1
0
mirror of git://git.gnupg.org/gnupg.git synced 2025-06-20 20:47:58 +02:00

See ChangeLog: Mon Nov 22 11:14:53 CET 1999 Werner Koch

This commit is contained in:
Werner Koch 1999-11-22 10:10:27 +00:00
parent cc49ea6d28
commit 7240c58160
18 changed files with 85 additions and 82 deletions

View File

@ -67,7 +67,7 @@ jungmann@cwb.matrix.com.br
TRANSLATIONS Pedro Morais TRANSLATIONS Pedro Morais
??????????. [pt_PT] Disclaimer. [pt_PT]
morais@poli.org morais@poli.org
@ -76,8 +76,8 @@ Disclaimer. [po]
alex@bofh.torun.pl alex@bofh.torun.pl
TRANSLATIONS Tedi Heriyanto TRANSLATIONS Tedi Heriyanto 1999-05-20
?????????????? [id] Disclaimer. [id]
tedi-h@usa.net tedi-h@usa.net

60
BUGS
View File

@ -1,58 +1,8 @@
List of some known bugs Please see
-------------------------
This following list contains those bugs which we are aware of. Please http://www.gnupg.org/buglist.html
make sure that bugs you report are not listed here. If you can fix one
of these bugs/limitations we will certainly be glad to receive a patch.
(Please note that we need a disclaimer if a patch is longer than about
10 lines; but it may help anyway to show us where we have to fix it. Do
an "info standards" to find out why a disclaimer is needed for GNU.)
Format: severity: [ *] to [***], no, first reported, by, version. for a list know bugs in GnuPG. We don't distribute this list anymore
Bugs which are marked with "FIX: yyyy-mm-dd" are fixed in the CVS with the package because a more current one with notes in which version
and after about half a day in the rsync snapshots. the bug is fixed can be found online.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[ *] #3
--list-packets should continue even w/o a passphrase (or in batch
mode). Maybe we have to move it to a separate program??
[ *] #4 1999-01-13 <ralf.stephan@fitug.de> 0.9.1
v3 key 'expiration date' problem:
1. generate a key, set expiration date
2. <do other things, deleting etc.>
3. edit a v3 secret key, try to set expiration date
- output: "You can't change...
4. save
5. key has expiration date from 1. and gpg reports that pubkey
and seckey differ.
The for loop the exp.date is set before v3 detection?
[is this bug still alive? - can someone please check it]
[ **] #6 1999-02-22 <backes@rhrk.uni-kl.de> 0.9.3
Bus error on IRIX 6.4: Crash while doing a keygen. I think while creating
the prime. Other bus errors are reported when doing a "gpg README"
on sparc-solaris2.6.
--> Solaris fixed.
--> IRIX bug still there but someone should test this again!
[ *] #18 1999-05-27 <Steffen.Zahn@icn.siemens.de> 0.9.7
rndunix hangs on hp/ux. The problem is related to my_plcose which is
not always called. (I suggest to use EGD instead of rndunix.)
[ *] #22 1999-07-22
Solaris make has problems with the generated POTFILES - seems to be a
gettext bug. Use GNU gmake as a workaround.
[ *] #23 1999-09-03 <todd.brooks@yale.edu> 0.9.11
Only the first signature of a cleartext sig seems to be verified.
Can't fix it in 1.0 because the code is semi-frozen.
HMMM: Can't reprodude the bug here - it just works. Check wehther
[ *] #24 1999-09-05 <marcus@yoyo.cc.monash.edu.au> 0.9.11
Does not link libc and libz expect when removing all "-lc -lz" except
for the last one. This happens on some systems when not using the
GNU ld. This need to be fixed in libtool.
Next #25

View File

@ -1,3 +1,7 @@
Mon Nov 22 11:14:53 CET 1999 Werner Koch <wk@gnupg.de>
* BUGS: Replaced content with a link to the online list.
Fri Nov 12 20:33:19 CET 1999 Werner Koch <wk@gnupg.de> Fri Nov 12 20:33:19 CET 1999 Werner Koch <wk@gnupg.de>
* README: Fixed a type and add a note about the gnupg-i18n ML. * README: Fixed a type and add a note about the gnupg-i18n ML.

