mirror of
git://git.gnupg.org/gnupg.git
synced 2024-11-11 21:48:50 +01:00
* plaintext.c: Copyright.
* encode.c (encode_simple): Show cipher with --verbose. * options.h, g10.c (main), keyedit.c (sign_keys): Add --ask-cert-level option to enable cert level prompts during sigs. Defaults to on. Simplify --default-cert-check-level to --default-cert-level. If ask-cert-level is off, or batch is on, use the default-cert-level as the cert level. * options.h, g10.c (main), trustdb.c (mark_usable_uid_certs): Simplify --min-cert-check-level to --min-cert-level.
This commit is contained in:
parent
be94975af6
commit
a84fe549da
@ -1,3 +1,18 @@
|
|||||||
|
2004-02-24 David Shaw <dshaw@jabberwocky.com>
|
||||||
|
|
||||||
|
* plaintext.c: Copyright.
|
||||||
|
|
||||||
|
* encode.c (encode_simple): Show cipher with --verbose.
|
||||||
|
|
||||||
|
* options.h, g10.c (main), keyedit.c (sign_keys): Add
|
||||||
|
--ask-cert-level option to enable cert level prompts during
|
||||||
|
sigs. Defaults to on. Simplify --default-cert-check-level to
|
||||||
|
--default-cert-level. If ask-cert-level is off, or batch is on,
|
||||||
|
use the default-cert-level as the cert level.
|
||||||
|
|
||||||
|
* options.h, g10.c (main), trustdb.c (mark_usable_uid_certs):
|
||||||
|
Simplify --min-cert-check-level to --min-cert-level.
|
||||||
|
|
||||||
2004-02-22 David Shaw <dshaw@jabberwocky.com>
|
2004-02-22 David Shaw <dshaw@jabberwocky.com>
|
||||||
|
|
||||||
* options.h, g10.c (main), trustdb.c (mark_usable_uid_certs): Add
|
* options.h, g10.c (main), trustdb.c (mark_usable_uid_certs): Add
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
/* encode.c - encode data
|
/* encode.c - encode data
|
||||||
* Copyright (C) 1998, 1999, 2000, 2001, 2002,
|
* Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003,
|
||||||
* 2003 Free Software Foundation, Inc.
|
* 2004 Free Software Foundation, Inc.
|
||||||
*
|
*
|
||||||
* This file is part of GnuPG.
|
* This file is part of GnuPG.
|
||||||
*
|
*
|
||||||
@ -217,6 +217,10 @@ encode_simple( const char *filename, int mode, int use_seskey )
|
|||||||
m_free( cfx.dek ); cfx.dek = dek;
|
m_free( cfx.dek ); cfx.dek = dek;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if(opt.verbose)
|
||||||
|
log_info(_("using cipher %s\n"),
|
||||||
|
cipher_algo_to_string(cfx.dek->algo));
|
||||||
|
|
||||||
cfx.dek->use_mdc=use_mdc(NULL,cfx.dek->algo);
|
cfx.dek->use_mdc=use_mdc(NULL,cfx.dek->algo);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
33
g10/g10.c
33
g10/g10.c
@ -148,12 +148,14 @@ enum cmd_and_opt_values
|
|||||||
oNoAskSigExpire,
|
oNoAskSigExpire,
|
||||||
oAskCertExpire,
|
oAskCertExpire,
|
||||||
oNoAskCertExpire,
|
oNoAskCertExpire,
|
||||||
|
oAskCertLevel,
|
||||||
|
oNoAskCertLevel,
|
||||||
oFingerprint,
|
oFingerprint,
|
||||||
oWithFingerprint,
|
oWithFingerprint,
|
||||||
oAnswerYes,
|
oAnswerYes,
|
||||||
oAnswerNo,
|
oAnswerNo,
|
||||||
oDefCertCheckLevel,
|
oDefCertLevel,
|
||||||
oMinCertCheckLevel,
|
oMinCertLevel,
|
||||||
oKeyring,
|
oKeyring,
|
||||||
oPrimaryKeyring,
|
oPrimaryKeyring,
|
||||||
oSecretKeyring,
|
oSecretKeyring,
|
||||||
@ -437,6 +439,8 @@ static ARGPARSE_OPTS opts[] = {
|
|||||||
{ oNoAskSigExpire, "no-ask-sig-expire", 0, "@"},
|
{ oNoAskSigExpire, "no-ask-sig-expire", 0, "@"},
|
||||||
{ oAskCertExpire, "ask-cert-expire", 0, "@"},
|
{ oAskCertExpire, "ask-cert-expire", 0, "@"},
|
||||||
{ oNoAskCertExpire, "no-ask-cert-expire", 0, "@"},
|
{ oNoAskCertExpire, "no-ask-cert-expire", 0, "@"},
|
||||||
|
{ oAskCertLevel, "ask-cert-level", 0, "@"},
|
||||||
|
{ oNoAskCertLevel, "no-ask-cert-level", 0, "@"},
|
||||||
{ oOutput, "output", 2, N_("use as output file")},
|
{ oOutput, "output", 2, N_("use as output file")},
|
||||||
{ oMaxOutput, "max-output", 16|4, "@" },
|
{ oMaxOutput, "max-output", 16|4, "@" },
|
||||||
{ oVerbose, "verbose", 0, N_("verbose") },
|
{ oVerbose, "verbose", 0, N_("verbose") },
|
||||||
@ -567,8 +571,9 @@ static ARGPARSE_OPTS opts[] = {
|
|||||||
{ oSkipVerify, "skip-verify",0, "@" },
|
{ oSkipVerify, "skip-verify",0, "@" },
|
||||||
{ oCompressKeys, "compress-keys",0, "@"},
|
{ oCompressKeys, "compress-keys",0, "@"},
|
||||||
{ oCompressSigs, "compress-sigs",0, "@"},
|
{ oCompressSigs, "compress-sigs",0, "@"},
|
||||||
{ oDefCertCheckLevel, "default-cert-check-level", 1, "@"},
|
{ oDefCertLevel, "default-cert-check-level", 1, "@"}, /* Old option */
|
||||||
{ oMinCertCheckLevel, "min-cert-check-level", 1, "@"},
|
{ oDefCertLevel, "default-cert-level", 1, "@"},
|
||||||
|
{ oMinCertLevel, "min-cert-level", 1, "@"},
|
||||||
{ oAlwaysTrust, "always-trust", 0, "@"},
|
{ oAlwaysTrust, "always-trust", 0, "@"},
|
||||||
{ oTrustModel, "trust-model", 2, "@"},
|
{ oTrustModel, "trust-model", 2, "@"},
|
||||||
{ oForceOwnertrust, "force-ownertrust", 2, "@"},
|
{ oForceOwnertrust, "force-ownertrust", 2, "@"},
|
||||||
@ -1440,7 +1445,7 @@ main( int argc, char **argv )
|
|||||||
VERIFY_SHOW_POLICY_URLS|VERIFY_SHOW_NOTATIONS|VERIFY_SHOW_KEYSERVER_URLS;
|
VERIFY_SHOW_POLICY_URLS|VERIFY_SHOW_NOTATIONS|VERIFY_SHOW_KEYSERVER_URLS;
|
||||||
opt.trust_model=TM_AUTO;
|
opt.trust_model=TM_AUTO;
|
||||||
opt.mangle_dos_filenames=0;
|
opt.mangle_dos_filenames=0;
|
||||||
opt.min_cert_check_level=2;
|
opt.min_cert_level=2;
|
||||||
set_screen_dimensions();
|
set_screen_dimensions();
|
||||||
#if defined (_WIN32)
|
#if defined (_WIN32)
|
||||||
set_homedir ( read_w32_registry_string( NULL,
|
set_homedir ( read_w32_registry_string( NULL,
|
||||||
@ -1781,8 +1786,8 @@ main( int argc, char **argv )
|
|||||||
break;
|
break;
|
||||||
case oNoArmor: opt.no_armor=1; opt.armor=0; break;
|
case oNoArmor: opt.no_armor=1; opt.armor=0; break;
|
||||||
case oNoDefKeyring: default_keyring = 0; break;
|
case oNoDefKeyring: default_keyring = 0; break;
|
||||||
case oDefCertCheckLevel: opt.def_cert_check_level=pargs.r.ret_int; break;
|
case oDefCertLevel: opt.def_cert_level=pargs.r.ret_int; break;
|
||||||
case oMinCertCheckLevel: opt.min_cert_check_level=pargs.r.ret_int; break;
|
case oMinCertLevel: opt.min_cert_level=pargs.r.ret_int; break;
|
||||||
case oNoGreeting: nogreeting = 1; break;
|
case oNoGreeting: nogreeting = 1; break;
|
||||||
case oNoVerbose: g10_opt_verbose = 0;
|
case oNoVerbose: g10_opt_verbose = 0;
|
||||||
opt.verbose = 0; opt.list_sigs=0; break;
|
opt.verbose = 0; opt.list_sigs=0; break;
|
||||||
@ -1997,6 +2002,8 @@ main( int argc, char **argv )
|
|||||||
case oNoAskSigExpire: opt.ask_sig_expire = 0; break;
|
case oNoAskSigExpire: opt.ask_sig_expire = 0; break;
|
||||||
case oAskCertExpire: opt.ask_cert_expire = 1; break;
|
case oAskCertExpire: opt.ask_cert_expire = 1; break;
|
||||||
case oNoAskCertExpire: opt.ask_cert_expire = 0; break;
|
case oNoAskCertExpire: opt.ask_cert_expire = 0; break;
|
||||||
|
case oAskCertLevel: opt.ask_cert_level = 1; break;
|
||||||
|
case oNoAskCertLevel: opt.ask_cert_level = 0; break;
|
||||||
case oUser: /* store the local users */
|
case oUser: /* store the local users */
|
||||||
add_to_strlist2( &locusr, pargs.r.ret_str, utf8_strings );
|
add_to_strlist2( &locusr, pargs.r.ret_str, utf8_strings );
|
||||||
break;
|
break;
|
||||||
@ -2480,8 +2487,10 @@ main( int argc, char **argv )
|
|||||||
log_error(_("marginals-needed must be greater than 1\n"));
|
log_error(_("marginals-needed must be greater than 1\n"));
|
||||||
if( opt.max_cert_depth < 1 || opt.max_cert_depth > 255 )
|
if( opt.max_cert_depth < 1 || opt.max_cert_depth > 255 )
|
||||||
log_error(_("max-cert-depth must be in the range from 1 to 255\n"));
|
log_error(_("max-cert-depth must be in the range from 1 to 255\n"));
|
||||||
if( opt.min_cert_check_level < 1 || opt.min_cert_check_level > 3 )
|
if(opt.def_cert_level<0 || opt.def_cert_level>3)
|
||||||
log_error(_("min-cert-check-level must be in the range from 1 to 3\n"));
|
log_error(_("invalid default-cert-level; must be 0, 1, 2, or 3\n"));
|
||||||
|
if( opt.min_cert_level < 1 || opt.min_cert_level > 3 )
|
||||||
|
log_error(_("invalid min-cert-level; must be 1, 2, or 3\n"));
|
||||||
switch( opt.s2k_mode ) {
|
switch( opt.s2k_mode ) {
|
||||||
case 0:
|
case 0:
|
||||||
log_info(_("NOTE: simple S2K mode (0) is strongly discouraged\n"));
|
log_info(_("NOTE: simple S2K mode (0) is strongly discouraged\n"));
|
||||||
@ -2491,16 +2500,14 @@ main( int argc, char **argv )
|
|||||||
log_error(_("invalid S2K mode; must be 0, 1 or 3\n"));
|
log_error(_("invalid S2K mode; must be 0, 1 or 3\n"));
|
||||||
}
|
}
|
||||||
|
|
||||||
if(opt.def_cert_check_level<0 || opt.def_cert_check_level>3)
|
|
||||||
log_error(_("invalid default-check-level; must be 0, 1, 2, or 3\n"));
|
|
||||||
|
|
||||||
/* This isn't actually needed, but does serve to error out if the
|
/* This isn't actually needed, but does serve to error out if the
|
||||||
string is invalid. */
|
string is invalid. */
|
||||||
if(opt.def_preference_list &&
|
if(opt.def_preference_list &&
|
||||||
keygen_set_std_prefs(opt.def_preference_list,0))
|
keygen_set_std_prefs(opt.def_preference_list,0))
|
||||||
log_error(_("invalid default preferences\n"));
|
log_error(_("invalid default preferences\n"));
|
||||||
|
|
||||||
/* We provide defaults for the personal digest list */
|
/* We provide defaults for the personal digest list. This is
|
||||||
|
SHA-1. */
|
||||||
if(!pers_digest_list)
|
if(!pers_digest_list)
|
||||||
pers_digest_list="h2";
|
pers_digest_list="h2";
|
||||||
|
|
||||||
|
@ -761,8 +761,8 @@ sign_uids( KBNODE keyblock, STRLIST locusr, int *ret_modified,
|
|||||||
;
|
;
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
if(opt.batch)
|
if(opt.batch || !opt.ask_cert_level)
|
||||||
class=0x10+opt.def_cert_check_level;
|
class=0x10+opt.def_cert_level;
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
char *answer;
|
char *answer;
|
||||||
@ -773,13 +773,13 @@ sign_uids( KBNODE keyblock, STRLIST locusr, int *ret_modified,
|
|||||||
"answer, enter \"0\".\n"));
|
"answer, enter \"0\".\n"));
|
||||||
tty_printf("\n");
|
tty_printf("\n");
|
||||||
tty_printf(_(" (0) I will not answer.%s\n"),
|
tty_printf(_(" (0) I will not answer.%s\n"),
|
||||||
opt.def_cert_check_level==0?" (default)":"");
|
opt.def_cert_level==0?" (default)":"");
|
||||||
tty_printf(_(" (1) I have not checked at all.%s\n"),
|
tty_printf(_(" (1) I have not checked at all.%s\n"),
|
||||||
opt.def_cert_check_level==1?" (default)":"");
|
opt.def_cert_level==1?" (default)":"");
|
||||||
tty_printf(_(" (2) I have done casual checking.%s\n"),
|
tty_printf(_(" (2) I have done casual checking.%s\n"),
|
||||||
opt.def_cert_check_level==2?" (default)":"");
|
opt.def_cert_level==2?" (default)":"");
|
||||||
tty_printf(_(" (3) I have done very careful checking.%s\n"),
|
tty_printf(_(" (3) I have done very careful checking.%s\n"),
|
||||||
opt.def_cert_check_level==3?" (default)":"");
|
opt.def_cert_level==3?" (default)":"");
|
||||||
tty_printf("\n");
|
tty_printf("\n");
|
||||||
|
|
||||||
while(class==0)
|
while(class==0)
|
||||||
@ -787,7 +787,7 @@ sign_uids( KBNODE keyblock, STRLIST locusr, int *ret_modified,
|
|||||||
answer = cpr_get("sign_uid.class",_("Your selection? "
|
answer = cpr_get("sign_uid.class",_("Your selection? "
|
||||||
"(enter '?' for more information): "));
|
"(enter '?' for more information): "));
|
||||||
if(answer[0]=='\0')
|
if(answer[0]=='\0')
|
||||||
class=0x10+opt.def_cert_check_level; /* Default */
|
class=0x10+opt.def_cert_level; /* Default */
|
||||||
else if(ascii_strcasecmp(answer,"0")==0)
|
else if(ascii_strcasecmp(answer,"0")==0)
|
||||||
class=0x10; /* Generic */
|
class=0x10; /* Generic */
|
||||||
else if(ascii_strcasecmp(answer,"1")==0)
|
else if(ascii_strcasecmp(answer,"1")==0)
|
||||||
|
298
g10/options.h
298
g10/options.h
@ -38,161 +38,163 @@
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
EXTERN_UNLESS_MAIN_MODULE
|
EXTERN_UNLESS_MAIN_MODULE
|
||||||
struct {
|
struct
|
||||||
int verbose;
|
{
|
||||||
int quiet;
|
int verbose;
|
||||||
unsigned debug;
|
int quiet;
|
||||||
int armor;
|
unsigned debug;
|
||||||
char *outfile;
|
int armor;
|
||||||
off_t max_output;
|
char *outfile;
|
||||||
int dry_run;
|
off_t max_output;
|
||||||
int list_only;
|
int dry_run;
|
||||||
int textmode;
|
int list_only;
|
||||||
int expert;
|
int textmode;
|
||||||
int ask_sig_expire;
|
int expert;
|
||||||
int ask_cert_expire;
|
int ask_sig_expire;
|
||||||
int batch; /* run in batch mode */
|
int ask_cert_expire;
|
||||||
int answer_yes; /* answer yes on most questions */
|
int batch; /* run in batch mode */
|
||||||
int answer_no; /* answer no on most questions */
|
int answer_yes; /* answer yes on most questions */
|
||||||
int check_sigs; /* check key signatures */
|
int answer_no; /* answer no on most questions */
|
||||||
int with_colons;
|
int check_sigs; /* check key signatures */
|
||||||
int with_key_data;
|
int with_colons;
|
||||||
int with_fingerprint; /* opt --with-fingerprint active */
|
int with_key_data;
|
||||||
int fingerprint; /* list fingerprints */
|
int with_fingerprint; /* opt --with-fingerprint active */
|
||||||
int list_sigs; /* list signatures */
|
int fingerprint; /* list fingerprints */
|
||||||
int no_armor;
|
int list_sigs; /* list signatures */
|
||||||
int list_packets; /* list-packets mode: 1=normal, 2=invoked by command*/
|
int no_armor;
|
||||||
int def_cipher_algo;
|
int list_packets; /* list-packets mode: 1=normal, 2=invoked by command*/
|
||||||
int force_v3_sigs;
|
int def_cipher_algo;
|
||||||
int force_v4_certs;
|
int force_v3_sigs;
|
||||||
int force_mdc;
|
int force_v4_certs;
|
||||||
int disable_mdc;
|
int force_mdc;
|
||||||
int def_digest_algo;
|
int disable_mdc;
|
||||||
int cert_digest_algo;
|
int def_digest_algo;
|
||||||
int compress_algo;
|
int cert_digest_algo;
|
||||||
int compress_level;
|
int compress_algo;
|
||||||
int bz2_compress_level;
|
int compress_level;
|
||||||
int bz2_compress_lowmem;
|
int bz2_compress_level;
|
||||||
const char *def_secret_key;
|
int bz2_compress_lowmem;
|
||||||
char *def_recipient;
|
const char *def_secret_key;
|
||||||
int def_recipient_self;
|
char *def_recipient;
|
||||||
int def_cert_check_level;
|
int def_recipient_self;
|
||||||
int min_cert_check_level;
|
int def_cert_level;
|
||||||
int sk_comments;
|
int min_cert_level;
|
||||||
int no_version;
|
int ask_cert_level;
|
||||||
int marginals_needed;
|
int sk_comments;
|
||||||
int completes_needed;
|
int no_version;
|
||||||
int max_cert_depth;
|
int marginals_needed;
|
||||||
const char *homedir;
|
int completes_needed;
|
||||||
|
int max_cert_depth;
|
||||||
|
const char *homedir;
|
||||||
|
|
||||||
char *display; /* 5 options to be passed to the gpg-agent */
|
char *display; /* 5 options to be passed to the gpg-agent */
|
||||||
char *ttyname;
|
char *ttyname;
|
||||||
char *ttytype;
|
char *ttytype;
|
||||||
char *lc_ctype;
|
char *lc_ctype;
|
||||||
char *lc_messages;
|
char *lc_messages;
|
||||||
|
|
||||||
int skip_verify;
|
int skip_verify;
|
||||||
int compress_keys;
|
int compress_keys;
|
||||||
int compress_sigs;
|
int compress_sigs;
|
||||||
/* TM_CLASSIC must be zero to accomodate trustdbs generated before
|
/* TM_CLASSIC must be zero to accomodate trustdbs generated before
|
||||||
we started storing the trust model inside the trustdb. */
|
we started storing the trust model inside the trustdb. */
|
||||||
enum
|
enum
|
||||||
{
|
|
||||||
TM_CLASSIC=0, TM_PGP=1, TM_EXTERNAL=2, TM_ALWAYS, TM_AUTO
|
|
||||||
} trust_model;
|
|
||||||
int force_ownertrust;
|
|
||||||
enum
|
|
||||||
{
|
|
||||||
CO_GNUPG=0, CO_RFC2440, CO_RFC1991, CO_PGP2, CO_PGP6, CO_PGP7, CO_PGP8
|
|
||||||
} compliance;
|
|
||||||
int pgp2_workarounds;
|
|
||||||
int shm_coprocess;
|
|
||||||
const char *set_filename;
|
|
||||||
STRLIST comments;
|
|
||||||
int throw_keyid;
|
|
||||||
const char *photo_viewer;
|
|
||||||
int s2k_mode;
|
|
||||||
int s2k_digest_algo;
|
|
||||||
int s2k_cipher_algo;
|
|
||||||
int simple_sk_checksum; /* create the deprecated rfc2440 secret
|
|
||||||
key protection*/
|
|
||||||
int not_dash_escaped;
|
|
||||||
int escape_from;
|
|
||||||
int lock_once;
|
|
||||||
char *keyserver_uri;
|
|
||||||
char *keyserver_scheme;
|
|
||||||
char *keyserver_host;
|
|
||||||
char *keyserver_port;
|
|
||||||
char *keyserver_opaque;
|
|
||||||
struct
|
|
||||||
{
|
{
|
||||||
int verbose;
|
TM_CLASSIC=0, TM_PGP=1, TM_EXTERNAL=2, TM_ALWAYS, TM_AUTO
|
||||||
int include_revoked;
|
} trust_model;
|
||||||
int include_disabled;
|
int force_ownertrust;
|
||||||
int include_subkeys;
|
enum
|
||||||
int use_temp_files;
|
{
|
||||||
int keep_temp_files;
|
CO_GNUPG=0, CO_RFC2440, CO_RFC1991, CO_PGP2, CO_PGP6, CO_PGP7, CO_PGP8
|
||||||
int fake_v3_keyids;
|
} compliance;
|
||||||
int auto_key_retrieve;
|
int pgp2_workarounds;
|
||||||
int try_dns_srv;
|
int shm_coprocess;
|
||||||
unsigned int import_options;
|
const char *set_filename;
|
||||||
unsigned int export_options;
|
STRLIST comments;
|
||||||
STRLIST other;
|
int throw_keyid;
|
||||||
} keyserver_options;
|
const char *photo_viewer;
|
||||||
int exec_disable;
|
int s2k_mode;
|
||||||
int exec_path_set;
|
int s2k_digest_algo;
|
||||||
|
int s2k_cipher_algo;
|
||||||
|
int simple_sk_checksum; /* create the deprecated rfc2440 secret
|
||||||
|
key protection*/
|
||||||
|
int not_dash_escaped;
|
||||||
|
int escape_from;
|
||||||
|
int lock_once;
|
||||||
|
char *keyserver_uri;
|
||||||
|
char *keyserver_scheme;
|
||||||
|
char *keyserver_host;
|
||||||
|
char *keyserver_port;
|
||||||
|
char *keyserver_opaque;
|
||||||
|
struct
|
||||||
|
{
|
||||||
|
int verbose;
|
||||||
|
int include_revoked;
|
||||||
|
int include_disabled;
|
||||||
|
int include_subkeys;
|
||||||
|
int use_temp_files;
|
||||||
|
int keep_temp_files;
|
||||||
|
int fake_v3_keyids;
|
||||||
|
int auto_key_retrieve;
|
||||||
|
int try_dns_srv;
|
||||||
unsigned int import_options;
|
unsigned int import_options;
|
||||||
unsigned int export_options;
|
unsigned int export_options;
|
||||||
unsigned int list_options;
|
STRLIST other;
|
||||||
unsigned int verify_options;
|
} keyserver_options;
|
||||||
char *def_preference_list;
|
int exec_disable;
|
||||||
prefitem_t *personal_cipher_prefs;
|
int exec_path_set;
|
||||||
prefitem_t *personal_digest_prefs;
|
unsigned int import_options;
|
||||||
prefitem_t *personal_compress_prefs;
|
unsigned int export_options;
|
||||||
int no_perm_warn;
|
unsigned int list_options;
|
||||||
int no_mdc_warn;
|
unsigned int verify_options;
|
||||||
char *temp_dir;
|
char *def_preference_list;
|
||||||
int no_encrypt_to;
|
prefitem_t *personal_cipher_prefs;
|
||||||
int interactive;
|
prefitem_t *personal_digest_prefs;
|
||||||
STRLIST sig_notation_data;
|
prefitem_t *personal_compress_prefs;
|
||||||
STRLIST cert_notation_data;
|
int no_perm_warn;
|
||||||
STRLIST sig_policy_url;
|
int no_mdc_warn;
|
||||||
STRLIST cert_policy_url;
|
char *temp_dir;
|
||||||
STRLIST sig_keyserver_url;
|
int no_encrypt_to;
|
||||||
int use_embedded_filename;
|
int interactive;
|
||||||
int allow_non_selfsigned_uid;
|
STRLIST sig_notation_data;
|
||||||
int allow_freeform_uid;
|
STRLIST cert_notation_data;
|
||||||
int no_literal;
|
STRLIST sig_policy_url;
|
||||||
ulong set_filesize;
|
STRLIST cert_policy_url;
|
||||||
int fast_list_mode;
|
STRLIST sig_keyserver_url;
|
||||||
int fixed_list_mode;
|
int use_embedded_filename;
|
||||||
int ignore_time_conflict;
|
