aboutsummaryrefslogtreecommitdiffstats
path: root/g10 (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* * g10.c, options.h: New option --enable-progress-filter.Werner Koch2003-04-1513-14/+108
| | | | | * progress.c (handle_progress): Make use of it.
* This commit was manufactured by cvs2svn to create branchRepo Admin2003-04-151-0/+104
| | | | 'STABLE-BRANCH-1-2'.
* Reverted recent changes to --output. This is the stable branch and itWerner Koch2003-04-145-113/+62
| | | | | might break applications.
* Forgot to sync the CVS. Check in the code again.Timo Schulz2003-04-135-62/+113
|
* Return cancel flag also for the old agent protocol.Werner Koch2003-04-101-1/+5
|
* * passphrase.c (read_passphrase_from_fd): Do a dummy read if theWerner Koch2003-04-102-35/+48
| | | | | | | | agent is to be used. Noted by Ingo Kl�cker. (agent_get_passphrase): Inhibit caching when we have no fingerprint. This is required for key generation as well as for symmetric only encryption.
* * passphrase .c (agent_get_passphrase): New arg CANCELED.Werner Koch2003-04-0910-36/+126
| | | | | | | | | | | | | | | | (passphrase_to_dek): Ditto. Passed to above. Changed all callers to pass NULL. * seckey-cert.c (do_check): New arg CANCELED. (check_secret_key): Terminate loop when canceled. * keyedit.c (change_passphrase): Pass ERRTEXT untranslated to passphrase_to_dek and translate where appropriate. * seckey-cert.c (check_secret_key): Ditto. * keygen.c (ask_passphrase): Ditto. * passphrase.c (agent_get_passphrase): Translate the TRYAGAIN_TEXT. Switch the codeset to utf-8.
* * decrypt.c (decrypt_messages): Fixed error handling; the fucntionWerner Koch2003-04-092-13/+14
| | | | | | used to re-loop with same file after an error. Reported by Joseph Walton.
* * hkp.c (dehtmlize): Fix bug #121 (memory corruption on some platforms).David Shaw2003-04-096-10/+38
| | | | | | | | | | | | | | | | Special thanks to Michael C. Toren for his help in lining up a sparc to test this fix on. * keyserver.c (keyserver_work): Call out error for keyserver helper with a different version than us. * main.h, g10.c (main), import.c (parse_import_options, fix_pks_corruption): It's really PKS corruption, not HKP corruption. Keep the old repair-hkp-subkey-bug command as an alias. * g10.c (main): Rename --no-version to --no-emit-version for consistency. Keep --no-version as an alias.
* * Makefile.am (EXTRA_DIST): Add autogen.sh wrapper which isWerner Koch2003-04-082-8/+33
| | | | | useful for some cross-compiling targets.
* * pkclist.c (algo_available): PGP 8 can use the SHA-256 hash.David Shaw2003-04-043-21/+29
| | | | | | * sign.c (sign_file, clearsign_file, sign_symencrypt_file): Remove unused code.
* * keydb.h: Err on the side of making an unknown signature a SIG ratherDavid Shaw2003-03-243-5/+19
| | | | | | | | than a CERT. * import.c (delete_inv_parts): Discard any key signatures that aren't key types (i.e. 0x00, 0x01, etc.)
* * configure.ac: Test for ranlib and ar.Werner Koch2003-03-242-3/+6
| | | | | * Makefile.am: Make use of AM_CFLAGS and AM_LDFLAGS.
* * status.c (do_get_from_fd): Accept 'y' as well as 'Y' for --command-fdDavid Shaw2003-03-213-7/+22
| | | | | | | | | boolean input. * g10.c (main): Add deprecated option warning for --list-ownertrust. Add --compression-algo alias for --compress-algo. Change --version output strings to match "showpref" strings, and make translatable.
* * compress.c (init_uncompress): Use a 15 bit window size so thatWerner Koch2003-03-102-1/+12
| | | | | | the output of implementations which don't run for PGP 2 compatibility won't get garbled.
* * passphrase.c (agent_get_passphrase): Fix memory leak with symmetricDavid Shaw2003-03-052-5/+14
| | | | | | messages. Fix segfault with symmetric messages. Fix incorrect prompt with symmetric messages.
* * options.skel: Add explantion and commented-outDavid Shaw2003-03-044-10/+25
| | | | | | | | | | "no-mangle-dos-filenames". * mainproc.c (proc_encrypted): Make string translatable. * keygen.c (keygen_set_std_prefs): Include AES192, and AES256 in default prefs.
* * keyring.c (keyring_rebuild_cache): Lock the keyring while rebuilding theDavid Shaw2003-03-034-6/+25
| | | | | | | | | | | signature caches to prevent another gpg from tampering with the temporary copy. * keydb.c: Double the maximum number of keyrings to 40. * parse-packet.c (dump_sig_subpkt): Show the notation names for not-human-readable notations. Fix cosmetic off-by-one length counter.
* 2003-03-02 Timo Schulz <[email protected]>Timo Schulz2003-03-022-2/+10
| | | | | | * seckey-cert.c (do_check): Issue the RSA_OR_IDEA status when the cipher algo is IDEA to make it easier to track down the problem.
* * trustdb.c (validate_keys): Mask the ownertrust when building the list ofDavid Shaw2003-02-264-6/+20
| | | | | | | | | | | | fully valid keys so that disabled keys are still counted in the web of trust. * gpgv.c (main): Fix bug #113 - gpgv should accept the --ignore-time-conflict option. * g10.c (main): Use 3DES for the s2k cipher in --openpgp mode. Double the amount of secure memory to 32k (keys are getting bigger these days).
* * g10.c (main): --openpgp disables --pgpX.David Shaw2003-02-233-6/+22
| | | | | * keyedit.c (show_prefs): Make strings translatable.
* * Makefile.am: Use @CAPLIBS@ to link in -lcap if we are usingDavid Shaw2003-02-192-1/+6
| | | | | capabilities.
* * sign.c (sign_file): Do not push textmode filter onto an unopened IOBUFDavid Shaw2003-02-132-2/+17
| | | | | | (segfault). Noted by Marcus Brinkmann. Push and reinitialize textmode filter for each file in a multiple file list.
* * g10.c (print_mds): Check that SHA384 and 512 are available before usingDavid Shaw2003-02-114-7/+25
| | | | | | | | | them as they are no longer always available. * exec.c (set_exec_path): Add debugging line. * Makefile.am: Use the more correct @PACKAGE@ rather than "gnupg".
* * Makefile.am: Pass GNUPG_LIBEXECDIR as part of CFLAGS so it can be easilyDavid Shaw2003-02-062-1/+8
| | | | | overridden at make time.
* * g10.c (print_hex, print_mds): Print long hash strings a lot neater.David Shaw2003-02-052-57/+95
| | | | | | | This assumes at least an 80-character display, as there are a few other similar assumptions here and there. Users who need unformatted hashes can still use with-colons.
* * armor.c (parse_hash_header, armor_filter): Accept the new SHAs in theDavid Shaw2003-02-043-18/+50
| | | | | | | | armor Hash: header. * g10.c (print_hex): Print long hash strings a little neater. (print_mds): Add the new SHAs to the hash list.
* * keyedit.c (menu_revuid): Properly handle a nonselfsigned uid on a v4 keyDavid Shaw2003-02-025-6/+170
| | | | | | | | | | | | | (treat as a v4 revocation). * keyedit.c (keyedit_menu, menu_revuid): Backport "revuid" from devel. * import.c (print_import_check): Do not re-utf8 convert user IDs. * status.h, status.c (get_status_string), import.c (import_one, print_import_check): Backport Timo's IMPORT_CHECK status message from devel.
* * g10.c (add_group): Trim whitespace after a group name so it does notDavid Shaw2003-01-162-0/+5
| | | | | matter where the user puts the = sign.
* * options.skel: Comment out the first three lines in case someone manuallyDavid Shaw2003-01-162-4/+9
| | | | | copies the skel file to their homedir.
* * sign.c (clearsign_file): Only use pgp2mode with v3 keys and MD5. ThisDavid Shaw2003-01-152-2/+8
| | | | | | matches what we do when decoding such messages and prevents creating a message (v3+RIPEMD/160) that we can't verify.
* * sig-check.c (signature_check2): Use G10ERR_GENERAL as the error forDavid Shaw2003-01-152-1/+8
| | | | | | signature digest conflict. BAD_SIGN implies that a signature was checked and we may try and print out a user ID for a key that doesn't exist.
* * g10.c (add_group): Fixed group parsing to allow more than oneWerner Koch2003-01-142-2/+10
| | | | | delimiter in a row and also allow tab as delimiter.
* * tdbio.c (tdbio_set_dbname): Fix assertion failure withDavid Shaw2003-01-122-3/+17
| | | | | non-fully-qualified trustdb names.
* * trustdb.h, trustdb.c (trust_letter): Make static. (get_ownertrust_info,David Shaw2003-01-104-11/+24
| | | | | | | get_validity_info): Don't mask the trust level twice. * armor.c (armor_filter): Comment about PGP's end of line tab problem.
