mirror of
git://git.gnupg.org/gnupg.git
synced 2025-07-03 22:56:33 +02:00
* options.h, gpg.c (main, parse_trust_model), pkclist.c
(check_signatures_trust), mainproc.c (check_sig_and_print, pka_uri_from_sig), trustdb.c (init_trustdb): Some tweaks to PKA so that it is a verify-option now.
This commit is contained in:
parent
81e2591421
commit
4f9efb7a79
6 changed files with 23 additions and 50 deletions
48
g10/gpg.c
48
g10/gpg.c
|
@ -243,7 +243,6 @@ enum cmd_and_opt_values
|
|||
oAlwaysTrust,
|
||||
oTrustModel,
|
||||
oForceOwnertrust,
|
||||
oAllowPkaLookup,
|
||||
oRunAsShmCP,
|
||||
oSetFilename,
|
||||
oForYourEyesOnly,
|
||||
|
@ -601,7 +600,6 @@ static ARGPARSE_OPTS opts[] = {
|
|||
{ oAlwaysTrust, "always-trust", 0, "@"},
|
||||
{ oTrustModel, "trust-model", 2, "@"},
|
||||
{ oForceOwnertrust, "force-ownertrust", 2, "@"},
|
||||
{ oAllowPkaLookup, "allow-pka-lookup", 0, "@" },
|
||||
{ oRunAsShmCP, "run-as-shm-coprocess", 4, "@" },
|
||||
{ oSetFilename, "set-filename", 2, "@" },
|
||||
{ oForYourEyesOnly, "for-your-eyes-only", 0, "@" },
|
||||
|
@ -1452,7 +1450,6 @@ gpgconf_list (const char *configfile)
|
|||
printf ("quiet:%lu:\n", GC_OPT_FLAG_NONE);
|
||||
printf ("keyserver:%lu:\n", GC_OPT_FLAG_NONE);
|
||||
printf ("reader-port:%lu:\n", GC_OPT_FLAG_NONE);
|
||||
printf ("allow-pka-lookup:%lu:\n", GC_OPT_FLAG_NONE);
|
||||
}
|
||||
|
||||
|
||||
|
@ -1608,47 +1605,20 @@ collapse_args(int argc,char *argv[])
|
|||
static void
|
||||
parse_trust_model(const char *model)
|
||||
{
|
||||
opt.pka_trust_increase = 0;
|
||||
if(ascii_strcasecmp(model,"pgp")==0)
|
||||
{
|
||||
opt.trust_model=TM_PGP;
|
||||
}
|
||||
else if(ascii_strcasecmp(model,"pgp+pka")==0)
|
||||
{
|
||||
opt.trust_model=TM_PGP;
|
||||
opt.pka_trust_increase = 1;
|
||||
}
|
||||
opt.trust_model=TM_PGP;
|
||||
else if(ascii_strcasecmp(model,"classic")==0)
|
||||
{
|
||||
opt.trust_model=TM_CLASSIC;
|
||||
}
|
||||
opt.trust_model=TM_CLASSIC;
|
||||
else if(ascii_strcasecmp(model,"always")==0)
|
||||
{
|
||||
opt.trust_model=TM_ALWAYS;
|
||||
}
|
||||
opt.trust_model=TM_ALWAYS;
|
||||
else if(ascii_strcasecmp(model,"direct")==0)
|
||||
{
|
||||
opt.trust_model=TM_DIRECT;
|
||||
}
|
||||
else if(ascii_strcasecmp(model,"direct+pka")==0)
|
||||
{
|
||||
opt.trust_model=TM_DIRECT;
|
||||
opt.pka_trust_increase = 1;
|
||||
}
|
||||
opt.trust_model=TM_DIRECT;
|
||||
else if(ascii_strcasecmp(model,"auto")==0)
|
||||
{
|
||||
opt.trust_model=TM_AUTO;
|
||||
}
|
||||
else if(ascii_strcasecmp(model,"auto+pka")==0)
|
||||
{
|
||||
opt.trust_model=TM_AUTO;
|
||||
opt.pka_trust_increase = 1;
|
||||
}
|
||||
opt.trust_model=TM_AUTO;
|
||||
else
|
||||
log_error("unknown trust model `%s'\n",model);
|
||||
}
|
||||
|
||||
|
||||
int
|
||||
main (int argc, char **argv )
|
||||
{
|
||||
|
@ -1740,7 +1710,6 @@ main (int argc, char **argv )
|
|||
opt.verify_options=
|
||||
VERIFY_SHOW_POLICY_URLS|VERIFY_SHOW_STD_NOTATIONS|VERIFY_SHOW_KEYSERVER_URLS;
|
||||
opt.trust_model=TM_AUTO;
|
||||
opt.pka_trust_increase=0;
|
||||
opt.mangle_dos_filenames=0;
|
||||
opt.min_cert_level=2;
|
||||
set_screen_dimensions();
|
||||
|
@ -2153,9 +2122,6 @@ main (int argc, char **argv )
|
|||
opt.force_ownertrust=0;
|
||||
}
|
||||
break;
|
||||
case oAllowPkaLookup:
|
||||
opt.allow_pka_lookup = 1;
|
||||
break;
|
||||
case oLoadExtension:
|
||||
#ifndef __riscos__
|
||||
#if defined(USE_DYNAMIC_LINKING) || defined(_WIN32)
|
||||
|
@ -2496,6 +2462,10 @@ main (int argc, char **argv )
|
|||
N_("show user ID validity during signature verification")},
|
||||
{"show-unusable-uids",VERIFY_SHOW_UNUSABLE_UIDS,NULL,
|
||||
N_("show revoked and expired user IDs in signature verification")},
|
||||
{"pka-lookup",VERIFY_PKA_LOOKUP,NULL,
|
||||
N_("validate signatures with PKA data")},
|
||||
{"pka-trust-increase",VERIFY_PKA_TRUST_INCREASE,NULL,
|
||||
N_("elevate the trust of signatures with valid PKA data")},
|
||||
{NULL,0,NULL,NULL}
|
||||
};
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue