diff options
author | David Shaw <[email protected]> | 2002-11-03 20:18:56 +0000 |
---|---|---|
committer | David Shaw <[email protected]> | 2002-11-03 20:18:56 +0000 |
commit | 91a8e4a6fb15994eea58ff2bab9403c5456af6a1 (patch) | |
tree | e761564473a03432673c05f4fa8824384ebcadc8 /g10/pkclist.c | |
parent | * gpg.sgml: Document "tsign", clarify "setpref", clarify --recipient, (diff) | |
download | gnupg-91a8e4a6fb15994eea58ff2bab9403c5456af6a1.tar.gz gnupg-91a8e4a6fb15994eea58ff2bab9403c5456af6a1.zip |
* options.h, g10.c (main): Add --trust-model option. Current models are
"openpgp" which is classic+trustsigs, "classic" which is classic only, and
"always" which is the same as the current option --always-trust (which
still works). Default is "openpgp".
* trustdb.c (validate_one_keyblock): Use "openpgp" trust model to enable
trust sigs.
* gpgv.c (main), mainproc.c (check_sig_and_print), pkclist.c (do_we_trust,
do_we_trust_pre, check_signatures_trust): Use new --trust-model option in
place of --always-trust.
Diffstat (limited to 'g10/pkclist.c')
-rw-r--r-- | g10/pkclist.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/g10/pkclist.c b/g10/pkclist.c index 1f71d2af5..a175049a1 100644 --- a/g10/pkclist.c +++ b/g10/pkclist.c @@ -475,9 +475,9 @@ do_we_trust( PKT_public_key *pk, unsigned int *trustlevel ) } *trustlevel &= ~trustmask; - if( opt.always_trust) { + if( opt.trust_model==TM_ALWAYS ) { if( opt.verbose ) - log_info("No trust check due to --always-trust option\n"); + log_info("No trust check due to --trust-model always option\n"); return 1; } @@ -570,7 +570,7 @@ do_we_trust_pre( PKT_public_key *pk, unsigned int trustlevel ) * his decision the next time he encrypts for this recipient? */ } - else if( opt.always_trust && !rc ) { + else if( opt.trust_model==TM_ALWAYS && !rc ) { if( !opt.quiet ) log_info(_("WARNING: Using untrusted key!\n")); rc = 1; @@ -591,7 +591,7 @@ check_signatures_trust( PKT_signature *sig ) unsigned int trustlevel; int rc=0; - if ( opt.always_trust) + if ( opt.trust_model==TM_ALWAYS ) { if( !opt.quiet ) log_info(_("WARNING: Using untrusted key!\n")); |