aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* * mainproc.c (proc_symkey_enc), seckey-cert.c (do_check): Check the S2KDavid Shaw2004-06-273-0/+20
| | | | | | | hash algorithm before we try to generate a passphrase using it. This prevents hitting BUG() when generating a passphrase using a hash that we don't have.
* * keyedit.c (sign_uids): Properly handle remaking a self-sig on revoked orDavid Shaw2004-06-242-5/+28
| | | | | | expired user IDs. Also, once we've established that a given uid cannot or will not be signed, don't continue to ask about each sig.
* * DETAILS: Document PLAINTEXT and PLAINTEXT_LENGTH.David Shaw2004-06-183-3/+27
| | | | | | * gpg.sgml: Clarify include-revoked a bit to note that keyservers might not be accurate.
* * status.h, status.c (get_status_string), plaintext.c (handle_plaintext):David Shaw2004-06-184-6/+32
| | | | | New status tags PLAINTEXT and PLAINTEXT_LENGTH.
* * NEWS: --ask-cert-level actually defaults to on for the stable branch.David Shaw2004-06-172-1/+6
|
* * ring-a-party: ElGamal -> ElgamalDavid Shaw2004-06-172-5/+5
|
* Updated. That is the fasted update I've ever seen;Werner Koch2004-06-162-15/+17
| | | | | | received it within 17 minutes after sending out the notice to the translators (and there are even uucp polling delays).
* * keygen.c (make_backsig): Make sure that the backsig was builtDavid Shaw2004-06-162-49/+58
| | | | | successfully before we try and use it.
* Preparing an RC.Werner Koch2004-06-1630-10130/+10948
|
* (copy_secret_key): Get last fix right.Werner Koch2004-06-162-10/+8
|
* .Werner Koch2004-06-1629-15753/+21090
|
* (copy_secret_key): Fixed memory leak.Werner Koch2004-06-163-0/+14
|
* * gpg.sgml: Note that --charset is --display-charset. Some languageDavid Shaw2004-06-012-23/+28
| | | | | tweaks for --simple-sk-checksum (Debian 251795).
* * g10.c (main): Alias --charset as --display-charset to help avoid theDavid Shaw2004-06-013-5/+15
| | | | | | | | continuing confusion and make room for possible changes in devel. * parse-packet.c (parse_plaintext): Show the hex value for the literal packet mode since it may not be printable.
* * configure.ac: Try for wldap32 on Win32 platforms.David Shaw2004-05-242-0/+5
|
* * pkclist.c (do_edit_ownertrust): Fix kbnode leak.David Shaw2004-05-232-0/+5
|
* * NEWS: Note --ask-cert-level.David Shaw2004-05-203-2/+14
| | | | | | * acinclude.m4 (GNUPG_SYS_NM_PARSE): Remove a leftover slash in a sed expression.
* * sign.c (update_keysig_packet): Policies and notations should be strippedDavid Shaw2004-05-192-0/+18
| | | | | out when remaking a self-signature. Noted by Atom Smasher.
* (do_generate_keypair, read_parameter_file): ReallyWerner Koch2004-05-112-0/+24
| | | | | | | close the files. (do_generate_keypair): Create the secret key file using safe permissions. Noted by Atom Smasher.
* * DETAILS, credits-1.0, credits-1.2: ElGamal -> Elgamal.David Shaw2004-05-086-13/+31
| | | | | | | * gpg.sgml: Document --no-use-embedded-filename and --min-cert-level. * gpgv.sgml: Removed leftover </para>.
* (write_plaintext_packet): Fixed the detection of tooWerner Koch2004-05-072-8/+18
| | | | | large files in the same way as in encode.c.
* * gpg.sgml: --comment works with all armored messages. Clarify thatDavid Shaw2004-05-052-6/+12
| | | | | | --charset applies to informational strings and does not recode messages themselves.
* Removed reference to non-available optionWerner Koch2004-05-032-1/+5
| | | | | --no-default-keyring.
* (ac_pipe_works): Fixed BRE syntax \? -> \{0,1\}.Werner Koch2004-05-012-4/+9
| | | | | Reported by Todd Vierling.
* * keygen.c (make_backsig): If DO_BACKSIGS is not defined, do not createDavid Shaw2004-04-237-7/+123
| | | | | | | | | | | | | | | | backsigs. * getkey.c (merge_selfsigs_subkey): Find 0x19 backsigs on subkey selfsigs and verify they are valid. If DO_BACKSIGS is not defined, fake this as always valid. * packet.h, parse-packet.c (parse_signature): Make parse_signature non-static so we can parse 0x19s in self-sigs. * main.h, sig-check.c (check_backsig): Check a 0x19 signature. (signature_check2): Give a backsig warning if there is no or a bad 0x19 with signatures from a subkey.
* * parse-packet.c (dump_sig_subpkt, parse_one_sig_subpkt,David Shaw2004-04-222-69/+86
| | | | | can_handle_critical): Parse and display 0x19 signatures.
* * keyserver.c (parse_keyserver_uri): Do not accept "http" as an alias forDavid Shaw2004-04-202-2/+6
| | | | | "hkp". They are not the same thing.
* * keygen.c (make_backsig): New function to add a backsig to a binding sigDavid Shaw2004-04-135-19/+139
| | | | | | | | | | | | of signing subkeys. Currently disabled. (write_keybinding): Call it here, for signing subkeys only. * sign.c (make_keysig_packet): Allow generating 0x19 signatures (same as 0x18 or 0x28, but used for backsigs). * packet.h, build-packet.c (build_sig_subpkt): Add new SIGSUBPKT_SIGNATURE type for embedded signatures.
* * gpg.sgml: Document delsig. Clarify that --refresh-keys arguments areDavid Shaw2004-04-102-4/+26
| | | | | optional. Document --bzip2-decompress-lowmem.
* * g10.c (main): --no-use-embedded-filename.David Shaw2004-04-013-1/+14
| | | | | | | | * plaintext.c (handle_plaintext): Accept 'u' as a plaintext mode that requires end of line conversion. This is being considered for a UTF8 text packet. If this doesn't take place, no major harm done. If it does take place, we'll get a jump on starting the changeover.
* Time for a new release candidateWerner Koch2004-03-293-1/+8
|
* *** empty log message ***Werner Koch2004-03-299-34/+99
|
* typo fixWerner Koch2004-03-291-1/+1
|
* * keyedit.c (keyedit_menu): Request a trustdb update when adding a newDavid Shaw2004-03-272-2/+10
| | | | | user ID so the new ID gets validity set. Reported by Owen Taylor.
* * build-packet.c (calc_plaintext, do_plaintext): Do not create illegalDavid Shaw2004-03-262-7/+15
| | | | | | | (packet header indicates a size larger than the actual packet) encrypted data packets when not compressing and using a filename longer than 255 characters.
* * options.h, g10.c (main), compress-bz2.c (init_uncompress): BackportDavid Shaw2004-03-254-3/+13
| | | | | | --bzip2-decompress-lowmem since we do handle receiving a bzip2 message on the stable branch.
* * keyedit.c (no_primary_warning): Cleanup. (menu_expire): Don't giveDavid Shaw2004-03-232-18/+22
| | | | | | primary warning for subkey expiration changes. These cannot reorder primaries.
* * packet.h, getkey.c (fixup_uidnode, merge_selfsigs_subkey): Keep track ofDavid Shaw2004-03-224-4/+22
| | | | | | | | | which self-sig we actually chose. * keyedit.c (menu_expire, menu_set_primary_uid, menu_set_preferences): Use it here to avoid updating non-used self-sigs and possibly promoting an old self-sig into consideration again.
* * keygen.c (write_keybinding, do_generate_keypair, generate_subkeypair):David Shaw2004-03-182-30/+42
| | | | | | Keep track of the unprotected subkey secret key so we can make a backsig with it.
* * keygen.c (gen_elg, gen_dsa, gen_rsa, do_create, do_generate_keypair,David Shaw2004-03-182-19/+31
| | | | | | | generate_subkeypair): New is_subkey argument to set whether a generated key is a subkey. Do not overload the ret_sk. This is some early cleanup to do backsigs for signing subkeys.
* * import.c (import_one): Try and collapse user IDs when importing a keyDavid Shaw2004-03-094-11/+23
| | | | | | | | | | | | for the first time. * build-packet.c (do_comment, do_user_id): Try for a headerlen of 2 since that's the smallest and most likely encoding for these packets * keyedit.c (menu_addrevoker): Allow appointing a subkey as a designated revoker if the user forces it via keyid!, so long as the subkey can certify. Also use the proper date string when prompting for confirmation.
* * iobuf.c (block_filter): Properly handle a partial body stream that endsDavid Shaw2004-03-012-0/+11
| | | | | with a 5-byte length that happens to be zero.
* * options.h (ctrl): New for member IN_AUTO_KEY_RETRIEVE.Werner Koch2004-03-014-8/+66
| | | | | | | | * mainproc.c (check_sig_and_print): track whether we are retrieving a key. * status.c (status_currently_allowed): New. (write_status_text, write_status_text_and_buffer): Use it here.
* * keyedit.c (menu_addrevoker): Do not allow appointing a subkey as aDavid Shaw2004-02-272-0/+12
| | | | | designated revoker.
* * gpg.sgml: Document --ask-cert-level, --max-output, andDavid Shaw2004-02-252-10/+40
| | | | | --default-cert-level.
* * delkey.c (do_delete_key): Allow deleting a public key with a secretDavid Shaw2004-02-253-7/+15
| | | | | | | | present if --expert is set. * plaintext.c (handle_plaintext): Make bytecount static so it works with multiple literal packets inside a message.
* * configure.ac: Update copyright.David Shaw2004-02-254-8/+31
| | | | | | | * README: Update version. * NEWS: Note --max-output, --list-config, --min-cert-level, and AIX fix.
* * encode.c (encode_simple): Show cipher with --verbose.David Shaw2004-02-246-160/+187
| | | | | | | | | | | | * options.h, g10.c (main), keyedit.c (sign_keys): Add --ask-cert-level option to enable cert level prompts during sigs. Defaults to on. Simplify --default-cert-check-level to --default-cert-level. If ask-cert-level is off, or batch is on, use the default-cert-level as the cert level. * options.h, g10.c (main), trustdb.c (mark_usable_uid_certs): Simplify --min-cert-check-level to --min-cert-level.
* * secmem.c (lock_pool) [_AIX]: Also set errno.Werner Koch2004-02-242-1/+6
|
* * options.h, g10.c (main), trustdb.c (mark_usable_uid_certs): AddDavid Shaw2004-02-235-30/+104
| | | | | | | | | --min-cert-check-level option to specify minimum cert check level. Defaults to 1 (so no sigs are ignored). 0x10 sigs cannot be ignored. * options.h, g10.c (main), plaintext.c (handle_plaintext): Add --max-output option to help people deal with decompression bombs.