Commit Graph

2242 Commits

Author SHA1 Message Date
David Shaw 5476afe1b4 * gpgkeys_ldap.c (printquoted), curl-shim.c (curl_escape): Fix bad
encoding of characters > 127.  Noted by Nalin Dahyabhai.
2006-07-12 21:16:57 +00:00
David Shaw 0b5bc307d7 * tar-ustar.m4: Use dd instead of strings as it's more likely to be
around.  Suggested by Nelson H. F. Beebe.
2006-07-12 14:41:08 +00:00
David Shaw ce5ed75822 * tar-ustar.m4: Not all greps know the -q (quiet) flag, so redirect to
/dev/null instead.
2006-07-11 16:45:17 +00:00
David Shaw b19683689c * tar-ustar.m4: Pass tar data through strings so that greps that don't
grep in binary files (Solaris) can detect the string.  Noted by Mark
Davies.
2006-07-11 12:36:04 +00:00
David Shaw 975da08004 * configure.ac: Fix resolver autoconf code so it works (fails)
properly with uClibc.
2006-07-08 23:29:25 +00:00
Werner Koch 5c82303d36 Updated. 2006-07-03 11:39:09 +00:00
David Shaw 04376627a6 * rsa.c (generate): Use e=65537 for new RSA keys. 2006-06-28 22:29:25 +00:00
Werner Koch d91c7a06ff i18n fix 2006-06-28 19:33:14 +00:00
David Shaw cb117d7457 * keydb.h, pkclist.c (select_algo_from_prefs, algo_available): Pass a
union for preference hints rather than doing void * games.

* sign.c (sign_file): Use it here.
2006-06-28 17:54:35 +00:00
David Shaw 2a31983ef8 * sign.c (sign_file): When signing with multiple DSA keys, one being DSA1
and one being DSA2 and encrypting at the same time, if the recipient
preferences give a hash that can work with the DSA2 key, then allow the
DSA1 key to be promoted rather than giving up and using hash_for().
2006-06-28 17:12:55 +00:00
David Shaw 7c457fac67 * pkclist.c (algo_available): Automatically enable DSA2 mode when handling
a key that clearly isn't DSA1 (i.e. q!=160).
2006-06-28 15:26:05 +00:00
Werner Koch 23380119ee Fixed uploading of keays. 2006-06-28 09:37:42 +00:00
Werner Koch e0af7eb379 do no use reopen_std under W32. 2006-06-27 08:40:23 +00:00
Werner Koch 826ffd8694 Post release version update 2006-06-25 14:30:52 +00:00
Werner Koch 74315bb70a Ready for a release 2006-06-25 12:17:55 +00:00
Werner Koch 44e22e1a94 Typo fix 2006-06-25 12:07:16 +00:00
Werner Koch a3883eb71d About to do a new release 2006-06-25 12:03:38 +00:00
David Shaw bb97576ea0 * gpg.sgml: Document --enable-dsa2, --disable-dsa2, and
--default-keyserver-url.

* DETAILS: Note "Keyserver:"
2006-06-23 04:27:57 +00:00
David Shaw 00db922029 * options.h, gpg.c (main), keygen.c (keygen_upd_std_prefs,
keygen_add_std_prefs, proc_parameter_file): Add --default-keyserver-url to
specify a keyserver URL at key generation time, and "Keyserver:" keyword
for doing the same through a batch file.
2006-06-22 22:56:54 +00:00
David Shaw 059c67ca6d * sign.c (do_sign): Accept a truncated hash even for DSA1 keys (be liberal
in what you accept, etc).
2006-06-22 19:17:21 +00:00
David Shaw acbac61bff * gpg.sgml: Note that --pgp8 does not include SHA224. Clarify that
clearsigned messages are not reversible.
2006-06-22 19:13:18 +00:00
David Shaw 4f7b459a96 * import.c (import_one): Add a flag (from_sk) so we don't check prefs
on an autoconverted public key.  The check should only happen on the
sk size.  Noted by Dirk Traulsen.
2006-06-12 12:05:34 +00:00
David Shaw 7211ee589a * keygen.c (gen_card_key): Add optional argument to return a pointer
(not a copy) of the stub secret key for the secret key we just
generated on the card.  (generate_card_subkeypair): Use it here so
that the signing key on the card can use the card to generate the 0x19
backsig on the primary key.  Noted by Janko Heilgeist and Jonas Oberg.
2006-06-10 04:11:05 +00:00
David Shaw 91dbfce3b7 * parse-packet.c (parse_user_id): Cap the user ID size at 2048 bytes.
This prevents a memory allocation attack with a very large user ID.  A
very large packet length could even cause the allocation (a u32) to wrap
around to a small number.  Noted by Evgeny Legerov on full-disclosure.
2006-06-09 19:45:19 +00:00
David Shaw 49c31957f0 Revert last. It is still wrong. 2006-05-27 02:07:05 +00:00
David Shaw b9c2f44336 * exec.c (make_tempdir) [_WIN32]: Modified to properly handle
arbitrarily long temporary directory paths.
2006-05-27 01:38:54 +00:00
David Shaw 05a2a2f39a * keygen.c (gen_dsa): Allow generating DSA2 keys (allow specifying sizes >
1024 when --enable-dsa2 is set).  The size of q is set automatically based
on the key size. (ask_keysize, generate_keypair): Ask for DSA size when
--enable-dsa2 is set.
2006-05-25 19:39:03 +00:00
Werner Koch e9bbf255a6 Added backsig to my key 2006-05-25 13:55:34 +00:00
David Shaw 5cef0cac5a * exec.c (make_tempdir): Fix bug with a temporary directory on Win32
that is over 256 bytes long.  Noted by Israel G. Lugo.
2006-05-25 03:02:51 +00:00
David Shaw 071d362ba6 * mksamplekeys: Incorporate new package signature key and minimize keys
when generating samplekeys.asc.
2006-05-23 22:48:21 +00:00
David Shaw 782a70e522 * gpg.c (reopen_std): New function to reopen fd 0, 1, or 2 if we are
called with them closed.  This is to protect our keyring/trustdb files
from corruption if they get attached to one of the standard fds.  Print a
warning if possible that this has happened, and fail completely if we
cannot reopen (should never happen). (main): Call it here.
2006-05-23 22:04:09 +00:00
David Shaw 8fa55e28fe * configure.ac: Add --disable-optimization. This is handy for debugging
so the compiler doesn't rearrange things and eliminate variables.
2006-05-23 15:32:57 +00:00
David Shaw 197c7a3e47 * parse-packet.c (dump_sig_subpkt, parse_signature), build-packet.c
(build_sig_subpkt_from_sig), getkey.c (fixup_uidnode,
merge_selfsigs_main, merge_selfsigs_subkey), keygen.c
(keygen_add_key_expire): Fix meaning of key expiration and sig
expiration subpackets - zero means "never expire" according to 2440,
not "expire instantly".
2006-05-23 03:58:53 +00:00
David Shaw 3bee120e15 * import.c (import_one): Fix bug when importing a new key from a file. 2006-05-22 21:38:13 +00:00
Marcus Brinkmann a26d0ff496 2006-05-22 Marcus Brinkmann <marcus@g10code.de>
* configure.ac: Remove check for noexecstack and invoke
	CL_AS_NOEXECSTACK instead.

m4/
2006-05-22  Marcus Brinkmann  <marcus@g10code.de>

	* noexecstack.m4: New file.
2006-05-22 17:19:22 +00:00
David Shaw 7596ae1f6a * getkey.c (get_pubkey_byname), import.c (import_one): Fix key selection
problem when auto-key-locate returns a list of keys, not all of which are
usable (revoked, expired, etc).  Noted by Simon Josefsson.
2006-05-22 16:53:09 +00:00
Werner Koch 6089d7f5d8 Updated keys 2006-05-17 08:42:12 +00:00
Werner Koch 1918e6a5e2 Forgot to save the actual fix 2006-05-16 11:08:47 +00:00
Werner Koch e09aa70c54 Fixed OSF5 warning suppression. 2006-05-16 11:06:28 +00:00
David Shaw eda3d78130 * libcurl.m4: Fix mistaken AC_SUBST when curl is not found. 2006-05-10 02:09:27 +00:00
David Shaw 76d69cd56a * NEWS: Note SHA-224 and DSA2.
* configure.ac: Remove --enable-old-keyserver-helpers.  Comment out
--enable-m-guard for now.
2006-04-27 16:20:13 +00:00
David Shaw bc81ce601f (keyserver_import_cert): Show warning if there is a CERT fingerprint,
but no --keyserver set.
2006-04-27 03:38:56 +00:00
David Shaw 034937c6d1 * keyserver.c (path_makes_direct): New. (keyserver_spawn): Used here
to add "_uri" to certain gpgkeys_xxx helpers when the meaning is
different if a path is provided (i.e. ldap).
2006-04-27 03:14:17 +00:00
David Shaw f37dac88cb * gpgkeys_http.c, gpgkeys_oldhkp.c: Removed. 2006-04-26 21:49:43 +00:00
David Shaw e87d36ccf6 * Makefile.am: Don't build gpgkeys_http or gpgkeys_(old)hkp any longer as
this is done via curl or fake-curl.

* ksutil.h, ksutil.c, gpgkeys_hkp.c, gpgkeys_curl.c: Minor #include tweaks
as FAKE_CURL is no longer meaningful.
2006-04-26 21:48:29 +00:00
David Shaw 19c353232e * keyserver.c: Fix build problem with platforms that stick libcurl in
a place not in the regular include search path.
2006-04-22 14:15:50 +00:00
David Shaw fcb3150564 * make-dns-cert.c (main): Small exit code tweak from Peter Palfrader. 2006-04-20 22:05:42 +00:00
David Shaw 0f1c0a9f28 * options.h, gpg.c (main): Add --enable-dsa2 and --disable-dsa2. Defaults
to disable.

* pkclist.c (algo_available): If --enable-dsa2 is set, we're allowed to
truncate hashes to fit DSA keys.

* sign.c (match_dsa_hash): New.  Return the best match hash for a given q
size. (do_sign, hash_for, sign_file): When signing with a DSA key, if it
has q==160, assume it is an old DSA key and don't allow truncation unless
--enable-dsa2 is also set.  q!=160 always allows truncation since they
must be DSA2 keys. (make_keysig_packet): If the user doesn't specify a
--cert-digest-algo, use match_dsa_hash to pick the best hash for key
signatures.
2006-04-20 21:32:42 +00:00
David Shaw b625a6d1a9 (generate): Tweak to allow keys larger than 1024 bits. Enforce that the q
size doesn't end between byte boundaries.
2006-04-20 21:11:56 +00:00
David Shaw 2f94329422 The plumbing necessary to create DSA keys with variable sized q.
Not yet used (q==160).
2006-04-20 18:40:37 +00:00