diff options
author | Jeffrey Stedfast <fejj@ximian.com> | 2001-04-13 05:25:52 +0800 |
---|---|---|
committer | Jeffrey Stedfast <fejj@src.gnome.org> | 2001-04-13 05:25:52 +0800 |
commit | a125cbdcb54527ce541b10f28ca543807aee419a (patch) | |
tree | 8256c00441687f7b6b0e4e6584f19e60331d29df /mail/mail-format.c | |
parent | 0417c81c051f9180a38a6ac0054646bf5877e8b0 (diff) | |
download | gsoc2013-evolution-a125cbdcb54527ce541b10f28ca543807aee419a.tar gsoc2013-evolution-a125cbdcb54527ce541b10f28ca543807aee419a.tar.gz gsoc2013-evolution-a125cbdcb54527ce541b10f28ca543807aee419a.tar.bz2 gsoc2013-evolution-a125cbdcb54527ce541b10f28ca543807aee419a.tar.lz gsoc2013-evolution-a125cbdcb54527ce541b10f28ca543807aee419a.tar.xz gsoc2013-evolution-a125cbdcb54527ce541b10f28ca543807aee419a.tar.zst gsoc2013-evolution-a125cbdcb54527ce541b10f28ca543807aee419a.zip |
Use the CamelCipherHash enum. (mail_crypto_pgp_mime_part_verify): Use a
2001-04-12 Jeffrey Stedfast <fejj@ximian.com>
* mail-crypto.c (mail_crypto_pgp_mime_part_sign): Use the
CamelCipherHash enum.
(mail_crypto_pgp_mime_part_verify): Use a CamelCipherValidity.
* mail-format.c (try_inline_pgp_sig): Updated to use
CamelCipherValidity instead of CamelPgpValidity.
(handle_multipart_signed): Same.
svn path=/trunk/; revision=9284
Diffstat (limited to 'mail/mail-format.c')
-rw-r--r-- | mail/mail-format.c | 22 |
1 files changed, 11 insertions, 11 deletions
diff --git a/mail/mail-format.c b/mail/mail-format.c index 05144611bc..3903c56fc9 100644 --- a/mail/mail-format.c +++ b/mail/mail-format.c @@ -1101,7 +1101,7 @@ try_inline_pgp_sig (char *start, MailDisplay *md) { CamelPgpContext *context; CamelStream *ciphertext; - CamelPgpValidity *valid; + CamelCipherValidity *valid; CamelException *ex; char *end; @@ -1128,7 +1128,7 @@ try_inline_pgp_sig (char *start, MailDisplay *md) mail_text_write (md->html, md->stream, "%.*s", end - start, start); /* Now display the "seal-of-authenticity" or something... */ - if (valid && camel_pgp_validity_get_valid (valid)) { + if (valid && camel_cipher_validity_get_valid (valid)) { mail_html_write (md->html, md->stream, "<hr>\n<table><tr valign=top>" "<td><img src=\"%s\"></td>" @@ -1146,16 +1146,16 @@ try_inline_pgp_sig (char *start, MailDisplay *md) "not be proven to be authentic.")); } - if (valid && camel_pgp_validity_get_description (valid)) { + if (valid && camel_cipher_validity_get_description (valid)) { mail_error_write (md->html, md->stream, - camel_pgp_validity_get_description (valid)); + camel_cipher_validity_get_description (valid)); mail_html_write (md->html, md->stream, "<br><br>"); } mail_html_write (md->html, md->stream, "</font></td></table>"); - + camel_exception_free (ex); - camel_pgp_validity_free (valid); + camel_cipher_validity_free (valid); return end; } @@ -1489,7 +1489,7 @@ handle_multipart_signed (CamelMimePart *part, const char *mime_type, CamelMultipart *mp; CamelException *ex; gboolean output = FALSE; - CamelPgpValidity *valid; + CamelCipherValidity *valid; int nparts, i; wrapper = camel_medium_get_content_object (CAMEL_MEDIUM (part)); @@ -1517,7 +1517,7 @@ handle_multipart_signed (CamelMimePart *part, const char *mime_type, } /* Now display the "seal-of-authenticity" or something... */ - if (valid && camel_pgp_validity_get_valid (valid)) { + if (valid && camel_cipher_validity_get_valid (valid)) { mail_html_write (md->html, md->stream, "<hr>\n<table><tr valign=top>" "<td><img src=\"%s\"></td>" @@ -1535,16 +1535,16 @@ handle_multipart_signed (CamelMimePart *part, const char *mime_type, "not be proven to be authentic.")); } - if (valid && camel_pgp_validity_get_description (valid)) { + if (valid && camel_cipher_validity_get_description (valid)) { mail_error_write (md->html, md->stream, - camel_pgp_validity_get_description (valid)); + camel_cipher_validity_get_description (valid)); mail_html_write (md->html, md->stream, "<br><br>"); } mail_html_write (md->html, md->stream, "</font></td></table>"); camel_exception_free (ex); - camel_pgp_validity_free (valid); + camel_cipher_validity_free (valid); return TRUE; } |