Commit graph

210 commits

Author SHA1 Message Date
drochner
a544d6f73f update to 1.4.2.1
this fixes a false positive signature verification if only the exit
code of "gpgv" or "gpg --verify" is used
2006-02-15 19:10:20 +00:00
joerg
5911def816 Recursive revision bump / recommended bump for gettext ABI change. 2006-02-05 23:08:03 +00:00
rillig
b71a1d488b Fixed pkglint warnings. The warnings are mostly quoting issues, for
example MAKE_ENV+=FOO=${BAR} is changed to MAKE_ENV+=FOO=${BAR:Q}. Some
other changes are outlined in

    http://mail-index.netbsd.org/tech-pkg/2005/12/02/0034.html
2005-12-05 20:49:47 +00:00
reed
3d6be73882 Remove the redundant INSTALLATION_DIRS. This already
does mkdir or mkinstalldirs for these needed directories.
2005-10-10 20:45:19 +00:00
wiz
d1c0bfc9ae Fix RCS Id. 2005-10-04 22:50:41 +00:00
wiz
00a12dbcb7 security/gnupg has a build problem on sparc when you use any -mcpu
optimization flag, as was already described in this thread:
http://mail-index.netbsd.org/port-sparc/2004/12/19/0001.html

Thus, remove any -mcpu on sparc.

From Geert Hendrickx in PR 31463.
2005-10-04 17:59:37 +00:00
wiz
3b8d4fd26e Update to 1.4.2.
Noteworthy changes in version 1.4.2 (2005-07-26)
------------------------------------------------

    * New command "verify" in the card-edit menu to display
      the Private-DO-3.  The Admin command has been enhanced to take
      the optional arguments "on", "off" and "verify".  The latter may
      be used to verify the Admin Pin without modifying data; this
      allows displaying the Private-DO-4 with the "list" command.

    * Rewrote large parts of the card code to optionally make use of a
      running gpg-agent.  If --use-agent is being used and a gpg-agent
      with enabled scdaemon is active, gpg will now divert all card
      operations to that daemon.  This is required because both,
      scdaemon and gpg require exclusive access to the card reader. By
      delegating the work to scdaemon, both can peacefully coexist and
      scdaemon is able to control the use of the reader.  Note that
      this requires at least gnupg 1.9.17.

    * Fixed a couple of problems with the card reader.

    * Command completion is now available in the --edit-key and
      --card-edit menus.  Filename completion is available at all
      filename prompts.  Note that completion is only available if the
      system provides a readline library.

    * New experimental HKP keyserver helper that uses the cURL
      library.  It is enabled via the configure option --with-libcurl
      like the other (also experimental) cURL helpers.

    * New key cleaning options that can be used to remove unusable
      (expired, revoked) signatures from a key.  This is available via
      the new "clean" command in --edit-key on a key by key basis, as
      well as via the import-clean-sigs/import-clean-uids and
      export-clean-sigs/export-clean-uids options for --import-options
      and --export-options.  These are currently off by default, and
      replace the import-unusable-sigs/export-unusable-sigs options
      from version 1.4.1.

    * New export option export-reset-subkey-passwd.

    * New option --limit-card-insert-tries.
2005-07-28 15:12:05 +00:00
jlam
bf9129c41e Drop distinction between PKGSRC_USE_TOOLS and USE_TOOLS by making
PKGSRC_USE_TOOLS go away.  There is now only a single USE_TOOLS variable
that specifies all of the tools we need to build/run the package.
2005-07-15 18:27:48 +00:00
jlam
585534220c Remove USE_GNU_TOOLS and replace with the correct USE_TOOLS definitions:
USE_GNU_TOOLS	-> USE_TOOLS
	awk		-> gawk
	m4		-> gm4
	make		-> gmake
	sed		-> gsed
	yacc		-> bison
2005-05-22 20:07:36 +00:00
jlam
ac6724aa7c gzcat is needed, so note it as such for the new tools framework. 2005-05-15 04:26:24 +00:00
tv
f816d81489 Remove USE_BUILDLINK3 and NO_BUILDLINK; these are no longer used. 2005-04-11 21:44:48 +00:00
wiz
215694b4d2 Update to 1.4.1:
Noteworthy changes in version 1.4.1 (2005-03-15)
------------------------------------------------

    * New --rfc2440-text option which controls how text is handled in
      signatures.  This is in response to some problems seen with
      certain PGP/MIME mail clients and GnuPG version 1.4.0.  More
      details about this are available at
      <http://lists.gnupg.org/pipermail/gnupg-users/2005-January/024408.html>.

    * New "import-unusable-sigs" and "export-unusable-sigs" tags for
      --import-options and --export-options.  These are off by
      default, and cause GnuPG to not import or export key signatures
      that are not usable (e.g. expired signatures).

    * New experimental HTTP, HTTPS, FTP, and FTPS keyserver helper
      that uses the cURL library <http://curl.haxx.se> to retrieve
      keys.  This is disabled by default, but may be enabled with the
      configure option --with-libcurl.  Without this option, the
      existing HTTP code is used for HTTP, and HTTPS, FTP, and FTPS
      are not supported.

      [enabled with the "curl" option for the package]

    * When running a --card-status or --card-edit and a public key is
      available, missing secret key stubs will be created on the fly.
      Details of the key are listed too.

    * The implicit packet dumping in double verbose mode is now sent
      to stderr and not to stdout.

    * Added countermeasures against the Mister/Zuccherato CFB attack
      <http://eprint.iacr.org/2005/033>.

    * Add new --edit-key command "bkuptocard" to allow restoring a
      card key from a backup.

    * The "fetch" command of --card-edit now retrieves the key using
      the default keyserver if no URL has been stored on the card.

    * New configure option --enable-noexecstack.

Also, gpgkeys_mailto is not installed any longer, dropping the
dependency on perl.
2005-03-22 17:50:55 +00:00
agc
d81d19f8e0 Add RMD160 digests. 2005-02-24 12:51:41 +00:00
markd
4200ac9b06 Disable gnupg's new iconv code on platforms that have problems with it
in the default locale (NetBSD < 2.0 and Solaris).
OK'ed by wiz.
Fixes PR pkg/28895.
2005-02-09 11:35:50 +00:00
wiz
37147d29df Add options.mk file. 2004-12-25 02:54:49 +00:00
wiz
e21f814082 Update to 1.4.0, provided by Stefan Krüger in PR 28738.
While here, convert to options.mk.


GnuPG 1.4 Highlights
====================

This is a brief overview of the changes between the GnuPG 1.2 series
and the new GnuPG 1.4 series.  To read the full list of highlights for
each revision that led up to 1.4, see the NEWS file in the GnuPG
distribution.  This document is based on the NEWS file, and is thus
the highlights of the highlights.

When upgrading, note that RFC-2440, the OpenPGP standard, is currently
being revised.  Most of the revisions in the latest draft (2440bis-12)
have already been incorporated into GnuPG 1.4.


Algorithm Changes
-----------------

OpenPGP supports many different algorithms for encryption, hashing,
and compression, and taking into account the OpenPGP revisions, GnuPG
1.4 supports a slightly different algorithm set than 1.2 did.

The SHA256, SHA384, and SHA512 hashes are now supported for read and
write.

The BZIP2 compression algorithm is now supported for read and write.

Due to the recent successful attack on the MD5 hash algorithm
(discussed in <http://www.rsasecurity.com/rsalabs/node.asp?id=2738>,
among other places), MD5 is deprecated for OpenPGP use.  It is still
allowed in GnuPG 1.4 for backwards compatibility, but a warning is
given when it is used.

The TIGER/192 hash is no longer available.  This should not be
interpreted as a statement as to the quality of TIGER/192 - rather,
the revised OpenPGP standard removes support for several unused or
mostly unused hashes, and TIGER/192 was one of them.

Similarly, Elgamal signatures and the Elgamal signing key type have
been removed from the OpenPGP standard, and thus from GnuPG.  Please
do not confuse Elgamal signatures with DSA or DSS signatures or with
Elgamal encryption.  Elgamal signatures were very rarely used and were
not supported in any product other than GnuPG.  Elgamal encryption was
and still is part of OpenPGP and GnuPG.

Very old (pre-1.0) versions of GnuPG supported a nonstandard (contrary
to OpenPGP) Elgamal key type.  While no recent version of GnuPG
permitted the generation of such keys, GnuPG 1.2 could still use them.
GnuPG 1.4 no longer allows the use of these keys or the (also
nonstandard) messages generated using them.

At build time, it is possible to select which algorithms will be built
into GnuPG.  This can be used to build a smaller program binary for
embedded uses where space is tight.


Keyserver Changes
-----------------

GnuPG 1.4 does all keyserver operations via plugin or helper
applications.  This allows the main GnuPG program to be smaller and
simpler.  People who package GnuPG for various reasons have the
flexibility to include or leave out support for any keyserver type as
desired.

Support for fetching keys via HTTP and finger has been added.  This is
mainly useful for setting a preferred keyserver URL like
"http://www.jabberwocky.com/key.asc". or "finger:wk at g10code.com".

The LDAP keyserver helper now supports storing, retrieving, and
searching for keys in both the old NAI "LDAP keyserver" as well as the
more recent method to store OpenPGP keys in standard LDAP servers.
This is compatible with the storage schema that PGP uses, so both
products can interoperate with the same LDAP server.

The LDAP keyserver helper is compatible with the PGP company's new
"Global Directory" service.

If the LDAP library you use supports LDAP-over-TLS and LDAPS, then
GnuPG detects this and supports them as well.  Note that using TLS or
LDAPS does not improve the security of GnuPG itself, but may be useful
in certain key distribution scenarios.

HTTP Basic authentication is now supported for all HKP and HTTP
keyserver functions, either through a proxy or via direct access.

The HKP keyserver plugin supports the new machine-readable key
listing format for those keyservers that provide it.

IPv6 is supported for HKP and HTTP keyserver access.

When using a HKP keyserver with multiple DNS records (such as
subkeys.pgp.net which has the addresses of multiple servers around the
world), all DNS address records are tried until one succeeds.  This
prevents a single down server in the rotation from stopping access.

DNS SRV records are used in HKP keyserver lookups to allow
administrators to load balance and select keyserver ports
automatically.

Timeout support has been added to the keyserver plugins.  This allows
users to set an upper limit on how long to wait for the keyserver
before giving up.


Preferred Keyserver URL
-----------------------

Preferred keyserver support has been added.  Users may set a preferred
keyserver via the --edit-key command "keyserver".  If the
--keyserver-option honor-keyserver-url is set (and it is by default),
then the preferred keyserver is used when refreshing that key with
--refresh-keys.

The --sig-keyserver-url option can be used to inform signature
recipients where the signing key can be downloaded.  When verifying
the signature, if the signing key is not present, and the keyserver
options honor-keyserver-url and auto-key-retrieve are set, this URL
will be used to retrieve the key.


Trust Signatures
----------------

GnuPG 1.4 supports OpenPGP trust signatures, which allow a user to
specify the trust level and distance from the user along with the
signature so users can delegate different levels of certification
ability to other users, possibly restricted by a regular expression on
the user ID.


Trust Models
------------

GnuPG 1.4 supports several ways of looking at trust:

Classic - The classic PGP trust model, where people sign each others
          keys and thus build up an assurance (called "validity") that
          the key belongs to the right person.  This was the default
          trust model in GnuPG 1.2.

Always - Bypass all trust checks, and make all keys fully valid.

Direct - Users may set key validity directly.

PGP - The PGP 7 and 8 behavior which combines Classic trust with trust
      signatures overlaid on top.  This is the default trust model in
      GnuPG 1.4.


The OpenPGP Smartcard
---------------------

GnuPG 1.4 supports the OpenPGP smartcard
(<http://www.g10code.de/p-card.html>)

Secret keys may be kept fully or partially on the smartcard.  The
smartcard may be used for primary keys or subkeys.


Other Interesting New Features
------------------------------

For those using Security-Enhanced Linux <http://www.nsa.gov/selinux/>,
the configure option --enable-selinux-support prevents GnuPG from
processing its own files (i.e. reading the secret keyring for
something other than getting a secret key from it).  This simplifies
writing ACLs for the SELinux kernel.

Readline support is now available at all prompts if the system
provides a readline library.

GnuPG can now create messages that can be decrypted with either a
passphrase or a secret key.  These messages may be generated with
--symmetric --encrypt or --symmetric --sign --encrypt.

--list-options and --verify-options allow the user to customize
exactly what key listings or signature verifications look like,
enabling or disabling things such as photo display, preferred
keyserver URL, calculated validity for each user ID, etc.

The --primary-keyring option designates the keyring that the user
wants new keys imported into.

The --hidden-recipient (or -R) command encrypts to a user, but hides
the identity of that user.  This is the same functionality as
--throw-keyid, but can be used on a per-user basis.

Full algorithm names (e.g. "3DES", "SHA1", "ZIP") can now be used
interchangeably with the short algorithm names (e.g. "S2", "H2", "Z1")
anywhere algorithm names are used in GnuPG.

The --keyid-format option selects short (99242560), long
(DB698D7199242560), 0xshort (0x99242560), or 0xlong
(0xDB698D7199242560) key ID displays.  This lets users tune the
display to what they prefer.

While it is not recommended for extended periods, it is possible to
run both GnuPG 1.2.x and GnuPG 1.4 during the transition.  To aid in
this, GnuPG 1.4 tries to load a config file suffixed with its version
before it loads the default config file.  For example, 1.4 will try
for gpg.conf-1.4 and gpg.conf-1 before falling back to the regular
gpg.conf file.
2004-12-25 02:54:13 +00:00
tv
b4d68d91eb The correct name of this program is "GNU Privacy Guard" (not "Privacy Guard"). 2004-11-08 21:17:01 +00:00
tv
c487cb967a Libtool fix for PR pkg/26633, and other issues. Update libtool to 1.5.10
in the process.  (More information on tech-pkg.)

Bump PKGREVISION and BUILDLINK_DEPENDS of all packages using libtool and
installing .la files.

