diff options
| author | David Shaw <[email protected]> | 2005-08-27 03:09:40 +0000 |
|---|---|---|
| committer | David Shaw <[email protected]> | 2005-08-27 03:09:40 +0000 |
| commit | f74282bee03f26af0887dfcc806c89ad0bc142d3 (patch) | |
| tree | fe83661e8e82fcf199880c26fa26d7dc8215b204 /g10/keyedit.c | |
| parent | * keyedit.c (ask_revoke_sig): Add a revsig --with-colons mode. (diff) | |
| download | gnupg-f74282bee03f26af0887dfcc806c89ad0bc142d3.tar.gz gnupg-f74282bee03f26af0887dfcc806c89ad0bc142d3.zip | |
* misc.c (openpgp_pk_algo_usage): Default to allowing CERT for signing
algorithms.
* keyedit.c (sign_uids): Don't request a signing key to make a
certification.
* keygen.c (do_add_key_flags): Force the certify flag on for all
primary keys, as the spec requires primary keys must be able to
certify (if nothing else, which key is going to issue the user ID
signature?) (print_key_flags): Show certify flag. (ask_key_flags,
ask_algo): Don't allow setting the C flag for subkeys.
* keyid.c (usagestr_from_pk), getkey.c (parse_key_usage): Distinguish
between a sign/certify key and a certify-only key.
Diffstat (limited to 'g10/keyedit.c')
| -rw-r--r-- | g10/keyedit.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/g10/keyedit.c b/g10/keyedit.c index 8712c4bcf..52247233f 100644 --- a/g10/keyedit.c +++ b/g10/keyedit.c @@ -529,8 +529,8 @@ sign_uids( KBNODE keyblock, STRLIST locusr, int *ret_modified, * be one which is capable of signing keys. I can't see a reason * why to sign keys using a subkey. Implementation of USAGE_CERT * is just a hack in getkey.c and does not mean that a subkey - * marked as certification capable will be used */ - rc=build_sk_list( locusr, &sk_list, 0, PUBKEY_USAGE_SIG|PUBKEY_USAGE_CERT); + * marked as certification capable will be used. */ + rc=build_sk_list( locusr, &sk_list, 0, PUBKEY_USAGE_CERT); if( rc ) goto leave; |
