aboutsummaryrefslogtreecommitdiffstats
path: root/g10/ChangeLog (unfollow)
Commit message (Collapse)AuthorFilesLines
2006-12-07Backported security fixes.Werner Koch1-0/+15
2005-03-07(is_prime): Free A2. Fixed bug #423.Werner Koch1-0/+4
2005-02-10Disable the "quick check" bytes for PK decryptions. This is inDavid Shaw1-0/+9
regards to the Mister and Zuccherato attack on OpenPGP CFB mode.
2004-11-29* getkey.c (parse_key_usage): New function to parse out key usage flags.David Shaw1-3/+12
Set PUBKEY_USAGE_UNKNOWN to handle flags (i.e. authentication) that we don't understand in this branch. (fixup_uidnode, merge_selfsigs_main, merge_selfsigs_subkey): Call it from here to remove duplicate code. This is bug 378.
2004-09-14* getkey.c (premerge_public_with_secret): Fix subkey<->binding sigDavid Shaw1-0/+6
mismatch when some secret subkeys are missing. Discovered by Michael Roth.
2004-08-31(maybe_create_keyring): Try to create the home directoryWerner Koch1-0/+5
before acquiring a lock for the keyring.
2004-08-20* hkp.c (dehtmlize): Understand the quote character (i.e. "&quot;") inDavid Shaw1-0/+10
HTML responses. * keydb.h, getkey.c (get_user_id_printable): Rename to get_user_id_native and remove the printable stuff since we're print-ifying valid utf8 characters. Change all callers in import.c, sign.c, and encode.c.
2004-08-19* hkp.c (hkp_search): Translate string to search for from utf8 to nativeDavid Shaw1-0/+7
before displaying it. * keyserver.c (keyserver_search_prompt): Comments.
2004-08-19(encode_session_key): Changed the zero random byteWerner Koch1-0/+6
substituting code to actually do clever things. Thanks to Matthias Urlichs for noting the implementation problem.
2004-08-18(agent_get_passphrase): Fixed detection of canceledWerner Koch1-0/+5
error state as send by current gpg-agents.
2004-08-16Removed stray semicolon.Werner Koch1-0/+4
2004-08-13* keydb.c (keydb_add_resource): Factored keyring creation out to ..Werner Koch1-0/+8
(maybe_create_keyring): .. new. Make sure that we do the checks in a locked state. Problem reported by Stefan Haller.
2004-08-09* configure.ac (ALL_LINGUAS): Removed.Werner Koch1-0/+9
* Makefile.am (LDADD): Replaced INTLLIBS by LIBINTL. * Makefile.am (gpgkeys_hkp_LDADD): Replaced INTLLIBS by LIBINTL. * ca.po: Updated. * autogen.sh: Run aclocal with -I m4. * Makefile.am: Replaced INTLLIBS by LIBINTL. * Makefile.am (http-test): Replaced INTLLIBS by LIBINTL.
2004-07-30New alias --throw-keyid for --throw-keyids, so that itWerner Koch1-0/+5
continues to work in old configuration files. Noted by Jens Adam.
2004-07-29* pkclist.c (algo_available): --pgp8 now allows blowfish, zlib, and bzip2.David Shaw1-0/+5
2004-07-21* status.c (do_get_from_fd): Flush stdout if status isn't flushing it forDavid Shaw1-0/+7
us. This guarantees that any menus that were displayed before the prompt don't get stuck in a buffer. Noted by Peter Palfrader. This is Debian bug #254072.
2004-07-20Minor fixes for W32 packaging and building.Werner Koch1-0/+5
2004-07-19* sign.c (update_keysig_packet): Revert change of 2004-05-18. It is notDavid Shaw1-0/+7
appropriate to strip policy and notations when remaking a sig. That should only happen when specifically requested by the user.
2004-06-27* sign.c (sign_symencrypt_file): Allow using --force-mdc in --signDavid Shaw1-0/+3
--symmetric messages.
