aboutsummaryrefslogtreecommitdiffstats
path: root/g10/pkclist.c
diff options
context:
space:
mode:
Diffstat (limited to 'g10/pkclist.c')
-rw-r--r--g10/pkclist.c36
1 files changed, 34 insertions, 2 deletions
diff --git a/g10/pkclist.c b/g10/pkclist.c
index 310874421..fb0d3cd41 100644
--- a/g10/pkclist.c
+++ b/g10/pkclist.c
@@ -68,6 +68,33 @@ print_fpr( PKT_public_key *pk )
tty_printf("\n");
}
+static void
+fpr_info( PKT_public_key *pk )
+{
+ byte array[MAX_FINGERPRINT_LEN], *p;
+ size_t i, n;
+ FILE *fp = log_stream();
+
+ fingerprint_from_pk( pk, array, &n );
+ p = array;
+ log_info(_("Fingerprint:"));
+ if( n == 20 ) {
+ for(i=0; i < n ; i++, i++, p += 2 ) {
+ if( i == 10 )
+ putc(' ', fp);
+ fprintf(fp, " %02X%02X", *p, p[1] );
+ }
+ }
+ else {
+ for(i=0; i < n ; i++, p++ ) {
+ if( i && !(i%8) )
+ putc(' ', fp);
+ fprintf(fp, " %02X", *p );
+ }
+ }
+ putc('\n', fp );
+}
+
static void
@@ -453,7 +480,8 @@ do_we_trust_pre( PKT_public_key *pk, int trustlevel )
*/
}
else if( opt.always_trust && !rc ) {
- log_info(_("WARNING: Using untrusted key!\n"));
+ if( !opt.quiet )
+ log_info(_("WARNING: Using untrusted key!\n"));
rc = 1;
}
return rc;
@@ -475,7 +503,8 @@ check_signatures_trust( PKT_signature *sig )
if( opt.always_trust ) {
- log_info(_("WARNING: Using untrusted key!\n"));
+ if( !opt.quiet )
+ log_info(_("WARNING: Using untrusted key!\n"));
return 0;
}
@@ -523,6 +552,7 @@ check_signatures_trust( PKT_signature *sig )
case TRUST_EXPIRED:
log_info(_("Note: This key has expired!\n"));
+ fpr_info( pk );
break;
case TRUST_UNDEFINED:
@@ -533,6 +563,7 @@ check_signatures_trust( PKT_signature *sig )
log_info(_(
" There is no indication that the "
"signature belongs to the owner.\n" ));
+ fpr_info( pk );
}
else {
int quit;
@@ -560,6 +591,7 @@ check_signatures_trust( PKT_signature *sig )
log_info(_(
" It is not certain that the signature belongs to the owner.\n"
));
+ fpr_info( pk );
break;
case TRUST_FULLY: