aboutsummaryrefslogtreecommitdiffstats
path: root/g10 (unfollow)
Commit message (Collapse)AuthorFilesLines
2002-03-03Solved conflictWerner Koch2-13/+28
2002-02-28This is the first half of revocation key / designated revokerDavid Shaw9-29/+331
support. That is, it handles all the data to mark a key as revoked if it has been revoked by a designated revoker. The second half (coming later) will contain the code to make someones key your designated revoker and to issue revocations for someone else. Note that this is written so that a revoked revoker can still issue revocations: i.e. If A revokes B, but A is revoked, B is still revoked. I'm not completely convinced this is the proper behavior, but it matches how PGP does it. It does at least have the advantage of much simpler code - my first version of this had lots of loop maintaining code so you could chain revokers many levels deep and if D was revoked, C was not, which meant that B was, and so on. It was sort of scary, actually. This also changes importing to allow bringing in more revocation keys, and exporting to not export revocation keys marked "sensitive". The --edit menu information will show if a revocation key is present.
2002-02-28Do not include v3 keys in a --export-secret-subkeys export.David Shaw2-0/+11
2002-02-27If a key isn't valid (say, because of no self-signature), allowDavid Shaw2-0/+18
--always-trust to force it valid so it can be trusted.
2002-02-26Treat key lists internally as fingerprints when possible. All this is viaDavid Shaw8-118/+160
KEYDB_SEARCH_DESC - no point in reinventing the wheel. This allows the helper program to search the keyserver by fingerprint if desired (and the keyserver supports it). Note that automatic fingerprint promotion during refresh only applies to v4 keys as a v4 fingerprint can be easily changed into a long or short key id, and a v3 cannot. Take two copies of hextobyte() from pubkey-enc.c and getkey.c and make them into one copy in misc.c.
2002-02-22Detect a "no keys found" case even if the keyserver helper program doesDavid Shaw3-10/+32
not explicitly say how many keys were found. Bug fix - don't report non-revoked keys as revoked in HKP key searches.
2002-02-19Catch corruption in HKP index lines (can be caused by broken or maliciousDavid Shaw3-0/+26
keyservers). Add KEYSERVER_NOT_SUPPORTED for unsupported actions (say, a keyserver that has no way to search, or a readonly keyserver that has no way to add). Also add a USE_EXTERNAL_HKP define to disable the internal HKP keyserver code.
2002-02-14* pkclist.c (check_signatures_trust): Always print the warning forWerner Koch3-9/+17
unknown and undefined trust. Removed the did_add cruft. Reported by Janusz A. Urbanowicz. * g10.c: New option --no-use-agent. Hmmm, is this a a good name? --do-not-use-agent seems a bit to long.
2002-02-12Bug fix - properly handle user IDs with colons (":") in them while HKPDavid Shaw2-5/+36
searching.
2002-02-10For --sig-policy-url and --cert-policy-url, clarify what is a sig and whatDavid Shaw12-39/+118
is a cert. A sig has sigclass 0x00, 0x01, 0x02, or 0x40, and everything else is a cert. Add a "nrlsign" for nonrevocable and local key signatures. Add a --no-force-mdc to undo --force-mdc. Add a knob to force --disable-mdc/--no-disable-mdc. Off by default, of course, but is used in --pgp2 and --pgp6 modes. Allow specifying multiple users in the "Enter the user ID" loop. Enter a blank line to stop. Show each key+id as it is added. It is not illegal (though possibly silly) to have multiple policy URLs in a given signature, so print all that are present. More efficient implementation of URL-ifying code for --search on an HKP keyserver.
2002-02-05Allow policy URLs with %-expandos in them. This allows policy URLs likeDavid Shaw7-100/+179
"http://notary.jabberwocky.com/keysign/%K" to create a per-signature policy URL. Use the new generic %-handler for the photo ID stuff as well. Display policy URLs and notations during signature generation if --show-policy-url/--show-notation is set.
2002-02-04Workaround for the pksd and OKS keyserver bug that calculates v4 RSADavid Shaw3-4/+48
keyids as if they were v3. The workaround/hack is to fetch both the v4 (e.g. 99242560) and v3 (e.g. 68FDDBC7) keyids. This only happens for key refresh while using the HKP scheme and the refresh-add-fake-v3-keyids keyserver option must be set. This should stay off by default.
2002-02-04Bug fix - do not append keys to each other when --sending more than one.David Shaw2-1/+6
2002-02-03Split "--set-policy-url" into "--cert-policy-url" and "--sig-policy-url"David Shaw5-8/+42
so the user can set different policies for key and data signing. For backwards compatibility, "--set-policy-url" sets both, as before.
2002-01-30* g10.c (main): --gen-random --armor does now output a base64Werner Koch2-2/+23
encoded string.
2002-01-29--pgp6 flag. This is not nearly as involved as --pgp2. In short, itDavid Shaw5-69/+105
turns off force_mdc, turns on no_comment, escape_from, and force_v3_sigs, and sets compression to 1. It also restricts the user to IDEA (if present), 3DES, CAST5, MD5, SHA1, and RIPEMD160. See the comments above algo_available() for lots of discussion on why you would want to do this.
2002-01-27More comments about when to use IDEA in keygen.cDavid Shaw4-8/+31
When key signing with multiple keys at the same time, make sure each key gets the sigclass prompt Close the iobuf and FILE before trying to reap the child process to encourage the child to exit Disable cache-on-close of the fd iobuf (shouldn't all fd iobufs not be cached?)
2002-01-26* g10.c, options.h: New option --gpg-agent-infoWerner Koch6-8/+50
* passphrase.c (agent_open): Let it override the environment info. * seckey-cert.c (check_secret_key): Always try 3 times when the agent is enabled. * options.skel: Describe --use-agent.
