Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

libcrypt1-4.4.25-1.2 RPM for x86_64

From OpenSuSE Tumbleweed for x86_64

Name: libcrypt1 Distribution: openSUSE Tumbleweed
Version: 4.4.25 Vendor: openSUSE
Release: 1.2 Build date: Sat Sep 18 09:41:18 2021
Group: System/Libraries Build host: old-atreju3
Size: 270725 Source RPM: libxcrypt-4.4.25-1.2.src.rpm
Packager: https://bugs.opensuse.org
Url: https://github.com/besser82/libxcrypt
Summary: Extended crypt library for DES, MD5, Blowfish and others
libxcrypt is a modern library for one-way hashing of passwords.  It
supports DES, MD5, SHA-2-256, SHA-2-512, and bcrypt-based password
hashes, and provides the traditional Unix 'crypt' and 'crypt_r'
interfaces, as well as a set of extended interfaces pioneered by
Openwall Linux, 'crypt_rn', 'crypt_ra', 'crypt_gensalt',
'crypt_gensalt_rn', and 'crypt_gensalt_ra'.

Provides

Requires

License

BSD-2-Clause AND LGPL-2.1-or-later AND BSD-3-Clause AND SUSE-Public-Domain

Changelog

* Wed Aug 18 2021 Andreas Schwab <schwab@suse.de>
  - Update to 4.4.25
    * Fix several issues found by Covscan in the testsuite.  These include:
    - CWE-170: String not null terminated (STRING_NULL)
    - CWE-188: Reliance on integer endianness (INCOMPATIBLE_CAST)
    - CWE-190: Unintentional integer overflow (OVERFLOW_BEFORE_WIDEN)
    - CWE-569: Wrong sizeof argument (SIZEOF_MISMATCH)
    - CWE-573: Missing varargs init or cleanup (VARARGS)
    - CWE-687: Argument cannot be negative (NEGATIVE_RETURNS)
    * Stricter checking of invalid salt characters (issue #135).
* Thu Jun 24 2021 Paolo Stivanin <info@paolostivanin.com>
  - Update to 4.4.23
    * Fix output calculation for gensalt_yescrypt_rn().
    * Fix -Werror=conversion in lib/crypt-des-obsolete.c,
      test/des-obsolete.c, and test/des-obsolete_r.c.
    * The crypt_checksalt() function has been fixed to correctly return
      with 'CRYPT_SALT_INVALID', in case the setting, that is passed
      to be checked, represents an empty passphrase or an uncomputed
      setting for descrypt without any salt characters.
    * The crypt_checksalt() function will now return the value
      'CRYPT_SALT_METHOD_LEGACY' in case the setting, that is passed
      to be checked, uses a hashing method, which is considered to be
      too weak for use with new passphrases.
    * Fix build when the CFLAGS variable, that is passed into the
      configure script, has a leading whitespace character in it
      (issue #123).
* Tue Apr 13 2021 Paolo Stivanin <info@paolostivanin.com>
  - Update to 4.4.19
    * Improve fallback implementation of explicit_bzero.
    * Add glibc-on-CSKY, ARC, and RISCV-32 entries to libcrypt.minver.
      These were added in GNU libc 2.29, 2.32, and 2.33 respectively
    * Do not build xcrypt.h if we’re not going to install it.
    * Do not apply --enable-obsolete-api-enosys mode to fcrypt.
    * Compilation fix for NetBSD.  NetBSD’s <unistd.h> declares encrypt
      and setkey to return int, contrary to POSIX (which says they return
      void).  Rename those declarations out of the way with macros.
    * Compilation fixes for building with GCC 11.
      Basically fixes for explicit type-casting.
    * Force update of existing symlinks during installation
* Mon Feb 22 2021 Andreas Schwab <schwab@suse.de>
  - Update to version 4.4.18
    * Fix conversion error in lib/alg-gost3411-core.c
* Tue Sep 01 2020 Andreas Schwab <schwab@suse.de>
  - Add compatibility provides for SLE15
  - Update to version 4.4.17
    * Salt string compatibility with generic implementations
