Hello community,

here is the log from the commit of package gpg2 for openSUSE:Factory checked in 
at 2020-07-15 11:13:43
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/gpg2 (Old)
 and      /work/SRC/openSUSE:Factory/.gpg2.new.3060 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "gpg2"

Wed Jul 15 11:13:43 2020 rev:149 rq:820863 version:2.2.21

Changes:
--------
--- /work/SRC/openSUSE:Factory/gpg2/gpg2.changes        2020-05-02 
22:15:47.276341286 +0200
+++ /work/SRC/openSUSE:Factory/.gpg2.new.3060/gpg2.changes      2020-07-15 
11:15:08.041009467 +0200
@@ -1,0 +2,34 @@
+Tue Jul 14 10:22:22 UTC 2020 - Pedro Monreal Gonzalez 
<pmonrealgonza...@suse.com>
+
+- Fix regression in latest gpg2 that makes gpgme fail to build [bsc#1174007]
+- Add gnupg-gpgme-t-encrypt-sym.patch
+
+-------------------------------------------------------------------
+Thu Jul  9 11:36:57 UTC 2020 - Andreas Stieger <andreas.stie...@gmx.de>
+
+- GnuPG 2.2.21:
+  * gpg: Improve symmetric decryption speed by about 25%
+  * gpg: Support decryption of AEAD encrypted data packets
+  * gpg: Add option --no-include-key-block
+  * gpg: Allow for extra padding in ECDH
+  * gpg: Only a single pinentry is shown for symmetric encryption if
+    the pinentry supports this
+  * gpg: Print a note if no keys are given to --delete-key
+  * gpg,gpgsm: The ridiculous passphrase quality bar is not anymore
+    shown
+  * gpgsm: Certificates without a CRL distribution point are now
+    considered valid without looking up a CRL. The new option
+    --enable-issuer-based-crl-check can be used to revert to the
+    former behaviour
+  * gpgsm: Support rsaPSS signature verification
+  * gpgsm: Unless CRL checking is disabled lookup a missing issuer
+    certificate using the certificate's authorityInfoAccess
+  * gpgsm: Print the certificate's serial number also in decimal
+    notation
+  * gpgsm: Fix possible NULL-deref in messages of --gen-key
+  * scd: Support the CardOS 5 based D-Trust Card 3.1
+  * dirmngr: Allow http URLs with "LOOKUP --url"
+  * wkd: Take name of sendmail from configure. Fixes an OpenBSD
+    specific bug
+
+-------------------------------------------------------------------

Old:
----
  gnupg-2.2.20.tar.bz2
  gnupg-2.2.20.tar.bz2.sig

New:
----
  gnupg-2.2.21.tar.bz2
  gnupg-2.2.21.tar.bz2.sig
  gnupg-gpgme-t-encrypt-sym.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ gpg2.spec ++++++
--- /var/tmp/diff_new_pack.ciRywv/_old  2020-07-15 11:15:21.637022925 +0200
+++ /var/tmp/diff_new_pack.ciRywv/_new  2020-07-15 11:15:21.641022928 +0200
@@ -17,7 +17,7 @@
 
 
 Name:           gpg2
-Version:        2.2.20
+Version:        2.2.21
 Release:        0
 Summary:        File encryption, decryption, signature creation and 
verification utility
 License:        GPL-3.0-or-later
@@ -40,6 +40,8 @@
 Patch14:        gnupg-add-test-cases-for-import-without-uid.patch
 Patch15:        
gnupg-allow-import-of-previously-known-keys-even-without-UIDs.patch
 Patch1124847:   gnupg-gpg-agent-ulimit.patch
+# PATCH-FIX-UPSTREAM bsc#1174007 gpgme: Fails to build with latest gpg-2.2.21
+Patch16:        gnupg-gpgme-t-encrypt-sym.patch
 BuildRequires:  expect
 BuildRequires:  fdupes
 BuildRequires:  libassuan-devel >= 2.5.0
@@ -105,6 +107,7 @@
 %patch13 -p1
 %patch14 -p1
 %patch15 -p1
+%patch16 -p1
 touch -d 2018-05-04 doc/gpg.texi # to compensate for patch11 in order to not 
have man pages and info files have the build date (boo#1047218)
 
 %build

++++++ gnupg-2.2.20.tar.bz2 -> gnupg-2.2.21.tar.bz2 ++++++
/work/SRC/openSUSE:Factory/gpg2/gnupg-2.2.20.tar.bz2 
/work/SRC/openSUSE:Factory/.gpg2.new.3060/gnupg-2.2.21.tar.bz2 differ: char 11, 
line 1

++++++ gnupg-gpgme-t-encrypt-sym.patch ++++++
Index: gnupg-2.2.21/agent/command.c
===================================================================
--- gnupg-2.2.21.orig/agent/command.c
+++ gnupg-2.2.21/agent/command.c
@@ -1595,11 +1595,14 @@ cmd_get_passphrase (assuan_context_t ctx
               pi2->failed_tries = 0;
               continue;
             }
-          if (*pi->pin && !pi->repeat_okay)
+          if (*pi->pin && !pi->repeat_okay
+              && ctrl->pinentry_mode != PINENTRY_MODE_LOOPBACK)
             {
               /* The passphrase is empty and the pinentry did not
                * already run the repetition check, do it here.  This
-               * is only called when using an old and  simple pinentry. */
+               * is only called when using an old and simple pinentry.
+               * It is neither called in loopback mode because the
+               * caller does any passphrase repetition by herself. */
               xfree (response);
               response = NULL;
               rc = agent_get_passphrase (ctrl, &response,


Reply via email to