| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
| |
* agent/genkey.c (check_passphrase_constraints): Build a final warning
after all checks.
|
|
|
|
|
| |
* agent/genkey.c (check_passphrase_constraints): Moev empty passphrase
check to the front.
|
|
|
|
|
|
|
|
|
|
|
| |
* g10/gpg.c (aQuickKeygen): New.
* g10/misc.c (is_valid_user_id): New stub.
* g10/keygen.c (quickgen_set_para): New.
(quick_generate_keypair): New.
--
Note that the validation of the specified user id has not yet been
implemented.
|
|
|
|
|
| |
* g10/cpr.c (cpr_get_answer_is_yes): Factor code out to ....
(cpr_get_answer_is_yes_def): ...new.
|
|
|
|
| |
* g10/keyedit.c (sign_uids): Promote local sigs in quick mode.
|
|
|
|
| |
--
|
|
|
|
|
|
|
|
| |
* scd/apdu.c (NEED_PCSC_WRAPPER): Do not define.
* scd/Makefile.am (libexec_PROGRAMS): Remove gnupg-pcsc-wrapper
(gnupg_pcsc_wrapper_SOURCES): Remove.
(gnupg_pcsc_wrapper_LDADD): Remove.
(gnupg_pcsc_wrapper_CFLAGS): Remove.
|
|
|
|
| |
* g10/parse-packet.c: Add list_mode output for certain failures.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* g10/parse-packet.c (parse_attribute): Avoid xmalloc failure and cap
size of packet.
--
Tavis Ormandy reported a fatal error for attribute packets with a zero
length payload. This is due to a check in Libgcrypt's xmalloc which
rejects a malloc(0) instead of silently allocating 1 byte. The fix is
obvious.
In addition we cap the size of attribute packets similar to what we do
with user id packets. OpenPGP keys are not the proper way to store
movies.
|
|
|
|
| |
--
|
| |
|
|
|
|
| |
--
|
| |
|
|
|
|
|
|
|
|
|
|
| |
* common/t-timestuff.c (test_timegm): Use timegm if available.
(main): Set TX to UTC if timegm is not available.
--
On OpenBSD 5.3 i386 that test failed due to the use of mktime.
Reported-by: Claus Assmann
|
| |
|
|
|
|
| |
--
|
|
|
|
| |
--
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* configure.ac (GNUPG_OPENPGP_REVOC_DIR): New config define.
* g10/revoke.c (create_revocation): Add arg "leadin".
(gen_standard_revoke): New.
* g10/openfile.c (get_openpgp_revocdir): New.
(open_outfile): Add MODE value 3.
* g10/keyid.c (hexfingerprint): New.
* g10/keygen.c (do_generate_keypair): Call gen_standard_revoke.
--
GnuPG-bug-id: 1042
|
|
|
|
|
| |
* common/estream-printf.c (pr_string): Take care of non-nul terminated
strings.
|
|
|
|
|
| |
* g10/revoke.c (gen_revoke): Factor some code out to ...
(create_revocation): new.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* common/iobuf.c (direct_open): Add arg MODE700.
(iobuf_create): Ditto.
* g10/openfile.c (open_outfile): Add arg RESTRICTEDPERM. Change call
callers to pass 0 for it.
* g10/revoke.c (gen_desig_revoke, gen_revoke): Here pass true for new
arg.
* g10/export.c (do_export): Pass true for new arg if SECRET is true.
--
GnuPG-bug-id: 1653.
Note that this works only if --output has been used.
|
|
|
|
| |
* common/iobuf.c (direct_open) [__riscos__]: Simply cpp conditionals.
|
| |
|
|
|
|
| |
--
|
| |
|
| |
|
|
|
|
|
| |
* agent/gpg-agent.c (handle_connections) [W32]: Make events_set an
unsigned int to match the changed prototype.
|
|
|
|
|
| |
* common/homedir.c (dirmngr_user_socket_name): Use same code for all
platforms.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
| |
* configure.ac: Remove option --build-agent-only.
(FAKE_CURL, GPGKEYS_CURL): Remove check for cURL
(GPGKEYS_MAILTO): Remove ac_subst but keep the currently unused
SENDMAIL check.
(GPGKEYS_KDNS): Remove ac_subst.
* autogen.rc (final_info): Remove suggestion to use the removed option
--enable-mailto.
|
|
|
|
|
|
|
|
|
|
| |
* scd/ccid-driver.h (VENDOR_REINER, CYBERJACK_GO): New.
* scd/ccid-driver.c (ccid_transceive_secure): Handle the case for
VENDOR_REINER. Original work was by Alina Friedrichsen (tiny change).
--
This is revised version which adapts changes of ccid-driver and was
later ported from branch-2.0 to master (2.1)
|
|
|
|
|
|
|
|
|
| |
* scd/ccid-driver.h (GEMPC_CT30): New product id.
* scd/ccid-driver.c (parse_ccid_descriptor): Add quirk for that
reader.
--
GnuPG-bug-id: 1638
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* g10/keygen.c (gen_elg): Enforce keysize 1024 to 4096.
(gen_rsa): Enforce keysize 1024 to 4096.
(gen_dsa): Enforce keysize 768 to 3072.
--
It was possible to create 16k RSA keys in batch mode. In addition to the
silliness of such keys, they have the major drawback that under GnuPG
and Libgcrypt, with their limited amount of specially secured memory
areas, the use of such keys may lead to an "out of secure memory"
condition.
|
|
|
|
|
| |
* configure.ac (GPGKEYS_HKP, GPGKEYS_FINGER): Remove ac_subst.
(use_dns_srv): Make test work.
|
|
|
|
|
| |
* agent/cvt-openpgp.c (convert_transfer_key): Fix sexp build format
string.
|
| |
|
|
|
|
|
|
|
| |
* build-aux/speedo.mk (clean-$(1)): Take care of gnupg.
--
I learned it the hard way and lost a bunch of stashed changes.
|
| |
|
| |
|
|
|
|
|
| |
* doc/texi.css: Remove.
* doc/Makefile.am (AM_MAKEINFOFLAGS): Use --css-ref.
|
|
|
|
|
|
|
| |
* g10/card-util.c (card_store_subkey): Allo CERT usage for key 0.
--
Suggested-by: Dominik Heidler <[email protected]>
|
|
|
|
|
| |
--
GnuPG-bug-id: 1615
|
|
|
|
|
| |
--
GnuPG-bug-id: 1655
|
|
|
|
| |
--
|
| |
|
|
|
|
|
|
|
|
| |
* agent/cvt-openpgp.c (convert_to_openpgp): Use the curve name instead
of the curve parameters.
* g10/export.c (canon_pubkey_algo): Rename to ...
(canon_pk_algo): this. Support ECC.
(transfer_format_to_openpgp): Expect curve name.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* g10/compress.c (do_uncompress): Limit the number of extra FF bytes.
--
A packet like (a3 01 5b ff) leads to an infinite loop. Using
--max-output won't help if it is a partial packet. This patch
actually fixes a regression introduced on 1999-05-31 (c34c6769).
Actually it would be sufficient to stuff just one extra 0xff byte.
Given that this problem popped up only after 15 years, I feel safer to
allow for a very few FF bytes.
Thanks to Olivier Levillain and Florian Maury for their detailed
report.
|
| |
|
| |
|