diff options
author | Werner Koch <[email protected]> | 2008-04-07 19:31:12 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2008-04-07 19:31:12 +0000 |
commit | 86f35a55d01f1ef7aec2b303a722ff5733148aa4 (patch) | |
tree | 99cb8163a8db0deba06608fec178ea9ad602e5c0 /g10/getkey.c | |
parent | Fixed last yat2m change. (diff) | |
download | gnupg-86f35a55d01f1ef7aec2b303a722ff5733148aa4.tar.gz gnupg-86f35a55d01f1ef7aec2b303a722ff5733148aa4.zip |
Minor cleanups.
Implemented key helper kdns
Diffstat (limited to '')
-rw-r--r-- | g10/getkey.c | 8 |
1 files changed, 3 insertions, 5 deletions
diff --git a/g10/getkey.c b/g10/getkey.c index c1d21f109..47cf22ea3 100644 --- a/g10/getkey.c +++ b/g10/getkey.c @@ -1012,9 +1012,8 @@ get_pubkey_byname (PKT_public_key *pk, requirement as the URL might point to a key put in by an attacker. By forcing the use of the fingerprint, we won't use the attacker's key here. */ - if(rc==0 && fpr) + if (!rc && fpr) { - int i; char fpr_string[MAX_FINGERPRINT_LEN*2+1]; assert(fpr_len<=MAX_FINGERPRINT_LEN); @@ -1022,9 +1021,8 @@ get_pubkey_byname (PKT_public_key *pk, free_strlist(namelist); namelist=NULL; - for(i=0;i<fpr_len;i++) - sprintf(fpr_string+2*i,"%02X",fpr[i]); - + bin2hex (fpr, fpr_len, fpr_string); + if(opt.verbose) log_info("auto-key-locate found fingerprint %s\n",fpr_string); |