* Mon Mar 02 2020 Andreas Schwab <schwab@suse.de>
  - Update to version 4.4.15
    * The compatibility symbols crypt_gensalt_r, xcrypt, xcrypt_r,
      xcrypt_gensalt, and xcrypt_gensalt_r are deprecated further
    * Speed up ka-sunmd5 by skipping most of the test phrases
  - Package README.md and TODO.md (bsc#1165389)
* Thu Jan 30 2020 Andreas Schwab <schwab@suse.de>
  - Update to version 4.4.12
    * Another fix for GCC v10.x, which occurs on s390 architectures only.
* Wed Jan 22 2020 Andreas Schwab <schwab@suse.de>
  - Update to version 4.4.11
    * Fixes for GCC v10.x
    * Change how the known-answer tests are parallelized
  - gcc10.patch: remove
* Thu Dec 12 2019 Andreas Schwab <schwab@suse.de>
  - gcc10.patch: fix build with gcc10 (bsc#1158192)
* Sat Dec 07 2019 Andreas Schwab <schwab@suse.de>
  - Update to version 4.4.10
    * Fix alignment problem for GOST 34.11 (Streebog) in gost-yestcrypt.
    * The crypt_* functions will now all fail and set errno to ERANGE if
      their 'phrase' argument is longer than CRYPT_MAX_PASSPHRASE_SIZE
      characters (this is currently 512)
    * The NT hashing method no longer truncates passphrases at 128
      characters; Windows does not do this.
  - format-overflow.patch: remove
* Thu Jun 20 2019 Martin Liška <mliska@suse.cz>
  - Disable LTO due to symbol versioning (boo#1138833).
* Tue Feb 19 2019 schwab@suse.de
  - format-overflow.patch: Fix -Werror=format-overflow
* Thu Feb 14 2019 Martin Liška <mliska@suse.cz>
  - Update to version 4.4.3:
    * Add libxcrypt.so, libxcrypt.a and xcrypt.h.
    * Add new man3 manual pages.
* Tue Oct 09 2018 schwab@suse.de
  - Set compatibility level to suse
* Wed Aug 08 2018 schwab@suse.de
  - Add conflicts with glibc-devel < 2.28
* Mon Aug 06 2018 jengelh@inai.de
  - Fix RPM groups for Factory.
* Wed Aug 01 2018 schwab@suse.de
  - Update to libxcrypt 4.1.0
    * Fix spelling of SUSE.
    * Lower the minimum required automake version to 1.14.
    * Fix build with USE_SWAPCONTEXT turned off.
    * Extend --enable-weak-hashes configure option to accept optional
      "glibc" parameter.
    * Fix the leak of obtained random bytes.
    * Check expected output strings for deterministic methods.
    * Fix memory leak in crypt_sha1_rn.
    * Fix read of random bytes out of bounds in gensalt_sha1_rn.
    * Make it possible to disable individual hashes at configure time.
    * Make salt validation pickier.
    * Replace crypt-sunmd5.c with BSD-licensed cleanroom reimplementation.
    * Make crypt_gensalt for $sha1 deterministic.
    * Fix incorrect output-size computation in crypt_sha1_rn.
    * Add docs for SHA1, MD5/Sun, NTHASH.
    * Introduce CRYPT_GENSALT_IMPLEMENTS_* feature test macros.
    * Install libcrypt.pc symlink along with libxcrypt.pc.
    * Extend --enable-obsolete-api configure option.
    * Extend overall test coverage.
* Wed May 23 2018 schwab@suse.de
  - Update to libxcrypt 4.0.1
* Wed May 09 2018 schwab@suse.de
  - ABI compatible replacement for libcypt from glibc

Files

/usr/lib64/libcrypt.so.1
/usr/lib64/libcrypt.so.1.1.0
/usr/lib64/libowcrypt.so.1
/usr/share/doc/packages/libcrypt1
/usr/share/doc/packages/libcrypt1/AUTHORS
/usr/share/doc/packages/libcrypt1/NEWS
/usr/share/doc/packages/libcrypt1/README
/usr/share/doc/packages/libcrypt1/README.md
/usr/share/doc/packages/libcrypt1/THANKS
/usr/share/licenses/libcrypt1
/usr/share/licenses/libcrypt1/COPYING.LIB
/usr/share/licenses/libcrypt1/LICENSING


Generated by rpm2html 1.8.1

Fabrice Bellet, Sun Nov 28 23:40:12 2021