summaryrefslogtreecommitdiff
path: root/plugins/CryptoPP/PGPw/sdk8
diff options
context:
space:
mode:
authorKirill Volinsky <mataes2007@gmail.com>2012-07-20 16:21:49 +0000
committerKirill Volinsky <mataes2007@gmail.com>2012-07-20 16:21:49 +0000
commitf424a18112032cf61d2871a6b91a5af607c171ae (patch)
tree88fedc4e28941ceecda7026f0b06eba6271f91d5 /plugins/CryptoPP/PGPw/sdk8
parentbfe1bd0fc087be44c70904aee0fe4276643d206d (diff)
CryptoPP:
changed folder structure git-svn-id: http://svn.miranda-ng.org/main/trunk@1083 1316c22d-e87f-b044-9b9b-93d7a3e3ba9c
Diffstat (limited to 'plugins/CryptoPP/PGPw/sdk8')
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pflTypes.h52
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpAPIAdapter.h186
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpBER.h175
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpBase.h451
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpBigNum.h177
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpCBC.h82
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpCFB.h115
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpConfig.h96
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpEC.h78
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpEncode.h306
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpErrors.h393
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpFeatures.h143
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpGroups.h315
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpHMAC.h67
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpHash.h86
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpHashWords.h40
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpIKE.h784
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpKeyServer.h339
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpKeys.h831
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpLDAP.h722
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpMemoryMgr.h220
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpOptionList.h542
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpPFLConfig.h52
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpPFLErrors.h116
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpPubTypes.h350
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpPublicKey.h207
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpRandomPool.h46
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpReconstruct.h117
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpSECSH.h308
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpSKEP.h120
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpShare.h80
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpShareFile.h95
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpSockets.h464
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpSymmetricCipher.h114
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpTLS.h336
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpUserInterface.h284
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpUtilities.h464
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/lib/PGPsdk.libbin151794 -> 0 bytes
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/lib/PGPsdkNL.libbin50356 -> 0 bytes
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/lib/PGPsdkUI.libbin14694 -> 0 bytes
40 files changed, 0 insertions, 9353 deletions
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pflTypes.h b/plugins/CryptoPP/PGPw/sdk8/include/pflTypes.h
deleted file mode 100644
index 00f3242fd4..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pflTypes.h
+++ /dev/null
@@ -1,52 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pflTypes.h,v 1.5 2003/11/20 21:15:48 vinnie Exp $
-____________________________________________________________________________*/
-#ifndef Included_pflTypes_h /* [ */
-#define Included_pflTypes_h
-
-#include "pgpBase.h"
-
-/* opaque declarations */
-typedef struct PFLFileSpec * PFLFileSpecRef;
-typedef struct PFLFileSpec const * PFLConstFileSpecRef;
-
-typedef struct PFLDirectoryIter * PFLDirectoryIterRef;
-typedef struct PFLDirectoryIter const * PFLConstDirectoryIterRef;
-
-/* Validity checks */
-#define kInvalidPFLFileSpecRef ((PFLFileSpecRef) NULL)
-#define kInvalidPFLDirectoryIterRef ((PFLDirectoryIterRef) NULL)
-
-#define PFLFileSpecRefIsValid( ref ) ( (ref) != kInvalidPFLFileSpecRef )
-#define PFLDirectoryIterRefIsValid( ref ) \
- ( (ref) != kInvalidPFLDirectoryIterRef )
-
-/* Languages supported by pgpLocStrings */
-enum PFLLanguage_
-{
- kPFLLanguage_Default = 0,
- kPFLLanguage_English = 1,
- kPFLLanguage_Japanese = 2,
- kPFLLanguage_German = 3,
- kPFLLanguage_Spanish = 4,
-
- PGP_ENUM_FORCE( PFLLanguage_ )
-};
-
-PGPENUM_TYPEDEF( PFLLanguage_, PFLLanguage );
-
-
-#endif /* ] Included_pflTypes_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpAPIAdapter.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpAPIAdapter.h
deleted file mode 100644
index e473df49e2..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpAPIAdapter.h
+++ /dev/null
@@ -1,186 +0,0 @@
-/*____________________________________________________________________________
- * Copyright (C) 2003 PGP Corporation
- * All rights reserved.
- *
- * Size of UTF-16 string is always given in 16 bit characters. This includes
- * PGPGetKeyDBObjDataPropertyU16 and PGPGetKeyDBObjAllocatedDataPropertyU16
- * for which void* is assumed to be PGPChar16* where applicable.
- * So you can write like this:
- *
- * wchar_t s[80];
- * PGPSize size;
- * PGPGetPrimaryUserIDNameU16( key, s, sizeof(s)/sizeof(s[0]), &size );
- *
- * $Id: pgpAPIAdapter.h,v 1.12 2004/05/07 08:29:12 bgaiser Exp $
- *____________________________________________________________________________*/
-#ifndef Included_pgpAPIAdapter_h /* [ */
-#define Included_pgpAPIAdapter_h
-
-#include "pgpKeys.h"
-#include "pgpKeyServer.h"
-
-#include "pgpMemoryMgr.h"
-#include "pgpUtilities.h"
-#include "pgpPFLErrors.h"
-#include "pgpFileSpec.h"
-#include "pgpHashWords.h"
-#include "pgpShareFile.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-PGPError PGPGetErrorStringU8( PGPError theError, PGPSize bufferSize, PGPChar8 * theString );
-PGPError PGPGetErrorStringU16( PGPError theError, PGPSize bufferSize, PGPChar16 * theString );
-
-PGPError PGPGetPGPsdkVersionStringU8( PGPChar8 versionString[ 256 ] );
-PGPError PGPGetPGPsdkVersionStringU16( PGPChar16 versionString[ 256 ] );
-
-PGPError PGPNewFileSpecFromFullPathU8( PGPContextRef context, const PGPChar8 *path, PGPFileSpecRef *ref );
-PGPError PGPNewFileSpecFromFullPathU16( PGPContextRef context, const PGPChar16 *path, PGPFileSpecRef *ref );
-
-PGPError PGPGetFullPathFromFileSpecU8( PGPFileSpecRef fileRef, PGPChar8 **fullPathPtr);
-PGPError PGPGetFullPathFromFileSpecU16( PGPFileSpecRef fileRef, PGPChar16 **fullPathPtr);
-
-PGPError PGPRenameFileU8( PGPFileSpecRef fileRef, const PGPChar8 *newName );
-PGPError PGPRenameFileU16( PGPFileSpecRef fileRef, const PGPChar16 *newName );
-
-PGPOptionListRef PGPOPassphraseBufferU8( PGPContextRef context, const PGPChar8 *passphrase, PGPSize passphraseLength);
-PGPOptionListRef PGPOPassphraseBufferU16( PGPContextRef context, const PGPChar16 *passphrase, PGPSize passphraseLength);
-
-PGPOptionListRef PGPOPassphraseU8( PGPContextRef context, const PGPChar8 *passphrase);
-PGPOptionListRef PGPOPassphraseU16( PGPContextRef context, const PGPChar16 *passphrase);
-
-PGPOptionListRef PGPOPGPMIMEEncodingU8(PGPContextRef context, PGPBoolean mimeEncoding, PGPSize *mimeBodyOffset, PGPChar8 mimeSeparator[ kPGPMimeSeparatorSize ]);
-PGPOptionListRef PGPOPGPMIMEEncodingU16(PGPContextRef context, PGPBoolean mimeEncoding, PGPSize *mimeBodyOffset, PGPChar16 mimeSeparator[ kPGPMimeSeparatorSize ]);
-
-PGPOptionListRef PGPOKeyGenNameU8( PGPContextRef context, const void *name, PGPSize nameLength );
-PGPOptionListRef PGPOKeyGenNameU16( PGPContextRef context, const void *name, PGPSize nameLength );
-
-PGPOptionListRef PGPOPreferredKeyServerU8( PGPContextRef context, PGPChar8 const * server );
-PGPOptionListRef PGPOPreferredKeyServerU16( PGPContextRef context, PGPChar16 const * server );
-
-PGPOptionListRef PGPOCommentStringU8( PGPContextRef context,PGPChar8 const *comment);
-PGPOptionListRef PGPOCommentStringU16( PGPContextRef context,PGPChar16 const *comment);
-
-PGPOptionListRef PGPOVersionStringU8( PGPContextRef context, PGPChar8 const *version);
-PGPOptionListRef PGPOVersionStringU16( PGPContextRef context, PGPChar16 const *version);
-
-PGPOptionListRef PGPOFileNameStringU8( PGPContextRef context, PGPChar8 const *fileName);
-PGPOptionListRef PGPOFileNameStringU16( PGPContextRef context, PGPChar16 const *fileName);
-
-PGPOptionListRef PGPOSigRegularExpressionU8(PGPContextRef context, PGPChar8 const *regularExpression);
-PGPOptionListRef PGPOSigRegularExpressionU16(PGPContextRef context, PGPChar16 const *regularExpression);
-
-PGPError PGPGetKeyDBObjDataPropertyU8( PGPKeyDBObjRef key, PGPKeyDBObjProperty whichProperty, void *buffer, PGPSize bufferSize, PGPSize *dataSize);
-PGPError PGPGetKeyDBObjDataPropertyU16( PGPKeyDBObjRef key, PGPKeyDBObjProperty whichProperty, void *buffer, PGPSize bufferSize, PGPSize *dataSize);
-
-PGPError PGPGetKeyDBObjAllocatedDataPropertyU8( PGPKeyDBObjRef obj, PGPKeyDBObjProperty prop, void **buffer, PGPSize *dataSize );
-PGPError PGPGetKeyDBObjAllocatedDataPropertyU16( PGPKeyDBObjRef obj, PGPKeyDBObjProperty prop, void **buffer, PGPSize *dataSize );
-
-PGPError PGPNewKeyDBObjDataFilterU8( PGPContextRef context, PGPKeyDBObjProperty prop, const void *val, PGPSize len, PGPMatchCriterion match, PGPFilterRef *outFilter );
-PGPError PGPNewKeyDBObjDataFilterU16( PGPContextRef context, PGPKeyDBObjProperty prop, const void *val, PGPSize len, PGPMatchCriterion match, PGPFilterRef *outFilter );
-
-PGPError PGPLDAPQueryFromFilterU8( PGPFilterRef filter, PGPChar8 **queryOut );
-PGPError PGPLDAPQueryFromFilterU16( PGPFilterRef filter, PGPChar16 **queryOut );
-
-PGPError PGPLDAPX509QueryFromFilterU8( PGPFilterRef filter,PGPChar8 **queryOut );
-PGPError PGPLDAPX509QueryFromFilterU16( PGPFilterRef filter,PGPChar16 **queryOut );
-
-PGPError PGPHKSQueryFromFilterU8( PGPFilterRef filter, PGPChar8 **queryOut );
-PGPError PGPHKSQueryFromFilterU16( PGPFilterRef filter, PGPChar16 **queryOut );
-
-PGPError PGPNetToolsCAHTTPQueryFromFilterU8( PGPFilterRef filter, PGPChar8 **queryOut );
-PGPError PGPNetToolsCAHTTPQueryFromFilterU16( PGPFilterRef filter, PGPChar16 **queryOut );
-
-PGPError PGPAddUserIDU8( PGPKeyDBObjRef key, PGPChar8 const *userID, PGPOptionListRef firstOption, ...);
-PGPError PGPAddUserIDU16( PGPKeyDBObjRef key, PGPChar16 const *userID, PGPOptionListRef firstOption, ...);
-
-PGPInt32 PGPCompareUserIDStringsU8(PGPChar8 const *a, PGPChar8 const *b);
-PGPInt32 PGPCompareUserIDStringsU16(PGPChar16 const *a, PGPChar16 const *b);
-
-PGPError PGPGetKeyIDStringU8( PGPKeyID const * ref, PGPKeyIDStringType type, PGPChar8 outString[ kPGPMaxKeyIDStringSize ] );
-PGPError PGPGetKeyIDStringU16( PGPKeyID const * ref, PGPKeyIDStringType type, PGPChar16 outString[ kPGPMaxKeyIDStringSize ] );
-
-PGPError PGPNewKeyIDFromStringU8( const PGPChar8 *string, PGPPublicKeyAlgorithm pkalg, PGPKeyID * outID );
-PGPError PGPNewKeyIDFromStringU16( const PGPChar16 *string, PGPPublicKeyAlgorithm pkalg, PGPKeyID * outID );
-
-PGPError PGPSetPKCS11DrvFileU8( PGPChar8 *module );
-PGPError PGPSetPKCS11DrvFileU16( PGPChar16 *module );
-
-PGPError PGPGetTokenInfoDataPropertyU8( PGPContextRef context, PGPUInt32 tokenNumber, PGPTokenProperty prop, PGPByte *value, PGPSize size, PGPSize *sizeout );
-PGPError PGPGetTokenInfoDataPropertyU16( PGPContextRef context, PGPUInt32 tokenNumber, PGPTokenProperty prop, void *value, PGPSize size, PGPSize *sizeout );
-
-PGPError PGPCreateDistinguishedNameU8( PGPContextRef context, PGPChar8 const *str, PGPByte **pdname, PGPSize *pdnamelen );
-PGPError PGPCreateDistinguishedNameU16( PGPContextRef context, PGPChar16 const *str, PGPByte **pdname, PGPSize *pdnamelen );
-
-PGPError PGPGetPrimaryUserIDNameU8(PGPKeyDBObjRef key, PGPChar8 *buffer, PGPSize bufferSize, PGPSize *dataSize);
-PGPError PGPGetPrimaryUserIDNameU16(PGPKeyDBObjRef key, PGPChar16 *buffer, PGPSize bufferSize, PGPSize *dataSize);
-
-PGPError PGPGetHashWordStringU8( PGPUInt32 index, PGPHashWordList list, PGPChar8 hashWordString[ 12 ] );
-PGPError PGPGetHashWordStringU16( PGPUInt32 index, PGPHashWordList list, PGPChar16 hashWordString[ 12 ] );
-
-PGPError PGPSetShareFileUserIDU8( PGPShareFileRef shareFileRef, const PGPUTF8 *userID );
-PGPError PGPSetShareFileUserIDU16( PGPShareFileRef shareFileRef, const PGPChar16 *userID );
-
-PGPError PGPGetShareFileUserIDU8( PGPShareFileRef shareFileRef, PGPSize bufferSize, PGPUTF8 *userID, PGPSize *fullSize );
-PGPError PGPGetShareFileUserIDU16( PGPShareFileRef shareFileRef, PGPSize bufferSize, PGPChar16 *userID, PGPSize *fullSize );
-
-PGPError PGPGetTARCacheObjDataPropertyU8( PGPTARCacheObjRef obj, PGPTARCacheObjProperty prop, void *buffer, PGPSize bufSize, PGPSize *dataSize );
-PGPError PGPGetTARCacheObjDataPropertyU16( PGPTARCacheObjRef obj, PGPTARCacheObjProperty prop, void *buffer, PGPSize bufSize, PGPSize *dataSize );
-
-
-/* ----- SDK UI ----- */
-PGPUInt32 PGPEstimatePassphraseQualityU8( const PGPChar8 *passphrase );
-PGPUInt32 PGPEstimatePassphraseQualityU16( const PGPChar16 *passphrase );
-
-PGPOptionListRef PGPOUIDialogPromptU8( PGPContextRef context, const PGPChar8 *prompt );
-PGPOptionListRef PGPOUIDialogPromptU16( PGPContextRef context, const PGPChar16 *prompt );
-
-PGPOptionListRef PGPOUIWindowTitleU8( PGPContextRef context, const PGPChar8 *title );
-PGPOptionListRef PGPOUIWindowTitleU16( PGPContextRef context, const PGPChar16 *title );
-
-PGPOptionListRef PGPOUIOutputPassphraseU8( PGPContextRef context, PGPChar8 **passphrase );
-PGPOptionListRef PGPOUIOutputPassphraseU16( PGPContextRef context, PGPChar16 **passphrase );
-
-PGPOptionListRef PGPOUICheckboxU8(PGPContextRef context, PGPUInt32 itemID, const PGPChar8 *title, const PGPChar8 *description, PGPUInt32 initialValue, PGPUInt32 *resultPtr, PGPOptionListRef firstOption, ...);
-PGPOptionListRef PGPOUICheckboxU16(PGPContextRef context, PGPUInt32 itemID, const PGPChar16 *title, const PGPChar16 *description, PGPUInt32 initialValue, PGPUInt32 *resultPtr, PGPOptionListRef firstOption, ...);
-
-PGPOptionListRef PGPOUIPopupListU8(PGPContextRef context, PGPUInt32 itemID, const PGPChar8 *title, const PGPChar8 *description,PGPUInt32 listItemCount, const PGPChar16 *listItems[], PGPUInt32 initialValue, PGPUInt32 *resultPtr, PGPOptionListRef firstOption, ...);
-PGPOptionListRef PGPOUIPopupListU16(PGPContextRef context, PGPUInt32 itemID, const PGPChar16 *title, const PGPChar16 *description,PGPUInt32 listItemCount, const PGPChar16 *listItems[], PGPUInt32 initialValue, PGPUInt32 *resultPtr, PGPOptionListRef firstOption, ...);
-
-
-/* ----- SDK Network ----- */
-PGPOptionListRef PGPONetURLU8(PGPContextRef context, const PGPChar8 *url);
-PGPOptionListRef PGPONetURLU16(PGPContextRef context, const PGPChar16 *url);
-
-PGPOptionListRef PGPONetHostNameU8(PGPContextRef context, const PGPChar8 *hostName, PGPUInt16 port);
-PGPOptionListRef PGPONetHostNameU16(PGPContextRef context, const PGPChar16 *hostName, PGPUInt16 port);
-
-PGPOptionListRef PGPOKeyServerKeyStoreDNU8(PGPContextRef context, const PGPChar8 *szKeyStoreDn);
-PGPOptionListRef PGPOKeyServerKeyStoreDNU16(PGPContextRef context, const PGPChar16 *szKeyStoreDn);
-
-PGPError PGPGetKeyServerHostNameU8(PGPKeyServerRef inKeyServerRef, PGPChar8 ** outHostName); /* Use PGPFreeData to free */
-PGPError PGPGetKeyServerHostNameU16(PGPKeyServerRef inKeyServerRef, PGPChar16 ** outHostName); /* Use PGPFreeData to free */
-
-PGPError PGPGetKeyServerPathU8(PGPKeyServerRef inKeyServerRef, PGPChar8 ** outPath); /* Use PGPFreeData to free */
-PGPError PGPGetKeyServerPathU16(PGPKeyServerRef inKeyServerRef, PGPChar16 ** outPath); /* Use PGPFreeData to free */
-
-PGPError PGPGetLastKeyServerErrorStringU8(PGPKeyServerRef inKeyServerRef,PGPChar8 ** outErrorString);
-PGPError PGPGetLastKeyServerErrorStringU16(PGPKeyServerRef inKeyServerRef,PGPChar16 ** outErrorString);
-
-PGPError PGPGetProxyServerU8(PGPContextRef context, PGPProxyServerType type, PGPChar8 **proxyAddress, PGPUInt16 *proxyPort );
-PGPError PGPGetProxyServerU16(PGPContextRef context, PGPProxyServerType type, PGPChar16 **proxyAddress, PGPUInt16 *proxyPort );
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpAPIAdapter_h */
-
-
-/*__Editor_settings____
- *
- * Local Variables:
- * tab-width: 4
- * End:
- * vi: ts=4 sw=4
- * vim: si
- *_____________________*/
-
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpBER.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpBER.h
deleted file mode 100644
index ad20d033fd..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpBER.h
+++ /dev/null
@@ -1,175 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpBER.h,v 1.15 2003/08/08 04:40:39 ajivsov Exp $
-____________________________________________________________________________*/
-
-/*
- * For extremely detailed explanation of all the BER types and
- * encoding, see X.208 (Specification of Abstract Syntax Notation One (ASN.1))
- * and X.209 (Specification of Basic Encoding Rules for Abstract Syntax
- * Notation One (ASN.1)).
- *
- * These two sources will tell you everything you would ever need (and want)
- * to know about BER and ASN.1.
- */
-
-#ifndef Included_pgpBER_h /* [ */
-#define Included_pgpBER_h
-
-#include "pgpPubTypes.h"
-#include "pgpMemoryMgr.h"
-#include "pgpSockets.h"
-
-/* BER types */
-/* The X.209 BER specification actually defines a lot more
- * types than is listed here, but these are the only ones
- * the current PGPldap implementation uses. */
-enum PGPberType_
-{
- kPGPberType_Boolean = 0x01, /* tag = 0x01 */
- kPGPberType_Int = 0x02, /* tag = 0x02 */
- kPGPberType_Bitstring = 0x03, /* tag = 0x03 */
- kPGPberType_Octetstring = 0x04, /* tag = 0x04 */
- kPGPberType_NULL = 0x05, /* tag = 0x05 */
- kPGPberType_ObjectID = 0x06, /* tag = 0x06 */
- kPGPberType_Enumeration = 0x0A, /* tag = 0x0A */
- kPGPberType_PrintableString = 0x0D, /* tag = 0x0D */
- kPGPberType_Sequence = 0x30, /* constructed, tag = 0x10 */
- kPGPberType_Set = 0x31, /* constructed, tag = 0x11 */
-
- kPGPberType_None = 0xFFFFFFFF
-};
-PGPENUM_TYPEDEF (PGPberType_, PGPberType);
-
-enum PGPberFormatSpecifier_
-{
- kPGPberFormatSpecifier_Boolean = 'b',
- kPGPberFormatSpecifier_Int = 'i',
- kPGPberFormatSpecifier_Octetstring = 'o',
- kPGPberFormatSpecifier_String = 's',
- kPGPberFormatSpecifier_StringVector = 'v',
- kPGPberFormatSpecifier_BERVector = 'V', /* strings and lengths */
- kPGPberFormatSpecifier_NULL = 'n',
- kPGPberFormatSpecifier_Enumeration = 'e',
- kPGPberFormatSpecifier_Tag = 't',
- kPGPberFormatSpecifier_BeginSequence= '{',
- kPGPberFormatSpecifier_EndSequence = '}',
- kPGPberFormatSpecifier_BeginSet = '[',
- kPGPberFormatSpecifier_EndSet = ']',
-
- kPGPberFormatSpecifier_Force = '*'
-};
-PGPENUM_TYPEDEF (PGPberFormatSpecifier_, PGPberFormatSpecifier);
-
-
-typedef struct PGPberElement * PGPberElementRef;
-
-#define kInvalidPGPberElementRef ( (PGPberElementRef) NULL)
-#define PGPberElementRefIsValid(ber) \
- ( (ber) != kInvalidPGPberElementRef )
-#define PGPValidateBERElementRef(ber) \
- PGPValidateParam( PGPberElementRefIsValid( ber ) )
-
-typedef struct PGPberValue
-{
- PGPSize length;
- PGPByte *value;
-} PGPberValue;
-
-/* Functions */
-
- PGPError
-PGPNewBERElement(
- PGPContextRef context,
- PGPberElementRef * ber );
-
-/* ber_free */
- PGPError
-PGPFreeBERElement(
- PGPberElementRef ber );
-
-/* BER encoding functions */
- PGPError
-PGPberAppend(
- PGPberElementRef ber,
- const PGPChar8 * s,
- ... );
-
- PGPError
-PGPberGetEncoding(
- PGPberElementRef ber,
- PGPByte ** encoding );
-
-/* BER decoding functions */
- PGPError
-PGPberRead(
- PGPberElementRef ber,
- const PGPChar8 * fmt,
- ... );
-
- PGPError
-PGPberGetLength(
- PGPberElementRef ber,
- PGPSize * length );
-
- PGPError
-PGPberRewind(
- PGPberElementRef ber );
-
- PGPError
-PGPberNextPrimitive(
- PGPberElementRef ber );
-
- PGPError
-PGPberNextConstructed(
- PGPberElementRef ber );
-
- PGPError
-PGPberNext(
- PGPberElementRef ber );
-
- PGPError
-PGPberSkip(
- PGPberElementRef ber );
-
- PGPError
-PGPberPeek(
- PGPberElementRef ber,
- PGPberType * tag,
- PGPSize * len );
-
- PGPError
-PGPberGetIndex(
- PGPberElementRef ber,
- PGPUInt32 * index );
-
- PGPError
-PGPberSetIndex(
- PGPberElementRef ber,
- PGPUInt32 index );
-
- PGPError
-PGPberReadResponse(
- PGPberElementRef ber,
- PGPSocketRef sock );
-
- PGPError
-PGPberSetData(
- PGPberElementRef ber,
- PGPByte * data,
- PGPSize len );
-
-
-#endif /* ] Included_pgpBER_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpBase.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpBase.h
deleted file mode 100644
index 53a1df46e7..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpBase.h
+++ /dev/null
@@ -1,451 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- This file deals with system dependencies to derive our very basic data
- types. It should not contain any higher level types.
-
-
- $Id: pgpBase.h,v 1.30 2004/02/09 23:30:31 vinnie Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpBase_h /* [ */
-#define Included_pgpBase_h
-
-#include "pgpPFLConfig.h"
-
-#if !( defined(PGP_MACINTOSH) || defined(PGP_UNIX) || defined(PGP_WIN32) )
-#error one of {PGP_MACINTOSH, PGP_UNIX, PGP_WIN32} must be defined
-#endif
-
-#if PGP_MACINTOSH
-#include <stddef.h>
-#if __MWERKS__ && ! defined( __dest_os )
- #include <ansi_parms.h>
- #define __dest_os __mac_os
-#endif
-#else
- /* aCC bars on <sys/time.h> if this file is not included first */
- #if PGP_COMPILER_HPUX
- #include <sys/sigevent.h>
- #endif /* PGP_COMPILER_HPUX */
- #include <sys/types.h>
-#endif
-
-#if PGP_WIN32
-#include <stddef.h> /* For size_t */
-#endif
-
-#if ! NO_LIMITS_H
-#include <limits.h>
-#endif
-
-#ifndef PGP_UNICODE
-#define PGP_UNICODE 0
-#endif
-
-#if PGP_WIN32
- /* check for inconsistent usage of UNICODE symbols */
- #if PGP_UNICODE
- #if !defined(UNICODE) || !defined(_UNICODE)
- #error UNICODE and _UNICODE must be defined
- #endif
- #else
- #if defined(UNICODE) || defined(_UNICODE)
- #error UNICODE and _UNICODE should not be defined
- #endif
- #endif
-#endif
-
-
-/*____________________________________________________________________________
- PGP basic types
-____________________________________________________________________________*/
-
-typedef unsigned char PGPBoolean; /* can be TRUE or FALSE */
-
-#ifndef TRUE
-#define TRUE 1
-#endif
-
-#ifndef FALSE
-#define FALSE 0
-#endif
-
-/* PGPUInt8, PGPInt8 */
-#if UCHAR_MAX == 0xff
-
-typedef unsigned char PGPUInt8;
-typedef signed char PGPInt8;
-#define MAX_PGPUInt8 UCHAR_MAX
-#define MAX_PGPInt8 SCHAR_MAX
-
-#else
-#error This machine has no 8-bit type
-#endif
-
-
-/* PGPUInt16, PGPInt16 */
-#if UINT_MAX == 0xffff
-
-typedef unsigned int PGPUInt16;
-typedef int PGPInt16;
-#define MAX_PGPUInt16 UINT_MAX
-#define MAX_PGPInt16 INT_MAX
-
-#elif USHRT_MAX == 0xffff
-
-typedef unsigned short PGPUInt16;
-typedef short PGPInt16;
-#define MAX_PGPUInt16 USHRT_MAX
-#define MAX_PGPInt16 SHRT_MAX
-
-#else
-#error This machine has no 16-bit type
-#endif
-
-
-/* PGPUInt32, PGPInt32 */
-#if UINT_MAX == 0xfffffffful
-
-typedef unsigned int PGPUInt32;
-typedef int PGPInt32;
-#define MAX_PGPUInt32 UINT_MAX
-#define MAX_PGPInt32 INT_MAX
-
-#elif ULONG_MAX == 0xfffffffful
-
-typedef unsigned long PGPUInt32;
-typedef long PGPInt32;
-#define MAX_PGPUInt32 ULONG_MAX
-#define MAX_PGPInt32 LONG_MAX
-
-#elif USHRT_MAX == 0xfffffffful
-
-typedef unsigned short PGPUInt32;
-typedef short PGPInt32;
-#define MAX_PGPUInt32 USHRT_MAX
-#define MAX_PGPInt32 SHRT_MAX
-
-#else
-#error This machine has no 32-bit type
-#endif
-
-
-/*____________________________________________________________________________
- PGPUInt64, PGPInt64
-
- Find a 64-bit data type, if possible.
- The conditions here are more complicated to avoid using numbers that
- will choke lesser preprocessors (like 0xffffffffffffffff) unless
- we're reasonably certain that they'll be acceptable.
-
- Some *preprocessors* choke on constants that long even if the
- compiler can accept them, so it doesn't work reliably to test values.
- So cross our fingers and hope that it's a 64-bit type.
-
- GCC uses ULONG_LONG_MAX. Solaris uses ULLONG_MAX.
- IRIX uses ULONGLONG_MAX. Are there any other names for this?
-____________________________________________________________________________*/
-
-
-#if ULONG_MAX > 0xfffffffful
-#if ULONG_MAX == 0xfffffffffffffffful
-
-typedef ulong PGPUInt64;
-typedef long PGPInt64;
-#define PGP_HAVE64 1
-
-#endif
-#endif
-
-
-#ifndef PGP_HAVE64
-
-#if defined(ULONG_LONG_MAX) || defined (ULLONG_MAX) || defined(ULONGLONG_MAX) || defined(__LONG_LONG_MAX__)
-typedef unsigned long long PGPUInt64;
-typedef long long PGPInt64;
-#define PGP_HAVE64 1
-
-#endif
-#endif
-
-/*____________________________________________________________________________
- This was added because for some reason or another, __LONG_LONG_MAX__ is
- not defined on Linux 6.1. Hopefully this doesn't break older versions of
- Linux but you never know.....
-____________________________________________________________________________*/
-#if defined(PGP_UNIX_LINUX) && !defined(PGP_HAVE64)
-typedef long long PGPInt64;
-typedef unsigned long long PGPUInt64;
-#define PGP_HAVE64 1
-#endif
-
-
-#ifndef PGP_HAVE64
-#if defined(__MWERKS__)
-#if __option( longlong )
-
-typedef unsigned long long PGPUInt64;
-typedef long long PGPInt64;
-#define PGP_HAVE64 1
-
-#endif
-#endif
-#endif
-
-#if PGP_HAVE64
-/* too painful to test all the variants above, so just do it this way */
-#define MAX_PGPUInt64 ((PGPUInt64)0xfffffffffffffffful)
-#define MAX_PGPInt64 ((PGPInt64)0x7fffffffffffffff)
-#endif
-
-
-/*____________________________________________________________________________
- PGPInt, PGPUInt, PGPLong, PGPULong
-
- Architecture-specific data types.
-
- PGPLong will be 64 bits on 64-bit architectures (Linux on AMD64 or WIN64).
- PGPLong is hardware-supported integeral type such that
- sizeof(PGPULong)==sizeof(void*)
-
- PGPInt is the most efficient harware-supported integeral type that is at
- least 32 bit long. It should be the main type for internal counters, sizes,
- offsets etc unless possibly the larger space of PGPSize is required.
-____________________________________________________________________________*/
-
-/* note that this should be changed for 16 bit platform */
-typedef int PGPInt;
-typedef unsigned int PGPUInt;
-
-#if PGP_WIN32
- #if defined(_WIN64)
- #if PGP_HAVE_64_HARDWARE==0
- #error "Configuration error: PGP_HAVE_64_HARDWARE must be 1 for WIN64"
- #endif
- typedef __int64 PGPLong;
- typedef unsigned __int64 PGPULong;
- #else
- #ifndef _W64
- /* (this definition is only need for WINNT) */
- #define _W64
- #endif
- typedef _W64 __int32 PGPLong;
- typedef _W64 unsigned __int32 PGPULong;
- #endif
-#else
- typedef unsigned long PGPULong;
- typedef long PGPLong;
-#endif
-
-#if INT_MAX == 0x7FFFFFFFL
-#define PGPENUM_TYPEDEF( enumName, typeName ) typedef enum enumName typeName
-#else
-#define PGPENUM_TYPEDEF( enumName, typeName ) typedef PGPInt32 typeName
-#endif
-#define kPGPEnumMaxValue INT_MAX
-
-#define PGP_ENUM_FORCE( enumName ) \
- k ## enumName ## force = kPGPEnumMaxValue
-
-
-typedef PGPUInt8 PGPByte;
-
-typedef PGPInt32 PGPError;
-
-/* a simple value sufficient to hold any numeric or pointer type */
-typedef void * PGPUserValue;
-
-/* A PGPSize refers to in memory sizes. Use PGPFileOffset for file offsets */
-typedef size_t PGPSize;
-#define MAX_PGPSize ( ~(PGPSize)0 )
-
-/* An offset or size of a file */
-#if PGP_UNIX
-#ifdef HAVE_64BIT_FILES
-typedef off64_t PGPFileOffset;
-#else /* !HAVE_64BIT_FILES */
-typedef off_t PGPFileOffset;
-#endif /* HAVE_64BIT_FILES */
-#else
-#if PGP_HAVE64
-typedef PGPInt64 PGPFileOffset;
-#else
-typedef PGPInt32 PGPFileOffset;
-#endif
-#endif
-
-typedef PGPUInt32 PGPFlags;
-typedef time_t PGPTime;
-typedef PGPULong PGPTimeInterval; /* In milliseconds */
-
-#define kPGPMaxTimeInterval (~(PGPTimeInterval)0)
-
-typedef struct PGPVersion
-{
- PGPUInt16 majorVersion;
- PGPUInt16 minorVersion;
-
-} PGPVersion;
-
-/* character types useful for Unicode issues */
-typedef char PGPChar8;
-typedef PGPUInt16 PGPChar16;
-typedef PGPUInt32 PGPChar32;
-typedef unsigned char PGPUTF8;
-
-#if PGP_UNICODE
-typedef PGPUInt16 PGPChar;
-#else
-typedef char PGPChar;
-#endif
-
-typedef char PFLChar;
-typedef char SDKUIChar;
-
-
-/*____________________________________________________________________________
- These macros should surround all C declarations in public
- header files which define function or data symbols.
-____________________________________________________________________________*/
-
-#ifdef __cplusplus /* [ */
-
-#define PGP_BEGIN_C_DECLARATIONS extern "C" {
-#define PGP_END_C_DECLARATIONS }
-
-#else /* ] __cplusplus [ */
-
-#define PGP_BEGIN_C_DECLARATIONS
-#define PGP_END_C_DECLARATIONS
-
-#endif /* ] __cplusplus */
-
-
-#ifndef pgpMin
-#define pgpMin(x,y) (((x)<(y)) ? (x) : (y))
-#endif
-
-#ifndef pgpMax
-#define pgpMax(x,y) (((x)>(y)) ? (x) : (y))
-#endif
-
-#ifndef PGP_DEPRECATED
-#define PGP_DEPRECATED 1
-#endif
-
-#if PGP_WIN32
-# define BIG_ENDIAN 123
-# define LITTLE_ENDIAN 321
-# define BYTE_ORDER LITTLE_ENDIAN
-#endif
-
-#if BYTE_ORDER == BIG_ENDIAN
-# define PGP_WORDSBIGENDIAN 1
-# define PGP_WORDSLITTLEENDIAN 0
-#elif BYTE_ORDER == LITTLE_ENDIAN
-# define PGP_WORDSBIGENDIAN 0
-# define PGP_WORDSLITTLEENDIAN 1
-#else
-# error define your byte order
-#endif
-
-/*____________________________________________________________________________
- * The PGP equivalent of the MS "TEXT" macro. PGPTEXT wraps a string literal
- * and causes it to compile as 8 or 16 bit characters on the basis of the
- * PGP_UNICODE symbol.
- */
-#if PGP_UNICODE
- #define PGPTEXT(literal) L##literal
-#else
- #define PGPTEXT(literal) literal
-#endif
-
-/*____________________________________________________________________________
- * Macros for wrapping text literals. These macros serve two purposes:
- * (a) to indicate to the reader of the source code the way in which the
- * literal is used (and therefore why the string should not be externalized
- * and localized), and (b) to indicate to the compiler whether the literal
- * should be compiled as 8-bit or 16-bit characters.
- *
- * To the right of each macro is the abbreviation to use when naming
- * string resources.
- */
-
-/* PGPTXT_USER should be used for strings which are to be displayed
- * to the user, but which we have decided not to translate, for whatever
- * reason.
- */
-#define PGPTXT_USER(literal) PGPTEXT(literal) /* USR */
-#define PGPTXT_USER8(literal) literal
-#define PGPTXT_USER16(literal) L##literal
-
-/* PGPTXT_ADMIN is for messages to be seen by an admin; we may choose to
- * translate these in the future.
- */
-#define PGPTXT_ADMIN(literal) PGPTEXT(literal) /* ADM */
-
-/* PGPTXT_MACHINE strings are meant to be read by a machine. That is,
- * the usual usage would be that this string is never seen by anyone,
- * neither users, developers, admins nor qa; it is only seen by programs.
- * This includes textual material in tables where that is meant to be
- * compared against hardcoded strings looking for a match. Explicit
- * 8- and 16-bit versions are provided.
- */
-#define PGPTXT_MACHINE(literal) PGPTEXT(literal) /* MAC */
-#define PGPTXT_MACHINE8(literal) literal
-#define PGPTXT_MACHINE16(literal) L##literal
-
-#define PFLTXT_MACHINE PGPTXT_MACHINE8
-#define SDKUITXT_MACHINE PGPTXT_DEBUG8
-#define SDKUITXT_USER PGPTXT_MACHINE8
-
-/* String literals in obsolete sections of code may be left in for
- * clarity or historical reasons. They should be marked with the
- * PGPTXT_OBSOLETE macro.
- */
-#define PGPTXT_OBSOLETE(literal) literal /* OBS */
-
-/* PGPTXT_FIXBEFORESHIP is for strings for which the tagger is not sure
- * what to do with them, but which will need to be decided eventually.
- */
-#define PGPTXT_FIXBEFORESHIP(literal) literal /* FIX */
-
-/* PGPTXT_DEBUG should be used for strings which are to be seen only by
- * developers or testers. This would include compiled-out self-test
- * code, debugging code, printf's, messageboxes, debug logs, and asserts.
- */
-#define PGPTXT_DEBUG(literal) PGPTEXT(literal) /* DBG */
-#define PGPTXT_DEBUG8(literal) literal
-#define PGPTXT_DEBUG16(literal) L##literal
-
-#define PFLTXT_DEBUG PGPTXT_DEBUG8
-#define SDKUITXT_DEBUG PGPTXT_DEBUG8
-
-/* PGPTXT_DEFERRED is used to mark text for which externalization
- * has been deferred because the text is not actually used in the
- * current implementation but it may be someday. Externalizing
- * such text would create unnecessary work for the localizers at
- * this point in time.
- */
-#define PGPTXT_DEFERRED(literal) PGPTEXT(literal)
-#define PGPTXT_DEFERRED8(literal) literal
-#define PGPTXT_DEFERRED16(literal) L##literal
-
-#if defined(__GNUC__) && (__GNUC__ >= 3) && (__GNUC_MINOR__ >= 1) && PGP_OSX
-#define PGP_WEAK_IMPORT __attribute__((weak_import))
-#else
-#define PGP_WEAK_IMPORT
-#endif
-
-#endif /* ] Included_pgpBase_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpBigNum.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpBigNum.h
deleted file mode 100644
index fdc65e2017..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpBigNum.h
+++ /dev/null
@@ -1,177 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpBigNum.h,v 1.7 2002/08/06 20:11:16 dallen Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpBigNum_h
-#define Included_pgpBigNum_h
-
-#include "pgpBase.h"
-#include "pgpUtilities.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-typedef struct PGPBigNum * PGPBigNumRef;
-#define kPGPInvalidBigNumRef ( (PGPBigNumRef)NULL )
-
-/*____________________________________________________________________________
- Bignum basics
-____________________________________________________________________________*/
-PGPError PGPNewBigNum( PGPContextRef context, PGPBoolean secure,
- PGPBigNumRef *newBN );
-
-PGPError PGPFreeBigNum( PGPBigNumRef bn );
-
-PGPError PGPCopyBigNum( PGPBigNumRef src, PGPBigNumRef * dest );
-PGPError PGPAssignBigNum( PGPBigNumRef src, PGPBigNumRef dest );
-PGPError PGPSwapBigNum( PGPBigNumRef a, PGPBigNumRef b);
-
-/*
-** Move bytes between the given buffer and the given BigNum encoded in
-** base 256. I.e. after either of these, the buffer will be equal to
-** (bn / 256^lsbyte) % 256^len. The difference is which is altered to
-** match the other!
-*/
-PGPError PGPBigNumExtractBigEndianBytes( PGPBigNumRef bn,
- PGPByte *dest, PGPUInt32 lsbyte, PGPUInt32 len );
-
-PGPError PGPBigNumInsertBigEndianBytes(PGPBigNumRef bn,
- PGPByte const *src, PGPUInt32 lsbyte, PGPUInt32 len );
-
-/* The same, but the buffer is little-endian. */
-PGPError PGPBigNumExtractLittleEndianBytes( PGPBigNumRef bn,
- PGPByte *dest, PGPUInt32 lsbyte, PGPUInt32 len );
-
-PGPError PGPBigNumInsertLittleEndianBytes(PGPBigNumRef bn,
- PGPByte const *src, PGPUInt32 lsbyte, PGPUInt32 len );
-
-/* Return the least-significant bits (at least 16) of the BigNum */
-PGPUInt16 PGPBigNumGetLSWord( PGPBigNumRef bn );
-
-/*
- * Return the number of significant bits in the BigNum.
- * 0 or 1+floor(log2(src))
- */
-PGPUInt32 PGPBigNumGetSignificantBits( PGPBigNumRef bn );
-
-/*
- * Adds two bignums into dest. Faster if dest is same as lhs or rhs.
- */
-PGPError PGPBigNumAdd( PGPBigNumRef lhs, PGPBigNumRef rhs,
- PGPBigNumRef dest );
-
-/*
- * lhs-rhs. dest and src may be the same, but bnSetQ(dest, 0) is faster.
- * if dest < src, returns error and dest is undefined.
- */
-PGPError PGPBigNumSubtract( PGPBigNumRef lhs, PGPBigNumRef rhs,
- PGPBigNumRef dest, PGPBoolean *underflow );
-
-/* Return sign (-1, 0, +1) of a-b. a <=> b --> bnCmpQ(a, b) <=> 0 */
-PGPInt32 PGPBigNumCompareQ( PGPBigNumRef bn, PGPUInt16 sm );
-
-/* dest = src, where 0 <= src < 2^16. */
-PGPError PGPBigNumSetQ( PGPBigNumRef dest, PGPUInt16 sm );
-
-/* dest = bn + sm, where 0 <= sm < 2^16 */
-PGPError PGPBigNumAddQ( PGPBigNumRef bn, PGPUInt16 sm,
- PGPBigNumRef dest);
-
-/* dest = bn + sm, where 0 <= sm < 2^16 */
-PGPError PGPBigNumSubtractQ( PGPBigNumRef bn, PGPUInt16 sm,
- PGPBigNumRef dest, PGPBoolean *underflow);
-
-/* Return sign (-1, 0, +1) of a-b. a <=> b --> bnCmp(a, b) <=> 0 */
-PGPInt32 PGPBigNumCompare( PGPBigNumRef lhs, PGPBigNumRef rhs);
-
-/* dest = src * src. dest may be the same as src, but it costs time. */
-PGPError PGPBigNumSquare( PGPBigNumRef src, PGPBigNumRef dest);
-
-/* dest = a * b. dest may be the same as a or b, but it costs time. */
-PGPError PGPBigNumMultiply( PGPBigNumRef lhs, PGPBigNumRef rhs,
- PGPBigNumRef dest);
-
-/* dest = a * b, where 0 <= b < 2^16. dest and a may be the same. */
-PGPError PGPBigNumMultiplyQ( PGPBigNumRef lhs, PGPUInt16 sm,
- PGPBigNumRef dest);
-
-/*
- * q = n/d, r = n%d. r may be the same as n, but not d,
- * and q may not be the same as n or d.
- * re-entrancy issue: this temporarily modifies d, but restores
- * it for return.
- */
-PGPError PGPBigNumDivide( PGPBigNumRef numerator, PGPBigNumRef denominator,
- PGPBigNumRef quotient, PGPBigNumRef remainder);
-/*
- * dest = n % d. dest and src may be the same, but not dest and d.
- * re-entrancy issue: this temporarily modifies d, but restores
- * it for return.
- */
-PGPError PGPBigNumMod( PGPBigNumRef numerator, PGPBigNumRef denominator,
- PGPBigNumRef dest );
-
-/* return src % d, where 0 <= d < 2^16. */
-PGPUInt16 PGPBigNumModQ( PGPBigNumRef numerator, PGPUInt16 denominator );
-
-/* n = n^exp, modulo "mod" "mod" *must* be odd */
-PGPError PGPBigNumExpMod( PGPBigNumRef n, PGPBigNumRef exponent,
- PGPBigNumRef mod, PGPBigNumRef dest );
-
-/*
- * dest = n1^e1 * n2^e2, modulo "mod". "mod" *must* be odd.
- * dest may be the same as n1 or n2.
- */
-PGPError PGPBigNumDoubleExpMod( PGPBigNumRef n1, PGPBigNumRef exponent1,
- PGPBigNumRef n2, PGPBigNumRef exponent2,
- PGPBigNumRef mod, PGPBigNumRef dest );
-
-/* dest = 2^exp, modulo "mod" "mod" *must* be odd */
-PGPError PGPBigNumTwoExpMod( PGPBigNumRef exponent, PGPBigNumRef mod,
- PGPBigNumRef dest );
-
-/* dest = gcd(a, b). The inputs may overlap arbitrarily. */
-PGPError PGPBigNumGCD( PGPBigNumRef a, PGPBigNumRef b, PGPBigNumRef dest );
-
-/* dest = src^-1, modulo "mod". dest may be the same as src. */
-PGPError PGPBigNumInv( PGPBigNumRef src, PGPBigNumRef mod,
- PGPBigNumRef dest );
-
-
-/* Shift dest left "amt" places */
-PGPError PGPBigNumLeftShift( PGPBigNumRef dest, PGPUInt32 amt );
-
-/* Shift dest right "amt" places, discarding low-order bits */
-PGPError PGPBigNumRightShift( PGPBigNumRef dest, PGPUInt32 amt );
-
-/* right shift all low order 0-bits, return number of bits shifted */
-PGPUInt16 PGPBigNumMakeOdd( PGPBigNumRef dest );
-
-
-PGP_END_C_DECLARATIONS
-
-#endif /* Included_pgpBigNum_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
-
-
-
-
-
-
-
-
-
-
-
-
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpCBC.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpCBC.h
deleted file mode 100644
index 26ae61d57f..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpCBC.h
+++ /dev/null
@@ -1,82 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpCBC.h,v 1.6 2002/08/06 20:11:16 dallen Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpCBC_h /* [ */
-#define Included_pgpCBC_h
-
-#include "pgpSymmetricCipher.h"
-
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- A CBC context requires use of a symmetric cipher which has been created
- and whose key has been set. An error will be returned if this is not
- the case.
-
- After the call, the CBCContextRef "owns" the
- symmetric ref and will dispose of it properly (even if an error
- occurs). The caller should no longer reference it.
-____________________________________________________________________________*/
-
-PGPError PGPNewCBCContext( PGPSymmetricCipherContextRef ref,
- PGPCBCContextRef *outRef );
-
-/*____________________________________________________________________________
- Disposal clears all data in memory before releasing it.
-____________________________________________________________________________*/
-
-PGPError PGPFreeCBCContext( PGPCBCContextRef ref );
-
-/*____________________________________________________________________________
- Make an exact copy, including current state. Original is not changed.
-____________________________________________________________________________*/
-
-PGPError PGPCopyCBCContext( PGPCBCContextRef ref, PGPCBCContextRef *outRef );
-
-/*____________________________________________________________________________
- IV size is implicit (same size as the symmetric cipher block size).
- IV is *copied*.
- Caller may want to destroy the original after passing it in.
-____________________________________________________________________________*/
-
-PGPError PGPInitCBC( PGPCBCContextRef ref, const void *key,
- const void *initializationVector );
-
-/*____________________________________________________________________________
- Call repeatedly to process arbitrary amounts of data. Each call must
- have bytesIn be a multiple of the cipher block size.
-____________________________________________________________________________*/
-
-PGPError PGPCBCEncrypt( PGPCBCContextRef ref, const void *in,
- PGPSize bytesIn, void *out );
-
-PGPError PGPCBCDecrypt( PGPCBCContextRef ref, const void *in,
- PGPSize bytesIn, void *out );
-
-/*____________________________________________________________________________
- Get the symmetric cipher being used for this CBC context.
- You can use this to determine useful things about the underlying cipher
- such as its block size.
-____________________________________________________________________________*/
-
-PGPError PGPCBCGetSymmetricCipher( PGPCBCContextRef ref,
- PGPSymmetricCipherContextRef *outRef );
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpCBC_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpCFB.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpCFB.h
deleted file mode 100644
index 9745f969ec..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpCFB.h
+++ /dev/null
@@ -1,115 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpCFB.h,v 1.6 2002/08/06 20:11:16 dallen Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpCFB_h /* [ */
-#define Included_pgpCFB_h
-
-#include "pgpSymmetricCipher.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- A CFB context requires use of a symmetric cipher which has been created
- and whose key has been set. An error will be returned if this is not
- the case.
-
- After the call, the CFBRef "owns" the symmetric ref and will
- dispose of it properly (even if an error occurs).
- The caller should no longer reference it.
-____________________________________________________________________________*/
-
-PGPError PGPNewCFBContext( PGPSymmetricCipherContextRef ref,
- PGPUInt16 interleaveFactor,
- PGPCFBContextRef *outRef );
-
-/*____________________________________________________________________________
- Disposal clears all data in memory before releasing it.
-____________________________________________________________________________*/
-
-PGPError PGPFreeCFBContext( PGPCFBContextRef ref );
-
-/*____________________________________________________________________________
- Make an exact copy, including current state. Original is not changed.
-____________________________________________________________________________*/
-
-PGPError PGPCopyCFBContext( PGPCFBContextRef ref,
- PGPCFBContextRef *outRef );
-
-/*____________________________________________________________________________
- IV size is implicit (same size as the symmetric cipher block size).
- IV is *copied*.
- Caller may want to destroy the original after passing it in.
- Calling this implicitly calls PGPResetCFB().
-____________________________________________________________________________*/
-
-PGPError PGPInitCFB( PGPCFBContextRef ref, const void *key,
- const void *initializationVector );
-
-/*____________________________________________________________________________
- Call repeatedly to process arbitrary amounts of data.
-____________________________________________________________________________*/
-
-PGPError PGPCFBEncrypt( PGPCFBContextRef ref, const void *in,
- PGPSize bytesIn, void *out );
-
-PGPError PGPCFBDecrypt( PGPCFBContextRef ref, const void *in,
- PGPSize bytesIn, void *out );
-
-/*____________________________________________________________________________
- Get the symmetric cipher being used for this CFB context.
- You can use this to determine useful things about the underlying cipher
- such as its block size.
-____________________________________________________________________________*/
-
-PGPError PGPCFBGetSymmetricCipher(PGPCFBContextRef ref,
- PGPSymmetricCipherContextRef *outRef );
-
-/*____________________________________________________________________________
- Reset the feedback mechanism to use whatever we have so far, plus previous
- bytes for a total of the cipher block size bytes. This effectively
- changes the cipher block boundary.
-____________________________________________________________________________*/
-
-PGPError PGPCFBSync( PGPCFBContextRef ref );
-
-/*____________________________________________________________________________
- Fetch random bytes from the cipher. Returns the actual number of
- random bytes obtained.
-____________________________________________________________________________*/
-
-PGPError PGPCFBGetRandom( PGPCFBContextRef ref, PGPSize requestCount,
- void *out, PGPSize *outCount);
-
-/*____________________________________________________________________________
- Make more random bytes available using the supplied salt, which must
- be the same as the symmetric cipher block size.
-____________________________________________________________________________*/
-
-PGPError PGPCFBRandomCycle( PGPCFBContextRef ref, const void *salt);
-
-/*____________________________________________________________________________
- Make more random bytes available using the supplied salt, which must
- be the same as the symmetric cipher block size.
-____________________________________________________________________________*/
-
-PGPError PGPCFBRandomWash( PGPCFBContextRef ref, const void *in,
- PGPSize bytesIn );
-
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpCFB_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpConfig.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpConfig.h
deleted file mode 100644
index f2e9f883a1..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpConfig.h
+++ /dev/null
@@ -1,96 +0,0 @@
-/*
- * pgpConfig.h -- Configuration for the PGPsdk. This file contains
- * the configuration information for the PGPsdk, and it should be
- * included in all PGPsdk source files.
- *
- * $Id: pgpConfig.h,v 1.1.1.1 1999/08/08 19:38:33 heller Exp $
- */
-
-/* Define to empty if the compiler does not support 'const' variables. */
-/* #undef const */
-
-/* Define to `long' if <sys/types.h> doesn't define. */
-/* #undef off_t */
-
-/* Define to `unsigned' if <sys/types.h> doesn't define. */
-/* #undef size_t */
-
-
-#ifndef Included_pgpConfig_h /* [ */
-#define Included_pgpConfig_h
-
-#include "pgpPFLConfig.h"
-
-
-
-
-
-#ifndef Included_pgpPFLConfig_h /* [ */
-
-#define HAVE_STDARG_H 1
-#define HAVE_STDLIB_H 1
-#define HAVE_UNISTD_H 0
-#define HAVE_USHORT 0
-#define HAVE_UINT 0
-#define HAVE_ULONG 0
-#define NO_LIMITS_H 0
-#define NO_POPEN 1
-
-#if defined( _MSC_VER )
-#define PGP_HAVE64 1
-typedef __int64 PGPInt64;
-typedef unsigned __int64 PGPUInt64;
-
-#elif defined( __MWERKS__ )
-
-#define PGP_HAVE64 0
-
-#endif
-
-
-
-#endif /*Included_pgpPFLConfig_h*/ /* ] */
-
-
-/* Checks for various types */
-#define HAVE_UCHAR 0
-
-/* Define if you have the ANSI C header files. */
-#define STDC_HEADERS 1
-
-/* Checks for various specific header files */
-#define HAVE_FCNTL_H 1
-#define HAVE_LIMITS_H 1
-#define HAVE_SYS_IOCTL_H 0
-#define HAVE_SYS_TIME_H 0
-#define HAVE_SYS_TIMEB_H 1
-#define HAVE_SYS_PARAM_H 0
-
-/* Check if <sys/time.h> is broken and #includes <time.h> wrong */
-#define TIME_WITH_SYS_TIME 0
-
-/* Checks for various functions */
-#define HAVE_GETHRTIME 0
-#define HAVE_CLOCK_GETTIME 0
-#define HAVE_CLOCK_GETRES 0
-#define HAVE_GETTIMEOFDAY 0
-#define HAVE_GETITIMER 0
-#define HAVE_SETITIMER 0
-#define HAVE_FTIME 1
-#define HAVE_MKSTEMP 0
-
-
-#if defined( __MWERKS__ )
-
-#define PGPTTYE /* nothing */
-
-#elif defined( _MSC_VER )
-
-/* Tags for exported functions, needed for dynamic linking on some platforms */
-#define PGPTTYE /* nothing */
-
-#endif
-
-
-
-#endif /* ] Included_pgpConfig_h */
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpEC.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpEC.h
deleted file mode 100644
index c12ded4444..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpEC.h
+++ /dev/null
@@ -1,78 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpEC.h,v 1.12 2003/12/13 01:20:39 dallen Exp $
-____________________________________________________________________________*/
-
-#ifndef PGP_EC_PUB_H
-#define PGP_EC_PUB_H
-
-PGP_BEGIN_C_DECLARATIONS
-
-/* Wrapper for the ec* routines and data types.
- These are exported functions from PGPsdk
- */
-
-typedef signed char ** PGPECContextRef;
-typedef signed short ** PGPECPointRef;
-typedef signed int ** PGPECScalarRef;
-
-enum PGPECMemoryUsage_
-{
- kPGPECMemoryMedium = 0,
- kPGPECMemoryHigh = 1,
-
- PGP_ENUM_FORCE( PGPECMemoryUsage_ )
-};
-PGPENUM_TYPEDEF( PGPECMemoryUsage_, PGPECMemoryUsage );
-
-PGPError PGPECCreate2mContext( PGPMemoryMgrRef memoryMgr,
- PGPSize bitsize, PGPECMemoryUsage memUsage,
- PGPECContextRef *c );
-
-PGPError PGPECFreeContext( PGPECContextRef p );
-
-PGPError PGPECSetEC2mParamA( PGPECContextRef c, const unsigned *a );
-PGPError PGPECSetEC2mParamB( PGPECContextRef c, const unsigned *b );
-PGPError PGPECSetEC2mParamAInt( PGPECContextRef c, unsigned a );
-PGPError PGPECSetEC2mParamBInt( PGPECContextRef c, unsigned b );
-
-PGPError PGPECGetBufferSize( PGPECContextRef c,
- PGPSize *coordinateSize, PGPSize *scalarSize,
- PGPSize *pointDecomprSize, PGPSize *pointComprSize );
-
-PGPError PGPECScalarCreate( PGPECContextRef c, PGPECScalarRef *s, PGPBoolean isSecure );
-PGPError PGPECScalarFree( PGPECScalarRef s );
-PGPError PGPECScalarInsertBytes( PGPECScalarRef s,
- const PGPByte *scalar /*network order*/, PGPECScalarRef G_ord );
-
-PGPError PGPECPointCreate( PGPECContextRef c, PGPECPointRef *p );
-PGPError PGPECPointFree( PGPECPointRef p );
-
-PGPError PGPECPointExtractBytes( PGPECPointRef p, PGPByte *out, unsigned flags );
-PGPError PGPECPointExtractXYBytes( PGPECPointRef p, PGPByte *out_x, PGPByte *out_y, unsigned flags );
-PGPError PGPECPointInsertBytes( PGPECPointRef p, const PGPByte *in, unsigned flags );
-
-PGPError PGPECPointAssignContext( PGPECPointRef p, PGPECContextRef c );
-
-PGPError PGPECPointPrefBasis( PGPECPointRef p );
-
-PGPError PGPECPointMul( PGPECPointRef p,
- PGPECScalarRef scalar,
- PGPBoolean isPrecomputed, /* PGPECPointPrecomp already called */
- PGPECPointRef out );
-
-PGPError PGPECPointAdd( PGPECPointRef p0, const PGPECPointRef p1, PGPECPointRef sum );
-
-PGPError PGPECPointSetZero( PGPECPointRef p );
-PGPBoolean PGPECPointIsZero( PGPECPointRef p );
-
-PGPBoolean PGPECPointIsConsistent( PGPECPointRef p );
-
-PGPError PGPECPointCompress( PGPECPointRef p );
-PGPError PGPECPointDecompress( PGPECPointRef p );
-
-PGP_END_C_DECLARATIONS
-
-#endif /* PGP_EC_PUB_H */
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpEncode.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpEncode.h
deleted file mode 100644
index 9f2830ddf0..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpEncode.h
+++ /dev/null
@@ -1,306 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- This file contains the prototypes for functions which encode/decode files
- and buffers.
-
- $Id: pgpEncode.h,v 1.20 2003/09/24 03:09:32 ajivsov Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpEncode_h /* [ */
-#define Included_pgpEncode_h
-
-#include "pgpPubTypes.h"
-#include "pgpTLS.h"
-
-#if PGP_MACINTOSH
-#pragma options align=mac68k
-#endif
-
-/*____________________________________________________________________________
- PGP Events
-
- The PGPEvent structure is used to notify clients of the encode API of
- various events. Each event is denoted by an event type:
-____________________________________________________________________________*/
-
-enum PGPEventType_
-{
- kPGPEvent_NullEvent = 0, /* Nothing happened */
- kPGPEvent_InitialEvent = 1, /* Final event */
- kPGPEvent_FinalEvent = 2, /* Final event */
- kPGPEvent_ErrorEvent = 3, /* An error occurred */
- kPGPEvent_WarningEvent = 4, /* Warning event */
- kPGPEvent_EntropyEvent = 5, /* More entropy is needed */
- kPGPEvent_PassphraseEvent = 6, /* A passphrase is needed */
- kPGPEvent_InsertKeyEvent = 7, /* Smart card must be inserted */
- kPGPEvent_AnalyzeEvent = 8, /* Initial analysis event,
- before any output */
- kPGPEvent_RecipientsEvent = 9, /* Recipient list report,
- before any output */
- kPGPEvent_KeyFoundEvent = 10, /* Key packet found */
- kPGPEvent_OutputEvent = 11, /* Output specification needed */
- kPGPEvent_SignatureEvent = 12, /* Signature status report */
- kPGPEvent_BeginLexEvent = 13, /* Initial event per lexical unit*/
- kPGPEvent_EndLexEvent = 14, /* Final event per lexical unit */
- kPGPEvent_RecursionEvent = 15, /* Notification of recursive
- job creation */
- kPGPEvent_DetachedSignatureEvent = 16, /* Need input for verification of
- detached signature */
- kPGPEvent_KeyGenEvent = 17, /* Key generation progress */
-
- kPGPEvent_KeyServerEvent = 18, /* Key Server progress */
- kPGPEvent_KeyServerSignEvent= 19, /* Key Server passphrase */
- kPGPEvent_KeyServerTLSEvent = 20, /* Key Server TLS event */
- kPGPEvent_KeyServerIdleEvent= 21, /* Idle during keyserver call */
-
- kPGPEvent_SocketsIdleEvent = 22, /* Idle during sockets */
- kPGPEvent_DecryptionEvent = 23, /* Decryption data report */
- kPGPEvent_EncryptionEvent = 24, /* Encryption data report */
-
- kPGPEvent_ToBeSignedEvent = 25, /* To-be-signed hash */
-
- PGP_ENUM_FORCE( PGPEventType_ )
-};
-PGPENUM_TYPEDEF( PGPEventType_, PGPEventType );
-
-
-/* PGP Analyze event callback codes */
-
-enum PGPAnalyzeType_
-{
- kPGPAnalyze_Encrypted = 0, /* Encrypted message */
- kPGPAnalyze_Signed = 1, /* Signed message */
- kPGPAnalyze_DetachedSignature = 2, /* Detached signature */
- kPGPAnalyze_Key = 3, /* Key data */
- kPGPAnalyze_Unknown = 4, /* Non-pgp message */
- kPGPAnalyze_X509Certificate = 5, /* X.509 certificate */
- kPGPAnalyze_SMIMEBody = 6, /* SMIME body */
-
- PGP_ENUM_FORCE( PGPAnalyzeType_ )
-};
-PGPENUM_TYPEDEF( PGPAnalyzeType_, PGPAnalyzeType );
-
-/* Individual event information structs, combined as a union in PGPEvent */
-
-typedef struct PGPEventNullData_
-{
- PGPFileOffset bytesWritten;
- PGPFileOffset bytesTotal;
-} PGPEventNullData;
-
-typedef struct PGPEventErrorData_
-{
- PGPError error;
- void *errorArg;
-} PGPEventErrorData;
-
-typedef struct PGPEventWarningData_
-{
- PGPError warning;
- void *warningArg;
-} PGPEventWarningData;
-
-typedef struct PGPEventEntropyData_
-{
- PGPUInt32 entropyBitsNeeded;
-} PGPEventEntropyData;
-
-typedef struct PGPEventPassphraseData_
-{
- PGPBoolean fConventional;
- PGPKeySetRef keyset;
- const PGPByte *ESKs;
- PGPSize ESKsLength;
-} PGPEventPassphraseData;
-
-typedef struct PGPEventRecipientsData_
-{
- PGPKeySetRef recipientSet;
- PGPUInt32 conventionalPassphraseCount;
- PGPUInt32 keyCount;
- PGPKeyID const * keyIDArray;
-} PGPEventRecipientsData;
-
-typedef struct PGPEventKeyFoundData_
-{
- PGPKeyDBRef keyDB;
-} PGPEventKeyFoundData;
-
-typedef struct PGPEventSignatureData_
-{
- PGPKeyID signingKeyID;
- PGPKeyDBObjRef signingKey;
- PGPBoolean checked;
- PGPBoolean verified;
- PGPBoolean keyRevoked;
- PGPBoolean keyDisabled;
- PGPBoolean keyExpired;
- PGPBoolean keyMeetsValidityThreshold;
- PGPValidity keyValidity;
- PGPTime creationTime;
- PGPUInt32 expirationPeriod;
-} PGPEventSignatureData;
-
-typedef struct PGPEventDecryptionData_
-{
- PGPCipherAlgorithm cipherAlgorithm;
- PGPByte *sessionKey;
- PGPSize sessionKeyLength;
- PGPUInt32 keyCount; /* keyids of keys that can decrypt, */
- PGPKeyID const * keyIDArray; /* a subset of keys in PGPEventRecipientsData */
-} PGPEventDecryptionData;
-
-typedef struct PGPEventEncryptionData_
-{
- PGPCipherAlgorithm cipherAlgorithm;
- PGPByte *sessionKey;
- PGPSize sessionKeyLength;
-} PGPEventEncryptionData;
-
-typedef struct PGPEventAnalyzeData_
-{
- PGPAnalyzeType sectionType;
-} PGPEventAnalyzeData;
-
-typedef struct PGPEventOutputData_
-{
- PGPUInt32 messageType;
- PGPChar8 *suggestedName;
- PGPBoolean forYourEyesOnly;
-} PGPEventOutputData;
-
-typedef struct PGPEventBeginLexData_
-{
- PGPUInt32 sectionNumber;
- PGPSize sectionOffset;
-} PGPEventBeginLexData;
-
-typedef struct PGPEventEndLexData_
-{
- PGPUInt32 sectionNumber;
-} PGPEventEndLexData;
-
-typedef struct PGPEventKeyGenData_
-{
- PGPUInt32 state;
-} PGPEventKeyGenData;
-
-typedef struct PGPEventKeyServerData_
-{
- PGPKeyServerRef keyServerRef;
- PGPUInt32 state; /* PGPKeyServerState */
-} PGPEventKeyServerData;
-
-typedef struct PGPEventKeyServerSignData_
-{
- PGPKeyServerRef keyServerRef;
-} PGPEventKeyServerSignData;
-
-typedef struct PGPEventKeyServerTLSData_
-{
- PGPKeyServerRef keyServerRef;
- PGPUInt32 state; /* PGPKeyServerState */
- PGPtlsSessionRef tlsSession;
-} PGPEventKeyServerTLSData;
-
-typedef struct PGPEventKeyServerIdleData_
-{
- PGPKeyServerRef keyServerRef;
-} PGPEventKeyServerIdleData;
-
-typedef struct PGPEventToBeSignedData_
-{
- PGPKeyID keyID;
- PGPHashAlgorithm hashAlg;
- PGPByte hash[512/8];
- PGPSize hashSize;
-} PGPEventToBeSignedData;
-
-/*
- * The following events have no event-specific data defined for them:
- * kPGPEvent_InsertKeyEvent
- * kPGPEvent_RecursionEvent
- * kPGPEvent_DetachedSignatureEvent
- * kPGPEvent_InitialEvent
- * kPGPEvent_FinalEvent
- * kPGPEvent_SocketsIdleEvent
- */
-
-/* Union of all event data structures above */
-typedef union PGPEventData_
-{
- PGPEventNullData nullData;
- PGPEventErrorData errorData;
- PGPEventWarningData warningData;
- PGPEventEntropyData entropyData;
- PGPEventPassphraseData passphraseData;
- PGPEventRecipientsData recipientsData;
- PGPEventKeyFoundData keyFoundData;
- PGPEventSignatureData signatureData;
- PGPEventDecryptionData decryptionData;
- PGPEventEncryptionData encryptionData;
- PGPEventAnalyzeData analyzeData;
- PGPEventOutputData outputData;
- PGPEventBeginLexData beginLexData;
- PGPEventEndLexData endLexData;
- PGPEventKeyGenData keyGenData;
- PGPEventKeyServerData keyServerData;
- PGPEventKeyServerSignData keyServerSignData;
- PGPEventKeyServerTLSData keyServerTLSData;
- PGPEventKeyServerIdleData keyServerIdleData;
- PGPEventToBeSignedData tbsData;
-} PGPEventData;
-
-/* Refs to internal "job" structure */
-typedef struct PGPJob * PGPJobRef;
-
-#define kInvalidPGPJobRef ((PGPJobRef) NULL)
-#define PGPJobRefIsValid( ref ) ( (ref) != kInvalidPGPJobRef )
-
-/* PGPEvent structure */
-
-struct PGPEvent
-{
- PGPVersion version; /* Version of event structure */
- struct PGPEvent_ *nextEvent; /* Allow lists of events */
- PGPJobRef job; /* Associated with what job */
- PGPEventType type; /* Type of event */
- PGPEventData data; /* Event specific data */
-};
-typedef struct PGPEvent PGPEvent;
-
-
-#if PGP_MACINTOSH
-#pragma options align=reset
-#endif
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*
-** Functions to encode and decode. The variable parameters are one or more
-** PGPOptionListRef's which describe the inputs, outputs, and options.
-*/
-
-PGPError PGPEncode(PGPContextRef context,
- PGPOptionListRef firstOption, ...);
-PGPError PGPDecode(PGPContextRef context,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPAddJobOptions(PGPJobRef job,
- PGPOptionListRef firstOption, ...);
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpEncode_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpErrors.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpErrors.h
deleted file mode 100644
index 7174b0a9e6..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpErrors.h
+++ /dev/null
@@ -1,393 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- Error codes for all PGPsdk errors can be found in this file.
-
- $Id: pgpErrors.h,v 1.28 2004/04/26 21:23:53 vinnie Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpErrors_h /* [ */
-#define Included_pgpErrors_h
-
-#include "pgpPubTypes.h"
-
-
-#include "pgpPFLErrors.h"
-
-#define kPGPErrorRange 1000
-
-enum PGPError_
-{
- /*
- NOTE: error code values must not be changed;
- compiled client code depends on them.
- */
- kPGPError_FirstError = -11500,
- kPGPError_Last = -10500,
-
- kPGPError_BadPassphrase = -11500,
- kPGPError_OptionNotFound = -11499,
-
-/* Errors from pgpEncode */
- kPGPError_RedundantOptions = -11498,
- kPGPError_KeyRevoked = -11497,
- kPGPError_KeyExpired = -11496,
- kPGPError_KeyDisabled = -11495,
- kPGPError_KeyInvalid = -11494,
- kPGPError_KeyUnusableForEncryption = -11493,
- kPGPError_KeyUnusableForSignature = -11492,
- kPGPError_OutputBufferTooSmall = -11491,
- kPGPError_InconsistentEncryptionAlgorithms = -11490,
- kPGPError_MissingPassphrase = -11489,
- kPGPError_CombinedConventionalAndPublicEncryption= -11488,
- kPGPError_DetachedSignatureWithoutSigningKey= -11487,
- kPGPError_DetachedSignatureWithEncryption = -11486,
- kPGPError_NoInputOptions = -11485,
- kPGPError_MultipleInputOptions = -11484,
- kPGPError_InputFile = -11483,
- kPGPError_NoOutputOptions = -11482,
- kPGPError_MultipleOutputOptions = -11481,
- kPGPError_MissingEventHandler = -11480,
- kPGPError_MissingKeyDB = -11479,
- kPGPError_DetachedSignatureFound = -11478,
- kPGPError_NoDecryptionKeyFound = -11477,
- kPGPError_CorruptSessionKey = -11476,
- kPGPError_SkipSection = -11475,
- kPGPError_Interrupted = -11474,
- kPGPError_TooManyARRKs = -11473,
- kPGPError_KeyUnusableForDecryption = -11472,
- kPGPError_KeygenTimedOut = -11471,
-
- kPGPError_IncompatibleAPI = -11460,
-
-/* misc errors */
- kPGPError_CompressionFailed = -11453,
- kPGPError_UnTARFailed = -11452,
- kPGPError_MinorUnTARError = -11451,
- kPGPError_NotMacBinary = -11450,
- kPGPError_NoMacBinaryTranslationAvailable = -11449,
- kPGPError_BadSignature = -11448,
- kPGPError_CAPIUnsupportedKey = -11447,
- kPGPError_SelfTestFailed = -11446,
- kPGPError_SelfTestsNotExecuted = -11445,
- kPGPError_BadIntegrity = -11444,
- kPGPError_DeCompressionFailed = -11443,
- kPGPError_DeletingSelfSig = -11442,
-
-/* filter errors */
-
- kPGPError_InconsistentFilterClasses = -11440,
- kPGPError_UnsupportedLDAPFilter = -11439,
- kPGPError_UnsupportedHKPFilter = -11438,
- kPGPError_UnknownFilterType = -11437,
- kPGPError_InvalidFilterParameter = -11436,
- kPGPError_UnsupportedNetToolsCAFilter = -11435,
-
-/* old errors: */
-
- kPGPError_OutOfRings = -11420,
- kPGPError_BadHashNumber = -11419,
- kPGPError_BadCipherNumber = -11418,
- kPGPError_BadKeyLength = -11417,
- kPGPError_SizeAdviseFailure = -11416,
- kPGPError_ConfigParseFailure = -11415,
- kPGPError_ConfigParseFailureBadFunction = -11414,
- kPGPError_ConfigParseFailureBadOptions = -11413,
- kPGPError_KeyIsLocked = -11412,
- kPGPError_CantDecrypt = -11411,
- kPGPError_UnknownString2Key = -11410,
- kPGPError_BadSessionKeySize = -11409,
- kPGPError_UnknownVersion = -11408,
- kPGPError_BadSessionKeyAlgorithm = -11407,
- kPGPError_UnknownSignatureType = -11406,
- kPGPError_BadSignatureSize = -11405,
- kPGPError_SignatureBitsWrong = -11404,
- kPGPError_ExtraDateOnSignature = -11403,
- kPGPError_SecretKeyNotFound = -11402,
- kPGPError_AdditionalRecipientRequestKeyNotFound = -11401,
- kPGPError_InvalidCommit = -11400,
- kPGPError_CantHash = -11399,
- kPGPError_UnbalancedScope = -11398,
- kPGPError_WrongScope = -11397,
- kPGPError_FIFOReadError = -11396,
- kPGPError_RandomSeedTooSmall = -11395,
- kPGPError_EnvPriorityTooLow = -11394,
- kPGPError_UnknownCharMap = -11393,
- kPGPError_AsciiParseIncomplete = -11392,
- kPGPError_BadPacket = -11391,
-
- kPGPError_TroubleKeySubKey = -11390,
- kPGPError_TroubleSigSubKey = -11389,
- kPGPError_TroubleBadTrust = -11388,
- kPGPError_TroubleUnknownPacketByte = -11387,
- kPGPError_TroubleUnexpectedSubKey = -11386,
- kPGPError_TroubleUnexpectedName = -11385,
- kPGPError_TroubleUnexpectedSignature = -11384,
- kPGPError_TroubleUnexpectedUnknown = -11383,
- kPGPError_TroubleUnexpectedTrust = -11382,
- kPGPError_TroubleKeyTooBig = -11381,
- kPGPError_TroubleSecretKeyTooBig = -11380,
- kPGPError_TroubleNameTooBig = -11379,
- kPGPError_TroubleSignatureTooBig = -11378,
- kPGPError_TroubleUnknownTooBig = -11377,
- kPGPError_TroubleDuplicateKeyID = -11376,
- kPGPError_TroubleDuplicateKey = -11375,
- kPGPError_TroubleDuplicateSecretKey = -11374,
- kPGPError_TroubleDuplicateName = -11373,
- kPGPError_TroubleDuplicateSignature = -11372,
- kPGPError_TroubleDuplicateUnknown = -11371,
- kPGPError_TroubleBareKey = -11370,
- kPGPError_TroubleVersionBugPrev = -11369,
- kPGPError_TroubleVersionBugCur = -11368,
- kPGPError_TroubleOldSecretKey = -11367,
- kPGPError_TroubleNewSecretKey = -11366,
- kPGPError_TroubleImportingNonexportableSignature= -11365,
- kPGPError_TroubleDuplicateCRL = -11364,
- kPGPError_TroubleCRLTooBig = -11363,
-
- kPGPError_BadCompressionNumber = -11362,
-
- /*
- * The set of errors in this range are the ones which will NOT abort
- * a keyring check operation. These errors just make us skip the key
- * and go on to the next.
- */
-kPGPError_KEY_MIN = -11350,
- kPGPError_KEY_LONG = kPGPError_KEY_MIN,
- kPGPError_KeyPacketTruncated = -11349,
- kPGPError_UnknownKeyVersion = -11348,
- kPGPError_UnknownPublicKeyAlgorithm = -11347,
- kPGPError_MalformedKeyModulus = -11346,
- kPGPError_MalformedKeyExponent = -11345,
- kPGPError_RSAPublicModulusIsEven = -11344,
- kPGPError_RSAPublicExponentIsEven = -11343,
- kPGPError_MalformedKeyComponent = -11342,
- kPGPError_KeyTooLarge = -11341,
- kPGPError_PublicKeyTooSmall = -11340,
- kPGPError_PublicKeyTooLarge = -11339,
- kPGPError_PublicKeyUnimplemented = -11338,
- kPGPError_CRLPacketTruncated = -11337,
- kPGPError_CorruptPrivateKey = -11336,
- kPGPError_UnknownPaddingType = -11335,
-kPGPError_KEY_MAX = kPGPError_CorruptPrivateKey,
-
-
-/* kPGPError_SIG_MAX */
- kPGPError_SIG_LONG = -11330,
- kPGPError_TruncatedSignature = -11329,
- kPGPError_MalformedSignatureInteger = -11328,
- kPGPError_UnknownSignatureAlgorithm = -11327,
- kPGPError_ExtraSignatureMaterial = -11326,
- kPGPError_UnknownSignatureVersion = -11325,
- kPGPError_RevocationKeyNotFound = -11324,
-/* kPGPError_SIG_MIN */
-
-/* kPGPError_KEYDB_MAX */
- kPGPError_OutOfEntropy = -11320,
- kPGPError_ItemIsReadOnly = -11319,
- kPGPError_InvalidProperty = -11318,
- kPGPError_FileCorrupt = -11317,
- kPGPError_DuplicateCert = -11316,
- kPGPError_DuplicateUserID = -11315,
- kPGPError_CertifyingKeyDead = -11314,
- kPGPError_ItemWasDeleted = -11313,
- kPGPError_KeyDBMismatch = -11312,
-/* kPGPError_KEYDB_MIN = kPGPError_KeyDBMismatch */
-
-/* kPGPError_SERVER_MAX */
- kPGPError_ServerInProgress = -11300,
- kPGPError_ServerOperationNotSupported = -11299,
- kPGPError_ServerInvalidProtocol = -11298,
- kPGPError_ServerRequestFailed = -11297,
- kPGPError_ServerOpen = -11296,
- kPGPError_ServerNotOpen = -11295,
- kPGPError_ServerKeyAlreadyExists = -11294,
- kPGPError_ServerNotInitialized = -11293,
- kPGPError_ServerPartialAddFailure = -11292,
- kPGPError_ServerCorruptKeyBlock = -11291,
- kPGPError_ServerUnknownResponse = -11290,
- kPGPError_ServerTimedOut = -11289,
- kPGPError_ServerOpenFailed = -11288,
- kPGPError_ServerAuthorizationRequired = -11287,
- kPGPError_ServerAuthorizationFailed = -11286,
- kPGPError_ServerSearchFailed = -11285,
- kPGPError_ServerPartialSearchResults = -11284,
- kPGPError_ServerBadKeysInSearchResults = -11283,
- kPGPError_ServerKeyFailedPolicy = -11282,
- kPGPError_ServerOperationRequiresTLS = -11281,
- kPGPError_ServerNoStaticStorage = -11280,
- kPGPError_ServerCertNotFound = -11279,
-
-/* TLS errors */
- kPGPError_TLSUnexpectedClose = -11250,
- kPGPError_TLSProtocolViolation = -11249,
- kPGPError_TLSVersionUnsupported = -11248,
- kPGPError_TLSWrongState = -11247,
- kPGPError_TLSAlertReceived = -11246,
- kPGPError_TLSKeyUnusable = -11245,
- kPGPError_TLSNoCommonCipher = -11244,
- kPGPError_TLSWouldBlock = -11243,
- kPGPError_TLSRcvdHandshakeRequest = -11242,
-
-/* X509 certificate errors */
- kPGPError_X509NeededCertNotAvailable = -11240,
- kPGPError_X509SelfSignedCert = -11239,
- kPGPError_X509InvalidCertificateSignature = -11238,
- kPGPError_X509InvalidCertificateFormat = -11237,
- kPGPError_X509InvalidCertificateTree = -11236,
-
-/* Key Splitting errors */
- kPGPError_SplitNotEnoughSharesInObject = -11230,
- kPGPError_SplitDifferentSplitKeys = -11229,
- kPGPError_SplitDifferentSharePool = -11228,
- kPGPError_SplitIdenticalShares = -11227,
- kPGPError_SKEPRejectedAuthentication = -11226,
- kPGPError_SKEPIncorrectVersion = -11225,
-
-/* SECSH errors */
- kPGPError_SECSHUnexpectedClose = -11220,
- kPGPError_SECSHProtocolViolation = -11219,
- kPGPError_SECSHVersionUnsupported = -11218,
- kPGPError_SECSHWrongState = -11217,
- kPGPError_SECSHAlertReceived = -11216,
- kPGPError_SECSHKeyUnusable = -11215,
- kPGPError_SECSHNoCommonCipher = -11214,
- kPGPError_SECSHWouldBlock = -11213,
- kPGPError_SECSHRcvdHandshakeRequest = -11212,
-
- kPGPError_BigNumNoInverse = -11150,
-
-/* PGPSockets errors */
- kPGPError_SocketsNetworkDown = -11100,
- kPGPError_SocketsNotInitialized = -11099,
- kPGPError_SocketsInProgress = -11098,
- kPGPError_SocketsNotConnected = -11097,
- kPGPError_SocketsNotBound = -11096,
- kPGPError_SocketsOperationNotSupported = -11095,
- kPGPError_SocketsProtocolNotSupported = -11094,
- kPGPError_SocketsAddressFamilyNotSupported = -11093,
- kPGPError_SocketsNotASocket = -11092,
- kPGPError_SocketsAddressInUse = -11091,
- kPGPError_SocketsBufferOverflow = -11090,
- kPGPError_SocketsListenQueueFull = -11089,
- kPGPError_SocketsAddressNotAvailable = -11088,
- kPGPError_SocketsAlreadyConnected = -11087,
- kPGPError_SocketsTimedOut = -11086,
- kPGPError_SocketsNoStaticStorage = -11085,
-
- kPGPError_SocketsHostNotFound = -11050,
- kPGPError_SocketsDomainServerError = -11049,
-
-/* Errors from X.509 layer */
- kPGPError_X509AttributeNotSupported = -10999,
- kPGPError_InvalidPKCS7Encoding = -10998,
- kPGPError_CMSInitialization = -10997,
- kPGPError_InvalidDistinguishedName = -10996,
- kPGPError_CertRequestCreationFailure = -10995,
- kPGPError_MissingX509Certificate = -10994,
- kPGPError_PKCS7SignFailure = -10993,
- kPGPError_ASNPackFailure = -10992,
- kPGPError_InvalidInputFormat = -10991,
- kPGPError_InvalidOutputFormat = -10990,
- kPGPError_InvalidCertificateExtension = -10989,
- kPGPError_PublicKeyNotFound = -10988,
-
- kPGPError_CRSMissingRequiredAttribute = -10979,
- kPGPError_CRSInvalidCharacter = -10978,
- kPGPError_CRSInvalidAttributeType = -10977,
- kPGPError_CRSInvalidCertType = -10976,
- kPGPError_CRSInvalidAttributeValueLength = -10975,
- kPGPError_CRSInvalidAuthenticateValue = -10974,
-
- kPGPError_X509CertificateParseError = -10973,
- kPGPError_PKCS7EncryptFailure = -10972,
- kPGPError_PKCS7DecryptFailure = -10971,
-
- kPGPError_InvalidCertificateFormat = -11970,
-
-/* LDAP Errors */
-kPGPError_LDAPMIN = -10950,
- kPGPError_LDAPOperationsError = kPGPError_LDAPMIN,
- kPGPError_LDAPProtocolError = -10949,
- kPGPError_LDAPTimelimitExceeded = -10948,
- kPGPError_LDAPSizelimitExceeded = -10947,
- kPGPError_LDAPStrongAuthNotSupported = -10946,
- kPGPError_LDAPStrongAuthRequired = -10945,
- kPGPError_LDAPPartialResults = -10944,
- kPGPError_LDAPNoSuchAttribute = -10943,
- kPGPError_LDAPUndefinedType = -10942,
- kPGPError_LDAPInappropriateMatching = -10941,
- kPGPError_LDAPConstraintViolation = -10940,
- kPGPError_LDAPTypeOrValueExists = -10939,
- kPGPError_LDAPInvalidSyntax = -10938,
- kPGPError_LDAPNoSuchObject = -10937,
- kPGPError_LDAPAliasProblem = -10936,
- kPGPError_LDAPInvalidDNSyntax = -10935,
- kPGPError_LDAPIsLeaf = -10934,
- kPGPError_LDAPAliasDerefProblem = -10933,
- kPGPError_LDAPInappropriateAuth = -10932,
- kPGPError_LDAPInvalidCredentials = -10931,
- kPGPError_LDAPInsufficientAccess = -10930,
- kPGPError_LDAPBusy = -10929,
- kPGPError_LDAPUnavailable = -10928,
- kPGPError_LDAPUnwillingToPerform = -10927,
- kPGPError_LDAPLoopDetect = -10926,
- kPGPError_LDAPNamingViolation = -10925,
- kPGPError_LDAPObjectClassViolation = -10924,
- kPGPError_LDAPNotAllowedOnNonleaf = -10923,
- kPGPError_LDAPNotAllowedOnRDN = -10922,
- kPGPError_LDAPAlreadyExists = -10921,
- kPGPError_LDAPNoObjectClassMods = -10920,
- kPGPError_LDAPResultsTooLarge = -10919,
- kPGPError_LDAPOther = -10918,
- kPGPError_LDAPServerDown = -10917,
- kPGPError_LDAPLocalError = -10916,
- kPGPError_LDAPEncodingError = -10915,
- kPGPError_LDAPDecodingError = -10914,
- kPGPError_LDAPTimeout = -10913,
- kPGPError_LDAPAuthUnknown = -10912,
- kPGPError_LDAPFilterError = -10911,
- kPGPError_LDAPUserCancelled = -10910,
- kPGPError_LDAPParamError = -10909,
- kPGPError_LDAPConnectError = -10908,
- /* Reserve errors -10907 through -10881 for future LDAP versions */
- kPGPError_LDAPNotLDAPURL = -10880,
- kPGPError_LDAPNoDN = -10879,
- kPGPError_LDAPBadScope = -10878,
-kPGPError_LDAPMAX = kPGPError_LDAPBadScope,
-
- /* Smart Card Errors */
- kPGPError_SmartCardError = -10850,
- kPGPError_SmartCardOutOfMemory = -10849,
- kPGPError_SmartCardKeyNotFound = -10848,
- kPGPError_SmartCardX509Exists = -10847,
- kPGPError_SmartCardKeyExists = -10846,
- kPGPError_SmartCardPinLocked = -10845,
- kPGPError_SmartCardNotFound = -10844,
-
- kPGPError_DummyEnumValue
- /* kPGPError_Last */
-} ;
-
-
-PGP_BEGIN_C_DECLARATIONS
-
-#undef PGPGetErrorString
-PGPError PGPGetErrorString( PGPError theError,
- PGPSize bufferSize, PGPChar8 * theString );
-
-PGP_END_C_DECLARATIONS
-
-
-#endif /* ] Included_pgpErrors_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpFeatures.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpFeatures.h
deleted file mode 100644
index ad628a283b..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpFeatures.h
+++ /dev/null
@@ -1,143 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- Determine which features are present in the PGPsdk. This is the only
- way to correctly determine which features are present. The version
- number may be the same for different builds that lack some features.
-
- $Id: pgpFeatures.h,v 1.13 2004/03/15 19:18:55 vinnie Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpFeatures_h /* [ */
-#define Included_pgpFeatures_h
-
-#include "pgpPubTypes.h"
-
-#if PGP_MACINTOSH
-#pragma options align=mac68k /* [ */
-#endif
-
-/*____________________________________________________________________________
- Each selector designates a PGPFlags word, which can be obtained via
- PGPGetFeatureFlags(). The flags can be tested using the
- supplied masks. We can add more selectors as needed. The masks
- are not intended to be restricted to a single bit.
- Flags should not be used for attributes that have unknown length.
-
- A kPGPError_ItemNotFound will be returned if the caller specifies
- a selector which is not recognized by the PGPsdk. This could
- occur if an app links to an older version of the SDK.
-____________________________________________________________________________*/
-
-/* selectors which are passed to PGPGetFeatureFlags */
-enum PGPFeatureSelector_
-{
- kPGPFeatures_GeneralSelector = 1,
- kPGPFeatures_ImplementationSelector = 2,
-
- PGP_ENUM_FORCE( PGPFeatureSelector_ )
-};
-PGPENUM_TYPEDEF( PGPFeatureSelector_, PGPFeatureSelector );
-
-
-/* flags for kPGPFeatures_GeneralSelector */
-enum
-{
- kPGPFeatureMask_CanEncrypt = (1UL << 0),
- kPGPFeatureMask_CanDecrypt = (1UL << 1),
- kPGPFeatureMask_CanSign = (1UL << 2),
- kPGPFeatureMask_CanVerify = (1UL << 3),
- kPGPFeatureMask_CanGenerateKey = (1UL << 4),
- kPGPFeatureMask_RngHardware = (1UL << 5),
- kPGPFeatureMask_FIPSmode = (1UL << 6)
-};
-
-/* flags for kPGPFeatures_ImplementationSelector */
-enum
-{
- kPGPFeatureMask_IsDebugBuild = (1UL << 0),
- kPGPFeatureMask_HasTimeout = (1UL << 0)
-};
-
-#define kPGPAlgorithmInfoFlags_FIPS (PGPFlags)(1UL << 1 )
-
-typedef struct PGPAlgorithmInfo
-{
- PGPChar8 shortName[ 32 ];
- PGPChar8 longName[ 96 ];
- PGPChar8 copyright[ 128 ];
- PGPFlags flags;
- PGPUInt32 reserved[ 16 ]; /* reserved; 0 for now */
-
-} PGPAlgorithmInfo;
-
-typedef struct PGPPublicKeyAlgorithmInfo
-{
- PGPAlgorithmInfo info;
-
- PGPPublicKeyAlgorithm algID;
-
- PGPBoolean canEncrypt;
- PGPBoolean canDecrypt;
- PGPBoolean canSign;
- PGPBoolean canVerify;
- PGPBoolean canGenerateKey;
- PGPBoolean reserved1;
- PGPBoolean reserved2;
- PGPBoolean reserved3;
-
- PGPUInt32 reserved[ 8 ];
-
-} PGPPublicKeyAlgorithmInfo;
-
-typedef struct PGPSymmetricCipherInfo
-{
- PGPAlgorithmInfo info;
- PGPCipherAlgorithm algID;
-
- PGPUInt32 reserved[ 8 ];
-
-} PGPSymmetricCipherInfo;
-
-#if PGP_MACINTOSH
-#pragma options align=reset /* ] */
-#endif
-
-PGP_BEGIN_C_DECLARATIONS
-
-/* return a flags word for the feature selector */
-PGPError PGPGetFeatureFlags( PGPFeatureSelector selector,
- PGPFlags *flags );
-
-/* use this to test whether a feature exists after getting flags */
-#define PGPFeatureExists( flags, maskValue ) ( ( (flags) & (maskValue) ) != 0 )
-
-
-/*____________________________________________________________________________
- Routines to determine which algorithms are present.
-
- To determine if a specific algorithm is available, you will need to
- index through the available algorithms and check the algorithm ID.
-____________________________________________________________________________*/
-
-PGPError PGPCountPublicKeyAlgorithms( PGPUInt32 *numPKAlgs );
-PGPError PGPGetIndexedPublicKeyAlgorithmInfo( PGPUInt32 theIndex,
- PGPPublicKeyAlgorithmInfo *info);
-
-PGPError PGPCountSymmetricCiphers( PGPUInt32 *numPKAlgs );
-PGPError PGPGetIndexedSymmetricCipherInfo( PGPUInt32 theIndex,
- PGPSymmetricCipherInfo *info);
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpFeatures_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpGroups.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpGroups.h
deleted file mode 100644
index 2f6ebd07af..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpGroups.h
+++ /dev/null
@@ -1,315 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpGroups.h,v 1.12 2003/08/08 04:40:39 ajivsov Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpGroups_h /* [ */
-#define Included_pgpGroups_h
-
-/*____________________________________________________________________________
- Note: All functions in this file have been deprecated and will be
- replaced in the future with equivalent functionality.
-____________________________________________________________________________*/
-
-#include "pgpPubTypes.h"
-#include "pgpEncode.h"
-
-#if PGP_DEPRECATED /* [ */
-
-#if PGP_MACINTOSH
-#include <Files.h>
-#endif
-
-#if PGP_MACINTOSH
-#pragma options align=mac68k
-#endif
-
-#define kPGPMaxGroupNameLength 63
-#define kPGPMaxGroupDescriptionLength 63
-
-typedef PGPChar8 PGPGroupName[ kPGPMaxGroupNameLength + 1 ];
-typedef PGPChar8 PGPGroupDescription[ kPGPMaxGroupDescriptionLength + 1 ];
-
-
-typedef struct PGPGroupSet * PGPGroupSetRef;
-typedef struct PGPGroupIter * PGPGroupItemIterRef;
-
-#define kInvalidPGPGroupSetRef ((PGPGroupSetRef) NULL)
-#define kInvalidPGPGroupItemIterRef ((PGPGroupItemIterRef) NULL)
-
-#define PGPGroupSetRefIsValid(ref) ((ref) != kInvalidPGPGroupSetRef)
-#define PGPGroupItemIterRefIsValid(ref) ((ref) != kInvalidPGPGroupItemIterRef)
-
-/* any type will do that is distinct */
-typedef PGPUInt32 PGPGroupID;
-#define kPGPInvalidGroupID ( (PGPGroupID)0 )
-
-enum PGPGroupItemType_
-{
- kPGPGroupItem_KeyID = 1,
- kPGPGroupItem_Group,
-
- PGP_ENUM_FORCE( PGPGroupItemType_)
-};
-PGPENUM_TYPEDEF( PGPGroupItemType_, PGPGroupItemType );
-
-/*____________________________________________________________________________
- A run-time group item, used when iterating through a group.
- For client use; not necessarily the internal storage format.
-
- 'userValue' is *not* saved to disk.
-____________________________________________________________________________*/
-
-typedef struct PGPGroupItem
-{
- PGPGroupItemType type;
- PGPUserValue userValue;
-
- union
- {
- PGPGroupID groupID;
- PGPKeyID keyID;
- } u;
-} PGPGroupItem;
-
-
-typedef PGPInt32 (*PGPGroupItemCompareProc)( PGPGroupItem *,
- PGPGroupItem *, PGPUserValue userValue );
-
-/*____________________________________________________________________________
- Info obtained via PGPGetGroupInfo.
-____________________________________________________________________________*/
-
-typedef struct PGPGroupInfo
-{
- PGPGroupID id;
- PGPGroupName name;
- PGPGroupName description;
- PGPUserValue userValue;
-
-} PGPGroupInfo;
-
-
-typedef PGPFlags PGPGroupItemIterFlags;
-/* flag (1UL << 0 ) is reserved */
-#define kPGPGroupIterFlags_Recursive (PGPFlags)(1UL << 1 )
-#define kPGPGroupIterFlags_Keys (PGPFlags)(1UL << 2 )
-#define kPGPGroupIterFlags_Groups (PGPFlags)(1UL << 3 )
-
-#define kPGPGroupIterFlags_AllKeysRecursive \
- ( kPGPGroupIterFlags_Recursive | kPGPGroupIterFlags_Keys )
-
-#define kPGPGroupIterFlags_AllGroupsRecursive \
- ( kPGPGroupIterFlags_Recursive | kPGPGroupIterFlags_Groups )
-
-#define kPGPGroupIterFlags_AllItems \
- ( kPGPGroupIterFlags_Keys | kPGPGroupIterFlags_Groups )
-
-#define kPGPGroupIterFlags_AllRecursive \
- ( kPGPGroupIterFlags_Recursive | kPGPGroupIterFlags_AllItems )
-
-
-
-#if PGP_MACINTOSH
-#pragma options align=reset
-#endif
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- Manipulating pgp group sets (PGPGroupSetRef)
-____________________________________________________________________________*/
-/* create a new, empty groups collection */
-PGPError PGPNewGroupSet( PGPContextRef context, PGPGroupSetRef *outRef );
-
-/* file is *not* left open; all data is loaded into memory */
-PGPError PGPNewGroupSetFromFile( PGPContextRef context,
- PGPFileSpecRef file,
- PGPGroupSetRef *outRef );
-
-#if PGP_MACINTOSH || PGP_OSX
-PGPError PGPNewGroupSetFromFSSpec( PGPContextRef context,
- const struct FSSpec *spec, PGPGroupSetRef *outRef );
-#endif
-
-/* overwrites existing. Don't bother unless PGPGroupSetNeedsCommit() */
-PGPError PGPSaveGroupSetToFile( PGPGroupSetRef set, PGPFileSpecRef file );
-
-/* free all data structures; be sure to save first if you want */
-PGPError PGPFreeGroupSet( PGPGroupSetRef set );
-
-
-/* has the group changed? */
-PGPBoolean PGPGroupSetNeedsCommit( PGPGroupSetRef set );
-
-PGPContextRef PGPGetGroupSetContext( PGPGroupSetRef set );
-
-/* export the groupset to a buffer. Use PGPFreeData to free the buffer */
-PGPError PGPExportGroupSetToBuffer( PGPGroupSetRef set, void **buffer,
- PGPSize *bufferSize );
-
-/* import a groupset from a buffer */
-PGPError PGPImportGroupSetFromBuffer(PGPContextRef context, void *buffer,
- PGPSize bufSize, PGPGroupSetRef *outSet );
-
-/*____________________________________________________________________________
- Manipulating groups
-
- Groups are always referred to by IDs which remain valid until the set
- is disposed.
-____________________________________________________________________________*/
-
-/* initial parent ID is kPGPInvalidGroupID */
-PGPError PGPNewGroup( PGPGroupSetRef set,
- const PGPChar8 * name, const PGPChar8 *description,
- PGPGroupID *id );
-
-PGPError PGPCountGroupsInSet( PGPGroupSetRef set,
- PGPUInt32 *numGroups);
-PGPError PGPGetIndGroupID( PGPGroupSetRef set,
- PGPUInt32 groupIndex, PGPGroupID *id );
-
-/* delete this group from the set */
-/* All references to it are removed in all sets */
-PGPError PGPDeleteGroup( PGPGroupSetRef set, PGPGroupID id );
-
-/* delete the indexed item from the group */
-/* the item may be a group or a key */
-PGPError PGPDeleteIndItemFromGroup( PGPGroupSetRef set,
- PGPGroupID id, PGPUInt32 item );
-
-/* same as PGPDeleteIndItemFromGroup, but accepts an item */
-PGPError PGPDeleteItemFromGroup( PGPGroupSetRef set,
- PGPGroupID id, PGPGroupItem const *item );
-
-
-PGPError PGPGetGroupInfo( PGPGroupSetRef set,
- PGPGroupID id, PGPGroupInfo *info );
-
-PGPError PGPSetGroupName( PGPGroupSetRef set,
- PGPGroupID id, const PGPChar8 * name );
-PGPError PGPSetGroupUserValue( PGPGroupSetRef set,
- PGPGroupID id, PGPUserValue userValue );
-PGPError PGPSetGroupDescription( PGPGroupSetRef set,
- PGPGroupID id, const PGPChar8 * name );
-
-/* 'item' specifies a group or a key id */
-/* you must fill the item in completely */
-PGPError PGPAddItemToGroup( PGPGroupSetRef set,
- PGPGroupItem const *item, PGPGroupID group );
-
-
-PGPError PGPMergeGroupIntoDifferentSet( PGPGroupSetRef fromSet,
- PGPGroupID fromID, PGPGroupSetRef toSet );
-
-PGPError PGPMergeGroupSets( PGPGroupSetRef fromSet,
- PGPGroupSetRef intoSet );
-
-PGPError PGPCopyGroupSet(PGPGroupSetRef sourceSet,
- PGPGroupSetRef *destSet);
-
-/*____________________________________________________________________________
- Manipulating group items
-____________________________________________________________________________*/
-
-/* count how many items there are in a group */
-/* totalItems includes keys and groups */
-PGPError PGPCountGroupItems( PGPGroupSetRef set,
- PGPGroupID id, PGPBoolean recursive,
- PGPUInt32 * numKeys,
- PGPUInt32 * totalItems );
-
-/* non-recursive call; index only applies to group itself */
-PGPError PGPGetIndGroupItem( PGPGroupSetRef set,
- PGPGroupID id, PGPUInt32 groupIndex, PGPGroupItem * item );
-
-/* use PGPGetIndGroupItem() if you want to get the user value */
-PGPError PGPSetIndGroupItemUserValue( PGPGroupSetRef set,
- PGPGroupID id, PGPUInt32 groupIndex, PGPUserValue userValue );
-
-PGPError PGPSortGroupItems( PGPGroupSetRef set, PGPGroupID id,
- PGPGroupItemCompareProc, PGPUserValue userValue );
-
-PGPError PGPSortGroupSet( PGPGroupSetRef set,
- PGPGroupItemCompareProc, PGPUserValue userValue );
-
-/*____________________________________________________________________________
- PGPGroupItemIterRef--iterator through group items.
-
- Special note: this is not a full-fledged iterator. You may *not* add
- or delete items while iterating and you may only move forward. However,
- you may change the values of items.
-____________________________________________________________________________*/
-
-PGPError PGPNewGroupItemIter( PGPGroupSetRef set, PGPGroupID id,
- PGPGroupItemIterFlags flags, PGPGroupItemIterRef *iter );
-
-PGPError PGPFreeGroupItemIter( PGPGroupItemIterRef iter );
-
-/* returns kPGPError_EndOfIteration when done */
-PGPError PGPGroupItemIterNext( PGPGroupItemIterRef iter,
- PGPGroupItem * item );
-
-/*____________________________________________________________________________
- Group utilities
-____________________________________________________________________________*/
-
-/*____________________________________________________________________________
- Return the lowest validity of any item in the group
- keyset should contain all keys available
- It is not an error if keys can't be found; you may want to check
- the not found count.
-
- The lowest validity is kPGPValidity_Invalid and kPGPValidity_Unknown
- is never returned.
-____________________________________________________________________________*/
-PGPError PGPGetGroupLowestValidity( PGPGroupSetRef set, PGPGroupID id,
- PGPKeyDBRef keyDB, PGPValidity * lowestValidity,
- PGPUInt32 * numKeysNotFound);
-
-/*____________________________________________________________________________
- All all the keys in the group (and its subgroups) to the keyset
-____________________________________________________________________________*/
-PGPError PGPNewKeySetFromGroup( PGPGroupSetRef set, PGPGroupID id,
- PGPKeyDBRef keyDB, PGPKeySetRef * resultSet,
- PGPUInt32 * numKeysNotFound);
-
-/*____________________________________________________________________________
- Create a simple, flattened group of unique key IDs from the source group.
- Note that sourceSet and destSet must be different.
-____________________________________________________________________________*/
-PGPError PGPNewFlattenedGroupFromGroup(PGPGroupSetRef sourceSet,
- PGPGroupID sourceID, PGPGroupSetRef destSet,
- PGPGroupID *destID);
-
-/*____________________________________________________________________________
- Perform a "standard" sort on a group
-____________________________________________________________________________*/
-PGPError PGPSortGroupSetStd( PGPGroupSetRef set, PGPKeyDBRef keydb );
-
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] PGP_DEPRECATED */
-
-#endif /* ] Included_pgpGroups_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
-
-
-
-
-
-
-
-
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpHMAC.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpHMAC.h
deleted file mode 100644
index 3dc58a6ff9..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpHMAC.h
+++ /dev/null
@@ -1,67 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpHMAC.h,v 1.6 2002/08/06 20:11:16 dallen Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpHMAC_h /* [ */
-#define Included_pgpHMAC_h
-
-#include "pgpPubTypes.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- Create a new HMAC of the specified algorithm.
-
- If the algorithm is not available then kPGPError_AlgorithmNotAvailable is
- returned.
-____________________________________________________________________________*/
-
-PGPError PGPNewHMACContext( PGPContextRef context,
- PGPHashAlgorithm algorithm, PGPByte *secret,
- PGPSize secretLen, PGPHMACContextRef *outRef );
-
-/*____________________________________________________________________________
- Any existing intermediate HMAC is lost.
-____________________________________________________________________________*/
-
-PGPError PGPFreeHMACContext( PGPHMACContextRef ref );
-
-/*____________________________________________________________________________
- Reset an HMAC as if it had been created anew. Any existing intermediate
- hash is lost.
-____________________________________________________________________________*/
-
-PGPError PGPResetHMAC( PGPHMACContextRef ref );
-
-/*____________________________________________________________________________
- Continue the HMAC, accumulating an intermediate result
-____________________________________________________________________________*/
-
-PGPError PGPContinueHMAC( PGPHMACContextRef ref, const void *in,
- PGPSize numBytes );
-
-/*____________________________________________________________________________
- Finalize the HMAC, depositing the result into 'hmacOut'.
-
- This size of the output will be the same size as the hash
- algorithm output.
-____________________________________________________________________________*/
-
-PGPError PGPFinalizeHMAC( PGPHMACContextRef ref, void *hmacOut );
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpHMAC_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpHash.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpHash.h
deleted file mode 100644
index 44225347ee..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpHash.h
+++ /dev/null
@@ -1,86 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpHash.h,v 1.6 2002/08/06 20:11:16 dallen Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpHashing_h /* [ */
-#define Included_pgpHashing_h
-
-#include "pgpPubTypes.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- Create a new hash of the specified algorithm.
-
- If the algorithm is not available then kPGPError_AlgorithmNotAvailable is
- returned.
-____________________________________________________________________________*/
-
-PGPError PGPNewHashContext( PGPContextRef context,
- PGPHashAlgorithm algorithm,
- PGPHashContextRef * outRef );
-
-/*____________________________________________________________________________
- Any existing intermediate hash is lost.
-____________________________________________________________________________*/
-
-PGPError PGPFreeHashContext( PGPHashContextRef ref );
-
-/*____________________________________________________________________________
- An exact duplicate of the hash is made.
-____________________________________________________________________________*/
-
-PGPError PGPCopyHashContext( PGPHashContextRef ref,
- PGPHashContextRef * outRef);
-
-/*____________________________________________________________________________
- Reset a hash as if it had been created anew. Any existing intermediate
- hash is lost.
-____________________________________________________________________________*/
-
-PGPError PGPResetHash( PGPHashContextRef ref );
-
-/*____________________________________________________________________________
- Continue the hash, accumulating an intermediate result
-____________________________________________________________________________*/
-
-PGPError PGPContinueHash( PGPHashContextRef ref, const void *in,
- PGPSize numBytes );
-
-/*____________________________________________________________________________
- Finalize the hash, depositing the result into 'hashOut'.
-
- After calling this routine, the hash is reset via PGPResetHash().
- If you want an intermediate result, use PGPCopyHash() and finalize the
- copy.
-____________________________________________________________________________*/
-
-PGPError PGPFinalizeHash( PGPHashContextRef ref, void *hashOut );
-
-/*____________________________________________________________________________
- Determine size of resulting hash in bytes e.g. a 160 bit hash yields 20.
- Used for generic code which may not know how big a hash is being produced.
-
- Question: can we reasonably assume 8 bits per byte? If not, how does
- PGPFinalizeHash return its result?
-____________________________________________________________________________*/
-
-PGPError PGPGetHashSize( PGPHashContextRef ref, PGPSize *hashSize );
-
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpHashing_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpHashWords.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpHashWords.h
deleted file mode 100644
index 4c3c82cb8b..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpHashWords.h
+++ /dev/null
@@ -1,40 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpHashWords.h,v 1.2 2004/01/03 02:25:31 bgaiser Exp $
-____________________________________________________________________________*/
-#ifndef HASHWORDLIST_H
-#define HASHWORDLIST_H
-
-#include "pgpBase.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- Hash word list types
-____________________________________________________________________________*/
-enum PGPHashWordList_
-{
- kPGPHashWordList_Even = 0,
- kPGPHashWordList_Odd = 1,
-
- PGP_ENUM_FORCE( PGPHashWordList_ )
-};
-PGPENUM_TYPEDEF( PGPHashWordList_, PGPHashWordList );
-
-/*____________________________________________________________________________
- Hash word functions
-____________________________________________________________________________*/
-
- PGPError
-PGPGetHashWordString(
- PGPUInt32 index,
- PGPHashWordList list,
- PGPChar8 hashWordString[ 12 ]);
-
-
-PGP_END_C_DECLARATIONS
-
-#endif
-
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpIKE.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpIKE.h
deleted file mode 100644
index 23a28c8bc2..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpIKE.h
+++ /dev/null
@@ -1,784 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpIKE.h,v 1.39 2003/09/24 03:09:32 ajivsov Exp $
-____________________________________________________________________________*/
-#ifndef Included_PGPike_h /* [ */
-#define Included_PGPike_h
-
-#include "pgpPubTypes.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-#if PGP_WIN32
-# pragma pack(push, 8)
-#endif
-
-#ifdef _MSC_VER
-#pragma warning (disable:4200)
-#endif
-
-typedef struct PGPikeContext * PGPikeContextRef;
-
-#define kInvalidPGPikeContextRef ((PGPikeContextRef) NULL)
-#define PGPikeContextRefIsValid( ref ) ( (ref) != kInvalidPGPikeContextRef )
-
-#define kPGPike_CommonPort 500
-#define kPGPike_AuthMaximumKeySize (512/8)
-#define kPGPike_ESPMaximumKeySize 32 /* 256 bits */
-#define kPGPike_MaxExplicitIVSize 16
-#define kPGPike_MaxTransforms 3
-#define kPGPike_DefaultKBLife 1048576 /* 1GB */
-#define kPGPike_DefaultSecLife 86400 /* 1 Day */
-#define kPGPike_UserDataSize 96
-#define kPGPike_XAuthStringLen 128
-#define kPGPike_XAuthMessageLen 256
-
-typedef PGPByte PGPipsecSPI[4];
-
-enum PGPikeDOI_
-{
- kPGPike_DOI_IKE = 0,
- kPGPike_DOI_IPSEC = 1,
-
- PGP_ENUM_FORCE( PGPikeDOI_ )
-};
-PGPENUM_TYPEDEF( PGPikeDOI_, PGPikeDOI );
-
-enum PGPikeAlert_
-{
- kPGPike_AL_None = 0,
-
- /* Error Types */
- kPGPike_AL_InvalidPayload = 1,
- kPGPike_AL_DOIUnsupported = 2,
- kPGPike_AL_SituationUnsupported = 3,
- kPGPike_AL_InvalidCookie = 4,
- kPGPike_AL_InvalidMajorVersion = 5,
- kPGPike_AL_InvalidMinorVersion = 6,
- kPGPike_AL_InvalidExchange = 7,
- kPGPike_AL_InvalidFlags = 8,
- kPGPike_AL_InvalidMessageID = 9,
- kPGPike_AL_InvalidProtocolID = 10,
- kPGPike_AL_InvalidSPI = 11,
- kPGPike_AL_InvalidTransform = 12,
- kPGPike_AL_InvalidAttribute = 13,
- kPGPike_AL_NoProposalChoice = 14,
- kPGPike_AL_BadProposal = 15,
- kPGPike_AL_PayloadMalformed = 16,
- kPGPike_AL_InvalidKey = 17,
- kPGPike_AL_InvalidID = 18,
- kPGPike_AL_InvalidCertEncoding = 19,
- kPGPike_AL_InvalidCert = 20,
- kPGPike_AL_UnsupportedCert = 21,
- kPGPike_AL_InvalidCertAuthority = 22,
- kPGPike_AL_InvalidHash = 23,
- kPGPike_AL_AuthenticationFailed = 24,
- kPGPike_AL_InvalidSignature = 25,
- kPGPike_AL_AddressNotification = 26,
- kPGPike_AL_NotifySALifetime = 27,
- kPGPike_AL_CertUnavailable = 28,
- kPGPike_AL_UnsupportedExchange = 29,
- kPGPike_AL_UnequalPayloadLengths = 30,
-
- kPGPike_AL_NATTranslationFailure = 16300,
- kPGPike_AL_LastErrorType = 16301,
-
- /* Status Types */
- kPGPike_AL_Connected = 16384,
- kPGPike_AL_ResponderLifetime = 24576, /* IPSEC DOI */
- kPGPike_AL_ReplayStatus = 24577, /* IPSEC DOI */
- kPGPike_AL_InitialContact = 24578, /* IPSEC DOI */
-
- PGP_ENUM_FORCE( PGPikeAlert_ )
-};
-PGPENUM_TYPEDEF( PGPikeAlert_, PGPikeAlert );
-
-enum PGPikeInternalAlert_
-{
- kPGPike_IA_None = 0,
-
- kPGPike_IA_ResponseTimeout = 1,
- kPGPike_IA_NoProposals = 2,
- kPGPike_IA_NewPhase1SA = 3,
- kPGPike_IA_NewPhase2SA = 4,
- kPGPike_IA_DeadPhase1SA = 5,
- kPGPike_IA_DeadPhase2SA = 6,
- kPGPike_IA_TooManyExchanges = 7,
- kPGPike_IA_XAuthSuccess = 8,
- kPGPike_IA_XAuthFailed = 9,
-
- PGP_ENUM_FORCE( PGPikeInternalAlert_ )
-};
-PGPENUM_TYPEDEF( PGPikeInternalAlert_, PGPikeInternalAlert );
-
-enum PGPikePref_
-{
- kPGPike_PF_None = 0,
-
- kPGPike_PF_Expiration = 1,
- kPGPike_PF_AllowedAlgorithms = 2,
- kPGPike_PF_IKEProposals = 3,
- kPGPike_PF_IPSECProposals = 4,
-
- PGP_ENUM_FORCE( PGPikePref_ )
-};
-PGPENUM_TYPEDEF( PGPikePref_, PGPikePref );
-
-enum PGPipsecEncapsulation_
-{
- kPGPike_PM_None = 0,
-
- kPGPike_PM_Tunnel = 1,
- kPGPike_PM_Transport = 2,
- kPGPike_PM_UDPencapsulatedTunnel = 61443,
- kPGPike_PM_UDPencapsulatedTransport = 61444,
-
- PGP_ENUM_FORCE( PGPipsecEncapsulation_ )
-};
-PGPENUM_TYPEDEF( PGPipsecEncapsulation_, PGPipsecEncapsulation );
-
-enum PGPikeLifeType_
-{
- kPGPike_LT_None = 0,
-
- kPGPike_LT_Seconds = 1,
- kPGPike_LT_Kilobytes = 2,
-
- PGP_ENUM_FORCE( PGPikeLifeType_ )
-};
-PGPENUM_TYPEDEF( PGPikeLifeType_, PGPikeLifeType );
-
-enum PGPipsecIdentity_
-{
- kPGPike_ID_None = 0,
-
- kPGPike_ID_IPV4_Addr,
- kPGPike_ID_FQDN,
- kPGPike_ID_UserFQDN,
- kPGPike_ID_IPV4_Addr_Subnet,
- kPGPike_ID_IPV6_Addr,
- kPGPike_ID_IPV6_Addr_Subnet,
- kPGPike_ID_IPV4_Addr_Range,
- kPGPike_ID_IPV6_Addr_Range,
- kPGPike_ID_DER_ASN1_DN,
- kPGPike_ID_DER_ASN1_GN,
- kPGPike_ID_Key_ID, /* used for PGP fingerprint */
-
- PGP_ENUM_FORCE( PGPipsecIdentity_ )
-};
-PGPENUM_TYPEDEF( PGPipsecIdentity_, PGPipsecIdentity );
-
-/* If it doesn't say supported, it isn't. */
-enum PGPipsecAHTransformID_
-{
- kPGPike_AH_None = 0,
-
- kPGPike_AH_MD5 = 2, /* supported */
- kPGPike_AH_SHA = 3, /* supported */
- kPGPike_AH_DES = 4,
- kPGPike_AH_SHA2_256 = 5, /* supported */
- kPGPike_AH_SHA2_384 = 6, /* supported */
- kPGPike_AH_SHA2_512 = 7, /* supported */
-
- PGP_ENUM_FORCE( PGPipsecAHTransformID_ )
-};
-PGPENUM_TYPEDEF( PGPipsecAHTransformID_, PGPipsecAHTransformID );
-
-enum PGPipsecAuthAttribute_
-{
- kPGPike_AA_None = 0,
-
- kPGPike_AA_HMAC_MD5 = 1, /* supported */
- kPGPike_AA_HMAC_SHA = 2, /* supported */
- kPGPike_AA_DES_MAC = 3,
- kPGPike_AA_KPDK = 4,
- kPGPike_AA_HMAC_SHA2_256 = 5, /* supported */
- kPGPike_AA_HMAC_SHA2_384 = 6, /* supported */
- kPGPike_AA_HMAC_SHA2_512 = 7, /* supported */
-
- PGP_ENUM_FORCE( PGPipsecAuthAttribute_ )
-};
-PGPENUM_TYPEDEF( PGPipsecAuthAttribute_, PGPipsecAuthAttribute );
-
-enum PGPipsecESPTransformID_
-{
- kPGPike_ET_DES_IV64 = 1, /* supported */
- kPGPike_ET_DES = 2, /* supported */
- kPGPike_ET_3DES = 3, /* supported */
- kPGPike_ET_RC5 = 4,
- kPGPike_ET_IDEA = 5,
- kPGPike_ET_CAST = 6, /* supported */
- kPGPike_ET_Blowfish = 7,
- kPGPike_ET_3IDEA = 8,
- kPGPike_ET_DES_IV32 = 9,
- kPGPike_ET_RC4 = 10,
- kPGPike_ET_NULL = 11, /* supported */
- kPGPike_ET_AES = 12,
-
- PGP_ENUM_FORCE( PGPipsecESPTransformID_ )
-};
-PGPENUM_TYPEDEF( PGPipsecESPTransformID_, PGPipsecESPTransformID );
-
-/* IPCOMP is not supported by this version of PGPike */
-enum PGPipsecIPCOMPTransformID_
-{
- kPGPike_IC_None = 0,
-
- kPGPike_IC_OUI = 1,
- kPGPike_IC_Deflate = 2, /* supported */
- kPGPike_IC_LZS = 3, /* supported */
- kPGPike_IC_V42bis = 4,
-
- PGP_ENUM_FORCE( PGPipsecIPCOMPTransformID_ )
-};
-PGPENUM_TYPEDEF( PGPipsecIPCOMPTransformID_, PGPipsecIPCOMPTransformID );
-
-enum PGPipsecProtocol_
-{
- kPGPike_PR_None = 0,
- kPGPike_PR_IKE = 1,
- kPGPike_PR_AH = 2,
- kPGPike_PR_ESP = 3,
- kPGPike_PR_IPCOMP = 4,
-
- PGP_ENUM_FORCE( PGPipsecProtocol_ )
-};
-PGPENUM_TYPEDEF( PGPipsecProtocol_, PGPipsecProtocol );
-
-enum PGPikeGroupID_
-{
- kPGPike_GR_None = 0, /* supported */
-
- kPGPike_GR_MODPOne = 1, /* supported */
- kPGPike_GR_MODPTwo = 2, /* supported */
- kPGPike_GR_MODPFive = 5, /* supported */
-
- kPGPike_GR_ECSix = 6, /* supported */
- kPGPike_GR_ECSeven = 7, /* supported */
-
- kPGPike_GR_ECEight = 8, /* supported */
- kPGPike_GR_ECNine = 9, /* supported */
-
- kPGPike_GR_MODP2048 = 42048,/* unassigned */
- kPGPike_GR_MODP3072 = 43072,/* unassigned */
- kPGPike_GR_MODP4096 = 44096,/* unassigned */
- kPGPike_GR_MODP6144 = 46144,/* unassigned */
- kPGPike_GR_MODP8192 = 48192,/* unassigned */
-
- PGP_ENUM_FORCE( PGPikeGroupID_ )
-};
-PGPENUM_TYPEDEF( PGPikeGroupID_, PGPikeGroupID );
-
-enum PGPikeCipher_
-{
- kPGPike_SC_None = 0,
-
- kPGPike_SC_DES_CBC = 1, /* supported */
- kPGPike_SC_IDEA_CBC = 2,
- kPGPike_SC_Blowfish_CBC = 3,
- kPGPike_SC_RC5_R16_B64_CBC = 4,
- kPGPike_SC_3DES_CBC = 5, /* supported */
- kPGPike_SC_CAST_CBC = 6, /* supported */
- kPGPike_SC_AES_CBC = 7,
-
- PGP_ENUM_FORCE( PGPikeCipher_ )
-};
-PGPENUM_TYPEDEF( PGPikeCipher_, PGPikeCipher );
-
-enum PGPikeHash_
-{
- kPGPike_HA_None = 0,
-
- kPGPike_HA_MD5 = 1, /* supported */
- kPGPike_HA_SHA1 = 2, /* supported */
- kPGPike_HA_Tiger = 3,
- kPGPike_HA_SHA2_256 = 4,
- kPGPike_HA_SHA2_384 = 5,
- kPGPike_HA_SHA2_512 = 6,
-
- PGP_ENUM_FORCE( PGPikeHash_ )
-};
-PGPENUM_TYPEDEF( PGPikeHash_, PGPikeHash );
-
-enum PGPikeAuthMethod_
-{
- kPGPike_AM_None = 0,
-
- kPGPike_AM_PreSharedKey = 1, /* supported */
- kPGPike_AM_DSS_Sig = 2, /* supported */
- kPGPike_AM_RSA_Sig = 3, /* supported */
- kPGPike_AM_RSA_Encrypt = 4,
- kPGPike_AM_RSA_Encrypt_R = 5,
-
- kPGPike_AM_HAuth_InitRSA = 64221,
- kPGPike_AM_HAuth_RespRSA = 64222,
- kPGPike_AM_HAuth_InitDSS = 64223,
- kPGPike_AM_HAuth_RespDSS = 64224,
-
- kPGPike_AM_XAuth_InitPreShared = 65001,
- kPGPike_AM_XAuth_RespPreShared = 65002,
- kPGPike_AM_XAuth_InitDSS = 65003,
- kPGPike_AM_XAuth_RespDSS = 65004,
- kPGPike_AM_XAuth_InitRSA = 65005,
- kPGPike_AM_XAuth_RespRSA = 65006,
- kPGPike_AM_XAuth_InitRSAEncryption = 65007,
- kPGPike_AM_XAuth_RespRSAEncryption = 65008,
- kPGPike_AM_XAuth_InitRSAREncryption = 65009,
- kPGPike_AM_XAuth_RespRSAREncryption = 65010,
-
- PGP_ENUM_FORCE( PGPikeAuthMethod_ )
-};
-PGPENUM_TYPEDEF( PGPikeAuthMethod_, PGPikeAuthMethod );
-
-enum PGPikeAuthStyle_
-{
- kPGPike_AS_Normal = 0,
-
- kPGPike_AS_XAuth = 1,
- kPGPike_AS_HybridAuth = 2,
-
- PGP_ENUM_FORCE( PGPikeAuthStyle_ )
-};
-PGPENUM_TYPEDEF( PGPikeAuthStyle_, PGPikeAuthStyle );
-
-enum PGPikeXAuthType_
-{
- kPGPike_XT_Generic = 0,
-
- kPGPike_XT_RADIUS_CHAP = 1,
- kPGPike_XT_OTP = 2,
- kPGPike_XT_SKEY = 3,
-
- PGP_ENUM_FORCE( PGPikeXAuthType_ )
-};
-PGPENUM_TYPEDEF( PGPikeXAuthType_, PGPikeXAuthType );
-
-enum PGPikeEncapsulateMode_
-{
- kPGPike_EM_Auto = 0,
-
- kPGPike_EM_Always = 1,
- kPGPike_EM_Never = 2,
-
- PGP_ENUM_FORCE( PGPikeEncapsulateMode_ )
-};
-PGPENUM_TYPEDEF( PGPikeEncapsulateMode_, PGPikeEncapsulateMode );
-
-typedef struct PGPipsecESPTransform
-{
- PGPipsecESPTransformID cipher;
- PGPUInt32 keyLength;
- /* cipher key bit size, must be 0 for all except AES */
- PGPipsecAuthAttribute authAttr;
- PGPipsecEncapsulation mode;
-} PGPipsecESPTransform;
-
-typedef struct PGPipsecAHTransform
-{
- PGPipsecAHTransformID authAlg;
- PGPipsecAuthAttribute authAttr;
- PGPipsecEncapsulation mode;
-} PGPipsecAHTransform;
-
-typedef struct PGPipsecIPCOMPTransform
-{
- PGPipsecIPCOMPTransformID compAlg;
-} PGPipsecIPCOMPTransform;
-
-typedef struct PGPikeTransform
-{
- PGPikeAuthMethod authMethod;
- PGPikeHash hash;
- PGPikeCipher cipher;
- PGPUInt32 keyLength; /* cipher key bit size, must be 0 for all except AES */
- PGPikeGroupID groupID;
-} PGPikeTransform;
-
-typedef struct PGPipsecTransform
-{
- PGPBoolean useESP;
- PGPipsecESPTransform esp;
-
- PGPBoolean useAH;
- PGPipsecAHTransform ah;
-
- PGPBoolean useIPCOMP;
- PGPipsecIPCOMPTransform ipcomp;
-
- PGPikeGroupID groupID;
-} PGPipsecTransform;
-
-typedef struct PGPipsecDOIParams
-{
- PGPipsecSPI inSPI;
- PGPipsecSPI outSPI;
- PGPipsecProtocol protocol;
-
- union
- {
- struct
- {
- PGPipsecAHTransform t;
- PGPByte inAuthKey[kPGPike_AuthMaximumKeySize];
- PGPByte outAuthKey[kPGPike_AuthMaximumKeySize];
- } ah;
-
- struct
- {
- PGPipsecESPTransform t;
- PGPByte inESPKey[kPGPike_ESPMaximumKeySize];
- PGPByte outESPKey[kPGPike_ESPMaximumKeySize];
- PGPByte inAuthKey[kPGPike_AuthMaximumKeySize];
- PGPByte outAuthKey[kPGPike_AuthMaximumKeySize];
- PGPByte explicitIV[kPGPike_MaxExplicitIVSize];
- } esp;
-
- struct
- {
- PGPipsecIPCOMPTransform t;
- } ipcomp;
- } u;
-} PGPipsecDOIParams;
-
-typedef struct PGPipsecSA
-{
- struct PGPipsecSA * nextSA; /* INTERNAL USE ONLY */
- struct PGPipsecSA * prevSA; /* INTERNAL USE ONLY */
- PGPUInt32 ipAddress; /* PreNATted(Original) IP Address */
- PGPBoolean destIsRange; /* dest is IP range */
- PGPUInt32 ipAddrStart; /* IP address */
- PGPUInt32 ipMaskEnd; /* mask or end range IP address */
- PGPByte ipProtocol; /* 0 if all protocols */
- PGPUInt16 ipPort; /* 0 if all ports */
-
- PGPBoolean bNATTraversal; /* NAT Encapsulation is enabled if true */
- PGPBoolean bIsLocalIPNAT; /* if non-zero, our local IP is natted */
- PGPBoolean bIsRemoteIPNAT; /* if non-zero, remote IP is NATed */
- PGPUInt32 natIPAddress; /* NATed Dest IP Address, 0 if not NATed */
- PGPUInt16 nboNATPort; /* NATed Dest Port value */
-
- PGPUInt32 assignedIP; /* if non-zero, use as tunnel IP */
- PGPUInt32 assignedDNS; /* if non-zero, use as tunnel DNS */
- PGPUInt32 assignedWINS; /* if non-zero, use as tunnel WINS */
-
- PGPBoolean initiator; /* was this SA initiated locally */
- PGPBoolean activeIn; /* use for inbound data */
- PGPBoolean activeOut; /* use for outbound data */
- PGPUInt32 kbLifeTime; /* max KB to be sent on this SA */
- PGPUInt32 secLifeTime; /* max seconds this SA will live */
- /* 0 means no limit for either */
- PGPTime birthTime;
-
- PGPUInt16 numTransforms;
- PGPipsecDOIParams transform[kPGPike_MaxTransforms];
-
- PGPTime termSchedule; /* SA will be terminated, private */
- PGPByte userData[kPGPike_UserDataSize];/* for your use */
-} PGPipsecSA;
-
-/* When sent a kPGPike_MT_SARequest, pgpIKE will expect that
- all fields below will be filled in. The approved member is
- irrelevant in that case.
-
- When you are called with kPGPike_MT_PolicyCheck, pgpIKE will
- set everything to 0 except the IP address. You are expected
- to fill in the other fields with local policy. The PolicyCheck
- is used for remote-initiated SA negotiation. Since you cannot
- predict which remote network might be trying to communicate
- with us, you should leave the destIsRange/ipAddrStart/ipMaskEnd
- and ipPort/ipProtocol fields set to 0 for this message. You
- will be called to check those later with the ClientIDCheck.
-*/
-typedef struct PGPikeMTSASetup
-{
- PGPBoolean approved; /* > */
-
- PGPUInt32 ipAddress; /* destination */
- PGPUInt32 localIPAddress; /* source */
- PGPByte ipProtocol;
- PGPUInt16 ipPort;
- PGPByte * sharedKey; /* null if none, data will be copied */
- PGPSize sharedKeySize; /* w/o NULL-terminate */
- PGPBoolean aggressive; /* set for aggressive mode */
- PGPBoolean lightweight; /* only for SARequest, set to
- TRUE for only 1 retry */
- /* set the fields below to use tunnel mode */
- PGPBoolean destIsRange;
- PGPUInt32 ipAddrStart;
- PGPUInt32 ipMaskEnd;
-
- PGPBoolean virtualIP; /* whether to use mode-cfg */
- PGPikeAuthStyle authStyle; /* whether to use xauth/hybrid */
- PGPikeEncapsulateMode encapsulateMode; /* Force NAT Traversal mode */
-
- PGPipsecIdentity idType; /* only useful in shared key mode */
- PGPByte * idData; /* data will be copied */
- PGPSize idDataSize; /* this is the Phase 1 ID */
-} PGPikeMTSASetup;
-
-/*
- When you are called with a kPGPike_MT_ClientIDCheck, all fields
- will be set appropriately. If the destIsRange/ipAddrStart/ipMaskEnd
- triad is permitted to be represented by the IP address, set
- the approved field to true. This message is only sent in the case
- where the remote side is the initiator and you have already been
- called with a kPGPike_MT_PolicyCheck message.
-*/
-typedef struct PGPikeMTClientIDCheck
-{
- PGPBoolean approved; /* > */
-
- PGPUInt32 ipAddress;
- PGPByte ipProtocol;
- PGPUInt16 ipPort;
-
- PGPBoolean destIsRange;
- PGPUInt32 ipAddrStart;
- PGPUInt32 ipMaskEnd;
-} PGPikeMTClientIDCheck;
-
-typedef struct PGPikeMTSAEstablished
-{
- PGPipsecSA * sa;
- PGPBoolean remoteValid;
- PGPByte * remoteAuthKey; /* binary exported key data */
- PGPSize remoteAuthKeySize;
-} PGPikeMTSAEstablished;
-
-typedef struct PGPikeMTSAFailed
-{
- PGPUInt32 ipAddress; /* destination */
- PGPByte ipProtocol;
- PGPUInt16 ipPort;
-
- PGPBoolean destIsRange;
- PGPUInt32 ipAddrStart;
- PGPUInt32 ipMaskEnd;
-
-} PGPikeMTSAFailed;
-
-typedef struct PGPikeMTCert
-{
- PGPUInt32 ipAddress; /* < */
- PGPKeyDBRef baseKeyDB; /* > */
- PGPKeyDBObjRef authObj; /* > PGP key or X.509 cert */
-
- PGPBoolean isPassKey; /* > */
- void * pass; /* > null-term if passphrase, Unicode, copied */
- PGPSize passLength; /* > in PGPChar8s */
-} PGPikeMTCert;
-
-typedef struct PGPikeMTRemoteCert
-{
- PGPBoolean approved; /* > */
- PGPBoolean valid; /* > */
- PGPUInt32 ipAddress; /* < */
- PGPKeyDBObjRef remoteObj; /* < PGPkey or X.509 cert */
- PGPKeyDBRef remoteKeyDB; /* < any other keys/certs are part of
- this cert's chain */
-} PGPikeMTRemoteCert;
-
-typedef struct PGPikeMTPacket
-{
- PGPUInt32 ipAddress; /* source or destination */
- PGPUInt16 port; /* usually UDP 500, but might not be */
- PGPSize packetSize;
- PGPByte * packet; /* msg *sender* must free this */
-} PGPikeMTPacket;
-
-typedef struct PGPikeMTIdentity
-{
- PGPBoolean active; /* TRUE = set it, FALSE= dead */
- PGPUInt32 ipAddress; /* Gateway IP */
- PGPUInt32 assignedIP;
- PGPUInt32 assignedDNS;
- PGPUInt32 assignedWINS;
-} PGPikeMTIdentity;
-
-typedef struct PGPikeMTAlert
-{
- PGPikeAlert alert;
- PGPUInt32 ipAddress;
- PGPikeInternalAlert value; /* used if alert is kPGPike_AL_None */
- PGPBoolean remoteGenerated;
-} PGPikeMTAlert;
-
-typedef PGPUInt32 PGPikeAESKeyLengthMask;
-
-#define kPGPike_AESKeyLength128 1
-#define kPGPike_AESKeyLength192 2
-#define kPGPike_AESKeyLength256 4
-#define kPGPike_AESKeyLengthAll 7
-
-typedef struct PGPikeAllowedAlgorithms
-{
- PGPBoolean cast5;
- PGPBoolean tripleDES;
- PGPBoolean singleDES;
- PGPikeAESKeyLengthMask aes;
- PGPBoolean espNULL;
-
- PGPBoolean sha1;
- PGPBoolean md5;
- PGPBoolean sha2_256;
- PGPBoolean sha2_384;
- PGPBoolean sha2_512;
- PGPBoolean noAuth;
-
- PGPBoolean lzs;
- PGPBoolean deflate;
-
- PGPBoolean modpOne768;
- PGPBoolean modpTwo1024;
- PGPBoolean modpFive1536;
-
- PGPBoolean ec2n163;
- PGPBoolean ec2n283;
-
- PGPBoolean modp2048;
- PGPBoolean modp3072;
- PGPBoolean modp4096;
- PGPBoolean modp6144;
- PGPBoolean modp8192;
-
-} PGPikeAllowedAlgorithms;
-
-typedef struct PGPikeMTPref
-{
- PGPikePref pref;
-
- union
- {
- struct
- {
- PGPUInt32 kbLifeTimeIKE;
- PGPUInt32 secLifeTimeIKE;
- PGPUInt32 kbLifeTimeIPSEC;
- PGPUInt32 secLifeTimeIPSEC;
- } expiration; /* kPGPike_PF_Expiration */
-
- struct
- {
- PGPUInt32 numTransforms;
- PGPikeTransform * t;
- } ikeProposals; /* kPGPike_PF_IKEProposals */
-
-
- struct
- {
- PGPUInt32 numTransforms;
- PGPipsecTransform * t;
- } ipsecProposals; /* kPGPike_PF_IPSECProposals */
-
- PGPikeAllowedAlgorithms allowedAlgorithms;
- /*kPGPike_PF_AllowedAlgorithms*/
- } u;
-} PGPikeMTPref;
-
-/* This message will be sent to check extended authentication. The buffer
- will be freed after your callback is called, so if you need it,
- copy the data elsewhere. You must retrieve the information and then
- send an AuthCheck message back to IKE with the contents filled in,
- and all contents preserved other than what you filled in. The message
- you send back is your memory, IKE will not free it. */
-typedef struct PGPikeMTAuthCheck
-{
- PGPBoolean success; /* set to true unless user aborts */
- PGPUInt32 gatewayIP;
- PGPikeXAuthType xauthType;
- PGPUInt16 transactionID; /* private */
- PGPBoolean includeType; /* private */
-
- PGPBoolean useUserName;
- PGPBoolean usePassword;
- PGPBoolean usePasscode;
- PGPBoolean useMessage;
- PGPBoolean useChallenge;
- PGPBoolean useDomain;
-
- PGPChar8 userName[kPGPike_XAuthStringLen];
- PGPChar8 password[kPGPike_XAuthStringLen];
- PGPChar8 passcode[kPGPike_XAuthStringLen];
- PGPChar8 message[kPGPike_XAuthMessageLen];
- PGPChar8 challenge[kPGPike_XAuthStringLen];
- PGPChar8 domain[kPGPike_XAuthStringLen];
- PGPSize challengeSize;
-} PGPikeMTAuthCheck;
-
-enum PGPikeMessageType_
-{
- /*
- Message types followed by ">" may be sent to PGPike
- Message typed followed by "<" may be sent by PGPike
- */
- kPGPike_MT_Idle = 0, /* > call this often */
- kPGPike_MT_SARequest, /* > PGPikeMTSASetup */
- kPGPike_MT_SARequestFailed, /* < PGPikeMTSAFailed */
- kPGPike_MT_SAEstablished, /* < PGPikeMTSAEstablished */
- kPGPike_MT_SARekey, /* > PGPipsecSA */
- kPGPike_MT_SADied, /* >< PGPipsecSA */
- kPGPike_MT_SAUpdate, /* < PGPipsecSA */
- kPGPike_MT_SAKillAll, /* > none */
-
- kPGPike_MT_PolicyCheck, /* < PGPikeMTSASetup */
- kPGPike_MT_ClientIDCheck, /* < PGPikeMTClientIDCheck */
- kPGPike_MT_AuthCheck, /* >< PGPikeMTAuthCheck */
- kPGPike_MT_LocalPGPCert, /* < PGPikeMTCert */
- kPGPike_MT_LocalX509Cert, /* < PGPikeMTCert */
- kPGPike_MT_RemoteCert, /* < PGPikeMTRemoteCert */
- kPGPike_MT_Identity, /* < PGPikeMTIdentity */
-
- kPGPike_MT_Packet, /* >< PGPikeMTPacket */
- kPGPike_MT_Alert, /* < PGPikeMTAlert */
-
- kPGPike_MT_Pref, /* > PGPikeMTPref */
-
- kPGPike_MT_DebugLog, /* < PGPChar8 * */
-
- PGP_ENUM_FORCE( PGPikeMessageType_ )
-};
-PGPENUM_TYPEDEF( PGPikeMessageType_, PGPikeMessageType );
-
-typedef PGPError (* PGPikeMessageProcPtr)(
- PGPikeContextRef ike,
- void * inUserData,
- PGPikeMessageType msg,
- void * data );
-
-PGPError PGPNewIKEContext(
- PGPContextRef context,
- PGPikeMessageProcPtr ikeMessageProc,
- void * inUserData,
- PGPikeContextRef * outRef );
-
-PGPError PGPFreeIKEContext(
- PGPikeContextRef ref );
-
-/* Any error from PGPikeProcessMessage is fatal. Non-fatal
- errors are sent through the kPGPike_MT_Alert message. */
-
-PGPError PGPikeProcessMessage(
- PGPikeContextRef ref,
- PGPikeMessageType msg,
- void * data );
-
-
-#if PGP_WIN32
-# pragma pack(pop)
-#endif
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_PGPike_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpKeyServer.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpKeyServer.h
deleted file mode 100644
index 27594ea8b1..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpKeyServer.h
+++ /dev/null
@@ -1,339 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpKeyServer.h,v 1.20 2004/01/23 08:12:49 dallen Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpKeyServer_h
-#define Included_pgpKeyServer_h
-
-#include "pgpOptionList.h"
-#include "pgpErrors.h"
-#include "pgpGroups.h"
-#include "pgpTLS.h"
-
-
-enum PGPKeyServerState_
-{
- kPGPKeyServerState_Invalid = 0,
- kPGPKeyServerState_Opening = 1,
- kPGPKeyServerState_Querying = 2,
- kPGPKeyServerState_ReceivingResults = 3,
- kPGPKeyServerState_ProcessingResults = 4,
- kPGPKeyServerState_Uploading = 5,
- kPGPKeyServerState_Deleting = 6,
- kPGPKeyServerState_Disabling = 7,
- kPGPKeyServerState_Closing = 8,
-
- kPGPKeyServerState_TLSUnableToSecureConnection = 9,
- kPGPKeyServerState_TLSConnectionSecured = 10,
-
- PGP_ENUM_FORCE(PGPKeyServerState_)
-};
-
-PGPENUM_TYPEDEF(PGPKeyServerState_, PGPKeyServerState);
-
-enum PGPKeyServerProtocol_
-{
- kPGPKeyServerProtocol_Invalid = 0,
- kPGPKeyServerProtocol_LDAP = 1,
- kPGPKeyServerProtocol_HTTP = 2,
- kPGPKeyServerProtocol_LDAPS = 3,
- kPGPKeyServerProtocol_HTTPS = 4,
-
- PGP_ENUM_FORCE( PGPKeyServerProtocol_ )
-};
-
-PGPENUM_TYPEDEF( PGPKeyServerProtocol_, PGPKeyServerProtocol );
-
-enum PGPKeyServerClass_
-{
- kPGPKeyServerClass_Invalid = 0,
- kPGPKeyServerClass_PGP = 1,
- kPGPKeyServerClass_LDAPX509 = 2,
- kPGPKeyServerClass_LDAPPGP = 3, /* deprecated, use kPGPKeyServerClass_PGP instead */
-
- /* CA types */
- kPGPKeyServerClass_NetToolsCA = 10,
- kPGPKeyServerClass_Verisign = 11,
- kPGPKeyServerClass_Entrust = 12,
- kPGPKeyServerClass_Netscape = 13,
- kPGPKeyServerClass_Microsoft = 14,
-
- PGP_ENUM_FORCE( PGPKeyServerClass_ )
-};
-
-PGPENUM_TYPEDEF( PGPKeyServerClass_, PGPKeyServerClass );
-
-enum PGPKeyServerKeySpace_ /* These are only valid for LDAP keyservers */
-{
- kPGPKeyServerKeySpace_Invalid = 0,
- kPGPKeyServerKeySpace_Default = 1,
- kPGPKeyServerKeySpace_Normal = 2,
- kPGPKeyServerKeySpace_Pending = 3,
-
- PGP_ENUM_FORCE( PGPKeyServerKeySpace_ )
-};
-
-PGPENUM_TYPEDEF( PGPKeyServerKeySpace_, PGPKeyServerKeySpace );
-
-enum PGPKeyServerAccessType_ /* These are only valid for LDAP keyservers */
-{
- kPGPKeyServerAccessType_Invalid = 0,
- kPGPKeyServerAccessType_Default = 1,
- kPGPKeyServerAccessType_Normal = 2,
- kPGPKeyServerAccessType_Administrator = 3,
-
- PGP_ENUM_FORCE( PGPKeyServerAccessType_ )
-};
-
-PGPENUM_TYPEDEF( PGPKeyServerAccessType_, PGPKeyServerAccessType );
-
-enum PGPProxyServerType_
-{
- kPGPProxyServerType_Invalid = 0,
- kPGPProxyServerType_HTTP = 1,
- kPGPProxyServerType_HTTPS = 2,
-
- PGP_ENUM_FORCE(PGPProxyServerType_)
-};
-
-PGPENUM_TYPEDEF(PGPProxyServerType_, PGPProxyServerType);
-
-/* PGPKeyServerMonitorValues are null terminated linked lists.
- The values member is a null terminated array of char*s.
-*/
-
-typedef struct PGPKeyServerMonitorValues
-{
- PGPChar8 * name;
- PGPChar8 ** values;
- struct PGPKeyServerMonitorValues * next;
-} PGPKeyServerMonitorValues;
-
-typedef struct PGPKeyServerMonitor
-{
- PGPKeyServerRef keyServerRef;
- PGPKeyServerMonitorValues * valuesHead;
-} PGPKeyServerMonitor;
-
-
-typedef struct PGPKeyServerThreadStorage * PGPKeyServerThreadStorageRef;
-# define kInvalidPGPKeyServerThreadStorageRef \
- ((PGPKeyServerThreadStorageRef) NULL)
-#define PGPKeyServerThreadStorageRefIsValid(ref) \
- ((ref) != kInvalidPGPKeyServerThreadStorageRef)
-
-PGP_BEGIN_C_DECLARATIONS
-
-
-/* Use the idle event handler to receive periodic idle events during
- network calls. Usually this is used only in non-preemptive multi-tasking
- OSes to allow yielding in threads. Pre-emptive multi-tasking systems
- should probably not use the call as it interrupts the efficient wait state
- of threads waiting on network calls.
-
- Idle event handlers need to be added on a per thread basis.
-
- Returning an error from the idle event handler will cause the keyserver
- to quit processing and to return a kPGPError_UserAbort. */
-PGPError PGPSetKeyServerIdleEventHandler(
- PGPEventHandlerProcPtr inCallback,
- PGPUserValue inUserData);
-
-PGPError PGPGetKeyServerIdleEventHandler(
- PGPEventHandlerProcPtr * outCallback,
- PGPUserValue * outUserData);
-
-/* Network library options */
-
-#undef PGPONetURL
-PGPOptionListRef PGPONetURL(PGPContextRef context, const PGPChar8 *url);
-
-#undef PGPONetHostName
-PGPOptionListRef PGPONetHostName(PGPContextRef context,
- const PGPChar8 *hostName, PGPUInt16 port);
-
-PGPOptionListRef PGPONetHostAddress(PGPContextRef context,
- PGPUInt32 hostAddress, PGPUInt16 port);
-
-PGPOptionListRef PGPONetConnectTimeout(PGPContextRef context,
- PGPUInt32 timeout);
-
-PGPOptionListRef PGPONetReadTimeout(PGPContextRef context,
- PGPUInt32 timeout);
-
-PGPOptionListRef PGPONetWriteTimeout(PGPContextRef context,
- PGPUInt32 timeout);
-
-PGPOptionListRef PGPOKeyServerProtocol(PGPContextRef context,
- PGPKeyServerProtocol serverProtocol);
-
-PGPOptionListRef PGPOKeyServerKeySpace(PGPContextRef context,
- PGPKeyServerKeySpace serverSpace);
-
-#undef PGPOKeyServerKeyStoreDN
-PGPOptionListRef PGPOKeyServerKeyStoreDN(PGPContextRef context,
- const PGPChar8 *szKeyStoreDn);
-
-PGPOptionListRef PGPOKeyServerAccessType(PGPContextRef context,
- PGPKeyServerAccessType accessType);
-
-PGPOptionListRef PGPOKeyServerCAKey(PGPContextRef context,
- PGPKeyDBObjRef caKeyDBObjRef);
-
-PGPOptionListRef PGPOKeyServerRequestKey(PGPContextRef context,
- PGPKeyDBObjRef requestKeyDBObjRef);
-
-PGPOptionListRef PGPOKeyServerSearchKey(PGPContextRef context,
- PGPKeyDBObjRef searchKeyDBObjRef);
-
-PGPOptionListRef PGPOKeyServerSearchFilter(PGPContextRef context,
- PGPFilterRef searchFilter);
-
-/* Static storage creation */
-PGPError PGPKeyServerCreateThreadStorage(
- PGPKeyServerThreadStorageRef * outPreviousStorage);
-PGPError PGPKeyServerDisposeThreadStorage(
- PGPKeyServerThreadStorageRef inPreviousStorage);
-
-/* Initialize and close the keyserver library */
-PGPError PGPKeyServerInit(void);
-
-PGPError PGPKeyServerCleanup(void);
-
-
-/* Creating and freeing a keyserver ref. */
-PGPError PGPNewKeyServer(
- PGPContextRef inContext,
- PGPKeyServerClass inClass,
- PGPKeyServerRef *outKeyServerRef,
- PGPOptionListRef firstOption,
- ... );
-
-PGPError PGPFreeKeyServer(PGPKeyServerRef inKeyServerRef);
-PGPError PGPIncKeyServerRefCount(PGPKeyServerRef inKeyServerRef);
-
-
-/* Set and get the keyserver's event handler. Note that returning an error
- for a keyserver event will abort the current call. */
-PGPError PGPSetKeyServerEventHandler(
- PGPKeyServerRef inKeyServerRef,
- PGPEventHandlerProcPtr inCallback,
- PGPUserValue inUserData);
-
-PGPError PGPGetKeyServerEventHandler(
- PGPKeyServerRef inKeyServerRef,
- PGPEventHandlerProcPtr * outCallback,
- PGPUserValue * outUserData);
-
-
-/* Canceling a call to a keyserver. This is the only call that can be made
- to a keyserver that is currently in another call. Also, once you have
- returned from a canceled call, you may only close the keyserver. */
-PGPError PGPCancelKeyServerCall(PGPKeyServerRef inKeyServerRef);
-
-
-/* Opening and closing the keyserver. A keyserver ref can be opened and
- closed multiple times as necessary. */
-PGPError PGPKeyServerOpen(PGPKeyServerRef inKeyServerRef,
- PGPtlsSessionRef inTLSSessionRef);
-
-PGPError PGPKeyServerClose(PGPKeyServerRef inKeyServerRef);
-
-
-/* Get keyserver info. */
-PGPError PGPGetKeyServerTLSSession(PGPKeyServerRef inKeyServerRef,
- PGPtlsSessionRef * outTLSSessionRef);
-
-PGPError PGPGetKeyServerProtocol(PGPKeyServerRef inKeyServerRef,
- PGPKeyServerProtocol * outType);
-
-PGPError PGPGetKeyServerAccessType(PGPKeyServerRef inKeyServerRef,
- PGPKeyServerAccessType * outAccessType);
-
-PGPError PGPGetKeyServerKeySpace(PGPKeyServerRef inKeyServerRef,
- PGPKeyServerKeySpace * outKeySpace);
-
-PGPError PGPGetKeyServerPort(PGPKeyServerRef inKeyServerRef,
- PGPUInt16 * outPort);
-
-#undef PGPGetKeyServerHostName
-PGPError PGPGetKeyServerHostName(PGPKeyServerRef inKeyServerRef,
- PGPChar8 ** outHostName); /* Use PGPFreeData to free */
-
-PGPError PGPGetKeyServerAddress(PGPKeyServerRef inKeyServerRef,
- PGPUInt32 * outAddress);
-
-#undef PGPGetKeyServerPath
-PGPError PGPGetKeyServerPath(PGPKeyServerRef inKeyServerRef,
- PGPChar8 ** outPath); /* Use PGPFreeData to free */
-
-PGPContextRef PGPGetKeyServerContext(PGPKeyServerRef inKeyServerRef);
-
-/* If there was an error string returned from the server, you can get it with
- this function. Note that if there is no string, the function will return
- kPGPError_NoErr and *outErrorString will be NULL */
-#undef PGPGetLastKeyServerErrorString
-PGPError PGPGetLastKeyServerErrorString(
- PGPKeyServerRef inKeyServerRef,
- PGPChar8 ** outErrorString); /* Use PGPFreeData to free */
-
-
-/* These functions may be used with both HTTP and LDAP keyservers */
-PGPError PGPQueryKeyServer(PGPKeyServerRef inKeyServerRef,
- PGPFilterRef inFilterRef,
- PGPKeyDBRef *searchResultsDB);
-
-PGPError PGPUploadToKeyServer(PGPKeyServerRef inKeyServerRef,
- PGPKeySetRef inKeysToUpload,
- PGPKeySetRef * outKeysThatFailed);
-
-
-/* These functions may only be used with LDAP keyservers */
-PGPError PGPDeleteFromKeyServer(PGPKeyServerRef inKeyServerRef,
- PGPKeySetRef inKeysToDelete,
- PGPKeySetRef * outKeysThatFailed);
-
-PGPError PGPDisableFromKeyServer(PGPKeyServerRef inKeyServerRef,
- PGPKeySetRef inKeysToDisable,
- PGPKeySetRef * outKeysThatFailed);
-
-PGPError PGPSendGroupsToServer(PGPKeyServerRef inKeyServerRef,
- PGPGroupSetRef inGroupSetRef);
-
-PGPError PGPRetrieveGroupsFromServer(
- PGPKeyServerRef inKeyServerRef,
- PGPGroupSetRef * outGroupSetRef);
-
-PGPError PGPNewServerMonitor(PGPKeyServerRef inKeyServerRef,
- PGPKeyServerMonitor ** outMonitor);
-
-PGPError PGPFreeServerMonitor(PGPKeyServerMonitor * inMonitor);
-
-/* X.509 Certificate Request functions */
-
-PGPError PGPSendCertificateRequest(
- PGPKeyServerRef inKeyServerRef,
- PGPOptionListRef firstOption,
- ... );
-
-PGPError PGPRetrieveCertificate(
- PGPKeyServerRef inKeyServerRef,
- PGPOptionListRef firstOption,
- ... );
-
-PGPError PGPRetrieveCertificateRevocationList(
- PGPKeyServerRef inKeyServerRef,
- PGPOptionListRef firstOption,
- ... );
-/* Queries HTTP proxy information. proxyAddress must be freed with PGPFreeData */
-#undef PGPGetProxyServer
-PGPError PGPGetProxyServer(
- PGPContextRef context, PGPProxyServerType type,
- PGPChar8 **proxyAddress, PGPUInt16 *proxyPort );
-
-PGP_END_C_DECLARATIONS
-
-#endif
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpKeys.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpKeys.h
deleted file mode 100644
index 8700cee34e..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpKeys.h
+++ /dev/null
@@ -1,831 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpKeys.h,v 1.76 2004/05/19 00:09:07 ajivsov Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpKeys_h /* [ */
-#define Included_pgpKeys_h
-
-#include "pgpPubTypes.h"
-#include "pgpHash.h"
-#include "pgpOptionList.h"
-
-/* Key ordering */
-
-enum PGPKeyOrdering_
-{
- kPGPKeyOrdering_Invalid = 0,
- kPGPKeyOrdering_Any = 1,
- kPGPKeyOrdering_UserID = 2,
- kPGPKeyOrdering_KeyID = 3,
- kPGPKeyOrdering_Validity = 4,
- kPGPKeyOrdering_Trust = 5,
- kPGPKeyOrdering_EncryptionKeySize = 6,
- kPGPKeyOrdering_SigningKeySize = 7,
- kPGPKeyOrdering_CreationDate = 8,
- kPGPKeyOrdering_ExpirationDate = 9,
-
- PGP_ENUM_FORCE( PGPKeyOrdering_ )
-} ;
-PGPENUM_TYPEDEF( PGPKeyOrdering_, PGPKeyOrdering );
-
-
-/* Key properties */
-
-enum PGPKeyDBObjProperty_
-{
- kPGPKeyDBObjProperty_Invalid = 0,
-
- /* Generic numeric properties */
- kPGPKeyDBObjProperty_ObjectType = 20,
-
- /* Key boolean properties */
- kPGPKeyProperty_IsSecret = 100,
- kPGPKeyProperty_IsAxiomatic = 101,
- kPGPKeyProperty_IsRevoked = 102,
- kPGPKeyProperty_IsDisabled = 103,
- kPGPKeyProperty_IsNotCorrupt = 104,
- kPGPKeyProperty_IsExpired = 105,
- kPGPKeyProperty_NeedsPassphrase = 106,
- kPGPKeyProperty_HasUnverifiedRevocation = 107,
- kPGPKeyProperty_CanEncrypt = 108,
- kPGPKeyProperty_CanDecrypt = 109,
- kPGPKeyProperty_CanSign = 110,
- kPGPKeyProperty_CanVerify = 111,
- kPGPKeyProperty_IsEncryptionKey = 112,
- kPGPKeyProperty_IsSigningKey = 113,
- kPGPKeyProperty_IsSecretShared = 114,
- kPGPKeyProperty_IsRevocable = 115,
- kPGPKeyProperty_HasThirdPartyRevocation = 116,
- kPGPKeyProperty_HasCRL = 117,
- kPGPKeyProperty_IsOnToken = 118,
- kPGPKeyProperty_IsStubKey = 119, /* used to filter dummy keys from inclusive key set */
-
- /* Key numeric properties */
- kPGPKeyProperty_AlgorithmID = 200,
- kPGPKeyProperty_Bits = 201,
- kPGPKeyProperty_Trust = 202,
- kPGPKeyProperty_Validity = 203,
- kPGPKeyProperty_LockingAlgorithmID = 204,
- kPGPKeyProperty_LockingBits = 205,
- kPGPKeyProperty_Flags = 206,
- kPGPKeyProperty_HashAlgorithmID = 207,
- kPGPKeyProperty_Version = 208,
- kPGPKeyProperty_KeyServerPreferences = 209,
- kPGPKeyProperty_TokenNum = 210,
- kPGPKeyProperty_Features = 211,
-
- /* Key time properties */
- kPGPKeyProperty_Creation = 300,
- kPGPKeyProperty_Expiration = 301,
- kPGPKeyProperty_CRLThisUpdate = 302,
- kPGPKeyProperty_CRLNextUpdate = 303,
-
- /* Key data (variable sized) properties */
- kPGPKeyProperty_Fingerprint = 401,
- kPGPKeyProperty_KeyID = 402,
- kPGPKeyProperty_PreferredAlgorithms = 403,
- kPGPKeyProperty_ThirdPartyRevocationKeyID = 404,
- kPGPKeyProperty_KeyData = 405,
- kPGPKeyProperty_X509MD5Hash = 406,
- kPGPKeyProperty_PreferredKeyServer = 407,
- kPGPKeyProperty_PreferredCompressionAlgorithms = 408,
-
- /* SubKey boolean properties */
- kPGPSubKeyProperty_IsRevoked = 501,
- kPGPSubKeyProperty_IsNotCorrupt = 502,
- kPGPSubKeyProperty_IsExpired = 503,
- kPGPSubKeyProperty_NeedsPassphrase = 504,
- kPGPSubKeyProperty_HasUnverifiedRevocation = 505,
- kPGPSubKeyProperty_IsRevocable = 506,
- kPGPSubKeyProperty_HasThirdPartyRevocation = 507,
- kPGPSubKeyProperty_IsOnToken = 508,
-
- /* SubKey numeric properties */
- kPGPSubKeyProperty_AlgorithmID = 600,
- kPGPSubKeyProperty_Bits = 601,
- kPGPSubKeyProperty_LockingAlgorithmID = 602,
- kPGPSubKeyProperty_LockingBits = 603,
- kPGPSubKeyProperty_Version = 604,
- kPGPSubKeyProperty_Flags = 605,
-
- /* SubKey time properties */
- kPGPSubKeyProperty_Creation = 700,
- kPGPSubKeyProperty_Expiration = 701,
-
- /* SubKey data (variable sized) properties */
- kPGPSubKeyProperty_KeyData = 800,
- kPGPSubKeyProperty_KeyID = 801,
-
- /* User ID boolean properties */
- kPGPUserIDProperty_IsAttribute = 900,
- kPGPUserIDProperty_IsRevoked = 901,
-
- /* User ID numeric properties */
- kPGPUserIDProperty_Validity = 1000,
- kPGPUserIDProperty_Confidence = 1001,
- kPGPUserIDProperty_AttributeType = 1002,
-
- /* No User ID time properties */
-
- /* User ID data (variable sized) properties */
- kPGPUserIDProperty_Name = 1200,
- kPGPUserIDProperty_AttributeData = 1201,
- kPGPUserIDProperty_CommonName = 1202,
- kPGPUserIDProperty_EmailAddress = 1203,
- kPGPUserIDProperty_SMIMEPreferredAlgorithms = 1204,
-
- /* Signature boolean properties */
- kPGPSigProperty_IsRevoked = 1300,
- kPGPSigProperty_IsNotCorrupt = 1301,
- kPGPSigProperty_IsTried = 1302,
- kPGPSigProperty_IsVerified = 1303,
- kPGPSigProperty_IsMySig = 1304,
- kPGPSigProperty_IsExportable = 1305,
- kPGPSigProperty_HasUnverifiedRevocation = 1306,
- kPGPSigProperty_IsExpired = 1307,
- kPGPSigProperty_IsX509 = 1308,
-
- /* Signature numeric properties */
- kPGPSigProperty_AlgorithmID = 1400,
- kPGPSigProperty_TrustLevel = 1401,
- kPGPSigProperty_TrustValue = 1402,
-
- /* Signature time properties */
- kPGPSigProperty_Creation = 1500,
- kPGPSigProperty_Expiration = 1501,
-
- /* Signature data (variable sized) properties */
- kPGPSigProperty_KeyID = 1600,
- kPGPSigProperty_X509Certificate = 1601,
- kPGPSigProperty_X509IASN = 1602,
- kPGPSigProperty_X509LongName = 1603,
- kPGPSigProperty_X509IssuerLongName = 1604,
- kPGPSigProperty_X509DNSName = 1605,
- kPGPSigProperty_X509IPAddress = 1606,
- kPGPSigProperty_X509DERDName = 1607,
- kPGPSigProperty_RegularExpression = 1608,
-
- PGP_ENUM_FORCE( PGPKeyDBObjProperty_ )
-} ;
-PGPENUM_TYPEDEF( PGPKeyDBObjProperty_, PGPKeyDBObjProperty );
-
-
-/* For kPGPKeyProperty_Version */
-enum PGPKeyVersion_
-{
- kPGPKeyVersion_V3 = 3,
- kPGPKeyVersion_V4 = 4,
-
- PGP_ENUM_FORCE( PGPKeyVersion_ )
-} ;
-PGPENUM_TYPEDEF( PGPKeyVersion_, PGPKeyVersion );
-
-
-/* kPGPKeyPropFlags bits */
-
-enum /* PGPKeyPropertyFlags */
-{
- kPGPKeyPropertyFlags_UsageSignUserIDs = (1UL << 0 ),
- kPGPKeyPropertyFlags_UsageSignMessages = (1UL << 1 ),
- kPGPKeyPropertyFlags_UsageEncryptCommunications = (1UL << 2 ),
- kPGPKeyPropertyFlags_UsageEncryptStorage = (1UL << 3 ),
-
- kPGPKeyPropertyFlags_PrivateSplit = (1UL << 4 ),
- kPGPKeyPropertyFlags_PrivateShared = (1UL << 7 )
-} ;
-typedef PGPFlags PGPKeyPropertyFlags;
-#define kPGPKeyPropertyFlags_UsageSign \
- (kPGPKeyPropertyFlags_UsageSignUserIDs | \
- kPGPKeyPropertyFlags_UsageSignMessages)
-#define kPGPKeyPropertyFlags_UsageEncrypt \
- (kPGPKeyPropertyFlags_UsageEncryptCommunications | \
- kPGPKeyPropertyFlags_UsageEncryptStorage)
-#define kPGPKeyPropertyFlags_UsageSignEncrypt \
- (kPGPKeyPropertyFlags_UsageSign | \
- kPGPKeyPropertyFlags_UsageEncrypt)
-
-/* Attribute types, for use with kPGPUserIDPropAttributeType */
-enum PGPAttributeType_
-{
- kPGPAttribute_Image = 1,
- kPGPAttribute_IPAddress = 10,
- kPGPAttribute_DNSName = 11,
- kPGPAttribute_Notation = 20,
-
- PGP_ENUM_FORCE( PGPAttributeType_ )
-} ;
-PGPENUM_TYPEDEF( PGPAttributeType_, PGPAttributeType );
-
-/* kPGPKeyPropFlags bits */
-
-enum /* PGPKeyServerPreferencesFlags */
-{
- kPGPKeyServerPreferences_NoModify = (1UL << 7 )
-} ;
-typedef PGPFlags PGPKeyServerPreferencesFlags;
-
-/* Implementation features like Modification Detection support */
-
-enum
-{
- kPGPKeyFeatures_ModificationDetection = 1
-} ;
-typedef PGPFlags PGPKeyFeaturesFlags;
-
-
-/* Key DB object types for the property kPGPKeyDBObjProperty_ObjectType */
-enum PGPKeyDBObjType_
-{
- kPGPKeyDBObjType_Invalid = 0,
- kPGPKeyDBObjType_Key = (1UL << 0),
- kPGPKeyDBObjType_SubKey = (1UL << 1),
- kPGPKeyDBObjType_UserID = (1UL << 2),
- kPGPKeyDBObjType_Signature = (1UL << 3),
-#ifdef __MVS__
- kPGPKeyDBObjType_Any = -1,
-#else
- kPGPKeyDBObjType_Any = 0xFFFFFFFF,
-#endif
-
- PGP_ENUM_FORCE( PGPKeyDBObjType_ )
-} ;
-PGPENUM_TYPEDEF( PGPKeyDBObjType_, PGPKeyDBObjType );
-
-/*
- * Used by filtering functions to specify type of match.
- */
-
-enum PGPMatchCriterion_
-{
- kPGPMatchCriterion_Equal = 1, /* searched == val */
- kPGPMatchCriterion_GreaterOrEqual = 2, /* searched >= val */
- kPGPMatchCriterion_LessOrEqual = 3, /* searched <= val */
- kPGPMatchCriterion_SubString = 4, /* searched is contained in supplied */
-
- PGP_ENUM_FORCE( PGPMatchCriterion_ )
-} ;
-PGPENUM_TYPEDEF( PGPMatchCriterion_, PGPMatchCriterion );
-
-
-/* This is the value of the expiration time which means "never expires" */
-#define kPGPExpirationTime_Never ( (PGPTime)0 )
-
-enum PGPOpenKeyDBFileOptions_
-{
- kPGPOpenKeyDBFileOptions_None = 0,
- kPGPOpenKeyDBFileOptions_Mutable = (1UL << 0 ),
- kPGPOpenKeyDBFileOptions_Create = (1UL << 1 ),
-
- PGP_ENUM_FORCE( PGPOpenKeyDBFileOptions_ )
-} ;
-
-PGPENUM_TYPEDEF( PGPOpenKeyDBFileOptions_, PGPOpenKeyDBFileOptions );
-
-/* Public entry points */
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- Key DB functions
-____________________________________________________________________________*/
-
-/* Creat a new, in-memory temporary key DB */
-PGPError PGPNewKeyDB( PGPContextRef context, PGPKeyDBRef *keyDBRef );
-
-/* Open a (possibly) existing key ring pair on disk */
-PGPError PGPOpenKeyDBFile( PGPContextRef context,
- PGPOpenKeyDBFileOptions options,
- PGPFileSpecRef pubKeysFileSpec,
- PGPFileSpecRef privKeysFileSpec,
- PGPKeyDBRef *keyDBRef );
-
-PGPError PGPFreeKeyDB( PGPKeyDBRef keyDBRef );
-
-PGPError PGPFlushKeyDB( PGPKeyDBRef keyDBRef );
-
-PGPError PGPIncKeyDBRefCount( PGPKeyDBRef keyDBRef );
-
-PGPBoolean PGPKeyDBIsMutable( PGPKeyDBRef keyDBRef );
-
-PGPError PGPFindKeyByKeyID( PGPKeyDBRef keyDBRef, const PGPKeyID * keyID,
- PGPKeyDBObjRef *keyRef);
-
-PGPError PGPCountKeysInKeyDB( PGPKeyDBRef keyDBRef, PGPUInt32 *numKeys );
-
-PGPError PGPKeyDBIsUpdated( PGPKeyDBRef keyDBRef, PGPBoolean *isUpdated );
-
-/* Cache a keydb in memory for specified number of seconds */
-PGPError PGPCacheKeyDB( PGPKeyDBRef keyDBRef, PGPUInt32 timeoutSeconds );
-
-/* Remove all cached keydbs from memory */
-PGPError PGPPurgeKeyDBCache( PGPContextRef context );
-
-/*____________________________________________________________________________
- Key set functions
-____________________________________________________________________________*/
-
-/* Create a new key set containing all of the keys in the key DB */
-PGPError PGPNewKeySet( PGPKeyDBRef keyDB, PGPKeySetRef *keySet );
-
-/* Create a new, empty key set */
-PGPError PGPNewEmptyKeySet( PGPKeyDBRef keyDB, PGPKeySetRef *keySet );
-
-/* Create a new key set containing a single key */
-PGPError PGPNewOneKeySet( PGPKeyDBObjRef key, PGPKeySetRef *keySet );
-
-/* Like PGPNewKeySet but allows certain stub key objects */
-PGPError PGPNewEmptyInclusiveKeySet( PGPKeyDBRef keyDB, PGPKeySetRef *pset );
-
-/* Like PGPNewOneKeySet but allows certain stub key objects */
-PGPError PGPNewOneInclusiveKeySet( PGPKeyDBObjRef key, PGPKeySetRef *keySet );
-
-PGPError PGPFreeKeySet( PGPKeySetRef keys);
-
-PGPError PGPIncKeySetRefCount( PGPKeySetRef keys);
-
-PGPBoolean PGPKeySetIsMember( PGPKeyDBObjRef key, PGPKeySetRef set );
-
-PGPError PGPCountKeys( PGPKeySetRef keys, PGPUInt32 *numKeys );
-
-PGPError PGPAddKey( PGPKeyDBObjRef keyToAdd, PGPKeySetRef set );
-
-PGPError PGPAddKeys( PGPKeySetRef keysToAdd, PGPKeySetRef set );
-
-PGPKeyDBRef PGPPeekKeySetKeyDB( PGPKeySetRef keySet );
-PGPKeySetRef PGPPeekKeyDBRootKeySet( PGPKeyDBRef keyDB );
-
-/*____________________________________________________________________________
- Key DB object properties
-____________________________________________________________________________*/
-
-PGPError PGPGetKeyDBObjBooleanProperty( PGPKeyDBObjRef key,
- PGPKeyDBObjProperty whichProperty, PGPBoolean *prop );
-
-PGPError PGPGetKeyDBObjNumericProperty( PGPKeyDBObjRef key,
- PGPKeyDBObjProperty whichProperty, PGPInt32 *prop );
-
-PGPError PGPGetKeyDBObjTimeProperty( PGPKeyDBObjRef key,
- PGPKeyDBObjProperty whichProperty, PGPTime *prop);
-/*
-** Get the data for a binary property. Returns kPGPError_BufferTooSmall if
-** the buffer is too small. Both buffer and dataSize can be NULL.
-*/
-
-#undef PGPGetKeyDBObjDataProperty
-PGPError PGPGetKeyDBObjDataProperty( PGPKeyDBObjRef key,
- PGPKeyDBObjProperty whichProperty, void *buffer,
- PGPSize bufferSize, PGPSize *dataSize);
-/*
-** Get the data for a binary property using an allocated output buffer. The
-** allocated buffer must be freed with PGPFreeData(). For convenience, the
-** allocated buffer is null-terminated. The terminating null byte is NOT included
-** is the output dataSize parameter.
-*/
-
-PGPError PGPGetKeyDBObjAllocatedDataProperty( PGPKeyDBObjRef key,
- PGPKeyDBObjProperty whichProperty, void **buffer,
- PGPSize *dataSize);
-
-PGPError PGPSetKeyEnabled( PGPKeyDBObjRef key, PGPBoolean enable );
-
-PGPError PGPSetKeyAxiomatic( PGPKeyDBObjRef key, PGPBoolean setAxiomatic,
- PGPOptionListRef firstOption, ...);
-
-/*____________________________________________________________________________
- Key DB object property convenience functions
-____________________________________________________________________________*/
-
-/* Get the key ID of a key or subkey key DB object */
-PGPError PGPGetKeyID( PGPKeyDBObjRef key, PGPKeyID *keyID );
-
-PGPError PGPGetPrimaryUserID( PGPKeyDBObjRef key, PGPKeyDBObjRef *outRef );
-
-PGPError PGPGetPrimaryAttributeUserID (PGPKeyDBObjRef key,
- PGPAttributeType attributeType, PGPKeyDBObjRef *outRef);
-
-PGPError PGPGetPrimaryUserIDValidity(PGPKeyDBObjRef key,
- PGPValidity *validity);
-
-PGPError PGPGetPrimaryUserIDName(PGPKeyDBObjRef key, void *buffer,
- PGPSize bufferSize, PGPSize *dataSize);
-
-PGPError PGPGetKeyForUsage( PGPKeyDBObjRef key, PGPUInt32 usageFlags,
- PGPKeyDBObjRef *outRef );
-
-
-
-/*____________________________________________________________________________
- Key filters
-____________________________________________________________________________*/
-
-PGPError PGPNewKeyDBObjBooleanFilter( PGPContextRef context,
- PGPKeyDBObjProperty whichProperty, PGPBoolean match,
- PGPFilterRef *outFilter );
-
-PGPError PGPNewKeyDBObjNumericFilter( PGPContextRef context,
- PGPKeyDBObjProperty whichProperty, PGPUInt32 matchValue,
- PGPMatchCriterion matchCriteria, PGPFilterRef *outFilter );
-
-PGPError PGPNewKeyDBObjTimeFilter( PGPContextRef context,
- PGPKeyDBObjProperty whichProperty, PGPTime matchValue,
- PGPMatchCriterion matchCriteria, PGPFilterRef *outFilter );
-
-PGPError PGPNewKeyDBObjDataFilter( PGPContextRef context,
- PGPKeyDBObjProperty whichProperty, const void *matchData,
- PGPSize matchDataSize, PGPMatchCriterion matchCriteria,
- PGPFilterRef *outFilter );
-
-PGPError PGPFreeFilter( PGPFilterRef filter );
-
-PGPError PGPIncFilterRefCount( PGPFilterRef filter );
-
-PGPError PGPFilterChildObjects( PGPFilterRef filter,
- PGPBoolean filterChildren );
-
-/* freeing outfilter will call PGPFreeFilter on filter */
-PGPError PGPNegateFilter( PGPFilterRef filter, PGPFilterRef *outFilter);
-
-/* freeing outfilter will call PGPFreeFilter on filter1, filter2 */
-PGPError PGPIntersectFilters( PGPFilterRef filter1, PGPFilterRef filter2,
- PGPFilterRef *outFilter);
-
-/* freeing outfilter will call PGPFreeFilter on filter1, filter2 */
-PGPError PGPUnionFilters( PGPFilterRef filter1, PGPFilterRef filter2,
- PGPFilterRef *outFilter);
-
-PGPError PGPFilterKeySet( PGPKeySetRef origSet, PGPFilterRef filter,
- PGPKeySetRef *resultSet );
-
-PGPError PGPFilterKeyDB( PGPKeyDBRef keyDB, PGPFilterRef filter,
- PGPKeySetRef *resultSet );
-
-/* Keyserver filter functions */
-#undef PGPLDAPQueryFromFilter
-PGPError PGPLDAPQueryFromFilter( PGPFilterRef filter, PGPChar8 **queryOut );
-
-#undef PGPLDAPX509QueryFromFilter
-PGPError PGPLDAPX509QueryFromFilter( PGPFilterRef filter,
- PGPChar8 **queryOut );
-
-#undef PGPHKSQueryFromFilter
-PGPError PGPHKSQueryFromFilter( PGPFilterRef filter, PGPChar8 **queryOut );
-
-#undef PGPNetToolsCAHTTPQueryFromFilter
-PGPError PGPNetToolsCAHTTPQueryFromFilter( PGPFilterRef filter,
- PGPChar8 **queryOut );
-
-/*____________________________________________________________________________
- Key/signature validation
-____________________________________________________________________________*/
-
-PGPError PGPCalculateTrust( PGPKeySetRef keySet, PGPKeyDBRef optionalKeyDB);
-
-PGPError PGPCheckKeyRingSigs( PGPKeySetRef keysToCheck,
- PGPKeyDBRef optionalSigningKeyDB, PGPBoolean checkAll,
- PGPEventHandlerProcPtr eventHandler,
- PGPUserValue eventHandlerData );
-
-/*____________________________________________________________________________
- Key DB object creation/deletion
-____________________________________________________________________________*/
-
-PGPError PGPGenerateKey( PGPContextRef context, PGPKeyDBObjRef *key,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPGenerateSubKey( PGPContextRef context, PGPKeyDBObjRef *subkey,
- PGPOptionListRef firstOption, ...);
-
-PGPUInt32 PGPGetKeyEntropyNeeded( PGPContextRef context,
- PGPOptionListRef firstOption, ...);
-
-#undef PGPAddUserID
-PGPError PGPAddUserID( PGPKeyDBObjRef key, PGPChar8 const *userID,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPAddAttributeUserID( PGPKeyDBObjRef key,
- PGPAttributeType attributeType,
- PGPByte *attributeData, PGPSize attributeLength,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPCertifyUserID( PGPKeyDBObjRef userID,
- PGPKeyDBObjRef certifyingKey,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPCopyKeyDBObj( PGPKeyDBObjRef keyDBObj, PGPKeyDBRef destKeyDB,
- PGPKeyDBObjRef *destKeyDBObj );
-
-PGPError PGPCopyKeys( PGPKeySetRef keySet, PGPKeyDBRef destKeyDB,
- PGPKeySetRef *destKeySet );
-
-PGPError PGPDeleteKeyDBObj( PGPKeyDBObjRef keyDBObj );
-
-PGPError PGPDeleteKeys( PGPKeySetRef keySet );
-
-/*____________________________________________________________________________
- Key manipulation
-____________________________________________________________________________*/
-
-PGPError PGPSetPrimaryUserID( PGPKeyDBObjRef userID,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPGetSigCertifierKey( PGPKeyDBObjRef cert,
- PGPKeyDBRef searchKeyDB, PGPKeyDBObjRef *certkey);
-
-PGPError PGPGetSigX509CertifierSig( PGPKeyDBObjRef cert,
- PGPKeyDBRef searchKeyDB, PGPKeyDBObjRef *certsig);
-
-PGPError PGPGetSigX509TopSig( PGPKeyDBObjRef sig,
- PGPKeyDBRef otherdb, PGPKeyDBRef cadb,
- PGPBoolean *knownCA, PGPKeyDBObjRef *certsig );
-
-PGPError PGPGetKnownX509CAs( PGPContextRef context, PGPKeyDBRef *keydbout );
-
-PGPError PGPX509MatchNetworkName( PGPKeyDBObjRef sig, const PGPByte *networkName,
- PGPBoolean *matched );
-
-PGPError PGPCountAdditionalRecipientRequests( PGPKeyDBObjRef basekey,
- PGPUInt32 * numARKeys);
-
-PGPError PGPGetIndexedAdditionalRecipientRequestKey( PGPKeyDBObjRef basekey,
- PGPUInt32 nth, PGPKeyDBObjRef *arkey,
- PGPKeyID *arkeyid, PGPByte *arclass );
-
-PGPError PGPGetAdditionalRecipientRequests( PGPKeyDBObjRef basekey,
- PGPKeySetRef keySet );
-
-PGPError PGPCountRevocationKeys( PGPKeyDBObjRef basekey,
- PGPUInt32 * numRevKeys);
-
-PGPError PGPGetIndexedRevocationKey( PGPKeyDBObjRef basekey, PGPUInt32 nth,
- PGPKeyDBObjRef *revkey, PGPKeyID *revkeyid );
-
-PGPError PGPGetRevocationKeys( PGPKeyDBObjRef basekey, PGPKeySetRef keySet );
-
-PGPError PGPGetCRLDistributionPoints( PGPKeyDBObjRef cakey,
- PGPUInt32 *pnDistPoints, PGPByte **pDpoints,
- PGPSize **pdpointLengths );
-
-PGPError PGPGetCRLDistributionPointsPrintable( PGPKeyDBObjRef cakey,
- PGPUInt32 *pnDistPoints, PGPByte **pDpoints );
-
-PGPError PGPExport( PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPImport( PGPContextRef context, PGPKeyDBRef *importedKeysDB,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPRevokeSig( PGPKeyDBObjRef cert,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPRevoke( PGPKeyDBObjRef key,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPChangePassphrase( PGPKeyDBObjRef key,
- PGPOptionListRef firstOption, ...);
-
-PGPBoolean PGPPassphraseIsValid( PGPKeyDBObjRef key,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPPurgePassphraseCache( PGPContextRef context );
-
-PGPError PGPCountCachedPassphrases( PGPContextRef context,
- PGPUInt32 *pnLocal, PGPUInt32 *pnGlobal,
- PGPUInt32 *pnOtherLocal );
-
-PGPBoolean PGPTokenAuthIsValid( PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-/*
- * Trust values for PGPSetKeyTrust and kPGPKeyPropTrust property:
- *
- * kPGPKeyTrust_Undefined (do not pass to PGPSetKeyTrust)
- * kPGPKeyTrust_Unknown (unknown)
- * kPGPKeyTrust_Never (never)
- * kPGPKeyTrust_Marginal (sometimes)
- * kPGPKeyTrust_Complete (always)
- * kPGPKeyTrust_Ultimate (do not pass to PGPSetKeyTrust)
- */
-
-PGPError PGPSetKeyTrust( PGPKeyDBObjRef key, PGPUInt32 trust);
-
-PGPInt32 PGPCompareKeys( PGPKeyDBObjRef a, PGPKeyDBObjRef b,
- PGPKeyOrdering order );
-
-#undef PGPCompareUserIDStrings
-PGPInt32 PGPCompareUserIDStrings(PGPChar8 const *a, PGPChar8 const *b);
-
-/*____________________________________________________________________________
- Key lists
-____________________________________________________________________________*/
-
-PGPError PGPOrderKeySet( PGPKeySetRef src, PGPKeyOrdering order,
- PGPBoolean reverseOrder, PGPKeyListRef *outRef );
-
-PGPError PGPIncKeyListRefCount( PGPKeyListRef keys);
-
-PGPError PGPFreeKeyList( PGPKeyListRef keys );
-
-/*____________________________________________________________________________
- Key list iteration
-____________________________________________________________________________*/
-
-PGPError PGPNewKeyIter( PGPKeyListRef keys, PGPKeyIterRef *outRef);
-
-PGPError PGPNewKeyIterFromKeySet( PGPKeySetRef keys, PGPKeyIterRef *outRef);
-
-PGPError PGPNewKeyIterFromKeyDB( PGPKeyDBRef keyDB, PGPKeyIterRef *outRef);
-
-PGPError PGPCopyKeyIter( PGPKeyIterRef orig, PGPKeyIterRef *outRef);
-
-PGPError PGPFreeKeyIter( PGPKeyIterRef iter);
-
-PGPInt32 PGPKeyIterIndex( PGPKeyIterRef iter);
-
-PGPError PGPKeyIterRewind( PGPKeyIterRef iter, PGPKeyDBObjType objectType);
-
-PGPInt32 PGPKeyIterSeek( PGPKeyIterRef iter, PGPKeyDBObjRef key);
-
-PGPError PGPKeyIterMove( PGPKeyIterRef iter, PGPInt32 relOffset,
- PGPKeyDBObjRef *outRef);
-
-PGPError PGPKeyIterNextKeyDBObj( PGPKeyIterRef iter,
- PGPKeyDBObjType objectType, PGPKeyDBObjRef *outRef);
-
-PGPError PGPKeyIterPrevKeyDBObj( PGPKeyIterRef iter,
- PGPKeyDBObjType objectType, PGPKeyDBObjRef *outRef);
-
-PGPError PGPKeyIterGetKeyDBObj( PGPKeyIterRef iter,
- PGPKeyDBObjType objectType, PGPKeyDBObjRef *outRef);
-
-
-/*____________________________________________________________________________
- Get/set user value
-____________________________________________________________________________*/
-
-PGPError PGPSetKeyDBObjUserValue( PGPKeyDBObjRef key,
- PGPUserValue userValue);
-
-PGPError PGPGetKeyDBObjUserValue( PGPKeyDBObjRef key,
- PGPUserValue *userValue);
-
-/* Passphrase conversion to passkeybuffer */
-/* The size of the output buffer is from the kPGPKeyPropLockingBits property */
-
-PGPError PGPGetPasskeyBuffer ( PGPKeyDBObjRef key,
- void *passkeyBuffer, PGPOptionListRef firstOption,...);
-
-/* Change key options which are stored in self signatures internally */
-
-PGPError PGPAddKeyOptions( PGPKeyDBObjRef key,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPRemoveKeyOptions( PGPKeyDBObjRef key,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPUpdateKeyOptions( PGPKeyDBObjRef key,
- PGPOptionListRef firstOption, ...);
-
-/*____________________________________________________________________________
- Key IDs
-____________________________________________________________________________*/
-
-PGPError PGPNewKeyID( const PGPByte *keyIDBytes, PGPSize numKeyIDBytes,
- PGPPublicKeyAlgorithm pkalg, PGPKeyID *id );
-#undef PGPNewKeyIDFromString
-PGPError PGPNewKeyIDFromString( const PGPChar8 *string,
- PGPPublicKeyAlgorithm pkalg, PGPKeyID *id );
-PGPError PGPGetKeyIDAlgorithm( const PGPKeyID *keyID,
- PGPPublicKeyAlgorithm *pkalg );
-
-enum PGPKeyIDStringType_
-{
- kPGPKeyIDString_Abbreviated = 1,
- kPGPKeyIDString_Full = 2,
-
- PGP_ENUM_FORCE( PGPKeyIDStringType_ )
-};
-PGPENUM_TYPEDEF( PGPKeyIDStringType_, PGPKeyIDStringType );
-
-
-#define kPGPMaxKeyIDStringSize ( 127 + 1 )
-#undef PGPGetKeyIDString
-PGPError PGPGetKeyIDString( PGPKeyID const * ref, PGPKeyIDStringType type,
- PGPChar8 outString[ kPGPMaxKeyIDStringSize ] );
-
-/* returns 0 if equal, -1 if key1 < key2, 1 if key1 > key2 */
-PGPInt32 PGPCompareKeyIDs( PGPKeyID const * key, PGPKeyID const * key2);
-
-/*____________________________________________________________________________
- Token functions
-____________________________________________________________________________*/
-
-PGPError PGPCountTokens( PGPContextRef context, PGPUInt32 *numTokens );
-
-PGPError PGPDeleteKeyOnToken( PGPKeyDBObjRef key,
- PGPUInt32 tokNumber /*-1 for any token*/,
- const PGPByte *pin, PGPSize pinLen );
-PGPError PGPWipeToken( PGPContextRef context, PGPUInt32 tokNumber,
- PGPByte const *passphrase, PGPSize passphraseLength );
-PGPError PGPFormatToken( PGPContextRef context, PGPUInt32 tokNumber,
- PGPByte const * adminPin, PGPSize adminPinLen,
- PGPByte const * newUserPin, PGPSize newUserPinLen );
-PGPError PGPTokenPassphraseIsValid( PGPContextRef context,
- PGPUInt32 tokNumber, PGPByte const *passphrase,
- PGPSize passphraseLength );
-
-#undef PGPSetPKCS11DrvFile
-PGPError PGPSetPKCS11DrvFile( PGPChar8 *module );
-
-PGPError PGPSyncTokenKeys( PGPContextRef context, PGPUInt32 tokenNum,
- PGPKeyDBRef destKeyDB, PGPBoolean *hadChanges );
-
-PGPError PGPGetTokenInfoBooleanProperty( PGPContextRef context,
- PGPUInt32 tokenNumber, PGPTokenProperty prop,
- PGPBoolean *value );
-PGPError PGPGetTokenInfoNumericProperty( PGPContextRef context,
- PGPUInt32 tokenNumber, PGPTokenProperty prop,
- PGPUInt32 *value );
-#undef PGPGetTokenInfoDataProperty
-PGPError PGPGetTokenInfoDataProperty( PGPContextRef context,
- PGPUInt32 tokenNumber, PGPTokenProperty prop,
- void *value, PGPSize size, PGPSize *sizeout );
-
-/* Deprecated, use PGPGetTokenInfo*() */
-PGPError PGPGetTokenInfo( PGPContextRef context,
- PGPUInt32 tokNumber, PGPTokenInfo *tokenInfo);
-
-/*____________________________________________________________________________
- Getting contexts back from key related items.
