| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
| |
encoded string.
|
|
|
|
|
|
|
|
| |
turns off force_mdc, turns on no_comment, escape_from, and force_v3_sigs,
and sets compression to 1. It also restricts the user to IDEA (if
present), 3DES, CAST5, MD5, SHA1, and RIPEMD160. See the comments above
algo_available() for lots of discussion on why you would want to do this.
|
|
|
|
|
|
|
|
|
|
| |
When key signing with multiple keys at the same time, make sure each key
gets the sigclass prompt
Close the iobuf and FILE before trying to reap the child process to
encourage the child to exit
Disable cache-on-close of the fd iobuf (shouldn't all fd iobufs not be
cached?)
|
|
|
|
|
|
|
|
| |
* passphrase.c (agent_open): Let it override the environment info.
* seckey-cert.c (check_secret_key): Always try 3 times when the
agent is enabled.
* options.skel: Describe --use-agent.
|
|
|
|
|
|
|
| |
prefs
Only put in the fake IDEA preference with --pgp2 mode
Print "Expired" for expired but good signatures.
|
|
|
|
|
|
|
| |
bits long (as RSA minimum is 1024)
Allow IDEA as a fake preference for v3 keys with v3 selfsigs when
verifying that a cipher is in preferences while decrypting
|
|
|
|
|
|
|
|
| |
keys (this is in the RFC), so that they can be (sometimes) used along
OpenPGP keys. Do not force using IDEA on an OpenPGP key, as this may
violate its prefs.
Also, revise the help text for the sig class explanation.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
used with the agent. Changed all callers.
(agent_get_passphrase): Likewise and send it to the agent
* seckey-cert.c (do_check): New arg tryagain_text.
(check_secret_key): Pass the string to do_check.
* keygen.c (ask_passphrase): Set the error text is required.
* keyedit.c (change_passphrase): Ditto.
* passphrase.c (agent_open): Disable opt.use_agent in case of a
problem with the agent.
(agent_get_passphrase): Ditto.
(passphrase_clear_cache): Ditto.
|
| |
|
|
|
|
|
|
|
| |
gpg-agent. New arg to return the used protocol version.
(agent_get_passphrase): Implemented new protocol here.
(passphrase_clear_cache): Ditto.
|
|
|
|
|
| |
Some fixes.
|
| |
|
|
|
|
|
|
|
|
| |
Remove get_temp_dir (it's in exec.c now)
Allow --delete-key (now --delete-keys, though --delete-key still works) to
delete multiple keys in one go. This applies to
--delete-secret-key(s) and --delete-secret-and-public-key(s) as well
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
it is needed to figure out the default recipient. Reported by
Roger Sondermann.
|
|
|
|
|
|
|
|
|
|
| |
change default compression to 1
add ask-sig-expire and ask-cert-expire (--expert was getting absurdly
overloaded)
permit v3 subkeys
use --expert to protect adding multiple photo ids and adding photos to a
v3 key
|
|
|
|
|
|
|
|
| |
commands.
* keydb.c (keydb_add_resource): Use access to test for keyring
existence. This avoids cached opened files which are bad under
RISC OS.
|
|
|
|
|
|
|
| |
Warn with pgp2 and non-detached signatures
Use the actual filesize rather than partial length packets in
symmetric messages (see ChangeLog or NEWS for discussion).
|
|
|
|
|
| |
and simpler code in keyserver
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
Properly handle permission/ownership checks on files that are shared (for
example /usr/local/lib/gnupg/idea)
|
|
|
|
|
|
| |
Use signature flags for exportability check rather than re-parsing the
subpacket.
|
| |
|
|
|
|
|
| |
and keyserver.c
|
| |
|
| |
|
|
|
|
|
| |
from Timo.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
declaration due to shadowing warnings.
* build-packet.c (build_attribute_subpkt): s/index/idx/ to avoid
compiler warnig due to index(3).
* getkey.c (get_ctx_handle): Use KEYDB_HANDLE as return value.
* keylist.c (list_one): Made resname const.
* keyedit.c (keyedit_menu): Allow "addphoto" only when --openpgp is
not used.
* options.skel: Changed one example photo viewer to qiv.
|
| |
|
|
|
|
|
| |
properly
|
|
|
|
|
| |
is only one attribute packet defined thus far, and it's a picture)
|
|
|
|
|
| |
but cannot be revoked. Any revocation certificates for them are ignored.
|
|
|
|
|
|
| |
* getkey.c (get_ctx_handle): New.
* keylist.c (list_one): Implement option here. By David Champion.
|
|
|
|
|
| |
* Makefile.am (./options): append it if there is such a module.
|
| |
|
|
|
|
|
| |
one.
|
|
|
|
|
|
|
|
|
| |
that live there for safe permission/ownership (--no-permission-warning to
disable)
The newer glibcs print scary warnings about using mktemp(). The use here
was actually safe, but the warning was bound to confuse people, so here is
an arguably better tempname creator that pulls random bits from the pool.
|
| |
|
|
|
|
|
|
|
| |
IDEA warning for pk messages encrypted with IDEA (symmetric is already done)
Print IDEA warning for each occurance except for secret key protection and
unknown cipher from an encrypted message.
|
|
|
|
|
|
|
|
| |
* pubkey-enc.c (get_session_key): Check that the public key
algorithm is indeed usable for en/decryption. This avoid a
strange error message from pubkey_decrypt if for some reasons
a bad algorithm indentifier is passed.
|
|
|
|
|
| |
utf8_to_native does this for us
|
| |
|
|
|
|
|
|
|
|
| |
pops up when the user uses "--cipher-algo idea", when setpref is used to
set a "S1" preference, and when a secret key protected with IDEA is used.
Tweak the --pgp2 mode to use this generic warning.
|