summaryrefslogtreecommitdiffstats
path: root/libkpgp/kpgpkey.cpp
diff options
context:
space:
mode:
authortoma <toma@283d02a7-25f6-0310-bc7c-ecb5cbfe19da>2009-11-25 17:56:58 +0000
committertoma <toma@283d02a7-25f6-0310-bc7c-ecb5cbfe19da>2009-11-25 17:56:58 +0000
commit460c52653ab0dcca6f19a4f492ed2c5e4e963ab0 (patch)
tree67208f7c145782a7e90b123b982ca78d88cc2c87 /libkpgp/kpgpkey.cpp
downloadtdepim-460c52653ab0dcca6f19a4f492ed2c5e4e963ab0.tar.gz
tdepim-460c52653ab0dcca6f19a4f492ed2c5e4e963ab0.zip
Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features.
BUG:215923 git-svn-id: svn://anonsvn.kde.org/home/kde/branches/trinity/kdepim@1054174 283d02a7-25f6-0310-bc7c-ecb5cbfe19da
Diffstat (limited to 'libkpgp/kpgpkey.cpp')
-rw-r--r--libkpgp/kpgpkey.cpp260
1 files changed, 260 insertions, 0 deletions
diff --git a/libkpgp/kpgpkey.cpp b/libkpgp/kpgpkey.cpp
new file mode 100644
index 000000000..d0d2e4ec3
--- /dev/null
+++ b/libkpgp/kpgpkey.cpp
@@ -0,0 +1,260 @@
+/*
+ kpgpkey.cpp
+
+ Copyright (C) 2001,2002 the KPGP authors
+ See file AUTHORS.kpgp for details
+
+ This file is part of KPGP, the KDE PGP/GnuPG support library.
+
+ KPGP is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 2 of the License, or
+ (at your option) any later version.
+
+ You should have received a copy of the GNU General Public License
+ along with this program; if not, write to the Free Software Foundation,
+ Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
+ */
+
+#include "kpgpkey.h"
+#include "kdebug.h"
+
+namespace Kpgp {
+
+/* member functions of Kpgp::KeyIDList --------------------------------- */
+
+/** Converts from a KeyIDList to a QStringList.
+*/
+QStringList KeyIDList::toStringList() const
+{
+ QStringList res;
+ for( KeyIDList::ConstIterator it = begin(); it != end(); ++it ) {
+ res << (*it).data();
+ }
+ return res;
+}
+
+/** Converts from a QStringList to a KeyIDList.
+*/
+KeyIDList KeyIDList::fromStringList( const QStringList& l )
+{
+ KeyIDList res;
+ for( QStringList::ConstIterator it = l.begin(); it != l.end(); ++it ) {
+ res << (*it).local8Bit();
+ }
+ return res;
+}
+
+/* member functions of Kpgp::UserID ------------------------------------ */
+
+UserID::UserID(const QString& str, const Validity validity,
+ const bool revoked, const bool invalid)
+{
+ mText = str;
+ mValidity = validity;
+ mRevoked = revoked;
+ mInvalid = invalid;
+}
+
+
+/* member functions of Kpgp::Subkey ------------------------------------ */
+
+Subkey::Subkey(const KeyID& keyID, const bool secret)
+{
+ mSecret = secret;
+ mKeyID = keyID;
+
+ mRevoked = false;
+ mExpired = false;
+ mDisabled = false;
+ mInvalid = false;
+ mCanEncrypt = false;
+ mCanSign = false;
+ mCanCertify = false;
+ mKeyAlgo = 0;
+ mKeyLen = 0;
+ mFingerprint = 0;
+ mTimestamp = 0;
+ mExpiration = 0;
+}
+
+
+/* member functions of Kpgp::Key --------------------------------------- */
+
+Key::Key(const KeyID& keyid, const QString& uid, const bool secret) :
+ mSubkeys(), mUserIDs()
+{
+ mSecret = secret;
+ if (!keyid.isEmpty())
+ addSubkey(keyid, secret);
+ if (!uid.isEmpty())
+ addUserID(uid);
+
+ mRevoked = false;
+ mExpired = false;
+ mDisabled = false;
+ mInvalid = false;
+ mCanEncrypt = false;
+ mCanSign = false;
+ mCanCertify = false;
+
+ mEncryptPref = UnknownEncryptPref;
+}
+
+Key::~Key()
+{
+ //kdDebug(5100) << "Kpgp::Key: Deleting key " << primaryUserID() << endl;
+ mUserIDs.setAutoDelete(true);
+ mUserIDs.clear();
+ mSubkeys.setAutoDelete(true);
+ mSubkeys.clear();
+}
+
+void
+Key::clear()
+{
+ mSecret = false;
+ mRevoked = false;
+ mExpired = false;
+ mDisabled = false;
+ mInvalid = false;
+ mCanEncrypt = false;
+ mCanSign = false;
+ mCanCertify = false;
+
+ mEncryptPref = UnknownEncryptPref;
+
+ mSubkeys.setAutoDelete(true);
+ mSubkeys.clear();
+ mUserIDs.setAutoDelete(true);
+ mUserIDs.clear();
+}
+
+Validity
+Key::keyTrust() const
+{
+ Validity trust = KPGP_VALIDITY_UNKNOWN;
+
+ for( UserIDListIterator it(mUserIDs); it.current(); ++it )
+ {
+ if( (*it)->validity() > trust )
+ trust = (*it)->validity();
+ }
+
+ return trust;
+}
+
+Validity
+Key::keyTrust( const QString& uid ) const
+{
+ Validity trust = KPGP_VALIDITY_UNKNOWN;
+
+ if( uid.isEmpty() )
+ return trust;
+
+ for( UserIDListIterator it(mUserIDs); it.current(); ++it )
+ {
+ if( (*it)->text() == uid )
+ trust = (*it)->validity();
+ }
+
+ return trust;
+}
+
+void
+Key::cloneKeyTrust( const Key* key )
+{
+ if( !key )
+ return;
+
+ for( UserIDListIterator it(mUserIDs); it.current(); ++it )
+ {
+ (*it)->setValidity( key->keyTrust( (*it)->text() ) );
+ }
+}
+
+bool
+Key::isValid() const
+{
+ return ( !mRevoked && !mExpired && !mDisabled && !mInvalid );
+}
+
+
+bool
+Key::isValidEncryptionKey() const
+{
+ return ( !mRevoked && !mExpired && !mDisabled && !mInvalid && mCanEncrypt );
+}
+
+
+bool
+Key::isValidSigningKey() const
+{
+ return ( !mRevoked && !mExpired && !mDisabled && !mInvalid && mCanSign );
+}
+
+
+void Key::addUserID(const QString &uid, const Validity validity,
+ const bool revoked, const bool invalid)
+{
+ if (!uid.isEmpty()) {
+ UserID *userID = new UserID(uid, validity, revoked, invalid);
+ mUserIDs.append(userID);
+ }
+}
+
+bool Key::matchesUserID(const QString& str, bool cs)
+{
+ if (str.isEmpty() || mUserIDs.isEmpty())
+ return false;
+
+ for (UserIDListIterator it(mUserIDs); it.current(); ++it) {
+ if (((*it)->text().find(str, 0, cs)) != -1)
+ return true;
+ }
+
+ return false;
+}
+
+void Key::addSubkey(const KeyID& keyID, const bool secret)
+{
+ if (!keyID.isEmpty()) {
+ Subkey *key = new Subkey(keyID, secret);
+ mSubkeys.append(key);
+ }
+}
+
+Subkey *Key::getSubkey(const KeyID& keyID)
+{
+ if (keyID.isEmpty() || mSubkeys.isEmpty())
+ return 0;
+
+ // is the given key ID a long (16 chars) or a short (8 chars) key ID?
+ bool longKeyID = (keyID.length() == 16);
+
+ for (SubkeyListIterator it(mSubkeys); it.current(); ++it) {
+ if (longKeyID) {
+ if ((*it)->longKeyID() == keyID)
+ return (*it);
+ }
+ else {
+ if ((*it)->keyID() == keyID)
+ return (*it);
+ }
+ }
+
+ return 0;
+}
+
+void Key::setFingerprint(const KeyID& keyID, const QCString &fpr)
+{
+ Subkey *key;
+ if ((key = getSubkey(keyID)) != 0) {
+ key->setFingerprint(fpr);
+ }
+ else
+ kdDebug(5006) << "Error: Can't set fingerprint. A subkey with key ID 0x"
+ << keyID << " doesn't exist." << endl;
+}
+
+} // namespace Kpgp