Update Package: libgcrypt11
Bug #364535 reported by
DigitalOktay
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
libgcrypt11 (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
HI,
please update package to 1.4.4
see http://
Noteworthy changes in version 1.4.4:
* Publish GCRY_MODULE_ID_USER and GCRY_MODULE_
This functionality has been in Libgcrypt since 1.3.0.
* MD5 may now be used in non-enforced fips mode.
* Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes.
* In fips mode, RSA keys are now generated using the X9.31 algorithm
and DSA keys using the FIPS 186-2 algorithm.
* The transient-key flag is now also supported for DSA key
generation. DSA domain parameters may be given as well.
Related branches
Changed in libgcrypt11 (Ubuntu): | |
status: | New → Confirmed |
To post a comment you must log in.
version in debian unstable : 1.4.4-2