Commit graph

2010 commits

Author SHA1 Message Date
jlam
848d6eb2a3 bl3ify 2004-01-05 22:16:24 +00:00
markd
6139b28041 Fix build if SASL_USE_GSSAPI=YES
From PR pkg/23634 by Louis Guillaume.
also noted in PR pkg/23339.
Fix configure to not try and _statically_ link in gssapi support as it doesn't
work (unresolved symbols when used).  This deals with the second part of
PR pkg/23339.
2004-01-05 12:10:29 +00:00
jlam
6ff48e076b bl3ify 2004-01-05 11:53:39 +00:00
jlam
22645a942c bl3ify 2004-01-05 11:28:07 +00:00
jlam
d279e6f535 Use S/+$// instead of C/\+$// to save a backslash. Very highly
recommended by seb :)
2004-01-05 11:05:44 +00:00
jlam
c9ff27d270 Sow BUILDLINK_USE_BUILTIN.<pkg> and reap _NEED_<PKG> variables. 2004-01-05 09:31:31 +00:00
jlam
47bb2aae5f Re-arrange to match example buildlink3.mk file in bsd.buildlink3.mk. 2004-01-04 23:34:04 +00:00
jlam
339cd13cb2 Initial sprinkling of work-in-progress buildlink3.mk files for using the
buildlink3 framework.
2004-01-03 23:06:43 +00:00
reed
6d9af8d68d Bump package revisions for tiff update.
Tiff is backward compatible, but was broken on amd64 platform
so this makes sure new tiff is used.
2004-01-03 18:49:33 +00:00
ben
97fabad2ff Add p5-libwww dependency for check-updates.pl 2004-01-03 05:05:15 +00:00
ben
3054737f99 Add license information for fp-netbsd-ws, and note new package in Makefile
and CHANGES.
2004-01-02 18:45:44 +00:00
ben
ab9eb84b8a Import fp-netbsd-ws-4.3.1, the f-prot antivirus for home users.
For home users using the BSD open-source operating system, we offer F-Prot
Antivirus for BSD Workstations.  F-Prot Antivirus for BSD Workstations
utilizes the renowned F-Prot Antivirus scanning engine for primary scan but
has in addition to that a system of internal heuristics devised to search
for unknown viruses

F-Prot Antivirus for BSD was especially developed to effectively eradicate
viruses threatening workstations running FreeBSD, NetBSD, or OpenBSD.  It
provides full protection against macro viruses and other forms of malicious
software - including Trojans.
2004-01-02 18:43:00 +00:00
grant
3232ee482f formatting tweak. 2004-01-02 00:07:58 +00:00
grant
dc0dfa83b3 correct path for ftp.tuwien.ac.at, and consistently use the 'ftp'
hostname.
2004-01-01 23:58:34 +00:00
agc
7ae16542a6 Update audit-packages to 1.28.
By popular demand, add a -v switch to audit-packages(8) which enables the
check for a package vulnerabilities file being unchanged for over 7 days.
To enable the check, -v must be specified on the command line:

	% audit-packages
	% audit-packages -v
	*** WARNING - /usr/distfiles/pkg-vulnerabilities more than a week old, continuing...
	%
2004-01-01 23:35:28 +00:00
kristerw
35c8abbdb4 Sort. 2003-12-31 00:39:50 +00:00
cjep
15d9504c29 Whitespace fixes 2003-12-30 23:14:17 +00:00
cjep
0a88f2ddc6 Whitespace fix 2003-12-30 22:55:04 +00:00
bad
88eb08ea76 Get rid of -DNO_RSA in CFLAGS. This causes newer openssl headers to
not include <openssl/rsa.h> from <openssl/x509.h>.  Fixes PR pkg/23901.

While here, apply the patches to properly buildlinkify it for openssl,
which I forgot to pass to agc@ for the last update.
2003-12-30 15:57:53 +00:00
jmmv
a51d1c36df Bump PKGREVISION due to gnome-vfs2 update (fam removed as dependancy).
( We really need non-recursive dependancies... *sigh* )
2003-12-28 23:37:05 +00:00
heinz
80abdc0e10 Enable p5-Digest-Hashcash 2003-12-28 01:11:45 +00:00
heinz
02b1d30ca3 Initial import of the Digest::Hashcash Perl module.
The Digest::Hashcash Perl module calculates n-bit partial hash
collisions on chosen texts.
The idea of using partial hashes is that they can be made arbitrarily
expensive to compute (by choosing the desired number of bits of
collision), and yet can be verified instantly. This can be used as the
basis for an e-cash system measured in burnt CPU cycles. Such cash
systems can be used to throttle systematic abuses of un-metered internet
resources.
2003-12-28 01:07:58 +00:00
wiz
fae189b50e Update to 1.2.4:
* Added read-only support for BZIP2 compression.  This should be
      considered experimental, and is only available if the libbzip2
      library <http://sources.redhat.com/bzip2/> is installed.

    * Added the ability to handle messages that can be decrypted with
      either a passphrase or a secret key.

    * Most support for Elgamal sign+encrypt keys has been removed.
      Old signatures may still be verified, and existing encrypted
      messages may still be decrypted, but no new signatures may be
      issued by, and no new messages will be encrypted to, these keys.
      Elgamal sign+encrypt keys are not part of the web of trust.  The
      only new message that can be generated by an Elgamal
      sign+encrypt key is a key revocation.  Note that in a future
      version of GnuPG (currently planned for 1.4), all support for
      Elgamal sign+encrypt keys will be removed, so take this
      opportunity to revoke old keys now.

    * A Russian translation is included again as well as a new
      Belarusian translation.
2003-12-25 14:05:02 +00:00
jmmv
c648dc89c6 Update to 1.0.3:
- Corrected bug in gnutls_bye() which made it return an error code
  of INVALID_REQUEST instead of success.
- Corrected a bug in the GNUTLS_KEY key usage definitions.
2003-12-22 23:08:03 +00:00
jmmv
270644a29f Fix typo. From Min Sik Kim in PR pkg/23827. 2003-12-21 17:24:50 +00:00
xtraeme
ba58b3a6c9 Update to 1.0.2, this also closes PR pkg/23766.
Changes:

	o Corrected a bug in the RSA key generation. This was
	  generating unusable RSA keys.
2003-12-21 10:17:30 +00:00
xtraeme
e4737eba0b This needs gettext-lib's buildlink, reported by Soren Jacobsen PR
pkg/23765. Bump PKGREVISION.
2003-12-21 10:03:42 +00:00
xtraeme
ab17fd92e1 This needs libiconv's buildlink, reported by David Griffith PR pkg/23811.
Bump PKGREVISION.
2003-12-21 09:57:14 +00:00
agc
26dd2c51c8 Avoid some dodgy string pasting - makes this compile with gcc3. 2003-12-19 12:34:30 +00:00
sketch
c9989faa7d Bump PKGREVISION for packages which install files into RUBY_ARCHLIBDIR,
which has changed for Solaris installs.
2003-12-19 12:04:20 +00:00
wiz
4460d163f6 Sort. 2003-12-18 09:47:10 +00:00
xtraeme
3ea02de63c Update to 1.0.1 from Min Sik Kim PR pkg/23754.
Changes since 1.0.0:

- Some minor fixes in the makefiles. They now include CFLAGS
  from libgcrypt or opencdk if installed in a non standard directory.
- Fixed the SRP detection test in gnutls-cli-debug.
- Added gnutls_rsa_params_export_pkcs1() and
  gnutls_rsa_params_import_pkcs1().
2003-12-18 06:04:10 +00:00
heinz
d8f3d3b65d Depend on p5-MIME-Base64 (patch sent to upstream provider) and PKGREVISION++ 2003-12-16 22:32:47 +00:00
martti
5348834ce1 Expand ROOT_USER 2003-12-15 14:10:49 +00:00
wiz
18cf4c55a9 Add and enable gpgme03. 2003-12-14 17:57:58 +00:00
wiz
91af1f6bf9 Mention that this is the 0.3 branch. 2003-12-14 17:57:36 +00:00
wiz
26be669fe0 Depend on gpgme03 package. Bump PKGREVISION. 2003-12-14 17:56:39 +00:00
wiz
430be6e390 Fix DEPENDS and PATH so that only the 0.3.x version
is accepted.
2003-12-14 17:55:23 +00:00
wiz
978951a718 Re-import the previous gpgme version for packages that still use the
older interface.

