version 1.1.3

This commit is contained in:
NIIBE Yutaka
2014-04-16 13:26:47 +09:00
parent 85b2698bb3
commit 272875ee76
4 changed files with 23 additions and 12 deletions

View File

@@ -1,3 +1,7 @@
2014-04-16 Niibe Yutaka <gniibe@fsij.org>
* VERSION: 1.1.3.
2014-04-15 Niibe Yutaka <gniibe@fsij.org> 2014-04-15 Niibe Yutaka <gniibe@fsij.org>
* src/ecc-mont.c: New. * src/ecc-mont.c: New.

5
NEWS
View File

@@ -2,9 +2,12 @@ Gnuk NEWS - User visible changes
* Major changes in Gnuk 1.1.3 * Major changes in Gnuk 1.1.3
Released 2014-04-??, by NIIBE Yutaka Released 2014-04-16, by NIIBE Yutaka
** Experimental EdDSA support. ** Experimental EdDSA support.
After configure, you can edit the DEFS variable in src/Makefile, so
that Gnuk can support EdDSA with Ed25519 (for authentication). Note
that this is pretty much experimental, and subjects to change.
* Major changes in Gnuk 1.1.2 * Major changes in Gnuk 1.1.2

24
README
View File

@@ -1,21 +1,23 @@
Gnuk - An Implementation of USB Cryptographic Token for GnuPG Gnuk - An Implementation of USB Cryptographic Token for GnuPG
Version 1.1.2 Version 1.1.3
2014-03-07 2014-04-16
Niibe Yutaka Niibe Yutaka
Free Software Initiative of Japan Free Software Initiative of Japan
Warning Warning
======= =======
This is another experimental release of Gnuk, version 1.1.2, which has This is another experimental release of Gnuk, version 1.1.3, which has
incompatible changes to Gnuk 1.0.x. Specifically, it now supports incompatible changes to Gnuk 1.0.x. Specifically, it now supports
overriding key import, but importing keys (or generating keys) results overriding key import, but importing keys (or generating keys) results
password reset. Please update your documentation for Gnuk Token, so password reset. Please update your documentation for Gnuk Token, so
that the instruction of importing keys won't cause any confusion. It that the instruction of importing keys won't cause any confusion. It
has support of ECDSA (with NIST P256 and secp256k1), but this feature has supports of ECDSA (with NIST P256 and secp256k1) and EdDSA with
is pretty much experimental, and it requires development version of EdDSA, but this feature is pretty much experimental, and it requires
GnuPG with newest version of libgcrypt. development version of GnuPG with newest version of libgcrypt. You
will not able to keep using EdDSA keys, as the key format is subject
to change.
What's Gnuk? What's Gnuk?
@@ -56,7 +58,7 @@ A0: Good points of Gnuk are:
Q1: What kind of key algorithm is supported? Q1: What kind of key algorithm is supported?
A1: Gnuk version 1.0 only supports 2048-bit RSA. A1: Gnuk version 1.0 only supports 2048-bit RSA.
Development version of Gnuk (1.1.x) supports 256-bit ECDSA. Development version of Gnuk (1.1.x) supports 256-bit ECDSA and EdDSA.
Q2: How long does it take for digital signing? Q2: How long does it take for digital signing?
A2: It takes a second and a half or so. A2: It takes a second and a half or so.
@@ -129,9 +131,11 @@ Release notes
This is third experimental release in version 1.1 series of Gnuk. This is third experimental release in version 1.1 series of Gnuk.
While it is daily use by its developer, some newly introduced features While it is daily use by its developer, some newly introduced features
(including ECDSA, key generation and firmware upgrade) should be (including ECDSA/EdDSA, key generation and firmware upgrade) should be
considered experimental. ECDSA is really experimental. The feature considered experimental. ECDSA/EdDSA is really experimental. The
even requires manual edit of Makefile after 'configure'. feature even requires manual edit of Makefile after 'configure'.
More, EdDSA is much experimental. You won't be able to keep using
the EdDSA key, as it is subject to change.
Tested features are: Tested features are:

View File

@@ -1 +1 @@
release/1.1.2 release/1.1.3