Hello community,

here is the log from the commit of package gnome-keyring for openSUSE:Factory 
checked in at 2017-08-10 13:44:20
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/gnome-keyring (Old)
 and      /work/SRC/openSUSE:Factory/.gnome-keyring.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "gnome-keyring"

Thu Aug 10 13:44:20 2017 rev:128 rq:511979 version:3.20.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/gnome-keyring/gnome-keyring.changes      
2017-07-21 22:42:25.007826261 +0200
+++ /work/SRC/openSUSE:Factory/.gnome-keyring.new/gnome-keyring.changes 
2017-08-10 13:44:21.146863326 +0200
@@ -1,0 +2,7 @@
+Thu Jul 20 19:43:27 UTC 2017 - mgo...@suse.com
+
+- Drop unneeded part of
+  gnome-keyring-bsc932232-use-non-fips-md5.patch, to match what we
+  have in SLE.
+
+-------------------------------------------------------------------
@@ -7 +14 @@
-  (bgo#778357).
+  (bgo#778357, bsc#1043861).
@@ -38 +45 @@
-  issue that was reintroduced (bsc#966229, bsc#966225).
+  issue that was reintroduced (bsc#966229, bsc#966225, bsc#994988).

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ gnome-keyring-bsc932232-use-non-fips-md5.patch ++++++
--- /var/tmp/diff_new_pack.wXYtWg/_old  2017-08-10 13:44:22.422683725 +0200
+++ /var/tmp/diff_new_pack.wXYtWg/_new  2017-08-10 13:44:22.422683725 +0200
@@ -73,27 +73,3 @@
  
        /* The old keyring code used lower case hex */
        return egg_hex_encode_full (digest, sizeof (digest), FALSE, '\0', 0);
---- a/pkcs11/secret-store/tests/dump-keyring0-format.c 
-+++ a/pkcs11/secret-store/tests/dump-keyring0-format.c 
-@@ -556,13 +556,17 @@ decrypt_buffer (Buffer *buffer,
- static gboolean
- verify_decrypted_buffer (Buffer *buffer)
- {
--      guchar digest[16];
-+        guchar digest[16];
-+      GChecksum *cs;
-+      gsize cs_len = sizeof (digest);
- 
-       /* In case the world changes on us... */
--      g_return_val_if_fail (gcry_md_get_algo_dlen (GCRY_MD_MD5) == sizeof 
(digest), 0);
-+      g_return_val_if_fail (g_checksum_type_get_length (G_CHECKSUM_MD5) == 
sizeof (digest), 0);
- 
--      gcry_md_hash_buffer (GCRY_MD_MD5, (void*)digest,
--                           (guchar*)buffer->buf + 16, buffer->len - 16);
-+      cs = g_checksum_new (G_CHECKSUM_MD5);
-+      g_checksum_update (cs, (const guchar *) buffer->buf + 16, buffer->len - 
16);
-+      g_checksum_get_digest (cs, digest, &cs_len);
-+      g_checksum_free (cs);
- 
-       return memcmp (buffer->buf, digest, 16) == 0;
- }


Reply via email to