Received: from mail.netbsd.org (mail.netbsd.org [204.152.190.11]) by narn.NetBSD.org (Postfix) with ESMTP id F066F63B879 for ; Sat, 31 Jan 2009 08:53:15 +0000 (UTC) Received: by mail.netbsd.org (Postfix, from userid 0) id 9C0AA63B3CC; Sat, 31 Jan 2009 08:53:15 +0000 (UTC) Received: from cvs.netbsd.org (unknown [IPv6:2001:4f8:4:7:2e0:81ff:fe25:eab4]) by mail.netbsd.org (Postfix) with ESMTP id A286963B120 for ; Sat, 31 Jan 2009 08:53:14 +0000 (UTC) Received: by cvs.netbsd.org (Postfix, from userid 500) id 888CC175D0; Sat, 31 Jan 2009 08:53:14 +0000 (UTC) From: Adam Ciarcinski Subject: CVS commit: pkgsrc/security/libgcrypt To: pkgsrc-changes@NetBSD.org Reply-To: adam@netbsd.org Message-Id: <20090131085314.888CC175D0@cvs.netbsd.org> Date: Sat, 31 Jan 2009 08:53:14 +0000 (UTC) Sender: pkgsrc-changes-owner@NetBSD.org List-Id: pkgsrc-changes Precedence: list Module Name: pkgsrc Committed By: adam Date: Sat Jan 31 08:53:14 UTC 2009 Modified Files: pkgsrc/security/libgcrypt: Makefile distinfo options.mk Removed Files: pkgsrc/security/libgcrypt/patches: patch-ag Log Message: Changes 1.4.4: * Publish GCRY_MODULE_ID_USER and GCRY_MODULE_ID_USER_LAST constants. This functionality has been in Libgcrypt since 1.3.0. * MD5 may now be used in non-enforced fips mode. * Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes. * In fips mode, RSA keys are now generated using the X9.31 algorithm and DSA keys using the FIPS 186-2 algorithm. * The transient-key flag is now also supported for DSA key generation. DSA domain parameters may be given as well. To generate a diff of this commit: cvs rdiff -r1.42 -r1.43 pkgsrc/security/libgcrypt/Makefile cvs rdiff -r1.27 -r1.28 pkgsrc/security/libgcrypt/distinfo cvs rdiff -r1.3 -r1.4 pkgsrc/security/libgcrypt/options.mk cvs rdiff -r1.4 -r0 pkgsrc/security/libgcrypt/patches/patch-ag Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.