| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| |
| |
| |
| |
| |
| |
| | |
This prevents a memory allocation attack with a very large user ID. A
very large packet length could even cause the allocation (a u32) to wrap
around to a small number. Noted by Evgeny Legerov on full-disclosure.
|
| | |
|
| |
| |
| |
| |
| | |
arbitrarily long temporary directory paths.
|
| |
| |
| |
| |
| |
| |
| | |
1024 when --enable-dsa2 is set). The size of q is set automatically based
on the key size. (ask_keysize, generate_keypair): Ask for DSA size when
--enable-dsa2 is set.
|
| | |
|
| |
| |
| |
| |
| | |
that is over 256 bytes long. Noted by Israel G. Lugo.
|
| |
| |
| |
| |
| | |
when generating samplekeys.asc.
|
| |
| |
| |
| |
| |
| |
| |
| | |
called with them closed. This is to protect our keyring/trustdb files
from corruption if they get attached to one of the standard fds. Print a
warning if possible that this has happened, and fail completely if we
cannot reopen (should never happen). (main): Call it here.
|
| |
| |
| |
| |
| | |
so the compiler doesn't rearrange things and eliminate variables.
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
(build_sig_subpkt_from_sig), getkey.c (fixup_uidnode,
merge_selfsigs_main, merge_selfsigs_subkey), keygen.c
(keygen_add_key_expire): Fix meaning of key expiration and sig
expiration subpackets - zero means "never expire" according to 2440,
not "expire instantly".
|
| | |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
* configure.ac: Remove check for noexecstack and invoke
CL_AS_NOEXECSTACK instead.
m4/
2006-05-22 Marcus Brinkmann <[email protected]>
* noexecstack.m4: New file.
|
| |
| |
| |
| |
| |
| | |
problem when auto-key-locate returns a list of keys, not all of which are
usable (revoked, expired, etc). Noted by Simon Josefsson.
|
| | |
|
| | |
|
| | |
|
| | |
|
| |
| |
| |
| |
| |
| | |
* configure.ac: Remove --enable-old-keyserver-helpers. Comment out
--enable-m-guard for now.
|
| |
| |
| |
| |
| | |
but no --keyserver set.
|
| |
| |
| |
| |
| |
| | |
to add "_uri" to certain gpgkeys_xxx helpers when the meaning is
different if a path is provided (i.e. ldap).
|
| | |
|
| |
| |
| |
| |
| |
| |
| |
| | |
this is done via curl or fake-curl.
* ksutil.h, ksutil.c, gpgkeys_hkp.c, gpgkeys_curl.c: Minor #include tweaks
as FAKE_CURL is no longer meaningful.
|
| |
| |
| |
| |
| | |
a place not in the regular include search path.
|
| | |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
to disable.
* pkclist.c (algo_available): If --enable-dsa2 is set, we're allowed to
truncate hashes to fit DSA keys.
* sign.c (match_dsa_hash): New. Return the best match hash for a given q
size. (do_sign, hash_for, sign_file): When signing with a DSA key, if it
has q==160, assume it is an old DSA key and don't allow truncation unless
--enable-dsa2 is also set. q!=160 always allows truncation since they
must be DSA2 keys. (make_keysig_packet): If the user doesn't specify a
--cert-digest-algo, use match_dsa_hash to pick the best hash for key
signatures.
|
| |
| |
| |
| |
| | |
size doesn't end between byte boundaries.
|
| |
| |
| |
| |
| | |
Not yet used (q==160).
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
SHA-224.
* sign.c (write_plaintext_packet), encode.c (encode_simple): Factor
common literal packet setup code from here, to...
* main.h, plaintext.c (setup_plaintext_name): Here. New. Make sure the
literal packet filename field is UTF-8 encoded.
* options.h, gpg.c (main): Make sure --set-filename is UTF-8 encoded
and note when filenames are already UTF-8.
|
| | |
|
| | |
|
| |
| |
| |
| |
| | |
have no need to backsign.
|
| |
| |
| |
| |
| | |
--compress-algo should be avoided.
|
| |
| |
| |
| |
| | |
characters lose part of their ASCII representation.
|
| | |
|
| |
| |
| |
| |
| | |
inform people not to use it.
|
| |
| |
| |
| |
| | |
viewer at runtime. Seems FC5 doesn't have xloadimage.
|
| | |
|
| | |
|
| |
| |
| |
| |
| | |
directly into place rather than mallocing temporary buffers.
|
| |
| |
| |
| |
| | |
using sprintf which is harder to read and modify.
|
| |
| |
| |
| |
| |
| |
| |
| | |
and KS_SEARCH_KEYID_LONG to search for a key ID.
* gpgkeys_ldap.c (search_key): Use it here to flip from pgpUserID
searches to pgpKeyID or pgpCertID.
|
| | |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
* keyedit.c (menu_backsign): Allow backsigning even if the secret
subkey doesn't have a binding signature.
* armor.c (radix64_read): Don't report EOF when reading only a pad (=)
character. The EOF actually starts after the pad.
* gpg.c (main): Make --export, --send-keys, --recv-keys,
--refresh-keys, and --fetch-keys follow their arguments from left to
right. Suggested by Peter Palfrader.
|
| | |
|
| | |
|
| | |
|
| |
| |
| |
| |
| |
| |
| | |
stderr and allow spaces in a fingerprint. Also warn when a key is
over 16k (as that is the default max-cert-size) and fail when a key is
over 64k as that is the DNS limit in many places.
|
| |
| |
| |
| |
| | |
so people don't have to do it manually.
|
| | |
|
| | |
|