aboutsummaryrefslogtreecommitdiffstats
path: root/g10/ChangeLog-2011 (unfollow)
Commit message (Collapse)AuthorFilesLines
2023-06-20delete redundant characterszhangguangzhi1-1/+1
-- GnuPG-bug-id: 6482 Signed-off-by: zhangguangzhi <[email protected]>
2023-06-20delete redundant characterszhangguangzhi1-1/+1
-- GnuPG-bug-id: 6482 Signed-off-by: zhangguangzhi <[email protected]>
2016-11-02Spelling: correct spelling of "passphrase".Daniel Kahn Gillmor1-2/+2
There were several different variant spellings of "passphrase". This should fix them all for all English text. I did notice that po/it.po contains multiple instances of "passhprase", which also looks suspect to me, but i do not know Italian, so i did not try to correct it. Signed-off-by: Daniel Kahn Gillmor <[email protected]>
2011-12-01Generate the ChangeLog from commit logs.Werner Koch1-5/+16
* scripts/gitlog-to-changelog: New script. Taken from gnulib. * scripts/git-log-fix: New file. * scripts/git-log-footer: New file. * doc/HACKING: Describe the ChangeLog policy * ChangeLog: New file. * Makefile.am (EXTRA_DIST): Add new files. (gen-ChangeLog): New. (dist-hook): Run gen-ChangeLog. Rename all ChangeLog files to ChangeLog-2011.
2011-11-30Rewrite dns-cert.c to not use the gpg-only iobuf stuff.Werner Koch1-0/+5
* common/dns-cert.c: Remove iobuf.h. (get_dns_cert): Rename to _get_dns_cert. Remove MAX_SIZE arg. Change iobuf arg to a estream-t. Rewrite function to make use of estream instead of iobuf. Require all parameters. Return an gpg_error_t error instead of the type. Add arg ERRSOURCE. * common/dns-cert.h (get_dns_cert): New macro to pass the error source to _gpg_dns_cert. * common/t-dns-cert.c (main): Adjust for changes in get_dns_cert. * g10/keyserver.c (keyserver_import_cert): Ditto. * doc/gpg.texi (GPG Configuration Options): Remove max-cert-size.
2011-11-30Increase the default buffer size for DNS certificates.Werner Koch1-0/+4
* common/t-dns-cert.c (main): Increase MAX_SIZE to 64k. * g10/keyserver.c (DEFAULT_MAX_CERT_SIZE): Increase from 16k to 64k.
2011-11-22Don't print anonymous recipient messages in quiet mode.Werner Koch1-0/+5
This is bug#1378.
2011-11-06Allow creating subkeys using an existing keyWerner Koch1-0/+12
This works by specifying the keygrip instead of an algorithm (section number 13) and requires that the option -expert has been used. It will be easy to extend this to the primary key.
2011-09-23Renamed the lock functions.Werner Koch1-0/+9
Also cleaned up the dotlock code for easier readability.
2011-09-20Allow NULL for free_public_key.Werner Koch1-0/+11
2011-09-20avoid use of freed pointerJim Meyering1-0/+7
Without this patch, pk2 would be freed twice. >From 2a18a4b757e0896e738fefbbaa8ff8c23a9edf89 Mon Sep 17 00:00:00 2001 From: Jim Meyering <[email protected]> Date: Tue, 20 Sep 2011 16:20:39 +0200 Subject: [PATCH] avoid use of freed pointer If we free pk2 at the top of the for-loop, set it to NULL so that we don't free it again just before returning. * revoke.c (gen_desig_revoke): Don't use pk2 after freeing it.
2011-09-20Replace gcry_md_start_debug by gcry_md_debug.Werner Koch1-0/+9
This is to allow building with Libgcrypt master (1.6) which has some cleanups in the API/ABI.
2011-08-10Fixed set but unused variable bugsWerner Koch1-0/+11
2011-07-29Do not print read-only trustdb warning with --quiet.Werner Koch1-0/+4
This is only a warning and gpg would anyway print an error message if it tries to write to the trustdb.
2011-07-18Print decoded S2K count in --list-packets mode.Werner Koch1-0/+13
Fixes bug#1355.
2011-06-16Allow generation of card keys up to 4096 bit.Werner Koch1-0/+8
This patch implementes a chunk mode to pass the key parameters from scdaemon to gpg. This allows to pass arbitrary long key paremeters; it is used for keys larger than 3072 bit. Note: the card key generation in gpg is currently broken. The keys are generated but it is not possible to create the self-signature because at that time the gpg-agent does not yet know about the new keys and thus can't divert the sign request to the card. We either need to run the learn command right after calling agent_scd_genkey or implement a way to sign using the currently inserted card. Another option would be to get rid of agent_scd_genkey and implement the feature directly in agent_genkey.
2011-06-13Fix for latest fix in Libgcrypt.Werner Koch1-0/+7
2011-06-01Fix size_t vs int issues.Marcus Brinkmann1-0/+9
2011-04-29Re-indentation of keydb.c and error code changes.Werner Koch1-0/+13
Returning -1 as an error code is not very clean given that gpg error has more descriptive error codes. Thus we now return GPG_ERR_NOT_FOUND for all search operations and adjusted all callers.
2011-04-29Fix import stat counter and abort secret key import on merge-only error case.Marcus Brinkmann1-0/+7
2011-04-29Give sensible error messages when trying to delete secret key.Marcus Brinkmann1-0/+6
2011-04-28Removed memory leak in the ECDH code.Werner Koch1-0/+6
2011-04-26Fixed regression in OpenPGP secret key export.Werner Koch1-0/+5
The protection used in the exported key used a different iteration count than given in the S2K field. Thus all OpenPGP keys exported from GnuPG 2.1-beta can't be imported again. Given that the actual secret key material is kept in private-keys-v1.d/ the can be re-exported with this fixed version.
2011-04-25Fix regression in gpg's mail address parsing.Werner Koch1-0/+10
Since 2009-12-08 gpg was not able to find email addresses indicated by a leading '<'. This happened when I merged the user id classification code of gpgsm and gpg.
2011-04-202011-04-20 Marcus Brinkmann <[email protected]>Marcus Brinkmann1-0/+5
* keylist.c (list_keyblock_colon): Use get_ownertrust_info, not get_ownertrust (which lead to binary zeroes in the output!).
2011-03-28Detect premature EOF while parsing corrupted key packets.Werner Koch1-0/+5
This helps in the case of an unknown key algorithm with a corrupted packet which claims a longer packet length. This used to allocate the announced packet length and then tried to fill it up without detecting an EOF, thus taking quite some time. IT is easy to fix, thus we do it. However, there are many other ways to force gpg to use large amount of resources; thus as before it is strongly suggested that the sysadm uses ulimit do assign suitable resource limits to the gpg process. Suggested by Timo Schulz.
2011-03-10Make use of gcry_kdf_derive.Werner Koch1-0/+5
Factoring common code out is always a Good Thing. Also added a configure test to print an error if gcry_kdf_derive is missing in Libgcrypt.
2011-03-03Print the secret keyinfo stuff with --card-status again.Werner Koch1-0/+4
2011-03-03Minor code cleanups.Werner Koch1-0/+5
* keyid.c (hash_public_key): Remove shadowing NBITS. * misc.c (pubkey_nbits): Replace GCRY_PK_ by PUBKEY_ALGO_. (get_signature_count): Remove warning.
2011-03-03Fix faulty gcc warningsWerner Koch1-0/+5
2011-03-02Fix usage of SHA-2 algorithm with OpenPGP cards.Werner Koch1-0/+5
This was a regression in 2.1 introduced due to having the agent do the signing in contrast to the old "SCD PKSIGN" command which accesses the scdaemon directly and passed the hash algorithm. The hash algorithm is used by app-openpgp.c only for a sanity check.
2011-02-10Add ECC import regression tests and fixed a regression.Werner Koch1-0/+5
The import test imports the keys as needed and because they are passphrase protected we now need a pinentry script to convey the passphrase to gpg-agent.
