Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

kryoptic-tools-1.3.1-1.1 RPM for x86_64

From OpenSuSE Tumbleweed for x86_64

Name: kryoptic-tools Distribution: openSUSE Tumbleweed
Version: 1.3.1 Vendor: openSUSE
Release: 1.1 Build date: Mon Sep 22 19:51:58 2025
Group: Unspecified Build host: reproducible
Size: 866568 Source RPM: kryoptic-1.3.1-1.1.src.rpm
Packager: https://bugs.opensuse.org
Url: https://github.com/latchset/kryoptic
Summary: Supporting tools for kryoptic software token
Supporting tools for kryoptic software token. Most notably a migration tool for
the SoftHSM database.

Provides

Requires

License

GPL-3.0-or-later

Changelog

* Mon Sep 22 2025 Lucas Mulling <lucas.mulling@suse.com>
  - Install p11-kit module config with the main package
* Fri Sep 19 2025 Lucas Mulling <lucas.mulling@suse.com>
  - Update to 1.3.1:
    * Remove large test vectors from release artifacts
* Thu Sep 18 2025 Lucas Mulling <lucas.mulling@suse.com>
  - Upadte to 1.3.0:
    * Changelog 1.1 fix
    * Initial support for ML-DSA
    * Rework how OpenSSL sources are used
    * tests: Drop pkcs11-tool dependency of migrate test
    * Support SignatureVerify APIs with all algorithms
    * Bump bindgen dependency version to follow rawhide
    * Add better support for array of attributes
    * Minor, non-substantial improvements to the README.md
    * Fix Montgomery Key Generation b
    * Improve documentation for using a static build of OpenSSL
    * Fix example configuration file
    * Support building on different OpenSSL versions
    * Update some FIPS indicators
    * Fix ML-DSA Keygen
    * Fixes for ML-KEM and Encapsulate API
    * Fix Public Ec Montgomery point storage
    * Add more documentation strings and cleanup changes
    * Make token info a little more useful
    * Arch-specific build fixes
    * Fix PrivateKeyInfo ASN.1 structure
    * Change some build time variables and configs
    * Add Key wrapping support and tests for all EC keys
    * More doc strings
    * tests: Avoid failures when configuration file is present in default path
    * Fix initialization of info in uninitialized token
    * Cargo: Bump cryptoki version to match version in Fedora
    * Stop using the paste crate
    * Remove unused conformance binary
    * deps: bump asn1 to v0.21
    * Add support fo FFDH key generation and derivation
    * FFDH: Ensure secret_len is big enough
    * Add some basic infrastructure to perform tracing
    * Drop jsondb
    * Fix buffer length check in AES update functions
    * Release 1.2
    * Update spec file after 1.2.0 release to match Fedora
    * Implement TLS 1.2 EMS derive
    * Switch cargo setup to a workspace with several packages
    * Refactor code and add easier to use abstractions at the ossl package level
    * Add OssCipher abstraction for symmetric ciphers
    * Support Sp800 ECDH KDF flavor
    * Make PKCS#11 3.2 the default interface
    * More ossl package abstraction for Pkey operations
    * Compile-time disabling SHA1 for OpenSSL backend
    * Fix is_approved() to properly check input keys
    * Implement simple KDFs
    * Rename and restructure some of the crates we recently crated
    * Add fips checks for KDFs additional input keys
    * Allow variance in FFDH derived key maximum size
    * Fix signing with CKM_SHA512_RSA_PKCS
    * Add OpenJDK continuous integration
    * Add config option to filter mechanisms
    * Reduce max key sizes to avoid overflow
    * openjdk-integration.yml: Run on pull_request and push
    * Tweak test matrix to test more configuarations
    * Improve some ossl interfaces
    * Implement Drop to cleanse sensitive key data
    * Add Fips Checkcs to EdDSA code
    * Add support for Brainpool curves
    * Some ossl API work, mostly polishing
    * Minor rework of dummy integrity check
    * openjdk-integration.yml: Warn on container/source version mismatch
    * Add jtreg-kryoptic.sh OpenJDK test script
