l/scute: Do not attempt to read the card certificate
parent
b507a71f74
commit
6a0f5f5a70
@ -0,0 +1,34 @@
|
||||
diff -Naur scute-38bdba0.orig/src/gpgsm.c scute-38bdba0/src/gpgsm.c
|
||||
--- scute-38bdba0.orig/src/gpgsm.c 2010-04-21 04:57:53.000000000 +0200
|
||||
+++ scute-38bdba0/src/gpgsm.c 2014-08-22 22:31:17.197783508 +0200
|
||||
@@ -122,30 +122,6 @@
|
||||
search.hook = hook;
|
||||
search.with_chain = false;
|
||||
|
||||
- /* If the key is from the card, we might get the certificate from
|
||||
- the card as well. */
|
||||
- if (no >= 0)
|
||||
- {
|
||||
- struct cert cert;
|
||||
-
|
||||
- memset (&cert, '\0', sizeof (cert));
|
||||
- err = scute_agent_get_cert (no, &cert);
|
||||
- if (! err)
|
||||
- {
|
||||
-#if 0
|
||||
- /* For now, we don't need no stinking chain. */
|
||||
-
|
||||
- /* As we only have the DER certificate from the card, we need to
|
||||
- parse that and fill out the missing info and try to get the
|
||||
- certificate chain from gpgsm. */
|
||||
- err = scute_cert_from_der (&cert);
|
||||
-#endif
|
||||
- if (! err)
|
||||
- err = search_cb (&search, &cert);
|
||||
- return err;
|
||||
- }
|
||||
- }
|
||||
-
|
||||
search.with_chain = true;
|
||||
err = scute_gpgsm_search_certs_by_grip (grip, search_cb, &search);
|
||||
return err;
|
Loading…
Reference in New Issue