aboutsummaryrefslogtreecommitdiffstats
path: root/g10 (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* * main.h, g10.c (main), import.c (parse_import_options,David Shaw2003-04-094-10/+22
| | | | | | | | | fix_pks_corruption): It's really PKS corruption, not HKP corruption. Keep the old repair-hkp-subkey-bug command as an alias. * g10.c (main): Rename --no-version to --no-emit-version for consistency. Keep --no-version as an alias.
* Add primary key fingerprint to VALIDSIG status.Werner Koch2003-04-082-8/+33
|
* * pkclist.c (algo_available): PGP 8 can use the SHA-256 hash.David Shaw2003-04-043-21/+29
| | | | | | * sign.c (sign_file, clearsign_file, sign_symencrypt_file): Remove unused code.
* * keydb.h: Err on the side of making an unknown signature a SIG ratherDavid Shaw2003-03-247-14/+48
| | | | | | | | | | | | | | | | | | | than a CERT. * import.c (delete_inv_parts): Discard any key signatures that aren't key types (i.e. 0x00, 0x01, etc.) * g10.c (main): Add deprecated option warning for --list-ownertrust. Add --compression-algo alias for --compress-algo. Change --version output strings to match "showpref" strings, and make translatable. * status.c (do_get_from_fd): Accept 'y' as well as 'Y' for --command-fd boolean input. * trustdb.c: Fix typo (DISABLE_REGEXP -> DISABLE_REGEX) * keyedit.c (show_key_with_all_names_colon): Show no-ks-modify flag.
* * options.h, g10.c (main), keyserver.c (kopts): Add "try-dns-srv"David Shaw2003-03-115-5/+20
| | | | | | | | | keyserver option. Defaults to on. * passphrase.c (agent_get_passphrase): Fix memory leak with symmetric messages. Fix segfault with symmetric messages. Fix incorrect prompt with symmetric messages.
* * compress.c (init_uncompress): Use a 15 bit window size so thatWerner Koch2003-03-102-1/+12
| | | | | | the output of implementations which don't run for PGP 2 compatibility won't get garbled.
* * trustdb.c (validate_keys): Mask the ownertrust when building the list ofDavid Shaw2003-03-0413-26/+103
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | fully valid keys so that disabled keys are still counted in the web of trust. (get_ownertrust_with_min): Do the same for the minimum ownertrust calculation. * parse-packet.c (dump_sig_subpkt): Show the notation names for not-human-readable notations. Fix cosmetic off-by-one length counter. * options.skel: Add explantion and commented-out "no-mangle-dos-filenames". * mainproc.c (proc_encrypted): Make string translatable. * keyserver.c (keyserver_spawn): Quote ':', '%', and any 8-bit characters in the uid strings sent to the keyserver helper. * keyring.c (keyring_rebuild_cache): Lock the keyring while rebuilding the signature caches to prevent another gpg from tampering with the temporary copy. * keygen.c (keygen_set_std_prefs): Include AES192 and AES256 in default prefs. * keyedit.c (show_prefs): Make strings translatable. * keydb.c: Double the maximum number of keyrings to 40. * gpgv.c (main): Fix bug #113 - gpgv should accept the --ignore-time-conflict option. * g10.c (main): --openpgp disables --pgpX. Double the amount of secure memory to 32k (keys are getting bigger these days). * Makefile.am: Makefile.am: Use @CAPLIBS@ to link in -lcap if we are using capabilities.
* * keyserver.c (keyserver_spawn): Include various pieces of informationDavid Shaw2003-02-264-9/+100
| | | | | | | | | | | | about the key in the data sent to the keyserver helper. This allows the helper to use it in instructing a remote server which may not have any actual OpenPGP smarts in parsing keys. * main.h, export.c (export_pubkeys_stream, do_export_stream): Add ability to return only the first match in an exported keyblock for keyserver usage. This should be replaced at some point with a more flexible solution where each key can be armored seperately.
* * sign.c (sign_file): Do not push textmode filter onto an unopened IOBUFDavid Shaw2003-02-226-17/+101
| | | | | | | | | | | | | (segfault). Noted by Marcus Brinkmann. Push and reinitialize textmode filter for each file in a multiple file list. * packet.h, getkey.c (fixup_uidnode), keyedit.c (show_prefs): Set and show the keyserver no-modify flag. * keygen.c (add_keyserver_modify): New. (keygen_upd_std_prefs): Call it here. (keygen_set_std_prefs): Accept "ks-modify" and "no-ks-modify" as prefs to set and unset keyserver modify flag.
* * g10.c (main): Accept "s1" in addition to "idea" to match the otherDavid Shaw2003-02-224-1/+17
| | | | | | | | ciphers. * main.h, misc.c (idea_cipher_warn): We don't need this if IDEA has been disabled.
* * keygen.c (keygen_set_std_prefs): Don't put AES or CAST5 in default prefsDavid Shaw2003-02-212-4/+22
| | | | | if they are disabled.
* * g10.c (main): Use 3DES instead of CAST5 if we don't have CAST5 support.David Shaw2003-02-212-19/+38
| | | | | | Use 3DES for the s2k cipher in --openpgp mode. (print_mds): #ifdef all of the optional digest algorithms.
* * keydb.h, getkey.c (classify_user_id, classify_user_id2): Make 'exact' aDavid Shaw2003-02-127-34/+127
| | | | | | | | | | | | | | | | | | per-desc item. Merge into one function since 'force_exact' is no longer needed. (key_byname): Use new classify_user_id function, and new exact flag in KEYDB_SEARCH_DESC. * keyring.h, keyring.c (keyring_search): Return an optional index to show which KEYDB_SEARCH_DESC was the matching one. * keydb.h, keydb.c (keydb_search): Rename to keydb_search2, and pass the optional index to keyring_search. Add a macro version of keydb_search that calls this new function. * export.c (do_export_stream): If the keyid! syntax is used, export only that specified key. If the key in question is a subkey, export the primary plus that subkey only.
* * exec.c (set_exec_path): Add debugging line.David Shaw2003-02-123-61/+110
| | | | | | | | | * g10.c (print_hex, print_mds): Print long hash strings a lot neater. This assumes at least an 80-character display, as there are a few other similar assumptions here and there. Users who need unformatted hashes can still use with-colons. Check that SHA384 and 512 are available before using them as they are no longer always available.
* * Makefile.am: Use a local copy of libexecdir along with @PACKAGE@ asDavid Shaw2003-02-122-1/+8
| | | | | GNUPG_LIBEXECDIR so it can be easily overridden at make time.
* * armor.c (parse_hash_header, armor_filter): Accept the new SHAs in theDavid Shaw2003-02-043-19/+51
| | | | | | | | armor Hash: header. * g10.c (print_hex): Print long hash strings a little neater. (print_mds): Add the new SHAs to the hash list.
* * keyedit.c (menu_revuid): Properly handle a nonselfsigned uid on a v4 keyDavid Shaw2003-02-023-16/+17
| | | | | | | (treat as a v4 revocation). * import.c (print_import_check): Do not re-utf8 convert user IDs.
* * mainproc.c (list_node): Show signature expiration date in with-colonsDavid Shaw2003-01-273-7/+35
| | | | | | | | sig records. * keylist.c (list_keyblock_colon), mainproc.c (list_node): Show trust sig information in with-colons sig records.
* * g10.c (add_group): Trim whitespace after a group name so it does notDavid Shaw2003-01-165-7/+26
| | | | | | | | | | | | | | | | matter where the user puts the = sign. * options.skel: Comment out the first three lines in case someone manually copies the skel file to their homedir. * sign.c (clearsign_file): Only use pgp2mode with v3 keys and MD5. This matches what we do when decoding such messages and prevents creating a message (v3+RIPEMD/160) that we can't verify. * sig-check.c (signature_check2): Use G10ERR_GENERAL as the error for signature digest conflict. BAD_SIGN implies that a signature was checked and we may try and print out a user ID for a key that doesn't exist.
