aboutsummaryrefslogtreecommitdiffstats
path: root/g10/trustdb.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2004-02-24* encode.c (encode_simple): Show cipher with --verbose.David Shaw1-1/+1
* options.h, g10.c (main), keyedit.c (sign_keys): Add --ask-cert-level option to enable cert level prompts during sigs. Defaults to on. Simplify --default-cert-check-level to --default-cert-level. If ask-cert-level is off, or batch is on, use the default-cert-level as the cert level. * options.h, g10.c (main), trustdb.c (mark_usable_uid_certs): Simplify --min-cert-check-level to --min-cert-level.
2004-02-23* options.h, g10.c (main), trustdb.c (mark_usable_uid_certs): AddDavid Shaw1-2/+5
--min-cert-check-level option to specify minimum cert check level. Defaults to 1 (so no sigs are ignored). 0x10 sigs cannot be ignored. * options.h, g10.c (main), plaintext.c (handle_plaintext): Add --max-output option to help people deal with decompression bombs.
2003-12-05* getkey.c (merge_selfsigs_main, merge_selfsigs_subkey,David Shaw1-2/+2
get_seckey_byname2): Disallow use of encrypt-only v3 Elgamal keys for anything except revocations. * sign.c (do_sign): Add Elgamal encrypt-only keys to the signature catchall. * trustdb.c (mark_usable_uid_certs): Disallow signatures to and from Elgamal encrypt-only keys in the trustdb. Granted, this sounds strange, but there are historical keys that fit this description.
2003-12-02* g10.c (strusage, main): Show development version warning in --versionDavid Shaw1-2/+18
output. * trustdb.c (mark_usable_uid_certs): Disallow signatures to and from an Elgamal signing key in the trustdb.
2003-11-29* trustdb.c (validate_keys): Reset the trustdb before checking if we haveDavid Shaw1-4/+4
any ultimately trusted keys. This ensures that if we lose all our ultimately trusted keys, we don't leave behind the old validity calculations.
2003-07-21* trustdb.h, trustdb.c (read_trust_options): New. Returns items from theDavid Shaw1-2/+18
trustdb version record. * keylist.c (public_key_list): Use it here for the new "tru" record.
2003-06-18* hkp.c (hkp_search): Return proper error code on failure.David Shaw1-7/+10
* keyedit.c (sign_uids): Do not allow signing a user ID without a self-signature. --expert overrides. * options.skel: Use subkeys.pgp.net as the default keyserver. * trustdb.c (validate_one_keyblock): Certifications on revoked or expired uids do not count in the web of trust.
2003-05-09* g10.c (main): New --gnupg option to disable the various --openpgp,David Shaw1-2/+17
--pgpX, etc. options. This is the same as --no-XXXX for those options. * packet.h, getkey.c (skip_disabled), keylist.c (print_capabilities): New "pk_is_disabled" macro to retrieve the cached disabled value if available, and fill it in via cache_disabled_value if not available. * trustdb.h, gpgv.c (is_disabled), trustdb.c (is_disabled): Rename to cache_disabled_value. Cache the result of the check so we don't need to hit the trustdb more than once. * trustdb.c (get_validity): Cache the disabled value since we have it handy and it might be useful later.
2003-05-07* keyedit.c (sign_uids): Show keyid of the key making the signature.David Shaw1-14/+4
* trustdb.h, trustdb.c (is_disabled), keylist.c (print_capabilities), gpgv.c (is_disabled): is_disabled now takes a pk and not just the keyid. This is for speed since there is no need to re-fetch a key when we already have that key handy. * getkey.c (skip_disabled): New function to get a pk and call is_disabled on it. (key_byname): Use it here.
