aboutsummaryrefslogtreecommitdiffstats
path: root/doc/DETAILS (unfollow)
Commit message (Collapse)AuthorFilesLines
2015-03-23Improve spelling and grammar of some comments.Neal H. Walfield1-1/+1
-- Signed-off-by: Neal H. Walfield <[email protected]>
2015-03-19gpg: Emit status line NEWSIG before signature verification starts.Werner Koch1-3/+3
* g10/mainproc.c (check_sig_and_print): Emit STATUS_NEWSIG. -- gpgsm does this for a long time but somehow it never made it into gpg. Signed-off-by: Werner Koch <[email protected]>
2015-03-10gpg: Add --list-gcrypt-config and "curve" item for --list-config.Werner Koch1-1/+10
* common/openpgp-oid.c (curve_supported_p): New. (openpgp_enum_curves): New. * common/t-openpgp-oid.c (test_openpgp_enum_curves): New. (main): Add option --verbose. * g10/gpg.c (opts): Add --list-gcrypt-config. (list_config): Add items "curve" and "curveoid". Remove unused code. -- GnuPG-bug-id: 1917 Signed-off-by: Werner Koch <[email protected]>
2015-03-06doc: Some typo fixes.Werner Koch1-2/+2
--
2015-02-26doc: Update the description of the S2K extension.Werner Koch1-6/+20
--
2015-01-28gpg: Allow predefined names as answer to the keygen.algo prompt.Werner Koch1-0/+30
* g10/keygen.c (ask_algo): Add list of strings. Signed-off-by: Werner Koch <[email protected]>
2014-12-15gpg: Add sub-command "factory-reset" to --card-edit.Werner Koch1-0/+1
* common/util.h (GPG_ERR_OBJ_TERM_STATE): New. * scd/iso7816.c (map_sw): Add this error code. * scd/app-openpgp.c (do_getattr): Return the life cycle indicator. * scd/app.c (select_application): Allow a return value of GPG_ERR_OBJ_TERM_STATE. * scd/scdaemon.c (set_debug): Print the DBG_READER value. * g10/call-agent.c (start_agent): Print a status line for the termination state. (agent_scd_learn): Make arg "info" optional. (agent_scd_apdu): New. * g10/card-util.c (send_apdu): New. (factory_reset): New. (card_edit): Add command factory-reset. Signed-off-by: Werner Koch <[email protected]>
2014-11-21gpg: Track number of skipped v3 keys on import.Werner Koch1-0/+1
* g10/import.c (stats_s): Add field v3keys. (import): Update this field. (import_print_stats): Print v3 key count. (read_block): Skip v3 keys and return a count for them. Signed-off-by: Werner Koch <[email protected]>
2014-11-04Typo fixes.Werner Koch1-1/+1
--
2014-10-13gpg: Remove extra RSA import status line.Werner Koch1-1/+1
* g10/import.c (stats_s): Remove field "imported_rsa". (import_print_stats): Do not print separate value for RSA. (import_one): Remove the RSA counter. -- RSA is the standard key format and thus there is no more need to have a separate counter. This is a remain from the RSA patent times. Signed-off-by: Werner Koch <[email protected]>
2014-06-10gpg: Use more specific reason codes for INV_RECP.Werner Koch1-0/+2
* g10/pkclist.c (find_and_check_key, build_pk_list): Use more specific reasons codes for INV_RECP. -- GnuPG-bug-id: 1650
2014-06-03Add new option --with-secret.Werner Koch1-1/+2
* g10/gpg.c: Add option --with-secret. * g10/options.h (struct opt): Add field with_secret. * g10/keylist.c (public_key_list): Pass opt.with_secret to list_all and list_one. (list_all, list_one): Add arg mark_secret. (list_keyblock_colon): Add arg has_secret. * sm/gpgsm.c: Add option --with-secret. * sm/server.c (option_handler): Add option "with-secret". * sm/gpgsm.h (server_control_s): Add field with_secret. * sm/keylist.c (list_cert_colon): Take care of with_secret. Also move the token string from the wrong field 14 to 15. -- This option is useful for key managers which need to know whether a key has a secret key. This change allows to collect this information in one pass.
2014-04-15gpg: Re-enable secret key deletion.Werner Koch1-0/+1
* g10/call-agent.c (agent_delete_key): New. * g10/keydb.h (FORMAT_KEYDESC_DELKEY): New. * g10/passphrase.c (gpg_format_keydesc): Support new format. * g10/delkey.c (do_delete_key): Add secret key deletion.
2013-12-11gpg: Change --show-session-key to print the session key earlier.Werner Koch1-3/+4
* g10/cpr.c (write_status_strings): New. (write_status_text): Replace code by a call to write_status_strings. * g10/mainproc.c (proc_encrypted): Remove show_session_key code. * g10/decrypt-data.c (decrypt_data): Add new show_session_key code. -- This feature can be used to return the session key for just a part of a file. For example to downloading just the first 32k of a huge file, decrypting that incomplete part and while ignoring all the errors break out the session key. The session key may then be used on the server to decrypt the entire file without the need to have the private key on the server. GnuPG-bug-id: 1389 Signed-off-by: Werner Koch <[email protected]>
2013-11-15gpg: Rework ECC support and add experimental support for Ed25519.Werner Koch1-2/+7
* agent/findkey.c (key_parms_from_sexp): Add algo name "ecc". (agent_is_dsa_key): Ditto. (agent_is_eddsa_key): New. Not finished, though. * agent/pksign.c (do_encode_eddsa): New. (agent_pksign_do): Use gcry_log_debug functions. * agent/protect.c (agent_protect): Parse a flags parameter. * g10/keygen.c (gpg_curve_to_oid): Move to ... * common/openpgp-oid.c (openpgp_curve_to_oid): here and rename. (oid_ed25519): New. (openpgp_oid_is_ed25519): New. (openpgp_oid_to_curve): New. * common/t-openpgp-oid.c (test_openpgp_oid_is_ed25519): New. * g10/build-packet.c (gpg_mpi_write): Write the length header also for opaque MPIs. (gpg_mpi_write_nohdr): New. (do_key): Use gpg_mpi_write_nohdr depending on algorithm. (do_pubkey_enc): Ditto. * g10/ecdh.c (pk_ecdh_encrypt_with_shared_point): Use gpg_mpi_write_nohdr. * g10/export.c (transfer_format_to_openpgp): * g10/keygen.c (ecckey_from_sexp): Return the error. (gen_ecc): Repalce arg NBITS by CURVE. (read_parameter_file): Add keywords "Key-Curve" and "Subkey-Curve". (ask_curve): New. (generate_keypair, generate_subkeypair): Use ask_curve. (do_generate_keypair): Also pass curve name. * g10/keylist.c (list_keyblock_print, list_keyblock_colon): Print curve name. * g10/parse-packet.c (mpi_read): Remove workaround for Libcgrypt < 1.5. (parse_key): Fix ECC case. Print the curve name. * g10/pkglue.c (mpi_from_sexp): Rename to get_mpi_from_sexp. (pk_verify, pk_check_secret_key): Add special case for Ed25519. * g10/seskey.c (encode_md_value): Ditto. * g10/sign.c (do_sign, hash_for, sign_file): Ditto. -- Be warned that this code is subject to further changes and that the format will very likely change before a release. There are also known bugs and missing code. Signed-off-by: Werner Koch <[email protected]>
2013-10-02gpg: Fix bug with deeply nested compressed packets.Werner Koch1-0/+1
* g10/mainproc.c (MAX_NESTING_DEPTH): New. (proc_compressed): Return an error code. (check_nesting): New. (do_proc_packets): Check packet nesting depth. Handle errors from check_compressed. Signed-off-by: Werner Koch <[email protected]>
2013-03-19gpg: Print indicator for unknown key capability.Werner Koch1-0/+1
* g10/keylist.c (print_capabilities): Print '?' for unknown usage.
2013-02-07doc: Fix description for NEED_PASSPHRASE status.Werner Koch1-1/+1
--
2013-01-30Convert doc/DETAILS to org-modeWerner Koch1-869/+958
-- Also restructure the file and fix some obviously wrong things.
2013-01-30gpg: Add status line PINENTRY_LAUNCHED.Werner Koch1-0/+9
* common/status.h (STATUS_PINENTRY_LAUNCHED): New. * g10/server.c (server_local_s): Add field allow_pinentry_notify. (option_handler): Add option "allow-pinentry-notify". (gpg_proxy_pinentry_notify): New. * g10/call-agent.c (default_inq_cb): Factor code out to the new function.
2012-11-12Fix description of validity flag 'n'.Werner Koch1-1/+1
-- Thanks to Hauke Laging for spotting this.
2012-05-24Print the hash algorithm in colon mode key listing.Werner Koch1-2/+6
* g10/keylist.c (list_keyblock_colon): Print digest_algo.
2012-05-08Add tweaks for the not anymore patented IDEA algorithm.Werner Koch1-5/+3
* g10/keygen.c (keygen_set_std_prefs): Include IDEA only in PGP2 compatibility mode. * g10/misc.c (idea_cipher_warn): Remove. Also remove all callers. * common/status.h (STATUS_RSA_OR_IDEA): Remove. Do not emit this status anymore. -- To keep the number of actually used algorithms low, we want to support IDEA only in a basically read-only way (unless --pgp2 is used during key generation). It does not make sense to suggest the use of this old 64 bit blocksize algorithm. However, there is old data available where it might be helpful to have IDEA available.
