aboutsummaryrefslogtreecommitdiffstats
path: root/g10/sign.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* * pkclist.c (algo_available): PGP 8 can use the SHA-256 hash.David Shaw2003-04-041-7/+6
| | | | | | * sign.c (sign_file, clearsign_file, sign_symencrypt_file): Remove unused code.
* * sign.c (sign_file): Do not push textmode filter onto an unopened IOBUFDavid Shaw2003-02-221-2/+10
| | | | | | | | | | | | | (segfault). Noted by Marcus Brinkmann. Push and reinitialize textmode filter for each file in a multiple file list. * packet.h, getkey.c (fixup_uidnode), keyedit.c (show_prefs): Set and show the keyserver no-modify flag. * keygen.c (add_keyserver_modify): New. (keygen_upd_std_prefs): Call it here. (keygen_set_std_prefs): Accept "ks-modify" and "no-ks-modify" as prefs to set and unset keyserver modify flag.
* * g10.c (add_group): Trim whitespace after a group name so it does notDavid Shaw2003-01-161-2/+2
| | | | | | | | | | | | | | | | matter where the user puts the = sign. * options.skel: Comment out the first three lines in case someone manually copies the skel file to their homedir. * sign.c (clearsign_file): Only use pgp2mode with v3 keys and MD5. This matches what we do when decoding such messages and prevents creating a message (v3+RIPEMD/160) that we can't verify. * sig-check.c (signature_check2): Use G10ERR_GENERAL as the error for signature digest conflict. BAD_SIGN implies that a signature was checked and we may try and print out a user ID for a key that doesn't exist.
* * main.h, keyedit.c, keygen.c: Back out previous (2002-12-01) change.David Shaw2002-12-041-15/+36
| | | | | | | | | | | | | | | | | | | | | | | | Minimal isn't always best. * sign.c (update_keysig_packet): Use the current time rather then a modification of the original signature time. Make sure that this doesn't cause a time warp. * keygen.c (keygen_add_key_expire): Properly handle a key expiration date in the past (use a duration of 0). * keyedit.c (menu_expire): Use update_keysig_packet so any sig subpackets are maintained during the update. * build-packet.c (build_sig_subpkt): Mark sig expired or unexpired when the sig expiration subpacket is added. (build_sig_subpkt_from_sig): Handle making an expiration subpacket from a sig that has already expired (use a duration of 0). * packet.h, sign.c (update_keysig_packet), keyedit.c (menu_set_primary_uid, menu_set_preferences): Add ability to issue 0x18 subkey binding sigs to update_keysig_packet and change all callers.
* * main.h, misc.c (default_cipher_algo, default_compress_algo): New.David Shaw2002-11-251-14/+5
| | | | | | | | | | | | Return the default algorithm by trying --cipher-algo/--compress-algo, then the first item in the pref list, then s2k-cipher-algo or ZIP. * sign.c (sign_file, sign_symencrypt_file), encode.c (encode_simple, encode_crypt): Call default_cipher_algo and default_compress_algo to get algorithms. * g10.c (main): Allow pref selection for compress algo with --openpgp.
* * sign.c (hash_for): If --digest-algo is not set, butDavid Shaw2002-11-251-8/+32
| | | | | | | | --personal-digest-preferences is, then use the first hash algorithm in the personal list. If the signing algorithm is DSA, then use the first 160-bit hash algorithm in the personal list. If --pgp2 is set and it's a v3 RSA key, use MD5.
* * encode.c (encode_simple), passphrase.c (passphrase_to_dek), sign.cDavid Shaw2002-11-241-2/+1
| | | | | | (sign_symencrypt_file): Use --s2k-digest-algo for passphrase mangling rather than --digest-algo.
* * build-packet.c (do_plaintext), encode.c (encode_sesskey, encode_simple,David Shaw2002-10-311-1/+1
| | | | | | | encode_crypt), sign.c (write_plaintext_packet): Use wipememory() instead of memset() to wipe sensitive memory as the memset() might be optimized away.
* tidied RISC OS filetype supportStefan Bellon2002-10-291-1/+2
|
* * keylist.c, keyedit.c, keyserver.c, sign.c: Some TODOs and comments.David Shaw2002-08-201-1/+3
| | | | | | | | | * export.c (do_export_stream): Fix noop bug in exporting sensitive revocation keys. * pkclist.c (do_edit_ownertrust): Comment out the option for showing trust paths until it can be implemented.
* * getkey.c (get_user_id_native): Renamed to ..Werner Koch2002-08-191-2/+2
| | | | | | | | | | | | (get_user_id_printable): this. Filter out all dangerous characters. Checked all usages. (get_user_id_string_native): Renamed to.. (get_user_id_string_printable): this. Filter out all dangerous characters. Checked all usages. * keyedit.c (show_basic_key_info): New. * keylist.c (print_fingerprint): New mode 3. * import.c (import_one): Use new function to display the user ID.
* * encode.c (encode_crypt), g10.c (main), sign.c (sign_file,David Shaw2002-08-061-2/+2
| | | | | | | | | clearsign_file): Use the same --pgpX warning string everywhere to ease translations. * encode.c (write_pubkey_enc_from_list): Warn when using --throw-keyid with --pgpX. Noted by Vedaal Nistar.
* Update head to match stable 1.0David Shaw2002-06-291-436/+840
|
* See ChangeLog: Wed Oct 4 13:16:18 CEST 2000 Werner KochWerner Koch2000-10-041-177/+123
|
* See ChangeLog: Mon Sep 18 16:35:45 CEST 2000 Werner KochWerner Koch2000-09-181-0/+4
|
* See ChangeLog: Mon Jul 31 10:04:47 CEST 2000 Werner KochWerner Koch2000-07-311-2/+2
|
* See ChangeLog: Tue Jul 25 17:44:15 CEST 2000 Werner KochWerner Koch2000-07-251-16/+14
|
* See ChangeLog: Fri Jul 14 19:38:23 CEST 2000 Werner KochWerner Koch2000-07-141-6/+46
|
* See ChangeLog: Thu Jan 27 18:00:44 CET 2000 Werner KochWerner Koch2000-01-271-14/+14
|
* See ChangeLog: Mon Jan 24 13:04:28 CET 2000 Werner KochWerner Koch2000-01-241-11/+10
|
* See ChangeLog: Wed Dec 8 21:58:32 CET 1999 Werner KochWerner Koch1999-12-081-7/+7
|
* See ChangeLog: Mon Nov 15 21:36:02 CET 1999 Werner KochWerner Koch1999-11-151-1/+1
|
* See ChangeLog: Sat Nov 13 17:44:23 CET 1999 Werner KochWerner Koch1999-11-131-10/+67
|
* See ChangeLog: Tue Oct 26 14:10:21 CEST 1999 Werner KochWerner Koch1999-10-261-70/+79
|
* See ChangeLog: Wed Aug 4 10:34:46 CEST 1999 Werner KochV0-9-10Werner Koch1999-08-041-3/+4
|
* See ChangeLog: Mon Jul 26 09:34:46 CEST 1999 Werner KochWerner Koch1999-07-261-23/+43
|
* See ChangeLog: Wed May 26 14:36:29 CEST 1999 Werner KochWerner Koch1999-05-261-27/+37
|
* See ChangeLog: Tue May 25 19:50:32 CEST 1999 Werner KochWerner Koch1999-05-251-2/+54
|
* See ChangeLog: Thu May 20 14:04:08 CEST 1999 Werner KochWerner Koch1999-05-201-1/+1
|
* See ChangeLog: Thu Apr 29 12:29:22 CEST 1999 Werner KochWerner Koch1999-04-291-3/+12
|
* See ChangeLog: Wed Apr 28 13:03:03 CEST 1999 Werner KochWerner Koch1999-04-281-2/+3
|
* See ChangeLog: Mon Apr 26 17:48:15 CEST 1999 Werner KochWerner Koch1999-04-261-1/+1
|
* See ChangeLog: Tue Mar 2 16:44:57 CET 1999 Werner KochWerner Koch1999-03-021-16/+2
|
* See ChangeLog: Tue Mar 2 10:38:42 CET 1999 Werner KochWerner Koch1999-03-021-100/+0
|
* See ChangeLog: Thu Jan 21 06:22:10 CET 1999 Werner KochV0-9-2Werner Koch1999-01-211-1/+1
|
* See ChangeLog: Wed Jan 20 18:59:49 CET 1999 Werner KochWerner Koch1999-01-201-8/+19
|
* See ChangeLog: Sun Jan 17 11:04:33 CET 1999 Werner KochWerner Koch1999-01-171-2/+0
|
* See ChangeLog: Tue Jan 12 11:17:18 CET 1999 Werner KochWerner Koch1999-01-121-0/+10
|
* See ChangeLog: Sat Jan 9 16:02:23 CET 1999 Werner KochWerner Koch1999-01-091-1/+1
|
* See ChangeLog: Tue Dec 29 14:41:47 CET 1998 Werner KochWerner Koch1998-12-291-5/+5
|
* See ChangeLog: Wed Dec 23 17:12:24 CET 1998 Werner KochV0-9-0Werner Koch1998-12-231-1/+1
|
* See ChangeLog: Wed Dec 23 13:34:22 CET 1998 Werner KochWerner Koch1998-12-231-3/+3
|
* See ChangeLog: Thu Dec 17 18:31:15 CET 1998 Werner KochWerner Koch1998-12-171-2/+25
|
* See ChangeLog: Thu Dec 10 20:15:36 CET 1998 Werner KochWerner Koch1998-12-101-2/+2
|
* See ChangeLog: Wed Dec 9 13:41:06 CET 1998 Werner KochWerner Koch1998-12-091-0/+6
|
* See ChangeLog: Fri Nov 27 15:30:24 CET 1998 Werner KochWerner Koch1998-11-271-0/+1
|
* Expiration time works (I hope so)Werner Koch1998-11-201-2/+23
|
* Some bug fixes of the last releaseWerner Koch1998-11-101-9/+10
|
* some random changesWerner Koch1998-10-251-2/+3
|
* Epxerimenta support for GDBM keyings.Werner Koch1998-10-211-6/+3
|