mirror of
git://git.gnupg.org/gnupg.git
synced 2025-01-03 12:11:33 +01:00
Change capitalization of TOR to Tor.
--
This commit is contained in:
parent
afbe87fa2d
commit
9ffcb77e25
@ -292,8 +292,8 @@ crl_fetch (ctrl_t ctrl, const char *url, ksba_reader_t *reader)
|
||||
}
|
||||
else if (opt.use_tor)
|
||||
{
|
||||
/* For now we do not support LDAP over TOR. */
|
||||
log_error (_("CRL access not possible due to TOR mode\n"));
|
||||
/* For now we do not support LDAP over Tor. */
|
||||
log_error (_("CRL access not possible due to Tor mode\n"));
|
||||
err = gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||||
}
|
||||
else
|
||||
@ -318,8 +318,8 @@ crl_fetch_default (ctrl_t ctrl, const char *issuer, ksba_reader_t *reader)
|
||||
{
|
||||
if (opt.use_tor)
|
||||
{
|
||||
/* For now we do not support LDAP over TOR. */
|
||||
log_error (_("CRL access not possible due to TOR mode\n"));
|
||||
/* For now we do not support LDAP over Tor. */
|
||||
log_error (_("CRL access not possible due to Tor mode\n"));
|
||||
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||||
}
|
||||
if (opt.disable_ldap)
|
||||
@ -350,8 +350,8 @@ ca_cert_fetch (ctrl_t ctrl, cert_fetch_context_t *context, const char *dn)
|
||||
{
|
||||
if (opt.use_tor)
|
||||
{
|
||||
/* For now we do not support LDAP over TOR. */
|
||||
log_error (_("CRL access not possible due to TOR mode\n"));
|
||||
/* For now we do not support LDAP over Tor. */
|
||||
log_error (_("CRL access not possible due to Tor mode\n"));
|
||||
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||||
}
|
||||
if (opt.disable_ldap)
|
||||
@ -377,8 +377,8 @@ start_cert_fetch (ctrl_t ctrl, cert_fetch_context_t *context,
|
||||
{
|
||||
if (opt.use_tor)
|
||||
{
|
||||
/* For now we do not support LDAP over TOR. */
|
||||
log_error (_("CRL access not possible due to TOR mode\n"));
|
||||
/* For now we do not support LDAP over Tor. */
|
||||
log_error (_("CRL access not possible due to Tor mode\n"));
|
||||
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||||
}
|
||||
if (opt.disable_ldap)
|
||||
|
@ -218,7 +218,7 @@ static ARGPARSE_OPTS opts[] = {
|
||||
ARGPARSE_s_s (oHkpCaCert, "hkp-cacert",
|
||||
N_("|FILE|use the CA certificates in FILE for HKP over TLS")),
|
||||
|
||||
ARGPARSE_s_n (oUseTor, "use-tor", N_("route all network traffic via TOR")),
|
||||
ARGPARSE_s_n (oUseTor, "use-tor", N_("route all network traffic via Tor")),
|
||||
|
||||
ARGPARSE_s_s (oSocketName, "socket-name", "@"), /* Only for debugging. */
|
||||
|
||||
@ -474,7 +474,7 @@ set_tor_mode (void)
|
||||
if (assuan_sock_set_flag (ASSUAN_INVALID_FD, "tor-mode", 1))
|
||||
#endif
|
||||
{
|
||||
log_error ("error enabling TOR mode: %s\n", strerror (errno));
|
||||
log_error ("error enabling Tor mode: %s\n", strerror (errno));
|
||||
log_info ("(is your Libassuan recent enough?)\n");
|
||||
}
|
||||
}
|
||||
@ -1001,7 +1001,7 @@ main (int argc, char **argv)
|
||||
if (opt.use_tor)
|
||||
{
|
||||
log_info ("WARNING: ***************************************\n");
|
||||
log_info ("WARNING: TOR mode (--use-tor) MAY NOT FULLY WORK!\n");
|
||||
log_info ("WARNING: Tor mode (--use-tor) MAY NOT FULLY WORK!\n");
|
||||
log_info ("WARNING: ***************************************\n");
|
||||
}
|
||||
|
||||
|
@ -93,7 +93,7 @@ struct
|
||||
int system_service; /* We are running as W32 service (implies daemon). */
|
||||
int system_daemon; /* We are running in system daemon mode. */
|
||||
int running_detached; /* We are running in detached mode. */
|
||||
int use_tor; /* TOR mode has been enabled. */
|
||||
int use_tor; /* Tor mode has been enabled. */
|
||||
|
||||
int force; /* Force loading outdated CRLs. */
|
||||
|
||||
|
@ -62,7 +62,7 @@
|
||||
/* If set Tor mode shall be used. */
|
||||
static int tor_mode;
|
||||
|
||||
/* Sets the module in TOR mode. Returns 0 is this is possible or an
|
||||
/* Sets the module in Tor mode. Returns 0 is this is possible or an
|
||||
error code. */
|
||||
gpg_error_t
|
||||
enable_dns_tormode (void)
|
||||
|
@ -757,7 +757,7 @@ http_raw_connect (http_t *r_hd, const char *server, unsigned short port,
|
||||
if (assuan_sock_get_flag (ASSUAN_INVALID_FD, "tor-mode", &mode) || !mode)
|
||||
#endif
|
||||
{
|
||||
log_error ("TOR support is not available\n");
|
||||
log_error ("Tor support is not available\n");
|
||||
return gpg_err_make (default_errsource, GPG_ERR_NOT_IMPLEMENTED);
|
||||
}
|
||||
}
|
||||
@ -1479,7 +1479,7 @@ send_request (http_t hd, const char *httphost, const char *auth,
|
||||
if (assuan_sock_get_flag (ASSUAN_INVALID_FD, "tor-mode", &mode) || !mode)
|
||||
#endif
|
||||
{
|
||||
log_error ("TOR support is not available\n");
|
||||
log_error ("Tor support is not available\n");
|
||||
return gpg_err_make (default_errsource, GPG_ERR_NOT_IMPLEMENTED);
|
||||
}
|
||||
}
|
||||
|
@ -838,8 +838,8 @@ ks_ldap_get (ctrl_t ctrl, parsed_uri_t uri, const char *keyspec,
|
||||
|
||||
if (opt.use_tor)
|
||||
{
|
||||
/* For now we do not support LDAP over TOR. */
|
||||
log_error (_("LDAP access not possible due to TOR mode\n"));
|
||||
/* For now we do not support LDAP over Tor. */
|
||||
log_error (_("LDAP access not possible due to Tor mode\n"));
|
||||
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||||
}
|
||||
|
||||
@ -1021,8 +1021,8 @@ ks_ldap_search (ctrl_t ctrl, parsed_uri_t uri, const char *pattern,
|
||||
|
||||
if (opt.use_tor)
|
||||
{
|
||||
/* For now we do not support LDAP over TOR. */
|
||||
log_error (_("LDAP access not possible due to TOR mode\n"));
|
||||
/* For now we do not support LDAP over Tor. */
|
||||
log_error (_("LDAP access not possible due to Tor mode\n"));
|
||||
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||||
}
|
||||
|
||||
@ -1897,8 +1897,8 @@ ks_ldap_put (ctrl_t ctrl, parsed_uri_t uri,
|
||||
|
||||
if (opt.use_tor)
|
||||
{
|
||||
/* For now we do not support LDAP over TOR. */
|
||||
log_error (_("LDAP access not possible due to TOR mode\n"));
|
||||
/* For now we do not support LDAP over Tor. */
|
||||
log_error (_("LDAP access not possible due to Tor mode\n"));
|
||||
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||||
}
|
||||
|
||||
|
@ -134,9 +134,9 @@ do_ocsp_request (ctrl_t ctrl, ksba_ocsp_t ocsp, gcry_md_hd_t md,
|
||||
|
||||
if (opt.use_tor)
|
||||
{
|
||||
/* For now we do not allow OCSP via TOR due to possible privacy
|
||||
/* For now we do not allow OCSP via Tor due to possible privacy
|
||||
concerns. Needs further research. */
|
||||
log_error (_("OCSP request not possible due to TOR mode\n"));
|
||||
log_error (_("OCSP request not possible due to Tor mode\n"));
|
||||
return gpg_error (GPG_ERR_NOT_SUPPORTED);
|
||||
}
|
||||
|
||||
|
@ -628,7 +628,7 @@ option_handler (assuan_context_t ctx, const char *key, const char *value)
|
||||
}
|
||||
