- 06 Sep, 2022 3 commits
-
-
Daniel Kahn Gillmor authored
-
Daniel Kahn Gillmor authored
-
Daniel Kahn Gillmor authored
-
- 05 Sep, 2022 3 commits
-
-
Daniel Kahn Gillmor authored
Update to upstream version '2.2.39' with Debian dir e7cc35b4d87177327a3e208be9bf9430ca4eaefd
-
Daniel Kahn Gillmor authored
-
Daniel Kahn Gillmor authored
-
- 02 Sep, 2022 2 commits
-
-
Werner Koch authored
-
Werner Koch authored
--
-
- 01 Sep, 2022 8 commits
-
-
Daniel Kahn Gillmor authored
-
Daniel Kahn Gillmor authored
-
Daniel Kahn Gillmor authored
Update to upstream version '2.2.38' with Debian dir 944057b3fff6ebd67d333570e12c9f60e0605693
-
Daniel Kahn Gillmor authored
-
Werner Koch authored
* common/name-value.c (nvc_first): Allow for NULL arg. (nvc_lookup): Allow for PK being NULL. -- GnuPG-bug-id: 6176
-
Werner Koch authored
--
-
Werner Koch authored
-
NIIBE Yutaka authored
-- Signed-off-by:
NIIBE Yutaka <gniibe@fsij.org>
-
- 31 Aug, 2022 7 commits
-
-
Werner Koch authored
* dirmngr/dirmngr.h (opt): Add debug_cache_expired_certs: * dirmngr/dirmngr.c (oDebugCacheExpiredCerts): New. (opts): Add option. (parse_rereadable_options): Set option. * dirmngr/certcache.c (put_cert): Handle the option.
-
Werner Koch authored
-- Actually we once had them but they got lost at some point. The German translation is also up-to-date now.
-
Werner Koch authored
* common/gettime.c (w32_strftime) [W32]: New function. (strftime) [W32]: New refinition macro. -- GnuPG-bug-id: 5073
-
Werner Koch authored
* g10/misc.c (compliance_failure): Do not fallback to CO_GNUPG. Print compliance failure error and status for CO_DE_VS. * g10/mainproc.c (proc_encrypted): Call compliance_failure in the require-compliance error case. * g10/encrypt.c (check_encryption_compliance): Ditto.
-
NIIBE Yutaka authored
* scd/ccid-driver.c (ccid_open_usb_reader): Name the thread. (ccid_vendor_specific_setup, ccid_open_usb_reader): Wrap blocking operations by npth_unprotect/npth_protect. -- Signed-off-by:
NIIBE Yutaka <gniibe@fsij.org> -
NIIBE Yutaka authored
* dirmngr/certcache.c (put_cert): When PERMANENT, reject the certificate which is obviously invalid. -- With this change, invalid certificates from system won't be registered into cache. Then, an intermediate certificate which is issued by an entity certified by such an invalid certificate will be also rejected with GPG_ERR_INV_CERT_OBJ. With less invalid certificates in cache, it helps the validate_cert_chain function work better. GnuPG-bug-id: 6142 Signed-off-by:
NIIBE Yutaka <gniibe@fsij.org> -
Werner Koch authored
* common/iobuf.c (iobuf_copy): Use log_assert. Explicitly cast error return value. * g10/build-packet.c (do_plaintext): Check for iobuf_copy error. * g10/encrypt.c (encrypt_filter): Immediately set header_okay. -- Fixes-commit: 8066f8a3 which caused the assertion failure on error. The second fix avoids repeated error message about non-compliant keys. GnuPG-bug-id: 6174
-
- 30 Aug, 2022 1 commit
-
-
Werner Koch authored
* g10/encrypt.c (encrypt_crypt, encrypt_filter): Factor common code out to ... (create_dek_with_warnings): new (check_encryption_compliance): and new. * g10/encrypt.c (encrypt_filter): Add the compliance check. -- GnuPG-bug-id: 6174
-
- 29 Aug, 2022 3 commits
-
-
Werner Koch authored
* g10/cipher.c (cipher_filter): Rename to cipher_file_cfb.
-
Werner Koch authored
* g10/decrypt-data.c (decrypt_data): Show also the aead algo with --show-session-key. Remove meanwhile superfluous NULL-ptr test.
-
Jussi Kivilinna authored
* g10/decrypt-data.c (decrypt_data): Disable estream buffering for output file. -- Here estream is filled with iobuf_copy which already uses large buffers so additional buffering in estream was just adding memory copy overhead. GnuPG-bug-id: T5828 Signed-off-by:Jussi Kivilinna <jussi.kivilinna@iki.fi>
-
- 24 Aug, 2022 2 commits
-
-
Werner Koch authored
--
-
Werner Koch authored
-
- 19 Aug, 2022 1 commit
-
-
Werner Koch authored
* sm/gpgsm.c (oCompatibilityFlags): New option. (compatibility_flags): new. (main): Parse and print them in verbose mode. * sm/gpgsm.h (opt): Add field compat_glags.: (COMPAT_ALLOW_KA_TO_ENCR): New. * sm/keylist.c (print_capabilities): Take care of the new flag. * sm/certlist.c (cert_usage_p): Ditto. * common/miscellaneous.c (parse_compatibility_flags): New. * common/util.h (struct compatibility_flags_s): New. -- Backported-from-master: f0b373cec93bb01f02b9c0a3ab1f3e242b381c3f Backported-from-master: ce63eaa4f8f3f41aafcaddd8d658dacd522334a8
-
- 17 Aug, 2022 1 commit
-
-
Werner Koch authored
* tools/gpgconf-comp.c: Add options. -- Fixes-commit: 7a3a1ef3 GnuPG-bug-id: 6138
-
- 16 Aug, 2022 8 commits
-
-
Werner Koch authored
* agent/findkey.c (agent_write_private_key): Fix condition. -- Fixes-commit: 755920d4
-
Werner Koch authored
--
-
Werner Koch authored
* g10/card-util.c (get_info_for_key_operation): Get the APPTYPE before testing for it. * g10/card-util.c (current_card_status): Always try to update the shadow keys. * g10/call-agent.c (agent_scd_getattr): Handle $AUTHKEYID. -- The first part fixed a regression introduced today. GnuPG-bug-id: 5100 The second part is usually not required because our ssh-agent code anyway looks for the OpenPGP.3 key. However, this helps to put the Display S/N into the shadow key so that we get a better prompt to insert the card.
-
Werner Koch authored
* agent/command.c (cmd_readkey): Also allow for $AUTHKEYID in card mode. * g10/call-agent.c (agent_update_shadow_keys): new. * g10/card-util.c (current_card_status): Call it.
-
Werner Koch authored
* agent/findkey.c (agent_write_private_key): Factor file name generation out to ... (fname_from_keygrip): new. (write_extended_private_key): Add and implement new arg MAYBE_UPDATE. (agent_write_shadow_key): Ditto. * agent/command.c (cmd_readkey): Update the shadow-key in card mode. -- GnuPG-bug-id 6135
-
Werner Koch authored
* g10/card-util.c (current_card_status): Use ascii_strcasecmp.
-
NIIBE Yutaka authored
* g10/card-util.c (get_info_for_key_operation): Use ->apptype to determine card's APP. (current_card_status): Even if its SERIALNO is not like OpenPGP card, it's OpenPGP card when app says so. -- GnuPG-bug-id: 5100 Signed-off-by:
NIIBE Yutaka <gniibe@fsij.org>
Backported-from-master: 157f1de6 -
Werner Koch authored
* common/name-value.c (nvc_write): Take care of Key. Factor some code out to ... (write_one_entry): new. -- The key item is in general not manual editable thus we put it at the end of a file. Signed-off-by:
Werner Koch <wk@gnupg.org> (cherry picked from commit c9fa28bf)
-
- 15 Aug, 2022 1 commit
-
-
Werner Koch authored
* agent/divert-scd.c (linefeed_to_percent0A): New. (ask_for_card): Add arg grip. Read Token and Label items and use them. (divert_pksign, divert_pkdecrypt): Pass down grip. * agent/findkey.c (write_extended_private_key): Add args serialno, keyref, and dispserialno. Writen Token item. (agent_write_private_key): Add args serialno, keyref, and dispserialno. (read_key_file): Add arg r_keymeta. (agent_keymeta_from_file): New. (agent_write_shadow_key): Remove leading spaces from serialno and keyid. * agent/protect-tool.c (agent_write_private_key): Ditto. * agent/learncard.c (agent_handle_learn): Get DISPSERIALNO and pass to agent_write_shadow_key. * agent/command-ssh.c (card_key_available): Ditto. -- GnuPG-bug-id: 6135 This patch backports some changes from master but also adds the Display-S/N tracking.
-