From fdfb475cd24b3cde832ed7a338e4004e21a393ae Mon Sep 17 00:00:00 2001 From: Werner Koch Date: Mon, 24 Jul 2000 08:24:35 +0000 Subject: [PATCH] See ChangeLog: Mon Jul 24 10:30:17 CEST 2000 Werner Koch --- THANKS | 1 + g10/ChangeLog | 6 +++++- g10/keyedit.c | 2 +- g10/keylist.c | 7 +++++++ 4 files changed, 14 insertions(+), 2 deletions(-) diff --git a/THANKS b/THANKS index 455ce9701..dcd08b478 100644 --- a/THANKS +++ b/THANKS @@ -7,6 +7,7 @@ Adam Mitchell adam@cafe21.org Alec Habig habig@budoe2.bu.edu Allan Clark allanc@sco.com Anand Kumria wildfire@progsoc.uts.edu.au +Anthony Mulcahy anthony@kcn.ne.jp Ariel T Glenn ariel@columbia.edu Bodo Moeller Bodo_Moeller@public.uni-hamburg.de Brenno de Winter brenno@dewinter.com diff --git a/g10/ChangeLog b/g10/ChangeLog index dd7406b70..99d7e26f2 100644 --- a/g10/ChangeLog +++ b/g10/ChangeLog @@ -1,3 +1,7 @@ +Mon Jul 24 10:30:17 CEST 2000 Werner Koch + + * keyedit.c (menu_expire): expire date for primary key can be set again. + Wed Jul 19 11:26:43 CEST 2000 Werner Koch * keylist.c (is_uid_valid): New. @@ -58,7 +62,7 @@ Fri Jun 9 10:09:52 CEST 2000 Werner Koch Wed Jun 7 19:19:09 CEST 2000 Werner Koch - * sig-check.c (do_check): Use EMULATE_MDENCODE also on v4 paclets. + * sig-check.c (do_check): Use EMULATE_MDENCODE also on v4 packets. Wed Jun 7 17:25:38 CEST 2000 Werner Koch diff --git a/g10/keyedit.c b/g10/keyedit.c index b28fadb45..84e8cd194 100644 --- a/g10/keyedit.c +++ b/g10/keyedit.c @@ -1501,7 +1501,7 @@ menu_expire( KBNODE pub_keyblock, KBNODE sec_keyblock ) else if( node->pkt->pkttype == PKT_USER_ID ) uid = node->pkt->pkt.user_id; else if( main_pk && node->pkt->pkttype == PKT_SIGNATURE - && sub_pk != NULL ) { + && ( mainkey || sub_pk ) ) { PKT_signature *sig = node->pkt->pkt.signature; if( keyid[0] == sig->keyid[0] && keyid[1] == sig->keyid[1] && ( (mainkey && uid && (sig->sig_class&~3) == 0x10) diff --git a/g10/keylist.c b/g10/keylist.c index 3be29a89e..32012f422 100644 --- a/g10/keylist.c +++ b/g10/keylist.c @@ -118,6 +118,13 @@ is_uid_valid ( KBNODE keyblock, KBNODE uidnode, u32 *mainkid ) KBNODE node; PKT_signature *selfsig = NULL; /* the latest valid self signature */ + /* The key signature verify function can's handle secret keys yet and + * becuase we are not sure whether the duplication of user IDs and + * self-signatures should be kept on secret keys we are not going to fix + * it there. */ + if ( keyblock->pkt->pkttype == PKT_SECRET_KEY ) + return NULL; + assert ( uidnode->pkt->pkttype == PKT_USER_ID || uidnode->pkt->pkttype == PKT_PHOTO_ID );