Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

libnettle8-3.8.1-150500.2.25 RPM for ppc64le

From OpenSuSE Leap 15.5 for ppc64le

Name: libnettle8 Distribution: SUSE Linux Enterprise 15
Version: 3.8.1 Vendor: SUSE LLC <https://www.suse.com/>
Release: 150500.2.25 Build date: Wed May 17 15:33:21 2023
Group: System/Libraries Build host: ibs-power9-12
Size: 456354 Source RPM: libnettle-3.8.1-150500.2.25.src.rpm
Packager: https://www.suse.com/
Url: https://www.lysator.liu.se/~nisse/nettle/
Summary: Cryptographic Library
Nettle is a cryptographic library that is designed to fit easily in more or
less any context: In crypto toolkits for object-oriented languages (C++,
Python, Pike, ...), in applications like LSH or GNUPG, or even in kernel space.

Provides

Requires

License

LGPL-2.1-or-later

Changelog

* Fri Oct 21 2022 pmonreal@suse.com
  - POWER10 performance enhancements for cryptography [jsc#PED-546]
    * Backport the P0 performance enhancements.
    * Add patches:
    - libnettle-PowerPC-Implement-Poly1305-single-block-update-based.patch
    - libnettle-PowerPC-Use-defined-structure-constants-of-P1305-in.patch
    - libnettle-Workaround-for-qemu-bug-affecting-the-ppc-intruction.patch
* Thu Jul 28 2022 dmueller@suse.com
  - update to 3.8.1:
    * Avoid non-posix m4 argument references in the chacha
      implementation for arm64, powerpc64 and s390x. Reported by
      Christian Weisgerber, fix contributed by Mamone Tarsha.
    * Use explicit .machine pseudo-ops where needed in s390x
      assembly files. Bug report by Andreas K. Huettel, fix
      contributed by Mamone Tarsha.
* Mon Jul 11 2022 dmueller@suse.com
  - update to 3.8:
    This release includes a couple of new features, and many
    performance improvements. It adds assembly code for two more
    architectures: ARM64 and S390x.
    The new version is intended to be fully source and binary
    compatible with Nettle-3.6. The shared library names are
    libnettle.so.8.5 and libhogweed.so.6.5, with sonames
    libnettle.so.8 and libhogweed.so.6.
    New features:
    * AES keywrap (RFC 3394), contributed by Nicolas Mora.
    * SM3 hash function, contributed by Tianjia Zhang.
    * New functions cbc_aes128_encrypt, cbc_aes192_encrypt,
      cbc_aes256_encrypt.
      On processors where AES is fast enough, e.g., x86_64 with
      aesni instructions, the overhead of using Nettle's general
      cbc_encrypt can be significant. The new functions can be
      implemented in assembly, to do multiple blocks with reduced
      per-block overhead.
      Note that there's no corresponding new decrypt functions,
      since the general cbc_decrypt doesn't suffer from the same
      performance problem.
    Bug fixes:
    * Fix fat builds for x86_64 windows, these appear to never
      have worked.
    Optimizations:
    * New ARM64 implementation of AES, GCM, Chacha, SHA1 and
      SHA256, for processors supporting crypto extensions. Great
      speedups, and fat builds are supported. Contributed by
      Mamone Tarsha.
    * New s390x implementation of AES, GCM, Chacha, memxor, SHA1,
      SHA256, SHA512 and SHA3. Great speedups, and fat builds are
      supported. Contributed by Mamone Tarsha.
    * New PPC64 assembly for ecc modulo/redc operations,
      contributed by Amitay Isaacs, Martin Schwenke and Alastair
      DĀ“Silva.
    * The x86_64 AES implementation using aesni instructions has
      been reorganized with one separate function per key size,
      each interleaving the processing of two blocks at a time
      (when the caller processes multiple blocks with each call).
      This gives a modest performance improvement on some
      processors.
    * Rewritten and faster x86_64 poly1305 assembly.
  - drop libnettle-s390x-CPACF-SHA-AES-support.patch (included in 3.8)
* Wed Jun 15 2022 gmbr3@opensuse.org
  - Make shared libraries executable
* Mon Aug 30 2021 pmonreal@suse.com
  - Provide s390x CPACF/SHA/AES Support for Crypto Libraries
    * Add libnettle-s390x-CPACF-SHA-AES-support.patch [jsc#SLE-20733]
* Wed Jul 21 2021 pmonreal@suse.com
  - Update to 3.7.3 in SLE-15-SP4: [SLE-19765, jsc#SLE-18132]
    - Add libnettle-rpmlintrc
    - Remove patches upstream:
    * libnettle-CVE-2021-20305.patch
    * libnettle-CVE-2021-3580-rsa_decrypt.patch
    * libnettle-CVE-2021-3580-rsa_sec.patch
    * nettle-respect-cflags.patch
* Thu Jun 10 2021 pmonreal@suse.com
  - Security fix: [CVE-2021-3580, bsc#1187060]
    * Remote crash in RSA decryption via manipulated ciphertext
  - Add patches:
    * libnettle-CVE-2021-3580-rsa_sec.patch
    * libnettle-CVE-2021-3580-rsa_decrypt.patch
* Wed Jun 09 2021 info@paolostivanin.com
  - GNU Nettle 3.7.3: [CVE-2021-3580, bsc#1187060]
    * Fix crash for zero input to rsa_sec_decrypt and
      rsa_decrypt_tr. Potential denial of service vector.
    * Ensure that all of rsa_decrypt_tr and rsa_sec_decrypt return
      failure for out of range inputs, instead of either crashing,
      or silently reducing input modulo n. Potential denial of
      service vector.
    * Ensure that rsa_decrypt returns failure for out of range
      inputs, instead of silently reducing input modulo n.
    * Ensure that rsa_sec_decrypt returns failure if the message
      size is too large for the given key. Unlike the other bugs,
      this would typically be triggered by invalid local
      configuration, rather than by processing untrusted remote
      data.
* Mon Apr 19 2021 pmonreal@suse.com
  - Security fix: [bsc#1184401, CVE-2021-20305]
    * multiply function being called with out-of-range scalars
    * Affects ecc-ecdsa-sign(), ecc_ecdsa_verify() and _eddsa_hash().
  - Add libnettle-CVE-2021-20305.patch
* Sun Mar 21 2021 andreas.stieger@gmx.de
  - GNU Nettle 3.7.2:
    * fix a bug in ECDSA signature verification that could lead to a
      denial of service attack (via an assertion failure) or possibly
      incorrect results (CVE-2021-20305, boo#1184401)
    * fix a few related problems where scalars are required to be
      canonically reduced modulo the ECC group order, but in fact may
      be slightly larger
* Thu Feb 18 2021 andreas.stieger@gmx.de
  - GNU Nettle 3.7.1:
    * Fix bug in chacha counter update logic (ppc64 and ppc64el)
    * Restore support for big-endian ARM platforms
    * Fix corner case bug in ECDSA verify, it would produce incorrect
      result in the unlikely case of an all-zero message hash
    * Support for pbkdf2_hmac_sha384 and pbkdf2_hmac_sha512
    * Remove poorly performing ARM Neon code for doing single-block
      Salsa20 and Chacha
* Mon Jan 04 2021 andreas.stieger@gmx.de
  - GNU Nettle 3.7:
    * add bcrypt password hashing
    * add optimizations: PowerPC64 assembly
  - remove deprecated texinfo packaing macros
* Sun May 10 2020 andreas.stieger@gmx.de
  - GNU Nettle 3.6:
    * removal of internal and undocumented poly1305 functions
    * Support for Curve448 and ED448 signatures
    * Support for SHAKE256, SIV-CMAC, CMAC64, "CryptoPro" variant of
      the GOST hash (as gosthash94cp), GOST DSA signatures, including
      GOST curves gc256b and gc512a
    * Support for Intel CET in x86 and x86_64 assembly files, if
      enabled via CFLAGS (gcc --fcf-protection=full)
    * A few new functions to improve support for the Chacha
      variant with 96-bit nonce and 32-bit block counter (the
      existing functions use nonce and counter of 64-bit each),
      and functions to set the counter.
    * New interface, struct nettle_mac, for MAC (message
      authentication code) algorithms. This abstraction is only
      for MACs that don't require a per-message nonce. For HMAC,
      the key size is fixed, and equal the digest size of the
      underlying hash function
    * multiple bug fixes
  - drop nettle-respect-cflags.patch
  - silence packaging warning raised by HMAC files
    (bsc#1152692, jsc#SLE-9518)
* Tue Oct 01 2019 vcizek@suse.com
  - Install checksums for binary integrity verification which are
    required when running in FIPS mode (bsc#1152692, jsc#SLE-9518)
* Thu Aug 01 2019 andreas.stieger@gmx.de
  - update to 3.5.1:
    * correct upstream source packaging problems
  - new in 3.5:
    * gcm_crypt will now call the underlying block cipher to process
      more than one block at a time
    * Support for CFB8 (Cipher Feedback Mode, processing a single
      octet per block cipher operation)
    * Support for CMAC (RFC 4493)
    * Support for XTS mode
    * various improvements
* Sun Mar 17 2019 jsikes@suse.de
  - Update to 3.4.1 - FATE#327114 (bsc#1129598)
    * Fix CVE-2018-16869 (bsc#1118086)
      libnettle-CVE-2018-16869-3.4.patch (removed)
      All functions using RSA private keys are now side-channel
      silent, meaning that they try hard to avoid any branches or
      memory accesses depending on secret data. This applies both to
      the bignum calculations, which now use GMP's mpn_sec_* family
      of functions, and the processing of PKCS#1 padding needed for
      RSA decryption.
    * Changes in behavior:
      The functions rsa_decrypt and rsa_decrypt_tr may now clobber
      all of the provided message buffer, independent of the
      actual message length. They are side-channel silent, in that
      branches and memory accesses don't depend on the validity or
      length of the message. Side-channel leakage from the
      caller's use of length and return value may still provide an
      oracle useable for a Bleichenbacher-style chosen ciphertext
      attack. Which is why the new function rsa_sec_decrypt is
      recommended.
    * New features:
      A new function rsa_sec_decrypt.
    * Bug fixes:
    - Fix bug in pkcs1-conv, missing break statements in the
      parsing of PEM input files.
    - Fix link error on the pss-mgf1-test test, affecting builds
      without public key support.
* Fri Dec 14 2018 pmonrealgonzalez@suse.com
  - Security fix: [bsc#1118086, CVE-2018-16869]
    * Leaky data conversion exposing a manager oracle
    * Added libnettle-CVE-2018-16869-3.4.patch
* Thu Dec 06 2018 jengelh@inai.de
  - Adjust SRPM group.
* Tue Dec 04 2018 pmonrealgonzalez@suse.com
  - libnettle 3.4.1rc1: [bsc#1118086, CVE-2018-16869]
    * pkcs1-decrypt.c (pkcs1_decrypt): Rewrite as a wrapper around
      _pkcs1_sec_decrypt_variable. Improves side-channel silence of the
      only caller, rsa_decrypt.
    * rsa-sec-compute-root.c (sec_mul, sec_mod_mul, sec_powm): New
      local helper functions, with their own itch functions.
      (_rsa_sec_compute_root_itch, _rsa_sec_compute_root): Rewrote to
      use helpers, for clarity.
    * rsa-decrypt-tr.c (rsa_decrypt_tr): Use NETTLE_OCTET_SIZE_TO_LIMB_SIZE.
    * rsa-sec-compute-root.c (_rsa_sec_compute_root): Avoid calls to
      mpz_sizeinbase, since that potentially leaks most significant bits
      of private key parameters a and b.
    * rsa-sign.c (rsa_compute_root) [!NETTLE_USE_MINI_GMP]: Use
      _rsa_sec_compute_root.
    * testsuite/rsa-sec-compute-root-test.c: Add more tests for new
      side-channel silent functions.
    * rsa-sign.c (rsa_private_key_prepare): Check that qn + cn >= pn,
      since that is required for one of the GMP calls in
      _rsa_sec_compute_root.
    * rsa-decrypt-tr.c: Switch to use side-channel silent functions.
    * pkcs1-sec-decrypt.c (_pkcs1_sec_decrypt_variable): New private
      function. Variable size version for backwards compatibility.
    * testsuite/rsa-sec-decrypt-test.c: Adds more tests.
    * rsa-sec-decrypt.c (rsa_sec_decrypt): New function.
      Fixed length side-channel silent version of rsa-decrypt.
    * testsuite/rsa-encrypt-test.c: add tests for the new fucntion.
    * testsuite/pkcs1-sec-decrypt-test.c: Adds tests for _pkcs1_sec_decrypt.
    * gmp-glue.c (mpn_get_base256): New function.
    * pkcs1-sec-decrypt.c (_pkcs1_sec_decrypt): New private function.
      Fixed length side-channel silent version of pkcs1-decrypt.
    * cnd-memcpy.c (cnd_memcpy): New function.
    * testsuite/cnd-memcpy-test.c: New test case.
    * rsa-sign-tr.c (rsa_sec_compute_root_tr): New function that uses
      _rsa_sec_compute_root, as well as side-channel silent RSA blinding.
      (rsa_compute_root_tr) Rewritten as a wrapper around rsa_sec_compute_root_tr.
      (rsa_sec_blind, rsa_sec_unblind, sec_equal, rsa_sec_check_root)
      (cnd_mpn_zero): New helper functions.
      (rsa_sec_compute_root_tr) [NETTLE_USE_MINI_GMP]: Defined as a not
      side-channel silent wrapper around rsa_compute_root_tr, and the
      latter function left unchanged.
    * rsa-sec-compute-root.c (_rsa_sec_compute_root_itch)
      (_rsa_sec_compute_root): New file, new private functions.
      Side-channel silent version of rsa_compute_root.
    * rsa-internal.h: New header file with declarations.
    * gmp-glue.h (NETTLE_OCTET_SIZE_TO_LIMB_SIZE): New macro.
    * tools/pkcs1-conv.c (convert_file): Add missing break statements.
    * nettle-internal.c (des_set_key_wrapper, des3_set_key_wrapper)
      (blowfish128_set_key_wrapper): Wrapper functions, to avoid cast
      between incompatible function types (which gcc-8 warns about).
      Wrappers are expected to compile to a single jmp instruction.
    * des-compat.c (des_compat_des3_decrypt): Change length argument type to size_t.
* Thu Feb 22 2018 fvogt@suse.com
  - Use %license (boo#1082318)
* Sun Nov 19 2017 astieger@suse.com
  - libnettle 3.4:
    * Fixed an improper use of GMP mpn_mul, breaking curve2559 and
      eddsa on certain platforms
    * Fixed memory leak when handling invalid signatures in
      ecdsa_verify. Fix contributed by Nikos Mavrogiannopoulos.
    * Reorganized the way certain data items are made available:
      Nettle header files now define the symbols
      nettle_hashes, nettle_ciphers, and nettle_aeads, as
      preprocessor macros invoking a corresponding accessor
      function. For backwards ABI compatibility, the symbols are
      still present in the compiled libraries, and with the same
      sizes as in nettle-3.3.
    * Support for RSA-PSS signatures
    * Support for the HKDF key derivation function, defined by RFC
      5869
    * Support for the Cipher Feedback Mode (CFB)
    * New accessor functions: nettle_get_hashes,
      nettle_get_ciphers, nettle_get_aeads, nettle_get_secp_192r1,
      nettle_get_secp_224r1, nettle_get_secp_256r1,
      nettle_get_secp_384r1, nettle_get_secp_521r1.
      Direct access to data items is deprecated going forward.
    * The base16 and base64 functions now use the type char * for
      ascii data, rather than uint8_t *. This eliminates the last
      pointer-signedness warnings when building Nettle
    * The contents of the header file nettle/version.h is now
      architecture independent, except in --enable-mini-gmp
    * Prevent data sizes from leaking into the ABI
  - Fixes previously carried as patches:
    * Fix compilation error with --enable-fat om ARM
      Drop nettle-3.3-fix-fat-arm.patch
* Mon Sep 04 2017 asn@cryptomilk.org
  - Add patch to fix build of fat-arm:
    * nettle-3.3-fix-fat-arm.patch
* Sun Sep 03 2017 asn@cryptomilk.org
  - Build nettle with AES-NI support (bsc#1056980)
* Thu Feb 09 2017 dimstar@opensuse.org
  - Explicitly BuildRequire m4
* Fri Oct 28 2016 astieger@suse.com
  - libnettle 3.3:
    * Invalid private RSA keys, with an even modulo, are now
      rejected by rsa_private_key_prepare. (Earlier versions
      allowed such keys, even if results of using them were bogus).
      Nettle applications are required to call
      rsa_private_key_prepare and check the return value, before
      using any other RSA private key functions; failing to do so
      may result in crashes for invalid private keys.
    * Ignore bit 255 of the x coordinate of the input point to
      curve25519_mul, as required by RFC 7748. To differentiate at
      compile time, curve25519.h defines the constant
      NETTLE_CURVE25519_RFC7748.
    * RSA and DSA now use side-channel silent modular
      exponentiation, to defend against attacks on the private key
      from evil processes sharing the same processor cache. This
      attack scenario is of particular relevance when running an
      HTTPS server on a virtual machine, where you don't know who
      you share the cache hardware with.
      bsc#991464 CVE-2016-6489
    * Fix sexp-conv crashes on invalid input
    * Fix out-of-bounds read in des_weak_p
    * Fix a couple of formally undefined shift operations
    * Fix compilation with c89
    * New function memeql_sec, for side-channel silent comparison
      of two memory areas.
    * Building the public key support of nettle now requires GMP
      version 5.0 or later (unless --enable-mini-gmp is used).
* Tue Feb 23 2016 tchvatal@suse.com
  - Fix postun->preun on info packages regenerating
* Thu Jan 28 2016 tchvatal@suse.com
  - Version update to 3.2 release bnc#964849 CVE-2015-8805 bnc#964847
    CVE-2015-8804 bnc#964845 CVE-2015-8803:
    * New functions for RSA private key operations, identified by
      the "_tr" suffix, with better resistance to side channel
      attacks and to hardware or software failures which could
      break the CRT optimization
    * SHA3 implementation is updated according to the FIPS 202 standard
    * New ARM Neon implementation of the chacha stream cipher
    * Should be compatible binary with 3.1 series
  - Add patch to fix build with cflags:
    * nettle-respect-cflags.patch
* Mon Jun 22 2015 tchvatal@suse.com
  - Remove off-by-one-test-suite.patch as it was fixed by upstream
    differently
* Sun Apr 26 2015 astieger@suse.com
  - nettle 3.1.1
    Non-critical bugfix release, binary compatible to 3.1
    * By accident, nettle-3.1 disabled the assembly code for the
      secp_224r1 and secp_521r1 elliptic curves on all x86_64
      configurations, making signature operations on those curves
      10%-30% slower. This code is now re-enabled.
    * The x86_64 assembly implementation of gcm hashing has been
      fixed to work with the Sun/Oracle assembler.
* Thu Apr 23 2015 vpereira@suse.com
  added patch: off-by-one-test-suite.patch
  - Address Sanitizer, found a off-by-one error in the test suite (bnc#928328)
* Sat Apr 11 2015 astieger@suse.com
  - nettle 3.1 (libnettle6, libhogweed4)
  - bug fixes in 3.1:
    * Fixed a missing include of <limits.h>, which made the camellia
      implementation fail on all 64-bit non-x86 platforms.
    * Eliminate out-of-bounds reads in the C implementation of memxor
    (related to valgrind's --partial-loads-ok flag). [bso#926745)
  - interface changes in 3.1:
    * Declarations of many internal functions are moved from ecc.h to
      ecc-internal.h.
  - interface changes in 3.0:
    * contains developer relevant incompatible interface changes
  - Removed features:
    * nettle_next_prime, use GMP's mpz_nextprime
    * Deleted the RSAREF compatibility
  - New features in 3.1:
    * Support for curve25519 and for EdDSA25519 signatures.
    * Support for "fat builds" on x86_64 and arm (not enabled)
    * Support for building the hogweed library (public key support)
      using "mini-gmp" (not enabled)
    * The shared libraries are now built with versioned symbols.
    * Support for "URL-safe" base64 encoding and decoding
  - New features in 3.0:
    * new DSA, AES, Camellia interfaces
    * Support for Poly1305-AES MAC.
    * Support for the ChaCha stream cipher and EXPERIMENTAL
      support for the ChaCha-Poly1305 AEAD mode.
    * Support for EAX mode.
    * Support for CCM mode.
    * Additional variants of SHA512 with output size of 224 and 256 bits
    * New interface, struct nettle_aead, for mechanisms providing
      authenticated encryption with associated data (AEAD).
    * DSA: Support a wider range for the size of q and a wider
      range for the digest size.
    * New command line tool nettle-pbkdf2.
  - Optimizations in 3.1:
    * New x86_64 implementation of AES, using the "aesni" instructions
  - Optimizations in 3.0:
    * New x86_64 assembly for GCM and MD5. Modest speedups on the
      order of 10%-20%.
* Fri Mar 13 2015 tchvatal@suse.com
  - Add url to the spec
* Thu Mar 05 2015 mpluskal@suse.com
  - Revert back to 2.7

Files

/usr/lib64/.libnettle.so.8.hmac
/usr/lib64/libnettle.so.8
/usr/lib64/libnettle.so.8.6
/usr/share/licenses/libnettle8
/usr/share/licenses/libnettle8/COPYING.LESSERv3
/usr/share/licenses/libnettle8/COPYINGv2
/usr/share/licenses/libnettle8/COPYINGv3


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Jul 9 17:57:49 2024