blob: 2dc4f8c8e8be475767e3ccdb05d9e3b369695a88 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
|
/**
* This file is part of GPGFrontend.
*
* GPGFrontend is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* Foobar is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with Foobar. If not, see <https://www.gnu.org/licenses/>.
*
* The initial version of the source code is inherited from gpg4usb-team.
* Their source code version also complies with GNU General Public License.
*
* The source code version of this software was modified and released
* by Saturneric<[email protected]> starting on May 12, 2021.
*
*/
#ifndef GPGFRONTEND_GPGKEY_H
#define GPGFRONTEND_GPGKEY_H
#include <gpgme.h>
#include "GpgSubKey.h"
class GpgKey {
public:
QString id;
QString name;
QString email;
QString comment;
QString fpr;
QString protocol;
QString owner_trust;
QString pubkey_algo;
QDateTime last_update;
QDateTime expires;
QDateTime create_time;
int length;
bool can_encrypt{};
bool can_sign{};
bool can_certify{};
bool can_authenticate{};
bool is_private_key{};
bool expired{};
bool revoked{};
bool disabled{};
bool good = false;
QVector<GpgSubKey> subKeys;
explicit GpgKey(gpgme_key_t key) {
parse(key);
}
GpgKey() {
is_private_key = false;
}
void parse(gpgme_key_t key) {
if(key != nullptr) {
good = true;
is_private_key = key->secret;
fpr = key->fpr;
protocol = key->protocol;
expired = (key->expired != 0u);
revoked = (key->revoked != 0u);
disabled = key->disabled;
can_authenticate = key->can_authenticate;
can_certify = key->can_certify;
can_encrypt = key->can_encrypt;
can_sign = key->can_sign;
last_update = QDateTime(QDateTime::fromTime_t(key->last_update));
switch (key->owner_trust) {
case GPGME_VALIDITY_UNKNOWN:
owner_trust = "Unknown";
break;
case GPGME_VALIDITY_UNDEFINED:
owner_trust = "Undefined";
break;
case GPGME_VALIDITY_NEVER:
owner_trust = "Never";
break;
case GPGME_VALIDITY_MARGINAL:
owner_trust = "Marginal";
break;
case GPGME_VALIDITY_FULL:
owner_trust = "FULL";
break;
case GPGME_VALIDITY_ULTIMATE:
owner_trust = "Ultimate";
break;
}
if (key->uids) {
name = QString::fromUtf8(key->uids->name);
email = QString::fromUtf8(key->uids->email);
comment = QString::fromUtf8(key->uids->comment);
}
gpgme_subkey_t next = key->subkeys;
while (next != nullptr) {
subKeys.push_back(GpgSubKey(next));
next = next->next;
}
if (!subKeys.isEmpty()) {
id = subKeys.first().id;
expires = subKeys.first().expires;
pubkey_algo = subKeys.first().pubkey_algo;
create_time = subKeys.first().timestamp;
length = subKeys.first().length;
} else {
id = "";
}
}
}
};
#endif //GPGFRONTEND_GPGKEY_H
|