Does not coexist with newer version, so the PKGNAMEs are intended to
be the same.
2003-12-14 17:51:04 +00:00
wiz
b6e73eb413 Update to 0.7.0:
Noteworthy changes in version 0.7.0 (2003-10-22)
------------------------------------------------

 * Long file operations no longer block GPA, so several operations can be
 run at the same time. This also means GPA does not freeze while an operation
 runs, leading to a more responsive interface.

 * The keyring editor now displays all the subkeys of the currently selected
 key. This is only visible if GPA is in advanced mode (available from the
 preferences dialog).

 * The capabilities of a key (certify, sign, encrypt) are now visible from
 the keyring editor.

 * The keyring editor can now sort keys by any column. By default, they are
 listed in the order they were imported into the keyring (i.e. the same order
 as "gpg --list-keys").

 * The key list is now displayed while it is being filled, allowing for
 faster startup times.

 * A warning dialog is now displayed when an operation slows down due to
 gpg rebuilding the trust database.

 * Imports and exports from files and servers have been separated into
 different dialogs and menu options.

 * Invoking GPA with file names as arguments will open those files in the
 file manager.

 * Cosmetical and minor fixes to the file manager window.

 * GPA now remembers the brief/detailed setting view and restores it
 when GPA is started.

 * Removed all deprecated widgets. GPA is now pure GTK+ 2.2.

 * Fixed a hang on startup on PowerPC machines.

Noteworthy changes in version 0.6.1 (2003-01-29)
------------------------------------------------

 * Added a popup menu to the keyring view, with all the common operations.

 * Keys' expiration dates can be choosen by clicking on a calendar.

 * The key generation dialogs have been revamped to use GTK+2 stock widgets.

 * The passphrase for a key can be changed from the edit key dialog.

 * Revoked user names are properly treated. They are not displayed, save in
 the details notebook, and then they are clearly marked as revoked.

 * GPA now uses the standard GTK+ file selection dialog.

 * Added Swedish translation.

 * Many other bugfixes, including several portability issues.

Noteworthy changes in version 0.6.0 (2002-12-24)
------------------------------------------------

 * GPA now supports GnuPG 1.2 or later, thanks to it's use of GPGME.

 * All the user preferences are set from a single dialog, and automatically
 saved in gpa.conf, including the default keyserver and the use of
 advanced/simple UI mode.

 * The `--advanced-ui' command line options has been removed, as it is
 available within the program itself.

 * The new `-f' and `-k' options can be used to launch the keyring editor,
 the file manager, or both on startup.

 * All the user ID's in a key are now displayed in the `Details' section, and
 in most dialogs.

 * Key signatures are now displayed individually for each User ID, or in a
 global listing for the key.

 * The usual `Copy' and `Paste' commands can be used to import and export keys
 from the clipboard.

 * The `Edit key' option is now only available for private keys. Setting the
 ownertrust of a key is now an independent operation.

 * After every import operation, the user is informed of how many keys have
 been imported.

 * Errors or keyserver operations are now reported to the user.

 * The `Verify file' dialog has been completely revamped to allow
 verification of several files at the same time.

 * Added Japanese, Brazilian Portuguese, Dutch and Spanish translations.

 * The user interface has been updated to use GTK+ 2.0 and stock items.

Noteworthy changes in version 0.5.0 (2002-02-25)
------------------------------------------------

 * The file selection dialog has been significantly changed from the
   standard GTK+ file selection dialog to look more like what users
   of MS-Windows are accustomed to.

 * "Show Details" in the menu of the file manager is now named
   "Verify Signatures", and it is now accessible through an icon in
   the tool bar, too.

 * Keyserver access via a direct HTTP request now allows for
   searching for keys on keyservers.

 * GPAPA's output is now gettext()ified.

 * The standard key is now remembered in `gpa.conf'.

 * The "Sign File" dialog has been simplified.

 * The creation of a backup copy of your public and private keys
   works now. It is remembered in `gpa.conf'. If a backup does not
   yet exist, the user is asked at startup to create one.

 * GPA now has a nice icon in the upper left corner of its window. :-)

 * Many bugfixes (for instance: crashes when signing files and keys,
   handling of spaces in file names, etc.).

 * Makefiles do contain `-mwindows' now to suppress the console
   window.

 * The "Help" menus is now called "Info". The license is displayed
   in the (unofficial) German translation now. (This should be
   improved to honor "locale" settings.)

 * GPA is now ready to compile with GTK+ version 2 once it is
   released.

 * In the key manager, there are now menu entries for key operations.

 * A secret key without a matching public key is now warned about.

 * Keys now can be imported from and exported to the MS Windows
   clipboard.

 * Secret keys can be imported now.

 * When a key is generated, a passphrase which is too stupid is
   warned about.

 * There now is an icon in the tool bar to switch from the keyring
   manager to the file manager.

 * GPA can now be compiled using a standard GNU toolchain.
   In particular it can be cross-compiled from GNU/Linux to
   mingw32/MS-Windows (which is what we did for the GnuPP CD),
   or compiled natively under MS-Windows using CygWin.
2003-12-14 15:12:11 +00:00
wiz
2387ecca31 Update to 0.4.3 (for gpa-0.7.0):
Noteworthy changes in version 0.4.3 (2003-10-06)
------------------------------------------------

 * libgpgme should not be used for threaded programs anymore.  This
   never worked reliably in all cases, because you had to
   be careful about the linking order and libtool wouldn't do that for
   you automatically.  Instead, now you have to link against
   libgpgme-pthread for applications using pthread and libgpgme-pth for
   applications using GNU Pth.

   The old code for automagically detecting the thread library is
   still part of libgpgme, but it is DEPRECATED.

 * There are new automake macros AM_PATH_GPGME_PTH and
   AM_PATH_GPGME_PTHREAD, which support checking for thread-enabled
   versions of GPGME.  They define GPGME_PTH_CFLAGS, GPGME_PTH_LIBS,
   GPGME_PTHREAD_CFLAGS and GPGME_PTHREAD_LIBS respectively.  These
   variables of course also include the configuration for the thread
   package itself.  Alternatively, use libtool.

 * gpgme_strerror_r as a thread safe variant of gpgme_strerror was
   added.

 * gpgme-config doesn't support setting the prefix or exec prefix
   anymore.  I don't think it ever worked correctly, and it seems to
   be pointless.

 * gpgme_get_key fails with GPG_ERR_AMBIGUOUS_NAME if the key ID
   provided was not unique, instead returning the first matching key.

 * gpgme_key_t and gpgme_subkey_t have a new field, can_authenticate,
   that indicates if the key can be used for authentication.

 * gpgme_signature_t's status field is now correctly set to an error
   with error code GPG_ERR_NO_PUBKEY if public key is not found.

 * gpgme_new_signature_t's class field is now an unsigned int, rather
   than an unsigned long (the old class field is preserved for
   backwards compatibility).

 * A new function gpgme_set_locale() is provided to allow configuring
   the locale for the crypto backend.  This is necessary for text
   terminals so that programs like the pinentry can be started with
   the right locale settings for the terminal the application is running
   on, in case the terminal has different settings than the system
   default (for example, if it is a remote terminal).  You are highly
   recommended to call the following functions directly after
   gpgme_check_version:

   #include <locale.h>

   setlocale (LC_ALL, "");
   gpgme_set_locale (NULL, LC_CTYPE, setlocale (LC_CTYPE, NULL));
   gpgme_set_locale (NULL, LC_MESSAGES, setlocale (LC_MESSAGES, NULL));

   GPGME can not do this for you, as setlocale is not thread safe, and
   there is no alternative.

 * The signal action for SIGPIPE is now set to SIG_IGN by
   gpgme_check_version, instead the first time a crypto engine is
   started (which is not well defined).

 * In the output of gpgme_hash_algo_name, change RMD160 to RIPEMD160,
   TIGER to TIGER192, CRC32-RFC1510 to CRC32RFC1510, and CRC24-RFC2440
   to CRC24RFC2440.  For now, these strings can be used as the MIC
   parameter for PGP/MIME (if appropriately modified).


Noteworthy changes in version 0.4.2 (2003-07-30)
------------------------------------------------

 * Allow gpg-error to be in non-standard place when linking the test suite.

 * Configure will fail now if gpg-error can not be found.

 * Fixed initialized memory backed data objects for writing, which
   caused the test program to crash (but only on Mac OS, surprisingly).

 * Eliminate use of C99 constructs.

 * Small improvements to the manual.


Noteworthy changes in version 0.4.1 (2003-06-06)
------------------------------------------------

 This is the release that 0.4.0 should have been.  There are many
 interface changes, please see below for the details.  The changes are
 sometimes the result of new functionality, but more often express a
 paradigm shift.  Others are an overdue cleanup to get GPGME in line
 with the GNU coding standards and to make the interface more
 self-consistent.  Here is an overview on the changes:

 All types have been renamed to conform to the GNU coding standards,
 most of the time by keeping the whole name in lowercase and inserting
 underscores between words.

 All operations consistently only accept input parameters in their
 invocation function, and return only an error code directly.  Further
 information about the result of the operation has to be retrieved
 afterwards by calling one of the result functions.  This unifies the
 synchronous and the asynchronous interface.

 The error values have been completely replaced by a more
 sophisticated model that allows GPGME to transparently and accurately
 report all errors from the other GnuPG components, irregardless of
 process boundaries.  This is achieved by using the library
 libgpg-errors, which is shared by all GnuPG components.  This library
 is now required for GPGME.

 The results of all operations are now provided by pointers to C
 structs rather than by XML structs or in other ways.

 Objects which used to be opaque (for example a key) are now pointers
 to accessible structs, so no accessor functions are necessary.

 Backward compatibility is provided where it was possible without too
 much effort and did not collide with the overall sanitization effort.
 However, this is only for ease of transition.  NO DEPRECATED FUNCTION
 OR DATA TYPE IS CONSIDERED A PART OF THE API OR ABI AND WILL BE
 DROPPED IN THE FUTURE WITHOUT CHANGING THE SONAME OF THE LIBRARY.
 Recommendations how to replace deprecated or removed functionality
 can be found within the description of each change.

 What follows are all changes to the interface and behaviour of GPGME
 in detail.

 * If gpgme.h is included in sources compiled by GCC 3.1 or later,
   deprecated attributes will warn about use of obsolete functions and
   type definitions.  You can suppress these warnings by passing
   -Wno-deprecated-declarations to the gcc command.

 * The following types have been renamed.  The old types are still
   available as aliases, but they are deprecated now:
	[complete list in NEWS file]

 * gpgme_error_t is now identical to gpg_error_t, the error type
   provided by libgpg-error.  More about using libgpg-error with GPGME
   can be found in the manual.  All error symbols have been removed!

 * All functions and types in libgpg-error have been wrapped in GPGME.
   The new types are gpgme_err_code_t and gpgme_err_source_t.  The new
   functions are gpgme_err_code, gpgme_err_source, gpgme_error,
   gpgme_err_make, gpgme_error_from_errno, gpgme_err_make_from_errno,
   gpgme_err_code_from_errno, gpgme_err_code_to_errno,
   gpgme_strsource.

 * GPGME_ATTR_IS_SECRET is not anymore representable as a string.

 * GnuPG 1.2.2 is required.  The progress callback is now also invoked
   for encrypt, sign, encrypt-sign, decrypt, verify, and
   decrypt-verify operations.  For verify operations on detached
   signatures, the progress callback is invoked for both the detached
   signature and the plaintext message, though.

 * gpgme_passphrase_cb_t has been changed to not provide a complete
   description, but the UID hint, passphrase info and a flag
   indicating if this is a repeated attempt individually, so the user
   can compose his own description from this information.

   The passphrase is not returned as a C string, but must be written
   to a file descriptor directly.  This allows for secure passphrase
   entries.

   The return type has been changed to gpgme_error_t value.  This
   allowed to remove the gpgme_cancel function; just return
   the error code GPG_ERR_CANCELED in the passphrase callback directly.

 * gpgme_edit_cb_t has been changed to take a file descriptor argument.
   The user is expected to write the response to the file descriptor,
   followed by a newline.

 * The recipients interface has been removed.  Instead, you use
   NULL-terminated lists of keys for specifying the recipients of an
   encryption operation.  Use the new encryption flag
   GPGME_ENCRYPT_ALWAYS_TRUST if you want to override the validity of
   the keys (but note that in general this is not a good idea).

   This change has been made to the prototypes of gpgme_op_encrypt,
   gpgme_op_encrypt_start, gpgme_op_encrypt_sign and
   gpgme_op_encrypt_sign_start.

   The export interface has been changed to use pattern strings like
   the keylist interface.  Thus, new functions gpgme_op_export_ext and
   gpgme_op_export_ext_start have been added as well.  Now the
   prototypes of gpgme_op_export_start and gpgme_op_export finally
   make sense.

 * gpgme_op_verify and gpgme_op_decrypt_verify don't return a status
   summary anymore.  Use gpgme_get_sig_status to retrieve the individual
   stati.

 * gpgme_io_cb_t changed from a void function to a function returning
   a gpgme_error_t value.  However, it will always return 0, so you
   can safely ignore the return value.

 * A new I/O callback event GPGME_EVENT_START has been added.  The new
   requirement is that you must wait until this event until you are
   allowed to call the I/O callback handlers previously registered for
   this context operation.  Calling I/O callback functions for this
   context operation before the start event happened is unsafe because
   it can lead to race conditions in a multi-threaded environment.

 * The idle function feature has been removed.  It was not precisely
   defined in a multi-threaded environment and is obsoleted by the
   user I/O callback functions.  If you still need a simple way to
   call something while waiting on one or multiple asynchronous
   operations to complete, don't set the HANG flag in gpgme_wait (note
   that this will return to your program more often than the idle
   function did).

 * gpgme_wait can return NULL even if hang is true, if an error
   occurs.  In that case *status contains the error code.

 * gpgme_get_engine_info was radically changed.  Instead an XML
   string, an info structure of the new type gpgme_engine_info_t is
   returned.  This makes it easier and more robust to evaluate the
   information in an application.

 * The new function gpgme_get_protocol_name can be used to convert a
   gpgme_protocol_t value into a string.

 * The status of a context operation is not checked anymore.  Starting
   a new operation will silently cancel the previous one.  Calling a
   function that requires you to have started an operation before without
   doing so is undefined.

 * The FPR argument to gpgme_op_genkey was removed.  Instead, use the
   gpgme_op_genkey_result function to retrieve a gpgme_genkey_result_t
   pointer to a structure which contains the fingerprint.  This also
   works with gpgme_op_genkey_start.  The structure also provides
   other information about the generated keys.

 * The new gpgme_op_import_result function provides detailed
   information about the result of an import operation in
   gpgme_import_result_t and gpgme_import_status_t objects.
   Thus, the gpgme_op_import_ext variant is deprecated.

 * The new gpgme_op_sign_result function provides detailed information
   about the result of a signing operation in gpgme_sign_result_t,
   gpgme_invalid_key_t and gpgme_new_signature_t objects.

 * The new gpgme_op_encrypt_result function provides detailed
   information about the result of an encryption operation in
   a GpgmeEncryptResult object.

 * The new gpgme_op_decrypt_result function provides detailed
   information about the result of a decryption operation in
   a GpgmeDecryptResult object.

 * The new gpgme_op_verify_result function provides detailed
   information about the result of an verify operation in
   a GpgmeVerifyResult object.  Because of this, the GPGME_SIG_STAT_*
   values, gpgme_get_sig_status, gpgme_get_sig_ulong_attr,
   gpgme_get_sig_string_attr and gpgme_get_sig_key are now deprecated,
   and gpgme_get_notation is removed.

 * GpgmeTrustItem objects have now directly accessible data, so the
   gpgme_trust_item_get_string_attr and gpgme_trust_item_get_ulong_attr
   accessor functions are deprecated.  Also, reference counting is
   available through gpgme_trust_item_ref and gpgme_trust_item_unref
   (the gpgme_trust_item_release alias for the latter is deprecated).

 * Keys are not cached internally anymore, so the force_update argument
   to gpgme_get_key has been removed.

 * GpgmeKey objects have now directly accessible data so the
   gpgme_key_get_string_attr, gpgme_key_get_ulong_attr,
   gpgme_key_sig_get_string_attr and gpgme_key_sig_get_ulong_attr
   functions are deprecated.  Also, gpgme_key_release is now
   deprecated.  The gpgme_key_get_as_xml function has been dropped.

 * Because all interfaces using attributes are deprecated, the
   GpgmeAttr data type is also deprecated.

 * The new gpgme_op_keylist_result function provides detailed
   information about the result of a key listing operation in
   a GpgmeKeyListResult object.

 * Now that each function comes with its own result retrieval
   interface, the generic gpgme_get_op_info interface is not useful
   anymore and dropped.

 * The type and mode of data objects is not available anymore.

Noteworthy changes in version 0.4.0 (2002-12-23)
------------------------------------------------

 * Key generation returns the fingerprint of the generated key.

 * New convenience function gpgme_get_key.

 * Supports signatures of user IDs in keys via the new
   GPGME_KEYLIST_MODE_SIGS keylist mode and the
   gpgme_key_sig_get_string_attr and gpgme_key_sig_get_ulong_attr
   interfaces.  The XML info about a key also includes the signatures
   if available.

 * New data object interface, which is more flexible and transparent.

Lots of interface changes, for details see the included
NEWS file.
2003-12-14 15:05:01 +00:00
wiz
4898c670fb Fix gpg-error-config script to return -Wl,-R part too.
Bump PKGREVISION to 1.
2003-12-14 14:57:40 +00:00
wiz
391b5798e6 Bump PKGREVISION for atk library major bump. 2003-12-13 00:45:21 +00:00
erh
f3612f2fde AIX doesn't have mandoc, just like SunOS. 2003-12-12 21:40:32 +00:00
agc
a0207fa135 Whitespace fix, cosmetic only 2003-12-12 15:08:21 +00:00
agc
2dd92849cd Update audit-packages to version 1.27.
Difference from previous version (1.26):
+ if the vulnerability list is older than a week, just display a warning
message - don't consider this a fatal error.
2003-12-11 17:10:21 +00:00
heinz
071ae47c08 Update to version 2.07
Take maintainership.
Add HOMEPAGE.

Changes since 2.06:

2003-12-05   Gisle Aas <gisle@ActiveState.com>

   Release 2.07

   Inherit add_bits() from Digest::base if available.
2003-12-10 22:12:32 +00:00
heinz
144763c8b7 Update to version 2.33
Take maintainershi.
Add HOMEPAGE.

Changes since 2.30:

2003-12-07   Gisle Aas <gisle@ActiveState.com>
   Release 2.33

   Enable explicit context passing for slight performance
   improvement in threaded perls.

   Tweaks to the Makefile.PL so that it is suitable both for
   core and CPAN use.

2003-12-05   Gisle Aas <gisle@ActiveState.com>
   Release 2.32

   Don't run u32align test program on HP-UX 10.20 as it
   will hang.  Patch by H.Merijn Brand <h.m.brand@hccnet.nl>.

   Fixed documentation typo.

2003-11-28   Gisle Aas <gisle@ActiveState.com>
   Release 2.31

   Inherit add_bits() from Digest::base if available.
2003-12-10 22:08:59 +00:00
heinz
663d59380b Update to version 2.03
Changes since 2.01:


   Release 2.03

   The only reason for this release it to clean up my CPAN directory.
   There is no change in this release besides the version number.

   Release 2.02

   Sync up with Digest-MD5-2.26

      - added clone method
      - $md2->addfile croak on read errors
      - safer patchlevel include
      - warn if functional interface used as methods
2003-12-10 22:00:28 +00:00
heinz
d69a3b5385 Add HOMEPAGE 2003-12-10 21:56:21 +00:00