aboutsummaryrefslogtreecommitdiffstats
path: root/cipher (unfollow)
Commit message (Collapse)AuthorFilesLines
2013-01-11Fix idea.c for big endian CPUs.Werner Koch1-7/+7
* cipher/idea.c: Replace use of WORDS_BIGENDIAN by BIG_ENDIAN_HOST. -- GnuPG-bug-id: 1461
2012-11-08Support the not anymore patented IDEA cipher algorithm.Werner Koch3-188/+414
* cipher/idea.c: New. Take from Libgcrypt master and adjust for direct use in GnuPG. * cipher/idea-stub.c: Remove. * cipher/Makefile.am: Add idea.c and remove idea-stub.c rules. * configure.ac: Remove idea-stub code. * g10/gpg.c (check_permissions): Remove code path for ITEM==2. (main): Make --load-extension a dummy option. * g10/keygen.c (keygen_set_std_prefs): Include IDEA only in PGP2 compatibility mode. * g10/misc.c (idea_cipher_warn): Remove. Also remove all callers. * g10/seckey-cert.c (do_check): Remove emitting of STATUS_RSA_OR_IDEA. * g10/status.c (get_status_string): Remove STATUS_RSA_OR_IDEA. * g10/status.h (STATUS_RSA_OR_IDEA): Remove. -- To keep the number of actually used algorithms low, we support IDEA only in a basically read-only way (unless --pgp2 is used during key generation). It does not make sense to suggest the use of this old 64 bit blocksize algorithm. However, there is old data available where it might be helpful to have IDEA available.
2012-11-07Fix usage of dlerror to conform to POSIX.Werner Koch1-6/+8
* cipher/idea-stub.c: Clear last error before dlsym. -- This is required for NetBSD. Reported-by: Thomas Klausner
2012-11-07Improve handling of random_seed read errors.Werner Koch1-1/+25
* cipher/random.c (read_seed_file): Distinguish between errors and short reads. -- This should help to avoid program aborts due to races. Nevertheless a better and cross-platform locking would be a more solid solution. GnuPG-bug-id: 1439
2012-11-07Remove trailing white space from one fileWerner Koch1-10/+10
--
2012-01-24Fix typos in comments.Werner Koch2-3/+3
-- Fixes provided by Gilles Espinasse.
2012-01-12Typo fixes and comment re-formatting.Werner Koch1-5/+6
2012-01-10Use gcc pragmas to suppress some warnings.Werner Koch1-11/+15
* configure.ac (AH_BOTTOM): Add GNUPG_GCC_VERSION macro. * util/estream-printf.c (pr_float): Use new gcc pragma to ignore a warning about a non-literal format. * util/miscutil.c (asctimestamp): Ditto. * cipher/md.c (md_stop_debug): Use new gcc pragme to ignore a warning * about a set but unused variable.
2011-12-02Rename all ChangeLog files to ChangeLog-2011.Werner Koch1-2/+9
* ChangeLog: New file.
2011-08-09Removed some set but unused vars.Werner Koch2-12/+19
2011-08-09Fix aliasing problem.Werner Koch1-1035/+1043
2010-10-18Add a minor feature for w32.gnupg-1.4.11Werner Koch2-3/+14
2010-09-28The rest of the VMS changes.Werner Koch1-0/+2
2010-09-28Minor changes to help the VMS portWerner Koch2-3/+60
2010-08-31Minor fixesWerner Koch1-0/+4
2008-07-17Revert that last stupid setuid detection fix.Werner Koch2-2/+2
2008-04-17Add Camellia-192.David Shaw3-4/+43
2008-03-22Improved AES performance.Werner Koch4-240/+369
2007-12-12Updated ZH po file.Werner Koch2-0/+14
Allow de/encryption using legacy type 20 keys. Updated config.{sub,guess}
2007-12-11Allow decryption using type 20 key.Werner Koch2-0/+11
2007-11-29Add 128-bit variant of Camellia.David Shaw3-13/+53
2007-11-28* sha256.c (sha224_get_info): 4880 has an error in the SHA-224 OID andDavid Shaw2-2/+7
we inherited it. Fixing.
2007-10-23Switched to GPLv3.Werner Koch40-153/+80
Updated gettext.
2007-07-09Add an extra warning for Camellia.Werner Koch3-2/+8
Minor W32 fix Address change.
2007-06-13Add Camellia. Do not enable this if you are not doing interopDavid Shaw7-4/+1727
testing. It is not (yet) legal OpenPGP, is not interop tested yet (obviously), and it's a great way to lose your data. Just don't do it.
2006-12-11Removed the use of g10defs.h.Werner Koch6-27/+48
This required some code cleanups and the introduction of a few accessor ducntions in mpi.
