1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-12-30 11:31:32 +01:00

5099 Commits

Author SHA1 Message Date
Werner Koch
a41d45af62 * gpgsm.c (main): Set the prefixes for assuan logging.
* sign.c (gpgsm_sign): Add validation checks for the default
certificate.

* gpgsm.c: Add -k as alias for --list-keys and -K for
--list-secret-keys.
2003-12-16 16:31:16 +00:00
Werner Koch
f438224dae (main): Set the prefixes for assuan logging. 2003-12-16 16:30:55 +00:00
Werner Koch
bba0f77422 (writen, fun_writer, fun_closer): New.
(log_set_file): Add feature to log to a socket.
(log_set_file, do_logv): Force printing with prefix and pid.
2003-12-16 16:30:48 +00:00
Werner Koch
082e84c273 Fixed blatant allocation bug. 2003-12-16 14:20:45 +00:00
Werner Koch
9f8cb453b7 Add simple tool to watch the log output of gnupg and related modules. 2003-12-16 11:32:52 +00:00
Werner Koch
d0fbe288b2 * encrypt.c (init_dek): Use gry_create_nonce for the IV; there is
not need for real strong random here and it even better protect
the random bits used for the key.
2003-12-16 11:31:46 +00:00
Werner Koch
f18d0e557c * seckey-cert.c (protect_secret_key): Use gry_create_nonce for the
IV; there is not need for real strong random here and it even
better protect the random bits used for the key.
2003-12-16 11:30:57 +00:00
Werner Koch
d06cba6984 * protect.c (do_encryption): Use gcry_create_nonce instad of the
obsolete WEAK_RANDOM.
2003-12-16 11:30:38 +00:00
Werner Koch
dba63c0a0c * configure.ac: Check for funopen and fopencookie as part of the
jnlib checks.

* logging.c (writen, fun_writer, fun_closer): New.
(log_set_file): Add feature to log to a socket.
2003-12-16 11:30:16 +00:00
David Shaw
f5d4b8dc06 * sig-check.c (do_check): Move the signing algo and hash checks from
here... (signature_check2): ... to here. (check_key_signature2): ... and
here.  This is a minor optimization to avoid fetching a key (which can be
expensive, especially if it is not self-signed, and there are many key
signatures on it which need to be checked for ultimate trust) if the
signature would have failed anyway because of algorithm or hash problems.
2003-12-13 03:53:27 +00:00
David Shaw
db5ab5e730 * packet.h, build-packet.c (hash_public_key): Remove function ...
* keydb.h, keyid.c (hash_public_key, do_fingerprint_md): ... and make a
new one here that shares code with the fingerprint calculations.  This
removes some duplicated functionality, and is also around 14% faster.
(Every bit helps).

* import.c (import_one): No longer need the Elgamal import warning.

* getkey.c (get_pubkey_fast): This one is sort of obscure. get_pubkey_fast
returns the primary key when requesting a subkey, so if a user has a key
signed by a subkey (we don't do this, but used to), AND that key is not
self-signed, AND the algorithm of the subkey in question is not present in
GnuPG, AND the algorithm of the primary key that owns the subkey in
question is present in GnuPG, then we will try and verify the subkey
signature using the primary key algorithm and hit a BUG().  The fix is to
not return a hit if the keyid is not the primary.  All other users of
get_pubkey_fast already expect a primary only.
2003-12-11 01:07:42 +00:00
David Shaw
888a6c2980 * keyid.c (do_fingerprint_md): Remove the rules to hash the old v3 Elgamal
keys.  They are no longer needed.
2003-12-10 01:59:45 +00:00
David Shaw
08967eb985 * keyid.c (keyid_from_sk, keyid_from_pk, fingerprint_from_pk,
fingerprint_from_sk): Enforce the v3-is-only-RSA rule.  Anything that
isn't RSA gets a zero keyid and fingerprint.
2003-12-10 01:52:33 +00:00
David Shaw
4830eb7cae * keyid.c (do_fingerprint_md): Properly handle hashing of keys that we
don't know the structure of by using the opaque MPI.
(do_fingerprint_md_sk): We cannot calculate the fingerprint from a secret
key unless we know the structure (since we can't leave off the secret key
parts), so fail early..... (keyid_from_sk, fingerprint_from_sk): .... and
return all zeroes.
2003-12-10 01:27:55 +00:00
Werner Koch
56530d2c39 Keep those files in CVS too. 2003-12-09 09:28:27 +00:00
Werner Koch
f6dce349ae Added missing files 2003-12-09 09:23:54 +00:00
Werner Koch
5b2dc2d67e Readded accidential removed files 2003-12-09 09:21:06 +00:00
Repo Admin
6c88a1f5c0 This commit was manufactured by cvs2svn to create branch
'GNUPG-1-9-BRANCH'.
2003-12-09 09:21:06 +00:00
Werner Koch
d4143cdd92 Readded file 2003-12-09 09:20:26 +00:00
Werner Koch
5f8ec65801 Removed accidential added file 2003-12-09 09:19:36 +00:00
Werner Koch
07d31ceeb1 (MSGID_BUGS_ADDRESS): New. 2003-12-09 09:13:29 +00:00
Werner Koch
4c2e0e62fc * configure.ac: Add a min_automake_version.
* README.CVS: New.
* autogen.sh: Revamped except for the --build-w32 hack.
* Makefile.am: Add README.CVS
2003-12-09 09:12:43 +00:00
Werner Koch
1c1069f70b * configure.ac: Add a min_automake_version.
* README.CVS: New.
* autogen.sh: Revamped except for the --build-w32 hack.
* Makefile.am: Add README.CVS
2003-12-09 09:12:43 +00:00
Werner Koch
be294cbb14 Added files we better keep in the CVS 2003-12-09 09:07:09 +00:00
Repo Admin
f39b03d03d This commit was manufactured by cvs2svn to create branch
'GNUPG-1-9-BRANCH'.
2003-12-09 09:07:09 +00:00
David Shaw
d143a9ecc2 * gpg.sgml: Fix a few missing semicolons in & entities. Noted by
Christian Biere.  Some minor grammar fixes.  Remove the "host -l pgp.net |
grep wwwkeys" advice since the nameserver no longer all allow zone
transfers.  Replace it with a mention of hkp://subkeys.pgp.net.  Note that
BZIP2 defaults to compression level 6.
2003-12-09 05:09:37 +00:00
David Shaw
c4ecc7bce8 * gpgsplit.c (write_part): Split off decompression code. (handle_zlib):
Move it here. (handle_bzip2): Add this to handle BZIP2 compressed
messages.
2003-12-06 20:02:59 +00:00
David Shaw
acdcbd6550 * http.c (send_request): Add a Host: header for virtual hosts. 2003-12-06 18:35:32 +00:00
David Shaw
d1b08dafe3 * Makefile.am: Reenable tests now that the Elgamal signature keys are
gone.

