From cvs at cvs.gnupg.org Fri Apr 1 11:27:37 2016 From: cvs at cvs.gnupg.org (by Justus Winter) Date: Fri, 01 Apr 2016 11:27:37 +0200 Subject: [git] GnuPG - branch, master, updated. gnupg-2.1.11-110-ge7171f5 Message-ID: This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "The GNU Privacy Guard". The branch, master has been updated via e7171f559590422cc52dbcb8d78d94569b31012f (commit) via 8be9dab2dd2f83ca922c01542c63b404e34bdfd9 (commit) from e2c5781788f765815532410a77077ddbb72513e9 (commit) Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below. - Log ----------------------------------------------------------------- commit e7171f559590422cc52dbcb8d78d94569b31012f Author: Justus Winter Date: Thu Mar 31 17:51:39 2016 +0200 speedo,w32: Build libsqlite3. * build-aux/speedo.mk (speedo_spkgs): Add libsqlite3 on w32. (libsqlite3_ver): New variable. (speedo_pkg_libsqlite3_tar): Likewise. Signed-off-by: Justus Winter diff --git a/build-aux/speedo.mk b/build-aux/speedo.mk index 5dde0fe..52d6871 100644 --- a/build-aux/speedo.mk +++ b/build-aux/speedo.mk @@ -172,7 +172,7 @@ speedo_spkgs = \ ifeq ($(TARGETOS),w32) speedo_spkgs += \ - zlib bzip2 adns libiconv + zlib bzip2 adns libiconv libsqlite3 ifeq ($(WITH_GUI),1) speedo_spkgs += gettext endif @@ -324,6 +324,7 @@ endif # Version number for external packages pkg_config_ver = 0.23 libiconv_ver = 1.14 +libsqlite3_ver = 3120000 gettext_ver = 0.18.2.1 libffi_ver = 3.0.13 glib_ver = 2.34.3 @@ -414,6 +415,7 @@ speedo_pkg_zlib_tar = $(pkgrep)/zlib/zlib-$(zlib_ver).tar.gz speedo_pkg_bzip2_tar = $(pkgrep)/bzip2/bzip2-$(bzip2_ver).tar.gz speedo_pkg_adns_tar = $(pkg10rep)/adns/adns-$(adns_ver).tar.bz2 speedo_pkg_libiconv_tar = $(pkg2rep)/libiconv-$(libiconv_ver).tar.gz +speedo_pkg_libsqlite3_tar = $(pkg2rep)/sqlite-autoconf-$(libsqlite3_ver).tar.gz speedo_pkg_gettext_tar = $(pkg2rep)/gettext-$(gettext_ver).tar.gz speedo_pkg_libffi_tar = $(pkg2rep)/libffi-$(libffi_ver).tar.gz speedo_pkg_glib_tar = $(pkg2rep)/glib-$(glib_ver).tar.xz commit 8be9dab2dd2f83ca922c01542c63b404e34bdfd9 Author: Justus Winter Date: Thu Mar 31 17:23:31 2016 +0200 g10: Use gpg-error abstraction of sched_yield. * g10/tofu.c (begin_transaction): Use 'gpgrt_yield'. Signed-off-by: Justus Winter diff --git a/g10/tofu.c b/g10/tofu.c index baa2ac2..5f381b0 100644 --- a/g10/tofu.c +++ b/g10/tofu.c @@ -28,7 +28,6 @@ #include #include #include -#include #include #include "gpg.h" @@ -240,7 +239,7 @@ begin_transaction (struct db *db, int only_batch) batch_update_started = gnupg_get_time (); /* Yield to allow another process a chance to run. */ - sched_yield (); + gpgrt_yield (); } /* XXX: In split mode, this can end in deadlock. ----------------------------------------------------------------------- Summary of changes: build-aux/speedo.mk | 4 +++- g10/tofu.c | 3 +-- 2 files changed, 4 insertions(+), 3 deletions(-) hooks/post-receive -- The GNU Privacy Guard http://git.gnupg.org From cvs at cvs.gnupg.org Fri Apr 1 13:59:10 2016 From: cvs at cvs.gnupg.org (by Werner Koch) Date: Fri, 01 Apr 2016 13:59:10 +0200 Subject: [git] GCRYPT - branch, master, updated. libgcrypt-1.6.0-371-g862cf19 Message-ID: This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "The GNU crypto library". The branch, master has been updated via 862cf19a119427dd7ee7959a36c72d905f5ea5ca (commit) from fcce0cb6e8af70b134c6ecc3f56afa07a7d31f27 (commit) Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below. - Log ----------------------------------------------------------------- commit 862cf19a119427dd7ee7959a36c72d905f5ea5ca Author: Werner Koch Date: Fri Apr 1 13:42:01 2016 +0200 mpi: Explicitly limit the allowed input length for gcry_mpi_scan. * mpi/mpicoder.c (MAX_EXTERN_SCAN_BYTES): New. (mpi_fromstr): Check against this limit. (_gcry_mpi_scan): Ditto. * tests/mpitests.c (test_maxsize): New. (main): Cal that test. -- A too large buffer length may lead to an unsigned integer overflow on systems where size_t > unsigned int (ie. 64 bit systems). The computation of the required number of nlimbs may also be affected by this. However this is not a real world case because any processing which has allocated such a long buffer from an external source would be prone to other DoS attacks: The required buffer length to exhibit this overflow is at least 2^32 - 8 bytes. Signed-off-by: Werner Koch diff --git a/doc/gcrypt.texi b/doc/gcrypt.texi index 437dddb..c710765 100644 --- a/doc/gcrypt.texi +++ b/doc/gcrypt.texi @@ -4526,7 +4526,8 @@ representation of an MPI and the internal one of Libgcrypt. Convert the external representation of an integer stored in @var{buffer} with a length of @var{buflen} into a newly created MPI returned which will be stored at the address of @var{r_mpi}. For certain formats the -length argument is not required and should be passed as @code{0}. After a +length argument is not required and should be passed as @code{0}. A + at var{buflen} larger than 16 MiByte will be rejected. After a successful operation the variable @var{nscanned} receives the number of bytes actually scanned unless @var{nscanned} was given as @code{NULL}. @var{format} describes the format of the MPI as stored in @@ -4540,6 +4541,7 @@ bytes actually scanned unless @var{nscanned} was given as @item GCRYMPI_FMT_PGP As used by OpenPGP (only defined as unsigned). This is basically @code{GCRYMPI_FMT_STD} with a 2 byte big endian length header. +A length header indicating a length of more than 16384 is not allowed. @item GCRYMPI_FMT_SSH As used in the Secure Shell protocol. This is @code{GCRYMPI_FMT_STD} diff --git a/mpi/mpicoder.c b/mpi/mpicoder.c index 896dda1..e315576 100644 --- a/mpi/mpicoder.c +++ b/mpi/mpicoder.c @@ -27,8 +27,21 @@ #include "mpi-internal.h" #include "g10lib.h" +/* The maximum length we support in the functions converting an + * external representation to an MPI. This limit is used to catch + * programming errors and to avoid DoS due to insane long allocations. + * The 16 MiB limit is actually ridiculous large but some of those PQC + * algorithms use quite large keys and they might end up using MPIs + * for that. */ +#define MAX_EXTERN_SCAN_BYTES (16*1024*1024) + +/* The maximum length (in bits) we support for OpenPGP MPIs. Note + * that OpenPGP's MPI format uses only two bytes and thus would be + * limited to 64k anyway. Note that this limit matches that used by + * GnuPG. */ #define MAX_EXTERN_MPI_BITS 16384 + /* Helper used to scan PGP style MPIs. Returns NULL on failure. */ static gcry_mpi_t mpi_read_from_buffer (const unsigned char *buffer, unsigned *ret_nread, @@ -104,7 +117,13 @@ mpi_fromstr (gcry_mpi_t val, const char *str) if ( *str == '0' && str[1] == 'x' ) str += 2; - nbits = 4 * strlen (str); + nbits = strlen (str); + if (nbits > MAX_EXTERN_SCAN_BYTES) + { + mpi_clear (val); + return 1; /* Error. */ + } + nbits *= 4; if ((nbits % 8)) prepend_zero = 1; @@ -438,9 +457,9 @@ twocompl (unsigned char *p, unsigned int n) /* Convert the external representation of an integer stored in BUFFER - with a length of BUFLEN into a newly create MPI returned in - RET_MPI. If NBYTES is not NULL, it will receive the number of - bytes actually scanned after a successful operation. */ + * with a length of BUFLEN into a newly create MPI returned in + * RET_MPI. If NSCANNED is not NULL, it will receive the number of + * bytes actually scanned after a successful operation. */ gcry_err_code_t _gcry_mpi_scan (struct gcry_mpi **ret_mpi, enum gcry_mpi_format format, const void *buffer_arg, size_t buflen, size_t *nscanned) @@ -450,6 +469,13 @@ _gcry_mpi_scan (struct gcry_mpi **ret_mpi, enum gcry_mpi_format format, unsigned int len; int secure = (buffer && _gcry_is_secure (buffer)); + if (buflen > MAX_EXTERN_SCAN_BYTES) + { + if (nscanned) + *nscanned = 0; + return GPG_ERR_INV_OBJ; + } + if (format == GCRYMPI_FMT_SSH) len = 0; else diff --git a/tests/mpitests.c b/tests/mpitests.c index e6f8525..b663029 100644 --- a/tests/mpitests.c +++ b/tests/mpitests.c @@ -237,6 +237,42 @@ test_opaque (void) static void +test_maxsize (void) +{ + gpg_error_t err; + gcry_mpi_t a; + char buffer[2+2048]; /* For PGP: 2 length bytes and 16384 bits. */ + + memset (buffer, 0x55, sizeof buffer); + + /* We use a short buffer but a give a too large length to simulate a + * programming error. In case this test fails (i.e. die() is + * called) the scan function may have access data outside of BUFFER + * which may result in a segv but we ignore that to avoid actually + * allocating such a long buffer. */ + err = gcry_mpi_scan (&a, GCRYMPI_FMT_USG, buffer, 16*1024*1024 +1, NULL); + if (gpg_err_code (err) != GPG_ERR_INV_OBJ) + die ("gcry_mpi_scan does not detect its generic input limit\n"); + + /* Now test the PGP limit. The scan code check the two length bytes + * from the buffer and thus it is sufficient to fake them. */ + buffer[0] = (16385 >> 8); + buffer[1] = (16385 & 0xff); + err = gcry_mpi_scan (&a, GCRYMPI_FMT_PGP, buffer, sizeof buffer, NULL); + if (gpg_err_code (err) != GPG_ERR_INV_OBJ) + die ("gcry_mpi_scan does not detect the PGP input limit\n"); + + buffer[0] = (16384 >> 8); + buffer[1] = (16384 & 0xff); + + err = gcry_mpi_scan (&a, GCRYMPI_FMT_PGP, buffer, sizeof buffer, NULL); + if (err) + die ("gcry_mpi_scan did not parse a large PGP: %s\n", gpg_strerror (err)); + gcry_mpi_release (a); +} + + +static void test_cmp (void) { gpg_error_t rc; @@ -569,6 +605,7 @@ main (int argc, char* argv[]) test_const_and_immutable (); test_opaque (); + test_maxsize (); test_cmp (); test_add (); test_sub (); ----------------------------------------------------------------------- Summary of changes: doc/gcrypt.texi | 4 +++- mpi/mpicoder.c | 34 ++++++++++++++++++++++++++++++---- tests/mpitests.c | 37 +++++++++++++++++++++++++++++++++++++ 3 files changed, 70 insertions(+), 5 deletions(-) hooks/post-receive -- The GNU crypto library http://git.gnupg.org From cvs at cvs.gnupg.org Fri Apr 1 15:04:24 2016 From: cvs at cvs.gnupg.org (by Justus Winter) Date: Fri, 01 Apr 2016 15:04:24 +0200 Subject: [git] GnuPG - branch, master, updated. gnupg-2.1.11-112-g6060ea8 Message-ID: This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "The GNU Privacy Guard". The branch, master has been updated via 6060ea898fda499211c9d5030fff41d58f899fb0 (commit) via b74185b6eaeaae4754726ff203e11977777f568c (commit) from e7171f559590422cc52dbcb8d78d94569b31012f (commit) Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below. - Log ----------------------------------------------------------------- commit 6060ea898fda499211c9d5030fff41d58f899fb0 Author: Justus Winter Date: Fri Apr 1 14:53:48 2016 +0200 build: Check for conflicting trust model options. * configure.ac: Disable TOFU if configured without trust models, and check for conflicting options. Signed-off-by: Justus Winter diff --git a/configure.ac b/configure.ac index 003e509..0163dde 100644 --- a/configure.ac +++ b/configure.ac @@ -263,8 +263,11 @@ AC_MSG_CHECKING([whether to enable TOFU]) AC_ARG_ENABLE(tofu, AC_HELP_STRING([--disable-tofu], [disable the TOFU trust model]), - use_tofu=$enableval, use_tofu=yes) + use_tofu=$enableval, use_tofu=$use_trust_models) AC_MSG_RESULT($use_tofu) +if test "$use_trust_models" = no && test "$use_tofu" = yes; then + AC_MSG_ERROR([both --disable-trust-models and --enable-tofu given]) +fi commit b74185b6eaeaae4754726ff203e11977777f568c Author: Justus Winter Date: Fri Apr 1 14:51:56 2016 +0200 g10: Remove option --always-trust if compiled without trust models. * g10/gpg.c (opts): Remove option --always-trust if compiled without trust models. Signed-off-by: Justus Winter diff --git a/g10/gpg.c b/g10/gpg.c index 330d5a3..b9d69a7 100644 --- a/g10/gpg.c +++ b/g10/gpg.c @@ -681,7 +681,9 @@ static ARGPARSE_OPTS opts[] = { ARGPARSE_s_n (oSkipHiddenRecipients, "skip-hidden-recipients", "@"), ARGPARSE_s_n (oNoSkipHiddenRecipients, "no-skip-hidden-recipients", "@"), ARGPARSE_s_i (oDefCertLevel, "default-cert-check-level", "@"), /* old */ +#ifndef NO_TRUST_MODELS ARGPARSE_s_n (oAlwaysTrust, "always-trust", "@"), +#endif ARGPARSE_s_s (oTrustModel, "trust-model", "@"), ARGPARSE_s_s (oTOFUDefaultPolicy, "tofu-default-policy", "@"), ARGPARSE_s_s (oTOFUDBFormat, "tofu-db-format", "@"), ----------------------------------------------------------------------- Summary of changes: configure.ac | 5 ++++- g10/gpg.c | 2 ++ 2 files changed, 6 insertions(+), 1 deletion(-) hooks/post-receive -- The GNU Privacy Guard http://git.gnupg.org From cvs at cvs.gnupg.org Fri Apr 1 16:43:10 2016 From: cvs at cvs.gnupg.org (by Justus Winter) Date: Fri, 01 Apr 2016 16:43:10 +0200 Subject: [git] GnuPG - branch, master, updated. gnupg-2.1.11-113-g42d4c27 Message-ID: This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "The GNU Privacy Guard". The branch, master has been updated via 42d4c2762f7ae5b009b62963e6595bdec9df6859 (commit) from 6060ea898fda499211c9d5030fff41d58f899fb0 (commit) Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below. - Log ----------------------------------------------------------------- commit 42d4c2762f7ae5b009b62963e6595bdec9df6859 Author: Justus Winter Date: Fri Apr 1 16:38:24 2016 +0200 po: Fix misleading german translation. -- GnuPG-bug-id: 2239 Signed-off-by: Justus Winter diff --git a/po/de.po b/po/de.po index 3dad2a2..a27e4a7 100644 --- a/po/de.po +++ b/po/de.po @@ -3381,8 +3381,7 @@ msgstr "Der folgende Schl?ssel wurde am %s von %s Schl?ssel %s widerrufen\n" #, c-format msgid "This key may be revoked by %s key %s" -msgstr "" -"Dieser Schl?ssel k?nnte durch %s mit Schl?ssel %s widerrufen worden sein" +msgstr "Dieser Schl?ssel kann von %s-Schl?ssel %s widerrufen werden" msgid "(sensitive)" msgstr "(empfindlich)" ----------------------------------------------------------------------- Summary of changes: po/de.po | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) hooks/post-receive -- The GNU Privacy Guard http://git.gnupg.org From cvs at cvs.gnupg.org Fri Apr 1 17:41:24 2016 From: cvs at cvs.gnupg.org (by Justus Winter) Date: Fri, 01 Apr 2016 17:41:24 +0200 Subject: [git] gnupg-doc - branch, master, updated. 81797afe93a8130ae7c9db861696a8d6d8463bd5 Message-ID: This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "The GnuPG website and other docs". The branch, master has been updated via 81797afe93a8130ae7c9db861696a8d6d8463bd5 (commit) from e644e6a19bac81bbc8bfb03a204123ea2bcafd69 (commit) Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below. - Log ----------------------------------------------------------------- commit 81797afe93a8130ae7c9db861696a8d6d8463bd5 Author: Justus Winter Date: Fri Apr 1 17:37:56 2016 +0200 card-howto: Add missing files. -- GnuPG-bug-id: 1767 Signed-off-by: Justus Winter diff --git a/misc/howtos.gnupg.org/card-howto/en/ch02s03.html b/misc/howtos.gnupg.org/card-howto/en/ch02s03.html index d95cfc9..7feaf68 100644 --- a/misc/howtos.gnupg.org/card-howto/en/ch02s03.html +++ b/misc/howtos.gnupg.org/card-howto/en/ch02s03.html @@ -57,12 +57,12 @@ diff --git a/misc/howtos.gnupg.org/card-howto/en/gnupg-ccid b/misc/howtos.gnupg.org/card-howto/en/gnupg-ccid new file mode 100644 index 0000000..be06bec --- /dev/null +++ b/misc/howtos.gnupg.org/card-howto/en/gnupg-ccid @@ -0,0 +1,30 @@ +#!/bin/bash +# +# taken from libgphoto2 +# +# Sets up newly plugged in card reader so that only members of the +# group can access it + +GROUP=scard + +# can access it from user space. (Replace scard with the name of the +# group you want to have access to the card reader.) +# +# Note that for this script to work, you'll need all of the following: +# a) a line in the file /etc/hotplug/gnupg-ccid.usermap that corresponds +# to the card reader you are using. +# b) a group "scard" where all users allowed access to the +# card reader are listed +# c) a Linux kernel supporting hotplug and usbdevfs +# d) the hotplug package (http://linux-hotplug.sourceforge.net/) +# +# In the usermap file, the first field "usb module" should be named +# "gnupg-ccid" like this script. +# + +if [ "${ACTION}" = "add" ] && [ -f "${DEVICE}" ] +then + chmod o-rwx "${DEVICE}" + chgrp "${GROUP}" "${DEVICE}" + chmod g+rw "${DEVICE}" +fi diff --git a/misc/howtos.gnupg.org/card-howto/en/gnupg-ccid.rules b/misc/howtos.gnupg.org/card-howto/en/gnupg-ccid.rules new file mode 100644 index 0000000..a04c022 --- /dev/null +++ b/misc/howtos.gnupg.org/card-howto/en/gnupg-ccid.rules @@ -0,0 +1,5 @@ +# GPG SmartCard Reader Support +# + +ACTION=="add", SUBSYSTEM=="usb", ENV{PRODUCT}=="4e6/e003/*", RUN+="/etc/udev/scripts/gnupg-ccid" +ACTION=="add", SUBSYSTEM=="usb", ENV{PRODUCT}=="4e6/5115/*", RUN+="/etc/udev/scripts/gnupg-ccid" diff --git a/misc/howtos.gnupg.org/card-howto/en/smartcard-howto-single.html b/misc/howtos.gnupg.org/card-howto/en/smartcard-howto-single.html index 7024fb5..dea3cde 100644 --- a/misc/howtos.gnupg.org/card-howto/en/smartcard-howto-single.html +++ b/misc/howtos.gnupg.org/card-howto/en/smartcard-howto-single.html @@ -51,7 +51,7 @@ edges a bit. This is in particular important so that you are able to remove the card using the tiny blue lever. -

2.3.?Installation of Card Reader

Two standard protocols are used by GnuPG to access card readers.

2.3.1.?CCID (Chip Card Interface Description)

The driver to access CCID cards is built into GnuPG. This driver will be used by default.

To use this driver follow the instructions and make sure you have sufficient permission (see below) to access the USB device for reading and writing.

With udev (preferred installation)

First of all, you will need to download two files for udev and copy them to the udev configuration directories, in order to let it identify your card reader:

Now, open a terminal and become root (you will be asked for your root password):

+                

2.3.?Installation of Card Reader

Two standard protocols are used by GnuPG to access card readers.

2.3.1.?CCID (Chip Card Interface Description)

The driver to access CCID cards is built into GnuPG. This driver will be used by default.

To use this driver follow the instructions and make sure you have sufficient permission (see below) to access the USB device for reading and writing.

With udev (preferred installation)

First of all, you will need to download two files for udev and copy them to the udev configuration directories, in order to let it identify your card reader:

Now, open a terminal and become root (you will be asked for your root password):

 archi at foobar:~ > su -
                 

On Ubuntu systems, you should run (and then you will be asked for the user password):

 archi at foobar:~ > sudo su -

-----------------------------------------------------------------------

Summary of changes:
 misc/howtos.gnupg.org/card-howto/en/ch02s03.html   |  4 +--
 misc/howtos.gnupg.org/card-howto/en/gnupg-ccid     | 30 ++++++++++++++++++++++
 .../card-howto/en/gnupg-ccid.rules                 |  5 ++++
 .../card-howto/en/smartcard-howto-single.html      |  2 +-
 4 files changed, 38 insertions(+), 3 deletions(-)
 create mode 100644 misc/howtos.gnupg.org/card-howto/en/gnupg-ccid
 create mode 100644 misc/howtos.gnupg.org/card-howto/en/gnupg-ccid.rules


hooks/post-receive
-- 
The GnuPG website and other docs
http://git.gnupg.org



From cvs at cvs.gnupg.org  Fri Apr  1 17:44:46 2016
From: cvs at cvs.gnupg.org (by Werner Koch)
Date: Fri, 01 Apr 2016 17:44:46 +0200
Subject: [git] gnupg-doc - branch, master,
 updated. 5295904c3a87661bbadc567fa504e96ed7448a94
Message-ID: 

This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "The GnuPG website and other docs".

The branch, master has been updated
       via  5295904c3a87661bbadc567fa504e96ed7448a94 (commit)
      from  81797afe93a8130ae7c9db861696a8d6d8463bd5 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit 5295904c3a87661bbadc567fa504e96ed7448a94
Author: Werner Koch 
Date:   Fri Apr 1 17:35:18 2016 +0200

    web: Add facebook logo to the kudos page.
    
    Logo received from Melanie Ensign
    on Tue, 22 Mar 2016 20:28:30 +0000
    and scaled down to match the other logos.

diff --git a/web/donate/kudos.org b/web/donate/kudos.org
index 9fbf8ac..d279954 100644
--- a/web/donate/kudos.org
+++ b/web/donate/kudos.org
@@ -71,6 +71,7 @@ The [[https://gnupg.org/blog/20140512-rewards-sent.html][Goteo crowdfunding]] ca
 #+HTML: 
[[http://eof.eu.org][file:logos/eof.eu.org-logo.png]] [[https://www.wauland.de][file:logos/whs-logo.png]] + [[https://facebook.com][file:logos/facebook-06-2015-blue_x.png]] #+HTML:
* Hardware and service donations diff --git a/web/donate/logos/facebook-06-2015-blue_x.png b/web/donate/logos/facebook-06-2015-blue_x.png new file mode 100644 index 0000000..e95ede1 Binary files /dev/null and b/web/donate/logos/facebook-06-2015-blue_x.png differ ----------------------------------------------------------------------- Summary of changes: web/donate/kudos.org | 1 + web/donate/logos/facebook-06-2015-blue_x.png | Bin 0 -> 2465 bytes 2 files changed, 1 insertion(+) create mode 100644 web/donate/logos/facebook-06-2015-blue_x.png hooks/post-receive -- The GnuPG website and other docs http://git.gnupg.org From cvs at cvs.gnupg.org Sat Apr 2 18:08:53 2016 From: cvs at cvs.gnupg.org (by Andre Heinecke) Date: Sat, 02 Apr 2016 18:08:53 +0200 Subject: [git] GPGME - branch, gpgmepp, updated. gpgme-1.6.0-26-ga440050 Message-ID: This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "GnuPG Made Easy". The branch, gpgmepp has been updated via a440050fc2c11e4867da9d4707616fa23ac52141 (commit) from 226e51052ae73efa8d9f30729b28de68d35231af (commit) Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below. - Log ----------------------------------------------------------------- commit a440050fc2c11e4867da9d4707616fa23ac52141 Author: Andre Heinecke Date: Sat Apr 2 08:06:45 2016 -0800 Add missing files to QGpgME * lang/qt/src/gpgme_backend_debug.cpp, lang/qt/src/gpgme_backend_debug.h, lang/qt/src/predicates.h, lang/qt/src/stl_util.h: New. diff --git a/lang/qt/src/gpgme_backend_debug.cpp b/lang/qt/src/gpgme_backend_debug.cpp new file mode 100644 index 0000000..6dfb313 --- /dev/null +++ b/lang/qt/src/gpgme_backend_debug.cpp @@ -0,0 +1,10 @@ +// This file is autogenerated by CMake: DO NOT EDIT + +#include "gpgme_backend_debug.h" + + +#if QT_VERSION >= QT_VERSION_CHECK(5, 4, 0) +Q_LOGGING_CATEGORY(GPGPME_BACKEND_LOG, "log_gpgme_backend", QtWarningMsg) +#else +Q_LOGGING_CATEGORY(GPGPME_BACKEND_LOG, "log_gpgme_backend") +#endif diff --git a/lang/qt/src/gpgme_backend_debug.h b/lang/qt/src/gpgme_backend_debug.h new file mode 100644 index 0000000..5ac93db --- /dev/null +++ b/lang/qt/src/gpgme_backend_debug.h @@ -0,0 +1,11 @@ +// This file is autogenerated by CMake: DO NOT EDIT + +#ifndef GPGPME_BACKEND_LOG_H +#define GPGPME_BACKEND_LOG_H + +#include + +Q_DECLARE_LOGGING_CATEGORY(GPGPME_BACKEND_LOG) + + +#endif diff --git a/lang/qt/src/predicates.h b/lang/qt/src/predicates.h new file mode 100644 index 0000000..74bbe3d --- /dev/null +++ b/lang/qt/src/predicates.h @@ -0,0 +1,205 @@ +/* -*- mode: c++; c-basic-offset:4 -*- + models/predicates.h + + This file is part of Kleopatra, the KDE keymanager + Copyright (c) 2007 Klar?lvdalens Datakonsult AB + Copyright (c) 2016 Intevation GmbH + + Kleopatra is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + Kleopatra is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA + + In addition, as a special exception, the copyright holders give + permission to link the code of this program with any edition of + the Qt library by Trolltech AS, Norway (or with modified versions + of Qt that use the same license as Qt), and distribute linked + combinations including the two. You must obey the GNU General + Public License in all respects for all of the code used other than + Qt. If you modify this file, you may extend this exception to + your version of the file, but you are not obligated to do so. If + you do not wish to do so, delete this exception statement from + your version. +*/ + +#ifndef __QGPGME_PREDICATES_H__ +#define __QGPGME_PREDICATES_H__ + +#include + +#include + +#ifdef BUILDING_QGPGME +# include "global.h" +#else +# include +#endif + +#include + +#include +#include +#include + +namespace QGpgME +{ +namespace _detail +{ + +inline int mystrcmp(const char *s1, const char *s2) +{ + using namespace std; + return s1 ? s2 ? strcmp(s1, s2) : 1 : s2 ? -1 : 0; +} + +#define make_comparator_str_impl( Name, expr, cmp ) \ + template