1 Noteworthy changes in version 0.3.7 (2002-06-04)
2 ------------------------------------------------
4 * GPGME_ATTR_OTRUST is implemented now.
6 * A first step toward thread safeness has been achieved, see the
7 documentation for details. Supported thread libraries are pthread
10 Noteworthy changes in version 0.3.6 (2002-05-03)
11 ------------------------------------------------
13 * All error outout of the gpgsm backend is send to the bit bucket.
15 * The signature verification functions are extended. Instead of
16 always returning GPGME_SIG_STATUS_GOOD, the functions new codes for
17 expired signatures. 2 new functions may be used to retrieve more
18 detailed information like the signature expiration time and a
19 validity information of the key without an extra key looking.
21 * The current passphrase callback and progress meter callback can be
22 retrieved with the new functions gpgme_get_passphrase_cb and
23 gpgme_get_progress_cb respectively.
25 * Interface changes relative to the 0.3.5 release:
26 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
27 gpgme_get_passphrase_cb NEW
28 gpgme_get_progress_cb NEW
30 gpgme_data_set_encoding NEW
31 gpgme_data_get_encoding NEW
32 GPGME_SIG_STAT_GOOD_EXP NEW
33 GPGME_SIG_STAT_GOOD_EXPKEY NEW
34 gpgme_op_verify CHANGED: Returns more status codes.
35 GPGME_ATTR_SIG_STATUS NEW
36 gpgme_get_sig_string_attr NEW
37 gpgme_get_sig_ulong_attr NEW
38 gpgme_get_protocol NEW
39 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
41 Noteworthy changes in version 0.3.5 (2002-04-01)
42 ------------------------------------------------
44 * gpgme_op_encrypt can be called with RECIPIENTS being 0. In this
45 case, symmetric encryption is performed. Note that this requires a
46 passphrase from the user.
48 * More information is returned for X.509 certificates.
50 * Interface changes relative to the 0.3.4 release:
51 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
52 gpgme_op_encrypt EXTENDED: Symmetric encryption possible
53 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
55 Noteworthy changes in version 0.3.4 (2002-03-04)
56 ------------------------------------------------
58 * gpgme_op_encrypt does now fail with GPGME_Invalid_Recipients if
59 some recipients have been invalid, whereas earlier versions
60 succeeded in this case. The plaintext is still encrypted for all valid
61 recipients, so the application might take this error as a hint that
62 the ciphertext is not usable for all requested recipients.
63 Information about invalid recipients is available with gpgme_get_op_info.
65 * gpgme_op_verify now allows to pass an uninitialized data object as
66 its plaintext argument to check for normal and cleartext
67 signatures. The plaintext is then returned in the data object.
69 * New interfaces gpgme_set_include_certs and gpgme_get_include_certs
70 to set and get the number of certifications to include in S/MIME
73 * New interfaces gpgme_op_encrypt_sign and gpgme_op_encrypt_sign_start
74 to encrypt and sign a message in a combined operation.
76 * New interface gpgme_op_keylist_ext_start to search for multiple patterns.
78 * gpgme_key_get_ulong_attr supports the GPGME_ATTR_EXPIRE attribute.
80 * Interface changes relative to the 0.3.3 release:
81 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
82 gpgme_op_encrypt CHANGED: Can fail with GPGME_Invalid_Recipients
83 gpgme_op_verify EXTENDED: Accepts uninitialized text argument
84 gpgme_key_get_ulong_attr EXTENDED: Supports GPGME_ATTR_EXPIRE
85 gpgme_set_include_certs NEW
86 gpgme_get_include_certs NEW
87 gpgme_op_encrypt_sign NEW
88 gpgme_op_encrypt_sign_start NEW
89 gpgme_op_keylist_ext_start NEW
90 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
92 Noteworthy changes in version 0.3.3 (2002-02-12)
93 ------------------------------------------------
95 * Fix the Makefile in jnlib.
97 * Fix the test suite (hopefully). It should clean up all its state
98 with `make check' now.
101 Noteworthy changes in version 0.3.2 (2002-02-10)
102 ------------------------------------------------
104 * Remove erroneous dependency on libgcrypt in jnlib.
107 Noteworthy changes in version 0.3.1 (2002-02-09)
108 ------------------------------------------------
110 * There is a Texinfo manual documenting the API.
112 * The gpgme_set_keylist_mode function returns an error, and changed
113 its meaning. It is no longer usable to select between normal and
114 fast mode (newer versions of GnuPG will always be fast), but
115 selects between local keyring, remote keyserver, or both.
116 For this, two new macros are defined, GPGME_KEYLIST_MODE_LOCAL
117 and GPGME_KEYLIST_MODE_EXTERN. To make it possible to modify the
118 current setting, a fucntion gpgme_get_keylist_mode was added to
119 retrieve the current mode.
121 * gpgme_wait accepts a new argument STATUS to return the error status
122 of the operation on the context. Its definition is closer to
123 waitpid() now than before.
125 * The LENGTH argument to gpgme_data_new_from_filepart changed its
126 type from off_t to the unsigned size_t.
128 * The R_HD argument to the GpgmePassphraseCb type changed its type
129 from void* to void**.
131 * New interface gpgme_op_trustlist_end() to match
132 gpgme_op_keylist_end().
134 * The CryptPlug modules have been renamed to gpgme-openpgp and
135 gpgme-smime, and they are installed in pkglibdir by `make install'.
137 * An idle function can be registered with gpgme_register_idle().
139 * The GpgSM backend supports key generation with gpgme_op_genkey().
141 * Interface changes relative to the 0.3.0 release:
142 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
143 gpgme_data_new_from_filepart CHANGED: Type of LENGTH is size_t.
144 GpgmePassphraseCb CHANGED: Type of R_HD is void **.
145 gpgme_wait CHANGED: New argument STATUS.
146 gpgme_set_keylist_mode CHANGED: Type of return value is GpgmeError.
147 The function has a new meaning!
148 gpgme_get_keylist_mode NEW
149 GPGME_KEYLIST_MODE_LOCAL NEW
150 GPGME_KEYLIST_MODE_EXTERN NEW
151 gpgme_op_trustlist_next NEW
153 gpgme_register_idle NEW
154 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
156 Noteworthy changes in version 0.3.0 (2001-12-19)
157 ------------------------------------------------
159 * New interface gpgme_set_protocol() to set the protocol and thus the
160 crypto engine to be used by the context. Currently, the OpenPGP
161 and the CMS protocols are supported. They are specified by the new
162 preprocessor symbols GPGME_PROTOCOL_OpenPGP and GPGME_PROTOCOL_CMS.
163 A new context uses the OpenPGP engine by default.
165 * gpgme_get_engine_info() returns information for all crypto engines
166 compiled into the library. The XML format has changed. To
167 reliably get the version of a crypto engine, the <version> tag
168 after the appropriate <protocol> tag has to be looked for.
170 * New interface gpgme_engine_check_version(), obsoleting
171 gpgme_check_engine(). Check the version of all engines you are
172 supporting in your software.
174 * GpgmeKey lists the user ids in the order as they are returned by
175 GnuPG, first the primary key with index 0, then the sub-user ids.
177 * New operation gpgme_op_decrypt_verify() to decrypt and verify
178 signatures simultaneously.
180 * The new interface gpgme_op_keylist_end() terminates a pending
181 keylist operation. A keylist operation is also terminated when
182 gpgme_op_keylist_next() returns GPGME_EOF.
184 * GPGME can be compiled without GnuPG being installed (`--with-gpg=PATH'),
185 cross-compiled, or even compiled without support for GnuPG
188 * GPGME can be compiled with support for GpgSM (GnuPG for S/MIME,
189 `--with-gpgsm=PATH'). It is enabled by default if the `gpgsm' is found
190 in the path, but it can also be compiled without support for GpgSM
193 * CryptPlug modules for GPGME are included and can be enabled at
194 configure time (`--enable-gpgmeplug'). There is one module which
195 uses the GnuPG engine (`gpgmeplug') and one module which uses the
196 GpgSM engine (`gpgsmplug').
198 * Interface changes relative to the latest 0.2.x release:
199 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
200 gpgme_key_get_as_xml CHANGED: Sub-user ids reversed in order.
201 gpgme_key_get_string_attr CHANGED: User ids reversed in order.
202 gpgme_key_get_ulong_attr CHANGED: User ids reversed in order.
203 gpgme_get_engine_info CHANGED: New format, extended content.
204 gpgme_engine_check_version NEW
205 gpgme_decrypt_verify_start NEW
206 gpgme_decrypt_verify NEW
207 gpgme_op_keylist_next NEW
208 gpgme_set_protocol NEW
209 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
212 Noteworthy changes in version 0.2.3 (2001-09-17)
213 ------------------------------------------------
215 * New function gpgme_get_op_info which can be used to get the micalg
216 parameter needed for MOSS.
218 * New functions gpgme_get_armor and gpgme_get_textmode.
220 * The usual bug fixes and some minor functionality improvements.
222 * Added a simple encryption component for MS-Windows; however the
223 build procedure might have some problems.
226 Noteworthy changes in version 0.2.2 (2001-06-12)
227 ------------------------------------------------
229 * Implemented a key cache.
231 * Fixed a race condition under W32 and some other bug fixes.
234 Noteworthy changes in version 0.2.1 (2001-04-02)
235 ------------------------------------------------
237 * Changed debug output and GPGME_DEBUG variable (gpgme/debug.c)
239 * Handle GnuPG's new key capabilities output and support revocation
242 * Made the W32 support more robust.
245 Copyright 2001, 2002 g10 Code GmbH
247 This file is free software; as a special exception the author gives
248 unlimited permission to copy and/or distribute it, with or without
249 modifications, as long as this notice is preserved.
251 This file is distributed in the hope that it will be useful, but
252 WITHOUT ANY WARRANTY, to the extent permitted by law; without even the
253 implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.