quickjs-tart

quickjs-based runtime for wallet-core logic
Log | Files | Refs | README | LICENSE

ChangeLog (33938B)


      1 * Version 1.0.20-stable
      2  - Performance of AES256-GCM and AEGIS on ARM has been improved.
      3  - Android binaries have been added to the NuGet package
      4  - Windows ARM binaries have been added to the NuGet package
      5  - The Android build script has been improved. The base SDK is
      6 now 27c, and the default platform is 21
      7  - The library can now be compiled with Zig 0.14+
      8  - arm64e builds have been added to the XCFramework packages
      9  - XCFramework packages are now full builds instead of minimal
     10 builds
     11  - MSVC builds have been enabled for ARM64
     12  - A cross-compilation issue with old clang versions has been
     13 fixed
     14  - 16K page sizes are now supported on Android
     15  - JavaScript: support for Cloudflare Workers has been added
     16  - A compilation issue with old toolchains on Solaris has been
     17 fixed
     18  - `crypto_aead_aes256gcm_is_available` is exported to JavaScript
     19 
     20 * Version 1.0.20
     21   This point release includes all the changes from 1.0.19-stable,
     22 mainly addressing compilation issues and improvements to the .NET
     23 packages.
     24 
     25 * Version 1.0.19-stable
     26  - Building with `zig build` now requires Zig 0.12.
     27  - When using the traditional build system, -O3 is used instead of -Ofast.
     28  - Improved detection of the compiler flags required on aarch64.
     29  - Improved compatibility with custom build systems on aarch64.
     30  - apple-xcframework: VisionOS packages are not built if Xcode doesn't
     31 include that SDK.
     32  - `crypto_kdf_hkdf_sha512_statebytes()` was added.
     33  - When using Visual Studio, runtime CPU feature detection is now enabled
     34 on Windows/aarch64.
     35  - There were issues with C++ guards affecting usage of libsodium
     36 using Swift on Windows. This has been fixed.
     37  - Emscripten: `crypto_aead_aegis*()` functions are now exported in
     38 JavaScript builds
     39  - Emscripten: unsupported `--memory-init-file` option has been removed.
     40  - apple-xcframework: the minimal deployment target can be set to iOS 11+.
     41  - .NET packages now include precompiled libraries for Windows/arm64,
     42 iOS, TvOS and Catalyst.
     43  - .NET precompiled libraries now work on any CPUs, using only runtime
     44 feature detection.
     45  - SYSV assembly should not be used when targeting Windows (reported by
     46 @meiyese, thanks!)
     47  - Compatibility issues with LLVM 18 and AVX512 have been addressed.
     48  - GitHub attestation build provenance are now added to NuGet packages.
     49  - JavaScript tests can now use Bun as an alternative to Node.
     50 
     51 * Version 1.0.19
     52   This release includes all the changes from 1.0.18-stable, as well as two
     53 additions:
     54 
     55  - New AEADs: AEGIS-128L and AEGIS-256 are now available in the
     56 `crypto_aead_aegis128l_*()` and `crypto_aead_aegis256_*()` namespaces.
     57 AEGIS is a family of authenticated ciphers for high-performance applications,
     58 leveraging hardware AES acceleration on `x86_64` and `aarch64`. In addition
     59 to performance, AEGIS ciphers have unique properties making them easier and
     60 safer to use than AES-GCM. They can also be used as high-performance MACs.
     61  - The HKDF key derivation mechanism, required by many standard protocols, is
     62 now available in the `crypto_kdf_hkdf_*()` namespace. It is implemented for
     63 the SHA-256 and SHA-512 hash functions.
     64  - The `osx.sh` build script was renamed to `macos.sh`.
     65  - Support for android-mips was removed.
     66 
     67 * Version 1.0.18-stable
     68  - Visual Studio: support for Windows/ARM64 builds has been added.
     69  - Visual Studio: AVX512 implementations are enabled on supported CPUs.
     70  - Visual Studio: an MSVC 2022 solution was added.
     71  - Apple XCFramework: support for VisionOS was added.
     72  - Apple XCFramework: support for Catalyst was added.
     73  - Apple XCFramework: building the simulators is now optional.
     74  - iOS: bitcode is not generated any more, as it was deprecated by Apple.
     75  - watchOS: support for arm64 was added.
     76  - The Zig toolchain can now be used as a modern build system to replace
     77 autoconf/automake/libtool/make/ccache and the compiler. This enables faster
     78 compilation times, easier cross compilation, and static libraries optimized
     79 for any CPU.
     80  - The Zig toolchain is now the recommended way to compile `libsodium`
     81 to WebAssembly/WASI(X).
     82  - libsodium can now be added as a dependency to Zig projects.
     83  - Memory fences were added to remove some gadgets that could be used
     84 alongside speculative loads.
     85  - The AES-GCM implementation was completely rewritten. It is now faster,
     86 and also available on aarch64, including Windows/ARM64.
     87  - Compatibility with CET instrumentation / IBT / Shadow Stack was added.
     88  - Emscripten: the `crypto_pwhash_*()` functions have been removed from Sumo
     89 builds, as they reserve a substantial amount of JavaScript memory, even when
     90 not used.
     91  - Benchmarks now use `CLOCK_MONOTONIC` if possible.
     92  - WebAssembly: tests can now run using Bun, WasmEdge, Wazero, wasm3 and
     93 wasmer-js. Support for WAVM and Lucet have been removed, as these projects
     94 have reached EOL.
     95  - .NET: the minimum supported macOS version is now 1.0.15; this matches
     96 Microsoft guidelines.
     97  - .NET: all the packages are now built using Zig, on all platforms. This
     98 allows us to easily match Microsoft's requirements, including supported glibc
     99 versions. However, on x86_64, targets are expected to support at least the
    100 AVX instruction set.
    101  - .NET: packages for ARM64 are now available.
    102  - C23 `memset_explicit()` is now used, when available.
    103  - Compilation now uses `-Ofast` or `-O3` instead of `-O2` by default.
    104  - Portability improvements to help compile libsodium to modern game consoles.
    105  - JavaScript: a default `unhandledRejection` handler is not set any more.
    106  - Slightly faster 25519 operations.
    107  - OpenBSD: leverage `MAP_CONCEAL`.
    108 
    109 * Version 1.0.18
    110  - Enterprise versions of Visual Studio are now supported.
    111  - Visual Studio 2019 is now supported.
    112  - 32-bit binaries for Visual Studio 2010 are now provided.
    113  - A test designed to trigger an OOM condition didn't work on Linux systems
    114 with memory overcommit turned on. It has been removed in order to fix
    115 Ansible builds.
    116  - Emscripten: `print` and `printErr` functions are overridden to send
    117 errors to the console, if there is one.
    118  - Emscripten: `UTF8ToString()` is now exported since `Pointer_stringify()`
    119 has been deprecated.
    120  - Libsodium version detection has been fixed in the CMake recipe.
    121  - Generic hashing got a 10% speedup on AVX2.
    122  - New target: WebAssembly/WASI (compile with `dist-builds/wasm32-wasi.sh`).
    123  - New functions to map a hash to an edwards25519 point or get a random point:
    124 `core_ed25519_from_hash()` and `core_ed25519_random()`.
    125  - `crypto_core_ed25519_scalar_mul()` has been implemented for
    126 `scalar*scalar (mod L)` multiplication.
    127  - Support for the Ristretto group has been implemented for interoperability
    128 with wasm-crypto.
    129  - Improvements have been made to the test suite.
    130  - Portability improvements have been made.
    131  - `getentropy()` is now used on systems providing this system call.
    132  - `randombytes_salsa20` has been renamed to `randombytes_internal`.
    133  - Support for NativeClient has been removed.
    134  - Most `((nonnull))` attributes have been relaxed to allow 0-length inputs
    135 to be `NULL`.
    136  - The `-ftree-vectorize` and `-ftree-slp-vectorize` compiler switches are
    137 now used, if available, for optimized builds.
    138 
    139 * Version 1.0.17-stable
    140  - AVX512 detection has been improved.
    141  - A compilation option was added to enable retpoline support.
    142  - `-ftls-model=global-dynamic` is now set, if available.
    143  - Portability and documentation improvements.
    144 
    145 * Version 1.0.17
    146  - Bug fix: `sodium_pad()` didn't properly support block sizes >= 256 bytes.
    147  - JS/WebAssembly: some old iOS versions can't instantiate the WebAssembly
    148 module; fall back to Javascript on these.
    149  - JS/WebAssembly: compatibility with newer Emscripten versions.
    150  - Bug fix: `crypto_pwhash_scryptsalsa208sha256_str_verify()` and
    151 `crypto_pwhash_scryptsalsa208sha256_str_needs_rehash()` didn't return
    152 `EINVAL` on input strings with a short length, unlike their high-level
    153 counterpart.
    154  - Added a workaround for Visual Studio 2010 bug causing CPU features
    155 not to be detected.
    156  - Portability improvements.
    157  - Test vectors from Project Wycheproof have been added.
    158  - New low-level APIs for arithmetic mod the order of the prime order group:
    159 `crypto_core_ed25519_scalar_random()`, `crypto_core_ed25519_scalar_reduce()`,
    160 `crypto_core_ed25519_scalar_invert()`, `crypto_core_ed25519_scalar_negate()`,
    161 `crypto_core_ed25519_scalar_complement()`, `crypto_core_ed25519_scalar_add()`
    162 and `crypto_core_ed25519_scalar_sub()`.
    163  - New low-level APIs for scalar multiplication without clamping:
    164 `crypto_scalarmult_ed25519_base_noclamp()` and
    165 `crypto_scalarmult_ed25519_noclamp()`. These new APIs are especially useful
    166 for blinding.
    167  - `sodium_sub()` has been implemented.
    168  - Support for WatchOS has been added.
    169  - getrandom(2) is now used on FreeBSD 12+.
    170  - The `nonnull` attribute has been added to all relevant prototypes.
    171  - More reliable AVX512 detection.
    172  - Javascript/Webassembly builds now use dynamic memory growth.
    173 
    174 * Version 1.0.16
    175  - Signatures computations and verifications are now way faster on
    176 64-bit platforms with compilers supporting 128-bit arithmetic (gcc,
    177 clang, icc). This includes the WebAssembly target.
    178  - New low-level APIs for computations over edwards25519:
    179 `crypto_scalarmult_ed25519()`, `crypto_scalarmult_ed25519_base()`,
    180 `crypto_core_ed25519_is_valid_point()`, `crypto_core_ed25519_add()`,
    181 `crypto_core_ed25519_sub()` and `crypto_core_ed25519_from_uniform()`
    182 (elligator representative to point).
    183  - `crypto_sign_open()`, `crypto_sign_verify_detached() and
    184 `crypto_sign_edwards25519sha512batch_open` now reject public keys in
    185 non-canonical form in addition to low-order points.
    186  - The library can be built with `ED25519_NONDETERMINISTIC` defined in
    187 order to use synthetic nonces for EdDSA. This is disabled by default.
    188  - Webassembly: `crypto_pwhash_*()` functions are now included in
    189 non-sumo builds.
    190  - `sodium_stackzero()` was added to wipe content off the stack.
    191  - Android: support new SDKs where unified headers have become the
    192 default.
    193  - The Salsa20-based PRNG example is now thread-safe on platforms with
    194 support for thread-local storage, optionally mixes bits from RDRAND.
    195  - CMAKE: static library detection on Unix systems has been improved
    196 (thanks to @BurningEnlightenment, @nibua-r, @mellery451)
    197  - Argon2 and scrypt are slightly faster on Linux.
    198 
    199 * Version 1.0.15
    200  - The default password hashing algorithm is now Argon2id. The
    201 `pwhash_str_verify()` function can still verify Argon2i hashes
    202 without any changes, and `pwhash()` can still compute Argon2i hashes
    203 as well.
    204  - The aes128ctr primitive was removed. It was slow, non-standard, not
    205 authenticated, and didn't seem to be used by any opensource project.
    206  - Argon2id required at least 3 passes like Argon2i, despite a minimum
    207 of `1` as defined by the `OPSLIMIT_MIN` constant. This has been fixed.
    208  - The secretstream construction was slightly changed to be consistent
    209 with forthcoming variants.
    210  - The Javascript and Webassembly versions have been merged, and the
    211 module now returns a `.ready` promise that will resolve after the
    212 Webassembly code is loaded and compiled.
    213  - Note that due to these incompatible changes, the library version
    214 major was bumped up.
    215 
    216 * Version 1.0.14
    217  - iOS binaries should now be compatible with WatchOS and TVOS.
    218  - WebAssembly is now officially supported. Special thanks to
    219 @facekapow and @pepyakin who helped to make it happen.
    220  - Internal consistency checks failing and primitives used with
    221 dangerous/out-of-bounds/invalid parameters used to call abort(3).
    222 Now, a custom handler *that doesn't return* can be set with the
    223 `set_sodium_misuse()` function. It still aborts by default or if the
    224 handler ever returns. This is not a replacement for non-fatal,
    225 expected runtime errors. This handler will be only called in
    226 unexpected situations due to potential bugs in the library or in
    227 language bindings.
    228  - `*_MESSAGEBYTES_MAX` macros (and the corresponding
    229 `_messagebytes_max()` symbols) have been added to represent the
    230 maximum message size that can be safely handled by a primitive.
    231 Language bindings are encouraged to check user inputs against these
    232 maximum lengths.
    233  - The test suite has been extended to cover more edge cases.
    234  - crypto_sign_ed25519_pk_to_curve25519() now rejects points that are
    235 not on the curve, or not in the main subgroup.
    236  - Further changes have been made to ensure that smart compilers will
    237 not optimize out code that we don't want to be optimized.
    238  - Visual Studio solutions are now included in distribution tarballs.
    239  - The `sodium_runtime_has_*` symbols for CPU features detection are
    240 now defined as weak symbols, i.e. they can be replaced with an
    241 application-defined implementation. This can be useful to disable
    242 AVX* when temperature/power consumption is a concern.
    243  - `crypto_kx_*()` now aborts if called with no non-NULL pointers to
    244 store keys to.
