summaryrefslogtreecommitdiff
path: root/security/gnupg/patches
diff options
context:
space:
mode:
authorwiz <wiz@pkgsrc.org>2003-12-25 14:05:02 +0000
committerwiz <wiz@pkgsrc.org>2003-12-25 14:05:02 +0000
commit01549326044d975685f69a50da0a7053c7ce002c (patch)
treef39da602a872f3758271a41a9edef7c78f73917b /security/gnupg/patches
parent203a8096811b0eb22af31c55b3abc43d0a6115e3 (diff)
downloadpkgsrc-01549326044d975685f69a50da0a7053c7ce002c.tar.gz
Update to 1.2.4:
* Added read-only support for BZIP2 compression. This should be considered experimental, and is only available if the libbzip2 library <http://sources.redhat.com/bzip2/> is installed. * Added the ability to handle messages that can be decrypted with either a passphrase or a secret key. * Most support for Elgamal sign+encrypt keys has been removed. Old signatures may still be verified, and existing encrypted messages may still be decrypted, but no new signatures may be issued by, and no new messages will be encrypted to, these keys. Elgamal sign+encrypt keys are not part of the web of trust. The only new message that can be generated by an Elgamal sign+encrypt key is a key revocation. Note that in a future version of GnuPG (currently planned for 1.4), all support for Elgamal sign+encrypt keys will be removed, so take this opportunity to revoke old keys now. * A Russian translation is included again as well as a new Belarusian translation.
Diffstat (limited to 'security/gnupg/patches')
-rw-r--r--security/gnupg/patches/patch-ac9
-rw-r--r--security/gnupg/patches/patch-ad9
-rw-r--r--security/gnupg/patches/patch-ae8
-rw-r--r--security/gnupg/patches/patch-af9
-rw-r--r--security/gnupg/patches/patch-ai35
-rw-r--r--security/gnupg/patches/patch-aj43
6 files changed, 16 insertions, 97 deletions
diff --git a/security/gnupg/patches/patch-ac b/security/gnupg/patches/patch-ac
index 2164e752c43..6789dc9dbca 100644
--- a/security/gnupg/patches/patch-ac
+++ b/security/gnupg/patches/patch-ac
@@ -1,11 +1,10 @@
-$NetBSD: patch-ac,v 1.13 2003/08/15 07:02:23 itojun Exp $
+$NetBSD: patch-ac,v 1.14 2003/12/25 14:05:02 wiz Exp $
ftp://ftp.kame.net/pub/kame/misc/gnupg-1.2.2-IPv6.diff.gz
-diff -u -r1.1.1.1 -r1.2
---- config.h.in 15 Aug 2003 05:12:06 -0000 1.1.1.1
-+++ config.h.in 15 Aug 2003 06:44:46 -0000 1.2
-@@ -537,3 +537,4 @@
+--- config.h.in.orig Tue Dec 23 20:28:49 2003
++++ config.h.in
+@@ -553,3 +553,4 @@
#include "g10defs.h"
diff --git a/security/gnupg/patches/patch-ad b/security/gnupg/patches/patch-ad
index cf38f216181..984a339f55e 100644
--- a/security/gnupg/patches/patch-ad
+++ b/security/gnupg/patches/patch-ad
@@ -1,11 +1,10 @@
-$NetBSD: patch-ad,v 1.4 2003/08/15 07:02:23 itojun Exp $
+$NetBSD: patch-ad,v 1.5 2003/12/25 14:05:02 wiz Exp $
ftp://ftp.kame.net/pub/kame/misc/gnupg-1.2.2-IPv6.diff.gz
-diff -u -r1.1.1.1 -r1.2
---- util/http.c 15 Aug 2003 05:12:28 -0000 1.1.1.1
-+++ util/http.c 15 Aug 2003 06:44:46 -0000 1.2
-@@ -753,6 +753,28 @@
+--- util/http.c.orig Tue Dec 23 18:33:34 2003
++++ util/http.c
+@@ -751,6 +751,28 @@ connect_server( const char *server, usho
sock_close (sd);
return -1;
}
diff --git a/security/gnupg/patches/patch-ae b/security/gnupg/patches/patch-ae
index 9b851535d57..4d911bf1d69 100644
--- a/security/gnupg/patches/patch-ae
+++ b/security/gnupg/patches/patch-ae
@@ -1,8 +1,8 @@
-$NetBSD: patch-ae,v 1.5 2003/08/25 21:25:26 itojun Exp $
+$NetBSD: patch-ae,v 1.6 2003/12/25 14:05:02 wiz Exp $
---- configure.ac.orig 2003-08-22 04:45:43.000000000 +0900
-+++ configure.ac 2003-08-26 06:21:17.000000000 +0900
-@@ -602,7 +602,7 @@
+--- configure.ac.orig Tue Dec 23 20:20:58 2003
++++ configure.ac
+@@ -609,7 +609,7 @@ AC_CHECK_FUNCS(strerror stpcpy strsep st
