mirror of
git://git.gnupg.org/gnupg.git
synced 2024-11-10 21:38:50 +01:00
7fa1d3cc82
* sm/call-dirmngr.c (gpgsm_dirmngr_isvalid): Do not use option --force-default-responder. * sm/certchain.c (is_cert_still_valid): Rename arg for clarity. (gpgsm_validate_chain): Always switch to chain model. -- The trustlist.txt may indicate that a root CA issues certificates which shall be validated using the chain model. This is for example the case for qualified signatures. Before this change we did this only if the default shell model indicated that a certificate has expired. This optimization is technically okay but has one problem: The chain model requires the use of OCSP but we switch to this only when running the chain model validation. To catch revoked certificates using OCSP we need to always switch to the chain model unless OCSP has been enabled anyway. Note that the old --force-default-responder option is not anymore used. Test cases are certificates issued by # CN=TeleSec qualified Root CA 1 # O=Deutsche Telekom AG # C=DE # 2.5.4.97=USt-IdNr. DE 123475223 90:C6:13:6C:7D:EF:EF:E9:7C:C7:64:F9:D2:67:8E:AD:03:E5:52:96 \ S cm qual relax A sample revoked certificate is -----BEGIN CERTIFICATE----- MIIDTzCCAvSgAwIBAgIQIXfquQjq32B03CdaflIbiDAMBggqhkjOPQQDAgUAMHEx CzAJBgNVBAYTAkRFMRwwGgYDVQQKDBNEZXV0c2NoZSBUZWxla29tIEFHMSMwIQYD VQQDDBpUZWxlU2VjIFBLUyBlSURBUyBRRVMgQ0EgMTEfMB0GA1UEYQwWVVN0LUlk TnIuIERFIDEyMzQ3NTIyMzAeFw0yMDA2MjIxMDQ1NDJaFw0yMzA2MjUyMzU5MDBa MDAxCzAJBgNVBAYTAkRFMRUwEwYDVQQDDAxLb2NoLCBXZXJuZXIxCjAIBgNVBAUT ATMwWjAUBgcqhkjOPQIBBgkrJAMDAggBAQcDQgAEbkEXUuXTriWOwqQhjlh11oCc 6Z8lQdQDz3zY/OEh8fMJS7AKBNo8zkpPKDJ2olPph18b1goEbLiqHQsPRPahDaOC AaowggGmMB8GA1UdIwQYMBaAFP/0iep1rMXT0iQ0+WUqBvLM6bqBMB0GA1UdDgQW BBQEI3xsIUDnoOx+gLYbG63v5/f9kjAOBgNVHQ8BAf8EBAMCBkAwDAYDVR0TAQH/ BAIwADAgBgNVHREEGTAXgRV3ZXJuZXIua29jaEBnbnVwZy5jb20wPQYDVR0gBDYw NDAyBgcEAIvsQAECMCcwJQYIKwYBBQUHAgEWGWh0dHA6Ly9wa3MudGVsZXNlYy5k ZS9jcHMwgYQGCCsGAQUFBwEBBHgwdjBLBggrBgEFBQcwAoY/aHR0cDovL3RxcmNh MS5wa2kudGVsZXNlYy5kZS9jcnQvVGVsZVNlY19QS1NfZUlEQVNfUUVTX0NBXzEu Y3J0MCcGCCsGAQUFBzABhhtodHRwOi8vcGtzLnRlbGVzZWMuZGUvb2NzcHIwXgYI KwYBBQUHAQMEUjBQMAgGBgQAjkYBATAIBgYEAI5GAQQwOgYGBACORgEFMDAwLhYo aHR0cHM6Ly93d3cudGVsZXNlYy5kZS9zaWduYXR1cmthcnRlL2FnYhMCZW4wDAYI KoZIzj0EAwIFAANHADBEAiAqgB8gyZyj05CRdHD5KJcpG68DzQECYnYP6ZPasUYK AQIgI1GtRMJWvFTIKsZpgY+ty0pRb5/K09fbmvaSAKFpv/I= -----END CERTIFICATE----- |
||
---|---|---|
.. | ||
examples | ||
ldap | ||
a-decade-of-gnupg.txt | ||
announce-2.0.txt | ||
announce-2.1.txt | ||
ChangeLog-2011 | ||
com-certs.pem | ||
contrib.texi | ||
DCO | ||
debugging.texi | ||
DETAILS | ||
dirmngr.texi | ||
FAQ | ||
faq.org | ||
fdl.texi | ||
glossary.texi | ||
gnupg7.texi | ||
gnupg-badge-openpgp.eps | ||
gnupg-badge-openpgp.jpg | ||
gnupg-badge-openpgp.pdf | ||
gnupg-card-architecture.fig | ||
gnupg-logo-tr.png | ||
gnupg-logo.eps | ||
gnupg-logo.pdf | ||
gnupg-logo.png | ||
gnupg-module-overview.svg | ||
gnupg.texi | ||
gpg-agent.texi | ||
gpg-card.texi | ||
gpg.texi | ||
gpgsm.texi | ||
gpgv.texi | ||
gpl.texi | ||
HACKING | ||
help.be.txt | ||
help.ca.txt | ||
help.cs.txt | ||
help.da.txt | ||
help.de.txt | ||
help.el.txt | ||
help.eo.txt | ||
help.es.txt | ||
help.et.txt | ||
help.fi.txt | ||
help.fr.txt | ||
help.gl.txt | ||
help.hu.txt | ||
help.id.txt | ||
help.it.txt | ||
help.ja.txt | ||
help.nb.txt | ||
help.pl.txt | ||
help.pt_BR.txt | ||
help.pt.txt | ||
help.ro.txt | ||
help.ru.txt | ||
help.sk.txt | ||
help.sv.txt | ||
help.tr.txt | ||
help.txt | ||
help.zh_CN.txt | ||
help.zh_TW.txt | ||
howto-create-a-server-cert.texi | ||
howtos.texi | ||
instguide.texi | ||
KEYSERVER | ||
Makefile.am | ||
mkdefsinc.c | ||
mksamplekeys | ||
Notes | ||
OpenPGP | ||
opt-homedir.texi | ||
samplekeys.asc | ||
scdaemon.texi | ||
see-also-note.texi | ||
specify-user-id.texi | ||
sysnotes.texi | ||
texi.css | ||
tools.texi | ||
TRANSLATE | ||
trust-values.texi | ||
vuln-announce-2007-multiple-message.txt | ||
vuln-announce-2010-kbx-realloc.txt | ||
vuln-announce-cve-2006-6235.txt | ||
whats-new-in-2.1.txt | ||
wks.texi | ||
yat2m.c |