    245  - SSE2 implementations of `crypto_verify_*()` have been added.
    246  - Passwords can be hashed using a specific algorithm with the new
    247 `crypto_pwhash_str_alg()` function.
    248  - Due to popular demand, base64 encoding (`sodium_bin2base64()`) and
    249 decoding (`sodium_base642bin()`) have been implemented.
    250  - A new `crypto_secretstream_*()` API was added to safely encrypt files
    251 and multi-part messages.
    252  - The `sodium_pad()` and `sodium_unpad()` helper functions have been
    253 added in order to add & remove padding.
    254  - An AVX512 optimized implementation of Argon2 has been added (written
    255 by Ondrej Mosnáček, thanks!)
    256  - The `crypto_pwhash_str_needs_rehash()` function was added to check if
    257 a password hash string matches the given parameters, or if it needs an
    258 update.
    259  - The library can now be compiled with recent versions of
    260 emscripten/binaryen that don't allow multiple variables declarations
    261 using a single `var` statement.
    262 
    263 * Version 1.0.13
    264  - Javascript: the sumo builds now include all symbols. They were
    265 previously limited to symbols defined in minimal builds.
    266  - The public `crypto_pwhash_argon2i_MEMLIMIT_MAX` constant was
    267 incorrectly defined on 32-bit platforms. This has been fixed.
    268  - Version 1.0.12 didn't compile on OpenBSD/i386 using the base gcc
    269 compiler. This has been fixed.
    270  - The Android compilation scripts have been updated for NDK r14b.
    271  - armv7s-optimized code was re-added to iOS builds.
    272  - An AVX2 optimized implementation of the Argon2 round function was
    273 added.
    274  - The Argon2id variant of Argon2 has been implemented. The
    275 high-level `crypto_pwhash_str_verify()` function automatically detects
    276 the algorithm and can verify both Argon2i and Argon2id hashed passwords.
    277 The default algorithm for newly hashed passwords remains Argon2i in
    278 this version to avoid breaking compatibility with verifiers running
    279 libsodium <= 1.0.12.
    280  - A `crypto_box_curve25519xchacha20poly1305_seal*()` function set was
    281 implemented.
    282  - scrypt was removed from minimal builds.
    283  - libsodium is now available on NuGet.
    284 
    285 * Version 1.0.12
    286  - Ed25519ph was implemented, adding a multi-part signature API
    287 (`crypto_sign_init()`, `crypto_sign_update()`, `crypto_sign_final_*()`).
    288  - New constants and related accessors have been added for Scrypt and
    289 Argon2.
    290  - XChaCha20 has been implemented. Like XSalsa20, this construction
    291 extends the ChaCha20 cipher to accept a 192-bit nonce. This makes it safe
    292 to use ChaCha20 with random nonces.
    293  - `crypto_secretbox`, `crypto_box` and `crypto_aead` now offer
    294 variants leveraging XChaCha20.
    295  - SHA-2 is about 20% faster, which also gives a speed boost to
    296 signature and signature verification.
    297  - AVX2 implementations of Salsa20 and ChaCha20 have been added. They
    298 are twice as fast as the SSE2 implementations. The speed gain is
    299 even more significant on Windows, that previously didn't use
    300 vectorized implementations.
    301  - New high-level API: `crypto_kdf`, to easily derive one or more
    302 subkeys from a master key.
    303  - Siphash with a 128-bit output has been implemented, and is
    304 available as `crypto_shorthash_siphashx_*`.
    305  - New `*_keygen()` helpers functions have been added to create secret
    306 keys for all constructions. This improves code clarity and can prevent keys
    307 from being partially initialized.
    308  - A new `randombytes_buf_deterministic()` function was added to
    309 deterministically fill a memory region with pseudorandom data. This
    310 function can especially be useful to write reproducible tests.
    311  - A preliminary `crypto_kx_*()` API was added to compute shared session
    312 keys.
    313  - AVX2 detection is more reliable.
    314  - The pthreads library is not required any more when using MingW.
    315  - `contrib/Findsodium.cmake` was added as an example to include
    316 libsodium in a project using cmake.
    317  - Compatibility with gcc 2.x has been restored.
    318  - Minimal builds can be checked using `sodium_library_minimal()`.
    319  - The `--enable-opt` compilation switch has become compatible with more
    320 platforms.
    321  - Android builds are now using clang on platforms where it is
    322 available.
    323 
    324 * Version 1.0.11
    325  - `sodium_init()` is now thread-safe, and can be safely called multiple
    326 times.
    327  - Android binaries now properly support 64-bit Android, targeting
    328 platform 24, but without breaking compatibility with platforms 16 and
    329 21.
