#
45a5153a |
| 26-Aug-2022 |
jhigh <jhigh@NetBSD.org> |
adding initial support for ECDSA (19) to netpgp. tested using p256/sha256, p384/sha384, and p521/sha512
|
#
776ba7f8 |
| 14-Oct-2020 |
jhigh <jhigh@NetBSD.org> |
allow netpgp to absorb gpg2 subpkt 33 for list/enc/decrypt rsa keys
|
#
22ddb355 |
| 13-Nov-2018 |
mlelstv <mlelstv@NetBSD.org> |
Fix some error handling, json support, keyring handling.
|
#
3dae3613 |
| 05-Mar-2012 |
christos <christos@NetBSD.org> |
Fix compilation: kill PGP_ERROR() and make everything use a format. XXX: Fixme to use __VA_ARGS__ instead of the silly PGP_ERROR_N() macros.
|
#
6b3f1171 |
| 15-Nov-2010 |
agc <agc@NetBSD.org> |
There were still some throwbacks with the prefix '_ops' - rectify that to be the standard "pgp_" - no functional change.
|
#
e2c60ad1 |
| 15-Nov-2010 |
agc <agc@NetBSD.org> |
Don't prefix function names with "pgp_" if the functions are static.
|
#
05e6b0bb |
| 15-Nov-2010 |
agc <agc@NetBSD.org> |
Changes to help with netpgp key generation and interoperability:
+ use plain SHA1 for session key s2k negotiation + don't warn on some conditions when inflating (reading a compressed file) since t
Changes to help with netpgp key generation and interoperability:
+ use plain SHA1 for session key s2k negotiation + don't warn on some conditions when inflating (reading a compressed file) since the conditions don't hold for partial block lengths + prompt for a passphrase when generating a new key - used in the upcoming secret-sharing functionality for netpgp
show more ...
|
#
98c5ed6b |
| 11-Nov-2010 |
agc <agc@NetBSD.org> |
make this compile on amd64: clean up a debug statement, pointed out by jak
|
#
b0df0a22 |
| 11-Nov-2010 |
agc <agc@NetBSD.org> |
Changes to 3.99.15/20101110
+ add support for partial blocks, defined in rfc 4880, and used fairly extensively by gnupg where the input size may not be known in advance (e.g. for encrypted compresse
Changes to 3.99.15/20101110
+ add support for partial blocks, defined in rfc 4880, and used fairly extensively by gnupg where the input size may not be known in advance (e.g. for encrypted compressed data, as produced by default by gpg -e)
show more ...
|
#
fc1f8641 |
| 07-Nov-2010 |
agc <agc@NetBSD.org> |
Take the internal functions and definitions back out of the implementation namespace:
:g/\<__ops/s//pgp/g :g/\<__OPS/s//__PGP/g :g/\<OPS/s//PGP/g
No functional change, regression tests complete
Take the internal functions and definitions back out of the implementation namespace:
:g/\<__ops/s//pgp/g :g/\<__OPS/s//__PGP/g :g/\<OPS/s//PGP/g
No functional change, regression tests complete successfully.
show more ...
|
#
c2430ca2 |
| 07-Nov-2010 |
agc <agc@NetBSD.org> |
Add Elgamal decryption to netpgp. Inspired by (BSD-licensed) the Elgamal decryption code from Postgresql by Marko Kreen.
% cp config.h f % netpgp -e f netpgp: default key set to "d4a643c5" % netpgp
Add Elgamal decryption to netpgp. Inspired by (BSD-licensed) the Elgamal decryption code from Postgresql by Marko Kreen.
% cp config.h f % netpgp -e f netpgp: default key set to "d4a643c5" % netpgp -d < f.gpg > f.netpgp netpgp: default key set to "d4a643c5" signature 1024/DSA 8222c3ecd4a643c5 2010-05-19 [EXPIRES 2013-05-18] Key fingerprint: 3e4a 5df4 033b 2333 219b 1afd 8222 c3ec d4a6 43c5 uid Alistair Crooks (DSA TEST KEY - DO NOT USE) <agc@netbsd.org> encryption 2048/Elgamal (Encrypt-Only) a97a7db6d727bc1e 2010-05-19 [EXPIRES 2013-05-18] netpgp passphrase: % ls -al f* -rw-r--r-- 1 agc agc 5730 Nov 6 23:53 f -rw------- 1 agc agc 1727 Nov 6 23:53 f.gpg -rw-r--r-- 1 agc agc 5730 Nov 6 23:54 f.netpgp % diff f f.netpgp %
This makes DSA keys into first class citizens, since encryption and decryption using DSA/Elgamal is now supported.
show more ...
|
#
f7745f84 |
| 04-Nov-2010 |
agc <agc@NetBSD.org> |
allow user-specification of cipher to be used when encrypting packets.
preserve the CAST5 default for now.
at the user level, this is specified using the --cipher=<ciphername> option.
|
#
73f34b00 |
| 08-Sep-2010 |
agc <agc@NetBSD.org> |
Changes to 3.99.12/20100907
+ add a pretty print function mj_pretty(3) to libmj + added netpgp_write_sshkey(3) to libnetpgp + added pgp2ssh(1) + added preliminary support for ElGamal decryption, nee
Changes to 3.99.12/20100907
+ add a pretty print function mj_pretty(3) to libmj + added netpgp_write_sshkey(3) to libnetpgp + added pgp2ssh(1) + added preliminary support for ElGamal decryption, needed for DSA keys as yet untested, unworking, and a WIP + add support for using all ssh keys, even those protected by a passphrase, for decryption and signing. This rounds off ssh key file support in netpgp. + add a single character alias [-S file] for [--sshkeyfile file] to netpgpkeys(1) and netpgp(1)
As far as ssh key file support goes, see the following example:
% cp configure a % netpgp -S ~/.ssh/id_rsa.pub -e a % netpgp -S ~/.ssh/id_rsa.pub -d a.gpg Enter PEM pass phrase: % ls -al a a.gpg -rwxr-xr-x 1 agc agc 758398 Sep 7 05:38 a -rw------- 1 agc agc 156886 Sep 7 05:38 a.gpg %
show more ...
|
#
593d671c |
| 15-Aug-2010 |
agc <agc@NetBSD.org> |
get rid of more 64-bit lint
|
#
3f685a78 |
| 15-Aug-2010 |
agc <agc@NetBSD.org> |
fix some more amd64 lint
|
#
9b987001 |
| 13-Aug-2010 |
agc <agc@NetBSD.org> |
Changes to 3.99.9/20100809
+ add single character options to netpgp(1) and netpgpkeys(1) + add -o long-option(=value)? options to netpgp(1) and netpgpkeys(1) + add some small preparations for using
Changes to 3.99.9/20100809
+ add single character options to netpgp(1) and netpgpkeys(1) + add -o long-option(=value)? options to netpgp(1) and netpgpkeys(1) + add some small preparations for using the first subkey for encryption (much more to follow)
show more ...
|
#
520c968f |
| 09-Jul-2010 |
agc <agc@NetBSD.org> |
Changes to 3.99.7/20100701
+ recognise ascii-armoured encrypted messages properly, in memory and in files + print error message and exit for now when trying to encrypt with a DSA key + fix bug rep
Changes to 3.99.7/20100701
+ recognise ascii-armoured encrypted messages properly, in memory and in files + print error message and exit for now when trying to encrypt with a DSA key + fix bug reported by dyoung when trying to print out the encryption key fingerprint
show more ...
|
#
47561e26 |
| 25-Jun-2010 |
agc <agc@NetBSD.org> |
Changes to 3.99.5
+ make ssh fingerprints (md5) match netpgp listing + use the more functional hexdump function from ssh2pgp in place of the older hexdump function from openpgpsdk + pass hash type
Changes to 3.99.5
+ make ssh fingerprints (md5) match netpgp listing + use the more functional hexdump function from ssh2pgp in place of the older hexdump function from openpgpsdk + pass hash type down from command line where needed + add test for netpgp/ssh key fingerprint matching + make netpgpkeys(1) take a --hash= option
With these changes, netpgp can be made to generate the same fingerprint as openssh (by default, ssh-keygen(1) uses an md5 digest)
% /usr/bin/netpgpkeys --ssh-keys --sshkeyfile=/etc/ssh/ssh_host_rsa_key.pub --list-keys --hash=md5 1 key pub 1024/RSA (Encrypt or Sign) fcdd1c608bef4c4b 2008-08-11 Key fingerprint: e935 902d ebf1 76ba fcdd 1c60 8bef 4c4b uid osx-vm1.crowthorne.alistaircrooks.co.uk (/etc/ssh/ssh_host_rsa_key.pub) <root@osx-vm1.crowthorne.alistaircrooks.co.uk>
% ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key.pub 1024 e9:35:90:2d:eb:f1:76:ba:fc:dd:1c:60:8b:ef:4c:4b /etc/ssh/ssh_host_rsa_key.pub (RSA) %
show more ...
|
#
9fc2904a |
| 01-Jun-2010 |
agc <agc@NetBSD.org> |
when cleaning up, don't try to free the public key which is part of the secret key - shown up by Mac OS X malloc.
|
#
d427c17d |
| 25-May-2010 |
agc <agc@NetBSD.org> |
Simplify and shorten the internals of packet processing by getting rid of the intermediate pseudo-abstraction layer, which detracted from understanding and had no benefit whatsoever. Rename some enum
Simplify and shorten the internals of packet processing by getting rid of the intermediate pseudo-abstraction layer, which detracted from understanding and had no benefit whatsoever. Rename some enums and some definitions.
show more ...
|
#
313fa53d |
| 08-May-2010 |
agc <agc@NetBSD.org> |
use the correct filed type for a size_t
|
#
a6115c8c |
| 08-May-2010 |
agc <agc@NetBSD.org> |
more uses of hexdump() rather than open-coded equivalents
|
#
651dd288 |
| 08-May-2010 |
agc <agc@NetBSD.org> |
use hexdump() where possible.
get rid of all traces of dmalloc - it's not used anymore. we can now g/c initialisation functions which do not do anything.
also get rid of the pkeyid() functions, whi
use hexdump() where possible.
get rid of all traces of dmalloc - it's not used anymore. we can now g/c initialisation functions which do not do anything.
also get rid of the pkeyid() functions, which just prints a hexadecimal string
show more ...
|
#
c973dd49 |
| 08-Mar-2010 |
agc <agc@NetBSD.org> |
Changes to 1.99.22/20100307 + add key expiry information to public key information display
|
#
b15ec256 |
| 05-Mar-2010 |
agc <agc@NetBSD.org> |
Update netpgp to version 1.99.20/20100304 - portability improvements, and bug fixes:
Changes to 1.99.20/20100304
+ move args to some functions around to be consistent + use uint*_t where appropr
Update netpgp to version 1.99.20/20100304 - portability improvements, and bug fixes:
Changes to 1.99.20/20100304
+ move args to some functions around to be consistent + use uint*_t where appropriate + fix bug in verify memory + add documentation to manual pages to show how to do combined signing/encryption and decryption/verification + make verification of ascii-armoured memory work the same as binary + eliminate use of strdup(3), strcasecmp(3), and strptime(3). NetBSD/pkgsrc PR 42922 applies - need to define _XOPEN_SOURCE and _BSD_SOURCE for newer linux platforms with glibc 2.10.1. solved a bit differently, by implementing strdup(3) and strcasecmp(3) independently, and using regexps to avoid calling strptime(3).
show more ...
|