zdohnal [Wed, 12 Mar 2025 12:41:44 +0000 (13:41 +0100)]
backend/ipp.c: Raise alert if there is issue with cert
Currently we show more detailed info about this error in debug logs, but since there are not many desktops to pick up our dBUS notification, it would be great to report it in CUPS log too.
Zdenek Dohnal [Wed, 12 Mar 2025 12:19:04 +0000 (13:19 +0100)]
backend/ipp.c: Raise alert if there is issue with cert
Currently we show more detailed info about this error in debug logs, but
since there are not many desktops to pick up our dBUS notification, it
would be great to report it in CUPS log too.
Kirill Furman [Mon, 24 Feb 2025 19:31:45 +0000 (22:31 +0300)]
Fix heap overflow in array.c
When delim variable has \0 value,
strchr() func switch end var to the end of string,
set it to \0 and shift to next byte, which causes
heap overflow when new cycle runs
Fixes #1176
Signed-off by Kirill Furman <kir.furman@gmail.com>
zdohnal [Tue, 7 Jan 2025 17:41:52 +0000 (18:41 +0100)]
search.c: Fix build failure due new GCC
The warning by GCC is false positive because we don't access the freed memory in the scope, only the pointer memory which contained address of allocated memory on the heap, and used that for updating index pointer.
Using ptrdiff_t struct before realloc works the warning around.
Zdenek Dohnal [Tue, 7 Jan 2025 16:44:30 +0000 (17:44 +0100)]
search.c: Fix build failure due new GCC
The warning by GCC is false positive because we don't access the freed
memory in the scope, only the pointer memory which contained address of
allocated memory on the heap, and used that for updating index pointer.
Using ptrdiff_t struct before realloc works the warning around.
zdohnal [Tue, 7 Jan 2025 13:27:02 +0000 (14:27 +0100)]
Add `NoSystem` SSLOptions value
In case using system crypto policy breaks communication with device irreversibly (f.e. if device does not support better key exchange algorithm), the new option value gives a way how to opt-out from crypto policy if user do not want to change default system crypto policy for the whole machine.
Zdenek Dohnal [Mon, 6 Jan 2025 17:34:30 +0000 (18:34 +0100)]
Add `NoSystem` SSLOptions value
In case using system crypto policy breaks communication with device
irreversibly (f.e. if device does not support better key exchange
algorithm), the new option value gives a way how to opt-out from crypto
policy if user do not want to change default system crypto policy for
the whole machine.
Balló György [Sun, 22 Dec 2024 21:50:14 +0000 (22:50 +0100)]
desktop: Add Hungarian translation
Also add to the Settings category, which is the recommended main category for hardware management tools. Reference:
https://specifications.freedesktop.org/menu-spec/latest/additional-category-registry.html
zdohnal [Fri, 6 Dec 2024 06:51:45 +0000 (07:51 +0100)]
tls-gnutls.c: Use system crypto policy if available
Some Linux systems provide a way how to control cryptography on system or service level via cryptographic policies. OpenSSL implementation reflects system changes to some degree, however GnuTLS implementation does not take system policy into account.
GnuTLS supports fallback mechanism, so we can fallback to NORMAL if @System is not defined on the system.
Fortunately, the current GnuTLS implementation allows overrides via priority strings (so no "this cipher/hash is disabled" if we enabled them in our application by priority string), so allowing to honor system policy can save us work if someone wants to disable a specific cipher, so we don't have to implement it in libcups.
Zdenek Dohnal [Wed, 4 Dec 2024 18:20:21 +0000 (19:20 +0100)]
tls-gnutls.c: Use system crypto policy if available
Some Linux systems provide a way how to control cryptography on system
or service level via cryptographic policies. OpenSSL implementation
reflects system changes to some degree, however GnuTLS implementation
does not take system policy into account.
GnuTLS supports fallback mechanism, so we can fallback to NORMAL if
@SYSTEM is not defined on the system.
Fortunately, the current GnuTLS implementation allows overrides via
priority strings (so no "this cipher/hash is disabled" if we enabled
them in our application by priority string), so allowing to honor system
policy can save us work if someone wants to disable a specific cipher,
so we don't have to implement it in libcups.
bcvieira [Thu, 28 Nov 2024 17:31:48 +0000 (14:31 -0300)]
Update jobs.tmpl pt_BR template
Corrected from á to the correct á pt_BR translation for jobs.tmpl. To verify check printer.tmpl which is right. usuário (user) and páginas (pages).
Benjamin Gordon [Fri, 1 Nov 2024 19:51:42 +0000 (13:51 -0600)]
Support bare staple and bind finishings values
In the generated PPD, IPP finishings "bind" is supposed to map to
"StapleLocation: BindAuto". Similarly, "staple" is supposed to map to
"StapleLocation: SingleAuto". The code already handles this, except
the lookup is blocked by a check that only accepts "staple-*" and
"bind-*" prefixed versions. Fix this by adding the bare versions to the
existing checks.
Michael R Sweet [Fri, 18 Oct 2024 00:07:18 +0000 (20:07 -0400)]
Mirror X.509 updates from libcups v3:
- cupsCreateCredentialsRequest now stores the new private key separately
- cupsSaveCredentials now uses the CSR private key when saving just the new
certificate
- cupsSaveCredentials now does some sanity checks on the input values.
- cupsSaveCredentials now supports credential removal as documented.