-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 NotDashEscaped: You need GnuPG to verify this message This is a patch file to create version 0.9.11 from 0.9.10. Please check the signature of this patch file: zcat somepath/gnupg-0.9.10-0.9.11.diff.gz | gpg --verify Change to directory gnupg-0.9.10 (or however you renamed it) and give this command: zcat somepath/gnupg-0.9.10-0.9.11.diff.gz | patch -p1 It is a good idea to rename your current directory to gnupg-0.9.11 now. Prereq: 0.9.10 diff -urN gnupg-0.9.10/VERSION gnupg-0.9.11/VERSION --- gnupg-0.9.10/VERSION Wed Aug 4 09:20:52 1999 +++ gnupg-0.9.11/VERSION Thu Sep 2 16:36:39 1999 @@ -1 +1 @@ -0.9.10 +0.9.11 diff -urN gnupg-0.9.10/AUTHORS gnupg-0.9.11/AUTHORS --- gnupg-0.9.10/AUTHORS Fri Jul 23 11:08:45 1999 +++ gnupg-0.9.11/AUTHORS Wed Sep 1 07:08:17 1999 @@ -56,11 +56,11 @@ steuck@iname.com -TRANSLATIONS Urko Lusa ?????????? +TRANSLATIONS Urko Lusa Okay es_ES.po -TRANSLATIONS Thiago Jung Bauermann ???????????????? +TRANSLATIONS Thiago Jung Bauermann Okay pt_BR.po jungmann@cwb.matrix.com.br diff -urN gnupg-0.9.10/BUGS gnupg-0.9.11/BUGS --- gnupg-0.9.10/BUGS Fri Jul 23 11:35:49 1999 +++ gnupg-0.9.11/BUGS Tue Aug 31 09:29:42 1999 @@ -30,8 +30,8 @@ [is this bug still alive? - can someone please check it] [ **] #6 1999-02-22 0.9.3 - Buserror on IRIX 6.4: Crash while doing a keygen. I think while creating - the prime. Other buserrors are reported when doing a "gpg README" + Bus error on IRIX 6.4: Crash while doing a keygen. I think while creating + the prime. Other bus errors are reported when doing a "gpg README" on sparc-solaris2.6. --> Solaris fixed. --> IRIX bug still there but someone should test this again! diff -urN gnupg-0.9.10/ChangeLog gnupg-0.9.11/ChangeLog --- gnupg-0.9.10/ChangeLog Wed Aug 4 10:34:47 1999 +++ gnupg-0.9.11/ChangeLog Thu Sep 2 16:40:58 1999 @@ -1,5 +1,18 @@ -Wed Aug 4 10:34:46 CEST 1999 Werner Koch +Thu Sep 2 16:40:55 CEST 1999 Werner Koch + + + * VERSION: Set to 0.9.11. + +Tue Aug 31 17:20:44 CEST 1999 Werner Koch + * configure.in: Minor changes to the OS/2 and Mingw32 system labels. + Add a printable name for Hurd. + +Mon Aug 30 20:38:33 CEST 1999 Werner Koch + + * configure.in: Some support for DJGPP (Mark Elbrecht) + +Wed Aug 4 10:34:46 CEST 1999 Werner Koch * VERSION: Set to 0.9.10. diff -urN gnupg-0.9.10/INSTALL gnupg-0.9.11/INSTALL --- gnupg-0.9.10/INSTALL Sat Mar 20 10:32:52 1999 +++ gnupg-0.9.11/INSTALL Tue Aug 31 19:22:07 1999 @@ -4,29 +4,35 @@ Configure options for GNUPG =========================== +--enable-static-rnd= Force the use of the random byte gathering + module . Default is either to use /dev/random + or the standard Uix module. Value for name: + egd - Use the module which accesses the + Entropy Gathering Daemon. See the webpages + for more information about it. + unix - Use the standard Unix module which does not + have a very good performance. + linux - Use the module which accesses /dev/random. + This is the first choice and the default one + for GNU/Linux or *BSD. + none - Do not linkl any module in but rely on + a dynmically loaded modules. + --with-included-zlib Forces usage of the local zlib sources. Default is to use the (shared) library of the system. --with-included-gettext Forces usage of the local gettext sources instead of the one provided by your system. ---disable-nls Disable NLS support (See ABOUT-NLS) - ---enable-m-debug Compile with the integrated malloc debugging stuff. - This makes the program slower but it checks every - free operation and can be used to create statistics - of memory usage. If this option is used the program - option "--debug 