зеркало из https://github.com/mozilla/pjs.git
remove bogus verify step (the cert passed in is almost certainly a signing cert).
This commit is contained in:
Родитель
fdc3985b20
Коммит
1e98db5857
|
@ -34,7 +34,7 @@
|
|||
/*
|
||||
* CMS signerInfo methods.
|
||||
*
|
||||
* $Id: cmssiginfo.c,v 1.5 2001-01-07 07:56:35 nelsonb%netscape.com Exp $
|
||||
* $Id: cmssiginfo.c,v 1.6 2002-01-18 03:38:29 relyea%netscape.com Exp $
|
||||
*/
|
||||
|
||||
#include "cmslocal.h"
|
||||
|
@ -806,10 +806,14 @@ NSS_SMIMESignerInfo_SaveSMIMEProfile(NSSCMSSignerInfo *signerinfo)
|
|||
return SECFailure;
|
||||
}
|
||||
|
||||
/* verify this cert for encryption (has been verified for signing so far) */
|
||||
/* verify this cert for encryption (has been verified for signing so far) */ /* don't verify this cert for encryption. It may just be a signing cert.
|
||||
* that's OK, we can still save the S/MIME profile. The encryption cert
|
||||
* should have already been saved */
|
||||
#ifdef notdef
|
||||
if (CERT_VerifyCert(certdb, cert, PR_TRUE, certUsageEmailRecipient, PR_Now(), signerinfo->cmsg->pwfn_arg, NULL) != SECSuccess) {
|
||||
return SECFailure;
|
||||
}
|
||||
#endif
|
||||
|
||||
/* XXX store encryption cert permanently? */
|
||||
|
||||
|
|
Загрузка…
Ссылка в новой задаче