729{
732
733
735 {
737 {
738 mutt_error(
_(
"This key can't be used: expired/disabled/revoked"));
740 }
741 }
742
744 {
745 const char *warn_s = NULL;
746 char buf2[1024];
747
749 {
750 warn_s =
_(
"ID is expired/disabled/revoked. Do you really want to use the key?");
751 }
752 else
753 {
754 warn_s = "??";
756 {
757 case GPGME_VALIDITY_NEVER:
758 warn_s =
_(
"ID is not valid. Do you really want to use the key?");
759 break;
760 case GPGME_VALIDITY_MARGINAL:
761 warn_s =
_(
"ID is only marginally valid. Do you really want to use the key?");
762 break;
763 case GPGME_VALIDITY_FULL:
764 case GPGME_VALIDITY_ULTIMATE:
765 break;
766 case GPGME_VALIDITY_UNKNOWN:
767 case GPGME_VALIDITY_UNDEFINED:
768 warn_s =
_(
"ID has undefined validity. Do you really want to use the key?");
769 break;
770 }
771 }
772
773 snprintf(buf2, sizeof(buf2), "%s", warn_s);
774
776 {
779 }
780 }
781
785}
struct CryptKeyInfo * crypt_copy_key(struct CryptKeyInfo *key)
Return a copy of KEY.
int crypt_id_is_valid(struct CryptKeyInfo *key)
Is key ID valid.
bool crypt_id_is_strong(struct CryptKeyInfo *key)
Is the key strong.
@ FR_ERROR
Valid function - error occurred.
@ FR_NO_ACTION
Valid function - no action performed.
bool OptPgpCheckTrust
(pseudo) used by dlg_pgp()
static bool crypt_key_is_valid(struct CryptKeyInfo *k)
Is the key valid.
void mutt_clear_error(void)
Clear the message line (bottom line of screen)
@ MUTT_NO
User answered 'No', or assume 'No'.
@ MUTT_YES
User answered 'Yes', or assume 'Yes'.
enum QuadOption query_yesorno(const char *prompt, enum QuadOption def)
Ask the user a Yes/No question.
gpgme_validity_t validity
uid validity (cached for convenience)
KeyFlags flags
global and per uid flags (for convenience)
struct CryptKeyInfo * key
Selected Key.
struct CryptKeyInfo ** key_table
Array of Keys.
struct Menu * menu
Gpgme Menu.