pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/security/netpgpverify/files Update netpgpverify and li...



details:   https://anonhg.NetBSD.org/pkgsrc/rev/cb8c09926aa0
branches:  trunk
changeset: 348496:cb8c09926aa0
user:      agc <agc%pkgsrc.org@localhost>
date:      Wed Jun 15 03:34:15 2016 +0000

description:
Update netpgpverify and libnetpgpverify to 20160615:

Simplify the method of finding the end of the versioning information
in the signature - back up to the "\n" character at the end of the
signature start:

        "-----BEGIN PGP SIGNATURE-----\n"

and then find the "\n\n" character sequence to denote the start of the
signature itself. The previous version worked, but this is more efficient.

diffstat:

 security/netpgpverify/files/libverify.c |  18 +++++++-----------
 security/netpgpverify/files/verify.h    |   6 +++---
 2 files changed, 10 insertions(+), 14 deletions(-)

diffs (51 lines):

diff -r 58e3eff5feb4 -r cb8c09926aa0 security/netpgpverify/files/libverify.c
--- a/security/netpgpverify/files/libverify.c   Tue Jun 14 21:30:22 2016 +0000
+++ b/security/netpgpverify/files/libverify.c   Wed Jun 15 03:34:15 2016 +0000
@@ -2021,18 +2021,14 @@
                return 0;
        }
        litdata.u.litdata.len = litdata.s.size = (size_t)(p - datastart);
-       p += strlen(SIGSTART);
-       /* Work out whther there's a version line */
-       if (memcmp(p, "Version:", 8) == 0) {
-               if ((p = find_bin_string(p, mem->size, "\n\n",  2)) == NULL) {
-                       snprintf(cursor->why, sizeof(cursor->why),
-                               "malformed armed signature at %zu", (size_t)(p - mem->mem));
-                       return 0;
-               }
-               p += 2;
-       } else {
-               p += 1;
+       /* this puts p at the newline character, so it will find \n\n if no version */
+       p += strlen(SIGSTART) - 1;
+       if ((p = find_bin_string(p, mem->size, "\n\n",  2)) == NULL) {
+               snprintf(cursor->why, sizeof(cursor->why),
+                       "malformed armed signature at %zu", (size_t)(p - mem->mem));
+               return 0;
        }
+       p += 2;
        sigend = find_bin_string(p, mem->size, SIGEND, strlen(SIGEND));
        binsigsize = b64decode((char *)p, (size_t)(sigend - p), binsig, sizeof(binsig));
 
diff -r 58e3eff5feb4 -r cb8c09926aa0 security/netpgpverify/files/verify.h
--- a/security/netpgpverify/files/verify.h      Tue Jun 14 21:30:22 2016 +0000
+++ b/security/netpgpverify/files/verify.h      Wed Jun 15 03:34:15 2016 +0000
@@ -1,5 +1,5 @@
 /*-
- * Copyright (c) 2012,2013,2014,2015 Alistair Crooks <agc%NetBSD.org@localhost>
+ * Copyright (c) 2012,2013,2014,2015,2016 Alistair Crooks <agc%NetBSD.org@localhost>
  * All rights reserved.
  *
  * Redistribution and use in source and binary forms, with or without
@@ -23,9 +23,9 @@
  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  */
 #ifndef NETPGP_VERIFY_H_
-#define NETPGP_VERIFY_H_       20160614
+#define NETPGP_VERIFY_H_       20160615
 
-#define NETPGPVERIFY_VERSION   "netpgpverify portable 20160614"
+#define NETPGPVERIFY_VERSION   "netpgpverify portable 20160615"
 
 #include <sys/types.h>
 



Home | Main Index | Thread Index | Old Index