From 460c52653ab0dcca6f19a4f492ed2c5e4e963ab0 Mon Sep 17 00:00:00 2001 From: toma Date: Wed, 25 Nov 2009 17:56:58 +0000 Subject: Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features. BUG:215923 git-svn-id: svn://anonsvn.kde.org/home/kde/branches/trinity/kdepim@1054174 283d02a7-25f6-0310-bc7c-ecb5cbfe19da --- kmail/smimeconfiguration.ui | 413 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 413 insertions(+) create mode 100644 kmail/smimeconfiguration.ui (limited to 'kmail/smimeconfiguration.ui') diff --git a/kmail/smimeconfiguration.ui b/kmail/smimeconfiguration.ui new file mode 100644 index 00000000..c1f2ca40 --- /dev/null +++ b/kmail/smimeconfiguration.ui @@ -0,0 +1,413 @@ + +SMimeConfiguration + + + SMimeConfiguration + + + + 0 + 0 + 557 + 586 + + + + + unnamed + + + + CRLRB + + + Validate certificates using CRLs + + + true + + + If this option is selected, S/MIME certificates are validated using Certificate Revocation Lists (CRLs). + + + + + OCSPRB + + + Validate certificates online (OCSP) + + + If this option is selected, S/MIME certificates are validated online using the Online Certificates Status Protocol (OCSP). Fill in the URL of the OCSP responder below. + + + + + OCSPGroupBox + + + Online Certificate Validation + + + + unnamed + + + + layout4 + + + + unnamed + + + + textLabel1 + + + OCSP responder URL: + + + + + OCSPResponderURL + + + Enter here the address of the server for online validation of certificates (OCSP responder). The URL is usually starting with http://. + + + + + + + layout5 + + + + unnamed + + + + textLabel2 + + + OCSP responder signature: + + + + + OCSPResponderSignature + + + + + spacer7 + + + Horizontal + + + Expanding + + + + 150 + 20 + + + + + + + + ignoreServiceURLCB + + + Ignore service URL of certificates + + + + + + + doNotCheckCertPolicyCB + + + Do not check certificate policies + + + By default GnuPG uses the file ~/.gnupg/policies.txt to check if a certificate policy is allowed. If this option is selected, policies are not checked. + + + + + neverConsultCB + + + Never consult a CRL + + + If this option is checked, Certificate Revocation Lists are never used to validate S/MIME certificates. + + + + + fetchMissingCB + + + Fetch missing issuer certificates + + + If this option is checked, missing issuer certificates are fetched when necessary (this applies to both validation methods, CRLs and OCSP) + + + + + HTTPGroupBox + + + HTTP Requests + + + + unnamed + + + + disableHTTPCB + + + Do not perform any HTTP requests + + + Entirely disables the use of HTTP for S/MIME. + + + + + frameHTTP + + + NoFrame + + + Plain + + + + unnamed + + + 0 + + + + layout5 + + + + unnamed + + + + systemHTTPProxy + + + no proxy + + + + + useCustomHTTPProxyRB + + + Use this proxy for HTTP requests: + + + + + honorHTTPProxyRB + + + Use system HTTP proxy: + + + If this option is selected, the value of the HTTP proxy shown on the right (which comes from the environment variable http_proxy) will be used for any HTTP request. + + + + + customHTTPProxy + + + Enter here the location of your HTTP Proxy, which will be used for all HTTP requests relating to S/MIME. The syntax is host:port, for instance myproxy.nowhere.com:3128. + + + + + + + ignoreHTTPDPCB + + + Ignore HTTP CRL distribution point of certificates + + + When looking for the location of a CRL, the to-be-tested certificate usually contains what are known as "CRL Distribution Point" (DP) entries, which are URLs describing the way to access the URL. The first found DP entry is used. With this option all entries using the HTTP scheme are ignored when looking for a suitable DP. + + + + + + + + + LDAPGroupBox + + + LDAP Requests + + + + unnamed + + + + disableLDAPCB + + + Do not perform any LDAP requests + + + Entirely disables the use of LDAP for S/MIME. + + + + + frameLDAP + + + NoFrame + + + Plain + + + + unnamed + + + 0 + + + + ignoreLDAPDPCB + + + Ignore LDAP CRL distribution point of certificates + + + When looking for the location of a CRL, the to-be-tested certificate usually contains what are known as "CRL Distribution Point" (DP) entries, which are URLs describing the way to access the URL. The first found DP entry is used. With this option all entries using the LDAP scheme are ignored when looking for a suitable DP. + + + + + layout5 + + + + unnamed + + + + customLDAPLabel + + + Primary host for LDAP requests: + + + + + customLDAPProxy + + + Entering a LDAP server here will make all LDAP requests go to that server first. More precisely, this setting overrides any specified host and port part in a LDAP URL and will also be used if host and port have been omitted from the URL. Other LDAP servers will be used only if the connection to the "proxy" failed. +The syntax is "HOST" or "HOST:PORT". If PORT is omitted, port 389 (standard LDAP port) is used. + + + + + + + + + + + spacer23 + + + Vertical + + + Expanding + + + + 20 + 73 + + + + + + + + Kleo::KeyRequester +
../certmanager/lib/ui/keyrequester.h
+ + -1 + -1 + + 0 + + 5 + 5 + 0 + 0 + +
+
+ + + CRLRB + toggled(bool) + OCSPGroupBox + setDisabled(bool) + + + OCSPRB + toggled(bool) + OCSPGroupBox + setEnabled(bool) + + + useCustomHTTPProxyRB + toggled(bool) + customHTTPProxy + setEnabled(bool) + + + honorHTTPProxyRB + toggled(bool) + customHTTPProxy + setDisabled(bool) + + + disableLDAPCB + toggled(bool) + frameLDAP + setDisabled(bool) + + + +
-- cgit v1.2.3