aboutsummaryrefslogtreecommitdiffstats
path: root/g10/keyserver.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* * keydb.h, getkey.c (release_akl), gpg.c (main): AddDavid Shaw2006-02-241-2/+38
| | | | | | | | | | | | | | | --no-auto-key-locate. * options.h, gpg.c (main): Keep track of each keyserver registered so we can match on them later. * keyserver-internal.h, keyserver.c (cmp_keyserver_spec, keyserver_match), gpgv.c: New. Find a keyserver that matches ours and return its spec. * getkey.c (get_pubkey_byname): Use it here to get the per-keyserver options from an earlier keyserver.
* * keyserver.c (parse_keyserver_options): Only change max_cert if it isDavid Shaw2006-02-241-1/+1
| | | | | used.
* * options.c, gpg.c (main), keyserver.c (keyserver_spawn): No specialDavid Shaw2006-02-231-16/+7
| | | | | | treatment of include-revoked, include-subkeys, and try-dns-srv. These are keyserver features, and GPG shouldn't get involved here.
* * keyserver.c (parse_keyserver_uri, add_canonical_option): Always appendDavid Shaw2006-02-231-3/+3
| | | | | options to the list, as ordering may be significant to the user.
* * options.h, keyserver.c (add_canonical_option): New.David Shaw2006-02-231-19/+43
| | | | | | | (parse_keyserver_options): Moved from here. (parse_keyserver_uri): Use it here so each keyserver can have some private options in addition to the main keyserver-options (e.g. per-keyserver auth).
* * options.h, keyserver-internal.h, keyserver.c (keyserver_import_name),David Shaw2006-02-221-2/+2
| | | | | | getkey.c (free_akl, parse_auto_key_locate, get_pubkey_byname): The obvious next step: allow arbitrary keyservers in the auto-key-locate list.
* * options.h, keyserver.c (parse_keyserver_options): RemoveDavid Shaw2006-02-221-6/+4
| | | | | | auto-cert-retrieve as it is no longer meaningful. Add max-cert-size to allow users to pick a max key size retrieved via CERT.
* * options.h, gpg.c (main), mainproc.c (check_sig_and_print), keyserver.cDavid Shaw2006-02-221-4/+10
| | | | | | (keyserver_opts): Rename auto-pka-retrieve to honor-pka-record to be consistent with honor-keyserver-url.
* * getkey.c (get_pubkey_byname): Fix minor security problem with PKA whenDavid Shaw2006-02-211-3/+2
| | | | | | | | | | importing at -r time. The URL in the PKA record may point to a key put in by an attacker. Fix is to use the fingerprint from the PKA record as the recipient. This ensures that the PKA record is followed. * keyserver-internal.h, keyserver.c (keyserver_import_pka): Return the fingerprint we requested.
* * gpgv.c: Stub keyserver_import_ldap.David Shaw2006-02-211-0/+35
| | | | | | * keyserver-internal.h, keyserver.c (keyserver_import_ldap): Import using the PGP Universal trick of asking ldap://keys.(maildomain) for the key.
* * keyserver.c (parse_keyserver_uri): Include the scheme in the uriDavid Shaw2006-02-211-2/+7
| | | | | even when we've assumed "hkp" when there was no scheme.
* * keyserver.c (parse_keyserver_uri): If there is a path present, set theDavid Shaw2006-01-241-0/+3
| | | | | direct_uri flag so the right keyserver helper is run.
* * keyserver.c (keyserver_spawn): Include the EXEEXT so we can findDavid Shaw2006-01-221-2/+4
| | | | | | | | keyserver helpers on systems that use extensions. * misc.c (path_access) [HAVE_DRIVE_LETTERS]: Do the right thing with drive letter systems.
* * keyserver.c (keyserver_refresh): Fix problem when more than one keyDavid Shaw2006-01-071-1/+1
| | | | | | in a refresh batch has a preferred keyserver set. Noted by Nicolas Rachinsky.
* * mainproc.c (check_sig_and_print), keyserver.cDavid Shaw2006-01-011-1/+1
| | | | | | | (keyserver_import_pka), card-util.c (fetch_url): Always require a scheme:// for keyserver URLs except when used as part of the --keyserver command for backwards compatibility.
* * keyserver.c (keyserver_import_pka): New. Moved fromDavid Shaw2005-12-231-1/+98
| | | | | | | | | | | | | getkey.c:get_pubkey_byname which was getting crowded. * keyserver.c (keyserver_import_cert): Import a key found in DNS via CERT records. Can handle both the PGP (actual key) and IPGP (URL) CERT types. * getkey.c (get_pubkey_byname): Call them both here. * options.h, keyserver.c (parse_keyserver_options): Add "auto-cert-retrieve" option with optional max size argument.
* * gpgv.c: Stub.David Shaw2005-12-231-25/+62
| | | | | | | | | | * keyserver-internal.h, keyserver.c (keyserver_spawn, keyserver_work, keygerver_getname): New keyserver_getname function to fetch keys by name. * getkey.c (get_pubkey_byname): Call it here to enable locating keys by full mailbox from a keyserver a la PKA. Try PKA first, though, as it is likely to be faster.
* Finished PKA featureWerner Koch2005-12-201-1/+1
|
* * keyserver.c (keyserver_fetch): Switch on fast-import before weDavid Shaw2005-12-081-0/+13
| | | | | --fetch-keys so we don't rebuild the trustdb after each fetch.
* Made strings translatable. Minor fixes.Werner Koch2005-12-081-2/+2
|
* * options.h, keyserver.c (curl_cant_handle, keyserver_spawn,David Shaw2005-12-081-7/+25
| | | | | | | keyserver_fetch): Set a flag to indicate that we're doing a direct URI fetch so we can differentiate between a keyserver operation and a URI fetch for protocols like LDAP that can do either.
* * keyserver.c (keyserver_spawn): Don't print "searching for key 00000000"David Shaw2005-12-071-9/+48
| | | | | | | | | | when fetching a URI. * keyserver-internal.h, keyserver.c (keyserver_fetch): New. Fetch an arbitrary URI using the keyserver helpers. * gpg.c (main): Call it from here for --fetch-keys.
* * main.h, misc.c (parse_options): Add the ability to have helpDavid Shaw2005-09-141-9/+20
| | | | | | | | | strings in xxx-options commands. * keyserver.c (keyserver_opts), import.c (parse_import_options), export.c (parse_export_options), g10.c (parse_list_options, main): Add help strings to xxx-options.
* * misc.c (openpgp_pk_algo_usage): Default to allowing CERT for signingDavid Shaw2005-08-271-0/+2
| | | | | | | | | | | | | | | | | algorithms. * keyedit.c (sign_uids): Don't request a signing key to make a certification. * keygen.c (do_add_key_flags): Force the certify flag on for all primary keys, as the spec requires primary keys must be able to certify (if nothing else, which key is going to issue the user ID signature?) (print_key_flags): Show certify flag. (ask_key_flags, ask_algo): Don't allow setting the C flag for subkeys. * keyid.c (usagestr_from_pk), getkey.c (parse_key_usage): Distinguish between a sign/certify key and a certify-only key.
* * Makefile.am: No need to link with curl any longer.David Shaw2005-08-211-33/+32
| | | | | | | | | | | | | * main.h, misc.c (path_access): New. Same as access() but does a PATH search like execlp. * keyserver.c (curl_can_handle): Removed. Replaced by... (curl_cant_handle): We are now relying on curl as the handler of last resort. This is necessary because PGP LDAP and curl LDAP are apples and oranges. (keyserver_typemap): Only test for ldap and ldaps. (keyserver_spawn): If a given handler is unusable (as determined by path_access()) then try gpgkeys_curl.
* auto retrieve keys from PKA. Thsi allows to specify an email addressWerner Koch2005-08-051-0/+1
| | | | | | so that gpg can get the key from DNS. This helps with opportunistic encryption. No integration with the trust modell yet.
* Converted all m_free to xfree etc.Werner Koch2005-07-271-57/+57
|
* * keyserver.c (keyserver_typemap): Special-case LDAP since curl willDavid Shaw2005-07-271-1/+3
| | | | | report that it can handle it, and we don't want it to.
* * gpg.sgml (http):Werner Koch2005-07-221-2/+10
| | | | | | * g10.c, options.h: New option --exit-on-status-write-error. * status.c (write_status_text): Make use of this option.
* * keyserver.c (curl_can_handle): New. Do a runtime check against libcurlDavid Shaw2005-07-201-15/+33
| | | | | | | | to see if it can handle a particular protocol. (keyserver_typemap): Call it here. * Makefile.am: Pull in libcurl for curl_version_info() if used.
* * configure.ac [W32]: Always set DISABLE_KEYSERVER_PATH.Werner Koch2005-07-191-5/+7
| | | | | | | | | | * export.c (parse_export_options): New option export-reset-subkey-passwd. (do_export_stream): Implement it. * misc.c (get_libexecdir): New. * keyserver.c (keyserver_spawn): Use it
* Updated FSF street address and preparations for a release candidate.Werner Koch2005-05-311-1/+2
|
* * keyserver.c (keyserver_spawn): Free some memory.David Shaw2005-04-171-1/+11
| | | | | * sign.c (hash_for): Comments.
* * g10.c (main, add_notation_data, add_policy_url)Werner Koch2005-04-111-1/+2
| | | | | | | | | | | (add_keyserver_url): Use isascii() to protect the isfoo macros and to replace direct tests. Possible problems noted by Christian Biere. * keyserver.c (parse_keyserver_uri): Ditto. * g10.c (main): Declare --pipemode deprecated. * misc.c (deprecated_command): New.
* * exec.h, exec.c (set_exec_path): Remove some dead code and change allDavid Shaw2005-03-311-1/+1
| | | | | callers. We no longer need to append to $PATH.
* * keyserver.c (keyserver_spawn): Don't mess about with the $PATH.David Shaw2005-03-311-9/+35
| | | | | | Rather, call keyserver helpers with the full path. This fixes some PATH-inspired DLL problems on W32. Noted by Carlo Luciano Bianco.
* * options.h, keyserver.c (parse_keyserver_options, keyserver_spawn): Don'tDavid Shaw2005-03-171-11/+3
| | | | | | treat 'verbose' and 'include-disabled' as special. Just pass them through silently to the keyserver helper.
* * keyserver.c (parse_keyserver_options): Accept honor-http-proxy as anDavid Shaw2005-03-101-0/+8
| | | | | alias for http-proxy.
* * trustdb.h, trustdb.c (trustdb_check_or_update): New. If the trustdbDavid Shaw2005-02-061-4/+18
| | | | | | | | | | | | | | is dirty and --interactive is set, do an --update-trustdb. If not interactive, do a --check_trustdb unless --no-auto-check-trustdb is set. * import.c (import_keys_internal): Moved from here. * keyserver.c (keyserver_refresh): Call it here after all refreshing has happened so that we don't rebuild after each preferred keyserver set of imports, but do one big rebuild at the end. This is Debian bug #293816, noted by Kurt Roeckx.
* * keyserver.c (parse_keyserver_uri): Allow RFC-2732 IPv6 [literalDavid Shaw2005-01-261-4/+36
| | | | | | address] syntax in keyserver URLs. (keyserver_typemap): Map ftps if we are supporting it.
* * keyserver.c (free_keyserver_spec): Fix small leak.David Shaw2005-01-221-0/+6
| | | | | (keyserver_typemap): Map https if we are supporting it.
* * filter.h, armor.c (armor_filter): Use the eol string from the armorDavid Shaw2005-01-061-1/+8
| | | | | | | | | | filter context instead of hardcoding '\n' or '\r\n'. If no eol string is provided, default to '\n' or '\r\n' as appropriate. (is_armor_header): Trim tabs in armor header lines as well. * keyserver.c (keyserver_spawn): Use it here to force '\n' line endings since the keyserver output file gets a LF->CRLF expansion on win32.
* * keyserver.c (keyserver_typemap): Only map HTTP and FTP if libcurl hasDavid Shaw2004-12-241-2/+4
| | | | | specifically been selected to handle them.
* * options.h, keyserver.c (parse_keyserver_uri): Properly parse auth dataDavid Shaw2004-12-221-0/+20
| | | | | from URLs and pass to keyserver helpers.
* * keyserver.c (keyserver_typemap): New. Map certain keyserver types to aDavid Shaw2004-12-221-10/+24
| | | | | | | | | common type (e.g. ldaps -> ldap). If we are building with curl, map both http and ftp to curl. * build-packet.c (build_sig_subpkt): Only allow one preferred keyserver subpacket at a time.
* Prepared for last 1.4 release candidateWerner Koch2004-12-141-4/+11
|
* * keyserver.c (parse_preferred_keyserver): Force preferred keyserverDavid Shaw2004-12-121-1/+1
| | | | | subpackets to have a URI scheme specified.
* * keyserver.c (keyserver_work): Handle keyserver timeouts.David Shaw2004-10-131-0/+4
|
* * pkclist.c (do_edit_ownertrust): Use the same translated string forDavid Shaw2004-10-111-8/+21
| | | | | | | | | | | | | | showing the user ID as mainproc.c:print_pkenc_list. * mainproc.c (print_pkenc_list): Allow translating the quotes around the user ID. * card-util.c, g10.c, photoid.c, trustdb.c: The last of the \"%s\" -> `%s' quoting for things that aren't user IDs. * keyserver.c (keyserver_spawn): If there is no keyserver host, print the whole URI since it is self-contained.
* * configure.ac: New option --disable-finger.Werner Koch2004-10-111-3/+3
| | | | | | | | * keyserver.c (keyserver_spawn): Print an empty string in log_info if the host is not set (e.g. finger). * gpgkeys_finger.c: New.