aboutsummaryrefslogtreecommitdiffstats
path: root/g10 (follow)
Commit message (Collapse)AuthorAgeFilesLines
* * getkey.c (get_pubkey_byname): Fix minor security problem with PKA whenDavid Shaw2006-02-215-6/+27
| | | | | | | | | | importing at -r time. The URL in the PKA record may point to a key put in by an attacker. Fix is to use the fingerprint from the PKA record as the recipient. This ensures that the PKA record is followed. * keyserver-internal.h, keyserver.c (keyserver_import_pka): Return the fingerprint we requested.
* * gpgv.c: Stub keyserver_import_ldap.David Shaw2006-02-214-0/+47
| | | | | | * keyserver-internal.h, keyserver.c (keyserver_import_ldap): Import using the PGP Universal trick of asking ldap://keys.(maildomain) for the key.
* * keyserver.c (parse_keyserver_uri): Include the scheme in the uriDavid Shaw2006-02-212-2/+12
| | | | | even when we've assumed "hkp" when there was no scheme.
* about to release 1.4.3rc1gnupg-1.4.3rc1Werner Koch2006-02-142-2/+2
|
* Fixed a wrong return code with gpg --verifyWerner Koch2006-02-143-24/+48
|
* Lock random seed fileWerner Koch2006-02-092-1/+8
|
* Fixed a couple of problemsWerner Koch2006-02-081-20/+59
|
* Add support fro CardMan 4040Werner Koch2006-02-063-241/+563
|
* * keyserver.c (parse_keyserver_uri): If there is a path present, set theDavid Shaw2006-01-242-0/+8
| | | | | direct_uri flag so the right keyserver helper is run.
* * keyserver.c (keyserver_spawn): Include the EXEEXT so we can findDavid Shaw2006-01-223-3/+21
| | | | | | | | keyserver helpers on systems that use extensions. * misc.c (path_access) [HAVE_DRIVE_LETTERS]: Do the right thing with drive letter systems.
* * keydb.h, passphrase.c (next_to_last_passphrase): New. "Touch" aDavid Shaw2006-01-174-20/+43
| | | | | | | | | | | | | passphrase as if it was used (move from next_pw to last_pw). * pubkey-enc.c (get_session_key): Use it here to handle the case where a passphrase happens to be correct for a secret key, but yet that key isn't the anonymous recipient (i.e. the secret key could be decrypted, but not the session key). This also handles the case where a secret key is located on a card and a secret key with no passphrase. Note this does not fix bug 594 (anonymous recipients on smartcard do not work) - it just prevents the anonymous search from stopping when the card is encountered.
* * keyserver.c (keyserver_refresh): Fix problem when more than one keyDavid Shaw2006-01-072-1/+7
| | | | | | in a refresh batch has a preferred keyserver set. Noted by Nicolas Rachinsky.
* * mainproc.c (check_sig_and_print), keyserver.cDavid Shaw2006-01-014-3/+8
| | | | | | | (keyserver_import_pka), card-util.c (fetch_url): Always require a scheme:// for keyserver URLs except when used as part of the --keyserver command for backwards compatibility.
* * sign.c (write_signature_packets): Lost a digest_algo line.David Shaw2006-01-012-0/+3
|
* * sign.c (hash_for): Add code to detect if the sk lives on a smartDavid Shaw2006-01-013-19/+44
| | | | | | | | | | | | card. If it does, only allow 160-bit hashes, a la DSA. This involves passing the *sk in, so change all callers. This is correct for today, given the current 160-bit q in DSA, and the current SHA-1/RIPEMD160 support in the openpgp card. It will almost certainly need changing down the road. * app-openpgp.c (do_sign): Give user error if hash algorithm is not supported by the card.
* * keyserver.c (keyserver_import_pka): New. Moved fromDavid Shaw2005-12-236-35/+161
| | | | | | | | | | | | | getkey.c:get_pubkey_byname which was getting crowded. * keyserver.c (keyserver_import_cert): Import a key found in DNS via CERT records. Can handle both the PGP (actual key) and IPGP (URL) CERT types. * getkey.c (get_pubkey_byname): Call them both here. * options.h, keyserver.c (parse_keyserver_options): Add "auto-cert-retrieve" option with optional max size argument.
* * gpgv.c: Stub.David Shaw2005-12-235-53/+123
| | | | | | | | | | * keyserver-internal.h, keyserver.c (keyserver_spawn, keyserver_work, keygerver_getname): New keyserver_getname function to fetch keys by name. * getkey.c (get_pubkey_byname): Call it here to enable locating keys by full mailbox from a keyserver a la PKA. Try PKA first, though, as it is likely to be faster.
* Finished PKA featureWerner Koch2005-12-2010-13/+94
|
* * getkey.c (merge_selfsigs_main): All primary keys can certify.David Shaw2005-12-192-1/+7
|
* * gpg.c (main): Restore convert-sk-to-pk as programs rely on it.David Shaw2005-12-193-6/+10
| | | | | | * keyid.c (usagestr_from_pk): Remove special PUBKEY_USAGE_CERT flag. It's no longer needed.
* * gpg.c (main): Don't default to import-options convert-sk-to-pk. ItDavid Shaw2005-12-142-1/+7
| | | | | | | causes confusing warning messages when importing a PGP-exported key that contains a secret key without selfsigs followed by the public key.
* * keyserver.c (keyserver_fetch): Switch on fast-import before weDavid Shaw2005-12-082-0/+18
| | | | | --fetch-keys so we don't rebuild the trustdb after each fetch.
* Made strings translatable. Minor fixes.Werner Koch2005-12-084-5/+12
|
* * options.h, keyserver.c (curl_cant_handle, keyserver_spawn,David Shaw2005-12-083-7/+36
| | | | | | | keyserver_fetch): Set a flag to indicate that we're doing a direct URI fetch so we can differentiate between a keyserver operation and a URI fetch for protocols like LDAP that can do either.
* * keyserver.c (keyserver_spawn): Don't print "searching for key 00000000"David Shaw2005-12-074-10/+73
| | | | | | | | | | when fetching a URI. * keyserver-internal.h, keyserver.c (keyserver_fetch): New. Fetch an arbitrary URI using the keyserver helpers. * gpg.c (main): Call it from here for --fetch-keys.
* Some cleanup so we don't build files that are completely ifdeffed out. David Shaw2005-12-061-1/+1
| | | | | | This causes a warning on Sun's cc. Do the internal regex code as well for consistency.
* * main.h, keylist.c (print_revokers): New. Print the "rvk" designatedDavid Shaw2005-11-204-20/+38
| | | | | | | | | revoker record. Moved from keyedit.c:show_key_with_all_names_colon. * keylist.c (list_keyblock_colon): Use it here ... * keyedit.c (show_key_with_all_names_colon): ... and here.
* * free-packet.c (copy_secret_key): Copy secret key into secure memoryDavid Shaw2005-11-195-8/+56
| | | | | | | | | since we may unprotect it. * main.h, g10.c (main), revoke.c (gen_desig_revoke): Add local user support so users can use -u with --desig-revoke. This bypasses the interactive walk over the revocation keys.
* * keyedit.c (keyedit_menu, menu_clean): Simplify clean options to justDavid Shaw2005-11-187-136/+88
| | | | | | | | | | | | | | "clean", and add "minimize". * import.c (parse_import_options): Make help text match the export versions of the options. * options.h, export.c (parse_export_options, do_export_stream): Reduce clean options to two: clean and minimize. * trustdb.h, trustdb.c (clean_one_uid): New function that joins uid and sig cleaning into one for a simple API outside trustdb.
* * armor.c (parse_header_line): A fussy bit of 2440: header lines areDavid Shaw2005-11-132-4/+24
| | | | | | delimited with a colon-space pair. Therefore a line such as "Comment: " is actually legal, albeit not particularly useful.
* * trustdb.h, trustdb.c (clean_key): New function to handle keyDavid Shaw2005-11-126-67/+71
| | | | | | | | | | | cleaning from one convenient place. * options.h, import.c (parse_import_options, clean_sigs_from_all_uids, import_one): Reduce clean options to two: clean and minimize. * parse-packet.c (setup_user_id): Remove. (parse_user_id, parse_attribute): Just use xmalloc_clear instead.
* * trustdb.c (clean_uid_from_key, clean_uids_from_key): SignificantlyDavid Shaw2005-11-122-66/+54
| | | | | simpler implementation.