Bump PKGREVISION (only) of all packages depending directly on the above
via a buildlink3 include.
2004-10-03 00:12:51 +00:00
lukem
9de8a5be02 add back idea.c.gz (from USE_IDEA=yes). (hi wiz!) 2004-08-26 13:39:05 +00:00
wiz
61bd72b91d Update to 1.2.6:
* Updated the included gettext.  This also fixes the installation
      problem from 1.2.5

    * Fixed a race condition possibly leading to deleted keys.
2004-08-26 13:19:32 +00:00
minskim
34ec2a4e09 Regen to make GNU patch happy. 2004-08-05 21:35:37 +00:00
schmonz
3e9966eaa5 Enable pkgviews installation. 2004-07-28 15:55:45 +00:00
wiz
3b4cf0f45f Update to 1.2.5:
* New --ask-cert-level/--no-ask-cert-level option to turn on and
      off the prompt for signature level when signing a key.  Defaults
      to on.

    * New --min-cert-level option to disregard key signatures that are
      under a specified level.  Defaults to 1 (i.e. don't disregard
      anything).

    * New --max-output option to limit the amount of plaintext output
      generated by GnuPG.  This option can be used by programs which
      call GnuPG to process messages that may result in plaintext
      larger than the calling program is prepared to handle.  This is
      sometimes called a "Decompression Bomb".

    * New --list-config command for frontends and other programs that
      call GnuPG.  See doc/DETAILS for the specifics of this.

    * New --gpgconf-list command for internal use by the gpgconf
      utility from gnupg 1.9.x.

    * Some performance improvements with large keyrings.  See
      --enable-key-cache=SIZE in the README file for details.

    * Some portability fixes for the OpenBSD/i386, HPPA, and AIX
      platforms.

    * Simplified Chinese translation.
2004-07-28 15:17:42 +00:00
cjep
341efbf789 whitespace nits 2004-05-07 15:25:13 +00:00
reed
06f8d025f8 Assume a mail transfer agent (/usr/sbin/sendmail) is installed.
This is to make sure that libexec/gnupg/gpgkeys_mailto is
installed. (Okay'd by wiz.)

This assumes that /usr/sbin/sendmail is sendmail.

PKGREVISION is not bumped because package couldn't be made
in first place if libexec/gnupg/gpgkeys_mailto was missing.
2004-04-09 00:36:06 +00:00
wiz
9a9a071e58 Convert to bl3. 2004-04-08 20:58:32 +00:00
tv
79dc517fe8 Apply the patch from PR pkg/21493. This is now submitted to gnupg.org as
bug gnupg/293, so grant has blessed it for inclusion in pkgsrc.

No more GNU sed build dependency, but the binaries do not change; thus
PKGREVISION untouched.
2004-03-30 15:13:12 +00:00
grant
e86f5610f7 compress USE_GNU_TOOLS onto one line. 2004-03-30 09:05:56 +00:00
seb
dc6d5ee831 Remove info files entries from PLIST. 2004-03-09 23:01:17 +00:00
wiz
5b42d2b843 Make build on m68kelf, and honour M68060 variable for quite a bit
of speedup on m68060 machines.
From S.P. Zeidler in PR 24579.
2004-03-01 19:12:25 +00:00
kleink
8213a84c9d Install doc/DETAILS, which conveniently documents --with-colon formatted
output, among other things.  Bump to 1.2.4nb1.

Approved by Thomas Klausner.
2004-02-08 01:00:13 +00:00
xtraeme
3ddd319e00 Respect whitespaces in SUBST_SED.fixme. 2004-02-02 23:47:15 +00:00
xtraeme
1d4270a631 Fix build in FreeBSD, the output was:
_mpih-mul1.s:2: Error: alignment not a power of 2
_mpih-mul1.s:20: Error: alignment not a power of 2

So, changing ALIGN (3) to ALIGN (4) fixes these problems.
Patch sent by pancake in private email, adapted to use subst.mk
framework by me.
2004-02-02 23:41:32 +00:00
grant
a07396feb8 replace deprecated USE_GMAKE with USE_GNU_TOOLS+=make. 2004-01-24 15:00:22 +00:00
wiz
fae189b50e Update to 1.2.4:
* Added read-only support for BZIP2 compression.  This should be
      considered experimental, and is only available if the libbzip2
      library <http://sources.redhat.com/bzip2/> is installed.

    * Added the ability to handle messages that can be decrypted with
      either a passphrase or a secret key.

    * Most support for Elgamal sign+encrypt keys has been removed.
      Old signatures may still be verified, and existing encrypted
      messages may still be decrypted, but no new signatures may be
      issued by, and no new messages will be encrypted to, these keys.
      Elgamal sign+encrypt keys are not part of the web of trust.  The
      only new message that can be generated by an Elgamal
      sign+encrypt key is a key revocation.  Note that in a future
      version of GnuPG (currently planned for 1.4), all support for
      Elgamal sign+encrypt keys will be removed, so take this
      opportunity to revoke old keys now.

    * A Russian translation is included again as well as a new
      Belarusian translation.
2003-12-25 14:05:02 +00:00
he
2a8b055632 Add a patch to handle systems which have uint64_t but not the UINT64_C
macro.  This could happen with UNIX98-type systems, such as the code on
our netbsd-1-5 branch, and would prevent this package from building on
such systems.  Problem also reported to the original author.
2003-12-01 14:16:17 +00:00
heinz
b35693ec32 Add improved patch for compromised ElGamal signing keys from
gnupg-devel at gnupg org. The old patch didn't completely disable usage
of the compromised keys.
Move the old and new fix to the patches/ directory.
2003-11-27 23:46:36 +00:00
tron
44c85b1a1f Apply security patch which disables ElGamal signature keys because they
are vulnerable. Bump package revision to reflect this change.
2003-11-27 09:50:12 +00:00
grant
a45a75c721 require GNU sed for GNU sed specific expressions.
fixes PR pkg/21493.
2003-10-11 07:18:50 +00:00
itojun
cd563b68fb upgrade to 1.2.3.
* New "--gnupg" option (set by default) that disables --openpgp,
      and the various --pgpX emulation options.  This replaces
      --no-openpgp, and --no-pgpX, and also means that GnuPG has
      finally grown a --gnupg option to make GnuPG act like GnuPG.
    * A number of portability changes to make building GnuPG on
      less-common platforms easier.
    * Romanian translation.
    * Two new %-expandos for use in notation and policy URLs.  "%g"
      expands to the fingerprint of the key making the signature
      (which might be a subkey), and "%p" expands to the fingerprint
      of the primary key that owns the key making the signature.
    * New "tru" record in --with-colons --list-keys listings.  It
      shows the status of the trust database that was used to
      calculate the key validity in the listings.  See doc/DETAILS for
      the specifics of this.
    * New REVKEYSIG status tag for --status-fd.  It indicates a valid
      signature that was issued by a revoked key.  See doc/DETAILS for
      the specifics of this.
2003-08-25 21:25:24 +00:00
itojun
4a811c3434 add IPv6 support. bump PKGREVISION 2003-08-15 07:02:22 +00:00
seb
56b682547a USE_NEW_TEXINFO is unnecessary now. 2003-08-09 10:59:08 +00:00
wiz
553f3358ea Remove superfluous chunk which confuses some patch(1). 2003-08-09 09:12:41 +00:00
heinz
909643e553 fix for bad sh behaviour on Solaris (already available in latest GnuPG snapshots) 2003-08-09 08:48:35 +00:00
heinz
bc46c9d9f8 fix for bad sh behaviour on Solaris (already available in latest GnuPG snapshots) 2003-08-09 08:11:30 +00:00
wiz
fc99d82917 Add http master site for idea.c.gz. Addresses PR 22408. 2003-08-08 18:57:04 +00:00
seb
85d792d885 Convert to USE_NEW_TEXINFO. 2003-08-04 22:55:22 +00:00
grant
ca3be631f2 s/netbsd.org/NetBSD.org/ 2003-07-17 22:50:55 +00:00
wiz
43fa0c7cb6 PKGREVISION bump for libiconv update. 2003-07-13 13:50:19 +00:00
itojun
d02e2eeda9 fix checksum for USE_IDEA case 2003-05-07 08:26:10 +00:00
tron
222245a6b7 Remove dead mirrors, add a new one. 2003-05-06 15:57:03 +00:00
tron
c8fd9ebd01 Fix some of the master site URLs so that the "fetch" target works at
least particually.
2003-05-06 15:48:24 +00:00
taca
c6eac1cc9d Update gnupg package to 1.2.2.
Security problem is reported on bugtraq.

http://www.securityfocus.com/archive/1/320444/2003-05-02/2003-05-08/0


2003-05-01  Werner Koch  <wk@gnupg.org>

	Released 1.2.2.

