[svn] GnuPG - r4644 - in trunk: g10 scd
svn author wk
cvs at cvs.gnupg.org
Mon Dec 10 16:19:36 CET 2007
Author: wk
Date: 2007-12-10 16:19:34 +0100 (Mon, 10 Dec 2007)
New Revision: 4644
Modified:
trunk/g10/ChangeLog
trunk/g10/import.c
trunk/g10/misc.c
trunk/scd/ChangeLog
trunk/scd/app-openpgp.c
Log:
Fix for bug 851.
Fixed auto generation of the stub key for the card.
Allow to encrypt toElgamal encryption keys of type 20.
Modified: trunk/g10/ChangeLog
===================================================================
--- trunk/g10/ChangeLog 2007-12-06 19:02:42 UTC (rev 4643)
+++ trunk/g10/ChangeLog 2007-12-10 15:19:34 UTC (rev 4644)
@@ -1,3 +1,15 @@
+2007-12-10 Werner Koch <wk at g10code.com>
+
+ * import.c (auto_create_card_key_stub): Do not clear the entire
+ fingerprint. This finally makes the stub creation work. My past
+ tests seemed to work because there was a key with a all zero
+ fingerprint available (Elgamal signing keys).
+
+2007-12-08 Werner Koch <wk at g10code.com>
+
+ * misc.c (openpgp_pk_algo_usage): Allow Elgamal type 20 for
+ encryption.
+
2007-12-04 Werner Koch <wk at g10code.com>
* helptext.c (get_help_from_file): New.
Modified: trunk/g10/import.c
===================================================================
--- trunk/g10/import.c 2007-12-06 19:02:42 UTC (rev 4643)
+++ trunk/g10/import.c 2007-12-10 15:19:34 UTC (rev 4644)
@@ -2355,7 +2355,8 @@
size_t an;
fingerprint_from_pk (pk, afp, &an);
- memset (afp, 0, MAX_FINGERPRINT_LEN);
+ if (an < MAX_FINGERPRINT_LEN)
+ memset (afp+an, 0, MAX_FINGERPRINT_LEN-an);
rc = keydb_search_fpr (hd, afp);
}
@@ -2410,4 +2411,3 @@
keydb_release (hd);
return rc;
}
-
Modified: trunk/g10/misc.c
===================================================================
--- trunk/g10/misc.c 2007-12-06 19:02:42 UTC (rev 4643)
+++ trunk/g10/misc.c 2007-12-10 15:19:34 UTC (rev 4644)
@@ -379,6 +379,7 @@
case PUBKEY_ALGO_RSA_S:
use = PUBKEY_USAGE_CERT | PUBKEY_USAGE_SIG;
break;
+ case PUBKEY_ALGO_ELGAMAL:
case PUBKEY_ALGO_ELGAMAL_E:
use = PUBKEY_USAGE_ENC;
break;
Modified: trunk/scd/ChangeLog
===================================================================
--- trunk/scd/ChangeLog 2007-12-06 19:02:42 UTC (rev 4643)
+++ trunk/scd/ChangeLog 2007-12-10 15:19:34 UTC (rev 4644)
@@ -1,3 +1,8 @@
+2007-12-10 Werner Koch <wk at g10code.com>
+
+ * app-openpgp.c (do_decipher): Take care of cryptograms shiorther
+ that 128 bytes. Fixes bug#851.
+
2007-11-14 Werner Koch <wk at g10code.com>
* scdaemon.c (main): Pass STANDARD_SOCKET flag to
Modified: trunk/scd/app-openpgp.c
===================================================================
--- trunk/scd/app-openpgp.c 2007-12-06 19:02:42 UTC (rev 4643)
+++ trunk/scd/app-openpgp.c 2007-12-10 15:19:34 UTC (rev 4644)
@@ -1,5 +1,5 @@
/* app-openpgp.c - The OpenPGP card application.
- * Copyright (C) 2003, 2004, 2005 Free Software Foundation, Inc.
+ * Copyright (C) 2003, 2004, 2005, 2007 Free Software Foundation, Inc.
*
* This file is part of GnuPG.
*
@@ -2456,8 +2456,49 @@
rc = verify_chv2 (app, pincb, pincb_arg);
if (!rc)
- rc = iso7816_decipher (app->slot, indata, indatalen, 0,
- outdata, outdatalen);
+ {
+ size_t fixuplen;
+
+ /* We might encounter a couple of leading zeroes in the
+ cryptogram. Due to internal use of MPIs thease leading
+ zeroes are stripped. However the OpenPGp card expects
+ exactly 128 bytes for the cryptogram (for a 1k key). Thus we
+ need to fix it up. We do this for up to 16 leading zero
+ bytes; a cryptogram with more than this is with a very high
+ probability anyway broken. */
+ if (indatalen >= (128-16) && indatalen < 128) /* 1024 bit key. */
+ fixuplen = 128 - indatalen;
+ else if (indatalen >= (256-16) && indatalen < 256) /* 2048 bit key. */
+ fixuplen = 256 - indatalen;
+ else if (indatalen >= (192-16) && indatalen < 192) /* 1536 bit key. */
+ fixuplen = 192 - indatalen;
+ else
+ fixuplen = 0;
+ if (fixuplen)
+ {
+ unsigned char *fixbuf;
+
+ /* While we have to prepend stuff anyway, we can also
+ include the padding byte here so that iso1816_decipher
+ does not need to do yet another data mangling. */
+ fixuplen++;
+ fixbuf = xtrymalloc (fixuplen + indatalen);
+ if (!fixbuf)
+ rc = gpg_error_from_syserror ();
+ else
+ {
+ memset (fixbuf, 0, fixuplen);
+ memcpy (fixbuf+fixuplen, indata, indatalen);
+ rc = iso7816_decipher (app->slot, fixbuf, fixuplen+indatalen, -1,
+ outdata, outdatalen);
+ xfree (fixbuf);
+ }
+
+ }
+ else
+ rc = iso7816_decipher (app->slot, indata, indatalen, 0,
+ outdata, outdatalen);
+ }
return rc;
}
More information about the Gnupg-commits
mailing list