aboutsummaryrefslogtreecommitdiffstats
path: root/g10/Makefile.am (unfollow)
Commit message (Collapse)AuthorFilesLines
2003-07-10* parse-packet.c (parse_signature): No need to reserve 8 bytes for theDavid Shaw1-1/+1
unhashed signature cache any longer. * misc.c (pct_expando): Add two new expandos - signer's fingerprint (%g), and signer's primary fingerprint (%p). * Makefile.am: Include W32LIBS where appropriate. * g10.c (main): Add --rfc2440 alias for --openpgp since in a few months, they won't be the same thing. * keyserver.c (parse_keyserver_uri): Accept "http" as an alias for "hkp", since it is occasionally written that way. (keyserver_spawn): Use ascii_isspace to avoid locale issues. * keygen.c (ask_user_id): Make --allow-freeform-uid apply to the email field as well as the name field, and allow mixing fields when it is set. * options.skel: Use subkeys.pgp.net as the default keyserver. * trustdb.c (validate_one_keyblock): Certifications on revoked or expired uids do not count in the web of trust. * signal.c (init_one_signal, pause_on_sigusr, do_block): Only use sigprocmask() if we have sigset_t, and only use sigaction() if we have struct sigaction. This is for Forte c89 on Solaris which seems to define only the function call half of the two pairs by default. (pause_on_sigusr): Typo. (do_block): If we can't use sigprocmask() and sigset_t, try to get the number of signals from NSIG as well as MAXSIG, and if we can't, fail with an explanation. * signal.c, tdbio.c: Comment out the transaction code. It was not used in this version, and was causing some build problems on quasi-posix platforms (Solaris and Forte c89). * keylist.c (list_keyblock_colon): Don't include validity values when listing secret keys since they can be incorrect and/or misleading. This is a temporary kludge, and will be handled properly in 1.9/2.0. * mainproc.c (check_sig_and_print): Only show the "key available from" preferred keyserver line if the key is not currently present. * keyedit.c (sign_uids): Do not sign expired uids without --expert (same behavior as revoked uids). Do not allow signing a user ID without a self-signature. --expert overrides. Add additional prompt to the signature level question. (menu_expire): When changing expiration dates, don't replace selfsigs on revoked uids since this would effectively unrevoke them. There is also no point in replacing expired selfsigs. This is bug #181 * g10.c (add_notation_data): Make sure that only ascii is passed to iscntrl. Noted by Christian Biere. * getkey.c (classify_user_id2): Replaced isspace by spacep * keygen.c (ask_user_id): Ditto. (get_parameter_algo): Ditto. * keyedit.c (keyedit_menu): Ditto. * tdbdump.c (import_ownertrust): Ditto. s/isxdigit/hexdigitp/. * revoke.c (ask_revocation_reason): * keyserver.c (keyserver_spawn): Dito.
2003-05-31* keylist.c (list_one): Don't show the keyring filename when inDavid Shaw1-9/+4
--with-colons mode. Actually translate "Keyring" string. * mainproc.c (proc_tree): We can't currently handle multiple signatures of different classes or digests (we'd pretty much have to run a different hash context for each), but if they are all the same, make an exception. This is Debian bug #194292. * sig-check.c (check_key_signature2): Make string translatable. * packet.h, getkey.c (fixup_uidnode): Mark real primary uids differently than assumed primaries. * keyedit.c (no_primary_warning): Use the differently marked primaries here in a new function to warn when an --edit-key command might rearrange the self-sig dates enough to change which uid is primary. (menu_expire, menu_set_preferences): Use no_primary_warning() here. * Makefile.am: Use @DLLIBS@ for -ldl.
2003-04-15* Makefile.am (AM_CFLAGS): Make use of AM_CFLAGS and AM_LDFLAGS.Werner Koch1-3/+6
* g10.c, options.h: New option --enable-progress-filter. * progress.c (handle_progress): Make use of it.
2003-03-04* trustdb.c (validate_keys): Mask the ownertrust when building the list ofDavid Shaw1-1/+1
fully valid keys so that disabled keys are still counted in the web of trust. (get_ownertrust_with_min): Do the same for the minimum ownertrust calculation. * parse-packet.c (dump_sig_subpkt): Show the notation names for not-human-readable notations. Fix cosmetic off-by-one length counter. * options.skel: Add explantion and commented-out "no-mangle-dos-filenames". * mainproc.c (proc_encrypted): Make string translatable. * keyserver.c (keyserver_spawn): Quote ':', '%', and any 8-bit characters in the uid strings sent to the keyserver helper. * keyring.c (keyring_rebuild_cache): Lock the keyring while rebuilding the signature caches to prevent another gpg from tampering with the temporary copy. * keygen.c (keygen_set_std_prefs): Include AES192 and AES256 in default prefs. * keyedit.c (show_prefs): Make strings translatable. * keydb.c: Double the maximum number of keyrings to 40. * gpgv.c (main): Fix bug #113 - gpgv should accept the --ignore-time-conflict option. * g10.c (main): --openpgp disables --pgpX. Double the amount of secure memory to 32k (keys are getting bigger these days). * Makefile.am: Makefile.am: Use @CAPLIBS@ to link in -lcap if we are using capabilities.
2003-02-12* Makefile.am: Use a local copy of libexecdir along with @PACKAGE@ asDavid Shaw1-1/+3
GNUPG_LIBEXECDIR so it can be easily overridden at make time.
2002-09-25* Makefile.am: Link gpg with EGDLIBS (i.e. NETLIBS) as EGD uses sockets.David Shaw1-1/+1
Remove the old NETLIBS variable since the keyserver stuff is no longer internal.
2002-09-12* Makefile.am, hkp.c, hkp.h, keyserver.c (keyserver_work): Remove internalDavid Shaw1-2/+0
HKP support.
2002-08-03The big extension module removal.Werner Koch1-1/+1
2002-06-29Update head to match stable 1.0David Shaw1-51/+74
2000-12-21Does now work with libgcryptWerner Koch1-1/+1
2000-12-19Removed the libgcrypt stuff and started to modify the source to work withWerner Koch1-3/+3
that external library.
2000-11-14Some configuration changesWerner Koch1-1/+2
2000-07-17See ChangeLog: Mon Jul 17 16:35:47 CEST 2000 Werner KochWerner Koch1-1/+1
2000-07-14See ChangeLog: Fri Jul 14 19:38:23 CEST 2000 Werner KochWerner Koch1-2/+3
2000-05-25See ChangeLog: Thu May 25 18:39:11 CEST 2000 Werner KochWerner Koch1-1/+7
2000-03-13See ChangeLog: Mon Mar 13 19:22:46 CET 2000 Werner KochWerner Koch1-1/+6
2000-01-27See ChangeLog: Thu Jan 27 18:00:44 CET 2000 Werner KochWerner Koch1-2/+2
2000-01-24See ChangeLog: Mon Jan 24 13:04:28 CET 2000 Werner KochWerner Koch1-1/+1
1999-11-15See ChangeLog: Mon Nov 15 21:36:02 CET 1999 Werner KochWerner Koch1-2/+1
1999-11-13See ChangeLog: Sat Nov 13 17:44:23 CET 1999 Werner KochWerner Koch1-2/+2
1999-10-26See ChangeLog: Tue Oct 26 20:03:44 CEST 1999 Werner KochV1-1-0Werner Koch1-5/+1
1999-10-26See ChangeLog: Tue Oct 26 14:10:21 CEST 1999 Werner KochWerner Koch1-1/+2
1999-07-07See ChangeLog: Wed Jul 7 13:23:40 CEST 1999 Werner KochWerner Koch1-1/+1
1999-06-26See ChangeLog: Sat Jun 26 12:15:59 CEST 1999 Werner KochWerner Koch1-3/+3
1999-06-15See ChangeLog: Tue Jun 15 14:23:10 CEST 1999 Werner KochWerner Koch1-4/+5
1999-05-27See ChangeLog: Thu May 27 09:40:55 CEST 1999 Werner KochWerner Koch1-3/+3
1999-05-06.V0-9-6Werner Koch1-1/+4
1999-04-18See ChangeLog: Sun Apr 18 10:11:28 CEST 1999 Werner KochWerner Koch1-11/+3
1999-03-11See ChangeLog: Thu Mar 11 16:39:46 CET 1999 Werner KochWerner Koch1-0/+1
1999-01-16See ChangeLog: Sat Jan 16 09:27:30 CET 1999 Werner KochWerner Koch1-2/+2
1998-11-27See ChangeLog: Fri Nov 27 12:39:29 CET 1998 Werner KochWerner Koch1-1/+2
1998-10-25some random changesWerner Koch1-1/+7
1998-10-21Epxerimenta support for GDBM keyings.Werner Koch1-2/+2
1998-10-12backupWerner Koch1-0/+1
1998-09-28*** empty log message ***Werner Koch1-0/+2
1998-09-11*** empty log message ***Werner Koch1-2/+3
1998-07-29edit-key is now completeWerner Koch1-1/+1
1998-07-21changed trustdb designWerner Koch1-5/+5
1998-07-09fixed severe exploitV0-3-2Werner Koch1-0/+2
1998-07-06intermediate releaseWerner Koch1-0/+2
1998-06-25nearly ready for 0.3.0Werner Koch1-1/+1
1998-06-13a whole bunch of internal cleanupsWerner Koch1-3/+0
1998-06-11update from toboldWerner Koch1-0/+1
1998-05-29*** empty log message ***V0-2-19Werner Koch1-1/+2
1998-04-20vor muenchenWerner Koch1-0/+2
1998-04-09new releaseV0-2-15Werner Koch1-0/+1
1998-04-07cipher reorganisiertWerner Koch1-5/+7
1998-04-02started with keyserverWerner Koch1-1/+5
1998-04-02release 0.2.14Werner Koch1-2/+2
1998-03-19some cleanupsWerner Koch1-1/+2