Commit graph

55 commits

Author SHA1 Message Date
martin
1a498826a9 Fix patch comment, pointed out by joerg 2019-01-09 14:19:26 +00:00
martin
24eee4f3ae Make this buildable on aarch64. 2019-01-09 13:41:41 +00:00
kamil
a730c25086 libgcrypt: Fix build with Clang
Port code that disables optimization on GCC to Clang/LLVM.
2018-05-11 19:20:11 +00:00
fhajny
497462a78a Use COMPILER_RPATH_FLAG properly. Reconciles libgcrypt-config with
Darwin linker. Fixes joyent/pkgsrc#400. Bump PKGREVISION.
2016-09-01 10:19:30 +00:00
wiz
b42c80fa13 Updated libgcrypt to 1.7.2.
Noteworthy changes in version 1.7.2 (2016-07-14)  [C21/A1/R2]
------------------------------------------------

 * Bug fixes:

   - Fix setting of the ECC cofactor if parameters are specified.

   - Fix memory leak in the ECC code.

   - Remove debug message about unsupported getrandom syscall.

   - Fix build problems related to AVX use.

   - Fix bus errors on ARM for Poly1305, ChaCha20, AES, and SHA-512.

 * Internal changes:

   - Improved fatal error message for wrong use of gcry_md_read.

   - Disallow symmetric encryption/decryption if key is not set.
2016-07-16 08:35:52 +00:00
wiz
a8a410ac57 Fix assembler problems on ARM.
Patches by Michael Plass <mfpnb@plass-family.net> on tech-pkg/port-arm.

Bump PKGREVISION.
2016-07-02 13:24:17 +00:00
wiz
bb1fab099c Update libgcrypt to 1.7.0.
Noteworthy changes in version 1.7.0 (2016-04-15)  [C21/A1/R0]
------------------------------------------------

 * New algorithms and modes:

   - SHA3-224, SHA3-256, SHA3-384, SHA3-512, and MD2 hash algorithms.

   - SHAKE128 and SHAKE256 extendable-output hash algorithms.

   - ChaCha20 stream cipher.

   - Poly1305 message authentication algorithm

   - ChaCha20-Poly1305 Authenticated Encryption with Associated Data
     mode.

   - OCB mode.

   - HMAC-MD2 for use by legacy applications.

 * New curves for ECC:

   - Curve25519.

   - sec256k1.

   - GOST R 34.10-2001 and GOST R 34.10-2012.

 * Performance:

   - Improved performance of KDF functions.

   - Assembler optimized implementations of Blowfish and Serpent on
     ARM.

   - Assembler optimized implementation of 3DES on x86.

   - Improved AES using the SSSE3 based vector permutation method by
     Mike Hamburg.

   - AVX/BMI is used for SHA-1 and SHA-256 on x86.  This is for SHA-1
     about 20% faster than SSSE3 and more than 100% faster than the
     generic C implementation.

   - 40% speedup for SHA-512 and 72% for SHA-1 on ARM Cortex-A8.

   - 60-90% speedup for Whirlpool on x86.

   - 300% speedup for RIPE MD-160.

   - Up to 11 times speedup for CRC functions on x86.

 * Other features:

   - Improved ECDSA and FIPS 186-4 compliance.

   - Support for Montgomery curves.

   - gcry_cipher_set_sbox to tweak S-boxes of the gost28147 cipher
     algorithm.

   - gcry_mpi_ec_sub to subtract two points on a curve.

   - gcry_mpi_ec_decode_point to decode an MPI into a point object.

   - Emulation for broken Whirlpool code prior to 1.6.0.  [from 1.6.1]

   - Flag "pkcs1-raw" to enable PCKS#1 padding with a user supplied
     hash part.

   - Parameter "saltlen" to set a non-default salt length for RSA PSS.

   - A SP800-90A conforming DRNG replaces the former X9.31 alternative
     random number generator.

   - Map deprecated RSA algo number to the RSA algo number for better
     backward compatibility. [from 1.6.2]

   - Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
     See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
     [from 1.6.3]

   - Fixed data-dependent timing variations in modular exponentiation
     [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
      are Practical]. [from 1.6.3]

   - Flag "no-keytest" for ECC key generation.  Due to a bug in
     the parser that flag will also be accepted but ignored by older
     version of Libgcrypt. [from 1.6.4]

   - Speed up the random number generator by requiring less extra
     seeding. [from 1.6.4]

   - Always verify a created RSA signature to avoid private key leaks
     due to hardware failures. [from 1.6.4]

   - Mitigate side-channel attack on ECDH with Weierstrass curves
     [CVE-2015-7511].  See http://www.cs.tau.ac.IL/~tromer/ecdh/ for
     details. [from 1.6.5]

 * Internal changes:

   - Moved locking out to libgpg-error.

   - Support of the SYSROOT envvar in the build system.

   - Refactor some code.

   - The availability of a 64 bit integer type is now mandatory.

 * Bug fixes:

   - Fixed message digest lookup by OID (regression in 1.6.0).

   - Fixed a build problem on NetBSD

   - Fixed memory leaks in ECC code.

   - Fixed some asm build problems and feature detection bugs.

 * Interface changes relative to the 1.6.0 release:
   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   gcry_cipher_final               NEW macro.
   GCRY_CIPHER_MODE_CFB8           NEW constant.
   GCRY_CIPHER_MODE_OCB            NEW.
   GCRY_CIPHER_MODE_POLY1305       NEW.
   gcry_cipher_set_sbox            NEW macro.
   gcry_mac_get_algo               NEW.
   GCRY_MAC_HMAC_MD2               NEW.
   GCRY_MAC_HMAC_SHA3_224          NEW.
   GCRY_MAC_HMAC_SHA3_256          NEW.
   GCRY_MAC_HMAC_SHA3_384          NEW.
   GCRY_MAC_HMAC_SHA3_512          NEW.
   GCRY_MAC_POLY1305               NEW.
   GCRY_MAC_POLY1305_AES           NEW.
   GCRY_MAC_POLY1305_CAMELLIA      NEW.
   GCRY_MAC_POLY1305_SEED          NEW.
   GCRY_MAC_POLY1305_SERPENT       NEW.
   GCRY_MAC_POLY1305_TWOFISH       NEW.
   gcry_md_extract                 NEW.
   GCRY_MD_FLAG_BUGEMU1            NEW [from 1.6.1].
   GCRY_MD_GOSTR3411_CP            NEW.
   GCRY_MD_SHA3_224                NEW.
   GCRY_MD_SHA3_256                NEW.
   GCRY_MD_SHA3_384                NEW.
   GCRY_MD_SHA3_512                NEW.
   GCRY_MD_SHAKE128                NEW.
   GCRY_MD_SHAKE256                NEW.
   gcry_mpi_ec_decode_point        NEW.
   gcry_mpi_ec_sub                 NEW.
   GCRY_PK_EDDSA                   NEW constant.
   GCRYCTL_GET_TAGLEN              NEW.
   GCRYCTL_SET_SBOX                NEW.
   GCRYCTL_SET_TAGLEN              NEW.
2016-04-18 06:19:57 +00:00
wiz
c97b3e7b53 Add upstream bug report URL. 2015-09-14 14:58:49 +00:00
wiz
7ea82ca83b Fix build on Solaris 11 per PR 50242 by Jörn Clausen. 2015-09-14 13:25:39 +00:00
wiz
41479d6e6c Update security/libgcrypt to 1.6.4:
Noteworthy changes in version 1.6.4 (2015-09-08) [C20/A0/R4]
------------------------------------------------

 * Speed up the random number generator by requiring less extra
   seeding.

 * New flag "no-keytest" for ECC key generation.  Due to a bug in the
   parser that flag will also be accepted but ignored by older version
   of Libgcrypt.

 * Always verify a created RSA signature to avoid private key leaks
   due to hardware failures.

 * Fix alignment bug in the AESNI code on Windows > 7.

 * Support FreeBSD 10 and later.

 * Other minor bug fixes.
2015-09-09 18:02:15 +00:00
sevan
5c280a567a Re-introduce previous fix for building on Solaris SPARC, confirmed to resolve
issue on Solaris 10 SPARC.

pkg/26815
https://bugs.g10code.com/gnupg/issue1703

Reviewed by wiz@
2015-04-17 14:36:17 +00:00
wiz
2ff93577e0 Replace patch-ab with upstream version, see
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commitdiff;h=817472358a093438e802380caecf7139406400cf;hp=8c5eee51d9a25b143e41ffb7ff4a6b2a29b82d83

Bump PKGREVISION.
2015-01-05 21:56:16 +00:00
wiz
b6d4905b46 Remove ten year old patch for Solaris 9/sparc/gcc that was never fed
upstream. If this patch is still necessary for you, please discuss
at https://bugs.g10code.com/gnupg/issue1703

Bump PKGREVISION.
2014-08-29 14:22:59 +00:00
richard
e782488d6e reinstate patch-configure as upstream patch not yet in [1.6.2] release.
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commitdiff;h=43376891c01f4aff1fbfb23beafebb5adfd0868c
revbump to pick it up.
2014-08-29 10:29:14 +00:00
wiz
2e9add9638 Remove patch that was already included upstream.
See
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commitdiff;h=43376891c01f4aff1fbfb23beafebb5adfd0868c
2014-08-21 21:04:15 +00:00
wiz
bde0ebf513 Add comments and upstream bug report URLs to patches. 2014-08-21 19:55:26 +00:00
wiz
421719951a Update to 1.6.2. Add a comment to patch.
Noteworthy changes in version 1.6.2 (2014-08-21) [C20/A0/R2]
------------------------------------------------

 * Map deprecated RSA algo number to the RSA algo number for better
   backward compatibility.

 * Support a 0x40 compression prefix for EdDSA.

 * Improve ARM hardware feature detection and building.

 * Fix powerpc-apple-darwin detection

 * Fix building for the x32 ABI platform.

 * Support building using the latest mingw-w64 toolchain.

 * Fix some possible NULL deref bugs.
2014-08-21 19:41:38 +00:00
ryoon
d663570005 Fix build under SCO OpenServer 5.0.7/3.2. 2014-07-18 10:36:28 +00:00
obache
e54ed74d92 Add patch for build fix on Darwin PPC.
PR pkg/48655 by Jason Bacon.
2014-04-01 09:48:37 +00:00
wiz
e47609ba13 Update to 1.6.1. Remove lots of integrated patches.
Noteworthy changes in version 1.6.1 (2014-01-29)
------------------------------------------------

 * Added emulation for broken Whirlpool code prior to 1.6.0.

 * Improved performance of KDF functions.

 * Improved ECDSA compliance.

 * Fixed locking for Windows and non-ELF Pthread systems (regression
   in 1.6.0)

 * Fixed message digest lookup by OID (regression in 1.6.0).

 * Fixed a build problem on NetBSD.

 * Fixed memory leaks in ECC code.

 * Fixed some asm build problems and feature detection bugs.

 * Interface changes relative to the 1.6.0 release:
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 GCRY_MD_FLAG_BUGEMU1            NEW (minor API change).
2014-02-03 16:51:35 +00:00
obache
0948c5551e Use upstream way to fix. 2014-01-13 11:44:27 +00:00
ryoon
c01c057b32 Fix PR pkg/48510 pkgsrc/security/libgcrypt:
Add blowfish/serpent ARM assembly files to Makefile.am

* Add patches from upstream git repository
* Tested on NetBSD/evbearmv6hf-el 6.99.28
2014-01-11 10:49:14 +00:00
obache
b5f4e9875f change to better URL for BTS. 2014-01-08 09:39:45 +00:00
obache
165a7a3941 Note upstream bug report. 2014-01-08 09:38:23 +00:00
obache
c6825afd77 Use system supplied bswap32 and bswap64 macros on NetBSD.
Fixes build on NetBSD-5-i386 with builtin gcc.
2014-01-08 09:01:39 +00:00
richard
57255c5547 revise recent -Wa,--divide usage for SunOS to allow only SunOS x86_64
and naturally non-gcc/non-gas builds by patching configure instead
(adapted from configure.ac in the works upstream).
2014-01-07 17:18:29 +00:00
wiz
192a80dbc5 Update to 1.6.0:
Noteworthy changes in version 1.6.0 (2013-12-16)
------------------------------------------------

 * Removed the long deprecated gcry_ac interface.  Thus Libgcrypt is
   not anymore ABI compatible to previous versions if they used the ac
   interface.

 * Removed the module register subsystem.

 * The deprecated message digest debug macros have been removed.  Use
   gcry_md_debug instead.

 * Removed deprecated control codes.

 * Improved performance of most cipher algorithms as well as for the
   SHA family of hash functions.

 * Added support for the IDEA cipher algorithm.

 * Added support for the Salsa20 and reduced Salsa20/12 stream ciphers.

 * Added limited support for the GOST 28147-89 cipher algorithm.

 * Added support for the GOST R 34.11-94 and R 34.11-2012 (Stribog)
   hash algorithms.

 * Added a random number generator to directly use the system's RNG.
   Also added an interface to prefer the use of a specified RNG.

 * Added support for the SCRYPT algorithm.

 * Mitigated the Yarom/Falkner flush+reload side-channel attack on RSA
   secret keys.  See <http://eprint.iacr.org/2013/448> [CVE-2013-4242].

 * Added support for Deterministic DSA as per RFC-6969.

 * Added support for curve Ed25519.

 * Added a scatter gather hash convenience function.

 * Added several MPI amd SEXP helper functions.

 * Added support for negative numbers to gcry_mpi_print,
   gcry_mpi_aprint and gcry_mpi_scan.

 * The algorithm ids GCRY_PK_ECDSA and GCRY_PK_ECDH are now
   deprecated.  Use GCRY_PK_ECC if you need an algorithm id.

 * Changed gcry_pk_genkey for "ecc" to only include the curve name and
   not the parameters.  The flag "param" may be used to revert this.

 * Added a feature to globally disable selected hardware features.

 * Added debug helper functions.
2014-01-01 11:49:59 +00:00
wiz
685e7d0f4c Update to 1.5.2.
XXX: lots of patches without comments, and not upstreamed it seems.

Noteworthy changes in version 1.5.2 (2013-04-18)
------------------------------------------------

 * Added support for IDEA.

 * Made the Padlock code work again (regression since 1.5.0).

 * Fixed alignment problems for Serpent.

 * Fixed two bugs in ECC computations.
2013-04-21 14:44:53 +00:00
drochner
1e64f5cc7e remove obsolete patch, fixes build on DragonFly, from David Shao
per PR pkg/47735
2013-04-11 17:08:38 +00:00
drochner
6f72064e3c update to 1.5.1
changes: minor fixes
2013-04-10 15:17:55 +00:00
cheusov
f1bd53c1e7 Fix compilation failure:
./src/.libs/libgcrypt.so: undefined reference to `assert'
2011-11-29 01:33:37 +00:00
adam
833ca25fa0 Changes 1.5.0:
* New function gcry_kdf_derive implementing OpenPGP S2K algorithms
  and PBKDF2.
* Support for WindowsCE.
* Support for ECDH.
* Support for OAEP and PSS methods as described by RFC-3447.
* Fixed PKCS v1.5 code to always return the leading zero.
* New format specifiers "%M" and "%u" for gcry_sexp_build.
* Support opaque MPIs with "%m" and "%M" in gcry_sexp_build.
* New functions gcry_pk_get_curve and gcry_pk_get_param to map ECC
  parameters to a curve name and to retrieve parameter values.
* gcry_mpi_cmp applied to opaque values has a defined semantic now.
* Uses the Intel AES-NI instructions if available.
* The use of the deprecated Alternative Public Key Interface
  (gcry_ac_*) will now print compile time warnings.
* The module register subsystem has been deprecated.  This subsystem
  is not flexible enough and would always require ABI changes to
  extend the internal interfaces.  It will eventually be removed.
  Please contact us on the gcrypt-devel mailing list to discuss
  whether you really need this feature or how it can be replaced by
  an internal plugin mechanism.
* CTR mode may now be used with data chunks of arbitrary length.
2011-07-13 21:21:52 +00:00
drochner
ba10990554 put back the (non-default) "idea" option which got lost a while ago 2009-12-18 18:54:24 +00:00
adam
6c385f5ff3 Changes 1.4.4:
* Publish GCRY_MODULE_ID_USER and GCRY_MODULE_ID_USER_LAST constants.
  This functionality has been in Libgcrypt since 1.3.0.
* MD5 may now be used in non-enforced fips mode.
* Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes.
* In fips mode, RSA keys are now generated using the X9.31 algorithm
  and DSA keys using the FIPS 186-2 algorithm.
* The transient-key flag is now also supported for DSA key
  generation.  DSA domain parameters may be given as well.
2009-01-31 08:53:14 +00:00
shannonjr
0a391289a6 "return _gcry_rngfips_deinit_external_test (context);"
is incorrect because:
1) _gcry_rngfips_deinit_external_test() is void function
2) the calling function, random, is declared void

The unpatched code will not compile with Sun compiler.
2008-10-29 10:24:09 +00:00
adam
d779ce5514 Changes 1.4.3:
* Try to auto-initialize Libgcrypt to minimize the effect of
  applications not doing that correctly.  This is not a perfect
  solution but given that many applicationion would totally fail
  without such a hack, we try to help at least with the most common
  cases.  Folks, please read the manual to learn how to properly
  initialize Libgcrypt!
* Auto-initialize the secure memory to 32k instead of aborting the
  process.
* Log fatal errors via syslog.
* Changed the name and the semantics of the fips mode config file.
* Add convenience macro gcry_fips_mode_active.
* More self-tests.
* Documentation cleanups.
2008-10-14 11:33:13 +00:00
wiz
1cb31b9db7 Update to 1.4.1:
Noteworthy changes in version 1.4.1 (2008-04-25)
------------------------------------------------

 * Fixed a bug introduced by 1.3.1 which led to the comsumption of far
   too much entropy for the intial seeding.

 * Improved AES performance for CFB and CBC modes.

 * Removed build problems for the Padlock support.
2008-04-29 11:03:50 +00:00
tnn
fd23ed0d29 Fix build with MIPSPro. PR pkg/38210. 2008-03-11 22:19:54 +00:00
wiz
ab973e6cbc Update to 1.4.0:
Noteworthy changes in version 1.4.0 (2007-12-10)
------------------------------------------------

 * New configure option --disable-padlock-support which is mostly
   useful in case of build problems.


Noteworthy changes in version 1.3.2 (2007-12-03)
------------------------------------------------

 * The visibility attribute is now used if supported by the toolchain.

 * The ACE engine of VIA processors is now used for AES-128.

 * The ASN.1 DER template for SHA-224 has been fixed.


Noteworthy changes in version 1.3.1 (2007-10-26)
------------------------------------------------

 * The entire library is now under the LGPL. The helper programs and
   the manual are under the GPL.  Kudos to Peter Gutmann for giving
   permissions to relicense the rndw32 and rndunix modules.

 * The Camellia cipher is now under the LGPL and included by default.

 * Fixed a bug in the detection of symbol prefixes which inhibited the
   build of optimzied assembler code on certain systems.

 * Updated the entropy gatherer for W32.


Noteworthy changes in version 1.3.0 (2007-05-04)
------------------------------------------------

 * Changed the way the RNG gets initialized. This allows to keep it
   uninitialized as long as no random numbers are used.  To override
   this, the new macro gcry_fast_random_poll may be used.  It is in
   general a good idea to spread this macro into the application code
   to make sure that these polls happen often enough.

 * Made the RNG immune against fork without exec.

 * Reading and writing the random seed file is now protected by a
   fcntl style file lock on systems that provide this function.

 * Support for SHA-224 and HMAC using SHA-384 and SHA-512.

 * Support for the SEED cipher.

 * Support for the Camellia cipher.  Note that Camellia is disabled by
   default, and that enabling it changes the license of libgcrypt from
   LGPL to GPL.

 * Support for OFB encryption mode.

 * gcry_mpi_rshift does not anymore truncate the shift count.

 * Reserved algorithm ranges for use by applications.

 * Support for DSA2.

 * The new function gcry_md_debug should be used instead of the
   gcry_md_start_debug and gcry_md_stop_debug macros.

 * New configure option --enable-random-daemon to support a system
   wide random daemon.  The daemon code is experimental and not yet
   very well working.  It will eventually allow to keep a global
   random pool for the sake of short living processes.

 * Non executable stack support is now used by default on systems
   supporting it.

 * Support for Microsoft Windows.

 * Assembler support for the AMD64 architecture.

 * New configure option --enable-mpi-path for optimized builds.

 * Experimental support for ECDSA; should only be used for testing.

 * New control code GCRYCTL_PRINT_CONFIG to print the build
   configuration.

 * Minor changes to some function declarations.  Buffer arguments are
   now typed as void pointer.  This should not affect any compilation.
   Fixed two bugs in return values and clarified documentation.

 * Interface changes relative to the 1.2.0 release:
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 gcry_fast_random_poll	 NEW
 gcry_md_debug           NEW
 gcry_sexp_nth_string    NEW
 GCRY_MD_SHA224          NEW
 GCRY_PK_USAGE_CERT      NEW
 GCRY_PK_USAGE_AUTH      NEW
 GCRY_PK_USAGE_UNKN      NEW
 GCRY_PK_ECDSA           NEW
 GCRY_CIPHER_SEED        NEW
 GCRY_CIPHER_CAMELLIA128 NEW
 GCRY_CIPHER_CAMELLIA192 NEW
 GCRY_CIPHER_CAMELLIA256 NEW
 GCRYCTL_FAKED_RANDOM_P  NEW
 GCRYCTL_PRINT_CONFIG    NEW
 GCRYCTL_SET_RNDEGD_SOCKET  NEW.
 gcry_mpi_scan           CHANGED: Argument BUFFER is now void*.
 gcry_pk_algo_name       CHANGED: Returns "?" instead of NULL.
 gcry_cipher_algo_name   CHANGED: Returns "?" instead of "".
 gcry_pk_spec_t          CHANGED: Element ALIASES is now const ptr.
 gcry_md_write_t         CHANGED: Argument BUF is now a const void*.
 gcry_md_ctl             CHANGED: Argument BUFFER is now void*.
 gcry_cipher_encrypt     CHANGED: Arguments IN and OUT are now void*.
 gcry_cipher_decrypt     CHANGED: Arguments IN and OUT are now void*.
 gcry_sexp_sprint        CHANGED: Argument BUFFER is now void*.
 gcry_create_nonce       CHANGED: Argument BUFFER is now void*.
 gcry_randomize          CHANGED: Argument BUFFER is now void*.
 gcry_cipher_register    CHANGED: Argument ALGORITHM_ID is now int*.
2008-03-07 16:16:22 +00:00
wiz
b1e5bdfecd Update to 1.2.4:
Noteworthy changes in version 1.2.4 (2007-02-01)
------------------------------------------------

 * Fixed a bug in the memory allocator which could have been the
   reason for some of non-duplicable bugs.

 * Other minor bug fixes.
2007-02-03 00:08:51 +00:00
wiz
bbb5b9ea17 Put macro argument in parentheses. From Naoto Morishima in PR 35519.
Bump PKGREVISION.
2007-01-30 06:53:32 +00:00
markd
9ce631bb90 libgcrypt 1.2.3 may have fixed the name of the random device on NetBSD but
it broke the name of the urandom device.  Bump PKGREVISION
2006-09-06 11:41:41 +00:00
wiz
bb91289e31 Update to 1.2.2:
Noteworthy changes in version 1.2.2 (2005-10-05}
------------------------------------------------

 * Made the RNG immune against fork without exec.

 * Minor changes to some function declarations.  Buffer arguments are
   now typed as void pointer.  This should not affect any compilation.

 * A bug in the definition of gcry_cipher_register has been fixed.

 * Interface changes relative to the 1.2.1 release:
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 gcry_cipher_encrypt    CHANGED: Arguments IN and OUT are now void*.
 gcry_cipher_decrypt    CHANGED: Arguments IN and OUT are now void*.
 gcry_create_nonce      CHANGED: Argument BUFFER is now void*.
 gcry_md_ctl            CHANGED: Argument BUFFER is now void*.
 gcry_sexp_sprint       CHANGED: Argument BUFFER is now void*.
 gcry_mpi_scan          CHANGED: Argument BUFFER is now void*.
 gcry_cipher_register   CHANGED: Argument ALGORITHM_ID is now int*.
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
2005-10-06 12:20:41 +00:00
tv
642acf8e6a Make build on Interix, sharing some of the OS-specific oddities with _WIN32. 2005-03-10 15:38:33 +00:00
tv
90181e27b6 It's not very useful to include <sys/select.h> in only one source file
when other source files depend on fd_set being defined in a local header.

(Required on Interix, which does not expose <sys/select.h>/<sys/time.h>
automagically via other system headers as some OS's do by default.)
2005-01-18 13:11:38 +00:00
adam
c44530b79a Changes 1.2.1:
* Portability fixes, memory allocation fixes and other minor things.
 * Support to build as a W32 static library.
 * Changed the way the RNG gets initialized. This allows to keep it
   uninitialized as long as no random numbers are used.  To override
   this, the new macro gcry_fast_random_poll may be used.  It is in
   general a good idea to spread this macro into the application code
   to make sure that these polls happen often enough.
2005-01-14 11:26:34 +00:00
grant
fa6a9ffd92 add hack for missing socklen_t typedef handling. fixes build on
Darwin.
2004-12-18 23:54:58 +00:00
gavan
3eabc09b66 Fix for compiling on Solaris SPARC with gcc.
If __sparcv8 is defined, use the SPARC v8 version of udiv_qrnnd.  Without
this change, udiv_qrnnd will not be defined using the SPARC v8 udiv
instruction, and the default SPARC v7 case of defining it to be the native
__gmpn_udiv_qrnnd will be used, but this does not exist on SPARC v8, so
at link time, the user will get an error about _gmpn_udiv_qrnnd being
undefined.  gcc defines __sparcv8.

From PR pkg/26815.
2004-10-25 13:03:53 +00:00
shannonjr
4015fdc44e Re: pkg/27317 The header gcrypt.h references struct timeval without
including sys/time.h. Added the patch summitted with PR that adds
an include for sys/time.h. Bumped PKGREVISION.
2004-10-23 08:57:33 +00:00
jmmv
fcc4f184f1 When exec'ing child processes (netstat and vmstat), make sure the standard
file descriptors (0, 1, 2) are open.  This avoids multiple warnings issued
under NetBSD about running set[ug]id programs with those descriptors closed.

Fixes PR pkg/26079; although it talks about gaim, the problem is here, in
libgcrypt.  Bump PKGREVISION to 1.
2004-07-02 13:14:27 +00:00