    330  - Better support for old gcc versions.
    331  - On FreeBSD, core dumps are disabled on regions allocated with
    332 sodium allocation functions.
    333  - AVX2 detection was fixed, resulting in faster Blake2b hashing on
    334 platforms where it was not properly detected.
    335  - The Sandy2x Curve25519 implementation was not as fast as expected
    336 on some platforms. This has been fixed.
    337  - The NativeClient target was improved. Most notably, it now supports
    338 optimized implementations, and uses pepper_49 by default.
    339  - The library can be compiled with recent Emscripten versions.
    340 Changes have been made to produce smaller code, and the default heap
    341 size was reduced in the standard version.
    342  - The code can now be compiled on SLES11 service pack 4.
    343  - Decryption functions can now accept a NULL pointer for the output.
    344 This checks the MAC without writing the decrypted message.
    345  - crypto_generichash_final() now returns -1 if called twice.
    346  - Support for Visual Studio 2008 was improved.
    347 
    348 * Version 1.0.10
    349  - This release only fixes a compilation issue reported with some older
    350 gcc versions. There are no functional changes over the previous release.
    351 
    352 * Version 1.0.9
    353  - The Javascript target now includes a `--sumo` option to include all
    354 the symbols of the original C library.
    355  - A detached API was added to the ChaCha20-Poly1305 and AES256-GCM
    356 implementations.
    357  - The Argon2i password hashing function was added, and is accessible
    358 directly and through a new, high-level `crypto_pwhash` API. The scrypt
    359 function remains available as well.
    360  - A speed-record AVX2 implementation of BLAKE2b was added (thanks to
    361 Samuel Neves).
    362  - The library can now be compiled using C++Builder (thanks to @jcolli44)
    363  - Countermeasures for Ed25519 signatures malleability have been added
    364 to match the irtf-cfrg-eddsa draft (note that malleability is irrelevant to
    365 the standard definition of signature security). Signatures with a small-order
    366 `R` point are now also rejected.
    367  - Some implementations are now slightly faster when using the Clang
    368 compiler.
    369  - The HChaCha20 core function was implemented (`crypto_core_hchacha20()`).
    370  - No-op stubs were added for all AES256-GCM public functions even when
    371 compiled on non-Intel platforms.
    372  - `crypt_generichash_blake2b_statebytes()` was added.
    373  - New macros were added for the IETF variant of the ChaCha20-Poly1305
    374 construction.
    375  - The library can now be compiled on Minix.
    376  - HEASLR is now enabled on MinGW builds.
    377 
    378 * Version 1.0.8
    379  - Handle the case where the CPU supports AVX, but we are running
    380 on an hypervisor with AVX disabled/not supported.
    381  - Faster (2x) scalarmult_base() when using the ref10 implementation.
    382 
    383 * Version 1.0.7
    384  - More functions whose return value should be checked have been
    385 tagged with `__attribute__ ((warn_unused_result))`: `crypto_box_easy()`,
    386 `crypto_box_detached()`, `crypto_box_beforenm()`, `crypto_box()`, and
    387 `crypto_scalarmult()`.
    388  - Sandy2x, the fastest Curve25519 implementation ever, has been
    389 merged in, and is automatically used on CPUs supporting the AVX
    390 instructions set.
    391  - An SSE2 optimized implementation of Poly1305 was added, and is
    392 twice as fast as the portable one.
    393  - An SSSE3 optimized implementation of ChaCha20 was added, and is
    394 twice as fast as the portable one.
    395  - Faster `sodium_increment()` for common nonce sizes.
    396  - New helper functions have been added: `sodium_is_zero()` and
    397  `sodium_add()`.
    398  - `sodium_runtime_has_aesni()` now properly detects the CPU flag when
    399  compiled using Visual Studio.
    400 
    401 * Version 1.0.6
    402  - Optimized implementations of Blake2 have been added for modern
    403 Intel platforms. `crypto_generichash()` is now faster than MD5 and SHA1
    404 implementations while being far more secure.
    405  - Functions for which the return value should be checked have been
    406 tagged with `__attribute__ ((warn_unused_result))`. This will
    407 intentionally break code compiled with `-Werror` that didn't bother
    408 checking critical return values.
    409  - The `crypto_sign_edwards25519sha512batch_*()` functions have been
    410 tagged as deprecated.
    411  - Undocumented symbols that were exported, but were only useful for
    412 internal purposes have been removed or made private:
    413 `sodium_runtime_get_cpu_features()`, the implementation-specific
    414 `crypto_onetimeauth_poly1305_donna()` symbols,
    415 `crypto_onetimeauth_poly1305_set_implementation()`,
    416 `crypto_onetimeauth_poly1305_implementation_name()` and
    417 `crypto_onetimeauth_pick_best_implementation()`.
    418  - `sodium_compare()` now works as documented, and compares numbers
    419 in little-endian format instead of behaving like `memcmp()`.
    420  - The previous changes should not break actual applications, but to be
    421 safe, the library version major was incremented.
    422  - `sodium_runtime_has_ssse3()` and `sodium_runtime_has_sse41()` have
    423 been added.
    424  - The library can now be compiled with the CompCert compiler.
    425 
    426 * Version 1.0.5
    427  - Compilation issues on some platforms were fixed: missing alignment
    428 directives were added (required at least on RHEL-6/i386), a workaround
    429 for a VRP bug on gcc/armv7 was added, and the library can now be compiled
    430 with the SunPro compiler.
    431  - Javascript target: io.js is not supported any more. Use nodejs.
    432 
    433 * Version 1.0.4
    434  - Support for AES256-GCM has been added. This requires
    435 a CPU with the aesni and pclmul extensions, and is accessible via the
    436 crypto_aead_aes256gcm_*() functions.
    437  - The Javascript target doesn't use eval() any more, so that the
    438 library can be used in Chrome packaged applications.
    439  - QNX and CloudABI are now supported.
    440  - Support for NaCl has finally been added.
    441  - ChaCha20 with an extended (96 bit) nonce and a 32-bit counter has
    442 been implemented as crypto_stream_chacha20_ietf(),
    443 crypto_stream_chacha20_ietf_xor() and crypto_stream_chacha20_ietf_xor_ic().
    444 An IETF-compatible version of ChaCha20Poly1305 is available as
    445 crypto_aead_chacha20poly1305_ietf_npubbytes(),
    446 crypto_aead_chacha20poly1305_ietf_encrypt() and
    447 crypto_aead_chacha20poly1305_ietf_decrypt().
    448  - The sodium_increment() helper function has been added, to increment
    449 an arbitrary large number (such as a nonce).
    450  - The sodium_compare() helper function has been added, to compare
    451 arbitrary large numbers (such as nonces, in order to prevent replay
    452 attacks).
    453 
    454 * Version 1.0.3
    455  - In addition to sodium_bin2hex(), sodium_hex2bin() is now a
    456 constant-time function.
    457  - crypto_stream_xsalsa20_ic() has been added.
    458  - crypto_generichash_statebytes(), crypto_auth_*_statebytes() and
    459 crypto_hash_*_statebytes() have been added in order to retrieve the
    460 size of structures keeping states from foreign languages.
    461  - The JavaScript target doesn't require /dev/urandom or an external
    462 randombytes() implementation any more. Other minor Emscripten-related
    463 improvements have been made in order to support libsodium.js
    464  - Custom randombytes implementations do not need to provide their own
    465 implementation of randombytes_uniform() any more. randombytes_stir()
    466 and randombytes_close() can also be NULL pointers if they are not
    467 required.
    468  - On Linux, getrandom(2) is being used instead of directly accessing
    469 /dev/urandom, if the kernel supports this system call.
    470  - crypto_box_seal() and crypto_box_seal_open() have been added.
    471  - Visual Studio 2015 is now supported.
    472 
    473 * Version 1.0.2
    474  - The _easy and _detached APIs now support precalculated keys;
    475 crypto_box_easy_afternm(), crypto_box_open_easy_afternm(),
    476 crypto_box_detached_afternm() and crypto_box_open_detached_afternm()
    477 have been added as an alternative to the NaCl interface.
    478  - Memory allocation functions can now be used on operating systems with
    479 no memory protection.
    480  - crypto_sign_open() and crypto_sign_edwards25519sha512batch_open()
    481 now accept a NULL pointer instead of a pointer to the message size, if
    482 storing this information is not required.
    483  - The close-on-exec flag is now set on the descriptor returned when
    484 opening /dev/urandom.
    485  - A libsodium-uninstalled.pc file to use pkg-config even when
    486 libsodium is not installed, has been added.
    487  - The iOS target now includes armv7s and arm64 optimized code, as well
    488 as i386 and x86_64 code for the iOS simulator.
    489  - sodium_free() can now be called on regions with PROT_NONE protection.
    490  - The Javascript tests can run on Ubuntu, where the node binary was
    491 renamed nodejs. io.js can also be used instead of node.
    492 
    493 * Version 1.0.1
    494  - DLL_EXPORT was renamed SODIUM_DLL_EXPORT in order to avoid
    495 collisions with similar macros defined by other libraries.
    496  - sodium_bin2hex() is now constant-time.
    497  - crypto_secretbox_detached() now supports overlapping input and output
    498 regions.
    499  - NaCl's donna_c64 implementation of curve25519 was reading an extra byte
    500 past the end of the buffer containing the base point. This has been
    501 fixed.
    502 
    503 * Version 1.0.0
    504  - The API and ABI are now stable. New features will be added, but
    505 backward-compatibility is guaranteed through all the 1.x.y releases.
    506  - crypto_sign() properly works with overlapping regions again. Thanks
    507 to @pysiak for reporting this regression introduced in version 0.6.1.
    508  - The test suite has been extended.
    509 
    510 * Version 0.7.1 (1.0 RC2)
    511  - This is the second release candidate of Sodium 1.0. Minor
    512 compilation, readability and portability changes have been made and the
    513 test suite was improved, but the API is the same as the previous release
    514 candidate.
    515 
    516 * Version 0.7.0 (1.0 RC1)
    517  - Allocating memory to store sensitive data can now be done using
    518 sodium_malloc() and sodium_allocarray(). These functions add guard
    519 pages around the protected data to make it less likely to be
    520 accessible in a heartbleed-like scenario. In addition, the protection
    521 for memory regions allocated that way can be changed using
    522 sodium_mprotect_noaccess(), sodium_mprotect_readonly() and
    523 sodium_mprotect_readwrite().
    524  - ed25519 keys can be converted to curve25519 keys with
    525 crypto_sign_ed25519_pk_to_curve25519() and
    526 crypto_sign_ed25519_sk_to_curve25519(). This allows using the same
    527 keys for signature and encryption.
    528  - The seed and the public key can be extracted from an ed25519 key
    529 using crypto_sign_ed25519_sk_to_seed() and crypto_sign_ed25519_sk_to_pk().
    530  - aes256 was removed. A timing-attack resistant implementation might
    531 be added later, but not before version 1.0 is tagged.
    532  - The crypto_pwhash_scryptxsalsa208sha256_* compatibility layer was
    533 removed. Use crypto_pwhash_scryptsalsa208sha256_*.
    534  - The compatibility layer for implementation-specific functions was
    535 removed.
    536  - Compilation issues with Mingw64 on MSYS (not MSYS2) were fixed.
    537  - crypto_pwhash_scryptsalsa208sha256_STRPREFIX was added: it contains
    538 the prefix produced by crypto_pwhash_scryptsalsa208sha256_str()
    539 
    540 * Version 0.6.1
    541  - Important bug fix: when crypto_sign_open() was given a signed
    542 message too short to even contain a signature, it was putting an
    543 unlimited amount of zeros into the target buffer instead of
    544 immediately returning -1. The bug was introduced in version 0.5.0.
    545  - New API: crypto_sign_detached() and crypto_sign_verify_detached()
    546 to produce and verify ed25519 signatures without having to duplicate
    547 the message.
    548  - New ./configure switch: --enable-minimal, to create a smaller
    549 library, with only the functions required for the high-level API.
    550 Mainly useful for the JavaScript target and embedded systems.
    551  - All the symbols are now exported by the Emscripten build script.
    552  - The pkg-config .pc file is now always installed even if the
    553 pkg-config tool is not available during the installation.
    554 
    555 * Version 0.6.0
    556  - The ChaCha20 stream cipher has been added, as crypto_stream_chacha20_*
    557  - The ChaCha20Poly1305 AEAD construction has been implemented, as
    558 crypto_aead_chacha20poly1305_*
    559  - The _easy API does not require any heap allocations any more and
    560 does not have any overhead over the NaCl API. With the password
    561 hashing function being an obvious exception, the library doesn't
    562 allocate and will not allocate heap memory ever.
    563  - crypto_box and crypto_secretbox have a new _detached API to store
    564 the authentication tag and the encrypted message separately.
    565  - crypto_pwhash_scryptxsalsa208sha256*() functions have been renamed
    566 crypto_pwhash_scryptsalsa208sha256*().
    567  - The low-level crypto_pwhash_scryptsalsa208sha256_ll() function
    568 allows setting individual parameters of the scrypt function.
    569  - New macros and functions for recommended crypto_pwhash_* parameters
    570 have been added.
    571  - Similarly to crypto_sign_seed_keypair(), crypto_box_seed_keypair()
    572 has been introduced to deterministically generate a key pair from a seed.
    573  - crypto_onetimeauth() now provides a streaming interface.
    574  - crypto_stream_chacha20_xor_ic() and crypto_stream_salsa20_xor_ic()
    575 have been added to use a non-zero initial block counter.
    576  - On Windows, CryptGenRandom() was replaced by RtlGenRandom(), which
    577 doesn't require the Crypt API.
    578  - The high bit in curve25519 is masked instead of processing the key as
    579 a 256-bit value.
    580  - The curve25519 ref implementation was replaced by the latest ref10
    581 implementation from Supercop.
    582  - sodium_mlock() now prevents memory from being included in coredumps
    583 on Linux 3.4+
    584 
    585 * Version 0.5.0
    586  - sodium_mlock()/sodium_munlock() have been introduced to lock pages
    587 in memory before storing sensitive data, and to zero them before
    588 unlocking them.
    589  - High-level wrappers for crypto_box and crypto_secretbox
    590 (crypto_box_easy and crypto_secretbox_easy) can be used to avoid
    591 dealing with the specific memory layout regular functions depend on.
    592  - crypto_pwhash_scryptsalsa208sha256* functions have been added
    593 to derive a key from a password, and for password storage.
    594  - Salsa20 and ed25519 implementations now support overlapping
    595 inputs/keys/outputs (changes imported from supercop-20140505).
    596  - New build scripts for Visual Studio, Emscripten, different Android
    597 architectures and msys2 are available.
    598  - The poly1305-53 implementation has been replaced with Floodyberry's
    599 poly1305-donna32 and poly1305-donna64 implementations.
    600  - sodium_hex2bin() has been added to complement sodium_bin2hex().
    601  - On OpenBSD and Bitrig, arc4random() is used instead of reading
    602 /dev/urandom.
    603  - crypto_auth_hmac_sha512() has been implemented.
    604  - sha256 and sha512 now have a streaming interface.
    605  - hmacsha256, hmacsha512 and hmacsha512256 now support keys of
    606 arbitrary length, and have a streaming interface.
    607  - crypto_verify_64() has been implemented.
    608  - first-class Visual Studio build system, thanks to @evoskuil
    609  - CPU features are now detected at runtime.
    610 
    611 * Version 0.4.5
    612  - Restore compatibility with OSX <= 10.6
    613 
    614 * Version 0.4.4
    615  - Visual Studio is officially supported (VC 2010 & VC 2013)
    616  - mingw64 is now supported
    617  - big-endian architectures are now supported as well
    618  - The donna_c64 implementation of curve25519_donna_c64 now handles
    619 non-canonical points like the ref implementation
    620  - Missing scalarmult_curve25519 and stream_salsa20 constants are now exported
    621  - A crypto_onetimeauth_poly1305_ref() wrapper has been added
    622 
    623 * Version 0.4.3
    624  - crypto_sign_seedbytes() and crypto_sign_SEEDBYTES were added.
    625  - crypto_onetimeauth_poly1305_implementation_name() was added.
    626  - poly1305-ref has been replaced by a faster implementation,
    627 Floodyberry's poly1305-donna-unrolled.
    628  - Stackmarkings have been added to assembly code, for Hardened Gentoo.
    629  - pkg-config can now be used in order to retrieve compilations flags for
    630 using libsodium.
    631  - crypto_stream_aes256estream_*() can now deal with unaligned input
    632 on platforms that require word alignment.
    633  - portability improvements.
    634 
    635 * Version 0.4.2
    636  - All NaCl constants are now also exposed as functions.
    637  - The Android and iOS cross-compilation script have been improved.
    638  - libsodium can now be cross-compiled to Windows from Linux.
    639  - libsodium can now be compiled with emscripten.
    640  - New convenience function (prototyped in utils.h): sodium_bin2hex().
    641 
    642 * Version 0.4.1
    643  - sodium_version_*() functions were not exported in version 0.4. They
    644 are now visible as intended.
    645  - sodium_init() now calls randombytes_stir().
    646  - optimized assembly version of salsa20 is now used on amd64.
    647  - further cleanups and enhanced compatibility with non-C99 compilers.
    648 
    649 * Version 0.4
    650  - Most constants and operations are now available as actual functions
    651 instead of macros, making it easier to use from other languages.
    652  - New operation: crypto_generichash, featuring a variable key size, a
    653 variable output size, and a streaming API. Currently implemented using
    654 Blake2b.
    655  - The package can be compiled in a separate directory.
    656  - aes128ctr functions are exported.
    657  - Optimized versions of curve25519 (curve25519_donna_c64), poly1305
    658 (poly1305_53) and ed25519 (ed25519_ref10) are available. Optionally calling
    659 sodium_init() once before using the library makes it pick the fastest
    660 implementation.
    661  - New convenience function: sodium_memzero() in order to securely
    662 wipe a memory area.
    663  - A whole bunch of cleanups and portability enhancements.
    664  - On Windows, a .REF file is generated along with the shared library,
    665 for use with Visual Studio. The installation path for these has become
    666 $prefix/bin as expected by MingW.
    667 
    668 * Version 0.3
    669  - The crypto_shorthash operation has been added, implemented using
    670 SipHash-2-4.
    671 
    672 * Version 0.2
    673  - crypto_sign_seed_keypair() has been added
    674 
    675 * Version 0.1
    676  - Initial release.
    677