2003-04-30* pkclist.c (do_we_trust_pre): If an untrusted key was chosen by aDavid Shaw1-12/+41
particular user ID, use that ID as the one to ask about when prompting whether to use the key anyway. (build_pk_list): Similar change here when adding keys to the recipient list. * trustdb.c (update_validity): Fix bug that prevented more than one validity record per trust record. (get_validity): When retrieving validity for a (user) supplied user ID, return the validity for that user ID only, and do not fall back to the general key validity. (validate_one_keyblock): Some commentary on whether non-self-signed user IDs belong in the web of trust (arguably, they do).
2003-04-27* mainproc.c (check_sig_and_print): Show sig class when verifying a sigDavid Shaw1-3/+3
with --verbose on, and add version, pk and hash algorithms and sig class to VALIDSIG. * g10.c (main): Add --no-textmode. * export.c (do_export_stream), keyedit.c (show_key_with_all_names, menu_addrevoker), mainproc.c (check_sig_and_print), photoid.c (show_photos), trustdb.c (get_validity, reset_trust_records, validate_keys): Make some strings translatable.
2003-02-26* trustdb.c (validate_keys): Mask the ownertrust when building the list ofDavid Shaw1-4/+4
fully valid keys so that disabled keys are still counted in the web of trust. * gpgv.c (main): Fix bug #113 - gpgv should accept the --ignore-time-conflict option. * g10.c (main): Use 3DES for the s2k cipher in --openpgp mode. Double the amount of secure memory to 32k (keys are getting bigger these days).
2003-01-10* trustdb.h, trustdb.c (trust_letter): Make static. (get_ownertrust_info,David Shaw1-7/+8
get_validity_info): Don't mask the trust level twice. * armor.c (armor_filter): Comment about PGP's end of line tab problem.
2003-01-09* packet.h, pkclist.c (build_pk_list), free-packet.cDavid Shaw1-4/+13
(release_public_key_parts): Remove unused namehash element for public keys. * trustdb.h, gpgv.c, trustdb.c (get_validity, get_validity_info): Pass a user ID in rather than a namehash, so we only have to do the hashing in one place.
2003-01-06* packet.h, tdbio.h, tdbio.c (tdbio_read_record, tdbio_write_record),David Shaw1-83/+145
trustdb.c (update_validity): Store temporary full & marginal counts in the trustdb. (clear_validity, get_validity_counts): Return and clear temp counts. (store_validation_status): Keep track of which keyids have been stored. (validate_one_keyblock, validate_key_list): Use per-uid copies of the full & marginal counts so they can be recalled for multiple levels. (validate_keys): Only use unused keys for each new round. (reset_unconnected_keys): Rename to reset_trust_records, and only skip specifically excluded records.
2003-01-06* keylist.c (print_capabilities): Show 'D' for disabled keys inDavid Shaw1-2/+0
capabilities section. * trustdb.c (is_disabled): Remove incorrect comment.
2002-12-19* keydb.h, getkey.c (key_byname): Flag to enable or disable includingDavid Shaw1-0/+38
disabled keys. Keys specified via keyid (i.e. 0x...) are always included. * getkey.c (get_pubkey_byname, get_seckey_byname2, get_seckey_bynames), keyedit.c (keyedit_menu, menu_addrevoker): Include disabled keys in these functions. * pkclist.c (build_pk_list): Do not include disabled keys for -r or the key prompt. Do include disabled keys for the default key and --encrypt-to. * trustdb.h, trustdb.c (is_disabled): New skipfnc for skipping disabled keys. * gpgv.c (is_disabled): Stub.
2002-10-02* import.c (import_secret_one): Check for an illegal (>110) protectionDavid Shaw1-9/+1
cipher when importing a secret key. * keylist.c (list_keyblock_print): Show a '#' for a secret-parts-missing key. * parse_packet.c (parse_key): Some comments. * revoke.c (gen_revoke): Remove some debugging code. * trustdb.c (verify_own_keys): Make trusted-key a non-deprecated option again.
2002-06-29Update head to match stable 1.0David Shaw1-2512/+1336
2000-10-10Changed keyring handling - saving still does not work.Werner Koch1-3/+3
Added new cipher mode and updated cipher test program.
2000-09-18See ChangeLog: Mon Sep 18 16:35:45 CEST 2000 Werner KochWerner Koch1-27/+96
2000-07-14See ChangeLog: Fri Jul 14 19:38:23 CEST 2000 Werner KochWerner Koch1-67/+227
2000-01-27See ChangeLog: Thu Jan 27 18:00:44 CET 2000 Werner KochWerner Koch1-39/+39
2000-01-24See ChangeLog: Mon Jan 24 13:04:28 CET 2000 Werner KochWerner Koch1-25/+25
1999-11-13See ChangeLog: Sat Nov 13 17:44:23 CET 1999 Werner KochWerner Koch1-2/+3
1999-10-26See ChangeLog: Tue Oct 26 14:10:21 CEST 1999 Werner KochWerner Koch1-4/+4
1999-09-01See ChangeLog: Wed Sep 1 15:30:44 CEST 1999 Werner KochWerner Koch1-1/+1
1999-07-26See ChangeLog: Mon Jul 26 09:34:46 CEST 1999 Werner KochWerner Koch1-1/+1
1999-07-13See ChangeLog: Tue Jul 13 17:39:25 CEST 1999 Werner KochWerner Koch1-1/+1
1999-07-08See ChangeLog: Thu Jul 8 16:21:27 CEST 1999 Werner KochWerner Koch1-0/+4
1999-07-07See ChangeLog: Wed Jul 7 13:23:40 CEST 1999 Werner KochWerner Koch1-238/+194
1999-07-02See ChangeLog: Fri Jul 2 11:45:54 CEST 1999 Werner KochWerner Koch1-13/+30
1999-07-01See ChangeLog: Thu Jul 1 12:47:31 CEST 1999 Werner KochWerner Koch1-48/+72
1999-06-29See ChangeLog: Tue Jun 29 21:44:25 CEST 1999 Werner KochWerner Koch1-1124/+604
1999-05-06See ChangeLog: Thu May 6 14:18:17 CEST 1999 Werner KochWerner Koch1-0/+30
1999-03-17See ChangeLog: Wed Mar 17 13:09:03 CET 1999 Werner KochWerner Koch1-81/+294
1999-03-11See ChangeLog: Thu Mar 11 16:39:46 CET 1999 Werner KochWerner Koch1-1511/+1098
1999-03-08See ChangeLog: Mon Mar 8 20:47:17 CET 1999 Werner KochWerner Koch1-363/+273
1999-03-02See ChangeLog: Tue Mar 2 10:38:42 CET 1999 Werner KochWerner Koch1-3/+15
1999-02-25See ChangeLog: Thu Feb 25 18:47:39 CET 1999 Werner KochWerner Koch1-0/+15
1999-02-24See ChangeLog: Wed Feb 24 11:07:27 CET 1999 Werner KochWerner Koch1-12/+58
1999-02-16See ChangeLog: Tue Feb 16 14:10:02 CET 1999 Werner KochWerner Koch1-31/+31
1999-02-10See ChangeLog: Wed Feb 10 17:15:39 CET 1999 Werner KochWerner Koch1-45/+208
1999-01-09See ChangeLog: Sat Jan 9 18:54:57 CET 1999 Werner KochWerner Koch1-1/+1
1998-12-29See ChangeLog: Tue Dec 29 19:55:38 CET 1998 Werner KochWerner Koch1-2/+11
1998-12-29See ChangeLog: Tue Dec 29 14:41:47 CET 1998 Werner KochWerner Koch1-4/+4
1998-12-23See ChangeLog: Wed Dec 23 13:34:22 CET 1998 Werner KochWerner Koch1-5/+27
1998-12-17See ChangeLog: Thu Dec 17 18:31:15 CET 1998 Werner KochWerner Koch1-33/+100
1998-12-08See ChangeLog: Tue Dec 8 13:15:16 CET 1998 Werner KochWerner Koch1-8/+103
1998-11-18some bug fixesWerner Koch1-55/+90