2002-01-24Only check preferences against keys with v4 self sigs as v3 sigs have noDavid Shaw4-15/+26
prefs Only put in the fake IDEA preference with --pgp2 mode Print "Expired" for expired but good signatures.
2002-01-23Cosmetic: don't present a RSA signing key as a "keypair" which can be 768David Shaw3-3/+21
bits long (as RSA minimum is 1024) Allow IDEA as a fake preference for v3 keys with v3 selfsigs when verifying that a cipher is in preferences while decrypting
2002-01-22Some compatibility polish for PGP2. Add a fake IDEA preference for v3David Shaw9-17/+94
keys (this is in the RFC), so that they can be (sometimes) used along OpenPGP keys. Do not force using IDEA on an OpenPGP key, as this may violate its prefs. Also, revise the help text for the sig class explanation.
2002-01-20* passphrase.c (passphrase_to_dek): Add tryagain_text arg to beWerner Koch10-30/+101
used with the agent. Changed all callers. (agent_get_passphrase): Likewise and send it to the agent * seckey-cert.c (do_check): New arg tryagain_text. (check_secret_key): Pass the string to do_check. * keygen.c (ask_passphrase): Set the error text is required. * keyedit.c (change_passphrase): Ditto. * passphrase.c (agent_open): Disable opt.use_agent in case of a problem with the agent. (agent_get_passphrase): Ditto. (passphrase_clear_cache): Ditto.
2002-01-19Removed debugging outputWerner Koch2-2/+2
2002-01-19* passphrase.c (agent_open): Add support for the new Assuan basedWerner Koch2-170/+357
gpg-agent. New arg to return the used protocol version. (agent_get_passphrase): Implemented new protocol here. (passphrase_clear_cache): Ditto.
2002-01-15New command --decrypt-files.Timo Schulz5-40/+109
Some fixes.
2002-01-12Fixed some typos.Timo Schulz2-29/+59
2002-01-09Move idea_cipher_warn to misc.c so gpgv.c doesn't need a stubDavid Shaw6-95/+77
Remove get_temp_dir (it's in exec.c now) Allow --delete-key (now --delete-keys, though --delete-key still works) to delete multiple keys in one go. This applies to --delete-secret-key(s) and --delete-secret-and-public-key(s) as well
2002-01-09New code for encode_crypt_files.Timo Schulz4-13/+37
2002-01-09Added missing include file.Timo Schulz2-0/+7
2002-01-08Better description for --encrypt-files.Timo Schulz2-1/+5
2002-01-08* g10.c (main): Must register the secring for encryption becauseWerner Koch2-2/+8
it is needed to figure out the default recipient. Reported by Roger Sondermann.
2002-01-06fix off-by-one in building attribute subpacketsDavid Shaw8-19/+106
change default compression to 1 add ask-sig-expire and ask-cert-expire (--expert was getting absurdly overloaded) permit v3 subkeys use --expert to protect adding multiple photo ids and adding photos to a v3 key
2002-01-05* g10.c (main): Do not register the secret keyrings for certainWerner Koch3-79/+92
commands. * keydb.c (keydb_add_resource): Use access to test for keyring existence. This avoids cached opened files which are bad under RISC OS.
2002-01-04Use one-pass packets even if it's a v3 key making the signatureDavid Shaw4-27/+51
Warn with pgp2 and non-detached signatures Use the actual filesize rather than partial length packets in symmetric messages (see ChangeLog or NEWS for discussion).
2002-01-03Minor tweaks: remove --no-default-check-level, don't cache child tempfilesDavid Shaw4-10/+19
and simpler code in keyserver
2002-01-03New command (encrypt-files).Timo Schulz5-1/+39
2002-01-02used different char types for RISC OSStefan Bellon1-0/+9
2002-01-02moved util.h include downwardsStefan Bellon1-1/+1
2002-01-02invalidate close cacheStefan Bellon1-2/+7
2002-01-02lock only writable key rings and free unused iobufStefan Bellon2-3/+28
2001-12-29Bugfix in photoid.c and keyserver.cDavid Shaw8-28/+73
Properly handle permission/ownership checks on files that are shared (for example /usr/local/lib/gnupg/idea)
2001-12-28Add an outofband indicator to the keyserver protocol.David Shaw8-69/+68
Use signature flags for exportability check rather than re-parsing the subpacket.
2001-12-27Some exec cleanups and tweaks for photo ID and keyserver executionDavid Shaw5-41/+91
2001-12-25Some tweaks - copyleft info for mkdtemp.c, and header pruning in photoid.cDavid Shaw4-43/+51
and keyserver.c
2001-12-23Fixed a typo and W32 support for the latest CVS changes.Timo Schulz7-0/+30
2001-12-22Avoid const compiler warningDavid Shaw2-1/+3
2001-12-22Some last minute tweaks - type fixes from Stefan and win32 temp filesDavid Shaw4-11/+40
from Timo.
2001-12-22Minor cleanupsWerner Koch2-16/+23
2001-12-22* keyserver.c (keyserver_spawn): Removed some variablesWerner Koch8-27/+131
declaration due to shadowing warnings. * build-packet.c (build_attribute_subpkt): s/index/idx/ to avoid compiler warnig due to index(3). * getkey.c (get_ctx_handle): Use KEYDB_HANDLE as return value. * keylist.c (list_one): Made resname const. * keyedit.c (keyedit_menu): Allow "addphoto" only when --openpgp is not used. * options.skel: Changed one example photo viewer to qiv.
2001-12-22Added is_file_compressedTimo Schulz2-84/+23