aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* * idea-stub.c (load_module, idea_get_info): Return the proper type forDavid Shaw2003-12-302-19/+11
| | | | | idea_get_info from inside load_module. From Stefan Bellon.
* * rijndael.c, rndunix.c, twofish.c: Remove dead IS_MODULE code.David Shaw2003-12-306-190/+10
| | | | | | | * g10c.c: Dead code. Remove. * Makefile.am: Don't compile g10c.c.
* * g10u.c: Dead code. Remove.David Shaw2003-12-304-41/+11
| | | | | | | | * Makefile.am: Don't compile g10u.c. * iobuf.c (block_filter): Properly handle a partial body stream that ends with a 5-byte length.
* * misc.c (pull_in_libs): Dead code. Removed.David Shaw2003-12-308-45/+67
| | | | | | | | | | | | | | | | | | | | | | | * sig-check.c (check_revocation_keys): Comments. * getkey.c (merge_selfsigs_main): Don't bother to check designated revoker sigs if the key is already revoked. * packet.h, getkey.c (merge_selfsigs_main): New "maybe_revoked" flag on PKs. It is set when there is a revocation signature from a valid revocation key, but the revocation key is not present to verify the signature. * pkclist.c (check_signatures_trust): Use it here to give a warning when showing key trust. * compress-bz2.c: Include stdio.h. Solaris 9 has a very old bzip2 library and we can at least guarantee that it won't fail because of the lack of stdio.h. * tdbio.c: Fixed format string bugs related to the use of DB_NAME. Reported by Florian Weimer.
* * gpgkeys_hkp.c (send_key, get_key, main): Work with new HTTP code thatDavid Shaw2003-12-282-13/+37
| | | | | | | passes the proxy in from the outside. If the command file sends a proxy, use it. If it sends "http-proxy" with no arguments, use $http_proxy from the environment.
* * options.h, g10.c (main), keyserver.c (keyserver_opts,David Shaw2003-12-284-8/+9
| | | | | | | parse_keyserver_uri): honor-http-proxy is no longer an option since we can do the same thing with http-proxy with no arguments. Also remove broken-http-proxy since it can be better handled in the HTTP helper.
* * http.h: Pass the http proxy from outside rather than pulling it from theDavid Shaw2003-12-282-9/+16
| | | | | evironment.
* * http.c (send_request, http_open_document, http_open): Pass the httpDavid Shaw2003-12-282-29/+22
| | | | | proxy from outside rather than pulling it from the evironment.
* * keyserver.c (argsep): New variation on strsep that knows about optionalDavid Shaw2003-12-282-23/+60
| | | | | arguments. (parse_keyserver_options): Use it here for optional arguments.
* cleaned up RISC OS code and removed lots of unnecessary stuffStefan Bellon2003-12-2823-156/+197
|
* * keyserver.c (strip_leading_space, get_arg): New.David Shaw2003-12-282-1/+50
| | | | | | | (parse_keyserver_options): Use them here to allow arguments to keyserver-options. Since none of our options need arguments yet, just pass them through whole to the keyserver helper.
* * main.h, misc.c (parse_options): Add a "noisy" flag to enable and disableDavid Shaw2003-12-287-20/+35
| | | | | | | | | the messages about which option didn't match or matched ambiguously. Change all callers (g10.c, keyserver.c). * main.h, import.c (import_options), export.c (export_options): Pass the noisy flag through.
* * build-packet.c (write_fake_data, do_secret_key), seckey-cert.cDavid Shaw2003-12-174-11/+17
| | | | | | | | (do_check): Use an unsigned length for mpi_get_opaque. * options.h: It's impolite to assign -1 to an unsigned opt.force_ownertrust.
* * mpiutil.c (mpi_set_opaque, mpi_get_opaque): Make the length of an opaqueDavid Shaw2003-12-172-2/+7
| | | | | MPI unsigned.
* * mpi.h (gcry_mpi, mpi_get_opaque, mpi_set_opaque): Make nbits and theDavid Shaw2003-12-172-3/+6
| | | | | length of an opaque MPI unsigned.
* * sig-check.c (cmp_help, do_check), sign.c (do_sign): Remove old unusedDavid Shaw2003-12-174-80/+10
| | | | | | | code. * keyid.c (keyid_from_sk): Make sure lowbits is initialized.
* * dsa.h, dsa.c (dsa_verify), elgamal.h, elgamal.c (elg_verify), rsa.h,David Shaw2003-12-178-26/+19
| | | | | | rsa.c (rsa_verify), pubkey.c (dummy_verify, pubkey_verify): Remove old unused code.
* * cipher.h (pubkey_verify): Remove old unused code.David Shaw2003-12-172-2/+5
|
* * sig-check.c (do_check): Move the signing algo and hash checks fromDavid Shaw2003-12-132-12/+27
| | | | | | | | | here... (signature_check2): ... to here. (check_key_signature2): ... and here. This is a minor optimization to avoid fetching a key (which can be expensive, especially if it is not self-signed, and there are many key signatures on it which need to be checked for ultimate trust) if the signature would have failed anyway because of algorithm or hash problems.
* * packet.h, build-packet.c (hash_public_key): Remove function ...David Shaw2003-12-117-140/+105
| | | | | | | | | | | | | | | | | | | | * keydb.h, keyid.c (hash_public_key, do_fingerprint_md): ... and make a new one here that shares code with the fingerprint calculations. This removes some duplicated functionality, and is also around 14% faster. (Every bit helps). * import.c (import_one): No longer need the Elgamal import warning. * getkey.c (get_pubkey_fast): This one is sort of obscure. get_pubkey_fast returns the primary key when requesting a subkey, so if a user has a key signed by a subkey (we don't do this, but used to), AND that key is not self-signed, AND the algorithm of the subkey in question is not present in GnuPG, AND the algorithm of the primary key that owns the subkey in question is present in GnuPG, then we will try and verify the subkey signature using the primary key algorithm and hit a BUG(). The fix is to not return a hit if the keyid is not the primary. All other users of get_pubkey_fast already expect a primary only.
* * keyid.c (do_fingerprint_md): Remove the rules to hash the old v3 ElgamalDavid Shaw2003-12-102-22/+13
| | | | | keys. They are no longer needed.
* * keyid.c (keyid_from_sk, keyid_from_pk, fingerprint_from_pk,David Shaw2003-12-102-51/+86
| | | | | | fingerprint_from_sk): Enforce the v3-is-only-RSA rule. Anything that isn't RSA gets a zero keyid and fingerprint.
* * keyid.c (do_fingerprint_md): Properly handle hashing of keys that weDavid Shaw2003-12-102-28/+64
| | | | | | | | | don't know the structure of by using the opaque MPI. (do_fingerprint_md_sk): We cannot calculate the fingerprint from a secret key unless we know the structure (since we can't leave off the secret key parts), so fail early..... (keyid_from_sk, fingerprint_from_sk): .... and return all zeroes.
* Removed accidential added fileWerner Koch2003-12-091-16/+0
|
* * configure.ac: Add a min_automake_version.Werner Koch2003-12-092-15/+64
| | | | | | | * README.CVS: New. * autogen.sh: Revamped except for the --build-w32 hack. * Makefile.am: Add README.CVS
* * gpg.sgml: Fix a few missing semicolons in & entities. Noted byDavid Shaw2003-12-092-30/+38
| | | | | | | | Christian Biere. Some minor grammar fixes. Remove the "host -l pgp.net | grep wwwkeys" advice since the nameserver no longer all allow zone transfers. Replace it with a mention of hkp://subkeys.pgp.net. Note that BZIP2 defaults to compression level 6.
* * gpgsplit.c (write_part): Split off decompression code. (handle_zlib):David Shaw2003-12-062-81/+182
| | | | | | Move it here. (handle_bzip2): Add this to handle BZIP2 compressed messages.
* * http.c (send_request): Add a Host: header for virtual hosts.David Shaw2003-12-062-5/+7
|
* * Makefile.am: Reenable tests now that the Elgamal signature keys areDavid Shaw2003-12-058-878/+822
| | | | | | | | | gone. * defs.inc, pubring.asc, secring.asc, plain-1.asc, plain-2.asc, plain-3.asc: Remove the old v3 Elgamal keys and replace with RSA+Elgamal and RSA s+e.
* * miscutil.c (answer_is_yes_no_default, answer_is_yes_no_quit): Don't useDavid Shaw2003-12-052-5/+12
| | | | | | alternate strings when not needed so we don't have to re-translate them. Hopefully the comment will be enough to indicate multiple match strings.
* * config.links: Show target in asm-syntax.h file and include targets forDavid Shaw2003-12-052-2/+11
| | | | | K*BSD (GNU userland with BSD kernel).
* * cipher.h: Make cipher list match 2440bis-09.David Shaw2003-12-042-6/+9
|
* * pubkey.c (setup_pubkey_table): Don't allow signatures to and fromDavid Shaw2003-12-042-7/+46
| | | | | | | encrypt-only Elgamal keys. (pubkey_get_npkey, pubkey_get_nskey, pubkey_get_nsig, pubkey_get_nenc, pubkey_nbits): Wrap the RSA cheats in !USE_RSA. Add cheats for sign+encrypt Elgamal.
* * g10.c (strusage, main): Show development version warning in --versionDavid Shaw2003-12-042-7/+30
| | | | | | output. (main): Set --bzip2-compress-level to the default value at startup. Remove --emulate-checksum-bug noop.
* * options: Remove emulate-md-encode-bug.David Shaw2003-12-042-1/+4
|
* * options.h, g10.c (main), main.h, seskey.c (do_encode_md,David Shaw2003-12-047-35/+18
| | | | | | | encode_md_value), sig-check.c (do_check), sign.c (do_sign): Remove --emulate-md-encode-bug as it only applied to Elgamal signatures, which are going away.
* * NEWS: Note --disable-rsa.David Shaw2003-12-014-10/+62
| | | | | | | | * configure.ac: Add --disable-rsa. * README: Add --with-zlib, --with-bzip2, --without-bzip2, --disable-rsa, and --enable-minimal. Update gettext version.
* * pubkey.c (setup_pubkey_table): Only include RSA if USE_RSA is defined.David Shaw2003-12-012-3/+14
| | | | | | | | | | (pubkey_get_npkey): Return 2 for RSA even if it isn't available so we can at least handle RSA keys. ---------------------------------------------------------------------- pubkey.c CVS: ----------------------------------------------------------------------
* * README: Update version number. Add BZIP2. Remove Elgamal sign+encrypt.David Shaw2003-12-012-14/+18
|
* * mainproc.c (proc_symkey_enc, proc_encrypted): Add ability to useDavid Shaw2003-11-302-65/+105
| | | | | | | | --override-session-key on --symmetric messages (new-style or old-style). (proc_pubkey_enc): Move code to show session key from here to proc_encrypted() so it can work with any type of message. Suggested by Michael Young.
* * trustdb.c (validate_keys): Reset the trustdb before checking if we haveDavid Shaw2003-11-304-22/+20
| | | | | | | | | | | | | | any ultimately trusted keys. This ensures that if we lose all our ultimately trusted keys, we don't leave behind the old validity calculations. Noted by Peter Palfrader. * revoke.c (gen_desig_revoke): Specify in the comment when a designated revocation is generated. * getkey.c (merge_selfsigs_main, merge_selfsigs_subkey, get_seckey_byname2): Remove Elgamal check since we are removing type 20 keys altogether.
* post release version number bumbWerner Koch2003-11-272-1/+5
|
* (TESTS): Temporary remove tests using ElG signatures.V1-3-4Werner Koch2003-11-272-7/+21
|
* about to release 1.3.4Werner Koch2003-11-2712-1526/+1603
|
* * NEWS: Note that we won't encrypt to an Elgamal sign+encrypt key anyDavid Shaw2003-11-272-2/+8
| | | | | longer.
* Minor additionsWerner Koch2003-11-272-1/+5
|
* * pubkey.c (pubkey_sign): Return an error if an ElGamal key is used.Werner Koch2003-11-273-27/+43
| | | | | | | * elgamal.c (gen_k): New arg SMALL_K. (sign): Use it here with SMALL_K set to false (do_encrypt): and here with SMALL_K set to true.
* * pkclist.c (build_pk_list): Do not allow an empty PK list in interactiveDavid Shaw2003-11-273-4/+12
| | | | | | | | mode. * getkey.c (get_seckey_byname2): Disallow use of sign+encrypt Elgamal keys.
* Solved cvs conflictWerner Koch2003-11-272-1/+30
|
* Auto-updatesWerner Koch2003-11-275-636/+743
|