./security/gnupg2, GnuPG with OpenPGP and S/MIME capabilities

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]

Branch: CURRENT, Version: 2.2.11nb1, Package name: gnupg2-2.2.11nb1, Maintainer: ada

GnuPG 2.2 provides several utilities that are used by mail clients,
such as Kmail and Balsa, including OpenPGP and S/MIME support. GnuPG
2.2 has a different architecture than GnuPG 1.4 in that it splits up
functionality into several modules. However, both versions may be
installed alongside without any conflict. The advantage of GnuPG-1 is
its smaller size and the lack of dependency on other modules at run
and build time.

Required to run:
[security/libgpg-error] [security/libksba] [security/libgcrypt] [security/pinentry] [security/libassuan2] [devel/libusb1] [devel/npth]

Required to build:

Package options: bzip2, libusb-1, zlib

Master sites:

SHA1: c762d300c6c5616c14abff1cfaa099baa5fcbd2c
RMD160: 4c5312475f573bbc28888fa34c693c5be1742b70
Filesize: 6496.563 KB

Version history: (Expand)

CVS history: (Expand)

   2018-12-09 19:52:52 by Adam Ciarcinski | Files touched by this commit (724)
Log message:
revbump after updating textproc/icu
   2018-11-07 12:59:08 by Adam Ciarcinski | Files touched by this commit (3) | Package updated
Log message:
gnupg2: updated to 2.2.11

Noteworthy changes in version 2.2.11:

* gpgsm: Fix CRL loading when intermediate certicates are not yet

* gpgsm: Fix an error message about the digest algo.

* gpg: Fix a wrong warning due to new sign usage check introduced
  with 2.2.9.

* gpg: Print the "data source" even for an unsuccessful keyserver

* gpg: Do not store the TOFU trust model in the trustdb.  This
  allows to enable or disable a TOFO model without triggering a
  trustdb rebuild.

* scd: Fix cases of "Bad PIN" after using "forcesig".

* agent: Fix possible hang in the ssh handler.

* dirmngr: Tack the unmodified mail address to a WKD request.  See
  commit a2bd4a64e5b057f291a60a9499f881dd47745e2f for details.

* dirmngr: Tweak diagnostic about missing LDAP server file.

* dirmngr: In verbose mode print the OCSP responder id.

* dirmngr: Fix parsing of the LDAP port.

* wks: Add option --directory/-C to the server.  Always build the
  server on Unix systems.

* wks: Add option --with-colons to the client.  Support sites which
  use the policy file instead of the submission-address file.

* Fix EBADF when gpg et al. are called by broken CGI scripts.

* Fix some minor memory leaks and bugs.
   2018-09-05 17:41:12 by Ryo ONODERA | Files touched by this commit (2) | Package updated
Log message:
Update to 2.2.10

Noteworthy changes in version 2.2.10 (2018-08-30)

  gpg: Refresh expired keys originating from the WKD.  [#2917]

  gpg: Use a 256 KiB limit for a WKD imported key.

  gpg: New option --known-notation.  [#4060]

  scd: Add support for the Trustica Cryptoucan reader.

  agent: Speed up starting during on-demand launching.  [#3490]

  dirmngr: Validate SRV records in WKD queries.
   2018-07-20 05:34:33 by Ryo ONODERA | Files touched by this commit (705)
Log message:
Recursive revbump from textproc/icu-62.1
   2018-07-16 03:00:22 by Ryo ONODERA | Files touched by this commit (2) | Package updated
Log message:
Update to 2.2.9

Noteworthy changes in version 2.2.9 (2018-07-12)

  * dirmngr: Fix recursive resolver mode and other bugs in the libdns
    code.  [#3374,#3803,#3610]

  * dirmngr: When using libgpg-error 1.32 or later a GnuPG build with
    NTBTLS support (e.g. the standard Windows installer) does not
    anymore block for dozens of seconds before returning data.

  * gpg: Fix bug in --show-keys which actually imported revocation
    certificates.  [#4017]

  * gpg: Ignore too long user-ID and comment packets.  [#4022]

  * gpg: Fix crash due to bad German translation.  Improved printf
    format compile time check.

  * gpg: Handle missing ISSUER sub packet gracefully in the presence of
    the new ISSUER_FPR.  [#4046]

  * gpg: Allow decryption using several passphrases in most cases.

  * gpg: Command --show-keys now enables the list options
    show-unusable-uids, show-unusable-subkeys, show-notations and
    show-policy-urls by default.

  * gpg: Command --show-keys now prints revocation certificates. [#4018]

  * gpg: Add revocation reason to the "rev" and "rvs" \ 
records of the
    option --with-colons.  [#1173]

  * gpg: Export option export-clean does now remove certain expired
    subkeys; export-minimal removes all expired subkeys.  [#3622]

  * gpg: New "usage" property for the drop-subkey filters.  [#4019]

  Release-info: https://dev.gnupg.org/T4036

  See-also: gnupg-announce/2018q3/000427.html
   2018-06-17 09:47:31 by Thomas Klausner | Files touched by this commit (1)
Log message:
gnupg2: fix libgpg-error dependency pattern.

Reported by Oskar on pkgsrc-users.
   2018-06-09 20:08:34 by Leonardo Taccari | Files touched by this commit (2) | Package updated
Log message:
gnupg2: Update security/gnupg to 2.2.8

Noteworthy changes in version 2.2.8 (2018-06-08)
  * gpg: Decryption of messages not using the MDC mode will now lead
    to a hard failure even if a legacy cipher algorithm was used.  The
    option --ignore-mdc-error can be used to turn this failure into a
    warning.  Take care: Never use that option unconditionally or
    without a prior warning.
  * gpg: The MDC encryption mode is now always used regardless of the
    cipher algorithm or any preferences.  For testing --rfc2440 can be
    used to create a message without an MDC.
  * gpg: Sanitize the diagnostic output of the original file name in
    verbose mode.  [#4012, CVE-2018-12020]
  * gpg: Detect suspicious multiple plaintext packets in a more
    reliable way.  [#4000]
  * gpg: Fix the duplicate key signature detection code.  [#3994]
  * gpg: The options --no-mdc-warn, --force-mdc, --no-force-mdc,
    --disable-mdc and --no-disable-mdc have no more effect.
  * agent: Add DBUS_SESSION_BUS_ADDRESS and a few other envvars to the
    list of startup environment variables.  [#3947]
   2018-06-08 21:59:01 by Jonathan Perkin | Files touched by this commit (1)
Log message:
gnupg2: Also add a SUPERSEDES entry.