aboutsummaryrefslogtreecommitdiffstats
path: root/g10/keygen.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* * packet.h: Move some flags to a bitfield. Change all callers.David Shaw2005-11-101-2/+2
|
* * keygen.c (proc_parameter_file): Default key and subkey usage flags toDavid Shaw2005-10-261-7/+29
| | | | | | algo capabilities if parameter file doesn't specify them. Noted by Timo Schulz.
* Fixed minor card related bugs and enhanced status messagesWerner Koch2005-10-181-3/+7
|
* * keyedit.c (keyedit_menu, menu_backsign): New "backsign" command toDavid Shaw2005-10-141-1/+1
| | | | | | | | | add 0x19 backsigs to old keys that don't have them. * misc.c (parse_options): Fix build warning. * main.h, keygen.c (make_backsig): Make public.
* * getkey.c (merge_selfsigs_subkey), sig-check.c (signature_check2),David Shaw2005-10-111-14/+6
| | | | | | | keygen.c (make_backsig): Did some backsig interop testing with the PGP folks. All is well, so I'm turning generation of backsigs on for new keys. Checking for backsigs on verification is still off.
* * misc.c (openpgp_pk_algo_usage): Default to allowing CERT for signingDavid Shaw2005-08-271-7/+17
| | | | | | | | | | | | | | | | | algorithms. * keyedit.c (sign_uids): Don't request a signing key to make a certification. * keygen.c (do_add_key_flags): Force the certify flag on for all primary keys, as the spec requires primary keys must be able to certify (if nothing else, which key is going to issue the user ID signature?) (print_key_flags): Show certify flag. (ask_key_flags, ask_algo): Don't allow setting the C flag for subkeys. * keyid.c (usagestr_from_pk), getkey.c (parse_key_usage): Distinguish between a sign/certify key and a certify-only key.
* auto retrieve keys from PKA. Thsi allows to specify an email addressWerner Koch2005-08-051-7/+2
| | | | | | so that gpg can get the key from DNS. This helps with opportunistic encryption. No integration with the trust modell yet.
* * keygen.c (proc_parameter_file): Sanity check items in keygen batchDavid Shaw2005-08-051-98/+120
| | | | | file. Noted by Michael Schierl.
* * keygen.c (write_keyblock): Don't try and build deleted kbnodes sinceDavid Shaw2005-08-041-6/+12
| | | | | we start our tree with one.
* Revert bad patch.David Shaw2005-08-041-8/+1
|
* * keygen.c (start_tree): Need to use an actual packet type (which weDavid Shaw2005-08-041-1/+8
| | | | | can then delete) to start the tree.
* Implemented PKA trust modelWerner Koch2005-07-281-21/+0
|
* Converted all m_free to xfree etc.Werner Koch2005-07-271-113/+113
|
* * keygen.c (save_unprotected_key_to_card): Better fix for gcc4 warning.David Shaw2005-06-201-1/+1
|
* * keygen.c (save_unprotected_key_to_card): Fix gcc4 warning.David Shaw2005-06-141-1/+1
| | | | | | | | | | * options.h, import.c (parse_import_options, import_one): Add import-clean-uids option to automatically compact unusable uids when importing. Like import-clean-sigs, this may nodify the local keyring. * trustdb.c (clean_uids_from_key): Only allow selfsigs to be a candidate for re-inclusion.
* Updated FSF street address and preparations for a release candidate.Werner Koch2005-05-311-1/+2
|
* * cardglue.c (send_status_info): Make CTRL optional.Werner Koch2005-05-211-122/+50
| | | | | | | | | | | (agent_scd_writekey, inq_writekey_parms): New. (agent_openpgp_storekey): Removed. * cardglue.h: Add a few more error code mappings. * keygen.c (copy_mpi): Removed. (save_unprotected_key_to_card): Changed to use agent_scd_writekey. * app-common.h, app-openpgp.c, tlv.c, tlv.h: Updated from newer version in gnupg 1.9 CVS.
* * keygen.c (write_selfsigs): Rename from write_selfsig. Write the sameDavid Shaw2005-05-111-12/+16
| | | | | | | | | | | | | | | selfsig into both the pk and sk, so that someone importing their sk (which will get an autoconvert to the pk) won't end up with two selfsigs. (do_generate_keypair): Call it from here. * parse-packet.c (can_handle_critical_notation): New. Check for particular notation tags that we will accept when critical. Currently, that's only [email protected], since we know how to handle it (pass it through to a mail program). (can_handle_critical): Call it from here. (parse_one_sig_subpkt): Sanity check that notations are well-formed in that the internal lengths add up to the size of the subpacket.
* * main.h, keygen.c (parse_expire_string, ask_expire_interval), sign.cDavid Shaw2005-05-061-55/+52
| | | | | | | | (sign_file, clearsign_file, sign_symencrypt_file), g10.c (main), keyedit.c (sign_uids): Use seconds rather than days internally to calculate expiration. We no longer need the day-based code as we don't generate v3 keys.
* * keygen.c (start_tree): New function to "prime" a KBNODE list.David Shaw2005-05-051-26/+20
| | | | | | | | | | | | (do_generate_keypair): Use it here rather than creating and deleting a comment packet. * keygen.c (gen_elg, gen_dsa): Do not put public factors in secret key as a comment. * options.h, encode.c (encode_simple, encode_crypt), keygen.c (do_create): Remove disabled comment packet code.
* * keygen.c (keygen_set_std_prefs): Add SHA256 and BZip2 to defaultDavid Shaw2005-05-051-3/+19
| | | | | preferences.
* * options.h, g10.c (main): Add new --default-sig-expire andDavid Shaw2005-05-051-27/+47
| | | | | | | | | | | | --default-cert-expire options. Suggested by Florian Weimer. * main.h, keygen.c (parse_expire_string, ask_expire_interval): Use defaults passed in, or "0" to control what default expiration is. * keyedit.c (sign_uids), sign.c (sign_file, clearsign_file, sign_symencrypt_file): Call them here, so that default expiration is used when --ask-xxxxx-expire is off.
* (keygen_set_std_prefs): Explain the chosen order ofWerner Koch2005-04-011-1/+13
| | | | | AES key sizes.
* * cardglue.c (pin_cb): Disable debug output.Werner Koch2005-03-141-0/+16
| | | | | | | | * mk-w32-dist: Check for patch files. * w32installer.nsi: Translated a few more strings. Print a warning if permssions are not suitable for the installation. Add Uninstaller entries.
* * gpg.sgml: Add bkuptocard command for --edit-key.Werner Koch2005-02-151-2/+3
| | | | | | | | * passphrase.c (agent_get_passphrase): Don't call free_public_key if PK is NULL. (passphrase_clear_cache): Ditto. Removed debug output. (passphrase_to_dek): Ditto.
* * keygen.c (do_generate_keypair): Write the auth key to the cardDavid Shaw2005-02-011-11/+18
| | | | | | | | | before the encryption key. This is a partial workaround for a PGP bug (as of this writing, all versions including 8.1), that causes it to try and encrypt to the most recent subkey regardless of whether that subkey is actually an encryption type. In this case, the auth key is an RSA key so it succeeds.
* * keyid.c (keyid_from_sk, keyid_from_pk): Use 0xFFFFFFFFFFFFFFFFDavid Shaw2005-01-281-1/+1
| | | | | | | | | instead of 0x0000000000000000 for the invalid key ID since all-zeroes is reserved for the anonymous recipient. * keyedit.c (change_passphrase), keygen.c (generate_subkeypair): Fix a string ;)
* * keygen.c (generate_subkeypair): Detect primary key on-card andWerner Koch2005-01-271-9/+23
| | | | | | | | | | ask for the passphrase. Return an error if the primary key is a plain stub. * keyedit.c (change_passphrase): Don't ever change any stub key. Print a note if a key consists of only stub keys. Reported by Dany Nativel. These are bugs #401 and #402.
* (do_generate_keypair): Don't continue after an error;Werner Koch2005-01-251-2/+2
| | | | | | fixed at two places. Why at all didn't I used a goto to cleanup, tsss?
* * keyedit.c (menu_set_keyserver_url): Make sure we only operate on theDavid Shaw2004-12-211-3/+4
| | | | | | | | chosen selfsig so we don't accidentally promote an older selfsig to chosen. Discovered by Simon Josefsson and 'Todd'. * keygen.c (ask_expire_interval): Fix typo.
* (ask_expire_interval): For better translations chnage 2Werner Koch2004-12-201-7/+10
| | | | | strings.
* * keyedit.c (keyedit_menu): Invisible alias "passwd" as "password".David Shaw2004-12-201-1/+1
| | | | | | | | | | | * passphrase.c: Don't check for __CYGWIN__, so it is treated as a unix-like system. * options.h, g10.c (main), textfilter.c (standard): Use new option --rfc2440-text to determine whether to filter "<space>\t\r\n" or just "\r\n" before canonicalizing text line endings. Default to "<space>\t\r\n".
* * keygen.c (keygen_get_std_prefs): Set reference count when creating theDavid Shaw2004-12-191-0/+2
| | | | | | | | | | | | temporary user ID. * keyedit.c (keyedit_menu): Merge updpref and setpref. Keep updpref as an invisible alias. Add invisible alias for revphoto. Fix small memory leak when using "setpref" (not all of the uid was freed). (menu_revkey): Trigger a trust rebuild after revoking a key. Don't allow revoking an already-revoked whole key. (menu_revsubkey): Don't allow revoking an already-revoked subkey.
* * keygen.c (ask_algo): Add a choose-your-own-capabilities option for DSA.David Shaw2004-12-091-8/+15
|
* * keygen.c (ask_keysize): Change strings to always use %u instead ofDavid Shaw2004-12-071-57/+62
| | | | | | | hardcoding key sizes. Bump default to 2048. Bump minimum down to 512, where possible, but require --expert to get there. DSA is always 1024 unless --expert is given.
