Hello community,

here is the log from the commit of package ghc-RSA for openSUSE:Factory checked 
in at 2016-01-08 15:22:45
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/ghc-RSA (Old)
 and      /work/SRC/openSUSE:Factory/.ghc-RSA.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "ghc-RSA"

Changes:
--------
--- /work/SRC/openSUSE:Factory/ghc-RSA/ghc-RSA.changes  2015-12-29 
12:59:07.000000000 +0100
+++ /work/SRC/openSUSE:Factory/.ghc-RSA.new/ghc-RSA.changes     2016-01-08 
15:22:46.000000000 +0100
@@ -1,0 +2,5 @@
+Thu Dec 24 13:32:57 UTC 2015 - mimi...@gmail.com
+
+- update to 2.2.0
+
+-------------------------------------------------------------------

Old:
----
  RSA-2.1.0.3.tar.gz

New:
----
  RSA-2.2.0.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ ghc-RSA.spec ++++++
--- /var/tmp/diff_new_pack.XwbqjK/_old  2016-01-08 15:22:47.000000000 +0100
+++ /var/tmp/diff_new_pack.XwbqjK/_new  2016-01-08 15:22:47.000000000 +0100
@@ -21,7 +21,7 @@
 %bcond_with tests
 
 Name:           ghc-RSA
-Version:        2.1.0.3
+Version:        2.2.0
 Release:        0
 Summary:        Implementation of RSA, using the padding schemes of PKCS#1 v2.1
 License:        BSD-3-Clause

++++++ RSA-2.1.0.3.tar.gz -> RSA-2.2.0.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/RSA-2.1.0.3/RSA.cabal new/RSA-2.2.0/RSA.cabal
--- old/RSA-2.1.0.3/RSA.cabal   2015-09-03 23:21:31.000000000 +0200
+++ new/RSA-2.2.0/RSA.cabal     2015-10-12 20:52:47.000000000 +0200
@@ -1,6 +1,6 @@
 name:       RSA
 category:   Cryptography, Codec
-version:    2.1.0.3
+version:    2.2.0
 license:    BSD3
 license-file: LICENSE
 author:     Adam Wick <aw...@galois.com>
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/RSA-2.1.0.3/src/Codec/Crypto/RSA/Pure.hs 
new/RSA-2.2.0/src/Codec/Crypto/RSA/Pure.hs
--- old/RSA-2.1.0.3/src/Codec/Crypto/RSA/Pure.hs        2015-09-03 
23:21:31.000000000 +0200
+++ new/RSA-2.2.0/src/Codec/Crypto/RSA/Pure.hs  2015-10-12 20:52:47.000000000 
+0200
@@ -73,7 +73,7 @@
               | RSAIncorrectMsgSize
               | RSADecryptionError
               | RSAGenError GenError
- deriving (Show, Typeable)
+ deriving (Eq, Show, Typeable)
 
 instance Exception RSAError
 
@@ -325,7 +325,7 @@
 -- generate an error, represented by the Left constructor.
 --
 -- Futher, k (the length of the ciphertext in bytes) must be greater than or
--- equal to (2 * hLen + 2), where hLen is the length of the output of the 
+-- equal to (2 * hLen + 2), where hLen is the length of the output of the
 -- hash function in bytes. If this equation does not hold, a (different)
 -- error will be generated.
 --
@@ -345,7 +345,7 @@
          keySize    = private_size k
      -- WARNING: Step 1a is missing!
      unless (BS.length c == fromIntegral keySize) $                -- Step 1b
-       Left RSADecryptionError 
+       Left RSADecryptionError
      unless (fromIntegral keySize >= ((2 * hashLength) + 2)) $     -- Step 1c
        Left RSADecryptionError
      let c_ip = os2ip c                                            -- Step 2a
@@ -417,7 +417,7 @@
      em   <- i2osp m_i (private_size k)                         -- Step 2c
      let (zt, ps_z_m) = BS.splitAt 2 em                         -- Step 3...
          (ps, z_m)    = BS.span (/= 0) ps_z_m
-         (z, m)       = BS.splitAt 1 z_m 
+         (z, m)       = BS.splitAt 1 z_m
      when (BS.unpack zt /= [0,2]) $ Left RSADecryptionError
      when (BS.unpack z  /= [0])   $ Left RSADecryptionError
      when (BS.length ps <  8 )    $ Left RSADecryptionError
@@ -483,17 +483,17 @@
 -- ----------------------------------------------------------------------------
 
 -- |A 'mask generation function'. The input is a bytestring, and the output
--- is a hash of the given length. Unless you know what you're doing, you 
+-- is a hash of the given length. Unless you know what you're doing, you
 -- should probably use a MGF1 formulation created with generate_MGF1.
 type MGF = ByteString -> Int64 -> Either RSAError ByteString
 
--- |Generate a mask generation function for the rsaes_oaep_*. As 
+-- |Generate a mask generation function for the rsaes_oaep_*. As
 -- suggested by the name, the generated function is an instance of the MGF1
--- function. The arguments are the underlying hash function to use and the 
+-- function. The arguments are the underlying hash function to use and the
 -- size of a hash in bytes.
 --
 -- The bytestring passed to the generated function cannot be longer than
--- 2^32 * hLen, where hLen is the passed length of the hash. 
+-- 2^32 * hLen, where hLen is the passed length of the hash.
 generateMGF1 :: (ByteString -> ByteString) -> MGF
 generateMGF1 hash mgfSeed maskLen
   | BS.length mgfSeed > ((2 ^ (32::Integer)) * hLen) = Left RSAMaskTooLong
@@ -573,7 +573,7 @@
               in if r /= 0 then (q + 1) else q
 
 -- Generate p and q. This is not necessarily the best way to do this, but it
--- appears to work. 
+-- appears to work.
 generatePQ :: CryptoRandomGen g =>
               g ->
               Int ->
@@ -677,7 +677,7 @@
   | n == 1    = Right (False, g)
   | n == 2    = Right (True, g)
   | n == 3    = Right (True, g)
-  | otherwise = 
+  | otherwise =
      -- write (n-1) as 2^s*d with d odd by factoring powers of 2 from n-1
      let (s, d) = oddify 0 (n - 1)
      in checkLoop g s d k


Reply via email to