Hi Jafar,

> I did write a script that does that but I thought it is very inefficient 
> since you have to sweep through CAs/CRLs with pki --print to figure out 
> the correct chain in order to use them with pki --verify.

You can just pass it all the CA certs/CRLs you (or rather the daemon)
trust.  Unless you have e.g. configs with CA cert constraints there is
not really a need to pass the exact chain to figure out whether a
certificate is valid and trusted by the daemon.

> Thanks for 
> letting me know abot pki-verify-dirs. Sounds like what I'm looking for. 
> I wish I knew it exists before wasting time on scripting :-).

It didn't, I quickly put that together this morning :-)

> Is that branch going to be merged any time soon?

Probably not with the upcoming release, but maybe the next one.

Regards,
Tobias

Reply via email to