mirror of
git://git.gnupg.org/gnupg.git
synced 2025-04-17 15:44:34 +02:00
Change capitalization of TOR to Tor.
--
This commit is contained in:
parent
afbe87fa2d
commit
9ffcb77e25
@ -292,8 +292,8 @@ crl_fetch (ctrl_t ctrl, const char *url, ksba_reader_t *reader)
|
|||||||
}
|
}
|
||||||
else if (opt.use_tor)
|
else if (opt.use_tor)
|
||||||
{
|
{
|
||||||
/* For now we do not support LDAP over TOR. */
|
/* For now we do not support LDAP over Tor. */
|
||||||
log_error (_("CRL access not possible due to TOR mode\n"));
|
log_error (_("CRL access not possible due to Tor mode\n"));
|
||||||
err = gpg_error (GPG_ERR_NOT_SUPPORTED);
|
err = gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
@ -318,8 +318,8 @@ crl_fetch_default (ctrl_t ctrl, const char *issuer, ksba_reader_t *reader)
|
|||||||
{
|
{
|
||||||
if (opt.use_tor)
|
if (opt.use_tor)
|
||||||
{
|
{
|
||||||
/* For now we do not support LDAP over TOR. */
|
/* For now we do not support LDAP over Tor. */
|
||||||
log_error (_("CRL access not possible due to TOR mode\n"));
|
log_error (_("CRL access not possible due to Tor mode\n"));
|
||||||
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||||||
}
|
}
|
||||||
if (opt.disable_ldap)
|
if (opt.disable_ldap)
|
||||||
@ -350,8 +350,8 @@ ca_cert_fetch (ctrl_t ctrl, cert_fetch_context_t *context, const char *dn)
|
|||||||
{
|
{
|
||||||
if (opt.use_tor)
|
if (opt.use_tor)
|
||||||
{
|
{
|
||||||
/* For now we do not support LDAP over TOR. */
|
/* For now we do not support LDAP over Tor. */
|
||||||
log_error (_("CRL access not possible due to TOR mode\n"));
|
log_error (_("CRL access not possible due to Tor mode\n"));
|
||||||
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||||||
}
|
}
|
||||||
if (opt.disable_ldap)
|
if (opt.disable_ldap)
|
||||||
@ -377,8 +377,8 @@ start_cert_fetch (ctrl_t ctrl, cert_fetch_context_t *context,
|
|||||||
{
|
{
|
||||||
if (opt.use_tor)
|
if (opt.use_tor)
|
||||||
{
|
{
|
||||||
/* For now we do not support LDAP over TOR. */
|
/* For now we do not support LDAP over Tor. */
|
||||||
log_error (_("CRL access not possible due to TOR mode\n"));
|
log_error (_("CRL access not possible due to Tor mode\n"));
|
||||||
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||||||
}
|
}
|
||||||
if (opt.disable_ldap)
|
if (opt.disable_ldap)
|
||||||
|
@ -218,7 +218,7 @@ static ARGPARSE_OPTS opts[] = {
|
|||||||
ARGPARSE_s_s (oHkpCaCert, "hkp-cacert",
|
ARGPARSE_s_s (oHkpCaCert, "hkp-cacert",
|
||||||
N_("|FILE|use the CA certificates in FILE for HKP over TLS")),
|
N_("|FILE|use the CA certificates in FILE for HKP over TLS")),
|
||||||
|
|
||||||
ARGPARSE_s_n (oUseTor, "use-tor", N_("route all network traffic via TOR")),
|
ARGPARSE_s_n (oUseTor, "use-tor", N_("route all network traffic via Tor")),
|
||||||
|
|
||||||
ARGPARSE_s_s (oSocketName, "socket-name", "@"), /* Only for debugging. */
|
ARGPARSE_s_s (oSocketName, "socket-name", "@"), /* Only for debugging. */
|
||||||
|
|
||||||
@ -474,7 +474,7 @@ set_tor_mode (void)
|
|||||||
if (assuan_sock_set_flag (ASSUAN_INVALID_FD, "tor-mode", 1))
|
if (assuan_sock_set_flag (ASSUAN_INVALID_FD, "tor-mode", 1))
|
||||||
#endif
|
#endif
|
||||||
{
|
{
|
||||||
log_error ("error enabling TOR mode: %s\n", strerror (errno));
|
log_error ("error enabling Tor mode: %s\n", strerror (errno));
|
||||||
log_info ("(is your Libassuan recent enough?)\n");
|
log_info ("(is your Libassuan recent enough?)\n");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -1001,7 +1001,7 @@ main (int argc, char **argv)
|
|||||||
if (opt.use_tor)
|
if (opt.use_tor)
|
||||||
{
|
{
|
||||||
log_info ("WARNING: ***************************************\n");
|
log_info ("WARNING: ***************************************\n");
|
||||||
log_info ("WARNING: TOR mode (--use-tor) MAY NOT FULLY WORK!\n");
|
log_info ("WARNING: Tor mode (--use-tor) MAY NOT FULLY WORK!\n");
|
||||||
log_info ("WARNING: ***************************************\n");
|
log_info ("WARNING: ***************************************\n");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -93,7 +93,7 @@ struct
|
|||||||
int system_service; /* We are running as W32 service (implies daemon). */
|
int system_service; /* We are running as W32 service (implies daemon). */
|
||||||
int system_daemon; /* We are running in system daemon mode. */
|
int system_daemon; /* We are running in system daemon mode. */
|
||||||
int running_detached; /* We are running in detached mode. */
|
int running_detached; /* We are running in detached mode. */
|
||||||
int use_tor; /* TOR mode has been enabled. */
|
int use_tor; /* Tor mode has been enabled. */
|
||||||
|
|
||||||
int force; /* Force loading outdated CRLs. */
|
int force; /* Force loading outdated CRLs. */
|
||||||
|
|
||||||
|
@ -62,7 +62,7 @@
|
|||||||
/* If set Tor mode shall be used. */
|
/* If set Tor mode shall be used. */
|
||||||
static int tor_mode;
|
static int tor_mode;
|
||||||
|
|
||||||
/* Sets the module in TOR mode. Returns 0 is this is possible or an
|
/* Sets the module in Tor mode. Returns 0 is this is possible or an
|
||||||
error code. */
|
error code. */
|
||||||
gpg_error_t
|
gpg_error_t
|
||||||
enable_dns_tormode (void)
|
enable_dns_tormode (void)
|
||||||
|
@ -757,7 +757,7 @@ http_raw_connect (http_t *r_hd, const char *server, unsigned short port,
|
|||||||
if (assuan_sock_get_flag (ASSUAN_INVALID_FD, "tor-mode", &mode) || !mode)
|
if (assuan_sock_get_flag (ASSUAN_INVALID_FD, "tor-mode", &mode) || !mode)
|
||||||
#endif
|
#endif
|
||||||
{
|
{
|
||||||
log_error ("TOR support is not available\n");
|
log_error ("Tor support is not available\n");
|
||||||
return gpg_err_make (default_errsource, GPG_ERR_NOT_IMPLEMENTED);
|
return gpg_err_make (default_errsource, GPG_ERR_NOT_IMPLEMENTED);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -1479,7 +1479,7 @@ send_request (http_t hd, const char *httphost, const char *auth,
|
|||||||
if (assuan_sock_get_flag (ASSUAN_INVALID_FD, "tor-mode", &mode) || !mode)
|
if (assuan_sock_get_flag (ASSUAN_INVALID_FD, "tor-mode", &mode) || !mode)
|
||||||
#endif
|
#endif
|
||||||
{
|
{
|
||||||
log_error ("TOR support is not available\n");
|
log_error ("Tor support is not available\n");
|
||||||
return gpg_err_make (default_errsource, GPG_ERR_NOT_IMPLEMENTED);
|
return gpg_err_make (default_errsource, GPG_ERR_NOT_IMPLEMENTED);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -838,8 +838,8 @@ ks_ldap_get (ctrl_t ctrl, parsed_uri_t uri, const char *keyspec,
|
|||||||
|
|
||||||
if (opt.use_tor)
|
if (opt.use_tor)
|
||||||
{
|
{
|
||||||
/* For now we do not support LDAP over TOR. */
|
/* For now we do not support LDAP over Tor. */
|
||||||
log_error (_("LDAP access not possible due to TOR mode\n"));
|
log_error (_("LDAP access not possible due to Tor mode\n"));
|
||||||
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1021,8 +1021,8 @@ ks_ldap_search (ctrl_t ctrl, parsed_uri_t uri, const char *pattern,
|
|||||||
|
|
||||||
if (opt.use_tor)
|
if (opt.use_tor)
|
||||||
{
|
{
|
||||||
/* For now we do not support LDAP over TOR. */
|
/* For now we do not support LDAP over Tor. */
|
||||||
log_error (_("LDAP access not possible due to TOR mode\n"));
|
log_error (_("LDAP access not possible due to Tor mode\n"));
|
||||||
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1897,8 +1897,8 @@ ks_ldap_put (ctrl_t ctrl, parsed_uri_t uri,
|
|||||||
|
|
||||||
if (opt.use_tor)
|
if (opt.use_tor)
|
||||||
{
|
{
|
||||||
/* For now we do not support LDAP over TOR. */
|
/* For now we do not support LDAP over Tor. */
|
||||||
log_error (_("LDAP access not possible due to TOR mode\n"));
|
log_error (_("LDAP access not possible due to Tor mode\n"));
|
||||||
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -134,9 +134,9 @@ do_ocsp_request (ctrl_t ctrl, ksba_ocsp_t ocsp, gcry_md_hd_t md,
|
|||||||
|
|
||||||
if (opt.use_tor)
|
if (opt.use_tor)
|
||||||
{
|
{
|
||||||
/* For now we do not allow OCSP via TOR due to possible privacy
|
/* For now we do not allow OCSP via Tor due to possible privacy
|
||||||
concerns. Needs further research. */
|
concerns. Needs further research. */
|
||||||
log_error (_("OCSP request not possible due to TOR mode\n"));
|
log_error (_("OCSP request not possible due to Tor mode\n"));
|
||||||
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -628,7 +628,7 @@ option_handler (assuan_context_t ctx, const char *key, const char *value)
|
|||||||
}
|
}
|
||||||
else if (!strcmp (key, "honor-keyserver-url-used"))
|
else if (!strcmp (key, "honor-keyserver-url-used"))
|
||||||
{
|
{
|
||||||
/* Return an error if we are running in TOR mode. */
|
/* Return an error if we are running in Tor mode. */
|
||||||
if (opt.use_tor)
|
if (opt.use_tor)
|
||||||
err = gpg_error (GPG_ERR_FORBIDDEN);
|
err = gpg_error (GPG_ERR_FORBIDDEN);
|
||||||
}
|
}
|
||||||
@ -715,7 +715,7 @@ cmd_dns_cert (assuan_context_t ctx, char *line)
|
|||||||
|
|
||||||
if (opt.use_tor && enable_dns_tormode ())
|
if (opt.use_tor && enable_dns_tormode ())
|
||||||
{
|
{
|
||||||
/* TOR mode is requested but the DNS code can't enable it. */
|
/* Tor mode is requested but the DNS code can't enable it. */
|
||||||
err = gpg_error (GPG_ERR_FORBIDDEN);
|
err = gpg_error (GPG_ERR_FORBIDDEN);
|
||||||
goto leave;
|
goto leave;
|
||||||
}
|
}
|
||||||
@ -2087,7 +2087,7 @@ static const char hlp_getinfo[] =
|
|||||||
"\n"
|
"\n"
|
||||||
"version - Return the version of the program.\n"
|
"version - Return the version of the program.\n"
|
||||||
"pid - Return the process id of the server.\n"
|
"pid - Return the process id of the server.\n"
|
||||||
"tor - Return OK if running in TOR mode\n"
|
"tor - Return OK if running in Tor mode\n"
|
||||||
"socket_name - Return the name of the socket.\n";
|
"socket_name - Return the name of the socket.\n";
|
||||||
static gpg_error_t
|
static gpg_error_t
|
||||||
cmd_getinfo (assuan_context_t ctx, char *line)
|
cmd_getinfo (assuan_context_t ctx, char *line)
|
||||||
@ -2120,7 +2120,7 @@ cmd_getinfo (assuan_context_t ctx, char *line)
|
|||||||
}
|
}
|
||||||
else if (!strcmp (line, "tor"))
|
else if (!strcmp (line, "tor"))
|
||||||
{
|
{
|
||||||
err = opt.use_tor? 0:set_error (GPG_ERR_GENERAL, "TOR mode not enabled");
|
err = opt.use_tor? 0:set_error (GPG_ERR_GENERAL, "Tor mode not enabled");
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
err = set_error (GPG_ERR_ASS_PARAMETER, "unknown value for WHAT");
|
err = set_error (GPG_ERR_ASS_PARAMETER, "unknown value for WHAT");
|
||||||
|
@ -238,8 +238,8 @@ useful for debugging.
