aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* * packet.h, tdbio.h, tdbio.c (tdbio_read_record, tdbio_write_record),David Shaw2003-01-065-85/+169
| | | | | | | | | | | | trustdb.c (update_validity): Store temporary full & marginal counts in the trustdb. (clear_validity, get_validity_counts): Return and clear temp counts. (store_validation_status): Keep track of which keyids have been stored. (validate_one_keyblock, validate_key_list): Use per-uid copies of the full & marginal counts so they can be recalled for multiple levels. (validate_keys): Only use unused keys for each new round. (reset_unconnected_keys): Rename to reset_trust_records, and only skip specifically excluded records.
* * DETAILS: Document disabled flag in capabilities field.David Shaw2003-01-062-3/+10
|
* * keylist.c (print_capabilities): Show 'D' for disabled keys inDavid Shaw2003-01-063-3/+21
| | | | | | | capabilities section. * trustdb.c (is_disabled): Remove incorrect comment.
* * getkey.c (merge_selfsigs_main): Remove some unused code and make sureDavid Shaw2003-01-033-9/+22
| | | | | | | | that the pk selfsigversion member accounts for 1F direct sigs. * keyring.c (keyring_search): skipfnc didn't work properly with non-keyid searches. Noted by Stefan Bellon.
* * keydb.c (keydb_add_resource): Don't assume that try_make_homedirWerner Koch2003-01-023-9/+43
| | | | | | | | terminates but check again for the existence of the directory and continue then. * openfile.c (copy_options_file): Print a warning if the skeleton file has active options.
* (oops) The rest of the fix from previous checkin.David Shaw2002-12-282-13/+15
|
* * getkey.c (merge_selfsigs_main), main.h, sig-check.cDavid Shaw2002-12-284-9/+21
| | | | | | | | (check_key_signature2): Pass the ultimately trusted pk directly to check_key_signature2 to avoid going through the key selection mechanism. This prevents a deadly embrace when two keys without selfsigs each sign the other.
* * keyserver.c (keyserver_refresh): Don't print the "refreshing..." line ifDavid Shaw2002-12-273-7/+26
| | | | | | | | there are no keys to refresh or if there is no keyserver set. * getkey.c (merge_selfsigs_main): Any valid user ID should make a key valid, not just the last one. This also fixes Debian bug #174276.
* * keygen.c (keygen_add_key_expire): Properly handle updating a keyDavid Shaw2002-12-264-2/+21
| | | | | | | | | | expiration to a no-expiration value. * keyedit.c (enable_disable_key): Comment. * import.c (import_one): When in interactive mode and --verbose, don't repeat some key information twice.
* * iobuf.c (iobuf_flush): Only print debug info if debugging is on.David Shaw2002-12-262-1/+6
|
* 2002-12-23 Timo Schulz <[email protected]>Timo Schulz2002-12-232-0/+6
| | | | | | * import.c (import_one): Use merge_keys_and_selfsig in the interactive mode to avoid wrong key information.
* * samplekeys.asc: Updated.Werner Koch2002-12-232-616/+745
|
* * keydb.h, getkey.c (key_byname): Flag to enable or disable includingDavid Shaw2002-12-198-14/+91
| | | | | | | | | | | | | | | | | | disabled keys. Keys specified via keyid (i.e. 0x...) are always included. * getkey.c (get_pubkey_byname, get_seckey_byname2, get_seckey_bynames), keyedit.c (keyedit_menu, menu_addrevoker): Include disabled keys in these functions. * pkclist.c (build_pk_list): Do not include disabled keys for -r or the key prompt. Do include disabled keys for the default key and --encrypt-to. * trustdb.h, trustdb.c (is_disabled): New skipfnc for skipping disabled keys. * gpgv.c (is_disabled): Stub.
* * gpg.sgml: Clarify --no-permission-warning to note that the permissionDavid Shaw2002-12-122-3/+18
| | | | | | | | warnings are not intended to be the be-all and end-all in security checks. Add note to --group that when used on the command line, it may be necessary to quote the argument so it is not treated as multiple arguments. Noted by Stefan.
* * options.skel: Include the required '=' sign in the sample 'group'David Shaw2002-12-123-2/+11
| | | | | | | | option. * import.c (chk_self_sigs): Don't try and check a subkey as if it was a signature.
* * mainproc.c (proc_tree): Handle multiple detached sigs concatenatedDavid Shaw2002-12-113-3/+16
| | | | | | | together by warning the user and processing only the first. * g10.c (main): Comment out --list-trust-path until it can be implemented.
* * gpg.sgml: Clarify include-revoked and include-disabled so they matchDavid Shaw2002-12-112-11/+14
| | | | | what the program actually does. Noted by Dick Gevers.
* * gpg.sgml: Document %-expandos for policy URLs and notations.David Shaw2002-12-062-1/+21
|
* * keygen.c (ask_algo): Make the Elgamal sign+encrypt warning stronger, andDavid Shaw2002-12-063-10/+34
| | | | | | | | | | remove the RSA sign+encrypt warning. * import.c (import_one): Warn when importing an Elgamal primary that this may take some time (to verify self-sigs). (chk_self_sigs): Try and cache all self-sigs so the keyblock is written to the keyring with a good rich cache.
* faq update.Werner Koch2002-12-051-0/+6
|
* * Changed variable for default gnupg.org http location from $hGPGWerner Koch2002-12-051-26/+212
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | to $hGPGHTTP and update instances of variable throughout FAQ in introduction area and sections 1.1, 2.1 and 2.2 * Added section 1.4 - What conventions are used in this FAQ? + unices vs. win32 (with hyperlink (<Rhomedir>) to section 4.18 for example + gpg.conf vs. options (with hyperlink (<Roptions>) to section 5.8 to note name change * Corrected section 2.2 - Changed ftp URL (both display and link URLs) from "ftp://ftp.gnupg.org/pub/gcrypt" to ftp://ftp.gnupg.org/gcrypt/, and the display URL (not the actual link URL, it's correct) of the http URL from "http://www.gnupg.org/mirror.html" to "http://www.gnupg.org/mirrors.html" * Included variable ($hVERSION) for easier updating of latest gpg version when referenced (as in section 2.2) * Included variable ($hGPGFTP) for default gnupg.org ftp location (ftp://ftp.gnupg.org) for use in sections 2.2 and 4.16 * Corrected section 3.1 visual display of link from "http://www.gnupg.org/gnupg.html#supsys" to "http://www.gnupg.org/backend.html#supsys" * Edited sections 3.1, 3.2, 5.2 to include $hGPGHTTP variable * Corrected section 3.2 - Word typo ("avoided" was "avoiced"). * Corrected / edited section 3.3 - + corrected link: ftp://ftp.gnupg.dk/pub/contrib-dk/ for idea.c.gz, idea.c.gz.sig, ideadll.zip, ideadll.zip.sig + edited section to include all files and added ~/.gnupg/gpg.conf info * Edited section 4.6 - As this section deals with loosing a public key, I added a paragraph containing a hyperlink to the end of section 4.21 ("I still have my secret key, but lost my public key..."). The paragraph reads: "If you've lost your public key and need to recreate it instead for continued use with your secret key, you may be able to use gpgsplit as detailed in question <Rgpgsplit>." * Edited section 4.15 - Added paragraph below table on GPGrelay, an application for MUAs that lack OpenPGP (rfc2015) support to. "Users of Win32 MUAs that lack OpenPGP support may look into using GPGrelay <http://http://gpgrelay.sourceforge.net>, a small email-relaying server that uses GnuPG to enable many email clients to send and receive emails that conform to PGP-MIME (RFC 2015)." suggested by: Andreas John <[email protected]> * Corrected section 4.16 - Incorportated Werner's URL fix for gpgme FTP location to synchronize local CVS with released FAQ version 1.5.8. * Added section 4.19 - "How do I verify signed packages?" suggested by: Christian Reis <[email protected]> * Added section 4.20 - "How do I export a keyring with only selected signatures?" by: David Shaw <[email protected]> * Added section 4.21 - "I still