aboutsummaryrefslogtreecommitdiffstats
path: root/g10/keygen.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2006-06-10* keygen.c (gen_card_key): Add optional argument to return a pointerDavid Shaw1-8/+13
(not a copy) of the stub secret key for the secret key we just generated on the card. (generate_card_subkeypair): Use it here so that the signing key on the card can use the card to generate the 0x19 backsig on the primary key. Noted by Janko Heilgeist and Jonas Oberg.
2006-05-25* keygen.c (gen_dsa): Allow generating DSA2 keys (allow specifying sizes >David Shaw1-21/+56
1024 when --enable-dsa2 is set). The size of q is set automatically based on the key size. (ask_keysize, generate_keypair): Ask for DSA size when --enable-dsa2 is set.
2006-05-24Still making gpg2 work.Werner Koch1-2/+2
At least the keyids are now correctly computed again.
2006-05-23g10/ does build again.Werner Koch1-3/+4
2006-05-23* parse-packet.c (dump_sig_subpkt, parse_signature), build-packet.cDavid Shaw1-1/+1
(build_sig_subpkt_from_sig), getkey.c (fixup_uidnode, merge_selfsigs_main, merge_selfsigs_subkey), keygen.c (keygen_add_key_expire): Fix meaning of key expiration and sig expiration subpackets - zero means "never expire" according to 2440, not "expire instantly".
2006-04-28Merged recent changes from 1.4Werner Koch1-5/+5
2006-04-19Continued with merging.Werner Koch1-14/+16
Still does not build.
2006-04-19Merged with gpg 1.4.3 code. Werner Koch1-1037/+1940
The gpg part does not yet build.
2006-03-09* packet.h, build-packet.c (sig_to_notation), keygen.cDavid Shaw1-2/+4
(keygen_add_notations): Provide printable text for non-human-readable notation values.
2006-03-08* packet.h, build-packet.c (sig_to_notation), keygen.cDavid Shaw1-1/+4
(keygen_add_notations): Tweak to handle non-human-readable notation values.
2006-03-08* options.h, sign.c (mk_notation_policy_etc), gpg.c (add_notation_data):David Shaw1-2/+46
Use it here for the various notation commands. * packet.h, main.h, keygen.c (keygen_add_notations), build-packet.c (string_to_notation, sig_to_notation) (free_notation): New "one stop shopping" functions to handle notations and start removing some code duplication.
2005-11-10* packet.h: Move some flags to a bitfield. Change all callers.David Shaw1-2/+2
2005-10-26* keygen.c (proc_parameter_file): Default key and subkey usage flags toDavid Shaw1-7/+29
algo capabilities if parameter file doesn't specify them. Noted by Timo Schulz.
2005-10-18Fixed minor card related bugs and enhanced status messagesWerner Koch1-3/+7
2005-10-14* keyedit.c (keyedit_menu, menu_backsign): New "backsign" command toDavid Shaw1-1/+1
add 0x19 backsigs to old keys that don't have them. * misc.c (parse_options): Fix build warning. * main.h, keygen.c (make_backsig): Make public.
2005-10-11* getkey.c (merge_selfsigs_subkey), sig-check.c (signature_check2),David Shaw1-14/+6
keygen.c (make_backsig): Did some backsig interop testing with the PGP folks. All is well, so I'm turning generation of backsigs on for new keys. Checking for backsigs on verification is still off.
2005-08-27* misc.c (openpgp_pk_algo_usage): Default to allowing CERT for signingDavid Shaw1-7/+17
algorithms. * keyedit.c (sign_uids): Don't request a signing key to make a certification. * keygen.c (do_add_key_flags): Force the certify flag on for all primary keys, as the spec requires primary keys must be able to certify (if nothing else, which key is going to issue the user ID signature?) (print_key_flags): Show certify flag. (ask_key_flags, ask_algo): Don't allow setting the C flag for subkeys. * keyid.c (usagestr_from_pk), getkey.c (parse_key_usage): Distinguish between a sign/certify key and a certify-only key.
2005-08-05auto retrieve keys from PKA. Thsi allows to specify an email addressWerner Koch1-7/+2
so that gpg can get the key from DNS. This helps with opportunistic encryption. No integration with the trust modell yet.