* * packet.h, pkclist.c (build_pk_list), free-packet.cDavid Shaw2003-01-099-35/+31
| | | | | | | | | | (release_public_key_parts): Remove unused namehash element for public keys. * trustdb.h, gpgv.c, trustdb.c (get_validity, get_validity_info): Pass a user ID in rather than a namehash, so we only have to do the hashing in one place.
* Preparing a release candidate.Werner Koch2003-01-073-5/+5
|
* * packet.h, tdbio.h, tdbio.c (tdbio_read_record, tdbio_write_record),David Shaw2003-01-065-85/+169
| | | | | | | | | | | | trustdb.c (update_validity): Store temporary full & marginal counts in the trustdb. (clear_validity, get_validity_counts): Return and clear temp counts. (store_validation_status): Keep track of which keyids have been stored. (validate_one_keyblock, validate_key_list): Use per-uid copies of the full & marginal counts so they can be recalled for multiple levels. (validate_keys): Only use unused keys for each new round. (reset_unconnected_keys): Rename to reset_trust_records, and only skip specifically excluded records.
* * keylist.c (print_capabilities): Show 'D' for disabled keys inDavid Shaw2003-01-063-3/+21
| | | | | | | capabilities section. * trustdb.c (is_disabled): Remove incorrect comment.
* * getkey.c (merge_selfsigs_main): Remove some unused code and make sureDavid Shaw2003-01-033-9/+22
| | | | | | | | that the pk selfsigversion member accounts for 1F direct sigs. * keyring.c (keyring_search): skipfnc didn't work properly with non-keyid searches. Noted by Stefan Bellon.
* * keydb.c (keydb_add_resource): Don't assume that try_make_homedirWerner Koch2003-01-023-9/+43
| | | | | | | | terminates but check again for the existence of the directory and continue then. * openfile.c (copy_options_file): Print a warning if the skeleton file has active options.
* (oops) The rest of the fix from previous checkin.David Shaw2002-12-282-13/+15
|
* * getkey.c (merge_selfsigs_main), main.h, sig-check.cDavid Shaw2002-12-284-9/+21
| | | | | | | | (check_key_signature2): Pass the ultimately trusted pk directly to check_key_signature2 to avoid going through the key selection mechanism. This prevents a deadly embrace when two keys without selfsigs each sign the other.
* * keyserver.c (keyserver_refresh): Don't print the "refreshing..." line ifDavid Shaw2002-12-273-7/+26
| | | | | | | | there are no keys to refresh or if there is no keyserver set. * getkey.c (merge_selfsigs_main): Any valid user ID should make a key valid, not just the last one. This also fixes Debian bug #174276.
* * keygen.c (keygen_add_key_expire): Properly handle updating a keyDavid Shaw2002-12-264-2/+21
| | | | | | | | | | expiration to a no-expiration value. * keyedit.c (enable_disable_key): Comment. * import.c (import_one): When in interactive mode and --verbose, don't repeat some key information twice.
* 2002-12-23 Timo Schulz <[email protected]>Timo Schulz2002-12-232-0/+6
| | | | | | * import.c (import_one): Use merge_keys_and_selfsig in the interactive mode to avoid wrong key information.
* * keydb.h, getkey.c (key_byname): Flag to enable or disable includingDavid Shaw2002-12-198-14/+91
| | | | | | | | | | | | | | | | | | disabled keys. Keys specified via keyid (i.e. 0x...) are always included. * getkey.c (get_pubkey_byname, get_seckey_byname2, get_seckey_bynames), keyedit.c (keyedit_menu, menu_addrevoker): Include disabled keys in these functions. * pkclist.c (build_pk_list): Do not include disabled keys for -r or the key prompt. Do include disabled keys for the default key and --encrypt-to. * trustdb.h, trustdb.c (is_disabled): New skipfnc for skipping disabled keys. * gpgv.c (is_disabled): Stub.
* * options.skel: Include the required '=' sign in the sample 'group'David Shaw2002-12-123-2/+11
| | | | | | | | option. * import.c (chk_self_sigs): Don't try and check a subkey as if it was a signature.
* * mainproc.c (proc_tree): Handle multiple detached sigs concatenatedDavid Shaw2002-12-113-3/+16
| | | | | | | together by warning the user and processing only the first. * g10.c (main): Comment out --list-trust-path until it can be implemented.
* * keygen.c (ask_algo): Make the Elgamal sign+encrypt warning stronger, andDavid Shaw2002-12-063-10/+34
| | | | | | | | | | remove the RSA sign+encrypt warning. * import.c (import_one): Warn when importing an Elgamal primary that this may take some time (to verify self-sigs). (chk_self_sigs): Try and cache all self-sigs so the keyblock is written to the keyring with a good rich cache.