1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-12-24 10:39:57 +01:00

1329 Commits

Author SHA1 Message Date
David Shaw
db5ab5e730 * packet.h, build-packet.c (hash_public_key): Remove function ...
* keydb.h, keyid.c (hash_public_key, do_fingerprint_md): ... and make a
new one here that shares code with the fingerprint calculations.  This
removes some duplicated functionality, and is also around 14% faster.
(Every bit helps).

* import.c (import_one): No longer need the Elgamal import warning.

* getkey.c (get_pubkey_fast): This one is sort of obscure. get_pubkey_fast
returns the primary key when requesting a subkey, so if a user has a key
signed by a subkey (we don't do this, but used to), AND that key is not
self-signed, AND the algorithm of the subkey in question is not present in
GnuPG, AND the algorithm of the primary key that owns the subkey in
question is present in GnuPG, then we will try and verify the subkey
signature using the primary key algorithm and hit a BUG().  The fix is to
not return a hit if the keyid is not the primary.  All other users of
get_pubkey_fast already expect a primary only.
2003-12-11 01:07:42 +00:00
David Shaw
888a6c2980 * keyid.c (do_fingerprint_md): Remove the rules to hash the old v3 Elgamal
keys.  They are no longer needed.
2003-12-10 01:59:45 +00:00
David Shaw
08967eb985 * keyid.c (keyid_from_sk, keyid_from_pk, fingerprint_from_pk,
fingerprint_from_sk): Enforce the v3-is-only-RSA rule.  Anything that
isn't RSA gets a zero keyid and fingerprint.
2003-12-10 01:52:33 +00:00
David Shaw
4830eb7cae * keyid.c (do_fingerprint_md): Properly handle hashing of keys that we
don't know the structure of by using the opaque MPI.
(do_fingerprint_md_sk): We cannot calculate the fingerprint from a secret
key unless we know the structure (since we can't leave off the secret key
parts), so fail early..... (keyid_from_sk, fingerprint_from_sk): .... and
return all zeroes.
2003-12-10 01:27:55 +00:00
Werner Koch
5f8ec65801 Removed accidential added file 2003-12-09 09:19:36 +00:00
Werner Koch
4c2e0e62fc * configure.ac: Add a min_automake_version.
* README.CVS: New.
* autogen.sh: Revamped except for the --build-w32 hack.
* Makefile.am: Add README.CVS
2003-12-09 09:12:43 +00:00
David Shaw
d143a9ecc2 * gpg.sgml: Fix a few missing semicolons in & entities. Noted by
Christian Biere.  Some minor grammar fixes.  Remove the "host -l pgp.net |
grep wwwkeys" advice since the nameserver no longer all allow zone
transfers.  Replace it with a mention of hkp://subkeys.pgp.net.  Note that
BZIP2 defaults to compression level 6.
2003-12-09 05:09:37 +00:00
David Shaw
c4ecc7bce8 * gpgsplit.c (write_part): Split off decompression code. (handle_zlib):
Move it here. (handle_bzip2): Add this to handle BZIP2 compressed
messages.
2003-12-06 20:02:59 +00:00
David Shaw
acdcbd6550 * http.c (send_request): Add a Host: header for virtual hosts. 2003-12-06 18:35:32 +00:00
David Shaw
d1b08dafe3 * Makefile.am: Reenable tests now that the Elgamal signature keys are
gone.

* defs.inc, pubring.asc, secring.asc, plain-1.asc, plain-2.asc,
plain-3.asc: Remove the old v3 Elgamal keys and replace with RSA+Elgamal
and RSA s+e.
2003-12-05 13:32:48 +00:00
David Shaw
7c01f15494 * miscutil.c (answer_is_yes_no_default, answer_is_yes_no_quit): Don't use
alternate strings when not needed so we don't have to re-translate them.
Hopefully the comment will be enough to indicate multiple match strings.
2003-12-05 04:20:47 +00:00
David Shaw
10e596d6c3 * config.links: Show target in asm-syntax.h file and include targets for
K*BSD (GNU userland with BSD kernel).
2003-12-05 04:15:31 +00:00
David Shaw
32c198391e * cipher.h: Make cipher list match 2440bis-09. 2003-12-04 05:24:32 +00:00
David Shaw
b5fe8d3dd7 * pubkey.c (setup_pubkey_table): Don't allow signatures to and from
encrypt-only Elgamal keys. (pubkey_get_npkey, pubkey_get_nskey,
pubkey_get_nsig, pubkey_get_nenc, pubkey_nbits): Wrap the RSA cheats in
!USE_RSA. Add cheats for sign+encrypt Elgamal.
2003-12-04 05:17:56 +00:00
David Shaw
189dea77ea * g10.c (strusage, main): Show development version warning in --version
output. (main): Set --bzip2-compress-level to the default value at
startup.  Remove --emulate-checksum-bug noop.
2003-12-04 04:58:12 +00:00
David Shaw
ad71703ebc * options: Remove emulate-md-encode-bug. 2003-12-04 04:38:56 +00:00
David Shaw
3c40fd65d6 * options.h, g10.c (main), main.h, seskey.c (do_encode_md,
encode_md_value), sig-check.c (do_check), sign.c (do_sign): Remove
--emulate-md-encode-bug as it only applied to Elgamal signatures, which
are going away.
2003-12-04 04:34:08 +00:00
David Shaw
a32a3a863e * NEWS: Note --disable-rsa.
* configure.ac: Add --disable-rsa.

* README: Add --with-zlib, --with-bzip2, --without-bzip2, --disable-rsa,
and --enable-minimal.  Update gettext version.
2003-12-01 00:48:16 +00:00
David Shaw
6048620ea5 * pubkey.c (setup_pubkey_table): Only include RSA if USE_RSA is defined.
(pubkey_get_npkey): Return 2 for RSA even if it isn't available so we can
at least handle RSA keys.

----------------------------------------------------------------------
pubkey.c CVS:
----------------------------------------------------------------------
2003-12-01 00:43:51 +00:00
David Shaw
1f1da8c8c3 * README: Update version number. Add BZIP2. Remove Elgamal sign+encrypt. 2003-12-01 00:02:06 +00:00
David Shaw
03b04db3cf * mainproc.c (proc_symkey_enc, proc_encrypted): Add ability to use
--override-session-key on --symmetric messages (new-style or old-style).
(proc_pubkey_enc): Move code to show session key from here to
proc_encrypted() so it can work with any type of message. Suggested by
Michael Young.
2003-11-30 15:33:04 +00:00
David Shaw
3c0eb7790b * trustdb.c (validate_keys): Reset the trustdb before checking if we have
any ultimately trusted keys.  This ensures that if we lose all our
ultimately trusted keys, we don't leave behind the old validity
calculations.  Noted by Peter Palfrader.

* revoke.c (gen_desig_revoke): Specify in the comment when a designated
revocation is generated.

* getkey.c (merge_selfsigs_main, merge_selfsigs_subkey,
get_seckey_byname2): Remove Elgamal check since we are removing type 20
keys altogether.
2003-11-30 00:33:27 +00:00
Werner Koch
11859fc4a8 post release version number bumb 2003-11-27 17:23:56 +00:00
Werner Koch
c58f068af8 (TESTS): Temporary remove tests using ElG signatures. V1-3-4 2003-11-27 16:57:41 +00:00
Werner Koch
a278127f4d about to release 1.3.4 2003-11-27 16:45:28 +00:00
David Shaw
18575c7abb * NEWS: Note that we won't encrypt to an Elgamal sign+encrypt key any
longer.
2003-11-27 14:59:08 +00:00
Werner Koch
fb5270eac8 Minor additions 2003-11-27 14:50:44 +00:00
Werner Koch
996d61bcc6 * pubkey.c (pubkey_sign): Return an error if an ElGamal key is used.
* elgamal.c (gen_k): New arg SMALL_K.
(sign): Use it here with SMALL_K set to false
(do_encrypt): and here with SMALL_K set to true.
2003-11-27 14:47:59 +00:00
David Shaw
5473ac9deb * pkclist.c (build_pk_list): Do not allow an empty PK list in interactive
mode.

* getkey.c (get_seckey_byname2): Disallow use of sign+encrypt Elgamal
keys.
2003-11-27 14:47:00 +00:00
Werner Koch
20d83b24ee Solved cvs conflict 2003-11-27 13:55:24 +00:00
Werner Koch
c257783793 Auto-updates 2003-11-27 13:54:37 +00:00
David Shaw
973c868961 * keygen.c (ask_algo): Remove ability to generate Elgamal sign+encrypt
keys.

* getkey.c (merge_selfsigs_main, merge_selfsigs_subkey): Disallow use of
sign+encrypt Elgamal keys.
2003-11-27 13:53:34 +00:00
David Shaw
d3e5200206 * configure.ac: Use MSG_NOTICE instead of MSG_WARN for less serious
notifications.

* NEWS: I meant "less" not "more".
2003-11-27 13:43:21 +00:00
Werner Koch
ee3f955709 (get_key): Fixed invalid use of fprintf without
format string.
2003-11-27 12:16:43 +00:00
David Shaw
4b6f0055b4 * gpg.sgml: Note the new combinations with --symmetric and --encrypt.
Document --bzip2-compress-level, and --bzip2-compress-lowmem.  Clarify the
plurarility (or not) of various list and verify options.  Document BZIP2
in the --compress-algo section.  Warn about compatibility issues with ZLIB
and BZIP2.
2003-11-21 05:13:23 +00:00
David Shaw
cdf871f0e5 * gpg.sgml: Document --compress-level. Some minor tweaks to other
entries.

* TRANSLATE: New, note to translators about the yes|yes multiple match
syntax.

* Makefile.am: Include TRANSLATE in distributed files.
2003-11-21 01:26:29 +00:00
David Shaw
3330dbd714 * config.links: sparc64 assembler doesn't work on FreeBSD or OpenBSD
either.
2003-11-21 01:13:55 +00:00
David Shaw
85a80265c7 * seskey.c (do_encode_md): Comment about earlier (pre-PGP 2.3) encodings.
* misc.c (compress_algo_to_string): Translate "Uncompressed". Requested by
Tommi Vainikainen. (string_to_compress_algo): Include multi-string for
"uncompressed|none".
2003-11-21 01:11:25 +00:00
David Shaw
e81943f748 * util.h: Add prototype for match_multistr(). 2003-11-21 01:03:51 +00:00
David Shaw
baf4e3b6fc * miscutil.c (match_multistr): New. Match against each segment in a
string with tokens separated by |. (answer_is_yes_no_default,
answer_is_yes_no_quit, answer_is_okay_cancel): Use it here to enable
alternate translations.
2003-11-21 01:02:04 +00:00
David Shaw
dcf747d620 * options.h, g10.c (main), compress-bz2.c (init_uncompress): Add
--bz2-compress-lowmem to set bzlib "small" flag for low memory (but slow)
decompression.
2003-11-18 02:52:35 +00:00
David Shaw
2e4ab6c669 * compress.c (init_compress): Remove compress level 10 trick, since it is
no longer needed.

* g10.c: Fix typoed option name.

* compress-bz2.c (init_compress): Compression level 0 is not meaningful
for bzip2.
2003-11-15 23:54:14 +00:00
David Shaw
995d712589 * options.h, g10.c (main), compress.c (init_compress), compress-bz2.c
(init_compress): Add --compress-level and --bzip2-compress-level.  -z sets
them both.  Change various callers.
2003-11-15 22:31:58 +00:00
David Shaw
3257edd4e4 * encode.c (encode_simple), sign.c (sign_symencrypt_file): Properly use
default_compress_algo (--compress-algo, followed by the highest
--personal-compress-preference, followed by ZIP) to get the algorithm.
2003-11-15 15:38:43 +00:00
David Shaw
c47ec46526 * options.h, trustdb.c (trust_model_string, init_trustdb): Add support for
"external" trust model, where the user can provide a pregenerated trustdb.

* keyedit.c (keyedit_menu): Do not allow editing ownertrust with an
external trust model trustdb.
2003-11-15 00:19:49 +00:00
David Shaw
80caf9957f * options.h, g10.c, keyedit.c, keylist.c, mainproc.c: Clarify the
plurarility (or not) of various list and verify options.
2003-11-14 05:06:19 +00:00
David Shaw
fbadc93876 * NEWS: Note BZIP2. 2003-11-13 04:02:17 +00:00
David Shaw
bc1e4357a9 * g10.c (main): Add --symmetric --sign --encrypt.
* main.h, encode.c (setup_symkey): New.  Prompt for a passphrase and
create a DEK for symmetric encryption. (write_symkey_enc): New.  Write out
symmetrically encrypted session keys. (encode_crypt, encrypt_filter): Use
them here here when creating a message that can be decrypted with a
passphrase or a pk.

* sign.c (sign_file): Call setup_symkey if we are doing a --symmetric
--sign --encrypt.
2003-11-13 02:54:12 +00:00
David Shaw
fef77d93b7 * configure.ac: Make sure that the resolver API actually compiles, and not
just that the right functions exist.
2003-11-13 01:06:40 +00:00
David Shaw
5028edd538 * mainproc.c (proc_symkey_enc): Don't show algorithm information when
--quiet is set.  Suggested by Duncan Harris.  Also don't fail with BUG()
when processing a --symmetric message with a cipher we don't have.

* g10.c: Alias --personal-xxx-prefs to --personal-xxx-preferences.
2003-11-10 04:33:13 +00:00