2006-11-29Preparing an RCWerner Koch2-1/+6
2006-06-28* rsa.c (generate): Use e=65537 for new RSA keys.David Shaw2-13/+13
2006-04-20(generate): Tweak to allow keys larger than 1024 bits. Enforce that the qDavid Shaw2-1/+4
size doesn't end between byte boundaries.
2006-04-20The plumbing necessary to create DSA keys with variable sized q.David Shaw2-9/+28
Not yet used (q==160).
2006-04-20Add SHA-224 supportDavid Shaw4-5/+83
2006-03-20* blowfish.c, md5.c, rmd160.c, sha1.c, sha256.c, sha512.c: Revert previousDavid Shaw7-13/+18
change. It's now all done in configure.
2006-03-20* blowfish.c, md5.c, rmd160.c, sha1.c, sha256.c, sha512.c: Use '#if'David Shaw7-13/+21
rather than '#ifdef' BIG_ENDIAN_HOST. Harmless as we explicitly define BIG_ENDIAN_HOST to 1 when we need it, but needed for OSX fat builds when we define BIG_ENDIAN_HOST to another macro.
2006-02-14about to release 1.4.3rc1gnupg-1.4.3rc1Werner Koch2-2/+6
2006-02-09Lock random seed fileWerner Koch3-1/+93
2005-12-06* idea-stub.c (load_module): Not legal to return a void * as a functionDavid Shaw6-24/+8
pointer.
2005-12-06* Makefile.am: Some cleanup so we don't build files that are completelyDavid Shaw2-8/+30
ifdeffed out. This causes a warning on Sun's cc. Do sha512.c as well for consistency.
2005-08-11Experimental code to improve AES performance. Got about 25% on ia32.Werner Koch3-1/+76
2005-07-27Converted all m_free to xfree etc.Werner Koch11-64/+64
2005-06-07* random.c: Fix prototype of the fast random gatherer. Noted by JoeDavid Shaw2-2/+7
Vender.
2005-05-31Updated FSF street address and preparations for a release candidate.Werner Koch36-36/+70
2005-03-23(rndw32_gather_random_fast): While adding data use theWerner Koch2-5/+12
size of the object and not the one of its address. Bug reported by Sascha Kiefer.
2005-03-07* primegen.c (is_prime): Free A2. Noted by [email protected].Werner Koch2-8/+15
Fixes #423. * DETAILS: Document new status codes. * cardglue.c (agent_scd_pkdecrypt, agent_scd_pksign) (agent_scd_genkey, agent_scd_setattr, agent_scd_change_pin) (agent_scd_checkpin, agent_openpgp_storekey): Make sure to send a SC_OP_FAILURE after card operations which might change data. * card-util.c (change_pin): Send a SC_OP_SUCCESS after a PIN has been changed. (change_name): Removed a debug output. * status.h, status.c: New codes BAD_PASSPHRASE_PIN, SC_OP_FAILURE and SC_OP_SUCCESS. * de.po: Updated. Translation is still in the works, though.
2005-01-20Minor changesWerner Koch1-2/+2
2004-12-01* md.c (string_to_digest_algo): Allow read/write SHA384 and SHA512.David Shaw2-15/+5
2004-11-032004-11-03 Timo Schulz <[email protected]>Timo Schulz2-9/+11
* strgutil.c (w32_strerror): New. * ttyio.c (init_ttyfp, tty_printf, do_get): Use it here. * iobuf.c (fd_cache_open, file_filter): Likewise. (iobuf_seek, translate_file_handle): Likewise.
2004-10-14* rndunix.c (start_gatherer) [ENABLE_SELINUX_HACKS]: Don't allowWerner Koch2-1/+13
logging. * gpgkeys_finger.c (get_key): s/unsigned char/byte/ due to a strange typedef for RISC OS. Noted by Stefan.
2004-10-12* algorithms.h, cast5.c, cipher.c, idea-stub.c, twofish.c, blowfish.c,David Shaw9-135/+112
des.c, rijndael.c: Consistently use const for input buffers.
2004-09-23Note: I have not fully tested the new key creation due to a pc/scWerner Koch2-1/+7
error. However the backupfile has been created successfully. * rsa.c (rsa_generate): Return the dummy list of factors only if the caller asked for it. * card_util.c (generate_card_keys): ask whether backup should be created. (card_store_subkey): Factored some code out to .. * keygen.c (save_unprotected_key_to_card): .. new function. (gen_card_key_with_backup): New. (generate_raw_key): New. (generate_keypair): New arg BACKUP_ENCRYPTION_DIR. Changed all callers. (do_generate_keypair): Divert to gen_card_key_with_backup when desired.
2004-05-20* dsa.c (verify): s/exp/exponent/ to fix a compiler warning. From WernerDavid Shaw2-5/+10
on stable branch.