mirror of
git://git.gnupg.org/gnupg.git
synced 2025-01-24 15:17:02 +01:00
* pkclist.c (build_pk_list): Fail if any recipient keys are unusable.
* options.skel: The PGP LDAP keyserver is back. Use MIT keyserver as a sample rather than cryptnet as cryptnet does not support searching yet. * keyedit.c (show_key_with_all_names): Fix error message (preferences are userid/selfsig and not key specific).
This commit is contained in:
parent
c6178bdb69
commit
c721e11bf5
@ -1,3 +1,15 @@
|
|||||||
|
2002-08-30 David Shaw <dshaw@jabberwocky.com>
|
||||||
|
|
||||||
|
* pkclist.c (build_pk_list): Fail if any recipient keys are
|
||||||
|
unusable.
|
||||||
|
|
||||||
|
* options.skel: The PGP LDAP keyserver is back. Use MIT keyserver
|
||||||
|
as a sample rather than cryptnet as cryptnet does not support
|
||||||
|
searching yet.
|
||||||
|
|
||||||
|
* keyedit.c (show_key_with_all_names): Fix error message
|
||||||
|
(preferences are userid/selfsig and not key specific).
|
||||||
|
|
||||||
2002-08-30 Werner Koch <wk@gnupg.org>
|
2002-08-30 Werner Koch <wk@gnupg.org>
|
||||||
|
|
||||||
* pkclist.c (do_we_trust_pre): Changed the wording of a warning.
|
* pkclist.c (do_we_trust_pre): Changed the wording of a warning.
|
||||||
@ -9,6 +21,7 @@
|
|||||||
can't determine the length in advance, the uncompressor does not
|
can't determine the length in advance, the uncompressor does not
|
||||||
know where to start. Actually we should use the new CTB always
|
know where to start. Actually we should use the new CTB always
|
||||||
but this would break PGP 2 compatibility.
|
but this would break PGP 2 compatibility.
|
||||||
|
|
||||||
* parse-packet.c (parse): Special treatment for new style CTB
|
* parse-packet.c (parse): Special treatment for new style CTB
|
||||||
compressed packets.
|
compressed packets.
|
||||||
|
|
||||||
|
@ -1835,7 +1835,7 @@ show_key_with_all_names( KBNODE keyblock, int only_marked, int with_revoker,
|
|||||||
show_prefs (uid, with_prefs == 2);
|
show_prefs (uid, with_prefs == 2);
|
||||||
else
|
else
|
||||||
tty_printf(_("There are no preferences on a "
|
tty_printf(_("There are no preferences on a "
|
||||||
"PGP 2.x-style key.\n"));
|
"PGP 2.x-style user ID.\n"));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -85,13 +85,14 @@ lock-once
|
|||||||
# support).
|
# support).
|
||||||
#
|
#
|
||||||
# Example HKP keyserver:
|
# Example HKP keyserver:
|
||||||
# x-hkp://keyserver.cryptnet.net
|
# x-hkp://pgp.mit.edu
|
||||||
#
|
#
|
||||||
# Example email keyserver:
|
# Example email keyserver:
|
||||||
# mailto:pgp-public-keys@keys.nl.pgp.net
|
# mailto:pgp-public-keys@keys.nl.pgp.net
|
||||||
#
|
#
|
||||||
# Example LDAP keyserver:
|
# Example LDAP keyservers:
|
||||||
# ldap://pgp.surfnet.nl:11370
|
# ldap://pgp.surfnet.nl:11370
|
||||||
|
# ldap://keyserver.pgp.com
|
||||||
#
|
#
|
||||||
# Regular URL syntax applies, and you can set an alternate port
|
# Regular URL syntax applies, and you can set an alternate port
|
||||||
# through the usual method:
|
# through the usual method:
|
||||||
@ -109,6 +110,7 @@ lock-once
|
|||||||
#keyserver x-hkp://pgp.mit.edu
|
#keyserver x-hkp://pgp.mit.edu
|
||||||
#keyserver mailto:pgp-public-keys@keys.nl.pgp.net
|
#keyserver mailto:pgp-public-keys@keys.nl.pgp.net
|
||||||
#keyserver ldap://pgp.surfnet.nl:11370
|
#keyserver ldap://pgp.surfnet.nl:11370
|
||||||
|
#keyserver ldap://keyserver.pgp.com
|
||||||
|
|
||||||
# Common options for keyserver functions:
|
# Common options for keyserver functions:
|
||||||
#
|
#
|
||||||
|
@ -770,6 +770,7 @@ build_pk_list( STRLIST rcpts, PK_LIST *ret_pk_list, unsigned use )
|
|||||||
log_error(_("%s: skipped: %s\n"), rov->d, g10_errstr(rc) );
|
log_error(_("%s: skipped: %s\n"), rov->d, g10_errstr(rc) );
|
||||||
write_status_text_and_buffer (STATUS_INV_RECP, "0 ",
|
write_status_text_and_buffer (STATUS_INV_RECP, "0 ",
|
||||||
rov->d, strlen (rov->d), -1);
|
rov->d, strlen (rov->d), -1);
|
||||||
|
goto fail;
|
||||||
}
|
}
|
||||||
else if( !(rc=check_pubkey_algo2(pk->pubkey_algo, use )) ) {
|
else if( !(rc=check_pubkey_algo2(pk->pubkey_algo, use )) ) {
|
||||||
/* Skip the actual key if the key is already present
|
/* Skip the actual key if the key is already present
|
||||||
@ -793,6 +794,7 @@ build_pk_list( STRLIST rcpts, PK_LIST *ret_pk_list, unsigned use )
|
|||||||
log_error(_("%s: skipped: %s\n"), rov->d, g10_errstr(rc) );
|
log_error(_("%s: skipped: %s\n"), rov->d, g10_errstr(rc) );
|
||||||
write_status_text_and_buffer (STATUS_INV_RECP, "0 ",
|
write_status_text_and_buffer (STATUS_INV_RECP, "0 ",
|
||||||
rov->d, strlen (rov->d), -1);
|
rov->d, strlen (rov->d), -1);
|
||||||
|
goto fail;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -945,6 +947,7 @@ build_pk_list( STRLIST rcpts, PK_LIST *ret_pk_list, unsigned use )
|
|||||||
write_status_text_and_buffer (STATUS_INV_RECP, "0 ",
|
write_status_text_and_buffer (STATUS_INV_RECP, "0 ",
|
||||||
remusr->d, strlen (remusr->d),
|
remusr->d, strlen (remusr->d),
|
||||||
-1);
|
-1);
|
||||||
|
goto fail;
|
||||||
}
|
}
|
||||||
else if( !(rc=check_pubkey_algo2(pk->pubkey_algo, use )) ) {
|
else if( !(rc=check_pubkey_algo2(pk->pubkey_algo, use )) ) {
|
||||||
int trustlevel;
|
int trustlevel;
|
||||||
@ -958,6 +961,7 @@ build_pk_list( STRLIST rcpts, PK_LIST *ret_pk_list, unsigned use )
|
|||||||
remusr->d,
|
remusr->d,
|
||||||
strlen (remusr->d),
|
strlen (remusr->d),
|
||||||
-1);
|
-1);
|
||||||
|
goto fail;
|
||||||
}
|
}
|
||||||
else if( do_we_trust_pre( pk, trustlevel ) ) {
|
else if( do_we_trust_pre( pk, trustlevel ) ) {
|
||||||
/* note: do_we_trust may have changed the trustlevel */
|
/* note: do_we_trust may have changed the trustlevel */
|
||||||
@ -988,6 +992,7 @@ build_pk_list( STRLIST rcpts, PK_LIST *ret_pk_list, unsigned use )
|
|||||||
remusr->d,
|
remusr->d,
|
||||||
strlen (remusr->d),
|
strlen (remusr->d),
|
||||||
-1);
|
-1);
|
||||||
|
goto fail;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
@ -997,6 +1002,7 @@ build_pk_list( STRLIST rcpts, PK_LIST *ret_pk_list, unsigned use )
|
|||||||
strlen (remusr->d),
|
strlen (remusr->d),
|
||||||
-1);
|
-1);
|
||||||
log_error(_("%s: skipped: %s\n"), remusr->d, g10_errstr(rc) );
|
log_error(_("%s: skipped: %s\n"), remusr->d, g10_errstr(rc) );
|
||||||
|
goto fail;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -1007,6 +1013,8 @@ build_pk_list( STRLIST rcpts, PK_LIST *ret_pk_list, unsigned use )
|
|||||||
rc = G10ERR_NO_USER_ID;
|
rc = G10ERR_NO_USER_ID;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fail:
|
||||||
|
|
||||||
if( rc )
|
if( rc )
|
||||||
release_pk_list( pk_list );
|
release_pk_list( pk_list );
|
||||||
else
|
else
|
||||||
|
Loading…
x
Reference in New Issue
Block a user