SMimeConfiguration 0 0 360 434 If this option is selected, S/MIME certificates are validated using Certificate Revocation Lists (CRLs). Validate certificates using CRLs true If this option is selected, S/MIME certificates are validated online using the Online Certificates Status Protocol (OCSP). Fill in the URL of the OCSP responder below. Validate certificates online (OCSP) Online Certificate Validation OCSP responder URL: false OCSP responder signature: false Enter here the address of the server for online validation of certificates (OCSP responder). The URL is usually starting with http://. Ignore service URL of certificates By default GnuPG uses the file ~/.gnupg/policies.txt to check if a certificate policy is allowed. If this option is selected, policies are not checked. Do not check certificate policies If this option is checked, Certificate Revocation Lists are never used to validate S/MIME certificates. Never consult a CRL If this option is checked, missing issuer certificates are fetched when necessary (this applies to both validation methods, CRLs and OCSP) Fetch missing issuer certificates 0 HTTP Requests Entirely disables the use of HTTP for S/MIME. Do not perform any HTTP requests When looking for the location of a CRL, the to-be-tested certificate usually contains what are known as "CRL Distribution Point" (DP) entries, which are URLs describing the way to access the URL. The first found DP entry is used. With this option all entries using the HTTP scheme are ignored when looking for a suitable DP. Ignore HTTP CRL distribution point of certificates Qt::Vertical 20 40 If this option is selected, the value of the HTTP proxy shown on the right (which comes from the environment variable http_proxy) will be used for any HTTP request. Use system HTTP proxy: no proxy false Use this proxy for HTTP requests: Enter here the location of your HTTP Proxy, which will be used for all HTTP requests relating to S/MIME. The syntax is host:port, for instance myproxy.nowhere.com:3128. LDAP Requests Entirely disables the use of LDAP for S/MIME. Do not perform any LDAP requests When looking for the location of a CRL, the to-be-tested certificate usually contains what are known as "CRL Distribution Point" (DP) entries, which are URLs describing the way to access the URL. The first found DP entry is used. With this option all entries using the LDAP scheme are ignored when looking for a suitable DP. Ignore LDAP CRL distribution point of certificates Primary host for LDAP requests: false Entering a LDAP server here will make all LDAP requests go to that server first. More precisely, this setting overrides any specified host and port part in a LDAP URL and will also be used if host and port have been omitted from the URL. Other LDAP servers will be used only if the connection to the "proxy" failed. The syntax is "HOST" or "HOST:PORT". If PORT is omitted, port 389 (standard LDAP port) is used. Qt::Vertical 20 40 KLineEdit QLineEdit
klineedit.h
KTabWidget QTabWidget
ktabwidget.h
1
Kleo::KeyRequester
ui/keyrequester.h
CRLRB OCSPRB OCSPResponderURL ignoreServiceURLCB doNotCheckCertPolicyCB neverConsultCB fetchMissingCB requestsTabs disableHTTPCB ignoreHTTPDPCB honorHTTPProxyRB useCustomHTTPProxyRB customHTTPProxy disableLDAPCB ignoreLDAPDPCB customLDAPProxy ui/keyrequester.h CRLRB toggled(bool) OCSPGroupBox setDisabled(bool) 20 20 20 20 OCSPRB toggled(bool) OCSPGroupBox setEnabled(bool) 20 20 20 20 useCustomHTTPProxyRB toggled(bool) customHTTPProxy setEnabled(bool) 20 20 20 20 honorHTTPProxyRB toggled(bool) customHTTPProxy setDisabled(bool) 20 20 20 20