aboutsummaryrefslogtreecommitdiffstats
path: root/util/miscutil.c
diff options
context:
space:
mode:
authorDavid Shaw <[email protected]>2003-10-26 03:26:14 +0000
committerDavid Shaw <[email protected]>2003-10-26 03:26:14 +0000
commitbb7986e9a6a43a8732797ecf72f6759b1c4feaa4 (patch)
treecc638268722b231d80fa97b9d22e87778b01e5dd /util/miscutil.c
parentUpdated to 0.12.1 (diff)
downloadgnupg-bb7986e9a6a43a8732797ecf72f6759b1c4feaa4.tar.gz
gnupg-bb7986e9a6a43a8732797ecf72f6759b1c4feaa4.zip
* g10.c (main): Add --symmetric --encrypt command. This generates a
message that can be decrypted via a passphrase or public key system. * main.h, encode.c (encode_seskey): Allow passing in an already-created session key dek. (encode_simple): Use the actual symmetric cipher when encrypting a session key for a symmetric message. (encode_crypt): Add a flag to trigger a hybrid mode that can be decrypted via a passphrase or a pk. Change all callers. * mainproc.c (symkey_decrypt_sesskey): There is no way to tell the difference here between a bad passphrase and a cipher algorithm that we don't have, so use a error message that makes that clear. Use the actual list of ciphers when checking whether a cipher is invalid. Return error if the decrypted cipher algorithm is invalid. (proc_symkey_enc): In a mixed passphrase/pk message, if a valid dek already exists from decrypting via pk, do not try to process the passphrase. (proc_symkey_enc): Indicate when we're decrypting a session key as opposed to decrypting data. If a passphrase is invalid, discard the dek so we'll keep trying.
Diffstat (limited to 'util/miscutil.c')
0 files changed, 0 insertions, 0 deletions