aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* * gpgkeys_ldap.c [_WIN32]: Include Windows specific header files.Werner Koch2004-07-2032-10254/+10490
| | | | | | | | | | | Suggested by Brian Gladman. * fr.po, cs.po, et.po, el.po, id.po, pl.po, ro.po, sk.po, tr.po * zh_CN.po, ru.po, es.po, fi.po, hu.po: Updated. * zh_CN.po: Hack to fix a format string mismatch. * sk.po: Corrrected a format string. * de.po: Fixed a few fuzzys and 1 untranslated messages
* Russian translation of the manual page. According to Maxim Britov by PavelWerner Koch2004-07-201-0/+2724
| | | | | | I. Shajdo - need tocheck this first though and figure out how to properly install alternate man pages.
* Created distfiles, so that the stuff will go into the regular distribution.Werner Koch2004-07-2010-0/+48
|
* Even more updatesWerner Koch2004-07-204-0/+1310
|
* More updates from BrianWerner Koch2004-07-2016-1815/+1424
|
* Importat updated from BrianWerner Koch2004-07-2024-2110/+4956
|
* * sign.c (update_keysig_packet): Revert change of 2004-05-18. It is notDavid Shaw2004-07-192-12/+7
| | | | | | appropriate to strip policy and notations when remaking a sig. That should only happen when specifically requested by the user.
* * sign.c (sign_symencrypt_file): Allow using --force-mdc in --signDavid Shaw2004-06-272-0/+10
| | | | | --symmetric messages.
* * mainproc.c (proc_symkey_enc), seckey-cert.c (do_check): Check the S2KDavid Shaw2004-06-273-0/+20
| | | | | | | hash algorithm before we try to generate a passphrase using it. This prevents hitting BUG() when generating a passphrase using a hash that we don't have.
* * keyedit.c (sign_uids): Properly handle remaking a self-sig on revoked orDavid Shaw2004-06-242-5/+28
| | | | | | expired user IDs. Also, once we've established that a given uid cannot or will not be signed, don't continue to ask about each sig.
* * DETAILS: Document PLAINTEXT and PLAINTEXT_LENGTH.David Shaw2004-06-183-3/+27
| | | | | | * gpg.sgml: Clarify include-revoked a bit to note that keyservers might not be accurate.
* * status.h, status.c (get_status_string), plaintext.c (handle_plaintext):David Shaw2004-06-184-6/+32
| | | | | New status tags PLAINTEXT and PLAINTEXT_LENGTH.
* * NEWS: --ask-cert-level actually defaults to on for the stable branch.David Shaw2004-06-172-1/+6
|
* * ring-a-party: ElGamal -> ElgamalDavid Shaw2004-06-172-5/+5
|
* Updated. That is the fasted update I've ever seen;Werner Koch2004-06-162-15/+17
| | | | | | received it within 17 minutes after sending out the notice to the translators (and there are even uucp polling delays).
* * keygen.c (make_backsig): Make sure that the backsig was builtDavid Shaw2004-06-162-49/+58
| | | | | successfully before we try and use it.
* Preparing an RC.Werner Koch2004-06-1630-10130/+10948
|
* (copy_secret_key): Get last fix right.Werner Koch2004-06-162-10/+8
|
* .Werner Koch2004-06-1629-15753/+21090
|
* (copy_secret_key): Fixed memory leak.Werner Koch2004-06-163-0/+14
|
* * gpg.sgml: Note that --charset is --display-charset. Some languageDavid Shaw2004-06-012-23/+28
| | | | | tweaks for --simple-sk-checksum (Debian 251795).
* * g10.c (main): Alias --charset as --display-charset to help avoid theDavid Shaw2004-06-013-5/+15
| | | | | | | | continuing confusion and make room for possible changes in devel. * parse-packet.c (parse_plaintext): Show the hex value for the literal packet mode since it may not be printable.
* * configure.ac: Try for wldap32 on Win32 platforms.David Shaw2004-05-242-0/+5
|
* * pkclist.c (do_edit_ownertrust): Fix kbnode leak.David Shaw2004-05-232-0/+5
|
* * NEWS: Note --ask-cert-level.David Shaw2004-05-203-2/+14
| | | | | | * acinclude.m4 (GNUPG_SYS_NM_PARSE): Remove a leftover slash in a sed expression.
* * sign.c (update_keysig_packet): Policies and notations should be strippedDavid Shaw2004-05-192-0/+18
| | | | | out when remaking a self-signature. Noted by Atom Smasher.
* (do_generate_keypair, read_parameter_file): ReallyWerner Koch2004-05-112-0/+24
| | | | | | | close the files. (do_generate_keypair): Create the secret key file using safe permissions. Noted by Atom Smasher.
* * DETAILS, credits-1.0, credits-1.2: ElGamal -> Elgamal.David Shaw2004-05-086-13/+31
| | | | | | | * gpg.sgml: Document --no-use-embedded-filename and --min-cert-level. * gpgv.sgml: Removed leftover </para>.
* (write_plaintext_packet): Fixed the detection of tooWerner Koch2004-05-072-8/+18
| | | | | large files in the same way as in encode.c.