2003-04-30  David Shaw  <dshaw@jabberwocky.com>

	* NEWS: Note trust bug fix.

2003-04-29  David Shaw  <dshaw@jabberwocky.com>

	* NEWS: Add note about TIGER being dropped from OpenPGP.

	* README: Add note about the HP/UX inline problem.  Fix all URLs
	to point to the right place in the reorganized gnupg.org web
	pages.  Some minor language fixes.

2003-04-27  David Shaw  <dshaw@jabberwocky.com>

	* NEWS: Add sig version, pk algo, hash algo, and sig class to
	VALIDSIG.

	* BUGS: Fix bug reporting URL.

2003-04-24  Werner Koch  <wk@gnupg.org>

	* configure.ac (ALL_LINGUAS): Added Hungarian translation by Nagy
	Ferenc László.

2003-04-23  David Shaw  <dshaw@jabberwocky.com>

	* configure.ac: "TIGER" -> "TIGER/192".

	* README: Put back proper copyright line.

2003-04-16  Werner Koch  <wk@gnupg.org>

	Released 1.2.2rc2.

2003-04-15  Werner Koch  <wk@gnupg.org>

	* configure.ac (ALL_LINGUAS): Add Slovak translation.

	* configure.ac (HAVE_DOSISH_SYSTEM): New automake conditional.

	* acinclude.m4 (GNUPG_CHECK_ENDIAN): Fixed quoting of r.e. using
	quadrigraphs.

2003-04-08  David Shaw  <dshaw@jabberwocky.com>

	* configure.ac: Big warning that TIGER is being removed from the
	standard.

2003-04-08  Werner Koch  <wk@gnupg.org>

	* Makefile.am (EXTRA_DIST): Add autogen.sh wrapper which is
	useful for some cross-compiling targets.

2003-04-07  David Shaw  <dshaw@jabberwocky.com>

	* acinclude.m4: Fix URL to faqprog.pl.

	* README: Add --enable-sha512 switch and update version number and
	copyright date.

	* NEWS: Add note about SHA-256/384/512.

2003-03-24  Werner Koch  <wk@gnupg.org>

	* configure.ac: Test for ranlib and ar.

2003-03-12  Werner Koch  <wk@gnupg.org>

	* acinclude.m4 (GNUPG_CHECK_ENDIAN): When crosscompiling assume
	little only for Intel CPUs.

2003-02-19  David Shaw  <dshaw@jabberwocky.com>

	* configure.ac: Define @CAPLIBS@ to link in -lcap if we are using
	capabilities.

2003-02-11  David Shaw  <dshaw@jabberwocky.com>

	* configure.ac: Add --enable-sha512 switch to add SHA384/512
	support.

2003-02-06  David Shaw  <dshaw@jabberwocky.com>

	* configure.ac: Do not set GNUPG_LIBEXECDIR in ./configure, so
	that makefiles can override it.

2003-02-02  David Shaw  <dshaw@jabberwocky.com>

	* configure.ac (ALL_LINGUAS): Needs to be on one line to avoid
	problems during ./configure.

	* NEWS: Note new --with-colons disabled key flag and new "revuid"
	command.

2003-01-07  Werner Koch  <wk@gnupg.org>

        Released 1.2.2rc1.

	* configure.ac (ALL_LINGUAS): Added fi and zh_TW.

2003-01-06  David Shaw  <dshaw@jabberwocky.com>

	* NEWS: Add notes about disabled keys and trustdb tweaks.

2002-12-04  David Shaw  <dshaw@jabberwocky.com>

	* NEWS: Add note about convert-from-106 script.

2002-11-25  David Shaw  <dshaw@jabberwocky.com>

	* NEWS: Add notes about notation names and '@', the "--trust-model
	always" option, and non-optimized memory wiping.

2002-11-09  Werner Koch  <wk@gnupg.org>

	* configure.ac: Check for ctermid().

2002-10-31  David Shaw  <dshaw@jabberwocky.com>

	* Makefile.am: Put gnupg.spec in the root directory so rpm -ta
	works.

	* configure.ac: Add a check for volatile.
2003-05-05 16:33:46 +00:00
wiz
7166660e08 Dependency bumps, needed because of devel/pth's major bump, and related
dependency bumps.
2003-05-02 11:53:34 +00:00
cjep
e8f192b175 Add RCS tag 2003-04-21 20:26:35 +00:00
thorpej
2b4efbf6e4 Don't try to use asm on any version of Darwin. 2003-04-01 17:58:59 +00:00
cjep
5b8c845234 USE_PKGLOCALEDIR=yes 2003-01-10 07:39:46 +00:00
chris
e4d5272bd4 Update checksum for idea.c.gz.
Changelog from idea.c file indicates:
* 2002-12-11 wk  __ppc__ is used on Darwin instead of __powerpc__.

Used .sig file to check download was ok.

Closes pkg/19749
2003-01-09 10:20:20 +00:00
abs
6826b96b8b shorten COMMENT 2002-12-12 14:34:49 +00:00
dillo
2805cfca36 use test target provided by bsd.pkg.mk instead of home grown one. 2002-11-24 18:47:48 +00:00
chris
7c89b99007 Rename the regress target test. This appears to be the new standard:
http://mail-index.netbsd.org/pkgsrc-changes/2002/11/23/0009.html
2002-11-24 16:52:05 +00:00
chris
fe47a89cdb Seems that gnupg now depends on perl being available to create, install
and run gpgkeys_mailto

Fixes PR pkg/19104

Also bump pkgrevision.
2002-11-24 12:22:16 +00:00
chris
ba5dbf6950 Update gnupg to 1.2.1. Is a bug fix release.
Major user visible changes are:
    * The library dependencies for OpenLDAP seem to change fairly
      frequently, and GnuPG's configure script cannot guess all the
      combinations.  Use ./configure LDAPLIBS="-L libdir -l libs" to
      override the script and use the libraries selected.

    * Secret keys generated with --export-secret-subkeys are now
      indicated in key listings with a '#' after the "sec", and in
      --with-colons listings by showing no capabilities (no lowercase
      characters).

    * --trusted-key has been un-obsoleted, as it is useful for adding
      ultimately trusted keys from the config file.  It is identical
      to using --edit and "trust" to change a key to ultimately
      trusted.

    * The usual bug fixes as well as fixes to build problems on some
      systems.