* * trustdb.c (init_trustdb, get_validity): Don't use a changed trust modelDavid Shaw2003-01-153-3/+13
| | | | | | | | to indicate a dirty trustdb, and never auto-rebuild a dirty trustdb with the "always" trust model. * g10.c (add_group): Last commit missed the \t ;)
* * packet.h, parse-packet.c (setup_user_id), free-packet.c (free_user_id),David Shaw2003-01-148-39/+65
| | | | | | | | | | | | keydb.h, keyid.c (namehash_from_uid): New function to rmd160-hash the contents of a user ID packet and cache it in the uid object. * keylist.c (list_keyblock_colon): Use namehash in field 8 of uids. Show dates for creation (selfsig date), and expiration in fields 6 and 7. * trustdb.c (get_validity, get_validity_counts, update_validity): Use new namehash function rather than hashing it locally.
* * g10.c (add_group): Fixed group parsing to allow more than oneWerner Koch2003-01-142-2/+10
| | | | | delimiter in a row and also allow tab as delimiter.
* * tdbio.c (tdbio_set_dbname): Fix assertion failure withDavid Shaw2003-01-122-3/+17
| | | | | non-fully-qualified trustdb names.
* * trustdb.c (get_validity_info, get_ownertrust_info, trust_letter):David Shaw2003-01-114-48/+98
| | | | | | | | | | | | | | | | Simplify by returning a ? for error directly. * keyedit.c (show_key_with_all_names): Use get_validity_string and get_ownertrust_string to show full word versions of trust (i.e. "full" instead of 'f'). * trustdb.h, trustdb.c (get_ownertrust_string, get_validity_string): Same as get_ownertrust_info, and get_validity_info, except returns a full string. * trustdb.c (get_ownertrust_with_min): New. Same as 'get_ownertrust' but takes the min_ownertrust value into account.
* * armor.c (armor_filter): Comment about PGP's end of line tab problem.David Shaw2003-01-1110-58/+65
| | | | | | | | | | | | | | | * trustdb.h, trustdb.c (trust_letter): Make static. (get_ownertrust_info, get_validity_info): Don't mask the trust level twice. * trustdb.h, gpgv.c, trustdb.c (get_validity, get_validity_info), keylist.c (list_keyblock_colon), keyedit.c (show_key_with_all_names_colon, menu_revuid): Pass a user ID in rather than a namehash, so we only have to do the hashing in one place. * packet.h, pkclist.c (build_pk_list), free-packet.c (release_public_key_parts): Remove unused namehash element for public keys.
* * keygen.c (keygen_set_std_prefs): Warn when setting an IDEA preferenceDavid Shaw2003-01-072-1/+12
| | | | | when IDEA is not available.
* * trustdb.c (get_validity_info): 'd' for disabled is not a validity valueDavid Shaw2003-01-072-2/+3
| | | | | any more.
* * packet.h, tdbio.h, tdbio.c (tdbio_read_record, tdbio_write_record),David Shaw2003-01-065-93/+178
| | | | | | | | | | | | trustdb.c (update_validity): Store temporary full & marginal counts in the trustdb. (clear_validity, get_validity_counts): Return and clear temp counts. (store_validation_status): Keep track of which keyids have been stored. (validate_one_keyblock, validate_key_list): Use per-uid copies of the full & marginal counts so they can be recalled for multiple levels. (validate_keys): Only use unused keys for each new round. (reset_unconnected_keys): Rename to reset_trust_records, and only skip specifically excluded records.
* * keylist.c (print_capabilities): Show 'D' for disabled keys inDavid Shaw2003-01-063-3/+21
| | | | | | | capabilities section. * trustdb.c (is_disabled): Remove incorrect comment.
* * import.c (import_one): Only do the work to create the status display forDavid Shaw2003-01-034-10/+27
| | | | | | | | | | | interactive import if status is enabled. * keyring.c (keyring_search): skipfnc didn't work properly with non-keyid searches. Noted by Stefan Bellon. * getkey.c (merge_selfsigs_main): Remove some unused code and make sure that the pk selfsigversion member accounts for 1F direct sigs.
* * keydb.c (keydb_add_resource): Don't assume that try_make_homedirWerner Koch2003-01-023-15/+46
| | | | | | | | terminates but check again for the existence of the directory and continue then. * openfile.c (copy_options_file): Print a warning if the skeleton file has active options.
* * getkey.c (merge_selfsigs_main), main.h, sig-check.cDavid Shaw2002-12-294-13/+29
| | | | | | | | (check_key_signature2): Pass the ultimately trusted pk directly to check_key_signature2 to avoid going through the key selection mechanism. This prevents a deadly embrace when two keys without selfsigs each sign the other.
* * keyserver.c (keyserver_refresh): Don't print the "refreshing..." line ifDavid Shaw2002-12-273-7/+26
| | | | | | | | there are no keys to refresh or if there is no keyserver set. * getkey.c (merge_selfsigs_main): Any valid user ID should make a key valid, not just the last one. This also fixes Debian bug #174276.
* fixed type problemStefan Bellon2002-12-272-1/+5
|
* * keyedit.c (keyedit_menu, menu_revuid): Add "revuid" feature to revoke aDavid Shaw2002-12-272-7/+146
| | | | | | user ID. This is the same as issuing a revocation for the self-signature, but a much simpler interface to do it.
* * keydb.h, getkey.c (key_byname): Flag to enable or disable includingDavid Shaw2002-12-2610-16/+110
| | | | | | | | | | | | | | | | | | | | | | | | | | disabled keys. Keys specified via keyid (i.e. 0x...) are always included. * getkey.c (get_pubkey_byname, get_seckey_byname2, get_seckey_bynames), keyedit.c (keyedit_menu, menu_addrevoker): Include disabled keys in these functions. * pkclist.c (build_pk_list): Do not include disabled keys for -r or the key prompt. Do include disabled keys for the default key and --encrypt-to. * trustdb.h, trustdb.c (is_disabled): New skipfnc for skipping disabled keys. * gpgv.c (is_disabled): Stub. * keygen.c (keygen_add_key_expire): Properly handle updating a key expiration to a no-expiration value. * keyedit.c (enable_disable_key): Comment. * import.c (import_one): When in interactive mode and --verbose, don't repeat some key information twice.
* 2002-12-22 Timo Schulz <[email protected]>Timo Schulz2002-12-224-0/+38
| | | | | | | | | | * import.c (print_import_check): New. (import_one): Use it here. Use merge_keys_and_selfsig in the interactive mode to avoid wrong key information. * status.h: Add new status code. * status.c: Ditto.
* * pkclist.c (do_we_trust): Tweak language to refer to the "namedDavid Shaw2002-12-136-25/+59
| | | | | | | | | | | | | | | | | | | | user" rather than "owner". Noted by Stefan Bellon. * trustdb.h, trustdb.c (trustdb_pending_check): New function to check if the trustdb needs a check. * import.c (import_keys_internal): Used here so we don't rebuild the trustdb if it is still clean. (import_one, chk_self_sigs): Only mark trustdb dirty if the key that is being imported has any sigs other than self-sigs. Suggested by Adrian von Bidder. * options.skel: Include the required '=' sign in the sample 'group' option. Noted by Stefan Bellon. * import.c (chk_self_sigs): Don't try and check a subkey as if it was a signature.
* * tdbio.c (tdbio_read_record, tdbio_write_record): Compact theDavid Shaw2002-12-115-15/+46
| | | | | | | | | | | | | | | RECTYPE_TRUST records a bit. * g10.c (main): Comment out --list-trust-path until it can be implemented. * import.c (import_one): Warn when importing an Elgamal primary that this may take some time (to verify self-sigs). (chk_self_sigs): Try and cache all self-sigs so the keyblock is written to the keyring with a good rich cache. * keygen.c (ask_algo): Make the Elgamal sign+encrypt warning stronger, and remove the RSA sign+encrypt warning.
* fixed typoStefan Bellon2002-12-062-1/+6
|
* * g10.c: New options --[no-]mangle-dos-filenames.Werner Koch2002-12-054-70/+97
| | | | | | | * options.h (opt): Added mangle-dos-filenames. * openfile.c (open_outfile) [USE_ONLY_8DOT3]: Truncate the filename only when this option is set; this is the default.
