Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package aws-c-cal for openSUSE:Factory 
checked in at 2025-04-16 20:39:26
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/aws-c-cal (Old)
 and      /work/SRC/openSUSE:Factory/.aws-c-cal.new.30101 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "aws-c-cal"

Wed Apr 16 20:39:26 2025 rev:18 rq:1269577 version:0.9.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/aws-c-cal/aws-c-cal.changes      2025-04-04 
17:34:27.277370914 +0200
+++ /work/SRC/openSUSE:Factory/.aws-c-cal.new.30101/aws-c-cal.changes   
2025-04-20 19:49:57.471853158 +0200
@@ -1,0 +2,6 @@
+Tue Apr 15 10:13:01 UTC 2025 - John Paul Adrian Glaubitz 
<adrian.glaub...@suse.com>
+
+- Updare to version 0.9.0
+  * Drop support for macOS <10.15 and iOS<11 by @TingDaoK in (#214)
+
+-------------------------------------------------------------------

Old:
----
  v0.8.9.tar.gz

New:
----
  v0.9.0.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ aws-c-cal.spec ++++++
--- /var/tmp/diff_new_pack.aGohwU/_old  2025-04-20 19:49:57.975874134 +0200
+++ /var/tmp/diff_new_pack.aGohwU/_new  2025-04-20 19:49:57.979874301 +0200
@@ -19,7 +19,7 @@
 %define library_version 1.0.0
 %define library_soversion 0unstable
 Name:           aws-c-cal
-Version:        0.8.9
+Version:        0.9.0
 Release:        0
 Summary:        AWS C99 wrapper for cryptography primitives
 License:        Apache-2.0

++++++ v0.8.9.tar.gz -> v0.9.0.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/aws-c-cal-0.8.9/.github/workflows/ci.yml 
new/aws-c-cal-0.9.0/.github/workflows/ci.yml
--- old/aws-c-cal-0.8.9/.github/workflows/ci.yml        2025-04-01 
22:25:21.000000000 +0200
+++ new/aws-c-cal-0.9.0/.github/workflows/ci.yml        2025-04-12 
00:24:44.000000000 +0200
@@ -305,7 +305,7 @@
       run: |
         python3 -c "from urllib.request import urlretrieve; urlretrieve('${{ 
env.BUILDER_HOST }}/${{ env.BUILDER_SOURCE }}/${{ env.BUILDER_VERSION 
}}/builder.pyz', 'builder')"
         chmod a+x builder
-        ./builder build -p ${{ env.PACKAGE_NAME }} 
--cmake-extra=-DCMAKE_OSX_DEPLOYMENT_TARGET=10.9
+        ./builder build -p ${{ env.PACKAGE_NAME }} 
--cmake-extra=-DCMAKE_OSX_DEPLOYMENT_TARGET=10.15
 
   freebsd:
     runs-on: ubuntu-24.04 # latest
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/aws-c-cal-0.8.9/README.md 
new/aws-c-cal-0.9.0/README.md
--- old/aws-c-cal-0.8.9/README.md       2025-04-01 22:25:21.000000000 +0200
+++ new/aws-c-cal-0.9.0/README.md       2025-04-12 00:24:44.000000000 +0200
@@ -8,7 +8,7 @@
 
 ## Supported Platforms
 * Windows (Vista and Later)
-* Apple
+* Apple (MacOS 10.15+, IOS 11+)
 * Unix (via OpenSSL compatible libcrypto)
 
 ## Build Instructions
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/aws-c-cal-0.8.9/source/darwin/commoncrypto_aes.c 
new/aws-c-cal-0.9.0/source/darwin/commoncrypto_aes.c
--- old/aws-c-cal-0.8.9/source/darwin/commoncrypto_aes.c        2025-04-01 
22:25:21.000000000 +0200
+++ new/aws-c-cal-0.9.0/source/darwin/commoncrypto_aes.c        2025-04-12 
00:24:44.000000000 +0200
@@ -16,11 +16,6 @@
 
 #    define SUPPORT_AES_GCM_VIA_SPI 1
 #    include "common_cryptor_spi.h"
-
-#    if (defined(__MAC_OS_X_VERSION_MAX_ALLOWED) && 
(__MAC_OS_X_VERSION_MAX_ALLOWED >= 101300 /* macOS 10.13 */)) ||   \
-        (defined(__IPHONE_OS_VERSION_MAX_ALLOWED) && 
(__IPHONE_OS_VERSION_MAX_ALLOWED >= 110000 /* iOS v11 */))
-#        define USE_LATEST_CRYPTO_API 1
-#    endif
 #endif
 