32" displays every call to a malloc - function (this makes the program *really* slow), the - option "--debug 128" displays a memory statistic after - the program run. +--disable-nls Disable NLS support (See the file ABOUT-NLS) ---enable-m-guard Enable the integrated malloc checking code. +--enable-m-guard Enable the integrated malloc checking code. --disable-dynload If you have problems with dynamic loading, this option disables all dynamic loading stuff. ---disable-asm Do not use assembler modules. +--disable-asm Do not use assembler modules. It is not possible to + use this on some CPU types. @@ -106,8 +112,8 @@ 1. rpm -ta gnupg-x.x.x.tar.gz The binary rpm file can now be found in /usr/src/redhat/RPMS, source -rpm in /usr/src/redhat/SRPMS - +rpm in /usr/src/redhat/SRPMS + Please note that to install gnupg binary rpm you must be root, as gnupg needs to be suid root, at least on Linux machines diff -urN gnupg-0.9.10/NEWS gnupg-0.9.11/NEWS --- gnupg-0.9.10/NEWS Wed Aug 4 08:48:30 1999 +++ gnupg-0.9.11/NEWS Thu Sep 2 16:35:55 1999 @@ -1,3 +1,13 @@ +Noteworthy changes in version 0.9.11 +------------------------------------ + + * UTF-8 strings are now correctly printed (if --charset is set correctly). + Output of --with-colons remains C-style escaped UTF-8. + + * Workaround for a problem with PGP 5 detached signature in textmode. + + * Fixed a problem when importing new subkeys (duplicated signatures). + Noteworthy changes in version 0.9.10 ------------------------------------ @@ -58,7 +68,7 @@ ----------------------------------- * Add some work arounds for a bugs in pgp 2 which led to bad signatures - when used with canoncial texts in some cases. + when used with canonical texts in some cases. * Enhanced some status outputs. diff -urN gnupg-0.9.10/PROJECTS gnupg-0.9.11/PROJECTS --- gnupg-0.9.10/PROJECTS Tue May 4 15:47:31 1999 +++ gnupg-0.9.11/PROJECTS Tue Aug 31 17:56:32 1999 @@ -1,47 +1,26 @@ - * Check if an object (a message, detached sign, public key, or whatever) - is signed by definite user, i.e. define user - (userid, or any other unique identification) on command line. - --> NO: Use a script and --status-fd - * Change the internal representation of keyid into a struct which can also hold the localid and extend the localid to hold information of the subkey number because two subkeys may have the same keyid. - * signature verification is done duplicated on import: in import.c and - then in trustdb.c too. Maybe we can use a flag to skip the actual - verification process (this should work if we use the same keyblock, - but I'm not sure how to accomplish that). Another way is to allow - the import of bogus data and let trustdb mark these keys as invalid; - I see an advantage in this that it may help to prevent a DoS on a - keyserver by sending him a lot of bogus signatures which he has - to check - Needs further investigation. - * Add a way to override the current cipher/md implementations by others (using extensions) * Not GnuPG related: What about option completion in bash? Can "--dump-options" be used for this or should we place the - options in a special ELF segment? + options in an ELF note section? - * Split key support (n-out-of-m) + * Split key support (n-out-of-m). Use our own protocol or figure out + how PGP does it. * add an option to re-create a public key from a secret key; we - can do this in trustdb.c:verify_own_keys. - (special tool?) + can do this in trustdb.c:verify_own_keys. (special tool?) * rewrite --list-packets or put it into another tool. - * We need a maintenance pass over the trustdb which flags - signatures as expired if the key used to make the signature has - expired. Maybe it is a good idea to store the expiration time - in the key record of the trustdb. * write a tool to extract selected keys from a file. - * Change the buffering to a mbuf like scheme? Need it for PSST anyway; - see Michael's proposal. - - * Work on the library + * Change the buffering to a mbuf like scheme? See Michael's proposal. * Keep a list of duplicate, faked or unwanted keyids. diff -urN gnupg-0.9.10/README gnupg-0.9.11/README --- gnupg-0.9.10/README Wed Aug 4 08:49:38 1999 +++ gnupg-0.9.11/README Thu Sep 2 16:38:14 1999 @@ -2,7 +2,12 @@ GnuPG - The GNU Privacy Guard ------------------------------- - Version 0.9.10 + Version 0.9.11 + + GnuPG is a tool for secure communication and data storage. It + can be used to encrypt data and to create digital signatures. + It includes an advanced key management facility and is compliant + to the proposed OpenPGP Internet standard as described in RFC2440. GnuPG is now in Beta test and you should report all bugs to the mailing list (see below). The 0.9.x versions are released mainly @@ -15,9 +20,6 @@ See the file COPYING for copyright and warranty information. - GnuPG is in compliance with RFC2440 (OpenPGP), see doc/OpenPGP for - details. - Because GnuPG does not use use any patented algorithm it cannot be compatible with PGP2 versions. PGP 2.x uses only IDEA (which is patented worldwide) and RSA (which is patented in the United States @@ -28,8 +30,8 @@ signatures it is deprecated (Please note that the GnuPG implementation of ElGamal signatures is *not* insecure). Symmetric algorithms are: 3DES, Blowfish, CAST5 and Twofish (GnuPG does not - yet create Twofish encrypted messages because there no agreement - in the OpenPG WG on how to use it together with a MDC algorithm) + yet create Twofish encrypted messages because there is no agreement + in the OpenPGP WG on how to use it together with a MDC algorithm) Digest algorithms available are MD5, RIPEMD160, SHA1, and TIGER/192. @@ -116,7 +118,7 @@ "pub 768R/0C9857A5 1995-09-30 Werner Koch " - The finperprint of this key is published in printed form in the + The fingerprint of this key is published in printed form in the "Global Trust Register for 1998", ISBN 0-9532397-0-5. @@ -130,15 +132,19 @@ fd9351b26b3189c1d577f0970f9dcadc gnupg-x.y.z.tar.gz Now check that this checksum is _exactly_ the same as the one - published via the anouncement list and probably via Usenet. - + published via the announcement list and probably via Usenet. Introduction ------------ - This is a brief overview how to use GnuPG - it is strongly suggested - that you read the manual^H^H^H more information about the use of + A draft version of the manual is included in the subdirectory doc + and some HOWTO documents are available online; dor a listing see: + + http://www.gnupg.org/docs.html#howtos + + Here is a brief overview on how to use GnuPG - it is strongly suggested + that you read the manual and other information about the use of cryptography. GnuPG is only a tool, secure results require that YOU KNOW WHAT YOU ARE DOING. @@ -414,7 +420,7 @@ "+Heinrich Heine duesseldorf" - All words must match excatly (not case sensitive) and appear in + All words must match exactly (not case sensitive) and appear in any order in the user ID. Words are any sequences of letters, digits, the underscore and characters with bit 7 set. @@ -438,7 +444,7 @@ If you use the option "--batch", GnuPG runs in non-interactive mode and never prompts for input data. This does not even allow entering the passphrase. Until we have a better solution (something like ssh-agent), - you can use the option "--passphrase-fd