1. 02 Sep, 2022 2 commits
  2. 01 Sep, 2022 4 commits
  3. 31 Aug, 2022 7 commits
  4. 30 Aug, 2022 1 commit
    • Werner Koch's avatar
      gpg: Make --require-compliance work for -se · f88cb12f
      Werner Koch authored
      * g10/encrypt.c (encrypt_crypt, encrypt_filter): Factor common code
      out to ...
      (create_dek_with_warnings): new
      (check_encryption_compliance): and new.
      
      * g10/encrypt.c (encrypt_filter): Add the compliance check.
      --
      
      GnuPG-bug-id: 6174
      f88cb12f
  5. 29 Aug, 2022 3 commits
  6. 24 Aug, 2022 2 commits
  7. 19 Aug, 2022 1 commit
    • Werner Koch's avatar
      gpgsm: New option --compatibility-flags. · 77b6896f
      Werner Koch authored
      * sm/gpgsm.c (oCompatibilityFlags): New option.
      (compatibility_flags): new.
      (main): Parse and print them in verbose mode.
      * sm/gpgsm.h (opt): Add field compat_glags.:
      (COMPAT_ALLOW_KA_TO_ENCR): New.
      * sm/keylist.c (print_capabilities): Take care of the new flag.
      * sm/certlist.c (cert_usage_p): Ditto.
      
      * common/miscellaneous.c (parse_compatibility_flags): New.
      * common/util.h (struct compatibility_flags_s): New.
      --
      
      Backported-from-master: f0b373cec93bb01f02b9c0a3ab1f3e242b381c3f
      Backported-from-master: ce63eaa4f8f3f41aafcaddd8d658dacd522334a8
      77b6896f
  8. 17 Aug, 2022 1 commit
  9. 16 Aug, 2022 8 commits
  10. 15 Aug, 2022 2 commits
    • Werner Koch's avatar
      agent: Create and use Token entries to track the display s/n. · dc9b2426
      Werner Koch authored
      * agent/divert-scd.c (linefeed_to_percent0A): New.
      (ask_for_card): Add arg grip.  Read Token and Label items and use
      them.
      (divert_pksign, divert_pkdecrypt): Pass down grip.
      * agent/findkey.c (write_extended_private_key): Add args serialno,
      keyref, and dispserialno.  Writen Token item.
      (agent_write_private_key): Add args serialno, keyref, and
      dispserialno.
      (read_key_file): Add arg r_keymeta.
      (agent_keymeta_from_file): New.
      (agent_write_shadow_key): Remove leading spaces from serialno and keyid.
      * agent/protect-tool.c (agent_write_private_key): Ditto.
      * agent/learncard.c (agent_handle_learn): Get DISPSERIALNO and pass to
      agent_write_shadow_key.
      * agent/command-ssh.c (card_key_available): Ditto.
      --
      
      GnuPG-bug-id: 6135
      
      This patch backports some changes from master but also adds the
      Display-S/N tracking.
      dc9b2426
    • Werner Koch's avatar
      common: New function nve_set. · 706adf66
      Werner Koch authored
      * common/name-value.c (nve_set): New.
      (nvc_set): Use nve_set.
      (nvc_delete_named): New.
      (nvc_get_string): New.
      (nvc_get_boolean): New.
      --
      
      This function is required to allow updating a specific line.  The
      other new functions are backported from master
      706adf66
  11. 04 Aug, 2022 1 commit
  12. 03 Aug, 2022 3 commits
  13. 02 Aug, 2022 2 commits
    • Werner Koch's avatar
      gpg: Make symmetric + pubkey encryption de-vs compliant. · e8011a7c
      Werner Koch authored
      * g10/mainproc.c (proc_encrypted): Make symmetric + pubkey encryption
      de-vs compliant.
      
      * g10/mainproc.c (struct symlist_item): New.
      (struct mainproc_context): Add field symenc_list.
      (release_list): Free that list.
      (proc_symkey_enc): Record infos from symmetric session packet.
      (proc_encrypted): Check symkey packet algos
      --
      
      The original check was too strong because it is in fact compliant to
      encrypt with a symmetric key and and public key.  Thus decryption
      should issue a compliance status.
      
      In addition we now check that the cipher algorithms used to
      symmetrically encrypt the session key are all compliant.  This is
      similar to our check for all public key encrypted session key packets.
      
      GnuPG-bug-id: 6119
      Fixes-commit: b03fab09
      e8011a7c
    • Werner Koch's avatar
      gpgconf: Improve registry dumping. · 6bc95923
      Werner Koch authored
      * common/w32-reg.c (read_w32_registry_string): Map REG_DWORD to a
      string.
      (read_w32_reg_string): Add arg r_hklm_fallback and change all callers.
      (show_configs): Indicate whether the HKLM fallback was used.
      * tools/gpgconf.c (show_other_registry_entries): Fix the Outlook Addin
      Registry key.  Indicate whether the HKLM fallback was used.
      6bc95923
  14. 28 Jul, 2022 1 commit
  15. 27 Jul, 2022 2 commits
    • Werner Koch's avatar
      agent: New option --no-user-trustlist and --sys-trustlist-name. · d0bd91ba
      Werner Koch authored
      * agent/gpg-agent.c (oNoUserTrustlist,oSysTrustlistName): New.
      (opts): Add new option names.
      (parse_rereadable_options): Parse options.
      (finalize_rereadable_options): Reset allow-mark-trusted for the new
      option.
      * agent/agent.h (opt): Add fields no_user_trustlist and
      sys_trustlist_name.
      * agent/trustlist.c (make_sys_trustlist_name): New.
      (read_one_trustfile): Use here.
      (read_trustfiles): Use here.  Implement --no-user-trustlist.  Also
      repalce "allow_include" by "systrust" and adjust callers.
      --
      
      With the global options we can now avoid that a user changes the
      Root-CA trust by editing the trustlist.txt.  However, to implement
      this we need a new option so that we don't need to rely on some magic
      like --no-allow-mark-trusted has been put into a force section.
      
      The second option makes system administration easier as it allows to
      keep the trustlist in a non-distributed file.
      
      GnuPG-bug-id: 5990
      Backported-from-master: 1530d04725d475bf29328eab40b42f72ff8aa06b
      d0bd91ba
    • Ingo Klöcker's avatar
      gpg: Look up user ID to revoke by UID hash · abe69b20
      Ingo Klöcker authored
      * g10/keyedit.c (find_userid_by_namehash, find_userid): New.
      (keyedit_quick_revuid): Use find_userid() instead of iterating over the
      nodes of the keyblock.
      * tests/openpgp/quick-key-manipulation.scm: Add test for revoking a
      user ID specified by its hash.
      --
      
      This makes it possible to specify the user ID to revoke as UID hash when
      calling --quick-revoke-uid.
      
      GnuPG-bug-id: 5936
      (cherry picked from commit 35b17550706c8b7479ae96654feb97c05263cfc9)
      abe69b20