.depend
.depend-done
.libs
+aclocal.m4
apidocs
autodeps
autom4te.cache
- remove remnant -I/opt/local hacks, --prefix=/usr is recommended.
- rework configure.ac et al to lose internal library baggage flexibly.
- updated sv.po <goeran@uddrborg.se>.
- - permit gpg to be used for RSA/MD5 signatures.
+ - permit gpg to be used for RSA signatures.
- permit RSA key sizes larger than 1024 bits.
+ - permit RSA/{sha1,sha256,sha384,sha512} signature verification.
4.4 -> 4.4.1:
- force *.py->*.pyo byte code compilation with brp-python-bytecompile.
%changelog
* Wed Mar 9 2005 Jeff Johnson <jbj@jbj.org> 4.4.2-0.6
-- permit gpg to be used for RSA/MD5 signatures.
+- permit gpg to be used for RSA signatures.
- permit RSA key sizes larger than 1024 bits.
+- permit RSA/{sha1,sha256,sha384,sha512} signature verification.
* Sun Feb 20 2005 Jeff Johnson <jbj@jbj.org> 4.4.2-0.5
- updated sv.po <goeran@uddrborg.se>.
}
if (poptPeekArg(optCon)) {
- int sigTag;
- switch (sigTag = rpmLookupSignatureType(RPMLOOKUPSIG_QUERY)) {
+ int sigTag = rpmLookupSignatureType(RPMLOOKUPSIG_QUERY);
+ switch (sigTag) {
case 0:
break;
case RPMSIGTAG_PGP:
+#ifdef DYING /* XXX gpg can now be used for RSA signatures. */
if ((sigTag == RPMSIGTAG_PGP || sigTag == RPMSIGTAG_PGP5) &&
!rpmDetectPGPVersion(NULL)) {
fprintf(stderr, _("pgp not found: "));
ec = EXIT_FAILURE;
goto exit;
} /*@fallthrough@*/
+#endif
case RPMSIGTAG_GPG:
+ case RPMSIGTAG_DSA:
+ case RPMSIGTAG_RSA:
passPhrase = rpmGetPassPhrase(_("Enter pass phrase: "), sigTag);
if (passPhrase == NULL) {
fprintf(stderr, _("Pass phrase check failed\n"));