n", which works like PGPs + you can use the option "--passphrase-fd n", which works like PGP's PGPPASSFD. Batch mode also causes GnuPG to terminate as soon as a BAD signature is @@ -510,19 +516,18 @@ Please direct bug reports to or post them direct to the mailing list . Please direct questions about GnuPG to the users mailing list or - one of the pgp newsgroups and give me more time to improve + one of the pgp newsgroups to give me more time to improve GnuPG. Commercial support for GnuPG is also available; please see the GNU service directory or search other resources. Have fun and remember: Echelon is looking at you kid. -- -----END PGP SIGNATURE----- -----BEGIN PGP SIGNATURE----- -Version: GnuPG v0.9.9 (GNU/Linux) +Version: GnuPG v0.9.10 (GNU/Linux) Comment: For info see http://www.gnupg.org -iQB1AwUBN6figR0Z9MEMmFelAQHydwL+LuKC3W6kRkm0clwab3v8I7zlX0bagxzA -RStlHXdO6ln1Mo3s3nBuCfrS6LogiUgNRFhNJQ5+rjrTydz00nzcorbyTalqvMlq -Gnsu9Pd/pTPzvk6kP79yDdoBxfaQGcgw -=W8uz +iQB1AwUBN86L1h0Z9MEMmFelAQFQlQL/S5jDPpDFI3wDG/soA/qMTR79YX1IXDz9 +Izin49GkPHElRCoNbT3r3+T6V+lNtrZpah6JBR30//yo1OGUyoJ88yn3KC0JdtUq +NgJzX3yYUXD+Ojer+WHEL+O8D8qkZrAX +=wiUu -----END PGP SIGNATURE----- diff -urN gnupg-0.9.10/THANKS gnupg-0.9.11/THANKS --- gnupg-0.9.10/THANKS Sat Jul 24 10:53:19 1999 +++ gnupg-0.9.11/THANKS Mon Aug 30 13:55:43 1999 @@ -26,6 +26,7 @@ Fabio Coatti cova@felix.unife.it Felix von Leitner leitner@amdiv.de Frank Heckenbach heckenb@mi.uni-erlangen.de +Frank Stajano frank.stajano@cl.cam.ac.uk Gaël Quéri gqueri@mail.dotcom.fr Greg Louis glouis@dynamicro.on.ca Greg Troxel gdt@ir.bbn.com @@ -52,6 +53,7 @@ Lars Kellogg-Stedman lars@bu.edu Marco d'Itri md@linux.it Mark Adler madler@alumni.caltech.edu +Mark Elbrecht snowball3@bigfoot.com Markus Friedl Markus.Friedl@informatik.uni-erlangen.de Martin Kahlert martin.kahlert@provi.de Martin Schulte schulte@thp.uni-koeln.de diff -urN gnupg-0.9.10/TODO gnupg-0.9.11/TODO --- gnupg-0.9.10/TODO Sun Aug 1 21:10:07 1999 +++ gnupg-0.9.11/TODO Thu Sep 2 10:55:34 1999 @@ -1,5 +1,4 @@ - Scheduled for 1.1 ----------------- * With option -i prompt before adding a key to the keyring and show some @@ -9,20 +8,27 @@ * Allow a replacement for the progress functions in ./cipher - * add an option to use an OpenPGP packet as input (and don't build a literal - data packet) - * print a warning when a revoked/expired _secret_ key is used. + * --disable-asm should still assemble _udiv_qrnnd when needed + + * Skip RO keyrings when importing a key. + + * Use the newest encryption key if only the main key has been given. + + * replace the keyserver stuff either by a call to a specialized + utility and SOCKSify this utility. + + * Check the beginning of file to detect already compressed files (gzip, + bzip2, xdelta and some picture formats) + Nice to have ------------ - * Offcial test vectors for 3DES-EDE3 + * Official test vectors for 3DES-EDE3 * use DEL and ^H for erasing the previous character (util/ttyio.c). or better readline. * Print a warning if the directory mode is wrong. - * replace the keyserver stuff either by a call to a specialized - utility and SOCKSify this utility. * Do a real fix for bug #7 or document that it is a PGP 5 error. * preferences of hash algorithms are not yet used. * Replace the SIGUSR1 stuff by semaphores to avoid loss of a signal. @@ -40,8 +46,6 @@ verification status of the message to the output (i.e. write something to the --output file and not only to stderr. * configure option where to find zlib - * Check the beginning of file to detect already compresssed files (gzip, - bzip2, xdelta and some picture formats) * Display more validity information about the user IDs at certain places. We need a more general function to extract such kind of info from the trustdb. diff -urN gnupg-0.9.10/checks/ChangeLog gnupg-0.9.11/checks/ChangeLog --- gnupg-0.9.10/checks/ChangeLog Wed Aug 4 10:34:19 1999 +++ gnupg-0.9.11/checks/ChangeLog Tue Aug 31 17:20:47 1999 @@ -1,3 +1,8 @@ +Tue Aug 31 17:20:44 CEST 1999 Werner Koch + + + * defs.inc: set LC_ALL empty + Wed Aug 4 10:34:18 CEST 1999 Werner Koch diff -urN gnupg-0.9.10/checks/defs.inc gnupg-0.9.11/checks/defs.inc --- gnupg-0.9.10/checks/defs.inc Fri Jul 30 10:36:31 1999 +++ gnupg-0.9.11/checks/defs.inc Tue Aug 31 09:01:07 1999 @@ -28,6 +28,7 @@ # The testscripts expect the original language LANG= LANGUAGE= +LC_ALL= #-------------------------------- #------ utility functions ------- diff -urN gnupg-0.9.10/cipher/ChangeLog gnupg-0.9.11/cipher/ChangeLog --- gnupg-0.9.10/cipher/ChangeLog Mon Jul 26 09:34:50 1999 +++ gnupg-0.9.11/cipher/ChangeLog Mon Aug 30 20:38:37 1999 @@ -1,3 +1,9 @@ +Mon Aug 30 20:38:33 CEST 1999 Werner Koch + + + * cipher.c (do_cbc_encrypt): Fixed serious bug occuring when not using + in place encryption. Pointed out by Frank Stajano. + Mon Jul 26 09:34:46 CEST 1999 Werner Koch diff -urN gnupg-0.9.10/cipher/cipher.c gnupg-0.9.11/cipher/cipher.c --- gnupg-0.9.10/cipher/cipher.c Thu Jul 22 22:26:33 1999 +++ gnupg-0.9.11/cipher/cipher.c Mon Aug 30 13:55:48 1999 @@ -443,7 +443,7 @@ * bytes. Maybe it is a good idea to enhance the cipher backend * API to allow for CBC handling in the backend */ for(ivp=c->iv,i=0; i < blocksize; i++ ) - outbuf[i] ^= *ivp++; + outbuf[i] = inbuf[i] ^ *ivp++; (*c->encrypt)( &c->context.c, outbuf, outbuf ); memcpy(c->iv, outbuf, blocksize ); inbuf += c->blocksize; diff -urN gnupg-0.9.10/configure.in gnupg-0.9.11/configure.in --- gnupg-0.9.10/configure.in Fri Jul 23 14:02:48 1999 +++ gnupg-0.9.11/configure.in Tue Aug 31 17:30:02 1999 @@ -2,7 +2,7 @@ dnl Configure template for GNUPG dnl dnl (Process this file with autoconf to produce a configure script.) -AC_REVISION($Revision: 1.98 $)dnl +AC_REVISION($Revision: 1.100 $)dnl dnl Must reset CDPATH so that bash's cd does not print to stdout CDPATH= @@ -179,12 +179,12 @@ try_gettext=yes try_gdbm=yes case "${target}" in - i386--mingw32) + *-*-mingw32) # special stuff for Windoze NT cross_compiling=yes - CC="i386--mingw32-gcc" - CPP="i386--mingw32-gcc -E" - RANLIB="i386--mingw32-ranlib" + CC="${target}-gcc" + CPP="${target}-gcc -E" + RANLIB="${target}-ranlib" ac_cv_have_dev_random=no AC_DEFINE(USE_ONLY_8DOT3) AC_DEFINE(HAVE_DRIVE_LETTERS) @@ -192,7 +192,7 @@ try_gettext="no" try_gdbm="no" ;; - i386-emx-os2 | i[3456]86-pc-os2*emx ) + i?86-emx-os2 | i?86-*-os2*emx ) # OS/2 with the EMX environment ac_cv_have_dev_random=no AC_DEFINE(HAVE_DRIVE_LETTERS) @@ -201,6 +201,15 @@ try_gdbm="no" ;; + i?86-*-msdosdjgpp*) + # DOS with the DJGPP environment + ac_cv_have_dev_random=no + AC_DEFINE(HAVE_DRIVE_LETTERS) + AC_DEFINE(HAVE_DOSISH_SYSTEM) + try_gettext="no" + try_gdbm="no" + ;; + *-*-hpux*) if test -z "$GCC" ; then CFLAGS="$CFLAGS -Ae -D_HPUX_SOURCE" @@ -229,15 +238,23 @@ case "${target}" in - i386--mingw32) + *-*-mingw32) PRINTABLE_OS_NAME="MingW32" ;; - i386-emx-os2 | i[3456]86-pc-os2*emx ) + i?86-emx-os2 | i?86-*-os2*emx ) PRINTABLE_OS_NAME="OS/2" ;; + i?86-*-msdosdjgpp*) + PRINTABLE_OS_NAME="MSDOS/DJGPP" + try_dynload=no + ;; *-linux*) PRINTABLE_OS_NAME="GNU/Linux" ;; +dnl let that after linux to avoid gnu-linux problems + *-gnu*) + PRINTABLE_OS_NAME="GNU/Hurd" + ;; *) PRINTABLE_OS_NAME=`uname -s || echo "Unknown"` ;; @@ -469,15 +486,18 @@ static_modules="$static_modules rndlinux" else case "${target}" in - i386--mingw32) + *-*-mingw32) static_modules="$static_modules rndw32" ;; - i386-emx-os2|i[3456]86-pc-os2*emx) + i?86-emx-os2|i?86-*-os2*emx) static_modules="$static_modules rndos2" ;; m68k-atari-mint) static_modules="$static_modules rndatari" ;; + i?86-*-msdosdjgpp*) + static_modules="$static_modules" + ;; *) static_modules="$static_modules rndunix" print_egd_notice=yes @@ -509,7 +529,7 @@ *** in Perl and available at the GnuPG FTP servers. For more information *** consult the GnuPG webpages: *** -*** http://www.gnupg.org/donwload.html#egd +*** http://www.gnupg.org/download.html#egd *** *** You may want to run ./configure with --enable-static-rnd=none to be *** able to load the EGD client code dynamically; this way you can choose diff -urN gnupg-0.9.10/debian/changelog gnupg-0.9.11/debian/changelog --- gnupg-0.9.10/debian/changelog Mon Jun 28 13:58:00 1999 +++ gnupg-0.9.11/debian/changelog Mon Aug 30 13:41:40 1999 @@ -1,3 +1,27 @@ +gnupg (0.9.10-2) unstable; urgency=low + + * debian/rules (binary-arch): install lspgpot. Requested by Kai + Henningsen . [#42288] + * debian/rules (binary-arch): correct the path where modules are looked + for. Reported by Karl M. Hegbloom . [#40881] + * debian/postinst, debian/postrm: under protest, register gpg the + package with suidmanager and make it suid by default. + [#29780,#32590,#40391] + + -- James Troup Tue, 10 Aug 1999 00:12:40 +0100 + +gnupg (0.9.10-1) unstable; urgency=low + + * New upstream version. + + -- James Troup Fri, 6 Aug 1999 01:16:21 +0100 + +gnupg (0.9.9-1) unstable; urgency=low + + * New upstream version. + + -- James Troup Sun, 25 Jul 1999 01:06:31 +0100 + gnupg (0.9.8-1) unstable; urgency=low * New upstream version. diff -urN gnupg-0.9.10/debian/copyright gnupg-0.9.11/debian/copyright --- gnupg-0.9.10/debian/copyright Mon Jun 28 13:58:00 1999 +++ gnupg-0.9.11/debian/copyright Mon Aug 30 13:41:40 1999 @@ -4,7 +4,7 @@ This package was put together by me, James Troup , from the sources, which I obtained from -ftp://ftp.gnupg.org/pub/gcrypt/gnupg-0.9.8.tar.gz. The changes were +ftp://ftp.gnupg.org/pub/gcrypt/gnupg-0.9.10.tar.gz. The changes were minimal, namely: - adding support for the Debian package maintenance scheme, by adding diff -urN gnupg-0.9.10/debian/rules gnupg-0.9.11/debian/rules --- gnupg-0.9.10/debian/rules Mon Jun 28 13:58:00 1999 +++ gnupg-0.9.11/debian/rules Mon Aug 30 13:41:40 1999 @@ -1,5 +1,5 @@ #!/usr/bin/make -f -# debian/rules file - for GNUPG (0.9.8) +# debian/rules file - for GNUPG (0.9.10) # Based on sample debian/rules file - for GNU Hello (1.3). # Copyright 1994,1995 by Ian Jackson. # Copyright 1998 James Troup @@ -32,11 +32,16 @@ $(checkdir) -rm -rf debian/tmp install -d debian/tmp/DEBIAN/ - install -m 755 debian/preinst debian/tmp/DEBIAN/preinst + install -m 755 debian/preinst debian/postinst debian/postrm debian/tmp/DEBIAN/ $(MAKE) prefix=`pwd`/debian/tmp/usr install - gzip -9v debian/tmp/usr/man/man1/* strip debian/tmp/usr/bin/* + sed -e "s#../g10/gpg#gpg#" < tools/lspgpot > debian/tmp/usr/bin/lspgpot + chmod 755 debian/tmp/usr/bin/lspgpot strip --strip-unneeded debian/tmp/usr/lib/gnupg/* + sed -e "s#/usr/local/#/usr/#" < debian/tmp/usr/man/man1/gpg.1 \ + > debian/tmp/usr/man/man1/gpg.1.new + mv debian/tmp/usr/man/man1/gpg.1.new debian/tmp/usr/man/man1/gpg.1 + gzip -9v debian/tmp/usr/man/man1/* install -d debian/tmp/usr/doc/gnupg/ install -m 644 debian/changelog debian/tmp/usr/doc/gnupg/changelog.Debian install -m 644 debian/README.Debian README NEWS THANKS TODO doc/DETAILS \ diff -urN gnupg-0.9.10/doc/DETAILS gnupg-0.9.11/doc/DETAILS --- gnupg-0.9.10/doc/DETAILS Thu Jul 29 11:38:28 1999 +++ gnupg-0.9.11/doc/DETAILS Tue Aug 31 09:29:42 1999 @@ -52,7 +52,7 @@ If field 1 has the tag "pkd", a listing looks like this: pkd:0:1024:B665B1435F4C2 .... FF26ABB: ! ! !