Now
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.83
MAIN commitmail json YAML
audio/fasttracker2: Update to 1.83
Changes since v1.82
v1.83 - 10.05.2024
- In this version I have addressed some annoyances users have mentioned:
1) Now you cannot edit pattern notes/data while the pattern editor is
not visible. This further prevents accidental song edits.
2) While in extended pattern editor mode, show a status bar with global
volume, pattern edit status (to see if you are editing), and time elapsed.
3) It was not possible to issue a Note Insert (Insert key) or Line Insert
(Shift+Insert) on some keyboards.
Added extra keybindings:
Ctrl+Return = Insert Note (same as Insert)
Ctrl+Shift+Return = Insert Line (same as Shift+Insert)
- Updated the Keybindings help text to reflect the extra keybindings
- Windows/macOS: Updated SDL to v2.30.3
Changes since v1.82
v1.83 - 10.05.2024
- In this version I have addressed some annoyances users have mentioned:
1) Now you cannot edit pattern notes/data while the pattern editor is
not visible. This further prevents accidental song edits.
2) While in extended pattern editor mode, show a status bar with global
volume, pattern edit status (to see if you are editing), and time elapsed.
3) It was not possible to issue a Note Insert (Insert key) or Line Insert
(Shift+Insert) on some keyboards.
Added extra keybindings:
Ctrl+Return = Insert Note (same as Insert)
Ctrl+Shift+Return = Insert Line (same as Shift+Insert)
- Updated the Keybindings help text to reflect the extra keybindings
- Windows/macOS: Updated SDL to v2.30.3
MAIN commitmail json YAML
doc: Updated sysutils/eza to 0.18.15
MAIN commitmail json YAML
pkgsrc/sysutils/eza/Makefile@1.30
/
diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.26 / diff
pkgsrc/sysutils/eza/distinfo@1.28 / diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.26 / diff
pkgsrc/sysutils/eza/distinfo@1.28 / diff
sysutils/eza: Update to 0.18.15
Changes since 0.18.14:
Changelog
[0.18.15] - 2024-05-09
Bug Fixes
* Correct command for latest tag in deb-package.sh
Documentation
* Add how to find man pages in terminal and online. Partly fixes #967
* Correct heading levels in markdown
* Move heading out of collapsed section
* Add some keywords for benefit of ctrl-f
Features
* Return to original commit at the end of deb-package.sh
* Add optional tag argument to deb-package.sh
Miscellaneous Tasks
* Release eza v0.18.15
Changes since 0.18.14:
Changelog
[0.18.15] - 2024-05-09
Bug Fixes
* Correct command for latest tag in deb-package.sh
Documentation
* Add how to find man pages in terminal and online. Partly fixes #967
* Correct heading levels in markdown
* Move heading out of collapsed section
* Add some keywords for benefit of ctrl-f
Features
* Return to original commit at the end of deb-package.sh
* Add optional tag argument to deb-package.sh
Miscellaneous Tasks
* Release eza v0.18.15
MAIN commitmail json YAML
doc: Updated sysutils/pfetch to 1.0.1
MAIN commitmail json YAML
sysutils/pfetch: Update to 1.0.1
Changes since 0.6.0:
1.0.1
This is a minor release to fix disk usage not working at all in bash
1.0.0
First release!
This brings many improvements over the last version from dylanaraps, including
support for Windows (Cygwin, MSYS2, busybox-w32), GNU Hurd, and MorphOS, and
many Linux distros, new information like disk usage and resolution, and lots
of general improvements all throughout the script.
Changes since 0.6.0:
1.0.1
This is a minor release to fix disk usage not working at all in bash
1.0.0
First release!
This brings many improvements over the last version from dylanaraps, including
support for Windows (Cygwin, MSYS2, busybox-w32), GNU Hurd, and MorphOS, and
many Linux distros, new information like disk usage and resolution, and lots
of general improvements all throughout the script.
MAIN commitmail json YAML
doc: Updated sysutils/eza to 0.18.13
MAIN commitmail json YAML
sysutils/eza: Update to 0.18.13
Changes since 0.18.11:
eza v0.18.13
Description
So tiny :3
Changelog
[0.18.13] - 2024-04-25
Features
* Generate completion/manpage tarballs on release
Miscellaneous Tasks
* Release eza v0.18.13
Changes since 0.18.11:
eza v0.18.13
Description
So tiny :3
Changelog
[0.18.13] - 2024-04-25
Features
* Generate completion/manpage tarballs on release
Miscellaneous Tasks
* Release eza v0.18.13
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.82
MAIN commitmail json YAML
audio/fasttracker2: Update to 1.82
Changes since v1.79.2
v1.82 - 12.04.2024
- MIDI is enabled again for Windows XP (I came up with a solution)
- Fixed: MIDI was actually not working in v1.81 :(
- Fixed: Possible crash on startup or on exit (related to MIDI).
COULD still happen on Mac, but I haven't experienced it yet!
v1.81 - 09.04.2024
- Windows: Error message boxes were rendered wrongly on Windows XP
- Windows: Disable MIDI support on Windows XP because it was buggy
(would crash on exit on some systems/interfaces). If you really need to
use MIDI with the FT2 clone, please consider using an OS that is not
over 23 years old!
- MSVC: Use v141 platform toolset for 32-bit Windows build
- Rewrote some of the MIDI init/close code, as it looked like it could be
buggy.
v1.80 - 09.04.2024
- Doing note transpose on the whole song wouldn't count overflowing notes
properly (it would sometimes not show a warning message first).
- Windows/macOS: Updated SDL to v2.30.2
Changes since v1.79.2
v1.82 - 12.04.2024
- MIDI is enabled again for Windows XP (I came up with a solution)
- Fixed: MIDI was actually not working in v1.81 :(
- Fixed: Possible crash on startup or on exit (related to MIDI).
COULD still happen on Mac, but I haven't experienced it yet!
v1.81 - 09.04.2024
- Windows: Error message boxes were rendered wrongly on Windows XP
- Windows: Disable MIDI support on Windows XP because it was buggy
(would crash on exit on some systems/interfaces). If you really need to
use MIDI with the FT2 clone, please consider using an OS that is not
over 23 years old!
- MSVC: Use v141 platform toolset for 32-bit Windows build
- Rewrote some of the MIDI init/close code, as it looked like it could be
buggy.
v1.80 - 09.04.2024
- Doing note transpose on the whole song wouldn't count overflowing notes
properly (it would sometimes not show a warning message first).
- Windows/macOS: Updated SDL to v2.30.2
MAIN commitmail json YAML
doc: Updated sysutils/eza to 0.18.10
MAIN commitmail json YAML
pkgsrc/sysutils/eza/Makefile@1.26
/
diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.23 / diff
pkgsrc/sysutils/eza/distinfo@1.24 / diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.23 / diff
pkgsrc/sysutils/eza/distinfo@1.24 / diff
sysutils/eza: Update to 0.18.10
Changes since 0.18.9:
eza v0.18.10
Changelog
[0.18.10] - 2024-04-11
Bug Fixes
* Bump trycmd from 0.15.0 to 0.15.1
Miscellaneous Tasks
* Release eza v0.18.10
Build
* Bump nu-ansi-term from 0.49.0 to 0.50.0
Changes since 0.18.9:
eza v0.18.10
Changelog
[0.18.10] - 2024-04-11
Bug Fixes
* Bump trycmd from 0.15.0 to 0.15.1
Miscellaneous Tasks
* Release eza v0.18.10
Build
* Bump nu-ansi-term from 0.49.0 to 0.50.0
MAIN commitmail json YAML
doc: Updated sysutils/eza to 0.18.9
MAIN commitmail json YAML
pkgsrc/sysutils/eza/Makefile@1.25
/
diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.22 / diff
pkgsrc/sysutils/eza/distinfo@1.23 / diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.22 / diff
pkgsrc/sysutils/eza/distinfo@1.23 / diff
sysutils/eza: Update to 0.18.9
Changes since 0.18.8:
eza v0.18.9
Changelog
[0.18.9] - 2024-03-27
Features
* Switch out ansiterm crate for nu_ansi_term
Miscellaneous Tasks
* Release eza v0.18.9
Build
* Bump DeterminateSystems/nix-installer-action from 9 to 10
* Bump plist from 1.6.0 to 1.6.1
* Bump rayon from 1.9.0 to 1.10.0
* Bump git2 from 0.18.2 to 0.18.3
Changes since 0.18.8:
eza v0.18.9
Changelog
[0.18.9] - 2024-03-27
Features
* Switch out ansiterm crate for nu_ansi_term
Miscellaneous Tasks
* Release eza v0.18.9
Build
* Bump DeterminateSystems/nix-installer-action from 9 to 10
* Bump plist from 1.6.0 to 1.6.1
* Bump rayon from 1.9.0 to 1.10.0
* Bump git2 from 0.18.2 to 0.18.3
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.79.2
MAIN commitmail json YAML
audio/fasttracker2: Update to 1.79.2
Changes since v1.79
v1.79.2 - 18.03.2024
- Fix mouse issues.
Changes since v1.79
v1.79.2 - 18.03.2024
- Fix mouse issues.
MAIN commitmail json YAML
doc: Updated security/wolfssl to 5.7.0
MAIN commitmail json YAML
security/wolfssl: Update to 5.7.0
Changes since 5.6.6:
wolfSSL Release 5.7.0 (Mar 20, 2024)
NOTE: * --enable-heapmath is being deprecated and will be removed by end of
2024
NOTE: In future releases, --enable-des3 (which is disabled by default) will
be insufficient in itself to enable DES3 in TLS cipher suites. A new option,
--enable-des3-tls-suites, will need to be supplied in addition. This option
should only be used in backward compatibility scenarios, as it is inherently
insecure.
NOTE: This release switches the default ASN.1 parser to the new ASN template
code. If the original ASN.1 code is preferred define WOLFSSL_ASN_ORIGINAL to
use it. See PR #7199.
Vulnerabilities
* [High] CVE-2024-0901 Potential denial of service and out of bounds read.
Affects TLS 1.3 on the server side when accepting a connection from a
malicious TLS 1.3 client. If using TLS 1.3 on the server side it is
recommended to update the version of wolfSSL used. Fixed in this GitHub
pull request #7099
* [Med] CVE-2024-1545 Fault Injection vulnerability in
RsaPrivateDecryption function that potentially allows an attacker thathas
access to the same system with a victims process to perform aRowhammer
fault injection. Thanks to Junkai Liang, Zhi Zhang, Xin Zhang,Qingni Shen
for the report (Peking University, The University of WesternAustralia)."
Fixed in this GitHub pull request #7167
* [Med] Fault injection attack with EdDSA signature operations. This
affects ed25519 sign operations where the system could be susceptible to
Rowhammer attacks. Thanks to Junkai Liang, Zhi Zhang, Xin Zhang, Qingni
Shen for the report (Peking University, The University of Western
Australia). Fixed in this GitHub pull request #7212
New Feature Additions
* Added --enable-experimental configure flag to gate out features that are
currently experimental. Now liboqs, kyber, lms, xmss, and dual-alg-certs
require the --enable-experimental flag.
POST QUANTUM SUPPORT ADDITIONS
* Experimental framework for using wolfSSL窶冱 XMSS implementation (PR 7161)
* Experimental framework for using wolfSSL窶冱 LMS implementation (PR 7283)
* Experimental wolfSSL Kyber implementation and assembly optimizations,
enabled with --enable-experimental --enable-kyber (PR 7318)
* Experimental support for post quantum dual key/signature certificates. A
few known issues and sanitizer checks are in progress with this feature.
Enabled with the configure flags --enable-experimental
--enable-dual-alg-certs (PR 7112)
* CryptoCb support for PQC algorithms (PR 7110)
OTHER FEATURE ADDITIONS
* The Linux kernel module now supports registration of AES-GCM, AES-XTS,
AES-CBC, and AES-CFB with the kernel cryptosystem through the new
--enable-linuxkm-lkcapi-register option, enabling automatic use of
wolfCrypt implementations by the dm-crypt/luks and ESP subsystems. In
particular, wolfCrypt AES-XTS with 窶兎nable-aesni is faster than the
native kernel implementation.
* CryptoCb hook to one-shot CMAC functions (PR 7059)
* BER content streaming support for PKCS7_VerifySignedData and sign/
encrypt operations (PR 6961 & 7184)
* IoT-Safe SHA-384 and SHA-512 support (PR 7176)
* I/O callbacks for content and output with PKCS7 bundle sign/encrypt to
reduce peak memory usage (PR 7272)
* Microchip PIC24 support and example project (PR 7151)
* AutoSAR shim layer for RNG, SHA256, and AES (PR 7296)
* wolfSSL_CertManagerUnloadIntermediateCerts API to clear intermediate
certs added to certificate store (PR 7245)
* Implement SSL_get_peer_signature_nid and SSL_get_peer_signature_type_nid
(PR 7236)
Enhancements and Optimizations
* Remove obsolete user-crypto functionality and Intel IPP support (PR 7097)
* Support for RSA-PSS signatures with CRL use (PR 7119)
* Enhancement for AES-GCM use with Xilsecure on Microblaze (PR 7051)
* Support for crypto cb only build with ECC and NXP CAAM (PR 7269)
* Improve liboqs integration adding locking and init/cleanup functions (PR
7026)
* Prevent memory access before clientSession->serverRow and
clientSession->serverIdx are sanitized (PR 7096)
* Enhancements to reproducible build (PR 7267)
* Update Arduino example TLS Client/Server and improve support for ESP32
(PR 7304 & 7177)
* XC32 compiler version 4.x compatibility (PR 7128)
* Porting for build on PlayStation 3 and 4 (PR 7072)
* Improvements for Espressif use; SHA HW/SW selection and use on ESP32-C2/
ESP8684, wolfSSL_NewThread() type, component cmake fix, and update TLS
client example for ESP8266 (PR 7081, 7173, 7077, 7148, 7240)
* Allow crypto callbacks with SHA-1 HW (PR 7087)
* Update OpenSSH port to version 9.6p1(PR 7203)
* ARM Thumb2 enhancements, AES-GCM support for GCM_SMALL, alignment fix on
key, fix for ASM clobber list (PR 7291,7301,7221)
* Expand heap hint support for static memory build with more x509 functions
(PR 7136)
* Improving ARMv8 ChaCha20 ASM (alignment) (PR 7182)
* Unknown extension callback wolfSSL_CertManagerSetUnknownExtCallback added
to CertManager (PR 7194)
* Implement wc_rng_new_ex for use with devID窶冱 with crypto callback (PR
7271)
* Allow reading 0-RTT data after writing 0.5-RTT data (PR 7102)
* Send alert on bad PSK binder error (PR 7235)
* Enhancements to CMake build files for use with cross compiling (PR 7188)
Fixes
* Fix for checking result of MAC verify when no AAD is used with AES-GCM
and Xilinx Xilsecure (PR 7051)
* Fix for Aria sign use (PR 7082)
* Fix for invalid dh_ffdhe_test test case using Intel QuickAssist (PR 7085)
* Fixes for TI AES and SHA on TM4C with HW acceleration and add full AES
GCM and CCM support with TLS (PR 7018)
* Fixes for STM32 PKA use with ECC (PR 7098)
* Fixes for TLS 1.3 with crypto callbacks to offload KDF / HMAC operation
(PR 7070)
* Fix include path for FSP 3.5 on Renesas RA6M4 (PR 7101)
* Siphash x64 asm fix for use with older compilers (PR 7299)
* Fix for SGX build with SP (PR 7308)
* Fix to Make it mandatory that the cookie is sent back in new ClientHello
when seen in a HelloRetryRequest with (PR 7190)
* Fix for wrap around behavior with BIO pairs (PR 7169)
* OCSP fixes for parsing of response correctly when there was a revocation
reason and returning correct error value with date checks (PR 7241 & 7255)
* Fix build with NO_STDIO_FILESYSTEM and improve checks for XGETENV (PR
7150)
* Fix for DTLS sequence number and cookie when downgrading DTLS version (PR
7214)
* Fix for write_dup use with chacha-poly cipher suites (PR 7206)
* Fix for multiple handshake messages in one record failing with
OUT_OF_ORDER_E when downgrading from TLS 1.3 to TLS 1.2 (PR 7141)
* Fix for AES ECB build with Thumb and alignment (PR 7094)
* Fix for negotiate handshake until the end in wolfSSL_read/wolfSSL_write
if hitting an edge case with want read/write (PR 7237)
Changes since 5.6.6:
wolfSSL Release 5.7.0 (Mar 20, 2024)
NOTE: * --enable-heapmath is being deprecated and will be removed by end of
2024
NOTE: In future releases, --enable-des3 (which is disabled by default) will
be insufficient in itself to enable DES3 in TLS cipher suites. A new option,
--enable-des3-tls-suites, will need to be supplied in addition. This option
should only be used in backward compatibility scenarios, as it is inherently
insecure.
NOTE: This release switches the default ASN.1 parser to the new ASN template
code. If the original ASN.1 code is preferred define WOLFSSL_ASN_ORIGINAL to
use it. See PR #7199.
Vulnerabilities
* [High] CVE-2024-0901 Potential denial of service and out of bounds read.
Affects TLS 1.3 on the server side when accepting a connection from a
malicious TLS 1.3 client. If using TLS 1.3 on the server side it is
recommended to update the version of wolfSSL used. Fixed in this GitHub
pull request #7099
* [Med] CVE-2024-1545 Fault Injection vulnerability in
RsaPrivateDecryption function that potentially allows an attacker thathas
access to the same system with a victims process to perform aRowhammer
fault injection. Thanks to Junkai Liang, Zhi Zhang, Xin Zhang,Qingni Shen
for the report (Peking University, The University of WesternAustralia)."
Fixed in this GitHub pull request #7167
* [Med] Fault injection attack with EdDSA signature operations. This
affects ed25519 sign operations where the system could be susceptible to
Rowhammer attacks. Thanks to Junkai Liang, Zhi Zhang, Xin Zhang, Qingni
Shen for the report (Peking University, The University of Western
Australia). Fixed in this GitHub pull request #7212
New Feature Additions
* Added --enable-experimental configure flag to gate out features that are
currently experimental. Now liboqs, kyber, lms, xmss, and dual-alg-certs
require the --enable-experimental flag.
POST QUANTUM SUPPORT ADDITIONS
* Experimental framework for using wolfSSL窶冱 XMSS implementation (PR 7161)
* Experimental framework for using wolfSSL窶冱 LMS implementation (PR 7283)
* Experimental wolfSSL Kyber implementation and assembly optimizations,
enabled with --enable-experimental --enable-kyber (PR 7318)
* Experimental support for post quantum dual key/signature certificates. A
few known issues and sanitizer checks are in progress with this feature.
Enabled with the configure flags --enable-experimental
--enable-dual-alg-certs (PR 7112)
* CryptoCb support for PQC algorithms (PR 7110)
OTHER FEATURE ADDITIONS
* The Linux kernel module now supports registration of AES-GCM, AES-XTS,
AES-CBC, and AES-CFB with the kernel cryptosystem through the new
--enable-linuxkm-lkcapi-register option, enabling automatic use of
wolfCrypt implementations by the dm-crypt/luks and ESP subsystems. In
particular, wolfCrypt AES-XTS with 窶兎nable-aesni is faster than the
native kernel implementation.
* CryptoCb hook to one-shot CMAC functions (PR 7059)
* BER content streaming support for PKCS7_VerifySignedData and sign/
encrypt operations (PR 6961 & 7184)
* IoT-Safe SHA-384 and SHA-512 support (PR 7176)
* I/O callbacks for content and output with PKCS7 bundle sign/encrypt to
reduce peak memory usage (PR 7272)
* Microchip PIC24 support and example project (PR 7151)
* AutoSAR shim layer for RNG, SHA256, and AES (PR 7296)
* wolfSSL_CertManagerUnloadIntermediateCerts API to clear intermediate
certs added to certificate store (PR 7245)
* Implement SSL_get_peer_signature_nid and SSL_get_peer_signature_type_nid
(PR 7236)
Enhancements and Optimizations
* Remove obsolete user-crypto functionality and Intel IPP support (PR 7097)
* Support for RSA-PSS signatures with CRL use (PR 7119)
* Enhancement for AES-GCM use with Xilsecure on Microblaze (PR 7051)
* Support for crypto cb only build with ECC and NXP CAAM (PR 7269)
* Improve liboqs integration adding locking and init/cleanup functions (PR
7026)
* Prevent memory access before clientSession->serverRow and
clientSession->serverIdx are sanitized (PR 7096)
* Enhancements to reproducible build (PR 7267)
* Update Arduino example TLS Client/Server and improve support for ESP32
(PR 7304 & 7177)
* XC32 compiler version 4.x compatibility (PR 7128)
* Porting for build on PlayStation 3 and 4 (PR 7072)
* Improvements for Espressif use; SHA HW/SW selection and use on ESP32-C2/
ESP8684, wolfSSL_NewThread() type, component cmake fix, and update TLS
client example for ESP8266 (PR 7081, 7173, 7077, 7148, 7240)
* Allow crypto callbacks with SHA-1 HW (PR 7087)
* Update OpenSSH port to version 9.6p1(PR 7203)
* ARM Thumb2 enhancements, AES-GCM support for GCM_SMALL, alignment fix on
key, fix for ASM clobber list (PR 7291,7301,7221)
* Expand heap hint support for static memory build with more x509 functions
(PR 7136)
* Improving ARMv8 ChaCha20 ASM (alignment) (PR 7182)
* Unknown extension callback wolfSSL_CertManagerSetUnknownExtCallback added
to CertManager (PR 7194)
* Implement wc_rng_new_ex for use with devID窶冱 with crypto callback (PR
7271)
* Allow reading 0-RTT data after writing 0.5-RTT data (PR 7102)
* Send alert on bad PSK binder error (PR 7235)
* Enhancements to CMake build files for use with cross compiling (PR 7188)
Fixes
* Fix for checking result of MAC verify when no AAD is used with AES-GCM
and Xilinx Xilsecure (PR 7051)
* Fix for Aria sign use (PR 7082)
* Fix for invalid dh_ffdhe_test test case using Intel QuickAssist (PR 7085)
* Fixes for TI AES and SHA on TM4C with HW acceleration and add full AES
GCM and CCM support with TLS (PR 7018)
* Fixes for STM32 PKA use with ECC (PR 7098)
* Fixes for TLS 1.3 with crypto callbacks to offload KDF / HMAC operation
(PR 7070)
* Fix include path for FSP 3.5 on Renesas RA6M4 (PR 7101)
* Siphash x64 asm fix for use with older compilers (PR 7299)
* Fix for SGX build with SP (PR 7308)
* Fix to Make it mandatory that the cookie is sent back in new ClientHello
when seen in a HelloRetryRequest with (PR 7190)
* Fix for wrap around behavior with BIO pairs (PR 7169)
* OCSP fixes for parsing of response correctly when there was a revocation
reason and returning correct error value with date checks (PR 7241 & 7255)
* Fix build with NO_STDIO_FILESYSTEM and improve checks for XGETENV (PR
7150)
* Fix for DTLS sequence number and cookie when downgrading DTLS version (PR
7214)
* Fix for write_dup use with chacha-poly cipher suites (PR 7206)
* Fix for multiple handshake messages in one record failing with
OUT_OF_ORDER_E when downgrading from TLS 1.3 to TLS 1.2 (PR 7141)
* Fix for AES ECB build with Thumb and alignment (PR 7094)
* Fix for negotiate handshake until the end in wolfSSL_read/wolfSSL_write
if hitting an edge case with want read/write (PR 7237)
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.79
MAIN commitmail json YAML
audio/fasttracker2: Update to 1.79
Changes since v1.77.1
v1.79 - 18.03.2024
- Fullscreen mode code has been refactored, as I apparently had coded it the
wrong way. "Stretched" mode always fills the whole screen now too, and other
issues may have been fixed as well.
v1.78 - 17.03.2024
- Fixed: It was possible to deadlock the tracker by attempting to load samples
that had a filesize of zero bytes, or if the sample was in use by another
program.
- Fullscreen mode has received more bugfixes. Hopefully it should be better
now. Please note that the "stretched" mode does not fill the entire screen
in many cases. The mouse pixel mapping can also be off on some Linux systems.
Changes since v1.77.1
v1.79 - 18.03.2024
- Fullscreen mode code has been refactored, as I apparently had coded it the
wrong way. "Stretched" mode always fills the whole screen now too, and other
issues may have been fixed as well.
v1.78 - 17.03.2024
- Fixed: It was possible to deadlock the tracker by attempting to load samples
that had a filesize of zero bytes, or if the sample was in use by another
program.
- Fullscreen mode has received more bugfixes. Hopefully it should be better
now. Please note that the "stretched" mode does not fill the entire screen
in many cases. The mouse pixel mapping can also be off on some Linux systems.
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.77.1
MAIN commitmail json YAML
audio/fasttracker2: Update to 1.77.1
Changes since v1.76
v1.77 - 11.03.2024
- Fullscreen issues have been mostly resolved for Macs with a notch in the
display. It may still have a slight error in how the mouse maps to the
pixels on the screen, but it's still MUCH more usable than it was! Another
problem is that the mouse cursor can sometimes flicker for a split second
(temporarily change into the OS cursor, then back to the FT2 cursor). Also
fixed an issue with fullscreen on Linux, but some systems may still have
severe issues with the mouse position mapping...
- The 32-point sinc resampling interpolator was reduced to 16-point again
because of the trade-off not being big enough, and it was slightly wrongly
implemented and would alias a little bit in some cases. I'll implement a
better sinc interpolator in the future, if I ever stumble across a nice and
simple implementation. Please let me know if you have one!
- Windows/macOS: Updated SDL to v2.30.1
Changes since v1.76
v1.77 - 11.03.2024
- Fullscreen issues have been mostly resolved for Macs with a notch in the
display. It may still have a slight error in how the mouse maps to the
pixels on the screen, but it's still MUCH more usable than it was! Another
problem is that the mouse cursor can sometimes flicker for a split second
(temporarily change into the OS cursor, then back to the FT2 cursor). Also
fixed an issue with fullscreen on Linux, but some systems may still have
severe issues with the mouse position mapping...
- The 32-point sinc resampling interpolator was reduced to 16-point again
because of the trade-off not being big enough, and it was slightly wrongly
implemented and would alias a little bit in some cases. I'll implement a
better sinc interpolator in the future, if I ever stumble across a nice and
simple implementation. Please let me know if you have one!
- Windows/macOS: Updated SDL to v2.30.1
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.76
MAIN commitmail json YAML
audio/fasttracker2: Update to 1.76
Changes since v1.75
v1.76 - 23.02.2024
- The 16-point sinc resampling interpolator has been upgraded to 32-point for
better sound quality in the tracker (if you have selected "Sinc (32 point)").
This interpolator is so good that a lot of old XM tunes will sound muddy
because of lo-fi samples. I recommend that you experiment with the choice of
interpolators. "Cubic spline" is a good choice if you listen to a wide variety
of XMs, while "Sinc (32 point)" is the best option if you create your own
tunes using hi-fi samples, or if you mostly listen to XMs with hi-fi samples
(or if you can accept a muddy/filtered sound from lo-fi samples).
- Removed 32-bit specific code (32-bit binaries now support all features)
- Removed text fading from "about screen" (more is less)
- Windows/macOS: Updated SDL to v2.30.0
Changes since v1.75
v1.76 - 23.02.2024
- The 16-point sinc resampling interpolator has been upgraded to 32-point for
better sound quality in the tracker (if you have selected "Sinc (32 point)").
This interpolator is so good that a lot of old XM tunes will sound muddy
because of lo-fi samples. I recommend that you experiment with the choice of
interpolators. "Cubic spline" is a good choice if you listen to a wide variety
of XMs, while "Sinc (32 point)" is the best option if you create your own
tunes using hi-fi samples, or if you mostly listen to XMs with hi-fi samples
(or if you can accept a muddy/filtered sound from lo-fi samples).
- Removed 32-bit specific code (32-bit binaries now support all features)
- Removed text fading from "about screen" (more is less)
- Windows/macOS: Updated SDL to v2.30.0
MAIN commitmail json YAML
doc: Updated sysutils/eza to 0.18.6
MAIN commitmail json YAML
pkgsrc/sysutils/eza/Makefile@1.22
/
diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.19 / diff
pkgsrc/sysutils/eza/distinfo@1.20 / diff
pkgsrc/sysutils/eza/files/eza.1@1.11 / diff
pkgsrc/sysutils/eza/files/eza_colors-explanation.5@1.7 / diff
pkgsrc/sysutils/eza/files/eza_colors.5@1.8 / diff
pkgsrc/sysutils/eza/patches/patch-src_output_render_mod.rs deleted
pkgsrc/sysutils/eza/cargo-depends.mk@1.19 / diff
pkgsrc/sysutils/eza/distinfo@1.20 / diff
pkgsrc/sysutils/eza/files/eza.1@1.11 / diff
pkgsrc/sysutils/eza/files/eza_colors-explanation.5@1.7 / diff
pkgsrc/sysutils/eza/files/eza_colors.5@1.8 / diff
pkgsrc/sysutils/eza/patches/patch-src_output_render_mod.rs deleted
sysutils/eza: Update to 0.18.6
Changes since 0.18.6:
eza v0.18.6
Changelog
Bug Fixes
* NetBSD did not have fflagstostr and as such did not build properly
* Fix total-size option
* Add fortran to source filetypes
* Fix absolute_path() for broken symlinks
* Update line numbers in panic messages in tests
Features
* Add filetype and icon for age
* Adding icons for graphql extensions
* Add nim icons
* Use fsharp icon for fsproj files (similar to cs/csproj)
* Add new icons, diverse selection
* Adding more haskell related icons
* Adding more icons for docker specific files
* Adding more dockerfile icons
* Add --absolute flag
* Add shell completions for --absolute flag
Miscellaneous Tasks
* Cleaning dirs
* Release eza v0.18.6
Refactor
* Port grid and grid-details to new uutils-term-grid
Testing
* Add integration tests and powertests for --absolute flag
* Add directory symlink to tests/itest/
Build
* Bump log from 0.4.20 to 0.4.21
* Bump rayon from 1.8.1 to 1.9.0
Ci
* Add NetBSD to CI.
* Fix warnings.
* Add FreeBSD to CI.
* Add OpenBSD to CI.
Changes since 0.18.6:
eza v0.18.6
Changelog
Bug Fixes
* NetBSD did not have fflagstostr and as such did not build properly
* Fix total-size option
* Add fortran to source filetypes
* Fix absolute_path() for broken symlinks
* Update line numbers in panic messages in tests
Features
* Add filetype and icon for age
* Adding icons for graphql extensions
* Add nim icons
* Use fsharp icon for fsproj files (similar to cs/csproj)
* Add new icons, diverse selection
* Adding more haskell related icons
* Adding more icons for docker specific files
* Adding more dockerfile icons
* Add --absolute flag
* Add shell completions for --absolute flag
Miscellaneous Tasks
* Cleaning dirs
* Release eza v0.18.6
Refactor
* Port grid and grid-details to new uutils-term-grid
Testing
* Add integration tests and powertests for --absolute flag
* Add directory symlink to tests/itest/
Build
* Bump log from 0.4.20 to 0.4.21
* Bump rayon from 1.8.1 to 1.9.0
Ci
* Add NetBSD to CI.
* Fix warnings.
* Add FreeBSD to CI.
* Add OpenBSD to CI.
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.75
MAIN commitmail json YAML
audio/fasttracker2: Update to 1.75
Changes since v1.74
v1.75 - 08.01.2023
- Note transpose (block), instrument remapping (block), Cut Block (ALT+F3) and
Copy Block (ALT+F4) had issues if you had made a block selection in the last
channel/track in a pattern. Thanks to Roz for finding this and reporting it,
and sorry to all the people who may have had this bug without knowing what
was going on!
Changes since v1.74
v1.75 - 08.01.2023
- Note transpose (block), instrument remapping (block), Cut Block (ALT+F3) and
Copy Block (ALT+F4) had issues if you had made a block selection in the last
channel/track in a pattern. Thanks to Roz for finding this and reporting it,
and sorry to all the people who may have had this bug without knowing what
was going on!
MAIN commitmail json YAML
doc: Updated www/jira-cli to 1.5.1
MAIN commitmail json YAML
pkgsrc/www/jira-cli/Makefile@1.36
/
diff
pkgsrc/www/jira-cli/distinfo@1.9 / diff
pkgsrc/www/jira-cli/go-modules.mk@1.7 / diff
pkgsrc/www/jira-cli/distinfo@1.9 / diff
pkgsrc/www/jira-cli/go-modules.mk@1.7 / diff
www/jira-cli: Update to 1.5.1
Changes since 1.4.0:
v1.5.1
## What's Changed
- fix: Properly close created files by @beatbrot in #702
- fix: Skip auth type prompt if already set by @ankitpokhrel in #701
## New Contributors
- @beatbrot made their first contribution in #702
Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v1.5.0...v1.5.1
v1.5.0
This release brings the support for mTLS authentication along with some other features like setting affects version, updating the estimate, etc.
## What's added?
- feat: Enable issue edit to read body from stdin by @erpel in #619
- feat: Affects version by @damianoneill in #642
- feat: Add mtls authentication for client certificate auth by @markhatc- in
#615
- feat: Add support for updating the estimate by @chapmanc in #669
## What's fixed?
- fix: Issue with no-input on create by @ankitpokhrel in #655
- fix: Jira init broken due to authtype value by @ankitpokhrel in #694
- fix: Bring bearer back by @ankitpokhrel in #696
- fix: Respect jira timezone by @ankitpokhrel in #697
## Other changes
- chore: Bump go & alpine versions by @pbnj in #691
- ci: Upgrade workflow + linter by @ankitpokhrel in #695
- dep: Upgrade all by @ankitpokhrel in #643
## New Contributors
- @erpel made their first contribution in #619
- @damianoneill made their first contribution in #642
- @pbnj made their first contribution in #691
- @chapmanc made their first contribution in #669
Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v1.4.0...v1.5.0
Changes since 1.4.0:
v1.5.1
## What's Changed
- fix: Properly close created files by @beatbrot in #702
- fix: Skip auth type prompt if already set by @ankitpokhrel in #701
## New Contributors
- @beatbrot made their first contribution in #702
Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v1.5.0...v1.5.1
v1.5.0
This release brings the support for mTLS authentication along with some other features like setting affects version, updating the estimate, etc.
## What's added?
- feat: Enable issue edit to read body from stdin by @erpel in #619
- feat: Affects version by @damianoneill in #642
- feat: Add mtls authentication for client certificate auth by @markhatc- in
#615
- feat: Add support for updating the estimate by @chapmanc in #669
## What's fixed?
- fix: Issue with no-input on create by @ankitpokhrel in #655
- fix: Jira init broken due to authtype value by @ankitpokhrel in #694
- fix: Bring bearer back by @ankitpokhrel in #696
- fix: Respect jira timezone by @ankitpokhrel in #697
## Other changes
- chore: Bump go & alpine versions by @pbnj in #691
- ci: Upgrade workflow + linter by @ankitpokhrel in #695
- dep: Upgrade all by @ankitpokhrel in #643
## New Contributors
- @erpel made their first contribution in #619
- @damianoneill made their first contribution in #642
- @pbnj made their first contribution in #691
- @chapmanc made their first contribution in #669
Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v1.4.0...v1.5.0
MAIN commitmail json YAML
doc: Updated sysutils/htop to 3.3.0
MAIN commitmail json YAML
sysutils/htop: Update to 3.3.0
Changes since 3.2.2:
What's new in version 3.3.0
* Multiple refactorings and code improvements
* Shorten docker container IDs to 12 characters
* Settings: preserve empty header
* Fix execlp() argument without pointer cast
* OpenFilesScreen: Make column sizing dynamic for file size, offset and inode
* Add support for "truss" (FreeBSD equivalent of "strace")
* Darwin: add NetworkIOMeter support
* HeaderLayout: add "3 columns - 40/30/30", "... 30/40/30" & "... 30/30/40"
* Meter: use correct unicode characters for digit '9'
* Note in manual re default memory units of KiB
* Add column for process container name
* Add logic to filter the container name (+type) from the CGroup name
* Change NetworkIOMeter value unit from KiB/s to bytes/second
* Cap DiskIOMeter "utilisation" percentage at 100%
* PCP platform implementation of frontswap and zswap accounting
* Shorten podman/libpod container IDs to 12 characters
* Write configuration to temporary file first
* Incorporate shared memory in bar text
* Move shared memory next to used memory
* Correct order of memory meter in help
* Add recalculate to Ctrl-L refresh
* Update process list on thread visibility toggling
* Support dynamic screens with 'top-most' entities beyond processes
* Introduce Row and Table classes for screens beyond top-processes
* Rework ZramMeter and remove MeterClass.comprisedValues
* More robust logic for CPU process percentages (Linux & PCP)
* Show year as start time for processes older than a year
* Short-term fix for docker container detection
* default color preset: use bold blue for better visibility
* Document 'O' keyboard shortcut
* Implement logic for '--max-iterations'
* Update F5 key label on tab switch (Tree <-> List)
* Force re-sorting of the process list view after switching between list/treeview mode
* Linux: (hack) work around the fact that Zswapped pages may be SwapCached
* Linux: implement zswap support
* {Memory,Swap}Meter: add "compressed memory" metrics
* Darwin: add DiskIOMeter support
* Fix scroll relative to followed process
* ZramMeter: update bar mode
* Use shared real memory on FreeBSD
* Increase Search and Filter max string length to 128
* Improve CPU computation code
* Remove LXC special handling for the CPU count
* Create new File Descriptor meter
* PCP: add IRQ PSI meter
* Linux: add IRQ PSI meter
* Linux: highlight username if process has elevated privileges
* Add support for scheduling policies
* Add a systemd user meter to monitor user units.
* FreeBSD: remove duplicate zfs ARC size subtraction
Changes since 3.2.2:
What's new in version 3.3.0
* Multiple refactorings and code improvements
* Shorten docker container IDs to 12 characters
* Settings: preserve empty header
* Fix execlp() argument without pointer cast
* OpenFilesScreen: Make column sizing dynamic for file size, offset and inode
* Add support for "truss" (FreeBSD equivalent of "strace")
* Darwin: add NetworkIOMeter support
* HeaderLayout: add "3 columns - 40/30/30", "... 30/40/30" & "... 30/30/40"
* Meter: use correct unicode characters for digit '9'
* Note in manual re default memory units of KiB
* Add column for process container name
* Add logic to filter the container name (+type) from the CGroup name
* Change NetworkIOMeter value unit from KiB/s to bytes/second
* Cap DiskIOMeter "utilisation" percentage at 100%
* PCP platform implementation of frontswap and zswap accounting
* Shorten podman/libpod container IDs to 12 characters
* Write configuration to temporary file first
* Incorporate shared memory in bar text
* Move shared memory next to used memory
* Correct order of memory meter in help
* Add recalculate to Ctrl-L refresh
* Update process list on thread visibility toggling
* Support dynamic screens with 'top-most' entities beyond processes
* Introduce Row and Table classes for screens beyond top-processes
* Rework ZramMeter and remove MeterClass.comprisedValues
* More robust logic for CPU process percentages (Linux & PCP)
* Show year as start time for processes older than a year
* Short-term fix for docker container detection
* default color preset: use bold blue for better visibility
* Document 'O' keyboard shortcut
* Implement logic for '--max-iterations'
* Update F5 key label on tab switch (Tree <-> List)
* Force re-sorting of the process list view after switching between list/treeview mode
* Linux: (hack) work around the fact that Zswapped pages may be SwapCached
* Linux: implement zswap support
* {Memory,Swap}Meter: add "compressed memory" metrics
* Darwin: add DiskIOMeter support
* Fix scroll relative to followed process
* ZramMeter: update bar mode
* Use shared real memory on FreeBSD
* Increase Search and Filter max string length to 128
* Improve CPU computation code
* Remove LXC special handling for the CPU count
* Create new File Descriptor meter
* PCP: add IRQ PSI meter
* Linux: add IRQ PSI meter
* Linux: highlight username if process has elevated privileges
* Add support for scheduling policies
* Add a systemd user meter to monitor user units.
* FreeBSD: remove duplicate zfs ARC size subtraction
MAIN commitmail json YAML
doc: Updated audio/din to 58.1
MAIN commitmail json YAML
pkgsrc/audio/din/Makefile@1.50
/
diff
pkgsrc/audio/din/distinfo@1.34 / diff
pkgsrc/audio/din/patches/patch-src_Makefile.am@1.16 / diff
pkgsrc/audio/din/patches/patch-src_RtMidi.cpp deleted
pkgsrc/audio/din/distinfo@1.34 / diff
pkgsrc/audio/din/patches/patch-src_Makefile.am@1.16 / diff
pkgsrc/audio/din/patches/patch-src_RtMidi.cpp deleted
audio/din: Update to 58.1
Changes since 57:
DIN Is Noise 58:
/*
position affects velocity and acceleration vectors
instead of just velocity vectors
Menu > Drone Tools > Position affects Vectors
*\
/* rotate acceleration *\
/* rotation direction switch on velocity, accelerations *\
/* reverse orbital direction *\
* drone & voice volume displayed on microtonal keyboard is absolute not %
* improved documentation, see https://dinisnoise.org/docs/
:( fixed visual modulation behaviour on drones :)
- removed Boost library requirement to build DIN Is Noise from source code.
Changes since 57:
DIN Is Noise 58:
/*
position affects velocity and acceleration vectors
instead of just velocity vectors
Menu > Drone Tools > Position affects Vectors
*\
/* rotate acceleration *\
/* rotation direction switch on velocity, accelerations *\
/* reverse orbital direction *\
* drone & voice volume displayed on microtonal keyboard is absolute not %
* improved documentation, see https://dinisnoise.org/docs/
:( fixed visual modulation behaviour on drones :)
- removed Boost library requirement to build DIN Is Noise from source code.
MAIN commitmail json YAML
doc: Updated sysutils/eza to 0.17.0
MAIN commitmail json YAML
pkgsrc/sysutils/eza/Makefile@1.15
/
diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.12 / diff
pkgsrc/sysutils/eza/distinfo@1.13 / diff
pkgsrc/sysutils/eza/files/eza.1@1.9 / diff
pkgsrc/sysutils/eza/files/eza_colors.5@1.7 / diff
pkgsrc/sysutils/eza/patches/patch-src_output_render_mod.rs@1.1 / diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.12 / diff
pkgsrc/sysutils/eza/distinfo@1.13 / diff
pkgsrc/sysutils/eza/files/eza.1@1.9 / diff
pkgsrc/sysutils/eza/files/eza_colors.5@1.7 / diff
pkgsrc/sysutils/eza/patches/patch-src_output_render_mod.rs@1.1 / diff
sysutils/eza: Update to 0.17.0
Patch out incorrect call to fflagstostr(3) in NetBSD to avoid build breakage.
Changes since 0.16.3:
eza v0.17.3
Description
BREAKING CHANGES:
Extend the +<FORMAT> custom time style, accept an optional
...<newline><FORMAT_2> to support setting a different custom time
style for recent files.
* The behavior changes if the previous format string
already contains <newline>. Previously <newline>s are used as-is,
now the first newline will be interpreted as separation for non-recent
and recnet format; any content after the second newline, if any, are
simply ignored.
* The implementation rejects some previously accepted
inputs, primarily empty non-recent format string. --time-style=+
and --time-style='+<newline>' will now get a panic message.
Changelog
Bug Fixes
* Add color scale mode to the bash completions
* Add color scale mode to the fish completions
* Quote symbolic links correctly when their destinations contain spaces
Documentation
* Modify documentation about custom time style
Features
* Add BSD file flags
* Add Windows file attributes
* [breaking] Support different custom time style for non-recent/recent files
Miscellaneous Tasks
* Release eza v0.17.0
Testing
* Regen powertests
* Regenerate
* Add tests for non-recent/recent custom time style
* Update powertest expected help message output
Build
* Update flake.lock
* Bump DeterminateSystems/nix-installer-action from 8 to 9
* Bump once_cell from 1.18.0 to 1.19.0
* Bump libc from 0.2.150 to 0.2.151
Ci
* Remove labeler
Patch out incorrect call to fflagstostr(3) in NetBSD to avoid build breakage.
Changes since 0.16.3:
eza v0.17.3
Description
BREAKING CHANGES:
Extend the +<FORMAT> custom time style, accept an optional
...<newline><FORMAT_2> to support setting a different custom time
style for recent files.
* The behavior changes if the previous format string
already contains <newline>. Previously <newline>s are used as-is,
now the first newline will be interpreted as separation for non-recent
and recnet format; any content after the second newline, if any, are
simply ignored.
* The implementation rejects some previously accepted
inputs, primarily empty non-recent format string. --time-style=+
and --time-style='+<newline>' will now get a panic message.
Changelog
Bug Fixes
* Add color scale mode to the bash completions
* Add color scale mode to the fish completions
* Quote symbolic links correctly when their destinations contain spaces
Documentation
* Modify documentation about custom time style
Features
* Add BSD file flags
* Add Windows file attributes
* [breaking] Support different custom time style for non-recent/recent files
Miscellaneous Tasks
* Release eza v0.17.0
Testing
* Regen powertests
* Regenerate
* Add tests for non-recent/recent custom time style
* Update powertest expected help message output
Build
* Update flake.lock
* Bump DeterminateSystems/nix-installer-action from 8 to 9
* Bump once_cell from 1.18.0 to 1.19.0
* Bump libc from 0.2.150 to 0.2.151
Ci
* Remove labeler
MAIN commitmail json YAML
doc: Updated sysutils/eza to 0.16.3
MAIN commitmail json YAML
pkgsrc/sysutils/eza/Makefile@1.14
/
diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.11 / diff
pkgsrc/sysutils/eza/distinfo@1.12 / diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.11 / diff
pkgsrc/sysutils/eza/distinfo@1.12 / diff
sysutils/eza: Update to 0.16.3
Changes since 0.16.2:
eza v0.16.3
Changelog
[0.16.3] - 2023-12-07
Bug Fixes
* Add bare git_repos fn if feature git is disabled
* Fixing color of size unit
* Color-scale broked size for colors
Miscellaneous Tasks
* Release eza v0.16.3
Testing
* Fix powertests post-release
Build
* Bump percent-encoding from 2.3.0 to 2.3.1
* Bump actions/labeler from 4 to 5
Changes since 0.16.2:
eza v0.16.3
Changelog
[0.16.3] - 2023-12-07
Bug Fixes
* Add bare git_repos fn if feature git is disabled
* Fixing color of size unit
* Color-scale broked size for colors
Miscellaneous Tasks
* Release eza v0.16.3
Testing
* Fix powertests post-release
Build
* Bump percent-encoding from 2.3.0 to 2.3.1
* Bump actions/labeler from 4 to 5
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.74
MAIN commitmail json YAML
audio/fasttracker2: Update to 1.74
Changes since v1.73
v1.74 - 16.12.2023
- Added a cubic spline audio interpolation option
- Windows/macOS: Updated SDL to v2.28.5
Changes since v1.73
v1.74 - 16.12.2023
- Added a cubic spline audio interpolation option
- Windows/macOS: Updated SDL to v2.28.5
MAIN commitmail json YAML
doc: Updated security/wolfssl to 5.6.6
MAIN commitmail json YAML
security/wolfssl: Update to 5.6.6
Changes since 5.6.4:
wolfSSL Release 5.6.6 (Dec 19, 2023)
NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
REMINDER: When working with AES Block Cipher algorithms, wc_AesInit() should
always be called first to initialize the Aes structure, before calling other
Aes API functions. Recently we found several places in our documentation,
comments, and codebase where this pattern was not observed. We have since
fixed this omission in several PRs for this release.
Vulnerabilities
* [Medium] CVE-2023-6935: After review of the previous RSA timing fix in
wolfSSL 5.6.4, additional changes were found to be required. A complete
resistant change is delivered in this release. This fix is for the Marvin
attack, leading to being able to decrypt a saved TLS connection and
potentially forge a signature after probing with a very large number of
trial connections. This issue is around RSA decryption and affects the
optional static RSA cipher suites on the server side, which are considered
weak, not recommended to be used and are off by default in wolfSSL (even
with --enable-all). Static RSA cipher suites were also removed from the
TLS 1.3 protocol and are only present in TLS 1.2 and lower. All padding
versions of RSA decrypt are affected since the code under review is
outside of the padding processing. Information about the private keys is
NOT compromised in affected code. It is recommended to disable static RSA
cipher suites and update the version of wolfSSL used if using RSA private
decryption alone outside of TLS. Thanks to Hubert Kario for the report.
The fix for this issue is located in the following GitHub Pull Request:
#6955.
* [Low] CVE-2023-6936: A potential heap overflow read is possible in servers
connecting over TLS 1.3 when the optional WOLFSSL_CALLBACKS has been
defined. The out of bounds read can occur when a server receives a
malicious malformed ClientHello. Users should either discontinue use of
WOLFSSL_CALLBACKS on the server side or update versions of wolfSSL to
5.6.6. Thanks to the tlspuffin fuzzer team for the report which was
designed and developed by; Lucca Hirschi (Inria, LORIA), Steve Kremer
(Inria, LORIA), and Max Ammann (Trail of Bits). The fix for this issue is
located in the following GitHub Pull Request: #6949.
* [Low] A side channel vulnerability with AES T-Tables is possible in a very
controlled environment where precision sub-cache-line inspection can
happen, such as inside an Intel SGX enclave. This can lead to recovery of
the AES key. To prevent this type of attack, wolfSSL added an AES
bitsliced implementation which can be enabled with the
"--enable-aes-bitsliced" configure option. Thanks to Florian Sieck,
Zhiyuan Zhang, Sebastian Berndt, Chitchanok Chuengsatiansup, Thomas
Eisenbarth, and Yuval Yarom for the report (Universities of Lübeck,
Melbourne, Adelaide and Bochum). The fix for this issue is located in the
following GitHub Pull Request: #6854.
* [Low] CVE-2023-6937: wolfSSL prior to 5.6.6 did not check that messages in
a single (D)TLS record do not span key boundaries. As a result, it was
possible to combine (D)TLS messages using different keys into one (D)TLS
record. The most extreme edge case is that, in (D)TLS 1.3, it was possible
that an unencrypted (D)TLS 1.3 record from the server containing first a
ServerHello message and then the rest of the first server flight would be
accepted by a wolfSSL client. In (D)TLS 1.3 the handshake is encrypted
after the ServerHello but a wolfSSL client would accept an unencrypted
flight from the server. This does not compromise key negotiation and
authentication so it is assigned a low severity rating. Thanks to Johannes
Wilson for the report (Sectra Communications and Linköping University).
The fix for this issue is located in the following GitHub Pull Request:
#7029.
New Feature Additions
* Build option for disabling CRL date checks (WOLFSSL_NO_CRL_DATE_CHECK)
(PR 6927)
* Support for STM32WL55 and improvements to PKA ECC support (PR 6937)
* Add option to skip cookie exchange on DTLS 1.3 session resumption
(PR 6929)
* Add implementation of SRTP KDF and SRTCP KDF (--enable-srtp-kdf) (PR 6888)
* Add wolfSSL_EXTENDED_KEY_USAGE_free() (PR 6916)
* Add AES bitsliced implementation that is cache attack safe
(--enable-aes-bitsliced) (PR 6854)
* Add memcached support and automated testing (PR 6430, 7022)
* Add Hardware Encryption Acceleration for ESP32-C3, ESP32-C6, and ESP32-S2
(PR 6990)
* Add (D)TLS 1.3 support for 0.5-RTT data (PR 7010)
Enhancements and Optimizations
* Better built in testing of “--sys-ca-certs” configure option (PR 6910)
* Updated CMakeLists.txt for Espressif wolfSSL component usage (PR 6877)
* Disable TLS 1.1 by default (unless SSL 3.0 or TLS 1.0 is enabled)
(PR 6946)
* Add “--enable-quic” to “--enable-all” configure option (PR 6957)
* Add support to SP C implementation for RSA exponent up to 64-bits
(PR 6959)
* Add result of “HAVE___UINT128_T” to options.h for CMake builds (PR 6965)
* Add optimized assembly for AES-GCM on ARM64 using hardware crypto
instructions (PR 6967)
* Add built-in cipher suite tests for DTLS 1.3 PQC (PR 6952)
* Add wolfCrypt test and unit test to ctest (PR 6977)
* Move OpenSSL compatibility crypto APIs into ssl_crypto.c file (PR 6935)
* Validate time generated from XGMTIME() (PR 6958)
* Allow wolfCrypt benchmark to run with microsecond accuracy (PR 6868)
* Add GitHub Actions testing with nginx 1.24.0 (PR 6982)
* Allow encoding of CA:FALSE BasicConstraint during cert generation
(PR 6953)
* Add CMake option to enable DTLS-SRTP (PR 6991)
* Add CMake options for enabling QUIC and cURL (PR 7049)
* Improve RSA blinding to make code more constant time (PR 6955)
* Refactor AES-NI implementation macros to allow dynamic fallback to C
(PR 6981)
* Default to native Windows threading API on MinGW (PR 7015)
* Return better error codes from OCSP response check (PR 7028)
* Updated Espressif ESP32 TLS client and server examples (PR 6844)
* Add/clean up support for ESP-IDF v5.1 for a variety of ESP32 chips
(PR 7035, 7037)
* Add API to choose dynamic certs based on client ciphers/sigalgs (PR 6963)
* Improve Arduino IDE 1.5 project file to match recursive style (PR 7007)
* Simplify and improve apple-universal build script (PR 7025)
Fixes
* Fix for async edge case with Intel QuickAssist/Cavium Nitrox (PR 6931)
* Fix for building PKCS#7 with RSA disabled (PR 6902)
* Fix for advancing output pointer in wolfSSL_i2d_X509() (PR 6891)
* Fix for EVP_EncodeBlock() appending a newline (PR 6900)
* Fix for wolfSSL_RSA_verify_PKCS1_PSS() with RSA_PSS_SALTLEN_AUTO (PR 6938)
* Fixes for CODESonar reports around isalpha() and isalnum() calls (PR 6810)
* Fix for SP ARM64 integer math to avoid compiler optimization issues
(PR 6942)
* Fix for SP Thumb2 inline assembly to add IAR build support (PR 6943, 6971)
* Fix for SP Thumb2 to make functions not inlined (PR 6993)
* Fix for SP Cortex-M assembly large build with IAR (PR 6954)
* Fix for SP ARM64 assembly montgomery reduction by 4 (PR 6947)
* Fix for SP ARM64 P-256 for not inlining functions for iOS compatibilit
(PR 6979)
* Fix for WOLFSSL_CALLBACKS and potential memory error (PR 6949)
* Fixes for wolfSSL’s Zephyr OS port (PR 6930)
* Fix for build errors when building for NXP mmCAU (FREESCALE_MMCAU)
(PR 6970)
* Fix for TLS 1.3 SendBuffered() return code in non-blocking mode (PR 7001)
* Fix for TLS Hmac_UpdateFinal() when padding byte is invalid (PR 6998)
* Fix for ARMv8 AES-GCM streaming to check size of IV before storing
(PR 6996)
* Add missing calls to wc_AesInit() before wc_AesSetKey() (PR 7011)
* Fix build errors with DTLS 1.3 enabled but TLS 1.2 disabled (PR 6976)
* Fixes for building wolfSSL in Visual Studio (PR 7040)
Changes since 5.6.4:
wolfSSL Release 5.6.6 (Dec 19, 2023)
NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
REMINDER: When working with AES Block Cipher algorithms, wc_AesInit() should
always be called first to initialize the Aes structure, before calling other
Aes API functions. Recently we found several places in our documentation,
comments, and codebase where this pattern was not observed. We have since
fixed this omission in several PRs for this release.
Vulnerabilities
* [Medium] CVE-2023-6935: After review of the previous RSA timing fix in
wolfSSL 5.6.4, additional changes were found to be required. A complete
resistant change is delivered in this release. This fix is for the Marvin
attack, leading to being able to decrypt a saved TLS connection and
potentially forge a signature after probing with a very large number of
trial connections. This issue is around RSA decryption and affects the
optional static RSA cipher suites on the server side, which are considered
weak, not recommended to be used and are off by default in wolfSSL (even
with --enable-all). Static RSA cipher suites were also removed from the
TLS 1.3 protocol and are only present in TLS 1.2 and lower. All padding
versions of RSA decrypt are affected since the code under review is
outside of the padding processing. Information about the private keys is
NOT compromised in affected code. It is recommended to disable static RSA
cipher suites and update the version of wolfSSL used if using RSA private
decryption alone outside of TLS. Thanks to Hubert Kario for the report.
The fix for this issue is located in the following GitHub Pull Request:
#6955.
* [Low] CVE-2023-6936: A potential heap overflow read is possible in servers
connecting over TLS 1.3 when the optional WOLFSSL_CALLBACKS has been
defined. The out of bounds read can occur when a server receives a
malicious malformed ClientHello. Users should either discontinue use of
WOLFSSL_CALLBACKS on the server side or update versions of wolfSSL to
5.6.6. Thanks to the tlspuffin fuzzer team for the report which was
designed and developed by; Lucca Hirschi (Inria, LORIA), Steve Kremer
(Inria, LORIA), and Max Ammann (Trail of Bits). The fix for this issue is
located in the following GitHub Pull Request: #6949.
* [Low] A side channel vulnerability with AES T-Tables is possible in a very
controlled environment where precision sub-cache-line inspection can
happen, such as inside an Intel SGX enclave. This can lead to recovery of
the AES key. To prevent this type of attack, wolfSSL added an AES
bitsliced implementation which can be enabled with the
"--enable-aes-bitsliced" configure option. Thanks to Florian Sieck,
Zhiyuan Zhang, Sebastian Berndt, Chitchanok Chuengsatiansup, Thomas
Eisenbarth, and Yuval Yarom for the report (Universities of Lübeck,
Melbourne, Adelaide and Bochum). The fix for this issue is located in the
following GitHub Pull Request: #6854.
* [Low] CVE-2023-6937: wolfSSL prior to 5.6.6 did not check that messages in
a single (D)TLS record do not span key boundaries. As a result, it was
possible to combine (D)TLS messages using different keys into one (D)TLS
record. The most extreme edge case is that, in (D)TLS 1.3, it was possible
that an unencrypted (D)TLS 1.3 record from the server containing first a
ServerHello message and then the rest of the first server flight would be
accepted by a wolfSSL client. In (D)TLS 1.3 the handshake is encrypted
after the ServerHello but a wolfSSL client would accept an unencrypted
flight from the server. This does not compromise key negotiation and
authentication so it is assigned a low severity rating. Thanks to Johannes
Wilson for the report (Sectra Communications and Linköping University).
The fix for this issue is located in the following GitHub Pull Request:
#7029.
New Feature Additions
* Build option for disabling CRL date checks (WOLFSSL_NO_CRL_DATE_CHECK)
(PR 6927)
* Support for STM32WL55 and improvements to PKA ECC support (PR 6937)
* Add option to skip cookie exchange on DTLS 1.3 session resumption
(PR 6929)
* Add implementation of SRTP KDF and SRTCP KDF (--enable-srtp-kdf) (PR 6888)
* Add wolfSSL_EXTENDED_KEY_USAGE_free() (PR 6916)
* Add AES bitsliced implementation that is cache attack safe
(--enable-aes-bitsliced) (PR 6854)
* Add memcached support and automated testing (PR 6430, 7022)
* Add Hardware Encryption Acceleration for ESP32-C3, ESP32-C6, and ESP32-S2
(PR 6990)
* Add (D)TLS 1.3 support for 0.5-RTT data (PR 7010)
Enhancements and Optimizations
* Better built in testing of “--sys-ca-certs” configure option (PR 6910)
* Updated CMakeLists.txt for Espressif wolfSSL component usage (PR 6877)
* Disable TLS 1.1 by default (unless SSL 3.0 or TLS 1.0 is enabled)
(PR 6946)
* Add “--enable-quic” to “--enable-all” configure option (PR 6957)
* Add support to SP C implementation for RSA exponent up to 64-bits
(PR 6959)
* Add result of “HAVE___UINT128_T” to options.h for CMake builds (PR 6965)
* Add optimized assembly for AES-GCM on ARM64 using hardware crypto
instructions (PR 6967)
* Add built-in cipher suite tests for DTLS 1.3 PQC (PR 6952)
* Add wolfCrypt test and unit test to ctest (PR 6977)
* Move OpenSSL compatibility crypto APIs into ssl_crypto.c file (PR 6935)
* Validate time generated from XGMTIME() (PR 6958)
* Allow wolfCrypt benchmark to run with microsecond accuracy (PR 6868)
* Add GitHub Actions testing with nginx 1.24.0 (PR 6982)
* Allow encoding of CA:FALSE BasicConstraint during cert generation
(PR 6953)
* Add CMake option to enable DTLS-SRTP (PR 6991)
* Add CMake options for enabling QUIC and cURL (PR 7049)
* Improve RSA blinding to make code more constant time (PR 6955)
* Refactor AES-NI implementation macros to allow dynamic fallback to C
(PR 6981)
* Default to native Windows threading API on MinGW (PR 7015)
* Return better error codes from OCSP response check (PR 7028)
* Updated Espressif ESP32 TLS client and server examples (PR 6844)
* Add/clean up support for ESP-IDF v5.1 for a variety of ESP32 chips
(PR 7035, 7037)
* Add API to choose dynamic certs based on client ciphers/sigalgs (PR 6963)
* Improve Arduino IDE 1.5 project file to match recursive style (PR 7007)
* Simplify and improve apple-universal build script (PR 7025)
Fixes
* Fix for async edge case with Intel QuickAssist/Cavium Nitrox (PR 6931)
* Fix for building PKCS#7 with RSA disabled (PR 6902)
* Fix for advancing output pointer in wolfSSL_i2d_X509() (PR 6891)
* Fix for EVP_EncodeBlock() appending a newline (PR 6900)
* Fix for wolfSSL_RSA_verify_PKCS1_PSS() with RSA_PSS_SALTLEN_AUTO (PR 6938)
* Fixes for CODESonar reports around isalpha() and isalnum() calls (PR 6810)
* Fix for SP ARM64 integer math to avoid compiler optimization issues
(PR 6942)
* Fix for SP Thumb2 inline assembly to add IAR build support (PR 6943, 6971)
* Fix for SP Thumb2 to make functions not inlined (PR 6993)
* Fix for SP Cortex-M assembly large build with IAR (PR 6954)
* Fix for SP ARM64 assembly montgomery reduction by 4 (PR 6947)
* Fix for SP ARM64 P-256 for not inlining functions for iOS compatibilit
(PR 6979)
* Fix for WOLFSSL_CALLBACKS and potential memory error (PR 6949)
* Fixes for wolfSSL’s Zephyr OS port (PR 6930)
* Fix for build errors when building for NXP mmCAU (FREESCALE_MMCAU)
(PR 6970)
* Fix for TLS 1.3 SendBuffered() return code in non-blocking mode (PR 7001)
* Fix for TLS Hmac_UpdateFinal() when padding byte is invalid (PR 6998)
* Fix for ARMv8 AES-GCM streaming to check size of IV before storing
(PR 6996)
* Add missing calls to wc_AesInit() before wc_AesSetKey() (PR 7011)
* Fix build errors with DTLS 1.3 enabled but TLS 1.2 disabled (PR 6976)
* Fixes for building wolfSSL in Visual Studio (PR 7040)
MAIN commitmail json YAML
doc: Updated sysutils/eza to 0.16.2
MAIN commitmail json YAML
pkgsrc/sysutils/eza/Makefile@1.13
/
diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.10 / diff
pkgsrc/sysutils/eza/distinfo@1.11 / diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.10 / diff
pkgsrc/sysutils/eza/distinfo@1.11 / diff
sysutils/eza: Update to 0.16.2
Changes since 0.16.1:
eza v0.16.2
Changelog
[0.16.2] - 2023-11-30
Bug Fixes
* Calculate width correctly when using grid icons & classify
* Fix the windows build
Miscellaneous Tasks
* Release eza v0.16.2
Testing
* Fix version tests
Build
* Bump webiny/action-conventional-commits from 1.1.0 to 1.2.0
* Bump DeterminateSystems/nix-installer-action from 7 to 8
* Bump windows-sys from 0.48.0 to 0.52.0
Changes since 0.16.1:
eza v0.16.2
Changelog
[0.16.2] - 2023-11-30
Bug Fixes
* Calculate width correctly when using grid icons & classify
* Fix the windows build
Miscellaneous Tasks
* Release eza v0.16.2
Testing
* Fix version tests
Build
* Bump webiny/action-conventional-commits from 1.1.0 to 1.2.0
* Bump DeterminateSystems/nix-installer-action from 7 to 8
* Bump windows-sys from 0.48.0 to 0.52.0
MAIN commitmail json YAML
doc: Updated sysutils/eza to 0.16.1
MAIN commitmail json YAML
pkgsrc/sysutils/eza/Makefile@1.12
/
diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.9 / diff
pkgsrc/sysutils/eza/distinfo@1.10 / diff
pkgsrc/sysutils/eza/files/eza.1@1.8 / diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.9 / diff
pkgsrc/sysutils/eza/distinfo@1.10 / diff
pkgsrc/sysutils/eza/files/eza.1@1.8 / diff
sysutils/eza: Update to 0.16.1
Changes since 0.16.0:
eza v0.16.1
Description
Changelog
Bug Fixes
* Don't panic with todo!() on inaccessible dir
* Don't panic if the btime of a file is Err
* Lifetime annotations and manpage/shell completion nits
* Reflow help
Features
* Handle formatting and display of binary extended attributes.
* Add netbsd and freebsd support for extended attributes
Miscellaneous Tasks
* Update flake inputs
* Release eza v0.16.1
Testing
* Vars mocking
* Display and meta options
* Filtering and sorting
* Long view options
* Regenerate --help tests
Build
* Sign release tags
Changes since 0.16.0:
eza v0.16.1
Description
Changelog
Bug Fixes
* Don't panic with todo!() on inaccessible dir
* Don't panic if the btime of a file is Err
* Lifetime annotations and manpage/shell completion nits
* Reflow help
Features
* Handle formatting and display of binary extended attributes.
* Add netbsd and freebsd support for extended attributes
Miscellaneous Tasks
* Update flake inputs
* Release eza v0.16.1
Testing
* Vars mocking
* Display and meta options
* Filtering and sorting
* Long view options
* Regenerate --help tests
Build
* Sign release tags
MAIN commitmail json YAML
doc: Updated sysutils/eza to 0.16.0
MAIN commitmail json YAML
pkgsrc/sysutils/eza/Makefile@1.11
/
diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.8 / diff
pkgsrc/sysutils/eza/distinfo@1.9 / diff
pkgsrc/sysutils/eza/files/eza.1@1.7 / diff
pkgsrc/sysutils/eza/files/eza_colors-explanation.5@1.6 / diff
pkgsrc/sysutils/eza/files/eza_colors.5@1.6 / diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.8 / diff
pkgsrc/sysutils/eza/distinfo@1.9 / diff
pkgsrc/sysutils/eza/files/eza.1@1.7 / diff
pkgsrc/sysutils/eza/files/eza_colors-explanation.5@1.6 / diff
pkgsrc/sysutils/eza/files/eza_colors.5@1.6 / diff
sysutils/eza: Update to 0.16.0
Changes since 0.15.0:
eza v0.16.0
Description
Updates once again :3
We fixed the accidental breaking change with --color-scale suddenly
requiring an argument introduced in v0.15.3, now it defaults to all.
Changelog
Bug Fixes
* Fix cross compilation
* Snap requires a base
* Move --smart-group to long view options
* Colo[u]r-scale didn't have a base value
* Fix snapcraft.yaml formatting
Documentation
* Add comments for bzip variants
* Added the fact that total-size is unix only
Features
* Add some file extensions
* Abort on panic (saving 0.1 M)
* Add powertest
Miscellaneous Tasks
* Ignore blame from #644
* Stabilize powertest version
Testing
* Implements tests using the generated directory
* Powertests using generated testdirs
* Add hashed versions of powertests
eza v0.15.3
Description
Adding to your weekly bug fixes, features and what not, let me introduce you
to --color-scale, which was just added.
Changelog
[0.15.3] - 2023-11-09
Bug Fixes
* Changed quote in --almost-all completion
* Reformat help.rs
* Allow unused macro rule arms
Documentation
* Improve CONTRIBUTING.md, README.md
* Improve README.md
* Introduce INSTALL.md
Features
* Create EZA_ICONS_AUTO environment variable
* Create EZA_ICONS_AUTO environment variable
* Demo gif and gif generation recipe
* Add ocaml icon filetypes
* Add PRQL
* Add --color-scale
Miscellaneous Tasks
* Add to CODEOWNERS file to make sure I get ping'd on files being touched
* Add myself to codeowners to watch modifications on parsing
* Improve the PR template
* Release eza v0.15.3
Refactor
* Remove commented out test code
* Finalize decay -> color_scale
Build
* Refactor flake
* Bump DeterminateSystems/nix-installer-action from 4 to 7
* Bump libc from 0.2.149 to 0.2.150
* Bump rustix from 0.38.13 to 0.38.21
Ci
* Refactor pre-commit-hooks
* Refactor publish workflow
eza v0.15.2
Bug Fixes
* Correct width when --no-quotes is used
* Clippy lint and add option to grid-details
* --smart-group only worked for current user
Features
* Add Typst to the recognized files
Miscellaneous Tasks
* Release eza v0.15.2
Refactor
* Replace lazy_static with once_cell
* Replace plain values with TextColours
Testing
* Added more content to the dir generator
* Changed size of one of the files
eza v0.15.1
Now with --total-size (size of all files in directories)
Changelog
Bug Fixes
* Fmt, windows, and nix fixes
* Reverted autofmt changes
* Don窶冲 display target窶冱 size if we窶决e not dereferencing
* Updated match indents
* Changed flag name
* Only store top-level recursive dir size
* Changed windows methods
* Underscored unused windows variables
* Added device for filesystem to hashmap
* Display offset for filenames with spaces
* Fix clippy warnings
* Fix doc-tests on RecursiveSize
* Fix dead_code warnings on Windows
Documentation
* Added flag to readme
* Added flag to man
* Fix doc-tests formatting and address other documentation review requests
Features
* Added recursive directory parser
* Added flag to completions
* Add a new filetype for source code files
* Add a new icons for source code files and other files
* Support for displaying blocksize on directories
Miscellaneous Tasks
* Release eza v0.15.1
Refactor
* Move total-size calculations to File
* Add RecursiveSize type to simplify total-size calculation
Changes since 0.15.0:
eza v0.16.0
Description
Updates once again :3
We fixed the accidental breaking change with --color-scale suddenly
requiring an argument introduced in v0.15.3, now it defaults to all.
Changelog
Bug Fixes
* Fix cross compilation
* Snap requires a base
* Move --smart-group to long view options
* Colo[u]r-scale didn't have a base value
* Fix snapcraft.yaml formatting
Documentation
* Add comments for bzip variants
* Added the fact that total-size is unix only
Features
* Add some file extensions
* Abort on panic (saving 0.1 M)
* Add powertest
Miscellaneous Tasks
* Ignore blame from #644
* Stabilize powertest version
Testing
* Implements tests using the generated directory
* Powertests using generated testdirs
* Add hashed versions of powertests
eza v0.15.3
Description
Adding to your weekly bug fixes, features and what not, let me introduce you
to --color-scale, which was just added.
Changelog
[0.15.3] - 2023-11-09
Bug Fixes
* Changed quote in --almost-all completion
* Reformat help.rs
* Allow unused macro rule arms
Documentation
* Improve CONTRIBUTING.md, README.md
* Improve README.md
* Introduce INSTALL.md
Features
* Create EZA_ICONS_AUTO environment variable
* Create EZA_ICONS_AUTO environment variable
* Demo gif and gif generation recipe
* Add ocaml icon filetypes
* Add PRQL
* Add --color-scale
Miscellaneous Tasks
* Add to CODEOWNERS file to make sure I get ping'd on files being touched
* Add myself to codeowners to watch modifications on parsing
* Improve the PR template
* Release eza v0.15.3
Refactor
* Remove commented out test code
* Finalize decay -> color_scale
Build
* Refactor flake
* Bump DeterminateSystems/nix-installer-action from 4 to 7
* Bump libc from 0.2.149 to 0.2.150
* Bump rustix from 0.38.13 to 0.38.21
Ci
* Refactor pre-commit-hooks
* Refactor publish workflow
eza v0.15.2
Bug Fixes
* Correct width when --no-quotes is used
* Clippy lint and add option to grid-details
* --smart-group only worked for current user
Features
* Add Typst to the recognized files
Miscellaneous Tasks
* Release eza v0.15.2
Refactor
* Replace lazy_static with once_cell
* Replace plain values with TextColours
Testing
* Added more content to the dir generator
* Changed size of one of the files
eza v0.15.1
Now with --total-size (size of all files in directories)
Changelog
Bug Fixes
* Fmt, windows, and nix fixes
* Reverted autofmt changes
* Don窶冲 display target窶冱 size if we窶决e not dereferencing
* Updated match indents
* Changed flag name
* Only store top-level recursive dir size
* Changed windows methods
* Underscored unused windows variables
* Added device for filesystem to hashmap
* Display offset for filenames with spaces
* Fix clippy warnings
* Fix doc-tests on RecursiveSize
* Fix dead_code warnings on Windows
Documentation
* Added flag to readme
* Added flag to man
* Fix doc-tests formatting and address other documentation review requests
Features
* Added recursive directory parser
* Added flag to completions
* Add a new filetype for source code files
* Add a new icons for source code files and other files
* Support for displaying blocksize on directories
Miscellaneous Tasks
* Release eza v0.15.1
Refactor
* Move total-size calculations to File
* Add RecursiveSize type to simplify total-size calculation
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.73
MAIN commitmail json YAML
audio/fasttracker2: Update to 1.73
Changes since v1.72.1
v1.73 - 30.10.2023
- Sample editor: Shift + mouse-wheel = scroll sample data view
- Windows/macOS: Updated SDL to v2.28.4
Changes since v1.72.1
v1.73 - 30.10.2023
- Sample editor: Shift + mouse-wheel = scroll sample data view
- Windows/macOS: Updated SDL to v2.28.4
MAIN commitmail json YAML
doc: Updated security/wolfssl to 5.6.4
MAIN commitmail json YAML
pkgsrc/security/wolfssl/Makefile@1.21
/
diff
pkgsrc/security/wolfssl/PLIST@1.13 / diff
pkgsrc/security/wolfssl/distinfo@1.22 / diff
pkgsrc/security/wolfssl/PLIST@1.13 / diff
pkgsrc/security/wolfssl/distinfo@1.22 / diff
security/wolfssl: Update to v5.6.4
Changes since v5.6.3:
wolfSSL Release 5.6.4 (October 30, 2023)
NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
* Old CyaSSL/CtaoCrypt shim layer was removed in this release (5.6.4)
Vulnerabilities
* [Medium] A fix was added, but still under review for completeness, for a
Bleichenbacher style attack, leading to being able to decrypt a saved TLS
connection and potentially forge a signature after probing with a large
number of trial connections. This issue is around RSA decryption and
affects static RSA cipher suites on the server side, which are not
recommended to be used and are off by default. Static RSA cipher suites
were also removed from the TLS 1.3 protocol and only present in TLS 1.2
and lower. All padding versions of RSA decrypt are affected since the code
under review is outside of the padding processing. Information about the
private keys is NOT compromised in affected code. It's recommended to
disable static RSA cipher suites and update the version of wolfSSL used if
using RSA private decryption alone outside of TLS. The fix is located in
this pull request (#6896)
New Feature Additions
* DTLS 1.3 PQC: support fragmenting the second ClientHello message. This
allows arbitrarily long keys to be used, opening up support for all PQC
ciphersuites in DTLS 1.3.
* SM2/SM3/SM4: Chinese cipher support including TLS 1.3 and 1.2 cipher
suites. SM2 SP implementation available.
* Ability to parse ASN1 only with SMIME_read_PKCS7
* Added support for MemUse Entropy on Windows
* Added Ada Bindings for wolfSSL
* Added a PEM example that converts to and from DER/PEM.
* Added LMS/HSS and XMSS/XMSS^MT wolfcrypt hooks, both normal and
verify-only options.
* Added support for the AES EAX mode of operation
* Port for use with Hitch (https://github.com/varnish/hitch) added
* Add XTS API's to handle multiple sectors in new port ot VeraCrypt
Enhancements and Optimizations
* Turned on SNI by default on hosts with resources
* Improved support for Silicon Labs Simplicity Studio and the ERF32 Gecko
SDK
* Thumb-2 and ARM32 Curve25519 and Ed25519 assembly have significantly
improved performance.
* Thumb-2 AES assembly code added.
* Thumb-2 and ARM32 SP implementations of RSA, DH and ECC have
significantly improved performance.
* Minor performance improvements to SP ECC for Intel x64.
* AES-XTS assembly code added for Intel x64, Aarch64 and ARM32.
* Added support for X963 KDFs to ECIES.
* Added 32-bit type only implementation of AES GMULT using tables.
* Add support for nginx version 1.25.0
* Add support for Kerberos version 5 1.21.1
* Check all CRL entries in case a single issuer has multiple CRL's loaded
* CRL verify the entire chain including loaded CA's
* Added example for building wolfSSL as an Apple universal binary
framework using configure
* Sniffer tool now supports decrypting TLS sessions using secrets obtained
from a SSLKEYLOGFILE
* Updates made for EBSNET port
* Update "--enable-jni" to include additional defines for expanded JNI
support. Also includes JCE and JSSE builds under the single enable option
now.
Fixes
* Fixed error handling when decrypted pre-master secret is too long when
using static RSA.
* Added a fix for keymod use with i.MX RT1170 CAAM blobs
* Added a fix for AES-GCM use with Petalinux Xilinx
* Fixed wc_SignatureGenerate_ex to not call verify twice
* Fixed wolfCrypt FIPS DLL on Win32
* Fixed TFM math library big-endian reading implementation when a zero
length buffer is passed in.
* Fixed NO_CERT configurations to build correctly.
* Fixed ARM AES-GCM streaming assembly when 窶兎nable-opensslextra defined.
* Added modulus checks to heap math implementation of mp_exptmod().
* Fixed Windows assembly code to handle that certain XMM registers are
non-volatile.
* Aarch64 SP ECC implementation of sp_256_mont_dbl_4 has the register list
for the assembly code fixed to include all used registers.
* mp_sqrt_mod_prime fixed to limit the number of iterations of a loop to
handle malicious non-prime values being passed in.
* Ignore session ID's shorter than 32 bytes instead of erroring out
Changes since v5.6.3:
wolfSSL Release 5.6.4 (October 30, 2023)
NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
* Old CyaSSL/CtaoCrypt shim layer was removed in this release (5.6.4)
Vulnerabilities
* [Medium] A fix was added, but still under review for completeness, for a
Bleichenbacher style attack, leading to being able to decrypt a saved TLS
connection and potentially forge a signature after probing with a large
number of trial connections. This issue is around RSA decryption and
affects static RSA cipher suites on the server side, which are not
recommended to be used and are off by default. Static RSA cipher suites
were also removed from the TLS 1.3 protocol and only present in TLS 1.2
and lower. All padding versions of RSA decrypt are affected since the code
under review is outside of the padding processing. Information about the
private keys is NOT compromised in affected code. It's recommended to
disable static RSA cipher suites and update the version of wolfSSL used if
using RSA private decryption alone outside of TLS. The fix is located in
this pull request (#6896)
New Feature Additions
* DTLS 1.3 PQC: support fragmenting the second ClientHello message. This
allows arbitrarily long keys to be used, opening up support for all PQC
ciphersuites in DTLS 1.3.
* SM2/SM3/SM4: Chinese cipher support including TLS 1.3 and 1.2 cipher
suites. SM2 SP implementation available.
* Ability to parse ASN1 only with SMIME_read_PKCS7
* Added support for MemUse Entropy on Windows
* Added Ada Bindings for wolfSSL
* Added a PEM example that converts to and from DER/PEM.
* Added LMS/HSS and XMSS/XMSS^MT wolfcrypt hooks, both normal and
verify-only options.
* Added support for the AES EAX mode of operation
* Port for use with Hitch (https://github.com/varnish/hitch) added
* Add XTS API's to handle multiple sectors in new port ot VeraCrypt
Enhancements and Optimizations
* Turned on SNI by default on hosts with resources
* Improved support for Silicon Labs Simplicity Studio and the ERF32 Gecko
SDK
* Thumb-2 and ARM32 Curve25519 and Ed25519 assembly have significantly
improved performance.
* Thumb-2 AES assembly code added.
* Thumb-2 and ARM32 SP implementations of RSA, DH and ECC have
significantly improved performance.
* Minor performance improvements to SP ECC for Intel x64.
* AES-XTS assembly code added for Intel x64, Aarch64 and ARM32.
* Added support for X963 KDFs to ECIES.
* Added 32-bit type only implementation of AES GMULT using tables.
* Add support for nginx version 1.25.0
* Add support for Kerberos version 5 1.21.1
* Check all CRL entries in case a single issuer has multiple CRL's loaded
* CRL verify the entire chain including loaded CA's
* Added example for building wolfSSL as an Apple universal binary
framework using configure
* Sniffer tool now supports decrypting TLS sessions using secrets obtained
from a SSLKEYLOGFILE
* Updates made for EBSNET port
* Update "--enable-jni" to include additional defines for expanded JNI
support. Also includes JCE and JSSE builds under the single enable option
now.
Fixes
* Fixed error handling when decrypted pre-master secret is too long when
using static RSA.
* Added a fix for keymod use with i.MX RT1170 CAAM blobs
* Added a fix for AES-GCM use with Petalinux Xilinx
* Fixed wc_SignatureGenerate_ex to not call verify twice
* Fixed wolfCrypt FIPS DLL on Win32
* Fixed TFM math library big-endian reading implementation when a zero
length buffer is passed in.
* Fixed NO_CERT configurations to build correctly.
* Fixed ARM AES-GCM streaming assembly when 窶兎nable-opensslextra defined.
* Added modulus checks to heap math implementation of mp_exptmod().
* Fixed Windows assembly code to handle that certain XMM registers are
non-volatile.
* Aarch64 SP ECC implementation of sp_256_mont_dbl_4 has the register list
for the assembly code fixed to include all used registers.
* mp_sqrt_mod_prime fixed to limit the number of iterations of a loop to
handle malicious non-prime values being passed in.
* Ignore session ID's shorter than 32 bytes instead of erroring out
MAIN commitmail json YAML
doc: Updated textproc/bat to 0.24.0
MAIN commitmail json YAML
pkgsrc/textproc/bat/Makefile@1.34
/
diff
pkgsrc/textproc/bat/cargo-depends.mk@1.9 / diff
pkgsrc/textproc/bat/distinfo@1.25 / diff
pkgsrc/textproc/bat/patches/patch-Cargo.toml deleted
pkgsrc/textproc/bat/cargo-depends.mk@1.9 / diff
pkgsrc/textproc/bat/distinfo@1.25 / diff
pkgsrc/textproc/bat/patches/patch-Cargo.toml deleted
textproc/bat: Update to 0.24.0
Changes since 0.23.0:
v0.24.0
Features
* Add environment variable BAT_PAGING, see #2629 (@einfachIrgendwer0815)
* Add opt-in (--features lessopen) support for LESSOPEN and LESSCLOSE.
See #1597, #1739, #2444, #2602, and #2662 (@Anomalocaridid)
Bugfixes
* Fix more not being found on Windows when provided via BAT_PAGER, see
#2570, #2580, and #2651 (@mataha)
* Switched default behavior of --map-syntax to be case insensitive #2520
* Updated version of serde_yaml to 0.9. See #2627 (@Raghav-Bell)
* Fix arithmetic overflow in LineRange::from and LineRange::parse_range,
see #2674, #2698 (@skoriop)
* Fix paging not happening when stdout is interactive but stdin is not,
see #2574 (@Nigecat)
* Make -pp override --paging and vice versa when passed as a later argument,
see #2660 (@J-Kappes)
Other
* Output directory for generated assets (completion, manual) can be
customized, see #2515 (@tranzystorek-io)
* Use the is-terminal crate instead of atty, see #2530 (@nickelc)
* Add Winget Releaser workflow, see #2519 (@sitiom)
* Bump MSRV to 1.70, see #2651 (@mataha)
Syntaxes
* Associate os-release with bash syntax, see #2587 (@cyqsimon)
* Associate Containerfile with Dockerfile syntax, see #2606
(@einfachIrgendwer0815)
* Replaced quotes with double quotes so fzf integration example script
works on windows and linux. see #2095 (@johnmatthiggins)
* Associate ksh files with bash syntax, see #2633 (@johnmatthiggins)
* Associate sarif files with JSON syntax, see #2695 (@rhysd)
* Associate ron files with rust syntax, see #2427 (@YeungOnion)
* Add support for WebGPU Shader Language, see #2692 (@rhysd)
* Add .dpkg-new and .dpkg-tmp to ignored suffixe, see #2595 (@scop)
* fix: Add syntax mapping *.jsonl => json, see #2539 (@WinterCore)
* Update Julia syntax, see #2553 (@dependabot)
* add NSIS support, see #2577 (@idleberg)
* Update ssh-config, see #2697 (@mrmeszaros)
bat as a library
* Add optional output_buffer arg to Controller::run() and
Controller::run_with_error_handler(), see #2618 (@Piturnah)
Changes since 0.23.0:
v0.24.0
Features
* Add environment variable BAT_PAGING, see #2629 (@einfachIrgendwer0815)
* Add opt-in (--features lessopen) support for LESSOPEN and LESSCLOSE.
See #1597, #1739, #2444, #2602, and #2662 (@Anomalocaridid)
Bugfixes
* Fix more not being found on Windows when provided via BAT_PAGER, see
#2570, #2580, and #2651 (@mataha)
* Switched default behavior of --map-syntax to be case insensitive #2520
* Updated version of serde_yaml to 0.9. See #2627 (@Raghav-Bell)
* Fix arithmetic overflow in LineRange::from and LineRange::parse_range,
see #2674, #2698 (@skoriop)
* Fix paging not happening when stdout is interactive but stdin is not,
see #2574 (@Nigecat)
* Make -pp override --paging and vice versa when passed as a later argument,
see #2660 (@J-Kappes)
Other
* Output directory for generated assets (completion, manual) can be
customized, see #2515 (@tranzystorek-io)
* Use the is-terminal crate instead of atty, see #2530 (@nickelc)
* Add Winget Releaser workflow, see #2519 (@sitiom)
* Bump MSRV to 1.70, see #2651 (@mataha)
Syntaxes
* Associate os-release with bash syntax, see #2587 (@cyqsimon)
* Associate Containerfile with Dockerfile syntax, see #2606
(@einfachIrgendwer0815)
* Replaced quotes with double quotes so fzf integration example script
works on windows and linux. see #2095 (@johnmatthiggins)
* Associate ksh files with bash syntax, see #2633 (@johnmatthiggins)
* Associate sarif files with JSON syntax, see #2695 (@rhysd)
* Associate ron files with rust syntax, see #2427 (@YeungOnion)
* Add support for WebGPU Shader Language, see #2692 (@rhysd)
* Add .dpkg-new and .dpkg-tmp to ignored suffixe, see #2595 (@scop)
* fix: Add syntax mapping *.jsonl => json, see #2539 (@WinterCore)
* Update Julia syntax, see #2553 (@dependabot)
* add NSIS support, see #2577 (@idleberg)
* Update ssh-config, see #2697 (@mrmeszaros)
bat as a library
* Add optional output_buffer arg to Controller::run() and
Controller::run_with_error_handler(), see #2618 (@Piturnah)
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.72.1
MAIN commitmail json YAML
pkgsrc/audio/fasttracker2/Makefile@1.110
/
diff
pkgsrc/audio/fasttracker2/distinfo@1.99 / diff
pkgsrc/audio/fasttracker2/patches/patch-CMakeLists.txt@1.7 / diff
pkgsrc/audio/fasttracker2/distinfo@1.99 / diff
pkgsrc/audio/fasttracker2/patches/patch-CMakeLists.txt@1.7 / diff
audio/fasttracker2: Update to 1.72.1
Changes since v1.69
v1.72 - 07.10.2023
- Block Cut (ALT+F3) and Block Copy (ALT+F4) was broken in v1.70
v1.71 - 04.10.2023
- CTRL+A/ALT+A keybindings were swapped (thanks to MIDRA2ADVANCE for telling me)
v1.70 - 01.10.2023
- Bugfix: Shrink Pattern ("Srnk.") could lead to a pattern length of 0
- Better variable sanitation for some pattern editing routines, may (?)
prevent some rare crashes.
- CTRL+F5 (Paste Pattern) had wrong button names in its message box when asking
to adjust the pattern length after pasting.
- Changed the above message box text to be easier to understand
- Removed audio dithering for 16-bit audio bit depth mode. It seemed to be
wrongly implemented anyway.
- Some small changes done to the about screen
- Windows/macOS: Updated SDL to v2.28.3
- Code cleanup
Changes since v1.69
v1.72 - 07.10.2023
- Block Cut (ALT+F3) and Block Copy (ALT+F4) was broken in v1.70
v1.71 - 04.10.2023
- CTRL+A/ALT+A keybindings were swapped (thanks to MIDRA2ADVANCE for telling me)
v1.70 - 01.10.2023
- Bugfix: Shrink Pattern ("Srnk.") could lead to a pattern length of 0
- Better variable sanitation for some pattern editing routines, may (?)
prevent some rare crashes.
- CTRL+F5 (Paste Pattern) had wrong button names in its message box when asking
to adjust the pattern length after pasting.
- Changed the above message box text to be easier to understand
- Removed audio dithering for 16-bit audio bit depth mode. It seemed to be
wrongly implemented anyway.
- Some small changes done to the about screen
- Windows/macOS: Updated SDL to v2.28.3
- Code cleanup
MAIN commitmail json YAML
doc: Updated sysutils/eza to 0.15.0
MAIN commitmail json YAML
pkgsrc/sysutils/eza/Makefile@1.9
/
diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.7 / diff
pkgsrc/sysutils/eza/distinfo@1.8 / diff
pkgsrc/sysutils/eza/files/eza.1@1.6 / diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.7 / diff
pkgsrc/sysutils/eza/distinfo@1.8 / diff
pkgsrc/sysutils/eza/files/eza.1@1.6 / diff
sysutils/eza: Update to 0.15.0
Changes since 0.14.2:
eza v0.15.0
Changelog
[0.15.0] - 2023-10-19
Bug Fixes
* Reenable debug symbols in debug builds
* Clippy lint
* Merge conflict with main
Documentation
* Correct color option spellings
Features
* Add option --smart-group
* Add completions, man for --smart-group
* Add icons=always,auto,never. dont display icons in a tty|piped
* Fix auto value for colors and icons + documentation
* [breaking] Remove --no-icons in favor of --icons=always,auto,never.
default is auto
Miscellaneous Tasks
* Upgrade to uutils_term_grid from unmaintained term_grid
* Release eza v0.15.0
Build
* Bump DeterminateSystems/nix-installer-action from 5 to 6
Ci
* Remove stalebot, is super annoying
* Adjust test case to icons=auto (no icons should show due to tty)
Changes since 0.14.2:
eza v0.15.0
Changelog
[0.15.0] - 2023-10-19
Bug Fixes
* Reenable debug symbols in debug builds
* Clippy lint
* Merge conflict with main
Documentation
* Correct color option spellings
Features
* Add option --smart-group
* Add completions, man for --smart-group
* Add icons=always,auto,never. dont display icons in a tty|piped
* Fix auto value for colors and icons + documentation
* [breaking] Remove --no-icons in favor of --icons=always,auto,never.
default is auto
Miscellaneous Tasks
* Upgrade to uutils_term_grid from unmaintained term_grid
* Release eza v0.15.0
Build
* Bump DeterminateSystems/nix-installer-action from 5 to 6
Ci
* Remove stalebot, is super annoying
* Adjust test case to icons=auto (no icons should show due to tty)
MAIN commitmail json YAML
pkgsrc/sysutils/eza/files/eza.1@1.5
/
diff
pkgsrc/sysutils/eza/files/eza_colors-explanation.5@1.5 / diff
pkgsrc/sysutils/eza/files/eza_colors.5@1.5 / diff
pkgsrc/sysutils/eza/files/eza_colors-explanation.5@1.5 / diff
pkgsrc/sysutils/eza/files/eza_colors.5@1.5 / diff
sysutils/eza: Update the man pages.
MAIN commitmail json YAML
doc: Updated sysutils/eza to 0.13.0
MAIN commitmail json YAML
pkgsrc/sysutils/eza/Makefile@1.7
/
diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.5 / diff
pkgsrc/sysutils/eza/distinfo@1.6 / diff
pkgsrc/sysutils/eza/files/eza.1@1.4 / diff
pkgsrc/sysutils/eza/files/eza_colors-explanation.5@1.4 / diff
pkgsrc/sysutils/eza/files/eza_colors.5@1.4 / diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.5 / diff
pkgsrc/sysutils/eza/distinfo@1.6 / diff
pkgsrc/sysutils/eza/files/eza.1@1.4 / diff
pkgsrc/sysutils/eza/files/eza_colors-explanation.5@1.4 / diff
pkgsrc/sysutils/eza/files/eza_colors.5@1.4 / diff
sysutils/eza: Update to 0.13.0
Changes since 0.12.0:
eza v0.13.0
Description breaking changes
Another Monday, another eza.
We're very close to having integration testing sorted, very very close.
That means clap is soon gonna be merged, and then we'll be proper into
the release candidate. Until then, we only had a slight breaking change,
and we assumed users would prefer getting updates.
BREAKING CHANGE: The style codes for huge file and units where
documented to be nt and ut but the code was using nh and uh.
The code has been updated to match the documented style codes.
EXA_COLORS using style codes nh and uh will need to be updated to
use nt and ut.
Changelog
Features
* Add completion files in deb packaging script
* Adds filtering for Windows hidden files
* Support --mount option on Mac
* Lazy loading of a files extended attributes and absolute path
Bug Fixes
* Crate can't contain broken symlink
* Remove executable flag from fish completion file
* Use proc_mounts only on linux
* Hotfix harmful documentation
* Fix hyperlinks on Windows
* Nix flake check also builds the package
* [breaking] Change number_huge and unit_huge to match the man page short codes
Documentation
* Added cafkafk suggestions
* Fix codeblocks in zsh completions
* Update README.md
* Document filetypes theme and rename trait
* Link directly to space
* Add Mac support for the --mount option in the man page
* Add SAFETY comments to unsafe code blocks
* Update deb instructions to use keyring
* Fix chmod in deb installation instructions
* Add potential gpg install to deb installation instructions
* Document character style pairs in the code and match with man page
* Add install instructions for Void Linux
* Documentation of 'sn' and 'sb' conflicted with later docs
* Document dimmed and italic style codes
Miscellaneous Tasks
* Augment gitter size in README
Performance
* Add criterion for benchmarking
Refactor
* Refactor just in crossfile
* DRY up justfile
* Ignore missing MSVC docker image
* Removed unused imports, mark mods as allow unused
* Format code
* Move ALL_MOUNTS to fs::mounts
* Migrate ALL_MOUNTS from lazy_static to OnceLock
Testing
* Stabalised unit-tests.yml
* Autogenerate testing dir
* Autogenerate test dirs
* Generate device files
* Add unit tests that test both exa and ls style codes together
* Address variable names
Build
* Add musl binary for linux
* Fix checksums
* Add TODOs to targets
* Set optlevel to 3
Ci
* Add nix Flake check to flake.yml
* Removed nix build in favor of nix flake check
* Include bash completion script in treefmt and fixed shellcheck formatting in completion script
* Fix windows build
* Fix spelling attemps -> attempts
New Contributors
* @cocoliliace made their first contribution in #322
* @raylu made their first contribution in #332
* @tranzystorek-io made their first contribution in #363
Full Changelog: https://github.com/eza-community/eza/compare/v0.12.0...v0.13.0
Changes since 0.12.0:
eza v0.13.0
Description breaking changes
Another Monday, another eza.
We're very close to having integration testing sorted, very very close.
That means clap is soon gonna be merged, and then we'll be proper into
the release candidate. Until then, we only had a slight breaking change,
and we assumed users would prefer getting updates.
BREAKING CHANGE: The style codes for huge file and units where
documented to be nt and ut but the code was using nh and uh.
The code has been updated to match the documented style codes.
EXA_COLORS using style codes nh and uh will need to be updated to
use nt and ut.
Changelog
Features
* Add completion files in deb packaging script
* Adds filtering for Windows hidden files
* Support --mount option on Mac
* Lazy loading of a files extended attributes and absolute path
Bug Fixes
* Crate can't contain broken symlink
* Remove executable flag from fish completion file
* Use proc_mounts only on linux
* Hotfix harmful documentation
* Fix hyperlinks on Windows
* Nix flake check also builds the package
* [breaking] Change number_huge and unit_huge to match the man page short codes
Documentation
* Added cafkafk suggestions
* Fix codeblocks in zsh completions
* Update README.md
* Document filetypes theme and rename trait
* Link directly to space
* Add Mac support for the --mount option in the man page
* Add SAFETY comments to unsafe code blocks
* Update deb instructions to use keyring
* Fix chmod in deb installation instructions
* Add potential gpg install to deb installation instructions
* Document character style pairs in the code and match with man page
* Add install instructions for Void Linux
* Documentation of 'sn' and 'sb' conflicted with later docs
* Document dimmed and italic style codes
Miscellaneous Tasks
* Augment gitter size in README
Performance
* Add criterion for benchmarking
Refactor
* Refactor just in crossfile
* DRY up justfile
* Ignore missing MSVC docker image
* Removed unused imports, mark mods as allow unused
* Format code
* Move ALL_MOUNTS to fs::mounts
* Migrate ALL_MOUNTS from lazy_static to OnceLock
Testing
* Stabalised unit-tests.yml
* Autogenerate testing dir
* Autogenerate test dirs
* Generate device files
* Add unit tests that test both exa and ls style codes together
* Address variable names
Build
* Add musl binary for linux
* Fix checksums
* Add TODOs to targets
* Set optlevel to 3
Ci
* Add nix Flake check to flake.yml
* Removed nix build in favor of nix flake check
* Include bash completion script in treefmt and fixed shellcheck formatting in completion script
* Fix windows build
* Fix spelling attemps -> attempts
New Contributors
* @cocoliliace made their first contribution in #322
* @raylu made their first contribution in #332
* @tranzystorek-io made their first contribution in #363
Full Changelog: https://github.com/eza-community/eza/compare/v0.12.0...v0.13.0
MAIN commitmail json YAML
doc: Updated sysutils/eza to 0.12.0
MAIN commitmail json YAML
pkgsrc/sysutils/eza/Makefile@1.6
/
diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.4 / diff
pkgsrc/sysutils/eza/distinfo@1.5 / diff
pkgsrc/sysutils/eza/files/eza.1@1.3 / diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.4 / diff
pkgsrc/sysutils/eza/distinfo@1.5 / diff
pkgsrc/sysutils/eza/files/eza.1@1.3 / diff
sysutils/eza: Update to 0.12.0
Changes since 0.11.1:
eza v0.12.0 (final rust v1.65 release)
Changelog
Bug Fixes
* Expand --all help
* RUSTSEC-2020-0071
* Generalize gitignore to ignore all eza deb packages
* Canonicalize errors when the destination of a symbolic link is bad
* Handle other canonicalize errors in hyperlinks and git
* Fix windows build when canonicalize returns an error
* Change trycmd config to use test/itest folder for testing
* Revert to old apt install command suggestion and add hint
* Remove stray backslashes
* Is_some_and is an unstable Rust feature until 1.70
* Revert "Support for Windows Hidden Files"
* Shellcheck warnings
* Revert "Support for Windows Hidden Files"
* Shellcheck warnings
* Exit 13 on os error 13
* Rewrite comment
* Improve trace strings
* Tracing typo
Documentation
* Expand --all documentation
* Add pthorpe92 gist
* Remove xtests section from readme
* Add deprecation warning to xtests/readme
* Add deprecation warning to just xtest commands
* Add deprecation warning to vagrantfile
* Add MacPorts install info
* Add gentoo
* Fix gentoo install
* Add docs for --git-repos & --git-repos-no-status
* Fix gpg armor flag for deb release in readme
* Add better explanation of git repos + no status
* Add scoop install info
* Remove color specifications. change unknown git repo status to ~
* Fix missing color specification from man page
Features
* Add audit workflow
* Add trycmd as dev-dependency
* Add minimal trycmd binary
* Add a few trycmd tests as example
* Document and change output for --git-repos
* Add apt installation workflow
* Adds filtering on Windows hidden files
* Adds filtering on Windows hidden files
* Adds filtering on Windows hidden files
* Added shellcheck to treefmt
* Adds filtering on Windows hidden files
* Add PERMISSION_DENIED exit code
Miscellaneous Tasks
* Bump chrono from 0.4.27 to 0.4.30
* Removal of xtests
* Removal of vagrant
* Remove deprecated devtools
* Run spellcheck
Refactor
* Over-engineer deb-package.sh
* Hide xtests folder
* Split trycmd into tests for all, unix and windows
* Limit unit-tests run on workflow change to unit-tests itself
* Moved generateTest.sh to devtools/
* Renamed the file
* Add tracing to various code parts
* Make std::process::exit global
Revert
* "Support for Windows Hidden Files"
Styling
* Remove TODO message on the absolute_path property
* Fix shellcheck issues in deb-package.sh
* Fix shellcheck issues in deb-package.sh
* Fix shellcheck issues in deb-package.sh
Testing
* Remove vhs from flake
* Remove vhs-runner files
* Dump trycmd from nix sandbox
* Fix name of trydump
* Add trycmd
* Add nix feature
* Add example long tests for sandbox
* Set itests files to unix epoch
* Set itest files to unix epoch
* Refactor setting unix epoch
* Auto discard old definitions
* Fix test reference
* Add long_all_nix.toml
* Add long_blocksize_nix.toml
* Add long_extended_nix.toml
* Add long_git_nix.toml
* Add long_git_repos_nix.toml
* Add long_git_repos_no_status_nix.toml
* Add long_grid_nix.toml
* Add long_header_nix.toml
* Add long_icons_nix.toml
* Add long_octal_nix.toml
* Add long_time_style_relative_nix.toml
* Freeze nix tests
* Fix trydump when no files to delete
* Adding more content to test
* Modified unix and all tests
* Regenerate nix tests
* Convert windows tests with new itest dir
* Fixed windows tests being wrong
* Added a test generator
* Add more unix_tests
* Fixed unix tests to remove any distro specific
* Removed git test breaking on nix
Build
* Add compression, checksum gen for bin
* Update flake.lock, cargo.lock
* Add deny.toml
* Remove org warnings
* Remove itest
* Update flake.lock
* Add itest, idump
* Make trycmd part of checks
Ci
* Don't use nix feature on ci
* Enforce conventional commits
* Enforce conventional commits
New Contributors
* @NekoiNemo made their first contribution in #253
* @sevz17 made their first contribution in #268
* @herbygillot made their first contribution in #266
* @m-czernek made their first contribution in #287
* @sitiom made their first contribution in #302
* @MartinFillon made their first contribution in #288
* @aidandenlinger made their first contribution in #303
* @alamb3142 made their first contribution in #225
* @9glenda made their first contribution in #293
Full Changelog: https://github.com/eza-community/eza/compare/v0.11.1...v0.12.0
Changes since 0.11.1:
eza v0.12.0 (final rust v1.65 release)
Changelog
Bug Fixes
* Expand --all help
* RUSTSEC-2020-0071
* Generalize gitignore to ignore all eza deb packages
* Canonicalize errors when the destination of a symbolic link is bad
* Handle other canonicalize errors in hyperlinks and git
* Fix windows build when canonicalize returns an error
* Change trycmd config to use test/itest folder for testing
* Revert to old apt install command suggestion and add hint
* Remove stray backslashes
* Is_some_and is an unstable Rust feature until 1.70
* Revert "Support for Windows Hidden Files"
* Shellcheck warnings
* Revert "Support for Windows Hidden Files"
* Shellcheck warnings
* Exit 13 on os error 13
* Rewrite comment
* Improve trace strings
* Tracing typo
Documentation
* Expand --all documentation
* Add pthorpe92 gist
* Remove xtests section from readme
* Add deprecation warning to xtests/readme
* Add deprecation warning to just xtest commands
* Add deprecation warning to vagrantfile
* Add MacPorts install info
* Add gentoo
* Fix gentoo install
* Add docs for --git-repos & --git-repos-no-status
* Fix gpg armor flag for deb release in readme
* Add better explanation of git repos + no status
* Add scoop install info
* Remove color specifications. change unknown git repo status to ~
* Fix missing color specification from man page
Features
* Add audit workflow
* Add trycmd as dev-dependency
* Add minimal trycmd binary
* Add a few trycmd tests as example
* Document and change output for --git-repos
* Add apt installation workflow
* Adds filtering on Windows hidden files
* Adds filtering on Windows hidden files
* Adds filtering on Windows hidden files
* Added shellcheck to treefmt
* Adds filtering on Windows hidden files
* Add PERMISSION_DENIED exit code
Miscellaneous Tasks
* Bump chrono from 0.4.27 to 0.4.30
* Removal of xtests
* Removal of vagrant
* Remove deprecated devtools
* Run spellcheck
Refactor
* Over-engineer deb-package.sh
* Hide xtests folder
* Split trycmd into tests for all, unix and windows
* Limit unit-tests run on workflow change to unit-tests itself
* Moved generateTest.sh to devtools/
* Renamed the file
* Add tracing to various code parts
* Make std::process::exit global
Revert
* "Support for Windows Hidden Files"
Styling
* Remove TODO message on the absolute_path property
* Fix shellcheck issues in deb-package.sh
* Fix shellcheck issues in deb-package.sh
* Fix shellcheck issues in deb-package.sh
Testing
* Remove vhs from flake
* Remove vhs-runner files
* Dump trycmd from nix sandbox
* Fix name of trydump
* Add trycmd
* Add nix feature
* Add example long tests for sandbox
* Set itests files to unix epoch
* Set itest files to unix epoch
* Refactor setting unix epoch
* Auto discard old definitions
* Fix test reference
* Add long_all_nix.toml
* Add long_blocksize_nix.toml
* Add long_extended_nix.toml
* Add long_git_nix.toml
* Add long_git_repos_nix.toml
* Add long_git_repos_no_status_nix.toml
* Add long_grid_nix.toml
* Add long_header_nix.toml
* Add long_icons_nix.toml
* Add long_octal_nix.toml
* Add long_time_style_relative_nix.toml
* Freeze nix tests
* Fix trydump when no files to delete
* Adding more content to test
* Modified unix and all tests
* Regenerate nix tests
* Convert windows tests with new itest dir
* Fixed windows tests being wrong
* Added a test generator
* Add more unix_tests
* Fixed unix tests to remove any distro specific
* Removed git test breaking on nix
Build
* Add compression, checksum gen for bin
* Update flake.lock, cargo.lock
* Add deny.toml
* Remove org warnings
* Remove itest
* Update flake.lock
* Add itest, idump
* Make trycmd part of checks
Ci
* Don't use nix feature on ci
* Enforce conventional commits
* Enforce conventional commits
New Contributors
* @NekoiNemo made their first contribution in #253
* @sevz17 made their first contribution in #268
* @herbygillot made their first contribution in #266
* @m-czernek made their first contribution in #287
* @sitiom made their first contribution in #302
* @MartinFillon made their first contribution in #288
* @aidandenlinger made their first contribution in #303
* @alamb3142 made their first contribution in #225
* @9glenda made their first contribution in #293
Full Changelog: https://github.com/eza-community/eza/compare/v0.11.1...v0.12.0
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.69
MAIN commitmail json YAML
audio/fasttracker2: Update to 1.69
Changes since v1.68
v1.69 - 03.08.2023
- Bugfix: The 'pattern expand' feature was heavily broken and would mess up the
pattern data (and potentially crash the program).
