<string>This option enables interval checking of certificate validity. You can also choose the checking interval (in hours). Note that validation is performed implicitly whenever significant files in ~/.gnupg change. This option therefore only affects external factors of certificate validity.</string>
<string>This option enables interval checking of certificate validity. You can also choose the checking interval (in hours). Note that validation is performed implicitly whenever significant files in ~/.gnupg change. This option therefore only affects external factors of certificate validity.</string>
<string>If this option is selected, S/MIME certificates are validated online using the Online Certificates Status Protocol (OCSP). Fill in the URL of the OCSP responder below.</string>
<string>Enter here the address of the server for online validation of certificates (OCSP responder). The URL is usually starting with http://.</string>
<string>By default, GnuPG uses the file ~/.gnupg/policies.txt to check if a certificate policy is allowed. If this option is selected, policies are not checked.</string>
</property>
<property name="text" >
<string>Do not check certificate policies</string>
</property>
</widget>
</item>
<item>
<widget class="QCheckBox" name="neverConsultCB" >
<property name="whatsThis" >
<string>If this option is checked, Certificate Revocation Lists are never used to validate S/MIME certificates.</string>
<string>If this option is checked while a root CA certificate is being imported, you will be asked to confirm its fingerprint and to state whether or not you consider this root certificate to be trusted. A root certificate needs to be trusted before the certificates it certified become trusted, but lightly allowing trusted root certificates into your certificate store will undermine the security of the system.</string>
</property>
<property name="text" >
<string>Allow to mark root certificates as trusted</string>
</property>
</widget>
</item>
<item>
<widget class="QCheckBox" name="fetchMissingCB" >
<property name="whatsThis" >
<string>If this option is checked, missing issuer certificates are fetched when necessary (this applies to both validation methods, CRLs and OCSP).</string>
<string>Entirely disables the use of HTTP for S/MIME.</string>
</property>
<property name="text" >
<string>Do not perform any HTTP requests</string>
</property>
</widget>
</item>
<item row="1" column="0" colspan="2" >
<widget class="QCheckBox" name="ignoreHTTPDPCB" >
<property name="whatsThis" >
<string>When looking for the location of a CRL, the to-be-tested certificate usually contains what are known as "CRL Distribution Point" (DP) entries, which are URLs describing the way to access the CRL. The first-found DP entry is used. With this option, all entries using the HTTP scheme are ignored when looking for a suitable DP.</string>
</property>
<property name="text" >
<string>Ignore HTTP CRL distribution point of certificates</string>
<string>If this option is selected, the value of the HTTP proxy shown on the right (which comes from the environment variable http_proxy) will be used for any HTTP request.</string>
<string><p>If no system proxy is set, or you need to use a different proxy for GpgSM, you can enter its location here.</p><p>It will be used for all HTTP requests relating to S/MIME.</p><p>The syntax is host:port, for instance myproxy.nowhere.com:3128.</p></string>
</property>
</widget>
</item>
<item row="4" column="0" colspan="2" >
<spacer>
<property name="orientation" >
<enum>Qt::Vertical</enum>
</property>
<property name="sizeHint" stdset="0" >
<size>
<width>320</width>
<height>16</height>
</size>
</property>
</spacer>
</item>
</layout>
</widget>
<widget class="QWidget" name="tabLDAP" >
<attribute name="title" >
<string>&LDAP Requests</string>
</attribute>
<layout class="QGridLayout" >
<item row="0" column="0" colspan="2" >
<widget class="QCheckBox" name="disableLDAPCB" >
<property name="whatsThis" >
<string>Entirely disables the use of LDAP for S/MIME.</string>
</property>
<property name="text" >
<string>Do not perform any LDAP requests</string>
</property>
</widget>
</item>
<item row="1" column="0" colspan="2" >
<widget class="QCheckBox" name="ignoreLDAPDPCB" >
<property name="whatsThis" >
<string>When looking for the location of a CRL, the to-be-tested certificate usually contains what are known as "CRL Distribution Point" (DP) entries, which are URLs describing the way to access the CRL. The first found DP entry is used. With this option, all entries using the LDAP scheme are ignored when looking for a suitable DP.</string>
</property>
<property name="text" >
<string>Ignore LDAP CRL distribution point of certificates</string>
<string>Entering an LDAP server here will make all LDAP requests go to that server first. More precisely, this setting overrides any specified host and port part in a LDAP URL and will also be used if host and port have been omitted from the URL. Other LDAP servers will be used only if the connection to the "proxy" failed.
The syntax is "HOST" or "HOST:PORT". If PORT is omitted, port 389 (standard LDAP port) is used.</string>