aboutsummaryrefslogtreecommitdiffstats
path: root/g10 (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Backported security fixes.Werner Koch2006-12-074-31/+104
|
* (is_prime): Free A2. Fixed bug #423.Werner Koch2005-03-072-1/+5
|
* Disable the "quick check" bytes for PK decryptions. This is inDavid Shaw2005-02-103-5/+18
| | | | | regards to the Mister and Zuccherato attack on OpenPGP CFB mode.
* * getkey.c (parse_key_usage): New function to parse out key usage flags.David Shaw2004-11-292-45/+73
| | | | | | | | Set PUBKEY_USAGE_UNKNOWN to handle flags (i.e. authentication) that we don't understand in this branch. (fixup_uidnode, merge_selfsigs_main, merge_selfsigs_subkey): Call it from here to remove duplicate code. This is bug 378.
* * getkey.c (premerge_public_with_secret): Fix subkey<->binding sigDavid Shaw2004-09-142-1/+7
| | | | | | mismatch when some secret subkeys are missing. Discovered by Michael Roth.
* (maybe_create_keyring): Try to create the home directoryWerner Koch2004-08-312-25/+37
| | | | | before acquiring a lock for the keyring.
* * hkp.c (dehtmlize): Understand the quote character (i.e. "&quot;") inDavid Shaw2004-08-207-26/+43
| | | | | | | | | HTML responses. * keydb.h, getkey.c (get_user_id_printable): Rename to get_user_id_native and remove the printable stuff since we're print-ifying valid utf8 characters. Change all callers in import.c, sign.c, and encode.c.
* * hkp.c (hkp_search): Translate string to search for from utf8 to nativeDavid Shaw2004-08-193-9/+19
| | | | | | | before displaying it. * keyserver.c (keyserver_search_prompt): Comments.
* (encode_session_key): Changed the zero random byteWerner Koch2004-08-192-5/+14
| | | | | | substituting code to actually do clever things. Thanks to Matthias Urlichs for noting the implementation problem.
* (agent_get_passphrase): Fixed detection of canceledWerner Koch2004-08-182-2/+13
| | | | | error state as send by current gpg-agents.
* Removed stray semicolon.Werner Koch2004-08-162-1/+5
|
* * keydb.c (keydb_add_resource): Factored keyring creation out to ..Werner Koch2004-08-133-52/+118
| | | | | | (maybe_create_keyring): .. new. Make sure that we do the checks in a locked state. Problem reported by Stefan Haller.
* * configure.ac (ALL_LINGUAS): Removed.Werner Koch2004-08-093-1/+17
| | | | | | | | | | | | | | | * Makefile.am (LDADD): Replaced INTLLIBS by LIBINTL. * Makefile.am (gpgkeys_hkp_LDADD): Replaced INTLLIBS by LIBINTL. * ca.po: Updated. * autogen.sh: Run aclocal with -I m4. * Makefile.am: Replaced INTLLIBS by LIBINTL. * Makefile.am (http-test): Replaced INTLLIBS by LIBINTL.
* New alias --throw-keyid for --throw-keyids, so that itWerner Koch2004-07-302-0/+6
| | | | | continues to work in old configuration files. Noted by Jens Adam.
* * pkclist.c (algo_available): --pgp8 now allows blowfish, zlib, and bzip2.David Shaw2004-07-292-9/+18
|
* * status.c (do_get_from_fd): Flush stdout if status isn't flushing it forDavid Shaw2004-07-212-0/+10
| | | | | | | us. This guarantees that any menus that were displayed before the prompt don't get stuck in a buffer. Noted by Peter Palfrader. This is Debian bug #254072.
* Minor fixes for W32 packaging and building.Werner Koch2004-07-202-1/+6
|
* * sign.c (update_keysig_packet): Revert change of 2004-05-18. It is notDavid Shaw2004-07-192-12/+7
| | | | | | appropriate to strip policy and notations when remaking a sig. That should only happen when specifically requested by the user.
* * sign.c (sign_symencrypt_file): Allow using --force-mdc in --signDavid Shaw2004-06-272-0/+10
| | | | | --symmetric messages.
* * mainproc.c (proc_symkey_enc), seckey-cert.c (do_check): Check the S2KDavid Shaw2004-06-273-0/+20
| | | | | | | hash algorithm before we try to generate a passphrase using it. This prevents hitting BUG() when generating a passphrase using a hash that we don't have.
* * keyedit.c (sign_uids): Properly handle remaking a self-sig on revoked orDavid Shaw2004-06-242-5/+28
| | | | | | expired user IDs. Also, once we've established that a given uid cannot or will not be signed, don't continue to ask about each sig.
* * status.h, status.c (get_status_string), plaintext.c (handle_plaintext):David Shaw2004-06-184-6/+32
| | | | | New status tags PLAINTEXT and PLAINTEXT_LENGTH.
* * keygen.c (make_backsig): Make sure that the backsig was builtDavid Shaw2004-06-162-49/+58
| | | | | successfully before we try and use it.
* (copy_secret_key): Get last fix right.Werner Koch2004-06-162-10/+8
|
* (copy_secret_key): Fixed memory leak.Werner Koch2004-06-162-0/+13
|
* * g10.c (main): Alias --charset as --display-charset to help avoid theDavid Shaw2004-06-013-5/+15
| | | | | | | | continuing confusion and make room for possible changes in devel. * parse-packet.c (parse_plaintext): Show the hex value for the literal packet mode since it may not be printable.
* * pkclist.c (do_edit_ownertrust): Fix kbnode leak.David Shaw2004-05-232-0/+5
|
* * sign.c (update_keysig_packet): Policies and notations should be strippedDavid Shaw2004-05-192-0/+18
| | | | | out when remaking a self-signature. Noted by Atom Smasher.
* (do_generate_keypair, read_parameter_file): ReallyWerner Koch2004-05-112-0/+24
| | | | | | | close the files. (do_generate_keypair): Create the secret key file using safe permissions. Noted by Atom Smasher.
* (write_plaintext_packet): Fixed the detection of tooWerner Koch2004-05-072-8/+18
| | | | | large files in the same way as in encode.c.
* * keygen.c (make_backsig): If DO_BACKSIGS is not defined, do not createDavid Shaw2004-04-237-7/+123
| | | | | | | | | | | | | | | | backsigs. * getkey.c (merge_selfsigs_subkey): Find 0x19 backsigs on subkey selfsigs and verify they are valid. If DO_BACKSIGS is not defined, fake this as always valid. * packet.h, parse-packet.c (parse_signature): Make parse_signature non-static so we can parse 0x19s in self-sigs. * main.h, sig-check.c (check_backsig): Check a 0x19 signature. (signature_check2): Give a backsig warning if there is no or a bad 0x19 with signatures from a subkey.
* * parse-packet.c (dump_sig_subpkt, parse_one_sig_subpkt,David Shaw2004-04-222-69/+86
| | | | | can_handle_critical): Parse and display 0x19 signatures.
* * keyserver.c (parse_keyserver_uri): Do not accept "http" as an alias forDavid Shaw2004-04-202-2/+6
| | | | | "hkp". They are not the same thing.
* * keygen.c (make_backsig): New function to add a backsig to a binding sigDavid Shaw2004-04-135-19/+139
| | | | | | | | | | | | of signing subkeys. Currently disabled. (write_keybinding): Call it here, for signing subkeys only. * sign.c (make_keysig_packet): Allow generating 0x19 signatures (same as 0x18 or 0x28, but used for backsigs). * packet.h, build-packet.c (build_sig_subpkt): Add new SIGSUBPKT_SIGNATURE type for embedded signatures.
* * g10.c (main): --no-use-embedded-filename.David Shaw2004-04-013-1/+14
| | | | | | | | * plaintext.c (handle_plaintext): Accept 'u' as a plaintext mode that requires end of line conversion. This is being considered for a UTF8 text packet. If this doesn't take place, no major harm done. If it does take place, we'll get a jump on starting the changeover.
* *** empty log message ***Werner Koch2004-03-292-11/+60
|
* * keyedit.c (keyedit_menu): Request a trustdb update when adding a newDavid Shaw2004-03-272-2/+10
| | | | | user ID so the new ID gets validity set. Reported by Owen Taylor.
* * build-packet.c (calc_plaintext, do_plaintext): Do not create illegalDavid Shaw2004-03-262-7/+15
| | | | | | | (packet header indicates a size larger than the actual packet) encrypted data packets when not compressing and using a filename longer than 255 characters.
* * options.h, g10.c (main), compress-bz2.c (init_uncompress): BackportDavid Shaw2004-03-254-3/+13
| | | | | | --bzip2-decompress-lowmem since we do handle receiving a bzip2 message on the stable branch.
* * keyedit.c (no_primary_warning): Cleanup. (menu_expire): Don't giveDavid Shaw2004-03-232-18/+22
| | | | | | primary warning for subkey expiration changes. These cannot reorder primaries.
* * packet.h, getkey.c (fixup_uidnode, merge_selfsigs_subkey): Keep track ofDavid Shaw2004-03-224-4/+22
| | | | | | | | | which self-sig we actually chose. * keyedit.c (menu_expire, menu_set_primary_uid, menu_set_preferences): Use it here to avoid updating non-used self-sigs and possibly promoting an old self-sig into consideration again.
* * keygen.c (write_keybinding, do_generate_keypair, generate_subkeypair):David Shaw2004-03-182-30/+42
| | | | | | Keep track of the unprotected subkey secret key so we can make a backsig with it.
* * keygen.c (gen_elg, gen_dsa, gen_rsa, do_create, do_generate_keypair,David Shaw2004-03-182-19/+31
| | | | | | | generate_subkeypair): New is_subkey argument to set whether a generated key is a subkey. Do not overload the ret_sk. This is some early cleanup to do backsigs for signing subkeys.
* * import.c (import_one): Try and collapse user IDs when importing a keyDavid Shaw2004-03-094-11/+23
| | | | | | | | | | | | for the first time. * build-packet.c (do_comment, do_user_id): Try for a headerlen of 2 since that's the smallest and most likely encoding for these packets * keyedit.c (menu_addrevoker): Allow appointing a subkey as a designated revoker if the user forces it via keyid!, so long as the subkey can certify. Also use the proper date string when prompting for confirmation.
* * options.h (ctrl): New for member IN_AUTO_KEY_RETRIEVE.Werner Koch2004-03-014-8/+66
| | | | | | | | * mainproc.c (check_sig_and_print): track whether we are retrieving a key. * status.c (status_currently_allowed): New. (write_status_text, write_status_text_and_buffer): Use it here.
* * keyedit.c (menu_addrevoker): Do not allow appointing a subkey as aDavid Shaw2004-02-272-0/+12
| | | | | designated revoker.
* * delkey.c (do_delete_key): Allow deleting a public key with a secretDavid Shaw2004-02-253-7/+15
| | | | | | | | present if --expert is set. * plaintext.c (handle_plaintext): Make bytecount static so it works with multiple literal packets inside a message.
* * encode.c (encode_simple): Show cipher with --verbose.David Shaw2004-02-246-160/+187
| | | | | | | | | | | | * options.h, g10.c (main), keyedit.c (sign_keys): Add --ask-cert-level option to enable cert level prompts during sigs. Defaults to on. Simplify --default-cert-check-level to --default-cert-level. If ask-cert-level is off, or batch is on, use the default-cert-level as the cert level. * options.h, g10.c (main), trustdb.c (mark_usable_uid_certs): Simplify --min-cert-check-level to --min-cert-level.
* * options.h, g10.c (main), trustdb.c (mark_usable_uid_certs): AddDavid Shaw2004-02-235-30/+104
| | | | | | | | | --min-cert-check-level option to specify minimum cert check level. Defaults to 1 (so no sigs are ignored). 0x10 sigs cannot be ignored. * options.h, g10.c (main), plaintext.c (handle_plaintext): Add --max-output option to help people deal with decompression bombs.
* * build-packet.c (do_user_id): Do not force a header for attribute packetsDavid Shaw2004-02-152-3/+7
| | | | | | as they require a new CTB, and we don't support forced headers for new CTBs yet.