Skip to content

deps(deps): bump the crypto-stack group across 1 directory with 6 updates#48

Open
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/cargo/crypto-stack-348556332a
Open

deps(deps): bump the crypto-stack group across 1 directory with 6 updates#48
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/cargo/crypto-stack-348556332a

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot Bot commented on behalf of github May 7, 2026

Bumps the crypto-stack group with 6 updates in the / directory:

Package From To
blake3 1.8.3 1.8.5
aes 0.8.4 0.9.0
cipher 0.4.4 0.5.1
xts-mode 0.5.1 0.6.0
hmac 0.12.1 0.13.0
sha2 0.10.9 0.11.0

Updates blake3 from 1.8.3 to 1.8.5

Release notes

Sourced from blake3's releases.

1.8.5

version 1.8.5

Changes since 1.8.4:

  • Forcibly disable LTO when compiling C intrinsics from the Rust build. This fixes a build break on Arch Linux ARM: BLAKE3-team/BLAKE3#550

1.8.4

version 1.8.4

Changes since 1.8.3:

  • Updated the digest dependency from v0.10 to v0.11. THIS IS A POTENTIALLY BREAKING CHANGE for callers using the traits-preview Cargo feature. But this is not considered a breaking change for the blake3 crate itself; see the docs for traits-preview.
  • Performance for WASM SIMD targets is improved by ~20% when the wasm32_simd feature is enabled. Contributed by @​lamb356.
Commits
  • 93a431c version 1.8.5
  • 299b1e2 fix LTO builds by disabling LTO
  • 6a45fee add LTO builds to CI
  • 15e83a5 c: Use correct SIMD flags when compiling with Clang-Cl (#549)
  • 2e3727d cargo fmt everywhere
  • b97a24f version 1.8.4
  • 0ebe469 update to new rustcrypto trait releases
  • d4b005a wasm32_simd: use i8x16_shuffle for rot8 and rot16
  • 6eebbbd fix a struct size mismatch in tests
  • fb1411e c: use SIZE_MAX instead of -1 for size_t sentinels, add <stdint.h>
  • See full diff in compare view

Updates aes from 0.8.4 to 0.9.0

Commits

Updates cipher from 0.4.4 to 0.5.1

Commits

Updates xts-mode from 0.5.1 to 0.6.0

Changelog

Sourced from xts-mode's changelog.

[0.6.0] - 2026-05-05

Changed

  • Breaking: Update cipher to 0.5.1 and aes examples / tests to 0.9.0.
  • Breaking: The cipher block size is now enforced at the type level.
    • This also removes the possibility of methods panicking due to an incorrect block size.
  • Breaking: Tweak inputs and examples now use hybrid_array::Array instead of the array primitive, following upstream.
  • Increase MSRV to 1.85 and update to edition 2024.
  • Improve and simplify core logic

Removed

  • Breaking: Remove unused std feature.
  • Remove byteorder dependency.
  • Remove trait bounds from the Xts128 struct, applying them only to implementations.
Commits
  • ce5a8ef Bump version and update CHANGELOG.md
  • 338c6f6 Update top-level docs and README.md
  • f628265 Simplify panic message
  • 15c3673 Simplify galois_field_128_mul_le
  • 6b2259d Simplify stealing logic
  • 405a564 Remove trait bounds from Xts128 struct
  • 7a68d8e Use hybrid-array instead of primitive array
  • 1e4b5c4 Update to cipher 0.5 and aes to 0.9
  • 880f316 Remove byteorder dependency
  • 3d7838c Remove unused std feature
  • Additional commits viewable in compare view

Updates hmac from 0.12.1 to 0.13.0

Commits

Updates sha2 from 0.10.9 to 0.11.0

Commits

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

…ates

Bumps the crypto-stack group with 6 updates in the / directory:

| Package | From | To |
| --- | --- | --- |
| [blake3](https://github.com/BLAKE3-team/BLAKE3) | `1.8.3` | `1.8.5` |
| [aes](https://github.com/RustCrypto/block-ciphers) | `0.8.4` | `0.9.0` |
| [cipher](https://github.com/RustCrypto/traits) | `0.4.4` | `0.5.1` |
| [xts-mode](https://github.com/pheki/xts-mode) | `0.5.1` | `0.6.0` |
| [hmac](https://github.com/RustCrypto/MACs) | `0.12.1` | `0.13.0` |
| [sha2](https://github.com/RustCrypto/hashes) | `0.10.9` | `0.11.0` |



Updates `blake3` from 1.8.3 to 1.8.5
- [Release notes](https://github.com/BLAKE3-team/BLAKE3/releases)
- [Commits](BLAKE3-team/BLAKE3@1.8.3...1.8.5)

Updates `aes` from 0.8.4 to 0.9.0
- [Commits](RustCrypto/block-ciphers@aes-v0.8.4...aes-v0.9.0)

Updates `cipher` from 0.4.4 to 0.5.1
- [Commits](RustCrypto/traits@cipher-v0.4.4...cipher-v0.5.1)

Updates `xts-mode` from 0.5.1 to 0.6.0
- [Changelog](https://github.com/pheki/xts-mode/blob/main/CHANGELOG.md)
- [Commits](pheki/xts-mode@v0.5.1...v0.6.0)

Updates `hmac` from 0.12.1 to 0.13.0
- [Commits](RustCrypto/MACs@hmac-v0.12.1...hmac-v0.13.0)

Updates `sha2` from 0.10.9 to 0.11.0
- [Commits](RustCrypto/hashes@sha2-v0.10.9...sha2-v0.11.0)

---
updated-dependencies:
- dependency-name: blake3
  dependency-version: 1.8.5
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: crypto-stack
- dependency-name: aes
  dependency-version: 0.9.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: crypto-stack
- dependency-name: cipher
  dependency-version: 0.5.1
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: crypto-stack
- dependency-name: xts-mode
  dependency-version: 0.6.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: crypto-stack
- dependency-name: hmac
  dependency-version: 0.13.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: crypto-stack
- dependency-name: sha2
  dependency-version: 0.11.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: crypto-stack
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot @github
Copy link
Copy Markdown
Contributor Author

dependabot Bot commented on behalf of github May 7, 2026

Labels

The following labels could not be found: dependencies. Please create it before Dependabot can add it to a pull request.

Please fix the above issues or remove invalid values from dependabot.yml.

@dependabot dependabot Bot added the security label May 7, 2026
@dependabot dependabot Bot requested a review from saworbit as a code owner May 7, 2026 22:58
@dependabot dependabot Bot added the security label May 7, 2026
@github-actions github-actions Bot added build and removed security labels May 7, 2026
@augmentcode
Copy link
Copy Markdown

augmentcode Bot commented May 7, 2026

🤖 Augment PR Summary

Summary: This PR updates the workspace’s Tier-0 cryptography dependency set (“crypto-stack” Dependabot group).

Changes:

  • Bumped blake3 from 1.8.3 to 1.8.5 (patch release).
  • Bumped aes from 0.8.4 to 0.9.0 (breaking semver change for 0.x).
  • Bumped cipher from 0.4.4 to 0.5.1 (breaking semver change for 0.x).
  • Bumped xts-mode from 0.5.1 to 0.6.0 (breaking semver change for 0.x; ties to XTS usage).
  • Bumped hmac from 0.12.1 to 0.13.0 (breaking semver change for 0.x).
  • Bumped sha2 from 0.10.9 to 0.11.0 (breaking semver change for 0.x).

Technical Notes: These are pinned exact versions under [workspace.dependencies] and affect Phase 3 encryption primitives (XTS/AES/HMAC/SHA2) used by crates/encryption.

🤖 Was this summary useful? React with 👍 or 👎

Copy link
Copy Markdown

@augmentcode augmentcode Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Review completed. 2 suggestions posted.

Fix All in Augment

Comment augment review to trigger a new review at any time.

Comment thread Cargo.toml
aes = { version = "=0.8.4" } # 2025-11-03 sw: AES-NI optimized, matches Phase3 design
cipher = { version = "=0.4.4" } # 2025-11-03 sw: trait glue for AES/Poly1305 stack
xts-mode = { version = "=0.5.1" } # 2025-11-03 sw: XTS primitive, matches patentable_concepts.md guidance
aes = { version = "=0.9.0" } # 2025-11-03 sw: AES-NI optimized, matches Phase3 design
Copy link
Copy Markdown

@augmentcode augmentcode Bot May 7, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

aes/cipher/xts-mode/hmac/sha2 are all breaking bumps (0.x minor-to-minor), and docs/dependency-security.md says Dependabot major bumps require manual migration/review (and typically attached audit artifacts) before merging. As-is this looks like it may violate that policy even if CI is green.

Severity: medium

Other Locations
  • Cargo.toml:82
  • Cargo.toml:83
  • Cargo.toml:87
  • Cargo.toml:88

Fix This in Augment

🤖 Was this useful? React with 👍 or 👎, or 🚀 if it prevented an incident/outage.

Comment thread Cargo.toml
serde_json = { version = "=1.0.145" } # 2025-11-03 sw: deterministic JSON for protocol surfaces
serde_yaml = { version = "0.9" } # YAML parsing for CLI policies
blake3 = { version = "=1.8.3" } # 2025-11-03 sw: convergent hash, SIMD constant-time per upstream audit
blake3 = { version = "=1.8.5" } # 2025-11-03 sw: convergent hash, SIMD constant-time per upstream audit
Copy link
Copy Markdown

@augmentcode augmentcode Bot May 7, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The Tier-0 pin comment still shows the old review timestamp/initials even though the pinned version changed; per docs/dependency-security.md “Pinning & Metadata”, the reviewer/timestamp note is supposed to reflect the approved version. Otherwise the manifest comment trail becomes misleading for crypto review/audit purposes.

Severity: low

Other Locations
  • Cargo.toml:81
  • Cargo.toml:82
  • Cargo.toml:83
  • Cargo.toml:87
  • Cargo.toml:88

Fix This in Augment

🤖 Was this useful? React with 👍 or 👎, or 🚀 if it prevented an incident/outage.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants