aboutsummaryrefslogtreecommitdiffstats
path: root/g10/keyedit.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* This is the first half of revocation key / designated revokerDavid Shaw2002-02-281-8/+27
| | | | | | | | | | | | | | | | | | | | | support. That is, it handles all the data to mark a key as revoked if it has been revoked by a designated revoker. The second half (coming later) will contain the code to make someones key your designated revoker and to issue revocations for someone else. Note that this is written so that a revoked revoker can still issue revocations: i.e. If A revokes B, but A is revoked, B is still revoked. I'm not completely convinced this is the proper behavior, but it matches how PGP does it. It does at least have the advantage of much simpler code - my first version of this had lots of loop maintaining code so you could chain revokers many levels deep and if D was revoked, C was not, which meant that B was, and so on. It was sort of scary, actually. This also changes importing to allow bringing in more revocation keys, and exporting to not export revocation keys marked "sensitive". The --edit menu information will show if a revocation key is present.
* For --sig-policy-url and --cert-policy-url, clarify what is a sig and whatDavid Shaw2002-02-101-8/+12
| | | | | | | | | | | | | | | | | | | | | | is a cert. A sig has sigclass 0x00, 0x01, 0x02, or 0x40, and everything else is a cert. Add a "nrlsign" for nonrevocable and local key signatures. Add a --no-force-mdc to undo --force-mdc. Add a knob to force --disable-mdc/--no-disable-mdc. Off by default, of course, but is used in --pgp2 and --pgp6 modes. Allow specifying multiple users in the "Enter the user ID" loop. Enter a blank line to stop. Show each key+id as it is added. It is not illegal (though possibly silly) to have multiple policy URLs in a given signature, so print all that are present. More efficient implementation of URL-ifying code for --search on an HKP keyserver.
* Allow policy URLs with %-expandos in them. This allows policy URLs likeDavid Shaw2002-02-051-2/+2
| | | | | | | | | "http://notary.jabberwocky.com/keysign/%K" to create a per-signature policy URL. Use the new generic %-handler for the photo ID stuff as well. Display policy URLs and notations during signature generation if --show-policy-url/--show-notation is set.
* Split "--set-policy-url" into "--cert-policy-url" and "--sig-policy-url"David Shaw2002-02-031-1/+1
| | | | | | so the user can set different policies for key and data signing. For backwards compatibility, "--set-policy-url" sets both, as before.
* More comments about when to use IDEA in keygen.cDavid Shaw2002-01-271-1/+1
| | | | | | | | | | When key signing with multiple keys at the same time, make sure each key gets the sigclass prompt Close the iobuf and FILE before trying to reap the child process to encourage the child to exit Disable cache-on-close of the fd iobuf (shouldn't all fd iobufs not be cached?)
* * passphrase.c (passphrase_to_dek): Add tryagain_text arg to beWerner Koch2002-01-201-2/+5
| | | | | | | | | | | | | | used with the agent. Changed all callers. (agent_get_passphrase): Likewise and send it to the agent * seckey-cert.c (do_check): New arg tryagain_text. (check_secret_key): Pass the string to do_check. * keygen.c (ask_passphrase): Set the error text is required. * keyedit.c (change_passphrase): Ditto. * passphrase.c (agent_open): Disable opt.use_agent in case of a problem with the agent. (agent_get_passphrase): Ditto. (passphrase_clear_cache): Ditto.
* fix off-by-one in building attribute subpacketsDavid Shaw2002-01-061-11/+56
| | | | | | | | | | change default compression to 1 add ask-sig-expire and ask-cert-expire (--expert was getting absurdly overloaded) permit v3 subkeys use --expert to protect adding multiple photo ids and adding photos to a v3 key
* * keyserver.c (keyserver_spawn): Removed some variablesWerner Koch2001-12-221-0/+6
| | | | | | | | | | | | declaration due to shadowing warnings. * build-packet.c (build_attribute_subpkt): s/index/idx/ to avoid compiler warnig due to index(3). * getkey.c (get_ctx_handle): Use KEYDB_HANDLE as return value. * keylist.c (list_one): Made resname const. * keyedit.c (keyedit_menu): Allow "addphoto" only when --openpgp is not used. * options.skel: Changed one example photo viewer to qiv.
* Photo ID support (actually generic "attribute packet" support, but thereDavid Shaw2001-12-211-16/+90
| | | | | is only one attribute packet defined thus far, and it's a picture)
* Nonrevocable key signature support via "nrsign". These sigs can expire,David Shaw2001-12-211-35/+36
| | | | | but cannot be revoked. Any revocation certificates for them are ignored.
