Handle PGP_VERIFICATION_RESULT_NOT_ALIVE. sync
authorNeal H. Walfield <neal@pep.foundation>
Thu, 05 Dec 2019 09:31:42 +0100
branchsync
changeset 423601980e34ecdf
parent 4235 1daffdbc64aa
child 4238 b3235fe2e5b8
child 4242 813d4d700713
Handle PGP_VERIFICATION_RESULT_NOT_ALIVE.
src/pgp_sequoia.c
     1.1 --- a/src/pgp_sequoia.c	Thu Dec 05 08:47:16 2019 +0100
     1.2 +++ b/src/pgp_sequoia.c	Thu Dec 05 09:31:42 2019 +0100
     1.3 @@ -957,6 +957,7 @@
     1.4      int good_checksums;
     1.5      int good_but_expired;
     1.6      int good_but_revoked;
     1.7 +    int not_alive;
     1.8      int missing_keys;
     1.9      int bad_checksums;
    1.10  
    1.11 @@ -1335,6 +1336,16 @@
    1.12                      }
    1.13                      break;
    1.14  
    1.15 +                case PGP_VERIFICATION_RESULT_NOT_ALIVE:
    1.16 +                    pgp_verification_result_not_alive
    1.17 +                        (result, &sig, NULL, NULL, NULL, NULL);
    1.18 +                    keyid = pgp_signature_issuer (sig);
    1.19 +                    keyid_str = pgp_keyid_to_string (keyid);
    1.20 +                    T("Signature from from %s is not alive", keyid_str);
    1.21 +
    1.22 +                    cookie->not_alive ++;
    1.23 +                    break;
    1.24 +
    1.25                  case PGP_VERIFICATION_RESULT_MISSING_KEY:
    1.26                      pgp_verification_result_missing_key (result, &sig);
    1.27                      keyid = pgp_signature_issuer (sig);
    1.28 @@ -1413,7 +1424,7 @@
    1.29      char** filename_ptr)
    1.30  {
    1.31      PEP_STATUS status = PEP_STATUS_OK;
    1.32 -    struct decrypt_cookie cookie = { session, 0, NULL, NULL, 0, 0, 0, 0, 0, 0, NULL };
    1.33 +    struct decrypt_cookie cookie = { session, 0, NULL, NULL, 0, 0, 0, 0, 0, 0, 0, NULL };
    1.34      pgp_reader_t reader = NULL;
    1.35      pgp_writer_t writer = NULL;
    1.36      pgp_reader_t decryptor = NULL;