have my secret key, but lost my public key. What can I do?" by: Werner Koch <[email protected]> * Added section 4.22 - "Clearsigned messages sent from my web-mail account have an invalid signature. Why?" by: David Scribner <[email protected]> * Edited / Corrected section 5.8 - Changed question from "I just installed the most recent version of GnuPG and don't have a ~/.gnupg/options file. Is this missing from the installation?" to "GnuPG no longer installs a ~/.gnupg/options file. Is it missing?" + Added "An existing options file can be renamed to gpg.conf for users upgrading, or receiving the message that the "old default options file" is ignored (occurs if both a gpg.conf and an options file are found)." to the end of the paragraph. + Corrected ~/.gnupg/gpg.conf (was ~/.gnupg/conf) * Added section 5.9 - "How to you export GnuPG keys for use with PGP?" by: David Shaw <[email protected]>
* New entriesWerner Koch2002-12-052-0/+6
|
* * gpg.sgml: Document --no-mangle-dos-filenames.Werner Koch2002-12-052-0/+17
|
* * g10.c: New options --[no-]mangle-dos-filenames.Werner Koch2002-12-054-83/+101
| | | | | | | | | * options.h (opt): Added mangle-dos-filenames. * openfile.c (open_outfile) [USE_ONLY_8DOT3]: Truncate the filename only when this option is set; this is the default. NOT YET TESTED!
* * NEWS: Add note about convert-from-106 script.David Shaw2002-12-042-0/+8
|
* * gpg.sgml: Document --pgp8. Clarify that --pgp6 and --pgp7 disableDavid Shaw2002-12-042-3/+23
| | | | | --throw-keyid.
* * main.h, keyedit.c, keygen.c: Back out previous (2002-12-01) change.David Shaw2002-12-046-70/+89
| | | | | | | | | | | | | | | | | | | | Minimal isn't always best. * sign.c (update_keysig_packet): Use the current time rather then a modification of the original signature time. Make sure that this doesn't cause a time warp. * keygen.c (keygen_add_key_expire): Properly handle a key expiration date in the past (use a duration of 0). * keyedit.c (menu_expire): Use update_keysig_packet so any sig subpackets are maintained during the update. * build-packet.c (build_sig_subpkt): Mark sig expired or unexpired when the sig expiration subpacket is added. (build_sig_subpkt_from_sig): Handle making an expiration subpacket from a sig that has already expired (use a duration of 0).
* * packet.h, sign.c (update_keysig_packet), keyedit.cDavid Shaw2002-12-044-7/+16
| | | | | | (menu_set_primary_uid, menu_set_preferences): Add ability to issue 0x18 subkey binding sigs to update_keysig_packet and change all callers.
* * options.h, g10.c (main), encode.c (write_pubkey_enc_from_list),David Shaw2002-12-037-35/+63
| | | | | | | | | pkclist.c (algo_available), revoke.c (gen_revoke): Add --pgp8 mode. This is basically identical to --pgp7 in all ways except that signing subkeys, v4 data sigs (including expiration), and SK comments are allowed. * getkey.c (finish_lookup): Comment.
* * main.h, keylist.c (reorder_keyblock), keyedit.c (keyedit_menu): ReorderDavid Shaw2002-12-036-5/+24
| | | | | | | | | | | user ID display in the --edit-key menu to match that of the --list-keys display. * tdbio.c (tdbio_read_record, tdbio_write_record): Comments to reserve a byte for trust model in the devel version. * g10.c (add_notation_data): Fix initialization.
* * keyedit.c (menu_expire): Don't lose key flags when changing theDavid Shaw2002-12-015-20/+71
| | | | | | | | | | | | | | expiration date of a subkey. This is not the most optimal solution, but it is minimal change on the stable branch. * main.h, keygen.c (do_copy_key_flags): New function to copy key flags, if any, from one sig to another. (do_add_key_expire): New function to add key expiration to a sig. (keygen_copy_flags_add_expire): New version of keygen_add_key_expire that also copies key flags. (keygen_add_key_flags_and_expire): Use do_add_key_expire. * import.c (fix_hkp_corruption): Comment.