2011-12-07gpgsm: Add new validation model "steed".Werner Koch1-0/+5
* sm/gpgsm.h (VALIDATE_FLAG_STEED): New. * sm/gpgsm.c (gpgsm_parse_validation_model): Add model "steed". * sm/server.c (option_handler): Allow validation model "steed". * sm/certlist.c (gpgsm_cert_has_well_known_private_key): New. * sm/certchain.c (do_validate_chain): Handle the well-known-private-key attribute. Support the "steed" model. (gpgsm_validate_chain): Ditto. * sm/verify.c (gpgsm_verify): Return "steed" in the trust status line. * sm/keylist.c (list_cert_colon): Print the new 'w' flag. -- This is the first part of changes to implement the STEED proposal as described at http://g10code.com/steed.html . The idea for X.509 is not to use plain self-signed certificates but certificates signed by a dummy CA (i.e. one for which the private key is known). Having a single CA as an indication for the use of STEED might help other X.509 implementations to implement STEED.
2011-12-06gpgsm: Allow arbitrary extensions for cert creation.Werner Koch1-0/+1
* sm/certreqgen.c (pSUBJKEYID, pEXTENSION): New. (read_parameters): Add new keywords. (proc_parameters): Check values of new keywords. (create_request): Add SubjectKeyId and extensions. (parse_parameter_usage): Support "cert" and the encrypt alias "encr".
2011-03-01Move parameter file description to the manual.Werner Koch1-189/+2
2011-03-01Support X.509 certificate creation.Werner Koch1-1/+4
Using "gpgsm --genkey" allows the creation of a self-signed certificate via a new prompt. Using "gpgsm --genkey --batch" should allow the creation of arbitrary certificates controlled by a parameter file. An example parameter file is Key-Type: RSA Key-Length: 1024 Key-Grip: 2C50DC6101C10C9C643E315FE3EADCCBC24F4BEA Key-Usage: sign, encrypt Serial: random Name-DN: CN=some test key Name-Email: [email protected] Name-Email: [email protected] Hash-Algo: SHA384 not-after: 2038-01-16 12:44 This creates a self-signed X.509 certificate using the key given by the keygrip and using SHA-384 as hash algorithm. The keyword signing-key can be used to sign the certificate with a different key. See sm/certreggen.c for details.
2011-02-04Removed deprecated SIGEXPIRED status line.Werner Koch1-5/+10
2011-02-03Add a DECRYPTION_INFO status.Werner Koch1-33/+37
DECRYPTION_INFO <mdc_method> <sym_algo> Print information about the symmetric encryption algorithm and the MDC method. This will be emitted even if the decryption fails.
2010-11-17Smartcard related updatesWerner Koch1-1/+2
2010-10-18doc fixWerner Koch1-1/+2
2010-10-14All tests work are again workingWerner Koch1-0/+13
2010-10-01Exporting secret keys via gpg-agent is now basically supported.Werner Koch1-1/+2
A couple of forward ported changes. Doc updates.
2010-04-21More changes on the way to remove secring.gpg.Werner Koch1-1/+1
2010-03-15Finished the bulk of changes to use estream in most places instead ofWerner Koch1-0/+6
stdio.
2010-01-08Add dummu option --passwd for gpg.Werner Koch1-1/+3
Collected changes.
2009-12-17Implement --faked-systrem-time for gpg.Werner Koch1-6/+7
Typo and comment fixes.
2009-12-07Use ADNS for PKA and SRV records if no other resolver is available.Werner Koch1-1/+1
2009-12-04allow for default algorithms in a gpg parameter fileWerner Koch1-9/+32
2009-10-28[scd] Memory leak fix.Werner Koch1-0/+6
[g13] Send MOUNTPOINT status line
2009-08-06Improved detection of bad/invalid signer keys.Werner Koch1-6/+14
2009-07-23Print status of CRL checks in the audit log.Werner Koch1-3/+3
2009-07-13[g10]Werner Koch1-0/+1
* exec.c: Fix function name indentation. (expand_args): Simplify by using membuf functions. (exec_write): Fix memory leak on error. (w32_system): Use DETACHED_PROCESS so that a new console is not created.
2009-07-09Support writing of existing keys with non-matching key sizes.Werner Koch1-2/+3
2009-06-29Make soem omnikey readers work with extended length APDUs.Werner Koch1-1/+6
2009-03-25Print NO_SECKEY status line in gpgsm.Werner Koch1-6/+6
This fixes bug#1020.
2009-03-20Fix keygrip computation for TCOS 3 cards.Werner Koch1-1/+2
Emit PROGRESS status lines during --learn-card.
2008-12-08Cleanups. Fixes bug 956.Werner Koch1-156/+59
2008-08-28Add a warning nite to --throw-keyds.Werner Koch1-2/+2
2008-08-13Print a 'f' for validated non-root certificates in gpgsm colon style listing.Werner Koch1-1/+5
Doc fixes.