aboutsummaryrefslogtreecommitdiffstats
path: root/g10 (follow)
Commit message (Collapse)AuthorAgeFilesLines
* * keydb.c (keydb_add_resource): Factored keyring creation out to ..Werner Koch2004-08-133-52/+118
| | | | | | (maybe_create_keyring): .. new. Make sure that we do the checks in a locked state. Problem reported by Stefan Haller.
* * configure.ac (ALL_LINGUAS): Removed.Werner Koch2004-08-093-1/+17
| | | | | | | | | | | | | | | * Makefile.am (LDADD): Replaced INTLLIBS by LIBINTL. * Makefile.am (gpgkeys_hkp_LDADD): Replaced INTLLIBS by LIBINTL. * ca.po: Updated. * autogen.sh: Run aclocal with -I m4. * Makefile.am: Replaced INTLLIBS by LIBINTL. * Makefile.am (http-test): Replaced INTLLIBS by LIBINTL.
* New alias --throw-keyid for --throw-keyids, so that itWerner Koch2004-07-302-0/+6
| | | | | continues to work in old configuration files. Noted by Jens Adam.
* * pkclist.c (algo_available): --pgp8 now allows blowfish, zlib, and bzip2.David Shaw2004-07-292-9/+18
|
* * status.c (do_get_from_fd): Flush stdout if status isn't flushing it forDavid Shaw2004-07-212-0/+10
| | | | | | | us. This guarantees that any menus that were displayed before the prompt don't get stuck in a buffer. Noted by Peter Palfrader. This is Debian bug #254072.
* Minor fixes for W32 packaging and building.Werner Koch2004-07-202-1/+6
|
* * sign.c (update_keysig_packet): Revert change of 2004-05-18. It is notDavid Shaw2004-07-192-12/+7
| | | | | | appropriate to strip policy and notations when remaking a sig. That should only happen when specifically requested by the user.
* * sign.c (sign_symencrypt_file): Allow using --force-mdc in --signDavid Shaw2004-06-272-0/+10
| | | | | --symmetric messages.
* * mainproc.c (proc_symkey_enc), seckey-cert.c (do_check): Check the S2KDavid Shaw2004-06-273-0/+20
| | | | | | | hash algorithm before we try to generate a passphrase using it. This prevents hitting BUG() when generating a passphrase using a hash that we don't have.
* * keyedit.c (sign_uids): Properly handle remaking a self-sig on revoked orDavid Shaw2004-06-242-5/+28
| | | | | | expired user IDs. Also, once we've established that a given uid cannot or will not be signed, don't continue to ask about each sig.
* * status.h, status.c (get_status_string), plaintext.c (handle_plaintext):David Shaw2004-06-184-6/+32
| | | | | New status tags PLAINTEXT and PLAINTEXT_LENGTH.
* * keygen.c (make_backsig): Make sure that the backsig was builtDavid Shaw2004-06-162-49/+58
| | | | | successfully before we try and use it.
* (copy_secret_key): Get last fix right.Werner Koch2004-06-162-10/+8
|
* (copy_secret_key): Fixed memory leak.Werner Koch2004-06-162-0/+13
|
* * g10.c (main): Alias --charset as --display-charset to help avoid theDavid Shaw2004-06-013-5/+15
| | | | | | | | continuing confusion and make room for possible changes in devel. * parse-packet.c (parse_plaintext): Show the hex value for the literal packet mode since it may not be printable.
* * pkclist.c (do_edit_ownertrust): Fix kbnode leak.David Shaw2004-05-232-0/+5
|
* * sign.c (update_keysig_packet): Policies and notations should be strippedDavid Shaw2004-05-192-0/+18
| | | | | out when remaking a self-signature. Noted by Atom Smasher.
* (do_generate_keypair, read_parameter_file): ReallyWerner Koch2004-05-112-0/+24
| | | | | | | close the files. (do_generate_keypair): Create the secret key file using safe permissions. Noted by Atom Smasher.
* (write_plaintext_packet): Fixed the detection of tooWerner Koch2004-05-072-8/+18
| | | | | large files in the same way as in encode.c.
* * keygen.c (make_backsig): If DO_BACKSIGS is not defined, do not createDavid Shaw2004-04-237-7/+123
| | | | | | | | | | | | | | | | backsigs. * getkey.c (merge_selfsigs_subkey): Find 0x19 backsigs on subkey selfsigs and verify they are valid. If DO_BACKSIGS is not defined, fake this as always valid. * packet.h, parse-packet.c (parse_signature): Make parse_signature non-static so we can parse 0x19s in self-sigs. * main.h, sig-check.c (check_backsig): Check a 0x19 signature. (signature_check2): Give a backsig warning if there is no or a bad 0x19 with signatures from a subkey.
* * parse-packet.c (dump_sig_subpkt, parse_one_sig_subpkt,David Shaw2004-04-222-69/+86
| | | | | can_handle_critical): Parse and display 0x19 signatures.
* * keyserver.c (parse_keyserver_uri): Do not accept "http" as an alias forDavid Shaw2004-04-202-2/+6
| | | | | "hkp". They are not the same thing.
* * keygen.c (make_backsig): New function to add a backsig to a binding sigDavid Shaw2004-04-135-19/+139
| | | | | | | | | | | | of signing subkeys. Currently disabled. (write_keybinding): Call it here, for signing subkeys only. * sign.c (make_keysig_packet): Allow generating 0x19 signatures (same as 0x18 or 0x28, but used for backsigs). * packet.h, build-packet.c (build_sig_subpkt): Add new SIGSUBPKT_SIGNATURE type for embedded signatures.
* * g10.c (main): --no-use-embedded-filename.David Shaw2004-04-013-1/+14
| | | | | | | | * plaintext.c (handle_plaintext): Accept 'u' as a plaintext mode that requires end of line conversion. This is being considered for a UTF8 text packet. If this doesn't take place, no major harm done. If it does take place, we'll get a jump on starting the changeover.
* *** empty log message ***Werner Koch2004-03-292-11/+60
|
* * keyedit.c (keyedit_menu): Request a trustdb update when adding a newDavid Shaw2004-03-272-2/+10
| | | | | user ID so the new ID gets validity set. Reported by Owen Taylor.
* * build-packet.c (calc_plaintext, do_plaintext): Do not create illegalDavid Shaw2004-03-262-7/+15
| | | | | | | (packet header indicates a size larger than the actual packet) encrypted data packets when not compressing and using a filename longer than 255 characters.
* * options.h, g10.c (main), compress-bz2.c (init_uncompress): BackportDavid Shaw2004-03-254-3/+13
| | | | | | --bzip2-decompress-lowmem since we do handle receiving a bzip2 message on the stable branch.
* * keyedit.c (no_primary_warning): Cleanup. (menu_expire): Don't giveDavid Shaw2004-03-232-18/+22
| | | | | | primary warning for subkey expiration changes. These cannot reorder primaries.
* * packet.h, getkey.c (fixup_uidnode, merge_selfsigs_subkey): Keep track ofDavid Shaw2004-03-224-4/+22
| | | | | | | | | which self-sig we actually chose. * keyedit.c (menu_expire, menu_set_primary_uid, menu_set_preferences): Use it here to avoid updating non-used self-sigs and possibly promoting an old self-sig into consideration again.
* * keygen.c (write_keybinding, do_generate_keypair, generate_subkeypair):David Shaw2004-03-182-30/+42
| | | | | | Keep track of the unprotected subkey secret key so we can make a backsig with it.
* * keygen.c (gen_elg, gen_dsa, gen_rsa, do_create, do_generate_keypair,David Shaw2004-03-182-19/+31
| | | | | | | generate_subkeypair): New is_subkey argument to set whether a generated key is a subkey. Do not overload the ret_sk. This is some early cleanup to do backsigs for signing subkeys.
* * import.c (import_one): Try and collapse user IDs when importing a keyDavid Shaw2004-03-094-11/+23
| | | | | | | | | | | | for the first time. * build-packet.c (do_comment, do_user_id): Try for a headerlen of 2 since that's the smallest and most likely encoding for these packets * keyedit.c (menu_addrevoker): Allow appointing a subkey as a designated revoker if the user forces it via keyid!, so long as the subkey can certify. Also use the proper date string when prompting for confirmation.
* * options.h (ctrl): New for member IN_AUTO_KEY_RETRIEVE.Werner Koch2004-03-014-8/+66
| | | | | | | | * mainproc.c (check_sig_and_print): track whether we are retrieving a key. * status.c (status_currently_allowed): New. (write_status_text, write_status_text_and_buffer): Use it here.
* * keyedit.c (menu_addrevoker): Do not allow appointing a subkey as aDavid Shaw2004-02-272-0/+12
| | | | | designated revoker.
* * delkey.c (do_delete_key): Allow deleting a public key with a secretDavid Shaw2004-02-253-7/+15
| | | | | | | | present if --expert is set. * plaintext.c (handle_plaintext): Make bytecount static so it works with multiple literal packets inside a message.
* * encode.c (encode_simple): Show cipher with --verbose.David Shaw2004-02-246-160/+187
| | | | | | | | | | | | * options.h, g10.c (main), keyedit.c (sign_keys): Add --ask-cert-level option to enable cert level prompts during sigs. Defaults to on. Simplify --default-cert-check-level to --default-cert-level. If ask-cert-level is off, or batch is on, use the default-cert-level as the cert level. * options.h, g10.c (main), trustdb.c (mark_usable_uid_certs): Simplify --min-cert-check-level to --min-cert-level.
* * options.h, g10.c (main), trustdb.c (mark_usable_uid_certs): AddDavid Shaw2004-02-235-30/+104
| | | | | | | | | --min-cert-check-level option to specify minimum cert check level. Defaults to 1 (so no sigs are ignored). 0x10 sigs cannot be ignored. * options.h, g10.c (main), plaintext.c (handle_plaintext): Add --max-output option to help people deal with decompression bombs.
* * build-packet.c (do_user_id): Do not force a header for attribute packetsDavid Shaw2004-02-152-3/+7
| | | | | | as they require a new CTB, and we don't support forced headers for new CTBs yet.
* * build-packet.c (write_header2): If a suggested header length is providedDavid Shaw2004-02-143-28/+41
| | | | | | | | | | along with a zero length, interpret this as an actual zero length packet and not as an indeterminate length packet. (do_comment, do_user_id): Use it here as these packets might be naturally zero length. * parse-packet.c (parse): Show packet type when failing due to an indeterminate length packet.
* * import.c (import_one): Do the revocation check even in the case when aDavid Shaw2004-02-122-6/+16
| | | | | | | key, a revocation key set in a direct key signature, and a revocation from that revocation key, all arrive piecemeal. Needless to say, this is pretty obscure.
* * g10.c (rm_group): Properly ungroup from a list of groups.David Shaw2004-02-102-0/+5
|
* * misc.c (compress_algo_to_string): Return NULL on failure like all of theDavid Shaw2004-02-105-22/+53
| | | | | | | | | | | | | | | | other xxxx_algo_to_string() functions. * mainproc.c (list_node): Minor spacing tweak to match --list-keys output. * keylist.c (list_keyblock_print), mainproc.c (list_node): Mark revoked subkeys as revoked. Requested by Matthew Wilcox. Make revoked and expired tags translatable (they are already translated elsewhere). Revoked overrides expiration when both apply. * keyedit.c (show_prefs): Use compress algo constants. (show_basic_key_info): Make revoked and expired tags translatable (show_key_with_all_names): Revoked overrides expired when both apply.
* * getkey.c (merge_selfsigs_main): Properly handle expired user IDs whenDavid Shaw2004-02-072-13/+20
| | | | | the expired self-sig is not the only self-sig.
* * decrypt.c: Fix copyright date.David Shaw2004-01-296-28/+16
| | | | | | | * packet.h, keyedit.c (show_key_with_all_names_colon), keylist.c (list_keyblock_colon), mainproc.c (list_node, proc_tree): Minor cleanup to remove local_id, which is no longer used.
* * g10.c (main, rm_group): Add --ungroup command to remove a particularDavid Shaw2004-01-282-7/+61
| | | | | | | group. (add_group): When adding a group with the same name as an already existing group, merge the two groups. (list_config): Show an error message when listing a config item that doesn't exist.
* * getkey.c: Set MAX_PK_CACHE_ENTRIES and MAX_UID_CACHE_ENTRIES toDavid Shaw2004-01-272-11/+24
| | | | | | | | | PK_UID_CACHE_SIZE (set in ./configure). * getkey.c (get_pubkey): When reading key data into the cache, properly handle keys that are partially (pk, no UIDs) cached already. This is Debian bug #176425 and #229549.
* * compress.c (init_compress): Remove "-z10" trick to get uncompressed dataDavid Shaw2004-01-264-15/+58
| | | | | | | | | | inside a compressed data packet. This is possibly dangerous without an MDC. (push_compress_filter2): Do the right thing (i.e. nothing) with compress algo 0. * main.h, decrypt.c (decrypt_messages): Accept filenames to decrypt on stdin. This is bug #253.
* * getkey.c (merge_selfsigs): If a subkey is already revoked by the owner,David Shaw2004-01-212-1/+7
| | | | | | don't allow a designated revokation of the whole key to override this. We're still revoked either way, of course.
* * g10.c (list_config): Add "version" tag for --list-config.David Shaw2004-01-212-24/+35
|