-- the value - ! !------ for infomation number of bits in the value + ! !------ for information number of bits in the value !--------- index (eg. DSA goes from 0 to 3: p,q,g,y) @@ -97,7 +97,7 @@ ENC_TO The message is encrypted to this keyid. keytype is the numerical value of the public key algorithm, - kenlength is the length of the key or 0 if it is not known + keylength is the length of the key or 0 if it is not known (which is currently always the case). NODATA @@ -147,7 +147,7 @@ No passphrase was supplied. An application which encounters this message may want to stop parsing immediately because the next message will probably be a BAD_PASSPHRASE. However, if the application - is a wrapper around the key edit menu functionalty it might not + is a wrapper around the key edit menu functionality it might not make sense to stop parsing but simply ignoring the following PAD_PASSPHRASE. @@ -167,7 +167,7 @@ The decryption process succeeded. This means, that either the correct secret key has been used or the correct passphrase for a conventional encrypted message was given. The program - itself may return an errorcode becuase it may not be possible to + itself may return an errorcode because it may not be possible to verify a signature for some reasons. NO_PUBKEY @@ -578,7 +578,7 @@ are not searched for and the order of the words doesn't matter (but see next option). -- exact=on. This switch tells the hkp server to only report exact mathing +- exact=on. This switch tells the hkp server to only report exact matching keys back. In this case the order and the "delimiters" are important. - fingerprint=on. Also reports the fingerprints when used with 'index' or @@ -592,7 +592,7 @@ /pks/lookup/?op= -this can be implemented using Hurd's translater mechanism. -However, I think the whole key server stuff has to be re-thougth; +this can be implemented using Hurd's translator mechanism. +However, I think the whole key server stuff has to be re-thought; I have some ideas and probably create a white paper. diff -urN gnupg-0.9.10/doc/FAQ gnupg-0.9.11/doc/FAQ --- gnupg-0.9.10/doc/FAQ Wed Jul 14 09:29:31 1999 +++ gnupg-0.9.11/doc/FAQ Tue Aug 31 09:29:42 1999 @@ -333,7 +333,7 @@ the displayed charset is the one you have activated on your system "iso-8859-1" is the most used one, so this is the default. You can change the charset with the option "--charset". It is important that - you active characterset matches the one displayed - if not, restrict + you active character set matches the one displayed - if not, restrict yourself to plain 7 bit ASCII and no mapping has to be done. Q: How do I transfer owner trust values from PGP to GnuPG? diff -urN gnupg-0.9.10/doc/HACKING gnupg-0.9.11/doc/HACKING --- gnupg-0.9.10/doc/HACKING Wed Jul 14 09:43:23 1999 +++ gnupg-0.9.11/doc/HACKING Tue Aug 31 09:29:42 1999 @@ -46,7 +46,7 @@ Special Tools ============= -Documention is based on the docbook DTD. Actually we have only the +Documentation is based on the docbook DTD. Actually we have only the man page for now. To build a man page you need the docbook-to-man tool and all the other thinks needed for SGML processing. Debian comes with the docbook tools and you only need this docbook-to-man @@ -203,7 +203,7 @@ cipher/cipher.c implements the interface to symmetric encryption functions. As usual you have a function to open a cipher (which returns a handle to be used with all other functions), some functions to set the key and