1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-06-29 02:22:45 +02:00

Minor changes done for the Windows binary

This commit is contained in:
Werner Koch 2000-10-23 16:38:27 +00:00
parent f8d6b32861
commit f2b8760f75
8 changed files with 32 additions and 8 deletions

View File

@ -1 +1 @@
1.0.4a
1.0.4-1

View File

@ -61,7 +61,11 @@ or for snapshots (with a letter appended to the version number)
ftp://ftp.gnupg.org/pub/gcrypt/devel/gnupg-1.0.nx.tar.gz
this is the same source as for the Unix version.
this is the same source as for the Unix version. If your binary
version of GnuPG is called something like gnupg-w32-1.0.4-1.zip, you
should find a patch file named gnupg-w32-1.0.4-1.0.4-1.diff.gz at the
same location, which has to ne applied to the stock gpg source file.
Instructions are at the top of this file.
To build it, you need the MingW32/CPD kit, which is available at

View File

@ -1,3 +1,9 @@
2000-10-23 Werner Koch <wk@gnupg.org>
* keygen.c (read_parameter_file): Add a cast for isspace().
* status.c (myread): Use SIGINT instead of SIGHUP for DOS.
2000-10-19 Werner Koch <wk@gnupg.org>
* g10.c: New option --ignore-crc-error

View File

@ -1269,17 +1269,17 @@ read_parameter_file( const char *fname )
err = "line too long";
break;
}
for( p = line; isspace(*p); p++ )
for( p = line; isspace(*(byte*)p); p++ )
;
if( !*p || *p == '#' )
continue;
keyword = p;
if( *keyword == '%' ) {
for( ; !isspace(*p); p++ )
for( ; !isspace(*(byte*)p); p++ )
;
if( *p )
*p++ = 0;
for( ; isspace(*p); p++ )
for( ; isspace(*(byte*)p); p++ )
;
value = p;
trim_trailing_ws( value, strlen(value) );
@ -1325,7 +1325,7 @@ read_parameter_file( const char *fname )
}
if( *p )
*p++ = 0;
for( ; isspace(*p); p++ )
for( ; isspace(*(byte*)p); p++ )
;
if( !*p ) {
err = "missing argument";

View File

@ -360,7 +360,11 @@ myread(int fd, void *buf, size_t count)
eof_emmited++;
}
else { /* Ctrl-D not caught - do something reasonable */
#ifdef HAVE_DOSISH_SYSTEM
raise (SIGINT); /* nothing to hangup under DOS */
#else
raise (SIGHUP); /* no more input data */
#endif
}
}
return rc;

View File

@ -21,9 +21,9 @@ rm * || true
ln ../g10/gpg gpg.exe
i386--mingw32-strip gpg.exe
if [ -t ../doc/gpg.man ] ; then
cat ../doc/gpg.man >gpg.man
sed `printf "s/\b.//g"` ../doc/gpg.man >gpg.man
else
man -T latin1 -l ../doc/gpg.1 >gpg.man
man -T latin1 -l ../doc/gpg.1 | sed `printf "s/\b.//g"` >gpg.man
fi
todos gpg.man
cp ${srcdir}/README .
@ -32,3 +32,5 @@ ln ${srcdir}/doc/README.W32 .
todos README.W32
for i in ${srcdir}/po/*.gmo; do ln $i "$(basename $i .gmo).mo" ; done
zip "gnupg-w32-$(cat ${srcdir}/VERSION).zip" *

View File

@ -1,3 +1,7 @@
2000-10-23 Werner Koch <wk@gnupg.org>
* secmem.c (lock_pool): Don't print warnbing for Windows.
2000-10-16 Werner Koch <wk@gnupg.org>
* secmem.c (lock_pool): Fixed error checking for Linux.

View File

@ -159,6 +159,10 @@ lock_pool( void *p, size_t n )
* wipes out the memory on a free().
* Therefore it is sufficient to suppress the warning
*/
#elif defined (HAVE_DOSISH_SYSTEM)
/* It does not make sense to print such a warning, given the fact that
* this whole Windows !@#$% and their user base are inherently insecure
*/
#else
log_info("Please note that you don't have secure memory on this system\n");
#endif