1204 |
} |
} |
1205 |
|
|
1206 |
|
|
1207 |
|
char* get_pka_status (gpgme_signature_t sig); |
1208 |
|
|
1209 |
|
|
1210 |
/* Show the human readable verify result from @sigres. */ |
/* Show the human readable verify result from @sigres. */ |
1211 |
static void |
static void |
1212 |
show_verify_result (gpgme_verify_result_t sigres) |
show_verify_result (gpgme_verify_result_t sigres) |
1214 |
gpgme_key_t key=NULL; |
gpgme_key_t key=NULL; |
1215 |
gpgme_signature_t sig=sigres->signatures; |
gpgme_signature_t sig=sigres->signatures; |
1216 |
const char *s, *keyid; |
const char *s, *keyid; |
1217 |
char *uid; |
char *uid, *pka_info; |
1218 |
char buf[384]; |
char buf[384]; |
1219 |
int sigok = 0; |
int sigok = 0; |
1220 |
|
|
1224 |
keyid = sig->fpr; |
keyid = sig->fpr; |
1225 |
if (!keyid) |
if (!keyid) |
1226 |
return; |
return; |
1227 |
|
pka_info = get_pka_status (sig); |
1228 |
keyid = strlen (sig->fpr) == 40? sig->fpr+32 : sig->fpr + 24; |
keyid = strlen (sig->fpr) == 40? sig->fpr+32 : sig->fpr + 24; |
1229 |
get_pubkey (sig->fpr, &key); |
get_pubkey (sig->fpr, &key); |
1230 |
|
|
1234 |
uid = strdup (_("user ID not found")); |
uid = strdup (_("user ID not found")); |
1235 |
|
|
1236 |
_snprintf (buf, sizeof (buf)-1, _("Signature made %s using %s key ID %s\n" |
_snprintf (buf, sizeof (buf)-1, _("Signature made %s using %s key ID %s\n" |
1237 |
"%s from \"%s\""), |
"%s from \"%s\"\n%s"), |
1238 |
strtimestamp (sig->timestamp), |
strtimestamp (sig->timestamp), |
1239 |
get_key_pubalgo (sig->pubkey_algo), |
get_key_pubalgo (sig->pubkey_algo), |
1240 |
keyid, s, uid); |
keyid, s, uid, pka_info? pka_info : ""); |
1241 |
msg_box (NULL, buf, _("Decrypt Verify"), sigok? MB_OK: MB_ICONWARNING|MB_OK); |
msg_box (NULL, buf, _("Decrypt Verify"), sigok? MB_OK: MB_ICONWARNING|MB_OK); |
1242 |
|
free_if_alloc (pka_info); |
1243 |
safe_free (uid); |
safe_free (uid); |
1244 |
} |
} |
1245 |
|
|