2
README
View File

@ -510,8 +510,6 @@
the GNU service directory or search other resources. the GNU service directory or search other resources.
-----BEGIN PGP SIGNATURE----- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.0e (GNU/Linux)
Comment: For info see http://www.gnupg.org
iQB1AwUBOCv6bB0Z9MEMmFelAQGktwL/SyzPDeU2I38lFj3Xx7IhL9vUTEaEDuAH iQB1AwUBOCv6bB0Z9MEMmFelAQGktwL/SyzPDeU2I38lFj3Xx7IhL9vUTEaEDuAH
FFjs0i4qpRlvYVfTtEQjkUMCUe6PCMXNXY+var1FOECpJwS93t4uf3VV83ESOMCu FFjs0i4qpRlvYVfTtEQjkUMCUe6PCMXNXY+var1FOECpJwS93t4uf3VV83ESOMCu

7
TODO
View File

@ -1,11 +1,4 @@
* HAVE_STRCASECMP testen. HAVE/RUSAGE nur benutzen wenn RUSAGE?SELF
auch definiert ist.
* It seems that we calculate hashes in g10/mainproc.c:proc_plaintext
even when we know that there is no signature (-c or --no-verify) to
check.
Scheduled for 1.1 Scheduled for 1.1
----------------- -----------------
* With option -i prompt before adding a key to the keyring and show some * With option -i prompt before adding a key to the keyring and show some

View File

@ -1,3 +1,8 @@
Mon Nov 22 11:14:53 CET 1999 Werner Koch <wk@gnupg.de>
* gph: Removed the directory from the dist becuase it will
go into it's own package.
Thu Sep 23 09:52:58 CEST 1999 Werner Koch <wk@isil.d.shuttle.de> Thu Sep 23 09:52:58 CEST 1999 Werner Koch <wk@isil.d.shuttle.de>
* README.W32: New. * README.W32: New.

View File

@ -1,7 +1,5 @@
## Process this file with automake to create Makefile.in ## Process this file with automake to create Makefile.in
SUBDIRS = gph
EXTRA_DIST = DETAILS gpg.sgml gpg.1 FAQ HACKING OpenPGP README.W32 EXTRA_DIST = DETAILS gpg.sgml gpg.1 FAQ HACKING OpenPGP README.W32
man_MANS = gpg.1 man_MANS = gpg.1

View File

@ -27,7 +27,7 @@ index.html: $(PARTS)
echo '</body></html>' >>index.html echo '</body></html>' >>index.html
-rm -r manual.junk -rm -r manual.junk
-rm manual/signatures.jpg -rm manual/signatures.jpg
(cd manual; rm -r stylesheet-images; ls | grep -v distfiles >distfiles) ## (cd manual; rm -r stylesheet-images; ls | grep -v distfiles >distfiles)
dist-hook: index.html dist-hook: index.html

View File

@ -1,3 +1,21 @@
Mon Nov 22 11:14:53 CET 1999 Werner Koch <wk@gnupg.de>
* mainproc.c (proc_plaintext): Never enable the hash processing
when skip_verify is active.
* armor.c (parse_header_line): Stop parsing on a WS line too.
Suggested by Aric Cyr.
* tdbdump.c (HEXTOBIN): Changed the name of the argument, so that
traditional cpp don't mess up the macros. Suggested by Jos Backus.
* mainproc.c (list_node): Print the PK algo in the --with-colon mode.
* keylist.c (list_keyblock): Ditto.
* signal.c (got_fatal_signal): Found the reason why exit(8) did not
work - it is better to set the disposition back to default before
raising the signal. Print the notice on stderr always.
Fri Nov 12 20:33:19 CET 1999 Werner Koch <wk@gnupg.de> Fri Nov 12 20:33:19 CET 1999 Werner Koch <wk@gnupg.de>
* g10.c (make_username): Swapped the logic. * g10.c (make_username): Swapped the logic.

View File

@ -311,9 +311,15 @@ parse_header_line( armor_filter_context_t *afx, byte *line, unsigned len )
byte *p; byte *p;
int hashes=0; int hashes=0;
/* fixme: why this double check? I think the original code w/o the
* second check for an empty line was done from an early draft of
* of OpenPGP - or simply very stupid code */
if( *line == '\n' || ( len && (*line == '\r' && line[1]=='\n') ) ) if( *line == '\n' || ( len && (*line == '\r' && line[1]=='\n') ) )
return 0; /* empty line */ return 0; /* empty line */
len = trim_trailing_ws( line, len ); len = trim_trailing_ws( line, len );
if( !len )
return 0; /* WS only same as empty line */
p = strchr( line, ':'); p = strchr( line, ':');
if( !p || !p[1] ) { if( !p || !p[1] ) {
log_error(_("invalid armor header: ")); log_error(_("invalid armor header: "));

View File

@ -389,7 +389,8 @@ list_keyblock( KBNODE keyblock, int secret )
putchar(':'); putchar(':');
if( sigrc != ' ' ) if( sigrc != ' ' )
putchar(sigrc); putchar(sigrc);
printf(":::%08lX%08lX:%s::::", (ulong)sig->keyid[0], printf("::%d:%08lX%08lX:%s::::", sig->pubkey_algo,
(ulong)sig->keyid[0],
(ulong)sig->keyid[1], datestr_from_sig(sig)); (ulong)sig->keyid[1], datestr_from_sig(sig));
} }
else else

View File

@ -1,4 +1,4 @@
/* maPPPPinproc.c - handle packets /* mainproc.c - handle packets
* Copyright (C) 1998, 1999 Free Software Foundation, Inc. * Copyright (C) 1998, 1999 Free Software Foundation, Inc.
* *
* This file is part of GnuPG. * This file is part of GnuPG.
@ -397,12 +397,14 @@ proc_plaintext( CTX c, PACKET *pkt )
clearsig = 1; clearsig = 1;
} }
} }
if( !any ) { /* no onepass sig packet: enable all standard algos */
if( !any && !opt.skip_verify ) {
/* no onepass sig packet: enable all standard algos */
md_enable( c->mfx.md, DIGEST_ALGO_RMD160 ); md_enable( c->mfx.md, DIGEST_ALGO_RMD160 );
md_enable( c->mfx.md, DIGEST_ALGO_SHA1 ); md_enable( c->mfx.md, DIGEST_ALGO_SHA1 );
md_enable( c->mfx.md, DIGEST_ALGO_MD5 ); md_enable( c->mfx.md, DIGEST_ALGO_MD5 );
} }
if( only_md5 ) { if( only_md5 && !opt.skip_verify ) {
/* This is a kludge to work around a bug in pgp2. It does only /* This is a kludge to work around a bug in pgp2. It does only
* catch those mails which are armored. To catch the non-armored * catch those mails which are armored. To catch the non-armored
* pgp mails we could see whether there is the signature packet * pgp mails we could see whether there is the signature packet
@ -828,7 +830,8 @@ list_node( CTX c, KBNODE node )
putchar(':'); putchar(':');
if( sigrc != ' ' ) if( sigrc != ' ' )
putchar(sigrc); putchar(sigrc);
printf(":::%08lX%08lX:%s::::", (ulong)sig->keyid[0], printf("::%d:%08lX%08lX:%s::::", sig->pubkey_algo,
(ulong)sig->keyid[0],
(ulong)sig->keyid[1], datestr_from_sig(sig)); (ulong)sig->keyid[1], datestr_from_sig(sig));
} }
else else

View File

@ -53,20 +53,26 @@ static RETSIGTYPE
got_fatal_signal( int sig ) got_fatal_signal( int sig )
{ {
const char *s; const char *s;
struct sigaction nact;
if( caught_fatal_sig ) if( caught_fatal_sig )
raise( sig ); raise( sig );
caught_fatal_sig = 1; caught_fatal_sig = 1;
secmem_term(); secmem_term();
#ifdef IS_DEVELOPMENT_VERSION /* better don't transtale these messages */
write(2, "\n", 1 ); write(2, "\n", 1 );
s = log_get_name(); if( s ) write(2, s, strlen(s) ); s = log_get_name(); if( s ) write(2, s, strlen(s) );
write(2, ": ", 2 ); write(2, ": ", 2 );
s = get_signal_name(sig); write(2, s, strlen(s) ); s = get_signal_name(sig); write(2, s, strlen(s) );
write(2, " caught ... exiting\n", 21 ); write(2, " caught ... exiting\n", 21 );
#endif
exit(8); /* Hmmm, for some reasons rais2e does not work */ /* reset action to default action and raise signal again */
nact.sa_handler = SIG_DFL;
sigemptyset( &nact.sa_mask );
nact.sa_flags = 0;
sigaction( sig, &nact, NULL);
raise( sig );
} }

View File

@ -43,8 +43,8 @@
#include "tdbio.h" #include "tdbio.h"
#define HEXTOBIN(a) ( (a) >= '0' && (a) <= '9' ? ((a)-'0') : \ #define HEXTOBIN(x) ( (x) >= '0' && (x) <= '9' ? ((x)-'0') : \
(a) >= 'A' && (a) <= 'F' ? ((a)-'A'+10) : ((a)-'a'+10)) (x) >= 'A' && (x) <= 'F' ? ((x)-'A'+10) : ((x)-'a'+10))
/**************** /****************
* Read a record but die if it does not exist * Read a record but die if it does not exist

View File

@ -188,6 +188,9 @@ char *stpcpy(char *a,const char *b);
#ifndef HAVE_STRLWR #ifndef HAVE_STRLWR
char *strlwr(char *a); char *strlwr(char *a);
#endif #endif
#ifndef HAVE_STRCASECMP
int strcasecmp( const char *, const char *b);
#endif
#ifndef HAVE_STRTOUL #ifndef HAVE_STRTOUL
#define strtoul(a,b,c) ((unsigned long)strtol((a),(b),(c))) #define strtoul(a,b,c) ((unsigned long)strtol((a),(b),(c)))
#endif #endif

View File

@ -1,3 +1,9 @@
Mon Nov 22 11:14:53 CET 1999 Werner Koch <wk@gnupg.de>
* strgutil.c (strcasecmp): New.
* secmem.c (pool_is_mmapped): Made volatile.
Sat Oct 9 20:34:41 CEST 1999 Werner Koch <wk@gnupg.de> Sat Oct 9 20:34:41 CEST 1999 Werner Koch <wk@gnupg.de>
* Makefile.am: Removed libtool. * Makefile.am: Removed libtool.

View File

@ -58,7 +58,7 @@ struct memblock_struct {
static void *pool; static void *pool;
static volatile int pool_okay; /* may be checked in an atexit function */ static volatile int pool_okay; /* may be checked in an atexit function */
static int pool_is_mmapped; static volatile int pool_is_mmapped;
static size_t poolsize; /* allocated length */ static size_t poolsize; /* allocated length */
static size_t poollen; /* used length */ static size_t poollen; /* used length */
static MEMBLOCK *unused_blocks; static MEMBLOCK *unused_blocks;
@ -380,7 +380,7 @@ m_is_secure( const void *p )
/**************** /****************
* Warning: This code might be called by an interrupt handler * Warning: This code might be called by an interrupt handler
* and frankly, thre should really be such a handler, * and frankly, there should really be such a handler,
* to make sure that the memory is wiped out. * to make sure that the memory is wiped out.
* We hope that the OS wipes out mlocked memory after * We hope that the OS wipes out mlocked memory after
* receiving a SIGKILL - it really should do so, otherwise * receiving a SIGKILL - it really should do so, otherwise

View File

@ -559,6 +559,18 @@ strlwr(char *s)
} }
#endif #endif
#ifndef HAVE_STRCASECMP
int
strcasecmp( const char *a, const char *b )
{
for( ; *a && *b; a++, b++ ) {
if( *a != *b && toupper(*a) != toupper(*b) )
break;
}
return *(const byte*)a - *(const byte*)b;
}
#endif
/**************** /****************
* mingw32/cpd has a memicmp() * mingw32/cpd has a memicmp()
*/ */