From a13198d9bcee368a8de7a401feb017efc83ff795 Mon Sep 17 00:00:00 2001 From: Werner Koch Date: Thu, 14 Aug 2014 17:08:03 +0200 Subject: [PATCH] Release 2.1.0-beta783 --- NEWS | 30 ++++++++++++++++++++++++++---- g10/keygen.c | 4 +++- 2 files changed, 29 insertions(+), 5 deletions(-) diff --git a/NEWS b/NEWS index d78c6d794..cef9417c2 100644 --- a/NEWS +++ b/NEWS @@ -1,9 +1,34 @@ -Noteworthy changes in version 2.1.0-betaxxx (unreleased) +Noteworthy changes in version 2.1.0-beta783 (2014-08-14) -------------------------------------------------------- + * gpg: Add command --quick-gen-key. + + * gpg: Make --quick-sign-key promote local key signatures. + + * gpg: Add "show-usage" sub-option to --list-options. + + * gpg: Screen keyserver responses to avoid importing unwanted keys + from rogue servers. + * gpg: Removed the option --pgp2 and --rfc1991 and the ability to create PGP-2 compatible messages. + * gpg: Removed options --compress-keys and --compress-sigs. + + * gpg: Cap attribute packets at 16MB. + + * gpg: Improved output of --list-packets. + + * gpg: Make with-colons output of --search-keys work again. + + * gpgsm: Auto-create the ".gnupg" directory like gpg does. + + * agent: Fold new passphrase warning prompts into one. + + * scdaemon: Add support for the Smartcard-HSM card. + + * scdaemon: Remove the use of the pcsc-wrapper. + Noteworthy changes in version 2.1.0-beta751 (2014-07-03) -------------------------------------------------------- @@ -20,9 +45,6 @@ Noteworthy changes in version 2.1.0-beta751 (2014-07-03) * gpg: Avoid DoS due to garbled compressed data packets. [CVE-2014-4617] - * gpg: Screen keyserver responses to avoid importing unwanted keys - from rogue servers. - * gpg: The validity of user ids is now shown by default. To revert this add "list-options no-show-uid-validity" to gpg.conf. diff --git a/g10/keygen.c b/g10/keygen.c index ed11a2fff..1bf534837 100644 --- a/g10/keygen.c +++ b/g10/keygen.c @@ -2208,7 +2208,9 @@ ask_curve (int *algo, int both) log_info ("WARNING: Curve25519 is an experimental algorithm" " and not yet standardized.\n"); log_info (" The key format will eventually change" - " and render this key unusable!\n\n"); + " and render this key unusable!\n"); + log_info (" You also need a recent development version" + " of Libgcrypt.\n"); if (!cpr_get_answer_is_yes("experimental_curve.override", "Use this curve anyway? (y/N) ") )