| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
| |
Fixes bug#1355.
|
|
|
|
| |
Fixes bug#1354.
|
| |
|
|
|
|
| |
When unset or 0, the calibrated count will be used.
|
| |
|
|
|
|
|
|
|
|
| |
[[PGP Signed Part:Undecided]]
[1. text/plain]
Example path for com-certs.pem corrected.
[2. text/x-diff; doc.diff]
|
|
|
|
| |
... and the answer of course.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This patch implementes a chunk mode to pass the key parameters from
scdaemon to gpg. This allows to pass arbitrary long key paremeters;
it is used for keys larger than 3072 bit.
Note: the card key generation in gpg is currently broken. The keys
are generated but it is not possible to create the self-signature
because at that time the gpg-agent does not yet know about the new
keys and thus can't divert the sign request to the card. We either
need to run the learn command right after calling agent_scd_genkey or
implement a way to sign using the currently inserted card. Another
option would be to get rid of agent_scd_genkey and implement the
feature directly in agent_genkey.
|
| |
|
|
|
|
|
| |
To avoid this in the future, everyone should really use the clean-po
filter as installed with ./autogen.sh . Thanks.
|
| |
|
| |
|
| |
|
| |
|
| |
|
|\ |
|
| | |
|
| |
| |
| |
| |
| | |
This allows to remove some error code substitutes.
Fixed a typo in gpg.text.
|
|/ |
|
|\ |
|
| |
| |
| |
| |
| |
| | |
Returning -1 as an error code is not very clean given that gpg error
has more descriptive error codes. Thus we now return
GPG_ERR_NOT_FOUND for all search operations and adjusted all callers.
|
| | |
|
| | |
|
|/ |
|
| |
|
|
|
|
|
|
|
|
| |
The protection used in the exported key used a different iteration
count than given in the S2K field. Thus all OpenPGP keys exported
from GnuPG 2.1-beta can't be imported again. Given that the actual
secret key material is kept in private-keys-v1.d/ the can be
re-exported with this fixed version.
|
|
|
|
|
|
| |
Since 2009-12-08 gpg was not able to find email addresses indicated
by a leading '<'. This happened when I merged the user id
classification code of gpgsm and gpg.
|
|
|
|
|
| |
This option may be used to change the default ttl values use with the
--preset option of GENKEY and PASSWD.
|
|
|
|
|
| |
* keylist.c (list_keyblock_colon): Use get_ownertrust_info, not
get_ownertrust (which lead to binary zeroes in the output!).
|
|
|
|
|
|
|
|
| |
2011-04-20 Marcus Brinkmann <mb@g10code.com>
* command.c (cmd_import_key): Release key from failed import
before converting openpgp private key in the openpgp-private-key
case.
|
|
|
|
| |
Check for an error before presetting the passphrase.
|
|
|
|
|
| |
The previous patch required that the keygrip be cached before adding the
new passphrase to the cache. No more.
|
| |
|
| |
|
| |
|
|
|
|
| |
the second field which shows the location of the key.
|
|
|
|
|
|
|
|
|
|
|
| |
To better cope with round robin pooled A records like keys.gnupg.net
we need to keep some information on unresponsive hosts etc. What we
do now is to resolve the hostnames, remember them and select a random
one. If a host is dead it will be marked and a different one
selected. This is intended to solve the problem of long timeouts due
to unresponsive hosts.
The code is not yet finished but selection works.
|
|
|
|
|
|
|
|
|
|
|
| |
This helps in the case of an unknown key algorithm with a corrupted
packet which claims a longer packet length. This used to allocate the
announced packet length and then tried to fill it up without detecting
an EOF, thus taking quite some time. IT is easy to fix, thus we do
it. However, there are many other ways to force gpg to use large
amount of resources; thus as before it is strongly suggested that the
sysadm uses ulimit do assign suitable resource limits to the gpg
process. Suggested by Timo Schulz.
|
|
|
|
|
|
| |
Factoring common code out is always a Good Thing. Also added a
configure test to print an error if gcry_kdf_derive is missing in
Libgcrypt.
|
|
|
|
|
|
|
| |
This is so that we read compatible with gnutls's certtool. Only
AES-128 is supported. The latest Libgcrypt from git is required.
Fixes bug#1321.
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
Without Libgcrypt 1.5 is was not possible to use ECC keys. ECC is
major new feature and thus it does not make sense to allow building
with an older Libgcrypt without supporting ECC.
Also fixed a few missing prototypes.
|
|
|
|
| |
passphrase will be truncated to the first encountered null byte.
|
|
|
|
|
| |
This provides the framework and implements the ask, cancel and error.
loopback will be implemented later.
|
| |
|
|
|
|
|
|
|
| |
* keyid.c (hash_public_key): Remove shadowing NBITS.
* misc.c (pubkey_nbits): Replace GCRY_PK_ by PUBKEY_ALGO_.
(get_signature_count): Remove warning.
|
| |
|
| |
|