diff options
author | toma <toma@283d02a7-25f6-0310-bc7c-ecb5cbfe19da> | 2009-11-25 17:56:58 +0000 |
---|---|---|
committer | toma <toma@283d02a7-25f6-0310-bc7c-ecb5cbfe19da> | 2009-11-25 17:56:58 +0000 |
commit | 460c52653ab0dcca6f19a4f492ed2c5e4e963ab0 (patch) | |
tree | 67208f7c145782a7e90b123b982ca78d88cc2c87 /libkpgp/kpgpkey.cpp | |
download | tdepim-460c52653ab0dcca6f19a4f492ed2c5e4e963ab0.tar.gz tdepim-460c52653ab0dcca6f19a4f492ed2c5e4e963ab0.zip |
Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features.
BUG:215923
git-svn-id: svn://anonsvn.kde.org/home/kde/branches/trinity/kdepim@1054174 283d02a7-25f6-0310-bc7c-ecb5cbfe19da
Diffstat (limited to 'libkpgp/kpgpkey.cpp')
-rw-r--r-- | libkpgp/kpgpkey.cpp | 260 |
1 files changed, 260 insertions, 0 deletions
diff --git a/libkpgp/kpgpkey.cpp b/libkpgp/kpgpkey.cpp new file mode 100644 index 000000000..d0d2e4ec3 --- /dev/null +++ b/libkpgp/kpgpkey.cpp @@ -0,0 +1,260 @@ +/* + kpgpkey.cpp + + Copyright (C) 2001,2002 the KPGP authors + See file AUTHORS.kpgp for details + + This file is part of KPGP, the KDE PGP/GnuPG support library. + + KPGP is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software Foundation, + Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA + */ + +#include "kpgpkey.h" +#include "kdebug.h" + +namespace Kpgp { + +/* member functions of Kpgp::KeyIDList --------------------------------- */ + +/** Converts from a KeyIDList to a QStringList. +*/ +QStringList KeyIDList::toStringList() const +{ + QStringList res; + for( KeyIDList::ConstIterator it = begin(); it != end(); ++it ) { + res << (*it).data(); + } + return res; +} + +/** Converts from a QStringList to a KeyIDList. +*/ +KeyIDList KeyIDList::fromStringList( const QStringList& l ) +{ + KeyIDList res; + for( QStringList::ConstIterator it = l.begin(); it != l.end(); ++it ) { + res << (*it).local8Bit(); + } + return res; +} + +/* member functions of Kpgp::UserID ------------------------------------ */ + +UserID::UserID(const QString& str, const Validity validity, + const bool revoked, const bool invalid) +{ + mText = str; + mValidity = validity; + mRevoked = revoked; + mInvalid = invalid; +} + + +/* member functions of Kpgp::Subkey ------------------------------------ */ + +Subkey::Subkey(const KeyID& keyID, const bool secret) +{ + mSecret = secret; + mKeyID = keyID; + + mRevoked = false; + mExpired = false; + mDisabled = false; + mInvalid = false; + mCanEncrypt = false; + mCanSign = false; + mCanCertify = false; + mKeyAlgo = 0; + mKeyLen = 0; + mFingerprint = 0; + mTimestamp = 0; + mExpiration = 0; +} + + +/* member functions of Kpgp::Key --------------------------------------- */ + +Key::Key(const KeyID& keyid, const QString& uid, const bool secret) : + mSubkeys(), mUserIDs() +{ + mSecret = secret; + if (!keyid.isEmpty()) + addSubkey(keyid, secret); + if (!uid.isEmpty()) + addUserID(uid); + + mRevoked = false; + mExpired = false; + mDisabled = false; + mInvalid = false; + mCanEncrypt = false; + mCanSign = false; + mCanCertify = false; + + mEncryptPref = UnknownEncryptPref; +} + +Key::~Key() +{ + //kdDebug(5100) << "Kpgp::Key: Deleting key " << primaryUserID() << endl; + mUserIDs.setAutoDelete(true); + mUserIDs.clear(); + mSubkeys.setAutoDelete(true); + mSubkeys.clear(); +} + +void +Key::clear() +{ + mSecret = false; + mRevoked = false; + mExpired = false; + mDisabled = false; + mInvalid = false; + mCanEncrypt = false; + mCanSign = false; + mCanCertify = false; + + mEncryptPref = UnknownEncryptPref; + + mSubkeys.setAutoDelete(true); + mSubkeys.clear(); + mUserIDs.setAutoDelete(true); + mUserIDs.clear(); +} + +Validity +Key::keyTrust() const +{ + Validity trust = KPGP_VALIDITY_UNKNOWN; + + for( UserIDListIterator it(mUserIDs); it.current(); ++it ) + { + if( (*it)->validity() > trust ) + trust = (*it)->validity(); + } + + return trust; +} + +Validity +Key::keyTrust( const QString& uid ) const +{ + Validity trust = KPGP_VALIDITY_UNKNOWN; + + if( uid.isEmpty() ) + return trust; + + for( UserIDListIterator it(mUserIDs); it.current(); ++it ) + { + if( (*it)->text() == uid ) + trust = (*it)->validity(); + } + + return trust; +} + +void +Key::cloneKeyTrust( const Key* key ) +{ + if( !key ) + return; + + for( UserIDListIterator it(mUserIDs); it.current(); ++it ) + { + (*it)->setValidity( key->keyTrust( (*it)->text() ) ); + } +} + +bool +Key::isValid() const +{ + return ( !mRevoked && !mExpired && !mDisabled && !mInvalid ); +} + + +bool +Key::isValidEncryptionKey() const +{ + return ( !mRevoked && !mExpired && !mDisabled && !mInvalid && mCanEncrypt ); +} + + +bool +Key::isValidSigningKey() const +{ + return ( !mRevoked && !mExpired && !mDisabled && !mInvalid && mCanSign ); +} + + +void Key::addUserID(const QString &uid, const Validity validity, + const bool revoked, const bool invalid) +{ + if (!uid.isEmpty()) { + UserID *userID = new UserID(uid, validity, revoked, invalid); + mUserIDs.append(userID); + } +} + +bool Key::matchesUserID(const QString& str, bool cs) +{ + if (str.isEmpty() || mUserIDs.isEmpty()) + return false; + + for (UserIDListIterator it(mUserIDs); it.current(); ++it) { + if (((*it)->text().find(str, 0, cs)) != -1) + return true; + } + + return false; +} + +void Key::addSubkey(const KeyID& keyID, const bool secret) +{ + if (!keyID.isEmpty()) { + Subkey *key = new Subkey(keyID, secret); + mSubkeys.append(key); + } +} + +Subkey *Key::getSubkey(const KeyID& keyID) +{ + if (keyID.isEmpty() || mSubkeys.isEmpty()) + return 0; + + // is the given key ID a long (16 chars) or a short (8 chars) key ID? + bool longKeyID = (keyID.length() == 16); + + for (SubkeyListIterator it(mSubkeys); it.current(); ++it) { + if (longKeyID) { + if ((*it)->longKeyID() == keyID) + return (*it); + } + else { + if ((*it)->keyID() == keyID) + return (*it); + } + } + + return 0; +} + +void Key::setFingerprint(const KeyID& keyID, const QCString &fpr) +{ + Subkey *key; + if ((key = getSubkey(keyID)) != 0) { + key->setFingerprint(fpr); + } + else + kdDebug(5006) << "Error: Can't set fingerprint. A subkey with key ID 0x" + << keyID << " doesn't exist." << endl; +} + +} // namespace Kpgp |