aboutsummaryrefslogtreecommitdiffstats
path: root/sm
diff options
context:
space:
mode:
authorWerner Koch <[email protected]>2004-09-30 13:24:33 +0000
committerWerner Koch <[email protected]>2004-09-30 13:24:33 +0000
commitf67c66e56f15b83ee8539ef2de563750c6908d9f (patch)
treef939c062d272bce44c95ee24a46027978f5f4650 /sm
parent* gpg.texi: New. (diff)
downloadgnupg-f67c66e56f15b83ee8539ef2de563750c6908d9f.tar.gz
gnupg-f67c66e56f15b83ee8539ef2de563750c6908d9f.zip
* de.po: Updated.
* POTFILES.in: Add more files. * app-openpgp.c (do_sign): Add the error string to the verify failed messages. * keylist.c (list_cert_colon): Make sure that the expired flag has a higher precedence than the invalid flag.
Diffstat (limited to '')
-rw-r--r--sm/ChangeLog5
-rw-r--r--sm/keylist.c7
2 files changed, 10 insertions, 2 deletions
diff --git a/sm/ChangeLog b/sm/ChangeLog
index 2391deb18..28a397182 100644
--- a/sm/ChangeLog
+++ b/sm/ChangeLog
@@ -1,3 +1,8 @@
+2004-09-30 Werner Koch <[email protected]>
+
+ * keylist.c (list_cert_colon): Make sure that the expired flag has
+ a higher precedence than the invalid flag.
+
2004-09-29 Werner Koch <[email protected]>
* import.c (parse_p12): Write an error status line for bad
diff --git a/sm/keylist.c b/sm/keylist.c
index 0c8ebd33e..e9985f3ec 100644
--- a/sm/keylist.c
+++ b/sm/keylist.c
@@ -333,6 +333,9 @@ list_cert_colon (ctrl_t ctrl, ksba_cert_t cert, unsigned int validity,
fputs (have_secret? "crs:":"crt:", fp);
+
+ /* Note: We can't use multiple flags, like "ei", because the
+ validation check does only return one error. */
truststring[0] = 0;
truststring[1] = 0;
if ((validity & VALIDITY_REVOKED)
@@ -340,8 +343,6 @@ list_cert_colon (ctrl_t ctrl, ksba_cert_t cert, unsigned int validity,
*truststring = 'r';
else if (gpg_err_code (valerr) == GPG_ERR_CERT_EXPIRED)
*truststring = 'e';
- else if (valerr)
- *truststring = 'i';
else
{
/* Lets also check whether the certificate under question
@@ -354,6 +355,8 @@ list_cert_colon (ctrl_t ctrl, ksba_cert_t cert, unsigned int validity,
&& !ksba_cert_get_validity (cert, 1, not_after)
&& *not_after && strcmp (current_time, not_after) > 0 )
*truststring = 'e';
+ else if (valerr)
+ *truststring = 'i';
}
/* Is we have no truststring yet (i.e. the certificate might be