From moritz at g10code.com Fri Apr 16 17:26:07 2004 From: moritz at g10code.com (Moritz Schulte) Date: Wed Feb 23 12:43:35 2005 Subject: [Announce] Libgcrypt-1.2.0 released Message-ID: We are pleased to announce the availability of Libgcrypt 1.2.0, which is the first stable release of this general purpose crypto library based on GnuPG code. Note, that Libgcrypt is neither a replacement for GnuPG nor does it contain a library version of GnuPG. It is only of interest for developers of crypto applications with a need for crypto building blocks available under the GNU Lesser General Public License. Complete source packages: ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.2.0.tar.gz (927k) ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.2.0.tar.gz.sig Patch against version 1.9.94: ftp://ftp.gnupg.org/gcrypt/alpha/libgcrypt/libgcrypt-1.1.94-1.2.0.diff.gz (246k) Mirrors are listed at http://www.gnupg.org/download/mirrors.html. MD5 sums are: 5c508072d8387ce17d1ab05075c2be40 libgcrypt-1.2.0.tar.gz a1657523beebf926ca7992cc6b9ea9b5 libgcrypt-1.1.94-1.2.0.diff.gz Except for one bug fix this release is basically equivalent to the last pre-release. Thanks to all who have worked on Libgcrypt (and thanks to those who have worked on other things as well). Happy hacking. -- Moritz Schulte g10 Code GmbH http://www.g10code.com -=- The GnuPG Experts -=- From dshaw at jabberwocky.com Sat May 22 15:45:40 2004 From: dshaw at jabberwocky.com (David Shaw) Date: Wed Feb 23 12:43:35 2005 Subject: [Announce] GnuPG 1.3.6 released (development) Message-ID: <20040522134540.GB13121@jabberwocky.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello! The latest release from the development branch of GnuPG is ready for public consumption. This is a branch to create what will eventually become GnuPG 1.4. It will change with greater frequency than the 1.2.x "stable" branch, which will mainly be updated for bug fix reasons. The more GnuPG-familiar user is encouraged try this release (and the ones that will follow in the 1.3.x branch), and report back any problems to gnupg-devel@gnupg.org. In return, you get the latest code with the latest features. This release brings development even closer to a good point for 1.4. If there is something that you do not like here, be it a missing feature, a UI choice, or, well, anything, now is the time to speak up. Once 1.3.x becomes the new stable, large changes will be unlikely. While we obviously cannot guarantee that every suggestion will be included, they will all be looked at. As always, note that while this code is stable enough for many uses, it is still the development branch. Mission-critical applications should use the 1.2.x stable branch. The files are available from: Gzipped: ftp://ftp.gnupg.org/gcrypt/alpha/gnupg/gnupg-1.3.6.tar.gz (1.9M) ftp://ftp.gnupg.org/gcrypt/alpha/gnupg/gnupg-1.3.6.tar.gz.sig Bzip2ed: ftp://ftp.gnupg.org/gcrypt/alpha/gnupg/gnupg-1.3.6.tar.bz2 (1.5M) ftp://ftp.gnupg.org/gcrypt/alpha/gnupg/gnupg-1.3.6.tar.bz2.sig or as a patch against the 1.3.5 source: ftp://ftp.gnupg.org/gcrypt/alpha/gnupg/gnupg-1.3.5-1.3.6.diff.gz (193k) MD5 checksums for the files are: 931f67b4c261349f613c531c00e8f068 gnupg-1.3.6.tar.gz 886764469a51845cb84cece3e8a6ccf1 gnupg-1.3.6.tar.gz.sig 36d1291322a277ec391fdc0950a56bb9 gnupg-1.3.6.tar.bz2 aa009ee54efec31ba1f4d304de3b3f06 gnupg-1.3.6.tar.bz2.sig a1fc4269789909ea17f2d6965ea7b4dd gnupg-1.3.5-1.3.6.diff.gz Noteworthy changes in version 1.3.6 (2004-05-22) - ------------------------------------------------ * New --keyid-format option that selects short (99242560), long (DB698D7199242560), 0xshort (0x99242560), or 0xlong (0xDB698D7199242560) keyid displays. This lets users tune the display to what they prefer. * The --list-options and --verify-options option "show-long-keyids" has been removed since --keyid-format obviates the need for them. * Support for the old quasi-1991 partial length encoding has been removed. * The --export-all and --export-options include-non-rfc options have been removed as superfluous since nonstandard V3 Elgamal sign+encrypt keys have been removed. * Preferred keyserver support has been added. Users may set a preferred keyserver via the --edit-key command "keyserver". If the --keyserver-option honor-keyserver-url is set (and it is by default), then the preferred keyserver is used when refreshing that key. * The --sig-keyserver-url option can be used to inform signature recipients where the signing key can be downloaded. When verifying the signature, if the signing key is not present, and the keyserver options honor-keyserver-url and auto-key-retrieve are set, this URL will be used to retrieve the key. * Support for fetching keys via HTTP has been added. This is mainly useful for setting a preferred keyserver URL like "http://www.jabberwocky.com/key.asc". * New --ask-cert-level/--no-ask-cert-level option to turn on and off the prompt for signature level when signing a key. Defaults to off. * New --gpgconf-list command for internal use by the gpgconf utility from gnupg 1.9.x. Enjoy! The GnuPG team (David, Stefan, Timo and Werner) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.3.6 (GNU/Linux) iGoEARECACoFAkCvWYQjGGh0dHA6Ly93d3cuamFiYmVyd29ja3kuY29tL2tleS5h c2MACgkQ4mZch0nhy8l+8wCdEpS1pqiCGf14bMRFjY5Wb6yDUyIAn39y539e0IN+ lOxuEOXLcTfhXfIu =HQBy -----END PGP SIGNATURE----- From wk at gnupg.org Wed Jun 16 16:43:38 2004 From: wk at gnupg.org (Werner Koch) Date: Wed Feb 23 12:43:35 2005 Subject: [Announce] GnuPG 1.2.5 second release candidate Message-ID: <877ju7tvfp.fsf@vigenere.g10code.de> Hi! We are pleased to announce the availability of the second release candidate for GnuPG 1.2.5: ftp://ftp.gnupg.org/gcrypt/alpha/gnupg/gnupg-1.2.5rc2.tar.gz (3496k) ftp://ftp.gnupg.org/gcrypt/alpha/gnupg/gnupg-1.2.5rc2.tar.gz.sig or as a patch against the first RC ftp://ftp.gnupg.org/gcrypt/alpha/gnupg/gnupg-1.2.5rc1-1.2.5rc2.diff.gz (439k) Mirrors are listed at http://www.gnupg.org/download/mirrors.html MD5 sums are: f915790e3e2d13256cc49e3f08b77e1b gnupg-1.2.5rc2.tar.gz 9f15c912f40c14daf4fa3d612eece938 gnupg-1.2.5rc1-1.2.5rc2.diff.gz As this is the stable branch, this release contains mostly bug and portability fixes. Please test this release and report any problems. Noteworthy changes since 1.2.4: * New --ask-cert-level/--no-ask-cert-level option to turn on and off the prompt for signature level when signing a key. Defaults to off. * New --min-cert-level option to disregard key signatures that are under a specified level. Defaults to 1 (i.e. don't disregard anything). * New --max-output option to limit the amount of plaintext output generated by GnuPG. This option can be used by programs which call GnuPG to process messages that may result in plaintext larger than the calling program is prepared to handle. This is sometimes called a "Decompression Bomb". * New --list-config command for frontends and other programs that call GnuPG. See doc/DETAILS for the specifics of this. * New --gpgconf-list command for internal use by the gpgconf utility from gnupg 1.9.x. * Some performance improvements with large keyrings. See --enable-key-cache=SIZE in the README file for details. * Some portability fixes for the OpenBSD/i386, HPPA, and AIX platforms. * Simplified Chinese translation. Since RC1 we fixed a couple more portability issues as well as some other glitches. If we don't get serious complaints on this release, 1.2.5 will be released soon. Happy hacking, The GnuPG Team