diff options
author | David Shaw <[email protected]> | 2004-12-01 04:01:16 +0000 |
---|---|---|
committer | David Shaw <[email protected]> | 2004-12-01 04:01:16 +0000 |
commit | 93ec34cc7aea5002f469fcf960b82bb1a5ab0b2e (patch) | |
tree | 2e72833d98bc53758de735bd8293429faf1387d1 /cipher/md.c | |
parent | * getkey.c (parse_key_usage): New function to parse out key usage flags. (diff) | |
download | gnupg-93ec34cc7aea5002f469fcf960b82bb1a5ab0b2e.tar.gz gnupg-93ec34cc7aea5002f469fcf960b82bb1a5ab0b2e.zip |
* md.c (string_to_digest_algo): Allow read/write SHA384 and SHA512.
Diffstat (limited to '')
-rw-r--r-- | cipher/md.c | 15 |
1 files changed, 0 insertions, 15 deletions
diff --git a/cipher/md.c b/cipher/md.c index c18a36092..1821882e9 100644 --- a/cipher/md.c +++ b/cipher/md.c @@ -124,21 +124,6 @@ string_to_digest_algo( const char *string ) { struct md_digest_list_s *r; - /* Hi there. I see you changing that code so you can use the new - SHA hashes. Before you do it, please think about it. There - are no official releases of any OpenPGP programs that generate - these hashes, and we're trying to get a code base that can - understand the hashes before we release one that generates - them. - dshaw */ - - if(!ascii_strcasecmp("sha384",string) - || !ascii_strcasecmp("sha512",string)) - { - log_info(_("digest algorithm `%s' is read-only in this release\n"), - string); - return 0; - } - do { for(r = digest_list; r; r = r->next ) if( !ascii_strcasecmp( r->name, string ) ) |