2 * Sylpheed -- a GTK+ based, lightweight, and fast e-mail client
3 * Copyright (C) 1999-2003 Hiroyuki Yamamoto & the Sylpheed-Claws team
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, write to the Free Software
17 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
31 #include "prefs_common.h"
33 #include "alertpanel.h"
34 #include "passphrase.h"
37 static void idle_function_for_gpgme(void)
39 while (gtk_events_pending())
43 static void sgpgme_disable_all(void)
45 /* FIXME: set a flag, so that we don't bother the user with failed
49 GpgmeSigStat sgpgme_verify_signature(GpgmeCtx ctx, GpgmeData sig,
54 if (gpgme_op_verify(ctx, sig, plain, &status) != GPGME_No_Error)
55 return GPGME_SIG_STAT_ERROR;
60 SignatureStatus sgpgme_sigstat_gpgme_to_privacy(GpgmeSigStat status)
63 case GPGME_SIG_STAT_GOOD:
65 case GPGME_SIG_STAT_GOOD_EXP:
66 case GPGME_SIG_STAT_GOOD_EXPKEY:
67 case GPGME_SIG_STAT_DIFF:
68 return SIGNATURE_WARN;
69 case GPGME_SIG_STAT_BAD:
70 return SIGNATURE_INVALID;
71 case GPGME_SIG_STAT_NOKEY:
72 case GPGME_SIG_STAT_NOSIG:
73 case GPGME_SIG_STAT_ERROR:
74 return SIGNATURE_CHECK_FAILED;
75 case GPGME_SIG_STAT_NONE:
76 return SIGNATURE_UNCHECKED;
78 return SIGNATURE_CHECK_FAILED;
81 static const gchar *get_validity_str(unsigned long validity)
84 case GPGME_VALIDITY_UNKNOWN:
86 case GPGME_VALIDITY_UNDEFINED:
87 return _("Undefined");
88 case GPGME_VALIDITY_NEVER:
90 case GPGME_VALIDITY_MARGINAL:
92 case GPGME_VALIDITY_FULL:
94 case GPGME_VALIDITY_ULTIMATE:
101 gchar *sgpgme_sigstat_info_short(GpgmeCtx ctx, GpgmeSigStat status)
104 case GPGME_SIG_STAT_GOOD:
107 unsigned long validity = 0;
109 if (gpgme_get_sig_key(ctx, 0, &key) != GPGME_No_Error)
110 return g_strdup(_("Error"));
112 validity = gpgme_get_sig_ulong_attr(ctx, 0,
113 GPGME_ATTR_VALIDITY, 0);
115 return g_strdup_printf(_("Valid signature by %s (Trust: %s)"),
116 gpgme_key_get_string_attr(key, GPGME_ATTR_NAME, NULL, 0),
117 get_validity_str(validity));
119 case GPGME_SIG_STAT_GOOD_EXP:
120 return g_strdup(_("The signature of this part has expired"));
121 case GPGME_SIG_STAT_GOOD_EXPKEY:
122 return g_strdup(_("The key that was used to sign this part has expired"));
123 case GPGME_SIG_STAT_DIFF:
124 return g_strdup(_("Not all signatures are valid"));
125 case GPGME_SIG_STAT_BAD:
126 return g_strdup(_("This signature is invalid"));
127 case GPGME_SIG_STAT_NOKEY:
128 return g_strdup(_("You have no key to verify this signature"));
129 case GPGME_SIG_STAT_NOSIG:
130 return g_strdup(_("Bo signature found"));
131 case GPGME_SIG_STAT_ERROR:
132 return g_strdup(_("An error occured"));
133 case GPGME_SIG_STAT_NONE:
134 return g_strdup(_("The signature of this part has not been checked"));
136 return g_strdup(_("Error"));
139 gchar *sgpgme_sigstat_info_full(GpgmeCtx ctx, GpgmeSigStat status)
141 return g_strdup(_("Todo"));
146 if (gpgme_engine_check_version(GPGME_PROTOCOL_OpenPGP) !=
147 GPGME_No_Error) { /* Also does some gpgme init */
148 sgpgme_disable_all();
149 debug_print("gpgme_engine_version:\n%s\n",
150 gpgme_get_engine_info());
152 if (prefs_common.gpg_warning) {
155 val = alertpanel_message_with_disable
157 _("GnuPG is not installed properly, or needs to be upgraded.\n"
158 "OpenPGP support disabled."));
159 if (val & G_ALERTDISABLE)
160 prefs_common.gpg_warning = FALSE;
164 gpgme_register_idle(idle_function_for_gpgme);
169 gpgmegtk_free_passphrase();
172 #endif /* USE_GPGME */