* * card-util.c, delkey.c, keygen.c, plaintext.c, keyedit.c, passphrase.c,David Shaw2004-10-281-1/+1
| | | | | | revoke.c: Collapse the two different "can't do that in batch mode" strings into one.
* * pkclist.c (do_edit_ownertrust): Add a note to translators.Werner Koch2004-10-151-0/+11
| | | | | | | * keygen.c (ask_user_id): Ditto. * helptext.c: Typo fix.
* another s/unsigned char*/byte*/Werner Koch2004-10-141-1/+1
|
* * misc.c (is_secured_filename): New.Werner Koch2004-10-141-6/+22
| | | | | | | | | | | | | | | | * keydb.c (maybe_create_keyring) * tdbio.c (tdbio_set_dbname) * plaintext.c (handle_plaintext) * openfile.c (copy_options_file, open_outfile) * exec.c (exec_write) * keygen.c (do_generate_keypair, gen_card_key_with_backup) * sign.c (sign_file, clearsign_file) * keyring.c (create_tmp_file, do_copy): Check for secured files before creating them. * keygen.c (print_status_key_created): s/unsigned char/byte/ due to a strange typedef for RISC OS. Noted by Stefan.
* Added SELInux hacks and did some cleanups.Werner Koch2004-10-131-0/+6
|
* * keygen.c (read_parameter_file): New keyword "Handle". This isWerner Koch2004-10-131-25/+59
| | | | | | | | | bug 287. (print_status_key_not_created): New. (print_status_key_created): Add new arg HANDLE. (do_generate_keypair): Print not created status. * status.c, tatus.h (STATUS_KEY_NOT_CREATED): New.
* (read_parameter_file): Changed to use iobuf based fileWerner Koch2004-10-121-18/+19
| | | | | reading to allow the special file name feature to work.
* * card-util.c, keyedit.c, openfile.c, pkclist.c, delkey.c, keygen.c,David Shaw2004-10-101-5/+6
| | | | | | photoid.c, revoke.c: Some yes-or-no prompts end in "(y/n)". Some don't. Consistently use y/n everywhere.
* * keygen.c (ask_key_flags): New. (ask_algo): Call it here in --expert modeDavid Shaw2004-10-101-30/+97
| | | | | so we don't need to specify each possible variation of RSA capabilities.
* * keygen.c (do_add_key_flags): The spec says that all primary keys MUST beDavid Shaw2004-10-101-6/+6
| | | | | | able to certify. Force the certify flag on for primaries (and off for subkeys).
* * keygen.c (generate_keypair): Fix generating keys with the auth flag.David Shaw2004-10-101-3/+4
|
* * main.h: Create S2K_DIGEST_ALGO macro so we do not need to always setDavid Shaw2004-09-241-5/+5
| | | | | | | | | | | opt.s2k_digest_algo. This helps fix a problem with PGP 2.x encrypted symmetric messages. Change all callers (encode.c, g10.c, keyedit.c, keygen.c, passphrase.c, sign.c). * armor.c, cardglue.c, getkey.c, import.c, keygen.c: Be consistent in some more quoted strings. Always use 'user ID', not 'user id', "quotes" for user IDs, etc.
* * keyedit.c (keyedit_menu), gpgv.c (agent_scd_getattr (stub)), keygen.cDavid Shaw2004-09-241-3/+4
| | | | | | (copy_mpi, generate_raw_key): Fix a compile problem and a few warnings when building without card support.
* Note: I have not fully tested the new key creation due to a pc/scWerner Koch2004-09-231-145/+530
| | | | | | | | | | | | | | | | | | | error. However the backupfile has been created successfully. * rsa.c (rsa_generate): Return the dummy list of factors only if the caller asked for it. * card_util.c (generate_card_keys): ask whether backup should be created. (card_store_subkey): Factored some code out to .. * keygen.c (save_unprotected_key_to_card): .. new function. (gen_card_key_with_backup): New. (generate_raw_key): New. (generate_keypair): New arg BACKUP_ENCRYPTION_DIR. Changed all callers. (do_generate_keypair): Divert to gen_card_key_with_backup when desired.
* * gpg.sgml: Document "addcardkey" and "keytocard".Werner Koch2004-09-231-0/+28
| | | | | | | | | | | | | | | | | | | | * apdu.c (open_pcsc_reader): Do not print empty reader string. * keygen.c (ask_algo): Allow creation of AUTH keys. * keyid.c (usagestr_from_pk): New. * app-openpgp.c (app_openpgp_storekey): Call flush_cache. * keyedit.c (keyedit_menu): New command "keytocard" (keyedit_menu): Bad hack for the not_with_sk element. (show_key_with_all_names): Print the usage. (find_pk_from_sknode): New. * card-util.c (card_store_subkey): New. (copy_mpi): New. * cardglue.c (agent_openpgp_storekey): New.