aboutsummaryrefslogtreecommitdiffstats
path: root/g10/keyedit.c
diff options
context:
space:
mode:
authorDavid Shaw <[email protected]>2002-12-26 22:22:50 +0000
committerDavid Shaw <[email protected]>2002-12-26 22:22:50 +0000
commitf3f1015f6a82482dd6075343d41f4aca1e795e48 (patch)
treec67b1a5f42380195a65378b229867eadce93d278 /g10/keyedit.c
parent* iobuf.c (iobuf_flush): Only print debug info if debugging is on. (diff)
downloadgnupg-f3f1015f6a82482dd6075343d41f4aca1e795e48.tar.gz
gnupg-f3f1015f6a82482dd6075343d41f4aca1e795e48.zip
* keydb.h, getkey.c (key_byname): Flag to enable or disable including
disabled keys. Keys specified via keyid (i.e. 0x...) are always included. * getkey.c (get_pubkey_byname, get_seckey_byname2, get_seckey_bynames), keyedit.c (keyedit_menu, menu_addrevoker): Include disabled keys in these functions. * pkclist.c (build_pk_list): Do not include disabled keys for -r or the key prompt. Do include disabled keys for the default key and --encrypt-to. * trustdb.h, trustdb.c (is_disabled): New skipfnc for skipping disabled keys. * gpgv.c (is_disabled): Stub. * keygen.c (keygen_add_key_expire): Properly handle updating a key expiration to a no-expiration value. * keyedit.c (enable_disable_key): Comment. * import.c (import_one): When in interactive mode and --verbose, don't repeat some key information twice.
Diffstat (limited to 'g10/keyedit.c')
-rw-r--r--g10/keyedit.c9
1 files changed, 6 insertions, 3 deletions
diff --git a/g10/keyedit.c b/g10/keyedit.c
index e25debf90..87830e2cc 100644
--- a/g10/keyedit.c
+++ b/g10/keyedit.c
@@ -1105,7 +1105,7 @@ keyedit_menu( const char *username, STRLIST locusr, STRLIST commands,
}
/* get the public key */
- rc = get_pubkey_byname (NULL, username, &keyblock, &kdbhd);
+ rc = get_pubkey_byname (NULL, username, &keyblock, &kdbhd, 1);
if( rc )
goto leave;
if( fix_keyblock( keyblock ) )
@@ -2478,7 +2478,7 @@ menu_addrevoker( KBNODE pub_keyblock, KBNODE sec_keyblock, int sensitive )
if(answer[0]=='\0' || answer[0]=='\004')
goto fail;
- rc=get_pubkey_byname(revoker_pk,answer,NULL,NULL);
+ rc=get_pubkey_byname(revoker_pk,answer,NULL,NULL,1);
if(rc)
{
@@ -3376,7 +3376,10 @@ menu_revkey( KBNODE pub_keyblock, KBNODE sec_keyblock )
return changed;
}
-
+/* Note that update_ownertrust is going to mark the trustdb dirty when
+ enabling or disabling a key. This is arguably sub-optimal as
+ disabled keys are still counted in the web of trust, but perhaps
+ not worth adding extra complexity to change. -ds */
static int
enable_disable_key( KBNODE keyblock, int disable )
{