aboutsummaryrefslogtreecommitdiffstats
path: root/g10/sign.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2010-10-20Make public key data structure easier to read.Werner Koch1-5/+44
Check vor v1 card while signing.
2010-10-18Fix a signing problem with the cardWerner Koch1-53/+23
2010-10-01Exporting secret keys via gpg-agent is now basically supported.Werner Koch1-2/+3
A couple of forward ported changes. Doc updates.
2010-09-06Removed more secret key related code.Werner Koch1-1/+1
It builds fine and passes some of the tests but there are quite some features which don't work yet.
2010-09-01Even less prompts for a new key now.Werner Koch1-16/+19
2010-04-27Provide a useful pinentry prompt.Werner Koch1-4/+1
2010-04-23Decryption and signi via agent is now implemented.Werner Koch1-4/+10
2010-04-21More changes on the way to remove secring.gpg.Werner Koch1-0/+3
2010-04-20Generating an OpenPGP key cia gpg-agent basically works.Werner Koch1-61/+111
2010-04-01Use gpg_err_set_errno to assign values to ERRNO.Werner Koch1-6/+6
2010-02-26Some minor changes and typo fixes.Werner Koch1-6/+9
Started to implement a TCP option in gpg-connect-agent.
2010-02-02Various changes to eventually support openpgp keys in pgp-agent.Werner Koch1-188/+192
Comment fixes. Minor chnages in preparation of a W32CE port.
2009-09-30Some changes to suport g13.Werner Koch1-3/+4
2009-05-11Print 'empty file' warning only with --verbose.Werner Koch1-1/+1
2008-09-29Remove hacks which are not anymore needed since we now require Libgcrypt 1.4Werner Koch1-3/+1
2007-12-12Support DSA2.Werner Koch1-7/+9
Support Camellia for testing. More audit stuff.
2007-11-19Started to implement the audit log feature.Werner Koch1-1/+1
Pass PINENTRY_USER_DATA and XAUTHORITY to Pinentry. Improved support for the quality bar. Minor internal restructuring. Translation fixes.
2007-10-25Ported changes from 1.4.Werner Koch1-43/+15
Add copyright notices.
2007-07-04Changed to GPLv3.Werner Koch1-4/+2
Removed intl/.
2007-06-21Implemented the --gen-key command as we can't use the gpgsm-gencert.sh under ↵Werner Koch1-0/+1
Windows.
2007-06-20[w32] gpg-agent is now started automagically by gpgsm.Werner Koch1-4/+1
2007-01-30Added LIBINTL to more Makefile targets.Werner Koch1-2/+3
doc/ * com-certs.pem: Added the current root certifcates of D-Trust and S-Trust. g10/ * status.c (write_status_begin_signing): New. * sign.c (sign_file, sign_symencrypt_file): Call it. * textfilter.c (copy_clearsig_text): Call it. * call-agent.c (agent_scd_pksign): Pass --hash-rmd160 to SCD if required. * gpg.c (main): Let --no-use-agent and --gpg-agent-info print a warning. * misc.c (obsolete_option): New.
2006-12-06Fixes for CVE-2006-6235Werner Koch1-20/+30
2006-10-02Fix for bug 537Werner Koch1-6/+6
2006-09-14Take advantage of newer gpg-error features.Werner Koch1-6/+6
2006-07-27Preparing a new releasegnupg-1.9.22Werner Koch1-45/+56
2006-06-28* keydb.h, pkclist.c (select_algo_from_prefs, algo_available): Pass aDavid Shaw1-6/+8
union for preference hints rather than doing void * games. * sign.c (sign_file): Use it here.
2006-06-28* sign.c (sign_file): When signing with multiple DSA keys, one being DSA1David Shaw1-49/+43
and one being DSA2 and encrypting at the same time, if the recipient preferences give a hash that can work with the DSA2 key, then allow the DSA1 key to be promoted rather than giving up and using hash_for().
2006-06-27Ported patches from 1.4.x Werner Koch1-1/+8
2006-06-22* sign.c (do_sign): Accept a truncated hash even for DSA1 keys (be liberalDavid Shaw1-0/+7
in what you accept, etc).
2006-05-23g10/ does build again.Werner Koch1-1/+1
2006-05-23* parse-packet.c (dump_sig_subpkt, parse_signature), build-packet.cDavid Shaw1-1/+1
(build_sig_subpkt_from_sig), getkey.c (fixup_uidnode, merge_selfsigs_main, merge_selfsigs_subkey), keygen.c (keygen_add_key_expire): Fix meaning of key expiration and sig expiration subpackets - zero means "never expire" according to 2440, not "expire instantly".
2006-04-28Merged recent changes from 1.4Werner Koch1-37/+86
2006-04-21Still merging 1.4.3 code backWerner Koch1-2/+3
2006-04-20* options.h, gpg.c (main): Add --enable-dsa2 and --disable-dsa2. DefaultsDavid Shaw1-30/+103
to disable. * pkclist.c (algo_available): If --enable-dsa2 is set, we're allowed to truncate hashes to fit DSA keys. * sign.c (match_dsa_hash): New. Return the best match hash for a given q size. (do_sign, hash_for, sign_file): When signing with a DSA key, if it has q==160, assume it is an old DSA key and don't allow truncation unless --enable-dsa2 is also set. q!=160 always allows truncation since they must be DSA2 keys. (make_keysig_packet): If the user doesn't specify a --cert-digest-algo, use match_dsa_hash to pick the best hash for key signatures.
2006-04-20* gpg.c (print_mds), armor.c (armor_filter, parse_hash_header): AddDavid Shaw1-15/+2
SHA-224. * sign.c (write_plaintext_packet), encode.c (encode_simple): Factor common literal packet setup code from here, to... * main.h, plaintext.c (setup_plaintext_name): Here. New. Make sure the literal packet filename field is UTF-8 encoded. * options.h, gpg.c (main): Make sure --set-filename is UTF-8 encoded and note when filenames are already UTF-8.
2006-04-19Continued with merging.Werner Koch1-33/+33
Still does not build.
2006-04-19Merged with gpg 1.4.3 code. Werner Koch1-271/+379
The gpg part does not yet build.
2006-04-03About to release 1.4.3gnupg-1.4.3Werner Koch1-1/+5
2006-03-30* main.h, seskey.c (encode_md_value): Modify to allow a q size greaterDavid Shaw1-5/+12
than 160 bits as per DSA2. This will allow us to verify and issue DSA2 signatures for some backwards compatibility once we start generating DSA2 keys. * sign.c (do_sign), sig-check.c (do_check): Change all callers. * sign.c (do_sign): Enforce the 160-bit check for new signatures here since encode_md_value can handle non-160-bit digests now. This will need to come out once the standard for DSA2 is firmed up.
2006-03-08* options.h, sign.c (mk_notation_policy_etc), gpg.c (add_notation_data):David Shaw1-43/+28
Use it here for the various notation commands. * packet.h, main.h, keygen.c (keygen_add_notations), build-packet.c (string_to_notation, sig_to_notation) (free_notation): New "one stop shopping" functions to handle notations and start removing some code duplication.
2006-03-07* sign.c (make_keysig_packet): Don't use MD5 for a RSA_S key as thatDavid Shaw1-3/+2
is not a PGP 2.x algorithm.
2006-01-01* sign.c (write_signature_packets): Lost a digest_algo line.David Shaw1-0/+1
2006-01-01* sign.c (hash_for): Add code to detect if the sk lives on a smartDavid Shaw1-18/+27
card. If it does, only allow 160-bit hashes, a la DSA. This involves passing the *sk in, so change all callers. This is correct for today, given the current 160-bit q in DSA, and the current SHA-1/RIPEMD160 support in the openpgp card. It will almost certainly need changing down the road. * app-openpgp.c (do_sign): Give user error if hash algorithm is not supported by the card.
2005-10-05Renamed g10.c to gpg.cWerner Koch1-2/+4
Filelength fixes for W32.
2005-07-27Converted all m_free to xfree etc.Werner Koch1-21/+21
2005-05-31Updated FSF street address and preparations for a release candidate.Werner Koch1-1/+2
2005-05-06* main.h, keygen.c (parse_expire_string, ask_expire_interval), sign.cDavid Shaw1-3/+3
(sign_file, clearsign_file, sign_symencrypt_file), g10.c (main), keyedit.c (sign_uids): Use seconds rather than days internally to calculate expiration. We no longer need the day-based code as we don't generate v3 keys.
2005-05-06* sign.c (sign_file, clearsign_file, sign_symencrypt_file): Use theDavid Shaw1-6/+6
default sig expire value when signing in batchmode.
2005-05-05* options.h, g10.c (main): Add new --default-sig-expire andDavid Shaw1-8/+23
--default-cert-expire options. Suggested by Florian Weimer. * main.h, keygen.c (parse_expire_string, ask_expire_interval): Use defaults passed in, or "0" to control what default expiration is. * keyedit.c (sign_uids), sign.c (sign_file, clearsign_file, sign_symencrypt_file): Call them here, so that default expiration is used when --ask-xxxxx-expire is off.