aboutsummaryrefslogtreecommitdiffstats
path: root/g10/keygen.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2002-06-20* keydb.h, pkclist.c (select_algo_from_prefs): Allow passing a suggestedDavid Shaw1-6/+1
algorithm which will be used if available. * encode.c (encode_crypt, encrypt_filter), sign.c (sign_file): Use new select_algo_from_prefs feature to check if forcing an algorithm would violate the recipient preferences. * photoid.c (get_default_photo_command, show_photos): Use different default viewers on different platforms. Currently we have Win 9x, Win NT (2k, xp), Mac OSX, RISC OS, and "everybody else". These are #ifdefs as much as possible to avoid clutter. * g10.c (strusage, build_list), keyedit.c (show_prefs), main.h, misc.c (compress_algo_to_string, check_compress_algo), pkclist.c (algo_available), keygen.c (keygen_set_std_prefs): New algo_to_string and check functions for compress algorithms.
2002-06-15* keygen.c (keygen_add_revkey): Remove unused code.David Shaw1-3/+0
* misc.c (check_permissions): Check directory permissions properly - they are not special files. * pkclist.c (expand_id, expand_group, build_pk_list): When expanding groups before building a pk list, inherit flags from the original pre-expanded string. * pubkey-enc.c (is_algo_in_prefs): Don't use prefs from expired uids.
2002-06-14* pkclist.c (expand_groups): Maintain the strlist flags while expanding.David Shaw1-2/+0
Members of an expansion inherit their flags from the expansion key. * options.h, cipher.c (write_header), g10.c (main), keygen.c (keygen_set_std_prefs): remove the personal_mdc flag. It no longer serves a purpose now that the personal preference lists are split into cipher/digest/zip.
2002-06-07* options.skel, options.h, main.h, keydb.h, pkclist.c (build_pk_list,David Shaw1-22/+0
expand_groups), g10.c (main, add_group): Add new "group" command to allow one name to expand into multiple keys. For simplicity, and to avoid potential loops, we only expand once - you can't make an alias that points to an alias. * main.h, g10.c (main), keygen.c (build_personal_digest_list): Simplify the default digest list - there is really no need for the other hashes since they will never be used after SHA-1 in the list. * options.skel, options.h, g10.c (main), hkp.c (hkp_ask_import, hkp_export, hkp_search), keyserver.c (parse_keyserver_options, parse_keyserver_uri, keyserver_work, keyserver_refresh): Make the "x-broken-hkp" keyserver scheme into keyserver-option "broken-http-proxy". Move honor_http_proxy into keyserver_options. Canonicalize the three variations of "hkp", "x-hkp", and "x-broken-hkp" into "hkp".
2002-06-06* main.h, g10.c (main), keygen.c (build_personal_digest_list): Put in aDavid Shaw1-31/+102
default digest preference list consisting of SHA-1, followed by every other installed digest except MD5. Note this is the same as having no digest preference at all except for SHA-1 being favored. * options.h, g10.c (main), keygen.c (keygen_set_std_prefs), pkclist.c (select_algo_from_prefs): Split --personal-preference-list into three: --personal-{cipher|digest|compress}-preferences. This allows a user to set one without affecting another (i.e. setting only a digest pref doesn't imply an empty cipher pref). * exec.c (exec_read): This is a safer way of guessing the return value of system(). Noted by Stefan Bellon.
2002-05-29* keygen.c (keygen_set_std_prefs, add_feature_mdc): Use "mdc" and "no-mdc"David Shaw1-14/+45
in the prefs string to allow switching on and off the MDC feature. This is needed to properly export a key from GnuPG for use on PGP which does not support MDC - without this, MDC-capable implementations will still try and generate MDCs which will break PGP. * keygen.c (keygen_get_std_prefs): Show "[mdc]" in prefs string if it is enabled. * options.h, g10.c (main), cipher.c (write_header), keygen.c (keygen_set_std_prefs): For consistency, allow the user to specify mdc/no-mdc in the --personal-preference-list. If disabled, it acts just like --disable-mdc.
2002-05-22* options.h, main.h, keygen.c (keygen_set_set_prefs, keygen_get_std_prefs,David Shaw1-5/+35
keygen_upd_std_prefs), keyedit.c (keyedit_menu), g10.c (main), pkclist.c (select_algo_from_prefs): Add --personal-preference-list which allows the user to factor in their own preferred algorithms when the preference lists are consulted. Obviously, this does not let the user violate a recepient's preferences (and the RFC) - this only influences the ranking of the agreed-on (and available) algorithms from the recepients. Suggested by David Hollenberg. * options.h, keygen.c (keygen_set_std_prefs), g10.c (main): Rename --preference-list to --default-preference-list (as that is what it really is), and make it a true default in that if the user selects "default" they get this list and not the compiled-in list.
2002-05-16* main.h, keygen.c (keygen_add_revkey): Add revocation key subpackets to aDavid Shaw1-2/+138
signature (callable by make_keysig_packet). (write_direct_sig): Write a 1F direct key signature. (parse_revocation_key): Parse a string in algo:fpr:sensitive format into a revocation key. (get_parameter_revkey, do_generate_keypair): Call above functions when prompted from a batch key generation file. * build-packet.c (build_sig_subpkt): Allow multiple revocation key subpackets in a single sig. * keydb.h, getkey.c (get_seckey_byfprint): Same as get_pubkey_byfprint, except for secret keys. We only know the fingerprint of a revocation key, so this is needed to retrieve the secret key needed to issue a revokation. * packet.h, parse-packet.c (parse_signature, parse_revkeys): Split revkey parsing off into a new function that can be used to reparse after manipulating the revkey list. * sign.c (make_keysig_packet): Ability to make 1F direct key signatures.
2002-05-07* keygen.c (get_parameter_algo): Never allow generation of theWerner Koch1-4/+20
deprecated RSA-E or RSA-S flavors of PGP RSA. (ask_algo): Allow generation of RSA sign and encrypt in expert mode. Don't allow ElGamal S+E unless in expert mode. * helptext.c: Added entry keygen.algo.rsa_se.
2002-04-29Added a copyright year for files changed this year.Werner Koch1-1/+1
2002-04-23After generating a new key, show the key information (name, keyid,David Shaw1-0/+2
fingerprint, etc.) Do not print uncheckable signatures (missing key..) in --check-sigs. Print statistics (N missing keys, etc.) after --check-sigs. When signing a key with an expiration date on it, the "Do you want your signature to expire at the same time?" question should default to YES
2002-04-22po/Werner Koch1-1/+1
* et.po, tr.po, cs.po, it.po, id.po: Updated.
2002-04-20* keygen.c (generate_subkeypair): 2440bis04 adds that creating subkeys onDavid Shaw1-1/+3
v3 keys is a MUST NOT. * getkey.c (finish_lookup): The --pgp6 "use the primary key" behavior should only apply while data signing and not encryption. Noted by Roger Sondermann.
2002-04-14* parse-packet.c (parse_signature): Minor fix - signatures should expireDavid Shaw1-1/+6
at their expiration time and not one second later. * keygen.c (proc_parameter_file): Allow specifying preferences string (i.e. "s5 s2 z1 z2", etc) in a batchmode key generation file. * keyedit.c (keyedit_menu): Print standard error message when signing a revoked key (no new translation). * getkey.c (merge_selfsigs): Get the default set of key prefs from the real (not attribute) primary uid.
2002-04-12* build-packet.c (build_sig_subpkt): Delete subpackets from both hashedDavid Shaw1-1/+12
and unhashed area on update. (find_subpkt): No longer needed. * keyedit.c (sign_uids): With --pgp2 on, refuse to sign a v3 key with a v4 signature. As usual, --expert overrides. Try to tweak some strings to a closer match so they can all be translated in one place. Use different helptext keys to allow different help text for different questions. * keygen.c (keygen_upd_std_prefs): Remove preferences from both hashed and unhashed areas if they are not going to be used.
2002-04-08Merged in my changes, after disk crash. Fortunately the CVS was notWerner Koch1-7/+3
affected - but everything else and it seems that there is no backup of the BTS data is available :-(
2002-03-31Fix ownertrust display with --with-colons.David Shaw1-0/+1
Properly initialize the user ID refcount for user and photo IDs. Tweak a few prompts to change "y/n" to "y/N", which is how most other prompts are written. Warn the user if they are about to revoke an expired sig (not a problem, but they should know). Control-d escapes the keyserver search prompt. If a subkey is considered revoked solely because the parent key is revoked, print the revocation reason from the parent key. Allow revocation/expiration to apply to a uid/key with no entry in the trustdb.
2002-01-27More comments about when to use IDEA in keygen.cDavid Shaw1-1/+6
When key signing with multiple keys at the same time, make sure each key gets the sigclass prompt Close the iobuf and FILE before trying to reap the child process to encourage the child to exit Disable cache-on-close of the fd iobuf (shouldn't all fd iobufs not be cached?)
2002-01-23Cosmetic: don't present a RSA signing key as a "keypair" which can be 768David Shaw1-3/+4
bits long (as RSA minimum is 1024) Allow IDEA as a fake preference for v3 keys with v3 selfsigs when verifying that a cipher is in preferences while decrypting
2002-01-22Some compatibility polish for PGP2. Add a fake IDEA preference for v3David Shaw1-2/+9
keys (this is in the RFC), so that they can be (sometimes) used along OpenPGP keys. Do not force using IDEA on an OpenPGP key, as this may violate its prefs. Also, revise the help text for the sig class explanation.
2002-01-20* passphrase.c (passphrase_to_dek): Add tryagain_text arg to beWerner Koch1-4/+6
used with the agent. Changed all callers. (agent_get_passphrase): Likewise and send it to the agent * seckey-cert.c (do_check): New arg tryagain_text. (check_secret_key): Pass the string to do_check. * keygen.c (ask_passphrase): Set the error text is required. * keyedit.c (change_passphrase): Ditto. * passphrase.c (agent_open): Disable opt.use_agent in case of a problem with the agent. (agent_get_passphrase): Ditto. (passphrase_clear_cache): Ditto.
2001-12-21Nonrevocable key signature support via "nrsign". These sigs can expire,David Shaw1-2/+2
but cannot be revoked. Any revocation certificates for them are ignored.
2001-12-18Much stricter checking of the keyserver URIDavid Shaw1-1/+1
IDEA warning for pk messages encrypted with IDEA (symmetric is already done) Print IDEA warning for each occurance except for secret key protection and unknown cipher from an encrypted message.
2001-12-17Add a generic IDEA warning for when the IDEA plugin is not present. ThisDavid Shaw1-0/+2
pops up when the user uses "--cipher-algo idea", when setpref is used to set a "S1" preference, and when a secret key protected with IDEA is used. Tweak the --pgp2 mode to use this generic warning.
2001-12-07Sig expiration codeDavid Shaw1-17/+40
Offer to expire a key signature when the key the user is signing expires Expired sigs cause an error return If --expert is set, prompt for sig duration
2001-12-07Bug fix in "showpref"David Shaw1-1/+1
Allow setting a no-compression preference
2001-09-24Revamped the trustDBWerner Koch1-2/+13
2001-09-09more bug fixesand some warning cleanupsWerner Koch1-23/+23
2001-09-07fixed a stupid C errorWerner Koch1-0/+2
2001-09-06Revamped the keyring codeWerner Koch1-72/+56
2001-08-30MDC feature support and other stuffWerner Koch1-0/+28
2001-08-14Added RSA key generationWerner Koch1-42/+145
2001-08-09Added a way to update preferencesWerner Koch1-15/+148
2001-08-08Fixes here and there.Werner Koch1-6/+9
2001-08-01Changed lsign behaviour, allow future subkeys, don't list revoked keysWerner Koch1-2/+2
2001-06-12Fix for toupper('I') != 'i'Werner Koch1-6/+6
2001-05-29About to release 1.0.6Werner Koch1-0/+3
2001-03-27Made genkey work again.Werner Koch1-0/+7
2001-03-22The "Samba" bug fixes :-)Werner Koch1-3/+5
2001-03-08Changed and added copyright noticesWerner Koch1-1/+1
2001-01-03Add KEY_CREATED statusWerner Koch1-1/+8
2000-10-23Minor changes done for the Windows binaryWerner Koch1-4/+4
2000-10-12Add Rijndael support, changes to fix an IRIX problem.Werner Koch1-4/+5
2000-09-15See ChangeLog: Fri Sep 15 18:40:36 CEST 2000 Werner KochWerner Koch1-2/+2
2000-09-06See ChangeLog: Wed Sep 6 17:55:47 CEST 2000 Werner KochWerner Koch1-0/+2
2000-08-23See ChangeLog: Wed Aug 23 19:52:51 CEST 2000 Werner KochWerner Koch1-1/+5
2000-06-28See ChangeLog: Wed Jun 28 11:54:44 CEST 2000 Werner KochWerner Koch1-3/+102
2000-04-14See ChangeLog: Fri Apr 14 19:37:08 CEST 2000 Werner KochWerner Koch1-12/+22
2000-03-16removed debugging codeWerner Koch1-4/+1
2000-03-16See ChangeLog: Thu Mar 16 16:20:23 CET 2000 Werner KochWerner Koch1-1/+4