AC_CHECK_FUNCS(strcasecmp strncasecmp ctermid times)
AC_CHECK_FUNCS(memmove gettimeofday getrusage setrlimit clock_gettime)
AC_CHECK_FUNCS(atexit raise getpagesize strftime nl_langinfo setlocale)
diff --git a/security/gnupg/patches/patch-af b/security/gnupg/patches/patch-af
index 73b2de7c858..805fc8d8bd9 100644
--- a/security/gnupg/patches/patch-af
+++ b/security/gnupg/patches/patch-af
@@ -1,11 +1,10 @@
-$NetBSD: patch-af,v 1.3 2003/08/15 07:02:23 itojun Exp $
+$NetBSD: patch-af,v 1.4 2003/12/25 14:05:02 wiz Exp $
ftp://ftp.kame.net/pub/kame/misc/gnupg-1.2.2-IPv6.diff.gz
-diff -u -r1.1.1.1 -r1.2
---- configure 15 Aug 2003 05:12:08 -0000 1.1.1.1
-+++ configure 15 Aug 2003 06:47:49 -0000 1.2
-@@ -13111,7 +13111,7 @@
+--- configure.orig Tue Dec 23 20:28:22 2003
++++ configure
+@@ -13579,7 +13579,7 @@ done
diff --git a/security/gnupg/patches/patch-ai b/security/gnupg/patches/patch-ai
deleted file mode 100644
index 52deafefc02..00000000000
--- a/security/gnupg/patches/patch-ai
+++ /dev/null
@@ -1,35 +0,0 @@
-$NetBSD: patch-ai,v 1.1 2003/11/27 23:46:36 heinz Exp $
-
---- g10/keygen.c.orig Mon Jul 28 20:34:41 2003
-+++ g10/keygen.c
-@@ -958,8 +958,6 @@ ask_algo (int addmode, unsigned int *r_u
- tty_printf( _(" (%d) DSA (sign only)\n"), 2 );
- if( addmode )
- tty_printf( _(" (%d) ElGamal (encrypt only)\n"), 3 );
-- if (opt.expert)
-- tty_printf( _(" (%d) ElGamal (sign and encrypt)\n"), 4 );
- tty_printf( _(" (%d) RSA (sign only)\n"), 5 );
- if (addmode)
- tty_printf( _(" (%d) RSA (encrypt only)\n"), 6 );
-@@ -989,21 +987,6 @@ ask_algo (int addmode, unsigned int *r_u
- algo = PUBKEY_ALGO_RSA;
- *r_usage = PUBKEY_USAGE_SIG;
- break;
-- }
-- else if( algo == 4 && opt.expert)
-- {
-- tty_printf(_(
--"The use of this algorithm is only supported by GnuPG. You will not be\n"
--"able to use this key to communicate with PGP users. This algorithm is also\n"
--"very slow, and may not be as secure as the other choices.\n"));
--
-- if( cpr_get_answer_is_yes("keygen.algo.elg_se",
-- _("Create anyway? ")))
-- {
-- algo = PUBKEY_ALGO_ELGAMAL;
-- *r_usage = PUBKEY_USAGE_ENC | PUBKEY_USAGE_SIG;
-- break;
-- }
- }
- else if( algo == 3 && addmode ) {
- algo = PUBKEY_ALGO_ELGAMAL_E;
diff --git a/security/gnupg/patches/patch-aj b/security/gnupg/patches/patch-aj
deleted file mode 100644
index 5f26d5ca4e5..00000000000
--- a/security/gnupg/patches/patch-aj
+++ /dev/null
@@ -1,43 +0,0 @@
-$NetBSD: patch-aj,v 1.1 2003/11/27 23:46:36 heinz Exp $
-
---- g10/getkey.c.orig Mon Jul 28 20:34:41 2003
-+++ g10/getkey.c
-@@ -1049,7 +1049,11 @@ get_seckey_byname2( GETKEY_CTX *retctx,
- ctx.items[0].mode = KEYDB_SEARCH_MODE_FIRST;
- rc = lookup( &ctx, &kb, 1 );
- if (!rc && sk )
-- sk_from_block ( &ctx, sk, kb );
-+ {
-+ sk_from_block ( &ctx, sk, kb );
-+ if(sk->pubkey_algo==PUBKEY_ALGO_ELGAMAL)
-+ rc=G10ERR_UNU_SECKEY;
-+ }
- release_kbnode ( kb );
- get_seckey_end( &ctx );
- }
-@@ -1655,6 +1659,11 @@ merge_selfsigs_main( KBNODE keyblock, in
- if ( x ) /* mask it down to the actual allowed usage */
- key_usage &= x;
- }
-+
-+ /* Type 20 Elgamal keys are not usable. */
-+ if(pk->pubkey_algo==PUBKEY_ALGO_ELGAMAL)
-+ key_usage=0;
-+
- pk->pubkey_usage = key_usage;
-
- if ( !key_expire_seen ) {
-@@ -1869,6 +1878,13 @@ merge_selfsigs_subkey( KBNODE keyblock,
- if ( x ) /* mask it down to the actual allowed usage */
- key_usage &= x;
- }
-+
-+ /* Type 20 Elgamal subkeys or any subkey on a type 20 primary are
-+ not usable. */
-+ if(mainpk->pubkey_algo==PUBKEY_ALGO_ELGAMAL
-+ || subpk->pubkey_algo==PUBKEY_ALGO_ELGAMAL)
-+ key_usage=0;
-+
- subpk->pubkey_usage = key_usage;
-
- p = parse_sig_subpkt (sig->hashed, SIGSUBPKT_KEY_EXPIRE, NULL);