Mailing List Archive

Libgcrypt 1.7.1 released
Hello!

The GnuPG Project is pleased to announce the availability of Libgcrypt
version 1.7.1. This is a maintenace release.

Libgcrypt is a general purpose library of cryptographic building blocks.
It is originally based on code used by GnuPG. It does not provide any
implementation of OpenPGP or other protocols. Thorough understanding of
applied cryptography is required to use Libgcrypt.


Noteworthy changes in version 1.7.1
===================================

* Bug fixes:

- Fix ecc_verify for cofactor support.

- Fix portability bug when using gcc with Solaris 9 SPARC.

- Build fix for OpenBSD/amd64

- Add OIDs to the Serpent ciphers.

* Internal changes:

- Use getrandom system call on Linux if available.

- Blinding is now also used for RSA signature creation.

- Changed names of debug envvars


Download
========

Source code is hosted at the GnuPG FTP server and its mirrors as listed
at https://gnupg.org/download/mirrors.html . On the primary server
the source tarball and its digital signature are:

ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.7.1.tar.bz2 (2776k)
ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.7.1.tar.bz2.sig

That file is bzip2 compressed. A gzip compressed version is here:

ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.7.1.tar.gz (3314k)
ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.7.1.tar.gz.sig

The same files are also available via HTTP:

https://gnupg.org/ftp/gcrypt/libgcrypt/libgcrypt-1.7.1.tar.bz2
https://gnupg.org/ftp/gcrypt/libgcrypt/libgcrypt-1.7.1.tar.bz2.sig
https://gnupg.org/ftp/gcrypt/libgcrypt/libgcrypt-1.7.1.tar.gz
https://gnupg.org/ftp/gcrypt/libgcrypt/libgcrypt-1.7.1.tar.gz.sig

In order to check that the version of Libgcrypt you downloaded is an
original and unmodified file please follow the instructions found at
<https://gnupg.org/download/integrity_check.html>. In short, you may
use one of the following methods:

- Check the supplied OpenPGP signature. For example to check the
signature of the file libgcrypt-1.7.1.tar.bz2 you would use this
command:

gpg --verify libgcrypt-1.7.1.tar.bz2.sig libgcrypt-1.7.1.tar.bz2

This checks whether the signature file matches the source file. You
should see a message indicating that the signature is good and made
by one or more of the release signing keys.

- If you are not able to use GnuPG, you have to verify the SHA-1
checksum:

sha1sum libgcrypt-1.7.1.tar.bz2

and check that the output matches the first line from the
this list:

b688add52b622bb96bbd823ba21aa05a116d442f libgcrypt-1.7.1.tar.bz2
7310ed270c3a98b74acb58bcc95a2b4f596417cb libgcrypt-1.7.1.tar.gz

You should also verify that the checksums above are authentic by
matching them with copies of this announcement. Those copies can be
found at other mailing lists, web sites, and search engines.


Copying
=======

Libgcrypt is distributed under the terms of the GNU Lesser General
Public License (LGPLv2.1+). The helper programs as well as the
documentation are distributed under the terms of the GNU General Public
License (GPLv2+). The file LICENSES has notices about contributions
that require that these additional notices are distributed.


Support
=======

For help on developing with Libgcrypt you should read the included
manual and optional ask on the gcrypt-devel mailing list [1]. A
listing with commercial support offers for Libgcrypt and related
software is available at the GnuPG web site [2].

If you are a developer and you may need a certain feature for your
project, please do not hesitate to bring it to the gcrypt-devel
mailing list for discussion.

Maintenance and development of Libgcrypt is mostly financed by
donations; see <https://gnupg.org/donate/>. We currently employ
3 full-time developers, one part-timer, and one contractor to work on
GnuPG and closely related software like Libgcrypt.


Thanks
======

We like to thank all the people who helped with this release, be it
testing, coding, translating, suggesting, auditing, administering the
servers, spreading the word, and answering questions on the mailing
lists. Also many thanks to all our donors [3].


For the GnuPG hackers,

Werner



p.s.
This is an announcement only mailing list. Please send replies only to
the gcrypt-devel 'at' gnupg.org mailing list.


[1] https://lists.gnupg.org/mailman/listinfo/gcrypt-devel
[2] https://www.gnupg.org/service.html
[3] https://gnupg.org/donate/kudos.html
--
Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.
/* EFH in Erkrath: https://alt-hochdahl.de/haus */