1. 27 May, 2018 3 commits
  2. 21 May, 2018 4 commits
    • Ludovico de Nittis's avatar
      Merge pull request #53 from muelli/subkeys · c9ec6bd0
      Ludovico de Nittis authored
      Do not show keys which miss the primary key ("offline keys")
      c9ec6bd0
    • Tobias Mueller's avatar
      tests: Disabled subkey tests · 03cea997
      Tobias Mueller authored
      pgpdupm shows:
      
      Old: Secret Key Packet(tag 5)(277 bytes)
      	Ver 4 - new
      	Public key creation time - Tue Feb 13 11:53:57 CET 2018
      	Pub alg - RSA Encrypt or Sign(pub 1)
      	RSA n(2048 bits) - ...
      	RSA e(17 bits) - ...
      	Sym alg - Plaintext or unencrypted data(sym 0)
      	GnuPG gnu-dummy (s2k 1001)
      Old: User ID Packet(tag 13)(16 bytes)
      
      That is, there is no "d" (nor "p" nor "q") which we would need in order
      to do anything meaningful with the private key.
      03cea997
    • Tobias Mueller's avatar
      Merged tests for subkeys · 268e0a20
      Tobias Mueller authored
      268e0a20
    • Tobias Mueller's avatar
      gpgmeh: Filter offline keys · de41e690
      Tobias Mueller authored
      Debian recommends placing the master key offline. That requires the
      master key to be present for signing other keys.
      This change filters those keys whose master key is not present.
      In the future we could make our UI a bit nicer by showing the key
      somehow in a disabled fashion. We could offer a hint that the user needs
      to provide their master key.  But we cannot do it just right now,
      because we need to drop monkeysign support first.
      de41e690
  3. 20 May, 2018 1 commit
  4. 18 May, 2018 2 commits
  5. 17 May, 2018 1 commit
  6. 10 May, 2018 2 commits
  7. 09 May, 2018 1 commit
  8. 07 May, 2018 2 commits
  9. 03 May, 2018 1 commit
  10. 07 Apr, 2018 7 commits
  11. 04 Apr, 2018 2 commits
  12. 03 Apr, 2018 7 commits
  13. 24 Mar, 2018 4 commits
    • Tobias Mueller's avatar
      78ef0ca1
    • Ludovico de Nittis's avatar
      Merge pull request #44 from RyuzakiKK/bt_hotfix · 49ceefca
      Ludovico de Nittis authored
      util: fix TypeError when we try to sign with Bluetooth
      49ceefca
    • Tobias Mueller's avatar
      e27dbb79
    • Ludovico de Nittis's avatar
      util: fix TypeError when we try to sign with Bluetooth · 23f25992
      Ludovico de Nittis authored
      If we use Bluetooth as the transfer method the signing process will fail
      with the following trace:
      
      Traceback (most recent call last):
        File "/tmp/gnome-keysign/keysign/receive.py", line 155, in on_sign_key_confirmed
          sign_keydata_and_send(keydata))
        File "/tmp/gnome-keysign/keysign/util.py", line 127, in sign_keydata_and_send
          for uid, encrypted_key in list(sign_keydata_and_encrypt(keydata, error_cb)):
        File "/tmp/gnome-keysign/keysign/gpgmeh.py", line 406, in sign_keydata_and_encrypt
          ctx.op_import(minimise_key(keydata))
        File "/tmp/gnome-keysign/keysign/gpgmeh.py", line 380, in minimise_key
          ctx.op_import(keydata)
        File "/usr/lib/python2.7/site-packages/gpg/core.py", line 132, in _funcwrap
          result = func(slf.wrapped, *args)
      TypeError: arg 2: expected gpg.Data, file, or an object implementing the buffer protocol, got unicode
      
      To prevent this error we simply try to encode keydata before the import.
      23f25992
  14. 22 Mar, 2018 3 commits