1 Noteworthy changes in version CVS-HEAD
2 ------------------------------------------------
4 * Interface changes relative to the 0.3.6 release:
5 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
6 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 Noteworthy changes in version 0.3.7 (2002-06-04)
9 ------------------------------------------------
11 * GPGME_ATTR_OTRUST is implemented now.
13 * A first step toward thread safeness has been achieved, see the
14 documentation for details. Supported thread libraries are pthread
17 Noteworthy changes in version 0.3.6 (2002-05-03)
18 ------------------------------------------------
20 * All error outout of the gpgsm backend is send to the bit bucket.
22 * The signature verification functions are extended. Instead of
23 always returning GPGME_SIG_STATUS_GOOD, the functions new codes for
24 expired signatures. 2 new functions may be used to retrieve more
25 detailed information like the signature expiration time and a
26 validity information of the key without an extra key looking.
28 * The current passphrase callback and progress meter callback can be
29 retrieved with the new functions gpgme_get_passphrase_cb and
30 gpgme_get_progress_cb respectively.
32 * Interface changes relative to the 0.3.5 release:
33 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
34 gpgme_get_passphrase_cb NEW
35 gpgme_get_progress_cb NEW
37 gpgme_data_set_encoding NEW
38 gpgme_data_get_encoding NEW
39 GPGME_SIG_STAT_GOOD_EXP NEW
40 GPGME_SIG_STAT_GOOD_EXPKEY NEW
41 gpgme_op_verify CHANGED: Returns more status codes.
42 GPGME_ATTR_SIG_STATUS NEW
43 gpgme_get_sig_string_attr NEW
44 gpgme_get_sig_ulong_attr NEW
45 gpgme_get_protocol NEW
46 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
48 Noteworthy changes in version 0.3.5 (2002-04-01)
49 ------------------------------------------------
51 * gpgme_op_encrypt can be called with RECIPIENTS being 0. In this
52 case, symmetric encryption is performed. Note that this requires a
53 passphrase from the user.
55 * More information is returned for X.509 certificates.
57 * Interface changes relative to the 0.3.4 release:
58 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
59 gpgme_op_encrypt EXTENDED: Symmetric encryption possible
60 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
62 Noteworthy changes in version 0.3.4 (2002-03-04)
63 ------------------------------------------------
65 * gpgme_op_encrypt does now fail with GPGME_Invalid_Recipients if
66 some recipients have been invalid, whereas earlier versions
67 succeeded in this case. The plaintext is still encrypted for all valid
68 recipients, so the application might take this error as a hint that
69 the ciphertext is not usable for all requested recipients.
70 Information about invalid recipients is available with gpgme_get_op_info.
72 * gpgme_op_verify now allows to pass an uninitialized data object as
73 its plaintext argument to check for normal and cleartext
74 signatures. The plaintext is then returned in the data object.
76 * New interfaces gpgme_set_include_certs and gpgme_get_include_certs
77 to set and get the number of certifications to include in S/MIME
80 * New interfaces gpgme_op_encrypt_sign and gpgme_op_encrypt_sign_start
81 to encrypt and sign a message in a combined operation.
83 * New interface gpgme_op_keylist_ext_start to search for multiple patterns.
85 * gpgme_key_get_ulong_attr supports the GPGME_ATTR_EXPIRE attribute.
87 * Interface changes relative to the 0.3.3 release:
88 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
89 gpgme_op_encrypt CHANGED: Can fail with GPGME_Invalid_Recipients
90 gpgme_op_verify EXTENDED: Accepts uninitialized text argument
91 gpgme_key_get_ulong_attr EXTENDED: Supports GPGME_ATTR_EXPIRE
92 gpgme_set_include_certs NEW
93 gpgme_get_include_certs NEW
94 gpgme_op_encrypt_sign NEW
95 gpgme_op_encrypt_sign_start NEW
96 gpgme_op_keylist_ext_start NEW
97 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
99 Noteworthy changes in version 0.3.3 (2002-02-12)
100 ------------------------------------------------
102 * Fix the Makefile in jnlib.
104 * Fix the test suite (hopefully). It should clean up all its state
105 with `make check' now.
108 Noteworthy changes in version 0.3.2 (2002-02-10)
109 ------------------------------------------------
111 * Remove erroneous dependency on libgcrypt in jnlib.
114 Noteworthy changes in version 0.3.1 (2002-02-09)
115 ------------------------------------------------
117 * There is a Texinfo manual documenting the API.
119 * The gpgme_set_keylist_mode function returns an error, and changed
120 its meaning. It is no longer usable to select between normal and
121 fast mode (newer versions of GnuPG will always be fast), but
122 selects between local keyring, remote keyserver, or both.
123 For this, two new macros are defined, GPGME_KEYLIST_MODE_LOCAL
124 and GPGME_KEYLIST_MODE_EXTERN. To make it possible to modify the
125 current setting, a fucntion gpgme_get_keylist_mode was added to
126 retrieve the current mode.
128 * gpgme_wait accepts a new argument STATUS to return the error status
129 of the operation on the context. Its definition is closer to
130 waitpid() now than before.
132 * The LENGTH argument to gpgme_data_new_from_filepart changed its
133 type from off_t to the unsigned size_t.
135 * The R_HD argument to the GpgmePassphraseCb type changed its type
136 from void* to void**.
138 * New interface gpgme_op_trustlist_end() to match
139 gpgme_op_keylist_end().
141 * The CryptPlug modules have been renamed to gpgme-openpgp and
142 gpgme-smime, and they are installed in pkglibdir by `make install'.
144 * An idle function can be registered with gpgme_register_idle().
146 * The GpgSM backend supports key generation with gpgme_op_genkey().
148 * Interface changes relative to the 0.3.0 release:
149 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
150 gpgme_data_new_from_filepart CHANGED: Type of LENGTH is size_t.
151 GpgmePassphraseCb CHANGED: Type of R_HD is void **.
152 gpgme_wait CHANGED: New argument STATUS.
153 gpgme_set_keylist_mode CHANGED: Type of return value is GpgmeError.
154 The function has a new meaning!
155 gpgme_get_keylist_mode NEW
156 GPGME_KEYLIST_MODE_LOCAL NEW
157 GPGME_KEYLIST_MODE_EXTERN NEW
158 gpgme_op_trustlist_next NEW
160 gpgme_register_idle NEW
161 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
163 Noteworthy changes in version 0.3.0 (2001-12-19)
164 ------------------------------------------------
166 * New interface gpgme_set_protocol() to set the protocol and thus the
167 crypto engine to be used by the context. Currently, the OpenPGP
168 and the CMS protocols are supported. They are specified by the new
169 preprocessor symbols GPGME_PROTOCOL_OpenPGP and GPGME_PROTOCOL_CMS.
170 A new context uses the OpenPGP engine by default.
172 * gpgme_get_engine_info() returns information for all crypto engines
173 compiled into the library. The XML format has changed. To
174 reliably get the version of a crypto engine, the <version> tag
175 after the appropriate <protocol> tag has to be looked for.
177 * New interface gpgme_engine_check_version(), obsoleting
178 gpgme_check_engine(). Check the version of all engines you are
179 supporting in your software.
181 * GpgmeKey lists the user ids in the order as they are returned by
182 GnuPG, first the primary key with index 0, then the sub-user ids.
184 * New operation gpgme_op_decrypt_verify() to decrypt and verify
185 signatures simultaneously.
187 * The new interface gpgme_op_keylist_end() terminates a pending
188 keylist operation. A keylist operation is also terminated when
189 gpgme_op_keylist_next() returns GPGME_EOF.
191 * GPGME can be compiled without GnuPG being installed (`--with-gpg=PATH'),
192 cross-compiled, or even compiled without support for GnuPG
195 * GPGME can be compiled with support for GpgSM (GnuPG for S/MIME,
196 `--with-gpgsm=PATH'). It is enabled by default if the `gpgsm' is found
197 in the path, but it can also be compiled without support for GpgSM
200 * CryptPlug modules for GPGME are included and can be enabled at
201 configure time (`--enable-gpgmeplug'). There is one module which
202 uses the GnuPG engine (`gpgmeplug') and one module which uses the
203 GpgSM engine (`gpgsmplug').
205 * Interface changes relative to the latest 0.2.x release:
206 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
207 gpgme_key_get_as_xml CHANGED: Sub-user ids reversed in order.
208 gpgme_key_get_string_attr CHANGED: User ids reversed in order.
209 gpgme_key_get_ulong_attr CHANGED: User ids reversed in order.
210 gpgme_get_engine_info CHANGED: New format, extended content.
211 gpgme_engine_check_version NEW
212 gpgme_decrypt_verify_start NEW
213 gpgme_decrypt_verify NEW
214 gpgme_op_keylist_next NEW
215 gpgme_set_protocol NEW
216 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
219 Noteworthy changes in version 0.2.3 (2001-09-17)
220 ------------------------------------------------
222 * New function gpgme_get_op_info which can be used to get the micalg
223 parameter needed for MOSS.
225 * New functions gpgme_get_armor and gpgme_get_textmode.
227 * The usual bug fixes and some minor functionality improvements.
229 * Added a simple encryption component for MS-Windows; however the
230 build procedure might have some problems.
233 Noteworthy changes in version 0.2.2 (2001-06-12)
234 ------------------------------------------------
236 * Implemented a key cache.
238 * Fixed a race condition under W32 and some other bug fixes.
241 Noteworthy changes in version 0.2.1 (2001-04-02)
242 ------------------------------------------------
244 * Changed debug output and GPGME_DEBUG variable (gpgme/debug.c)
246 * Handle GnuPG's new key capabilities output and support revocation
249 * Made the W32 support more robust.
252 Copyright 2001, 2002 g10 Code GmbH
254 This file is free software; as a special exception the author gives
255 unlimited permission to copy and/or distribute it, with or without
256 modifications, as long as this notice is preserved.
258 This file is distributed in the hope that it will be useful, but
259 WITHOUT ANY WARRANTY, to the extent permitted by law; without even the
260 implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.