|
|
@ -0,0 +1,55 @@ |
|
|
|
|
|
|
|
[COPY] --- ROCK-COPYRIGHT-NOTE-BEGIN --- |
|
|
|
[COPY] |
|
|
|
[COPY] This copyright note is auto-generated by ./scripts/Create-CopyPatch. |
|
|
|
[COPY] Please add additional copyright information _after_ the line containing |
|
|
|
[COPY] the ROCK-COPYRIGHT-NOTE-END tag. Otherwise it might get removed by |
|
|
|
[COPY] the ./scripts/Create-CopyPatch script. Do not edit this copyright text! |
|
|
|
[COPY] |
|
|
|
[COPY] ROCK Linux: rock-src/package/base/gnupg2/gnupg2.desc |
|
|
|
[COPY] ROCK Linux is Copyright (C) 1998 - 2003 Clifford Wolf |
|
|
|
[COPY] |
|
|
|
[COPY] This program is free software; you can redistribute it and/or modify |
|
|
|
[COPY] it under the terms of the GNU General Public License as published by |
|
|
|
[COPY] the Free Software Foundation; either version 2 of the License, or |
|
|
|
[COPY] (at your option) any later version. A copy of the GNU General Public |
|
|
|
[COPY] License can be found at Documentation/COPYING. |
|
|
|
[COPY] |
|
|
|
[COPY] Many people helped and are helping developing ROCK Linux. Please |
|
|
|
[COPY] have a look at http://www.rocklinux.org/ and the Documentation/TEAM |
|
|
|
[COPY] file for details. |
|
|
|
[COPY] |
|
|
|
[COPY] --- ROCK-COPYRIGHT-NOTE-END --- |
|
|
|
|
|
|
|
[I] The GNU Privacy Guard |
|
|
|
|
|
|
|
[T] GnuPG is GNU's tool for secure communication and data storage. |
|
|
|
[T] It can be used to encrypt data and to create digital signatures. |
|
|
|
[T] It includes an advanced key management facility and is compliant |
|
|
|
[T] with the proposed OpenPGP Internet standard as described in RFC2440. |
|
|
|
[T] |
|
|
|
[T] Because GnuPG does not use use any patented algorithm it cannot be |
|
|
|
[T] compatible with PGP2 versions. PGP 2.x uses IDEA (which is patented |
|
|
|
[T] worldwide). |
|
|
|
[T] |
|
|
|
[T] The default algorithms are DSA and ElGamal. ElGamal for signing |
|
|
|
[T] is still available, but because of the larger size of such |
|
|
|
[T] signatures it is deprecated (Please note that the GnuPG |
|
|
|
[T] implementation of ElGamal signatures is *not* insecure). Symmetric |
|
|
|
[T] algorithms are: 3DES, Blowfish, CAST5 and Twofish (GnuPG does not |
|
|
|
[T] yet create Twofish encrypted messages because there is no agreement |
|
|
|
[T] in the OpenPGP WG on how to use it together with a MDC algorithm) |
|
|
|
[T] Digest algorithms available are MD5, RIPEMD160 and SHA1. |
|
|
|
|
|
|
|
[A] Werner Koch <wk@gnupg.org> {Maintainer} |
|
|
|
[M] Daniel Jahre <daja@rocklinux.org> |
|
|
|
|
|
|
|
[C] base/tool |
|
|
|
|
|
|
|
[L] GPL |
|
|
|
[S] Stable |
|
|
|
[V] 1.9.10 |
|
|
|
[P] X -----5---9 118.200 |
|
|
|
|
|
|
|
[D] 2393466693 gnupg-1.9.10.tar.gz ftp://ftp.gnupg.org/gcrypt/alpha/gnupg/ |
|
|
|
|