2004-06-27* mainproc.c (proc_symkey_enc), seckey-cert.c (do_check): Check the S2KDavid Shaw1-0/+7
hash algorithm before we try to generate a passphrase using it. This prevents hitting BUG() when generating a passphrase using a hash that we don't have.
2004-06-24* keyedit.c (sign_uids): Properly handle remaking a self-sig on revoked orDavid Shaw1-0/+7
expired user IDs. Also, once we've established that a given uid cannot or will not be signed, don't continue to ask about each sig.
2004-06-18* status.h, status.c (get_status_string), plaintext.c (handle_plaintext):David Shaw1-0/+6
New status tags PLAINTEXT and PLAINTEXT_LENGTH.
2004-06-16* keygen.c (make_backsig): Make sure that the backsig was builtDavid Shaw1-0/+5
successfully before we try and use it.
2004-06-16(copy_secret_key): Get last fix right.Werner Koch1-0/+4
2004-06-16(copy_secret_key): Fixed memory leak.Werner Koch1-0/+4
2004-06-01* g10.c (main): Alias --charset as --display-charset to help avoid theDavid Shaw1-0/+9
continuing confusion and make room for possible changes in devel. * parse-packet.c (parse_plaintext): Show the hex value for the literal packet mode since it may not be printable.
2004-05-23* pkclist.c (do_edit_ownertrust): Fix kbnode leak.David Shaw1-0/+4
2004-05-19* sign.c (update_keysig_packet): Policies and notations should be strippedDavid Shaw1-0/+6
out when remaking a self-signature. Noted by Atom Smasher.
2004-05-11(do_generate_keypair, read_parameter_file): ReallyWerner Koch1-0/+7
close the files. (do_generate_keypair): Create the secret key file using safe permissions. Noted by Atom Smasher.
2004-05-07(write_plaintext_packet): Fixed the detection of tooWerner Koch1-0/+5
large files in the same way as in encode.c.
2004-04-23* keygen.c (make_backsig): If DO_BACKSIGS is not defined, do not createDavid Shaw1-0/+16
backsigs. * getkey.c (merge_selfsigs_subkey): Find 0x19 backsigs on subkey selfsigs and verify they are valid. If DO_BACKSIGS is not defined, fake this as always valid. * packet.h, parse-packet.c (parse_signature): Make parse_signature non-static so we can parse 0x19s in self-sigs. * main.h, sig-check.c (check_backsig): Check a 0x19 signature. (signature_check2): Give a backsig warning if there is no or a bad 0x19 with signatures from a subkey.
2004-04-22* parse-packet.c (dump_sig_subpkt, parse_one_sig_subpkt,David Shaw1-0/+5
can_handle_critical): Parse and display 0x19 signatures.
2004-04-20* keyserver.c (parse_keyserver_uri): Do not accept "http" as an alias forDavid Shaw1-0/+5
"hkp". They are not the same thing.
2004-04-13* keygen.c (make_backsig): New function to add a backsig to a binding sigDavid Shaw1-0/+12
of signing subkeys. Currently disabled. (write_keybinding): Call it here, for signing subkeys only. * sign.c (make_keysig_packet): Allow generating 0x19 signatures (same as 0x18 or 0x28, but used for backsigs). * packet.h, build-packet.c (build_sig_subpkt): Add new SIGSUBPKT_SIGNATURE type for embedded signatures.
2004-04-01* g10.c (main): --no-use-embedded-filename.David Shaw1-0/+10
* plaintext.c (handle_plaintext): Accept 'u' as a plaintext mode that requires end of line conversion. This is being considered for a UTF8 text packet. If this doesn't take place, no major harm done. If it does take place, we'll get a jump on starting the changeover.
2004-03-29*** empty log message ***Werner Koch1-0/+5
2004-03-27* keyedit.c (keyedit_menu): Request a trustdb update when adding a newDavid Shaw1-0/+6
user ID so the new ID gets validity set. Reported by Owen Taylor.