- Bugfix: The program crash message could overflow and not show the full text on
some systems.
Changes since v1.68
v1.69 - 03.08.2023
- Bugfix: The 'pattern expand' feature was heavily broken and would mess up the
pattern data (and potentially crash the program).
- Bugfix: The program crash message could overflow and not show the full text on
some systems.
MAIN commitmail json YAML
doc: Updated audio/din to 57
MAIN commitmail json YAML
pkgsrc/audio/din/Makefile@1.47
/
diff
pkgsrc/audio/din/PLIST@1.11 / diff
pkgsrc/audio/din/distinfo@1.32 / diff
pkgsrc/audio/din/patches/patch-src_RtMidi.cpp@1.1 / diff
pkgsrc/audio/din/PLIST@1.11 / diff
pkgsrc/audio/din/distinfo@1.32 / diff
pkgsrc/audio/din/patches/patch-src_RtMidi.cpp@1.1 / diff
audio/din: Update to 57
Changes since 56:
DIN Is Noise 57:
:( fixed crash if Scale notes label on Settings page was clicked :)
:( fixed reset of note polygon radius in Mondrian :)
:( fixed lingering close button when switching ui screens using keyboard short cuts :)
/*
auto pause can now pause auto rotation or pause auto flip
direction of rotation of launched drones
set at Auto pause section in Menu > Drone Params > Defaults
*\
/* 0 limit on drone master volume, AM and FM depths *\
/*
change of keyboard shortcuts for better drone handling on the
microtonal keyboard
middle mouse click to set drone scale / rotate center (pink cross)
to mouse cursor
f - find drone center of selected drones
voice phrase recorder shares this shortcut
but only triggers if voice is active
r - rotate selected drones about center
t - scale selected drones about center
hold SHIFT to scale only vertically (only volume changes)
hold CTRL to scale only horizontally (only pitch changes)
SPACE - freeze / thaw drones
For selected drones:
n - clear drone selection
y, u - change AM depth and bpm
o, p - change FM depth and bpm
- - change handle size
= - change trail length
j - flip drone motion
flips drone velocity
try on launched drones after turning on
Menu > Drone Defaults > Select on Creation
and AM/FM direction
try on drones of a drone pendulum
or a drone mesh
/*
/*
new keyboard shortcuts for mouse slider
` - toggle ~ on parameter spinner
0 - toggle 0 on parameter spinner
*\
/*
while moving drone center (the pink cross):
SHIFT to move along vertical
CTRL to move along horizontal
*\
/*
On Gravity:
tip -> mouse - gravity tracks mouse
tip -> drone - gravity tracks drone tip
instead of touching it
only works after
Tip to drone
*\
/*
String of characters to bit pattern to box fill texture
in Mondrian. A cheap experiment with polygon stippling
in OpenGL.
OFF by default
Click Menu > Misc > Texture to toggle
sd)s is default string. Change and see!
Also change Step.
*/
* improved drone AM and FM position set
* improved Sine Mixer
* improved binaural drones instrument
* improved mouse slider
* improved cursor cross hairs
Changes since 56:
DIN Is Noise 57:
:( fixed crash if Scale notes label on Settings page was clicked :)
:( fixed reset of note polygon radius in Mondrian :)
:( fixed lingering close button when switching ui screens using keyboard short cuts :)
/*
auto pause can now pause auto rotation or pause auto flip
direction of rotation of launched drones
set at Auto pause section in Menu > Drone Params > Defaults
*\
/* 0 limit on drone master volume, AM and FM depths *\
/*
change of keyboard shortcuts for better drone handling on the
microtonal keyboard
middle mouse click to set drone scale / rotate center (pink cross)
to mouse cursor
f - find drone center of selected drones
voice phrase recorder shares this shortcut
but only triggers if voice is active
r - rotate selected drones about center
t - scale selected drones about center
hold SHIFT to scale only vertically (only volume changes)
hold CTRL to scale only horizontally (only pitch changes)
SPACE - freeze / thaw drones
For selected drones:
n - clear drone selection
y, u - change AM depth and bpm
o, p - change FM depth and bpm
- - change handle size
= - change trail length
j - flip drone motion
flips drone velocity
try on launched drones after turning on
Menu > Drone Defaults > Select on Creation
and AM/FM direction
try on drones of a drone pendulum
or a drone mesh
/*
/*
new keyboard shortcuts for mouse slider
` - toggle ~ on parameter spinner
0 - toggle 0 on parameter spinner
*\
/*
while moving drone center (the pink cross):
SHIFT to move along vertical
CTRL to move along horizontal
*\
/*
On Gravity:
tip -> mouse - gravity tracks mouse
tip -> drone - gravity tracks drone tip
instead of touching it
only works after
Tip to drone
*\
/*
String of characters to bit pattern to box fill texture
in Mondrian. A cheap experiment with polygon stippling
in OpenGL.
OFF by default
Click Menu > Misc > Texture to toggle
sd)s is default string. Change and see!
Also change Step.
*/
* improved drone AM and FM position set
* improved Sine Mixer
* improved binaural drones instrument
* improved mouse slider
* improved cursor cross hairs
MAIN commitmail json YAML
doc: Remove duplicate entry for sysutils/eza
MAIN commitmail json YAML
doc: Updated sysutils/eza to 0.11.1
MAIN commitmail json YAML
pkgsrc/sysutils/eza/Makefile@1.5
/
diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.3 / diff
pkgsrc/sysutils/eza/files/eza.1@1.2 / diff
pkgsrc/sysutils/eza/files/eza_colors-explanation.5@1.3 / diff
pkgsrc/sysutils/eza/files/eza_colors.5@1.3 / diff
pkgsrc/sysutils/eza/cargo-depends.mk@1.3 / diff
pkgsrc/sysutils/eza/files/eza.1@1.2 / diff
pkgsrc/sysutils/eza/files/eza_colors-explanation.5@1.3 / diff
pkgsrc/sysutils/eza/files/eza_colors.5@1.3 / diff
sysutils/eza: Update to 0.11.1
- Take ownership of the package.
- Regenerate the man pages.
Changes since 0.11.0:
eza 0.11.1
Description
Since last release, there are some notable changes:
* We now provide binaries for releases
* eza now respects timezone on windows
* We fixed the punctuation color that A LOT of users complained about
* We now highlight mounted directories (linux only)
* A lot of new icons
* .git is hidden when using --git-ignore
* Bright color options.
In general, there has been a huge uptick in activity, we went from around
~100 stars to ~1.5k in the span of a week. This seems to be mostly due to
exa being "deprecated", and that being around the top of hackernews for some
days.
We've also seen a large growth in distributions packaging eza, which is very
exciting.
Changelog
Bug Fixes
* Add vendored-libgit2 feature to git2 dependency
* Filename escaping (last character lost sometimes, no hyperlink)
* Build for Windows with chrono
Documentation
* Explain vendored-libgit2
* Add homebrew, misc fixes
* Fix code of conduct link
* Update archlinux
* Add star history
* Add informaton about lazy_static
* Remove broken dependabot link
* Add bright color options in man pages
* Add bright color support in readme changelog
Features
* Add highlighting of mounted directories (Linux only)
* Add backlog of icons from various exa pull requests and others
* Mark .git as ignored, which hides it when using --git-ignore
* Add backlog of icons from various exa issues
* Expose git2 feature vendored-libgit2
* Add build commands to deb-package.sh
* Support the MSRV of Rust (1.65.0)
* Add bright colour options, change punctuation default
* Use chrono crate to handle datetime-related features
Miscellaneous Tasks
* Bump actions/checkout from 3 to 4
Testing
* Stabilize testing without sandbox
* Disable gif rendering
Build
* Add release binaries
* Fix binary gen
* Add armhf binary
Deps
* Change ansi_term to ansiterm from rustadopt
- Take ownership of the package.
- Regenerate the man pages.
Changes since 0.11.0:
eza 0.11.1
Description
Since last release, there are some notable changes:
* We now provide binaries for releases
* eza now respects timezone on windows
* We fixed the punctuation color that A LOT of users complained about
* We now highlight mounted directories (linux only)
* A lot of new icons
* .git is hidden when using --git-ignore
* Bright color options.
In general, there has been a huge uptick in activity, we went from around
~100 stars to ~1.5k in the span of a week. This seems to be mostly due to
exa being "deprecated", and that being around the top of hackernews for some
days.
We've also seen a large growth in distributions packaging eza, which is very
exciting.
Changelog
Bug Fixes
* Add vendored-libgit2 feature to git2 dependency
* Filename escaping (last character lost sometimes, no hyperlink)
* Build for Windows with chrono
Documentation
* Explain vendored-libgit2
* Add homebrew, misc fixes
* Fix code of conduct link
* Update archlinux
* Add star history
* Add informaton about lazy_static
* Remove broken dependabot link
* Add bright color options in man pages
* Add bright color support in readme changelog
Features
* Add highlighting of mounted directories (Linux only)
* Add backlog of icons from various exa pull requests and others
* Mark .git as ignored, which hides it when using --git-ignore
* Add backlog of icons from various exa issues
* Expose git2 feature vendored-libgit2
* Add build commands to deb-package.sh
* Support the MSRV of Rust (1.65.0)
* Add bright colour options, change punctuation default
* Use chrono crate to handle datetime-related features
Miscellaneous Tasks
* Bump actions/checkout from 3 to 4
Testing
* Stabilize testing without sandbox
* Disable gif rendering
Build
* Add release binaries
* Fix binary gen
* Add armhf binary
Deps
* Change ansi_term to ansiterm from rustadopt
MAIN commitmail json YAML
sysutils/eza: Add the shell completions.
Address pkglint issues.
Address pkglint issues.
MAIN commitmail json YAML
doc: Removed sysutils/exa successor sysutils/eza
MAIN commitmail json YAML
pkgsrc/sysutils/Makefile@1.1070
/
diff
pkgsrc/sysutils/exa/DESCR deleted
pkgsrc/sysutils/exa/Makefile deleted
pkgsrc/sysutils/exa/PLIST deleted
pkgsrc/sysutils/exa/cargo-depends.mk deleted
pkgsrc/sysutils/exa/distinfo deleted
pkgsrc/sysutils/exa/files/exa.1 deleted
pkgsrc/sysutils/exa/files/exa_colors.5 deleted
pkgsrc/sysutils/exa/DESCR deleted
pkgsrc/sysutils/exa/Makefile deleted
pkgsrc/sysutils/exa/PLIST deleted
pkgsrc/sysutils/exa/cargo-depends.mk deleted
pkgsrc/sysutils/exa/distinfo deleted
pkgsrc/sysutils/exa/files/exa.1 deleted
pkgsrc/sysutils/exa/files/exa_colors.5 deleted
sysutils/exa: Remove package and SUBDIR entry.
exa's upstream has been abandoned and switched to eza.
"exa is unmaintained, use the fork eza instead."
More information at the respective repositories
- https://github.com/ogham/exa
- https://github.com/eza-community/eza
exa's upstream has been abandoned and switched to eza.
"exa is unmaintained, use the fork eza instead."
More information at the respective repositories
- https://github.com/ogham/exa
- https://github.com/eza-community/eza
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.68
MAIN commitmail json YAML
audio/fasttracker2: Update to 1.68
Changes since v1.66
v1.68 - 29.06.2023
- Windows: On double-click of file associated with program, de-minimize window
(if minimized) and set input focus.
- De-minimize window (if minimized) and set focus after drag n' drop of file
- Windows/macOS: Updated SDL to v2.28.0
v1.67 - 25.04.2023
- The song-to-WAV export screen now defaults to the tracker's bit depth and
audio rate. This was actually the behavior for earlier versions of the FT2
clone, but I decided to change it back.
- The song-to-WAV exporter now allows rates up to 384kHz
- Alpha-based fade in for the about screen content (who cares..? :-)
- Some small text string changes (config and song-to-WAV export screen)
- Windows/macOS: Updated SDL to v2.26.5
Changes since v1.66
v1.68 - 29.06.2023
- Windows: On double-click of file associated with program, de-minimize window
(if minimized) and set input focus.
- De-minimize window (if minimized) and set focus after drag n' drop of file
- Windows/macOS: Updated SDL to v2.28.0
v1.67 - 25.04.2023
- The song-to-WAV export screen now defaults to the tracker's bit depth and
audio rate. This was actually the behavior for earlier versions of the FT2
clone, but I decided to change it back.
- The song-to-WAV exporter now allows rates up to 384kHz
- Alpha-based fade in for the about screen content (who cares..? :-)
- Some small text string changes (config and song-to-WAV export screen)
- Windows/macOS: Updated SDL to v2.26.5
MAIN commitmail json YAML
doc: Updated security/wolfssl to 5.6.3
MAIN commitmail json YAML
pkgsrc/security/wolfssl/Makefile@1.20
/
diff
pkgsrc/security/wolfssl/distinfo@1.21 / diff
pkgsrc/security/wolfssl/patches/patch-configure deleted
pkgsrc/security/wolfssl/distinfo@1.21 / diff
pkgsrc/security/wolfssl/patches/patch-configure deleted
security/wolfssl: Update to v5.6.3
Changes since v5.6.0:
wolfSSL Release 5.6.3 (Jun 16, 2023)
Release 5.6.3 of wolfSSL embedded TLS has 4 bug fixes:
* Fix for setting the atomic macro options introduced in release 5.6.2. This
issue affects GNU gcc autoconf builds. The fix resolves a potential mismatch of
the generated macros defined in options.h file and the macros used when the
wolfSSL library is compiled. In version 5.6.2 this mismatch could result in
unstable runtime behavior.
* Fix for invalid suffix error with Windows build using the macro
GCM_TABLE_4BIT.
* Improvements to Encrypted Memory support (WC_PROTECT_ENCRYPTED_MEM)
implementations for modular exponentiation in SP math-all (sp_int.c) and TFM
(tfm.c).
* Improvements to SendAlert for getting output buffer.
wolfSSL Release 5.6.2 (Jun 09, 2023)
Release 5.6.2 has been developed according to wolfSSL's development and QA
process (see link below) and successfully passed the quality criteria.
https://www.wolfssl.com/about/wolfssl-software-development-process-quality-assurance
NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
Release 5.6.2 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities
* [Low] In cases where a malicious agent could analyze cache timing at a very
detailed level, information about the AES key used could be leaked during T/S
Box lookups. One such case was shown on RISC-V hardware using the MicroWalk tool
(https://github.com/microwalk-project/Microwalk). A hardened version of T/S Box
lookups was added in wolfSSL to help mitigate this potential attack and is now
on by default with RISC-V builds and can be enabled on other builds if desired
by compiling wolfSSL with the macro WOLFSSL_AES_TOUCH_LINES. Thanks to Jan
Wichelmann, Christopher Peredy, Florian Sieck, Anna P辰tschke, Thomas Eisenbarth
(University of L端beck): MAMBO-V: Dynamic Side-Channel Leakage Analysis on
RISC-V. Fixed in the following GitHub pull request
https://github.com/wolfSSL/wolfssl/pull/6309
* [High] In previous versions of wolfSSL if a TLS 1.3 client gets neither a PSK
(pre shared key) extension nor a KSE (key share extension) when connecting to a
malicious server, a default predictable buffer gets used for the IKM value when
generating the session master secret. Using a potentially known IKM value when
generating the session master secret key compromises the key generated, allowing
an eavesdropper to reconstruct it and potentially allowing surreptitious access
to or meddling with message contents in the session. This issue does not affect
client validation of connected servers, nor expose private key information, but
could result in an insecure TLS 1.3 session when not controlling both sides of
the connection. We recommend that TLS 1.3 client side users update the version
of wolfSSL used. Thanks to Johannes from Sectra Communications and Link旦ping
University for the report. Fixed in the following GitHub pull request
https://github.com/wolfSSL/wolfssl/pull/6412
New Feature Additions
New Ports and Expansions
* Add support for STM32H5
* Add support for Renesas TSIP v1.17
* Add Renesas SCE RSA crypto-only support
* STARCORE DSP port and example builds added
* Add the function wc_PKCS7_SetDefaultSignedAttribs for setting PKCS7 signed
attributes to use with PKCS7 bundle creation
* NXP IMX6Q CAAM port with QNX and performance optimizations for AES-CTR
New Build Options
* ASN.1 print utility to decode ASN.1 syntax and print out human readable text
--enable-asn-print. Utility app is located in the directory ./examples/asn1/
* Add introspection for math build, wc_GetMathInfo() to get information about
the math library compiled into the linked wolfSSL library
* Implement TLS recommendations from RFC 9325 for hardening TLS/DTLS security.
Enabled with the autoconf flag --enable-harden-tls.
* Add option to support disabling thread local storage, --disable-threadlocal
* Added wc_DsaSign_ex() and wc_DsaVerify_ex() for handling alternative digest
algorithms with DSA Sign/Verify
* Implement atomic operations interface. Macros auto-detect if atomic operations
are expected to be available, can be turned off with the macro
WOLFSSL_NO_ATOMICS
* Added support for DTLS 1.3 Authentication and Integrity-Only Cipher Suites
* Expand crypto callback to have a device ID find callback function with
wc_CryptoCb_SetDeviceFindCb. Enabled with the macro WOLF_CRYPTO_CB_FIND
Enhancements and Optimizations
Optimizations
* Increased performance with ChaCha20 C implementation and general XOR
operations
* Added integer type to the ASN.1 sequencing with ASN.1 Integer sequence
* With wolfSSL_get_x509_next_altname reset alt name list to head once cycled
through if compiling with the macro WOLFSSL_MULTICIRCULATE_ALTNAMELIST
* Additional key validity sanity checks on input to wolfSSL_EC_KEY_set_private_key
* adds support for TLSv1.3 stateful session tickets when using SSL_OP_NO_TICKET
Memory Optimizations
* Improvements to stack usage and management with SP int math library
* Optimization to TLS 1.3 server to remove caching messages for Ed25519/Ed448
* Added a HAVE_CURL macro build for building a subset of the wolfSSL library
when linking with cURL
* Memory usage improvement with reducing the size of alignment needed with AES
* Reduce run time memory used with ECC operations and ALT_ECC_SIZE
* Fixes and improvements for building edge cases such as crypto callback without
hash-drbg with low footprint options
* Support HAVE_SESSION_TICKET build option without depending on realloc
Documentation
* Instructions for GPDMA on STM32 configuration added
* Add in instructions for compiling with zephyr on STM32
* Documentation fixup for wolfSSL_get_chain_cert()
* Fix the file pointed to in the TI RTOS documentation that we maintain
* Documentation for wolfSSL_CertManagerFreeCRL
* Updates made to AES and Chacha documentation
* Update Japanese comments for Ed25519, AES, and other miscellaneous items
Tests
* Add in an option for easily testing malloc failures when building with
WOLFSSL_MEM_FAIL_COUNT macro
* Updated in process for using Expect vs Assert to facilitate more malloc
failure tests
* Enhance wolfCrypt test for builds that do not have ECC SECP curves enabled
* ESP32 platform-specific VisualGDB test & benchmark projects
* Update to dependencies in docker container file used for tests
* Fix up for base 10 output with bundled benchmark application
Port Updates
* Zephyr port update, compile time warning fixes, misc. fixes when used with TLS
and update of includes
* Update RIOT-OS to not compile out use of writev by default
* Update Micrium port to enable use of STM32_RNG
* Micrium updates for XMEMOVE and XSTRTOK use
* Various Espressif HW crypto, SHA2, AES, MP updates
* Added in ASIO build option with CMake builds
General Enhancements
* Global codebase cleanup for C89 compliance and wolfCrypt -Wconversion hygiene
* PKCS#11 enhancement adding a callback for RSA key size when using a hardware
key, by default 2048 bit key is used
* Allow for unknown OIDs in extensions in wolfSSL_X509_set_ext()
* Allow user to override XSTAT by defining the macro XSTAT when compiling
* Support UPN and SID with x509 certificate extensions and custom OID build
* Write next IV in wolfSSL_DES_ede3_cbc_encrypt for better handling of inline
encryption
* Adding NO_ASN_TIME_CHECK build option for compiling out certificate
before/after checks
* Improve different peer recvfrom handling and error reporting with ipv4 vs ipv6
Fixes
* Fix for STM32 ECC sign and verify out of bounds buffer write when the hash
length passed in is larger than the key size. Thanks to Maximilian for the
report.
* Fix to skip Async_DevCtxInit when using init rsa/ecc label/id api's
* Revert WOLFSSL_NO_ASN_STRICT macro guard around alternate names directory list
* In async mode, don't retry decrypting if a valid error is encountered on a
packet parse attempt
* Add additional sanity check on PKCS7 index value in wc_PKCS7_DecryptKekri
* Fix for padding when using an AuthEnvelope PKCS7 type with GCM/CCM stream
ciphers
* Fix siphash assembly so that no register is left behind
* Fix to not send a TLS 1.3 session ID resume response when resuming and
downgrading to a protocol less than TLS 1.3
* Fix overwriting serialNumber by favouriteDrink when generating a certificate
using Cert struct
* Fix for the default realloc used with EspressIf builds
* Track SetDigest usage to avoid invalid free under error conditions
* DTLS v1.3 fix for epoch 0 check on plaintext message
* Fix for session ticket memory leak in wolfSSL_Cleanup
* Fixes for propagating SendAlert errors when the peer disconnects
* Replace XMEMCPY with XMEMMOVE to fix valgrind-3.15.0 reports "Source and
destination overlap in memcpy" when using --enable-aesgcm-stream
* Fix for potential out-of-bounds write edge case in fp_mod_2d with
--enable-fastmath math library
* Fix getting ECC key size in stm32_ecc_sign_hash_ex
* Fix for case where wc_PeekErrorNodeLineData was not unlocking error queue on
error
* Fix for async ECC shared secret state
* Fix for better error checking with sp_gcd with SP int math library
* Fix memory leak in TLSX_KeyShare_Setup when handling an error case
* Fix for double free edge case in InitOCSPRequest when handling a memory
allocation failure
* X509 NAME Entry fix for leaking memory on error case
* Fix wolfssl_asn1_time_to_tm setting unexpected fields in tm struct
* Fix for FIPS ECC integrity check with crypto callback set
* BN_to_ASN1_INTEGER fix for handling leading zero byte padding when needed
* Fix a typo in PP macro and add a ceiling to guard against implementation bugs
* DTLS 1.3 fix for using the correct label when deriving the resumption key
* OCSP fix for GetDateInfo edge case with non ASN template builds
* Allow a user set certificate callback function to override the skipAddCA flag
when parsing a certificate
* SP int: sp_radix_size when radix 10 fix temp size for handling edge case
* Fixes and improvements for handling failures with memory allocations
* Fix for DecodeECC_DSA_Sig to handle r and s being initialized
* Fix for wc_ecc_is_point to ensure that the x and y are in range [0, p-1] and z
is one (affine ordinates)
Build Fixes
* Fix for building on Windows with CMake and using USER_SETTINGS and fix for
options.h creation with CMake when using USER_SETTINGS
* CMake fixes and improvements for use with mingw32
* Fix for building with wpas and x509 small options
* Check if colrm is available for options.h creation when using autoconf
* Clean up NO_BIG_INT build, removing WOLFSSL_SP_MATH macro and heapmath compile
* Fix PKCS#7 build with NO_PKCS7_STREAM
* Fix compilation error in CC-RX and remove unnecessary public key import
* SP Build fixes for ARM assembly with ARMv6 clz and ARM thumb debug build
* For to not advertise support for RSA in TLS extensions when compiled with
NO_RSA
Changes since v5.6.0:
wolfSSL Release 5.6.3 (Jun 16, 2023)
Release 5.6.3 of wolfSSL embedded TLS has 4 bug fixes:
* Fix for setting the atomic macro options introduced in release 5.6.2. This
issue affects GNU gcc autoconf builds. The fix resolves a potential mismatch of
the generated macros defined in options.h file and the macros used when the
wolfSSL library is compiled. In version 5.6.2 this mismatch could result in
unstable runtime behavior.
* Fix for invalid suffix error with Windows build using the macro
GCM_TABLE_4BIT.
* Improvements to Encrypted Memory support (WC_PROTECT_ENCRYPTED_MEM)
implementations for modular exponentiation in SP math-all (sp_int.c) and TFM
(tfm.c).
* Improvements to SendAlert for getting output buffer.
wolfSSL Release 5.6.2 (Jun 09, 2023)
Release 5.6.2 has been developed according to wolfSSL's development and QA
process (see link below) and successfully passed the quality criteria.
https://www.wolfssl.com/about/wolfssl-software-development-process-quality-assurance
NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
Release 5.6.2 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities
* [Low] In cases where a malicious agent could analyze cache timing at a very
detailed level, information about the AES key used could be leaked during T/S
Box lookups. One such case was shown on RISC-V hardware using the MicroWalk tool
(https://github.com/microwalk-project/Microwalk). A hardened version of T/S Box
lookups was added in wolfSSL to help mitigate this potential attack and is now
on by default with RISC-V builds and can be enabled on other builds if desired
by compiling wolfSSL with the macro WOLFSSL_AES_TOUCH_LINES. Thanks to Jan
Wichelmann, Christopher Peredy, Florian Sieck, Anna P辰tschke, Thomas Eisenbarth
(University of L端beck): MAMBO-V: Dynamic Side-Channel Leakage Analysis on
RISC-V. Fixed in the following GitHub pull request
https://github.com/wolfSSL/wolfssl/pull/6309
* [High] In previous versions of wolfSSL if a TLS 1.3 client gets neither a PSK
(pre shared key) extension nor a KSE (key share extension) when connecting to a
malicious server, a default predictable buffer gets used for the IKM value when
generating the session master secret. Using a potentially known IKM value when
generating the session master secret key compromises the key generated, allowing
an eavesdropper to reconstruct it and potentially allowing surreptitious access
to or meddling with message contents in the session. This issue does not affect
client validation of connected servers, nor expose private key information, but
could result in an insecure TLS 1.3 session when not controlling both sides of
the connection. We recommend that TLS 1.3 client side users update the version
of wolfSSL used. Thanks to Johannes from Sectra Communications and Link旦ping
University for the report. Fixed in the following GitHub pull request
https://github.com/wolfSSL/wolfssl/pull/6412
New Feature Additions
New Ports and Expansions
* Add support for STM32H5
* Add support for Renesas TSIP v1.17
* Add Renesas SCE RSA crypto-only support
* STARCORE DSP port and example builds added
* Add the function wc_PKCS7_SetDefaultSignedAttribs for setting PKCS7 signed
attributes to use with PKCS7 bundle creation
* NXP IMX6Q CAAM port with QNX and performance optimizations for AES-CTR
New Build Options
* ASN.1 print utility to decode ASN.1 syntax and print out human readable text
--enable-asn-print. Utility app is located in the directory ./examples/asn1/
* Add introspection for math build, wc_GetMathInfo() to get information about
the math library compiled into the linked wolfSSL library
* Implement TLS recommendations from RFC 9325 for hardening TLS/DTLS security.
Enabled with the autoconf flag --enable-harden-tls.
* Add option to support disabling thread local storage, --disable-threadlocal
* Added wc_DsaSign_ex() and wc_DsaVerify_ex() for handling alternative digest
algorithms with DSA Sign/Verify
* Implement atomic operations interface. Macros auto-detect if atomic operations
are expected to be available, can be turned off with the macro
WOLFSSL_NO_ATOMICS
* Added support for DTLS 1.3 Authentication and Integrity-Only Cipher Suites
* Expand crypto callback to have a device ID find callback function with
wc_CryptoCb_SetDeviceFindCb. Enabled with the macro WOLF_CRYPTO_CB_FIND
Enhancements and Optimizations
Optimizations
* Increased performance with ChaCha20 C implementation and general XOR
operations
* Added integer type to the ASN.1 sequencing with ASN.1 Integer sequence
* With wolfSSL_get_x509_next_altname reset alt name list to head once cycled
through if compiling with the macro WOLFSSL_MULTICIRCULATE_ALTNAMELIST
* Additional key validity sanity checks on input to wolfSSL_EC_KEY_set_private_key
* adds support for TLSv1.3 stateful session tickets when using SSL_OP_NO_TICKET
Memory Optimizations
* Improvements to stack usage and management with SP int math library
* Optimization to TLS 1.3 server to remove caching messages for Ed25519/Ed448
* Added a HAVE_CURL macro build for building a subset of the wolfSSL library
when linking with cURL
* Memory usage improvement with reducing the size of alignment needed with AES
* Reduce run time memory used with ECC operations and ALT_ECC_SIZE
* Fixes and improvements for building edge cases such as crypto callback without
hash-drbg with low footprint options
* Support HAVE_SESSION_TICKET build option without depending on realloc
Documentation
* Instructions for GPDMA on STM32 configuration added
* Add in instructions for compiling with zephyr on STM32
* Documentation fixup for wolfSSL_get_chain_cert()
* Fix the file pointed to in the TI RTOS documentation that we maintain
* Documentation for wolfSSL_CertManagerFreeCRL
* Updates made to AES and Chacha documentation
* Update Japanese comments for Ed25519, AES, and other miscellaneous items
Tests
* Add in an option for easily testing malloc failures when building with
WOLFSSL_MEM_FAIL_COUNT macro
* Updated in process for using Expect vs Assert to facilitate more malloc
failure tests
* Enhance wolfCrypt test for builds that do not have ECC SECP curves enabled
* ESP32 platform-specific VisualGDB test & benchmark projects
* Update to dependencies in docker container file used for tests
* Fix up for base 10 output with bundled benchmark application
Port Updates
* Zephyr port update, compile time warning fixes, misc. fixes when used with TLS
and update of includes
* Update RIOT-OS to not compile out use of writev by default
* Update Micrium port to enable use of STM32_RNG
* Micrium updates for XMEMOVE and XSTRTOK use
* Various Espressif HW crypto, SHA2, AES, MP updates
* Added in ASIO build option with CMake builds
General Enhancements
* Global codebase cleanup for C89 compliance and wolfCrypt -Wconversion hygiene
* PKCS#11 enhancement adding a callback for RSA key size when using a hardware
key, by default 2048 bit key is used
* Allow for unknown OIDs in extensions in wolfSSL_X509_set_ext()
* Allow user to override XSTAT by defining the macro XSTAT when compiling
* Support UPN and SID with x509 certificate extensions and custom OID build
* Write next IV in wolfSSL_DES_ede3_cbc_encrypt for better handling of inline
encryption
* Adding NO_ASN_TIME_CHECK build option for compiling out certificate
before/after checks
* Improve different peer recvfrom handling and error reporting with ipv4 vs ipv6
Fixes
* Fix for STM32 ECC sign and verify out of bounds buffer write when the hash
length passed in is larger than the key size. Thanks to Maximilian for the
report.
* Fix to skip Async_DevCtxInit when using init rsa/ecc label/id api's
* Revert WOLFSSL_NO_ASN_STRICT macro guard around alternate names directory list
* In async mode, don't retry decrypting if a valid error is encountered on a
packet parse attempt
* Add additional sanity check on PKCS7 index value in wc_PKCS7_DecryptKekri
* Fix for padding when using an AuthEnvelope PKCS7 type with GCM/CCM stream
ciphers
* Fix siphash assembly so that no register is left behind
* Fix to not send a TLS 1.3 session ID resume response when resuming and
downgrading to a protocol less than TLS 1.3
* Fix overwriting serialNumber by favouriteDrink when generating a certificate
using Cert struct
* Fix for the default realloc used with EspressIf builds
* Track SetDigest usage to avoid invalid free under error conditions
* DTLS v1.3 fix for epoch 0 check on plaintext message
* Fix for session ticket memory leak in wolfSSL_Cleanup
* Fixes for propagating SendAlert errors when the peer disconnects
* Replace XMEMCPY with XMEMMOVE to fix valgrind-3.15.0 reports "Source and
destination overlap in memcpy" when using --enable-aesgcm-stream
* Fix for potential out-of-bounds write edge case in fp_mod_2d with
--enable-fastmath math library
* Fix getting ECC key size in stm32_ecc_sign_hash_ex
* Fix for case where wc_PeekErrorNodeLineData was not unlocking error queue on
error
* Fix for async ECC shared secret state
* Fix for better error checking with sp_gcd with SP int math library
* Fix memory leak in TLSX_KeyShare_Setup when handling an error case
* Fix for double free edge case in InitOCSPRequest when handling a memory
allocation failure
* X509 NAME Entry fix for leaking memory on error case
* Fix wolfssl_asn1_time_to_tm setting unexpected fields in tm struct
* Fix for FIPS ECC integrity check with crypto callback set
* BN_to_ASN1_INTEGER fix for handling leading zero byte padding when needed
* Fix a typo in PP macro and add a ceiling to guard against implementation bugs
* DTLS 1.3 fix for using the correct label when deriving the resumption key
* OCSP fix for GetDateInfo edge case with non ASN template builds
* Allow a user set certificate callback function to override the skipAddCA flag
when parsing a certificate
* SP int: sp_radix_size when radix 10 fix temp size for handling edge case
* Fixes and improvements for handling failures with memory allocations
* Fix for DecodeECC_DSA_Sig to handle r and s being initialized
* Fix for wc_ecc_is_point to ensure that the x and y are in range [0, p-1] and z
is one (affine ordinates)
Build Fixes
* Fix for building on Windows with CMake and using USER_SETTINGS and fix for
options.h creation with CMake when using USER_SETTINGS
* CMake fixes and improvements for use with mingw32
* Fix for building with wpas and x509 small options
* Check if colrm is available for options.h creation when using autoconf
* Clean up NO_BIG_INT build, removing WOLFSSL_SP_MATH macro and heapmath compile
* Fix PKCS#7 build with NO_PKCS7_STREAM
* Fix compilation error in CC-RX and remove unnecessary public key import
* SP Build fixes for ARM assembly with ARMv6 clz and ARM thumb debug build
* For to not advertise support for RSA in TLS extensions when compiled with
NO_RSA
MAIN commitmail json YAML
doc: Updated www/jira-cli to 1.4.0
MAIN commitmail json YAML
pkgsrc/www/jira-cli/Makefile@1.26
/
diff
pkgsrc/www/jira-cli/PLIST@1.6 / diff
pkgsrc/www/jira-cli/distinfo@1.8 / diff
pkgsrc/www/jira-cli/go-modules.mk@1.6 / diff
pkgsrc/www/jira-cli/PLIST@1.6 / diff
pkgsrc/www/jira-cli/distinfo@1.8 / diff
pkgsrc/www/jira-cli/go-modules.mk@1.6 / diff
www/jira-cli: Update to 1.4.0
Changes since 1.3.0:
v1.4.0
This release adds support for Jira v9, a serverinfo command to quickly check
your Jira server build info, lets you set resolution, assignee and comment on
issue move, and many more.
## What's added?
- feat(tui): Allow issue transition from the ui by @ankitpokhrel in #544
- feat(tui): Add help page by @ankitpokhrel in #563
- feat: Filter by multiple statuses by @ankitpokhrel in #573
- feat: Support for adding watcher to Issue by @ankitpokhrel in #584
- feat: Allow different jira server for API and for UI by @markhatch in #613
## What's fixed?
- fix: Shell completion for Fish and PowerShell by @ankitpokhrel in #553
- fix: Worklog comment don't work together with prompt by @ankitpokhrel in #562
- fix: Use http client wrapper instead of round trip by @ankitpokhrel in #530
- fix: Try to detect if JIRA v8 server is not using the createmeta REST endpoint
by @tristianc in #574
- fix: Issue with -c flag on config generation by @ankitpokhrel in #582
- fix: Issue with value assignment in init by @ankitpokhrel in #606
- fix: Issue with epic field on create by @ankitpokhrel in #607
- fix: Comment author name is not always displayed by @ankitpokhrel in (#618)
## Other changes
- ehc: Improve PAGER selection by @ankitpokhrel in #570
- dep: Upgrade cobra to v1.7.0 by @dbirks in #608
- ci: Upgrade actions by @ankitpokhrel in #590
## New Contributors
- @tristianc made their first contribution in #574
- @dbirks made their first contribution in #608
- @markhatch made their first contribution in #613
Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v1.3.0...v1.4.0
Changes since 1.3.0:
v1.4.0
This release adds support for Jira v9, a serverinfo command to quickly check
your Jira server build info, lets you set resolution, assignee and comment on
issue move, and many more.
## What's added?
- feat(tui): Allow issue transition from the ui by @ankitpokhrel in #544
- feat(tui): Add help page by @ankitpokhrel in #563
- feat: Filter by multiple statuses by @ankitpokhrel in #573
- feat: Support for adding watcher to Issue by @ankitpokhrel in #584
- feat: Allow different jira server for API and for UI by @markhatch in #613
## What's fixed?
- fix: Shell completion for Fish and PowerShell by @ankitpokhrel in #553
- fix: Worklog comment don't work together with prompt by @ankitpokhrel in #562
- fix: Use http client wrapper instead of round trip by @ankitpokhrel in #530
- fix: Try to detect if JIRA v8 server is not using the createmeta REST endpoint
by @tristianc in #574
- fix: Issue with -c flag on config generation by @ankitpokhrel in #582
- fix: Issue with value assignment in init by @ankitpokhrel in #606
- fix: Issue with epic field on create by @ankitpokhrel in #607
- fix: Comment author name is not always displayed by @ankitpokhrel in (#618)
## Other changes
- ehc: Improve PAGER selection by @ankitpokhrel in #570
- dep: Upgrade cobra to v1.7.0 by @dbirks in #608
- ci: Upgrade actions by @ankitpokhrel in #590
## New Contributors
- @tristianc made their first contribution in #574
- @dbirks made their first contribution in #608
- @markhatch made their first contribution in #613
Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v1.3.0...v1.4.0
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.66
MAIN commitmail json YAML
audio/fasttracker2: Update to 1.66
Changes since v1.65
v1.66 - 13.04.2023
- Added a 16 point sinc interpolation option (higher quality)
- Changed some settings for the default configuration:
1) Palette theme = Dark mode
2) Scopes = Lined
Note: Your existing configuration will not be changed!
- Changed the layout a little in the Config section (Audio / "I/O Devices")
- Removed the 192kHz audio output setting. This was a bit extreme to begin with.
Note: You can still select this rate when exporting songs to WAV.
- Some code cleanup
Changes since v1.65
v1.66 - 13.04.2023
- Added a 16 point sinc interpolation option (higher quality)
- Changed some settings for the default configuration:
1) Palette theme = Dark mode
2) Scopes = Lined
Note: Your existing configuration will not be changed!
- Changed the layout a little in the Config section (Audio / "I/O Devices")
- Removed the 192kHz audio output setting. This was a bit extreme to begin with.
Note: You can still select this rate when exporting songs to WAV.
- Some code cleanup
MAIN commitmail json YAML
doc: Updated security/wolfssl to 5.6.0
MAIN commitmail json YAML
pkgsrc/security/wolfssl/Makefile@1.19
/
diff
pkgsrc/security/wolfssl/PLIST@1.12 / diff
pkgsrc/security/wolfssl/distinfo@1.20 / diff
pkgsrc/security/wolfssl/patches/patch-configure@1.6 / diff
pkgsrc/security/wolfssl/PLIST@1.12 / diff
pkgsrc/security/wolfssl/distinfo@1.20 / diff
pkgsrc/security/wolfssl/patches/patch-configure@1.6 / diff
security/wolfssl: Update to v5.6.0
Changes since v5.5.4:
wolfSSL Release 5.6.0 (Mar 24, 2023)
Release 5.6.0 has been developed according to wolfSSL's development and QA
process (see link below) and successfully passed the quality
criteria. https://www.wolfssl.com/about/wolfssl-software-development-process-quality-assurance
NOTE: * --enable-heapmath is being deprecated and will be removed by 2024 * This
release makes ASN Template the default with ./configure, the previous ASN
parsing can be built with --enable-asn=original
Release 5.6.0 of wolfSSL embedded TLS has bug fixes and new features including:
New Feature Additions
* ASN template is now the default ASN parsing implementation when compiling with
configure
* Added in support for TLS v1.3 Encrypted Client Hello (ECH) and HPKE (Hybrid
Public Key Encryption)
* DTLS 1.3 stateless server ClientHello parsing support added
Ports
* Add RX64/RX71 SHA hardware support
* Port to RT1170 and expand NXP CAAM driver support
* Add NuttX integration files for ease of use
* Updated Stunnel support for version 5.67 Compatibility Layer
* Add in support for AES-CCM with EVP
* BN compatibility API refactoring and separate API created
* Expanding public key type cipher suite list strings support
Misc.
* Support pthread_rwlock and add enable option
* Add wolfSSL_CertManagerLoadCABuffer_ex() that takes a user certificate chain
flag and additional verify flag options
* Docker build additions for wolfSSL library and wolfCLU application
* Add favorite drink pilot attribute type to get it from the encoding
* Added in support for indefinite length BER parsing with PKCS12
* Add dynamic session cache which allocates sessions from the heap with macro
SESSION_CACHE_DYNAMIC_MEM
Improvements / Optimizations
Tests
* Additional CI (continuous integration) testing and leveraging of GitHub
workflows
* Add CI testing for wpa_supplicant, OpenWrt and OpenVPN using GitHub workflows
* Add compilation of Espressif to GitHub workflows tests
* Refactoring and improving error results with wolfCrypt unit test application
* Minor warning fixes from Coverity static analysis scan
* Add new SHA-512/224 and SHA-512/256 tests
* Used codespell and fixed some minor typos
Ports
* Improve TLS1.2 client authentication to use TSIP
* Updated Kyber macro to be WOLFSSL_HAVE_KYBER and made changes that make Kyber
work on STM32
* AES-GCM Windows assembly additions
* CRLF line endings, trailing spaces for C# Wrapper Projects Compatibility Layer
* Update PubKey and Key PEM-to-DER APIs to support return of needed DER size
* Allow reading ENC EC PRIVATE KEY as well via wolfSSL_PEM_read_bio_ECPrivateKey
* Improve wolfSSL_EC_POINT_cmp to handle Jacobian ordinates
* Fix issue with BIO_reset() and add BIO_FLAGS_MEM_RDONLY flag support for read
only BIOs
SP
* In SP math library rework mod 3 and use count leading zero instruction
* Fix with SP ECC sign to reject the random k generated when r is 0
* With SP math add better detection of when add won't work and double is needed
with point_add_qz1 internal function
* With SP int fail when buffer writing to is too small for number rather than
discarding the extra values
Builds
* Define WOLFSSL_SP_SMALL_STACK if wolfSSL is build with --enable-smallstack
* Fix CMake to exclude libm when DH is not enabled
* Allow building of SAKKE as external non-FIPS algorithm with wolfmikey product
* Add option to add library suffix, --with-libsuffix
* ASN template compile option WOLFSSL_ASN_INT_LEAD_0_ANY to allow leading zeros
* Add user_settings.h template for wolfTPM to
examples/configs/user_settings_wolftpm.h
* Purge the AES variant of Dilithium
* Expand WOLFSSL_NO_ASN_STRICT to allow parsing of explicit ECC public key
* Remove relocatable text in ARMv7a AES assembly for use with FIPS builds
* Expand checking for hardware that supports ARMv7a neon with autotools
configure
* Sanity check on allocation fails with DSA and FP_ECC build when zeroizing
internal buffer
* Additional TLS alerts sent when compiling with WOLFSSL_EXTRA_ALERTS macro
defined
Benchmarking
* Update wolfCrypt benchmark Windows build files to support x64 Platform
* Add SHA512/224 and SHA512/256 benchmarks, fixed CVS macro and display sizes
* Separate AES-GCM streaming runs when benchmarked
* No longer call external implementation of Kyber from benchmark
* Fix for benchmarking shake with custom block size
* Fixes for benchmark help -alg list and block format Documentation/Examples
* Document use of wc_AesFree() and update documentation of Ed25519 with Doxygen
* Move the wolfSSL Configuration section higher in QUIC.md
* Add Japanese Doxygen documentation for cmac.h, quic.h and remove incomplete
Japanese doxygen in asn_public.h
* Espressif examples run with local wolfSSL now with no additional setup needed
* Added a fix for StartTLS use In the example client
* Add a base-line user_settings.h for use with FIPS 140-3 in XCode example app
Optimizations
* AES-NI usage added for AES modes ECB/CTR/XTS
Misc
* Update AES-GCM stream decryption to allow long IVs
* Internal refactor to use wolfSSL_Ref functions when incrementing or
decrementing the structures reference count and fixes for static analysis
reports
* Cleanup function logging making adjustments to the debug log print outs
* Remove realloc dependency in DtlsMsgCombineFragBuckets function
* Refactor to use WOLFSSL_CTX窶冱 cipher suite list when possible
* Update internal padding of 0窶冱 with DSA sign and additional tests with
mp_to_unsigned_bin_len function
* With DTLS SRTP use wolfSSL_export_keying_material instead of wc_PRF_TLS
* Updated macro naming from HAVE_KYBER to be WOLFSSL_HAVE_KYBER
* Update AES XTS encrypt to handle in-place encryption properly
* With TLS 1.3 add option to require only PSK with DHE
Fixes
Ports
* Fix for AES use with CAAM on imx8qxp with SECO builds
* Fix for PIC32 crypto HW and unused TLSX_SetResponse
* Fix warning if ltime is unsigned seen with QNX build
* Updates and fix for Zephyr project support
* Include sys/time.h for WOLFSSL_RIOT_OS
* Move X509_V errors from enums to defines for use with HAProxy CLI
* Fix IAR compiler warnings resolved
* Fix for STM32 Hash peripherals (like on F437) with FIFO depth = 1
* ESP32 fix for SHA384 init with hardware acceleration
Builds
* Add WOLFSSL_IP_ALT_NAME macro define to --enable-curl
* Fixes for building with C++17 and avoiding clashing with byte naming
* Fixes SP math all build issue with small-stack and no hardening
* Fix for building with ASN template with NO_ASN_TIME defined
* Fix building FIPSv2 with WOLFSSL_ECDSA_SET_K defined
* Don't allow aesgcm-stream option with kcapi
* Fix DTLS test case for when able to read peers close notify alert on FreeBSD
systems
* Fix for "expression must have a constant value" in tls13.c with Green Hills
compiler
* Fixes for building KCAPI with opensslextra enabled
* Fix warnings of shadows min and subscript with i486-netbsd-gcc compiler
* Fix issue with async and WOLFSSL_CHECK_ALERT_ON_ERR
* Fix for PKCS7 with asynchronous crypto enabled
Math Library
* SP Aarch64 fix for conditional changed in asm needing "cc" and fix for ECC
P256 mont reduce
* In SP builds add sanity check with DH exp. to check the output length for
minimum size
* In SP math fix scalar length check with EC scalar multiply
* With SP int fix handling negative character properly with read radix
* Add error checks before setting variable err in SP int with the function
sp_invmod_mont_ct
* Fix to add sanity check for malloc of zero size in fastmath builds
* In fastmath fix a possible overflow in fp_to_unsigned_bin_len length check
* Heapmath fast mod. reduce fix
Compatibility Layer
* Fixes for encoding/decoding ecc public keys and ensure i2d public key
functions do not include any private key information
* Fix for EVP_EncryptUpdate to update outl on empty input
* Fix SE050 RSA public key loading and RSA/ECC SE050 TLS Compatibility
* Rework EC API and validate point after setting it
* Fix for X509 RSA PSS with compatibility layer functions
* Fix size of structures used with SHA operations when built with opensslextra
for Espressif hardware accelerated hashing
* Added sanity check on key length with wolfSSL_CMAC_Init function
* Fix for return value type conversion of bad mutex error in logging function
* Fix NID conflict NID_givenName and NID_md5WithRSAEncryption
* Fix unguarded XFPRINTF calls with opensslextra build
* Fix wolfSSL_ASN1_INTEGER_to_BN for negative values
* Fix for potential ASN1_STRING leak in wolfSSL_X509_NAME_ENTRY_create_by_txt
and wolfSSL_X509_NAME_ENTRY_create_by_NID when memory allocation fails
Misc.
* Add sanity check to prevent an out of bounds read with OCSP response decoding
* Sanity check to not allow 0 length with bit string and integer when parsing
ASN1 syntax
* Adjust RNG sanity checks and remove error prone first byte comparison
* With PKCS7 add a fix for GetAsnTimeString() to correctly increment internal
data pointer
* PKCS7 addition of sequence around algo parameters with authenvelop
* DSA fixes for clearing mp_int before re-reading data and avoid mp_clear
without first calling mp_init
* Fix for SRTP setting bitfield when it is encoded for the TLS extension
* Fix for handling small http headers when doing CRL verification
* Fix for ECCSI hash function to validate the output size and curve size
* Fix for value of givenName and name being reversed with CSR generation
* Fix for error type returned (OCSP_CERT_UNKNOWN) with OCSP verification
* Fix for a potential memory leak with ProcessCSR when handling OCSP responses
* Fix for VERIFY_SKIP_DATE flag not ignoring date errors when set
* Fix for zlib decompression buffer issue with PKCS7
* Fix for DTLS message pool send size used and DTLS server saving of the
handshake sequence
* Fix to propagate WOLFSSL_TICKET_RET_CREATE error return value from
DoDecryptTicket()
* Fix for handling long session IDs with TLS 1.3 session tickets
* Fix for AES-GCM streaming when caching an IV
* Fix for test case with older selftest that returns bad padding instead of salt
len error
* Add fix for siphash cache and added in additional tests
* Fix potential out of bounds memset to 0 in error case with session export
function used with --enable-sessionexport builds
* Fix possible NULL dereference in TLSX_CSR_Parse with TLS 1.3
* Fix for sanity check on RSA pad length with no padding using the build macro
WC_RSA_NO_PADDING
Changes since v5.5.4:
wolfSSL Release 5.6.0 (Mar 24, 2023)
Release 5.6.0 has been developed according to wolfSSL's development and QA
process (see link below) and successfully passed the quality
criteria. https://www.wolfssl.com/about/wolfssl-software-development-process-quality-assurance
NOTE: * --enable-heapmath is being deprecated and will be removed by 2024 * This
release makes ASN Template the default with ./configure, the previous ASN
parsing can be built with --enable-asn=original
Release 5.6.0 of wolfSSL embedded TLS has bug fixes and new features including:
New Feature Additions
* ASN template is now the default ASN parsing implementation when compiling with
configure
* Added in support for TLS v1.3 Encrypted Client Hello (ECH) and HPKE (Hybrid
Public Key Encryption)
* DTLS 1.3 stateless server ClientHello parsing support added
Ports
* Add RX64/RX71 SHA hardware support
* Port to RT1170 and expand NXP CAAM driver support
* Add NuttX integration files for ease of use
* Updated Stunnel support for version 5.67 Compatibility Layer
* Add in support for AES-CCM with EVP
* BN compatibility API refactoring and separate API created
* Expanding public key type cipher suite list strings support
Misc.
* Support pthread_rwlock and add enable option
* Add wolfSSL_CertManagerLoadCABuffer_ex() that takes a user certificate chain
flag and additional verify flag options
* Docker build additions for wolfSSL library and wolfCLU application
* Add favorite drink pilot attribute type to get it from the encoding
* Added in support for indefinite length BER parsing with PKCS12
* Add dynamic session cache which allocates sessions from the heap with macro
SESSION_CACHE_DYNAMIC_MEM
Improvements / Optimizations
Tests
* Additional CI (continuous integration) testing and leveraging of GitHub
workflows
* Add CI testing for wpa_supplicant, OpenWrt and OpenVPN using GitHub workflows
* Add compilation of Espressif to GitHub workflows tests
* Refactoring and improving error results with wolfCrypt unit test application
* Minor warning fixes from Coverity static analysis scan
* Add new SHA-512/224 and SHA-512/256 tests
* Used codespell and fixed some minor typos
Ports
* Improve TLS1.2 client authentication to use TSIP
* Updated Kyber macro to be WOLFSSL_HAVE_KYBER and made changes that make Kyber
work on STM32
* AES-GCM Windows assembly additions
* CRLF line endings, trailing spaces for C# Wrapper Projects Compatibility Layer
* Update PubKey and Key PEM-to-DER APIs to support return of needed DER size
* Allow reading ENC EC PRIVATE KEY as well via wolfSSL_PEM_read_bio_ECPrivateKey
* Improve wolfSSL_EC_POINT_cmp to handle Jacobian ordinates
* Fix issue with BIO_reset() and add BIO_FLAGS_MEM_RDONLY flag support for read
only BIOs
SP
* In SP math library rework mod 3 and use count leading zero instruction
* Fix with SP ECC sign to reject the random k generated when r is 0
* With SP math add better detection of when add won't work and double is needed
with point_add_qz1 internal function
* With SP int fail when buffer writing to is too small for number rather than
discarding the extra values
Builds
* Define WOLFSSL_SP_SMALL_STACK if wolfSSL is build with --enable-smallstack
* Fix CMake to exclude libm when DH is not enabled
* Allow building of SAKKE as external non-FIPS algorithm with wolfmikey product
* Add option to add library suffix, --with-libsuffix
* ASN template compile option WOLFSSL_ASN_INT_LEAD_0_ANY to allow leading zeros
* Add user_settings.h template for wolfTPM to
examples/configs/user_settings_wolftpm.h
* Purge the AES variant of Dilithium
* Expand WOLFSSL_NO_ASN_STRICT to allow parsing of explicit ECC public key
* Remove relocatable text in ARMv7a AES assembly for use with FIPS builds
* Expand checking for hardware that supports ARMv7a neon with autotools
configure
* Sanity check on allocation fails with DSA and FP_ECC build when zeroizing
internal buffer
* Additional TLS alerts sent when compiling with WOLFSSL_EXTRA_ALERTS macro
defined
Benchmarking
* Update wolfCrypt benchmark Windows build files to support x64 Platform
* Add SHA512/224 and SHA512/256 benchmarks, fixed CVS macro and display sizes
* Separate AES-GCM streaming runs when benchmarked
* No longer call external implementation of Kyber from benchmark
* Fix for benchmarking shake with custom block size
* Fixes for benchmark help -alg list and block format Documentation/Examples
* Document use of wc_AesFree() and update documentation of Ed25519 with Doxygen
* Move the wolfSSL Configuration section higher in QUIC.md
* Add Japanese Doxygen documentation for cmac.h, quic.h and remove incomplete
Japanese doxygen in asn_public.h
* Espressif examples run with local wolfSSL now with no additional setup needed
* Added a fix for StartTLS use In the example client
* Add a base-line user_settings.h for use with FIPS 140-3 in XCode example app
Optimizations
* AES-NI usage added for AES modes ECB/CTR/XTS
Misc
* Update AES-GCM stream decryption to allow long IVs
* Internal refactor to use wolfSSL_Ref functions when incrementing or
decrementing the structures reference count and fixes for static analysis
reports
* Cleanup function logging making adjustments to the debug log print outs
* Remove realloc dependency in DtlsMsgCombineFragBuckets function
* Refactor to use WOLFSSL_CTX窶冱 cipher suite list when possible
* Update internal padding of 0窶冱 with DSA sign and additional tests with
mp_to_unsigned_bin_len function
* With DTLS SRTP use wolfSSL_export_keying_material instead of wc_PRF_TLS
* Updated macro naming from HAVE_KYBER to be WOLFSSL_HAVE_KYBER
* Update AES XTS encrypt to handle in-place encryption properly
* With TLS 1.3 add option to require only PSK with DHE
Fixes
Ports
* Fix for AES use with CAAM on imx8qxp with SECO builds
* Fix for PIC32 crypto HW and unused TLSX_SetResponse
* Fix warning if ltime is unsigned seen with QNX build
* Updates and fix for Zephyr project support
* Include sys/time.h for WOLFSSL_RIOT_OS
* Move X509_V errors from enums to defines for use with HAProxy CLI
* Fix IAR compiler warnings resolved
* Fix for STM32 Hash peripherals (like on F437) with FIFO depth = 1
* ESP32 fix for SHA384 init with hardware acceleration
Builds
* Add WOLFSSL_IP_ALT_NAME macro define to --enable-curl
* Fixes for building with C++17 and avoiding clashing with byte naming
* Fixes SP math all build issue with small-stack and no hardening
* Fix for building with ASN template with NO_ASN_TIME defined
* Fix building FIPSv2 with WOLFSSL_ECDSA_SET_K defined
* Don't allow aesgcm-stream option with kcapi
* Fix DTLS test case for when able to read peers close notify alert on FreeBSD
systems
* Fix for "expression must have a constant value" in tls13.c with Green Hills
compiler
* Fixes for building KCAPI with opensslextra enabled
* Fix warnings of shadows min and subscript with i486-netbsd-gcc compiler
* Fix issue with async and WOLFSSL_CHECK_ALERT_ON_ERR
* Fix for PKCS7 with asynchronous crypto enabled
Math Library
* SP Aarch64 fix for conditional changed in asm needing "cc" and fix for ECC
P256 mont reduce
* In SP builds add sanity check with DH exp. to check the output length for
minimum size
* In SP math fix scalar length check with EC scalar multiply
* With SP int fix handling negative character properly with read radix
* Add error checks before setting variable err in SP int with the function
sp_invmod_mont_ct
* Fix to add sanity check for malloc of zero size in fastmath builds
* In fastmath fix a possible overflow in fp_to_unsigned_bin_len length check
* Heapmath fast mod. reduce fix
Compatibility Layer
* Fixes for encoding/decoding ecc public keys and ensure i2d public key
functions do not include any private key information
* Fix for EVP_EncryptUpdate to update outl on empty input
* Fix SE050 RSA public key loading and RSA/ECC SE050 TLS Compatibility
* Rework EC API and validate point after setting it
* Fix for X509 RSA PSS with compatibility layer functions
* Fix size of structures used with SHA operations when built with opensslextra
for Espressif hardware accelerated hashing
* Added sanity check on key length with wolfSSL_CMAC_Init function
* Fix for return value type conversion of bad mutex error in logging function
* Fix NID conflict NID_givenName and NID_md5WithRSAEncryption
* Fix unguarded XFPRINTF calls with opensslextra build
* Fix wolfSSL_ASN1_INTEGER_to_BN for negative values
* Fix for potential ASN1_STRING leak in wolfSSL_X509_NAME_ENTRY_create_by_txt
and wolfSSL_X509_NAME_ENTRY_create_by_NID when memory allocation fails
Misc.
* Add sanity check to prevent an out of bounds read with OCSP response decoding
* Sanity check to not allow 0 length with bit string and integer when parsing
ASN1 syntax
* Adjust RNG sanity checks and remove error prone first byte comparison
* With PKCS7 add a fix for GetAsnTimeString() to correctly increment internal
data pointer
* PKCS7 addition of sequence around algo parameters with authenvelop
* DSA fixes for clearing mp_int before re-reading data and avoid mp_clear
without first calling mp_init
* Fix for SRTP setting bitfield when it is encoded for the TLS extension
* Fix for handling small http headers when doing CRL verification
* Fix for ECCSI hash function to validate the output size and curve size
* Fix for value of givenName and name being reversed with CSR generation
* Fix for error type returned (OCSP_CERT_UNKNOWN) with OCSP verification
* Fix for a potential memory leak with ProcessCSR when handling OCSP responses
* Fix for VERIFY_SKIP_DATE flag not ignoring date errors when set
* Fix for zlib decompression buffer issue with PKCS7
* Fix for DTLS message pool send size used and DTLS server saving of the
handshake sequence
* Fix to propagate WOLFSSL_TICKET_RET_CREATE error return value from
DoDecryptTicket()
* Fix for handling long session IDs with TLS 1.3 session tickets
* Fix for AES-GCM streaming when caching an IV
* Fix for test case with older selftest that returns bad padding instead of salt
len error
* Add fix for siphash cache and added in additional tests
* Fix potential out of bounds memset to 0 in error case with session export
function used with --enable-sessionexport builds
* Fix possible NULL dereference in TLSX_CSR_Parse with TLS 1.3
* Fix for sanity check on RSA pad length with no padding using the build macro
WC_RSA_NO_PADDING
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.65
MAIN commitmail json YAML
audio/fasttracker2: Update to 1.65
Changes since v1.63
v1.65 - 03.03.2023
- Quick fix for volume ramp delta (could be slightly off in v1.64)
v1.64 - 03.03.2023
- Increased number of precision bits for song BPM, playback time counter and
audio->video syncing. This is a minor change and does very little in practice
as the previous precision was already quite good.
- Audio/video sync timestamps are reset every half an hour to prevent possible
sync drifting after several hours of playing a song without a single song stop
(resets timestamp) in-between.
- The HPC timers are reset every half an hour instead of every hour.
Video (if no vsync) and the scopes use these timers.
- Small code refactor for how the song is timed/ticked. Longer song-to-WAV
renders may have a filesize change of a few bytes, but this is actually
more correct.
Changes since v1.63
v1.65 - 03.03.2023
- Quick fix for volume ramp delta (could be slightly off in v1.64)
v1.64 - 03.03.2023
- Increased number of precision bits for song BPM, playback time counter and
audio->video syncing. This is a minor change and does very little in practice
as the previous precision was already quite good.
- Audio/video sync timestamps are reset every half an hour to prevent possible
sync drifting after several hours of playing a song without a single song stop
(resets timestamp) in-between.
- The HPC timers are reset every half an hour instead of every hour.
Video (if no vsync) and the scopes use these timers.
- Small code refactor for how the song is timed/ticked. Longer song-to-WAV
renders may have a filesize change of a few bytes, but this is actually
more correct.
MAIN commitmail json YAML
doc: Updated sysutils/htop to 3.2.2
MAIN commitmail json YAML
sysutils/htop: Update to 3.2.2
Changes since 3.2.1:
What's new in version 3.2.2
* CPUMeter now can show frequency in text mode
* Add option to render distribution path prefixes shadowed
* DiskIOMeter converts to bytes per second (not per interval)
* DiskIOMeter uses complete units, including missing "iB/s"
* DiskIOMeter indicates read and write in meter mode
* NetworkIOMeter converts to packets per second, shows packet rate
* Allow continued process following when changing display settings
* Update the panel header when changing to another tab
* Drop margin around the header if there are no meters
* Use Unicode replacement character for non-printable characters
* Default color preset uses bold blue for better visibility
* Update the Panel header on sort order inversions ('I')
* Toggle the header meters with pound key
* Fix ScreenPanel to handle quitting the panel while renaming
* Add fallback for HOME environment variable using passwd database
* Replace meaningless ID column with FD column in lock screen
* Use device format in the lock screen matching the files screen
* On Linux, improvements to file-descriptor lock detection
* On Linux, further distinguish systemd states in the SystemdMeter
* On Linux, improvements to cgroup and container identification
* On Linux, support openat(2) without readlinkat(2) platforms
* On Darwin, fix current process buffer handling for busy systems
* On DragonFly BSD, fix incorrect processor time of processes
* On FreeBSD, fix an issue with the memory graph not showing correctly
* On FreeBSD, add support for displaying shared memory usage
* On PCP, use pmLookupDescs(3) if available for efficiency
* On PCP, normalize generic columns values for consistent display
* On PCP, changes preparing for configurable, dynamic screens
* Handle invalid process columns from the configuration file
* Avoid undefined behaviour with deeply nested processes
* Fix crash when removing the currently active screen
* Prevent possible crash on a very early error path
* Include automake for Debian/Ubuntu
* Restore non-mouse support
* Reject unsupported command line arguments
* Document idle process state
* Clarify M_TRS/M_DRS columns
Changes since 3.2.1:
What's new in version 3.2.2
* CPUMeter now can show frequency in text mode
* Add option to render distribution path prefixes shadowed
* DiskIOMeter converts to bytes per second (not per interval)
* DiskIOMeter uses complete units, including missing "iB/s"
* DiskIOMeter indicates read and write in meter mode
* NetworkIOMeter converts to packets per second, shows packet rate
* Allow continued process following when changing display settings
* Update the panel header when changing to another tab
* Drop margin around the header if there are no meters
* Use Unicode replacement character for non-printable characters
* Default color preset uses bold blue for better visibility
* Update the Panel header on sort order inversions ('I')
* Toggle the header meters with pound key
* Fix ScreenPanel to handle quitting the panel while renaming
* Add fallback for HOME environment variable using passwd database
* Replace meaningless ID column with FD column in lock screen
* Use device format in the lock screen matching the files screen
* On Linux, improvements to file-descriptor lock detection
* On Linux, further distinguish systemd states in the SystemdMeter
* On Linux, improvements to cgroup and container identification
* On Linux, support openat(2) without readlinkat(2) platforms
* On Darwin, fix current process buffer handling for busy systems
* On DragonFly BSD, fix incorrect processor time of processes
* On FreeBSD, fix an issue with the memory graph not showing correctly
* On FreeBSD, add support for displaying shared memory usage
* On PCP, use pmLookupDescs(3) if available for efficiency
* On PCP, normalize generic columns values for consistent display
* On PCP, changes preparing for configurable, dynamic screens
* Handle invalid process columns from the configuration file
* Avoid undefined behaviour with deeply nested processes
* Fix crash when removing the currently active screen
* Prevent possible crash on a very early error path
* Include automake for Debian/Ubuntu
* Restore non-mouse support
* Reject unsupported command line arguments
* Document idle process state
* Clarify M_TRS/M_DRS columns
MAIN commitmail json YAML
doc: Updated sysutils/py-Glances to 3.3.1.1
MAIN commitmail json YAML
sysutils/py-Glances: Update to 3.3.1.1
Changes since 3.3.0.4:
===============
Version 3.3.1.1
===============
Hard patch on the master branch.
Bug corrected:
* "ModuleNotFoundError: No module named 'ujson'" #2246
* Remove surrounding quotes for quoted command arguments #2247 (related to #2239)
===============
Version 3.3.1
===============
Enhancements:
* Minor change on the help screen
* Refactor some loop in the processes function
* Replace json by ujson #2201
Bug corrected:
* Unable to see docker related information #2180
* CSV export dependent on sort order for docker container cpu #2156
* Error when process list is displayed in Programs mode #2209
* Console formatting permanently messed up when other text printed #2211
* API GET uptime returns formatted string, not seconds as the doc says #2158
* Glances UI is breaking for multiline commands #2189
Documentation and CI:
* Add unitary test for memory profiling
* Update memory profile chart
* Add run-docker-ubuntu-* in Makefile
* The open-web-browser option was missing dashes #2219
* Correct regexp in glances.conf file example
* What is CW from network #2222 (related to discussion #2221)
* Change Glances repology URL
* Add example for the date format
* Correct Flake8 configuration file
* Drop UT for Python 3.5 and 3.6 (no more available in Ubuntu 22.04)
* Correct unitary test with Python 3.5
* Update Makefile with comments
* Update Python minimal requirement for py3nvlm
* Update security policy (user can open private issue directly in Github)
* Add a simple run script. Entry point for IDE debuger
Cyber security update:
* Security alert on ujson < 5.4
* Merge pull request #2243 from nicolargo/renovate/nvidia-cuda-12.x
* Merge pull request #2244 from nicolargo/renovate/crazy-max-ghaction-docker-meta-4.x
* Merge pull request #2228 from nicolargo/renovate/zeroconf-0.x
* Merge pull request #2242 from nicolargo/renovate/crazy-max-ghaction-docker-meta-4.x
* Merge pull request #2239 from mfridge/action-command-split
* Merge pull request #2165 from nicolargo/renovate/zeroconf-0.x
* Merge pull request #2199 from nicolargo/renovate/alpine-3.x
* Merge pull request #2202 from chncaption/oscs_fix_cdr0ts8au51t49so8c6g
* Bump loader-utils from 2.0.0 to 2.0.3 in /glances/outputs/static #2187 - Update Web lib
Contributors for this version:
* Nicolargo
* renovate[bot]
* chncaption
* fkwong
* *mfridge
And also a big thanks to @RazCrimson (https://github.com/RazCrimson) for the support to the Glances community !
Changes since 3.3.0.4:
===============
Version 3.3.1.1
===============
Hard patch on the master branch.
Bug corrected:
* "ModuleNotFoundError: No module named 'ujson'" #2246
* Remove surrounding quotes for quoted command arguments #2247 (related to #2239)
===============
Version 3.3.1
===============
Enhancements:
* Minor change on the help screen
* Refactor some loop in the processes function
* Replace json by ujson #2201
Bug corrected:
* Unable to see docker related information #2180
* CSV export dependent on sort order for docker container cpu #2156
* Error when process list is displayed in Programs mode #2209
* Console formatting permanently messed up when other text printed #2211
* API GET uptime returns formatted string, not seconds as the doc says #2158
* Glances UI is breaking for multiline commands #2189
Documentation and CI:
* Add unitary test for memory profiling
* Update memory profile chart
* Add run-docker-ubuntu-* in Makefile
* The open-web-browser option was missing dashes #2219
* Correct regexp in glances.conf file example
* What is CW from network #2222 (related to discussion #2221)
* Change Glances repology URL
* Add example for the date format
* Correct Flake8 configuration file
* Drop UT for Python 3.5 and 3.6 (no more available in Ubuntu 22.04)
* Correct unitary test with Python 3.5
* Update Makefile with comments
* Update Python minimal requirement for py3nvlm
* Update security policy (user can open private issue directly in Github)
* Add a simple run script. Entry point for IDE debuger
Cyber security update:
* Security alert on ujson < 5.4
* Merge pull request #2243 from nicolargo/renovate/nvidia-cuda-12.x
* Merge pull request #2244 from nicolargo/renovate/crazy-max-ghaction-docker-meta-4.x
* Merge pull request #2228 from nicolargo/renovate/zeroconf-0.x
* Merge pull request #2242 from nicolargo/renovate/crazy-max-ghaction-docker-meta-4.x
* Merge pull request #2239 from mfridge/action-command-split
* Merge pull request #2165 from nicolargo/renovate/zeroconf-0.x
* Merge pull request #2199 from nicolargo/renovate/alpine-3.x
* Merge pull request #2202 from chncaption/oscs_fix_cdr0ts8au51t49so8c6g
* Bump loader-utils from 2.0.0 to 2.0.3 in /glances/outputs/static #2187 - Update Web lib
Contributors for this version:
* Nicolargo
* renovate[bot]
* chncaption
* fkwong
* *mfridge
And also a big thanks to @RazCrimson (https://github.com/RazCrimson) for the support to the Glances community !
MAIN commitmail json YAML
doc: Updated audio/din to 56
MAIN commitmail json YAML
audio/din: Update to 56
Changes since 55:
DIN Is Noise 56:
/*
new drone movements: rail and strafe
rail moves a drone along its velocity vector
strafe moves a drone lateral (perpendicular) to the velocity vector
access rail and strafe using Drone Tools > Move / Rail / Strafe option list
click on the option to activate
then just move mouse up or down to rail or strafe
interesting fx possible if the drone velocity vectors are
auto rotating / flipping / pausing when railing or strafing!
*\
/*
new auto pause for auto rotating drone velocity and/or accleration vectors
basically, pause rotating every few seconds for a few seconds
set values of 'every few seconds' and 'for a few seconds' from:
Drone Params > Defaults for new drones OR
Drone Params > Motion for existing drones
*\
/*
new auto flip (= change direction of) rotation of curves on
any curve editor
*\
/*
new Curves tab on Menu of all curve editors
lists curves available for editing
can turn on/off curves for better/easier & targeted editing
*\
* improved FFT display and handling on waveform editors
* improved waveform display on keyboard-keyboard
* improved auto flip of rotation of velocity/acceleration vectors of drones
@ launched drones from muted drones are not muted (default until DIN55)
@ they serve no purpose, you can just select the launcher and
stop launching :)
- Fractaliser does not change curve name on apply
! fixed Menu > Drone tools > Immortalize to turn mortal launched drones immortal
! fixed resizing of Sine_Mixer harmonics/phases widget when moving Sine_Mixer
Changes since 55:
DIN Is Noise 56:
/*
new drone movements: rail and strafe
rail moves a drone along its velocity vector
strafe moves a drone lateral (perpendicular) to the velocity vector
access rail and strafe using Drone Tools > Move / Rail / Strafe option list
click on the option to activate
then just move mouse up or down to rail or strafe
interesting fx possible if the drone velocity vectors are
auto rotating / flipping / pausing when railing or strafing!
*\
/*
new auto pause for auto rotating drone velocity and/or accleration vectors
basically, pause rotating every few seconds for a few seconds
set values of 'every few seconds' and 'for a few seconds' from:
Drone Params > Defaults for new drones OR
Drone Params > Motion for existing drones
*\
/*
new auto flip (= change direction of) rotation of curves on
any curve editor
*\
/*
new Curves tab on Menu of all curve editors
lists curves available for editing
can turn on/off curves for better/easier & targeted editing
*\
* improved FFT display and handling on waveform editors
* improved waveform display on keyboard-keyboard
* improved auto flip of rotation of velocity/acceleration vectors of drones
@ launched drones from muted drones are not muted (default until DIN55)
@ they serve no purpose, you can just select the launcher and
stop launching :)
- Fractaliser does not change curve name on apply
! fixed Menu > Drone tools > Immortalize to turn mortal launched drones immortal
! fixed resizing of Sine_Mixer harmonics/phases widget when moving Sine_Mixer
MAIN commitmail json YAML
pkgsrc/www/jira-cli/PLIST@1.5
/
diff
pkgsrc/www/jira-cli/distinfo@1.7 / diff
pkgsrc/www/jira-cli/go-modules.mk@1.5 / diff
pkgsrc/www/jira-cli/distinfo@1.7 / diff
pkgsrc/www/jira-cli/go-modules.mk@1.5 / diff
www/jira-cli: Add the missed out changes for go modules.
MAIN commitmail json YAML
doc: Updated www/jira-cli to 1.3.0
MAIN commitmail json YAML
www/jira-cli: Update to 1.3.0
Changes since 1.1.0:
v1.3.0
This release contains some features and enhancements + upgrades all
dependencies.
## What's Changed/Fixed?
- feat: Allow to set reporter on issue create by @ankitpokhrel in #539
- feat: Use single char ellipsis instead of triple dot by @ankitpokhrel in #540
- ehc: Make assignee operation atomic on create by @ankitpokhrel in #531
- ehc: Auto fallback to plain output on notty by @ankitpokhrel in #538
- ehc: Add warning for invalid custom field by @ankitpokhrel in #528 (Original work by @martinpovolny on #525)
- fix(build): Invalid commit hash in docker image by @ankitpokhrel in #535
## Dependency Upgrades
- dep: Upgrade all packages by @ankitpokhrel in #532
- dep: Upgrade golang to v1.19 by @ankitpokhrel in #534
- ci: Upgrade golangci-lint to v1.50.1 by @ankitpokhrel in #536
Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v1.2.0...v1.3.0
v1.2.0
This release adds support for Jira v9, a serverinfo command to quickly check
your Jira server build info, lets you set resolution, assignee and comment on
issue move, and many more.
## What's added?
- feat: Add serverinfo command by @ankitpokhrel in #440
- feat: Support for Jira v9 by @ankitpokhrel in #447
- feat: Allow to set start datetime on worklog add by @ankitpokhrel in #453
- feat: Make date time input in worklog flexible by @ankitpokhrel in #465
- feat: Add support for project datatype in custom fields by @oveaurs in #482
- feat: Add weblink to issue (#446) by @Syd7 in #483
- feat: Resolution, assignee & comment on issue move by @ankitpokhrel in #492
- feat: Filter issues by the absence of label(s) by @martinpovolny in #505
- feat: Add labels to the issue listing by @martinpovolny in #506
- feat: Allow setting of fixed columns in the list of issues, epics and sprints
by @martinpovolny in #509
## What's fixed?
- fix: Option to show issues from all projects in sprint list by @ankitpokhrel
in #475
- fix: Discrepancy in --insecure flag by @ankitpokhrel in #507
- fix: Make board selection optional by @ankitpokhrel in #502
- fix: Improve support for pager by @ankitpokhrel in #503
- fix: Respect editor env vars in Windows by @ankitpokhrel in #524
## Other changes
- ci: Multi-arch docker image by @ankitpokhrel in #508
- doc: Add link to project in help by @ankitpokhrel in #456
- doc: Add Nix package by @bryanasdev000 in #458
- doc: Update help for completion cmd by @ankitpokhrel in #491
- doc: Add scoop installation process by @alkuzad in #497
## New Contributors
- @bryanasdev000 made their first contribution in #458
- @oveaurs made their first contribution in #482
- @Syd7 made their first contribution in #483
- @alkuzad made their first contribution in #497
- @martinpovolny made their first contribution in #505
Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v1.1.0...v1.2.0
Changes since 1.1.0:
v1.3.0
This release contains some features and enhancements + upgrades all
dependencies.
## What's Changed/Fixed?
- feat: Allow to set reporter on issue create by @ankitpokhrel in #539
- feat: Use single char ellipsis instead of triple dot by @ankitpokhrel in #540
- ehc: Make assignee operation atomic on create by @ankitpokhrel in #531
- ehc: Auto fallback to plain output on notty by @ankitpokhrel in #538
- ehc: Add warning for invalid custom field by @ankitpokhrel in #528 (Original work by @martinpovolny on #525)
- fix(build): Invalid commit hash in docker image by @ankitpokhrel in #535
## Dependency Upgrades
- dep: Upgrade all packages by @ankitpokhrel in #532
- dep: Upgrade golang to v1.19 by @ankitpokhrel in #534
- ci: Upgrade golangci-lint to v1.50.1 by @ankitpokhrel in #536
Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v1.2.0...v1.3.0
v1.2.0
This release adds support for Jira v9, a serverinfo command to quickly check
your Jira server build info, lets you set resolution, assignee and comment on
issue move, and many more.
## What's added?
- feat: Add serverinfo command by @ankitpokhrel in #440
- feat: Support for Jira v9 by @ankitpokhrel in #447
- feat: Allow to set start datetime on worklog add by @ankitpokhrel in #453
- feat: Make date time input in worklog flexible by @ankitpokhrel in #465
- feat: Add support for project datatype in custom fields by @oveaurs in #482
- feat: Add weblink to issue (#446) by @Syd7 in #483
- feat: Resolution, assignee & comment on issue move by @ankitpokhrel in #492
- feat: Filter issues by the absence of label(s) by @martinpovolny in #505
- feat: Add labels to the issue listing by @martinpovolny in #506
- feat: Allow setting of fixed columns in the list of issues, epics and sprints
by @martinpovolny in #509
## What's fixed?
- fix: Option to show issues from all projects in sprint list by @ankitpokhrel
in #475
- fix: Discrepancy in --insecure flag by @ankitpokhrel in #507
- fix: Make board selection optional by @ankitpokhrel in #502
- fix: Improve support for pager by @ankitpokhrel in #503
- fix: Respect editor env vars in Windows by @ankitpokhrel in #524
## Other changes
- ci: Multi-arch docker image by @ankitpokhrel in #508
- doc: Add link to project in help by @ankitpokhrel in #456
- doc: Add Nix package by @bryanasdev000 in #458
- doc: Update help for completion cmd by @ankitpokhrel in #491
- doc: Add scoop installation process by @alkuzad in #497
## New Contributors
- @bryanasdev000 made their first contribution in #458
- @oveaurs made their first contribution in #482
- @Syd7 made their first contribution in #483
- @alkuzad made their first contribution in #497
- @martinpovolny made their first contribution in #505
Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v1.1.0...v1.2.0
MAIN commitmail json YAML
doc: Updated security/wolfssl to 5.5.4
MAIN commitmail json YAML
security/wolfssl: Update to v5.5.4
Changes since v5.5.3:
wolfSSL Release 5.5.4 (Dec 21, 2022)
Release 5.5.4 of wolfSSL embedded TLS has bug fixes and new features including:
New Feature Additions
* QUIC related changes for HAProxy integration and config option
* Support for Analog Devices MAXQ1080 and MAXQ1065
* Testing and build of wolfSSL with NuttX
* New software based entropy gatherer with configure option
--enable-entropy-memuseOP
* NXP SE050 feature expansion and fixes, adding in RSA support and conditional
compile of AES and CMAC
* Support for multi-threaded sniffer
Improvements / Optimizations
Benchmark and Tests
* Add alternate test case for unsupported static memory API when testing mutex
allocations
* Additional unit test cases added for AES CCM 256-bit
* Initialize and free AES object with benchmarking AES-OFB
* Kyber with DTLS 1.3 tests added
* Tidy up Espressif ESP32 test and benchmark examples
* Rework to be able to run API tests individually and add display of time taken
per test
Build and Port Improvements
* Add check for 64-bit ABI on MIPS64 before declaring a 64-bit CPU
* Add support to detect SIZEOF_LONG in armclang and diab
* Added in a simple example working on Rx72n
* Update azsphere support to prevent compilation of file included inline
* --enable-brainpool configure option added and default to on when custom curves
are also on
* Add RSA PSS salt defines to engine builds if not FIPS v2
Post Quantum
* Remove kyber-90s and route all Kyber through wolfcrypt
* Purge older version of NTRU and SABER from wolfSSL
SP Math
* Support static memory build with sp-math
* SP C, SP int: improve performance
* SP int: support mingw64 again
* SP int: enhancements to guess 64-bit type and check on NO_64BIT macro set
before using long long
* SP int: check size required when using sp_int on stack
* SP: --enable-sp-asm now enables SP by default if not set
* SP: support aarch64 big endian
DTLS
* Allow DTLS 1.3 to compile when FIPS is enabled
* Allow for stateless DTLS client hello parsing
Misc.
* Easier detection of DRBG health when using Intel窶冱 RDRAND by updating the
structures status value
* Detection of duplicate known extensions with TLS
* PKCS#11 handle a user PIN that is a NULL_PTR, compile time check in finding
keys, add initialization API
* Update max Cert Policy size based on RFC 5280
* Add Android CA certs path for wolfSSL_CTX_load_system_CA_certs()
* Improve logic for enabling system CA certs on Apple devices
* Stub functions to allow for cpuid public functions with non-intel builds
* Increase RNG_SECURITY_STRENGTH for FIPS
* Improvements in OpenSSL Compat ERR Queue handling
* Support ASN1/DER CRLs in LoadCertByIssuer
* Expose more ECC math functions and improve async shared secret
* Improvement for sniffer error messages
* Warning added that renegotiation in TLS 1.3 requires session ticket
* Adjustment for TLS 1.3 post auth support
* Rework DH API and improve PEM read/write
## Fixes
Build Fixes
* Fix --enable-devcrypto build error for sys without u_int8_t type
* Fix casts in evp.c and build issue in ParseCRL
* Fixes for compatibility layer building with heap hint and OSSL callbacks
* fix compile error due to Werro=undef on gcc-4.8
* Fix mingw-w64 build issues on windows
* Xcode project fixes for different build settings
* Initialize variable causing failures with gcc-11 and gcc-12 with a unique
wolfSSL build configuration
* Prevent WOLFSSL_NO_MALLOC from breaking RSA certificate verification
* Fixes for various tests that do not properly handle `WC_PENDING_E` with
async. builds
* Fix for misc `HashObject` to be excluded for `WOLFCRYPT_ONLY`
OCSP Fixes
* Correctly save next status with OCSP response verify
* When the OCSP responder returns an unknown exception, continue through to
checking the CRL
Math Fixes
* Fix for implicit conversion with 32-bit in SP math
* Fix for error checks when modulus is even with SP int build
* Fix for checking of err in _sp_exptmod_nct with SP int build
* ECC cofactor fix when checking scalar bits
* ARM32 ASM: don't use ldrd on user data
* SP int, fix when ECC specific size code included
Port Fixes
* Fixes for STM32 PKA ECC (not 256-bit) and improvements for AES-GCM
* Fix for cryptocell signature verification with ECC
* Benchmark devid changes, CCM with SECO fix, set IV on AES import into SECO
Compat. Layer Fixes
* Fix for handling DEFAULT:... cipher suite list
* Fix memory leak in wolfSSL_X509_NAME_ENTRY_get_object
* Set alt name type to V_ASN1_IA5STRING
* Update name hash functions wolfSSL_X509_subject_name_hash and
wolfSSL_X509_issuer_name_hash to hash the canonical form of subject
* Fix wolfSSL_set_SSL_CTX() to be usable during handshake
* Fix X509_get1_ocsp to set num of elements in stack
* X509v3 EXT d2i: fix freeing of aia
* Fix to remove recreation of certificate with wolfSSL_PEM_write_bio_X509()
* Link newly created x509 store's certificate manager to self by default to
assist with CRL verification
* Fix for compatibility `EC_KEY_new_by_curve_name` to not create a key if the
curve is not found
Misc.
* Free potential signer malloc in a fail case
* fix other name san parsing and add RID cert to test parsing
* WOLFSSL_OP_NO_TICKET fix for TLSv1.2
* fix ASN template parsing of X509 subject directory attribute
* Fix the wrong IV size with the cipher suite
TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256
* Fix incorrect self signed error return when compiled with certreq and certgen.
* Fix wrong function name in debug comment with wolfSSL_X509_get_name_oneline()
* Fix for decryption after second handshake with async sniffer
* Allow session tickets to properly resume when using PQ KEMs
* Add sanity overflow check to DecodeAltNames input buffer access
Changes since v5.5.3:
wolfSSL Release 5.5.4 (Dec 21, 2022)
Release 5.5.4 of wolfSSL embedded TLS has bug fixes and new features including:
New Feature Additions
* QUIC related changes for HAProxy integration and config option
* Support for Analog Devices MAXQ1080 and MAXQ1065
* Testing and build of wolfSSL with NuttX
* New software based entropy gatherer with configure option
--enable-entropy-memuseOP
* NXP SE050 feature expansion and fixes, adding in RSA support and conditional
compile of AES and CMAC
* Support for multi-threaded sniffer
Improvements / Optimizations
Benchmark and Tests
* Add alternate test case for unsupported static memory API when testing mutex
allocations
* Additional unit test cases added for AES CCM 256-bit
* Initialize and free AES object with benchmarking AES-OFB
* Kyber with DTLS 1.3 tests added
* Tidy up Espressif ESP32 test and benchmark examples
* Rework to be able to run API tests individually and add display of time taken
per test
Build and Port Improvements
* Add check for 64-bit ABI on MIPS64 before declaring a 64-bit CPU
* Add support to detect SIZEOF_LONG in armclang and diab
* Added in a simple example working on Rx72n
* Update azsphere support to prevent compilation of file included inline
* --enable-brainpool configure option added and default to on when custom curves
are also on
* Add RSA PSS salt defines to engine builds if not FIPS v2
Post Quantum
* Remove kyber-90s and route all Kyber through wolfcrypt
* Purge older version of NTRU and SABER from wolfSSL
SP Math
* Support static memory build with sp-math
* SP C, SP int: improve performance
* SP int: support mingw64 again
* SP int: enhancements to guess 64-bit type and check on NO_64BIT macro set
before using long long
* SP int: check size required when using sp_int on stack
* SP: --enable-sp-asm now enables SP by default if not set
* SP: support aarch64 big endian
DTLS
* Allow DTLS 1.3 to compile when FIPS is enabled
* Allow for stateless DTLS client hello parsing
Misc.
* Easier detection of DRBG health when using Intel窶冱 RDRAND by updating the
structures status value
* Detection of duplicate known extensions with TLS
* PKCS#11 handle a user PIN that is a NULL_PTR, compile time check in finding
keys, add initialization API
* Update max Cert Policy size based on RFC 5280
* Add Android CA certs path for wolfSSL_CTX_load_system_CA_certs()
* Improve logic for enabling system CA certs on Apple devices
* Stub functions to allow for cpuid public functions with non-intel builds
* Increase RNG_SECURITY_STRENGTH for FIPS
* Improvements in OpenSSL Compat ERR Queue handling
* Support ASN1/DER CRLs in LoadCertByIssuer
* Expose more ECC math functions and improve async shared secret
* Improvement for sniffer error messages
* Warning added that renegotiation in TLS 1.3 requires session ticket
* Adjustment for TLS 1.3 post auth support
* Rework DH API and improve PEM read/write
## Fixes
Build Fixes
* Fix --enable-devcrypto build error for sys without u_int8_t type
* Fix casts in evp.c and build issue in ParseCRL
* Fixes for compatibility layer building with heap hint and OSSL callbacks
* fix compile error due to Werro=undef on gcc-4.8
* Fix mingw-w64 build issues on windows
* Xcode project fixes for different build settings
* Initialize variable causing failures with gcc-11 and gcc-12 with a unique
wolfSSL build configuration
* Prevent WOLFSSL_NO_MALLOC from breaking RSA certificate verification
* Fixes for various tests that do not properly handle `WC_PENDING_E` with
async. builds
* Fix for misc `HashObject` to be excluded for `WOLFCRYPT_ONLY`
OCSP Fixes
* Correctly save next status with OCSP response verify
* When the OCSP responder returns an unknown exception, continue through to
checking the CRL
Math Fixes
* Fix for implicit conversion with 32-bit in SP math
* Fix for error checks when modulus is even with SP int build
* Fix for checking of err in _sp_exptmod_nct with SP int build
* ECC cofactor fix when checking scalar bits
* ARM32 ASM: don't use ldrd on user data
* SP int, fix when ECC specific size code included
Port Fixes
* Fixes for STM32 PKA ECC (not 256-bit) and improvements for AES-GCM
* Fix for cryptocell signature verification with ECC
* Benchmark devid changes, CCM with SECO fix, set IV on AES import into SECO
Compat. Layer Fixes
* Fix for handling DEFAULT:... cipher suite list
* Fix memory leak in wolfSSL_X509_NAME_ENTRY_get_object
* Set alt name type to V_ASN1_IA5STRING
* Update name hash functions wolfSSL_X509_subject_name_hash and
wolfSSL_X509_issuer_name_hash to hash the canonical form of subject
* Fix wolfSSL_set_SSL_CTX() to be usable during handshake
* Fix X509_get1_ocsp to set num of elements in stack
* X509v3 EXT d2i: fix freeing of aia
* Fix to remove recreation of certificate with wolfSSL_PEM_write_bio_X509()
* Link newly created x509 store's certificate manager to self by default to
assist with CRL verification
* Fix for compatibility `EC_KEY_new_by_curve_name` to not create a key if the
curve is not found
Misc.
* Free potential signer malloc in a fail case
* fix other name san parsing and add RID cert to test parsing
* WOLFSSL_OP_NO_TICKET fix for TLSv1.2
* fix ASN template parsing of X509 subject directory attribute
* Fix the wrong IV size with the cipher suite
TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256
* Fix incorrect self signed error return when compiled with certreq and certgen.
* Fix wrong function name in debug comment with wolfSSL_X509_get_name_oneline()
* Fix for decryption after second handshake with async sniffer
* Allow session tickets to properly resume when using PQ KEMs
* Add sanity overflow check to DecodeAltNames input buffer access
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.63
MAIN commitmail json YAML
audio/fasttracker2: Update to 1.63
Changes since v1.61
v1.63 - 24.01.2023
- For users with >60Hz displays: *hopefully* fixed possible slowdown/timing
problems after leaving the program open for many hours.
- Windows/macOS: Updated SDL to v2.26.2
v1.62 - 28.11.2022
- Because of a bug in FT2, pattern loop commands will manipulate the row the
next pattern will begin at (should be 0). However, this can overflow the
number of rows (length) for that pattern and cause out-of-bounds reads. Set to
row 0 in this case. This fixes for example "ambrozia.xm" in the transition
from song end to song start.
Changes since v1.61
v1.63 - 24.01.2023
- For users with >60Hz displays: *hopefully* fixed possible slowdown/timing
problems after leaving the program open for many hours.
- Windows/macOS: Updated SDL to v2.26.2
v1.62 - 28.11.2022
- Because of a bug in FT2, pattern loop commands will manipulate the row the
next pattern will begin at (should be 0). However, this can overflow the
number of rows (length) for that pattern and cause out-of-bounds reads. Set to
row 0 in this case. This fixes for example "ambrozia.xm" in the transition
from song end to song start.
MAIN commitmail json YAML
doc: Updated security/libdecaf to 1.0.2
MAIN commitmail json YAML
pkgsrc/security/libdecaf/Makefile@1.5
/
diff
pkgsrc/security/libdecaf/distinfo@1.5 / diff
pkgsrc/security/libdecaf/patches/patch-src_per__curve_eddsa.tmpl.h@1.1 / diff
pkgsrc/security/libdecaf/distinfo@1.5 / diff
pkgsrc/security/libdecaf/patches/patch-src_per__curve_eddsa.tmpl.h@1.1 / diff
security/libdecaf: Update to v1.0.2
Changes since v1.0.1:
July 13, 2022:
Fix a security bug and an issue.
Point::steg_encode was leaving the 24 high bits of the buffer as zero.
It also ignored the size parameter. The size parameter has now been
removed, the zeros fixed and a test added to make sure that it is fixed.
Per https://github.com/MystenLabs/ed25519-unsafe-libs, deprecate eddsa
signing with separate pubkey and privkey input. Instead decaf_ed*_keypair_sign.
Release v1.0.2.
Changes since v1.0.1:
July 13, 2022:
Fix a security bug and an issue.
Point::steg_encode was leaving the 24 high bits of the buffer as zero.
It also ignored the size parameter. The size parameter has now been
removed, the zeros fixed and a test added to make sure that it is fixed.
Per https://github.com/MystenLabs/ed25519-unsafe-libs, deprecate eddsa
signing with separate pubkey and privkey input. Instead decaf_ed*_keypair_sign.
Release v1.0.2.
MAIN commitmail json YAML
doc: Updated sysutils/py-Glances to 3.3.0.4
MAIN commitmail json YAML
pkgsrc/sysutils/py-Glances/Makefile@1.21
/
diff
pkgsrc/sysutils/py-Glances/distinfo@1.20 / diff
pkgsrc/sysutils/py-Glances/patches/patch-glances_plugins_glances__cpu.py@1.3 / diff
pkgsrc/sysutils/py-Glances/distinfo@1.20 / diff
pkgsrc/sysutils/py-Glances/patches/patch-glances_plugins_glances__cpu.py@1.3 / diff
sysutils/py-Glances: Update to 3.3.0.4
Changes since 3.2.7:
===============
Version 3.3.0.4
===============
Refactor the Docker images factory, from now, only Alpine image wll be
provided.
The following Docker images (nicolargo/glances) are availables:
- *latest-full* for a full Alpine Glances image (latest release) with all
dependencies
- *latest* for a basic Alpine Glances (latest release) version with minimal
dependencies (Bottle and Docker)
- *dev* for a basic Alpine Glances image (based on development branch) with
all dependencies (Warning: may be instable)
===============
Version 3.3.0.2
===============
Bug corrected:
* Password files in same configuration dir in effect #2143
* Fail to load config file on Python 3.10 #2176
===============
Version 3.3.0.1
===============
Just a version to rebuild the Docker images.
===============
Version 3.3.0
===============
Enhancements:
* Migration from AngularJS to Angular/React/Vue #2100 (many thanks to
@fr4nc0is)
* Improve the IP module with a link to Censys #2105
* Add the public IP information to the WebUI #2105
* Add an option to show a configurable clock/time module to display #2150
* Add sort information on Docker plugin (console mode). Related to #2138
* Password files in same configuration dir in effect #2143
* If the container name is long, then display the start, not the end -
Related to #1732
* Make the Web UI same than Console for CPU plugin
* [WINDOWS] Reorganise CPU stats display #2131
* Remove the static exportable_plugins list from glances_export.py #1556
* Limiting data exported for economic storage #1443
Bug corrected:
* glances.conf FS hide not applying #1666
* AMP: regex with special chars #2152
* fix(help-screen): add missing shortcuts and columnize algorithmically
#2135
* Correct issue with the regexp filter (use fullmatch instead of match)
* Errors when running Glances as web service #1702
* Apply alias to Duplicate sensor name #1686
* Make the hide function in sensors section compliant with lower/upercase
#1590
* Web UI truncates the days part of CPU time counter of the process list
#2108
* Correct alignement issue with the diskio plugin (Console UI)
Documentation and CI:
* Refactor Docker file CI
* Add Codespell to the CI pipeline #2148
* Please add docker-compose example and document example. #2151
* [DOC] Glances failed to start and some other issues - BSD #2106
* [REQUEST Docker image] Output log to stdout #2128 (for debian)
* Fix code scanning alert - Clear-text logging of sensitive information
#2124
* Improve makefile (with online documentation)
* buildx failed with: ERROR: failed to solve: python:3.10-slim-buster: no
match for platform in manifest #2120
* [Update docs] Can I export only the fields I need in csv report? #2113
* Windows Python 3 installation fails on dependency package "future" #2109
Contributors for this version:
* fr4nc0is : a very special thanks to @fr4nc0is for his huge work on the
Glances v3.3.0 WebUI !!!
* Kostis Anagnostopoulos
* Kian-Meng Ang
* dependabot[bot]
* matthewaaronthacker
* and your servant Nicolargo
Changes since 3.2.7:
===============
Version 3.3.0.4
===============
Refactor the Docker images factory, from now, only Alpine image wll be
provided.
The following Docker images (nicolargo/glances) are availables:
- *latest-full* for a full Alpine Glances image (latest release) with all
dependencies
- *latest* for a basic Alpine Glances (latest release) version with minimal
dependencies (Bottle and Docker)
- *dev* for a basic Alpine Glances image (based on development branch) with
all dependencies (Warning: may be instable)
===============
Version 3.3.0.2
===============
Bug corrected:
* Password files in same configuration dir in effect #2143
* Fail to load config file on Python 3.10 #2176
===============
Version 3.3.0.1
===============
Just a version to rebuild the Docker images.
===============
Version 3.3.0
===============
Enhancements:
* Migration from AngularJS to Angular/React/Vue #2100 (many thanks to
@fr4nc0is)
* Improve the IP module with a link to Censys #2105
* Add the public IP information to the WebUI #2105
* Add an option to show a configurable clock/time module to display #2150
* Add sort information on Docker plugin (console mode). Related to #2138
* Password files in same configuration dir in effect #2143
* If the container name is long, then display the start, not the end -
Related to #1732
* Make the Web UI same than Console for CPU plugin
* [WINDOWS] Reorganise CPU stats display #2131
* Remove the static exportable_plugins list from glances_export.py #1556
* Limiting data exported for economic storage #1443
Bug corrected:
* glances.conf FS hide not applying #1666
* AMP: regex with special chars #2152
* fix(help-screen): add missing shortcuts and columnize algorithmically
#2135
* Correct issue with the regexp filter (use fullmatch instead of match)
* Errors when running Glances as web service #1702
* Apply alias to Duplicate sensor name #1686
* Make the hide function in sensors section compliant with lower/upercase
#1590
* Web UI truncates the days part of CPU time counter of the process list
#2108
* Correct alignement issue with the diskio plugin (Console UI)
Documentation and CI:
* Refactor Docker file CI
* Add Codespell to the CI pipeline #2148
* Please add docker-compose example and document example. #2151
* [DOC] Glances failed to start and some other issues - BSD #2106
* [REQUEST Docker image] Output log to stdout #2128 (for debian)
* Fix code scanning alert - Clear-text logging of sensitive information
#2124
* Improve makefile (with online documentation)
* buildx failed with: ERROR: failed to solve: python:3.10-slim-buster: no
match for platform in manifest #2120
* [Update docs] Can I export only the fields I need in csv report? #2113
* Windows Python 3 installation fails on dependency package "future" #2109
Contributors for this version:
* fr4nc0is : a very special thanks to @fr4nc0is for his huge work on the
Glances v3.3.0 WebUI !!!
* Kostis Anagnostopoulos
* Kian-Meng Ang
* dependabot[bot]
* matthewaaronthacker
* and your servant Nicolargo
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.61
MAIN commitmail json YAML
audio/fasttracker2: Update to 1.61
Changes since v1.58
v1.61 - 07.11.2022
- For the volume column in pattern edit mode, allow the two keys to the left
of backspace to work as '-' and '+'. This is for some keyboard layouts where
it was impossible to insert volume slide down/up effects.
v1.60 - 11.10.2022
- Windows/macOS: Updated SDL to v2.24.1
v1.59 - 03.10.2022
- The default Disk Op. directory is now set to the user's desktop
- The WAV export screen now has a checkbox for setting BPM precision to FT2.
This means to use less precise BPMs, which will match FT2's WAV output
length.
- The default audio frequency and bit depth in the WAV export screen are now
set to 44100 and 16-bit, and changing the audio frequency and bit depth in
the config screen will not affect these settings anymore.
- Updated the help text (made a note about the new WAV export BPM mode)
Changes since v1.58
v1.61 - 07.11.2022
- For the volume column in pattern edit mode, allow the two keys to the left
of backspace to work as '-' and '+'. This is for some keyboard layouts where
it was impossible to insert volume slide down/up effects.
v1.60 - 11.10.2022
- Windows/macOS: Updated SDL to v2.24.1
v1.59 - 03.10.2022
- The default Disk Op. directory is now set to the user's desktop
- The WAV export screen now has a checkbox for setting BPM precision to FT2.
This means to use less precise BPMs, which will match FT2's WAV output
length.
- The default audio frequency and bit depth in the WAV export screen are now
set to 44100 and 16-bit, and changing the audio frequency and bit depth in
the config screen will not affect these settings anymore.
- Updated the help text (made a note about the new WAV export BPM mode)
MAIN commitmail json YAML
doc: Updated security/wolfssl to 5.5.3
MAIN commitmail json YAML
security/wolfssl: Update to v5.5.3
Changes since v5.5.1:
wolfSSL Release 5.5.3 (Nov 2, 2022)
Release 5.5.3 of wolfSSL embedded TLS has the following bug fix:
Fixes
* Fix for possible buffer zeroization overrun introduced at the end of v5.5.2
release cycle in GitHub pull request 5743
(https://github.com/wolfSSL/wolfssl/pull/5743) and fixed in pull request 5757
(https://github.com/wolfSSL/wolfssl/pull/5757). In the case where a specific
memory allocation failed or a hardware fault happened there was the potential
for an overrun of 0窶冱 when masking the buffer used for (D)TLS 1.2 and lower
operations. (D)TLS 1.3 only and crypto only users are not affected by the
issue. This is not related in any way to recent issues reported in OpenSSL.
wolfSSL Release 5.5.2 (Oct 28, 2022)
Release 5.5.2 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities
* [Med] In the case that the WOLFSSL_CALLBACKS macro is set when building
wolfSSL, there is a potential heap over read of 5 bytes when handling TLS 1.3
client connections. This heap over read is limited to wolfSSL builds
explicitly setting the macro WOLFSSL_CALLBACKS, the feature does not get
turned on by any other build options. The macro WOLFSSL_CALLBACKS is intended
for debug use only, but if having it enabled in production, users are
recommended to disable WOLFSSL_CALLBACKS. Users enabling WOLFSSL_CALLBACKS are
recommended to update their version of wolfSSL. Thanks to Lucca Hirschi and
Steve Kremer from LORIA, Inria and Max Ammann from Trail of Bits for finding
and reporting the bug with the tlspuffin tool developed partly at LORIA and
Trail of Bits. CVE 2022-42905
Release 5.5.2 of wolfSSL embedded TLS has bug fixes and new features including:
New Feature Additions
* Add function wolfSSL_CTX_load_system_CA_certs to load system CA certs into a
WOLFSSL_CTX and --sys-ca-certs option to example client
* Add wolfSSL_set1_host to OpenSSL compatible API
* Added the function sk_X509_shift
* AES x86 ASM for AES-CBC and GCM performance enhancements
* Add assembly for AES for ARM32 without using crypto hardware instructions
* Xilinx Versal port and hardware acceleration tie in
* SP Cortex-M support for ICCARM
Enhancements
* Add snifftest vcxproj file and documentation
* Nucleus Thread Types supported
* Handle certificates with RSA-PSS signature that have RSAk public keys
* Small stack build improvements
* DTLS 1.3 improvements for Alerts and unit tests
* Add a binary search for CRL
* Improvement of SSL/CTX_set_max_early_data() for client side
* Remove unused ASN1_GENERALIZEDTIME enum value from wolfssl/ssl.h
* Add user_settings.h for Intel/M1 FIPSv2 macOS C++ projects
* Add dtlscid.test to 窶藁ake check窶� unit testing
* Generate an assembler-safe user_settings.h in configure.ac and CMakeLists.txt
* ForceZero enabled with USE_FAST_MATH
* Add TLS 1.3 support of ticketNonce sizes bigger than MAX_TICKET_NONCE_SZ
* FIPSv2 builds on win10 adjust for new fastmath default in settings.h
* Add IRQ install for Aruix example
Fixes
* When looking up the session by ID on the server, check that the protocol
version of the SSL and session match on TLS 1.3 or not
* Fix for potential EVP_PKEY_DH memory leak with OPENSSL_EXTRA
* Curve448 32-bit C code: handle corner case
* Fixup builds using WOLFSSL_LOG_PRINTF
* Correct DIST_POINT_NAME type value
* Do not perform IV Wrap test when using cert3389 inlined armasm
* Fix for Linux kernel module and stdio.h
* (D)TLS: send alert on version mismatch
* Fix PKCS#7 SignedData verification when signer cert is not first in SET
* Fix bug with wolfIO_TcpConnect not working with timeout on Windows
* Fix output length bug in SP non-blocking ECC shared secret gen
* Fix build with enable-fastmath and disable-rsa
* Correct wolfSSL_sk_X509_new in OpenSSL compatible API
* Fixes for SP and x86_64 with MSVC
* Fix wrong size using DTLSv1.3 in RestartHandshakeHashWithCookie
* Fix redundant file include with TI RTOS build
* Fix wolfCrypt only build with wincrypt.h
* DTLS 1.2: Reset state when sending HelloVerifyRequest
Changes since v5.5.1:
wolfSSL Release 5.5.3 (Nov 2, 2022)
Release 5.5.3 of wolfSSL embedded TLS has the following bug fix:
Fixes
* Fix for possible buffer zeroization overrun introduced at the end of v5.5.2
release cycle in GitHub pull request 5743
(https://github.com/wolfSSL/wolfssl/pull/5743) and fixed in pull request 5757
(https://github.com/wolfSSL/wolfssl/pull/5757). In the case where a specific
memory allocation failed or a hardware fault happened there was the potential
for an overrun of 0窶冱 when masking the buffer used for (D)TLS 1.2 and lower
operations. (D)TLS 1.3 only and crypto only users are not affected by the
issue. This is not related in any way to recent issues reported in OpenSSL.
wolfSSL Release 5.5.2 (Oct 28, 2022)
Release 5.5.2 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities
* [Med] In the case that the WOLFSSL_CALLBACKS macro is set when building
wolfSSL, there is a potential heap over read of 5 bytes when handling TLS 1.3
client connections. This heap over read is limited to wolfSSL builds
explicitly setting the macro WOLFSSL_CALLBACKS, the feature does not get
turned on by any other build options. The macro WOLFSSL_CALLBACKS is intended
for debug use only, but if having it enabled in production, users are
recommended to disable WOLFSSL_CALLBACKS. Users enabling WOLFSSL_CALLBACKS are
recommended to update their version of wolfSSL. Thanks to Lucca Hirschi and
Steve Kremer from LORIA, Inria and Max Ammann from Trail of Bits for finding
and reporting the bug with the tlspuffin tool developed partly at LORIA and
Trail of Bits. CVE 2022-42905
Release 5.5.2 of wolfSSL embedded TLS has bug fixes and new features including:
New Feature Additions
* Add function wolfSSL_CTX_load_system_CA_certs to load system CA certs into a
WOLFSSL_CTX and --sys-ca-certs option to example client
* Add wolfSSL_set1_host to OpenSSL compatible API
* Added the function sk_X509_shift
* AES x86 ASM for AES-CBC and GCM performance enhancements
* Add assembly for AES for ARM32 without using crypto hardware instructions
* Xilinx Versal port and hardware acceleration tie in
* SP Cortex-M support for ICCARM
Enhancements
* Add snifftest vcxproj file and documentation
* Nucleus Thread Types supported
* Handle certificates with RSA-PSS signature that have RSAk public keys
* Small stack build improvements
* DTLS 1.3 improvements for Alerts and unit tests
* Add a binary search for CRL
* Improvement of SSL/CTX_set_max_early_data() for client side
* Remove unused ASN1_GENERALIZEDTIME enum value from wolfssl/ssl.h
* Add user_settings.h for Intel/M1 FIPSv2 macOS C++ projects
* Add dtlscid.test to 窶藁ake check窶� unit testing
* Generate an assembler-safe user_settings.h in configure.ac and CMakeLists.txt
* ForceZero enabled with USE_FAST_MATH
* Add TLS 1.3 support of ticketNonce sizes bigger than MAX_TICKET_NONCE_SZ
* FIPSv2 builds on win10 adjust for new fastmath default in settings.h
* Add IRQ install for Aruix example
Fixes
* When looking up the session by ID on the server, check that the protocol
version of the SSL and session match on TLS 1.3 or not
* Fix for potential EVP_PKEY_DH memory leak with OPENSSL_EXTRA
* Curve448 32-bit C code: handle corner case
* Fixup builds using WOLFSSL_LOG_PRINTF
* Correct DIST_POINT_NAME type value
* Do not perform IV Wrap test when using cert3389 inlined armasm
* Fix for Linux kernel module and stdio.h
* (D)TLS: send alert on version mismatch
* Fix PKCS#7 SignedData verification when signer cert is not first in SET
* Fix bug with wolfIO_TcpConnect not working with timeout on Windows
* Fix output length bug in SP non-blocking ECC shared secret gen
* Fix build with enable-fastmath and disable-rsa
* Correct wolfSSL_sk_X509_new in OpenSSL compatible API
* Fixes for SP and x86_64 with MSVC
* Fix wrong size using DTLSv1.3 in RestartHandshakeHashWithCookie
* Fix redundant file include with TI RTOS build
* Fix wolfCrypt only build with wincrypt.h
* DTLS 1.2: Reset state when sending HelloVerifyRequest
MAIN commitmail json YAML
doc: Updated chat/ircd-hybrid to 8.2.43
MAIN commitmail json YAML
chat/ircd-hybrid: Update to 8.2.43
Changes since 8.2.42:
-- Noteworthy changes in version 8.2.43 (2022-09-26)
* Due to ongoing protocol modernizations and deprecation of old backwards
compatibility code, ircd-hybrid is now no longer link compatible to
8.2.33 and below. As for the Anope IRC Services, 2.0.8 is the minimum
supported version now.
* Implemented channel mode `V`. `INVITE` cannot be used on channels with
that mode set.
* `WHOIS` on clients connected via TLS now also shows some details about
the TLS version and cipher being used
* Removed user mode `d` (debugging notices)
Changes since 8.2.42:
-- Noteworthy changes in version 8.2.43 (2022-09-26)
* Due to ongoing protocol modernizations and deprecation of old backwards
compatibility code, ircd-hybrid is now no longer link compatible to
8.2.33 and below. As for the Anope IRC Services, 2.0.8 is the minimum
supported version now.
* Implemented channel mode `V`. `INVITE` cannot be used on channels with
that mode set.
* `WHOIS` on clients connected via TLS now also shows some details about
the TLS version and cipher being used
* Removed user mode `d` (debugging notices)
MAIN commitmail json YAML
doc: Updated security/wolfssl to 5.5.1
MAIN commitmail json YAML
pkgsrc/security/wolfssl/Makefile@1.16
/
diff
pkgsrc/security/wolfssl/PLIST@1.11 / diff
pkgsrc/security/wolfssl/distinfo@1.17 / diff
pkgsrc/security/wolfssl/patches/patch-configure@1.5 / diff
pkgsrc/security/wolfssl/PLIST@1.11 / diff
pkgsrc/security/wolfssl/distinfo@1.17 / diff
pkgsrc/security/wolfssl/patches/patch-configure@1.5 / diff
security/wolfssl: Update to v5.5.1
Changes since v5.5.0:
wolfSSL Release 5.5.1 (Sep 28, 2022) Latest
Vulnerabilities
* [Med] Denial of service attack and buffer overflow against TLS 1.3 servers
using session ticket resumption. When built with --enable-session-ticket and
making use of TLS 1.3 server code in wolfSSL, there is the possibility of a
malicious client to craft a malformed second ClientHello packet that causes
the server to crash. This issue is limited to when using both
--enable-session-ticket and TLS 1.3 on the server side. Users with TLS 1.3
servers, and having --enable-session-ticket, should update to the latest
version of wolfSSL. Thanks to Max at Trail of Bits for the report and
"LORIA, INRIA, France" for research on tlspuffin.
New Feature Additions
* Add support for non-blocking ECC key gen and shared secret gen for
P-256/384/521
* Add support for non-blocking ECDHE/ECDSA in TLS/DTLS layer.
* Port to NXP RT685 with FreeRTOS
* Add option to build post quantum Kyber API (--enable-kyber)
* Add post quantum algorithm sphincs to wolfCrypt
* Config. option to force no asm with SP build (--enable-sp=noasm)
* Allow post quantum keyshare for DTLS 1.3
Enhancements
* DTLSv1.3: Do HRR Cookie exchange by default
* Add wolfSSL_EVP_PKEY_new_CMAC_key to OpenSSL compatible API
* Update ide win10 build files to add missing sp source files
* Improve Workbench docs
* Improve EVP support for CHACHA20_POLY1305
* Improve wc_SetCustomExtension documentation
* RSA-PSS with OCSP and add simple OCSP response DER verify test case
* Clean up some FIPS versioning logic in configure.ac and WIN10 user_settings.h
* Don't over-allocate memory for DTLS fragments
* Add WOLFSSL_ATECC_TFLXTLS for Atmel port
* SHA-3 performance improvements with x86_64 assembly
* Add code to fallback to S/W if TSIP cannot handle
* Improves entropy with VxWorks
* Make time in milliseconds 64-bits for longer session ticket lives
* Support for setting cipher list with bytes
* wolfSSL_set1_curves_list(), wolfSSL_CTX_set1_curves_list() improvements
* Add to RSAES-OAEP key parsing for pkcs7
* Add missing DN nid to work with PrintName()
* SP int: default to 16 bit word size when NO_64BIT defined
* Limit the amount of fragments we store per a DTLS connection and error out
when max limit is reached
* Detect when certificate's RSA public key size is too big and fail on loading
of certificate
Fixes
* Fix for async with OCSP non-blocking in ProcessPeerCerts
* Fixes for building with 32-bit and socket size sign/unsigned mismatch
* Fix Windows CMakeList compiler options
* TLS 1.3 Middle-Box compat: fix missing brace
* Configuration consistency fixes for RSA keys and way to force disable of
private keys
* Fix for Aarch64 Mac M1 SP use
* Fix build errors and warnings for MSVC with DTLS 1.3
* Fix HMAC compat layer function for SHA-1
* Fix DTLS 1.3 do not negotiate ConnectionID in HelloRetryRequest
* Check return from call to wc_Time
* SP math: fix build configuration with opensslall
* Fix for async session tickets
* SP int mp_init_size fixes when SP_WORD_SIZE == 8
* Ed. function to make public key now checks for if the private key flag is set
* Fix HashRaw WC_SHA256_DIGEST_SIZE for wc_Sha256GetHash
* Fix for building with PSK only
* Set correct types in wolfSSL_sk_*_new functions
* Sanity check that size passed to mp_init_size() is no more than SP_INT_DIGITS
Changes since v5.5.0:
wolfSSL Release 5.5.1 (Sep 28, 2022) Latest
Vulnerabilities
* [Med] Denial of service attack and buffer overflow against TLS 1.3 servers
using session ticket resumption. When built with --enable-session-ticket and
making use of TLS 1.3 server code in wolfSSL, there is the possibility of a
malicious client to craft a malformed second ClientHello packet that causes
the server to crash. This issue is limited to when using both
--enable-session-ticket and TLS 1.3 on the server side. Users with TLS 1.3
servers, and having --enable-session-ticket, should update to the latest
version of wolfSSL. Thanks to Max at Trail of Bits for the report and
"LORIA, INRIA, France" for research on tlspuffin.
New Feature Additions
* Add support for non-blocking ECC key gen and shared secret gen for
P-256/384/521
* Add support for non-blocking ECDHE/ECDSA in TLS/DTLS layer.
* Port to NXP RT685 with FreeRTOS
* Add option to build post quantum Kyber API (--enable-kyber)
* Add post quantum algorithm sphincs to wolfCrypt
* Config. option to force no asm with SP build (--enable-sp=noasm)
* Allow post quantum keyshare for DTLS 1.3
Enhancements
* DTLSv1.3: Do HRR Cookie exchange by default
* Add wolfSSL_EVP_PKEY_new_CMAC_key to OpenSSL compatible API
* Update ide win10 build files to add missing sp source files
* Improve Workbench docs
* Improve EVP support for CHACHA20_POLY1305
* Improve wc_SetCustomExtension documentation
* RSA-PSS with OCSP and add simple OCSP response DER verify test case
* Clean up some FIPS versioning logic in configure.ac and WIN10 user_settings.h
* Don't over-allocate memory for DTLS fragments
* Add WOLFSSL_ATECC_TFLXTLS for Atmel port
* SHA-3 performance improvements with x86_64 assembly
* Add code to fallback to S/W if TSIP cannot handle
* Improves entropy with VxWorks
* Make time in milliseconds 64-bits for longer session ticket lives
* Support for setting cipher list with bytes
* wolfSSL_set1_curves_list(), wolfSSL_CTX_set1_curves_list() improvements
* Add to RSAES-OAEP key parsing for pkcs7
* Add missing DN nid to work with PrintName()
* SP int: default to 16 bit word size when NO_64BIT defined
* Limit the amount of fragments we store per a DTLS connection and error out
when max limit is reached
* Detect when certificate's RSA public key size is too big and fail on loading
of certificate
Fixes
* Fix for async with OCSP non-blocking in ProcessPeerCerts
* Fixes for building with 32-bit and socket size sign/unsigned mismatch
* Fix Windows CMakeList compiler options
* TLS 1.3 Middle-Box compat: fix missing brace
* Configuration consistency fixes for RSA keys and way to force disable of
private keys
* Fix for Aarch64 Mac M1 SP use
* Fix build errors and warnings for MSVC with DTLS 1.3
* Fix HMAC compat layer function for SHA-1
* Fix DTLS 1.3 do not negotiate ConnectionID in HelloRetryRequest
* Check return from call to wc_Time
* SP math: fix build configuration with opensslall
* Fix for async session tickets
* SP int mp_init_size fixes when SP_WORD_SIZE == 8
* Ed. function to make public key now checks for if the private key flag is set
* Fix HashRaw WC_SHA256_DIGEST_SIZE for wc_Sha256GetHash
* Fix for building with PSK only
* Set correct types in wolfSSL_sk_*_new functions
* Sanity check that size passed to mp_init_size() is no more than SP_INT_DIGITS
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.58
MAIN commitmail json YAML
audio/fasttracker2: Update to 1.58
Changes since v1.57
v1.58 - 20.09.2022
- The windowed-sinc interpolator was reverted to 8 points at 8192 phases. It
sounded better for certain lo-fi samples the way it used to be. The
alias/distortion fix (v1.57) is still kept, for cleaner sound.
- Windows/macOS: Updated SDL from 2.0.22 to 2.24.0
- Fixed #ifdef hacks when using SDL 2.24.0 and later (new version number scheme)
Changes since v1.57
v1.58 - 20.09.2022
- The windowed-sinc interpolator was reverted to 8 points at 8192 phases. It
sounded better for certain lo-fi samples the way it used to be. The
alias/distortion fix (v1.57) is still kept, for cleaner sound.
- Windows/macOS: Updated SDL from 2.0.22 to 2.24.0
- Fixed #ifdef hacks when using SDL 2.24.0 and later (new version number scheme)
MAIN commitmail json YAML
doc: Updated audio/din to 55
MAIN commitmail json YAML
pkgsrc/audio/din/Makefile@1.42
/
diff
pkgsrc/audio/din/distinfo@1.30 / diff
pkgsrc/audio/din/patches/patch-src_Makefile.am@1.14 / diff
pkgsrc/audio/din/distinfo@1.30 / diff
pkgsrc/audio/din/patches/patch-src_Makefile.am@1.14 / diff
audio/din: Update to 55
Fix build in Darwin.
Changes since 54:
DIN Is Noise 55:
/*
an overhaul of Gravity
as before, you can click and move the base or
the tip of the gravity arrow to adjust its position,
direction and strength.
to (auto) animate the gravity arrow:
assign a drone to base of gravity
assign another drone to tip of gravity
move or visual FM / AM modulate one or both these drones
and gravity moves accordingly.
animating gravity influences the trajectory of launched
drones :)
click 'Base to manual' and 'Tip to manual' to detach
assigned drones from base and the tip respectively.
you can now manually edit the base and tip again.
click 'Select base', 'Select tip' or 'Select both'
to select the assigned drones. Useful for moving,
for visual AM/FM, to mute them etc.
eg., you could mute the assigned drones by clicking
'Select both' and then Menu > Drone Tools > Mute
/*
/* adjust position/phase of visual drone modulation (AM and FM)
Menu > Drone Params > AM Position
Menu > Drone Params > FM Position
eg., at 0 position with AM and FM BPMs equal, the trail/path
of the modulating drones is elliptical.
/* set AM BPM to FM BPM of drones and vice-versa
/* flip velocity direction of launched drone with respect to the launcher
if -ve flag is set in drone velocity defaults
/* opacity parameter for oscilloscope
* optimised oscilloscope
* faster sample add
* faster drawing
* changed shape of drone handles
* optimised snap lines drawing on curve editors
! fixed OpenGL drawing bugs for affected OpenGL drivers on Windows !
! in oscilloscope !
! in waveform display on waveform editors !
! when hz/vol displayed on drones !
! fixed crash if drones as they are fading in when creating drone mesh
are modulated or moved !
Fix build in Darwin.
Changes since 54:
DIN Is Noise 55:
/*
an overhaul of Gravity
as before, you can click and move the base or
the tip of the gravity arrow to adjust its position,
direction and strength.
to (auto) animate the gravity arrow:
assign a drone to base of gravity
assign another drone to tip of gravity
move or visual FM / AM modulate one or both these drones
and gravity moves accordingly.
animating gravity influences the trajectory of launched
drones :)
click 'Base to manual' and 'Tip to manual' to detach
assigned drones from base and the tip respectively.
you can now manually edit the base and tip again.
click 'Select base', 'Select tip' or 'Select both'
to select the assigned drones. Useful for moving,
for visual AM/FM, to mute them etc.
eg., you could mute the assigned drones by clicking
'Select both' and then Menu > Drone Tools > Mute
/*
/* adjust position/phase of visual drone modulation (AM and FM)
Menu > Drone Params > AM Position
Menu > Drone Params > FM Position
eg., at 0 position with AM and FM BPMs equal, the trail/path
of the modulating drones is elliptical.
/* set AM BPM to FM BPM of drones and vice-versa
/* flip velocity direction of launched drone with respect to the launcher
if -ve flag is set in drone velocity defaults
/* opacity parameter for oscilloscope
* optimised oscilloscope
* faster sample add
* faster drawing
* changed shape of drone handles
* optimised snap lines drawing on curve editors
! fixed OpenGL drawing bugs for affected OpenGL drivers on Windows !
! in oscilloscope !
! in waveform display on waveform editors !
! when hz/vol displayed on drones !
! fixed crash if drones as they are fading in when creating drone mesh
are modulated or moved !
MAIN commitmail json YAML
doc: Updated textproc/bat to 0.22.1
MAIN commitmail json YAML
pkgsrc/textproc/bat/Makefile@1.29
/
diff
pkgsrc/textproc/bat/cargo-depends.mk@1.5 / diff
pkgsrc/textproc/bat/distinfo@1.21 / diff
pkgsrc/textproc/bat/cargo-depends.mk@1.5 / diff
pkgsrc/textproc/bat/distinfo@1.21 / diff
textproc/bat: Update to 0.22.1
Changes since 0.21.0:
v0.22.1
Bugfixes
* Bring back pre-processing of ANSI escape characters to so that some
common bat use cases starts working again. See #2308 (@Enselic)
v0.22.0
Features
* Make the default macOS theme depend on Dark Mode. See #2197, #1746
(@Enselic)
* Support for separate system and user config files. See #668
(@patrickpichler)
Bugfixes
* Prevent fork nightmare with PAGER=batcat. See #2235 (@johnmatthiggins)
* Make --no-paging/-P override --paging=... if passed as a later arg, see
#2201 (@themkat)
* --map-syntax and --ignored-suffix now works together, see #2093 (@czzrr)
* Strips byte order mark from output when in non-loop-through mode.
See #1922 (@dag-h)
Other
* Relaxed glibc requirements on amd64, see #2106 and #2194 (@sharkdp)
* Improved fish completions. See #2275 (@zgracem)
* Stop pre-processing ANSI escape characters. Syntax highlighting on ANSI
escaped input is not supported. See #2185 and #2189 (@Enselic)
Syntaxes
* NSE (Nmap Scripting Engine) is mapped to Lua, see #2151 (@Cre3per)
* Correctly color fstab dump and pass fields, see #2246 (@yuvalmo)
* Update Command Help syntax, see #2255
* Julia: Fix syntax highlighting for function name starting with struct,
see #2230
* Minor update to LiveScript, see #2291
* Associate .mts and .cts files with the TypeScript syntax. See #2236
(@kidonng)
* Fish history is mapped to YAML. See #2237 (@kidonng)
bat as a library
* Make bat::PrettyPrinter::syntaxes() iterate over new bat::Syntax struct
instead of &syntect::parsing::SyntaxReference. See #2222 (@Enselic)
* Clear highlights after printing, see #1919 and #1920 (@rhysd)
Changes since 0.21.0:
v0.22.1
Bugfixes
* Bring back pre-processing of ANSI escape characters to so that some
common bat use cases starts working again. See #2308 (@Enselic)
v0.22.0
Features
* Make the default macOS theme depend on Dark Mode. See #2197, #1746
(@Enselic)
* Support for separate system and user config files. See #668
(@patrickpichler)
Bugfixes
* Prevent fork nightmare with PAGER=batcat. See #2235 (@johnmatthiggins)
* Make --no-paging/-P override --paging=... if passed as a later arg, see
#2201 (@themkat)
* --map-syntax and --ignored-suffix now works together, see #2093 (@czzrr)
* Strips byte order mark from output when in non-loop-through mode.
See #1922 (@dag-h)
Other
* Relaxed glibc requirements on amd64, see #2106 and #2194 (@sharkdp)
* Improved fish completions. See #2275 (@zgracem)
* Stop pre-processing ANSI escape characters. Syntax highlighting on ANSI
escaped input is not supported. See #2185 and #2189 (@Enselic)
Syntaxes
* NSE (Nmap Scripting Engine) is mapped to Lua, see #2151 (@Cre3per)
* Correctly color fstab dump and pass fields, see #2246 (@yuvalmo)
* Update Command Help syntax, see #2255
* Julia: Fix syntax highlighting for function name starting with struct,
see #2230
* Minor update to LiveScript, see #2291
* Associate .mts and .cts files with the TypeScript syntax. See #2236
(@kidonng)
* Fish history is mapped to YAML. See #2237 (@kidonng)
bat as a library
* Make bat::PrettyPrinter::syntaxes() iterate over new bat::Syntax struct
instead of &syntect::parsing::SyntaxReference. See #2222 (@Enselic)
* Clear highlights after printing, see #1919 and #1920 (@rhysd)
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.57
MAIN commitmail json YAML
audio/fasttracker2: Update to 1.57
Changes since v1.56
v1.57 - 04.09.2022
- macOS: Fixed problems with not being able to record/sample audio (again)
- Fixed some aliasing issues in the windowed-sinc interpolator (deltas > 1.5)
- The windpowed-sinc interpolator now has 16 points instead of 8, and double
the phase precision. This should increase the audio quality, but could also
make the program run slower on very low end systems (like a Pi, for example).
Changes since v1.56
v1.57 - 04.09.2022
- macOS: Fixed problems with not being able to record/sample audio (again)
- Fixed some aliasing issues in the windowed-sinc interpolator (deltas > 1.5)
- The windpowed-sinc interpolator now has 16 points instead of 8, and double
the phase precision. This should increase the audio quality, but could also
make the program run slower on very low end systems (like a Pi, for example).
MAIN commitmail json YAML
doc: Updated security/wolfssl to 5.5.0
MAIN commitmail json YAML
pkgsrc/security/wolfssl/Makefile@1.15
/
diff
pkgsrc/security/wolfssl/PLIST@1.10 / diff
pkgsrc/security/wolfssl/distinfo@1.16 / diff
pkgsrc/security/wolfssl/PLIST@1.10 / diff
pkgsrc/security/wolfssl/distinfo@1.16 / diff
security/wolfssl: Update to v5.5.0
Changes since v5.4.0:
wolfSSL Release 5.5.0 (Aug 30, 2022)
Note:
** If not free窶冓ng FP_ECC caches per thread by calling wc_ecc_fp_free there is a
possible memory leak during TLS 1.3 handshakes which use ECC. Users are urged
to confirm they are free窶冓ng FP_ECC caches per thread if enabled to avoid
this issue.
Release 5.5.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities
* [Low] Fault injection attack on RAM via Rowhammer leads to ECDSA key
disclosure. Users doing operations with private ECC keys such as server side
TLS connections and creating ECC signatures, who also have hardware that could
be targeted with a sophisticated Rowhammer attack should update the version of
wolfSSL and compile using the macro WOLFSSL_CHECK_SIG_FAULTS. Thanks to Yarkin
Doroz, Berk Sunar, Koksal Must, Caner Tol, and Kristi Rahman all affiliated
with the Vernam Applied Cryptography and Cybersecurity Lab at Worcester
Polytechnic Institute for the report.
* [Low] In wolfSSL version 5.3.0 if compiled with --enable-session-ticket and
the client has non-empty session cache, with TLS 1.2 there is the possibility
of a man in the middle passing a large session ticket to the client and
causing a crash due to an invalid free. There is also the potential for a
malicious TLS 1.3 server to crash a client in a similar manner except in TLS
1.3 it is not susceptible to a man in the middle attack. Users on the client
side with 窶兎nable-session-ticket compiled in and using wolfSSL version 5.3.0
should update their version of wolfSSL. Thanks to Max at Trail of Bits for the
report and "LORIA, INRIA, France" for research on tlspuffin.
* [Low] If using wolfSSL_clear to reset a WOLFSSL object (vs the normal
wolfSSL_free/wolfSSL_new) it can result in runtime issues. This exists with
builds using the wolfSSL compatibility layer (--enable-opnesslextra) and only
when the application is making use of wolfSSL_clear instead of
SSL_free/SSL_new. In the case of a TLS 1.3 resumption, after continuing to use
the WOLFSSH object after having called wolfSSL_clear, an application could
crash. It is suggested that users calling wolfSSL_clear update the version of
wolfSSL used. Thanks to Max at Trail of Bits for the report and "LORIA, INRIA,
France" for research on tlspuffin.
* Potential DoS attack on DTLS 1.2. In the case of receiving a malicious
plaintext handshake message at epoch 0 the connection will enter an error
state reporting a duplicate message. This affects both server and client
side. Users that have DTLS enabled and in use should update their version of
wolfSSL to mitigate the potential for a DoS attack.
New Feature Additions
* QUIC support added, for using wolfSSL with QUIC implementations like ngtcp2
* SE050 port additions and fixes
* Added support for Dilithium post quantum algorithm use with TLS
* Support for RSA-PSS signed certificates
* Support for Infineon AURIX IDE
* Add Zephyr support for nRF5340 with CryptoCell-312
Enhancements
* Expanded ABI support by 50 APIs to include wolfCrypt and Certificates making a
total of 113 ABIs controlled and maintained
* DTLS 1.3 partial support for ConnectionID as described by RFC9146 and RFC9147
* Added support for X509_CRL_print function
* Remove deprecated algorithms in Renesas cs+ project
* Support more build options disable/enable with i.MX CAAM build
* wolfSSL_CTX_set_options and wolfSSL_CTX_get_options functions added to non
compatibility layer builds
* TFM: change inline x86 asm code to compile with clang
* Improvements to error queue and fix for behavior of wolfSSL_ERR_get_error
* scripts/makedistsmall.sh script added for creating a small source/header only
package
* TLS 1.3: restrict extension validity by message, Extensions ServerName,
SupportedGroups and ALPN must not appear in server_hello
* Add liboqs integration to CMake build system
* Adds wolfSSL_PEM_read_RSAPrivateKey() to the OpenSSL compatible API
* Added support for P384 pre-share in bundled example server
* Replace clz assembly instruction in ARM 32 builds when not supported
* Integrate chacha20-poly1305 into the EVP interface
* Additional validation that extensions appear in correct messages
* Allow SAN to be critical with ASN template build
* Support wolfSSL_CTX_set1_curves_list being available when X25519 and/or X448
only defined
* Adds wolfSSL_PEM_read_RSA_PUBKEY() to the OpenSSL compatible API
* Match OpenSSL self signed error return with compatibility layer build
* Added wolfSSL_dtls_create_peer and wolfSSL_dtls_free_peer to help with Python
and Go wrappers for DTLS
Fixes
* DTLS 1.3 asynchronous use case fixes
* Fix handling of counter to support incrementing across all bytes in ARM crypto
asm
* Fixes for ED25519/ED448 private key with public key export (RFC8410)
* Fix for build with NO_TLS macro
* Fix for write dup function to copy over TLS version
* Fix to handle path lengths of 0 when checking certificate CA path lengths
* Fix for CMake not installing sp_int.h for SP math all
* When WOLFSSL_VALIDATE_ECC_IMPORT is defined ECC import validates private key
value is less than order
* PSA crypto fixes
* Fix for not having default pkcs7 signed attributes
* DTLS socket and timeout fixes
* SP int: exptmod ensure base is less than modulus
* Fix for AddPacketInfo with WOLFSSL_CALLBACKS to not pass encrypted TLS 1.3
handshake messages to callbacks
* Fix for sniffer to ensure the session was polled before trying to reprocess it
Changes since v5.4.0:
wolfSSL Release 5.5.0 (Aug 30, 2022)
Note:
** If not free窶冓ng FP_ECC caches per thread by calling wc_ecc_fp_free there is a
possible memory leak during TLS 1.3 handshakes which use ECC. Users are urged
to confirm they are free窶冓ng FP_ECC caches per thread if enabled to avoid
this issue.
Release 5.5.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities
* [Low] Fault injection attack on RAM via Rowhammer leads to ECDSA key
disclosure. Users doing operations with private ECC keys such as server side
TLS connections and creating ECC signatures, who also have hardware that could
be targeted with a sophisticated Rowhammer attack should update the version of
wolfSSL and compile using the macro WOLFSSL_CHECK_SIG_FAULTS. Thanks to Yarkin
Doroz, Berk Sunar, Koksal Must, Caner Tol, and Kristi Rahman all affiliated
with the Vernam Applied Cryptography and Cybersecurity Lab at Worcester
Polytechnic Institute for the report.
* [Low] In wolfSSL version 5.3.0 if compiled with --enable-session-ticket and
the client has non-empty session cache, with TLS 1.2 there is the possibility
of a man in the middle passing a large session ticket to the client and
causing a crash due to an invalid free. There is also the potential for a
malicious TLS 1.3 server to crash a client in a similar manner except in TLS
1.3 it is not susceptible to a man in the middle attack. Users on the client
side with 窶兎nable-session-ticket compiled in and using wolfSSL version 5.3.0
should update their version of wolfSSL. Thanks to Max at Trail of Bits for the
report and "LORIA, INRIA, France" for research on tlspuffin.
* [Low] If using wolfSSL_clear to reset a WOLFSSL object (vs the normal
wolfSSL_free/wolfSSL_new) it can result in runtime issues. This exists with
builds using the wolfSSL compatibility layer (--enable-opnesslextra) and only
when the application is making use of wolfSSL_clear instead of
SSL_free/SSL_new. In the case of a TLS 1.3 resumption, after continuing to use
the WOLFSSH object after having called wolfSSL_clear, an application could
crash. It is suggested that users calling wolfSSL_clear update the version of
wolfSSL used. Thanks to Max at Trail of Bits for the report and "LORIA, INRIA,
France" for research on tlspuffin.
* Potential DoS attack on DTLS 1.2. In the case of receiving a malicious
plaintext handshake message at epoch 0 the connection will enter an error
state reporting a duplicate message. This affects both server and client
side. Users that have DTLS enabled and in use should update their version of
wolfSSL to mitigate the potential for a DoS attack.
New Feature Additions
* QUIC support added, for using wolfSSL with QUIC implementations like ngtcp2
* SE050 port additions and fixes
* Added support for Dilithium post quantum algorithm use with TLS
* Support for RSA-PSS signed certificates
* Support for Infineon AURIX IDE
* Add Zephyr support for nRF5340 with CryptoCell-312
Enhancements
* Expanded ABI support by 50 APIs to include wolfCrypt and Certificates making a
total of 113 ABIs controlled and maintained
* DTLS 1.3 partial support for ConnectionID as described by RFC9146 and RFC9147
* Added support for X509_CRL_print function
* Remove deprecated algorithms in Renesas cs+ project
* Support more build options disable/enable with i.MX CAAM build
* wolfSSL_CTX_set_options and wolfSSL_CTX_get_options functions added to non
compatibility layer builds
* TFM: change inline x86 asm code to compile with clang
* Improvements to error queue and fix for behavior of wolfSSL_ERR_get_error
* scripts/makedistsmall.sh script added for creating a small source/header only
package
* TLS 1.3: restrict extension validity by message, Extensions ServerName,
SupportedGroups and ALPN must not appear in server_hello
* Add liboqs integration to CMake build system
* Adds wolfSSL_PEM_read_RSAPrivateKey() to the OpenSSL compatible API
* Added support for P384 pre-share in bundled example server
* Replace clz assembly instruction in ARM 32 builds when not supported
* Integrate chacha20-poly1305 into the EVP interface
* Additional validation that extensions appear in correct messages
* Allow SAN to be critical with ASN template build
* Support wolfSSL_CTX_set1_curves_list being available when X25519 and/or X448
only defined
* Adds wolfSSL_PEM_read_RSA_PUBKEY() to the OpenSSL compatible API
* Match OpenSSL self signed error return with compatibility layer build
* Added wolfSSL_dtls_create_peer and wolfSSL_dtls_free_peer to help with Python
and Go wrappers for DTLS
Fixes
* DTLS 1.3 asynchronous use case fixes
* Fix handling of counter to support incrementing across all bytes in ARM crypto
asm
* Fixes for ED25519/ED448 private key with public key export (RFC8410)
* Fix for build with NO_TLS macro
* Fix for write dup function to copy over TLS version
* Fix to handle path lengths of 0 when checking certificate CA path lengths
* Fix for CMake not installing sp_int.h for SP math all
* When WOLFSSL_VALIDATE_ECC_IMPORT is defined ECC import validates private key
value is less than order
* PSA crypto fixes
* Fix for not having default pkcs7 signed attributes
* DTLS socket and timeout fixes
* SP int: exptmod ensure base is less than modulus
* Fix for AddPacketInfo with WOLFSSL_CALLBACKS to not pass encrypted TLS 1.3
handshake messages to callbacks
* Fix for sniffer to ensure the session was polled before trying to reprocess it
MAIN commitmail json YAML
doc: Updated chat/ircd-hybrid to 8.2.42
MAIN commitmail json YAML
chat/ircd-hybrid: Update to 8.2.42
Changes since 8.2.41:
-- Noteworthy changes in version 8.2.42 (2022-08-28)
* Added support for reproducible builds using the `SOURCE_DATE_EPOCH` environment
variable. See https://reproducible-builds.org/docs/source-date-epoch/ for more
information.
* Extban `$Q` of type acting has been implemented. This extban prevents
matching users from using the `KICK` command.
* Implemented channel mode `Q`. `KICK` cannot be used on channels with that mode set.
* Implemented user mode `Z`. Users with that mode set may only receive private
messages from other users that are connected via TLS.
* Fixed issue where `WHO nick` on invisible clients (user mode i`) wouldn't work
Changes since 8.2.41:
-- Noteworthy changes in version 8.2.42 (2022-08-28)
* Added support for reproducible builds using the `SOURCE_DATE_EPOCH` environment
variable. See https://reproducible-builds.org/docs/source-date-epoch/ for more
information.
* Extban `$Q` of type acting has been implemented. This extban prevents
matching users from using the `KICK` command.
* Implemented channel mode `Q`. `KICK` cannot be used on channels with that mode set.
* Implemented user mode `Z`. Users with that mode set may only receive private
messages from other users that are connected via TLS.
* Fixed issue where `WHO nick` on invisible clients (user mode i`) wouldn't work
MAIN commitmail json YAML
doc: Updated www/jira-cli to 1.1.0
MAIN commitmail json YAML
pkgsrc/www/jira-cli/Makefile@1.14
/
diff
pkgsrc/www/jira-cli/PLIST@1.4 / diff
pkgsrc/www/jira-cli/distinfo@1.5 / diff
pkgsrc/www/jira-cli/PLIST@1.4 / diff
pkgsrc/www/jira-cli/distinfo@1.5 / diff
www/jira-cli: Update to 1.1.0
Changes since 1.0.0:
This release fixes the issue with screen flickering and insecure TLS config +
adds some features.
## What's added?
- feat: Ability to add worklog by @ankitpokhrel in #410
- feat: Make selection highlight customizable by @ankitpokhrel in #419
## What's fixed?
- fix: Flickering issue by @ankitpokhrel in #436
- fix: Issue with insecure TLS config by @ankitpokhrel in #413
- fix: Issue with default assignee and unassign from tui by @ankitpokhrel in
#405
- fix(minor): Use pointer receiver to avoid heavy copying by @ankitpokhrel
in #426
## Other notable changes
- ehc: Increase max col width + some cleanup by @ankitpokhrel in #427
- chore: Remove deprecated ioutil usage by @ankitpokhrel in #422
New Contributors
- @stavares843 made their first contribution in #423
Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v1.0.0...v1.1.0
Changes since 1.0.0:
This release fixes the issue with screen flickering and insecure TLS config +
adds some features.
## What's added?
- feat: Ability to add worklog by @ankitpokhrel in #410
- feat: Make selection highlight customizable by @ankitpokhrel in #419
## What's fixed?
- fix: Flickering issue by @ankitpokhrel in #436
- fix: Issue with insecure TLS config by @ankitpokhrel in #413
- fix: Issue with default assignee and unassign from tui by @ankitpokhrel in
#405
- fix(minor): Use pointer receiver to avoid heavy copying by @ankitpokhrel
in #426
## Other notable changes
- ehc: Increase max col width + some cleanup by @ankitpokhrel in #427
- chore: Remove deprecated ioutil usage by @ankitpokhrel in #422
New Contributors
- @stavares843 made their first contribution in #423
Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v1.0.0...v1.1.0
MAIN commitmail json YAML
doc: Updated sysutils/py-Glances to 3.2.7
MAIN commitmail json YAML
pkgsrc/sysutils/py-Glances/Makefile@1.20
/
diff
pkgsrc/sysutils/py-Glances/PLIST@1.10 / diff
pkgsrc/sysutils/py-Glances/distinfo@1.19 / diff
pkgsrc/sysutils/py-Glances/patches/patch-glances_plugins_glances__cpu.py@1.2 / diff
pkgsrc/sysutils/py-Glances/patches/patch-glances_plugins_glances__quicklook.py@1.3 / diff
pkgsrc/sysutils/py-Glances/PLIST@1.10 / diff
pkgsrc/sysutils/py-Glances/distinfo@1.19 / diff
pkgsrc/sysutils/py-Glances/patches/patch-glances_plugins_glances__cpu.py@1.2 / diff
pkgsrc/sysutils/py-Glances/patches/patch-glances_plugins_glances__quicklook.py@1.3 / diff
sysutils/py-Glances: Update to 3.2.7
Changes since 3.2.6.4:
===============
Version 3.2.7
===============
Enhancements:
* Config to disable all plugins by default (or enable an exclusive list) #2089
* Keybind(s) for modifying nice level #2081
* [WEBUI] Reorganize help screen #2037
* Add a Json stdout option #2060
* Improve error message when export error occures
* Improve error message when MQTT error occures
* Change the way core are displayed
* Remove unused key in the process list
* Refactor top menu of the curse interface
* Improve Irix display for the load plugin
Bug corrected:
* In the sensor plugin thresholds in the configuration file should overwrite system ones #2058
* Drive names truncated in Web UI #2055
* Correct issue with CPU label
Documentation and CI:
* Improve makefile help #2078
* Add quote to the update command line (already ok for the installation). Related to #2073
* Make Glances (almost) compliant with REUSE #2042
* Update README for Debian package users
* Update documentation for Docker
* Update docs for new shortcut
* Disable Pyright on the Git actions pipeline
* Refactor comments
* Except datutil import error
* Another dep issue solved in the Alpine Docker + issue in the outdated method
Contributors for this version:
* Nicolargo
* Sylvain MOUQUET
* FastThenLeft
* Jiajie Chen
* dbrennand
* ewuerger
Changes since 3.2.6.4:
===============
Version 3.2.7
===============
Enhancements:
* Config to disable all plugins by default (or enable an exclusive list) #2089
* Keybind(s) for modifying nice level #2081
* [WEBUI] Reorganize help screen #2037
* Add a Json stdout option #2060
* Improve error message when export error occures
* Improve error message when MQTT error occures
* Change the way core are displayed
* Remove unused key in the process list
* Refactor top menu of the curse interface
* Improve Irix display for the load plugin
Bug corrected:
* In the sensor plugin thresholds in the configuration file should overwrite system ones #2058
* Drive names truncated in Web UI #2055
* Correct issue with CPU label
Documentation and CI:
* Improve makefile help #2078
* Add quote to the update command line (already ok for the installation). Related to #2073
* Make Glances (almost) compliant with REUSE #2042
* Update README for Debian package users
* Update documentation for Docker
* Update docs for new shortcut
* Disable Pyright on the Git actions pipeline
* Refactor comments
* Except datutil import error
* Another dep issue solved in the Alpine Docker + issue in the outdated method
Contributors for this version:
* Nicolargo
* Sylvain MOUQUET
* FastThenLeft
* Jiajie Chen
* dbrennand
* ewuerger
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.56
MAIN commitmail json YAML
audio/fasttracker2: Update to 1.56
Changes since v1.55
v1.56 - 11.07.2022
- Fixed some possible issues with fullscreen in Linux (still buggy)
- Fixed some issues with restoring the window size and image stretch mode when
loading or resetting the config when the program is running.
- Bugfix: Focus was lost when drag-n-dropping a file onto the tracker,
which meant that the first following mouse click was ignored.
- Windows/macOS: Updated SDL from 2.0.20 to 2.0.22
Changes since v1.55
v1.56 - 11.07.2022
- Fixed some possible issues with fullscreen in Linux (still buggy)
- Fixed some issues with restoring the window size and image stretch mode when
loading or resetting the config when the program is running.
- Bugfix: Focus was lost when drag-n-dropping a file onto the tracker,
which meant that the first following mouse click was ignored.
- Windows/macOS: Updated SDL from 2.0.20 to 2.0.22
MAIN commitmail json YAML
doc: Updated chat/ircd-hybrid to 8.2.41
MAIN commitmail json YAML
pkgsrc/chat/ircd-hybrid/Makefile@1.83
/
diff
pkgsrc/chat/ircd-hybrid/PLIST@1.19 / diff
pkgsrc/chat/ircd-hybrid/distinfo@1.37 / diff
pkgsrc/chat/ircd-hybrid/PLIST@1.19 / diff
pkgsrc/chat/ircd-hybrid/distinfo@1.37 / diff
chat/ircd-hybrid: Update to 8.2.41
Changes since 8.2.40:
-- Noteworthy changes in version 8.2.41 (2022-07-15)
* Fixed issue where WHO didn't work on channel names with two or more
consequent asterisk characters
* IRCv3 WHOX has been implemented. See doc/who.txt for more information
about the new WHO options and features.
* Clients that are connected via TLS are now flagged with the letter S in
the who reply
Changes since 8.2.40:
-- Noteworthy changes in version 8.2.41 (2022-07-15)
* Fixed issue where WHO didn't work on channel names with two or more
consequent asterisk characters
* IRCv3 WHOX has been implemented. See doc/who.txt for more information
about the new WHO options and features.
* Clients that are connected via TLS are now flagged with the letter S in
the who reply
MAIN commitmail json YAML
doc: Updated security/wolfssl to 5.4.0
MAIN commitmail json YAML
pkgsrc/security/wolfssl/Makefile@1.14
/
diff
pkgsrc/security/wolfssl/PLIST@1.9 / diff
pkgsrc/security/wolfssl/distinfo@1.15 / diff
pkgsrc/security/wolfssl/patches/patch-certs_intermediate_genintcerts.sh deleted
pkgsrc/security/wolfssl/PLIST@1.9 / diff
pkgsrc/security/wolfssl/distinfo@1.15 / diff
pkgsrc/security/wolfssl/patches/patch-certs_intermediate_genintcerts.sh deleted
security/wolfssl: Update to v5.4.0
Changes since v5.3.0:
wolfSSL Release 5.4.0 (July 11, 2022)
Note:
** Future releases of wolfSSL will turn off TLS 1.1 by default
** Release 5.4.0 made SP math the default math implementation. To make an
equivalent build as 窶電isable-fastmath from previous versions of wolfSSL, now
requires using the configure option 窶兎nable-heapmath instead.
Release 5.4.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities
* [High] Potential for DTLS DoS attack. In wolfSSL versions before 5.4.0 the
return-routability check is wrongly skipped in a specific edge case. The check
on the return-routability is there for stopping attacks that either consume
excessive resources on the server, or try to use the server as an amplifier
sending an excessive amount of messages to a victim IP. If using DTLS 1.0/1.2
on the server side users should update to avoid the potential DoS
attack. CVE-2022-34293
* [Medium] Ciphertext side channel attack on ECC and DH operations. Users on
systems where rogue agents can monitor memory use should update the version of
wolfSSL and change private ECC keys. Thanks to Sen Deng from Southern
University of Science and Technology (SUSTech) for the report.
* [Medium] Public disclosure of a side channel vulnerability that has been fixed
since wolfSSL version 5.1.0. When running on AMD there is the potential to
leak private key information with ECDSA operations due to a ciphertext side
channel attack. Users on AMD doing ECDSA operations with wolfSSL versions less
than 5.1.0 should update their wolfSSL version used. Thanks to professor
Yinqian Zhang from Southern University of Science and Technology (SUSTech),
his Ph.D. student Mengyuan Li from The Ohio State University, and his M.S
students Sen Deng and Yining Tang from SUStech along with other collaborators;
Luca Wilke, Jan Wichelmann and Professor Thomas Eisenbarth from the University
of Lubeck, Professor Shuai Wang from Hong Kong University of Science and
Technology, Professor Radu Teodorescu from The Ohio State University, Huibo
Wang, Kang Li and Yueqiang Cheng from Baidu Security and Shoumeng Yang from
Ant Financial Services Group.
CVE-2020-12966
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013
CVE-2021-46744
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1033
New Feature Additions
DTLS 1.3
* Support for using the new DTLSv1.3 protocol was added
* Enhancements to bundled examples for an event driven server with DTLS 1.3 was
added
Ports
* Update for the version of VxWorks supported, adding in support for version 6.x
* Support for new DPP and EAP-TEAP/EAP-FAST in wpa_supplicant
* Update for TSIP version support, adding support for version 1.15 for RX65N and
RX72N
* Improved TSIP build to handle having the options WOLFSSL_AEAD_ONLY defined or
NO_AES_CBC defined
* Added support for offloading TLS1.3 operations to Renesas RX boards with TSIP
Misc.
* Constant time improvements due to development of new constant time tests
* Initial translation of API headers to Japanese and expansion of Japanese help
message support in example applications
* Add support for some FPKI (Federal PKI) certificate cases, UUID, FASC-N, PIV
extension for use with smart cards
* Add support for parsing additional CSR attributes such as unstructured name
and content type
* Add support for Linux getrandom() when defining the macro WOLFSSL_GETRANDOM
* Add TLS 1.2 ciphersuite ECDHE_PSK_WITH_AES_128_GCM_SHA256 from RFC 8442
* Expand CAAM support with QNX to include i.MX8 boards and add AES-CTR support
* Enhanced glitching protection by hardening the TLS encrypt operations
Math and Performance
SP Math Additions
* Support for ARMv3, ARMv6 and ARMv7a
- Changes and improvements to get SP building for armv7-a
- Updated assembly for moving large immediate values on ARMv6
- Support for architectures with no ldrd/strd and clz
* Reworked generation using common asm ruby code for 32bit ARM
* Enable wolfSSL SP math all by default (sp_int.c)
* Update SP math all to not use sp_int_word when SQR_MUL_ASM is available
SP Math Fixes
* Fixes for constant time with div function
* Fix casting warnings for Windows builds and assembly changes to support
XMM6-15 being non-volatile
* Fix for div_word when not using div function
* Fixes for user settings with SP ASM and ED/Curve25519 small
* Additional Wycheproof tests ran and fixes
* Fix for SP math ECC non-blocking to always check `hashLen`
* Fix for SP math handling edge case with submod
Improvements and Optimizations
Compatibility Layer
* Provide access to "Finished" messages outside of compatibility layer builds
* Remove unneeded FIPS guard on wolfSSL_EVP_PKEY_derive
* Fix control command issues with AES-GCM, control command EVP_CTRL_GCM_IV_GEN
* Add support for importing private only EC key to a WOLFSSL_EVP_PKEY struct
* Add support for more extensions to wolfSSL_X509_print_ex
* Update for internal to DER (i2d) AIPs to move the buffer pointer when passed
in and the operation is successful
* Return subject and issuer X509_NAME object even when not set
Ports
* Renesas RA6M4 example update and fixes
* Support multi-threaded use cases with Renesas SCE protected mode and TSIP
* Add a global variable for heap-hint for use with TSIP
* Changes to support v5.3.0 cube pack for STM32
* Use the correct mutex type for embOS
* ESP-IDF build cleanup and enhancements, adding in note regarding ESP-IDF
Version
* Support for SEGGER embOS and emNET
* Fix to handle WOLFSSL_DTLS macro in Micrium build
Build Options
* Support for verify only and no-PSS builds updated
* Add the enable options wolfssh (mapped to the existing 窶兎nable-ssh)
* Remove WOLFSSL_ALT_NAMES restriction on notBefore/notAfter use in Cert struct
* Move several more definitions outside the BUILDING_WOLFSSL gate with linux
kernel module build
* Modify --enable-openssh to not enable non-FIPS algos for FIPS builds
* Remove the Python wrappers from wolfSSL source (use pip install instead of
using wolfSSL with Python and our separate Python repository)
* Add --enable-openldap option to configure.ac for building the OpenLDAP port
* Resolve DTLS build to handle not having 窶兎nable-hrrcookie when not needed
* Add an --enable-strongswan option to configure.ac for building the Strongswan
port
* Improve defaults for 64-bit BSDs in configure
* Crypto only build can now be used openssl extra
* Update ASN template build to properly handle WOLFSSL_CERT_EXT and
HAVE_OID_ENCODING
* Allow using 3DES and MD5 with FIPS 140-3, as they fall outside of the FIPS
boundary
* Add the build option --enable-dh=const which replaces setting the macro
WOLFSSL_DH_CONST and now conditionally link to -lm as needed
* Add the macro WOLFSSL_HOSTNAME_VERIFY_ALT_NAME_ONLY which is used to verify
hostname/ip address using alternate name (SAN) only and does not use the
common name
* WOLFSSL_DTLS_NO_HVR_ON_RESUME macro added (off by default to favor more
security). If defined, a DTLS server will not do a cookie exchange on
successful client resumption: the resumption will be faster (one RTT less) and
will consume less bandwidth (one ClientHello and one HelloVerifyRequest
less). On the other hand, if a valid SessionID is collected, forged
clientHello messages will consume resources on the server.
* Misc.
* Refactoring of some internal TLS functions to reduce the memory usage
* Make old less secure TimingPadVerify implementation available
* Add support for aligned data with clang LLVM
* Remove subject/issuer email from the list of alt. Email names in the
DecodedCerts struct
* Zeroizing of pre-master secret buffer in TLS 1.3
* Update to allow TLS 1.3 application server to send session ticket
* Improve the sniffer asynchronous test case to support multiple concurrent
streams
* Clean up wolfSSL_clear() and add more logging
* Update to not error out on bad CRL next date if using NO_VERIFY when parsing
* Add an example C# PSK client
* Add ESP-IDF WOLFSSL_ESP8266 setting for ESP8266 devices
* Support longer sigalg list for post quantum use cases and inter-op with OQS's
OpenSSL fork
* Improve AES-GCM word implementation of GMULT to be constant time
* Additional sanity check with Ed25519/Ed448, now defaults to assume public key
is not trusted
* Support PSK ciphersuites in benchmark apps
* FIPS in core hash using SHA2-256 and SHA2-384
* Add ability to store issuer name components when parsing a certificate
* Make the critical extension flags in DecodedCert always available
* Updates to the default values for basic constraint with X509窶冱
* Support using RSA OAEP with no malloc and add additional sanity checks
* Leverage async code paths to support WANT_WRITE while sending packet fragments
* New azsphere example for continuous integration testing
* Update RSA key generation function to handle pairwise consistency tests with
static memory pools used
* Resolve build time warning by passing in and checking output length with
internal SetCurve function
* Support DTLS bidirectional shutdown in the examples
* Improve DTLS version negotiation and downgrade capability
General Fixes
* Fixes for STM32 Hash/PKA, add some missing mutex frees, and add an additional
benchmark
* Fix missing return checks in KSDK ED25519 code
* Fix compilation warnings from IAR
* Fixes for STM32U5/H7 hash/crypto support
* Fix for using track memory feature with FreeRTOS
* Fixup XSTR processing for MICRIUM
* Update Zephyr fs.h path
* DTLS fixes with WANT_WRITE simulations
* Fixes for BER use with PKCS7 to have additional sanity checks and guards on
edge cases
* Fix to handle exceptional edge case with TFM mp_exptmod_ex
* Fix for stack and heap measurements of a 32-bit build
* Fix to allow enabling AES key wrap (direct) with KCAPI
* Fix --enable-openssh FIPS detection syntax in configure.ac
* Fix to move wolfSSL_ERR_clear_error outside gate for OPENSSL_EXTRA
* Remove MCAPI project's dependency on zlib version
* Only use __builtin_offset on supported GCC versions (4+)
* Fix for c89 builds with using WOLF_C89
* Fix 64bit postfix for constants building with powerpc
* Fixed async Sniffer with TLS v1.3, async removal of `WC_HW_WAIT_E` and
sanitize leak
* Fix for QAT ECC to gate use of HW based on marker
* Fix the supported version extension to always check minDowngrade
* Fix for TLS v1.1 length sanity check for large messages
* Fixes for loading a long DER/ASN.1 certificate chain
* Fix to expose the RSA public DER export functions with certgen
* Fixes for building with small version of SHA3
* Fix configure with WOLFSSL_WPAS_SMALL
* Fix to free PKCS7 recipient list in error cases
* Sanity check to confirm ssl->hsHashes is not NULL before attempting to
dereference it
* Clear the leftover byte count in Aes struct when setting IV
Changes since v5.3.0:
wolfSSL Release 5.4.0 (July 11, 2022)
Note:
** Future releases of wolfSSL will turn off TLS 1.1 by default
** Release 5.4.0 made SP math the default math implementation. To make an
equivalent build as 窶電isable-fastmath from previous versions of wolfSSL, now
requires using the configure option 窶兎nable-heapmath instead.
Release 5.4.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities
* [High] Potential for DTLS DoS attack. In wolfSSL versions before 5.4.0 the
return-routability check is wrongly skipped in a specific edge case. The check
on the return-routability is there for stopping attacks that either consume
excessive resources on the server, or try to use the server as an amplifier
sending an excessive amount of messages to a victim IP. If using DTLS 1.0/1.2
on the server side users should update to avoid the potential DoS
attack. CVE-2022-34293
* [Medium] Ciphertext side channel attack on ECC and DH operations. Users on
systems where rogue agents can monitor memory use should update the version of
wolfSSL and change private ECC keys. Thanks to Sen Deng from Southern
University of Science and Technology (SUSTech) for the report.
* [Medium] Public disclosure of a side channel vulnerability that has been fixed
since wolfSSL version 5.1.0. When running on AMD there is the potential to
leak private key information with ECDSA operations due to a ciphertext side
channel attack. Users on AMD doing ECDSA operations with wolfSSL versions less
than 5.1.0 should update their wolfSSL version used. Thanks to professor
Yinqian Zhang from Southern University of Science and Technology (SUSTech),
his Ph.D. student Mengyuan Li from The Ohio State University, and his M.S
students Sen Deng and Yining Tang from SUStech along with other collaborators;
Luca Wilke, Jan Wichelmann and Professor Thomas Eisenbarth from the University
of Lubeck, Professor Shuai Wang from Hong Kong University of Science and
Technology, Professor Radu Teodorescu from The Ohio State University, Huibo
Wang, Kang Li and Yueqiang Cheng from Baidu Security and Shoumeng Yang from
Ant Financial Services Group.
CVE-2020-12966
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013
CVE-2021-46744
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1033
New Feature Additions
DTLS 1.3
* Support for using the new DTLSv1.3 protocol was added
* Enhancements to bundled examples for an event driven server with DTLS 1.3 was
added
Ports
* Update for the version of VxWorks supported, adding in support for version 6.x
* Support for new DPP and EAP-TEAP/EAP-FAST in wpa_supplicant
* Update for TSIP version support, adding support for version 1.15 for RX65N and
RX72N
* Improved TSIP build to handle having the options WOLFSSL_AEAD_ONLY defined or
NO_AES_CBC defined
* Added support for offloading TLS1.3 operations to Renesas RX boards with TSIP
Misc.
* Constant time improvements due to development of new constant time tests
* Initial translation of API headers to Japanese and expansion of Japanese help
message support in example applications
* Add support for some FPKI (Federal PKI) certificate cases, UUID, FASC-N, PIV
extension for use with smart cards
* Add support for parsing additional CSR attributes such as unstructured name
and content type
* Add support for Linux getrandom() when defining the macro WOLFSSL_GETRANDOM
* Add TLS 1.2 ciphersuite ECDHE_PSK_WITH_AES_128_GCM_SHA256 from RFC 8442
* Expand CAAM support with QNX to include i.MX8 boards and add AES-CTR support
* Enhanced glitching protection by hardening the TLS encrypt operations
Math and Performance
SP Math Additions
* Support for ARMv3, ARMv6 and ARMv7a
- Changes and improvements to get SP building for armv7-a
- Updated assembly for moving large immediate values on ARMv6
- Support for architectures with no ldrd/strd and clz
* Reworked generation using common asm ruby code for 32bit ARM
* Enable wolfSSL SP math all by default (sp_int.c)
* Update SP math all to not use sp_int_word when SQR_MUL_ASM is available
SP Math Fixes
* Fixes for constant time with div function
* Fix casting warnings for Windows builds and assembly changes to support
XMM6-15 being non-volatile
* Fix for div_word when not using div function
* Fixes for user settings with SP ASM and ED/Curve25519 small
* Additional Wycheproof tests ran and fixes
* Fix for SP math ECC non-blocking to always check `hashLen`
* Fix for SP math handling edge case with submod
Improvements and Optimizations
Compatibility Layer
* Provide access to "Finished" messages outside of compatibility layer builds
* Remove unneeded FIPS guard on wolfSSL_EVP_PKEY_derive
* Fix control command issues with AES-GCM, control command EVP_CTRL_GCM_IV_GEN
* Add support for importing private only EC key to a WOLFSSL_EVP_PKEY struct
* Add support for more extensions to wolfSSL_X509_print_ex
* Update for internal to DER (i2d) AIPs to move the buffer pointer when passed
in and the operation is successful
* Return subject and issuer X509_NAME object even when not set
Ports
* Renesas RA6M4 example update and fixes
* Support multi-threaded use cases with Renesas SCE protected mode and TSIP
* Add a global variable for heap-hint for use with TSIP
* Changes to support v5.3.0 cube pack for STM32
* Use the correct mutex type for embOS
* ESP-IDF build cleanup and enhancements, adding in note regarding ESP-IDF
Version
* Support for SEGGER embOS and emNET
* Fix to handle WOLFSSL_DTLS macro in Micrium build
Build Options
* Support for verify only and no-PSS builds updated
* Add the enable options wolfssh (mapped to the existing 窶兎nable-ssh)
* Remove WOLFSSL_ALT_NAMES restriction on notBefore/notAfter use in Cert struct
* Move several more definitions outside the BUILDING_WOLFSSL gate with linux
kernel module build
* Modify --enable-openssh to not enable non-FIPS algos for FIPS builds
* Remove the Python wrappers from wolfSSL source (use pip install instead of
using wolfSSL with Python and our separate Python repository)
* Add --enable-openldap option to configure.ac for building the OpenLDAP port
* Resolve DTLS build to handle not having 窶兎nable-hrrcookie when not needed
* Add an --enable-strongswan option to configure.ac for building the Strongswan
port
* Improve defaults for 64-bit BSDs in configure
* Crypto only build can now be used openssl extra
* Update ASN template build to properly handle WOLFSSL_CERT_EXT and
HAVE_OID_ENCODING
* Allow using 3DES and MD5 with FIPS 140-3, as they fall outside of the FIPS
boundary
* Add the build option --enable-dh=const which replaces setting the macro
WOLFSSL_DH_CONST and now conditionally link to -lm as needed
* Add the macro WOLFSSL_HOSTNAME_VERIFY_ALT_NAME_ONLY which is used to verify
hostname/ip address using alternate name (SAN) only and does not use the
common name
* WOLFSSL_DTLS_NO_HVR_ON_RESUME macro added (off by default to favor more
security). If defined, a DTLS server will not do a cookie exchange on
successful client resumption: the resumption will be faster (one RTT less) and
will consume less bandwidth (one ClientHello and one HelloVerifyRequest
less). On the other hand, if a valid SessionID is collected, forged
clientHello messages will consume resources on the server.
* Misc.
* Refactoring of some internal TLS functions to reduce the memory usage
* Make old less secure TimingPadVerify implementation available
* Add support for aligned data with clang LLVM
* Remove subject/issuer email from the list of alt. Email names in the
DecodedCerts struct
* Zeroizing of pre-master secret buffer in TLS 1.3
* Update to allow TLS 1.3 application server to send session ticket
* Improve the sniffer asynchronous test case to support multiple concurrent
streams
* Clean up wolfSSL_clear() and add more logging
* Update to not error out on bad CRL next date if using NO_VERIFY when parsing
* Add an example C# PSK client
* Add ESP-IDF WOLFSSL_ESP8266 setting for ESP8266 devices
* Support longer sigalg list for post quantum use cases and inter-op with OQS's
OpenSSL fork
* Improve AES-GCM word implementation of GMULT to be constant time
* Additional sanity check with Ed25519/Ed448, now defaults to assume public key
is not trusted
* Support PSK ciphersuites in benchmark apps
* FIPS in core hash using SHA2-256 and SHA2-384
* Add ability to store issuer name components when parsing a certificate
* Make the critical extension flags in DecodedCert always available
* Updates to the default values for basic constraint with X509窶冱
* Support using RSA OAEP with no malloc and add additional sanity checks
* Leverage async code paths to support WANT_WRITE while sending packet fragments
* New azsphere example for continuous integration testing
* Update RSA key generation function to handle pairwise consistency tests with
static memory pools used
* Resolve build time warning by passing in and checking output length with
internal SetCurve function
* Support DTLS bidirectional shutdown in the examples
* Improve DTLS version negotiation and downgrade capability
General Fixes
* Fixes for STM32 Hash/PKA, add some missing mutex frees, and add an additional
benchmark
* Fix missing return checks in KSDK ED25519 code
* Fix compilation warnings from IAR
* Fixes for STM32U5/H7 hash/crypto support
* Fix for using track memory feature with FreeRTOS
* Fixup XSTR processing for MICRIUM
* Update Zephyr fs.h path
* DTLS fixes with WANT_WRITE simulations
* Fixes for BER use with PKCS7 to have additional sanity checks and guards on
edge cases
* Fix to handle exceptional edge case with TFM mp_exptmod_ex
* Fix for stack and heap measurements of a 32-bit build
* Fix to allow enabling AES key wrap (direct) with KCAPI
* Fix --enable-openssh FIPS detection syntax in configure.ac
* Fix to move wolfSSL_ERR_clear_error outside gate for OPENSSL_EXTRA
* Remove MCAPI project's dependency on zlib version
* Only use __builtin_offset on supported GCC versions (4+)
* Fix for c89 builds with using WOLF_C89
* Fix 64bit postfix for constants building with powerpc
* Fixed async Sniffer with TLS v1.3, async removal of `WC_HW_WAIT_E` and
sanitize leak
* Fix for QAT ECC to gate use of HW based on marker
* Fix the supported version extension to always check minDowngrade
* Fix for TLS v1.1 length sanity check for large messages
* Fixes for loading a long DER/ASN.1 certificate chain
* Fix to expose the RSA public DER export functions with certgen
* Fixes for building with small version of SHA3
* Fix configure with WOLFSSL_WPAS_SMALL
* Fix to free PKCS7 recipient list in error cases
* Sanity check to confirm ssl->hsHashes is not NULL before attempting to
dereference it
* Clear the leftover byte count in Aes struct when setting IV
MAIN commitmail json YAML
doc: Updated chat/ircd-hybrid to 8.2.40
MAIN commitmail json YAML
pkgsrc/chat/ircd-hybrid/Makefile@1.82
/
diff
pkgsrc/chat/ircd-hybrid/PLIST@1.18 / diff
pkgsrc/chat/ircd-hybrid/distinfo@1.36 / diff
pkgsrc/chat/ircd-hybrid/PLIST@1.18 / diff
pkgsrc/chat/ircd-hybrid/distinfo@1.36 / diff
chat/ircd-hybrid: Updates to 8.2.40
Changes since 8.2.39:
-- Noteworthy changes in version 8.2.40 (2022-07-02)
* 'channel::disable_fake_channels' now also blocks strikethrough text (0x1E (30))
* 'KNOCK' can now be used on private channels. Channel mode 'K' may be used instead
to control whether or not 'KNOCK' is allowed on a channel.
* Support for '/dev/poll' has been dropped
* 'INFO' now also reports configured values of 'channel::default_join_flood_count'
and 'channel::default_join_flood_time'
* The founder 'q' and admin 'a' channel prefix modes have been implemented.
These are optional and can be enabled with the new 'channel::enable_owner'
and 'channel::enable_admin' configuration directives.
* Channel half-ops may now kick other half-ops
* Extban '$K' of type acting has been implemented. This extban prevents
matching users from using the 'KNOCK' command.
* Server-side channel mode locking 'MLOCK' has been implemented
* Fixed server name leak in 'WHOWAS' with 'serverhide::hide_services' enabled
Changes since 8.2.39:
-- Noteworthy changes in version 8.2.40 (2022-07-02)
* 'channel::disable_fake_channels' now also blocks strikethrough text (0x1E (30))
* 'KNOCK' can now be used on private channels. Channel mode 'K' may be used instead
to control whether or not 'KNOCK' is allowed on a channel.
* Support for '/dev/poll' has been dropped
* 'INFO' now also reports configured values of 'channel::default_join_flood_count'
and 'channel::default_join_flood_time'
* The founder 'q' and admin 'a' channel prefix modes have been implemented.
These are optional and can be enabled with the new 'channel::enable_owner'
and 'channel::enable_admin' configuration directives.
* Channel half-ops may now kick other half-ops
* Extban '$K' of type acting has been implemented. This extban prevents
matching users from using the 'KNOCK' command.
* Server-side channel mode locking 'MLOCK' has been implemented
* Fixed server name leak in 'WHOWAS' with 'serverhide::hide_services' enabled
MAIN commitmail json YAML
doc: Updated www/jira-cli to 1.0.0
MAIN commitmail json YAML
pkgsrc/www/jira-cli/Makefile@1.11
/
diff
pkgsrc/www/jira-cli/PLIST@1.3 / diff
pkgsrc/www/jira-cli/distinfo@1.4 / diff
pkgsrc/www/jira-cli/go-modules.mk@1.4 / diff
pkgsrc/www/jira-cli/PLIST@1.3 / diff
pkgsrc/www/jira-cli/distinfo@1.4 / diff
pkgsrc/www/jira-cli/go-modules.mk@1.4 / diff
www/jira-cli: Update to 1.0.0
Changes since 0.3.0:
We reached v1.0.0
## Breaking changes
- fix!: Replace limit flag with paginate by @ankitpokhrel in #359
- fix!: Append components on edit instead of overriding by @ankitpokhrel in #368
- feat!: Append label to an issue, show labels at issue list view by @stchar in #300
- refactor!: Move boards and project list to subcommand by @ankitpokhrel in #314
## What's added?
- feat: Support custom fields on issue create by @ankitpokhrel in #319
- feat: Add support to read from .netrc by @adolsalamanca in #329
- feat: Add support for OS keyrings/-chains by @boyvanamstel in #348
- feat: Support auth with personal access tokens by @marek-veber / @ankitpokhrel in #327
- feat: Allow to set fixVersions on issue creation by @ankitpokhrel in #276
- feat: Allow insecure TLS by @ankitpokhrel in #305
- feat: Add --no-browser option to open cmd by @ankitpokhrel in #308
- feat: Add search option for boards on jira init by @ankitpokhrel in #322
- feat: Add issues unlink command by @sushilkg in #347
- feat: Support refresh for issues list by @GZLiew in #325
- feat: Ability to delete issue by @ankitpokhrel in #336
- feat: Allow to set custom fields on epic create by @ankitpokhrel in #364
- feat: Allow to edit release-info/fixVersions by @ankitpokhrel in #365
- feat: Allow removing labels on edit by @ankitpokhrel in #371
- feat: Support creating issues with custom subtask type by @danobi in #372
- feat: Allow removing component on edit by @ankitpokhrel in #374
- feat: Allow removing fixVersions on edit by @ankitpokhrel in #376
- feat: Support custom fields on issue edit by @ankitpokhrel in #377
- feat: Jira init non-interactive by @ankitpokhrel in #381
- feat: Show subtasks in issue view by @ankitpokhrel in #382
- feat: Allow project filter in raw jql by @ankitpokhrel in #395
## What's fixed?
- fix: Makefile compatiblity with Make 3.81 by @danmichaelo in #252
- fix: Config generation issue by @ankitpokhrel in #275
- fix(cfg): Strip trailing slash on server name by @ankitpokhrel in #295
- fix: Jira client should respect timeout opt by @ankitpokhrel in #304
- fix: Respect GLAMOUR_STYLE env on issue view by @ankitpokhrel in #317
- fix: Get subtask handle from config by @ankitpokhrel in #296
- fix: Jira wiki parser by @ankitpokhrel in #326
- fix: Display correctly columns in list sprint command help by @adolsalamanca in #320
- fix: Panic on empty sub-list by @ankitpokhrel in #330
- fix: Issue with assigning user by @ankitpokhrel in #321
- fix: OOM bug on issue view by @ankitpokhrel in #350
- fix: Assign parent key as is on edit by @ankitpokhrel in #351
- fix: Add additional check for total boards returned by @ankitpokhrel in #360
- fix: Issue with query param in user assignment by @ankitpokhrel in #380
- fix: Subtask clone by @ankitpokhrel in #383
- fix: editing issue with custom field in non interactive mode by @DrudgeRajen in #391
## Dependency updates
- dep: Upgrade charmbracelet/glamour to 0.5.0 by @ankitpokhrel in #309
- dep: Upgrade rivo/tview to latest by @ankitpokhrel in #310
- dep: Upgrade outdated packages by @ankitpokhrel in #311
- dep: Upgrade cobra to 1.4.0 by @ankitpokhrel in #373
## Other notable changes
- Use md ext for tmp file to trigger vim syntax by @ElementalWarrior in #318
Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v0.3.0...v1.0.0
Changes since 0.3.0:
We reached v1.0.0
## Breaking changes
- fix!: Replace limit flag with paginate by @ankitpokhrel in #359
- fix!: Append components on edit instead of overriding by @ankitpokhrel in #368
- feat!: Append label to an issue, show labels at issue list view by @stchar in #300
- refactor!: Move boards and project list to subcommand by @ankitpokhrel in #314
## What's added?
- feat: Support custom fields on issue create by @ankitpokhrel in #319
- feat: Add support to read from .netrc by @adolsalamanca in #329
- feat: Add support for OS keyrings/-chains by @boyvanamstel in #348
- feat: Support auth with personal access tokens by @marek-veber / @ankitpokhrel in #327
- feat: Allow to set fixVersions on issue creation by @ankitpokhrel in #276
- feat: Allow insecure TLS by @ankitpokhrel in #305
- feat: Add --no-browser option to open cmd by @ankitpokhrel in #308
- feat: Add search option for boards on jira init by @ankitpokhrel in #322
- feat: Add issues unlink command by @sushilkg in #347
- feat: Support refresh for issues list by @GZLiew in #325
- feat: Ability to delete issue by @ankitpokhrel in #336
- feat: Allow to set custom fields on epic create by @ankitpokhrel in #364
- feat: Allow to edit release-info/fixVersions by @ankitpokhrel in #365
- feat: Allow removing labels on edit by @ankitpokhrel in #371
- feat: Support creating issues with custom subtask type by @danobi in #372
- feat: Allow removing component on edit by @ankitpokhrel in #374
- feat: Allow removing fixVersions on edit by @ankitpokhrel in #376
- feat: Support custom fields on issue edit by @ankitpokhrel in #377
- feat: Jira init non-interactive by @ankitpokhrel in #381
- feat: Show subtasks in issue view by @ankitpokhrel in #382
- feat: Allow project filter in raw jql by @ankitpokhrel in #395
## What's fixed?
- fix: Makefile compatiblity with Make 3.81 by @danmichaelo in #252
- fix: Config generation issue by @ankitpokhrel in #275
- fix(cfg): Strip trailing slash on server name by @ankitpokhrel in #295
- fix: Jira client should respect timeout opt by @ankitpokhrel in #304
- fix: Respect GLAMOUR_STYLE env on issue view by @ankitpokhrel in #317
- fix: Get subtask handle from config by @ankitpokhrel in #296
- fix: Jira wiki parser by @ankitpokhrel in #326
- fix: Display correctly columns in list sprint command help by @adolsalamanca in #320
- fix: Panic on empty sub-list by @ankitpokhrel in #330
- fix: Issue with assigning user by @ankitpokhrel in #321
- fix: OOM bug on issue view by @ankitpokhrel in #350
- fix: Assign parent key as is on edit by @ankitpokhrel in #351
- fix: Add additional check for total boards returned by @ankitpokhrel in #360
- fix: Issue with query param in user assignment by @ankitpokhrel in #380
- fix: Subtask clone by @ankitpokhrel in #383
- fix: editing issue with custom field in non interactive mode by @DrudgeRajen in #391
## Dependency updates
- dep: Upgrade charmbracelet/glamour to 0.5.0 by @ankitpokhrel in #309
- dep: Upgrade rivo/tview to latest by @ankitpokhrel in #310
- dep: Upgrade outdated packages by @ankitpokhrel in #311
- dep: Upgrade cobra to 1.4.0 by @ankitpokhrel in #373
## Other notable changes
- Use md ext for tmp file to trigger vim syntax by @ElementalWarrior in #318
Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v0.3.0...v1.0.0
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.55
MAIN commitmail json YAML
audio/fasttracker2: Update to 1.55
Changes since v1.54
v1.55 - 14.06.2022
- Fixed crash when using "Copy smp." on an empty dest. or source instrument
- Fixed: Using "Copy Ins." on an empty source instrument resulted in a
non-sensical system message.
- Reset pattern loop states on "Play Song", fixes a potential bug
Changes since v1.54
v1.55 - 14.06.2022
- Fixed crash when using "Copy smp." on an empty dest. or source instrument
- Fixed: Using "Copy Ins." on an empty source instrument resulted in a
non-sensical system message.
- Reset pattern loop states on "Play Song", fixes a potential bug
MAIN commitmail json YAML
doc: Updated sysutils/py-Glances to 3.2.6.4
MAIN commitmail json YAML
sysutils/py-Glances: Update to 3.2.6.4
Changes since 3.2.5:
===============
Version 3.2.6
===============
Enhancement requests:
* Create a Show option in the configuration file to only show some stats #2052
* Use glances.conf file inside docker-compose folder for Docker images
* Optionally disable public ip #2030
* Update public ip at intervals #2029
Bug corrected:
* Unitary tests should run loopback interface #2051
* Add python-datutil dep for Focker plugin #2045
* Add venv to list of .PHONY in Makefile #2043
* Glances API Documentation displays non valid json #2036
A big thanks to @RazCrimson for his contribution !
Thanks for others contributors:
* Steven Conaway
* aekoroglu
Changes since 3.2.5:
===============
Version 3.2.6
===============
Enhancement requests:
* Create a Show option in the configuration file to only show some stats #2052
* Use glances.conf file inside docker-compose folder for Docker images
* Optionally disable public ip #2030
* Update public ip at intervals #2029
Bug corrected:
* Unitary tests should run loopback interface #2051
* Add python-datutil dep for Focker plugin #2045
* Add venv to list of .PHONY in Makefile #2043
* Glances API Documentation displays non valid json #2036
A big thanks to @RazCrimson for his contribution !
Thanks for others contributors:
* Steven Conaway
* aekoroglu
MAIN commitmail json YAML
doc: Updated textproc/bat to 0.21.0
MAIN commitmail json YAML
pkgsrc/textproc/bat/Makefile@1.28
/
diff
pkgsrc/textproc/bat/cargo-depends.mk@1.4 / diff
pkgsrc/textproc/bat/distinfo@1.20 / diff
pkgsrc/textproc/bat/cargo-depends.mk@1.4 / diff
pkgsrc/textproc/bat/distinfo@1.20 / diff
textproc/bat: Updates to 0.21.0
Changes since 0.20.0:
v0.21.0
Features
* Correctly render tab stops in --show-all, see #2038 (@Synthetica9)
* Add a --style=default option and make it the default. It is less verbose
than full, see #2061 (@IsaacHorvath)
* Enable BusyBox less as pager, see #2162 (@nfisher1226)
* File extensions are now matched case-insensitively. See #1854, #2181
(@Enselic)
Bugfixes
* Bump regex dependency from 1.5.4 to 1.5.5 to fix CVE-2022-24713, see #2145,
#2139 (@Enselic)
* bat no longer crashes when encountering files that references missing
syntaxes. See #915, #2181 (@Enselic)
Performance
* Skip syntax highlighting on long lines (> 16384 chars) to help improve
performance. See #2165 (@keith-hall)
* Vastly improve startup time by lazy-loading syntaxes via syntect 5.0.0. This
makes bat display small files ~75% faster than before. See #951, #2181
(@Enselic)
Other
* Include info about custom assets in --diagnostics if used. See #2107, #2144
(@Enselic)
Syntaxes
* Mapped clang-format config file (.clang-format) to YAML syntax
(@TruncatedDinosour)
* log syntax: improved handling of escape characters in double quoted
strings. See #2123 (@keith-hall)
* Associate /var/spool/mail/* and /var/mail/* with the Email syntax. See #2156
(@cyqsimon)
* Added cmd-help syntax to scope --help messages. See #2148 (@victor-gp)
* Slightly adjust Zig syntax. See #2136 (@Enselic)
* Associate .inf files with the INI syntax. See #2190 (@Enselic)
Themes
bat as a library
* Allow configuration of show_nonprintable with PrettyPrinter, see #2142
* The binary format of syntaxes.bin has been changed due to syntaxes now being
lazy-loaded via syntect 5.0.0. See #2181 (@Enselic)
* Mark bat::error::Error enum as #[non_exhaustive] to allow adding new
variants without future semver breakage. See #2181 (@Enselic)
* Change Error::SyntectError(syntect::LoadingError) to
Error::SyntectError(syntect::Error). See #2181 (@Enselic)
* Add Error::SyntectLoadingError(syntect::LoadingError) enum variant. See
#2181 (@Enselic)
Changes since 0.20.0:
v0.21.0
Features
* Correctly render tab stops in --show-all, see #2038 (@Synthetica9)
* Add a --style=default option and make it the default. It is less verbose
than full, see #2061 (@IsaacHorvath)
* Enable BusyBox less as pager, see #2162 (@nfisher1226)
* File extensions are now matched case-insensitively. See #1854, #2181
(@Enselic)
Bugfixes
* Bump regex dependency from 1.5.4 to 1.5.5 to fix CVE-2022-24713, see #2145,
#2139 (@Enselic)
* bat no longer crashes when encountering files that references missing
syntaxes. See #915, #2181 (@Enselic)
Performance
* Skip syntax highlighting on long lines (> 16384 chars) to help improve
performance. See #2165 (@keith-hall)
* Vastly improve startup time by lazy-loading syntaxes via syntect 5.0.0. This
makes bat display small files ~75% faster than before. See #951, #2181
(@Enselic)
Other
* Include info about custom assets in --diagnostics if used. See #2107, #2144
(@Enselic)
Syntaxes
* Mapped clang-format config file (.clang-format) to YAML syntax
(@TruncatedDinosour)
* log syntax: improved handling of escape characters in double quoted
strings. See #2123 (@keith-hall)
* Associate /var/spool/mail/* and /var/mail/* with the Email syntax. See #2156
(@cyqsimon)
* Added cmd-help syntax to scope --help messages. See #2148 (@victor-gp)
* Slightly adjust Zig syntax. See #2136 (@Enselic)
* Associate .inf files with the INI syntax. See #2190 (@Enselic)
Themes
bat as a library
* Allow configuration of show_nonprintable with PrettyPrinter, see #2142
* The binary format of syntaxes.bin has been changed due to syntaxes now being
lazy-loaded via syntect 5.0.0. See #2181 (@Enselic)
* Mark bat::error::Error enum as #[non_exhaustive] to allow adding new
variants without future semver breakage. See #2181 (@Enselic)
* Change Error::SyntectError(syntect::LoadingError) to
Error::SyntectError(syntect::Error). See #2181 (@Enselic)
* Add Error::SyntectLoadingError(syntect::LoadingError) enum variant. See
#2181 (@Enselic)
MAIN commitmail json YAML
doc: Updated sysutils/htop to 3.2.0
MAIN commitmail json YAML
sysutils/htop: Update to 3.2.0
Changes since 3.1.2:
What's new in version 3.2.0
* Support for displaying multiple tabs in the user interface
* Allow multiple filter and search terms (logical OR, separate by "|")
* Set correct default sorting direction (defaultSortDesc)
* Improve performance for process lookup and update
* Rework the IOMeters initial display
* Removed duplicate sections on COMM and EXE
* Highlight process UNINTERRUPTIBLE_WAIT state (D)
* Show only integer value when CPU% more than 99.9%
* Handle rounding ambiguity between 99.9 and 100.0%
* No longer leaves empty the last column in header
* Fix header layout and meters reset if a header column is empty
* Fix PID and UID column widths off-by-one error
* On Linux, read generic sysfs batteries
* On Linux, do not collect LRS per thread (it is process-wide)
* On Linux, dynamically adjust the SECATTR and CGROUP column widths
* On Linux, fix a crash in LXD
* On FreeBSD, add support for showing process emulation
* On Darwin, lazily set process TTY name
* Always set SIGCHLD to default handling
* Avoid zombie processes on signal races
* Ensure last line is cleared when SIGINT is received
* Instead of SIGTERM, pre-select the last sent signal
* Internal Hashtable performance and sizing improvements
* Add heuristics for guessing LXC or Docker from /proc/1/mounts
* Force elapsed time display to zero if process started in the future
* Avoid extremely large year values when printing time
* Fix division by zero when calculating IO rates
* Fix out of boundary writes in XUtils
* Fix custom thread name display issue
* Use AC_CANONICAL_HOST, not AC_CANONICAL_TARGET in configure.ac
* Support libunwind of LLVM
Changes since 3.1.2:
What's new in version 3.2.0
* Support for displaying multiple tabs in the user interface
* Allow multiple filter and search terms (logical OR, separate by "|")
* Set correct default sorting direction (defaultSortDesc)
* Improve performance for process lookup and update
* Rework the IOMeters initial display
* Removed duplicate sections on COMM and EXE
* Highlight process UNINTERRUPTIBLE_WAIT state (D)
* Show only integer value when CPU% more than 99.9%
* Handle rounding ambiguity between 99.9 and 100.0%
* No longer leaves empty the last column in header
* Fix header layout and meters reset if a header column is empty
* Fix PID and UID column widths off-by-one error
* On Linux, read generic sysfs batteries
* On Linux, do not collect LRS per thread (it is process-wide)
* On Linux, dynamically adjust the SECATTR and CGROUP column widths
* On Linux, fix a crash in LXD
* On FreeBSD, add support for showing process emulation
* On Darwin, lazily set process TTY name
* Always set SIGCHLD to default handling
* Avoid zombie processes on signal races
* Ensure last line is cleared when SIGINT is received
* Instead of SIGTERM, pre-select the last sent signal
* Internal Hashtable performance and sizing improvements
* Add heuristics for guessing LXC or Docker from /proc/1/mounts
* Force elapsed time display to zero if process started in the future
* Avoid extremely large year values when printing time
* Fix division by zero when calculating IO rates
* Fix out of boundary writes in XUtils
* Fix custom thread name display issue
* Use AC_CANONICAL_HOST, not AC_CANONICAL_TARGET in configure.ac
* Support libunwind of LLVM
MAIN commitmail json YAML
doc: Updated sysutils/py-Glances to 3.2.5
MAIN commitmail json YAML
pkgsrc/sysutils/py-Glances/Makefile@1.18
/
diff
pkgsrc/sysutils/py-Glances/PLIST@1.9 / diff
pkgsrc/sysutils/py-Glances/distinfo@1.17 / diff
pkgsrc/sysutils/py-Glances/patches/patch-glances_plugins_glances__quicklook.py@1.2 / diff
pkgsrc/sysutils/py-Glances/PLIST@1.9 / diff
pkgsrc/sysutils/py-Glances/distinfo@1.17 / diff
pkgsrc/sysutils/py-Glances/patches/patch-glances_plugins_glances__quicklook.py@1.2 / diff
sysutils/py-Glances: Update to 3.2.5
Changes since 3.2.4.2:
===============
Version 3.2.5
===============
Enhancement requests:
* Add a Accumulated per program function to the Glances process list needs
test new feature plugin/ps #2015
* Including battery and AC adapter health in Glances enhancement new feature
#1049
* Display uptime of a docker container enhancement plugin/docker #2004
* Add a code formatter enhancement #1964
Bugs corrected:
* Threading.Event.isSet is deprecated in Python 3.10 #2017
* Fix code scanning alert - Clear-text logging of sensitive information
security #2006
* The gpu temperature unit are displayed incorrectly in web ui bug #2002
* Doc for 'alert' Restfull/JSON API response documentation #1994
* Show the spinning state of a disk documentation #1993
* Web server status check endpoint enhancement #1988
* --time parameter being ignored for client/server mode bug #1978
* Amp with pipe do not work documentation #1976
* glances_ip.py plugin relies on low rating / malicious site domain bug
security #1975
* "N" command freezes/unfreezes the current time instead of show/hide bug
#1974
* Missing commands in help "h" screen enhancement needs contributor #1973
* Grafana dashboards not displayed with influxdb2 enhancement needs
contributor #1960
* Glances reports different amounts of used memory than free -m or top
documentation #1924
* Missing: Help command doesn't have info on TCP Connections bug
documentation enhancement needs contributor #1675
* Docstring convention documentation enhancement #940
Thanks for the bug report and the patch: @RazCrimson, @Karthikeyan Singaravelan,
@Moldavite, @ledwards
Changes since 3.2.4.2:
===============
Version 3.2.5
===============
Enhancement requests:
* Add a Accumulated per program function to the Glances process list needs
test new feature plugin/ps #2015
* Including battery and AC adapter health in Glances enhancement new feature
#1049
* Display uptime of a docker container enhancement plugin/docker #2004
* Add a code formatter enhancement #1964
Bugs corrected:
* Threading.Event.isSet is deprecated in Python 3.10 #2017
* Fix code scanning alert - Clear-text logging of sensitive information
security #2006
* The gpu temperature unit are displayed incorrectly in web ui bug #2002
* Doc for 'alert' Restfull/JSON API response documentation #1994
* Show the spinning state of a disk documentation #1993
* Web server status check endpoint enhancement #1988
* --time parameter being ignored for client/server mode bug #1978
* Amp with pipe do not work documentation #1976
* glances_ip.py plugin relies on low rating / malicious site domain bug
security #1975
* "N" command freezes/unfreezes the current time instead of show/hide bug
#1974
* Missing commands in help "h" screen enhancement needs contributor #1973
* Grafana dashboards not displayed with influxdb2 enhancement needs
contributor #1960
* Glances reports different amounts of used memory than free -m or top
documentation #1924
* Missing: Help command doesn't have info on TCP Connections bug
documentation enhancement needs contributor #1675
* Docstring convention documentation enhancement #940
Thanks for the bug report and the patch: @RazCrimson, @Karthikeyan Singaravelan,
@Moldavite, @ledwards
MAIN commitmail json YAML
doc: Updated security/wolfssl to 5.3.0
MAIN commitmail json YAML
pkgsrc/security/wolfssl/Makefile@1.13
/
diff
pkgsrc/security/wolfssl/PLIST@1.8 / diff
pkgsrc/security/wolfssl/distinfo@1.14 / diff
pkgsrc/security/wolfssl/PLIST@1.8 / diff
pkgsrc/security/wolfssl/distinfo@1.14 / diff
security/wolfssl: Update to v5.3.0
Changes since v5.2.0:
Release 5.3.0 of wolfSSL embedded TLS has bug fixes and new features including:
New Feature Additions
Ports
* Updated support for Stunnel to version 5.61
* Add i.MX8 NXP SECO use for secure private ECC keys and expand
cryptodev-linux for use with the RSA/Curve25519 with the Linux CAAM driver
* Allow encrypt then mac with Apache port
* Update Renesas TSIP version to 1.15 on GR-ROSE and certificate signature
data for TSIP / SCE example
* Add IAR MSP430 example, located in IDE/IAR-MSP430 directory
* Add support for FFMPEG with the enable option --enable-ffmpeg, FFMPEG is
used for recording and converting video and audio (https://ffmpeg.org/)
* Update the bind port to version 9.18.0
Post Quantum
* Add Post-quantum KEM benchmark for STM32
* Enable support for using post quantum algorithms with embedded STM32 boards
and port to STM32U585
Compatibility Layer Additions
* Add port to support libspdm
(https://github.com/DMTF/libspdm/blob/main/README.md), compatibility
functions added for the port were:
- ASN1_TIME_compare
- DH_new_by_nid
- OBJ_length, OBJ_get0_data,
- EVP layer ChaCha20-Poly1305, HKDF
- EC_POINT_get_affine_coordinates
- EC_POINT_set_affine_coordinates
* Additional functions added were:
- EC_KEY_print_fp
- EVP_PKEY_paramgen
- EVP_PKEY_sign/verify functionality
- PEM_write_RSAPublicKey
- PEM_write_EC_PUBKEY
- PKCS7_sign
- PKCS7_final
- SMIME_write_PKCS7
- EC_KEY/DH_up_ref
- EVP_DecodeBlock
- EVP_EncodeBlock
- EC_KEY_get_conv_form
- BIO_eof
- Add support for BIO_CTRL_SET and BIO_CTRL_GET
* Add compile time support for the type SSL_R_NULL_SSL_METHOD_PASSED
* Enhanced X509_NAME_print_ex() to support RFC5523 basic escape
* More checks on OPENSSL_VERSION_NUMBER for API prototype differences
* Add extended key usage support to wolfSSL_X509_set_ext
* SSL_VERIFY_FAIL_IF_NO_PEER_CERT now can also connect with compatibility
layer enabled and a TLS 1.3 PSK connection is used
* Improve wolfSSL_BN_rand to handle non byte boundaries and top/bottom
parameters
* Changed X509_V_ERR codes to better match OpenSSL values used
* Improve wolfSSL_i2d_X509_name to allow for a NULL input in order to get the
expected resulting size
* Enhance the smallstack build to reduce stack size farther when built with
compatibility layer enabled
Misc.
* Sniffer asynchronous support addition, handling of DH shared secret and
tested with Intel QuickAssist
* Added in support for OCSP with IPv6
* Enhance SP (single precision) optimizations for use with the ECC P521
* Add new public API wc_CheckCertSigPubKey() for use to easily check the
signature of a certificate given a public key buffer
* Add CSR (Certificate Signing Request) userId support in subject name
* Injection and parsing of custom extensions in X.509 certificates
* Add WOLF_CRYPTO_CB_ONLY_RSA and WOLF_CRYPTO_CB_ONLY_ECC to reduce code size
if using only crypto callback functions with RSA and ECC
* Created new --enable-engine configure flag used to build wolfSSL for use with
wolfEngine
* With TLS 1.3 PSK, when WOLFSSL_PSK_MULTI_ID_PER_CS is defined multiple IDs
for a cipher suite can be handled
* Added private key id/label support with improving the PK (Public Key)
callbacks
* Support for Intel QuickAssist ECC KeyGen acceleration
* Add the function wolfSSL_CTX_SetCertCbCtx to set user context for certificate
call back
* Add the functions wolfSSL_CTX_SetEccSignCtx(WOLFSSL_CTX* ctx, void userCtx)
and wolfSSL_CTX_GetEccSignCtx(WOLFSSL_CTX ctx) for setting and getting a user
context
* wolfRand for AMD --enable-amdrand
Fixes
PORT Fixes
* KCAPI memory optimizations and page alignment fixes for ECC, AES mode fixes
and reduction to memory usage
* Add the new kdf.c file to the TI-RTOS build
* Fix wait-until-done in RSA hardware primitive acceleration of ESP-IDF port
* IOTSafe workarounds when reading files with ending 0窶冱 and for ECC
signatures
Math Library Fixes
* Sanity check with SP math that ECC points ordinates are not greater than
modulus length
* Additional sanity checks that _sp_add_d does not error due to overflow
* Wycheproof fixes, testing integration, and fixes for AVX / AArch64 ASM edge
case tests
* TFM fp_div_2_ct rework to avoid potential overflow
Misc.
* Fix for PKCS#7 with Crypto Callbacks
* Fix for larger curve sizes with deterministic ECC sign
* Fixes for building wolfSSL alongside openssl using --enable-opensslcoexist
* Fix for compatibility layer handling of certificates with SHA256 SKID (Subject Key ID)
* Fix for wolfSSL_ASN1_TIME_diff erroring out on a return value of 0 from mktime
* Remove extra padding when AES-CBC encrypted with PemToDer
* Fixes for TLS v1.3 early data with async.
* Fixes for async disables around the DevCopy calls
* Fixes for Windows AES-NI with clang compiler
* Fix for handling the detection of processing a plaintext TLS alert packet
* Fix for potential memory leak in an error case with TLSX supported groups
* Sanity check on input size in DecodeNsCertType
* AES-GCM stack alignment fixes with assembly code written for AVX/AVX2
* Fix for PK callbacks with server side and setting a public key
Improvements/Optimizations
Build Options and Warnings
* Added example user settings template for FIPS v5 ready
* Automake file touch cleanup for use with Yocto devtool
* Allow disabling forced 'make clean' at the end of ./configure by using
--disable-makeclean
* Enable TLS 1.3 early data when specifying --enable-all option
* Disable PK Callbacks with JNI FIPS builds
* Add a FIPS cert 3389 ready option, this is the fips-ready build
* Support (no)inline with Wind River Diab compiler
* ECDH_compute_key allow setting of globalRNG with FIPS 140-3
* Add logic equivalent to configure.ac in settings.h for Poly1305
* Fixes to support building opensslextra with SP math
* CPP protection for extern references to x86_64 asm code
* Updates and enhancements for Espressif ESP-IDF wolfSSL setup_win.bat
* Documentation improvements with auto generation
* Fix reproducible-build for working an updated version of libtool, version
2.4.7
* Fixes for Diab C89 and armclang
* Fix mcapi_test.c to include the settings.h before crypto.h
* Update and handle builds with NO_WOLFSSL_SERVER and NO_WOLFSSL_CLIENT
* Fix for some macro defines with FIPS 140-3 build so that
RSA_PKCS1_PSS_PADDING can be used with RSA sign/verify functions
Math Libraries
* Add RSA/DH check for even modulus
* Enhance TFM math to handle more alloc failure cases gracefully
* SP ASM performance improvements mostly around AArch64
* SP ASM improvements for additional cache attack resistance
* Add RSA check for small difference between p and q
* 6-8% performance increase with ECC operations using SP int by improving the
Montgomery Reduction
Testing and Validation
* All shell scripts in source tree now tested for correctness using shellcheck
and bash -n
* Added build testing under gcc-12 and -std=c++17 and fixed warnings
* TLS 1.3 script test improvement to wait for server to write file
* Unit tests for ECC r/s zeroness handling
* CI server was expanded with a very 窶徠uiet窶� machine that can support multiple
ContantTime tests ensuring ongoing mitigation against side-channel timing
based attacks. Algorithms being assessed on this machine are: AES-CBC,
AES-GCM, CHACHA20, ECC, POLY1305, RSA, SHA256, SHA512, CURVE25519.
* Added new multi configuration windows builds to CI testing for greater
testing coverage of windows use-cases
Misc.
* Support for ECC import to check validity of key on import even if one of the
coordinates (x or y) is 0
* Modify example app to work with FreeRTOS+IoT
* Ease of access for cert used for verifying a PKCS#7 bundle
* Clean up Visual Studio output and intermediate directories
* With TLS 1.3 fail immediately if a server sends empty certificate message
* Enhance the benchmark application to support multi-threaded testing
* Improvement for wc_EccPublicKeyToDer to not overestimate the buffer size
required
* Fix to check if wc_EccPublicKeyToDer has enough output buffer space
* Fix year 2038 problem in wolfSSL_ASN1_TIME_diff
* Various portability improvements (Time, DTLS epoch size, IV alloc)
* Prefer status_request_v2 over status_request when both are present
* Add separate "struct stat" definition XSTATSTRUCT to make overriding XSTAT
easier for portability
* With SipHash replace gcc specific ASM instruction with generic
* Don't force a ECC CA when a custom CA is passed with -A
* Add peer authentication failsafe for TLS 1.2 and below
* Improve parsing of UID from subject and issuer name with the compatibility
layer by
* Fallback to full TLS handshake if session ticket fails
* Internal refactoring of code to reduce ssl.c file size
Changes since v5.2.0:
Release 5.3.0 of wolfSSL embedded TLS has bug fixes and new features including:
New Feature Additions
Ports
* Updated support for Stunnel to version 5.61
* Add i.MX8 NXP SECO use for secure private ECC keys and expand
cryptodev-linux for use with the RSA/Curve25519 with the Linux CAAM driver
* Allow encrypt then mac with Apache port
* Update Renesas TSIP version to 1.15 on GR-ROSE and certificate signature
data for TSIP / SCE example
* Add IAR MSP430 example, located in IDE/IAR-MSP430 directory
* Add support for FFMPEG with the enable option --enable-ffmpeg, FFMPEG is
used for recording and converting video and audio (https://ffmpeg.org/)
* Update the bind port to version 9.18.0
Post Quantum
* Add Post-quantum KEM benchmark for STM32
* Enable support for using post quantum algorithms with embedded STM32 boards
and port to STM32U585
Compatibility Layer Additions
* Add port to support libspdm
(https://github.com/DMTF/libspdm/blob/main/README.md), compatibility
functions added for the port were:
- ASN1_TIME_compare
- DH_new_by_nid
- OBJ_length, OBJ_get0_data,
- EVP layer ChaCha20-Poly1305, HKDF
- EC_POINT_get_affine_coordinates
- EC_POINT_set_affine_coordinates
* Additional functions added were:
- EC_KEY_print_fp
- EVP_PKEY_paramgen
- EVP_PKEY_sign/verify functionality
- PEM_write_RSAPublicKey
- PEM_write_EC_PUBKEY
- PKCS7_sign
- PKCS7_final
- SMIME_write_PKCS7
- EC_KEY/DH_up_ref
- EVP_DecodeBlock
- EVP_EncodeBlock
- EC_KEY_get_conv_form
- BIO_eof
- Add support for BIO_CTRL_SET and BIO_CTRL_GET
* Add compile time support for the type SSL_R_NULL_SSL_METHOD_PASSED
* Enhanced X509_NAME_print_ex() to support RFC5523 basic escape
* More checks on OPENSSL_VERSION_NUMBER for API prototype differences
* Add extended key usage support to wolfSSL_X509_set_ext
* SSL_VERIFY_FAIL_IF_NO_PEER_CERT now can also connect with compatibility
layer enabled and a TLS 1.3 PSK connection is used
* Improve wolfSSL_BN_rand to handle non byte boundaries and top/bottom
parameters
* Changed X509_V_ERR codes to better match OpenSSL values used
* Improve wolfSSL_i2d_X509_name to allow for a NULL input in order to get the
expected resulting size
* Enhance the smallstack build to reduce stack size farther when built with
compatibility layer enabled
Misc.
* Sniffer asynchronous support addition, handling of DH shared secret and
tested with Intel QuickAssist
* Added in support for OCSP with IPv6
* Enhance SP (single precision) optimizations for use with the ECC P521
* Add new public API wc_CheckCertSigPubKey() for use to easily check the
signature of a certificate given a public key buffer
* Add CSR (Certificate Signing Request) userId support in subject name
* Injection and parsing of custom extensions in X.509 certificates
* Add WOLF_CRYPTO_CB_ONLY_RSA and WOLF_CRYPTO_CB_ONLY_ECC to reduce code size
if using only crypto callback functions with RSA and ECC
* Created new --enable-engine configure flag used to build wolfSSL for use with
wolfEngine
* With TLS 1.3 PSK, when WOLFSSL_PSK_MULTI_ID_PER_CS is defined multiple IDs
for a cipher suite can be handled
* Added private key id/label support with improving the PK (Public Key)
callbacks
* Support for Intel QuickAssist ECC KeyGen acceleration
* Add the function wolfSSL_CTX_SetCertCbCtx to set user context for certificate
call back
* Add the functions wolfSSL_CTX_SetEccSignCtx(WOLFSSL_CTX* ctx, void userCtx)
and wolfSSL_CTX_GetEccSignCtx(WOLFSSL_CTX ctx) for setting and getting a user
context
* wolfRand for AMD --enable-amdrand
Fixes
PORT Fixes
* KCAPI memory optimizations and page alignment fixes for ECC, AES mode fixes
and reduction to memory usage
* Add the new kdf.c file to the TI-RTOS build
* Fix wait-until-done in RSA hardware primitive acceleration of ESP-IDF port
* IOTSafe workarounds when reading files with ending 0窶冱 and for ECC
signatures
Math Library Fixes
* Sanity check with SP math that ECC points ordinates are not greater than
modulus length
* Additional sanity checks that _sp_add_d does not error due to overflow
* Wycheproof fixes, testing integration, and fixes for AVX / AArch64 ASM edge
case tests
* TFM fp_div_2_ct rework to avoid potential overflow
Misc.
* Fix for PKCS#7 with Crypto Callbacks
* Fix for larger curve sizes with deterministic ECC sign
* Fixes for building wolfSSL alongside openssl using --enable-opensslcoexist
* Fix for compatibility layer handling of certificates with SHA256 SKID (Subject Key ID)
* Fix for wolfSSL_ASN1_TIME_diff erroring out on a return value of 0 from mktime
* Remove extra padding when AES-CBC encrypted with PemToDer
* Fixes for TLS v1.3 early data with async.
* Fixes for async disables around the DevCopy calls
* Fixes for Windows AES-NI with clang compiler
* Fix for handling the detection of processing a plaintext TLS alert packet
* Fix for potential memory leak in an error case with TLSX supported groups
* Sanity check on input size in DecodeNsCertType
* AES-GCM stack alignment fixes with assembly code written for AVX/AVX2
* Fix for PK callbacks with server side and setting a public key
Improvements/Optimizations
Build Options and Warnings
* Added example user settings template for FIPS v5 ready
* Automake file touch cleanup for use with Yocto devtool
* Allow disabling forced 'make clean' at the end of ./configure by using
--disable-makeclean
* Enable TLS 1.3 early data when specifying --enable-all option
* Disable PK Callbacks with JNI FIPS builds
* Add a FIPS cert 3389 ready option, this is the fips-ready build
* Support (no)inline with Wind River Diab compiler
* ECDH_compute_key allow setting of globalRNG with FIPS 140-3
* Add logic equivalent to configure.ac in settings.h for Poly1305
* Fixes to support building opensslextra with SP math
* CPP protection for extern references to x86_64 asm code
* Updates and enhancements for Espressif ESP-IDF wolfSSL setup_win.bat
* Documentation improvements with auto generation
* Fix reproducible-build for working an updated version of libtool, version
2.4.7
* Fixes for Diab C89 and armclang
* Fix mcapi_test.c to include the settings.h before crypto.h
* Update and handle builds with NO_WOLFSSL_SERVER and NO_WOLFSSL_CLIENT
* Fix for some macro defines with FIPS 140-3 build so that
RSA_PKCS1_PSS_PADDING can be used with RSA sign/verify functions
Math Libraries
* Add RSA/DH check for even modulus
* Enhance TFM math to handle more alloc failure cases gracefully
* SP ASM performance improvements mostly around AArch64
* SP ASM improvements for additional cache attack resistance
* Add RSA check for small difference between p and q
* 6-8% performance increase with ECC operations using SP int by improving the
Montgomery Reduction
Testing and Validation
* All shell scripts in source tree now tested for correctness using shellcheck
and bash -n
* Added build testing under gcc-12 and -std=c++17 and fixed warnings
* TLS 1.3 script test improvement to wait for server to write file
* Unit tests for ECC r/s zeroness handling
* CI server was expanded with a very 窶徠uiet窶� machine that can support multiple
ContantTime tests ensuring ongoing mitigation against side-channel timing
based attacks. Algorithms being assessed on this machine are: AES-CBC,
AES-GCM, CHACHA20, ECC, POLY1305, RSA, SHA256, SHA512, CURVE25519.
* Added new multi configuration windows builds to CI testing for greater
testing coverage of windows use-cases
Misc.
* Support for ECC import to check validity of key on import even if one of the
coordinates (x or y) is 0
* Modify example app to work with FreeRTOS+IoT
* Ease of access for cert used for verifying a PKCS#7 bundle
* Clean up Visual Studio output and intermediate directories
* With TLS 1.3 fail immediately if a server sends empty certificate message
* Enhance the benchmark application to support multi-threaded testing
* Improvement for wc_EccPublicKeyToDer to not overestimate the buffer size
required
* Fix to check if wc_EccPublicKeyToDer has enough output buffer space
* Fix year 2038 problem in wolfSSL_ASN1_TIME_diff
* Various portability improvements (Time, DTLS epoch size, IV alloc)
* Prefer status_request_v2 over status_request when both are present
* Add separate "struct stat" definition XSTATSTRUCT to make overriding XSTAT
easier for portability
* With SipHash replace gcc specific ASM instruction with generic
* Don't force a ECC CA when a custom CA is passed with -A
* Add peer authentication failsafe for TLS 1.2 and below
* Improve parsing of UID from subject and issuer name with the compatibility
layer by
* Fallback to full TLS handshake if session ticket fails
* Internal refactoring of code to reduce ssl.c file size
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.54
MAIN commitmail json YAML
audio/fasttracker2: Update to v1.53
Changes since v1.52
v1.53 - 20.04.2022
- Fixed stuck/invisible checkbox after leaving the "Layout" config screen
Changes since v1.52
v1.53 - 20.04.2022
- Fixed stuck/invisible checkbox after leaving the "Layout" config screen
MAIN commitmail json YAML
doc: Updated audio/din to 54
MAIN commitmail json YAML
pkgsrc/audio/din/Makefile@1.40
/
diff
pkgsrc/audio/din/PLIST@1.10 / diff
pkgsrc/audio/din/distinfo@1.29 / diff
pkgsrc/audio/din/patches/patch-src_Makefile.am@1.13 / diff
pkgsrc/audio/din/PLIST@1.10 / diff
pkgsrc/audio/din/distinfo@1.29 / diff
pkgsrc/audio/din/patches/patch-src_Makefile.am@1.13 / diff
audio/din: Update to 54
Changes since 53.1:
DIN Is Noise 54:
NEW in DIN54:
/*
Drones Per Launch and Launches Per Minute for drone launchers
Until DIN53.1 you could launch only 1 drone per launch.
In DIN54, you can launch a bunch of drones every launch with
launches per minute.
Change drones per launch / launches per minute of an existing
launcher from Menu > Drone Params > Motion > Drones Per Launch or
Menu > Drone Params > Motion > Launches Per Minute
for new launcher set in defaults:
Menu > Drone Params > Defaults > Drones Per Launch
default = 1
Menu > Drone Params > Defaults > Launches Per Minute
default = 60
Tip:
When there are many drones launched every launch, they will all launch
along the direction (of velocity) of the launcher. Their trajectory will
therefore overlap, turn on Menu > Drone Params > Defaults > Velocity | Randomize
to randomize their launch directions
/*
/*
drone velocity modulation:
affects all launched drones
specify how amount of velocity (actually the speed!) changes from birth to death of a drone
default is constant ie no change from velocity (ie the speed) at birth
this is the behaviour in DIN53.1
edit the change curve from Menu > Editors > Drone velocity modulation
/*
/*
in Gravity widget:
Size:
if turned ON, gravity size continuously expands or contracts to Mouse or
(1st selected) Drone position !warning! Big gravity sizes can move drones
fast to max volume and get loud!
To Screen + : puts base of gravity vector to the center of the screen
To drones + : puts base of gravity vector to the center (magenta arrow) of selected drones.
To drone : puts base of gravity vector to the (first) selected drone.
/*
/* save/load color sliders /*
+ draw gravity vector when UI is off
* draw drone trails even if drones are off visible note / pitch ranges
! fixed: drones bounced only once irrespective of Menu > Drone Params > Defaults > Bounces parameter !
! bug introduced in DIN53 :( !
! fixed: potential (null pointer) crash when turning UI on/off from microtonal keyboard !
! fixed: sudden increase in loudness (sorry!) when frozen drones are deleted but then
thawed, frozen and deleted again and again !
! fixed: restore oscilloscope display state when UI is turned off and on !
! fixed: timing (introduced in DIN53.1 due to change of alarm.cc/h) of auto split / delete boxes in mondrian !
! fixed: deleted drones not de-selected !
Changes since 53.1:
DIN Is Noise 54:
NEW in DIN54:
/*
Drones Per Launch and Launches Per Minute for drone launchers
Until DIN53.1 you could launch only 1 drone per launch.
In DIN54, you can launch a bunch of drones every launch with
launches per minute.
Change drones per launch / launches per minute of an existing
launcher from Menu > Drone Params > Motion > Drones Per Launch or
Menu > Drone Params > Motion > Launches Per Minute
for new launcher set in defaults:
Menu > Drone Params > Defaults > Drones Per Launch
default = 1
Menu > Drone Params > Defaults > Launches Per Minute
default = 60
Tip:
When there are many drones launched every launch, they will all launch
along the direction (of velocity) of the launcher. Their trajectory will
therefore overlap, turn on Menu > Drone Params > Defaults > Velocity | Randomize
to randomize their launch directions
/*
/*
drone velocity modulation:
affects all launched drones
specify how amount of velocity (actually the speed!) changes from birth to death of a drone
default is constant ie no change from velocity (ie the speed) at birth
this is the behaviour in DIN53.1
edit the change curve from Menu > Editors > Drone velocity modulation
/*
/*
in Gravity widget:
Size:
if turned ON, gravity size continuously expands or contracts to Mouse or
(1st selected) Drone position !warning! Big gravity sizes can move drones
fast to max volume and get loud!
To Screen + : puts base of gravity vector to the center of the screen
To drones + : puts base of gravity vector to the center (magenta arrow) of selected drones.
To drone : puts base of gravity vector to the (first) selected drone.
/*
/* save/load color sliders /*
+ draw gravity vector when UI is off
* draw drone trails even if drones are off visible note / pitch ranges
! fixed: drones bounced only once irrespective of Menu > Drone Params > Defaults > Bounces parameter !
! bug introduced in DIN53 :( !
! fixed: potential (null pointer) crash when turning UI on/off from microtonal keyboard !
! fixed: sudden increase in loudness (sorry!) when frozen drones are deleted but then
thawed, frozen and deleted again and again !
! fixed: restore oscilloscope display state when UI is turned off and on !
! fixed: timing (introduced in DIN53.1 due to change of alarm.cc/h) of auto split / delete boxes in mondrian !
! fixed: deleted drones not de-selected !
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.52
MAIN commitmail json YAML
audio/fasttracker2: Update to v1.52
Changes since v1.51
v1.52 - 27.02.2022
- Fix possible sample loop corruption on .MOD import, f.ex. "FARLAND.MOD"
- Hardware Performance Counter code refactoring (framerate handling without
vsync, and scopes)
Changes since v1.51
v1.52 - 27.02.2022
- Fix possible sample loop corruption on .MOD import, f.ex. "FARLAND.MOD"
- Hardware Performance Counter code refactoring (framerate handling without
vsync, and scopes)
MAIN commitmail json YAML
doc: Updated textproc/bat to 0.20.0
MAIN commitmail json YAML
pkgsrc/textproc/bat/Makefile@1.26
/
diff
pkgsrc/textproc/bat/cargo-depends.mk@1.3 / diff
pkgsrc/textproc/bat/distinfo@1.19 / diff
pkgsrc/textproc/bat/cargo-depends.mk@1.3 / diff
pkgsrc/textproc/bat/distinfo@1.19 / diff
textproc/bat: Updates to 0.20.0
Changes since 0.19.0:
v0.20.0
Features
* New style component header-filesize to show size of the displayed file in the
header. See #1988 (@mdibaiee)
* Use underline for line highlighting on ANSI, see #1730 (@mdibaiee)
Bugfixes
* Fix bash completion on bash 3.x and bash-completion 1.x. See #2066
(@joshpencheon)
Syntaxes
* GraphQL: Add support for interfaces implementing interfaces and consider
ampersand an operator. See #2000
* Associate _vimrc and _gvimrc files with the VimL syntax. See #2002
* Associate poetry.lock files with the TOML syntax. See #2049
* Associate .mesh, .task, .rgen, .rint, .rahit, .rchit, .rmiss, and .rcall with
the GLSL syntax. See #2050
* Added support for JQ syntax, see #2072
* Properly associate global git config files rooted in $XDG_CONFIG_HOME/git/ or
$HOME/.config/git/. See #2067 (@cyqsimon)
bat as a library
* Exposed get_syntax_set and get_theme methods on HighlightingAssets. See #2030
(@dandavison)
* Added HeaderFilename and HeaderFilesize to StyleComponent enum, and mark it
#[non_exhaustive]. See #1988 (@mdibaiee)
Changes since 0.19.0:
v0.20.0
Features
* New style component header-filesize to show size of the displayed file in the
header. See #1988 (@mdibaiee)
* Use underline for line highlighting on ANSI, see #1730 (@mdibaiee)
Bugfixes
* Fix bash completion on bash 3.x and bash-completion 1.x. See #2066
(@joshpencheon)
Syntaxes
* GraphQL: Add support for interfaces implementing interfaces and consider
ampersand an operator. See #2000
* Associate _vimrc and _gvimrc files with the VimL syntax. See #2002
* Associate poetry.lock files with the TOML syntax. See #2049
* Associate .mesh, .task, .rgen, .rint, .rahit, .rchit, .rmiss, and .rcall with
the GLSL syntax. See #2050
* Added support for JQ syntax, see #2072
* Properly associate global git config files rooted in $XDG_CONFIG_HOME/git/ or
$HOME/.config/git/. See #2067 (@cyqsimon)
bat as a library
* Exposed get_syntax_set and get_theme methods on HighlightingAssets. See #2030
(@dandavison)
* Added HeaderFilename and HeaderFilesize to StyleComponent enum, and mark it
#[non_exhaustive]. See #1988 (@mdibaiee)
MAIN commitmail json YAML
doc: Updated security/wolfssl to 5.2.0
MAIN commitmail json YAML
pkgsrc/security/wolfssl/Makefile@1.12
/
diff
pkgsrc/security/wolfssl/PLIST@1.7 / diff
pkgsrc/security/wolfssl/distinfo@1.13 / diff
pkgsrc/security/wolfssl/PLIST@1.7 / diff
pkgsrc/security/wolfssl/distinfo@1.13 / diff
security/wolfssl: Update to v5.2.0
Changes since v5.1.1:
wolfSSL Release 5.2.0 (Feb 21, 2022)
Release 5.2.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities
* [High] A TLS v1.3 server who requires mutual authentication can be
bypassed. If a malicious client does not send the certificate_verify message
a client can connect without presenting a certificate even if the server
requires one. Thank you to Aina Toky Rasoamanana and Olivier Levillain of
Télécom SudParis.
* [High] A TLS v1.3 client attempting to authenticate a TLS v1.3 server can
have its certificate check bypassed. If the sig_algo in the
certificate_verify message is different than the certificate message checking
may be bypassed. Thank you to Aina Toky Rasoamanana and Olivier Levillain of
Télécom SudParis.
New Feature Additions
* Example applications for Renesas RX72N with FreeRTOS+IoT
* Renesas FSP 3.5.0 support for RA6M3
* For TLS 1.3, improved checks on order of received messages.
* Support for use of SHA-3 cryptography instructions available in ARMv8.2-A
architecture extensions. (For Apple M1)
* Support for use of SHA-512 cryptography instructions available in ARMv8.2-A
architecture extensions. (For Apple M1)
* Fixes for clang -Os on clang >= 12.0.0
* Expose Sequence Numbers so that Linux TLS (kTLS) can be configured
* Fix bug in TLSX_ALPN_ParseAndSet when using ALPN select callback.
* Allow DES3 with FIPS v5-dev.
* Include HMAC for deterministic ECC sign build
* Add --enable-chrony configure option. This sets build options needed to
build the Chrony NTP (Network Time Protocol) service.
* Add support for STM32U575xx boards.
* Fixes for NXP’s SE050 Ed25519/Curve25519.
* TLS: Secure renegotiation info on by default for compatibility.
* Inline C code version of ARM32 assembly for cryptographic algorithms
available and compiling for improved performance on ARM platforms
* Configure HMAC: define NO_HMAC to disable HMAC (default: enabled)
* ISO-TP transport layer support added to wolfio for TLS over CAN Bus
* Fix initialization bug in SiLabs AES support
* Domain and IP check is only performed on leaf certificates
ARM PSA Support (Platform Security Architecture) API
* Initial support added for ARM’s Platform Security Architecture (PSA) API in
wolfCrypt which allows support of ARM PSA enabled devices by wolfSSL,
wolfSSH, and wolfBoot and wolfCrypt FIPS.
* Included algorithms: ECDSA, ECDH, HKDF, AES, SHA1, SHA256, SHA224, RNG
ECICE Updates
* Support for more encryption algorithms: AES-256-CBC, AES-128-CTR,
AES-256-CTR
* Support for compressed public keys in messages.
Math Improvements
* Improved performance of X448 and Ed448 through inlining Karatsuba in square
and multiplication operations for 128-bit implementation (64-bit platforms
with 128-bit type support).
* SP Math C implementation: fix for corner case in curve specific
implementations of Montgomery Reduction (P-256, P-384).
* SP math all: assembly snippets added for ARM Thumb. Performance improvement
on platform.
* SP math all: ARM64/32 sp_div_word assembly snippets added to remove
dependency on __udiv3.
* SP C implementation: multiplication of two signed types with overflow is
undefined in C. Now cast to unsigned type before multiplication is
performed.
* SP C implementation correctly builds when using CFLAG: -m32
OpenSSL Compatibility Layer
* Added DH_get_2048_256 to compatibility layer.
* wolfSSLeay_version now returns the version of wolfSSL
* Added C++ exports for API’s in wolfssl/openssl/crypto.h. This allows better
compatibility when building with a C++ compiler.
* Fix for OpenSSL x509_NAME_hash mismatch
* Implement FIPS_mode and FIPS_mode_set in the compat layer.
* Fix for certreq and certgen options with openssl compatibility
* wolfSSL_BIO_dump() and wolfSSL_OBJ_obj2txt() rework
* Fix IV length bug in EVP AES-GCM code.
* Add new ASN1_INTEGER compatibility functions.
* Fix wolfSSL_PEM_X509_INFO_read with NO_FILESYSTEM
CMake Updates
* Check for valid override values.
* Add KEYGEN option.
* Cleanup help messages.
* Add options to support wolfTPM.
VisualStudio Updates
* Remove deprecated VS solution
* Fix VS unreachable code warning
New Algorithms and Protocols
* AES-SIV (RFC 5297)
* DTLS SRTP (RFC 5764), used with WebRTC to agree on profile for new real-time
session keys
* SipHash MAC/PRF for hash tables. Includes inline assembly for x86_64 and
Aarch64.
Remove Obsolete Algorithms
* IDEA
* Rabbit
* HC-128
Changes since v5.1.1:
wolfSSL Release 5.2.0 (Feb 21, 2022)
Release 5.2.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities
* [High] A TLS v1.3 server who requires mutual authentication can be
bypassed. If a malicious client does not send the certificate_verify message
a client can connect without presenting a certificate even if the server
requires one. Thank you to Aina Toky Rasoamanana and Olivier Levillain of
Télécom SudParis.
* [High] A TLS v1.3 client attempting to authenticate a TLS v1.3 server can
have its certificate check bypassed. If the sig_algo in the
certificate_verify message is different than the certificate message checking
may be bypassed. Thank you to Aina Toky Rasoamanana and Olivier Levillain of
Télécom SudParis.
New Feature Additions
* Example applications for Renesas RX72N with FreeRTOS+IoT
* Renesas FSP 3.5.0 support for RA6M3
* For TLS 1.3, improved checks on order of received messages.
* Support for use of SHA-3 cryptography instructions available in ARMv8.2-A
architecture extensions. (For Apple M1)
* Support for use of SHA-512 cryptography instructions available in ARMv8.2-A
architecture extensions. (For Apple M1)
* Fixes for clang -Os on clang >= 12.0.0
* Expose Sequence Numbers so that Linux TLS (kTLS) can be configured
* Fix bug in TLSX_ALPN_ParseAndSet when using ALPN select callback.
* Allow DES3 with FIPS v5-dev.
* Include HMAC for deterministic ECC sign build
* Add --enable-chrony configure option. This sets build options needed to
build the Chrony NTP (Network Time Protocol) service.
* Add support for STM32U575xx boards.
* Fixes for NXP’s SE050 Ed25519/Curve25519.
* TLS: Secure renegotiation info on by default for compatibility.
* Inline C code version of ARM32 assembly for cryptographic algorithms
available and compiling for improved performance on ARM platforms
* Configure HMAC: define NO_HMAC to disable HMAC (default: enabled)
* ISO-TP transport layer support added to wolfio for TLS over CAN Bus
* Fix initialization bug in SiLabs AES support
* Domain and IP check is only performed on leaf certificates
ARM PSA Support (Platform Security Architecture) API
* Initial support added for ARM’s Platform Security Architecture (PSA) API in
wolfCrypt which allows support of ARM PSA enabled devices by wolfSSL,
wolfSSH, and wolfBoot and wolfCrypt FIPS.
* Included algorithms: ECDSA, ECDH, HKDF, AES, SHA1, SHA256, SHA224, RNG
ECICE Updates
* Support for more encryption algorithms: AES-256-CBC, AES-128-CTR,
AES-256-CTR
* Support for compressed public keys in messages.
Math Improvements
* Improved performance of X448 and Ed448 through inlining Karatsuba in square
and multiplication operations for 128-bit implementation (64-bit platforms
with 128-bit type support).
* SP Math C implementation: fix for corner case in curve specific
implementations of Montgomery Reduction (P-256, P-384).
* SP math all: assembly snippets added for ARM Thumb. Performance improvement
on platform.
* SP math all: ARM64/32 sp_div_word assembly snippets added to remove
dependency on __udiv3.
* SP C implementation: multiplication of two signed types with overflow is
undefined in C. Now cast to unsigned type before multiplication is
performed.
* SP C implementation correctly builds when using CFLAG: -m32
OpenSSL Compatibility Layer
* Added DH_get_2048_256 to compatibility layer.
* wolfSSLeay_version now returns the version of wolfSSL
* Added C++ exports for API’s in wolfssl/openssl/crypto.h. This allows better
compatibility when building with a C++ compiler.
* Fix for OpenSSL x509_NAME_hash mismatch
* Implement FIPS_mode and FIPS_mode_set in the compat layer.
* Fix for certreq and certgen options with openssl compatibility
* wolfSSL_BIO_dump() and wolfSSL_OBJ_obj2txt() rework
* Fix IV length bug in EVP AES-GCM code.
* Add new ASN1_INTEGER compatibility functions.
* Fix wolfSSL_PEM_X509_INFO_read with NO_FILESYSTEM
CMake Updates
* Check for valid override values.
* Add KEYGEN option.
* Cleanup help messages.
* Add options to support wolfTPM.
VisualStudio Updates
* Remove deprecated VS solution
* Fix VS unreachable code warning
New Algorithms and Protocols
* AES-SIV (RFC 5297)
* DTLS SRTP (RFC 5764), used with WebRTC to agree on profile for new real-time
session keys
* SipHash MAC/PRF for hash tables. Includes inline assembly for x86_64 and
Aarch64.
Remove Obsolete Algorithms
* IDEA
* Rabbit
* HC-128
MAIN commitmail json YAML
doc: Updated audio/din to 53.1
MAIN commitmail json YAML
audio/din: Update to 53.1
Changes since 53:
DIN Is Noise 53.1:
! fixed : runaway launch of drones when Drone Params > Defaults > Generations
is > 1 (higher the value worse the outcome!) and Drones Per Minute = 0
due to wrong initialisation of this drone parameter after DIN restart /
reload
Update ASAP to DIN53.1
Changes since 53:
DIN Is Noise 53.1:
! fixed : runaway launch of drones when Drone Params > Defaults > Generations
is > 1 (higher the value worse the outcome!) and Drones Per Minute = 0
due to wrong initialisation of this drone parameter after DIN restart /
reload
Update ASAP to DIN53.1
MAIN commitmail json YAML
doc: Updated audio/din to 53
MAIN commitmail json YAML
audio/din: Update to 53
Changes since 52:
DIN Is Noise 53:
/* new in DIN53:
launched drones launch drones that launch drones that launch drones....!
use Drone Params > Defaults > Generations to set the number of times this can happen
if Generations = 1, A drone launcher launches drones (@ a Drones Per Minute)
that die at the end of their lifetimes. This is default and the only behaviour until DIN 52.
if Generations = 2, A drone launcher launches drones that launch drones.
if Generations = 3, A drone launcher launches drones that launch drones that
launch drones too.
if Generations = 4, 5, 6, ... this quickly escalates into a population explosion of drones;
lots of drones birthing lots of drones, living their life out and waiting to die can get
very loud (especially if the Compressor isnt ON), slow down DIN and maybe even your computer
beyond rescue. Be careful! :)
Ways to prevent this population explosion are: keep Generatons low (Menu > Drone Params
> Defaults), keep Drones Per Minute (DPM) and Lifetime on the original
launcher low (Select drone launcher and adjust values from Menu > Drone Params > Motion) and
keep the Fall time low (the fade-out time for drone after being killed, from Menu > Drone
Params > Defaults)
The launched drones take the DPM and Lifetime of their parent so editing carefully the
parameters of the original launcher is important.
/* new default Drones Per Minute (DPM) on a drone launcher (Menu > Drone Params > Defaults). Assigns a
DPM when making a drone launcher. Turn on ~ to assign a DPM at random.
* re: Auto rotation of drone velocity/acceleration vectors:
changed Degrees Per Second to Degrees Per Tick
/* re: Menu > Drone Params > Defaults > Bounces
when set to 0, launched drones dont bounce off the bottom of the microtonal keyboard
but are killed immediately (behaviour until DIN 52)
when set to -1, drones dont bounce off the bottom of the microtonal keyboard at all:
but they are not killed either, they just live their life(time) out
/* gravity base and tip dont move ie stay fixed as you scroll the microtonal keyboard in DIN53.
this is because gravity is now in 'object space' along with the drones and microtonal ranges.
until DIN52, gravity was in 'UI space' along with UI controls.
* repositioned drone arrow UI elements
! fixed : DIN not quitting when frozen drones present !
! fixed : change size of gravity vector when its modulating !
Changes since 52:
DIN Is Noise 53:
/* new in DIN53:
launched drones launch drones that launch drones that launch drones....!
use Drone Params > Defaults > Generations to set the number of times this can happen
if Generations = 1, A drone launcher launches drones (@ a Drones Per Minute)
that die at the end of their lifetimes. This is default and the only behaviour until DIN 52.
if Generations = 2, A drone launcher launches drones that launch drones.
if Generations = 3, A drone launcher launches drones that launch drones that
launch drones too.
if Generations = 4, 5, 6, ... this quickly escalates into a population explosion of drones;
lots of drones birthing lots of drones, living their life out and waiting to die can get
very loud (especially if the Compressor isnt ON), slow down DIN and maybe even your computer
beyond rescue. Be careful! :)
Ways to prevent this population explosion are: keep Generatons low (Menu > Drone Params
> Defaults), keep Drones Per Minute (DPM) and Lifetime on the original
launcher low (Select drone launcher and adjust values from Menu > Drone Params > Motion) and
keep the Fall time low (the fade-out time for drone after being killed, from Menu > Drone
Params > Defaults)
The launched drones take the DPM and Lifetime of their parent so editing carefully the
parameters of the original launcher is important.
/* new default Drones Per Minute (DPM) on a drone launcher (Menu > Drone Params > Defaults). Assigns a
DPM when making a drone launcher. Turn on ~ to assign a DPM at random.
* re: Auto rotation of drone velocity/acceleration vectors:
changed Degrees Per Second to Degrees Per Tick
/* re: Menu > Drone Params > Defaults > Bounces
when set to 0, launched drones dont bounce off the bottom of the microtonal keyboard
but are killed immediately (behaviour until DIN 52)
when set to -1, drones dont bounce off the bottom of the microtonal keyboard at all:
but they are not killed either, they just live their life(time) out
/* gravity base and tip dont move ie stay fixed as you scroll the microtonal keyboard in DIN53.
this is because gravity is now in 'object space' along with the drones and microtonal ranges.
until DIN52, gravity was in 'UI space' along with UI controls.
* repositioned drone arrow UI elements
! fixed : DIN not quitting when frozen drones present !
! fixed : change size of gravity vector when its modulating !
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.51
MAIN commitmail json YAML
audio/fasttracker2: Update to v1.51
Changes since v1.50
v1.51 - 01.02.2022
- Don't handle mouse click if window wasn't in focus
Changes since v1.50
v1.51 - 01.02.2022
- Don't handle mouse click if window wasn't in focus
MAIN commitmail json YAML
doc: Updated sysutils/htop to 3.1.2
MAIN commitmail json YAML
sysutils/htop: Update to 3.1.2
Changes since 3.1.1:
What's new in version 3.1.2
* Bugfix for crash when storing modified settings at exit
* Generate xz-compressed source tarball (with configure) using github actions
* Allow -u UID with numerical value as argument
* Added documentation for obsolete/state libraries/program files highlighting
* Some obsolete/stale library highlighting refinements
* Column width issues resolved
* Dynamic UID column sizing improved
* Discard stale information from Disk and Network I/O meters
* Refined Linux kernel thread detection
* Reworked process state handling
* New CCGROUP column showing abbreviated cgroup name
* New OFFSET column in the list of open files screen
Changes since 3.1.1:
What's new in version 3.1.2
* Bugfix for crash when storing modified settings at exit
* Generate xz-compressed source tarball (with configure) using github actions
* Allow -u UID with numerical value as argument
* Added documentation for obsolete/state libraries/program files highlighting
* Some obsolete/stale library highlighting refinements
* Column width issues resolved
* Dynamic UID column sizing improved
* Discard stale information from Disk and Network I/O meters
* Refined Linux kernel thread detection
* Reworked process state handling
* New CCGROUP column showing abbreviated cgroup name
* New OFFSET column in the list of open files screen
MAIN commitmail json YAML
doc: Updated print/foliate to 2.6.4
MAIN commitmail json YAML
pkgsrc/print/foliate/Makefile@1.24
/
diff
pkgsrc/print/foliate/PLIST@1.8 / diff
pkgsrc/print/foliate/distinfo@1.15 / diff
pkgsrc/print/foliate/PLIST@1.8 / diff
pkgsrc/print/foliate/distinfo@1.15 / diff
print/foliate: Update to 2.6.4
Changes since 2.6.3:
2.6.4
Changes:
* Fixed various bugs
Changes since 2.6.3:
2.6.4
Changes:
* Fixed various bugs
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.50
MAIN commitmail json YAML
pkgsrc/audio/fasttracker2/Makefile@1.90
/
diff
pkgsrc/audio/fasttracker2/distinfo@1.84 / diff
pkgsrc/audio/fasttracker2/patches/patch-CMakeLists.txt@1.6 / diff
pkgsrc/audio/fasttracker2/distinfo@1.84 / diff
pkgsrc/audio/fasttracker2/patches/patch-CMakeLists.txt@1.6 / diff
audio/fasttracker2: Update to v1.50
Changes since v1.49
v1.50 - 12.01.2022
- macOS/Windows: Updated SDL 2.0.16 to SDL 2.0.20. SDL 2.0.18 would have issues
with custom mouse cursors on Windows, so I had to skip it.
Changes since v1.49
v1.50 - 12.01.2022
- macOS/Windows: Updated SDL 2.0.16 to SDL 2.0.20. SDL 2.0.18 would have issues
with custom mouse cursors on Windows, so I had to skip it.
MAIN commitmail json YAML
doc: Updated www/jira-cli to 0.3.0
MAIN commitmail json YAML
pkgsrc/www/jira-cli/Makefile@1.5
/
diff
pkgsrc/www/jira-cli/distinfo@1.3 / diff
pkgsrc/www/jira-cli/go-modules.mk@1.3 / diff
pkgsrc/www/jira-cli/distinfo@1.3 / diff
pkgsrc/www/jira-cli/go-modules.mk@1.3 / diff
www/jira-cli: Update to 0.3.0
Changes since 0.2.0:
## What's added?
- feat: Add additional info in view cmd #209 @ankitpokhrel
- feat: Show linked issues when viewing #219 @ankitpokhrel
- feat: Show latest comment when viewing #220 @ankitpokhrel
- feat: Add an option to load N comments when viewing issue #226 @ankitpokhrel
## What's fixed?
- fix: Allow config generations even when no boards #216 @sushilkg
- fix: Off by one error in wiki parser #224 @ankitpokhrel
- fix: Language support for Jira cloud #234 @ankitpokhrel
- fix(docs): Optional COMMENT_BODY #236 @realtime-neil
- fix: Respect BROWSER env #253 @ankitpokhrel
## Other notable changes
- cfg: A new field handle is added in issue.types section as part of #234
- build: Reproducible builds #244 #245 @realtime-neil
- build: Initialize version using runtime build info #249 @ankitpokhrel
Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v0.2.0...v0.3.0
To all direct/indirect contributors and backers, Thank you
Changes since 0.2.0:
## What's added?
- feat: Add additional info in view cmd #209 @ankitpokhrel
- feat: Show linked issues when viewing #219 @ankitpokhrel
- feat: Show latest comment when viewing #220 @ankitpokhrel
- feat: Add an option to load N comments when viewing issue #226 @ankitpokhrel
## What's fixed?
- fix: Allow config generations even when no boards #216 @sushilkg
- fix: Off by one error in wiki parser #224 @ankitpokhrel
- fix: Language support for Jira cloud #234 @ankitpokhrel
- fix(docs): Optional COMMENT_BODY #236 @realtime-neil
- fix: Respect BROWSER env #253 @ankitpokhrel
## Other notable changes
- cfg: A new field handle is added in issue.types section as part of #234
- build: Reproducible builds #244 #245 @realtime-neil
- build: Initialize version using runtime build info #249 @ankitpokhrel
Full Changelog: https://github.com/ankitpokhrel/jira-cli/compare/v0.2.0...v0.3.0
To all direct/indirect contributors and backers, Thank you
MAIN commitmail json YAML
doc: Updated textproc/bat to 0.19.0
MAIN commitmail json YAML
pkgsrc/textproc/bat/Makefile@1.25
/
diff
pkgsrc/textproc/bat/cargo-depends.mk@1.2 / diff
pkgsrc/textproc/bat/distinfo@1.18 / diff
pkgsrc/textproc/bat/cargo-depends.mk@1.2 / diff
pkgsrc/textproc/bat/distinfo@1.18 / diff
textproc/bat: Updates to 0.19.0
Changes since 0.18.2:
v0.19.0
Performance
* Reduce startup time in loop-through mode (e.g. when redirecting output) by
90%. See #1747 (@Enselic)
* Load themes lazily to make bat start 25% faster when disregarding syntax load
time. See #1969 (@Enselic)
* Python syntax highlighting no longer suffers from abysmal performance in
specific scenarios. See #1688 (@keith-hall)
* Fix for poor performance when ANSI escape sequences are piped to bat, see
#1596 (@eth-p)
* Fix for incorrect handling of ANSI escape sequences when using --wrap=never,
see #1596 (@eth-p)
* Load custom assets as fast as integrated assets, see #1753 (@Enselic)
Features
* Support for x:-delta (minus) syntax in line ranges (e.g. 20:-10). See #1901
(@bojan88)
* Support for --ignored-suffix argument. See #1892 (@bojan88)
* $BAT_CONFIG_DIR is now a recognized environment variable. It has precedence
over $XDG_CONFIG_HOME, see #1727 (@billrisher)
* Support for x:+delta syntax in line ranges (e.g. 20:+10). See #1810
(@bojan88)
* Add new --acknowledgements option that gives credit to theme and syntax
definition authors. See #1971 (@Enselic)
* Include git hash in bat -V and bat --version output if present. See #1921
(@Enselic)
Bugfixes
* First line not shown in diff context. See #1891 (@divagant-martian)
* Do not ignore syntaxes that handle file names with a *.conf extension. See
#1703 (@cbolgiano)
Other
* Add PowerShell completion, see #1826 (@rashil2000)
* Minimum supported Rust version (MSRV) bumped to 1.51, see #1994 (@mdibaiee)
Syntaxes
* Groff, see #1685 (@scop)
* HTTP Requests and Responses, see #1748 (@keith-hall)
* LLVM, see #1777 (@ioncodes)
* Highlight for vimrc and gvimrc files, see #1763 (@SuperSandro2000)
* Syslog highlighting improvements, see #1793 (@scop)
* Added support for slim syntax, see #1693 (@mfinelli)
* Racket, see #1884 (@jubnzv)
* LiveScript, see #1915 (@Enselic)
* MediaWiki, see #1925 (@sorairolake)
* The requirements.txt syntax has been removed due to incompatible license
requirements.
* Dart, new highlighter, see #1959 (@Ersikan)
* SCSS and Sass syntaxes updated, see #1766 (@Enselic)
* PowerShell syntax updated, see #1935 (@Enselic)
* TypeScript syntax updated, see #1834 (@Enselic)
bat as a library
* Deprecate HighlightingAssets::syntaxes() and
HighlightingAssets::syntax_for_file_name(). Use
HighlightingAssets::get_syntaxes() and
HighlightingAssets::get_syntax_for_path() instead. They return a Result which
is needed for upcoming lazy-loading work to improve startup performance. They
also return which SyntaxSet the returned SyntaxReference belongs to. See
#1747, #1755, #1776, #1862 (@Enselic)
* Remove HighlightingAssets::from_files and
HighlightingAssets::save_to_cache. Instead of calling the former and then the
latter you now make a single call to bat::assets::build. See #1802, #1971
(@Enselic)
* Replace the error::Error(error::ErrorKind, _) struct and enum with an
error::Error enum. Error(ErrorKind::UnknownSyntax, _) becomes
Error::UnknownSyntax, etc. Also remove the error::ResultExt trait. These
changes stem from replacing error-chain with thiserror. See #1820 (@Enselic)
* Add new MappingTarget enum variant MapExtensionToUnknown. Refer to its
documentation for more information. Also mark MappingTarget as
#[non_exhaustive] since more enum variants might be added in the future. See
#1703 (@cbolgiano), #2012 (@Enselic)
v0.18.3
Bugfixes
* Bump git2 dependency to fix build with Rust 1.54, see #1761
Changes since 0.18.2:
v0.19.0
Performance
* Reduce startup time in loop-through mode (e.g. when redirecting output) by
90%. See #1747 (@Enselic)
* Load themes lazily to make bat start 25% faster when disregarding syntax load
time. See #1969 (@Enselic)
* Python syntax highlighting no longer suffers from abysmal performance in
specific scenarios. See #1688 (@keith-hall)
* Fix for poor performance when ANSI escape sequences are piped to bat, see
#1596 (@eth-p)
* Fix for incorrect handling of ANSI escape sequences when using --wrap=never,
see #1596 (@eth-p)
* Load custom assets as fast as integrated assets, see #1753 (@Enselic)
Features
* Support for x:-delta (minus) syntax in line ranges (e.g. 20:-10). See #1901
(@bojan88)
* Support for --ignored-suffix argument. See #1892 (@bojan88)
* $BAT_CONFIG_DIR is now a recognized environment variable. It has precedence
over $XDG_CONFIG_HOME, see #1727 (@billrisher)
* Support for x:+delta syntax in line ranges (e.g. 20:+10). See #1810
(@bojan88)
* Add new --acknowledgements option that gives credit to theme and syntax
definition authors. See #1971 (@Enselic)
* Include git hash in bat -V and bat --version output if present. See #1921
(@Enselic)
Bugfixes
* First line not shown in diff context. See #1891 (@divagant-martian)
* Do not ignore syntaxes that handle file names with a *.conf extension. See
#1703 (@cbolgiano)
Other
* Add PowerShell completion, see #1826 (@rashil2000)
* Minimum supported Rust version (MSRV) bumped to 1.51, see #1994 (@mdibaiee)
Syntaxes
* Groff, see #1685 (@scop)
* HTTP Requests and Responses, see #1748 (@keith-hall)
* LLVM, see #1777 (@ioncodes)
* Highlight for vimrc and gvimrc files, see #1763 (@SuperSandro2000)
* Syslog highlighting improvements, see #1793 (@scop)
* Added support for slim syntax, see #1693 (@mfinelli)
* Racket, see #1884 (@jubnzv)
* LiveScript, see #1915 (@Enselic)
* MediaWiki, see #1925 (@sorairolake)
* The requirements.txt syntax has been removed due to incompatible license
requirements.
* Dart, new highlighter, see #1959 (@Ersikan)
* SCSS and Sass syntaxes updated, see #1766 (@Enselic)
* PowerShell syntax updated, see #1935 (@Enselic)
* TypeScript syntax updated, see #1834 (@Enselic)
bat as a library
* Deprecate HighlightingAssets::syntaxes() and
HighlightingAssets::syntax_for_file_name(). Use
HighlightingAssets::get_syntaxes() and
HighlightingAssets::get_syntax_for_path() instead. They return a Result which
is needed for upcoming lazy-loading work to improve startup performance. They
also return which SyntaxSet the returned SyntaxReference belongs to. See
#1747, #1755, #1776, #1862 (@Enselic)
* Remove HighlightingAssets::from_files and
HighlightingAssets::save_to_cache. Instead of calling the former and then the
latter you now make a single call to bat::assets::build. See #1802, #1971
(@Enselic)
* Replace the error::Error(error::ErrorKind, _) struct and enum with an
error::Error enum. Error(ErrorKind::UnknownSyntax, _) becomes
Error::UnknownSyntax, etc. Also remove the error::ResultExt trait. These
changes stem from replacing error-chain with thiserror. See #1820 (@Enselic)
* Add new MappingTarget enum variant MapExtensionToUnknown. Refer to its
documentation for more information. Also mark MappingTarget as
#[non_exhaustive] since more enum variants might be added in the future. See
#1703 (@cbolgiano), #2012 (@Enselic)
v0.18.3
Bugfixes
* Bump git2 dependency to fix build with Rust 1.54, see #1761
MAIN commitmail json YAML
doc: Updated security/wolfssl to 5.1.1
MAIN commitmail json YAML
security/wolfssl: Update to v5.1.1
Changes since v5.1.0:
wolfSSL Release 5.1.1 (Jan 3rd, 2022)
Release 5.1.1 of wolfSSL embedded TLS has a high vulnerability fix:
Vulnerabilities
* [High] In connections using AES-CBC or DES3 with TLS/DTLS 1.2 or 1.1 the IV
being used is not random. Users using wolfSSL version 5.0.0 or 5.1.0 doing
TLS/DTLS 1.2 or 1.1 connections, without AEAD only, should update the
version of wolfSSL used.
Changes since v5.1.0:
wolfSSL Release 5.1.1 (Jan 3rd, 2022)
Release 5.1.1 of wolfSSL embedded TLS has a high vulnerability fix:
Vulnerabilities
* [High] In connections using AES-CBC or DES3 with TLS/DTLS 1.2 or 1.1 the IV
being used is not random. Users using wolfSSL version 5.0.0 or 5.1.0 doing
TLS/DTLS 1.2 or 1.1 connections, without AEAD only, should update the
version of wolfSSL used.
MAIN commitmail json YAML
doc: Updated security/wolfssl to 5.1.0
MAIN commitmail json YAML
pkgsrc/security/wolfssl/Makefile@1.10
/
diff
pkgsrc/security/wolfssl/PLIST@1.6 / diff
pkgsrc/security/wolfssl/distinfo@1.11 / diff
pkgsrc/security/wolfssl/PLIST@1.6 / diff
pkgsrc/security/wolfssl/distinfo@1.11 / diff
security/wolfssl: Update to v5.1.0
Changes since v5.0.0:
wolfSSL Release 5.1.0 (Dec 27, 2021)
Release 5.1.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities
* [Low] Potential for DoS attack on a wolfSSL client due to processing hello
packets of the incorrect side. This affects only connections using TLS v1.2
or less that have also been compromised by a man in the middle
attack. Thanks to James Henderson, Mathy Vanhoef, Chris M. Stone, Sam
L. Thomas, Nicolas Bailleut, and Tom Chothia (University of Birmingham, KU
Leuven, ENS Rennes for the report.
* [Low] Client side session resumption issue once the session resumption cache
has been filled up. The hijacking of a session resumption has been
demonstrated so far with only non verified peer connections. That is where
the client is not verifying the server窶冱 CA that it is connecting to. There
is the potential though for other cases involving proxies that are verifying
the server to be at risk, if using wolfSSL in a case involving proxies use
wolfSSL_get1_session and then wolfSSL_SESSION_free when done where
possible. If not adding in the session get/free function calls we recommend
that users of wolfSSL that are resuming sessions update to the latest
version (wolfSSL version 5.1.0 or later). Thanks to the UK's National Cyber
Security Centre (NCSC) for the report.
New Feature Additions
Ports
* Curve25519 support with NXP SE050 added
* Renesas RA6M4 support with SCE Protected Mode and FSP 3.5.0
* Renesas TSIP 1.14 support for RX65N/RX72N
Post Quantum
* Post quantum resistant algorithms used with Apache port
* NIST round 3 FALCON Signature Scheme support added to TLS 1.3 connections
* FALCON added to the benchmarking application
* Testing of cURL with wolfSSL post quantum resistant build
Compatibility Layer Additions
* Updated NGINX port to NGINX version 1.21.4
* Updated Apache port to Apache version 2.4.51
* Add support for SSL_OP_NO_TLSv1_2 flag with wolfSSL_CTX_set_options function
* Support added for the functions
- SSL_CTX_get_max_early_data
- SSL_CTX_set_max_early_data
- SSL_set_max_early_data
- SSL_get_max_early_data
- SSL_CTX_clear_mode
- SSL_CONF_cmd_value_type
- SSL_read_early_data
- SSL_write_early_data
Misc.
* Crypto callback support for AES-CCM added. A callback function can be
registered and used instead of the default AES-CCM implementation in
wolfSSL.
* Added AES-OFB to the FIPS boundary for future FIPS validations.
* Add support for custom OIDs used with CSR (certificate signing request)
generation using the macro WOLFSSL_CUSTOM_OID
* Added HKDF extract callback function for use with TLS 1.3
* Add variant from RFC6979 of deterministic ECC signing that can be enabled
using the macro WOLFSSL_ECDSA_DETERMINISTIC_K_VARIANT
* Added the function wc_GetPubKeyDerFromCert to get the public key from a
DecodedCert structure
* Added the functions wc_InitDecodedCert, wc_ParseCert and wc_FreeDecodedCert
for access to decoding a certificate into a DecodedCert structure
* Added the macro WOLFSSL_ECC_NO_SMALL_STACK for hybrid builds where the
numerous malloc/free with ECC is undesired but small stack use is desired
throughout the rest of the library
* Added the function wc_d2i_PKCS12_fp for reading a PKCS12 file and parsing it
Fixes
PORT Fixes
* Building with Android wpa_supplicant and KeyStore
* Setting initial value of CA certificate with TSIP enabled
* Cryptocell ECC build fix and fix with RSA disabled
* IoT-SAFE improvement for Key/File slot ID size, fix for C++ compile, and
fixes for retrieving the public key after key generation
Math Library Fixes
* Check return values on TFM library montgomery function in case the system
runs out of memory. This resolves an edge case of invalid ECC signatures
being created.
* SP math library sanity check on size of values passed to sp_gcd.
* SP math library sanity check on exponentiation by 0 with mod_exp
* Update base ECC mp_sqrtmod_prime function to handle an edge case of zero
* TFM math library with Intel MULX multiply fix for carry in assembly code
Misc.
* Fix for potential heap buffer overflow with compatibility layer PEM parsing
* Fix for edge memory leak case with an error encountered during TLS
resumption
* Fix for length on inner sequence created with wc_DhKeyToDer when handling
small DH keys
* Fix for sanity check on input argument to DSA sign and verify
* Fix for setting of the return value with ASN1 integer get on an i386 device
* Fix for BER to DER size checks with PKCS7 decryption
* Fix for memory leak with PrintPubKeyEC function in compatibility layer
* Edge case with deterministic ECC key generation when the private key has
leading 0窶冱
* Fix for build with OPENSSL_EXTRA and NO_WOLFSSL_STUB both defined
* Use page aligned memory with ECDSA signing and KCAPI
* Skip expired sessions for TLS 1.3 rather than turning off the resume
behavior
* Fix for DTLS handling dropped or retransmitted messages
Improvements/Optimizations
Build Options and Warnings
* Bugfix: could not build with liboqs and without DH enabled
* Build with macro NO_ECC_KEY_EXPORT fixed
* Fix for building with the macro HAVE_ENCRYPT_THEN_MAC when session export is
enabled
* Building with wolfSentry and HAVE_EX_DATA macro set
Math Libraries
* Improvement for performance with SP C implementation of montgomery reduction
for ECC (P256 and P384) and SP ARM64 implementation for ECC (P384)
* With SP math handle case of dividing by length of dividend
* SP math improvement for lo/hi register names to be used with older GCC
compilers
Misc.
* ASN name constraints checking code refactor for better efficiency and
readability
* Refactor of compatibility layer stack free窶冓ng calls to simplify and reduce
code
* Scrubbed code for trailing spaces, hard tabs, and any control characters
* Explicit check that leaf certificate's public key type match cipher suite
signature algorithm
* Additional NULL sanity checks on WOLFSSL struct internally and improve
switch statement fallthrough
* Retain OCSP error value when CRL is enabled with certificate parsing
* Update to NATIVE LwIP support for TCP use
* Sanity check on PEM size when parsing a PEM with OpenSSL compatibility layer
API.
* SWIG wrapper was removed from the codebase in favor of dedicated Java and
Python wrappers.
* Updates to bundled example client for when to load the CA, handling print
out of IP alt names, and printing out the peers certificate in PEM format
* Handling BER encoded inner content type with PKCS7 verify
* Checking for SOCKET_EPIPE errors from low level socket
* Improvements to cleanup in the case that wolfSSL_Init fails
* Update test and example certificates expiration dates
Changes since v5.0.0:
wolfSSL Release 5.1.0 (Dec 27, 2021)
Release 5.1.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities
* [Low] Potential for DoS attack on a wolfSSL client due to processing hello
packets of the incorrect side. This affects only connections using TLS v1.2
or less that have also been compromised by a man in the middle
attack. Thanks to James Henderson, Mathy Vanhoef, Chris M. Stone, Sam
L. Thomas, Nicolas Bailleut, and Tom Chothia (University of Birmingham, KU
Leuven, ENS Rennes for the report.
* [Low] Client side session resumption issue once the session resumption cache
has been filled up. The hijacking of a session resumption has been
demonstrated so far with only non verified peer connections. That is where
the client is not verifying the server窶冱 CA that it is connecting to. There
is the potential though for other cases involving proxies that are verifying
the server to be at risk, if using wolfSSL in a case involving proxies use
wolfSSL_get1_session and then wolfSSL_SESSION_free when done where
possible. If not adding in the session get/free function calls we recommend
that users of wolfSSL that are resuming sessions update to the latest
version (wolfSSL version 5.1.0 or later). Thanks to the UK's National Cyber
Security Centre (NCSC) for the report.
New Feature Additions
Ports
* Curve25519 support with NXP SE050 added
* Renesas RA6M4 support with SCE Protected Mode and FSP 3.5.0
* Renesas TSIP 1.14 support for RX65N/RX72N
Post Quantum
* Post quantum resistant algorithms used with Apache port
* NIST round 3 FALCON Signature Scheme support added to TLS 1.3 connections
* FALCON added to the benchmarking application
* Testing of cURL with wolfSSL post quantum resistant build
Compatibility Layer Additions
* Updated NGINX port to NGINX version 1.21.4
* Updated Apache port to Apache version 2.4.51
* Add support for SSL_OP_NO_TLSv1_2 flag with wolfSSL_CTX_set_options function
* Support added for the functions
- SSL_CTX_get_max_early_data
- SSL_CTX_set_max_early_data
- SSL_set_max_early_data
- SSL_get_max_early_data
- SSL_CTX_clear_mode
- SSL_CONF_cmd_value_type
- SSL_read_early_data
- SSL_write_early_data
Misc.
* Crypto callback support for AES-CCM added. A callback function can be
registered and used instead of the default AES-CCM implementation in
wolfSSL.
* Added AES-OFB to the FIPS boundary for future FIPS validations.
* Add support for custom OIDs used with CSR (certificate signing request)
generation using the macro WOLFSSL_CUSTOM_OID
* Added HKDF extract callback function for use with TLS 1.3
* Add variant from RFC6979 of deterministic ECC signing that can be enabled
using the macro WOLFSSL_ECDSA_DETERMINISTIC_K_VARIANT
* Added the function wc_GetPubKeyDerFromCert to get the public key from a
DecodedCert structure
* Added the functions wc_InitDecodedCert, wc_ParseCert and wc_FreeDecodedCert
for access to decoding a certificate into a DecodedCert structure
* Added the macro WOLFSSL_ECC_NO_SMALL_STACK for hybrid builds where the
numerous malloc/free with ECC is undesired but small stack use is desired
throughout the rest of the library
* Added the function wc_d2i_PKCS12_fp for reading a PKCS12 file and parsing it
Fixes
PORT Fixes
* Building with Android wpa_supplicant and KeyStore
* Setting initial value of CA certificate with TSIP enabled
* Cryptocell ECC build fix and fix with RSA disabled
* IoT-SAFE improvement for Key/File slot ID size, fix for C++ compile, and
fixes for retrieving the public key after key generation
Math Library Fixes
* Check return values on TFM library montgomery function in case the system
runs out of memory. This resolves an edge case of invalid ECC signatures
being created.
* SP math library sanity check on size of values passed to sp_gcd.
* SP math library sanity check on exponentiation by 0 with mod_exp
* Update base ECC mp_sqrtmod_prime function to handle an edge case of zero
* TFM math library with Intel MULX multiply fix for carry in assembly code
Misc.
* Fix for potential heap buffer overflow with compatibility layer PEM parsing
* Fix for edge memory leak case with an error encountered during TLS
resumption
* Fix for length on inner sequence created with wc_DhKeyToDer when handling
small DH keys
* Fix for sanity check on input argument to DSA sign and verify
* Fix for setting of the return value with ASN1 integer get on an i386 device
* Fix for BER to DER size checks with PKCS7 decryption
* Fix for memory leak with PrintPubKeyEC function in compatibility layer
* Edge case with deterministic ECC key generation when the private key has
leading 0窶冱
* Fix for build with OPENSSL_EXTRA and NO_WOLFSSL_STUB both defined
* Use page aligned memory with ECDSA signing and KCAPI
* Skip expired sessions for TLS 1.3 rather than turning off the resume
behavior
* Fix for DTLS handling dropped or retransmitted messages
Improvements/Optimizations
Build Options and Warnings
* Bugfix: could not build with liboqs and without DH enabled
* Build with macro NO_ECC_KEY_EXPORT fixed
* Fix for building with the macro HAVE_ENCRYPT_THEN_MAC when session export is
enabled
* Building with wolfSentry and HAVE_EX_DATA macro set
Math Libraries
* Improvement for performance with SP C implementation of montgomery reduction
for ECC (P256 and P384) and SP ARM64 implementation for ECC (P384)
* With SP math handle case of dividing by length of dividend
* SP math improvement for lo/hi register names to be used with older GCC
compilers
Misc.
* ASN name constraints checking code refactor for better efficiency and
readability
* Refactor of compatibility layer stack free窶冓ng calls to simplify and reduce
code
* Scrubbed code for trailing spaces, hard tabs, and any control characters
* Explicit check that leaf certificate's public key type match cipher suite
signature algorithm
* Additional NULL sanity checks on WOLFSSL struct internally and improve
switch statement fallthrough
* Retain OCSP error value when CRL is enabled with certificate parsing
* Update to NATIVE LwIP support for TCP use
* Sanity check on PEM size when parsing a PEM with OpenSSL compatibility layer
API.
* SWIG wrapper was removed from the codebase in favor of dedicated Java and
Python wrappers.
* Updates to bundled example client for when to load the CA, handling print
out of IP alt names, and printing out the peers certificate in PEM format
* Handling BER encoded inner content type with PKCS7 verify
* Checking for SOCKET_EPIPE errors from low level socket
* Improvements to cleanup in the case that wolfSSL_Init fails
* Update test and example certificates expiration dates
MAIN commitmail json YAML
doc: Updated audio/fasttracker2 to 1.49
MAIN commitmail json YAML
audio/fasttracker2: Update to v1.49
Changes since v1.48
v1.49 - 13.12.2021
- Fixed a bug when using Cut (or CTRL+X) on 16-bit samples in the sample
editor. It would read data from the wrong offset.
- Kludge: Allow marking the very last sample points in the sample editor if the
image is stretching out the whole screen in fullscreen mode.
- Mac:
1) Fixed possible mouse coordinate scaling bug when leaving fullscreen
2) Left Command key won't trigger song play anymore.
Use the right Alt key for this. If you have an old Mac without a right Alt
key, I suggest getting a newer computer (my first priority is modern
computers).
3) Left Command key can now be used instead of Alt for:
- Select all (A - sample/text editing)
- Cut (X - sample/text editing)
- Copy (C - sample/text editing)
- Paste (V - sample/text editing)
- Updated the help text
Changes since v1.48
v1.49 - 13.12.2021
- Fixed a bug when using Cut (or CTRL+X) on 16-bit samples in the sample
editor. It would read data from the wrong offset.
- Kludge: Allow marking the very last sample points in the sample editor if the
image is stretching out the whole screen in fullscreen mode.
- Mac:
1) Fixed possible mouse coordinate scaling bug when leaving fullscreen
2) Left Command key won't trigger song play anymore.
Use the right Alt key for this. If you have an old Mac without a right Alt
key, I suggest getting a newer computer (my first priority is modern
computers).
3) Left Command key can now be used instead of Alt for:
- Select all (A - sample/text editing)
- Cut (X - sample/text editing)
- Copy (C - sample/text editing)
- Paste (V - sample/text editing)
- Updated the help text
MAIN commitmail json YAML
doc: Updated audio/din to 52
MAIN commitmail json YAML
pkgsrc/audio/din/Makefile@1.35
/
diff
pkgsrc/audio/din/PLIST@1.9 / diff
pkgsrc/audio/din/distinfo@1.26 / diff
pkgsrc/audio/din/patches/patch-src_Makefile.am@1.12 / diff
pkgsrc/audio/din/patches/patch-src_Makefile.in@1.3 / diff
pkgsrc/audio/din/PLIST@1.9 / diff
pkgsrc/audio/din/distinfo@1.26 / diff
pkgsrc/audio/din/patches/patch-src_Makefile.am@1.12 / diff
pkgsrc/audio/din/patches/patch-src_Makefile.in@1.3 / diff
audio/din: Updates to 52
Changes since 51.1:
DIN Is Noise 52:
\ walked back some changes introduced in DIN 51
\ the drone tracked by gravity does not change when the selection changes
\ renamed drone arrow parameter called Head to Neck
/* new gravity size modulation for DIN 52
change the size (aka strength/magnitude) of gravity vector over bpm:
on the gravity widget, turn on Modulate
bpm = speed of gravity size modulation
depth = how far to 0 gravity drops
depth = 1, goes all the way to 0 and back in 1 beat
depth = 0.5, goes from starting size to half size and back in 1 beat
depth = 0, no size modulation ie size does not change at all
default depth = 1
set an initial size using gravity presets or click on Change Size
and move the mouse up or down. keep Modulate off when doing this.
click Edit to edit the size modulation curve for interesting fx.
/*
+ press q to toggle drone wanding when Menu > Drone Tools > Wand is selected
! was always in Add drone mode until DIN 51.x
+ optional tracking of drones when connecting them with Menu > Drone Tools > Connect
+ enable / disable @ Menu > Drone Tools > Track
+ if enabled on connection: drone 1 points to drone 2 points to drone 3 and so on
+ if disabled on disconnection: selected drones stop tracking any other drone
+ select drone on creation
+ Menu > Drone Params > Defaults > Select on Creation
+ drone is not selected by default
+ useful for looking at pitch/volume info of launched drones as they fly past
+ white = noise interpolator curve
@ Menu > Editors > Noise Interpolator
+ white = drone that makes noise
\ was grayscale in DIN 51.x
+ color of velocity vector of drone = color of drone
\ was green in DIN51.x
+ constrain magnitude of drone velocity +/ acceleration to be > 0
+ click on 0 checkbutton on the Menu > Drone Params > Motion > Velocity or Acceleration to toggle
+ if enabled, magnitude of velocity +/ acceleration will always be > 0
+ if disabled, magnitude of velocity +/ acceleration can go < 0 ie will reverse movement or
orbiting
+ browsed drone marker color is color of the browsed drone
\ was green in DIN51.x
* improved drone arrow drawing
* improved note/frequency labeling on microtonal ranges
* improved 'with left/center/right fixed' menu item on Menu > Ranges
* new default volume distribution curve to have value increase (linearly)
after 100% instead of staying at 100%. upto 200% now.
* improved drone > < noise progress display
<> moved (and renamed) Menu > Drone Params > Move under Gravity to Menu > Drone Tools > Balloon
still does the same thing:
releases (like gas balloons :) anchored drones
these are now launched drones and die at the end of their lifetimes.
<> moved Snap drones to notes / Position affects velocity from Menu > Drone Params > Motion to
Menu > Drone Tools
<> moved Bounces, rebound Speed% and drone bounce behaviour from Menu > Drone Params > Motion to
Menu > Drone Params > Defaults as they apply equally to all launched drones
* replaced drone Rise Time Min and Max spinners with a Rise time spinner
+ turn on ~ to generate a random rise time (default is 50% to 100% of Rise time) on drone creation
+ change range of randomness by editing %~ field
* replaced drone Fall Time Min and Max spinners with a Fall time spinner
+ turn on ~ to generate a random fall time (default is 50% to 100% of Fall time) on drone removal
+ change range of randomness by editing %~ field
+ drones can bounce ahead, back or ahead/back
+ can select drones while voice phrasor plays
+ reinstated (from din-5.2.1 release!) a form of indian notation for notes
+ from Settings screen, choose notation = indian
+ a launched drone lifetime = lifetime of launcher or if ~ is active on Menu > Drone Params > Defaults > Lifetime
a randomisation based on ~% of the lifetime of the launcher
! fixed bug when setting snap left/right values
! fixed mouse wheel scrolling of UI when hovering over label widget
! gravity continues tracking drone as its moved around or when scrolling microtonal keyboard
Changes since 51.1:
DIN Is Noise 52:
\ walked back some changes introduced in DIN 51
\ the drone tracked by gravity does not change when the selection changes
\ renamed drone arrow parameter called Head to Neck
/* new gravity size modulation for DIN 52
change the size (aka strength/magnitude) of gravity vector over bpm:
on the gravity widget, turn on Modulate
bpm = speed of gravity size modulation
depth = how far to 0 gravity drops
depth = 1, goes all the way to 0 and back in 1 beat
depth = 0.5, goes from starting size to half size and back in 1 beat
depth = 0, no size modulation ie size does not change at all
default depth = 1
set an initial size using gravity presets or click on Change Size
and move the mouse up or down. keep Modulate off when doing this.
click Edit to edit the size modulation curve for interesting fx.
/*
+ press q to toggle drone wanding when Menu > Drone Tools > Wand is selected
! was always in Add drone mode until DIN 51.x
+ optional tracking of drones when connecting them with Menu > Drone Tools > Connect
+ enable / disable @ Menu > Drone Tools > Track
+ if enabled on connection: drone 1 points to drone 2 points to drone 3 and so on
+ if disabled on disconnection: selected drones stop tracking any other drone
+ select drone on creation
+ Menu > Drone Params > Defaults > Select on Creation
+ drone is not selected by default
+ useful for looking at pitch/volume info of launched drones as they fly past
+ white = noise interpolator curve
@ Menu > Editors > Noise Interpolator
+ white = drone that makes noise
\ was grayscale in DIN 51.x
+ color of velocity vector of drone = color of drone
\ was green in DIN51.x
+ constrain magnitude of drone velocity +/ acceleration to be > 0
+ click on 0 checkbutton on the Menu > Drone Params > Motion > Velocity or Acceleration to toggle
+ if enabled, magnitude of velocity +/ acceleration will always be > 0
+ if disabled, magnitude of velocity +/ acceleration can go < 0 ie will reverse movement or
orbiting
+ browsed drone marker color is color of the browsed drone
\ was green in DIN51.x
* improved drone arrow drawing
* improved note/frequency labeling on microtonal ranges
* improved 'with left/center/right fixed' menu item on Menu > Ranges
* new default volume distribution curve to have value increase (linearly)
after 100% instead of staying at 100%. upto 200% now.
* improved drone > < noise progress display
<> moved (and renamed) Menu > Drone Params > Move under Gravity to Menu > Drone Tools > Balloon
still does the same thing:
releases (like gas balloons :) anchored drones
these are now launched drones and die at the end of their lifetimes.
<> moved Snap drones to notes / Position affects velocity from Menu > Drone Params > Motion to
Menu > Drone Tools
<> moved Bounces, rebound Speed% and drone bounce behaviour from Menu > Drone Params > Motion to
Menu > Drone Params > Defaults as they apply equally to all launched drones
* replaced drone Rise Time Min and Max spinners with a Rise time spinner
+ turn on ~ to generate a random rise time (default is 50% to 100% of Rise time) on drone creation
+ change range of randomness by editing %~ field
* replaced drone Fall Time Min and Max spinners with a Fall time spinner
+ turn on ~ to generate a random fall time (default is 50% to 100% of Fall time) on drone removal
+ change range of randomness by editing %~ field
+ drones can bounce ahead, back or ahead/back
+ can select drones while voice phrasor plays
+ reinstated (from din-5.2.1 release!) a form of indian notation for notes
+ from Settings screen, choose notation = indian
+ a launched drone lifetime = lifetime of launcher or if ~ is active on Menu > Drone Params > Defaults > Lifetime
a randomisation based on ~% of the lifetime of the launcher
! fixed bug when setting snap left/right values
! fixed mouse wheel scrolling of UI when hovering over label widget
! gravity continues tracking drone as its moved around or when scrolling microtonal keyboard
MAIN commitmail json YAML
doc: Updated sysutils/py-Glances to 3.2.4.2
MAIN commitmail json YAML
pkgsrc/sysutils/py-Glances/Makefile@1.14
/
diff
pkgsrc/sysutils/py-Glances/distinfo@1.16 / diff
pkgsrc/sysutils/py-Glances/patches/patch-glances_plugins_glances__cpu.py@1.1 / diff
pkgsrc/sysutils/py-Glances/distinfo@1.16 / diff
pkgsrc/sysutils/py-Glances/patches/patch-glances_plugins_glances__cpu.py@1.1 / diff
sysutils/py-Glances: Update to 3.2.4.2
Changes since 3.2.3.1:
===============
Version 3.2.4.1
===============
Bugs corrected:
* Missing packaging dependency when using pip install #1955
===============
Version 3.2.4
===============
Bugs corrected:
* Failure to start on Apple M1 Max #1939
* Influxdb2 via SSL #1934
* Update WebUI (security patch). Thanks to @notFloran.
* Swith from black <> white theme with the '9' hotkey - Related to issue #976
* Fix: Docker plugin - Invalid IO stats with Arch Linux #1945
* Bug Fix: Docker plugin - Network stats not being displayed #1944
* Fix Grafana CPU temperature panel #1954
* is_disabled name fix #1949
* Fix tipo in documentation #1932
* distutils is deprecated in Python 3.10 #1923
* Separate battery percentages #1920
* Update docs and correct make docs-server target in Makefile
Enhancement requests:
* Improve --issue by displaying the second update iteration and not the first one. More relevant
* Improve --issue option with Python version and paths
* Correct an issue on idle display
* Refactor Mem + MemSwap Curse
* Refactor CPU Curses code
Contributors for this version:
* Nicolargo
* RazCrimson
* Floran Brutel
* H4ckerxx44
* Mohamad Mansour
* N辿fix Estrada
* Zameer Manji
Changes since 3.2.3.1:
===============
Version 3.2.4.1
===============
Bugs corrected:
* Missing packaging dependency when using pip install #1955
===============
Version 3.2.4
===============
Bugs corrected:
* Failure to start on Apple M1 Max #1939
* Influxdb2 via SSL #1934
* Update WebUI (security patch). Thanks to @notFloran.
* Swith from black <> white theme with the '9' hotkey - Related to issue #976
* Fix: Docker plugin - Invalid IO stats with Arch Linux #1945
* Bug Fix: Docker plugin - Network stats not being displayed #1944
* Fix Grafana CPU temperature panel #1954
* is_disabled name fix #1949
* Fix tipo in documentation #1932
* distutils is deprecated in Python 3.10 #1923
* Separate battery percentages #1920
* Update docs and correct make docs-server target in Makefile
Enhancement requests:
* Improve --issue by displaying the second update iteration and not the first one. More relevant
* Improve --issue option with Python version and paths
* Correct an issue on idle display
* Refactor Mem + MemSwap Curse
* Refactor CPU Curses code
Contributors for this version:
* Nicolargo
* RazCrimson
* Floran Brutel
* H4ckerxx44
* Mohamad Mansour
* N辿fix Estrada
* Zameer Manji
MAIN commitmail json YAML
doc: Updated www/jira-cli to 0.2.0
MAIN commitmail json YAML
pkgsrc/www/jira-cli/Makefile@1.2
/
diff
pkgsrc/www/jira-cli/PLIST@1.2 / diff
pkgsrc/www/jira-cli/distinfo@1.2 / diff
pkgsrc/www/jira-cli/go-modules.mk@1.2 / diff
pkgsrc/www/jira-cli/PLIST@1.2 / diff
pkgsrc/www/jira-cli/distinfo@1.2 / diff
pkgsrc/www/jira-cli/go-modules.mk@1.2 / diff
www/jira-cli: Update to 0.2.0
Changes since 0.1.1:
> This version has some breaking changes in the config file and, you will
need to regenerate the config for all features to work.
## Notable changes
- The tool is now compatible with next-gen/team-managed project.
- New filters when listing issues, viz:
- Filter by parent: This will allow you to list all sub-tasks of a task.
- Order by filter: This will allow you to display a list sorted by their
rank for example.
- You can now assign epic to the issue on creation.
- You can add issues to the sprint with `jira sprint add`
## What's added?
- feat: Allow to assign epic on create #194
- feat: Cmd to add issues to sprint #205
- feat: Allow to filter by parent #197
- feat: Add order-by filter #206
- feat: Add type on project listing #190
## What's fixed?
- fix: Make epic add work in next-gen project #195
- fix: Epic creation for next-gen project #192
- fix: Make epic remove work in next-gen project #196
- fix: Make epic list work for next-gen project #201
- fix: Segmentation fault on view #202
- fix(tui): Link/key copy is broken for altered key col #204
## Config changes
- cfg!: Expand config to include project type #191
- cfg!: Rename field to name and add link field to epic #193
## Dependency updates
- dep: Upgrade rivo/tview #176
- dep: Upgrade outdated deps to latest #177
- dep: Use Go 1.17 #178
**Full Changelog**: https://github.com/ankitpokhrel/jira-cli/compare/v0.1.1...v0.2.0
Changes since 0.1.1:
> This version has some breaking changes in the config file and, you will
need to regenerate the config for all features to work.
## Notable changes
- The tool is now compatible with next-gen/team-managed project.
- New filters when listing issues, viz:
- Filter by parent: This will allow you to list all sub-tasks of a task.
- Order by filter: This will allow you to display a list sorted by their
rank for example.
- You can now assign epic to the issue on creation.
- You can add issues to the sprint with `jira sprint add`
## What's added?
- feat: Allow to assign epic on create #194
- feat: Cmd to add issues to sprint #205
- feat: Allow to filter by parent #197
- feat: Add order-by filter #206
- feat: Add type on project listing #190
## What's fixed?
- fix: Make epic add work in next-gen project #195
- fix: Epic creation for next-gen project #192
- fix: Make epic remove work in next-gen project #196
- fix: Make epic list work for next-gen project #201
- fix: Segmentation fault on view #202
- fix(tui): Link/key copy is broken for altered key col #204
## Config changes
- cfg!: Expand config to include project type #191
- cfg!: Rename field to name and add link field to epic #193
## Dependency updates
- dep: Upgrade rivo/tview #176
- dep: Upgrade outdated deps to latest #177
- dep: Use Go 1.17 #178
**Full Changelog**: https://github.com/ankitpokhrel/jira-cli/compare/v0.1.1...v0.2.0
MAIN commitmail json YAML
doc: Added www/jira-cli version 0.1.1
MAIN commitmail json YAML
Added jira-cli to Makefile SUBDIRs.
MAIN commitmail json YAML
pkgsrc/www/jira-cli/DESCR@1.1
/
diff
pkgsrc/www/jira-cli/Makefile@1.1 / diff
pkgsrc/www/jira-cli/PLIST@1.1 / diff
pkgsrc/www/jira-cli/distinfo@1.1 / diff
pkgsrc/www/jira-cli/go-modules.mk@1.1 / diff
pkgsrc/www/jira-cli/Makefile@1.1 / diff
pkgsrc/www/jira-cli/PLIST@1.1 / diff
pkgsrc/www/jira-cli/distinfo@1.1 / diff
pkgsrc/www/jira-cli/go-modules.mk@1.1 / diff
Import of jira-cli v0.1.1 as www/jira-cli
JiraCLI is a command line tool for Jira created with an idea to avoid
the Jira UI as much as possible. It includes features like navigation,
issue creation, cloning, linking, ticket transition, and so on.
JiraCLI is a command line tool for Jira created with an idea to avoid
the Jira UI as much as possible. It includes features like navigation,
issue creation, cloning, linking, ticket transition, and so on.
MAIN commitmail json YAML
textproc/bat: Refactor the crates into it's own file.
MAIN commitmail json YAML
sysutils/exa: Refactor the crates into it's own file.
MAIN commitmail json YAML
doc: Updated security/wolfssl to 5.0.0
MAIN commitmail json YAML
pkgsrc/security/wolfssl/Makefile@1.9
/
diff
pkgsrc/security/wolfssl/PLIST@1.5 / diff
pkgsrc/security/wolfssl/distinfo@1.10 / diff
pkgsrc/security/wolfssl/patches/patch-configure deleted
pkgsrc/security/wolfssl/PLIST@1.5 / diff
pkgsrc/security/wolfssl/distinfo@1.10 / diff
pkgsrc/security/wolfssl/patches/patch-configure deleted
security/wolfssl: Update to v5.0.0
Changes since v4.8.1:
wolfSSL Release 5.0.0 (Nov 01, 2021)
Release 5.0.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities
* [\Low] Hang with DSA signature creation when a specific q value is used in a
maliciously crafted key. If a DSA key with an invalid q value of either 1 or
0 was decoded and used for creating a signature, it would result in a hang
in wolfSSL. Users that are creating signatures with DSA and are using keys
supplied from an outside source are affected.
* [\Low] Issue with incorrectly validating a certificate that has multiple
subject alternative names when given a name constraint. In the case where
more than one subject alternative name is used in the certificate, previous
versions of wolfSSL could incorrectly validate the certificate. Users
verifying certificates with multiple alternative names and name constraints,
are recommended to either use the certificate verify callback to check for
this case or update the version of wolfSSL used. Thanks to Luiz Angelo Daros
de Luca for the report.
New Feature Additions
New Product
* FIPS 140-3 -- currently undergoing laboratory testing, code review and
ultimately CMVP validation. Targeting the latest FIPS standard.
Ports
* IoT-Safe with TLS demo
* SE050 port with support for RNG, SHA, AES, ECC (sign/verify/shared secret)
and ED25519
* Support for Renesas TSIP v1.13 on RX72N
Post Quantum
* Support for OQS's (liboqs version 0.7.0) implementation of NIST Round 3 KEMs
as TLS 1.3 groups --with-liboqs
* Hybridizing NIST ECC groups with the OQS groups
* Remove legacy NTRU and QSH
* Make quantum-safe groups available to the compatibility layer
Linux Kernel Module
* Full support for FIPS 140-3, with in-kernel power on self test (POST) and
conditional algorithm self test(s) (CAST)
* --enable-linuxkm-pie -- position-independent in-kernel wolfCrypt container,
for FIPS
* Vectorized x86 acceleration in PK algs (RSA, ECC, DH, DSA) and AES/AES-GCM
* Vectorized x86 acceleration in interrupt handlers
* Support for Linux-native module signatures
* Complete SSL/TLS and Crypto API callable from other kernel module(s)
* Support for LTS kernel lines: 3.16, 4.4, 4.9, 5.4, 5.10
Compatibility Layer Additions
* Ports
* Add support for libssh2
* Add support for pyOpenSSL
* Add support for libimobiledevice
* Add support for rsyslog
* Add support for OpenSSH 8.5p1
* Add support for Python 3.8.5
* API/Structs Added
* ERR_lib_error_string
* EVP_blake2
* wolfSSL_set_client_CA_list
* wolfSSL_EVP_sha512_224
* wolfSSL_EVP_sha512_256
* wc_Sha512_224/2256Hash
* wc_Sha512_224/256Hash
* wc_InitSha512_224/256
* wc_InitSha512_224/256_ex
* wc_Sha512_224/256Update
* wc_Sha512_224/256FinalRaw
* wc_Sha512_224/256Final
* wc_Sha512_224/256Free
* wc_Sha512_224/256GetHash
* wc_Sha512_224/256Copy
* wc_Sha512_224/256SetFlags
* wc_Sha512_224/256GetFlags
* wc_Sha512_224/256Transform
* EVP_MD_do_all and OBJ_NAME_do_all
* EVP_shake128
* EVP_shake256
* SSL_CTX_set_num_tickets
* SSL_CTX_get_num_tickets
* SSL_CIPHER_get_auth_nid
* SSL_CIPHER_get_cipher_nid
* SSL_CIPHER_get_digest_nid
* SSL_CIPHER_get_kx_nid
* SSL_CIPHER_is_aead
* SSL_CTX_set_msg_callback
* a2i_IPADDRESS
* GENERAL_NAME_print
* X509_VERIFY_PARAM_set1_ip
* EVP_CIPHER_CTX_set_iv_length
* PEM_read_bio_RSA_PUBKEY
* i2t_ASN1_OBJECT
* DH_set_length
* Set_tlsext_max_fragment_length
* AUTHORITY_iNFO_ACCESS_free
* EVP_PBE_scrypt
* ASN1_R_HEADER_TOO_LONG
* ERR_LIB
* X509_get_default_cert_file/file_env/dir/dir_env() stubs
* SSL_get_read_ahead/SSL_set_read_ahead()
* SSL_SESSION_has_ticket()
* SSL_SESSION_get_ticket_lifetime_hint()
* DIST_POINT_new
* DIST_POINT_free
* DIST_POINTS_free
* CRL_DIST_POINTS_free
* sk_DIST_POINT_push
* sk_DIST_POINT_value
* sk_DIST_POINT_num
* sk_DIST_POINT_pop_free
* sk_DIST_POINT_free
* X509_get_extension_flags
* X509_get_key_usage
* X509_get_extended_key_usage
* ASN1_TIME_to_tm
* ASN1_TIME_diff
* PEM_read_X509_REQ
* ERR_load_ERR_strings
* BIO_ssl_shutdown
* BIO_get_ssl
* BIO_new_ssl_connect
* BIO_set_conn_hostname
* NID_pkcs9_contentType
Misc.
* KCAPI: add support for using libkcapi for crypto (Linux Kernel)
* Configure option for --with-max-rsa-bits= and --with-max-ecc-bits=
* SP ARM Thumb support for Keil and performance improvements
* Add support for WOLFSSL_VERIFY_POST_HANDSHAKE verify mode
* PKCS #11: support static linking with PKCS #11 library
--enable-pkcs11=static LIBS=-l
* Add build option --enable-wolfclu for use with wolfCLU product
* Add support for X9.42 header i.e 窶廝EGIN X9.42 DH PARAMETERS窶�
* Add --enable-altcertchains for configuring wolfSSL with alternate
certificate chains feature enabled
* Add public API wc_RsaKeyToPublicDer_ex to allow getting RSA public key
without ASN.1 header (can return only seq + n + e)
* Add SNI and TLSx options to CMake build
Fixes
PORT Fixes
* Add return value checking for FREESCALE_RNGA
* Fix MMCAU_SHA256 type warnings
* Fixes for building with Microchip XC32 and ATECC
Math Library Fixes
* TFM check that the modulus length is valid for fixed data array size
* TFM fp_submod_ct fix check for greater
* Check return value of mp_grow in mp_mod_2d
* Fix for ECC point multiply to error out on large multipliers
* SP ECC error on multiplier larger than curve order
TLS 1.3
* TLS1.3 sanity check for cases where a private key is larger than the configured maximum
* Fix early data max size handling in TLS v1.3
* Fixes for PK callbacks with TLS v1.3
* Check min downgrade when no extensions are sent with the ServerHello
Misc.
* Previously wolfSSL enum values were used as NID窶冱. Now only the
compatibility layer NID enums are the NID values:
* CTC_SHAwDSA -> NID_dsaWithSHA1
* CTC_SHA256wDSA -> NID_dsa_with_SHA256
* CTC_MD2wRSA -> NID_md2WithRSAEncryption
* CTC_MD5wRSA -> NID_md5WithRSAEncryption
* CTC_SHAwRSA -> NID_sha1WithRSAEncryption
* CTC_SHA224wRSA -> NID_sha224WithRSAEncryption
* CTC_SHA256wRSA -> NID_sha256WithRSAEncryption
* CTC_SHA384wRSA -> NID_sha384WithRSAEncryption
* CTC_SHA512wRSA -> NID_sha512WithRSAEncryption
* CTC_SHA3_224wRSA -> NID_RSA_SHA3_224
* CTC_SHA3_256wRSA -> NID_RSA_SHA3_256
* CTC_SHA3_384wRSA -> NID_RSA_SHA3_384
* CTC_SHA3_512wRSA -> NID_RSA_SHA3_512
* CTC_SHAwECDSA -> NID_ecdsa_with_SHA1
* CTC_SHA224wECDSA -> NID_ecdsa_with_SHA224
* CTC_SHA256wECDSA -> NID_ecdsa_with_SHA256
* CTC_SHA384wECDSA -> NID_ecdsa_with_SHA384
* CTC_SHA512wECDSA -> NID_ecdsa_with_SHA512
* CTC_SHA3_224wECDSA -> NID_ecdsa_with_SHA3_224
* CTC_SHA3_256wECDSA -> NID_ecdsa_with_SHA3_256
* CTC_SHA3_384wECDSA -> NID_ecdsa_with_SHA3_384
* CTC_SHA3_512wECDSA -> NID_ecdsa_with_SHA3_512
* DSAk -> NID_dsa
* RSAk -> NID_rsaEncryption
* ECDSAk -> NID_X9_62_id_ecPublicKey
* BASIC_CA_OID -> NID_basic_constraints
* ALT_NAMES_OID -> NID_subject_alt_name
* CRL_DIST_OID -> NID_crl_distribution_points
* AUTH_INFO_OID -> NID_info_access
* AUTH_KEY_OID -> NID_authority_key_identifier
* SUBJ_KEY_OID -> NID_subject_key_identifier
* INHIBIT_ANY_OID -> NID_inhibit_any_policy
* Fix for DES IV size used with FIPSv2
* Fix signed comparison issue with serialSz
* Fix missing CBIOSend and properly guard hmac in DupSSL()
* Fix calculation of length of encoding in ssl.c
* Fix encoding to check proper length in asn.c
* Fix for wc_ecc_ctx_free and heap hint
* Fix for debug messages with AF_ALG build
* Fix for static memory with bucket size matching.
* Fixes for SRP with heap hint.
* Fixes for CAAM build macros and spelling for Keil build
* Sniffer fix for possible math issue around 64-bit pointer and 32-bit unsigned int
* Fix for sniffer TCP sequence rollover
* wolfSSL_PEM_write_bio_PUBKEY to write only the public part
* Fix for sending only supported groups in TLS extension
* Fix for sniffer to better handle spurious retransmission edge case
* SSL_set_alpn_protos and SSL_CTX_set_alpn_protos now returns 0 on
successFixes issue with SSL_CTX_set1_curves_list and SSL_set1_curves_list
not checking the last character of the names variable provided, non-0 on
failure to better match expected return values
* Fixes and improvements for crypto callbacks with TLS (mutual auth)
* Fix for bad memory_mutex lock on static memory cleanup
* Zero terminate name constraints strings when parsing certificates
* Fix for verifying a certificate when multiple permitted name constraints are used
* Fix typo in ifdef for HAVE_ED448
* Fix typos in comments in SHA512
* Add sanity check on buffer size with ED25519 key decode
* Sanity check on PKCS7 stream amount read
* PKCS7 fix for double free on error case and sanity check on set serial number
* Sanity check on PKCS7 input size wc_PKCS7_ParseSignerInfo
* Forgive a DTLS session trying to send too much at once
Improvements/Optimizations
Build Options and Warnings
* Rework of RC4 disable by default and depreciation
* wolfSSL as a Zephyr module (without setup.sh)
* Add include config.h to bio.c
* Support for PKCS7 without AES CBC.
* Fixes for building without AES CBC
* Added WOLFSSL_DH_EXTRA to --enable-all and --enable-sniffer
* Add a CMake option to build wolfcrypt test and bench code as libraries
* GCC makefile: allow overriding and provide more flexibility
Math Libraries
* Improve performance of fp_submod_ct() and fp_addmod_ct()
* Improve performance of sp_submod_ct() and sp_addmod_ct()
* SP int, handle even modulus with exponentiation
Misc.
* Cleanups for Arduino examples and memory documentation
* Refactor hex char to byte conversions
* Added GCC-ARM TLS server example
* Improvements to session locking to allow per-row
* Improved sniffer statistics and documentation
* EVP key support for heap hint and crypto callbacks
* Reduced stack size for dh_generation_test and Curve ASN functions
* Espressif README Syntax / keyword highlighting / clarifications
* AARCH64 SHA512: implementation using crypto instructions added
* wc_RsaPSS_CheckPadding_ex2 added for use with HEAP hint
* wc_AesKeyWrap_ex and wc_AesKeyUnWrap_ex bound checks on input and output sizes
* Add additional error handling to wolfSSL_BIO_get_len
* Add code to use popen and the command 'host', useful with qemu
* Adjustment to subject alt names order with compatibility layer to better match expected order
* Reduce BIO compatibility layer verbosity
* Set a default upper bound on error queue size with compatibility layer
* WOLFSSL_CRL_ALLOW_MISSING_CDP macro for Skip CRL verification in case no CDP in peer cert
* Fixes for scan-build LLVM-13 and expanded coverage
* Increase the default DTLS_MTU_ADDITIONAL_READ_BUFFER and make it adjustable
Changes since v4.8.1:
wolfSSL Release 5.0.0 (Nov 01, 2021)
Release 5.0.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities
* [\Low] Hang with DSA signature creation when a specific q value is used in a
maliciously crafted key. If a DSA key with an invalid q value of either 1 or
0 was decoded and used for creating a signature, it would result in a hang
in wolfSSL. Users that are creating signatures with DSA and are using keys
supplied from an outside source are affected.
* [\Low] Issue with incorrectly validating a certificate that has multiple
subject alternative names when given a name constraint. In the case where
more than one subject alternative name is used in the certificate, previous
versions of wolfSSL could incorrectly validate the certificate. Users
verifying certificates with multiple alternative names and name constraints,
are recommended to either use the certificate verify callback to check for
this case or update the version of wolfSSL used. Thanks to Luiz Angelo Daros
de Luca for the report.
New Feature Additions
New Product
* FIPS 140-3 -- currently undergoing laboratory testing, code review and
ultimately CMVP validation. Targeting the latest FIPS standard.
Ports
* IoT-Safe with TLS demo
* SE050 port with support for RNG, SHA, AES, ECC (sign/verify/shared secret)
and ED25519
* Support for Renesas TSIP v1.13 on RX72N
Post Quantum
* Support for OQS's (liboqs version 0.7.0) implementation of NIST Round 3 KEMs
as TLS 1.3 groups --with-liboqs
* Hybridizing NIST ECC groups with the OQS groups
* Remove legacy NTRU and QSH
* Make quantum-safe groups available to the compatibility layer
Linux Kernel Module
* Full support for FIPS 140-3, with in-kernel power on self test (POST) and
conditional algorithm self test(s) (CAST)
* --enable-linuxkm-pie -- position-independent in-kernel wolfCrypt container,
for FIPS
* Vectorized x86 acceleration in PK algs (RSA, ECC, DH, DSA) and AES/AES-GCM
* Vectorized x86 acceleration in interrupt handlers
* Support for Linux-native module signatures
* Complete SSL/TLS and Crypto API callable from other kernel module(s)
* Support for LTS kernel lines: 3.16, 4.4, 4.9, 5.4, 5.10
Compatibility Layer Additions
* Ports
* Add support for libssh2
* Add support for pyOpenSSL
* Add support for libimobiledevice
* Add support for rsyslog
* Add support for OpenSSH 8.5p1
* Add support for Python 3.8.5
* API/Structs Added
* ERR_lib_error_string
* EVP_blake2
* wolfSSL_set_client_CA_list
* wolfSSL_EVP_sha512_224
* wolfSSL_EVP_sha512_256
* wc_Sha512_224/2256Hash
* wc_Sha512_224/256Hash
* wc_InitSha512_224/256
* wc_InitSha512_224/256_ex
* wc_Sha512_224/256Update
* wc_Sha512_224/256FinalRaw
* wc_Sha512_224/256Final
* wc_Sha512_224/256Free
* wc_Sha512_224/256GetHash
* wc_Sha512_224/256Copy
* wc_Sha512_224/256SetFlags
* wc_Sha512_224/256GetFlags
* wc_Sha512_224/256Transform
* EVP_MD_do_all and OBJ_NAME_do_all
* EVP_shake128
* EVP_shake256
* SSL_CTX_set_num_tickets
* SSL_CTX_get_num_tickets
* SSL_CIPHER_get_auth_nid
* SSL_CIPHER_get_cipher_nid
* SSL_CIPHER_get_digest_nid
* SSL_CIPHER_get_kx_nid
* SSL_CIPHER_is_aead
* SSL_CTX_set_msg_callback
* a2i_IPADDRESS
* GENERAL_NAME_print
* X509_VERIFY_PARAM_set1_ip
* EVP_CIPHER_CTX_set_iv_length
* PEM_read_bio_RSA_PUBKEY
* i2t_ASN1_OBJECT
* DH_set_length
* Set_tlsext_max_fragment_length
* AUTHORITY_iNFO_ACCESS_free
* EVP_PBE_scrypt
* ASN1_R_HEADER_TOO_LONG
* ERR_LIB
* X509_get_default_cert_file/file_env/dir/dir_env() stubs
* SSL_get_read_ahead/SSL_set_read_ahead()
* SSL_SESSION_has_ticket()
* SSL_SESSION_get_ticket_lifetime_hint()
* DIST_POINT_new
* DIST_POINT_free
* DIST_POINTS_free
* CRL_DIST_POINTS_free
* sk_DIST_POINT_push
* sk_DIST_POINT_value
* sk_DIST_POINT_num
* sk_DIST_POINT_pop_free
* sk_DIST_POINT_free
* X509_get_extension_flags
* X509_get_key_usage
* X509_get_extended_key_usage
* ASN1_TIME_to_tm
* ASN1_TIME_diff
* PEM_read_X509_REQ
* ERR_load_ERR_strings
* BIO_ssl_shutdown
* BIO_get_ssl
* BIO_new_ssl_connect
* BIO_set_conn_hostname
* NID_pkcs9_contentType
Misc.
* KCAPI: add support for using libkcapi for crypto (Linux Kernel)
* Configure option for --with-max-rsa-bits= and --with-max-ecc-bits=
* SP ARM Thumb support for Keil and performance improvements
* Add support for WOLFSSL_VERIFY_POST_HANDSHAKE verify mode
* PKCS #11: support static linking with PKCS #11 library
--enable-pkcs11=static LIBS=-l
* Add build option --enable-wolfclu for use with wolfCLU product
* Add support for X9.42 header i.e 窶廝EGIN X9.42 DH PARAMETERS窶�
* Add --enable-altcertchains for configuring wolfSSL with alternate
certificate chains feature enabled
* Add public API wc_RsaKeyToPublicDer_ex to allow getting RSA public key
without ASN.1 header (can return only seq + n + e)
* Add SNI and TLSx options to CMake build
Fixes
PORT Fixes
* Add return value checking for FREESCALE_RNGA
* Fix MMCAU_SHA256 type warnings
* Fixes for building with Microchip XC32 and ATECC
Math Library Fixes
* TFM check that the modulus length is valid for fixed data array size
* TFM fp_submod_ct fix check for greater
* Check return value of mp_grow in mp_mod_2d
* Fix for ECC point multiply to error out on large multipliers
* SP ECC error on multiplier larger than curve order
TLS 1.3
* TLS1.3 sanity check for cases where a private key is larger than the configured maximum
* Fix early data max size handling in TLS v1.3
* Fixes for PK callbacks with TLS v1.3
* Check min downgrade when no extensions are sent with the ServerHello
Misc.
* Previously wolfSSL enum values were used as NID窶冱. Now only the
compatibility layer NID enums are the NID values:
* CTC_SHAwDSA -> NID_dsaWithSHA1
* CTC_SHA256wDSA -> NID_dsa_with_SHA256
* CTC_MD2wRSA -> NID_md2WithRSAEncryption
* CTC_MD5wRSA -> NID_md5WithRSAEncryption
* CTC_SHAwRSA -> NID_sha1WithRSAEncryption
* CTC_SHA224wRSA -> NID_sha224WithRSAEncryption
* CTC_SHA256wRSA -> NID_sha256WithRSAEncryption
* CTC_SHA384wRSA -> NID_sha384WithRSAEncryption
* CTC_SHA512wRSA -> NID_sha512WithRSAEncryption
* CTC_SHA3_224wRSA -> NID_RSA_SHA3_224
* CTC_SHA3_256wRSA -> NID_RSA_SHA3_256
* CTC_SHA3_384wRSA -> NID_RSA_SHA3_384
* CTC_SHA3_512wRSA -> NID_RSA_SHA3_512
* CTC_SHAwECDSA -> NID_ecdsa_with_SHA1
* CTC_SHA224wECDSA -> NID_ecdsa_with_SHA224
* CTC_SHA256wECDSA -> NID_ecdsa_with_SHA256
* CTC_SHA384wECDSA -> NID_ecdsa_with_SHA384
* CTC_SHA512wECDSA -> NID_ecdsa_with_SHA512
* CTC_SHA3_224wECDSA -> NID_ecdsa_with_SHA3_224
* CTC_SHA3_256wECDSA -> NID_ecdsa_with_SHA3_256
* CTC_SHA3_384wECDSA -> NID_ecdsa_with_SHA3_384
* CTC_SHA3_512wECDSA -> NID_ecdsa_with_SHA3_512
* DSAk -> NID_dsa
* RSAk -> NID_rsaEncryption
* ECDSAk -> NID_X9_62_id_ecPublicKey
* BASIC_CA_OID -> NID_basic_constraints
* ALT_NAMES_OID -> NID_subject_alt_name
* CRL_DIST_OID -> NID_crl_distribution_points
* AUTH_INFO_OID -> NID_info_access
* AUTH_KEY_OID -> NID_authority_key_identifier
* SUBJ_KEY_OID -> NID_subject_key_identifier
* INHIBIT_ANY_OID -> NID_inhibit_any_policy
* Fix for DES IV size used with FIPSv2
* Fix signed comparison issue with serialSz
* Fix missing CBIOSend and properly guard hmac in DupSSL()
* Fix calculation of length of encoding in ssl.c
* Fix encoding to check proper length in asn.c
* Fix for wc_ecc_ctx_free and heap hint
* Fix for debug messages with AF_ALG build
* Fix for static memory with bucket size matching.
* Fixes for SRP with heap hint.
* Fixes for CAAM build macros and spelling for Keil build
* Sniffer fix for possible math issue around 64-bit pointer and 32-bit unsigned int
* Fix for sniffer TCP sequence rollover
* wolfSSL_PEM_write_bio_PUBKEY to write only the public part
* Fix for sending only supported groups in TLS extension
* Fix for sniffer to better handle spurious retransmission edge case
* SSL_set_alpn_protos and SSL_CTX_set_alpn_protos now returns 0 on
successFixes issue with SSL_CTX_set1_curves_list and SSL_set1_curves_list
not checking the last character of the names variable provided, non-0 on
failure to better match expected return values
* Fixes and improvements for crypto callbacks with TLS (mutual auth)
* Fix for bad memory_mutex lock on static memory cleanup
* Zero terminate name constraints strings when parsing certificates
* Fix for verifying a certificate when multiple permitted name constraints are used
* Fix typo in ifdef for HAVE_ED448
* Fix typos in comments in SHA512
* Add sanity check on buffer size with ED25519 key decode
* Sanity check on PKCS7 stream amount read
* PKCS7 fix for double free on error case and sanity check on set serial number
* Sanity check on PKCS7 input size wc_PKCS7_ParseSignerInfo
* Forgive a DTLS session trying to send too much at once
Improvements/Optimizations
Build Options and Warnings
* Rework of RC4 disable by default and depreciation
* wolfSSL as a Zephyr module (without setup.sh)
* Add include config.h to bio.c
* Support for PKCS7 without AES CBC.
* Fixes for building without AES CBC
* Added WOLFSSL_DH_EXTRA to --enable-all and --enable-sniffer
* Add a CMake option to build wolfcrypt test and bench code as libraries
* GCC makefile: allow overriding and provide more flexibility
Math Libraries
* Improve performance of fp_submod_ct() and fp_addmod_ct()
* Improve performance of sp_submod_ct() and sp_addmod_ct()
* SP int, handle even modulus with exponentiation
Misc.
* Cleanups for Arduino examples and memory documentation
* Refactor hex char to byte conversions
* Added GCC-ARM TLS server example
* Improvements to session locking to allow per-row
* Improved sniffer statistics and documentation
* EVP key support for heap hint and crypto callbacks
* Reduced stack size for dh_generation_test and Curve ASN functions
* Espressif README Syntax / keyword highlighting / clarifications
* AARCH64 SHA512: implementation using crypto instructions added
* wc_RsaPSS_CheckPadding_ex2 added for use with HEAP hint
* wc_AesKeyWrap_ex and wc_AesKeyUnWrap_ex bound checks on input and output sizes
* Add additional error handling to wolfSSL_BIO_get_len
* Add code to use popen and the command 'host', useful with qemu
* Adjustment to subject alt names order with compatibility layer to better match expected order
* Reduce BIO compatibility layer verbosity
* Set a default upper bound on error queue size with compatibility layer
* WOLFSSL_CRL_ALLOW_MISSING_CDP macro for Skip CRL verification in case no CDP in peer cert
* Fixes for scan-build LLVM-13 and expanded coverage
* Increase the default DTLS_MTU_ADDITIONAL_READ_BUFFER and make it adjustable
MAIN commitmail json YAML
doc: Updated sysutils/htop to 3.1.0
MAIN commitmail json YAML
pkgsrc/sysutils/htop/Makefile@1.22
/
diff
pkgsrc/sysutils/htop/distinfo@1.14 / diff
pkgsrc/sysutils/htop/patches/patch-MainPanel.c@1.1 / diff
pkgsrc/sysutils/htop/patches/patch-configure.ac deleted
pkgsrc/sysutils/htop/patches/patch-linux_LinuxProcess.c deleted
pkgsrc/sysutils/htop/patches/patch-linux_Platform.c deleted
pkgsrc/sysutils/htop/patches/patch-linux_SELinuxMeter.c deleted
pkgsrc/sysutils/htop/distinfo@1.14 / diff
pkgsrc/sysutils/htop/patches/patch-MainPanel.c@1.1 / diff
pkgsrc/sysutils/htop/patches/patch-configure.ac deleted
pkgsrc/sysutils/htop/patches/patch-linux_LinuxProcess.c deleted
pkgsrc/sysutils/htop/patches/patch-linux_Platform.c deleted
pkgsrc/sysutils/htop/patches/patch-linux_SELinuxMeter.c deleted
sysutils/htop: Updates to 3.1.0
- Removes the linux patches, since htop has native NetBSD support.
Changes since 3.0.5:
What's new in version 3.1.0
* Updated COPYING file to remove the PLPA exemption (appendix 2)
With this change the license is now GPLv2 without any additional wording.
* Improved default sort ordering
Note for users: This may lead to an inverted sort order on startup of
htop 3.1.0 compared to previous versions.
This is due to what is stored in your htoprc file. Solution: Press I
(to invert sort order).
This changed setting will be saved by htop on exit as long as it can
write to your htoprc file.
* The compile-time option to cater specifically for running htop as
setuid has been removed
* Add read-only option
This allows htop to be run in an non-intrusive fashion where it acts only
as a process viewer disabling all functions to manipulate system state.
Note: This is not a security feature!
* Move the code for handling the command line formatting related tasks
to be shared across all platforms
This means important features like stale binary/library highlighting
can now be available on all supported platforms.
* Make the EXE and COMM columns available on all platforms
All supported platforms have the name of the executable (EXE) and a
self-chosen thread/command name (COMM) available one way or the other.
Moving this column to be handled as a platform-independently available
information simplifies the markup of the command line.
* Introduce configuration file versioning and config_reader_min_version
Starting with this version the configuration file contains a version
identifying the minimum version of the configuration parser needed to
fully understand the configuration file format.
Old configuration file formats are automatically upgraded when
saving the config file (htoprc).
* Make the configuration parser friendlier to users (thanks to Bart Bakker)
With this change only settings that cannot be parsed properly are
reset to their defaults.
* Improve default display for systems with many CPUs
* Add the process ELAPSED time column
* Improve the process STATE column sorting
* Reworked handling resize and redrawing of the UI
* Fixed an issue where the LED meter mode could overflow allotted space
* Allow text mode Meters to span empty neighbors to the right
* Rescale graph meters when value of total changes
(thanks to Michael Schönitzer)
* Update generic process field display
Usually "uninteresting" values in columns like 1 thread, nice value
of 0, CPU and memory of 0%, idle/sleeping state, etc. are shown with
reduced intensity (dark grey)
* Option and key ("*") to collapse / expand all branches under PID 1
(and PID 2 if kernel threads are shown) (thanks to Krishna Chaitanya)
* Keep following a process when inverting the sort order, displaying
the help screen or hiding/unhiding userland threads.
If a thread is currently selected the selection is updated to point
to the thread's parent process. (thanks to Gonzalo, et.al.)
* Reorder process scanning to be performed before updating the display
of the meters in the header
* Always check the user for a process for any changes.
This affects multiple platforms that previously didn't correctly handle
the user field for a process to change at runtime (e.g. due to seteuid
or similar syscalls).
* Disable mouse option when support is unavailable
* Support curses libraries without ncurses mouse support
(thanks to Santhosh Raju)
* Support offline and hot-swapping of CPUs on all platforms
* Fix the CPU Meter for machines with more than 256 CPUs
* Supplemented the "show updated/deleted executables" feature (red basename)
to indicate when linked libraries were updated (yellow basename)
* Apply the stale binary highlighting for the EXE column in addition to
the command line field
* Add new combined Memory and Swap meter
* Implement bar and graph mode for NetworkIO Meter
(thanks to Michael F. Schönitzer)
* Rework TTY column to be more consistent across platforms
* Make the CWD column generally available on all platforms
(thanks to Santhosh Raju et. al.)
* Add Performance Co-Pilot (PCP) platform support
This is added via a separate pcp-htop(1) binary which provides remote host
analysis, new Meters for any PCP metric and new Columns for any PCP process
metric - see the pcp-htop(5) man page for further details.
(thanks to Sohaib Mohamed)
* Add Linux columns and key bindings for process autogroup identifier
and nice value
* Change available and used memory reporting on Linux to be based on
MemAvailable (Kernel 3.14+) (thanks to Chris Cheney and Tomas Wido)
* Add a new SysArchMeter showing kernel and platform information
(thanks to ahgamut)
* Linux memory usage explicitly treats tmpfs memory usage as shared memory
This is to make memory used by tmpfs visible as this cannot be freed
unlike normal filesystem cache data.
* Exclude zram devices when calculating DiskIO on Linux
* Use PATH lookup for systemctl in systemd meter (thanks to Scott Olson)
* Add native platform support for NetBSD
This allows htop to run on NetBSD without the need for active Linux
emulation of the procfs filesystem.
(thanks to Santhosh Raju and Nia Alarie)
* Add NetworkIO, DiskIO, CPU frequency, and battery meter support on NetBSD
(thanks to Nia Alarie)
* Fix NetBSD display of in-use and cached memory (thanks to Nia Alarie)
* Rework NetBSD CPU and memory accounting (thanks to Santhosh Raju)
* Fix NetBSD accounting of user and kernel threads (thanks to Santhosh Raju)
* Initial work to allow building with default libcurses on NetBSD
(thanks to Santhosh Raju)
* FreeBSD updates - implement process majflt and processor column values
* Add FreeBSD support for CPU frequency and temperature
* Fixes and cleanups for ZFS Meters and metrics
* Correctly color the ZFS ARC ratio (thanks to Ross Williams)
* Bugfixes related to CPU time display/calculations for darwin on M1 systems
(thanks to Alexander Momchilov)
* Harmonize the handling of multiple batteries across different platforms.
The system is now considered to run on AC if at least one power supply
marked as AC is found in the system.
Battery capacity is summed up over all batteries found.
This also changes the old behavior that batteries reported by the
system after the first AC adapter where sometimes ignored.
* Correctly handle multiple batteries on Darwin.
Resolves a possible memory leak on systems with multiple batteries.
* Handle Linux Shmem being part of Cached in the MemoryMeter
* Add SwapCached to the Linux swap meter (thanks to David Zarzycki)
* Convert process time to days if applicable (thanks to David Zarzycki)
* Always show the number of threads in the TaskMeter, even when threads
are not shown in the process list
* Fix Linux --drop-capabilities option handling
* Correctly detect failure to initialize Linux boottime
* Overhaul the Linux memory fields to partition them like free(1) now does
* Improve the Linux process I/O column values
* Rework the libsensors parsing on Linux
* Update the MemoryMeter to display shared memory
* Update OpenBSD platform - implement additional columns, scan LWP,
proper markup for STATE, show CPU frequency
* Fix the tree view on OpenBSD when hiding kernel threads
* Remove old InfoScreen lines before re-scanning (thanks to Øystein Hiåsen)
* Document historic naming of Light-Weight Processes column aka threads
* Improve user interaction when the last process entry is selected
* Draw the panel header on the TraceScreen (thanks to Youngjae Lee)
* Add mouse wheel scroll and fix mouse selection on the InfoScreen
(thanks to Youngjae Lee)
* Add a HugepageMeter and subtract hugepages from normal memory
* Display wide characters in LED meters and restore non-wide ncurses support
* Add command line option to drop Linux capabilities
* Support scheduler affinity on platforms beyond Linux
* Report on any failure to write the configuration file
* Cache stderr to be able to print assert messages.
These messages are shown in case htop terminates unexpectedly.
* Print current settings on crash
* Reset signal handlers on program exit
* Add configure script option to create a static htop binary
* Resolved longer-standing compilation issues on Solaris/Illumos
* Check for availability of set_escdelay in configure
(thanks to Stefan Polluks)
* Build system updates for autotools 2.70
- Removes the linux patches, since htop has native NetBSD support.
Changes since 3.0.5:
What's new in version 3.1.0
* Updated COPYING file to remove the PLPA exemption (appendix 2)
With this change the license is now GPLv2 without any additional wording.
* Improved default sort ordering
Note for users: This may lead to an inverted sort order on startup of
htop 3.1.0 compared to previous versions.
This is due to what is stored in your htoprc file. Solution: Press I
(to invert sort order).
This changed setting will be saved by htop on exit as long as it can
write to your htoprc file.
* The compile-time option to cater specifically for running htop as
setuid has been removed
* Add read-only option
This allows htop to be run in an non-intrusive fashion where it acts only
as a process viewer disabling all functions to manipulate system state.
Note: This is not a security feature!
* Move the code for handling the command line formatting related tasks
to be shared across all platforms
This means important features like stale binary/library highlighting
can now be available on all supported platforms.
* Make the EXE and COMM columns available on all platforms
All supported platforms have the name of the executable (EXE) and a
self-chosen thread/command name (COMM) available one way or the other.
Moving this column to be handled as a platform-independently available
information simplifies the markup of the command line.
* Introduce configuration file versioning and config_reader_min_version
Starting with this version the configuration file contains a version
identifying the minimum version of the configuration parser needed to
fully understand the configuration file format.
Old configuration file formats are automatically upgraded when
saving the config file (htoprc).
* Make the configuration parser friendlier to users (thanks to Bart Bakker)
With this change only settings that cannot be parsed properly are
reset to their defaults.
* Improve default display for systems with many CPUs
* Add the process ELAPSED time column
* Improve the process STATE column sorting
* Reworked handling resize and redrawing of the UI
* Fixed an issue where the LED meter mode could overflow allotted space
* Allow text mode Meters to span empty neighbors to the right
* Rescale graph meters when value of total changes
(thanks to Michael Schönitzer)
* Update generic process field display
Usually "uninteresting" values in columns like 1 thread, nice value
of 0, CPU and memory of 0%, idle/sleeping state, etc. are shown with
reduced intensity (dark grey)
* Option and key ("*") to collapse / expand all branches under PID 1
(and PID 2 if kernel threads are shown) (thanks to Krishna Chaitanya)
* Keep following a process when inverting the sort order, displaying
the help screen or hiding/unhiding userland threads.
If a thread is currently selected the selection is updated to point
to the thread's parent process. (thanks to Gonzalo, et.al.)
* Reorder process scanning to be performed before updating the display
of the meters in the header
* Always check the user for a process for any changes.
This affects multiple platforms that previously didn't correctly handle
the user field for a process to change at runtime (e.g. due to seteuid
or similar syscalls).
* Disable mouse option when support is unavailable
* Support curses libraries without ncurses mouse support
(thanks to Santhosh Raju)
* Support offline and hot-swapping of CPUs on all platforms
* Fix the CPU Meter for machines with more than 256 CPUs
* Supplemented the "show updated/deleted executables" feature (red basename)
to indicate when linked libraries were updated (yellow basename)
* Apply the stale binary highlighting for the EXE column in addition to
the command line field
* Add new combined Memory and Swap meter
* Implement bar and graph mode for NetworkIO Meter
(thanks to Michael F. Schönitzer)
* Rework TTY column to be more consistent across platforms
* Make the CWD column generally available on all platforms
(thanks to Santhosh Raju et. al.)
* Add Performance Co-Pilot (PCP) platform support
This is added via a separate pcp-htop(1) binary which provides remote host
analysis, new Meters for any PCP metric and new Columns for any PCP process
metric - see the pcp-htop(5) man page for further details.
(thanks to Sohaib Mohamed)
* Add Linux columns and key bindings for process autogroup identifier
and nice value
* Change available and used memory reporting on Linux to be based on
MemAvailable (Kernel 3.14+) (thanks to Chris Cheney and Tomas Wido)
* Add a new SysArchMeter showing kernel and platform information
(thanks to ahgamut)
* Linux memory usage explicitly treats tmpfs memory usage as shared memory
This is to make memory used by tmpfs visible as this cannot be freed
unlike normal filesystem cache data.
* Exclude zram devices when calculating DiskIO on Linux
* Use PATH lookup for systemctl in systemd meter (thanks to Scott Olson)
* Add native platform support for NetBSD
This allows htop to run on NetBSD without the need for active Linux
emulation of the procfs filesystem.
(thanks to Santhosh Raju and Nia Alarie)
* Add NetworkIO, DiskIO, CPU frequency, and battery meter support on NetBSD
(thanks to Nia Alarie)
* Fix NetBSD display of in-use and cached memory (thanks to Nia Alarie)
* Rework NetBSD CPU and memory accounting (thanks to Santhosh Raju)
* Fix NetBSD accounting of user and kernel threads (thanks to Santhosh Raju)
* Initial work to allow building with default libcurses on NetBSD
(thanks to Santhosh Raju)
* FreeBSD updates - implement process majflt and processor column values
* Add FreeBSD support for CPU frequency and temperature
* Fixes and cleanups for ZFS Meters and metrics
* Correctly color the ZFS ARC ratio (thanks to Ross Williams)
* Bugfixes related to CPU time display/calculations for darwin on M1 systems
(thanks to Alexander Momchilov)
* Harmonize the handling of multiple batteries across different platforms.
The system is now considered to run on AC if at least one power supply
marked as AC is found in the system.
Battery capacity is summed up over all batteries found.
This also changes the old behavior that batteries reported by the
system after the first AC adapter where sometimes ignored.
* Correctly handle multiple batteries on Darwin.
Resolves a possible memory leak on systems with multiple batteries.
* Handle Linux Shmem being part of Cached in the MemoryMeter
* Add SwapCached to the Linux swap meter (thanks to David Zarzycki)
* Convert process time to days if applicable (thanks to David Zarzycki)
* Always show the number of threads in the TaskMeter, even when threads
are not shown in the process list
* Fix Linux --drop-capabilities option handling
* Correctly detect failure to initialize Linux boottime
* Overhaul the Linux memory fields to partition them like free(1) now does
* Improve the Linux process I/O column values
* Rework the libsensors parsing on Linux
* Update the MemoryMeter to display shared memory
* Update OpenBSD platform - implement additional columns, scan LWP,
proper markup for STATE, show CPU frequency
* Fix the tree view on OpenBSD when hiding kernel threads
* Remove old InfoScreen lines before re-scanning (thanks to Øystein Hiåsen)
* Document historic naming of Light-Weight Processes column aka threads
* Improve user interaction when the last process entry is selected
* Draw the panel header on the TraceScreen (thanks to Youngjae Lee)
* Add mouse wheel scroll and fix mouse selection on the InfoScreen
(thanks to Youngjae Lee)
* Add a HugepageMeter and subtract hugepages from normal memory
* Display wide characters in LED meters and restore non-wide ncurses support
* Add command line option to drop Linux capabilities
* Support scheduler affinity on platforms beyond Linux
* Report on any failure to write the configuration file
* Cache stderr to be able to print assert messages.
These messages are shown in case htop terminates unexpectedly.
* Print current settings on crash
* Reset signal handlers on program exit
* Add configure script option to create a static htop binary
* Resolved longer-standing compilation issues on Solaris/Illumos
* Check for availability of set_escdelay in configure
(thanks to Stefan Polluks)
* Build system updates for autotools 2.70
MAIN commitmail json YAML
doc: Updated textproc/bat to 0.18.3
MAIN commitmail json YAML
textproc/bat: Updates to 0.18.3
Changes since 0.18.2:
v0.18.3
Bugfixes
* Bump git2 dependency to fix build with Rust 1.54, see #1761
Changes since 0.18.2:
v0.18.3
Bugfixes
* Bump git2 dependency to fix build with Rust 1.54, see #1761
MAIN commitmail json YAML
doc: Updated sysutils/py-Glances to 3.2.3.1
MAIN commitmail json YAML
sysutils/py-Glances: Update to 3.2.3.1
Changes since 3.2.3:
===============
Version 3.2.3.1
===============
Patch to correct issue (regression) #1922:
* Incorrect processes disk IO stats #1922
* DSM 6 docker error crash /sys/class/power_supply #1921
Changes since 3.2.3:
===============
Version 3.2.3.1
===============
Patch to correct issue (regression) #1922:
* Incorrect processes disk IO stats #1922
* DSM 6 docker error crash /sys/class/power_supply #1921
MAIN commitmail json YAML
doc: Updated audio/din to 51.1.1