diff options
author | Junio C Hamano <gitster@pobox.com> | 2021-12-21 15:03:15 -0800 |
---|---|---|
committer | Junio C Hamano <gitster@pobox.com> | 2021-12-21 15:03:15 -0800 |
commit | d2f0b7275998ebeaa15e48ce0180c466e1d77ec4 (patch) | |
tree | 9c78f0d3b6d3ba03fc9e6466f1f56fdc31443fcf /tag.c | |
parent | Merge branch 'jc/grep-patterntype-default-doc' (diff) | |
parent | ssh signing: verify ssh-keygen in test prereq (diff) | |
download | tgif-d2f0b7275998ebeaa15e48ce0180c466e1d77ec4.tar.xz |
Merge branch 'fs/ssh-signing-key-lifetime'
Extend the signing of objects with SSH keys and learn to pay
attention to the key validity time range when verifying.
* fs/ssh-signing-key-lifetime:
ssh signing: verify ssh-keygen in test prereq
ssh signing: make fmt-merge-msg consider key lifetime
ssh signing: make verify-tag consider key lifetime
ssh signing: make git log verify key lifetime
ssh signing: make verify-commit consider key lifetime
ssh signing: add key lifetime test prereqs
ssh signing: use sigc struct to pass payload
t/fmt-merge-msg: make gpgssh tests more specific
t/fmt-merge-msg: do not redirect stderr
Diffstat (limited to 'tag.c')
-rw-r--r-- | tag.c | 5 |
1 files changed, 3 insertions, 2 deletions
@@ -25,8 +25,9 @@ static int run_gpg_verify(const char *buf, unsigned long size, unsigned flags) return error("no signature found"); } - ret = check_signature(payload.buf, payload.len, signature.buf, - signature.len, &sigc); + sigc.payload_type = SIGNATURE_PAYLOAD_TAG; + sigc.payload = strbuf_detach(&payload, &sigc.payload_len); + ret = check_signature(&sigc, signature.buf, signature.len); if (!(flags & GPG_VERIFY_OMIT_STATUS)) print_signature_buffer(&sigc, flags); |