Hello community,

here is the log from the commit of package gnutls for openSUSE:Factory checked 
in at 2014-04-12 21:28:46
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/gnutls (Old)
 and      /work/SRC/openSUSE:Factory/.gnutls.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "gnutls"

Changes:
--------
--- /work/SRC/openSUSE:Factory/gnutls/gnutls.changes    2014-03-06 
19:18:09.000000000 +0100
+++ /work/SRC/openSUSE:Factory/.gnutls.new/gnutls.changes       2014-04-12 
21:39:24.000000000 +0200
@@ -1,0 +2,36 @@
+Wed Apr  9 17:23:15 UTC 2014 - [email protected]
+
+- Upgrade to 3.2.13
+  * Version 3.2.13 (released 2014-04-07)
+
+  ** libgnutls: gnutls_openpgp_keyring_import will no longer fail silently
+  if there are no base64 data. Report and patch by Ramkumar Chinchani.
+
+  ** libgnutls: gnutls_record_send is now safe to be called under DTLS when
+  in corked mode.
+
+  ** libgnutls: Ciphersuites that use the SHA256 or SHA384 MACs are
+  only available in TLS 1.0 as SSL 3.0 doesn't specify parameters for
+  these algorithms.
+
+  ** libgnutls: Changed the behaviour in wildcard acceptance in certificates.
+  Wildcards are only accepted when there are more than two domain components
+  after the wildcard. This drops support for the permissive RFC2818 wildcards
+  and adds more conservative support based on the suggestions in RFC6125. 
Suggested
+  by Jeffrey Walton.
+
+  ** certtool: When no password is provided to export a PKCS #8 keys, do
+  not encrypt by default. This reverts to the certtool behavior of gnutls
+  3.0. The previous behavior of encrypting using an empty password can be
+  replicating using the new parameter --empty-password.
+
+  ** p11tool: Avoid dual initialization of the PKCS #11 subsystem when
+  the --provider option is given.
+
+  ** API and ABI modifications:
+  No changes since last version.
+
+  Add files: gnutls-3.2.13.tar.xz, gnutls-3.2.13.tar.xz.sig
+  Delete files: gnutls-3.2.12.1.tar.xz, gnutls-3.2.12.1.tar.xz.sig
+
+-------------------------------------------------------------------

Old:
----
  gnutls-3.2.12.1.tar.xz
  gnutls-3.2.12.1.tar.xz.sig

New:
----
  gnutls-3.2.13.tar.xz
  gnutls-3.2.13.tar.xz.sig

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ gnutls.spec ++++++
--- /var/tmp/diff_new_pack.lgaHtE/_old  2014-04-12 21:44:00.000000000 +0200
+++ /var/tmp/diff_new_pack.lgaHtE/_new  2014-04-12 21:44:00.000000000 +0200
@@ -21,15 +21,15 @@
 %define gnutls_ossl_sover 27
 
 Name:           gnutls
-Version:        3.2.12
+Version:        3.2.13
 Release:        0
 Summary:        The GNU Transport Layer Security Library
 License:        LGPL-2.1+ and GPL-3.0+
 Group:          Productivity/Networking/Security
 Url:            http://www.gnutls.org/
-Source0:        
ftp://ftp.gnutls.org/gcrypt/gnutls/v3.2/%{name}-%{version}.1.tar.xz
+Source0:        
ftp://ftp.gnutls.org/gcrypt/gnutls/v3.2/%{name}-%{version}.tar.xz
 # signature is checked by source services.
-Source1:        
ftp://ftp.gnutls.org/gcrypt/gnutls/v3.2/%{name}-%{version}.1.tar.xz.sig
+Source1:        
ftp://ftp.gnutls.org/gcrypt/gnutls/v3.2/%{name}-%{version}.tar.xz.sig
 Source2:        %name.keyring
 Source3:        baselibs.conf
 

++++++ gnutls-3.2.12.1.tar.xz -> gnutls-3.2.13.tar.xz ++++++
++++ 82477 lines of diff (skipped)

++++++ gnutls-implement-trust-store-dir-3.2.8.diff ++++++
--- /var/tmp/diff_new_pack.lgaHtE/_old  2014-04-12 21:44:02.000000000 +0200
+++ /var/tmp/diff_new_pack.lgaHtE/_new  2014-04-12 21:44:02.000000000 +0200
@@ -1,7 +1,7 @@
-Index: gnutls-3.2.10/configure.ac
+Index: gnutls-3.2.13/configure.ac
 ===================================================================
---- gnutls-3.2.10.orig/configure.ac
-+++ gnutls-3.2.10/configure.ac
+--- gnutls-3.2.13.orig/configure.ac
++++ gnutls-3.2.13/configure.ac
 @@ -466,6 +466,25 @@ if test "$with_default_trust_store_file"
    with_default_trust_store_file=""
  fi
@@ -40,7 +40,7 @@
  if test "x$with_default_crl_file" != x; then
    AC_DEFINE_UNQUOTED([DEFAULT_CRL_FILE],
      ["$with_default_crl_file"], [use the given CRL file])
-@@ -770,6 +794,7 @@ AC_MSG_NOTICE([System files:
+@@ -769,6 +793,7 @@ AC_MSG_NOTICE([System files:
  
    Trust store pkcs11:   $with_default_trust_store_pkcs11
    Trust store file:     $with_default_trust_store_file
@@ -48,10 +48,10 @@
    Blacklist file:       $with_default_blacklist_file
    CRL file:             $with_default_crl_file
    DNSSEC root key file: $unbound_root_key_file
-Index: gnutls-3.2.10/lib/system.c
+Index: gnutls-3.2.13/lib/system.c
 ===================================================================
---- gnutls-3.2.10.orig/lib/system.c
-+++ gnutls-3.2.10/lib/system.c
+--- gnutls-3.2.13.orig/lib/system.c
++++ gnutls-3.2.13/lib/system.c
 @@ -364,7 +364,45 @@ int _gnutls_find_config_path(char *path,
        return 0;
  }


-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to