Signing using a PKCS15 smartcard does work. How to create such a card
[gnupg.git] / agent / ChangeLog
index 0c79306..94fb002 100644 (file)
@@ -1,3 +1,37 @@
+2002-03-05  Werner Koch  <wk@gnupg.org>
+
+       * call-scd.c (inq_needpin): New.
+       (agent_card_pksign): Add getpin_cb args.
+
+2002-03-04  Werner Koch  <wk@gnupg.org>
+
+       * pksign.c (agent_pksign): Changed how the diversion is done.
+       * divert-scd.c (divert_pksign): Change interface and implemented it.
+       (encode_md_for_card): New.
+       * call-scd.c (agent_card_pksign): New.
+
+2002-02-28  Werner Koch  <wk@gnupg.org>
+
+       * pksign.c (agent_pksign): Detect whether a Smartcard is to be
+       used and divert the operation in this case.
+       * pkdecrypt.c (agent_pkdecrypt): Likewise
+       * findkey.c (agent_key_from_file): Add optional arg shadow_info
+       and have it return information about a shadowed key.
+       * protect.c (agent_get_shadow_info): New.
+
+       * protect.c (snext,sskip,smatch): Moved to
+       * sexp-parse.h: new file.
+       * divert-scd.c: New.
+       
+2002-02-27  Werner Koch  <wk@gnupg.org>
+
+       * protect.c (agent_shadow_key): New.
+
+       * command.c (cmd_learn): New command LEARN.
+       * gpg-agent.c: New option --scdaemon-program.
+       * call-scd.c (start_scd): New. Based on query.c
+       * query.c: Add 2 more arguments to all uses of assuan_transact.
+
 2002-02-18  Werner Koch  <wk@gnupg.org>
 
        * findkey.c (unprotect): Show an error message for a bad passphrase.