summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorWerner Koch <wk@gnupg.org>2004-02-13 13:40:54 +0100
committerWerner Koch <wk@gnupg.org>2004-02-13 13:40:54 +0100
commite98b7a9b21bcc33a35a0e17df722a8773fc670aa (patch)
tree7a5a82832eae3c06e6a1a2ef3273f1fb191352d5
parent* encrypt.c (init_dek): Check for too weak algorithms. (diff)
downloadgnupg2-e98b7a9b21bcc33a35a0e17df722a8773fc670aa.tar.xz
gnupg2-e98b7a9b21bcc33a35a0e17df722a8773fc670aa.zip
Require libksba 0.9.4 and libgcrypt 1.1.92.
-rw-r--r--ChangeLog4
-rw-r--r--NEWS4
-rw-r--r--README16
-rw-r--r--TODO3
-rw-r--r--configure.ac4
5 files changed, 17 insertions, 14 deletions
diff --git a/ChangeLog b/ChangeLog
index 764573e50..10d115c75 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,7 @@
+2004-02-13 Werner Koch <wk@gnupg.org>
+
+ * configure.ac: Require libksba 0.9.4 and libgcrypt 1.1.92.
+
2004-02-12 Werner Koch <wk@gnupg.org>
* autogen.sh: Removed cruft from debugging.
diff --git a/NEWS b/NEWS
index 82f7e575e..41edd66af 100644
--- a/NEWS
+++ b/NEWS
@@ -5,6 +5,10 @@ Noteworthy changes in version 1.9.5
Cleaned up the build system to better comply with the coding
standards.
+ * The --import command is now able to autodetect pkcs#12 files and
+ import secret and private keys from this file format.
+
+
Noteworthy changes in version 1.9.4 (2004-01-30)
------------------------------------------------
diff --git a/README b/README
index 3eb745da7..5b4a69027 100644
--- a/README
+++ b/README
@@ -452,16 +452,12 @@ Some of the search modes are not yet implemented ;-)
HOW TO IMPORT A PRIVATE KEY
===========================
There is some limited support to import a private key from a PKCS-12
-file. Note, that this does only import the private key and not any
-certificates available in that file.
+file.
- gpgsm --call-protect-tool --p12-import --store foo.p12
+ gpgsm --import foo.p12
+
+This require that the gpg-agent is running.
-This require that the gpg-agent is running, alternative you may give
-the passphrase on the commandline using the option "-P <passphrase>" -
-however this is in general not a good idea. If that key already
-exists, the protect-tool refuses to store it unless you use the option
-"--force".
HOW TO EXPORT A PRIVATE KEY
===========================
@@ -474,13 +470,13 @@ format. However the certificate is not stored and there is no MAC applied.
SMARTCARD INTRO
===============
-GPG, the OpenPGP implementation supports the OpenPGP smartcard
+GPG, the OpenPGP part of GnuPG, supports the OpenPGP smartcard
(surprise!); see http://g10code.com/p-card.html.
[Fixme: We need to explain this further]
-GPGSM, the CMS (S/MIME) implementation supports two kinds of
+GPGSM, the CMS (S/MIME) part of GnuPG, supports two kinds of
smartcards. The most flexible way is to use PKCS#15 compliant cards,
however you must have build GnuPG with support for the OpenSC library.
The build process automagically detects the presence of this library
diff --git a/TODO b/TODO
index b45d74737..7f06e546b 100644
--- a/TODO
+++ b/TODO
@@ -64,8 +64,7 @@ might want to have an agent context for each service request
Remove the agent_reset_scd kludge.
* agent/protect-tool.c
-** Export and import certificates along with the secret key.
-** Make it more comfortable; i.e. copy files to the correct place.
+** Export certificates along with the secret key.
** BUG? --p12-export seems to work only with unprotected keys
* Move pkcs-1 encoding into libgcrypt.
diff --git a/configure.ac b/configure.ac
index 6b8c1994d..1faf753c0 100644
--- a/configure.ac
+++ b/configure.ac
@@ -30,9 +30,9 @@ AC_INIT(gnupg, 1.9.5-cvs, gnupg-devel@gnupg.org)
# sufficient.
development_version=yes
NEED_GPG_ERROR_VERSION=0.6
-NEED_LIBGCRYPT_VERSION=1.1.91
+NEED_LIBGCRYPT_VERSION=1.1.92
NEED_LIBASSUAN_VERSION=0.6.3
-NEED_KSBA_VERSION=0.9.3
+NEED_KSBA_VERSION=0.9.4
NEED_OPENSC_VERSION=0.8.0