Date: Fri, 23 Dec 2016 08:10:17 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 215507] [MAINTAINER] java/bouncycastle15: Update to 1.56 Message-ID: <bug-215507-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D215507 Bug ID: 215507 Summary: [MAINTAINER] java/bouncycastle15: Update to 1.56 Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: ports@grosbein.net Created attachment 178214 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D178214&action= =3Dedit Update to 1.56 Port changes: - upstream updated list of its MASTER_SITES (bouncycastle.gva.es is gone, downloads.bouncycastle.org changed to www.bouncycastle.org); - pkg-descr updated to reflect current features; - installation of zipped bundled sources made optional, enabled by default = to match previous behavior. Some of new version changes: - a new API for DTLS/TLS and a JSSE provider suitable for Java 5 and later; - support for RFC 7539 ChaCha20 and Poly1305 has also been added and general support for SHA-3 in the PKIX APIs has been improved; - CVE-2016-1000338, CVE-2016-1000339, CVE-2016-1000340, CVE-2016-1000341, CVE-2016-1000342, CVE-2016-1000343, CVE-2016-1000344, CVE-2016-1000345, CVE-2016-1000346, CVE-2016-1000352. Full details of the release: https://www.bouncycastle.org/releasenotes.html --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-215507-13>