summaryrefslogtreecommitdiffstats
path: root/g10/g10.c
diff options
context:
space:
mode:
authorDavid Shaw <dshaw@jabberwocky.com>2004-02-23 05:00:51 +0100
committerDavid Shaw <dshaw@jabberwocky.com>2004-02-23 05:00:51 +0100
commit643665c963f9ebdd96b15598ec1b165a1cc22445 (patch)
treede48b61e18be5da868a0ecf487fc406ac8b968d0 /g10/g10.c
parent* gpgkeys_ldap.c (delete_one_attr): New function to replace attributes (diff)
downloadgnupg2-643665c963f9ebdd96b15598ec1b165a1cc22445.tar.xz
gnupg2-643665c963f9ebdd96b15598ec1b165a1cc22445.zip
* options.h, g10.c (main), trustdb.c (mark_usable_uid_certs): Add
--min-cert-check-level option to specify minimum cert check level. Defaults to 2 (so 0x11 sigs are ignored). 0x10 sigs cannot be ignored.
Diffstat (limited to 'g10/g10.c')
-rw-r--r--g10/g10.c14
1 files changed, 10 insertions, 4 deletions
diff --git a/g10/g10.c b/g10/g10.c
index c15cea379..455b39558 100644
--- a/g10/g10.c
+++ b/g10/g10.c
@@ -153,6 +153,7 @@ enum cmd_and_opt_values
oAnswerYes,
oAnswerNo,
oDefCertCheckLevel,
+ oMinCertCheckLevel,
oKeyring,
oPrimaryKeyring,
oSecretKeyring,
@@ -567,6 +568,7 @@ static ARGPARSE_OPTS opts[] = {
{ oCompressKeys, "compress-keys",0, "@"},
{ oCompressSigs, "compress-sigs",0, "@"},
{ oDefCertCheckLevel, "default-cert-check-level", 1, "@"},
+ { oMinCertCheckLevel, "min-cert-check-level", 1, "@"},
{ oAlwaysTrust, "always-trust", 0, "@"},
{ oTrustModel, "trust-model", 2, "@"},
{ oForceOwnertrust, "force-ownertrust", 2, "@"},
@@ -1437,7 +1439,8 @@ main( int argc, char **argv )
opt.verify_options=
VERIFY_SHOW_POLICY_URLS|VERIFY_SHOW_NOTATIONS|VERIFY_SHOW_KEYSERVER_URLS;
opt.trust_model=TM_AUTO;
- opt.mangle_dos_filenames = 0;
+ opt.mangle_dos_filenames=0;
+ opt.min_cert_check_level=2;
set_screen_dimensions();
#if defined (_WIN32)
set_homedir ( read_w32_registry_string( NULL,
@@ -1779,6 +1782,7 @@ main( int argc, char **argv )
case oNoArmor: opt.no_armor=1; opt.armor=0; break;
case oNoDefKeyring: default_keyring = 0; break;
case oDefCertCheckLevel: opt.def_cert_check_level=pargs.r.ret_int; break;
+ case oMinCertCheckLevel: opt.min_cert_check_level=pargs.r.ret_int; break;
case oNoGreeting: nogreeting = 1; break;
case oNoVerbose: g10_opt_verbose = 0;
opt.verbose = 0; opt.list_sigs=0; break;
@@ -2471,11 +2475,13 @@ main( int argc, char **argv )
log_error(_("selected digest algorithm is invalid\n"));
}
if( opt.completes_needed < 1 )
- log_error(_("completes-needed must be greater than 0\n"));
+ log_error(_("completes-needed must be greater than 0\n"));
if( opt.marginals_needed < 2 )
- log_error(_("marginals-needed must be greater than 1\n"));
+ log_error(_("marginals-needed must be greater than 1\n"));
if( opt.max_cert_depth < 1 || opt.max_cert_depth > 255 )
- log_error(_("max-cert-depth must be in range 1 to 255\n"));
+ log_error(_("max-cert-depth must be in the range from 1 to 255\n"));
+ if( opt.min_cert_check_level < 1 || opt.min_cert_check_level > 3 )
+ log_error(_("min-cert-check-level must be in the range from 1 to 3\n"));
switch( opt.s2k_mode ) {
case 0:
log_info(_("NOTE: simple S2K mode (0) is strongly discouraged\n"));