Changelog for
libTMCG18-1.3.18-bp157.1.1.x86_64.rpm :
* Sun Jun 02 2019 Karol Babioch
- Update to version 1.3.18
* This release is two-fold: first, it fixes some bugs (e.g. iterated S2K) of the OpenPGP interface, and second, it adds functionality for handling v5 keys and signatures (see RFC 4880bis-07).- Re-freshed keyring file with current version from upstream
* Wed Jan 23 2019 Karol Babioch - Update to version 1.3.17
* VTMF,ASTC,DKG,VRHE,EOTP,COM,VSS: make CheckGroup() more robust
* VSSHE: security bugfix for Verify_[non]interactive_[_publiccoin]
* mpz_spowm: added check for correct base in fast exponentiation
* mpz_sqrtm: remove unused parameter in tmcg_mpz_qrmn_p()
* configure.ac: added compiler option \"-Wextra\"
* mpz_sprime: added tmcg_mpz_smprime() with increased B = 80000
* RFC4880: changed type of tmcg_openpgp_mem_alloc to unsigned long
* Mon Dec 03 2018 Karol Babioch - Update to version 1.3.16
* changed constant TMCG_MAX_CARDS (decreased by factor 2)
* changed formulas for TMCG_MAX_VALUE_CHARS and TMCG_MAX_KEY_CHARS
* RFC4880: added support of Preferred AEAD Algorithms [RFC 4880bis]
* RFC4880: added output for key usage \"timestamping\" [RFC 4880bis]
* RFC4880: changed tmcg_openpgp_byte_t: unsigned char -> uint8_t
* RFC4880: added PacketAeadEncode() [RFC 4880bis]
* RFC4880: added SymmetricDecryptAEAD() and SymmetricEncryptAEAD()
* changed formula for TMCG_MAX_KEYBITS (increased by factor 2)
* mpz_srandom: bugfix in Botan code branch of mpz_grandomb()
* Mon Nov 12 2018 Karol Babioch - Update to version 1.3.15 This is a maintenance release that fixes some bugs, e.g. in the Botan support of functions from module mpz_srandom. Moreover, some interfaces of the OpenPGP implemenation have been added and removed. For some modules of LibTMCG a basic exception handling has been introduced.
* Mon Sep 10 2018 Karol Babioch - Update to version 1.3.14 With this release three additional parameters for the control of secure memory allocation have been added to init_libTMCG(). They are explained in the reference manual. Moreover, the OpenPGP interface has been enhanced in several way, e.g., ECDH, ECDSA and EdDSA are supported now.- Applied spec-cleaner
* Tue Jun 26 2018 antoine.belvireAATTopensuse.org- Fix install-info usage.
* Mon Jun 25 2018 kbabiochAATTsuse.com- Update to 1.3.13 - Lots of major improvements for undocumented OpenPGP interface - PRNG from Botan is used as additional source of randomness - SHA3 is emulated if runtime version of libgcrypt is too old- Applied spec-cleaner
* Wed Mar 21 2018 kbabiochAATTsuse.com- Update to 1.3.12:
* Added function mpz_lprime_prefix() for k-prefix tweak
* Improved strength of oracle hash function g() by second algo
* Raised the requirement of libgcrypt version to >= 1.7.0
* Improved on RFC4880 handling
* mpz_shash: bugfix changes the output of hash function g()
* Thu Feb 08 2018 kbabiochAATTsuse.com- Update to 1.3.11:
* Improved libTMCG initialization (init_libTMCG())
* Better handling of RFC4880 functionality- Switched sources to https instead of http
* Sun Jan 21 2018 jengelhAATTinai.de- Compact description for size. Outright trim SRPM description.- Do not ship static libraries.
* Mon Jan 15 2018 kbabiochAATTsuse.com- update to 1.3.10:
* Introduced RSA signature generation/verification for OpenPGP
* Add function for preparing certification signatures
* Sun Jan 14 2018 astiegerAATTsuse.com- update to 1.3.9:
* fix two minor bugs in the OpenPGP implementation- includes changes from 1.3.8:
* The S2K count for OpenPGP private key encryption has been increased to a reasonable value- includes changes from 1.3.7, 1.3.6, 1.3.5:
* minor bug fixes- includes changes from 1.3.4:
* DKG tools removed, deparate project DKGPG- includes changes from 1.3.3:
* Small enhancements for DKG tools- includes changes from 1.3.2:
* Major improvements for distributed key generation (DKG) and threshold cryptography
* Fri May 26 2017 astiegerAATTsuse.com- update to 1.3.1:
* VSSHE: added a simple variant of SetupGenerators_publiccoin()
* DKG: use very strong randomness from libgcrypt (long term keys)
* RFC4880: added implementation of Partial Body Lengths
* Wed May 17 2017 astiegerAATTsuse.com- update to 1.3.0:
* remove some issues found by coverity scan
* add undocumented protocols and experimental support for distributed key generation
* Verifiable setup of VTMF group generator
* For some advanced protocols (e.g. Groth\'s shuffle) with more than two parties the distributed coin flipping protocol (EDCF) should be used.- includes changes from 1.2.0:
* The default security parameters have been updated to current state of the art
* The complexity of hash function g() was improved
* Non-interactive versions of the verifiable shuffle resp. rotation protocol provide more efficient instantiations with soundness based on the well-known Fiat-Shamir heuristic
* stengthen interactive versions of the protocols against malicious verifiers by coin flipping between prover and verifier
* include protocol for reliable broadcast
* improved documentation- includes changes from 1.1.3:
* VRHE scheme provides an efficient HVZK argument for cyclic shuffle- includes changes from 1.1.2:
* Small bugfixes have been applied in order to compile with gcc 4.3.x
* Sun Jan 25 2015 andreas.stiegerAATTgmx.de- verify source signature