aboutsummaryrefslogtreecommitdiffstats
path: root/g10/keyedit.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* * keyedit.c (sign_uids): Properly handle remaking a self-sig on revoked orDavid Shaw2004-06-241-5/+21
| | | | | | expired user IDs. Also, once we've established that a given uid cannot or will not be signed, don't continue to ask about each sig.
* * keyedit.c (keyedit_menu): Request a trustdb update when adding a newDavid Shaw2004-03-271-2/+4
| | | | | user ID so the new ID gets validity set. Reported by Owen Taylor.
* * keyedit.c (no_primary_warning): Cleanup. (menu_expire): Don't giveDavid Shaw2004-03-231-18/+16
| | | | | | primary warning for subkey expiration changes. These cannot reorder primaries.
* * packet.h, getkey.c (fixup_uidnode, merge_selfsigs_subkey): Keep track ofDavid Shaw2004-03-221-4/+9
| | | | | | | | | which self-sig we actually chose. * keyedit.c (menu_expire, menu_set_primary_uid, menu_set_preferences): Use it here to avoid updating non-used self-sigs and possibly promoting an old self-sig into consideration again.
* * import.c (import_one): Try and collapse user IDs when importing a keyDavid Shaw2004-03-091-9/+4
| | | | | | | | | | | | for the first time. * build-packet.c (do_comment, do_user_id): Try for a headerlen of 2 since that's the smallest and most likely encoding for these packets * keyedit.c (menu_addrevoker): Allow appointing a subkey as a designated revoker if the user forces it via keyid!, so long as the subkey can certify. Also use the proper date string when prompting for confirmation.
* * keyedit.c (menu_addrevoker): Do not allow appointing a subkey as aDavid Shaw2004-02-271-0/+7
| | | | | designated revoker.
* * encode.c (encode_simple): Show cipher with --verbose.David Shaw2004-02-241-7/+7
| | | | | | | | | | | | * options.h, g10.c (main), keyedit.c (sign_keys): Add --ask-cert-level option to enable cert level prompts during sigs. Defaults to on. Simplify --default-cert-check-level to --default-cert-level. If ask-cert-level is off, or batch is on, use the default-cert-level as the cert level. * options.h, g10.c (main), trustdb.c (mark_usable_uid_certs): Simplify --min-cert-check-level to --min-cert-level.
* * misc.c (compress_algo_to_string): Return NULL on failure like all of theDavid Shaw2004-02-101-9/+9
| | | | | | | | | | | | | | | | other xxxx_algo_to_string() functions. * mainproc.c (list_node): Minor spacing tweak to match --list-keys output. * keylist.c (list_keyblock_print), mainproc.c (list_node): Mark revoked subkeys as revoked. Requested by Matthew Wilcox. Make revoked and expired tags translatable (they are already translated elsewhere). Revoked overrides expiration when both apply. * keyedit.c (show_prefs): Use compress algo constants. (show_basic_key_info): Make revoked and expired tags translatable (show_key_with_all_names): Revoked overrides expired when both apply.
* * decrypt.c: Fix copyright date.David Shaw2004-01-291-4/+1
| | | | | | | * packet.h, keyedit.c (show_key_with_all_names_colon), keylist.c (list_keyblock_colon), mainproc.c (list_node, proc_tree): Minor cleanup to remove local_id, which is no longer used.
* * keyedit.c (menu_addrevoker): Fix leaking a few bytes.David Shaw2003-08-311-1/+7
|
* * keyedit.c (change_passphrase): When responding 'no' to the blankDavid Shaw2003-08-261-1/+3
| | | | | passphrase question, re-prompt for a new passphrase. This is bug #202.
* * keyedit.c (sign_uids): Add additional prompt to the signature levelDavid Shaw2003-06-191-2/+4
| | | | | | | | | | question. (menu_expire): When changing expiration dates, don't replace selfsigs on revoked uids since this would effectively unrevoke them. There is also no point in replacing expired selfsigs. This is bug #181. * g10.c (main): Add --rfc2440 alias for --openpgp since in a few months, they won't be the same thing.
* * hkp.c (hkp_search): Return proper error code on failure.David Shaw2003-06-181-3/+19
| | | | | | | | | | | * keyedit.c (sign_uids): Do not allow signing a user ID without a self-signature. --expert overrides. * options.skel: Use subkeys.pgp.net as the default keyserver. * trustdb.c (validate_one_keyblock): Certifications on revoked or expired uids do not count in the web of trust.
* * keyedit.c (sign_uids): Do not sign expired uids without --expert (sameDavid Shaw2003-06-071-0/+20
| | | | | | | | | behavior as revoked uids). * mainproc.c (print_notation_data, check_sig_and_print): Only show the "key available from" preferred keyserver line if the key is not currently present.
* Make sure that only ascii is passed to isfoo functions.Werner Koch2003-06-071-1/+1
|
* * keylist.c (list_one): Don't show the keyring filename when inDavid Shaw2003-05-301-0/+38
| | | | | | | | | | | | | | | | | | | | | | --with-colons mode. Actually translate "Keyring" string. * mainproc.c (proc_tree): We can't currently handle multiple signatures of different classes or digests (we'd pretty much have to run a different hash context for each), but if they are all the same, make an exception. This is Debian bug #194292. * sig-check.c (check_key_signature2): Make string translatable. * packet.h, getkey.c (fixup_uidnode): Mark real primary uids differently than assumed primaries. * keyedit.c (no_primary_warning): Use the differently marked primaries here in a new function to warn when an --edit-key command might rearrange the self-sig dates enough to change which uid is primary. (menu_expire, menu_set_preferences): Use no_primary_warning() here. * Makefile.am: Use @DLLIBS@ for -ldl.
* * keyedit.c (sign_uids): Show keyid of the key making the signature.David Shaw2003-05-071-1/+1
| | | | | | | | | | | * trustdb.h, trustdb.c (is_disabled), keylist.c (print_capabilities), gpgv.c (is_disabled): is_disabled now takes a pk and not just the keyid. This is for speed since there is no need to re-fetch a key when we already have that key handy. * getkey.c (skip_disabled): New function to get a pk and call is_disabled on it. (key_byname): Use it here.
* * options.h, armor.c, cipher.c, g10.c, keyedit.c, pkclist.c, sign.c,David Shaw2003-05-021-4/+4
| | | | | | | encode.c, getkey.c, revoke.c: The current flags for different levels of PGP-ness are massively complex. This is step one in simplifying them. No functional change yet, just use a macro to check for compliance level.
* * build-packet.c (build_sig_subpkt): Comments.David Shaw2003-04-281-2/+4
| | | | | | | | | | | | | * exec.c (exec_write): Cast NULL to void* to properly terminate varargs list. * keyedit.c (show_key_with_all_names): Just for safety, catch an invalid pk algorithm. * sign.c (make_keysig_packet): Crucial that the call to mksubpkt comes LAST before the calls to finalize the sig as that makes it possible for the mksubpkt function to get a reliable pointer to the subpacket area.
* * mainproc.c (check_sig_and_print): Show sig class when verifying a sigDavid Shaw2003-04-271-9/+9
| | | | | | | | | | | | | with --verbose on, and add version, pk and hash algorithms and sig class to VALIDSIG. * g10.c (main): Add --no-textmode. * export.c (do_export_stream), keyedit.c (show_key_with_all_names, menu_addrevoker), mainproc.c (check_sig_and_print), photoid.c (show_photos), trustdb.c (get_validity, reset_trust_records, validate_keys): Make some strings translatable.
* Reverted recent changes in the copyright notices. We can't use aWerner Koch2003-04-231-1/+2
| | | | | | | | range of years but must list each year we have prepared a release and applied a textual change to a file. It is common that some files are not changed in a couple of years and a range would not allow to express this.
* * keyedit.c (sign_uids): Allow replacing expired signatures. AllowDavid Shaw2003-04-221-1/+39
| | | | | | | | | | | | | | duplicate signatures with --expert. * pkclist.c (check_signatures_trust): Don't display a null fingerprint when checking a signature with --always-trust enabled. * filter.h (progress_filter_context_t), progress.c (handle_progress): Fix compiler warnings. Make "what" constant. * build-packet.c (do_plaintext): Do not create invalid literal packets with >255-byte names.
* * passphrase .c (agent_get_passphrase): New arg CANCELED.Werner Koch2003-04-091-4/+4
| | | | | | | | | | | | | | | | (passphrase_to_dek): Ditto. Passed to above. Changed all callers to pass NULL. * seckey-cert.c (do_check): New arg CANCELED. (check_secret_key): Terminate loop when canceled. * keyedit.c (change_passphrase): Pass ERRTEXT untranslated to passphrase_to_dek and translate where appropriate. * seckey-cert.c (check_secret_key): Ditto. * keygen.c (ask_passphrase): Ditto. * passphrase.c (agent_get_passphrase): Translate the TRYAGAIN_TEXT. Switch the codeset to utf-8.
* * g10.c (main): --openpgp disables --pgpX.David Shaw2003-02-231-6/+12
| | | | | * keyedit.c (show_prefs): Make strings translatable.
* * keyedit.c (menu_revuid): Properly handle a nonselfsigned uid on a v4 keyDavid Shaw2003-02-021-5/+128
| | | | | | | | | | | | | (treat as a v4 revocation). * keyedit.c (keyedit_menu, menu_revuid): Backport "revuid" from devel. * import.c (print_import_check): Do not re-utf8 convert user IDs. * status.h, status.c (get_status_string), import.c (import_one, print_import_check): Backport Timo's IMPORT_CHECK status message from devel.
* * packet.h, pkclist.c (build_pk_list), free-packet.cDavid Shaw2003-01-091-9/+1
| | | | | | | | | | (release_public_key_parts): Remove unused namehash element for public keys. * trustdb.h, gpgv.c, trustdb.c (get_validity, get_validity_info): Pass a user ID in rather than a namehash, so we only have to do the hashing in one place.
* * keygen.c (keygen_add_key_expire): Properly handle updating a keyDavid Shaw2002-12-261-1/+4
| | | | | | | | | | expiration to a no-expiration value. * keyedit.c (enable_disable_key): Comment. * import.c (import_one): When in interactive mode and --verbose, don't repeat some key information twice.
* * keydb.h, getkey.c (key_byname): Flag to enable or disable includingDavid Shaw2002-12-191-2/+2
| | | | | | | | | | | | | | | | | | disabled keys. Keys specified via keyid (i.e. 0x...) are always included. * getkey.c (get_pubkey_byname, get_seckey_byname2, get_seckey_bynames), keyedit.c (keyedit_menu, menu_addrevoker): Include disabled keys in these functions. * pkclist.c (build_pk_list): Do not include disabled keys for -r or the key prompt. Do include disabled keys for the default key and --encrypt-to. * trustdb.h, trustdb.c (is_disabled): New skipfnc for skipping disabled keys. * gpgv.c (is_disabled): Stub.
* * main.h, keyedit.c, keygen.c: Back out previous (2002-12-01) change.David Shaw2002-12-041-12/+4
| | | | | | | | | | | | | | | | | | | | Minimal isn't always best. * sign.c (update_keysig_packet): Use the current time rather then a modification of the original signature time. Make sure that this doesn't cause a time warp. * keygen.c (keygen_add_key_expire): Properly handle a key expiration date in the past (use a duration of 0). * keyedit.c (menu_expire): Use update_keysig_packet so any sig subpackets are maintained during the update. * build-packet.c (build_sig_subpkt): Mark sig expired or unexpired when the sig expiration subpacket is added. (build_sig_subpkt_from_sig): Handle making an expiration subpacket from a sig that has already expired (use a duration of 0).
* * packet.h, sign.c (update_keysig_packet), keyedit.cDavid Shaw2002-12-041-2/+2
| | | | | | (menu_set_primary_uid, menu_set_preferences): Add ability to issue 0x18 subkey binding sigs to update_keysig_packet and change all callers.
* * main.h, keylist.c (reorder_keyblock), keyedit.c (keyedit_menu): ReorderDavid Shaw2002-12-031-0/+1
| | | | | | | | | | | user ID display in the --edit-key menu to match that of the --list-keys display. * tdbio.c (tdbio_read_record, tdbio_write_record): Comments to reserve a byte for trust model in the devel version. * g10.c (add_notation_data): Fix initialization.
* * keyedit.c (menu_expire): Don't lose key flags when changing theDavid Shaw2002-12-011-1/+6
| | | | | | | | | | | | | | expiration date of a subkey. This is not the most optimal solution, but it is minimal change on the stable branch. * main.h, keygen.c (do_copy_key_flags): New function to copy key flags, if any, from one sig to another. (do_add_key_expire): New function to add key expiration to a sig. (keygen_copy_flags_add_expire): New version of keygen_add_key_expire that also copies key flags. (keygen_add_key_flags_and_expire): Use do_add_key_expire. * import.c (fix_hkp_corruption): Comment.
* * keyedit.c (show_key_with_all_names_colon): Make --with-colons --editDavid Shaw2002-11-131-14/+46
| | | | | | | | | | display match the validity and trust of --with-colons --list-keys. * passphrase.c (agent_send_all_options): Fix compile warning. * keylist.c (list_keyblock_colon): Validity for subkeys should match that of the primary key, and not that of the last user ID.
* * keyedit.c (show_key_with_all_names_colon): Don't stick nulls into theDavid Shaw2002-11-051-1/+1
| | | | | --with-colons listing.
