GnuPG Made Easy. NOTE: Maintainers are not tracking this mirror. Do not make pull requests here, nor comment any commits, submit them usual way to bug tracker (https://www.gnupg.org/documentation/bts.html) or to the mailing list (https://www.gnupg.org/documentation/mailing-lists.html).
03bcb7f4c1
2003-05-27 Marcus Brinkmann <marcus@g10code.de> * gpgme.texi (Passphrase Callback): Document new prototype. gpgme/ 2003-05-26 Marcus Brinkmann <marcus@g10code.de> * engine.h (EngineCommandHandler): Change last argument to int fd. * gpgme.h (gpgme_passphrase_cb_t): Rewritten to take parts of the description and fd. (gpgme_edit_cb_t): Change last argument to int fd. * ops.h (_gpgme_passphrase_command_handler_internal): New prototype. * passphrase.c: Include <assert.h>. (op_data_t): Rename userid_hint to uid_hint, remove last_pw_handle. (release_op_data): Check values before calling free. (_gpgme_passphrase_status_handler): Likewise. (_gpgme_passphrase_command_handler_internal): New function. (_gpgme_passphrase_command_handler): Rewritten. * edit.c (edit_status_handler): Pass -1 as fd argument. (command_handler): Update prototype. New variable processed. Use it to store return value of _gpgme_passphrase_command_handler_internal which is now used instead _gpgme_passphrase_command_handler. Use it also to check if we should call the user's edit function. Pass fd to user's edit function. * rungpg.c (struct gpg_object_s): Change type of cmd.cb_data to void *. (gpg_release): Check value before calling free. Do not release cmd.cb_data. (command_cb): Function removed. (command_handler): New function. Thus we don't use a data object for command handler stuff anymore, but handle it directly. This allows proper error reporting (cancel of passphrase requests, for example). Also all callbacks work via direct writes to the file descriptor (so that passphrases are not kept in insecure memory). (gpg_set_command_handler): Rewritten to use even more ugly hacks. (read_status): Check cmd.keyword before calling free. Install command_handler as the I/O callback handler with GPG as private data. tests/ 2003-05-27 Marcus Brinkmann <marcus@g10code.de> * (t-decrypt-verify.c, t-decrypt.c, t-edit.c, t-encrypt-sign.c, t-encrypt-sym.c, t-sign.c, t-signers.c): Include <unistd.h>. (passphrase_cb): Rewritten. * t-edit.c (edit_fnc): Rewritten. |
||
---|---|---|
assuan | ||
complus | ||
doc | ||
gpgme | ||
tests | ||
acinclude.m4 | ||
AUTHORS | ||
autogen.sh | ||
ChangeLog | ||
configure.ac | ||
gpgme.spec.in | ||
gpgme.txt | ||
INSTALL | ||
Makefile.am | ||
NEWS | ||
README | ||
README-alpha | ||
THANKS | ||
TODO |
GPGME - GnuPG Made Easy --------------------------- !!!! THIS IS WORK IN PROGRESS !!! If you want to hack on it, start with one of the `tests/gpg/t-foo' programs. For support of the OpenPGP protocol (default), you need the latest CVS version of GnuPG 1.2, see `http://www.gnupg.org/cvs-access.html'. You need at least GnuPG 1.2.2. If configure can't find the `gpg' binary in your path, you can specify the location with the --with-gpg=/path/to/gpg argument to configure. For support of the CMS (Cryptographic Message Syntax) protocol, you need the latest CVS version of GpgSM, module name `newpg', at `:pserver:anoncvs@cvs.gnupg.org:/cvs/aegypten'. You need at least GpgSM 0.9.0. If configure can't find the `gpgsm' binary in your path, you can specify the location with the --with-gpgsm=/path/to/gpgsm argument to configure. Before building the CVS version following the generic install instructions in `INSTALL', you need to set up the build scripts with `./autogen.sh'. To build the W32 version, use `./autogen.sh --build-w32'. You also need to enable maintainer mode at configure time with `--enable-maintainer-mode', or the documentation will not built (because the version.texi won't be generated unless maintainer mode is enabled). Please subscribe to the gnupg-devel@gnupg.org mailing list if you want to do serious work.