commit libgcrypt for openSUSE:Factory
Hello community, here is the log from the commit of package libgcrypt for openSUSE:Factory checked in at Thu Apr 23 19:01:01 CEST 2009. -------- --- libgcrypt/libgcrypt.changes 2009-01-29 11:15:49.000000000 +0100 +++ libgcrypt/libgcrypt.changes 2009-04-07 15:45:28.000000000 +0200 @@ -1,0 +2,13 @@ +Tue Apr 7 15:45:06 CEST 2009 - crrodriguez@suse.de + +- update to version 1.4.4 + * Publish GCRY_MODULE_ID_USER and GCRY_MODULE_ID_USER_LAST constants. + This functionality has been in Libgcrypt since 1.3.0. + * MD5 may now be used in non-enforced fips mode. + * Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes. + * In fips mode, RSA keys are now generated using the X9.31 algorithm + and DSA keys using the FIPS 186-2 algorithm. + * The transient-key flag is now also supported for DSA key + generation. DSA domain parameters may be given as well. + +------------------------------------------------------------------- calling whatdependson for head-i586 Old: ---- libgcrypt-1.4.1.tar.bz2 libgcrypt-mpicheck.patch New: ---- libgcrypt-1.4.4-mpicheck.patch libgcrypt-1.4.4.tar.bz2 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ libgcrypt.spec ++++++ --- /var/tmp/diff_new_pack.K17121/_old 2009-04-23 18:52:58.000000000 +0200 +++ /var/tmp/diff_new_pack.K17121/_new 2009-04-23 18:52:58.000000000 +0200 @@ -1,5 +1,5 @@ # -# spec file for package libgcrypt (Version 1.4.1) +# spec file for package libgcrypt (Version 1.4.4) # # Copyright (c) 2009 SUSE LINUX Products GmbH, Nuernberg, Germany. # @@ -21,8 +21,8 @@ Name: libgcrypt BuildRequires: libgpg-error-devel Url: http://www.gnu.org/directory/Security/libgcrypt.html -Version: 1.4.1 -Release: 5 +Version: 1.4.4 +Release: 1 Summary: The GNU Crypto Library License: GPL v2 or later; LGPL v2.1 or later Group: Development/Libraries/C and C++ @@ -30,7 +30,7 @@ Source: %name-%version.tar.bz2 Patch0: %name-ppc64.patch Patch1: libgcrypt-strict-aliasing.patch -Patch2: libgcrypt-mpicheck.patch +Patch2: libgcrypt-1.4.4-mpicheck.patch Patch3: libgcrypt-1.4.1-rijndael_no_strict_aliasing.patch BuildRoot: %{_tmppath}/%{name}-%{version}-build @@ -85,7 +85,7 @@ License: GNU Free Documentation License, Version 1.1 (GFDL 1.1); GPL v2 or later; LGPL v2.1 or later; X11/MIT Summary: The GNU Crypto Library Group: Development/Libraries/C and C++ -Requires: libgcrypt11 = %version, libgpg-error-devel, glibc-devel +Requires: libgcrypt11 = %version libgpg-error-devel # bug437293 %ifarch ppc64 Obsoletes: libgcrypt-devel-64bit @@ -128,17 +128,13 @@ # %{?suse_update_config} autoreconf -fi -./configure --prefix=%{_prefix} \ - --sysconfdir=/etc \ - --libdir=/%{_lib} \ - --infodir=%{_infodir} \ +%configure --with-pic --libdir=/%{_lib} \ --enable-noexecstack \ --disable-static \ --enable-ciphers="$ENABLE_CIPHER" \ --enable-pubkey-ciphers="$ENABLE_PUBKEY" \ - --enable-digests="$ENABLE_DIGEST" \ - CFLAGS="$RPM_OPT_FLAGS" -make + --enable-digests="$ENABLE_DIGEST" +%{__make} %{?jobs:-j%jobs} %check # Nice idea. however this uses /dev/random, which hangs @@ -150,8 +146,8 @@ # rm $RPM_BUILD_ROOT/%{_lib}/libgcrypt.la mkdir -p $RPM_BUILD_ROOT%_libdir -rm $RPM_BUILD_ROOT/%{_lib}/libgcrypt.so -ln -s /%{_lib}/libgcrypt.so.11 $RPM_BUILD_ROOT%{_libdir}/libgcrypt.so +%{__ln_s} -v /%{_lib}/$(readlink %{buildroot}/%{_lib}/%{name}.so) %{buildroot}%{_libdir}/%{name}.so +%{__rm} -v %{buildroot}/%{_lib}/%{name}.so %clean rm -rf $RPM_BUILD_ROOT @@ -177,12 +173,23 @@ %defattr(-,root,root) %doc %_infodir/gcrypt.info.gz %_bindir/dumpsexp +%_bindir/hmac256 %_bindir/libgcrypt-config %_libdir/libgcrypt.so %_includedir/gcrypt*.h %_datadir/aclocal/libgcrypt.m4 %changelog +* Tue Apr 07 2009 crrodriguez@suse.de +- update to version 1.4.4 + * Publish GCRY_MODULE_ID_USER and GCRY_MODULE_ID_USER_LAST constants. + This functionality has been in Libgcrypt since 1.3.0. + * MD5 may now be used in non-enforced fips mode. + * Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes. + * In fips mode, RSA keys are now generated using the X9.31 algorithm + and DSA keys using the FIPS 186-2 algorithm. + * The transient-key flag is now also supported for DSA key + generation. DSA domain parameters may be given as well. * Thu Jan 29 2009 olh@suse.de - obsolete libgcrypt-error-XXbit in the library subpackage * Wed Dec 10 2008 olh@suse.de ++++++ libgcrypt-1.4.4-mpicheck.patch ++++++ Index: mpi/mpicoder.c =================================================================== --- mpi/mpicoder.c.orig 2008-12-05 08:57:37.000000000 +0100 +++ mpi/mpicoder.c 2009-04-07 15:35:15.000000000 +0200 @@ -49,7 +49,7 @@ mpi_read_from_buffer (const unsigned cha else if( !nbits ) { /* log_debug ("an mpi of size 0 is not allowed\n"); */ - goto leave; + /* goto leave; */ } buffer += 2; nread = 2; ++++++ libgcrypt-1.4.1.tar.bz2 -> libgcrypt-1.4.4.tar.bz2 ++++++ ++++ 52533 lines of diff (skipped) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Remember to have fun... -- To unsubscribe, e-mail: opensuse-commit+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-commit+help@opensuse.org
participants (1)
-
root@Hilbert.suse.de