mirror of
git://git.gnupg.org/gnupg.git
synced 2025-04-17 15:44:34 +02:00
Made it compile.
This commit is contained in:
parent
ca7ed726a7
commit
47fc9f88a2
@ -40,7 +40,7 @@ gpgsm_SOURCES = \
|
|||||||
certdump.c \
|
certdump.c \
|
||||||
certcheck.c \
|
certcheck.c \
|
||||||
certchain.c \
|
certchain.c \
|
||||||
keylist.ccvs ta \
|
keylist.c \
|
||||||
verify.c \
|
verify.c \
|
||||||
sign.c \
|
sign.c \
|
||||||
encrypt.c \
|
encrypt.c \
|
||||||
|
@ -530,7 +530,7 @@ gpgsm_validate_chain (CTRL ctrl, KsbaCert cert, time_t *r_exptime)
|
|||||||
if (gpgsm_check_cert_sig (subject_cert, subject_cert) )
|
if (gpgsm_check_cert_sig (subject_cert, subject_cert) )
|
||||||
{
|
{
|
||||||
log_error ("selfsigned certificate has a BAD signatures\n");
|
log_error ("selfsigned certificate has a BAD signatures\n");
|
||||||
rc = depth? GNUPG_Bad_Certificate_Path : GNUPG_Bad_Certificate;
|
rc = depth? GNUPG_Bad_Certificate_Chain : GNUPG_Bad_Certificate;
|
||||||
goto leave;
|
goto leave;
|
||||||
}
|
}
|
||||||
rc = allowed_ca (subject_cert, NULL);
|
rc = allowed_ca (subject_cert, NULL);
|
||||||
@ -577,7 +577,7 @@ gpgsm_validate_chain (CTRL ctrl, KsbaCert cert, time_t *r_exptime)
|
|||||||
if (depth > maxdepth)
|
if (depth > maxdepth)
|
||||||
{
|
{
|
||||||
log_error (_("certificate chain too long\n"));
|
log_error (_("certificate chain too long\n"));
|
||||||
rc = GNUPG_Bad_Certificate_Path;
|
rc = GNUPG_Bad_Certificate_Chain;
|
||||||
goto leave;
|
goto leave;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -616,7 +616,7 @@ gpgsm_validate_chain (CTRL ctrl, KsbaCert cert, time_t *r_exptime)
|
|||||||
if (gpgsm_check_cert_sig (issuer_cert, subject_cert) )
|
if (gpgsm_check_cert_sig (issuer_cert, subject_cert) )
|
||||||
{
|
{
|
||||||
log_error ("certificate has a BAD signatures\n");
|
log_error ("certificate has a BAD signatures\n");
|
||||||
rc = GNUPG_Bad_Certificate_Path;
|
rc = GNUPG_Bad_Certificate_Chain;
|
||||||
goto leave;
|
goto leave;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -637,7 +637,7 @@ gpgsm_validate_chain (CTRL ctrl, KsbaCert cert, time_t *r_exptime)
|
|||||||
rc = gpgsm_cert_use_cert_p (issuer_cert);
|
rc = gpgsm_cert_use_cert_p (issuer_cert);
|
||||||
if (rc)
|
if (rc)
|
||||||
{
|
{
|
||||||
gpgsm_status2 (ctrl, STATUS_ERROR, "certpath.issuer.keyusage",
|
gpgsm_status2 (ctrl, STATUS_ERROR, "certcert.issuer.keyusage",
|
||||||
gnupg_error_token (rc), NULL);
|
gnupg_error_token (rc), NULL);
|
||||||
rc = 0;
|
rc = 0;
|
||||||
}
|
}
|
||||||
|
@ -443,7 +443,7 @@ gpgsm_verify (CTRL ctrl, int in_fd, int data_fd, FILE *out_fp)
|
|||||||
if (rc) /* of validate_chain */
|
if (rc) /* of validate_chain */
|
||||||
{
|
{
|
||||||
log_error ("invalid certification chain: %s\n", gnupg_strerror (rc));
|
log_error ("invalid certification chain: %s\n", gnupg_strerror (rc));
|
||||||
if (rc == GNUPG_Bad_Certificate_Path
|
if (rc == GNUPG_Bad_Certificate_Chain
|
||||||
|| rc == GNUPG_Bad_Certificate
|
|| rc == GNUPG_Bad_Certificate
|
||||||
|| rc == GNUPG_Bad_CA_Certificate
|
|| rc == GNUPG_Bad_CA_Certificate
|
||||||
|| rc == GNUPG_Certificate_Revoked)
|
|| rc == GNUPG_Certificate_Revoked)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user