1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-12-24 10:39:57 +01:00

* getkey.c (get_pubkey_direct): Don't cache keys retrieved via this

function as they may not have all their fields filled in.

* sig-check.c (signature_check2): Use new is_primary flag to check rather
than comparing main_keyid with keyid as this still works in the case of a
not fully filled in pk.
This commit is contained in:
David Shaw 2002-10-04 22:09:18 +00:00
parent 2e21d851e9
commit d1738ac243
3 changed files with 15 additions and 5 deletions

View File

@ -1,3 +1,12 @@
2002-10-04 David Shaw <dshaw@jabberwocky.com>
* getkey.c (get_pubkey_direct): Don't cache keys retrieved via
this function as they may not have all their fields filled in.
* sig-check.c (signature_check2): Use new is_primary flag to check
rather than comparing main_keyid with keyid as this still works in
the case of a not fully filled in pk.
2002-10-04 Werner Koch <wk@gnupg.org> 2002-10-04 Werner Koch <wk@gnupg.org>
* passphrase.c (agent_get_passphrase): Fixed signed/unsigned char * passphrase.c (agent_get_passphrase): Fixed signed/unsigned char
@ -8,7 +17,7 @@
* keylist.c (print_capabilities): Secret-parts-missing keys should * keylist.c (print_capabilities): Secret-parts-missing keys should
show that fact in the capabilities. show that fact in the capabilities.
* packet.h, parse_packet (parse_key): Add is_primary flag for * packet.h, parse_packet.c (parse_key): Add is_primary flag for
public keys (it already exists for secret keys). public keys (it already exists for secret keys).
* keylist.c (print_capabilities): Only primary signing keys can * keylist.c (print_capabilities): Only primary signing keys can

View File

@ -419,7 +419,10 @@ get_pubkey_direct (PKT_public_key *pk, u32 *keyid)
|| keyblock->pkt->pkttype == PKT_PUBLIC_SUBKEY ); || keyblock->pkt->pkttype == PKT_PUBLIC_SUBKEY );
copy_public_key (pk, keyblock->pkt->pkt.public_key ); copy_public_key (pk, keyblock->pkt->pkt.public_key );
release_kbnode (keyblock); release_kbnode (keyblock);
cache_public_key (pk);
/* Not caching key here since it won't have all of the fields
properly set. */
return 0; return 0;
} }

View File

@ -75,9 +75,7 @@ signature_check2( PKT_signature *sig, MD_HANDLE digest,
} }
else if( get_pubkey( pk, sig->keyid ) ) else if( get_pubkey( pk, sig->keyid ) )
rc = G10ERR_NO_PUBKEY; rc = G10ERR_NO_PUBKEY;
else if(!pk->is_valid && else if(!pk->is_valid && !pk->is_primary)
(pk->main_keyid[0]!=pk->keyid[0] ||
pk->main_keyid[1]!=pk->keyid[1]))
rc=G10ERR_BAD_PUBKEY; /* you cannot have a good sig from an rc=G10ERR_BAD_PUBKEY; /* you cannot have a good sig from an
invalid subkey */ invalid subkey */
else { else {