* * gpg.sgml: Point out that if the user absolutely must, it's better to useDavid Shaw2002-12-012-0/+15
| | | | | | --pgpX than forcing an algorithm manually. Better still not to use anything, of course.
* * distfiles, gnupg.spec.in: Include convert-from-106.David Shaw2002-11-304-6/+21
|
* * convert-from-106: Script to automate the 1.0.6->later conversion. ItDavid Shaw2002-11-302-2/+52
| | | | | | marks all secret keys as ultimately trusted, adds the signature caches, and checks the trustdb.
* * NEWS: Add notes about notation names and '@', the "--trust-model always"David Shaw2002-11-252-0/+17
| | | | | option, and non-optimized memory wiping.
* * gpg.sgml: Document --sig-policy-url, --cert-policy-url, --sig-notation,David Shaw2002-11-252-16/+33
| | | | | | | --cert-notation. Clarify --show-notation and --show-policy-url that policy URLs and notations can be used in data signatures as well. Add note about '@' being a required character in notation names.
* * g10.c (add_notation_data): Disallow notation names that do not contain aDavid Shaw2002-11-244-8/+48
| | | | | | | | | | | | | | '@', unless --expert is set. This is to help prevent people from polluting the (as yet unused) IETF namespace. * main.h: Comments about default algorithms. * photoid.c (image_type_to_string): Comments about 3-letter file extensions. * g10.c (main): Add --strict and --no-strict as no-ops to smooth transition when the devel GnuPG becomes the stable one.
* * gpg.sgml: Add an interoperability section.David Shaw2002-11-222-1/+28
|
* * gpg.sgml: Correct defaults for --s2k-mode and --s2k-digest-mode. NotedDavid Shaw2002-11-172-10/+13
| | | | | by Haakon Riiser.
* * config.links: Use OpenBSD/NetBSD powerpc assembler code for Darwin.David Shaw2002-11-162-7/+7
| | | | | Successfully tested by Gordon Worley.
* * gpg.sgml: Correct --compress-algo documentation to match behavior.David Shaw2002-11-142-7/+13
| | | | | Noted by Jason S. Mantor.
* * gpg.sgml: Document --trust-model.David Shaw2002-11-142-5/+26
|
* fixed type incompatibilityStefan Bellon2002-11-132-1/+6
|
* * keyedit.c (show_key_with_all_names_colon): Make --with-colons --editDavid Shaw2002-11-134-20/+65
| | | | | | | | | | display match the validity and trust of --with-colons --list-keys. * passphrase.c (agent_send_all_options): Fix compile warning. * keylist.c (list_keyblock_colon): Validity for subkeys should match that of the primary key, and not that of the last user ID.
* * getkey.c (merge_selfsigs): Revoked/expired/invalid primary keys carryDavid Shaw2002-11-132-21/+27
| | | | | | | | these facts onto all their subkeys, but only after the subkey has a chance to be marked valid. This is to fix an incorrect "invalid public key" error verifying a signature made by a revoked signing subkey, with a valid unrevoked primary key.
* * config.sub, config.guess: Updated from ftp.gnu.org/gnu/configWerner Koch2002-11-123-249/+363
| | | | | to version 2002-11-08.
* * configure.ac: Check for ctermid().Werner Koch2002-11-093-1/+7
|
* * passphrase.c (agent_send_all_options): Use tty_get_ttyname toWerner Koch2002-11-092-2/+27
| | | | | get the default ttyname.
* * ttyio.c (TERMDEVICE): Removed.Werner Koch2002-11-093-14/+49
| | | | | | (tty_get_ttyname): New. (init_ttyfp): Use it here instead of the TERMDEVICE macro.
* added prototype that was missing in CVS since long agoStefan Bellon2002-11-062-0/+6
|