From patchwork Fri May 22 19:53:25 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Adolf Belka X-Patchwork-Id: 9852 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange x25519 server-signature ECDSA (secp384r1 raw public key) server-digest SHA384 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mail01.haj.ipfire.org", Issuer "R12" (not verified)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4gMbYn2khVz3wpk for ; Fri, 22 May 2026 19:53:33 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange x25519) (Client CN "mail02.haj.ipfire.org", Issuer "E8" (not verified)) by mail01.ipfire.org (Postfix) with ESMTPS id 4gMbYm1Pczz6FP for ; Fri, 22 May 2026 19:53:32 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [IPv6:::1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4gMbYm0bc9z2yn4 for ; Fri, 22 May 2026 19:53:32 +0000 (UTC) X-Original-To: development@lists.ipfire.org Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange x25519) (Client CN "mail01.haj.ipfire.org", Issuer "R12" (not verified)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4gMbYj3syMz2xSM for ; Fri, 22 May 2026 19:53:29 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange x25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4gMbYj14Wrz1y9; Fri, 22 May 2026 19:53:29 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1779479609; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=tuvw521zXcrrQBwRxS2C9khyk9Vx7hK0uQSIxXoFn1Q=; b=2q5F7WbkKZLkmiBP4RA0mUjVvWkIXIcaV9efhCK2uE3RgfThMny2fCKFWYX9FNeiudwfPj vOVlYYDAYwrRh5Bg== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1779479609; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=tuvw521zXcrrQBwRxS2C9khyk9Vx7hK0uQSIxXoFn1Q=; b=JOknY7lJ3LmBg5CmV9oX+1UGBBY3rQG7mUhGFQP7SfH4MN81I6qS95Tb8IKy5Q3fr5C1XM NO0XHZQQ43S0/PMlEv1jETYLt+Yd06CATfmIzHXa4KoUTyQKYk9XhkYppHoH+3DURxrQCE Z0VRpBxQgzojDkfQ3nwAx9LUEtOm8wsxxo3aco1hCaBOfoCScvkE89z/AvY/XmNG38ms5E 8+gjB/PMP6yQspDsk3zhc5eg6wlNYD4xTp7fluPnu34pPCovilzYYwjMVe0XBBIwtgwDwb M0L6/BjDJdT1i0jp2ElFvS3PjG7e9rDrew5TIlO0wU2KcJMz9VfUpWOmguqWNA== From: Adolf Belka To: development@lists.ipfire.org Cc: Adolf Belka Subject: [PATCH] gnupg: Update to version 2.5.20 Date: Fri, 22 May 2026 21:53:25 +0200 Message-ID: <20260522195325.3592446-2-adolf.belka@ipfire.org> In-Reply-To: <20260522195325.3592446-1-adolf.belka@ipfire.org> References: <20260522195325.3592446-1-adolf.belka@ipfire.org> Precedence: list List-Id: List-Subscribe: , List-Unsubscribe: , List-Post: List-Help: Sender: Mail-Followup-To: MIME-Version: 1.0 - Update from version 2.4.9 to 2.5.20 - Update of rootfile - I missed that the stable branch had been changed from 2.4.x to 2.5.x so there have been a lot of versions from 2.5.0 to 2.5.20 - Branch 2.4.x (oldstable) becomes EOL on 30th July 2026. - Changelog 2.5.20 * New and extended features: - gpgsm: Implement GCM encryption. Note that decryption works since version 2.3.2. [T3979] - gpgsm: New option --attribute and server command SETATTR to include arbitrary signed or unsigned attributes into a signature. Enable only with libksba 1.7.0 or later. [T4537] - gpgsm: Introduce system attribute _signingCertificateV2. [rG0335a9cb04] * Bug fixes: - gpg: Fix wrong assertion failure which could very rarely occur during key signature checking. [rG693f5642f6] - gpg: Consider certify-only keys for revocation signature check. [T8196] - gpgsm: Fix possible double free in the CMS parser. [T8240] - gpgsm: Fix possible too early removal of ephemeral keys. [T8236] - gpgsm: Avoid emitting a final FAILURE status line if --status-fd is not used. [rG69c27fe377] - gpgsm: Fix a regression in 2.5.19 for password encrypted GCM data. [rG60a823c97b] - agent: Fix not using cache for pinentry loopback. [rGd4b608a31f] - agent: Fix command PUT_SECRET by saving input line. [rG1875bc185e] - keyboxd: Mark keys searched but not imported via LDAP correctly as ephemeral. [T8048] - scdaemon: Avoid buffer overflow with SC-HSM cards providing RSA keys > 2k. [T8244] - dirmngr: Fix uninitialized use of the dns_any union in dns_rr_cmp. [T8251] 2.5.19 * New and extended features: - gpg: New option --use-ocb-sym. [rGccdcdfbb37] - gpg: New options --show-[only-]session-hash. [rGecd0f7afa1] - gpgsm: Allow cipher mode to be part of the algo given to the --cipher-algo option. [T3979] - gpgsm: Emit more details when failing to check a crlDP. [T8221] - agent: Improve pinentry behavior and texts in smartcard context. [T6425] - dirmngr: New keyword "clear" for --keyserver. [rG2ab4cba36c] * Bug fixes: - gpg: Fix edge case in --refresh-keys. [T8197] - gpg: Don't call gcry_kdf_derive with empty passphrase. [T7739] - gpgsm: Skip the optional PKCS#12 PBES2 keyLength parameter to allow import of recently issued certificates by the German Telekom. [rGc8c9604bba] - gpgsm: Fix a bug so that a certificate can be signed using a different algo. [rG66fdafab3c] - gpgsm: Make GCM fully compliant in de-vs mode. [rG04fd775fce] - gpgsm: Add a certificate chain check for de-vs compliance. [T8188] - gpgsm: Show rsaPSS certificates as de-vs compliant in listings. [T8222] - agent: Rework the trustlist reading code to finally allow a trustlist.txt with a missing trailing LF. [T8078] - ssh: Fix RSA padding in signature handling. [T7882,T8202] - gpgtar: Fix -C (--directory) to check the output directory. [T8159] * Other changes: - agent: Raise an error when p >= q for RSA keys to detect incorrect generated *PGP keys. [T8171] 2.5.18 * gpg: Support deleting a composite secret key in gpg-agent. [T7875] * gpg: Fix armor parsing when no CRC is found. [T7071] * gpgsm: New option --assert-validsig. [rG9500b2c776] * agent: Fix the recent regression in pkdecrypt with TPM RSA. [T8045] * scdaemon: Add support for D-Trust Card 6.1/6.4. [rG987c6a398a] * dirmngr: Let KS_SEARCH print all uid records for a key. Fixes regression since 2015. [rG2dde9ddf56] * gpg-authcode-sign.sh: Keep the log file even on success. [rGc0f9ca47f0] 2.5.17 * agent: Fix stack buffer overflow when using gpgsm and KEM. This was introduced with 2.5.13; see the advisory. [T8044] * tpm: Fix possible buffer overflow in PKDECRYPT. [T8045] * gpg: Fix possible NULL-deref with overlong signature packets. [T8049] * gpg: New export-option "keep-expired-subkeys". [T7990] * gpgsm: Make multiple search patterns work with keyboxd. [T8026] * agent: Add accelerator keys for "Wrong" and "Correct". [T8055] * dirmngr: Help detection of bad keyserver configurations. [T7730] 2.5.16 * gpg: Fix a regression in 2.5.15 which created new keys with just the fallback preferences. [T7909] 2.5.15 * gpg: Fix a validation bug when using keyboxd. [T7983] * gpg: Deprecate the option --not-dash-escaped and ignore the NotDashEscaped armor header. [T7901] * keyboxd: Fix migration to new schema. [T7892,rG81bb949755] * dirmngr: New compatibility flag "ocsp-sha256-certid" to support forthcoming libksba versions. [rG674aa54242] * Use a synchronous spawning method for the daemon processes under Windows. [T7716] * Avoid the function name thread_init to fix building on AIX. [T7958] * New translation to Georgian. 