| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
|
|
| |
--
The second thing is to explain the file names below under
~/.gnupg/openpgp-revocs.d/.
|
|
|
|
| |
--
|
|
|
|
| |
* build-aux/getswdb.sh: Check for required tools.
|
|
|
|
|
|
| |
* build-aux/getswdb.sh: Add option --find-sha1sum.
* build-aux/speedo.mk (check-tools): New phony target. Not yet used.
(SHA1SUM): New var. Use it instead of sha1sum.
|
|
|
|
|
|
| |
* g10/keydb.c (maybe_create_keyring_or_box): Rename arg for clarity.
(keydb_add_resource): Fix order of args to maybe_create_keyring_or_box
and check and create .kbx.
|
|
|
|
| |
--
|
|
|
|
|
|
|
| |
* g10/delkey.c (do_delete_key): Check availibility of a secret key.
--
Actually we check that at least one secret subkey exists.
|
|
|
|
| |
* g10/keygen.c (ask_algo): Change 9 to "ECC and ECC".
|
|
|
|
| |
--
|
|
|
|
| |
--
|
| |
|
|
|
|
| |
* Makefile.am (EXTRA_DIST): Add speedo stuff.
|
| |
|
|
|
|
|
|
| |
* common/Makefile.am (module_maint_tests): Use only in maintainer
mode.
(t_common_cflags): New.
|
|
|
|
|
|
|
|
|
|
| |
* common/exechelp-posix.c: Remove weak pragmas.
* common/sexputil.c (make_canon_sexp_from_rsa_pk): Remove double
const.
--
We do not use Pth anymore and thus there is no more need for the weak
pragmas.
|
|
|
|
|
|
| |
* g13/call-gpg.c (gpg_encrypt_blob): Init some vars in case of an
early error.
(gpg_decrypt_blob): Ditto.
|
|
|
|
|
|
|
| |
* scd/app-p15.c (parse_certid): Use snprintf and cast value.
(send_certinfo): Ditto.
(send_keypairinfo): Ditto.
(do_getattr): Ditto.
|
|
|
|
| |
* agent/pksign.c (do_encode_md): Init HASH on error.
|
|
|
|
|
| |
* agent/command-ssh.c (ssh_signature_encoder_eddsa): Remove debug
output.
|
|
|
|
|
| |
* agent/call-pinentry.c (agent_query_dump_state): Use %p for
POPUP_TID.
|
|
|
|
|
|
| |
* sm/certreqgen-ui.c (gpgsm_gencertreq_tty): Remove unused var I.
* sm/certreqgen.c (proc_parameters): Init PUBLIC to avoid compiler
warning.
|
|
|
|
| |
* g10/parse-packet.c (enum_sig_subpkt): Replace hack.
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* g10/gpg.c (print_mds): Replace openpgp_md_test_algo.
--
This is actually not required because as of now the used OpenPGP and
Gcrypt hash algorithm numbers are identical. But that might change in
the future.
This changes the behavior of GnuPG in case it has been build with
some algorithms disabled: If those algorithms are available in
Libgcrypt, their results will be used printed anyway.
|
|
|
|
| |
--
|
|
|
|
|
| |
* build-aux/speedo.mk: Take zlib and bzip2 from ftp.gnupg.org. Minor
other fixes.
|
|
|
|
|
|
|
|
|
|
| |
--
Building for the native platform is now a mere
make -f build-aux/speedo.mk native
You may also use "help" as target.
|
|
|
|
| |
--
|
|
|
|
|
|
|
|
|
|
| |
* g10/keyedit.c (subkey_expire_warning): New.
(keyedit_menu): Call it when needed.
--
GnuPG-bug-id: 1715
The heuristic to detect a problem is not very advanced but it should
catch the most common cases.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* agent/cache.c (last_stored_cache_key): New.
(agent_get_cache): Allow NULL for KEY.
(agent_store_cache_hit): New.
* agent/findkey.c (unprotect): Call new function and try to use the
last stored key.
* g10/revoke.c (create_revocation): Add arg CACHE_NONCE and pass to
make_keysig_packet.
(gen_standard_revoke): Add arg CACHE_NONCE and pass to
create_revocation.
* g10/keygen.c (do_generate_keypair): Call gen_standard_revoke with
cache nonce.
--
This patch adds two features:
1. The key for the last passphrase successfully used for unprotecting
a key is stored away. On a cache miss the stored away passphrase is
tried as well. This helps for the common GPG use case of having a
signing and encryption (sub)key with the same passphrase. See the
code for more comments.
2. The now auto-generated revocation certificate does not anymore
popup a passphrase prompt. Thus for standard key generation the
passphrase needs to be given only once (well, two with the
confirmation).
|
|
|
|
|
|
|
|
|
| |
* common/openpgpdefs.h (PUBKEY_ALGO_EDDSA): Change to 22.
* g10/keygen.c (ask_curve): Reword the Curve25519 warning note.
--
In the hope that the IETF will eventually assign 22 for EdDSA using
the draft-koch-eddsa-for-openpgp-01 specs we start using this number.
|
|
|
|
|
|
|
| |
--
1.14 had a problem in its ABI and was thus remove from the FTP Server
after 3 days. 1.15 fixes this.
|
|
|
|
| |
--
|
|
|
|
|
|
|
|
| |
* g10/parse-packet.c (parse_key): Take care of too short packets for
old style commet packets.
--
GnuPG-bug-id: 1714
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* dirmngr/ks-engine-hkp.c (cert_log_cb): Move to ...
* dirmngr/misc.c (cert_log_cb): here.
* dirmngr/ks-engine-http.c (ks_http_fetch): Support 307-redirection
and https.
--
Note that this requires that the root certificates are registered using
the --hkp-cacert option. Eventually we may introduce a separate
option to allow using different CAs for KS_FETCH and keyserver based
requests.
|
|
|
|
|
|
|
|
|
|
| |
* common/http.c (http_session_ref): Allow for NULL arg.
--
We always test for a an existing session and thus passing NULL as
session object should be allowed.
Reported-by: Jens Lechtenboerger
|
|\ |
|
| |
| |
| |
| |
| | |
* g10/pkglue.c (pk_encrypt): Fix memory leak and streamline error
handling.
|
| |
| |
| |
| | |
--
|
| |
| |
| |
| |
| | |
--
Debian-bug-id: 760273
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
* common/openpgp-oid.c (struct oidtable): New.
(openpgp_curve_to_oid): Rewrite and allow OID as input.
(openpgp_oid_to_curve): Make use of the new table.
--
Due to the previous change we now usually store the OID with the
private key and not the name. Thus during import we do not anymore
need to map the name to an oid but can use the oid directly. We fix
that by extending openpgp_curve_to_oid to allow an oidstr as input.
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
* agent/cvt-openpgp.c (get_keygrip): Special case EdDSA.
(convert_secret_key): Ditto.
(convert_transfer_key): Ditto.
(apply_protection): Handle opaque MPIs.
(do_unprotect): Check FLAG_OPAQUE instead of FLAG_USER1 before
unpacking an opaque mpi.
--
The key transfer protocol between gpg and gpg-agent uses gcrypt
algorithm numbers which merge all ECC algorithms into one. Thus it is
not possible to use the algorithm number to determine the EdDSA
algorithm. We need to known that because Libgcrypt requires the
"eddsa" flag with the curve "Ed25519" to actually use the Ed25519
signature specification.
The last fix is for correctness; the first case won't be used anyway.
|
| |
| |
| |
| |
| |
| | |
* g10/export.c (transfer_format_to_openpgp): Move the check against
PUBKEY_MAX_NSKEY to after the ECC code adjusts the number of
parameters.
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
* agent/protect.c (PROT_CIPHER): Rename to GCRY_CIPHER_AES128 for
clarity.
(do_decryption): Add args prot_cipher and prot_cipher_keylen. USe
them instead of the hardwired values.
(agent_unprotect): Change to use a table of protection algorithms.
Add AES-256 variant.
--
This patch will make a possible future key protection algorithm
changes smoother. AES-256 is also allowed although there is currently
no way to encrypt using it.
|
| |
| |
| |
| | |
--
|
| |
| |
| |
| |
| | |
* g10/gpg.c (build_list_pk_test_algo): Ignore RSA aliases
(build_list_md_test_algo): Ignore MD5.
|
| |
| |
| |
| | |
* g10/keygen.c (keygen_set_std_prefs): Update prefs.
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
* configure.ac (NEED_GPG_ERROR_VERSION): Reguire 1.14.
(GPGRT_ENABLE_ES_MACROS): Define.
(estream_INIT): Remove.
* m4/estream.m4: Remove.
* common/estream-printf.c, common/estream-printf.h: Remove.
* common/estream.c, common/estream.h: Remove.
* common/init.c (_init_common_subsystems): Call gpgrt initialization.
|
|/
|
|
|
| |
* g10/gpg.c (build_list_pk_test_algo): Ignore RSA aliases
(build_list_md_test_algo): Ignore MD5.
|
|
|
|
|
|
|
|
|
| |
* g10/passphrase.c (passphrase_get): Replace sprintf by xasprintf.
--
Without that at least the French translation does not always work
because it requires positional parameters. Windows for example does
not support them as they are not defined by C99 but by POSIX.
|
|
|
|
|
| |
* g10/parse-packet.c (unknown_pubkey_warning): Check for encr/sign
capabilities.
|