summaryrefslogtreecommitdiff
path: root/src/leap/keymanager
AgeCommit message (Collapse)Author
2015-01-15Port validation levels to enum34Ruben Pollan
2015-01-15upgrade key when signed by old keyRuben Pollan
2015-01-15Upgrade keys if not successfully used and strict high validation levelRuben Pollan
2015-01-15On key update merge metadata correctlyRuben Pollan
2015-01-15Fix key upgrade on no expiration date and higher validation levelRuben Pollan
2015-01-15Return a valid error from gatherResultsRuben Pollan
2014-12-16Return the right error on signature verificationRuben Pollan
2014-12-16Find the gpg path instead of hard code itRuben Pollan
2014-12-16Fix key generationRuben Pollan
2014-12-16Port to soledad new async APIRuben Pollan
2014-11-25Return signing key on signature verificationRuben Pollan
Don't throw an exception if verification fails
2014-11-25Use addresses instead of keys on the public APIRuben Pollan
2014-11-25Fix test to use correct new signature for openpgp.put_ascii_key().drebs
2014-11-19Fix commentsRuben Pollan
2014-11-19Implement multi uid supportRuben Pollan
2014-11-19Implement active key documentRuben Pollan
2014-11-10Use type instead of tags to get docs in openpgpRuben Pollan
For that that now the type is the class.__name__ instead of str(class)
2014-11-10Implement the new encryption-key soledad documentRuben Pollan
2014-11-06Use datetime for key expirationRuben Pollan
2014-11-04Remove outdated commentRuben Pollan
2014-11-04Merge keys when updating an exisiting keyRuben Pollan
This is needed to prevent roll back attacks where the attacker push us to accept a key with an old expiration date that could be use to push an untrusted key when after it's expiration.
2014-10-23Update doc string of OpenPGPScheme._temporary_gpgwrapperRuben Pollan
2014-10-23Basic validation levels supportRuben Pollan
2014-10-09Implement 'fetch_key' for ascii keysRuben Pollan
binary keys support is still missing
2014-10-09Merge branch 'drebs/bug/6022_fix-call-to-verify-file' into developRuben Pollan
2014-10-09Accept ascii keys on put_keyRuben Pollan
2014-09-16Remove parse_openpgp_ascii_keyRuben Pollan
Don't fit with the logic of the keymanager and it's not use except for some commented code in bitmask_client
2014-09-16Rename method get_all_keys_in_local_db -> get_all_keysRuben Pollan
2014-09-16Remove get_key_from_cacheRuben Pollan
We only need to cache the fetch with a sort timeout. The tests that fetches keys now have to use different keys or will be cached.
2014-09-16Pass the cipher_algo to the encrypt wrapperRuben Pollan
2014-09-16Remove refresh_keysRuben Pollan
Never should be done a bulk upload of keys. The updating of the keys should not be a task for the user of the keymanager. Keys will be updated by the keymanager in a background worker one per one.
2014-09-15Update docstrings of the public APIRuben Pollan
2014-08-27Fix call to python-gnupg verify_file() method (#6022).drebs
2014-07-25Fix test_send_keyRuben Pollan
2014-07-25gpg.verify_file() gets the data as a filename not as a binary streamRuben Pollan
2014-03-31Properly raise exception when key is not found on server (#5415).drebs
2014-02-17Update auth to interact with webapp v2. Closes #5120.drebs
2014-01-20Merge remote-tracking branch ↵Tomás Touceda
'refs/remotes/ivan/feature/better-version-handling' into develop
2014-01-17Fix failing tests.Ivan Alejandro
Add missing MockSharedDB. Update Soledad parameters.
2014-01-17Remove unused imports, fix typo.Ivan Alejandro
2014-01-17Do not decode decrypted data, return as str.Ivan Alejandro
2014-01-09Use a better version handler.Ivan Alejandro
2013-12-18Do not memoize get_key, but a separate method.Kali Kaneko
In this way we can choose which calls to get from cache and we do not mess with the call from send_key
2013-12-17memoize call to get_keyKali Kaneko
2013-12-10typoKali Kaneko
2013-12-09pep8 cleanupKali Kaneko
2013-11-25Improve exceptions names and handling.drebs
2013-11-25Fix error returns on openpgp backend.drebs
Also fix: - some docstrings. - variabled referenced without previous assignement.
2013-11-21Remove '+' suffix in email address.Ivan Alejandro
This allows us to support encrypt mails to 'test_user@provider.com' even if was sent to 'test_user+optional_string@provider.com'.
2013-11-21Do not check for a valid address, rely on client.Ivan Alejandro
An email address regexp that supports all (or almost) emails is really complex, and is_address uses a simpler one since we restrict the valid usernames and provider names. For that we rely on the email client to check whether the email address is valid or not.