-
-
Notifications
You must be signed in to change notification settings - Fork 1
deps(deps): bump the crypto-stack group across 1 directory with 3 updates #39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -68,7 +68,7 @@ semver = { version = "^1.0.27" } # 2025-11-03 sw: version range evaluation for d | |
| serde = { version = "=1.0.228", features = ["derive"] } # 2025-11-03 sw: canonical serialization; CT reviewed | ||
| serde_json = { version = "=1.0.145" } # 2025-11-03 sw: deterministic JSON for protocol surfaces | ||
| serde_yaml = { version = "0.9" } # YAML parsing for CLI policies | ||
| blake3 = { version = "=1.8.3" } # 2025-11-03 sw: convergent hash, SIMD constant-time per upstream audit | ||
| blake3 = { version = "=1.8.4" } # 2025-11-03 sw: convergent hash, SIMD constant-time per upstream audit | ||
| bloomfilter = { version = "=1.0.13" } # 2025-11-03 sw: dedupe candidate screening, bounded memory | ||
| aya = { version = "=0.11.0" } # 2025-11-09 sw: eBPF loader for zero-trust ingress hooks | ||
| tokio-tungstenite = { version = "=0.21.0", default-features = false, features = ["connect", "rustls-tls-webpki-roots"] } # 2025-11-09 sw: mTLS control plane for zero-trust frontends | ||
|
|
@@ -79,13 +79,13 @@ lz4 = { version = "=1.28.1" } # 2025-11-03 sw: hot-path compression, SIMD routin | |
| zstd = { version = "=0.13.3" } # 2025-11-03 sw: deep compression with wasm off, see audit log entry CRS-132 | ||
| zeroize = { version = "=1.8.2" } # 2025-11-03 sw: memory clearing policy alignment | ||
| aes = { version = "=0.8.4" } # 2025-11-03 sw: AES-NI optimized, matches Phase3 design | ||
| cipher = { version = "=0.4.4" } # 2025-11-03 sw: trait glue for AES/Poly1305 stack | ||
| cipher = { version = "=0.5.1" } # 2025-11-03 sw: trait glue for AES/Poly1305 stack | ||
| xts-mode = { version = "=0.5.1" } # 2025-11-03 sw: XTS primitive, matches patentable_concepts.md guidance | ||
| poly1305 = { version = "=0.8.0" } # 2025-11-03 sw: MAC verification, constant-time guarantee | ||
| cpufeatures = { version = "=0.2.17" } # 2025-11-03 sw: runtime AES capability detection | ||
| subtle = { version = "=2.6.1" } # 2025-11-03 sw: constant-time comparisons for key/tweak handling | ||
| hmac = { version = "=0.12.1" } # 2025-11-04 sw: HKDF based on HMAC-SHA256 for key derivation | ||
| sha2 = { version = "=0.10.9" } # 2025-11-04 sw: Hash core for HKDF extractor | ||
| sha2 = { version = "=0.11.0" } # 2025-11-04 sw: Hash core for HKDF extractor | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Severity: high Other Locations
🤖 Was this useful? React with 👍 or 👎, or 🚀 if it prevented an incident/outage. |
||
|
|
||
| # Web Interface & Mesh Networking (2025-11-16 sw; Next-gen web interface with gossip) | ||
| axum = { version = "^0.7.9", features = ["ws", "macros", "multipart"] } # 2025-11-16 sw: Web server framework | ||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
cipherwas bumped to0.5.1whileaesis still pinned at0.8.4, which is likely built against an olderciphermajor; this can cause trait/type mismatches where the code usescipher::KeyInitwithAes256(e.g.,crates/encryption/src/xts.rs). Consider ensuring the AES/XTS stack is using a single compatibleciphermajor across direct + transitive deps to avoid split-trait issues.Severity: high
Other Locations
crates/encryption/src/xts.rs:24crates/encryption/src/error.rs:89🤖 Was this useful? React with 👍 or 👎, or 🚀 if it prevented an incident/outage.