openbsd-ports/security/gnupg/patches/patch-g10_keygen_c
margarida 39cbe2af30 Security fix:
Add workaround for GnuPG's ElGamal signing keys bug.
URL: http://lists.gnupg.org/pipermail/gnupg-announce/2003q4/000276.html
2003-12-13 03:22:16 +00:00

34 lines
1.2 KiB
Plaintext

$OpenBSD: patch-g10_keygen_c,v 1.1 2003/12/13 03:22:16 margarida Exp $
--- g10/keygen.c.orig 2003-12-13 01:55:42.000000000 +0000
+++ g10/keygen.c 2003-12-13 02:02:25.000000000 +0000
@@ -953,8 +953,6 @@ ask_algo (int addmode, unsigned int *r_u
tty_printf( _(" (%d) DSA (sign only)\n"), 2 );
if( addmode )
tty_printf( _(" (%d) ElGamal (encrypt only)\n"), 3 );
- if (opt.expert)
- tty_printf( _(" (%d) ElGamal (sign and encrypt)\n"), 4 );
tty_printf( _(" (%d) RSA (sign only)\n"), 5 );
if (addmode)
tty_printf( _(" (%d) RSA (encrypt only)\n"), 6 );
@@ -985,20 +983,6 @@ ask_algo (int addmode, unsigned int *r_u
*r_usage = PUBKEY_USAGE_SIG;
break;
}
- else if( algo == 4 && opt.expert)
- {
- tty_printf(_(
-"The use of this algorithm is only supported by GnuPG. You will not be\n"
-"able to use this key to communicate with PGP users. This algorithm is also\n"
-"very slow, and may not be as secure as the other choices.\n"));
-
- if( cpr_get_answer_is_yes("keygen.algo.elg_se",
- _("Create anyway? ")))
- {
- algo = PUBKEY_ALGO_ELGAMAL;
- break;
- }
- }
else if( algo == 3 && addmode ) {
algo = PUBKEY_ALGO_ELGAMAL_E;
break;