diff options
author | Werner Koch <[email protected]> | 2004-09-30 13:24:33 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2004-09-30 13:24:33 +0000 |
commit | f67c66e56f15b83ee8539ef2de563750c6908d9f (patch) | |
tree | f939c062d272bce44c95ee24a46027978f5f4650 /sm | |
parent | * gpg.texi: New. (diff) | |
download | gnupg-f67c66e56f15b83ee8539ef2de563750c6908d9f.tar.gz gnupg-f67c66e56f15b83ee8539ef2de563750c6908d9f.zip |
* de.po: Updated.
* POTFILES.in: Add more files.
* app-openpgp.c (do_sign): Add the error string to the verify
failed messages.
* keylist.c (list_cert_colon): Make sure that the expired flag has
a higher precedence than the invalid flag.
Diffstat (limited to '')
-rw-r--r-- | sm/ChangeLog | 5 | ||||
-rw-r--r-- | sm/keylist.c | 7 |
2 files changed, 10 insertions, 2 deletions
diff --git a/sm/ChangeLog b/sm/ChangeLog index 2391deb18..28a397182 100644 --- a/sm/ChangeLog +++ b/sm/ChangeLog @@ -1,3 +1,8 @@ +2004-09-30 Werner Koch <[email protected]> + + * keylist.c (list_cert_colon): Make sure that the expired flag has + a higher precedence than the invalid flag. + 2004-09-29 Werner Koch <[email protected]> * import.c (parse_p12): Write an error status line for bad diff --git a/sm/keylist.c b/sm/keylist.c index 0c8ebd33e..e9985f3ec 100644 --- a/sm/keylist.c +++ b/sm/keylist.c @@ -333,6 +333,9 @@ list_cert_colon (ctrl_t ctrl, ksba_cert_t cert, unsigned int validity, fputs (have_secret? "crs:":"crt:", fp); + + /* Note: We can't use multiple flags, like "ei", because the + validation check does only return one error. */ truststring[0] = 0; truststring[1] = 0; if ((validity & VALIDITY_REVOKED) @@ -340,8 +343,6 @@ list_cert_colon (ctrl_t ctrl, ksba_cert_t cert, unsigned int validity, *truststring = 'r'; else if (gpg_err_code (valerr) == GPG_ERR_CERT_EXPIRED) *truststring = 'e'; - else if (valerr) - *truststring = 'i'; else { /* Lets also check whether the certificate under question @@ -354,6 +355,8 @@ list_cert_colon (ctrl_t ctrl, ksba_cert_t cert, unsigned int validity, && !ksba_cert_get_validity (cert, 1, not_after) && *not_after && strcmp (current_time, not_after) > 0 ) *truststring = 'e'; + else if (valerr) + *truststring = 'i'; } /* Is we have no truststring yet (i.e. the certificate might be |