aboutsummaryrefslogtreecommitdiffstats
path: root/g10/ChangeLog (unfollow)
Commit message (Collapse)AuthorFilesLines
2006-07-28Preparing a release candidategnupg-1.4.5rc1Werner Koch1-2/+2
2006-07-26Fixed memory allocation bug and typos.Werner Koch1-0/+12
2006-06-28i18n fixWerner Koch1-0/+3
2006-06-28* keydb.h, pkclist.c (select_algo_from_prefs, algo_available): Pass aDavid Shaw1-0/+5
union for preference hints rather than doing void * games. * sign.c (sign_file): Use it here.
2006-06-28* sign.c (sign_file): When signing with multiple DSA keys, one being DSA1David Shaw1-0/+6
and one being DSA2 and encrypting at the same time, if the recipient preferences give a hash that can work with the DSA2 key, then allow the DSA1 key to be promoted rather than giving up and using hash_for().
2006-06-28* pkclist.c (algo_available): Automatically enable DSA2 mode when handlingDavid Shaw1-0/+5
a key that clearly isn't DSA1 (i.e. q!=160).
2006-06-28Fixed uploading of keays.Werner Koch1-0/+6
2006-06-27do no use reopen_std under W32.Werner Koch1-0/+4
2006-06-25About to do a new releaseWerner Koch1-2/+2
2006-06-22* options.h, gpg.c (main), keygen.c (keygen_upd_std_prefs,David Shaw1-0/+6
keygen_add_std_prefs, proc_parameter_file): Add --default-keyserver-url to specify a keyserver URL at key generation time, and "Keyserver:" keyword for doing the same through a batch file.
2006-06-22* sign.c (do_sign): Accept a truncated hash even for DSA1 keys (be liberalDavid Shaw1-1/+6
in what you accept, etc).
2006-06-12* import.c (import_one): Add a flag (from_sk) so we don't check prefsDavid Shaw1-0/+6
on an autoconverted public key. The check should only happen on the sk size. Noted by Dirk Traulsen.
2006-06-10* keygen.c (gen_card_key): Add optional argument to return a pointerDavid Shaw1-0/+7
(not a copy) of the stub secret key for the secret key we just generated on the card. (generate_card_subkeypair): Use it here so that the signing key on the card can use the card to generate the 0x19 backsig on the primary key. Noted by Janko Heilgeist and Jonas Oberg.
2006-06-09* parse-packet.c (parse_user_id): Cap the user ID size at 2048 bytes. David Shaw1-0/+8
This prevents a memory allocation attack with a very large user ID. A very large packet length could even cause the allocation (a u32) to wrap around to a small number. Noted by Evgeny Legerov on full-disclosure.
2006-05-27Revert last. It is still wrong.David Shaw1-5/+0
2006-05-27* exec.c (make_tempdir) [_WIN32]: Modified to properly handleDavid Shaw1-0/+5
arbitrarily long temporary directory paths.
2006-05-25* keygen.c (gen_dsa): Allow generating DSA2 keys (allow specifying sizes >David Shaw1-0/+8
1024 when --enable-dsa2 is set). The size of q is set automatically based on the key size. (ask_keysize, generate_keypair): Ask for DSA size when --enable-dsa2 is set.
2006-05-25* exec.c (make_tempdir): Fix bug with a temporary directory on Win32David Shaw1-0/+5
that is over 256 bytes long. Noted by Israel G. Lugo.
2006-05-23* gpg.c (reopen_std): New function to reopen fd 0, 1, or 2 if we areDavid Shaw1-0/+10
called with them closed. This is to protect our keyring/trustdb files from corruption if they get attached to one of the standard fds. Print a warning if possible that this has happened, and fail completely if we cannot reopen (should never happen). (main): Call it here.
2006-05-23* parse-packet.c (dump_sig_subpkt, parse_signature), build-packet.cDavid Shaw1-2/+6
(build_sig_subpkt_from_sig), getkey.c (fixup_uidnode, merge_selfsigs_main, merge_selfsigs_subkey), keygen.c (keygen_add_key_expire): Fix meaning of key expiration and sig expiration subpackets - zero means "never expire" according to 2440, not "expire instantly".
2006-05-22* import.c (import_one): Fix bug when importing a new key from a file.David Shaw1-0/+3
2006-05-22* getkey.c (get_pubkey_byname), import.c (import_one): Fix key selectionDavid Shaw1-0/+7
problem when auto-key-locate returns a list of keys, not all of which are usable (revoked, expired, etc). Noted by Simon Josefsson.
2006-04-27(keyserver_import_cert): Show warning if there is a CERT fingerprint,David Shaw1-1/+3
but no --keyserver set.
2006-04-27* keyserver.c (path_makes_direct): New. (keyserver_spawn): Used hereDavid Shaw1-0/+7
to add "_uri" to certain gpgkeys_xxx helpers when the meaning is different if a path is provided (i.e. ldap).
2006-04-22* keyserver.c: Fix build problem with platforms that stick libcurl inDavid Shaw1-0/+5
a place not in the regular include search path.
2006-04-20* options.h, gpg.c (main): Add --enable-dsa2 and --disable-dsa2. DefaultsDavid Shaw1-0/+18
to disable. * pkclist.c (algo_available): If --enable-dsa2 is set, we're allowed to truncate hashes to fit DSA keys. * sign.c (match_dsa_hash): New. Return the best match hash for a given q size. (do_sign, hash_for, sign_file): When signing with a DSA key, if it has q==160, assume it is an old DSA key and don't allow truncation unless --enable-dsa2 is also set. q!=160 always allows truncation since they must be DSA2 keys. (make_keysig_packet): If the user doesn't specify a --cert-digest-algo, use match_dsa_hash to pick the best hash for key signatures.
