SHA256
1
0
forked from pool/libgcrypt
OBS User unknown 2009-04-23 17:01:04 +00:00 committed by Git OBS Bridge
parent b865ef73c1
commit c8c3a8f3cd
6 changed files with 50 additions and 29 deletions

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:fe3b32bdf0c92d6b3bb7b3e4b3c19a6a899a9deb65f1b36f0a5882d308c91fa3
size 969240

View File

@ -0,0 +1,13 @@
Index: mpi/mpicoder.c
===================================================================
--- mpi/mpicoder.c.orig 2008-12-05 08:57:37.000000000 +0100
+++ mpi/mpicoder.c 2009-04-07 15:35:15.000000000 +0200
@@ -49,7 +49,7 @@ mpi_read_from_buffer (const unsigned cha
else if( !nbits )
{
/* log_debug ("an mpi of size 0 is not allowed\n"); */
- goto leave;
+ /* goto leave; */
}
buffer += 2;
nread = 2;

3
libgcrypt-1.4.4.tar.bz2 Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:3212b88080cf8fa006164d38fc176fafa5c29591c8384f284ab880db0dbf306f
size 1143139

View File

@ -1,12 +0,0 @@
--- mpi/mpicoder.c
+++ mpi/mpicoder.c
@@ -51,7 +51,9 @@
else if (!nbits)
{
log_error ("an mpi of size 0 is not allowed\n");
+/*
goto leave;
+*/
}
buffer += 2;
nread = 2;

View File

@ -1,3 +1,16 @@
-------------------------------------------------------------------
Tue Apr 7 15:45:06 CEST 2009 - crrodriguez@suse.de
- update to version 1.4.4
* Publish GCRY_MODULE_ID_USER and GCRY_MODULE_ID_USER_LAST constants.
This functionality has been in Libgcrypt since 1.3.0.
* MD5 may now be used in non-enforced fips mode.
* Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes.
* In fips mode, RSA keys are now generated using the X9.31 algorithm
and DSA keys using the FIPS 186-2 algorithm.
* The transient-key flag is now also supported for DSA key
generation. DSA domain parameters may be given as well.
-------------------------------------------------------------------
Thu Jan 29 10:57:01 CET 2009 - olh@suse.de

View File

@ -1,5 +1,5 @@
#
# spec file for package libgcrypt (Version 1.4.1)
# spec file for package libgcrypt (Version 1.4.4)
#
# Copyright (c) 2009 SUSE LINUX Products GmbH, Nuernberg, Germany.
#
@ -21,8 +21,8 @@
Name: libgcrypt
BuildRequires: libgpg-error-devel
Url: http://www.gnu.org/directory/Security/libgcrypt.html
Version: 1.4.1
Release: 5
Version: 1.4.4
Release: 1
Summary: The GNU Crypto Library
License: GPL v2 or later; LGPL v2.1 or later
Group: Development/Libraries/C and C++
@ -30,7 +30,7 @@ AutoReqProv: on
Source: %name-%version.tar.bz2
Patch0: %name-ppc64.patch
Patch1: libgcrypt-strict-aliasing.patch
Patch2: libgcrypt-mpicheck.patch
Patch2: libgcrypt-1.4.4-mpicheck.patch
Patch3: libgcrypt-1.4.1-rijndael_no_strict_aliasing.patch
BuildRoot: %{_tmppath}/%{name}-%{version}-build
@ -85,7 +85,7 @@ Authors:
License: GNU Free Documentation License, Version 1.1 (GFDL 1.1); GPL v2 or later; LGPL v2.1 or later; X11/MIT
Summary: The GNU Crypto Library
Group: Development/Libraries/C and C++
Requires: libgcrypt11 = %version, libgpg-error-devel, glibc-devel
Requires: libgcrypt11 = %version libgpg-error-devel
# bug437293
%ifarch ppc64
Obsoletes: libgcrypt-devel-64bit
@ -128,17 +128,13 @@ ENABLE_DIGEST="crc md4 md5 rmd160 sha1 sha256 sha512 tiger whirlpool"
#
%{?suse_update_config}
autoreconf -fi
./configure --prefix=%{_prefix} \
--sysconfdir=/etc \
--libdir=/%{_lib} \
--infodir=%{_infodir} \
%configure --with-pic --libdir=/%{_lib} \
--enable-noexecstack \
--disable-static \
--enable-ciphers="$ENABLE_CIPHER" \
--enable-pubkey-ciphers="$ENABLE_PUBKEY" \
--enable-digests="$ENABLE_DIGEST" \
CFLAGS="$RPM_OPT_FLAGS"
make
--enable-digests="$ENABLE_DIGEST"
%{__make} %{?jobs:-j%jobs}
%check
# Nice idea. however this uses /dev/random, which hangs
@ -150,8 +146,8 @@ make DESTDIR=$RPM_BUILD_ROOT install
#
rm $RPM_BUILD_ROOT/%{_lib}/libgcrypt.la
mkdir -p $RPM_BUILD_ROOT%_libdir
rm $RPM_BUILD_ROOT/%{_lib}/libgcrypt.so
ln -s /%{_lib}/libgcrypt.so.11 $RPM_BUILD_ROOT%{_libdir}/libgcrypt.so
%{__ln_s} -v /%{_lib}/$(readlink %{buildroot}/%{_lib}/%{name}.so) %{buildroot}%{_libdir}/%{name}.so
%{__rm} -v %{buildroot}/%{_lib}/%{name}.so
%clean
rm -rf $RPM_BUILD_ROOT
@ -177,12 +173,23 @@ rm -rf $RPM_BUILD_ROOT
%defattr(-,root,root)
%doc %_infodir/gcrypt.info.gz
%_bindir/dumpsexp
%_bindir/hmac256
%_bindir/libgcrypt-config
%_libdir/libgcrypt.so
%_includedir/gcrypt*.h
%_datadir/aclocal/libgcrypt.m4
%changelog
* Tue Apr 07 2009 crrodriguez@suse.de
- update to version 1.4.4
* Publish GCRY_MODULE_ID_USER and GCRY_MODULE_ID_USER_LAST constants.
This functionality has been in Libgcrypt since 1.3.0.
* MD5 may now be used in non-enforced fips mode.
* Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes.
* In fips mode, RSA keys are now generated using the X9.31 algorithm
and DSA keys using the FIPS 186-2 algorithm.
* The transient-key flag is now also supported for DSA key
generation. DSA domain parameters may be given as well.
* Thu Jan 29 2009 olh@suse.de
- obsolete libgcrypt-error-XXbit in the library subpackage
* Wed Dec 10 2008 olh@suse.de