summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorWerner Koch <wk@gnupg.org>1998-04-09 11:19:08 +0000
committerWerner Koch <wk@gnupg.org>1998-04-09 11:19:08 +0000
commit9a8d62b20eba18310d87eedb68828fa86326e1a2 (patch)
treea03ab70ae39f635dbc71bad27cef07ae504c874f
parentc0caba66976f733524bbb01b76cdf42dd6560447 (diff)
downloadlibgcrypt-9a8d62b20eba18310d87eedb68828fa86326e1a2.tar.gz
new release
-rw-r--r--INSTALL7
-rw-r--r--README9
-rw-r--r--mpi/ChangeLog4
-rw-r--r--mpi/mpicoder.c20
4 files changed, 30 insertions, 10 deletions
diff --git a/INSTALL b/INSTALL
index 35203560..374e3be0 100644
--- a/INSTALL
+++ b/INSTALL
@@ -7,6 +7,9 @@ Configure options for GNUPG
--with-included-zlib Forces usage of the local zlib sources. Default is
to use the (shared) library of the system.
+--with-included-gettext Forces usage of the local gettext sources instead of.
+ the one provided by your system.
+
--disable-nls Disable NLS support (See ABOUT-NLS)
--enable-m-debug Compile with the integrated malloc debugging stuff.
@@ -26,8 +29,8 @@ Configure options for GNUPG
Problems
========
-If you have compile problems, use the configure options "--with-zlib" and
-"--disable-nls" (See ABOUT-NLS).
+If you have compile problems, try the configure options "--with-included-zlib"
+or "--disable-nls" (See ABOUT-NLS).
I cant check all assembler files; so if you have problems assembling them
(or the program crashes), simply delete the files in the mpi/<cpu> directory.
diff --git a/README b/README
index 664c8a32..e1bc05f6 100644
--- a/README
+++ b/README
@@ -2,7 +2,7 @@
GNUPG - The GNU Privacy Guard
-------------------------------
- THIS IS ALPHA SOFTWARE, EXPECT BUGS AND UNIMPLEMENTED STUFF.
+ THIS IS ALPHA SOFTWARE, YOU MAY ENCOUNTER SOOME BUGS.
On a Linux box (version 2.x.x, alpha or x86 CPU) it should
work reliable. You may create your key on such a machine and
@@ -19,7 +19,6 @@
verify new releases. Because you verified the tar file containing
this file here, you can be sure that the above fingerprint is correct.
-
Please subscribe to g10@net.lut.ac.uk by sending a mail with
the word "subscribe" in the body to "g10-request@net.lut.ac.uk".
@@ -31,7 +30,6 @@
the United States until Sep 20, 2000). I'm sorry about this, but
this is the world we have created (e.g. by using proprietary software).
-
Because the OpenPGP standard is still a draft, GNUPG is not yet
compatible to it (or PGP 5) - but it will. The data structures
used are compatible with PGP 2.x, so it can parse an list such files
@@ -215,7 +213,7 @@
"01AB3FED1347A5612"
"0x234AABBCC34567C4"
- * By a fingerprint (not yet implemented):
+ * By a fingerprint:
"1234343434343434C434343434343434"
"123434343434343C3434343434343734349A3434"
@@ -268,7 +266,8 @@
-----------
GNUPG returns with an exit status of 1 if in batch mode and a bad signature
has been detected or 2 or higher for all other errors. You should parse
- stderr to get detailed informations about the errors.
+ stderr or the output of the fd specified with --status-fd to get detailed
+ informations about the errors.
Esoteric commands
diff --git a/mpi/ChangeLog b/mpi/ChangeLog
index 0a967df4..a39884d8 100644
--- a/mpi/ChangeLog
+++ b/mpi/ChangeLog
@@ -1,3 +1,7 @@
+Thu Apr 9 11:31:36 1998 Werner Koch (wk@isil.d.shuttle.de)
+
+ * mpicoder.c (mpi_get_secure_buffer): New.
+
Wed Apr 8 09:44:33 1998 Werner Koch (wk@isil.d.shuttle.de)
* config.links: Applied small fix from Ulf Möller.
diff --git a/mpi/mpicoder.c b/mpi/mpicoder.c
index 9362aff6..a4b1c209 100644
--- a/mpi/mpicoder.c
+++ b/mpi/mpicoder.c
@@ -268,8 +268,8 @@ mpi_get_keyid( MPI a, u32 *keyid )
* set to zero if the value of A is zero. If sign is not NULL, it will
* be set to the sign of the A.
*/
-byte *
-mpi_get_buffer( MPI a, unsigned *nbytes, int *sign )
+static byte *
+do_get_buffer( MPI a, unsigned *nbytes, int *sign, int force_secure )
{
byte *p, *buffer;
mpi_limb_t alimb;
@@ -278,7 +278,8 @@ mpi_get_buffer( MPI a, unsigned *nbytes, int *sign )
if( sign )
*sign = a->sign;
*nbytes = a->nlimbs * BYTES_PER_MPI_LIMB;
- p = buffer = a->secure ? m_alloc_secure( *nbytes) : m_alloc( *nbytes );
+ p = buffer = force_secure || a->secure ? m_alloc_secure( *nbytes)
+ : m_alloc( *nbytes );
for(i=a->nlimbs-1; i >= 0; i-- ) {
alimb = a->d[i];
@@ -310,6 +311,19 @@ mpi_get_buffer( MPI a, unsigned *nbytes, int *sign )
return buffer;
}
+
+byte *
+mpi_get_buffer( MPI a, unsigned *nbytes, int *sign )
+{
+ return do_get_buffer( a, nbytes, sign, 0 );
+}
+
+byte *
+mpi_get_secure_buffer( MPI a, unsigned *nbytes, int *sign )
+{
+ return do_get_buffer( a, nbytes, sign, 1 );
+}
+
/****************
* Use BUFFER to update MPI.
*/