|  | Commit message (Collapse) | Author | Age | Files | Lines | 
|---|
| | 
| 
| 
| 
| 
| | * Added reference to location where all the examples included in the
  HOWTO will be available as executable scripts.
* Included a short README file in that location. | 
| | 
| 
| 
| 
| | * Slight python-gnupg clarification.  See also this thread:
  https://lists.gnupg.org/pipermail/gnupg-devel/2018-March/033528.html | 
| | 
| 
| 
| 
| 
| 
| 
| 
| 
| | * Adjusted the python-gnupg so the comments regarding insecure
  invocation of commands via subprocess (shell=True) were a major
  historical issue and not a a current issue.
* Not including Vinay Sajip's requested change to say it is now secure
  since no audit of the current code base has been performed and my
  last major inspection of that code was around the time I first
  ported PyME to Python 3 in 2015. | 
| | 
| 
| 
| 
| 
| | * Checked off several points of howto coverage as completed.
* Reorganised to move S/MIME coverage to its own separate group of tasks.
* Noted only revocation remains for howto completion. | 
| | 
| 
| 
| | * deconstructing multi-recipient encryption. | 
| | 
| 
| 
| 
| | * Replaced the single encryption methods with one main way (i.e. cut
  the low level stuff involving SEEK_SET instructions). | 
| | 
| 
| 
| 
| 
| | * moved single encrytion examples up to the first ones, pending merge
  and major cut.
* This is basically just to make future checks of revisions a little easier. | 
| | 
| 
| 
| | * Stripped decryption example to the bare bones as suggested by Justus. | 
| | 
| 
| 
| 
| | * Made the changes suggested by Jakub Wilk on gnupg-devel.
* Still need to make the far more comprehensive changes suggested by Justus. | 
| | 
| 
| 
| | * Added clarification on why it's not on PyPI. | 
| | 
| 
| 
| | * fixed custom_id for decryption so the XHTML validates. | 
| | 
| 
| 
| 
| | * Promoted final encryption example so that it will appear as heading
  6.1.3 when exported to HTML or PDF. | 
| | 
| 
| 
| 
| 
| 
| 
| 
| 
| | * Fixed a minor typographic error.
* Bumped version number in preparation for merge with master.
* While there are probably a few more things worthy of being added
  (mainly how to revoke things), this document is essentially ready
  for publication now.
Signed-off-by: Ben McGinnes <[email protected]> | 
| | 
| 
| 
| | * Added key signing. | 
| | 
| 
| 
| 
| 
| | * Added a new user ID for Danger Mouse.
* Removed the empty entry for key preferences since that is handled
  through gpg.conf and/or editing the key directly. | 
| | 
| 
| 
| | * Spell checking and fixing the few errors. | 
| | 
| 
| 
| | * Added an encryption subkey to Danger Mouse's primary key. | 
| | 
| 
| 
| | * generated a new primary key for Danger Mouse in an alternative homedir. | 
| | 
| 
| 
| | * Added sections for key generation and key editing. | 
| | 
| 
| 
| | * Added c.get_key instructions and examples. | 
| | 
| 
| 
| | * Added text for verifying signatures. | 
| | 
| 
| 
| | * Added 4 signature verification methods and partial text for them. | 
| | 
| 
| 
| | * Added description for detached signatures. | 
| | 
| 
| 
| 
| | * Fixed multiple sample code examples of writing output to a file.
* Added the description of detached signatures. | 
| | 
| 
| 
| | * minor phrasing fix. | 
| | 
| 
| 
| | * Added recommended method of single encryption with description. | 
| | 
| 
| 
| 
| 
| 
| 
| | * Clarified which English dialects this is written in.
* Translating to American can happen *after* it's done.
** The Yank version would probably want to change some of the examples
   anyway.
* Began the description for normal/default signing. | 
| | 
| 
| 
| 
| 
| 
| 
| | * Added a section on key selection.
* Included recommendation for using fingerprint when selecting one
  specific key.
* Also included the most ironically amusing example of multiple key
  selection in a GPG guide.  Hey, it's public data ... (heh). | 
| | 
| 
| 
| 
| 
| 
| | * Added explanation of the ascendance of Python 3 over Python 2 in the
  guide to the intro.
* Expanded key selection description so people know what not to
  include regarding key IDs with this key selection method. | 
| | 
| 
| 
| | * Added key selection for specifying signing key or keys. | 
| | 
| 
| 
| 
| 
| 
| | * During the course of working out the updated signature methods,
  determined that key selection (including counting) will beed to be
  presented before the basic functions.
* Moved "working with keys" up. | 
| | 
| 
| 
| 
| 
| | * Signatures have changed as a result of the recent update from Justus.
* Sample code updated.
* Text to follow later. | 
| | 
| 
| 
| | * Added text description for the decryption example. | 
| | 
| 
| 
| 
| 
| 
| 
| | * Added a miscellaneous work-arounds section at the end.
* Included code in said miscellaneous section for accessing the groups
  specified in a gpg.conf file.
* It's a bit ugly since it does require subprocess (but not call,
  Popen or shell access and only accesses one command). | 
| | 
| 
| 
| | * Fixed a spelling error in the key counting text. | 
| | 
| 
| 
| 
| 
| 
| | * updated multi-encryption final example to be complete.
* second example shows most likely method of reading plaintext.
* updated example filenames to stick with running gag
  (i.e. secret_plans.txt). | 
| | 
| 
| 
| 
| 
| 
| | * error corrections.
* multiple typesetting fixes only required due to certain archaic
  eccentricities of LaTeX.
* a couple of minor python PEP8 compliance corrections. | 
| | 
| 
| 
| | * Fixed an error in the encryption try/except statement. | 
| | 
| 
| 
| 
| 
| 
| | * Added a more complicated encryption example with a few variations on
  the encryption method to account for untrusted recipient keys,
  signing or not signing, including or excluding default keys and so
  on. | 
| | 
| 
| 
| 
| 
| 
| 
| | * Switched from links to some external docs to using footnotes where
  necessary.
* Ideally the howto should be as stand alone as possible.
* Also it makes it difficult to convert to another format for
  proof-reading if there are links that the conversion can't find. | 
| | 
| 
| 
| 
| | * Added instructions and code to count the number of public and secret
  keys available since it was quick and easy. | 
| | 
| 
| 
| | * Slightly tweaked one heading to make it clear it wasn't a duplicate. | 
| | 
| 
| 
| 
| 
| 
| | * Wrote the text description explaining each step in the most basic
  encryption operation.
* Will need to include additional examples for encrypting to multiple
  recipients using Context().encrypt instead of Context().op_encrypt. | 
| | 
| 
| 
| 
| | * Updated to reflect the most recent work on the HOWTO for the Python
  bindings. | 
| | 
| 
| 
| | * Added example for verifying both detached and "in-line" signatures. | 
| | 
| 
| 
| 
| 
| 
| | * Added all four signing code examples that are most likely to be
  used: armoured, clearsigned, detached armoured and detached binary.
* May remove some examples and just discuss the differences, but it
  depends on the way the text is filled out. | 
| | 
| 
| 
| 
| 
| | * Added example of decryption.
* included some quick notes for myself regarding aspects to explain
  when I flesh out the explanatory text. | 
| | 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| | * Added sample code for encrypting some text to a single key.
* Basically I'm just lifting existing production code and changing the
  key IDs from mine to "0x12345678DEADBEEF" for these first few
  examples.
* I'll fill in the text description after.
* Note: due to my regional location, I might split some tasks into
  more commits in order to be sure no work gets lost in case of
  emergency (or to put it another way: I know Telstra too well to
  trust them). | 
| | 
| 
| 
| 
| 
| 
| 
| 
| | * Added a section for those pythonistas who are too used to web
  programming.  Stressed that it's not simply not RESTful, it's not
  even REST-like.
* Letting me move on to drawing a very loose parallel between a
  session and a context.  The differences should become obvious in the
  subsequent sections. | 
| | 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| | * Some instructions to include are fairly obvious; as with encryption,
  decryption and signature verification.
* Some are a little less obvious.
* This includes the requests received to specifically include subkey
  management (adding and revoking subkeys on a primary key that's
  being retained.
* Added the UID equivalents to the list, as well as key selection
  matters (and may or may not include something for handling group
  lines since that involves wrapping a CLI binary).
* Key control documentation and examples requested by Mike Ingle of
  confidantmail.org. |