blob: af57a96c4a8431f86e77abe865df8a2a7e877604 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
|
/**
* This file is part of GPGFrontend.
*
* GPGFrontend is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* Foobar is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with Foobar. If not, see <https://www.gnu.org/licenses/>.
*
* The initial version of the source code is inherited from gpg4usb-team.
* Their source code version also complies with GNU General Public License.
*
* The source code version of this software was modified and released
* by Saturneric<[email protected]> starting on May 12, 2021.
*
*/
#include "gpg/GpgContext.h"
/**
* check if key can sign(actually)
* @param key target key
* @return if key sign
*/
bool GpgME::GpgContext::checkIfKeyCanSign(const GpgKey &key) {
if (std::any_of(key.subKeys.begin(), key.subKeys.end(), [](const GpgSubKey &subkey) -> bool {
return subkey.secret && subkey.can_sign && !subkey.disabled && !subkey.revoked && !subkey.expired;
}))
return true;
else return false;
}
/**
* check if key can certify(actually)
* @param key target key
* @return if key certify
*/
bool GpgME::GpgContext::checkIfKeyCanCert(const GpgKey &key) {
return key.has_master_key && !key.expired && !key.revoked && !key.disabled;
}
/**
* check if key can authenticate(actually)
* @param key target key
* @return if key authenticate
*/
bool GpgME::GpgContext::checkIfKeyCanAuth(const GpgKey &key) {
if (std::any_of(key.subKeys.begin(), key.subKeys.end(), [](const GpgSubKey &subkey) -> bool {
return subkey.secret && subkey.can_authenticate && !subkey.disabled && !subkey.revoked && !subkey.expired;
}))
return true;
else return false;
}
/**
* check if key can encrypt(actually)
* @param key target key
* @return if key encrypt
*/
bool GpgME::GpgContext::checkIfKeyCanEncr(const GpgKey &key) {
if (std::any_of(key.subKeys.begin(), key.subKeys.end(), [](const GpgSubKey &subkey) -> bool {
return subkey.can_encrypt && !subkey.disabled && !subkey.revoked && !subkey.expired;
}))
return true;
else return false;
}
/**
* Get target key
* @param fpr master key's fingerprint
* @return the key
*/
GpgKey GpgME::GpgContext::getKeyByFpr(const QString &fpr) {
for (const auto &key : mKeyList) {
if (key.fpr == fpr) return key;
else
for (auto &subkey : key.subKeys) {
if (subkey.fpr == fpr) return key;
}
}
return GpgKey(nullptr);
}
/**
* Get target key
* @param id master key's id
* @return the key
*/
const GpgKey &GpgME::GpgContext::getKeyById(const QString &id) {
for (const auto &key : mKeyList) {
if (key.id == id)
return key;
else {
auto sub_keys = key.subKeys;
for (const auto &subkey : sub_keys) {
if (subkey.id == id) return key;
}
}
}
throw std::runtime_error("key not found");
}
|