aboutsummaryrefslogtreecommitdiffstats
path: root/NEWS (unfollow)
Commit message (Collapse)AuthorFilesLines
2014-06-30Release 1.4.18gnupg-1.4.18Werner Koch1-1/+7
2014-06-30Add CVE numberWerner Koch1-1/+1
--
2014-06-23Post release changes.Werner Koch1-0/+4
--
2014-06-23Release 1.4.17gnupg-1.4.17Werner Koch1-1/+15
2013-12-13Post release version number bump.Werner Koch1-0/+3
--
2013-12-13Release 1.4.16gnupg-1.4.16Werner Koch1-1/+1
2013-12-10Update config.{guess,sub} and some copyright notices.Werner Koch1-2/+11
* scripts/config.guess, scripts/config.sub: Update to version 2013-11-29. Signed-off-by: Werner Koch <[email protected]>
2013-11-27gpg: Change armor Version header to emit only the major version.Werner Koch1-0/+3
* g10/options.h (opt): Rename field no_version to emit_version. * g10/gpg.c (main): Init opt.emit_vesion to 1. Change --emit-version to bump up opt.emit_version. * g10/armor.c (armor_filter): Implement different --emit-version values. -- GnuPG-bug-id: 1572 Signed-off-by: Werner Koch <[email protected]> (cherry picked from commit e951782e937ce290be0d89d83e84b3daea997587) Resolved conflicts: NEWS g10/armor.c g10/gpg.c
2013-10-11gpg: Do not require a trustdb with --always-trust.Werner Koch1-0/+2
* g10/tdbio.c (tdbio_set_dbname): Add arg R_NOFILE. * g10/trustdb.c (trustdb_args): Add field no_trustdb. (init_trustdb): Set that field. (revalidation_mark): Take care of a nonexistent trustdb file. (read_trust_options): Ditto. (get_ownertrust): Ditto. (get_min_ownertrust): Ditto. (update_ownertrust): Ditto. (update_min_ownertrust): Ditto. (clear_ownertrusts): Ditto. (cache_disabled_value): Ditto. (check_trustdb_stale): Ditto. (get_validity): Ditto. * g10/gpg.c (main): Do not create a trustdb with most commands for trust-model always. -- This slightly changes the semantics of most commands in that they won't create a trustdb if --trust-model=always is used. It just does not make sense to create a trustdb if there is no need for it. Signed-off-by: Werner Koch <[email protected]> (cherry picked from commit 1a0eeaacd1bf09fe5125dbc3f56016bc20f3512e) Resolved conflicts: g10/gpg.c g10/tdbio.h g10/trustdb.c (indentation fixes)
2013-10-04Post release updates.Werner Koch1-0/+4
--
2013-10-04Release 1.4.15gnupg-1.4.15Werner Koch1-2/+10
2013-10-02gpg: Fix bug with deeply nested compressed packets.Werner Koch1-0/+3
* g10/mainproc.c (MAX_NESTING_DEPTH): New. (proc_compressed): Return an error code. (check_nesting): New. (do_proc_packets): Check packet nesting depth. Handle errors from check_compressed. Signed-off-by: Werner Koch <[email protected]>
2013-07-25Post release updates.Werner Koch1-0/+3
--
2013-07-25Release 1.4.14.gnupg-1.4.14Werner Koch1-2/+2
2013-07-25Mitigate a flush+reload cache attack on RSA secret exponents.Werner Koch1-0/+9
* mpi/mpi-pow.c (mpi_powm): Always perform the mpi_mul for exponents hold in secure memory. -- The attack is described in a paper to be pusblished at eprint.iacr.org: Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack by Yuval Yarom and Katrina Falkner. 18 July 2013. Flush+Reload is a cache side-channel attack that monitors access to data in shared pages. In this paper we demonstrate how to use the attack to extract private encryption keys from GnuPG. The high resolution and low noise of the Flush+Reload attack enables a spy program to recover over 98% of the bits of the private key in a single decryption or signing round. Unlike previous attacks, the attack targets the last level L3 cache. Consequently, the spy program and the victim do not need to share the execution core of the CPU. The attack is not limited to a traditional OS and can be used in a virtualised environment, where it can attack programs executing in a different VM. Signed-off-by: Werner Koch <[email protected]>
2012-12-20Post release updatesWerner Koch1-0/+4
--
2012-12-20Release 1.4.13.gnupg-1.4.13Werner Koch1-3/+4
2012-11-08Support the not anymore patented IDEA cipher algorithm.Werner Koch1-0/+8
* cipher/idea.c: New. Take from Libgcrypt master and adjust for direct use in GnuPG. * cipher/idea-stub.c: Remove. * cipher/Makefile.am: Add idea.c and remove idea-stub.c rules. * configure.ac: Remove idea-stub code. * g10/gpg.c (check_permissions): Remove code path for ITEM==2. (main): Make --load-extension a dummy option. * g10/keygen.c (keygen_set_std_prefs): Include IDEA only in PGP2 compatibility mode. * g10/misc.c (idea_cipher_warn): Remove. Also remove all callers. * g10/seckey-cert.c (do_check): Remove emitting of STATUS_RSA_OR_IDEA. * g10/status.c (get_status_string): Remove STATUS_RSA_OR_IDEA. * g10/status.h (STATUS_RSA_OR_IDEA): Remove. -- To keep the number of actually used algorithms low, we support IDEA only in a basically read-only way (unless --pgp2 is used during key generation). It does not make sense to suggest the use of this old 64 bit blocksize algorithm. However, there is old data available where it might be helpful to have IDEA available.
2012-01-30Release 1.4.12gnupg-1.4.12Werner Koch1-1/+18
2012-01-10Allow use of a standard space separated fingerprint.Werner Koch1-21/+24
We allow a single or a double space in the middle of the fingerprint to help with c+p fingerprints from an HTML pages which are not being enclosed in a "pre" tag. * g10/getkey.c (classify_user_id): Check for space separated GPG fingerprint. -- This is a backport of commit 957fe72 and 372fb4f.
2010-10-18Post release updatesWerner Koch1-0/+5
2010-10-18Prepare for 1.4.11Werner Koch1-3/+3
2010-09-23Preparing a release candidateWerner Koch1-1/+1
2010-08-31Minor fixesWerner Koch1-0/+2
2010-06-01Ignore some GnuPG-2 only options.Werner Koch1-0/+1
2010-05-12Fix bug 1179Werner Koch1-0/+1
2009-09-02Post release version number bumpWerner Koch1-0/+4
2009-09-02Preparing 1.4.10.Werner Koch1-1/+1
2009-08-13* NEWS: Note Camellia and hkps.David Shaw1-0/+4
2009-08-03(no commit message)Werner Koch1-3/+8
2009-07-21First set of changes to backport the new card code from 2.0.Werner Koch1-0/+4
For compatibility reasons a few new files had to be added. Also added estream-printf as this is now used in app-openpgp.c and provides a better and generic asprintf implementation than the hack we used for the W32 code in ttyio.c. Card code is not yet finished.
2009-05-06Fix for bug#1034.Werner Koch1-0/+2
2009-05-05Improve dotlocking.Werner Koch1-0/+2
Implement locking for W32.
2008-12-11Change the SIG_ID computation to match 2.0.10.Werner Koch1-0/+2
2008-04-30Ignore gpg2 introduced keywords for --auto-key-locate.Werner Koch1-1/+1
Minor W32 installer fix.
2008-03-26Post release version number bump.Werner Koch1-0/+5
2008-03-26prepare a release.gnupg-1.4.9Werner Koch1-2/+3
2008-03-25Change default keyserver.Werner Koch1-0/+1
2008-03-22Improved AES performance.Werner Koch1-0/+8
2007-12-20Preparing a releaseWerner Koch1-1/+1
2007-12-17Fixd a W32 problems with ldaps.Werner Koch1-1/+6
2007-12-13* NEWS: Note SHA-224 typo.David Shaw1-1/+4
2007-12-12Updated ZH po file.Werner Koch1-1/+8
Allow de/encryption using legacy type 20 keys. Updated config.{sub,guess}
2007-11-18* NEWS: Say a bit more about RFC-4880. Note some defaults changing.David Shaw1-2/+11
2007-11-16Preparing a release candidategnupg-1.4.8rc1Werner Koch1-0/+4
2007-10-23Switched to GPLv3.Werner Koch1-0/+1
Updated gettext.
2007-08-24Improved detection of ketrings specified several times.Werner Koch1-1/+2
2007-07-09Add an extra warning for Camellia.Werner Koch1-0/+4
Minor W32 fix Address change.
2007-04-16util/Werner Koch1-1/+1
* secmem.c (init_pool): Avoid assigning a negative value to a size_t. ./ * acinclude.m4: Fix last change. Make test self-conatined by checking for sysconf and getpagesize. Remove indentation for the sake of broken C-89 cpps.
2007-03-05Post release updateWerner Koch1-0/+4