2.5.14 * gpg: Fix possible memory corruption in the armor parser. [T7906] * gpgsm: Fix output of card serial number in colon listing. [T7914] * agent:ssh: Fix RSA signature handling for newer spec. [T7882] * gpg: Improve/relax the checking of preference options. [rG6570700fdd] * gpg: Fix the check for the END armor line. [rG62b8bf2f39] * gpg: Do not present a default when asking for another output filename. [T7908] * gpg: Include ADSK keys in key listings specified by fingerprints. [T7892] * agent: Fix a decryption failures if the pinentry dialog for the first tried recipient is canceled. Regression since 2.5.7. [T7893, T7649] * keyboxd: Fix schema of the fingerprint table. [T7892] * dirmngr: Fix OCSP next-update check. [rG9ef87bcdb0] * gpg: New "pfc" record in colons key listings. [T7897] * gpg: Allow import and export of Kyber secret keys. [T7315] * gpg: Escape characters with the high bit set in NOTATION status lines. [T7896] * gpg: New import option "force-update". [T7892,rGf6237ccd31] * agent: Accept a trustlist with a missing LF at the end. [rG1b4ac98de7] * agent: Support protection for Kyber keys. [T6638,rGaea62817f3] * scd:nks: Make newer TCOS signature cards work. [rG17596e830f] 2.5.13 * gpg: Fix de-vs compliance with OCB and additional password. [T7804] * gpg: Detect duplicate keys with --add-recipients. [T1825] * gpg: Take care about the prefix for cv25519 encryption. [T7649] * gpg: Avoid potential downgrade to SHA1 in 3rd party key signatures. [T7904,rGdb9705ef59] * gpg: Error out on unverified output for non-detached signatures. [T7903,rG8abc320f2a] * gpgsm: Use KEM interface for en- and decryption. [T7811,T7845] * gpgsm: Fix delete and store certificate locking glitches. [T7855] * gpg,gpgsm: Run keybox compression only when there are no other users. [T7855] * gpg,gpgsm: Improve keybox closing and locking order on read and write. [T7855] * gpg,gpgsm: Always use share mode read-write for the keybox file access. [T7829] * scd:openpgp: Fix an oddity in changing the PIN. [T7840] * dirmngr: New LDAP keyserver flag "upload". [T7866] * agent: Retry private key deletion in case of sharing violations for up to 400ms. [T7863] * Take care of a possible race on daemon startup under Windows. [T7829] * Improve file renaming on Windows in case of a sharing violation error. [T7829] 2.5.12 * gpg: New options --[no-]auto-key-upload. [T7333] * gpg: Keys send to an LDAP server are now first updated from that server. New keyserver option "no-update-before-send" to disable this feature. [T7730] * gpg: Disable default compression for 7z compressed input. [rG53252628de] * gpg: Fix a regression with composite PQC and ECC algos. [T7649] * gpg: Fix the list of possible algos for --edit-key:addkey. [T7788] * gpg: Allow to select the Kyber variants with --edit-key:addkey. [T7792] * gpg: Avoid a second Pinentry pop-up for a configured ADSK during key generation. [T7491] * gpg: Change the ADSK key binding time to use the current time. [T6882] * gpgsm: Add option --no-qes-note and new trustlist flag "noconsent". [T7713] * agent: Enable "relax" in the trustlist by default and add flag "norelax". [rG7b133027ae] * agent: Fix a crash on Windows in the Putty support. [T7799] * dirmgr: Support LDAP servers using a schema like the Windows LDS servers. [T7742] * scd:openpgp: Support Yubikey attestation generation. [rG5ddfedf24a] * gpgtar: Fix regression in end-of-archive detection. [T7757] 2.5.11 * gpg: Fix a segv in key signing with notations introduced in 2.5.10. [T7754] * agent: Fix for smartcard decryption with Brainpool keys. [T7709] 2.5.10 * gpg: Add a notation with version information to signatures. See doc/DETAILS for, well, details. [rG11d3a83b04] * gpgv: New option --print-notation. [rGe3cc410003] * gpgsm: Fix caching of the trustlist's flags. [T7738] * agent: Fix for smartcard decryption returning x-coordinate only. [T7709] * agent: Another fix for a regression with unknown curves and ssh. See also 2.5.4. [rG55db12472f] * dirmngr: Implement command KS_DEL for ldap servers. [T5447] 2.5.9 * gpg: Add the revocation reason to the sigclass of a "rev" line. Regression in 2.5.7. [T7073] * gpg: Do not show the non-standard secp256k1 curve in the menu to select the curve. It can however be specified using its name. [rG49a9171f63] * gpg: Fix regression in using the secp256k1 curve. [T7698] * dirmngr: New option --user-agent and send a default User-Agent of "GnuPG/2.6" for all HTTP requests. [T7715] 2.5.8 * gpg: Show revocation reason with a standard -k listing. [T7083] * gpg: Emit a revocation reason as comment in a "pub" record. [T7083] * agent: Fix regression in 2.5.7 decrypting with a card based cv25519 key. [T7676] * scd:openpgp: Fix a regression in exporting card based ed25519 ssh keys. [T7589] * dirmngr: Do not require a keyserver for "gpg --fetch-key". [T7693] See-also: gnupg-announce/2025q2/000494.html 2.5.7 * gpg: Allow updating a SHA-1 key certification w/o using the --force-sign-key option. [T7663] * gpg: The group key flag has now been fully implemented. [rG8833a34bf0] * gpg: Make combination of show-only-fpr-mbox and show-unusable-uid work. [rGd5a4a2dc89] * gpg: Do not allow compressed key packets on import. [T7014] * gpgsm: Allow an empty subject DN also during import. [T7171] * agent: Recover the old behavior with max-cache-ttl=0. [T6681] * agent: Fix ECC key on smartcard for composite KEM with PQC. [T7648] * scd: Fix a harmless read buffer over-read in a function used by PKCS#15 cards. [T7662] * gpg-mail-tube,wks: Support templates for mail content. [T7381] * Use the KEM interface of Libgcrypt for encryption/decryption. [T7649] * Fix a glitch in socket handling in Windows in case of a nonce mismatch. [rG645cf7d8fc] See-also: gnupg-announce/2025q2/000493.html 2.5.6 * gpg: Add a flag to the filter expressions for left anchored substring match. [rGc12b7d047e] * gpg: New list option "show-trustsig" to avoid resorting to colon mode for this info. [rG41d6ae8f41] * gpg: New command --quick-tsign-key to create a trust signature. [rGd90b290f97] * gpg: New keygen parameter "User-Id". [rGcfd597c603] * gpg: New list options "show-trustsig". [rGrG41d6ae8f41] * gpg: Fix double free of internal data in no-sig-cache mode [T7547] * gpg: Signatures from revoked or expired keys do not anymore show up as missing keys. Fixes regression in 2.5.5. [T7583] * gpgsm: Extend --learn-card by an optional s/n argument. [T7379] * gpgsm: Skip expired certificates when selection a certificate by subject. [rG4cf83273e8] * card: New command "ll" as alias for "list --cards". [rGd6ee7adebe] * scd: Fix posssible lockup on Windows due to a lost select result. [rGa7ec3792c5] * scd:p15: Accept P15 cards with a zero-length label. [rGdb25aa9887] * keyboxd: Use case-insensitive search for mail addresses. [T7576] * dirmngr: Fix a problem in libdns related to an address change from 127.0.0.1. [T4021] * gpgconf: Fix reload and kill of keyboxd. [T7569] * Fix logic for certain recsel conditions. [rG8968e84903] * Add Solaris support to get_signal_name. [T7638] * Fix build error of the test shell on AIX. [T7632] See-also: gnupg-announce/2025q2/000492.html 2.5.5 * gpg: Fix a verification DoS due to a malicious subkey in the keyring. [T7527] * dirmngr: Fix possible hangs due to blocking connection requests. [T6606, T7434] * w32: On socket nonce mismatch close the socket. [T7434] * w32: Print more detailed diagnostics for IPC errors. * GPGME is not any more distributed with the Windows installer. Please install gpg4win to get gpgme