* * gpg.sgml: --comment works with all armored messages. Clarify thatDavid Shaw2004-05-052-6/+12
| | | | | | --charset applies to informational strings and does not recode messages themselves.
* Removed reference to non-available optionWerner Koch2004-05-032-1/+5
| | | | | --no-default-keyring.
* (ac_pipe_works): Fixed BRE syntax \? -> \{0,1\}.Werner Koch2004-05-012-4/+9
| | | | | Reported by Todd Vierling.
* * keygen.c (make_backsig): If DO_BACKSIGS is not defined, do not createDavid Shaw2004-04-237-7/+123
| | | | | | | | | | | | | | | | backsigs. * getkey.c (merge_selfsigs_subkey): Find 0x19 backsigs on subkey selfsigs and verify they are valid. If DO_BACKSIGS is not defined, fake this as always valid. * packet.h, parse-packet.c (parse_signature): Make parse_signature non-static so we can parse 0x19s in self-sigs. * main.h, sig-check.c (check_backsig): Check a 0x19 signature. (signature_check2): Give a backsig warning if there is no or a bad 0x19 with signatures from a subkey.
* * parse-packet.c (dump_sig_subpkt, parse_one_sig_subpkt,David Shaw2004-04-222-69/+86
| | | | | can_handle_critical): Parse and display 0x19 signatures.
* * keyserver.c (parse_keyserver_uri): Do not accept "http" as an alias forDavid Shaw2004-04-202-2/+6
| | | | | "hkp". They are not the same thing.
* * keygen.c (make_backsig): New function to add a backsig to a binding sigDavid Shaw2004-04-135-19/+139
| | | | | | | | | | | | of signing subkeys. Currently disabled. (write_keybinding): Call it here, for signing subkeys only. * sign.c (make_keysig_packet): Allow generating 0x19 signatures (same as 0x18 or 0x28, but used for backsigs). * packet.h, build-packet.c (build_sig_subpkt): Add new SIGSUBPKT_SIGNATURE type for embedded signatures.
* * gpg.sgml: Document delsig. Clarify that --refresh-keys arguments areDavid Shaw2004-04-102-4/+26
| | | | | optional. Document --bzip2-decompress-lowmem.
* * g10.c (main): --no-use-embedded-filename.David Shaw2004-04-013-1/+14
| | | | | | | | * plaintext.c (handle_plaintext): Accept 'u' as a plaintext mode that requires end of line conversion. This is being considered for a UTF8 text packet. If this doesn't take place, no major harm done. If it does take place, we'll get a jump on starting the changeover.
* Time for a new release candidateWerner Koch2004-03-293-1/+8
|
* *** empty log message ***Werner Koch2004-03-299-34/+99
|
* typo fixWerner Koch2004-03-291-1/+1
|
* * keyedit.c (keyedit_menu): Request a trustdb update when adding a newDavid Shaw2004-03-272-2/+10
| | | | | user ID so the new ID gets validity set. Reported by Owen Taylor.
* * build-packet.c (calc_plaintext, do_plaintext): Do not create illegalDavid Shaw2004-03-262-7/+15
| | | | | | | (packet header indicates a size larger than the actual packet) encrypted data packets when not compressing and using a filename longer than 255 characters.
* * options.h, g10.c (main), compress-bz2.c (init_uncompress): BackportDavid Shaw2004-03-254-3/+13
| | | | | | --bzip2-decompress-lowmem since we do handle receiving a bzip2 message on the stable branch.
* * keyedit.c (no_primary_warning): Cleanup. (menu_expire): Don't giveDavid Shaw2004-03-232-18/+22
| | | | | | primary warning for subkey expiration changes. These cannot reorder primaries.
* * packet.h, getkey.c (fixup_uidnode, merge_selfsigs_subkey): Keep track ofDavid Shaw2004-03-224-4/+22
| | | | | | | | | which self-sig we actually chose. * keyedit.c (menu_expire, menu_set_primary_uid, menu_set_preferences): Use it here to avoid updating non-used self-sigs and possibly promoting an old self-sig into consideration again.
* * keygen.c (write_keybinding, do_generate_keypair, generate_subkeypair):David Shaw2004-03-182-30/+42
| | | | | | Keep track of the unprotected subkey secret key so we can make a backsig with it.
* * keygen.c (gen_elg, gen_dsa, gen_rsa, do_create, do_generate_keypair,David Shaw2004-03-182-19/+31
| | | | | | | generate_subkeypair): New is_subkey argument to set whether a generated key is a subkey. Do not overload the ret_sk. This is some early cleanup to do backsigs for signing subkeys.
* * import.c (import_one): Try and collapse user IDs when importing a keyDavid Shaw2004-03-094-11/+23
| | | | | | | | | | | | for the first time. * build-packet.c (do_comment, do_user_id): Try for a headerlen of 2 since that's the smallest and most likely encoding for these packets * keyedit.c (menu_addrevoker): Allow appointing a subkey as a designated revoker if the user forces it via keyid!, so long as the subkey can certify. Also use the proper date string when prompting for confirmation.
* * iobuf.c (block_filter): Properly handle a partial body stream that endsDavid Shaw2004-03-012-0/+11
| | | | | with a 5-byte length that happens to be zero.