aboutsummaryrefslogtreecommitdiffstats
path: root/g10/ChangeLog (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* * options.h, sign.c (mk_notation_policy_etc), gpg.c (add_notation_data):David Shaw2006-03-081-0/+11
| | | | | | | | | | Use it here for the various notation commands. * packet.h, main.h, keygen.c (keygen_add_notations), build-packet.c (string_to_notation, sig_to_notation) (free_notation): New "one stop shopping" functions to handle notations and start removing some code duplication.
* * options.h, mainproc.c (check_sig_and_print), gpg.c (main):David Shaw2006-03-081-0/+7
| | | | | | | | | pka-lookups, not pka-lookup. * options.h, gpg.c (main), keyedit.c [cmds], sig-check.c (signature_check2): Rename "backsign" to "cross-certify" as a more accurate name.
* * options.h, gpg.c (main, parse_trust_model), pkclist.cDavid Shaw2006-03-071-0/+7
| | | | | | | (check_signatures_trust), mainproc.c (check_sig_and_print, pka_uri_from_sig), trustdb.c (init_trustdb): Some tweaks to PKA so that it is a verify-option now.
* More tests added; make distcheck worksWerner Koch2006-03-071-0/+6
|
* * sign.c (make_keysig_packet): Don't use MD5 for a RSA_S key as thatDavid Shaw2006-03-071-0/+3
| | | | | is not a PGP 2.x algorithm.
* * mainproc.c (proc_compressed): "Uncompressed" is not a valid compressionDavid Shaw2006-03-061-0/+5
| | | | | algorithm.
* Stricter test of allowed signature packet compositions.Werner Koch2006-03-061-2/+3
| | | | | There is still one problem to solve.
* Fixed problem with PGP2 style signatures and mutilple plaintext dataWerner Koch2006-03-061-0/+5
|
* Replaced an assert and fixed batch mode issue in cardglue.Werner Koch2006-03-051-0/+14
|
* * getkey.c (parse_auto_key_locate): Error if the user selects "cert" orDavid Shaw2006-03-011-0/+9
| | | | | | | | | "pka" when those features are disabled. * misc.c (has_invalid_email_chars): Fix some C syntax that broke the compilers on SGI IRIX MIPS and Compaq/DEC OSF/1 Alpha. Noted by Nelson H. F. Beebe.
* * options.skel: Document auto-key-locate and give a pointer to SimonDavid Shaw2006-02-271-0/+5
| | | | | Josefsson's page for CERT.
* * keydb.h, getkey.c (release_akl), gpg.c (main): AddDavid Shaw2006-02-241-0/+15
| | | | | | | | | | | | | | | --no-auto-key-locate. * options.h, gpg.c (main): Keep track of each keyserver registered so we can match on them later. * keyserver-internal.h, keyserver.c (cmp_keyserver_spec, keyserver_match), gpgv.c: New. Find a keyserver that matches ours and return its spec. * getkey.c (get_pubkey_byname): Use it here to get the per-keyserver options from an earlier keyserver.
* * keyserver.c (parse_keyserver_options): Only change max_cert if it isDavid Shaw2006-02-241-0/+3
| | | | | used.
* * options.c, gpg.c (main), keyserver.c (keyserver_spawn): No specialDavid Shaw2006-02-231-0/+5
| | | | | | treatment of include-revoked, include-subkeys, and try-dns-srv. These are keyserver features, and GPG shouldn't get involved here.
* * keyserver.c (parse_keyserver_uri, add_canonical_option): Always appendDavid Shaw2006-02-231-0/+4
| | | | | options to the list, as ordering may be significant to the user.
* * gpg.c (add_notation_data): Fix reversed logic for isascii check whenDavid Shaw2006-02-231-0/+3
| | | | | adding notations. Noted by Christian Biere.
* * options.h, keyserver.c (add_canonical_option): New.David Shaw2006-02-231-0/+8
| | | | | | | (parse_keyserver_options): Moved from here. (parse_keyserver_uri): Use it here so each keyserver can have some private options in addition to the main keyserver-options (e.g. per-keyserver auth).
* * options.h, keyserver-internal.h, keyserver.c (keyserver_import_name),David Shaw2006-02-221-0/+5
| | | | | | getkey.c (free_akl, parse_auto_key_locate, get_pubkey_byname): The obvious next step: allow arbitrary keyservers in the auto-key-locate list.
