bcrypt 3.1.21-java → 3.1.22-java

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 5a53cbea41295650164328d69013dd030f184e4405221806291465a05ab0e250
4
- data.tar.gz: 94e5c47352fef85517b35effc11b2f41a69849af60bda5338a62e15e0b49a68d
3
+ metadata.gz: e5e50341afcc655da1321fed6959d18d14645c674439fa3147aa963a2418d371
4
+ data.tar.gz: 7da8971cd67bac35a00cfc8b00224ab1a94d3fc47c7641d72e67c4886aaccb3d
5
5
  SHA512:
6
- metadata.gz: b43eec31e06923a755e3b133db2c556694b9f084520c600ceffc18f9d406ed250c809d544af5ea396f18a9c3c97d2a6183850cdce19d324bbed8e572cb1b7273
7
- data.tar.gz: f3ea42a4fd1de528f4d465ff66db582ac20bfbf2841d71c49de2e379bed89bd919e4c70d0298db04638c58f024be48b978dc33c74a5b8c1fe6398eccd0bd4f85
6
+ metadata.gz: 0c453b1b641b543b95a64ccea3ac0f73fcb73c90dafee7cb6594e451df02e994b253e965f249b9ba09971237c5750a61ea4da9fd66c3ed4304eb942c50f0bfa5
7
+ data.tar.gz: 5c795f4a0b8d92ad537b08d0131fa682cd4e6e561e3bb1b09e7b112e0579b21c5a0a18475f0c8720be84a79a11d9b620732e559d2312f00336e0e9e367b0865d
data/CHANGELOG CHANGED
@@ -1,3 +1,6 @@
1
+ 3.1.22 Mar 18 2026
2
+ - [CVE-2026-33306] Fix integer overflow in Java extension
3
+
1
4
  3.1.21 Dec 31 2025
2
5
  - Use constant time comparisons
3
6
  - Mark as Ractor safe
@@ -688,20 +688,21 @@ public class BCrypt {
688
688
  */
689
689
  private byte[] crypt_raw(byte password[], byte salt[], int log_rounds,
690
690
  boolean sign_ext_bug, int safety) {
691
- int rounds, i, j;
691
+ long rounds;
692
+ int i, j;
692
693
  int cdata[] = bf_crypt_ciphertext.clone();
693
694
  int clen = cdata.length;
694
695
  byte ret[];
695
696
 
696
697
  if (log_rounds < 4 || log_rounds > 31)
697
698
  throw new IllegalArgumentException ("Bad number of rounds");
698
- rounds = 1 << log_rounds;
699
+ rounds = roundsForLogRounds(log_rounds);
699
700
  if (salt.length != BCRYPT_SALT_LEN)
700
701
  throw new IllegalArgumentException ("Bad salt length");
701
702
 
702
703
  init_key();
703
704
  ekskey(salt, password, sign_ext_bug, safety);
704
- for (i = 0; i < rounds; i++) {
705
+ for (long r = 0; r < rounds; r++) {
705
706
  key(password, sign_ext_bug, safety);
706
707
  key(salt, false, safety);
707
708
  }
data/lib/bcrypt_ext.jar CHANGED
Binary file
metadata CHANGED
@@ -1,14 +1,13 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: bcrypt
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.1.21
4
+ version: 3.1.22
5
5
  platform: java
6
6
  authors:
7
7
  - Coda Hale
8
- autorequire:
9
8
  bindir: bin
10
9
  cert_chain: []
11
- date: 2025-12-31 00:00:00.000000000 Z
10
+ date: 1980-01-02 00:00:00.000000000 Z
12
11
  dependencies:
13
12
  - !ruby/object:Gem::Dependency
14
13
  name: rake-compiler
@@ -74,9 +73,9 @@ email: coda.hale@gmail.com
74
73
  executables: []
75
74
  extensions: []
76
75
  extra_rdoc_files:
77
- - README.md
78
- - COPYING
79
76
  - CHANGELOG
77
+ - COPYING
78
+ - README.md
80
79
  - lib/bcrypt.rb
81
80
  - lib/bcrypt/engine.rb
82
81
  - lib/bcrypt/error.rb
@@ -107,7 +106,6 @@ licenses:
107
106
  - MIT
108
107
  metadata:
109
108
  changelog_uri: https://github.com/bcrypt-ruby/bcrypt-ruby/blob/master/CHANGELOG
110
- post_install_message:
111
109
  rdoc_options:
112
110
  - "--title"
113
111
  - bcrypt-ruby
@@ -128,8 +126,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
128
126
  - !ruby/object:Gem::Version
129
127
  version: '0'
130
128
  requirements: []
131
- rubygems_version: 3.3.26
132
- signing_key:
129
+ rubygems_version: 3.7.2
133
130
  specification_version: 4
134
131
  summary: OpenBSD's bcrypt() password hashing algorithm.
135
132
  test_files: []