* * keyedit.c (menu_addrevoker): Properly back out if the signature fails.David Shaw2002-10-111-0/+1
|
* * keyedit.c (menu_addrevoker): The direct key signature for revocationDavid Shaw2002-09-171-3/+33
| | | | | | keys must be at least v4 to carry the revocation key subpacket. Add a PGP 2.x warning for revocation keys.
* * g10.c (check_permissions): Rearrange strings to make translating easierDavid Shaw2002-09-151-4/+4
| | | | | | | | | (don't incorporate string parts). * keyedit.c (sign_uids): Make strings translatable. * sig-check.c (check_key_signature2): Make string translatable.
* * pkclist.c (build_pk_list): Fail if any recipient keys are unusable.David Shaw2002-08-301-1/+1
| | | | | | | | | * options.skel: The PGP LDAP keyserver is back. Use MIT keyserver as a sample rather than cryptnet as cryptnet does not support searching yet. * keyedit.c (show_key_with_all_names): Fix error message (preferences are userid/selfsig and not key specific).
* * keylist.c, keyedit.c, keyserver.c, sign.c: Some TODOs and comments.David Shaw2002-08-201-0/+3
| | | | | | | | | * export.c (do_export_stream): Fix noop bug in exporting sensitive revocation keys. * pkclist.c (do_edit_ownertrust): Comment out the option for showing trust paths until it can be implemented.
* * getkey.c (get_user_id_native): Renamed to ..Werner Koch2002-08-191-0/+68
| | | | | | | | | | | | (get_user_id_printable): this. Filter out all dangerous characters. Checked all usages. (get_user_id_string_native): Renamed to.. (get_user_id_string_printable): this. Filter out all dangerous characters. Checked all usages. * keyedit.c (show_basic_key_info): New. * keylist.c (print_fingerprint): New mode 3. * import.c (import_one): Use new function to display the user ID.
* * keyedit.c (menu_revsig): Properly show a uid is revoked withoutDavid Shaw2002-08-071-1/+4
| | | | | | | | | | | | | | | restarting gpg. This is Debian bug 124219, though their supplied patch will not do the right thing. * main.h, tdbio.c (tdbio_set_dbname), misc.c (removed check_permissions), keydb.c (keydb_add_resource), g10.c (main, check_permissions): Significant reworking of the permission check mechanism. The new behavior is to check everything in the homedir by checking the homedir itself. If the user wants to put (possibly shared) keyrings outside the homedir, they are not checked. The options file and any extension files are checked wherever they are, as well as their enclosing directories. This is Debian bug 147760.
* * keyedit.c (menu_revsig): Change "revsig" to honor selected uids so theDavid Shaw2002-07-251-7/+12
| | | | | | | | user can revoke sigs from particular uids only. * keylist.c (list_keyblock_print): Don't display expired uids in --list-keys unless -v and not --list-sigs (just like revoked uids).
* * exec.c, export.c, import.c, keyedit.c, keyserver.c, misc.c: "Warning" ->David Shaw2002-07-251-3/+3
| | | | | "WARNING"
* * keyedit.c (keyedit_menu, menu_addrevoker): Allow specifying "sensitive"David Shaw2002-07-191-4/+12
| | | | | | | | | | | as an argument to an addrevoker command. This sets the 0x40 sensitive revoker flag. * revoke.c (gen_desig_revoke): When generating a designated revocation, include the direct key sig that contains the designated revoker subpacket. This allows sensitive designated revocation subpackets to be exported. Also indicate which revokers are sensitive in the first place.
* * keyedit.c (show_key_with_all_names_colon): The 0x40 class bit in aDavid Shaw2002-07-171-2/+2
| | | | | | | | | | | | | designated revoker means "sensitive", not "local". It's exportable under the right circumstances. * main.h, options.h, export.c (do_export_stream), g10.c (main), hkp.c (hkp_export), keyserver.c (keyserver_spawn: Add a flag to skip attribute packets and their signatures while exporting. This is to accomodate keyservers (pksd again) that choke on attributes. Use keyserver-option "include-attributes" to control it. This defaults to ON (i.e. don't skip).
* Update head to match stable 1.0David Shaw2002-06-291-281/+1441
|
* See ChangeLog: Fri Oct 6 14:29:16 CEST 2000 Werner KochWerner Koch2000-10-061-18/+9
|
* See ChangeLog: Mon Sep 18 16:35:45 CEST 2000 Werner KochWerner Koch2000-09-181-1/+1
|
* See ChangeLog: Tue Jul 25 17:44:15 CEST 2000 Werner KochWerner Koch2000-07-251-1/+1
|
* See ChangeLog: Fri Jul 14 19:38:23 CEST 2000 Werner KochWerner Koch2000-07-141-63/+119
|