summaryrefslogtreecommitdiff
path: root/README
diff options
context:
space:
mode:
authorWerner Koch <wk@gnupg.org>1998-03-09 21:43:50 +0000
committerWerner Koch <wk@gnupg.org>1998-03-09 21:43:50 +0000
commitb26d230c07a8e602e749adf8159ca9db3a509eaf (patch)
tree6d51347d0b8a02be57cd885c9e352b2b29df2594 /README
parent2a815f4a05881f8c19e1ce98230694339380c22f (diff)
downloadlibgcrypt-b26d230c07a8e602e749adf8159ca9db3a509eaf.tar.gz
partial DSA support
Diffstat (limited to 'README')
-rw-r--r--README11
1 files changed, 3 insertions, 8 deletions
diff --git a/README b/README
index 5815fc1c..664c8a32 100644
--- a/README
+++ b/README
@@ -3,8 +3,6 @@
-------------------------------
THIS IS ALPHA SOFTWARE, EXPECT BUGS AND UNIMPLEMENTED STUFF.
- IT MAY HAPPEN THAT SOME DATA FORMATS OR PROGRAMM OPTIONS
- CHANGE WITH THE NEXT VERSION.
On a Linux box (version 2.x.x, alpha or x86 CPU) it should
work reliable. You may create your key on such a machine and
@@ -105,7 +103,7 @@
8) Continue with step 4 if we did not find a prime in step 7.
9) Find a generator for that prime.
- You should make a revocation certificate in cases someone gets
+ You should make a revocation certificate in case someone gets
knowledge of your secret key or you forgot your passphrase:
gpg --gen-revoke your_user_id
@@ -208,12 +206,14 @@
"234567C4"
"0F34E556E"
"01347A56A"
+ "0xAB123456
* By a complete keyid:
"234AABBCC34567C4"
"0F323456784E56EAB"
"01AB3FED1347A5612"
+ "0x234AABBCC34567C4"
* By a fingerprint (not yet implemented):
@@ -280,11 +280,6 @@
you are asked for the passphrase, so that GNUPG is able to look at the
inner structure of a encrypted packet.
- gpgm --quick-random
-
- Do not use the stroing random generator but a faster one. This can be
- used to generate keys for tests; those are marked as insecure.
-
gpgm --list-trustdb
List the contents of the trustdb in a human readable format