aboutsummaryrefslogtreecommitdiffstats
path: root/g10
diff options
context:
space:
mode:
Diffstat (limited to 'g10')
-rw-r--r--g10/ChangeLog5
-rw-r--r--g10/keygen.c18
2 files changed, 17 insertions, 6 deletions
diff --git a/g10/ChangeLog b/g10/ChangeLog
index b8f338b8f..0d9ba8c9c 100644
--- a/g10/ChangeLog
+++ b/g10/ChangeLog
@@ -1,3 +1,8 @@
+2008-08-11 Werner Koch <[email protected]>
+
+ * keygen.c (ask_expire_interval): Check for time overflow of an
+ u32. Fixes bug #947. Use SIZEOF_TIME_T for the 2039--2106 check.
+
2008-08-01 Werner Koch <[email protected]>
* tdbio.c (open_db) [!EROFS]: Move closing parens out of the
diff --git a/g10/keygen.c b/g10/keygen.c
index a74c9a2f2..9bc18777e 100644
--- a/g10/keygen.c
+++ b/g10/keygen.c
@@ -1697,12 +1697,18 @@ ask_expire_interval(u32 timestamp,int object,const char *def_expire)
? _("Key expires at %s\n")
: _("Signature expires at %s\n"),
asctimestamp((ulong)(timestamp + interval) ) );
- /* FIXME: This check yields warning on alhas: Write a
- configure check and to this check here only for 32 bit
- machines */
- if( (time_t)((ulong)(timestamp+interval)) < 0 )
- tty_printf(_("Your system can't display dates beyond 2038.\n"
- "However, it will be correctly handled up to 2106.\n"));
+#if SIZEOF_TIME_T <= 4
+ if ((time_t)((ulong)(timestamp+interval)) < 0 )
+ tty_printf (_("Your system can't display dates beyond 2038.\n"
+ "However, it will be correctly handled up to"
+ " 2106.\n"));
+ else
+#endif /*SIZEOF_TIME_T*/
+ if ( (time_t)((unsigned long)(timestamp+interval)) < timestamp )
+ {
+ tty_printf (_("invalid value\n"));
+ continue;
+ }
}
if( cpr_enabled() || cpr_get_answer_is_yes("keygen.valid.okay",