* Sig expiration codeDavid Shaw2001-12-071-7/+74
| | | | | | | Offer to expire a key signature when the key the user is signing expires Expired sigs cause an error return If --expert is set, prompt for sig duration
* Allow a regular key signature to promote a local signature to fullDavid Shaw2001-12-071-3/+34
| | | | | exportable status
* New option --expertDavid Shaw2001-12-071-4/+41
| | | | | | Do not allow signing a revoked UID unless --expert is set, and ask even then. Do not allow signing a revoked key unless --expert is set, and ask even then.
* Bug fix in "showpref"David Shaw2001-12-071-0/+29
| | | | | Allow setting a no-compression preference
* "sigclass" patch - adds key signature class levels, notation and policy-urlDavid Shaw2001-12-061-16/+92
| | | | | displays in key listings, and shows flags for signature features.
* more fixes due to automake 1.5SNAP-1-0-6bWerner Koch2001-10-231-2/+2
|
* calculate time of next trustdb checkWerner Koch2001-09-281-2/+8
|
* Encryption should work againWerner Koch2001-09-271-13/+0
|
* completed the new key validation codeWerner Koch2001-09-261-1/+1
|
* Revamped the trustDBWerner Koch2001-09-241-28/+27
|
* Code cleanupsWerner Koch2001-09-201-29/+2
|
* more bug fixesand some warning cleanupsWerner Koch2001-09-091-1/+1
|
* Last changes before 1.0.6a snapshot releaseSNAP-1-0-6aWerner Koch2001-09-071-0/+5
|
* Revamped the keyring codeWerner Koch2001-09-061-40/+34
|
* MDC feature support and other stuffWerner Koch2001-08-301-14/+15
|
* Added RSA key generationWerner Koch2001-08-141-9/+5
|
* Revamped preference handlingWerner Koch2001-08-101-45/+24
|
* Added a way to update preferencesWerner Koch2001-08-091-1/+108
|
* reworked the way hased data is stored and added a "primary" commandWerner Koch2001-08-091-4/+4
| | | | | DCVS: ----------------------------------------------------------------------
* Changed lsign behaviour, allow future subkeys, don't list revoked keysWerner Koch2001-08-011-19/+13
|
* Fixed lsign using v3 problemWerner Koch2001-07-271-0/+11
|
* migration to autoconf 2.52 and bugfixesWerner Koch2001-07-261-2/+132
|
* Fix for toupper('I') != 'i'Werner Koch2001-06-121-1/+1
|
* fixed severe format string bugWerner Koch2001-05-251-6/+6
|
* New "showpref" subcommand for --edit-keyWerner Koch2001-04-251-11/+64
|
* Changed and added copyright noticesWerner Koch2001-03-081-1/+1
|
* Fixed the new key selection codeWerner Koch2001-03-031-1/+2
|
* 1.0.4c snapshotWerner Koch2000-12-191-1/+1
|
* Fixes for command-fdWerner Koch2000-10-131-2/+3
|
* See ChangeLog: Wed Sep 13 18:12:34 CEST 2000 Werner KochWerner Koch2000-09-131-1/+1
|
* See ChangeLog: Mon Jul 24 10:30:17 CEST 2000 Werner KochWerner Koch2000-07-241-1/+1
|
* See ChangeLog: Wed Jul 5 13:28:45 CEST 2000 Werner KochWerner Koch2000-07-051-7/+8
|
* See ChangeLog: Thu May 18 11:38:54 CEST 2000 Werner KochWerner Koch2000-05-181-1/+1
|
* See ChangeLog: Fri May 12 14:01:20 CEST 2000 Werner KochWerner Koch2000-05-121-1/+1
|
* See ChangeLog: Mon May 1 17:08:14 CEST 2000 Werner KochWerner Koch2000-05-011-0/+5
|
* See ChangeLog: Mon Apr 10 13:34:19 CEST 2000 Werner KochWerner Koch2000-04-101-1/+1
|
* See ChangeLog: Tue Mar 14 18:54:19 CET 2000 Werner KochWerner Koch2000-03-141-32/+37
|
* See ChangeLog: Thu Mar 2 15:37:46 CET 2000 Werner KochWerner Koch2000-03-021-1/+1
|
* See ChangeLog: Thu Feb 17 13:39:32 CET 2000 Werner KochWerner Koch2000-02-171-10/+35
|
* See ChangeLog: Thu Feb 10 17:39:44 CET 2000 Werner KochWerner Koch2000-02-101-1/+3
|