Hello community, here is the log from the commit of package ghc-RSA for openSUSE:Factory checked in at 2016-01-08 15:22:45 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/ghc-RSA (Old) and /work/SRC/openSUSE:Factory/.ghc-RSA.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "ghc-RSA" Changes: -------- --- /work/SRC/openSUSE:Factory/ghc-RSA/ghc-RSA.changes 2015-12-29 12:59:07.000000000 +0100 +++ /work/SRC/openSUSE:Factory/.ghc-RSA.new/ghc-RSA.changes 2016-01-08 15:22:46.000000000 +0100 @@ -1,0 +2,5 @@ +Thu Dec 24 13:32:57 UTC 2015 - mimi...@gmail.com + +- update to 2.2.0 + +------------------------------------------------------------------- Old: ---- RSA-2.1.0.3.tar.gz New: ---- RSA-2.2.0.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ ghc-RSA.spec ++++++ --- /var/tmp/diff_new_pack.XwbqjK/_old 2016-01-08 15:22:47.000000000 +0100 +++ /var/tmp/diff_new_pack.XwbqjK/_new 2016-01-08 15:22:47.000000000 +0100 @@ -21,7 +21,7 @@ %bcond_with tests Name: ghc-RSA -Version: 2.1.0.3 +Version: 2.2.0 Release: 0 Summary: Implementation of RSA, using the padding schemes of PKCS#1 v2.1 License: BSD-3-Clause ++++++ RSA-2.1.0.3.tar.gz -> RSA-2.2.0.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/RSA-2.1.0.3/RSA.cabal new/RSA-2.2.0/RSA.cabal --- old/RSA-2.1.0.3/RSA.cabal 2015-09-03 23:21:31.000000000 +0200 +++ new/RSA-2.2.0/RSA.cabal 2015-10-12 20:52:47.000000000 +0200 @@ -1,6 +1,6 @@ name: RSA category: Cryptography, Codec -version: 2.1.0.3 +version: 2.2.0 license: BSD3 license-file: LICENSE author: Adam Wick <aw...@galois.com> diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/RSA-2.1.0.3/src/Codec/Crypto/RSA/Pure.hs new/RSA-2.2.0/src/Codec/Crypto/RSA/Pure.hs --- old/RSA-2.1.0.3/src/Codec/Crypto/RSA/Pure.hs 2015-09-03 23:21:31.000000000 +0200 +++ new/RSA-2.2.0/src/Codec/Crypto/RSA/Pure.hs 2015-10-12 20:52:47.000000000 +0200 @@ -73,7 +73,7 @@ | RSAIncorrectMsgSize | RSADecryptionError | RSAGenError GenError - deriving (Show, Typeable) + deriving (Eq, Show, Typeable) instance Exception RSAError @@ -325,7 +325,7 @@ -- generate an error, represented by the Left constructor. -- -- Futher, k (the length of the ciphertext in bytes) must be greater than or --- equal to (2 * hLen + 2), where hLen is the length of the output of the +-- equal to (2 * hLen + 2), where hLen is the length of the output of the -- hash function in bytes. If this equation does not hold, a (different) -- error will be generated. -- @@ -345,7 +345,7 @@ keySize = private_size k -- WARNING: Step 1a is missing! unless (BS.length c == fromIntegral keySize) $ -- Step 1b - Left RSADecryptionError + Left RSADecryptionError unless (fromIntegral keySize >= ((2 * hashLength) + 2)) $ -- Step 1c Left RSADecryptionError let c_ip = os2ip c -- Step 2a @@ -417,7 +417,7 @@ em <- i2osp m_i (private_size k) -- Step 2c let (zt, ps_z_m) = BS.splitAt 2 em -- Step 3... (ps, z_m) = BS.span (/= 0) ps_z_m - (z, m) = BS.splitAt 1 z_m + (z, m) = BS.splitAt 1 z_m when (BS.unpack zt /= [0,2]) $ Left RSADecryptionError when (BS.unpack z /= [0]) $ Left RSADecryptionError when (BS.length ps < 8 ) $ Left RSADecryptionError @@ -483,17 +483,17 @@ -- ---------------------------------------------------------------------------- -- |A 'mask generation function'. The input is a bytestring, and the output --- is a hash of the given length. Unless you know what you're doing, you +-- is a hash of the given length. Unless you know what you're doing, you -- should probably use a MGF1 formulation created with generate_MGF1. type MGF = ByteString -> Int64 -> Either RSAError ByteString --- |Generate a mask generation function for the rsaes_oaep_*. As +-- |Generate a mask generation function for the rsaes_oaep_*. As -- suggested by the name, the generated function is an instance of the MGF1 --- function. The arguments are the underlying hash function to use and the +-- function. The arguments are the underlying hash function to use and the -- size of a hash in bytes. -- -- The bytestring passed to the generated function cannot be longer than --- 2^32 * hLen, where hLen is the passed length of the hash. +-- 2^32 * hLen, where hLen is the passed length of the hash. generateMGF1 :: (ByteString -> ByteString) -> MGF generateMGF1 hash mgfSeed maskLen | BS.length mgfSeed > ((2 ^ (32::Integer)) * hLen) = Left RSAMaskTooLong @@ -573,7 +573,7 @@ in if r /= 0 then (q + 1) else q -- Generate p and q. This is not necessarily the best way to do this, but it --- appears to work. +-- appears to work. generatePQ :: CryptoRandomGen g => g -> Int -> @@ -677,7 +677,7 @@ | n == 1 = Right (False, g) | n == 2 = Right (True, g) | n == 3 = Right (True, g) - | otherwise = + | otherwise = -- write (n-1) as 2^s*d with d odd by factoring powers of 2 from n-1 let (s, d) = oddify 0 (n - 1) in checkLoop g s d k