diff options
-rw-r--r-- | AUTHORS | 2 | ||||
-rw-r--r-- | ChangeLog | 7 | ||||
-rw-r--r-- | README | 13 | ||||
-rw-r--r-- | THANKS | 2 | ||||
-rw-r--r-- | cipher/cipher.c | 4 | ||||
-rw-r--r-- | cipher/pubkey.c | 2 | ||||
-rw-r--r-- | configure.in | 38 |
7 files changed, 60 insertions, 8 deletions
@@ -48,7 +48,7 @@ Fixed a lot of typos. TRANSLATIONS Walter Koch 1998-09-08 Disclaimer. [de] -walterk@dip.de +koch@hsp.de TRANSLATIONS Gregory Steuck 1998-10-20 @@ -1,3 +1,10 @@ +Fri Jul 23 13:53:03 CEST 1999 Werner Koch <wk@isil.d.shuttle.de> + + + * VERSION: Set to 0.9.9. + + * configure.in: Print a notice when rndunix is used. + Thu Jul 15 10:15:35 CEST 1999 Werner Koch <wk@isil.d.shuttle.de> * acinclude.m4 (GNUPG_SYS_SYMBOL_UNDERSCORE): Fixed last modification. @@ -1,6 +1,8 @@ +-----BEGIN PGP SIGNED MESSAGE----- + GnuPG - The GNU Privacy Guard ------------------------------- - Version 0.9.8 + Version 0.9.9 GnuPG is now in Beta test and you should report all bugs to the mailing list (see below). The 0.9.x versions are released mainly @@ -445,3 +447,12 @@ Have fun and remember: Echelon is looking at you kid. +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v0.9.8a (GNU/Linux) +Comment: For info see http://www.gnupg.org + +iQB1AwUBN5g4Lx0Z9MEMmFelAQE+RwL/Ws+kNklTHJnABT8YU8BqN8x310DyUm+e +ViS23npv3S/kRnHbCOOQo4cEjUYZFFrJXzQgodBvKbLVzMgdj4XQvkulTSBYK6pm +B7GeQptWRCNJ7m+Hw0Z4gwJ7giQTdfF8 +=pJ7c +-----END PGP SIGNATURE----- @@ -92,7 +92,7 @@ Tomas Fasth tomas.fasth@twinspot.net Thomas Mikkelsen tbm@image.dk Ulf Möller 3umoelle@informatik.uni-hamburg.de Urko Lusa ulusa@lacueva.ddns.org -Walter Koch walterk@dip.de +Walter Koch koch@hsp.de Werner Koch werner.koch@guug.de Wim Vandeputte bunbun@reptile.rug.ac.be nbecker@hns.com diff --git a/cipher/cipher.c b/cipher/cipher.c index ac77e5b0..4a0e683d 100644 --- a/cipher/cipher.c +++ b/cipher/cipher.c @@ -260,7 +260,7 @@ disable_cipher_algo( int algo ) } } /* fixme: we should use a linked list */ - log_fatal("can't disable cipher algo %d: table full\n"); + log_fatal("can't disable cipher algo %d: table full\n", algo ); } /**************** @@ -396,7 +396,7 @@ cipher_setiv( CIPHER_HANDLE c, const byte *iv, unsigned ivlen ) if( iv ) { if( ivlen != c->blocksize ) log_info("WARNING: cipher_setiv: ivlen=%u blklen=%u\n", - ivlen, c->blocksize ); + ivlen, (unsigned)c->blocksize ); if( ivlen > c->blocksize ) ivlen = c->blocksize; memcpy( c->iv, iv, ivlen ); diff --git a/cipher/pubkey.c b/cipher/pubkey.c index 548d2e81..a03af302 100644 --- a/cipher/pubkey.c +++ b/cipher/pubkey.c @@ -278,7 +278,7 @@ disable_pubkey_algo( int algo ) return; } } - log_fatal("can't disable pubkey algo %d: table full\n"); + log_fatal("can't disable pubkey algo %d: table full\n", algo ); } diff --git a/configure.in b/configure.in index d94a76a6..fcf9916a 100644 --- a/configure.in +++ b/configure.in @@ -50,6 +50,8 @@ case "$use_static_rnd" in ;; esac + + dnl dnl See whether the user wants to disable checking for /dev/random @@ -116,8 +118,11 @@ if test x$compile_libgcrypt = xyes ; then else compile_libgcrypt=no AC_MSG_WARN([[ +*** *** LIBGCRYPT is not yet ready for public testing. -*** Maybe you have more luck with the next release of GnuPG]]) +*** Maybe you have more luck with the next release of GnuPG +*** Watch the gnupg-announce mailing list or the webpage. +***]]) fi fi AM_CONDITIONAL(COMPILE_LIBGCRYPT, test x$compile_libgcrypt = xyes) @@ -400,13 +405,15 @@ if test "$ac_cv_header_sys_capability_h" = "yes" ; then fi if test "$use_capabilities" = "no" ; then AC_MSG_WARN([[ +*** *** The use of capabilities on this system is not possible. *** You need a recent Linux kernel and some patches: *** fcaps-2.2.9-990610.patch (kernel patch for 2.2.9) *** fcap-module-990613.tar.gz (kernel module) *** libcap-1.92.tar.gz (user mode library and utilities) *** And you have to configure the kernel with CONFIG_VFS_CAP_PLUGIN -*** set (filesystems menu). Be warned: This code is *really* ALPHA.]]) +*** set (filesystems menu). Be warned: This code is *really* ALPHA. +***]]) fi fi @@ -455,6 +462,7 @@ dnl dnl Figure out the default linkage mode for cipher modules dnl dnl (We always need a static rmd160) +print_egd_notice=no static_modules="$static_modules rmd160" if test "$use_static_rnd" = default; then if test "$ac_cv_have_dev_random" = yes; then @@ -472,6 +480,7 @@ if test "$use_static_rnd" = default; then ;; *) static_modules="$static_modules rndunix" + print_egd_notice=yes ;; esac fi @@ -480,9 +489,34 @@ else : else static_modules="$static_modules rnd$use_static_rnd" + if test "$use_static_rnd" = "unix"; then + print_egd_notice=yes + fi fi fi + +if test "$print_egd_notice" = "yes"; then + AC_MSG_WARN([[ +*** +*** The performance of the UNIX random gatherer module is not very good +*** and it does not keep the entropy pool over multiple invocations of +*** GnuPG. The suggested way to overcome this problem is to use the +*** +*** Entropy Gathering Daemon (EGD) +*** +*** which provides a entropy source for the whole system. It is written +*** in Perl and available at the GnuPG FTP servers. For more information +*** consult the GnuPG webpages: +*** +*** http://www.gnupg.org/donwload.html#egd +*** +*** You may want to run ./configure with --enable-static-rnd=none to be +*** able to load the EGD client code dynamically; this way you can choose +*** between RNDUNIX and RNDEGD without recompilation. +***]]) +fi + dnl dnl Parse the modules list and build the list dnl of static and dymically linked modules |