-____________________________________________________________________________*/
-
-PGPContextRef PGPPeekKeyDBContext( PGPKeyDBRef ref );
-PGPContextRef PGPPeekKeyDBObjContext( PGPKeyDBObjRef ref );
-PGPContextRef PGPPeekKeyListContext( PGPKeyListRef ref );
-PGPContextRef PGPPeekKeySetContext( PGPKeySetRef ref );
-PGPContextRef PGPPeekKeyIterContext( PGPKeyIterRef ref );
-
-/*____________________________________________________________________________
- Getting parent objects from key related items. If the input is invalid,
- you get kInvalidPGPKeyDBObjRef back.
-____________________________________________________________________________*/
-
-PGPKeyDBRef PGPPeekKeyDBObjKeyDB( PGPKeyDBObjRef ref );
-PGPKeyDBObjRef PGPPeekKeyDBObjKey( PGPKeyDBObjRef ref );
-PGPKeyDBObjRef PGPPeekKeyDBObjUserID( PGPKeyDBObjRef ref );
-
-/*____________________________________________________________________________
- Secret sharing functionality
-____________________________________________________________________________*/
-
-PGPError PGPSecretShareData(PGPContextRef context,
- void const * input, PGPSize inputBytes,
- PGPUInt32 threshold, PGPUInt32 nShares, void * output);
-
-PGPError PGPSecretReconstructData(PGPContextRef context,
- void * input, PGPSize outputBytes,
- PGPUInt32 nShares, void * output);
-
-/*____________________________________________________________________________
- X509 certificate specific
-____________________________________________________________________________*/
-
-PGPError PGPVerifyX509CertificateChain (PGPContextRef context,
- PGPByte *certchain, PGPByte *rootcerts);
-
-#undef PGPCreateDistinguishedName
-PGPError PGPCreateDistinguishedName( PGPContextRef context,
- PGPChar8 const *str, PGPByte **pdname, PGPSize *pdnamelen );
-
-PGPError PGPCreateX509Certificate(PGPKeyDBObjRef signingSig,
- PGPKeyDBObjRef signedKey, PGPKeyDBObjRef *newSig,
- PGPOptionListRef firstOption, ...);
-
-/* Pass PKCS-10 format request in PGPOInput.... */
-PGPError PGPCreateX509CertificateFromRequest(PGPKeyDBObjRef signingSig,
- PGPKeyDBObjRef *newSig, PGPOptionListRef firstOption, ...);
-
-PGPError PGPCreateSelfSignedX509Certificate(PGPKeyDBObjRef signingKey,
- PGPKeyDBObjRef *newSig, PGPOptionListRef firstOption, ...);
-
-PGPError PGPCreateX509CRL(PGPKeyDBObjRef signingKey,
- PGPKeySetRef revokedSigs,
- PGPOptionListRef firstOption, ...);
-
-
-
-PGP_END_C_DECLARATIONS
-
-
-#endif /* ] Included_pgpKeys_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpLDAP.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpLDAP.h
deleted file mode 100644
index 1cdce41630..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpLDAP.h
+++ /dev/null
@@ -1,722 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpLDAP.h,v 1.24 2004/01/23 08:12:49 dallen Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpLDAP_h /* [ */
-#define Included_pgpLDAP_h
-
-#include "pgpBase.h"
-#include "pgpPubTypes.h"
-#include "pgpMemoryMgr.h"
-#include "pgpSockets.h"
-#include "pgpBER.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-/* LDAP parameters and constants */
-#define kPGPldap_DefaultPort 389
-#define kPGPldap_DefaultSecurePort 636
-#define kPGPldap_DefaultVersion 2
-
-#define kPGPldapScopeString_Base PGPTXT_MACHINE8("base")
-#define kPGPldapScopeString_OneLevel PGPTXT_MACHINE8("one")
-#define kPGPldapScopeString_Subtree PGPTXT_MACHINE8("sub")
-
-#define kPGPldap_DefaultFilterString PGPTXT_MACHINE8("(objectclass=*)")
-
-
-
-/* Session options */
-#define kPGPldapOpt_Deref 1
-#define kPGPldapOpt_Sizelimit 2
-#define kPGPldapOpt_Timelimit 3
-#define kPGPldapOpt_Desc 4
-
-#define kPGPldapOpt_ON ((void *) 1)
-#define kPGPldapOpt_OFF ((void *) 0)
-
-enum PGPldapResult_
-{
- kPGPldapResult_Success = 0x00,
- kPGPldapResult_OperationsError = 0x01,
- kPGPldapResult_ProtocolError = 0x02,
- kPGPldapResult_TimelimitExceeded = 0x03,
- kPGPldapResult_SizelimitExceeded = 0x04,
- kPGPldapResult_CompareFalse = 0x05,
- kPGPldapResult_CompareTrue = 0x06,
- kPGPldapResult_StrongAuthNotSupported = 0x07,
- kPGPldapResult_StrongAuthRequired = 0x08,
- kPGPldapResult_PartialResults = 0x09,
- kPGPldapResult_NoSuchAttribute = 0x10,
- kPGPldapResult_UndefinedType = 0x11,
- kPGPldapResult_InappropriateMatching = 0x12,
- kPGPldapResult_ConstraintViolation = 0x13,
- kPGPldapResult_TypeOrValueExists = 0x14,
- kPGPldapResult_InvalidSyntax = 0x15,
- kPGPldapResult_NoSuchObject = 0x20,
- kPGPldapResult_AliasProblem = 0x21,
- kPGPldapResult_InvalidDNSyntax = 0x22,
- kPGPldapResult_IsLeaf = 0x23,
- kPGPldapResult_AliasDerefProblem = 0x24,
- kPGPldapResult_InappropriateAuth = 0x30,
- kPGPldapResult_InvalidCredentials = 0x31,
- kPGPldapResult_InsufficientAccess = 0x32,
- kPGPldapResult_Busy = 0x33,
- kPGPldapResult_Unavailable = 0x34,
- kPGPldapResult_UnwillingToPerform = 0x35,
- kPGPldapResult_LoopDetect = 0x36,
- kPGPldapResult_NamingViolation = 0x40,
- kPGPldapResult_ObjectClassViolation = 0x41,
- kPGPldapResult_NotAllowedOnNonleaf = 0x42,
- kPGPldapResult_NotAllowedOnRDN = 0x43,
- kPGPldapResult_AlreadyExists = 0x44,
- kPGPldapResult_NoObjectClassMods = 0x45,
- kPGPldapResult_ResultsTooLarge = 0x46,
- kPGPldapResult_Other = 0x50,
- kPGPldapResult_ServerDown = 0x51,
- kPGPldapResult_LocalError = 0x52,
- kPGPldapResult_EncodingError = 0x53,
- kPGPldapResult_DecodingError = 0x54,
- kPGPldapResult_Timeout = 0x55,
- kPGPldapResult_AuthUnknown = 0x56,
- kPGPldapResult_FilterError = 0x57,
- kPGPldapResult_UserCancelled = 0x58,
- kPGPldapResult_ParamError = 0x59,
- kPGPldapResult_NoMemory = 0x5a,
- kPGPldapResult_ConnectError = 0x5b,
-
- kPGPldapResult_None = 0xFFFFFFFF
-};
-PGPENUM_TYPEDEF (PGPldapResult_, PGPldapResult);
-
-enum PGPldapType_
-{
- kPGPldapType_None = 0,
-
- kPGPldapRequest_Bind = 0x60, /* application + constructed */
- kPGPldapRequest_Unbind = 0x42, /* application + primitive */
- kPGPldapRequest_Search = 0x63, /* application + constructed */
- kPGPldapRequest_Modify = 0x66, /* application + constructed */
- kPGPldapRequest_Add = 0x68, /* application + constructed */
- kPGPldapRequest_Delete = 0x4A, /* application + primitive */
- kPGPldapRequest_ModifyRDN = 0x6C, /* application + constructed */
- kPGPldapRequest_Compare = 0x6E, /* application + constructed */
- kPGPldapRequest_Abandon = 0x50, /* application + primitive */
-
- kPGPldapResponse_Bind = 0x61, /* application + constructed */
- kPGPldapResponse_SearchEntry = 0x64, /* application + constructed */
- kPGPldapResponse_SearchResult = 0x65, /* application + constructed */
- kPGPldapResponse_Modify = 0x67, /* application + constructed */
- kPGPldapResponse_Add = 0x69, /* application + constructed */
- kPGPldapResponse_Delete = 0x6B, /* application + constructed */
- kPGPldapResponse_ModifyRDN = 0x6D, /* application + constructed */
- kPGPldapResponse_Compare = 0x6F, /* application + constructed */
-
- kPGPldapResponse_Any = 0xFFFFFFFF
-};
-PGPENUM_TYPEDEF (PGPldapType_, PGPldapType);
-
-enum PGPldapScope_
-{
- kPGPldapScope_Base = 0,
- kPGPldapScope_OneLevel = 1,
- kPGPldapScope_Subtree = 2,
-
- kPGPldapScope_None = -1
-};
-PGPENUM_TYPEDEF (PGPldapScope_, PGPldapScope);
-
-enum PGPldapDeref_
-{
- kPGPldapDeref_Never = 0,
- kPGPldapDeref_Searching = 1,
- kPGPldapDeref_Finding = 2,
- kPGPldapDeref_Always = 3
-};
-PGPENUM_TYPEDEF (PGPldapDeref_, PGPldapDeref);
-
-enum PGPldapAuth_
-{
- kPGPldapAuth_Simple = 0x80 /* context-specific + primitive, tag = 0 */
- /* Not implemented -- kPGPldapAuth_Kerb41 = 0x81, */
- /* Not implemented -- kPGPldapAuth_Kerb42 = 0x82 */
-};
-PGPENUM_TYPEDEF (PGPldapAuth_, PGPldapAuth);
-
-enum PGPldapFilter_
-{
- kPGPldapFilter_And = 0xA0, /* context specific + constructed, tag = 0 */
- kPGPldapFilter_Or = 0xA1, /* context specific + constructed, tag = 1 */
- kPGPldapFilter_Not = 0xA2, /* context specific + constructed, tag = 2 */
- kPGPldapFilter_Equal = 0xA3, /* context specific + constructed, tag = 3 */
- kPGPldapFilter_Substrings = 0xA4, /* context specific + constructed, tag = 4 */
- kPGPldapFilter_GE = 0xA5, /* context specific + constructed, tag = 5 */
- kPGPldapFilter_LE = 0xA6, /* context specific + constructed, tag = 6 */
- kPGPldapFilter_Present = 0x87, /* context specific + primitive, tag = 7 */
- kPGPldapFilter_Approx = 0xA8, /* context specific + constructed, tag = 8 */
-
- kPGPldapFilter_None = (-1L)
-};
-PGPENUM_TYPEDEF( PGPldapFilter_, PGPldapFilter );
-
-enum PGPldapSubstring_
-{
- kPGPldapSubstring_Initial = 0x80, /* context specific + primitive, tag = 0 */
- kPGPldapSubstring_Any = 0x81, /* context specific + primitive, tag = 1 */
- kPGPldapSubstring_Final = 0x82, /* context specific + primitive, tag = 2 */
-
- kPGPldapSubstring_None = (-1L)
-};
-PGPENUM_TYPEDEF( PGPldapSubstring_, PGPldapSubstring );
-
-enum PGPldapModOp_
-{
- kPGPldapModOp_Add = 0x00,
- kPGPldapModOp_Delete = 0x01,
- kPGPldapModOp_Replace = 0x02,
-
- kPGPldapModOp_None = (-1L)
-};
-PGPENUM_TYPEDEF( PGPldapModOp_, PGPldapModOp );
-
-#define kPGPldapModOpMask_UseBERValues 0x10
-
-
-/* LDAP Data types: typedefs, structs, and whatnot */
-
-typedef PGPUInt32 PGPldapMessageID;
-
-#define kPGPldapMessageID_Any ( (PGPldapMessageID) -1 )
-#define kInvalidPGPldapMessageID ( (PGPldapMessageID) 0 )
-#define PGPldapMessageIDIsValid(messageID) \
- ( (messageID) != kInvalidPGPldapMessageID )
-#define PGPValidateLDAPMessageID(messageID) \
- PGPValidateParam( PGPldapMessageIDIsValid( messageID ) )
-
-typedef struct PGPldapContext * PGPldapContextRef;
-
-#define kInvalidPGPldapContextRef ( (PGPldapContextRef) NULL )
-#define PGPldapContextRefIsValid(pgpLDAP) \
- ( (pgpLDAP) != kInvalidPGPldapContextRef )
-#define PGPValidateLDAPContextRef(context) \
- PGPValidateParam( PGPldapContextRefIsValid( context ) )
-
-typedef struct PGPldapMessage * PGPldapMessageRef;
-
-#define kInvalidPGPldapMessageRef ( (PGPldapMessageRef) NULL)
-#define PGPldapMessageRefIsValid(message) \
- ( (message) != kInvalidPGPldapMessageRef )
-#define PGPValidateLDAPMessageRef(message) \
- PGPValidateParam( PGPldapMessageRefIsValid( message ) )
-
-
-#define IsPGPldapError(err) \
- ( ( (err) >= kPGPError_LDAPMIN ) && ( (err) <= kPGPError_LDAPMAX ) )
-
-
-/* Callbacks for using LDAP functions in multithreaded apps */
-typedef struct PGPldapThreadFns
-{
- void * (*pgpLDAPThread_MutexAlloc) (void);
- void (*pgpLDAPThread_MutexFree) (void *);
- PGPError (*pgpLDAPThread_MutexLock) (void *);
- PGPError (*pgpLDAPThread_MutexUnlock) (void *);
- void (*pgpLDAPThread_SetErrno) (int);
- PGPError (*pgpLDAPThread_GetErrno) (void);
- void (*pgpLDAPThread_SetLDAPErrno) (PGPInt32, PGPChar8 *, PGPChar8 *);
- PGPInt32 (*pgpLDAPThread_GetLDAPErrno) (PGPChar8 **, PGPChar8 **);
-} PGPldapThreadFns;
-
-typedef struct PGPldapMod
-{
- PGPldapModOp op;
- PGPChar8 * type;
-
- PGPChar8 ** value;
- PGPberValue ** bvalue;
-} PGPldapMod;
-
-typedef struct PGPldapURLDesc
-{
- PGPChar8 * host;
- PGPUInt16 port;
-
- PGPChar8 * dn;
- PGPChar8 ** attrs;
-
- PGPldapScope scope;
- PGPChar8 * filter;
-
-} PGPldapURLDesc;
-
-typedef PGPError (* PGPldapRebindProcPtr )(
- PGPldapContextRef pgpLDAP,
- PGPChar8 ** dnp,
- PGPChar8 ** pwp,
- PGPInt32 * method,
- PGPBoolean freeIt,
- PGPChar8 * arg );
-
-
-/* LDAP function prototypes */
-/*
- * Above each function is the name of the analogous function
- * in the UMich or Netscape LDAP SDK. While there are some subtle
- * differences, for the most part, each function works basically
- * the same as it's UMich/Netscape SDK counterpart.
- */
-
-/* Memory management functions */
- PGPError
-PGPNewLDAPContext(
- PGPContextRef context,
- PGPldapContextRef *pgpLDAP );
-
- PGPError
-PGPNewLDAPMessage(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef * message );
-
- PGPError
-PGPFreeLDAPContext(
- PGPldapContextRef pgpLDAP );
-
- PGPError
-PGPFreeLDAPMessage(
- PGPldapMessageRef message );
-
- /* ldap_value_free */
- PGPError
-PGPFreeLDAPValues(
- PGPChar8 ** vals );
-
- /* ldap_value_free_len */
- PGPError
-PGPFreeLDAPValuesLen(
- PGPberValue ** bvals );
-
- PGPError
-PGPFreeLDAPURLDesc(
- PGPldapURLDesc * lud );
-
-
-/* Result-handling functions */
- /* ldap_get_lderrno */
- PGPError
-PGPldapGetErrno(
- PGPldapContextRef pgpLDAP,
- PGPChar8 ** matched,
- PGPChar8 ** message,
- PGPldapResult * result );
-
- PGPError
-PGPldapResultToError(
- PGPldapContextRef pgpLDAP,
- PGPldapResult result );
-
-/* LDAP option functions */
- /* ldap_set_option */
- PGPError
-PGPldapSetOption(
- PGPldapContextRef pgpLDAP,
- PGPUInt32 option,
- void * value );
-
- /* ldap_get_option */
- PGPError
-PGPldapGetOption(
- PGPldapContextRef pgpLDAP,
- PGPUInt32 option,
- void * value );
-
-
-/* Connection starting and stopping functions */
- /* ldap_open */
- PGPError
-PGPldapOpen(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * host,
- PGPUInt16 port );
-
- PGPError
-PGPldapOpenTimeout(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * host,
- PGPUInt16 port,
- PGPSocketsTimeValue *tv );
-
- /* ldap_simple_bind_s */
- PGPError
-PGPldapSimpleBindSync(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPChar8 * password );
-
- /* ldap_simple_bind_st (extension) */
- PGPError
-PGPldapSimpleBindSyncTimeout(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPChar8 * password,
- PGPSocketsTimeValue *tv);
-
- /* ldap_simple_bind */
- PGPError
-PGPldapSimpleBind(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPChar8 * password,
- PGPldapMessageID * messageID );
-
- /* ldap_bind_s */
- PGPError
-PGPldapBindSync(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPChar8 * password,
- PGPldapAuth method );
-
- /* ldap_bind */
- PGPError
-PGPldapBind(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPChar8 * password,
- PGPldapAuth method,
- PGPldapMessageID * messageID );
-
- /* ldap_unbind */
- PGPError
-PGPldapUnbind(
- PGPldapContextRef pgpLDAP );
-
-
-/* Searching functions */
- /* ldap_search_s */
- PGPError
-PGPldapSearchSync(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * base,
- PGPldapScope scope,
- PGPChar8 * filter,
- PGPChar8 * attrs[],
- PGPBoolean attrsOnly,
- PGPldapMessageRef resultMessage );
-
- /* ldap_search_st */
- PGPError
-PGPldapSearchSyncTimeout(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * base,
- PGPldapScope scope,
- PGPChar8 * filter,
- PGPChar8 * attrs[],
- PGPBoolean attrsOnly,
- PGPSocketsTimeValue * tv,
- PGPldapMessageRef resultMessage );
-
- /* ldap_search */
- PGPError
-PGPldapSearch(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * base,
- PGPldapScope scope,
- PGPChar8 * filter,
- PGPChar8 * attrs[],
- PGPBoolean attrsOnly,
- PGPldapMessageID * messageID );
-
- /* ldap_count_entries */
- PGPError
-PGPldapCountEntries(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef result,
- PGPInt32 * num );
-
- /* ldap_first_entry */
- PGPError
-PGPldapFirstEntry(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef result,
- PGPldapMessageRef * outMessage );
-
- /* ldap_next_entry */
- PGPError
-PGPldapNextEntry(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef prevEntry,
- PGPldapMessageRef * outMessage );
-
- /* ldap_get_dn */
- PGPError
-PGPldapGetDN(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef entry,
- PGPChar8 ** dn ); /* Should be freed by PGPFreeData */
-
- /* ldap_first_attribute */
- PGPError
-PGPldapFirstAttribute(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef entry,
- PGPberElementRef * ber,
- PGPChar8 ** attr ); /* Should be freed by PGPFreeData */
-
- /* ldap_next_attribute */
- PGPError
-PGPldapNextAttribute(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef entry,
- PGPberElementRef ber,
- PGPChar8 ** attr ); /* Should be freed by PGPFreeData */
-
- /* ldap_get_values */
- PGPError
-PGPldapGetValues(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef entry,
- PGPChar8 * attr,
- PGPChar8 *** values ); /* Should be freed by PGPFreeLDAPValues */
-
- /* ldap_get_values_len */
- PGPError
-PGPldapGetValuesLen(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef entry,
- PGPChar8 * attr,
- PGPberValue *** values ); /* Should be freed by PGPFreeLDAPValuesLen */
-
- /* ldap_count_values */
- PGPError
-PGPldapCountValues(
- PGPldapContextRef pgpLDAP,
- PGPChar8 ** values,
- PGPSize * num );
-
- /* ldap_count_values_len */
- PGPError
-PGPldapCountValuesLen(
- PGPldapContextRef pgpLDAP,
- PGPberValue ** values,
- PGPSize * num );
-
-
-/* Update functions */
-
- /* ldap_modify */
- PGPError
-PGPldapModify(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPldapMod * mod[],
- PGPldapMessageID * messageID );
-
- /* ldap_modify_s */
- PGPError
-PGPldapModifySync(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPldapMod * mod[] );
-
- /* ldap_modify_st (extension) */
- PGPError
-PGPldapModifySyncTimeout(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPldapMod * mod[],
- PGPSocketsTimeValue *tv);
-
- /* ldap_add */
- PGPError
-PGPldapAdd(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPldapMod * mod[],
- PGPldapMessageID * messageID );
-
- /* ldap_add_s */
- PGPError
-PGPldapAddSync(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPldapMod * mod[] );
-
- /* ldap_add_st (extension) */
- PGPError
-PGPldapAddSyncTimeout(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPldapMod * mod[],
- PGPSocketsTimeValue *tv );
-
- /* ldap_delete */
- PGPError
-PGPldapDelete(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPldapMessageID * messageID );
-
- /* ldap_delete_s */
- PGPError
-PGPldapDeleteSync(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn );
-
- /* ldap_delete_st (extension) */
- PGPError
-PGPldapDeleteSyncTimeout(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPSocketsTimeValue *tv);
-
- /* ldap_modrdn2 */
- PGPError
-PGPldapModifyRDN(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPChar8 * newRDN,
- PGPBoolean deleteOldRDN,
- PGPldapMessageID * messageID );
-
- /* ldap_modrdn2_s */
- PGPError
-PGPldapModifyRDNSync(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPChar8 * newRDN,
- PGPBoolean deleteOldRDN );
-
- /* ldap_compare */
- PGPError
-PGPldapCompare(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPChar8 * type,
- PGPChar8 * value,
- PGPldapMessageID * messageID );
-
- /* ldap_compare_s */
- PGPError
-PGPldapCompareSync(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPChar8 * type,
- PGPChar8 * value,
- PGPBoolean * equal );
-
- PGPError
-PGPldapGetCompareResult(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageID messageID,
- PGPBoolean * equal );
-
-
-/* Other functions */
- /* ldap_result */
- PGPError
-PGPldapGetResult(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageID messageID,
- PGPBoolean all,
- PGPSocketsTimeValue * timeout,
- PGPldapMessageRef result,
- PGPldapType * messageType );
-
- /* ldap_abandon */
- PGPError
-PGPldapAbandon(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageID messageID );
-
- /* ldap_msgid */
- PGPError
-PGPldapGetMessageID(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef result,
- PGPldapMessageID * messageID );
-
- /* ldap_is_ldap_url */
- PGPError
-PGPldapIsLDAPURL(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * url,
- PGPBoolean * isURL );
-
- /* ldap_url_parse */
- PGPError
-PGPldapURLParse(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * url,
- PGPldapURLDesc ** outLDAPDesc ); /* Should be freed by PGPFreeLDAPURLDesc */
-
- /* ldap_url_search */
- PGPError
-PGPldapURLSearch(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * url,
- PGPBoolean attrsOnly,
- PGPldapMessageID * messageID );
-
- /* ldap_url_search */
- PGPError
-PGPldapURLSearchSync(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * url,
- PGPBoolean attrsOnly,
- PGPldapMessageRef resultMessage );
-
- /* ldap_url_search */
- PGPError
-PGPldapURLSearchSyncTimeout(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * url,
- PGPBoolean attrsOnly,
- PGPSocketsTimeValue * tv,
- PGPldapMessageRef resultMessage );
-
- /* ldap_explode_dn */
- PGPError
-PGPldapExplodeDN(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPBoolean noTypes,
- PGPChar8 *** components ); /* Should be freed by PGPFreeLDAPValues */
-
- /* ldap_sort_entries */
- PGPError
-PGPldapSortEntries(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef chain,
- PGPChar8 * attr,
- PGPInt32 (*compare)( PGPChar8 ** a, PGPChar8 ** b ),
- PGPldapMessageRef sortedChain );
-
- /* ldap_sort_values */
- PGPError
-PGPldapSortValues(
- PGPldapContextRef pgpLDAP,
- PGPChar8 ** vals,
- PGPInt32 (*compare)( PGPChar8 ** a, PGPChar8 ** b ),
- PGPChar8 *** sortedVals );
-
- /* ldap_sort_strcasecmp */
- PGPInt32
-PGPldapCompareStringsIgnoreCase(
- PGPChar8 ** s1,
- PGPChar8 ** s2 );
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpLDAP_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpMemoryMgr.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpMemoryMgr.h
deleted file mode 100644
index 1a86a22a46..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpMemoryMgr.h
+++ /dev/null
@@ -1,220 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpMemoryMgr.h,v 1.9 2003/11/08 04:04:49 ajivsov Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpMemoryMgr_h /* [ */
-#define Included_pgpMemoryMgr_h
-
-#include "pgpBase.h"
-
-/*____________________________________________________________________________
- Mini-tutorial:
-
- A PGPMemoryMgr is an object which implements memory management, including
- allocation, reallocation, deallocation, and secure versions of the same.
-
- *** Using it ***
- A typical sequence of calls is as follows:
- PGPNewMemoryMgr
- ...
- PGPNewData or PGPNewSecureData
- PGPFreeData
- ...
- PGPFreeMemoryMgr
-
- Typically, a program will create one PGPMemoryMgr per thread at
- thread creation time and use that memory mgr until the thread dies.
- Generally, an individual PGPMemoryMgr instance is not thread-safe;
- you must either synchronize or use one PGPMemoryMgr per thread.
-
-
- *** Custom Allocators ***
-
- Default allocators are supplied, but the client can create a custom
- PGPMemoryMgr using PGPNewMemoryMgrCustom() which uses client-supplied
- routines.
- Custom routines need only concern themselves with the actual
- allocation and deallocation.
- The following should be kept in mind for user supplied routines:
- - they can ignore the allocation flags passed
- - leaks, memory clearing, etc is done by the PGPMemoryMgr
- - secure allocator must set 'isNonPageable' to TRUE only if the
- memory really can't be paged.
- - the user value is not interpreted by the PGPMemoryMgr. Typically,
- it would be a pointer to some data the allocation routines use
- to store state.
-
-
- *** Secure memory allocation ***
-
- Blocks can be allocated as "Secure" blocks. Secure blocks are guaranteed
- to be wiped when they are deallocated. Additionally, if the operating
- system and the current conditions allow, the block will be allocated
- in non-pageable memory. You can determine the attributes of a block using
- PGPGetMemoryMgrDataInfo().
-
-
- *** Leaks tracking ***
-
- Leaks tracking is implemented when debugging is on,
- but currently reporting is limited to reporting the number of leaks
- outstanding when the PGPMemoryMgr is disposed.
-
-
- *** Debugging ***
-
- For debugging purposes, blocks may be larger in debug mode to accomodate
- various schemes to detect stray pointers, etc.
-____________________________________________________________________________*/
-
-#if PGP_MACINTOSH
-#pragma options align=mac68k
-#endif
-
-enum
-{
- kPGPMemoryMgrFlags_None = 0,
- kPGPMemoryMgrFlags_Clear = 1
-};
-
-typedef PGPFlags PGPMemoryMgrFlags;
-
-typedef struct PGPMemoryMgr * PGPMemoryMgrRef;
-
-#define kInvalidPGPMemoryMgrRef ((PGPMemoryMgrRef) NULL)
-#define PGPMemoryMgrRefIsValid(ref) ((ref) != kInvalidPGPMemoryMgrRef)
-
-typedef void *(*PGPMemoryMgrAllocationProc)( PGPMemoryMgrRef mgr,
- PGPUserValue userValue,
- PGPSize requestSize, PGPMemoryMgrFlags flags );
-
-/* realloc not be implemented using PGPNewData() */
-typedef PGPError (*PGPMemoryMgrReallocationProc)( PGPMemoryMgrRef mgr,
- PGPUserValue userValue,
- void **allocation, PGPSize newAllocationSize,
- PGPMemoryMgrFlags flags, PGPSize existingSize );
-
-typedef PGPError (*PGPMemoryMgrDeallocationProc)( PGPMemoryMgrRef mgr,
- PGPUserValue userValue,
- void *allocation, PGPSize allocationSize );
-
-
-typedef void *(*PGPMemoryMgrSecureAllocationProc)( PGPMemoryMgrRef mgr,
- PGPUserValue userValue,
- PGPSize requestSize, PGPMemoryMgrFlags flags,
- PGPBoolean *isNonPageable );
-
-
-/* deallocation proc need not clear the memory upon deallocation since
- PGPFreeData() does it automatically */
-typedef PGPError (*PGPMemoryMgrSecureDeallocationProc)( PGPMemoryMgrRef mgr,
- PGPUserValue userValue,
- void *allocation, PGPSize allocationSize,
- PGPBoolean wasLocked );
-
-typedef struct PGPNewMemoryMgrStruct
-{
- /* sizeofStruct must be inited to sizeof( PGPNewMemoryMgrStruct ) */
- PGPUInt32 sizeofStruct;
- PGPFlags reservedFlags;
-
- PGPMemoryMgrAllocationProc allocProc;
- PGPMemoryMgrReallocationProc reallocProc;
- PGPMemoryMgrDeallocationProc deallocProc;
-
- PGPMemoryMgrSecureAllocationProc secureAllocProc;
- void * reserved; /* MUST be zeroed */
- PGPMemoryMgrSecureDeallocationProc secureDeallocProc;
-
- PGPUserValue customValue;
- void * pad[ 8 ]; /* MUST be zeroed */
-} PGPNewMemoryMgrStruct;
-
-PGP_BEGIN_C_DECLARATIONS
-
-
-/*____________________________________________________________________________
- Memory Mgr routines
-____________________________________________________________________________*/
-
-PGPError PGPNewMemoryMgr( PGPFlags reserved, PGPMemoryMgrRef *newMemoryMgr );
-
-PGPError PGPNewMemoryMgrCustom( PGPNewMemoryMgrStruct const * custom,
- PGPMemoryMgrRef *newMemoryMgr );
-
-PGPError PGPFreeMemoryMgr( PGPMemoryMgrRef mgr );
-
-PGPError PGPGetMemoryMgrCustomValue( PGPMemoryMgrRef mgr,
- PGPUserValue *customValue );
-PGPError PGPSetMemoryMgrCustomValue( PGPMemoryMgrRef mgr,
- PGPUserValue customValue );
-
-PGPError PGPValidateMemoryMgr( PGPMemoryMgrRef mgr );
-
-/* allocate a block of the specified size */
-void * PGPNewData( PGPMemoryMgrRef mgr,
- PGPSize requestSize, PGPMemoryMgrFlags flags );
-
-/* allocate a block of the specified size in non-pageable memory */
-/* *isSecure is TRUE if the block definitely can't be paged */
-void * PGPNewSecureData( PGPMemoryMgrRef mgr,
- PGPSize requestSize, PGPMemoryMgrFlags flags );
-
-/* properly reallocs secure or non-secure blocks */
-/* WARNING: the block may move, even if its size is being reduced */
-PGPError PGPReallocData( PGPMemoryMgrRef mgr,
- void **allocation, PGPSize newAllocationSize,
- PGPMemoryMgrFlags flags );
-
-/* properly frees secure or non-secure blocks */
-PGPError PGPFreeData( void *allocation );
-
-
-/*____________________________________________________________________________
- Block Info:
- kPGPMemoryMgrBlockInfo_Valid it's a valid block
- kPGPMemoryMgrBlockInfo_Secure block is a secure allocation
- kPGPMemoryMgrBlockInfo_NonPageable block cannot be paged by VM
-
- Secure blocks are always wiped before being disposed,
- but may or may not be pageable, depending on the OS facilities. Some
- OSs may not provide the ability to make blocks non-pageable.
-
- You should check these flags if the information matters to you.
-____________________________________________________________________________*/
-#define kPGPMemoryMgrBlockInfo_Valid ( ((PGPFlags)1) << 0 )
-#define kPGPMemoryMgrBlockInfo_Secure ( ((PGPFlags)1) << 1 )
-#define kPGPMemoryMgrBlockInfo_NonPageable ( ((PGPFlags)1) << 2 )
-PGPFlags PGPGetMemoryMgrDataInfo( void *allocation );
-
-
-/*____________________________________________________________________________
- Default memory manager routines:
-____________________________________________________________________________*/
-
-PGPMemoryMgrRef PGPGetDefaultMemoryMgr(void);
-PGPError PGPSetDefaultMemoryMgr(PGPMemoryMgrRef memoryMgr);
-
-
-PGP_END_C_DECLARATIONS
-
-
-
-#if PGP_MACINTOSH
-#pragma options align=reset
-#endif
-
-
-#endif /* ] Included_pgpMemoryMgr_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpOptionList.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpOptionList.h
deleted file mode 100644
index a0ef6ceab6..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpOptionList.h
+++ /dev/null
@@ -1,542 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- This file contains the types and prototypes for functions which manipulate
- PGPOptionList data structures.
-
- $Id: pgpOptionList.h,v 1.43 2004/05/15 02:48:39 ajivsov Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpOptionList_h /* [ */
-#define Included_pgpOptionList_h
-
-#include <stdarg.h>
-
-#include "pgpPubTypes.h"
-
-#if PGP_MACINTOSH
-#include <Files.h>
-#elif PGP_OSX
- struct FSSpec;
-#endif
-
-/* Standard event callback declaration */
-struct PGPEvent;
-typedef PGPError (*PGPEventHandlerProcPtr)(PGPContextRef context,
- struct PGPEvent *event, PGPUserValue userValue);
-
-/* Export formats for exporting functions */
-enum PGPExportFormat_
-{
- kPGPExportFormat_Basic = 1,
- kPGPExportFormat_Complete = 255,
-
- kPGPExportFormat_TokenKeyContainer = 256,
-
- kPGPExportFormat_X509Cert = 10000,
- kPGPExportFormat_PKCS8,
-
- kPGPExportFormat_X509CertReq = 11000,
- kPGPExportFormat_NetToolsCAV1_CertReq,
- kPGPExportFormat_VerisignV1_CertReq,
- kPGPExportFormat_EntrustV1_CertReq,
- kPGPExportFormat_NetscapeV1_CertReq,
- kPGPExportFormat_MicrosoftV1_CertReq,
-
- kPGPExportFormat_X509GetCertInitial = 11010,
- kPGPExportFormat_NetToolsCAV1_GetCertInitial,
- kPGPExportFormat_VerisignV1_GetCertInitial,
- kPGPExportFormat_EntrustV1_GetCertInitial,
- kPGPExportFormat_NetscapeV1_GetCertInitial,
- kPGPExportFormat_MicrosoftV1_GetCertInitial,
-
- kPGPExportFormat_X509GetCRL = 11020,
- kPGPExportFormat_NetToolsCAV1_GetCRL,
- kPGPExportFormat_VerisignV1_GetCRL,
- kPGPExportFormat_EntrustV1_GetCRL,
- kPGPExportFormat_NetscapeV1_GetCRL,
- kPGPExportFormat_MicrosoftV1_GetCRL,
-
- PGP_ENUM_FORCE( PGPExportFormat_ )
-};
-PGPENUM_TYPEDEF( PGPExportFormat_, PGPExportFormat );
-
-/* Input formats for PGPOInputFormat */
-enum PGPInputFormat_
-{
- kPGPInputFormat_Unknown = 0,
- kPGPInputFormat_PGP = 1,
-
- kPGPInputFormat_X509DataInPKCS7 = 10000,
- kPGPInputFormat_NetToolsCAV1_DataInPKCS7,
- kPGPInputFormat_VerisignV1_DataInPKCS7,
- kPGPInputFormat_EntrustV1_DataInPKCS7,
- kPGPInputFormat_MicrosoftV1_DataInPKCS7,
- kPGPInputFormat_NetscapeV1_DataInPKCS7,
-
- kPGPInputFormat_PEMEncodedX509Cert,
- kPGPInputFormat_NetToolsCAV1_PEMEncoded,
- kPGPInputFormat_VerisignV1_PEMEncoded,
- kPGPInputFormat_EntrustV1_PEMEncoded,
- kPGPInputFormat_MicrosoftV1_PEMEncoded,
- kPGPInputFormat_NetscapeV1_PEMEncoded,
-
- /* Input formats for X.509 private keys */
- kPGPInputFormat_PrivateKeyInfo,
- kPGPInputFormat_PKCS12,
-
- kPGPInputFormat_SMIMEBody = 12000,
- kPGPInputFormat_SMIMEBodySignedData = 12001,
- kPGPInputFormat_SMIMEBodyEncryptedData = 12002,
-
- PGP_ENUM_FORCE( PGPInputFormat_ )
-};
-PGPENUM_TYPEDEF( PGPInputFormat_, PGPInputFormat );
-
-/* Output formats for PGPOOutputFormat */
-enum PGPOutputFormat_
-{
- kPGPOutputFormat_Unknown = 0,
- kPGPOutputFormat_PGP = 1,
-
- kPGPOutputFormat_X509CertReqInPKCS7 = 10000,
- kPGPOutputFormat_NetToolsCAV1_CertReqInPKCS7,
- kPGPOutputFormat_VerisignV1_CertReqInPKCS7,
- kPGPOutputFormat_EntrustV1_CertReqInPKCS7,
- kPGPOutputFormat_NetscapeV1_CertReqInPKCS7,
- kPGPOutputFormat_MicrosoftV1_CertReqInPKCS7,
-
- kPGPOutputFormat_X509GetCertInitialInPKCS7 = 10010,
- kPGPOutputFormat_NetToolsCAV1_GetCertInitialInPKCS7,
- kPGPOutputFormat_VerisignV1_GetCertInitialInPKCS7,
- kPGPOutputFormat_EntrustV1_GetCertInitialInPKCS7,
- kPGPOutputFormat_NetscapeV1_GetCertInitialInPKCS7,
- kPGPOutputFormat_MicrosoftV1_GetCertInitialInPKCS7,
-
- kPGPOutputFormat_X509GetCRLInPKCS7 = 10020,
- kPGPOutputFormat_NetToolsCAV1_GetCRLInPKCS7,
- kPGPOutputFormat_VerisignV1_GetCRLInPKCS7,
- kPGPOutputFormat_EntrustV1_GetCRLInPKCS7,
- kPGPOutputFormat_NetscapeV1_GetCRLInPKCS7,
- kPGPOutputFormat_MicrosoftV1_GetCRLInPKCS7,
-
- kPGPOutputFormat_SMIMEBodySignedData = 12001,
- kPGPOutputFormat_SMIMEBodyEncryptedData = 12002,
-
- PGP_ENUM_FORCE( PGPOutputFormat_ )
-};
-PGPENUM_TYPEDEF( PGPOutputFormat_, PGPOutputFormat );
-
-/* Attribute-Value structure for PGPOAttributeValue */
-enum PGPAVAttribute_
-{
- /* Pointer properties */
- kPGPAVAttributeFirstPointer = 0,
- kPGPAVAttribute_CommonName = kPGPAVAttributeFirstPointer,
- kPGPAVAttribute_Email,
- kPGPAVAttribute_OrganizationName,
- kPGPAVAttribute_OrganizationalUnitName,
- kPGPAVAttribute_SurName,
- kPGPAVAttribute_SerialNumber,
- kPGPAVAttribute_Country,
- kPGPAVAttribute_Locality,
- kPGPAVAttribute_State,
- kPGPAVAttribute_StreetAddress,
- kPGPAVAttribute_Title,
- kPGPAVAttribute_Description,
- kPGPAVAttribute_PostalCode,
- kPGPAVAttribute_POBOX,
- kPGPAVAttribute_PhysicalDeliveryOfficeName,
- kPGPAVAttribute_TelephoneNumber,
- kPGPAVAttribute_X121Address,
- kPGPAVAttribute_ISDN,
- kPGPAVAttribute_DestinationIndicator,
- kPGPAVAttribute_Name,
- kPGPAVAttribute_GivenName,
- kPGPAVAttribute_Initials,
- kPGPAVAttribute_HouseIdentifier,
- kPGPAVAttribute_DirectoryManagementDomain,
- kPGPAVAttribute_DomainComponent,
- kPGPAVAttribute_UnstructuredName,
- kPGPAVAttribute_UnstructuredAddress,
- kPGPAVAttribute_RFC822Name,
- kPGPAVAttribute_DNSName,
- kPGPAVAttribute_AnotherName,
- kPGPAVAttribute_IPAddress,
- kPGPAVAttribute_CertificateExtension,
- kPGPAVAttribute_SCEPChallenge,
-
- /* Verisign specific */
- kPGPAVAttribute_Challenge,
- kPGPAVAttribute_CertType,
- kPGPAVAttribute_MailFirstName,
- kPGPAVAttribute_MailMiddleName,
- kPGPAVAttribute_MailLastName,
- kPGPAVAttribute_EmployeeID,
- kPGPAVAttribute_MailStop,
- kPGPAVAttribute_AdditionalField4,
- kPGPAVAttribute_AdditionalField5,
- kPGPAVAttribute_AdditionalField6,
- kPGPAVAttribute_Authenticate,
-
- /* Generic pointer properties continue */
- kPGPAVAttribute_KeyID = kPGPAVAttribute_Authenticate+100,
-
- kPGPAVAttributeLastPointer = kPGPAVAttribute_KeyID,
-
- /* Boolean properties */
- kPGPAVAttributeFirstBoolean = 1000,
-
- /* Verisign specific */
- kPGPAVAttribute_EmbedEmail,
-
-
- /* Numeric (PGPUInt32) properties */
- kPGPAVAttributeFirstNumber = 2000,
-
- PGP_ENUM_FORCE( PGPAVAttribute_ )
-} ;
-PGPENUM_TYPEDEF( PGPAVAttribute_, PGPAVAttribute );
-
-typedef struct PGPAttributeValue
-{
- PGPAVAttribute attribute;
- PGPUInt32 size;
- union
- {
- PGPBoolean booleanvalue;
- PGPUInt32 longvalue;
- void *pointervalue;
-
- } value;
-
- PGPUInt32 unused;
-} PGPAttributeValue ;
-
-enum PGPSMIMEMatchCriterion_
-{
- kPGPSMIMEMatchCriterion_Exact = 1, /* exact matching per SMIME spec (default) */
- kPGPSMIMEMatchCriterion_Related = 2, /* use Issuer from IASN, use Exact first then Any for keyIdentifier */
- kPGPSMIMEMatchCriterion_Any = 3, /* try all */
-
- PGP_ENUM_FORCE( PGPSMIMEMatchCriterion_ )
-} ;
-PGPENUM_TYPEDEF( PGPSMIMEMatchCriterion_, PGPSMIMEMatchCriterion );
-
-PGP_BEGIN_C_DECLARATIONS
-
-
-PGPError PGPNewOptionList( PGPContextRef context, PGPOptionListRef *outList );
-PGPError PGPAppendOptionList( PGPOptionListRef optionList,
- PGPOptionListRef firstOption, ... );
-PGPError PGPBuildOptionList( PGPContextRef context,
- PGPOptionListRef *outList,
- PGPOptionListRef firstOption, ... );
-PGPError PGPCopyOptionList( PGPOptionListRef optionList,
- PGPOptionListRef *outList );
-PGPError PGPFreeOptionList( PGPOptionListRef optionList );
-
-/*
-** The following functions are used to create PGPOptionListRef's for
-** specifying the various options to several SDK functions. The
-** functions can be used as inline parameters in a temporary manner or
-** used with PGPBuildOptionList() to create persistent lists.
