mirror of
git://git.gnupg.org/gnupg.git
synced 2025-07-02 22:46:30 +02:00
Replace gcry_md_start_debug by gcry_md_debug.
This is to allow building with Libgcrypt master (1.6) which has some cleanups in the API/ABI.
This commit is contained in:
parent
0dcf517700
commit
7c000f18de
10 changed files with 32 additions and 15 deletions
|
@ -1,3 +1,12 @@
|
|||
2011-09-20 Werner Koch <wk@g10code.com>
|
||||
|
||||
* sign.c (sign_file, clearsign_file, sign_symencrypt_file):
|
||||
s/gcry_md_start_debug/gcry_md_debug/ in preparation for Libgcrypt
|
||||
1.6.
|
||||
* mainproc.c (proc_plaintext, proc_tree): Ditto.
|
||||
* decrypt-data.c (decrypt_data): Ditto.
|
||||
* cipher.c (write_header): Ditto.
|
||||
|
||||
2011-08-10 Werner Koch <wk@g10code.com>
|
||||
|
||||
* export.c (transfer_format_to_openpgp): Don't parse unneeded CSUM.
|
||||
|
|
|
@ -61,7 +61,7 @@ write_header( cipher_filter_context_t *cfx, IOBUF a )
|
|||
ed.mdc_method = DIGEST_ALGO_SHA1;
|
||||
gcry_md_open (&cfx->mdc_hash, DIGEST_ALGO_SHA1, 0);
|
||||
if ( DBG_HASHING )
|
||||
gcry_md_start_debug (cfx->mdc_hash, "creatmdc");
|
||||
gcry_md_debug (cfx->mdc_hash, "creatmdc");
|
||||
}
|
||||
|
||||
{
|
||||
|
|
|
@ -121,7 +121,7 @@ decrypt_data (ctrl_t ctrl, void *procctx, PKT_encrypted *ed, DEK *dek)
|
|||
if (gcry_md_open (&dfx->mdc_hash, ed->mdc_method, 0 ))
|
||||
BUG ();
|
||||
if ( DBG_HASHING )
|
||||
gcry_md_start_debug (dfx->mdc_hash, "checkmdc");
|
||||
gcry_md_debug (dfx->mdc_hash, "checkmdc");
|
||||
}
|
||||
|
||||
rc = openpgp_cipher_open (&dfx->cipher_hd, dek->algo,
|
||||
|
|
|
@ -709,9 +709,9 @@ proc_plaintext( CTX c, PACKET *pkt )
|
|||
BUG ();
|
||||
}
|
||||
if ( DBG_HASHING ) {
|
||||
gcry_md_start_debug ( c->mfx.md, "verify" );
|
||||
gcry_md_debug ( c->mfx.md, "verify" );
|
||||
if ( c->mfx.md2 )
|
||||
gcry_md_start_debug ( c->mfx.md2, "verify2" );
|
||||
gcry_md_debug ( c->mfx.md2, "verify2" );
|
||||
}
|
||||
|
||||
rc=0;
|
||||
|
@ -2164,9 +2164,9 @@ proc_tree( CTX c, KBNODE node )
|
|||
/* c->mfx.md2? 0 :(sig->sig_class == 0x01) */
|
||||
#endif
|
||||
if ( DBG_HASHING ) {
|
||||
gcry_md_start_debug( c->mfx.md, "verify" );
|
||||
gcry_md_debug( c->mfx.md, "verify" );
|
||||
if ( c->mfx.md2 )
|
||||
gcry_md_start_debug( c->mfx.md2, "verify2" );
|
||||
gcry_md_debug( c->mfx.md2, "verify2" );
|
||||
}
|
||||
if( c->sigs_only ) {
|
||||
if (c->signed_data.used && c->signed_data.data_fd != -1)
|
||||
|
|
|
@ -877,7 +877,7 @@ sign_file (ctrl_t ctrl, strlist_t filenames, int detached, strlist_t locusr,
|
|||
if ( gcry_md_open (&mfx.md, 0, 0) )
|
||||
BUG ();
|
||||
if (DBG_HASHING)
|
||||
gcry_md_start_debug (mfx.md, "sign");
|
||||
gcry_md_debug (mfx.md, "sign");
|
||||
|
||||
/* If we're encrypting and signing, it is reasonable to pick the
|
||||
hash algorithm to use out of the recipient key prefs. This is
|
||||
|
@ -1231,7 +1231,7 @@ clearsign_file( const char *fname, strlist_t locusr, const char *outfile )
|
|||
gcry_md_enable (textmd, hash_for(sk_rover->pk));
|
||||
|
||||
if ( DBG_HASHING )
|
||||
gcry_md_start_debug ( textmd, "clearsign" );
|
||||
gcry_md_debug ( textmd, "clearsign" );
|
||||
|
||||
copy_clearsig_text( out, inp, textmd, !opt.not_dash_escaped,
|
||||
opt.escape_from, (old_style && only_md5) );
|
||||
|
@ -1356,7 +1356,7 @@ sign_symencrypt_file (const char *fname, strlist_t locusr)
|
|||
if ( gcry_md_open (&mfx.md, 0, 0) )
|
||||
BUG ();
|
||||
if ( DBG_HASHING )
|
||||
gcry_md_start_debug (mfx.md, "symc-sign");
|
||||
gcry_md_debug (mfx.md, "symc-sign");
|
||||
|
||||
for (sk_rover = sk_list; sk_rover; sk_rover = sk_rover->next)
|
||||
gcry_md_enable (mfx.md, hash_for (sk_rover->pk));
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue