aboutsummaryrefslogtreecommitdiffstats
path: root/g10/keyserver.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2007-07-04Changed to GPLv3.Werner Koch1-4/+2
Removed intl/.
2007-06-14A whole bunch of changes to allow building for Windows.Werner Koch1-2/+2
See the ChangeLogs for details.
2007-03-14From STABLE-BRANCH-1-4David Shaw1-2/+9
* keyserver.c: Windows Vista doesn't grok X_OK and so fails access() tests. Previous versions interpreted X_OK as F_OK anyway, so we'll just use F_OK directly.
2006-12-06Fixes for CVE-2006-6235Werner Koch1-6/+7
2006-10-06* keyserver.c (keyserver_spawn): Write the 16-digit keyid ratherDavid Shaw1-2/+6
than whatever key selector the user used on the command line.
2006-10-02Fix for bug 537Werner Koch1-20/+20
2006-09-14Take advantage of newer gpg-error features.Werner Koch1-1/+1
2006-08-16With --enable-gpg the keyservers are now build and a first test using gpg2Werner Koch1-0/+4
shows no prblems. Needs more testing of course.
2006-05-23g10/ does build again.Werner Koch1-3/+6
2006-04-28Merged recent changes from 1.4Werner Koch1-35/+29
2006-04-27(keyserver_import_cert): Show warning if there is a CERT fingerprint,David Shaw1-0/+6
but no --keyserver set.
2006-04-27* keyserver.c (path_makes_direct): New. (keyserver_spawn): Used hereDavid Shaw1-32/+22
to add "_uri" to certain gpgkeys_xxx helpers when the meaning is different if a path is provided (i.e. ldap).
2006-04-22* keyserver.c: Fix build problem with platforms that stick libcurl inDavid Shaw1-3/+0
a place not in the regular include search path.
2006-04-21Still merging 1.4.3 code backWerner Koch1-1/+1
2006-04-19Continued with merging.Werner Koch1-2/+2
Still does not build.
2006-04-19Merged with gpg 1.4.3 code. Werner Koch1-274/+1028
The gpg part does not yet build.
2006-03-17* keyserver.c (keyserver_import_cert): Handle the IPGP CERT type forDavid Shaw1-12/+25
both the fingerprint alone, and fingerprint+URL cases. * getkey.c (get_pubkey_byname): Minor cleanup.
2006-03-16* cert.c (get_cert): Handle the fixed IPGP type with fingerprint.David Shaw1-1/+1
2006-03-14* keyserver-internal.h, keyserver.c (keyserver_import_pka): Use theDavid Shaw1-3/+9
same API as the other auto-key-locate fetchers. * getkey.c (get_pubkey_byname): Use the fingerprint of the key that we actually fetched. This helps prevent problems where the key that we fetched doesn't have the same name that we used to fetch it. In the case of CERT and PKA, this is an actual security requirement as the URL might point to a key put in by an attacker. By forcing the use of the fingerprint, we won't use the attacker's key here.
2006-03-14* keyserver-internal.h, keyserver.c (keyserver_spawn, keyserver_work,David Shaw1-19/+26
keyserver_import_cert, keyserver_import_name, keyserver_import_ldap): Pass fingerprint info through.
2006-03-14* main.h, import.c (import_one): Optionally return the fingerprint ofDavid Shaw1-2/+3
the key being imported. (import_keys_internal, import_keys_stream, import): Change all callers.
2006-02-24* keydb.h, getkey.c (release_akl), gpg.c (main): AddDavid Shaw1-2/+38
--no-auto-key-locate. * options.h, gpg.c (main): Keep track of each keyserver registered so we can match on them later. * keyserver-internal.h, keyserver.c (cmp_keyserver_spec, keyserver_match), gpgv.c: New. Find a keyserver that matches ours and return its spec. * getkey.c (get_pubkey_byname): Use it here to get the per-keyserver options from an earlier keyserver.
2006-02-24* keyserver.c (parse_keyserver_options): Only change max_cert if it isDavid Shaw1-1/+1
used.
2006-02-23* options.c, gpg.c (main), keyserver.c (keyserver_spawn): No specialDavid Shaw1-16/+7
treatment of include-revoked, include-subkeys, and try-dns-srv. These are keyserver features, and GPG shouldn't get involved here.
2006-02-23* keyserver.c (parse_keyserver_uri, add_canonical_option): Always appendDavid Shaw1-3/+3
options to the list, as ordering may be significant to the user.
2006-02-23* options.h, keyserver.c (add_canonical_option): New.David Shaw1-19/+43
(parse_keyserver_options): Moved from here. (parse_keyserver_uri): Use it here so each keyserver can have some private options in addition to the main keyserver-options (e.g. per-keyserver auth).
2006-02-22* options.h, keyserver-internal.h, keyserver.c (keyserver_import_name),David Shaw1-2/+2
getkey.c (free_akl, parse_auto_key_locate, get_pubkey_byname): The obvious next step: allow arbitrary keyservers in the auto-key-locate list.
2006-02-22* options.h, keyserver.c (parse_keyserver_options): RemoveDavid Shaw1-6/+4
auto-cert-retrieve as it is no longer meaningful. Add max-cert-size to allow users to pick a max key size retrieved via CERT.
2006-02-22* options.h, gpg.c (main), mainproc.c (check_sig_and_print), keyserver.cDavid Shaw1-4/+10
(keyserver_opts): Rename auto-pka-retrieve to honor-pka-record to be consistent with honor-keyserver-url.
2006-02-21* getkey.c (get_pubkey_byname): Fix minor security problem with PKA whenDavid Shaw1-3/+2
importing at -r time. The URL in the PKA record may point to a key put in by an attacker. Fix is to use the fingerprint from the PKA record as the recipient. This ensures that the PKA record is followed. * keyserver-internal.h, keyserver.c (keyserver_import_pka): Return the fingerprint we requested.
2006-02-21* gpgv.c: Stub keyserver_import_ldap.David Shaw1-0/+35
* keyserver-internal.h, keyserver.c (keyserver_import_ldap): Import using the PGP Universal trick of asking ldap://keys.(maildomain) for the key.
2006-02-21* keyserver.c (parse_keyserver_uri): Include the scheme in the uriDavid Shaw1-2/+7
even when we've assumed "hkp" when there was no scheme.
2006-01-24* keyserver.c (parse_keyserver_uri): If there is a path present, set theDavid Shaw1-0/+3
direct_uri flag so the right keyserver helper is run.
2006-01-22* keyserver.c (keyserver_spawn): Include the EXEEXT so we can findDavid Shaw1-2/+4
keyserver helpers on systems that use extensions. * misc.c (path_access) [HAVE_DRIVE_LETTERS]: Do the right thing with drive letter systems.
2006-01-07* keyserver.c (keyserver_refresh): Fix problem when more than one keyDavid Shaw1-1/+1
in a refresh batch has a preferred keyserver set. Noted by Nicolas Rachinsky.
2006-01-01* mainproc.c (check_sig_and_print), keyserver.cDavid Shaw1-1/+1
(keyserver_import_pka), card-util.c (fetch_url): Always require a scheme:// for keyserver URLs except when used as part of the --keyserver command for backwards compatibility.
2005-12-23* keyserver.c (keyserver_import_pka): New. Moved fromDavid Shaw1-1/+98
getkey.c:get_pubkey_byname which was getting crowded. * keyserver.c (keyserver_import_cert): Import a key found in DNS via CERT records. Can handle both the PGP (actual key) and IPGP (URL) CERT types. * getkey.c (get_pubkey_byname): Call them both here. * options.h, keyserver.c (parse_keyserver_options): Add "auto-cert-retrieve" option with optional max size argument.
2005-12-23* gpgv.c: Stub.David Shaw1-25/+62
* keyserver-internal.h, keyserver.c (keyserver_spawn, keyserver_work, keygerver_getname): New keyserver_getname function to fetch keys by name. * getkey.c (get_pubkey_byname): Call it here to enable locating keys by full mailbox from a keyserver a la PKA. Try PKA first, though, as it is likely to be faster.
2005-12-20Finished PKA featureWerner Koch1-1/+1
2005-12-08* keyserver.c (keyserver_fetch): Switch on fast-import before weDavid Shaw1-0/+13
--fetch-keys so we don't rebuild the trustdb after each fetch.
2005-12-08Made strings translatable. Minor fixes.Werner Koch1-2/+2
2005-12-08* options.h, keyserver.c (curl_cant_handle, keyserver_spawn,David Shaw1-7/+25
keyserver_fetch): Set a flag to indicate that we're doing a direct URI fetch so we can differentiate between a keyserver operation and a URI fetch for protocols like LDAP that can do either.
2005-12-07* keyserver.c (keyserver_spawn): Don't print "searching for key 00000000"David Shaw1-9/+48
when fetching a URI. * keyserver-internal.h, keyserver.c (keyserver_fetch): New. Fetch an arbitrary URI using the keyserver helpers. * gpg.c (main): Call it from here for --fetch-keys.
2005-09-14* main.h, misc.c (parse_options): Add the ability to have helpDavid Shaw1-9/+20
strings in xxx-options commands. * keyserver.c (keyserver_opts), import.c (parse_import_options), export.c (parse_export_options), g10.c (parse_list_options, main): Add help strings to xxx-options.
2005-08-27* misc.c (openpgp_pk_algo_usage): Default to allowing CERT for signingDavid Shaw1-0/+2
algorithms. * keyedit.c (sign_uids): Don't request a signing key to make a certification. * keygen.c (do_add_key_flags): Force the certify flag on for all primary keys, as the spec requires primary keys must be able to certify (if nothing else, which key is going to issue the user ID signature?) (print_key_flags): Show certify flag. (ask_key_flags, ask_algo): Don't allow setting the C flag for subkeys. * keyid.c (usagestr_from_pk), getkey.c (parse_key_usage): Distinguish between a sign/certify key and a certify-only key.
2005-08-21* Makefile.am: No need to link with curl any longer.David Shaw1-33/+32
* main.h, misc.c (path_access): New. Same as access() but does a PATH search like execlp. * keyserver.c (curl_can_handle): Removed. Replaced by... (curl_cant_handle): We are now relying on curl as the handler of last resort. This is necessary because PGP LDAP and curl LDAP are apples and oranges. (keyserver_typemap): Only test for ldap and ldaps. (keyserver_spawn): If a given handler is unusable (as determined by path_access()) then try gpgkeys_curl.
2005-08-05auto retrieve keys from PKA. Thsi allows to specify an email addressWerner Koch1-0/+1
so that gpg can get the key from DNS. This helps with opportunistic encryption. No integration with the trust modell yet.
2005-07-27Converted all m_free to xfree etc.Werner Koch1-57/+57
2005-07-27* keyserver.c (keyserver_typemap): Special-case LDAP since curl willDavid Shaw1-1/+3
report that it can handle it, and we don't want it to.
2005-07-22* gpg.sgml (http):Werner Koch1-2/+10
* g10.c, options.h: New option --exit-on-status-write-error. * status.c (write_status_text): Make use of this option.