mirror of
git://git.gnupg.org/gnupg.git
synced 2025-01-21 14:47:03 +01:00
See ChangeLog: Fri Jul 23 13:53:03 CEST 1999 Werner Koch
This commit is contained in:
parent
541bb017d2
commit
843742c086
2
AUTHORS
2
AUTHORS
@ -48,7 +48,7 @@ Fixed a lot of typos.
|
|||||||
|
|
||||||
TRANSLATIONS Walter Koch 1998-09-08
|
TRANSLATIONS Walter Koch 1998-09-08
|
||||||
Disclaimer. [de]
|
Disclaimer. [de]
|
||||||
walterk@dip.de
|
koch@hsp.de
|
||||||
|
|
||||||
|
|
||||||
TRANSLATIONS Gregory Steuck 1998-10-20
|
TRANSLATIONS Gregory Steuck 1998-10-20
|
||||||
|
13
BUGS
13
BUGS
@ -29,14 +29,6 @@ and after about half a day in the rsync snapshots.
|
|||||||
The for loop the exp.date is set before v3 detection?
|
The for loop the exp.date is set before v3 detection?
|
||||||
[is this bug still alive? - can someone please check it]
|
[is this bug still alive? - can someone please check it]
|
||||||
|
|
||||||
[ *] #5
|
|
||||||
/home/jam/.gnupg/pubring.gpg: can't open gdbm file: Can't be writer
|
|
||||||
keyblock resource `/home/jam/.gnupg/pubring.gpg': file open error
|
|
||||||
OOPS in close enum_keyblocks - ignored
|
|
||||||
[gdbm is experimental and will be replaced by the new keybox code]
|
|
||||||
FIX: 1999-07-22 (Fixed the second error, there will be no fix for
|
|
||||||
the first one, becuase GDBM is to be replaced)
|
|
||||||
|
|
||||||
[ **] #6 1999-02-22 <backes@rhrk.uni-kl.de> 0.9.3
|
[ **] #6 1999-02-22 <backes@rhrk.uni-kl.de> 0.9.3
|
||||||
Buserror on IRIX 6.4: Crash while doing a keygen. I think while creating
|
Buserror on IRIX 6.4: Crash while doing a keygen. I think while creating
|
||||||
the prime. Other buserrors are reported when doing a "gpg README"
|
the prime. Other buserrors are reported when doing a "gpg README"
|
||||||
@ -48,11 +40,6 @@ and after about half a day in the rsync snapshots.
|
|||||||
rndunix hangs on hp/ux. The problem is related to my_plcose which is
|
rndunix hangs on hp/ux. The problem is related to my_plcose which is
|
||||||
not always called. (I suggest to use EGD instead of rndunix.)
|
not always called. (I suggest to use EGD instead of rndunix.)
|
||||||
|
|
||||||
[ **] #19 1999-06-11
|
|
||||||
"trustdb transaction too large" with about 500 signatures on a key
|
|
||||||
FAEBD5FC.
|
|
||||||
FIX: 1999-07-12 (less memory requirement and increased the limit)
|
|
||||||
|
|
||||||
[ *] #22 1999-07-22
|
[ *] #22 1999-07-22
|
||||||
Solaris make has problems with the generated POTFILES - seems to be a
|
Solaris make has problems with the generated POTFILES - seems to be a
|
||||||
gettext bug. Use GNU gmake as a workaround.
|
gettext bug. Use GNU gmake as a workaround.
|
||||||
|
@ -1,3 +1,10 @@
|
|||||||
|
Fri Jul 23 13:53:03 CEST 1999 Werner Koch <wk@isil.d.shuttle.de>
|
||||||
|
|
||||||
|
|
||||||
|
* VERSION: Set to 0.9.9.
|
||||||
|
|
||||||
|
* configure.in: Print a notice when rndunix is used.
|
||||||
|
|
||||||
Thu Jul 15 10:15:35 CEST 1999 Werner Koch <wk@isil.d.shuttle.de>
|
Thu Jul 15 10:15:35 CEST 1999 Werner Koch <wk@isil.d.shuttle.de>
|
||||||
|
|
||||||
* acinclude.m4 (GNUPG_SYS_SYMBOL_UNDERSCORE): Fixed last modification.
|
* acinclude.m4 (GNUPG_SYS_SYMBOL_UNDERSCORE): Fixed last modification.
|
||||||
|
2
NEWS
2
NEWS
@ -1,3 +1,5 @@
|
|||||||
|
Noteworthy changes in version 0.9.9
|
||||||
|
-----------------------------------
|
||||||
|
|
||||||
* New options --[no-]utf8-strings.
|
* New options --[no-]utf8-strings.
|
||||||
|
|
||||||
|
13
OBUGS
13
OBUGS
@ -19,6 +19,14 @@
|
|||||||
gpg:[stdin]: key A6A59DB9: secret key not found: public key not found
|
gpg:[stdin]: key A6A59DB9: secret key not found: public key not found
|
||||||
FIX: 1999-02-22 wk
|
FIX: 1999-02-22 wk
|
||||||
|
|
||||||
|
[ *] #5
|
||||||
|
/home/jam/.gnupg/pubring.gpg: can't open gdbm file: Can't be writer
|
||||||
|
keyblock resource `/home/jam/.gnupg/pubring.gpg': file open error
|
||||||
|
OOPS in close enum_keyblocks - ignored
|
||||||
|
[gdbm is experimental and will be replaced by the new keybox code]
|
||||||
|
FIX: 1999-07-22 (Fixed the second error, there will be no fix for
|
||||||
|
the first one, becuase GDBM is to be replaced)
|
||||||
|
|
||||||
[ *] #7 1999-02-22 <dwpalmer@dwpalm.jf.intel.com> 0.9.3
|
[ *] #7 1999-02-22 <dwpalmer@dwpalm.jf.intel.com> 0.9.3
|
||||||
Conventional encrytion incompatibilty:
|
Conventional encrytion incompatibilty:
|
||||||
$ gpg -c --cipher-algo cast5 --compress-algo 1 --no-comment secrets.txt
|
$ gpg -c --cipher-algo cast5 --compress-algo 1 --no-comment secrets.txt
|
||||||
@ -77,6 +85,11 @@
|
|||||||
Import does not detect identical user IDs.
|
Import does not detect identical user IDs.
|
||||||
FIX: 1999-05-22
|
FIX: 1999-05-22
|
||||||
|
|
||||||
|
[ **] #19 1999-06-11
|
||||||
|
"trustdb transaction too large" with about 500 signatures on a key
|
||||||
|
FAEBD5FC.
|
||||||
|
FIX: 1999-07-12 (less memory requirement and increased the limit)
|
||||||
|
|
||||||
[ **] #20 1999-06-16 <jashley@yorktown.designlab.ukans.edu> 0.9.7
|
[ **] #20 1999-06-16 <jashley@yorktown.designlab.ukans.edu> 0.9.7
|
||||||
Using "addkey" in the edit menu with more than 1 subkey leads to
|
Using "addkey" in the edit menu with more than 1 subkey leads to
|
||||||
"out of secure memory" in some cases.
|
"out of secure memory" in some cases.
|
||||||
|
13
README
13
README
@ -1,6 +1,8 @@
|
|||||||
|
-----BEGIN PGP SIGNED MESSAGE-----
|
||||||
|
|
||||||
GnuPG - The GNU Privacy Guard
|
GnuPG - The GNU Privacy Guard
|
||||||
-------------------------------
|
-------------------------------
|
||||||
Version 0.9.8
|
Version 0.9.9
|
||||||
|
|
||||||
GnuPG is now in Beta test and you should report all bugs to the
|
GnuPG is now in Beta test and you should report all bugs to the
|
||||||
mailing list (see below). The 0.9.x versions are released mainly
|
mailing list (see below). The 0.9.x versions are released mainly
|
||||||
@ -445,3 +447,12 @@
|
|||||||
|
|
||||||
Have fun and remember: Echelon is looking at you kid.
|
Have fun and remember: Echelon is looking at you kid.
|
||||||
|
|
||||||
|
-----BEGIN PGP SIGNATURE-----
|
||||||
|
Version: GnuPG v0.9.8a (GNU/Linux)
|
||||||
|
Comment: For info see http://www.gnupg.org
|
||||||
|
|
||||||
|
iQB1AwUBN5g4Lx0Z9MEMmFelAQE+RwL/Ws+kNklTHJnABT8YU8BqN8x310DyUm+e
|
||||||
|
ViS23npv3S/kRnHbCOOQo4cEjUYZFFrJXzQgodBvKbLVzMgdj4XQvkulTSBYK6pm
|
||||||
|
B7GeQptWRCNJ7m+Hw0Z4gwJ7giQTdfF8
|
||||||
|
=pJ7c
|
||||||
|
-----END PGP SIGNATURE-----
|
||||||
|
2
THANKS
2
THANKS
@ -92,7 +92,7 @@ Tomas Fasth tomas.fasth@twinspot.net
|
|||||||
Thomas Mikkelsen tbm@image.dk
|
Thomas Mikkelsen tbm@image.dk
|
||||||
Ulf Möller 3umoelle@informatik.uni-hamburg.de
|
Ulf Möller 3umoelle@informatik.uni-hamburg.de
|
||||||
Urko Lusa ulusa@lacueva.ddns.org
|
Urko Lusa ulusa@lacueva.ddns.org
|
||||||
Walter Koch walterk@dip.de
|
Walter Koch koch@hsp.de
|
||||||
Werner Koch werner.koch@guug.de
|
Werner Koch werner.koch@guug.de
|
||||||
Wim Vandeputte bunbun@reptile.rug.ac.be
|
Wim Vandeputte bunbun@reptile.rug.ac.be
|
||||||
nbecker@hns.com
|
nbecker@hns.com
|
||||||
|
11
TODO
11
TODO
@ -1,7 +1,4 @@
|
|||||||
|
|
||||||
* Check that uids without a self signature don't become fully trusted and
|
|
||||||
print a warning when such a key is used.
|
|
||||||
|
|
||||||
|
|
||||||
Scheduled for 1.1
|
Scheduled for 1.1
|
||||||
-----------------
|
-----------------
|
||||||
@ -43,4 +40,12 @@ Nice to have
|
|||||||
verification status of the message to the output (i.e. write something to
|
verification status of the message to the output (i.e. write something to
|
||||||
the --output file and not only to stderr.
|
the --output file and not only to stderr.
|
||||||
* configure option where to find zlib
|
* configure option where to find zlib
|
||||||
|
* Check the beginning of file to detect already compresssed files (gzip,
|
||||||
|
bzip2, xdelta and some picture formats)
|
||||||
|
* Display more validity information about the user IDs at certain places.
|
||||||
|
We need a more general function to extract such kind of info from the
|
||||||
|
trustdb.
|
||||||
|
* Evaluate whether it make sense to replace the namehashs either by
|
||||||
|
using the user ID directly or by using pointers into the trustdb.
|
||||||
|
|
||||||
|
|
||||||
|
@ -260,7 +260,7 @@ disable_cipher_algo( int algo )
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
/* fixme: we should use a linked list */
|
/* fixme: we should use a linked list */
|
||||||
log_fatal("can't disable cipher algo %d: table full\n");
|
log_fatal("can't disable cipher algo %d: table full\n", algo );
|
||||||
}
|
}
|
||||||
|
|
||||||
/****************
|
/****************
|
||||||
@ -396,7 +396,7 @@ cipher_setiv( CIPHER_HANDLE c, const byte *iv, unsigned ivlen )
|
|||||||
if( iv ) {
|
if( iv ) {
|
||||||
if( ivlen != c->blocksize )
|
if( ivlen != c->blocksize )
|
||||||
log_info("WARNING: cipher_setiv: ivlen=%u blklen=%u\n",
|
log_info("WARNING: cipher_setiv: ivlen=%u blklen=%u\n",
|
||||||
ivlen, c->blocksize );
|
ivlen, (unsigned)c->blocksize );
|
||||||
if( ivlen > c->blocksize )
|
if( ivlen > c->blocksize )
|
||||||
ivlen = c->blocksize;
|
ivlen = c->blocksize;
|
||||||
memcpy( c->iv, iv, ivlen );
|
memcpy( c->iv, iv, ivlen );
|
||||||
|
@ -278,7 +278,7 @@ disable_pubkey_algo( int algo )
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
log_fatal("can't disable pubkey algo %d: table full\n");
|
log_fatal("can't disable pubkey algo %d: table full\n", algo );
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
38
configure.in
38
configure.in
@ -50,6 +50,8 @@ case "$use_static_rnd" in
|
|||||||
;;
|
;;
|
||||||
esac
|
esac
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
dnl
|
dnl
|
||||||
dnl See whether the user wants to disable checking for /dev/random
|
dnl See whether the user wants to disable checking for /dev/random
|
||||||
|
|
||||||
@ -116,8 +118,11 @@ if test x$compile_libgcrypt = xyes ; then
|
|||||||
else
|
else
|
||||||
compile_libgcrypt=no
|
compile_libgcrypt=no
|
||||||
AC_MSG_WARN([[
|
AC_MSG_WARN([[
|
||||||
|
***
|
||||||
*** LIBGCRYPT is not yet ready for public testing.
|
*** LIBGCRYPT is not yet ready for public testing.
|
||||||
*** Maybe you have more luck with the next release of GnuPG]])
|
*** Maybe you have more luck with the next release of GnuPG
|
||||||
|
*** Watch the gnupg-announce mailing list or the webpage.
|
||||||
|
***]])
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
AM_CONDITIONAL(COMPILE_LIBGCRYPT, test x$compile_libgcrypt = xyes)
|
AM_CONDITIONAL(COMPILE_LIBGCRYPT, test x$compile_libgcrypt = xyes)
|
||||||
@ -400,13 +405,15 @@ if test "$ac_cv_header_sys_capability_h" = "yes" ; then
|
|||||||
fi
|
fi
|
||||||
if test "$use_capabilities" = "no" ; then
|
if test "$use_capabilities" = "no" ; then
|
||||||
AC_MSG_WARN([[
|
AC_MSG_WARN([[
|
||||||
|
***
|
||||||
*** The use of capabilities on this system is not possible.
|
*** The use of capabilities on this system is not possible.
|
||||||
*** You need a recent Linux kernel and some patches:
|
*** You need a recent Linux kernel and some patches:
|
||||||
*** fcaps-2.2.9-990610.patch (kernel patch for 2.2.9)
|
*** fcaps-2.2.9-990610.patch (kernel patch for 2.2.9)
|
||||||
*** fcap-module-990613.tar.gz (kernel module)
|
*** fcap-module-990613.tar.gz (kernel module)
|
||||||
*** libcap-1.92.tar.gz (user mode library and utilities)
|
*** libcap-1.92.tar.gz (user mode library and utilities)
|
||||||
*** And you have to configure the kernel with CONFIG_VFS_CAP_PLUGIN
|
*** And you have to configure the kernel with CONFIG_VFS_CAP_PLUGIN
|
||||||
*** set (filesystems menu). Be warned: This code is *really* ALPHA.]])
|
*** set (filesystems menu). Be warned: This code is *really* ALPHA.
|
||||||
|
***]])
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
@ -455,6 +462,7 @@ dnl
|
|||||||
dnl Figure out the default linkage mode for cipher modules
|
dnl Figure out the default linkage mode for cipher modules
|
||||||
dnl
|
dnl
|
||||||
dnl (We always need a static rmd160)
|
dnl (We always need a static rmd160)
|
||||||
|
print_egd_notice=no
|
||||||
static_modules="$static_modules rmd160"
|
static_modules="$static_modules rmd160"
|
||||||
if test "$use_static_rnd" = default; then
|
if test "$use_static_rnd" = default; then
|
||||||
if test "$ac_cv_have_dev_random" = yes; then
|
if test "$ac_cv_have_dev_random" = yes; then
|
||||||
@ -472,6 +480,7 @@ if test "$use_static_rnd" = default; then
|
|||||||
;;
|
;;
|
||||||
*)
|
*)
|
||||||
static_modules="$static_modules rndunix"
|
static_modules="$static_modules rndunix"
|
||||||
|
print_egd_notice=yes
|
||||||
;;
|
;;
|
||||||
esac
|
esac
|
||||||
fi
|
fi
|
||||||
@ -480,9 +489,34 @@ else
|
|||||||
:
|
:
|
||||||
else
|
else
|
||||||
static_modules="$static_modules rnd$use_static_rnd"
|
static_modules="$static_modules rnd$use_static_rnd"
|
||||||
|
if test "$use_static_rnd" = "unix"; then
|
||||||
|
print_egd_notice=yes
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
|
||||||
|
if test "$print_egd_notice" = "yes"; then
|
||||||
|
AC_MSG_WARN([[
|
||||||
|
***
|
||||||
|
*** The performance of the UNIX random gatherer module is not very good
|
||||||
|
*** and it does not keep the entropy pool over multiple invocations of
|
||||||
|
*** GnuPG. The suggested way to overcome this problem is to use the
|
||||||
|
***
|
||||||
|
*** Entropy Gathering Daemon (EGD)
|
||||||
|
***
|
||||||
|
*** which provides a entropy source for the whole system. It is written
|
||||||
|
*** in Perl and available at the GnuPG FTP servers. For more information
|
||||||
|
*** consult the GnuPG webpages:
|
||||||
|
***
|
||||||
|
*** http://www.gnupg.org/donwload.html#egd
|
||||||
|
***
|
||||||
|
*** You may want to run ./configure with --enable-static-rnd=none to be
|
||||||
|
*** able to load the EGD client code dynamically; this way you can choose
|
||||||
|
*** between RNDUNIX and RNDEGD without recompilation.
|
||||||
|
***]])
|
||||||
|
fi
|
||||||
|
|
||||||
dnl
|
dnl
|
||||||
dnl Parse the modules list and build the list
|
dnl Parse the modules list and build the list
|
||||||
dnl of static and dymically linked modules
|
dnl of static and dymically linked modules
|
||||||
|
@ -1,3 +1,23 @@
|
|||||||
|
Fri Jul 23 13:53:03 CEST 1999 Werner Koch <wk@isil.d.shuttle.de>
|
||||||
|
|
||||||
|
|
||||||
|
* ringedit.c (enum_keyblocks): Removed annoying error message in cases
|
||||||
|
when we have no keyring at all to enum.
|
||||||
|
|
||||||
|
* getkey.c (classify_user_id): Rewrote to relax the recognition of
|
||||||
|
keyIDs and fingerprints (Michael).
|
||||||
|
|
||||||
|
* mainproc.c (check_sig_and_print): Print status NO_PUBKEY.
|
||||||
|
(print_failed_pkenc): Print status NO_SECKEY.
|
||||||
|
|
||||||
|
* import.c (mark_non_selfsigned_uids_valid): New.
|
||||||
|
* g10.c: New option --allow-non-selfsigned-uid.
|
||||||
|
|
||||||
|
* pkclist.c (print_fpr): New.
|
||||||
|
(do_we_trust_pre): Print the fpr before asking whether to use the key
|
||||||
|
anyway.
|
||||||
|
(do_edit_ownertrust): Likewise.
|
||||||
|
|
||||||
Thu Jul 22 20:03:03 CEST 1999 Werner Koch <wk@isil.d.shuttle.de>
|
Thu Jul 22 20:03:03 CEST 1999 Werner Koch <wk@isil.d.shuttle.de>
|
||||||
|
|
||||||
|
|
||||||
|
@ -655,7 +655,7 @@ keyedit_menu( const char *username, STRLIST locusr, STRLIST commands,
|
|||||||
toggle = 0;
|
toggle = 0;
|
||||||
cur_keyblock = keyblock;
|
cur_keyblock = keyblock;
|
||||||
for(;;) { /* main loop */
|
for(;;) { /* main loop */
|
||||||
int i, arg_number=0;
|
int i, arg_number;
|
||||||
char *p;
|
char *p;
|
||||||
|
|
||||||
tty_printf("\n");
|
tty_printf("\n");
|
||||||
|
@ -39,6 +39,36 @@
|
|||||||
|
|
||||||
#define CONTROL_D ('D' - 'A' + 1)
|
#define CONTROL_D ('D' - 'A' + 1)
|
||||||
|
|
||||||
|
/* fixme: we have nearly the same code in keyedit.c */
|
||||||
|
static void
|
||||||
|
print_fpr( PKT_public_key *pk )
|
||||||
|
{
|
||||||
|
byte array[MAX_FINGERPRINT_LEN], *p;
|
||||||
|
size_t i, n;
|
||||||
|
|
||||||
|
fingerprint_from_pk( pk, array, &n );
|
||||||
|
p = array;
|
||||||
|
/* Translators: this shoud fit into 24 bytes to that the fingerprint
|
||||||
|
* data is properly aligned with the user ID */
|
||||||
|
tty_printf(_(" Fingerprint:"));
|
||||||
|
if( n == 20 ) {
|
||||||
|
for(i=0; i < n ; i++, i++, p += 2 ) {
|
||||||
|
if( i == 10 )
|
||||||
|
tty_printf(" ");
|
||||||
|
tty_printf(" %02X%02X", *p, p[1] );
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
for(i=0; i < n ; i++, p++ ) {
|
||||||
|
if( i && !(i%8) )
|
||||||
|
tty_printf(" ");
|
||||||
|
tty_printf(" %02X", *p );
|
||||||
|
}
|
||||||
|
}
|
||||||
|
tty_printf("\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
static void
|
static void
|
||||||
show_paths( ulong lid, int only_first )
|
show_paths( ulong lid, int only_first )
|
||||||
@ -148,7 +178,9 @@ do_edit_ownertrust( ulong lid, int mode, unsigned *new_trust, int defer_help )
|
|||||||
p = get_user_id( keyid, &n );
|
p = get_user_id( keyid, &n );
|
||||||
tty_print_string( p, n ),
|
tty_print_string( p, n ),
|
||||||
m_free(p);
|
m_free(p);
|
||||||
tty_printf("\"\n\n");
|
tty_printf("\"\n");
|
||||||
|
print_fpr( pk );
|
||||||
|
tty_printf("\n");
|
||||||
}
|
}
|
||||||
tty_printf(_(
|
tty_printf(_(
|
||||||
"Please decide how far you trust this user to correctly\n"
|
"Please decide how far you trust this user to correctly\n"
|
||||||
@ -375,6 +407,7 @@ do_we_trust( PKT_public_key *pk, int trustlevel )
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/****************
|
/****************
|
||||||
* wrapper around do_we_trust, so we can ask whether to use the
|
* wrapper around do_we_trust, so we can ask whether to use the
|
||||||
* key anyway.
|
* key anyway.
|
||||||
@ -402,7 +435,9 @@ do_we_trust_pre( PKT_public_key *pk, int trustlevel )
|
|||||||
p = get_user_id( keyid, &n );
|
p = get_user_id( keyid, &n );
|
||||||
tty_print_string( p, n ),
|
tty_print_string( p, n ),
|
||||||
m_free(p);
|
m_free(p);
|
||||||
tty_printf("\"\n\n");
|
tty_printf("\"\n");
|
||||||
|
print_fpr( pk );
|
||||||
|
tty_printf("\n");
|
||||||
|
|
||||||
tty_printf(_(
|
tty_printf(_(
|
||||||
"It is NOT certain that the key belongs to its owner.\n"
|
"It is NOT certain that the key belongs to its owner.\n"
|
||||||
|
490
po/es_ES.po
490
po/es_ES.po
File diff suppressed because it is too large
Load Diff
490
po/pt_BR.po
490
po/pt_BR.po
File diff suppressed because it is too large
Load Diff
Loading…
x
Reference in New Issue
Block a user