2005-08-05* keygen.c (proc_parameter_file): Sanity check items in keygen batchDavid Shaw1-98/+120
file. Noted by Michael Schierl.
2005-08-04* keygen.c (write_keyblock): Don't try and build deleted kbnodes sinceDavid Shaw1-6/+12
we start our tree with one.
2005-08-04Revert bad patch.David Shaw1-8/+1
2005-08-04* keygen.c (start_tree): Need to use an actual packet type (which weDavid Shaw1-1/+8
can then delete) to start the tree.
2005-07-28Implemented PKA trust modelWerner Koch1-21/+0
2005-07-27Converted all m_free to xfree etc.Werner Koch1-113/+113
2005-06-20* keygen.c (save_unprotected_key_to_card): Better fix for gcc4 warning.David Shaw1-1/+1
2005-06-14* keygen.c (save_unprotected_key_to_card): Fix gcc4 warning.David Shaw1-1/+1
* options.h, import.c (parse_import_options, import_one): Add import-clean-uids option to automatically compact unusable uids when importing. Like import-clean-sigs, this may nodify the local keyring. * trustdb.c (clean_uids_from_key): Only allow selfsigs to be a candidate for re-inclusion.
2005-05-31Updated FSF street address and preparations for a release candidate.Werner Koch1-1/+2
2005-05-21* cardglue.c (send_status_info): Make CTRL optional.Werner Koch1-122/+50
(agent_scd_writekey, inq_writekey_parms): New. (agent_openpgp_storekey): Removed. * cardglue.h: Add a few more error code mappings. * keygen.c (copy_mpi): Removed. (save_unprotected_key_to_card): Changed to use agent_scd_writekey. * app-common.h, app-openpgp.c, tlv.c, tlv.h: Updated from newer version in gnupg 1.9 CVS.
2005-05-11* keygen.c (write_selfsigs): Rename from write_selfsig. Write the sameDavid Shaw1-12/+16
selfsig into both the pk and sk, so that someone importing their sk (which will get an autoconvert to the pk) won't end up with two selfsigs. (do_generate_keypair): Call it from here. * parse-packet.c (can_handle_critical_notation): New. Check for particular notation tags that we will accept when critical. Currently, that's only [email protected], since we know how to handle it (pass it through to a mail program). (can_handle_critical): Call it from here. (parse_one_sig_subpkt): Sanity check that notations are well-formed in that the internal lengths add up to the size of the subpacket.
2005-05-06* main.h, keygen.c (parse_expire_string, ask_expire_interval), sign.cDavid Shaw1-55/+52
(sign_file, clearsign_file, sign_symencrypt_file), g10.c (main), keyedit.c (sign_uids): Use seconds rather than days internally to calculate expiration. We no longer need the day-based code as we don't generate v3 keys.
2005-05-05* keygen.c (start_tree): New function to "prime" a KBNODE list.David Shaw1-26/+20
(do_generate_keypair): Use it here rather than creating and deleting a comment packet. * keygen.c (gen_elg, gen_dsa): Do not put public factors in secret key as a comment. * options.h, encode.c (encode_simple, encode_crypt), keygen.c (do_create): Remove disabled comment packet code.
2005-05-05* keygen.c (keygen_set_std_prefs): Add SHA256 and BZip2 to defaultDavid Shaw1-3/+19
preferences.
2005-05-05* options.h, g10.c (main): Add new --default-sig-expire andDavid Shaw1-27/+47
--default-cert-expire options. Suggested by Florian Weimer. * main.h, keygen.c (parse_expire_string, ask_expire_interval): Use defaults passed in, or "0" to control what default expiration is. * keyedit.c (sign_uids), sign.c (sign_file, clearsign_file, sign_symencrypt_file): Call them here, so that default expiration is used when --ask-xxxxx-expire is off.
2005-04-01(keygen_set_std_prefs): Explain the chosen order ofWerner Koch1-1/+13
AES key sizes.
2005-03-14* cardglue.c (pin_cb): Disable debug output.Werner Koch1-0/+16
* mk-w32-dist: Check for patch files. * w32installer.nsi: Translated a few more strings. Print a warning if permssions are not suitable for the installation. Add Uninstaller entries.
2005-02-15* gpg.sgml: Add bkuptocard command for --edit-key.Werner Koch1-2/+3
* passphrase.c (agent_get_passphrase): Don't call free_public_key if PK is NULL. (passphrase_clear_cache): Ditto. Removed debug output. (passphrase_to_dek): Ditto.
2005-02-01* keygen.c (do_generate_keypair): Write the auth key to the cardDavid Shaw1-11/+18
before the encryption key. This is a partial workaround for a PGP bug (as of this writing, all versions including 8.1), that causes it to try and encrypt to the most recent subkey regardless of whether that subkey is actually an encryption type. In this case, the auth key is an RSA key so it succeeds.
2005-01-28* keyid.c (keyid_from_sk, keyid_from_pk): Use 0xFFFFFFFFFFFFFFFFDavid Shaw1-1/+1
instead of 0x0000000000000000 for the invalid key ID since all-zeroes is reserved for the anonymous recipient. * keyedit.c (change_passphrase), keygen.c (generate_subkeypair): Fix a string ;)
2005-01-27* keygen.c (generate_subkeypair): Detect primary key on-card andWerner Koch1-9/+23
ask for the passphrase. Return an error if the primary key is a plain stub. * keyedit.c (change_passphrase): Don't ever change any stub key. Print a note if a key consists of only stub keys. Reported by Dany Nativel. These are bugs #401 and #402.
2005-01-25(do_generate_keypair): Don't continue after an error;Werner Koch1-2/+2
fixed at two places. Why at all didn't I used a goto to cleanup, tsss?
2004-12-21* keyedit.c (menu_set_keyserver_url): Make sure we only operate on theDavid Shaw1-3/+4
chosen selfsig so we don't accidentally promote an older selfsig to chosen. Discovered by Simon Josefsson and 'Todd'. * keygen.c (ask_expire_interval): Fix typo.
2004-12-20(ask_expire_interval): For better translations chnage 2Werner Koch1-7/+10
strings.
2004-12-20* keyedit.c (keyedit_menu): Invisible alias "passwd" as "password".David Shaw1-1/+1
* passphrase.c: Don't check for __CYGWIN__, so it is treated as a unix-like system. * options.h, g10.c (main), textfilter.c (standard): Use new option --rfc2440-text to determine whether to filter "<space>\t\r\n" or just "\r\n" before canonicalizing text line endings. Default to "<space>\t\r\n".
2004-12-19* keygen.c (keygen_get_std_prefs): Set reference count when creating theDavid Shaw1-0/+2
temporary user ID. * keyedit.c (keyedit_menu): Merge updpref and setpref. Keep updpref as an invisible alias. Add invisible alias for revphoto. Fix small memory leak when using "setpref" (not all of the uid was freed). (menu_revkey): Trigger a trust rebuild after revoking a key. Don't allow revoking an already-revoked whole key. (menu_revsubkey): Don't allow revoking an already-revoked subkey.
2004-12-09* keygen.c (ask_algo): Add a choose-your-own-capabilities option for DSA.David Shaw1-8/+15
2004-12-07* keygen.c (ask_keysize): Change strings to always use %u instead ofDavid Shaw1-57/+62
hardcoding key sizes. Bump default to 2048. Bump minimum down to 512, where possible, but require --expert to get there. DSA is always 1024 unless --expert is given.
2004-10-28* card-util.c, delkey.c, keygen.c, plaintext.c, keyedit.c, passphrase.c,David Shaw1-1/+1
revoke.c: Collapse the two different "can't do that in batch mode" strings into one.
2004-10-15* pkclist.c (do_edit_ownertrust): Add a note to translators.Werner Koch1-0/+11
* keygen.c (ask_user_id): Ditto. * helptext.c: Typo fix.
2004-10-14another s/unsigned char*/byte*/Werner Koch1-1/+1
2004-10-14* misc.c (is_secured_filename): New.Werner Koch1-6/+22
* keydb.c (maybe_create_keyring) * tdbio.c (tdbio_set_dbname) * plaintext.c (handle_plaintext) * openfile.c (copy_options_file, open_outfile) * exec.c (exec_write) * keygen.c (do_generate_keypair, gen_card_key_with_backup) * sign.c (sign_file, clearsign_file) * keyring.c (create_tmp_file, do_copy): Check for secured files before creating them. * keygen.c (print_status_key_created): s/unsigned char/byte/ due to a strange typedef for RISC OS. Noted by Stefan.