Changeset View
Changeset View
Standalone View
Standalone View
src/gpgme.h.in
Show First 20 Lines • Show All 1,306 Lines • ▼ Show 20 Lines | |||||
* must not allocate such a structure on its own. */ | * must not allocate such a structure on its own. */ | ||||
struct _gpgme_op_decrypt_result | struct _gpgme_op_decrypt_result | ||||
{ | { | ||||
char *unsupported_algorithm; | char *unsupported_algorithm; | ||||
/* Key should not have been used for encryption. */ | /* Key should not have been used for encryption. */ | ||||
unsigned int wrong_key_usage : 1; | unsigned int wrong_key_usage : 1; | ||||
/* True if the message was encrypted in compliance to the de-vs | |||||
* mode. */ | |||||
unsigned int is_de_vs : 1; | |||||
/* Internal to GPGME, do not use. */ | /* Internal to GPGME, do not use. */ | ||||
int _unused : 31; | int _unused : 30; | ||||
gpgme_recipient_t recipients; | gpgme_recipient_t recipients; | ||||
/* The original file name of the plaintext message, if | /* The original file name of the plaintext message, if | ||||
available. */ | available. */ | ||||
char *file_name; | char *file_name; | ||||
/* A textual representation of the session key used to decrypt the | /* A textual representation of the session key used to decrypt the | ||||
▲ Show 20 Lines • Show All 160 Lines • ▼ Show 20 Lines | struct _gpgme_signature | ||||
unsigned int wrong_key_usage : 1; | unsigned int wrong_key_usage : 1; | ||||
/* PKA status: 0 = not available, 1 = bad, 2 = okay, 3 = RFU. */ | /* PKA status: 0 = not available, 1 = bad, 2 = okay, 3 = RFU. */ | ||||
unsigned int pka_trust : 2; | unsigned int pka_trust : 2; | ||||
/* Validity has been verified using the chain model. */ | /* Validity has been verified using the chain model. */ | ||||
unsigned int chain_model : 1; | unsigned int chain_model : 1; | ||||
/* True if the signature is in compliance to the de-vs mode. */ | |||||
unsigned int is_de_vs : 1; | |||||
/* Internal to GPGME, do not use. */ | /* Internal to GPGME, do not use. */ | ||||
int _unused : 28; | int _unused : 27; | ||||
gpgme_validity_t validity; | gpgme_validity_t validity; | ||||
gpgme_error_t validity_reason; | gpgme_error_t validity_reason; | ||||
/* The public key algorithm used to create the signature. */ | /* The public key algorithm used to create the signature. */ | ||||
gpgme_pubkey_algo_t pubkey_algo; | gpgme_pubkey_algo_t pubkey_algo; | ||||
/* The hash algorithm used to create the signature. */ | /* The hash algorithm used to create the signature. */ | ||||
▲ Show 20 Lines • Show All 960 Lines • ▼ Show 20 Lines | typedef enum | ||||
GPGME_STATUS_BEGIN_SIGNING = 90, | GPGME_STATUS_BEGIN_SIGNING = 90, | ||||
GPGME_STATUS_KEY_NOT_CREATED = 91, | GPGME_STATUS_KEY_NOT_CREATED = 91, | ||||
GPGME_STATUS_INQUIRE_MAXLEN = 92, | GPGME_STATUS_INQUIRE_MAXLEN = 92, | ||||
GPGME_STATUS_FAILURE = 93, | GPGME_STATUS_FAILURE = 93, | ||||
GPGME_STATUS_KEY_CONSIDERED = 94, | GPGME_STATUS_KEY_CONSIDERED = 94, | ||||
GPGME_STATUS_TOFU_USER = 95, | GPGME_STATUS_TOFU_USER = 95, | ||||
GPGME_STATUS_TOFU_STATS = 96, | GPGME_STATUS_TOFU_STATS = 96, | ||||
GPGME_STATUS_TOFU_STATS_LONG = 97, | GPGME_STATUS_TOFU_STATS_LONG = 97, | ||||
GPGME_STATUS_NOTATION_FLAGS = 98 | GPGME_STATUS_NOTATION_FLAGS = 98, | ||||
GPGME_STATUS_DECRYPTION_COMPLIANCE_MODE = 99, | |||||
GPGME_STATUS_VERIFICATION_COMPLIANCE_MODE = 100 | |||||
} | } | ||||
gpgme_status_code_t; | gpgme_status_code_t; | ||||
/* The callback type used by the deprecated functions gpgme_op_edit | /* The callback type used by the deprecated functions gpgme_op_edit | ||||
* and gpgme_op_card_edit. */ | * and gpgme_op_card_edit. */ | ||||
typedef gpgme_error_t (*gpgme_edit_cb_t) (void *opaque, | typedef gpgme_error_t (*gpgme_edit_cb_t) (void *opaque, | ||||
gpgme_status_code_t status, | gpgme_status_code_t status, | ||||
const char *args, int fd); | const char *args, int fd); | ||||
▲ Show 20 Lines • Show All 242 Lines • Show Last 20 Lines |