Changelog for
perl-Crypt-OpenPGP-1.12-lp150.2.1.noarch.rpm :
* Sat Jan 19 2019 Pedro Monreal Gonzalez
- Fix build
* Choose perl(Alt::Crypt::RSA::BigInt) as alternative for perl(Crypt::RSA)
* Added random source in tests by adding perl(Bytes::Random::Secure)
* Wed Dec 02 2015 tchvatalAATTsuse.com- Disable the t/13-keygen.t, the magical entropy generating attempts fail
* Mon Nov 30 2015 tchvatalAATTsuse.com- Update to 1.12:
* Fixes tests so this package no longer gets stuck in OBS
* List of upstream changes: - Add NoVersion parameter to CO::Armour->armour (GH#26) - Check that Crypt::OpenPGP::Cipher->new succeeded, RT#14033. - Fix GH#7, when false data was discarded (AATTCamspi). - Update GnuPG defaults (AATTbk2204). - Fix error propagation on generating RSA key (AATTniner). - Require Digest::SHA instead of Digest::SHA1, RT#82316 (AATTbk2204). - Move distribution to Dist::Zilla. - Require Alt::Crypt::RSA::BigInt instead of Crypt::RSA. - Apply a patch from RT#82314 (AATTbk2204, AATTkmx). - Add a test case from GH#7, yet to be fixed (AATTthroughnothing). - Reformatted Changes as per CPAN::Changes::Spec. - Fixed hash randomisation bug (RT#81442). - Documentation now references most recent \"OpenPGP Message Format\" RFC. - Fixed typo in Pod (AATTdsteinbrunner). - Improved ASCII armor detection (AATTgwillen).
* Wed Jun 08 2011 jwAATTnovell.com- t/13-keygen.t needs more entropy than there is in the buildservice. adding some pings, hoping for two effects: a) output printed in regular intervals prevents us from being killed. b) networktraffic through localhost may generate some entropy.
* Tue Jun 07 2011 jwAATTnovell.com- rm -f needed to survive empty lists.- initial pull from CPAN with cpanspec_obs-0.8- initial package 1.06
* created by cpanspec 1.78.04