aboutsummaryrefslogtreecommitdiffstats
path: root/g10/keygen.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* * keydb.h, pkclist.c (select_algo_from_prefs): Allow passing a suggestedDavid Shaw2002-06-201-6/+1
| | | | | | | | | | | | | | | | | | | algorithm which will be used if available. * encode.c (encode_crypt, encrypt_filter), sign.c (sign_file): Use new select_algo_from_prefs feature to check if forcing an algorithm would violate the recipient preferences. * photoid.c (get_default_photo_command, show_photos): Use different default viewers on different platforms. Currently we have Win 9x, Win NT (2k, xp), Mac OSX, RISC OS, and "everybody else". These are #ifdefs as much as possible to avoid clutter. * g10.c (strusage, build_list), keyedit.c (show_prefs), main.h, misc.c (compress_algo_to_string, check_compress_algo), pkclist.c (algo_available), keygen.c (keygen_set_std_prefs): New algo_to_string and check functions for compress algorithms.
* * keygen.c (keygen_add_revkey): Remove unused code.David Shaw2002-06-151-3/+0
| | | | | | | | | | | | * misc.c (check_permissions): Check directory permissions properly - they are not special files. * pkclist.c (expand_id, expand_group, build_pk_list): When expanding groups before building a pk list, inherit flags from the original pre-expanded string. * pubkey-enc.c (is_algo_in_prefs): Don't use prefs from expired uids.
* * pkclist.c (expand_groups): Maintain the strlist flags while expanding.David Shaw2002-06-141-2/+0
| | | | | | | | | | Members of an expansion inherit their flags from the expansion key. * options.h, cipher.c (write_header), g10.c (main), keygen.c (keygen_set_std_prefs): remove the personal_mdc flag. It no longer serves a purpose now that the personal preference lists are split into cipher/digest/zip.
* * options.skel, options.h, main.h, keydb.h, pkclist.c (build_pk_list,David Shaw2002-06-071-22/+0
| | | | | | | | | | | | | | | | | | | expand_groups), g10.c (main, add_group): Add new "group" command to allow one name to expand into multiple keys. For simplicity, and to avoid potential loops, we only expand once - you can't make an alias that points to an alias. * main.h, g10.c (main), keygen.c (build_personal_digest_list): Simplify the default digest list - there is really no need for the other hashes since they will never be used after SHA-1 in the list. * options.skel, options.h, g10.c (main), hkp.c (hkp_ask_import, hkp_export, hkp_search), keyserver.c (parse_keyserver_options, parse_keyserver_uri, keyserver_work, keyserver_refresh): Make the "x-broken-hkp" keyserver scheme into keyserver-option "broken-http-proxy". Move honor_http_proxy into keyserver_options. Canonicalize the three variations of "hkp", "x-hkp", and "x-broken-hkp" into "hkp".
* * main.h, g10.c (main), keygen.c (build_personal_digest_list): Put in aDavid Shaw2002-06-061-31/+102
| | | | | | | | | | | | | | | | default digest preference list consisting of SHA-1, followed by every other installed digest except MD5. Note this is the same as having no digest preference at all except for SHA-1 being favored. * options.h, g10.c (main), keygen.c (keygen_set_std_prefs), pkclist.c (select_algo_from_prefs): Split --personal-preference-list into three: --personal-{cipher|digest|compress}-preferences. This allows a user to set one without affecting another (i.e. setting only a digest pref doesn't imply an empty cipher pref). * exec.c (exec_read): This is a safer way of guessing the return value of system(). Noted by Stefan Bellon.
* * keygen.c (keygen_set_std_prefs, add_feature_mdc): Use "mdc" and "no-mdc"David Shaw2002-05-291-14/+45
| | | | | | | | | | | | | | | | in the prefs string to allow switching on and off the MDC feature. This is needed to properly export a key from GnuPG for use on PGP which does not support MDC - without this, MDC-capable implementations will still try and generate MDCs which will break PGP. * keygen.c (keygen_get_std_prefs): Show "[mdc]" in prefs string if it is enabled. * options.h, g10.c (main), cipher.c (write_header), keygen.c (keygen_set_std_prefs): For consistency, allow the user to specify mdc/no-mdc in the --personal-preference-list. If disabled, it acts just like --disable-mdc.
* * options.h, main.h, keygen.c (keygen_set_set_prefs, keygen_get_std_prefs,David Shaw2002-05-221-5/+35
| | | | | | | | | | | | | | | | keygen_upd_std_prefs), keyedit.c (keyedit_menu), g10.c (main), pkclist.c (select_algo_from_prefs): Add --personal-preference-list which allows the user to factor in their own preferred algorithms when the preference lists are consulted. Obviously, this does not let the user violate a recepient's preferences (and the RFC) - this only influences the ranking of the agreed-on (and available) algorithms from the recepients. Suggested by David Hollenberg. * options.h, keygen.c (keygen_set_std_prefs), g10.c (main): Rename --preference-list to --default-preference-list (as that is what it really is), and make it a true default in that if the user selects "default" they get this list and not the compiled-in list.
