SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for libgcrypt20-32bit-1.7.8-136.1.x86_64.rpm :
Thu Jun 29 14:00:00 2017 astiegerAATTsuse.com
- libgcrypt 1.7.8:

* CVE-2017-7526: Mitigate a flush+reload side-channel attack on
RSA secret keys (bsc#1046607)

Sun Jun 4 14:00:00 2017 astiegerAATTsuse.com
- libgcrypt 1.7.7:

* Fix possible timing attack on EdDSA session key (previously
patched, drop libgcrypt-secure-EdDSA-session-key.patch)

* Fix long standing bug in secure memory implementation which
could lead to a segv on free

Fri Jun 2 14:00:00 2017 pmonrealgonzalezAATTsuse.com
- Added libgcrypt-secure-EdDSA-session-key.patch [bsc#1042326]

* Store the session key in secure memory to ensure that constant
time point operations are used in the MPI library.

Fri Jan 20 13:00:00 2017 rmaliskaAATTsuse.com
- libgcrypt 1.7.6:

* Fix counter operand from read-only to read/write

* Fix too large jump alignment in mpih-rshift

Thu Dec 15 13:00:00 2016 astiegerAATTsuse.com
- libgcrypt 1.7.5:

* Fix regression in mlock detection introduced with 1.7.4

Tue Dec 13 13:00:00 2016 astiegerAATTsuse.com
- libgcrypt 1.7.4:

* ARMv8/AArch32 performance improvements for AES, GCM, SHA-256,
and SHA-1.

* Add ARMv8/AArch32 assembly implementation for Twofish and
Camellia.

* Add bulk processing implementation for ARMv8/AArch32.

* Add Stribog OIDs.

* Improve the DRBG performance and sync the code with the Linux
version.

* When secure memory is requested by the MPI functions or by
gcry_xmalloc_secure, they do not anymore lead to a fatal error
if the secure memory pool is used up. Instead new pools are
allocated as needed. These new pools are not protected against
being swapped out (mlock can\'t be used). Mitigation for
minor confidentiality issues is encryption swap space.

* Fix GOST 28147 CryptoPro-B S-box.

* Fix error code handling of mlock calls.

Sat Aug 20 14:00:00 2016 mpluskal,vcizek,astieger}AATTsuse.com
- libgcrypt 1.7.3:

* security issue already fixes with 1.6.6

* Fix building of some asm modules with older compilers and CPUs.

* ARMv8/AArch32 improvements for AES, GCM, SHA-256, and SHA-1.
- includes changes from libgcrypt 1.7.2:

* Bug fixes:
- Fix setting of the ECC cofactor if parameters are specified.
- Fix memory leak in the ECC code.
- Remove debug message about unsupported getrandom syscall.
- Fix build problems related to AVX use.
- Fix bus errors on ARM for Poly1305, ChaCha20, AES, and SHA-512.

* Internal changes:
- Improved fatal error message for wrong use of gcry_md_read.
- Disallow symmetric encryption/decryption if key is not set.
- includes changes from 1.7.1:

* Bug fixes:
- Fix ecc_verify for cofactor support.
- Fix portability bug when using gcc with Solaris 9 SPARC.
- Build fix for OpenBSD/amd64
- Add OIDs to the Serpent ciphers.

* Internal changes:
- Use getrandom system call on Linux if available.
- Blinding is now also used for RSA signature creation.
- Changed names of debug envvars
- includes changes from 1.7.0:

* New algorithms and modes:
- SHA3-224, SHA3-256, SHA3-384, SHA3-512, and MD2 hash algorithms.
- SHAKE128 and SHAKE256 extendable-output hash algorithms.
- ChaCha20 stream cipher.
- Poly1305 message authentication algorithm
- ChaCha20-Poly1305 Authenticated Encryption with Associated Data
mode.
- OCB mode.
- HMAC-MD2 for use by legacy applications.

* New curves for ECC:
- Curve25519.
- sec256k1.
- GOST R 34.10-2001 and GOST R 34.10-2012.

* Performance:
- Improved performance of KDF functions.
- Assembler optimized implementations of Blowfish and Serpent on
ARM.
- Assembler optimized implementation of 3DES on x86.
- Improved AES using the SSSE3 based vector permutation method by
Mike Hamburg.
- AVX/BMI is used for SHA-1 and SHA-256 on x86. This is for SHA-1
about 20% faster than SSSE3 and more than 100% faster than the
generic C implementation.
- 40% speedup for SHA-512 and 72% for SHA-1 on ARM Cortex-A8.
- 60-90% speedup for Whirlpool on x86.
- 300% speedup for RIPE MD-160.
- Up to 11 times speedup for CRC functions on x86.

* Other features:
- Improved ECDSA and FIPS 186-4 compliance.
- Support for Montgomery curves.
- gcry_cipher_set_sbox to tweak S-boxes of the gost28147 cipher
algorithm.
- gcry_mpi_ec_sub to subtract two points on a curve.
- gcry_mpi_ec_decode_point to decode an MPI into a point object.
- Emulation for broken Whirlpool code prior to 1.6.0. [from 1.6.1]
- Flag \"pkcs1-raw\" to enable PCKS#1 padding with a user supplied
hash part.
- Parameter \"saltlen\" to set a non-default salt length for RSA PSS.
- A SP800-90A conforming DRNG replaces the former X9.31 alternative
random number generator.
- Map deprecated RSA algo number to the RSA algo number for better
backward compatibility. [from 1.6.2]
- Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
[from 1.6.3]
- Fixed data-dependent timing variations in modular exponentiation
[related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
are Practical]. [from 1.6.3]
- Flag \"no-keytest\" for ECC key generation. Due to a bug in
the parser that flag will also be accepted but ignored by older
version of Libgcrypt. [from 1.6.4]
- Speed up the random number generator by requiring less extra
seeding. [from 1.6.4]
- Always verify a created RSA signature to avoid private key leaks
due to hardware failures. [from 1.6.4]
- Mitigate side-channel attack on ECDH with Weierstrass curves
[CVE-2015-7511]. See http://www.cs.tau.ac.IL/~tromer/ecdh/ for
details. [from 1.6.5]

* Internal changes:
- Moved locking out to libgpg-error.
- Support of the SYSROOT envvar in the build system.
- Refactor some code.
- The availability of a 64 bit integer type is now mandatory.

* Bug fixes:
- Fixed message digest lookup by OID (regression in 1.6.0).
- Fixed a build problem on NetBSD
- Fixed some asm build problems and feature detection bugs.

* Interface changes relative to the 1.6.0 release:
gcry_cipher_final NEW macro.
GCRY_CIPHER_MODE_CFB8 NEW constant.
GCRY_CIPHER_MODE_OCB NEW.
GCRY_CIPHER_MODE_POLY1305 NEW.
gcry_cipher_set_sbox NEW macro.
gcry_mac_get_algo NEW.
GCRY_MAC_HMAC_MD2 NEW.
GCRY_MAC_HMAC_SHA3_224 NEW.
GCRY_MAC_HMAC_SHA3_256 NEW.
GCRY_MAC_HMAC_SHA3_384 NEW.
GCRY_MAC_HMAC_SHA3_512 NEW.
GCRY_MAC_POLY1305 NEW.
GCRY_MAC_POLY1305_AES NEW.
GCRY_MAC_POLY1305_CAMELLIA NEW.
GCRY_MAC_POLY1305_SEED NEW.
GCRY_MAC_POLY1305_SERPENT NEW.
GCRY_MAC_POLY1305_TWOFISH NEW.
gcry_md_extract NEW.
GCRY_MD_FLAG_BUGEMU1 NEW [from 1.6.1].
GCRY_MD_GOSTR3411_CP NEW.
GCRY_MD_SHA3_224 NEW.
GCRY_MD_SHA3_256 NEW.
GCRY_MD_SHA3_384 NEW.
GCRY_MD_SHA3_512 NEW.
GCRY_MD_SHAKE128 NEW.
GCRY_MD_SHAKE256 NEW.
gcry_mpi_ec_decode_point NEW.
gcry_mpi_ec_sub NEW.
GCRY_PK_EDDSA NEW constant.
GCRYCTL_GET_TAGLEN NEW.
GCRYCTL_SET_SBOX NEW.
GCRYCTL_SET_TAGLEN NEW.
- Apply libgcrypt-1.6.3-aliasing.patch only on big-endian
architectures
- update drbg_test.patch and install cavs testing directory again
- As DRBG is upstream, drop pateches:
v9-0001-SP800-90A-Deterministic-Random-Bit-Generator.patch
0002-Compile-DRBG.patch
0003-Function-definitions-of-interfaces-for-random.c.patch
0004-Invoke-DRBG-from-common-libgcrypt-RNG-code.patch
0005-Function-definitions-for-gcry_control-callbacks.patch
0006-DRBG-specific-gcry_control-requests.patch
v9-0007-User-interface-to-DRBG.patch
libgcrypt-fix-rng.patch
- drop obsolete:
libgcrypt-fips-dsa.patch
libgcrypt-fips_ecdsa.patch

Wed Aug 17 14:00:00 2016 astiegerAATTsuse.com
- libgcrypt 1.6.6:

* fix CVE-2016-6313: Issue in the mixing functions of the random
number generators allowed an attacker who obtained a number of
bytes from the standard RNG to predict some of the next ouput.
(bsc#994157)

Mon May 16 14:00:00 2016 pjanouchAATTsuse.de
- remove conditionals for unsupported distributions (before 13.2),
it would not build anyway because of new dependencies

Mon May 16 14:00:00 2016 pjanouchAATTsuse.de
- make the -hmac package depend on the same version of the library,
fixing bsc#979629 FIPS: system fails to reboot after installing
fips pattern

Tue Feb 9 13:00:00 2016 astiegerAATTsuse.com
- update to 1.6.5:

* CVE-2015-7511: Mitigate side-channel attack on ECDH with
Weierstrass curves (boo#965902)

Sat Oct 10 14:00:00 2015 astiegerAATTsuse.com
- follow-up to libgcrypt 1.6.4 update: sosuffix is 20.0.4

Tue Sep 8 14:00:00 2015 vcizekAATTsuse.com
- update to 1.6.4
- fixes libgcrypt equivalent of CVE-2015-5738 (bsc#944456)

* Speed up the random number generator by requiring less extra
seeding.

* New flag \"no-keytest\" for ECC key generation. Due to a bug in the
parser that flag will also be accepted but ignored by older version
of Libgcrypt.

* Always verify a created RSA signature to avoid private key leaks
due to hardware failures.

* Other minor bug fixes.

Tue Jun 23 14:00:00 2015 dvaleevAATTsuse.com
- Fix gpg2 tests on BigEndian architectures: s390x ppc64
libgcrypt-1.6.3-aliasing.patch

Sun Mar 1 13:00:00 2015 astiegerAATTsuse.com
- fix sosuffix for 1.6.3 (20.0.3)

Sat Feb 28 13:00:00 2015 astiegerAATTsuse.com
- libgcrypt 1.6.3 [bnc#920057]:

* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].

* Fixed data-dependent timing variations in modular exponentiation
[related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
are Practical].
- update upstream signing keyring

Fri Feb 6 13:00:00 2015 cooloAATTsuse.com
- making the build reproducible - see
http://lists.gnupg.org/pipermail/gnupg-commits/2014-September/010683.html
for a very similiar problem

Fri Feb 6 13:00:00 2015 dimstarAATTopensuse.org
- Move %install_info_delete calls from postun to preun: the files
must still be present to be parsed.
- Fix the names passed to install_info for gcrypt.info-[12].gz
instead of gcrypt-[12].info.gz.

Fri Feb 6 13:00:00 2015 cooloAATTsuse.com
- fix filename for info pages in %post scripts

Wed Nov 5 13:00:00 2014 andreas.stiegerAATTgmx.de
- libgcrypt 1.6.2:

* Map deprecated RSA algo number to the RSA algo number for better
backward compatibility.

* Support a 0x40 compression prefix for EdDSA.

* Improve ARM hardware feature detection and building.

* Fix building for the x32 ABI platform.

* Fix some possible NULL deref bugs.
- remove libgcrypt-1.6.0-use-intenal-functions.patch, upstream
via xtrymalloc macro
- remove libgcrypt-fixed-sizet.patch, upstream
- adjust libgcrypt-1.6.1-use-fipscheck.patch for xtrymalloc change

Sun Sep 21 14:00:00 2014 vcizekAATTsuse.com
- disabled curve P-192 in FIPS mode (bnc#896202)

* added libgcrypt-fips_ecdsa.patch
- don\'t use SHA-1 for ECDSA in FIPS mode
- also run the fips self tests only in FIPS mode

Tue Sep 16 14:00:00 2014 vcizekAATTsuse.com
- run the fips self tests at the constructor code

* added libgcrypt-fips_run_selftest_at_constructor.patch

Tue Sep 16 14:00:00 2014 vcizekAATTsuse.com
- rewrite the DSA-2 code to be FIPS 186-4 compliant (bnc#894216)

* added libgcrypt-fips-dsa.patch

* install fips186_dsa
- use 2048 bit keys in selftests_dsa

Mon Sep 1 14:00:00 2014 vcizekAATTsuse.com
- fix an issue in DRBG patchset

* size_t type is 32-bit on 32-bit systems
- fix a potential NULL pointer deference in DRBG patchset

* patches from https://bugs.g10code.com/gnupg/issue1701
- added v9-0001-SP800-90A-Deterministic-Random-Bit-Generator.patch
- added v9-0007-User-interface-to-DRBG.patch
- removed v7-0001-SP800-90A-Deterministic-Random-Bit-Generator.patch
- removed v7-0007-User-interface-to-DRBG.patch
- add a subpackage for CAVS testing

* add cavs_driver.pl and cavs-test.sh from the kernel cavs package

* added drbg_test.patch

Tue Aug 12 14:00:00 2014 meissnerAATTsuse.com
- split off the -hmac package that contains the checksums

Mon May 26 14:00:00 2014 meissnerAATTsuse.com
- libgcrypt-fix-rng.patch: make drbg work again in FIPS mode.
- libgcrypt-1.6.1-use-fipscheck.patch: library to test is libgcrypt.so.20
and not libgcrypt.so.11
- libgcrypt-init-at-elf-load-fips.patch: initialize globally on ELF
DSO loading to meet FIPS requirements.

Tue May 13 14:00:00 2014 vcizekAATTsuse.com
- add new 0007-User-interface-to-DRBG.patch from upstream

* fixes bnc#877233

* supersedes the patch from previous entry

Mon May 12 14:00:00 2014 tittiatcokeAATTgmail.com
- Correct patch 0007-User-interface-to-DRBG.patch so that the
struct used in the route matches the header of the function

Tue May 6 14:00:00 2014 vcizekAATTsuse.com
- add support for SP800-90A DRBG (fate#316929, bnc#856312)

* patches by Stephan Mueller (http://www.chronox.de/drbg.html):
0001-SP800-90A-Deterministic-Random-Bit-Generator.patch.bz2
0002-Compile-DRBG.patch
0003-Function-definitions-of-interfaces-for-random.c.patch
0004-Invoke-DRBG-from-common-libgcrypt-RNG-code.patch
0005-Function-definitions-for-gcry_control-callbacks.patch
0006-DRBG-specific-gcry_control-requests.patch
0007-User-interface-to-DRBG.patch

* only after 13.1 (the patches need libgpg-error 1.13)
- drop libgcrypt-fips-allow-legacy.patch (not needed and wasn\'t
applied anyway)

Thu Apr 3 14:00:00 2014 tchvatalAATTsuse.com
- Cleanup with spec-cleaner to sort out.
- Really apply ppc64 patch as it was ommited probably by mistake.

Thu Mar 27 13:00:00 2014 meissnerAATTsuse.com
- FIPS changes (from Fedora):
- replaced libgcrypt-1.5.0-etc_gcrypt_rngseed-symlink.diff by
libgcrypt-1.6.1-fips-cfgrandom.patch
- libgcrypt-fixed-sizet.patch: fixed an int type for -flto
- libgcrypt-1.6.1-use-fipscheck.patch: use the fipscheck binary
- libgcrypt-1.6.1-fips-cavs.patch: add CAVS tests
- use fipscheck only after 13.1
- libgcrypt-fips-allow-legacy.patch: attempt to allow some
legacy algorithms for gpg2 usage even in FIPS mode.
(currently not applied)

Thu Jan 30 13:00:00 2014 idonmezAATTsuse.com
- Drop arm-missing-files.diff, fixed upstream

Wed Jan 29 13:00:00 2014 andreas.stiegerAATTgmx.de
- libgcrypt 1.6.1, a bugfix release with the folloging fixes:

* Added emulation for broken Whirlpool code prior to 1.6.0.

