/* Show information about one signature. This fucntion is called with
the context CTX of a sucessful verification operation and the
enumerator IDX which should start at 0 and incremete for each
/* Show information about one signature. This fucntion is called with
the context CTX of a sucessful verification operation and the
enumerator IDX which should start at 0 and incremete for each
Return values are: 0 for normal procession, 1 for a bad signature,
2 for a signature with a warning or -1 for no more signature. */
Return values are: 0 for normal procession, 1 for a bad signature,
2 for a signature with a warning or -1 for no more signature. */
XXX - charset handling: We assume that it is safe to do
character set decoding first, dash decoding second here, while
we do it the other way around in the main handler.
XXX - charset handling: We assume that it is safe to do
character set decoding first, dash decoding second here, while
we do it the other way around in the main handler.
(Note that we aren't worse than Outlook & Cie in this, and also
note that we can successfully handle anything produced by any
existing versions of mutt.) */
(Note that we aren't worse than Outlook & Cie in this, and also
note that we can successfully handle anything produced by any
existing versions of mutt.) */
* if a multipart/signed is the _only_ sub-part of a
* multipart/encrypted, cache signature verification
* status.
* if a multipart/signed is the _only_ sub-part of a
* multipart/encrypted, cache signature verification
* status.
* if a multipart/signed is the _only_ sub-part of a
* multipart/encrypted, cache signature verification
* status.
* if a multipart/signed is the _only_ sub-part of a
* multipart/encrypted, cache signature verification
* status.
* There was precisely one strong match on a valid ID, there
* were no valid keys with weak matches, and we aren't
* interested in seeing invalid keys.
* There was precisely one strong match on a valid ID, there
* were no valid keys with weak matches, and we aren't
* interested in seeing invalid keys.
* Else: Ask the user.
*/
k = crypt_select_key (matches, a, NULL, app, forced_valid);
* Else: Ask the user.
*/
k = crypt_select_key (matches, a, NULL, app, forced_valid);