Hello community, here is the log from the commit of package gpg2 for openSUSE:Factory checked in at 2020-07-15 11:13:43 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/gpg2 (Old) and /work/SRC/openSUSE:Factory/.gpg2.new.3060 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "gpg2" Wed Jul 15 11:13:43 2020 rev:149 rq:820863 version:2.2.21 Changes: -------- --- /work/SRC/openSUSE:Factory/gpg2/gpg2.changes 2020-05-02 22:15:47.276341286 +0200 +++ /work/SRC/openSUSE:Factory/.gpg2.new.3060/gpg2.changes 2020-07-15 11:15:08.041009467 +0200 @@ -1,0 +2,34 @@ +Tue Jul 14 10:22:22 UTC 2020 - Pedro Monreal Gonzalez <pmonrealgonza...@suse.com> + +- Fix regression in latest gpg2 that makes gpgme fail to build [bsc#1174007] +- Add gnupg-gpgme-t-encrypt-sym.patch + +------------------------------------------------------------------- +Thu Jul 9 11:36:57 UTC 2020 - Andreas Stieger <andreas.stie...@gmx.de> + +- GnuPG 2.2.21: + * gpg: Improve symmetric decryption speed by about 25% + * gpg: Support decryption of AEAD encrypted data packets + * gpg: Add option --no-include-key-block + * gpg: Allow for extra padding in ECDH + * gpg: Only a single pinentry is shown for symmetric encryption if + the pinentry supports this + * gpg: Print a note if no keys are given to --delete-key + * gpg,gpgsm: The ridiculous passphrase quality bar is not anymore + shown + * gpgsm: Certificates without a CRL distribution point are now + considered valid without looking up a CRL. The new option + --enable-issuer-based-crl-check can be used to revert to the + former behaviour + * gpgsm: Support rsaPSS signature verification + * gpgsm: Unless CRL checking is disabled lookup a missing issuer + certificate using the certificate's authorityInfoAccess + * gpgsm: Print the certificate's serial number also in decimal + notation + * gpgsm: Fix possible NULL-deref in messages of --gen-key + * scd: Support the CardOS 5 based D-Trust Card 3.1 + * dirmngr: Allow http URLs with "LOOKUP --url" + * wkd: Take name of sendmail from configure. Fixes an OpenBSD + specific bug + +------------------------------------------------------------------- Old: ---- gnupg-2.2.20.tar.bz2 gnupg-2.2.20.tar.bz2.sig New: ---- gnupg-2.2.21.tar.bz2 gnupg-2.2.21.tar.bz2.sig gnupg-gpgme-t-encrypt-sym.patch ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ gpg2.spec ++++++ --- /var/tmp/diff_new_pack.ciRywv/_old 2020-07-15 11:15:21.637022925 +0200 +++ /var/tmp/diff_new_pack.ciRywv/_new 2020-07-15 11:15:21.641022928 +0200 @@ -17,7 +17,7 @@ Name: gpg2 -Version: 2.2.20 +Version: 2.2.21 Release: 0 Summary: File encryption, decryption, signature creation and verification utility License: GPL-3.0-or-later @@ -40,6 +40,8 @@ Patch14: gnupg-add-test-cases-for-import-without-uid.patch Patch15: gnupg-allow-import-of-previously-known-keys-even-without-UIDs.patch Patch1124847: gnupg-gpg-agent-ulimit.patch +# PATCH-FIX-UPSTREAM bsc#1174007 gpgme: Fails to build with latest gpg-2.2.21 +Patch16: gnupg-gpgme-t-encrypt-sym.patch BuildRequires: expect BuildRequires: fdupes BuildRequires: libassuan-devel >= 2.5.0 @@ -105,6 +107,7 @@ %patch13 -p1 %patch14 -p1 %patch15 -p1 +%patch16 -p1 touch -d 2018-05-04 doc/gpg.texi # to compensate for patch11 in order to not have man pages and info files have the build date (boo#1047218) %build ++++++ gnupg-2.2.20.tar.bz2 -> gnupg-2.2.21.tar.bz2 ++++++ /work/SRC/openSUSE:Factory/gpg2/gnupg-2.2.20.tar.bz2 /work/SRC/openSUSE:Factory/.gpg2.new.3060/gnupg-2.2.21.tar.bz2 differ: char 11, line 1 ++++++ gnupg-gpgme-t-encrypt-sym.patch ++++++ Index: gnupg-2.2.21/agent/command.c =================================================================== --- gnupg-2.2.21.orig/agent/command.c +++ gnupg-2.2.21/agent/command.c @@ -1595,11 +1595,14 @@ cmd_get_passphrase (assuan_context_t ctx pi2->failed_tries = 0; continue; } - if (*pi->pin && !pi->repeat_okay) + if (*pi->pin && !pi->repeat_okay + && ctrl->pinentry_mode != PINENTRY_MODE_LOOPBACK) { /* The passphrase is empty and the pinentry did not * already run the repetition check, do it here. This - * is only called when using an old and simple pinentry. */ + * is only called when using an old and simple pinentry. + * It is neither called in loopback mode because the + * caller does any passphrase repetition by herself. */ xfree (response); response = NULL; rc = agent_get_passphrase (ctrl, &response,