    * Zeroize key material exported from EvpPkey
    * Do not fail fetches on unknown attributes
    * Fix pkcs11 header definition
    * Add support for OCB, OsslCipher::block_size, and RSA helpers for implementations of RFC9580
    * Ossl: Ensure libctx is freed on drop
    * Do not allow setting never-settable attributes (+avoid new warnings caused
    * Add missing OBJECT_VALIDATION attributes to objects
    * ossl: Allow passing propq to the key creation API
    * Add support for SLH-DSA
    * Change ossl lisence to ASL 2.0
    * ossl: Add support for legacy algorithms (DSA, 3DES) (under legacy feature)
    * Add CKM_EXTRACT_KEY_FROM_KEY to SimpleKDF
    * Add methods to load OpenSSL configuration
    * Import fix for pkcs11 3.2 header
    * Fix self reference in load_configuration API
    * Handle imports where only the Seed is provided
    * Add function to load legacy provider
    * ossl: Implement remaining legacy algorithms needed for OpenPGP
* Mon Jun 09 2025 Lucas Mulling <lucas.mulling@suse.com>
  - Update to 1.2.0:
    * Initial support for ML-DSA
    * Rework how OpenSSL sources are used
    * tests: Drop pkcs11-tool dependency of migrate test
    * Support SignatureVerify APIs with all algorithms
    * Bump bindgen dependency version to follow rawhide
    * Add better support for array of attributes
    * Minor, non-substantial improvements to the README.md
    * Fix Montgomery Key Generation
    * Improve documentation for using a static build of OpenSSL
    * Fix example configuration file
    * Support building on different OpenSSL versions
    * Update some FIPS indicators
    * Fix ML-DSA Keygen
    * Fixes for ML-KEM and Encapsulate API
    * Fix Public Ec Montgomery point storage
    * Add more documentation strings and cleanup changes
    * Make token info a little more useful
    * Arch-specific build fixes
    * Fix PrivateKeyInfo ASN.1 structure
    * Change some build time variables and configs
    * Add Key wrapping support and tests for all EC keys
    * More doc strings
    * tests: Avoid failures when configuration file is present in default path
    * Fix initialization of info in uninitialized token
    * Cargo: Bump cryptoki version to match version in Fedora
    * Stop using the paste crate
    * Remove unused conformance binary
    * deps: bump asn1 to v0.21
    * Add support fo FFDH key generation and derivation
    * FFDH: Ensure secret_len is big enough
    * Add some basic infrastructure to perform tracing
    * Drop jsondb
    * Fix buffer length check in AES update functions
    * For a full list of changes see: https://github.com/latchset/kryoptic/releases/tag/v1.2.0
  - Update _service
* Mon Apr 14 2025 Lucas Mulling <lucas.mulling@suse.com>
  - Update to 1.1.0:
    * Switch to Rust 2024 edition
    * Deal with length query issues
    * Fix storing and reading default DATE attributes
    * aes: Restrict AES-GCM to at least 1B tag length
    * Introduce CKF_MULTI_MESSAGE flag
    * Fix incorrect error returned on un-initialized operations
    * Ensure token store objects can be extracted if the right booleans are set
    * Replace SHA1 test signature
    * Rebase openssl submodule to 3.5 (prerelease) by
    * Pkcs11 3.2 Draft
    * Add Encapsulation/Decapsulation and ML-KEM support
    * Fix check for object sensitivity as per spec
    * Add Stricter FIPS options to configuration
    * Allow digesting AES keys and add test coverage
    * ecdh: Fix max ECDH output size
    * Fix C_WrapKey size query
    * Minor cleanups in tests and rust warning fixes
    * For a full list of changes see: https://github.com/latchset/kryoptic/releases/tag/v1.1.0
* Wed Mar 12 2025 Lucas Mulling <lucas.mulling@suse.com>
  - Initial package of version: 1.0.0:
    * For a full list of changes see: https://github.com/latchset/kryoptic/blob/v1.0.0/CHANGELOG.md

Files

/usr/bin/softhsm_migrate


Generated by rpm2html 1.8.1

Fabrice Bellet, Wed Sep 24 22:40:15 2025