Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package leancrypto for openSUSE:Factory 
checked in at 2026-04-16 17:25:14
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/leancrypto (Old)
 and      /work/SRC/openSUSE:Factory/.leancrypto.new.11940 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "leancrypto"

Thu Apr 16 17:25:14 2026 rev:10 rq:1346454 version:1.7.2

Changes:
--------
--- /work/SRC/openSUSE:Factory/leancrypto/leancrypto.changes    2026-02-26 
18:36:44.243827535 +0100
+++ /work/SRC/openSUSE:Factory/.leancrypto.new.11940/leancrypto.changes 
2026-04-16 17:25:24.571577550 +0200
@@ -1,0 +2,79 @@
+Sun Apr 12 21:39:57 UTC 2026 - Lucas Mulling <[email protected]>
+
+- Update to 1.7.2:
+  * Fix RDSEED counter
+  * Process code by AI code checkers and apply suggested cosmetic fixes
+  * Heap memory: always munlock all mlock'ed memory
+  * Fix ChaCha20 on Apple compiled with XCode 26.4
+  * Fix a potential crasher with Base64 and applied various fixes reported
+  * Add X.509 certificate signing request (CSR) generator and parser
+  * ML-DSA: add lc_dilithium_pk_from_sk API to derive the PK from a given SK
+  * SLH-DSA: add lc_sphincs_pk_from_sk API to derive the PK from a given SK
+  * ML-KEM: add lc_kyber_pk_from_sk API to derive the PK from a given SK
+  * AES-CT: fix non-aligned data processing - reported
+  * Apply suggestions from Claude code
+  * X.509: Enforce path length restriction
+
+-------------------------------------------------------------------
+Mon Apr  6 09:13:06 UTC 2026 - Angel Yankov <[email protected]>
+
+- Update to 1.7.1
+  * Offer a means to select the AES-C constant time / S-Box implementation via
+    lc_init API
+  * use the AES-C constant time implementation by default - it is about 3 times
+    slower than the AES-C S-Box implementation, but more secure. As the
+    leancrypto library is about secure by default, the CT implementation is
+    just right. Furthermore, if a caller wants to have the faster AES-C S-Box,
+    he can call lc_init(LC_INIT_AES_SBOX) at the beginning.
+  * CVE-2026-34610: X.509: fix security issue (bsc#1261382)
+  * FIPS: mark only seeded DRBG instances as FIPS-approved
+  * ASN.1: add lc_x509_cert_check_issuer_ca convenience function
+  * Enable side-channel-resistant AES implementation (and thus enable
+    respective Timecop tests)
+  * Fix some side channel test failures (all failures are due to test case
+    issues, and no real problems)
+  * AARCH64: enable GCS support (see
+    
https://community.arm.com/arm-community-blogs/b/tools-software-ides-blog/posts/gcc-15-continuously-improving#guarded
+    and https://docs.kernel.org/next/arch/arm64/gcs.html)
+  * Add PKCS#8 support for ML-DSA following RFC9881 including full support for
+    the seed or full keys. The change adds OpenSSL interoperability testing as
+    well. NOTE: The raw on-disk private key format that is generated with
+    lc_x509_generate --create-keypair changed to comply with RFC9881.
+  * Add PKCS#8 support for SLH-DSA. The change adds OpenSSL interoperability
+    testing as well. NOTE: The raw on-disk private key format that is generated
+    with lc_x509_generate --create-keypair changed to dump the raw key instead
+    of wrapping it into a BIT STRING to comply with OpenSSL's format.
+  * Provide full PKCS#7 interoperability with OpenSSL: OpenSSL artificially
+    orders the parsing of the authenticated attributes. This implies that the
+    message digest part of the authenticated attributes is parsed as last
+    entry. This ordering is important for the signature generation and
+    verification. Furthermore, for ML-DSA/SLH-DSA, the authenticated attributes
+    are signed with the pure algorithm instead of the pre-hashed operation as
+    suggested by RFC5652 section 9.2.
+  * ML-KEM/DSA: add safety measures against compilers trying to reason about
+    code they should not reason about. Derived from
+    https://github.com/pq-code-package/ml[dsa|kem]-native/
+  * ML-DSA: reduce amount of duplicate code compilation suggested
+  * ML-DSA: fix bug in poly_uniform which, however, is unlikely to be triggered
+  * ChaCha20: fix crasher when assembler support is not compiled
+  * Add AES constant time C implementation accessible with the lc_aes_*ct
+    references. Yet, it is about 3 times slower than the default C
+    implementation. Thus is is only provided if somebody truly relies on a
+    constant time implementation.
+- Patches are merged upstream:
+  * Drop fe9751f2.patch
+  * Drop leancrypto_avx_detect1.patch
+  * Drop leancrypto_avx_detect2.patch
+  * Drop 0469d92f.patch
+
+- For full changelog, see:
+https://github.com/smuellerDD/leancrypto/releases/tag/v1.7.0
+https://github.com/smuellerDD/leancrypto/releases/tag/v1.7.1
+
+-------------------------------------------------------------------
+Wed Feb 25 13:03:13 UTC 2026 - Guillaume GARDET <[email protected]>
+
+- Add upstream patch to fix build with kernel 6.19 on aarch64:
+  * 0469d92f.patch 
+
+-------------------------------------------------------------------

Old:
----
  0469d92f.patch
  fe9751f2.patch
  leancrypto-1.6.0.tar.xz
  leancrypto-1.6.0.tar.xz.asc
  leancrypto_avx_detect1.patch
  leancrypto_avx_detect2.patch

New:
----
  leancrypto-1.7.2.tar.xz
  leancrypto-1.7.2.tar.xz.asc

----------(Old B)----------
  Old:  * Drop leancrypto_avx_detect2.patch
  * Drop 0469d92f.patch
  Old:- Patches are merged upstream:
  * Drop fe9751f2.patch
  * Drop leancrypto_avx_detect1.patch
  Old:  * Drop fe9751f2.patch
  * Drop leancrypto_avx_detect1.patch
  * Drop leancrypto_avx_detect2.patch
  Old:  * Drop leancrypto_avx_detect1.patch
  * Drop leancrypto_avx_detect2.patch
  * Drop 0469d92f.patch
----------(Old E)----------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ leancrypto.spec ++++++
--- /var/tmp/diff_new_pack.JkpDnz/_old  2026-04-16 17:25:25.523616773 +0200
+++ /var/tmp/diff_new_pack.JkpDnz/_new  2026-04-16 17:25:25.527616938 +0200
@@ -29,7 +29,7 @@
 %define pkgname leancrypto
 %define libname lib%{pkgname}
 Name:           %{pkgname}%{psuffix}
-Version:        1.6.0
+Version:        1.7.2
 Release:        0
 %if %{with kmp}
 Summary:        leancrypto Kernel Module Package
@@ -42,14 +42,7 @@
 Source1:        
https://www.leancrypto.org/%{pkgname}/releases/%{pkgname}-%{version}/%{pkgname}-%{version}.tar.xz.asc
 Source2:        
https://leancrypto.org/about/smuellerDD-2024.asc#/leancrypto.keyring
 Source3:        baselibs.conf
-# PATCH-FIX-UPSTREAM - 
https://github.com/smuellerDD/leancrypto/commit/fe9751f2b
-Patch1:         fe9751f2.patch
-# PATCH-FIX-UPSTREAM 
https://github.com/smuellerDD/leancrypto/commit/38bb12a185b2d3aa4ff3656d743b33b3ae25bac7
-# bsc#1253654, bsc#1254370 - fix AVX detection in older intel CPUs
-Patch2:         leancrypto_avx_detect1.patch
-Patch3:         leancrypto_avx_detect2.patch
-# PATCH-FIX-UPSTREAM - https://github.com/smuellerDD/leancrypto/commit/0469d92f
-Patch4:         0469d92f.patch
+
 BuildRequires:  clang
 BuildRequires:  meson
 %if %{with kmp}

++++++ leancrypto-1.6.0.tar.xz -> leancrypto-1.7.2.tar.xz ++++++
/work/SRC/openSUSE:Factory/leancrypto/leancrypto-1.6.0.tar.xz 
/work/SRC/openSUSE:Factory/.leancrypto.new.11940/leancrypto-1.7.2.tar.xz 
differ: char 26, line 1

Reply via email to