|
|||||||
|
|
||||||
@item --use-tor
|
@item --use-tor
|
||||||
@opindex use-tor
|
@opindex use-tor
|
||||||
This option switches Dirmngr and thus GnuPG into ``TOR mode'' to route
|
This option switches Dirmngr and thus GnuPG into ``Tor mode'' to route
|
||||||
all network access via TOR (an anonymity network). WARNING: As of now
|
all network access via Tor (an anonymity network). WARNING: As of now
|
||||||
this still leaks the DNS queries; e.g. to lookup the hosts in a
|
this still leaks the DNS queries; e.g. to lookup the hosts in a
|
||||||
keyserver pool. Certain other features are disabled if this mode is
|
keyserver pool. Certain other features are disabled if this mode is
|
||||||
active.
|
active.
|
||||||
|
@ -183,13 +183,13 @@ create_context (ctrl_t ctrl, assuan_context_t *r_ctx)
|
|||||||
else if ((opt.keyserver_options.options & KEYSERVER_HONOR_KEYSERVER_URL))
|
else if ((opt.keyserver_options.options & KEYSERVER_HONOR_KEYSERVER_URL))
|
||||||
{
|
{
|
||||||
/* Tell the dirmngr that this possibly privacy invading
|
/* Tell the dirmngr that this possibly privacy invading
|
||||||
option is in use. If Dirmngr is running in TOR mode, it
|
option is in use. If Dirmngr is running in Tor mode, it
|
||||||
will return an error. */
|
will return an error. */
|
||||||
err = assuan_transact (ctx, "OPTION honor-keyserver-url-used",
|
err = assuan_transact (ctx, "OPTION honor-keyserver-url-used",
|
||||||
NULL, NULL, NULL, NULL, NULL, NULL);
|
NULL, NULL, NULL, NULL, NULL, NULL);
|
||||||
if (gpg_err_code (err) == GPG_ERR_FORBIDDEN)
|
if (gpg_err_code (err) == GPG_ERR_FORBIDDEN)
|
||||||
log_error (_("keyserver option \"honor-keyserver-url\""
|
log_error (_("keyserver option \"honor-keyserver-url\""
|
||||||
" may not be used in TOR mode\n"));
|
" may not be used in Tor mode\n"));
|
||||||
else if (gpg_err_code (err) == GPG_ERR_UNKNOWN_OPTION)
|
else if (gpg_err_code (err) == GPG_ERR_UNKNOWN_OPTION)
|
||||||
err = 0; /* Old dirmngr versions do not support this option. */
|
err = 0; /* Old dirmngr versions do not support this option. */
|
||||||
}
|
}
|
||||||
|
@ -906,9 +906,9 @@ static gc_option_t gc_options_dirmngr[] =
|
|||||||
"dirmngr", "force loading of outdated CRLs",
|
"dirmngr", "force loading of outdated CRLs",
|
||||||
GC_ARG_TYPE_NONE, GC_BACKEND_DIRMNGR },
|
GC_ARG_TYPE_NONE, GC_BACKEND_DIRMNGR },
|
||||||
|
|
||||||
{ "TOR",
|
{ "Tor",
|
||||||
GC_OPT_FLAG_GROUP, GC_LEVEL_BASIC,
|
GC_OPT_FLAG_GROUP, GC_LEVEL_BASIC,
|
||||||
"gnupg", N_("Options controlling the use of TOR") },
|
"gnupg", N_("Options controlling the use of Tor") },
|
||||||
{ "use-tor", GC_OPT_FLAG_NONE, GC_LEVEL_INVISIBLE,
|
{ "use-tor", GC_OPT_FLAG_NONE, GC_LEVEL_INVISIBLE,
|
||||||
"dirmngr", "route all network traffic via TOR",
|
"dirmngr", "route all network traffic via TOR",
|
||||||
GC_ARG_TYPE_NONE, GC_BACKEND_DIRMNGR },
|
GC_ARG_TYPE_NONE, GC_BACKEND_DIRMNGR },
|
||||||
|
Loading…
x
Reference in New Issue
Block a user