aboutsummaryrefslogtreecommitdiffstats
path: root/g10/keyedit.c
diff options
context:
space:
mode:
authorDavid Shaw <[email protected]>2005-08-27 03:09:40 +0000
committerDavid Shaw <[email protected]>2005-08-27 03:09:40 +0000
commitf74282bee03f26af0887dfcc806c89ad0bc142d3 (patch)
treefe83661e8e82fcf199880c26fa26d7dc8215b204 /g10/keyedit.c
parent* keyedit.c (ask_revoke_sig): Add a revsig --with-colons mode. (diff)
downloadgnupg-f74282bee03f26af0887dfcc806c89ad0bc142d3.tar.gz
gnupg-f74282bee03f26af0887dfcc806c89ad0bc142d3.zip
* misc.c (openpgp_pk_algo_usage): Default to allowing CERT for signing
algorithms. * keyedit.c (sign_uids): Don't request a signing key to make a certification. * keygen.c (do_add_key_flags): Force the certify flag on for all primary keys, as the spec requires primary keys must be able to certify (if nothing else, which key is going to issue the user ID signature?) (print_key_flags): Show certify flag. (ask_key_flags, ask_algo): Don't allow setting the C flag for subkeys. * keyid.c (usagestr_from_pk), getkey.c (parse_key_usage): Distinguish between a sign/certify key and a certify-only key.
Diffstat (limited to 'g10/keyedit.c')
-rw-r--r--g10/keyedit.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/g10/keyedit.c b/g10/keyedit.c
index 8712c4bcf..52247233f 100644
--- a/g10/keyedit.c
+++ b/g10/keyedit.c
@@ -529,8 +529,8 @@ sign_uids( KBNODE keyblock, STRLIST locusr, int *ret_modified,
* be one which is capable of signing keys. I can't see a reason
* why to sign keys using a subkey. Implementation of USAGE_CERT
* is just a hack in getkey.c and does not mean that a subkey
- * marked as certification capable will be used */
- rc=build_sk_list( locusr, &sk_list, 0, PUBKEY_USAGE_SIG|PUBKEY_USAGE_CERT);
+ * marked as certification capable will be used. */
+ rc=build_sk_list( locusr, &sk_list, 0, PUBKEY_USAGE_CERT);
if( rc )
goto leave;