Werner Koch e36b2d1bce
New mode to list a v5 fingerprint for v4 packets.
* src/gpgme.h.in (GPGME_KEYLIST_MODE_WITH_V5FPR): New.
(struct _gpgme_subkey): Add field v5fpr.
* src/engine-gpg.c (gpg_keylist_build_options): Pass new option to
gpg.
* src/key.c (gpgme_key_unref): Free new field.
* src/keylist.c (op_data_t): Parse and add "fp2" line.

* tests/run-keylist.c (show_usage): Add option --v5fpr.

* src/keylist.c (op_data_t): Add field failure_code.
(keylist_status_handler): Handle special value.
(gpgme_op_keylist_end): Return an error if a FAILURE line has been
seen.
--

Note that the failure code part has been added to better diagnose
problems if a wrong gpg version is used.  If verything works right we
should not get this because we check that the gnupg version sis either
>= 2.4.4 or less than 2.3 and >= 2.2.42.

Note further that the v5fpr field may also be used to get the SHA-256
fingerprint of X.509 certificates (even without passing the new mode
flag).

GnuPG-bug-id: 6705
2023-09-04 17:03:52 +02:00
..
2022-09-15 13:45:35 +09:00
2018-11-08 12:34:27 +07:00
2018-11-08 12:34:27 +07:00
2023-02-10 11:12:52 +01:00
2023-04-17 14:05:35 +02:00
2020-08-14 11:11:23 +02:00
2022-11-25 15:37:23 +09:00
2017-12-08 05:59:11 +01:00
2020-11-03 17:47:44 -08:00
2020-10-29 12:57:10 +01:00
2023-01-30 12:49:11 +01:00
2020-11-03 17:47:44 -08:00
2022-10-26 12:10:57 +02:00