diff options
author | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2019-01-14 10:56:27 +0100 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2019-01-14 10:56:29 +0100 |
commit | c2644e563a2de57133970ed46f8dcf081615b6e4 (patch) | |
tree | b109e3124cca406dcee2ffbba36c434322256f8d | |
parent | d5d62a7d83d558c0ab5b1a4b633655b852ff3c55 (diff) | |
download | gnutls-c2644e563a2de57133970ed46f8dcf081615b6e4.tar.gz |
certtool: data encipherment is disabled by defaulttmp-fix-certtools
For the TLS protocol this option is not necessary, and if enabled
by mistake (as default) and no other option is set, then the
generated key will be unusable. Thus we disable it, to generate
working keys by default.
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
-rw-r--r-- | src/certtool-cfg.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/certtool-cfg.c b/src/certtool-cfg.c index 8d5f63417d..05764dec21 100644 --- a/src/certtool-cfg.c +++ b/src/certtool-cfg.c @@ -2583,7 +2583,7 @@ int get_data_encipherment_status(void) if (batch) { return cfg.data_encipherment; } else { - return read_yesno("Will the certificate be used for data encryption? (Y/n): ", 1); + return read_yesno("Will the certificate be used for data encryption? (y/N): ", 0); } } |