Revisions of perl-Crypt-OpenPGP
Stephan Kulow (coolo)
accepted
request 667173
from
Pedro Monreal Gonzalez (pmonrealgonzalez)
(revision 6)
- Fix build * Choose perl(Alt::Crypt::RSA::BigInt) as alternative for perl(Crypt::RSA) * Added random source in tests by adding perl(Bytes::Random::Secure)
Dirk Stoecker (dstoecker)
accepted
request 347139
from
Tomáš Chvátal (scarabeus_iv)
(revision 5)
- Disable the t/13-keygen.t, the magical entropy generating attempts fail - Update to 1.12: * Fixes tests so this package no longer gets stuck in OBS * List of upstream changes: - Add NoVersion parameter to CO::Armour->armour (GH#26) - Check that Crypt::OpenPGP::Cipher->new succeeded, RT#14033. - Fix GH#7, when false data was discarded (@Camspi). - Update GnuPG defaults (@bk2204). - Fix error propagation on generating RSA key (@niner). - Require Digest::SHA instead of Digest::SHA1, RT#82316 (@bk2204). - Move distribution to Dist::Zilla. - Require Alt::Crypt::RSA::BigInt instead of Crypt::RSA. - Apply a patch from RT#82314 (@bk2204, @kmx). - Add a test case from GH#7, yet to be fixed (@throughnothing). - Reformatted Changes as per CPAN::Changes::Spec. - Fixed hash randomisation bug (RT#81442). - Documentation now references most recent "OpenPGP Message Format" RFC. - Fixed typo in Pod (@dsteinbrunner). - Improved ASCII armor detection (@gwillen).
Stephan Kulow (coolo)
committed
(revision 4)
use gz
Stephan Kulow (coolo)
committed
(revision 3)
Stephan Kulow (coolo)
committed
(revision 2)
Vítězslav Čížek (vitezslav_cizek)
accepted
request 72991
from
Juergen Weigert (jnweiger)
(revision 1)
retry, with added pseudo entropy generator, so that buildservice does not kill us while waiting for entropy.
Displaying all 6 revisions