* src/sgpgme.c
change fetching of signature key's trust
+2003-10-24 [paul] 0.9.6claws50
+
+ * src/sgpgme.c
+ change fetching of signature key's trust
+
2003-10-24 [paul] 0.9.6claws49
* po/sk.po
2003-10-24 [paul] 0.9.6claws49
* po/sk.po
MICRO_VERSION=6
INTERFACE_AGE=0
BINARY_AGE=0
MICRO_VERSION=6
INTERFACE_AGE=0
BINARY_AGE=0
if test $EXTRA_VERSION -eq 0; then
VERSION=${MAJOR_VERSION}.${MINOR_VERSION}.${MICRO_VERSION}claws
else
if test $EXTRA_VERSION -eq 0; then
VERSION=${MAJOR_VERSION}.${MINOR_VERSION}.${MICRO_VERSION}claws
else
gchar *sgpgme_sigstat_info_short(GpgmeCtx ctx, GpgmeSigStat status)
{
gchar *sgpgme_sigstat_info_short(GpgmeCtx ctx, GpgmeSigStat status)
{
switch (status) {
case GPGME_SIG_STAT_GOOD:
{
switch (status) {
case GPGME_SIG_STAT_GOOD:
{
- unsigned long validity = 0, val, i;
+ GpgmeKey key;
+ unsigned long validity = 0;
- if (gpgme_get_sig_key(ctx, 0, &key) != GPGME_No_Error)
- return g_strdup(_("Error"));
-
- i = 0;
- while ((val = gpgme_key_get_ulong_attr(key, GPGME_ATTR_VALIDITY, NULL, i++)) > 0)
- if (val > validity)
- validity = val;
+ if (gpgme_get_sig_key(ctx, 0, &key) != GPGME_No_Error)
+ return g_strdup(_("Error"));
+
+ validity = gpgme_get_sig_ulong_attr(ctx, 0,
+ GPGME_ATTR_VALIDITY, 0);
return g_strdup_printf(_("Valid signature by %s (Trust: %s)"),
gpgme_key_get_string_attr(key, GPGME_ATTR_USERID, NULL, 0),
return g_strdup_printf(_("Valid signature by %s (Trust: %s)"),
gpgme_key_get_string_attr(key, GPGME_ATTR_USERID, NULL, 0),