[DRE-commits] r1998 - in packages/libgpgme-ruby/trunk: . debian
cilibrar-guest at alioth.debian.org
cilibrar-guest at alioth.debian.org
Tue Oct 23 22:00:03 UTC 2007
Author: cilibrar-guest
Date: 2007-10-23 22:00:03 +0000 (Tue, 23 Oct 2007)
New Revision: 1998
Added:
packages/libgpgme-ruby/trunk/gpgme_n.c
Modified:
packages/libgpgme-ruby/trunk/debian/changelog
Log:
acknowledged fix and incorporated changes
Modified: packages/libgpgme-ruby/trunk/debian/changelog
===================================================================
--- packages/libgpgme-ruby/trunk/debian/changelog 2007-10-22 20:40:29 UTC (rev 1997)
+++ packages/libgpgme-ruby/trunk/debian/changelog 2007-10-23 22:00:03 UTC (rev 1998)
@@ -1,9 +1,16 @@
-libgpgme-ruby (1.0.0-2) UNRELEASED; urgency=low
+libgpgme-ruby (1.0.0-2) unstable; urgency=low
- * NOT RELEASED YET
+ * Thanks to Andreas Barth for fixing broken compilation problem.
- -- Paul van Tilburg <paulvt at debian.org> Wed, 18 Apr 2007 22:36:21 +0200
+ -- Rudi Cilibrasi <cilibrar at cilibrar.com> Tue, 23 Oct 2007 14:55:35 -0700
+libgpgme-ruby (1.0.0-1.1) unstable; urgency=medium
+
+ * Non-maintainer upload.
+ * Fix FTBFS, thanks Michael Ablassmeier. Closes: #427450
+
+ -- Andreas Barth <aba at not.so.argh.org> Mon, 2 Jul 2007 20:27:44 +0000
+
libgpgme-ruby (1.0.0-1) unstable; urgency=low
[ Rudi Cilibrasi ]
Added: packages/libgpgme-ruby/trunk/gpgme_n.c
===================================================================
--- packages/libgpgme-ruby/trunk/gpgme_n.c (rev 0)
+++ packages/libgpgme-ruby/trunk/gpgme_n.c 2007-10-23 22:00:03 UTC (rev 1998)
@@ -0,0 +1,2162 @@
+/* gpgme_n.c -- low level interface to GPGME
+ Copyright (C) 2003,2006 Daiki Ueno
+
+This file is a part of Ruby-GPGME.
+
+This program is free software; you can redistribute it and/or modify
+it under the terms of the GNU General Public License as published by
+the Free Software Foundation; either version 2, or (at your option)
+any later version.
+
+This program is distributed in the hope that it will be useful,
+but WITHOUT ANY WARRANTY; without even the implied warranty of
+MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+GNU General Public License for more details.
+
+You should have received a copy of the GNU General Public License
+along with GNU Emacs; see the file COPYING. If not, write to the
+Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+Boston, MA 02110-1301, USA. */
+
+/* This file is (semi) automatically generated, though it was written
+ by hand. There are simple rules to edit this file.
+
+1. Each symbol exported from this module is either a class, a module
+ function, or a constant. No instance methods are defined here.
+2. Each symbol exported from this module follows the same naming
+ convention as the GPGME API. That is, symbol names are followed
+ by `gpgme_' for functions are followed by `GPGME_' or `GPG_' for
+ constants.
+3. Output arguments are wrapped in arrays. For example, the 1st
+ argument of `gpgme_data_new' has type `gpgme_data_t *' to store the
+ newly created gpgme_data_t object. The corresponding ruby
+ interface uses an empty array to passing it to the caller. */
+
+#include "ruby.h"
+#include "gpgme.h"
+#include <errno.h>
+
+#define RUBY_GPGME_WORKAROUND_KEYLIST_NEXT
+
+#ifdef RUBY_GPGME_WORKAROUND_KEYLIST_NEXT
+#define CHECK_KEYLIST_IN_PROGRESS(vctx) \
+ if (rb_iv_get (vctx, "ruby_gpgme_keylist_in_progress") != Qtrue) \
+ return LONG2NUM(gpgme_error (GPG_ERR_INV_STATE))
+#define CHECK_KEYLIST_NOT_IN_PROGRESS(vctx) \
+ if (rb_iv_get (vctx, "ruby_gpgme_keylist_in_progress") == Qtrue) \
+ return LONG2NUM(gpgme_error (GPG_ERR_INV_STATE))
+#define SET_KEYLIST_IN_PROGRESS(vctx) \
+ rb_iv_set (vctx, "ruby_gpgme_keylist_in_progress", Qtrue)
+#define RESET_KEYLIST_IN_PROGRESS(vctx) \
+ rb_iv_set (vctx, "ruby_gpgme_keylist_in_progress", Qfalse)
+#else
+#define CHECK_KEYLIST_IN_PROGRESS(vctx)
+#define CHECK_KEYLIST_NOT_IN_PROGRESS(vctx)
+#define SET_KEYLIST_IN_PROGRESS(vctx)
+#define RESET_KEYLIST_IN_PROGRESS(vctx)
+#endif
+
+/* StringValuePtr is not available in 1.6. */
+#ifndef StringValuePtr
+#define StringValuePtr(str) RSTRING(str)->ptr
+#endif
+
+/* STR2CSTR is obsoleted in 1.8. */
+#ifndef StringValueCStr
+#define StringValueCStr STR2CSTR
+#endif
+
+/* RARRAY_LEN is not available in 1.8. */
+#ifndef RARRAY_LEN
+#define RARRAY_LEN(a) RARRAY(a)->len
+#endif
+
+/* RARRAY_PTR is not available in 1.8. */
+#ifndef RARRAY_PTR
+#define RARRAY_PTR(a) RARRAY(a)->ptr
+#endif
+
+#define WRAP_GPGME_DATA(dh) \
+ Data_Wrap_Struct(cData, 0, gpgme_data_release, dh) \
+/* `gpgme_data_t' is typedef'ed as `struct gpgme_data *'. */
+#define UNWRAP_GPGME_DATA(vdh, dh) \
+ Data_Get_Struct(vdh, struct gpgme_data, dh);
+
+#define WRAP_GPGME_CTX(ctx) \
+ Data_Wrap_Struct(cCtx, 0, gpgme_release, ctx) \
+/* `gpgme_ctx_t' is typedef'ed as `struct gpgme_context *'. */
+#define UNWRAP_GPGME_CTX(vctx, ctx) \
+ Data_Get_Struct(vctx, struct gpgme_context, ctx)
+
+#define WRAP_GPGME_KEY(key) \
+ Data_Wrap_Struct(cKey, 0, gpgme_key_release, key) \
+/* `gpgme_key_t' is typedef'ed as `struct _gpgme_key *'. */
+#define UNWRAP_GPGME_KEY(vkey, key) \
+ Data_Get_Struct(vkey, struct _gpgme_key, key)
+
+#define WRAP_GPGME_TRUST_ITEM(item) \
+ Data_Wrap_Struct(cTrustItem, 0, gpgme_trust_item_unref, item) \
+/* `gpgme_trust_item_t' is typedef'ed as `struct _gpgme_trust_item *'. */
+#define UNWRAP_GPGME_TRUST_ITEM(vitem, item) \
+ Data_Get_Struct(vitem, struct _gpgme_trust_item, item)
+
+static VALUE cEngineInfo,
+ cCtx,
+ cData,
+ cKey,
+ cSubKey,
+ cUserID,
+ cKeySig,
+ cInvalidKey,
+ cNewSignature,
+ cSignature,
+ cSigNotation,
+ cTrustItem,
+ cDecryptResult,
+ cVerifyResult,
+ cSignResult,
+ cEncryptResult,
+ cImportStatus,
+ cImportResult;
+
+static VALUE
+rb_s_gpgme_check_version (VALUE dummy, VALUE vreq)
+{
+ const char *result = gpgme_check_version (NIL_P(vreq) ? NULL :
+ StringValueCStr(vreq));
+ return result ? rb_str_new2 (result) : Qnil;
+}
+
+static VALUE
+rb_s_gpgme_engine_check_version (VALUE dummy, VALUE vproto)
+{
+ gpgme_error_t err = gpgme_engine_check_version (NUM2INT(vproto));
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_get_engine_info (VALUE dummy, VALUE rinfo)
+{
+ gpgme_engine_info_t info;
+ gpgme_error_t err;
+
+ err = gpgme_get_engine_info (&info);
+ if (gpgme_err_code(err) == GPG_ERR_NO_ERROR)
+ {
+ for (; info; info = info->next)
+ {
+ VALUE vinfo = rb_class_new_instance (0, NULL, cEngineInfo);
+ rb_iv_set (vinfo, "@protocol", INT2FIX(info->protocol));
+ if (info->file_name)
+ rb_iv_set (vinfo, "@file_name", rb_str_new2 (info->file_name));
+ if (info->version)
+ rb_iv_set (vinfo, "@version", rb_str_new2 (info->version));
+ if (info->req_version)
+ rb_iv_set (vinfo, "@req_version", rb_str_new2 (info->req_version));
+ rb_ary_store (rinfo, 0, vinfo);
+ }
+ }
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_pubkey_algo_name (VALUE dummy, VALUE valgo)
+{
+ const char *name = gpgme_pubkey_algo_name (NUM2INT(valgo));
+ if (name)
+ return rb_str_new2 (name);
+ return Qnil;
+}
+
+static VALUE
+rb_s_gpgme_hash_algo_name (VALUE dummy, VALUE valgo)
+{
+ const char *name = gpgme_hash_algo_name (NUM2INT(valgo));
+ if (name)
+ return rb_str_new2 (name);
+ return Qnil;
+}
+
+static VALUE
+rb_s_gpgme_err_code (VALUE dummy, VALUE verr)
+{
+ return INT2FIX(gpgme_err_code (NUM2LONG(verr)));
+}
+
+static VALUE
+rb_s_gpgme_err_source (VALUE dummy, VALUE verr)
+{
+ return INT2FIX(gpgme_err_source (NUM2LONG(verr)));
+}
+
+static VALUE
+rb_s_gpgme_strerror (VALUE dummy, VALUE verr)
+{
+ return rb_str_new2 (gpgme_strerror (NUM2LONG(verr)));
+}
+
+static VALUE
+rb_s_gpgme_data_new (VALUE dummy, VALUE rdh)
+{
+ gpgme_data_t dh;
+ gpgme_error_t err = gpgme_data_new (&dh);
+
+ if (gpgme_err_code(err) == GPG_ERR_NO_ERROR)
+ rb_ary_store (rdh, 0, WRAP_GPGME_DATA(dh));
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_data_new_from_mem (VALUE dummy, VALUE rdh, VALUE vbuffer,
+ VALUE vsize)
+{
+ gpgme_data_t dh;
+ VALUE vdh;
+ size_t size = NUM2UINT(vsize);
+ gpgme_error_t err;
+
+ if (RSTRING_LEN(vbuffer) < size)
+ rb_raise (rb_eArgError, "argument out of range");
+
+ err = gpgme_data_new_from_mem (&dh, StringValuePtr(vbuffer), size, 1);
+ if (gpgme_err_code(err) == GPG_ERR_NO_ERROR)
+ {
+ vdh = WRAP_GPGME_DATA(dh);
+ rb_ary_store (rdh, 0, vdh);
+ }
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_data_new_from_fd (VALUE dummy, VALUE rdh, VALUE vfd)
+{
+ gpgme_data_t dh;
+ gpgme_error_t err = gpgme_data_new_from_fd (&dh, NUM2INT(vfd));
+ if (gpgme_err_code(err) == GPG_ERR_NO_ERROR)
+ rb_ary_store (rdh, 0, WRAP_GPGME_DATA(dh));
+ return LONG2NUM(err);
+}
+
+static ssize_t
+read_cb (void *handle, void *buffer, size_t size)
+{
+ VALUE vcb = (VALUE)handle, vcbs, vhook_value, vbuffer;
+
+ vcbs = RARRAY(vcb)->ptr[0];
+ vhook_value = RARRAY(vcb)->ptr[1];
+
+ vbuffer = rb_funcall (vcbs, rb_intern ("read"), 2, vhook_value,
+ LONG2NUM(size));
+ if (NIL_P(vbuffer))
+ return 0;
+ memcpy (buffer, StringValuePtr(vbuffer), RSTRING_LEN(vbuffer));
+ return RSTRING_LEN(vbuffer);
+}
+
+static ssize_t
+write_cb (void *handle, const void *buffer, size_t size)
+{
+ VALUE vcb = (VALUE)handle, vcbs, vhook_value, vbuffer, vnwrite;
+
+ vcbs = RARRAY(vcb)->ptr[0];
+ vhook_value = RARRAY(vcb)->ptr[1];
+ vbuffer = rb_str_new (buffer, size);
+
+ vnwrite = rb_funcall (vcbs, rb_intern ("write"), 3,
+ vhook_value, vbuffer, LONG2NUM(size));
+ return NUM2LONG(vnwrite);
+}
+
+static off_t
+seek_cb (void *handle, off_t offset, int whence)
+{
+ VALUE vcb = (VALUE)handle, vcbs, vhook_value, vpos;
+ ID id_seek = rb_intern ("seek");
+
+ vcbs = RARRAY(vcb)->ptr[0];
+ vhook_value = RARRAY(vcb)->ptr[1];
+
+ if (rb_respond_to (vcbs, id_seek))
+ {
+ vpos = rb_funcall (vcbs, id_seek, 3,
+ vhook_value, LONG2NUM(offset), INT2FIX(whence));
+ return NUM2LONG(vpos);
+ }
+ errno = ENOSYS;
+ return -1;
+}
+
+static struct gpgme_data_cbs cbs =
+ {
+ .read = read_cb,
+ .write = write_cb,
+ .seek = seek_cb,
+ .release = NULL
+ };
+
+static VALUE
+rb_s_gpgme_data_new_from_cbs (VALUE dummy, VALUE rdh, VALUE vcbs,
+ VALUE vhandle)
+{
+ gpgme_data_t dh;
+ gpgme_error_t err;
+ VALUE vcbs_handle = rb_ary_new ();
+
+ rb_ary_push (vcbs_handle, vcbs);
+ rb_ary_push (vcbs_handle, vhandle);
+
+ err = gpgme_data_new_from_cbs (&dh, &cbs, (void*)vcbs_handle);
+ if (gpgme_err_code(err) == GPG_ERR_NO_ERROR)
+ {
+ VALUE vdh = WRAP_GPGME_DATA(dh);
+ /* Keep a reference to avoid GC. */
+ rb_iv_set (vdh, "@cbs_handle", vcbs_handle);
+ rb_ary_store (rdh, 0, vdh);
+ }
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_data_read (VALUE dummy, VALUE vdh, VALUE vlength)
+{
+ gpgme_data_t dh;
+ ssize_t length = NUM2LONG(vlength), nread;
+ void *buffer;
+ VALUE vbuffer = Qnil;
+
+ UNWRAP_GPGME_DATA(vdh, dh);
+
+ buffer = ALLOC_N (char, length);
+ nread = gpgme_data_read (dh, buffer, length);
+ if (nread > 0)
+ vbuffer = rb_str_new (buffer, nread);
+ xfree (buffer);
+ if (nread < 0)
+ rb_sys_fail ("rb_s_gpgme_data_read");
+ return vbuffer;
+}
+
+static VALUE
+rb_s_gpgme_data_seek (VALUE dummy, VALUE vdh, VALUE voffset, VALUE vwhence)
+{
+ gpgme_data_t dh;
+ off_t pos;
+
+ UNWRAP_GPGME_DATA(vdh, dh);
+ pos = gpgme_data_seek (dh, NUM2LONG(voffset), NUM2INT(vwhence));
+ if (pos < 0)
+ rb_sys_fail ("rb_s_gpgme_data_seek");
+ return LONG2NUM(pos);
+}
+
+static VALUE
+rb_s_gpgme_data_write (VALUE dummy, VALUE vdh, VALUE vbuf, VALUE vlen)
+{
+ gpgme_data_t dh;
+ ssize_t nwrite;
+
+ UNWRAP_GPGME_DATA(vdh, dh);
+ nwrite = gpgme_data_write (dh, StringValuePtr(vbuf), NUM2UINT(vlen));
+ if (nwrite < 0)
+ rb_sys_fail ("rb_s_gpgme_data_write");
+ return LONG2NUM(nwrite);
+}
+
+static VALUE
+rb_s_gpgme_data_get_encoding (VALUE dummy, VALUE vdh)
+{
+ gpgme_data_t dh;
+ gpgme_error_t err;
+
+ UNWRAP_GPGME_DATA(vdh, dh);
+ err = gpgme_data_get_encoding (dh);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_data_set_encoding (VALUE dummy, VALUE vdh, VALUE venc)
+{
+ gpgme_data_t dh;
+ gpgme_error_t err;
+
+ UNWRAP_GPGME_DATA(vdh, dh);
+ err = gpgme_data_set_encoding (dh, NUM2INT(venc));
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_new (VALUE dummy, VALUE rctx)
+{
+ gpgme_ctx_t ctx;
+ gpgme_error_t err = gpgme_new (&ctx);
+
+ if (gpgme_err_code(err) == GPG_ERR_NO_ERROR)
+ rb_ary_store (rctx, 0, WRAP_GPGME_CTX(ctx));
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_set_protocol (VALUE dummy, VALUE vctx, VALUE vproto)
+{
+ gpgme_ctx_t ctx;
+ gpgme_error_t err;
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ err = gpgme_set_protocol (ctx, NUM2INT(vproto));
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_get_protocol (VALUE dummy, VALUE vctx)
+{
+ gpgme_ctx_t ctx;
+ gpgme_protocol_t proto;
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ proto = gpgme_get_protocol (ctx);
+ return INT2FIX(proto);
+}
+
+static VALUE
+rb_s_gpgme_set_armor (VALUE dummy, VALUE vctx, VALUE vyes)
+{
+ gpgme_ctx_t ctx;
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ gpgme_set_armor (ctx, NUM2INT(vyes));
+
+ return Qnil;
+}
+
+static VALUE
+rb_s_gpgme_get_armor (VALUE dummy, VALUE vctx)
+{
+ gpgme_ctx_t ctx;
+ int yes;
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ yes = gpgme_get_armor (ctx);
+ return INT2FIX(yes);
+}
+
+static VALUE
+rb_s_gpgme_set_textmode (VALUE dummy, VALUE vctx, VALUE vyes)
+{
+ gpgme_ctx_t ctx;
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ gpgme_set_textmode (ctx, NUM2INT(vyes));
+ return Qnil;
+}
+
+static VALUE
+rb_s_gpgme_get_textmode (VALUE dummy, VALUE vctx)
+{
+ gpgme_ctx_t ctx;
+ int yes;
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ yes = gpgme_get_textmode (ctx);
+ return INT2FIX(yes);
+}
+
+static VALUE
+rb_s_gpgme_set_include_certs (VALUE dummy, VALUE vctx, VALUE vnr_of_certs)
+{
+ gpgme_ctx_t ctx;
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ gpgme_set_include_certs (ctx, NUM2INT(vnr_of_certs));
+ return Qnil;
+}
+
+static VALUE
+rb_s_gpgme_get_include_certs (VALUE dummy, VALUE vctx)
+{
+ gpgme_ctx_t ctx;
+ gpgme_error_t err;
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ err = gpgme_get_include_certs (ctx);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_set_keylist_mode (VALUE dummy, VALUE vctx, VALUE vmode)
+{
+ gpgme_ctx_t ctx;
+ gpgme_error_t err;
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ err = gpgme_set_keylist_mode (ctx, NUM2INT(vmode));
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_get_keylist_mode (VALUE dummy, VALUE vctx)
+{
+ gpgme_ctx_t ctx;
+ int mode;
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ mode = gpgme_get_keylist_mode (ctx);
+ return INT2FIX(mode);
+}
+
+static gpgme_error_t
+passphrase_cb (void *hook, const char *uid_hint, const char *passphrase_info,
+ int prev_was_bad, int fd)
+{
+ VALUE vcb = (VALUE)hook, vpassfunc, vhook_value;
+
+ vpassfunc = RARRAY(vcb)->ptr[0];
+ vhook_value = RARRAY(vcb)->ptr[1];
+
+ rb_funcall (vpassfunc, rb_intern ("call"), 5,
+ vhook_value,
+ uid_hint ? rb_str_new2 (uid_hint) : Qnil,
+ passphrase_info ? rb_str_new2 (passphrase_info) : Qnil,
+ INT2FIX(prev_was_bad),
+ INT2NUM(fd));
+ return gpgme_err_make (GPG_ERR_SOURCE_USER_1, GPG_ERR_NO_ERROR);
+}
+
+static VALUE
+rb_s_gpgme_set_passphrase_cb (VALUE dummy, VALUE vctx, VALUE vpassfunc,
+ VALUE vhook_value)
+{
+ gpgme_ctx_t ctx;
+ VALUE vcb = rb_ary_new ();
+
+ rb_ary_push (vcb, vpassfunc);
+ rb_ary_push (vcb, vhook_value);
+ /* Keep a reference to avoid GC. */
+ rb_iv_set (vctx, "@passphrase_cb", vcb);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ gpgme_set_passphrase_cb (ctx, passphrase_cb, (void*)vcb);
+ return Qnil;
+}
+
+static VALUE
+rb_s_gpgme_get_passphrase_cb (VALUE dummy, VALUE vctx, VALUE rpassfunc,
+ VALUE rhook_value)
+{
+ VALUE vcb = rb_iv_get (vctx, "@passphrase_cb");
+
+ /* No need to call gpgme_get_passphrase_cb. */
+ rb_ary_store (rpassfunc, 0, RARRAY(vcb)->ptr[0]);
+ rb_ary_store (rhook_value, 0, RARRAY(vcb)->ptr[1]);
+ return Qnil;
+}
+
+static void
+progress_cb (void *hook, const char *what, int type, int current, int total)
+{
+ VALUE vcb = (VALUE)hook, vprogfunc, vhook_value;
+
+ vprogfunc = RARRAY(vcb)->ptr[0];
+ vhook_value = RARRAY(vcb)->ptr[1];
+
+ rb_funcall (vprogfunc, rb_intern ("call"), 5, vhook_value,
+ rb_str_new2 (what), INT2NUM(type), INT2NUM(current),
+ INT2NUM(total));
+}
+
+static VALUE
+rb_s_gpgme_set_progress_cb (VALUE dummy, VALUE vctx, VALUE vprogfunc,
+ VALUE vhook_value)
+{
+ gpgme_ctx_t ctx;
+ VALUE vcb = rb_ary_new ();
+
+ rb_ary_push (vcb, vprogfunc);
+ rb_ary_push (vcb, vhook_value);
+ /* Keep a reference to avoid GC. */
+ rb_iv_set (vctx, "@progress_cb", vcb);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ gpgme_set_progress_cb (ctx, progress_cb, (void*)vcb);
+
+ return Qnil;
+}
+
+static VALUE
+rb_s_gpgme_get_progress_cb (VALUE dummy, VALUE vctx, VALUE rprogfunc,
+ VALUE rhook_value)
+{
+ VALUE vcb = rb_iv_get (vctx, "@progress_cb");
+ rb_ary_store (rprogfunc, 0, RARRAY(vcb)->ptr[0]);
+ rb_ary_store (rhook_value, 0, RARRAY(vcb)->ptr[1]);
+ return Qnil;
+}
+
+static VALUE
+rb_s_gpgme_set_locale (VALUE dummy, VALUE vctx, VALUE vcategory, VALUE vvalue)
+{
+ gpgme_ctx_t ctx;
+ gpgme_error_t err;
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+
+ err = gpgme_set_locale (ctx, NUM2INT(vcategory), StringValueCStr(vvalue));
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_keylist_start (VALUE dummy, VALUE vctx, VALUE vpattern,
+ VALUE vsecret_only)
+{
+ gpgme_ctx_t ctx;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+
+ err = gpgme_op_keylist_start (ctx, NIL_P(vpattern) ? NULL :
+ StringValueCStr(vpattern),
+ NUM2INT(vsecret_only));
+ if (gpgme_err_code (err) == GPG_ERR_NO_ERROR)
+ SET_KEYLIST_IN_PROGRESS(vctx);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_keylist_ext_start (VALUE dummy, VALUE vctx, VALUE vpattern,
+ VALUE vsecret_only)
+{
+ gpgme_ctx_t ctx;
+ const char **pattern = NULL;
+ int i, err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+
+ if (!NIL_P(vpattern))
+ {
+ /* Convert RARRAY into `const char *' array. */
+ pattern = ALLOC_N(const char *, RARRAY_LEN(vpattern) + 1);
+ for (i = 0; i<RARRAY_LEN(vpattern); i++)
+ pattern[i] = StringValueCStr(RARRAY_PTR(vpattern)[i]);
+ pattern[RARRAY_LEN(vpattern)] = NULL;
+ }
+
+ err = gpgme_op_keylist_ext_start (ctx, pattern, NUM2INT(vsecret_only), 0);
+ if (gpgme_err_code (err) == GPG_ERR_NO_ERROR)
+ SET_KEYLIST_IN_PROGRESS(vctx);
+ if (pattern)
+ xfree (pattern);
+ return LONG2NUM(err);
+}
+
+static VALUE
+save_gpgme_key_attrs (VALUE vkey, gpgme_key_t key)
+{
+ VALUE vsubkeys, vuids;
+ gpgme_subkey_t subkey;
+ gpgme_user_id_t user_id;
+
+ rb_iv_set (vkey, "@keylist_mode", INT2FIX(key->keylist_mode));
+ rb_iv_set (vkey, "@revoked", INT2FIX(key->revoked));
+ rb_iv_set (vkey, "@expired", INT2FIX(key->expired));
+ rb_iv_set (vkey, "@disabled", INT2FIX(key->disabled));
+ rb_iv_set (vkey, "@invalid", INT2FIX(key->invalid));
+ rb_iv_set (vkey, "@can_encrypt", INT2FIX(key->can_encrypt));
+ rb_iv_set (vkey, "@can_sign", INT2FIX(key->can_sign));
+ rb_iv_set (vkey, "@can_certify", INT2FIX(key->can_certify));
+ rb_iv_set (vkey, "@can_authenticate", INT2FIX(key->can_authenticate));
+ rb_iv_set (vkey, "@secret", INT2FIX(key->secret));
+ rb_iv_set (vkey, "@protocol", INT2FIX(key->protocol));
+ if (key->issuer_serial)
+ rb_iv_set (vkey, "@issuer_serial", rb_str_new2 (key->issuer_serial));
+ if (key->issuer_name)
+ rb_iv_set (vkey, "@issuer_name", rb_str_new2 (key->issuer_name));
+ if (key->chain_id)
+ rb_iv_set (vkey, "@chain_id", rb_str_new2 (key->chain_id));
+ rb_iv_set (vkey, "@owner_trust", INT2FIX(key->owner_trust));
+ vsubkeys = rb_ary_new ();
+ rb_iv_set (vkey, "@subkeys", vsubkeys);
+ for (subkey = key->subkeys; subkey; subkey = subkey->next)
+ {
+ VALUE vsubkey = rb_class_new_instance(0, NULL, cSubKey);
+ rb_iv_set (vsubkey, "@revoked", INT2FIX(subkey->revoked));
+ rb_iv_set (vsubkey, "@expired", INT2FIX(subkey->expired));
+ rb_iv_set (vsubkey, "@disabled", INT2FIX(subkey->disabled));
+ rb_iv_set (vsubkey, "@invalid", INT2FIX(subkey->invalid));
+ rb_iv_set (vsubkey, "@can_encrypt", INT2FIX(subkey->can_encrypt));
+ rb_iv_set (vsubkey, "@can_sign", INT2FIX(subkey->can_sign));
+ rb_iv_set (vsubkey, "@can_certify", INT2FIX(subkey->can_certify));
+ rb_iv_set (vsubkey, "@can_authenticate",
+ INT2FIX(subkey->can_authenticate));
+ rb_iv_set (vsubkey, "@secret", INT2FIX(subkey->secret));
+ rb_iv_set (vsubkey, "@pubkey_algo", INT2FIX(subkey->pubkey_algo));
+ rb_iv_set (vsubkey, "@length", UINT2NUM(subkey->length));
+ rb_iv_set (vsubkey, "@keyid", rb_str_new2 (subkey->keyid));
+ if (subkey->fpr)
+ rb_iv_set (vsubkey, "@fpr", rb_str_new2 (subkey->fpr));
+ rb_iv_set (vsubkey, "@timestamp", LONG2NUM(subkey->timestamp));
+ rb_iv_set (vsubkey, "@expires", LONG2NUM(subkey->expires));
+ rb_ary_push (vsubkeys, vsubkey);
+ }
+ vuids = rb_ary_new ();
+ rb_iv_set (vkey, "@uids", vuids);
+ for (user_id = key->uids; user_id; user_id = user_id->next)
+ {
+ VALUE vuser_id = rb_class_new_instance(0, NULL, cUserID), vsignatures;
+ rb_iv_set (vuser_id, "@revoked", INT2FIX(user_id->revoked));
+ rb_iv_set (vuser_id, "@invalid", INT2FIX(user_id->invalid));
+ rb_iv_set (vuser_id, "@validity", INT2FIX(user_id->validity));
+ rb_iv_set (vuser_id, "@uid", rb_str_new2 (user_id->uid));
+ rb_iv_set (vuser_id, "@name", rb_str_new2 (user_id->name));
+ rb_iv_set (vuser_id, "@comment", rb_str_new2 (user_id->comment));
+ rb_iv_set (vuser_id, "@email", rb_str_new2 (user_id->email));
+
+ vsignatures = rb_ary_new ();
+ rb_iv_set (vuser_id, "@signatures", vsignatures);
+ gpgme_key_sig_t key_sig;
+ for (key_sig = user_id->signatures; key_sig; key_sig = key_sig->next)
+ {
+ VALUE vkey_sig = rb_class_new_instance(0, NULL, cKeySig);
+ rb_iv_set (vkey_sig, "@revoked", INT2FIX(key_sig->revoked));
+ rb_iv_set (vkey_sig, "@expired", INT2FIX(key_sig->expired));
+ rb_iv_set (vkey_sig, "@invalid", INT2FIX(key_sig->invalid));
+ rb_iv_set (vkey_sig, "@exportable", INT2FIX(key_sig->exportable));
+ rb_iv_set (vkey_sig, "@pubkey_algo", INT2FIX(key_sig->pubkey_algo));
+ rb_iv_set (vkey_sig, "@keyid", rb_str_new2 (key_sig->keyid));
+ rb_iv_set (vkey_sig, "@timestamp", LONG2NUM(key_sig->timestamp));
+ rb_iv_set (vkey_sig, "@expires", LONG2NUM(key_sig->expires));
+ rb_ary_push (vsignatures, vkey_sig);
+ }
+ rb_ary_push (vuids, vuser_id);
+ }
+ return vkey;
+}
+
+static VALUE
+rb_s_gpgme_op_keylist_next (VALUE dummy, VALUE vctx, VALUE rkey)
+{
+ gpgme_ctx_t ctx;
+ gpgme_key_t key;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+
+ err = gpgme_op_keylist_next (ctx, &key);
+ if (gpgme_err_code(err) == GPG_ERR_NO_ERROR)
+ {
+ VALUE vkey = WRAP_GPGME_KEY(key);
+ save_gpgme_key_attrs (vkey, key);
+ rb_ary_store (rkey, 0, vkey);
+ }
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_keylist_end (VALUE dummy, VALUE vctx)
+{
+ gpgme_ctx_t ctx;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+
+ err = gpgme_op_keylist_end (ctx);
+ RESET_KEYLIST_IN_PROGRESS(vctx);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_get_key (VALUE dummy, VALUE vctx, VALUE vfpr, VALUE rkey,
+ VALUE vsecret)
+{
+ gpgme_ctx_t ctx;
+ gpgme_error_t err;
+ gpgme_key_t key;
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ err = gpgme_get_key (ctx, StringValueCStr(vfpr), &key, NUM2INT(vsecret));
+
+ if (gpgme_err_code(err) == GPG_ERR_NO_ERROR)
+ {
+ VALUE vkey = WRAP_GPGME_KEY(key);
+ save_gpgme_key_attrs (vkey, key);
+ rb_ary_store (rkey, 0, vkey);
+ }
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_key_ref (VALUE dummy, VALUE vkey)
+{
+ gpgme_key_t key;
+
+ UNWRAP_GPGME_KEY(vkey, key);
+ gpgme_key_ref (key);
+ return Qnil;
+}
+
+static VALUE
+rb_s_gpgme_key_unref (VALUE dummy, VALUE vkey)
+{
+ gpgme_key_t key;
+
+ UNWRAP_GPGME_KEY(vkey, key);
+ gpgme_key_unref (key);
+ return Qnil;
+}
+
+static VALUE
+rb_s_gpgme_op_genkey (VALUE dummy, VALUE vctx, VALUE vparms, VALUE vpubkey,
+ VALUE vseckey)
+{
+ gpgme_ctx_t ctx;
+ gpgme_data_t pubkey = NULL, seckey = NULL;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ if (!NIL_P(vpubkey))
+ UNWRAP_GPGME_DATA(vpubkey, pubkey);
+ if (!NIL_P(vseckey))
+ UNWRAP_GPGME_DATA(vseckey, seckey);
+
+ err = gpgme_op_genkey (ctx, StringValueCStr(vparms), pubkey, seckey);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_genkey_start (VALUE dummy, VALUE vctx, VALUE vparms,
+ VALUE vpubkey, VALUE vseckey)
+{
+ gpgme_ctx_t ctx;
+ gpgme_data_t pubkey = NULL, seckey = NULL;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ if (!NIL_P(vpubkey))
+ UNWRAP_GPGME_DATA(vpubkey, pubkey);
+ if (!NIL_P(vseckey))
+ UNWRAP_GPGME_DATA(vseckey, seckey);
+
+ err = gpgme_op_genkey_start (ctx, StringValueCStr(vparms), pubkey, seckey);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_export (VALUE dummy, VALUE vctx, VALUE vpattern, VALUE vreserved,
+ VALUE vkeydata)
+{
+ gpgme_ctx_t ctx;
+ gpgme_data_t keydata;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ UNWRAP_GPGME_DATA(vkeydata, keydata);
+
+ err = gpgme_op_export (ctx, StringValueCStr(vpattern), NUM2UINT(vreserved),
+ keydata);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_export_start (VALUE dummy, VALUE vctx, VALUE vpattern,
+ VALUE vreserved, VALUE vkeydata)
+{
+ gpgme_ctx_t ctx;
+ gpgme_data_t keydata;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ UNWRAP_GPGME_DATA(vkeydata, keydata);
+
+ err = gpgme_op_export_start (ctx, StringValueCStr(vpattern),
+ NUM2UINT(vreserved), keydata);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_import (VALUE dummy, VALUE vctx, VALUE vkeydata)
+{
+ gpgme_ctx_t ctx;
+ gpgme_data_t keydata;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ UNWRAP_GPGME_DATA(vkeydata, keydata);
+
+ err = gpgme_op_import (ctx, keydata);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_import_start (VALUE dummy, VALUE vctx, VALUE vkeydata)
+{
+ gpgme_ctx_t ctx;
+ gpgme_data_t keydata;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ UNWRAP_GPGME_DATA(vkeydata, keydata);
+
+ err = gpgme_op_import_start (ctx, keydata);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_import_result (VALUE dummy, VALUE vctx)
+{
+ gpgme_ctx_t ctx;
+ gpgme_import_result_t result;
+ gpgme_import_status_t status;
+ VALUE vresult, vimports;
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+
+ result = gpgme_op_import_result (ctx);
+ vresult = rb_class_new_instance (0, NULL, cImportResult);
+ rb_iv_set (vresult, "@considered", INT2NUM(result->considered));
+ rb_iv_set (vresult, "@no_user_id", INT2NUM(result->no_user_id));
+ rb_iv_set (vresult, "@imported", INT2NUM(result->imported));
+ rb_iv_set (vresult, "@imported_rsa", INT2NUM(result->imported_rsa));
+ rb_iv_set (vresult, "@unchanged", INT2NUM(result->unchanged));
+ rb_iv_set (vresult, "@new_user_ids", INT2NUM(result->new_user_ids));
+ rb_iv_set (vresult, "@new_sub_keys", INT2NUM(result->new_sub_keys));
+ rb_iv_set (vresult, "@new_signatures", INT2NUM(result->new_signatures));
+ rb_iv_set (vresult, "@new_revocations", INT2NUM(result->new_revocations));
+ rb_iv_set (vresult, "@secret_read", INT2NUM(result->secret_read));
+ rb_iv_set (vresult, "@secret_imported", INT2NUM(result->secret_imported));
+ rb_iv_set (vresult, "@secret_unchanged", INT2NUM(result->secret_unchanged));
+ rb_iv_set (vresult, "@not_imported", INT2NUM(result->not_imported));
+ vimports = rb_ary_new ();
+ rb_iv_set (vresult, "@imports", vimports);
+ for (status = result->imports; status;
+ status = status->next)
+ {
+ VALUE vstatus =
+ rb_class_new_instance (0, NULL, cImportStatus);
+ rb_iv_set (vstatus, "@fpr", rb_str_new2 (status->fpr));
+ rb_iv_set (vstatus, "@result", LONG2NUM(status->result));
+ rb_iv_set (vstatus, "@status", UINT2NUM(status->status));
+ rb_ary_push (vimports, vstatus);
+ }
+ return vresult;
+}
+
+static VALUE
+rb_s_gpgme_op_delete (VALUE dummy, VALUE vctx, VALUE vkey, VALUE vallow_secret)
+{
+ gpgme_ctx_t ctx;
+ gpgme_key_t key;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ UNWRAP_GPGME_KEY(vkey, key);
+
+ err = gpgme_op_delete (ctx, key, NUM2INT(vallow_secret));
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_delete_start (VALUE dummy, VALUE vctx, VALUE vkey,
+ VALUE vallow_secret)
+{
+ gpgme_ctx_t ctx;
+ gpgme_key_t key;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ UNWRAP_GPGME_KEY(vkey, key);
+
+ err = gpgme_op_delete_start (ctx, key, NUM2INT(vallow_secret));
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_trustlist_start (VALUE dummy, VALUE vctx, VALUE vpattern,
+ VALUE vmax_level)
+{
+ gpgme_ctx_t ctx;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ err = gpgme_op_trustlist_start (ctx, StringValueCStr(vpattern),
+ NUM2INT(vmax_level));
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_trustlist_next (VALUE dummy, VALUE vctx, VALUE ritem)
+{
+ gpgme_ctx_t ctx;
+ gpgme_trust_item_t item;
+ gpgme_error_t err;
+ VALUE vitem;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+
+ err = gpgme_op_trustlist_next (ctx, &item);
+ if (gpgme_err_code(err) == GPG_ERR_NO_ERROR)
+ {
+ vitem = WRAP_GPGME_TRUST_ITEM(item);
+ rb_iv_set (vitem, "@keyid", rb_str_new2 (item->keyid));
+ rb_iv_set (vitem, "@type", INT2FIX(item->type));
+ rb_iv_set (vitem, "@level", INT2FIX(item->level));
+ if (item->owner_trust)
+ rb_iv_set (vitem, "@owner_trust", rb_str_new2 (item->owner_trust));
+ rb_iv_set (vitem, "@validity", rb_str_new2 (item->validity));
+ if (item->name)
+ rb_iv_set (vitem, "@name", rb_str_new2 (item->name));
+ rb_ary_store (ritem, 0, vitem);
+ }
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_trustlist_end (VALUE dummy, VALUE vctx)
+{
+ gpgme_ctx_t ctx;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+
+ err = gpgme_op_trustlist_end (ctx);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_decrypt (VALUE dummy, VALUE vctx, VALUE vcipher, VALUE vplain)
+{
+ gpgme_ctx_t ctx;
+ gpgme_data_t cipher, plain;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ UNWRAP_GPGME_DATA(vcipher, cipher);
+ UNWRAP_GPGME_DATA(vplain, plain);
+
+ err = gpgme_op_decrypt (ctx, cipher, plain);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_decrypt_start (VALUE dummy, VALUE vctx, VALUE vcipher,
+ VALUE vplain)
+{
+ gpgme_ctx_t ctx;
+ gpgme_data_t cipher, plain;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ UNWRAP_GPGME_DATA(vcipher, cipher);
+ UNWRAP_GPGME_DATA(vplain, plain);
+
+ err = gpgme_op_decrypt_start (ctx, cipher, plain);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_decrypt_result (VALUE dummy, VALUE vctx)
+{
+ gpgme_ctx_t ctx;
+ gpgme_decrypt_result_t result;
+ VALUE vresult;
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+
+ result = gpgme_op_decrypt_result (ctx);
+ vresult = rb_class_new_instance (0, NULL, cDecryptResult);
+ if (result->unsupported_algorithm)
+ rb_iv_set (vresult, "@unsupported_algorithm",
+ rb_str_new2 (result->unsupported_algorithm));
+ rb_iv_set (vresult, "@wrong_key_usage", INT2FIX(result->wrong_key_usage));
+ return vresult;
+}
+
+static VALUE
+rb_s_gpgme_op_verify (VALUE dummy, VALUE vctx, VALUE vsig, VALUE vsigned_text,
+ VALUE vplain)
+{
+ gpgme_ctx_t ctx;
+ gpgme_data_t sig, signed_text = NULL, plain = NULL;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ UNWRAP_GPGME_DATA(vsig, sig);
+ if (!NIL_P(vsigned_text))
+ UNWRAP_GPGME_DATA(vsigned_text, signed_text);
+ if (!NIL_P(vplain))
+ UNWRAP_GPGME_DATA(vplain, plain);
+
+ err = gpgme_op_verify (ctx, sig, signed_text, plain);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_verify_start (VALUE dummy, VALUE vctx, VALUE vsig,
+ VALUE vsigned_text, VALUE vplain)
+{
+ gpgme_ctx_t ctx;
+ gpgme_data_t sig, signed_text = NULL, plain = NULL;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ UNWRAP_GPGME_DATA(vsig, sig);
+ if (!NIL_P(vsigned_text))
+ UNWRAP_GPGME_DATA(vsigned_text, signed_text);
+ if (!NIL_P(vplain))
+ UNWRAP_GPGME_DATA(vplain, plain);
+
+ err = gpgme_op_verify_start (ctx, sig, signed_text, plain);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_verify_result (VALUE dummy, VALUE vctx)
+{
+ gpgme_ctx_t ctx;
+ gpgme_verify_result_t verify_result;
+ gpgme_signature_t signature;
+ VALUE vverify_result, vsignatures = rb_ary_new ();
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+
+ verify_result = gpgme_op_verify_result (ctx);
+ vverify_result = rb_class_new_instance(0, NULL, cVerifyResult);
+ rb_iv_set (vverify_result, "@signatures", vsignatures);
+ for (signature = verify_result->signatures; signature;
+ signature = signature->next)
+ {
+ VALUE vsignature = rb_class_new_instance(0, NULL, cSignature),
+ vnotations = rb_ary_new ();
+ gpgme_sig_notation_t notation;
+ rb_iv_set (vsignature, "@summary", INT2FIX(signature->summary));
+ rb_iv_set (vsignature, "@fpr", rb_str_new2 (signature->fpr));
+ rb_iv_set (vsignature, "@status", LONG2NUM(signature->status));
+ rb_iv_set (vsignature, "@notations", vnotations);
+ for (notation = signature->notations; notation;
+ notation = notation->next)
+ {
+ VALUE vnotation = rb_class_new_instance(0, NULL, cSigNotation);
+ rb_iv_set (vnotation, "@name", rb_str_new2 (notation->name));
+ rb_iv_set (vnotation, "@value", rb_str_new2 (notation->value));
+ rb_ary_push (vnotations, vnotation);
+ }
+ rb_iv_set (vsignature, "@timestamp", ULONG2NUM(signature->timestamp));
+ rb_iv_set (vsignature, "@exp_timestamp",
+ ULONG2NUM(signature->exp_timestamp));
+ rb_iv_set (vsignature, "@wrong_key_usage",
+ INT2FIX(signature->wrong_key_usage));
+ rb_iv_set (vsignature, "@validity", INT2FIX(signature->validity));
+ rb_iv_set (vsignature, "@validity_reason",
+ LONG2NUM(signature->validity_reason));
+ rb_ary_push (vsignatures, vsignature);
+ }
+ return vverify_result;
+}
+
+static VALUE
+rb_s_gpgme_op_decrypt_verify (VALUE dummy, VALUE vctx, VALUE vcipher,
+ VALUE vplain)
+{
+ gpgme_ctx_t ctx;
+ gpgme_data_t cipher, plain;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ UNWRAP_GPGME_DATA(vcipher, cipher);
+ UNWRAP_GPGME_DATA(vplain, plain);
+
+ err = gpgme_op_decrypt_verify (ctx, cipher, plain);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_decrypt_verify_start (VALUE dummy, VALUE vctx, VALUE vcipher,
+ VALUE vplain)
+{
+ gpgme_ctx_t ctx;
+ gpgme_data_t cipher, plain;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ UNWRAP_GPGME_DATA(vcipher, cipher);
+ UNWRAP_GPGME_DATA(vplain, plain);
+
+ err = gpgme_op_decrypt_verify_start (ctx, cipher, plain);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_signers_clear (VALUE dummy, VALUE vctx)
+{
+ gpgme_ctx_t ctx;
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ gpgme_signers_clear (ctx);
+ return Qnil;
+}
+
+static VALUE
+rb_s_gpgme_signers_add (VALUE dummy, VALUE vctx, VALUE vkey)
+{
+ gpgme_ctx_t ctx;
+ gpgme_key_t key;
+ gpgme_error_t err;
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ UNWRAP_GPGME_KEY(vkey, key);
+
+ err = gpgme_signers_add (ctx, key);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_signers_enum (VALUE dummy, VALUE vctx, VALUE vseq)
+{
+ gpgme_ctx_t ctx;
+ gpgme_key_t key;
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+
+ key = gpgme_signers_enum (ctx, NUM2INT(vseq));
+ if (!key)
+ return Qnil;
+ return WRAP_GPGME_KEY(key);
+}
+
+static VALUE
+rb_s_gpgme_op_sign (VALUE dummy, VALUE vctx, VALUE vplain, VALUE vsig,
+ VALUE vmode)
+{
+ gpgme_ctx_t ctx;
+ gpgme_data_t plain, sig;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ UNWRAP_GPGME_DATA(vplain, plain);
+ UNWRAP_GPGME_DATA(vsig, sig);
+
+ err = gpgme_op_sign (ctx, plain, sig, NUM2INT(vmode));
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_sign_start (VALUE dummy, VALUE vctx, VALUE vplain, VALUE vsig,
+ VALUE vmode)
+{
+ gpgme_ctx_t ctx;
+ gpgme_data_t plain, sig;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ UNWRAP_GPGME_DATA(vplain, plain);
+ UNWRAP_GPGME_DATA(vsig, sig);
+
+ err = gpgme_op_sign_start (ctx, plain, sig, NUM2INT(vmode));
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_sign_result (VALUE dummy, VALUE vctx)
+{
+ gpgme_ctx_t ctx;
+ gpgme_sign_result_t result;
+ gpgme_invalid_key_t invalid_key;
+ gpgme_new_signature_t new_signature;
+ VALUE vresult, vinvalid_signers, vsignatures;
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+
+ result = gpgme_op_sign_result (ctx);
+ vresult = rb_class_new_instance (0, NULL, cSignResult);
+ vinvalid_signers = rb_ary_new ();
+ rb_iv_set (vresult, "@invalid_signers", vinvalid_signers);
+ for (invalid_key = result->invalid_signers; invalid_key;
+ invalid_key = invalid_key->next)
+ {
+ VALUE vinvalid_key =
+ rb_class_new_instance (0, NULL, cInvalidKey);
+ rb_iv_set (vinvalid_key, "@fpr", rb_str_new2 (invalid_key->fpr));
+ rb_iv_set (vinvalid_key, "@reason", LONG2NUM(invalid_key->reason));
+ rb_ary_push (vinvalid_signers, vinvalid_key);
+ }
+ vsignatures = rb_ary_new ();
+ rb_iv_set (vresult, "@signatures", vsignatures);
+ for (new_signature = result->signatures; new_signature;
+ new_signature = new_signature->next)
+ {
+ VALUE vnew_signature =
+ rb_class_new_instance (0, NULL, cNewSignature);
+ rb_iv_set (vnew_signature, "@type", INT2FIX(new_signature->type));
+ rb_iv_set (vnew_signature, "@pubkey_algo",
+ INT2FIX(new_signature->pubkey_algo));
+ rb_iv_set (vnew_signature, "@hash_algo",
+ INT2FIX(new_signature->hash_algo));
+ rb_iv_set (vnew_signature, "@sig_class",
+ UINT2NUM(new_signature->sig_class));
+ rb_iv_set (vnew_signature, "@timestamp",
+ LONG2NUM(new_signature->timestamp));
+ rb_iv_set (vnew_signature, "@fpr", rb_str_new2 (new_signature->fpr));
+ rb_ary_push (vsignatures, vnew_signature);
+ }
+ return vresult;
+}
+
+static VALUE
+rb_s_gpgme_op_encrypt (VALUE dummy, VALUE vctx, VALUE vrecp, VALUE vflags,
+ VALUE vplain, VALUE vcipher)
+{
+ gpgme_ctx_t ctx;
+ gpgme_key_t *recp = NULL;
+ gpgme_data_t plain, cipher;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ /* If RECP is `NULL', symmetric rather than public key encryption is
+ performed. */
+ if (!NIL_P(vrecp))
+ {
+ int i;
+ recp = ALLOC_N(gpgme_key_t, RARRAY_LEN(vrecp) + 1);
+ for (i = 0; i < RARRAY_LEN(vrecp); i++)
+ UNWRAP_GPGME_KEY(RARRAY_PTR(vrecp)[i], recp[i]);
+ recp[i] = NULL;
+ }
+ UNWRAP_GPGME_DATA(vplain, plain);
+ UNWRAP_GPGME_DATA(vcipher, cipher);
+
+ err = gpgme_op_encrypt (ctx, recp, NUM2INT(vflags), plain, cipher);
+ if (recp)
+ xfree (recp);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_encrypt_start (VALUE dummy, VALUE vctx, VALUE vrecp,
+ VALUE vflags, VALUE vplain, VALUE vcipher)
+{
+ gpgme_ctx_t ctx;
+ gpgme_key_t *recp = NULL;
+ gpgme_data_t plain, cipher;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ /* If RECP is `NULL', symmetric rather than public key encryption is
+ performed. */
+ if (!NIL_P(vrecp))
+ {
+ int i;
+ recp = ALLOC_N(gpgme_key_t, RARRAY_LEN(vrecp) + 1);
+ for (i = 0; i < RARRAY_LEN(vrecp); i++)
+ UNWRAP_GPGME_KEY(RARRAY_PTR(vrecp)[i], recp[i]);
+ recp[i] = NULL;
+ }
+ UNWRAP_GPGME_DATA(vplain, plain);
+ UNWRAP_GPGME_DATA(vcipher, cipher);
+
+ err = gpgme_op_encrypt_start (ctx, recp, NUM2INT(vflags), plain, cipher);
+ if (recp)
+ xfree (recp);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_encrypt_result (VALUE dummy, VALUE vctx)
+{
+ gpgme_ctx_t ctx;
+ gpgme_encrypt_result_t result;
+ gpgme_invalid_key_t invalid_key;
+ VALUE vresult, vinvalid_recipients;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+
+ result = gpgme_op_encrypt_result (ctx);
+ vresult = rb_class_new_instance (0, NULL, cEncryptResult);
+ vinvalid_recipients = rb_ary_new ();
+ rb_iv_set (vresult, "@invalid_recipients", vinvalid_recipients);
+ for (invalid_key = result->invalid_recipients; invalid_key;
+ invalid_key = invalid_key->next)
+ {
+ VALUE vinvalid_key =
+ rb_class_new_instance (0, NULL, cInvalidKey);
+ rb_iv_set (vinvalid_key, "@fpr", rb_str_new2 (invalid_key->fpr));
+ rb_iv_set (vinvalid_key, "@reason", LONG2NUM(invalid_key->reason));
+ rb_ary_push (vinvalid_recipients, vinvalid_key);
+ }
+ return vresult;
+}
+
+static VALUE
+rb_s_gpgme_op_encrypt_sign (VALUE dummy, VALUE vctx, VALUE vrecp, VALUE vflags,
+ VALUE vplain, VALUE vcipher)
+{
+ gpgme_ctx_t ctx;
+ gpgme_key_t *recp = NULL;
+ gpgme_data_t plain, cipher;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ /* If RECP is `NULL', symmetric rather than public key encryption is
+ performed. */
+ if (!NIL_P(vrecp))
+ {
+ int i;
+ recp = ALLOC_N(gpgme_key_t, RARRAY_LEN(vrecp) + 1);
+ for (i = 0; i < RARRAY_LEN(vrecp); i++)
+ UNWRAP_GPGME_KEY(RARRAY_PTR(vrecp)[i], recp[i]);
+ recp[i] = NULL;
+ }
+ UNWRAP_GPGME_DATA(vplain, plain);
+ UNWRAP_GPGME_DATA(vcipher, cipher);
+
+ err = gpgme_op_encrypt_sign (ctx, recp, NUM2INT(vflags), plain, cipher);
+ if (recp)
+ xfree (recp);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_op_encrypt_sign_start (VALUE dummy, VALUE vctx, VALUE vrecp,
+ VALUE vflags, VALUE vplain, VALUE vcipher)
+{
+ gpgme_ctx_t ctx;
+ gpgme_key_t *recp = NULL;
+ gpgme_data_t plain, cipher;
+ gpgme_error_t err;
+
+ CHECK_KEYLIST_NOT_IN_PROGRESS(vctx);
+
+ UNWRAP_GPGME_CTX(vctx, ctx);
+ /* If RECP is `NULL', symmetric rather than public key encryption is
+ performed. */
+ if (!NIL_P(vrecp))
+ {
+ int i;
+ recp = ALLOC_N(gpgme_key_t, RARRAY_LEN(vrecp) + 1);
+ for (i = 0; i < RARRAY_LEN(vrecp); i++)
+ UNWRAP_GPGME_KEY(RARRAY_PTR(vrecp)[i], recp[i]);
+ recp[i] = NULL;
+ }
+ UNWRAP_GPGME_DATA(vplain, plain);
+ UNWRAP_GPGME_DATA(vcipher, cipher);
+
+ err = gpgme_op_encrypt_sign_start (ctx, recp, NUM2INT(vflags), plain,
+ cipher);
+ if (recp)
+ xfree (recp);
+ return LONG2NUM(err);
+}
+
+static VALUE
+rb_s_gpgme_wait (VALUE dummy, VALUE vctx, VALUE rstatus, VALUE vhang)
+{
+ gpgme_ctx_t ctx = NULL, ret;
+ gpgme_error_t status;
+
+ /* The CTX argument can be `NULL'. In that case, `gpgme_wait' waits
+ for any context to complete its operation. */
+ if (!NIL_P(vctx))
+ UNWRAP_GPGME_CTX(vctx, ctx);
+
+ ret = gpgme_wait (ctx, &status, NUM2INT(vhang));
+ if (ret)
+ {
+ rb_ary_store (rstatus, 0, INT2NUM(status));
+ if (ret != ctx)
+ vctx = WRAP_GPGME_CTX(ret);
+ return vctx;
+ }
+ return Qnil;
+}
+
+void
+Init_gpgme_n (void)
+{
+ VALUE mGPGME;
+
+ mGPGME = rb_define_module ("GPGME");
+
+ rb_define_module_function (mGPGME, "gpgme_check_version",
+ rb_s_gpgme_check_version, 1);
+ rb_define_module_function (mGPGME, "gpgme_engine_check_version",
+ rb_s_gpgme_engine_check_version, 1);
+ rb_define_module_function (mGPGME, "gpgme_get_engine_info",
+ rb_s_gpgme_get_engine_info, 1);
+
+ rb_define_module_function (mGPGME, "gpgme_pubkey_algo_name",
+ rb_s_gpgme_pubkey_algo_name, 1);
+ rb_define_module_function (mGPGME, "gpgme_hash_algo_name",
+ rb_s_gpgme_hash_algo_name, 1);
+
+ rb_define_module_function (mGPGME, "gpgme_err_code",
+ rb_s_gpgme_err_code, 1);
+ rb_define_module_function (mGPGME, "gpgme_err_source",
+ rb_s_gpgme_err_source, 1);
+ rb_define_module_function (mGPGME, "gpgme_strerror",
+ rb_s_gpgme_strerror, 1);
+
+ cEngineInfo =
+ rb_define_class_under (mGPGME, "EngineInfo", rb_cObject);
+ cCtx =
+ rb_define_class_under (mGPGME, "Ctx", rb_cObject);
+ cData =
+ rb_define_class_under (mGPGME, "Data", rb_cObject);
+ cKey =
+ rb_define_class_under (mGPGME, "Key", rb_cObject);
+ cSubKey =
+ rb_define_class_under (mGPGME, "SubKey", rb_cObject);
+ cUserID =
+ rb_define_class_under (mGPGME, "UserID", rb_cObject);
+ cKeySig =
+ rb_define_class_under (mGPGME, "KeySig", rb_cObject);
+ cDecryptResult =
+ rb_define_class_under (mGPGME, "DecryptResult", rb_cObject);
+ cVerifyResult =
+ rb_define_class_under (mGPGME, "VerifyResult", rb_cObject);
+ cSignResult =
+ rb_define_class_under (mGPGME, "SignResult", rb_cObject);
+ cEncryptResult =
+ rb_define_class_under (mGPGME, "EncryptResult", rb_cObject);
+ cSignature =
+ rb_define_class_under (mGPGME, "Signature", rb_cObject);
+ cSigNotation =
+ rb_define_class_under (mGPGME, "SigNotation", rb_cObject);
+ cTrustItem =
+ rb_define_class_under (mGPGME, "TrustItem", rb_cObject);
+ cInvalidKey =
+ rb_define_class_under (mGPGME, "InvalidKey", rb_cObject);
+ cNewSignature =
+ rb_define_class_under (mGPGME, "NewSignature", rb_cObject);
+ cImportResult =
+ rb_define_class_under (mGPGME, "ImportResult", rb_cObject);
+ cImportStatus =
+ rb_define_class_under (mGPGME, "ImportStatus", rb_cObject);
+
+ /* Creating Data Buffers
+ *
+ * gpgme_data_new_from_filepart is not currently supported.
+ */
+ rb_define_module_function (mGPGME, "gpgme_data_new",
+ rb_s_gpgme_data_new, 1);
+ rb_define_module_function (mGPGME, "gpgme_data_new_from_mem",
+ rb_s_gpgme_data_new_from_mem, 3);
+ rb_define_module_function (mGPGME, "gpgme_data_new_from_fd",
+ rb_s_gpgme_data_new_from_fd, 2);
+ rb_define_module_function (mGPGME, "gpgme_data_new_from_cbs",
+ rb_s_gpgme_data_new_from_cbs, 3);
+
+ /* Manipulating Data Buffers */
+ rb_define_module_function (mGPGME, "gpgme_data_read",
+ rb_s_gpgme_data_read, 2);
+ rb_define_module_function (mGPGME, "gpgme_data_seek",
+ rb_s_gpgme_data_seek, 3);
+ rb_define_module_function (mGPGME, "gpgme_data_write",
+ rb_s_gpgme_data_write, 3);
+ rb_define_module_function (mGPGME, "gpgme_data_get_encoding",
+ rb_s_gpgme_data_get_encoding, 1);
+ rb_define_module_function (mGPGME, "gpgme_data_set_encoding",
+ rb_s_gpgme_data_set_encoding, 2);
+
+ /* Creating Contexts */
+ rb_define_module_function (mGPGME, "gpgme_new",
+ rb_s_gpgme_new, 1);
+
+ /* Context Attributes */
+ rb_define_module_function (mGPGME, "gpgme_set_protocol",
+ rb_s_gpgme_set_protocol, 2);
+ rb_define_module_function (mGPGME, "gpgme_get_protocol",
+ rb_s_gpgme_get_protocol, 1);
+ rb_define_module_function (mGPGME, "gpgme_set_armor",
+ rb_s_gpgme_set_armor, 2);
+ rb_define_module_function (mGPGME, "gpgme_get_armor",
+ rb_s_gpgme_get_armor, 1);
+ rb_define_module_function (mGPGME, "gpgme_set_textmode",
+ rb_s_gpgme_set_textmode, 2);
+ rb_define_module_function (mGPGME, "gpgme_get_textmode",
+ rb_s_gpgme_get_textmode, 1);
+ rb_define_module_function (mGPGME, "gpgme_set_include_certs",
+ rb_s_gpgme_set_include_certs, 2);
+ rb_define_module_function (mGPGME, "gpgme_get_include_certs",
+ rb_s_gpgme_get_include_certs, 1);
+ rb_define_module_function (mGPGME, "gpgme_set_keylist_mode",
+ rb_s_gpgme_set_keylist_mode, 2);
+ rb_define_module_function (mGPGME, "gpgme_get_keylist_mode",
+ rb_s_gpgme_get_keylist_mode, 1);
+ rb_define_module_function (mGPGME, "gpgme_set_passphrase_cb",
+ rb_s_gpgme_set_passphrase_cb, 3);
+ rb_define_module_function (mGPGME, "gpgme_get_passphrase_cb",
+ rb_s_gpgme_get_passphrase_cb, 3);
+ rb_define_module_function (mGPGME, "gpgme_set_progress_cb",
+ rb_s_gpgme_set_progress_cb, 3);
+ rb_define_module_function (mGPGME, "gpgme_get_progress_cb",
+ rb_s_gpgme_get_progress_cb, 3);
+ rb_define_module_function (mGPGME, "gpgme_set_locale",
+ rb_s_gpgme_set_locale, 3);
+
+ /* Key Management */
+ rb_define_module_function (mGPGME, "gpgme_op_keylist_start",
+ rb_s_gpgme_op_keylist_start, 3);
+ rb_define_module_function (mGPGME, "gpgme_op_keylist_ext_start",
+ rb_s_gpgme_op_keylist_ext_start, 4);
+ rb_define_module_function (mGPGME, "gpgme_op_keylist_next",
+ rb_s_gpgme_op_keylist_next, 2);
+ rb_define_module_function (mGPGME, "gpgme_op_keylist_end",
+ rb_s_gpgme_op_keylist_end, 1);
+ rb_define_module_function (mGPGME, "gpgme_get_key",
+ rb_s_gpgme_get_key, 4);
+ rb_define_module_function (mGPGME, "gpgme_key_ref",
+ rb_s_gpgme_key_ref, 1);
+ rb_define_module_function (mGPGME, "gpgme_key_unref",
+ rb_s_gpgme_key_unref, 1);
+ rb_define_module_function (mGPGME, "gpgme_op_genkey",
+ rb_s_gpgme_op_genkey, 4);
+ rb_define_module_function (mGPGME, "gpgme_op_genkey_start",
+ rb_s_gpgme_op_genkey_start, 4);
+ rb_define_module_function (mGPGME, "gpgme_op_export",
+ rb_s_gpgme_op_export, 3);
+ rb_define_module_function (mGPGME, "gpgme_op_export_start",
+ rb_s_gpgme_op_export_start, 3);
+ rb_define_module_function (mGPGME, "gpgme_op_import",
+ rb_s_gpgme_op_import, 2);
+ rb_define_module_function (mGPGME, "gpgme_op_import_start",
+ rb_s_gpgme_op_import_start, 2);
+ rb_define_module_function (mGPGME, "gpgme_op_import_result",
+ rb_s_gpgme_op_import_result, 1);
+ rb_define_module_function (mGPGME, "gpgme_op_delete",
+ rb_s_gpgme_op_delete, 3);
+ rb_define_module_function (mGPGME, "gpgme_op_delete_start",
+ rb_s_gpgme_op_delete_start, 3);
+
+ /* Trust Item Management */
+ rb_define_module_function (mGPGME, "gpgme_op_trustlist_start",
+ rb_s_gpgme_op_trustlist_start, 3);
+ rb_define_module_function (mGPGME, "gpgme_op_trustlist_next",
+ rb_s_gpgme_op_trustlist_next, 2);
+ rb_define_module_function (mGPGME, "gpgme_op_trustlist_end",
+ rb_s_gpgme_op_trustlist_end, 1);
+
+ /* Decrypt */
+ rb_define_module_function (mGPGME, "gpgme_op_decrypt",
+ rb_s_gpgme_op_decrypt, 3);
+ rb_define_module_function (mGPGME, "gpgme_op_decrypt_start",
+ rb_s_gpgme_op_decrypt_start, 3);
+ rb_define_module_function (mGPGME, "gpgme_op_decrypt_result",
+ rb_s_gpgme_op_decrypt_result, 1);
+
+ /* Verify */
+ rb_define_module_function (mGPGME, "gpgme_op_verify",
+ rb_s_gpgme_op_verify, 4);
+ rb_define_module_function (mGPGME, "gpgme_op_verify_start",
+ rb_s_gpgme_op_verify_start, 4);
+ rb_define_module_function (mGPGME, "gpgme_op_verify_result",
+ rb_s_gpgme_op_verify_result, 1);
+
+ /* Decrypt and Verify */
+ rb_define_module_function (mGPGME, "gpgme_op_decrypt_verify",
+ rb_s_gpgme_op_decrypt_verify, 3);
+ rb_define_module_function (mGPGME, "gpgme_op_decrypt_verify_start",
+ rb_s_gpgme_op_decrypt_verify_start, 3);
+
+ /* Sign */
+ rb_define_module_function (mGPGME, "gpgme_signers_clear",
+ rb_s_gpgme_signers_clear, 1);
+ rb_define_module_function (mGPGME, "gpgme_signers_add",
+ rb_s_gpgme_signers_add, 2);
+ rb_define_module_function (mGPGME, "gpgme_signers_enum",
+ rb_s_gpgme_signers_enum, 2);
+ rb_define_module_function (mGPGME, "gpgme_op_sign",
+ rb_s_gpgme_op_sign, 4);
+ rb_define_module_function (mGPGME, "gpgme_op_sign_start",
+ rb_s_gpgme_op_sign_start, 4);
+ rb_define_module_function (mGPGME, "gpgme_op_sign_result",
+ rb_s_gpgme_op_sign_result, 1);
+
+ /* Encrypt */
+ rb_define_module_function (mGPGME, "gpgme_op_encrypt",
+ rb_s_gpgme_op_encrypt, 5);
+ rb_define_module_function (mGPGME, "gpgme_op_encrypt_start",
+ rb_s_gpgme_op_encrypt_start, 5);
+ rb_define_module_function (mGPGME, "gpgme_op_encrypt_result",
+ rb_s_gpgme_op_encrypt_result, 1);
+ rb_define_module_function (mGPGME, "gpgme_op_encrypt_sign",
+ rb_s_gpgme_op_encrypt_sign, 5);
+ rb_define_module_function (mGPGME, "gpgme_op_encrypt_sign_start",
+ rb_s_gpgme_op_encrypt_sign_start, 5);
+
+ /* Run Control */
+ rb_define_module_function (mGPGME, "gpgme_wait",
+ rb_s_gpgme_wait, 3);
+
+ /* gpgme_pubkey_algo_t */
+ rb_define_const (mGPGME, "GPGME_PK_RSA", INT2FIX(GPGME_PK_RSA));
+ rb_define_const (mGPGME, "GPGME_PK_DSA", INT2FIX(GPGME_PK_DSA));
+ rb_define_const (mGPGME, "GPGME_PK_ELG", INT2FIX(GPGME_PK_ELG));
+ rb_define_const (mGPGME, "GPGME_PK_ELG_E", INT2FIX(GPGME_PK_ELG_E));
+
+ /* gpgme_hash_algo_t */
+ rb_define_const (mGPGME, "GPGME_MD_MD5", INT2FIX(GPGME_MD_MD5));
+ rb_define_const (mGPGME, "GPGME_MD_SHA1", INT2FIX(GPGME_MD_SHA1));
+ rb_define_const (mGPGME, "GPGME_MD_RMD160", INT2FIX(GPGME_MD_RMD160));
+ rb_define_const (mGPGME, "GPGME_MD_MD2", INT2FIX(GPGME_MD_MD2));
+ rb_define_const (mGPGME, "GPGME_MD_TIGER", INT2FIX(GPGME_MD_TIGER));
+ rb_define_const (mGPGME, "GPGME_MD_HAVAL", INT2FIX(GPGME_MD_HAVAL));
+ rb_define_const (mGPGME, "GPGME_MD_SHA256", INT2FIX(GPGME_MD_SHA256));
+ rb_define_const (mGPGME, "GPGME_MD_SHA384", INT2FIX(GPGME_MD_SHA384));
+ rb_define_const (mGPGME, "GPGME_MD_SHA512", INT2FIX(GPGME_MD_SHA512));
+ rb_define_const (mGPGME, "GPGME_MD_MD4", INT2FIX(GPGME_MD_MD4));
+ rb_define_const (mGPGME, "GPGME_MD_CRC32", INT2FIX(GPGME_MD_CRC32));
+ rb_define_const (mGPGME, "GPGME_MD_CRC32_RFC1510",
+ INT2FIX(GPGME_MD_CRC32_RFC1510));
+ rb_define_const (mGPGME, "GPGME_MD_CRC24_RFC2440",
+ INT2FIX(GPGME_MD_CRC24_RFC2440));
+
+ /* gpgme_err_code_t */
+ rb_define_const (mGPGME, "GPG_ERR_EOF",
+ INT2FIX(GPG_ERR_EOF));
+ rb_define_const (mGPGME, "GPG_ERR_NO_ERROR",
+ INT2FIX(GPG_ERR_NO_ERROR));
+ rb_define_const (mGPGME, "GPG_ERR_GENERAL",
+ INT2FIX(GPG_ERR_GENERAL));
+ rb_define_const (mGPGME, "GPG_ERR_ENOMEM",
+ INT2FIX(GPG_ERR_ENOMEM));
+ rb_define_const (mGPGME, "GPG_ERR_INV_VALUE",
+ INT2FIX(GPG_ERR_INV_VALUE));
+ rb_define_const (mGPGME, "GPG_ERR_UNUSABLE_PUBKEY",
+ INT2FIX(GPG_ERR_UNUSABLE_PUBKEY));
+ rb_define_const (mGPGME, "GPG_ERR_UNUSABLE_SECKEY",
+ INT2FIX(GPG_ERR_UNUSABLE_SECKEY));
+ rb_define_const (mGPGME, "GPG_ERR_NO_DATA",
+ INT2FIX(GPG_ERR_NO_DATA));
+ rb_define_const (mGPGME, "GPG_ERR_CONFLICT",
+ INT2FIX(GPG_ERR_CONFLICT));
+ rb_define_const (mGPGME, "GPG_ERR_NOT_IMPLEMENTED",
+ INT2FIX(GPG_ERR_NOT_IMPLEMENTED));
+ rb_define_const (mGPGME, "GPG_ERR_DECRYPT_FAILED",
+ INT2FIX(GPG_ERR_DECRYPT_FAILED));
+ rb_define_const (mGPGME, "GPG_ERR_BAD_PASSPHRASE",
+ INT2FIX(GPG_ERR_BAD_PASSPHRASE));
+ rb_define_const (mGPGME, "GPG_ERR_CANCELED",
+ INT2FIX(GPG_ERR_CANCELED));
+ rb_define_const (mGPGME, "GPG_ERR_INV_ENGINE",
+ INT2FIX(GPG_ERR_INV_ENGINE));
+ rb_define_const (mGPGME, "GPG_ERR_AMBIGUOUS_NAME",
+ INT2FIX(GPG_ERR_AMBIGUOUS_NAME));
+ rb_define_const (mGPGME, "GPG_ERR_WRONG_KEY_USAGE",
+ INT2FIX(GPG_ERR_WRONG_KEY_USAGE));
+ rb_define_const (mGPGME, "GPG_ERR_CERT_REVOKED",
+ INT2FIX(GPG_ERR_CERT_REVOKED));
+ rb_define_const (mGPGME, "GPG_ERR_CERT_EXPIRED",
+ INT2FIX(GPG_ERR_CERT_EXPIRED));
+ rb_define_const (mGPGME, "GPG_ERR_NO_CRL_KNOWN",
+ INT2FIX(GPG_ERR_NO_CRL_KNOWN));
+ rb_define_const (mGPGME, "GPG_ERR_NO_POLICY_MATCH",
+ INT2FIX(GPG_ERR_NO_POLICY_MATCH));
+ rb_define_const (mGPGME, "GPG_ERR_NO_SECKEY",
+ INT2FIX(GPG_ERR_NO_SECKEY));
+ rb_define_const (mGPGME, "GPG_ERR_MISSING_CERT",
+ INT2FIX(GPG_ERR_MISSING_CERT));
+ rb_define_const (mGPGME, "GPG_ERR_BAD_CERT_CHAIN",
+ INT2FIX(GPG_ERR_BAD_CERT_CHAIN));
+ rb_define_const (mGPGME, "GPG_ERR_UNSUPPORTED_ALGORITHM",
+ INT2FIX(GPG_ERR_UNSUPPORTED_ALGORITHM));
+ rb_define_const (mGPGME, "GPG_ERR_BAD_SIGNATURE",
+ INT2FIX(GPG_ERR_BAD_SIGNATURE));
+ rb_define_const (mGPGME, "GPG_ERR_NO_PUBKEY",
+ INT2FIX(GPG_ERR_NO_PUBKEY));
+
+ /* gpgme_err_source_t */
+ rb_define_const (mGPGME, "GPG_ERR_SOURCE_UNKNOWN",
+ INT2FIX(GPG_ERR_SOURCE_UNKNOWN));
+ rb_define_const (mGPGME, "GPG_ERR_SOURCE_GPGME",
+ INT2FIX(GPG_ERR_SOURCE_GPGME));
+ rb_define_const (mGPGME, "GPG_ERR_SOURCE_GPG",
+ INT2FIX(GPG_ERR_SOURCE_GPG));
+ rb_define_const (mGPGME, "GPG_ERR_SOURCE_GPGSM",
+ INT2FIX(GPG_ERR_SOURCE_GPGSM));
+ rb_define_const (mGPGME, "GPG_ERR_SOURCE_GCRYPT",
+ INT2FIX(GPG_ERR_SOURCE_GCRYPT));
+ rb_define_const (mGPGME, "GPG_ERR_SOURCE_GPGAGENT",
+ INT2FIX(GPG_ERR_SOURCE_GPGAGENT));
+ rb_define_const (mGPGME, "GPG_ERR_SOURCE_PINENTRY",
+ INT2FIX(GPG_ERR_SOURCE_PINENTRY));
+ rb_define_const (mGPGME, "GPG_ERR_SOURCE_SCD",
+ INT2FIX(GPG_ERR_SOURCE_SCD));
+ rb_define_const (mGPGME, "GPG_ERR_SOURCE_KEYBOX",
+ INT2FIX(GPG_ERR_SOURCE_KEYBOX));
+ rb_define_const (mGPGME, "GPG_ERR_SOURCE_USER_1",
+ INT2FIX(GPG_ERR_SOURCE_USER_1));
+ rb_define_const (mGPGME, "GPG_ERR_SOURCE_USER_2",
+ INT2FIX(GPG_ERR_SOURCE_USER_2));
+ rb_define_const (mGPGME, "GPG_ERR_SOURCE_USER_3",
+ INT2FIX(GPG_ERR_SOURCE_USER_3));
+ rb_define_const (mGPGME, "GPG_ERR_SOURCE_USER_4",
+ INT2FIX(GPG_ERR_SOURCE_USER_4));
+
+ /* gpgme_data_encoding_t */
+ rb_define_const (mGPGME, "GPGME_DATA_ENCODING_NONE",
+ INT2FIX(GPGME_DATA_ENCODING_NONE));
+ rb_define_const (mGPGME, "GPGME_DATA_ENCODING_BINARY",
+ INT2FIX(GPGME_DATA_ENCODING_BINARY));
+ rb_define_const (mGPGME, "GPGME_DATA_ENCODING_BASE64",
+ INT2FIX(GPGME_DATA_ENCODING_BASE64));
+ rb_define_const (mGPGME, "GPGME_DATA_ENCODING_ARMOR",
+ INT2FIX(GPGME_DATA_ENCODING_ARMOR));
+
+ /* gpgme_sig_stat_t */
+ rb_define_const (mGPGME, "GPGME_SIG_STAT_NONE",
+ INT2FIX(GPGME_SIG_STAT_NONE));
+ rb_define_const (mGPGME, "GPGME_SIG_STAT_GOOD",
+ INT2FIX(GPGME_SIG_STAT_GOOD));
+ rb_define_const (mGPGME, "GPGME_SIG_STAT_BAD",
+ INT2FIX(GPGME_SIG_STAT_BAD));
+ rb_define_const (mGPGME, "GPGME_SIG_STAT_NOKEY",
+ INT2FIX(GPGME_SIG_STAT_NOKEY));
+ rb_define_const (mGPGME, "GPGME_SIG_STAT_NOSIG",
+ INT2FIX(GPGME_SIG_STAT_NOSIG));
+ rb_define_const (mGPGME, "GPGME_SIG_STAT_ERROR",
+ INT2FIX(GPGME_SIG_STAT_ERROR));
+ rb_define_const (mGPGME, "GPGME_SIG_STAT_DIFF",
+ INT2FIX(GPGME_SIG_STAT_DIFF));
+ rb_define_const (mGPGME, "GPGME_SIG_STAT_GOOD_EXP",
+ INT2FIX(GPGME_SIG_STAT_GOOD_EXP));
+ rb_define_const (mGPGME, "GPGME_SIG_STAT_GOOD_EXPKEY",
+ INT2FIX(GPGME_SIG_STAT_GOOD_EXPKEY));
+
+ /* gpgme_sigsum_t */
+ rb_define_const (mGPGME, "GPGME_SIGSUM_VALID",
+ INT2FIX(GPGME_SIGSUM_VALID));
+ rb_define_const (mGPGME, "GPGME_SIGSUM_GREEN",
+ INT2FIX(GPGME_SIGSUM_GREEN));
+ rb_define_const (mGPGME, "GPGME_SIGSUM_RED",
+ INT2FIX(GPGME_SIGSUM_RED));
+ rb_define_const (mGPGME, "GPGME_SIGSUM_KEY_REVOKED",
+ INT2FIX(GPGME_SIGSUM_KEY_REVOKED));
+ rb_define_const (mGPGME, "GPGME_SIGSUM_KEY_EXPIRED",
+ INT2FIX(GPGME_SIGSUM_KEY_EXPIRED));
+ rb_define_const (mGPGME, "GPGME_SIGSUM_SIG_EXPIRED",
+ INT2FIX(GPGME_SIGSUM_SIG_EXPIRED));
+ rb_define_const (mGPGME, "GPGME_SIGSUM_KEY_MISSING",
+ INT2FIX(GPGME_SIGSUM_KEY_MISSING));
+ rb_define_const (mGPGME, "GPGME_SIGSUM_CRL_MISSING",
+ INT2FIX(GPGME_SIGSUM_CRL_MISSING));
+ rb_define_const (mGPGME, "GPGME_SIGSUM_CRL_TOO_OLD",
+ INT2FIX(GPGME_SIGSUM_CRL_TOO_OLD));
+ rb_define_const (mGPGME, "GPGME_SIGSUM_BAD_POLICY",
+ INT2FIX(GPGME_SIGSUM_BAD_POLICY));
+ rb_define_const (mGPGME, "GPGME_SIGSUM_SYS_ERROR",
+ INT2FIX(GPGME_SIGSUM_SYS_ERROR));
+
+ /* gpgme_sig_mode_t */
+ rb_define_const (mGPGME, "GPGME_SIG_MODE_NORMAL",
+ INT2FIX(GPGME_SIG_MODE_NORMAL));
+ rb_define_const (mGPGME, "GPGME_SIG_MODE_DETACH",
+ INT2FIX(GPGME_SIG_MODE_DETACH));
+ rb_define_const (mGPGME, "GPGME_SIG_MODE_CLEAR",
+ INT2FIX(GPGME_SIG_MODE_CLEAR));
+
+ /* gpgme_attr_t */
+ rb_define_const (mGPGME, "GPGME_ATTR_KEYID",
+ INT2FIX(GPGME_ATTR_KEYID));
+ rb_define_const (mGPGME, "GPGME_ATTR_FPR",
+ INT2FIX(GPGME_ATTR_FPR));
+ rb_define_const (mGPGME, "GPGME_ATTR_ALGO",
+ INT2FIX(GPGME_ATTR_ALGO));
+ rb_define_const (mGPGME, "GPGME_ATTR_LEN",
+ INT2FIX(GPGME_ATTR_LEN));
+ rb_define_const (mGPGME, "GPGME_ATTR_CREATED",
+ INT2FIX(GPGME_ATTR_CREATED));
+ rb_define_const (mGPGME, "GPGME_ATTR_EXPIRE",
+ INT2FIX(GPGME_ATTR_EXPIRE));
+ rb_define_const (mGPGME, "GPGME_ATTR_OTRUST",
+ INT2FIX(GPGME_ATTR_OTRUST));
+ rb_define_const (mGPGME, "GPGME_ATTR_USERID",
+ INT2FIX(GPGME_ATTR_USERID));
+ rb_define_const (mGPGME, "GPGME_ATTR_NAME",
+ INT2FIX(GPGME_ATTR_NAME));
+ rb_define_const (mGPGME, "GPGME_ATTR_EMAIL",
+ INT2FIX(GPGME_ATTR_EMAIL));
+ rb_define_const (mGPGME, "GPGME_ATTR_COMMENT",
+ INT2FIX(GPGME_ATTR_COMMENT));
+ rb_define_const (mGPGME, "GPGME_ATTR_VALIDITY",
+ INT2FIX(GPGME_ATTR_VALIDITY));
+ rb_define_const (mGPGME, "GPGME_ATTR_LEVEL",
+ INT2FIX(GPGME_ATTR_LEVEL));
+ rb_define_const (mGPGME, "GPGME_ATTR_TYPE",
+ INT2FIX(GPGME_ATTR_TYPE));
+ rb_define_const (mGPGME, "GPGME_ATTR_IS_SECRET",
+ INT2FIX(GPGME_ATTR_IS_SECRET));
+ rb_define_const (mGPGME, "GPGME_ATTR_KEY_REVOKED",
+ INT2FIX(GPGME_ATTR_KEY_REVOKED));
+ rb_define_const (mGPGME, "GPGME_ATTR_KEY_INVALID",
+ INT2FIX(GPGME_ATTR_KEY_INVALID));
+ rb_define_const (mGPGME, "GPGME_ATTR_UID_REVOKED",
+ INT2FIX(GPGME_ATTR_UID_REVOKED));
+ rb_define_const (mGPGME, "GPGME_ATTR_UID_INVALID",
+ INT2FIX(GPGME_ATTR_UID_INVALID));
+ rb_define_const (mGPGME, "GPGME_ATTR_KEY_CAPS",
+ INT2FIX(GPGME_ATTR_KEY_CAPS));
+ rb_define_const (mGPGME, "GPGME_ATTR_CAN_ENCRYPT",
+ INT2FIX(GPGME_ATTR_CAN_ENCRYPT));
+ rb_define_const (mGPGME, "GPGME_ATTR_CAN_SIGN",
+ INT2FIX(GPGME_ATTR_CAN_SIGN));
+ rb_define_const (mGPGME, "GPGME_ATTR_CAN_CERTIFY",
+ INT2FIX(GPGME_ATTR_CAN_CERTIFY));
+ rb_define_const (mGPGME, "GPGME_ATTR_KEY_EXPIRED",
+ INT2FIX(GPGME_ATTR_KEY_EXPIRED));
+ rb_define_const (mGPGME, "GPGME_ATTR_KEY_DISABLED",
+ INT2FIX(GPGME_ATTR_KEY_DISABLED));
+ rb_define_const (mGPGME, "GPGME_ATTR_SERIAL",
+ INT2FIX(GPGME_ATTR_SERIAL));
+ rb_define_const (mGPGME, "GPGME_ATTR_ISSUER",
+ INT2FIX(GPGME_ATTR_ISSUER));
+ rb_define_const (mGPGME, "GPGME_ATTR_CHAINID",
+ INT2FIX(GPGME_ATTR_CHAINID));
+ rb_define_const (mGPGME, "GPGME_ATTR_SIG_STATUS",
+ INT2FIX(GPGME_ATTR_SIG_STATUS));
+ rb_define_const (mGPGME, "GPGME_ATTR_ERRTOK",
+ INT2FIX(GPGME_ATTR_ERRTOK));
+ rb_define_const (mGPGME, "GPGME_ATTR_SIG_SUMMARY",
+ INT2FIX(GPGME_ATTR_SIG_SUMMARY));
+
+ /* gpgme_validity_t */
+ rb_define_const (mGPGME, "GPGME_VALIDITY_UNKNOWN",
+ INT2FIX(GPGME_VALIDITY_UNKNOWN));
+ rb_define_const (mGPGME, "GPGME_VALIDITY_UNDEFINED",
+ INT2FIX(GPGME_VALIDITY_UNDEFINED));
+ rb_define_const (mGPGME, "GPGME_VALIDITY_NEVER",
+ INT2FIX(GPGME_VALIDITY_NEVER));
+ rb_define_const (mGPGME, "GPGME_VALIDITY_MARGINAL",
+ INT2FIX(GPGME_VALIDITY_MARGINAL));
+ rb_define_const (mGPGME, "GPGME_VALIDITY_FULL",
+ INT2FIX(GPGME_VALIDITY_FULL));
+ rb_define_const (mGPGME, "GPGME_VALIDITY_ULTIMATE",
+ INT2FIX(GPGME_VALIDITY_ULTIMATE));
+
+ /* gpgme_protocol_t */
+ rb_define_const (mGPGME, "GPGME_PROTOCOL_OpenPGP",
+ INT2FIX(GPGME_PROTOCOL_OpenPGP));
+ rb_define_const (mGPGME, "GPGME_PROTOCOL_CMS",
+ INT2FIX(GPGME_PROTOCOL_CMS));
+
+ /* gpgme_status_code_t */
+ rb_define_const (mGPGME, "GPGME_STATUS_EOF",
+ INT2FIX(GPGME_STATUS_EOF));
+ /* mkstatus starts here */
+ rb_define_const (mGPGME, "GPGME_STATUS_ENTER",
+ INT2FIX(GPGME_STATUS_ENTER));
+ rb_define_const (mGPGME, "GPGME_STATUS_LEAVE",
+ INT2FIX(GPGME_STATUS_LEAVE));
+ rb_define_const (mGPGME, "GPGME_STATUS_ABORT",
+ INT2FIX(GPGME_STATUS_ABORT));
+
+ rb_define_const (mGPGME, "GPGME_STATUS_GOODSIG",
+ INT2FIX(GPGME_STATUS_GOODSIG));
+ rb_define_const (mGPGME, "GPGME_STATUS_BADSIG",
+ INT2FIX(GPGME_STATUS_BADSIG));
+ rb_define_const (mGPGME, "GPGME_STATUS_ERRSIG",
+ INT2FIX(GPGME_STATUS_ERRSIG));
+
+ rb_define_const (mGPGME, "GPGME_STATUS_BADARMOR",
+ INT2FIX(GPGME_STATUS_BADARMOR));
+
+ rb_define_const (mGPGME, "GPGME_STATUS_RSA_OR_IDEA",
+ INT2FIX(GPGME_STATUS_RSA_OR_IDEA));
+ rb_define_const (mGPGME, "GPGME_STATUS_KEYEXPIRED",
+ INT2FIX(GPGME_STATUS_KEYEXPIRED));
+ rb_define_const (mGPGME, "GPGME_STATUS_KEYREVOKED",
+ INT2FIX(GPGME_STATUS_KEYREVOKED));
+
+ rb_define_const (mGPGME, "GPGME_STATUS_TRUST_UNDEFINED",
+ INT2FIX(GPGME_STATUS_TRUST_UNDEFINED));
+ rb_define_const (mGPGME, "GPGME_STATUS_TRUST_NEVER",
+ INT2FIX(GPGME_STATUS_TRUST_NEVER));
+ rb_define_const (mGPGME, "GPGME_STATUS_TRUST_MARGINAL",
+ INT2FIX(GPGME_STATUS_TRUST_MARGINAL));
+ rb_define_const (mGPGME, "GPGME_STATUS_TRUST_FULLY",
+ INT2FIX(GPGME_STATUS_TRUST_FULLY));
+ rb_define_const (mGPGME, "GPGME_STATUS_TRUST_ULTIMATE",
+ INT2FIX(GPGME_STATUS_TRUST_ULTIMATE));
+
+ rb_define_const (mGPGME, "GPGME_STATUS_SHM_INFO",
+ INT2FIX(GPGME_STATUS_SHM_INFO));
+ rb_define_const (mGPGME, "GPGME_STATUS_SHM_GET",
+ INT2FIX(GPGME_STATUS_SHM_GET));
+ rb_define_const (mGPGME, "GPGME_STATUS_SHM_GET_BOOL",
+ INT2FIX(GPGME_STATUS_SHM_GET_BOOL));
+ rb_define_const (mGPGME, "GPGME_STATUS_SHM_GET_HIDDEN",
+ INT2FIX(GPGME_STATUS_SHM_GET_HIDDEN));
+
+ rb_define_const (mGPGME, "GPGME_STATUS_NEED_PASSPHRASE",
+ INT2FIX(GPGME_STATUS_NEED_PASSPHRASE));
+ rb_define_const (mGPGME, "GPGME_STATUS_VALIDSIG",
+ INT2FIX(GPGME_STATUS_VALIDSIG));
+ rb_define_const (mGPGME, "GPGME_STATUS_SIG_ID",
+ INT2FIX(GPGME_STATUS_SIG_ID));
+ rb_define_const (mGPGME, "GPGME_STATUS_ENC_TO",
+ INT2FIX(GPGME_STATUS_ENC_TO));
+ rb_define_const (mGPGME, "GPGME_STATUS_NODATA",
+ INT2FIX(GPGME_STATUS_NODATA));
+ rb_define_const (mGPGME, "GPGME_STATUS_BAD_PASSPHRASE",
+ INT2FIX(GPGME_STATUS_BAD_PASSPHRASE));
+ rb_define_const (mGPGME, "GPGME_STATUS_NO_PUBKEY",
+ INT2FIX(GPGME_STATUS_NO_PUBKEY));
+ rb_define_const (mGPGME, "GPGME_STATUS_NO_SECKEY",
+ INT2FIX(GPGME_STATUS_NO_SECKEY));
+ rb_define_const (mGPGME, "GPGME_STATUS_NEED_PASSPHRASE_SYM",
+ INT2FIX(GPGME_STATUS_NEED_PASSPHRASE_SYM));
+ rb_define_const (mGPGME, "GPGME_STATUS_DECRYPTION_FAILED",
+ INT2FIX(GPGME_STATUS_DECRYPTION_FAILED));
+ rb_define_const (mGPGME, "GPGME_STATUS_DECRYPTION_OKAY",
+ INT2FIX(GPGME_STATUS_DECRYPTION_OKAY));
+ rb_define_const (mGPGME, "GPGME_STATUS_MISSING_PASSPHRASE",
+ INT2FIX(GPGME_STATUS_MISSING_PASSPHRASE));
+ rb_define_const (mGPGME, "GPGME_STATUS_GOOD_PASSPHRASE",
+ INT2FIX(GPGME_STATUS_GOOD_PASSPHRASE));
+ rb_define_const (mGPGME, "GPGME_STATUS_GOODMDC",
+ INT2FIX(GPGME_STATUS_GOODMDC));
+ rb_define_const (mGPGME, "GPGME_STATUS_BADMDC",
+ INT2FIX(GPGME_STATUS_BADMDC));
+ rb_define_const (mGPGME, "GPGME_STATUS_ERRMDC",
+ INT2FIX(GPGME_STATUS_ERRMDC));
+ rb_define_const (mGPGME, "GPGME_STATUS_IMPORTED",
+ INT2FIX(GPGME_STATUS_IMPORTED));
+ rb_define_const (mGPGME, "GPGME_STATUS_IMPORT_RES",
+ INT2FIX(GPGME_STATUS_IMPORT_RES));
+ rb_define_const (mGPGME, "GPGME_STATUS_FILE_START",
+ INT2FIX(GPGME_STATUS_FILE_START));
+ rb_define_const (mGPGME, "GPGME_STATUS_FILE_DONE",
+ INT2FIX(GPGME_STATUS_FILE_DONE));
+ rb_define_const (mGPGME, "GPGME_STATUS_FILE_ERROR",
+ INT2FIX(GPGME_STATUS_FILE_ERROR));
+
+ rb_define_const (mGPGME, "GPGME_STATUS_BEGIN_DECRYPTION",
+ INT2FIX(GPGME_STATUS_BEGIN_DECRYPTION));
+ rb_define_const (mGPGME, "GPGME_STATUS_END_DECRYPTION",
+ INT2FIX(GPGME_STATUS_END_DECRYPTION));
+ rb_define_const (mGPGME, "GPGME_STATUS_BEGIN_ENCRYPTION",
+ INT2FIX(GPGME_STATUS_BEGIN_ENCRYPTION));
+ rb_define_const (mGPGME, "GPGME_STATUS_END_ENCRYPTION",
+ INT2FIX(GPGME_STATUS_END_ENCRYPTION));
+
+ rb_define_const (mGPGME, "GPGME_STATUS_DELETE_PROBLEM",
+ INT2FIX(GPGME_STATUS_DELETE_PROBLEM));
+ rb_define_const (mGPGME, "GPGME_STATUS_GET_BOOL",
+ INT2FIX(GPGME_STATUS_GET_BOOL));
+ rb_define_const (mGPGME, "GPGME_STATUS_GET_LINE",
+ INT2FIX(GPGME_STATUS_GET_LINE));
+ rb_define_const (mGPGME, "GPGME_STATUS_GET_HIDDEN",
+ INT2FIX(GPGME_STATUS_GET_HIDDEN));
+ rb_define_const (mGPGME, "GPGME_STATUS_GOT_IT",
+ INT2FIX(GPGME_STATUS_GOT_IT));
+ rb_define_const (mGPGME, "GPGME_STATUS_PROGRESS",
+ INT2FIX(GPGME_STATUS_PROGRESS));
+ rb_define_const (mGPGME, "GPGME_STATUS_SIG_CREATED",
+ INT2FIX(GPGME_STATUS_SIG_CREATED));
+ rb_define_const (mGPGME, "GPGME_STATUS_SESSION_KEY",
+ INT2FIX(GPGME_STATUS_SESSION_KEY));
+ rb_define_const (mGPGME, "GPGME_STATUS_NOTATION_NAME",
+ INT2FIX(GPGME_STATUS_NOTATION_NAME));
+ rb_define_const (mGPGME, "GPGME_STATUS_NOTATION_DATA",
+ INT2FIX(GPGME_STATUS_NOTATION_DATA));
+ rb_define_const (mGPGME, "GPGME_STATUS_POLICY_URL",
+ INT2FIX(GPGME_STATUS_POLICY_URL));
+ rb_define_const (mGPGME, "GPGME_STATUS_BEGIN_STREAM",
+ INT2FIX(GPGME_STATUS_BEGIN_STREAM));
+ rb_define_const (mGPGME, "GPGME_STATUS_END_STREAM",
+ INT2FIX(GPGME_STATUS_END_STREAM));
+ rb_define_const (mGPGME, "GPGME_STATUS_KEY_CREATED",
+ INT2FIX(GPGME_STATUS_KEY_CREATED));
+ rb_define_const (mGPGME, "GPGME_STATUS_USERID_HINT",
+ INT2FIX(GPGME_STATUS_USERID_HINT));
+ rb_define_const (mGPGME, "GPGME_STATUS_UNEXPECTED",
+ INT2FIX(GPGME_STATUS_UNEXPECTED));
+ rb_define_const (mGPGME, "GPGME_STATUS_INV_RECP",
+ INT2FIX(GPGME_STATUS_INV_RECP));
+ rb_define_const (mGPGME, "GPGME_STATUS_NO_RECP",
+ INT2FIX(GPGME_STATUS_NO_RECP));
+ rb_define_const (mGPGME, "GPGME_STATUS_ALREADY_SIGNED",
+ INT2FIX(GPGME_STATUS_ALREADY_SIGNED));
+ rb_define_const (mGPGME, "GPGME_STATUS_SIGEXPIRED",
+ INT2FIX(GPGME_STATUS_SIGEXPIRED));
+ rb_define_const (mGPGME, "GPGME_STATUS_EXPSIG",
+ INT2FIX(GPGME_STATUS_EXPSIG));
+ rb_define_const (mGPGME, "GPGME_STATUS_EXPKEYSIG",
+ INT2FIX(GPGME_STATUS_EXPKEYSIG));
+ rb_define_const (mGPGME, "GPGME_STATUS_TRUNCATED",
+ INT2FIX(GPGME_STATUS_TRUNCATED));
+ rb_define_const (mGPGME, "GPGME_STATUS_ERROR",
+ INT2FIX(GPGME_STATUS_ERROR));
+
+ /* The available keylist mode flags. */
+ rb_define_const (mGPGME, "GPGME_KEYLIST_MODE_LOCAL",
+ INT2FIX(GPGME_KEYLIST_MODE_LOCAL));
+ rb_define_const (mGPGME, "GPGME_KEYLIST_MODE_EXTERN",
+ INT2FIX(GPGME_KEYLIST_MODE_EXTERN));
+ rb_define_const (mGPGME, "GPGME_KEYLIST_MODE_SIGS",
+ INT2FIX(GPGME_KEYLIST_MODE_SIGS));
+ rb_define_const (mGPGME, "GPGME_KEYLIST_MODE_VALIDATE",
+ INT2FIX(GPGME_KEYLIST_MODE_VALIDATE));
+
+ /* The available flags for status field of gpgme_import_status_t. */
+ rb_define_const (mGPGME, "GPGME_IMPORT_NEW", INT2FIX(GPGME_IMPORT_NEW));
+ rb_define_const (mGPGME, "GPGME_IMPORT_UID", INT2FIX(GPGME_IMPORT_UID));
+ rb_define_const (mGPGME, "GPGME_IMPORT_SIG", INT2FIX(GPGME_IMPORT_SIG));
+ rb_define_const (mGPGME, "GPGME_IMPORT_SUBKEY",
+ INT2FIX(GPGME_IMPORT_SUBKEY));
+ rb_define_const (mGPGME, "GPGME_IMPORT_SECRET",
+ INT2FIX(GPGME_IMPORT_SECRET));
+
+ /* The available flags for gpgme_op_encrypt. */
+ rb_define_const (mGPGME, "GPGME_ENCRYPT_ALWAYS_TRUST",
+ INT2FIX(GPGME_ENCRYPT_ALWAYS_TRUST));
+}
More information about the Pkg-ruby-extras-commits
mailing list