[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted xml-security-c 1.4.0-3~bpo40+1 (source i386)

Hash: SHA1

Format: 1.7
Date: Wed, 05 Nov 2008 18:19:34 -0800
Source: xml-security-c
Binary: libxml-security-c-dev libxml-security-c14
Architecture: source i386
Version: 1.4.0-3~bpo40+1
Distribution: etch-backports
Urgency: low
Maintainer: Debian Shib Team <pkg-shibboleth-devel@lists.alioth.debian.org>
Changed-By: Russ Allbery <rra@debian.org>
 libxml-security-c-dev - C++ library for XML Digital Signatures (development)
 libxml-security-c14 - C++ library for XML Digital Signatures (runtime)
Closes: 414210 479195
 xml-security-c (1.4.0-3~bpo40+1) etch-backports; urgency=low
   * Backport to stable.
 xml-security-c (1.4.0-3) unstable; urgency=low
   * Drop the suggests of libxml-security-c-doc since upstream no longer
     includes the documentation.
 xml-security-c (1.4.0-2) unstable; urgency=low
   [ Ferenc Wagner ]
   * Add dependencies to libxml-security-c-dev for the packages whose
     header files are included by XML-Security-C headers.
   [ Russ Allbery ]
   * Include the SONAME portion of the library filename in the *.install
     file for libxml-security-c14 so that the build will fail if the
     library name unexpectedly changes.
   * Rewrite debian/copyright in the new proposed format.
   * Reference the Apache 2.0 license in common-licenses instead of
     including a copy.
   * Update standards version to 3.8.0.
   * Update watch format to 3 (no changes required).
 xml-security-c (1.4.0-1) unstable; urgency=low
   * New upstream release.
     - Drop the libxml-security-c-doc package.  Upstream no longer includes
       the API documentation in their source package and it's not useful
       enough to generate ourselves at build time.
     - Bump library SONAME.
   * Maintainer is now the Debian Shib Team.  Move myself to Uploaders.
   * Build against libxerces-c2-dev.  (Closes: #479195)
   * Remove all modified files on debian/rules clean.
   * Stop using quilt and instead apply the patches directly.
   * Move Homepage to a regular control field.
   * Add Vcs-Git and Vcs-Browser control fields.
   * Update standards version to 3.7.3 (no changes required).
 xml-security-c (1.3.1-1) unstable; urgency=low
   * New upstream release.
     - Performance improvements in canonicalisation.
     - Update signature classes to pass in requested algorithms as URIs
       rather than enums.  Enum based methods are now deprecated.
     - Fix memory leaks in OpenSSL wrapping code.
     - Provide ability for calling application to define whether references
       are interlocking.
     - Complete implementation of XKMS message set
     - Methods to allow loading of encrypted data without doing decrypt
       and to process a decrypt/encrypt operation without replacing the
       original nodes.
     - Various bug fixes.
   * Add patch from Cyril Brulebois to recognize kFreeBSD and GNU Hurd
     systems.  (Closes: #414210)
   * Remove Quanah from maintainers at his request.
   * Update debhelper compatibility level to V5.
 fd0410004d5fd0bd042a61062bf6ce6f 779 libs extra xml-security-c_1.4.0-3~bpo40+1.dsc
 dd9accf6727eb008dbf1dd674d5d4dcc 934876 libs extra xml-security-c_1.4.0.orig.tar.gz
 ecdf09cbc33e3704ce68f94f70cdb314 5615 libs extra xml-security-c_1.4.0-3~bpo40+1.diff.gz
 dcaf1aa880a9efdc351e75f8cac34acd 357118 libs extra libxml-security-c14_1.4.0-3~bpo40+1_i386.deb
 69913b4babe3d039cde5dd924b2f0800 136964 libdevel extra libxml-security-c-dev_1.4.0-3~bpo40+1_i386.deb

Version: GnuPG v1.4.9 (GNU/Linux)


  to pool/main/x/xml-security-c/libxml-security-c-dev_1.4.0-3~bpo40+1_i386.deb
  to pool/main/x/xml-security-c/libxml-security-c14_1.4.0-3~bpo40+1_i386.deb
  to pool/main/x/xml-security-c/xml-security-c_1.4.0-3~bpo40+1.diff.gz
  to pool/main/x/xml-security-c/xml-security-c_1.4.0-3~bpo40+1.dsc
  to pool/main/x/xml-security-c/xml-security-c_1.4.0.orig.tar.gz

Reply to: