mirror of
git://git.gnupg.org/gnupg.git
synced 2025-01-26 15:37:03 +01:00
* build-packet.c (build_sig_subpkt): Comments.
* exec.c (exec_write): Cast NULL to void* to properly terminate varargs list. * keyedit.c (show_key_with_all_names): Just for safety, catch an invalid pk algorithm. * sign.c (make_keysig_packet): Crucial that the call to mksubpkt comes LAST before the calls to finalize the sig as that makes it possible for the mksubpkt function to get a reliable pointer to the subpacket area.
This commit is contained in:
parent
625c3ef091
commit
e30006a769
@ -1,3 +1,18 @@
|
|||||||
|
2003-04-28 David Shaw <dshaw@jabberwocky.com>
|
||||||
|
|
||||||
|
* build-packet.c (build_sig_subpkt): Comments.
|
||||||
|
|
||||||
|
* exec.c (exec_write): Cast NULL to void* to properly terminate
|
||||||
|
varargs list.
|
||||||
|
|
||||||
|
* keyedit.c (show_key_with_all_names): Just for safety, catch an
|
||||||
|
invalid pk algorithm.
|
||||||
|
|
||||||
|
* sign.c (make_keysig_packet): Crucial that the call to mksubpkt
|
||||||
|
comes LAST before the calls to finalize the sig as that makes it
|
||||||
|
possible for the mksubpkt function to get a reliable pointer to
|
||||||
|
the subpacket area.
|
||||||
|
|
||||||
2003-04-27 David Shaw <dshaw@jabberwocky.com>
|
2003-04-27 David Shaw <dshaw@jabberwocky.com>
|
||||||
|
|
||||||
* mainproc.c (check_sig_and_print): Show sig class when verifying
|
* mainproc.c (check_sig_and_print): Show sig class when verifying
|
||||||
|
@ -785,6 +785,10 @@ build_sig_subpkt (PKT_signature *sig, sigsubpkttype_t type,
|
|||||||
case SIGSUBPKT_PRIV_VERIFY_CACHE: /*(obsolete)*/
|
case SIGSUBPKT_PRIV_VERIFY_CACHE: /*(obsolete)*/
|
||||||
BUG();
|
BUG();
|
||||||
break;
|
break;
|
||||||
|
/* The issuer being unhashed is a historical oddity. It
|
||||||
|
should work equally as well hashed. Of course, if even an
|
||||||
|
unhashed issuer is tampered with, it makes it awfully hard
|
||||||
|
to verify the sig... */
|
||||||
case SIGSUBPKT_ISSUER:
|
case SIGSUBPKT_ISSUER:
|
||||||
hashed = 0;
|
hashed = 0;
|
||||||
break;
|
break;
|
||||||
@ -1184,4 +1188,3 @@ write_version( IOBUF out, int ctb )
|
|||||||
return -1;
|
return -1;
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -417,14 +417,14 @@ int exec_write(struct exec_info **info,const char *program,
|
|||||||
if(DBG_EXTPROG)
|
if(DBG_EXTPROG)
|
||||||
log_debug("execlp: %s\n",program);
|
log_debug("execlp: %s\n",program);
|
||||||
|
|
||||||
execlp(program,program,NULL);
|
execlp(program,program,(void *)NULL);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
if(DBG_EXTPROG)
|
if(DBG_EXTPROG)
|
||||||
log_debug("execlp: %s -c %s\n",shell,(*info)->command);
|
log_debug("execlp: %s -c %s\n",shell,(*info)->command);
|
||||||
|
|
||||||
execlp(shell,shell,"-c",(*info)->command,NULL);
|
execlp(shell,shell,"-c",(*info)->command,(void *)NULL);
|
||||||
}
|
}
|
||||||
|
|
||||||
/* If we get this far the exec failed. Clean up and return. */
|
/* If we get this far the exec failed. Clean up and return. */
|
||||||
@ -617,4 +617,3 @@ int exec_finish(struct exec_info *info)
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
#endif /* ! NO_EXEC */
|
#endif /* ! NO_EXEC */
|
||||||
|
|
||||||
|
@ -1833,13 +1833,15 @@ show_key_with_all_names( KBNODE keyblock, int only_marked, int with_revoker,
|
|||||||
for(i=0;i<pk->numrevkeys;i++) {
|
for(i=0;i<pk->numrevkeys;i++) {
|
||||||
u32 r_keyid[2];
|
u32 r_keyid[2];
|
||||||
char *user;
|
char *user;
|
||||||
|
const char *algo=
|
||||||
|
pubkey_algo_to_string(pk->revkey[i].algid);
|
||||||
|
|
||||||
keyid_from_fingerprint(pk->revkey[i].fpr,
|
keyid_from_fingerprint(pk->revkey[i].fpr,
|
||||||
MAX_FINGERPRINT_LEN,r_keyid);
|
MAX_FINGERPRINT_LEN,r_keyid);
|
||||||
|
|
||||||
user=get_user_id_string (r_keyid);
|
user=get_user_id_string (r_keyid);
|
||||||
tty_printf (_("This key may be revoked by %s key "),
|
tty_printf (_("This key may be revoked by %s key "),
|
||||||
pubkey_algo_to_string (pk->revkey[i].algid));
|
algo?algo:"?");
|
||||||
tty_print_utf8_string (user, strlen (user));
|
tty_print_utf8_string (user, strlen (user));
|
||||||
if ((pk->revkey[i].class&0x40))
|
if ((pk->revkey[i].class&0x40))
|
||||||
tty_printf (_(" (sensitive)"));
|
tty_printf (_(" (sensitive)"));
|
||||||
|
@ -1238,12 +1238,15 @@ make_keysig_packet( PKT_signature **ret_sig, PKT_public_key *pk,
|
|||||||
sig->sig_class = sigclass;
|
sig->sig_class = sigclass;
|
||||||
if( sig->version >= 4 )
|
if( sig->version >= 4 )
|
||||||
build_sig_subpkt_from_sig( sig );
|
build_sig_subpkt_from_sig( sig );
|
||||||
|
mk_notation_and_policy( sig, pk, sk );
|
||||||
|
|
||||||
|
/* Crucial that the call to mksubpkt comes LAST before the calls
|
||||||
|
to finalize the sig as that makes it possible for the mksubpkt
|
||||||
|
function to get a reliable pointer to the subpacket area. */
|
||||||
if( sig->version >= 4 && mksubpkt )
|
if( sig->version >= 4 && mksubpkt )
|
||||||
rc = (*mksubpkt)( sig, opaque );
|
rc = (*mksubpkt)( sig, opaque );
|
||||||
|
|
||||||
if( !rc ) {
|
if( !rc ) {
|
||||||
mk_notation_and_policy( sig, pk, sk );
|
|
||||||
hash_sigversion_to_magic (md, sig);
|
hash_sigversion_to_magic (md, sig);
|
||||||
md_final(md);
|
md_final(md);
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user