aboutsummaryrefslogtreecommitdiffstats
path: root/g10 (unfollow)
Commit message (Collapse)AuthorFilesLines
2001-12-22Minor cleanupsWerner Koch2-16/+23
2001-12-22* keyserver.c (keyserver_spawn): Removed some variablesWerner Koch8-27/+131
declaration due to shadowing warnings. * build-packet.c (build_attribute_subpkt): s/index/idx/ to avoid compiler warnig due to index(3). * getkey.c (get_ctx_handle): Use KEYDB_HANDLE as return value. * keylist.c (list_one): Made resname const. * keyedit.c (keyedit_menu): Allow "addphoto" only when --openpgp is not used. * options.skel: Changed one example photo viewer to qiv.
2001-12-22Added is_file_compressedTimo Schulz2-84/+23
2001-12-21Add new photo ID files and modify gpgsplit to name attribute packetsDavid Shaw4-0/+732
properly
2001-12-21Photo ID support (actually generic "attribute packet" support, but thereDavid Shaw16-351/+523
is only one attribute packet defined thus far, and it's a picture)
2001-12-21Nonrevocable key signature support via "nrsign". These sigs can expire,David Shaw10-42/+106
but cannot be revoked. Any revocation certificates for them are ignored.
2001-12-21* g10.c. options.h : New option --show-keyringWerner Koch7-3/+35
* getkey.c (get_ctx_handle): New. * keylist.c (list_one): Implement option here. By David Champion.
2001-12-21* options.in: Remove load-extension tigerWerner Koch3-2/+4
* Makefile.am (./options): append it if there is such a module.
2001-12-20Only gpg (not gpgv) needs mkdtempDavid Shaw1-2/+2
2001-12-20Use mkdtemp() to make temp directories. If there is no mkdtemp(), provideDavid Shaw3-26/+91
one.
2001-12-20New function to check the permissions of GNUPGHOME and the various filesDavid Shaw8-22/+154
that live there for safe permission/ownership (--no-permission-warning to disable) The newer glibcs print scary warnings about using mktemp(). The use here was actually safe, but the warning was bound to confuse people, so here is an arguably better tempname creator that pulls random bits from the pool.
2001-12-19* g10.c, passphrase.c [CYGWIN32]: Allow this as an alias for MINGW32.Werner Koch3-9/+13
2001-12-18Much stricter checking of the keyserver URIDavid Shaw9-15/+48
IDEA warning for pk messages encrypted with IDEA (symmetric is already done) Print IDEA warning for each occurance except for secret key protection and unknown cipher from an encrypted message.
2001-12-18Commited change from 2001-12-13 again:Werner Koch1-2/+2
* pubkey-enc.c (get_session_key): Check that the public key algorithm is indeed usable for en/decryption. This avoid a strange error message from pubkey_decrypt if for some reasons a bad algorithm indentifier is passed.
2001-12-17Remove warning - no need to check for control/illegal characters, asDavid Shaw2-1/+5
utf8_to_native does this for us
2001-12-17Fix capitalization issuesDavid Shaw6-28/+41
2001-12-17Add a generic IDEA warning for when the IDEA plugin is not present. ThisDavid Shaw7-38/+97
pops up when the user uses "--cipher-algo idea", when setpref is used to set a "S1" preference, and when a secret key protected with IDEA is used. Tweak the --pgp2 mode to use this generic warning.
2001-12-15* keyserver.c (keyserver_spawn): Assert that we have dropped privs.Werner Koch6-22/+92
* pubkey-enc.c (get_session_key): Check that the public key algorithm is indeed usable for en/decryption. This avoid a strange error message from pubkey_decrypt if for some reasons a bad algorithm indentifier is passed. * hkp.c (hkp_export): Do not print possible control characters from a keyserver response. (parse_hkp_index): Made uid an unsigned char* because it is passed to isspace(). (hkp_search): Ditto for the char* vars. * g10.c (main): Print the IDEA warning also for -c and -se. * g10.c (get_temp_dir): Assert that we have dropped privs * encode.c (encode_crypt): Include the first key into the --pgp2 check.
2001-12-12Fixed some types for portability. Noted by Stefan Bellon.David Shaw2-2/+7
2001-12-07PGP2 patch. --pgp2 sets things up for pgp2 compatibility, and prints aDavid Shaw5-6/+85
warning if the user does something that would make the message not compatible (i.e. encrypt with a non-RSA key, etc.)
2001-12-07Sig expiration codeDavid Shaw12-44/+244
Offer to expire a key signature when the key the user is signing expires Expired sigs cause an error return If --expert is set, prompt for sig duration
2001-12-07Allow a regular key signature to promote a local signature to fullDavid Shaw2-3/+41
exportable status
2001-12-07New option --expertDavid Shaw4-4/+58
Do not allow signing a revoked UID unless --expert is set, and ask even then. Do not allow signing a revoked key unless --expert is set, and ask even then.
2001-12-07Bug fix in "showpref"David Shaw5-4/+50
Allow setting a no-compression preference
2001-12-07"eyesonly" patch. Implements the for-your-eyes-only feature.David Shaw2-1/+22
2001-12-06"sigclass" patch - adds key signature class levels, notation and policy-urlDavid Shaw10-22/+286
displays in key listings, and shows flags for signature features.
2001-12-06The new keyserver code itselfDavid Shaw1-0/+988
2001-12-06(sigh). Missed one file.David Shaw1-0/+20
2001-12-06Generic keyserver API codeDavid Shaw9-197/+462
2001-11-27* trustdb.c (mark_usable_uid_certs): Fix segfault from badWerner Koch2-2/+8
initialization and fix reversed key signature expiration check.
2001-11-09* export.c (do_export_stream): Put all given names into a searchWerner Koch4-30/+40
description and change the loop so that all matching names are returned.
2001-11-08Tweaked v3 -c decryption, let --force-v4-certs use SHA-1 for all RSA keys.Werner Koch4-9/+39
2001-11-08fixes for the 1.0.6b bugs David recently posted to gnupg-devel.Werner Koch9-34/+151
2001-10-23more fixes due to automake 1.5SNAP-1-0-6bWerner Koch5-7/+42
2001-10-22Minor fixesWerner Koch2-14/+13
2001-10-18Fixed the Read-Only keyring bug and changed the way the keydb interfaceWerner Koch6-322/+429
works.
2001-10-06Option --no-force-v3-sigs added and disabled agent stuff for RISC OSStefan Bellon1-0/+5
2001-10-06Disabled agent stuff for RISC OSStefan Bellon1-0/+2
2001-10-06Option --no-force-v3-sigs addedStefan Bellon1-0/+3
2001-09-28calculate time of next trustdb checkWerner Koch7-135/+212
2001-09-28make check does work againWerner Koch4-27/+49
2001-09-27Encryption should work againWerner Koch6-229/+242
2001-09-26completed the new key validation codeWerner Koch6-71/+187
2001-09-25made keylisting fasterWerner Koch4-73/+197
2001-09-25Changed signature status cacheWerner Koch16-278/+466
2001-09-24Revamped the trustDBWerner Koch20-3667/+1568
2001-09-20Code cleanupsWerner Koch9-175/+119
2001-09-19Bug fixes and Timo's patchesWerner Koch12-112/+402
2001-09-18Check for garbled packetsWerner Koch3-3/+32
2001-09-09more bug fixesand some warning cleanupsWerner Koch12-50/+72