aboutsummaryrefslogtreecommitdiffstats
path: root/g10/trustdb.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* * encode.c (encode_simple): Show cipher with --verbose.David Shaw2004-02-241-1/+1
| | | | | | | | | | | | * options.h, g10.c (main), keyedit.c (sign_keys): Add --ask-cert-level option to enable cert level prompts during sigs. Defaults to on. Simplify --default-cert-check-level to --default-cert-level. If ask-cert-level is off, or batch is on, use the default-cert-level as the cert level. * options.h, g10.c (main), trustdb.c (mark_usable_uid_certs): Simplify --min-cert-check-level to --min-cert-level.
* * options.h, g10.c (main), trustdb.c (mark_usable_uid_certs): AddDavid Shaw2004-02-231-2/+5
| | | | | | | | | --min-cert-check-level option to specify minimum cert check level. Defaults to 1 (so no sigs are ignored). 0x10 sigs cannot be ignored. * options.h, g10.c (main), plaintext.c (handle_plaintext): Add --max-output option to help people deal with decompression bombs.
* * getkey.c (merge_selfsigs_main, merge_selfsigs_subkey,David Shaw2003-12-051-2/+2
| | | | | | | | | | | | | get_seckey_byname2): Disallow use of encrypt-only v3 Elgamal keys for anything except revocations. * sign.c (do_sign): Add Elgamal encrypt-only keys to the signature catchall. * trustdb.c (mark_usable_uid_certs): Disallow signatures to and from Elgamal encrypt-only keys in the trustdb. Granted, this sounds strange, but there are historical keys that fit this description.
* * g10.c (strusage, main): Show development version warning in --versionDavid Shaw2003-12-021-2/+18
| | | | | | | | output. * trustdb.c (mark_usable_uid_certs): Disallow signatures to and from an Elgamal signing key in the trustdb.
* * trustdb.c (validate_keys): Reset the trustdb before checking if we haveDavid Shaw2003-11-291-4/+4
| | | | | | | any ultimately trusted keys. This ensures that if we lose all our ultimately trusted keys, we don't leave behind the old validity calculations.
* * trustdb.h, trustdb.c (read_trust_options): New. Returns items from theDavid Shaw2003-07-211-2/+18
| | | | | | | trustdb version record. * keylist.c (public_key_list): Use it here for the new "tru" record.
* * hkp.c (hkp_search): Return proper error code on failure.David Shaw2003-06-181-7/+10
| | | | | | | | | | | * keyedit.c (sign_uids): Do not allow signing a user ID without a self-signature. --expert overrides. * options.skel: Use subkeys.pgp.net as the default keyserver. * trustdb.c (validate_one_keyblock): Certifications on revoked or expired uids do not count in the web of trust.
* * g10.c (main): New --gnupg option to disable the various --openpgp,David Shaw2003-05-091-2/+17
| | | | | | | | | | | | | | | | --pgpX, etc. options. This is the same as --no-XXXX for those options. * packet.h, getkey.c (skip_disabled), keylist.c (print_capabilities): New "pk_is_disabled" macro to retrieve the cached disabled value if available, and fill it in via cache_disabled_value if not available. * trustdb.h, gpgv.c (is_disabled), trustdb.c (is_disabled): Rename to cache_disabled_value. Cache the result of the check so we don't need to hit the trustdb more than once. * trustdb.c (get_validity): Cache the disabled value since we have it handy and it might be useful later.
* * keyedit.c (sign_uids): Show keyid of the key making the signature.David Shaw2003-05-071-14/+4
| | | | | | | | | | | * trustdb.h, trustdb.c (is_disabled), keylist.c (print_capabilities), gpgv.c (is_disabled): is_disabled now takes a pk and not just the keyid. This is for speed since there is no need to re-fetch a key when we already have that key handy. * getkey.c (skip_disabled): New function to get a pk and call is_disabled on it. (key_byname): Use it here.
* * pkclist.c (do_we_trust_pre): If an untrusted key was chosen by aDavid Shaw2003-04-301-12/+41
| | | | | | | | | | | | | | particular user ID, use that ID as the one to ask about when prompting whether to use the key anyway. (build_pk_list): Similar change here when adding keys to the recipient list. * trustdb.c (update_validity): Fix bug that prevented more than one validity record per trust record. (get_validity): When retrieving validity for a (user) supplied user ID, return the validity for that user ID only, and do not fall back to the general key validity. (validate_one_keyblock): Some commentary on whether non-self-signed user IDs belong in the web of trust (arguably, they do).
* * mainproc.c (check_sig_and_print): Show sig class when verifying a sigDavid Shaw2003-04-271-3/+3
| | | | | | | | | | | | | with --verbose on, and add version, pk and hash algorithms and sig class to VALIDSIG. * g10.c (main): Add --no-textmode. * export.c (do_export_stream), keyedit.c (show_key_with_all_names, menu_addrevoker), mainproc.c (check_sig_and_print), photoid.c (show_photos), trustdb.c (get_validity, reset_trust_records, validate_keys): Make some strings translatable.
* * trustdb.c (validate_keys): Mask the ownertrust when building the list ofDavid Shaw2003-02-261-4/+4
| | | | | | | | | | | | fully valid keys so that disabled keys are still counted in the web of trust. * gpgv.c (main): Fix bug #113 - gpgv should accept the --ignore-time-conflict option. * g10.c (main): Use 3DES for the s2k cipher in --openpgp mode. Double the amount of secure memory to 32k (keys are getting bigger these days).
* * trustdb.h, trustdb.c (trust_letter): Make static. (get_ownertrust_info,David Shaw2003-01-101-7/+8
| | | | | | | get_validity_info): Don't mask the trust level twice. * armor.c (armor_filter): Comment about PGP's end of line tab problem.
* * packet.h, pkclist.c (build_pk_list), free-packet.cDavid Shaw2003-01-091-4/+13
| | | | | | | | | | (release_public_key_parts): Remove unused namehash element for public keys. * trustdb.h, gpgv.c, trustdb.c (get_validity, get_validity_info): Pass a user ID in rather than a namehash, so we only have to do the hashing in one place.
* * packet.h, tdbio.h, tdbio.c (tdbio_read_record, tdbio_write_record),David Shaw2003-01-061-83/+145
| | | | | | | | | | | | trustdb.c (update_validity): Store temporary full & marginal counts in the trustdb. (clear_validity, get_validity_counts): Return and clear temp counts. (store_validation_status): Keep track of which keyids have been stored. (validate_one_keyblock, validate_key_list): Use per-uid copies of the full & marginal counts so they can be recalled for multiple levels. (validate_keys): Only use unused keys for each new round. (reset_unconnected_keys): Rename to reset_trust_records, and only skip specifically excluded records.
* * keylist.c (print_capabilities): Show 'D' for disabled keys inDavid Shaw2003-01-061-2/+0
| | | | | | | capabilities section. * trustdb.c (is_disabled): Remove incorrect comment.
* * keydb.h, getkey.c (key_byname): Flag to enable or disable includingDavid Shaw2002-12-191-0/+38
| | | | | | | | | | | | | | | | | | disabled keys. Keys specified via keyid (i.e. 0x...) are always included. * getkey.c (get_pubkey_byname, get_seckey_byname2, get_seckey_bynames), keyedit.c (keyedit_menu, menu_addrevoker): Include disabled keys in these functions. * pkclist.c (build_pk_list): Do not include disabled keys for -r or the key prompt. Do include disabled keys for the default key and --encrypt-to. * trustdb.h, trustdb.c (is_disabled): New skipfnc for skipping disabled keys. * gpgv.c (is_disabled): Stub.
* * import.c (import_secret_one): Check for an illegal (>110) protectionDavid Shaw2002-10-021-9/+1
| | | | | | | | | | | | | | | cipher when importing a secret key. * keylist.c (list_keyblock_print): Show a '#' for a secret-parts-missing key. * parse_packet.c (parse_key): Some comments. * revoke.c (gen_revoke): Remove some debugging code. * trustdb.c (verify_own_keys): Make trusted-key a non-deprecated option again.
* Update head to match stable 1.0David Shaw2002-06-291-2512/+1336
|
* Changed keyring handling - saving still does not work.Werner Koch2000-10-101-3/+3
| | | | | Added new cipher mode and updated cipher test program.
* See ChangeLog: Mon Sep 18 16:35:45 CEST 2000 Werner KochWerner Koch2000-09-181-27/+96
|
* See ChangeLog: Fri Jul 14 19:38:23 CEST 2000 Werner KochWerner Koch2000-07-141-67/+227
|
* See ChangeLog: Thu Jan 27 18:00:44 CET 2000 Werner KochWerner Koch2000-01-271-39/+39
|
* See ChangeLog: Mon Jan 24 13:04:28 CET 2000 Werner KochWerner Koch2000-01-241-25/+25
|
* See ChangeLog: Sat Nov 13 17:44:23 CET 1999 Werner KochWerner Koch1999-11-131-2/+3
|
* See ChangeLog: Tue Oct 26 14:10:21 CEST 1999 Werner KochWerner Koch1999-10-261-4/+4
|
* See ChangeLog: Wed Sep 1 15:30:44 CEST 1999 Werner KochWerner Koch1999-09-011-1/+1
|
* See ChangeLog: Mon Jul 26 09:34:46 CEST 1999 Werner KochWerner Koch1999-07-261-1/+1
|
* See ChangeLog: Tue Jul 13 17:39:25 CEST 1999 Werner KochWerner Koch1999-07-131-1/+1
|
* See ChangeLog: Thu Jul 8 16:21:27 CEST 1999 Werner KochWerner Koch1999-07-081-0/+4
|
* See ChangeLog: Wed Jul 7 13:23:40 CEST 1999 Werner KochWerner Koch1999-07-071-238/+194
|
* See ChangeLog: Fri Jul 2 11:45:54 CEST 1999 Werner KochWerner Koch1999-07-021-13/+30
|
* See ChangeLog: Thu Jul 1 12:47:31 CEST 1999 Werner KochWerner Koch1999-07-011-48/+72
|
* See ChangeLog: Tue Jun 29 21:44:25 CEST 1999 Werner KochWerner Koch1999-06-291-1124/+604
|
* See ChangeLog: Thu May 6 14:18:17 CEST 1999 Werner KochWerner Koch1999-05-061-0/+30
|
* See ChangeLog: Wed Mar 17 13:09:03 CET 1999 Werner KochWerner Koch1999-03-171-81/+294
|
* See ChangeLog: Thu Mar 11 16:39:46 CET 1999 Werner KochWerner Koch1999-03-111-1511/+1098
|
* See ChangeLog: Mon Mar 8 20:47:17 CET 1999 Werner KochWerner Koch1999-03-081-363/+273
|
* See ChangeLog: Tue Mar 2 10:38:42 CET 1999 Werner KochWerner Koch1999-03-021-3/+15
|
* See ChangeLog: Thu Feb 25 18:47:39 CET 1999 Werner KochWerner Koch1999-02-251-0/+15
|
* See ChangeLog: Wed Feb 24 11:07:27 CET 1999 Werner KochWerner Koch1999-02-241-12/+58
|
* See ChangeLog: Tue Feb 16 14:10:02 CET 1999 Werner KochWerner Koch1999-02-161-31/+31
|
* See ChangeLog: Wed Feb 10 17:15:39 CET 1999 Werner KochWerner Koch1999-02-101-45/+208
|
* See ChangeLog: Sat Jan 9 18:54:57 CET 1999 Werner KochWerner Koch1999-01-091-1/+1
|
* See ChangeLog: Tue Dec 29 19:55:38 CET 1998 Werner KochWerner Koch1998-12-291-2/+11
|
* See ChangeLog: Tue Dec 29 14:41:47 CET 1998 Werner KochWerner Koch1998-12-291-4/+4
|
* See ChangeLog: Wed Dec 23 13:34:22 CET 1998 Werner KochWerner Koch1998-12-231-5/+27
|
* See ChangeLog: Thu Dec 17 18:31:15 CET 1998 Werner KochWerner Koch1998-12-171-33/+100
|
* See ChangeLog: Tue Dec 8 13:15:16 CET 1998 Werner KochWerner Koch1998-12-081-8/+103
|
* some bug fixesWerner Koch1998-11-181-55/+90
|