mirror of
git://git.gnupg.org/gnupg.git
synced 2024-12-22 10:19:57 +01:00
Fix typos found using codespell.
* agent/cache.c: Fix typos. * agent/call-pinentry.c: Likewise. * agent/call-scd.c: Likewise. * agent/command-ssh.c: Likewise. * agent/command.c: Likewise. * agent/divert-scd.c: Likewise. * agent/findkey.c: Likewise. * agent/gpg-agent.c: Likewise. * agent/w32main.c: Likewise. * common/argparse.c: Likewise. * common/audit.c: Likewise. * common/audit.h: Likewise. * common/convert.c: Likewise. * common/dotlock.c: Likewise. * common/exechelp-posix.c: Likewise. * common/exechelp-w32.c: Likewise. * common/exechelp-w32ce.c: Likewise. * common/exechelp.h: Likewise. * common/helpfile.c: Likewise. * common/i18n.h: Likewise. * common/iobuf.c: Likewise. * common/iobuf.h: Likewise. * common/localename.c: Likewise. * common/logging.c: Likewise. * common/openpgp-oid.c: Likewise. * common/session-env.c: Likewise. * common/sexputil.c: Likewise. * common/sysutils.c: Likewise. * common/t-sexputil.c: Likewise. * common/ttyio.c: Likewise. * common/util.h: Likewise. * dirmngr/cdblib.c: Likewise. * dirmngr/certcache.c: Likewise. * dirmngr/crlcache.c: Likewise. * dirmngr/dirmngr-client.c: Likewise. * dirmngr/dirmngr.c: Likewise. * dirmngr/dirmngr_ldap.c: Likewise. * dirmngr/dns-stuff.c: Likewise. * dirmngr/http.c: Likewise. * dirmngr/ks-engine-hkp.c: Likewise. * dirmngr/ks-engine-ldap.c: Likewise. * dirmngr/ldap-wrapper.c: Likewise. * dirmngr/ldap.c: Likewise. * dirmngr/misc.c: Likewise. * dirmngr/ocsp.c: Likewise. * dirmngr/validate.c: Likewise. * g10/encrypt.c: Likewise. * g10/getkey.c: Likewise. * g10/gpg.c: Likewise. * g10/gpgv.c: Likewise. * g10/import.c: Likewise. * g10/keydb.c: Likewise. * g10/keydb.h: Likewise. * g10/keygen.c: Likewise. * g10/keyid.c: Likewise. * g10/keylist.c: Likewise. * g10/keyring.c: Likewise. * g10/mainproc.c: Likewise. * g10/misc.c: Likewise. * g10/options.h: Likewise. * g10/packet.h: Likewise. * g10/parse-packet.c: Likewise. * g10/pkclist.c: Likewise. * g10/pkglue.c: Likewise. * g10/plaintext.c: Likewise. * g10/server.c: Likewise. * g10/sig-check.c: Likewise. * g10/sqlite.c: Likewise. * g10/tdbio.c: Likewise. * g10/test-stubs.c: Likewise. * g10/tofu.c: Likewise. * g10/trust.c: Likewise. * g10/trustdb.c: Likewise. * g13/create.c: Likewise. * g13/mountinfo.c: Likewise. * kbx/keybox-blob.c: Likewise. * kbx/keybox-file.c: Likewise. * kbx/keybox-init.c: Likewise. * kbx/keybox-search-desc.h: Likewise. * kbx/keybox-search.c: Likewise. * kbx/keybox-update.c: Likewise. * scd/apdu.c: Likewise. * scd/app-openpgp.c: Likewise. * scd/app-p15.c: Likewise. * scd/app.c: Likewise. * scd/ccid-driver.c: Likewise. * scd/command.c: Likewise. * scd/iso7816.c: Likewise. * sm/base64.c: Likewise. * sm/call-agent.c: Likewise. * sm/call-dirmngr.c: Likewise. * sm/certchain.c: Likewise. * sm/gpgsm.c: Likewise. * sm/import.c: Likewise. * sm/keydb.c: Likewise. * sm/minip12.c: Likewise. * sm/qualified.c: Likewise. * sm/server.c: Likewise. * tools/gpg-check-pattern.c: Likewise. * tools/gpgconf-comp.c: Likewise. * tools/gpgkey2ssh.c: Likewise. * tools/gpgparsemail.c: Likewise. * tools/gpgtar.c: Likewise. * tools/rfc822parse.c: Likewise. * tools/symcryptrun.c: Likewise. Signed-off-by: Justus Winter <justus@g10code.com>
This commit is contained in:
parent
8e2bea22b0
commit
a9e0905342
@ -167,7 +167,7 @@ new_data (const char *string, struct secret_data_s **r_data)
|
|||||||
|
|
||||||
/* We pad the data to 32 bytes so that it get more complicated
|
/* We pad the data to 32 bytes so that it get more complicated
|
||||||
finding something out by watching allocation patterns. This is
|
finding something out by watching allocation patterns. This is
|
||||||
usally not possible but we better assume nothing about our secure
|
usually not possible but we better assume nothing about our secure
|
||||||
storage provider. To support the AESWRAP mode we need to add 8
|
storage provider. To support the AESWRAP mode we need to add 8
|
||||||
extra bytes as well. */
|
extra bytes as well. */
|
||||||
total = (length + 8) + 32 - ((length+8) % 32);
|
total = (length + 8) + 32 - ((length+8) % 32);
|
||||||
|
@ -226,7 +226,7 @@ getinfo_pid_cb (void *opaque, const void *buffer, size_t length)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* Fork off the pin entry if this has not already been done. Note,
|
/* Fork off the pin entry if this has not already been done. Note,
|
||||||
that this function must always be used to aquire the lock for the
|
that this function must always be used to acquire the lock for the
|
||||||
pinentry - we will serialize _all_ pinentry calls.
|
pinentry - we will serialize _all_ pinentry calls.
|
||||||
*/
|
*/
|
||||||
static gpg_error_t
|
static gpg_error_t
|
||||||
|
@ -189,7 +189,7 @@ atfork_cb (void *opaque, int where)
|
|||||||
/* Fork off the SCdaemon if this has not already been done. Lock the
|
/* Fork off the SCdaemon if this has not already been done. Lock the
|
||||||
daemon and make sure that a proper context has been setup in CTRL.
|
daemon and make sure that a proper context has been setup in CTRL.
|
||||||
This function might also lock the daemon, which means that the
|
This function might also lock the daemon, which means that the
|
||||||
caller must call unlock_scd after this fucntion has returned
|
caller must call unlock_scd after this function has returned
|
||||||
success and the actual Assuan transaction been done. */
|
success and the actual Assuan transaction been done. */
|
||||||
static int
|
static int
|
||||||
start_scd (ctrl_t ctrl)
|
start_scd (ctrl_t ctrl)
|
||||||
|
@ -3569,7 +3569,7 @@ ssh_request_process (ctrl_t ctrl, estream_t stream_sock)
|
|||||||
out:
|
out:
|
||||||
|
|
||||||
if (err && es_feof (stream_sock))
|
if (err && es_feof (stream_sock))
|
||||||
log_error ("error occured while processing request: %s\n",
|
log_error ("error occurred while processing request: %s\n",
|
||||||
gpg_strerror (err));
|
gpg_strerror (err));
|
||||||
|
|
||||||
if (send_err)
|
if (send_err)
|
||||||
|
@ -2585,7 +2585,7 @@ static const char hlp_putval[] =
|
|||||||
"\n"
|
"\n"
|
||||||
"KEY is an an arbitrary symbol with the same syntax rules as keys\n"
|
"KEY is an an arbitrary symbol with the same syntax rules as keys\n"
|
||||||
"for shell environment variables. PERCENT_ESCAPED_VALUE is the\n"
|
"for shell environment variables. PERCENT_ESCAPED_VALUE is the\n"
|
||||||
"corresponsing value; they should be similar to the values of\n"
|
"corresponding value; they should be similar to the values of\n"
|
||||||
"envronment variables but gpg-agent does not enforce any\n"
|
"envronment variables but gpg-agent does not enforce any\n"
|
||||||
"restrictions. If that value is not given any value under that KEY\n"
|
"restrictions. If that value is not given any value under that KEY\n"
|
||||||
"is removed from this special environment.";
|
"is removed from this special environment.";
|
||||||
|
@ -224,7 +224,7 @@ getpin_cb (void *opaque, const char *info, char *buf, size_t maxbuf)
|
|||||||
log_debug ("pin_cb called without proper PIN info hack\n");
|
log_debug ("pin_cb called without proper PIN info hack\n");
|
||||||
|
|
||||||
/* If BUF has been passed as NULL, we are in pinpad mode: The
|
/* If BUF has been passed as NULL, we are in pinpad mode: The
|
||||||
callback opens the popup and immediatley returns. */
|
callback opens the popup and immediately returns. */
|
||||||
if (!buf)
|
if (!buf)
|
||||||
{
|
{
|
||||||
if (maxbuf == 0) /* Close the pinentry. */
|
if (maxbuf == 0) /* Close the pinentry. */
|
||||||
|
@ -1219,7 +1219,7 @@ agent_key_info_from_file (ctrl_t ctrl, const unsigned char *grip,
|
|||||||
|
|
||||||
|
|
||||||
/* Delete the key with GRIP from the disk after having asked for
|
/* Delete the key with GRIP from the disk after having asked for
|
||||||
confirmation using DESC_TEXT. If FORCE is set the fucntion won't
|
confirmation using DESC_TEXT. If FORCE is set the function won't
|
||||||
require a confirmation via Pinentry or warns if the key is also
|
require a confirmation via Pinentry or warns if the key is also
|
||||||
used by ssh.
|
used by ssh.
|
||||||
|
|
||||||
|
@ -1485,7 +1485,7 @@ agent_deinit_default_ctrl (ctrl_t ctrl)
|
|||||||
|
|
||||||
/* Because the ssh protocol does not send us information about the
|
/* Because the ssh protocol does not send us information about the
|
||||||
current TTY setting, we use this function to use those from startup
|
current TTY setting, we use this function to use those from startup
|
||||||
or those explictly set. This is also used for the restricted mode
|
or those explicitly set. This is also used for the restricted mode
|
||||||
where we ignore requests to change the environment. */
|
where we ignore requests to change the environment. */
|
||||||
gpg_error_t
|
gpg_error_t
|
||||||
agent_copy_startup_env (ctrl_t ctrl)
|
agent_copy_startup_env (ctrl_t ctrl)
|
||||||
|
@ -258,7 +258,7 @@ handle_taskbar (void *ctx)
|
|||||||
|
|
||||||
/* This function initializes the Window system and sets up the taskbar
|
/* This function initializes the Window system and sets up the taskbar
|
||||||
icon. We only have very limited GUI support just to give the
|
icon. We only have very limited GUI support just to give the
|
||||||
taskbar icon a little bit of life. This fucntion is called once to
|
taskbar icon a little bit of life. This function is called once to
|
||||||
fire up the icon. */
|
fire up the icon. */
|
||||||
int
|
int
|
||||||
w32_setup_taskbar (void)
|
w32_setup_taskbar (void)
|
||||||
|
@ -851,7 +851,7 @@ find_long_option( ARGPARSE_ARGS *arg,
|
|||||||
/* Would be better if we can do a binary search, but it is not
|
/* Would be better if we can do a binary search, but it is not
|
||||||
possible to reorder our option table because we would mess
|
possible to reorder our option table because we would mess
|
||||||
up our help strings - What we can do is: Build a nice option
|
up our help strings - What we can do is: Build a nice option
|
||||||
lookup table wehn this function is first invoked */
|
lookup table when this function is first invoked */
|
||||||
if( !*keyword )
|
if( !*keyword )
|
||||||
return -1;
|
return -1;
|
||||||
for(i=0; opts[i].short_opt; i++ )
|
for(i=0; opts[i].short_opt; i++ )
|
||||||
|
@ -164,7 +164,7 @@ audit_release (audit_ctx_t ctx)
|
|||||||
|
|
||||||
|
|
||||||
/* Set the type for the audit operation. If CTX is NULL, this is a
|
/* Set the type for the audit operation. If CTX is NULL, this is a
|
||||||
dummy fucntion. */
|
dummy function. */
|
||||||
void
|
void
|
||||||
audit_set_type (audit_ctx_t ctx, audit_type_t type)
|
audit_set_type (audit_ctx_t ctx, audit_type_t type)
|
||||||
{
|
{
|
||||||
|
@ -174,7 +174,7 @@ typedef enum
|
|||||||
|
|
||||||
AUDIT_ROOT_TRUSTED, /* cert, err */
|
AUDIT_ROOT_TRUSTED, /* cert, err */
|
||||||
/* Tells whether the root certificate is trusted. This event is
|
/* Tells whether the root certificate is trusted. This event is
|
||||||
emmited durcing chain validation. */
|
emitted during chain validation. */
|
||||||
|
|
||||||
AUDIT_CRL_CHECK, /* err */
|
AUDIT_CRL_CHECK, /* err */
|
||||||
/* Tells the status of a CRL or OCSP check. */
|
/* Tells the status of a CRL or OCSP check. */
|
||||||
|
@ -70,7 +70,7 @@ hex2bin (const char *string, void *buffer, size_t length)
|
|||||||
/* Convert STRING consisting of hex characters into its binary representation
|
/* Convert STRING consisting of hex characters into its binary representation
|
||||||
and store that at BUFFER. BUFFER needs to be of LENGTH bytes. The
|
and store that at BUFFER. BUFFER needs to be of LENGTH bytes. The
|
||||||
function check that the STRING will convert exactly to LENGTH
|
function check that the STRING will convert exactly to LENGTH
|
||||||
bytes. Colons inbetween the hex digits are allowed, if one colon
|
bytes. Colons between the hex digits are allowed, if one colon
|
||||||
has been given a colon is expected very 2 characters. The string
|
has been given a colon is expected very 2 characters. The string
|
||||||
is delimited by either end of string or a white space character.
|
is delimited by either end of string or a white space character.
|
||||||
The function returns -1 on error or the length of the parsed
|
The function returns -1 on error or the length of the parsed
|
||||||
@ -180,7 +180,7 @@ bin2hexcolon (const void *buffer, size_t length, char *stringbuf)
|
|||||||
Nul byte at the end is used to make sure tha the result can always
|
Nul byte at the end is used to make sure tha the result can always
|
||||||
be used as a C-string.
|
be used as a C-string.
|
||||||
|
|
||||||
BUFSIZE is the availabe length of BUFFER; if the converted result
|
BUFSIZE is the available length of BUFFER; if the converted result
|
||||||
plus a possible required extra Nul character does not fit into this
|
plus a possible required extra Nul character does not fit into this
|
||||||
buffer, the function returns NULL and won't change the existing
|
buffer, the function returns NULL and won't change the existing
|
||||||
content of BUFFER. In-place conversion is possible as long as
|
content of BUFFER. In-place conversion is possible as long as
|
||||||
@ -190,7 +190,7 @@ bin2hexcolon (const void *buffer, size_t length, char *stringbuf)
|
|||||||
does not store anything. This may be used to find the end of
|
does not store anything. This may be used to find the end of
|
||||||
HEXSTRING.
|
HEXSTRING.
|
||||||
|
|
||||||
On sucess the function returns a pointer to the next character
|
On success the function returns a pointer to the next character
|
||||||
after HEXSTRING (which is either end-of-string or a the next white
|
after HEXSTRING (which is either end-of-string or a the next white
|
||||||
space). If BUFLEN is not NULL the number of valid vytes in BUFFER
|
space). If BUFLEN is not NULL the number of valid vytes in BUFFER
|
||||||
is stored there (an extra Nul byte is not counted); this will even
|
is stored there (an extra Nul byte is not counted); this will even
|
||||||
|
@ -1293,7 +1293,7 @@ dotlock_remove_lockfiles (void)
|
|||||||
dotlock_t h, h2;
|
dotlock_t h, h2;
|
||||||
|
|
||||||
/* First set the lockfiles list to NULL so that for example
|
/* First set the lockfiles list to NULL so that for example
|
||||||
dotlock_release is ware that this fucntion is currently
|
dotlock_release is aware that this function is currently
|
||||||
running. */
|
running. */
|
||||||
LOCK_all_lockfiles ();
|
LOCK_all_lockfiles ();
|
||||||
h = all_lockfiles;
|
h = all_lockfiles;
|
||||||
|
@ -171,7 +171,7 @@ close_all_fds (int first, int *except)
|
|||||||
/* Returns an array with all currently open file descriptors. The end
|
/* Returns an array with all currently open file descriptors. The end
|
||||||
of the array is marked by -1. The caller needs to release this
|
of the array is marked by -1. The caller needs to release this
|
||||||
array using the *standard free* and not with xfree. This allow the
|
array using the *standard free* and not with xfree. This allow the
|
||||||
use of this fucntion right at startup even before libgcrypt has
|
use of this function right at startup even before libgcrypt has
|
||||||
been initialized. Returns NULL on error and sets ERRNO
|
been initialized. Returns NULL on error and sets ERRNO
|
||||||
accordingly. */
|
accordingly. */
|
||||||
int *
|
int *
|
||||||
|
@ -116,7 +116,7 @@ close_all_fds (int first, int *except)
|
|||||||
/* Returns an array with all currently open file descriptors. The end
|
/* Returns an array with all currently open file descriptors. The end
|
||||||
of the array is marked by -1. The caller needs to release this
|
of the array is marked by -1. The caller needs to release this
|
||||||
array using the *standard free* and not with xfree. This allow the
|
array using the *standard free* and not with xfree. This allow the
|
||||||
use of this fucntion right at startup even before libgcrypt has
|
use of this function right at startup even before libgcrypt has
|
||||||
been initialized. Returns NULL on error and sets ERRNO
|
been initialized. Returns NULL on error and sets ERRNO
|
||||||
accordingly. */
|
accordingly. */
|
||||||
int *
|
int *
|
||||||
@ -751,7 +751,7 @@ gnupg_release_process (pid_t pid)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/* Spawn a new process and immediatley detach from it. The name of
|
/* Spawn a new process and immediately detach from it. The name of
|
||||||
the program to exec is PGMNAME and its arguments are in ARGV (the
|
the program to exec is PGMNAME and its arguments are in ARGV (the
|
||||||
programname is automatically passed as first argument).
|
programname is automatically passed as first argument).
|
||||||
Environment strings in ENVP are set. An error is returned if
|
Environment strings in ENVP are set. An error is returned if
|
||||||
|
@ -799,7 +799,7 @@ gnupg_release_process (pid_t pid)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/* Spawn a new process and immediatley detach from it. The name of
|
/* Spawn a new process and immediately detach from it. The name of
|
||||||
the program to exec is PGMNAME and its arguments are in ARGV (the
|
the program to exec is PGMNAME and its arguments are in ARGV (the
|
||||||
programname is automatically passed as first argument).
|
programname is automatically passed as first argument).
|
||||||
Environment strings in ENVP are set. An error is returned if
|
Environment strings in ENVP are set. An error is returned if
|
||||||
|
@ -46,7 +46,7 @@ void close_all_fds (int first, int *except);
|
|||||||
/* Returns an array with all currently open file descriptors. The end
|
/* Returns an array with all currently open file descriptors. The end
|
||||||
of the array is marked by -1. The caller needs to release this
|
of the array is marked by -1. The caller needs to release this
|
||||||
array using the *standard free* and not with xfree. This allow the
|
array using the *standard free* and not with xfree. This allow the
|
||||||
use of this fucntion right at startup even before libgcrypt has
|
use of this function right at startup even before libgcrypt has
|
||||||
been initialized. Returns NULL on error and sets ERRNO accordingly. */
|
been initialized. Returns NULL on error and sets ERRNO accordingly. */
|
||||||
int *get_all_open_fds (void);
|
int *get_all_open_fds (void);
|
||||||
|
|
||||||
@ -168,7 +168,7 @@ void gnupg_kill_process (pid_t pid);
|
|||||||
void gnupg_release_process (pid_t pid);
|
void gnupg_release_process (pid_t pid);
|
||||||
|
|
||||||
|
|
||||||
/* Spawn a new process and immediatley detach from it. The name of
|
/* Spawn a new process and immediately detach from it. The name of
|
||||||
the program to exec is PGMNAME and its arguments are in ARGV (the
|
the program to exec is PGMNAME and its arguments are in ARGV (the
|
||||||
programname is automatically passed as first argument).
|
programname is automatically passed as first argument).
|
||||||
Environment strings in ENVP are set. An error is returned if
|
Environment strings in ENVP are set. An error is returned if
|
||||||
|
@ -216,7 +216,7 @@ findkey_locale (const char *key, const char *locname,
|
|||||||
/usr/share/gnupg/help.txt
|
/usr/share/gnupg/help.txt
|
||||||
|
|
||||||
Here LL denotes the two digit language code of the current locale.
|
Here LL denotes the two digit language code of the current locale.
|
||||||
If ONLY_CURRENT_LOCALE is set, the fucntion won;t fallback to the
|
If ONLY_CURRENT_LOCALE is set, the function won't fallback to the
|
||||||
english valiant ("help.txt") unless that locale has been requested.
|
english valiant ("help.txt") unless that locale has been requested.
|
||||||
|
|
||||||
The help file needs to be encoded in UTF-8, lines with a '#' in the
|
The help file needs to be encoded in UTF-8, lines with a '#' in the
|
||||||
|
@ -53,7 +53,7 @@ const char *i18n_utf8 (const char *string);
|
|||||||
const char *i18n_localegettext (const char *lc_messages, const char *string)
|
const char *i18n_localegettext (const char *lc_messages, const char *string)
|
||||||
GNUPG_GCC_ATTR_FORMAT_ARG(2);
|
GNUPG_GCC_ATTR_FORMAT_ARG(2);
|
||||||
|
|
||||||
/* If a module wants a local L_() fucntion we define it here. */
|
/* If a module wants a local L_() function we define it here. */
|
||||||
#ifdef LunderscoreIMPL
|
#ifdef LunderscoreIMPL
|
||||||
LunderscorePROTO
|
LunderscorePROTO
|
||||||
LunderscoreIMPL
|
LunderscoreIMPL
|
||||||
|
@ -1141,7 +1141,7 @@ iobuf_close (iobuf_t a)
|
|||||||
a->chain, NULL, &dummy_len)))
|
a->chain, NULL, &dummy_len)))
|
||||||
log_error ("IOBUFCTRL_FREE failed on close: %s\n", gpg_strerror (rc));
|
log_error ("IOBUFCTRL_FREE failed on close: %s\n", gpg_strerror (rc));
|
||||||
if (! rc && rc2)
|
if (! rc && rc2)
|
||||||
/* Whoops! An error occured. Save it in RC if we haven't
|
/* Whoops! An error occurred. Save it in RC if we haven't
|
||||||
already recorded an error. */
|
already recorded an error. */
|
||||||
rc = rc2;
|
rc = rc2;
|
||||||
|
|
||||||
|
@ -426,7 +426,7 @@ int iobuf_push_filter2 (iobuf_t a,
|
|||||||
IOBUF_DEBUG_MODE is not 0. */
|
IOBUF_DEBUG_MODE is not 0. */
|
||||||
int iobuf_print_chain (iobuf_t a);
|
int iobuf_print_chain (iobuf_t a);
|
||||||
|
|
||||||
/* Indicate that some error occured on the specified filter. */
|
/* Indicate that some error occurred on the specified filter. */
|
||||||
#define iobuf_set_error(a) do { (a)->error = 1; } while(0)
|
#define iobuf_set_error(a) do { (a)->error = 1; } while(0)
|
||||||
|
|
||||||
/* Return any pending error on filter A. */
|
/* Return any pending error on filter A. */
|
||||||
@ -458,7 +458,7 @@ off_t iobuf_tell (iobuf_t a);
|
|||||||
That is, data is appended to the buffer and the seek does not
|
That is, data is appended to the buffer and the seek does not
|
||||||
cause the size of the buffer to grow.
|
cause the size of the buffer to grow.
|
||||||
|
|
||||||
If no error occured, then any limit previous set by
|
If no error occurred, then any limit previous set by
|
||||||
iobuf_set_limit() is cleared. Further, any error on the filter
|
iobuf_set_limit() is cleared. Further, any error on the filter
|
||||||
(the file filter or the temp filter) is cleared.
|
(the file filter or the temp filter) is cleared.
|
||||||
|
|
||||||
@ -555,8 +555,8 @@ size_t iobuf_temp_to_buffer (iobuf_t a, byte * buffer, size_t buflen);
|
|||||||
/* Copies the data from the input iobuf SOURCE to the output iobuf
|
/* Copies the data from the input iobuf SOURCE to the output iobuf
|
||||||
DEST until either an error is encountered or EOF is reached.
|
DEST until either an error is encountered or EOF is reached.
|
||||||
Returns the number of bytes successfully written. If an error
|
Returns the number of bytes successfully written. If an error
|
||||||
occured, then any buffered bytes are not returned to SOURCE and are
|
occurred, then any buffered bytes are not returned to SOURCE and are
|
||||||
effectively lost. To check if an error occured, use
|
effectively lost. To check if an error occurred, use
|
||||||
iobuf_error. */
|
iobuf_error. */
|
||||||
size_t iobuf_copy (iobuf_t dest, iobuf_t source);
|
size_t iobuf_copy (iobuf_t dest, iobuf_t source);
|
||||||
|
|
||||||
|
@ -55,7 +55,7 @@
|
|||||||
|
|
||||||
/* Use a dummy value for LC_MESSAGES in case it is not defined. This
|
/* Use a dummy value for LC_MESSAGES in case it is not defined. This
|
||||||
works because we always test for HAVE_LC_MESSAGES and the core
|
works because we always test for HAVE_LC_MESSAGES and the core
|
||||||
fucntion takes the category as a string as well. */
|
function takes the category as a string as well. */
|
||||||
#ifndef HAVE_LC_MESSAGES
|
#ifndef HAVE_LC_MESSAGES
|
||||||
#define LC_MESSAGES 0
|
#define LC_MESSAGES 0
|
||||||
#endif
|
#endif
|
||||||
|
@ -204,7 +204,7 @@ fun_writer (void *cookie_arg, const void *buffer, size_t size)
|
|||||||
avoids the ugly mix of fd and estream code. */
|
avoids the ugly mix of fd and estream code. */
|
||||||
|
|
||||||
/* Note that we always try to reconnect to the socket but print
|
/* Note that we always try to reconnect to the socket but print
|
||||||
error messages only the first time an error occured. If
|
error messages only the first time an error occurred. If
|
||||||
RUNNING_DETACHED is set we don't fall back to stderr and even do
|
RUNNING_DETACHED is set we don't fall back to stderr and even do
|
||||||
not print any error messages. This is needed because detached
|
not print any error messages. This is needed because detached
|
||||||
processes often close stderr and by writing to file descriptor 2
|
processes often close stderr and by writing to file descriptor 2
|
||||||
|
@ -390,7 +390,7 @@ curve_supported_p (const char *name)
|
|||||||
|
|
||||||
/* Enumerate available and supported OpenPGP curves. The caller needs
|
/* Enumerate available and supported OpenPGP curves. The caller needs
|
||||||
to set the integer variable at ITERP to zero and keep on calling
|
to set the integer variable at ITERP to zero and keep on calling
|
||||||
this fucntion until NULL is returned. */
|
this function until NULL is returned. */
|
||||||
const char *
|
const char *
|
||||||
openpgp_enum_curves (int *iterp)
|
openpgp_enum_curves (int *iterp)
|
||||||
{
|
{
|
||||||
|
@ -97,7 +97,7 @@ static size_t lastallocatedarraysize;
|
|||||||
|
|
||||||
/* Return the names of standard environment variables one after the
|
/* Return the names of standard environment variables one after the
|
||||||
other. The caller needs to set the value at the address of
|
other. The caller needs to set the value at the address of
|
||||||
ITERATOR initally to 0 and then call this function until it returns
|
ITERATOR initially to 0 and then call this function until it returns
|
||||||
NULL. */
|
NULL. */
|
||||||
const char *
|
const char *
|
||||||
session_env_list_stdenvnames (int *iterator, const char **r_assname)
|
session_env_list_stdenvnames (int *iterator, const char **r_assname)
|
||||||
|
@ -335,7 +335,7 @@ hash_algo_from_sigval (const unsigned char *sigval)
|
|||||||
if (sskip (&s, &depth) || depth)
|
if (sskip (&s, &depth) || depth)
|
||||||
return 0; /* Invalid S-expression. */
|
return 0; /* Invalid S-expression. */
|
||||||
if (*s != '(')
|
if (*s != '(')
|
||||||
return 0; /* No futher list. */
|
return 0; /* No further list. */
|
||||||
/* Check whether this is (hash ALGO). */
|
/* Check whether this is (hash ALGO). */
|
||||||
s++;
|
s++;
|
||||||
n = snext (&s);
|
n = snext (&s);
|
||||||
|
@ -267,7 +267,7 @@ check_permissions(const char *path,int extension,int checkonly)
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
||||||
/* Wrapper around the usual sleep fucntion. This one won't wake up
|
/* Wrapper around the usual sleep function. This one won't wake up
|
||||||
before the sleep time has really elapsed. When build with Pth it
|
before the sleep time has really elapsed. When build with Pth it
|
||||||
merely calls pth_sleep and thus suspends only the current
|
merely calls pth_sleep and thus suspends only the current
|
||||||
thread. */
|
thread. */
|
||||||
@ -446,7 +446,7 @@ gnupg_tmpfile (void)
|
|||||||
some folks close them before an exec and the next file we open will
|
some folks close them before an exec and the next file we open will
|
||||||
get one of them assigned and thus any output (i.e. diagnostics) end
|
get one of them assigned and thus any output (i.e. diagnostics) end
|
||||||
up in that file (e.g. the trustdb). Not actually a gpg problem as
|
up in that file (e.g. the trustdb). Not actually a gpg problem as
|
||||||
this will hapen with almost all utilities when called in a wrong
|
this will happen with almost all utilities when called in a wrong
|
||||||
way. However we try to minimize the damage here and raise
|
way. However we try to minimize the damage here and raise
|
||||||
awareness of the problem.
|
awareness of the problem.
|
||||||
|
|
||||||
|
@ -79,7 +79,7 @@ test_make_canon_sexp_from_rsa_pk (void)
|
|||||||
size_t elen;
|
size_t elen;
|
||||||
unsigned char *result;
|
unsigned char *result;
|
||||||
size_t resultlen;
|
size_t resultlen;
|
||||||
gpg_err_code_t reverr; /* Expected error from the reverse fucntion. */
|
gpg_err_code_t reverr; /* Expected error from the reverse function. */
|
||||||
} tests[] = {
|
} tests[] = {
|
||||||
{
|
{
|
||||||
"\x82\xB4\x12\x48\x08\x48\xC0\x76\xAA\x8E\xF1\xF8\x7F\x5E\x9B\x89"
|
"\x82\xB4\x12\x48\x08\x48\xC0\x76\xAA\x8E\xF1\xF8\x7F\x5E\x9B\x89"
|
||||||
|
@ -502,7 +502,7 @@ do_get( const char *prompt, int hidden )
|
|||||||
do {
|
do {
|
||||||
#ifdef HAVE_W32CE_SYSTEM
|
#ifdef HAVE_W32CE_SYSTEM
|
||||||
/* Using getchar is not a correct solution but for now it
|
/* Using getchar is not a correct solution but for now it
|
||||||
doesn't matter becuase we have no real console at all. We
|
doesn't matter because we have no real console at all. We
|
||||||
should rework this as soon as we have switched this entire
|
should rework this as soon as we have switched this entire
|
||||||
module to estream. */
|
module to estream. */
|
||||||
c = getchar();
|
c = getchar();
|
||||||
|
@ -221,7 +221,7 @@ extern gpg_err_source_t default_errsource;
|
|||||||
|
|
||||||
/* Convenience function to return a gpg-error code for memory
|
/* Convenience function to return a gpg-error code for memory
|
||||||
allocation failures. This function makes sure that an error will
|
allocation failures. This function makes sure that an error will
|
||||||
be returned even if accidently ERRNO is not set. */
|
be returned even if accidentally ERRNO is not set. */
|
||||||
static inline gpg_error_t
|
static inline gpg_error_t
|
||||||
out_of_core (void)
|
out_of_core (void)
|
||||||
{
|
{
|
||||||
|
@ -696,7 +696,7 @@ make_find (struct cdb_make *cdbmp,
|
|||||||
{
|
{
|
||||||
struct cdb_rl *rl = cdbmp->cdb_rec[hval&255];
|
struct cdb_rl *rl = cdbmp->cdb_rec[hval&255];
|
||||||
int r, i;
|
int r, i;
|
||||||
int seeked = 0;
|
int sought = 0;
|
||||||
while(rl) {
|
while(rl) {
|
||||||
for(i = rl->cnt - 1; i >= 0; --i) { /* search backward */
|
for(i = rl->cnt - 1; i >= 0; --i) { /* search backward */
|
||||||
if (rl->rec[i].hval != hval)
|
if (rl->rec[i].hval != hval)
|
||||||
@ -711,7 +711,7 @@ make_find (struct cdb_make *cdbmp,
|
|||||||
return -1;
|
return -1;
|
||||||
cdbmp->cdb_bpos = cdbmp->cdb_buf;
|
cdbmp->cdb_bpos = cdbmp->cdb_buf;
|
||||||
}
|
}
|
||||||
seeked = 1;
|
sought = 1;
|
||||||
r = match(cdbmp->cdb_fd, rl->rec[i].rpos, key, klen);
|
r = match(cdbmp->cdb_fd, rl->rec[i].rpos, key, klen);
|
||||||
if (!r)
|
if (!r)
|
||||||
continue;
|
continue;
|
||||||
@ -725,7 +725,7 @@ make_find (struct cdb_make *cdbmp,
|
|||||||
}
|
}
|
||||||
rl = rl->next;
|
rl = rl->next;
|
||||||
}
|
}
|
||||||
if (seeked && lseek(cdbmp->cdb_fd, cdbmp->cdb_dpos, SEEK_SET) < 0)
|
if (sought && lseek(cdbmp->cdb_fd, cdbmp->cdb_dpos, SEEK_SET) < 0)
|
||||||
return -1;
|
return -1;
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
@ -331,7 +331,7 @@ put_cert (ksba_cert_t cert, int is_loaded, int is_trusted, void *fpr_buffer)
|
|||||||
/* Load certificates from the directory DIRNAME. All certificates
|
/* Load certificates from the directory DIRNAME. All certificates
|
||||||
matching the pattern "*.crt" or "*.der" are loaded. We assume that
|
matching the pattern "*.crt" or "*.der" are loaded. We assume that
|
||||||
certificates are DER encoded and not PEM encapsulated. The cache
|
certificates are DER encoded and not PEM encapsulated. The cache
|
||||||
should be in a locked state when calling this fucntion. */
|
should be in a locked state when calling this function. */
|
||||||
static gpg_error_t
|
static gpg_error_t
|
||||||
load_certs_from_dir (const char *dirname, int are_trusted)
|
load_certs_from_dir (const char *dirname, int are_trusted)
|
||||||
{
|
{
|
||||||
@ -687,7 +687,7 @@ get_cert_bysubject (const char *subject_dn, unsigned int seq)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
/* Return a value decribing the the class of PATTERN. The offset of
|
/* Return a value describing the the class of PATTERN. The offset of
|
||||||
the actual string to be used for the comparison is stored at
|
the actual string to be used for the comparison is stored at
|
||||||
R_OFFSET. The offset of the serialnumer is stored at R_SN_OFFSET. */
|
R_OFFSET. The offset of the serialnumer is stored at R_SN_OFFSET. */
|
||||||
static enum pattern_class
|
static enum pattern_class
|
||||||
|
@ -859,7 +859,7 @@ update_dir (crl_cache_t cache)
|
|||||||
field, thus we can compare it pretty easily. */
|
field, thus we can compare it pretty easily. */
|
||||||
*endp = 0;
|
*endp = 0;
|
||||||
e = find_entry ( cache->entries, fieldp);
|
e = find_entry ( cache->entries, fieldp);
|
||||||
*endp = ':'; /* Restore orginal line. */
|
*endp = ':'; /* Restore original line. */
|
||||||
if (e && e->deleted)
|
if (e && e->deleted)
|
||||||
{
|
{
|
||||||
/* Marked for deletion, so don't write it. */
|
/* Marked for deletion, so don't write it. */
|
||||||
@ -1212,7 +1212,7 @@ find_entry (crl_cache_entry_t first, const char *issuer_hash)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/* Create a new CRL cache. This fucntion is usually called only once.
|
/* Create a new CRL cache. This function is usually called only once.
|
||||||
never fail. */
|
never fail. */
|
||||||
void
|
void
|
||||||
crl_cache_init(void)
|
crl_cache_init(void)
|
||||||
|
@ -185,7 +185,7 @@ main (int argc, char **argv )
|
|||||||
log_set_prefix ("dirmngr-client",
|
log_set_prefix ("dirmngr-client",
|
||||||
GPGRT_LOG_WITH_PREFIX);
|
GPGRT_LOG_WITH_PREFIX);
|
||||||
|
|
||||||
/* For W32 we need to initialize the socket subsystem. Becuase we
|
/* For W32 we need to initialize the socket subsystem. Because we
|
||||||
don't use Pth we need to do this explicit. */
|
don't use Pth we need to do this explicit. */
|
||||||
#ifdef HAVE_W32_SYSTEM
|
#ifdef HAVE_W32_SYSTEM
|
||||||
{
|
{
|
||||||
|
@ -1987,7 +1987,7 @@ check_nonce (assuan_fd_t fd, assuan_sock_nonce_t *nonce)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/* Helper to call a connection's main fucntion. */
|
/* Helper to call a connection's main function. */
|
||||||
static void *
|
static void *
|
||||||
start_connection_thread (void *arg)
|
start_connection_thread (void *arg)
|
||||||
{
|
{
|
||||||
|
@ -165,7 +165,7 @@ struct my_opt_s
|
|||||||
unsigned int alarm_timeout; /* And for the alarm based timeout. */
|
unsigned int alarm_timeout; /* And for the alarm based timeout. */
|
||||||
int multi;
|
int multi;
|
||||||
|
|
||||||
estream_t outstream; /* Send output to thsi stream. */
|
estream_t outstream; /* Send output to this stream. */
|
||||||
|
|
||||||
/* Note that we can't use const for the strings because ldap_* are
|
/* Note that we can't use const for the strings because ldap_* are
|
||||||
not defined that way. */
|
not defined that way. */
|
||||||
|
@ -48,7 +48,7 @@
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if !defined(HAVE_GETADDRINFO) && !defined(USE_ADNS)
|
#if !defined(HAVE_GETADDRINFO) && !defined(USE_ADNS)
|
||||||
# error Either getaddrinfo or the ADNS libary is required.
|
# error Either getaddrinfo or the ADNS library is required.
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef WITHOUT_NPTH /* Give the Makefile a chance to build without Pth. */
|
#ifdef WITHOUT_NPTH /* Give the Makefile a chance to build without Pth. */
|
||||||
@ -511,7 +511,7 @@ resolve_addr_standard (const struct sockaddr *addr, int addrlen,
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/* This a wrapper around getaddrinfo with slighly different semantics.
|
/* This a wrapper around getaddrinfo with slightly different semantics.
|
||||||
NAME is the name to resolve.
|
NAME is the name to resolve.
|
||||||
PORT is the requested port or 0.
|
PORT is the requested port or 0.
|
||||||
WANT_FAMILY is either 0 (AF_UNSPEC), AF_INET6, or AF_INET4.
|
WANT_FAMILY is either 0 (AF_UNSPEC), AF_INET6, or AF_INET4.
|
||||||
|
@ -267,7 +267,7 @@ struct http_context_s
|
|||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
/* The global callback for the verification fucntion. */
|
/* The global callback for the verification function. */
|
||||||
static gpg_error_t (*tls_callback) (http_t, http_session_t, int);
|
static gpg_error_t (*tls_callback) (http_t, http_session_t, int);
|
||||||
|
|
||||||
/* The list of files with trusted CA certificates. */
|
/* The list of files with trusted CA certificates. */
|
||||||
|
@ -101,7 +101,7 @@ struct hostinfo_s
|
|||||||
static hostinfo_t *hosttable;
|
static hostinfo_t *hosttable;
|
||||||
static int hosttable_size;
|
static int hosttable_size;
|
||||||
|
|
||||||
/* The number of host slots we initally allocate for HOSTTABLE. */
|
/* The number of host slots we initially allocate for HOSTTABLE. */
|
||||||
#define INITIAL_HOSTTABLE_SIZE 10
|
#define INITIAL_HOSTTABLE_SIZE 10
|
||||||
|
|
||||||
|
|
||||||
|
@ -433,10 +433,10 @@ keyspec_to_ldap_filter (const char *keyspec, char **filter, int only_exact)
|
|||||||
|
|
||||||
If this function successfully interrogated the server, it returns
|
If this function successfully interrogated the server, it returns
|
||||||
0. If there was an LDAP error, it returns the LDAP error code. If
|
0. If there was an LDAP error, it returns the LDAP error code. If
|
||||||
an error occured, *basednp, etc., are undefined (and don't need to
|
an error occurred, *basednp, etc., are undefined (and don't need to
|
||||||
be freed.)
|
be freed.)
|
||||||
|
|
||||||
If no LDAP error occured, you still need to check that *basednp is
|
If no LDAP error occurred, you still need to check that *basednp is
|
||||||
valid. If it is NULL, then the server does not appear to be an
|
valid. If it is NULL, then the server does not appear to be an
|
||||||
OpenPGP Keyserver. In this case, you also do not need to xfree
|
OpenPGP Keyserver. In this case, you also do not need to xfree
|
||||||
*pgpkeyattrp. */
|
*pgpkeyattrp. */
|
||||||
@ -1616,7 +1616,7 @@ extract_attributes (LDAPMod ***modlist, char *line)
|
|||||||
|
|
||||||
fields = strsplit (line, ':', '\0', &field_count);
|
fields = strsplit (line, ':', '\0', &field_count);
|
||||||
if (field_count == 1)
|
if (field_count == 1)
|
||||||
/* We only have a single field. There is definately nothing to
|
/* We only have a single field. There is definitely nothing to
|
||||||
do. */
|
do. */
|
||||||
goto out;
|
goto out;
|
||||||
|
|
||||||
|
@ -160,7 +160,7 @@ destroy_wrapper (struct wrapper_context_s *ctx)
|
|||||||
|
|
||||||
/* Print the content of LINE to thye log stream but make sure to only
|
/* Print the content of LINE to thye log stream but make sure to only
|
||||||
print complete lines. Using NULL for LINE will flush any pending
|
print complete lines. Using NULL for LINE will flush any pending
|
||||||
output. LINE may be modified by this fucntion. */
|
output. LINE may be modified by this function. */
|
||||||
static void
|
static void
|
||||||
print_log_line (struct wrapper_context_s *ctx, char *line)
|
print_log_line (struct wrapper_context_s *ctx, char *line)
|
||||||
{
|
{
|
||||||
|
@ -382,7 +382,7 @@ parse_one_pattern (const char *pattern)
|
|||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Take the string STRING and escape it accoring to the URL rules.
|
/* Take the string STRING and escape it according to the URL rules.
|
||||||
Retun a newly allocated string. */
|
Retun a newly allocated string. */
|
||||||
static char *
|
static char *
|
||||||
escape4url (const char *string)
|
escape4url (const char *string)
|
||||||
@ -512,7 +512,7 @@ start_default_fetch_ldap (ctrl_t ctrl, cert_fetch_context_t *context,
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/* Prepare an LDAP query to return certificates maching PATTERNS using
|
/* Prepare an LDAP query to return certificates matching PATTERNS using
|
||||||
the SERVER. This function returns an error code or 0 and a CONTEXT
|
the SERVER. This function returns an error code or 0 and a CONTEXT
|
||||||
on success. */
|
on success. */
|
||||||
gpg_error_t
|
gpg_error_t
|
||||||
|
@ -36,7 +36,7 @@
|
|||||||
buffer will be returned. The caller should provide RESULT of at
|
buffer will be returned. The caller should provide RESULT of at
|
||||||
least strlen(STRING)/2 bytes. There is no error detection, the
|
least strlen(STRING)/2 bytes. There is no error detection, the
|
||||||
parsing stops at the first non hex character. With RESULT given as
|
parsing stops at the first non hex character. With RESULT given as
|
||||||
NULL, the fucntion does only return the size of the buffer which
|
NULL, the function does only return the size of the buffer which
|
||||||
would be needed. */
|
would be needed. */
|
||||||
size_t
|
size_t
|
||||||
unhexify (unsigned char *result, const char *string)
|
unhexify (unsigned char *result, const char *string)
|
||||||
|
@ -83,7 +83,7 @@ read_response (estream_t fp, unsigned char **r_buffer, size_t *r_buflen)
|
|||||||
return err;
|
return err;
|
||||||
}
|
}
|
||||||
if ( !(nread == bufsize-nbytes && !es_feof (fp)))
|
if ( !(nread == bufsize-nbytes && !es_feof (fp)))
|
||||||
{ /* Response succesfully received. */
|
{ /* Response successfully received. */
|
||||||
nbytes += nread;
|
nbytes += nread;
|
||||||
*r_buffer = buffer;
|
*r_buffer = buffer;
|
||||||
*r_buflen = nbytes;
|
*r_buflen = nbytes;
|
||||||
@ -116,7 +116,7 @@ read_response (estream_t fp, unsigned char **r_buffer, size_t *r_buflen)
|
|||||||
|
|
||||||
/* Construct an OCSP request, send it to the configured OCSP responder
|
/* Construct an OCSP request, send it to the configured OCSP responder
|
||||||
and parse the response. On success the OCSP context may be used to
|
and parse the response. On success the OCSP context may be used to
|
||||||
further process the reponse. */
|
further process the response. */
|
||||||
static gpg_error_t
|
static gpg_error_t
|
||||||
do_ocsp_request (ctrl_t ctrl, ksba_ocsp_t ocsp, gcry_md_hd_t md,
|
do_ocsp_request (ctrl_t ctrl, ksba_ocsp_t ocsp, gcry_md_hd_t md,
|
||||||
const char *url, ksba_cert_t cert, ksba_cert_t issuer_cert)
|
const char *url, ksba_cert_t cert, ksba_cert_t issuer_cert)
|
||||||
|
@ -597,7 +597,7 @@ validate_cert_chain (ctrl_t ctrl, ksba_cert_t cert, ksba_isotime_t r_exptime,
|
|||||||
break; /* Okay: a self-signed certicate is an end-point. */
|
break; /* Okay: a self-signed certicate is an end-point. */
|
||||||
}
|
}
|
||||||
|
|
||||||
/* To avoid loops, we use an arbitary limit on the length of
|
/* To avoid loops, we use an arbitrary limit on the length of
|
||||||
the chain. */
|
the chain. */
|
||||||
depth++;
|
depth++;
|
||||||
if (depth > maxdepth)
|
if (depth > maxdepth)
|
||||||
@ -757,7 +757,7 @@ validate_cert_chain (ctrl_t ctrl, ksba_cert_t cert, ksba_isotime_t r_exptime,
|
|||||||
here because this does not seem to make much sense. This
|
here because this does not seem to make much sense. This
|
||||||
might become a recursive process and we should better cache
|
might become a recursive process and we should better cache
|
||||||
our validity results to avoid double work. Far worse a
|
our validity results to avoid double work. Far worse a
|
||||||
catch-22 may happen for an improper setup hierachy and we
|
catch-22 may happen for an improper setup hierarchy and we
|
||||||
need a way to break up such a deadlock. */
|
need a way to break up such a deadlock. */
|
||||||
err = check_revocations (ctrl, chain);
|
err = check_revocations (ctrl, chain);
|
||||||
}
|
}
|
||||||
|
@ -85,7 +85,7 @@ encrypt_seskey (DEK *dek, DEK **seskey, byte *enckey)
|
|||||||
buf[0] = (*seskey)->algo;
|
buf[0] = (*seskey)->algo;
|
||||||
memcpy( buf + 1, (*seskey)->key, (*seskey)->keylen );
|
memcpy( buf + 1, (*seskey)->key, (*seskey)->keylen );
|
||||||
|
|
||||||
/* We only pass already checked values to the following fucntion,
|
/* We only pass already checked values to the following function,
|
||||||
thus we consider any failure as fatal. */
|
thus we consider any failure as fatal. */
|
||||||
if (openpgp_cipher_open (&hd, dek->algo, GCRY_CIPHER_MODE_CFB, 1))
|
if (openpgp_cipher_open (&hd, dek->algo, GCRY_CIPHER_MODE_CFB, 1))
|
||||||
BUG ();
|
BUG ();
|
||||||
|
@ -986,7 +986,7 @@ get_pubkey_byname (ctrl_t ctrl, GETKEY_CTX * retctx, PKT_public_key * pk,
|
|||||||
add_to_strlist (&namelist, fpr_string);
|
add_to_strlist (&namelist, fpr_string);
|
||||||
}
|
}
|
||||||
else if (!rc && !fpr && !did_key_byname)
|
else if (!rc && !fpr && !did_key_byname)
|
||||||
/* The acquisition method said no failure occured, but it
|
/* The acquisition method said no failure occurred, but it
|
||||||
didn't return a fingerprint. That's a failure. */
|
didn't return a fingerprint. That's a failure. */
|
||||||
{
|
{
|
||||||
no_fingerprint = 1;
|
no_fingerprint = 1;
|
||||||
@ -2297,7 +2297,7 @@ merge_selfsigs_subkey (KBNODE keyblock, KBNODE subnode)
|
|||||||
|
|
||||||
if (backsig)
|
if (backsig)
|
||||||
{
|
{
|
||||||
/* At ths point, backsig contains the most recent 0x19 sig.
|
/* At this point, backsig contains the most recent 0x19 sig.
|
||||||
Let's see if it is good. */
|
Let's see if it is good. */
|
||||||
|
|
||||||
/* 2==valid, 1==invalid, 0==didn't check */
|
/* 2==valid, 1==invalid, 0==didn't check */
|
||||||
|
@ -2008,7 +2008,7 @@ parse_tofu_db_format (const char *db_format)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/* This fucntion called to initialized a new control object. It is
|
/* This function called to initialized a new control object. It is
|
||||||
assumed that this object has been zeroed out before calling this
|
assumed that this object has been zeroed out before calling this
|
||||||
function. */
|
function. */
|
||||||
static void
|
static void
|
||||||
@ -3579,7 +3579,7 @@ main (int argc, char **argv)
|
|||||||
/* Do these after the switch(), so they can override settings. */
|
/* Do these after the switch(), so they can override settings. */
|
||||||
if(PGP6)
|
if(PGP6)
|
||||||
{
|
{
|
||||||
/* That does not anymore work becuase we have no more support
|
/* That does not anymore work because we have no more support
|
||||||
for v3 signatures. */
|
for v3 signatures. */
|
||||||
opt.disable_mdc=1;
|
opt.disable_mdc=1;
|
||||||
opt.escape_from=1;
|
opt.escape_from=1;
|
||||||
|
@ -242,7 +242,7 @@ g10_exit( int rc )
|
|||||||
|
|
||||||
|
|
||||||
/* Stub:
|
/* Stub:
|
||||||
* We have to override the trustcheck from pkclist.c becuase
|
* We have to override the trustcheck from pkclist.c because
|
||||||
* this utility assumes that all keys in the keyring are trustworthy
|
* this utility assumes that all keys in the keyring are trustworthy
|
||||||
*/
|
*/
|
||||||
int
|
int
|
||||||
|
@ -1638,7 +1638,7 @@ sec_to_pub_keyblock (kbnode_t sec_keyblock)
|
|||||||
/****************
|
/****************
|
||||||
* Ditto for secret keys. Handling is simpler than for public keys.
|
* Ditto for secret keys. Handling is simpler than for public keys.
|
||||||
* We allow secret key importing only when allow is true, this is so
|
* We allow secret key importing only when allow is true, this is so
|
||||||
* that a secret key can not be imported accidently and thereby tampering
|
* that a secret key can not be imported accidentally and thereby tampering
|
||||||
* with the trust calculation.
|
* with the trust calculation.
|
||||||
*/
|
*/
|
||||||
static int
|
static int
|
||||||
|
@ -156,7 +156,7 @@ static int lock_all (KEYDB_HANDLE hd);
|
|||||||
static void unlock_all (KEYDB_HANDLE hd);
|
static void unlock_all (KEYDB_HANDLE hd);
|
||||||
|
|
||||||
|
|
||||||
/* Check whether the keyid KID is in key id is definately not in the
|
/* Check whether the keyid KID is in key id is definitely not in the
|
||||||
database.
|
database.
|
||||||
|
|
||||||
Returns:
|
Returns:
|
||||||
|
@ -288,7 +288,7 @@ unsigned long keydb_get_skipped_counter (KEYDB_HANDLE hd);
|
|||||||
so that the next search starts at the beginning of the database
|
so that the next search starts at the beginning of the database
|
||||||
(the start of the first resource).
|
(the start of the first resource).
|
||||||
|
|
||||||
Returns 0 on success and an error code if an error occured.
|
Returns 0 on success and an error code if an error occurred.
|
||||||
(Currently, this function always returns 0 if HD is valid.) */
|
(Currently, this function always returns 0 if HD is valid.) */
|
||||||
gpg_error_t keydb_search_reset (KEYDB_HANDLE hd);
|
gpg_error_t keydb_search_reset (KEYDB_HANDLE hd);
|
||||||
|
|
||||||
@ -305,7 +305,7 @@ gpg_error_t keydb_search_reset (KEYDB_HANDLE hd);
|
|||||||
|
|
||||||
If no key matches the search description, returns
|
If no key matches the search description, returns
|
||||||
GPG_ERR_NOT_FOUND. If there was a match, returns 0. If an error
|
GPG_ERR_NOT_FOUND. If there was a match, returns 0. If an error
|
||||||
occured, returns an error code.
|
occurred, returns an error code.
|
||||||
|
|
||||||
The returned key is considered to be selected and the raw data can,
|
The returned key is considered to be selected and the raw data can,
|
||||||
for instance, be returned by calling keydb_get_keyblock(). */
|
for instance, be returned by calling keydb_get_keyblock(). */
|
||||||
@ -437,7 +437,7 @@ void getkey_disable_caches(void);
|
|||||||
occurs.
|
occurs.
|
||||||
|
|
||||||
If the data was not read from the cache, then the self-signed data
|
If the data was not read from the cache, then the self-signed data
|
||||||
has definately been merged into the public key using
|
has definitely been merged into the public key using
|
||||||
merge_selfsigs. */
|
merge_selfsigs. */
|
||||||
int get_pubkey( PKT_public_key *pk, u32 *keyid );
|
int get_pubkey( PKT_public_key *pk, u32 *keyid );
|
||||||
|
|
||||||
@ -751,7 +751,7 @@ KEYDB_HANDLE get_ctx_handle(GETKEY_CTX ctx);
|
|||||||
free_public_key (sk);
|
free_public_key (sk);
|
||||||
|
|
||||||
if (gpg_err_code (err) != GPG_ERR_EOF)
|
if (gpg_err_code (err) != GPG_ERR_EOF)
|
||||||
; // An error occured.
|
; // An error occurred.
|
||||||
*/
|
*/
|
||||||
gpg_error_t enum_secret_keys (ctrl_t ctrl, void **context, PKT_public_key *pk);
|
gpg_error_t enum_secret_keys (ctrl_t ctrl, void **context, PKT_public_key *pk);
|
||||||
|
|
||||||
|
@ -1284,7 +1284,7 @@ do_create_from_keygrip (ctrl_t ctrl, int algo, const char *hexkeygrip,
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/* Common code for the key generation fucntion gen_xxx. */
|
/* Common code for the key generation function gen_xxx. */
|
||||||
static int
|
static int
|
||||||
common_gen (const char *keyparms, int algo, const char *algoelem,
|
common_gen (const char *keyparms, int algo, const char *algoelem,
|
||||||
kbnode_t pub_root, u32 timestamp, u32 expireval, int is_subkey,
|
kbnode_t pub_root, u32 timestamp, u32 expireval, int is_subkey,
|
||||||
|
@ -785,7 +785,7 @@ format_hexfingerprint (const char *fingerprint, char *buffer, size_t buflen)
|
|||||||
|
|
||||||
/* Return the so called KEYGRIP which is the SHA-1 hash of the public
|
/* Return the so called KEYGRIP which is the SHA-1 hash of the public
|
||||||
key parameters expressed as an canoncial encoded S-Exp. ARRAY must
|
key parameters expressed as an canoncial encoded S-Exp. ARRAY must
|
||||||
be 20 bytes long. Returns 0 on sucess or an error code. */
|
be 20 bytes long. Returns 0 on success or an error code. */
|
||||||
gpg_error_t
|
gpg_error_t
|
||||||
keygrip_from_pk (PKT_public_key *pk, unsigned char *array)
|
keygrip_from_pk (PKT_public_key *pk, unsigned char *array)
|
||||||
{
|
{
|
||||||
|
@ -903,7 +903,7 @@ list_keyblock_pka (ctrl_t ctrl, kbnode_t keyblock)
|
|||||||
size_t datalen;
|
size_t datalen;
|
||||||
gpg_error_t err;
|
gpg_error_t err;
|
||||||
|
|
||||||
/* We do not have an export fucntion which allows to pass a
|
/* We do not have an export function which allows to pass a
|
||||||
keyblock, thus we need to search the key again. */
|
keyblock, thus we need to search the key again. */
|
||||||
err = export_pubkey_buffer (ctrl, hexfpr,
|
err = export_pubkey_buffer (ctrl, hexfpr,
|
||||||
EXPORT_DANE_FORMAT, NULL,
|
EXPORT_DANE_FORMAT, NULL,
|
||||||
|
@ -1215,7 +1215,7 @@ create_tmp_file (const char *template,
|
|||||||
|
|
||||||
# ifdef USE_ONLY_8DOT3
|
# ifdef USE_ONLY_8DOT3
|
||||||
/* Here is another Windoze bug?:
|
/* Here is another Windoze bug?:
|
||||||
* you cant rename("pubring.gpg.tmp", "pubring.gpg");
|
* you can't rename("pubring.gpg.tmp", "pubring.gpg");
|
||||||
* but rename("pubring.gpg.tmp", "pubring.aaa");
|
* but rename("pubring.gpg.tmp", "pubring.aaa");
|
||||||
* works. So we replace .gpg by .bak or .tmp
|
* works. So we replace .gpg by .bak or .tmp
|
||||||
*/
|
*/
|
||||||
|
@ -387,7 +387,7 @@ proc_pubkey_enc (ctrl_t ctrl, CTX c, PACKET *pkt)
|
|||||||
to the Libgcrypt defined one. This is due a chicken-egg
|
to the Libgcrypt defined one. This is due a chicken-egg
|
||||||
problem: We need to have code in Libgcrypt for a new
|
problem: We need to have code in Libgcrypt for a new
|
||||||
algorithm so to implement a proposed new algorithm before the
|
algorithm so to implement a proposed new algorithm before the
|
||||||
IANA will finally assign an OpenPGP indentifier. */
|
IANA will finally assign an OpenPGP identifier. */
|
||||||
snprintf (buf, sizeof buf, "%08lX%08lX %d 0",
|
snprintf (buf, sizeof buf, "%08lX%08lX %d 0",
|
||||||
(ulong)enc->keyid[0], (ulong)enc->keyid[1], enc->pubkey_algo);
|
(ulong)enc->keyid[0], (ulong)enc->keyid[1], enc->pubkey_algo);
|
||||||
write_status_text (STATUS_ENC_TO, buf);
|
write_status_text (STATUS_ENC_TO, buf);
|
||||||
@ -1091,7 +1091,7 @@ list_node (CTX c, kbnode_t node)
|
|||||||
{
|
{
|
||||||
|
|
||||||
log_debug ("FIXME: No way to print secret key packets here\n");
|
log_debug ("FIXME: No way to print secret key packets here\n");
|
||||||
/* fixme: We may use a fucntion to turn a secret key packet into
|
/* fixme: We may use a function to turn a secret key packet into
|
||||||
a public key one and use that here. */
|
a public key one and use that here. */
|
||||||
}
|
}
|
||||||
else if (node->pkt->pkttype == PKT_SIGNATURE)
|
else if (node->pkt->pkttype == PKT_SIGNATURE)
|
||||||
@ -1442,7 +1442,7 @@ do_proc_packets (ctrl_t ctrl, CTX c, iobuf_t a)
|
|||||||
* I used it. Adding the MDC check here is a hack.
|
* I used it. Adding the MDC check here is a hack.
|
||||||
* The right solution is to initiate another context for encrypted
|
* The right solution is to initiate another context for encrypted
|
||||||
* packet and not to reuse the current one ... It works right
|
* packet and not to reuse the current one ... It works right
|
||||||
* when there is a compression packet inbetween which adds just
|
* when there is a compression packet between which adds just
|
||||||
* an extra layer.
|
* an extra layer.
|
||||||
* Hmmm: Rewrite this whole module here??
|
* Hmmm: Rewrite this whole module here??
|
||||||
*/
|
*/
|
||||||
|
@ -98,7 +98,7 @@ register_secured_file (const char *fname)
|
|||||||
struct stat buf;
|
struct stat buf;
|
||||||
struct secured_file_item *sf;
|
struct secured_file_item *sf;
|
||||||
|
|
||||||
/* Note that we stop immediatley if something goes wrong here. */
|
/* Note that we stop immediately if something goes wrong here. */
|
||||||
if (stat (fname, &buf))
|
if (stat (fname, &buf))
|
||||||
log_fatal (_("fstat of '%s' failed in %s: %s\n"), fname,
|
log_fatal (_("fstat of '%s' failed in %s: %s\n"), fname,
|
||||||
"register_secured_file", strerror (errno));
|
"register_secured_file", strerror (errno));
|
||||||
@ -498,7 +498,7 @@ openpgp_cipher_blocklen (cipher_algo_t algo)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/****************
|
/****************
|
||||||
* Wrapper around the libgcrypt function with additonal checks on
|
* Wrapper around the libgcrypt function with additional checks on
|
||||||
* the OpenPGP contraints for the algo ID.
|
* the OpenPGP contraints for the algo ID.
|
||||||
*/
|
*/
|
||||||
int
|
int
|
||||||
@ -862,7 +862,7 @@ pct_expando(const char *string,struct expando_args *args)
|
|||||||
|
|
||||||
case 'f': /* Fingerprint of key being signed */
|
case 'f': /* Fingerprint of key being signed */
|
||||||
case 'p': /* Fingerprint of the primary key making the signature. */
|
case 'p': /* Fingerprint of the primary key making the signature. */
|
||||||
case 'g': /* Fingerprint of thge key making the signature. */
|
case 'g': /* Fingerprint of the key making the signature. */
|
||||||
{
|
{
|
||||||
byte array[MAX_FINGERPRINT_LEN];
|
byte array[MAX_FINGERPRINT_LEN];
|
||||||
size_t len;
|
size_t len;
|
||||||
@ -1074,7 +1074,7 @@ string_to_digest_algo (const char *string)
|
|||||||
{
|
{
|
||||||
int val;
|
int val;
|
||||||
|
|
||||||
/* FIXME: We should make use of our wrapper fucntion and not assume
|
/* FIXME: We should make use of our wrapper function and not assume
|
||||||
that there is a 1 to 1 mapping between OpenPGP and Libgcrypt. */
|
that there is a 1 to 1 mapping between OpenPGP and Libgcrypt. */
|
||||||
val = gcry_md_map_name (string);
|
val = gcry_md_map_name (string);
|
||||||
if (!val && string && (string[0]=='H' || string[0]=='h'))
|
if (!val && string && (string[0]=='H' || string[0]=='h'))
|
||||||
|
@ -116,7 +116,7 @@ struct
|
|||||||
int skip_verify;
|
int skip_verify;
|
||||||
int skip_hidden_recipients;
|
int skip_hidden_recipients;
|
||||||
|
|
||||||
/* TM_CLASSIC must be zero to accomodate trustdbs generated before
|
/* TM_CLASSIC must be zero to accommodate trustdbs generated before
|
||||||
we started storing the trust model inside the trustdb. */
|
we started storing the trust model inside the trustdb. */
|
||||||
enum
|
enum
|
||||||
{
|
{
|
||||||
|
@ -481,7 +481,7 @@ int search_packet( iobuf_t inp, PACKET *pkt, off_t *retpos, int with_uid );
|
|||||||
reached.
|
reached.
|
||||||
|
|
||||||
Returns -1 when end of file is reached or an error code, if an
|
Returns -1 when end of file is reached or an error code, if an
|
||||||
error occured. (Note: this function never returns 0, because it
|
error occurred. (Note: this function never returns 0, because it
|
||||||
effectively keeps going until it gets an EOF.) */
|
effectively keeps going until it gets an EOF.) */
|
||||||
int copy_all_packets( iobuf_t inp, iobuf_t out );
|
int copy_all_packets( iobuf_t inp, iobuf_t out );
|
||||||
|
|
||||||
@ -578,7 +578,7 @@ const byte *parse_sig_subpkt2 ( PKT_signature *sig,
|
|||||||
constraints.
|
constraints.
|
||||||
|
|
||||||
Returns 0 if the size is acceptable. Returns -2 if the buffer is
|
Returns 0 if the size is acceptable. Returns -2 if the buffer is
|
||||||
definately too short. To check for an error, check whether the
|
definitely too short. To check for an error, check whether the
|
||||||
return value is less than 0. */
|
return value is less than 0. */
|
||||||
int parse_one_sig_subpkt( const byte *buffer, size_t n, int type );
|
int parse_one_sig_subpkt( const byte *buffer, size_t n, int type );
|
||||||
|
|
||||||
|
@ -3019,7 +3019,7 @@ parse_mdc (IOBUF inp, int pkttype, unsigned long pktlen,
|
|||||||
/*
|
/*
|
||||||
* This packet is internally generated by us (ibn armor.c) to transfer
|
* This packet is internally generated by us (ibn armor.c) to transfer
|
||||||
* some information to the lower layer. To make sure that this packet
|
* some information to the lower layer. To make sure that this packet
|
||||||
* is really a GPG faked one and not one comming from outside, we
|
* is really a GPG faked one and not one coming from outside, we
|
||||||
* first check that there is a unique tag in it.
|
* first check that there is a unique tag in it.
|
||||||
*
|
*
|
||||||
* The format of such a control packet is:
|
* The format of such a control packet is:
|
||||||
|
@ -113,7 +113,7 @@ do_show_revocation_reason( PKT_signature *sig )
|
|||||||
void
|
void
|
||||||
show_revocation_reason( PKT_public_key *pk, int mode )
|
show_revocation_reason( PKT_public_key *pk, int mode )
|
||||||
{
|
{
|
||||||
/* Hmmm, this is not so easy becuase we have to duplicate the code
|
/* Hmmm, this is not so easy because we have to duplicate the code
|
||||||
* used in the trustbd to calculate the keyflags. We need to find
|
* used in the trustbd to calculate the keyflags. We need to find
|
||||||
* a clean way to check revocation certificates on keys and
|
* a clean way to check revocation certificates on keys and
|
||||||
* signatures. And there should be no duplicate code. Because we
|
* signatures. And there should be no duplicate code. Because we
|
||||||
@ -1076,7 +1076,7 @@ build_pk_list (ctrl_t ctrl,
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* Do group expand here too. The trick here is to continue
|
/* Do group expand here too. The trick here is to continue
|
||||||
the loop if any expansion occured. The code above will
|
the loop if any expansion occurred. The code above will
|
||||||
then list all expanded keys. */
|
then list all expanded keys. */
|
||||||
if (expand_id(answer,&backlog,0))
|
if (expand_id(answer,&backlog,0))
|
||||||
continue;
|
continue;
|
||||||
|
@ -31,7 +31,7 @@
|
|||||||
#include "main.h"
|
#include "main.h"
|
||||||
#include "options.h"
|
#include "options.h"
|
||||||
|
|
||||||
/* FIXME: Better chnage the fucntion name because mpi_ is used by
|
/* FIXME: Better change the function name because mpi_ is used by
|
||||||
gcrypt macros. */
|
gcrypt macros. */
|
||||||
gcry_mpi_t
|
gcry_mpi_t
|
||||||
get_mpi_from_sexp (gcry_sexp_t sexp, const char *item, int mpifmt)
|
get_mpi_from_sexp (gcry_sexp_t sexp, const char *item, int mpifmt)
|
||||||
|
@ -165,7 +165,7 @@ get_output_file (const byte *embedded_name, int embedded_namelen,
|
|||||||
;
|
;
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
/* Note: riscos stuff is not expected to wrok anymore. If we
|
/* Note: riscos stuff is not expected to work anymore. If we
|
||||||
want to port it again to riscos we should do most of the suff
|
want to port it again to riscos we should do most of the suff
|
||||||
in estream. FIXME: Consider to remove all riscos special
|
in estream. FIXME: Consider to remove all riscos special
|
||||||
cases. */
|
cases. */
|
||||||
|
@ -257,7 +257,7 @@ cmd_recipient (assuan_context_t ctx, char *line)
|
|||||||
then not be done for this key. If the policy is not to sign at all
|
then not be done for this key. If the policy is not to sign at all
|
||||||
if not all signer keys are valid, the client has to take care of
|
if not all signer keys are valid, the client has to take care of
|
||||||
this. All SIGNER commands are cumulative until a RESET but they
|
this. All SIGNER commands are cumulative until a RESET but they
|
||||||
are *not* reset by an SIGN command becuase it can be expected that
|
are *not* reset by an SIGN command because it can be expected that
|
||||||
set of signers are used for more than one sign operation.
|
set of signers are used for more than one sign operation.
|
||||||
|
|
||||||
Note that this command returns an INV_RECP status which is a bit
|
Note that this command returns an INV_RECP status which is a bit
|
||||||
|
@ -176,7 +176,7 @@ check_signature2 (PKT_signature *sig, gcry_md_hd_t digest, u32 *r_expiredate,
|
|||||||
* like this feature here.
|
* like this feature here.
|
||||||
*
|
*
|
||||||
* Note that before 2.0.10, we used RIPE-MD160 for the hash
|
* Note that before 2.0.10, we used RIPE-MD160 for the hash
|
||||||
* and accidently didn't include the timestamp and algorithm
|
* and accidentally didn't include the timestamp and algorithm
|
||||||
* information in the hash. Given that this feature is not
|
* information in the hash. Given that this feature is not
|
||||||
* commonly used and that a replay attacks detection should
|
* commonly used and that a replay attacks detection should
|
||||||
* not solely be based on this feature (because it does not
|
* not solely be based on this feature (because it does not
|
||||||
|
@ -179,7 +179,7 @@ sqlite3_stepx (sqlite3 *db,
|
|||||||
rc = sqlite3_step (stmt);
|
rc = sqlite3_step (stmt);
|
||||||
|
|
||||||
if (rc != SQLITE_ROW)
|
if (rc != SQLITE_ROW)
|
||||||
/* No more data (SQLITE_DONE) or an error occured. */
|
/* No more data (SQLITE_DONE) or an error occurred. */
|
||||||
break;
|
break;
|
||||||
|
|
||||||
if (! callback)
|
if (! callback)
|
||||||
|
@ -87,7 +87,7 @@ static int cache_entries;
|
|||||||
static int cache_is_dirty;
|
static int cache_is_dirty;
|
||||||
|
|
||||||
|
|
||||||
/* An object to pass infomation to cmp_krec_fpr. */
|
/* An object to pass information to cmp_krec_fpr. */
|
||||||
struct cmp_krec_fpr_struct
|
struct cmp_krec_fpr_struct
|
||||||
{
|
{
|
||||||
int pubkey_algo;
|
int pubkey_algo;
|
||||||
@ -95,7 +95,7 @@ struct cmp_krec_fpr_struct
|
|||||||
int fprlen;
|
int fprlen;
|
||||||
};
|
};
|
||||||
|
|
||||||
/* An object used to pass infomation to cmp_[s]dir. */
|
/* An object used to pass information to cmp_[s]dir. */
|
||||||
struct cmp_xdir_struct
|
struct cmp_xdir_struct
|
||||||
{
|
{
|
||||||
int pubkey_algo;
|
int pubkey_algo;
|
||||||
@ -446,7 +446,7 @@ tdbio_sync()
|
|||||||
/*
|
/*
|
||||||
* Simple transactions system:
|
* Simple transactions system:
|
||||||
* Everything between begin_transaction and end/cancel_transaction
|
* Everything between begin_transaction and end/cancel_transaction
|
||||||
* is not immediatly written but at the time of end_transaction.
|
* is not immediately written but at the time of end_transaction.
|
||||||
*
|
*
|
||||||
* NOTE: The transaction code is disabled in the 1.2 branch, as it is
|
* NOTE: The transaction code is disabled in the 1.2 branch, as it is
|
||||||
* not yet used.
|
* not yet used.
|
||||||
|
@ -54,7 +54,7 @@ g10_exit( int rc )
|
|||||||
|
|
||||||
|
|
||||||
/* Stub:
|
/* Stub:
|
||||||
* We have to override the trustcheck from pkclist.c becuase
|
* We have to override the trustcheck from pkclist.c because
|
||||||
* this utility assumes that all keys in the keyring are trustworthy
|
* this utility assumes that all keys in the keyring are trustworthy
|
||||||
*/
|
*/
|
||||||
int
|
int
|
||||||
|
@ -573,7 +573,7 @@ initdb (sqlite3 *db, enum db_type type)
|
|||||||
latter binding, we warn the user about the conflict and ask
|
latter binding, we warn the user about the conflict and ask
|
||||||
for a policy decision about the new binding. We also change
|
for a policy decision about the new binding. We also change
|
||||||
the old binding's policy to ask if it was auto. So that we
|
the old binding's policy to ask if it was auto. So that we
|
||||||
know why this occured, we also set conflict to 0xbaddecaf.
|
know why this occurred, we also set conflict to 0xbaddecaf.
|
||||||
*/
|
*/
|
||||||
if (type == DB_EMAIL || type == DB_COMBINED)
|
if (type == DB_EMAIL || type == DB_COMBINED)
|
||||||
rc = sqlite3_exec_printf
|
rc = sqlite3_exec_printf
|
||||||
|
@ -294,7 +294,7 @@ check_or_update_trustdb (void)
|
|||||||
|
|
||||||
/*
|
/*
|
||||||
* Return the validity information for PK. If the namehash is not
|
* Return the validity information for PK. If the namehash is not
|
||||||
* NULL, the validity of the corresponsing user ID is returned,
|
* NULL, the validity of the corresponding user ID is returned,
|
||||||
* otherwise, a reasonable value for the entire key is returned.
|
* otherwise, a reasonable value for the entire key is returned.
|
||||||
*/
|
*/
|
||||||
unsigned int
|
unsigned int
|
||||||
@ -641,7 +641,7 @@ clean_sigs_from_uid (kbnode_t keyblock, kbnode_t uidnode,
|
|||||||
compacted. To "compact" a user ID, we simply remove ALL signatures
|
compacted. To "compact" a user ID, we simply remove ALL signatures
|
||||||
except the self-sig that caused the user ID to be remove-worthy.
|
except the self-sig that caused the user ID to be remove-worthy.
|
||||||
We don't actually remove the user ID packet itself since it might
|
We don't actually remove the user ID packet itself since it might
|
||||||
be ressurected in a later merge. Note that this function requires
|
be resurrected in a later merge. Note that this function requires
|
||||||
that the caller has already done a merge_keys_and_selfsig().
|
that the caller has already done a merge_keys_and_selfsig().
|
||||||
|
|
||||||
TODO: change the import code to allow importing a uid with only a
|
TODO: change the import code to allow importing a uid with only a
|
||||||
|
@ -1887,7 +1887,7 @@ validate_keys (int interactive)
|
|||||||
u32 start_time, next_expire;
|
u32 start_time, next_expire;
|
||||||
|
|
||||||
/* Make sure we have all sigs cached. TODO: This is going to
|
/* Make sure we have all sigs cached. TODO: This is going to
|
||||||
require some architectual re-thinking, as it is agonizingly slow.
|
require some architectural re-thinking, as it is agonizingly slow.
|
||||||
Perhaps combine this with reset_trust_records(), or only check
|
Perhaps combine this with reset_trust_records(), or only check
|
||||||
the caches on keys that are actually involved in the web of
|
the caches on keys that are actually involved in the web of
|
||||||
trust. */
|
trust. */
|
||||||
|
@ -119,7 +119,7 @@ encrypt_keyblob (ctrl_t ctrl, void *keyblob, size_t keybloblen,
|
|||||||
|
|
||||||
|
|
||||||
/* Write a new file under the name FILENAME with the keyblob and an
|
/* Write a new file under the name FILENAME with the keyblob and an
|
||||||
appropriate header. This fucntion is called with a lock file in
|
appropriate header. This function is called with a lock file in
|
||||||
place and after checking that the filename does not exists. */
|
place and after checking that the filename does not exists. */
|
||||||
static gpg_error_t
|
static gpg_error_t
|
||||||
write_keyblob (const char *filename,
|
write_keyblob (const char *filename,
|
||||||
|
@ -118,7 +118,7 @@ mountinfo_del_mount (const char *container, const char *mountpoint,
|
|||||||
mtab_t m;
|
mtab_t m;
|
||||||
|
|
||||||
/* If a container or mountpint is givem search the RID via the
|
/* If a container or mountpint is givem search the RID via the
|
||||||
standard find fucntion. */
|
standard find function. */
|
||||||
if (container || mountpoint)
|
if (container || mountpoint)
|
||||||
{
|
{
|
||||||
err = mountinfo_find_mount (container, mountpoint, &rid);
|
err = mountinfo_find_mount (container, mountpoint, &rid);
|
||||||
|
@ -54,7 +54,7 @@
|
|||||||
|
|
||||||
** The OpenPGP and X.509 blobs
|
** The OpenPGP and X.509 blobs
|
||||||
|
|
||||||
The OpenPGP and X.509 blobs are very similiar, things which are
|
The OpenPGP and X.509 blobs are very similar, things which are
|
||||||
X.509 specific are noted like [X.509: xxx]
|
X.509 specific are noted like [X.509: xxx]
|
||||||
|
|
||||||
- u32 Length of this blob (including these 4 bytes)
|
- u32 Length of this blob (including these 4 bytes)
|
||||||
|
@ -45,7 +45,7 @@ ftello (FILE *stream)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
/* Read a block at the current postion and return it in r_blob.
|
/* Read a block at the current position and return it in r_blob.
|
||||||
r_blob may be NULL to simply skip the current block. */
|
r_blob may be NULL to simply skip the current block. */
|
||||||
int
|
int
|
||||||
_keybox_read_blob2 (KEYBOXBLOB *r_blob, FILE *fp, int *skipped_deleted)
|
_keybox_read_blob2 (KEYBOXBLOB *r_blob, FILE *fp, int *skipped_deleted)
|
||||||
|
@ -228,7 +228,7 @@ keybox_set_ephemeral (KEYBOX_HANDLE hd, int yes)
|
|||||||
|
|
||||||
|
|
||||||
/* Close the file of the resource identified by HD. For consistent
|
/* Close the file of the resource identified by HD. For consistent
|
||||||
results this fucntion closes the files of all handles pointing to
|
results this function closes the files of all handles pointing to
|
||||||
the resource identified by HD. */
|
the resource identified by HD. */
|
||||||
void
|
void
|
||||||
_keybox_close_file (KEYBOX_HANDLE hd)
|
_keybox_close_file (KEYBOX_HANDLE hd)
|
||||||
|
@ -70,7 +70,7 @@ struct keydb_search_desc
|
|||||||
union {
|
union {
|
||||||
const char *name;
|
const char *name;
|
||||||
unsigned char fpr[24];
|
unsigned char fpr[24];
|
||||||
u32 kid[2]; /* Note that this is in native endianess. */
|
u32 kid[2]; /* Note that this is in native endianness. */
|
||||||
unsigned char grip[20];
|
unsigned char grip[20];
|
||||||
} u;
|
} u;
|
||||||
int exact; /* Use exactly this key ('!' suffix in gpg). */
|
int exact; /* Use exactly this key ('!' suffix in gpg). */
|
||||||
|
@ -431,7 +431,7 @@ blob_cmp_mail (KEYBOXBLOB blob, const char *name, size_t namelen, int substr,
|
|||||||
if (namelen < 1)
|
if (namelen < 1)
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
/* Note that for X.509 we start at index 1 becuase index 0 is used
|
/* Note that for X.509 we start at index 1 because index 0 is used
|
||||||
for the issuer name. */
|
for the issuer name. */
|
||||||
for (idx=!!x509 ;idx < nuids; idx++)
|
for (idx=!!x509 ;idx < nuids; idx++)
|
||||||
{
|
{
|
||||||
|
@ -80,7 +80,7 @@ create_tmp_file (const char *template,
|
|||||||
|
|
||||||
# ifdef USE_ONLY_8DOT3
|
# ifdef USE_ONLY_8DOT3
|
||||||
/* Here is another Windoze bug?:
|
/* Here is another Windoze bug?:
|
||||||
* you cant rename("pubring.kbx.tmp", "pubring.kbx");
|
* you can't rename("pubring.kbx.tmp", "pubring.kbx");
|
||||||
* but rename("pubring.kbx.tmp", "pubring.aaa");
|
* but rename("pubring.kbx.tmp", "pubring.aaa");
|
||||||
* works. So we replace ".kbx" by ".kb_" or ".k__". Note that we
|
* works. So we replace ".kbx" by ".kb_" or ".k__". Note that we
|
||||||
* can't use ".bak" and ".tmp", because these suffixes are used by
|
* can't use ".bak" and ".tmp", because these suffixes are used by
|
||||||
|
10
scd/apdu.c
10
scd/apdu.c
@ -686,7 +686,7 @@ static int
|
|||||||
ct_get_status (int slot, unsigned int *status)
|
ct_get_status (int slot, unsigned int *status)
|
||||||
{
|
{
|
||||||
(void)slot;
|
(void)slot;
|
||||||
/* The status we returned is wrong but we don't care becuase ctAPI
|
/* The status we returned is wrong but we don't care because ctAPI
|
||||||
is not anymore required. */
|
is not anymore required. */
|
||||||
*status = APDU_CARD_USABLE|APDU_CARD_PRESENT|APDU_CARD_ACTIVE;
|
*status = APDU_CARD_USABLE|APDU_CARD_PRESENT|APDU_CARD_ACTIVE;
|
||||||
return 0;
|
return 0;
|
||||||
@ -2035,7 +2035,7 @@ open_pcsc_reader_wrapped (const char *portstr)
|
|||||||
int err;
|
int err;
|
||||||
unsigned int dummy_status;
|
unsigned int dummy_status;
|
||||||
|
|
||||||
/* Note that we use the constant and not the fucntion because this
|
/* Note that we use the constant and not the function because this
|
||||||
code won't be be used under Windows. */
|
code won't be be used under Windows. */
|
||||||
const char *wrapperpgm = GNUPG_LIBEXECDIR "/gnupg-pcsc-wrapper";
|
const char *wrapperpgm = GNUPG_LIBEXECDIR "/gnupg-pcsc-wrapper";
|
||||||
|
|
||||||
@ -3158,7 +3158,7 @@ apdu_open_reader (const char *portstr)
|
|||||||
with remote readers only. Note that the supplied CLOSEFNC will
|
with remote readers only. Note that the supplied CLOSEFNC will
|
||||||
only be called once and the slot will not be valid afther this.
