index
:
GnuPG
ECC-INTEGRATION-2-1
GNUPG-1-9-BRANCH
GNUPG-1-9-BRANCH-MO
GNUPG-TRUNK-MO-HACKS
STABLE-BRANCH-1-0
STABLE-BRANCH-1-2
STABLE-BRANCH-1-4
STABLE-BRANCH-2-0
STABLE-BRANCH-2-2
STABLE-BRANCH-2-2.40
STABLE-BRANCH-2-4
T3880
T3880-fix
bjk/passphrase-inquire
bugfixes-2.2
cb/T5215
cb/test
ccid_driver_improvement
debian-unstable-patch-queue
disallow-v3-keys
dkg-fix-T4566
dkg-fix-T4593
dkg-fix-T4628
dkg-fix-T4652
dkg-fix-T4682
dkg/T1371
dkg/T1967
dkg/fix-4855
dkg/fix-T3995
dkg/fix-T4490
dkg/fix-T4501
dkg/fix-T4507
dkg/fix-T4522
dkg/gpgv-doc-improvement
dkg/no-skel-files
dkg/passphrase-env
ePit-1-0
fix-1950
fix-4393
fix-T3995
fix-T4017
fix-T4018
fix-T4019
gniibe/T4620
gniibe/crypto-refresh
gniibe/decryption-key
gniibe/fix-3465
gniibe/kem
gniibe/pcsc-get-status
gniibe/regexp
gniibe/scd-direct-keygrip
gniibe/scd-kdf-support
gniibe/scd-watch
gniibe/sos
gniibe/spawn
gniibe/t3883
gniibe/t6275
gniibe/t6364
gniibe/t6487
gniibe/t6592
gniibe/t6606
gniibe/t7426
gniibe/v5/448
gniibe/x25519
ikloecker/pinentry-formatted-passphrase
ikloecker/t5462
ikloecker/t5598-appimage
justus/fix-1788
justus/issue1955
justus/issue2012
justus/issue2700
justus/issue2826-0
justus/libdns-0
justus/scm-9
key-storage-work
master
mo-scd
neal/dirmngr-ldap
neal/encrypted-mailing-lists
neal/issue2236
neal/kdb
neal/next
neal/pending
neal/strsplit
npth
npth-2
npth-3
npth-4
scd-backport-2-0
scd-pin-prompt
scd-work
seckey-sync-work
switch-to-gpgk
t5964
tobias/gpgsum
tobias/tsa
tpm-work
wk/g13work
wk/kyber-test
wk/signcode
wk/stable-2.2-global-options
wk/test-master
wk/w32-smime-perf-tests
The GNU Privacy Guard
about
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
g10
/
ChangeLog
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
Solved conflict
Werner Koch
2002-03-03
1
-0
/
+4
*
This is the first half of revocation key / designated revoker
David Shaw
2002-02-28
1
-0
/
+65
*
Do not include v3 keys in a --export-secret-subkeys export.
David Shaw
2002-02-28
1
-0
/
+3
*
If a key isn't valid (say, because of no self-signature), allow
David Shaw
2002-02-27
1
-0
/
+6
*
Treat key lists internally as fingerprints when possible. All this is via
David Shaw
2002-02-26
1
-1
/
+16
*
Detect a "no keys found" case even if the keyserver helper program does
David Shaw
2002-02-22
1
-0
/
+9
*
Catch corruption in HKP index lines (can be caused by broken or malicious
David Shaw
2002-02-19
1
-0
/
+11
*
* pkclist.c (check_signatures_trust): Always print the warning for
Werner Koch
2002-02-14
1
-0
/
+8
*
Bug fix - properly handle user IDs with colons (":") in them while HKP
David Shaw
2002-02-12
1
-0
/
+5
*
For --sig-policy-url and --cert-policy-url, clarify what is a sig and what
David Shaw
2002-02-10
1
-0
/
+28
*
Allow policy URLs with %-expandos in them. This allows policy URLs like
David Shaw
2002-02-05
1
-0
/
+18
*
Workaround for the pksd and OKS keyserver bug that calculates v4 RSA
David Shaw
2002-02-04
1
-0
/
+10
*
Bug fix - do not append keys to each other when --sending more than one.
David Shaw
2002-02-04
1
-0
/
+5
*
Split "--set-policy-url" into "--cert-policy-url" and "--sig-policy-url"
David Shaw
2002-02-03
1
-0
/
+8
*
* g10.c (main): --gen-random --armor does now output a base64
Werner Koch
2002-01-30
1
-0
/
+5
*
--pgp6 flag. This is not nearly as involved as --pgp2. In short, it
David Shaw
2002-01-29
1
-0
/
+10
*
More comments about when to use IDEA in keygen.c
David Shaw
2002-01-27
1
-0
/
+15
*
* g10.c, options.h: New option --gpg-agent-info
Werner Koch
2002-01-26
1
-0
/
+8
*
Only check preferences against keys with v4 self sigs as v3 sigs have no
David Shaw
2002-01-24
1
-0
/
+13
*
Cosmetic: don't present a RSA signing key as a "keypair" which can be 768
David Shaw
2002-01-23
1
-0
/
+9
*
Some compatibility polish for PGP2. Add a fake IDEA preference for v3
David Shaw
2002-01-22
1
-0
/
+36
*
* passphrase.c (passphrase_to_dek): Add tryagain_text arg to be
Werner Koch
2002-01-20
1
-0
/
+15
*
Removed debugging output
Werner Koch
2002-01-19
1
-1
/
+2
*
* passphrase.c (agent_open): Add support for the new Assuan based
Werner Koch
2002-01-19
1
-0
/
+7
*
New command --decrypt-files.
Timo Schulz
2002-01-15
1
-0
/
+8
*
Fixed some typos.
Timo Schulz
2002-01-12
1
-2
/
+3
*
Move idea_cipher_warn to misc.c so gpgv.c doesn't need a stub
David Shaw
2002-01-09
1
-0
/
+13
*
New code for encode_crypt_files.
Timo Schulz
2002-01-09
1
-0
/
+6
*
Added missing include file.
Timo Schulz
2002-01-09
1
-0
/
+4
*
Better description for --encrypt-files.
Timo Schulz
2002-01-08
1
-0
/
+4
*
* g10.c (main): Must register the secring for encryption because
Werner Koch
2002-01-08
1
-0
/
+6
*
fix off-by-one in building attribute subpackets
David Shaw
2002-01-06
1
-0
/
+26
*
* g10.c (main): Do not register the secret keyrings for certain
Werner Koch
2002-01-05
1
-14
/
+21
*
Use one-pass packets even if it's a v3 key making the signature
David Shaw
2002-01-04
1
-0
/
+18
*
Minor tweaks: remove --no-default-check-level, don't cache child tempfiles
David Shaw
2002-01-03
1
-0
/
+14
*
New command (encrypt-files).
Timo Schulz
2002-01-03
1
-0
/
+12
*
lock only writable key rings and free unused iobuf
Stefan Bellon
2002-01-02
1
-2
/
+15
*
Bugfix in photoid.c and keyserver.c
David Shaw
2001-12-29
1
-0
/
+12
*
Add an outofband indicator to the keyserver protocol.
David Shaw
2001-12-28
1
-0
/
+13
*
Some exec cleanups and tweaks for photo ID and keyserver execution
David Shaw
2001-12-27
1
-0
/
+17
*
Some tweaks - copyleft info for mkdtemp.c, and header pruning in photoid.c
David Shaw
2001-12-25
1
-0
/
+8
*
Fixed a typo and W32 support for the latest CVS changes.
Timo Schulz
2001-12-23
1
-0
/
+12
*
Avoid const compiler warning
David Shaw
2001-12-22
1
-0
/
+2
*
Some last minute tweaks - type fixes from Stefan and win32 temp files
David Shaw
2001-12-22
1
-0
/
+11
*
Minor cleanups
Werner Koch
2001-12-22
1
-2
/
+6
*
* keyserver.c (keyserver_spawn): Removed some variables
Werner Koch
2001-12-22
1
-2
/
+103
*
Added is_file_compressed
Timo Schulz
2001-12-22
1
-83
/
+4
*
Photo ID support (actually generic "attribute packet" support, but there
David Shaw
2001-12-21
1
-0
/
+53
*
Nonrevocable key signature support via "nrsign". These sigs can expire,
David Shaw
2001-12-21
1
-0
/
+24
*
* g10.c. options.h : New option --show-keyring
Werner Koch
2001-12-21
1
-0
/
+6
[next]