public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
From: "Kristian Fiskerstrand" <k_f@gentoo.org>
To: gentoo-commits@lists.gentoo.org
Subject: [gentoo-commits] repo/gentoo:master commit in: app-crypt/gnupg/files/
Date: Wed, 23 Nov 2016 20:32:29 +0000 (UTC)	[thread overview]
Message-ID: <1479933143.e87a33e05c8b9e57e95a9c766d767f0942fdafb5.k_f@gentoo> (raw)

commit:     e87a33e05c8b9e57e95a9c766d767f0942fdafb5
Author:     Kristian Fiskerstrand <k_f <AT> gentoo <DOT> org>
AuthorDate: Wed Nov 23 20:32:11 2016 +0000
Commit:     Kristian Fiskerstrand <k_f <AT> gentoo <DOT> org>
CommitDate: Wed Nov 23 20:32:23 2016 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=e87a33e0

app-crypt/gnupg: Clean up unused files

Package-Manager: portage-2.3.2

 ....0.26-Need-to-init-the-trustdb-for-import.patch |  35 ------
 app-crypt/gnupg/files/gnupg-2.0.26-misc-cve.patch  | 118 ---------------------
 .../files/gnupg-2.1-fix-gentoo-dash-issue.patch    |  12 ---
 .../gnupg-2.1.12-fix-signature-checking.patch      |  50 ---------
 4 files changed, 215 deletions(-)

diff --git a/app-crypt/gnupg/files/gnupg-2.0.26-Need-to-init-the-trustdb-for-import.patch b/app-crypt/gnupg/files/gnupg-2.0.26-Need-to-init-the-trustdb-for-import.patch
deleted file mode 100644
index 4c9eff2..00000000
--- a/app-crypt/gnupg/files/gnupg-2.0.26-Need-to-init-the-trustdb-for-import.patch
+++ /dev/null
@@ -1,35 +0,0 @@
-From a2dcc5cc49c3e79d64bd1a2ad7a5bc4df5b073ee Mon Sep 17 00:00:00 2001
-From: Kristian Fiskerstrand <kf@sumptuouscapital.com>
-Date: Wed, 13 Aug 2014 11:13:34 +0200
-Subject: [PATCH] gpg: Need to init the trustdb for import.
-
-* g10/trustdb.c (clear_ownertrusts): Init trustdb.
-
---
-
-This was fixed in 1.4 branch in commit
-23191d7851eae2217ecdac6484349849a24fd94a but was not applied to the
-2.0 branch that exhibits the same problem. This is actually a hack
-to fix a bug introduced with commit 2528178.
-
-GnuPG-bug-id: 1622
----
- g10/trustdb.c | 2 ++
- 1 file changed, 2 insertions(+)
-
-diff --git a/g10/trustdb.c b/g10/trustdb.c
-index f96701a..7bfef25 100644
---- a/g10/trustdb.c
-+++ b/g10/trustdb.c
-@@ -923,6 +923,8 @@ clear_ownertrusts (PKT_public_key *pk)
-   TRUSTREC rec;
-   int rc;
- 
-+  init_trustdb();
-+
-   if (trustdb_args.no_trustdb && opt.trust_model == TM_ALWAYS)
-     return 0;
- 
--- 
-1.8.5.5
-

diff --git a/app-crypt/gnupg/files/gnupg-2.0.26-misc-cve.patch b/app-crypt/gnupg/files/gnupg-2.0.26-misc-cve.patch
deleted file mode 100644
index 734a04a..00000000
--- a/app-crypt/gnupg/files/gnupg-2.0.26-misc-cve.patch
+++ /dev/null
@@ -1,118 +0,0 @@
-From ed8383c618e124cfa708c9ee87563fcdf2f4649c Mon Sep 17 00:00:00 2001
-From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
-Date: Fri, 19 Dec 2014 18:53:34 -0500
-Subject: [PATCH] sm: Avoid double-free on iconv failure
-
-* sm/minip12.c: (p12_build) if jnlib_iconv_open fails, avoid
-double-free of pwbuf.
-
---
-
-Observed by Joshua Rogers <honey@internot.info>, who proposed a
-slightly different fix.
-
-Debian-Bug-Id: 773472
-
-Added fix at a second place - wk.
----
- sm/minip12.c |    2 ++
- 1 file changed, 2 insertions(+)
-
-diff --git a/agent/minip12.c b/agent/minip12.c
-index 01b91b7..ca4d248 100644
---- a/agent/minip12.c
-+++ b/agent/minip12.c
-@@ -2422,6 +2422,7 @@ p12_build (gcry_mpi_t *kparms, const void *cert, size_t certlen,
-                      " requested charset '%s': %s\n",
-                      charset, strerror (errno));
-           gcry_free (pwbuf);
-+          pwbuf = NULL;
-           goto failure;
-         }
- 
-@@ -2436,6 +2437,7 @@ p12_build (gcry_mpi_t *kparms, const void *cert, size_t certlen,
-                      " requested charset '%s': %s\n",
-                      charset, strerror (errno));
-           gcry_free (pwbuf);
-+          pwbuf = NULL;
-           jnlib_iconv_close (cd);
-           goto failure;
-         }
--- 
-1.7.10.4
-
-From b0b3803e8c2959dd67ca96debc54b5c6464f0d41 Mon Sep 17 00:00:00 2001
-From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
-Date: Fri, 19 Dec 2014 18:07:55 -0500
-Subject: [PATCH] scd: Avoid double-free on error condition in scd
-
-* scd/command.c (cmd_readkey): avoid double-free of cert
-
---
-
-When ksba_cert_new() fails, cert will be double-freed.
-
-Debian-Bug-Id: 773471
-
-Original patch changed by wk to do the free only at leave.
----
- scd/command.c |    6 ++----
- 1 file changed, 2 insertions(+), 4 deletions(-)
-
-diff --git a/scd/command.c b/scd/command.c
-index dd4191f..1cc580a 100644
---- a/scd/command.c
-+++ b/scd/command.c
-@@ -804,10 +804,8 @@ cmd_readkey (assuan_context_t ctx, char *line)
- 
-   rc = ksba_cert_new (&kc);
-   if (rc)
--    {
--      xfree (cert);
--      goto leave;
--    }
-+    goto leave;
-+
-   rc = ksba_cert_init_from_mem (kc, cert, ncert);
-   if (rc)
-     {
--- 
-1.7.10.4
-
-From abd5f6752d693b7f313c19604f0723ecec4d39a6 Mon Sep 17 00:00:00 2001
-From: Werner Koch <wk@gnupg.org>
-Date: Mon, 22 Dec 2014 12:16:46 +0100
-Subject: [PATCH] dirmngr,gpgsm: Return NULL on fail
-
-* dirmngr/ldapserver.c (ldapserver_parse_one): Set SERVER to NULL.
-* sm/gpgsm.c (parse_keyserver_line): Ditto.
---
-
-Reported-by: Joshua Rogers <git@internot.info>
-
-  "If something inside the ldapserver_parse_one function failed,
-   'server' would be freed, then returned, leading to a
-   use-after-free.  This code is likely copied from sm/gpgsm.c, which
-   was also susceptible to this bug."
-
-Signed-off-by: Werner Koch <wk@gnupg.org>
----
- dirmngr/ldapserver.c |    1 +
- sm/gpgsm.c           |    1 +
- 2 files changed, 2 insertions(+)
-
-diff --git a/sm/gpgsm.c b/sm/gpgsm.c
-index 3398d17..72bceb4 100644
---- a/sm/gpgsm.c
-+++ b/sm/gpgsm.c
-@@ -862,6 +862,7 @@ parse_keyserver_line (char *line,
-     {
-       log_info (_("%s:%u: skipping this line\n"), filename, lineno);
-       keyserver_list_free (server);
-+      server = NULL;
-     }
- 
-   return server;
--- 
-1.7.10.4
-

diff --git a/app-crypt/gnupg/files/gnupg-2.1-fix-gentoo-dash-issue.patch b/app-crypt/gnupg/files/gnupg-2.1-fix-gentoo-dash-issue.patch
deleted file mode 100644
index 6878ef1..00000000
--- a/app-crypt/gnupg/files/gnupg-2.1-fix-gentoo-dash-issue.patch
+++ /dev/null
@@ -1,12 +0,0 @@
-diff -Naur tests.old/openpgp/mds.test tests/openpgp/mds.test
---- tests.old/openpgp/mds.test	2016-05-03 13:13:11.373313389 +0200
-+++ tests/openpgp/mds.test	2016-05-03 13:13:31.886755059 +0200
-@@ -63,7 +63,7 @@
- 
- [ "$failed" != "" ] && error "$failed failed for empty string"
- 
--echo_n "abcdefghijklmnopqrstuvwxyz" | $GPG --with-colons --print-mds >y
-+printf "abcdefghijklmnopqrstuvwxyz" | $GPG --with-colons --print-mds >y
- if have_hash_algo "MD5"; then
-   test_one ":1:"    "C3FCD3D76192E4007DFB496CCA67E13B"
- fi

diff --git a/app-crypt/gnupg/files/gnupg-2.1.12-fix-signature-checking.patch b/app-crypt/gnupg/files/gnupg-2.1.12-fix-signature-checking.patch
deleted file mode 100644
index debf0bb..00000000
--- a/app-crypt/gnupg/files/gnupg-2.1.12-fix-signature-checking.patch
+++ /dev/null
@@ -1,50 +0,0 @@
-From 83a90a916e8e2f8e44c3b11d11e1dd75f65a87fb Mon Sep 17 00:00:00 2001
-From: NIIBE Yutaka <gniibe@fsij.org>
-Date: Wed, 11 May 2016 19:27:03 +0900
-Subject: [PATCH 1/1] g10: Fix signature checking.
-
-* g10/sig-check.c (check_signature_over_key_or_uid): Fix call to
-walk_kbnode.
-
---
-
-Thanks to Vincent Brillault (Feandil).
-
-GnuPG-bug-id: 2351
-Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
----
- g10/sig-check.c | 13 +++++++++----
- 1 file changed, 9 insertions(+), 4 deletions(-)
-
-diff --git a/g10/sig-check.c b/g10/sig-check.c
-index 290f19a..7000b48 100644
---- a/g10/sig-check.c
-+++ b/g10/sig-check.c
-@@ -797,15 +797,20 @@ check_signature_over_key_or_uid (PKT_public_key *signer,
-             *is_selfsig = 1;
-         }
-       else
--        /* See if one of the subkeys was the signer (although this is
--           extremely unlikely).  */
-         {
-           kbnode_t ctx = NULL;
-           kbnode_t n;
- 
--          while ((n = walk_kbnode (kb, &ctx, PKT_PUBLIC_SUBKEY)))
-+          /* See if one of the subkeys was the signer (although this
-+             is extremely unlikely).  */
-+          while ((n = walk_kbnode (kb, &ctx, 0)))
-             {
--              PKT_public_key *subk = n->pkt->pkt.public_key;
-+              PKT_public_key *subk;
-+
-+              if (n->pkt->pkttype != PKT_PUBLIC_SUBKEY)
-+                continue;
-+
-+              subk = n->pkt->pkt.public_key;
-               if (sig->keyid[0] == subk->keyid[0]
-                   && sig->keyid[1] == subk->keyid[1])
-                 /* Issued by a subkey.  */
--- 
-2.8.0.rc3
-


             reply	other threads:[~2016-11-23 20:32 UTC|newest]

Thread overview: 10+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-11-23 20:32 Kristian Fiskerstrand [this message]
  -- strict thread matches above, loose matches on Subject: below --
2017-01-24 17:44 [gentoo-commits] repo/gentoo:master commit in: app-crypt/gnupg/files/ Kristian Fiskerstrand
2017-08-18 17:34 Alon Bar-Lev
2018-05-12 20:27 Robin H. Johnson
2018-07-13  9:38 Tony Vroon
2021-09-07 15:20 David Seifert
2023-06-23 21:29 Conrad Kostecki
2024-02-18 10:13 Sam James
2024-06-23  1:49 Sam James
2025-03-28 21:06 Conrad Kostecki

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1479933143.e87a33e05c8b9e57e95a9c766d767f0942fdafb5.k_f@gentoo \
    --to=k_f@gentoo.org \
    --cc=gentoo-commits@lists.gentoo.org \
    --cc=gentoo-dev@lists.gentoo.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox