Parent Directory | Revision Log
|Links to HEAD:||(view) (download) (annotate)|
Whitespace cleanup: for i in *.c; do cp -a $i $i.orig; sed -e 's/^ /<TAB>/' $i.orig > $i; rm $i.orig; done for i in *.c *.h; do cp -a $i $i.orig; sed -e 's/[ <TAB>]*$//' $i.orig > $i; rm $i.orig; done
Only return latest pgp keys to remailer-key requests
Write keyid, creation date, etc header along with armored keys to pgpkey.txt
Make sure to always have the right one of begin private/public key
Reverse that - I'll do it differently
pass armortype to pgpdb_close - used when file needs to get armored
Added closing comments for all #ifdef statements. All #endif's, as well as nested braces, should be commented to reference their start. We need to provide comments before every function as well.
Update documentation on parameters for pgp_getkey()
Use yyyy-mm-dd instead of yyyy/mm/dd similar to GnuPG
pgp_get_sig_subpacket() is used only in pgpdata.c, so make it static
check expiration and revocation of pgp keys, userids, subkeys do not encrypt with expired or revoked keys, subkeys do not sign with expired or revoked keys do not decrypt with expired keys, subkeys after graceperiod when encrypting use preferences from latest and/or primary userid create new pgp keys if current are to expire in overlapperiod
Standardized commenting conventions.
Use sane RSA exponet
When creating new OpenPGP keys, also set an expiry date. Key lifetime defaults to 8 months but can be overriden by the KEYLIFETIME configuration option. We currently do not store the self signature and the keybinding (which hold the expiry information in DSA keys) in the secret keyring. This is unfortunate because we use the current KEYLIFETIME when recreating them should the public keyring need to be rewritten. The solution is to store them in the secret keyring (like GnuPG does) and not recreate them later if we already have them.
Fixed a bug with reading armored keyrings consisting of more than one armored block or having comments in front of the one armored block. The secret pgp keyring is now stored ASCII armored with one key per ascii armor. NB: Due to the bug with reading armored keyrings and secring being stored armored now, it is not adviseable to downgrade mixmaster unless special action is taked to preserve the secret pgp keyring.
Mixmaster now uses the OpenPGP MDC packets (as specified in RFC 2440-bis06). Mixmaster will use MDC packets if the MDC flag is found in the recipient's PGP key, or by default if it is encrypting with AES. New keys generated with Mixmaster will have the MDC flag placed in the key's preferences. Also, cipher preferences are now advertised as CAST5, AES128, 3DES.
Several PGP fixes by Disastry: No longer create mpi with leading zero <3D5BB519.F2E520F8@saiknes.lv> Handle RSA keys with size not a multiple of 64 bits <3D5BA9E5.72B7C600@saiknes.lv> put "Hash: SHA1\n" header when clearsigning with DSA/SHA1 <3D5B80F9.16F277AF@saiknes.lv>
Fix a small bug in pgpdata.c that stopped mixmaster from reading cipher preferences. <3D590B99.7481598B@saiknes.lv>
Submitted By: Sami Farin (safari): Included correct header files. Src/main.c had incorrect param to buf_appendf. Added buf_write_sync() (used by Src/rem.c:mix_pool()). Should a mixmaster machine crash, pool file can contain any random data after reboot/journal recovery (at least when using reiserfs). Maybe not relevant, but strrchr should be used instead of strchr when looking for domain part. Src/pgpdata.c:pgp_elgdecrypt() passes uninitialized values to BN_free if BN_CTX_new fails. Src/pgpdata.c:pgp_elgencrypt() passes uninitialized value to BN_free if the third mpi_get(key, i) fails. Src/random.c does not check return value of read(). Src/rndseed.c does not check return value of read().
Added support for AES in Type I messages. This should prevent lost mail if a user attempts to send OpenPGP messages encrypted with AES. Support for AES requires OpenSSL 0.9.7 (soon to be released.) The Install script needs to be updated to enable AES if 0.9.7 or later is present. Also, pgp_keylen now returns 0 instead of -1 for unknown symalgo. Output of pgp_keylen is used in buf_appendrnd and in other functions without checking, so they might be unhappy with -1. (We should really check for this.) Thanks to Disastry and Peter for working on this.
Fix use of global vars in function Disastry bug <3C970EAC.936504AB@saiknes.lv>
Call RSA_free at the end of pgp_rsakeygen()
Mixmaster was unable to use RSA private keys which were not multiples of 8 bytes. Mixmaster now resyncs before each mpi.
Avoid failed assertion on length 0 subpacket. (Apparently there still is a bug in the subpacket parsing code.)
Bug fix: use proper key id for ElGamal encryption.
This form allows you to request diffs between any two revisions of this file. For each of the two "sides" of the diff, enter a numeric revision.
|Powered by ViewVC 1.1.5|