aboutsummaryrefslogtreecommitdiffstats
path: root/g10/trustdb.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* * trustdb.c (validate_keys): Mask the ownertrust when building the list ofDavid Shaw2003-03-041-2/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | fully valid keys so that disabled keys are still counted in the web of trust. (get_ownertrust_with_min): Do the same for the minimum ownertrust calculation. * parse-packet.c (dump_sig_subpkt): Show the notation names for not-human-readable notations. Fix cosmetic off-by-one length counter. * options.skel: Add explantion and commented-out "no-mangle-dos-filenames". * mainproc.c (proc_encrypted): Make string translatable. * keyserver.c (keyserver_spawn): Quote ':', '%', and any 8-bit characters in the uid strings sent to the keyserver helper. * keyring.c (keyring_rebuild_cache): Lock the keyring while rebuilding the signature caches to prevent another gpg from tampering with the temporary copy. * keygen.c (keygen_set_std_prefs): Include AES192 and AES256 in default prefs. * keyedit.c (show_prefs): Make strings translatable. * keydb.c: Double the maximum number of keyrings to 40. * gpgv.c (main): Fix bug #113 - gpgv should accept the --ignore-time-conflict option. * g10.c (main): --openpgp disables --pgpX. Double the amount of secure memory to 32k (keys are getting bigger these days). * Makefile.am: Makefile.am: Use @CAPLIBS@ to link in -lcap if we are using capabilities.
* * trustdb.c (init_trustdb, get_validity): Don't use a changed trust modelDavid Shaw2003-01-151-2/+4
| | | | | | | | to indicate a dirty trustdb, and never auto-rebuild a dirty trustdb with the "always" trust model. * g10.c (add_group): Last commit missed the \t ;)
* * packet.h, parse-packet.c (setup_user_id), free-packet.c (free_user_id),David Shaw2003-01-141-21/+7
| | | | | | | | | | | | keydb.h, keyid.c (namehash_from_uid): New function to rmd160-hash the contents of a user ID packet and cache it in the uid object. * keylist.c (list_keyblock_colon): Use namehash in field 8 of uids. Show dates for creation (selfsig date), and expiration in fields 6 and 7. * trustdb.c (get_validity, get_validity_counts, update_validity): Use new namehash function rather than hashing it locally.
* * trustdb.c (get_validity_info, get_ownertrust_info, trust_letter):David Shaw2003-01-111-32/+56
| | | | | | | | | | | | | | | | Simplify by returning a ? for error directly. * keyedit.c (show_key_with_all_names): Use get_validity_string and get_ownertrust_string to show full word versions of trust (i.e. "full" instead of 'f'). * trustdb.h, trustdb.c (get_ownertrust_string, get_validity_string): Same as get_ownertrust_info, and get_validity_info, except returns a full string. * trustdb.c (get_ownertrust_with_min): New. Same as 'get_ownertrust' but takes the min_ownertrust value into account.
* * armor.c (armor_filter): Comment about PGP's end of line tab problem.David Shaw2003-01-111-10/+20
| | | | | | | | | | | | | | | * trustdb.h, trustdb.c (trust_letter): Make static. (get_ownertrust_info, get_validity_info): Don't mask the trust level twice. * trustdb.h, gpgv.c, trustdb.c (get_validity, get_validity_info), keylist.c (list_keyblock_colon), keyedit.c (show_key_with_all_names_colon, menu_revuid): Pass a user ID in rather than a namehash, so we only have to do the hashing in one place. * packet.h, pkclist.c (build_pk_list), free-packet.c (release_public_key_parts): Remove unused namehash element for public keys.
* * trustdb.c (get_validity_info): 'd' for disabled is not a validity valueDavid Shaw2003-01-071-2/+0
| | | | | any more.
* * packet.h, tdbio.h, tdbio.c (tdbio_read_record, tdbio_write_record),David Shaw2003-01-061-91/+154
| | | | | | | | | | | | trustdb.c (update_validity): Store temporary full & marginal counts in the trustdb. (clear_validity, get_validity_counts): Return and clear temp counts. (store_validation_status): Keep track of which keyids have been stored. (validate_one_keyblock, validate_key_list): Use per-uid copies of the full & marginal counts so they can be recalled for multiple levels. (validate_keys): Only use unused keys for each new round. (reset_unconnected_keys): Rename to reset_trust_records, and only skip specifically excluded records.
* * keylist.c (print_capabilities): Show 'D' for disabled keys inDavid Shaw2003-01-061-2/+0
| | | | | | | capabilities section. * trustdb.c (is_disabled): Remove incorrect comment.
* * keydb.h, getkey.c (key_byname): Flag to enable or disable includingDavid Shaw2002-12-261-0/+38
| | | | | | | | | | | | | | | | | | | | | | | | | | disabled keys. Keys specified via keyid (i.e. 0x...) are always included. * getkey.c (get_pubkey_byname, get_seckey_byname2, get_seckey_bynames), keyedit.c (keyedit_menu, menu_addrevoker): Include disabled keys in these functions. * pkclist.c (build_pk_list): Do not include disabled keys for -r or the key prompt. Do include disabled keys for the default key and --encrypt-to. * trustdb.h, trustdb.c (is_disabled): New skipfnc for skipping disabled keys. * gpgv.c (is_disabled): Stub. * keygen.c (keygen_add_key_expire): Properly handle updating a key expiration to a no-expiration value. * keyedit.c (enable_disable_key): Comment. * import.c (import_one): When in interactive mode and --verbose, don't repeat some key information twice.
* * pkclist.c (do_we_trust): Tweak language to refer to the "namedDavid Shaw2002-12-131-0/+6
| | | | | | | | | | | | | | | | | | | | user" rather than "owner". Noted by Stefan Bellon. * trustdb.h, trustdb.c (trustdb_pending_check): New function to check if the trustdb needs a check. * import.c (import_keys_internal): Used here so we don't rebuild the trustdb if it is still clean. (import_one, chk_self_sigs): Only mark trustdb dirty if the key that is being imported has any sigs other than self-sigs. Suggested by Adrian von Bidder. * options.skel: Include the required '=' sign in the sample 'group' option. Noted by Stefan Bellon. * import.c (chk_self_sigs): Don't try and check a subkey as if it was a signature.
* * trustdb.c (validate_keys): Show trust parameters when building trustdb,David Shaw2002-12-041-1/+16
| | | | | | | | | and make sure that the version record update was successful. (init_trustdb): If the current parameters aren't what was used for building the trustdb, the trustdb is invalid. * tbio.c (tdbio_db_matches_options): Update to work with new trustdbs.
* * tdbio.h, tdbio.c (tdbio_read_record, tdbio_write_record): Store trustDavid Shaw2002-12-041-0/+1
| | | | | | | | | | | | model in the trustdb version record. (tdbio_update_version_record): New function to update version record values during a trustdb check or update. (tdbio_dump_record): Show trust model in dump. * trustdb.c (validate_keys): Call tdbio_update_version_record on success so that the correct options are stored in the trustdb. * options.h: rearrange trust models so that CLASSIC is 0 and OPENPGP is 1.
* * options.h, g10.c (main), trustdb.c (ask_ownertrust): AddDavid Shaw2002-11-071-6/+17
| | | | | | | | --force-ownertrust option for debugging purposes. This allows setting a whole keyring to a given trust during an --update-trustdb. Not for normal use - it's just easier than hitting "4" all the time to test a large trustdb.
* * trustdb.c (trust_model_string, check_trustdb, update_trustdb,David Shaw2002-11-041-23/+47
| | | | | | | validate_one_keyblock): It's not clear what a trustdb rebuild or check means with a trust model other than "classic" or "openpgp", so disallow this.
* * options.h, g10.c (main): Add --trust-model option. Current models areDavid Shaw2002-11-031-7/+8
| | | | | | | | | | | | | | "openpgp" which is classic+trustsigs, "classic" which is classic only, and "always" which is the same as the current option --always-trust (which still works). Default is "openpgp". * trustdb.c (validate_one_keyblock): Use "openpgp" trust model to enable trust sigs. * gpgv.c (main), mainproc.c (check_sig_and_print), pkclist.c (do_we_trust, do_we_trust_pre, check_signatures_trust): Use new --trust-model option in place of --always-trust.
* added RISC OS module loading supportStefan Bellon2002-10-311-0/+2
|
* * trustdb.c (check_regexp): Modern regexps require REG_EXTENDED.David Shaw2002-10-301-1/+1
|
* * packet.h, trustdb.h, trustdb.c (trust_string): New. Return a stringDavid Shaw2002-10-301-27/+266
| | | | | | | | | | | | | | | | | | | | | | | | | | like "fully trusted", "marginally trusted", etc. (get_min_ownertrust): New. Return minimum ownertrust. (update_min_ownertrust): New. Set minimum ownertrust. (check_regexp): New. Check a regular epression against a user ID. (ask_ownertrust): Allow specifying a minimum value. (get_ownertrust_info): Follow the minimum ownertrust when returning a letter. (clear_validity): Remove minimum ownertrust when a key becomes invalid. (release_key_items): Release regexp along with the rest of the info. (validate_one_keyblock, validate_keys): Build a trust sig chain while validating. Call check_regexp for regexps. Use the minimum ownertrust if the user does not specify a genuine ownertrust. * pkclist.c (do_edit_ownertrust): Only allow user to select a trust level greater than the minimum value. * parse-packet.c (can_handle_critical): Can handle critical trust and regexp subpackets. * trustdb.h, trustdb.c (clear_ownertrusts), delkey.c (do_delete_key), import.c (import_one): Rename clear_ownertrust to clear_ownertrusts and have it clear the min_ownertrust value as well. * keylist.c (list_keyblock_print): Indent uid to match pub and sig.
* * import.c (import_secret_one): Check for an illegal (>110) protectionDavid Shaw2002-10-021-9/+1
| | | | | | | | | | | | | | | | | | cipher when importing a secret key. * keylist.c (list_keyblock_print): Show a '#' for a secret-parts-missing key. * parse_packet.c (parse_key): Some comments. * revoke.c (gen_revoke): Remove some debugging code. * trustdb.c (verify_own_keys): Make trusted-key a non-deprecated option again. * seckey-cert.c (do_check): Don't give the IDEA warning unless the cipher in question is in fact IDEA.
* Update head to match stable 1.0David Shaw2002-06-291-2512/+1336
|
* Changed keyring handling - saving still does not work.Werner Koch2000-10-101-3/+3
| | | | | Added new cipher mode and updated cipher test program.
* See ChangeLog: Mon Sep 18 16:35:45 CEST 2000 Werner KochWerner Koch2000-09-181-27/+96
|
* See ChangeLog: Fri Jul 14 19:38:23 CEST 2000 Werner KochWerner Koch2000-07-141-67/+227
|
* See ChangeLog: Thu Jan 27 18:00:44 CET 2000 Werner KochWerner Koch2000-01-271-39/+39
|
* See ChangeLog: Mon Jan 24 13:04:28 CET 2000 Werner KochWerner Koch2000-01-241-25/+25
|
* See ChangeLog: Sat Nov 13 17:44:23 CET 1999 Werner KochWerner Koch1999-11-131-2/+3
|
* See ChangeLog: Tue Oct 26 14:10:21 CEST 1999 Werner KochWerner Koch1999-10-261-4/+4
|
* See ChangeLog: Wed Sep 1 15:30:44 CEST 1999 Werner KochWerner Koch1999-09-011-1/+1
|
* See ChangeLog: Mon Jul 26 09:34:46 CEST 1999 Werner KochWerner Koch1999-07-261-1/+1
|
* See ChangeLog: Tue Jul 13 17:39:25 CEST 1999 Werner KochWerner Koch1999-07-131-1/+1
|
* See ChangeLog: Thu Jul 8 16:21:27 CEST 1999 Werner KochWerner Koch1999-07-081-0/+4
|
* See ChangeLog: Wed Jul 7 13:23:40 CEST 1999 Werner KochWerner Koch1999-07-071-238/+194
|
* See ChangeLog: Fri Jul 2 11:45:54 CEST 1999 Werner KochWerner Koch1999-07-021-13/+30
|
* See ChangeLog: Thu Jul 1 12:47:31 CEST 1999 Werner KochWerner Koch1999-07-011-48/+72
|
* See ChangeLog: Tue Jun 29 21:44:25 CEST 1999 Werner KochWerner Koch1999-06-291-1124/+604
|
* See ChangeLog: Thu May 6 14:18:17 CEST 1999 Werner KochWerner Koch1999-05-061-0/+30
|
* See ChangeLog: Wed Mar 17 13:09:03 CET 1999 Werner KochWerner Koch1999-03-171-81/+294
|
* See ChangeLog: Thu Mar 11 16:39:46 CET 1999 Werner KochWerner Koch1999-03-111-1511/+1098
|
* See ChangeLog: Mon Mar 8 20:47:17 CET 1999 Werner KochWerner Koch1999-03-081-363/+273
|
* See ChangeLog: Tue Mar 2 10:38:42 CET 1999 Werner KochWerner Koch1999-03-021-3/+15
|
* See ChangeLog: Thu Feb 25 18:47:39 CET 1999 Werner KochWerner Koch1999-02-251-0/+15
|
* See ChangeLog: Wed Feb 24 11:07:27 CET 1999 Werner KochWerner Koch1999-02-241-12/+58
|
* See ChangeLog: Tue Feb 16 14:10:02 CET 1999 Werner KochWerner Koch1999-02-161-31/+31
|
* See ChangeLog: Wed Feb 10 17:15:39 CET 1999 Werner KochWerner Koch1999-02-101-45/+208
|
* See ChangeLog: Sat Jan 9 18:54:57 CET 1999 Werner KochWerner Koch1999-01-091-1/+1
|
* See ChangeLog: Tue Dec 29 19:55:38 CET 1998 Werner KochWerner Koch1998-12-291-2/+11
|
* See ChangeLog: Tue Dec 29 14:41:47 CET 1998 Werner KochWerner Koch1998-12-291-4/+4
|
* See ChangeLog: Wed Dec 23 13:34:22 CET 1998 Werner KochWerner Koch1998-12-231-5/+27
|
* See ChangeLog: Thu Dec 17 18:31:15 CET 1998 Werner KochWerner Koch1998-12-171-33/+100
|
* See ChangeLog: Tue Dec 8 13:15:16 CET 1998 Werner KochWerner Koch1998-12-081-8/+103
|