gnupg2-2.0.22-4.el7.x86_64.rpm


Advertisement

Description

gnupg2 - Utility for secure communication and data storage

Distribution: CentOS 7
Repository: CentOS x86_64
Package name: gnupg2
Package version: 2.0.22
Package release: 4.el7
Package architecture: x86_64
Package type: rpm
Installed size: 6.34 MB
Download size: 1.49 MB
Official Mirror: mirror.centos.org
GnuPG is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440 and the S/MIME standard as described by several RFCs. GnuPG 2.0 is a newer version of GnuPG with additional support for S/MIME. It has a different design philosophy that splits functionality up into several modules. The S/MIME and smartcard functionality is provided by the gnupg2-smime package.

Alternatives

Provides

  • config(gnupg2) = 2.0.22-4.el7
  • gnupg = 2.0.22-4.el7
  • gnupg2 = 2.0.22-4.el7
  • gnupg2(x86-64) = 2.0.22-4.el7
  • gpg = 2.0.22-4.el7

Obsoletes

  • gnupg <= 1.4.10

    Download

    Install Howto

    Install the gnupg2 rpm package:

    # yum install gnupg2

    Files

    • /etc/gnupg/gpgconf.conf
    • /usr/bin/gpg
    • /usr/bin/gpg-agent
    • /usr/bin/gpg-connect-agent
    • /usr/bin/gpg-zip
    • /usr/bin/gpg2
    • /usr/bin/gpgconf
    • /usr/bin/gpgparsemail
    • /usr/bin/gpgsplit
    • /usr/bin/gpgv
    • /usr/bin/gpgv2
    • /usr/bin/watchgnupg
    • /usr/libexec/gnupg-pcsc-wrapper
    • /usr/libexec/gpg-check-pattern
    • /usr/libexec/gpg-preset-passphrase
    • /usr/libexec/gpg-protect-tool
    • /usr/libexec/gpg2keys_curl
    • /usr/libexec/gpg2keys_finger
    • /usr/libexec/gpg2keys_hkp
    • /usr/libexec/gpg2keys_ldap
    • /usr/sbin/addgnupghome
    • /usr/sbin/applygnupgdefaults
    • /usr/share/doc/gnupg2-2.0.22/AUTHORS
    • /usr/share/doc/gnupg2-2.0.22/COPYING
    • /usr/share/doc/gnupg2-2.0.22/ChangeLog
    • /usr/share/doc/gnupg2-2.0.22/DETAILS
    • /usr/share/doc/gnupg2-2.0.22/FAQ
    • /usr/share/doc/gnupg2-2.0.22/HACKING
    • /usr/share/doc/gnupg2-2.0.22/KEYSERVER
    • /usr/share/doc/gnupg2-2.0.22/NEWS
    • /usr/share/doc/gnupg2-2.0.22/OpenPGP
    • /usr/share/doc/gnupg2-2.0.22/README
    • /usr/share/doc/gnupg2-2.0.22/THANKS
    • /usr/share/doc/gnupg2-2.0.22/TODO
    • /usr/share/doc/gnupg2-2.0.22/TRANSLATE
    • /usr/share/doc/gnupg2-2.0.22/examples/README
    • /usr/share/doc/gnupg2-2.0.22/examples/gpgconf.conf
    • /usr/share/doc/gnupg2-2.0.22/examples/pwpattern.list
    • /usr/share/doc/gnupg2-2.0.22/examples/scd-event
    • /usr/share/doc/gnupg2-2.0.22/examples/trustlist.txt
    • /usr/share/gnupg/gpg-conf.skel
    • /usr/share/gnupg/help.be.txt
    • /usr/share/gnupg/help.ca.txt
    • /usr/share/gnupg/help.cs.txt
    • /usr/share/gnupg/help.da.txt
    • /usr/share/gnupg/help.de.txt
    • /usr/share/gnupg/help.el.txt
    • /usr/share/gnupg/help.eo.txt
    • /usr/share/gnupg/help.es.txt
    • /usr/share/gnupg/help.et.txt
    • /usr/share/gnupg/help.fi.txt
    • /usr/share/gnupg/help.fr.txt
    • /usr/share/gnupg/help.gl.txt
    • /usr/share/gnupg/help.hu.txt
    • /usr/share/gnupg/help.id.txt
    • /usr/share/gnupg/help.it.txt
    • /usr/share/gnupg/help.ja.txt
    • /usr/share/gnupg/help.nb.txt
    • /usr/share/gnupg/help.pl.txt
    • /usr/share/gnupg/help.pt.txt
    • /usr/share/gnupg/help.pt_BR.txt
    • /usr/share/gnupg/help.ro.txt
    • /usr/share/gnupg/help.ru.txt
    • /usr/share/gnupg/help.sk.txt
    • /usr/share/gnupg/help.sv.txt
    • /usr/share/gnupg/help.tr.txt
    • /usr/share/gnupg/help.txt
    • /usr/share/gnupg/help.zh_CN.txt
    • /usr/share/gnupg/help.zh_TW.txt
    • /usr/share/gnupg/qualified.txt
    • /usr/share/info/gnupg.info-1.gz
    • /usr/share/info/gnupg.info-2.gz
    • /usr/share/info/gnupg.info.gz
    • /usr/share/locale/be/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/ca/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/cs/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/da/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/de/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/el/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/en@boldquot/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/en@quot/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/eo/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/es/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/et/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/fi/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/fr/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/gl/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/hu/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/id/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/it/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/ja/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/nb/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/pl/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/pt/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/pt_BR/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/ro/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/ru/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/sk/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/sv/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/tr/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/uk/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/zh_CN/LC_MESSAGES/gnupg2.mo
    • /usr/share/locale/zh_TW/LC_MESSAGES/gnupg2.mo
    • /usr/share/man/man1/gpg-agent.1.gz
    • /usr/share/man/man1/gpg-connect-agent.1.gz
    • /usr/share/man/man1/gpg-preset-passphrase.1.gz
    • /usr/share/man/man1/gpg-zip.1.gz
    • /usr/share/man/man1/gpg.1.gz
    • /usr/share/man/man1/gpg2.1.gz
    • /usr/share/man/man1/gpgconf.1.gz
    • /usr/share/man/man1/gpgparsemail.1.gz
    • /usr/share/man/man1/gpgv.1.gz
    • /usr/share/man/man1/gpgv2.1.gz
    • /usr/share/man/man1/symcryptrun.1.gz
    • /usr/share/man/man1/watchgnupg.1.gz
    • /usr/share/man/man8/addgnupghome.8.gz
    • /usr/share/man/man8/applygnupgdefaults.8.gz

    Changelog

    2016-03-24 - Tomáš Mráz <tmraz@redhat.com> - 2.0.22-4 - allow import of RSA-E and RSA-S keys (patch by Marcel Kolaja) (#1233182) - do not abort when missing hash algorithm in FIPS mode (#1078962)

    2014-01-24 - Daniel Mach <dmach@redhat.com> - 2.0.22-3 - Mass rebuild 2014-01-24

    2013-12-27 - Daniel Mach <dmach@redhat.com> - 2.0.22-2 - Mass rebuild 2013-12-27

    2013-10-10 - Tomáš Mráz <tmraz@redhat.com> - 2.0.22-1 - new upstream release fixing CVE-2013-4402 and CVE-2013-4351

    2013-08-23 - Tomáš Mráz <tmraz@redhat.com> - 2.0.21-1 - new upstream release

    2013-05-15 - Tomas Mraz <tmraz@redhat.com> - 2.0.20-1 - new upstream release

    2013-02-14 - Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 2.0.19-8 - Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild

    2013-01-02 - Tomas Mraz <tmraz@redhat.com> - 2.0.19-7 - fix CVE-2012-6085 - skip invalid key packets (#891142)

    2012-11-22 - Tomas Mraz <tmraz@redhat.com> - 2.0.19-6 - use AES as default crypto algorithm in FIPS mode (#879047)

    2012-11-16 - Jamie Nguyen <jamielinux@fedoraproject.org> - 2.0.19-5 - rebuild for <f18 (#877106)

    Advertisement
    Advertisement