From c8c3a8f3cdd31a75acc68b4dfe95c40386df4016f1a71cb2f396b4845b623012 Mon Sep 17 00:00:00 2001 From: OBS User unknown Date: Thu, 23 Apr 2009 17:01:04 +0000 Subject: [PATCH] OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libgcrypt?expand=0&rev=12 --- libgcrypt-1.4.1.tar.bz2 | 3 --- libgcrypt-1.4.4-mpicheck.patch | 13 +++++++++++++ libgcrypt-1.4.4.tar.bz2 | 3 +++ libgcrypt-mpicheck.patch | 12 ------------ libgcrypt.changes | 13 +++++++++++++ libgcrypt.spec | 35 ++++++++++++++++++++-------------- 6 files changed, 50 insertions(+), 29 deletions(-) delete mode 100644 libgcrypt-1.4.1.tar.bz2 create mode 100644 libgcrypt-1.4.4-mpicheck.patch create mode 100644 libgcrypt-1.4.4.tar.bz2 delete mode 100644 libgcrypt-mpicheck.patch diff --git a/libgcrypt-1.4.1.tar.bz2 b/libgcrypt-1.4.1.tar.bz2 deleted file mode 100644 index e7ed13f..0000000 --- a/libgcrypt-1.4.1.tar.bz2 +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:fe3b32bdf0c92d6b3bb7b3e4b3c19a6a899a9deb65f1b36f0a5882d308c91fa3 -size 969240 diff --git a/libgcrypt-1.4.4-mpicheck.patch b/libgcrypt-1.4.4-mpicheck.patch new file mode 100644 index 0000000..8c678bd --- /dev/null +++ b/libgcrypt-1.4.4-mpicheck.patch @@ -0,0 +1,13 @@ +Index: mpi/mpicoder.c +=================================================================== +--- mpi/mpicoder.c.orig 2008-12-05 08:57:37.000000000 +0100 ++++ mpi/mpicoder.c 2009-04-07 15:35:15.000000000 +0200 +@@ -49,7 +49,7 @@ mpi_read_from_buffer (const unsigned cha + else if( !nbits ) + { + /* log_debug ("an mpi of size 0 is not allowed\n"); */ +- goto leave; ++ /* goto leave; */ + } + buffer += 2; + nread = 2; diff --git a/libgcrypt-1.4.4.tar.bz2 b/libgcrypt-1.4.4.tar.bz2 new file mode 100644 index 0000000..94377d6 --- /dev/null +++ b/libgcrypt-1.4.4.tar.bz2 @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3212b88080cf8fa006164d38fc176fafa5c29591c8384f284ab880db0dbf306f +size 1143139 diff --git a/libgcrypt-mpicheck.patch b/libgcrypt-mpicheck.patch deleted file mode 100644 index d00be15..0000000 --- a/libgcrypt-mpicheck.patch +++ /dev/null @@ -1,12 +0,0 @@ ---- mpi/mpicoder.c -+++ mpi/mpicoder.c -@@ -51,7 +51,9 @@ - else if (!nbits) - { - log_error ("an mpi of size 0 is not allowed\n"); -+/* - goto leave; -+*/ - } - buffer += 2; - nread = 2; diff --git a/libgcrypt.changes b/libgcrypt.changes index 81fd14f..d2d00cb 100644 --- a/libgcrypt.changes +++ b/libgcrypt.changes @@ -1,3 +1,16 @@ +------------------------------------------------------------------- +Tue Apr 7 15:45:06 CEST 2009 - crrodriguez@suse.de + +- update to version 1.4.4 + * Publish GCRY_MODULE_ID_USER and GCRY_MODULE_ID_USER_LAST constants. + This functionality has been in Libgcrypt since 1.3.0. + * MD5 may now be used in non-enforced fips mode. + * Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes. + * In fips mode, RSA keys are now generated using the X9.31 algorithm + and DSA keys using the FIPS 186-2 algorithm. + * The transient-key flag is now also supported for DSA key + generation. DSA domain parameters may be given as well. + ------------------------------------------------------------------- Thu Jan 29 10:57:01 CET 2009 - olh@suse.de diff --git a/libgcrypt.spec b/libgcrypt.spec index c10b0c7..7c126b6 100644 --- a/libgcrypt.spec +++ b/libgcrypt.spec @@ -1,5 +1,5 @@ # -# spec file for package libgcrypt (Version 1.4.1) +# spec file for package libgcrypt (Version 1.4.4) # # Copyright (c) 2009 SUSE LINUX Products GmbH, Nuernberg, Germany. # @@ -21,8 +21,8 @@ Name: libgcrypt BuildRequires: libgpg-error-devel Url: http://www.gnu.org/directory/Security/libgcrypt.html -Version: 1.4.1 -Release: 5 +Version: 1.4.4 +Release: 1 Summary: The GNU Crypto Library License: GPL v2 or later; LGPL v2.1 or later Group: Development/Libraries/C and C++ @@ -30,7 +30,7 @@ AutoReqProv: on Source: %name-%version.tar.bz2 Patch0: %name-ppc64.patch Patch1: libgcrypt-strict-aliasing.patch -Patch2: libgcrypt-mpicheck.patch +Patch2: libgcrypt-1.4.4-mpicheck.patch Patch3: libgcrypt-1.4.1-rijndael_no_strict_aliasing.patch BuildRoot: %{_tmppath}/%{name}-%{version}-build @@ -85,7 +85,7 @@ Authors: License: GNU Free Documentation License, Version 1.1 (GFDL 1.1); GPL v2 or later; LGPL v2.1 or later; X11/MIT Summary: The GNU Crypto Library Group: Development/Libraries/C and C++ -Requires: libgcrypt11 = %version, libgpg-error-devel, glibc-devel +Requires: libgcrypt11 = %version libgpg-error-devel # bug437293 %ifarch ppc64 Obsoletes: libgcrypt-devel-64bit @@ -128,17 +128,13 @@ ENABLE_DIGEST="crc md4 md5 rmd160 sha1 sha256 sha512 tiger whirlpool" # %{?suse_update_config} autoreconf -fi -./configure --prefix=%{_prefix} \ - --sysconfdir=/etc \ - --libdir=/%{_lib} \ - --infodir=%{_infodir} \ +%configure --with-pic --libdir=/%{_lib} \ --enable-noexecstack \ --disable-static \ --enable-ciphers="$ENABLE_CIPHER" \ --enable-pubkey-ciphers="$ENABLE_PUBKEY" \ - --enable-digests="$ENABLE_DIGEST" \ - CFLAGS="$RPM_OPT_FLAGS" -make + --enable-digests="$ENABLE_DIGEST" +%{__make} %{?jobs:-j%jobs} %check # Nice idea. however this uses /dev/random, which hangs @@ -150,8 +146,8 @@ make DESTDIR=$RPM_BUILD_ROOT install # rm $RPM_BUILD_ROOT/%{_lib}/libgcrypt.la mkdir -p $RPM_BUILD_ROOT%_libdir -rm $RPM_BUILD_ROOT/%{_lib}/libgcrypt.so -ln -s /%{_lib}/libgcrypt.so.11 $RPM_BUILD_ROOT%{_libdir}/libgcrypt.so +%{__ln_s} -v /%{_lib}/$(readlink %{buildroot}/%{_lib}/%{name}.so) %{buildroot}%{_libdir}/%{name}.so +%{__rm} -v %{buildroot}/%{_lib}/%{name}.so %clean rm -rf $RPM_BUILD_ROOT @@ -177,12 +173,23 @@ rm -rf $RPM_BUILD_ROOT %defattr(-,root,root) %doc %_infodir/gcrypt.info.gz %_bindir/dumpsexp +%_bindir/hmac256 %_bindir/libgcrypt-config %_libdir/libgcrypt.so %_includedir/gcrypt*.h %_datadir/aclocal/libgcrypt.m4 %changelog +* Tue Apr 07 2009 crrodriguez@suse.de +- update to version 1.4.4 + * Publish GCRY_MODULE_ID_USER and GCRY_MODULE_ID_USER_LAST constants. + This functionality has been in Libgcrypt since 1.3.0. + * MD5 may now be used in non-enforced fips mode. + * Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes. + * In fips mode, RSA keys are now generated using the X9.31 algorithm + and DSA keys using the FIPS 186-2 algorithm. + * The transient-key flag is now also supported for DSA key + generation. DSA domain parameters may be given as well. * Thu Jan 29 2009 olh@suse.de - obsolete libgcrypt-error-XXbit in the library subpackage * Wed Dec 10 2008 olh@suse.de