summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--AUTHORS2
-rw-r--r--ChangeLog7
-rw-r--r--README13
-rw-r--r--THANKS2
-rw-r--r--cipher/cipher.c4
-rw-r--r--cipher/pubkey.c2
-rw-r--r--configure.in38
7 files changed, 60 insertions, 8 deletions
diff --git a/AUTHORS b/AUTHORS
index e7107b34..7ae8560f 100644
--- a/AUTHORS
+++ b/AUTHORS
@@ -48,7 +48,7 @@ Fixed a lot of typos.
TRANSLATIONS Walter Koch 1998-09-08
Disclaimer. [de]
-walterk@dip.de
+koch@hsp.de
TRANSLATIONS Gregory Steuck 1998-10-20
diff --git a/ChangeLog b/ChangeLog
index e9f3eab8..302812aa 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,10 @@
+Fri Jul 23 13:53:03 CEST 1999 Werner Koch <wk@isil.d.shuttle.de>
+
+
+ * VERSION: Set to 0.9.9.
+
+ * configure.in: Print a notice when rndunix is used.
+
Thu Jul 15 10:15:35 CEST 1999 Werner Koch <wk@isil.d.shuttle.de>
* acinclude.m4 (GNUPG_SYS_SYMBOL_UNDERSCORE): Fixed last modification.
diff --git a/README b/README
index 5de8defe..23b0021d 100644
--- a/README
+++ b/README
@@ -1,6 +1,8 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+
GnuPG - The GNU Privacy Guard
-------------------------------
- Version 0.9.8
+ Version 0.9.9
GnuPG is now in Beta test and you should report all bugs to the
mailing list (see below). The 0.9.x versions are released mainly
@@ -445,3 +447,12 @@
Have fun and remember: Echelon is looking at you kid.
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v0.9.8a (GNU/Linux)
+Comment: For info see http://www.gnupg.org
+
+iQB1AwUBN5g4Lx0Z9MEMmFelAQE+RwL/Ws+kNklTHJnABT8YU8BqN8x310DyUm+e
+ViS23npv3S/kRnHbCOOQo4cEjUYZFFrJXzQgodBvKbLVzMgdj4XQvkulTSBYK6pm
+B7GeQptWRCNJ7m+Hw0Z4gwJ7giQTdfF8
+=pJ7c
+-----END PGP SIGNATURE-----
diff --git a/THANKS b/THANKS
index 4f91ceed..d69fc4ef 100644
--- a/THANKS
+++ b/THANKS
@@ -92,7 +92,7 @@ Tomas Fasth tomas.fasth@twinspot.net
Thomas Mikkelsen tbm@image.dk
Ulf Möller 3umoelle@informatik.uni-hamburg.de
Urko Lusa ulusa@lacueva.ddns.org
-Walter Koch walterk@dip.de
+Walter Koch koch@hsp.de
Werner Koch werner.koch@guug.de
Wim Vandeputte bunbun@reptile.rug.ac.be
nbecker@hns.com
diff --git a/cipher/cipher.c b/cipher/cipher.c
index ac77e5b0..4a0e683d 100644
--- a/cipher/cipher.c
+++ b/cipher/cipher.c
@@ -260,7 +260,7 @@ disable_cipher_algo( int algo )
}
}
/* fixme: we should use a linked list */
- log_fatal("can't disable cipher algo %d: table full\n");
+ log_fatal("can't disable cipher algo %d: table full\n", algo );
}
/****************
@@ -396,7 +396,7 @@ cipher_setiv( CIPHER_HANDLE c, const byte *iv, unsigned ivlen )
if( iv ) {
if( ivlen != c->blocksize )
log_info("WARNING: cipher_setiv: ivlen=%u blklen=%u\n",
- ivlen, c->blocksize );
+ ivlen, (unsigned)c->blocksize );
if( ivlen > c->blocksize )
ivlen = c->blocksize;
memcpy( c->iv, iv, ivlen );
diff --git a/cipher/pubkey.c b/cipher/pubkey.c
index 548d2e81..a03af302 100644
--- a/cipher/pubkey.c
+++ b/cipher/pubkey.c
@@ -278,7 +278,7 @@ disable_pubkey_algo( int algo )
return;
}
}
- log_fatal("can't disable pubkey algo %d: table full\n");
+ log_fatal("can't disable pubkey algo %d: table full\n", algo );
}
diff --git a/configure.in b/configure.in
index d94a76a6..fcf9916a 100644
--- a/configure.in
+++ b/configure.in
@@ -50,6 +50,8 @@ case "$use_static_rnd" in
;;
esac
+
+
dnl
dnl See whether the user wants to disable checking for /dev/random
@@ -116,8 +118,11 @@ if test x$compile_libgcrypt = xyes ; then
else
compile_libgcrypt=no
AC_MSG_WARN([[
+***
*** LIBGCRYPT is not yet ready for public testing.
-*** Maybe you have more luck with the next release of GnuPG]])
+*** Maybe you have more luck with the next release of GnuPG
+*** Watch the gnupg-announce mailing list or the webpage.
+***]])
fi
fi
AM_CONDITIONAL(COMPILE_LIBGCRYPT, test x$compile_libgcrypt = xyes)
@@ -400,13 +405,15 @@ if test "$ac_cv_header_sys_capability_h" = "yes" ; then
fi
if test "$use_capabilities" = "no" ; then
AC_MSG_WARN([[
+***
*** The use of capabilities on this system is not possible.
*** You need a recent Linux kernel and some patches:
*** fcaps-2.2.9-990610.patch (kernel patch for 2.2.9)
*** fcap-module-990613.tar.gz (kernel module)
*** libcap-1.92.tar.gz (user mode library and utilities)
*** And you have to configure the kernel with CONFIG_VFS_CAP_PLUGIN
-*** set (filesystems menu). Be warned: This code is *really* ALPHA.]])
+*** set (filesystems menu). Be warned: This code is *really* ALPHA.
+***]])
fi
fi
@@ -455,6 +462,7 @@ dnl
dnl Figure out the default linkage mode for cipher modules
dnl
dnl (We always need a static rmd160)
+print_egd_notice=no
static_modules="$static_modules rmd160"
if test "$use_static_rnd" = default; then
if test "$ac_cv_have_dev_random" = yes; then
@@ -472,6 +480,7 @@ if test "$use_static_rnd" = default; then
;;
*)
static_modules="$static_modules rndunix"
+ print_egd_notice=yes
;;
esac
fi
@@ -480,9 +489,34 @@ else
:
else
static_modules="$static_modules rnd$use_static_rnd"
+ if test "$use_static_rnd" = "unix"; then
+ print_egd_notice=yes
+ fi
fi
fi
+
+if test "$print_egd_notice" = "yes"; then
+ AC_MSG_WARN([[
+***
+*** The performance of the UNIX random gatherer module is not very good
+*** and it does not keep the entropy pool over multiple invocations of
+*** GnuPG. The suggested way to overcome this problem is to use the
+***
+*** Entropy Gathering Daemon (EGD)
+***
+*** which provides a entropy source for the whole system. It is written
+*** in Perl and available at the GnuPG FTP servers. For more information
+*** consult the GnuPG webpages:
+***
+*** http://www.gnupg.org/donwload.html#egd
+***
+*** You may want to run ./configure with --enable-static-rnd=none to be
+*** able to load the EGD client code dynamically; this way you can choose
+*** between RNDUNIX and RNDEGD without recompilation.
+***]])
+fi
+
dnl
dnl Parse the modules list and build the list
dnl of static and dymically linked modules