other stuff and -a encrypt and decrypt function which does the real work. YOu probably know +a encrypt and decrypt function which does the real work. You probably know how to work with files - so it should really be easy to work with these functions. Here is an example: @@ -211,7 +211,7 @@ hd = cipher_open( CIPHER_ALGO_TWOFISH, CIPHER_MODE_CFB, 0 ); if( !hd ) - oops( use other funtion to check for the real error ); + oops( use other function to check for the real error ); rc = cipher_setkey( hd, key256bit, 32 ) ) if( rc ) oops( weak key or something like this ); diff -urN gnupg-0.9.10/doc/OpenPGP gnupg-0.9.11/doc/OpenPGP --- gnupg-0.9.10/doc/OpenPGP Tue Apr 6 19:35:34 1999 +++ gnupg-0.9.11/doc/OpenPGP Tue Aug 31 09:29:42 1999 @@ -39,7 +39,7 @@ * PGP 5.x does not accept V4 signatures for anything other than key material. The GnuPG option --force-v3-sigs mimics this - behaviour. + behavior. * PGP 5.x does not recognize the "five-octet" lengths in new-format headers or in signature subpacket lengths. diff -urN gnupg-0.9.10/doc/gpg.1 gnupg-0.9.11/doc/gpg.1 --- gnupg-0.9.10/doc/gpg.1 Wed Aug 4 09:52:42 1999 +++ gnupg-0.9.11/doc/gpg.1 Tue Aug 31 17:08:16 1999 @@ -263,13 +263,13 @@ in \fBfiles\fR (or stdin if not given); existing values will be overwritten\&. .IP "--print-md \fBalgo\fR [\fBfiles\fR]" 10 -Print message digest og algorithm ALGO for all given files of stdin\&. +Print message digest of algorithm ALGO for all given files of stdin\&. If "*" is used for the algorithm, digests for all available algorithms are printed\&. .IP "--gen-random \fB0|1|2\fR [\fBcount\fR]" 10 Emit COUNT random bytes of the given quality level\&. If count is not given -or zero, an endless sequenece of random bytes will be emitted\&. -PLEASE, don\&'t use this command unless you know waht you are doing, it may +or zero, an endless sequence of random bytes will be emitted\&. +PLEASE, don\&'t use this command unless you know what you are doing, it may remove precious entropy from the system! .IP "--gen-prime \fBmode\fR \fBbits\fR [\fBqbits\fR]" 10 Use the source, Luke :-)\&. The output format is still subject to change\&. @@ -462,6 +462,9 @@ .IP "--set-filename \fBstring\fR" 10 Use \fBstring\fR as the name of file which is stored in messages\&. +.IP "--use-embedded-filename" 10 +Try to create a file with a name as embedded in the data\&. +This can be a dangerous option as it allows to overwrite files\&. .IP "--completes-needed \fBn\fR" 10 Number of completely trusted users to introduce a new key signer (defaults to 1)\&. @@ -559,7 +562,7 @@ This option might not be implemented yet\&. .IP "--allow-non-selfsigned-uid" 10 Allow the import of keys with user IDs which are not self-signed\&. -This is only allows the import - key validation will fail und you +This is only allows the import - key validation will fail and you have to check the validity of the key my other means\&. This hack is needed for some German keys generated with pgp 2\&.6\&.3in\&. You should really avoid using it, because OpenPGP has better mechanics to do separate signing @@ -665,4 +668,4 @@ warning message about insecure memory your operating system supports locking without being root\&. The program drops root privileges as soon as locked memory is allocated\&. -...\" created by instant / docbook-to-man, Wed 04 Aug 1999, 09:52 +...\" created by instant / docbook-to-man, Tue 31 Aug 1999, 17:08 diff -urN gnupg-0.9.10/doc/gpg.sgml gnupg-0.9.11/doc/gpg.sgml --- gnupg-0.9.10/doc/gpg.sgml Wed Aug 4 09:51:20 1999 +++ gnupg-0.9.11/doc/gpg.sgml Tue Aug 31 16:32:01 1999 @@ -18,7 +18,7 @@ Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA -->