231 |
k->is_protected = k->ext->gloflags.is_protected; |
k->is_protected = k->ext->gloflags.is_protected; |
232 |
k->keyid = k->ctx->subkeys->keyid+8; |
k->keyid = k->ctx->subkeys->keyid+8; |
233 |
k->uid = k->ext->uids->uid; |
k->uid = k->ext->uids->uid; |
234 |
k->allocated = sec? 1 : 0; |
k->allocated = sec? 0 : 1; |
235 |
return 0; |
return 0; |
236 |
} |
} |
237 |
|
|
275 |
get_gpg_sigstat (gpgme_sigsum_t sum) |
get_gpg_sigstat (gpgme_sigsum_t sum) |
276 |
{ |
{ |
277 |
const char *gpg_sigstat[] = { |
const char *gpg_sigstat[] = { |
278 |
_("Error during verification process."), |
_("Error during verification process"), |
279 |
_("The signature is good."), |
_("The signature is good"), |
280 |
_("The signature is BAD!"), |
_("The signature is BAD!"), |
281 |
_("The signature could not be checked due to a missing key."), |
_("The signature could not be checked due to a missing key"), |
282 |
_("No valid OpenPGP signature."), |
_("No valid OpenPGP signature"), |
283 |
_("Signature Error"), |
_("Signature Error"), |
284 |
_("Good Signature (Expired Key)"), |
_("Good Signature (Expired Key)"), |
285 |
_("Good Signature (Revoked Key)"), |
_("Good Signature (Revoked Key)"), |
294 |
bool |
bool |
295 |
secret_key_available (void) |
secret_key_available (void) |
296 |
{ |
{ |
297 |
gpg_keycache_t _sec = sec; |
if (!sec || gpg_keycache_get_size (sec) == 0) |
|
if (!_sec || gpg_keycache_get_size (_sec) == 0) |
|
298 |
return false; |
return false; |
299 |
return true; |
return true; |
300 |
} |
} |