diff options
-rw-r--r-- | AUTHORS | 5 | ||||
-rw-r--r-- | ChangeLog | 10 | ||||
-rw-r--r-- | NEWS | 2 | ||||
-rw-r--r-- | THANKS | 1 | ||||
-rw-r--r-- | configure.ac | 6 | ||||
-rw-r--r-- | doc/gpg.texi | 36 | ||||
-rw-r--r-- | g10/ChangeLog | 5 | ||||
-rw-r--r-- | g10/mainproc.c | 2 |
8 files changed, 50 insertions, 17 deletions
@@ -7,8 +7,12 @@ Security related bug reports: <[email protected]> Authors ======= +Ales Nyakhaychyk <[email protected]> Translations [be] + Birger Langkjer <[email protected]> Translations [da] +Britov Ivanovich <[email protected]> Translations [ru] + Daniel Resare <[email protected]> Translations [sv] David Shaw <[email protected]> Assignment @@ -36,6 +40,7 @@ Janusz Aleksander Urbanowicz <[email protected]> Translations [po] Jedi Lin <[email protected]> Translations [zh-tw] Jouni Hiltunen <[email protected]> Translations [fi] +Tommi Vainikainen <[email protected]> Translations [fi] Laurentiu Buzdugan <[email protected]> Translations [ro] @@ -1,3 +1,13 @@ +2003-12-03 Werner Koch <[email protected]> + + Released 1.2.4rc1. + + * THANKS: Added Phong Nguyen, who found the Elgamal signing key + problem. + + * configure.ac (ALL_LINGUAS): Added a Russian translation; thanks + to Maxim Britov. Added Belarusion; thanks to Ales Nyakhaychyk. + 2003-12-02 David Shaw <[email protected]> * NEWS: Note that Elgamal sign+encrypt keys are not part of the @@ -16,6 +16,8 @@ Noteworthy changes in version 1.2.4 (unreleased) only new message that can be generated by an Elgamal sign+encrypt key is a key revocation. + * A Russian translation is included again as well as a new + Belarusian translation. Noteworthy changes in version 1.2.3 (2003-08-21) ------------------------------------------------ @@ -158,6 +158,7 @@ Peter Fales [email protected] Peter Gutmann [email protected] Peter Marschall [email protected] Peter Valchev [email protected] +Phong Nguyen [email protected] Piotr Krukowiecki [email protected] QingLong [email protected] Ralph Gillen [email protected] diff --git a/configure.ac b/configure.ac index 1a0aad55c..fc3760954 100644 --- a/configure.ac +++ b/configure.ac @@ -25,13 +25,13 @@ AC_PREREQ(2.52) # Remember to change the version number immediately *after* a release # and remove the "-cvs" or "rc" suffix immediately *before* a release. -AC_INIT(gnupg, 1.2.4-cvs, [email protected]) +AC_INIT(gnupg, 1.2.4rc1, [email protected]) # Set development_version to yes if the minor number is odd or you # feel that the default check for a development version is not # sufficient. -development_version=no +development_version=yes -ALL_LINGUAS="ca cs da de eo el es et fi fr gl hu id it ja nl pl pt_BR pt ro sk sv tr zh_TW" +ALL_LINGUAS="be ca cs da de eo el es et fi fr gl hu id it ja nl pl pt_BR pt ro ru sk sv tr zh_TW" AC_CONFIG_AUX_DIR(scripts) AC_CONFIG_SRCDIR(g10/g10.c) diff --git a/doc/gpg.texi b/doc/gpg.texi index 6184dea7c..25460c412 100644 --- a/doc/gpg.texi +++ b/doc/gpg.texi @@ -200,7 +200,8 @@ Create an alternate user id. @item addphoto Create a photographic user id. This will prompt for a JPEG file that -will be embedded into the user ID. +will be embedded into the user ID. A very large JPEG will make for a +very large key. @item deluid Delete a user id. @@ -375,10 +376,6 @@ of this keyserver. Don't send your complete keyring to a keyserver - select only those keys which are new or changed by you. -@item ---export-all @code{names} -Same as ---export, but also exports keys which -are not compatible with OpenPGP. - @item ---export-secret-keys @code{names} @itemx ---export-secret-subkeys @code{names} Same as ---export, but exports the secret keys instead. @@ -554,7 +551,7 @@ twice, the input data is listed in detail. @item -q, ---quiet Try to be as quiet as possible. -@item -z @code{n}, ---compress @code{n} +@item -z @code{n}, ---compress-level @code{n} Set compression level to @code{n}. A value of 0 for @code{n} disables compression. Default is to use the default compression level of zlib (normally 6). @@ -643,18 +640,18 @@ ID is bound to the key. @end table @item ---always-trust -Identical to `---trust-model always' +Identical to `---trust-model always'. This option is deprecated. @item ---keyserver @code{name} Use @code{name} as your keyserver. This is the server that ---recv-keys, ---send-keys, and --search-keys will communicate with to receive keys from, send keys to, and search for keys on. The format of the @code{name} is a URI: `scheme:[//]keyservername[:port]' The scheme is -the type of keyserver: "hkp" for the Horowitz (or compatible) -keyservers, "ldap" for the NAI LDAP keyserver, or "mailto" for the -Horowitz email keyserver. Note that your particular installation of -GnuPG may have other keyserver types available as well. Keyserver -schemes are case-insensitive. +the type of keyserver: "hkp" for the HTTP (or compatible) keyservers, +"ldap" for the NAI LDAP keyserver, or "mailto" for the Graff email +keyserver. Note that your particular installation of GnuPG may have +other keyserver types available as well. Keyserver schemes are +case-insensitive. Most keyservers synchronize with each other, so there is generally no need to send keys to more than one server. Using the command "host -l @@ -713,6 +710,12 @@ This option enables the automatic retrieving of keys from a keyserver when verifying signatures made by keys that are not on the local keyring. +Note that this option makes a "web bug" like behavior possible. +Keyserver operators can see which keys you request, so by sending you +a message signed by a brand new key (which you naturally will not have +on your local keyring), the operator can tell both your IP address and +the time when you verified the signature. + @end table @item ---import-options @code{parameters} @@ -1158,6 +1161,10 @@ behavior. Use this option to reset all previous options like ---compress-algo to OpenPGP compliant values. All PGP workarounds are disabled. +@item ---rfc2440 +Reset all packet, cipher and digest options to strict RFC-2440 +behavior. Note that this is currently the same thing as ---openpgp. + @item ---rfc1991 Try to be more RFC-1991 (PGP 2.x) compliant. @@ -1203,7 +1210,7 @@ the SHA-256 digest algorithm. @item ---force-v3-sigs @itemx ---no-force-v3-sigs OpenPGP states that an implementation should generate v4 signatures -but PGP versions 5 and higher only recognize v4 signatures on key +but PGP versions 5 through 7 only recognize v4 signatures on key material. This option forces v3 signatures for signatures on data. Note that this option overrides ---ask-sig-expire, as v3 signatures cannot have expiration dates. ---no-force-v3-sigs disables this @@ -1440,6 +1447,9 @@ from the command line, it may be necessary to quote the argument to this option to prevent the shell from treating it as multiple arguments. +@item ---no-groups +Clear the ---group list. + @item ---preserve-permissions Don't change the permissions of a secret keyring back to user read/write only. Use this option only if you really know what you are doing. diff --git a/g10/ChangeLog b/g10/ChangeLog index 7350871c4..5d4246e13 100644 --- a/g10/ChangeLog +++ b/g10/ChangeLog @@ -1,3 +1,8 @@ +2003-12-03 Werner Koch <[email protected]> + + * mainproc.c (check_sig_and_print): Removed the "0x" again. + Reverts change from 2003-10-03. + 2003-12-02 David Shaw <[email protected]> * g10.c (strusage, main): Show development version warning in diff --git a/g10/mainproc.c b/g10/mainproc.c index 1c70c2939..12561d966 100644 --- a/g10/mainproc.c +++ b/g10/mainproc.c @@ -1342,7 +1342,7 @@ check_sig_and_print( CTX c, KBNODE node ) tstr = asctimestamp(sig->timestamp); astr = pubkey_algo_to_string( sig->pubkey_algo ); - log_info(_("Signature made %.*s using %s key ID 0x%08lX\n"), + log_info(_("Signature made %.*s using %s key ID %08lX\n"), (int)strlen(tstr), tstr, astr? astr: "?", (ulong)sig->keyid[1] ); rc = do_check_sig(c, node, NULL, &is_expkey, &is_revkey ); |