| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
|
| |
on an autoconverted public key. The check should only happen on the
sk size. Noted by Dirk Traulsen.
|
|
|
|
|
|
|
|
| |
(not a copy) of the stub secret key for the secret key we just
generated on the card. (generate_card_subkeypair): Use it here so
that the signing key on the card can use the card to generate the 0x19
backsig on the primary key. Noted by Janko Heilgeist and Jonas Oberg.
|
|
|
|
|
|
|
| |
This prevents a memory allocation attack with a very large user ID. A
very large packet length could even cause the allocation (a u32) to wrap
around to a small number. Noted by Evgeny Legerov on full-disclosure.
|
| |
|
|
|
|
|
| |
arbitrarily long temporary directory paths.
|
|
|
|
|
|
|
| |
1024 when --enable-dsa2 is set). The size of q is set automatically based
on the key size. (ask_keysize, generate_keypair): Ask for DSA size when
--enable-dsa2 is set.
|
| |
|
|
|
|
|
| |
that is over 256 bytes long. Noted by Israel G. Lugo.
|
|
|
|
|
| |
when generating samplekeys.asc.
|
|
|
|
|
|
|
|
| |
called with them closed. This is to protect our keyring/trustdb files
from corruption if they get attached to one of the standard fds. Print a
warning if possible that this has happened, and fail completely if we
cannot reopen (should never happen). (main): Call it here.
|
|
|
|
|
| |
so the compiler doesn't rearrange things and eliminate variables.
|
|
|
|
|
|
|
|
|
| |
(build_sig_subpkt_from_sig), getkey.c (fixup_uidnode,
merge_selfsigs_main, merge_selfsigs_subkey), keygen.c
(keygen_add_key_expire): Fix meaning of key expiration and sig
expiration subpackets - zero means "never expire" according to 2440,
not "expire instantly".
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
* configure.ac: Remove check for noexecstack and invoke
CL_AS_NOEXECSTACK instead.
m4/
2006-05-22 Marcus Brinkmann <[email protected]>
* noexecstack.m4: New file.
|
|
|
|
|
|
| |
problem when auto-key-locate returns a list of keys, not all of which are
usable (revoked, expired, etc). Noted by Simon Josefsson.
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
* configure.ac: Remove --enable-old-keyserver-helpers. Comment out
--enable-m-guard for now.
|
|
|
|
|
| |
but no --keyserver set.
|
|
|
|
|
|
| |
to add "_uri" to certain gpgkeys_xxx helpers when the meaning is
different if a path is provided (i.e. ldap).
|
| |
|
|
|
|
|
|
|
|
| |
this is done via curl or fake-curl.
* ksutil.h, ksutil.c, gpgkeys_hkp.c, gpgkeys_curl.c: Minor #include tweaks
as FAKE_CURL is no longer meaningful.
|
|
|
|
|
| |
a place not in the regular include search path.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
to disable.
* pkclist.c (algo_available): If --enable-dsa2 is set, we're allowed to
truncate hashes to fit DSA keys.
* sign.c (match_dsa_hash): New. Return the best match hash for a given q
size. (do_sign, hash_for, sign_file): When signing with a DSA key, if it
has q==160, assume it is an old DSA key and don't allow truncation unless
--enable-dsa2 is also set. q!=160 always allows truncation since they
must be DSA2 keys. (make_keysig_packet): If the user doesn't specify a
--cert-digest-algo, use match_dsa_hash to pick the best hash for key
signatures.
|
|
|
|
|
| |
size doesn't end between byte boundaries.
|
|
|
|
|
| |
Not yet used (q==160).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
SHA-224.
* sign.c (write_plaintext_packet), encode.c (encode_simple): Factor
common literal packet setup code from here, to...
* main.h, plaintext.c (setup_plaintext_name): Here. New. Make sure the
literal packet filename field is UTF-8 encoded.
* options.h, gpg.c (main): Make sure --set-filename is UTF-8 encoded
and note when filenames are already UTF-8.
|
| |
|
| |
|
|
|
|
|
| |
have no need to backsign.
|
|
|
|
|
| |
--compress-algo should be avoided.
|
|
|
|
|
| |
characters lose part of their ASCII representation.
|
| |
|
|
|
|
|
| |
inform people not to use it.
|
|
|
|
|
| |
viewer at runtime. Seems FC5 doesn't have xloadimage.
|
| |
|
| |
|
|
|
|
|
| |
directly into place rather than mallocing temporary buffers.
|
|
|
|
|
| |
using sprintf which is harder to read and modify.
|
|
|
|
|
|
|
|
| |
and KS_SEARCH_KEYID_LONG to search for a key ID.
* gpgkeys_ldap.c (search_key): Use it here to flip from pgpUserID
searches to pgpKeyID or pgpCertID.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* keyedit.c (menu_backsign): Allow backsigning even if the secret
subkey doesn't have a binding signature.
* armor.c (radix64_read): Don't report EOF when reading only a pad (=)
character. The EOF actually starts after the pad.
* gpg.c (main): Make --export, --send-keys, --recv-keys,
--refresh-keys, and --fetch-keys follow their arguments from left to
right. Suggested by Peter Palfrader.
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
| |
stderr and allow spaces in a fingerprint. Also warn when a key is
over 16k (as that is the default max-cert-size) and fail when a key is
over 64k as that is the DNS limit in many places.
|
|
|
|
|
| |
so people don't have to do it manually.
|