summaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorTimothy Pearson <kb9vqf@pearsoncomputing.net>2015-09-03 15:09:38 -0500
committerTimothy Pearson <kb9vqf@pearsoncomputing.net>2015-09-03 15:09:38 -0500
commitc14f2f4613cc75a6dd5ec0d1eebff9c855e40c46 (patch)
tree08a1f605eaf8f6ce1a88d39f003e42bcba055691 /src
parent3ca881c5997d3df0b8ad347e514f9cec65962bbe (diff)
downloadkcmldap-c14f2f4613cc75a6dd5ec0d1eebff9c855e40c46.tar.gz
kcmldap-c14f2f4613cc75a6dd5ec0d1eebff9c855e40c46.zip
Add CRL support
Diffstat (limited to 'src')
-rw-r--r--src/ldapbonding.cpp8
1 files changed, 8 insertions, 0 deletions
diff --git a/src/ldapbonding.cpp b/src/ldapbonding.cpp
index 85e1061..bf20050 100644
--- a/src/ldapbonding.cpp
+++ b/src/ldapbonding.cpp
@@ -276,6 +276,14 @@ void LDAPConfig::save() {
if (ldap_mgr->getTDECertificate("publicRootCertificate", KERBEROS_PKI_PUBLICDIR + m_realms[m_clientRealmConfig.defaultRealm].admin_server + ".ldap.crt", &errorstring) != 0) {
KMessageBox::sorry(this, i18n("<qt><b>Unable to obtain root certificate for realm %1!</b><p>Details: %2</qt>").arg(m_clientRealmConfig.defaultRealm.upper()).arg(errorstring), i18n("Unable to Obtain Certificate"));
}
+ if (ldap_mgr->installCACertificateInHostCAStore(&errorstring) != 0) {
+ KMessageBox::sorry(this, i18n("<qt><b>Unable to install root CA certificate for realm %1!</b><p>Details: %2</qt>").arg(m_clientRealmConfig.defaultRealm.upper()).arg(errorstring), i18n("Unable to Install Root CA"));
+ }
+
+ // Get and install the CA root CRL from LDAP
+ if (ldap_mgr->retrieveAndInstallCaCrl(ldap_mgr, &errorstring) != 0) {
+ KMessageBox::sorry(this, i18n("<qt><b>Unable to obtain root CRL for realm %1!</b><p>Details: %2</qt>").arg(m_clientRealmConfig.defaultRealm.upper()).arg(errorstring), i18n("Unable to Obtain CRL"));
+ }
delete ldap_mgr;
delete credentials;