1 * The signature verfication functions are extended. Instead of
2 always returning GPGME_SIG_STATUS_GOOD, the functions return more
3 specific codes for expired signatures. 2 new functions may be used
4 to retrieve more specific information like the signature expiartion
5 time and a validut information of the key without looking up the key.
7 * The current passphrase callback and progress meter callback can be
8 retrieved with the new functions gpgme_get_passphrase_cb and
9 gpgme_get_progress_cb respectively.
11 * Interface changes relative to the 0.3.5 release:
12 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
13 gpgme_get_passphrase_cb NEW
14 gpgme_get_progress_cb NEW
16 gpgme_data_set_encoding NEW
17 gpgme_data_get_encoding NEW
18 GPGME_SIG_STAT_GOOD_EXP NEW
19 GPGME_SIG_STAT_GOOD_EXPKEY NEW
20 gpgme_op_verify CHANGED: Returns more status codes.
21 GPGME_ATTR_SIG_STATUS NEW
22 gpgme_get_sig_string_attr NEW
23 gpgme_get_sig_ulong_attr NEW
24 gpgme_get_protocol NEW
25 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
27 Noteworthy changes in version 0.3.5 (2002-04-01)
28 ------------------------------------------------
30 * gpgme_op_encrypt can be called with RECIPIENTS being 0. In this
31 case, symmetric encryption is performed. Note that this requires a
32 passphrase from the user.
34 * More information is returned for X.509 certificates.
36 * Interface changes relative to the 0.3.4 release:
37 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
38 gpgme_op_encrypt EXTENDED: Symmetric encryption possible
39 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
41 Noteworthy changes in version 0.3.4 (2002-03-04)
42 ------------------------------------------------
44 * gpgme_op_encrypt does now fail with GPGME_Invalid_Recipients if
45 some recipients have been invalid, whereas earlier versions
46 succeeded in this case. The plaintext is still encrypted for all valid
47 recipients, so the application might take this error as a hint that
48 the ciphertext is not usable for all requested recipients.
49 Information about invalid recipients is available with gpgme_get_op_info.
51 * gpgme_op_verify now allows to pass an uninitialized data object as
52 its plaintext argument to check for normal and cleartext
53 signatures. The plaintext is then returned in the data object.
55 * New interfaces gpgme_set_include_certs and gpgme_get_include_certs
56 to set and get the number of certifications to include in S/MIME
59 * New interfaces gpgme_op_encrypt_sign and gpgme_op_encrypt_sign_start
60 to encrypt and sign a message in a combined operation.
62 * New interface gpgme_op_keylist_ext_start to search for multiple patterns.
64 * gpgme_key_get_ulong_attr supports the GPGME_ATTR_EXPIRE attribute.
66 * Interface changes relative to the 0.3.3 release:
67 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
68 gpgme_op_encrypt CHANGED: Can fail with GPGME_Invalid_Recipients
69 gpgme_op_verify EXTENDED: Accepts uninitialized text argument
70 gpgme_key_get_ulong_attr EXTENDED: Supports GPGME_ATTR_EXPIRE
71 gpgme_set_include_certs NEW
72 gpgme_get_include_certs NEW
73 gpgme_op_encrypt_sign NEW
74 gpgme_op_encrypt_sign_start NEW
75 gpgme_op_keylist_ext_start NEW
76 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
78 Noteworthy changes in version 0.3.3 (2002-02-12)
79 ------------------------------------------------
81 * Fix the Makefile in jnlib.
83 * Fix the test suite (hopefully). It should clean up all its state
84 with `make check' now.
87 Noteworthy changes in version 0.3.2 (2002-02-10)
88 ------------------------------------------------
90 * Remove erroneous dependency on libgcrypt in jnlib.
93 Noteworthy changes in version 0.3.1 (2002-02-09)
94 ------------------------------------------------
96 * There is a Texinfo manual documenting the API.
98 * The gpgme_set_keylist_mode function returns an error, and changed
99 its meaning. It is no longer usable to select between normal and
100 fast mode (newer versions of GnuPG will always be fast), but
101 selects between local keyring, remote keyserver, or both.
102 For this, two new macros are defined, GPGME_KEYLIST_MODE_LOCAL
103 and GPGME_KEYLIST_MODE_EXTERN. To make it possible to modify the
104 current setting, a fucntion gpgme_get_keylist_mode was added to
105 retrieve the current mode.
107 * gpgme_wait accepts a new argument STATUS to return the error status
108 of the operation on the context. Its definition is closer to
109 waitpid() now than before.
111 * The LENGTH argument to gpgme_data_new_from_filepart changed its
112 type from off_t to the unsigned size_t.
114 * The R_HD argument to the GpgmePassphraseCb type changed its type
115 from void* to void**.
117 * New interface gpgme_op_trustlist_end() to match
118 gpgme_op_keylist_end().
120 * The CryptPlug modules have been renamed to gpgme-openpgp and
121 gpgme-smime, and they are installed in pkglibdir by `make install'.
123 * An idle function can be registered with gpgme_register_idle().
125 * The GpgSM backend supports key generation with gpgme_op_genkey().
127 * Interface changes relative to the 0.3.0 release:
128 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
129 gpgme_data_new_from_filepart CHANGED: Type of LENGTH is size_t.
130 GpgmePassphraseCb CHANGED: Type of R_HD is void **.
131 gpgme_wait CHANGED: New argument STATUS.
132 gpgme_set_keylist_mode CHANGED: Type of return value is GpgmeError.
133 The function has a new meaning!
134 gpgme_get_keylist_mode NEW
135 GPGME_KEYLIST_MODE_LOCAL NEW
136 GPGME_KEYLIST_MODE_EXTERN NEW
137 gpgme_op_trustlist_next NEW
139 gpgme_register_idle NEW
140 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
142 Noteworthy changes in version 0.3.0 (2001-12-19)
143 ------------------------------------------------
145 * New interface gpgme_set_protocol() to set the protocol and thus the
146 crypto engine to be used by the context. Currently, the OpenPGP
147 and the CMS protocols are supported. They are specified by the new
148 preprocessor symbols GPGME_PROTOCOL_OpenPGP and GPGME_PROTOCOL_CMS.
149 A new context uses the OpenPGP engine by default.
151 * gpgme_get_engine_info() returns information for all crypto engines
152 compiled into the library. The XML format has changed. To
153 reliably get the version of a crypto engine, the <version> tag
154 after the appropriate <protocol> tag has to be looked for.
156 * New interface gpgme_engine_check_version(), obsoleting
157 gpgme_check_engine(). Check the version of all engines you are
158 supporting in your software.
160 * GpgmeKey lists the user ids in the order as they are returned by
161 GnuPG, first the primary key with index 0, then the sub-user ids.
163 * New operation gpgme_op_decrypt_verify() to decrypt and verify
164 signatures simultaneously.
166 * The new interface gpgme_op_keylist_end() terminates a pending
167 keylist operation. A keylist operation is also terminated when
168 gpgme_op_keylist_next() returns GPGME_EOF.
170 * GPGME can be compiled without GnuPG being installed (`--with-gpg=PATH'),
171 cross-compiled, or even compiled without support for GnuPG
174 * GPGME can be compiled with support for GpgSM (GnuPG for S/MIME,
175 `--with-gpgsm=PATH'). It is enabled by default if the `gpgsm' is found
176 in the path, but it can also be compiled without support for GpgSM
179 * CryptPlug modules for GPGME are included and can be enabled at
180 configure time (`--enable-gpgmeplug'). There is one module which
181 uses the GnuPG engine (`gpgmeplug') and one module which uses the
182 GpgSM engine (`gpgsmplug').
184 * Interface changes relative to the latest 0.2.x release:
185 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
186 gpgme_key_get_as_xml CHANGED: Sub-user ids reversed in order.
187 gpgme_key_get_string_attr CHANGED: User ids reversed in order.
188 gpgme_key_get_ulong_attr CHANGED: User ids reversed in order.
189 gpgme_get_engine_info CHANGED: New format, extended content.
190 gpgme_engine_check_version NEW
191 gpgme_decrypt_verify_start NEW
192 gpgme_decrypt_verify NEW
193 gpgme_op_keylist_next NEW
194 gpgme_set_protocol NEW
195 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
198 Noteworthy changes in version 0.2.3 (2001-09-17)
199 ------------------------------------------------
201 * New function gpgme_get_op_info which can be used to get the micalg
202 parameter needed for MOSS.
204 * New functions gpgme_get_armor and gpgme_get_textmode.
206 * The usual bug fixes and some minor functionality improvements.
208 * Added a simple encryption component for MS-Windows; however the
209 build procedure might have some problems.
212 Noteworthy changes in version 0.2.2 (2001-06-12)
213 ------------------------------------------------
215 * Implemented a key cache.
217 * Fixed a race condition under W32 and some other bug fixes.
220 Noteworthy changes in version 0.2.1 (2001-04-02)
221 ------------------------------------------------
223 * Changed debug output and GPGME_DEBUG variable (gpgme/debug.c)
225 * Handle GnuPG's new key capabilities output and support revocation
228 * Made the W32 support more robust.
231 Copyright 2001, 2002 g10 Code GmbH
233 This file is free software; as a special exception the author gives
234 unlimited permission to copy and/or distribute it, with or without
235 modifications, as long as this notice is preserved.
237 This file is distributed in the hope that it will be useful, but
238 WITHOUT ANY WARRANTY, to the extent permitted by law; without even the
239 implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.