* * main.h, keygen.c (keygen_add_revkey): Add revocation key subpackets to aDavid Shaw2002-05-161-2/+138
| | | | | | | | | | | | | | | | | | | | | | signature (callable by make_keysig_packet). (write_direct_sig): Write a 1F direct key signature. (parse_revocation_key): Parse a string in algo:fpr:sensitive format into a revocation key. (get_parameter_revkey, do_generate_keypair): Call above functions when prompted from a batch key generation file. * build-packet.c (build_sig_subpkt): Allow multiple revocation key subpackets in a single sig. * keydb.h, getkey.c (get_seckey_byfprint): Same as get_pubkey_byfprint, except for secret keys. We only know the fingerprint of a revocation key, so this is needed to retrieve the secret key needed to issue a revokation. * packet.h, parse-packet.c (parse_signature, parse_revkeys): Split revkey parsing off into a new function that can be used to reparse after manipulating the revkey list. * sign.c (make_keysig_packet): Ability to make 1F direct key signatures.
* * keygen.c (get_parameter_algo): Never allow generation of theWerner Koch2002-05-071-4/+20
| | | | | | | | deprecated RSA-E or RSA-S flavors of PGP RSA. (ask_algo): Allow generation of RSA sign and encrypt in expert mode. Don't allow ElGamal S+E unless in expert mode. * helptext.c: Added entry keygen.algo.rsa_se.
* Added a copyright year for files changed this year.Werner Koch2002-04-291-1/+1
|
* After generating a new key, show the key information (name, keyid,David Shaw2002-04-231-0/+2
| | | | | | | | | | | | fingerprint, etc.) Do not print uncheckable signatures (missing key..) in --check-sigs. Print statistics (N missing keys, etc.) after --check-sigs. When signing a key with an expiration date on it, the "Do you want your signature to expire at the same time?" question should default to YES
* po/Werner Koch2002-04-221-1/+1
| | | | | * et.po, tr.po, cs.po, it.po, id.po: Updated.
* * keygen.c (generate_subkeypair): 2440bis04 adds that creating subkeys onDavid Shaw2002-04-201-1/+3
| | | | | | | | | v3 keys is a MUST NOT. * getkey.c (finish_lookup): The --pgp6 "use the primary key" behavior should only apply while data signing and not encryption. Noted by Roger Sondermann.
* * parse-packet.c (parse_signature): Minor fix - signatures should expireDavid Shaw2002-04-141-1/+6
| | | | | | | | | | | | | | at their expiration time and not one second later. * keygen.c (proc_parameter_file): Allow specifying preferences string (i.e. "s5 s2 z1 z2", etc) in a batchmode key generation file. * keyedit.c (keyedit_menu): Print standard error message when signing a revoked key (no new translation). * getkey.c (merge_selfsigs): Get the default set of key prefs from the real (not attribute) primary uid.
* * build-packet.c (build_sig_subpkt): Delete subpackets from both hashedDavid Shaw2002-04-121-1/+12
| | | | | | | | | | | | | and unhashed area on update. (find_subpkt): No longer needed. * keyedit.c (sign_uids): With --pgp2 on, refuse to sign a v3 key with a v4 signature. As usual, --expert overrides. Try to tweak some strings to a closer match so they can all be translated in one place. Use different helptext keys to allow different help text for different questions. * keygen.c (keygen_upd_std_prefs): Remove preferences from both hashed and unhashed areas if they are not going to be used.
* Merged in my changes, after disk crash. Fortunately the CVS was notWerner Koch2002-04-081-7/+3
| | | | | | affected - but everything else and it seems that there is no backup of the BTS data is available :-(
* Fix ownertrust display with --with-colons.David Shaw2002-03-311-0/+1
| | | | | | | | | | | | | | | | | | | Properly initialize the user ID refcount for user and photo IDs. Tweak a few prompts to change "y/n" to "y/N", which is how most other prompts are written. Warn the user if they are about to revoke an expired sig (not a problem, but they should know). Control-d escapes the keyserver search prompt. If a subkey is considered revoked solely because the parent key is revoked, print the revocation reason from the parent key. Allow revocation/expiration to apply to a uid/key with no entry in the trustdb.
* More comments about when to use IDEA in keygen.cDavid Shaw2002-01-271-1/+6
| | | | | | | | | | When key signing with multiple keys at the same time, make sure each key gets the sigclass prompt Close the iobuf and FILE before trying to reap the child process to encourage the child to exit Disable cache-on-close of the fd iobuf (shouldn't all fd iobufs not be cached?)
* Cosmetic: don't present a RSA signing key as a "keypair" which can be 768David Shaw2002-01-231-3/+4
| | | | | | | bits long (as RSA minimum is 1024) Allow IDEA as a fake preference for v3 keys with v3 selfsigs when verifying that a cipher is in preferences while decrypting
* Some compatibility polish for PGP2. Add a fake IDEA preference for v3David Shaw2002-01-221-2/+9
| | | | | | | | keys (this is in the RFC), so that they can be (sometimes) used along OpenPGP keys. Do not force using IDEA on an OpenPGP key, as this may violate its prefs. Also, revise the help text for the sig class explanation.
* * passphrase.c (passphrase_to_dek): Add tryagain_text arg to beWerner Koch2002-01-201-4/+6
| | | | | | | | | | | | | | used with the agent. Changed all callers. (agent_get_passphrase): Likewise and send it to the agent * seckey-cert.c (do_check): New arg tryagain_text. (check_secret_key): Pass the string to do_check. * keygen.c (ask_passphrase): Set the error text is required. * keyedit.c (change_passphrase): Ditto. * passphrase.c (agent_open): Disable opt.use_agent in case of a problem with the agent. (agent_get_passphrase): Ditto. (passphrase_clear_cache): Ditto.
* Nonrevocable key signature support via "nrsign". These sigs can expire,David Shaw2001-12-211-2/+2
| | | | | but cannot be revoked. Any revocation certificates for them are ignored.
* Much stricter checking of the keyserver URIDavid Shaw2001-12-181-1/+1
| | | | | | | IDEA warning for pk messages encrypted with IDEA (symmetric is already done) Print IDEA warning for each occurance except for secret key protection and unknown cipher from an encrypted message.
* Add a generic IDEA warning for when the IDEA plugin is not present. ThisDavid Shaw2001-12-171-0/+2
| | | | | | | | pops up when the user uses "--cipher-algo idea", when setpref is used to set a "S1" preference, and when a secret key protected with IDEA is used. Tweak the --pgp2 mode to use this generic warning.
* Sig expiration codeDavid Shaw2001-12-071-17/+40
| | | | | | | Offer to expire a key signature when the key the user is signing expires Expired sigs cause an error return If --expert is set, prompt for sig duration
* Bug fix in "showpref"David Shaw2001-12-071-1/+1
| | | | | Allow setting a no-compression preference
* Revamped the trustDBWerner Koch2001-09-241-2/+13
|
* more bug fixesand some warning cleanupsWerner Koch2001-09-091-23/+23
|
* fixed a stupid C errorWerner Koch2001-09-071-0/+2
|
* Revamped the keyring codeWerner Koch2001-09-061-72/+56
|
* MDC feature support and other stuffWerner Koch2001-08-301-0/+28
|
* Added RSA key generationWerner Koch2001-08-141-42/+145
|
* Added a way to update preferencesWerner Koch2001-08-091-15/+148
|
* Fixes here and there.Werner Koch2001-08-081-6/+9
|
* Changed lsign behaviour, allow future subkeys, don't list revoked keysWerner Koch2001-08-011-2/+2
|
* Fix for toupper('I') != 'i'Werner Koch2001-06-121-6/+6
|
* About to release 1.0.6Werner Koch2001-05-291-0/+3
|
* Made genkey work again.Werner Koch2001-03-271-0/+7
|
* The "Samba" bug fixes :-)Werner Koch2001-03-221-3/+5
|
* Changed and added copyright noticesWerner Koch2001-03-081-1/+1
|
* Add KEY_CREATED statusWerner Koch2001-01-031-1/+8
|
* Minor changes done for the Windows binaryWerner Koch2000-10-231-4/+4
|
* Add Rijndael support, changes to fix an IRIX problem.Werner Koch2000-10-121-4/+5
|
* See ChangeLog: Fri Sep 15 18:40:36 CEST 2000 Werner KochWerner Koch2000-09-151-2/+2
|
* See ChangeLog: Wed Sep 6 17:55:47 CEST 2000 Werner KochWerner Koch2000-09-061-0/+2
|
* See ChangeLog: Wed Aug 23 19:52:51 CEST 2000 Werner KochWerner Koch2000-08-231-1/+5
|
* See ChangeLog: Wed Jun 28 11:54:44 CEST 2000 Werner KochWerner Koch2000-06-281-3/+102
|
* See ChangeLog: Fri Apr 14 19:37:08 CEST 2000 Werner KochWerner Koch2000-04-141-12/+22
|
* removed debugging codeWerner Koch2000-03-161-4/+1
|
* See ChangeLog: Thu Mar 16 16:20:23 CET 2000 Werner KochWerner Koch2000-03-161-1/+4
|