aboutsummaryrefslogtreecommitdiffstats
path: root/g10/keylist.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* * keyedit.c (show_key_with_all_names), keylist.c (list_keyblock_print):David Shaw2002-06-151-5/+15
| | | | | | | | | | Show "[expired]" before expired uids. * keyedit.c (show_key_with_all_names_colon), mainproc.c (list_node), keylist.c (list_keyblock_colon): Use "uat" for user attribute packets instead of "uid". Also use '<count> <length>' rather than the fake user id string.
* * packet.h, parse-packet.c (enum_sig_subpkt): Report back fromDavid Shaw2002-06-031-6/+12
| | | | | | | | | | enum_sig_subpkt when a subpacket is critical and change all callers in keylist.c (show_policy_url, show_notation), mainproc.c (print_notation_data), and pkclist.c (do_show_revocation_reason). * keylist.c (show_policy_url, show_notation): Display if the policy or notation is critical.
* * main.h, g10.c (main), keylist.c (dump_attribs, set_attrib_fd,David Shaw2002-06-031-0/+69
| | | | | | | | | | | | | | | | | list_keyblock_print, list_keyblock_colon), status.h, status.c (get_status_string): New --attribute-fd feature to dump the contents of attribute subpackets for frontends. If --status-fd is also used, then a new status tag ATTRIBUTE is provided for each subpacket. * packet.h, getkey.c (fixup_uidnode, merge_selfsigs_main, merge_selfsigs_subkey), parse-packet.c (setup_user_id): Keep track of the expiration time of a user ID, and while we're at it, use the expired flag from the selfsig rather than reparsing the SIG_EXPIRE subpacket. * photoid.c (generate_photo_id): When adding a new photo ID, showing the photo for confirmation is not safe when noninteractive since the "user" may not be able to dismiss a viewer window. Noted by Timo Schulz.
* * options.skel: Sample photo viewers for Win32.David Shaw2002-06-031-1/+1
| | | | | | | | | | | * misc.c (pct_expando): Use the seckey for %k/%K if the pubkey is not available. * photoid.h, photoid.c (show_photos): Include the seckey in case a user tries to view a photo on a secret key, and change all callers in keyedit.c (menu_showphoto), keylist.c (list_keyblock_print), and photoid.c (generate_photo_id).
* * photoid.h, photoid.c (parse_image_header, image_type_to_string): UsefulDavid Shaw2002-05-021-3/+3
| | | | | | | | | | | | | | | | | | | functions to return data about an image. * packet.h, parse-packet.c (make_attribute_uidname, parse_attribute_subpkts, parse_attribute), photoid.h, photoid.c (show_photos): Handle multiple images in a single attribute packet. * main.h, misc.c (pct_expando), sign.c (mk_notation_and_policy), photoid.c (show_photos): Simpler expando code that does not require using compile-time string sizes. Call image_type_to_string to get image strings (i.e. "jpg", "image/jpeg"). Change all callers. * keyedit.c (menu_showphoto), keylist.c (list_keyblock_print): Allow viewing multiple images within a single attribute packet. * gpgv.c: Various stubs for link happiness.
* Added a copyright year for files changed this year.Werner Koch2002-04-291-1/+1
|
* fixed comment styleWerner Koch2002-04-291-1/+1
|
* After generating a new key, show the key information (name, keyid,David Shaw2002-04-231-39/+76
| | | | | | | | | | | | fingerprint, etc.) Do not print uncheckable signatures (missing key..) in --check-sigs. Print statistics (N missing keys, etc.) after --check-sigs. When signing a key with an expiration date on it, the "Do you want your signature to expire at the same time?" question should default to YES
* Fix auto-key-retrieve to actually work as a keyserver-option (noted byDavid Shaw2002-04-041-5/+6
| | | | | | | | Roger Sondermann). Do not reorder the primary attribute packet - the first user ID must be a genuine one.
* Fix ownertrust display with --with-colons.David Shaw2002-03-311-2/+1
| | | | | | | | | | | | | | | | | | | Properly initialize the user ID refcount for user and photo IDs. Tweak a few prompts to change "y/n" to "y/N", which is how most other prompts are written. Warn the user if they are about to revoke an expired sig (not a problem, but they should know). Control-d escapes the keyserver search prompt. If a subkey is considered revoked solely because the parent key is revoked, print the revocation reason from the parent key. Allow revocation/expiration to apply to a uid/key with no entry in the trustdb.
* This is the first half of revocation key / designated revokerDavid Shaw2002-02-281-1/+7
| | | | | | | | | | | | | | | | | | | | | support. That is, it handles all the data to mark a key as revoked if it has been revoked by a designated revoker. The second half (coming later) will contain the code to make someones key your designated revoker and to issue revocations for someone else. Note that this is written so that a revoked revoker can still issue revocations: i.e. If A revokes B, but A is revoked, B is still revoked. I'm not completely convinced this is the proper behavior, but it matches how PGP does it. It does at least have the advantage of much simpler code - my first version of this had lots of loop maintaining code so you could chain revokers many levels deep and if D was revoked, C was not, which meant that B was, and so on. It was sort of scary, actually. This also changes importing to allow bringing in more revocation keys, and exporting to not export revocation keys marked "sensitive". The --edit menu information will show if a revocation key is present.
* For --sig-policy-url and --cert-policy-url, clarify what is a sig and whatDavid Shaw2002-02-101-2/+2
| | | | | | | | | | | | | | | | | | | | | | is a cert. A sig has sigclass 0x00, 0x01, 0x02, or 0x40, and everything else is a cert. Add a "nrlsign" for nonrevocable and local key signatures. Add a --no-force-mdc to undo --force-mdc. Add a knob to force --disable-mdc/--no-disable-mdc. Off by default, of course, but is used in --pgp2 and --pgp6 modes. Allow specifying multiple users in the "Enter the user ID" loop. Enter a blank line to stop. Show each key+id as it is added. It is not illegal (though possibly silly) to have multiple policy URLs in a given signature, so print all that are present. More efficient implementation of URL-ifying code for --search on an HKP keyserver.
* Allow policy URLs with %-expandos in them. This allows policy URLs likeDavid Shaw2002-02-051-7/+16
| | | | | | | | | "http://notary.jabberwocky.com/keysign/%K" to create a per-signature policy URL. Use the new generic %-handler for the photo ID stuff as well. Display policy URLs and notations during signature generation if --show-policy-url/--show-notation is set.
* Add an outofband indicator to the keyserver protocol.David Shaw2001-12-281-2/+2
| | | | | | Use signature flags for exportability check rather than re-parsing the subpacket.
* * keyserver.c (keyserver_spawn): Removed some variablesWerner Koch2001-12-221-1/+1
| | | | | | | | | | | | declaration due to shadowing warnings. * build-packet.c (build_attribute_subpkt): s/index/idx/ to avoid compiler warnig due to index(3). * getkey.c (get_ctx_handle): Use KEYDB_HANDLE as return value. * keylist.c (list_one): Made resname const. * keyedit.c (keyedit_menu): Allow "addphoto" only when --openpgp is not used. * options.skel: Changed one example photo viewer to qiv.
* Photo ID support (actually generic "attribute packet" support, but thereDavid Shaw2001-12-211-3/+8
| | | | | is only one attribute packet defined thus far, and it's a picture)
* * g10.c. options.h : New option --show-keyringWerner Koch2001-12-211-0/+17
| | | | | | * getkey.c (get_ctx_handle): New. * keylist.c (list_one): Implement option here. By David Champion.
* Fixed some types for portability. Noted by Stefan Bellon.David Shaw2001-12-121-2/+3
|
* Sig expiration codeDavid Shaw2001-12-071-2/+4
| | | | | | | Offer to expire a key signature when the key the user is signing expires Expired sigs cause an error return If --expert is set, prompt for sig duration
* "sigclass" patch - adds key signature class levels, notation and policy-urlDavid Shaw2001-12-061-2/+68
| | | | | displays in key listings, and shows flags for signature features.
* * export.c (do_export_stream): Put all given names into a searchWerner Koch2001-11-091-1/+1
| | | | | | description and change the loop so that all matching names are returned.
* calculate time of next trustdb checkWerner Koch2001-09-281-0/+9
|
* Revamped the trustDBWerner Koch2001-09-241-3/+3
|
* Code cleanupsWerner Koch2001-09-201-36/+84
|
* more bug fixesand some warning cleanupsWerner Koch2001-09-091-3/+3
|
* Revamped the keyring codeWerner Koch2001-09-061-17/+26
|
* Changed lsign behaviour, allow future subkeys, don't list revoked keysWerner Koch2001-08-011-0/+6
|
* migration to autoconf 2.52 and bugfixesWerner Koch2001-07-261-1/+0
|
* just released another snapshotWerner Koch2001-05-281-2/+3
|
* Fixes for W32Werner Koch2001-04-191-9/+9
|
* a second snapshot thsi day (1.0.4f)Werner Koch2001-03-271-4/+0
|
* Fixed a bugs; e.g. in --list-secret-keysWerner Koch2001-03-271-0/+4
|
* list key-capabilitiesWerner Koch2001-03-151-12/+81
|
* add option --fixed-list-modeWerner Koch2001-03-141-18/+42
|
* Key listing cleanupWerner Koch2001-03-131-185/+266
|
* Changed and added copyright noticesWerner Koch2001-03-081-1/+1
|
* Add self-signature verification cachingWerner Koch2001-03-051-1/+1
|
* Fixed the new key selection codeWerner Koch2001-03-031-4/+3
|
* Release snapshot 1.0.4dWerner Koch2001-01-111-6/+10
|
* See ChangeLog: Mon Jul 24 10:30:17 CEST 2000 Werner KochWerner Koch2000-07-241-0/+7
|
* See ChangeLog: Wed Jul 19 11:26:43 CEST 2000 Werner KochWerner Koch2000-07-191-2/+77
|
* See ChangeLog: Fri May 12 14:01:20 CEST 2000 Werner KochWerner Koch2000-05-121-1/+1
|
* See ChangeLog: Thu Mar 16 16:20:23 CET 2000 Werner KochWerner Koch2000-03-161-8/+14
|
* See ChangeLog: Thu Feb 10 11:39:41 CET 2000 Werner KochWerner Koch2000-02-101-3/+5
|
* See ChangeLog: Mon Nov 29 21:52:11 CET 1999 Werner KochWerner Koch1999-11-291-13/+23
|
* See ChangeLog: Mon Nov 22 11:14:53 CET 1999 Werner KochWerner Koch1999-11-221-1/+2
|
* See ChangeLog: Fri Nov 12 20:33:19 CET 1999 Werner KochWerner Koch1999-11-121-20/+15
|
* See ChangeLog: Tue Aug 31 17:20:44 CEST 1999 Werner KochWerner Koch1999-08-311-4/+12
|
* See ChangeLog: Tue Jun 8 13:36:25 CEST 1999 Werner KochWerner Koch1999-06-081-0/+18
|
* See ChangeLog: Wed Apr 28 13:03:03 CEST 1999 Werner KochWerner Koch1999-04-281-1/+4
|