* defs.inc, pubring.asc, secring.asc, plain-1.asc, plain-2.asc,
plain-3.asc: Remove the old v3 Elgamal keys and replace with RSA+Elgamal
and RSA s+e.
2003-12-05 13:32:48 +00:00
David Shaw
7c01f15494 * miscutil.c (answer_is_yes_no_default, answer_is_yes_no_quit): Don't use
alternate strings when not needed so we don't have to re-translate them.
Hopefully the comment will be enough to indicate multiple match strings.
2003-12-05 04:20:47 +00:00
David Shaw
10e596d6c3 * config.links: Show target in asm-syntax.h file and include targets for
K*BSD (GNU userland with BSD kernel).
2003-12-05 04:15:31 +00:00
David Shaw
32c198391e * cipher.h: Make cipher list match 2440bis-09. 2003-12-04 05:24:32 +00:00
David Shaw
b5fe8d3dd7 * pubkey.c (setup_pubkey_table): Don't allow signatures to and from
encrypt-only Elgamal keys. (pubkey_get_npkey, pubkey_get_nskey,
pubkey_get_nsig, pubkey_get_nenc, pubkey_nbits): Wrap the RSA cheats in
!USE_RSA. Add cheats for sign+encrypt Elgamal.
2003-12-04 05:17:56 +00:00
David Shaw
189dea77ea * g10.c (strusage, main): Show development version warning in --version
output. (main): Set --bzip2-compress-level to the default value at
startup.  Remove --emulate-checksum-bug noop.
2003-12-04 04:58:12 +00:00
David Shaw
ad71703ebc * options: Remove emulate-md-encode-bug. 2003-12-04 04:38:56 +00:00
David Shaw
3c40fd65d6 * options.h, g10.c (main), main.h, seskey.c (do_encode_md,
encode_md_value), sig-check.c (do_check), sign.c (do_sign): Remove
--emulate-md-encode-bug as it only applied to Elgamal signatures, which
are going away.
2003-12-04 04:34:08 +00:00
Werner Koch
d0f704991c Added a very simple tool. 2003-12-01 10:54:59 +00:00
Werner Koch
c68eaa4b6b * gpgsm.c, gpgsm.h: New options --{enable,disable}-ocsp.
(gpgsm_init_default_ctrl): Set USE_OCSP to the default value.
* certchain.c (gpgsm_validate_chain): Handle USE_OCSP.
* call-dirmngr.c (gpgsm_dirmngr_isvalid): Add arg USE_OCSP and
proceed accordingly.
2003-12-01 10:54:30 +00:00
Werner Koch
7134af9fdb * scdaemon.c, scdaemon.h: New options --allow-admin and --deny-admin.
* app-openpgp.c (verify_chv3): Check it here.
2003-12-01 10:54:09 +00:00
Werner Koch
6b7af47bcc (Certificate Options): Add --{enable,disable}-ocsp. 2003-12-01 10:53:40 +00:00
Werner Koch
fbd0f91c82 * sexp-parse.h (snext): Don't use atoi_1 and digitp macros, so
that this file is useful by other applications too.
2003-12-01 10:53:26 +00:00
David Shaw
a32a3a863e * NEWS: Note --disable-rsa.
* configure.ac: Add --disable-rsa.

* README: Add --with-zlib, --with-bzip2, --without-bzip2, --disable-rsa,
and --enable-minimal.  Update gettext version.
2003-12-01 00:48:16 +00:00
David Shaw
6048620ea5 * pubkey.c (setup_pubkey_table): Only include RSA if USE_RSA is defined.
(pubkey_get_npkey): Return 2 for RSA even if it isn't available so we can
at least handle RSA keys.

----------------------------------------------------------------------
pubkey.c CVS:
----------------------------------------------------------------------
2003-12-01 00:43:51 +00:00
David Shaw
1f1da8c8c3 * README: Update version number. Add BZIP2. Remove Elgamal sign+encrypt. 2003-12-01 00:02:06 +00:00
David Shaw
03b04db3cf * mainproc.c (proc_symkey_enc, proc_encrypted): Add ability to use
--override-session-key on --symmetric messages (new-style or old-style).
(proc_pubkey_enc): Move code to show session key from here to
proc_encrypted() so it can work with any type of message. Suggested by
Michael Young.
2003-11-30 15:33:04 +00:00
David Shaw
3c0eb7790b * trustdb.c (validate_keys): Reset the trustdb before checking if we have
any ultimately trusted keys.  This ensures that if we lose all our
ultimately trusted keys, we don't leave behind the old validity
calculations.  Noted by Peter Palfrader.

* revoke.c (gen_desig_revoke): Specify in the comment when a designated
revocation is generated.

* getkey.c (merge_selfsigs_main, merge_selfsigs_subkey,
get_seckey_byname2): Remove Elgamal check since we are removing type 20
keys altogether.
2003-11-30 00:33:27 +00:00
Werner Koch
11859fc4a8 post release version number bumb 2003-11-27 17:23:56 +00:00
Werner Koch
c58f068af8 (TESTS): Temporary remove tests using ElG signatures. V1-3-4 2003-11-27 16:57:41 +00:00
Werner Koch
a278127f4d about to release 1.3.4 2003-11-27 16:45:28 +00:00
David Shaw
18575c7abb * NEWS: Note that we won't encrypt to an Elgamal sign+encrypt key any
longer.
2003-11-27 14:59:08 +00:00