diff options
author | David Shaw <[email protected]> | 2003-05-26 13:21:12 +0000 |
---|---|---|
committer | David Shaw <[email protected]> | 2003-05-26 13:21:12 +0000 |
commit | ad9f6ae4b5e5a78d21d129fd249808842f49a226 (patch) | |
tree | 43654c3c724c6f686cf622bd31a24ac49db1d0a3 /g10/seckey-cert.c | |
parent | * Makefile.am: Make use of AM_CFLAGS. (From wk on stable branch) (diff) | |
download | gnupg-ad9f6ae4b5e5a78d21d129fd249808842f49a226.tar.gz gnupg-ad9f6ae4b5e5a78d21d129fd249808842f49a226.zip |
* getkey.c (premerge_public_with_secret): Made "no secret subkey for"
warning a verbose item and translatable. (From wk on stable branch)
* sig-check.c (check_key_signature2): Made "no subkey for subkey binding
packet" a verbose item instead of a !quiet one. There are too many
garbled keys out in the wild. (From wk on stable branch)
* filter.h: Remove const from WHAT. (From wk on stable branch)
* progress.c (handle_progress): Store a copy of NAME. (progress_filter):
Release WHAT, make sure not to print a NULL WHAT. (From wk on stable
branch)
* openfile.c (open_sigfile): Adjust free for new progress semantics. (From
wk on stable branch)
* plaintext.c (ask_for_detached_datafile): Don't dealloc pfx->WHAT. (From
wk on stable branch)
* seckey-cert.c (do_check): Issue the RSA_OR_IDEA status when the cipher
algo is IDEA to make it easier to track down the problem. (From twoaday on
stable branch)
Diffstat (limited to '')
-rw-r--r-- | g10/seckey-cert.c | 7 |
1 files changed, 5 insertions, 2 deletions
diff --git a/g10/seckey-cert.c b/g10/seckey-cert.c index 32c54498d..76f0ee28d 100644 --- a/g10/seckey-cert.c +++ b/g10/seckey-cert.c @@ -59,8 +59,11 @@ do_check( PKT_secret_key *sk, const char *tryagain_text, int mode, if( check_cipher_algo( sk->protect.algo ) ) { log_info(_("protection algorithm %d%s is not supported\n"), sk->protect.algo,sk->protect.algo==1?" (IDEA)":"" ); - if(sk->protect.algo==CIPHER_ALGO_IDEA) - idea_cipher_warn(0); + if (sk->protect.algo==CIPHER_ALGO_IDEA) + { + write_status (STATUS_RSA_OR_IDEA); + idea_cipher_warn (0); + } return G10ERR_CIPHER_ALGO; } keyid_from_sk( sk, keyid ); |