aboutsummaryrefslogtreecommitdiffstats
path: root/g10/pkclist.c
diff options
context:
space:
mode:
authorDavid Shaw <[email protected]>2002-11-03 20:18:56 +0000
committerDavid Shaw <[email protected]>2002-11-03 20:18:56 +0000
commit91a8e4a6fb15994eea58ff2bab9403c5456af6a1 (patch)
treee761564473a03432673c05f4fa8824384ebcadc8 /g10/pkclist.c
parent* gpg.sgml: Document "tsign", clarify "setpref", clarify --recipient, (diff)
downloadgnupg-91a8e4a6fb15994eea58ff2bab9403c5456af6a1.tar.gz
gnupg-91a8e4a6fb15994eea58ff2bab9403c5456af6a1.zip
* options.h, g10.c (main): Add --trust-model option. Current models are
"openpgp" which is classic+trustsigs, "classic" which is classic only, and "always" which is the same as the current option --always-trust (which still works). Default is "openpgp". * trustdb.c (validate_one_keyblock): Use "openpgp" trust model to enable trust sigs. * gpgv.c (main), mainproc.c (check_sig_and_print), pkclist.c (do_we_trust, do_we_trust_pre, check_signatures_trust): Use new --trust-model option in place of --always-trust.
Diffstat (limited to 'g10/pkclist.c')
-rw-r--r--g10/pkclist.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/g10/pkclist.c b/g10/pkclist.c
index 1f71d2af5..a175049a1 100644
--- a/g10/pkclist.c
+++ b/g10/pkclist.c
@@ -475,9 +475,9 @@ do_we_trust( PKT_public_key *pk, unsigned int *trustlevel )
}
*trustlevel &= ~trustmask;
- if( opt.always_trust) {
+ if( opt.trust_model==TM_ALWAYS ) {
if( opt.verbose )
- log_info("No trust check due to --always-trust option\n");
+ log_info("No trust check due to --trust-model always option\n");
return 1;
}
@@ -570,7 +570,7 @@ do_we_trust_pre( PKT_public_key *pk, unsigned int trustlevel )
* his decision the next time he encrypts for this recipient?
*/
}
- else if( opt.always_trust && !rc ) {
+ else if( opt.trust_model==TM_ALWAYS && !rc ) {
if( !opt.quiet )
log_info(_("WARNING: Using untrusted key!\n"));
rc = 1;
@@ -591,7 +591,7 @@ check_signatures_trust( PKT_signature *sig )
unsigned int trustlevel;
int rc=0;
- if ( opt.always_trust)
+ if ( opt.trust_model==TM_ALWAYS )
{
if( !opt.quiet )
log_info(_("WARNING: Using untrusted key!\n"));