Changelog for
perl-Crypt-OpenPGP-1.12-1.1.noarch.rpm :
Wed Dec 2 13:00:00 2015 tchvatalAATTsuse.com
- Disable the t/13-keygen.t, the magical entropy generating attempts
fail
Mon Nov 30 13:00:00 2015 tchvatalAATTsuse.com
- Update to 1.12:
* Fixes tests so this package no longer gets stuck in OBS
* List of upstream changes:
- Add NoVersion parameter to CO::Armour->armour (GH#26)
- Check that Crypt::OpenPGP::Cipher->new succeeded, RT#14033.
- Fix GH#7, when false data was discarded (AATTCamspi).
- Update GnuPG defaults (AATTbk2204).
- Fix error propagation on generating RSA key (AATTniner).
- Require Digest::SHA instead of Digest::SHA1, RT#82316 (AATTbk2204).
- Move distribution to Dist::Zilla.
- Require Alt::Crypt::RSA::BigInt instead of Crypt::RSA.
- Apply a patch from RT#82314 (AATTbk2204, AATTkmx).
- Add a test case from GH#7, yet to be fixed (AATTthroughnothing).
- Reformatted Changes as per CPAN::Changes::Spec.
- Fixed hash randomisation bug (RT#81442).
- Documentation now references most recent \"OpenPGP Message Format\" RFC.
- Fixed typo in Pod (AATTdsteinbrunner).
- Improved ASCII armor detection (AATTgwillen).
Wed Jun 8 14:00:00 2011 jwAATTnovell.com
- t/13-keygen.t needs more entropy than there is in the buildservice.
adding some pings, hoping for two effects:
a) output printed in regular intervals prevents us from being killed.
b) networktraffic through localhost may generate some entropy.
Tue Jun 7 14:00:00 2011 jwAATTnovell.com
- rm -f needed to survive empty lists.
- initial pull from CPAN with cpanspec_obs-0.8
- initial package 1.06
* created by cpanspec 1.78.04