int allow_non_selfsigned_uid;
|
||||||
int ignore_valid_from;
|
int allow_freeform_uid;
|
||||||
int ignore_crc_error;
|
int no_literal;
|
||||||
int ignore_mdc_error;
|
ulong set_filesize;
|
||||||
int command_fd;
|
int fast_list_mode;
|
||||||
const char *override_session_key;
|
int fixed_list_mode;
|
||||||
int show_session_key;
|
int ignore_time_conflict;
|
||||||
int use_agent;
|
int ignore_valid_from;
|
||||||
const char *gpg_agent_info;
|
int ignore_crc_error;
|
||||||
int try_all_secrets;
|
int ignore_mdc_error;
|
||||||
int no_expensive_trust_checks;
|
int command_fd;
|
||||||
int no_sig_cache;
|
const char *override_session_key;
|
||||||
int no_sig_create_check;
|
int show_session_key;
|
||||||
int no_auto_check_trustdb;
|
int use_agent;
|
||||||
int preserve_permissions;
|
const char *gpg_agent_info;
|
||||||
int no_homedir_creation;
|
int try_all_secrets;
|
||||||
struct groupitem *grouplist;
|
int no_expensive_trust_checks;
|
||||||
int strict;
|
int no_sig_cache;
|
||||||
int mangle_dos_filenames;
|
int no_sig_create_check;
|
||||||
int enable_progress_filter;
|
int no_auto_check_trustdb;
|
||||||
int screen_columns;
|
int preserve_permissions;
|
||||||
int screen_lines;
|
int no_homedir_creation;
|
||||||
|
struct groupitem *grouplist;
|
||||||
|
int strict;
|
||||||
|
int mangle_dos_filenames;
|
||||||
|
int enable_progress_filter;
|
||||||
|
int screen_columns;
|
||||||
|
int screen_lines;
|
||||||
|
|
||||||
#ifdef ENABLE_CARD_SUPPORT
|
#ifdef ENABLE_CARD_SUPPORT
|
||||||
const char *ctapi_driver; /* Library to access the ctAPI. */
|
const char *ctapi_driver; /* Library to access the ctAPI. */
|
||||||
const char *pcsc_driver; /* Library to access the PC/SC system. */
|
const char *pcsc_driver; /* Library to access the PC/SC system. */
|
||||||
int disable_ccid; /* Disable the use of the internal CCID driver. */
|
int disable_ccid; /* Disable the use of the internal CCID driver. */
|
||||||
#endif /*ENABLE_CARD_SUPPORT*/
|
#endif /*ENABLE_CARD_SUPPORT*/
|
||||||
|
|
||||||
} opt;
|
} opt;
|
||||||
|
@ -1,5 +1,6 @@
|
|||||||
/* plaintext.c - process plaintext packets
|
/* plaintext.c - process plaintext packets
|
||||||
* Copyright (C) 1998, 1999, 2000, 2001, 2002 Free Software Foundation, Inc.
|
* Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003,
|
||||||
|
* 2004 Free Software Foundation, Inc.
|
||||||
*
|
*
|
||||||
* This file is part of GnuPG.
|
* This file is part of GnuPG.
|
||||||
*
|
*
|
||||||
|
@ -1382,7 +1382,7 @@ mark_usable_uid_certs (KBNODE keyblock, KBNODE uidnode,
|
|||||||
if (!IS_UID_SIG(sig) && !IS_UID_REV(sig))
|
if (!IS_UID_SIG(sig) && !IS_UID_REV(sig))
|
||||||
continue; /* we only look at these signature classes */
|
continue; /* we only look at these signature classes */
|
||||||
if(sig->sig_class>=0x11 && sig->sig_class<=0x13 &&
|
if(sig->sig_class>=0x11 && sig->sig_class<=0x13 &&
|
||||||
sig->sig_class-0x10<opt.min_cert_check_level)
|
sig->sig_class-0x10<opt.min_cert_level)
|
||||||
continue;
|
continue;
|
||||||
if (!is_in_klist (klist, sig))
|
if (!is_in_klist (klist, sig))
|
||||||
continue; /* no need to check it then */
|
continue; /* no need to check it then */
|
||||||
|
Loading…
Reference in New Issue
Block a user