Preparing a new release

This commit is contained in:
Werner Koch 2006-10-04 10:22:56 +00:00
parent 4b48bcacc9
commit ecf7ad43f6
7 changed files with 45 additions and 70 deletions

View File

@ -1,3 +1,10 @@
2006-10-04 Werner Koch <wk@g10code.com>
Released 1.9.91.
* configure.ac: Require libassuan 0.9.1 which fixes a problem with
gpgsm.
2006-09-27 Werner Koch <wk@g10code.com> 2006-09-27 Werner Koch <wk@g10code.com>
* gl/strsep.h, gl/strsep.c, gl/m4/strsep.m4: Removed. * gl/strsep.h, gl/strsep.c, gl/m4/strsep.m4: Removed.

7
NEWS
View File

@ -1,9 +1,14 @@
Noteworthy changes in version 1.9.91 Noteworthy changes in version 1.9.91 (2006-10-04)
------------------------------------------------- -------------------------------------------------
* New "relax" flag for trustlist.txt to allow root CA certificates * New "relax" flag for trustlist.txt to allow root CA certificates
without BasicContraints. without BasicContraints.
* [gpg2] Removed the -k PGP 2 compatibility hack. -k is now an
alias for --list-keys.
* [gpg2] Print a warning if "-sat" is used instead of "--clearsign".
Noteworthy changes in version 1.9.90 (2006-09-25) Noteworthy changes in version 1.9.90 (2006-09-25)
------------------------------------------------- -------------------------------------------------

12
README
View File

@ -3,15 +3,15 @@
Version 1.9.x Version 1.9.x
GnuPG 1.9 is the future version of GnuPG; it is based on some gnupg-1.3 GnuPG 1.9 is the future version of GnuPG; it is based on the gnupg-1.4
code and the previous newpg package. It will eventually lead to a code and the previous newpg package. It will very soon lead to a
GnuPG 2.0 release. GnuPG 2.0 release.
You should use this GnuPG version if you want to use the gpg-agent or You should use this GnuPG version if you want to use the gpg-agent or
gpgsm (the S/MIME variant of gpg). Note that the gpg-agent is also gpgsm (the S/MIME variant of gpg). Note that the gpg-agent is also
helpful when using the standard gpg versions (1.4.x) the old 1.2.x). helpful when using the standard gpg version (1.4.x). There are no
There are no problems installing 1.4 and 1.9 alongside; in fact we problems installing 1.4 and 1.9 alongside; in fact we suggest to do
suggest to do this. this.
BUILD INSTRUCTIONS BUILD INSTRUCTIONS

View File

@ -27,7 +27,7 @@ min_automake_version="1.9.3"
# Set my_issvn to "yes" for non-released code. Remember to run an # Set my_issvn to "yes" for non-released code. Remember to run an
# "svn up" and "autogen.sh" right before creating a distribution. # "svn up" and "autogen.sh" right before creating a distribution.
m4_define([my_version], [1.9.91]) m4_define([my_version], [1.9.91])
m4_define([my_issvn], [yes]) m4_define([my_issvn], [no])
m4_define([svn_revision], m4_esyscmd([echo -n $((svn info 2>/dev/null \ m4_define([svn_revision], m4_esyscmd([echo -n $((svn info 2>/dev/null \
@ -44,7 +44,7 @@ NEED_GPG_ERROR_VERSION=1.4
NEED_LIBGCRYPT_API=1 NEED_LIBGCRYPT_API=1
NEED_LIBGCRYPT_VERSION=1.1.94 NEED_LIBGCRYPT_VERSION=1.1.94
NEED_LIBASSUAN_VERSION=0.9.0 NEED_LIBASSUAN_VERSION=0.9.1
NEED_KSBA_API=1 NEED_KSBA_API=1
NEED_KSBA_VERSION=1.0.0 NEED_KSBA_VERSION=1.0.0

View File

@ -270,7 +270,7 @@ List all keys from the public keyrings, or just the keys given on the
command line. command line.
@ifset gpgone @ifset gpgone
@option{-k} is slightly different from @option{--list-keys} in that it @option{-k} is slightly different from @option{--list-keys} in that it
allwos only for one argument and takes the second argument as the allows only for one argument and takes the second argument as the
keyring to search. This is for command line compatibility with PGP 2 keyring to search. This is for command line compatibility with PGP 2
and has been removed in @command{gpg2}. and has been removed in @command{gpg2}.
@end ifset @end ifset
@ -2271,10 +2271,11 @@ print the public key data.
@item --fast-list-mode @item --fast-list-mode
Changes the output of the list commands to work faster; this is achieved Changes the output of the list commands to work faster; this is achieved
by leaving some parts empty. Some applications don't need the user ID and by leaving some parts empty. Some applications don't need the user ID
the trust information given in the listings. By using this options they and the trust information given in the listings. By using this options
can get a faster listing. The exact behaviour of this option may change they can get a faster listing. The exact behaviour of this option may
in future versions. change in future versions. If you are missing some information, don't
use this option.
@item --no-literal @item --no-literal
This is not for normal use. Use the source to see for what it might be useful. This is not for normal use. Use the source to see for what it might be useful.

View File

@ -1,3 +1,9 @@
2006-10-04 Werner Koch <wk@g10code.com>
* gpg.c (main): Print a warning if -sat has been used.
(main): Removed the special treatment of the -k option. -k is now
an alias for --list-keys.
2006-10-02 Werner Koch <wk@g10code.com> 2006-10-02 Werner Koch <wk@g10code.com>
* encr-data.c (decrypt_data, mdc_decode_filter): Check the MDC * encr-data.c (decrypt_data, mdc_decode_filter): Check the MDC

View File

@ -78,7 +78,7 @@ enum cmd_and_opt_values
aDecrypt = 'd', aDecrypt = 'd',
aEncr = 'e', aEncr = 'e',
oInteractive = 'i', oInteractive = 'i',
oKOption = 'k', oListKeys = 'k',
oDryRun = 'n', oDryRun = 'n',
oOutput = 'o', oOutput = 'o',
oQuiet = 'q', oQuiet = 'q',
@ -115,13 +115,10 @@ enum cmd_and_opt_values
aDeleteKeys, aDeleteKeys,
aDeleteSecretKeys, aDeleteSecretKeys,
aDeleteSecretAndPublicKeys, aDeleteSecretAndPublicKeys,
aKMode,
aKModeC,
aImport, aImport,
aFastImport, aFastImport,
aVerify, aVerify,
aVerifyFiles, aVerifyFiles,
aListKeys,
aListSigs, aListSigs,
aSendKeys, aSendKeys,
aRecvKeys, aRecvKeys,
@ -562,7 +559,6 @@ static ARGPARSE_OPTS opts[] = {
{ aListTrustDB, "list-trustdb",0 , "@"}, { aListTrustDB, "list-trustdb",0 , "@"},
/* Not yet used */ /* Not yet used */
/* { aListTrustPath, "list-trust-path",0, "@"}, */ /* { aListTrustPath, "list-trust-path",0, "@"}, */
{ oKOption, NULL, 0, "@"},
{ oPasswd, "passphrase",2, "@" }, { oPasswd, "passphrase",2, "@" },
{ oPasswdFD, "passphrase-fd",1, "@" }, { oPasswdFD, "passphrase-fd",1, "@" },
{ oPasswdFile, "passphrase-file",2, "@" }, { oPasswdFile, "passphrase-file",2, "@" },
@ -1041,8 +1037,6 @@ set_cmd( enum cmd_and_opt_values *ret_cmd, enum cmd_and_opt_values new_cmd )
cmd = aEncrSym; cmd = aEncrSym;
else if( cmd == aEncr && new_cmd == aSym ) else if( cmd == aEncr && new_cmd == aSym )
cmd = aEncrSym; cmd = aEncrSym;
else if( cmd == aKMode && new_cmd == aSym )
cmd = aKModeC;
else if (cmd == aSignEncr && new_cmd == aSym) else if (cmd == aSignEncr && new_cmd == aSym)
cmd = aSignEncrSym; cmd = aSignEncrSym;
else if (cmd == aSignSym && new_cmd == aEncr) else if (cmd == aSignSym && new_cmd == aEncr)
@ -2089,7 +2083,6 @@ main (int argc, char **argv )
opt.list_options|=LIST_SHOW_UNUSABLE_UIDS; opt.list_options|=LIST_SHOW_UNUSABLE_UIDS;
opt.list_options|=LIST_SHOW_UNUSABLE_SUBKEYS; opt.list_options|=LIST_SHOW_UNUSABLE_SUBKEYS;
break; break;
case oKOption: set_cmd( &cmd, aKMode ); break;
case oBatch: opt.batch = 1; nogreeting = 1; break; case oBatch: opt.batch = 1; nogreeting = 1; break;
case oUseAgent: case oUseAgent:
@ -3155,38 +3148,29 @@ main (int argc, char **argv )
set_cmd( &cmd, aListKeys); set_cmd( &cmd, aListKeys);
} }
if( cmd == aKMode || cmd == aKModeC ) { /* kludge to be compatible to pgp */
if( cmd == aKModeC ) {
opt.fingerprint = 1;
cmd = aKMode;
}
opt.list_sigs = 0;
if( opt.verbose > 2 )
opt.check_sigs++;
if( opt.verbose > 1 )
opt.list_sigs++;
opt.verbose = opt.verbose > 1;
}
/* kludge to let -sat generate a clear text signature */ /* kludge to let -sat generate a clear text signature */
if( opt.textmode == 2 && !detached_sig && opt.armor && cmd == aSign ) if( opt.textmode == 2 && !detached_sig && opt.armor && cmd == aSign )
{
log_info ("compatibility note:\n");
log_info ("\"-sat\" won't generate clear signed messages in "
"future versions\n");
log_info ("Use \"--clearsign\" instead of \"-sat\"\n");
cmd = aClearsign; cmd = aClearsign;
}
if( opt.verbose > 1 ) if( opt.verbose > 1 )
set_packet_list_mode(1); set_packet_list_mode(1);
/* Add the keyrings, but not for some special commands and not in /* Add the keyrings, but not for some special commands. Also
case of "-kvv userid keyring". Also avoid adding the secret avoid adding the secret keyring for a couple of commands to
keyring for a couple of commands to avoid unneeded access in avoid unneeded access in case the secrings are stored on a
case the secrings are stored on a floppy. floppy.
We always need to add the keyrings if we are running under We always need to add the keyrings if we are running under
SELinux, this is so that the rings are added to the list of SELinux, this is so that the rings are added to the list of
secured files. */ secured files. */
if( ALWAYS_ADD_KEYRINGS if( ALWAYS_ADD_KEYRINGS
|| (cmd != aDeArmor && cmd != aEnArmor || (cmd != aDeArmor && cmd != aEnArmor) )
&& !(cmd == aKMode && argc == 2 )) )
{ {
if (ALWAYS_ADD_KEYRINGS if (ALWAYS_ADD_KEYRINGS
|| (cmd != aCheckKeys && cmd != aListSigs && cmd != aListKeys || (cmd != aCheckKeys && cmd != aListSigs && cmd != aListKeys
@ -3471,34 +3455,6 @@ main (int argc, char **argv )
free_strlist(sl); free_strlist(sl);
break; break;
case aKMode: /* list keyring -- NOTE: This will be removed soon */
if( argc < 2 ) { /* -kv [userid] */
sl = NULL;
if (argc && **argv)
add_to_strlist2( &sl, *argv, utf8_strings );
public_key_list( sl );
free_strlist(sl);
}
else if( argc == 2 ) { /* -kv userid keyring */
if( access( argv[1], R_OK ) ) {
log_error(_("can't open `%s': %s\n"),
print_fname_stdin(argv[1]), strerror(errno));
}
else {
/* add keyring (default keyrings are not registered in this
* special case */
keydb_add_resource( argv[1], 0, 0 );
sl = NULL;
if (**argv)
add_to_strlist2( &sl, *argv, utf8_strings );
public_key_list( sl );
free_strlist(sl);
}
}
else
wrong_args(_("-k[v][v][v][c] [user-id] [keyring]") );
break;
case aKeygen: /* generate a key */ case aKeygen: /* generate a key */
if( opt.batch ) { if( opt.batch ) {
if( argc > 1 ) if( argc > 1 )