[svn] GnuPG - r4624 - in trunk: . doc sm

svn author wk cvs at cvs.gnupg.org
Mon Nov 19 17:32:15 CET 2007


Author: wk
Date: 2007-11-19 17:32:05 +0100 (Mon, 19 Nov 2007)
New Revision: 4624

Modified:
   trunk/TODO
   trunk/doc/ChangeLog
   trunk/doc/DETAILS
   trunk/doc/gpgsm.texi
   trunk/sm/ChangeLog
   trunk/sm/certlist.c
   trunk/sm/server.c
Log:
Document --auto-issuer-key-retrieve.


Modified: trunk/TODO
===================================================================
--- trunk/TODO	2007-11-19 16:03:50 UTC (rev 4623)
+++ trunk/TODO	2007-11-19 16:32:05 UTC (rev 4624)
@@ -129,3 +129,12 @@
   This may happen and lead to an Ambiguous Name error.  Solution is to
   check the certs for identity before throwing this error.
 
+* Gpg-Agent Locale
+  Although we pass LC_MESSAGE from gpgsm et al. to Pinentry, this has
+  only an effect on the stock GTK strings (e.g. "OK") and not on any
+  strings gpg-agent generates and passes to Pinentry.  This defeats
+  our design goal to allow changing the locale without changing
+  gpg-agent's default locale (e.g. by the command updatestartuptty).
+
+
+

Modified: trunk/doc/ChangeLog
===================================================================
--- trunk/doc/ChangeLog	2007-11-19 16:03:50 UTC (rev 4623)
+++ trunk/doc/ChangeLog	2007-11-19 16:32:05 UTC (rev 4624)
@@ -1,3 +1,8 @@
+2007-11-19  Werner Koch  <wk at g10code.com>
+
+	* gpgsm.texi (Certificate Options): Document
+	--auto-issuer-key-retrieve.
+
 2007-11-15  Werner Koch  <wk at g10code.com>
 
 	* gpg.texi (GPG Configuration): Add PINENTRY_USER_DATA.

Modified: trunk/doc/DETAILS
===================================================================
--- trunk/doc/DETAILS	2007-11-19 16:03:50 UTC (rev 4623)
+++ trunk/doc/DETAILS	2007-11-19 16:32:05 UTC (rev 4624)
@@ -554,6 +554,7 @@
           8 := "Policy mismatch"
           9 := "Not a secret key"
 	 10 := "Key not trusted"
+         11 := "Missing certifciate"  (e.g. intermediate or root cert.)
 
         Note that this status is also used for gpgsm's SIGNER command
         where it relates to signer's of course.

Modified: trunk/doc/gpgsm.texi
===================================================================
--- trunk/doc/gpgsm.texi	2007-11-19 16:03:50 UTC (rev 4623)
+++ trunk/doc/gpgsm.texi	2007-11-19 16:32:05 UTC (rev 4624)
@@ -405,7 +405,7 @@
 @itemx --disable-ocsp
 @opindex enable-ocsp
 @opindex disable-ocsp
-Be default @acronym{OCSP} checks are disabled.  The enable opton may
+Be default @acronym{OCSP} checks are disabled.  The enable option may
 be used to enable OCSP checks via Dirmngr.  If @acronym{CRL} checks
 are also enabled, CRLs will be used as a fallback if for some reason an
 OCSP request won't succeed.  Note, that you have to allow OCSP
@@ -413,7 +413,18 @@
 @option{--allow-ocsp} and configure dirmngr properly.  If you don't do
 so you will get the error code @samp{Not supported}.
 
+ at item --auto-issuer-key-retrieve
+ at opindex auto-issuer-key-retrieve
+If a required certificate is missing while validating the chain of
+certificates, try to load that certificate from an external location.
+This usually means that Dirmngr is employed t search for the
+certificate.  Note that this option makes a "web bug" like behavior
+possible.  LDAP server operators can see which keys you request, so by
+sending you a message signed by a brand new key (which you naturally
+will not have on your local keybox), the operator can tell both your IP
+address and the time when you verified the signature.
 
+
 @item --validation-model @var{name}
 @opindex validation-model
 This option changes the default validation model.  The only possible

Modified: trunk/sm/ChangeLog
===================================================================
--- trunk/sm/ChangeLog	2007-11-19 16:03:50 UTC (rev 4623)
+++ trunk/sm/ChangeLog	2007-11-19 16:32:05 UTC (rev 4624)
@@ -1,5 +1,7 @@
 2007-11-19  Werner Koch  <wk at g10code.com>
 
+	* server.c (cmd_recipient, cmd_signer): Add error reason 11.
+
 	* gpgsm.c (main): Print a warning if --audit-log is used.
 
 2007-11-15  Werner Koch  <wk at g10code.com>

Modified: trunk/sm/certlist.c
===================================================================
--- trunk/sm/certlist.c	2007-11-19 16:03:50 UTC (rev 4623)
+++ trunk/sm/certlist.c	2007-11-19 16:32:05 UTC (rev 4624)
@@ -359,7 +359,7 @@
                 {
                   ksba_cert_t cert2 = NULL;
                   
-                  /* If this is the first possible duplicate, add thye orginal 
+                  /* If this is the first possible duplicate, add the original 
                      certificate to our list of duplicates.  */
                   if (!dup_certs)
                     gpgsm_add_cert_to_certlist (ctrl, cert, &dup_certs, 0);

Modified: trunk/sm/server.c
===================================================================
--- trunk/sm/server.c	2007-11-19 16:03:50 UTC (rev 4623)
+++ trunk/sm/server.c	2007-11-19 16:32:05 UTC (rev 4624)
@@ -380,6 +380,7 @@
                    r == GPG_ERR_NO_CRL_KNOWN?    "6":
                    r == GPG_ERR_CRL_TOO_OLD?     "7":
                    r == GPG_ERR_NO_POLICY_MATCH? "8":
+                   r == GPG_ERR_MISSING_CERT?   "11":
                    "0",
                    line, NULL);
     }
@@ -425,6 +426,7 @@
                    r == GPG_ERR_CRL_TOO_OLD?         "7":
                    r == GPG_ERR_NO_POLICY_MATCH?     "8":
                    r == GPG_ERR_NO_SECKEY?           "9":
+                   r == GPG_ERR_MISSING_CERT?       "11":
                    "0",
                   line, NULL);
     }




More information about the Gnupg-commits mailing list