about summary refs log tree commit diff stats
path: root/src/pgp
Commit message (Collapse)AuthorAgeFilesLines
* Cleanup p_ox_gpg_decryptJohn Hernandez2023-04-131-4/+6
| | | | | | In OX implementation gpgme's buffer remains untouched, thus not leading to the crash. But code can be shorter and more concise.
* Fix memory corruption crashJohn Hernandez2023-04-131-3/+2
| | | | | | | Under certain circumstances setting plain_str[len] to 0 might lead to crash and it does not follow the best practices as well. This change allows better handling of buffer copying and prevents crash.
* Adapt to g_string_free glib 2.75.3 changeMichael Vetter2023-03-211-18/+3
| | | | | | | | | | | | glib 2.75.3 changes warning behaviour of `g_string_free()`. See: * https://gitlab.gnome.org/GNOME/glib/-/merge_requests/3219 * https://gitlab.gnome.org/GNOME/glib/-/merge_requests/3226 Use this opportunity to replace the use of GString with `g_strdup_printf()` where possible. Otherwise correctly take the return value of `g_string_free()` which is nicer anyways.
* Update copyright yearMichael Vetter2023-01-103-3/+3
|
* Remove commentMichael Vetter2022-06-291-10/+0
|
* Move ox_gpg_public_keys descriptionMichael Vetter2022-06-292-7/+3
|
* Split ox functions from gpg.c to ox.cMichael Vetter2022-06-294-552/+649
|
* ox: fix mistakes in p_ox_gpg_decrypt()Michael Vetter2022-05-041-1/+3
| | | | | | | strcpy() can't work here because the data doesn't have to be NULL-terminated. So let's use memcpy. Fix memleak of plain_str.
* ox: print more error messages to UIMichael Vetter2022-05-031-2/+6
|
* ox: dont require marginal trust levelMichael Vetter2022-05-031-0/+5
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Maybe we can make this configurable later. So users have the freedom to be more strict. This commit partly reverts 62018f48c5f1a0410445fce5bca5fdd6a9e4d907. Example to edit trust level: ``` gpg --edit-key somekeyid gpg (GnuPG) 2.3.4; Copyright (C) 2021 Free Software Foundation, Inc. This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. pub rsa4096/keyid created: 2020-06-26 expires: 2022-06-26 usage: SC trust: unknown validity: full sub rsa4096/keyid created: 2020-06-26 expires: 2022-06-26 usage: E [ full ] (1). xmpp:user@domain.de gpg> trust pub rsa4096/keyid created: 2020-06-26 expires: 2022-06-26 usage: SC trust: unknown validity: full sub rsa4096/keyid created: 2020-06-26 expires: 2022-06-26 usage: E [ full ] (1). xmpp:user@domain.de Please decide how far you trust this user to correctly verify other users' keys (by looking at passports, checking fingerprints from different sources, etc.) 1 = I don't know or won't say 2 = I do NOT trust 3 = I trust marginally 4 = I trust fully 5 = I trust ultimately m = back to the main menu Your decision? 3 pub rsa4096/keyid created: 2020-06-26 expires: 2022-06-26 usage: SC trust: marginal validity: full sub rsa4096/keyid created: 2020-06-26 expires: 2022-06-26 usage: E [ full ] (1). xmpp:user@domain.de Please note that the shown key validity is not necessarily correct unless you restart the program. gpg> quit ```
* ox_key_is_usable - Logging and owner trust checkStefan Kropp2022-05-031-0/+6
| | | | | | | * Added logging messages (INFO if key can not be used) * Check owner_trust < GPGME_VALIDITY_MARGINAL The key can not be used if the owner_trust is less than MARGINAL.
* Merge pull request #1644 from profanity-im/ox-polishMichael Vetter2022-03-211-37/+34
|\ | | | | Improve OX user experience
| * ox: adjust formattingMichael Vetter2022-02-241-4/+0
| |
| * ox: standardize log outputMichael Vetter2022-02-241-33/+34
| |
* | add `files_file_in_account_data_path()`Steffen Jaeckel2022-03-131-19/+5
|/ | | | | | | | | | | | As all parts of the code invoking the `files_get_account_data_path()` function did the same afterwards, a function has been added with the same behavior. 1. create path 2. `mkdir` of that path 3. return final path Signed-off-by: Steffen Jaeckel <jaeckel-floss@eyet-services.de>
* auto-formatSteffen Jaeckel2022-02-011-14/+14
| | | | Signed-off-by: Steffen Jaeckel <jaeckel-floss@eyet-services.de>
* Format code correctlyMichael Vetter2021-10-051-1/+1
|
* OX bug fixingDebXWoody2021-06-291-0/+5
| | | | | * Don't decryption if there is no private key * Decryption error messages
* Fix various typosMichael Vetter2020-12-101-3/+3
|
* Declare counter var inside loopMichael Vetter2020-11-091-4/+2
| | | | We require c99/gnu99 anyways.
* Since the string from strerror should never be modified, use const.Philipp Klaus Krause2020-10-141-1/+1
|
* OX: XEP-0373: OpenPGP for XMPP - Version 0.5.0 (2020-06-19)DebXWoody2020-07-102-0/+45
| | | | | | | | | | | Discovering Public Keys via PEP * 4.3 Discovering Public Keys of a User * 4.4 Requesting Public Keys * Import Public Keys into GnuPG's local keyring. Issue: #1331
* Apply coding styleMichael Vetter2020-07-072-318/+330
|
* Revert "Apply coding style"Michael Vetter2020-07-072-334/+322
| | | | | | This reverts commit 9b55f2dec0ea27a9ce4856e303425e12f866cea2. Sorting the includes creates some problems.
* Apply coding styleMichael Vetter2020-07-072-322/+334
| | | | Regards https://github.com/profanity-im/profanity/issues/1396
* OX: Announce public key on PEPDebXWoody2020-07-062-0/+105
| | | | | | | | | | | | | | | src/pgp/gpg.c:p_ox_gpg_readkey Used to read a public key from a file. The function will return the fingerprint of the file and the base64 encoded key. src/xmpp/ox.[hc] ox_announce_public_key(const char* const filename) can be called from the /ox announce <filename> command. The key within the file will be pushed on PEP and the Metadata node will be set. Issue: #1331
* gpg.c: _ox_key_is_usable() simplify if conditionMichael Vetter2020-07-021-3/+3
|
* gpg.c: Format new ox function headsMichael Vetter2020-07-021-7/+26
|
* Use files_get_account_data_path instead of duplicate codeMichael Vetter2020-07-011-13/+9
| | | | | We often had a use case where we want the account specific data dir. Let's create a function for this instead of doing it by hand each time.
* Feature request - XEP-0373: OpenPGP for XMPP (OX)DebXWoody2020-06-292-0/+355
| | | | | | | | | Basic implementation of XEP-0373: OpenPGP for XMPP. https://xmpp.org/extensions/xep-0373.html Command /ox Issue: #1331
* Add context to autocomplete_with_func and use it for omemo trust commandPaul Fariello2020-01-312-2/+2
| | | | Fix #1068
* Add vim modelineMichael Vetter2019-11-132-0/+2
|
* Restoration of correct GPG encryptionViachaslau Khalikin2019-02-201-1/+1
| | | | | | | | Fixes https://github.com/boothj5/profanity/issues/997 Proposed as https://github.com/boothj5/profanity/pull/1008 Related to XEP-0027. Message edited and commit cherry picked by jubalh.
* Update copyright to include 2019Michael Vetter2019-01-222-2/+2
|
* Update copyrightJames Booth2018-01-212-2/+2
|
* Show libotr and libgpgme versions on --versionJames Booth2017-08-101-1/+4
| | | | issue #956
* Allow previous autocompletion with shift tabJames Booth2017-04-012-3/+3
|
* Update CopyrightJames Booth2017-01-282-2/+2
|
* Free pgpdirJames Booth2016-07-251-0/+1
|
* Move all filepath handling to files.cJames Booth2016-07-241-5/+3
|
* Move xgd functionsJames Booth2016-07-241-1/+1
|
* Add config/files.cJames Booth2016-07-241-0/+1
|
* Tidy headersJames Booth2016-07-241-1/+1
|
* Make header defines consistentJames Booth2016-07-241-2/+2
|
* Update GPL link in headersJames Booth2016-07-242-2/+2
|
* Removed #AX_PREFIX_CONFIG_HJames Booth2016-03-311-1/+1
|
* PGP: Fixed array size for encryption keysJames Booth2016-03-291-1/+1
|
* PGP: Also encrypt using sender public keyJames Booth2016-03-292-11/+30
|
* Merge branch 'master' into plugins-cJames Booth2016-02-142-2/+2
|\ | | | | | | | | | | Conflicts: src/main.c src/ui/console.c
| * Updated copyrightJames Booth2016-02-142-2/+2
| |