mirror of
git://git.gnupg.org/gnupg.git
synced 2024-12-22 10:19:57 +01:00
Various smaller changes
This commit is contained in:
parent
f081ad529d
commit
98c6970ad1
5
NEWS
5
NEWS
@ -1,3 +1,8 @@
|
||||
Noteworthy changes in version 1.9.22
|
||||
-------------------------------------------------
|
||||
|
||||
|
||||
|
||||
Noteworthy changes in version 1.9.21 (2006-06-20)
|
||||
-------------------------------------------------
|
||||
|
||||
|
4
TODO
4
TODO
@ -111,6 +111,10 @@ might want to have an agent context for each service request
|
||||
anyway.
|
||||
** skclist.c:random_is_faked
|
||||
Remove the whole stuff?
|
||||
** qbits
|
||||
We pass a new qbit parameter to genkey - implement this in libgcrypt.
|
||||
** Makefile.am
|
||||
Remove the no-pointer-sign kludge.
|
||||
|
||||
* common/
|
||||
** ttyio
|
||||
|
@ -1,3 +1,14 @@
|
||||
2006-06-26 Werner Koch <wk@g10code.com>
|
||||
|
||||
* gpg-agent.c (handle_signal): Print infor for SIGUSR2 only in
|
||||
verbose mode.
|
||||
|
||||
2006-06-22 Werner Koch <wk@g10code.com>
|
||||
|
||||
* command-ssh.c (make_cstring): Use memcpy instead of strncpy.
|
||||
(ssh_receive_mpint_list, sexp_key_extract, data_sign): Use
|
||||
xtrycalloc instead of xtrymalloc followed by memset.
|
||||
|
||||
2006-06-20 Werner Koch <wk@g10code.com>
|
||||
|
||||
* minip12.c (create_final): New arg PW. Add code to calculate the
|
||||
|
@ -268,7 +268,7 @@ make_cstring (const char *data, size_t data_n)
|
||||
s = xtrymalloc (data_n + 1);
|
||||
if (s)
|
||||
{
|
||||
strncpy (s, data, data_n);
|
||||
memcpy (s, data, data_n);
|
||||
s[data_n] = 0;
|
||||
}
|
||||
|
||||
@ -853,15 +853,13 @@ ssh_receive_mpint_list (estream_t stream, int secret,
|
||||
elems_public = key_spec.elems_key_public;
|
||||
elems_public_n = strlen (elems_public);
|
||||
|
||||
mpis = xtrymalloc (sizeof (*mpis) * (elems_n + 1));
|
||||
if (! mpis)
|
||||
mpis = xtrycalloc (elems_n + 1, sizeof *mpis );
|
||||
if (!mpis)
|
||||
{
|
||||
err = gpg_error_from_errno (errno);
|
||||
goto out;
|
||||
}
|
||||
|
||||
memset (mpis, 0, sizeof (*mpis) * (elems_n + 1));
|
||||
|
||||
elem_is_secret = 0;
|
||||
for (i = 0; i < elems_n; i++)
|
||||
{
|
||||
@ -1143,13 +1141,12 @@ sexp_key_extract (gcry_sexp_t sexp,
|
||||
}
|
||||
|
||||
elems_n = strlen (elems);
|
||||
mpis_new = xtrymalloc (sizeof (*mpis_new) * (elems_n + 1));
|
||||
if (! mpis_new)
|
||||
mpis_new = xtrycalloc (elems_n + 1, sizeof *mpis_new );
|
||||
if (!mpis_new)
|
||||
{
|
||||
err = gpg_error_from_errno (errno);
|
||||
goto out;
|
||||
}
|
||||
memset (mpis_new, 0, sizeof (*mpis_new) * (elems_n + 1));
|
||||
|
||||
value_list = gcry_sexp_find_token (sexp, key_spec.identifier, 0);
|
||||
if (! value_list)
|
||||
@ -2055,13 +2052,12 @@ data_sign (ctrl_t ctrl, ssh_signature_encoder_t sig_encoder,
|
||||
elems = spec.elems_signature;
|
||||
elems_n = strlen (elems);
|
||||
|
||||
mpis = xtrymalloc (sizeof (*mpis) * (elems_n + 1));
|
||||
if (! mpis)
|
||||
mpis = xtrycalloc (elems_n + 1, sizeof *mpis);
|
||||
if (!mpis)
|
||||
{
|
||||
err = gpg_error_from_errno (errno);
|
||||
goto out;
|
||||
}
|
||||
memset (mpis, 0, sizeof (*mpis) * (elems_n + 1));
|
||||
|
||||
for (i = 0; i < elems_n; i++)
|
||||
{
|
||||
|
@ -1360,6 +1360,7 @@ handle_signal (int signo)
|
||||
break;
|
||||
|
||||
case SIGUSR2:
|
||||
if (opt.verbose)
|
||||
log_info ("SIGUSR2 received - checking smartcard status\n");
|
||||
break;
|
||||
|
||||
|
@ -26,8 +26,8 @@ min_automake_version="1.9.3"
