From owner-svn-ports-all@freebsd.org Tue Apr 2 06:57:20 2019 Return-Path: Delivered-To: svn-ports-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 0E5E8155A256; Tue, 2 Apr 2019 06:57:20 +0000 (UTC) (envelope-from eugen@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 9F29276B72; Tue, 2 Apr 2019 06:57:19 +0000 (UTC) (envelope-from eugen@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 7B40A226DB; Tue, 2 Apr 2019 06:57:19 +0000 (UTC) (envelope-from eugen@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x326vJoP069662; Tue, 2 Apr 2019 06:57:19 GMT (envelope-from eugen@FreeBSD.org) Received: (from eugen@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x326vJvS069660; Tue, 2 Apr 2019 06:57:19 GMT (envelope-from eugen@FreeBSD.org) Message-Id: <201904020657.x326vJvS069660@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: eugen set sender to eugen@FreeBSD.org using -f From: Eugene Grosbein Date: Tue, 2 Apr 2019 06:57:19 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r497549 - head/java/bouncycastle15 X-SVN-Group: ports-head X-SVN-Commit-Author: eugen X-SVN-Commit-Paths: head/java/bouncycastle15 X-SVN-Commit-Revision: 497549 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 9F29276B72 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.95 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_SHORT(-0.95)[-0.951,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 02 Apr 2019 06:57:20 -0000 Author: eugen Date: Tue Apr 2 06:57:18 2019 New Revision: 497549 URL: https://svnweb.freebsd.org/changeset/ports/497549 Log: java/bouncycastle15: update to version 1.61 This release adds support for the qTESLA signature alogirithm and the password hashing algorithm Argon2. Support for endpoint ID validation has been added to the BCJSSE, and the TLS/BCJSEE API's journey to TLS 1.3 has continued. Support has been added to the provider for the Ed25519 and Ed448 signature algorithms and provider support has also been added for X25519 and X448. A new API for directly parsing and creating S/MIME documents has been added to the PKIX APIs. In terms of bug fixes, the TLS api will now tolerate unrecognized hash algorithms and SNI types. An issue that meant XMSS/XMSS^MT private keys would sometime reload incorrectly has been fixed. RFC3211WrapEngine will now properly handle messages longer than 127 bytes, and an endianness issue for encoding parameters longer than 255 bytes for CSHAKE has been fixed, some CMP parsing issues have been found and dealt with, the co-factors for id-tc26-gost-3410-12-256-paramSetA and id-tc26-gost-3410-12-512-paramSetC have been corrected and more work has been done on EC key encoding to make sure named curve parameters are preserved where possible. BCFKS key stores can now be signature protected rather than passord protected. See also https://www.bouncycastle.org/releasenotes.html Also, the port now installs version of bcprov.jar built from sources removing code since older java/bouncycastle port that installs bcprov.jar bundled with distfile. Modified: head/java/bouncycastle15/Makefile head/java/bouncycastle15/distinfo Modified: head/java/bouncycastle15/Makefile ============================================================================== --- head/java/bouncycastle15/Makefile Tue Apr 2 06:09:10 2019 (r497548) +++ head/java/bouncycastle15/Makefile Tue Apr 2 06:57:18 2019 (r497549) @@ -2,8 +2,7 @@ # $FreeBSD$ PORTNAME= bouncycastle -PORTVERSION= 1.60 -PORTREVISION= 1 +PORTVERSION= 1.61 CATEGORIES= java security MASTER_SITES= http://www.bouncycastle.org/download/ \ http://polydistortion.net/bc/download/ @@ -56,8 +55,6 @@ do-install: ${INSTALL_DATA} ${WRKSRC}/build/artifacts/jdk${JDKMVERSION}/jars/${jar}-jdk${JDKNVERSION}on-${DVERSION}.jar \ ${STAGEDIR}${JAVAJARDIR}/${jar}.jar .endfor - ${INSTALL_DATA} ${WRKSRC}/jars/bcprov-jdk${JDKNVERSION}on-${DVERSION}.jar \ - ${STAGEDIR}${JAVAJARDIR}/bcprov.jar .if ${PORT_OPTIONS:MZIPSRC} @${MKDIR} ${STAGEDIR}${DATADIR} .for jar in ${JARS_SRC} Modified: head/java/bouncycastle15/distinfo ============================================================================== --- head/java/bouncycastle15/distinfo Tue Apr 2 06:09:10 2019 (r497548) +++ head/java/bouncycastle15/distinfo Tue Apr 2 06:57:18 2019 (r497549) @@ -1,3 +1,3 @@ -TIMESTAMP = 1531664561 -SHA256 (crypto-160.tar.gz) = 52cdc6faf6fdf665592edceb780ec0f55a3fa4f0b74fe7b8ef3a363ba80847d1 -SIZE (crypto-160.tar.gz) = 140380969 +TIMESTAMP = 1554174153 +SHA256 (crypto-161.tar.gz) = e429d7ec67da1709c82e36dc5214ea45875457db94329eca638a576f931e3e22 +SIZE (crypto-161.tar.gz) = 136435919