mirror of
git://git.gnupg.org/gnupg.git
synced 2024-12-31 11:41:32 +01:00
* Makefile.am (EXTRA_DIST): Add autogen.sh wrapper which is
useful for some cross-compiling targets.
This commit is contained in:
parent
17e12f2ec1
commit
3330c63a05
@ -1,3 +1,8 @@
|
||||
2003-04-08 Werner Koch <wk@gnupg.org>
|
||||
|
||||
* Makefile.am (EXTRA_DIST): Add autogen.sh wrapper which is
|
||||
useful for some cross-compiling targets.
|
||||
|
||||
2003-04-07 David Shaw <dshaw@jabberwocky.com>
|
||||
|
||||
* acinclude.m4: Fix URL to faqprog.pl.
|
||||
|
@ -1,4 +1,5 @@
|
||||
# Copyright (C) 1998, 1999, 2000, 2001 Free Software Foundation, Inc.
|
||||
# Top Makefile for GnuPG
|
||||
# Copyright (C) 1998,1999,2000,2001,2003 Free Software Foundation, Inc.
|
||||
#
|
||||
# This file is part of GnuPG.
|
||||
#
|
||||
@ -25,7 +26,7 @@ checks = checks
|
||||
endif
|
||||
|
||||
SUBDIRS = intl zlib util mpi cipher tools g10 keyserver po doc ${checks}
|
||||
EXTRA_DIST = PROJECTS BUGS config.h.in
|
||||
EXTRA_DIST = PROJECTS BUGS config.h.in autogen.sh
|
||||
DISTCLEANFILES = g10defs.h
|
||||
|
||||
# Add all the files listed in "distfiles" files to the distribution,
|
||||
|
2
NEWS
2
NEWS
@ -36,6 +36,8 @@ Noteworthy changes in version 1.2.2 (unreleased)
|
||||
* Fixed a compatibility problem with CryptoEx by increasing the
|
||||
window size of the uncompressor.
|
||||
|
||||
* Status VALIDSIG does now also print the primary key's fingerprint.
|
||||
|
||||
* Add read-only support for the SHA-256 hash, and optional
|
||||
read-only support for the SHA-384 and SHA-512 hashes.
|
||||
|
||||
|
2
TODO
2
TODO
@ -1,3 +1,5 @@
|
||||
* Reword the message after create-revocation.
|
||||
|
||||
* Reword the "Not enough entropy" messages.
|
||||
|
||||
* Do we need a configure test for putenv?
|
||||
|
@ -6,6 +6,20 @@
|
||||
SGML tags are closed, clarify --pgp8 allows SHA-256, and document
|
||||
--no-emit-version.
|
||||
|
||||
2003-04-01 Werner Koch <wk@gnupg.org>
|
||||
|
||||
* DETAILS (VALIDSIG): Add primary keys fingerprint.
|
||||
|
||||
2003-04-01 David D. Scribner <dscribner@bigfoot.com>
|
||||
|
||||
* faq.raw (Question 4.15): Fixed URL
|
||||
<http://http://gpgrelay.sourceforge.net>, corrected to be
|
||||
<http://gpgrelay.sourceforge.net> (had two "httpd://")
|
||||
(Question 5.9): Appended <br> tag to end of first line in command
|
||||
example for proper cr/lf treatment within a <samp> tag.
|
||||
(Footer): Extended copyright to 2003.
|
||||
Applied by Werner Koch.
|
||||
|
||||
2003-02-24 David Shaw <dshaw@jabberwocky.com>
|
||||
|
||||
* gpg.sgml: Document "revuid". Clarify that --openpgp resets
|
||||
|
@ -157,7 +157,7 @@ more arguments in future versions.
|
||||
this signature. sig_class is a 2 byte hex-value.
|
||||
|
||||
VALIDSIG <fingerprint in hex> <sig_creation_date> <sig-timestamp>
|
||||
<expire-timestamp>
|
||||
<expire-timestamp> <primary-key-fpr>
|
||||
|
||||
The signature with the keyid is good. This is the same
|
||||
as GOODSIG but has the fingerprint as the argument. Both
|
||||
@ -165,6 +165,9 @@ more arguments in future versions.
|
||||
sig-timestamp is the signature creation time in seconds after
|
||||
the epoch. expire-timestamp is the signature expiration time
|
||||
in seconds after the epoch (zero means "does not expire").
|
||||
PRIMARY-KEY-FPR is the fingerprint of the primary key or
|
||||
identical to the first argument. This is useful to get back
|
||||
to the primary key without running gpg again for this purpose.
|
||||
|
||||
SIG_ID <radix64_string> <sig_creation_date> <sig-timestamp>
|
||||
This is emitted only for signatures of class 0 or 1 which
|
||||
|
10
doc/faq.raw
10
doc/faq.raw
@ -16,8 +16,8 @@ The most recent version of the FAQ is available from
|
||||
|
||||
|
||||
[H p]
|
||||
Version: 1.6.1[H br]
|
||||
Last-Modified: Dec 28, 2002[H br]
|
||||
Version: 1.6.2[H br]
|
||||
Last-Modified: Feb 25, 2003[H br]
|
||||
Maintained-by: [$maintainer]
|
||||
[H /p]
|
||||
|
||||
@ -545,7 +545,7 @@ you could search in the mailing list archive.
|
||||
[H a href=http://www.bretschneidernet.de/tips/secmua.html]<http://www.bretschneidernet.de/tips/secmua.html>[H /a].
|
||||
|
||||
Users of Win32 MUAs that lack OpenPGP support may look into
|
||||
using GPGrelay [H a href=http://http://gpgrelay.sourceforge.net]<http://gpgrelay.sourceforge.net>[H /a], a small
|
||||
using GPGrelay [H a href=http://gpgrelay.sourceforge.net]<http://gpgrelay.sourceforge.net>[H /a], a small
|
||||
email-relaying server that uses GnuPG to enable many email clients
|
||||
to send and receive emails that conform to PGP-MIME (RFC 2015).
|
||||
|
||||
@ -853,7 +853,7 @@ you could search in the mailing list archive.
|
||||
Now we can do the usual export:
|
||||
|
||||
[H samp]
|
||||
$ gpg --export KeyID > mypublickey.pgp
|
||||
$ gpg --export KeyID > mypublickey.pgp[H br]
|
||||
$ gpg --export-secret-key KeyID > mysecretkey.pgp
|
||||
[H /samp]
|
||||
|
||||
@ -1295,7 +1295,7 @@ you could search in the mailing list archive.
|
||||
|
||||
[H hr]
|
||||
|
||||
Copyright (C) 2000-2002 Free Software Foundation, Inc.,
|
||||
Copyright (C) 2000-2003 Free Software Foundation, Inc.,
|
||||
59 Temple Place - Suite 330, Boston, MA 02111, USA
|
||||
|
||||
Verbatim copying and distribution of this entire article is permitted in
|
||||
|
@ -5,6 +5,11 @@
|
||||
* sign.c (sign_file, clearsign_file, sign_symencrypt_file): Remove
|
||||
unused code.
|
||||
|
||||
2003-04-01 Werner Koch <wk@gnupg.org>
|
||||
|
||||
* mainproc.c (check_sig_and_print): Add primary key fpr to VALIDSIG
|
||||
status.
|
||||
|
||||
2003-03-24 David Shaw <dshaw@jabberwocky.com>
|
||||
|
||||
* keydb.h: Err on the side of making an unknown signature a SIG
|
||||
|
@ -1,5 +1,5 @@
|
||||
/* mainproc.c - handle packets
|
||||
* Copyright (C) 1998, 1999, 2000, 2001, 2002 Free Software Foundation, Inc.
|
||||
* Copyright (C) 1998,1999,2000,2001,2002,2003 Free Software Foundation, Inc.
|
||||
*
|
||||
* This file is part of GnuPG.
|
||||
*
|
||||
@ -1442,17 +1442,37 @@ check_sig_and_print( CTX c, KBNODE node )
|
||||
|
||||
if( !get_pubkey( pk, sig->keyid ) ) {
|
||||
byte array[MAX_FINGERPRINT_LEN], *p;
|
||||
char buf[MAX_FINGERPRINT_LEN*2+72];
|
||||
char buf[MAX_FINGERPRINT_LEN*4+73], *bufp;
|
||||
size_t i, n;
|
||||
|
||||
bufp = buf;
|
||||
fingerprint_from_pk( pk, array, &n );
|
||||
p = array;
|
||||
for(i=0; i < n ; i++, p++ )
|
||||
sprintf(buf+2*i, "%02X", *p );
|
||||
sprintf(buf+strlen(buf), " %s %lu %lu",
|
||||
strtimestamp( sig->timestamp ),
|
||||
(ulong)sig->timestamp,
|
||||
(ulong)sig->expiredate );
|
||||
for(i=0; i < n ; i++, p++, bufp += 2)
|
||||
sprintf(bufp, "%02X", *p );
|
||||
sprintf(bufp, " %s %lu %lu ",
|
||||
strtimestamp( sig->timestamp ),
|
||||
(ulong)sig->timestamp,
|
||||
(ulong)sig->expiredate );
|
||||
bufp = bufp + strlen (bufp);
|
||||
if (!pk->is_primary) {
|
||||
u32 akid[2];
|
||||
|
||||
akid[0] = pk->main_keyid[0];
|
||||
akid[1] = pk->main_keyid[1];
|
||||
free_public_key (pk);
|
||||
pk = m_alloc_clear( sizeof *pk );
|
||||
if (get_pubkey (pk, akid)) {
|
||||
/* impossible error, we simply return a zeroed out fpr */
|
||||
n = MAX_FINGERPRINT_LEN < 20? MAX_FINGERPRINT_LEN : 20;
|
||||
memset (array, 0, n);
|
||||
}
|
||||
else
|
||||
fingerprint_from_pk( pk, array, &n );
|
||||
}
|
||||
p = array;
|
||||
for(i=0; i < n ; i++, p++, bufp += 2)
|
||||
sprintf(bufp, "%02X", *p );
|
||||
write_status_text( STATUS_VALIDSIG, buf );
|
||||
}
|
||||
free_public_key( pk );
|
||||
|
Loading…
x
Reference in New Issue
Block a user