1210 |
/* Show the human readable verify result from @sigres. */ |
/* Show the human readable verify result from @sigres. */ |
1211 |
static void |
static void |
1212 |
show_verify_result (gpgme_verify_result_t sigres) |
show_verify_result (gpgme_verify_result_t sigres) |
1213 |
{ |
{ |
|
gpgme_key_t key=NULL; |
|
1214 |
gpgme_signature_t sig=sigres->signatures; |
gpgme_signature_t sig=sigres->signatures; |
1215 |
const char *s, *keyid; |
winpt_key_s key; |
1216 |
char *uid, *pka_info; |
const char *s, *keyid, *uid; |
1217 |
|
char *pka_info; |
1218 |
char buf[384]; |
char buf[384]; |
1219 |
int sigok = 0; |
int sigok = 0; |
1220 |
|
|
1225 |
if (!keyid) |
if (!keyid) |
1226 |
return; |
return; |
1227 |
pka_info = get_pka_status (sig); |
pka_info = get_pka_status (sig); |
1228 |
keyid = strlen (sig->fpr) == 40? sig->fpr+32 : sig->fpr + 24; |
keyid = get_keyid_from_fpr (sig->fpr); |
1229 |
get_pubkey (sig->fpr, &key); |
memset (&key, 0, sizeof (key)); |
1230 |
|
if (!winpt_get_pubkey (sig->fpr, &key)) |
1231 |
if (key) |
uid = key.ext->uids->uid; |
|
uid = utf8_to_native (key->uids->uid); |
|
1232 |
else |
else |
1233 |
uid = strdup (_("user ID not found")); |
uid = _("user ID not found"); |
|
|
|
1234 |
_snprintf (buf, sizeof (buf)-1, _("Signature made %s using %s key ID %s\n" |
_snprintf (buf, sizeof (buf)-1, _("Signature made %s using %s key ID %s\n" |
1235 |
"%s from \"%s\"\n%s"), |
"%s from \"%s\"\n%s"), |
1236 |
strtimestamp (sig->timestamp), |
strtimestamp (sig->timestamp), |
1238 |
keyid, s, uid, pka_info? pka_info : ""); |
keyid, s, uid, pka_info? pka_info : ""); |
1239 |
msg_box (NULL, buf, _("Decrypt Verify"), sigok? MB_OK: MB_ICONWARNING|MB_OK); |
msg_box (NULL, buf, _("Decrypt Verify"), sigok? MB_OK: MB_ICONWARNING|MB_OK); |
1240 |
free_if_alloc (pka_info); |
free_if_alloc (pka_info); |
|
safe_free (uid); |
|
1241 |
} |
} |
1242 |
|
|
1243 |
|
|