aboutsummaryrefslogtreecommitdiffstats
path: root/g10/pkclist.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* * keydb.h, pkclist.c (select_algo_from_prefs): Allow passing a suggestedDavid Shaw2002-06-201-2/+7
| | | | | | | | | | | | | | | | | | | algorithm which will be used if available. * encode.c (encode_crypt, encrypt_filter), sign.c (sign_file): Use new select_algo_from_prefs feature to check if forcing an algorithm would violate the recipient preferences. * photoid.c (get_default_photo_command, show_photos): Use different default viewers on different platforms. Currently we have Win 9x, Win NT (2k, xp), Mac OSX, RISC OS, and "everybody else". These are #ifdefs as much as possible to avoid clutter. * g10.c (strusage, build_list), keyedit.c (show_prefs), main.h, misc.c (compress_algo_to_string, check_compress_algo), pkclist.c (algo_available), keygen.c (keygen_set_std_prefs): New algo_to_string and check functions for compress algorithms.
* * keygen.c (keygen_add_revkey): Remove unused code.David Shaw2002-06-151-4/+4
| | | | | | | | | | | | * misc.c (check_permissions): Check directory permissions properly - they are not special files. * pkclist.c (expand_id, expand_group, build_pk_list): When expanding groups before building a pk list, inherit flags from the original pre-expanded string. * pubkey-enc.c (is_algo_in_prefs): Don't use prefs from expired uids.
* * pkclist.c (expand_id, expand_group, build_pk_list): Groups now workDavid Shaw2002-06-141-27/+39
| | | | | properly when used in the "Enter the user ID" prompt.
* * pkclist.c (expand_groups): Maintain the strlist flags while expanding.David Shaw2002-06-141-3/+10
| | | | | | | | | | Members of an expansion inherit their flags from the expansion key. * options.h, cipher.c (write_header), g10.c (main), keygen.c (keygen_set_std_prefs): remove the personal_mdc flag. It no longer serves a purpose now that the personal preference lists are split into cipher/digest/zip.
* * options.skel, options.h, main.h, keydb.h, pkclist.c (build_pk_list,David Shaw2002-06-071-2/+41
| | | | | | | | | | | | | | | | | | | expand_groups), g10.c (main, add_group): Add new "group" command to allow one name to expand into multiple keys. For simplicity, and to avoid potential loops, we only expand once - you can't make an alias that points to an alias. * main.h, g10.c (main), keygen.c (build_personal_digest_list): Simplify the default digest list - there is really no need for the other hashes since they will never be used after SHA-1 in the list. * options.skel, options.h, g10.c (main), hkp.c (hkp_ask_import, hkp_export, hkp_search), keyserver.c (parse_keyserver_options, parse_keyserver_uri, keyserver_work, keyserver_refresh): Make the "x-broken-hkp" keyserver scheme into keyserver-option "broken-http-proxy". Move honor_http_proxy into keyserver_options. Canonicalize the three variations of "hkp", "x-hkp", and "x-broken-hkp" into "hkp".
* * main.h, g10.c (main), keygen.c (build_personal_digest_list): Put in aDavid Shaw2002-06-061-5/+9
| | | | | | | | | | | | | | | | default digest preference list consisting of SHA-1, followed by every other installed digest except MD5. Note this is the same as having no digest preference at all except for SHA-1 being favored. * options.h, g10.c (main), keygen.c (keygen_set_std_prefs), pkclist.c (select_algo_from_prefs): Split --personal-preference-list into three: --personal-{cipher|digest|compress}-preferences. This allows a user to set one without affecting another (i.e. setting only a digest pref doesn't imply an empty cipher pref). * exec.c (exec_read): This is a safer way of guessing the return value of system(). Noted by Stefan Bellon.
* * sign.c (hash_for, sign_file): When encrypting and signing at the sameDavid Shaw2002-06-041-8/+54
| | | | | | | | | | | | | | | | | time, consult the various hash prefs to pick a hash algorithm to use. Pass in a 160-bit hint if any of the signing keys are DSA. * keydb.h, pkclist.c (select_algo_from_prefs, algo_available): Pass a "hints" opaque pointer in to let the caller give hints as to what algorithms would be acceptable. The only current hint is for PREFTYPE_HASH to require a 160-bit hash for DSA. Change all callers in encode.c (encode_crypt, encrypt_filter) and sign.c (sign_file). If we settle on MD5 as the best algorithm based solely on recepient keys and SHA1 is also a possibility, use SHA1 unless the user intentionally chose MD5. This is as per 2440:13. * exec.c (make_tempdir): Fix duplicated filename problem.
* * packet.h, parse-packet.c (enum_sig_subpkt): Report back fromDavid Shaw2002-06-031-1/+1
| | | | | | | | | | enum_sig_subpkt when a subpacket is critical and change all callers in keylist.c (show_policy_url, show_notation), mainproc.c (print_notation_data), and pkclist.c (do_show_revocation_reason). * keylist.c (show_policy_url, show_notation): Display if the policy or notation is critical.
* 2002-05-31 Timo Schulz <[email protected]>Timo Schulz2002-05-311-3/+3
| | | | | | | | * pkclist.c (do_show_revocation_reason): Don't use capital letters for non-interactive output. (show_revocation_reason): Now it is global. * pubkey-enc.c (get_it): Show if the key has been revoked.
* * options.h, main.h, keygen.c (keygen_set_set_prefs, keygen_get_std_prefs,David Shaw2002-05-221-2/+6
| | | | | | | | | | | | | | | | keygen_upd_std_prefs), keyedit.c (keyedit_menu), g10.c (main), pkclist.c (select_algo_from_prefs): Add --personal-preference-list which allows the user to factor in their own preferred algorithms when the preference lists are consulted. Obviously, this does not let the user violate a recepient's preferences (and the RFC) - this only influences the ranking of the agreed-on (and available) algorithms from the recepients. Suggested by David Hollenberg. * options.h, keygen.c (keygen_set_std_prefs), g10.c (main): Rename --preference-list to --default-preference-list (as that is what it really is), and make it a true default in that if the user selects "default" they get this list and not the compiled-in list.
* * pkclist.c (select_algo_from_prefs): There is an assumed compressionDavid Shaw2002-05-091-1/+4
| | | | | preference for uncompressed data.
* * options.h, g10.c (main), getkey.c (finish_lookup), pkclist.cDavid Shaw2002-05-071-14/+19
| | | | | | | | (algo_available): --pgp7, identical to --pgp6 except that it permits a few algorithms that PGP 7 added: AES128, AES192, AES256, and TWOFISH. Any more of these --pgpX flags, and it'll be time to start looking at a generic --emulate-pgp X option.
* Added a copyright year for files changed this year.Werner Koch2002-04-291-1/+1
|
* * pkclist.c (build_pk_list): Fix bug that allowed a key to be selectedDavid Shaw2002-04-131-1/+9
| | | | | | | | | | | | | twice in batch mode if one instance was the default recipient and the other was an encrypt-to. Noted by Stefan Bellon. * parse-packet.c (dump_sig_subpkt): Show data in trust and regexp sig subpackets. * keyedit.c (keyedit_menu): Use new function real_uids_left to prevent deleting the last real (i.e. non-attribute) uid. Again, according to the attribute draft. (menu_showphoto): Make another string translatable.
* Fix ownertrust display with --with-colons.David Shaw2002-03-311-13/+21
| | | | | | | | | | | | | | | | | | | Properly initialize the user ID refcount for user and photo IDs. Tweak a few prompts to change "y/n" to "y/N", which is how most other prompts are written. Warn the user if they are about to revoke an expired sig (not a problem, but they should know). Control-d escapes the keyserver search prompt. If a subkey is considered revoked solely because the parent key is revoked, print the revocation reason from the parent key. Allow revocation/expiration to apply to a uid/key with no entry in the trustdb.
* * pkclist.c (check_signatures_trust): Always print the warning forWerner Koch2002-02-141-9/+6
| | | | | | | | unknown and undefined trust. Removed the did_add cruft. Reported by Janusz A. Urbanowicz. * g10.c: New option --no-use-agent. Hmmm, is this a a good name? --do-not-use-agent seems a bit to long.
* For --sig-policy-url and --cert-policy-url, clarify what is a sig and whatDavid Shaw2002-02-101-9/+23
| | | | | | | | | | | | | | | | | | | | | | is a cert. A sig has sigclass 0x00, 0x01, 0x02, or 0x40, and everything else is a cert. Add a "nrlsign" for nonrevocable and local key signatures. Add a --no-force-mdc to undo --force-mdc. Add a knob to force --disable-mdc/--no-disable-mdc. Off by default, of course, but is used in --pgp2 and --pgp6 modes. Allow specifying multiple users in the "Enter the user ID" loop. Enter a blank line to stop. Show each key+id as it is added. It is not illegal (though possibly silly) to have multiple policy URLs in a given signature, so print all that are present. More efficient implementation of URL-ifying code for --search on an HKP keyserver.
* --pgp6 flag. This is not nearly as involved as --pgp2. In short, itDavid Shaw2002-01-291-2/+23
| | | | | | | | turns off force_mdc, turns on no_comment, escape_from, and force_v3_sigs, and sets compression to 1. It also restricts the user to IDEA (if present), 3DES, CAST5, MD5, SHA1, and RIPEMD160. See the comments above algo_available() for lots of discussion on why you would want to do this.
* Only check preferences against keys with v4 self sigs as v3 sigs have noDavid Shaw2002-01-241-4/+7
| | | | | | | prefs Only put in the fake IDEA preference with --pgp2 mode Print "Expired" for expired but good signatures.
* Some compatibility polish for PGP2. Add a fake IDEA preference for v3David Shaw2002-01-221-2/+9
| | | | | | | | keys (this is in the RFC), so that they can be (sometimes) used along OpenPGP keys. Do not force using IDEA on an OpenPGP key, as this may violate its prefs. Also, revise the help text for the sig class explanation.
* fixes for the 1.0.6b bugs David recently posted to gnupg-devel.Werner Koch2001-11-081-6/+13
|
* more fixes due to automake 1.5SNAP-1-0-6bWerner Koch2001-10-231-1/+1
|
* Encryption should work againWerner Koch2001-09-271-193/+138
|
* Revamped the trustDBWerner Koch2001-09-241-170/+140
|
* Code cleanupsWerner Koch2001-09-201-65/+10
|
* Last changes before 1.0.6a snapshot releaseSNAP-1-0-6aWerner Koch2001-09-071-0/+1
|
* Revamped the keyring codeWerner Koch2001-09-061-6/+38
|
* MDC feature support and other stuffWerner Koch2001-08-301-0/+25
|
* Applied Stefan's patches to support RISCOS.Werner Koch2001-08-201-1/+1
|
* Revamped preference handlingWerner Koch2001-08-101-30/+25
|
* reworked the way hased data is stored and added a "primary" commandWerner Koch2001-08-091-1/+1
| | | | | DCVS: ----------------------------------------------------------------------
* Add kludge for broken HTTP proxies.Werner Koch2001-04-231-2/+2
|
* Changed and added copyright noticesWerner Koch2001-03-081-1/+1
|
* Fixed the new key selection codeWerner Koch2001-03-031-1/+0
|
* Backported getkey.c from 1.1Werner Koch2001-02-081-4/+4
|
* See ChangeLog: Fri Sep 15 18:40:36 CEST 2000 Werner KochWerner Koch2000-09-151-2/+0
|
* See ChangeLog: Wed Sep 6 14:59:09 CEST 2000 Werner KochWerner Koch2000-09-061-3/+3
|
* See ChangeLog: Wed Jul 12 13:32:06 CEST 2000 Werner KochWerner Koch2000-07-121-1/+1
|
* See ChangeLog: Fri May 12 14:01:20 CEST 2000 Werner KochWerner Koch2000-05-121-1/+1
|
* See ChangeLog: Mon May 1 15:38:04 CEST 2000 Werner KochWerner Koch2000-05-011-2/+2
|
* See ChangeLog: Fri Apr 14 19:37:08 CEST 2000 Werner KochWerner Koch2000-04-141-1/+120
|
* See ChangeLog: Sat Dec 4 12:30:28 CET 1999 Werner KochWerner Koch1999-12-041-2/+3
|
* See ChangeLog: Fri Oct 8 20:32:01 CEST 1999 Werner KochWerner Koch1999-10-081-1/+1
|
* See ChangeLog: Mon Oct 4 21:23:04 CEST 1999 Werner KochWerner Koch1999-10-041-9/+15
|
* See ChangeLog: Thu Sep 23 19:24:30 CEST 1999 Werner KochWerner Koch1999-09-231-3/+3
|
* See ChangeLog: Fri Sep 3 10:06:06 CEST 1999 Werner KochV0-9-11Werner Koch1999-09-031-12/+28
|
* See ChangeLog: Wed Aug 4 10:34:46 CEST 1999 Werner KochV0-9-10Werner Koch1999-08-041-2/+34
|
* See ChangeLog: Mon Jul 26 09:34:46 CEST 1999 Werner KochWerner Koch1999-07-261-1/+1
|
* See ChangeLog: Fri Jul 23 13:53:03 CEST 1999 Werner KochV0-9-9Werner Koch1999-07-231-2/+37
|
* See ChangeLog: Tue Jul 13 17:39:25 CEST 1999 Werner KochWerner Koch1999-07-131-44/+132
|