aboutsummaryrefslogtreecommitdiffstats
path: root/g10/keyedit.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* Changed to GPLv3.Werner Koch2007-07-041-4/+2
| | | | | Removed intl/.
* Fix from 1.4:Werner Koch2007-03-081-1/+5
| | | | | | | | | | * keyedit.c (keyedit_menu): If we modify the keyblock (via fix_keyblock() or collapse_uids()) make sure we reprocess the keyblock so the flags are correct. Noted by Robin H. Johnson. * getkey.c (fixup_uidnode): Properly clear flags that don't apply to us (revoked, expired) so that we can reprocess a uid.
* Add new SVN only file README.maintWerner Koch2007-02-261-8/+6
| | | | | | | | | | | | | | | | doc/ * gpg.texi (GPG Configuration): Document envvar LANGUAGE. (GPG Configuration Options): Document show-primary-uid-only. g10/ * gpg.c (main): Add verify option show-primary-uid-only. * options.h (VERIFY_SHOW_PRIMARY_UID_ONLY): New. * mainproc.c (check_sig_and_print): Implement it. * encr-data.c (decrypt_data): Correctly test for unknown algorithm. * import.c (check_prefs): Ditto. * keyedit.c (show_prefs): Ditto. * mainproc.c (proc_symkey_enc): Ditto.
* Fixes for CVE-2006-6235Werner Koch2006-12-061-9/+15
|
* * keyedit.c (menu_clean): Show "already minimized" rather thanDavid Shaw2006-12-031-1/+6
| | | | | | "already clean" when a minimized key is minimized again. From Dirk Traulsen.
* Various changesWerner Koch2006-10-101-0/+2
|
* Fix for bug 537Werner Koch2006-10-021-3/+3
|
* Various updatesWerner Koch2006-09-211-1/+1
|
* Merged recent changes from 1.4Werner Koch2006-04-281-16/+31
|
* Continued with merging.Werner Koch2006-04-191-7/+7
| | | | | Still does not build.
* Merged with gpg 1.4.3 code. Werner Koch2006-04-191-738/+1936
| | | | | The gpg part does not yet build.
* (show_key_with_all_names): Print the card S/N.Werner Koch2004-09-201-0/+21
| | | | | | * app-openpgp.c (app_select_openpgp): Its app_munge_serialno and not app_number_serialno.
* * card-util.c (print_name): Fixed bad format string usage.Werner Koch2003-12-171-2/+2
| | | | | | | | | | | | | | | | | | (print_isoname): Ditto. * trustdb.c (check_regexp): s/exp/expr/. * keyedit.c (trustsig_prompt): Removed a "> 255" term; it is always false due to the data type. * passphrase.c (agent_get_passphrase): Use xasprintf and avoid non-literal format strings. * tdbio.c (upd_hashtable, drop_from_hashtable, lookup_hashtable): Fixed log_error format string bugs. Kudos to the now working gcc-3.3 -Wformat-nonliteral and Florian Weimer's investigations in gnupg 1.2.3.
* Merged most of David Shaw's changes in 1.3 since 2003-06-03.Werner Koch2003-09-231-24/+202
|
* * options.h (DBG_CIPHER): Reintroduced it.Werner Koch2003-07-031-1/+1
| | | | | | | | | | | | | | | | | | * seskey.c (encode_session_key): Debug output of the session key. * pubkey-enc.c (get_it): Handle card case. * call-agent.c (agent_scd_pkdecrypt): New. * pkglue.c (pk_encrypt): Add RSA support. * g10.c (main): Default to --use-agent. * keygen.c (show_smartcard): Print info about the public key. (check_smartcard): Check for existing key here. (gen_card_key): And not anymore here. (fpr_is_zero): New. (generate_keypair): Generate both keys for a card. (smartcard_change_url): Nw.
* Key generation and signing using the OpenPGP card does rudimentary work.Werner Koch2003-06-271-0/+4
|
* Finished the bulk of changes for gnupg 1.9. This included switchingWerner Koch2003-06-181-77/+79
| | | | | | | | | | | to libgcrypt functions, using shared error codes from libgpg-error, replacing the old functions we used to have in ../util by those in ../jnlib and ../common, renaming the malloc functions and a couple of types. Note, that not all changes are listed below becuause they are too similar and done at far too many places. As of today the code builds using the current libgcrypt from CVS but it is very unlikely that it actually works.
* This commit was manufactured by cvs2svn to create branchRepo Admin2003-06-051-0/+3672
| | | | 'GNUPG-1-9-BRANCH'.
* This commit was manufactured by cvs2svn to create branchRepo Admin2002-10-191-3281/+0
| | | | 'GNUPG-1-9-BRANCH'.
* * keyedit.c (menu_addrevoker): Properly back out if the signature fails.David Shaw2002-10-111-4/+38
| | | | | | Also, do not allow appointing the same revoker twice, and report ALREADY_SIGNED if the user tries it.
* From stable branchDavid Shaw2002-09-171-7/+37
| | | | | | | | | | | | | | * keyedit.c (menu_addrevoker): The direct key signature for revocation keys must be at least v4 to carry the revocation key subpacket. Add a PGP 2.x warning for revocation keys. * g10.c (check_permissions): Rearrange strings to make translating easier (don't incorporate string parts). * keyedit.c (sign_uids): Make strings translatable. * sig-check.c (check_key_signature2): Make string translatable.
* * pkclist.c (build_pk_list): Fail if any recipient keys are unusable.David Shaw2002-08-301-1/+1
| | | | | | | | | * options.skel: The PGP LDAP keyserver is back. Use MIT keyserver as a sample rather than cryptnet as cryptnet does not support searching yet. * keyedit.c (show_key_with_all_names): Fix error message (preferences are userid/selfsig and not key specific).
* * keylist.c, keyedit.c, keyserver.c, sign.c: Some TODOs and comments.David Shaw2002-08-201-0/+3
| | | | | | | | | * export.c (do_export_stream): Fix noop bug in exporting sensitive revocation keys. * pkclist.c (do_edit_ownertrust): Comment out the option for showing trust paths until it can be implemented.
* * getkey.c (get_user_id_native): Renamed to ..Werner Koch2002-08-191-0/+68
| | | | | | | | | | | | (get_user_id_printable): this. Filter out all dangerous characters. Checked all usages. (get_user_id_string_native): Renamed to.. (get_user_id_string_printable): this. Filter out all dangerous characters. Checked all usages. * keyedit.c (show_basic_key_info): New. * keylist.c (print_fingerprint): New mode 3. * import.c (import_one): Use new function to display the user ID.
* * keyedit.c (menu_revsig): Properly show a uid is revoked withoutDavid Shaw2002-08-071-1/+4
| | | | | | | | | | | | | | | restarting gpg. This is Debian bug 124219, though their supplied patch will not do the right thing. * main.h, tdbio.c (tdbio_set_dbname), misc.c (removed check_permissions), keydb.c (keydb_add_resource), g10.c (main, check_permissions): Significant reworking of the permission check mechanism. The new behavior is to check everything in the homedir by checking the homedir itself. If the user wants to put (possibly shared) keyrings outside the homedir, they are not checked. The options file and any extension files are checked wherever they are, as well as their enclosing directories. This is Debian bug 147760.
* * keyedit.c (menu_revsig): Change "revsig" to honor selected uids so theDavid Shaw2002-07-251-7/+12
| | | | | | | | user can revoke sigs from particular uids only. * keylist.c (list_keyblock_print): Don't display expired uids in --list-keys unless -v and not --list-sigs (just like revoked uids).
* * exec.c, export.c, import.c, keyedit.c, keyserver.c, misc.c: "Warning" ->David Shaw2002-07-251-3/+3
| | | | | "WARNING"
* * keyedit.c (keyedit_menu, menu_addrevoker): Allow specifying "sensitive"David Shaw2002-07-191-4/+12
| | | | | | | | | | | as an argument to an addrevoker command. This sets the 0x40 sensitive revoker flag. * revoke.c (gen_desig_revoke): When generating a designated revocation, include the direct key sig that contains the designated revoker subpacket. This allows sensitive designated revocation subpackets to be exported. Also indicate which revokers are sensitive in the first place.
* * keyedit.c (show_key_with_all_names_colon): The 0x40 class bit in aDavid Shaw2002-07-171-2/+2
| | | | | | | | | | | | | designated revoker means "sensitive", not "local". It's exportable under the right circumstances. * main.h, options.h, export.c (do_export_stream), g10.c (main), hkp.c (hkp_export), keyserver.c (keyserver_spawn: Add a flag to skip attribute packets and their signatures while exporting. This is to accomodate keyservers (pksd again) that choke on attributes. Use keyserver-option "include-attributes" to control it. This defaults to ON (i.e. don't skip).
* Update head to match stable 1.0David Shaw2002-06-291-281/+1441
|
* See ChangeLog: Fri Oct 6 14:29:16 CEST 2000 Werner KochWerner Koch2000-10-061-18/+9
|
* See ChangeLog: Mon Sep 18 16:35:45 CEST 2000 Werner KochWerner Koch2000-09-181-1/+1
|
* See ChangeLog: Tue Jul 25 17:44:15 CEST 2000 Werner KochWerner Koch2000-07-251-1/+1
|
* See ChangeLog: Fri Jul 14 19:38:23 CEST 2000 Werner KochWerner Koch2000-07-141-63/+119
|
* See ChangeLog: Thu Jan 27 18:00:44 CET 2000 Werner KochWerner Koch2000-01-271-19/+19
|
* See ChangeLog: Mon Jan 24 13:04:28 CET 2000 Werner KochWerner Koch2000-01-241-24/+24
|
* See ChangeLog: Sat Nov 13 17:44:23 CET 1999 Werner KochWerner Koch1999-11-131-1/+1
|
* See ChangeLog: Mon Sep 6 19:59:08 CEST 1999 Werner KochWerner Koch1999-09-061-5/+5
|
* See ChangeLog: Wed Sep 1 15:30:44 CEST 1999 Werner KochWerner Koch1999-09-011-14/+14
|
* See ChangeLog: Tue Aug 31 17:20:44 CEST 1999 Werner KochWerner Koch1999-08-311-10/+10
|
* See ChangeLog: Wed Aug 4 10:34:46 CEST 1999 Werner KochV0-9-10Werner Koch1999-08-041-1/+1
|
* See ChangeLog: Fri Jul 23 13:53:03 CEST 1999 Werner KochV0-9-9Werner Koch1999-07-231-1/+1
|
* See ChangeLog: Mon Jul 12 18:45:57 CEST 1999 Werner KochWerner Koch1999-07-121-91/+117
|
* See ChangeLog: Wed Jul 7 13:23:40 CEST 1999 Werner KochWerner Koch1999-07-071-2/+2
|
* See ChangeLog: Thu Jul 1 12:47:31 CEST 1999 Werner KochWerner Koch1999-07-011-8/+22
|
* See ChangeLog: Tue Jun 29 21:44:25 CEST 1999 Werner KochWerner Koch1999-06-291-3/+25
|
* See ChangeLog: Sat Jun 26 12:15:59 CEST 1999 Werner KochWerner Koch1999-06-261-0/+2
|
* See ChangeLog: Wed Jun 16 20:16:21 CEST 1999 Werner KochWerner Koch1999-06-161-23/+23
|
* See ChangeLog: Thu Jun 10 14:18:23 CEST 1999 Werner KochWerner Koch1999-06-101-13/+22
|
* See ChangeLog: Thu May 27 09:40:55 CEST 1999 Werner KochWerner Koch1999-05-271-48/+139
|