1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-05-28 21:50:02 +02:00
gnupg/g10/keydb.h

162 lines
5.4 KiB
C
Raw Normal View History

1997-11-18 15:06:00 +01:00
/* keydb.h - Key database
1998-02-24 19:50:46 +01:00
* Copyright (C) 1998 Free Software Foundation, Inc.
1997-11-18 15:06:00 +01:00
*
1998-02-24 19:50:46 +01:00
* This file is part of GNUPG.
1997-11-18 15:06:00 +01:00
*
1998-02-24 19:50:46 +01:00
* GNUPG is free software; you can redistribute it and/or modify
1997-11-18 15:06:00 +01:00
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
1998-02-24 19:50:46 +01:00
* GNUPG is distributed in the hope that it will be useful,
1997-11-18 15:06:00 +01:00
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
*/
#ifndef G10_KEYDB_H
#define G10_KEYDB_H
#include "types.h"
1997-11-24 23:24:04 +01:00
#include "packet.h"
1997-11-18 15:06:00 +01:00
#include "cipher.h"
1997-12-12 13:03:58 +01:00
/****************
1998-04-14 19:51:16 +02:00
* A Keyblock is all packets which form an entire certificate;
1997-12-12 13:03:58 +01:00
* i.e. the public key, certificate, trust packets, user ids,
* signatures, and subkey.
*
* This structure is also used to bind arbitrary packets together.
*/
typedef struct kbnode_struct *KBNODE;
struct kbnode_struct {
KBNODE next;
1997-12-12 13:03:58 +01:00
PACKET *pkt;
int flag;
1998-01-02 21:40:10 +01:00
int private_flag;
1997-12-12 13:03:58 +01:00
};
/****************
1998-04-14 19:51:16 +02:00
* A data structre to hold information about the external position
1997-12-12 13:03:58 +01:00
* of a keyblock.
*/
struct keyblock_pos_struct {
int resno; /* resource number */
ulong offset; /* position information */
unsigned count; /* length of the keyblock in packets */
1998-02-13 21:58:50 +01:00
IOBUF fp; /* used by enum_keyblocks */
1998-03-19 16:27:29 +01:00
int secret; /* working on a secret keyring */
1998-02-13 21:58:50 +01:00
PACKET *pkt; /* ditto */
1997-12-12 13:03:58 +01:00
};
typedef struct keyblock_pos_struct KBPOS;
1997-12-31 13:32:54 +01:00
/* structure to hold a couple of public key certificates */
typedef struct pkc_list *PKC_LIST;
struct pkc_list {
PKC_LIST next;
PKT_public_cert *pkc;
int mark;
};
/* structure to hold a couple of secret key certificates */
typedef struct skc_list *SKC_LIST;
struct skc_list {
SKC_LIST next;
PKT_secret_cert *skc;
int mark;
};
1998-04-14 19:51:16 +02:00
/* structure to collect all information which can be used to
1998-01-16 22:15:24 +01:00
* identify a public key */
typedef struct pubkey_find_info *PUBKEY_FIND_INFO;
struct pubkey_find_info {
u32 keyid[2];
unsigned nbits;
byte pubkey_algo;
byte fingerprint[20];
char userid[1];
};
1997-12-31 13:32:54 +01:00
/*-- pkclist.c --*/
void release_pkc_list( PKC_LIST pkc_list );
1998-04-08 21:49:02 +02:00
int build_pkc_list( STRLIST remusr, PKC_LIST *ret_pkc_list, unsigned usage );
1997-12-12 13:03:58 +01:00
1997-12-31 13:32:54 +01:00
/*-- skclist.c --*/
void release_skc_list( SKC_LIST skc_list );
1998-04-08 21:49:02 +02:00
int build_skc_list( STRLIST locusr, SKC_LIST *ret_skc_list,
int unlock, unsigned usage );
1997-12-12 13:03:58 +01:00
1997-11-18 15:06:00 +01:00
/*-- passphrase.h --*/
1998-01-02 21:40:10 +01:00
void set_passphrase_fd( int fd );
int get_passphrase_fd(void);
1998-02-24 19:50:46 +01:00
DEK *get_passphrase_hash( u32 *keyid, char *text, byte *salt );
int make_dek_from_passphrase( DEK *dek, int mode, byte *salt );
1997-11-18 15:06:00 +01:00
/*-- getkey.c --*/
void add_keyring( const char *name );
1998-01-05 20:13:15 +01:00
const char *get_keyring( int sequence );
1997-12-12 13:03:58 +01:00
void add_secret_keyring( const char *name );
1997-12-01 11:33:23 +01:00
int get_pubkey( PKT_public_cert *pkc, u32 *keyid );
1997-12-16 20:15:09 +01:00
int get_pubkey_byname( PKT_public_cert *pkc, const char *name );
1997-12-01 11:33:23 +01:00
int get_seckey( PKT_secret_cert *skc, u32 *keyid );
1998-04-08 21:49:02 +02:00
int get_keyblock_byfprint( KBNODE *ret_keyblock, const byte *fprint );
1998-03-05 10:22:13 +01:00
int seckey_available( u32 *keyid );
1997-12-16 20:15:09 +01:00
int get_seckey_byname( PKT_secret_cert *skc, const char *name, int unlock );
1998-01-13 20:04:23 +01:00
int enum_secret_keys( void **context, PKT_secret_cert *skc );
1997-11-18 15:06:00 +01:00
char*get_user_id_string( u32 *keyid );
1997-12-01 11:33:23 +01:00
char*get_user_id( u32 *keyid, size_t *rn );
1997-11-18 15:06:00 +01:00
1997-11-24 23:24:04 +01:00
/*-- keyid.c --*/
1997-12-16 20:15:09 +01:00
int pubkey_letter( int algo );
1997-12-01 11:33:23 +01:00
u32 keyid_from_skc( PKT_secret_cert *skc, u32 *keyid );
u32 keyid_from_pkc( PKT_public_cert *pkc, u32 *keyid );
u32 keyid_from_sig( PKT_signature *sig, u32 *keyid );
unsigned nbits_from_pkc( PKT_public_cert *pkc );
unsigned nbits_from_skc( PKT_secret_cert *skc );
const char *datestr_from_pkc( PKT_public_cert *pkc );
const char *datestr_from_skc( PKT_secret_cert *skc );
const char *datestr_from_sig( PKT_signature *sig );
1997-12-09 13:46:23 +01:00
byte *fingerprint_from_skc( PKT_secret_cert *skc, size_t *ret_len );
byte *fingerprint_from_pkc( PKT_public_cert *pkc, size_t *ret_len );
1997-11-18 15:06:00 +01:00
1997-12-12 13:03:58 +01:00
/*-- kbnode.c --*/
KBNODE new_kbnode( PACKET *pkt );
1998-02-17 21:48:52 +01:00
KBNODE clone_kbnode( KBNODE node );
1997-12-12 13:03:58 +01:00
void release_kbnode( KBNODE n );
1998-02-16 21:05:02 +01:00
void delete_kbnode( KBNODE node );
1997-12-16 20:15:09 +01:00
void add_kbnode( KBNODE root, KBNODE node );
void insert_kbnode( KBNODE root, KBNODE node, int pkttype );
KBNODE find_prev_kbnode( KBNODE root, KBNODE node, int pkttype );
KBNODE find_next_kbnode( KBNODE node, int pkttype );
KBNODE find_kbnode( KBNODE node, int pkttype );
KBNODE walk_kbnode( KBNODE root, KBNODE *context, int all );
void clear_kbnode_flags( KBNODE n );
1998-02-16 21:05:02 +01:00
int commit_kbnode( KBNODE *root );
1997-12-12 13:03:58 +01:00
/*-- ringedit.c --*/
1998-01-06 22:01:36 +01:00
int add_keyblock_resource( const char *filename, int force, int secret );
1998-02-16 21:05:02 +01:00
const char *keyblock_resource_name( KBPOS *kbpos );
1998-01-06 22:01:36 +01:00
int get_keyblock_handle( const char *filename, int secret, KBPOS *kbpos );
1998-01-16 22:15:24 +01:00
int find_keyblock( PUBKEY_FIND_INFO info, KBPOS *kbpos );
int find_keyblock_byname( KBPOS *kbpos, const char *username );
1998-02-17 21:48:52 +01:00
int find_keyblock_bypkc( KBPOS *kbpos, PKT_public_cert *pkc );
1998-01-16 22:15:24 +01:00
int find_secret_keyblock_byname( KBPOS *kbpos, const char *username );
1997-12-12 13:03:58 +01:00
int lock_keyblock( KBPOS *kbpos );
1997-12-16 20:15:09 +01:00
void unlock_keyblock( KBPOS *kbpos );
1997-12-12 13:03:58 +01:00
int read_keyblock( KBPOS *kbpos, KBNODE *ret_root );
1998-02-13 21:58:50 +01:00
int enum_keyblocks( int mode, KBPOS *kbpos, KBNODE *ret_root );
1997-12-12 13:03:58 +01:00
int insert_keyblock( KBPOS *kbpos, KBNODE root );
int delete_keyblock( KBPOS *kbpos );
int update_keyblock( KBPOS *kbpos, KBNODE root );
1997-11-18 15:06:00 +01:00
#endif /*G10_KEYDB_H*/