[Pkg-gnupg-commit] [gnupg2] 38/180: gpgsm: Allow decryption with a card returning a PKCS#1 stripped key.
Daniel Kahn Gillmor
dkg at fifthhorseman.net
Sat Dec 24 22:29:05 UTC 2016
This is an automated email from the git hooks/post-receive script.
dkg pushed a commit to branch master
in repository gnupg2.
commit 8489b12211098ad58c008cfb74b5cb91849cf68d
Author: Werner Koch <wk at gnupg.org>
Date: Tue Nov 29 19:19:45 2016 +0100
gpgsm: Allow decryption with a card returning a PKCS#1 stripped key.
* sm/decrypt.c (prepare_decryption): Handle a 16 byte session key.
--
GnuPG-bug-id: 2230
Signed-off-by: Werner Koch <wk at gnupg.org>
---
sm/decrypt.c | 8 +++++---
1 file changed, 5 insertions(+), 3 deletions(-)
diff --git a/sm/decrypt.c b/sm/decrypt.c
index 11c1cf8..a2907f6 100644
--- a/sm/decrypt.c
+++ b/sm/decrypt.c
@@ -74,10 +74,12 @@ prepare_decryption (ctrl_t ctrl, const char *hexkeygrip, const char *desc,
log_printhex ("pkcs1 encoded session key:", seskey, seskeylen);
n=0;
- if (seskeylen == 24)
+ if (seskeylen == 24 || seskeylen == 16)
{
- /* Smells like a 3-des key. This might happen because a SC has
- already done the unpacking. */
+ /* Smells like a 3-DES or AES-128 key. This might happen
+ * because a SC has already done the unpacking. A better
+ * solution would be to test for this only after we triggered
+ * the GPG_ERR_INV_SESSION_KEY. */
}
else
{
--
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-gnupg/gnupg2.git
More information about the Pkg-gnupg-commit
mailing list