Hello community, here is the log from the commit of package gnome-keyring for openSUSE:Factory checked in at 2017-08-10 13:44:20 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/gnome-keyring (Old) and /work/SRC/openSUSE:Factory/.gnome-keyring.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "gnome-keyring" Thu Aug 10 13:44:20 2017 rev:128 rq:511979 version:3.20.1 Changes: -------- --- /work/SRC/openSUSE:Factory/gnome-keyring/gnome-keyring.changes 2017-07-21 22:42:25.007826261 +0200 +++ /work/SRC/openSUSE:Factory/.gnome-keyring.new/gnome-keyring.changes 2017-08-10 13:44:21.146863326 +0200 @@ -1,0 +2,7 @@ +Thu Jul 20 19:43:27 UTC 2017 - [email protected] + +- Drop unneeded part of + gnome-keyring-bsc932232-use-non-fips-md5.patch, to match what we + have in SLE. + +------------------------------------------------------------------- @@ -7 +14 @@ - (bgo#778357). + (bgo#778357, bsc#1043861). @@ -38 +45 @@ - issue that was reintroduced (bsc#966229, bsc#966225). + issue that was reintroduced (bsc#966229, bsc#966225, bsc#994988). ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ gnome-keyring-bsc932232-use-non-fips-md5.patch ++++++ --- /var/tmp/diff_new_pack.wXYtWg/_old 2017-08-10 13:44:22.422683725 +0200 +++ /var/tmp/diff_new_pack.wXYtWg/_new 2017-08-10 13:44:22.422683725 +0200 @@ -73,27 +73,3 @@ /* The old keyring code used lower case hex */ return egg_hex_encode_full (digest, sizeof (digest), FALSE, '\0', 0); ---- a/pkcs11/secret-store/tests/dump-keyring0-format.c -+++ a/pkcs11/secret-store/tests/dump-keyring0-format.c -@@ -556,13 +556,17 @@ decrypt_buffer (Buffer *buffer, - static gboolean - verify_decrypted_buffer (Buffer *buffer) - { -- guchar digest[16]; -+ guchar digest[16]; -+ GChecksum *cs; -+ gsize cs_len = sizeof (digest); - - /* In case the world changes on us... */ -- g_return_val_if_fail (gcry_md_get_algo_dlen (GCRY_MD_MD5) == sizeof (digest), 0); -+ g_return_val_if_fail (g_checksum_type_get_length (G_CHECKSUM_MD5) == sizeof (digest), 0); - -- gcry_md_hash_buffer (GCRY_MD_MD5, (void*)digest, -- (guchar*)buffer->buf + 16, buffer->len - 16); -+ cs = g_checksum_new (G_CHECKSUM_MD5); -+ g_checksum_update (cs, (const guchar *) buffer->buf + 16, buffer->len - 16); -+ g_checksum_get_digest (cs, digest, &cs_len); -+ g_checksum_free (cs); - - return memcmp (buffer->buf, digest, 16) == 0; - }
