aboutsummaryrefslogtreecommitdiffstats
path: root/g10/ChangeLog (unfollow)
Commit message (Collapse)AuthorFilesLines
2006-04-03About to release 1.4.3gnupg-1.4.3Werner Koch1-0/+17
2006-04-01* getkey.c (get_pubkey_byname): Fix missing auto_key_retrieve unlock.David Shaw1-0/+6
Fix strings to not start with a capital letter as per convention.
2006-03-30* main.h, seskey.c (encode_md_value): Modify to allow a q size greaterDavid Shaw1-0/+13
than 160 bits as per DSA2. This will allow us to verify and issue DSA2 signatures for some backwards compatibility once we start generating DSA2 keys. * sign.c (do_sign), sig-check.c (do_check): Change all callers. * sign.c (do_sign): Enforce the 160-bit check for new signatures here since encode_md_value can handle non-160-bit digests now. This will need to come out once the standard for DSA2 is firmed up.
2006-03-22* getkey.c (parse_auto_key_locate): Silently strip out duplicates ratherDavid Shaw1-0/+5
than causing an error.
2006-03-22Changed URLsWerner Koch1-0/+5
2006-03-22* mainproc.c (get_pka_address): Fix bug introduced as part ofDavid Shaw1-0/+5
sig_to_notation conversion. Noted by Peter Palfradrer.
2006-03-21Allow for rmd160 signatures when using gpg-agent.Werner Koch1-0/+9
2006-03-17* keyserver.c (keyserver_import_cert): Handle the IPGP CERT type forDavid Shaw1-0/+7
both the fingerprint alone, and fingerprint+URL cases. * getkey.c (get_pubkey_byname): Minor cleanup.
2006-03-14* keyserver-internal.h, keyserver.c (keyserver_import_pka): Use theDavid Shaw1-0/+11
same API as the other auto-key-locate fetchers. * getkey.c (get_pubkey_byname): Use the fingerprint of the key that we actually fetched. This helps prevent problems where the key that we fetched doesn't have the same name that we used to fetch it. In the case of CERT and PKA, this is an actual security requirement as the URL might point to a key put in by an attacker. By forcing the use of the fingerprint, we won't use the attacker's key here.
2006-03-14* keyserver-internal.h, keyserver.c (keyserver_spawn, keyserver_work,David Shaw1-0/+4
keyserver_import_cert, keyserver_import_name, keyserver_import_ldap): Pass fingerprint info through.
2006-03-14* main.h, import.c (import_one): Optionally return the fingerprint ofDavid Shaw1-0/+7
the key being imported. (import_keys_internal, import_keys_stream, import): Change all callers.
2006-03-12* sig-check.c (signature_check2): Print the backsig warning when thereDavid Shaw1-0/+9
is no backsig present. Give a URL for more information. * keyedit.c (menu_backsign): Small tweak to work properly with keys originally generated with older GnuPGs that included comments in the secret keys.
2006-03-09* build-packet.c (string_to_notation): Add ability to indicate a notationDavid Shaw1-0/+9
to be deleted with a '-' prefix. * keyedit.c (menu_set_notation): Use it here to allow deleting a notation marked with '-'. This works with either "-notation" or "-notation=value".
2006-03-09Preparing for an RC23Werner Koch1-9/+14
2006-03-09* keyedit.c (menu_set_notation): New function to set notations onDavid Shaw1-0/+6
self-signatures. (keyedit_menu): Call it here. (tty_print_notations): Helper. (show_prefs): Show notations in "showpref".
2006-03-09* mainproc.c (get_pka_address), keylist.c (show_notation): RemoveDavid Shaw1-0/+3
duplicate code by using notation functions.
2006-03-09* packet.h, build-packet.c (sig_to_notation), keygen.cDavid Shaw1-0/+4
(keygen_add_notations): Provide printable text for non-human-readable notation values.
2006-03-08* packet.h, build-packet.c (sig_to_notation), keygen.cDavid Shaw1-0/+4
(keygen_add_notations): Tweak to handle non-human-readable notation values.
2006-03-08* options.h, sign.c (mk_notation_policy_etc), gpg.c (add_notation_data):David Shaw1-0/+11
Use it here for the various notation commands. * packet.h, main.h, keygen.c (keygen_add_notations), build-packet.c (string_to_notation, sig_to_notation) (free_notation): New "one stop shopping" functions to handle notations and start removing some code duplication.
2006-03-08* options.h, mainproc.c (check_sig_and_print), gpg.c (main):David Shaw1-0/+7
pka-lookups, not pka-lookup. * options.h, gpg.c (main), keyedit.c [cmds], sig-check.c (signature_check2): Rename "backsign" to "cross-certify" as a more accurate name.
2006-03-07* options.h, gpg.c (main, parse_trust_model), pkclist.cDavid Shaw1-0/+7
(check_signatures_trust), mainproc.c (check_sig_and_print, pka_uri_from_sig), trustdb.c (init_trustdb): Some tweaks to PKA so that it is a verify-option now.
2006-03-07More tests added; make distcheck worksWerner Koch1-0/+6
2006-03-07* sign.c (make_keysig_packet): Don't use MD5 for a RSA_S key as thatDavid Shaw1-0/+3
is not a PGP 2.x algorithm.
2006-03-06* mainproc.c (proc_compressed): "Uncompressed" is not a valid compressionDavid Shaw1-0/+5
algorithm.
2006-03-06Stricter test of allowed signature packet compositions.Werner Koch1-2/+3
There is still one problem to solve.
2006-03-06Fixed problem with PGP2 style signatures and mutilple plaintext dataWerner Koch1-0/+5
2006-03-05Replaced an assert and fixed batch mode issue in cardglue.Werner Koch1-0/+14
2006-03-01* getkey.c (parse_auto_key_locate): Error if the user selects "cert" orDavid Shaw1-0/+9
"pka" when those features are disabled. * misc.c (has_invalid_email_chars): Fix some C syntax that broke the compilers on SGI IRIX MIPS and Compaq/DEC OSF/1 Alpha. Noted by Nelson H. F. Beebe.
2006-02-27* options.skel: Document auto-key-locate and give a pointer to SimonDavid Shaw1-0/+5
Josefsson's page for CERT.
2006-02-24* keydb.h, getkey.c (release_akl), gpg.c (main): AddDavid Shaw1-0/+15
--no-auto-key-locate. * options.h, gpg.c (main): Keep track of each keyserver registered so we can match on them later. * keyserver-internal.h, keyserver.c (cmp_keyserver_spec, keyserver_match), gpgv.c: New. Find a keyserver that matches ours and return its spec. * getkey.c (get_pubkey_byname): Use it here to get the per-keyserver options from an earlier keyserver.
2006-02-24* keyserver.c (parse_keyserver_options): Only change max_cert if it isDavid Shaw1-0/+3
used.
2006-02-23* options.c, gpg.c (main), keyserver.c (keyserver_spawn): No specialDavid Shaw1-0/+5
treatment of include-revoked, include-subkeys, and try-dns-srv. These are keyserver features, and GPG shouldn't get involved here.
2006-02-23* keyserver.c (parse_keyserver_uri, add_canonical_option): Always appendDavid Shaw1-0/+4
options to the list, as ordering may be significant to the user.
2006-02-23* gpg.c (add_notation_data): Fix reversed logic for isascii check whenDavid Shaw1-0/+3
adding notations. Noted by Christian Biere.
2006-02-23* options.h, keyserver.c (add_canonical_option): New.David Shaw1-0/+8
(parse_keyserver_options): Moved from here. (parse_keyserver_uri): Use it here so each keyserver can have some private options in addition to the main keyserver-options (e.g. per-keyserver auth).
2006-02-22* options.h, keyserver-internal.h, keyserver.c (keyserver_import_name),David Shaw1-0/+5
getkey.c (free_akl, parse_auto_key_locate, get_pubkey_byname): The obvious next step: allow arbitrary keyservers in the auto-key-locate list.
2006-02-22* options.h, keyserver.c (parse_keyserver_options): RemoveDavid Shaw1-0/+5
auto-cert-retrieve as it is no longer meaningful. Add max-cert-size to allow users to pick a max key size retrieved via CERT.
2006-02-22* options.h, gpg.c (main), mainproc.c (check_sig_and_print), keyserver.cDavid Shaw1-0/+4
(keyserver_opts): Rename auto-pka-retrieve to honor-pka-record to be consistent with honor-keyserver-url.
2006-02-22* options.h, keydb.h, g10.c (main), getkey.c (parse_auto_key_locate):David Shaw1-0/+7
Parse a list of key access methods. (get_pubkey_byname): Walk the list here to try and retrieve keys we don't have locally.
2006-02-21* getkey.c (get_pubkey_byname): Fix minor security problem with PKA whenDavid Shaw1-0/+9
importing at -r time. The URL in the PKA record may point to a key put in by an attacker. Fix is to use the fingerprint from the PKA record as the recipient. This ensures that the PKA record is followed. * keyserver-internal.h, keyserver.c (keyserver_import_pka): Return the fingerprint we requested.
2006-02-21* gpgv.c: Stub keyserver_import_ldap.David Shaw1-0/+8
* keyserver-internal.h, keyserver.c (keyserver_import_ldap): Import using the PGP Universal trick of asking ldap://keys.(maildomain) for the key.
2006-02-21* keyserver.c (parse_keyserver_uri): Include the scheme in the uriDavid Shaw1-0/+5
even when we've assumed "hkp" when there was no scheme.
2006-02-14about to release 1.4.3rc1gnupg-1.4.3rc1Werner Koch1-1/+1
2006-02-14Fixed a wrong return code with gpg --verifyWerner Koch1-0/+8
2006-02-09Lock random seed fileWerner Koch1-0/+4
2006-02-06Add support fro CardMan 4040Werner Koch1-0/+14
2006-01-24* keyserver.c (parse_keyserver_uri): If there is a path present, set theDavid Shaw1-0/+5
direct_uri flag so the right keyserver helper is run.
2006-01-22* keyserver.c (keyserver_spawn): Include the EXEEXT so we can findDavid Shaw1-0/+8
keyserver helpers on systems that use extensions. * misc.c (path_access) [HAVE_DRIVE_LETTERS]: Do the right thing with drive letter systems.
2006-01-17* keydb.h, passphrase.c (next_to_last_passphrase): New. "Touch" aDavid Shaw1-0/+14
passphrase as if it was used (move from next_pw to last_pw). * pubkey-enc.c (get_session_key): Use it here to handle the case where a passphrase happens to be correct for a secret key, but yet that key isn't the anonymous recipient (i.e. the secret key could be decrypted, but not the session key). This also handles the case where a secret key is located on a card and a secret key with no passphrase. Note this does not fix bug 594 (anonymous recipients on smartcard do not work) - it just prevents the anonymous search from stopping when the card is encountered.
2006-01-07* keyserver.c (keyserver_refresh): Fix problem when more than one keyDavid Shaw1-0/+6
in a refresh batch has a preferred keyserver set. Noted by Nicolas Rachinsky.