diff options
author | Werner Koch <[email protected]> | 2006-09-25 18:29:20 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2006-09-25 18:29:20 +0000 |
commit | d94faf4a3d4daf6be1d732b226a4d6468dbf0f4f (patch) | |
tree | 5ac646af1bdfeb051ddd903a69f430bc18693171 /sm/keylist.c | |
parent | Preparing a new release (diff) | |
download | gnupg-d94faf4a3d4daf6be1d732b226a4d6468dbf0f4f.tar.gz gnupg-d94faf4a3d4daf6be1d732b226a4d6468dbf0f4f.zip |
New "relax" option for trustlist.txt
Diffstat (limited to 'sm/keylist.c')
-rw-r--r-- | sm/keylist.c | 8 |
1 files changed, 5 insertions, 3 deletions
diff --git a/sm/keylist.c b/sm/keylist.c index f2aac11f5..3994afedc 100644 --- a/sm/keylist.c +++ b/sm/keylist.c @@ -401,12 +401,14 @@ list_cert_colon (ctrl_t ctrl, ksba_cert_t cert, unsigned int validity, *truststring = 'i'; } - /* Is we have no truststring yet (i.e. the certificate might be + /* If we have no truststring yet (i.e. the certificate might be good) and this is a root certificate, we ask the agent whether this is a trusted root certificate. */ if (!*truststring && is_root) { - rc = gpgsm_agent_istrusted (ctrl, cert); + struct rootca_flags_s dummy_flags; + + rc = gpgsm_agent_istrusted (ctrl, cert, &dummy_flags); if (!rc) *truststring = 'u'; /* Yes, we trust this one (ultimately). */ else if (gpg_err_code (rc) == GPG_ERR_NOT_TRUSTED) @@ -680,7 +682,7 @@ list_cert_raw (ctrl_t ctrl, KEYDB_HANDLE hd, else fputs ("[?]\n", fp); - fputs (" keyUsage: ", fp); + fputs (" keyUsage:", fp); err = ksba_cert_get_key_usage (cert, &kusage); if (gpg_err_code (err) != GPG_ERR_NO_DATA) { |