-
release-dkgpg-1.1.392f4bc5e · ·
This is version 1.1.3 of DKGPG. This is a bugfix release that includes only three minor improvements: a direct-key signature (0x1f) for the primary key is added by default such that restricting key servers (e.g. keys.openpgp.org) can deliver a cryptographically checkable key without verification of any included user ID or without appended subkey. The command line interface of dkg-decrypt has been improved in order to give users an easy access to the symmetric-key decryption mode. An additional option ("-5") for dkg-sign allows to generate V5 signatures (cf. draft RFC 4880bis). Signed-off-by: Heiko Stamer <heikostamer@gmx.net>
-
release-dkgpg-1.1.2e5f50ade · ·
This is version 1.1.2 of DKGPG. This release adds a lot of features to some programs: two new options ("-K" and "-f") allow dkg-keysign to read the certification key from a keyring instead of a single key block file. Moreover, with option "-a" an interactive confirmation by the user is required for each signature. Passive support of V5 keys (cf. draft RFC 4880bis) has been added for all programs, however, dkg-generate still generates V4 keys only, because this new feature of the draft is not widely spread. There is also a new encryption capability: an empty KEYSPEC tells dkg-encrypt to create a symmetric-key encrypted session key, i.e., the user has to supply a passphrase for encryption and decryption without any public-key cryptography involved. Last but not least, two bugs have been fixed: First, dkg-decrypt failed on many ZIP-compressed OpenPGP messages with "ZLIB ERROR: -3 invalid block type" due to a bug in decompression logic. Second, dkg-decrypt failed in a special case of symmetric-key encrypted session keys. Finally, the non-installing program dkg-fuzzer (generates fuzzy samples of somehow corrupted OpenPGP stuctures) has been added. Signed-off-by: Heiko Stamer <heikostamer@gmx.net>
-
release-dkgpg-1.1.196e6578a · ·
This is version 1.1.1 of DKGPG. Some small improvements have been applied for dkg-generate: Two new options ("-u" and "-N") allow providing the initial user ID and to disable the passphrase at command line. Moreover, since this release dkg-timestamp and dkg-timestamp-verify require a special key usage flag from recent RFC 4880bis draft to select so-called timestamping keys. Finally, the synchronization time of the internally used broadcast protocol was reduced to a more reasonable amount and in dkg-decrypt the detection of end of data for message and decryption shares was changed. Signed-off-by: Heiko Stamer <heikostamer@gmx.net>
-
release-dkgpg-1.1.02a0a9b0f · ·
This is version 1.1.0 of DKGPG. In this release AEAD support (cf. draft RFC 4880bis) has been added for dkg-encrypt and dkg-decrypt. Please note that it requires LibTMCG version >= 1.3.16 and at least libgcrypt version >= 1.7.0 for OCB mode. Moreover, if dkg-generate is called with the new option "--timestamping" then a corresponding key usage flag from draft RFC 4880bis is set. Signed-off-by: Heiko Stamer <heikostamer@gmx.net>
-
-
-
-
-
-
-
-
-
-