mirror of
git://git.gnupg.org/gnupg.git
synced 2024-12-22 10:19:57 +01:00
sm: Fix use of value NONE in gnupg_isotime_t type.
* common/gettime.h (GNUPG_ISOTIME_NONE): New. * sm/call-dirmngr.c (gpgsm_dirmngr_isvalid): Use it. * sm/certlist.c (gpgsm_add_to_certlist): Likewise. * sm/import.c (check_and_store): Likewise. * sm/keylist.c (list_cert_colon, list_cert_raw): Likewise. (list_cert_std): Likewise. * sm/sign.c (gpgsm_sign): Likewise. -- Signed-off-by: NIIBE Yutaka <gniibe@fsij.org> (cherry picked from commit 05fdaa1737523fad72b6ffb9e7a90d5344ff64a5)
This commit is contained in:
parent
3dc39add6a
commit
7d8564cf88
@ -38,6 +38,11 @@
|
||||
the KSBA type ksba_isotime_t. */
|
||||
typedef char gnupg_isotime_t[16];
|
||||
|
||||
/* Constant string of 16-byte, which is compatible to the type
|
||||
gnupg_iso_time_t. */
|
||||
#define GNUPG_ISOTIME_NONE \
|
||||
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||
|
||||
time_t gnupg_get_time (void);
|
||||
struct tm *gnupg_gmtime (const time_t *timep, struct tm *result);
|
||||
void gnupg_get_isotime (gnupg_isotime_t timebuf);
|
||||
|
@ -605,7 +605,8 @@ gpgsm_dirmngr_isvalid (ctrl_t ctrl,
|
||||
{
|
||||
/* Note the no_dirmngr flag: This avoids checking
|
||||
this certificate over and over again. */
|
||||
rc = gpgsm_validate_chain (ctrl, rspcert, "", NULL, 0, NULL,
|
||||
rc = gpgsm_validate_chain (ctrl, rspcert, GNUPG_ISOTIME_NONE,
|
||||
NULL, 0, NULL,
|
||||
VALIDATE_FLAG_NO_DIRMNGR, NULL);
|
||||
if (rc)
|
||||
{
|
||||
|
@ -468,7 +468,7 @@ gpgsm_add_to_certlist (ctrl_t ctrl, const char *name, int secret,
|
||||
}
|
||||
}
|
||||
if (!rc)
|
||||
rc = gpgsm_validate_chain (ctrl, cert, "", NULL,
|
||||
rc = gpgsm_validate_chain (ctrl, cert, GNUPG_ISOTIME_NONE, NULL,
|
||||
0, NULL, 0, NULL);
|
||||
if (!rc)
|
||||
{
|
||||
|
@ -192,7 +192,8 @@ check_and_store (ctrl_t ctrl, struct stats_s *stats,
|
||||
*/
|
||||
rc = gpgsm_basic_cert_check (ctrl, cert);
|
||||
if (!rc && ctrl->with_validation)
|
||||
rc = gpgsm_validate_chain (ctrl, cert, "", NULL, 0, NULL, 0, NULL);
|
||||
rc = gpgsm_validate_chain (ctrl, cert,
|
||||
GNUPG_ISOTIME_NONE, NULL, 0, NULL, 0, NULL);
|
||||
if (!rc || (!ctrl->with_validation
|
||||
&& (gpg_err_code (rc) == GPG_ERR_MISSING_CERT
|
||||
|| gpg_err_code (rc) == GPG_ERR_MISSING_ISSUER_CERT)))
|
||||
|
@ -415,7 +415,8 @@ list_cert_colon (ctrl_t ctrl, ksba_cert_t cert, unsigned int validity,
|
||||
char *kludge_uid;
|
||||
|
||||
if (ctrl->with_validation)
|
||||
valerr = gpgsm_validate_chain (ctrl, cert, "", NULL, 1, NULL, 0, NULL);
|
||||
valerr = gpgsm_validate_chain (ctrl, cert,
|
||||
GNUPG_ISOTIME_NONE, NULL, 1, NULL, 0, NULL);
|
||||
else
|
||||
valerr = 0;
|
||||
|
||||
@ -1107,7 +1108,8 @@ list_cert_raw (ctrl_t ctrl, KEYDB_HANDLE hd,
|
||||
|
||||
if (with_validation)
|
||||
{
|
||||
err = gpgsm_validate_chain (ctrl, cert, "", NULL, 1, fp, 0, NULL);
|
||||
err = gpgsm_validate_chain (ctrl, cert,
|
||||
GNUPG_ISOTIME_NONE, NULL, 1, fp, 0, NULL);
|
||||
if (!err)
|
||||
es_fprintf (fp, " [certificate is good]\n");
|
||||
else
|
||||
@ -1354,7 +1356,8 @@ list_cert_std (ctrl_t ctrl, ksba_cert_t cert, estream_t fp, int have_secret,
|
||||
size_t buflen;
|
||||
char buffer[1];
|
||||
|
||||
err = gpgsm_validate_chain (ctrl, cert, "", NULL, 1, fp, 0, NULL);
|
||||
err = gpgsm_validate_chain (ctrl, cert,
|
||||
GNUPG_ISOTIME_NONE, NULL, 1, fp, 0, NULL);
|
||||
tmperr = ksba_cert_get_user_data (cert, "is_qualified",
|
||||
&buffer, sizeof (buffer), &buflen);
|
||||
if (!tmperr && buflen)
|
||||
|
@ -410,7 +410,8 @@ gpgsm_sign (ctrl_t ctrl, certlist_t signerlist,
|
||||
check that the signer's certificate is usable and valid. */
|
||||
rc = gpgsm_cert_use_sign_p (cert, 0);
|
||||
if (!rc)
|
||||
rc = gpgsm_validate_chain (ctrl, cert, "", NULL, 0, NULL, 0, NULL);
|
||||
rc = gpgsm_validate_chain (ctrl, cert,
|
||||
GNUPG_ISOTIME_NONE, NULL, 0, NULL, 0, NULL);
|
||||
if (rc)
|
||||
{
|
||||
char *tmpfpr;
|
||||
|
Loading…
x
Reference in New Issue
Block a user