2004-03-26* build-packet.c (calc_plaintext, do_plaintext): Do not create illegalDavid Shaw1-0/+7
(packet header indicates a size larger than the actual packet) encrypted data packets when not compressing and using a filename longer than 255 characters.
2004-03-25* options.h, g10.c (main), compress-bz2.c (init_uncompress): BackportDavid Shaw1-0/+6
--bzip2-decompress-lowmem since we do handle receiving a bzip2 message on the stable branch.
2004-03-23* keyedit.c (no_primary_warning): Cleanup. (menu_expire): Don't giveDavid Shaw1-0/+6
primary warning for subkey expiration changes. These cannot reorder primaries.
2004-03-22* packet.h, getkey.c (fixup_uidnode, merge_selfsigs_subkey): Keep track ofDavid Shaw1-0/+10
which self-sig we actually chose. * keyedit.c (menu_expire, menu_set_primary_uid, menu_set_preferences): Use it here to avoid updating non-used self-sigs and possibly promoting an old self-sig into consideration again.
2004-03-18* keygen.c (write_keybinding, do_generate_keypair, generate_subkeypair):David Shaw1-0/+4
Keep track of the unprotected subkey secret key so we can make a backsig with it.
2004-03-18* keygen.c (gen_elg, gen_dsa, gen_rsa, do_create, do_generate_keypair,David Shaw1-0/+8
generate_subkeypair): New is_subkey argument to set whether a generated key is a subkey. Do not overload the ret_sk. This is some early cleanup to do backsigs for signing subkeys.
2004-03-09* import.c (import_one): Try and collapse user IDs when importing a keyDavid Shaw1-0/+14
for the first time. * build-packet.c (do_comment, do_user_id): Try for a headerlen of 2 since that's the smallest and most likely encoding for these packets * keyedit.c (menu_addrevoker): Allow appointing a subkey as a designated revoker if the user forces it via keyid!, so long as the subkey can certify. Also use the proper date string when prompting for confirmation.
2004-03-01* options.h (ctrl): New for member IN_AUTO_KEY_RETRIEVE.Werner Koch1-0/+8
* mainproc.c (check_sig_and_print): track whether we are retrieving a key. * status.c (status_currently_allowed): New. (write_status_text, write_status_text_and_buffer): Use it here.
2004-02-27* keyedit.c (menu_addrevoker): Do not allow appointing a subkey as aDavid Shaw1-0/+5
designated revoker.
2004-02-25* delkey.c (do_delete_key): Allow deleting a public key with a secretDavid Shaw1-0/+8
present if --expert is set. * plaintext.c (handle_plaintext): Make bytecount static so it works with multiple literal packets inside a message.
2004-02-24* encode.c (encode_simple): Show cipher with --verbose.David Shaw1-0/+13
* options.h, g10.c (main), keyedit.c (sign_keys): Add --ask-cert-level option to enable cert level prompts during sigs. Defaults to on. Simplify --default-cert-check-level to --default-cert-level. If ask-cert-level is off, or batch is on, use the default-cert-level as the cert level. * options.h, g10.c (main), trustdb.c (mark_usable_uid_certs): Simplify --min-cert-check-level to --min-cert-level.
2004-02-23* options.h, g10.c (main), trustdb.c (mark_usable_uid_certs): AddDavid Shaw1-0/+10
--min-cert-check-level option to specify minimum cert check level. Defaults to 1 (so no sigs are ignored). 0x10 sigs cannot be ignored. * options.h, g10.c (main), plaintext.c (handle_plaintext): Add --max-output option to help people deal with decompression bombs.
2004-02-15* build-packet.c (do_user_id): Do not force a header for attribute packetsDavid Shaw1-0/+6
as they require a new CTB, and we don't support forced headers for new CTBs yet.