Commit message (Collapse) | Author | Files | Lines | ||
---|---|---|---|---|---|
2007-03-05 | Preparing 1.4.7gnupg-1.4.7 | Werner Koch | 6 | -21/+93 | |
2007-02-14 | * parse-packet.c (parse_signature): It's hex. | David Shaw | 3 | -1/+11 | |
* getkey.c (merge_selfsigs_subkey): Avoid listing the contents of a backsig when list mode is on. Noted by Timo Schulz. | |||||
2007-02-04 | Fix for Debian bug 402592 | Werner Koch | 2 | -3/+24 | |
2007-02-01 | Missed one caller. | David Shaw | 1 | -1/+1 | |
2007-02-01 | * main.h, keygen.c (ask_expire_interval, parse_expire_string): Pass in | David Shaw | 6 | -27/+39 | |
the time to use to calculate the expiration offset, rather than querying it internally. Change all callers. | |||||
2007-01-31 | * keygen.c (do_generate_keypair, proc_parameter_file, | David Shaw | 2 | -35/+62 | |
generate_keypair, generate_subkeypair): Pass a timestamp through to all the gen_xxx functions. | |||||
2007-01-31 | * keyedit.c (sign_uids): Another multiple to single timestamp | David Shaw | 2 | -12/+9 | |
operation. | |||||
2007-01-31 | * sign.c (write_plaintext_packet): Take timestamp from outside. | David Shaw | 2 | -10/+20 | |
Change all callers. (sign_file, clearsign_file, sign_symencrypt_file): Calculate one timestamp for the whole transaction. Different timestamps for each step can leak performance information. | |||||
2007-01-31 | * main.h, keygen.c (ask_expiredate), keyedit.c (menu_expire): Remove | David Shaw | 4 | -10/+9 | |
the need for ask_expiredate(). | |||||
2007-01-30 | * keygen.c (make_backsig, write_direct_sig, write_selfsigs) | David Shaw | 2 | -7/+17 | |
(write_keybinding): Have the various selfsigs created during key generation use the timestamp of their parent key. This helps avoid leaking information about the performance of the machine where the keys were generated. Noted by Christian Danner. | |||||
2007-01-15 | * parse-packet.c (read_protected_v3_mpi): Make sure to stop | Werner Koch | 3 | -2/+9 | |
reading even for corrupted packets. * keygen.c (generate_user_id): Need to allocate one byte more. Reported by Felix von Leitner. | |||||
2006-12-15 | * options.skel: Tweak some examples to match reality and update the | David Shaw | 2 | -23/+23 | |
RFC for CERT now that it is out of draft. | |||||
2006-12-13 | * Makefile.am: Install options.skel via dist_pkgdata_DATA so that | David Shaw | 2 | -5/+7 | |
"make uninstall" works properly. | |||||
2006-12-13 | Removed references to removed g10defs.h file. | Werner Koch | 3 | -2/+4 | |
2006-12-11 | Removed the use of g10defs.h. | Werner Koch | 6 | -11/+27 | |
This required some code cleanups and the introduction of a few accessor ducntions in mpi. | |||||
2006-12-07 | / | Werner Koch | 3 | -2/+9 | |
* configure.ac: Remove GNUPG_DATADIR for non-W32 systems. g10/ * Makefile.am (AM_CPPFLAGS): Define GNUPG_DATADIR. * openfile.c (copy_options_file): Use log_info and not log_error to avoid error returns in case of a missing skeleton file. | |||||
2006-12-06 | Preparing a releasegnupg-1.4.6 | Werner Koch | 7 | -48/+158 | |
2006-12-03 | * keyedit.c (menu_clean): Show "already minimized" rather than | David Shaw | 2 | -1/+12 | |
"already clean" when a minimized key is minimized again. From Dirk Traulsen. | |||||
2006-12-03 | * options.h, gpg.c (main), passphrase.c (passphrase_to_dek): Add | David Shaw | 4 | -32/+55 | |
--passphrase-repeat option to control how many times gpg will re-prompt for a passphrase to ensure the user has typed it correctly. Defaults to 1. | |||||
2006-11-27 | * openfile.c (ask_outfile_name): Fixed buffer overflow occurring | Werner Koch | 2 | -1/+6 | |
if make_printable_string returns a longer string. Fixes bug 728. | |||||
2006-11-06 | Missing changelog entry | David Shaw | 1 | -0/+9 | |
2006-10-23 | New command --gpgconf-test. | Werner Koch | 2 | -0/+10 | |
2006-10-13 | * parse-packet.c (parse_symkeyenc): Show the unpacked as well as the | David Shaw | 5 | -5/+43 | |
packed s2k iteration count. * main.h, options.h, gpg.c (encode_s2k_iterations, main), passphrase.c (hash_passphrase): Add --s2k-count option to specify the number of s2k hash iterations. | |||||
2006-10-06 | * keyserver.c (keyserver_spawn): Write the 16-digit keyid rather than | David Shaw | 2 | -3/+12 | |
whatever key selector the user used on the command line. | |||||
2006-10-02 | fix for bug 537 and documentation fixes. | Werner Koch | 2 | -20/+44 | |
2006-09-26 | Allow to build w/o curl. | Werner Koch | 2 | -1/+7 | |
2006-08-01 | Preparing 1.4.5 | Werner Koch | 2 | -9/+18 | |
2006-07-31 | Fix bug 655 | Werner Koch | 2 | -1/+5 | |
2006-07-31 | Fixed bug 479. Not a real good fix but a reliable one which limits possible | Werner Koch | 4 | -1/+14 | |
breakage of other partys of the code. | |||||
2006-07-28 | Preparing a release candidategnupg-1.4.5rc1 | Werner Koch | 2 | -4/+4 | |
2006-07-26 | Fixed memory allocation bug and typos. | Werner Koch | 5 | -9/+35 | |
2006-07-08 | * configure.ac: Fix resolver autoconf code so it works (fails) | David Shaw | 1 | -1/+1 | |
properly with uClibc. | |||||
2006-06-28 | i18n fix | Werner Koch | 2 | -2/+10 | |
2006-06-28 | * keydb.h, pkclist.c (select_algo_from_prefs, algo_available): Pass a | David Shaw | 4 | -14/+27 | |
union for preference hints rather than doing void * games. * sign.c (sign_file): Use it here. | |||||
2006-06-28 | * sign.c (sign_file): When signing with multiple DSA keys, one being DSA1 | David Shaw | 2 | -49/+49 | |
and one being DSA2 and encrypting at the same time, if the recipient preferences give a hash that can work with the DSA2 key, then allow the DSA1 key to be promoted rather than giving up and using hash_for(). | |||||
2006-06-28 | * pkclist.c (algo_available): Automatically enable DSA2 mode when handling | David Shaw | 2 | -5/+10 | |
a key that clearly isn't DSA1 (i.e. q!=160). | |||||
2006-06-28 | Fixed uploading of keays. | Werner Koch | 2 | -1/+7 | |
2006-06-27 | do no use reopen_std under W32. | Werner Koch | 2 | -2/+6 | |
2006-06-25 | About to do a new release | Werner Koch | 2 | -3/+3 | |
2006-06-22 | * options.h, gpg.c (main), keygen.c (keygen_upd_std_prefs, | David Shaw | 4 | -2/+51 | |
keygen_add_std_prefs, proc_parameter_file): Add --default-keyserver-url to specify a keyserver URL at key generation time, and "Keyserver:" keyword for doing the same through a batch file. | |||||
2006-06-22 | * sign.c (do_sign): Accept a truncated hash even for DSA1 keys (be liberal | David Shaw | 2 | -1/+13 | |
in what you accept, etc). | |||||
2006-06-12 | * import.c (import_one): Add a flag (from_sk) so we don't check prefs | David Shaw | 2 | -6/+13 | |
on an autoconverted public key. The check should only happen on the sk size. Noted by Dirk Traulsen. | |||||
2006-06-10 | * keygen.c (gen_card_key): Add optional argument to return a pointer | David Shaw | 2 | -8/+20 | |
(not a copy) of the stub secret key for the secret key we just generated on the card. (generate_card_subkeypair): Use it here so that the signing key on the card can use the card to generate the 0x19 backsig on the primary key. Noted by Janko Heilgeist and Jonas Oberg. | |||||
2006-06-09 | * parse-packet.c (parse_user_id): Cap the user ID size at 2048 bytes. | David Shaw | 2 | -0/+22 | |
This prevents a memory allocation attack with a very large user ID. A very large packet length could even cause the allocation (a u32) to wrap around to a small number. Noted by Evgeny Legerov on full-disclosure. | |||||
2006-05-27 | Revert last. It is still wrong. | David Shaw | 2 | -17/+7 | |
2006-05-27 | * exec.c (make_tempdir) [_WIN32]: Modified to properly handle | David Shaw | 2 | -7/+17 | |
arbitrarily long temporary directory paths. | |||||
2006-05-25 | * keygen.c (gen_dsa): Allow generating DSA2 keys (allow specifying sizes > | David Shaw | 3 | -21/+73 | |
1024 when --enable-dsa2 is set). The size of q is set automatically based on the key size. (ask_keysize, generate_keypair): Ask for DSA size when --enable-dsa2 is set. | |||||
2006-05-25 | * exec.c (make_tempdir): Fix bug with a temporary directory on Win32 | David Shaw | 2 | -2/+10 | |
that is over 256 bytes long. Noted by Israel G. Lugo. | |||||
2006-05-23 | * gpg.c (reopen_std): New function to reopen fd 0, 1, or 2 if we are | David Shaw | 2 | -0/+72 | |
called with them closed. This is to protect our keyring/trustdb files from corruption if they get attached to one of the standard fds. Print a warning if possible that this has happened, and fail completely if we cannot reopen (should never happen). (main): Call it here. | |||||
2006-05-23 | * parse-packet.c (dump_sig_subpkt, parse_signature), build-packet.c | David Shaw | 6 | -19/+34 | |
(build_sig_subpkt_from_sig), getkey.c (fixup_uidnode, merge_selfsigs_main, merge_selfsigs_subkey), keygen.c (keygen_add_key_expire): Fix meaning of key expiration and sig expiration subpackets - zero means "never expire" according to 2440, not "expire instantly". |