msva-perl (0.9~pre) upstream;
- * Add "email" context (checks for 's' capability) (closes MS #2688)
+ * Add "e-mail" context (checks for signing capability instead of
+ authentication) (closes MS #2688)
* Add "openpgp4fpr" pkc type for providing OpenPGP v4 fingerprint
* Add --version option to msva-query-agent
};
# check context string
- if ($data->{context} =~ /^(https|ssh|smtp|ike|postgresql|imaps|imap|submission|email)$/) {
+ if ($data->{context} =~ /^(https|ssh|smtp|ike|postgresql|imaps|imap|submission|e-mail)$/) {
$data->{context} = $1;
} else {
msvalog('error', "invalid context: %s\n", $data->{context});
}
my $prefix = $data->{context}.'://';
- if ($data->{context} eq 'email' ||
+ if ($data->{context} eq 'e-mail' ||
(defined $data->{peer}->{type} &&
$data->{peer}->{type} eq 'client' &&
# ike and smtp clients are effectively other servers, so we'll
if ($primarymatch) {
my $iscapable = 0;
msvalog('verbose', "key 0x%s matches...\n",$subkey->hex_id);
- if ($data->{context} eq 'email') {
+ if ($data->{context} eq 'e-mail') {
if ($subkey->usage_flags =~ /s/) {
$iscapable = 1;
msvalog('verbose', "...and is signing-capable...\n");
# X should now validate as X
"${srcdir}"/test-msva msva-perl "${srcdir}"/test-msva msva-query-agent https x.example.net "${ctype}" < "${WORKDIR}/pkc/x.${ctype}"
"${srcdir}"/test-msva msva-perl "${srcdir}"/test-msva msva-query-agent https 'a <a@example.net>' "${ctype}" client < "${WORKDIR}/pkc/a.${ctype}"
- # also test "email" context
- "${srcdir}"/test-msva msva-perl "${srcdir}"/test-msva msva-query-agent email 'a <a@example.net>' "${ctype}" < "${WORKDIR}/pkc/a.${ctype}"
+ # also test "e-mail" context
+ "${srcdir}"/test-msva msva-perl "${srcdir}"/test-msva msva-query-agent e-mail 'a <a@example.net>' "${ctype}" < "${WORKDIR}/pkc/a.${ctype}"
# but X should not validate as Y or Z:
for name in x y z; do