aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Merge branch 'wk-gpg-keybox'Werner Koch2011-04-2911-411/+486
|\
| * Re-indentation of keydb.c and error code changes.Werner Koch2011-04-298-348/+403
| | | | | | | | | | | | Returning -1 as an error code is not very clean given that gpg error has more descriptive error codes. Thus we now return GPG_ERR_NOT_FOUND for all search operations and adjusted all callers.
| * Update OpenPGP parser to support ECCWerner Koch2011-04-283-63/+83
| |
* | Fix import stat counter and abort secret key import on merge-only error case.Marcus Brinkmann2011-04-292-25/+36
| |
* | Give sensible error messages when trying to delete secret key.Marcus Brinkmann2011-04-292-11/+26
|/
* Removed memory leak in the ECDH code.Werner Koch2011-04-282-32/+59
|
* Fixed regression in OpenPGP secret key export.Werner Koch2011-04-267-6/+53
| | | | | | | | The protection used in the exported key used a different iteration count than given in the S2K field. Thus all OpenPGP keys exported from GnuPG 2.1-beta can't be imported again. Given that the actual secret key material is kept in private-keys-v1.d/ the can be re-exported with this fixed version.
* Fix regression in gpg's mail address parsing.Werner Koch2011-04-2520-24/+62
| | | | | | Since 2009-12-08 gpg was not able to find email addresses indicated by a leading '<'. This happened when I merged the user id classification code of gpgsm and gpg.
* Add OPTION:cache-ttl-opt-preset to gpg-agent.Werner Koch2011-04-216-7/+31
| | | | | This option may be used to change the default ttl values use with the --preset option of GENKEY and PASSWD.
* 2011-04-20 Marcus Brinkmann <[email protected]>Marcus Brinkmann2011-04-202-1/+6
| | | | | * keylist.c (list_keyblock_colon): Use get_ownertrust_info, not get_ownertrust (which lead to binary zeroes in the output!).
* Fix gpg-agent secure memory leak in OpenPGP private key import.Marcus Brinkmann2011-04-202-0/+8
| | | | | | | | 2011-04-20 Marcus Brinkmann <[email protected]> * command.c (cmd_import_key): Release key from failed import before converting openpgp private key in the openpgp-private-key case.
* Another PASSWD --preset fix.Ben Kibbey2011-04-182-1/+5
| | | | Check for an error before presetting the passphrase.
* Fixed PASSWD --preset.Ben Kibbey2011-04-132-7/+11
| | | | | The previous patch required that the keygrip be cached before adding the new passphrase to the cache. No more.
* Use macros for the 120 and 900s cache TTLs.Werner Koch2011-04-124-12/+23
|
* Added PASSWD --preset.Ben Kibbey2011-04-122-2/+15
|
* Added GENKEY --preset to add the passphrase of the generated key to the cache.Ben Kibbey2011-04-124-4/+24
|
* Added KEYINFO field to show the protection type of a key. This differs from ↵Ben Kibbey2011-04-122-10/+25
| | | | the second field which shows the location of the key.
* Add code for explicit selection of pooled A records.Werner Koch2011-04-128-79/+453
| | | | | | | | | | | To better cope with round robin pooled A records like keys.gnupg.net we need to keep some information on unresponsive hosts etc. What we do now is to resolve the hostnames, remember them and select a random one. If a host is dead it will be marked and a different one selected. This is intended to solve the problem of long timeouts due to unresponsive hosts. The code is not yet finished but selection works.
* Detect premature EOF while parsing corrupted key packets.Werner Koch2011-03-282-17/+31
| | | | | | | | | | | This helps in the case of an unknown key algorithm with a corrupted packet which claims a longer packet length. This used to allocate the announced packet length and then tried to fill it up without detecting an EOF, thus taking quite some time. IT is easy to fix, thus we do it. However, there are many other ways to force gpg to use large amount of resources; thus as before it is strongly suggested that the sysadm uses ulimit do assign suitable resource limits to the gpg process. Suggested by Timo Schulz.
* Make use of gcry_kdf_derive.Werner Koch2011-03-105-140/+59
| | | | | | Factoring common code out is always a Good Thing. Also added a configure test to print an error if gcry_kdf_derive is missing in Libgcrypt.
* Support pkcs#12 import of PBES2 encoded data.Werner Koch2011-03-102-68/+297
| | | | | | | This is so that we read compatible with gnutls's certtool. Only AES-128 is supported. The latest Libgcrypt from git is required. Fixes bug#1321.
* Post beta release updatesWerner Koch2011-03-082-2/+6
|
* Prepare for 1.5.0beta2gnupg-2.1.0beta2Werner Koch2011-03-085-15/+69
|
* Require libgcrypt 1.5Werner Koch2011-03-0811-74/+33
| | | | | | | | Without Libgcrypt 1.5 is was not possible to use ECC keys. ECC is major new feature and thus it does not make sense to allow building with an older Libgcrypt without supporting ECC. Also fixed a few missing prototypes.
* Added option --inquire to PRESET_PASSPHRASE. Note that the inquired ↵Ben Kibbey2011-03-042-4/+30
| | | | passphrase will be truncated to the first encountered null byte.
* New agent option pinentry-mode.Werner Koch2011-03-036-45/+197
| | | | | This provides the framework and implements the ask, cancel and error. loopback will be implemented later.
* Print the secret keyinfo stuff with --card-status again.Werner Koch2011-03-033-65/+79
|
* Minor code cleanups.Werner Koch2011-03-033-8/+10
| | | | | | | * keyid.c (hash_public_key): Remove shadowing NBITS. * misc.c (pubkey_nbits): Replace GCRY_PK_ by PUBKEY_ALGO_. (get_signature_count): Remove warning.
* Fix faulty gcc warningsWerner Koch2011-03-035-11/+20
|
* Simplify the management of the stream list in estream.cWerner Koch2011-03-032-66/+83
|
* fix wLangId in ccid-driver.cNIIBE Yutaka2011-03-021-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | This is not a part of pin pad support series of mine. As I found the bug while I am preparing the patches, I report this. As CCID protocol is little endian, wLangId of US English = 0x0409 is represented as two bytes of 0x09 then 0x04. It is really confusing that the code like following is floating around: pin_verify -> wLangId = HOST_TO_CCID_16(0x0904); But, it is 0x0409 (not 0x0904). It is defined in the documentation: http://www.usb.org/developers/docs/USB_LANGIDs.pdf and origin of this table is Microsoft. We can see it at: http://msdn.microsoft.com/en-us/library/bb165625%28VS.80%29.aspx Yes, it would be better not to hard-code 0x0409. It would be better to try current locale of the user, or to use the first entry of string descriptor. I don't have time to implement such a thing...
* Fix usage of SHA-2 algorithm with OpenPGP cards.Werner Koch2011-03-027-154/+39
| | | | | | | This was a regression in 2.1 introduced due to having the agent do the signing in contrast to the old "SCD PKSIGN" command which accesses the scdaemon directly and passed the hash algorithm. The hash algorithm is used by app-openpgp.c only for a sanity check.
* Add comment to last patch.Werner Koch2011-03-022-14/+23
|
* Added option --data to KEYINFO to return the result with a data response.Ben Kibbey2011-03-021-12/+27
|
* Let KEYINFO show the cached status of a key grip.Ben Kibbey2011-03-021-1/+11
|
* Rename Ben's new option.Werner Koch2011-03-022-7/+11
|
* Added CLEAR_PASSPHRASE option --agent to search the cache for a cacheid with ↵Ben Kibbey2011-03-021-3/+10
| | | | a mode of CACHE_MODE_NORMAL. These cache modes are created with PKDECRYPT.
* Fix doc/Makefile target onlineWerner Koch2011-03-021-8/+7
|
* Move parameter file description to the manual.Werner Koch2011-03-015-366/+474
|
* Support X.509 certificate creation.Werner Koch2011-03-018-81/+615
| | | | | | | | | | | | | | | | | | | | | | | | | Using "gpgsm --genkey" allows the creation of a self-signed certificate via a new prompt. Using "gpgsm --genkey --batch" should allow the creation of arbitrary certificates controlled by a parameter file. An example parameter file is Key-Type: RSA Key-Length: 1024 Key-Grip: 2C50DC6101C10C9C643E315FE3EADCCBC24F4BEA Key-Usage: sign, encrypt Serial: random Name-DN: CN=some test key Name-Email: [email protected] Name-Email: [email protected] Hash-Algo: SHA384 not-after: 2038-01-16 12:44 This creates a self-signed X.509 certificate using the key given by the keygrip and using SHA-384 as hash algorithm. The keyword signing-key can be used to sign the certificate with a different key. See sm/certreggen.c for details.
* Update some M4 files and AUTHORS.Werner Koch2011-03-017-20/+44
|
* Add new functions to convert iso time strings.Werner Koch2011-03-016-24/+253
|
* Update gpg-error.m4 and libgcrypt.m4Werner Koch2011-02-233-8/+40
|
* Fix dirmngr crash (bug#1300)Werner Koch2011-02-232-1/+9
|
* Lock scdaemon to CCID if once found.Werner Koch2011-02-237-143/+239
| | | | | | | | This solves a problem where ccid was used, the card unplugged and then scdaemon tries to find a new (plugged in) reader and thus will eventually try PC/SC over and over again. Also added an explicit --kill command to gpgconf.
* Fix ChnageLog entries.Werner Koch2011-02-152-4/+5
|
* fixed --list-keys on Linux64 bitAndrey Jivsov2011-02-122-2/+7
|
* Add ECC sign, verify, encrypt and decrypt testsWerner Koch2011-02-112-105/+165
|
* Remove debug code from regression test pinentryWerner Koch2011-02-102-20/+45
| | | | Also updated de.po
* Add ECC import regression tests and fixed a regression.Werner Koch2011-02-1015-48/+473
| | | | | | The import test imports the keys as needed and because they are passphrase protected we now need a pinentry script to convey the passphrase to gpg-agent.