aboutsummaryrefslogtreecommitdiffstats
path: root/g10/keygen.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Use inline functions to convert buffer data to scalars.Werner Koch2015-02-121-8/+6
| | | | | | | | | | | | | | | | * include/host2net.h (buf16_to_ulong, buf16_to_uint): New. (buf16_to_ushort, buf16_to_u16): New. (buf32_to_size_t, buf32_to_ulong, buf32_to_uint, buf32_to_u32): New. -- This fixes sign extension on shift problems. Hanno Böck found a case with an invalid read due to this problem. To fix that almost all uses of "<< 24" and "<< 8" are changed by this patch to use an inline function from host2net.h. (back ported from commit 2183683bd633818dd031b090b5530951de76f392) Signed-off-by: Werner Koch <[email protected]>
* gpg: Allow predefined names as answer to the keygen.algo prompt.Werner Koch2015-01-281-10/+12
| | | | | | | | * g10/keygen.c (ask_algo): Add list of strings. -- Signed-off-by: Werner Koch <[email protected]> (backported from commit b1d5ed6ac842469afcb84868d0f6641dc286a6c7)
* gpg: release DEK soon after its use.NIIBE Yutaka2014-12-121-1/+1
| | | | | | | | | | | | | | | | * g10/keygen.c (generate_subkeypair): Release DEK soon. -- This fixes the out_of_core error in the test case of adding RSA-4096 subkey to RSA-4096 primary key with configuration: s2k-cipher-algo S10 Debian-bug-id: 772780 Cherry-picked da66ad5bba4215b9ddd0cb927a89aa75355632aa from STABLE-BRANCH-1-4 branch.
* gpg: Add build and runtime support for larger RSA keysDaniel Kahn Gillmor2014-10-031-2/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | * configure.ac: Added --enable-large-secmem option. * g10/options.h: Add opt.flags.large_rsa. * g10/gpg.c: Contingent on configure option: adjust secmem size, add gpg --enable-large-rsa, bound to opt.flags.large_rsa. * g10/keygen.c: Adjust max RSA size based on opt.flags.large_rsa * doc/gpg.texi: Document --enable-large-rsa. -- This is a cherry-pick of 534e2876acc05f9f8d9b54c18511fe768d77dfb5 from STABLE-BRANCH-1-4 against STABLE-BRANCH-2-0 Some older implementations built and used RSA keys up to 16Kib, but the larger secret keys now fail when used by more recent GnuPG, due to secure memory limitations. Building with ./configure --enable-large-secmem will make gpg capable of working with those secret keys, as well as permitting the use of a new gpg option --enable-large-rsa, which let gpg generate RSA keys up to 8Kib when used with --batch --gen-key. Debian-bug-id: 739424 Minor edits by wk. GnuPG-bug-id: 1732
* gpg: Add shortcut for setting key capabilities.Werner Koch2014-09-261-1/+17
| | | | | * g10/keygen.c (ask_key_flags): Add shortcut '='. * doc/help.txt (gpg.keygen.flags): New.
* gpg: Limit keysize for unattended key generation to useful values.Werner Koch2014-06-271-2/+12
| | | | | | | | | | | | | * g10/keygen.c (gen_elg): Enforce keysize 1024 to 4096. (gen_rsa): Enforce keysize 1024 to 4096. (gen_dsa): Enforce keysize 768 to 3072. -- It was possible to create 16k RSA keys in batch mode. In addition to the silliness of such keys, they have the major drawback that under GnuPG and Libgcrypt, with their limited amount of specially secured memory areas, the use of such keys may lead to an "out of secure memory" condition.
* gpg: Fix glitch entering a full expiration time.Werner Koch2014-06-031-1/+2
| | | | | | | | | | | * g10/keygen.c (ask_expire_interval): Get the current time after the prompt. -- This almost avoid that an entered full ISO timestamp is not used as given but off by the time the user required to enter the timestamp. GnuPG-bug-id: 1639
* gpg: Fix --version output and explicitly disable ECC.Werner Koch2013-10-111-3/+3
| | | | | | | | | | | | | | | | | | | * g10/misc.c (openpgp_pk_algo_name): New. Replace all calls in g10/ to gcry_pk_algo_name by a call to this function. (map_pk_openpgp_to_gcry): Map algo PUBKEY_ALGO_ELGAMAL_E to GCRY_PK_ELG. (openpgp_pk_test_algo): Use PUBKEY_ALGO_ELGAMAL_E instead of GCRY_PK_ELG_E. Return an error for ECC algos. (openpgp_pk_test_algo2): Return an error for ECC algos. * g10/gpg.c (build_list): Avoid printing ECC two times. * include/cipher.h: Do not use GCRY_PK_* macros for PUBKEY_ALGO_*. -- Due to recent changes to adjust for use with Libgcrypt 1.6, "gpg --version" printed two question marks. This patches fixes that and also make sure that gpg does advertise any ECC features. The patch in build_list is not really needed. Signed-off-by: Werner Koch <[email protected]>
* gpg: Allow setting of all zero key flagsDaniel Kahn Gillmor2013-10-041-3/+0
| | | | | * g10/keygen.c (do_add_key_flags): Do not check for empty key flags. (cherry picked from commit b693ec02c467696bf9d7324dd081e279f9965151)
* Remove trailing white space from some files.Daniel Kahn Gillmor2013-10-041-133/+133
| | | | --
* gpg: Use 2048 as the default keysize in batch mode.Werner Koch2013-08-301-7/+7
| | | | | | | * g10/keygen.c (gen_elg, gen_dsa, gen_rsa): Set default keysize to 2048. Signed-off-by: Werner Koch <[email protected]>
* Fix bug#1307.Werner Koch2011-01-101-1/+1
|
* Fix memory leakWerner Koch2010-09-291-1/+1
|
* Fix bug#1186Werner Koch2010-02-171-1/+1
|
* Allow for default algorithms in a parameter fileWerner Koch2009-12-041-28/+59
|
* Backported some stuff from trunkWerner Koch2009-12-031-0/+2
|
* Fix bug#1122.Werner Koch2009-09-031-22/+50
| | | | | | Note that msgmerge 0.17 is completely broken as it always prepends a fuzzy null entry to all po files.
* Print status of CRL checks in the audit log.Werner Koch2009-07-231-1/+1
|
* Fix bug 1091.Werner Koch2009-07-201-7/+10
| | | | | | Doc fixes. Replace assert by error message.
* Changed default hash algorithm preferencesWerner Koch2009-07-091-12/+35
|
* Allow generation of DSA2 keys without --enable-dsa2.Werner Koch2009-05-201-11/+3
|
* Fix bug#1056.Werner Koch2009-05-201-1/+1
|
* Changed default algo and size.Werner Koch2009-05-171-86/+136
|
* Made card key generate with backup key work for 2048 bit.Werner Koch2009-05-151-9/+33
| | | | | Improved card key generation prompts.
* Print keyid in gpg --list-packets.Werner Koch2009-05-131-2/+6
| | | | | | Add some not yet code to app-nks.c Changed batch mode expiration time computation
* Update spanish translation.Werner Koch2009-01-081-0/+9
| | | | | | Cleanups. Allow utf-8 in email addresses.
* Make gpg not depend on the RIPE-MD160 implementaion in Libgcrypt.Werner Koch2008-12-111-1/+2
| | | | | Fix SIG_ID computation.
* Flush keyserver search output.Werner Koch2008-12-091-21/+43
| | | | | | Add trustdb chnages from 1.4. Check algo usage for batch key generation.
* Marked all unused args on non-W32 platforms.Werner Koch2008-10-201-32/+37
|
* Cehck for expire date overflows.Werner Koch2008-08-111-15/+23
|
* Add controlo statement %ask-passphraseWerner Koch2008-06-161-29/+68
|
* Changes the header presented before requesting the user ID.Werner Koch2008-06-011-3/+22
|
* Allow configuraton of pinentry tooltip.Werner Koch2007-12-041-2/+16
| | | | | Other minor buf fixes.
* Fixed card key generation of gpg2.Werner Koch2007-07-051-823/+954
| | | | | Reveal less information about timings while generating a key.
* Changed to GPLv3.Werner Koch2007-07-041-4/+2
| | | | | Removed intl/.
* Included LIBICONV in all Makefiles.Werner Koch2007-01-311-2/+2
| | | | | | | | | | g10/ * passphrase.c (passphrase_get): Set the cancel flag on all error from the agent. Fixes a bug reported by Tom Duerbusch. sm/ * gpgsm.c (main): Let --gen-key print a more informative error message.
* * parse-packet.c (read_protected_v3_mpi): Make sure to stopWerner Koch2007-01-151-1/+1
| | | | | | | | reading even for corrupted packets. * keygen.c (generate_user_id): Need to allocate one byte more. Reported by Felix von Leitner.
* Fixes for CVE-2006-6235Werner Koch2006-12-061-19/+42
|
* Final fix which should now pass all tests.Werner Koch2006-11-211-1/+2
|
* No more warnings for AMD64 (at least when cross-compiling). Thus tehre is aWerner Koch2006-11-211-11/+11
| | | | | | | good chance that gpg2 will now work. Other cleanups. Updated gettext.
* FixesWerner Koch2006-10-191-0/+2
|
* Take advantage of newer gpg-error features.Werner Koch2006-09-141-1/+1
|
* Migrated more stuff to doc/Werner Koch2006-08-211-5/+3
| | | | | | | | Migrated the gpg regression tests. Some changes tp the gpg code to fix bugs and for the use in testing. make distcheck works now with gpg enabled.
* With --enable-gpg the keyservers are now build and a first test using gpg2Werner Koch2006-08-161-11/+13
| | | | | shows no prblems. Needs more testing of course.
* A couple of fixes. gpg2's key generation does now work.Werner Koch2006-06-301-1/+1
|
* Ported patches from 1.4.x Werner Koch2006-06-271-29/+94
|
* Still making gpg2 work.Werner Koch2006-05-241-2/+2
| | | | | At least the keyids are now correctly computed again.
* g10/ does build again.Werner Koch2006-05-231-3/+4
|
* Merged recent changes from 1.4Werner Koch2006-04-281-5/+5
|
* Continued with merging.Werner Koch2006-04-191-14/+16
| | | | | Still does not build.