2011-02-09Replace printf by es_printf in keyserver.cWerner Koch1-0/+4
This is similar to the change in keylist.c and elsewhere.
2011-02-08Add finger support to dirmngr.Werner Koch1-0/+5
The basic network code from http.c is used for finger. This keeps the network related code at one place and we are able to use the somewhat matured code form http.c. Unfortunately I had to enhance the http code for more robustness and probably introduced new bugs. Test this code using gpg --fetch-key finger:[email protected] (I might be the last user of finger ;-)
2011-02-07Fix ECDSA 521 bit signing.Werner Koch1-0/+6
This fix also allows the creation and use of an 521 bit ECDH key which used to fail while creating the binding signature.
2011-02-04Removed deprecated SIGEXPIRED status line.Werner Koch1-0/+5
2011-02-03Fix test for gcry_pk_get_curve.Werner Koch1-0/+3
Add a compatibility fixes for the non-curve case. Remove -lber from the dirmngr link line.
2011-02-03Add a DECRYPTION_INFO status.Werner Koch1-0/+3
DECRYPTION_INFO <mdc_method> <sym_algo> Print information about the symmetric encryption algorithm and the MDC method. This will be emitted even if the decryption fails.
2011-02-03Relax mailbox name checking. Fixes bug#1315.Werner Koch1-0/+3
2011-02-03Extend algo selection menu.Werner Koch1-0/+8
This allows to add an ECC key and to set the capabilities of an ECDSA key. Fix printing of the ECC algorithm when creating a signature.
2011-02-03Finished ECC integration.ECC-INTEGRATION-2-1Werner Koch1-39/+66
Wrote the ChangeLog 2011-01-13 entry for Andrey's orginal work modulo the cleanups I did in the last week. Adjusted my own ChangeLog entries to be consistent with that entry. Nuked quite some trailing spaces; again sorry for that, I will better take care of not saving them in the future. "git diff -b" is useful to read the actual changes ;-). The ECC-INTEGRATION-2-1 branch can be closed now.
2011-02-02Compute the fingerprint for ECDH only on demand.Werner Koch1-0/+6
This also fixes a failed assertion when using a v3 key where the fingerprint size is not 20.
2011-02-02Sample ECC keys and message do now work.Werner Koch1-0/+15
Import and export of secret keys does now work. Encryption has been fixed to be compatible with the sample messages. This version tests for new Libgcrypt function and thus needs to be build with a new Libgcrypt installed.
2011-01-31Move OpenPGP OID helpers to common/.Werner Koch1-0/+3
This is needed so that the agent will be able to export and import OpenPGP secret keys. Add test case. Removed unused function.
2011-01-31Fixed the ECC interface to Libgcrypt to be ABI compatible with the previous ↵Werner Koch1-0/+7
version. Quite some changes were needed but in the end we have less code than before. Instead of trying to do everything with MPIs and pass them back and forth between Libgcrypt and GnuPG, we know use the S-expression based interface and make heavy use of our opaque MPI feature. Encryption, decryption, signing and verification work with self-generared keys. Import and export does not yet work; thus it was not possible to check the test keys at https://sites.google.com/site/brainhub/pgpecckeys .
2011-01-31Reworked the ECC changes to better fit into the Libgcrypt API.Werner Koch1-0/+34
See ChangeLog for details. Key generation, signing and verification works. Encryption does not yet work. Requires latest Libgcrypt changes.
2011-01-26Function name cleanupsWerner Koch1-0/+12
Also nuked some trailing spaces.
2011-01-25Started with some code cleanups in ECDH.Werner Koch1-0/+3
The goal is to have the ECDH code more uniform with the other algorithms. Also make error messages and variable names more similar to other places.
2011-01-25More ECDH code cleanupsWerner Koch1-0/+6
2011-01-25Editorial cleanups of keygen.cWerner Koch1-0/+18
Also fixed a regression introduced by me in pubkey_enc.c. Added extra checks. Removed unused code.