* Improved performance of KDF functions.

* Improved ECDSA compliance.

* Fixed message digest lookup by OID (regression in 1.6.0).

* Fixed memory leaks in ECC code.

* Fixed some asm build problems and feature detection bugs.

* Interface changes relative to the 1.6.0 release:
GCRY_MD_FLAG_BUGEMU1 NEW (minor API change).

Fri Jan 3 13:00:00 2014 dmuellerAATTsuse.com
- add arm-missing-files.diff: Add missing files to fix build

Fri Jan 3 13:00:00 2014 mvyskocilAATTsuse.com
- fix bnc#856915: can\'t open /dev/urandom

* correct libgcrypt-1.5.0-etc_gcrypt_rngseed-symlink.diff
- require libgpg-error 1.11 or higher

Thu Dec 19 13:00:00 2013 mvyskocilAATTsuse.com
- fix dependency for 32bit devel package
- name hmac files according soname
- fix hmac subpackage dependency

Thu Dec 19 13:00:00 2013 mvyskocilAATTsuse.com
- update to 1.6.

* Removed the long deprecated gcry_ac interface. Thus Libgcrypt is
not anymore ABI compatible to previous versions if they used the ac
interface. Check NEWS in libgcrypt-devel for removed interfaces.

* Removed the module register subsystem.

* The deprecated message digest debug macros have been removed. Use
gcry_md_debug instead.

* Removed deprecated control codes.

* Improved performance of most cipher algorithms as well as for the
SHA family of hash functions.

* Added support for the IDEA cipher algorithm.

* Added support for the Salsa20 and reduced Salsa20/12 stream ciphers.

* Added limited support for the GOST 28147-89 cipher algorithm.

* Added support for the GOST R 34.11-94 and R 34.11-2012 (Stribog)
hash algorithms.

* Added a random number generator to directly use the system\'s RNG.
Also added an interface to prefer the use of a specified RNG.

* Added support for the SCRYPT algorithm.

* Mitigated the Yarom/Falkner flush+reload side-channel attack on RSA
secret keys. See [CVE-2013-4242].

* Added support for Deterministic DSA as per RFC-6969.

* Added support for curve Ed25519.

* Added a scatter gather hash convenience function.

* Added several MPI amd SEXP helper functions.

* Added support for negative numbers to gcry_mpi_print,
gcry_mpi_aprint and gcry_mpi_scan.

* The algorithm ids GCRY_PK_ECDSA and GCRY_PK_ECDH are now
deprecated. Use GCRY_PK_ECC if you need an algorithm id.

* Changed gcry_pk_genkey for \"ecc\" to only include the curve name and
not the parameters. The flag \"param\" may be used to revert this.

* Added a feature to globally disable selected hardware features.

* Added debug helper functions.
- rebased patches

* libgcrypt-1.5.0-etc_gcrypt_rngseed-symlink.diff

* libgcrypt-ppc64.patch
- add libgcrypt-1.6.0-use-intenal-functions.patch to fix fips.c build
- Move all documentation to -devel package

Fri Jul 26 14:00:00 2013 andreas.stiegerAATTgmx.de
- update to 1.5.3 [bnc#831359] CVE-2013-4242

* Mitigate the Yarom/Falkner flush+reload side-channel attack on
RSA secret keys. See .

Thu Jul 25 14:00:00 2013 mvyskocilAATTsuse.com
- port SLE enhancenments to Factory (bnc#831028)

* add libgcrypt-unresolved-dladdr.patch (bnc#701267)

* add libgcrypt-1.5.0-etc_gcrypt_rngseed-symlink.diff (bnc#724841)

* add libgcrypt-1.5.0-LIBGCRYPT_FORCE_FIPS_MODE-env.diff
- install .hmac256.hmac (bnc#704068)
- enable varuous new options in configure (m-guard, hmac binary check and
random device linux)
- build with all ciphers, pubkeys and digest by default as whitelist
simply allowed them all

Mon Jun 17 14:00:00 2013 cooloAATTsuse.com
- avoid gpg-offline in bootstrap packages

Sun Jun 16 14:00:00 2013 crrodriguezAATTopensuse.org
- Library must be built with large file support in
32 bit archs.

Thu Apr 18 14:00:00 2013 andreas.stiegerAATTgmx.de
- update to 1.5.2

* The upstream sources now contain the IDEA algorithm, dropping:
idea.c.gz
libgcrypt-1.5.0-idea.patch
libgcrypt-1.5.0-idea_codecleanup.patch

* Made the Padlock code work again (regression since 1.5.0).

* Fixed alignment problems for Serpent.

* Fixed two bugs in ECC computations.

Fri Mar 22 13:00:00 2013 mvyskocilAATTsuse.com
- add GPL3.0+ to License tag because of dumpsexp (bnc#810759)

Mon Mar 18 13:00:00 2013 andreas.stiegerAATTgmx.de
- update to 1.5.1

* Allow empty passphrase with PBKDF2.

* Do not abort on an invalid algorithm number in
gcry_cipher_get_algo_keylen and gcry_cipher_get_algo_blklen.

* Fixed some Valgrind warnings.

* Fixed a problem with select and high fd numbers.

* Improved the build system

* Various minor bug fixes.

* Interface changes relative to the 1.5.0 release:
GCRYCTL_SET_ENFORCED_FIPS_FLAG NEW.
GCRYPT_VERSION_NUMBER NEW.
- add verification of source code signatures
- now requires automake 1.11 to build

Sat Feb 2 13:00:00 2013 cooloAATTsuse.com
- update license to new format

Tue Jun 12 14:00:00 2012 chrisAATTcomputersalat.de
- fix deps

* libgpg-error-devel >= 1.8
- add libsoname macro

Sun Feb 12 13:00:00 2012 crrodriguezAATTopensuse.org
- Libraries back into %{_libdir}, /usr merge project

Sat Dec 24 13:00:00 2011 opensuseAATTdstoecker.de
- add the missing IDEA algorithm after the patent is no longer relevant

Sun Nov 13 13:00:00 2011 jengelhAATTmedozas.de
- Remove redundant/unwanted tags/section (cf. specfile guidelines)

Sun Nov 13 13:00:00 2011 cooloAATTsuse.com
- add libtool as explicit buildrequire to avoid implicit dependency from prjconf

Sun Oct 2 14:00:00 2011 crrodriguezAATTopensuse.org
- Update to version 1.5.0, most important changes

* Uses the Intel AES-NI instructions if available

* Support ECDH.

Fri Nov 19 13:00:00 2010 mvyskocilAATTsuse.cz
- update to 1.4.6

* Fixed minor memory leak in DSA key generation.

* No more switching to FIPS mode if /proc/version is not readable.

* Fixed a sigill during Padlock detection on old CPUs.

* Boosted SHA-512 performance by 30% on ia32 boxes and gcc 4.3;
SHA-256 went up by 25%.

* New variants of the TIGER algorithm.

* New cipher algorithm mode for AES-WRAP.

* Interface changes relative to the 1.4.2 release:
GCRY_MD_TIGER1 NEW
GCRY_MD_TIGER2 NEW
GCRY_CIPHER_MODE_AESWRAP NEW

Sun Jul 4 14:00:00 2010 jengelhAATTmedozas.de
- add missing definition of udiv_qrnnd for sparcv9:32
- use %_smp_mflags

Sat Dec 19 13:00:00 2009 jengelhAATTmedozas.de
- add baselibs.conf as a source
- disable the use of hand-coded assembler functions on sparc -
this is giving me an infinite loop with ./tests/prime
(specifically ./sparc32v8/mpih-mul1.S:_gcry_mpih_mul_1.
Fedora disables this too.

Tue Apr 7 14:00:00 2009 crrodriguezAATTsuse.de
- update to version 1.4.4

* Publish GCRY_MODULE_ID_USER and GCRY_MODULE_ID_USER_LAST constants.
This functionality has been in Libgcrypt since 1.3.0.

* MD5 may now be used in non-enforced fips mode.

* Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes.

* In fips mode, RSA keys are now generated using the X9.31 algorithm
and DSA keys using the FIPS 186-2 algorithm.

* The transient-key flag is now also supported for DSA key
generation. DSA domain parameters may be given as well.


 
ICM