- 11 Sep, 2020 1 commit
-
-
Sascha Wilde authored
A dedicated package is needed as gpgme-json is a binary executable and therefor breaks the multi-arch same policy for the library package.
-
- 09 Sep, 2020 1 commit
-
-
Sascha Wilde authored
-
- 10 Aug, 2020 7 commits
-
-
Daniel Kahn Gillmor authored
-
Daniel Kahn Gillmor authored
-
Daniel Kahn Gillmor authored
-
Daniel Kahn Gillmor authored
-
Daniel Kahn Gillmor authored
Update to upstream version '1.14.0' with Debian dir 98f222d4e4f3bdf24e0563f72f0e7a214ef471eb
-
Daniel Kahn Gillmor authored
-
Daniel Kahn Gillmor authored
-
- 16 Jul, 2020 4 commits
-
-
Werner Koch authored
* configure.ac: Bump LT versions to c=C34/A23/R0 cpp=C17/A11/R0 qt=C11/A4/R0. -- GnuPG-bug-id: 4996
-
Andre Heinecke authored
* lang/cpp/context.cpp, lang/cpp/context.h (Context::startPublicKeyExport, Context::exportPublicKeys): Extend with flags paramenter. (Context::ExportMode): New. * lang/qt/src/exportjob.h (ExportJob::setExportMode): New. * lang/qt/src/qgpgmeexportjob.cpp, lang/qt/src/qgpgmeexportjob.h: Update accordingly. -- This adds the C++ and Qt API for export modes.
-
Werner Koch authored
* src/export.c (export_start): Allow that mode. -- The test tools uses gpgme_op-export_ext and thus did not caught it. Signed-off-by:Werner Koch <wk@gnupg.org>
-
Werner Koch authored
* src/gpgme.h.in (GPGME_EXPORT_MODE_SSH): New. * src/export.c (export_ext_start): Allow for new mode. * src/engine-gpg.c (export_common): Implement. * tests/run-export.c (status_cb): New. (main): New options --status and --ssh. -- GnuPG-bug-id: 4310 Signed-off-by:Werner Koch <wk@gnupg.org>
-
- 15 Jul, 2020 2 commits
-
-
Werner Koch authored
* src/gpgme.h.in: Clarify that the trustlist function should not be used. * src/engine.c (_gpgme_engine_op_trustlist): Always return an error. * src/engine-backend.h (struct engine_ops): Remove trustlist member. * src/engine-gpg.c (gpg_trustlist): Remove. (struct engine_ops): Remove that member. Also in all other engines. * tests/gpg/t-trustlist.c: Remove. * lang/python/tests/t-trustlist.py: Remove. -- This never worked in reality because the required feature has been removed from GnuPG version 1.3.2 soon after introduction of this feature in gpgme - 17 years ago. It was anyway marked as experimental. We keep the API and ABI, though. GnuPG-bug-id: 4834 Signed-off-by:Werner Koch <wk@gnupg.org>
-
Werner Koch authored
* src/gpgme.h.in (GPGME_KEYLIST_MODE_WITH_KEYGRIP): New. * src/gpgme-json.c (op_keylist): New flag "keygrip". * src/engine-gpg.c (gpg_keylist_build_options): Pass the options. * lang/cpp/src/global.h (WithKeygrip): New. * lang/cpp/src/context.cpp: Add check. * lang/cpp/src/key.cpp (Key::update): Handle WithKeygrip. * lang/cpp/src/verificationresult.cpp: Ditto. * lang/cpp/src/util.h (add_to_gpgme_keylist_mode_t): Ditto. -- GnuPG-bug-id: 4939 Signed-off-by:Werner Koch <wk@gnupg.org>
-
- 14 Jul, 2020 1 commit
-
-
Werner Koch authored
* lang/python/tests/support.py (is_gpg_version): New. * lang/python/tests/t-encrypt-sym.py: Add workaround. -- GnuPG-bug-id: 4991 Signed-off-by:Werner Koch <wk@gnupg.org>
-
- 01 Jul, 2020 2 commits
-
-
Daniel Kahn Gillmor authored
-
-
- 24 Jun, 2020 4 commits
-
-
Daniel Kahn Gillmor authored
-
Daniel Kahn Gillmor authored
-
Daniel Kahn Gillmor authored
-
Daniel Kahn Gillmor authored
This is not a real fix to the underlying problem: it just gives GPGME upstream a window of time to deal with 75-year expiration dates. If and signature or certification is created with a 75-year expiration date in 2031, that signature will not be parsed correctly by GPGME on these platforms. Hopefully upstream can fix this before 2031, but they seem resistant to fixing it upstream. Perhaps by 2031 they will have changed their opinion and resolved the issue, or nothing will depend on this software any more.
-
- 09 Jun, 2020 1 commit
-
-
Andre Heinecke authored
* doc/gpgme.texi (gpgme_verify_result_t): Explain GPGME_STATUS_NO_ERROR more clearly. -- This might help to avoid misunderstandings how the status can be interpreted and explains why a verify of unsigned PGP Data returns no error. As a reaction to CVE-2020-10759 discovered by Justin Steven.
-
- 05 Jun, 2020 1 commit
-
-
Werner Koch authored
* src/verify.c (parse_trust): Fix detection of "chain" keyword. -- Fixes-commit: da6f3dc0 from 2007 shortly after introducing this. I doubt that this info has ever been used (it is for qualified signatures, which are only supported using the legacy German RegTP rules for them which were soon overturned by the commercial CAs). Signed-off-by:
Werner Koch <wk@gnupg.org>
-
- 11 May, 2020 1 commit
-
-
NIIBE Yutaka authored
* lang/qt/tests/t-config.cpp (testKeyserver): Remove. * tests/gpg/t-gpgconf.c (main): Test with dirmngr.keyserver. Signed-off-by:
NIIBE Yutaka <gniibe@fsij.org>
-
- 08 May, 2020 4 commits
-
-
Andre Heinecke authored
* src/Makefile.am (gpgme_w32_extra_libs): New. (libgpgme_la_LIBADD, libgpgme_glib_la_LIBADD): Use it. -- Since w32-io.c directly uses functions from ws2_32 it should not rely on libgpg-error to pull in this dependency.
-
dupgit authored
* doc/gpgme.texi: Fixes version number from 1.8.0 to 1.9.0 for GPGME_CREATE_NOEXPIRE. GnuPG-Bug-Id: T4922 Signed-off-by:dupgit <olivier.delhomme@free.fr>
-
Werner Koch authored
* src/engine-gpg.c (gpg_keylist_build_options): Send --with-keygrip if --with-secret is used. -- Since GnuPG 2.2.19 the keygrip was not anymore send if only --with-secret was used in a public key listing. Given that --with-secret requires computation of the keygrip anyway, there is no point in not requesting the keyrip in this case. GnuPG-bug-id: 4820
-
Andre Heinecke authored
* tests/json/t-keylist-secret.out.json: Do not check for keygrip of bravo key. -- Since GnuPG 2.2.19 the keygrip is not emitted for public keys in a keylisting --with-secret. As the GPGME test suite should pass with several versions the json test cannot test this as the suite does not allow version checks for different output. What the intended behavior is might still be up for discussion, always adding --with-keygip is not a good solution because it slows down keylistings for large keyrings. GnuPG-Bug-Id: T4820
-
- 27 Mar, 2020 2 commits
-
-
NIIBE Yutaka authored
* tests/gpgsm/t-genkey.c (check_result): New. Signed-off-by:
NIIBE Yutaka <gniibe@fsij.org> -
NIIBE Yutaka authored
* src/Makefile.am (gpgme_tool_LDADD): Add @GPG_ERROR_LIBS@. -- Since gpgme-tool uses gpg_strerror, it should be linked to -lgpg-error. Signed-off-by:
NIIBE Yutaka <gniibe@fsij.org>
-
- 17 Mar, 2020 1 commit
-
-
Werner Koch authored
* src/gpgme.c (gpgme_set_ctx_flag): Add flags "include-key-block" and "auto-key-import". (gpgme_get_ctx_flag): Ditto. * src/context.h (struct gpgme_context): Add flags include_key_block and auto_key_import. * src/engine-gpg.c (struct engine_gpg): Likewise. (gpg_set_engine_flags): Set the flags for gpg versions >= 2.2.20. (gpg_decrypt): Set option according to the new flags. (gpg_encrypt): Ditto. (gpg_encrypt_sign): Ditto. (gpg_sign): Ditto. (gpg_verify): Ditto. tests/run-verify: Add option --auto-key-import. tests/run-sign: add option --include-key-block. -- GnuPG-bug-id: 4856 Signed-off-by:Werner Koch <wk@gnupg.org>
-
- 09 Mar, 2020 3 commits
-
-
Daniel Kahn Gillmor authored
-
Daniel Kahn Gillmor authored
(Thanks, Multiarch hinter!)
-
Signed-off-by:
Daniel Kahn Gillmor <dkg@fifthhorseman.net>
-
- 03 Mar, 2020 1 commit
-
-
Bernhard Reiter authored
-
- 19 Feb, 2020 2 commits
-
-
Andre Heinecke authored
* lang/qt/src/*: Change logging category to macro to QGPGME_LOG. -- The old logging category macro had a typo and this way we are more consistent with other logging rules. For example you could write gpg.* in the logging conf.
-
Andre Heinecke authored
* lang/qt/src/qgpgmegpgcardjob.cpp (do_work): Log call.
-
- 14 Feb, 2020 1 commit
-
-
Werner Koch authored
-- Signed-off-by:Werner Koch <wk@gnupg.org>
-
- 12 Feb, 2020 1 commit
-
-
Andre Heinecke authored
* lang/qt/qgpgmegpgcardjob.cpp (QGpgMEGpgCardJob): Add context. -- Otherwise it fails with an assert.
-