public inbox for cygwin-announce@cygwin.com
 help / color / mirror / Atom feed
From: "Cygwin libgcrypt Maintainer" <Brian.Inglis@SystematicSW.ab.ca>
To: "Cygwin Announcements" <cygwin-announce@cygwin.com>
Subject: Updated: libgcrypt20 libgcrypt-devel 1.10.1
Date: Sat, 02 Apr 2022 09:41:27 -0600	[thread overview]
Message-ID: <20220402094127.48708-1-Brian.Inglis@SystematicSW.ab.ca> (raw)

The following packages have been upgraded in the Cygwin distribution:

* libgcrypt20		1.10.1
* libgcrypt-devel	1.10.1

Libgcrypt is a general purpose cryptography library based on the
code used in GnuPG.

For more information please see the project home page:

	https://gnupg.org/software/libgcrypt/

As there are multiple changes each release please see below or read
/usr/share/doc/libgcrypt/NEWS after installation; for complete details
of changes please see the release info links below, or read
/usr/share/doc/libgcrypt/ChangeLog after installation.


Noteworthy changes in version 1.10.1 (2022-03-28)

* Bug fixes:
  - Fix minor memory leaks in FIPS mode.
  - Build fixes for MUSL libc.

* Other:
  - More portable integrity check in FIPS mode.
  - Add X9.62 OIDs to sha256 and sha512 modules.

Release-info: https://dev.gnupg.org/T5810

Noteworthy changes in version 1.10.0 (2022-02-01)

* New and extended interfaces:
  - New control codes to check for FIPS 140-3 approved algorithms.
  - New control code to switch into non-FIPS mode.
  - New cipher modes SIV and GCM-SIV as specified by RFC-5297.
  - Extended cipher mode AESWRAP with padding as specified by RFC-5649.
  - New set of KDF functions.
  - New KDF modes Argon2 and Balloon.
  - New functions for combining hashing and signing/verification.

* Performance:
  - Improved support for PowerPC architectures.
  - Improved ECC performance on zSeries/s390x by using accelerated
    scalar multiplication.
  - Many more assembler performance improvements for several architectures.

* Bug fixes:
  - Fix Elgamal encryption for other implementations.
  - Fix alignment problem on macOS.
  - Check the input length of the point in ECDH.
  - Fix an abort in gcry_pk_get_param for "Curve25519".

* Other features:
  - The control code GCRYCTL_SET_ENFORCED_FIPS_FLAG is ignored
    because it is useless with the FIPS 140-3 related changes.
  - Update of the jitter entropy RNG code.
  - Simplification of the entropy gatherer when using the getentropy
    system call.

* Interface changes relative to the 1.10.0 release:

  GCRYCTL_SET_DECRYPTION_TAG            NEW control code.
  GCRYCTL_FIPS_SERVICE_INDICATOR_CIPHER NEW control code.
  GCRYCTL_FIPS_SERVICE_INDICATOR_KDF    NEW control code.
  GCRYCTL_NO_FIPS_MODE = 83             NEW control code.
  GCRY_CIPHER_MODE_SIV                  NEW mode.
  GCRY_CIPHER_MODE_GCM_SIV              NEW mode.
  GCRY_CIPHER_EXTENDED                  NEW flag.
  GCRY_SIV_BLOCK_LEN                    NEW macro.
  gcry_cipher_set_decryption_tag        NEW macro.
  GCRY_KDF_ARGON2                       NEW constant.
  GCRY_KDF_BALLOON                      NEW constant.
  GCRY_KDF_ARGON2D                      NEW constant.
  GCRY_KDF_ARGON2I                      NEW constant.
  GCRY_KDF_ARGON2ID                     NEW constant.
  gcry_kdf_hd_t                         NEW type.
  gcry_kdf_job_fn_t                     NEW type.
  gcry_kdf_dispatch_job_fn_t            NEW type.
  gcry_kdf_wait_all_jobs_fn_t           NEW type.
  struct gcry_kdf_thread_ops            NEW struct.
  gcry_kdf_open                         NEW function.
  gcry_kdf_compute                      NEW function.
  gcry_kdf_final                        NEW function.
  gcry_kdf_close                        NEW function.
  gcry_pk_hash_sign                     NEW function.
  gcry_pk_hash_verify                   NEW function.
  gcry_pk_random_override_new           NEW function.

Release-info: https://dev.gnupg.org/T5691


Noteworthy changes in version 1.9.3 (2021-04-19)

* Bug fixes:
  - Fix build problems on i386 using gcc-4.7.
  - Fix checksum calculation in OCB decryption for AES on s390.
  - Fix a regression in gcry_mpi_ec_add related to certain usages of
    curve 25519.
  - Fix a symbol not found problem on Apple M1.
  - Fix for Apple iOS getentropy peculiarity.
  - Make keygrip computation work for compressed points.

* Performance:
  - Add x86_64 VAES/AVX2 accelerated implementation of Camellia.
  - Add x86_64 VAES/AVX2 accelerated implementation of AES.
  - Add VPMSUMD acceleration for GCM mode on PPC.

* Internal changes.
  - Harden MPI conditional code against EM leakage.
  - Harden Elgamal by introducing exponent blinding.
  - Fix memory leaks in the error code paths of EdDSA.

Release-info: https://dev.gnupg.org/T5305


Noteworthy changes in version 1.9.2 (2021-02-17)

* Bug fixes:
  - Fix build problem for macOS in the random code.
  - Fix building with --disable-asm on x86.
  - Check public key for ECDSA verify operation.
  - Make sure gcry_get_config (NULL) returns a nul-terminated string.
  - Fix a memory leak in the ECDH code.
  - Fix a reading beyond end of input buffer in SHA2-avx2.

* Other features:
  - New test driver to allow for standalone regression
    tests.

Release-info: https://dev.gnupg.org/T5276


Noteworthy changes in version 1.9.1 (2021-01-29)

* Bug fixes:
  - Fix exploitable bug in hash functions introduced with 1.9.0.
  - Return an error if a negative MPI is used with sexp scan functions.
  - Check for operational FIPS in the random and KDF functions.
  - Fix compile error on ARMv7 with NEON disabled.
  - Fix self-test in KDF module.
  - Improve assembler checks for better LTO support.
  - Fix assember problem on macOS running on M1.
  - Support older macOS without posix_spawn.
  - Fix 32-bit cross build on x86.
  - Fix non-NEON ARM assembly implementation for SHA512.
  - Fix build problems with the cipher_bulk_ops_t typedef.
  - Fix Ed25519 private key handling for preceding ZEROs.
  - Fix overflow in modular inverse implementation.
  - Fix register access for AVX/AVX2 implementations of Blake2.

* Performance:
  - Add optimized cipher and hash functions for s390x/zSeries.
  - Use hardware bit counting functions when available.

* Internal changes:
  - The macOS getentropy syscall is used when available.
  - Update DSA functions to match FIPS 186-3.
  - New self-tests for CMACs and KDFs.
  - Add bulk cipher functions for OFB and GCM modes.

Release-info: https://dev.gnupg.org/T5259


Noteworthy changes in version 1.9.0 (2021-01-19)

* New and extended interfaces:
  - New curves Ed448, X448, and SM2.
  - New cipher mode EAX.
  - New cipher algo SM4.
  - New hash algo SM3.
  - New hash algo variants SHA512/224 and SHA512/256.
  - New MAC algos for Blake-2 algorithms, the new SHA512 variants,
    SM3, SM4 and for a GOST variant.
  - New convenience function gcry_mpi_get_ui.
  - gcry_sexp_extract_param understands new format specifiers to
    directly store to integers and strings.
  - New function gcry_ecc_mul_point and curve constants for Curve448
    and Curve25519.
  - New function gcry_ecc_get_algo_keylen.
  - New control code GCRYCTL_AUTO_EXPAND_SECMEM to allow growing the
    secure memory area.  Also in 1.8.2 as an undocumented feature.

* Performance:
  - Optimized implementations for Aarch64.
  - Faster implementations for Poly1305 and ChaCha.  Also for
    PowerPC.
  - Optimized implementations of AES and SHA-256 on PowerPC.

  - Improved use of AES-NI to speed up AES-XTS (6 times faster).

  - Improved use of AES-NI for OCB.
  - Speedup AES-XTS on ARMv8/CE (2.5 times faster).
  - New AVX and AVX2 implementations for Blake-2 (1.3/1.4 times
    faster).
  - Use Intel SHA extension for SHA-1 and SHA-256 (4.0/3.7 times
    faster).
  - Use ARMv7/NEON accelerated GCM implementation (3 times faster).

  - Use of i386/SSSE3 for SHA-512 (4.5 times faster on Ryzen 7).

  - Use 64 bit ARMv8/CE PMULL for CRC (7 times faster).
  - Improve CAST5 (40% to 70% faster).
  - Improve Blowfish (60% to 80% faster).

* Bug fixes:
  - Fix infinite loop due to applications using fork the wrong way.
  - Fix possible leak of a few bits of secret primes to pageable memory.
  - Fix possible hang in the RNG (1.8.3 only).
  - Several minor fixes.
  - On Linux always make use of getrandom if possible and then use
    its /dev/urandom behaviour.
  - Use blinding for ECDSA signing to mitigate a novel side-channel attack.
  - Fix incorrect counter overflow handling for GCM when using an IV
    size other than 96 bit.
  - Fix incorrect output of AES-keywrap mode for in-place encryption
    on some platforms.
  - Fix the gcry_mpi_ec_curve_point point validation function.
  - Fix rare assertion failure in gcry_prime_check.
  - Do not use /dev/srandom on OpenBSD.
  - Fix test suite failure on systems with large pages.
  - Fix test suite to not use mmap on Windows.
  - Fix fatal out of secure memory status in the s-expression parser
    on heavy loaded systems.
  - Fix build problems on OpenIndiana et al.
  - Fix GCM bug on arm64 which troubles for example OMEMO.
  - Detect a div-by-zero in a debug helper tool.
  - Use a constant time mpi_inv and related changes.
  - Fix mpi_copy to correctly handle flags of opaque MPIs.
  - Fix mpi_cmp to consider +0 and -0 the same.
  - Fix extra entropy collection via clock_gettime. Note that this
    fallback code path is not used on any decent hardware.
  - Support opaque MPI with gcry_mpi_print.
  - Allow for a Unicode random seed file on Windows.

* Other features:
  - Add OIDs from RFC-8410 as aliases for Ed25519 and Curve25519.
  - Add mitigation against ECC timing attack CVE-2019-13627.
  - Internal cleanup of the ECC implementation.
  - Support reading EC point in compressed format for some curves.

* Interface changes relative to the 1.8.0 release:

  gcry_mpi_get_ui                 NEW function.
  GCRYCTL_AUTO_EXPAND_SECMEM      NEW control code.
  gcry_sexp_extract_param         EXTENDED.
  GCRY_CIPHER_GOST28147_MESH      NEW cipher algo.
  GCRY_CIPHER_SM4                 NEW cipher algo.
  GCRY_CIPHER_MODE_EAX            NEW mode.
  GCRY_ECC_CURVE25519             NEW curve id.
  GCRY_ECC_CURVE448               NEW curve id.
  gcry_ecc_get_algo_keylen        NEW function.
  gcry_ecc_mul_point              NEW function.
  GCRY_MD_SM3                     NEW hash algo.
  GCRY_MD_SHA512_256              NEW hash algo.
  GCRY_MD_SHA512_224              NEW hash algo.
  GCRY_MAC_GOST28147_IMIT         NEW mac algo.
  GCRY_MAC_HMAC_GOSTR3411_CP      NEW mac algo.
  GCRY_MAC_HMAC_BLAKE2B_512       NEW mac algo.
  GCRY_MAC_HMAC_BLAKE2B_384       NEW mac algo.
  GCRY_MAC_HMAC_BLAKE2B_256       NEW mac algo.
  GCRY_MAC_HMAC_BLAKE2B_160       NEW mac algo.
  GCRY_MAC_HMAC_BLAKE2S_256       NEW mac algo.
  GCRY_MAC_HMAC_BLAKE2S_224       NEW mac algo.
  GCRY_MAC_HMAC_BLAKE2S_160       NEW mac algo.
  GCRY_MAC_HMAC_BLAKE2S_128       NEW mac algo.
  GCRY_MAC_HMAC_SM3               NEW mac algo.
  GCRY_MAC_HMAC_SHA512_256        NEW mac algo.
  GCRY_MAC_HMAC_SHA512_224        NEW mac algo.
  GCRY_MAC_CMAC_SM4               NEW mac algo.


                 reply	other threads:[~2022-04-02 15:43 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20220402094127.48708-1-Brian.Inglis@SystematicSW.ab.ca \
    --to=brian.inglis@systematicsw.ab.ca \
    --cc=cygwin-announce@cygwin.com \
    --cc=cygwin@cygwin.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).