aboutsummaryrefslogtreecommitdiffstats
path: root/g10/sign.c
diff options
context:
space:
mode:
authorWerner Koch <[email protected]>1998-04-02 10:30:03 +0000
committerWerner Koch <[email protected]>1998-04-02 10:30:03 +0000
commit303b1084d51dd1f9d3e614497f180a66744f5185 (patch)
tree3e482ba03967ff3f324184e19ecc91016ce4b939 /g10/sign.c
parentsome cleanups (diff)
downloadgnupg-303b1084d51dd1f9d3e614497f180a66744f5185.tar.gz
gnupg-303b1084d51dd1f9d3e614497f180a66744f5185.zip
release 0.2.14
Diffstat (limited to '')
-rw-r--r--g10/sign.c14
1 files changed, 7 insertions, 7 deletions
diff --git a/g10/sign.c b/g10/sign.c
index fffee0870..9f06680db 100644
--- a/g10/sign.c
+++ b/g10/sign.c
@@ -57,7 +57,8 @@ complete_sig( PKT_signature *sig, PKT_secret_cert *skc, MD_HANDLE md )
else
BUG();
- /* fixme: should we check wether the signature is okay? */
+ /* fixme: should we check wether the signature is okay?
+ * maybe by using an option */
return rc;
}
@@ -1072,12 +1073,11 @@ change_passphrase( const char *username )
break;
}
else { /* okay */
- /* FIXME: what about dsa */
- skc->d.elg.protect.algo = CIPHER_ALGO_BLOWFISH;
- skc->d.elg.protect.s2k = 1;
- skc->d.elg.protect.hash = DIGEST_ALGO_RMD160;
- memcpy(skc->d.elg.protect.salt, salt, 8);
- randomize_buffer(skc->d.elg.protect.iv, 8, 1);
+ skc->protect.algo = CIPHER_ALGO_BLOWFISH;
+ skc->protect.s2k = 1;
+ skc->protect.hash = DIGEST_ALGO_RMD160;
+ memcpy(skc->protect.salt, salt, 8);
+ randomize_buffer(skc->protect.iv, 8, 1);
rc = protect_secret_key( skc, dek );
if( rc )
log_error("protect_secret_key failed: %s\n", g10_errstr(rc) );