summaryrefslogtreecommitdiff
path: root/README
diff options
context:
space:
mode:
authorWerner Koch <wk@gnupg.org>1998-02-13 20:58:46 +0000
committerWerner Koch <wk@gnupg.org>1998-02-13 20:58:46 +0000
commit19be043fd0bc1683edd1cc78d0b94c15dbec085f (patch)
treeefd94956d4a76671a78ec73687d847567785a7ea /README
parent5875b2a7be7f563e675738fa7d776fdac0b1dcfe (diff)
downloadlibgcrypt-19be043fd0bc1683edd1cc78d0b94c15dbec085f.tar.gz
added option export
Diffstat (limited to 'README')
-rw-r--r--README53
1 files changed, 34 insertions, 19 deletions
diff --git a/README b/README
index 91d3ac98..f5dc7a82 100644
--- a/README
+++ b/README
@@ -2,13 +2,24 @@
G10 - The GNU Encryption and Signing Tool
------------------------------------------
+ THIS IS ALPHA SOFTWARE, EXPECT BUGS AND UNIMPLEMENTED STUFF.
+ IT MAY HAPPEN THAT SOME DATA FORMATS OR PROGRAMM OPTIONS
+ CHANGE WITH THE NEXT VERSION.
- THIS IS VERSION IS ONLY A TEST VERSION ! YOU SHOULD NOT
- USE IT FOR OTHER PURPOSES THAN EVALUATING THE CURRENT CODE.
+ On a Linux box (version 2.x.x, alpha or x86 CPU) it should
+ work reliable. You may create your key on such a machine and
+ use it. Please verify the tar file; there is a PGP and a G10
+ signature available. My PGP key is well known and published in
+ the "Global Trust Register for 1998", ISBN 0-9532397-0-5.
- * The data format may change in the next version!
+ I have included my pubring as "g10/pubring.10", which contains
+ the key used to make G10 signatures:
+ "pub 1312G/FF3EAA0B 1998-02-09 Werner Koch <wk@isil.d.shuttle.de>"
+ "Key fingerprint = 8489 6CD0 1851 0E33 45DA CD67 036F 11B8 FF3E AA0B"
- * Some features are not yet implemented
+ You may add it to your G10 pubring and use it in the future to
+ verify new releases. Because you verified the tar file containing
+ this file here, you can be sure that the above fingerprint is correct.
Please subscribe to g10@net.lut.ac.uk by sending a mail with
@@ -42,11 +53,9 @@
Installation
------------
- 1) "./configure"
-
- to enable the integrated malloc debugging stuff, use:
+ See the file INSTALL. Here is a quick summary:
- "./configure --enable-m-debug"
+ 1) "./configure"
2) "make"
@@ -54,7 +63,10 @@
4) You end up with a binary "g10" in /usr/local/bin
- 5) create a directory ".g10" under your hoem directory ("mkdir ~/.g10")
+ 5) Optional, but suggested: install the program "g10" as suid root.
+
+ 6) Create a directory ".g10" under your home directory ("mkdir ~/.g10")
+
@@ -241,20 +253,20 @@
you are asked for the passphrase, so that G10 is able to look at the
inner structure of a encrypted packet.
- --quick-random
+ g10maint --quick-random
Do not use the stroing random generator but a faster one. This can be
used to generate keys for tests; those are marked as insecure.
- --list-trustdb
+ g10maint --list-trustdb
List the contents of the trustdb in a human readable format
- --list-trustdb <usernames>
+ g10maint --list-trustdb <usernames>
List the tree of certificates for the given usernames
- --list-trust-path depth username
+ g10maint --list-trust-path depth username
List the possible trust paths for the given username, up to the specified
depth. If depth is negative, duplicate introducers are not listed,
@@ -263,25 +275,25 @@
using a negative number). This option may create new entries in the
trustdb.
- --print-mds filenames
+ g10maint --print-mds filenames
List all available message digest values for the fiven filenames
- --gen-prime n
+ g10maint --gen-prime n
Generate and print a simple prime number of size n
- --gen-prime n q
+ g10maint --gen-prime n q
Generate a prime number suitable for ElGamal signatures of size n with
a q as largest primefactor of n-1.
- --gen-prime n q 1
+ g10maint --gen-prime n q 1
Ditto, but calculate a generator too.
- For more options/commands see the file g10/OPTIONS.
+ For more options/commands see the file g10/OPTIONS, or use "g10 --help"
Debug Flags
@@ -311,7 +323,10 @@
but for now I stick to my own formatting rules.
The primary FTP site is "ftp://ftp.guug.de/pub/gcrypt/"
- The primary WWW page is "http://www.d.shuttle.de/isil/g10.html"
+ The primary WWW page is "http://www.d.shuttle.de/isil/crypt/g10.html"
+
+ If you like, send your keys to <g10-keys@isil.d.shuttle.de>; use
+ "g10 --export --armor | mail g10-keys@isil.d.shuttle.de" to do this.
Please direct bug reports to <g10-bugs@isil.d.shuttle.de> or better
post them to the mailing list <g10@net.lut.ac.uk>.