mirror of
git://git.gnupg.org/gnupg.git
synced 2025-01-08 12:44:23 +01:00
last hour fixes.
This commit is contained in:
parent
94e6596bec
commit
7bf54c22e9
@ -1,3 +1,7 @@
|
||||
2001-04-27 Werner Koch <wk@gnupg.org>
|
||||
|
||||
* README: Removed a few outdated paragraphs.
|
||||
|
||||
2001-04-17 Werner Koch <wk@gnupg.org>
|
||||
|
||||
* acinclude.m4 (GNUPG_CHECK_DOCBOOK_TO_TEXI): New.
|
||||
|
36
README
36
README
@ -36,9 +36,7 @@
|
||||
is still available, but because of the larger size of such
|
||||
signatures it is deprecated (Please note that the GnuPG
|
||||
implementation of ElGamal signatures is *not* insecure). Symmetric
|
||||
algorithms are: 3DES, Blowfish, CAST5 and Twofish (GnuPG does not
|
||||
yet create Twofish encrypted messages because there is no agreement
|
||||
in the OpenPGP WG on how to use it together with a MDC algorithm)
|
||||
algorithms are: AES, 3DES, Blowfish, CAST5 and Twofish
|
||||
Digest algorithms available are MD5, RIPEMD160 and SHA1.
|
||||
|
||||
|
||||
@ -100,41 +98,19 @@
|
||||
|
||||
$ gpg --fingerprint 0x57548DCD
|
||||
|
||||
with the elsewhere published fingerprint, or - if you are able to
|
||||
_positively_ verify the signature of this README file - with
|
||||
this fingerprint: "6BD9 050F D8FC 941B 4341 2DCC 68B7 AB89 5754 8DCD"
|
||||
with the elsewhere published fingerprint
|
||||
|
||||
Please note, that you have to use an old version of GnuPG to
|
||||
do all this stuff. *Never* use the version which you are going
|
||||
to check!
|
||||
|
||||
|
||||
b) If you have a trusted Version of PGP 2 or 5 installed, you
|
||||
can check the supplied PGP 2 signature:
|
||||
|
||||
$ pgp gnupg-x.y.z.tar.gz.sig gnupg-x.y.z.tar.gz
|
||||
|
||||
This checks that the detached signature gnupg-x.y.z.tar.gz.sig
|
||||
is indeed a a signature of gnupg-x.y.z.tar.gz. Please note,
|
||||
that this signature has been created with a RSA signature and
|
||||
you probably can't use this method (due to legal reasons) when
|
||||
you are in the U.S. The key used to create this signature is
|
||||
the same as the one used to sign this README file. It should be
|
||||
available at the keyservers and is also included in the source
|
||||
of GnuPG in g10/pubring.asc.
|
||||
|
||||
"pub 768R/0C9857A5 1995-09-30 Werner Koch <werner.koch@guug.de>"
|
||||
|
||||
The fingerprint of this key is published in printed form in the
|
||||
"Global Trust Register for 1998", ISBN 0-9532397-0-5.
|
||||
|
||||
|
||||
c) If you don't have any of the above programs, you have to verify
|
||||
b) If you don't have any of the above programs, you have to verify
|
||||
the MD5 checksum:
|
||||
|
||||
$ md5sum gnupg-x.y.z.tar.gz
|
||||
|
||||
This should yield an output similar_to this:
|
||||
This should yield an output _similar_ to this:
|
||||
|
||||
fd9351b26b3189c1d577f0970f9dcadc gnupg-x.y.z.tar.gz
|
||||
|
||||
@ -146,7 +122,7 @@
|
||||
Documentation
|
||||
-------------
|
||||
|
||||
The manual will be distributed separate under the name "gnupgdoc".
|
||||
The manual will be distributed separate under the name "gph".
|
||||
An online version of the latest manual draft is available at the
|
||||
GnuPG web pages:
|
||||
|
||||
@ -488,7 +464,7 @@
|
||||
---------------------------
|
||||
|
||||
The primary WWW page is "http://www.gnupg.org"
|
||||
The primary FTP site is "ftp://ftp.gnupg.org/pub/gcrypt/"
|
||||
The primary FTP site is "ftp://ftp.gnupg.org/gcrypt/"
|
||||
|
||||
See http://www.gnupg.org/mirrors.html for a list of mirrors
|
||||
and use them if possible. You may also find GnuPG mirrored on
|
||||
|
1
THANKS
1
THANKS
@ -98,6 +98,7 @@ Klaus Singvogel ks@caldera.de
|
||||
Lars Kellogg-Stedman lars@bu.edu
|
||||
L. Sassaman rabbi@quickie.net
|
||||
M Taylor mctaylor@privacy.nb.ca
|
||||
Marcel Waldvogel mwa@arl.wustl.edu
|
||||
Marco d'Itri md@linux.it
|
||||
Mark Adler madler@alumni.caltech.edu
|
||||
Mark Elbrecht snowball3@bigfoot.com
|
||||
|
@ -96,7 +96,7 @@ AC_DEFUN(GNUPG_CHECK_DOCBOOK_TO_TEXI,
|
||||
AC_CHECK_PROG(DOCBOOK_TO_TEXI, docbook2texi, yes, no)
|
||||
AC_MSG_CHECKING(for sgml to texi tools)
|
||||
working_sgmltotexi=no
|
||||
if test "$ac_cv_prog_DOCBOOK_TO_MAN" = yes; then
|
||||
if test "$ac_cv_prog_DOCBOOK_TO_TEXI" = yes; then
|
||||
if sgml2xml -v /dev/null 2>&1 | grep 'SP version' >/dev/null 2>&1 ; then
|
||||
working_sgmltotexi=yes
|
||||
fi
|
||||
|
@ -1,3 +1,11 @@
|
||||
2001-04-28 Werner Koch <wk@gnupg.org>
|
||||
|
||||
* getkey.c (merge_public_with_secret): pkttype was not set to subkey.
|
||||
|
||||
2001-04-27 Werner Koch <wk@gnupg.org>
|
||||
|
||||
* skclist.c (build_sk_list): Changed one log_debug to log_info.
|
||||
|
||||
2001-04-25 Werner Koch <wk@gnupg.org>
|
||||
|
||||
* keyedit.c (show_prefs): Add a verbose mode.
|
||||
@ -12,7 +20,7 @@
|
||||
error and made it translatable.
|
||||
|
||||
* build-packet.c (do_secret_key): Ugly, we wrote a zero
|
||||
instead of the calucalted ndays. Thanks to M Taylor for complaining
|
||||
instead of the computed ndays. Thanks to M Taylor for complaining
|
||||
about a secret key import problem.
|
||||
|
||||
2001-04-23 Werner Koch <wk@gnupg.org>
|
||||
|
@ -1886,7 +1886,7 @@ merge_public_with_secret ( KBNODE pubblock, KBNODE secblock )
|
||||
if ( !cmp_public_secret_key ( pk, sk ) ) {
|
||||
copy_public_parts_to_secret_key ( pk, sk );
|
||||
free_public_key ( pk );
|
||||
pub->pkt->pkttype = PKT_SECRET_KEY;
|
||||
pub->pkt->pkttype = PKT_SECRET_SUBKEY;
|
||||
pub->pkt->pkt.secret_key = copy_secret_key (NULL, sk);
|
||||
break;
|
||||
}
|
||||
|
@ -146,7 +146,7 @@ build_sk_list( STRLIST locusr, SK_LIST *ret_sk_list, int unlock,
|
||||
}
|
||||
else if ( key_present_in_sk_list(sk_list, sk) == 0) {
|
||||
free_secret_key(sk); sk = NULL;
|
||||
log_debug(_("skipped: secret key already present\n"));
|
||||
log_info(_("skipped: secret key already present\n"));
|
||||
}
|
||||
else if ( unlock && (rc = check_secret_key( sk, 0 )) ) {
|
||||
free_secret_key( sk ); sk = NULL;
|
||||
|
@ -1,3 +1,7 @@
|
||||
2001-04-27 Werner Koch <wk@gnupg.org>
|
||||
|
||||
* de.po: Removed an extra "%s".
|
||||
|
||||
2001-04-25 Werner Koch <wk@gnupg.org>
|
||||
|
||||
* fr.po: Updated.
|
||||
|
2
po/de.po
2
po/de.po
@ -3475,7 +3475,7 @@ msgstr "
|
||||
|
||||
#: g10/skclist.c:149
|
||||
msgid "skipped: secret key already present\n"
|
||||
msgstr "%s: übersprungen: geheimer Schlüssel bereits vorhanden\n"
|
||||
msgstr "übersprungen: geheimer Schlüssel bereits vorhanden\n"
|
||||
|
||||
#: g10/skclist.c:160
|
||||
#, c-format
|
||||
|
@ -1,3 +1,8 @@
|
||||
2001-04-27 Werner Koch <wk@gnupg.org>
|
||||
|
||||
* memory.c (out_of_core): Print an explanation on reasons why
|
||||
secret memory can get exhausted.
|
||||
|
||||
2001-04-23 Werner Koch <wk@gnupg.org>
|
||||
|
||||
* http.c (http_wait_response): Implement new flag to inhibit the
|
||||
|
@ -383,9 +383,14 @@ m_dump_table( const char *prefix )
|
||||
static void
|
||||
out_of_core(size_t n, int secure)
|
||||
{
|
||||
log_fatal("out of %s memory while allocating %u bytes\n",
|
||||
secure? "secure":"" ,(unsigned)n );
|
||||
|
||||
log_error ("out of %s memory while allocating %u bytes\n",
|
||||
secure? "secure":"" ,(unsigned)n );
|
||||
if (secure) {
|
||||
/*secmem_dump_stats ();*/
|
||||
log_info ("(this may be caused by too many secret keys used "
|
||||
"simultaneously or due to excessive large key sizes)\n");
|
||||
}
|
||||
exit (2);
|
||||
}
|
||||
|
||||
/****************
|
||||
|
Loading…
x
Reference in New Issue
Block a user