[svn] GnuPG - r4307 - in trunk: . sm
svn author wk
cvs at cvs.gnupg.org
Wed Oct 18 19:19:09 CEST 2006
Author: wk
Date: 2006-10-18 19:19:08 +0200 (Wed, 18 Oct 2006)
New Revision: 4307
Modified:
trunk/ChangeLog
trunk/NEWS
trunk/TODO
trunk/configure.ac
trunk/sm/ChangeLog
trunk/sm/certchain.c
trunk/sm/certlist.c
trunk/sm/keylist.c
Log:
Preparing a release
Modified: trunk/ChangeLog
===================================================================
--- trunk/ChangeLog 2006-10-18 15:34:54 UTC (rev 4306)
+++ trunk/ChangeLog 2006-10-18 17:19:08 UTC (rev 4307)
@@ -1,3 +1,7 @@
+2006-10-18 Werner Koch <wk at g10code.com>
+
+ Released 1.9.93.
+
2006-10-17 Werner Koch <wk at g10code.com>
* autogen.sh <--build-w32>: Test also for a host "mingw32".
Modified: trunk/NEWS
===================================================================
--- trunk/NEWS 2006-10-18 15:34:54 UTC (rev 4306)
+++ trunk/NEWS 2006-10-18 17:19:08 UTC (rev 4307)
@@ -1,4 +1,4 @@
-Noteworthy changes in version 1.9.93
+Noteworthy changes in version 1.9.93 (2006-10-18)
-------------------------------------------------
* In --with-validation mode gpgsm will now also ask whether a root
@@ -6,7 +6,14 @@
* Link to Pth only if really necessary.
+ * Fixed a pubring corruption bug in gpg2 occurring when importing
+ signatures or keys with insane lengths.
+ * Fixed v3 keyID calculation bug in gpg2.
+
+ * More tweaks for certificates without extensions.
+
+
Noteworthy changes in version 1.9.92 (2006-10-11)
-------------------------------------------------
Modified: trunk/TODO
===================================================================
--- trunk/TODO 2006-10-18 15:34:54 UTC (rev 4306)
+++ trunk/TODO 2006-10-18 17:19:08 UTC (rev 4307)
@@ -91,9 +91,12 @@
* g10/
** issue a NO_SECKEY xxxx if a -u key was not found.
-** qbits
- We pass a new qbit parameter to genkey - implement this in libgcrypt.
+
+* When requiring libksba 1.0.1
+** Remove the extra GPG_ERR_NO_VALUE tests
+ They have need added on 2006-10-18 to fix a libksba problem.
+
* When switching to libgcrypt 1.3
** scd#encode_md_for_card, g10#encode_md_value, sm at do_encode_md
Remove the extra test for a valid algorithm as libgcrypt will do it
Modified: trunk/configure.ac
===================================================================
--- trunk/configure.ac 2006-10-18 15:34:54 UTC (rev 4306)
+++ trunk/configure.ac 2006-10-18 17:19:08 UTC (rev 4307)
@@ -27,7 +27,7 @@
# Set my_issvn to "yes" for non-released code. Remember to run an
# "svn up" and "autogen.sh" right before creating a distribution.
m4_define([my_version], [1.9.93])
-m4_define([my_issvn], [yes])
+m4_define([my_issvn], [no])
m4_define([svn_revision], m4_esyscmd([echo -n $((svn info 2>/dev/null \
Modified: trunk/sm/ChangeLog
===================================================================
--- trunk/sm/ChangeLog 2006-10-18 15:34:54 UTC (rev 4306)
+++ trunk/sm/ChangeLog 2006-10-18 17:19:08 UTC (rev 4307)
@@ -1,3 +1,13 @@
+2006-10-18 Werner Koch <wk at g10code.com>
+
+ * keylist.c (list_cert_raw): Also test for GPG_ERR_NO_VALUE when
+ testing for GPG_ERR_NO_DATA.
+ * certlist.c (cert_usage_p, gpgsm_find_cert): Ditto.
+ * certchain.c (check_cert_policy): Ditto.
+
+ * keylist.c (list_cert_std, list_cert_raw): Print "none" for no
+ chain length available.
+
2006-10-17 Werner Koch <wk at g10code.com>
* gpgsm.c: No need for pth.h.
Modified: trunk/sm/certchain.c
===================================================================
--- trunk/sm/certchain.c 2006-10-18 15:34:54 UTC (rev 4306)
+++ trunk/sm/certchain.c 2006-10-18 17:19:08 UTC (rev 4307)
@@ -210,8 +210,9 @@
int any_critical;
err = ksba_cert_get_cert_policies (cert, &policies);
- if (gpg_err_code (err) == GPG_ERR_NO_DATA)
- return 0; /* no policy given */
+ if (gpg_err_code (err) == GPG_ERR_NO_DATA
+ || gpg_err_code (err) == GPG_ERR_NO_VALUE)
+ return 0; /* No policy given. */
if (err)
return err;
Modified: trunk/sm/certlist.c
===================================================================
--- trunk/sm/certlist.c 2006-10-18 15:34:54 UTC (rev 4306)
+++ trunk/sm/certlist.c 2006-10-18 17:19:08 UTC (rev 4307)
@@ -57,7 +57,8 @@
int have_ocsp_signing = 0;
err = ksba_cert_get_ext_key_usages (cert, &extkeyusages);
- if (gpg_err_code (err) == GPG_ERR_NO_DATA)
+ if (gpg_err_code (err) == GPG_ERR_NO_DATA
+ || gpg_err_code (err) == GPG_ERR_NO_VALUE)
err = 0; /* no policy given */
if (!err)
{
@@ -116,7 +117,8 @@
err = ksba_cert_get_key_usage (cert, &use);
- if (gpg_err_code (err) == GPG_ERR_NO_DATA)
+ if (gpg_err_code (err) == GPG_ERR_NO_DATA
+ || gpg_err_code (err) == GPG_ERR_NO_VALUE)
{
err = 0;
if (opt.verbose && mode < 2)
@@ -454,7 +456,8 @@
subjectKeyIdentifier matches the requested
one. */
}
- else if (gpg_err_code (rc) == GPG_ERR_NO_DATA)
+ else if (gpg_err_code (rc) == GPG_ERR_NO_DATA
+ || gpg_err_code (rc) == GPG_ERR_NO_VALUE)
goto nextone;
}
}
Modified: trunk/sm/keylist.c
===================================================================
--- trunk/sm/keylist.c 2006-10-18 15:34:54 UTC (rev 4306)
+++ trunk/sm/keylist.c 2006-10-18 17:19:08 UTC (rev 4307)
@@ -239,7 +239,8 @@
gpg_strerror (err));
err = ksba_cert_get_key_usage (cert, &use);
- if (gpg_err_code (err) == GPG_ERR_NO_DATA)
+ if (gpg_err_code (err) == GPG_ERR_NO_DATA
+ || gpg_err_code (err) == GPG_ERR_NO_VALUE)
{
putc ('e', fp);
putc ('s', fp);
@@ -641,9 +642,11 @@
/* subjectKeyIdentifier */
fputs (" subjKeyId: ", fp);
err = ksba_cert_get_subj_key_id (cert, NULL, &keyid);
- if (!err || gpg_err_code (err) == GPG_ERR_NO_DATA)
+ if (!err || gpg_err_code (err) == GPG_ERR_NO_DATA
+ || gpg_err_code (err) == GPG_ERR_NO_VALUE)
{
- if (gpg_err_code (err) == GPG_ERR_NO_DATA)
+ if (gpg_err_code (err) == GPG_ERR_NO_DATA
+ || gpg_err_code (err) == GPG_ERR_NO_VALUE)
fputs ("[none]\n", fp);
else
{
@@ -659,9 +662,11 @@
/* authorityKeyIdentifier */
fputs (" authKeyId: ", fp);
err = ksba_cert_get_auth_key_id (cert, &keyid, &name, &sexp);
- if (!err || gpg_err_code (err) == GPG_ERR_NO_DATA)
+ if (!err || gpg_err_code (err) == GPG_ERR_NO_DATA
+ || gpg_err_code (err) == GPG_ERR_NO_VALUE)
{
- if (gpg_err_code (err) == GPG_ERR_NO_DATA || !name)
+ if (gpg_err_code (err) == GPG_ERR_NO_DATA || !name
+ || gpg_err_code (err) == GPG_ERR_NO_VALUE)
fputs ("[none]\n", fp);
else
{
@@ -684,7 +689,8 @@
fputs (" keyUsage:", fp);
err = ksba_cert_get_key_usage (cert, &kusage);
- if (gpg_err_code (err) != GPG_ERR_NO_DATA)
+ if (gpg_err_code (err) != GPG_ERR_NO_DATA
+ && gpg_err_code (err) != GPG_ERR_NO_VALUE)
{
if (err)
fprintf (fp, " [error: %s]", gpg_strerror (err));
@@ -712,11 +718,12 @@
putc ('\n', fp);
}
else
- fputs ("[none]\n", fp);
+ fputs (" [none]\n", fp);
fputs (" extKeyUsage: ", fp);
err = ksba_cert_get_ext_key_usages (cert, &string);
- if (gpg_err_code (err) != GPG_ERR_NO_DATA)
+ if (gpg_err_code (err) != GPG_ERR_NO_DATA
+ && gpg_err_code (err) != GPG_ERR_NO_VALUE)
{
if (err)
fprintf (fp, "[error: %s]", gpg_strerror (err));
@@ -749,7 +756,8 @@
fputs (" policies: ", fp);
err = ksba_cert_get_cert_policies (cert, &string);
- if (gpg_err_code (err) != GPG_ERR_NO_DATA)
+ if (gpg_err_code (err) != GPG_ERR_NO_DATA
+ && gpg_err_code (err) != GPG_ERR_NO_VALUE)
{
if (err)
fprintf (fp, "[error: %s]", gpg_strerror (err));
@@ -783,7 +791,9 @@
err = ksba_cert_is_ca (cert, &is_ca, &chainlen);
if (err || is_ca)
{
- if (err)
+ if (gpg_err_code (err) == GPG_ERR_NO_VALUE )
+ fprintf (fp, "[none]");
+ else if (err)
fprintf (fp, "[error: %s]", gpg_strerror (err));
else if (chainlen == -1)
fputs ("unlimited", fp);
@@ -825,7 +835,8 @@
ksba_name_release (name);
ksba_name_release (name2);
}
- if (err && gpg_err_code (err) != GPG_ERR_EOF)
+ if (err && gpg_err_code (err) != GPG_ERR_EOF
+ && gpg_err_code (err) != GPG_ERR_NO_VALUE)
fputs (" crlDP: [error]\n", fp);
else if (!idx)
fputs (" crlDP: [none]\n", fp);
@@ -842,7 +853,8 @@
ksba_name_release (name);
ksba_free (string);
}
- if (err && gpg_err_code (err) != GPG_ERR_EOF)
+ if (err && gpg_err_code (err) != GPG_ERR_EOF
+ && gpg_err_code (err) != GPG_ERR_NO_VALUE)
fputs (" authInfo: [error]\n", fp);
else if (!idx)
fputs (" authInfo: [none]\n", fp);
@@ -858,7 +870,8 @@
ksba_name_release (name);
ksba_free (string);
}
- if (err && gpg_err_code (err) != GPG_ERR_EOF)
+ if (err && gpg_err_code (err) != GPG_ERR_EOF
+ && gpg_err_code (err) != GPG_ERR_NO_VALUE)
fputs (" subjInfo: [error]\n", fp);
else if (!idx)
fputs (" subjInfo: [none]\n", fp);
@@ -968,7 +981,8 @@
err = ksba_cert_get_key_usage (cert, &kusage);
- if (gpg_err_code (err) != GPG_ERR_NO_DATA)
+ if (gpg_err_code (err) != GPG_ERR_NO_DATA
+ && gpg_err_code (err) != GPG_ERR_NO_VALUE)
{
fputs (" key usage:", fp);
if (err)
@@ -998,7 +1012,8 @@
}
err = ksba_cert_get_ext_key_usages (cert, &string);
- if (gpg_err_code (err) != GPG_ERR_NO_DATA)
+ if (gpg_err_code (err) != GPG_ERR_NO_DATA
+ && gpg_err_code (err) != GPG_ERR_NO_VALUE)
{
fputs ("ext key usage: ", fp);
if (err)
@@ -1028,7 +1043,8 @@
}
err = ksba_cert_get_cert_policies (cert, &string);
- if (gpg_err_code (err) != GPG_ERR_NO_DATA)
+ if (gpg_err_code (err) != GPG_ERR_NO_DATA
+ && gpg_err_code (err) != GPG_ERR_NO_VALUE)
{
fputs (" policies: ", fp);
if (err)
@@ -1050,7 +1066,9 @@
if (err || is_ca)
{
fputs (" chain length: ", fp);
- if (err)
+ if (gpg_err_code (err) == GPG_ERR_NO_VALUE )
+ fprintf (fp, "none");
+ else if (err)
fprintf (fp, "[error: %s]", gpg_strerror (err));
else if (chainlen == -1)
fputs ("unlimited", fp);
More information about the Gnupg-commits
mailing list