43 |
|
|
44 |
static gpg_keycache_t pub = NULL; |
static gpg_keycache_t pub = NULL; |
45 |
static gpg_keycache_t sec = NULL; |
static gpg_keycache_t sec = NULL; |
|
static unsigned int reload = 0; |
|
46 |
static char *gpg_secring = NULL; |
static char *gpg_secring = NULL; |
47 |
|
|
48 |
|
|
104 |
return err; |
return err; |
105 |
} |
} |
106 |
|
|
|
/* XXX: cache_keyring_names must be called then the GPG homedir changes! */ |
|
107 |
|
|
108 |
/* Initialize both cache contexts. Use @pubring for the public |
/* Initialize both cache contexts. Use @pubring for the public |
109 |
keyring and @secring for the secret keyring. */ |
keyring and @secring for the secret keyring. */ |
119 |
free_if_alloc (gpg_secring); |
free_if_alloc (gpg_secring); |
120 |
gpg_secring = get_gnupg_keyring (0, NO_STRICT); |
gpg_secring = get_gnupg_keyring (0, NO_STRICT); |
121 |
} |
} |
122 |
|
|
|
if (reload) { |
|
|
keycache_release (0); |
|
|
reload = 0; |
|
|
} |
|
123 |
p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys"); |
p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys"); |
124 |
if (p && *p != ' ') { |
if (p && *p != ' ') { |
125 |
val = atoi (p); |
val = atoi (p); |
127 |
memset (&pfx, 0, sizeof (pfx)); |
memset (&pfx, 0, sizeof (pfx)); |
128 |
} |
} |
129 |
|
|
130 |
|
/* Release old contexts first. */ |
131 |
|
keycache_release (0); |
132 |
|
|
133 |
err = gpg_keycache_new (&pub); |
err = gpg_keycache_new (&pub); |
134 |
if (err) |
if (err) |
135 |
return err; |
return err; |
139 |
if (!err) |
if (!err) |
140 |
err = gpg_keycache_init (pub, NULL, 0); |
err = gpg_keycache_init (pub, NULL, 0); |
141 |
if (!err) |
if (!err) |
142 |
err = gpg_keycache_init( sec, NULL, 1 ); |
err = gpg_keycache_init (sec, NULL, 1); |
143 |
if( !err && pubring && *pubring ) |
if (!err && pubring && *pubring) |
144 |
err = gpg_keycache_prepare( pub, pubring, NULL ); |
err = gpg_keycache_prepare( pub, pubring, NULL); |
145 |
if( !err && secring && * secring ) |
if (!err && secring && * secring) |
146 |
err = gpg_keycache_prepare( sec, NULL, secring ); |
err = gpg_keycache_prepare (sec, NULL, secring); |
147 |
if (!err) |
if (!err) |
148 |
gpg_keycache_sync (pub, sec); |
gpg_keycache_sync (pub, sec); |
149 |
if (val != 0) |
if (val != 0) |
152 |
} |
} |
153 |
|
|
154 |
|
|
|
/* If @val = 1 indicate to reload the cache. */ |
|
|
void |
|
|
keycache_set_reload (int val) |
|
|
{ |
|
|
reload = val; |
|
|
} |
|
|
|
|
|
|
|
|
/* Return the reload cache flag. */ |
|
|
int |
|
|
keycache_get_reload (void) |
|
|
{ |
|
|
return reload; |
|
|
} |
|
|
|
|
|
|
|
155 |
/* Return the public cache context if @is_pub is set |
/* Return the public cache context if @is_pub is set |
156 |
the secre cache context otherwise. */ |
the secre cache context otherwise. */ |
157 |
gpg_keycache_t |
gpg_keycache_t |
324 |
|
|
325 |
return gpg_sigstat[sigsum_to_index (sum) % mask]; |
return gpg_sigstat[sigsum_to_index (sum) % mask]; |
326 |
} |
} |
327 |
|
|
328 |
|
|
329 |
|
/* Check if the secret keyring contains at least one |
330 |
|
key with ultimate trust. |
331 |
|
Return value: 0 on success. */ |
332 |
|
int |
333 |
|
check_ultimate_trusted_key (void) |
334 |
|
{ |
335 |
|
struct keycache_s *n; |
336 |
|
|
337 |
|
for (n = sec->item; n; n = n->next) { |
338 |
|
if (n->pubpart && |
339 |
|
n->pubpart->key->owner_trust == GPGME_VALIDITY_ULTIMATE) |
340 |
|
return 0; |
341 |
|
} |
342 |
|
return -1; |
343 |
|
} |