| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
| |
than causing an error.
|
| |
|
|
|
|
|
| |
sig_to_notation conversion. Noted by Peter Palfradrer.
|
| |
|
|
|
|
|
|
|
| |
both the fingerprint alone, and fingerprint+URL cases.
* getkey.c (get_pubkey_byname): Minor cleanup.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
same API as the other auto-key-locate fetchers.
* getkey.c (get_pubkey_byname): Use the fingerprint of the key that we
actually fetched. This helps prevent problems where the key that we
fetched doesn't have the same name that we used to fetch it. In the
case of CERT and PKA, this is an actual security requirement as the
URL might point to a key put in by an attacker. By forcing the use of
the fingerprint, we won't use the attacker's key here.
|
|
|
|
|
|
| |
keyserver_import_cert, keyserver_import_name, keyserver_import_ldap):
Pass fingerprint info through.
|
|
|
|
|
|
| |
the key being imported. (import_keys_internal, import_keys_stream,
import): Change all callers.
|
|
|
|
|
|
|
|
|
| |
is no backsig present. Give a URL for more information.
* keyedit.c (menu_backsign): Small tweak to work properly with keys
originally generated with older GnuPGs that included comments in the
secret keys.
|
|
|
|
|
|
|
|
| |
to be deleted with a '-' prefix.
* keyedit.c (menu_set_notation): Use it here to allow deleting a notation
marked with '-'. This works with either "-notation" or "-notation=value".
|
| |
|
|
|
|
|
|
|
| |
self-signatures. (keyedit_menu): Call it here.
(tty_print_notations): Helper. (show_prefs): Show notations in
"showpref".
|
|
|
|
|
| |
duplicate code by using notation functions.
|
|
|
|
|
|
| |
(keygen_add_notations): Provide printable text for non-human-readable
notation values.
|
|
|
|
|
|
| |
(keygen_add_notations): Tweak to handle non-human-readable notation
values.
|
|
|
|
|
|
|
|
|
|
| |
Use it here for the various notation commands.
* packet.h, main.h, keygen.c (keygen_add_notations), build-packet.c
(string_to_notation, sig_to_notation) (free_notation): New "one stop
shopping" functions to handle notations and start removing some code
duplication.
|
|
|
|
|
|
|
|
|
| |
pka-lookups, not pka-lookup.
* options.h, gpg.c (main), keyedit.c [cmds], sig-check.c
(signature_check2): Rename "backsign" to "cross-certify" as a more
accurate name.
|
|
|
|
|
|
|
| |
(check_signatures_trust), mainproc.c (check_sig_and_print,
pka_uri_from_sig), trustdb.c (init_trustdb): Some tweaks to PKA so that it
is a verify-option now.
|
| |
|
|
|
|
|
| |
is not a PGP 2.x algorithm.
|
|
|
|
|
| |
algorithm.
|
|
|
|
|
| |
There is still one problem to solve.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
"pka" when those features are disabled.
* misc.c (has_invalid_email_chars): Fix some C syntax that broke the
compilers on SGI IRIX MIPS and Compaq/DEC OSF/1 Alpha. Noted by Nelson H.
F. Beebe.
|
|
|
|
|
| |
Josefsson's page for CERT.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
--no-auto-key-locate.
* options.h, gpg.c (main): Keep track of each keyserver registered so
we can match on them later.
* keyserver-internal.h, keyserver.c (cmp_keyserver_spec,
keyserver_match), gpgv.c: New. Find a keyserver that matches ours and
return its spec.
* getkey.c (get_pubkey_byname): Use it here to get the per-keyserver
options from an earlier keyserver.
|
|
|
|
|
| |
used.
|
|
|
|
|
|
| |
treatment of include-revoked, include-subkeys, and try-dns-srv. These are
keyserver features, and GPG shouldn't get involved here.
|
|
|
|
|
| |
options to the list, as ordering may be significant to the user.
|
|
|
|
|
| |
adding notations. Noted by Christian Biere.
|
|
|
|
|
|
|
| |
(parse_keyserver_options): Moved from here. (parse_keyserver_uri): Use it
here so each keyserver can have some private options in addition to the
main keyserver-options (e.g. per-keyserver auth).
|
|
|
|
|
|
| |
getkey.c (free_akl, parse_auto_key_locate, get_pubkey_byname): The obvious
next step: allow arbitrary keyservers in the auto-key-locate list.
|
|
|
|
|
|
| |
auto-cert-retrieve as it is no longer meaningful. Add max-cert-size to
allow users to pick a max key size retrieved via CERT.
|
|
|
|
|
|
| |
(keyserver_opts): Rename auto-pka-retrieve to honor-pka-record to be
consistent with honor-keyserver-url.
|
|
|
|
|
|
| |
Parse a list of key access methods. (get_pubkey_byname): Walk the list
here to try and retrieve keys we don't have locally.
|
|
|
|
|
|
|
|
|
|
| |
importing at -r time. The URL in the PKA record may point to a key put in
by an attacker. Fix is to use the fingerprint from the PKA record as the
recipient. This ensures that the PKA record is followed.
* keyserver-internal.h, keyserver.c (keyserver_import_pka): Return the
fingerprint we requested.
|
|
|
|
|
|
| |
* keyserver-internal.h, keyserver.c (keyserver_import_ldap): Import using
the PGP Universal trick of asking ldap://keys.(maildomain) for the key.
|
|
|
|
|
| |
even when we've assumed "hkp" when there was no scheme.
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
| |
direct_uri flag so the right keyserver helper is run.
|
|
|
|
|
|
|
|
| |
keyserver helpers on systems that use extensions.
* misc.c (path_access) [HAVE_DRIVE_LETTERS]: Do the right thing with
drive letter systems.
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
passphrase as if it was used (move from next_pw to last_pw).
* pubkey-enc.c (get_session_key): Use it here to handle the case where a
passphrase happens to be correct for a secret key, but yet that key isn't
the anonymous recipient (i.e. the secret key could be decrypted, but not
the session key). This also handles the case where a secret key is
located on a card and a secret key with no passphrase. Note this does not
fix bug 594 (anonymous recipients on smartcard do not work) - it just
prevents the anonymous search from stopping when the card is encountered.
|
|
|
|
|
|
| |
in a refresh batch has a preferred keyserver set. Noted by Nicolas
Rachinsky.
|
|
|
|
|
|
|
| |
(keyserver_import_pka), card-util.c (fetch_url): Always require a
scheme:// for keyserver URLs except when used as part of the
--keyserver command for backwards compatibility.
|