aboutsummaryrefslogtreecommitdiffstats
path: root/g10/passphrase.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2014-11-19Comment typo fixes.Werner Koch1-1/+1
--
2014-08-26gpg: Allow for positional parameters in the passphrase prompt.Werner Koch1-23/+12
* g10/passphrase.c (passphrase_get): Replace sprintf by xasprintf. -- Without that at least the French translation does not always work because it requires positional parameters. Windows for example does not support them as they are not defined by C99 but by POSIX.
2014-06-30gpg: Auto-create revocation certificates.Werner Koch1-1/+2
* configure.ac (GNUPG_OPENPGP_REVOC_DIR): New config define. * g10/revoke.c (create_revocation): Add arg "leadin". (gen_standard_revoke): New. * g10/openfile.c (get_openpgp_revocdir): New. (open_outfile): Add MODE value 3. * g10/keyid.c (hexfingerprint): New. * g10/keygen.c (do_generate_keypair): Call gen_standard_revoke. -- GnuPG-bug-id: 1042
2014-04-15gpg: Re-enable secret key deletion.Werner Koch1-1/+1
* g10/call-agent.c (agent_delete_key): New. * g10/keydb.h (FORMAT_KEYDESC_DELKEY): New. * g10/passphrase.c (gpg_format_keydesc): Support new format. * g10/delkey.c (do_delete_key): Add secret key deletion.
2014-04-15gpg: Change pinentry prompt to talk about "secret key".Werner Koch1-10/+30
* g10/passphrase.c (gpg_format_keydesc): Add mode 2. Change strings. * g10/keydb.h (FORMAT_KEYDESC_NORMAL, FORMAT_KEYDESC_IMPORT) (FORMAT_KEYDESC_EXPORT): New. Use them for clarity. -- The use of the term "certificate" was more confusing than helpful.
2014-01-29gpg: Remove cipher.h and put algo ids into a common file.Werner Koch1-1/+0
* common/openpgpdefs.h (cipher_algo_t, pubkey_algo_t, digest_algo_t) (compress_algo_t): New. * agent/gpg-agent.c: Remove ../g10/cipher.h. Add openpgpdefs.h. * g10/cipher.h (DEK): Move to ... * g10/dek.h: new file. * g10/cipher.h (is_RSA, is_ELGAMAL, is_DSA) (PUBKEY_MAX_NPKEY, PUBKEY_MAX_NSKEY, PUBKEY_MAX_NSIG, PUBKEY_MAX_NENC) (PUBKEY_USAGE_SIG, PUBKEY_USAGE_ENC, PUBKEY_USAGE_CERT) (PUBKEY_USAGE_AUTH, PUBKEY_USAGE_NONE): Move to * g10/packet.h: here. * g10/cipher.h: Remove. Remove from all files. * g10/filter.h, g10/packet.h: Include dek.h. * g10/Makefile.am (common_source): Remove cipher.h. Add dek.h. Signed-off-by: Werner Koch <[email protected]>
2013-02-22gpg: Fix a memory leak in batch key generationWerner Koch1-7/+11
* g10/keygen.c (append_to_parameter): New. (proc_parameter_file): Use new func to extend the parameter list. * g10/passphrase.c (passphrase_to_dek_ext): Print a diagnostic of gcry_kdf_derive failed. * g10/keygen.c (proc_parameter_file): Print a diagnostic if passphrase_to_dek failed. -- Due to an improper way of using the linked list head, all memory for items allocated in proc_parameter_file was never released. If batched key generation with a passphrase and more than ~200 keys was used this exhausted the secure memory.
2013-02-21gpg: Fix a memory leak in batch key generationWerner Koch1-7/+11
* g10/keygen.c (append_to_parameter): New. (proc_parameter_file): Use new func to extend the parameter list. * g10/passphrase.c (passphrase_to_dek_ext): Print a diagnostic of gcry_kdf_derive failed. * g10/keygen.c (proc_parameter_file): Print a diagnostic if passphrase_to_dek failed. -- Due to an improper way of using the linked list head, all memory for items allocated in proc_parameter_file was never released. If batched key generation with a passphrase and more than ~200 keys was used this exhausted the secure memory.
2013-02-07gpg: Add pinentry-mode feature.Werner Koch1-28/+42
* g10/gpg.c: Include shareddefs.h. (main): Add option --pinentry-mode. * g10/options.h (struct opt): Add field pinentry_mode. * g10/passphrase.c: Include shareddefs.h. (have_static_passphrase): Take care of loopback pinentry_mode. (read_passphrase_from_fd): Ditto. (get_static_passphrase): New. (passphrase_to_dek_ext): Factor some code out to ... (emit_status_need_passphrase): new. * g10/call-agent.c (start_agent): Send the pinentry mode. (default_inq_cb): Take care of the PASSPHRASE inquiry. Return a proper error code. (agent_pksign): Add args keyid, mainkeyid and pubkey_algo. (agent_pkdecrypt): Ditto. * g10/pubkey-enc.c (get_it): Pass new args. * g10/sign.c (do_sign): Pass new args. * g10/call-agent.c (struct default_inq_parm_s): New. Change all similar structs to reference this one. Change all users and inquire callback to use this struct, instead of NULL or some undefined but not used structs. This change will help to eventually get rid of global variables. -- This new features allows to use gpg without a Pinentry. As a prerequisite the agent must be configured to allow the loopback pinentry mode (option --allow-loopback-pinentry). For example gpg2 --pinentry-mode=loopback FILE.gpg may be used to decrypt FILE.gpg while entering the passphrase on the tty. If batch is used, --passphrase et al. may be used, if --command-fd is used, the passphrase may be provided by another process. Note that there are no try-again prompts in case of a bad passphrase.
2011-09-20Allow NULL for free_public_key.Werner Koch1-6/+3
2011-03-10Make use of gcry_kdf_derive.Werner Koch1-77/+19
Factoring common code out is always a Good Thing. Also added a configure test to print an error if gcry_kdf_derive is missing in Libgcrypt.
2011-02-02Sample ECC keys and message do now work.Werner Koch1-52/+52
Import and export of secret keys does now work. Encryption has been fixed to be compatible with the sample messages. This version tests for new Libgcrypt function and thus needs to be build with a new Libgcrypt installed.
2011-01-06Integrating http://code.google.com/p/gnupg-ecc/source/detail?r=15 .Andrey Jivsov1-3/+3
The following works: gpg2 --gen-key (ECC) gpg2 --list-keys gpg2 --list-packets ~/.gnupg/pubring.gpg gpg2 --list-packets <private key from http://sites.google.com/site/brainhub/pgpecckeys> ECDH doesn't work yet as the code must be re-written to adjust for gpg-agent refactoring.
2010-10-26Re-implemented GPG's --passwd command and improved it.Werner Koch1-4/+4
2010-10-13More agent support for gpg.Werner Koch1-12/+2
2010-09-06Removed more secret key related code.Werner Koch1-5/+21
It builds fine and passes some of the tests but there are quite some features which don't work yet.
2010-09-01Even less prompts for a new key now.Werner Koch1-2/+0
2010-04-27Provide a useful pinentry prompt.Werner Koch1-0/+54
2010-01-08Add dummu option --passwd for gpg.Werner Koch1-3/+63
Collected changes.
2009-08-202009-08-20 Daiki Ueno <[email protected]>Werner Koch1-8/+8
* mainproc.c (proc_encrypted): Clear passphrase cached with S2K cache ID if decryption failed. * passphrase.c (passphrase_to_dek_ext): Set dek->s2k_cacheid. * gpgv.c (passphrase_clear_cache): New stub.
2009-07-30Comment changes.Werner Koch1-0/+4
Changed --learn-card.
2009-06-24Fixed a bunch of little bugs as reported by Fabian Keil.Werner Koch1-1/+1
Still one problem left; marked with a gcc #warning.
2009-06-05Add full Camellia support.David Shaw1-2/+2
* configure.ac: Remove Camellia restriction. * gpg.c (main), misc.c (openpgp_cipher_test_algo): Remove Camellia restriction. * misc.c (map_cipher_openpgp_to_gcry), main.h: Add macros for openpgp_cipher_open, openpgp_cipher_get_algo_keylen, and openpgp_cipher_get_algo_blklen to wrap around the corresponding gcry_* functions, but pass the algorithm number through map_cipher_openpgp_to_gcry. This is needed in case the gcry algorithm number doesn't match the OpenPGP number (c.f. Camellia). * encr-data.c, pubkey-enc.c, mainproc.c, cipher.c, encode.c, seskey.c, passphrase.c, seckey-cert.c: Use new openpgp_cipher_* macros here.
2009-05-18New gpgsm server option no-encrypt-to.Werner Koch1-17/+32
Add caching for symkey encryption. Minor cleanups.
2009-05-15Made card key generate with backup key work for 2048 bit.Werner Koch1-54/+21
Improved card key generation prompts.
2009-04-01Import/export of pkcs#12 now uses the gpg-agent directly.Werner Koch1-2/+3
Removed duplicated code (percent unescaping).
2009-03-17Move password repetition from gpg to gpg-agent.Werner Koch1-34/+6
2008-12-12Add rmd160.c.Werner Koch1-0/+2
Emit anotehr error code status line.
2008-10-20Marked all unused args on non-W32 platforms.Werner Koch1-0/+4
2008-03-13Fixed an email/DN bug.Werner Koch1-4/+6
Changed pinentry prompts.
2007-10-19Factored utf8 switching code out to i18n.c.Werner Koch1-28/+6
2007-07-04Changed to GPLv3.Werner Koch1-4/+2
Removed intl/.
2007-06-06First steps towards supporting W32.Werner Koch1-0/+2
This is mainly source code reorganization. Update gnulib. g10/ does currently not build.
2007-05-182007-05-19 Marcus Brinkmann <[email protected]>Marcus Brinkmann1-2/+2
* passphrase.c (passphrase_get): Use PACKAGE_GT, not PACKAGE.
2007-05-18agent/Marcus Brinkmann1-3/+6
2007-05-19 Marcus Brinkmann <[email protected]> * protect-tool.c (get_passphrase): Free ORIG_CODESET on error. g10/ 2007-05-19 Marcus Brinkmann <[email protected]> * passphrase.c (passphrase_get): Free ORIG_CODESET on error. sm/ 2007-05-18 Marcus Brinkmann <[email protected]> * qualified.c (gpgsm_qualified_consent, gpgsm_not_qualified_warning): Free ORIG_CODESET on error. * certdump.c (gpgsm_format_keydesc): Likewise. tools/ 2007-05-19 Marcus Brinkmann <[email protected]> * symcryptrun.c (confucius_get_pass): Free ORIG_CODESET on error.
2007-04-282007-04-26 Marcus Brinkmann <[email protected]>Marcus Brinkmann1-0/+2
* passphrase.c (passphrase_to_dek): Write missing passphrase status message in case of cancellation.
2007-01-31Included LIBICONV in all Makefiles.Werner Koch1-2/+13
g10/ * passphrase.c (passphrase_get): Set the cancel flag on all error from the agent. Fixes a bug reported by Tom Duerbusch. sm/ * gpgsm.c (main): Let --gen-key print a more informative error message.
2006-12-06Fixes for CVE-2006-6235Werner Koch1-5/+20
2006-12-03* options.h, gpg.c (main), passphrase.c (passphrase_to_dek): AddDavid Shaw1-11/+15
--passphrase-repeat option to control how many times gpg will re-prompt for a passphrase to ensure the user has typed it correctly. Defaults to 1.
2006-10-13* parse-packet.c (parse_symkeyenc): Show the unpacked as well as theDavid Shaw1-2/+2
packed s2k iteration count. * main.h, options.h, gpg.c (encode_s2k_iterations, main), passphrase.c (hash_passphrase): Add --s2k-count option to specify the number of s2k hash iterations.
2006-10-04Re-enabled --passphrase-fdWerner Koch1-15/+57
2006-10-04Fixed agent access for gpg.Werner Koch1-759/+289
2006-07-31Fix bug 655Werner Koch1-1/+1
2006-05-23g10/ does build again.Werner Koch1-2/+2
2006-04-19Continued with merging.Werner Koch1-16/+17
Still does not build.
2006-04-19Merged with gpg 1.4.3 code. Werner Koch1-676/+509
The gpg part does not yet build.
2006-01-17* keydb.h, passphrase.c (next_to_last_passphrase): New. "Touch" aDavid Shaw1-18/+11
passphrase as if it was used (move from next_pw to last_pw). * pubkey-enc.c (get_session_key): Use it here to handle the case where a passphrase happens to be correct for a secret key, but yet that key isn't the anonymous recipient (i.e. the secret key could be decrypted, but not the session key). This also handles the case where a secret key is located on a card and a secret key with no passphrase. Note this does not fix bug 594 (anonymous recipients on smartcard do not work) - it just prevents the anonymous search from stopping when the card is encountered.
2005-09-07Add "help" sub option to --*-options.Werner Koch1-1/+1
2005-08-05* g10.c (main), passphrase.c (set_passphrase_from_string): NewDavid Shaw1-0/+13
--passphrase command line option. Only useful in very special circumstances.
2005-07-27Converted all m_free to xfree etc.Werner Koch1-34/+34