Skip to content
Snippets Groups Projects
Select Git revision
  • nettle_3.5rc1
  • master default
  • wip-slh-dsa-sha2-128s
  • master-updates
  • release-3.10-fixes
  • getopt-prototype
  • fix-bcrypt-warning
  • refactor-hmac
  • wip-use-alignas
  • trim-sha3-context
  • fix-gitlab-ci
  • check-fat-emulate
  • delete-digest_func-size
  • slh-dsa-shake-128f-nettle
  • slh-dsa-shake-128s-nettle
  • slh-dsa-shake-128s
  • delete-openpgp
  • ppc64-sha512
  • delete-md5-compat
  • cleanup-hmac-tests
  • ppc64-sha256
  • nettle_3.10.2_release_20250626
  • nettle_3.10.1_release_20241230
  • nettle_3.10_release_20240616
  • nettle_3.10rc2
  • nettle_3.10rc1
  • nettle_3.9.1_release_20230601
  • nettle_3.9_release_20230514
  • nettle_3.8.1_release_20220727
  • nettle_3.8_release_20220602
  • nettle_3.7.3_release_20210606
  • nettle_3.7.2_release_20210321
  • nettle_3.7.1_release_20210217
  • nettle_3.7_release_20210104
  • nettle_3.7rc1
  • nettle_3.6_release_20200429
  • nettle_3.6rc3
  • nettle_3.6rc2
  • nettle_3.6rc1
  • nettle_3.5.1_release_20190627
  • nettle_3.5_release_20190626
41 results

NEWS

Blame
  • To find the state of this project's repository at the time of any of these versions, check out the tags.
    NEWS 48.66 KiB
    NEWS for the Nettle 3.5 release
    
    	This release adds a couple of new features and optimizations,
    	and deletes or deprecates a few obsolete features. It is *not*
    	binary (ABI) compatible with earlier versions. Except for
    	deprecations listed below, it is intended to be fully
    	source-level (API) compatible with Nettle-3.4.1.
    
    	The shared library names are libnettle.so.7.0 and
    	libhogweed.so.5.0, with sonames libnettle.so.7 and
    	libhogweed.so.5.
    
    	Changes in behavior:
    
    	* Nettle's gcm_crypt will now call the underlying block cipher
    	  to process more than one block at a time. This is not a
    	  change to the documented behavior, but unfortunately breaks
    	  assumptions accidentally made in GnuTLS, up to and including
    	  version 3.6.1.
    
    	New features:
    
    	* Support for CFB8 (Cipher Feedback Mode, processing a single
    	  octet per block cipher operation), contributed by Dmitry
    	  Eremin-Solenikov.
    
    	* Support for CMAC (RFC 4493), contributed by Nikos
    	  Mavrogiannopoulos.
    
    	* Support for XTS mode, contributed by Simo Sorce.
    
    	Optimizations:
    
    	* Improved performance of the x86_64 AES implementation using
    	  the aesni instructions. Gives a large speedup for operations
    	  processing multiple blocks at a time (including CTR mode,
    	  GCM mode, and CBC decrypt, but *not* CBC encrypt).
    
    	* Improved performance for CTR mode, for the common case of
    	  16-byte block size. Pass more data at a time to underlying
    	  block cipher, and fill the counter blocks more efficiently.
    	  Extension to also handle GCM mode efficiently contributed
    	  by Nikos Mavrogiannopoulos.
    
    	* New x86_64 implementation of sha1 and sha256, for processors
    	  supporting the sha_ni instructions. Speedup of 3-5 times on
    	  affected processors.
    
    	* Improved parameters for the precomputation of tables used
    	  for ecc signatures. Roughly 10%-15% speedup of the ecdsa
    	  sign operation using the secp_256r1, secp_384r1 and
    	  secp_521r1 curves, and 25% speedup of ed25519 sign
    	  operation, benchmarked on x86_64. Table sizes unchanged,
    	  around 16 KB per curve.
    
    	* In ARM fat builds, automatically select Neon implementation
    	  of Chacha, where possible. Contributed by Yuriy M.
    	  Kaminskiy.
    
    	Deleted features:
    
    	* The header file des-compat.h and everything declared therein
    	  has been deleted, as announced earlier. This file provided a
    	  subset of the old libdes/ssleay/openssl interface for DES
    	  and triple-DES. DES is still supported, via the functions
    	  declared in des.h.
    
    	* Functions using the old struct aes_ctx have been marked as
    	  deprecated. Use the fixed key size interface instead, e.g.,
    	  struct aes256_ctx, introduced in Nettle-3.0.