Zdenek Dohnal [Tue, 7 Jan 2025 16:44:30 +0000 (17:44 +0100)]
search.c: Fix build failure due new GCC
The warning by GCC is false positive because we don't access the freed
memory in the scope, only the pointer memory which contained address of
allocated memory on the heap, and used that for updating index pointer.
Using ptrdiff_t struct before realloc works the warning around.
zdohnal [Tue, 7 Jan 2025 13:27:02 +0000 (14:27 +0100)]
Add `NoSystem` SSLOptions value
In case using system crypto policy breaks communication with device irreversibly (f.e. if device does not support better key exchange algorithm), the new option value gives a way how to opt-out from crypto policy if user do not want to change default system crypto policy for the whole machine.
Zdenek Dohnal [Mon, 6 Jan 2025 17:34:30 +0000 (18:34 +0100)]
Add `NoSystem` SSLOptions value
In case using system crypto policy breaks communication with device
irreversibly (f.e. if device does not support better key exchange
algorithm), the new option value gives a way how to opt-out from crypto
policy if user do not want to change default system crypto policy for
the whole machine.
zdohnal [Fri, 6 Dec 2024 06:51:45 +0000 (07:51 +0100)]
tls-gnutls.c: Use system crypto policy if available
Some Linux systems provide a way how to control cryptography on system or service level via cryptographic policies. OpenSSL implementation reflects system changes to some degree, however GnuTLS implementation does not take system policy into account.
GnuTLS supports fallback mechanism, so we can fallback to NORMAL if @System is not defined on the system.
Fortunately, the current GnuTLS implementation allows overrides via priority strings (so no "this cipher/hash is disabled" if we enabled them in our application by priority string), so allowing to honor system policy can save us work if someone wants to disable a specific cipher, so we don't have to implement it in libcups.
Zdenek Dohnal [Wed, 4 Dec 2024 18:20:21 +0000 (19:20 +0100)]
tls-gnutls.c: Use system crypto policy if available
Some Linux systems provide a way how to control cryptography on system
or service level via cryptographic policies. OpenSSL implementation
reflects system changes to some degree, however GnuTLS implementation
does not take system policy into account.
GnuTLS supports fallback mechanism, so we can fallback to NORMAL if
@SYSTEM is not defined on the system.
Fortunately, the current GnuTLS implementation allows overrides via
priority strings (so no "this cipher/hash is disabled" if we enabled
them in our application by priority string), so allowing to honor system
policy can save us work if someone wants to disable a specific cipher,
so we don't have to implement it in libcups.
bcvieira [Thu, 28 Nov 2024 17:31:48 +0000 (14:31 -0300)]
Update jobs.tmpl pt_BR template
Corrected from á to the correct á pt_BR translation for jobs.tmpl. To verify check printer.tmpl which is right. usuário (user) and páginas (pages).
Benjamin Gordon [Fri, 1 Nov 2024 19:51:42 +0000 (13:51 -0600)]
Support bare staple and bind finishings values
In the generated PPD, IPP finishings "bind" is supposed to map to
"StapleLocation: BindAuto". Similarly, "staple" is supposed to map to
"StapleLocation: SingleAuto". The code already handles this, except
the lookup is blocked by a check that only accepts "staple-*" and
"bind-*" prefixed versions. Fix this by adding the bare versions to the
existing checks.
Michael R Sweet [Fri, 18 Oct 2024 00:07:18 +0000 (20:07 -0400)]
Mirror X.509 updates from libcups v3:
- cupsCreateCredentialsRequest now stores the new private key separately
- cupsSaveCredentials now uses the CSR private key when saving just the new
certificate
- cupsSaveCredentials now does some sanity checks on the input values.
- cupsSaveCredentials now supports credential removal as documented.
scheduler: Tolerate devices breaking IPPEVE specs if possible
Related to #1033
PPD generator currently is capable to bypass missing attribute
"media-col-database", if attributes "media-size-supported" or
"media-supported" are present.
Although such devices do not pass any IPP Everywhere or AirPrint
certifications, they exist in the wilderness.