mirror of
git://git.gnupg.org/gnupg.git
synced 2025-07-03 22:56:33 +02:00
sm: Consider certificates w/o CRL DP as valid.
* sm/certchain.c (is_cert_still_valid): Shortcut if tehre is no DP. * common/audit.c (proc_type_verify): Print "n/a" if a cert has no distribution point. * sm/gpgsm.h (opt): Add field enable_issuer_based_crl_check. * sm/gpgsm.c (oEnableIssuerBasedCRLCheck): New. (opts): Add option --enable-issuer-based-crl-check. (main): Set option. -- If the issuer does not provide a DP and the user wants such an issuer, we expect that a certificate does not need revocation checks. The new option --enable-issuer-based-crl-check can be used to revert to the old behaviour which requires that a suitable LDAP server has been configured to lookup a CRL by issuer. Signed-off-by: Werner Koch <wk@gnupg.org> (cherry picked from master)
This commit is contained in:
parent
bc7e56d9dc
commit
1424c12e4c
5 changed files with 34 additions and 0 deletions
|
@ -124,6 +124,7 @@ struct
|
|||
int no_crl_check; /* Don't do a CRL check */
|
||||
int no_trusted_cert_crl_check; /* Don't run a CRL check for trusted certs. */
|
||||
int force_crl_refresh; /* Force refreshing the CRL. */
|
||||
int enable_issuer_based_crl_check; /* Backward compatibility hack. */
|
||||
int enable_ocsp; /* Default to use OCSP checks. */
|
||||
|
||||
char *policy_file; /* full pathname of policy file */
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue