SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for libgcrypt11-32bit-1.5.4-6.104.x86_64.rpm :

* Fri Aug 08 2014 andreas.stiegerAATTgmx.de- update to 1.5.4 [bnc#891018]
* Improved performance of RSA, DSA, and Elgamal by using a new exponentiation algorithm.
* Fixed a subtle bug in mpi_set_bit which could set spurious bits.
* Fixed a bug in an internal division function.
* Fri Jul 26 2013 andreas.stiegerAATTgmx.de- update to 1.5.3 [bnc#831359] CVE-2013-4242
* Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA secret keys. See .
* Thu Jul 25 2013 mvyskocilAATTsuse.com- port SLE enhancenments to Factory (bnc#831028)
* add libgcrypt-unresolved-dladdr.patch (bnc#701267)
* add libgcrypt-1.5.0-etc_gcrypt_rngseed-symlink.diff (bnc#724841)
* add libgcrypt-1.5.0-LIBGCRYPT_FORCE_FIPS_MODE-env.diff- install .hmac256.hmac (bnc#704068)- enable varuous new options in configure (m-guard, hmac binary check and random device linux)- build with all ciphers, pubkeys and digest by default as whitelist simply allowed them all
* Mon Jun 17 2013 cooloAATTsuse.com- avoid gpg-offline in bootstrap packages
* Sun Jun 16 2013 crrodriguezAATTopensuse.org- Library must be built with large file support in 32 bit archs.
* Thu Apr 18 2013 andreas.stiegerAATTgmx.de- update to 1.5.2
* The upstream sources now contain the IDEA algorithm, dropping: idea.c.gz libgcrypt-1.5.0-idea.patch libgcrypt-1.5.0-idea_codecleanup.patch
* Made the Padlock code work again (regression since 1.5.0).
* Fixed alignment problems for Serpent.
* Fixed two bugs in ECC computations.
* Fri Mar 22 2013 mvyskocilAATTsuse.com- add GPL3.0+ to License tag because of dumpsexp (bnc#810759)
* Mon Mar 18 2013 andreas.stiegerAATTgmx.de- update to 1.5.1
* Allow empty passphrase with PBKDF2.
* Do not abort on an invalid algorithm number in gcry_cipher_get_algo_keylen and gcry_cipher_get_algo_blklen.
* Fixed some Valgrind warnings.
* Fixed a problem with select and high fd numbers.
* Improved the build system
* Various minor bug fixes.
* Interface changes relative to the 1.5.0 release: GCRYCTL_SET_ENFORCED_FIPS_FLAG NEW. GCRYPT_VERSION_NUMBER NEW.- add verification of source code signatures- now requires automake 1.11 to build
* Sat Feb 02 2013 cooloAATTsuse.com- update license to new format
* Tue Jun 12 2012 chrisAATTcomputersalat.de- fix deps
* libgpg-error-devel >= 1.8- add libsoname macro
* Sun Feb 12 2012 crrodriguezAATTopensuse.org- Libraries back into %{_libdir}, /usr merge project
* Sat Dec 24 2011 opensuseAATTdstoecker.de- add the missing IDEA algorithm after the patent is no longer relevant
* Sun Nov 13 2011 jengelhAATTmedozas.de- Remove redundant/unwanted tags/section (cf. specfile guidelines)
* Sun Nov 13 2011 cooloAATTsuse.com- add libtool as explicit buildrequire to avoid implicit dependency from prjconf
* Sun Oct 02 2011 crrodriguezAATTopensuse.org- Update to version 1.5.0, most important changes
* Uses the Intel AES-NI instructions if available
* Support ECDH.
* Fri Nov 19 2010 mvyskocilAATTsuse.cz- update to 1.4.6
* Fixed minor memory leak in DSA key generation.
* No more switching to FIPS mode if /proc/version is not readable.
* Fixed a sigill during Padlock detection on old CPUs.
* Boosted SHA-512 performance by 30% on ia32 boxes and gcc 4.3; SHA-256 went up by 25%.
* New variants of the TIGER algorithm.
* New cipher algorithm mode for AES-WRAP.
* Interface changes relative to the 1.4.2 release: GCRY_MD_TIGER1 NEW GCRY_MD_TIGER2 NEW GCRY_CIPHER_MODE_AESWRAP NEW
* Sun Jul 04 2010 jengelhAATTmedozas.de- add missing definition of udiv_qrnnd for sparcv9:32- use %_smp_mflags
* Sat Dec 19 2009 jengelhAATTmedozas.de- add baselibs.conf as a source- disable the use of hand-coded assembler functions on sparc - this is giving me an infinite loop with ./tests/prime (specifically ./sparc32v8/mpih-mul1.S:_gcry_mpih_mul_1. Fedora disables this too.
* Tue Apr 07 2009 crrodriguezAATTsuse.de- update to version 1.4.4
* Publish GCRY_MODULE_ID_USER and GCRY_MODULE_ID_USER_LAST constants. This functionality has been in Libgcrypt since 1.3.0.
* MD5 may now be used in non-enforced fips mode.
* Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes.
* In fips mode, RSA keys are now generated using the X9.31 algorithm and DSA keys using the FIPS 186-2 algorithm.
* The transient-key flag is now also supported for DSA key generation. DSA domain parameters may be given as well.
 
ICM