20 |
#ifndef WPT_KEYLIST_H |
#ifndef WPT_KEYLIST_H |
21 |
#define WPT_KEYLIST_H |
#define WPT_KEYLIST_H |
22 |
|
|
23 |
|
#include "wptFileManager.h" |
24 |
|
|
25 |
/* Available sort-by modes. */ |
/* Available sort-by modes. */ |
26 |
enum key_sort_t { |
enum key_sort_t { |
27 |
KEY_SORT_USERID = 0, |
KEY_SORT_USERID = 0, |
41 |
/* Valid keylist modes. */ |
/* Valid keylist modes. */ |
42 |
enum keylist_mode_t { |
enum keylist_mode_t { |
43 |
KEYLIST_ALL = 0, |
KEYLIST_ALL = 0, |
44 |
KEYLIST_LIST = 1, |
KEYLIST_LIST = 1, |
45 |
KEYLIST_ENCRYPT = 2, |
KEYLIST_ENCRYPT = 2, /* obsolete */ |
46 |
KEYLIST_ENCRYPT_MIN = 4, |
KEYLIST_ENCRYPT_MIN = 4, |
47 |
KEYLIST_SIGN = 8, |
KEYLIST_SIGN = 8, |
48 |
KEYLIST_FLAG_FILE = 16, |
KEYLIST_FLAG_FILE = 16, |
66 |
KM_COL_CIPHER = 4, |
KM_COL_CIPHER = 4, |
67 |
KM_COL_VALID = 5, |
KM_COL_VALID = 5, |
68 |
KM_COL_TRUST = 6, |
KM_COL_TRUST = 6, |
69 |
KM_COL_CREAT = 7 |
KM_COL_CREAT = 7, |
70 |
|
KM_COL_DESC = 8 |
71 |
}; |
}; |
72 |
|
|
73 |
/* Symbolic column IDs for sig lists */ |
/* Symbolic column IDs for sig lists */ |
87 |
KEY_IMG_PAIR= 1 |
KEY_IMG_PAIR= 1 |
88 |
}; |
}; |
89 |
|
|
|
/* Signature verification context for a file. */ |
|
|
struct file_sig_ctx_s { |
|
|
char *file; /* plaintext file name */ |
|
|
gpgme_signature_t sig; /* the actual signature */ |
|
|
unsigned use_uid:1; /* 1=if the user id from context should be used. */ |
|
|
const char *user_id; |
|
|
}; |
|
|
typedef struct file_sig_ctx_s *file_sig_ctx_t; |
|
|
|
|
90 |
/*-- keylist.c --*/ |
/*-- keylist.c --*/ |
91 |
const char* get_key_pubalgo2 (gpgme_pubkey_algo_t alg); |
const char* get_key_pubalgo2 (gpgme_pubkey_algo_t alg); |
92 |
const char* get_key_pubalgo (gpgme_pubkey_algo_t alg); |
const char* get_key_pubalgo (gpgme_pubkey_algo_t alg); |
93 |
const char * get_key_algo( gpgme_key_t key, int keyidx ); |
const char* get_key_algo( gpgme_key_t key, int keyidx ); |
94 |
const char * get_key_created( long timestamp ); |
const char* get_key_created( long timestamp ); |
95 |
const char * get_key_expire_date( long timestamp ); |
const char* get_key_expire_date( long timestamp ); |
96 |
const char * get_key_type( gpgme_key_t key ); |
const char* get_key_type( gpgme_key_t key ); |
97 |
const char * get_key_size( gpgme_key_t key, int keyidx ); |
const char* get_key_size( gpgme_key_t key, int keyidx ); |
98 |
const char * get_key_fpr( gpgme_key_t key ); |
const char* get_key_fpr( gpgme_key_t key ); |
99 |
const char * get_key_trust (gpgme_key_t key, int uididx, int listmode); |
const char* get_key_trust (gpgme_key_t key, int uididx, int listmode); |
100 |
const char * get_key_trust2 (gpgme_key_t key, int val, int uididx, int listmode); |
const char* get_key_trust2 (gpgme_key_t key, int val, int uididx, int listmode); |
101 |
const char * get_key_trust_str (int val); |
const char* get_key_trust_str (int val); |
102 |
|
|
103 |
|
char* get_key_desc (gpgme_key_t key); |
104 |
|
|
105 |
gpgme_user_id_t get_nth_userid (gpgme_key_t key, int idx); |
gpgme_user_id_t get_nth_userid (gpgme_key_t key, int idx); |
106 |
int count_userids (gpgme_key_t key); |
int count_userids (gpgme_key_t key); |