diff options
author | David Shaw <[email protected]> | 2004-07-15 21:16:54 +0000 |
---|---|---|
committer | David Shaw <[email protected]> | 2004-07-15 21:16:54 +0000 |
commit | 673894ef48b74ad654e03f55804ac61e6bdce6da (patch) | |
tree | 5e1873d94d397f44007595da106c1e51f567f2a6 /g10/seckey-cert.c | |
parent | * g10.c (main): Alias --charset as --display-charset to help avoid the (diff) | |
download | gnupg-673894ef48b74ad654e03f55804ac61e6bdce6da.tar.gz gnupg-673894ef48b74ad654e03f55804ac61e6bdce6da.zip |
* keyedit.c (sign_uids): Properly handle remaking a self-sig on revoked or
expired user IDs. Also, once we've established that a given uid cannot or
will not be signed, don't continue to ask about each sig.
* mainproc.c (proc_symkey_enc), seckey-cert.c (do_check): Check the S2K
hash algorithm before we try to generate a passphrase using it. This
prevents hitting BUG() when generating a passphrase using a hash that we
don't have.
* sign.c (sign_symencrypt_file): Allow using --force-mdc in --sign
--symmetric messages.
Diffstat (limited to '')
-rw-r--r-- | g10/seckey-cert.c | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/g10/seckey-cert.c b/g10/seckey-cert.c index d0b57f14b..84533bd3e 100644 --- a/g10/seckey-cert.c +++ b/g10/seckey-cert.c @@ -66,6 +66,12 @@ do_check( PKT_secret_key *sk, const char *tryagain_text, int mode, } return G10ERR_CIPHER_ALGO; } + if(check_digest_algo(sk->protect.s2k.hash_algo)) + { + log_info(_("protection digest %d is not supported\n"), + sk->protect.s2k.hash_algo); + return G10ERR_DIGEST_ALGO; + } keyid_from_sk( sk, keyid ); keyid[2] = keyid[3] = 0; if( !sk->is_primary ) { |