Bump golang.org/x/crypto from 0.17.0 to 0.45.0#76
Merged
NamelessOne91 merged 1 commit intomasterfrom Feb 17, 2026
Merged
Conversation
Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.17.0 to 0.45.0. - [Commits](golang/crypto@v0.17.0...v0.45.0) --- updated-dependencies: - dependency-name: golang.org/x/crypto dependency-version: 0.45.0 dependency-type: indirect ... Signed-off-by: dependabot[bot] <[email protected]>
There was a problem hiding this comment.
Pull request overview
This PR updates the vendored Go dependencies golang.org/x/crypto and golang.org/x/sys to newer versions, refreshing cryptographic implementations and CPU feature detection code used by transitive dependencies in this repository.
Changes:
- Bump
golang.org/x/cryptofromv0.17.0tov0.45.0andgolang.org/x/sysfromv0.16.0tov0.38.0. - Update vendored
x/sys/cpuwith new architecture/OS feature detection (Darwin AVX512 checks, ARM64 additions, Loong64 and RISC-V support). - Refactor vendored
x/crypto/sha3to primarily wrap the standard librarycrypto/sha3, retaining only legacy Keccak implementations.
Reviewed changes
Copilot reviewed 1 out of 52 changed files in this pull request and generated no comments.
Show a summary per file
| File | Description |
|---|---|
go.mod |
Updates indirect requirements for golang.org/x/crypto and golang.org/x/sys. |
go.sum |
Updates checksums for bumped x/crypto and x/sys versions. |
vendor/modules.txt |
Updates vendored module versions and their go version annotations. |
vendor/golang.org/x/crypto/LICENSE |
Vendored license text updated to upstream version. |
vendor/golang.org/x/crypto/argon2/argon2.go |
Updates Argon2 documentation references (RFC 9106 links, spec reference). |
vendor/golang.org/x/crypto/blake2b/blake2b_amd64.s |
Replaces/updates amd64 assembly with upstream generated implementation. |
vendor/golang.org/x/crypto/blake2b/blake2x.go |
Enhances XOF interface docs and adds BlockSize method on XOF implementation. |
vendor/golang.org/x/crypto/blake2b/go125.go |
Adds Go version–gated hash.XOF conformance assertion (build-tagged). |
vendor/golang.org/x/crypto/cast5/cast5.go |
Removes legacy // import comment style in package declaration. |
vendor/golang.org/x/crypto/hkdf/hkdf.go |
Removes legacy // import comment style in package declaration. |
vendor/golang.org/x/crypto/sha3/doc.go |
Removes old package-level documentation file (now documented in hashes.go). |
vendor/golang.org/x/crypto/sha3/hashes.go |
Switches SHA3 fixed-output constructors/sum helpers to wrappers around crypto/sha3. |
vendor/golang.org/x/crypto/sha3/hashes_generic.go |
Removes generic asm-selection stubs (no longer needed with stdlib wrapper approach). |
vendor/golang.org/x/crypto/sha3/keccakf_amd64.go |
Removes amd64 keccak permutation declaration (no longer used for SHA3/SHAKE wrappers). |
vendor/golang.org/x/crypto/sha3/keccakf_amd64.s |
Removes amd64 KeccakF-1600 assembly implementation (no longer used for SHA3/SHAKE wrappers). |
vendor/golang.org/x/crypto/sha3/legacy_hash.go |
Adds legacy Keccak hashing implementation retained outside stdlib crypto/sha3. |
vendor/golang.org/x/crypto/sha3/legacy_keccakf.go |
Keeps legacy Keccak permutation implementation; adds clarifying comment on scope. |
vendor/golang.org/x/crypto/sha3/register.go |
Removes legacy crypto.RegisterHash init-based registration file. |
vendor/golang.org/x/crypto/sha3/sha3.go |
Removes previous sponge/state SHA3 implementation (replaced by stdlib wrapper). |
vendor/golang.org/x/crypto/sha3/sha3_s390x.go |
Removes s390x accelerated SHA3/SHAKE implementation (replaced by stdlib wrapper). |
vendor/golang.org/x/crypto/sha3/sha3_s390x.s |
Removes s390x SHA3 assembly implementation. |
vendor/golang.org/x/crypto/sha3/shake.go |
Switches SHAKE/cSHAKE to wrappers around crypto/sha3 plus wrapper type for interface compatibility. |
vendor/golang.org/x/crypto/sha3/shake_generic.go |
Removes generic asm-selection stubs for SHAKE. |
vendor/golang.org/x/crypto/sha3/xor.go |
Removes old XOR/copy-out selection glue (obsolete with wrapper approach). |
vendor/golang.org/x/crypto/sha3/xor_generic.go |
Removes generic XOR/copy-out implementation (obsolete with wrapper approach). |
vendor/golang.org/x/crypto/sha3/xor_unaligned.go |
Removes unaligned XOR/copy-out implementation (obsolete with wrapper approach). |
vendor/golang.org/x/sys/LICENSE |
Vendored license text updated to upstream version. |
vendor/golang.org/x/sys/cpu/asm_darwin_x86_gc.s |
Adds Darwin amd64 gc trampolines for sysctl calls. |
vendor/golang.org/x/sys/cpu/cpu.go |
Adds new CPU feature flags/structs (ARM64, Loong64, RISCV64, new X86 flags). |
vendor/golang.org/x/sys/cpu/cpu_arm64.go |
Extends ARM64 option flags and parsing to include MMFR1/ZFR0-derived features (SVE2/DIT/I8MM/etc.). |
vendor/golang.org/x/sys/cpu/cpu_arm64.s |
Updates ARM64 register reads to use MRS instructions and adds MMFR1/ZFR0 accessors. |
vendor/golang.org/x/sys/cpu/cpu_darwin_x86.go |
Adds Darwin-specific AVX512 enablement and kernel version safety checks. |
vendor/golang.org/x/sys/cpu/cpu_gc_arm64.go |
Adds new ARM64 register accessor declarations (MMFR1/ZFR0). |
vendor/golang.org/x/sys/cpu/cpu_gc_x86.go |
Updates comments to reference correct assembly filenames. |
vendor/golang.org/x/sys/cpu/cpu_gc_x86.s |
Minor formatting/gofmt alignment change in x86 assembly. |
vendor/golang.org/x/sys/cpu/cpu_gccgo_arm64.go |
Adds stub getmmfr1 for gccgo ARM64 builds. |
vendor/golang.org/x/sys/cpu/cpu_gccgo_x86.go |
Removes gccgo Darwin-specific AVX512 helper that previously returned false. |
vendor/golang.org/x/sys/cpu/cpu_linux_arm64.go |
Adds Linux ARM64 HWCAP/HWCAP2 feature detection (DIT, SVE2, I8MM). |
vendor/golang.org/x/sys/cpu/cpu_linux_loong64.go |
Adds Loong64 Linux HWCAP feature detection file. |
vendor/golang.org/x/sys/cpu/cpu_linux_noinit.go |
Updates linux “noinit” build tag exclusions to account for loong64/riscv64. |
vendor/golang.org/x/sys/cpu/cpu_linux_riscv64.go |
Adds Linux RISC-V hwprobe syscall based feature detection with HWCAP fallback. |
vendor/golang.org/x/sys/cpu/cpu_loong64.go |
Adds Loong64 feature bits, options, and CPUCFG-based feature discovery. |
vendor/golang.org/x/sys/cpu/cpu_loong64.s |
Adds LoongArch assembly helper for CPUCFG reads. |
vendor/golang.org/x/sys/cpu/cpu_netbsd_arm64.go |
Updates ARM64 system register parsing call signature to include MMFR1. |
vendor/golang.org/x/sys/cpu/cpu_openbsd_arm64.go |
Updates ARM64 system register parsing call signature to include MMFR1. |
vendor/golang.org/x/sys/cpu/cpu_other_x86.go |
Adds non-Darwin-gc build fallback darwinSupportsAVX512 that panics if called. |
vendor/golang.org/x/sys/cpu/cpu_riscv64.go |
Implements RISC-V options mapping for new feature flags. |
vendor/golang.org/x/sys/cpu/cpu_x86.go |
Adds new x86 options and updates AVX512 OS support logic for Darwin. |
vendor/golang.org/x/sys/cpu/parse.go |
Uses integer-range iteration style in release parsing loops. |
vendor/golang.org/x/sys/cpu/syscall_darwin_x86_gc.go |
Adds minimal sysctl/sysctlbyname support for Darwin amd64 gc without depending on x/sys/unix. |
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Bumps golang.org/x/crypto from 0.17.0 to 0.45.0.
Commits
4e0068cgo.mod: update golang.org/x dependenciese79546essh: curb GSSAPI DoS risk by limiting number of specified OIDsf91f7a7ssh/agent: prevent panic on malformed constraint2df4153acme/autocert: let automatic renewal work with short lifetime certsbcf6a84acme: pass context to requestb4f2b62ssh: fix error message on unsupported cipher79ec3a5ssh: allow to bind to a hostname in remote forwarding122a78fgo.mod: update golang.org/x dependenciesc0531f9all: eliminate vet diagnostics0997000all: fix some commentsYou can trigger a rebase of this PR by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)You can disable automated security fix PRs for this repo from the Security Alerts page.