3
0
forked from pool/libgcrypt
OBS User unknown 2009-04-23 17:01:04 +00:00 committed by Git OBS Bridge
parent b865ef73c1
commit c8c3a8f3cd
6 changed files with 50 additions and 29 deletions

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:fe3b32bdf0c92d6b3bb7b3e4b3c19a6a899a9deb65f1b36f0a5882d308c91fa3
size 969240

View File

@ -0,0 +1,13 @@
Index: mpi/mpicoder.c
===================================================================
--- mpi/mpicoder.c.orig 2008-12-05 08:57:37.000000000 +0100
+++ mpi/mpicoder.c 2009-04-07 15:35:15.000000000 +0200
@@ -49,7 +49,7 @@ mpi_read_from_buffer (const unsigned cha
else if( !nbits )
{
/* log_debug ("an mpi of size 0 is not allowed\n"); */
- goto leave;
+ /* goto leave; */
}
buffer += 2;
nread = 2;

3
libgcrypt-1.4.4.tar.bz2 Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:3212b88080cf8fa006164d38fc176fafa5c29591c8384f284ab880db0dbf306f
size 1143139

View File

@ -1,12 +0,0 @@
--- mpi/mpicoder.c
+++ mpi/mpicoder.c
@@ -51,7 +51,9 @@
else if (!nbits)
{
log_error ("an mpi of size 0 is not allowed\n");
+/*
goto leave;
+*/
}
buffer += 2;
nread = 2;

View File

@ -1,3 +1,16 @@
-------------------------------------------------------------------
Tue Apr 7 15:45:06 CEST 2009 - crrodriguez@suse.de
- update to version 1.4.4
* Publish GCRY_MODULE_ID_USER and GCRY_MODULE_ID_USER_LAST constants.
This functionality has been in Libgcrypt since 1.3.0.
* MD5 may now be used in non-enforced fips mode.
* Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes.
* In fips mode, RSA keys are now generated using the X9.31 algorithm
and DSA keys using the FIPS 186-2 algorithm.
* The transient-key flag is now also supported for DSA key
generation. DSA domain parameters may be given as well.
------------------------------------------------------------------- -------------------------------------------------------------------
Thu Jan 29 10:57:01 CET 2009 - olh@suse.de Thu Jan 29 10:57:01 CET 2009 - olh@suse.de

View File

@ -1,5 +1,5 @@
# #
# spec file for package libgcrypt (Version 1.4.1) # spec file for package libgcrypt (Version 1.4.4)
# #
# Copyright (c) 2009 SUSE LINUX Products GmbH, Nuernberg, Germany. # Copyright (c) 2009 SUSE LINUX Products GmbH, Nuernberg, Germany.
# #
@ -21,8 +21,8 @@
Name: libgcrypt Name: libgcrypt
BuildRequires: libgpg-error-devel BuildRequires: libgpg-error-devel
Url: http://www.gnu.org/directory/Security/libgcrypt.html Url: http://www.gnu.org/directory/Security/libgcrypt.html
Version: 1.4.1 Version: 1.4.4
Release: 5 Release: 1
Summary: The GNU Crypto Library Summary: The GNU Crypto Library
License: GPL v2 or later; LGPL v2.1 or later License: GPL v2 or later; LGPL v2.1 or later
Group: Development/Libraries/C and C++ Group: Development/Libraries/C and C++
@ -30,7 +30,7 @@ AutoReqProv: on
Source: %name-%version.tar.bz2 Source: %name-%version.tar.bz2
Patch0: %name-ppc64.patch Patch0: %name-ppc64.patch
Patch1: libgcrypt-strict-aliasing.patch Patch1: libgcrypt-strict-aliasing.patch
Patch2: libgcrypt-mpicheck.patch Patch2: libgcrypt-1.4.4-mpicheck.patch
Patch3: libgcrypt-1.4.1-rijndael_no_strict_aliasing.patch Patch3: libgcrypt-1.4.1-rijndael_no_strict_aliasing.patch
BuildRoot: %{_tmppath}/%{name}-%{version}-build BuildRoot: %{_tmppath}/%{name}-%{version}-build
@ -85,7 +85,7 @@ Authors:
License: GNU Free Documentation License, Version 1.1 (GFDL 1.1); GPL v2 or later; LGPL v2.1 or later; X11/MIT License: GNU Free Documentation License, Version 1.1 (GFDL 1.1); GPL v2 or later; LGPL v2.1 or later; X11/MIT
Summary: The GNU Crypto Library Summary: The GNU Crypto Library
Group: Development/Libraries/C and C++ Group: Development/Libraries/C and C++
Requires: libgcrypt11 = %version, libgpg-error-devel, glibc-devel Requires: libgcrypt11 = %version libgpg-error-devel
# bug437293 # bug437293
%ifarch ppc64 %ifarch ppc64
Obsoletes: libgcrypt-devel-64bit Obsoletes: libgcrypt-devel-64bit
@ -128,17 +128,13 @@ ENABLE_DIGEST="crc md4 md5 rmd160 sha1 sha256 sha512 tiger whirlpool"
# #
%{?suse_update_config} %{?suse_update_config}
autoreconf -fi autoreconf -fi
./configure --prefix=%{_prefix} \ %configure --with-pic --libdir=/%{_lib} \
--sysconfdir=/etc \
--libdir=/%{_lib} \
--infodir=%{_infodir} \
--enable-noexecstack \ --enable-noexecstack \
--disable-static \ --disable-static \
--enable-ciphers="$ENABLE_CIPHER" \ --enable-ciphers="$ENABLE_CIPHER" \
--enable-pubkey-ciphers="$ENABLE_PUBKEY" \ --enable-pubkey-ciphers="$ENABLE_PUBKEY" \
--enable-digests="$ENABLE_DIGEST" \ --enable-digests="$ENABLE_DIGEST"
CFLAGS="$RPM_OPT_FLAGS" %{__make} %{?jobs:-j%jobs}
make
%check %check
# Nice idea. however this uses /dev/random, which hangs # Nice idea. however this uses /dev/random, which hangs
@ -150,8 +146,8 @@ make DESTDIR=$RPM_BUILD_ROOT install
# #
rm $RPM_BUILD_ROOT/%{_lib}/libgcrypt.la rm $RPM_BUILD_ROOT/%{_lib}/libgcrypt.la
mkdir -p $RPM_BUILD_ROOT%_libdir mkdir -p $RPM_BUILD_ROOT%_libdir
rm $RPM_BUILD_ROOT/%{_lib}/libgcrypt.so %{__ln_s} -v /%{_lib}/$(readlink %{buildroot}/%{_lib}/%{name}.so) %{buildroot}%{_libdir}/%{name}.so
ln -s /%{_lib}/libgcrypt.so.11 $RPM_BUILD_ROOT%{_libdir}/libgcrypt.so %{__rm} -v %{buildroot}/%{_lib}/%{name}.so
%clean %clean
rm -rf $RPM_BUILD_ROOT rm -rf $RPM_BUILD_ROOT
@ -177,12 +173,23 @@ rm -rf $RPM_BUILD_ROOT
%defattr(-,root,root) %defattr(-,root,root)
%doc %_infodir/gcrypt.info.gz %doc %_infodir/gcrypt.info.gz
%_bindir/dumpsexp %_bindir/dumpsexp
%_bindir/hmac256
%_bindir/libgcrypt-config %_bindir/libgcrypt-config
%_libdir/libgcrypt.so %_libdir/libgcrypt.so
%_includedir/gcrypt*.h %_includedir/gcrypt*.h
%_datadir/aclocal/libgcrypt.m4 %_datadir/aclocal/libgcrypt.m4
%changelog %changelog
* Tue Apr 07 2009 crrodriguez@suse.de
- update to version 1.4.4
* Publish GCRY_MODULE_ID_USER and GCRY_MODULE_ID_USER_LAST constants.
This functionality has been in Libgcrypt since 1.3.0.
* MD5 may now be used in non-enforced fips mode.
* Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes.
* In fips mode, RSA keys are now generated using the X9.31 algorithm
and DSA keys using the FIPS 186-2 algorithm.
* The transient-key flag is now also supported for DSA key
generation. DSA domain parameters may be given as well.
* Thu Jan 29 2009 olh@suse.de * Thu Jan 29 2009 olh@suse.de
- obsolete libgcrypt-error-XXbit in the library subpackage - obsolete libgcrypt-error-XXbit in the library subpackage
* Wed Dec 10 2008 olh@suse.de * Wed Dec 10 2008 olh@suse.de