aboutsummaryrefslogtreecommitdiffstats
path: root/g10/sig-check.c
diff options
context:
space:
mode:
authorWerner Koch <[email protected]>2017-07-27 14:22:36 +0000
committerWerner Koch <[email protected]>2017-07-27 14:22:36 +0000
commit6502bb0d2af5784918ebb74242fff6f0a72844bf (patch)
tree25458befbf68f758917cb08e6ff738765370b005 /g10/sig-check.c
parentgpg,sm: Allow encryption (with warning) to any key in de-vs mode. (diff)
downloadgnupg-6502bb0d2af5784918ebb74242fff6f0a72844bf.tar.gz
gnupg-6502bb0d2af5784918ebb74242fff6f0a72844bf.zip
gpg: Tweak compliance checking for verification
* common/compliance.c (gnupg_pk_is_allowed): Rework to always allow verification. * g10/mainproc.c (check_sig_and_print): Print a con-compliant warning. * g10/sig-check.c (check_signature2): Use log_error instead of log_info. -- We should be able to verify all signatures. So we only print a warning. That is the same beheavour as for untrusted keys etc. GnuPG-bug-id: 3311 Signed-off-by: Werner Koch <[email protected]>
Diffstat (limited to 'g10/sig-check.c')
-rw-r--r--g10/sig-check.c9
1 files changed, 5 insertions, 4 deletions
diff --git a/g10/sig-check.c b/g10/sig-check.c
index 912317998..2a3acc40b 100644
--- a/g10/sig-check.c
+++ b/g10/sig-check.c
@@ -162,10 +162,10 @@ check_signature2 (ctrl_t ctrl,
NULL))
{
/* Compliance failure. */
- log_info (_("key %s not suitable for signature verification"
- " while in %s mode\n"),
- keystr_from_pk (pk),
- gnupg_compliance_option_string (opt.compliance));
+ log_error (_("key %s is not suitable for signature verification"
+ " in %s mode\n"),
+ keystr_from_pk (pk),
+ gnupg_compliance_option_string (opt.compliance));
rc = gpg_error (GPG_ERR_PUBKEY_ALGO);
}
else if(!pk->flags.valid)
@@ -207,6 +207,7 @@ check_signature2 (ctrl_t ctrl,
rc = gpg_error (GPG_ERR_GENERAL);
}
}
+
}
if( !rc && sig->sig_class < 2 && is_status_enabled() ) {