mirror of
git://git.gnupg.org/gnupg.git
synced 2024-12-22 10:19:57 +01:00
doc: Typo fixes.
--
This commit is contained in:
parent
68b4e7c9e4
commit
38b583ab3c
@ -26,17 +26,17 @@ history: To help political activists Phil Zimmermann published a
|
|||||||
software called Pretty Good Privacy (PGP) in 1991. PGP was designed
|
software called Pretty Good Privacy (PGP) in 1991. PGP was designed
|
||||||
as an easy to use encryption tool with no backdoors and disclosed
|
as an easy to use encryption tool with no backdoors and disclosed
|
||||||
source code. PGP was indeed intended to be cryptographically strong
|
source code. PGP was indeed intended to be cryptographically strong
|
||||||
and not just pretty good; however it had a couple of inital bugs, most
|
and not just pretty good; however it had a couple of initial bugs, most
|
||||||
of all a home designed cipher algorithm. With the availability of the
|
of all a home designed cipher algorithm. With the availability of the
|
||||||
source code a community of hackers (Branko Lankester, Colin Plumb,
|
source code a community of hackers (Branko Lankester, Colin Plumb,
|
||||||
Derek Atkins, Hal Finney, Peter Gutmann and others) helped him to fix
|
Derek Atkins, Hal Finney, Peter Gutmann and others) helped him to fix
|
||||||
these flaws and a get a solid version 2 out.
|
these flaws and a get a solid version 2 out.
|
||||||
|
|
||||||
Soon after that the trouble started. As in many counties the use or
|
Soon after that the trouble started. As in many countries the use or
|
||||||
export of cryptographic devices and software was also strongly
|
export of cryptographic devices and software was also strongly
|
||||||
restricted in the USA. Only weak cryptography was generally allowed.
|
restricted in the USA. Only weak cryptography was generally allowed.
|
||||||
PGP was much stronger and due to the Usenet and the availability of
|
PGP was much stronger and due to the Usenet and the availability of
|
||||||
FTP servers and BBSs, PGP accidently leaked out of the country and
|
FTP servers and BBSs, PGP accidentally leaked out of the country and
|
||||||
soon Phil was sued for unlicensed munitions export. Those export
|
soon Phil was sued for unlicensed munitions export. Those export
|
||||||
control laws were not quite up to the age of software with the funny
|
control laws were not quite up to the age of software with the funny
|
||||||
effect that exporting the software in printed form seemed not to be
|
effect that exporting the software in printed form seemed not to be
|
||||||
@ -58,7 +58,7 @@ the PGP product was later continued by the new PGP Corporation).
|
|||||||
|
|
||||||
Also often claimed to be Free Software, PGP has never fulfilled the
|
Also often claimed to be Free Software, PGP has never fulfilled the
|
||||||
requirements for it: PGP-5 is straight proprietary software; the
|
requirements for it: PGP-5 is straight proprietary software; the
|
||||||
availability of the source code alonedoes not make it free. PGP-2 has
|
availability of the source code alone does not make it free. PGP-2 has
|
||||||
certain restrictions on commercial use [2] and thus puts restrictions
|
certain restrictions on commercial use [2] and thus puts restrictions
|
||||||
on the software which makes it also non-free. Another problem with
|
on the software which makes it also non-free. Another problem with
|
||||||
PGP-2 is that it requires the use of the patented RSA and IDEA
|
PGP-2 is that it requires the use of the patented RSA and IDEA
|
||||||
@ -80,8 +80,8 @@ such software in their country or even by US citizens working abroad.
|
|||||||
Thus he told the European hackers that they are in the unique position
|
Thus he told the European hackers that they are in the unique position
|
||||||
to help the GNU with crypto software.
|
to help the GNU with crypto software.
|
||||||
|
|
||||||
Being tired of writing SMGL conversion software and without a current
|
Being tired of writing SGML conversion software and without a current
|
||||||
fun project, I soon found my self hacking on PGP-2 parsing code based
|
fun project, I soon found myself hacking on PGP-2 parsing code based
|
||||||
on the description in RFC-1991 and the pgformat.txt file. As this
|
on the description in RFC-1991 and the pgformat.txt file. As this
|
||||||
turned out to be easy I continued and finally came up with code to
|
turned out to be easy I continued and finally came up with code to
|
||||||
decrypt and create PGP-2 data. After I told the GNU towers that I
|
decrypt and create PGP-2 data. After I told the GNU towers that I
|
||||||
@ -101,7 +101,7 @@ and wrote an announcement [5].
|
|||||||
Right the next day Peter Gutmann offered to allow the use of his
|
Right the next day Peter Gutmann offered to allow the use of his
|
||||||
random number code for systems without a /dev/random. This eventually
|
random number code for systems without a /dev/random. This eventually
|
||||||
helped a lot to make GnuPG portable to many platforms. The next two
|
helped a lot to make GnuPG portable to many platforms. The next two
|
||||||
months were filled with code updates and a lengthly discussion on the
|
months were filled with code updates and a lengthily discussion on the
|
||||||
name; we finally settled for Anand Kumria's suggestion of GnuPG and
|
name; we finally settled for Anand Kumria's suggestion of GnuPG and
|
||||||
made the first release under this name (gnupg-0.2.8) on Feb 24 [6].
|
made the first release under this name (gnupg-0.2.8) on Feb 24 [6].
|
||||||
Just a few days later an experimental version with support for Windows
|
Just a few days later an experimental version with support for Windows
|
||||||
@ -117,7 +117,7 @@ copyright concerns with the reference code). Michael Roth contributed
|
|||||||
a Triple-DES implementation later the year and thus completed the
|
a Triple-DES implementation later the year and thus completed the
|
||||||
required set of OpenPGP algorithms. Over the next year the usual
|
required set of OpenPGP algorithms. Over the next year the usual
|
||||||
problems were solved, features discussed, complaints noticed and
|
problems were solved, features discussed, complaints noticed and
|
||||||
support for gpg in various other software was introduced by their
|
support for GPG in various other software was introduced by their
|
||||||
respective authors.
|
respective authors.
|
||||||
|
|
||||||
Finally, on September 7, 1999 the current code was released as version
|
Finally, on September 7, 1999 the current code was released as version
|
||||||
@ -206,7 +206,7 @@ In a reply to this mail Alan Olsen remarked on the ML:
|
|||||||
determined that the only difference was that RSAREF2 had fixed a
|
determined that the only difference was that RSAREF2 had fixed a
|
||||||
number of buffer overflows and other security flaws. There were no
|
number of buffer overflows and other security flaws. There were no
|
||||||
added features.)
|
added features.)
|
||||||
|
|
||||||
If I remember correctly, 2.5 had RSAREF2 and 2.6 had RSAREF1. One
|
If I remember correctly, 2.5 had RSAREF2 and 2.6 had RSAREF1. One
|
||||||
of the main reasons for the creation of the "International version"
|
of the main reasons for the creation of the "International version"
|
||||||
was the use of RSAREF. (Besides the security issues, it was pretty
|
was the use of RSAREF. (Besides the security issues, it was pretty
|
||||||
|
Loading…
x
Reference in New Issue
Block a user