mirror of
git://git.gnupg.org/gnupg.git
synced 2025-07-02 22:46:30 +02:00
gpg: Allow unattended deletion of secret keys.
* agent/command.c (cmd_delete_key): Make the --force option depend on --disallow-loopback-passphrase. * g10/call-agent.c (agent_delete_key): Add arg FORCE. * g10/delkey.c (do_delete_key): Pass opt.answer_yes to agent_delete_key. -- Unless the agent has been configured with --disallow-loopback-passpharse an unattended deletion of a secret key is now possible with gpg by using --batch _and_ --yes. Signed-off-by: Werner Koch <wk@gnupg.org>
This commit is contained in:
parent
693838f012
commit
ac9ff644b1
6 changed files with 45 additions and 10 deletions
|
@ -184,8 +184,14 @@ do_delete_key( const char *username, int secret, int force, int *r_sec_avail )
|
|||
prompt = gpg_format_keydesc (node->pkt->pkt.public_key,
|
||||
FORMAT_KEYDESC_DELKEY, 1);
|
||||
err = hexkeygrip_from_pk (node->pkt->pkt.public_key, &hexgrip);
|
||||
/* NB: We require --yes to advise the agent not to
|
||||
* request a confirmation. The rationale for this extra
|
||||
* pre-caution is that since 2.1 the secret key may also
|
||||
* be used for other protocols and thus deleting it from
|
||||
* the gpg would also delete the key for other tools. */
|
||||
if (!err)
|
||||
err = agent_delete_key (NULL, hexgrip, prompt);
|
||||
err = agent_delete_key (NULL, hexgrip, prompt,
|
||||
opt.answer_yes);
|
||||
xfree (prompt);
|
||||
xfree (hexgrip);
|
||||
if (err)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue