mirror of the now-defunct rocklinux.org
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

57 lines
2.3 KiB

  1. [COPY] --- ROCK-COPYRIGHT-NOTE-BEGIN ---
  2. [COPY]
  3. [COPY] This copyright note is auto-generated by ./scripts/Create-CopyPatch.
  4. [COPY] Please add additional copyright information _after_ the line containing
  5. [COPY] the ROCK-COPYRIGHT-NOTE-END tag. Otherwise it might get removed by
  6. [COPY] the ./scripts/Create-CopyPatch script. Do not edit this copyright text!
  7. [COPY]
  8. [COPY] ROCK Linux: rock-src/package/base/gnupg/gnupg.desc
  9. [COPY] ROCK Linux is Copyright (C) 1998 - 2003 Clifford Wolf
  10. [COPY]
  11. [COPY] This program is free software; you can redistribute it and/or modify
  12. [COPY] it under the terms of the GNU General Public License as published by
  13. [COPY] the Free Software Foundation; either version 2 of the License, or
  14. [COPY] (at your option) any later version. A copy of the GNU General Public
  15. [COPY] License can be found at Documentation/COPYING.
  16. [COPY]
  17. [COPY] Many people helped and are helping developing ROCK Linux. Please
  18. [COPY] have a look at http://www.rocklinux.org/ and the Documentation/TEAM
  19. [COPY] file for details.
  20. [COPY]
  21. [COPY] --- ROCK-COPYRIGHT-NOTE-END ---
  22. [I] The GNU Privacy Guard
  23. [T] GnuPG is GNU's tool for secure communication and data storage.
  24. [T] It can be used to encrypt data and to create digital signatures.
  25. [T] It includes an advanced key management facility and is compliant
  26. [T] with the proposed OpenPGP Internet standard as described in RFC2440.
  27. [T]
  28. [T] Because GnuPG does not use use any patented algorithm it cannot be
  29. [T] compatible with PGP2 versions. PGP 2.x uses IDEA (which is patented
  30. [T] worldwide).
  31. [T]
  32. [T] The default algorithms are DSA and ElGamal. ElGamal for signing
  33. [T] is still available, but because of the larger size of such
  34. [T] signatures it is deprecated (Please note that the GnuPG
  35. [T] implementation of ElGamal signatures is *not* insecure). Symmetric
  36. [T] algorithms are: 3DES, Blowfish, CAST5 and Twofish (GnuPG does not
  37. [T] yet create Twofish encrypted messages because there is no agreement
  38. [T] in the OpenPGP WG on how to use it together with a MDC algorithm)
  39. [T] Digest algorithms available are MD5, RIPEMD160 and SHA1.
  40. [A] Werner Koch <wk@gnupg.org> {Maintainer}
  41. [M] Clifford Wolf <clifford@clifford.at>
  42. [C] base/tool
  43. [L] GPL
  44. [S] Stable
  45. [V] 1.2.4
  46. [P] X -----5---9 262.000
  47. [SRC] pg
  48. [D] 3841770975 gnupg-1.2.4.tar.gz ftp://ftp.gnupg.org/gcrypt/gnupg/
  49. [D] 3598666848 pgpgpg-0.13.tar.gz http://www.nessie.de/mroth/pgpgpg/