* * main.h, keyedit.c, keygen.c: Back out previous (2002-12-01) change.David Shaw2002-12-047-78/+104
| | | | | | | | | | | | | | | | | | | | | | | | Minimal isn't always best. * sign.c (update_keysig_packet): Use the current time rather then a modification of the original signature time. Make sure that this doesn't cause a time warp. * keygen.c (keygen_add_key_expire): Properly handle a key expiration date in the past (use a duration of 0). * keyedit.c (menu_expire): Use update_keysig_packet so any sig subpackets are maintained during the update. * build-packet.c (build_sig_subpkt): Mark sig expired or unexpired when the sig expiration subpacket is added. (build_sig_subpkt_from_sig): Handle making an expiration subpacket from a sig that has already expired (use a duration of 0). * packet.h, sign.c (update_keysig_packet), keyedit.c (menu_set_primary_uid, menu_set_preferences): Add ability to issue 0x18 subkey binding sigs to update_keysig_packet and change all callers.
* * trustdb.c (validate_keys): Show trust parameters when building trustdb,David Shaw2002-12-043-27/+42
| | | | | | | | | and make sure that the version record update was successful. (init_trustdb): If the current parameters aren't what was used for building the trustdb, the trustdb is invalid. * tbio.c (tdbio_db_matches_options): Update to work with new trustdbs.
* * tdbio.h, tdbio.c (tdbio_read_record, tdbio_write_record): Store trustDavid Shaw2002-12-045-9/+51
| | | | | | | | | | | | model in the trustdb version record. (tdbio_update_version_record): New function to update version record values during a trustdb check or update. (tdbio_dump_record): Show trust model in dump. * trustdb.c (validate_keys): Call tdbio_update_version_record on success so that the correct options are stored in the trustdb. * options.h: rearrange trust models so that CLASSIC is 0 and OPENPGP is 1.
* * options.h, g10.c (main), encode.c (write_pubkey_enc_from_list),David Shaw2002-12-0310-37/+74
| | | | | | | | | | | | | | | pkclist.c (algo_available), revoke.c (gen_revoke): Add --pgp8 mode. This is basically identical to --pgp7 in all ways except that signing subkeys, v4 data sigs (including expiration), and SK comments are allowed. * getkey.c (finish_lookup): Comment. * main.h, keylist.c (reorder_keyblock), keyedit.c (keyedit_menu): Reorder user ID display in the --edit-key menu to match that of the --list-keys display. * g10.c (add_notation_data): Fix initialization.
* * keyedit.c (menu_expire): Don't lose key flags when changing theDavid Shaw2002-12-015-20/+71
| | | | | | | | | | | | | | expiration date of a subkey. This is not the most optimal solution, but it is minimal change on the stable branch. * main.h, keygen.c (do_copy_key_flags): New function to copy key flags, if any, from one sig to another. (do_add_key_expire): New function to add key expiration to a sig. (keygen_copy_flags_add_expire): New version of keygen_add_key_expire that also copies key flags. (keygen_add_key_flags_and_expire): Use do_add_key_expire. * import.c (fix_hkp_corruption): Comment.
* no RISC OS filetype needed for nooutputStefan Bellon2002-11-252-15/+25
|
* * main.h, misc.c (default_cipher_algo, default_compress_algo): New.David Shaw2002-11-256-23/+50
| | | | | | | | | | | | Return the default algorithm by trying --cipher-algo/--compress-algo, then the first item in the pref list, then s2k-cipher-algo or ZIP. * sign.c (sign_file, sign_symencrypt_file), encode.c (encode_simple, encode_crypt): Call default_cipher_algo and default_compress_algo to get algorithms. * g10.c (main): Allow pref selection for compress algo with --openpgp.
* * mainproc.c (proc_encrypted): Use --s2k-digest-algo for passphraseDavid Shaw2002-11-252-1/+4
| | | | | mangling rather than --digest-algo.
* * sign.c (hash_for): If --digest-algo is not set, butDavid Shaw2002-11-252-8/+38
| | | | | | | | --personal-digest-preferences is, then use the first hash algorithm in the personal list. If the signing algorithm is DSA, then use the first 160-bit hash algorithm in the personal list. If --pgp2 is set and it's a v3 RSA key, use MD5.