Jaromil
a0c74985ca
documentation updates on the new cloakify feature
...
also updated the list of code contributors
2019-02-22 09:50:04 +01:00
Jaromil
59408b373f
Merge pull request #342 from heat-wave/feature/cloakify-integration
...
Cloakify integration
2019-02-22 09:40:46 +01:00
heat-wave
f2eb1fd242
Expanded steganographic functionality with cloakify integration
2019-02-21 09:28:21 +00:00
Jaromil
9299f3eecf
mention need of using trusted gpg keys in manpage
...
documentation to address issue #340
2019-02-20 20:37:28 +01:00
Jaromil
12767764fb
Merge pull request #336 from jcrd/usage
...
Improve usage message
2018-12-06 10:45:39 +01:00
James Reed
46286047f6
Align usage message lines ( fix #335 )
...
Print newlines only when necessary
Correct coma to comma in usage message
2018-11-26 10:48:19 -07:00
Jaromil
1b535f920b
Merge pull request #331 from jcrd/msg
...
Overhaul message printing
2018-11-25 15:12:36 +08:00
James Reed
477ab20443
Overhaul message printing
2018-11-24 15:48:25 -07:00
Jaromil
a14a39ae12
Merge pull request #332 from jcrd/kdf-header
...
Check for KDF header in is_valid_key
2018-11-04 16:01:02 +01:00
James Reed
1ba3c55241
Check for KDF header in is_valid_key
2018-11-03 15:15:48 -06:00
Jaromil
629841c0e7
Merge pull request #320 from roddhjav/stat
...
Track access/modification time of sensitive files
2018-09-24 18:09:10 +02:00
Alexandre Pujol
2f3826d88d
Fix modification time restoration.
2018-09-24 12:58:51 +01:00
Alexandre Pujol
aaa4637ed0
Track access/modification time of sensitive files
...
Collects the stats of tomb keys and tomb files then restore them when
Tomb exits. Can be extended to any file opened by Tomb. See #266
2018-09-23 22:21:05 +01:00
Jaromil
cdd3c5804a
updated documentation on KDF whitespace bug
...
fix #307
2018-09-23 12:05:02 +02:00
Jaromil
e8919af867
Merge pull request #308 from AitorATuin/kdf_input
...
Fixes a problem reading passwords when using the kdf wrapper
2018-09-23 11:04:10 +01:00
Jaromil
27fd026cd5
documentation updates
...
also fix #319
2018-09-23 11:41:08 +02:00
Jaromil
a27f15aada
Merge pull request #318 from roddhjav/master
...
Add test coverage for GPG subkeys support.
2018-08-20 13:03:50 +02:00
Alexandre Pujol
c293aa7261
Add regression test for tomb 2.4
2018-08-19 23:08:48 +01:00
Alexandre Pujol
24fee7a076
Add test coverage for GPG subkeys support. See #317
2018-08-19 22:53:21 +01:00
Jaromil
7c8067fef3
Merge pull request #317 from bjonnh/patch-1
...
Add support for multiple GPG subkeys
2018-08-19 23:25:03 +02:00
bjonnh
18b7541a98
subkey_id for display must be out of _fingerprint
...
I did a typo, the ($gpg_id) should have been out of the _fingerprint call.
2018-08-18 17:41:37 -05:00
bjonnh
b49a36a07b
Add support for multiple keys especially subkeys
...
Correcting issue #316
2018-08-17 14:03:33 -05:00
Jaromil
8d698ad46a
Merge pull request #309 from Ganondolf/gtk-tray-path
...
Fix mounted volume default path
2018-02-18 11:10:22 +01:00
Ganondolf
f290904f71
Fix mounted volume default path
2018-02-17 16:23:26 +01:00
Jaromil
68a9589925
set ownership after dig and forge
2018-02-11 21:41:58 +01:00
ATuinDev
3cb8ebefd3
Don't impose any limitation in password size
...
Remove the hardcoded buffer with dynamic memory to get password input
(uses now calloc / realloc)
2018-02-04 20:53:35 +01:00
ATuinDev
35cf8572bf
Rename variable j
to something more descriptive
...
Remove `+ 1` in conditions, easier to understand using the comparators
2018-02-03 23:24:20 +01:00
ATuinDev
a66224d549
Run extras/kdf-keys tests in travis
2018-02-03 21:23:07 +01:00
ATuinDev
510c8f6430
Add check for password lens
2018-02-03 21:05:56 +01:00
ATuinDev
5c419b3117
Add explicit comment before reading the password
2018-02-03 19:20:01 +01:00
ATuinDev
257e5ee99a
whitespaces are now part of the password
...
NULL character can also be part of the password. There was a failing
test that was checking exactly that (now all the tests pass).
2018-02-03 19:16:20 +01:00
ATuinDev
bce58cae3e
Add test testing that whitespaces are used by kdf wrapper
...
Adds a new test that assures that spaces are part of the passwords
2018-02-03 19:12:05 +01:00
Jaromil
3440a32839
Merge pull request #305 from dyne/assuan_deduplication
...
put assuan commands to pinentry into a single function
2018-02-02 16:47:28 +01:00
Jaromil
f5ceddc0b7
put assuan commands to pinentry into a single function
2018-01-29 09:47:42 +01:00
Jaromil
f4913e0744
Merge pull request #303 from sargo-devel/master
...
Added pinentry-qt5 support
2018-01-29 09:38:47 +01:00
SargoDevel
66ade86441
Added pinentry-qt5 support
2018-01-28 21:49:21 +01:00
Jaromil
d0805084a2
added doc to avoid logging of invokations in syslog
...
see issue #302 and thanks to @stevesbrain
2018-01-23 09:38:52 +01:00
Jaromil
f42a4c2a0b
Merge pull request #301 from Narrat/small_things
...
Small things
2018-01-09 10:42:40 +01:00
Narrat
08ca0a8eef
list_gnupg_ciphers: Remove check on gpg
...
This function is called after _ensure_dependencies(), which would bail out if gpg is not found
2018-01-07 21:56:19 +01:00
Narrat
5e3b0dec84
list_gnupg_ciphers: be language agnostic
...
The old awk implementation always worked on lines beginning with 'Ciphers:' until it found 'Hash:'.
This fails for locales where a respective gnupg2.mo entry exists (Example: Ciphers in german is translated as Verschlü.:).
This is replaced by pointing awk on a specific line, which is for gpg1 and gpg2 the same. Work is done until awk stumbles up on a line which marks a new section (marked by keyword and :)
This closes #299
2018-01-07 21:40:32 +01:00
Narrat
e15c58dfd7
list_gnupg_ciphers: Pipe everything into /dev/null
...
Firstly the printed binary path is in the wrong place. Reading the text, one assumes Ciphers coming next.
Secondly it doesn't make sense to check there for a missing gnupg installation. Before calling list_gnupg_ciphers(), there is a direct call for gpg --version. If that fails the whole text is scrambled and no error reported
Dropping the output from which allows to remove the space from printing the ciphers. The text is correctly aligned now
2018-01-07 21:03:21 +01:00
Narrat
61fdab85be
Show only version of pinentry
...
pinentry --version invocation includes License information.
As the same applies for gpg, and the information is not displayed there, we should the same with pinentry.
And tomb doesn't deal with the gpg sourcecode in any way.
This closes #300
2018-01-07 20:03:04 +01:00
Jaromil
74689ea484
tagging the release
2018-01-03 20:34:18 +01:00
Jaromil
7951645db5
switch code indentation to hard tabs
...
also update code guidelines.
2018-01-03 20:27:14 +01:00
Jaromil
70abf31bab
documentation updates for a new release
2018-01-03 19:53:35 +01:00
Jaromil
ae78659efb
Merge pull request #297 from dyne/restore-chown
...
restored change of ownership on tomb's contents
2018-01-03 19:42:52 +01:00
Jaromil
ab3044c6f5
restored change of ownership on tomb's contents
...
this reverts commit 843b7fdfc4
and refers to various issues, among them #268
on the long term its easy to realise how this is a usability feature for most
users, so we just provide a new '-p' flag to preserve ownership on open.
2018-01-03 18:34:50 +01:00
Jaromil
214ec8ecbd
Merge pull request #298 from roddhjav/fix-version-check
...
Fixes: version check & tests
2018-01-03 16:36:16 +01:00
Alexandre Pujol
cec0c01b3e
Test: remove useless cleanup
2018-01-03 14:50:00 +00:00
Alexandre Pujol
c7dc379c0d
Tests: support non-standard zsh location. See #283
2018-01-03 14:49:08 +00:00