'arm-sha2' and 'arm-pmull'.
Updated libgcrypt to 1.7.2. Noteworthy changes in version 1.7.2 (2016-07-14) [C21/A1/R2] ------------------------------------------------ * Bug fixes: - Fix setting of the ECC cofactor if parameters are specified. - Fix memory leak in the ECC code. - Remove debug message about unsupported getrandom syscall. - Fix build problems related to AVX use. - Fix bus errors on ARM for Poly1305, ChaCha20, AES, and SHA-512. * Internal changes: - Improved fatal error message for wrong use of gcry_md_read. - Disallow symmetric encryption/decryption if key is not set.
Fix assembler problems on ARM. Patches by Michael Plass <mfpnb@plass-family.net> on tech-pkg/port-arm. Bump PKGREVISION.
Updated libgcrypt to 1.7.1. Noteworthy changes in version 1.7.1 (2016-06-15) [C21/A1/R1] ------------------------------------------------ * Bug fixes: - Fix ecc_verify for cofactor support. - Fix portability bug when using gcc with Solaris 9 SPARC. - Build fix for OpenBSD/amd64 - Add OIDs to the Serpent ciphers. * Internal changes: - Use getrandom system call on Linux if available. - Blinding is now also used for RSA signature creation. - Changed names of debug envvars
Fix netbsd-6 build Patch from nonaka@, thank you.
Fix _gcry_sha1_transform_amd64_avx undefined reference error under NetBSD/amd64 6 and CentOS 6. * Explicitly disable AVX and AVX2 for GCC 4.4 and 4.5
Use --disable-pclmul-support on Linux and SunOS i386, the inline assembly does not compile on either.
Update libgcrypt to 1.7.0. Noteworthy changes in version 1.7.0 (2016-04-15) [C21/A1/R0] ------------------------------------------------ * New algorithms and modes: - SHA3-224, SHA3-256, SHA3-384, SHA3-512, and MD2 hash algorithms. - SHAKE128 and SHAKE256 extendable-output hash algorithms. - ChaCha20 stream cipher. - Poly1305 message authentication algorithm - ChaCha20-Poly1305 Authenticated Encryption with Associated Data mode. - OCB mode. - HMAC-MD2 for use by legacy applications. * New curves for ECC: - Curve25519. - sec256k1. - GOST R 34.10-2001 and GOST R 34.10-2012. * Performance: - Improved performance of KDF functions. - Assembler optimized implementations of Blowfish and Serpent on ARM. - Assembler optimized implementation of 3DES on x86. - Improved AES using the SSSE3 based vector permutation method by Mike Hamburg. - AVX/BMI is used for SHA-1 and SHA-256 on x86. This is for SHA-1 about 20% faster than SSSE3 and more than 100% faster than the generic C implementation. - 40% speedup for SHA-512 and 72% for SHA-1 on ARM Cortex-A8. - 60-90% speedup for Whirlpool on x86. - 300% speedup for RIPE MD-160. - Up to 11 times speedup for CRC functions on x86. * Other features: - Improved ECDSA and FIPS 186-4 compliance. - Support for Montgomery curves. - gcry_cipher_set_sbox to tweak S-boxes of the gost28147 cipher algorithm. - gcry_mpi_ec_sub to subtract two points on a curve. - gcry_mpi_ec_decode_point to decode an MPI into a point object. - Emulation for broken Whirlpool code prior to 1.6.0. [from 1.6.1] - Flag "pkcs1-raw" to enable PCKS#1 padding with a user supplied hash part. - Parameter "saltlen" to set a non-default salt length for RSA PSS. - A SP800-90A conforming DRNG replaces the former X9.31 alternative random number generator. - Map deprecated RSA algo number to the RSA algo number for better backward compatibility. [from 1.6.2] - Use ciphertext blinding for Elgamal decryption [CVE-2014-3591]. See http://www.cs.tau.ac.il/~tromer/radioexp/ for details. [from 1.6.3] - Fixed data-dependent timing variations in modular exponentiation [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks are Practical]. [from 1.6.3] - Flag "no-keytest" for ECC key generation. Due to a bug in the parser that flag will also be accepted but ignored by older version of Libgcrypt. [from 1.6.4] - Speed up the random number generator by requiring less extra seeding. [from 1.6.4] - Always verify a created RSA signature to avoid private key leaks due to hardware failures. [from 1.6.4] - Mitigate side-channel attack on ECDH with Weierstrass curves [CVE-2015-7511]. See http://www.cs.tau.ac.IL/~tromer/ecdh/ for details. [from 1.6.5] * Internal changes: - Moved locking out to libgpg-error. - Support of the SYSROOT envvar in the build system. - Refactor some code. - The availability of a 64 bit integer type is now mandatory. * Bug fixes: - Fixed message digest lookup by OID (regression in 1.6.0). - Fixed a build problem on NetBSD - Fixed memory leaks in ECC code. - Fixed some asm build problems and feature detection bugs. * Interface changes relative to the 1.6.0 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ gcry_cipher_final NEW macro. GCRY_CIPHER_MODE_CFB8 NEW constant. GCRY_CIPHER_MODE_OCB NEW. GCRY_CIPHER_MODE_POLY1305 NEW. gcry_cipher_set_sbox NEW macro. gcry_mac_get_algo NEW. GCRY_MAC_HMAC_MD2 NEW. GCRY_MAC_HMAC_SHA3_224 NEW. GCRY_MAC_HMAC_SHA3_256 NEW. GCRY_MAC_HMAC_SHA3_384 NEW. GCRY_MAC_HMAC_SHA3_512 NEW. GCRY_MAC_POLY1305 NEW. GCRY_MAC_POLY1305_AES NEW. GCRY_MAC_POLY1305_CAMELLIA NEW. GCRY_MAC_POLY1305_SEED NEW. GCRY_MAC_POLY1305_SERPENT NEW. GCRY_MAC_POLY1305_TWOFISH NEW. gcry_md_extract NEW. GCRY_MD_FLAG_BUGEMU1 NEW [from 1.6.1]. GCRY_MD_GOSTR3411_CP NEW. GCRY_MD_SHA3_224 NEW. GCRY_MD_SHA3_256 NEW. GCRY_MD_SHA3_384 NEW. GCRY_MD_SHA3_512 NEW. GCRY_MD_SHAKE128 NEW. GCRY_MD_SHAKE256 NEW. gcry_mpi_ec_decode_point NEW. gcry_mpi_ec_sub NEW. GCRY_PK_EDDSA NEW constant. GCRYCTL_GET_TAGLEN NEW. GCRYCTL_SET_SBOX NEW. GCRYCTL_SET_TAGLEN NEW.
Pullup ticket #4928 - requested by sevan security/libgcrypt: security fix Revisions pulled up: - security/libgcrypt/Makefile 1.74 - security/libgcrypt/distinfo 1.62 --- Module Name: pkgsrc Committed By: wiz Date: Thu Feb 11 13:36:37 UTC 2016 Modified Files: pkgsrc/security/libgcrypt: Makefile distinfo Log Message: Update libgcrypt to 1.6.5: Noteworthy changes in version 1.6.5 (2016-02-09) [C20/A0/R5] ------------------------------------------------ * Mitigate side-channel attack on ECDH with Weierstrass curves [CVE-2015-7511]. See http://www.cs.tau.ac.IL/~tromer/ecdh/ for details. * Fix build problem on Solaris.
Update libgcrypt to 1.6.5: Noteworthy changes in version 1.6.5 (2016-02-09) [C20/A0/R5] ------------------------------------------------ * Mitigate side-channel attack on ECDH with Weierstrass curves [CVE-2015-7511]. See http://www.cs.tau.ac.IL/~tromer/ecdh/ for details. * Fix build problem on Solaris.
Update security/libgcrypt to 1.6.4: Noteworthy changes in version 1.6.4 (2015-09-08) [C20/A0/R4] ------------------------------------------------ * Speed up the random number generator by requiring less extra seeding. * New flag "no-keytest" for ECC key generation. Due to a bug in the parser that flag will also be accepted but ignored by older version of Libgcrypt. * Always verify a created RSA signature to avoid private key leaks due to hardware failures. * Fix alignment bug in the AESNI code on Windows > 7. * Support FreeBSD 10 and later. * Other minor bug fixes.
Fix previous.
libgpg-error needs to be >= version 1.11.
Pullup ticket #4637 - requested by wiz security/libgcrypt: security update Revisions pulled up: - security/libgcrypt/Makefile 1.69-1.70 - security/libgcrypt/distinfo 1.55-1.56 - security/libgcrypt/patches/patch-ab deleted - security/libgcrypt/patches/patch-random_rndunix.c 1.1 --- Module Name: pkgsrc Committed By: wiz Date: Mon Jan 5 21:56:16 UTC 2015 Modified Files: pkgsrc/security/libgcrypt: Makefile distinfo Added Files: pkgsrc/security/libgcrypt/patches: patch-random_rndunix.c Removed Files: pkgsrc/security/libgcrypt/patches: patch-ab Log Message: Replace patch-ab with upstream version, see http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commitdiff;h=817472358a093438e802380caecf7139406400cf;hp=8c5eee51d9a25b143e41ffb7ff4a6b2a29b82d83 Bump PKGREVISION. --- Module Name: pkgsrc Committed By: wiz Date: Sat Feb 28 00:14:25 UTC 2015 Modified Files: pkgsrc/security/libgcrypt: Makefile distinfo Log Message: Update to 1.6.3: Noteworthy changes in version 1.6.3 (2015-02-27) [C20/A0/R3] ------------------------------------------------ * Use ciphertext blinding for Elgamal decryption [CVE-2014-3591]. See http://www.cs.tau.ac.il/~tromer/radioexp/ for details. * Fixed data-dependent timing variations in modular exponentiation [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks are Practical]. * Improved asm support for older toolchains.
Update to 1.6.3: Noteworthy changes in version 1.6.3 (2015-02-27) [C20/A0/R3] ------------------------------------------------ * Use ciphertext blinding for Elgamal decryption [CVE-2014-3591]. See http://www.cs.tau.ac.il/~tromer/radioexp/ for details. * Fixed data-dependent timing variations in modular exponentiation [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks are Practical]. * Improved asm support for older toolchains.
Replace patch-ab with upstream version, see http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commitdiff;h=817472358a093438e802380caecf7139406400cf;hp=8c5eee51d9a25b143e41ffb7ff4a6b2a29b82d83 Bump PKGREVISION.
Remove pkgviews: don't set PKG_INSTALLATION_TYPES in Makefiles.
Remove ten year old patch for Solaris 9/sparc/gcc that was never fed upstream. If this patch is still necessary for you, please discuss at https://bugs.g10code.com/gnupg/issue1703 Bump PKGREVISION.
reinstate patch-configure as upstream patch not yet in [1.6.2] release. http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commitdiff;h=43376891c01f4aff1fbfb23beafebb5adfd0868c revbump to pick it up.
Explicitly disable SSSE3 support on SunOS, it doesn't build.
Update HOMEPAGE.
Update to 1.6.2. Add a comment to patch. Noteworthy changes in version 1.6.2 (2014-08-21) [C20/A0/R2] ------------------------------------------------ * Map deprecated RSA algo number to the RSA algo number for better backward compatibility. * Support a 0x40 compression prefix for EdDSA. * Improve ARM hardware feature detection and building. * Fix powerpc-apple-darwin detection * Fix building for the x32 ABI platform. * Support building using the latest mingw-w64 toolchain. * Fix some possible NULL deref bugs.
Fix build under SCO OpenServer 5.0.7/3.2.
Update to 1.6.1. Remove lots of integrated patches. Noteworthy changes in version 1.6.1 (2014-01-29) ------------------------------------------------ * Added emulation for broken Whirlpool code prior to 1.6.0. * Improved performance of KDF functions. * Improved ECDSA compliance. * Fixed locking for Windows and non-ELF Pthread systems (regression in 1.6.0) * Fixed message digest lookup by OID (regression in 1.6.0). * Fixed a build problem on NetBSD. * Fixed memory leaks in ECC code. * Fixed some asm build problems and feature detection bugs. * Interface changes relative to the 1.6.0 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ GCRY_MD_FLAG_BUGEMU1 NEW (minor API change).
revise recent -Wa,--divide usage for SunOS to allow only SunOS x86_64 and naturally non-gcc/non-gas builds by patching configure instead (adapted from configure.ac in the works upstream).
cipher/sha1-ssse3-amd64.S suffers a supposedly "infamous" problem wherein expressions containing a '/' (divide) are problematic because according to the SUN x86 Assembly Language Reference Manual, '/' should be treated as starting comments. To get over this, gas has '--divide' do not treat `/' as a comment character
Update to 1.6.0: Noteworthy changes in version 1.6.0 (2013-12-16) ------------------------------------------------ * Removed the long deprecated gcry_ac interface. Thus Libgcrypt is not anymore ABI compatible to previous versions if they used the ac interface. * Removed the module register subsystem. * The deprecated message digest debug macros have been removed. Use gcry_md_debug instead. * Removed deprecated control codes. * Improved performance of most cipher algorithms as well as for the SHA family of hash functions. * Added support for the IDEA cipher algorithm. * Added support for the Salsa20 and reduced Salsa20/12 stream ciphers. * Added limited support for the GOST 28147-89 cipher algorithm. * Added support for the GOST R 34.11-94 and R 34.11-2012 (Stribog) hash algorithms. * Added a random number generator to directly use the system's RNG. Also added an interface to prefer the use of a specified RNG. * Added support for the SCRYPT algorithm. * Mitigated the Yarom/Falkner flush+reload side-channel attack on RSA secret keys. See <http://eprint.iacr.org/2013/448> [CVE-2013-4242]. * Added support for Deterministic DSA as per RFC-6969. * Added support for curve Ed25519. * Added a scatter gather hash convenience function. * Added several MPI amd SEXP helper functions. * Added support for negative numbers to gcry_mpi_print, gcry_mpi_aprint and gcry_mpi_scan. * The algorithm ids GCRY_PK_ECDSA and GCRY_PK_ECDH are now deprecated. Use GCRY_PK_ECC if you need an algorithm id. * Changed gcry_pk_genkey for "ecc" to only include the curve name and not the parameters. The flag "param" may be used to revert this. * Added a feature to globally disable selected hardware features. * Added debug helper functions.
Pullup ticket #4188 - requested by wiz security/libgcrypt: security update Revisions pulled up: - security/libgcrypt/Makefile 1.57 - security/libgcrypt/distinfo 1.39 --- Module Name: pkgsrc Committed By: wiz Date: Thu Jul 25 11:51:59 UTC 2013 Modified Files: pkgsrc/security/libgcrypt: Makefile distinfo Log Message: Update to 1.5.3: Noteworthy changes in version 1.5.3 (2013-07-25) ------------------------------------------------ * Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA secret keys. See <http://eprint.iacr.org/2013/448>.
Update to 1.5.3: Noteworthy changes in version 1.5.3 (2013-07-25) ------------------------------------------------ * Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA secret keys. See <http://eprint.iacr.org/2013/448>.
Update to 1.5.2. XXX: lots of patches without comments, and not upstreamed it seems. Noteworthy changes in version 1.5.2 (2013-04-18) ------------------------------------------------ * Added support for IDEA. * Made the Padlock code work again (regression since 1.5.0). * Fixed alignment problems for Serpent. * Fixed two bugs in ECC computations.
update to 1.5.1 changes: minor fixes
Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days.
Fix building with clang on i386 (PR#46177)
disable AESNI support for now, until we have a method to tell whether the assembler supports the needed SSE commands, to allow building on NetBSD-5, in response to a report by Marc Baudoin to pkgsrc-users
Changes 1.5.0: * New function gcry_kdf_derive implementing OpenPGP S2K algorithms and PBKDF2. * Support for WindowsCE. * Support for ECDH. * Support for OAEP and PSS methods as described by RFC-3447. * Fixed PKCS v1.5 code to always return the leading zero. * New format specifiers "%M" and "%u" for gcry_sexp_build. * Support opaque MPIs with "%m" and "%M" in gcry_sexp_build. * New functions gcry_pk_get_curve and gcry_pk_get_param to map ECC parameters to a curve name and to retrieve parameter values. * gcry_mpi_cmp applied to opaque values has a defined semantic now. * Uses the Intel AES-NI instructions if available. * The use of the deprecated Alternative Public Key Interface (gcry_ac_*) will now print compile time warnings. * The module register subsystem has been deprecated. This subsystem is not flexible enough and would always require ABI changes to extend the internal interfaces. It will eventually be removed. Please contact us on the gcrypt-devel mailing list to discuss whether you really need this feature or how it can be replaced by an internal plugin mechanism. * CTR mode may now be used with data chunks of arbitrary length.
recursive bump from gettext-lib shlib bump.
don't enable padlock support on NetBSD by default, it crashes on padlock capable CPUs
Follow HTTP redirects to new HOMEPAGEs and/or MASTER_SITES.
Changes in version 1.4.6: * New variants of the TIGER algorithm. * New cipher algorithm mode for AES-WRAP. * Interface changes relative to the 1.4.2 release: GCRY_MD_TIGER1 NEW. GCRY_MD_TIGER2 NEW. GCRY_CIPHER_MODE_AESWRAP NEW.
put back the (non-default) "idea" option which got lost a while ago
Update to 1.4.5: Noteworthy changes in version 1.4.5 (2009-12-11) ------------------------------------------------ * Fixed minor memory leak in DSA key generation. * No more switching to FIPS mode if /proc/version is not readable. * Fixed a sigill during Padlock detection on old CPUs. * Fixed a hang on some W2000 machines. * Boosted SHA-512 performance by 30% on ia32 boxes and gcc 4.3; SHA-256 went up by 25%.
Use standard location for LICENSE line (in MAINTAINER/HOMEPAGE/COMMENT block). Uncomment some commented out LICENSE lines while here.
Changes 1.4.4: * Publish GCRY_MODULE_ID_USER and GCRY_MODULE_ID_USER_LAST constants. This functionality has been in Libgcrypt since 1.3.0. * MD5 may now be used in non-enforced fips mode. * Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes. * In fips mode, RSA keys are now generated using the X9.31 algorithm and DSA keys using the FIPS 186-2 algorithm. * The transient-key flag is now also supported for DSA key generation. DSA domain parameters may be given as well.
Changes 1.4.3: * Try to auto-initialize Libgcrypt to minimize the effect of applications not doing that correctly. This is not a perfect solution but given that many applicationion would totally fail without such a hack, we try to help at least with the most common cases. Folks, please read the manual to learn how to properly initialize Libgcrypt! * Auto-initialize the secure memory to 32k instead of aborting the process. * Log fatal errors via syslog. * Changed the name and the semantics of the fips mode config file. * Add convenience macro gcry_fips_mode_active. * More self-tests. * Documentation cleanups.
Update to 1.4.1: Noteworthy changes in version 1.4.1 (2008-04-25) ------------------------------------------------ * Fixed a bug introduced by 1.3.1 which led to the comsumption of far too much entropy for the intial seeding. * Improved AES performance for CFB and CBC modes. * Removed build problems for the Padlock support.
Update to 1.4.0: Noteworthy changes in version 1.4.0 (2007-12-10) ------------------------------------------------ * New configure option --disable-padlock-support which is mostly useful in case of build problems. Noteworthy changes in version 1.3.2 (2007-12-03) ------------------------------------------------ * The visibility attribute is now used if supported by the toolchain. * The ACE engine of VIA processors is now used for AES-128. * The ASN.1 DER template for SHA-224 has been fixed. Noteworthy changes in version 1.3.1 (2007-10-26) ------------------------------------------------ * The entire library is now under the LGPL. The helper programs and the manual are under the GPL. Kudos to Peter Gutmann for giving permissions to relicense the rndw32 and rndunix modules. * The Camellia cipher is now under the LGPL and included by default. * Fixed a bug in the detection of symbol prefixes which inhibited the build of optimzied assembler code on certain systems. * Updated the entropy gatherer for W32. Noteworthy changes in version 1.3.0 (2007-05-04) ------------------------------------------------ * Changed the way the RNG gets initialized. This allows to keep it uninitialized as long as no random numbers are used. To override this, the new macro gcry_fast_random_poll may be used. It is in general a good idea to spread this macro into the application code to make sure that these polls happen often enough. * Made the RNG immune against fork without exec. * Reading and writing the random seed file is now protected by a fcntl style file lock on systems that provide this function. * Support for SHA-224 and HMAC using SHA-384 and SHA-512. * Support for the SEED cipher. * Support for the Camellia cipher. Note that Camellia is disabled by default, and that enabling it changes the license of libgcrypt from LGPL to GPL. * Support for OFB encryption mode. * gcry_mpi_rshift does not anymore truncate the shift count. * Reserved algorithm ranges for use by applications. * Support for DSA2. * The new function gcry_md_debug should be used instead of the gcry_md_start_debug and gcry_md_stop_debug macros. * New configure option --enable-random-daemon to support a system wide random daemon. The daemon code is experimental and not yet very well working. It will eventually allow to keep a global random pool for the sake of short living processes. * Non executable stack support is now used by default on systems supporting it. * Support for Microsoft Windows. * Assembler support for the AMD64 architecture. * New configure option --enable-mpi-path for optimized builds. * Experimental support for ECDSA; should only be used for testing. * New control code GCRYCTL_PRINT_CONFIG to print the build configuration. * Minor changes to some function declarations. Buffer arguments are now typed as void pointer. This should not affect any compilation. Fixed two bugs in return values and clarified documentation. * Interface changes relative to the 1.2.0 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ gcry_fast_random_poll NEW gcry_md_debug NEW gcry_sexp_nth_string NEW GCRY_MD_SHA224 NEW GCRY_PK_USAGE_CERT NEW GCRY_PK_USAGE_AUTH NEW GCRY_PK_USAGE_UNKN NEW GCRY_PK_ECDSA NEW GCRY_CIPHER_SEED NEW GCRY_CIPHER_CAMELLIA128 NEW GCRY_CIPHER_CAMELLIA192 NEW GCRY_CIPHER_CAMELLIA256 NEW GCRYCTL_FAKED_RANDOM_P NEW GCRYCTL_PRINT_CONFIG NEW GCRYCTL_SET_RNDEGD_SOCKET NEW. gcry_mpi_scan CHANGED: Argument BUFFER is now void*. gcry_pk_algo_name CHANGED: Returns "?" instead of NULL. gcry_cipher_algo_name CHANGED: Returns "?" instead of "". gcry_pk_spec_t CHANGED: Element ALIASES is now const ptr. gcry_md_write_t CHANGED: Argument BUF is now a const void*. gcry_md_ctl CHANGED: Argument BUFFER is now void*. gcry_cipher_encrypt CHANGED: Arguments IN and OUT are now void*. gcry_cipher_decrypt CHANGED: Arguments IN and OUT are now void*. gcry_sexp_sprint CHANGED: Argument BUFFER is now void*. gcry_create_nonce CHANGED: Argument BUFFER is now void*. gcry_randomize CHANGED: Argument BUFFER is now void*. gcry_cipher_register CHANGED: Argument ALGORITHM_ID is now int*.
Add support for idea option. From Blair Sadewitz in private mail, with some cleanup.
PR 36233: Make libgcrypt build on NetBSD/hp700. From David H. Gutteridge. Also makes it build on HP-UX and Linux/hppa, tested by me.
Update to 1.2.4: Noteworthy changes in version 1.2.4 (2007-02-01) ------------------------------------------------ * Fixed a bug in the memory allocator which could have been the reason for some of non-duplicable bugs. * Other minor bug fixes.
Put macro argument in parentheses. From Naoto Morishima in PR 35519. Bump PKGREVISION.
DESTDIR support.
Update MASTER_SITES and/or HOMEPAGE, from Sergey Svishchev.
libgcrypt 1.2.3 may have fixed the name of the random device on NetBSD but it broke the name of the urandom device. Bump PKGREVISION
Update to 1.2.3: Noteworthy changes in version 1.2.3 (2006-08-28) ------------------------------------------------ * Rewrote gcry_mpi_rshift to allow arbitrary shift counts. * Minor bug fixes.
Also enable assembler files for NetBSD-*-sparc. Makes this package build on NetBSD/sparc.
List the info pages directly in the PLIST and ensure that we honor PKGINFODIR.
Point MAINTAINER to pkgsrc-users@NetBSD.org in the case where no developer is officially maintaining the package. The rationale for changing this from "tech-pkg" to "pkgsrc-users" is that it implies that any user can try to maintain the package (by submitting patches to the mailing list). Since the folks most likely to care about the package are the folks that want to use it or are already using it, this would leverage the energy of users who aren't developers.
Recursive revision bump / recommended bump for gettext ABI change.
Update to 1.2.2: Noteworthy changes in version 1.2.2 (2005-10-05} ------------------------------------------------ * Made the RNG immune against fork without exec. * Minor changes to some function declarations. Buffer arguments are now typed as void pointer. This should not affect any compilation. * A bug in the definition of gcry_cipher_register has been fixed. * Interface changes relative to the 1.2.1 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ gcry_cipher_encrypt CHANGED: Arguments IN and OUT are now void*. gcry_cipher_decrypt CHANGED: Arguments IN and OUT are now void*. gcry_create_nonce CHANGED: Argument BUFFER is now void*. gcry_md_ctl CHANGED: Argument BUFFER is now void*. gcry_sexp_sprint CHANGED: Argument BUFFER is now void*. gcry_mpi_scan CHANGED: Argument BUFFER is now void*. gcry_cipher_register CHANGED: Argument ALGORITHM_ID is now int*. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Remove USE_BUILDLINK3 and NO_BUILDLINK; these are no longer used.
Changes 1.2.1: * Portability fixes, memory allocation fixes and other minor things. * Support to build as a W32 static library. * Changed the way the RNG gets initialized. This allows to keep it uninitialized as long as no random numbers are used. To override this, the new macro gcry_fast_random_poll may be used. It is in general a good idea to spread this macro into the application code to make sure that these polls happen often enough.
Re: pkg/27317 The header gcrypt.h references struct timeval without including sys/time.h. Added the patch summitted with PR that adds an include for sys/time.h. Bumped PKGREVISION.
This package never uses the gettext library directly. The dependency on gettext-lib should be taken care of by libgpg-error.
Add dependency on gettext-lib to provide libintl for platforms that do not have it built in. May address PR#27292.
Libtool fix for PR pkg/26633, and other issues. Update libtool to 1.5.10 in the process. (More information on tech-pkg.) Bump PKGREVISION and BUILDLINK_DEPENDS of all packages using libtool and installing .la files. Bump PKGREVISION (only) of all packages depending directly on the above via a buildlink3 include.
When exec'ing child processes (netstat and vmstat), make sure the standard file descriptors (0, 1, 2) are open. This avoids multiple warnings issued under NetBSD about running set[ug]id programs with those descriptors closed. Fixes PR pkg/26079; although it talks about gaim, the problem is here, in libgcrypt. Bump PKGREVISION to 1.
Remove me as maintainer of this package.
Fix MASTER_SITES. From Robert Elz in PR pkg/25681.
Changes 1.2.0 * First stable release. Changes 1.1.94 * The support for multi-threaded users goes into its third incarnation. We removed compile time support for thread libraries. To support the thread library of your choice, you have to set up callback handlers at initialization time. New data structures, a new control command, and default initializers are provided for this purpose. * Interface changes relative to the 1.1.93 release: libgcrypt-config --thread OBSOLETE libgcrypt-pth.la REMOVED libgcrypt-pthread.la REMOVED GCRYCTL_SET_THREAD_CBS NEW struct gcrypt_thread_cbs NEW enum gcry_thread_option NEW GCRY_THREAD_OPTION_PTH_IMPL NEW GCRY_THREAD_OPTION_PTHREAD_IMPL NEW Changes 1.1.93 * The automatic thread library detection has finally been removed. From now on, only linking explicitely to libgcrypt, libgcrypt-pth or libgcrypt-pthread is supported.
Disable the pth-test, since it doesn't work correctly (bl3 problem?) on systems still needing pth.
Nuke the special libtool handling since the version of libgcrypt in pkgsrc does the right thing with assembler source files.
Update libgcrypt to 1.1.92. Changes since 1.1.90: - Included a limited implementation of RFC2268. - Changed API of the gcry_ac_ functions. - Code cleanups and minor bug fixes. - Interface changes: GCRY_CIPHER_RFC2268_40 NEW. gcry_ac_data_set CHANGED: New argument FLAGS. gcry_ac_data_get_name CHANGED: New argument FLAGS. gcry_ac_data_get_index CHANGED: New argument FLAGS. cry_ac_key_pair_generate CHANGED: New and reordered arguments. gcry_ac_key_test CHANGED: New argument HANDLE. gcry_ac_key_get_nbits CHANGED: New argument HANDLE. gcry_ac_key_get_grip CHANGED: New argument HANDLE. gcry_ac_data_search REMOVED. gcry_ac_data_add REMOVED. GCRY_AC_DATA_FLAG_NO_BLINDING REMOVED. GCRY_AC_FLAG_NO_BLINDING NEW: Replaces above.
LIBTOOL_OVERRIDE and SHLIBTOOL_OVERRIDE are now lists of shell globs relative to ${WRKSRC}. Remove redundant LIBTOOL_OVERRIDE settings that are automatically handled by the default setting in bsd.pkg.mk.
bl3ify and remove libiconv and gettext-lib buildlink files. This package really only needs gettext-lib through libgpg-error, and doesn't need libiconv at all unless it uses the pkgsrc gettext-lib. The gettext-lib buildlink3.mk file combined with the buildlink3 framework is considerably better at detecting this than the buildlink2.mk, which broke in a lot of instances.
this needs libintl, so explicitly include gettext-lib/buildlink2.mk.
This needs libiconv's buildlink, reported by David Griffith PR pkg/23811. Bump PKGREVISION.
Updated to 1.1.90, provided by Min Sik Kim PR pkg/23322. Changes: * The use of the GCRY_WEAK_RANDOM level is now deprecated in favor of the new gcry_create_nonce function. * gcry_sexp_build now supports a "%b" format to include a memory buffer. * Minor configuration fixes. * Interface changes relative to the 1.1.44 release: * Bug fixes and more code cleanups. * Enhanced the prime API. * Support for the Serpent cipher algorithm. And more...
Fix "libgcrypt-config --libs" to add -Wl,-R. Bump to 1.1.12nb1.
USE_NEW_TEXINFO is unnecessary now.
Convert to USE_NEW_TEXINFO. Fix PLIST for missing info files.
s/netbsd.org/NetBSD.org/
Updated to version 1.1.12. Based on a patch sent by Juan RP via PR pkg/21559. Changes: - DESCR has 80 columns - style nits 1.1.12: ======= - gcry_pk_sign, gcry_pk_verify and gcry_pk_encrypt can now handle an optional pkcs1 flags parameter in the S-expression. A similar flag may be passed to gcry_pk_decrypt but it is only syntactically implemented. - New convenience macro gcry_md_get_asnoid. - There is now some real stuff in the manual.
do not disable asm on alpha. fixes recently noted compile problems
Set "USE_LIBTOOL" even if we use the bundled "libtool" so that buildlink2 will do the right thing.
Import new "libgcrypt" package: GNU's cryptographic library This fixes PR pkg/19732 by Juan RP.
Initial revision