From 6cb6c761a635cfe29545c34eae4fe3359f0416e2 Mon Sep 17 00:00:00 2001 From: Werner Koch Date: Wed, 9 Dec 2009 15:56:45 +0000 Subject: [PATCH] Remove sparc64 asm modules --- TODO | 104 ++++++++++++++++++++++++++--------------------- mpi/ChangeLog | 5 +++ mpi/config.links | 22 +++++----- 3 files changed, 72 insertions(+), 59 deletions(-) diff --git a/TODO b/TODO index a7187a1f0..30b0d4ef1 100644 --- a/TODO +++ b/TODO @@ -1,73 +1,83 @@ - * Using an expired key for signing should give an error message - "expired key" and not "unusable key'. Furthermore the error should - also be thrown when the default key has expired. Reported by - Eric.VanBuggenhaut add AdValvas.be. + -*- org -*- - * pause scrolling help in --edit-key and elsewhere. +* Using an expired key for signing should give an error message + "expired key" and not "unusable key'. Furthermore the error should + also be thrown when the default key has expired. Reported by + Eric.VanBuggenhaut add AdValvas.be. - * getkey does not return revoked/expired keys - therefore it is not - possible to override it. +* pause scrolling help in --edit-key and elsewhere. - * Selection using +wordlist does not work. - What about adding a feature -word to the +wordlist search mode. +* getkey does not return revoked/expired keys - therefore it is not + possible to override it. - * Check the changes to the gpg random gatherer on all W32 platforms. +* Selection using +wordlist does not work. + What about adding a feature -word to the +wordlist search mode. - * Show more info does not work from edit->trust. We should give more - information on the user ID under question while running - --update-trustdb. +* Check the changes to the gpg random gatherer on all W32 platforms. - * Check that no secret temporary results are stored in the result parameter - of the mpi functions. We have already done this for mpi-mul.c +* Show more info does not work from edit->trust. We should give more + information on the user ID under question while running + --update-trustdb. - * We need another special packet at the end of a clearsign message to mark - it's end and allow for multiple signature for one message. And - add a real grammar to the code in mainproc.c +* Check that no secret temporary results are stored in the result parameter + of the mpi functions. We have already done this for mpi-mul.c - * Fix the bug in the mips assembler code +* We need another special packet at the end of a clearsign message to mark + it's end and allow for multiple signature for one message. And + add a real grammar to the code in mainproc.c - * Add a way to show the fingerprint of an key signator's keys +* Fix the bug in the mips assembler code - * Concatenated encryption messages don't work corectly - only the - first one is processed. +* Add a way to show the fingerprint of an key signator's keys - * Add option to put the list of recipients (from the encryption - layer) into the signatures notation data. +* Concatenated encryption messages don't work corectly - only the + first one is processed. - * --disable-asm should still assemble _udiv_qrnnd when needed +* Add option to put the list of recipients (from the encryption + layer) into the signatures notation data. - * the pubkey encrypt functions should do some sanity checks. +* --disable-asm should still assemble _udiv_qrnnd when needed - * "gpg filename.tar.gz.asc" should work like --verify (-sab). +* the pubkey encrypt functions should do some sanity checks. - * for messages created with "-t", it might make sense to append the - verification status of the message to the output (i.e. write something to - the --output file and not only to stderr. However the problem is - that we consider the message transpatrent and don't have any - indication of the used character set. To implement this feature - we need to make sure that all output is plain 7 bit ascii but - given that we need to print a user name, this does not make sense - at all. The only way this can be implemented is by assuming that - the message is encoded in utf8 and hope tht everyone starts to use - utf8 instead of latin-1 or whatever RSN. Hmmm, I myself should - start with this. +* "gpg filename.tar.gz.asc" should work like --verify (-sab). - * keyflags don't distinguish between {certify,signature}-only. +* for messages created with "-t", it might make sense to append the + verification status of the message to the output (i.e. write something to + the --output file and not only to stderr. However the problem is + that we consider the message transpatrent and don't have any + indication of the used character set. To implement this feature + we need to make sure that all output is plain 7 bit ascii but + given that we need to print a user name, this does not make sense + at all. The only way this can be implemented is by assuming that + the message is encoded in utf8 and hope tht everyone starts to use + utf8 instead of latin-1 or whatever RSN. Hmmm, I myself should + start with this. - * cat foo | gpg --sign | gpg --list-packets - Does not list the signature packet. +* keyflags don't distinguish between {certify,signature}-only. - * When presenting the result of a verification show the user ID with - the highest trust level first instead of the primary one. +* cat foo | gpg --sign | gpg --list-packets + Does not list the signature packet. - * allow the use of option in gpg.conf. +* When presenting the result of a verification show the user ID with + the highest trust level first instead of the primary one. - * Add the NEWSIG status. +* allow the use of option in gpg.conf. - * Delete a card key as well as a wiping. +* Add the NEWSIG status. - * passphrase_to_dek does not return NULL after a cancel. There is +* Delete a card key as well as a wiping. + +* passphrase_to_dek does not return NULL after a cancel. There is no way to issue a cancel when unsing the CLI - this would however be a Good Thing when used with mixed symkey/pubkey encrypted messages. See comment in mainproc.c:proc_symkey_enc. Note, that this has been fixed in 2.0.2 - we should backport it. + +* Backport from GnuPG-2: + + 2009-09-04 Werner Koch + + * keyedit.c (menu_select_uid): Use IDX ==-1 t select all. + (menu_select_key): Ditto. + (keyedit_menu) : Allow '*' to select all. diff --git a/mpi/ChangeLog b/mpi/ChangeLog index 8c475343c..6209b1ecc 100644 --- a/mpi/ChangeLog +++ b/mpi/ChangeLog @@ -1,3 +1,8 @@ +2009-12-09 Werner Koch + + * config.links: Remove asm modules for all sparc64. This is + related to debian#560028. + 2008-03-25 Werner Koch * config.links (mpi_sflags): Powerpc64 needs to come even before diff --git a/mpi/config.links b/mpi/config.links index 741c02ee0..2c57a0c4b 100644 --- a/mpi/config.links +++ b/mpi/config.links @@ -124,26 +124,24 @@ case "${host}" in mpi_extra_modules="udiv-qrnnd" ;; sparc64-*-linux-gnu) - # An extra rule because we have an report for this one only. - # Should be compared against the next GMP version - echo '/* configured for sparc64-*-linux-gnu */' >>./mpi/asm-syntax.h - path="sparc32v8 sparc32" - mpi_extra_modules="udiv" - ;; + echo '/* No working assembler modules available */' >>./mpi/asm-syntax.h + path="" + ;; sparc64-sun-solaris2*) - # Got a report that udiv is missing, so we try this one - echo '/* configured for sparc64-sun-solaris2 */' >>./mpi/asm-syntax.h - path="sparc32v8 sparc32" - mpi_extra_modules="udiv" - ;; + echo '/* No working assembler modules available */' >>./mpi/asm-syntax.h + path="" + ;; sparc64-*-netbsd* | sparc64-*-freebsd* | sparc64-*-openbsd*) # There are no sparc64 assembler modules that work on the # *BSDs, so use the generic C functions. echo '/* No working assembler modules available */' >>./mpi/asm-syntax.h path="" ;; + sparc64*-*-*) + echo '/* No working assembler modules available */' >>./mpi/asm-syntax.h + path="" + ;; sparc9*-*-* | \ - sparc64*-*-* | \ ultrasparc*-*-* ) echo '/* configured for sparc9 or higher */' >>./mpi/asm-syntax.h path="sparc32v8 sparc32"