Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 23 Dec 2016 08:10:17 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 215507] [MAINTAINER] java/bouncycastle15: Update to 1.56
Message-ID:  <bug-215507-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D215507

            Bug ID: 215507
           Summary: [MAINTAINER] java/bouncycastle15: Update to 1.56
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: freebsd-ports-bugs@FreeBSD.org
          Reporter: ports@grosbein.net

Created attachment 178214
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D178214&action=
=3Dedit
Update to 1.56

Port changes:

- upstream updated list of its MASTER_SITES (bouncycastle.gva.es is gone,
downloads.bouncycastle.org changed to www.bouncycastle.org);
- pkg-descr updated to reflect current features;
- installation of zipped bundled sources made optional, enabled by default =
to
match previous behavior.

Some of new version changes:

- a new API for DTLS/TLS and a JSSE provider suitable for Java 5 and later;
- support for RFC 7539 ChaCha20 and Poly1305 has also been added and general
support for SHA-3 in the PKIX APIs has been improved;
- CVE-2016-1000338, CVE-2016-1000339, CVE-2016-1000340, CVE-2016-1000341,
CVE-2016-1000342, CVE-2016-1000343, CVE-2016-1000344, CVE-2016-1000345,
CVE-2016-1000346, CVE-2016-1000352.

Full details of the release: https://www.bouncycastle.org/releasenotes.html

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-215507-13>