X-Git-Url: https://git.notmuchmail.org/git?a=blobdiff_plain;f=notmuch-show.c;h=d5adc37007b884a9719be042a1374667c176c81a;hb=572259885af4d5858c3be5c2119ec7019e1ca617;hp=c8f5a48f78312744505e4637683a1a5fdeab6377;hpb=a1260896f6b2beb82f46c41663f00cb42a4c5ce7;p=notmuch diff --git a/notmuch-show.c b/notmuch-show.c index c8f5a48f..d5adc370 100644 --- a/notmuch-show.c +++ b/notmuch-show.c @@ -446,15 +446,11 @@ format_part_sigstatus_sprinter (sprinter_t *sp, mime_node_t *node) sp->map_key (sp, "expires"); sp->integer (sp, expires); } - /* output user id only if validity is FULL or ULTIMATE. */ - /* note that gmime is using the term "trust" here, which - * is WRONG. It's actually user id "validity". */ if (certificate) { - const char *name = g_mime_certificate_get_uid (certificate); - GMimeCertificateTrust trust = g_mime_certificate_get_trust (certificate); - if (name && (trust == GMIME_CERTIFICATE_TRUST_FULLY || trust == GMIME_CERTIFICATE_TRUST_ULTIMATE)) { + const char *uid = g_mime_certificate_get_valid_userid (certificate); + if (uid) { sp->map_key (sp, "userid"); - sp->string (sp, name); + sp->string (sp, uid); } } } else if (certificate) { @@ -1121,7 +1117,8 @@ notmuch_show_command (notmuch_config_t *config, int argc, char *argv[]) if (decrypt_set) { if (decrypt) { - params.crypto.decrypt = NOTMUCH_DECRYPT_TRUE; + /* we do not need or want to ask for session keys */ + params.crypto.decrypt = NOTMUCH_DECRYPT_NOSTASH; /* decryption implies verification */ params.crypto.verify = true; } else {