* * keyedit.c (keyedit_menu, menu_clean_sigs_from_uids): Add "minimize"David Shaw2005-11-103-10/+19
| | | | | command.
* * packet.h, keyedit.c (menu_clean_uids_from_key), trustdb.cDavid Shaw2005-11-104-20/+18
| | | | | | (clean_uids_from_key): Fix display bug where sigs cleaned for other reasons caused a uid to appear as if it had been compacted.
* * packet.h: Move some flags to a bitfield. Change all callers.David Shaw2005-11-106-37/+44
|
* * options.h, import.c (parse_import_options, clean_sigs_from_all_uids,David Shaw2005-11-104-7/+16
| | | | | | import_one): Add import-minimal option. Similar to export-minimal, except it works on the way in.
* * trustdb.h, trustdb.c (clean_sigs_from_uid): Add flag to remove allDavid Shaw2005-11-106-24/+27
| | | | | | | | non-selfsigs from key during cleaning. Change all callers. * export.c (do_export_stream): Use it here so we don't need additional minimize code in the export path.
* * options.skel: Add a section for --encrypt-to. This is Debian bugDavid Shaw2005-11-062-0/+13
| | | | | 336211 by Javier Fernández-Sanguino Peña.
* * Makefile.am: Include @LIBUSB_CPPFLAGS@ in our CPPFLAGS. StrictlyDavid Shaw2005-11-064-4/+18
| | | | | | | | | | | speaking this should be only in gpg_CPPFLAGS, but then we have to compile everything twice for gpg and gpgv. * apdu.c (open_pcsc_reader): Fix double free. * gpg.c (main) [__APPLE__]: Default the PCSC driver to the OS X location. Suggested by Patty A. Hardy.
* * trustdb.c (clean_sigs_from_uid): Include sigs from unavailable keys inDavid Shaw2005-11-022-5/+17
| | | | | the sigs that are cleaned. Suggested by Dirk Traulsen and many others.
* * import.c (import_one): Do collapse_uids() before we do any cleaningDavid Shaw2005-11-024-9/+28
| | | | | | | | | | | | | | | so keyserver mangled keys with doubled user IDs can be properly cleaned - possibly sigs on the different user IDs cancel each other out. * import.c (parse_import_options), export.c (parse_export_options): List "xxx-clean" before the longer options so we don't end up with a partial match on the longer options. * trustdb.c (clean_uids_from_key): Return proper number of cleaned user IDs. Don't count user IDs as cleaned unless we actually delete something.
* * keyedit.c (menu_addrevoker), getkey.c (finish_lookup): Fix problem withDavid Shaw2005-10-273-4/+13
| | | | | | adding a cert-only designated revoker. Code was looking for a key with sign ability, and not cert ability. Noted by Timo Schulz.
* cygwin fixesWerner Koch2005-10-274-40/+170
|
* * keygen.c (proc_parameter_file): Default key and subkey usage flags toDavid Shaw2005-10-262-7/+35
| | | | | | algo capabilities if parameter file doesn't specify them. Noted by Timo Schulz.
* Fixed minor card related bugs and enhanced status messagesWerner Koch2005-10-185-54/+123
|
* exported subkeys are now merged into one output keyblockWerner Koch2005-10-172-75/+186
|
* * keyedit.c (keyedit_menu, menu_backsign): New "backsign" command toDavid Shaw2005-10-146-5/+175
| | | | | | | | | add 0x19 backsigs to old keys that don't have them. * misc.c (parse_options): Fix build warning. * main.h, keygen.c (make_backsig): Make public.
* * options.h, getkey.c (merge_selfsigs_subkey), gpg.c (main), sig-check.cDavid Shaw2005-10-125-12/+33
| | | | | | (signature_check2): Add --require-backsigs and --no-require-backsigs. Currently defaults to --no-require-backsigs.
* * getkey.c (merge_selfsigs_subkey), sig-check.c (signature_check2),David Shaw2005-10-114-20/+25
| | | | | | | keygen.c (make_backsig): Did some backsig interop testing with the PGP folks. All is well, so I'm turning generation of backsigs on for new keys. Checking for backsigs on verification is still off.
* Yet another fix for the gpg.c renameWerner Koch2005-10-061-0/+15
|