aboutsummaryrefslogtreecommitdiffstats
path: root/g10 (unfollow)
Commit message (Collapse)AuthorFilesLines
2006-03-09Preparing for an RC23Werner Koch2-11/+16
2006-03-09* keyedit.c (menu_set_notation): New function to set notations onDavid Shaw2-4/+250
self-signatures. (keyedit_menu): Call it here. (tty_print_notations): Helper. (show_prefs): Show notations in "showpref".
2006-03-09* mainproc.c (get_pka_address), keylist.c (show_notation): RemoveDavid Shaw3-92/+64
duplicate code by using notation functions.
2006-03-09* packet.h, build-packet.c (sig_to_notation), keygen.cDavid Shaw4-8/+20
(keygen_add_notations): Provide printable text for non-human-readable notation values.
2006-03-08* packet.h, build-packet.c (sig_to_notation), keygen.cDavid Shaw4-6/+15
(keygen_add_notations): Tweak to handle non-human-readable notation values.
2006-03-08* options.h, sign.c (mk_notation_policy_etc), gpg.c (add_notation_data):David Shaw9-117/+275
Use it here for the various notation commands. * packet.h, main.h, keygen.c (keygen_add_notations), build-packet.c (string_to_notation, sig_to_notation) (free_notation): New "one stop shopping" functions to handle notations and start removing some code duplication.
2006-03-08* options.h, mainproc.c (check_sig_and_print), gpg.c (main):David Shaw6-14/+27
pka-lookups, not pka-lookup. * options.h, gpg.c (main), keyedit.c [cmds], sig-check.c (signature_check2): Rename "backsign" to "cross-certify" as a more accurate name.
2006-03-07* options.h, gpg.c (main, parse_trust_model), pkclist.cDavid Shaw6-50/+23
(check_signatures_trust), mainproc.c (check_sig_and_print, pka_uri_from_sig), trustdb.c (init_trustdb): Some tweaks to PKA so that it is a verify-option now.
2006-03-07More tests added; make distcheck worksWerner Koch4-3/+28
2006-03-07* sign.c (make_keysig_packet): Don't use MD5 for a RSA_S key as thatDavid Shaw2-3/+5
is not a PGP 2.x algorithm.
2006-03-06* mainproc.c (proc_compressed): "Uncompressed" is not a valid compressionDavid Shaw2-1/+8
algorithm.
2006-03-06Stricter test of allowed signature packet compositions.Werner Koch2-100/+114
There is still one problem to solve.
2006-03-06Fixed problem with PGP2 style signatures and mutilple plaintext dataWerner Koch2-33/+62
2006-03-05Replaced an assert and fixed batch mode issue in cardglue.Werner Koch5-14/+42
2006-03-01* getkey.c (parse_auto_key_locate): Error if the user selects "cert" orDavid Shaw3-10/+20
"pka" when those features are disabled. * misc.c (has_invalid_email_chars): Fix some C syntax that broke the compilers on SGI IRIX MIPS and Compaq/DEC OSF/1 Alpha. Noted by Nelson H. F. Beebe.
2006-02-27* options.skel: Document auto-key-locate and give a pointer to SimonDavid Shaw2-0/+29
Josefsson's page for CERT.
2006-02-24* keydb.h, getkey.c (release_akl), gpg.c (main): AddDavid Shaw8-27/+114
--no-auto-key-locate. * options.h, gpg.c (main): Keep track of each keyserver registered so we can match on them later. * keyserver-internal.h, keyserver.c (cmp_keyserver_spec, keyserver_match), gpgv.c: New. Find a keyserver that matches ours and return its spec. * getkey.c (get_pubkey_byname): Use it here to get the per-keyserver options from an earlier keyserver.
2006-02-24* keyserver.c (parse_keyserver_options): Only change max_cert if it isDavid Shaw2-1/+4
used.
2006-02-23* options.c, gpg.c (main), keyserver.c (keyserver_spawn): No specialDavid Shaw4-26/+19
treatment of include-revoked, include-subkeys, and try-dns-srv. These are keyserver features, and GPG shouldn't get involved here.
2006-02-23* keyserver.c (parse_keyserver_uri, add_canonical_option): Always appendDavid Shaw2-3/+7
options to the list, as ordering may be significant to the user.
2006-02-23* gpg.c (add_notation_data): Fix reversed logic for isascii check whenDavid Shaw2-1/+4
adding notations. Noted by Christian Biere.
2006-02-23* options.h, keyserver.c (add_canonical_option): New.David Shaw4-20/+54
(parse_keyserver_options): Moved from here. (parse_keyserver_uri): Use it here so each keyserver can have some private options in addition to the main keyserver-options (e.g. per-keyserver auth).
2006-02-22* options.h, keyserver-internal.h, keyserver.c (keyserver_import_name),David Shaw6-9/+45
getkey.c (free_akl, parse_auto_key_locate, get_pubkey_byname): The obvious next step: allow arbitrary keyservers in the auto-key-locate list.
2006-02-22* options.h, keyserver.c (parse_keyserver_options): RemoveDavid Shaw3-7/+9
auto-cert-retrieve as it is no longer meaningful. Add max-cert-size to allow users to pick a max key size retrieved via CERT.
2006-02-22* options.h, gpg.c (main), mainproc.c (check_sig_and_print), keyserver.cDavid Shaw5-10/+19
(keyserver_opts): Rename auto-pka-retrieve to honor-pka-record to be consistent with honor-keyserver-url.
2006-02-22* options.h, keydb.h, g10.c (main), getkey.c (parse_auto_key_locate):David Shaw5-64/+139
Parse a list of key access methods. (get_pubkey_byname): Walk the list here to try and retrieve keys we don't have locally.
2006-02-21* getkey.c (get_pubkey_byname): Fix minor security problem with PKA whenDavid Shaw5-6/+27
importing at -r time. The URL in the PKA record may point to a key put in by an attacker. Fix is to use the fingerprint from the PKA record as the recipient. This ensures that the PKA record is followed. * keyserver-internal.h, keyserver.c (keyserver_import_pka): Return the fingerprint we requested.
2006-02-21* gpgv.c: Stub keyserver_import_ldap.David Shaw4-0/+47
* keyserver-internal.h, keyserver.c (keyserver_import_ldap): Import using the PGP Universal trick of asking ldap://keys.(maildomain) for the key.
2006-02-21* keyserver.c (parse_keyserver_uri): Include the scheme in the uriDavid Shaw2-2/+12
even when we've assumed "hkp" when there was no scheme.
2006-02-14about to release 1.4.3rc1gnupg-1.4.3rc1Werner Koch2-2/+2
2006-02-14Fixed a wrong return code with gpg --verifyWerner Koch3-24/+48
2006-02-09Lock random seed fileWerner Koch2-1/+8
2006-02-08Fixed a couple of problemsWerner Koch1-20/+59
2006-02-06Add support fro CardMan 4040Werner Koch3-241/+563
2006-01-24* keyserver.c (parse_keyserver_uri): If there is a path present, set theDavid Shaw2-0/+8
direct_uri flag so the right keyserver helper is run.
2006-01-22* keyserver.c (keyserver_spawn): Include the EXEEXT so we can findDavid Shaw3-3/+21
keyserver helpers on systems that use extensions. * misc.c (path_access) [HAVE_DRIVE_LETTERS]: Do the right thing with drive letter systems.
2006-01-17* keydb.h, passphrase.c (next_to_last_passphrase): New. "Touch" aDavid Shaw4-20/+43
passphrase as if it was used (move from next_pw to last_pw). * pubkey-enc.c (get_session_key): Use it here to handle the case where a passphrase happens to be correct for a secret key, but yet that key isn't the anonymous recipient (i.e. the secret key could be decrypted, but not the session key). This also handles the case where a secret key is located on a card and a secret key with no passphrase. Note this does not fix bug 594 (anonymous recipients on smartcard do not work) - it just prevents the anonymous search from stopping when the card is encountered.
2006-01-07* keyserver.c (keyserver_refresh): Fix problem when more than one keyDavid Shaw2-1/+7
in a refresh batch has a preferred keyserver set. Noted by Nicolas Rachinsky.
2006-01-01* mainproc.c (check_sig_and_print), keyserver.cDavid Shaw4-3/+8
(keyserver_import_pka), card-util.c (fetch_url): Always require a scheme:// for keyserver URLs except when used as part of the --keyserver command for backwards compatibility.
2006-01-01* sign.c (write_signature_packets): Lost a digest_algo line.David Shaw2-0/+3
2006-01-01* sign.c (hash_for): Add code to detect if the sk lives on a smartDavid Shaw3-19/+44
card. If it does, only allow 160-bit hashes, a la DSA. This involves passing the *sk in, so change all callers. This is correct for today, given the current 160-bit q in DSA, and the current SHA-1/RIPEMD160 support in the openpgp card. It will almost certainly need changing down the road. * app-openpgp.c (do_sign): Give user error if hash algorithm is not supported by the card.
2005-12-23* keyserver.c (keyserver_import_pka): New. Moved fromDavid Shaw6-35/+161
getkey.c:get_pubkey_byname which was getting crowded. * keyserver.c (keyserver_import_cert): Import a key found in DNS via CERT records. Can handle both the PGP (actual key) and IPGP (URL) CERT types. * getkey.c (get_pubkey_byname): Call them both here. * options.h, keyserver.c (parse_keyserver_options): Add "auto-cert-retrieve" option with optional max size argument.
2005-12-23* gpgv.c: Stub.David Shaw5-53/+123
* keyserver-internal.h, keyserver.c (keyserver_spawn, keyserver_work, keygerver_getname): New keyserver_getname function to fetch keys by name. * getkey.c (get_pubkey_byname): Call it here to enable locating keys by full mailbox from a keyserver a la PKA. Try PKA first, though, as it is likely to be faster.
2005-12-20Finished PKA featureWerner Koch10-13/+94
2005-12-19* getkey.c (merge_selfsigs_main): All primary keys can certify.David Shaw2-1/+7
2005-12-19* gpg.c (main): Restore convert-sk-to-pk as programs rely on it.David Shaw3-6/+10
* keyid.c (usagestr_from_pk): Remove special PUBKEY_USAGE_CERT flag. It's no longer needed.
2005-12-14* gpg.c (main): Don't default to import-options convert-sk-to-pk. ItDavid Shaw2-1/+7
causes confusing warning messages when importing a PGP-exported key that contains a secret key without selfsigs followed by the public key.
2005-12-08* keyserver.c (keyserver_fetch): Switch on fast-import before weDavid Shaw2-0/+18
--fetch-keys so we don't rebuild the trustdb after each fetch.
2005-12-08Made strings translatable. Minor fixes.Werner Koch4-5/+12
2005-12-08* options.h, keyserver.c (curl_cant_handle, keyserver_spawn,David Shaw3-7/+36
keyserver_fetch): Set a flag to indicate that we're doing a direct URI fetch so we can differentiate between a keyserver operation and a URI fetch for protocols like LDAP that can do either.