mirror of
git://git.gnupg.org/gnupg.git
synced 2025-07-03 22:56:33 +02:00
gpg: Use a more descriptive prompt for symmetric decryption.
* g10/keydb.h (GETPASSWORD_FLAG_SYMDECRYPT): New.
(passphrase_to_dek_ext): Remove this obsolete prototype.
* g10/passphrase.c (passphrase_get): Add arg flags. Use new flag
value.
(passphrase_to_dek): Add arg flags and pass it on.
* g10/mainproc.c (proc_symkey_enc): Use new flag.
* sm/decrypt.c (pwri_decrypt): Use "passphrase".
--
Signed-off-by: Werner Koch <wk@gnupg.org>
(cherry picked from commit 03f83bcda5
)
Note that we keep on using the term "passphrase" although "password"
would be better. There are however so many occurance of this and
given it is a bike shedding topic we fix that in the PO files.
Signed-off-by: Werner Koch <wk@gnupg.org>
This commit is contained in:
parent
1406f551f1
commit
6dfae2f402
8 changed files with 34 additions and 18 deletions
|
@ -171,15 +171,18 @@ read_passphrase_from_fd( int fd )
|
|||
* operation. If CACHEID is not NULL, it will be used as the cacheID
|
||||
* for the gpg-agent; if is NULL and a key fingerprint can be
|
||||
* computed, this will be used as the cacheid.
|
||||
*
|
||||
* For FLAGS see passphrase_to_dek;
|
||||
*/
|
||||
static char *
|
||||
passphrase_get (int newsymkey, int nocache, const char *cacheid, int repeat,
|
||||
const char *tryagain_text, int *canceled)
|
||||
const char *tryagain_text, unsigned int flags, int *canceled)
|
||||
{
|
||||
int rc;
|
||||
char *pw = NULL;
|
||||
char *orig_codeset;
|
||||
const char *my_cacheid;
|
||||
const char *desc;
|
||||
|
||||
if (canceled)
|
||||
*canceled = 0;
|
||||
|
@ -194,6 +197,11 @@ passphrase_get (int newsymkey, int nocache, const char *cacheid, int repeat,
|
|||
if (tryagain_text)
|
||||
tryagain_text = _(tryagain_text);
|
||||
|
||||
if ((flags & GETPASSWORD_FLAG_SYMDECRYPT))
|
||||
desc = _("Please enter the passphrase for decryption.");
|
||||
else
|
||||
desc = _("Enter passphrase\n");
|
||||
|
||||
/* Here we have:
|
||||
* REPEAT is set in create mode and if opt.passphrase_repeat is set.
|
||||
* (Thus it is not a clean indication that we want a new passphrase).
|
||||
|
@ -205,7 +213,7 @@ passphrase_get (int newsymkey, int nocache, const char *cacheid, int repeat,
|
|||
* for a full state analysis and thus this new parameter.
|
||||
*/
|
||||
rc = agent_get_passphrase (my_cacheid, tryagain_text, NULL,
|
||||
_("Enter passphrase\n"),
|
||||
desc,
|
||||
newsymkey, repeat, nocache, &pw);
|
||||
|
||||
i18n_switchback (orig_codeset);
|
||||
|
@ -264,11 +272,15 @@ passphrase_clear_cache (const char *cacheid)
|
|||
* CANCELED is not NULL, sets it to true.
|
||||
*
|
||||
* If CREATE is true a new passphrase will be created. If NOCACHE is
|
||||
* true the symmetric key caching will not be used. */
|
||||
* true the symmetric key caching will not be used.
|
||||
* FLAG bits are:
|
||||
* GETPASSWORD_FLAG_SYMDECRYPT := for symmetric decryption
|
||||
*/
|
||||
DEK *
|
||||
passphrase_to_dek (int cipher_algo, STRING2KEY *s2k,
|
||||
int create, int nocache,
|
||||
const char *tryagain_text, int *canceled)
|
||||
const char *tryagain_text, unsigned int flags,
|
||||
int *canceled)
|
||||
{
|
||||
char *pw = NULL;
|
||||
DEK *dek;
|
||||
|
@ -355,7 +367,7 @@ passphrase_to_dek (int cipher_algo, STRING2KEY *s2k,
|
|||
/* Divert to the gpg-agent. */
|
||||
pw = passphrase_get (create, create && nocache, s2k_cacheid,
|
||||
create? opt.passphrase_repeat : 0,
|
||||
tryagain_text, canceled);
|
||||
tryagain_text, flags, canceled);
|
||||
if (*canceled)
|
||||
{
|
||||
xfree (pw);
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue