Release Notes: A corruption of the public keyring database on import of manipulated public keys was fixed. This issue was reported as CVE-2012-6085. Support for the old cipher algorithm IDEA was added. Small changes were made to increase compatibility with future OpenPGP and GnuPG features. Minor bugfixes were made.
Release Notes: A space-separated fingerprint is now accepted as a user ID, to ease copying and pasting. The longest key ID available is now used by default. Support for the original HKP keyserver has been dropped. The trustdb is now rebuilt after changing the option "--min-cert-level". The option "--cert-digest-algo" is now honored when creating a cert. Detection of JPEG files has been improved.
Release Notes: Compatibility with newer versions of libgcrypt was restored. dirmngr/gpgsm interaction was improved for OCSP. Card keys can now be generated up to 4096 bits. The SSH confirm flag is now supported, and SSH fingerprints are shown in SSH related pinentries.
Release Notes: The agent's "--use-standard-socket" option is now available on non-Win32 systems, allowing all tools to start and daemonize the agent on the fly. The gpg-agent commands KILLAGENT and RELOADAGENT are now available on all platforms. Minor bugs were fixed.
Release Notes: A regression in 2.0.14 which prevented unprotection of new or changed gpg-agent passphrases was fixed. A new command "--passwd" was added. libassuan 2.0 is now used.
Release Notes: The default for "--include-cert" is now to include all certificates in the chain except for the root certificate. Numerical values may now be used as an alternative to the debug-level keywords. The GPGSM "--audit-log" feature is now more complete. A new GPGSM option "--ignore-cert-extension" was added. New and changed passphrases are now created with an iteration count requiring about 100ms of CPU work.
Release Notes: 2048-bit RSA keys are now generated by default. The default hash algorithm preferences have changed to prefer SHA-256 over SHA-1. Writing of keys to v2 OpenPGP cards was enhanced. Several environment variables are now passed to the Pinentry to make SCIM work. A '--batch' mode was added to the GPGSM command '--gen-key' command. Several other enhancements and minor bugs were fixed.
Release Notes: 2048 bit RSA keys are now generated by default. The default hash algorithm preferences have changed to prefer SHA-256 over SHA-1. 2048 bit DSA keys are now generated to use a 256 bit hash algorithm. Support for v2 OpenPGP cards was added. Support for the Camellia cipher (RFC-5581) was implemented. Support for HKP keyservers over SSL ("HKPS") was added. The algorithm for computing the SIG_ID status was changed to match the one used in version 2.0.10. File locking was improved. A memory leak which made imports of many keys very slow was fixed. Many smaller bugs were fixed.
Release Notes: GPGSM now always lists ephemeral certificates if specified by fingerprint or keygrip. GPGSM now also returns information about smartcards. It is now made sure not to leak file descriptors if running gpg-agent with a command. The order of the confirmation questions for root certificates was changed, and negative answers are stored in trustlist.txt. Better synchronization of concurrent smartcard sessions was implemented. Support for 2048 bit OpenPGP cards and for Telesec Netkey 3 cards was added. A potential Mac OS X system freeze is now avoided.
Release Notes: The gpg-connect-agent was enhanced with a small scripting language. A new option "--list-config" was implemented for gpgconf. Creating DSA2 keys is now possible. gpgsm can now be allowed to verify broken signatures. A rare bug in decryption using the OpenPGP card and a crash in gpgconf were fixed. Several other minor enhancements and bugfixes were made. The license was changed to the GPLv3.