| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
|
|
| |
* getkey.c (merge_selfsigs_subkey): Avoid listing the contents of a
backsig when list mode is on. Noted by Timo Schulz.
|
| |
|
| |
|
|
|
|
|
|
| |
the time to use to calculate the expiration offset, rather than
querying it internally. Change all callers.
|
|
|
|
|
|
| |
generate_keypair, generate_subkeypair): Pass a timestamp through to
all the gen_xxx functions.
|
|
|
|
|
| |
operation.
|
|
|
|
|
|
|
|
| |
Change all callers. (sign_file, clearsign_file,
sign_symencrypt_file): Calculate one timestamp for the whole
transaction. Different timestamps for each step can leak performance
information.
|
|
|
|
|
| |
the need for ask_expiredate().
|
|
|
|
|
|
|
|
| |
(write_keybinding): Have the various selfsigs created during key
generation use the timestamp of their parent key. This helps avoid
leaking information about the performance of the machine where the
keys were generated. Noted by Christian Danner.
|
|
|
|
|
|
|
| |
reading even for corrupted packets.
* keygen.c (generate_user_id): Need to allocate one byte more.
Reported by Felix von Leitner.
|
|
|
|
|
| |
RFC for CERT now that it is out of draft.
|
|
|
|
|
| |
"make uninstall" works properly.
|
| |
|
|
|
|
|
|
| |
This required some code cleanups and the introduction of
a few accessor ducntions in mpi.
|
|
|
|
|
|
|
|
|
| |
* configure.ac: Remove GNUPG_DATADIR for non-W32 systems.
g10/
* Makefile.am (AM_CPPFLAGS): Define GNUPG_DATADIR.
* openfile.c (copy_options_file): Use log_info and not log_error
to avoid error returns in case of a missing skeleton file.
|
| |
|
|
|
|
|
|
| |
"already clean" when a minimized key is minimized again. From Dirk
Traulsen.
|
|
|
|
|
|
|
| |
--passphrase-repeat option to control how many times gpg will
re-prompt for a passphrase to ensure the user has typed it correctly.
Defaults to 1.
|
|
|
|
|
|
| |
if make_printable_string returns a longer string. Fixes bug 728.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
packed s2k iteration count.
* main.h, options.h, gpg.c (encode_s2k_iterations, main), passphrase.c
(hash_passphrase): Add --s2k-count option to specify the number of s2k
hash iterations.
|
|
|
|
|
| |
whatever key selector the user used on the command line.
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
| |
breakage of other partys of the code.
|
| |
|
| |
|
|
|
|
|
| |
properly with uClibc.
|
| |
|
|
|
|
|
|
|
| |
union for preference hints rather than doing void * games.
* sign.c (sign_file): Use it here.
|
|
|
|
|
|
|
| |
and one being DSA2 and encrypting at the same time, if the recipient
preferences give a hash that can work with the DSA2 key, then allow the
DSA1 key to be promoted rather than giving up and using hash_for().
|
|
|
|
|
| |
a key that clearly isn't DSA1 (i.e. q!=160).
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
| |
keygen_add_std_prefs, proc_parameter_file): Add --default-keyserver-url to
specify a keyserver URL at key generation time, and "Keyserver:" keyword
for doing the same through a batch file.
|
|
|
|
|
| |
in what you accept, etc).
|
|
|
|
|
|
| |
on an autoconverted public key. The check should only happen on the
sk size. Noted by Dirk Traulsen.
|
|
|
|
|
|
|
|
| |
(not a copy) of the stub secret key for the secret key we just
generated on the card. (generate_card_subkeypair): Use it here so
that the signing key on the card can use the card to generate the 0x19
backsig on the primary key. Noted by Janko Heilgeist and Jonas Oberg.
|
|
|
|
|
|
|
| |
This prevents a memory allocation attack with a very large user ID. A
very large packet length could even cause the allocation (a u32) to wrap
around to a small number. Noted by Evgeny Legerov on full-disclosure.
|
| |
|
|
|
|
|
| |
arbitrarily long temporary directory paths.
|
|
|
|
|
|
|
| |
1024 when --enable-dsa2 is set). The size of q is set automatically based
on the key size. (ask_keysize, generate_keypair): Ask for DSA size when
--enable-dsa2 is set.
|
|
|
|
|
| |
that is over 256 bytes long. Noted by Israel G. Lugo.
|
|
|
|
|
|
|
|
| |
called with them closed. This is to protect our keyring/trustdb files
from corruption if they get attached to one of the standard fds. Print a
warning if possible that this has happened, and fail completely if we
cannot reopen (should never happen). (main): Call it here.
|
|
|
|
|
|
|
|
|
| |
(build_sig_subpkt_from_sig), getkey.c (fixup_uidnode,
merge_selfsigs_main, merge_selfsigs_subkey), keygen.c
(keygen_add_key_expire): Fix meaning of key expiration and sig
expiration subpackets - zero means "never expire" according to 2440,
not "expire instantly".
|