-*/
-
-/*
-** Special PGPOptionListRef to mark last option passed to those functions
-** which take variable lists of PGPOptionListRef's:
-*/
-
-PGPOptionListRef PGPOLastOption( PGPContextRef context );
-
-/* Special PGPOptionListRef which is always ignored: */
-
-PGPOptionListRef PGPONullOption( PGPContextRef context);
-
-/* Data input (required): */
-
-PGPOptionListRef PGPOInputFile( PGPContextRef context,
- PGPFileSpecRef fileRef );
-PGPOptionListRef PGPOInputBuffer( PGPContextRef context,
- void const *buffer, PGPSize bufferSize );
-#if PGP_MACINTOSH || PGP_OSX
-PGPOptionListRef PGPOInputFileFSSpec( PGPContextRef context,
- const struct FSSpec *fileSpec );
-#endif
-
-/* Data output (optional, generates event if missing): */
-
-PGPOptionListRef PGPOOutputFile( PGPContextRef context,
- PGPFileSpecRef fileRef );
-PGPOptionListRef PGPOOutputBuffer( PGPContextRef context,
- void *buffer, PGPSize bufferSize,
- PGPSize *outputDataLength );
-PGPOptionListRef PGPOOutputDirectory( PGPContextRef context,
- PGPFileSpecRef fileRef );
-#if PGP_MACINTOSH || PGP_OSX
-PGPOptionListRef PGPOOutputFileFSSpec( PGPContextRef context,
- const struct FSSpec *fileSpec );
-#endif
-
-/* Filepath modifiers (used for Archiving )*/
-
-PGPOptionListRef PGPORelativePath( PGPContextRef context,
- PGPFileSpecRef dirRef );
-
-PGPOptionListRef PGPORootPath( PGPContextRef context,
- PGPFileSpecRef dirRef );
-
-/* '*buffer' must be disposed of via PGPFreeData() */
-/* maximum memory usage will be no more than maximumBufferSize */
-PGPOptionListRef PGPOAllocatedOutputBuffer(PGPContextRef context,
- void **buffer, PGPSize maximumBufferSize,
- PGPSize *actualBufferSize);
-PGPOptionListRef PGPOAppendOutput( PGPContextRef context,
- PGPBoolean appendOutput );
-PGPOptionListRef PGPODiscardOutput( PGPContextRef context,
- PGPBoolean discardOutput );
-PGPOptionListRef PGPOAllocatedOutputKeyContainer(PGPContextRef context,
- void **keyContName, PGPSize maximumKeyContNameSize,
- PGPSize *actualKeyContNameSize );
-
-/* Encrypting and signing */
-
-PGPOptionListRef PGPOEncryptToKeyDBObj( PGPContextRef context,
- PGPKeyDBObjRef keyDBObjRef);
-PGPOptionListRef PGPOEncryptToKeySet( PGPContextRef context,
- PGPKeySetRef keySetRef);
-PGPOptionListRef PGPOIntegrityProtection( PGPContextRef context,
- PGPBoolean integrity);
-PGPOptionListRef PGPOSignWithKey( PGPContextRef context,
- PGPKeyDBObjRef keyDBObjRef,
- PGPOptionListRef firstOption, ...);
-PGPOptionListRef PGPOConventionalEncrypt( PGPContextRef context,
- PGPOptionListRef firstOption,
- ...);
-#undef PGPOPassphraseBuffer
-PGPOptionListRef PGPOPassphraseBuffer( PGPContextRef context,
- const PGPChar8 *passphrase,
- PGPSize passphraseLength);
-#undef PGPOPassphrase
-PGPOptionListRef PGPOPassphrase( PGPContextRef context,
- const PGPChar8 *passphrase);
-PGPOptionListRef PGPOPasskeyBuffer( PGPContextRef context,
- const void *passkey, PGPSize passkeyLength);
-
-PGPOptionListRef PGPOCachePassphrase( PGPContextRef context,
- PGPUInt32 timeOutSeconds, PGPBoolean globalCache);
-PGPOptionListRef PGPOSessionKey( PGPContextRef context,
- const void *sessionKey, PGPSize sessionKeyLength);
-PGPOptionListRef PGPOSignedHash( PGPContextRef context,
- void const *hash, PGPSize hashSize );
-PGPOptionListRef PGPOAllowBareESKs( PGPContextRef context,
- PGPBoolean allowBareESKs );
-PGPOptionListRef PGPOAskUserForEntropy( PGPContextRef context,
- PGPBoolean askUserForEntropy );
-PGPOptionListRef PGPORawPGPInput( PGPContextRef context,
- PGPBoolean rawPGPInput );
-PGPOptionListRef PGPOCompression( PGPContextRef context,
- PGPBoolean compression );
-
-PGPOptionListRef PGPOLocalEncoding( PGPContextRef context,
- PGPLocalEncodingFlags localEncode);
-PGPOptionListRef PGPOOutputLineEndType(PGPContextRef context,
- PGPLineEndType lineEnd);
-#undef PGPOPGPMIMEEncoding
-PGPOptionListRef PGPOPGPMIMEEncoding(PGPContextRef context,
- PGPBoolean mimeEncoding, PGPSize *mimeBodyOffset,
- PGPChar8 mimeSeparator[ kPGPMimeSeparatorSize ]);
-PGPOptionListRef PGPOOmitMIMEVersion( PGPContextRef context,
- PGPBoolean omitVersion);
-PGPOptionListRef PGPOX509Encoding( PGPContextRef context,
- PGPBoolean x509Encoding);
-
-PGPOptionListRef PGPODetachedSig( PGPContextRef context,
- PGPOptionListRef firstOption,
- ...);
-
-PGPOptionListRef PGPOCipherAlgorithm( PGPContextRef context,
- PGPCipherAlgorithm algorithm);
-PGPOptionListRef PGPOHashAlgorithm( PGPContextRef context,
- PGPHashAlgorithm algorithm);
-PGPOptionListRef PGPOCompressionAlgorithm( PGPContextRef context,
- PGPCompressionAlgorithm algorithm);
-
-PGPOptionListRef PGPOFailBelowValidity( PGPContextRef context,
- PGPValidity minValidity);
-PGPOptionListRef PGPOWarnBelowValidity( PGPContextRef context,
- PGPValidity minValidity);
-
-
-PGPOptionListRef PGPOEventHandler( PGPContextRef context,
- PGPEventHandlerProcPtr eventHandler,
- PGPUserValue eventHandlerData);
-PGPOptionListRef PGPOSendNullEvents( PGPContextRef context,
- PGPTimeInterval approxInterval);
-
-PGPOptionListRef PGPOArmorOutput( PGPContextRef context,
- PGPBoolean armorOutput );
-PGPOptionListRef PGPODataIsASCII( PGPContextRef context,
- PGPBoolean dataIsASCII );
-PGPOptionListRef PGPOClearSign( PGPContextRef context,
- PGPBoolean clearSign );
-PGPOptionListRef PGPOForYourEyesOnly( PGPContextRef context,
- PGPBoolean forYourEyesOnly );
-PGPOptionListRef PGPOKeyDBRef( PGPContextRef context,
- PGPKeyDBRef keydbRef);
-
-PGPOptionListRef PGPOExportKeySet( PGPContextRef context,
- PGPKeySetRef keysetRef);
-PGPOptionListRef PGPOExportKeyDBObj( PGPContextRef context,
- PGPKeyDBObjRef keyDBObjRef);
-
-PGPOptionListRef PGPOImportKeysTo( PGPContextRef context,
- PGPKeyDBRef keydbRef);
-PGPOptionListRef PGPOSendEventIfKeyFound( PGPContextRef context,
- PGPBoolean sendEventIfKeyFound );
-PGPOptionListRef PGPOPassThroughIfUnrecognized( PGPContextRef context,
- PGPBoolean passThroughIfUnrecognized );
-PGPOptionListRef PGPOPassThroughClearSigned( PGPContextRef context,
- PGPBoolean passThroughClearSigned );
-PGPOptionListRef PGPOPassThroughKeys( PGPContextRef context,
- PGPBoolean passThroughKeys );
-PGPOptionListRef PGPORecursivelyDecode( PGPContextRef context,
- PGPBoolean recurse );
-
-PGPOptionListRef PGPOKeyGenParams( PGPContextRef context,
- PGPPublicKeyAlgorithm pubKeyAlg,
- PGPUInt32 bits);
-
-#undef PGPOKeyGenName
-PGPOptionListRef PGPOKeyGenName( PGPContextRef context,
- const void *name, PGPSize nameLength);
-
-PGPOptionListRef PGPOCreationDate( PGPContextRef context,
- PGPTime creationDate);
-PGPOptionListRef PGPOExpiration( PGPContextRef context,
- PGPUInt32 expirationDays);
-
-PGPOptionListRef PGPOAdditionalRecipientRequestKeySet(
- PGPContextRef context,
- PGPKeySetRef arKeySetRef, PGPByte arkClass);
-
-PGPOptionListRef PGPORevocationKeySet(PGPContextRef context,
- PGPKeySetRef raKeySetRef);
-
-PGPOptionListRef PGPOKeyGenMasterKey( PGPContextRef context,
- PGPKeyDBObjRef masterKeyDBObjRef);
-
-PGPOptionListRef PGPOPreferredAlgorithms(
- PGPContextRef context,
- PGPCipherAlgorithm const *prefAlg,
- PGPUInt32 numAlgs);
-
-#undef PGPOPreferredKeyServer
-PGPOptionListRef PGPOPreferredKeyServer(
- PGPContextRef context,
- PGPChar8 const * server );
-
-PGPOptionListRef PGPOKeyFeatures( PGPContextRef context,
- PGPUInt32 features);
-
-PGPOptionListRef PGPOKeyFlags( PGPContextRef context,
- PGPUInt32 flags);
-
-PGPOptionListRef PGPOKeyServerPreferences( PGPContextRef context,
- PGPUInt32 preferences);
-
-PGPOptionListRef PGPOKeyGenFast( PGPContextRef context,
- PGPBoolean fastGen);
-
-PGPOptionListRef PGPOTokenNumber( PGPContextRef context,
- PGPUInt32 tokenID);
-#define PGPOKeyGenOnToken PGPOTokenNumber
-
-PGPOptionListRef PGPOOutputToken( PGPContextRef context, PGPUInt32 token );
-
-PGPOptionListRef PGPOKeyContainer( PGPContextRef context,
- const PGPByte *keyContainerName,
- PGPSize keyContainerNameSize );
-
-PGPOptionListRef PGPOKeyGenUseExistingEntropy( PGPContextRef context,
- PGPBoolean useExistingEntropy);
-
-PGPOptionListRef PGPOPreferredCompressionAlgorithms(
- PGPContextRef context,
- PGPCompressionAlgorithm const *prefAlg,
- PGPUInt32 numAlgs);
-
-#undef PGPOCommentString
-PGPOptionListRef PGPOCommentString( PGPContextRef context,
- PGPChar8 const *comment);
-
-#undef PGPOVersionString
-PGPOptionListRef PGPOVersionString( PGPContextRef context,
- PGPChar8 const *version);
-
-#undef PGPOFileNameString
-PGPOptionListRef PGPOFileNameString( PGPContextRef context,
- PGPChar8 const *fileName);
-
-#undef PGPOSigRegularExpression
-PGPOptionListRef PGPOSigRegularExpression(PGPContextRef context,
- PGPChar8 const *regularExpression);
-
-PGPOptionListRef PGPOExportPrivateKeys( PGPContextRef context,
- PGPBoolean exportKeys);
-
-PGPOptionListRef PGPOExportPrivateSubkeys( PGPContextRef context,
- PGPBoolean exportSubkeys);
-
-PGPOptionListRef PGPOExportFormat(PGPContextRef context,
- PGPExportFormat exportFormat);
-
-PGPOptionListRef PGPOExportable( PGPContextRef context,
- PGPBoolean exportable);
-
-PGPOptionListRef PGPOSigTrust( PGPContextRef context,
- PGPUInt32 trustLevel,
- PGPUInt32 trustValue);
-
-PGPOptionListRef PGPOInputFormat( PGPContextRef context,
- PGPInputFormat inputFormat );
-
-PGPOptionListRef PGPOOutputFormat( PGPContextRef context,
- PGPOutputFormat outputFormat );
-
-PGPOptionListRef PGPOAttributeValue( PGPContextRef context,
- PGPAttributeValue *attributeValue,
- PGPUInt32 attributeValueCount);
-
-PGPOptionListRef PGPOInputTARCache( PGPContextRef context,
- PGPFileSpecRef cacheFileRef,
- const PGPByte *sessionKey,
- PGPSize sessionKeySize );
-
-PGPOptionListRef PGPOOutputTARCache( PGPContextRef context,
- PGPFileSpecRef cacheFileRef );
-
-PGPOptionListRef PGPOIssueRevocations( PGPContextRef context,
- PGPBoolean issueRevocations );
-
-PGPOptionListRef PGPOSMIMEMatchCriterion( PGPContextRef context,
- PGPSMIMEMatchCriterion criterion );
-
-PGPOptionListRef PGPOSMIMESigner( PGPContextRef context,
- PGPKeyDBObjRef signer );
-
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpOptionList_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpPFLConfig.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpPFLConfig.h
deleted file mode 100644
index 8474d66aa0..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpPFLConfig.h
+++ /dev/null
@@ -1,52 +0,0 @@
-/*____________________________________________________________________________
- pgpPFLConfig.h (Win32 version)
-
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- This file contains the Win32 version of the configuration file
- normally generated by the automatic configure script on Unix.
-
- $Id: pgpPFLConfig.h,v 1.3 2002/08/06 20:10:45 dallen Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpPFLConfig_h /* [ */
-#define Included_pgpPFLConfig_h
-
-#define HAVE_STDARG_H 1
-#define HAVE_STDLIB_H 1
-#define HAVE_SYS_STAT_H 1
-#define HAVE_UNISTD_H 0
-#define HAVE_USHORT 0
-#define HAVE_UINT 0
-#define HAVE_ULONG 0
-#define NO_LIMITS_H 0
-#define NO_POPEN 1
-
-#if defined( __MWERKS__ )
-
- #define PGP_HAVE64 0
-
-
-#elif defined( _MSC_VER )
- // wjb-for FileOffsets to be 64 bit
- #define PGP_HAVE64 1
- typedef __int64 PGPInt64;
- typedef unsigned __int64 PGPUInt64;
-
-
-
-#endif
-
-
-
-
-#endif /* ] Included_pgpPFLConfig_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpPFLErrors.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpPFLErrors.h
deleted file mode 100644
index f0264cafd0..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpPFLErrors.h
+++ /dev/null
@@ -1,116 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpPFLErrors.h,v 1.20 2004/04/25 03:31:03 bzhao Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpPFLErrors_h /* [ */
-#define Included_pgpPFLErrors_h
-
-#include "pgpBase.h"
-
-#define kPGPPFLErrorBase -12000
-#define kPGPPFLErrorRange 500
-
-enum
-{
- /*
- NOTE: error numbers must not be changed as compile clients depend on them.
- */
-
- kPGPError_NoErr = 0,
-
- kPGPError_BadParams = -12000,
- kPGPError_OutOfMemory = -11999,
- kPGPError_BufferTooSmall = -11998,
-
- kPGPError_FileNotFound = -11997,
- kPGPError_CantOpenFile = -11996,
- kPGPError_FilePermissions = -11995,
- kPGPError_FileLocked = -11994,
- /* Unused = -11993, */
- kPGPError_IllegalFileOp = -11992,
- kPGPError_FileOpFailed = -11991,
- kPGPError_ReadFailed = -11990,
- kPGPError_WriteFailed = -11989,
- kPGPError_EOF = -11988,
-
- kPGPError_UserAbort = -11987,
- kPGPError_UnknownRequest = -11986,
- kPGPError_LazyProgrammer = -11985,
- kPGPError_ItemNotFound = -11984,
- kPGPError_ItemAlreadyExists = -11983,
- kPGPError_AssertFailed = -11982,
- kPGPError_BadMemAddress = -11981,
- kPGPError_UnknownError = -11980,
-
- kPGPError_PrefNotFound = -11979,
- kPGPError_EndOfIteration = -11978,
- kPGPError_ImproperInitialization = -11977,
- kPGPError_CorruptData = -11976,
- kPGPError_FeatureNotAvailable = -11975,
- kPGPError_MatchNotFound = -11974,
- kPGPError_ResourceUnavailable = -11973,
- kPGPError_InsufficientPrivileges = -11972,
- kPGPError_AlreadyInUse = -11971,
- kPGPError_Deadlocked = -11970,
- kPGPError_NotConnected = -11969,
- kPGPError_BufferTooLarge = -11968,
- kPGPError_SizeTooLarge = -11967,
-
- kPGPError_DiskFull = -11960,
- kPGPError_DiskLocked = -11959,
-
- kPGPError_GraphicsOpFailed = -11956,
- kPGPError_MemoryOpFailed = -11955,
- kPGPError_NetworkOpFailed = -11954,
- kPGPError_SecurityOpFailed = -11953,
- kPGPError_StringOpFailed = -11952,
- kPGPError_SyncObjOpFailed = -11951,
- kPGPError_ThreadOpFailed = -11950,
- kPGPError_VolumeOpFailed = -11949,
-
- kPGPError_NTDrvIopOpFailed = -11947,
- kPGPError_NTDrvObjectOpFailed = -11946,
-
- kPGPError_Win32COMOpFailed = -11945,
- kPGPError_Win32CommCtrlOpFailed = -11944,
- kPGPError_Win32DllOpFailed = -11943,
- kPGPError_Win32RegistryOpFailed = -11942,
- kPGPError_Win32ResourceOpFailed = -11941,
- kPGPError_Win32WindowOpFailed = -11940,
- kPGPError_RPCFailed = -11939,
- kPGPError_RPCGarbledMsg = -11938,
- kPGPError_NoUnicodeEquivalent = -11937,
-
- kPGPError_NetLARefused = -11936,
- kPGPError_NetLAMismatch = -11935,
- kPGPError_NetLATooManyRetrievals = -11934,
- kPGPError_LNCorrupt = -11933,
- kPGPError_LACorrupt = -11932,
- kPGPError_LNInvalid = -11931,
- kPGPError_NetInvalidProdID = -11930,
- // PGPwde error code
- kPGPError_DiskNotFound = -11929,
- kPGPError_LastPFLError = kPGPPFLErrorBase + kPGPPFLErrorRange - 1
-};
-
-#define IsPGPError( err ) ( (err) != kPGPError_NoErr )
-#define IsntPGPError( err ) ( (err) == kPGPError_NoErr )
-
-PGP_BEGIN_C_DECLARATIONS
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpPFLErrors_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpPubTypes.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpPubTypes.h
deleted file mode 100644
index 6082d4bb62..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpPubTypes.h
+++ /dev/null
@@ -1,350 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpPubTypes.h,v 1.22 2004/04/13 20:50:53 ajivsov Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpPubTypes_h /* [ */
-#define Included_pgpPubTypes_h
-
-#include "pgpConfig.h"
-#include "pgpBase.h"
-
-/*____________________________________________________________________________
- General data types used by PGPsdk
-____________________________________________________________________________*/
-
-typedef struct PGPContext * PGPContextRef;
-typedef struct PGPFileSpec * PGPFileSpecRef;
-typedef struct PGPOptionList * PGPOptionListRef;
-
-/*____________________________________________________________________________
- Data types used by the key manipulation functions
-____________________________________________________________________________*/
-
-typedef struct PGPKeyDB * PGPKeyDBRef;
-typedef struct PGPKeyDBObj * PGPKeyDBObjRef;
-typedef struct PGPKeySet * PGPKeySetRef;
-typedef struct PGPKeyList * PGPKeyListRef;
-typedef struct PGPKeyIter * PGPKeyIterRef;
-typedef struct PGPFilter * PGPFilterRef;
-
-typedef struct PGPKeyID
-{
- /* do not attempt to interpret these bytes; they *will* change */
- PGPByte opaqueBytes[ 36 ];
-} PGPKeyID;
-
-/*____________________________________________________________________________
- Data types used by symmetric ciphers, cipher modes, hashing
-____________________________________________________________________________*/
-
-typedef struct PGPHashContext * PGPHashContextRef;
-typedef struct PGPHMACContext * PGPHMACContextRef;
-typedef struct PGPPublicKeyContext * PGPPublicKeyContextRef;
-typedef struct PGPPrivateKeyContext * PGPPrivateKeyContextRef;
-typedef struct PGPCBCContext * PGPCBCContextRef;
-typedef struct PGPCFBContext * PGPCFBContextRef;
-typedef struct PGPSymmetricCipherContext * PGPSymmetricCipherContextRef;
-
-/*____________________________________________________________________________
-Disk Wiping Patterns
-____________________________________________________________________________*/
-
-typedef struct PGPWipePatternContext * PGPWipePatternContextRef;
-
-/*____________________________________________________________________________
-PGP Tar Cache, Objects and Iterators
-____________________________________________________________________________*/
-typedef struct PGPTARCache * PGPTARCacheRef;
-typedef struct PGPTARCacheIter * PGPTARCacheIterRef;
-typedef struct PGPTARCacheObj * PGPTARCacheObjRef;
-
-/*____________________________________________________________________________
- Data types used by keyserver code
-____________________________________________________________________________*/
-
-typedef struct PGPKeyServer * PGPKeyServerRef;
-
-/*____________________________________________________________________________
- Invalid values for each of the "ref" data types. Use these for assignment
- and initialization only. Use the PGPXXXRefIsValid macros (below) to test
- for valid/invalid values.
-____________________________________________________________________________*/
-
-#define kInvalidPGPContextRef ((PGPContextRef) NULL)
-#define kInvalidPGPFileSpecRef ((PGPFileSpecRef) NULL)
-#define kInvalidPGPOptionListRef ((PGPOptionListRef) NULL)
-#define kInvalidPGPKeyDBRef ((PGPKeyDBRef) NULL)
-#define kInvalidPGPKeyDBObjRef ((PGPKeyDBObjRef) NULL)
-#define kInvalidPGPKeySetRef ((PGPKeySetRef) NULL)
-#define kInvalidPGPKeyListRef ((PGPKeyListRef) NULL)
-#define kInvalidPGPKeyIterRef ((PGPKeyIterRef) NULL)
-#define kInvalidPGPFilterRef ((PGPFilterRef) NULL)
-#define kInvalidPGPKeyServerRef ((PGPKeyServerRef) NULL)
-#define kInvalidPGPHashContextRef ((PGPHashContextRef) NULL)
-#define kInvalidPGPHMACContextRef ((PGPHMACContextRef) NULL)
-#define kInvalidPGPCFBContextRef ((PGPCFBContextRef) NULL)
-#define kInvalidPGPCBCContextRef ((PGPCBCContextRef) NULL)
-
-#define kInvalidPGPSymmetricCipherContextRef \
- ((PGPSymmetricCipherContextRef) NULL)
-#define kInvalidPGPPublicKeyContextRef \
- ((PGPPublicKeyContextRef) NULL)
-#define kInvalidPGPPrivateKeyContextRef \
- ((PGPPrivateKeyContextRef) NULL)
-#define kInvalidPGWipePatternContextRef \
- ((PGPWipePatternContextRef) NULL)
-#define kInvalidPGPTARCacheRef \
- ((PGPTARCacheRef) NULL)
-#define kInvalidPGPTARCacheIterRef \
- ((PGPTARCacheIterRef) NULL)
-#define kInvalidPGPTARCacheObjRef \
- ((PGPTARCacheObjRef) NULL)
-
-
-/*____________________________________________________________________________
- Macros to test for ref validity. Use these in preference to comparing
- directly with the kInvalidXXXRef values.
-____________________________________________________________________________*/
-
-#define PGPContextRefIsValid( ref ) ( (ref) != kInvalidPGPContextRef )
-#define PGPFileSpecRefIsValid( ref ) ( (ref) != kInvalidPGPFileSpecRef )
-#define PGPOptionListRefIsValid( ref ) ( (ref) != kInvalidPGPOptionListRef )
-#define PGPKeyDBRefIsValid( ref ) ( (ref) != kInvalidPGPKeyDBRef )
-#define PGPKeyDBObjRefIsValid( ref ) ( (ref) != kInvalidPGPKeyDBObjRef )
-#define PGPKeySetRefIsValid( ref ) ( (ref) != kInvalidPGPKeySetRef )
-#define PGPKeyListRefIsValid( ref ) ( (ref) != kInvalidPGPKeyListRef )
-#define PGPKeyIterRefIsValid( ref ) ( (ref) != kInvalidPGPKeyIterRef )
-#define PGPFilterRefIsValid( ref ) ( (ref) != kInvalidPGPFilterRef )
-#define PGPKeyServerRefIsValid( ref ) ( (ref) != kInvalidPGPKeyServerRef )
-#define PGPHashContextRefIsValid( ref ) ( (ref) != kInvalidPGPHashContextRef )
-#define PGPHMACContextRefIsValid( ref ) ( (ref) != kInvalidPGPHMACContextRef )
-#define PGPCFBContextRefIsValid( ref ) ( (ref) != kInvalidPGPCFBContextRef )
-#define PGPCBCContextRefIsValid( ref ) ( (ref) != kInvalidPGPCBCContextRef )
-
-#define PGPSymmetricCipherContextRefIsValid( ref ) \
- ( (ref) != kInvalidPGPSymmetricCipherContextRef )
-#define PGPPublicKeyContextRefIsValid( ref ) \
- ( (ref) != kInvalidPGPPublicKeyContextRef )
-#define PGPPrivateKeyContextRefIsValid( ref ) \
- ( (ref) != kInvalidPGPPrivateKeyContextRef )
-#define PGPWipePatternContextRefIsValid( ref ) \
- ( (ref) != kInvalidPGWipePatternContextRef )
- #define PGPTARCacheRefIsValid( ref ) \
- ( (ref) != kInvalidPGPTARCacheRef )
-#define PGPTARCacheObjRefIsValid( ref ) \
- ( (ref) != kInvalidPGPTARCacheObjRef )
-#define PGPTARCacheIterRefIsValid( ref) \
- ( (ref) != kInvalidPGPTARCacheIterRef )
-
-/*____________________________________________________________________________
- Symmetric Ciphers
-____________________________________________________________________________*/
-
-enum PGPCipherAlgorithm_
-{
- kPGPCipherAlgorithm_None = 0,
- kPGPCipherAlgorithm_IDEA = 1,
- kPGPCipherAlgorithm_3DES = 2,
- kPGPCipherAlgorithm_CAST5 = 3,
- kPGPCipherAlgorithm_Blowfish = 4,
- kPGPCipherAlgorithm_AES128 = 7,
- kPGPCipherAlgorithm_AES192 = 8,
- kPGPCipherAlgorithm_AES256 = 9,
- kPGPCipherAlgorithm_Twofish256 = 10,
-
- PGP_ENUM_FORCE( PGPCipherAlgorithm_ )
-};
-PGPENUM_TYPEDEF( PGPCipherAlgorithm_, PGPCipherAlgorithm );
-
-/*____________________________________________________________________________
- Hash algorithms
-____________________________________________________________________________*/
-
-enum PGPHashAlgorithm_
-{
- kPGPHashAlgorithm_Invalid = 0,
- kPGPHashAlgorithm_MD5 = 1,
- kPGPHashAlgorithm_SHA = 2,
- kPGPHashAlgorithm_RIPEMD160 = 3,
- kPGPHashAlgorithm_SHA256 = 8, /* from draft-ietf-openpgp-rfc2440bis-03.txt */
- kPGPHashAlgorithm_SHA384 = 9,
- kPGPHashAlgorithm_SHA512 = 10,
-
- PGP_ENUM_FORCE( PGPHashAlgorithm_ )
-};
-PGPENUM_TYPEDEF( PGPHashAlgorithm_, PGPHashAlgorithm );
-
-/*____________________________________________________________________________
- Public/Private key algorithms
-____________________________________________________________________________*/
-enum PGPPublicKeyAlgorithm_
-{
-#ifdef __MVS__
- kPGPPublicKeyAlgorithm_Invalid = -1,
-#else
- kPGPPublicKeyAlgorithm_Invalid = 0xFFFFFFFF,
-#endif
- kPGPPublicKeyAlgorithm_RSA = 1,
- kPGPPublicKeyAlgorithm_RSAEncryptOnly = 2,
- kPGPPublicKeyAlgorithm_RSASignOnly = 3,
- kPGPPublicKeyAlgorithm_ElGamal = 0x10, /* A.K.A.Diffie-Hellman */
- kPGPPublicKeyAlgorithm_DSA = 0x11,
- kPGPPublicKeyAlgorithm_ECEncrypt = 0x12,
- kPGPPublicKeyAlgorithm_ECSign = 0x13,
-
- PGP_ENUM_FORCE( PGPPublicKeyAlgorithm_ )
-};
-PGPENUM_TYPEDEF( PGPPublicKeyAlgorithm_, PGPPublicKeyAlgorithm );
-
-/*____________________________________________________________________________
- Trust values, used to set validity values
-____________________________________________________________________________*/
-
-#define kPGPKeyTrust_Mask 0x7u
-#define kPGPKeyTrust_Undefined 0x0u
-#define kPGPKeyTrust_Unknown 0x1u
-#define kPGPKeyTrust_Never 0x2u
-#define kPGPKeyTrust_Marginal 0x5u
-#define kPGPKeyTrust_Complete 0x6u
-#define kPGPKeyTrust_Ultimate 0x7u
-
-#define kPGPUserIDTrust_Mask 0x3u
-#define kPGPUserIDTrust_Unknown 0x0u
-#define kPGPUserIDTrust_Untrusted 0x1u
-#define kPGPUserIDTrust_Marginal 0x2u
-#define kPGPUserIDTrust_Complete 0x3u
-
-/*____________________________________________________________________________
- Validity levels, used for thresholds in options
-____________________________________________________________________________*/
-
-enum PGPValidity_
-{
- kPGPValidity_Unknown = kPGPUserIDTrust_Unknown,
- kPGPValidity_Invalid = kPGPUserIDTrust_Untrusted,
- kPGPValidity_Marginal = kPGPUserIDTrust_Marginal,
- kPGPValidity_Complete = kPGPUserIDTrust_Complete,
-
- PGP_ENUM_FORCE( PGPValidity_ )
-} ;
-PGPENUM_TYPEDEF( PGPValidity_, PGPValidity );
-
-/*____________________________________________________________________________
- Line endings types
-____________________________________________________________________________*/
-
-enum PGPLineEndType_
-{
- kPGPLineEnd_Default = 0,
- kPGPLineEnd_LF = 1,
- kPGPLineEnd_CR = 2,
- kPGPLineEnd_CRLF = (kPGPLineEnd_LF | kPGPLineEnd_CR),
-
- PGP_ENUM_FORCE( PGPLineEndType_ )
-};
-PGPENUM_TYPEDEF( PGPLineEndType_, PGPLineEndType );
-
-/*____________________________________________________________________________
- Local encoding types
-
- Only one of Force or Auto should be used. The other values are modifiers
-____________________________________________________________________________*/
-
-#define kPGPLocalEncoding_None 0x0 /* nothing on */
-#define kPGPLocalEncoding_Force 0x01
-#define kPGPLocalEncoding_Auto 0x02
-#define kPGPLocalEncoding_NoMacBinCRCOkay 0x04
-
-typedef PGPFlags PGPLocalEncodingFlags;
-
-
-/* max length is 255; the +1 is for the trailing \0 */
-#define kPGPMaxUserIDSize ( (PGPSize)255 + 1 )
-
-/* Size of buffer for PGP-MIME separator (null terminated) */
-#define kPGPMimeSeparatorSize 81
-
-enum PGPTokenProperty_
-{
- kPGPTokenProperty_Invalid = 0,
-
- /* boolean properties */
- kPGPTokenProperty_DirectAuth = 1,
-
- /* numeric properties */
- kPGPTokenProperty_KeyGenAlgorithm = 100,
- kPGPTokenProperty_PrivateKeys = 101,
- kPGPTokenProperty_PublicKeys = 102,
- kPGPTokenProperty_SlotID = 103,
- kPGPTokenProperty_MinPINSize = 104,
- kPGPTokenProperty_MaxPINSize = 105,
- kPGPTokenProperty_MinKeySize = 106,
- kPGPTokenProperty_MaxKeySize = 107,
-
- /* string / data properties */
- kPGPTokenProperty_SerialNumber = 500,
- kPGPTokenProperty_Model = 501,
- kPGPTokenProperty_ManufacturerID = 502,
- kPGPTokenProperty_TokenLabel = 503,
-
- PGP_ENUM_FORCE( PGPTokenProperty_ )
-};
-PGPENUM_TYPEDEF( PGPTokenProperty_, PGPTokenProperty );
-
-/* Token capabilities / information. 4 byte packing.
- * Deprecated, use PGPTokenInfoGet*() with PGPTokenProperty
- *
- */
-typedef struct _PGPTokenInfo {
- /* The size of the structure, including this field.
- Must be the first field */
- PGPUInt32 size;
-
- /* Identification information */
- PGPByte manufacturerID[32];
- PGPByte model[16];
- PGPByte serialNumber[16];
-
- PGPBoolean bRsa;
- PGPUInt32 minRsaKeySize;
- PGPUInt32 maxRsaKeySize;
-
- /* General capabilities */
- PGPUInt32 minPinLen;
- PGPUInt32 maxPinLen;
-
- /* Number of objects */
- PGPUInt32 numPrivKeys; /* Possibly, non-PGP keys */
- PGPUInt32 numPubKeys; /* Possibly, non-PGP keys */
-
- PGPByte reserved[4];
-} PGPTokenInfo;
-
-/*____________________________________________________________________________
- Compression algorithms
-____________________________________________________________________________*/
-
-enum PGPCompressionAlgorithm_
-{
- kPGPCompressionAlgorithm_None = 0,
- kPGPCompressionAlgorithm_ZIP = 1,
- kPGPCompressionAlgorithm_ZLIB = 2,
- kPGPCompressionAlgorithm_BZIP2 = 3,
-
- PGP_ENUM_FORCE( PGPCompressionAlgorithm_ )
-};
-PGPENUM_TYPEDEF( PGPCompressionAlgorithm_, PGPCompressionAlgorithm );
-
-#endif /* ] Included_pgpPubTypes_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpPublicKey.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpPublicKey.h
deleted file mode 100644
index 8ed1adc9ae..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpPublicKey.h
+++ /dev/null
@@ -1,207 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpPublicKey.h,v 1.9 2003/10/03 00:38:40 vinnie Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpPublicKey_h /* [ */
-#define Included_pgpPublicKey_h
-
-#include "pgpPubTypes.h"
-#include "pgpOptionList.h"
-
-/*____________________________________________________________________________
- Encryption/Signature Message Formats
-____________________________________________________________________________*/
-
-enum PGPPublicKeyMessageFormat_
-{
- kPGPPublicKeyMessageFormat_PGP = 1,
- kPGPPublicKeyMessageFormat_PKCS1 = 2,
- kPGPPublicKeyMessageFormat_X509 = 3,
- kPGPPublicKeyMessageFormat_IKE = 4,
-
- kPGPPublicKeyMessageFormat_PKCS1_OAEP = 5, /* default is MGF1 with SHA1 */
-
- PGP_ENUM_FORCE( PGPPublicKeyMessageFormat_ )
-};
-PGPENUM_TYPEDEF( PGPPublicKeyMessageFormat_, PGPPublicKeyMessageFormat );
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- Public-key operations
-
- Return a context for public-key operations based on the specified key.
- The specified message format is used for all operations with this
- context.
-____________________________________________________________________________*/
-
-PGPError PGPNewPublicKeyContext( PGPKeyDBObjRef publicKeyDBObjRef,
- PGPPublicKeyMessageFormat messageFormat,
- PGPPublicKeyContextRef *outRef );
-
-/*____________________________________________________________________________
- Dispose of a public-key context.
-____________________________________________________________________________*/
-
-PGPError PGPFreePublicKeyContext( PGPPublicKeyContextRef ref );
-
-/*____________________________________________________________________________
- Determine maximum sizes for inputs and outputs.
-____________________________________________________________________________*/
-
-PGPError PGPGetPublicKeyOperationSizes( PGPPublicKeyContextRef ref,
- PGPSize *maxDecryptedBufferSize,
- PGPSize *maxEncryptedBufferSize,
- PGPSize *maxSignatureSize );
-
-/*____________________________________________________________________________
- Encrypt one block of data, using PKCS-1 padding. Output buffer must
- be of size maxEncryptedBufferSize from PGPGetPublicKeyEncryptionSize.
- outSize is a return parameter. For some formatting modes the actual
- output size may be less than the maximum possible.
-____________________________________________________________________________*/
-
-PGPError PGPPublicKeyEncrypt( PGPPublicKeyContextRef ref,
- void const *in, PGPSize inSize, void *out,
- PGPSize *outSize );
-
-/*____________________________________________________________________________
- Verify a signature on a message hash. Returns kPGPError_NoErr on
- correct verification, else an error code. The message hash is
- finalized and freed by this call (and should not have been finalized
- prior to the call).
-____________________________________________________________________________*/
-
-PGPError PGPPublicKeyVerifySignature( PGPPublicKeyContextRef ref,
- PGPHashContextRef hashContext, void const *signature,
- PGPSize signatureSize );
-
-/*____________________________________________________________________________
- Verify a signature on a low-level buffer. Returns kPGPError_NOErr
- correct verification, else an error code. Not valid with
- kPGPPublicKeyMessageFormat_PGP contexts.
-____________________________________________________________________________*/
-
-PGPError PGPPublicKeyVerifyRaw( PGPPublicKeyContextRef ref,
- void const *signedData, PGPSize signedDataSize,
- void const *signature, PGPSize signatureSize );
-
-/*____________________________________________________________________________
- Private-key operations
-
- Return a context for private-key operations based on the specified
- key (which must have a private part). The specified message
- format is used for all operations with this context. Unlocks key
- data using passphrase.
-____________________________________________________________________________*/
-
-PGPError PGPNewPrivateKeyContext( PGPKeyDBObjRef privateKeyDBObjRef,
- PGPPublicKeyMessageFormat messageFormat,
- PGPPrivateKeyContextRef *outRef,
- PGPOptionListRef firstOption, ...);
-
-/*____________________________________________________________________________
- Dispose of a private-key context. All sensitive data is wiped before
- being deleted.
-____________________________________________________________________________*/
-
-PGPError PGPFreePrivateKeyContext( PGPPrivateKeyContextRef ref );
-
-/*____________________________________________________________________________
- Determine maximum sizes for inputs and outputs.
-____________________________________________________________________________*/
-
-PGPError PGPGetPrivateKeyOperationSizes( PGPPrivateKeyContextRef ref,
- PGPSize *maxDecryptedBufferSize,
- PGPSize *maxEncryptedBufferSize,
- PGPSize *maxSignatureSize);
-
-/*____________________________________________________________________________
- Decrypt one block of data. Output buffer must be of size at least
- maxDecryptedBufferSize from PGPGetPrivateKeyDecryptionSize.
- outSize is a return parameter. For some formatting modes the actual
- output size may be less than the maximum possible.
-____________________________________________________________________________*/
-
-PGPError PGPPrivateKeyDecrypt( PGPPrivateKeyContextRef ref, void const *in,
- PGPSize inSize, void *out, PGPSize *outSize );
-
-/*____________________________________________________________________________
- Sign a message hash. Output signature buffer must be of size at
- least maxSignatureSize from PGPGetPrivateKeyDecryptionSize.
- signatureSize is a return parameter. For some formatting modes
- the actual signature size may be less than the maximum possible.
- The message hash is finalized and freed by this call (and should
- not have been finalized prior to the call).
-____________________________________________________________________________*/
-
-PGPError PGPPrivateKeySign( PGPPrivateKeyContextRef ref,
- PGPHashContextRef hashContext, void *signature,
- PGPSize *signatureSize );
-
-/*____________________________________________________________________________
- Sign a low level signedData buffer. Output signature buffer must be
- of size at least maxSignatureSize from PGPGetPrivateKeyDecryptionSize.
- signatureSize is a return parameter. Not valid with
- kPGPPublicKeyMessageFormat_PGP contexts.
-____________________________________________________________________________*/
-
-PGPError PGPPrivateKeySignRaw( PGPPrivateKeyContextRef ref,
- void const *signedData, PGPSize signedDataSize,
- void *signature, PGPSize *signatureSize );
-
-/*____________________________________________________________________________
- Miscellaneous operations
-____________________________________________________________________________*/
-
-/*____________________________________________________________________________
- Given the size of a prime modulus in bits, this returns an appropriate
- size for an exponent in bits, such that the work factor to find a
- discrete log modulo the modulus is approximately equal to half the
- length of the exponent. This makes the exponent an appropriate size
- for a subgroup in a discrete log signature scheme. For encryption
- schemes, where decryption attacks can be stealthy and undetected, we
- use 3/2 times the returned exponent size.
-____________________________________________________________________________*/
-
-PGPError PGPDiscreteLogExponentBits( PGPUInt32 modulusBits,
- PGPUInt32 *exponentBits );
-
-
-/*____________________________________________________________________________
- Low level Function used for verifying FIPS 186-2 DSA signatures
- using P, Q, G, Y key values.
-____________________________________________________________________________*/
-
-PGPError PGPDSAKeyVerifyRaw(
- PGPContextRef context,
- PGPByte const* P,
- PGPSize PLen,
- PGPByte const* Q,
- PGPSize QLen,
- PGPByte const* G,
- PGPSize GLen,
- PGPByte const* Y,
- PGPSize YLen,
- PGPByte const* sig,
- PGPSize sigLen,
- PGPByte const * hash,
- PGPSize hashLen);
-
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpPublicKey_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpRandomPool.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpRandomPool.h
deleted file mode 100644
index b965b498d3..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpRandomPool.h
+++ /dev/null
@@ -1,46 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpRandomPool.h,v 1.7 2002/08/06 20:11:16 dallen Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpRandomPool_h /* [ */
-#define Included_pgpRandomPool_h
-
-#include "pgpBase.h"
-#include "pflTypes.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-PGPError PGPSetRandSeedFile( PFLFileSpecRef randSeedFile );
-
-PGPUInt32 PGPGlobalRandomPoolAddKeystroke( PGPInt32 event);
-PGPUInt32 PGPGlobalRandomPoolMouseMoved(void);
-PGPError PGPGlobalRandomPoolAddSystemState(void);
-PGPBoolean PGPGlobalRandomPoolHasIntelRNG(void);
-
-/* Extra functions for entropy estimation */
-PGPUInt32 PGPGlobalRandomPoolGetEntropy( void );
-PGPUInt32 PGPGlobalRandomPoolGetSize( void );
-PGPUInt32 PGPGlobalRandomPoolGetMinimumEntropy( void );
-PGPBoolean PGPGlobalRandomPoolHasMinimumEntropy( void );
-
-
-#if PGP_DEPRECATED
-PGPUInt32 PGPGlobalRandomPoolAddMouse( PGPUInt32 x, PGPUInt32 y);
-#endif
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpRandomPool_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpReconstruct.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpReconstruct.h
deleted file mode 100644
index 756a19619e..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpReconstruct.h
+++ /dev/null
@@ -1,117 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpReconstruct.h,v 1.1 2003/12/29 08:12:20 wprice Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpReconstruct_h /* [ */
-#define Included_pgpReconstruct_h
-
-#include "pgpPubTypes.h"
-#include "pgpKeyServer.h"
-
-#define kPGPRecon_NumShares 5
-#define kPGPRecon_Threshold 3
-#define kPGPRecon_MaxPromptLen ( 96 - 1 )
-#define kPGPRecon_MaxURLLen ( 256 - 1 )
-#define kPGPRecon_MaxPassLen ( 256 - 1 )
-#define kPGPRecon_MaxUserNameLen ( 128 - 1 )
-#define kPGPRecon_MaxPasswordLen ( 128 - 1 )
-
-
-typedef struct PGPReconContext * PGPReconContextRef;
-
-#define kInvalidPGPReconContextRef ((PGPReconContextRef) NULL)
-#define PGPReconContextRefIsValid( ref ) ( (ref) != kInvalidPGPReconContextRef )
-
-typedef char PGPReconPrompts[kPGPRecon_NumShares][kPGPRecon_MaxPromptLen + 1];
-
-typedef char PGPReconPasses[kPGPRecon_NumShares][kPGPRecon_MaxPassLen + 1];
-
-typedef PGPError (*PGPReconstructEventHandler)(PGPContextRef recon,
- PGPEvent *event, PGPUserValue userValue);
-
-/* inAuthUser and inAuthPass are not needed if the server class
- is kPGPKeyServerClass_PGP. */
- PGPError
-PGPNewReconstruct(
- PGPKeyDBObjRef inTargetKey,
- PGPUTF8 *inAuthUser, /* can be NULL */
- PGPUTF8 *inAuthPass, /* can be NULL */
- PGPReconstructEventHandler inHandler,
- PGPUserValue inUserValue,
- PGPReconContextRef *outRef );
-
-/* This is only needed if you have to change the event handler after
- allocating the PGPReconContextRef */
- PGPError
-PGPSetReconstructionEventHandler(
- PGPReconContextRef reconRef,
- PGPReconstructEventHandler inHandler,
- PGPUserValue inUserValue );
-
-
-/* I don't think it makes sense to support split keys for reconstruction,
- so we only take a passphrase below */
- PGPError
-PGPMakeReconstruction(
- PGPReconContextRef reconRef,
- PGPReconPrompts inPromptInfo,
- PGPReconPasses inPassInfo,
- PGPUTF8 *inPassphrase );
-
- PGPError
-PGPGetReconstruction(
- PGPReconContextRef reconRef,
- PGPByte **reconData, /* must be freed by caller */
- PGPSize *reconDataSize );
-
- PGPError
-PGPSendReconstruction(
- PGPReconContextRef reconRef );
-
- PGPError
-PGPGetReconstructionPrompts(
- PGPReconContextRef reconRef,
- PGPReconPrompts outPromptInfo );
-
- PGPError
-PGPGetReconstructionData(
- PGPReconContextRef reconRef,
- PGPReconPasses inPassInfo,
- PGPByte **outReconData, /* must be freed by caller */
- PGPSize *outReconSize );
-
-/* Reconstructed private key will be returned in
- outReconstructedKey if successful. The imported
- key will have no passphrase and thus the user must
- then be forced to choose a new passphrase. */
- PGPError
-PGPReconstruct(
- PGPReconContextRef reconRef,
- PGPReconPasses inPassInfo,
- PGPByte *inReconData,
- PGPSize inReconDataSize,
- PGPKeyDBRef *outReconstructedKey );
-
- PGPError
-PGPFreeReconstruct(
- PGPReconContextRef reconRef );
-
- PGPError
-PGPSetReconstructionServerURL(
- PGPReconContextRef reconRef,
- PGPUTF8 *pszServerURL,
- PGPKeyServerClass dwServerType );
-
-#endif /* ] Included_pgpReconstruct_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpSECSH.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpSECSH.h
deleted file mode 100644
index 4a964f40ed..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpSECSH.h
+++ /dev/null
@@ -1,308 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpSECSH.h,v 1.5 2002/08/06 20:11:16 dallen Exp $
-____________________________________________________________________________*/
-#ifndef Included_PGPsecsh_h /* [ */
-#define Included_PGPsecsh_h
-
-#include "pgpPubTypes.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-
-/* Message Types */
-#define kPGPsecsh_Msg_None 0
-#define kPGPsecsh_Msg_Disconnect 1
-#define kPGPsecsh_SMsg_PublicKey 2
-#define kPGPsecsh_CMsg_SessionKey 3
-#define kPGPsecsh_CMsg_User 4
-#define kPGPsecsh_CMsg_AuthRHosts 5
-#define kPGPsecsh_CMsg_AuthRSA 6
-#define kPGPsecsh_SMsg_AuthRSAChallenge 7
-#define kPGPsecsh_CMsg_AuthRSAResponse 8
-#define kPGPsecsh_CMsg_AuthRSAPassword 9
-#define kPGPsecsh_CMsg_RequestPTY 10
-#define kPGPsecsh_CMsg_WindowSize 11
-#define kPGPsecsh_CMsg_ExecShell 12
-#define kPGPsecsh_CMsg_ExecCommand 13
-#define kPGPsecsh_SMsg_Success 14
-#define kPGPsecsh_SMsg_Failure 15
-#define kPGPsecsh_CMsg_StdinData 16
-#define kPGPsecsh_SMsg_StdoutData 17
-#define kPGPsecsh_SMsg_StderrData 18
-#define kPGPsecsh_CMsg_EOF 19
-#define kPGPsecsh_SMsg_ExitStatus 20
-#define kPGPsecsh_Msg_ChannelOpenConfirm 21
-#define kPGPsecsh_Msg_ChannelOpenFailure 22
-#define kPGPsecsh_Msg_ChannelData 23
-#define kPGPsecsh_Msg_ChannelClose 24
-#define kPGPsecsh_Msg_ChannelCloseConfirm 25
-#define kPGPsecsh_SMsg_X11Open 27
-#define kPGPsecsh_CMsg_PortForwardRequest 28
-#define kPGPsecsh_Msg_PortOpen 29
-#define kPGPsecsh_CMsg_AgentRequestForwarding 30
-#define kPGPsecsh_SMsg_AgentOpen 31
-#define kPGPsecsh_Msg_Ignore 32
-#define kPGPsecsh_CMsg_ExitConfirm 33
-#define kPGPsecsh_CMsg_X11RequestForwarding 34
-#define kPGPsecsh_CMsg_AuthRHostsRSA 35
-#define kPGPsecsh_SMsg_Debug 36
-#define kPGPsecsh_CMsg_RequestCompression 37
-#define kPGPsecsh_CMsg_MaxPacketSize 38
-#define kPGPsecsh_CMsg_AuthTIS 39
-#define kPGPsecsh_SMsg_AuthTISChallenge 40
-#define kPGPsecsh_CMsg_AuthTISResponse 41
-#define kPGPsecsh_CMsg_AuthKerberos 42
-#define kPGPsecsh_SMsg_AuthKerberosResponse 43
-#define kPGPsecsh_CMsg_HaveKerberosTgt 44
-
-
-typedef struct PGPsecshContext * PGPsecshContextRef;
-typedef const struct PGPsecshContext * PGPsecshConstContextRef;
-
-#define kInvalidPGPsecshContextRef ((PGPsecshContextRef) NULL)
-#define PGPsecshContextRefIsValid( ref ) ( (ref) != kInvalidPGPsecshContextRef )
-
-typedef struct PGPsecshSession * PGPsecshSessionRef;
-typedef const struct PGPsecshSession * PGPsecshConstSessionRef;
-
-#define kInvalidPGPsecshSessionRef ((PGPsecshSessionRef) NULL)
-#define PGPsecshSessionRefIsValid( ref ) ( (ref) != kInvalidPGPsecshSessionRef )
-
-
-typedef PGPFlags PGPsecshFlags;
-#define kPGPsecshFlags_ServerSide 0x01
-#define kPGPsecshFlags_ClientSide 0x02
-#define kPGPsecshFlags_NonBlockingIO 0x04
-
-typedef PGPFlags PGPsecshProtocolFlags;
-#define kPGPsecshProtocolFlags_ScreenNumber 0x01
-#define kPGPsecshProtocolFlags_HostInFwdOpen 0x02
-
-enum PGPsecshProtocolState_
-{
- kPGPsecsh_IdleState = 0,
- kPGPsecsh_FatalErrorState = 1,
- kPGPsecsh_ClosedState = 2,
- kPGPsecsh_HandshakeState = 3,
- kPGPsecsh_ReadyState = 4,
-
- PGP_ENUM_FORCE( PGPsecshProtocolState_ )
-};
-PGPENUM_TYPEDEF( PGPsecshProtocolState_, PGPsecshProtocolState );
-
-enum PGPsecshAlert_
-{
- kPGPsecsh_AT_CloseNotify = 0,
- kPGPsecsh_AT_UnexpectedMessage = 10, /* FATAL */
- kPGPsecsh_AT_BadRecordCRC = 20, /* FATAL */
- kPGPsecsh_AT_DecryptionFailed = 21, /* FATAL */
- kPGPsecsh_AT_RecordOverflow = 22, /* FATAL */
- kPGPsecsh_AT_DecompressionFailure = 30, /* FATAL */
- kPGPsecsh_AT_HandshakeFailure = 40, /* FATAL */
- kPGPsecsh_AT_IDFailure = 41,
- kPGPsecsh_AT_UnsupportedVersion = 42,
- kPGPsecsh_AT_UnsupportedCert = 43,
- kPGPsecsh_AT_CertRevoked = 44,
- kPGPsecsh_AT_CertExpired = 45,
- kPGPsecsh_AT_CertUnknown = 46,
- kPGPsecsh_AT_IllegalParameter = 47, /* FATAL */
- kPGPsecsh_AT_UnknownCA = 48, /* FATAL */
- kPGPsecsh_AT_AccessDenied = 49, /* FATAL */
- kPGPsecsh_AT_DecodeError = 50, /* FATAL */
- kPGPsecsh_AT_DecryptError = 51,
- kPGPsecsh_AT_ExportRestriction = 60, /* FATAL */
- kPGPsecsh_AT_ProtocolVersion = 70, /* FATAL */
- kPGPsecsh_AT_InsufficientSecurity = 71, /* FATAL */
- kPGPsecsh_AT_InternalError = 80, /* FATAL */
- kPGPsecsh_AT_UserCancelled = 90,
- kPGPsecsh_AT_NoRenegotiation = 100,
-
- kPGPsecsh_AT_None = 255,
-
- PGP_ENUM_FORCE( PGPsecshAlert_ )
-};
-PGPENUM_TYPEDEF( PGPsecshAlert_, PGPsecshAlert );
-
-/* The Send and Receive function pointers should return
- kPGPError_SECSHWouldBlock when the socket is non-blocking and the
- call would block. The Send and Receive functions passed in will
- need to translate the platform-specific socket error in appropriate
- cases by using calls such as WSAGetLastError() on Win32. Remember
- to call PGPsecshSendQueueIdle for non-blocking sockets also if
- kPGPError_SECSHWouldBlock is returned from a send on a non-blocking
- socket. */
-
-typedef PGPInt32 (* PGPsecshReceiveProcPtr)(void *inData, void *outBuffer,
- PGPInt32 inBufferSize);
-typedef PGPInt32 (* PGPsecshSendProcPtr)(void *inData, const void *inBuffer,
- PGPInt32 inBufferLength);
-
-
-PGPError PGPNewSECSHContext( PGPContextRef context,
- PGPsecshContextRef *outRef );
-
-PGPError PGPFreeSECSHContext( PGPsecshContextRef ref );
-
-/*____________________________________________________________________________
- The following function activates or deactivates the session key cache
- for SECSH sessions. This defaults to on but can be deactivated with this
- function to force all connections to proceed through the entire
- handshake.
-____________________________________________________________________________*/
-PGPError PGPsecshSetCache( PGPsecshContextRef ref, PGPBoolean useCache );
-
-PGPError PGPsecshClearCache( PGPsecshContextRef ref );
-
-PGPError PGPNewSECSHSession( PGPsecshContextRef ref, PGPsecshSessionRef *outRef );
-
-PGPError PGPFreeSECSHSession( PGPsecshSessionRef ref );
-
-PGPError PGPCopySECSHSession( PGPsecshSessionRef ref, PGPsecshSessionRef *outRef );
-
-/* Default options are: client side, no protocol flags */
-PGPError PGPsecshSetProtocolOptions( PGPsecshSessionRef ref,
- PGPsecshFlags options,
- PGPsecshProtocolFlags pflags );
-
-
-/*____________________________________________________________________________
- The following function must be called to cleanly close a SECSH
- connection. If it is not called, the session will not be able
- to be resumed from the session cache.
-
- In the event the application determines any problem with the
- connection such as the remote key not being valid, call this
- function with dontCache set to true in order to not cache the
- session keys.
-____________________________________________________________________________*/
-PGPError PGPsecshClose( PGPsecshSessionRef ref,
- PGPBoolean dontCache );
-
-/*____________________________________________________________________________
- The following function must be called to initiate the PGPsecsh session.
- Once a SECSH session has been assigned to a socket, no data can be sent
- over that socket by the application until the handshake is completed.
- Handshake completion is indicated by completion of this call without
- error or by checking the state of the PGPsecshSession. It will be
- kPGPsecsh_ReadyState when the application layer may send and receive
- data securely.
-
- This function performs all negotiation of the SECSH connection.
-____________________________________________________________________________*/
-PGPError PGPsecshHandshake( PGPsecshSessionRef ref );
-
-/*____________________________________________________________________________
- The following function sets the local private authenticating key,
- as well as other relevant data.
-
- The passphrase, key etc. are retained in memory.
- It is an error not to specify a key.
- This function must be passed either PGPOPassphrase or PGPOPasskeyBuffer.
- inKeyObject must be in a PGP private key. inHostKeys should be a keyset
- where the host key of the remote system is found, if we are checking
- for consistency of that key. See PGPsecshGetRemoteAuthenticatedKey
- for how to learn what host key was used.
- inUserName is used to log in on the remote system.
- inHostName is used for the username on the host key if it isn't found
- on the inHostKeys keyset.
-____________________________________________________________________________*/
-PGPError PGPsecshSetLocalPrivateKey( PGPsecshSessionRef ref,
- char * inUserName,
- PGPKeyDBObjRef inKeyObject,
- char * inHostName,
- PGPKeySetRef inHostKeys,
- PGPOptionListRef firstOption, ... );
-
-/*____________________________________________________________________________
- The following function gets the authenticated remote host key after a
- successful handshake. You can call this function after a successful
- handshake to verify that the remote key is authorized to make the
- connection. The key returned will be on the inHostKeys keyset if it
- matched one of the keys there; if it is a new host key which was not
- in that keyset then it will be in a keyset & keydb of its own.
-____________________________________________________________________________*/
-PGPError PGPsecshGetRemoteAuthenticatedKey( PGPsecshSessionRef ref,
- PGPKeyDBObjRef *outKey,
- PGPKeyDBRef * outKeyDB );
-
-/*____________________________________________________________________________
- The following function exports a PGP key in SECSH format. The resulting
- line can be copied into the SECSH host file. inKey is the key to
- export, and inUserName is the name which is put at the end of the line,
- which is used only as a convenient label by SECSH software.
- The data is returned in a null-terminated allocated buffer which the
- caller should free.
-____________________________________________________________________________*/
- PGPError
-PGPsecshExportPublicKey(
- PGPKeyDBObjRef inKey,
- char * inUserName,
- char ** outBuffer,
- PGPSize * outLength);
-
-/*____________________________________________________________________________
- The following two functions process data through SECSH.
-
- It is an error to call these functions without having set a
- Read function pointer or Write function pointer.
-____________________________________________________________________________*/
-PGPError PGPsecshReceive( PGPsecshSessionRef ref,
- PGPByte * outType,
- void ** outBuffer,
- PGPSize * bufferSize );
-
-PGPError PGPsecshSend( PGPsecshSessionRef ref,
- PGPByte pktType,
- const void * inBuffer,
- PGPSize inBufferLength );
-
-/*____________________________________________________________________________
- The following two functions set the callbacks which do the actual I/O.
-
- The inData parameter is passed to the callback and may be e.g. a socket
- handle.
-____________________________________________________________________________*/
-PGPError PGPsecshSetReceiveCallback( PGPsecshSessionRef ref,
- PGPsecshReceiveProcPtr secshReceiveProc,
- void * inData );
-
-PGPError PGPsecshSetSendCallback( PGPsecshSessionRef ref,
- PGPsecshSendProcPtr secshSendProc,
- void * inData );
-
-
-/*____________________________________________________________________________
- The following function is necessary *only* on a non-blocking socket.
- If a call to PGPsecshSend returns kPGPError_SECSHWouldBlock, call
- the following function repeatedly until that error is no longer
- returned in order to make sure data is sent. Another call to
- PGPsecshSend will also call this function automatically and queue
- any new data if necessary.
-____________________________________________________________________________*/
-PGPError PGPsecshSendQueueIdle( PGPsecshSessionRef ref );
-
-PGPSize PGPsecshReceiveBufferSize( PGPsecshSessionRef ref );
-
-/*____________________________________________________________________________
- The following function gets the ID of the fatal alert which caused
- the SECSH session to abort and go into the kPGPsecsh_FatalErrorState.
-____________________________________________________________________________*/
-PGPError PGPsecshGetAlert( PGPsecshSessionRef ref, PGPsecshAlert *outAlert );
-
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_PGPsecsh_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpSKEP.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpSKEP.h
deleted file mode 100644
index 217c88e1b8..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpSKEP.h
+++ /dev/null
@@ -1,120 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpSKEP.h,v 1.1 2004/04/01 11:45:40 wprice Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpSKEP_h /* [ */
-#define Included_pgpSKEP_h
-
-#include "pgpConfig.h"
-#include "pgpBase.h"
-#include "pgpErrors.h"
-#include "pgpShare.h"
-#include "pgpKeys.h"
-#include "pgpTLS.h"
-
-typedef struct PGPskep * PGPskepRef;
-
-#define kInvalidPGPskepRef ((PGPskepRef) NULL)
-#define PGPskepRefIsValid( ref ) ( (ref) != kInvalidPGPskepRef )
-
-typedef enum _PGPskepEventType
-{
- kPGPskepEvent_NullEvent = 0, /* Nothing is happening */
- kPGPskepEvent_ListenEvent = 1, /* Listening for data */
- kPGPskepEvent_ConnectEvent = 2, /* Connection established */
- kPGPskepEvent_AuthenticateEvent = 3, /* Remote site authenticated */
- kPGPskepEvent_ProgressEvent = 4, /* Data flow progress */
- kPGPskepEvent_CloseEvent = 5, /* Connection closing */
- kPGPskepEvent_ShareEvent = 6, /* Share received */
- kPGPskepEvent_PassphraseEvent = 7 /* Passphrase needed */
-} PGPskepEventType;
-
-typedef struct _PGPskepEventAuthenticateData
-{
- PGPKeyDBObjRef remoteKey;
- const char * remoteHostname;
- const char * remoteIPAddress;
- PGPtlsCipherSuiteNum tlsCipher;
-} PGPskepEventAuthenticateData;
-
-typedef struct _PGPskepEventProgressData
-{
- PGPUInt32 bytesSoFar;
- PGPUInt32 bytesTotal;
-} PGPskepEventProgressData;
-
-typedef struct _PGPskepEventShareData
-{
- PGPShareRef shares;
-} PGPskepEventShareData;
-
-typedef struct _PGPskepEventPassphraseData
-{
- char * passphrase;
- PGPByte * passkey;
- PGPSize passkeySize;
-} PGPskepEventPassphraseData;
-
-typedef union _PGPskepEventData
-{
- PGPskepEventAuthenticateData ad;
- PGPskepEventProgressData pd;
- PGPskepEventShareData sd;
- PGPskepEventPassphraseData ppd;
-} PGPskepEventData;
-
-typedef struct _PGPskepEvent
-{
- PGPskepEventType type;
- PGPskepEventData data;
-} PGPskepEvent;
-
-typedef PGPError (*PGPskepEventHandler)(PGPskepRef skep,
- PGPskepEvent *event, PGPUserValue userValue);
-
-
-PGP_BEGIN_C_DECLARATIONS
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-PGPError PGPNewSKEP(PGPContextRef context,
- PGPtlsContextRef tlsContext,
- PGPskepRef *skep);
-
-PGPError PGPskepSetEventHandler(PGPskepRef skep,
- PGPskepEventHandler handler, PGPUserValue userValue);
-
-PGPError PGPskepSendShares(PGPskepRef skep, PGPKeyDBObjRef authKey,
- const char *passphrase, PGPShareRef shares,
- const char *destSocketAddress);
-
-PGPError PGPskepReceiveShares(PGPskepRef skep, PGPKeyDBObjRef authKey,
- const char *passphrase);
-
-PGPError PGPskepCancel(PGPskepRef skep);
-
-PGPError PGPFreeSKEP(PGPskepRef skep);
-
-PGPContextRef PGPGetSKEPContext(PGPskepRef skep);
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpSKEP_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpShare.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpShare.h
deleted file mode 100644
index 04d6da569c..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpShare.h
+++ /dev/null
@@ -1,80 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpShare.h,v 1.1 2004/04/01 11:45:40 wprice Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpShare_h /* [ */
-#define Included_pgpShare_h
-
-#include "pgpConfig.h"
-#include "pgpBase.h"
-#include "pgpKeys.h"
-
-typedef struct PGPShare * PGPShareRef;
-
-typedef struct PGPShareID_
-{
- PGPByte data[8];
-} PGPShareID;
-
-#define kInvalidPGPShareRef ((PGPShareRef) NULL)
-#define PGPShareRefIsValid( ref ) ( (ref) != kInvalidPGPShareRef )
-
-PGP_BEGIN_C_DECLARATIONS
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-PGPError PGPCreateShares(PGPContextRef context, PGPKeyDBObjRef key,
- PGPUInt32 threshold, PGPUInt32 numShares,
- PGPShareRef *share);
-
-/* The passkey needs to be freed with PGPFreeData(passkey) */
-PGPError PGPGetPasskeyFromShares(PGPShareRef share, PGPByte **passkey,
- PGPSize *passkeySize);
-
-PGPError PGPSplitShares(PGPShareRef share, PGPUInt32 numShares,
- PGPShareRef *splitShares);
-
-/* The share objects being combined are NOT freed by this function */
-PGPError PGPCombineShares(PGPShareRef firstShare, PGPShareRef secondShare,
- PGPShareRef *combinedShares);
-
-PGPError PGPFreeShares(PGPShareRef share);
-
-PGPError PGPGetKeyIDFromShares(PGPShareRef share, PGPKeyID *id);
-
-PGPError PGPGetShareID(PGPShareRef share, PGPShareID *id);
-
-PGPUInt32 PGPGetShareThreshold(PGPShareRef share);
-
-/* This is the number of shares contained in the share object */
-PGPUInt32 PGPGetNumberOfShares(PGPShareRef share);
-
-/* The share object may contain less than the total number of shares */
-PGPUInt32 PGPGetTotalNumberOfShares(PGPShareRef share);
-
-PGPBoolean IsSamePGPShares(PGPShareRef firstShare, PGPShareRef secondShare);
-
-/* If firstID < secondID, -1 */
-/* If firstID > secondID, 1 */
-/* If firstID = secondID, 0 */
-PGPInt32 PGPCompareShareIDs(PGPShareID firstID, PGPShareID secondID);
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpShare_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpShareFile.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpShareFile.h
deleted file mode 100644
index 4a7aa3e920..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpShareFile.h
+++ /dev/null
@@ -1,95 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpShareFile.h,v 1.1 2004/04/01 11:45:40 wprice Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpShareFile_h /* [ */
-#define Included_pgpShareFile_h
-
-#include "pgpConfig.h"
-#include "pgpBase.h"
-#include "pgpErrors.h"
-#include "pgpPubTypes.h"
-#include "pflTypes.h"
-#include "pgpShare.h"
-
-typedef struct PGPShareFile * PGPShareFileRef;
-
-#define kInvalidPGPShareFileRef ((PGPShareFileRef) NULL)
-#define PGPShareFileRefIsValid( ref ) ( (ref) != kInvalidPGPShareFileRef )
-
-PGP_BEGIN_C_DECLARATIONS
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-PGPError PGPNewShareFile(PFLFileSpecRef shareFileSpec,
- PGPShareFileRef *shareFileRef);
-
-PGPError PGPFreeShareFile(PGPShareFileRef shareFileRef);
-
-/* The share object needs to be freed with PGPFreeShares(shares) */
-PGPError PGPCopySharesFromFile(PGPContextRef context,
- PGPShareFileRef shareFileRef, PGPOptionListRef optionList,
- PGPShareRef *shares);
-
-PGPError PGPCopySharesToFile(PGPContextRef context,
- PGPShareFileRef shareFileRef, PGPOptionListRef optionList,
- PGPShareRef shares);
-
-PGPError PGPGetShareFileUserID(PGPShareFileRef shareFileRef,
- PGPSize bufferSize, PGPUTF8 *userID, PGPSize *fullSize);
-
-PGPError PGPSetShareFileUserID(PGPShareFileRef shareFileRef,
- const PGPUTF8 *userID);
-
-PGPError PGPOpenShareFile(PFLFileSpecRef shareFileSpec,
- PGPShareFileRef *shareFileRef);
-
-PGPError PGPSaveShareFile(PGPShareFileRef shareFileRef);
-
-PGPError PGPGetShareFileSpec(PGPShareFileRef shareFileRef,
- PFLFileSpecRef *shareFileSpec);
-
-PGPError PGPGetShareFileShareID(PGPShareFileRef shareFileRef,
- PGPShareID *id);
-
-PGPError PGPGetShareFileOwnerKeyID(PGPShareFileRef shareFileRef,
- PGPKeyID *id);
-
-PGPError PGPSetShareFileOwnerKeyID(PGPShareFileRef shareFileRef,
- const PGPKeyID id);
-
-PGPError PGPGetShareFileOwnerFingerprint(PGPShareFileRef shareFileRef,
- PGPSize bufferSize, void *fingerprint, PGPSize *fullSize);
-
-PGPError PGPSetShareFileOwnerFingerprint(PGPShareFileRef shareFileRef,
- PGPSize bufferSize, const void *fingerprint);
-
-PGPError PGPGetShareFileSharedKeyID(PGPShareFileRef shareFileRef,
- PGPKeyID *id);
-
-PGPUInt32 PGPGetShareThresholdInFile(PGPShareFileRef shareFileRef);
-
-PGPUInt32 PGPGetNumSharesInFile(PGPShareFileRef shareFileRef);
-
-PGPBoolean IsSamePGPSharesInFiles(PGPShareFileRef firstFile,
- PGPShareFileRef secondFile);
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpShareFile_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpSockets.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpSockets.h
deleted file mode 100644
index e82ab45026..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpSockets.h
+++ /dev/null
@@ -1,464 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpSockets.h,v 1.8 2003/12/13 01:20:39 dallen Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpSockets_h /* [ */
-#define Included_pgpSockets_h
-
-#include <stdio.h>
-
-#include "pgpOptionList.h"
-#include "pgpTLS.h"
-#include "pgpErrors.h"
-
-#if PGP_UNIX
-# include <sys/types.h>
-# include <sys/socket.h>
-# include <sys/time.h> /* Needed for struct timeval */
-#if PGP_UNIX_LINUX
-# include <sys/ioctl.h> /* Need FIONREAD */
-#elif PGP_UNIX_SOLARIS || PGP_UNIX_DARWIN
-# include <sys/filio.h>
-#elif PGP_UNIX_AIX
-#include <sys/ioctl.h>
-#endif /* ! PGP_UNIX_LINUX */
-# include <netinet/in.h>
-# include <netdb.h>
-#endif
-
-#if PGP_WIN32
-# include <winsock.h>
-#endif
-
-PGP_BEGIN_C_DECLARATIONS
-
-#if PGP_UNIX
-typedef int PGPSocketRef;
-#else
-typedef SOCKET PGPSocketRef;
-#endif
-
-
-/*
- * Unix and Windows share the same Berkeley socket interface. This isn't
- * the most efficient Windows implmentation of TCP/IP, but it is
- * compatible with UNIX berkeley sockets, making cross-platform possible.
- *
- * Trying to write cross-platform win32 TCP/IP code using all the fancy
- * dancy Win32 network functions would be nearly impossible IMHO
- *
- * The Mac doesn't have the berkeley stuff, so we roll our own for all
- * of the structures.
- *
- * Start with Unix and Win32
- */
-#if PGP_UNIX || PGP_WIN32
-
-# define kInvalidPGPSocketRef ((PGPSocketRef) (~0))
-
- typedef struct hostent PGPHostEntry;
- typedef struct protoent PGPProtocolEntry;
- typedef struct servent PGPServiceEntry;
- typedef struct sockaddr_in PGPSocketAddressInternet;
- typedef struct sockaddr PGPSocketAddress;
- typedef struct in_addr PGPInternetAddress;
- typedef fd_set PGPSocketSet;
- typedef struct timeval PGPSocketsTimeValue;
-
-# define PGPSOCKETSET_CLEAR(socketRef, set) FD_CLR((int) (socketRef), (set))
-# define PGPSOCKETSET_SET(socketRef, set) FD_SET((int) (socketRef), (set))
-# define PGPSOCKETSET_ZERO(set) FD_ZERO((set))
-# define PGPSOCKETSET_ISSET(socketRef, set) FD_ISSET((int) (socketRef), (set))
-
- /* Address families */
- enum {
- kPGPAddressFamilyUnspecified = AF_UNSPEC,
- kPGPAddressFamilyInternet = AF_INET
- };
-
- /* Protocol families */
- enum {
- kPGPProtocolFamilyInternet = PF_INET
- };
-
- /* Types */
- enum {
- kPGPSocketTypeStream = SOCK_STREAM,
- kPGPSocketTypeDatagram = SOCK_DGRAM
- };
-
- /* Commands for PGPIOControlSocket */
- enum {
- kPGPSocketCommandGetUnreadData = FIONREAD
- };
-
- /* Levels for PGPGetSocketOptions and PGPSetSocketOptions */
- enum {
- kPGPSocketOptionLevelSocket = SOL_SOCKET
- };
-
- /* Options for PGPGetSocketOptions and PGPSetSocketOptions */
- enum {
- kPGPSocketOptionAcceptingConnections = SO_ACCEPTCONN,
- kPGPSocketOptionType = SO_TYPE
- };
-
- /* Protocols */
- enum {
- kPGPTCPProtocol = IPPROTO_TCP,
- kPGPUDPProtocol = IPPROTO_UDP
- };
-
- /* Send flags */
- enum {
- kPGPSendFlagNone = 0
- };
-
- /* Receive flags */
- enum {
- kPGPReceiveFlagNone = 0
- };
-
- /* Internet Addresses */
- enum {
- kPGPInternetAddressAny = INADDR_ANY
- };
-
-#endif /* PGP_UNIX || PGP_WIN32 */
-
-/*
- * Onto the Mac, where we need to create our own versions of the various
- * structures.
- */
-#if PGP_MACINTOSH
-
-# define kInvalidPGPSocketRef ((PGPSocketRef) NULL)
-
- typedef struct PGPInternetAddress {
- union {
- struct {
- PGPByte s_b1;
- PGPByte s_b2;
- PGPByte s_b3;
- PGPByte s_b4;
- } S_un_b;
- struct {
- PGPUInt16 s_w1;
- PGPUInt16 s_w2;
- } S_un_w;
- PGPUInt32 S_addr;
- } S_un;
-# define s_addr S_un.S_addr
- } PGPInternetAddress;
-
- typedef struct PGPSocketAddressInternet {
- PGPInt16 sin_family;
- PGPUInt16 sin_port;
- PGPInternetAddress sin_addr;
- PGPByte sin_zero[8];
- } PGPSocketAddressInternet;
-
- typedef struct PGPSocketAddress {
- PGPUInt16 sa_family;
- PGPByte sa_data[14];
- } PGPSocketAddress;
-
- typedef struct PGPHostEntry {
- char * h_name;
- char ** unused;
- PGPInt16 h_addrtype;
- PGPInt16 h_length;
- char ** h_addr_list;
-# define h_addr h_addr_list[0]
- } PGPHostEntry;
-
- typedef struct PGPProtocolEntry {
- char * p_name;
- char ** p_aliases;
- PGPInt16 p_proto;
- } PGPProtocolEntry;
-
- typedef struct PGPServiceEntry {
- char * s_name;
- char ** s_aliases;
- PGPUInt16 s_port;
- char * s_proto;
- } PGPServiceEntry;
-
- /* Select types and defines */
-# ifndef PGPSOCKETSET_SETSIZE
-# define PGPSOCKETSET_SETSIZE 64
-# endif
-
- typedef struct PGPSocketSet {
- PGPUInt16 fd_count;
- PGPSocketRef fd_array[PGPSOCKETSET_SETSIZE];
- } PGPSocketSet;
-
-# define PGPSOCKETSET_CLEAR(socketRef, set) do { \
- PGPUInt16 __i; \
- for (__i = 0; __i < ((PGPSocketSet * (set))->fd_count; __i++) { \
- if (((PGPSocketSet *) (set))->fd_array[__i] == socketRef) { \
- while (__i < (((PGPSocketSet *) (set))->fd_count - 1)) { \
- ((PGPSocketSet *) (set))->fd_array[__i] = \
- ((PGPSocketSet *) (set))->fd_array[__i + 1]; \
- __i++; \
- } \
- ((PGPSocketSet *) (set))->fd_count--; \
- break; \
- } \
- } \
- } while (0)
-
-# define PGPSOCKETSET_SET(socketRef, set) do { \
- if (((PGPSocketSet *) (set))->fd_count < PGPSOCKETSET_SETSIZE) { \
- ((PGPSocketSet *) (set))->fd_array[((PGPSocketSet *) \
- (set))->fd_count++] = (socketRef); \
- } \
- } while (0)
-
-# define PGPSOCKETSET_ZERO(set) (((PGPSocketSet *) (set))->fd_count = 0)
-
- PGPInt32 __PGPSocketsIsSet(PGPSocketRef, PGPSocketSet *);
-
-# define PGPSOCKETSET_ISSET(socketRef, set) __PGPSocketsIsSet( \
- (socketRef),(set))
-
- typedef struct PGPSocketsTimeValue {
- PGPInt32 tv_sec; /* seconds */
- PGPInt32 tv_usec; /* and microseconds */
- } PGPSocketsTimeValue;
-
- /* Address families */
- enum {
- kPGPAddressFamilyUnspecified = 0,
- kPGPAddressFamilyInternet = 2
- };
-
- /* Protocol families */
- enum {
- kPGPProtocolFamilyInternet = kPGPAddressFamilyInternet
- };
-
- /* Types */
- enum {
- kPGPSocketTypeStream = 1,
- kPGPSocketTypeDatagram = 2
- };
-
- /* Commands for PGPIOControlSocket */
- enum {
- kPGPSocketCommandGetUnreadData = (0x40000000
- | (((long) sizeof(PGPUInt32) & 0x7F) << 16) | ('f' << 8) | 127)
- };
-
- /* Levels for PGPGetSocketOptions and PGPSetSocketOptions */
- enum {
- kPGPSocketOptionLevelSocket = 0xFFFFFFFF
- };
-
- /* Options for PGPGetSocketOptions and PGPSetSocketOptions */
- enum {
- kPGPSocketOptionAcceptingConnections = 0x00000002,
- kPGPSocketOptionType = 0x00001008
- };
-
- /* Protocols */
- enum {
- kPGPTCPProtocol = 6,
- kPGPUDPProtocol = 17
- };
-
- /* Send flags */
- enum {
- kPGPSendFlagNone = 0
- };
-
- /* Receive flags */
- enum {
- kPGPReceiveFlagNone = 0
- };
-
- /* Internet Addresses */
- enum {
- kPGPInternetAddressAny = 0x00000000
- };
-
-#endif /* PGP_MACINTOSH */
-
-/*
- * Some global things for all platforms
- */
-
-#define PGPSocketRefIsValid(ref) ((ref) != kInvalidPGPSocketRef)
-
-typedef struct PGPSocketsThreadStorage * PGPSocketsThreadStorageRef;
-# define kInvalidPGPSocketsThreadStorageRef \
- ((PGPSocketsThreadStorageRef) NULL)
-#define PGPSocketsThreadStorageRefIsValid(ref) \
- ((ref) != kInvalidPGPSocketsThreadStorageRef)
-
-extern PGPSocketAddressInternet kPGPAddressAny;
-
-/* Errors */
-#define kPGPSockets_Error -1
-
-/* Net byte ordering macros (PGP_WORDSBIGENDIAN defined by configure) */
-#if PGP_WORDSBIGENDIAN
-# define PGPHostToNetLong(x) (x)
-# define PGPHostToNetShort(x) (x)
-# define PGPNetToHostLong(x) (x)
-# define PGPNetToHostShort(x) (x)
-#else
- PGPInt32 PGPHostToNetLong(PGPInt32 x);
- PGPInt16 PGPHostToNetShort(PGPInt16 x);
- PGPInt32 PGPNetToHostLong(PGPInt32 x);
- PGPInt16 PGPNetToHostShort(PGPInt16 x);
-#endif /* PGP_WORDSBIGENDIAN */
-
-/*
- * Shared function interface (except for idle handler code)
- */
-
-/*
- * Use the idle event handler to receive periodic idle events during
- * network calls. Usually this is used only in non-preemptive multi-tasking
- * OSes to allow yielding in threads. Pre-emptive multi-tasking systems
- * should probably not use the call as it interrupts the efficient wait state
- * of threads waiting on network calls.
- *
- * Idle event handlers need to be added on a per thread basis.
- *
- * Returning an error from the idle event handler will cause the socket
- * that is blocking to close.
- *
- */
-PGPError PGPSetSocketsIdleEventHandler(
- PGPEventHandlerProcPtr inCallback,
- PGPUserValue inUserData);
-
-PGPError PGPGetSocketsIdleEventHandler(
- PGPEventHandlerProcPtr * outCallback,
- PGPUserValue * outUserData);
-
-/* Static storage creation */
-PGPError PGPSocketsCreateThreadStorage(
- PGPSocketsThreadStorageRef * outPreviousStorage);
-PGPError PGPSocketsDisposeThreadStorage(
- PGPSocketsThreadStorageRef inPreviousStorage);
-
-/* Stack based class for saving and restoring thread storage */
-#ifdef __cplusplus /* [ */
-class StPGPPreserveSocketsStorage {
-public:
- StPGPPreserveSocketsStorage() : mStorage(NULL)
- { PGPSocketsCreateThreadStorage(&mStorage); }
- ~StPGPPreserveSocketsStorage()
- { PGPSocketsDisposeThreadStorage(mStorage); }
-
-protected:
- PGPSocketsThreadStorageRef mStorage;
-};
-#endif /* ] __cplusplus */
-
-
-/* Initialization and termination */
-PGPError PGPSocketsInit(void);
-void PGPSocketsCleanup(void);
-
-/* Socket creation and destruction */
-PGPSocketRef PGPOpenSocket(PGPInt32 inAddressFamily, PGPInt32 inSocketType,
- PGPInt32 inSocketProtocol);
-PGPInt32 PGPCloseSocket(PGPSocketRef inSocketRef);
-
-/* Endpoint binding */
-PGPInt32 PGPBindSocket(PGPSocketRef inSocketRef,
- const PGPSocketAddress * inAddress,
- PGPInt32 inAddressLength);
-PGPInt32 PGPConnect(PGPSocketRef inSocketRef,
- const PGPSocketAddress * inServerAddress,
- PGPInt32 inAddressLength);
-
-/* Send functions */
-PGPInt32 PGPSend(PGPSocketRef inSocketRef, const void * inBuffer,
- PGPInt32 inBufferLength, PGPInt32 inFlags);
-PGPInt32 PGPWrite(PGPSocketRef inSocketRef, const void * inBuffer,
- PGPInt32 inBufferLength);
-PGPInt32 PGPSendTo(PGPSocketRef inSocketRef, const void * inBuffer,
- PGPInt32 inBufferLength, PGPInt32 inFlags,
- PGPSocketAddress * inAddress,
- PGPInt32 inAddressLength);
-
-/* Receive functions */
-PGPInt32 PGPReceive(PGPSocketRef inSocketRef, void * outBuffer,
- PGPInt32 inBufferSize, PGPInt32 inFlags);
-PGPInt32 PGPRead(PGPSocketRef inSocketRef, void * outBuffer,
- PGPInt32 inBufferSize);
-PGPInt32 PGPReceiveFrom(PGPSocketRef inSocketRef, void * outBuffer,
- PGPInt32 inBufferSize, PGPInt32 inFlags,
- PGPSocketAddress * outAddress,
- PGPInt32 * ioAddressLength);
-
-/* Server functions */
-PGPInt32 PGPListen(PGPSocketRef inSocketRef, PGPInt32 inMaxBacklog);
-PGPSocketRef PGPAccept(PGPSocketRef inSocketRef,
- PGPSocketAddress * outAddress,
- PGPInt32 * ioAddressLength);
-
-/* Select */
-/* Note that inNumSetCount is not used under Mac and Windows */
-PGPInt32 PGPSelect(PGPInt32 inNumSetCount,
- PGPSocketSet * ioReadSet,
- PGPSocketSet * ioWriteSet,
- PGPSocketSet * ioErrorSet,
- const PGPSocketsTimeValue * inTimeout);
-
-/* DNS and protocol services */
-PGPHostEntry * PGPGetHostByName(const PGPChar8 * inName);
-PGPHostEntry * PGPGetHostByAddress(const PGPChar8 * inAddress,
- PGPInt32 inLength,
- PGPInt32 inType);
-PGPInt32 PGPGetHostName(PGPChar8 * outName, PGPInt32 inNameLength);
-PGPProtocolEntry * PGPGetProtocolByName(const PGPChar8 * inName);
-PGPProtocolEntry * PGPGetProtocolByNumber(PGPInt32 inNumber);
-PGPServiceEntry * PGPGetServiceByName(const PGPChar8 * inName,
- const PGPChar8 * inProtocol);
-PGPServiceEntry * PGPGetServiceByPort(PGPInt32 inPort,
- const PGPChar8 * inProtocol);
-
-/* Error reporting */
-PGPError PGPGetLastSocketsError(void);
-
-/* Utilities */
-PGPInt32 PGPGetSocketName(PGPSocketRef inSocketRef,
- PGPSocketAddress * outName,
- PGPInt32 * ioNameLength);
-PGPInt32 PGPGetPeerName(PGPSocketRef inSocketRef,
- PGPSocketAddress * outName,
- PGPInt32 * ioNameLength);
-PGPUInt32 PGPDottedToInternetAddress(const PGPChar8 * inAddress);
-PGPChar8 * PGPInternetAddressToDottedString(PGPInternetAddress inAddress);
-
-/* Control and options */
-PGPInt32 PGPIOControlSocket(PGPSocketRef inSocketRef,
- PGPInt32 inCommand, PGPUInt32 * ioParam);
-PGPInt32 PGPGetSocketOptions(PGPSocketRef inSocketRef, PGPInt32 inLevel,
- PGPInt32 inOptionName,
- PGPChar8 * outOptionValue,
- PGPInt32 * ioOptionLength);
-PGPInt32 PGPSetSocketOptions(PGPSocketRef inSocketRef, PGPInt32 inLevel,
- PGPInt32 inOptionName,
- const PGPChar8 * inOptionValue,
- PGPInt32 inOptionLength);
-
-/* TLS */
-PGPError PGPSocketsEstablishTLSSession(PGPSocketRef inSocketRef,
- PGPtlsSessionRef inTLSSession);
-
-
-PGP_END_C_DECLARATIONS
-
-#endif /* Included_pgpSockets_h */
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpSymmetricCipher.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpSymmetricCipher.h
deleted file mode 100644
index 61a700e33e..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpSymmetricCipher.h
+++ /dev/null
@@ -1,114 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpSymmetricCipher.h,v 1.7 2003/10/07 01:29:44 ajivsov Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpSymmetricCipher_h /* [ */
-#define Included_pgpSymmetricCipher_h
-
-#include "pgpPubTypes.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- Create a new cipher of the specified algorithm. The cipher cannot be used
- until PGPInitSymmetricCipher() has been called.
-
- If the algorithm is not available then kPGPError_AlgorithmNotAvailable is
- returned.
-____________________________________________________________________________*/
-
-PGPError PGPNewSymmetricCipherContext( PGPContextRef context,
- PGPCipherAlgorithm algorithm,
- PGPSymmetricCipherContextRef *outRef );
-
-/*____________________________________________________________________________
- Disposal clears all data in memory before releasing it.
-____________________________________________________________________________*/
-
-PGPError PGPFreeSymmetricCipherContext( PGPSymmetricCipherContextRef ref );
-
-/*____________________________________________________________________________
- Make an exact copy of the cipher, including the key.
-____________________________________________________________________________*/
-
-PGPError PGPCopySymmetricCipherContext( PGPSymmetricCipherContextRef ref,
- PGPSymmetricCipherContextRef *outRef );
-
-/*____________________________________________________________________________
- The key must be set before using; a cipher can be repeatedly reset and
- reused with different keys to avoid having to create and destroy new
- contexts each time (and it's also cryptographically better not to reuse
- a key).
- Key size is implicit based on algorithm. 'key' is *copied*. Caller
- may want to destroy the original after passing it in.
-____________________________________________________________________________*/
-
-PGPError PGPInitSymmetricCipher( PGPSymmetricCipherContextRef ref,
- const void *key );
-
-/*____________________________________________________________________________
- Wipe any sensitive data in the cipher. Cipher remains alive, but
- key must be set before any data is encrypted.
-____________________________________________________________________________*/
-
-PGPError PGPWipeSymmetricCipher( PGPSymmetricCipherContextRef ref );
-
-/*____________________________________________________________________________
- "Wash" the symmetric cipher
-____________________________________________________________________________*/
-
-PGPError PGPWashSymmetricCipher( PGPSymmetricCipherContextRef ref,
- void const *buf, PGPSize len);
-
-/*____________________________________________________________________________
- Encrypt or decrypt one "block" of data. The block size is determined
- by the cipher (see PGPGetSymmetricCipherSizes()).
-____________________________________________________________________________*/
-
-PGPError PGPSymmetricCipherEncrypt( PGPSymmetricCipherContextRef ref,
- const void *in, void *out );
-
-PGPError PGPSymmetricCipherDecrypt( PGPSymmetricCipherContextRef ref,
- const void *in, void *out );
-
-/*____________________________________________________________________________
- Determine key and block size for specified algorithm. Stateless routine
- does not need a context.
-____________________________________________________________________________*/
-PGPError PGPGetSymmetricCipherSizes( PGPSymmetricCipherContextRef ref,
- PGPSize *keySize, PGPSize *blockSize );
-
-/*____________________________________________________________________________
- * This function integrates stream ciphers into framework of block API.
- * To encrypt/decrypt data, the caller works with stream cipher in ECB block
- * mode and calls this function before and after the last block.
- * There is a feedback between the previous block and the current
- * block for stream ciphers, so ECB for stream ciphers is similiar to CBC
- * with fixed IV for block ciphers.
- *
- * To indicate the real size of input data the caller must call this function
- * with 'size'=0xffffffff before the last block to save a state and then
- * call this function again after the last block was encrypted/decrypted
- * with the 'size' set to the real number of bytes in the buffer. This
- * operation is similiar to padding for block ciphers.
-____________________________________________________________________________*/
-PGPError PGPSymmetricCipherRollback( PGPSymmetricCipherContextRef ref,
- PGPSize size );
-
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpSymmetricCipher_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpTLS.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpTLS.h
deleted file mode 100644
index f901b1b0db..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpTLS.h
+++ /dev/null
@@ -1,336 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpTLS.h,v 1.13 2004/04/06 05:00:58 wprice Exp $
-____________________________________________________________________________*/
-#ifndef Included_PGPtls_h /* [ */
-#define Included_PGPtls_h
-
-#include "pgpPubTypes.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-
-typedef struct PGPtlsContext * PGPtlsContextRef;
-typedef const struct PGPtlsContext * PGPtlsConstContextRef;
-
-#define kInvalidPGPtlsContextRef ((PGPtlsContextRef) NULL)
-#define PGPtlsContextRefIsValid( ref ) ( (ref) != kInvalidPGPtlsContextRef )
-
-typedef struct PGPtlsSession * PGPtlsSessionRef;
-typedef const struct PGPtlsSession * PGPtlsConstSessionRef;
-
-#define kInvalidPGPtlsSessionRef ((PGPtlsSessionRef) NULL)
-#define PGPtlsSessionRefIsValid( ref ) ( (ref) != kInvalidPGPtlsSessionRef )
-
-
-typedef PGPFlags PGPtlsFlags;
-#define kPGPtlsFlags_ServerSide 0x01
-#define kPGPtlsFlags_ClientSide 0x02
-#define kPGPtlsFlags_RequestClientCert 0x04
-#define kPGPtlsFlags_NonBlockingIO 0x08
-
-enum PGPtlsCipherSuiteNum_
-{
- kPGPtls_TLS_NULL_WITH_NULL_NULL = 0,
- kPGPtls_TLS_PGP_DHE_DSS_WITH_CAST_CBC_SHA = 1,
- kPGPtls_TLS_PGP_DHE_RSA_WITH_CAST_CBC_SHA = 2,
- kPGPtls_TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA = 3,
- kPGPtls_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA = 4,
- kPGPtls_TLS_RSA_WITH_3DES_EDE_CBC_SHA = 5,
- kPGPtls_TLS_RSA_WITH_IDEA_CBC_SHA = 6,
- kPGPtls_TLS_PGP_RSA_WITH_CAST_CBC_SHA = 7,
- kPGPtls_TLS_PGP_DHE_DSS_WITH_NULL_SHA = 8,
- kPGPtls_TLS_DHE_DSS_WITH_NULL_SHA = 9,
- kPGPtls_TLS_RSA_WITH_ARC4_128_SHA = 10,
-
- kPGPtls_TLS_RSA_WITH_AES_128_CBC_SHA = 11,
- kPGPtls_TLS_DHE_DSS_WITH_AES_128_CBC_SHA = 12,
- kPGPtls_TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 13,
-
- kPGPtls_TLS_RSA_WITH_AES_256_CBC_SHA = 15,
- kPGPtls_TLS_DHE_DSS_WITH_AES_256_CBC_SHA = 16,
- kPGPtls_TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 17,
-
- PGP_ENUM_FORCE( PGPtlsCipherSuiteNum_ )
-};
-PGPENUM_TYPEDEF( PGPtlsCipherSuiteNum_, PGPtlsCipherSuiteNum );
-
-enum PGPtlsProtocolState_
-{
- kPGPtls_IdleState = 0,
- kPGPtls_FatalErrorState = 1,
- kPGPtls_ClosedState = 2,
- kPGPtls_HandshakeState = 3,
- kPGPtls_ReadyState = 4,
-
- PGP_ENUM_FORCE( PGPtlsProtocolState_ )
-};
-PGPENUM_TYPEDEF( PGPtlsProtocolState_, PGPtlsProtocolState );
-
-enum PGPtlsPrime_
-{
- kPGPtls_DHPrime1024 = 0,
- kPGPtls_DHPrime1536 = 1,
- kPGPtls_DHPrime2048 = 2,
- kPGPtls_DHPrime3072 = 3,
- kPGPtls_DHPrime4096 = 4,
-
- PGP_ENUM_FORCE( PGPtlsPrime_ )
-};
-PGPENUM_TYPEDEF( PGPtlsPrime_, PGPtlsPrime );
-
-enum PGPtlsAlert_
-{
- kPGPtls_AT_CloseNotify = 0,
- kPGPtls_AT_UnexpectedMessage = 10, /* FATAL */
- kPGPtls_AT_BadRecordMAC = 20, /* FATAL */
- kPGPtls_AT_DecryptionFailed = 21, /* FATAL */
- kPGPtls_AT_RecordOverflow = 22, /* FATAL */
- kPGPtls_AT_DecompressionFailure = 30, /* FATAL */
- kPGPtls_AT_HandshakeFailure = 40, /* FATAL */
- kPGPtls_AT_NoCertificate = 41, /* SSL3 */
- kPGPtls_AT_BadCertificate = 42,
- kPGPtls_AT_UnsupportedCert = 43,
- kPGPtls_AT_CertRevoked = 44,
- kPGPtls_AT_CertExpired = 45,
- kPGPtls_AT_CertUnknown = 46,
- kPGPtls_AT_IllegalParameter = 47, /* FATAL */
- kPGPtls_AT_UnknownCA = 48, /* FATAL */
- kPGPtls_AT_AccessDenied = 49, /* FATAL */
- kPGPtls_AT_DecodeError = 50, /* FATAL */
- kPGPtls_AT_DecryptError = 51,
- kPGPtls_AT_ExportRestriction = 60, /* FATAL */
- kPGPtls_AT_ProtocolVersion = 70, /* FATAL */
- kPGPtls_AT_InsufficientSecurity = 71, /* FATAL */
- kPGPtls_AT_InternalError = 80, /* FATAL */
- kPGPtls_AT_UserCancelled = 90,
- kPGPtls_AT_NoRenegotiation = 100,
-
- kPGPtls_AT_None = 255,
-
- PGP_ENUM_FORCE( PGPtlsAlert_ )
-};
-PGPENUM_TYPEDEF( PGPtlsAlert_, PGPtlsAlert );
-
-/* The Send and Receive function pointers should return
- kPGPError_TLSWouldBlock when the socket is non-blocking and the
- call would block. The Send and Receive functions passed in will
- need to translate the platform-specific socket error in appropriate
- cases by using calls such as WSAGetLastError() on Win32. Remember
- to call PGPtlsSendQueueIdle for non-blocking sockets also if
- kPGPError_TLSWouldBlock is returned from a send on a non-blocking
- socket. */
-
-typedef PGPInt32 (* PGPtlsReceiveProcPtr)(void *inData, void *outBuffer,
- PGPInt32 outBufferSize);
-typedef PGPInt32 (* PGPtlsSendProcPtr)(void *inData, const void *inBuffer,
- PGPInt32 inBufferLength);
-typedef PGPInt32 (* PGPtlsPeekProcPtr)(void *inData, void *outBuffer,
- PGPInt32 outBufferSize);
-
-PGPError PGPNewTLSContext( PGPContextRef context,
- PGPtlsContextRef *outRef );
-
-PGPError PGPFreeTLSContext( PGPtlsContextRef ref );
-
-/*____________________________________________________________________________
- The following function activates or deactivates the session key cache
- for TLS sessions. This defaults to on but can be deactivated with this
- function to force all connections to proceed through the entire
- handshake.
-____________________________________________________________________________*/
-PGPError PGPtlsSetCache( PGPtlsContextRef ref, PGPBoolean useCache );
-
-PGPError PGPtlsClearCache( PGPtlsContextRef ref );
-
-PGPError PGPNewTLSSession( PGPtlsContextRef ref, PGPtlsSessionRef *outRef );
-
-PGPError PGPFreeTLSSession( PGPtlsSessionRef ref );
-
-PGPError PGPCopyTLSSession( PGPtlsSessionRef ref, PGPtlsSessionRef *outRef );
-
-/* Default options are client side and no client cert request */
-PGPError PGPtlsSetProtocolOptions( PGPtlsSessionRef ref,
- PGPtlsFlags options );
-
-
-/*____________________________________________________________________________
- The following function must be called to cleanly close a TLS
- connection. If it is not called, the session will not be able
- to be resumed from the session cache.
-
- In the event the application determines any problem with the
- connection such as the remote key not being valid, call this
- function with dontCache set to true in order to not cache the
- session keys.
-____________________________________________________________________________*/
-PGPError PGPtlsClose( PGPtlsSessionRef ref,
- PGPBoolean dontCache );
-
-/*____________________________________________________________________________
- The following function must be called to identify cached TLS session.
-
- During a handshake resulting in reused TLS sessions no certificate exchange
- is taking place, so certificate or certificate chain cannot be queried by
- a call to PGPtlsGetRemoteAuthenticatedKey(). Remote peer's authentication
- keys are assumed to be authorized by the application when it earlier placed
- a session into a cache by calling PGPtlsClose(session, FALSE), so the "TRUE"
- return value means "already authorized session".
-
- There is no need to call this function if no caching is done, for example,
- if PGPtlsClose(session, FALSE) is never called or cache is
- disabled / cleared in PGPtlsContextRef.
-____________________________________________________________________________*/
-PGPError PGPtlsIsReusedSession( PGPtlsSessionRef ref, PGPBoolean *reused );
-
-/*____________________________________________________________________________
- The following function must be called to initiate the PGPtls session.
- Once a TLS session has been assigned to a socket, no data can be sent
- over that socket by the application until the handshake is completed.
- Handshake completion is indicated by completion of this call without
- error or by checking the state of the PGPtlsSession. It will be
- kPGPtls_ReadyState when the application layer may send and receive
- data securely.
-
- This function performs all negotiation of the TLS connection.
-____________________________________________________________________________*/
-PGPError PGPtlsHandshake( PGPtlsSessionRef ref );
-
-/*____________________________________________________________________________
- The following function should be called before PGPtlsHandshake.
- In the general case, the remoteID will be an IP address. This
- is provided to PGPtls in order to allow it to cache the current
- session and be able to look it up later. If the remoteID passed
- into a future session is the same as a previously cached session,
- PGPtls will attempt to resume the session.
-____________________________________________________________________________*/
-PGPError PGPtlsSetRemoteUniqueID( PGPtlsSessionRef ref,
- PGPUInt32 remoteID );
-
-/*____________________________________________________________________________
- The following function sets the local private authenticating key.
-
- The passphrase and key are retained in memory. By default, no
- key is specified and a client side session will return no key in the
- client key exchange message to the server.
- It is an error not to specify a key on a server side TLS session.
- This function must be passed either PGPOPassphrase or PGPOPasskeyBuffer.
- You may pass in just a PGP key, PGP w/ X.509 cert, or both -- and they
- must be the same -- the cert must be from the key. For an X.509 cert,
- the inCertChain keyset must contain the keys of all keys in the
- certificate chain for that certificate up to the root. The inCertChain
- keyset must remain valid for the lifetime of the TLS connection.
-____________________________________________________________________________*/
-PGPError PGPtlsSetLocalPrivateKey( PGPtlsSessionRef ref,
- PGPKeyDBObjRef inKeyObject,
- PGPKeySetRef inCertChain,
- PGPOptionListRef firstOption, ... );
-
-/*____________________________________________________________________________
- The following function sets the preferred cipher suite.
-
- There is no guarantee that cipher will actually be negotiated,
- but it will be attempted in preference to others.
-____________________________________________________________________________*/
-PGPError PGPtlsSetPreferredCipherSuite( PGPtlsSessionRef ref,
- PGPtlsCipherSuiteNum cipher );
-
-/*____________________________________________________________________________
- The following function sets the desired DH prime.
-
- The requested primes are drawn from a set of primes hard-coded
- into PGPtls. New primes can be added in a fully compatible
- fashion since the server sends the prime to the client, but this
- version of the API does not support passing in a desired prime. The
- default prime if this function is not called is kPGPtls_DHPrime2048.
-____________________________________________________________________________*/
-PGPError PGPtlsSetDHPrime( PGPtlsSessionRef ref,
- PGPtlsPrime prime );
-
-/*____________________________________________________________________________
- The following function gets the authenticated remote key after a
- successful handshake. You must call this function after a successful
- handshake to verify that the remote key is authorized to make the
- connection.
-____________________________________________________________________________*/
-PGPError PGPtlsGetRemoteAuthenticatedKey( PGPtlsSessionRef ref,
- PGPKeyDBObjRef *outKey,
- PGPKeyDBRef * outKeyDB );
-
-/*____________________________________________________________________________
- The following function returns the negotiated symmetric cipher.
-
- This function will return an error if called before a successful
- handshake.
-____________________________________________________________________________*/
-PGPError PGPtlsGetNegotiatedCipherSuite( PGPtlsSessionRef ref,
- PGPtlsCipherSuiteNum *outCipher );
-
-PGPError PGPtlsGetState( PGPtlsSessionRef ref,
- PGPtlsProtocolState *outState );
-
-/*____________________________________________________________________________
- The following two functions process data through TLS.
-
- It is an error to call these functions without having set a
- Read function pointer or Write function pointer. Most applications
- will never need to use these functions as the function pointers
- are automatically configured by PGPsockets, and these functions
- are automatically called by the PGPsockets implementations of
- PGPWrite and PGPRead whenever a PGPtlsSessionRef has been set for
- a given socket.
-____________________________________________________________________________*/
-PGPError PGPtlsReceive( PGPtlsSessionRef ref,
- void * outBuffer,
- PGPSize * bufferSize );
-
-PGPError PGPtlsSend( PGPtlsSessionRef ref,
- const void * inBuffer,
- PGPSize inBufferLength );
-
-PGPError PGPtlsSetReceiveCallback( PGPtlsSessionRef ref,
- PGPtlsReceiveProcPtr tlsReceiveProc,
- void * inData );
-
-PGPError PGPtlsSetSendCallback( PGPtlsSessionRef ref,
- PGPtlsSendProcPtr tlsSendProc,
- void * inData );
-
-PGPError PGPtlsSetPeekCallback( PGPtlsSessionRef ref,
- PGPtlsPeekProcPtr tlsPeekProc,
- void * inData );
-
-/*____________________________________________________________________________
- The following function is necessary *only* on a non-blocking socket.
- If a call to PGPtlsSend returns kPGPError_TLSWouldBlock, call
- the following function repeatedly until that error is no longer
- returned in order to make sure data is sent. Another call to
- PGPtlsSend will also call this function automatically and queue
- any new data if necessary.
-____________________________________________________________________________*/
-PGPError PGPtlsSendQueueIdle( PGPtlsSessionRef ref );
-
-PGPSize PGPtlsReceiveBufferSize( PGPtlsSessionRef ref );
-
-/*____________________________________________________________________________
- The following function gets the ID of the fatal alert which caused
- the TLS session to abort and go into the kPGPtls_FatalErrorState.
-____________________________________________________________________________*/
-PGPError PGPtlsGetAlert( PGPtlsSessionRef ref, PGPtlsAlert *outAlert );
-const PGPChar * PGPtlsGetAlertString( PGPtlsAlert alert );
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_PGPtls_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpUserInterface.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpUserInterface.h
deleted file mode 100644
index 210f1656f2..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpUserInterface.h
+++ /dev/null
@@ -1,284 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- This file contains the prototypes for functions which use UI to interact
- with the user.
-
- $Id: pgpUserInterface.h,v 1.21 2003/09/24 03:09:32 ajivsov Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpUserInterface_h /* [ */
-#define Included_pgpUserInterface_h
-
-#include "pgpPubTypes.h"
-#include "pgpTLS.h"
-
-#if PGP_WIN32
-#include "windows.h"
-#endif
-
-PGP_BEGIN_C_DECLARATIONS
-
-#if PGP_MACINTOSH
-#pragma options align=mac68k
-#endif
-
-enum PGPAdditionalRecipientRequestEnforcement_
-{
- kPGPARREnforcement_Invalid = 0,
- kPGPARREnforcement_None = 1,
- kPGPARREnforcement_Warn = 2,
- kPGPARREnforcement_Strict = 3,
-
- PGP_ENUM_FORCE( PGPAdditionalRecipientRequestEnforcement_ )
-};
-PGPENUM_TYPEDEF( PGPAdditionalRecipientRequestEnforcement_,
- PGPAdditionalRecipientRequestEnforcement );
-
-enum PGPRecipientSpecType_
-{
- kPGPRecipientSpecType_Invalid = 0,
- kPGPRecipientSpecType_Key = 1,
- kPGPRecipientSpecType_UserID = 2,
- kPGPRecipientSpecType_KeyID = 3,
-
- PGP_ENUM_FORCE( PGPRecipientSpecType_ )
-};
-PGPENUM_TYPEDEF( PGPRecipientSpecType_, PGPRecipientSpecType );
-
-enum PGPRecipientSpecFlags_
-{
- kPGPRecipientSpecFlags_Locked = (1UL << 0),
-
- PGP_ENUM_FORCE( PGPRecipientSpecFlags_ )
-};
-
-typedef PGPFlags PGPRecipientSpecFlags;
-
-typedef struct PGPRecipientSpec
-{
- PGPRecipientSpecType type;
- PGPRecipientSpecFlags flags;
- PGPUInt32 reserved32[3]; /* Must be zero */
-
- union
- {
- PGPKeyDBObjRef key;
- PGPChar8 userIDStr[256]; /* Null terminated string */
- PGPKeyID keyID;
- } u;
-
-} PGPRecipientSpec;
-
-typedef struct PGPKeyServerSpec
-{
- PGPKeyServerRef server;
- const PGPChar8 *serverName; /* Optional */
- const PGPChar8 *serverDomain; /* Optional */
-
-} PGPKeyServerSpec;
-
-#if PGP_MACINTOSH
-#pragma options align=reset
-#endif
-
-PGPError PGPRecipientDialog( PGPContextRef context, PGPKeyDBRef sourceKeys,
- PGPBoolean alwaysDisplayDialog, PGPKeyDBRef *recipientKeys,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPPassphraseDialog( PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPConfirmationPassphraseDialog( PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPKeyPassphraseDialog( PGPContextRef context,
- PGPKeyDBObjRef keyDBObject, PGPOptionListRef firstOption, ... );
-
-PGPError PGPSigningPassphraseDialog( PGPContextRef context,
- PGPKeyDBRef sourceKeys, PGPKeyDBObjRef *signingKey,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPDecryptionPassphraseDialog( PGPContextRef context,
- PGPKeySetRef recipientKeys, PGPUInt32 keyIDCount,
- const PGPKeyID keyIDList[], PGPKeyDBObjRef *decryptionKey,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPConventionalEncryptionPassphraseDialog( PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPConventionalDecryptionPassphraseDialog( PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPOptionsDialog( PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPCollectRandomDataDialog( PGPContextRef context,
- PGPUInt32 neededEntropyBits,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPSearchKeyServerDialog(
- PGPContextRef context,
- PGPUInt32 serverCount,
- const PGPKeyServerSpec serverList[],
- PGPtlsContextRef tlsContext,
- PGPBoolean searchAllServers,
- PGPKeyDBRef *foundKeys,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPSendToKeyServerDialog(
- PGPContextRef context,
- const PGPKeyServerSpec *server,
- PGPtlsContextRef tlsContext,
- PGPKeySetRef keysToSend,
- PGPKeySetRef *failedKeys,
- PGPOptionListRef firstOption, ... );
-
-/*
-** Returns a value in the range 0-100 which crudely estimates
-** the "quality" of a passphrase.
-*/
-
-#undef PGPEstimatePassphraseQuality
-PGPUInt32 PGPEstimatePassphraseQuality( const PGPChar8 *passphrase );
-
-/* General dialog options */
-
-#undef PGPOUIDialogPrompt
-PGPOptionListRef PGPOUIDialogPrompt( PGPContextRef context,
- const PGPChar8 *prompt );
-
-#undef PGPOUIWindowTitle
-PGPOptionListRef PGPOUIWindowTitle( PGPContextRef context,
- const PGPChar8 *title );
-
-PGPOptionListRef PGPOUIDialogOptions( PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-PGPOptionListRef PGPOUIDialogContextHelpButton(PGPContextRef context,
- PGPBoolean showDialogContextHelpButton);
-
-#if PGP_WIN32
-PGPOptionListRef PGPOUIParentWindowHandle( PGPContextRef context,
- HWND hwndParent );
-#endif
-
-/* All passphrase dialogs */
-
-/* Caller should free passphrase with PGPFreeData() */
-#undef PGPOUIOutputPassphrase
-PGPOptionListRef PGPOUIOutputPassphrase( PGPContextRef context,
- PGPChar8 **passphrase );
-
-PGPOptionListRef PGPOUIMinimumPassphraseQuality( PGPContextRef context,
- PGPUInt32 minimumPassphraseQuality );
-
-PGPOptionListRef PGPOUIMinimumPassphraseLength( PGPContextRef context,
- PGPUInt32 minimumPassphraseLength );
-
-/* Will cause the dialog to cancel if there has been no activity for x seconds */
-PGPOptionListRef PGPOUIDialogTimeout( PGPContextRef context,
- PGPUInt32 seconds);
-
-/* PGPConfirmationPassphraseDialog() options */
-
-PGPOptionListRef PGPOUIShowPassphraseQuality( PGPContextRef context,
- PGPBoolean showPassphraseQuality );
-
-/* PGPSigningPassphraseDialog() and PGPDecryptionPassphraseDialog() options */
-
-PGPOptionListRef PGPOUIDefaultKey( PGPContextRef context,
- PGPKeyDBObjRef defaultKey );
-
-PGPOptionListRef PGPOUIVerifyPassphrase( PGPContextRef context,
- PGPBoolean verifyPassphrase );
-
-PGPOptionListRef PGPOUIFindMatchingKey( PGPContextRef context,
- PGPBoolean findMatchingKey );
-
-PGPOptionListRef PGPOUITextUI( PGPContextRef context, PGPBoolean textUI );
-
-/* PGPRecipientDialog() options: */
-
-PGPOptionListRef PGPOUIRecipientList( PGPContextRef context,
- PGPUInt32 *recipientCount,
- PGPRecipientSpec **recipientList );
-
-PGPOptionListRef PGPOUIDefaultRecipients( PGPContextRef context,
- PGPUInt32 recipientCount,
- const PGPRecipientSpec recipientList[] );
-
-PGPOptionListRef PGPOUIDisplayMarginalValidity( PGPContextRef context,
- PGPBoolean displayMarginalValidity );
-
-PGPOptionListRef PGPOUIIgnoreMarginalValidity( PGPContextRef context,
- PGPBoolean ignoreMarginalValidity );
-
-PGPOptionListRef PGPOUIEnforceAdditionalRecipientRequests(
- PGPContextRef context,
- PGPAdditionalRecipientRequestEnforcement enforcement,
- PGPBoolean alwaysDisplayDialogWithARRs);
-
-/* PGPDecryptionPassphraseDialog() and PGPRecipientDialog() only: */
-
-PGPOptionListRef PGPOUIKeyServerUpdateParams(PGPContextRef context,
- PGPUInt32 serverCount,
- const PGPKeyServerSpec serverList[],
- PGPtlsContextRef tlsContext,
- PGPBoolean searchBeforeDisplay,
- PGPKeyDBRef *foundKeys,
- PGPOptionListRef firstOption, ...);
-
-/* Key server search dialog options */
-
-PGPOptionListRef PGPOUIKeyServerSearchFilter(PGPContextRef context,
- PGPFilterRef filter);
-
-PGPOptionListRef PGPOUIKeyServerSearchKey(PGPContextRef context,
- PGPKeyDBObjRef searchKeyObject);
-
-PGPOptionListRef PGPOUIKeyServerSearchKeySet(PGPContextRef context,
- PGPKeySetRef keySet);
-
-PGPOptionListRef PGPOUIKeyServerSearchKeyIDList(PGPContextRef context,
- PGPUInt32 keyIDCount, const PGPKeyID keyIDList[] );
-
-/*
-** These options are used to build the options dialog and are only
-** applicable for the PGPOptionsDialog() and PGPOUIDialogOptions() calls.
-** The "description" parameters are optional.
-*/
-#undef PGPOUICheckbox
-PGPOptionListRef PGPOUICheckbox(PGPContextRef context, PGPUInt32 itemID,
- const PGPChar8 *title, const PGPChar8 *description,
- PGPUInt32 initialValue, PGPUInt32 *resultPtr,
- PGPOptionListRef firstOption, ...);
-#undef PGPOUIPopupList
-PGPOptionListRef PGPOUIPopupList(PGPContextRef context, PGPUInt32 itemID,
- const PGPChar8 *title, const PGPChar8 *description,
- PGPUInt32 listItemCount, const PGPChar8 *listItems[],
- PGPUInt32 initialValue, PGPUInt32 *resultPtr,
- PGPOptionListRef firstOption, ...);
-
-#if PGP_DEPRECATED
-
-#include "pgpGroups.h"
-
-PGPOptionListRef PGPOUIRecipientGroups(PGPContextRef context,
- PGPGroupSetRef groupSet);
-#endif
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpUserInterface_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpUtilities.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpUtilities.h
deleted file mode 100644
index dc1ca20d62..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpUtilities.h
+++ /dev/null
@@ -1,464 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- This file contains miscellaneous utility functions needed for the PGPsdk.
-
- $Id: pgpUtilities.h,v 1.54.2.1 2004/05/05 17:02:51 vinnie Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpUtilities_h /* [ */
-#define Included_pgpUtilities_h
-
-#include <time.h>
-#include "pgpBase.h"
-#include "pflTypes.h"
-#include "pgpPubTypes.h"
-#include "pgpMemoryMgr.h"
-
-#if PGP_MACINTOSH /* [ */
-#include <Files.h>
-#elif PGP_OSX
- struct FSSpec;
-#endif /* ] PGP_MACINTOSH */
-
-#if PGP_MACINTOSH
-#pragma options align=mac68k /* [ */
-#endif
-
-enum
-{
- kPGPsdk20APIVersion = 0x01000000,
-
- kPGPsdkAPIVersion = kPGPsdk20APIVersion
-};
-
-enum PGPNotificationReason_
-{
- kPGPNotification_KeyDBChanged = 0,
- kPGPNotification_PassphraseCacheChanged = 1,
-
- PGP_ENUM_FORCE( PGPNotificationReason_ )
-};
-
-PGPENUM_TYPEDEF( PGPNotificationReason_, PGPNotificationReason );
-
-typedef PFLLanguage PGPLanguage;
-
-enum PGPLanguage_
-{
- kPGPLanguage_Default = 0,
- kPGPLanguage_English = 1,
- kPGPLanguage_Japanese = 2,
- kPGPLanguage_German = 3,
- kPGPLanguage_Spanish = 4,
-
- PGP_ENUM_FORCE( PGPLanguage_ )
-};
-
-#if PGP_MACINTOSH || PGP_OSX /* [ */
-
-#define kPGPMacFileCreator_PGPkeys 'pgpK'
-#define kPGPMacFileCreator_PGPtools 'pgpM'
-#define kPGPMacFileCreator_PGPnet 'PGPn'
-#define kPGPMacFileCreator_PGPdisk 'pgpD'
-#define kPGPMacFileCreator_PGPadmin 'PGPa'
-#define kPGPMacFileCreator_DecryptedBinary '\?\?\?\?'
-#define kPGPMacFileCreator_DecryptedText 'ttxt'
-
-#define kPGPMacFileType_ArmorFile 'TEXT'
-#define kPGPMacFileType_EncryptedData 'pgEF'
-#define kPGPMacFileType_SignedData 'pgSF'
-#define kPGPMacFileType_DetachedSig 'pgDS'
-#define kPGPMacFileType_RandomSeed 'pgRS'
-#define kPGPMacFileType_PrivRing 'pgRR'
-#define kPGPMacFileType_PubRing 'pgPR'
-#define kPGPMacFileType_Groups 'pgGR'
-#define kPGPMacFileType_NetHosts 'pgHO'
-#define kPGPMacFileType_NetRules 'pgRU'
-#define kPGPMacFileType_Preferences 'pref'
-#define kPGPMacFileType_DecryptedText 'TEXT'
-#define kPGPMacFileType_DecryptedBinary 'BINA'
-#define kPGPMacFileType_KeyShares 'pgSK'
-#define kPGPMacFileType_Exported509Keys 'pgX5'
-
-#endif /* ] PGP_MACINTOSH */
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- PGPsdk initialization
-
- Call PGPsdkXXXInit() before using that particular library.
- Call PGPsdkXXXCleanup() when you are done (but after disposing of any
- PGPContexts).
-
- You may call PGPsdkXXXInit multiple times (with no effect), but be sure
- to call the matching PGPsdkXXXCleanup() for each call to PGPsdkXXXInit().
-____________________________________________________________________________*/
-#define kPGPFlags_ForceLocalExecution 0x2
-#define kPGPFlags_SuppressCacheThread 0x4
-
-PGPError PGPsdkInit( PGPFlags options ) ;
-PGPError PGPsdkSetLanguage( PGPFileSpecRef langStringsHome, PGPLanguage lang );
-PGPError PGPsdkCleanup( void );
-
-PGPError PGPsdkNetworkLibInit( PGPFlags options );
-PGPError PGPsdkNetworkLibCleanup( void );
-
-PGPError PGPsdkUILibInit( PGPFlags options );
-PGPError PGPsdkUILibCleanup( void );
-
-PGPError PGPLoadPluginModule( PGPContextRef context,
- PGPFileSpecRef moduleFile, PGPFileSpecRef sigFile,
- PGPUInt32 *nCipher, PGPUInt32 *nHash, PGPUInt32 *nPubkey );
-
-
-/*____________________________________________________________________________
- PGPsdk version information
-
- A version in the PGPsdk is expressed as follows:
-
- Major version (1 byte)
- Minor version (1 byte)
- Bug fix revision (1 byte)
- Reserved (1 byte)
-
- example: 1.7.1 = 0x01070100
-____________________________________________________________________________*/
-
-PGPUInt32 PGPGetPGPsdkVersion( void );
-
-/*____________________________________________________________________________
- PGPsdk version string
-
- Return a C string of the form:
-
- "PGPsdk 3.0 Copyright (C) 2003 PGP Corporation
-____________________________________________________________________________*/
-
-#undef PGPGetPGPsdkVersionString
-PGPError PGPGetPGPsdkVersionString( PGPChar8 versionString[ 256 ] );
-
-/*____________________________________________________________________________
- PGPsdk API version information
-
- The API version of the PGPsdk is distinct from the externally visible
- version number. The API version is revised only when API changes are made,
- while the external version is changed whenever any code is changed, API or
- otherwise. The format of the API version is identical to the format of the
- external version. A change in the major API version implies incompatability
- with previous API versions while a change in the minor version implies API
- additions which maintain backwards compatability.
-_____________________________________________________________________________*/
-
-PGPUInt32 PGPGetPGPsdkAPIVersion( void );
-
-/*____________________________________________________________________________
- PGPsdk context manipulation
-_____________________________________________________________________________*/
-
-typedef struct PGPCustomContextInfo
-{
- PGPUInt32 sdkAPIVersion; /* Use kPGPsdkAPIVersion */
- PGPMemoryMgrRef memoryMgr;
- PGPUserValue userValue;
-
-} PGPCustomContextInfo;
-
-
-PGPError PGPNewContext( PGPUInt32 sdkAPIVersion, PGPContextRef *newContext );
-PGPError PGPNewContextCustom( const PGPCustomContextInfo *contextInfo,
- PGPContextRef *newContext );
-
-PGPError PGPFreeContext( PGPContextRef context );
-
-PGPError PGPGetContextUserValue( PGPContextRef context,
- PGPUserValue *userValue );
-PGPError PGPSetContextUserValue( PGPContextRef context,
- PGPUserValue userValue );
-
-PGPError PGPContextGetRandomBytes(PGPContextRef context,
- void *buf, PGPSize len );
-
-PGPUInt32 PGPContextReserveRandomBytes(PGPContextRef context,
- PGPUInt32 minSize );
-
-PGPMemoryMgrRef PGPPeekContextMemoryMgr( PGPContextRef context );
-
-/*____________________________________________________________________________
- PGP file management
-
- All files in PGP are represented using an opage data type PGPFileSpecRef.
- These data types are created using a fully qualified path or, on the
- Macintosh, an FSSpec. The
-____________________________________________________________________________*/
-
-#if PGP_MACINTOSH || PGP_OSX /* [ */
-
-PGPError PGPNewFileSpecFromFSSpec( PGPContextRef context, const struct FSSpec *spec,
- PGPFileSpecRef *ref );
-PGPError PGPGetFSSpecFromFileSpec( PGPFileSpecRef fileRef, struct FSSpec *spec );
-
-#endif
-
-#if ! PGP_MACINTOSH
-
-#undef PGPNewFileSpecFromFullPath
-PGPError PGPNewFileSpecFromFullPath( PGPContextRef context,
- const PGPChar8 *path, PGPFileSpecRef *ref );
-/*
-** The full path is an allocated object which needs to be deallocated with
-** PGPFreeData()
-*/
-
-#undef PGPGetFullPathFromFileSpec
-PGPError PGPGetFullPathFromFileSpec( PGPFileSpecRef fileRef,
- PGPChar8 **fullPathPtr);
-
-#endif
-
-PGPError PGPCopyFileSpec( PGPFileSpecRef fileRef, PGPFileSpecRef *ref );
-PGPError PGPFreeFileSpec( PGPFileSpecRef fileRef );
-
-#undef PGPRenameFile
-PGPError PGPRenameFile( PGPFileSpecRef fileRef, const PGPChar8 *newName );
-PGPError PGPDeleteFile( PGPFileSpecRef fileRef );
-
-/*____________________________________________________________________________
- PGP time/date functions
-____________________________________________________________________________*/
-
-PGPTime PGPGetTime(void);
-
-/* these use time_t type as returned by time() in Std C libraries */
-time_t PGPGetStdTimeFromPGPTime( PGPTime theTime );
-PGPTime PGPGetPGPTimeFromStdTime( time_t theTime );
-
-/* year, month, day may be NULL if desired */
-void PGPGetYMDFromPGPTime( PGPTime theTime, PGPUInt16 *year,
- PGPUInt16 *month, PGPUInt16 *day );
-
-#if PGP_MACINTOSH || PGP_OSX /* [ */
-
-PGPUInt32 PGPTimeToMacTime( PGPTime theTime );
-PGPTime PGPTimeFromMacTime( PGPUInt32 theTime );
-
-#endif /* ] PGP_MACINTOSH */
-
-/*____________________________________________________________________________
- MacBinary support
-
- Examine the input file to see if it's a MacBinary file. If it is
- not a MacBinary file, then the original file is unaltered.
- Otherwise, the file is converted and the original file is deleted.
-
- The resulting file is designated by 'outPGPSpec' and may have a different
- name than the original.
-
- If the file is a TEXT file, appropriate line-end conversion is done.
-
- creator and type code pointers may be
- null but otherwise contain the mac creator and type.
-
- This routine can be called on a Mac, but generally doesn't need to be.
-____________________________________________________________________________*/
-
-PGPError PGPMacBinaryToLocal( PGPFileSpecRef inSpec,
- PGPFileSpecRef * outSpec, PGPUInt32 * macCreator,
- PGPUInt32 * macTypeCode );
-
-/*____________________________________________________________________________
- Notification callbacks on PGPKeyDB changes from SDK Service
-_____________________________________________________________________________*/
-
-typedef void (*PGPNotificationHandlerProc)( PGPUserValue userValue,
- PGPNotificationReason reason,
- PGPUInt32 param1,
- PGPUInt32 param2 );
-
-PGPError PGPSetNotificationCallback( PGPNotificationHandlerProc proc,
- PGPUserValue userValue );
-
-/*____________________________________________________________________________
-Disk and File Wipe Pattern Support
-____________________________________________________________________________*/
-
-PGPError PGPNewWipePatternContext ( PGPContextRef context,
- PGPInt32 numPasses,
- PGPWipePatternContextRef *outRef);
-
-/* fill a 1024 byte, long word alligned buffer with a pattern to wipe with */
-PGPError PGPWipePatternNext( PGPWipePatternContextRef ref,
- void * buffer, PGPSize bufferSize);
-
-PGPError PGPWipePatternRewind( PGPWipePatternContextRef wipeRef);
-
-PGPError PGPFreeWipePatternContext(PGPWipePatternContextRef ref);
-
-PGPError PGPWipeFile( PGPContextRef context,
- PGPInt32 numPasses,
- PGPOptionListRef firstOption,
- ...);
-
-/*____________________________________________________________________________
- PGP TAR/UnTAR functions that work with TAR cache
-____________________________________________________________________________*/
-
-enum PGPTARCacheObjAttributeType_
-{
- kPGPTARCacheObjAttribute_Invalid = 0,
- kPGPTARCacheObjAttribute_File = 1,
- kPGPTARCacheObjAttribute_SymLink = 2,
- kPGPTARCacheObjAttribute_Directory = 3,
- kPGPTARCacheObjAttribute_Deleted = 4,
-
- PGP_ENUM_FORCE( PGPTARCacheObjAttributeType_ )
-} ;
-
-PGPENUM_TYPEDEF( PGPTARCacheObjAttributeType_, PGPTARCacheObjAttributeType );
-
-enum PGPTARCacheObjProperty_
-{
- kPGPTARCacheObjProperty_Invalid = 0,
-
- /* string properties */
- kPGPTARCacheObjProperty_Name = 100,
- kPGPTARCacheObjProperty_User = 101,
- kPGPTARCacheObjProperty_Group = 102,
- kPGPTARCacheObjProperty_Contents = 103,
- kPGPTARCacheObjProperty_Link = 104,
- kPGPTARCacheObjProperty_Size = 105, /* PGPUInt64 */
- kPGPTARCacheObjProperty_FilePos = 106, /* PGPFileOffset */
-
- /* PGPTime properties */
- kPGPTARCacheObjProperty_Date = 200,
-
- /* Numeric properties */
- kPGPTARCacheObjProperty_Mode = 302,
- kPGPTARCacheObjProperty_Attribute = 303,
-
- PGP_ENUM_FORCE( PGPTARCacheObjProperty_ )
-} ;
-
-PGPENUM_TYPEDEF( PGPTARCacheObjProperty_, PGPTARCacheObjProperty );
-enum PGPOpenTARCacheFileOptions_
-{
- kPGPOpenTARCacheFileOptions_None = 0,
- kPGPOpenTARCacheFileOptions_Mutable = (1UL << 0 ),
- kPGPOpenTARCacheFileOptions_Create = (1UL << 1 ),
- kPGPOpenTARCacheFileOptions_PreloadAll = (1UL << 2 ),
-
- PGP_ENUM_FORCE( PGPOpenTARCacheFileOptions_ )
-} ;
-
-PGPENUM_TYPEDEF( PGPOpenTARCacheFileOptions_, PGPOpenTARCacheFileOptions );
-
-
-PGPError PGPOpenTARCacheFile( PGPContextRef context,
- PGPOpenTARCacheFileOptions options,
- PGPFileSpecRef tarcache,
- void *sessionKey,
- PGPSize sessionKeyBufferSize,
- PGPSize *sessionKeySize, /* can be NULL if not kPGPOpenTARCacheFileOptions_Create */
- PGPTARCacheRef *outRef,
- PGPOptionListRef firstOption,
- ...);
-
-PGPError PGPFreeTARCache(PGPTARCacheRef ref);
-
-PGPError PGPNewTARCacheIter( PGPTARCacheRef tar, PGPTARCacheIterRef *outRef);
-
-PGPError PGPFreeTARCacheIter( PGPTARCacheIterRef iter);
-
-PGPInt32 PGPTARCacheIterIndex( PGPTARCacheIterRef iter);
-
-PGPError PGPTARCacheIterRewind( PGPTARCacheIterRef iter);
-
-PGPError PGPTARCacheIterMove( PGPTARCacheIterRef iter, PGPInt32 relOffset, PGPTARCacheObjRef *outRef);
-
-PGPError PGPTARCacheIterNextTARCacheObj( PGPTARCacheIterRef iter, PGPTARCacheObjRef *outRef);
-
-PGPError PGPTARCacheIterPrevTARCacheObj( PGPTARCacheIterRef iter, PGPTARCacheObjRef *outRef);
-
-PGPError PGPTARCacheIterGetTARCacheObj( PGPTARCacheIterRef iter, PGPTARCacheObjRef *outRef);
-
-PGPError PGPGetTARCacheObjNumericProperty( PGPTARCacheObjRef obj,
- PGPTARCacheObjProperty whichProperty, PGPInt32 *prop );
-
-PGPError PGPGetTARCacheObjTimeProperty( PGPTARCacheObjRef obj,
- PGPTARCacheObjProperty whichProperty, PGPTime *prop);
-
- PGPError PGPGetTARCacheObjDataProperty( PGPTARCacheObjRef obj,
- PGPTARCacheObjProperty whichProperty, void *buffer,
- PGPSize bufferSize, PGPSize *dataSize);
-
-PGPError PGPGetTARCacheObjAllocatedDataProperty( PGPTARCacheObjRef obj,
- PGPTARCacheObjProperty whichProperty, void **buffer,
- PGPSize *dataSize);
-
-
-PGPError PGPDeleteTARCacheObj( PGPTARCacheObjRef tarObj );
-
-PGPError PGPExportTARCacheObj( PGPTARCacheObjRef tarObj,
- PGPFileSpecRef fileRef,
- PGPOptionListRef firstOption,
- ...);
-
-
-PGPError PGPCountObjsInTARCache( PGPTARCacheRef ref, PGPUInt32 *numItems );
-
-PGPError PGPImportTARCacheObj( PGPTARCacheRef tarCache,
- PGPFileSpecRef fileRef,
- PGPTARCacheObjRef *outRef,
- PGPOptionListRef firstOption,
- ...);
-
-/*____________________________________________________________________________
-FIPS 140-2 Support
-____________________________________________________________________________*/
-
-enum PGPsdkSelfTest_
-{
- kPGPsdkSelfTest_Invalid = 0,
- kPGPsdkSelfTest_FirstTest = 1,
-
- kPGPsdkSelfTest_3DES = 1,
- kPGPsdkSelfTest_DSA = 2,
- kPGPsdkSelfTest_AES = 3,
- kPGPsdkSelfTest_RSA = 4,
- kPGPsdkSelfTest_SHA = 5,
- kPGPsdkSelfTest_HMAC = 6,
- kPGPsdkSelfTest_EC = 7,
- kPGPsdkSelfTest_PRNG = 8,
- kPGPsdkSelfTest_Integrity = 9,
-
- kPGPsdkSelfTest_LastTest = kPGPsdkSelfTest_Integrity,
-
- PGP_ENUM_FORCE( PGPsdkSelfTest_ )
-};
-
-PGPENUM_TYPEDEF( PGPsdkSelfTest_, PGPsdkSelfTest );
-
-PGPError PGPEnableFIPSMode(void);
-PGPError PGPGetSDKErrorState(void);
-PGPError PGPResetSDKErrorState(void);
-PGPError PGPRunSDKSelfTest(PGPsdkSelfTest whichTest);
-PGPError PGPRunAllSDKSelfTests(void);
-
-PGP_END_C_DECLARATIONS
-
-#if PGP_MACINTOSH
-#pragma options align=reset /* ] */
-#endif
-
-#endif /* ] Included_pgpUtilities_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/lib/PGPsdk.lib b/plugins/CryptoPP/PGPw/sdk8/lib/PGPsdk.lib
deleted file mode 100644
index c0950deded..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/lib/PGPsdk.lib
+++ /dev/null
Binary files differ
diff --git a/plugins/CryptoPP/PGPw/sdk8/lib/PGPsdkNL.lib b/plugins/CryptoPP/PGPw/sdk8/lib/PGPsdkNL.lib
deleted file mode 100644
index 09b4a3463e..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/lib/PGPsdkNL.lib
+++ /dev/null
Binary files differ
diff --git a/plugins/CryptoPP/PGPw/sdk8/lib/PGPsdkUI.lib b/plugins/CryptoPP/PGPw/sdk8/lib/PGPsdkUI.lib
deleted file mode 100644
index 9a9ae7f89c..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/lib/PGPsdkUI.lib
+++ /dev/null
Binary files differ