aboutsummaryrefslogtreecommitdiffstats
path: root/g10/seckey-cert.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Support the not anymore patented IDEA cipher algorithm.Werner Koch2012-11-081-9/+4
| | | | | | | | | | | | | | | | | | | | | | | | * cipher/idea.c: New. Take from Libgcrypt master and adjust for direct use in GnuPG. * cipher/idea-stub.c: Remove. * cipher/Makefile.am: Add idea.c and remove idea-stub.c rules. * configure.ac: Remove idea-stub code. * g10/gpg.c (check_permissions): Remove code path for ITEM==2. (main): Make --load-extension a dummy option. * g10/keygen.c (keygen_set_std_prefs): Include IDEA only in PGP2 compatibility mode. * g10/misc.c (idea_cipher_warn): Remove. Also remove all callers. * g10/seckey-cert.c (do_check): Remove emitting of STATUS_RSA_OR_IDEA. * g10/status.c (get_status_string): Remove STATUS_RSA_OR_IDEA. * g10/status.h (STATUS_RSA_OR_IDEA): Remove. -- To keep the number of actually used algorithms low, we support IDEA only in a basically read-only way (unless --pgp2 is used during key generation). It does not make sense to suggest the use of this old 64 bit blocksize algorithm. However, there is old data available where it might be helpful to have IDEA available.
* Switched to GPLv3.Werner Koch2007-10-231-4/+2
| | | | | Updated gettext.
* Fixes pertaining to revocation creation with subkey-only exported card keysWerner Koch2005-08-041-2/+3
|
* Converted all m_free to xfree etc.Werner Koch2005-07-271-9/+9
|
* Updated FSF street address and preparations for a release candidate.Werner Koch2005-05-311-1/+2
|
* * passphrase.c (agent_get_passphrase): Add new arg CACHEID.Werner Koch2005-05-031-2/+2
| | | | | | | | | | | | | | Changed all callers. (ask_passphrase): Add new arg CACHEID and use it in agent mode. Changed all callers. (passphrase_clear_cache): New arg CACHEID. Changed all callers. * cardglue.c (format_cacheid): New. (pin_cb): Compute a cache ID. (agent_scd_pksign, agent_scd_pkdecrypt): Use it. (agent_clear_pin_cache): New. * card-util.c (change_pin): Clear the PIN cache. (check_pin_for_key_operation): Ditto.
* * seckey-cert.c (do_check): Handle case when checksum was okay butWerner Koch2004-12-201-2/+17
| | | | | | | | | passphrase still wrong. Roman Pavlik found such a case. * mpicoder.c (mpi_read_from_buffer): Don't abort in case of an invalid MPI but print a message and return NULL. Use log_info and not log_error.
* * keyedit.c (sign_uids): Properly handle remaking a self-sig on revoked orDavid Shaw2004-07-151-0/+6
| | | | | | | | | | | | | | expired user IDs. Also, once we've established that a given uid cannot or will not be signed, don't continue to ask about each sig. * mainproc.c (proc_symkey_enc), seckey-cert.c (do_check): Check the S2K hash algorithm before we try to generate a passphrase using it. This prevents hitting BUG() when generating a passphrase using a hash that we don't have. * sign.c (sign_symencrypt_file): Allow using --force-mdc in --sign --symmetric messages.
* * build-packet.c (write_fake_data, do_secret_key), seckey-cert.cDavid Shaw2003-12-171-6/+4
| | | | | | | | (do_check): Use an unsigned length for mpi_get_opaque. * options.h: It's impolite to assign -1 to an unsigned opt.force_ownertrust.
* * keygen.c (do_add_key_flags, parse_parameter_usage): Add supportWerner Koch2003-09-301-1/+7
| | | | | | | | | | | | | | | | | the proposed AUTH key flag. * getkey.c (fixup_uidnode, merge_selfsigs_main) (merge_selfsigs_subkey, premerge_public_with_secret): Ditto. * keylist.c (print_capabilities): Ditto. * parse-packet.c (parse_key): Allow to parse the divert-to-card S2K mode. * build-packet.c (do_secret_key): Handle divert-to-card S2K * seckey-cert.c (is_secret_key_protected): Ditto. (check_secret_key): Ditto. * keygen.c (do_ask_passphrase): Renamed from ask_passphrase. * passphrase.c (ask_passphrase): New.
* * getkey.c (premerge_public_with_secret): Made "no secret subkey for"David Shaw2003-05-261-2/+5
| | | | | | | | | | | | | | | | | | | | | | | | | warning a verbose item and translatable. (From wk on stable branch) * sig-check.c (check_key_signature2): Made "no subkey for subkey binding packet" a verbose item instead of a !quiet one. There are too many garbled keys out in the wild. (From wk on stable branch) * filter.h: Remove const from WHAT. (From wk on stable branch) * progress.c (handle_progress): Store a copy of NAME. (progress_filter): Release WHAT, make sure not to print a NULL WHAT. (From wk on stable branch) * openfile.c (open_sigfile): Adjust free for new progress semantics. (From wk on stable branch) * plaintext.c (ask_for_detached_datafile): Don't dealloc pfx->WHAT. (From wk on stable branch) * seckey-cert.c (do_check): Issue the RSA_OR_IDEA status when the cipher algo is IDEA to make it easier to track down the problem. (From twoaday on stable branch)
* * passphrase.c (read_passphrase_from_fd): Do a dummy read if theWerner Koch2003-04-101-6/+12
| | | | | | | | | | | | | | | | | | | | | agent is to be used. Noted by Ingo Kl�cker. (agent_get_passphrase): Inhibit caching when we have no fingerprint. This is required for key generation as well as for symmetric only encryption. * passphrase .c (agent_get_passphrase): New arg CANCELED. (passphrase_to_dek): Ditto. Passed to above. Changed all callers to pass NULL. * seckey-cert.c (do_check): New arg CANCELED. (check_secret_key): Terminate loop when canceled. * keyedit.c (change_passphrase): Pass ERRTEXT untranslated to passphrase_to_dek and translate where appropriate. * seckey-cert.c (check_secret_key): Ditto. * keygen.c (ask_passphrase): Ditto. * passphrase.c (agent_get_passphrase): Translate the TRYAGAIN_TEXT. Switch the codeset to utf-8.
* * pubkey-enc.c (get_session_key): With hidden recipients or try a givenDavid Shaw2002-11-061-4/+13
| | | | | | | | | | | | | | | passphrase against all secret keys rather than trying all secret keys in turn. Don't if --try-all-secrets or --status-fd is enabled. * passphrase.c (passphrase_to_dek): Mode 1 means do a regular passphrase query, but don't prompt with the key info. * seckey-cert.c (do_check, check_secret_key): A negative ask count means to enable passphrase mode 1. * keydb.h, getkey.c (enum_secret_keys): Add flag to include secret-parts-missing keys (or not) in the list.
* * import.c (import_secret_one): Check for an illegal (>110) protectionDavid Shaw2002-10-021-1/+2
| | | | | | | | | | | | | | | | | | cipher when importing a secret key. * keylist.c (list_keyblock_print): Show a '#' for a secret-parts-missing key. * parse_packet.c (parse_key): Some comments. * revoke.c (gen_revoke): Remove some debugging code. * trustdb.c (verify_own_keys): Make trusted-key a non-deprecated option again. * seckey-cert.c (do_check): Don't give the IDEA warning unless the cipher in question is in fact IDEA.
* * g10.c, options.h: Removed option --emulate-checksum-bug.Werner Koch2002-09-111-44/+34
| | | | | | | | | | | | | | | * misc.c (checksum_u16_nobug): Removed. (checksum_u16): Removed the bug emulation. (checksum_mpi): Ditto. (checksum_mpi_counted_nbits): Removed and replaced all calls with checksum_mpi. * parse-packet.c (read_protected_v3_mpi): New. (parse_key): Use it here to store it as an opaque MPI. * seckey-cert.c (do_check): Changed the v3 unprotection to the new why to store these keys. (protect_secret_key): Likewise. * build-packet.c (do_secret_key): And changed the writing.
* * seckey-cert.c: Workaround to allow decryption of v3 keys createdWerner Koch2002-08-161-0/+26
| | | | | with a bug in the mpi_get_secure_buffer.
* Update head to match stable 1.0David Shaw2002-06-291-205/+166
|
* See ChangeLog: Wed Oct 4 13:16:18 CEST 2000 Werner KochWerner Koch2000-10-041-4/+3
|
* See ChangeLog: Mon Sep 18 16:35:45 CEST 2000 Werner KochWerner Koch2000-09-181-6/+9
|
* See ChangeLog: Mon Aug 21 17:59:17 CEST 2000 Werner KochWerner Koch2000-08-211-0/+2
|
* See ChangeLog: Tue Jul 25 17:44:15 CEST 2000 Werner KochWerner Koch2000-07-251-24/+12
|
* See ChangeLog: Fri Jul 14 19:38:23 CEST 2000 Werner KochWerner Koch2000-07-141-14/+21
|
* See ChangeLog: Thu Jan 27 18:00:44 CET 2000 Werner KochWerner Koch2000-01-271-9/+9
|
* See ChangeLog: Mon Jan 24 22:24:38 CET 2000 Werner KochWerner Koch2000-01-241-3/+51
|
* See ChangeLog: Mon Jan 24 13:04:28 CET 2000 Werner KochWerner Koch2000-01-241-15/+26
|
* See ChangeLog: Fri Dec 31 14:06:56 CET 1999 Werner KochWerner Koch1999-12-311-1/+1
|
* See ChangeLog: Fri Dec 31 12:48:31 CET 1999 Werner KochWerner Koch1999-12-311-2/+8
|
* See ChangeLog: Wed Dec 8 21:58:32 CET 1999 Werner KochWerner Koch1999-12-081-20/+29
|
* See ChangeLog: Sat Nov 13 17:44:23 CET 1999 Werner KochWerner Koch1999-11-131-2/+3
|
* See ChangeLog: Tue Oct 26 14:10:21 CEST 1999 Werner KochWerner Koch1999-10-261-25/+53
|
* See ChangeLog: Mon Jul 12 14:55:34 CEST 1999 Werner KochWerner Koch1999-07-121-1/+1
|
* See ChangeLog: Thu Jul 1 12:47:31 CEST 1999 Werner KochWerner Koch1999-07-011-1/+1
|
* See ChangeLog: Sun Apr 18 10:11:28 CEST 1999 Werner KochWerner Koch1999-04-181-8/+7
|
* See ChangeLog: Fri Apr 9 12:26:25 CEST 1999 Werner KochWerner Koch1999-04-091-0/+3
|
* See ChangeLog: Wed Apr 7 20:51:39 CEST 1999 Werner KochWerner Koch1999-04-071-5/+2
|
* See ChangeLog: Wed Mar 17 13:09:03 CET 1999 Werner KochWerner Koch1999-03-171-0/+9
|
* See ChangeLog: Mon Mar 8 20:47:17 CET 1999 Werner KochWerner Koch1999-03-081-1/+1
|
* See ChangeLog: Tue Feb 16 14:10:02 CET 1999 Werner KochWerner Koch1999-02-161-9/+9
|
* See ChangeLog: Tue Jan 12 11:17:18 CET 1999 Werner KochWerner Koch1999-01-121-1/+1
|
* See ChangeLog: Thu Jan 7 18:00:58 CET 1999 Werner KochWerner Koch1999-01-071-1/+8
|
* See ChangeLog: Wed Dec 23 13:34:22 CET 1998 Werner KochWerner Koch1998-12-231-3/+3
|
* See ChangeLog: Thu Dec 10 20:15:36 CET 1998 Werner KochWerner Koch1998-12-101-0/+1
|
* Some bug fixes of the last releaseWerner Koch1998-11-101-1/+1
|
* *** empty log message ***Werner Koch1998-09-281-1/+1
|
* New releaseWerner Koch1998-09-141-2/+3
|
* *** empty log message ***Werner Koch1998-09-111-3/+6
|
* bug fix releaseV0-3-4Werner Koch1998-08-111-19/+6
|
* ready for a new releaseWerner Koch1998-08-081-9/+56
|
* intermediate check inWerner Koch1998-08-051-26/+60
|
* edit-key is now completeWerner Koch1998-07-291-1/+5
|