* * options.h, keyserver.c (parse_keyserver_options): RemoveDavid Shaw2006-02-221-0/+5
| | | | | | auto-cert-retrieve as it is no longer meaningful. Add max-cert-size to allow users to pick a max key size retrieved via CERT.
* * options.h, gpg.c (main), mainproc.c (check_sig_and_print), keyserver.cDavid Shaw2006-02-221-0/+4
| | | | | | (keyserver_opts): Rename auto-pka-retrieve to honor-pka-record to be consistent with honor-keyserver-url.
* * options.h, keydb.h, g10.c (main), getkey.c (parse_auto_key_locate):David Shaw2006-02-221-0/+7
| | | | | | Parse a list of key access methods. (get_pubkey_byname): Walk the list here to try and retrieve keys we don't have locally.
* * getkey.c (get_pubkey_byname): Fix minor security problem with PKA whenDavid Shaw2006-02-211-0/+9
| | | | | | | | | | importing at -r time. The URL in the PKA record may point to a key put in by an attacker. Fix is to use the fingerprint from the PKA record as the recipient. This ensures that the PKA record is followed. * keyserver-internal.h, keyserver.c (keyserver_import_pka): Return the fingerprint we requested.
* * gpgv.c: Stub keyserver_import_ldap.David Shaw2006-02-211-0/+8
| | | | | | * keyserver-internal.h, keyserver.c (keyserver_import_ldap): Import using the PGP Universal trick of asking ldap://keys.(maildomain) for the key.
* * keyserver.c (parse_keyserver_uri): Include the scheme in the uriDavid Shaw2006-02-211-0/+5
| | | | | even when we've assumed "hkp" when there was no scheme.
* about to release 1.4.3rc1gnupg-1.4.3rc1Werner Koch2006-02-141-1/+1
|
* Fixed a wrong return code with gpg --verifyWerner Koch2006-02-141-0/+8
|
* Lock random seed fileWerner Koch2006-02-091-0/+4
|
* Add support fro CardMan 4040Werner Koch2006-02-061-0/+14
|
* * keyserver.c (parse_keyserver_uri): If there is a path present, set theDavid Shaw2006-01-241-0/+5
| | | | | direct_uri flag so the right keyserver helper is run.
* * keyserver.c (keyserver_spawn): Include the EXEEXT so we can findDavid Shaw2006-01-221-0/+8
| | | | | | | | keyserver helpers on systems that use extensions. * misc.c (path_access) [HAVE_DRIVE_LETTERS]: Do the right thing with drive letter systems.
* * keydb.h, passphrase.c (next_to_last_passphrase): New. "Touch" aDavid Shaw2006-01-171-0/+14
| | | | | | | | | | | | | passphrase as if it was used (move from next_pw to last_pw). * pubkey-enc.c (get_session_key): Use it here to handle the case where a passphrase happens to be correct for a secret key, but yet that key isn't the anonymous recipient (i.e. the secret key could be decrypted, but not the session key). This also handles the case where a secret key is located on a card and a secret key with no passphrase. Note this does not fix bug 594 (anonymous recipients on smartcard do not work) - it just prevents the anonymous search from stopping when the card is encountered.
* * keyserver.c (keyserver_refresh): Fix problem when more than one keyDavid Shaw2006-01-071-0/+6
| | | | | | in a refresh batch has a preferred keyserver set. Noted by Nicolas Rachinsky.
* * mainproc.c (check_sig_and_print), keyserver.cDavid Shaw2006-01-011-0/+5
| | | | | | | (keyserver_import_pka), card-util.c (fetch_url): Always require a scheme:// for keyserver URLs except when used as part of the --keyserver command for backwards compatibility.
* * sign.c (write_signature_packets): Lost a digest_algo line.David Shaw2006-01-011-0/+2
|
* * sign.c (hash_for): Add code to detect if the sk lives on a smartDavid Shaw2006-01-011-0/+12
| | | | | | | | | | | | card. If it does, only allow 160-bit hashes, a la DSA. This involves passing the *sk in, so change all callers. This is correct for today, given the current 160-bit q in DSA, and the current SHA-1/RIPEMD160 support in the openpgp card. It will almost certainly need changing down the road. * app-openpgp.c (do_sign): Give user error if hash algorithm is not supported by the card.
* * keyserver.c (keyserver_import_pka): New. Moved fromDavid Shaw2005-12-231-1/+13
| | | | | | | | | | | | | getkey.c:get_pubkey_byname which was getting crowded. * keyserver.c (keyserver_import_cert): Import a key found in DNS via CERT records. Can handle both the PGP (actual key) and IPGP (URL) CERT types. * getkey.c (get_pubkey_byname): Call them both here. * options.h, keyserver.c (parse_keyserver_options): Add "auto-cert-retrieve" option with optional max size argument.
* * gpgv.c: Stub.David Shaw2005-12-231-0/+12
| | | | | | | | | | * keyserver-internal.h, keyserver.c (keyserver_spawn, keyserver_work, keygerver_getname): New keyserver_getname function to fetch keys by name. * getkey.c (get_pubkey_byname): Call it here to enable locating keys by full mailbox from a keyserver a la PKA. Try PKA first, though, as it is likely to be faster.
* Finished PKA featureWerner Koch2005-12-201-0/+20
|
* * getkey.c (merge_selfsigs_main): All primary keys can certify.David Shaw2005-12-191-0/+4
|
* * gpg.c (main): Restore convert-sk-to-pk as programs rely on it.David Shaw2005-12-191-0/+7
| | | | | | * keyid.c (usagestr_from_pk): Remove special PUBKEY_USAGE_CERT flag. It's no longer needed.
* * gpg.c (main): Don't default to import-options convert-sk-to-pk. ItDavid Shaw2005-12-141-0/+7
| | | | | | | causes confusing warning messages when importing a PGP-exported key that contains a secret key without selfsigs followed by the public key.
* * keyserver.c (keyserver_fetch): Switch on fast-import before weDavid Shaw2005-12-081-0/+5
| | | | | --fetch-keys so we don't rebuild the trustdb after each fetch.
* Made strings translatable. Minor fixes.Werner Koch2005-12-081-1/+8
|
* * options.h, keyserver.c (curl_cant_handle, keyserver_spawn,David Shaw2005-12-081-0/+7
| | | | | | | keyserver_fetch): Set a flag to indicate that we're doing a direct URI fetch so we can differentiate between a keyserver operation and a URI fetch for protocols like LDAP that can do either.
* * keyserver.c (keyserver_spawn): Don't print "searching for key 00000000"David Shaw2005-12-071-0/+10
| | | | | | | | | | when fetching a URI. * keyserver-internal.h, keyserver.c (keyserver_fetch): New. Fetch an arbitrary URI using the keyserver helpers. * gpg.c (main): Call it from here for --fetch-keys.
* * main.h, keylist.c (print_revokers): New. Print the "rvk" designatedDavid Shaw2005-11-201-0/+10
| | | | | | | | | revoker record. Moved from keyedit.c:show_key_with_all_names_colon. * keylist.c (list_keyblock_colon): Use it here ... * keyedit.c (show_key_with_all_names_colon): ... and here.
* * free-packet.c (copy_secret_key): Copy secret key into secure memoryDavid Shaw2005-11-191-1/+11
| | | | | | | | | since we may unprotect it. * main.h, g10.c (main), revoke.c (gen_desig_revoke): Add local user support so users can use -u with --desig-revoke. This bypasses the interactive walk over the revocation keys.
* * keyedit.c (keyedit_menu, menu_clean): Simplify clean options to justDavid Shaw2005-11-181-0/+14
| | | | | | | | | | | | | | "clean", and add "minimize". * import.c (parse_import_options): Make help text match the export versions of the options. * options.h, export.c (parse_export_options, do_export_stream): Reduce clean options to two: clean and minimize. * trustdb.h, trustdb.c (clean_one_uid): New function that joins uid and sig cleaning into one for a simple API outside trustdb.
* * armor.c (parse_header_line): A fussy bit of 2440: header lines areDavid Shaw2005-11-131-0/+6
| | | | | | delimited with a colon-space pair. Therefore a line such as "Comment: " is actually legal, albeit not particularly useful.
* * trustdb.h, trustdb.c (clean_key): New function to handle keyDavid Shaw2005-11-121-0/+10
| | | | | | | | | | | cleaning from one convenient place. * options.h, import.c (parse_import_options, clean_sigs_from_all_uids, import_one): Reduce clean options to two: clean and minimize. * parse-packet.c (setup_user_id): Remove. (parse_user_id, parse_attribute): Just use xmalloc_clear instead.