 struct cc_aes_cipher {
@@ -370,45 +365,6 @@
 
 #ifdef SUPPORT_AES_GCM_VIA_SPI
 
-/*
- * Note that CCCryptorGCMFinal is deprecated in Mac 10.13. It also doesn't 
compare the tag with expected tag
- * 
https://opensource.apple.com/source/CommonCrypto/CommonCrypto-60118.1.1/include/CommonCryptorSPI.h.auto.html
- */
-static CCStatus s_cc_crypto_gcm_finalize(struct _CCCryptor *encryptor_handle, 
uint8_t *buffer, size_t tag_length) {
-#    ifdef USE_LATEST_CRYPTO_API
-    if (__builtin_available(macOS 10.13, iOS 11.0, *)) {
-        return CCCryptorGCMFinalize(encryptor_handle, buffer, tag_length);
-    } else {
-/* We would never hit this branch for newer macOS and iOS versions because of 
the __builtin_available check, so we can
- * suppress the compiler warning. */
-#        pragma clang diagnostic push
-#        pragma clang diagnostic ignored "-Wdeprecated-declarations"
-        return CCCryptorGCMFinal(encryptor_handle, buffer, &tag_length);
-#        pragma clang diagnostic pop
-    }
-#    else
-    return CCCryptorGCMFinal(encryptor_handle, buffer, &tag_length);
-
-#    endif
-}
-
-static CCCryptorStatus s_cc_cryptor_gcm_set_iv(struct _CCCryptor 
*encryptor_handle, uint8_t *buffer, size_t length) {
-#    ifdef USE_LATEST_CRYPTO_API
-    if (__builtin_available(macOS 10.13, iOS 11.0, *)) {
-        return CCCryptorGCMSetIV(encryptor_handle, buffer, length);
-    } else {
-/* We would never hit this branch for newer macOS and iOS versions because of 
the __builtin_available check, so we can
- * suppress the compiler warning. */
-#        pragma clang diagnostic push
-#        pragma clang diagnostic ignored "-Wdeprecated-declarations"
-        return CCCryptorGCMAddIV(encryptor_handle, buffer, length);
-#        pragma clang diagnostic pop
-    }
-#    else
-    return CCCryptorGCMAddIV(encryptor_handle, buffer, length);
-#    endif
-}
-
 static int s_finalize_gcm_encryption(struct aws_symmetric_cipher *cipher, 
struct aws_byte_buf *out) {
     (void)out;
 
@@ -420,7 +376,7 @@
     struct cc_aes_cipher *cc_cipher = cipher->impl;
 
     size_t tag_length = AWS_AES_256_CIPHER_BLOCK_SIZE;
-    CCStatus status = s_cc_crypto_gcm_finalize(cc_cipher->encryptor_handle, 
cipher->tag.buffer, tag_length);
+    CCStatus status = CCCryptorGCMFinalize(cc_cipher->encryptor_handle, 
cipher->tag.buffer, tag_length);
     if (status != kCCSuccess) {
         cipher->state = AWS_SYMMETRIC_CIPHER_ERROR;
         return aws_raise_error(AWS_ERROR_INVALID_ARGUMENT);
@@ -436,7 +392,7 @@
     struct cc_aes_cipher *cc_cipher = cipher->impl;
 
     size_t tag_length = AWS_AES_256_CIPHER_BLOCK_SIZE;
-    CCStatus status = s_cc_crypto_gcm_finalize(cc_cipher->decryptor_handle, 
cipher->tag.buffer, tag_length);
+    CCStatus status = CCCryptorGCMFinalize(cc_cipher->decryptor_handle, 
cipher->tag.buffer, tag_length);
     if (status != kCCSuccess) {
         cipher->state = AWS_SYMMETRIC_CIPHER_ERROR;
         return aws_raise_error(AWS_ERROR_INVALID_ARGUMENT);
@@ -495,8 +451,8 @@
     if (status != kCCSuccess) {
         return aws_raise_error(AWS_ERROR_INVALID_ARGUMENT);
     }
-    status = s_cc_cryptor_gcm_set_iv(
-        cc_cipher->encryptor_handle, cc_cipher->cipher_base.iv.buffer, 
cc_cipher->cipher_base.iv.len);
+    status =
+        CCCryptorGCMSetIV(cc_cipher->encryptor_handle, 
cc_cipher->cipher_base.iv.buffer, cc_cipher->cipher_base.iv.len);
 
     if (status != kCCSuccess) {
         return aws_raise_error(AWS_ERROR_INVALID_ARGUMENT);
@@ -528,8 +484,8 @@
     if (status != kCCSuccess) {
         return aws_raise_error(AWS_ERROR_INVALID_ARGUMENT);
     }
-    status = s_cc_cryptor_gcm_set_iv(
-        cc_cipher->decryptor_handle, cc_cipher->cipher_base.iv.buffer, 
cc_cipher->cipher_base.iv.len);
+    status =
+        CCCryptorGCMSetIV(cc_cipher->decryptor_handle, 
cc_cipher->cipher_base.iv.buffer, cc_cipher->cipher_base.iv.len);
 
     if (status != kCCSuccess) {
         return aws_raise_error(AWS_ERROR_INVALID_ARGUMENT);

Reply via email to