diff options
author | NIIBE Yutaka <[email protected]> | 2022-02-18 02:11:12 +0000 |
---|---|---|
committer | NIIBE Yutaka <[email protected]> | 2022-02-18 02:11:12 +0000 |
commit | 05fdaa1737523fad72b6ffb9e7a90d5344ff64a5 (patch) | |
tree | f6b37102eb790ce992b74b2037805fdc5e0eb361 /sm/keylist.c | |
parent | po: Fix gender of pronoun in German translation (diff) | |
download | gnupg-05fdaa1737523fad72b6ffb9e7a90d5344ff64a5.tar.gz gnupg-05fdaa1737523fad72b6ffb9e7a90d5344ff64a5.zip |
sm: Fix use of value NONE in gnupg_isotime_t type.
* common/gettime.h (GNUPG_ISOTIME_NONE): New.
* sm/call-dirmngr.c (gpgsm_dirmngr_isvalid): Use it.
* sm/certlist.c (gpgsm_add_to_certlist): Likewise.
* sm/import.c (check_and_store): Likewise.
* sm/keylist.c (list_cert_colon, list_cert_raw): Likewise.
(list_cert_std): Likewise.
* sm/sign.c (gpgsm_sign): Likewise.
--
Signed-off-by: NIIBE Yutaka <[email protected]>
Diffstat (limited to 'sm/keylist.c')
-rw-r--r-- | sm/keylist.c | 9 |
1 files changed, 6 insertions, 3 deletions
diff --git a/sm/keylist.c b/sm/keylist.c index 8907628f8..404eca176 100644 --- a/sm/keylist.c +++ b/sm/keylist.c @@ -455,7 +455,8 @@ list_cert_colon (ctrl_t ctrl, ksba_cert_t cert, unsigned int validity, char *kludge_uid; if (ctrl->with_validation) - valerr = gpgsm_validate_chain (ctrl, cert, "", NULL, 1, NULL, 0, NULL); + valerr = gpgsm_validate_chain (ctrl, cert, + GNUPG_ISOTIME_NONE, NULL, 1, NULL, 0, NULL); else valerr = 0; @@ -1180,7 +1181,8 @@ list_cert_raw (ctrl_t ctrl, KEYDB_HANDLE hd, if (with_validation) { - err = gpgsm_validate_chain (ctrl, cert, "", NULL, 1, fp, 0, NULL); + err = gpgsm_validate_chain (ctrl, cert, + GNUPG_ISOTIME_NONE, NULL, 1, fp, 0, NULL); if (!err) es_fprintf (fp, " [certificate is good]\n"); else @@ -1429,7 +1431,8 @@ list_cert_std (ctrl_t ctrl, ksba_cert_t cert, estream_t fp, int have_secret, size_t buflen; char buffer[1]; - err = gpgsm_validate_chain (ctrl, cert, "", NULL, 1, fp, 0, NULL); + err = gpgsm_validate_chain (ctrl, cert, + GNUPG_ISOTIME_NONE, NULL, 1, fp, 0, NULL); tmperr = ksba_cert_get_user_data (cert, "is_qualified", &buffer, sizeof (buffer), &buflen); if (!tmperr && buflen) |