Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package liboqs for openSUSE:Factory checked in at 2025-04-18 16:15:14 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/liboqs (Old) and /work/SRC/openSUSE:Factory/.liboqs.new.30101 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "liboqs" Fri Apr 18 16:15:14 2025 rev:16 rq:1270599 version:0.13.0 Changes: -------- --- /work/SRC/openSUSE:Factory/liboqs/liboqs.changes 2024-12-13 22:32:38.831832561 +0100 +++ /work/SRC/openSUSE:Factory/.liboqs.new.30101/liboqs.changes 2025-04-20 20:02:00.650031385 +0200 @@ -1,0 +2,18 @@ +Thu Apr 17 16:03:16 UTC 2025 - Marcus Meissner <[email protected]> + +- Updated to 0.13.0: + - Key encapsulation mechanisms + - New API: Added a deterministic key generation and API for KEMs (only ML-KEM supported at the moment). + - ML-KEM: Changed the default ML-KEM implementation to [PQCP's mlkem-native](https://github.com/pq-code-package/mlkem-native). There are three variants: Portable C, AVX2, and AArch64. Large +parts of these implementations are formally verified: all of the C code is verified for memory and type safety using [CBMC](https://github.com/diffblue/cbmc) and the functional correctness +of the core AArch64 assembly routines is verified using [HOL-Light](https://github.com/jrh13/hol-light). + - ML-KEM: Added support for the ML-KEM implementation from [Nvidia cuPQC](https://developer.nvidia.com/cupqc), a GPU accelerated cryptography library. + - ML-KEM: Implementation from mlkem-native upstream updated to add Pair-wise Consistency Test (PCT) and Intel CET support. + - ML-KEM: Improved testing of ML-KEM keys. + - HQC: Disabled HQC by default until [a new security flaw](https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/Wiu4ZQo3fP8) is fixed. + + - Digital signature schemes + - ML-DSA: Improved testing for ML-DSA. + - CROSS: Updated to NIST Additional Signatures Round 2 version. + - MAYO: Updated to NIST Additional Signatures Round 2 version. + - UOV: Added support for UOV algorithm from NIST Additional Signatures Round 2. + +------------------------------------------------------------------- Old: ---- 0.12.0.tar.gz New: ---- 0.13.0.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ liboqs.spec ++++++ --- /var/tmp/diff_new_pack.Hi8pn5/_old 2025-04-20 20:02:02.102092010 +0200 +++ /var/tmp/diff_new_pack.Hi8pn5/_new 2025-04-20 20:02:02.110092345 +0200 @@ -1,7 +1,7 @@ # # spec file for package liboqs # -# Copyright (c) 2024 SUSE LLC +# Copyright (c) 2025 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -17,7 +17,7 @@ Name: liboqs -Version: 0.12.0 +Version: 0.13.0 Release: 0 Summary: C library for quantum-resistant cryptographic algorithms License: MIT ++++++ 0.12.0.tar.gz -> 0.13.0.tar.gz ++++++ /work/SRC/openSUSE:Factory/liboqs/0.12.0.tar.gz /work/SRC/openSUSE:Factory/.liboqs.new.30101/0.13.0.tar.gz differ: char 17, line 1 ++++++ liboqs-fix-prototypemismatch.patch ++++++ --- /var/tmp/diff_new_pack.Hi8pn5/_old 2025-04-20 20:02:02.418105204 +0200 +++ /var/tmp/diff_new_pack.Hi8pn5/_new 2025-04-20 20:02:02.454106708 +0200 @@ -1,15 +1,17 @@ -Index: liboqs-0.8.0/src/kem/frodokem/kem_frodokem.h +Index: liboqs-0.13.0/src/kem/frodokem/kem_frodokem.h =================================================================== ---- liboqs-0.8.0.orig/src/kem/frodokem/kem_frodokem.h -+++ liboqs-0.8.0/src/kem/frodokem/kem_frodokem.h -@@ -11,9 +11,9 @@ - #define OQS_KEM_frodokem_640_aes_length_ciphertext 9720 +--- liboqs-0.13.0.orig/src/kem/frodokem/kem_frodokem.h ++++ liboqs-0.13.0/src/kem/frodokem/kem_frodokem.h +@@ -12,10 +12,10 @@ #define OQS_KEM_frodokem_640_aes_length_shared_secret 16 + #define OQS_KEM_frodokem_640_aes_length_keypair_seed 0 OQS_KEM *OQS_KEM_frodokem_640_aes_new(void); -OQS_API OQS_STATUS OQS_KEM_frodokem_640_aes_keypair(uint8_t *public_key, uint8_t *secret_key); +-OQS_API OQS_STATUS OQS_KEM_frodokem_640_aes_keypair_derand(uint8_t *public_key, uint8_t *secret_key, const uint8_t *seed); -OQS_API OQS_STATUS OQS_KEM_frodokem_640_aes_encaps(uint8_t *ciphertext, uint8_t *shared_secret, const uint8_t *public_key); -OQS_API OQS_STATUS OQS_KEM_frodokem_640_aes_decaps(uint8_t *shared_secret, const uint8_t *ciphertext, const uint8_t *secret_key); +OQS_API OQS_STATUS OQS_KEM_frodokem_640_aes_keypair(unsigned char *public_key, unsigned char *secret_key); ++OQS_API OQS_STATUS OQS_KEM_frodokem_640_aes_keypair_derand(unsigned char *public_key, unsigned char *secret_key, const unsigned char *seed); +OQS_API OQS_STATUS OQS_KEM_frodokem_640_aes_encaps(unsigned char *ciphertext, unsigned char *shared_secret, const unsigned char *public_key); +OQS_API OQS_STATUS OQS_KEM_frodokem_640_aes_decaps(unsigned char *shared_secret, const unsigned char *ciphertext, const unsigned char *secret_key); #endif
