mirror of
git://git.gnupg.org/gnupg.git
synced 2025-07-03 22:56:33 +02:00
Typo fixes.
Made --default-key work for gpgsm Add --default-key and --encrypt-to to gpgconf.
This commit is contained in:
parent
2d4e157d85
commit
11573b09c4
13 changed files with 70 additions and 14 deletions
10
sm/sign.c
10
sm/sign.c
|
@ -122,8 +122,9 @@ hash_and_copy_data (int fd, gcry_md_hd_t md, ksba_writer_t writer)
|
|||
}
|
||||
|
||||
|
||||
/* Get the default certificate which is defined as the first cabable
|
||||
of signing our keyDB returns and has a secret key available. */
|
||||
/* Get the default certificate which is defined as the first
|
||||
certificate capable of signing returned by the keyDB and has a
|
||||
secret key available. */
|
||||
int
|
||||
gpgsm_get_default_cert (ctrl_t ctrl, ksba_cert_t *r_cert)
|
||||
{
|
||||
|
@ -364,7 +365,7 @@ gpgsm_sign (ctrl_t ctrl, certlist_t signerlist,
|
|||
goto leave;
|
||||
}
|
||||
|
||||
/* If no list of signers is given, use a default one. */
|
||||
/* If no list of signers is given, use the default certificate. */
|
||||
if (!signerlist)
|
||||
{
|
||||
ksba_cert_t cert = get_default_signer (ctrl);
|
||||
|
@ -376,8 +377,7 @@ gpgsm_sign (ctrl_t ctrl, certlist_t signerlist,
|
|||
}
|
||||
|
||||
/* Although we don't check for ambigious specification we will
|
||||
check that the signer's certificate is is usable and
|
||||
valid. */
|
||||
check that the signer's certificate is usable and valid. */
|
||||
rc = gpgsm_cert_use_sign_p (cert);
|
||||
if (!rc)
|
||||
rc = gpgsm_validate_chain (ctrl, cert, NULL, 0, NULL, 0);
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue