| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
| |
* progress.c (handle_progress): Make use of it.
|
|
|
|
| |
'STABLE-BRANCH-1-2'.
|
|
|
|
|
| |
might break applications.
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
agent is to be used. Noted by Ingo Kl�cker.
(agent_get_passphrase): Inhibit caching when we have no
fingerprint. This is required for key generation as well as for
symmetric only encryption.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
(passphrase_to_dek): Ditto. Passed to above. Changed all
callers to pass NULL.
* seckey-cert.c (do_check): New arg CANCELED.
(check_secret_key): Terminate loop when canceled.
* keyedit.c (change_passphrase): Pass ERRTEXT untranslated to
passphrase_to_dek and translate where appropriate.
* seckey-cert.c (check_secret_key): Ditto.
* keygen.c (ask_passphrase): Ditto.
* passphrase.c (agent_get_passphrase): Translate the TRYAGAIN_TEXT.
Switch the codeset to utf-8.
|
|
|
|
|
|
| |
used to re-loop with same file after an error. Reported by Joseph
Walton.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Special thanks to Michael C. Toren for his help in lining up a sparc to
test this fix on.
* keyserver.c (keyserver_work): Call out error for keyserver helper with a
different version than us.
* main.h, g10.c (main), import.c (parse_import_options,
fix_pks_corruption): It's really PKS corruption, not HKP corruption.
Keep the old repair-hkp-subkey-bug command as an alias.
* g10.c (main): Rename --no-version to --no-emit-version for consistency.
Keep --no-version as an alias.
|
|
|
|
|
| |
useful for some cross-compiling targets.
|
|
|
|
|
|
| |
* sign.c (sign_file, clearsign_file, sign_symencrypt_file): Remove unused
code.
|
|
|
|
|
|
|
|
| |
than a CERT.
* import.c (delete_inv_parts): Discard any key signatures that aren't key
types (i.e. 0x00, 0x01, etc.)
|
|
|
|
|
| |
* Makefile.am: Make use of AM_CFLAGS and AM_LDFLAGS.
|
|
|
|
|
|
|
|
|
| |
boolean input.
* g10.c (main): Add deprecated option warning for --list-ownertrust. Add
--compression-algo alias for --compress-algo. Change --version output
strings to match "showpref" strings, and make translatable.
|
|
|
|
|
|
| |
the output of implementations which don't run for PGP 2
compatibility won't get garbled.
|
|
|
|
|
|
| |
messages. Fix segfault with symmetric messages. Fix incorrect prompt
with symmetric messages.
|
|
|
|
|
|
|
|
|
|
| |
"no-mangle-dos-filenames".
* mainproc.c (proc_encrypted): Make string translatable.
* keygen.c (keygen_set_std_prefs): Include AES192, and AES256 in default
prefs.
|
|
|
|
|
|
|
|
|
|
|
| |
signature caches to prevent another gpg from tampering with the temporary
copy.
* keydb.c: Double the maximum number of keyrings to 40.
* parse-packet.c (dump_sig_subpkt): Show the notation names for
not-human-readable notations. Fix cosmetic off-by-one length counter.
|
|
|
|
|
|
| |
* seckey-cert.c (do_check): Issue the RSA_OR_IDEA status when
the cipher algo is IDEA to make it easier to track down the problem.
|
|
|
|
|
|
|
|
|
|
|
|
| |
fully valid keys so that disabled keys are still counted in the web of
trust.
* gpgv.c (main): Fix bug #113 - gpgv should accept the
--ignore-time-conflict option.
* g10.c (main): Use 3DES for the s2k cipher in --openpgp mode. Double the
amount of secure memory to 32k (keys are getting bigger these days).
|
|
|
|
|
| |
* keyedit.c (show_prefs): Make strings translatable.
|
|
|
|
|
| |
capabilities.
|
|
|
|
|
|
| |
(segfault). Noted by Marcus Brinkmann. Push and reinitialize textmode
filter for each file in a multiple file list.
|
|
|
|
|
|
|
|
|
| |
them as they are no longer always available.
* exec.c (set_exec_path): Add debugging line.
* Makefile.am: Use the more correct @PACKAGE@ rather than "gnupg".
|
|
|
|
|
| |
overridden at make time.
|
|
|
|
|
|
|
| |
This assumes at least an 80-character display, as there are a few other
similar assumptions here and there. Users who need unformatted hashes can
still use with-colons.
|
|
|
|
|
|
|
|
| |
armor Hash: header.
* g10.c (print_hex): Print long hash strings a little neater. (print_mds):
Add the new SHAs to the hash list.
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
(treat as a v4 revocation).
* keyedit.c (keyedit_menu, menu_revuid): Backport "revuid" from devel.
* import.c (print_import_check): Do not re-utf8 convert user IDs.
* status.h, status.c (get_status_string), import.c (import_one,
print_import_check): Backport Timo's IMPORT_CHECK status message from
devel.
|
|
|
|
|
| |
matter where the user puts the = sign.
|
|
|
|
|
| |
copies the skel file to their homedir.
|
|
|
|
|
|
| |
matches what we do when decoding such messages and prevents creating a
message (v3+RIPEMD/160) that we can't verify.
|
|
|
|
|
|
| |
signature digest conflict. BAD_SIGN implies that a signature was checked
and we may try and print out a user ID for a key that doesn't exist.
|
|
|
|
|
| |
delimiter in a row and also allow tab as delimiter.
|
|
|
|
|
| |
non-fully-qualified trustdb names.
|
|
|
|
|
|
|
| |
get_validity_info): Don't mask the trust level twice.
* armor.c (armor_filter): Comment about PGP's end of line tab problem.
|
|
|
|
|
|
|
|
|
|
| |
(release_public_key_parts): Remove unused namehash element for public
keys.
* trustdb.h, gpgv.c, trustdb.c (get_validity, get_validity_info): Pass a
user ID in rather than a namehash, so we only have to do the hashing in
one place.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
trustdb.c (update_validity): Store temporary full & marginal counts in the
trustdb. (clear_validity, get_validity_counts): Return and clear temp
counts. (store_validation_status): Keep track of which keyids have been
stored. (validate_one_keyblock, validate_key_list): Use per-uid copies of
the full & marginal counts so they can be recalled for multiple levels.
(validate_keys): Only use unused keys for each new round.
(reset_unconnected_keys): Rename to reset_trust_records, and only skip
specifically excluded records.
|
|
|
|
|
|
|
| |
capabilities section.
* trustdb.c (is_disabled): Remove incorrect comment.
|
|
|
|
|
|
|
|
| |
that the pk selfsigversion member accounts for 1F direct sigs.
* keyring.c (keyring_search): skipfnc didn't work properly with non-keyid
searches. Noted by Stefan Bellon.
|
|
|
|
|
|
|
|
| |
terminates but check again for the existence of the directory and
continue then.
* openfile.c (copy_options_file): Print a warning if the skeleton
file has active options.
|
| |
|
|
|
|
|
|
|
|
| |
(check_key_signature2): Pass the ultimately trusted pk directly to
check_key_signature2 to avoid going through the key selection mechanism.
This prevents a deadly embrace when two keys without selfsigs each sign
the other.
|
|
|
|
|
|
|
|
| |
there are no keys to refresh or if there is no keyserver set.
* getkey.c (merge_selfsigs_main): Any valid user ID should make a key
valid, not just the last one. This also fixes Debian bug #174276.
|
|
|
|
|
|
|
|
|
|
| |
expiration to a no-expiration value.
* keyedit.c (enable_disable_key): Comment.
* import.c (import_one): When in interactive mode and --verbose, don't
repeat some key information twice.
|
|
|
|
|
|
| |
* import.c (import_one): Use merge_keys_and_selfsig in the
interactive mode to avoid wrong key information.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
disabled keys. Keys specified via keyid (i.e. 0x...) are always included.
* getkey.c (get_pubkey_byname, get_seckey_byname2, get_seckey_bynames),
keyedit.c (keyedit_menu, menu_addrevoker): Include disabled keys in these
functions.
* pkclist.c (build_pk_list): Do not include disabled keys for -r or the
key prompt. Do include disabled keys for the default key and
--encrypt-to.
* trustdb.h, trustdb.c (is_disabled): New skipfnc for skipping disabled
keys.
* gpgv.c (is_disabled): Stub.
|
|
|
|
|
|
|
|
| |
option.
* import.c (chk_self_sigs): Don't try and check a subkey as if it was a
signature.
|
|
|
|
|
|
|
| |
together by warning the user and processing only the first.
* g10.c (main): Comment out --list-trust-path until it can be implemented.
|
|
|
|
|
|
|
|
|
|
| |
remove the RSA sign+encrypt warning.
* import.c (import_one): Warn when importing an Elgamal primary that this
may take some time (to verify self-sigs). (chk_self_sigs): Try and cache
all self-sigs so the keyblock is written to the keyring with a good rich
cache.
|