|
only be called once and the slot will not be valid afther this.
|
||||||
|
|
||||||
If PORTSTR is NULL we default to the first availabe port.
|
If PORTSTR is NULL we default to the first available port.
|
||||||
*/
|
*/
|
||||||
int
|
int
|
||||||
apdu_open_remote_reader (const char *portstr,
|
apdu_open_remote_reader (const char *portstr,
|
||||||
@ -4052,7 +4052,7 @@ send_le (int slot, int class, int ins, int p0, int p1,
|
|||||||
The return value is the status word or -1 for an invalid SLOT or
|
The return value is the status word or -1 for an invalid SLOT or
|
||||||
other non card related error. If RETBUF is not NULL, it will
|
other non card related error. If RETBUF is not NULL, it will
|
||||||
receive an allocated buffer with the returned data. The length of
|
receive an allocated buffer with the returned data. The length of
|
||||||
that data will be put into *RETBUFLEN. The caller is reponsible
|
that data will be put into *RETBUFLEN. The caller is responsible
|
||||||
for releasing the buffer even in case of errors. */
|
for releasing the buffer even in case of errors. */
|
||||||
int
|
int
|
||||||
apdu_send_le(int slot, int extended_mode,
|
apdu_send_le(int slot, int extended_mode,
|
||||||
@ -4075,7 +4075,7 @@ apdu_send_le(int slot, int extended_mode,
|
|||||||
return value is the status word or -1 for an invalid SLOT or other
|
return value is the status word or -1 for an invalid SLOT or other
|
||||||
non card related error. If RETBUF is not NULL, it will receive an
|
non card related error. If RETBUF is not NULL, it will receive an
|
||||||
allocated buffer with the returned data. The length of that data
|
allocated buffer with the returned data. The length of that data
|
||||||
will be put into *RETBUFLEN. The caller is reponsible for
|
will be put into *RETBUFLEN. The caller is responsible for
|
||||||
releasing the buffer even in case of errors. */
|
releasing the buffer even in case of errors. */
|
||||||
int
|
int
|
||||||
apdu_send (int slot, int extended_mode,
|
apdu_send (int slot, int extended_mode,
|
||||||
|
@ -1223,7 +1223,7 @@ retrieve_key_material (FILE *fp, const char *hexkeyid,
|
|||||||
/* Get the public key for KEYNO and store it as an S-expresion with
|
/* Get the public key for KEYNO and store it as an S-expresion with
|
||||||
the APP handle. On error that field gets cleared. If we already
|
the APP handle. On error that field gets cleared. If we already
|
||||||
know about the public key we will just return. Note that this does
|
know about the public key we will just return. Note that this does
|
||||||
not mean a key is available; this is soley indicated by the
|
not mean a key is available; this is solely indicated by the
|
||||||
presence of the app->app_local->pk[KEYNO].key field.
|
presence of the app->app_local->pk[KEYNO].key field.
|
||||||
|
|
||||||
Note that GnuPG 1.x does not need this and it would be too time
|
Note that GnuPG 1.x does not need this and it would be too time
|
||||||
@ -1548,7 +1548,7 @@ do_learn_status (app_t app, ctrl_t ctrl, unsigned int flags)
|
|||||||
send_keypair_info (app, ctrl, 2);
|
send_keypair_info (app, ctrl, 2);
|
||||||
send_keypair_info (app, ctrl, 3);
|
send_keypair_info (app, ctrl, 3);
|
||||||
/* Note: We do not send the Cardholder Certificate, because that is
|
/* Note: We do not send the Cardholder Certificate, because that is
|
||||||
relativly long and for OpenPGP applications not really needed. */
|
relatively long and for OpenPGP applications not really needed. */
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1675,7 +1675,7 @@ check_pinpad_request (app_t app, pininfo_t *pininfo, int admin_pin)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/* Verify a CHV either using using the pinentry or if possibile by
|
/* Verify a CHV either using using the pinentry or if possible by
|
||||||
using a pinpad. PINCB and PINCB_ARG describe the usual callback
|
using a pinpad. PINCB and PINCB_ARG describe the usual callback
|
||||||
for the pinentry. CHVNO must be either 1 or 2. SIGCOUNT is only
|
for the pinentry. CHVNO must be either 1 or 2. SIGCOUNT is only
|
||||||
used with CHV1. PINVALUE is the address of a pointer which will
|
used with CHV1. PINVALUE is the address of a pointer which will
|
||||||
@ -4632,7 +4632,7 @@ app_select_openpgp (app_t app)
|
|||||||
}
|
}
|
||||||
xfree (relptr);
|
xfree (relptr);
|
||||||
|
|
||||||
/* Some of the first cards accidently don't set the
|
/* Some of the first cards accidentally don't set the
|
||||||
CHANGE_FORCE_CHV bit but allow it anyway. */
|
CHANGE_FORCE_CHV bit but allow it anyway. */
|
||||||
if (app->card_version <= 0x0100 && manufacturer == 1)
|
if (app->card_version <= 0x0100 && manufacturer == 1)
|
||||||
app->app_local->extcap.change_force_chv = 1;
|
app->app_local->extcap.change_force_chv = 1;
|
||||||
|
@ -276,7 +276,7 @@ typedef struct aodf_object_s *aodf_object_t;
|
|||||||
struct app_local_s
|
struct app_local_s
|
||||||
{
|
{
|
||||||
/* The home DF. Note, that we don't yet support a multilevel
|
/* The home DF. Note, that we don't yet support a multilevel
|
||||||
hierachy. Thus we assume this is directly below the MF. */
|
hierarchy. Thus we assume this is directly below the MF. */
|
||||||
unsigned short home_df;
|
unsigned short home_df;
|
||||||
|
|
||||||
/* The type of the card. */
|
/* The type of the card. */
|
||||||
|
@ -915,7 +915,7 @@ app_genkey (app_t app, ctrl_t ctrl, const char *keynostr, unsigned int flags,
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/* Perform a GET CHALLENGE operation. This fucntion is special as it
|
/* Perform a GET CHALLENGE operation. This function is special as it
|
||||||
directly accesses the card without any application specific
|
directly accesses the card without any application specific
|
||||||
wrapper. */
|
wrapper. */
|
||||||
gpg_error_t
|
gpg_error_t
|
||||||
|
@ -2321,7 +2321,7 @@ ccid_poll (ccid_driver_t handle)
|
|||||||
}
|
}
|
||||||
else if (msg[0] == RDR_to_PC_HardwareError)
|
else if (msg[0] == RDR_to_PC_HardwareError)
|
||||||
{
|
{
|
||||||
DEBUGOUT ("hardware error occured\n");
|
DEBUGOUT ("hardware error occurred\n");
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
@ -3136,7 +3136,7 @@ ccid_transceive (ccid_driver_t handle,
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (!!(tpdu[1] & 0x40) != handle->t1_nr)
|
if (!!(tpdu[1] & 0x40) != handle->t1_nr)
|
||||||
{ /* Reponse does not match our sequence number. */
|
{ /* Response does not match our sequence number. */
|
||||||
msg = send_buffer;
|
msg = send_buffer;
|
||||||
tpdu = msg + hdrlen;
|
tpdu = msg + hdrlen;
|
||||||
tpdu[0] = nad_byte;
|
tpdu[0] = nad_byte;
|
||||||
@ -3563,7 +3563,7 @@ ccid_transceive_secure (ccid_driver_t handle,
|
|||||||
handle->t1_ns ^= 1;
|
handle->t1_ns ^= 1;
|
||||||
|
|
||||||
if (!!(tpdu[1] & 0x40) != handle->t1_nr)
|
if (!!(tpdu[1] & 0x40) != handle->t1_nr)
|
||||||
{ /* Reponse does not match our sequence number. */
|
{ /* Response does not match our sequence number. */
|
||||||
DEBUGOUT ("I-block with wrong seqno received\n");
|
DEBUGOUT ("I-block with wrong seqno received\n");
|
||||||
return CCID_DRIVER_ERR_CARD_IO_ERROR;
|
return CCID_DRIVER_ERR_CARD_IO_ERROR;
|
||||||
}
|
}
|
||||||
@ -3603,7 +3603,7 @@ ccid_transceive_secure (ccid_driver_t handle,
|
|||||||
return CCID_DRIVER_ERR_CARD_IO_ERROR;
|
return CCID_DRIVER_ERR_CARD_IO_ERROR;
|
||||||
}
|
}
|
||||||
else if (!!(tpdu[1] & 0x10) == handle->t1_ns)
|
else if (!!(tpdu[1] & 0x10) == handle->t1_ns)
|
||||||
{ /* Reponse does not match our sequence number. */
|
{ /* Response does not match our sequence number. */
|
||||||
DEBUGOUT ("R-block with wrong seqno received on more bit\n");
|
DEBUGOUT ("R-block with wrong seqno received on more bit\n");
|
||||||
return CCID_DRIVER_ERR_CARD_IO_ERROR;
|
return CCID_DRIVER_ERR_CARD_IO_ERROR;
|
||||||
}
|
}
|
||||||
|
@ -529,7 +529,7 @@ open_card (ctrl_t ctrl, const char *apptype)
|
|||||||
static const char hlp_serialno[] =
|
static const char hlp_serialno[] =
|
||||||
"SERIALNO [<apptype>]\n"
|
"SERIALNO [<apptype>]\n"
|
||||||
"\n"
|
"\n"
|
||||||
"Return the serial number of the card using a status reponse. This\n"
|
"Return the serial number of the card using a status response. This\n"
|
||||||
"function should be used to check for the presence of a card.\n"
|
"function should be used to check for the presence of a card.\n"
|
||||||
"\n"
|
"\n"
|
||||||
"If APPTYPE is given, an application of that type is selected and an\n"
|
"If APPTYPE is given, an application of that type is selected and an\n"
|
||||||
@ -1487,7 +1487,7 @@ static const char hlp_passwd[] =
|
|||||||
"PASSWD [--reset] [--nullpin] <chvno>\n"
|
"PASSWD [--reset] [--nullpin] <chvno>\n"
|
||||||
"\n"
|
"\n"
|
||||||
"Change the PIN or, if --reset is given, reset the retry counter of\n"
|
"Change the PIN or, if --reset is given, reset the retry counter of\n"
|
||||||
"the card holder verfication vector CHVNO. The option --nullpin is\n"
|
"the card holder verification vector CHVNO. The option --nullpin is\n"
|
||||||
"used for TCOS cards to set the initial PIN. The format of CHVNO\n"
|
"used for TCOS cards to set the initial PIN. The format of CHVNO\n"
|
||||||
"depends on the card application.";
|
"depends on the card application.";
|
||||||
static gpg_error_t
|
static gpg_error_t
|
||||||
@ -1837,7 +1837,7 @@ static const char hlp_apdu[] =
|
|||||||
" S CARD-ATR 3BFA1300FF813180450031C173C00100009000B1\n"
|
" S CARD-ATR 3BFA1300FF813180450031C173C00100009000B1\n"
|
||||||
"\n"
|
"\n"
|
||||||
"Using the option --more handles the card status word MORE_DATA\n"
|
"Using the option --more handles the card status word MORE_DATA\n"
|
||||||
"(61xx) and concatenates all reponses to one block.\n"
|
"(61xx) and concatenates all responses to one block.\n"
|
||||||
"\n"
|
"\n"
|
||||||
"Using the option \"--exlen\" the returned APDU may use extended\n"
|
"Using the option \"--exlen\" the returned APDU may use extended\n"
|
||||||
"length up to N bytes. If N is not given a default value is used\n"
|
"length up to N bytes. If N is not given a default value is used\n"
|
||||||
|
@ -291,7 +291,7 @@ iso7816_verify_kp (int slot, int chvno, pininfo_t *pininfo)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* Perform a VERIFY command on SLOT using the card holder verification
|
/* Perform a VERIFY command on SLOT using the card holder verification
|
||||||
vector CHVNO with a CHV of lenght CHVLEN. Returns 0 on success. */
|
vector CHVNO with a CHV of length CHVLEN. Returns 0 on success. */
|
||||||
gpg_error_t
|
gpg_error_t
|
||||||
iso7816_verify (int slot, int chvno, const char *chv, size_t chvlen)
|
iso7816_verify (int slot, int chvno, const char *chv, size_t chvlen)
|
||||||
{
|
{
|
||||||
|
@ -540,7 +540,7 @@ base64_finish_write (struct writer_cb_parm_s *parm)
|
|||||||
|
|
||||||
|
|
||||||
/* Create a reader for the given file descriptor. Depending on the
|
/* Create a reader for the given file descriptor. Depending on the
|
||||||
control information an input decoding is automagically choosen.
|
control information an input decoding is automagically chosen.
|
||||||
The function returns a Base64Context object which must be passed to
|
The function returns a Base64Context object which must be passed to
|
||||||
the gpgme_destroy_reader function. The created KsbaReader object
|
the gpgme_destroy_reader function. The created KsbaReader object
|
||||||
is also returned, but the caller must not call the
|
is also returned, but the caller must not call the
|
||||||
@ -621,7 +621,7 @@ gpgsm_destroy_reader (Base64Context ctx)
|
|||||||
|
|
||||||
/* Create a writer for the given STREAM. Depending on
|
/* Create a writer for the given STREAM. Depending on
|
||||||
the control information an output encoding is automagically
|
the control information an output encoding is automagically
|
||||||
choosen. The function returns a Base64Context object which must be
|
chosen. The function returns a Base64Context object which must be
|
||||||
passed to the gpgme_destroy_writer function. The created
|
passed to the gpgme_destroy_writer function. The created
|
||||||
KsbaWriter object is also returned, but the caller must not call
|
KsbaWriter object is also returned, but the caller must not call
|
||||||
the ksba_reader_release function on it. */
|
the ksba_reader_release function on it. */
|
||||||
|
@ -578,7 +578,7 @@ store_serialno (const char *line)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/* Callback for the gpgsm_agent_serialno fucntion. */
|
/* Callback for the gpgsm_agent_serialno function. */
|
||||||
static gpg_error_t
|
static gpg_error_t
|
||||||
scd_serialno_status_cb (void *opaque, const char *line)
|
scd_serialno_status_cb (void *opaque, const char *line)
|
||||||
{
|
{
|
||||||
@ -630,7 +630,7 @@ gpgsm_agent_scd_serialno (ctrl_t ctrl, char **r_serialno)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
/* Callback for the gpgsm_agent_serialno fucntion. */
|
/* Callback for the gpgsm_agent_serialno function. */
|
||||||
static gpg_error_t
|
static gpg_error_t
|
||||||
scd_keypairinfo_status_cb (void *opaque, const char *line)
|
scd_keypairinfo_status_cb (void *opaque, const char *line)
|
||||||
{
|
{
|
||||||
|
@ -239,7 +239,7 @@ start_dirmngr (ctrl_t ctrl)
|
|||||||
dirmngr_ctx_locked = 1;
|
dirmngr_ctx_locked = 1;
|
||||||
|
|
||||||
err = start_dirmngr_ext (ctrl, &dirmngr_ctx);
|
err = start_dirmngr_ext (ctrl, &dirmngr_ctx);
|
||||||
/* We do not check ERR but the existance of a context because the
|
/* We do not check ERR but the existence of a context because the
|
||||||
error might come from a failed command send to the dirmngr.
|
error might come from a failed command send to the dirmngr.
|
||||||
Fixme: Why don't we close the drimngr context if we encountered
|
Fixme: Why don't we close the drimngr context if we encountered
|
||||||
an error in prepare_dirmngr? */
|
an error in prepare_dirmngr? */
|
||||||
|
@ -1784,7 +1784,7 @@ do_validate_chain (ctrl_t ctrl, ksba_cert_t cert, ksba_isotime_t checktime_arg,
|
|||||||
/* Note that it is possible for the last certificate in the
|
/* Note that it is possible for the last certificate in the
|
||||||
chain (i.e. our target certificate) that it has not yet
|
chain (i.e. our target certificate) that it has not yet
|
||||||
been stored in the keybox and thus the flag can't be set.
|
been stored in the keybox and thus the flag can't be set.
|
||||||
We ignore this error becuase it will later be stored
|
We ignore this error because it will later be stored
|
||||||
anyway. */
|
anyway. */
|
||||||
err = keydb_set_cert_flags (ci->cert, 1, KEYBOX_FLAG_BLOB, 0,
|
err = keydb_set_cert_flags (ci->cert, 1, KEYBOX_FLAG_BLOB, 0,
|
||||||
KEYBOX_FLAG_BLOB_EPHEMERAL, 0);
|
KEYBOX_FLAG_BLOB_EPHEMERAL, 0);
|
||||||
@ -2079,7 +2079,7 @@ get_regtp_ca_info (ctrl_t ctrl, ksba_cert_t cert, int *chainlen)
|
|||||||
until we have found the root. Because we are only interested in
|
until we have found the root. Because we are only interested in
|
||||||
German Bundesnetzagentur (former RegTP) derived certificates 3
|
German Bundesnetzagentur (former RegTP) derived certificates 3
|
||||||
levels are enough. (The German signature law demands a 3 tier
|
levels are enough. (The German signature law demands a 3 tier
|
||||||
hierachy; thus there is only one CA between the EE and the Root
|
hierarchy; thus there is only one CA between the EE and the Root
|
||||||
CA.) */
|
CA.) */
|
||||||
memset (&array, 0, sizeof array);
|
memset (&array, 0, sizeof array);
|
||||||
|
|
||||||
|
@ -214,7 +214,7 @@ static ARGPARSE_OPTS opts[] = {
|
|||||||
ARGPARSE_c (aExport, "export", N_("export certificates")),
|
ARGPARSE_c (aExport, "export", N_("export certificates")),
|
||||||
|
|
||||||
/* We use -raw and not -p1 for pkcs#1 secret key export so that it
|
/* We use -raw and not -p1 for pkcs#1 secret key export so that it
|
||||||
won't accidently be used in case -p12 was intended. */
|
won't accidentally be used in case -p12 was intended. */
|
||||||
ARGPARSE_c (aExportSecretKeyP12, "export-secret-key-p12", "@"),
|
ARGPARSE_c (aExportSecretKeyP12, "export-secret-key-p12", "@"),
|
||||||
ARGPARSE_c (aExportSecretKeyP8, "export-secret-key-p8", "@"),
|
ARGPARSE_c (aExportSecretKeyP8, "export-secret-key-p8", "@"),
|
||||||
ARGPARSE_c (aExportSecretKeyRaw, "export-secret-key-raw", "@"),
|
ARGPARSE_c (aExportSecretKeyRaw, "export-secret-key-raw", "@"),
|
||||||
@ -1487,7 +1487,7 @@ main ( int argc, char **argv)
|
|||||||
log_info (_("WARNING: program may create a core file!\n"));
|
log_info (_("WARNING: program may create a core file!\n"));
|
||||||
|
|
||||||
/* if (opt.qualsig_approval && !opt.quiet) */
|
/* if (opt.qualsig_approval && !opt.quiet) */
|
||||||
/* log_info (_("This software has offically been approved to " */
|
/* log_info (_("This software has officially been approved to " */
|
||||||
/* "create and verify\n" */
|
/* "create and verify\n" */
|
||||||
/* "qualified signatures according to German law.\n")); */
|
/* "qualified signatures according to German law.\n")); */
|
||||||
|
|
||||||
@ -1524,7 +1524,7 @@ main ( int argc, char **argv)
|
|||||||
|
|
||||||
set_debug ();
|
set_debug ();
|
||||||
|
|
||||||
/* Although we alwasy use gpgsm_exit, we better install a regualr
|
/* Although we always use gpgsm_exit, we better install a regualr
|
||||||
exit handler so that at least the secure memory gets wiped
|
exit handler so that at least the secure memory gets wiped
|
||||||
out. */
|
out. */
|
||||||
if (atexit (emergency_cleanup))
|
if (atexit (emergency_cleanup))
|
||||||
|
@ -747,7 +747,7 @@ parse_p12 (ctrl_t ctrl, ksba_reader_t reader, struct stats_s *stats)
|
|||||||
goto leave;
|
goto leave;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* GnuPG 2.0.4 accidently created binary P12 files with the string
|
/* GnuPG 2.0.4 accidentally created binary P12 files with the string
|
||||||
"The passphrase is %s encoded.\n\n" prepended to the ASN.1 data.
|
"The passphrase is %s encoded.\n\n" prepended to the ASN.1 data.
|
||||||
We fix that here. */
|
We fix that here. */
|
||||||
if (p12buflen > 29 && !memcmp (p12buffer, "The passphrase is ", 18))
|
if (p12buflen > 29 && !memcmp (p12buffer, "The passphrase is ", 18))
|
||||||
|
@ -478,7 +478,7 @@ keydb_get_resource_name (KEYDB_HANDLE hd)
|
|||||||
return s? s: "";
|
return s? s: "";
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Switch the handle into ephemeral mode and return the orginal value. */
|
/* Switch the handle into ephemeral mode and return the original value. */
|
||||||
int
|
int
|
||||||
keydb_set_ephemeral (KEYDB_HANDLE hd, int yes)
|
keydb_set_ephemeral (KEYDB_HANDLE hd, int yes)
|
||||||
{
|
{
|
||||||
|
@ -273,7 +273,7 @@ parse_tag (unsigned char const **buffer, size_t *size, struct tag_info *ti)
|
|||||||
-- two bytes in INPUT.
|
-- two bytes in INPUT.
|
||||||
|
|
||||||
Create a new buffer with the content of that octet string. INPUT
|
Create a new buffer with the content of that octet string. INPUT
|
||||||
is the orginal buffer with a length as stored at LENGTH. Returns
|
is the original buffer with a length as stored at LENGTH. Returns
|
||||||
NULL on error or a new malloced buffer with the length of this new
|
NULL on error or a new malloced buffer with the length of this new
|
||||||
buffer stored at LENGTH and the number of bytes parsed from input
|
buffer stored at LENGTH and the number of bytes parsed from input
|
||||||
are added to the value stored at INPUT_CONSUMED. INPUT_CONSUMED is
|
are added to the value stored at INPUT_CONSUMED. INPUT_CONSUMED is
|
||||||
@ -679,7 +679,7 @@ parse_bag_encrypted_data (const unsigned char *buffer, size_t length,
|
|||||||
unsigned char *plain = NULL;
|
unsigned char *plain = NULL;
|
||||||
int bad_pass = 0;
|
int bad_pass = 0;
|
||||||
unsigned char *cram_buffer = NULL;
|
unsigned char *cram_buffer = NULL;
|
||||||
size_t consumed = 0; /* Number of bytes consumed from the orginal buffer. */
|
size_t consumed = 0; /* Number of bytes consumed from the original buffer. */
|
||||||
int is_3des = 0;
|
int is_3des = 0;
|
||||||
int is_pbes2 = 0;
|
int is_pbes2 = 0;
|
||||||
gcry_mpi_t *result = NULL;
|
gcry_mpi_t *result = NULL;
|
||||||
@ -1193,7 +1193,7 @@ parse_bag_data (const unsigned char *buffer, size_t length, int startoffset,
|
|||||||
gcry_mpi_t *result = NULL;
|
gcry_mpi_t *result = NULL;
|
||||||
int result_count, i;
|
int result_count, i;
|
||||||
unsigned char *cram_buffer = NULL;
|
unsigned char *cram_buffer = NULL;
|
||||||
size_t consumed = 0; /* Number of bytes consumed from the orginal buffer. */
|
size_t consumed = 0; /* Number of bytes consumed from the original buffer. */
|
||||||
int is_pbes2 = 0;
|
int is_pbes2 = 0;
|
||||||
|
|
||||||
where = "start";
|
where = "start";
|
||||||
|
@ -184,7 +184,7 @@ gpgsm_is_in_qualified_list (ctrl_t ctrl, ksba_cert_t cert, char *country)
|
|||||||
|
|
||||||
/* We know that CERT is a qualified certificate. Ask the user for
|
/* We know that CERT is a qualified certificate. Ask the user for
|
||||||
consent to actually create a signature using this certificate.
|
consent to actually create a signature using this certificate.
|
||||||
Returns: 0 for yes, GPG_ERR_CANCEL for no or any otehr error
|
Returns: 0 for yes, GPG_ERR_CANCEL for no or any other error
|
||||||
code. */
|
code. */
|
||||||
gpg_error_t
|
gpg_error_t
|
||||||
gpgsm_qualified_consent (ctrl_t ctrl, ksba_cert_t cert)
|
gpgsm_qualified_consent (ctrl_t ctrl, ksba_cert_t cert)
|
||||||
|
@ -425,7 +425,7 @@ static const char hlp_signer[] =
|
|||||||
"used, the signing will then not be done for this key. If the policy\n"
|
"used, the signing will then not be done for this key. If the policy\n"
|
||||||
"is not to sign at all if not all signer keys are valid, the client\n"
|
"is not to sign at all if not all signer keys are valid, the client\n"
|
||||||
"has to take care of this. All SIGNER commands are cumulative until\n"
|
"has to take care of this. All SIGNER commands are cumulative until\n"
|
||||||
"a RESET but they are *not* reset by an SIGN command becuase it can\n"
|
"a RESET but they are *not* reset by an SIGN command because it can\n"
|
||||||
"be expected that set of signers are used for more than one sign\n"
|
"be expected that set of signers are used for more than one sign\n"
|
||||||
"operation.";
|
"operation.";
|
||||||
static gpg_error_t
|
static gpg_error_t
|
||||||
|
@ -319,7 +319,7 @@ get_regerror (int errcode, regex_t *compiled)
|
|||||||
|
|
||||||
/* Parse the pattern given in the memory aread DATA/DATALEN and return
|
/* Parse the pattern given in the memory aread DATA/DATALEN and return
|
||||||
a new pattern array. The end of the array is indicated by a NULL
|
a new pattern array. The end of the array is indicated by a NULL
|
||||||
entry. On error an error message is printed and the fucntion
|
entry. On error an error message is printed and the function
|
||||||
returns NULL. Note that the function modifies DATA and assumes
|
returns NULL. Note that the function modifies DATA and assumes
|
||||||
that data is nul terminated (even if this is one byte past
|
that data is nul terminated (even if this is one byte past
|
||||||
DATALEN). */
|
DATALEN). */
|
||||||
@ -446,7 +446,7 @@ match_p (const char *string, pattern_t *patarray)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/* Actual processing of the input. This fucntion does not return an
|
/* Actual processing of the input. This function does not return an
|
||||||
error code but exits as soon as a match has been found. */
|
error code but exits as soon as a match has been found. */
|
||||||
static void
|
static void
|
||||||
process (FILE *fp, pattern_t *patarray)
|
process (FILE *fp, pattern_t *patarray)
|
||||||
|
@ -1271,7 +1271,7 @@ gc_component_reload (int component)
|
|||||||
|
|
||||||
/* More or less Robust version of dgettext. It has the side effect of
|
/* More or less Robust version of dgettext. It has the side effect of
|
||||||
switching the codeset to utf-8 because this is what we want to
|
switching the codeset to utf-8 because this is what we want to
|
||||||
output. In theory it is posible to keep the orginal code set and
|
output. In theory it is posible to keep the original code set and
|
||||||
switch back for regular disgnostic output (redefine "_(" for that)
|
switch back for regular disgnostic output (redefine "_(" for that)
|
||||||
but given the natur of this tool, being something invoked from
|
but given the natur of this tool, being something invoked from
|
||||||
other pograms, it does not make much sense. */
|
other pograms, it does not make much sense. */
|
||||||
@ -3300,7 +3300,7 @@ gc_component_change_options (int component, estream_t in, estream_t out)
|
|||||||
int i;
|
int i;
|
||||||
int saved_errno = errno;
|
int saved_errno = errno;
|
||||||
|
|
||||||
/* An error occured or a dry-run is requested. */
|
/* An error occurred or a dry-run is requested. */
|
||||||
for (i = 0; i < GC_BACKEND_NR; i++)
|
for (i = 0; i < GC_BACKEND_NR; i++)
|
||||||
{
|
{
|
||||||
if (src_filename[i])
|
if (src_filename[i])
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user