0.4.2 is out
Werner Koch
wk at isil.d.shuttle.de
Sun Oct 18 18:37:06 CEST 1998
Hi,
GnuPG 0.4.2 is now out.
ftp://ftp.guug.de/pub/gcrypt/gnupg-0.4.2.tar.gz (750k)
ftp://ftp.guug.de/pub/gcrypt/diffs/gnupg-0.4.2.diff.gz (150k)
See doc/HACKING for instructions on how to use anon-CVS.
* This is only a snapshot: There are still a few bugs.
* Fixed this huge memory leak.
* Redesigned the trust database: You should run "gpgm --check-trustdb".
New command --update-trustdb, which adds new key from the public
keyring into your trustdb
* Fixed a bug in the armor code, leading to invalid packet errors.
(a workaround for this was to use --no-armor). The shorten line
length (64 instead of 72) fixes a problem with pgp5 and keyservers.
* comment packets are not anymore generated. "--export" filters
them out. One Exception: The comment packets in a secret keyring
are still used because they carry the factorization of the public
prime product.
* --import now only looks for KEYBLOCK headers, so you can now simply
remove the "- " in front of such a header if someone accdently signed
such a message or the keyblock is part of a cleartext signed message.
* --with-colons now lists the key expiration time and not anymore
the valid period.
* Some keyblocks created with old releases have a wrong sequence
of packets, so that the keyservers don't accept these keys.
Simply using "--edit-key" fixes the problem.
* New option --force-v3-sigs to generate signed messages which are
compatible to PGP 5.
* Add some code to support DLD (for non ELF systems) - but this is
not tested because my BSD box is currently broken.
* New command "expire" in the edit-key menu.
Have fun.
Werner
More information about the Gnupg-devel
mailing list