else if (!strcmp (key, "honor-keyserver-url-used"))
|
||||
{
|
||||
/* Return an error if we are running in TOR mode. */
|
||||
/* Return an error if we are running in Tor mode. */
|
||||
if (opt.use_tor)
|
||||
err = gpg_error (GPG_ERR_FORBIDDEN);
|
||||
}
|
||||
@ -715,7 +715,7 @@ cmd_dns_cert (assuan_context_t ctx, char *line)
|
||||
|
||||
if (opt.use_tor && enable_dns_tormode ())
|
||||
{
|
||||
/* TOR mode is requested but the DNS code can't enable it. */
|
||||
/* Tor mode is requested but the DNS code can't enable it. */
|
||||
err = gpg_error (GPG_ERR_FORBIDDEN);
|
||||
goto leave;
|
||||
}
|
||||
@ -2087,7 +2087,7 @@ static const char hlp_getinfo[] =
|
||||
"\n"
|
||||
"version - Return the version of the program.\n"
|
||||
"pid - Return the process id of the server.\n"
|
||||
"tor - Return OK if running in TOR mode\n"
|
||||
"tor - Return OK if running in Tor mode\n"
|
||||
"socket_name - Return the name of the socket.\n";
|
||||
static gpg_error_t
|
||||
cmd_getinfo (assuan_context_t ctx, char *line)
|
||||
@ -2120,7 +2120,7 @@ cmd_getinfo (assuan_context_t ctx, char *line)
|
||||
}
|
||||
else if (!strcmp (line, "tor"))
|
||||
{
|
||||
err = opt.use_tor? 0:set_error (GPG_ERR_GENERAL, "TOR mode not enabled");
|
||||
err = opt.use_tor? 0:set_error (GPG_ERR_GENERAL, "Tor mode not enabled");
|
||||
}
|
||||
else
|
||||
err = set_error (GPG_ERR_ASS_PARAMETER, "unknown value for WHAT");
|
||||
|
@ -238,8 +238,8 @@ useful for debugging.
|
||||
|
||||
@item --use-tor
|
||||
@opindex use-tor
|
||||
This option switches Dirmngr and thus GnuPG into ``TOR mode'' to route
|
||||
all network access via TOR (an anonymity network). WARNING: As of now
|
||||
This option switches Dirmngr and thus GnuPG into ``Tor mode'' to route
|
||||
all network access via Tor (an anonymity network). WARNING: As of now
|
||||
this still leaks the DNS queries; e.g. to lookup the hosts in a
|
||||
keyserver pool. Certain other features are disabled if this mode is
|
||||
active.
|
||||
|
@ -183,13 +183,13 @@ create_context (ctrl_t ctrl, assuan_context_t *r_ctx)
|
||||
else if ((opt.keyserver_options.options & KEYSERVER_HONOR_KEYSERVER_URL))
|
||||
{
|
||||
/* Tell the dirmngr that this possibly privacy invading
|
||||
option is in use. If Dirmngr is running in TOR mode, it
|
||||
option is in use. If Dirmngr is running in Tor mode, it
|
||||
will return an error. */
|
||||
err = assuan_transact (ctx, "OPTION honor-keyserver-url-used",
|
||||
NULL, NULL, NULL, NULL, NULL, NULL);
|
||||
if (gpg_err_code (err) == GPG_ERR_FORBIDDEN)
|
||||
log_error (_("keyserver option \"honor-keyserver-url\""
|
||||
" may not be used in TOR mode\n"));
|
||||
" may not be used in Tor mode\n"));
|
||||
else if (gpg_err_code (err) == GPG_ERR_UNKNOWN_OPTION)
|
||||
err = 0; /* Old dirmngr versions do not support this option. */
|
||||
}
|
||||
|
@ -906,9 +906,9 @@ static gc_option_t gc_options_dirmngr[] =
|
||||
"dirmngr", "force loading of outdated CRLs",
|
||||
GC_ARG_TYPE_NONE, GC_BACKEND_DIRMNGR },
|
||||
|
||||
{ "TOR",
|
||||
{ "Tor",
|
||||
GC_OPT_FLAG_GROUP, GC_LEVEL_BASIC,
|
||||
"gnupg", N_("Options controlling the use of TOR") },
|
||||
"gnupg", N_("Options controlling the use of Tor") },
|
||||
{ "use-tor", GC_OPT_FLAG_NONE, GC_LEVEL_INVISIBLE,
|
||||
"dirmngr", "route all network traffic via TOR",
|
||||
GC_ARG_TYPE_NONE, GC_BACKEND_DIRMNGR },
|
||||
|
Loading…
x
Reference in New Issue
Block a user