pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/security/netpgpverify/files
Module Name: pkgsrc
Committed By: agc
Date: Sun Aug 28 23:23:40 UTC 2016
Modified Files:
pkgsrc/security/netpgpverify/files: array.h libverify.c verify.h
Log Message:
Update netpgpverify and libnetpgpverify to 20160828
+ bring over change from christos in src/crypto to check for
the end of an ASCII-armored signature
+ no need for namespace protection in array.h any more, now
that netpgp/verify.h now contains opaque structures
+ minor typo clean-up in a definition (benign, ignored by compiler)
To generate a diff of this commit:
cvs rdiff -u -r1.2 -r1.3 pkgsrc/security/netpgpverify/files/array.h
cvs rdiff -u -r1.24 -r1.25 pkgsrc/security/netpgpverify/files/libverify.c
cvs rdiff -u -r1.35 -r1.36 pkgsrc/security/netpgpverify/files/verify.h
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/security/netpgpverify/files/array.h
diff -u pkgsrc/security/netpgpverify/files/array.h:1.2 pkgsrc/security/netpgpverify/files/array.h:1.3
--- pkgsrc/security/netpgpverify/files/array.h:1.2 Tue Jul 5 23:56:07 2016
+++ pkgsrc/security/netpgpverify/files/array.h Sun Aug 28 23:23:40 2016
@@ -25,10 +25,10 @@
#ifndef ARRAY_H_
#define ARRAY_H_ 20120921
-#ifndef PGPV_ARRAY
+#ifndef ARRAY
/* creates 2 unsigned vars called "name"c and "name"size in current scope */
/* also creates an array called "name"s in current scope */
-#define PGPV_ARRAY(type, name) \
+#define ARRAY(type, name) \
unsigned name##c; unsigned name##vsize; type *name##s
#endif
Index: pkgsrc/security/netpgpverify/files/libverify.c
diff -u pkgsrc/security/netpgpverify/files/libverify.c:1.24 pkgsrc/security/netpgpverify/files/libverify.c:1.25
--- pkgsrc/security/netpgpverify/files/libverify.c:1.24 Sat Jul 9 17:18:24 2016
+++ pkgsrc/security/netpgpverify/files/libverify.c Sun Aug 28 23:23:40 2016
@@ -166,7 +166,7 @@ typedef struct pgpv_sigpkt_t {
pgpv_signature_t sig;
uint16_t subslen;
uint16_t unhashlen;
- PGPV_ARRAY(uint64_t, subpackets);
+ ARRAY(uint64_t, subpackets);
} pgpv_sigpkt_t;
/* a one-pass signature packet */
@@ -194,7 +194,7 @@ typedef struct pgpv_litdata_t {
/* user attributes - images */
typedef struct pgpv_userattr_t {
size_t len;
- PGPV_ARRAY(pgpv_string_t, subattrs);
+ ARRAY(pgpv_string_t, subattrs);
} pgpv_userattr_t;
/* a general PGP packet */
@@ -231,45 +231,45 @@ typedef struct pgpv_mem_t {
typedef struct pgpv_signed_userid_t {
pgpv_string_t userid;
- PGPV_ARRAY(uint64_t, signatures);
+ ARRAY(uint64_t, signatures);
uint8_t primary_userid;
uint8_t revoked;
} pgpv_signed_userid_t;
typedef struct pgpv_signed_userattr_t {
pgpv_userattr_t userattr;
- PGPV_ARRAY(uint64_t, signatures);
+ ARRAY(uint64_t, signatures);
uint8_t revoked;
} pgpv_signed_userattr_t;
typedef struct pgpv_signed_subkey_t {
pgpv_pubkey_t subkey;
pgpv_signature_t revoc_self_sig;
- PGPV_ARRAY(uint64_t, signatures);
+ ARRAY(uint64_t, signatures);
} pgpv_signed_subkey_t;
typedef struct pgpv_primarykey_t {
pgpv_pubkey_t primary;
pgpv_signature_t revoc_self_sig;
- PGPV_ARRAY(uint64_t, signatures);
- PGPV_ARRAY(uint64_t, signed_userids);
- PGPV_ARRAY(uint64_t, signed_userattrs);
- PGPV_ARRAY(uint64_t, signed_subkeys);
+ ARRAY(uint64_t, signatures);
+ ARRAY(uint64_t, signed_userids);
+ ARRAY(uint64_t, signed_userattrs);
+ ARRAY(uint64_t, signed_subkeys);
size_t fmtsize;
uint8_t primary_userid;
} pgpv_primarykey_t;
/* everything stems from this structure */
struct pgpv_t {
- PGPV_ARRAY(pgpv_pkt_t, pkts); /* packet array */
- PGPV_ARRAY(pgpv_primarykey_t, primaries); /* array of primary keys */
- PGPV_ARRAY(pgpv_mem_t, areas); /* areas we read packets from */
- PGPV_ARRAY(size_t, datastarts); /* starts of data packets */
- PGPV_ARRAY(pgpv_signature_t, signatures); /* all signatures */
- PGPV_ARRAY(pgpv_signed_userid_t, signed_userids); /* all signed userids */
- PGPV_ARRAY(pgpv_signed_userattr_t, signed_userattrs); /* all signed user attrs */
- PGPV_ARRAY(pgpv_signed_subkey_t, signed_subkeys); /* all signed subkeys */
- PGPV_ARRAY(pgpv_sigsubpkt_t, subpkts); /* all sub packets */
+ ARRAY(pgpv_pkt_t, pkts); /* packet array */
+ ARRAY(pgpv_primarykey_t, primaries); /* array of primary keys */
+ ARRAY(pgpv_mem_t, areas); /* areas we read packets from */
+ ARRAY(size_t, datastarts); /* starts of data packets */
+ ARRAY(pgpv_signature_t, signatures); /* all signatures */
+ ARRAY(pgpv_signed_userid_t, signed_userids); /* all signed userids */
+ ARRAY(pgpv_signed_userattr_t, signed_userattrs); /* all signed user attrs */
+ ARRAY(pgpv_signed_subkey_t, signed_subkeys); /* all signed subkeys */
+ ARRAY(pgpv_sigsubpkt_t, subpkts); /* all sub packets */
size_t pkt; /* when parsing, current pkt number */
const char *op; /* the operation we're doing */
unsigned ssh; /* using ssh keys */
@@ -284,8 +284,8 @@ struct pgpv_cursor_t {
char *op; /* operation we're doing */
char *value; /* value we're searching for */
void *ptr; /* for regexps etc */
- PGPV_ARRAY(uint32_t, found); /* array of matched pimary key subscripts */
- PGPV_ARRAY(size_t, datacookies); /* cookies to retrieve matched data */
+ ARRAY(uint32_t, found); /* array of matched pimary key subscripts */
+ ARRAY(size_t, datacookies); /* cookies to retrieve matched data */
int64_t sigtime; /* time of signature */
char why[PGPV_REASON_LEN]; /* reason for bad signature */
};
@@ -334,7 +334,7 @@ struct pgpv_cursor_t {
#define PUBKEY_RSA_SIGN 3
#define PUBKEY_ELGAMAL_ENCRYPT 16
#define PUBKEY_DSA 17
-#define PUBKEY_ELLIPTIC_CURVE 18
+#define PUBKEY_ECDH 18
#define PUBKEY_ECDSA 19
#define PUBKEY_ELGAMAL_ENCRYPT_OR_SIGN 20
@@ -499,7 +499,7 @@ static uint8_t *
get_ref(pgpv_ref_t *ref)
{
pgpv_mem_t *mem;
- pgpv_t *pgp = (pgpv_t *)ref->vp;;
+ pgpv_t *pgp = (pgpv_t *)ref->vp;
mem = &ARRAY_ELEMENT(pgp->areas, ref->mem);
return &mem->mem[ref->offset];
@@ -2284,7 +2284,7 @@ read_ascii_armor(pgpv_cursor_t *cursor,
litdata.u.litdata.offset = (size_t)(p - mem->mem);
litdata.u.litdata.filename.data = pgpv_strdup(filename);
litdata.u.litdata.filename.allocated = 1;
- if ((p = find_bin_string(datastart = p, mem->size - litdata.offset, SIGSTART, strlen(SIGSTART))) == NULL) {
+ if ((p = find_bin_string(datastart = p, mem->size - litdata.offset, SIGSTART, sizeof(SIGSTART) - 1)) == NULL) {
snprintf(cursor->why, sizeof(cursor->why),
"malformed armor - no sig - at %zu", (size_t)(p - mem->mem));
return 0;
@@ -2298,7 +2298,13 @@ read_ascii_armor(pgpv_cursor_t *cursor,
return 0;
}
p += 2;
- sigend = find_bin_string(p, mem->size, SIGEND, strlen(SIGEND));
+ sigend = find_bin_string(p, mem->size, SIGEND, sizeof(SIGEND) - 1);
+ if (sigend == NULL) {
+ snprintf(cursor->why, sizeof(cursor->why),
+ "malformed armor - no end sig - at %zu",
+ (size_t)(p - mem->mem));
+ return 0;
+ }
binsigsize = b64decode((char *)p, (size_t)(sigend - p), binsig, sizeof(binsig));
read_binary_memory(cursor->pgp, "signature", cons_onepass, 15);
Index: pkgsrc/security/netpgpverify/files/verify.h
diff -u pkgsrc/security/netpgpverify/files/verify.h:1.35 pkgsrc/security/netpgpverify/files/verify.h:1.36
--- pkgsrc/security/netpgpverify/files/verify.h:1.35 Sat Jul 9 17:44:44 2016
+++ pkgsrc/security/netpgpverify/files/verify.h Sun Aug 28 23:23:40 2016
@@ -23,9 +23,9 @@
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#ifndef NETPGP_VERIFY_H_
-#define NETPGP_VERIFY_H_ 20160709
+#define NETPGP_VERIFY_H_ 20160828
-#define NETPGPVERIFY_VERSION "netpgpverify portable 20160709"
+#define NETPGPVERIFY_VERSION "netpgpverify portable 20160828"
#include <sys/types.h>
Home |
Main Index |
Thread Index |
Old Index