aboutsummaryrefslogtreecommitdiffstats
path: root/g10 (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* * g10.c (collapse_args): New function to turn argc/argv into a singleDavid Shaw2004-01-162-19/+116
| | | | | | | | string. (main): Use it here to pass list_config() more than one argument as a single string. (print_algo_numbers): Helper to print algorithm numbers. (list_config): Use it here for "pubkey", "cipher", "hash"/"digest", and "compress" config options.
* * g10.c (list_config, main): New function to dump config options toDavid Shaw2004-01-136-26/+84
| | | | | | | stdout. Currently requires --with-colons. * getkey.c, keylist.c, packet.h, pkclist.c: Fix copyright dates.
* * hkp.c (hkp_export): Send a content-type line.Werner Koch2004-01-132-0/+8
|
* * packet.h, getkey.c (merge_selfsigs, merge_selfsigs_main), pkclist.cDavid Shaw2004-01-094-4/+16
| | | | | | (check_signatures_trust): Indicate who has revoked a key (the owner or a designated revoker). If a key was revoked by both, prefer the owner.
* * sig-check.c: Copyright typo.David Shaw2004-01-063-3/+12
| | | | | | * keylist.c (set_attrib_fd): Open attribute fd in binary mode. This isn't meaningful on POSIX systems, but the Mingw builds aren't exactly POSIX.
* * sig-check.c (check_revocation_keys): Comments.David Shaw2003-12-296-20/+59
| | | | | | | | | | | | | | | | | | * getkey.c (merge_selfsigs_main): Don't bother to check designated revoker sigs if the key is already revoked. * packet.h, getkey.c (merge_selfsigs_main): New "maybe_revoked" flag on PKs. It is set when there is a revocation signature from a valid revocation key, but the revocation key is not present to verify the signature. * pkclist.c (check_signatures_trust): Use it here to give a warning when showing key trust. * compress-bz2.c: Include stdio.h. Solaris 9 has a very old bzip2 library and we can at least guarantee that it won't fail because of the lack of stdio.h.
* * tdbio.c: Fixed format string bugs related to the sue ofWerner Koch2003-12-232-9/+13
| | | | | DB_NAME. Reported by Florian Weimer.
* * getkey.c (get_pubkey_fast): This one is sort of obscure. get_pubkey_fastDavid Shaw2003-12-102-5/+25
| | | | | | | | | | | | returns the primary key when requesting a subkey, so if a user has a key signed by a subkey (we don't do this, but used to), AND that key is not self-signed, AND the algorithm of the subkey in question is not present in GnuPG, AND the algorithm of the primary key that owns the subkey in question is present in GnuPG, then we will try and verify the subkey signature using the primary key algorithm and hit a BUG(). The fix is to not return a hit if the keyid is not the primary. All other users of get_pubkey_fast already expect a primary only.
* * getkey.c (merge_selfsigs_main, merge_selfsigs_subkey,David Shaw2003-12-054-9/+27
| | | | | | | | | | | | | get_seckey_byname2): Disallow use of encrypt-only v3 Elgamal keys for anything except revocations. * sign.c (do_sign): Add Elgamal encrypt-only keys to the signature catchall. * trustdb.c (mark_usable_uid_certs): Disallow signatures to and from Elgamal encrypt-only keys in the trustdb. Granted, this sounds strange, but there are historical keys that fit this description.
* * mainproc.c (check_sig_and_print): Removed the "0x" again.Werner Koch2003-12-032-1/+6
| | | | | | | | | | | Reverts change from 2003-10-03. * THANKS: Added Phong Nguyen, who found the Elgamal signing key problem. * configure.ac (ALL_LINGUAS): Added a Russian translation; thanks to Maxim Britov. Added Belarusion; thanks to Ales Nyakhaychyk.
* * g10.c (strusage, main): Show development version warning in --versionDavid Shaw2003-12-023-7/+50
| | | | | | | | output. * trustdb.c (mark_usable_uid_certs): Disallow signatures to and from an Elgamal signing key in the trustdb.
* * keygen.c (ask_algo): Remove ability to generate Elgamal sign+encryptDavid Shaw2003-11-292-23/+9
| | | | | keys.
* * revoke.c (gen_desig_revoke): Specify in the comment when a designatedDavid Shaw2003-11-294-3/+35
| | | | | | | | | | | | revocation is generated. * getkey.c (merge_selfsigs_main, merge_selfsigs_subkey, get_seckey_byname2): Disallow use of sign+encrypt Elgamal keys for anything except revocations. * sign.c (do_sign): Catchall for any Elgamal signatures except revocations.
* * trustdb.c (validate_keys): Reset the trustdb before checking if we haveDavid Shaw2003-11-292-4/+11
| | | | | | | any ultimately trusted keys. This ensures that if we lose all our ultimately trusted keys, we don't leave behind the old validity calculations.
* * seskey.c (do_encode_md): Comment about earlier (pre-PGP 2.3) encodings.David Shaw2003-11-213-1/+19
| | | | | | * misc.c (compress_algo_to_string): Translate "Uncompressed". Requested by Tommi Vainikainen.
* * compress-bz2.c (init_compress): Compression level 0 is not meaningfulDavid Shaw2003-11-152-7/+8
| | | | | for bzip2.
* * g10.c: Add --compress-level (same as -z).David Shaw2003-11-152-1/+5
|
* * mainproc.c (proc_symkey_enc): Don't show algorithm information whenDavid Shaw2003-11-063-39/+43
| | | | | | | | | --quiet is set. Suggested by Duncan Harris. Also don't fail with BUG() when processing a --symmetric message with a cipher we don't have. * pkclist.c (build_pk_list): Revert last change. There are too many side effects for stable.
* * pkclist.c (build_pk_list): Show all recipients rather than showing eachDavid Shaw2003-11-012-22/+36
| | | | | recipient as they are added.
* * misc.c (compress_algo_to_string, check_compress_algo): Add bzip2.David Shaw2003-10-3112-47/+360
| | | | | | | | | | | | | | | | | | | | | | | | * g10.c (main): Add read-only warning. * compress.c (compress_filter): Make static to help force the use of push_compress_filter. Remove default algorithm setting since that is done in push_compress_filter now. * main.h: Use named algorithm. * filter.h, compress.c (push_compress_filter, push_compress_filter2): New. Figure out which is the appropriate compression filter to use, and push it into place. * compress.c (handle_compressed), encode.c (encode_simple, encode_crypt), sign.c (sign_file, sign_symencrypt_file), import.c (read_block), export.c (do_export): Use push_compress_filter instead of pushing the compression filter ourselves. * compress-bz2.c: New. Bzlib versions of the compression filter routines. * Makefile.am: Include compress-bz2.c if bz2lib is available.
* * mainproc.c (proc_symkey_enc, proc_encrypted): Keep a count of the numberDavid Shaw2003-10-262-3/+17
| | | | | | of passphrases that can decrypt a symmetric or mixed symmetric/pk message and include it in the list of keys shown to the user.
* * mainproc.c (symkey_decrypt_sesskey): There is no way to tell theDavid Shaw2003-10-262-25/+69
| | | | | | | | | | | | difference here between a bad passphrase and a cipher algorithm that we don't have, so use a error message that makes that clear. Use the actual list of ciphers when checking whether a cipher is invalid. Return error if the decrypted cipher algorithm is invalid. (proc_symkey_enc): In a mixed passphrase/pk message, if a valid dek already exists from decrypting via pk, do not try to process the passphrase. (proc_symkey_enc): Indicate when we're decrypting a session key as opposed to decrypting data. If a passphrase is invalid, discard the dek so we'll keep trying.
* * g10.c (main): Fix --export-all do actually do something different thanDavid Shaw2003-10-173-7/+12
| | | | | --export.
* * mainproc.c (check_sig_and_print): Prefix the key ID printed withWerner Koch2003-10-032-3/+8
| | | | | 0x. Requested by Nelson H. F. Beebe.
* * g10.c (main): Add --no-groups to zero --group list.David Shaw2003-10-015-47/+69
| | | | | | | | | | | | | | | * encode.c (encode_simple): Allow for 32 bytes (256 bits) of symmetrically encrypted session key. Use --s2k-cipher-algo to choose cipher, rather than --cipher-algo. This code is never actually called in stable, but better to fix it here in case we branch in the future. * parse-packet.c (parse_subkeyenc): Call it a "symmetrically encrypted session key" since "session key decryption key" is just baffling. Neaten --list-packets output. * pubkey-enc.c (get_it): Always show cipher-not-in-prefs warning unless --quiet is set.
* * parse-packet.c (parse_symkeyenc): Give a warning if a session keyDavid Shaw2003-09-302-3/+21
| | | | | | decryption key is seen without salt. Show in --list-packets if a session key decryption key is present.
* * g10.c (main): Deprecate --no-comment in favor of --no-sk-comments.David Shaw2003-09-232-1/+11
|
* * g10.c (main): Deprecate -f in favor of --encrypt-files.David Shaw2003-09-122-3/+12
|
* * g10.c (main): Error out if --multifile is used with the commands thatDavid Shaw2003-09-092-0/+37
| | | | | | don't support it yet (--sign, --clearsign, --detach-sign, --symmetric, and --store).
* * g10.c (main): Add --multifile as an alias to turn --encrypt intoDavid Shaw2003-09-053-40/+56
| | | | | | | | | --encrypt-files (plus --verify-files, --decrypt-files). * encode.c (use_mdc), g10.c (main): Use RFC1991 and RFC2440 directly to check for MDC usability. Do not set the force_mdc or disable_mdc flags since there is no point any longer.
