a142f187b7
lang/cpp/src/callbacks.cpp, lang/cpp/src/configuration.cpp, lang/cpp/src/context.cpp, lang/cpp/src/context_glib.cpp, lang/cpp/src/context_qt.cpp, lang/cpp/src/context_vanilla.cpp, lang/cpp/src/data.cpp, lang/cpp/src/decryptionresult.cpp, lang/cpp/src/defaultassuantransaction.cpp, lang/cpp/src/editinteractor.cpp, lang/cpp/src/encryptionresult.cpp, lang/cpp/src/engineinfo.cpp, lang/cpp/src/eventloopinteractor.cpp, lang/cpp/src/exception.cpp, lang/cpp/src/gpgadduserideditinteractor.cpp, lang/cpp/src/gpgagentgetinfoassuantransaction.cpp, lang/cpp/src/gpgsetexpirytimeeditinteractor.cpp, lang/cpp/src/gpgsetownertrusteditinteractor.cpp, lang/cpp/src/gpgsignkeyeditinteractor.cpp, lang/cpp/src/importresult.cpp, lang/cpp/src/key.cpp, lang/cpp/src/keygenerationresult.cpp, lang/cpp/src/keylistresult.cpp, lang/cpp/src/scdgetinfoassuantransaction.cpp, lang/cpp/src/signingresult.cpp, lang/cpp/src/tofuinfo.cpp, lang/cpp/src/trustitem.cpp, lang/cpp/src/verificationresult.cpp, lang/cpp/src/vfsmountresult.cpp, lang/qt/src/dataprovider.cpp, lang/qt/src/defaultkeygenerationjob.cpp, lang/qt/src/gpgme_backend_debug.cpp, lang/qt/src/job.cpp, lang/qt/src/qgpgmeadduseridjob.cpp, lang/qt/src/qgpgmebackend.cpp, lang/qt/src/qgpgmechangeexpiryjob.cpp, lang/qt/src/qgpgmechangeownertrustjob.cpp, lang/qt/src/qgpgmechangepasswdjob.cpp, lang/qt/src/qgpgmedecryptjob.cpp, lang/qt/src/qgpgmedecryptverifyjob.cpp, lang/qt/src/qgpgmedeletejob.cpp, lang/qt/src/qgpgmedownloadjob.cpp, lang/qt/src/qgpgmeencryptjob.cpp, lang/qt/src/qgpgmeexportjob.cpp, lang/qt/src/qgpgmeimportfromkeyserverjob.cpp, lang/qt/src/qgpgmeimportjob.cpp, lang/qt/src/qgpgmekeyformailboxjob.cpp, lang/qt/src/qgpgmekeygenerationjob.cpp, lang/qt/src/qgpgmekeylistjob.cpp, lang/qt/src/qgpgmelistallkeysjob.cpp, lang/qt/src/qgpgmenewcryptoconfig.cpp, lang/qt/src/qgpgmerefreshkeysjob.cpp, lang/qt/src/qgpgmesecretkeyexportjob.cpp, lang/qt/src/qgpgmesignencryptjob.cpp, lang/qt/src/qgpgmesignjob.cpp, lang/qt/src/qgpgmesignkeyjob.cpp, lang/qt/src/qgpgmetofupolicyjob.cpp, lang/qt/src/qgpgmeverifydetachedjob.cpp, lang/qt/src/qgpgmeverifyopaquejob.cpp, lang/qt/src/qgpgmewkspublishjob.cpp, lang/qt/src/threadedjobmixin.cpp, lang/qt/tests/run-keyformailboxjob.cpp, lang/qt/tests/t-encrypt.cpp, lang/qt/tests/t-keylist.cpp, lang/qt/tests/t-keylocate.cpp, lang/qt/tests/t-ownertrust.cpp, lang/qt/tests/t-support.cpp, lang/qt/tests/t-tofuinfo.cpp, lang/qt/tests/t-wkspublish.cpp: Include config.h -- This fixes problems with mismatching definitions. Most notably _FILE_OFFSET_BITS is now always set correctly.
220 lines
5.0 KiB
C++
220 lines
5.0 KiB
C++
/*
|
|
importresult.cpp - wraps a gpgme import result
|
|
Copyright (C) 2004 Klarälvdalens Datakonsult AB
|
|
|
|
This file is part of GPGME++.
|
|
|
|
GPGME++ is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Library General Public
|
|
License as published by the Free Software Foundation; either
|
|
version 2 of the License, or (at your option) any later version.
|
|
|
|
GPGME++ is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU Library General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Library General Public License
|
|
along with GPGME++; see the file COPYING.LIB. If not, write to the
|
|
Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
|
Boston, MA 02110-1301, USA.
|
|
*/
|
|
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include "config.h"
|
|
#endif
|
|
|
|
#include <importresult.h>
|
|
#include "result_p.h"
|
|
|
|
#include <gpgme.h>
|
|
#include <cstdlib>
|
|
#include <cstring>
|
|
|
|
#include <string.h>
|
|
|
|
class GpgME::ImportResult::Private
|
|
{
|
|
public:
|
|
Private(const _gpgme_op_import_result &r) : res(r)
|
|
{
|
|
// copy recursively, using compiler-generated copy ctor.
|
|
// We just need to handle the pointers in the structs:
|
|
for (gpgme_import_status_t is = r.imports ; is ; is = is->next) {
|
|
gpgme_import_status_t copy = new _gpgme_import_status(*is);
|
|
copy->fpr = strdup(is->fpr);
|
|
copy->next = 0;
|
|
imports.push_back(copy);
|
|
}
|
|
res.imports = 0;
|
|
}
|
|
~Private()
|
|
{
|
|
for (std::vector<gpgme_import_status_t>::iterator it = imports.begin() ; it != imports.end() ; ++it) {
|
|
std::free((*it)->fpr);
|
|
delete *it; *it = 0;
|
|
}
|
|
}
|
|
|
|
_gpgme_op_import_result res;
|
|
std::vector<gpgme_import_status_t> imports;
|
|
};
|
|
|
|
GpgME::ImportResult::ImportResult(gpgme_ctx_t ctx, int error)
|
|
: GpgME::Result(error), d()
|
|
{
|
|
init(ctx);
|
|
}
|
|
|
|
GpgME::ImportResult::ImportResult(gpgme_ctx_t ctx, const Error &error)
|
|
: GpgME::Result(error), d()
|
|
{
|
|
init(ctx);
|
|
}
|
|
|
|
void GpgME::ImportResult::init(gpgme_ctx_t ctx)
|
|
{
|
|
if (!ctx) {
|
|
return;
|
|
}
|
|
gpgme_import_result_t res = gpgme_op_import_result(ctx);
|
|
if (!res) {
|
|
return;
|
|
}
|
|
d.reset(new Private(*res));
|
|
}
|
|
|
|
make_standard_stuff(ImportResult)
|
|
|
|
int GpgME::ImportResult::numConsidered() const
|
|
{
|
|
return d ? d->res.considered : 0 ;
|
|
}
|
|
|
|
int GpgME::ImportResult::numKeysWithoutUserID() const
|
|
{
|
|
return d ? d->res.no_user_id : 0 ;
|
|
}
|
|
|
|
int GpgME::ImportResult::numImported() const
|
|
{
|
|
return d ? d->res.imported : 0 ;
|
|
}
|
|
|
|
int GpgME::ImportResult::numRSAImported() const
|
|
{
|
|
return d ? d->res.imported_rsa : 0 ;
|
|
}
|
|
|
|
int GpgME::ImportResult::numUnchanged() const
|
|
{
|
|
return d ? d->res.unchanged : 0 ;
|
|
}
|
|
|
|
int GpgME::ImportResult::newUserIDs() const
|
|
{
|
|
return d ? d->res.new_user_ids : 0 ;
|
|
}
|
|
|
|
int GpgME::ImportResult::newSubkeys() const
|
|
{
|
|
return d ? d->res.new_sub_keys : 0 ;
|
|
}
|
|
|
|
int GpgME::ImportResult::newSignatures() const
|
|
{
|
|
return d ? d->res.new_signatures : 0 ;
|
|
}
|
|
|
|
int GpgME::ImportResult::newRevocations() const
|
|
{
|
|
return d ? d->res.new_revocations : 0 ;
|
|
}
|
|
|
|
int GpgME::ImportResult::numSecretKeysConsidered() const
|
|
{
|
|
return d ? d->res.secret_read : 0 ;
|
|
}
|
|
|
|
int GpgME::ImportResult::numSecretKeysImported() const
|
|
{
|
|
return d ? d->res.secret_imported : 0 ;
|
|
}
|
|
|
|
int GpgME::ImportResult::numSecretKeysUnchanged() const
|
|
{
|
|
return d ? d->res.secret_unchanged : 0 ;
|
|
}
|
|
|
|
int GpgME::ImportResult::notImported() const
|
|
{
|
|
return d ? d->res.not_imported : 0 ;
|
|
}
|
|
|
|
GpgME::Import GpgME::ImportResult::import(unsigned int idx) const
|
|
{
|
|
return Import(d, idx);
|
|
}
|
|
|
|
std::vector<GpgME::Import> GpgME::ImportResult::imports() const
|
|
{
|
|
if (!d) {
|
|
return std::vector<Import>();
|
|
}
|
|
std::vector<Import> result;
|
|
result.reserve(d->imports.size());
|
|
for (unsigned int i = 0 ; i < d->imports.size() ; ++i) {
|
|
result.push_back(Import(d, i));
|
|
}
|
|
return result;
|
|
}
|
|
|
|
GpgME::Import::Import(const std::shared_ptr<ImportResult::Private> &parent, unsigned int i)
|
|
: d(parent), idx(i)
|
|
{
|
|
|
|
}
|
|
|
|
GpgME::Import::Import() : d(), idx(0) {}
|
|
|
|
bool GpgME::Import::isNull() const
|
|
{
|
|
return !d || idx >= d->imports.size() ;
|
|
}
|
|
|
|
const char *GpgME::Import::fingerprint() const
|
|
{
|
|
return isNull() ? 0 : d->imports[idx]->fpr ;
|
|
}
|
|
|
|
GpgME::Error GpgME::Import::error() const
|
|
{
|
|
return Error(isNull() ? 0 : d->imports[idx]->result);
|
|
}
|
|
|
|
GpgME::Import::Status GpgME::Import::status() const
|
|
{
|
|
if (isNull()) {
|
|
return Unknown;
|
|
}
|
|
const unsigned int s = d->imports[idx]->status;
|
|
unsigned int result = Unknown;
|
|
if (s & GPGME_IMPORT_NEW) {
|
|
result |= NewKey;
|
|
}
|
|
if (s & GPGME_IMPORT_UID) {
|
|
result |= NewUserIDs;
|
|
}
|
|
if (s & GPGME_IMPORT_SIG) {
|
|
result |= NewSignatures;
|
|
}
|
|
if (s & GPGME_IMPORT_SUBKEY) {
|
|
result |= NewSubkeys;
|
|
}
|
|
if (s & GPGME_IMPORT_SECRET) {
|
|
result |= ContainedSecretKey;
|
|
}
|
|
return static_cast<Status>(result);
|
|
}
|