Note that patch-aa and patch-ab are no longer needed as was, patch-aa now
contains fixes to handle dlsym errors properly.

Also now include libiconv/buildlink2.mk as gnupg looks for iconv.

Fixes pkg/18221.
2002-10-27 02:53:02 +00:00
itojun
59d301eeab upgrade to 1.2.0, from skrueger@europe.com
2002-09-21  Werner Koch  <wk@gnupg.org>
        Released 1.2.0.
	* configure.ac: Bumbed version number and set development version
	to no.
2002-09-19  David Shaw  <dshaw@jabberwocky.com>
	* configure.ac: Try linking LDAP as just -lldap as it seems very
	recent OpenLDAPs (>=2.0.23) support that.
2002-09-14  David Shaw  <dshaw@jabberwocky.com>
	* configure.ac: Try linking LDAP without -lresolv first, just in
	case the platform has libresolv, but doesn't actually need it to
	use LDAP.
2002-09-12  David Shaw  <dshaw@jabberwocky.com>
	* NEWS: Note that the old IDEA plugin won't work with post-1.1.90
	gpg.
2002-09-11  Werner Koch  <wk@gnupg.org>
	Released 1.1.92.
	* configure.ac (random_modules): The default random module for
	system lacking a /dev/random is now auto selected at runtime.
2002-09-09  David Shaw  <dshaw@jabberwocky.com>
	* NEWS: typo.
	* configure.ac: Add a link test for LDAP without -lresolv for
	HPUX.  Remove "hstrerror" test as it is no longer needed.
2002-09-02  Werner Koch  <wk@gnupg.org>
	* README: Removed the note about a development version so that we
	later don't forget this.  Minor other changes.
2002-08-29  Werner Koch  <wk@gnupg.org>
	* configure.ac (random_modules): Reworked the code to select the
	random module.  Define USE_ALL_RANDOM_MODULES for value all.
2002-08-27  David Shaw  <dshaw@jabberwocky.com>
	* configure.ac: Check type of mode_t.
	* NEWS: Clarify that --libexecdir is a configure option.
	* configure.ac: Check for hstrerror.
2002-08-19  David Shaw  <dshaw@jabberwocky.com>
	* NEWS: Document new ways to enable MDC, and change in automatic
	compression disabling.
	* configure.ac: No such thing as the "none" random gather any
	longer.
2002-08-08  David Shaw  <dshaw@jabberwocky.com>
	* configure.ac: Add an --enable-tiger.
	* NEWS: Clarify new permission checks.
2002-08-07  David Shaw  <dshaw@jabberwocky.com>
	* configure.ac: If the static IDEA cipher is present, disable
	dynamic loading.  Also fix backwards grammar of keyserver
	exec-path CHECKING message.
2002-08-05  Werner Koch  <wk@gnupg.org>
	* configure.ac: Bumbed version number.
2002-08-04  Werner Koch  <wk@gnupg.org>
	Released 1.1.91.
	* configure.ac (ALL_LINGUAS): Added Catalan.
2002-08-02  Werner Koch  <wk@gnupg.org>
	* configure.ac: Removed all extension stuff but keep the tests for
	dlopen.  We don't need to figure out the flags required.  All
	stuff is now statically loaded.
2002-07-30  David Shaw  <dshaw@jabberwocky.com>
	* README, configure.ac: --with-exec-path is now clarified into
	--disable-keyserver-path
	* NEWS: changes since 1.1.90.
2002-07-24  David Shaw  <dshaw@jabberwocky.com>
	* configure.ac: Include a GNUPG_LIBEXECDIR in g10defs.h, as well
	as a SUBST for Makefiles.
2002-07-22  Timo Schulz  <ts@winpt.org>
	* configure.ac: Replace the 'c:/' variables with 'c:\' due
	to the fact we already use '\' in the remaining code.
2002-07-08  David Shaw  <dshaw@jabberwocky.com>
	* configure.ac: Add --with-mailprog to override the use of
	sendmail with another MTA.  We can use anything that follows the
	"$MAILPROG -t" convention.
2002-07-04  David Shaw  <dshaw@jabberwocky.com>
	* configure.ac: --enable-exec-path should be a 'with'.  Fix 'no'
	cases of --with-exec-path and --with-photo-viewer.
	* README: Document --disable-exec, --disable-photo-viewers,
	--disable-keyserver-helpers, --enable-exec-path, and
	--with-photo-viewer.
	* configure.ac: Add --with-photo-viewer to lock the viewer at
	compile time and --disable-keyserver-helpers and
	--disable-photo-viewers to allow disabling one without disabling
	the other.
2002-07-03  David Shaw  <dshaw@jabberwocky.com>
	* configure.ac: Allow setting USE_EXEC_PATH to lock the exec-path
	to a fixed value.
2002-07-01  Werner Koch  <wk@gnupg.org>
	* configure.ac: Set version number to 1.1.91.
        Released 1.1.90.
	* INSTALL: Replaced by generic install file.
	* README: Marked as development version and moved most stuff of
	the old INSTALL file to here.
2002-06-30  Werner Koch  <wk@gnupg.org>
	* configure.ac: Link W32 version against libwsock32.
2002-06-29  Werner Koch  <wk@gnupg.org>
	* configure.ac (development_version): New.
	(HAVE_DEV_RANDOM_IOCTL): Removed test for it; it was never used.
	* BUGS, AUTHORS: Add a note on how to send security related bug
	reports.
2002-06-20  David Shaw  <dshaw@jabberwocky.com>
	* NEWS: changes since 1.0.7.
	* configure.ac: Set new version number (1.1.90), and fix Solaris
	compiler flags for shared objects.
2002-06-11  David Shaw  <dshaw@jabberwocky.com>
	* configure.ac: Move -lsocket and -lnsl checks before LDAP link
	tests so they work properly on Solaris.  Noted by David Champion.
	Also, check for the Mozilla LDAP library if the OpenLDAP library
	check fails.  Put -lsocket and -lnsl in NETLIBS rather than LIBS
	so not all programs are forced to link to them.
2002-06-05  David Shaw  <dshaw@jabberwocky.com>
	* configure.ac: Add a switch for the experimental external HKP
	keyserver interface.
2002-05-22  Werner Koch  <wk@gnupg.org>
	* configure.ac: Check for strcasecmp and strncasecmp.  Removed
	stricmp and memicmp checks.
2002-05-08  David Shaw  <dshaw@jabberwocky.com>
	* configure.ac: If LDAP comes up unusable, try #including <lber.h>
	before giving up.  Old versions of OpenLDAP require that.
2002-05-03  David Shaw  <dshaw@jabberwocky.com>
	* configure.ac: In g10defs.h, use \ for the directory separator
	when HAVE_DOSISH_SYSTEM is on.
	* configure.ac: Add --disable-exec flag to disable all remote
	program execution.  --disable-exec implies --disable-ldap and
	--disable-mailto.  Also look in /usr/lib for sendmail.  If
	sendmail is not found, do not default - just fail.
2002-04-30  David Shaw  <dshaw@jabberwocky.com>
	* configure.ac: Try and link to a sample LDAP program to check if
	the LDAP we're about to use is really sane.  The most common
	problem (using a very old OpenLDAP), could be fixed with an extra
	#include, but this would not be very portable to other LDAP
	libraries.
2002-10-09 14:16:55 +00:00
chris
2ccfd08f73 Belated bump to nb2, following fixes to dlsym return checks to work properly against -current. 2002-10-01 19:53:54 +00:00
chris
bc11ddbaf3 fixup dlsym error checks. An error is indicated by dlsym returning NULL not
dlerror returning something valid.
2002-09-30 22:41:30 +00:00
jlam
1c57323789 Merge packages from the buildlink2 branch back into the main trunk that
have been converted to USE_BUILDLINK2.
2002-08-25 21:48:57 +00:00
heinz
8d35e04c67 Correct wrong detection of /dev/random in GnuPG 1.0.7 on NetBSD.
Bumped PKGREVISION to 1, changed PLIST accordingly and added 2 patches
for configure and configure.ac. Patches were sent to gnupg-bugs@gnu.org.
Thomas Klausner approved.
2002-07-18 20:44:52 +00:00
wiz
425319a5ab Update to 1.0.7.
* Secret keys are now stored and exported in a new format which
  uses SHA-1 for integrity checks.  This format renders the
  Rosa/Klima attack useless.  Other OpenPGP implementations might
  not yet support this, so the option --simple-sk-checksum creates
  the old vulnerable format.

* The default cipher algorithm for encryption is now CAST5,
  default hash algorithm is SHA-1.  This will give us better
  interoperability with other OpenPGP implementations.

* Symmetric encrypted messages now use a fixed file size if
  possible.  This is a tradeoff: it breaks PGP 5, but fixes PGP 2,
  6, and 7.  Note this was only an issue with RFC-1991 style
  symmetric messages.

* Photographic user ID support.  This uses an external program to
  view the images.

* Enhanced keyserver support via keyserver "plugins".  GnuPG comes
  with plugins for the NAI LDAP keyserver as well as the HKP email
  keyserver.  It retains internal support for the HKP HTTP
  keyserver.

* Nonrevocable signatures are now supported.  If a user signs a
  key nonrevocably, this signature cannot be taken back so be
  careful!

* Multiple signature classes are usable when signing a key to
  specify how carefully the key information (fingerprint, photo
  ID, etc) was checked.

* --pgp2 mode automatically sets all necessary options to ensure
  that the resulting message will be usable by a user of PGP 2.x.

* --pgp6 mode automatically sets all necessary options to ensure
  that the resulting message will be usable by a user of PGP 6.x.

* Signatures may now be given an expiration date.  When signing a
  key with an expiration date, the user is prompted whether they
  want their signature to expire at the same time.

* Revocation keys (designated revokers) are now supported if
  present.  There is currently no way to designate new keys as
  designated revokers.

* Permissions on the .gnupg directory and its files are checked
  for safety.

* --expert mode enables certain silly things such as signing a
  revoked user id, expired key, or revoked key.

* Some fixes to build cleanly under Cygwin32.

* New tool gpgsplit to split OpenPGP data formats into packets.

* New option --preserve-permissions.

* Subkeys created in the future are not used for encryption or
  signing unless the new option --ignore-valid-from is used.

* Revoked user-IDs are not listed unless signatures are listed too
  or we are in verbose mode.

* There is no default comment string with ascii armors anymore
  except for revocation certificates and --enarmor mode.

* The command "primary" in the edit menu can be used to change the
  primary UID, "setpref" and "updpref" can be used to change the
  preferences.

* Fixed the preference handling; since 1.0.5 they were erroneously
  matched against against the latest user ID and not the given one.

* RSA key generation.

* It is now possible to sign and conventional encrypt a message (-cs).

* The MDC feature flag is supported and can be set by using
  the "updpref" edit command.

* The status messages GOODSIG and BADSIG are now returning the primary
  UID, encoded using %XX escaping (but with spaces left as spaces,
  so that it should not break too much)

* Support for GDBM based keyrings has been removed.

* The entire keyring management has been revamped.

* The way signature stati are store has changed so that v3
  signatures can be supported. To increase the speed of many
  operations for existing keyrings you can use the new
  --rebuild-keydb-caches command.

* The entire key validation process (trustdb) has been revamped.
  See the man page entries for --update-trustdb, --check-trustdb
  and --no-auto-check-trustdb.

* --trusted-keys is again obsolete, --edit can be used to set the
  ownertrust of any key to ultimately trusted.

* A subkey is never used to sign keys.

* Read only keyrings are now handled as expected.
2002-05-07 18:48:46 +00:00
seb
66111c6d15 Introduce new framework for handling info files generation and installation.
Summary of changes:
- removal of USE_GTEXINFO
- addition of mk/texinfo.mk
- inclusion of this file in package Makefiles requiring it
- `install-info' substituted by `${INSTALL_INFO}' in PLISTs
- tuning of mk/bsd.pkg.mk:
    removal of USE_GTEXINFO
    INSTALL_INFO added to PLIST_SUBST
    `${INSTALL_INFO}' replace `install-info' in target rules
    print-PLIST target now generate `${INSTALL_INFO}' instead of `install-info'
- a couple of new patch files added for a handful of packages
- setting of the TEXINFO_OVERRIDE "switch" in packages Makefiles requiring it
- devel/cssc marked requiring texinfo 4.0
- a couple of packages Makefiles were tuned with respect of INFO_FILES and
  makeinfo command usage

See -newly added by this commit- section 10.24 of Packages.txt for
further information.
2002-02-18 15:14:00 +00:00
wiz
5fdf3c503f Fix for sparc64, provided in pkg/15168. 2002-01-07 21:29:34 +00:00
zuntum
c72c1cf5f9 Move pkg/ files into package's toplevel directory 2001-11-01 00:57:41 +00:00
jlam
c96c9806bc Remove commented USE_LIBINTL definitions ... we already use the
gettext-lib/buildlink.mk file.
2001-10-27 07:00:52 +00:00
jlam
bdb1760985 Convert to use buildlink.mk files and mark as USE_BUILDLINK_ONLY. 2001-06-28 19:13:24 +00:00
wiz
a5805d0fb3 Use slightly modified idea.c, which recognizes NetBSD PowerPC machines as
big endian. Makes gnupg work with IDEA support on ppc machines.
XXX: Probably similar changes needed for some other big-endian platforms.
2001-06-04 23:41:36 +00:00
wiz
9707fee5de Update to 1.0.6, provided by Nathan Ahlstrom in pkg/13069.
Changes:
Fixed a format string bug which is exploitable if --batch is not used.
Checked all translations for format strings bugs.
Removed the Russian translation due to too many bugs.
Fixed keyserver access and expire time calculation.
2001-05-31 13:30:02 +00:00
wiz
c949b5f94e Fix compilation on macppc. (relocation error because of missing -fPIC) 2001-05-23 15:35:00 +00:00
wiz
372bdb7305 Tidy up, and remove note about RSA. 2001-05-14 15:40:00 +00:00
wiz
5dc23e94da Update to 1.0.5, provided by Mark White in private mail.
Some pkg related changes by me.
Changes since 1.0.4:
* WARNING: The semantics of --verify have changed to address a
  problem with detached signature detection. --verify now ignores
  signed material given on stdin unless this is requested by using
  a "-" as the name for the file with the signed material.  Please
  check all your detached signature handling applications and make
  sure that they don't pipe the signed material to stdin without
  using a filename together with "-" on the the command line.

* WARNING: Corrected hash calculation for input data larger than
  512M - it was just wrong, so you might notice bad signature in
  some very big files.  It may be wise to keep an old copy of
  GnuPG around.

* Secret keys are no longer imported unless you use the new option
  --allow-secret-key-import.  This is a kludge and future versions will
  handle it in another way.

* New command "showpref" in the --edit-key menu to show an easier
  to understand preference listing.

* There is now the notation of a primary user ID.  For example, it
  is printed with a signature verification as the first user ID;
  revoked user IDs are not printed there anymore.  In general the
  primary user ID is the one with the latest self-signature.

* New --charset=utf-8 to bypass all internal conversions.

* Large File Support (LFS) is now working.

* New options: --ignore-crc-error, --no-sig-create-check,
  --no-sig-cache, --fixed_list_mode, --no-expensive-trust-checks,
  --enable-special-filenames and --use-agent.  See man page.

* New command --pipemode, which can be used to run gpg as a
  co-process.  Currently only the verification of detached
  signatures are working.  See doc/DETAILS.

* Rewritten key selection code so that GnuPG can better cope with
  multiple subkeys, expire dates and so.  The drawback is that it
  is slower.

* A whole lot of bug fixes.

* The verification status of self-signatures are now cached. To
  increase the speed of key list operations for existing keys you
  can do the following in your GnuPG homedir (~/.gnupg):
     $ cp pubring.gpg pubring.gpg.save && $ gpg --export-all >x && \
      rm pubring.gpg && gpg --import x
  Only v4 keys (i.e not the old RSA keys) benefit from this caching.

* New translations: Estonian, Turkish.
2001-05-14 13:40:04 +00:00
agc
a35e3d707c Move to sha1 digests, add distfile sizes. 2001-04-19 15:40:29 +00:00
agc
2d6b6a009c + move the distfile digest/checksum value from files/md5 to distinfo
+ move the patch digest/checksum values from files/patch-sum to distinfo
2001-04-17 11:43:32 +00:00
zuntum
ef5ca26635 o Fix/add quoting
o Respect ${CFLAGS}
2001-03-31 11:14:29 +00:00
hubertf
e32afb6fea Change BUILD_DEPENDS semantics:
first component is now a package name+version/pattern, no more
executable/patchname/whatnot.

While there, introduce BUILD_USES_MSGFMT as shorthand to pull in
devel/gettext unless /usr/bin/msgfmt exists (i.e. on post-1.5 -current).

Patch by Alistair Crooks <agc@netbsd.org>
2001-03-27 03:19:43 +00:00
wiz
a87738b456 Update to new COMMENT style: COMMENT var in Makefile instead of pkg/COMMENT. 2001-02-17 17:42:09 +00:00
wiz
75a2b900c3 Update to 1.0.4nb3: incorporate a security fix by the author.
(Which also includes completely unrelated patch-ac.)
Closes pkg/12208.
2001-02-15 12:04:37 +00:00
wiz
73bcd897a6 Update gnupg to 1.0.4nb2:
Fix a bug in ~/.gnupg creation.
Honor USE_IDEA, and add the IDEA extension in that case.
Addresses pkg/11876.
2001-01-29 11:52:59 +00:00
wiz
5018230611 change DEPENDS on gettext to BUILD_DEPENDS on msgfmt 2000-11-30 00:11:26 +00:00
wiz
3266297597 Declare some symbols static in twofish.c (for details see lib/11458).
Patch provided by Olaf Seibert.
Bump version number to 1.0.4nb1.
2000-11-12 14:28:48 +00:00
wiz
2abd8edc01 Update to 1.0.4. Changes since 1.0.3:
* Fixed a serious bug which could lead to false signature verification
  results when more than one signature is fed to gpg.  This is the
  primary reason for releasing this version.
* New utility gpgv which is a stripped down version of gpg to
  be used to verify signatures against a list of trusted keys.
* Rijndael (AES) is now supported and listed with top preference.
* --with-colons now works with --print-md[s].

Based on an update provided by Mipam <mipam@ibb.net>.
2000-11-10 02:35:02 +00:00
itojun
89c7127fec recover DEPENDS 2000-10-11 09:57:45 +00:00
itojun
51223d39cb update to 1.0.3.
Noteworthy changes in version 1.0.3 (2000-09-18)
------------------------------------------------

    * Fixed problems with piping to/from other MS-Windows software

    * Expiration time of the primary key can be changed again.

    * Revoked user IDs are now marked in the output of --list-key

    * New options --show-session-key and --override-session-key
      to help the British folks to somewhat minimize the danger
      of this Orwellian RIP bill.

    * New options --merge-only and --try-all-secrets.

    * New configuration option --with-egd-socket.

    * The --trusted-key option is back after it left us with 0.9.5

    * RSA is supported. Key generation does not yet work but will come
      soon.

    * CAST5 and SHA-1 are now the default algorithms to protect the key
      and for symmetric-only encryption. This should solve a couple
      of compatibility problems because the old algorithms are optional
      according to RFC2440

    * Twofish and MDC enhanced encryption is now used.  PGP 7 supports
      this.  Older versions of GnuPG don't support it, so they should be
      upgraded to at least 1.0.2
2000-10-11 09:57:30 +00:00
fredb
0c6b58570c Reorganize crypto handling, as discussed on tech-pkg. Remove all
RESTRICTED= variables that were predicated on former U.S. export
regulations. Add CRYPTO=, as necessary, so it's still possible to
exclude all crypto packages from a build by setting MKCRYPTO=no
(but "lintpkgsrc -R" will no longer catch them).

Specifically,

- - All packages which set USE_SSL just lose their RESTRICTED
    variable, since MKCRYPTO responds to USE_SSL directly.
- - realplayer7 and ns-flash keep their RESTRICTED, which is based
    on license terms, but also gain the CRYPTO variable.
- - srp-client is now marked broken, since the distfile is evidently
    no longer available. On this, we're no worse off than before.
    [We haven't been mirroring the distfile, or testing the build!]
- - isakmpd gets CRYPTO for RESTRICTED, but remains broken.
- - crack loses all restrictions, as it does not evidently empower
    a user to utilize strong encryption (working definition: ability
    to encode a message that requires a secret key plus big number
    arithmetic to decode).
2000-09-09 19:40:14 +00:00
hubertf
402899809a Replace MIRROR_DISTFILES and NO_CDROM with the more descriptive and
more fine-grained NO_{BIN,SRC}_ON_{FTP,CDROM} definitions.

MIRROR_DISTFILES and NO_CDROM are now dead.
2000-08-18 22:46:29 +00:00
jlam
d0d079e75e The gettext package gained a shared library. For all packages which
link against libintl.so, update the dependency on gettext to >=0.10.35nb1.
2000-07-31 04:14:04 +00:00
wiz
db2c0b92d1 Add patch to make gnupg work on macppc/ELF.
Patch provided by Gabriel Rosenkoetter <gr@eclipsed.net>.
2000-07-17 23:44:52 +00:00
wiz
61933dcd35 Man page is not distributed by itself anymore. (undo last commit, fix it
correctly)
2000-07-16 23:05:38 +00:00
mason
dd77c814d2 Corrected distfile name (two places) so package builds. 2000-07-16 17:10:24 +00:00
wiz
fdff5a791b Set maintainer to wiz@netbsd.org. 2000-07-15 11:25:57 +00:00
wiz
35eb63b670 Update gnupg to 1.0.2. NetBSD changes had been mailed to author and
have been integrated.
Relevant Changes:
* Fixed expiration handling of encryption keys.
* Add an experimental feature to do unattended key generation.
* The user is now asked for the reason of revocation as required by
  the new OpenPGP draft.
* There is a ~/.gnupg/random_seed file now which saves the state of
  the internal RNG and increases system performance somewhat.  This
  way the full entropy source is only used in cases were it is really
  required. Use the option --no-random-seed-file to disable this
  feature.
* New options --ignore-time-conflict and --lock-never.
* Encryption is now much faster: About 2 times for 1k bit keys and 8
  times for 4k keys.
* New encryption keys are generated in a way which allows a much
  faster decryption.
* New command --export-secret-subkeys which outputs the _primary_
  key with it's secret parts deleted.  This is useful for automated
  decryption/signature creation as it allows to keep the real secret
  primary key offline and thereby protecting the key certificates and
  allowing to create revocations for the subkeys.  See the FAQ for a
  procedure to install such secret keys.
* Keygeneration now writes to the first writeable keyring or as
  default to the one in the homedirectory.  Prior versions ignored all
  --keyring options.
* New option --command-fd to take user input from a file descriptor;
  to be used with --status-fd by software which uses GnuPG as a
  backend.
* There is a new status PROGRESS which is used to show progress during
  key generation.
* Support for the new MDC encryption packets.  To create them either
  --force-mdc must be use or cipher algorithm with a blocksize other
  than 64 bits is to be used.  --openpgp currently disables MDC
  packets entirely.  This option should not yet be used.
* New option --no-auto-key-retrieve to disable retrieving of a missing
  public key from a keyerver, when a keyerver has been set.
* Danish, Esperanto, Japanese, Dutch, and Swedish translations
2000-07-15 11:24:27 +00:00
dmcmahill
eb8dcd1ace change -fpic to -fPIC. Thats what sparcs need now. 2000-06-23 14:32:10 +00:00
wiz
2f39c2de1b find /dev/random, and use it 2000-05-19 23:13:52 +00:00
wiz
9282fa6139 Fetch and install man page, as noted by Markus Kurek
<kurek@uni-duisburg.de> in pkg/9519. Also defuzz patches.
2000-03-02 08:21:31 +00:00
wiz
8e2d11d620 Update gnupg to 1.0.1, as PR'd by
Takahiro Kambe <taca@sky.yamashina.kyoto.jp> in pkg/9477.

Changes since 1.0.0:
    * New command --verify-files.  New option --fast-list-mode.
    * $http_proxy is now used when --honor-http-proxy is set.
    * Fixed some minor bugs and the problem with conventional encrypted
      packets which did use the gpg v3 partial length headers.
    * Add Indonesian and Portugese translations.
    * Fixed a bug with symmetric-only encryption using the non-default 3DES.
      The option --emulate-3des-s2k-bug may be used to decrypt documents
      which have been encrypted this way; this should be done immediately
      as this workaround will be remove in 1.1
    * Can now handle (but not display) PGP's photo IDs. I don't know the
      format of that packet but after stripping a few bytes from the start
      it looks like a JPEG (at least my test data).  Handling of this
      package is required because otherwise it would mix up the
      self signatures and you can't import those keys.
    * Passing non-ascii user IDs on the commandline should now work in all
      cases.
    * New keys are now generated with an additional preference to Blowfish.
    * Removed the GNU Privacy Handbook from the distribution as it will go
      into a separate one.
2000-02-27 04:16:55 +00:00
hubertf
3bbeeaa440 be consistent on which version to wildcard 2000-01-10 19:11:07 +00:00
frueauf
b33124eb5c Update gnupg to 1.0.0. As sideeffect this fixes pr 8826 and pr 8606.
/* XXX someone should test this in i386/aout, maybe that broke
       in exchange, so someone would need to fix it. I have no system
       to test on. But since this package was totaly broken, its an
       improvement...							XXX */

Noteworthy changes in version 1.0.0 (1999-09-07)
-----------------------------------

    * Add a very preliminary version of the GNU Privacy Handbook to
      the distribution (lynx doc/gph/index.html).

    * Changed the version number to GnuPG 2001 ;-)


Noteworthy changes in version 0.9.11
------------------------------------

    * UTF-8 strings are now correctly printed (if --charset is set correctly).
      Output of --with-colons remains C-style escaped UTF-8.

    * Workaround for a problem with PGP 5 detached signature in textmode.

    * Fixed a problem when importing new subkeys (duplicated signatures).

Noteworthy changes in version 0.9.10
------------------------------------

    * Some strange new options to help pgpgpg

    * Cleaned up the dox a bit.


Noteworthy changes in version 0.9.9
-----------------------------------

    * New options --[no-]utf8-strings.

    * New edit-menu commands "enable" and "disable" for entire keys.

    * You will be asked for a filename if gpg cannot deduce one.

    * Changes to support libtool which is needed for the development
      of libgcrypt.

    * New script tools/lspgpot to help transferring assigned
      trustvalues from PGP to GnuPG.

    * New commands --lsign-key and made --sign-key a shortcut for --edit
      and sign.

    * New options (#122--126 ;-) --[no-]default-recipient[-self],
      --disable-{cipher,pubkey}-algo. See the man page.

    * Enhanced info output in case of multiple recipients and fixed exit code.

    * New option --allow-non-selfsigned-uid to work around a problem with
      the German IN way of separating signing and encryption keys.


Noteworthy changes in version 0.9.8
-----------------------------------

    * New subcommand "delsig" in the edit menu.

    * The name of the output file is not anymore the one which is
      embedded in the processed message, but the used filename with
      the extension stripped.  To revert to the old behaviour you can
      use the option --use-embedded-filename.

    * Another hack to cope with pgp2 generated detached signatures.

    * latin-2 character set works (--charset=iso-8859-2).

    * New option --with-key-data to list the public key parameters.
      New option -N to insert notations and a --set-policy-url.
      A couple of other options to allow reseting of options.

    * Better support for HPUX.


Noteworthy changes in version 0.9.7
-----------------------------------

    * Add some work arounds for a bugs in pgp 2 which led to bad signatures
      when used with canonical texts in some cases.

    * Enhanced some status outputs.

Noteworthy changes in version 0.9.6
-----------------------------------

    * Twofish is now statically linked by default. The experimental 128 bit
      version is now disabled.  Full support will be available as soon as
      the OpenPGP WG has decided on an interpretation of rfc2440.

    * Dropped support for the ancient Blowfish160 which is not OpenPGP.

    * Merged gpgm and gpg into one binary.

    * Add "revsig" and "revkey" commands to the edit menu.  It is now
      possible to revoke signature and subkeys.
1999-12-02 15:50:43 +00:00
agc
00a16e3008 Add package patch checksum files. 1999-07-09 14:22:59 +00:00
agc
c6068e98ff Make this package work on Solaris. 1999-04-09 09:39:20 +00:00
mellon
9fbb6462e8 Undo some damage pkglint insisted on. 1999-04-08 15:22:40 +00:00
mellon
b2607dd81e Oops, fix paths. 1999-04-08 15:17:27 +00:00
mellon
33b0a3ca1b GNU Privacy Guard (a PGP replacement) 1999-04-07 23:01:27 +00:00