* * keylist.c (show_policy_url): Policy URLs might be UTF8.David Shaw2003-08-312-2/+3
|
* * keyedit.c (menu_addrevoker): Fix leaking a few bytes.David Shaw2003-08-312-1/+11
|
* * gpgv.c: s/__MINGW32__/_WIN32/ to help building on native WindowsDavid Shaw2003-08-292-1/+6
| | | | | compilers. Requested by Brian Gladman.
* * keyedit.c (change_passphrase): When responding 'no' to the blankDavid Shaw2003-08-262-1/+9
| | | | | passphrase question, re-prompt for a new passphrase. This is bug #202.
* * keyserver.c (keyserver_search_prompt): Flush stdout beforeWerner Koch2003-08-212-1/+9
| | | | | | | issuing the prompt. Requested by Todd Vierling. * samplekeys.asc: Refreshed the keys.
* * options.skel: Note that keyserver.pgp.com isn't synchronized, andDavid Shaw2003-08-194-58/+89
| | | | | | | | | | explain the roundrobin a bit better. * sig-check.c (check_key_signature2), import.c (import_one, import_revoke_cert, chk_self_sigs, delete_inv_parts, collapse_uids, merge_blocks): Make much quieter during import of slightly munged, but recoverable, keys. Use log_error for unrecoverable import failures.
* * keyring.c (keyring_rebuild_cache): Comment.David Shaw2003-08-133-14/+30
| | | | | | | | * sign.c (mk_notation_and_policy): Making a v3 signature with notations or policy urls is an error, not an info (i.e. increment the errorcount). Don't print the notation or policy url to stdout since it can be mixed into the output stream when piping and munge the stream.
* * parse-packet.c (parse_signature): Don't give "signature packet withoutDavid Shaw2003-08-022-8/+17
| | | | | | xxxx" warnings for experimental pk algorithms. An experimental algorithm may not have a notion of (for example) a keyid (i.e. PGP's x.509 stuff).
* Removed trailing semicolon to avoid error with Norcroft CStefan Bellon2003-07-312-1/+6
|
* * passphrase.c (agent_send_all_options): Make use of $GPG_TTY.Werner Koch2003-07-302-1/+7
|
* Changed a lot of __MINGW32__ to _WIN32. This should help a bit inWerner Koch2003-07-305-17/+20
| | | | | building with native Windows compilers. On request by Brian Gladman.
* * g10.c (main): Disable use-agent if passphrase-fd is givenWerner Koch2003-07-302-0/+6
| | | | | later. Suggested by Kurt Garloff.
* Removed an md_start_debugWerner Koch2003-07-301-2/+1
|
* * parse-packet.c (parse_key): Allow to parse the gnu-divert-to-s2kWerner Koch2003-07-283-2/+29
| | | | | mode.
* * packet.h, sig-check.c (signature_check2, do_check, do_check_messages):David Shaw2003-07-287-52/+73
| | | | | | | | | | | | | | | Provide a signing-key-is-revoked flag. Change all callers. * status.h, status.c (get_status_string): New REVKEYSIG status tag for a good signature from a revoked key. * mainproc.c (do_check_sig, check_sig_and_print): Use it here. * import.c (import_revoke_cert, merge_blocks, merge_sigs): Compare actual signatures on import rather than using keyid or class matching. This does not change actual behavior with a key, but does mean that all sigs are imported whether they will be used or not.
* * gpgv.c (read_trust_options): Stub.David Shaw2003-07-212-0/+4
|
* * trustdb.h, trustdb.c (read_trust_options): New. Returns items from theDavid Shaw2003-07-214-7/+52
| | | | | | | trustdb version record. * keylist.c (public_key_list): Use it here for the new "tru" record.
* * sig-check.c (signature_check, signature_check2, check_key_signature,David Shaw2003-07-214-19/+24
| | | | | | | check_key_signature2): Allow passing NULLs for unused parameters in the x2 form of each function to avoid the need for dummy variables. getkey.c, mainproc.c: Change all callers.
* * keygen.c (do_add_key_flags): Don't set the certify flag for subkeys.David Shaw2003-07-162-1/+28
| | | | | | (ask_algo): Provide key flags for DSA, Elgamal_e, and Elgamal subkeys. (generate_keypair): Provide key flags for the default DSA/Elgamal keys.
* * misc.c (pct_expando): Minor performance tweak. Don't bother to re-fetchDavid Shaw2003-07-053-12/+25
| | | | | | | | the primary key if the key making the signature is the primary key. * parse-packet.c (parse_signature): No need to reserve 8 bytes for the unhashed signature cache any longer.