mirror of
git://git.gnupg.org/gnupg.git
synced 2025-01-23 15:07:03 +01:00
last hour fixes.
This commit is contained in:
parent
94e6596bec
commit
7bf54c22e9
@ -1,3 +1,7 @@
|
|||||||
|
2001-04-27 Werner Koch <wk@gnupg.org>
|
||||||
|
|
||||||
|
* README: Removed a few outdated paragraphs.
|
||||||
|
|
||||||
2001-04-17 Werner Koch <wk@gnupg.org>
|
2001-04-17 Werner Koch <wk@gnupg.org>
|
||||||
|
|
||||||
* acinclude.m4 (GNUPG_CHECK_DOCBOOK_TO_TEXI): New.
|
* acinclude.m4 (GNUPG_CHECK_DOCBOOK_TO_TEXI): New.
|
||||||
|
36
README
36
README
@ -36,9 +36,7 @@
|
|||||||
is still available, but because of the larger size of such
|
is still available, but because of the larger size of such
|
||||||
signatures it is deprecated (Please note that the GnuPG
|
signatures it is deprecated (Please note that the GnuPG
|
||||||
implementation of ElGamal signatures is *not* insecure). Symmetric
|
implementation of ElGamal signatures is *not* insecure). Symmetric
|
||||||
algorithms are: 3DES, Blowfish, CAST5 and Twofish (GnuPG does not
|
algorithms are: AES, 3DES, Blowfish, CAST5 and Twofish
|
||||||
yet create Twofish encrypted messages because there is no agreement
|
|
||||||
in the OpenPGP WG on how to use it together with a MDC algorithm)
|
|
||||||
Digest algorithms available are MD5, RIPEMD160 and SHA1.
|
Digest algorithms available are MD5, RIPEMD160 and SHA1.
|
||||||
|
|
||||||
|
|
||||||
@ -100,41 +98,19 @@
|
|||||||
|
|
||||||
$ gpg --fingerprint 0x57548DCD
|
$ gpg --fingerprint 0x57548DCD
|
||||||
|
|
||||||
with the elsewhere published fingerprint, or - if you are able to
|
with the elsewhere published fingerprint
|
||||||
_positively_ verify the signature of this README file - with
|
|
||||||
this fingerprint: "6BD9 050F D8FC 941B 4341 2DCC 68B7 AB89 5754 8DCD"
|
|
||||||
|
|
||||||
Please note, that you have to use an old version of GnuPG to
|
Please note, that you have to use an old version of GnuPG to
|
||||||
do all this stuff. *Never* use the version which you are going
|
do all this stuff. *Never* use the version which you are going
|
||||||
to check!
|
to check!
|
||||||
|
|
||||||
|
|
||||||
b) If you have a trusted Version of PGP 2 or 5 installed, you
|
b) If you don't have any of the above programs, you have to verify
|
||||||
can check the supplied PGP 2 signature:
|
|
||||||
|
|
||||||
$ pgp gnupg-x.y.z.tar.gz.sig gnupg-x.y.z.tar.gz
|
|
||||||
|
|
||||||
This checks that the detached signature gnupg-x.y.z.tar.gz.sig
|
|
||||||
is indeed a a signature of gnupg-x.y.z.tar.gz. Please note,
|
|
||||||
that this signature has been created with a RSA signature and
|
|
||||||
you probably can't use this method (due to legal reasons) when
|
|
||||||
you are in the U.S. The key used to create this signature is
|
|
||||||
the same as the one used to sign this README file. It should be
|
|
||||||
available at the keyservers and is also included in the source
|
|
||||||
of GnuPG in g10/pubring.asc.
|
|
||||||
|
|
||||||
"pub 768R/0C9857A5 1995-09-30 Werner Koch <werner.koch@guug.de>"
|
|
||||||
|
|
||||||
The fingerprint of this key is published in printed form in the
|
|
||||||
"Global Trust Register for 1998", ISBN 0-9532397-0-5.
|
|
||||||
|
|
||||||
|
|
||||||
c) If you don't have any of the above programs, you have to verify
|
|
||||||
the MD5 checksum:
|
the MD5 checksum:
|
||||||
|
|
||||||
$ md5sum gnupg-x.y.z.tar.gz
|
$ md5sum gnupg-x.y.z.tar.gz
|
||||||
|
|
||||||
This should yield an output similar_to this:
|
This should yield an output _similar_ to this:
|
||||||
|
|
||||||
fd9351b26b3189c1d577f0970f9dcadc gnupg-x.y.z.tar.gz
|
fd9351b26b3189c1d577f0970f9dcadc gnupg-x.y.z.tar.gz
|
||||||
|
|
||||||
@ -146,7 +122,7 @@
|
|||||||
Documentation
|
Documentation
|
||||||
-------------
|
-------------
|
||||||
|
|
||||||
The manual will be distributed separate under the name "gnupgdoc".
|
The manual will be distributed separate under the name "gph".
|
||||||
An online version of the latest manual draft is available at the
|
An online version of the latest manual draft is available at the
|
||||||
GnuPG web pages:
|
GnuPG web pages:
|
||||||
|
|
||||||
@ -488,7 +464,7 @@
|
|||||||
---------------------------
|
---------------------------
|
||||||
|
|
||||||
The primary WWW page is "http://www.gnupg.org"
|
The primary WWW page is "http://www.gnupg.org"
|
||||||
The primary FTP site is "ftp://ftp.gnupg.org/pub/gcrypt/"
|
The primary FTP site is "ftp://ftp.gnupg.org/gcrypt/"
|
||||||
|
|
||||||
See http://www.gnupg.org/mirrors.html for a list of mirrors
|
See http://www.gnupg.org/mirrors.html for a list of mirrors
|
||||||
and use them if possible. You may also find GnuPG mirrored on
|
and use them if possible. You may also find GnuPG mirrored on
|
||||||
|
1
THANKS
1
THANKS
@ -98,6 +98,7 @@ Klaus Singvogel ks@caldera.de
|
|||||||
Lars Kellogg-Stedman lars@bu.edu
|
Lars Kellogg-Stedman lars@bu.edu
|
||||||
L. Sassaman rabbi@quickie.net
|
L. Sassaman rabbi@quickie.net
|
||||||
M Taylor mctaylor@privacy.nb.ca
|
M Taylor mctaylor@privacy.nb.ca
|
||||||
|
Marcel Waldvogel mwa@arl.wustl.edu
|
||||||
Marco d'Itri md@linux.it
|
Marco d'Itri md@linux.it
|
||||||
Mark Adler madler@alumni.caltech.edu
|
Mark Adler madler@alumni.caltech.edu
|
||||||
Mark Elbrecht snowball3@bigfoot.com
|
Mark Elbrecht snowball3@bigfoot.com
|
||||||
|
@ -96,7 +96,7 @@ AC_DEFUN(GNUPG_CHECK_DOCBOOK_TO_TEXI,
|
|||||||
AC_CHECK_PROG(DOCBOOK_TO_TEXI, docbook2texi, yes, no)
|
AC_CHECK_PROG(DOCBOOK_TO_TEXI, docbook2texi, yes, no)
|
||||||
AC_MSG_CHECKING(for sgml to texi tools)
|
AC_MSG_CHECKING(for sgml to texi tools)
|
||||||
working_sgmltotexi=no
|
working_sgmltotexi=no
|
||||||
if test "$ac_cv_prog_DOCBOOK_TO_MAN" = yes; then
|
if test "$ac_cv_prog_DOCBOOK_TO_TEXI" = yes; then
|
||||||
if sgml2xml -v /dev/null 2>&1 | grep 'SP version' >/dev/null 2>&1 ; then
|
if sgml2xml -v /dev/null 2>&1 | grep 'SP version' >/dev/null 2>&1 ; then
|
||||||
working_sgmltotexi=yes
|
working_sgmltotexi=yes
|
||||||
fi
|
fi
|
||||||
|
@ -1,3 +1,11 @@
|
|||||||
|
2001-04-28 Werner Koch <wk@gnupg.org>
|
||||||
|
|
||||||
|
* getkey.c (merge_public_with_secret): pkttype was not set to subkey.
|
||||||
|
|
||||||
|
2001-04-27 Werner Koch <wk@gnupg.org>
|
||||||
|
|
||||||
|
* skclist.c (build_sk_list): Changed one log_debug to log_info.
|
||||||
|
|
||||||
2001-04-25 Werner Koch <wk@gnupg.org>
|
2001-04-25 Werner Koch <wk@gnupg.org>
|
||||||
|
|
||||||
* keyedit.c (show_prefs): Add a verbose mode.
|
* keyedit.c (show_prefs): Add a verbose mode.
|
||||||
@ -12,7 +20,7 @@
|
|||||||
error and made it translatable.
|
error and made it translatable.
|
||||||
|
|
||||||
* build-packet.c (do_secret_key): Ugly, we wrote a zero
|
* build-packet.c (do_secret_key): Ugly, we wrote a zero
|
||||||
instead of the calucalted ndays. Thanks to M Taylor for complaining
|
instead of the computed ndays. Thanks to M Taylor for complaining
|
||||||
about a secret key import problem.
|
about a secret key import problem.
|
||||||
|
|
||||||
2001-04-23 Werner Koch <wk@gnupg.org>
|
2001-04-23 Werner Koch <wk@gnupg.org>
|
||||||
|
@ -1886,7 +1886,7 @@ merge_public_with_secret ( KBNODE pubblock, KBNODE secblock )
|
|||||||
if ( !cmp_public_secret_key ( pk, sk ) ) {
|
if ( !cmp_public_secret_key ( pk, sk ) ) {
|
||||||
copy_public_parts_to_secret_key ( pk, sk );
|
copy_public_parts_to_secret_key ( pk, sk );
|
||||||
free_public_key ( pk );
|
free_public_key ( pk );
|
||||||
pub->pkt->pkttype = PKT_SECRET_KEY;
|
pub->pkt->pkttype = PKT_SECRET_SUBKEY;
|
||||||
pub->pkt->pkt.secret_key = copy_secret_key (NULL, sk);
|
pub->pkt->pkt.secret_key = copy_secret_key (NULL, sk);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
@ -146,7 +146,7 @@ build_sk_list( STRLIST locusr, SK_LIST *ret_sk_list, int unlock,
|
|||||||
}
|
}
|
||||||
else if ( key_present_in_sk_list(sk_list, sk) == 0) {
|
else if ( key_present_in_sk_list(sk_list, sk) == 0) {
|
||||||
free_secret_key(sk); sk = NULL;
|
free_secret_key(sk); sk = NULL;
|
||||||
log_debug(_("skipped: secret key already present\n"));
|
log_info(_("skipped: secret key already present\n"));
|
||||||
}
|
}
|
||||||
else if ( unlock && (rc = check_secret_key( sk, 0 )) ) {
|
else if ( unlock && (rc = check_secret_key( sk, 0 )) ) {
|
||||||
free_secret_key( sk ); sk = NULL;
|
free_secret_key( sk ); sk = NULL;
|
||||||
|
@ -1,3 +1,7 @@
|
|||||||
|
2001-04-27 Werner Koch <wk@gnupg.org>
|
||||||
|
|
||||||
|
* de.po: Removed an extra "%s".
|
||||||
|
|
||||||
2001-04-25 Werner Koch <wk@gnupg.org>
|
2001-04-25 Werner Koch <wk@gnupg.org>
|
||||||
|
|
||||||
* fr.po: Updated.
|
* fr.po: Updated.
|
||||||
|
2
po/de.po
2
po/de.po
@ -3475,7 +3475,7 @@ msgstr "
|
|||||||
|
|
||||||
#: g10/skclist.c:149
|
#: g10/skclist.c:149
|
||||||
msgid "skipped: secret key already present\n"
|
msgid "skipped: secret key already present\n"
|
||||||
msgstr "%s: übersprungen: geheimer Schlüssel bereits vorhanden\n"
|
msgstr "übersprungen: geheimer Schlüssel bereits vorhanden\n"
|
||||||
|
|
||||||
#: g10/skclist.c:160
|
#: g10/skclist.c:160
|
||||||
#, c-format
|
#, c-format
|
||||||
|
@ -1,3 +1,8 @@
|
|||||||
|
2001-04-27 Werner Koch <wk@gnupg.org>
|
||||||
|
|
||||||
|
* memory.c (out_of_core): Print an explanation on reasons why
|
||||||
|
secret memory can get exhausted.
|
||||||
|
|
||||||
2001-04-23 Werner Koch <wk@gnupg.org>
|
2001-04-23 Werner Koch <wk@gnupg.org>
|
||||||
|
|
||||||
* http.c (http_wait_response): Implement new flag to inhibit the
|
* http.c (http_wait_response): Implement new flag to inhibit the
|
||||||
|
@ -383,9 +383,14 @@ m_dump_table( const char *prefix )
|
|||||||
static void
|
static void
|
||||||
out_of_core(size_t n, int secure)
|
out_of_core(size_t n, int secure)
|
||||||
{
|
{
|
||||||
log_fatal("out of %s memory while allocating %u bytes\n",
|
log_error ("out of %s memory while allocating %u bytes\n",
|
||||||
secure? "secure":"" ,(unsigned)n );
|
secure? "secure":"" ,(unsigned)n );
|
||||||
|
if (secure) {
|
||||||
|
/*secmem_dump_stats ();*/
|
||||||
|
log_info ("(this may be caused by too many secret keys used "
|
||||||
|
"simultaneously or due to excessive large key sizes)\n");
|
||||||
|
}
|
||||||
|
exit (2);
|
||||||
}
|
}
|
||||||
|
|
||||||
/****************
|
/****************
|
||||||
|
Loading…
x
Reference in New Issue
Block a user