aboutsummaryrefslogtreecommitdiffstats
path: root/g10/seckey-cert.c
diff options
context:
space:
mode:
authorDavid Shaw <[email protected]>2004-07-15 21:16:54 +0000
committerDavid Shaw <[email protected]>2004-07-15 21:16:54 +0000
commit673894ef48b74ad654e03f55804ac61e6bdce6da (patch)
tree5e1873d94d397f44007595da106c1e51f567f2a6 /g10/seckey-cert.c
parent* g10.c (main): Alias --charset as --display-charset to help avoid the (diff)
downloadgnupg-673894ef48b74ad654e03f55804ac61e6bdce6da.tar.gz
gnupg-673894ef48b74ad654e03f55804ac61e6bdce6da.zip
* keyedit.c (sign_uids): Properly handle remaking a self-sig on revoked or
expired user IDs. Also, once we've established that a given uid cannot or will not be signed, don't continue to ask about each sig. * mainproc.c (proc_symkey_enc), seckey-cert.c (do_check): Check the S2K hash algorithm before we try to generate a passphrase using it. This prevents hitting BUG() when generating a passphrase using a hash that we don't have. * sign.c (sign_symencrypt_file): Allow using --force-mdc in --sign --symmetric messages.
Diffstat (limited to '')
-rw-r--r--g10/seckey-cert.c6
1 files changed, 6 insertions, 0 deletions
diff --git a/g10/seckey-cert.c b/g10/seckey-cert.c
index d0b57f14b..84533bd3e 100644
--- a/g10/seckey-cert.c
+++ b/g10/seckey-cert.c
@@ -66,6 +66,12 @@ do_check( PKT_secret_key *sk, const char *tryagain_text, int mode,
}
return G10ERR_CIPHER_ALGO;
}
+ if(check_digest_algo(sk->protect.s2k.hash_algo))
+ {
+ log_info(_("protection digest %d is not supported\n"),
+ sk->protect.s2k.hash_algo);
+ return G10ERR_DIGEST_ALGO;
+ }
keyid_from_sk( sk, keyid );
keyid[2] = keyid[3] = 0;
if( !sk->is_primary ) {