aboutsummaryrefslogtreecommitdiffstats
path: root/g10/keyedit.c
diff options
context:
space:
mode:
authorDavid Shaw <[email protected]>2003-04-30 05:33:52 +0000
committerDavid Shaw <[email protected]>2003-04-30 05:33:52 +0000
commit1fc1d26083f394a46da6a8b05b60a222cbf879f2 (patch)
treeb0acd7efa10fc3a266694bf5dfb733889e3d22e1 /g10/keyedit.c
parent* gettextP.h: Add comment for HP/UX users. Local fix for GnuPG. (diff)
downloadgnupg-1fc1d26083f394a46da6a8b05b60a222cbf879f2.tar.gz
gnupg-1fc1d26083f394a46da6a8b05b60a222cbf879f2.zip
* build-packet.c (build_sig_subpkt): Comments.
* exec.c (exec_write): Cast NULL to void* to properly terminate varargs list. * keyedit.c (show_key_with_all_names): Just for safety, catch an invalid pk algorithm. * sign.c (make_keysig_packet): Crucial that the call to mksubpkt comes LAST before the calls to finalize the sig as that makes it possible for the mksubpkt function to get a reliable pointer to the subpacket area. * pkclist.c (do_we_trust_pre): If an untrusted key was chosen by a particular user ID, use that ID as the one to ask about when prompting whether to use the key anyway. (build_pk_list): Similar change here when adding keys to the recipient list. * trustdb.c (update_validity): Fix bug that prevented more than one validity record per trust record. (get_validity): When retrieving validity for a (user) supplied user ID, return the validity for that user ID only, and do not fall back to the general key validity. (validate_one_keyblock): Some commentary on whether non-self-signed user IDs belong in the web of trust (arguably, they do).
Diffstat (limited to '')
-rw-r--r--g10/keyedit.c6
1 files changed, 4 insertions, 2 deletions
diff --git a/g10/keyedit.c b/g10/keyedit.c
index 0324b4070..333552c38 100644
--- a/g10/keyedit.c
+++ b/g10/keyedit.c
@@ -1983,13 +1983,15 @@ show_key_with_all_names( KBNODE keyblock, int only_marked, int with_revoker,
for(i=0;i<pk->numrevkeys;i++) {
u32 r_keyid[2];
char *user;
-
+ const char *algo=
+ pubkey_algo_to_string(pk->revkey[i].algid);
+
keyid_from_fingerprint(pk->revkey[i].fpr,
MAX_FINGERPRINT_LEN,r_keyid);
user=get_user_id_string (r_keyid);
tty_printf (_("This key may be revoked by %s key "),
- pubkey_algo_to_string (pk->revkey[i].algid));
+ algo?algo:"?");
tty_print_utf8_string (user, strlen (user));
if ((pk->revkey[i].class&0x40))
tty_printf (_(" (sensitive)"));