|
||||
# Remember to change the version number immediately *after* a release.
|
||||
# Set my_issvn to "yes" for non-released code. Remember to run an
|
||||
# "svn up" and "autogen.sh" right before creating a distribution.
|
||||
m4_define([my_version], [1.9.21])
|
||||
m4_define([my_issvn], [no])
|
||||
m4_define([my_version], [1.9.22])
|
||||
m4_define([my_issvn], [yes])
|
||||
|
||||
|
||||
m4_define([svn_revision], m4_esyscmd([echo -n $((svn info 2>/dev/null \
|
||||
|
@ -1,3 +1,8 @@
|
||||
2006-06-26 Werner Koch <wk@g10code.com>
|
||||
|
||||
* certdump.c (gpgsm_cert_log_name): New.
|
||||
* certchain.c (is_cert_still_valid): Log the name of the certificate.
|
||||
|
||||
2006-06-20 Werner Koch <wk@g10code.com>
|
||||
|
||||
* gpgsm.c (gpgsm_init_default_ctrl): Take care of the command line
|
||||
|
@ -597,6 +597,8 @@ is_cert_still_valid (ctrl_t ctrl, int lm, FILE *fp,
|
||||
{
|
||||
/* Fixme: We should change the wording because we may
|
||||
have used OCSP. */
|
||||
if (!lm)
|
||||
gpgsm_cert_log_name (NULL, subject_cert);
|
||||
switch (gpg_err_code (err))
|
||||
{
|
||||
case GPG_ERR_CERT_REVOKED:
|
||||
|
@ -238,6 +238,36 @@ gpgsm_dump_cert (const char *text, ksba_cert_t cert)
|
||||
}
|
||||
|
||||
|
||||
/* Log the certificate's name in "#SN/ISSUERDN" format along with
|
||||
TEXT. */
|
||||
void
|
||||
gpgsm_cert_log_name (const char *text, ksba_cert_t cert)
|
||||
{
|
||||
log_info ("%s", text? text:"certificate" );
|
||||
if (cert)
|
||||
{
|
||||
ksba_sexp_t sn;
|
||||
char *p;
|
||||
|
||||
p = ksba_cert_get_issuer (cert, 0);
|
||||
sn = ksba_cert_get_serial (cert);
|
||||
if (p && sn)
|
||||
{
|
||||
log_printf (" #");
|
||||
gpgsm_dump_serial (sn);
|
||||
log_printf ("/");
|
||||
gpgsm_dump_string (p);
|
||||
}
|
||||
else
|
||||
log_printf (" [invalid]");
|
||||
ksba_free (sn);
|
||||
xfree (p);
|
||||
}
|
||||
log_printf ("\n");
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
/* helper for the rfc2253 string parser */
|
||||
static const unsigned char *
|
||||
|
@ -218,6 +218,8 @@ void gpgsm_print_time (FILE *fp, ksba_isotime_t t);
|
||||
void gpgsm_print_name2 (FILE *fp, const char *string, int translate);
|
||||
void gpgsm_print_name (FILE *fp, const char *string);
|
||||
|
||||
void gpgsm_cert_log_name (const char *text, ksba_cert_t cert);
|
||||
|
||||
void gpgsm_dump_cert (const char *text, ksba_cert_t cert);
|
||||
void gpgsm_dump_serial (ksba_const_sexp_t p);
|
||||
void gpgsm_dump_time (ksba_isotime_t t);
|
||||
|
@ -672,7 +672,7 @@ list_cert_raw (ctrl_t ctrl, KEYDB_HANDLE hd,
|
||||
else
|
||||
fputs ("[?]\n", fp);
|
||||
|
||||
fputs (" keyUsage:", fp);
|
||||
fputs (" keyUsage: ", fp);
|
||||
err = ksba_cert_get_key_usage (cert, &kusage);
|
||||
if (gpg_err_code (err) != GPG_ERR_NO_DATA)
|
||||
{
|
||||
|
Loading…
x
Reference in New Issue
Block a user