mirror of
git://git.gnupg.org/gnupg.git
synced 2024-12-22 10:19:57 +01:00
* md.c (string_to_digest_algo): Allow read/write SHA384 and SHA512.
This commit is contained in:
parent
5dcc3dc353
commit
93ec34cc7a
@ -1,3 +1,8 @@
|
||||
2004-11-30 David Shaw <dshaw@jabberwocky.com>
|
||||
|
||||
* md.c (string_to_digest_algo): Allow read/write SHA384 and
|
||||
SHA512.
|
||||
|
||||
2004-11-03 Timo Schulz <twoaday@g10code.com>
|
||||
|
||||
* idea-stub.c (dlopen, dlsym): Use w32_strerror instead of
|
||||
|
15
cipher/md.c
15
cipher/md.c
@ -124,21 +124,6 @@ string_to_digest_algo( const char *string )
|
||||
{
|
||||
struct md_digest_list_s *r;
|
||||
|
||||
/* Hi there. I see you changing that code so you can use the new
|
||||
SHA hashes. Before you do it, please think about it. There
|
||||
are no official releases of any OpenPGP programs that generate
|
||||
these hashes, and we're trying to get a code base that can
|
||||
understand the hashes before we release one that generates
|
||||
them. - dshaw */
|
||||
|
||||
if(!ascii_strcasecmp("sha384",string)
|
||||
|| !ascii_strcasecmp("sha512",string))
|
||||
{
|
||||
log_info(_("digest algorithm `%s' is read-only in this release\n"),
|
||||
string);
|
||||
return 0;
|
||||
}
|
||||
|
||||
do {
|
||||
for(r = digest_list; r; r = r->next )
|
||||
if( !ascii_strcasecmp( r->name, string ) )
|
||||
|
Loading…
x
Reference in New Issue
Block a user