aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Require libgcrypt 1.5Werner Koch2011-03-0811-74/+33
| | | | | | | | Without Libgcrypt 1.5 is was not possible to use ECC keys. ECC is major new feature and thus it does not make sense to allow building with an older Libgcrypt without supporting ECC. Also fixed a few missing prototypes.
* Added option --inquire to PRESET_PASSPHRASE. Note that the inquired ↵Ben Kibbey2011-03-042-4/+30
| | | | passphrase will be truncated to the first encountered null byte.
* New agent option pinentry-mode.Werner Koch2011-03-036-45/+197
| | | | | This provides the framework and implements the ask, cancel and error. loopback will be implemented later.
* Print the secret keyinfo stuff with --card-status again.Werner Koch2011-03-033-65/+79
|
* Minor code cleanups.Werner Koch2011-03-033-8/+10
| | | | | | | * keyid.c (hash_public_key): Remove shadowing NBITS. * misc.c (pubkey_nbits): Replace GCRY_PK_ by PUBKEY_ALGO_. (get_signature_count): Remove warning.
* Fix faulty gcc warningsWerner Koch2011-03-035-11/+20
|
* Simplify the management of the stream list in estream.cWerner Koch2011-03-032-66/+83
|
* fix wLangId in ccid-driver.cNIIBE Yutaka2011-03-021-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | This is not a part of pin pad support series of mine. As I found the bug while I am preparing the patches, I report this. As CCID protocol is little endian, wLangId of US English = 0x0409 is represented as two bytes of 0x09 then 0x04. It is really confusing that the code like following is floating around: pin_verify -> wLangId = HOST_TO_CCID_16(0x0904); But, it is 0x0409 (not 0x0904). It is defined in the documentation: http://www.usb.org/developers/docs/USB_LANGIDs.pdf and origin of this table is Microsoft. We can see it at: http://msdn.microsoft.com/en-us/library/bb165625%28VS.80%29.aspx Yes, it would be better not to hard-code 0x0409. It would be better to try current locale of the user, or to use the first entry of string descriptor. I don't have time to implement such a thing...
* Fix usage of SHA-2 algorithm with OpenPGP cards.Werner Koch2011-03-027-154/+39
| | | | | | | This was a regression in 2.1 introduced due to having the agent do the signing in contrast to the old "SCD PKSIGN" command which accesses the scdaemon directly and passed the hash algorithm. The hash algorithm is used by app-openpgp.c only for a sanity check.
* Add comment to last patch.Werner Koch2011-03-022-14/+23
|
* Added option --data to KEYINFO to return the result with a data response.Ben Kibbey2011-03-021-12/+27
|
* Let KEYINFO show the cached status of a key grip.Ben Kibbey2011-03-021-1/+11
|
* Rename Ben's new option.Werner Koch2011-03-022-7/+11
|
* Added CLEAR_PASSPHRASE option --agent to search the cache for a cacheid with ↵Ben Kibbey2011-03-021-3/+10
| | | | a mode of CACHE_MODE_NORMAL. These cache modes are created with PKDECRYPT.
* Fix doc/Makefile target onlineWerner Koch2011-03-021-8/+7
|
* Move parameter file description to the manual.Werner Koch2011-03-015-366/+474
|
* Support X.509 certificate creation.Werner Koch2011-03-018-81/+615
| | | | | | | | | | | | | | | | | | | | | | | | | Using "gpgsm --genkey" allows the creation of a self-signed certificate via a new prompt. Using "gpgsm --genkey --batch" should allow the creation of arbitrary certificates controlled by a parameter file. An example parameter file is Key-Type: RSA Key-Length: 1024 Key-Grip: 2C50DC6101C10C9C643E315FE3EADCCBC24F4BEA Key-Usage: sign, encrypt Serial: random Name-DN: CN=some test key Name-Email: [email protected] Name-Email: [email protected] Hash-Algo: SHA384 not-after: 2038-01-16 12:44 This creates a self-signed X.509 certificate using the key given by the keygrip and using SHA-384 as hash algorithm. The keyword signing-key can be used to sign the certificate with a different key. See sm/certreggen.c for details.
* Update some M4 files and AUTHORS.Werner Koch2011-03-017-20/+44
|
* Add new functions to convert iso time strings.Werner Koch2011-03-016-24/+253
|
* Update gpg-error.m4 and libgcrypt.m4Werner Koch2011-02-233-8/+40
|
* Fix dirmngr crash (bug#1300)Werner Koch2011-02-232-1/+9
|
* Lock scdaemon to CCID if once found.Werner Koch2011-02-237-143/+239
| | | | | | | | This solves a problem where ccid was used, the card unplugged and then scdaemon tries to find a new (plugged in) reader and thus will eventually try PC/SC over and over again. Also added an explicit --kill command to gpgconf.
* Fix ChnageLog entries.Werner Koch2011-02-152-4/+5
|
* fixed --list-keys on Linux64 bitAndrey Jivsov2011-02-122-2/+7
|
* Add ECC sign, verify, encrypt and decrypt testsWerner Koch2011-02-112-105/+165
|
* Remove debug code from regression test pinentryWerner Koch2011-02-102-20/+45
| | | | Also updated de.po
* Add ECC import regression tests and fixed a regression.Werner Koch2011-02-1015-48/+473
| | | | | | The import test imports the keys as needed and because they are passphrase protected we now need a pinentry script to convey the passphrase to gpg-agent.
* Replace printf by es_printf in keyserver.cWerner Koch2011-02-092-27/+28
| | | | This is similar to the change in keylist.c and elsewhere.
* Add framework to print keyserver engine informationWerner Koch2011-02-0910-5/+179
|
* Support key fetching using HTTP.Werner Koch2011-02-096-8/+164
| | | | | | A simple test case is: gpg2 --fetch-key http://werner.eifelkommune.de/mykey.asc
* Add finger support to dirmngr.Werner Koch2011-02-0814-102/+606
| | | | | | | | | | | | | The basic network code from http.c is used for finger. This keeps the network related code at one place and we are able to use the somewhat matured code form http.c. Unfortunately I had to enhance the http code for more robustness and probably introduced new bugs. Test this code using gpg --fetch-key finger:[email protected] (I might be the last user of finger ;-)
* Fix ECDSA 521 bit signing.Werner Koch2011-02-074-16/+27
| | | | | This fix also allows the creation and use of an 521 bit ECDH key which used to fail while creating the binding signature.
* Nuked almost all trailing white space.post-nuke-of-trailing-wsWerner Koch2011-02-04305-5592/+5385
| | | | | | | | We better do this once and for all instead of cluttering all future commits with diffs of trailing white spaces. In the majority of cases blank or single lines are affected and thus this change won't disturb a git blame too much. For future commits the pre-commit scripts checks that this won't happen again.
* Let autogen.sh check the git configWerner Koch2011-02-042-15/+41
| | | | | | | | To avoid checking in trailing scripts the autogen.sh script now enables the standard pre-commit hook, which check for this. Add a cleanpo filter if not yet set. This works with together with po/.gitattributes.
* Removed deprecated SIGEXPIRED status line.Werner Koch2011-02-043-7/+15
|
* Fix test for gcry_pk_get_curve.Werner Koch2011-02-036-36/+48
| | | | | Add a compatibility fixes for the non-curve case. Remove -lber from the dirmngr link line.
* Add a DECRYPTION_INFO status.Werner Koch2011-02-035-63/+81
| | | | | | | DECRYPTION_INFO <mdc_method> <sym_algo> Print information about the symmetric encryption algorithm and the MDC method. This will be emitted even if the decryption fails.
* Relax mailbox name checking. Fixes bug#1315.Werner Koch2011-02-032-41/+43
|
* Extend algo selection menu.Werner Koch2011-02-033-42/+75
| | | | | | | This allows to add an ECC key and to set the capabilities of an ECDSA key. Fix printing of the ECC algorithm when creating a signature.
* Update copyright yearWerner Koch2011-02-036-107/+114
| | | | Nuked some trailing spaces.
* Merge branch 'ECC-INTEGRATION-2-1'ecc-integration-doneWerner Koch2011-02-0351-3034/+3137
|\
| * Finished ECC integration.ECC-INTEGRATION-2-1Werner Koch2011-02-0311-293/+337
| | | | | | | | | | | | | | | | | | | | | | | | Wrote the ChangeLog 2011-01-13 entry for Andrey's orginal work modulo the cleanups I did in the last week. Adjusted my own ChangeLog entries to be consistent with that entry. Nuked quite some trailing spaces; again sorry for that, I will better take care of not saving them in the future. "git diff -b" is useful to read the actual changes ;-). The ECC-INTEGRATION-2-1 branch can be closed now.
| * Compute the fingerprint for ECDH only on demand.Werner Koch2011-02-024-79/+90
| | | | | | | | | | This also fixes a failed assertion when using a v3 key where the fingerprint size is not 20.
| * Sample ECC keys and message do now work.Werner Koch2011-02-0219-355/+691
| | | | | | | | | | | | | | | | Import and export of secret keys does now work. Encryption has been fixed to be compatible with the sample messages. This version tests for new Libgcrypt function and thus needs to be build with a new Libgcrypt installed.
| * Move OpenPGP OID helpers to common/.Werner Koch2011-01-3110-242/+393
| | | | | | | | | | | | | | This is needed so that the agent will be able to export and import OpenPGP secret keys. Add test case. Removed unused function.
| * Fixed the ECC interface to Libgcrypt to be ABI compatible with the previous ↵Werner Koch2011-01-319-147/+119
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | version. Quite some changes were needed but in the end we have less code than before. Instead of trying to do everything with MPIs and pass them back and forth between Libgcrypt and GnuPG, we know use the S-expression based interface and make heavy use of our opaque MPI feature. Encryption, decryption, signing and verification work with self-generared keys. Import and export does not yet work; thus it was not possible to check the test keys at https://sites.google.com/site/brainhub/pgpecckeys .
| * Reworked the ECC changes to better fit into the Libgcrypt API.Werner Koch2011-01-3112-358/+621
| | | | | | | | | | See ChangeLog for details. Key generation, signing and verification works. Encryption does not yet work. Requires latest Libgcrypt changes.
| * Update gitignoreWerner Koch2011-01-262-2088/+9
| |
| * Update gitignore to the one used in tye 2.0 branch.Werner Koch2011-01-261-1/+122
| |
| * Update gitignore and add attributes to po/Werner Koch2011-01-262-0/+9
| |