2006-04-20* gpg.c (print_mds), armor.c (armor_filter, parse_hash_header): AddDavid Shaw1-0/+14
SHA-224. * sign.c (write_plaintext_packet), encode.c (encode_simple): Factor common literal packet setup code from here, to... * main.h, plaintext.c (setup_plaintext_name): Here. New. Make sure the literal packet filename field is UTF-8 encoded. * options.h, gpg.c (main): Make sure --set-filename is UTF-8 encoded and note when filenames are already UTF-8.
2006-04-19* keyedit.c (menu_backsign): Give some more verbose errors when weDavid Shaw1-0/+5
have no need to backsign.
2006-04-11* options.skel, photoid.c (get_default_photo_command): Find an imageDavid Shaw1-0/+5
viewer at runtime. Seems FC5 doesn't have xloadimage.
2006-04-09* getkey.c (parse_auto_key_locate): Fix dupe-removal code.David Shaw1-1/+15
* keyedit.c (menu_backsign): Allow backsigning even if the secret subkey doesn't have a binding signature. * armor.c (radix64_read): Don't report EOF when reading only a pad (=) character. The EOF actually starts after the pad. * gpg.c (main): Make --export, --send-keys, --recv-keys, --refresh-keys, and --fetch-keys follow their arguments from left to right. Suggested by Peter Palfrader.
2006-04-08Fixed segvWerner Koch1-0/+5
2006-04-08See ChangeLogWerner Koch1-0/+6
2006-04-03About to release 1.4.3gnupg-1.4.3Werner Koch1-0/+17
2006-04-01* getkey.c (get_pubkey_byname): Fix missing auto_key_retrieve unlock.David Shaw1-0/+6
Fix strings to not start with a capital letter as per convention.
2006-03-30* main.h, seskey.c (encode_md_value): Modify to allow a q size greaterDavid Shaw1-0/+13
than 160 bits as per DSA2. This will allow us to verify and issue DSA2 signatures for some backwards compatibility once we start generating DSA2 keys. * sign.c (do_sign), sig-check.c (do_check): Change all callers. * sign.c (do_sign): Enforce the 160-bit check for new signatures here since encode_md_value can handle non-160-bit digests now. This will need to come out once the standard for DSA2 is firmed up.
2006-03-22* getkey.c (parse_auto_key_locate): Silently strip out duplicates ratherDavid Shaw1-0/+5
than causing an error.
2006-03-22Changed URLsWerner Koch1-0/+5
2006-03-22* mainproc.c (get_pka_address): Fix bug introduced as part ofDavid Shaw1-0/+5
sig_to_notation conversion. Noted by Peter Palfradrer.
2006-03-21Allow for rmd160 signatures when using gpg-agent.Werner Koch1-0/+9
2006-03-17* keyserver.c (keyserver_import_cert): Handle the IPGP CERT type forDavid Shaw1-0/+7
both the fingerprint alone, and fingerprint+URL cases. * getkey.c (get_pubkey_byname): Minor cleanup.
2006-03-14* keyserver-internal.h, keyserver.c (keyserver_import_pka): Use theDavid Shaw1-0/+11
same API as the other auto-key-locate fetchers. * getkey.c (get_pubkey_byname): Use the fingerprint of the key that we actually fetched. This helps prevent problems where the key that we fetched doesn't have the same name that we used to fetch it. In the case of CERT and PKA, this is an actual security requirement as the URL might point to a key put in by an attacker. By forcing the use of the fingerprint, we won't use the attacker's key here.
2006-03-14* keyserver-internal.h, keyserver.c (keyserver_spawn, keyserver_work,David Shaw1-0/+4
keyserver_import_cert, keyserver_import_name, keyserver_import_ldap): Pass fingerprint info through.
2006-03-14* main.h, import.c (import_one): Optionally return the fingerprint ofDavid Shaw1-0/+7
the key being imported. (import_keys_internal, import_keys_stream, import): Change all callers.
2006-03-12* sig-check.c (signature_check2): Print the backsig warning when thereDavid Shaw1-0/+9
is no backsig present. Give a URL for more information. * keyedit.c (menu_backsign): Small tweak to work properly with keys originally generated with older GnuPGs that included comments in the secret keys.
2006-03-09* build-packet.c (string_to_notation): Add ability to indicate a notationDavid Shaw1-0/+9
to be deleted with a '-' prefix. * keyedit.c (menu_set_notation): Use it here to allow deleting a notation marked with '-'. This works with either "-notation" or "-notation=value".
2006-03-09Preparing for an RC23Werner Koch1-9/+14
2006-03-09* keyedit.c (menu_set_notation): New function to set notations onDavid Shaw1-0/+6
self-signatures. (keyedit_menu): Call it here. (tty_print_notations): Helper. (show_prefs): Show notations in "showpref".
2006-03-09* mainproc.c (get_pka_address), keylist.c (show_notation): RemoveDavid Shaw1-0/+3
duplicate code by using notation functions.
2006-03-09* packet.h, build-packet.c (sig_to_notation), keygen.cDavid Shaw1-0/+4
(keygen_add_notations): Provide printable text for non-human-readable notation values.
2006-03-08* packet.h, build-packet.c (sig_to_notation), keygen.cDavid Shaw1-0/+4
(keygen_add_notations): Tweak to handle non-human-readable notation values.