aboutsummaryrefslogtreecommitdiffstats
path: root/g10/getkey.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2012-06-25gpg: Disallow the use of v3 keys.disallow-v3-keysWerner Koch1-1/+12
* g10/gpg.c: Add options --allow-v3-keys and --no-allow-v3-keys. (main): Enable --allow-v3-keys in --pgp2 mode. * g10/options.h (opt): Add field allow_v3_keys. * g10/import.c (delete_v3_subkeys): New. (import_one): Skip v3 keys and delete v3 subkeys. (import_print_stats): Print stats on v3 keys and subkeys. * g10/getkey.c (finish_lookup): Skip v3 keys. -- This is a first take on disabling v3 keys. We may need to add some tweaks to make decryption using an existing v3 key easier. There is no need to disallow decryption. Thanks to Georgi Guninski to put some pressure on us to finally do what PGP 2 folks will probably don’t like. See the discussion on gnupg-devel starting 2012-06-22.
2012-06-05Change all quotes in strings and comments to the new GNU standard.Werner Koch1-2/+2
The asymmetric quotes used by GNU in the past (`...') don't render nicely on modern systems. We now use two \x27 characters ('...'). The proper solution would be to use the correct Unicode symmetric quotes here. However this has the disadvantage that the system requires Unicode support. We don't want that today. If Unicode is available a generated po file can be used to output proper quotes. A simple sed script like the one used for en@quote is sufficient to change them. The changes have been done by applying sed -i "s/\`\([^'\`]*\)'/'\1'/g" to most files and fixing obvious problems by hand. The msgid strings in the po files were fixed with a similar command.
2011-04-29Re-indentation of keydb.c and error code changes.Werner Koch1-5/+5
Returning -1 as an error code is not very clean given that gpg error has more descriptive error codes. Thus we now return GPG_ERR_NOT_FOUND for all search operations and adjusted all callers.
2011-04-25Fix regression in gpg's mail address parsing.Werner Koch1-1/+1
Since 2009-12-08 gpg was not able to find email addresses indicated by a leading '<'. This happened when I merged the user id classification code of gpgsm and gpg.
2011-02-04Nuked almost all trailing white space.post-nuke-of-trailing-wsWerner Koch1-11/+11
We better do this once and for all instead of cluttering all future commits with diffs of trailing white spaces. In the majority of cases blank or single lines are affected and thus this change won't disturb a git blame too much. For future commits the pre-commit scripts checks that this won't happen again.
2011-01-06Integrating http://code.google.com/p/gnupg-ecc/source/detail?r=15 .Andrey Jivsov1-1/+4
The following works: gpg2 --gen-key (ECC) gpg2 --list-keys gpg2 --list-packets ~/.gnupg/pubring.gpg gpg2 --list-packets <private key from http://sites.google.com/site/brainhub/pgpecckeys> ECDH doesn't work yet as the code must be re-written to adjust for gpg-agent refactoring.
2010-10-20Make public key data structure easier to read.Werner Koch1-26/+28
Check vor v1 card while signing.
2010-10-13More agent support for gpg.Werner Koch1-69/+87
2010-10-01Exporting secret keys via gpg-agent is now basically supported.Werner Koch1-8/+8
A couple of forward ported changes. Doc updates.
2010-09-06Removed more secret key related code.Werner Koch1-1/+1
It builds fine and passes some of the tests but there are quite some features which don't work yet.
2010-04-21More changes on the way to remove secring.gpg.Werner Koch1-184/+142
2010-04-20Generating an OpenPGP key cia gpg-agent basically works.Werner Koch1-3/+3
2010-02-02Various changes to eventually support openpgp keys in pgp-agent.Werner Koch1-310/+295
Comment fixes. Minor chnages in preparation of a W32CE port.
2010-01-09Re-indentWerner Koch1-2061/+2210
2009-12-08Unification of the search descriptor usage.Werner Koch1-225/+5
2009-05-06Fix bug#1034.Werner Koch1-10/+0
Remove dead code.
2009-01-12preparing a releaseWerner Koch1-2/+7
2008-10-20Marked all unused args on non-W32 platforms.Werner Koch1-1/+3
2008-05-09Remove a warning.Werner Koch1-1/+1
2008-05-07--locate-key now returns several keys if they all match.Werner Koch1-9/+59
2008-05-07Add command --locate-key.Werner Koch1-4/+9
Fix auto-key-locate processing of "nodefault".
2008-04-16Test commitDavid Shaw1-2/+2
2008-04-16If there are multiple 0x19 backsigs, take the most recent one. (from 1.4).Werner Koch1-27/+73
add log-file and debug-level to the --gpgconf-list.
2008-04-08Enhanced --auto-key-locate.Werner Koch1-44/+90
2008-04-07Minor cleanups.Werner Koch1-5/+3
Implemented key helper kdns
2008-03-06Comment fixes.Werner Koch1-3/+3
Convey the new envvars when using simple-pwquery.
2007-07-04Changed to GPLv3.Werner Koch1-4/+2
Removed intl/.
2007-03-10From STABLE-BRANCH-1-4David Shaw1-0/+3
* parse-packet.c (parse_signature): It's hex. * getkey.c (merge_selfsigs_subkey): Avoid listing the contents of a backsig when list mode is on. Noted by Timo Schulz.
2007-03-08Fix from 1.4:Werner Koch1-4/+9
* keyedit.c (keyedit_menu): If we modify the keyblock (via fix_keyblock() or collapse_uids()) make sure we reprocess the keyblock so the flags are correct. Noted by Robin H. Johnson. * getkey.c (fixup_uidnode): Properly clear flags that don't apply to us (revoked, expired) so that we can reprocess a uid.
2006-10-20Allow to select X.509 certificates using the keygrip.Werner Koch1-1/+5
2006-10-02Fix for bug 537Werner Koch1-6/+6
2006-06-27Ported patches from 1.4.x Werner Koch1-8/+8
2006-05-23* parse-packet.c (dump_sig_subpkt, parse_signature), build-packet.cDavid Shaw1-7/+7
(build_sig_subpkt_from_sig), getkey.c (fixup_uidnode, merge_selfsigs_main, merge_selfsigs_subkey), keygen.c (keygen_add_key_expire): Fix meaning of key expiration and sig expiration subpackets - zero means "never expire" according to 2440, not "expire instantly".
2006-05-22* getkey.c (get_pubkey_byname), import.c (import_one): Fix key selectionDavid Shaw1-1/+1
problem when auto-key-locate returns a list of keys, not all of which are usable (revoked, expired, etc). Noted by Simon Josefsson.
2006-04-28Merged recent changes from 1.4Werner Koch1-4/+4
2006-04-19Merged with gpg 1.4.3 code. Werner Koch1-290/+676
The gpg part does not yet build.
2006-04-09* getkey.c (parse_auto_key_locate): Fix dupe-removal code.David Shaw1-4/+4
* keyedit.c (menu_backsign): Allow backsigning even if the secret subkey doesn't have a binding signature. * armor.c (radix64_read): Don't report EOF when reading only a pad (=) character. The EOF actually starts after the pad. * gpg.c (main): Make --export, --send-keys, --recv-keys, --refresh-keys, and --fetch-keys follow their arguments from left to right. Suggested by Peter Palfrader.
2006-04-08See ChangeLogWerner Koch1-4/+17
2006-04-01* getkey.c (get_pubkey_byname): Fix missing auto_key_retrieve unlock.David Shaw1-5/+6
Fix strings to not start with a capital letter as per convention.
2006-03-22* getkey.c (parse_auto_key_locate): Silently strip out duplicates ratherDavid Shaw1-5/+10
than causing an error.
2006-03-17* keyserver.c (keyserver_import_cert): Handle the IPGP CERT type forDavid Shaw1-12/+11
both the fingerprint alone, and fingerprint+URL cases. * getkey.c (get_pubkey_byname): Minor cleanup.
2006-03-14* keyserver-internal.h, keyserver.c (keyserver_import_pka): Use theDavid Shaw1-27/+40
same API as the other auto-key-locate fetchers. * getkey.c (get_pubkey_byname): Use the fingerprint of the key that we actually fetched. This helps prevent problems where the key that we fetched doesn't have the same name that we used to fetch it. In the case of CERT and PKA, this is an actual security requirement as the URL might point to a key put in by an attacker. By forcing the use of the fingerprint, we won't use the attacker's key here.
2006-03-14* keyserver-internal.h, keyserver.c (keyserver_spawn, keyserver_work,David Shaw1-4/+4
keyserver_import_cert, keyserver_import_name, keyserver_import_ldap): Pass fingerprint info through.
2006-03-01* getkey.c (parse_auto_key_locate): Error if the user selects "cert" orDavid Shaw1-5/+9
"pka" when those features are disabled. * misc.c (has_invalid_email_chars): Fix some C syntax that broke the compilers on SGI IRIX MIPS and Compaq/DEC OSF/1 Alpha. Noted by Nelson H. F. Beebe.
2006-02-24* keydb.h, getkey.c (release_akl), gpg.c (main): AddDavid Shaw1-8/+24
--no-auto-key-locate. * options.h, gpg.c (main): Keep track of each keyserver registered so we can match on them later. * keyserver-internal.h, keyserver.c (cmp_keyserver_spec, keyserver_match), gpgv.c: New. Find a keyserver that matches ours and return its spec. * getkey.c (get_pubkey_byname): Use it here to get the per-keyserver options from an earlier keyserver.
2006-02-22* options.h, keyserver-internal.h, keyserver.c (keyserver_import_name),David Shaw1-4/+31
getkey.c (free_akl, parse_auto_key_locate, get_pubkey_byname): The obvious next step: allow arbitrary keyservers in the auto-key-locate list.
2006-02-22* options.h, keydb.h, g10.c (main), getkey.c (parse_auto_key_locate):David Shaw1-62/+110
Parse a list of key access methods. (get_pubkey_byname): Walk the list here to try and retrieve keys we don't have locally.
2006-02-21* getkey.c (get_pubkey_byname): Fix minor security problem with PKA whenDavid Shaw1-1/+14
importing at -r time. The URL in the PKA record may point to a key put in by an attacker. Fix is to use the fingerprint from the PKA record as the recipient. This ensures that the PKA record is followed. * keyserver-internal.h, keyserver.c (keyserver_import_pka): Return the fingerprint we requested.
2005-12-23* keyserver.c (keyserver_import_pka): New. Moved fromDavid Shaw1-21/+40
getkey.c:get_pubkey_byname which was getting crowded. * keyserver.c (keyserver_import_cert): Import a key found in DNS via CERT records. Can handle both the PGP (actual key) and IPGP (URL) CERT types. * getkey.c (get_pubkey_byname): Call them both here. * options.h, keyserver.c (parse_keyserver_options): Add "auto-cert-retrieve" option with optional max size argument.
2005-12-23* gpgv.c: Stub.David Shaw1-28/+46
* keyserver-internal.h, keyserver.c (keyserver_spawn, keyserver_work, keygerver_getname): New keyserver_getname function to fetch keys by name. * getkey.c (get_pubkey_byname): Call it here to enable locating keys by full mailbox from a keyserver a la PKA. Try PKA first, though, as it is likely to be faster.