aboutsummaryrefslogtreecommitdiffstats
path: root/NEWS (unfollow)
Commit message (Collapse)AuthorFilesLines
34 hoursPost release updatesHEADmasterWerner Koch1-0/+7
--
34 hoursRelease 2.5.8gnupg-2.5.8Werner Koch1-1/+16
2025-06-02Post release updates.Werner Koch1-0/+7
-- Note that this also includes a minor fix in the wixlib description which is actually part of gnupg-w32-2.5.7_20250602.wixlib.
2025-06-02Release 2.5.7gnupg-2.5.7Werner Koch1-1/+31
2025-05-28gpg: Allow updating a SHA-1 key certification w/o --force-sign-key.Werner Koch1-0/+3
* g10/keyedit.c (sign_uids): Add a case for this. -- GnuPG-bug-id: 7663
2025-05-08Post release updatesWerner Koch1-0/+4
--
2025-05-08Release 2.5.6gnupg-2.5.6Werner Koch1-1/+6
2025-05-06Update NEWSWerner Koch1-2/+19
--
2025-04-29gpg: New command --quick-tsign-key.Werner Koch1-3/+5
* g10/gpg.c (aQuickTSignKey): New. (opts): Add new command. (main): Parse args for it. * g10/keyedit.c: Include mbox-util.h. (parse_trustsig_string): New. (sign_uids): Add arg trustsig for use in quick mode. (keyedit_quick_sign): Also add arg trustsig and print a diagnostic on error.
2025-04-29gpg: New list options "show-trustsig"Werner Koch1-0/+3
* g10/options.h (LIST_SHOW_TRUSTSIG): New. * g10/gpg.c (parse_list_options): Add "show-trustsig". * g10/keylist.c (parse_trust_name): New. (list_signature_print): Print trust signature info.
2025-03-25doc: Update NEWSWerner Koch1-0/+19
--
2025-03-07Post release updatesWerner Koch1-0/+4
--
2025-03-07Release 2.5.5gnupg-2.5.5Werner Koch1-2/+9
2025-02-21speedo: Do not build gpgme anymore.Werner Koch1-0/+3
* build-aux/speedo.mk: Remove support gpgme. * build-aux/speedo/w32/inst.nsi: Ditto. * build-aux/speedo/w32/wixlib.wxs: Remove the gpgme components. -- GPGME is either already availabale on Unix platforms or can be installed on Widnows with gpg4win. GnuPG itself does not require gpgme.
2025-02-21gpg: Fix a verification DoS due to a malicious subkey in the keyring.Werner Koch1-0/+2
* g10/getkey.c (get_pubkey): Factor code out to ... (get_pubkey_bykid): new. Add feature to return the keyblock. (get_pubkey_for_sig): Add arg r_keyblock to return the used keyblock. Request a signing usage. (get_pubkeyblock_for_sig): Remove. (finish_lookup): Improve debug output. * g10/sig-check.c (check_signature): Add arg r_keyblock and pass it down. * g10/mainproc.c (do_check_sig): Ditto. (check_sig_and_print): Use the keyblock returned by do_check_sig to show further information instead of looking it up again with get_pubkeyblock_for_sig. Also re-check the signature after the import of an included keyblock. -- The problem here is that it is possible to import a key from someone who added a signature subkey from another public key and thus inhibits that a good signature good be verified. Such a malicious key signature subkey must have been created w/o the mandatory backsig which bind a signature subkey to its primary key. For encryption subkeys this is not an issue because the existence of a decryption private key is all you need to decrypt something and then it does not matter if the public subkey or its binding signature has been put below another primary key; in fact we do the latter for ADSKs. GnuPG-bug-id: 7527
2025-02-12Post release updatesWerner Koch1-0/+8
--
2025-02-12Release 2.5.4gnupg-2.5.4Werner Koch1-2/+10
2025-02-07Update NEWSWerner Koch1-0/+18
--
2025-01-09Post release updatesWerner Koch1-0/+8
--
2025-01-09Release 2.5.3gnupg-2.5.3Werner Koch1-2/+2
2025-01-08Remove the default keyserver.Werner Koch1-0/+1
2025-01-08doc: One typo fix.Werner Koch1-0/+5
-- GnuPG-bug-id: 7479
2025-01-08Update README and copyright years.Werner Koch1-0/+13
--
2024-12-05gpg: Silence expired trusted-key diagnostics in quiet mode.Werner Koch1-0/+4
* g10/trustdb.c (validate_keys): Take care of --quiet. -- GnuPG-bug-id: 7351
2024-12-05Post release updatesWerner Koch1-0/+4
--
2024-12-05Release 2.5.2gnupg-2.5.2Werner Koch1-2/+70
2024-11-14gpg: For composite algos add the algo string to the colons listings.Werner Koch1-0/+3
* g10/keylist.c (list_keyblock_colon): Put the algo string into the curve field for Kyber. -- GnuPG-bug-id: 6638
2024-11-13gpg: Add option to create Kyber with --full-gen-key.Werner Koch1-0/+2
* g10/keygen.c (PQC_STD_KEY_PARAM_PRI, PQC_STD_KEY_PARAM_SUB): New. (PQC_STD_KEY_PARAM): Construct from above. (gen_kyber): Allow short curve names. (ask_algo): Add Entry for ecc+kyber. (ask_kyber_variant): New. (generate_keypair): Generate ECC primary and Kyber sub. -- GnuPG-bug-id: 6638
2024-10-14dirmngr: Print a brief list of URLs with LISTCRLS.Werner Koch1-0/+2
* dirmngr/crlcache.c (crl_cache_list): Print a summary of URLs. * sm/call-dirmngr.c (gpgsm_dirmngr_run_command): Print a notice to stdout if the dirmngr has been disabled. -- GnuPG-bug-id: 7337
2024-09-12Post release updatesWerner Koch1-0/+8
--
2024-09-12Release 2.5.1gnupg-2.5.1Werner Koch1-1/+31
2024-09-11gpgsm: New option --assert-signerWerner Koch1-1/+7
* sm/gpgsm.c (oAssertSigner, oNoop): New. (opts): Add option --assert-signer. (assert_signer_true): New var. (main): Set new option. (gpgsm_exit): Handle assert_signer_true. * sm/gpgsm.h (opt): Add field assert_signer_list. * sm/verify.c (is_x509_fingerprint): New. (check_assert_signer_list): New. (gpgsm_verify): Handle option. -- GnuPG-bug-id: 7286
2024-08-23gpg: New option --proc-all-sigsWerner Koch1-0/+2
* g10/options.h (flags): Add proc_all_sigs. * g10/mainproc.c (proc_tree): Do not stop signature checking if this new option is used. * g10/gpg.c (oProcAllSigs): New. (opts): Add "proc-all-sigs". (main): Set it. -- GnuPG-bug-id: 7261
2024-07-08speedo: Set PREFIX for bzip2 build also for Unix.Werner Koch1-0/+3
-- bzip2 is a make-only package and thus we can't set the prefix with configure. We need to set PREFIX here so that the install target: if ( test ! -d $(PREFIX)/lib ) ; then mkdir -p $(PREFIX)/lib;fi [...] does not try to install to the default PREFIX /usr/local/lib.
2024-07-05Post release updatesWerner Koch1-0/+4
--
2024-07-05Release 2.5.0gnupg-2.5.0Werner Koch1-1/+4
2024-07-05gpg: Print a warning if the (draft) Kyber algorithm is used.Werner Koch1-1/+52
* g10/keygen.c (do_generate_keypair): Check for draf Kyber stuff.
2024-05-15Update NEWSWerner Koch1-0/+16
--
2024-03-07Post release updatesWerner Koch1-0/+7
--
2024-03-07Release 2.4.5gnupg-2.4.5Werner Koch1-1/+39
2024-01-29doc: Fix spelling errors found by lintian.Werner Koch1-7/+7
-- Reported-by: Andreas Metzler <[email protected]>
2024-01-25Post release updatesWerner Koch1-0/+7
--
2024-01-25Release 2.4.4gnupg-2.4.4Werner Koch1-2/+9
2024-01-12Prepare the NEWSWerner Koch1-2/+93
--
2024-01-09common,w32: Remove duplicated backslashes when setting the homedir.Werner Koch1-0/+3
* common/homedir.c (copy_dir_with_fixup) [W32]: Fold double backslashes. -- This is in general no problem but when we hash or compare the directory to test whether tit is the standard home directory, we may use a different socket file and thus a second instance of a daemon. GnuPG-bug-id: 6833
2023-11-08gpgsm: Support ECDSA in de-vs mode.Werner Koch1-0/+2
* common/compliance.h (PK_ALGO_FLAG_ECC18): New. * common/compliance.c (gnupg_pk_is_allowed): Implement. * sm/decrypt.c (gpgsm_decrypt): Pass new flag. * sm/sign.c (gpgsm_sign): Ditto. * sm/verify.c (gpgsm_verify): Ditto. -- GnuPG-bug-id: 6802
2023-10-27w32: Use utf8 for the asctimestamp function.Werner Koch1-0/+2
* common/gettime.c (asctimestamp) [W32]: Use ".UTF8" for the locale. -- This has been suggested by the reporter of GnuPG-bug-id: 6741
2023-09-06dirmngr: Allow conf files to disable default keyservers.Werner Koch1-0/+3
* dirmngr/server.c (ensure_keyserver): Detect special value "none" (cmd_keyserver): Ignore "none" and "hkp://none". -- GnuPG-bug-id: 6708
2023-07-04Post release updatesWerner Koch1-0/+6
--
2023-07-04Release 2.4.3gnupg-2.4.3Werner Koch1-2/+5