commit sqlcipher for openSUSE:Factory
Hello community, here is the log from the commit of package sqlcipher for openSUSE:Factory checked in at 2019-05-20 10:30:16 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/sqlcipher (Old) and /work/SRC/openSUSE:Factory/.sqlcipher.new.5148 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Package is "sqlcipher" Mon May 20 10:30:16 2019 rev:5 rq:704060 version:4.1.0 Changes: -------- --- /work/SRC/openSUSE:Factory/sqlcipher/sqlcipher.changes 2018-04-19 15:32:39.467244986 +0200 +++ /work/SRC/openSUSE:Factory/.sqlcipher.new.5148/sqlcipher.changes 2019-05-20 10:30:23.197876704 +0200 @@ -1,0 +2,48 @@ +Mon May 13 07:57:02 UTC 2019 - Paolo Stivanin <info@paolostivanin.com> + +- Update to v4.1.0: + * Adds PRAGMA cipher_settings to query current database + codec settings + * Adds PRAGMA cipher_default_settings to query current + default SQLCipher options + * PRAGMA cipher_hmac_pgno is now deprecated + * PRAGMA cipher_hmac_salt_mask is now deprecated + * PRAGMA fast_kdf_iter is now deprecated + * Disable backup API for encrypted databases (this was + previously documented as not-working and non-supported, + but will now explicitly error out on initialization) + * Default page size for databases increased to 4096 bytes + (up from 1024) + * Default PBKDF2 iterations increased to 256,000 + (up from 64,000) + * Default KDF algorithm is now PBKDF2-HMAC-SHA512 + (from PBKDF2-HMAC-SHA1) + * Default HMAC algorithm is now HMAC-SHA512 (from HMAC-SHA1) + * PRAGMA cipher is now disabled and no longer supported + (after multi-year deprecation) + * PRAGMA rekey_cipher is now disabled and no longer supported + * PRAGMA rekey_kdf_iter is now disabled and no longer + supported + * By default all memory allocated internally by SQLite before + the memory is wiped before it is freed + * PRAGMA cipher_memory_security: allows full memory wiping + to be disabled for performance when the feature is + not required + * PRAGMA cipher_kdf_algorithm, cipher_default_kdf_algorithm + to control KDF algorithm selection between PBKDF2-HMAC-SHA1, + PBKDF2-HMAC-SHA256 and PBKDF2-HMAC-SHA512 + * PRAGMA cipher_hmac_algorithm, cipher_default_hmac_algorithm + to control HMAC algorithm selection between HMAC-SHA1, + HMAC-SHA256 and PBKDF2-HMAC-SHA512 + * When compiled with readline support, PRAGMA key and rekey + lines will no longer be saved to history + * Adds second optional parameter to sqlcipher_export to specify + source database to support bidirectional exports + * PRAGMA cipher_plaintext_header_size and + cipher_default_plaintext_header_size: allocates a portion of + the database header which will not be encrypted to allow + identification as a SQLite database + * PRAGMA cipher_salt: retrieve or set the salt value for + the database + +------------------------------------------------------------------- Old: ---- sqlcipher-3.4.2.tar.gz New: ---- sqlcipher-4.1.0.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ sqlcipher.spec ++++++ --- /var/tmp/diff_new_pack.YDsFEa/_old 2019-05-20 10:30:24.869876150 +0200 +++ /var/tmp/diff_new_pack.YDsFEa/_new 2019-05-20 10:30:24.873876148 +0200 @@ -1,7 +1,7 @@ # # spec file for package sqlcipher # -# Copyright (c) 2018 SUSE LINUX GmbH, Nuernberg, Germany. +# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -16,10 +16,10 @@ # -%define lib_version 3.20.1 -%define lib_name lib%{name}-3_20_1-0 +%define lib_version 3.27.2 +%define lib_name lib%{name}-3_27_2-0 Name: sqlcipher -Version: 3.4.2 +Version: 4.1.0 Release: 0 Summary: SQLite database encryption License: BSD-3-Clause ++++++ sqlcipher-3.4.2.tar.gz -> sqlcipher-4.1.0.tar.gz ++++++ /work/SRC/openSUSE:Factory/sqlcipher/sqlcipher-3.4.2.tar.gz /work/SRC/openSUSE:Factory/.sqlcipher.new.5148/sqlcipher-4.1.0.tar.gz differ: char 12, line 1
participants (1)
-
root