[ANNOUNCE] WireGuard Snapshot `0.0.20180925` Available

Jason A. Donenfeld Jason at zx2c4.com
Tue Sep 25 16:50:17 CEST 2018


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hello,

A new snapshot, `0.0.20180925`, has been tagged in the git repository.

Please note that this snapshot is, like the rest of the project at this point
in time, experimental, and does not consitute a real release that would be
considered secure and bug-free. WireGuard is generally thought to be fairly
stable, and most likely will not crash your computer (though it may).
However, as this is a pre-release snapshot, it comes with no guarantees, and
its security is not yet to be depended on; it is not applicable for CVEs.

With all that said, if you'd like to test this snapshot out, there are a
few relevant changes.

== Changes ==

  * poly1305: better module description
  * blake2s: simplify final function
  * poly1305: no need to trick gcc 8.1
  * chacha20: prefer crypto_xor_cpy to avoid memmove
  * poly1305: account for simd being toggled off midway
  * crypto: do not waste space on selftest items
  * poly1305-mips32r2: remove all reorder directives
  * chacha20-mips32r2: fix typo to allow reorder again
  * chacha20-mips32r2: remove reorder directives
  * chacha20-arm: go with Ard's version to optimize for Cortex-A7
  * chacha20-mips32r2: use simpler calling convention
  * chacha20-mips32r2: reduce jumptable entry size and stack usage
  * chacha20: add chunked selftest and test sliding alignments and hchacha20
  * crypto-arm: rework KERNEL_MODE_NEON handling
  * chacha20-arm: use new scalar implementation
  * curve25519-fiat32: work around m68k compiler stack frame bug
  * crypto: flatten out makefile
  * crypto-arm: rework KERNEL_MODE_NEON handling again
  * poly1305-mips64: remove useless preprocessor error
  * chacha20-arm: updated scalar code from Andy
  * chacha20-arm: remove unused preambles
  * hchacha20: keep in native endian in words
  * crypto: make constant naming scheme consistent
  * chacha20-mips32r2: reduce stack and branches in loop, refactor jumptable handling
  * chacha20: add bounds checking to selftests
  * curve25519-hacl64: reduce stack usage under KASAN
  
  Tons of improvements to our cryptography API, including some nice performance
  boosts on ARM Cortex-A7 and MIPS32r2.
  
  * allowedips: change from BUG_ON to WARN_ON
  * allowedips: work around kasan stack frame bug in selftest
  * global: put SPDX identifier on its own line
  * netlink: reverse my christmas trees
  * global: reduce stack frame size
  
  Style and correctness changes. We now use less stack space as well.

This snapshot contains commits from: Jason A. Donenfeld and René van Dorst.

As always, the source is available at https://git.zx2c4.com/WireGuard/ and
information about the project is available at https://www.wireguard.com/ .

This snapshot is available in compressed tarball form here:
  https://git.zx2c4.com/WireGuard/snapshot/WireGuard-0.0.20180925.tar.xz
  SHA2-256: 4a0488a07e40ec17e798f3e40a85cedf55f0560b1c3a8fd95806c7d4266cb0e8
  BLAKE2b-256: 683c7c9e76d1b0f3fe34b1537796d50c0922333f3fe19813f33794daee446c92

A PGP signature of that file decompressed is available here:
  https://git.zx2c4.com/WireGuard/snapshot/WireGuard-0.0.20180925.tar.asc
  Signing key: AB9942E6D4A4CFC3412620A749FC7012A5DE03AE

If you're a snapshot package maintainer, please bump your package version. If
you're a user, the WireGuard team welcomes any and all feedback on this latest
snapshot.

Finally, WireGuard development thrives on donations. By popular demand, we
have a webpage for this: https://www.wireguard.com/donations/

Thank you,
Jason Donenfeld


-----BEGIN PGP SIGNATURE-----
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=FChn
-----END PGP SIGNATURE-----


More information about the WireGuard mailing list