version. See-also: gnupg-announce/2025q1/000491.html 2.5.4 * gpg: New option --disable-pqc-encryption. [rG00c31f8b04] * gpg: Fix --quick-add-key for Weierstrass ECC with usage given. [T7506] * gpg: Fix handling with no CRC armor. [T7071] * gpg: New private Kyber keys are now cross-referenced using a new Link attribute. [T6638] * gpg: Fix an import problem with keys having another primary key as a subkey. [T7527] * gpgsm: Allow unattended PKCS#12 export without passphrase. [rG159e801043] * gpgsm: Allow CSR generation with an unprotected key. [rG89055f24f4] * agent: New option --change-std-env-name. [T7522] * agent: Fix ssh-agent's request_identities for skipped Brainpool keys. [rG2469dc5aae] * Do not package zlib and bzip2 object files in a speedo release build. [T7442] See-also: gnupg-announce/2025q1/000490.html 2.5.3 * gpg: Allow for signature subpackets of up to 30000 octets. [rG36dbca3e69] * gpg: Silence expired trusted-key diagnostics in quiet mode. [T7351] * gpg: Allow smaller session keys with Kyber and enforce the use of AES-256 if useful. [T7472] * gpg: Fix regression in key generation from existing card key. [T7309,T7457] * gpg: Print a warning if the card backup key could not be written. [T2169] * The --supervised options of gpg-agent and dirmngr have been renamed to --deprecated-supervised as preparation for their removal. [rGa019a0fcd8] * There is no more default for a keyserver. See-also: gnupg-announce/2025q1/000489.html 2.5.2 * gpg: Add option 16 to --full-gen-key to create ECC+Kyber. [T6638] * gpg: For composite algos add the algo string to the colons listings. [T6638] * gpg: Validate the trustdb after the import of a trusted key. [T7200] * gpg: Exclude expired trusted keys from the key validation process. [T7200] * gpg: Fix a wrong decryption failed status for signed and OCB encrypted messages without a signature verification key. [T7042] * gpg: Retain binary representation for import->export with Ed25519 key signatures. [T7426] * gpg: Fix comparing ed448 to ed25519 with --assert-pubkey-algo. [T7425] * gpg: Avoid a failure exit code for expired ultimately trusted keys. [T7351] * gpg: Emit status error for an invalid ADSK. [T7322] * gpg: Allow the use of an ADSK subkey as ADSK subkey. [T6882] * gpg: Fix --quick-set-expire for V5 subkey fingerprints. [T7298] * gpg: Robust error handling for SCD READKEY. [T7309] * gpg: Fix cv25519 v5 export regression. [T7316] * gpgsm: Nearly fourfold speedup of validated certificate listings. [T7308] * gpgsm: Improvement for some rare P12 files. [rGf50dde6269] * gpgsm: Terminate key listing on output write error. [T6185] * agent: Add option --status to the LISTRUSTED command. [rG4275d5fa7a] * agent: Fix detection of the yet unused trustflag de-vs. [T5079] * agent: Allow ssh to sign data larger than the Assuan line length. [T7436] * keyboxd: Fix a race condition on the database handle. [T7294] * dirmngr: A list of used URLs for loaded CRLs is printed first in the output of the LISTCRL command. [T7337] * scd: More mitigations against lock ups with multiple cards or apps. [T7323, T7402] * gpgtar: Use log-file from common.conf only in --batch mode. [rGb389e04ef5] * gpgtar: Fix directory creation during extraction. [T7380] * gpg-mail-tube: Minor fixes. * gpgconf: Add list flag to trusted-key et al. [T7313] * Implement GNUPG_ASSUME_COMPLIANCE envvar and registry key for testing de-vs compliance mode. [rGb287fb5775,rG7b0be541a9] * Enable additional runtime protections in speedo builds for Windows. [rG39aa206dc5] * Fix a race condition in creating the socket directory. [T7332] * Fix a build problem on macOS (missing unistd.h). [T7193] See-also: gnupg-announce/2024q4/000488.html 2.5.1 * gpg: The support for composite Kyber+ECC public key algorithms does now use the final FIPS-203 and LibrePGP specifications. The experimental keys from 2.5.0 are no longer supported. [T6815] * gpg: New commands --add-recipients and --change-recipients. [T1825] * gpg: New option --proc-all-sigs. [T7261] * gpg: Fix a regression in 2.5.0 in gpgme's tests. [T7195] * gpg: Make --no-literal work again for -c and --store. [T5852] * gpg: Improve detection of input data read errors. [T6528] * gpg: Fix getting key by IPGP record (rfc-4398). [T7288] * gpgsm: New option --assert-signer. [T7286] * gpgsm: More improvements to PKCS#12 parsing to cope with latest IVBB changes. [T7213] * agent: Fix KEYTOCARD command when used with a loopback pinentry. [T7283] * gpg-mail-tube: Make sure GNUPGHOME is set in vsd mode. New option --as-attach. [rG4511997e9e1b] * Now uses the process spawn API from libgpg-error. [T7192,T7194] * Removed the --enable-gpg-is-gpg2 configure time option. [rG2125f228d36c] * Die Windows version will now be build for 64-Bit Windows and with the corresponding changes to the installation directory and Registry keys. See-also: gnupg-announce/2024q3/000485.html 2.5.0 * gpg: Support composite Kyber+ECC public key algorithms. This is experimental due to the yet outstanding FIPS-203 specification. [T6815] * gpg: Allow algo string "pqc" for --quick-gen-key. [rG12ac129a70] * gpg: New option --show-only-session-key. [rG1695cf267e] * gpg: Print designated revokers also in non-colon listing mode. [rG9d618d1273] * gpg: Make --with-sig-check work with --show-key in non-colon listing mode. [rG0c34edc443] * tpm: Rework error handling and fix key import [T7129, T7186] * Varous fixes to improve robustness on 64 bit Windows. [T7139] Signed-off-by: Adolf Belka --- config/rootfiles/common/gnupg | 6 +++++- lfs/gnupg | 6 +++--- 2 files changed, 8 insertions(+), 4 deletions(-) diff --git a/config/rootfiles/common/gnupg b/config/rootfiles/common/gnupg index e05714fad..e29582304 100644 --- a/config/rootfiles/common/gnupg +++ b/config/rootfiles/common/gnupg @@ -2,6 +2,7 @@ usr/bin/dirmngr usr/bin/dirmngr-client usr/bin/gpg usr/bin/gpg-agent +usr/bin/gpg-authcode-sign.sh usr/bin/gpg-card usr/bin/gpg-connect-agent usr/bin/gpg-mail-tube @@ -75,7 +76,10 @@ usr/sbin/applygnupgdefaults #usr/share/gnupg/help.txt #usr/share/gnupg/help.zh_CN.txt #usr/share/gnupg/help.zh_TW.txt -#usr/share/gnupg/sks-keyservers.netCA.pem +#usr/share/gnupg/mail-tube.de.txt +#usr/share/gnupg/mail-tube.txt +#usr/share/gnupg/wks-utils.de.txt +#usr/share/gnupg/wks-utils.txt #usr/share/info/gnupg.info #usr/share/info/gnupg.info-1 #usr/share/info/gnupg.info-2 diff --git a/lfs/gnupg b/lfs/gnupg index 80b4c513f..23a995c5c 100644 --- a/lfs/gnupg +++ b/lfs/gnupg @@ -1,7 +1,7 @@ ############################################################################### # # # IPFire.org - A linux based firewall # -# Copyright (C) 2007-2025 IPFire Team # +# Copyright (C) 2007-2026 IPFire Team # # # # This program is free software: you can redistribute it and/or modify # # it under the terms of the GNU General Public License as published by # @@ -24,7 +24,7 @@ include Config -VER = 2.4.9 +VER = 2.5.20 THISAPP = gnupg-$(VER) DL_FILE = $(THISAPP).tar.bz2 @@ -42,7 +42,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_BLAKE2 = 5bbd278c570d3e389ab26dd37e1adac6c1b19f9bd369ebf30d75f48d0ab901c6f5fe4e4713b763f57b9e74efab654186ebff1a968348b0b9f70c82618b4b3b62 +$(DL_FILE)_BLAKE2 = 5a2890203cf4ac52d86897ffb104896c5cbc8ab6f088336f423cb539ae0d917e6df0dcb99b8d51d2d6cdc4068e5570e63982e78c14631a332b4fa87ba0ae16bb install : $(TARGET)