1
0
mirror of git://git.gnupg.org/gnupg.git synced 2025-03-25 22:19:59 +01:00

* trustdb.c (validate_keys): Mask the ownertrust when building the list of

fully valid keys so that disabled keys are still counted in the web of
trust.

* gpgv.c (main): Fix bug #113 - gpgv should accept the
--ignore-time-conflict option.

* g10.c (main): Use 3DES for the s2k cipher in --openpgp mode. Double the
amount of secure memory to 32k (keys are getting bigger these days).
This commit is contained in:
David Shaw 2003-02-26 20:40:34 +00:00
parent 838fe750bb
commit 8655a545af
4 changed files with 20 additions and 6 deletions

View File

@ -1,3 +1,16 @@
2003-02-26 David Shaw <dshaw@jabberwocky.com>
* trustdb.c (validate_keys): Mask the ownertrust when building the
list of fully valid keys so that disabled keys are still counted
in the web of trust.
* gpgv.c (main): Fix bug #113 - gpgv should accept the
--ignore-time-conflict option.
* g10.c (main): Use 3DES for the s2k cipher in --openpgp mode.
Double the amount of secure memory to 32k (keys are getting bigger
these days).
2003-02-22 David Shaw <dshaw@jabberwocky.com>
* g10.c (main): --openpgp disables --pgpX.

View File

@ -1173,7 +1173,7 @@ main( int argc, char **argv )
}
#endif
/* initialize the secure memory. */
secmem_init( 16384 );
secmem_init( 32768 );
maybe_setuid = 0;
/* Okay, we are now working under our real uid */
@ -1453,7 +1453,7 @@ main( int argc, char **argv )
opt.def_compress_algo = 1;
opt.s2k_mode = 3; /* iterated+salted */
opt.s2k_digest_algo = DIGEST_ALGO_SHA1;
opt.s2k_cipher_algo = CIPHER_ALGO_CAST5;
opt.s2k_cipher_algo = CIPHER_ALGO_3DES;
opt.pgp2 = 0;
opt.pgp6 = 0;
opt.pgp7 = 0;

View File

@ -190,6 +190,7 @@ main( int argc, char **argv )
case oStatusFD: set_status_fd( pargs.r.ret_int ); break;
case oLoggerFD: log_set_logfile( NULL, pargs.r.ret_int ); break;
case oHomedir: set_homedir (pargs.r.ret_str); break;
case oIgnoreTimeConflict: opt.ignore_time_conflict = 1; break;
default : pargs.err = 2; break;
}
}

View File

@ -1709,8 +1709,9 @@ validate_keys (int interactive)
k = new_key_item ();
k->kid[0]=kid[0];
k->kid[1]=kid[1];
k->ownertrust = get_ownertrust (kar->keyblock
->pkt->pkt.public_key);
k->ownertrust = (get_ownertrust (kar->keyblock
->pkt->pkt.public_key)
& TRUST_MASK);
k->next = klist;
klist = k;
break;
@ -1744,7 +1745,6 @@ validate_keys (int interactive)
do_sync ();
pending_check_trustdb = 0;
}
return rc;
}