Skip to content

deps(deps): bump the crypto-stack group across 1 directory with 3 updates#39

Open
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/cargo/crypto-stack-11a5575e8a
Open

deps(deps): bump the crypto-stack group across 1 directory with 3 updates#39
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/cargo/crypto-stack-11a5575e8a

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot bot commented on behalf of github Apr 6, 2026

Bumps the crypto-stack group with 3 updates in the / directory: blake3, cipher and sha2.

Updates blake3 from 1.8.3 to 1.8.4

Release notes

Sourced from blake3's releases.

1.8.4

version 1.8.4

Changes since 1.8.3:

  • Updated the digest dependency from v0.10 to v0.11. THIS IS A POTENTIALLY BREAKING CHANGE for callers using the traits-preview Cargo feature. But this is not considered a breaking change for the blake3 crate itself; see the docs for traits-preview.
  • Performance for WASM SIMD targets is improved by ~20% when the wasm32_simd feature is enabled. Contributed by @​lamb356.
Commits
  • b97a24f version 1.8.4
  • 0ebe469 update to new rustcrypto trait releases
  • d4b005a wasm32_simd: use i8x16_shuffle for rot8 and rot16
  • 6eebbbd fix a struct size mismatch in tests
  • fb1411e c: use SIZE_MAX instead of -1 for size_t sentinels, add <stdint.h>
  • See full diff in compare view

Updates cipher from 0.4.4 to 0.5.1

Commits

Updates sha2 from 0.10.9 to 0.11.0

Commits

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

…ates

Bumps the crypto-stack group with 3 updates in the / directory: [blake3](https://github.com/BLAKE3-team/BLAKE3), [cipher](https://github.com/RustCrypto/traits) and [sha2](https://github.com/RustCrypto/hashes).


Updates `blake3` from 1.8.3 to 1.8.4
- [Release notes](https://github.com/BLAKE3-team/BLAKE3/releases)
- [Commits](BLAKE3-team/BLAKE3@1.8.3...1.8.4)

Updates `cipher` from 0.4.4 to 0.5.1
- [Commits](RustCrypto/traits@cipher-v0.4.4...cipher-v0.5.1)

Updates `sha2` from 0.10.9 to 0.11.0
- [Commits](RustCrypto/hashes@sha2-v0.10.9...sha2-v0.11.0)

---
updated-dependencies:
- dependency-name: blake3
  dependency-version: 1.8.4
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: crypto-stack
- dependency-name: cipher
  dependency-version: 0.5.1
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: crypto-stack
- dependency-name: sha2
  dependency-version: 0.11.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: crypto-stack
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot @github
Copy link
Copy Markdown
Contributor Author

dependabot bot commented on behalf of github Apr 6, 2026

Labels

The following labels could not be found: dependencies, security. Please create them before Dependabot can add them to a pull request.

Please fix the above issues or remove invalid values from dependabot.yml.

@dependabot dependabot bot requested a review from saworbit as a code owner April 6, 2026 03:12
@github-actions github-actions bot added the build label Apr 6, 2026
@augmentcode
Copy link
Copy Markdown

augmentcode bot commented Apr 6, 2026

🤖 Augment PR Summary

Summary: Updates the workspace crypto dependency set via a Dependabot group bump.

Changes:

  • Bumps blake3 from 1.8.3 to 1.8.4
  • Bumps cipher from 0.4.4 to 0.5.1 (RustCrypto trait crate)
  • Bumps sha2 from 0.10.9 to 0.11.0
  • Updates the workspace manifest to keep these pins consistent across member crates

Technical Notes: Both cipher and sha2 are 0.x breaking bumps, so downstream crates using their traits may need compatible companion upgrades.

🤖 Was this summary useful? React with 👍 or 👎

Copy link
Copy Markdown

@augmentcode augmentcode bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Review completed. 2 suggestions posted.

Fix All in Augment

Comment augment review to trigger a new review at any time.

zeroize = { version = "=1.8.2" } # 2025-11-03 sw: memory clearing policy alignment
aes = { version = "=0.8.4" } # 2025-11-03 sw: AES-NI optimized, matches Phase3 design
cipher = { version = "=0.4.4" } # 2025-11-03 sw: trait glue for AES/Poly1305 stack
cipher = { version = "=0.5.1" } # 2025-11-03 sw: trait glue for AES/Poly1305 stack
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

cipher was bumped to 0.5.1 while aes is still pinned at 0.8.4, which is likely built against an older cipher major; this can cause trait/type mismatches where the code uses cipher::KeyInit with Aes256 (e.g., crates/encryption/src/xts.rs). Consider ensuring the AES/XTS stack is using a single compatible cipher major across direct + transitive deps to avoid split-trait issues.

Severity: high

Other Locations
  • crates/encryption/src/xts.rs:24
  • crates/encryption/src/error.rs:89

Fix This in Augment

🤖 Was this useful? React with 👍 or 👎, or 🚀 if it prevented an incident/outage.

subtle = { version = "=2.6.1" } # 2025-11-03 sw: constant-time comparisons for key/tweak handling
hmac = { version = "=0.12.1" } # 2025-11-04 sw: HKDF based on HMAC-SHA256 for key derivation
sha2 = { version = "=0.10.9" } # 2025-11-04 sw: Hash core for HKDF extractor
sha2 = { version = "=0.11.0" } # 2025-11-04 sw: Hash core for HKDF extractor
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

sha2 0.11.0 is a breaking bump and typically comes with a newer digest major; with hmac = 0.12.1 and code that defines Hmac<Sha256>, this is very likely to introduce a Digest trait version mismatch. Consider verifying hmac/sha2 are on compatible RustCrypto generations wherever HMAC signing/verification is used.

Severity: high

Other Locations
  • crates/gossip-layer/src/message.rs:3
  • crates/encryption/src/keymanager.rs:22

Fix This in Augment

🤖 Was this useful? React with 👍 or 👎, or 🚀 if it prevented an incident/outage.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants