summaryrefslogtreecommitdiff
path: root/plugins/CryptoPP/PGPw
diff options
context:
space:
mode:
Diffstat (limited to 'plugins/CryptoPP/PGPw')
-rw-r--r--plugins/CryptoPP/PGPw/PGPsdkW.dep43
-rw-r--r--plugins/CryptoPP/PGPw/PGPsdkW.dsp122
-rw-r--r--plugins/CryptoPP/PGPw/PGPsdkW.dsw29
-rw-r--r--plugins/CryptoPP/PGPw/PGPsdkW.mak220
-rw-r--r--plugins/CryptoPP/PGPw/Release6/PGPsdkW6.dllbin8192 -> 0 bytes
-rw-r--r--plugins/CryptoPP/PGPw/Release6/PGPsdkW6.map213
-rw-r--r--plugins/CryptoPP/PGPw/Release8/PGPsdkW8.dllbin8192 -> 0 bytes
-rw-r--r--plugins/CryptoPP/PGPw/Release8/PGPsdkW8.map216
-rw-r--r--plugins/CryptoPP/PGPw/commonheaders.cpp5
-rw-r--r--plugins/CryptoPP/PGPw/commonheaders.h64
-rw-r--r--plugins/CryptoPP/PGPw/main.cpp584
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpBase.h270
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpBigNum.h208
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpCBC.h93
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpCFB.h127
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpConfig.h96
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpEncode.h301
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpErrors.h305
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpFeatures.h176
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpGroups.h322
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpHMAC.h75
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpHash.h95
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpKeyServer.h360
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpKeys.h879
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpMemoryMgr.h235
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpOptionList.h452
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpPFLConfig.h51
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpPFLErrors.h97
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpPubTypes.h276
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpPublicKey.h213
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpRandomPool.h49
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpSDKPrefs.h74
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpSockets.h476
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpSymmetricCipher.h122
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpTLS.h316
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpUserInterface.h290
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/include/pgpUtilities.h231
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/lib/PGP_SDK.libbin99772 -> 0 bytes
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/lib/PGPsdkNL.libbin28718 -> 0 bytes
-rw-r--r--plugins/CryptoPP/PGPw/sdk6/lib/PGPsdkUI.libbin11824 -> 0 bytes
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pflTypes.h52
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpAPIAdapter.h186
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpBER.h175
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpBase.h451
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpBigNum.h177
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpCBC.h82
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpCFB.h115
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpConfig.h96
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpEC.h78
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpEncode.h306
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpErrors.h393
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpFeatures.h143
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpGroups.h315
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpHMAC.h67
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpHash.h86
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpHashWords.h40
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpIKE.h784
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpKeyServer.h339
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpKeys.h831
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpLDAP.h722
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpMemoryMgr.h220
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpOptionList.h542
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpPFLConfig.h52
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpPFLErrors.h116
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpPubTypes.h350
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpPublicKey.h207
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpRandomPool.h46
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpReconstruct.h117
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpSECSH.h308
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpSKEP.h120
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpShare.h80
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpShareFile.h95
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpSockets.h464
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpSymmetricCipher.h114
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpTLS.h336
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpUserInterface.h284
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/include/pgpUtilities.h464
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/lib/PGPsdk.libbin151794 -> 0 bytes
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/lib/PGPsdkNL.libbin50356 -> 0 bytes
-rw-r--r--plugins/CryptoPP/PGPw/sdk8/lib/PGPsdkUI.libbin14694 -> 0 bytes
80 files changed, 0 insertions, 17038 deletions
diff --git a/plugins/CryptoPP/PGPw/PGPsdkW.dep b/plugins/CryptoPP/PGPw/PGPsdkW.dep
deleted file mode 100644
index a0663216fc..0000000000
--- a/plugins/CryptoPP/PGPw/PGPsdkW.dep
+++ /dev/null
@@ -1,43 +0,0 @@
-# Microsoft Developer Studio Generated Dependency File, included by PGPsdkW.mak
-
-.\commonheaders.cpp : \
- "..\version.h"\
- ".\commonheaders.h"\
- ".\sdk6\include\pgpBase.h"\
- ".\sdk6\include\pgpConfig.h"\
- ".\sdk6\include\pgpEncode.h"\
- ".\sdk6\include\pgpErrors.h"\
- ".\sdk6\include\pgpFeatures.h"\
- ".\sdk6\include\pgpGroups.h"\
- ".\sdk6\include\pgpHash.h"\
- ".\sdk6\include\pgpKeys.h"\
- ".\sdk6\include\pgpMemoryMgr.h"\
- ".\sdk6\include\pgpOptionList.h"\
- ".\sdk6\include\pgpPFLConfig.h"\
- ".\sdk6\include\pgpPFLErrors.h"\
- ".\sdk6\include\pgpPubTypes.h"\
- ".\sdk6\include\pgpTLS.h"\
- ".\sdk6\include\pgpUserInterface.h"\
- ".\sdk6\include\pgpUtilities.h"\
-
-
-.\main.cpp : \
- "..\version.h"\
- ".\commonheaders.h"\
- ".\sdk6\include\pgpBase.h"\
- ".\sdk6\include\pgpConfig.h"\
- ".\sdk6\include\pgpEncode.h"\
- ".\sdk6\include\pgpErrors.h"\
- ".\sdk6\include\pgpFeatures.h"\
- ".\sdk6\include\pgpGroups.h"\
- ".\sdk6\include\pgpHash.h"\
- ".\sdk6\include\pgpKeys.h"\
- ".\sdk6\include\pgpMemoryMgr.h"\
- ".\sdk6\include\pgpOptionList.h"\
- ".\sdk6\include\pgpPFLConfig.h"\
- ".\sdk6\include\pgpPFLErrors.h"\
- ".\sdk6\include\pgpPubTypes.h"\
- ".\sdk6\include\pgpTLS.h"\
- ".\sdk6\include\pgpUserInterface.h"\
- ".\sdk6\include\pgpUtilities.h"\
-
diff --git a/plugins/CryptoPP/PGPw/PGPsdkW.dsp b/plugins/CryptoPP/PGPw/PGPsdkW.dsp
deleted file mode 100644
index 630865db79..0000000000
--- a/plugins/CryptoPP/PGPw/PGPsdkW.dsp
+++ /dev/null
@@ -1,122 +0,0 @@
-# Microsoft Developer Studio Project File - Name="PGPsdkW" - Package Owner=<4>
-# Microsoft Developer Studio Generated Build File, Format Version 6.00
-# ** DO NOT EDIT **
-
-# TARGTYPE "Win32 (x86) Dynamic-Link Library" 0x0102
-
-CFG=PGPsdkW - Win32 Release6
-!MESSAGE This is not a valid makefile. To build this project using NMAKE,
-!MESSAGE use the Export Makefile command and run
-!MESSAGE
-!MESSAGE NMAKE /f "PGPsdkW.mak".
-!MESSAGE
-!MESSAGE You can specify a configuration when running NMAKE
-!MESSAGE by defining the macro CFG on the command line. For example:
-!MESSAGE
-!MESSAGE NMAKE /f "PGPsdkW.mak" CFG="PGPsdkW - Win32 Release6"
-!MESSAGE
-!MESSAGE Possible choices for configuration are:
-!MESSAGE
-!MESSAGE "PGPsdkW - Win32 Release6" (based on "Win32 (x86) Dynamic-Link Library")
-!MESSAGE "PGPsdkW - Win32 Release8" (based on "Win32 (x86) Dynamic-Link Library")
-!MESSAGE
-
-# Begin Project
-# PROP AllowPerConfigDependencies 0
-# PROP Scc_ProjName ""
-# PROP Scc_LocalPath ""
-CPP=cl.exe
-MTL=midl.exe
-RSC=rc.exe
-
-!IF "$(CFG)" == "PGPsdkW - Win32 Release6"
-
-# PROP BASE Use_MFC 0
-# PROP BASE Use_Debug_Libraries 0
-# PROP BASE Output_Dir "PGPsdkW___Win32_Release6"
-# PROP BASE Intermediate_Dir "PGPsdkW___Win32_Release6"
-# PROP BASE Ignore_Export_Lib 1
-# PROP BASE Target_Dir ""
-# PROP Use_MFC 0
-# PROP Use_Debug_Libraries 0
-# PROP Output_Dir "Release6"
-# PROP Intermediate_Dir "Release6"
-# PROP Ignore_Export_Lib 1
-# PROP Target_Dir ""
-# ADD BASE CPP /nologo /MD /W3 /Gi /O1 /I "sdk6/include" /D PGP_WIN32=0x658 /YX"commonheaders.h" /FD /c
-# ADD CPP /nologo /MD /W3 /Gi /GX /O1 /I "sdk6/include" /D PGP_WIN32=0x658 /Yu"commonheaders.h" /FD /c
-# ADD BASE MTL /nologo /D "NDEBUG" /mktyplib203 /win32
-# ADD MTL /nologo /D "NDEBUG" /mktyplib203 /win32
-# ADD BASE RSC /l 0x417 /d "NDEBUG"
-# ADD RSC /l 0x417 /d "NDEBUG"
-BSC32=bscmake.exe
-# ADD BASE BSC32 /nologo
-# ADD BSC32 /nologo
-LINK32=link.exe
-# ADD BASE LINK32 delayimp.lib pgp_sdk.lib pgpsdknl.lib pgpsdkui.lib kernel32.lib user32.lib shell32.lib gdi32.lib msimg32.lib comdlg32.lib msvcrt.lib /nologo /base:"0x46600000" /dll /map /machine:I386 /pdb:"Release6/PGPsdkW6.pdb" /out:"Release6/PGPsdkW6.dll" /libpath:"sdk6/lib" /filealign:0x200 /delayload:pgp_sdk.dll /delayload:pgpsdkui.dll
-# SUBTRACT BASE LINK32 /pdb:none
-# ADD LINK32 delayimp.lib pgp_sdk.lib pgpsdknl.lib pgpsdkui.lib kernel32.lib user32.lib shell32.lib gdi32.lib msimg32.lib comdlg32.lib msvcrt.lib /nologo /base:"0x46600000" /dll /map /machine:I386 /pdb:"Release6/PGPsdkW6.pdb" /out:"Release6/PGPsdkW6.dll" /libpath:"sdk6/lib" /filealign:0x200 /delayload:pgp_sdk.dll /delayload:pgpsdkui.dll
-# SUBTRACT LINK32 /pdb:none
-
-!ELSEIF "$(CFG)" == "PGPsdkW - Win32 Release8"
-
-# PROP BASE Use_MFC 0
-# PROP BASE Use_Debug_Libraries 0
-# PROP BASE Output_Dir "PGPsdkW___Win32_Release8"
-# PROP BASE Intermediate_Dir "PGPsdkW___Win32_Release8"
-# PROP BASE Ignore_Export_Lib 1
-# PROP BASE Target_Dir ""
-# PROP Use_MFC 0
-# PROP Use_Debug_Libraries 0
-# PROP Output_Dir "Release8"
-# PROP Intermediate_Dir "Release8"
-# PROP Ignore_Export_Lib 1
-# PROP Target_Dir ""
-# ADD BASE CPP /nologo /MD /W3 /Gi /O1 /I "sdk8/include" /D PGP_WIN32=0x800 /YX"commonheaders.h" /FD /c
-# ADD CPP /nologo /MD /W3 /Gi /GX /O1 /I "sdk8/include" /D PGP_WIN32=0x800 /Yu"commonheaders.h" /FD /c
-# ADD BASE MTL /nologo /D "NDEBUG" /mktyplib203 /win32
-# ADD MTL /nologo /D "NDEBUG" /mktyplib203 /win32
-# ADD BASE RSC /l 0x417 /d "NDEBUG"
-# ADD RSC /l 0x417 /d "NDEBUG"
-BSC32=bscmake.exe
-# ADD BASE BSC32 /nologo
-# ADD BSC32 /nologo
-LINK32=link.exe
-# ADD BASE LINK32 delayimp.lib pgpsdk.lib pgpsdknl.lib pgpsdkui.lib kernel32.lib user32.lib shell32.lib gdi32.lib msimg32.lib comdlg32.lib msvcrt.lib /nologo /base:"0x46800000" /dll /map /machine:I386 /pdb:"Release8/PGPsdkW8.pdb" /out:"Release8/PGPsdkW8.dll" /libpath:"sdk8/lib" /filealign:0x200 /delayload:pgp_sdk.dll /delayload:pgpsdkui.dll
-# SUBTRACT BASE LINK32 /pdb:none
-# ADD LINK32 delayimp.lib pgpsdk.lib pgpsdknl.lib pgpsdkui.lib kernel32.lib user32.lib shell32.lib gdi32.lib msimg32.lib comdlg32.lib msvcrt.lib /nologo /base:"0x46800000" /dll /map /machine:I386 /pdb:"Release8/PGPsdkW8.pdb" /out:"Release8/PGPsdkW8.dll" /libpath:"sdk8/lib" /filealign:0x200 /delayload:pgpsdk.dll /delayload:pgpsdkui.dll
-# SUBTRACT LINK32 /pdb:none
-
-!ENDIF
-
-# Begin Target
-
-# Name "PGPsdkW - Win32 Release6"
-# Name "PGPsdkW - Win32 Release8"
-# Begin Group "Source Files"
-
-# PROP Default_Filter "cpp;c;cxx;rc;def;r;odl;idl;hpj;bat"
-# Begin Source File
-
-SOURCE=.\commonheaders.cpp
-# ADD CPP /Yc"commonheaders.h"
-# End Source File
-# Begin Source File
-
-SOURCE=.\main.cpp
-# End Source File
-# End Group
-# Begin Group "Header Files"
-
-# PROP Default_Filter "h;hpp;hxx;hm;inl"
-# Begin Source File
-
-SOURCE=.\commonheaders.h
-# End Source File
-# End Group
-# Begin Group "Resource Files"
-
-# PROP Default_Filter "ico;cur;bmp;dlg;rc2;rct;bin;rgs;gif;jpg;jpeg;jpe"
-# End Group
-# End Target
-# End Project
diff --git a/plugins/CryptoPP/PGPw/PGPsdkW.dsw b/plugins/CryptoPP/PGPw/PGPsdkW.dsw
deleted file mode 100644
index 443b854d9a..0000000000
--- a/plugins/CryptoPP/PGPw/PGPsdkW.dsw
+++ /dev/null
@@ -1,29 +0,0 @@
-Microsoft Developer Studio Workspace File, Format Version 6.00
-# WARNING: DO NOT EDIT OR DELETE THIS WORKSPACE FILE!
-
-###############################################################################
-
-Project: "PGPsdkW"=.\PGPsdkW.dsp - Package Owner=<4>
-
-Package=<5>
-{{{
-}}}
-
-Package=<4>
-{{{
-}}}
-
-###############################################################################
-
-Global:
-
-Package=<5>
-{{{
-}}}
-
-Package=<3>
-{{{
-}}}
-
-###############################################################################
-
diff --git a/plugins/CryptoPP/PGPw/PGPsdkW.mak b/plugins/CryptoPP/PGPw/PGPsdkW.mak
deleted file mode 100644
index 86459e7075..0000000000
--- a/plugins/CryptoPP/PGPw/PGPsdkW.mak
+++ /dev/null
@@ -1,220 +0,0 @@
-# Microsoft Developer Studio Generated NMAKE File, Based on PGPsdkW.dsp
-!IF "$(CFG)" == ""
-CFG=PGPsdkW - Win32 Release6
-!MESSAGE No configuration specified. Defaulting to PGPsdkW - Win32 Release6.
-!ENDIF
-
-!IF "$(CFG)" != "PGPsdkW - Win32 Release6" && "$(CFG)" != "PGPsdkW - Win32 Release8"
-!MESSAGE Invalid configuration "$(CFG)" specified.
-!MESSAGE You can specify a configuration when running NMAKE
-!MESSAGE by defining the macro CFG on the command line. For example:
-!MESSAGE
-!MESSAGE NMAKE /f "PGPsdkW.mak" CFG="PGPsdkW - Win32 Release6"
-!MESSAGE
-!MESSAGE Possible choices for configuration are:
-!MESSAGE
-!MESSAGE "PGPsdkW - Win32 Release6" (based on "Win32 (x86) Dynamic-Link Library")
-!MESSAGE "PGPsdkW - Win32 Release8" (based on "Win32 (x86) Dynamic-Link Library")
-!MESSAGE
-!ERROR An invalid configuration is specified.
-!ENDIF
-
-!IF "$(OS)" == "Windows_NT"
-NULL=
-!ELSE
-NULL=nul
-!ENDIF
-
-!IF "$(CFG)" == "PGPsdkW - Win32 Release6"
-
-OUTDIR=.\Release6
-INTDIR=.\Release6
-# Begin Custom Macros
-OutDir=.\Release6
-# End Custom Macros
-
-ALL : "$(OUTDIR)\PGPsdkW6.dll"
-
-
-CLEAN :
- -@erase "$(INTDIR)\commonheaders.obj"
- -@erase "$(INTDIR)\main.obj"
- -@erase "$(INTDIR)\PGPsdkW.pch"
- -@erase "$(INTDIR)\vc60.idb"
- -@erase "$(OUTDIR)\PGPsdkW6.dll"
- -@erase "$(OUTDIR)\PGPsdkW6.exp"
- -@erase "$(OUTDIR)\PGPsdkW6.map"
-
-"$(OUTDIR)" :
- if not exist "$(OUTDIR)/$(NULL)" mkdir "$(OUTDIR)"
-
-CPP=cl.exe
-CPP_PROJ=/nologo /MD /W3 /Gi /GX /O1 /I "sdk6/include" /D PGP_WIN32=0x658 /Fp"$(INTDIR)\PGPsdkW.pch" /Yu"commonheaders.h" /Fo"$(INTDIR)\\" /Fd"$(INTDIR)\\" /FD /c
-
-.c{$(INTDIR)}.obj::
- $(CPP) @<<
- $(CPP_PROJ) $<
-<<
-
-.cpp{$(INTDIR)}.obj::
- $(CPP) @<<
- $(CPP_PROJ) $<
-<<
-
-.cxx{$(INTDIR)}.obj::
- $(CPP) @<<
- $(CPP_PROJ) $<
-<<
-
-.c{$(INTDIR)}.sbr::
- $(CPP) @<<
- $(CPP_PROJ) $<
-<<
-
-.cpp{$(INTDIR)}.sbr::
- $(CPP) @<<
- $(CPP_PROJ) $<
-<<
-
-.cxx{$(INTDIR)}.sbr::
- $(CPP) @<<
- $(CPP_PROJ) $<
-<<
-
-MTL=midl.exe
-MTL_PROJ=/nologo /D "NDEBUG" /mktyplib203 /win32
-RSC=rc.exe
-BSC32=bscmake.exe
-BSC32_FLAGS=/nologo /o"$(OUTDIR)\PGPsdkW.bsc"
-BSC32_SBRS= \
-
-LINK32=link.exe
-LINK32_FLAGS=delayimp.lib pgp_sdk.lib pgpsdknl.lib pgpsdkui.lib kernel32.lib user32.lib shell32.lib gdi32.lib msimg32.lib comdlg32.lib msvcrt.lib /nologo /base:"0x46600000" /dll /incremental:no /pdb:"$(OUTDIR)\PGPsdkW6.pdb" /map:"$(INTDIR)\PGPsdkW6.map" /machine:I386 /out:"$(OUTDIR)\PGPsdkW6.dll" /implib:"$(OUTDIR)\PGPsdkW6.lib" /libpath:"sdk6/lib" /filealign:0x200 /delayload:pgp_sdk.dll /delayload:pgpsdkui.dll
-LINK32_OBJS= \
- "$(INTDIR)\commonheaders.obj" \
- "$(INTDIR)\main.obj"
-
-"$(OUTDIR)\PGPsdkW6.dll" : "$(OUTDIR)" $(DEF_FILE) $(LINK32_OBJS)
- $(LINK32) @<<
- $(LINK32_FLAGS) $(LINK32_OBJS)
-<<
-
-!ELSEIF "$(CFG)" == "PGPsdkW - Win32 Release8"
-
-OUTDIR=.\Release8
-INTDIR=.\Release8
-# Begin Custom Macros
-OutDir=.\Release8
-# End Custom Macros
-
-ALL : "$(OUTDIR)\PGPsdkW8.dll"
-
-
-CLEAN :
- -@erase "$(INTDIR)\commonheaders.obj"
- -@erase "$(INTDIR)\main.obj"
- -@erase "$(INTDIR)\PGPsdkW.pch"
- -@erase "$(INTDIR)\vc60.idb"
- -@erase "$(OUTDIR)\PGPsdkW8.dll"
- -@erase "$(OUTDIR)\PGPsdkW8.exp"
- -@erase "$(OUTDIR)\PGPsdkW8.map"
-
-"$(OUTDIR)" :
- if not exist "$(OUTDIR)/$(NULL)" mkdir "$(OUTDIR)"
-
-CPP=cl.exe
-CPP_PROJ=/nologo /MD /W3 /Gi /GX /O1 /I "sdk8/include" /D PGP_WIN32=0x800 /Fp"$(INTDIR)\PGPsdkW.pch" /Yu"commonheaders.h" /Fo"$(INTDIR)\\" /Fd"$(INTDIR)\\" /FD /c
-
-.c{$(INTDIR)}.obj::
- $(CPP) @<<
- $(CPP_PROJ) $<
-<<
-
-.cpp{$(INTDIR)}.obj::
- $(CPP) @<<
- $(CPP_PROJ) $<
-<<
-
-.cxx{$(INTDIR)}.obj::
- $(CPP) @<<
- $(CPP_PROJ) $<
-<<
-
-.c{$(INTDIR)}.sbr::
- $(CPP) @<<
- $(CPP_PROJ) $<
-<<
-
-.cpp{$(INTDIR)}.sbr::
- $(CPP) @<<
- $(CPP_PROJ) $<
-<<
-
-.cxx{$(INTDIR)}.sbr::
- $(CPP) @<<
- $(CPP_PROJ) $<
-<<
-
-MTL=midl.exe
-MTL_PROJ=/nologo /D "NDEBUG" /mktyplib203 /win32
-RSC=rc.exe
-BSC32=bscmake.exe
-BSC32_FLAGS=/nologo /o"$(OUTDIR)\PGPsdkW.bsc"
-BSC32_SBRS= \
-
-LINK32=link.exe
-LINK32_FLAGS=delayimp.lib pgpsdk.lib pgpsdknl.lib pgpsdkui.lib kernel32.lib user32.lib shell32.lib gdi32.lib msimg32.lib comdlg32.lib msvcrt.lib /nologo /base:"0x46800000" /dll /incremental:no /pdb:"$(OUTDIR)\PGPsdkW8.pdb" /map:"$(INTDIR)\PGPsdkW8.map" /machine:I386 /out:"$(OUTDIR)\PGPsdkW8.dll" /implib:"$(OUTDIR)\PGPsdkW8.lib" /libpath:"sdk8/lib" /filealign:0x200 /delayload:pgpsdk.dll /delayload:pgpsdkui.dll
-LINK32_OBJS= \
- "$(INTDIR)\commonheaders.obj" \
- "$(INTDIR)\main.obj"
-
-"$(OUTDIR)\PGPsdkW8.dll" : "$(OUTDIR)" $(DEF_FILE) $(LINK32_OBJS)
- $(LINK32) @<<
- $(LINK32_FLAGS) $(LINK32_OBJS)
-<<
-
-!ENDIF
-
-
-!IF "$(NO_EXTERNAL_DEPS)" != "1"
-!IF EXISTS("PGPsdkW.dep")
-!INCLUDE "PGPsdkW.dep"
-!ELSE
-!MESSAGE Warning: cannot find "PGPsdkW.dep"
-!ENDIF
-!ENDIF
-
-
-!IF "$(CFG)" == "PGPsdkW - Win32 Release6" || "$(CFG)" == "PGPsdkW - Win32 Release8"
-SOURCE=.\commonheaders.cpp
-
-!IF "$(CFG)" == "PGPsdkW - Win32 Release6"
-
-CPP_SWITCHES=/nologo /MD /W3 /Gi /GX /O1 /I "sdk6/include" /D PGP_WIN32=0x658 /Fp"$(INTDIR)\PGPsdkW.pch" /Yc"commonheaders.h" /Fo"$(INTDIR)\\" /Fd"$(INTDIR)\\" /FD /c
-
-"$(INTDIR)\commonheaders.obj" "$(INTDIR)\PGPsdkW.pch" : $(SOURCE) "$(INTDIR)"
- $(CPP) @<<
- $(CPP_SWITCHES) $(SOURCE)
-<<
-
-
-!ELSEIF "$(CFG)" == "PGPsdkW - Win32 Release8"
-
-CPP_SWITCHES=/nologo /MD /W3 /Gi /GX /O1 /I "sdk8/include" /D PGP_WIN32=0x800 /Fp"$(INTDIR)\PGPsdkW.pch" /Yc"commonheaders.h" /Fo"$(INTDIR)\\" /Fd"$(INTDIR)\\" /FD /c
-
-"$(INTDIR)\commonheaders.obj" "$(INTDIR)\PGPsdkW.pch" : $(SOURCE) "$(INTDIR)"
- $(CPP) @<<
- $(CPP_SWITCHES) $(SOURCE)
-<<
-
-
-!ENDIF
-
-SOURCE=.\main.cpp
-
-"$(INTDIR)\main.obj" : $(SOURCE) "$(INTDIR)" "$(INTDIR)\PGPsdkW.pch"
-
-
-
-!ENDIF
-
diff --git a/plugins/CryptoPP/PGPw/Release6/PGPsdkW6.dll b/plugins/CryptoPP/PGPw/Release6/PGPsdkW6.dll
deleted file mode 100644
index 90a7a2abfc..0000000000
--- a/plugins/CryptoPP/PGPw/Release6/PGPsdkW6.dll
+++ /dev/null
Binary files differ
diff --git a/plugins/CryptoPP/PGPw/Release6/PGPsdkW6.map b/plugins/CryptoPP/PGPw/Release6/PGPsdkW6.map
deleted file mode 100644
index 6f9fa4584c..0000000000
--- a/plugins/CryptoPP/PGPw/Release6/PGPsdkW6.map
+++ /dev/null
@@ -1,213 +0,0 @@
- PGPsdkW6
-
- Timestamp is 45ddf356 (Thu Feb 22 22:47:34 2007)
-
- Preferred load address is 46600000
-
- Start Length Name Class
- 0001:00000000 0000003cH .idata$5 CODE
- 0001:00000040 0000003eH .rdata CODE
- 0001:00000080 00000d81H .text CODE
- 0001:00000e04 00000040H .didat$2 CODE
- 0001:00000e44 00000020H .didat$3 CODE
- 0001:00000e64 000000a0H .didat$4 CODE
- 0001:00000f04 000002ceH .didat$6 CODE
- 0001:000011d4 000000a0H .didat$7 CODE
- 0001:00001274 0000003cH .idata$2 CODE
- 0001:000012b0 00000014H .idata$3 CODE
- 0001:000012c4 0000003cH .idata$4 CODE
- 0001:00001300 000000e0H .idata$6 CODE
- 0001:000013e0 00000172H .edata CODE
- 0002:00000000 00000090H .data DATA
- 0002:00000090 000000a0H .didat$5 DATA
- 0002:00000130 00000050H .bss DATA
-
- Address Publics by Value Rva+Base Lib:Object
-
- 0001:00000000 __imp__LocalAlloc@8 46601000 kernel32:KERNEL32.dll
- 0001:00000004 __imp__LocalFree@4 46601004 kernel32:KERNEL32.dll
- 0001:00000008 __imp__lstrlenA@4 46601008 kernel32:KERNEL32.dll
- 0001:0000000c __imp__GetLastError@0 4660100c kernel32:KERNEL32.dll
- 0001:00000010 __imp__RaiseException@16 46601010 kernel32:KERNEL32.dll
- 0001:00000014 __imp__InterlockedExchange@8 46601014 kernel32:KERNEL32.dll
- 0001:00000018 __imp__LoadLibraryA@4 46601018 kernel32:KERNEL32.dll
- 0001:0000001c __imp__FreeLibrary@4 4660101c kernel32:KERNEL32.dll
- 0001:00000020 __imp__GetProcAddress@8 46601020 kernel32:KERNEL32.dll
- 0001:00000024 \177KERNEL32_NULL_THUNK_DATA 46601024 kernel32:KERNEL32.dll
- 0001:00000028 __imp___except_handler3 46601028 msvcrt:MSVCRT.dll
- 0001:0000002c __imp__memmove 4660102c msvcrt:MSVCRT.dll
- 0001:00000030 \177MSVCRT_NULL_THUNK_DATA 46601030 msvcrt:MSVCRT.dll
- 0001:00000034 __imp__MessageBoxA@16 46601034 user32:USER32.dll
- 0001:00000038 \177USER32_NULL_THUNK_DATA 46601038 user32:USER32.dll
- 0001:00000060 __sz_PGP_SDK 46601060 pgp_sdk:PGP_SDK.dll
- 0001:00000070 __sz_PGPsdkUI 46601070 pgpsdkui:PGPsdkUI.dll
- 0001:00000080 ?ClearPGPError@@YAXXZ 46601080 f main.obj
- 0001:00000089 ?CheckPGPError@@YA_NH@Z 46601089 f main.obj
- 0001:000000b5 __pgp_init 466010b5 f main.obj
- 0001:000001be __pgp_done 466011be f main.obj
- 0001:00000271 __pgp_open_keyrings 46601271 f main.obj
- 0001:00000297 __pgp_close_keyrings 46601297 f main.obj
- 0001:000002b2 __pgp_get_version 466012b2 f main.obj
- 0001:000002b8 __pgp_get_error 466012b8 f main.obj
- 0001:000002be __pgp_encrypt_keydb 466012be f main.obj
- 0001:000003dc __pgp_decrypt_keydb 466013dc f main.obj
- 0001:00000528 ?_pgp_import_key@@YAHPAPAUPGPKeySet@@PBD@Z 46601528 f main.obj
- 0001:00000566 __pgp_encrypt_key 46601566 f main.obj
- 0001:00000683 __pgp_decrypt_key 46601683 f main.obj
- 0001:0000080b __pgp_size_keyid 4660180b f main.obj
- 0001:0000080f __pgp_select_keyid 4660180f f main.obj
- 0001:000008fb ?dllmain@@YGHPAUHINSTANCE__@@KPAX@Z 466018fb f main.obj
- 0001:0000090a __imp_load__PGPGetErrorString 4660190a pgp_sdk:PGP_SDK.dll
- 0001:00000916 __tailMerge_PGP_SDK 46601916 pgp_sdk:PGP_SDK.dll
- 0001:00000924 _PGPGetErrorString 46601924 pgp_sdk:PGP_SDK.dll
- 0001:0000092a __imp_load__PGPGetSDKVersion 4660192a pgp_sdk:PGP_SDK.dll
- 0001:00000936 _PGPGetSDKVersion 46601936 pgp_sdk:PGP_SDK.dll
- 0001:0000093c __imp_load__PGPNewContext 4660193c pgp_sdk:PGP_SDK.dll
- 0001:00000948 _PGPNewContext 46601948 pgp_sdk:PGP_SDK.dll
- 0001:0000094e __imp_load__PGPsdkInit 4660194e pgp_sdk:PGP_SDK.dll
- 0001:0000095a _PGPsdkInit 4660195a pgp_sdk:PGP_SDK.dll
- 0001:00000960 __imp_load__PGPsdkCleanup 46601960 pgp_sdk:PGP_SDK.dll
- 0001:0000096c _PGPsdkCleanup 4660196c pgp_sdk:PGP_SDK.dll
- 0001:00000972 __imp_load__PGPFreeContext 46601972 pgp_sdk:PGP_SDK.dll
- 0001:0000097e _PGPFreeContext 4660197e pgp_sdk:PGP_SDK.dll
- 0001:00000984 __imp_load__PGPFreeKeySet 46601984 pgp_sdk:PGP_SDK.dll
- 0001:00000990 _PGPFreeKeySet 46601990 pgp_sdk:PGP_SDK.dll
- 0001:00000996 __imp_load__PGPFreeData 46601996 pgp_sdk:PGP_SDK.dll
- 0001:000009a2 _PGPFreeData 466019a2 pgp_sdk:PGP_SDK.dll
- 0001:000009a8 __imp_load__PGPOpenDefaultKeyRings 466019a8 pgp_sdk:PGP_SDK.dll
- 0001:000009b4 _PGPOpenDefaultKeyRings 466019b4 pgp_sdk:PGP_SDK.dll
- 0001:000009ba __imp_load__PGPFreeFilter 466019ba pgp_sdk:PGP_SDK.dll
- 0001:000009c6 _PGPFreeFilter 466019c6 pgp_sdk:PGP_SDK.dll
- 0001:000009cc __imp_load__PGPEncode 466019cc pgp_sdk:PGP_SDK.dll
- 0001:000009d8 _PGPEncode 466019d8 pgp_sdk:PGP_SDK.dll
- 0001:000009de __imp_load__PGPOInputBuffer 466019de pgp_sdk:PGP_SDK.dll
- 0001:000009ea _PGPOInputBuffer 466019ea pgp_sdk:PGP_SDK.dll
- 0001:000009f0 __imp_load__PGPOArmorOutput 466019f0 pgp_sdk:PGP_SDK.dll
- 0001:000009fc _PGPOArmorOutput 466019fc pgp_sdk:PGP_SDK.dll
- 0001:00000a02 __imp_load__PGPOAllocatedOutputBuffer 46601a02 pgp_sdk:PGP_SDK.dll
- 0001:00000a0e _PGPOAllocatedOutputBuffer 46601a0e pgp_sdk:PGP_SDK.dll
- 0001:00000a14 __imp_load__PGPOEncryptToKeySet 46601a14 pgp_sdk:PGP_SDK.dll
- 0001:00000a20 _PGPOEncryptToKeySet 46601a20 pgp_sdk:PGP_SDK.dll
- 0001:00000a26 __imp_load__PGPOVersionString 46601a26 pgp_sdk:PGP_SDK.dll
- 0001:00000a32 _PGPOVersionString 46601a32 pgp_sdk:PGP_SDK.dll
- 0001:00000a38 __imp_load__PGPOLastOption 46601a38 pgp_sdk:PGP_SDK.dll
- 0001:00000a44 _PGPOLastOption 46601a44 pgp_sdk:PGP_SDK.dll
- 0001:00000a4a __imp_load__PGPFilterKeySet 46601a4a pgp_sdk:PGP_SDK.dll
- 0001:00000a56 _PGPFilterKeySet 46601a56 pgp_sdk:PGP_SDK.dll
- 0001:00000a5c __imp_load__PGPNewKeyIDFilter 46601a5c pgp_sdk:PGP_SDK.dll
- 0001:00000a68 _PGPNewKeyIDFilter 46601a68 pgp_sdk:PGP_SDK.dll
- 0001:00000a6e __imp_load__PGPDecode 46601a6e pgp_sdk:PGP_SDK.dll
- 0001:00000a7a _PGPDecode 46601a7a pgp_sdk:PGP_SDK.dll
- 0001:00000a80 __imp_load__PGPOKeySetRef 46601a80 pgp_sdk:PGP_SDK.dll
- 0001:00000a8c _PGPOKeySetRef 46601a8c pgp_sdk:PGP_SDK.dll
- 0001:00000a92 __imp_load__PGPOPassphrase 46601a92 pgp_sdk:PGP_SDK.dll
- 0001:00000a9e _PGPOPassphrase 46601a9e pgp_sdk:PGP_SDK.dll
- 0001:00000aa4 __imp_load__PGPImportKeySet 46601aa4 pgp_sdk:PGP_SDK.dll
- 0001:00000ab0 _PGPImportKeySet 46601ab0 pgp_sdk:PGP_SDK.dll
- 0001:00000ab6 __imp_load__PGPCountKeys 46601ab6 pgp_sdk:PGP_SDK.dll
- 0001:00000ac2 _PGPCountKeys 46601ac2 pgp_sdk:PGP_SDK.dll
- 0001:00000ac8 __imp_load__PGPFreeKeyIter 46601ac8 pgp_sdk:PGP_SDK.dll
- 0001:00000ad4 _PGPFreeKeyIter 46601ad4 pgp_sdk:PGP_SDK.dll
- 0001:00000ada __imp_load__PGPFreeKeyList 46601ada pgp_sdk:PGP_SDK.dll
- 0001:00000ae6 _PGPFreeKeyList 46601ae6 pgp_sdk:PGP_SDK.dll
- 0001:00000aec __imp_load__PGPGetKeyIDString 46601aec pgp_sdk:PGP_SDK.dll
- 0001:00000af8 _PGPGetKeyIDString 46601af8 pgp_sdk:PGP_SDK.dll
- 0001:00000afe __imp_load__PGPGetKeyIDFromKey 46601afe pgp_sdk:PGP_SDK.dll
- 0001:00000b0a _PGPGetKeyIDFromKey 46601b0a pgp_sdk:PGP_SDK.dll
- 0001:00000b10 __imp_load__PGPKeyIterNext 46601b10 pgp_sdk:PGP_SDK.dll
- 0001:00000b1c _PGPKeyIterNext 46601b1c pgp_sdk:PGP_SDK.dll
- 0001:00000b22 __imp_load__PGPNewKeyIter 46601b22 pgp_sdk:PGP_SDK.dll
- 0001:00000b2e _PGPNewKeyIter 46601b2e pgp_sdk:PGP_SDK.dll
- 0001:00000b34 __imp_load__PGPOrderKeySet 46601b34 pgp_sdk:PGP_SDK.dll
- 0001:00000b40 _PGPOrderKeySet 46601b40 pgp_sdk:PGP_SDK.dll
- 0001:00000b46 __imp_load__PGPsdkUILibInit 46601b46 pgpsdkui:PGPsdkUI.dll
- 0001:00000b52 __tailMerge_PGPsdkUI 46601b52 pgpsdkui:PGPsdkUI.dll
- 0001:00000b60 _PGPsdkUILibInit 46601b60 pgpsdkui:PGPsdkUI.dll
- 0001:00000b66 __imp_load__PGPsdkUILibCleanup 46601b66 pgpsdkui:PGPsdkUI.dll
- 0001:00000b72 _PGPsdkUILibCleanup 46601b72 pgpsdkui:PGPsdkUI.dll
- 0001:00000b78 __imp_load__PGPPassphraseDialog 46601b78 pgpsdkui:PGPsdkUI.dll
- 0001:00000b84 _PGPPassphraseDialog 46601b84 pgpsdkui:PGPsdkUI.dll
- 0001:00000b8a __imp_load__PGPOUIOutputPassphrase 46601b8a pgpsdkui:PGPsdkUI.dll
- 0001:00000b96 _PGPOUIOutputPassphrase 46601b96 pgpsdkui:PGPsdkUI.dll
- 0001:00000b9c __imp_load__PGPRecipientDialog 46601b9c pgpsdkui:PGPsdkUI.dll
- 0001:00000ba8 _PGPRecipientDialog 46601ba8 pgpsdkui:PGPsdkUI.dll
- 0001:00000bae __imp_load__PGPOUIParentWindowHandle 46601bae pgpsdkui:PGPsdkUI.dll
- 0001:00000bba _PGPOUIParentWindowHandle 46601bba pgpsdkui:PGPsdkUI.dll
- 0001:00000bc0 __imp_load__PGPOUIWindowTitle 46601bc0 pgpsdkui:PGPsdkUI.dll
- 0001:00000bcc _PGPOUIWindowTitle 46601bcc pgpsdkui:PGPsdkUI.dll
- 0001:00000be0 __except_handler3 46601be0 f msvcrt:MSVCRT.dll
- 0001:00000be6 ___delayLoadHelper@8 46601be6 f delayimp:delayhlp.obj
- 0001:00000e04 __DELAY_IMPORT_DESCRIPTOR_PGP_SDK 46601e04 pgp_sdk:PGP_SDK.dll
- 0001:00000e24 __DELAY_IMPORT_DESCRIPTOR_PGPsdkUI 46601e24 pgpsdkui:PGPsdkUI.dll
- 0001:00000e44 __NULL_DELAY_IMPORT_DESCRIPTOR 46601e44 pgp_sdk:PGP_SDK.dll
- 0001:00000ee0 \177PGP_SDK_NULL_THUNK_DATA_DLN 46601ee0 pgp_sdk:PGP_SDK.dll
- 0001:00000f00 \177PGPsdkUI_NULL_THUNK_DATA_DLN 46601f00 pgpsdkui:PGPsdkUI.dll
- 0001:000011d8 \177PGP_SDK_NULL_THUNK_DATA_DLB 466021d8 pgp_sdk:PGP_SDK.dll
- 0001:00001258 \177PGPsdkUI_NULL_THUNK_DATA_DLB 46602258 pgpsdkui:PGPsdkUI.dll
- 0001:00001274 __IMPORT_DESCRIPTOR_KERNEL32 46602274 kernel32:KERNEL32.dll
- 0001:00001288 __IMPORT_DESCRIPTOR_USER32 46602288 user32:USER32.dll
- 0001:0000129c __IMPORT_DESCRIPTOR_MSVCRT 4660229c msvcrt:MSVCRT.dll
- 0001:000012b0 __NULL_IMPORT_DESCRIPTOR 466022b0 kernel32:KERNEL32.dll
- 0002:00000000 ?szModuleName@@3PBDB 46603000 commonheaders.obj
- 0002:00000004 ?szVersionStr@@3PBDB 46603004 commonheaders.obj
- 0002:00000008 ??_C@_0BG@HGBA@PGPsdk?5DLL?5?$CI1?40?41?411?$CJ?$AA@ 46603008 commonheaders.obj
- 0002:00000020 ??_C@_06DDFD@PGPsdk?$AA@ 46603020 commonheaders.obj
- 0002:00000028 ??_C@_0EB@DOFC@You?5selected?5more?5than?5one?5key?4?5@ 46603028 main.obj
- 0002:0000006c ??_C@_0BF@LLHL@Select?5Contact?8s?5Key?$AA@ 4660306c main.obj
- 0002:00000090 __imp__PGPGetErrorString 46603090 pgp_sdk:PGP_SDK.dll
- 0002:00000094 __imp__PGPGetSDKVersion 46603094 pgp_sdk:PGP_SDK.dll
- 0002:00000098 __imp__PGPNewContext 46603098 pgp_sdk:PGP_SDK.dll
- 0002:0000009c __imp__PGPsdkInit 4660309c pgp_sdk:PGP_SDK.dll
- 0002:000000a0 __imp__PGPsdkCleanup 466030a0 pgp_sdk:PGP_SDK.dll
- 0002:000000a4 __imp__PGPFreeContext 466030a4 pgp_sdk:PGP_SDK.dll
- 0002:000000a8 __imp__PGPFreeKeySet 466030a8 pgp_sdk:PGP_SDK.dll
- 0002:000000ac __imp__PGPFreeData 466030ac pgp_sdk:PGP_SDK.dll
- 0002:000000b0 __imp__PGPOpenDefaultKeyRings 466030b0 pgp_sdk:PGP_SDK.dll
- 0002:000000b4 __imp__PGPFreeFilter 466030b4 pgp_sdk:PGP_SDK.dll
- 0002:000000b8 __imp__PGPEncode 466030b8 pgp_sdk:PGP_SDK.dll
- 0002:000000bc __imp__PGPOInputBuffer 466030bc pgp_sdk:PGP_SDK.dll
- 0002:000000c0 __imp__PGPOArmorOutput 466030c0 pgp_sdk:PGP_SDK.dll
- 0002:000000c4 __imp__PGPOAllocatedOutputBuffer 466030c4 pgp_sdk:PGP_SDK.dll
- 0002:000000c8 __imp__PGPOEncryptToKeySet 466030c8 pgp_sdk:PGP_SDK.dll
- 0002:000000cc __imp__PGPOVersionString 466030cc pgp_sdk:PGP_SDK.dll
- 0002:000000d0 __imp__PGPOLastOption 466030d0 pgp_sdk:PGP_SDK.dll
- 0002:000000d4 __imp__PGPFilterKeySet 466030d4 pgp_sdk:PGP_SDK.dll
- 0002:000000d8 __imp__PGPNewKeyIDFilter 466030d8 pgp_sdk:PGP_SDK.dll
- 0002:000000dc __imp__PGPDecode 466030dc pgp_sdk:PGP_SDK.dll
- 0002:000000e0 __imp__PGPOKeySetRef 466030e0 pgp_sdk:PGP_SDK.dll
- 0002:000000e4 __imp__PGPOPassphrase 466030e4 pgp_sdk:PGP_SDK.dll
- 0002:000000e8 __imp__PGPImportKeySet 466030e8 pgp_sdk:PGP_SDK.dll
- 0002:000000ec __imp__PGPCountKeys 466030ec pgp_sdk:PGP_SDK.dll
- 0002:000000f0 __imp__PGPFreeKeyIter 466030f0 pgp_sdk:PGP_SDK.dll
- 0002:000000f4 __imp__PGPFreeKeyList 466030f4 pgp_sdk:PGP_SDK.dll
- 0002:000000f8 __imp__PGPGetKeyIDString 466030f8 pgp_sdk:PGP_SDK.dll
- 0002:000000fc __imp__PGPGetKeyIDFromKey 466030fc pgp_sdk:PGP_SDK.dll
- 0002:00000100 __imp__PGPKeyIterNext 46603100 pgp_sdk:PGP_SDK.dll
- 0002:00000104 __imp__PGPNewKeyIter 46603104 pgp_sdk:PGP_SDK.dll
- 0002:00000108 __imp__PGPOrderKeySet 46603108 pgp_sdk:PGP_SDK.dll
- 0002:0000010c \177PGP_SDK_NULL_THUNK_DATA_DLA 4660310c pgp_sdk:PGP_SDK.dll
- 0002:00000110 __imp__PGPsdkUILibCleanup 46603110 pgpsdkui:PGPsdkUI.dll
- 0002:00000114 __imp__PGPPassphraseDialog 46603114 pgpsdkui:PGPsdkUI.dll
- 0002:00000118 __imp__PGPOUIOutputPassphrase 46603118 pgpsdkui:PGPsdkUI.dll
- 0002:0000011c __imp__PGPRecipientDialog 4660311c pgpsdkui:PGPsdkUI.dll
- 0002:00000120 __imp__PGPOUIParentWindowHandle 46603120 pgpsdkui:PGPsdkUI.dll
- 0002:00000124 __imp__PGPOUIWindowTitle 46603124 pgpsdkui:PGPsdkUI.dll
- 0002:00000128 __imp__PGPsdkUILibInit 46603128 pgpsdkui:PGPsdkUI.dll
- 0002:0000012c \177PGPsdkUI_NULL_THUNK_DATA_DLA 4660312c pgpsdkui:PGPsdkUI.dll
- 0002:00000130 ?g_hInst@@3PAUHINSTANCE__@@A 46603130 commonheaders.obj
- 0002:00000158 ?pgpVer@@3IA 46603158 main.obj
- 0002:0000015c ?pgpContext@@3PAUPGPContext@@A 4660315c main.obj
- 0002:00000160 ?pgpKeyDB@@3PAUPGPKeySet@@A 46603160 main.obj
- 0002:00000164 ?pszPassphrase@@3PADA 46603164 main.obj
- 0002:00000168 ?pgpErrMsg@@3PADA 46603168 main.obj
- 0002:0000016c __hmod__PGP_SDK 4660316c pgp_sdk:PGP_SDK.dll
- 0002:00000170 __hmod__PGPSDKUI 46603170 pgpsdkui:PGPsdkUI.dll
- 0002:00000174 ___puiHead 46603174 delayimp:delayhlp.obj
- 0002:00000178 ___pfnDliFailureHook 46603178 delayimp:delayhk1.obj
- 0002:0000017c ___pfnDliNotifyHook 4660317c delayimp:delayhk2.obj
-
- entry point at 0000:00000000
-
- Static symbols
-
- 0001:00000ddf ?OverlayIAT@@YGXPAU_IMAGE_THUNK_DATA32@@PBU1@@Z 46601ddf f delayimp:delayhlp.obj
diff --git a/plugins/CryptoPP/PGPw/Release8/PGPsdkW8.dll b/plugins/CryptoPP/PGPw/Release8/PGPsdkW8.dll
deleted file mode 100644
index f026dde7fd..0000000000
--- a/plugins/CryptoPP/PGPw/Release8/PGPsdkW8.dll
+++ /dev/null
Binary files differ
diff --git a/plugins/CryptoPP/PGPw/Release8/PGPsdkW8.map b/plugins/CryptoPP/PGPw/Release8/PGPsdkW8.map
deleted file mode 100644
index e6ccff0c57..0000000000
--- a/plugins/CryptoPP/PGPw/Release8/PGPsdkW8.map
+++ /dev/null
@@ -1,216 +0,0 @@
- PGPsdkW8
-
- Timestamp is 45ddf360 (Thu Feb 22 22:47:44 2007)
-
- Preferred load address is 46800000
-
- Start Length Name Class
- 0001:00000000 00000044H .idata$5 CODE
- 0001:00000050 0000003eH .rdata CODE
- 0001:00000090 00000dd1H .text CODE
- 0001:00000e64 00000040H .didat$2 CODE
- 0001:00000ea4 00000020H .didat$3 CODE
- 0001:00000ec4 00000098H .didat$4 CODE
- 0001:00000f5c 000002d0H .didat$6 CODE
- 0001:0000122c 00000098H .didat$7 CODE
- 0001:000012c4 00000050H .idata$2 CODE
- 0001:00001314 00000014H .idata$3 CODE
- 0001:00001328 00000044H .idata$4 CODE
- 0001:0000136c 00000102H .idata$6 CODE
- 0001:00001470 00000172H .edata CODE
- 0002:00000000 00000130H .data DATA
- 0002:00000130 00000098H .didat$5 DATA
- 0002:000001c8 00000050H .bss DATA
-
- Address Publics by Value Rva+Base Lib:Object
-
- 0001:00000000 __imp__LocalAlloc@8 46801000 kernel32:KERNEL32.dll
- 0001:00000004 __imp__LocalFree@4 46801004 kernel32:KERNEL32.dll
- 0001:00000008 __imp__lstrlenA@4 46801008 kernel32:KERNEL32.dll
- 0001:0000000c __imp__GetLastError@0 4680100c kernel32:KERNEL32.dll
- 0001:00000010 __imp__RaiseException@16 46801010 kernel32:KERNEL32.dll
- 0001:00000014 __imp__InterlockedExchange@8 46801014 kernel32:KERNEL32.dll
- 0001:00000018 __imp__FreeLibrary@4 46801018 kernel32:KERNEL32.dll
- 0001:0000001c __imp__LoadLibraryA@4 4680101c kernel32:KERNEL32.dll
- 0001:00000020 __imp__GetProcAddress@8 46801020 kernel32:KERNEL32.dll
- 0001:00000024 \177KERNEL32_NULL_THUNK_DATA 46801024 kernel32:KERNEL32.dll
- 0001:00000028 __imp__memmove 46801028 msvcrt:MSVCRT.dll
- 0001:0000002c __imp___except_handler3 4680102c msvcrt:MSVCRT.dll
- 0001:00000030 \177MSVCRT_NULL_THUNK_DATA 46801030 msvcrt:MSVCRT.dll
- 0001:00000034 __imp__MessageBoxA@16 46801034 user32:USER32.dll
- 0001:00000038 \177USER32_NULL_THUNK_DATA 46801038 user32:USER32.dll
- 0001:0000003c __imp__GetOpenFileNameA@4 4680103c comdlg32:comdlg32.dll
- 0001:00000040 \177comdlg32_NULL_THUNK_DATA 46801040 comdlg32:comdlg32.dll
- 0001:00000070 __sz_PGPsdk 46801070 pgpsdk:PGPsdk.dll
- 0001:00000080 __sz_PGPsdkUI 46801080 pgpsdkui:PGPsdkUI.dll
- 0001:00000090 ?ClearPGPError@@YAXXZ 46801090 f main.obj
- 0001:00000099 ?CheckPGPError@@YA_NH@Z 46801099 f main.obj
- 0001:000000c5 __pgp_init 468010c5 f main.obj
- 0001:00000173 __pgp_done 46801173 f main.obj
- 0001:00000226 __pgp_open_keyrings 46801226 f main.obj
- 0001:000002ac __pgp_close_keyrings 468012ac f main.obj
- 0001:000002c7 __pgp_get_version 468012c7 f main.obj
- 0001:000002cd __pgp_get_error 468012cd f main.obj
- 0001:000002d3 __pgp_encrypt_keydb 468012d3 f main.obj
- 0001:000003c8 __pgp_decrypt_keydb 468013c8 f main.obj
- 0001:00000514 ?_pgp_import_key@@YAHPAPAUPGPKeyDB@@PBD@Z 46801514 f main.obj
- 0001:00000552 __pgp_encrypt_key 46801552 f main.obj
- 0001:0000069b __pgp_decrypt_key 4680169b f main.obj
- 0001:00000823 __pgp_size_keyid 46801823 f main.obj
- 0001:00000827 __pgp_select_keyid 46801827 f main.obj
- 0001:0000090a ?ShowSelectKeyringsDlg@@YAHPAUHWND__@@PAD1@Z 4680190a f main.obj
- 0001:0000097f ?dllmain@@YGHPAUHINSTANCE__@@KPAX@Z 4680197f f main.obj
- 0001:0000098e __imp_load__PGPGetErrorString 4680198e pgpsdk:PGPsdk.dll
- 0001:0000099a __tailMerge_PGPsdk 4680199a pgpsdk:PGPsdk.dll
- 0001:000009a8 _PGPGetErrorString 468019a8 pgpsdk:PGPsdk.dll
- 0001:000009ae __imp_load__PGPGetPGPsdkVersion 468019ae pgpsdk:PGPsdk.dll
- 0001:000009ba _PGPGetPGPsdkVersion 468019ba pgpsdk:PGPsdk.dll
- 0001:000009c0 __imp_load__PGPNewContext 468019c0 pgpsdk:PGPsdk.dll
- 0001:000009cc _PGPNewContext 468019cc pgpsdk:PGPsdk.dll
- 0001:000009d2 __imp_load__PGPsdkInit 468019d2 pgpsdk:PGPsdk.dll
- 0001:000009de _PGPsdkInit 468019de pgpsdk:PGPsdk.dll
- 0001:000009e4 __imp_load__PGPsdkCleanup 468019e4 pgpsdk:PGPsdk.dll
- 0001:000009f0 _PGPsdkCleanup 468019f0 pgpsdk:PGPsdk.dll
- 0001:000009f6 __imp_load__PGPFreeContext 468019f6 pgpsdk:PGPsdk.dll
- 0001:00000a02 _PGPFreeContext 46801a02 pgpsdk:PGPsdk.dll
- 0001:00000a08 __imp_load__PGPFreeKeyDB 46801a08 pgpsdk:PGPsdk.dll
- 0001:00000a14 _PGPFreeKeyDB 46801a14 pgpsdk:PGPsdk.dll
- 0001:00000a1a __imp_load__PGPFreeData 46801a1a pgpsdk:PGPsdk.dll
- 0001:00000a26 _PGPFreeData 46801a26 pgpsdk:PGPsdk.dll
- 0001:00000a2c __imp_load__PGPFreeFileSpec 46801a2c pgpsdk:PGPsdk.dll
- 0001:00000a38 _PGPFreeFileSpec 46801a38 pgpsdk:PGPsdk.dll
- 0001:00000a3e __imp_load__PGPOpenKeyDBFile 46801a3e pgpsdk:PGPsdk.dll
- 0001:00000a4a _PGPOpenKeyDBFile 46801a4a pgpsdk:PGPsdk.dll
- 0001:00000a50 __imp_load__PGPNewFileSpecFromFullPath 46801a50 pgpsdk:PGPsdk.dll
- 0001:00000a5c _PGPNewFileSpecFromFullPath 46801a5c pgpsdk:PGPsdk.dll
- 0001:00000a62 __imp_load__PGPEncode 46801a62 pgpsdk:PGPsdk.dll
- 0001:00000a6e _PGPEncode 46801a6e pgpsdk:PGPsdk.dll
- 0001:00000a74 __imp_load__PGPOInputBuffer 46801a74 pgpsdk:PGPsdk.dll
- 0001:00000a80 _PGPOInputBuffer 46801a80 pgpsdk:PGPsdk.dll
- 0001:00000a86 __imp_load__PGPOArmorOutput 46801a86 pgpsdk:PGPsdk.dll
- 0001:00000a92 _PGPOArmorOutput 46801a92 pgpsdk:PGPsdk.dll
- 0001:00000a98 __imp_load__PGPOAllocatedOutputBuffer 46801a98 pgpsdk:PGPsdk.dll
- 0001:00000aa4 _PGPOAllocatedOutputBuffer 46801aa4 pgpsdk:PGPsdk.dll
- 0001:00000aaa __imp_load__PGPOEncryptToKeyDBObj 46801aaa pgpsdk:PGPsdk.dll
- 0001:00000ab6 _PGPOEncryptToKeyDBObj 46801ab6 pgpsdk:PGPsdk.dll
- 0001:00000abc __imp_load__PGPOVersionString 46801abc pgpsdk:PGPsdk.dll
- 0001:00000ac8 _PGPOVersionString 46801ac8 pgpsdk:PGPsdk.dll
- 0001:00000ace __imp_load__PGPOLastOption 46801ace pgpsdk:PGPsdk.dll
- 0001:00000ada _PGPOLastOption 46801ada pgpsdk:PGPsdk.dll
- 0001:00000ae0 __imp_load__PGPFindKeyByKeyID 46801ae0 pgpsdk:PGPsdk.dll
- 0001:00000aec _PGPFindKeyByKeyID 46801aec pgpsdk:PGPsdk.dll
- 0001:00000af2 __imp_load__PGPDecode 46801af2 pgpsdk:PGPsdk.dll
- 0001:00000afe _PGPDecode 46801afe pgpsdk:PGPsdk.dll
- 0001:00000b04 __imp_load__PGPOKeyDBRef 46801b04 pgpsdk:PGPsdk.dll
- 0001:00000b10 _PGPOKeyDBRef 46801b10 pgpsdk:PGPsdk.dll
- 0001:00000b16 __imp_load__PGPOPassphrase 46801b16 pgpsdk:PGPsdk.dll
- 0001:00000b22 _PGPOPassphrase 46801b22 pgpsdk:PGPsdk.dll
- 0001:00000b28 __imp_load__PGPImport 46801b28 pgpsdk:PGPsdk.dll
- 0001:00000b34 _PGPImport 46801b34 pgpsdk:PGPsdk.dll
- 0001:00000b3a __imp_load__PGPFreeKeyIter 46801b3a pgpsdk:PGPsdk.dll
- 0001:00000b46 _PGPFreeKeyIter 46801b46 pgpsdk:PGPsdk.dll
- 0001:00000b4c __imp_load__PGPCountKeysInKeyDB 46801b4c pgpsdk:PGPsdk.dll
- 0001:00000b58 _PGPCountKeysInKeyDB 46801b58 pgpsdk:PGPsdk.dll
- 0001:00000b5e __imp_load__PGPKeyIterNextKeyDBObj 46801b5e pgpsdk:PGPsdk.dll
- 0001:00000b6a _PGPKeyIterNextKeyDBObj 46801b6a pgpsdk:PGPsdk.dll
- 0001:00000b70 __imp_load__PGPNewKeyIterFromKeyDB 46801b70 pgpsdk:PGPsdk.dll
- 0001:00000b7c _PGPNewKeyIterFromKeyDB 46801b7c pgpsdk:PGPsdk.dll
- 0001:00000b82 __imp_load__PGPGetKeyIDString 46801b82 pgpsdk:PGPsdk.dll
- 0001:00000b8e _PGPGetKeyIDString 46801b8e pgpsdk:PGPsdk.dll
- 0001:00000b94 __imp_load__PGPGetKeyDBObjDataProperty 46801b94 pgpsdk:PGPsdk.dll
- 0001:00000ba0 _PGPGetKeyDBObjDataProperty 46801ba0 pgpsdk:PGPsdk.dll
- 0001:00000ba6 __imp_load__PGPsdkUILibInit 46801ba6 pgpsdkui:PGPsdkUI.dll
- 0001:00000bb2 __tailMerge_PGPsdkUI 46801bb2 pgpsdkui:PGPsdkUI.dll
- 0001:00000bc0 _PGPsdkUILibInit 46801bc0 pgpsdkui:PGPsdkUI.dll
- 0001:00000bc6 __imp_load__PGPsdkUILibCleanup 46801bc6 pgpsdkui:PGPsdkUI.dll
- 0001:00000bd2 _PGPsdkUILibCleanup 46801bd2 pgpsdkui:PGPsdkUI.dll
- 0001:00000bd8 __imp_load__PGPPassphraseDialog 46801bd8 pgpsdkui:PGPsdkUI.dll
- 0001:00000be4 _PGPPassphraseDialog 46801be4 pgpsdkui:PGPsdkUI.dll
- 0001:00000bea __imp_load__PGPOUIOutputPassphrase 46801bea pgpsdkui:PGPsdkUI.dll
- 0001:00000bf6 _PGPOUIOutputPassphrase 46801bf6 pgpsdkui:PGPsdkUI.dll
- 0001:00000bfc __imp_load__PGPRecipientDialog 46801bfc pgpsdkui:PGPsdkUI.dll
- 0001:00000c08 _PGPRecipientDialog 46801c08 pgpsdkui:PGPsdkUI.dll
- 0001:00000c0e __imp_load__PGPOUIParentWindowHandle 46801c0e pgpsdkui:PGPsdkUI.dll
- 0001:00000c1a _PGPOUIParentWindowHandle 46801c1a pgpsdkui:PGPsdkUI.dll
- 0001:00000c20 __imp_load__PGPOUIWindowTitle 46801c20 pgpsdkui:PGPsdkUI.dll
- 0001:00000c2c _PGPOUIWindowTitle 46801c2c pgpsdkui:PGPsdkUI.dll
- 0001:00000c32 _GetOpenFileNameA@4 46801c32 f comdlg32:comdlg32.dll
- 0001:00000c40 __except_handler3 46801c40 f msvcrt:MSVCRT.dll
- 0001:00000c46 ___delayLoadHelper@8 46801c46 f delayimp:delayhlp.obj
- 0001:00000e64 __DELAY_IMPORT_DESCRIPTOR_PGPsdk 46801e64 pgpsdk:PGPsdk.dll
- 0001:00000e84 __DELAY_IMPORT_DESCRIPTOR_PGPsdkUI 46801e84 pgpsdkui:PGPsdkUI.dll
- 0001:00000ea4 __NULL_DELAY_IMPORT_DESCRIPTOR 46801ea4 pgpsdk:PGPsdk.dll
- 0001:00000f38 \177PGPsdk_NULL_THUNK_DATA_DLN 46801f38 pgpsdk:PGPsdk.dll
- 0001:00000f58 \177PGPsdkUI_NULL_THUNK_DATA_DLN 46801f58 pgpsdkui:PGPsdkUI.dll
- 0001:00001230 \177PGPsdk_NULL_THUNK_DATA_DLB 46802230 pgpsdk:PGPsdk.dll
- 0001:000012a8 \177PGPsdkUI_NULL_THUNK_DATA_DLB 468022a8 pgpsdkui:PGPsdkUI.dll
- 0001:000012c4 __IMPORT_DESCRIPTOR_KERNEL32 468022c4 kernel32:KERNEL32.dll
- 0001:000012d8 __IMPORT_DESCRIPTOR_USER32 468022d8 user32:USER32.dll
- 0001:000012ec __IMPORT_DESCRIPTOR_comdlg32 468022ec comdlg32:comdlg32.dll
- 0001:00001300 __IMPORT_DESCRIPTOR_MSVCRT 46802300 msvcrt:MSVCRT.dll
- 0001:00001314 __NULL_IMPORT_DESCRIPTOR 46802314 kernel32:KERNEL32.dll
- 0002:00000000 ?szModuleName@@3PBDB 46803000 commonheaders.obj
- 0002:00000004 ?szVersionStr@@3PBDB 46803004 commonheaders.obj
- 0002:00000008 ??_C@_0BG@HGBA@PGPsdk?5DLL?5?$CI1?40?41?411?$CJ?$AA@ 46803008 commonheaders.obj
- 0002:00000020 ??_C@_06DDFD@PGPsdk?$AA@ 46803020 commonheaders.obj
- 0002:00000028 ??_C@_0EB@DOFC@You?5selected?5more?5than?5one?5key?4?5@ 46803028 main.obj
- 0002:0000006c ??_C@_0BF@LLHL@Select?5Contact?8s?5Key?$AA@ 4680306c main.obj
- 0002:00000084 ??_C@_0BE@KDOJ@Open?5Secret?5Keyring?$AA@ 46803084 main.obj
- 0002:00000098 ??_C@_0EA@KJFM@Secret?5key?5rings?5?$CIsecring?4skr?$CJ?$AAs@ 46803098 main.obj
- 0002:000000d8 ??_C@_0BE@JBON@Open?5Public?5Keyring?$AA@ 468030d8 main.obj
- 0002:000000f0 ??_C@_0EA@CLAC@Public?5key?5rings?5?$CIpubring?4pkr?$CJ?$AAp@ 468030f0 main.obj
- 0002:00000130 __imp__PGPGetErrorString 46803130 pgpsdk:PGPsdk.dll
- 0002:00000134 __imp__PGPGetPGPsdkVersion 46803134 pgpsdk:PGPsdk.dll
- 0002:00000138 __imp__PGPNewContext 46803138 pgpsdk:PGPsdk.dll
- 0002:0000013c __imp__PGPsdkInit 4680313c pgpsdk:PGPsdk.dll
- 0002:00000140 __imp__PGPsdkCleanup 46803140 pgpsdk:PGPsdk.dll
- 0002:00000144 __imp__PGPFreeContext 46803144 pgpsdk:PGPsdk.dll
- 0002:00000148 __imp__PGPFreeKeyDB 46803148 pgpsdk:PGPsdk.dll
- 0002:0000014c __imp__PGPFreeData 4680314c pgpsdk:PGPsdk.dll
- 0002:00000150 __imp__PGPFreeFileSpec 46803150 pgpsdk:PGPsdk.dll
- 0002:00000154 __imp__PGPOpenKeyDBFile 46803154 pgpsdk:PGPsdk.dll
- 0002:00000158 __imp__PGPNewFileSpecFromFullPath 46803158 pgpsdk:PGPsdk.dll
- 0002:0000015c __imp__PGPEncode 4680315c pgpsdk:PGPsdk.dll
- 0002:00000160 __imp__PGPOInputBuffer 46803160 pgpsdk:PGPsdk.dll
- 0002:00000164 __imp__PGPOArmorOutput 46803164 pgpsdk:PGPsdk.dll
- 0002:00000168 __imp__PGPOAllocatedOutputBuffer 46803168 pgpsdk:PGPsdk.dll
- 0002:0000016c __imp__PGPOEncryptToKeyDBObj 4680316c pgpsdk:PGPsdk.dll
- 0002:00000170 __imp__PGPOVersionString 46803170 pgpsdk:PGPsdk.dll
- 0002:00000174 __imp__PGPOLastOption 46803174 pgpsdk:PGPsdk.dll
- 0002:00000178 __imp__PGPFindKeyByKeyID 46803178 pgpsdk:PGPsdk.dll
- 0002:0000017c __imp__PGPDecode 4680317c pgpsdk:PGPsdk.dll
- 0002:00000180 __imp__PGPOKeyDBRef 46803180 pgpsdk:PGPsdk.dll
- 0002:00000184 __imp__PGPOPassphrase 46803184 pgpsdk:PGPsdk.dll
- 0002:00000188 __imp__PGPImport 46803188 pgpsdk:PGPsdk.dll
- 0002:0000018c __imp__PGPFreeKeyIter 4680318c pgpsdk:PGPsdk.dll
- 0002:00000190 __imp__PGPCountKeysInKeyDB 46803190 pgpsdk:PGPsdk.dll
- 0002:00000194 __imp__PGPKeyIterNextKeyDBObj 46803194 pgpsdk:PGPsdk.dll
- 0002:00000198 __imp__PGPNewKeyIterFromKeyDB 46803198 pgpsdk:PGPsdk.dll
- 0002:0000019c __imp__PGPGetKeyIDString 4680319c pgpsdk:PGPsdk.dll
- 0002:000001a0 __imp__PGPGetKeyDBObjDataProperty 468031a0 pgpsdk:PGPsdk.dll
- 0002:000001a4 \177PGPsdk_NULL_THUNK_DATA_DLA 468031a4 pgpsdk:PGPsdk.dll
- 0002:000001a8 __imp__PGPsdkUILibCleanup 468031a8 pgpsdkui:PGPsdkUI.dll
- 0002:000001ac __imp__PGPPassphraseDialog 468031ac pgpsdkui:PGPsdkUI.dll
- 0002:000001b0 __imp__PGPOUIOutputPassphrase 468031b0 pgpsdkui:PGPsdkUI.dll
- 0002:000001b4 __imp__PGPRecipientDialog 468031b4 pgpsdkui:PGPsdkUI.dll
- 0002:000001b8 __imp__PGPOUIParentWindowHandle 468031b8 pgpsdkui:PGPsdkUI.dll
- 0002:000001bc __imp__PGPOUIWindowTitle 468031bc pgpsdkui:PGPsdkUI.dll
- 0002:000001c0 __imp__PGPsdkUILibInit 468031c0 pgpsdkui:PGPsdkUI.dll
- 0002:000001c4 \177PGPsdkUI_NULL_THUNK_DATA_DLA 468031c4 pgpsdkui:PGPsdkUI.dll
- 0002:000001c8 ?g_hInst@@3PAUHINSTANCE__@@A 468031c8 commonheaders.obj
- 0002:000001f0 ?pgpVer@@3IA 468031f0 main.obj
- 0002:000001f4 ?pgpContext@@3PAUPGPContext@@A 468031f4 main.obj
- 0002:000001f8 ?pgpKeyDB@@3PAUPGPKeyDB@@A 468031f8 main.obj
- 0002:000001fc ?pszPassphrase@@3PADA 468031fc main.obj
- 0002:00000200 ?pgpErrMsg@@3PADA 46803200 main.obj
- 0002:00000204 __hmod__PGPSDK 46803204 pgpsdk:PGPsdk.dll
- 0002:00000208 __hmod__PGPSDKUI 46803208 pgpsdkui:PGPsdkUI.dll
- 0002:0000020c ___puiHead 4680320c delayimp:delayhlp.obj
- 0002:00000210 ___pfnDliFailureHook 46803210 delayimp:delayhk1.obj
- 0002:00000214 ___pfnDliNotifyHook 46803214 delayimp:delayhk2.obj
-
- entry point at 0000:00000000
-
- Static symbols
-
- 0001:00000e3f ?OverlayIAT@@YGXPAU_IMAGE_THUNK_DATA32@@PBU1@@Z 46801e3f f delayimp:delayhlp.obj
diff --git a/plugins/CryptoPP/PGPw/commonheaders.cpp b/plugins/CryptoPP/PGPw/commonheaders.cpp
deleted file mode 100644
index 763395fcd6..0000000000
--- a/plugins/CryptoPP/PGPw/commonheaders.cpp
+++ /dev/null
@@ -1,5 +0,0 @@
-#include "commonheaders.h"
-
-LPCSTR szModuleName = MODULENAME;
-LPCSTR szVersionStr = MODULENAME" DLL ("__VERSION_STRING")";
-HINSTANCE g_hInst;
diff --git a/plugins/CryptoPP/PGPw/commonheaders.h b/plugins/CryptoPP/PGPw/commonheaders.h
deleted file mode 100644
index 8c79d2ec5c..0000000000
--- a/plugins/CryptoPP/PGPw/commonheaders.h
+++ /dev/null
@@ -1,64 +0,0 @@
-// Windows API
-
-#pragma once
-//#define WIN32_LEAN_AND_MEAN
-//#pragma warning(disable: 4078)
-
-#include <windows.h>
-//#include <afxwin.h>
-#include <commdlg.h>
-#include "..\version.h"
-
-#pragma comment(linker,"/merge:.rdata=.text")
-#pragma comment(linker,"/entry:dllmain")
-#pragma comment(linker,"/nodefaultlib")
-#pragma comment(linker,"/subsystem:windows")
-#pragma optimize("gsy", on)
-
-// PGP API
-#ifndef PGP_WIN32
-#error Define PGP_WIN32 to SDK version (e.g. 0x658)
-#endif
-
-#include <pgpEncode.h>
-#include <pgpErrors.h>
-#include <pgpKeys.h>
-#include <pgpOptionList.h>
-#include <pgpUserInterface.h>
-#include <pgpUtilities.h>
-#include <pgpFeatures.h>
-
-
-#define MODULENAME "PGPsdk"
-BOOL ShowSelectKeyringsDlg(HWND,LPSTR,LPSTR);
-
-extern LPCSTR szModuleName;
-extern LPCSTR szVersionStr;
-extern HINSTANCE g_hInst;
-
-
-#define DLLEXPORT __declspec(dllexport)
-
-extern "C" DLLEXPORT int __cdecl _pgp_init(void);
-extern "C" DLLEXPORT int __cdecl _pgp_done(void);
-extern "C" DLLEXPORT int __cdecl _pgp_open_keyrings(LPSTR,LPSTR);
-extern "C" DLLEXPORT int __cdecl _pgp_close_keyrings(void);
-extern "C" DLLEXPORT int __cdecl _pgp_get_version(void);
-extern "C" DLLEXPORT LPSTR __cdecl _pgp_get_error(void);
-extern "C" DLLEXPORT int __cdecl _pgp_size_keyid(void);
-extern "C" DLLEXPORT PVOID __cdecl _pgp_select_keyid(HWND,LPSTR);
-extern "C" DLLEXPORT LPSTR __cdecl _pgp_encrypt_keydb(LPCSTR,PVOID);
-extern "C" DLLEXPORT LPSTR __cdecl _pgp_decrypt_keydb(LPCSTR);
-//extern "C" DLLEXPORT int __cdecl _pgp_check_key(LPCSTR);
-extern "C" DLLEXPORT LPSTR __cdecl _pgp_encrypt_key(LPCSTR,LPCSTR);
-extern "C" DLLEXPORT LPSTR __cdecl _pgp_decrypt_key(LPCSTR,LPCSTR);
-
-/*
-#undef RtlMoveMemory
-#undef RtlFillMemory
-#undef RtlZeroMemory
-
-NTSYSAPI VOID NTAPI RtlMoveMemory(VOID UNALIGNED *Destination, CONST VOID UNALIGNED *Source, SIZE_T Length);
-NTSYSAPI VOID NTAPI RtlFillMemory(VOID UNALIGNED *Destination, SIZE_T Length, BYTE Fill);
-NTSYSAPI VOID NTAPI RtlZeroMemory(VOID UNALIGNED *Destination, SIZE_T Length);
-*/
diff --git a/plugins/CryptoPP/PGPw/main.cpp b/plugins/CryptoPP/PGPw/main.cpp
deleted file mode 100644
index 8427046a16..0000000000
--- a/plugins/CryptoPP/PGPw/main.cpp
+++ /dev/null
@@ -1,584 +0,0 @@
-#include "commonheaders.h"
-
-// pgpsdk.lib pgpsdknl.lib pgpsdkui.lib libcmt.lib
-// /delayload:pgpsdk.dll,pgpsdknl.dll,pgpsdkui.dll
-
-PGPContextRef pgpContext;
-#if (PGP_WIN32 < 0x700)
-PGPKeySetRef pgpKeyDB = 0;
-#else
-PGPKeyDBRef pgpKeyDB = 0;
-#endif
-LPSTR pszPassphrase = 0;
-LPSTR pgpErrMsg = 0;
-#define pgpErrMsgLen 512
-UINT pgpVer;
-
-
-void ClearPGPError()
-{
- *pgpErrMsg = '\0';
-}
-
-
-bool CheckPGPError(PGPError err)
-{
- if (IsPGPError(err)) {
- PGPSize ErrMsgLen = pgpErrMsgLen;
- PGPGetErrorString(err, ErrMsgLen, pgpErrMsg);
- return 1;
- }
- else {
- *pgpErrMsg = '\0';
- return 0;
- }
-}
-
-#define _pgp_memcpy memmove
-/*
-void _pgp_memcpy(LPSTR dst, LPSTR src, UINT size)
-{
- for(UINT i=0;i<size;i++)
- dst[i]=src[i];
-}
-*/
-
-int __cdecl _pgp_init()
-{
- if (!pgpErrMsg)
- pgpErrMsg = (LPSTR) LocalAlloc(LPTR,pgpErrMsgLen);
-
- pgpVer = 0;
-
- __try {
-#if (PGP_WIN32 < 0x700)
- if (CheckPGPError(PGPsdkInit()) || CheckPGPError(PGPsdkUILibInit())) return 0;
- PGPNewContext(kPGPsdkAPIVersion, &pgpContext);
-#else
- if (CheckPGPError(PGPsdkInit(0)) || CheckPGPError(PGPsdkUILibInit(0))) return 0;
- PGPNewContext(kPGPsdk20APIVersion, &pgpContext);
-#endif
- }
- __except ( EXCEPTION_EXECUTE_HANDLER ) {
- return 0;
- }
-
-#if (PGP_WIN32 < 0x700)
- PGPGetSDKVersion(&pgpVer);
- int minor = (pgpVer & 0x000FF000 ) >> 12;
- switch(PGPMajorVersion(pgpVer)) {
- case 2:
- pgpVer = 1<<24 | ((minor+1)<<16) | (PGPRevVersion(pgpVer)<<8);
- break;
- case 3:
- pgpVer = 1<<24 | ((minor+5)<<16) | (PGPRevVersion(pgpVer)<<8);
- break;
- default:
- pgpVer = 1<<24 | (minor<<16) | (PGPRevVersion(pgpVer)<<8);
- break;
- }
-#else
- pgpVer = PGPGetPGPsdkVersion();
-#endif
-
- return 1;
-}
-
-
-int __cdecl _pgp_done()
-{
- pgpVer = 0;
- __try {
- if(pgpErrMsg) LocalFree(pgpErrMsg);
- if (pszPassphrase) PGPFreeData(pszPassphrase);
-#if (PGP_WIN32 < 0x700)
- if (pgpKeyDB) PGPFreeKeySet(pgpKeyDB);
-#else
- if (pgpKeyDB) PGPFreeKeyDB(pgpKeyDB);
-#endif
- PGPFreeContext(pgpContext);
- PGPsdkUILibCleanup();
- PGPsdkCleanup();
- pszPassphrase = pgpErrMsg = 0;
- pgpKeyDB = 0;
- pgpContext = 0;
- }
- __except ( EXCEPTION_EXECUTE_HANDLER ) {
- return 0;
- }
- return 1;
-}
-
-
-int __cdecl _pgp_open_keyrings(LPSTR PubRingPath, LPSTR SecRingPath)
-{
- _pgp_close_keyrings();
-
-#if (PGP_WIN32 < 0x700)
- PGPError err = PGPOpenDefaultKeyRings(pgpContext, kPGPKeyRingOpenFlags_None, &pgpKeyDB);
-#else
- if ((!PubRingPath || !*PubRingPath) && !ShowSelectKeyringsDlg(0,PubRingPath,SecRingPath)) {
- return 0;
- }
-
- PGPFileSpecRef PubKeyRing, SecKeyRing;
- PGPNewFileSpecFromFullPath(pgpContext, PubRingPath, &PubKeyRing);
- PGPNewFileSpecFromFullPath(pgpContext, SecRingPath, &SecKeyRing);
-
- PGPError err = PGPOpenKeyDBFile(pgpContext, kPGPOpenKeyDBFileOptions_None, PubKeyRing, SecKeyRing, &pgpKeyDB);
- PGPFreeFileSpec(SecKeyRing);
- PGPFreeFileSpec(PubKeyRing);
-#endif
- if (CheckPGPError(err)) {
- return 0;
- }
- return 1;
-}
-
-
-int __cdecl _pgp_close_keyrings()
-{
-#if (PGP_WIN32 < 0x700)
- if (pgpKeyDB) {
- PGPFreeKeySet(pgpKeyDB);
- pgpKeyDB = 0;
- }
-#else
- if (pgpKeyDB) {
- PGPFreeKeyDB(pgpKeyDB);
- pgpKeyDB = 0;
- }
-#endif
- return 1;
-}
-
-
-int __cdecl _pgp_get_version()
-{
- return pgpVer;
-}
-
-
-LPSTR __cdecl _pgp_get_error()
-{
- return pgpErrMsg;
-}
-
-
-LPSTR __cdecl _pgp_encrypt_keydb(LPCSTR szPlainMsg, PVOID pgpKeyID)
-{
- PGPKeyID *RemoteKeyID = (PGPKeyID *) pgpKeyID;
- LPSTR szEncMsg = 0;
- DWORD dwEncMsgLen;
-
- ClearPGPError();
- if (!pgpKeyDB)
- return 0;
-
-#if (PGP_WIN32 < 0x700)
- PGPFilterRef IDFilter;
- PGPNewKeyIDFilter(pgpContext, RemoteKeyID, &IDFilter);
-
- PGPKeySetRef PublicKey;
- PGPFilterKeySet(pgpKeyDB, IDFilter, &PublicKey);
-#else
- PGPKeyDBObjRef PublicKey;
- PGPFindKeyByKeyID(pgpKeyDB, RemoteKeyID, &PublicKey);
-#endif
-
- PGPError err = PGPEncode(pgpContext,
- PGPOInputBuffer(pgpContext, szPlainMsg, lstrlen(szPlainMsg)),
- PGPOArmorOutput(pgpContext, TRUE),
- PGPOAllocatedOutputBuffer(pgpContext, (LPVOID *)&szEncMsg, 16384, (PGPUInt32 *)&dwEncMsgLen),
-#if (PGP_WIN32 < 0x700)
- PGPOEncryptToKeySet(pgpContext, PublicKey),
-#else
- PGPOEncryptToKeyDBObj(pgpContext, PublicKey),
-#endif
- PGPOVersionString(pgpContext, szVersionStr),
- PGPOLastOption(pgpContext));
-
-#if (PGP_WIN32 < 0x700)
- PGPFreeKeySet(PublicKey);
- PGPFreeFilter(IDFilter);
-#endif
-
- if (CheckPGPError(err))
- return 0;
-
- LPSTR szMsg = (LPSTR) LocalAlloc(LPTR,dwEncMsgLen+1);
- _pgp_memcpy(szMsg, szEncMsg, dwEncMsgLen);
- szMsg[dwEncMsgLen] = 0;
- PGPFreeData((LPVOID)szEncMsg);
-
- return szMsg;
-}
-
-
-LPSTR __cdecl _pgp_decrypt_keydb(LPCSTR szEncMsg)
-{
- LPSTR szPlainMsg = 0;
- DWORD dwPlainMsgLen;
-
- ClearPGPError();
- if (!pgpKeyDB)
- return 0;
-
- int iTry = 0;
-
- do {
- if (!pszPassphrase &&
- PGPPassphraseDialog(pgpContext,
- PGPOUIOutputPassphrase(pgpContext, &pszPassphrase),
- PGPOLastOption(pgpContext)) == kPGPError_UserAbort) {
- iTry = 3;
- break;
- }
-
- PGPError err = PGPDecode(pgpContext,
- PGPOInputBuffer(pgpContext, szEncMsg, lstrlen(szEncMsg)),
- PGPOAllocatedOutputBuffer(pgpContext, (LPVOID *)&szPlainMsg, 16384, (PGPUInt32 *)&dwPlainMsgLen),
-#if (PGP_WIN32 < 0x700)
- PGPOKeySetRef(pgpContext, pgpKeyDB),
-#else
- PGPOKeyDBRef(pgpContext, pgpKeyDB),
-#endif
- PGPOPassphrase(pgpContext, pszPassphrase),
- PGPOLastOption(pgpContext));
-
- if (CheckPGPError(err))
- iTry = 3;
- else
- if (!dwPlainMsgLen) {
- PGPFreeData(pszPassphrase);
- pszPassphrase = 0;
- iTry++;
- }
-
- } while(!dwPlainMsgLen && iTry<3);
-
- if(iTry == 3) return 0;
-
- LPSTR szMsg = (LPSTR) LocalAlloc(LPTR,dwPlainMsgLen+1);
- _pgp_memcpy(szMsg, szPlainMsg, dwPlainMsgLen);
- szMsg[dwPlainMsgLen] = 0;
- PGPFreeData((LPVOID)szPlainMsg);
-
- return szMsg;
-}
-
-
-#if (PGP_WIN32 < 0x700)
-PGPError _pgp_import_key(PGPKeySetRef *keySet, LPCSTR pgpKey)
-{
- return PGPImportKeySet( pgpContext,
- keySet,
- PGPOInputBuffer( pgpContext,
- pgpKey,
- lstrlen(pgpKey) ),
- PGPOLastOption( pgpContext ) );
-}
-#else
-PGPError _pgp_import_key(PGPKeyDBRef *keyDB, LPCSTR pgpKey)
-{
- return PGPImport( pgpContext,
- keyDB,
- PGPOInputBuffer( pgpContext,
- pgpKey,
- lstrlen(pgpKey) ),
- PGPOLastOption( pgpContext ) );
-}
-#endif
-
-/*
-int __cdecl _pgp_check_key(LPCSTR pgpKey)
-{
-#if (PGP_WIN32 < 0x700)
- PGPKeySetRef PrivateKey;
- if (CheckPGPError(_pgp_import_key(&PrivateKey,pgpKey)))
- return 0;
- PGPFreeKeySet(PrivateKey);
-#else
- PGPKeyDBRef PrivateKey;
- if (CheckPGPError(_pgp_import_key(&PrivateKey,pgpKey)))
- return 0;
- PGPFreeKeyDB(PrivateKey);
-#endif
- return 1;
-}
-*/
-
-LPSTR __cdecl _pgp_encrypt_key(LPCSTR szPlainMsg, LPCSTR pgpKey)
-{
- LPSTR szEncMsg = 0;
- DWORD dwEncMsgLen;
-
- PGPUInt32 dwKeys;
-#if (PGP_WIN32 < 0x700)
- PGPKeySetRef PublicKey;
- if (CheckPGPError(_pgp_import_key(&PublicKey,pgpKey)))
- return 0;
- PGPCountKeys(PublicKey, &dwKeys);
-#else
- PGPKeyDBRef PublicKeyDB;
- if (CheckPGPError(_pgp_import_key(&PublicKeyDB,pgpKey)))
- return 0;
-
- PGPKeyIterRef KeyIterRef;
- PGPNewKeyIterFromKeyDB(PublicKeyDB, &KeyIterRef);
-
- PGPKeyDBObjRef PublicKey;
- PGPKeyIterNextKeyDBObj(KeyIterRef, kPGPKeyDBObjType_Key, &PublicKey);
-
- PGPCountKeysInKeyDB(PublicKeyDB, &dwKeys);
-#endif
- if(dwKeys==0) {
-#if (PGP_WIN32 < 0x700)
- PGPFreeKeySet(PublicKey);
-#else
- PGPFreeKeyIter(KeyIterRef);
- PGPFreeKeyDB(PublicKeyDB);
-#endif
- return 0;
- }
-
- PGPError err = PGPEncode(pgpContext,
- PGPOInputBuffer(pgpContext, szPlainMsg, lstrlen(szPlainMsg)),
- PGPOArmorOutput(pgpContext, TRUE),
- PGPOAllocatedOutputBuffer(pgpContext, (LPVOID *)&szEncMsg, 16384, (PGPUInt32 *)&dwEncMsgLen),
-#if (PGP_WIN32 < 0x700)
- PGPOEncryptToKeySet(pgpContext, PublicKey),
-#else
- PGPOEncryptToKeyDBObj(pgpContext, PublicKey),
-#endif
- PGPOVersionString(pgpContext, szVersionStr),
- PGPOLastOption(pgpContext));
-
-#if (PGP_WIN32 < 0x700)
- PGPFreeKeySet(PublicKey);
-#else
- PGPFreeKeyIter(KeyIterRef);
- PGPFreeKeyDB(PublicKeyDB);
-#endif
-
- if (CheckPGPError(err))
- return 0;
-
- LPSTR szMsg = (LPSTR) LocalAlloc(LPTR,dwEncMsgLen+1);
- _pgp_memcpy(szMsg, szEncMsg, dwEncMsgLen);
- szMsg[dwEncMsgLen] = 0;
- PGPFreeData((LPVOID)szEncMsg);
-
- return szMsg;
-}
-
-
-LPSTR __cdecl _pgp_decrypt_key(LPCSTR szEncMsg, LPCSTR pgpKey)
-{
- LPSTR szPlainMsg = 0;
- DWORD dwPlainMsgLen;
-
- PGPUInt32 dwKeys;
-#if (PGP_WIN32 < 0x700)
- PGPKeySetRef PrivateKeyDB;
- if (CheckPGPError(_pgp_import_key(&PrivateKeyDB,pgpKey)))
- return 0;
- PGPCountKeys(PrivateKeyDB, &dwKeys);
-#else
- PGPKeyDBRef PrivateKeyDB;
- if (CheckPGPError(_pgp_import_key(&PrivateKeyDB,pgpKey)))
- return 0;
- PGPCountKeysInKeyDB(PrivateKeyDB, &dwKeys);
-#endif
- if(dwKeys==0) {
-#if (PGP_WIN32 < 0x700)
- PGPFreeKeySet(PrivateKeyDB);
-#else
- PGPFreeKeyDB(PrivateKeyDB);
-#endif
- return 0;
- }
-
- int iTry = 0;
-
- do {
- if (!pszPassphrase &&
- PGPPassphraseDialog(pgpContext,
- PGPOUIOutputPassphrase(pgpContext, &pszPassphrase),
- PGPOLastOption(pgpContext)) == kPGPError_UserAbort) {
- iTry = 3;
- break;
- }
-
-/*
-#if (PGP_WIN32 < 0x700)
- PGPKeyListRef PrivateKeyList;
- PGPOrderKeySet(PrivateKeyDB, kPGPKeyIDOrdering, &PrivateKeyList);
-
- PGPKeyIterRef KeyIterRef;
- PGPNewKeyIter(PrivateKeyList, &KeyIterRef);
-
- PGPKeyRef PrivateKey;
- for(int i=0;i<dwKeys;i++) {
- PGPKeyIterNext(KeyIterRef, &PrivateKey);
- PGPOPassphraseIsValid(PrivateKey,
- PGPOPassphrase(pgpContext, pszPassphrase),
- PGPOLastOption(pgpContext));
- }
-
- PGPFreeKeyList(PrivateKeyList);
- PGPFreeKeyIter(KeyIterRef);
-#else
- PGPKeyIterRef KeyIterRef;
- PGPNewKeyIterFromKeyDB(PrivateKeyDB, &KeyIterRef);
-
- PGPKeyDBObjRef KeyDBObjRef;
- for(int i=0;i<dwKeys;i++) {
- PGPKeyIterNextKeyDBObj(KeyIterRef, kPGPKeyDBObjType_Key, &KeyDBObjRef);
- PGPOPassphraseIsValid(PrivateKey,
- PGPOPassphrase(pgpContext, pszPassphrase),
- PGPOLastOption(pgpContext));
- }
-
- PGPFreeKeyIter(KeyIterRef);
-#endif
-*/
- PGPError err = PGPDecode(pgpContext,
- PGPOInputBuffer(pgpContext, szEncMsg, lstrlen(szEncMsg)),
- PGPOAllocatedOutputBuffer(pgpContext, (LPVOID *)&szPlainMsg, 16384, (PGPUInt32 *)&dwPlainMsgLen),
-#if (PGP_WIN32 < 0x700)
- PGPOKeySetRef(pgpContext, PrivateKeyDB),
-#else
- PGPOKeyDBRef(pgpContext, PrivateKeyDB),
-#endif
- PGPOPassphrase(pgpContext, pszPassphrase),
- PGPOLastOption(pgpContext));
-
- if (CheckPGPError(err))
- iTry = 3;
- else
- if (!dwPlainMsgLen) {
- PGPFreeData(pszPassphrase);
- pszPassphrase = 0;
- iTry++;
- }
-
- } while(!dwPlainMsgLen && iTry<3);
-
-#if (PGP_WIN32 < 0x700)
- PGPFreeKeySet(PrivateKeyDB);
-#else
- PGPFreeKeyDB(PrivateKeyDB);
-#endif
-
- if(iTry == 3) return 0;
-
- LPSTR szMsg = (LPSTR) LocalAlloc(LPTR,dwPlainMsgLen+1);
- _pgp_memcpy(szMsg, szPlainMsg, dwPlainMsgLen);
- szMsg[dwPlainMsgLen] = 0;
- PGPFreeData((LPVOID)szPlainMsg);
-
- return szMsg;
-}
-
-
-int __cdecl _pgp_size_keyid()
-{
- return sizeof(PGPKeyID);
-}
-
-
-PVOID __cdecl _pgp_select_keyid(HWND hDlg,LPSTR szKeyID)
-{
-#if (PGP_WIN32 < 0x700)
- PGPKeySetRef ContactKeyDB;
-#else
- PGPKeyDBRef ContactKeyDB;
-#endif
- PGPError err;
- err = PGPRecipientDialog(pgpContext, pgpKeyDB, TRUE, &ContactKeyDB,
- PGPOUIParentWindowHandle(pgpContext, hDlg),
- PGPOUIWindowTitle(pgpContext, "Select Contact's Key"),
- PGPOLastOption(pgpContext));
- if (err == kPGPError_UserAbort)
- return 0;
-
- PGPUInt32 dwKeys;
-#if (PGP_WIN32 < 0x700)
- PGPCountKeys(ContactKeyDB, &dwKeys);
-#else
- PGPCountKeysInKeyDB(ContactKeyDB, &dwKeys);
-#endif
- if (!dwKeys) {
- return 0;
- } else if (dwKeys > 1)
- MessageBox(hDlg, "You selected more than one key. Only the first key will be used.", szModuleName, MB_ICONINFORMATION);
-
- static PGPKeyID KeyID;
-
-#if (PGP_WIN32 < 0x700)
- PGPKeyListRef ContactKeyList;
- PGPOrderKeySet(ContactKeyDB, kPGPKeyIDOrdering, &ContactKeyList);
-
- PGPKeyIterRef KeyIterRef;
- PGPNewKeyIter(ContactKeyList, &KeyIterRef);
-
- PGPKeyRef ContactKey;
- PGPKeyIterNext(KeyIterRef, &ContactKey);
-
- PGPGetKeyIDFromKey(ContactKey, &KeyID);
- PGPGetKeyIDString(&KeyID, kPGPKeyIDString_Abbreviated, szKeyID);
-
- PGPFreeKeyList(ContactKeyList);
- PGPFreeKeyIter(KeyIterRef);
- PGPFreeKeySet(ContactKeyDB);
-#else
- PGPKeyIterRef KeyIterRef;
- PGPNewKeyIterFromKeyDB(ContactKeyDB, &KeyIterRef);
-
- PGPKeyDBObjRef KeyDBObjRef;
- PGPKeyIterNextKeyDBObj(KeyIterRef, kPGPKeyDBObjType_Key, &KeyDBObjRef);
-
- PGPSize dwFilled;
- PGPGetKeyDBObjDataProperty(KeyDBObjRef, kPGPKeyProperty_KeyID, &KeyID, sizeof(PGPKeyID), &dwFilled);
- PGPGetKeyIDString(&KeyID, kPGPKeyIDString_Abbreviated, szKeyID);
-
- PGPFreeKeyIter(KeyIterRef);
- PGPFreeKeyDB(ContactKeyDB);
-#endif
-
- return (PVOID)&KeyID;
-}
-
-
-#if (PGP_WIN32 >= 0x700)
-BOOL ShowSelectKeyringsDlg(HWND hParent, LPSTR PubRingPath, LPSTR SecRingPath)
-{
- // set keyring paths
- OPENFILENAME ofn={0};
- ofn.lStructSize = sizeof(ofn);
- ofn.hwndOwner = hParent;
- ofn.nMaxFile = MAX_PATH;
- ofn.Flags = OFN_EXPLORER | OFN_FILEMUSTEXIST | OFN_NONETWORKBUTTON;
-
- ofn.lpstrFile = PubRingPath;
- ofn.lpstrFilter = "Public key rings (pubring.pkr)\0pubring.pkr\0All files (*.*)\0*.*\0";
- ofn.lpstrTitle = "Open Public Keyring";
- if (!GetOpenFileName(&ofn)) return FALSE;
-
- ofn.lpstrFile = SecRingPath;
- ofn.lpstrFilter = "Secret key rings (secring.skr)\0secring.skr\0All files (*.*)\0*.*\0";
- ofn.lpstrTitle = "Open Secret Keyring";
- if (!GetOpenFileName(&ofn)) return FALSE;
-
- return TRUE;
-}
-#endif
-
-
-// dllmain
-BOOL WINAPI dllmain(HINSTANCE hInst, DWORD dwReason, LPVOID) {
- g_hInst = hInst;
- return TRUE;
-}
-
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpBase.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpBase.h
deleted file mode 100644
index 7e460c800a..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpBase.h
+++ /dev/null
@@ -1,270 +0,0 @@
-/*____________________________________________________________________________
- pgpBase.h
-
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- This file deals with system dependencies to derive our very basic data
- types. It should not contain any higher level types.
-
- $Id: pgpBase.h,v 1.27.16.1 1999/08/04 18:35:43 sluu Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpBase_h /* [ */
-#define Included_pgpBase_h
-
-#include "pgpPFLConfig.h"
-
-
-#include <stddef.h>
-
-
-
-#if !( defined(PGP_MACINTOSH) || defined(PGP_UNIX) || defined(PGP_WIN32) )
-#error one of {PGP_MACINTOSH, PGP_UNIX, PGP_WIN32} must be defined
-#endif
-
-#if PGP_MACINTOSH
-#include <stddef.h>
-#if __MWERKS__ && ! defined( __dest_os )
- #include <ansi_parms.h>
- #define __dest_os __mac_os
-#endif
-#else
- /* aCC bars on <sys/time.h> if this file is not included first */
- #if PGP_COMPILER_HPUX
- #include <sys/sigevent.h>
- #endif /* PGP_COMPILER_HPUX */
- #include <sys/types.h>
-#endif
-
-#if PGP_WIN32
-#include <stddef.h> /* For size_t */
-#endif
-
-#if ! NO_LIMITS_H
-#include <limits.h>
-#endif
-
-
-/*____________________________________________________________________________
- PGP basic types
-____________________________________________________________________________*/
-
-typedef unsigned char PGPBoolean; /* can be TRUE or FALSE */
-#ifndef TRUE
-#define TRUE 1
-#endif
-#ifndef FALSE
-#define FALSE 0
-#endif
-
-
-/* PGPUInt8, PGPInt8 */
-#if UCHAR_MAX == 0xff
-
-typedef unsigned char PGPUInt8;
-typedef signed char PGPInt8;
-#define MAX_PGPUInt8 UCHAR_MAX
-#define MAX_PGPInt8 SCHAR_MAX
-
-#else
-#error This machine has no 8-bit type
-#endif
-
-
-/* PGPUInt16, PGPInt16 */
-#if UINT_MAX == 0xffff
-
-typedef unsigned int PGPUInt16;
-typedef int PGPInt16;
-#define MAX_PGPUInt16 UINT_MAX
-#define MAX_PGPInt16 INT_MAX
-
-#elif USHRT_MAX == 0xffff
-
-typedef unsigned short PGPUInt16;
-typedef short PGPInt16;
-#define MAX_PGPUInt16 USHRT_MAX
-#define MAX_PGPInt16 SHRT_MAX
-
-#else
-#error This machine has no 16-bit type
-#endif
-
-
-/* PGPUInt32, PGPInt32 */
-#if UINT_MAX == 0xfffffffful
-
-typedef unsigned int PGPUInt32;
-typedef int PGPInt32;
-#define MAX_PGPUInt32 UINT_MAX
-#define MAX_PGPInt32 INT_MAX
-
-#elif ULONG_MAX == 0xfffffffful
-
-typedef unsigned long PGPUInt32;
-typedef long PGPInt32;
-#define MAX_PGPUInt32 ULONG_MAX
-#define MAX_PGPInt32 LONG_MAX
-
-#elif USHRT_MAX == 0xfffffffful
-
-typedef unsigned short PGPUInt32;
-typedef short PGPInt32;
-#define MAX_PGPUInt32 USHRT_MAX
-#define MAX_PGPInt32 SHRT_MAX
-
-#else
-#error This machine has no 32-bit type
-#endif
-
-
-/*____________________________________________________________________________
- PGPUInt64, PGPInt64
-
- Find a 64-bit data type, if possible.
- The conditions here are more complicated to avoid using numbers that
- will choke lesser preprocessors (like 0xffffffffffffffff) unless
- we're reasonably certain that they'll be acceptable.
-
- Some *preprocessors* choke on constants that long even if the
- compiler can accept them, so it doesn't work reliably to test values.
- So cross our fingers and hope that it's a 64-bit type.
-
- GCC uses ULONG_LONG_MAX. Solaris uses ULLONG_MAX.
- IRIX uses ULONGLONG_MAX. Are there any other names for this?
-____________________________________________________________________________*/
-#if ULONG_MAX > 0xfffffffful
-#if ULONG_MAX == 0xfffffffffffffffful
-
-typedef ulong PGPUInt64;
-typedef long PGPInt64;
-#define PGP_HAVE64 1
-
-#endif
-#endif
-
-
-#ifndef PGP_HAVE64
-
-#if defined(ULONG_LONG_MAX) || defined (ULLONG_MAX) || defined(ULONGLONG_MAX)
-typedef unsigned long long PGPUInt64;
-typedef long long PGPInt64;
-#define PGP_HAVE64 1
-
-#endif
-#endif
-
-
-#ifndef PGP_HAVE64
-#if defined(__MWERKS__)
-#if __option( longlong )
-
-typedef unsigned long long PGPUInt64;
-typedef long long PGPInt64;
-#define PGP_HAVE64 1
-
-#endif
-#endif
-#endif
-
-#if PGP_HAVE64
-/* too painful to test all the variants above, so just do it this way */
-#define MAX_PGPUInt64 ((PGPUInt64)0xfffffffffffffffful)
-#define MAX_PGPInt64 ((PGPInt64)0x7fffffffffffffff)
-#endif
-
-
-#if INT_MAX == 0x7FFFFFFFL
-#define PGPENUM_TYPEDEF( enumName, typeName ) typedef enum enumName typeName
-#else
-#define PGPENUM_TYPEDEF( enumName, typeName ) typedef PGPInt32 typeName
-#endif
-#define kPGPEnumMaxValue INT_MAX
-
-#define PGP_ENUM_FORCE( enumName ) \
- k ## enumName ## force = kPGPEnumMaxValue
-
-
-typedef PGPUInt8 PGPByte;
-
-typedef PGPInt32 PGPError;
-
-/* a simple value sufficient to hold any numeric or pointer type */
-typedef void * PGPUserValue;
-
-/* A PGPSize refers to in memory sizes. Use PGPFileOffset for file offsets */
-#if PGP_UNIX_HPUX
-/* HPUX has conflicting types for size_t. This forces a PGPSize to
- * always be the same type. */
-typedef unsigned long PGPSize;
-#else
-typedef size_t PGPSize;
-#endif
-
-#define MAX_PGPSize ( ~(PGPSize)0 )
-
-/* An offset or size of a file */
-#if PGP_UNIX
-typedef off_t PGPFileOffset;
-#else
-#if PGP_HAVE64
-typedef PGPInt64 PGPFileOffset;
-#else
-typedef PGPInt32 PGPFileOffset;
-#endif
-#endif
-
-typedef PGPUInt32 PGPFlags;
-typedef PGPUInt32 PGPTime;
-typedef PGPUInt32 PGPTimeInterval; /* In milliseconds */
-
-typedef struct PGPVersion
-{
- PGPUInt16 majorVersion;
- PGPUInt16 minorVersion;
-
-} PGPVersion;
-
-/*____________________________________________________________________________
- These macros should surround all C declarations in public
- header files which define function or data symbols.
-____________________________________________________________________________*/
-
-#ifdef __cplusplus /* [ */
-
-#define PGP_BEGIN_C_DECLARATIONS extern "C" {
-#define PGP_END_C_DECLARATIONS }
-
-#else /* ] __cplusplus [ */
-
-#define PGP_BEGIN_C_DECLARATIONS
-#define PGP_END_C_DECLARATIONS
-
-#endif /* ] __cplusplus */
-
-
-
-
-#ifndef pgpMin
-#define pgpMin(x,y) (((x)<(y)) ? (x) : (y))
-#endif
-
-#ifndef pgpMax
-#define pgpMax(x,y) (((x)>(y)) ? (x) : (y))
-#endif
-
-#ifndef PGP_DEPRECATED
-#define PGP_DEPRECATED 1
-#endif
-
-#endif /* ] Included_pgpBase_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpBigNum.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpBigNum.h
deleted file mode 100644
index 81c6b17429..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpBigNum.h
+++ /dev/null
@@ -1,208 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- $Id: pgpBigNum.h,v 1.9 1999/03/10 02:47:07 heller Exp $
-____________________________________________________________________________*/
-
-
-#ifndef Included_pgpBigNum_h
-#define Included_pgpBigNum_h
-
-#include "pgpBase.h"
-
-#include "pgpUtilities.h"
-
-#include "pgpMemoryMgr.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-
-typedef struct PGPBigNum * PGPBigNumRef;
-#define kPGPInvalidBigNumRef ( (PGPBigNumRef)NULL )
-
-
-/* Creates a new bignum, secure, or plain s*/
-PGPError PGPNewBigNum( PGPMemoryMgrRef mgr,
- PGPBoolean secure, PGPBigNumRef *newBN );
-
-/* destoys the bignum and all memory it uses */
-PGPError PGPFreeBigNum( PGPBigNumRef bn );
-
-
-/* Create a new big num with same value as src */
-PGPError PGPCopyBigNum( PGPBigNumRef src, PGPBigNumRef * dest );
-
-/* Make existing bignum dest have same value as source */
-PGPError PGPAssignBigNum( PGPBigNumRef src, PGPBigNumRef dest );
-
-
-/* Swap two BigNums. Very fast. */
-PGPError PGPSwapBigNum( PGPBigNumRef a, PGPBigNumRef b);
-
-
-/*
- * Move bytes between the given buffer and the given BigNum encoded in
- * base 256. I.e. after either of these, the buffer will be equal to
- * (bn / 256^lsbyte) % 256^len. The difference is which is altered to
- * match the other!
- */
-PGPError PGPBigNumExtractBigEndianBytes( PGPBigNumRef bn,
- PGPByte *dest, PGPUInt32 lsbyte, PGPUInt32 len );
-
-PGPError PGPBigNumInsertBigEndianBytes(PGPBigNumRef bn,
- PGPByte const *src, PGPUInt32 lsbyte, PGPUInt32 len );
-
-/* The same, but the buffer is little-endian. */
-PGPError PGPBigNumExtractLittleEndianBytes( PGPBigNumRef bn,
- PGPByte *dest, PGPUInt32 lsbyte, PGPUInt32 len );
-
-PGPError PGPBigNumInsertLittleEndianBytes(PGPBigNumRef bn,
- PGPByte const *src, PGPUInt32 lsbyte, PGPUInt32 len );
-
-/* Return the least-significant bits (at least 16) of the BigNum */
-PGPUInt16 PGPBigNumGetLSWord( PGPBigNumRef bn );
-
-/*
- * Return the number of significant bits in the BigNum.
- * 0 or 1+floor(log2(src))
- */
-PGPUInt32 PGPBigNumGetSignificantBits( PGPBigNumRef bn );
-
-/*
- * Adds two bignums into dest. Faster if dest is same as lhs or rhs.
- */
-PGPError PGPBigNumAdd( PGPBigNumRef lhs,
- PGPBigNumRef rhs, PGPBigNumRef dest );
-
-/*
- * lhs-rhs. dest and src may be the same, but bnSetQ(dest, 0) is faster.
- * if dest < src, returns error and dest is undefined.
- */
-PGPError PGPBigNumSubtract( PGPBigNumRef lhs,
- PGPBigNumRef rhs, PGPBigNumRef dest,
- PGPBoolean *underflow );
-
-
-/* Return sign (-1, 0, +1) of a-b. a <=> b --> bnCmpQ(a, b) <=> 0 */
-PGPInt32 PGPBigNumCompareQ( PGPBigNumRef bn, PGPUInt16 sm );
-
-/* dest = src, where 0 <= src < 2^16. */
-PGPError PGPBigNumSetQ( PGPBigNumRef dest, PGPUInt16 sm );
-
-/* dest = bn + sm, where 0 <= sm < 2^16 */
-PGPError PGPBigNumAddQ( PGPBigNumRef bn, PGPUInt16 sm,
- PGPBigNumRef dest);
-
-/* dest = bn + sm, where 0 <= sm < 2^16 */
-PGPError PGPBigNumSubtractQ( PGPBigNumRef bn, PGPUInt16 sm,
- PGPBigNumRef dest, PGPBoolean *underflow);
-
-/* Return sign (-1, 0, +1) of a-b. a <=> b --> bnCmp(a, b) <=> 0 */
-PGPInt32 PGPBigNumCompare( PGPBigNumRef lhs, PGPBigNumRef rhs);
-
-/* dest = src * src. dest may be the same as src, but it costs time. */
-PGPError PGPBigNumSquare( PGPBigNumRef src, PGPBigNumRef dest);
-
-/* dest = a * b. dest may be the same as a or b, but it costs time. */
-PGPError PGPBigNumMultiply( PGPBigNumRef lhs, PGPBigNumRef rhs,
- PGPBigNumRef dest);
-
-/* dest = a * b, where 0 <= b < 2^16. dest and a may be the same. */
-PGPError PGPBigNumMultiplyQ( PGPBigNumRef lhs, PGPUInt16 sm,
- PGPBigNumRef dest);
-
-/*
- * q = n/d, r = n%d. r may be the same as n, but not d,
- * and q may not be the same as n or d.
- * re-entrancy issue: this temporarily modifies d, but restores
- * it for return.
- */
-PGPError PGPBigNumDivide( PGPBigNumRef numerator,
- PGPBigNumRef denominator,
- PGPBigNumRef quotient,
- PGPBigNumRef remainder);
-/*
- * dest = n % d. dest and src may be the same, but not dest and d.
- * re-entrancy issue: this temporarily modifies d, but restores
- * it for return.
- */
-PGPError PGPBigNumMod( PGPBigNumRef numerator,
- PGPBigNumRef denominator,
- PGPBigNumRef dest );
-
-/* return src % d, where 0 <= d < 2^16. */
-PGPUInt16 PGPBigNumModQ( PGPBigNumRef numerator,
- PGPUInt16 denominator );
-
-/* n = n^exp, modulo "mod" "mod" *must* be odd */
-PGPError PGPBigNumExpMod(
- PGPBigNumRef n,
- PGPBigNumRef exponent,
- PGPBigNumRef mod,
- PGPBigNumRef dest );
-
-/*
- * dest = n1^e1 * n2^e2, modulo "mod". "mod" *must* be odd.
- * dest may be the same as n1 or n2.
- */
-PGPError PGPBigNumDoubleExpMod(
- PGPBigNumRef n1,
- PGPBigNumRef exponent1,
- PGPBigNumRef n2,
- PGPBigNumRef exponent2,
- PGPBigNumRef mod,
- PGPBigNumRef dest );
-
-/* dest = 2^exp, modulo "mod" "mod" *must* be odd */
-PGPError PGPBigNumTwoExpMod(
- PGPBigNumRef exponent,
- PGPBigNumRef mod,
- PGPBigNumRef dest );
-
-/* dest = gcd(a, b). The inputs may overlap arbitrarily. */
-PGPError PGPBigNumGCD( PGPBigNumRef a, PGPBigNumRef b,
- PGPBigNumRef dest );
-
-/* dest = src^-1, modulo "mod". dest may be the same as src. */
-PGPError PGPBigNumInv( PGPBigNumRef src,
- PGPBigNumRef mod,
- PGPBigNumRef dest );
-
-
-/* Shift dest left "amt" places */
-PGPError PGPBigNumLeftShift( PGPBigNumRef dest, PGPUInt32 amt );
-
-/* Shift dest right "amt" places, discarding low-order bits */
-PGPError PGPBigNumRightShift( PGPBigNumRef dest, PGPUInt32 amt );
-
-/* right shift all low order 0-bits, return number of bits shifted */
-PGPUInt16 PGPBigNumMakeOdd( PGPBigNumRef dest );
-
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-
-PGP_END_C_DECLARATIONS
-
-#endif /* Included_pgpBigNum_h */
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpCBC.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpCBC.h
deleted file mode 100644
index 9e3ea0382a..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpCBC.h
+++ /dev/null
@@ -1,93 +0,0 @@
-/*____________________________________________________________________________
- pgpCBC.h
-
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- $Id: pgpCBC.h,v 1.5 1999/03/10 02:47:09 heller Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpCBC_h /* [ */
-#define Included_pgpCBC_h
-
-#include "pgpSymmetricCipher.h"
-
-
-PGP_BEGIN_C_DECLARATIONS
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-/*____________________________________________________________________________
- A CBC context requires use of a symmetric cipher which has been created
- and whose key has been set. An error will be returned if this is not
- the case.
-
- After the call, the CBCContextRef "owns" the
- symmetric ref and will dispose of it properly (even if an error
- occurs). The caller should no longer reference it.
-____________________________________________________________________________*/
-PGPError PGPNewCBCContext( PGPSymmetricCipherContextRef ref,
- PGPCBCContextRef *outRef );
-
-
-/*____________________________________________________________________________
- Disposal clears all data in memory before releasing it.
-____________________________________________________________________________*/
-PGPError PGPFreeCBCContext( PGPCBCContextRef ref );
-
-
-/*____________________________________________________________________________
- Make an exact copy, including current state. Original is not changed.
-____________________________________________________________________________*/
-PGPError PGPCopyCBCContext( PGPCBCContextRef ref, PGPCBCContextRef *outRef );
-
-
-
-/*____________________________________________________________________________
- IV size is implicit (same size as the symmetric cipher block size).
- IV is *copied*.
- Caller may want to destroy the original after passing it in.
-____________________________________________________________________________*/
-PGPError PGPInitCBC( PGPCBCContextRef ref,
- const void *key,
- const void *initializationVector );
-
-
-/*____________________________________________________________________________
- Call repeatedly to process arbitrary amounts of data. Each call must
- have bytesIn be a multiple of the cipher block size.
-____________________________________________________________________________*/
-PGPError PGPCBCEncrypt( PGPCBCContextRef ref,
- const void *in, PGPSize bytesIn, void *out );
-
-PGPError PGPCBCDecrypt( PGPCBCContextRef ref,
- const void *in, PGPSize bytesIn, void *out );
-
-
-
-/*____________________________________________________________________________
- Get the symmetric cipher being used for this CBC context.
- You can use this to determine useful things about the underlying cipher
- such as its block size.
-____________________________________________________________________________*/
-PGPError PGPCBCGetSymmetricCipher( PGPCBCContextRef ref,
- PGPSymmetricCipherContextRef *outRef );
-
-
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpCBC_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpCFB.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpCFB.h
deleted file mode 100644
index 54ae8d7e43..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpCFB.h
+++ /dev/null
@@ -1,127 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- $Id: pgpCFB.h,v 1.6 1999/03/10 02:47:11 heller Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpCFB_h /* [ */
-#define Included_pgpCFB_h
-
-#include "pgpSymmetricCipher.h"
-
-
-PGP_BEGIN_C_DECLARATIONS
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-/*____________________________________________________________________________
- A CFB context requires use of a symmetric cipher which has been created
- and whose key has been set. An error will be returned if this is not
- the case.
-
- After the call, the CFBRef "owns" the symmetric ref and will
- dispose of it properly (even if an error occurs).
- The caller should no longer reference it.
-____________________________________________________________________________*/
-PGPError PGPNewCFBContext( PGPSymmetricCipherContextRef ref,
- PGPUInt16 interleaveFactor,
- PGPCFBContextRef *outRef );
-
-
-/*____________________________________________________________________________
- Disposal clears all data in memory before releasing it.
-____________________________________________________________________________*/
-PGPError PGPFreeCFBContext( PGPCFBContextRef ref );
-
-
-/*____________________________________________________________________________
- Make an exact copy, including current state. Original is not changed.
-____________________________________________________________________________*/
-PGPError PGPCopyCFBContext( PGPCFBContextRef ref,
- PGPCFBContextRef *outRef );
-
-
-
-/*____________________________________________________________________________
- IV size is implicit (same size as the symmetric cipher block size).
- IV is *copied*.
- Caller may want to destroy the original after passing it in.
- Calling this implicitly calls PGPResetCFB().
-____________________________________________________________________________*/
-PGPError PGPInitCFB( PGPCFBContextRef ref,
- const void *key,
- const void *initializationVector );
-
-
-/*____________________________________________________________________________
- Call repeatedly to process arbitrary amounts of data.
-____________________________________________________________________________*/
-PGPError PGPCFBEncrypt( PGPCFBContextRef ref,
- const void *in, PGPSize bytesIn, void *out );
-
-PGPError PGPCFBDecrypt( PGPCFBContextRef ref,
- const void *in, PGPSize bytesIn, void *out );
-
-
-
-/*____________________________________________________________________________
- Get the symmetric cipher being used for this CFB context.
- You can use this to determine useful things about the underlying cipher
- such as its block size.
-____________________________________________________________________________*/
-PGPError PGPCFBGetSymmetricCipher(
- PGPCFBContextRef ref,
- PGPSymmetricCipherContextRef *outRef );
-
-
-
-/*____________________________________________________________________________
- Reset the feedback mechanism to use whatever we have so far, plus previous
- bytes for a total of the cipher block size bytes. This effectively
- changes the cipher block boundary.
-____________________________________________________________________________*/
-PGPError PGPCFBSync( PGPCFBContextRef ref );
-
-
-
-/*____________________________________________________________________________
- Fetch random bytes from the cipher. Returns the actual number of
- random bytes obtained.
-____________________________________________________________________________*/
-PGPError PGPCFBGetRandom( PGPCFBContextRef ref,
- PGPSize requestCount, void *out, PGPSize *outCount);
-
-
-/*____________________________________________________________________________
- Make more random bytes available using the supplied salt, which must
- be the same as the symmetric cipher block size.
-____________________________________________________________________________*/
-PGPError PGPCFBRandomCycle( PGPCFBContextRef ref,
- const void *salt);
-
-
-/*____________________________________________________________________________
- Make more random bytes available using the supplied salt, which must
- be the same as the symmetric cipher block size.
-____________________________________________________________________________*/
-PGPError PGPCFBRandomWash( PGPCFBContextRef ref,
- const void *in, PGPSize bytesIn );
-
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpCFB_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpConfig.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpConfig.h
deleted file mode 100644
index f72f0d4c9b..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpConfig.h
+++ /dev/null
@@ -1,96 +0,0 @@
-/*
- * pgpConfig.h -- Configuration for the PGPsdk. This file contains
- * the configuration information for the PGPsdk, and it should be
- * included in all PGPsdk source files.
- *
- * $Id: pgpConfig.h,v 1.13 1997/09/30 21:03:13 lloyd Exp $
- */
-
-/* Define to empty if the compiler does not support 'const' variables. */
-/* #undef const */
-
-/* Define to `long' if <sys/types.h> doesn't define. */
-/* #undef off_t */
-
-/* Define to `unsigned' if <sys/types.h> doesn't define. */
-/* #undef size_t */
-
-
-#ifndef Included_pgpConfig_h /* [ */
-#define Included_pgpConfig_h
-
-#include "pgpPFLConfig.h"
-
-
-
-
-
-#ifndef Included_pgpPFLConfig_h /* [ */
-
-#define HAVE_STDARG_H 1
-#define HAVE_STDLIB_H 1
-#define HAVE_UNISTD_H 0
-#define HAVE_USHORT 0
-#define HAVE_UINT 0
-#define HAVE_ULONG 0
-#define NO_LIMITS_H 0
-#define NO_POPEN 1
-
-#if defined( _MSC_VER )
-#define PGP_HAVE64 1
-typedef __int64 PGPInt64;
-typedef unsigned __int64 PGPUInt64;
-
-#elif defined( __MWERKS__ )
-
-#define PGP_HAVE64 0
-
-#endif
-
-
-
-#endif /*Included_pgpPFLConfig_h*/ /* ] */
-
-
-/* Checks for various types */
-#define HAVE_UCHAR 0
-
-/* Define if you have the ANSI C header files. */
-#define STDC_HEADERS 1
-
-/* Checks for various specific header files */
-#define HAVE_FCNTL_H 1
-#define HAVE_LIMITS_H 1
-#define HAVE_SYS_IOCTL_H 0
-#define HAVE_SYS_TIME_H 0
-#define HAVE_SYS_TIMEB_H 1
-#define HAVE_SYS_PARAM_H 0
-
-/* Check if <sys/time.h> is broken and #includes <time.h> wrong */
-#define TIME_WITH_SYS_TIME 0
-
-/* Checks for various functions */
-#define HAVE_GETHRTIME 0
-#define HAVE_CLOCK_GETTIME 0
-#define HAVE_CLOCK_GETRES 0
-#define HAVE_GETTIMEOFDAY 0
-#define HAVE_GETITIMER 0
-#define HAVE_SETITIMER 0
-#define HAVE_FTIME 1
-#define HAVE_MKSTEMP 0
-
-
-#if defined( __MWERKS__ )
-
-#define PGPTTYE /* nothing */
-
-#elif defined( _MSC_VER )
-
-/* Tags for exported functions, needed for dynamic linking on some platforms */
-#define PGPTTYE /* nothing */
-
-#endif
-
-
-
-#endif /* ] Included_pgpConfig_h */
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpEncode.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpEncode.h
deleted file mode 100644
index 8b87c1c2f9..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpEncode.h
+++ /dev/null
@@ -1,301 +0,0 @@
-/*____________________________________________________________________________
- pgpEncode.h
-
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- This file contains the prototypes for functions which encode/decode files
- and buffers.
-
- $Id: pgpEncode.h,v 1.104 1999/05/07 23:47:46 hal Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpEncode_h /* [ */
-#define Included_pgpEncode_h
-
-#include "pgpPubTypes.h"
-#include "pgpTLS.h"
-
-#if PRAGMA_ALIGN_SUPPORTED
-#pragma options align=mac68k
-#endif
-
-/*
- * The PGPEvent structure is used to notify clients of the encode API of
- * various events.
- */
-
-/* PGP Event types */
-
-enum PGPEventType_
-{
- kPGPEvent_NullEvent = 0, /* Nothing happened */
- kPGPEvent_InitialEvent = 1, /* Final event */
- kPGPEvent_FinalEvent = 2, /* Final event */
- kPGPEvent_ErrorEvent = 3, /* An error occurred */
- kPGPEvent_WarningEvent = 4, /* Warning event */
- kPGPEvent_EntropyEvent = 5, /* More entropy is needed */
- kPGPEvent_PassphraseEvent = 6, /* A passphrase is needed */
- kPGPEvent_InsertKeyEvent = 7, /* Smart card must be inserted */
- kPGPEvent_AnalyzeEvent = 8, /* Initial analysis event,
- before any output */
- kPGPEvent_RecipientsEvent = 9, /* Recipient list report,
- before any output */
- kPGPEvent_KeyFoundEvent = 10, /* Key packet found */
- kPGPEvent_OutputEvent = 11, /* Output specification needed */
- kPGPEvent_SignatureEvent = 12, /* Signature status report */
- kPGPEvent_BeginLexEvent = 13, /* Initial event per lexical unit*/
- kPGPEvent_EndLexEvent = 14, /* Final event per lexical unit */
- kPGPEvent_RecursionEvent = 15, /* Notification of recursive
- job creation */
- kPGPEvent_DetachedSignatureEvent = 16, /* Need input for verification of
- detached signature */
- kPGPEvent_KeyGenEvent = 17, /* Key generation progress */
-
- kPGPEvent_KeyServerEvent = 18, /* Key Server progress */
- kPGPEvent_KeyServerSignEvent= 19, /* Key Server passphrase */
- kPGPEvent_KeyServerTLSEvent = 20, /* Key Server TLS event */
- kPGPEvent_KeyServerIdleEvent= 21, /* Idle during keyserver call */
-
- kPGPEvent_SocketsIdleEvent = 22, /* Idle during sockets */
- kPGPEvent_DecryptionEvent = 23, /* Decryption data report */
- kPGPEvent_EncryptionEvent = 24, /* Encryption data report */
- PGP_ENUM_FORCE( PGPEventType_ )
-};
-PGPENUM_TYPEDEF( PGPEventType_, PGPEventType );
-
-
-/* PGP Analyze event callback codes */
-
-enum PGPAnalyzeType_
-{
- kPGPAnalyze_Encrypted = 0, /* Encrypted message */
- kPGPAnalyze_Signed = 1, /* Signed message */
- kPGPAnalyze_DetachedSignature = 2, /* Detached signature */
- kPGPAnalyze_Key = 3, /* Key data */
- kPGPAnalyze_Unknown = 4, /* Non-pgp message */
- kPGPAnalyze_X509Certificate = 5, /* X.509 certificate */
-
- PGP_ENUM_FORCE( PGPAnalyzeType_ )
-};
-PGPENUM_TYPEDEF( PGPAnalyzeType_, PGPAnalyzeType );
-
-
-
-
-/* Individual event information structs, combined as a union in PGPEvent */
-
-typedef struct PGPEventNullData_
-{
- PGPFileOffset bytesWritten;
- PGPFileOffset bytesTotal;
-} PGPEventNullData;
-
-typedef struct PGPEventErrorData_
-{
- PGPError error;
- void *errorArg;
-} PGPEventErrorData;
-
-typedef struct PGPEventWarningData_
-{
- PGPError warning;
- void *warningArg;
-} PGPEventWarningData;
-
-typedef struct PGPEventEntropyData_
-{
- PGPUInt32 entropyBitsNeeded;
-} PGPEventEntropyData;
-
-typedef struct PGPEventPassphraseData_
-{
- PGPBoolean fConventional;
- PGPKeySetRef keyset;
-} PGPEventPassphraseData;
-
-typedef struct PGPEventRecipientsData_
-{
- PGPKeySetRef recipientSet;
- PGPUInt32 conventionalPassphraseCount;
- PGPUInt32 keyCount;
- PGPKeyID const * keyIDArray;
-} PGPEventRecipientsData;
-
-typedef struct PGPEventKeyFoundData_
-{
- PGPKeySetRef keySet;
-} PGPEventKeyFoundData;
-
-typedef struct PGPEventSignatureData_
-{
- PGPKeyID signingKeyID;
- PGPKeyRef signingKey;
- PGPBoolean checked;
- PGPBoolean verified;
- PGPBoolean keyRevoked;
- PGPBoolean keyDisabled;
- PGPBoolean keyExpired;
- PGPBoolean keyMeetsValidityThreshold;
- PGPValidity keyValidity;
- PGPTime creationTime;
-} PGPEventSignatureData;
-
-typedef struct PGPEventDecryptionData_
-{
- PGPCipherAlgorithm cipherAlgorithm;
- PGPByte *sessionKey;
- PGPSize sessionKeyLength;
-} PGPEventDecryptionData;
-
-typedef struct PGPEventEncryptionData_
-{
- PGPCipherAlgorithm cipherAlgorithm;
- PGPByte *sessionKey;
- PGPSize sessionKeyLength;
-} PGPEventEncryptionData;
-
-typedef struct PGPEventAnalyzeData_
-{
- PGPAnalyzeType sectionType;
-} PGPEventAnalyzeData;
-
-typedef struct PGPEventOutputData_
-{
- PGPUInt32 messageType;
- char *suggestedName;
- PGPBoolean forYourEyesOnly;
-} PGPEventOutputData;
-
-typedef struct PGPEventBeginLexData_
-{
- PGPUInt32 sectionNumber;
- PGPSize sectionOffset;
-} PGPEventBeginLexData;
-
-typedef struct PGPEventEndLexData_
-{
- PGPUInt32 sectionNumber;
-} PGPEventEndLexData;
-
-typedef struct PGPEventKeyGenData_
-{
- PGPUInt32 state;
-} PGPEventKeyGenData;
-
-typedef struct PGPEventKeyServerData_
-{
- PGPKeyServerRef keyServerRef;
- PGPUInt32 state; /* PGPKeyServerState */
-} PGPEventKeyServerData;
-
-typedef struct PGPEventKeyServerSignData_
-{
- PGPKeyServerRef keyServerRef;
-} PGPEventKeyServerSignData;
-
-typedef struct PGPEventKeyServerTLSData_
-{
- PGPKeyServerRef keyServerRef;
- PGPUInt32 state; /* PGPKeyServerState */
- PGPtlsSessionRef tlsSession;
-} PGPEventKeyServerTLSData;
-
-typedef struct PGPEventKeyServerIdleData_
-{
- PGPKeyServerRef keyServerRef;
-} PGPEventKeyServerIdleData;
-
-
-/*
- * The following events have no event-specific data defined for them:
- * kPGPEvent_InsertKeyEvent
- * kPGPEvent_RecursionEvent
- * kPGPEvent_DetachedSignatureEvent
- * kPGPEvent_InitialEvent
- * kPGPEvent_FinalEvent
- * kPGPEvent_SocketsIdleEvent
- */
-
-/* Union of all event data structures above */
-typedef union PGPEventData_
-{
- PGPEventNullData nullData;
- PGPEventErrorData errorData;
- PGPEventWarningData warningData;
- PGPEventEntropyData entropyData;
- PGPEventPassphraseData passphraseData;
- PGPEventRecipientsData recipientsData;
- PGPEventKeyFoundData keyFoundData;
- PGPEventSignatureData signatureData;
- PGPEventDecryptionData decryptionData;
- PGPEventEncryptionData encryptionData;
- PGPEventAnalyzeData analyzeData;
- PGPEventOutputData outputData;
- PGPEventBeginLexData beginLexData;
- PGPEventEndLexData endLexData;
- PGPEventKeyGenData keyGenData;
- PGPEventKeyServerData keyServerData;
- PGPEventKeyServerSignData keyServerSignData;
- PGPEventKeyServerTLSData keyServerTLSData;
- PGPEventKeyServerIdleData keyServerIdleData;
-} PGPEventData;
-
-/* Refs to internal "job" structure */
-typedef struct PGPJob * PGPJobRef;
-
-#define kInvalidPGPJobRef ((PGPJobRef) NULL)
-#define PGPJobRefIsValid( ref ) ( (ref) != kInvalidPGPJobRef )
-
-/* PGPEvent structure */
-
-struct PGPEvent
-{
- PGPVersion version; /* Version of event structure */
- struct PGPEvent_ *nextEvent; /* Allow lists of events */
- PGPJobRef job; /* Associated with what job */
- PGPEventType type; /* Type of event */
- PGPEventData data; /* Event specific data */
-};
-typedef struct PGPEvent PGPEvent;
-
-
-#if PRAGMA_ALIGN_SUPPORTED
-#pragma options align=reset
-#endif
-
-PGP_BEGIN_C_DECLARATIONS
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-/*
-** Functions to encode and decode. The variable parameters are one or more
-** PGPOptionListRef's which describe the inputs, outputs, and options.
-*/
-
-PGPError PGPEncode(PGPContextRef context,
- PGPOptionListRef firstOption, ...);
-PGPError PGPDecode(PGPContextRef context,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPAddJobOptions(PGPJobRef job,
- PGPOptionListRef firstOption, ...);
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpEncode_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpErrors.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpErrors.h
deleted file mode 100644
index 52ffcfeaca..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpErrors.h
+++ /dev/null
@@ -1,305 +0,0 @@
-/*____________________________________________________________________________
- pgpErrors.h
-
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- Error codes for all PGP errors can be found in this file.
-
- $Id: pgpErrors.h,v 1.96 1999/05/11 19:01:17 heller Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpErrors_h /* [ */
-#define Included_pgpErrors_h
-
-#include "pgpPubTypes.h"
-
-
-#include "pgpPFLErrors.h"
-
-#define kPGPErrorRange 1000
-
-enum PGPError_
-{
- /*
- NOTE: error code values must not be changed;
- compiled client code depends on them.
- */
- kPGPError_FirstError = -11500,
- kPGPError_Last = -10500,
-
- kPGPError_BadPassphrase = -11500,
- kPGPError_OptionNotFound = -11499,
-
-/* Errors from pgpEncode */
- kPGPError_RedundantOptions = -11498,
- kPGPError_KeyRevoked = -11497,
- kPGPError_KeyExpired = -11496,
- kPGPError_KeyDisabled = -11495,
- kPGPError_KeyInvalid = -11494,
- kPGPError_KeyUnusableForEncryption = -11493,
- kPGPError_KeyUnusableForSignature = -11492,
- kPGPError_OutputBufferTooSmall = -11491,
- kPGPError_InconsistentEncryptionAlgorithms = -11490,
- kPGPError_MissingPassphrase = -11489,
- kPGPError_CombinedConventionalAndPublicEncryption= -11488,
- kPGPError_DetachedSignatureWithoutSigningKey= -11487,
- kPGPError_DetachedSignatureWithEncryption = -11486,
- kPGPError_NoInputOptions = -11485,
- kPGPError_MultipleInputOptions = -11484,
- kPGPError_InputFile = -11483,
- kPGPError_NoOutputOptions = -11482,
- kPGPError_MultipleOutputOptions = -11481,
- kPGPError_MissingEventHandler = -11480,
- kPGPError_MissingKeySet = -11479,
- kPGPError_DetachedSignatureFound = -11478,
- kPGPError_NoDecryptionKeyFound = -11477,
- kPGPError_CorruptSessionKey = -11476,
- kPGPError_SkipSection = -11475,
- kPGPError_Interrupted = -11474,
- kPGPError_TooManyARRKs = -11473,
- kPGPError_KeyUnusableForDecryption = -11472,
-
- kPGPError_IncompatibleAPI = -11460,
-
-/* misc errors */
- kPGPError_NotMacBinary = -11450,
- kPGPError_NoMacBinaryTranslationAvailable = -11449,
- kPGPError_BadSignature = -11448,
- kPGPError_CAPIUnsupportedKey = -11447,
- kPGPError_SelfTestFailed = -11446,
- kPGPError_SelfTestsNotExecuted = -11445,
- kPGPError_BadIntegrity = -11444,
- kPGPError_DeCompressionFailed = -11443,
-
-/* filter errors */
-
- kPGPError_InconsistentFilterClasses = -11440,
- kPGPError_UnsupportedLDAPFilter = -11439,
- kPGPError_UnsupportedHKPFilter = -11438,
- kPGPError_UnknownFilterType = -11437,
- kPGPError_InvalidFilterParameter = -11436,
- kPGPError_UnsupportedNetToolsCAFilter = -11435,
-
-/* old errors: */
-
- kPGPError_OutOfRings = -11420,
- kPGPError_BadHashNumber = -11419,
- kPGPError_BadCipherNumber = -11418,
- kPGPError_BadKeyLength = -11417,
- kPGPError_SizeAdviseFailure = -11416,
- kPGPError_ConfigParseFailure = -11415,
- kPGPError_ConfigParseFailureBadFunction = -11414,
- kPGPError_ConfigParseFailureBadOptions = -11413,
- kPGPError_KeyIsLocked = -11412,
- kPGPError_CantDecrypt = -11411,
- kPGPError_UnknownString2Key = -11410,
- kPGPError_BadSessionKeySize = -11409,
- kPGPError_UnknownVersion = -11408,
- kPGPError_BadSessionKeyAlgorithm = -11407,
- kPGPError_UnknownSignatureType = -11406,
- kPGPError_BadSignatureSize = -11405,
- kPGPError_SignatureBitsWrong = -11404,
- kPGPError_ExtraDateOnSignature = -11403,
- kPGPError_SecretKeyNotFound = -11402,
- kPGPError_AdditionalRecipientRequestKeyNotFound = -11401,
- kPGPError_InvalidCommit = -11400,
- kPGPError_CantHash = -11399,
- kPGPError_UnbalancedScope = -11398,
- kPGPError_WrongScope = -11397,
- kPGPError_FIFOReadError = -11396,
- kPGPError_RandomSeedTooSmall = -11395,
- kPGPError_EnvPriorityTooLow = -11394,
- kPGPError_UnknownCharMap = -11393,
- kPGPError_AsciiParseIncomplete = -11392,
- kPGPError_BadPacket = -11391,
-
- kPGPError_TroubleKeySubKey = -11390,
- kPGPError_TroubleSigSubKey = -11389,
- kPGPError_TroubleBadTrust = -11388,
- kPGPError_TroubleUnknownPacketByte = -11387,
- kPGPError_TroubleUnexpectedSubKey = -11386,
- kPGPError_TroubleUnexpectedName = -11385,
- kPGPError_TroubleUnexpectedSignature = -11384,
- kPGPError_TroubleUnexpectedUnknown = -11383,
- kPGPError_TroubleUnexpectedTrust = -11382,
- kPGPError_TroubleKeyTooBig = -11381,
- kPGPError_TroubleSecretKeyTooBig = -11380,
- kPGPError_TroubleNameTooBig = -11379,
- kPGPError_TroubleSignatureTooBig = -11378,
- kPGPError_TroubleUnknownTooBig = -11377,
- kPGPError_TroubleDuplicateKeyID = -11376,
- kPGPError_TroubleDuplicateKey = -11375,
- kPGPError_TroubleDuplicateSecretKey = -11374,
- kPGPError_TroubleDuplicateName = -11373,
- kPGPError_TroubleDuplicateSignature = -11372,
- kPGPError_TroubleDuplicateUnknown = -11371,
- kPGPError_TroubleBareKey = -11370,
- kPGPError_TroubleVersionBugPrev = -11369,
- kPGPError_TroubleVersionBugCur = -11368,
- kPGPError_TroubleOldSecretKey = -11367,
- kPGPError_TroubleNewSecretKey = -11366,
- kPGPError_TroubleImportingNonexportableSignature= -11365,
- kPGPError_TroubleDuplicateCRL = -11364,
- kPGPError_TroubleCRLTooBig = -11363,
-
- /*
- * The set of errors in this range are the ones which will NOT abort
- * a keyring check operation. These errors just make us skip the key
- * and go on to the next.
- */
-kPGPError_KEY_MIN = -11350,
- kPGPError_KEY_LONG = kPGPError_KEY_MIN,
- kPGPError_KeyPacketTruncated = -11349,
- kPGPError_UnknownKeyVersion = -11348,
- kPGPError_UnknownPublicKeyAlgorithm = -11347,
- kPGPError_MalformedKeyModulus = -11346,
- kPGPError_MalformedKeyExponent = -11345,
- kPGPError_RSAPublicModulusIsEven = -11344,
- kPGPError_RSAPublicExponentIsEven = -11343,
- kPGPError_MalformedKeyComponent = -11342,
- kPGPError_KeyTooLarge = -11341,
- kPGPError_PublicKeyTooSmall = -11340,
- kPGPError_PublicKeyTooLarge = -11339,
- kPGPError_PublicKeyUnimplemented = -11338,
- kPGPError_CRLPacketTruncated = -11337,
-kPGPError_KEY_MAX = kPGPError_PublicKeyUnimplemented,
-
-
-/* kPGPError_SIG_MAX */
- kPGPError_SIG_LONG = -11330,
- kPGPError_TruncatedSignature = -11329,
- kPGPError_MalformedSignatureInteger = -11328,
- kPGPError_UnknownSignatureAlgorithm = -11327,
- kPGPError_ExtraSignatureMaterial = -11326,
- kPGPError_UnknownSignatureVersion = -11325,
- kPGPError_RevocationKeyNotFound = -11324,
-/* kPGPError_SIG_MIN */
-
-/* kPGPError_KEYDB_MAX */
- kPGPError_OutOfEntropy = -11320,
- kPGPError_ItemIsReadOnly = -11319,
- kPGPError_InvalidProperty = -11318,
- kPGPError_FileCorrupt = -11317,
- kPGPError_DuplicateCert = -11316,
- kPGPError_DuplicateUserID = -11315,
- kPGPError_CertifyingKeyDead = -11314,
- kPGPError_ItemWasDeleted = -11313,
- kPGPError_KeyDBMismatch = -11312,
-/* kPGPError_KEYDB_MIN = kPGPError_KeyDBMismatch */
-
-/* kPGPError_SERVER_MAX */
- kPGPError_ServerInProgress = -11300,
- kPGPError_ServerOperationNotSupported = -11299,
- kPGPError_ServerInvalidProtocol = -11298,
- kPGPError_ServerRequestFailed = -11297,
- kPGPError_ServerOpen = -11296,
- kPGPError_ServerNotOpen = -11295,
- kPGPError_ServerKeyAlreadyExists = -11294,
- kPGPError_ServerNotInitialized = -11293,
- kPGPError_ServerPartialAddFailure = -11292,
- kPGPError_ServerCorruptKeyBlock = -11291,
- kPGPError_ServerUnknownResponse = -11290,
- kPGPError_ServerTimedOut = -11289,
- kPGPError_ServerOpenFailed = -11288,
- kPGPError_ServerAuthorizationRequired = -11287,
- kPGPError_ServerAuthorizationFailed = -11286,
- kPGPError_ServerSearchFailed = -11285,
- kPGPError_ServerPartialSearchResults = -11284,
- kPGPError_ServerBadKeysInSearchResults = -11283,
- kPGPError_ServerKeyFailedPolicy = -11282,
- kPGPError_ServerOperationRequiresTLS = -11281,
- kPGPError_ServerNoStaticStorage = -11280,
- kPGPError_ServerCertNotFound = -11279,
-
-/* TLS errors */
- kPGPError_TLSUnexpectedClose = -11250,
- kPGPError_TLSProtocolViolation = -11249,
- kPGPError_TLSVersionUnsupported = -11248,
- kPGPError_TLSWrongState = -11247,
- kPGPError_TLSAlertReceived = -11246,
- kPGPError_TLSKeyUnusable = -11245,
- kPGPError_TLSNoCommonCipher = -11244,
- kPGPError_TLSWouldBlock = -11243,
- kPGPError_TLSRcvdHandshakeRequest = -11242,
-
-/* X509 certificate errors */
- kPGPError_X509NeededCertNotAvailable = -11240,
- kPGPError_X509SelfSignedCert = -11239,
- kPGPError_X509InvalidCertificateSignature = -11238,
- kPGPError_X509InvalidCertificateFormat = -11237,
-
- kPGPError_BigNumNoInverse = -11150,
-
-/* PGPSockets errors */
- kPGPError_SocketsNetworkDown = -11100,
- kPGPError_SocketsNotInitialized = -11099,
- kPGPError_SocketsInProgress = -11098,
- kPGPError_SocketsNotConnected = -11097,
- kPGPError_SocketsNotBound = -11096,
- kPGPError_SocketsOperationNotSupported = -11095,
- kPGPError_SocketsProtocolNotSupported = -11094,
- kPGPError_SocketsAddressFamilyNotSupported = -11093,
- kPGPError_SocketsNotASocket = -11092,
- kPGPError_SocketsAddressInUse = -11091,
- kPGPError_SocketsBufferOverflow = -11090,
- kPGPError_SocketsListenQueueFull = -11089,
- kPGPError_SocketsAddressNotAvailable = -11088,
- kPGPError_SocketsAlreadyConnected = -11087,
- kPGPError_SocketsTimedOut = -11086,
- kPGPError_SocketsNoStaticStorage = -11085,
-
- kPGPError_SocketsHostNotFound = -11050,
- kPGPError_SocketsDomainServerError = -11049,
-
-/* Errors from X.509 layer */
- kPGPError_X509AttributeNotSupported = -10999,
- kPGPError_InvalidPKCS7Encoding = -10998,
- kPGPError_CMSInitialization = -10997,
- kPGPError_InvalidDistinguishedName = -10996,
- kPGPError_CertRequestCreationFailure = -10995,
- kPGPError_MissingX509Certificate = -10994,
- kPGPError_PKCS7SignFailure = -10993,
- kPGPError_ASNPackFailure = -10992,
- kPGPError_InvalidInputFormat = -10991,
- kPGPError_InvalidOutputFormat = -10990,
- kPGPError_InvalidCertificateExtension = -10989,
- kPGPError_PublicKeyNotFound = -10988,
-
- kPGPError_CRSMissingRequiredAttribute = -10979,
- kPGPError_CRSInvalidCharacter = -10978,
- kPGPError_CRSInvalidAttributeType = -10977,
- kPGPError_CRSInvalidCertType = -10976,
- kPGPError_CRSInvalidAttributeValueLength = -10975,
- kPGPError_CRSInvalidAuthenticateValue = -10974,
-
-
- kPGPError_DummyEnumValue
- /* kPGPError_Last */
-} ;
-
-
-PGP_BEGIN_C_DECLARATIONS
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-PGPError PGPGetErrorString( PGPError theError,
- PGPSize bufferSize, char * theString );
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-
-#endif /* ] Included_pgpErrors_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpFeatures.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpFeatures.h
deleted file mode 100644
index 96016ad2b5..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpFeatures.h
+++ /dev/null
@@ -1,176 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- Determine which features are present in the PGPsdk. This is the only
- way to correctly determine which features are present. The version
- number may be the same for different builds that lack some features.
-
- $Id: pgpFeatures.h,v 1.18.20.1 1999/08/17 20:04:30 cpeterson Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpFeatures_h /* [ */
-#define Included_pgpFeatures_h
-
-
-#include "pgpPubTypes.h"
-
-
-
-#if PRAGMA_ALIGN_SUPPORTED
-#pragma options align=mac68k /* [ */
-#endif
-
-
-/*____________________________________________________________________________
- Each selector designates a PGPFlags word, which can be obtained via
- PGPGetFeatureFlags(). The flags can be tested using the
- supplied masks. We can add more selectors as needed. The masks
- are not intended to be restricted to a single bit.
- Flags should not be used for attributes that have unknown length.
-
- A kPGPError_ItemNotFound will be returned if the caller specifies
- a selector which is not recognized by the PGPsdk. This could
- occur if an app links to an older version of the SDK.
-____________________________________________________________________________*/
-
-/* selectors which are passed to PGPGetFeatureFlags */
-enum PGPFeatureSelector_
-{
- kPGPFeatures_GeneralSelector = 1,
- kPGPFeatures_ImplementationSelector = 2,
- PGP_ENUM_FORCE( PGPFeatureSelector_ )
-};
-PGPENUM_TYPEDEF( PGPFeatureSelector_, PGPFeatureSelector );
-
-
-/* flags for kPGPFeatures_GeneralSelector */
-enum
-{
- kPGPFeatureMask_CanEncrypt = 0x1,
- kPGPFeatureMask_CanDecrypt = 0x2,
- kPGPFeatureMask_CanSign = 0x4,
- kPGPFeatureMask_CanVerify = 0x8,
- kPGPFeatureMask_CanGenerate = 0x10,
- kPGPFeatureMask_RngHardware = 0x20
-};
-
-
-/* flags for kPGPFeatures_ImplementationSelector */
-enum
-{
- kPGPFeatureMask_IsDebugBuild = 0x1,
- kPGPFeatureMask_HasTimeout = 0x2
-};
-
-
-
-typedef struct PGPAlgorithmInfo
-{
- char shortName[ 32 ];
- char longName[ 96 ];
- char copyright[ 128 ];
- PGPFlags flags; /* reserved; 0 for now */
- PGPUInt32 reserved[ 16 ]; /* reserved; 0 for now */
-} PGPAlgorithmInfo;
-
-
-typedef struct PGPPublicKeyAlgorithmInfo
-{
- PGPAlgorithmInfo info;
-
- PGPPublicKeyAlgorithm algID;
-
- PGPBoolean canEncrypt;
- PGPBoolean canDecrypt;
- PGPBoolean canSign;
- PGPBoolean canVerify;
- PGPBoolean canGenerate;
- PGPBoolean reserved1;
- PGPBoolean reserved2;
- PGPBoolean reserved3;
-
- PGPUInt32 reserved[ 8 ];
-} PGPPublicKeyAlgorithmInfo;
-
-
-typedef struct PGPSymmetricCipherInfo
-{
- PGPAlgorithmInfo info;
-
- PGPCipherAlgorithm algID;
-
- PGPUInt32 reserved[ 8 ];
-} PGPSymmetricCipherInfo;
-
-
-
-#if PRAGMA_ALIGN_SUPPORTED
-#pragma options align=reset /* ] */
-#endif
-
-
-
-
-
-PGP_BEGIN_C_DECLARATIONS
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-
-/* see kPGPsdkAPIVersion in pgpUtilities.h for version format */
-PGPError PGPGetSDKVersion( PGPUInt32 *version );
-
-
-/*____________________________________________________________________________
- Return a C string of the form:
-
- "PGPsdk version 1.0 (C) Network Associates, Inc"
-____________________________________________________________________________*/
-PGPError PGPGetSDKString( char theString[ 256 ] );
-
-
-
-/* return a flags word for the feature selector */
-PGPError PGPGetFeatureFlags( PGPFeatureSelector selector,
- PGPFlags *flags );
-
-/* use this to test whether a feature exists after getting flags */
-#define PGPFeatureExists( flags, maskValue ) \
- ( ( (flags) & (maskValue) ) != 0 )
-
-
-/*____________________________________________________________________________
- Routines to determine which algorithms are present.
-
- To determine if a specific algorithm is available, you will need to
- index through the available algorithms and check the algorithm ID.
-____________________________________________________________________________*/
-PGPError PGPCountPublicKeyAlgorithms( PGPUInt32 *numPKAlgs );
-PGPError PGPGetIndexedPublicKeyAlgorithmInfo( PGPUInt32 theIndex,
- PGPPublicKeyAlgorithmInfo *info);
-
-PGPError PGPCountSymmetricCiphers( PGPUInt32 *numPKAlgs );
-PGPError PGPGetIndexedSymmetricCipherInfo( PGPUInt32 theIndex,
- PGPSymmetricCipherInfo *info);
-
-
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-
-
-
-#endif /* ] Included_pgpFeatures_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpGroups.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpGroups.h
deleted file mode 100644
index 65e4bc209a..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpGroups.h
+++ /dev/null
@@ -1,322 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- $Id: pgpGroups.h,v 1.6 1999/03/10 02:51:18 heller Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpGroups_h /* [ */
-#define Included_pgpGroups_h
-
-#include "pgpPubTypes.h"
-#include "pgpEncode.h"
-
-#if PRAGMA_ALIGN_SUPPORTED
-#pragma options align=mac68k
-#endif
-
-#define kPGPMaxGroupNameLength 63
-#define kPGPMaxGroupDescriptionLength 63
-
-typedef char PGPGroupName[ kPGPMaxGroupNameLength + 1 ];
-typedef char PGPGroupDescription[ kPGPMaxGroupDescriptionLength + 1 ];
-
-
-typedef struct PGPGroupSet * PGPGroupSetRef;
-typedef struct PGPGroupIter * PGPGroupItemIterRef;
-
-#define kInvalidPGPGroupSetRef ((PGPGroupSetRef) NULL)
-#define kInvalidPGPGroupItemIterRef ((PGPGroupItemIterRef) NULL)
-
-#define PGPGroupSetRefIsValid(ref) ((ref) != kInvalidPGPGroupSetRef)
-#define PGPGroupItemIterRefIsValid(ref) ((ref) != kInvalidPGPGroupItemIterRef)
-
-/* any type will do that is distinct */
-typedef PGPUInt32 PGPGroupID;
-#define kPGPInvalidGroupID ( (PGPGroupID)0 )
-
-enum PGPGroupItemType_
-{
- kPGPGroupItem_KeyID = 1,
- kPGPGroupItem_Group,
-
- PGP_ENUM_FORCE( PGPGroupItemType_)
-};
-PGPENUM_TYPEDEF( PGPGroupItemType_, PGPGroupItemType );
-
-/*____________________________________________________________________________
- A run-time group item, used when iterating through a group.
- For client use; not necessarily the internal storage format.
-
- 'userValue' is *not* saved to disk.
-____________________________________________________________________________*/
-
-typedef struct PGPGroupItem
-{
- PGPGroupItemType type;
- PGPUserValue userValue;
-
- union
- {
- /* type selects which substructure */
- struct /* if kGroupItem_Group */
- {
- PGPGroupID id;
- } group;
-
- struct /* if kGroupItem_KeyID */
- {
- PGPPublicKeyAlgorithm algorithm;
- PGPKeyID keyID;
- } key;
- } u;
-
- PGPUInt32 reserved[4];
-
-} PGPGroupItem;
-
-
-typedef PGPInt32 (*PGPGroupItemCompareProc)( PGPGroupItem *,
- PGPGroupItem *, PGPUserValue userValue );
-
-/*____________________________________________________________________________
- Info obtained via PGPGetGroupInfo.
-____________________________________________________________________________*/
-
-typedef struct PGPGroupInfo
-{
- PGPGroupID id;
- PGPGroupName name;
- PGPGroupName description;
- PGPUserValue userValue;
-
-} PGPGroupInfo;
-
-
-typedef PGPFlags PGPGroupItemIterFlags;
-/* flag (1UL << 0 ) is reserved */
-#define kPGPGroupIterFlags_Recursive (PGPFlags)(1UL << 1 )
-#define kPGPGroupIterFlags_Keys (PGPFlags)(1UL << 2 )
-#define kPGPGroupIterFlags_Groups (PGPFlags)(1UL << 3 )
-
-#define kPGPGroupIterFlags_AllKeysRecursive \
- ( kPGPGroupIterFlags_Recursive | kPGPGroupIterFlags_Keys )
-
-#define kPGPGroupIterFlags_AllGroupsRecursive \
- ( kPGPGroupIterFlags_Recursive | kPGPGroupIterFlags_Groups )
-
-#define kPGPGroupIterFlags_AllItems \
- ( kPGPGroupIterFlags_Keys | kPGPGroupIterFlags_Groups )
-
-#define kPGPGroupIterFlags_AllRecursive \
- ( kPGPGroupIterFlags_Recursive | kPGPGroupIterFlags_AllItems )
-
-
-
-#if PRAGMA_ALIGN_SUPPORTED
-#pragma options align=reset
-#endif
-
-PGP_BEGIN_C_DECLARATIONS
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-
-/*____________________________________________________________________________
- Manipulating pgp group sets (PGPGroupSetRef)
-____________________________________________________________________________*/
-/* create a new, empty groups collection */
-PGPError PGPNewGroupSet( PGPContextRef context, PGPGroupSetRef *outRef );
-
-/* file is *not* left open; all data is loaded into memory */
-PGPError PGPNewGroupSetFromFile( PGPContextRef context,
- PGPFileSpecRef file,
- PGPGroupSetRef *outRef );
-
-#if PGP_MACINTOSH
-PGPError PGPNewGroupSetFromFSSpec( PGPContextRef context,
- const FSSpec *spec, PGPGroupSetRef *outRef );
-#endif
-
-/* overwrites existing. Don't bother unless PGPGroupSetNeedsCommit() */
-PGPError PGPSaveGroupSetToFile( PGPGroupSetRef set, PGPFileSpecRef file );
-
-/* free all data structures; be sure to save first if you want */
-PGPError PGPFreeGroupSet( PGPGroupSetRef set );
-
-
-/* has the group changed? */
-PGPBoolean PGPGroupSetNeedsCommit( PGPGroupSetRef set );
-
-PGPContextRef PGPGetGroupSetContext( PGPGroupSetRef set );
-
-/* export the groupset to a buffer. Use PGPFreeData to free the buffer */
-PGPError PGPExportGroupSetToBuffer( PGPGroupSetRef set, void **buffer,
- PGPSize *bufferSize );
-
-/* import a groupset from a buffer */
-PGPError PGPImportGroupSetFromBuffer(PGPContextRef context, void *buffer,
- PGPSize bufSize, PGPGroupSetRef *outSet );
-
-/*____________________________________________________________________________
- Manipulating groups
-
- Groups are always referred to by IDs which remain valid until the set
- is disposed.
-____________________________________________________________________________*/
-
-/* initial parent ID is kPGPInvalidGroupID */
-PGPError PGPNewGroup( PGPGroupSetRef set,
- const char * name, const char *description, PGPGroupID *id );
-
-PGPError PGPCountGroupsInSet( PGPGroupSetRef set,
- PGPUInt32 *numGroups);
-PGPError PGPGetIndGroupID( PGPGroupSetRef set,
- PGPUInt32 groupIndex, PGPGroupID *id );
-
-/* delete this group from the set */
-/* All references to it are removed in all sets */
-PGPError PGPDeleteGroup( PGPGroupSetRef set, PGPGroupID id );
-
-/* delete the indexed item from the group */
-/* the item may be a group or a key */
-PGPError PGPDeleteIndItemFromGroup( PGPGroupSetRef set,
- PGPGroupID id, PGPUInt32 item );
-
-/* same as PGPDeleteIndItemFromGroup, but accepts an item */
-PGPError PGPDeleteItemFromGroup( PGPGroupSetRef set,
- PGPGroupID id, PGPGroupItem const *item );
-
-
-PGPError PGPGetGroupInfo( PGPGroupSetRef set,
- PGPGroupID id, PGPGroupInfo *info );
-
-PGPError PGPSetGroupName( PGPGroupSetRef set,
- PGPGroupID id, const char * name );
-PGPError PGPSetGroupUserValue( PGPGroupSetRef set,
- PGPGroupID id, PGPUserValue userValue );
-PGPError PGPSetGroupDescription( PGPGroupSetRef set,
- PGPGroupID id, const char * name );
-
-/* 'item' specifies a group or a key id */
-/* you must fill the item in completely */
-PGPError PGPAddItemToGroup( PGPGroupSetRef set,
- PGPGroupItem const *item, PGPGroupID group );
-
-
-PGPError PGPMergeGroupIntoDifferentSet( PGPGroupSetRef fromSet,
- PGPGroupID fromID, PGPGroupSetRef toSet );
-
-PGPError PGPMergeGroupSets( PGPGroupSetRef fromSet,
- PGPGroupSetRef intoSet );
-
-PGPError PGPCopyGroupSet(PGPGroupSetRef sourceSet,
- PGPGroupSetRef *destSet);
-
-/*____________________________________________________________________________
- Manipulating group items
-____________________________________________________________________________*/
-
-/* count how many items there are in a group */
-/* totalItems includes keys and groups */
-PGPError PGPCountGroupItems( PGPGroupSetRef set,
- PGPGroupID id, PGPBoolean recursive,
- PGPUInt32 * numKeys,
- PGPUInt32 * totalItems );
-
-/* non-recursive call; index only applies to group itself */
-PGPError PGPGetIndGroupItem( PGPGroupSetRef set,
- PGPGroupID id, PGPUInt32 groupIndex, PGPGroupItem * item );
-
-/* use PGPGetIndGroupItem() if you want to get the user value */
-PGPError PGPSetIndGroupItemUserValue( PGPGroupSetRef set,
- PGPGroupID id, PGPUInt32 groupIndex, PGPUserValue userValue );
-
-PGPError PGPSortGroupItems( PGPGroupSetRef set, PGPGroupID id,
- PGPGroupItemCompareProc, PGPUserValue userValue );
-
-PGPError PGPSortGroupSet( PGPGroupSetRef set,
- PGPGroupItemCompareProc, PGPUserValue userValue );
-
-/*____________________________________________________________________________
- PGPGroupItemIterRef--iterator through group items.
-
- Special note: this is not a full-fledged iterator. You may *not* add
- or delete items while iterating and you may only move forward. However,
- you may change the values of items.
-____________________________________________________________________________*/
-
-PGPError PGPNewGroupItemIter( PGPGroupSetRef set, PGPGroupID id,
- PGPGroupItemIterFlags flags, PGPGroupItemIterRef *iter );
-
-PGPError PGPFreeGroupItemIter( PGPGroupItemIterRef iter );
-
-/* returns kPGPError_EndOfIteration when done */
-PGPError PGPGroupItemIterNext( PGPGroupItemIterRef iter,
- PGPGroupItem * item );
-
-/*____________________________________________________________________________
- Group utilities
-____________________________________________________________________________*/
-
-/*____________________________________________________________________________
- Return the lowest validity of any item in the group
- keyset should contain all keys available
- It is not an error if keys can't be found; you may want to check
- the not found count.
-
- The lowest validity is kPGPValidity_Invalid and kPGPValidity_Unknown
- is never returned.
-____________________________________________________________________________*/
-PGPError PGPGetGroupLowestValidity( PGPGroupSetRef set, PGPGroupID id,
- PGPKeySetRef keySet, PGPValidity * lowestValidity,
- PGPUInt32 * numKeysNotFound);
-
-/*____________________________________________________________________________
- All all the keys in the group (and its subgroups) to the keyset
-____________________________________________________________________________*/
-PGPError PGPNewKeySetFromGroup( PGPGroupSetRef set, PGPGroupID id,
- PGPKeySetRef masterSet, PGPKeySetRef * resultSet,
- PGPUInt32 * numKeysNotFound);
-
-/*____________________________________________________________________________
- Create a simple, flattened group of unique key IDs from the source group.
- Note that sourceSet and destSet must be different.
-____________________________________________________________________________*/
-PGPError PGPNewFlattenedGroupFromGroup(PGPGroupSetRef sourceSet,
- PGPGroupID sourceID, PGPGroupSetRef destSet,
- PGPGroupID *destID);
-
-/*____________________________________________________________________________
- Perform a "standard" sort on a group
-____________________________________________________________________________*/
-PGPError PGPSortGroupSetStd( PGPGroupSetRef set, PGPKeySetRef keys );
-
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpGroups_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
-
-
-
-
-
-
-
-
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpHMAC.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpHMAC.h
deleted file mode 100644
index a04dc9545d..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpHMAC.h
+++ /dev/null
@@ -1,75 +0,0 @@
-/*____________________________________________________________________________
- pgpHMAC.h
-
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- $Id: pgpHMAC.h,v 1.3 1999/03/10 02:51:38 heller Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpHMAC_h /* [ */
-#define Included_pgpHMAC_h
-
-#include "pgpPubTypes.h"
-#include "pgpMemoryMgr.h"
-
-
-PGP_BEGIN_C_DECLARATIONS
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-/*____________________________________________________________________________
- Create a new HMAC of the specified algorithm.
-
- If the algorithm is not available then kPGPError_AlgorithmNotAvailable is
- returned.
-____________________________________________________________________________*/
-PGPError PGPNewHMACContext( PGPMemoryMgrRef memoryMgr,
- PGPHashAlgorithm algorithm,
- PGPByte * secret,
- PGPSize secretLen,
- PGPHMACContextRef * outRef );
-
-/*____________________________________________________________________________
- Any existing intermediate HMAC is lost.
-____________________________________________________________________________*/
-PGPError PGPFreeHMACContext( PGPHMACContextRef ref );
-
-/*____________________________________________________________________________
- Reset an HMAC as if it had been created anew. Any existing intermediate
- hash is lost.
-____________________________________________________________________________*/
-PGPError PGPResetHMAC( PGPHMACContextRef ref );
-
-/*____________________________________________________________________________
- Continue the HMAC, accumulating an intermediate result
-____________________________________________________________________________*/
-PGPError PGPContinueHMAC( PGPHMACContextRef ref,
- const void *in, PGPSize numBytes );
-
-
-/*____________________________________________________________________________
- Finalize the HMAC, depositing the result into 'hmacOut'.
-
- This size of the output will be the same size as the hash
- algorithm output.
-____________________________________________________________________________*/
-PGPError PGPFinalizeHMAC( PGPHMACContextRef ref, void *hmacOut );
-
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpHMAC_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpHash.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpHash.h
deleted file mode 100644
index 101120d47a..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpHash.h
+++ /dev/null
@@ -1,95 +0,0 @@
-/*____________________________________________________________________________
- pgpHash.h
-
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- $Id: pgpHash.h,v 1.15 1999/03/10 02:51:20 heller Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpHashing_h /* [ */
-#define Included_pgpHashing_h
-
-#include "pgpPubTypes.h"
-#include "pgpMemoryMgr.h"
-
-
-PGP_BEGIN_C_DECLARATIONS
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-/*____________________________________________________________________________
- Create a new hash of the specified algorithm.
-
- If the algorithm is not available then kPGPError_AlgorithmNotAvailable is
- returned.
-____________________________________________________________________________*/
-PGPError PGPNewHashContext( PGPMemoryMgrRef memoryMgr,
- PGPHashAlgorithm algorithm,
- PGPHashContextRef * outRef );
-
-
-/*____________________________________________________________________________
- Any existing intermediate hash is lost.
-____________________________________________________________________________*/
-PGPError PGPFreeHashContext( PGPHashContextRef ref );
-
-
-/*____________________________________________________________________________
- An exact duplicate of the hash is made.
-____________________________________________________________________________*/
-PGPError PGPCopyHashContext( PGPHashContextRef ref,
- PGPHashContextRef * outRef);
-
-
-
-/*____________________________________________________________________________
- Reset a hash as if it had been created anew. Any existing intermediate
- hash is lost.
-____________________________________________________________________________*/
-PGPError PGPResetHash( PGPHashContextRef ref );
-
-
-/*____________________________________________________________________________
- Continue the hash, accumulating an intermediate result
-____________________________________________________________________________*/
-PGPError PGPContinueHash( PGPHashContextRef ref,
- const void *in, PGPSize numBytes );
-
-
-/*____________________________________________________________________________
- Finalize the hash, depositing the result into 'hashOut'.
-
- After calling this routine, the hash is reset via PGPResetHash().
- If you want an intermediate result, use PGPCopyHash() and finalize the
- copy.
-____________________________________________________________________________*/
-PGPError PGPFinalizeHash( PGPHashContextRef ref, void *hashOut );
-
-
-/*____________________________________________________________________________
- Determine size of resulting hash in bytes e.g. a 160 bit hash yields 20.
- Used for generic code which may not know how big a hash is being produced.
-
- Question: can we reasonably assume 8 bits per byte? If not, how does
- PGPFinalizeHash return its result?
-____________________________________________________________________________*/
-PGPError PGPGetHashSize( PGPHashContextRef ref, PGPSize *hashSize );
-
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpHashing_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpKeyServer.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpKeyServer.h
deleted file mode 100644
index 25579aacd0..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpKeyServer.h
+++ /dev/null
@@ -1,360 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
-
-
- $Id: pgpKeyServer.h,v 1.43 1999/04/12 18:59:57 jason Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpKeyServer_h
-#define Included_pgpKeyServer_h
-
-#include "pgpOptionList.h"
-#include "pgpErrors.h"
-#include "pgpGroups.h"
-#include "pgpTLS.h"
-
-
-enum PGPKeyServerState_
-{
- kPGPKeyServerState_Invalid = 0,
- kPGPKeyServerState_Opening = 1,
- kPGPKeyServerState_Querying = 2,
- kPGPKeyServerState_ReceivingResults = 3,
- kPGPKeyServerState_ProcessingResults = 4,
- kPGPKeyServerState_Uploading = 5,
- kPGPKeyServerState_Deleting = 6,
- kPGPKeyServerState_Disabling = 7,
- kPGPKeyServerState_Closing = 8,
-
- kPGPKeyServerState_TLSUnableToSecureConnection = 9,
- kPGPKeyServerState_TLSConnectionSecured = 10,
-
- PGP_ENUM_FORCE(PGPKeyServerState_)
-};
-
-PGPENUM_TYPEDEF(PGPKeyServerState_, PGPKeyServerState);
-
-enum PGPKeyServerProtocol_
-{
- kPGPKeyServerProtocol_Invalid = 0,
- kPGPKeyServerProtocol_LDAP = 1,
- kPGPKeyServerProtocol_HTTP = 2,
- kPGPKeyServerProtocol_LDAPS = 3,
- kPGPKeyServerProtocol_HTTPS = 4,
-
- PGP_ENUM_FORCE( PGPKeyServerProtocol_ )
-};
-
-PGPENUM_TYPEDEF( PGPKeyServerProtocol_, PGPKeyServerProtocol );
-
-enum PGPKeyServerClass_
-{
- kPGPKeyServerClass_Invalid = 0,
- kPGPKeyServerClass_PGP = 1,
- kPGPKeyServerClass_NetToolsCA = 2,
- kPGPKeyServerClass_Verisign = 3,
- kPGPKeyServerClass_Entrust = 4,
-
- PGP_ENUM_FORCE( PGPKeyServerClass_ )
-};
-
-PGPENUM_TYPEDEF( PGPKeyServerClass_, PGPKeyServerClass );
-
-enum PGPKeyServerKeySpace_ /* These are only valid for LDAP keyservers */
-{
- kPGPKeyServerKeySpace_Invalid = 0,
- kPGPKeyServerKeySpace_Default = 1,
- kPGPKeyServerKeySpace_Normal = 2,
- kPGPKeyServerKeySpace_Pending = 3,
-
- PGP_ENUM_FORCE( PGPKeyServerKeySpace_ )
-};
-
-PGPENUM_TYPEDEF( PGPKeyServerKeySpace_, PGPKeyServerKeySpace );
-
-enum PGPKeyServerAccessType_ /* These are only valid for LDAP keyservers */
-{
- kPGPKeyServerAccessType_Invalid = 0,
- kPGPKeyServerAccessType_Default = 1,
- kPGPKeyServerAccessType_Normal = 2,
- kPGPKeyServerAccessType_Administrator = 3,
-
- PGP_ENUM_FORCE( PGPKeyServerAccessType_ )
-};
-
-PGPENUM_TYPEDEF( PGPKeyServerAccessType_, PGPKeyServerAccessType );
-
-/* PGPKeyServerMonitorValues are null terminated linked lists.
- The values member is a null terminated array of char*s.
-*/
-
-typedef struct PGPKeyServerMonitorValues
-{
- char * name;
- char ** values;
- struct PGPKeyServerMonitorValues * next;
-} PGPKeyServerMonitorValues;
-
-typedef struct PGPKeyServerMonitor
-{
- PGPKeyServerRef keyServerRef;
- PGPKeyServerMonitorValues * valuesHead;
-} PGPKeyServerMonitor;
-
-
-typedef struct PGPKeyServerThreadStorage * PGPKeyServerThreadStorageRef;
-# define kInvalidPGPKeyServerThreadStorageRef \
- ((PGPKeyServerThreadStorageRef) NULL)
-#define PGPKeyServerThreadStorageRefIsValid(ref) \
- ((ref) != kInvalidPGPKeyServerThreadStorageRef)
-
-#if PGP_DEPRECATED /* [ */
-
-#define kPGPKeyServerType_Invalid kPGPKeyServerProtocol_Invalid
-#define kPGPKeyServerType_LDAP kPGPKeyServerProtocol_LDAP
-#define kPGPKeyServerType_HTTP kPGPKeyServerProtocol_HTTP
-#define kPGPKeyServerType_LDAPS kPGPKeyServerProtocol_LDAPS
-#define kPGPKeyServerType_HTTPS kPGPKeyServerProtocol_HTTPS
-
-typedef PGPKeyServerProtocol PGPKeyServerType;
-
-#endif /* ] PGP_DEPRECATED */
-
-PGP_BEGIN_C_DECLARATIONS
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-
-/* Use the idle event handler to receive periodic idle events during
- network calls. Usually this is used only in non-preemptive multi-tasking
- OSes to allow yielding in threads. Pre-emptive multi-tasking systems
- should probably not use the call as it interrupts the efficient wait state
- of threads waiting on network calls.
-
- Idle event handlers need to be added on a per thread basis.
-
- Returning an error from the idle event handler will cause the keyserver
- to quit processing and to return a kPGPError_UserAbort. */
-PGPError PGPSetKeyServerIdleEventHandler(
- PGPEventHandlerProcPtr inCallback,
- PGPUserValue inUserData);
-
-PGPError PGPGetKeyServerIdleEventHandler(
- PGPEventHandlerProcPtr * outCallback,
- PGPUserValue * outUserData);
-
-/* Network library options */
-
-PGPOptionListRef PGPONetURL(PGPContextRef context, const char *url);
-
-PGPOptionListRef PGPONetHostName(PGPContextRef context,
- const char *hostName, PGPUInt16 port);
-
-PGPOptionListRef PGPONetHostAddress(PGPContextRef context,
- PGPUInt32 hostAddress, PGPUInt16 port);
-
-PGPOptionListRef PGPOKeyServerProtocol(PGPContextRef context,
- PGPKeyServerProtocol serverProtocol);
-
-PGPOptionListRef PGPOKeyServerKeySpace(PGPContextRef context,
- PGPKeyServerKeySpace serverSpace);
-
-PGPOptionListRef PGPOKeyServerAccessType(PGPContextRef context,
- PGPKeyServerAccessType accessType);
-
-PGPOptionListRef PGPOKeyServerCAKey(PGPContextRef context,
- PGPKeyRef caKey);
-
-PGPOptionListRef PGPOKeyServerRequestKey(PGPContextRef context,
- PGPKeyRef requestKey);
-
-PGPOptionListRef PGPOKeyServerSearchKey(PGPContextRef context,
- PGPKeyRef searchKey);
-
-PGPOptionListRef PGPOKeyServerSearchFilter(PGPContextRef context,
- PGPFilterRef searchFilter);
-
-/* Static storage creation */
-PGPError PGPKeyServerCreateThreadStorage(
- PGPKeyServerThreadStorageRef * outPreviousStorage);
-PGPError PGPKeyServerDisposeThreadStorage(
- PGPKeyServerThreadStorageRef inPreviousStorage);
-
-/* Initialize and close the keyserver library */
-PGPError PGPKeyServerInit(void);
-
-PGPError PGPKeyServerCleanup(void);
-
-
-/* Creating and freeing a keyserver ref. */
-PGPError PGPNewKeyServer(
- PGPContextRef inContext,
- PGPKeyServerClass inClass,
- PGPKeyServerRef *outKeyServerRef,
- PGPOptionListRef firstOption,
- ... );
-
-PGPError PGPFreeKeyServer(PGPKeyServerRef inKeyServerRef);
-PGPError PGPIncKeyServerRefCount(PGPKeyServerRef inKeyServerRef);
-
-
-/* Set and get the keyserver's event handler. Note that returning an error
- for a keyserver event will abort the current call. */
-PGPError PGPSetKeyServerEventHandler(
- PGPKeyServerRef inKeyServerRef,
- PGPEventHandlerProcPtr inCallback,
- PGPUserValue inUserData);
-
-PGPError PGPGetKeyServerEventHandler(
- PGPKeyServerRef inKeyServerRef,
- PGPEventHandlerProcPtr * outCallback,
- PGPUserValue * outUserData);
-
-
-/* Canceling a call to a keyserver. This is the only call that can be made
- to a keyserver that is currently in another call. Also, once you have
- returned from a canceled call, you may only close the keyserver. */
-PGPError PGPCancelKeyServerCall(PGPKeyServerRef inKeyServerRef);
-
-
-/* Opening and closing the keyserver. A keyserver ref can be opened and
- closed multiple times as necessary. */
-PGPError PGPKeyServerOpen(PGPKeyServerRef inKeyServerRef,
- PGPtlsSessionRef inTLSSessionRef);
-
-PGPError PGPKeyServerClose(PGPKeyServerRef inKeyServerRef);
-
-
-/* Get keyserver info. */
-PGPError PGPGetKeyServerTLSSession(PGPKeyServerRef inKeyServerRef,
- PGPtlsSessionRef * outTLSSessionRef);
-
-PGPError PGPGetKeyServerProtocol(PGPKeyServerRef inKeyServerRef,
- PGPKeyServerProtocol * outType);
-
-PGPError PGPGetKeyServerAccessType(PGPKeyServerRef inKeyServerRef,
- PGPKeyServerAccessType * outAccessType);
-
-PGPError PGPGetKeyServerKeySpace(PGPKeyServerRef inKeyServerRef,
- PGPKeyServerKeySpace * outKeySpace);
-
-PGPError PGPGetKeyServerPort(PGPKeyServerRef inKeyServerRef,
- PGPUInt16 * outPort);
-
-PGPError PGPGetKeyServerHostName(PGPKeyServerRef inKeyServerRef,
- char ** outHostName); /* Use PGPFreeData to free */
-
-PGPError PGPGetKeyServerAddress(PGPKeyServerRef inKeyServerRef,
- PGPUInt32 * outAddress);
-
-PGPError PGPGetKeyServerPath(PGPKeyServerRef inKeyServerRef,
- char ** outPath); /* Use PGPFreeData to free */
-
-PGPContextRef PGPGetKeyServerContext(PGPKeyServerRef inKeyServerRef);
-
-/* If there was an error string returned from the server, you can get it with
- this function. Note that if there is no string, the function will return
- kPGPError_NoErr and *outErrorString will be NULL */
-PGPError PGPGetLastKeyServerErrorString(
- PGPKeyServerRef inKeyServerRef,
- char ** outErrorString); /* Use PGPFreeData to free */
-
-
-/* These functions may be used with both HTTP and LDAP keyservers */
-PGPError PGPQueryKeyServer(PGPKeyServerRef inKeyServerRef,
- PGPFilterRef inFilterRef,
- PGPKeySetRef * outFoundKeys);
-
-PGPError PGPUploadToKeyServer(PGPKeyServerRef inKeyServerRef,
- PGPKeySetRef inKeysToUpload,
- PGPKeySetRef * outKeysThatFailed);
-
-
-/* These functions may only be used with LDAP keyservers */
-PGPError PGPDeleteFromKeyServer(PGPKeyServerRef inKeyServerRef,
- PGPKeySetRef inKeysToDelete,
- PGPKeySetRef * outKeysThatFailed);
-
-PGPError PGPDisableFromKeyServer(PGPKeyServerRef inKeyServerRef,
- PGPKeySetRef inKeysToDisable,
- PGPKeySetRef * outKeysThatFailed);
-
-PGPError PGPSendGroupsToServer(PGPKeyServerRef inKeyServerRef,
- PGPGroupSetRef inGroupSetRef);
-
-PGPError PGPRetrieveGroupsFromServer(
- PGPKeyServerRef inKeyServerRef,
- PGPGroupSetRef * outGroupSetRef);
-
-PGPError PGPNewServerMonitor(PGPKeyServerRef inKeyServerRef,
- PGPKeyServerMonitor ** outMonitor);
-
-PGPError PGPFreeServerMonitor(PGPKeyServerMonitor * inMonitor);
-
-/* X.509 Certificate Request functions */
-
-PGPError PGPSendCertificateRequest(
- PGPKeyServerRef inKeyServerRef,
- PGPOptionListRef firstOption,
- ... );
-
-PGPError PGPRetrieveCertificate(
- PGPKeyServerRef inKeyServerRef,
- PGPOptionListRef firstOption,
- ... );
-
-PGPError PGPRetrieveCertificateRevocationList(
- PGPKeyServerRef inKeyServerRef,
- PGPOptionListRef firstOption,
- ... );
-
-/***************************************************************************
-****************************************************************************
- NOTE: These functions are deprecated and should not be used
-
- PGPGetKeyServerType -> PGPGetKeyServerProtocol
- PGPNewKeyServerFromURL -> PGPNewKeyServer
- PGPNewKeyServerFromHostName -> PGPNewKeyServer
- PGPNewKeyServerFromHostAddress -> PGPNewKeyServer
-
-****************************************************************************
-***************************************************************************/
-
-#if PGP_DEPRECATED /* [ */
-
-PGPError PGPNewKeyServerFromURL(PGPContextRef inContext,
- const char * inURL,
- PGPKeyServerAccessType inAccessType,
- PGPKeyServerKeySpace inKeySpace,
- PGPKeyServerRef * outKeyServerRef);
-
-PGPError PGPNewKeyServerFromHostName(PGPContextRef inContext,
- const char * inHostName,
- PGPUInt16 inPort, /* default for protocol if 0 */
- PGPKeyServerProtocol inType,
- PGPKeyServerAccessType inAccessType,
- PGPKeyServerKeySpace inKeySpace,
- PGPKeyServerRef * outKeyServerRef);
-
-PGPError PGPNewKeyServerFromHostAddress(PGPContextRef inContext,
- PGPUInt32 inAddress,
- PGPUInt16 inPort, /* default for protocol if 0 */
- PGPKeyServerProtocol inType,
- PGPKeyServerAccessType inAccessType,
- PGPKeyServerKeySpace inKeySpace,
- PGPKeyServerRef * outKeyServerRef);
-
-PGPError PGPGetKeyServerType(PGPKeyServerRef inKeyServerRef,
- PGPKeyServerType * outType);
-
-#endif /* ] PGP_DEPRECATED */
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-#endif
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpKeys.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpKeys.h
deleted file mode 100644
index 8bfdc34cc3..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpKeys.h
+++ /dev/null
@@ -1,879 +0,0 @@
-/*____________________________________________________________________________
- pgpKeys.h
-
- Copyright(C) 1996,1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- Public definitions for PGP KeyDB Library
-
- $Id: pgpKeys.h,v 1.132 1999/05/18 19:38:45 heller Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpKeys_h /* [ */
-#define Included_pgpKeys_h
-
-
-
-#include "pgpPubTypes.h"
-#include "pgpHash.h"
-#include "pgpOptionList.h"
-
-
-
-/* Key ordering */
-enum PGPKeyOrdering_
-{
- kPGPInvalidOrdering = 0,
- kPGPAnyOrdering = 1,
- kPGPUserIDOrdering = 2,
- kPGPReverseUserIDOrdering = 3,
- kPGPKeyIDOrdering = 4,
- kPGPReverseKeyIDOrdering = 5,
- kPGPValidityOrdering = 6,
- kPGPReverseValidityOrdering = 7,
- kPGPTrustOrdering = 8,
- kPGPReverseTrustOrdering = 9,
- kPGPEncryptKeySizeOrdering = 10,
- kPGPReverseEncryptKeySizeOrdering = 11,
- kPGPSigKeySizeOrdering = 12,
- kPGPReverseSigKeySizeOrdering = 13,
- kPGPCreationOrdering = 14,
- kPGPReverseCreationOrdering = 15,
- kPGPExpirationOrdering = 16,
- kPGPReverseExpirationOrdering = 17,
-
- PGP_ENUM_FORCE( PGPKeyOrdering_ )
-} ;
-PGPENUM_TYPEDEF( PGPKeyOrdering_, PGPKeyOrdering );
-
-
-
-/* Key properties */
-
-enum PGPKeyPropName_
-{
-/* String properties */
- kPGPKeyPropFingerprint = 1,
- kPGPKeyPropPreferredAlgorithms = 2,
- kPGPKeyPropThirdPartyRevocationKeyID= 3,
- kPGPKeyPropKeyData = 4,
- kPGPKeyPropX509MD5Hash = 5,
-
- /* Number properties */
- kPGPKeyPropAlgID = 20,
- kPGPKeyPropBits = 21,
- kPGPKeyPropTrust = 22, /* old trust model only */
- kPGPKeyPropValidity = 23, /* both trust models */
- kPGPKeyPropLockingAlgID = 24,
- kPGPKeyPropLockingBits = 25,
- kPGPKeyPropFlags = 26,
-
- /* Time properties */
- kPGPKeyPropCreation = 40,
- kPGPKeyPropExpiration = 41,
- kPGPKeyPropCRLThisUpdate = 42,
- kPGPKeyPropCRLNextUpdate = 43,
-
- /* PGPBoolean properties */
- kPGPKeyPropIsSecret = 60,
- kPGPKeyPropIsAxiomatic = 61,
- kPGPKeyPropIsRevoked = 62,
- kPGPKeyPropIsDisabled = 63,
- kPGPKeyPropIsNotCorrupt = 64,
- kPGPKeyPropIsExpired = 65,
- kPGPKeyPropNeedsPassphrase = 66,
- kPGPKeyPropHasUnverifiedRevocation = 67,
- kPGPKeyPropCanEncrypt = 68,
- kPGPKeyPropCanDecrypt = 69,
- kPGPKeyPropCanSign = 70,
- kPGPKeyPropCanVerify = 71,
- kPGPKeyPropIsEncryptionKey = 72,
- kPGPKeyPropIsSigningKey = 73,
- kPGPKeyPropIsSecretShared = 74,
- kPGPKeyPropIsRevocable = 75,
- kPGPKeyPropHasThirdPartyRevocation = 76,
- kPGPKeyPropHasCRL = 77,
-
- PGP_ENUM_FORCE( PGPKeyPropName_ )
-} ;
-PGPENUM_TYPEDEF( PGPKeyPropName_, PGPKeyPropName );
-
-
-/* kPGPKeyPropFlags bits */
-enum /* PGPKeyPropFlags */
-{
- kPGPKeyPropFlags_UsageSignUserIDs = (1UL << 0 ),
- kPGPKeyPropFlags_UsageSignMessages = (1UL << 1 ),
- kPGPKeyPropFlags_UsageEncryptCommunications = (1UL << 2 ),
- kPGPKeyPropFlags_UsageEncryptStorage = (1UL << 3 ),
-
- kPGPKeyPropFlags_PrivateSplit = (1UL << 4 ),
- kPGPKeyPropFlags_PrivateShared = (1UL << 7 )
-} ;
-typedef PGPFlags PGPKeyPropFlags;
-
-
-
-/* User ID properties */
-
-enum PGPUserIDPropName_
-{
- /* String properties */
- kPGPUserIDPropName = 80,
- kPGPUserIDPropAttributeData = 81,
- kPGPUserIDPropCommonName = 82,
- kPGPUserIDPropEmailAddress = 83,
-
- /* Number properties */
- kPGPUserIDPropValidity = 100, /* both trust models */
- kPGPUserIDPropConfidence = 101, /* new trust model only */
- kPGPUserIDPropAttributeType = 102,
-
- /* Time properties */
-
- /* PGPBoolean properties */
- kPGPUserIDPropIsAttribute = 110,
-
- PGP_ENUM_FORCE( PGPUserIDPropName_ )
-} ;
-PGPENUM_TYPEDEF( PGPUserIDPropName_, PGPUserIDPropName );
-
-/* Signature properties */
-
-enum PGPSigPropName_
-{
- /* String properties */
- kPGPSigPropKeyID = 120,
- kPGPSigPropX509Certificate = 121,
- kPGPSigPropX509IASN = 122,
- kPGPSigPropX509LongName = 123,
- kPGPSigPropX509IssuerLongName = 124,
- kPGPSigPropX509DNSName = 125,
- kPGPSigPropX509IPAddress = 126,
- kPGPSigPropX509DERDName = 127,
-
- /* Number properties */
- kPGPSigPropAlgID = 140,
- kPGPSigPropTrustLevel = 141,
- kPGPSigPropTrustValue = 142,
-
- /* Time properties */
- kPGPSigPropCreation = 160,
- kPGPSigPropExpiration = 161,
-
- /* PGPBoolean properties */
- kPGPSigPropIsRevoked = 180,
- kPGPSigPropIsNotCorrupt = 181,
- kPGPSigPropIsTried = 182,
- kPGPSigPropIsVerified = 183,
- kPGPSigPropIsMySig = 184,
- kPGPSigPropIsExportable = 185,
- kPGPSigPropHasUnverifiedRevocation = 186,
- kPGPSigPropIsExpired = 187,
- kPGPSigPropIsX509 = 188,
-
- PGP_ENUM_FORCE( PGPSigPropName_ )
-} ;
-PGPENUM_TYPEDEF( PGPSigPropName_, PGPSigPropName );
-/*
- * Note on kPGPSigPropIsMySig. This is a convenience property for
- * determining whether the certification was made by one of the
- * caller's own private keys. This can only return true if the
- * signing key is in the same base keyset as the certification. If the
- * signing key is( suspected to be) in a different base keyset, call
- * PGPGetSigCertifierKey( certset, signerset, &key) followed by
- * PGPGetKeyBoolean( key, kPGPKeyPropIsSecret, &secret).
- */
-
-
-/* Attribute types, for use with kPGPUserIDPropAttributeType */
-enum PGPAttributeType_
-{
- kPGPAttribute_Image = 1,
- kPGPAttribute_IPAddress = 10,
- kPGPAttribute_DNSName = 11,
- kPGPAttribute_Notation = 20,
-
- PGP_ENUM_FORCE( PGPAttributeType_ )
-} ;
-PGPENUM_TYPEDEF( PGPAttributeType_, PGPAttributeType );
-
-
-enum /* PGPKeyRingOpenFlags */
-{
- kPGPKeyRingOpenFlags_None = 0,
- kPGPKeyRingOpenFlags_Reserved = (1UL << 0 ),
- kPGPKeyRingOpenFlags_Mutable = (1UL << 1 ),
- kPGPKeyRingOpenFlags_Create = (1UL << 2 ),
-
- /* The following flags are only used by PGPOpenKeyRing */
- kPGPKeyRingOpenFlags_Private = (1UL << 8 ),
- kPGPKeyRingOpenFlags_Trusted = (1UL << 9 )
-} ;
-typedef PGPFlags PGPKeyRingOpenFlags;
-
-/*
- * Used by filtering functions to specify type of match.
- */
-
-enum PGPMatchCriterion_
-{
- kPGPMatchDefault = 1,
- kPGPMatchEqual = 1, /* searched val == supplied val */
- kPGPMatchGreaterOrEqual = 2, /* searched val >= supplied val */
- kPGPMatchLessOrEqual = 3, /* searched val <= supplied val */
- kPGPMatchSubString = 4, /* searched val is contained in supplied val */
-
- PGP_ENUM_FORCE( PGPMatchCriterion_ )
-} ;
-PGPENUM_TYPEDEF( PGPMatchCriterion_, PGPMatchCriterion );
-
-
-/* This is the value of the expiration time which means "never expires" */
-#define kPGPExpirationTime_Never ( (PGPTime)0 )
-
-/* Secret sharing header size */
-#define kPGPShareHeaderSize 4
-
-/* Public entry points */
-
-PGP_BEGIN_C_DECLARATIONS
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-
-/* Functions for setting up key filters. */
-
-PGPError PGPIncFilterRefCount ( PGPFilterRef filter );
-
-PGPError PGPFreeFilter ( PGPFilterRef filter );
-
-PGPError PGPNewKeyIDFilter( PGPContextRef context,
- PGPKeyID const * keyID, PGPFilterRef *outFilter);
-
-PGPError PGPNewSubKeyIDFilter( PGPContextRef context,
- PGPKeyID const * subKeyID,
- PGPFilterRef * outFilter);
-
-PGPError PGPNewKeyEncryptAlgorithmFilter( PGPContextRef context,
- PGPPublicKeyAlgorithm encryptAlgorithm,
- PGPFilterRef *outFilter );
-
-PGPError PGPNewKeyFingerPrintFilter( PGPContextRef context,
- void const *fingerPrint,
- PGPSize fingerPrintLength, PGPFilterRef *outFilter );
-
-PGPError PGPNewKeyCreationTimeFilter( PGPContextRef context,
- PGPTime creationTime, PGPMatchCriterion match,
- PGPFilterRef *outFilter );
-
-PGPError PGPNewKeyExpirationTimeFilter( PGPContextRef context,
- PGPTime expirationTime,
- PGPMatchCriterion match, PGPFilterRef *outFilter );
-
-PGPError PGPNewKeyRevokedFilter( PGPContextRef context,
- PGPBoolean revoked, PGPFilterRef *outFilter );
-
-PGPError PGPNewKeyDisabledFilter( PGPContextRef context,
- PGPBoolean disabled,
- PGPFilterRef * outFilter);
-
-PGPError PGPNewKeySigAlgorithmFilter( PGPContextRef context,
- PGPPublicKeyAlgorithm sigAlgorithm,
- PGPFilterRef *outFilter );
-
-PGPError PGPNewKeyEncryptKeySizeFilter( PGPContextRef context,
- PGPUInt32 keySize, PGPMatchCriterion match,
- PGPFilterRef *outFilter );
-
-PGPError PGPNewKeySigKeySizeFilter( PGPContextRef context,
- PGPUInt32 keySize, PGPMatchCriterion match,
- PGPFilterRef *outFilter );
-
-PGPError PGPNewUserIDStringFilter( PGPContextRef context,
- char const * userIDString,
- PGPMatchCriterion match,
- PGPFilterRef * outFilter);
-
-PGPError PGPNewUserIDEmailFilter( PGPContextRef context,
- char const * emailString,
- PGPMatchCriterion match,
- PGPFilterRef * outFilter);
-
-PGPError PGPNewUserIDNameFilter( PGPContextRef context,
- char const * nameString,
- PGPMatchCriterion match,
- PGPFilterRef * outFilter);
-
-PGPError PGPNewSigKeyIDFilter( PGPContextRef context,
- PGPKeyID const * keyID,
- PGPFilterRef *outFilter );
-
-PGPError PGPNewKeyBooleanFilter( PGPContextRef context,
- PGPKeyPropName property, PGPBoolean match,
- PGPFilterRef *outFilter );
-
-PGPError PGPNewKeyNumberFilter( PGPContextRef context,
- PGPKeyPropName property, PGPUInt32 value,
- PGPMatchCriterion match, PGPFilterRef *outFilter );
-
-PGPError PGPNewKeyTimeFilter( PGPContextRef context,
- PGPKeyPropName property, PGPTime value,
- PGPMatchCriterion match, PGPFilterRef *outFilter );
-
-PGPError PGPNewKeyPropertyBufferFilter( PGPContextRef context,
- PGPKeyPropName property, void *buffer, PGPSize length,
- PGPMatchCriterion match, PGPFilterRef *outFilter );
-
-PGPError PGPNewSubKeyBooleanFilter( PGPContextRef context,
- PGPKeyPropName property, PGPBoolean match,
- PGPFilterRef *outFilter );
-
-PGPError PGPNewSubKeyNumberFilter( PGPContextRef context,
- PGPKeyPropName property, PGPUInt32 value,
- PGPMatchCriterion match, PGPFilterRef *outFilter );
-
-PGPError PGPNewSubKeyTimeFilter( PGPContextRef context,
- PGPKeyPropName property, PGPTime value,
- PGPMatchCriterion match, PGPFilterRef *outFilter );
-
-PGPError PGPNewSubKeyPropertyBufferFilter( PGPContextRef context,
- PGPKeyPropName property, void *buffer, PGPSize length,
- PGPMatchCriterion match, PGPFilterRef *outFilter );
-
-PGPError PGPNewUserIDBooleanFilter( PGPContextRef context,
- PGPUserIDPropName property, PGPBoolean match,
- PGPFilterRef *outFilter );
-
-PGPError PGPNewUserIDNumberFilter( PGPContextRef context,
- PGPUserIDPropName property, PGPUInt32 value,
- PGPMatchCriterion match, PGPFilterRef *outFilter );
-
-PGPError PGPNewUserIDStringBufferFilter( PGPContextRef context,
- PGPUserIDPropName property,
- void *buffer, PGPSize length,
- PGPMatchCriterion match, PGPFilterRef *outFilter );
-
-PGPError PGPNewSigBooleanFilter( PGPContextRef context,
- PGPSigPropName property, PGPBoolean match,
- PGPFilterRef *outFilter );
-
-PGPError PGPNewSigNumberFilter( PGPContextRef context,
- PGPSigPropName property, PGPUInt32 value,
- PGPMatchCriterion match, PGPFilterRef *outFilter );
-
-PGPError PGPNewSigTimeFilter( PGPContextRef context,
- PGPSigPropName property, PGPTime value,
- PGPMatchCriterion match, PGPFilterRef *outFilter );
-
-PGPError PGPNewSigPropertyBufferFilter( PGPContextRef context,
- PGPSigPropName property, void *buffer, PGPSize length,
- PGPMatchCriterion match, PGPFilterRef *outFilter );
-
-/* freeing outfilter will call PGPFreeFilter on filter */
-PGPError PGPNegateFilter( PGPFilterRef filter,
- PGPFilterRef *outFilter);
-
-/* freeing outfilter will call PGPFreeFilter on filter1, filter2 */
-PGPError PGPIntersectFilters( PGPFilterRef filter1,
- PGPFilterRef filter2, PGPFilterRef *outFilter);
-
-/* freeing outfilter will call PGPFreeFilter on filter1, filter2 */
-PGPError PGPUnionFilters( PGPFilterRef filter1,
- PGPFilterRef filter2, PGPFilterRef *outFilter);
-
-
-PGPError PGPFilterKeySet( PGPKeySetRef origSet,
- PGPFilterRef filter, PGPKeySetRef *resultSet);
-
-
-/* Keyserver filter functions */
-
-PGPError PGPLDAPQueryFromFilter( PGPFilterRef filter,
- char **queryOut );
-
-PGPError PGPHKSQueryFromFilter( PGPFilterRef filter,
- char **queryOut );
-
-PGPError PGPNetToolsCAHTTPQueryFromFilter( PGPFilterRef filter,
- char **queryOut );
-
-/* KeySet manipulations */
-
-
-/* Creates a new memory-based KeyDB and returns its root set */
-PGPError PGPNewKeySet(PGPContextRef context, PGPKeySetRef *keySet);
-
-
-/* Used for building arbitrary subsets of an existing KeyDB */
-PGPError PGPNewEmptyKeySet(PGPKeySetRef origSet, PGPKeySetRef *newSet);
-PGPError PGPNewSingletonKeySet(PGPKeyRef key, PGPKeySetRef *keySet);
-PGPError PGPUnionKeySets(PGPKeySetRef set1, PGPKeySetRef set2,
- PGPKeySetRef *newSet);
-
-PGPError PGPOpenDefaultKeyRings( PGPContextRef context,
- PGPKeyRingOpenFlags openFlags, PGPKeySetRef *keySet);
-
-PGPError PGPOpenKeyRingPair( PGPContextRef context,
- PGPKeyRingOpenFlags openFlags,
- PGPFileSpecRef pubFileRef, PGPFileSpecRef secFileRef,
- PGPKeySetRef *keySet);
-
-PGPError PGPOpenKeyRing (PGPContextRef context,
- PGPKeyRingOpenFlags openFlags, PGPFileSpecRef fileRef,
- PGPKeySetRef *keySet);
-
-PGPError PGPCommitKeyRingChanges (PGPKeySetRef keys);
-
-PGPError PGPPropagateTrust (PGPKeySetRef keys);
-
-PGPError PGPRevertKeyRingChanges (PGPKeySetRef keys);
-
-PGPError PGPCheckKeyRingSigs (PGPKeySetRef keysToCheck,
- PGPKeySetRef keysSigning, PGPBoolean checkAll,
- PGPEventHandlerProcPtr eventHandler,
- PGPUserValue eventHandlerData);
-
-PGPError PGPReloadKeyRings (PGPKeySetRef keys);
-
-PGPError PGPGetKeyByKeyID (PGPKeySetRef keys,
- PGPKeyID const * keyID,
- PGPPublicKeyAlgorithm pubKeyAlgorithm,
- PGPKeyRef *outRef);
-
-PGPBoolean PGPKeySetIsMember(PGPKeyRef key, PGPKeySetRef set);
-
-PGPError PGPCountKeys( PGPKeySetRef keys, PGPUInt32 *numKeys);
-
-PGPError PGPIncKeySetRefCount( PGPKeySetRef keys);
-
-PGPError PGPFreeKeySet( PGPKeySetRef keys);
-
-PGPBoolean PGPKeySetIsMutable( PGPKeySetRef keys);
-
-PGPBoolean PGPKeySetNeedsCommit( PGPKeySetRef keys);
-
-
-PGPError PGPAddKeys( PGPKeySetRef keysToAdd, PGPKeySetRef set );
-
-PGPError PGPRemoveKeys( PGPKeySetRef keysToRemove, PGPKeySetRef set );
-
-
-
-/* Key manipulation functions */
-
-PGPError PGPDisableKey( PGPKeyRef key);
-
-PGPError PGPEnableKey( PGPKeyRef key);
-
-PGPError PGPRemoveSubKey( PGPSubKeyRef subkey);
-
-PGPError PGPRemoveUserID( PGPUserIDRef userID);
-
-PGPError PGPSetPrimaryUserID( PGPUserIDRef userid);
-
-PGPError PGPCertifyPrimaryUserID( PGPUserIDRef userid,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPGetSigCertifierKey( PGPSigRef cert, PGPKeySetRef allkeys,
- PGPKeyRef *certkey);
-
-PGPError PGPGetSigX509CertifierSig( PGPSigRef cert,
- PGPKeySetRef allkeys, PGPSigRef *certsig);
-
-PGPError PGPRemoveSig( PGPSigRef cert);
-
-PGPError PGPCountAdditionalRecipientRequests( PGPKeyRef basekey,
- PGPUInt32 * numARKeys);
-
-PGPError PGPGetIndexedAdditionalRecipientRequestKey(
- PGPKeyRef basekey, PGPKeySetRef allkeys, PGPUInt32 nth,
- PGPKeyRef *arkey, PGPKeyID *arkeyid,
- PGPByte *arclass );
-
-PGPError PGPCountRevocationKeys( PGPKeyRef basekey,
- PGPUInt32 * numRevKeys);
-
-PGPError PGPGetIndexedRevocationKey(
- PGPKeyRef basekey, PGPKeySetRef allkeys, PGPUInt32 nth,
- PGPKeyRef *revkey, PGPKeyID *revkeyid );
-PGPError PGPGetCRLDistributionPoints(
- PGPKeyRef cakey, PGPKeySetRef keyset,
- PGPUInt32 *pnDistPoints, PGPByte **pDpoints,
- PGPSize **pdpointLengths );
-
-
-/* Wrapper functions */
-PGPError PGPGenerateKey( PGPContextRef context, PGPKeyRef *key,
- PGPOptionListRef firstOption, ...);
-PGPError PGPGenerateSubKey( PGPContextRef context,
- PGPSubKeyRef *subkey,
- PGPOptionListRef firstOption, ...);
-PGPUInt32 PGPGetKeyEntropyNeeded( PGPContextRef context,
- PGPOptionListRef firstOption, ...);
-PGPError PGPExportKeySet( PGPKeySetRef keys,
- PGPOptionListRef firstOption, ...);
-PGPError PGPExport( PGPContextRef context,
- PGPOptionListRef firstOption, ...);
-PGPError PGPImportKeySet( PGPContextRef context,
- PGPKeySetRef *keys,
- PGPOptionListRef firstOption, ...);
-PGPError PGPSignUserID( PGPUserIDRef userID,
- PGPKeyRef certifyingKey,
- PGPOptionListRef firstOption, ...);
-PGPError PGPAddUserID( PGPKeyRef key, char const *userID,
- PGPOptionListRef firstOption, ...);
-PGPError PGPAddAttributeUserID( PGPKeyRef key,
- PGPAttributeType attributeType,
- PGPByte *attributeData, PGPSize attributeLength,
- PGPOptionListRef firstOption, ...);
-PGPError PGPRevokeSig( PGPSigRef cert, PGPKeySetRef allkeys,
- PGPOptionListRef firstOption, ...);
-PGPError PGPRevokeKey( PGPKeyRef key,
- PGPOptionListRef firstOption, ...);
-PGPError PGPRevokeSubKey( PGPSubKeyRef subkey,
- PGPOptionListRef firstOption, ...);
-PGPError PGPChangePassphrase( PGPKeyRef key,
- PGPOptionListRef firstOption, ...);
-PGPError PGPChangeSubKeyPassphrase( PGPSubKeyRef subkey,
- PGPOptionListRef firstOption, ...);
-PGPBoolean PGPPassphraseIsValid( PGPKeyRef key,
- PGPOptionListRef firstOption, ...);
-PGPError PGPSetKeyAxiomatic( PGPKeyRef key,
- PGPOptionListRef firstOption, ...);
-
-
-
-/*
- * Trust values for PGPSetKeyTrust and kPGPKeyPropTrust property:
- *
- * kPGPKeyTrust_Undefined (do not pass to PGPSetKeyTrust)
- * kPGPKeyTrust_Unknown (unknown)
- * kPGPKeyTrust_Never (never)
- * kPGPKeyTrust_Marginal (sometimes)
- * kPGPKeyTrust_Complete (always)
- * kPGPKeyTrust_Ultimate (do not pass to PGPSetKeyTrust)
- */
-
- /* old trust model */
-PGPError PGPSetKeyTrust( PGPKeyRef key, PGPUInt32 trust);
-
-PGPError PGPUnsetKeyAxiomatic( PGPKeyRef key);
-
-/* Get property functions */
-
-PGPError PGPGetKeyBoolean( PGPKeyRef key, PGPKeyPropName propname,
- PGPBoolean *prop);
-
-PGPError PGPGetKeyNumber( PGPKeyRef key, PGPKeyPropName propname,
- PGPInt32 *prop);
-
-/* 'buffer' is NOT null-terminated */
-/* returns kPGPError_BufferTooSmall if buffer is too small, but
-fill buffer to capacity */
-PGPError PGPGetKeyPropertyBuffer( PGPKeyRef key,
- PGPKeyPropName propname,
- PGPSize bufferSize, void *data, PGPSize *fullSize);
-
-PGPError PGPGetKeyTime( PGPKeyRef key, PGPKeyPropName propname,
- PGPTime *prop);
-
-PGPError PGPGetSubKeyBoolean( PGPSubKeyRef subkey,
- PGPKeyPropName propname, PGPBoolean *prop);
-
-PGPError PGPGetSubKeyNumber( PGPSubKeyRef subkey,
- PGPKeyPropName propname, PGPInt32 *prop);
-
-/* returns kPGPError_BufferTooSmall if buffer is too small, but
-fill buffer to capacity */
-PGPError PGPGetSubKeyPropertyBuffer( PGPSubKeyRef subkey,
- PGPKeyPropName propname,
- PGPSize bufferSize, void *prop, PGPSize *fullSize);
-
-PGPError PGPGetSubKeyTime( PGPSubKeyRef subkey,
- PGPKeyPropName propname, PGPTime *prop);
-
-PGPError PGPGetUserIDNumber( PGPUserIDRef userID,
- PGPUserIDPropName propname, PGPInt32 *prop);
-
-PGPError PGPGetUserIDBoolean( PGPUserIDRef userID,
- PGPUserIDPropName propname, PGPBoolean *prop);
-
-/* 'string' is always NULL-terminated */
-/* returns kPGPError_BufferTooSmall if buffer is too small, but
-fill buffer to capacity */
-PGPError PGPGetUserIDStringBuffer( PGPUserIDRef userID,
- PGPUserIDPropName propname,
- PGPSize bufferSize,
- char * string,
- PGPSize * fullSize);
-
-/* 'buffer' is NOT null-terminated */
-/* returns kPGPError_BufferTooSmall if buffer is too small, but
-fill buffer to capacity */
-PGPError PGPGetSigPropertyBuffer( PGPSigRef cert,
- PGPSigPropName propname,
- PGPSize bufferSize, void *data, PGPSize *fullSize);
-
-PGPError PGPGetSigBoolean( PGPSigRef cert,
- PGPSigPropName propname, PGPBoolean *prop);
-
-PGPError PGPGetSigNumber( PGPSigRef cert, PGPSigPropName propname,
- PGPInt32 *prop);
-
-PGPError PGPGetKeyIDOfCertifier( PGPSigRef sig, PGPKeyID *outID );
-
-PGPError PGPGetSigTime( PGPSigRef cert, PGPSigPropName propname,
- PGPTime *prop);
-
-PGPError PGPGetHashAlgUsed( PGPKeyRef key, PGPHashAlgorithm *hashAlg);
-
-/* Convenience property functions */
-
-PGPError PGPGetPrimaryUserID( PGPKeyRef key, PGPUserIDRef *outRef );
-PGPError PGPGetPrimaryAttributeUserID (PGPKeyRef key,
- PGPAttributeType attributeType, PGPUserIDRef *outRef);
-
-/* 'string' is always a C string and
- *fullSize includes the '\0' terminator */
-/* returns kPGPError_BufferTooSmall if buffer is too small, but
-fill buffer to capacity */
-PGPError PGPGetPrimaryUserIDNameBuffer( PGPKeyRef key,
- PGPSize bufferSize,
- char * string, PGPSize *fullSize );
-
-PGPError PGPGetPrimaryUserIDValidity(PGPKeyRef key,
- PGPValidity *validity);
-
-
-PGPInt32 PGPCompareKeys(PGPKeyRef a, PGPKeyRef b,
- PGPKeyOrdering order);
-
-PGPInt32 PGPCompareUserIDStrings(char const *a, char const *b);
-
-PGPError PGPOrderKeySet( PGPKeySetRef src,
- PGPKeyOrdering order, PGPKeyListRef *outRef );
-
-PGPError PGPIncKeyListRefCount( PGPKeyListRef keys);
-
-PGPError PGPFreeKeyList( PGPKeyListRef keys);
-
-
-/* Key iteration functions */
-
-
-
-PGPError PGPNewKeyIter (PGPKeyListRef keys, PGPKeyIterRef *outRef);
-
-PGPError PGPCopyKeyIter (PGPKeyIterRef orig, PGPKeyIterRef *outRef);
-
-PGPError PGPFreeKeyIter (PGPKeyIterRef iter);
-
-PGPInt32 PGPKeyIterIndex (PGPKeyIterRef iter);
-
-PGPError PGPKeyIterRewind (PGPKeyIterRef iter);
-
-PGPInt32 PGPKeyIterSeek (PGPKeyIterRef iter, PGPKeyRef key);
-
-PGPError PGPKeyIterMove (PGPKeyIterRef iter, PGPInt32 relOffset,
- PGPKeyRef *outRef);
-
-PGPError PGPKeyIterNext (PGPKeyIterRef iter, PGPKeyRef *outRef);
-
-PGPError PGPKeyIterPrev (PGPKeyIterRef iter, PGPKeyRef *outRef);
-
-PGPError PGPKeyIterKey (PGPKeyIterRef iter, PGPKeyRef *outRef);
-
-PGPError PGPKeyIterSubKey (PGPKeyIterRef iter,
- PGPSubKeyRef *outRef );
-
-PGPError PGPKeyIterUserID (PGPKeyIterRef iter,
- PGPUserIDRef *outRef );
-PGPError PGPKeyIterSig (PGPKeyIterRef iter,
- PGPSigRef *outRef );
-
-PGPError PGPKeyIterNextSubKey (PGPKeyIterRef iter,
- PGPSubKeyRef *outRef );
-
-PGPError PGPKeyIterPrevSubKey (PGPKeyIterRef iter,
- PGPSubKeyRef *outRef);
-
-PGPError PGPKeyIterRewindSubKey (PGPKeyIterRef iter);
-
-PGPError PGPKeyIterNextUserID (PGPKeyIterRef iter,
- PGPUserIDRef *outRef);
-
-PGPError PGPKeyIterPrevUserID (PGPKeyIterRef iter,
- PGPUserIDRef *outRef);
-
-PGPError PGPKeyIterRewindUserID (PGPKeyIterRef iter);
-
-PGPError PGPKeyIterNextUIDSig (PGPKeyIterRef iter,
- PGPSigRef *outRef);
-
-PGPError PGPKeyIterPrevUIDSig (PGPKeyIterRef iter,
- PGPSigRef *outRef);
-
-PGPError PGPKeyIterRewindUIDSig (PGPKeyIterRef iter);
-
-
-/* Get/set default private key */
-
-PGPError PGPGetDefaultPrivateKey( PGPKeySetRef keyset,
- PGPKeyRef *outRef );
-
-PGPError PGPSetDefaultPrivateKey( PGPKeyRef key);
-
-
-
-/* Get/set user value */
-
-PGPError PGPSetKeyUserVal( PGPKeyRef key, PGPUserValue userValue);
-
-PGPError PGPSetUserIDUserVal( PGPUserIDRef userid,
- PGPUserValue userValue);
-
-PGPError PGPSetSubKeyUserVal( PGPSubKeyRef subkey,
- PGPUserValue userValue);
-
-PGPError PGPSetSigUserVal( PGPSigRef cert,
- PGPUserValue userValue);
-
-PGPError PGPGetKeyUserVal( PGPKeyRef key,
- PGPUserValue *userValue);
-
-PGPError PGPGetUserIDUserVal( PGPUserIDRef userid,
- PGPUserValue *userValue);
-
-PGPError PGPGetSubKeyUserVal( PGPSubKeyRef subkey,
- PGPUserValue *userValue);
-
-PGPError PGPGetSigUserVal( PGPSigRef cert,
- PGPUserValue *userValue);
-
-/* Passphrase conversion to passkeybuffer */
-/* The size of the output buffer is from the kPGPKeyPropLockingBits property */
-
-PGPError PGPGetKeyPasskeyBuffer ( PGPKeyRef key,
- void *passkeyBuffer, PGPOptionListRef firstOption,...);
-
-PGPError PGPGetSubKeyPasskeyBuffer ( PGPSubKeyRef subkey,
- void *passkeyBuffer, PGPOptionListRef firstOption,...);
-
-
-/* Change key options which are stored in self signatures internally */
-
-PGPError PGPAddKeyOptions( PGPKeyRef key,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPRemoveKeyOptions( PGPKeyRef key,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPUpdateKeyOptions( PGPKeyRef key,
- PGPOptionListRef firstOption, ...);
-
-
-
-/*____________________________________________________________________________
- Key IDs
-____________________________________________________________________________*/
-PGPError PGPGetKeyIDFromString(
- const char *string, PGPKeyID *id );
-
-PGPError PGPGetKeyIDFromKey( PGPKeyRef key, PGPKeyID *id );
-
-PGPError PGPGetKeyIDFromSubKey( PGPSubKeyRef key, PGPKeyID * id );
-
-enum PGPKeyIDStringType_
-{
- kPGPKeyIDString_Abbreviated = 2,
- kPGPKeyIDString_Full = 3,
- PGP_ENUM_FORCE( PGPKeyIDStringType_ )
-};
-PGPENUM_TYPEDEF( PGPKeyIDStringType_, PGPKeyIDStringType );
-
-
-#define kPGPMaxKeyIDStringSize ( 127 + 1 )
-PGPError PGPGetKeyIDString( PGPKeyID const * ref,
- PGPKeyIDStringType type,
- char outString[ kPGPMaxKeyIDStringSize ] );
-
-
-/* outputs opaque string of bytes for storage of maximum size as keyID*/
-/* do NOT attempt to parse the output; it is opaque to you */
-#define kPGPMaxExportedKeyIDSize ( sizeof( PGPKeyID ) )
-PGPError PGPExportKeyID( PGPKeyID const * keyID,
- PGPByte exportedData[ kPGPMaxExportedKeyIDSize ],
- PGPSize *exportedLength );
-
-/* must be in format output by PGPExportKeyID */
-PGPError PGPImportKeyID( void const * data, PGPKeyID * id );
-
-/* returns 0 if equal, -1 if key1 < key2, 1 if key1 > key2 */
-PGPInt32 PGPCompareKeyIDs( PGPKeyID const * key, PGPKeyID const * key2);
-
-
-
-
-/*____________________________________________________________________________
- Getting contexts back from key related items. If the key is invalid,
- you get kPGPInvalidRef back.
-____________________________________________________________________________*/
-
-PGPContextRef PGPGetKeyListContext( PGPKeyListRef ref );
-PGPContextRef PGPGetKeySetContext( PGPKeySetRef ref );
-PGPContextRef PGPGetKeyIterContext( PGPKeyIterRef ref );
-PGPContextRef PGPGetKeyContext( PGPKeyRef ref );
-PGPContextRef PGPGetSubKeyContext( PGPSubKeyRef ref );
-PGPContextRef PGPGetUserIDContext( PGPUserIDRef ref );
-
-/*____________________________________________________________________________
- Getting parent objects from key related items. If the input is invalid,
- you get kPGPInvalidRef back.
-____________________________________________________________________________*/
-PGPKeyRef PGPGetUserIDKey( PGPUserIDRef ref );
-PGPUserIDRef PGPGetSigUserID( PGPSigRef ref );
-PGPKeyRef PGPGetSigKey( PGPSigRef ref );
-
-
-/*____________________________________________________________________________
- Secret sharing functionality
-____________________________________________________________________________*/
-
-PGPError PGPSecretShareData(PGPContextRef context,
- void const * input, PGPSize inputBytes,
- PGPUInt32 threshold, PGPUInt32 nShares, void * output);
-
-PGPError PGPSecretReconstructData(PGPContextRef context,
- void * input, PGPSize outputBytes,
- PGPUInt32 nShares, void * output);
-
-
-/*____________________________________________________________________________
- X509 certificate specific
-____________________________________________________________________________*/
-
-PGPError PGPVerifyX509CertificateChain (PGPContextRef context,
- PGPByte *certchain, PGPByte *rootcerts);
-
-PGPError PGPCreateDistinguishedName( PGPContextRef context,
- char const *str,
- PGPByte **pdname, PGPSize *pdnamelen );
-
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-
-#endif /* ] Included_pgpKeys_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpMemoryMgr.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpMemoryMgr.h
deleted file mode 100644
index 7480d52b55..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpMemoryMgr.h
+++ /dev/null
@@ -1,235 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- Contains the definition of the PGPMemoryMgr object.
-
- $Id: pgpMemoryMgr.h,v 1.21 1999/05/07 01:55:45 heller Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpMemoryMgr_h /* [ */
-#define Included_pgpMemoryMgr_h
-
-
-#include "pgpBase.h"
-
-/*____________________________________________________________________________
- Mini-tutorial:
-
- A PGPMemoryMgr is an object which implements memory management, including
- allocation, reallocation, deallocation, and secure versions of the same.
-
- *** Using it ***
- A typical sequence of calls is as follows:
- PGPNewMemoryMgr
- ...
- PGPNewData or PGPNewSecureData
- PGPFreeData
- ...
- PGPFreeMemoryMgr
-
- Typically, a program will create one PGPMemoryMgr per thread at
- thread creation time and use that memory mgr until the thread dies.
- Generally, an individual PGPMemoryMgr instance is not thread-safe;
- you must either synchronize or use one PGPMemoryMgr per thread.
-
-
- *** Custom Allocators ***
-
- Default allocators are supplied, but the client can create a custom
- PGPMemoryMgr using PGPNewMemoryMgrCustom() which uses client-supplied
- routines.
- Custom routines need only concern themselves with the actual
- allocation and deallocation.
- The following should be kept in mind for user supplied routines:
- - they can ignore the allocation flags passed
- - leaks, memory clearing, etc is done by the PGPMemoryMgr
- - secure allocator must set 'isNonPageable' to TRUE only if the
- memory really can't be paged.
- - the user value is not interpreted by the PGPMemoryMgr. Typically,
- it would be a pointer to some data the allocation routines use
- to store state.
-
-
- *** Secure memory allocation ***
-
- Blocks can be allocated as "Secure" blocks. Secure blocks are guaranteed
- to be wiped when they are deallocated. Additionally, if the operating
- system and the current conditions allow, the block will be allocated
- in non-pageable memory. You can determine the attributes of a block using
- PGPGetMemoryMgrDataInfo().
-
-
- *** Leaks tracking ***
-
- Leaks tracking is implemented when debugging is on,
- but currently reporting is limited to reporting the number of leaks
- outstanding when the PGPMemoryMgr is disposed.
-
-
- *** Debugging ***
-
- For debugging purposes, blocks may be larger in debug mode to accomodate
- various schemes to detect stray pointers, etc.
-____________________________________________________________________________*/
-
-
-#if PRAGMA_ALIGN_SUPPORTED
-#pragma options align=mac68k
-#endif
-
-enum
-{
- kPGPMemoryMgrFlags_None = 0,
- kPGPMemoryMgrFlags_Clear = 1
-};
-
-typedef PGPFlags PGPMemoryMgrFlags;
-
-typedef struct PGPMemoryMgr PGPMemoryMgr;
-typedef PGPMemoryMgr * PGPMemoryMgrRef;
-
-#define kInvalidPGPMemoryMgrRef ((PGPMemoryMgrRef) NULL)
-#define PGPMemoryMgrRefIsValid(ref) ((ref) != kInvalidPGPMemoryMgrRef)
-
-typedef void *(*PGPMemoryMgrAllocationProc)( PGPMemoryMgrRef mgr,
- PGPUserValue userValue,
- PGPSize requestSize, PGPMemoryMgrFlags flags );
-
-/* realloc not be implemented using PGPNewData() */
-typedef PGPError (*PGPMemoryMgrReallocationProc)( PGPMemoryMgrRef mgr,
- PGPUserValue userValue,
- void **allocation, PGPSize newAllocationSize,
- PGPMemoryMgrFlags flags, PGPSize existingSize );
-
-typedef PGPError (*PGPMemoryMgrDeallocationProc)( PGPMemoryMgrRef mgr,
- PGPUserValue userValue,
- void *allocation, PGPSize allocationSize );
-
-
-
-typedef void *(*PGPMemoryMgrSecureAllocationProc)( PGPMemoryMgrRef mgr,
- PGPUserValue userValue,
- PGPSize requestSize, PGPMemoryMgrFlags flags,
- PGPBoolean *isNonPageable );
-
-
-/* deallocation proc need not clear the memory upon deallocation since
- PGPFreeData() does it automatically */
-typedef PGPError (*PGPMemoryMgrSecureDeallocationProc)( PGPMemoryMgrRef mgr,
- PGPUserValue userValue,
- void *allocation, PGPSize allocationSize,
- PGPBoolean wasLocked );
-
-
-typedef struct PGPNewMemoryMgrStruct
-{
- /* sizeofStruct must be inited to sizeof( PGPNewMemoryMgrStruct ) */
- PGPUInt32 sizeofStruct;
- PGPFlags reservedFlags;
-
- PGPMemoryMgrAllocationProc allocProc;
- PGPMemoryMgrReallocationProc reallocProc;
- PGPMemoryMgrDeallocationProc deallocProc;
-
- PGPMemoryMgrSecureAllocationProc secureAllocProc;
- void * reserved; /* MUST be zeroed */
- PGPMemoryMgrSecureDeallocationProc secureDeallocProc;
-
- PGPUserValue customValue;
- void * pad[ 8 ]; /* MUST be zeroed */
-} PGPNewMemoryMgrStruct;
-
-PGP_BEGIN_C_DECLARATIONS
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-
-/*____________________________________________________________________________
- Memory Mgr routines
-____________________________________________________________________________*/
-PGPBoolean PGPMemoryMgrIsValid( PGPMemoryMgrRef mgr );
-#define PGPValidateMemoryMgr( mgr ) \
- PGPValidateParam( PGPMemoryMgrIsValid( mgr ) )
-
-PGPError PGPNewMemoryMgr( PGPFlags reserved,
- PGPMemoryMgrRef *newMemoryMgr );
-
-PGPError PGPNewMemoryMgrCustom( PGPNewMemoryMgrStruct const * custom,
- PGPMemoryMgrRef *newMemoryMgr );
-
-PGPError PGPFreeMemoryMgr( PGPMemoryMgrRef mgr );
-
-PGPError PGPGetMemoryMgrCustomValue( PGPMemoryMgrRef mgr,
- PGPUserValue *customValue );
-PGPError PGPSetMemoryMgrCustomValue( PGPMemoryMgrRef mgr,
- PGPUserValue customValue );
-
-/* allocate a block of the specified size */
-void * PGPNewData( PGPMemoryMgrRef mgr,
- PGPSize requestSize, PGPMemoryMgrFlags flags );
-
-/* allocate a block of the specified size in non-pageable memory */
-/* *isSecure is TRUE if the block definitely can't be paged */
-void * PGPNewSecureData( PGPMemoryMgrRef mgr,
- PGPSize requestSize, PGPMemoryMgrFlags flags );
-
-/* properly reallocs secure or non-secure blocks */
-/* WARNING: the block may move, even if its size is being reduced */
-PGPError PGPReallocData( PGPMemoryMgrRef mgr,
- void **allocation, PGPSize newAllocationSize,
- PGPMemoryMgrFlags flags );
-
-/* properly frees secure or non-secure blocks */
-PGPError PGPFreeData( void *allocation );
-
-
-/*____________________________________________________________________________
- Block Info:
- kPGPMemoryMgrBlockInfo_Valid it's a valid block
- kPGPMemoryMgrBlockInfo_Secure block is a secure allocation
- kPGPMemoryMgrBlockInfo_NonPageable block cannot be paged by VM
-
- Secure blocks are always wiped before being disposed,
- but may or may not be pageable, depending on the OS facilities. Some
- OSs may not provide the ability to make blocks non-pageable.
-
- You should check these flags if the information matters to you.
-____________________________________________________________________________*/
-#define kPGPMemoryMgrBlockInfo_Valid ( ((PGPFlags)1) << 0 )
-#define kPGPMemoryMgrBlockInfo_Secure ( ((PGPFlags)1) << 1 )
-#define kPGPMemoryMgrBlockInfo_NonPageable ( ((PGPFlags)1) << 2 )
-PGPFlags PGPGetMemoryMgrDataInfo( void *allocation );
-
-
-/*____________________________________________________________________________
- Default memory manager routines:
-____________________________________________________________________________*/
-
-PGPMemoryMgrRef PGPGetDefaultMemoryMgr(void);
-PGPError PGPSetDefaultMemoryMgr(PGPMemoryMgrRef memoryMgr);
-
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-
-
-#if PRAGMA_ALIGN_SUPPORTED
-#pragma options align=reset
-#endif
-
-
-#endif /* ] Included_pgpMemoryMgr_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpOptionList.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpOptionList.h
deleted file mode 100644
index 7ccbc8e1b7..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpOptionList.h
+++ /dev/null
@@ -1,452 +0,0 @@
-/*____________________________________________________________________________
- pgpOptionList.h
-
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- This file contains the types and prototypes for functions which manipulate
- PGPOptionList data structures.
-
- $Id: pgpOptionList.h,v 1.35 1999/05/07 23:47:46 hal Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpOptionList_h /* [ */
-#define Included_pgpOptionList_h
-
-#include <stdarg.h>
-
-#include "pgpPubTypes.h"
-
-#if PGP_MACINTOSH
-#include <Files.h>
-#endif
-
-/* Standard event callback declaration */
-struct PGPEvent;
-typedef PGPError (*PGPEventHandlerProcPtr)(PGPContextRef context,
- struct PGPEvent *event, PGPUserValue userValue);
-
-/* Export formats for exporting functions */
-enum PGPExportFormat_
-{
- kPGPExportFormat_Basic = 1,
- kPGPExportFormat_Complete = 255,
-
- kPGPExportFormat_X509Cert = 10000,
-
- kPGPExportFormat_X509CertReq = 11000,
- kPGPExportFormat_NetToolsCAV1_CertReq,
- kPGPExportFormat_VerisignV1_CertReq,
- kPGPExportFormat_EntrustV1_CertReq,
-
- /* Deprecated aliases for three above */
-/* kPGPExportFormat_NetToolsCAV1 = 11001,
- kPGPExportFormat_VerisignV1,
- kPGPExportFormat_EntrustV1,
-*/
- kPGPExportFormat_X509GetCertInitial = 11010,
- kPGPExportFormat_NetToolsCAV1_GetCertInitial,
- kPGPExportFormat_VerisignV1_GetCertInitial,
- kPGPExportFormat_EntrustV1_GetCertInitial,
-
- kPGPExportFormat_X509GetCRL = 11020,
- kPGPExportFormat_NetToolsCAV1_GetCRL,
- kPGPExportFormat_VerisignV1_GetCRL,
- kPGPExportFormat_EntrustV1_GetCRL,
-
- PGP_ENUM_FORCE( PGPExportFormat_ )
-} ;
-PGPENUM_TYPEDEF( PGPExportFormat_, PGPExportFormat );
-
-/* Input formats for PGPOInputFormat */
-enum PGPInputFormat_
-{
- kPGPInputFormat_Unknown = 0,
- kPGPInputFormat_PGP = 1,
-
- kPGPInputFormat_X509DataInPKCS7 = 10000,
- kPGPInputFormat_NetToolsCAV1_DataInPKCS7,
- kPGPInputFormat_VerisignV1_DataInPKCS7,
- kPGPInputFormat_EntrustV1_DataInPKCS7,
-
- /* Deprecated aliases for three above */
-/* kPGPInputFormat_NetToolsCAV1 = 10001,
- kPGPInputFormat_VerisignV1,
- kPGPInputFormat_EntrustV1,
-*/
- kPGPInputFormat_PEMEncodedX509Cert,
- kPGPInputFormat_NetToolsCAV1_PEMEncoded,
- kPGPInputFormat_VerisignV1_PEMEncoded,
- kPGPInputFormat_EntrustV1_PEMEncoded,
-
- /* Input formats for X.509 private keys */
- kPGPInputFormat_PrivateKeyInfo,
- kPGPInputFormat_PKCS12,
-
- PGP_ENUM_FORCE( PGPInputFormat_ )
-} ;
-PGPENUM_TYPEDEF( PGPInputFormat_, PGPInputFormat );
-
-/* Output formats for PGPOOutputFormat */
-enum PGPOutputFormat_
-{
- kPGPOutputFormat_Unknown = 0,
- kPGPOutputFormat_PGP = 1,
-
- kPGPOutputFormat_X509CertReqInPKCS7 = 10000,
- kPGPOutputFormat_NetToolsCAV1_CertReqInPKCS7,
- kPGPOutputFormat_VerisignV1_CertReqInPKCS7,
- kPGPOutputFormat_EntrustV1_CertReqInPKCS7,
-
- /* Deprecated aliases for above three */
-/* kPGPOutputFormat_NetToolsCAV1 = 10001,
- kPGPOutputFormat_VerisignV1,
- kPGPOutputFormat_EntrustV1,
-*/
- kPGPOutputFormat_X509GetCertInitialInPKCS7 = 10010,
- kPGPOutputFormat_NetToolsCAV1_GetCertInitialInPKCS7,
- kPGPOutputFormat_VerisignV1_GetCertInitialInPKCS7,
- kPGPOutputFormat_EntrustV1_GetCertInitialInPKCS7,
-
- kPGPOutputFormat_X509GetCRLInPKCS7 = 10020,
- kPGPOutputFormat_NetToolsCAV1_GetCRLInPKCS7,
- kPGPOutputFormat_VerisignV1_GetCRLInPKCS7,
- kPGPOutputFormat_EntrustV1_GetCRLInPKCS7,
-
- PGP_ENUM_FORCE( PGPOutputFormat_ )
-} ;
-PGPENUM_TYPEDEF( PGPOutputFormat_, PGPOutputFormat );
-
-/* Attribute-Value structure for PGPOAttributeValue */
-enum PGPAVAttribute_
-{
- /* Pointer properties */
- kPGPAVAttributeFirstPointer = 0,
- kPGPAVAttribute_CommonName = kPGPAVAttributeFirstPointer,
- kPGPAVAttribute_Email,
- kPGPAVAttribute_OrganizationName,
- kPGPAVAttribute_OrganizationalUnitName,
- kPGPAVAttribute_SurName,
- kPGPAVAttribute_SerialNumber,
- kPGPAVAttribute_Country,
- kPGPAVAttribute_Locality,
- kPGPAVAttribute_State,
- kPGPAVAttribute_StreetAddress,
- kPGPAVAttribute_Title,
- kPGPAVAttribute_Description,
- kPGPAVAttribute_PostalCode,
- kPGPAVAttribute_POBOX,
- kPGPAVAttribute_PhysicalDeliveryOfficeName,
- kPGPAVAttribute_TelephoneNumber,
- kPGPAVAttribute_X121Address,
- kPGPAVAttribute_ISDN,
- kPGPAVAttribute_DestinationIndicator,
- kPGPAVAttribute_Name,
- kPGPAVAttribute_GivenName,
- kPGPAVAttribute_Initials,
- kPGPAVAttribute_HouseIdentifier,
- kPGPAVAttribute_DirectoryManagementDomain,
- kPGPAVAttribute_DomainComponent,
- kPGPAVAttribute_UnstructuredName,
- kPGPAVAttribute_UnstructuredAddress,
- kPGPAVAttribute_RFC822Name,
- kPGPAVAttribute_DNSName,
- kPGPAVAttribute_AnotherName,
- kPGPAVAttribute_IPAddress,
- kPGPAVAttribute_CertificateExtension,
-
- /* Verisign specific */
- kPGPAVAttribute_Challenge,
- kPGPAVAttribute_CertType,
- kPGPAVAttribute_MailFirstName,
- kPGPAVAttribute_MailMiddleName,
- kPGPAVAttribute_MailLastName,
- kPGPAVAttribute_EmployeeID,
- kPGPAVAttribute_MailStop,
- kPGPAVAttribute_AdditionalField4,
- kPGPAVAttribute_AdditionalField5,
- kPGPAVAttribute_AdditionalField6,
- kPGPAVAttribute_Authenticate,
-
-
- /* Boolean properties */
- kPGPAVAttributeFirstBoolean = 1000,
-
- /* Verisign specific */
- kPGPAVAttribute_EmbedEmail,
-
-
- /* Numeric (PGPUInt32) properties */
- kPGPAVAttributeFirstNumber = 2000,
-
- PGP_ENUM_FORCE( PGPAVAttribute_ )
-} ;
-PGPENUM_TYPEDEF( PGPAVAttribute_, PGPAVAttribute );
-
-typedef struct PGPAttributeValue {
- PGPAVAttribute attribute;
- PGPSize size;
- union {
- PGPBoolean booleanvalue;
- PGPUInt32 longvalue;
- void *pointervalue;
- } value;
- PGPUInt32 unused;
-} PGPAttributeValue ;
-
-
-
-PGP_BEGIN_C_DECLARATIONS
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-PGPError PGPNewOptionList(PGPContextRef context,
- PGPOptionListRef *outList);
-PGPError PGPAppendOptionList(PGPOptionListRef optionList,
- PGPOptionListRef firstOption, ...);
-PGPError PGPBuildOptionList( PGPContextRef context,
- PGPOptionListRef *outList,
- PGPOptionListRef firstOption, ...);
-PGPError PGPCopyOptionList(PGPOptionListRef optionList,
- PGPOptionListRef *outList );
-PGPError PGPFreeOptionList(PGPOptionListRef optionList);
-
-/*
-** The following functions are used to create PGPOptionListRef's for
-** specifying the various options to several SDK functions. The
-** functions can be used as inline parameters in a temporary manner or
-** used with PGPBuildOptionList() to create persistent lists.
-*/
-
-/*
-** Special PGPOptionListRef to mark last option passed to those functions
-** which take variable lists of PGPOptionListRef's:
-*/
-
-PGPOptionListRef PGPOLastOption( PGPContextRef context );
-
-/*
-** Special PGPOptionListRef which is always ignored:
-*/
-
-PGPOptionListRef PGPONullOption( PGPContextRef context);
-
-/* Data input (required): */
-
-PGPOptionListRef PGPOInputFile( PGPContextRef context,
- PGPFileSpecRef fileRef);
-PGPOptionListRef PGPOInputBuffer( PGPContextRef context,
- void const *buffer, PGPSize bufferSize);
-#if PGP_MACINTOSH
-PGPOptionListRef PGPOInputFileFSSpec( PGPContextRef context,
- const FSSpec *fileSpec);
-#endif
-
-/* Data output (optional, generates event if missing): */
-
-PGPOptionListRef PGPOOutputFile( PGPContextRef context,
- PGPFileSpecRef fileRef);
-PGPOptionListRef PGPOOutputBuffer( PGPContextRef context,
- void *buffer, PGPSize bufferSize,
- PGPSize *outputDataLength);
-#if PGP_MACINTOSH
-PGPOptionListRef PGPOOutputFileFSSpec( PGPContextRef context,
- const FSSpec *fileSpec);
-#endif
-
-/* '*buffer' must be disposed of via PGPFreeData() */
-/* maximum memory usage will be no more than maximumBufferSize */
-PGPOptionListRef PGPOAllocatedOutputBuffer(PGPContextRef context,
- void **buffer,
- PGPSize maximumBufferSize,
- PGPSize *actualBufferSize);
-PGPOptionListRef PGPOAppendOutput( PGPContextRef context,
- PGPBoolean appendOutput );
-PGPOptionListRef PGPODiscardOutput( PGPContextRef context,
- PGPBoolean discardOutput );
-
-/* Encrypting and signing */
-
-PGPOptionListRef PGPOEncryptToKey( PGPContextRef context,
- PGPKeyRef keyRef);
-PGPOptionListRef PGPOEncryptToKeySet( PGPContextRef context,
- PGPKeySetRef keySetRef);
-PGPOptionListRef PGPOEncryptToUserID( PGPContextRef context,
- PGPUserIDRef userIDRef);
-PGPOptionListRef PGPOSignWithKey( PGPContextRef context,
- PGPKeyRef keyRef,
- PGPOptionListRef firstOption, ...);
-PGPOptionListRef PGPOConventionalEncrypt( PGPContextRef context,
- PGPOptionListRef firstOption,
- ...);
-
-PGPOptionListRef PGPOPassphraseBuffer( PGPContextRef context,
- const void *passphrase, PGPSize passphraseLength);
-PGPOptionListRef PGPOPassphrase( PGPContextRef context,
- const char *passphrase);
-PGPOptionListRef PGPOPasskeyBuffer( PGPContextRef context,
- const void *passkey, PGPSize passkeyLength);
-PGPOptionListRef PGPOSessionKey( PGPContextRef context,
- const void *sessionKey, PGPSize sessionKeyLength);
-PGPOptionListRef PGPOAskUserForEntropy( PGPContextRef context,
- PGPBoolean askUserForEntropy );
-PGPOptionListRef PGPORawPGPInput( PGPContextRef context,
- PGPBoolean rawPGPInput );
-PGPOptionListRef PGPOCompression( PGPContextRef context,
- PGPBoolean compression );
-
-PGPOptionListRef PGPOLocalEncoding( PGPContextRef context,
- PGPLocalEncodingFlags localEncode);
-PGPOptionListRef PGPOOutputLineEndType(PGPContextRef context,
- PGPLineEndType lineEnd);
-PGPOptionListRef PGPOPGPMIMEEncoding(PGPContextRef context,
- PGPBoolean mimeEncoding, PGPSize *mimeBodyOffset,
- char mimeSeparator[ kPGPMimeSeparatorSize ]);
-PGPOptionListRef PGPOOmitMIMEVersion( PGPContextRef context,
- PGPBoolean omitVersion);
-PGPOptionListRef PGPOX509Encoding( PGPContextRef context,
- PGPBoolean x509Encoding);
-
-PGPOptionListRef PGPODetachedSig( PGPContextRef context,
- PGPOptionListRef firstOption,
- ...);
-
-PGPOptionListRef PGPOCipherAlgorithm( PGPContextRef context,
- PGPCipherAlgorithm algorithm);
-PGPOptionListRef PGPOHashAlgorithm( PGPContextRef context,
- PGPHashAlgorithm algorithm);
-
-PGPOptionListRef PGPOFailBelowValidity( PGPContextRef context,
- PGPValidity minValidity);
-PGPOptionListRef PGPOWarnBelowValidity( PGPContextRef context,
- PGPValidity minValidity);
-
-
-PGPOptionListRef PGPOEventHandler( PGPContextRef context,
- PGPEventHandlerProcPtr eventHandler,
- PGPUserValue eventHandlerData);
-PGPOptionListRef PGPOSendNullEvents( PGPContextRef context,
- PGPTimeInterval approxInterval);
-
-PGPOptionListRef PGPOArmorOutput( PGPContextRef context,
- PGPBoolean armorOutput );
-PGPOptionListRef PGPODataIsASCII( PGPContextRef context,
- PGPBoolean dataIsASCII );
-PGPOptionListRef PGPOClearSign( PGPContextRef context,
- PGPBoolean clearSign );
-PGPOptionListRef PGPOForYourEyesOnly( PGPContextRef context,
- PGPBoolean forYourEyesOnly );
-PGPOptionListRef PGPOKeySetRef( PGPContextRef context,
- PGPKeySetRef keysetRef);
-
-PGPOptionListRef PGPOExportKeySet( PGPContextRef context,
- PGPKeySetRef keysetRef);
-PGPOptionListRef PGPOExportKey( PGPContextRef context,
- PGPKeyRef keyRef);
-PGPOptionListRef PGPOExportUserID( PGPContextRef context,
- PGPUserIDRef useridRef);
-PGPOptionListRef PGPOExportSig( PGPContextRef context,
- PGPSigRef sigRef);
-
-PGPOptionListRef PGPOImportKeysTo( PGPContextRef context,
- PGPKeySetRef keysetRef);
-PGPOptionListRef PGPOSendEventIfKeyFound( PGPContextRef context,
- PGPBoolean sendEventIfKeyFound );
-PGPOptionListRef PGPOPassThroughIfUnrecognized( PGPContextRef context,
- PGPBoolean passThroughIfUnrecognized );
-PGPOptionListRef PGPOPassThroughClearSigned( PGPContextRef context,
- PGPBoolean passThroughClearSigned );
-PGPOptionListRef PGPOPassThroughKeys( PGPContextRef context,
- PGPBoolean passThroughKeys );
-PGPOptionListRef PGPORecursivelyDecode( PGPContextRef context,
- PGPBoolean recurse );
-
-PGPOptionListRef PGPOKeyGenParams( PGPContextRef context,
- PGPPublicKeyAlgorithm pubKeyAlg,
- PGPUInt32 bits);
-
-PGPOptionListRef PGPOKeyGenName( PGPContextRef context,
- const void *name, PGPSize nameLength);
-
-PGPOptionListRef PGPOCreationDate( PGPContextRef context,
- PGPTime creationDate);
-PGPOptionListRef PGPOExpiration( PGPContextRef context,
- PGPUInt32 expirationDays);
-
-PGPOptionListRef PGPOAdditionalRecipientRequestKeySet(
- PGPContextRef context,
- PGPKeySetRef arKeySetRef, PGPByte arkClass);
-
-PGPOptionListRef PGPORevocationKeySet(PGPContextRef context,
- PGPKeySetRef raKeySetRef);
-
-PGPOptionListRef PGPOKeyGenMasterKey( PGPContextRef context,
- PGPKeyRef masterKeyRef);
-
-PGPOptionListRef PGPOPreferredAlgorithms(
- PGPContextRef context,
- PGPCipherAlgorithm const *prefAlg,
- PGPUInt32 numAlgs);
-
-PGPOptionListRef PGPOKeyGenFast( PGPContextRef context,
- PGPBoolean fastGen);
-
-PGPOptionListRef PGPOKeyGenUseExistingEntropy( PGPContextRef context,
- PGPBoolean useExistingEntropy);
-
-PGPOptionListRef PGPOCommentString( PGPContextRef context,
- char const *comment);
-
-PGPOptionListRef PGPOVersionString( PGPContextRef context,
- char const *version);
-
-PGPOptionListRef PGPOFileNameString( PGPContextRef context,
- char const *fileName);
-
-PGPOptionListRef PGPOSigRegularExpression(PGPContextRef context,
- char const *regularExpression);
-
-PGPOptionListRef PGPOExportPrivateKeys( PGPContextRef context,
- PGPBoolean exportKeys);
-
-PGPOptionListRef PGPOExportPrivateSubkeys( PGPContextRef context,
- PGPBoolean exportSubkeys);
-
-PGPOptionListRef PGPOExportFormat(PGPContextRef context,
- PGPExportFormat exportFormat);
-
-PGPOptionListRef PGPOExportable( PGPContextRef context,
- PGPBoolean exportable);
-
-PGPOptionListRef PGPOSigTrust( PGPContextRef context,
- PGPUInt32 trustLevel,
- PGPUInt32 trustValue);
-
-PGPOptionListRef PGPOInputFormat( PGPContextRef context,
- PGPInputFormat inputFormat );
-
-PGPOptionListRef PGPOOutputFormat( PGPContextRef context,
- PGPOutputFormat outputFormat );
-
-PGPOptionListRef PGPOAttributeValue( PGPContextRef context,
- PGPAttributeValue *attributeValue,
- PGPUInt32 attributeValueCount);
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpOptionList_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpPFLConfig.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpPFLConfig.h
deleted file mode 100644
index a5d7e67415..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpPFLConfig.h
+++ /dev/null
@@ -1,51 +0,0 @@
-/*____________________________________________________________________________
- pgpPFLConfig.h (Win32 version)
-
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- This file contains the Win32 version of the configuration file
- normally generated by the automatic configure script on Unix.
-
- $Id: pgpPFLConfig.h,v 1.8 1999/03/10 02:53:58 heller Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpPFLConfig_h /* [ */
-#define Included_pgpPFLConfig_h
-
-#define HAVE_STDARG_H 1
-#define HAVE_STDLIB_H 1
-#define HAVE_SYS_STAT_H 1
-#define HAVE_UNISTD_H 0
-#define HAVE_USHORT 0
-#define HAVE_UINT 0
-#define HAVE_ULONG 0
-#define NO_LIMITS_H 0
-#define NO_POPEN 1
-
-#if defined( __MWERKS__ )
-
- #define PGP_HAVE64 0
-
-
-#elif defined( _MSC_VER )
- #define PGP_HAVE64 1
- typedef __int64 PGPInt64;
- typedef unsigned __int64 PGPUInt64;
-
-
-
-#endif
-
-
-
-
-#endif /* ] Included_pgpPFLConfig_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpPFLErrors.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpPFLErrors.h
deleted file mode 100644
index ca35c79876..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpPFLErrors.h
+++ /dev/null
@@ -1,97 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- Error codes.
-
- $Id: pgpPFLErrors.h,v 1.24.6.1 1999/06/13 20:27:13 heller Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpPFLErrors_h /* [ */
-#define Included_pgpPFLErrors_h
-
-#include "pgpBase.h"
-
-#define kPGPPFLErrorBase -12000
-#define kPGPPFLErrorRange 500
-
-enum
-{
- /*
- NOTE: error numbers must not be changed as compile clients depend on them.
- */
-
- kPGPError_NoErr = 0,
-
- kPGPError_BadParams = -12000,
- kPGPError_OutOfMemory = -11999,
- kPGPError_BufferTooSmall = -11998,
-
- kPGPError_FileNotFound = -11997,
- kPGPError_CantOpenFile = -11996,
- kPGPError_FilePermissions = -11995,
- kPGPError_FileLocked = -11994,
- /* Was kPGPError_DiskFull = -11993, */
- kPGPError_IllegalFileOp = -11992,
- kPGPError_FileOpFailed = -11991,
- kPGPError_ReadFailed = -11990,
- kPGPError_WriteFailed = -11989,
- kPGPError_EOF = -11988,
-
- kPGPError_UserAbort = -11987,
- kPGPError_UnknownRequest = -11986,
- kPGPError_LazyProgrammer = -11985,
- kPGPError_ItemNotFound = -11984,
- kPGPError_ItemAlreadyExists = -11983,
- kPGPError_AssertFailed = -11982,
- kPGPError_BadMemAddress = -11981,
- kPGPError_UnknownError = -11980,
-
- kPGPError_PrefNotFound = -11979,
- kPGPError_EndOfIteration = -11978,
- kPGPError_ImproperInitialization = -11977,
- kPGPError_CorruptData = -11976,
- kPGPError_FeatureNotAvailable = -11975,
-
- kPGPError_DiskFull = -11960,
- kPGPError_DiskLocked = -11959,
-
-
- kPGPError_LastPFLError = kPGPPFLErrorBase + kPGPPFLErrorRange - 1
-};
-
-#define IsPGPError( err ) ( (err) != kPGPError_NoErr )
-#define IsntPGPError( err ) ( (err) == kPGPError_NoErr )
-
-
-
-#define PGPValidateParam( expr ) \
- if ( ! (expr ) ) \
- {\
- return( kPGPError_BadParams );\
- }
-
-#define PGPValidatePtr( ptr ) \
- PGPValidateParam( (ptr) != NULL )
-
-
-PGP_BEGIN_C_DECLARATIONS
-
-
-PGPError PGPGetPFLErrorString( PGPError theError,
- PGPSize bufferSize, char * theString );
-
-
-PGP_END_C_DECLARATIONS
-
-
-#endif /* ] Included_pgpPFLErrors_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpPubTypes.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpPubTypes.h
deleted file mode 100644
index a420bfb537..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpPubTypes.h
+++ /dev/null
@@ -1,276 +0,0 @@
-/*____________________________________________________________________________
- pgpPubTypes.h
-
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- Opaque types for various modules go in this file.
-
- $Id: pgpPubTypes.h,v 1.49.6.1 1999/06/11 06:14:33 heller Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpPubTypes_h /* [ */
-#define Included_pgpPubTypes_h
-
-
-#include "pgpConfig.h"
-#include "pgpBase.h"
-
-
-/*____________________________________________________________________________
- General data types used by PGPsdk
-____________________________________________________________________________*/
-typedef struct PGPContext * PGPContextRef;
-typedef struct PGPFileSpec * PGPFileSpecRef;
-typedef struct PGPOptionList * PGPOptionListRef;
-
-/*____________________________________________________________________________
- Data types used by the key manipulation functions
-____________________________________________________________________________*/
-
-typedef struct PGPKeyDB * PGPKeyDBRef;
-typedef struct PGPKey * PGPKeyRef;
-typedef struct PGPSubKey * PGPSubKeyRef;
-typedef struct PGPUserID * PGPUserIDRef;
-typedef struct PGPSig * PGPSigRef;
-typedef struct PGPKeySet * PGPKeySetRef;
-typedef struct PGPKeyList * PGPKeyListRef;
-typedef struct PGPKeyIter * PGPKeyIterRef;
-typedef struct PGPFilter * PGPFilterRef;
-
-typedef struct PGPKeyID
-{
- /* do not attempt to interpret these bytes; they *will* change */
- PGPByte opaqueBytes[ 34 ];
-} PGPKeyID;
-
-
-/*____________________________________________________________________________
- Data types used by symmetric ciphers, cipher modes, hashing
-____________________________________________________________________________*/
-typedef struct PGPHashContext * PGPHashContextRef;
-typedef struct PGPHMACContext * PGPHMACContextRef;
-typedef struct PGPPublicKeyContext * PGPPublicKeyContextRef;
-typedef struct PGPPrivateKeyContext * PGPPrivateKeyContextRef;
-typedef struct PGPCBCContext * PGPCBCContextRef;
-typedef struct PGPCFBContext * PGPCFBContextRef;
-typedef struct PGPSymmetricCipherContext * PGPSymmetricCipherContextRef;
-
-/*____________________________________________________________________________
- Data types used by keyserver code
-____________________________________________________________________________*/
-
-typedef struct PGPKeyServer * PGPKeyServerRef;
-
-/*____________________________________________________________________________
- Invalid values for each of the "ref" data types. Use these for assignment
- and initialization only. Use the PGPXXXRefIsValid macros (below) to test
- for valid/invalid values.
-____________________________________________________________________________*/
-
-#define kInvalidPGPContextRef ((PGPContextRef) NULL)
-#define kInvalidPGPFileSpecRef ((PGPFileSpecRef) NULL)
-#define kInvalidPGPOptionListRef ((PGPOptionListRef) NULL)
-
-#define kInvalidPGPKeyDBRef ((PGPKeyDBRef) NULL)
-#define kInvalidPGPKeyRef ((PGPKeyRef) NULL)
-#define kInvalidPGPSubKeyRef ((PGPSubKeyRef) NULL)
-#define kInvalidPGPUserIDRef ((PGPUserIDRef) NULL)
-#define kInvalidPGPSigRef ((PGPSigRef) NULL)
-#define kInvalidPGPKeySetRef ((PGPKeySetRef) NULL)
-#define kInvalidPGPKeyListRef ((PGPKeyListRef) NULL)
-#define kInvalidPGPKeyIterRef ((PGPKeyIterRef) NULL)
-#define kInvalidPGPFilterRef ((PGPFilterRef) NULL)
-#define kInvalidPGPKeyServerRef ((PGPKeyServerRef) NULL)
-
-
-#define kInvalidPGPHashContextRef \
- ((PGPHashContextRef) NULL)
-#define kInvalidPGPHMACContextRef \
- ((PGPHMACContextRef) NULL)
-#define kInvalidPGPCFBContextRef \
- ((PGPCFBContextRef) NULL)
-#define kInvalidPGPCBCContextRef \
- ((PGPCBCContextRef) NULL)
-#define kInvalidPGPSymmetricCipherContextRef \
- ((PGPSymmetricCipherContextRef) NULL)
-#define kInvalidPGPPublicKeyContextRef \
- ((PGPPublicKeyContextRef) NULL)
-#define kInvalidPGPPrivateKeyContextRef \
- ((PGPPrivateKeyContextRef) NULL)
-
-/* kPGPInvalidRef is deprecated. Please use a type-specific version */
-#define kPGPInvalidRef NULL
-
-/*____________________________________________________________________________
- Macros to test for ref validity. Use these in preference to comparing
- directly with the kInvalidXXXRef values.
-____________________________________________________________________________*/
-
-#define PGPContextRefIsValid( ref ) ( (ref) != kInvalidPGPContextRef )
-#define PGPFileSpecRefIsValid( ref ) ( (ref) != kInvalidPGPFileSpecRef )
-#define PGPOptionListRefIsValid( ref ) ( (ref) != kInvalidPGPOptionListRef )
-
-#define PGPKeyDBRefIsValid( ref ) ( (ref) != kInvalidPGPKeyDBRef )
-#define PGPKeyRefIsValid( ref ) ( (ref) != kInvalidPGPKeyRef )
-#define PGPSubKeyRefIsValid( ref ) ( (ref) != kInvalidPGPSubKeyRef )
-#define PGPUserIDRefIsValid( ref ) ( (ref) != kInvalidPGPUserIDRef )
-#define PGPSigRefIsValid( ref ) ( (ref) != kInvalidPGPSigRef )
-#define PGPKeySetRefIsValid( ref ) ( (ref) != kInvalidPGPKeySetRef )
-#define PGPKeyListRefIsValid( ref ) ( (ref) != kInvalidPGPKeyListRef )
-#define PGPKeyIterRefIsValid( ref ) ( (ref) != kInvalidPGPKeyIterRef )
-#define PGPFilterRefIsValid( ref ) ( (ref) != kInvalidPGPFilterRef )
-#define PGPKeyServerRefIsValid( ref ) ( (ref) != kInvalidPGPKeyServerRef )
-
-#define PGPHashContextRefIsValid( ref ) \
- ( (ref) != kInvalidPGPHashContextRef )
-#define PGPHMACContextRefIsValid( ref ) \
- ( (ref) != kInvalidPGPHMACContextRef )
-#define PGPCFBContextRefIsValid( ref ) \
- ( (ref) != kInvalidPGPCFBContextRef )
-#define PGPCBCContextRefIsValid( ref ) \
- ( (ref) != kInvalidPGPCBCContextRef )
-#define PGPSymmetricCipherContextRefIsValid( ref ) \
- ( (ref) != kInvalidPGPSymmetricCipherContextRef )
-#define PGPPublicKeyContextRefIsValid( ref ) \
- ( (ref) != kInvalidPGPPublicKeyContextRef )
-#define PGPPrivateKeyContextRefIsValid( ref ) \
- ( (ref) != kInvalidPGPPrivateKeyContextRef )
-
-/* PGPRefIsValid() is deprecated. Please use a type-specific version */
-#define PGPRefIsValid( ref ) ( (ref) != kPGPInvalidRef )
-
-/*____________________________________________________________________________
- Symmetric Ciphers
-____________________________________________________________________________*/
-
-enum PGPCipherAlgorithm_
-{
- /* do NOT change these values */
- kPGPCipherAlgorithm_None = 0,
- kPGPCipherAlgorithm_IDEA = 1,
- kPGPCipherAlgorithm_3DES = 2,
- kPGPCipherAlgorithm_CAST5 = 3,
-
- kPGPCipherAlgorithm_First = kPGPCipherAlgorithm_IDEA,
- kPGPCipherAlgorithm_Last = kPGPCipherAlgorithm_CAST5,
-
- PGP_ENUM_FORCE( PGPCipherAlgorithm_ )
-};
-PGPENUM_TYPEDEF( PGPCipherAlgorithm_, PGPCipherAlgorithm );
-
-/*____________________________________________________________________________
- Hash algorithms
-____________________________________________________________________________*/
-
-enum PGPHashAlgorithm_
-{
- /* do NOT change these values */
- kPGPHashAlgorithm_Invalid = 0,
- kPGPHashAlgorithm_MD5 = 1,
- kPGPHashAlgorithm_SHA = 2,
- kPGPHashAlgorithm_RIPEMD160 = 3,
-
- kPGPHashAlgorithm_First = kPGPHashAlgorithm_MD5,
- kPGPHashAlgorithm_Last = kPGPHashAlgorithm_RIPEMD160,
-
- PGP_ENUM_FORCE( PGPHashAlgorithm_ )
-};
-PGPENUM_TYPEDEF( PGPHashAlgorithm_, PGPHashAlgorithm );
-
-/*____________________________________________________________________________
- Public/Private key algorithms
-____________________________________________________________________________*/
-enum PGPPublicKeyAlgorithm_
-{
- /* note: do NOT change these values */
- kPGPPublicKeyAlgorithm_Invalid = 0xFFFFFFFF,
- kPGPPublicKeyAlgorithm_RSA = 1,
- kPGPPublicKeyAlgorithm_RSAEncryptOnly = 2,
- kPGPPublicKeyAlgorithm_RSASignOnly = 3,
- kPGPPublicKeyAlgorithm_ElGamal = 0x10, /* A.K.A.Diffie-Hellman */
- kPGPPublicKeyAlgorithm_DSA = 0x11,
-
- kPGPPublicKeyAlgorithm_First = kPGPPublicKeyAlgorithm_RSA,
- kPGPPublicKeyAlgorithm_Last = kPGPPublicKeyAlgorithm_DSA,
-
- PGP_ENUM_FORCE( PGPPublicKeyAlgorithm_ )
-};
-PGPENUM_TYPEDEF( PGPPublicKeyAlgorithm_, PGPPublicKeyAlgorithm );
-
-/*____________________________________________________________________________
- Trust values, used to set validity values
-____________________________________________________________________________*/
-
-#define kPGPKeyTrust_Mask 0x7u
-#define kPGPKeyTrust_Undefined 0x0u
-#define kPGPKeyTrust_Unknown 0x1u
-#define kPGPKeyTrust_Never 0x2u
-#define kPGPKeyTrust_Marginal 0x5u
-#define kPGPKeyTrust_Complete 0x6u
-#define kPGPKeyTrust_Ultimate 0x7u
-
-#define kPGPNameTrust_Mask 0x3u
-#define kPGPNameTrust_Unknown 0x0u
-#define kPGPNameTrust_Untrusted 0x1u
-#define kPGPNameTrust_Marginal 0x2u
-#define kPGPNameTrust_Complete 0x3u
-
-/*____________________________________________________________________________
- Validity levels, used for thresholds in options
-____________________________________________________________________________*/
-
-enum PGPValidity_
-{
- kPGPValidity_Unknown = kPGPNameTrust_Unknown,
- kPGPValidity_Invalid = kPGPNameTrust_Untrusted,
- kPGPValidity_Marginal = kPGPNameTrust_Marginal,
- kPGPValidity_Complete = kPGPNameTrust_Complete,
-
- PGP_ENUM_FORCE( PGPValidity_ )
-} ;
-PGPENUM_TYPEDEF( PGPValidity_, PGPValidity );
-
-/*____________________________________________________________________________
- Line endings types
-____________________________________________________________________________*/
-
-enum PGPLineEndType_
-{
- kPGPLineEnd_Default = 0,
- kPGPLineEnd_LF = 1,
- kPGPLineEnd_CR = 2,
- kPGPLineEnd_CRLF = (kPGPLineEnd_LF | kPGPLineEnd_CR),
- PGP_ENUM_FORCE( PGPLineEndType_ )
-};
-PGPENUM_TYPEDEF( PGPLineEndType_, PGPLineEndType );
-
-/*____________________________________________________________________________
- Local encoding types
-
- Only one of Force or Auto should be used. The other values are modifiers
-____________________________________________________________________________*/
-
-#define kPGPLocalEncoding_None 0x0 /* nothing on */
-#define kPGPLocalEncoding_Force 0x01
-#define kPGPLocalEncoding_Auto 0x02
-#define kPGPLocalEncoding_NoMacBinCRCOkay 0x04
-
-typedef PGPFlags PGPLocalEncodingFlags;
-
-
-/* max length is 255; the +1 is for the trailing \0 */
-#define kPGPMaxUserIDSize ( (PGPSize)255 + 1 )
-
-/* Size of buffer for PGP-MIME separator (null terminated) */
-#define kPGPMimeSeparatorSize 81
-
-#endif /* ] Included_pgpPubTypes_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpPublicKey.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpPublicKey.h
deleted file mode 100644
index d780876a75..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpPublicKey.h
+++ /dev/null
@@ -1,213 +0,0 @@
-/*____________________________________________________________________________
- pgpPublicKey.h
-
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- $Id: pgpPublicKey.h,v 1.10 1999/03/10 02:54:43 heller Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpPublicKey_h /* [ */
-#define Included_pgpPublicKey_h
-
-#include "pgpPubTypes.h"
-#include "pgpOptionList.h"
-
-
-
-/*____________________________________________________________________________
- Encryption/Signature Message Formats
-____________________________________________________________________________*/
-
-enum PGPPublicKeyMessageFormat_
-{
- kPGPPublicKeyMessageFormat_PGP = 1,
- kPGPPublicKeyMessageFormat_PKCS1 = 2,
- kPGPPublicKeyMessageFormat_X509 = 3,
- kPGPPublicKeyMessageFormat_IKE = 4,
-
- PGP_ENUM_FORCE( PGPPublicKeyMessageFormat_ )
-};
-PGPENUM_TYPEDEF( PGPPublicKeyMessageFormat_, PGPPublicKeyMessageFormat );
-
-
-
-PGP_BEGIN_C_DECLARATIONS
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-
-
-/*____________________________________________________________________________
- Public-key operations
-____________________________________________________________________________*/
-
-
-
-/*____________________________________________________________________________
- Return a context for public-key operations based on the specified key.
- The specified message format is used for all operations with this
- context.
-____________________________________________________________________________*/
-PGPError PGPNewPublicKeyContext( PGPKeyRef publicKeyRef,
- PGPPublicKeyMessageFormat messageFormat,
- PGPPublicKeyContextRef *outRef );
-
-
-/*____________________________________________________________________________
- Dispose of a public-key context.
-____________________________________________________________________________*/
-PGPError PGPFreePublicKeyContext( PGPPublicKeyContextRef ref );
-
-
-/*____________________________________________________________________________
- Determine maximum sizes for inputs and outputs.
-____________________________________________________________________________*/
-PGPError PGPGetPublicKeyOperationSizes( PGPPublicKeyContextRef ref,
- PGPSize *maxDecryptedBufferSize,
- PGPSize *maxEncryptedBufferSize,
- PGPSize *maxSignatureSize );
-
-
-/*____________________________________________________________________________
- Encrypt one block of data, using PKCS-1 padding. Output buffer must
- be of size maxEncryptedBufferSize from PGPGetPublicKeyEncryptionSize.
- outSize is a return parameter. For some formatting modes the actual
- output size may be less than the maximum possible.
-____________________________________________________________________________*/
-PGPError PGPPublicKeyEncrypt( PGPPublicKeyContextRef ref,
- void const *in, PGPSize inSize, void *out,
- PGPSize *outSize );
-
-
-/*____________________________________________________________________________
- Verify a signature on a message hash. Returns kPGPError_NoErr on
- correct verification, else an error code. The message hash is
- finalized and freed by this call (and should not have been finalized
- prior to the call).
-____________________________________________________________________________*/
-
-PGPError PGPPublicKeyVerifySignature( PGPPublicKeyContextRef ref,
- PGPHashContextRef hashContext,
- void const *signature, PGPSize signatureSize );
-
-
-/*____________________________________________________________________________
- Verify a signature on a low-level buffer. Returns kPGPError_NOErr
- correct verification, else an error code. Not valid with
- kPGPPublicKeyMessageFormat_PGP contexts.
-____________________________________________________________________________*/
-
-PGPError PGPPublicKeyVerifyRaw( PGPPublicKeyContextRef ref,
- void const *signedData, PGPSize signedDataSize,
- void const *signature, PGPSize signatureSize );
-
-
-/*____________________________________________________________________________
- Private-key operations
-____________________________________________________________________________*/
-
-
-
-/*____________________________________________________________________________
- Return a context for private-key operations based on the specified
- key (which must have a private part). The specified message
- format is used for all operations with this context. Unlocks key
- data using passphrase.
-____________________________________________________________________________*/
-
-
-PGPError PGPNewPrivateKeyContext( PGPKeyRef privateKeyRef,
- PGPPublicKeyMessageFormat messageFormat,
- PGPPrivateKeyContextRef *outRef,
- PGPOptionListRef firstOption, ...);
-
-/*____________________________________________________________________________
- Dispose of a private-key context. All sensitive data is wiped before
- being deleted.
-____________________________________________________________________________*/
-PGPError PGPFreePrivateKeyContext( PGPPrivateKeyContextRef ref );
-
-
-/*____________________________________________________________________________
- Determine maximum sizes for inputs and outputs.
-____________________________________________________________________________*/
-PGPError PGPGetPrivateKeyOperationSizes( PGPPrivateKeyContextRef ref,
- PGPSize *maxDecryptedBufferSize,
- PGPSize *maxEncryptedBufferSize,
- PGPSize *maxSignatureSize);
-
-
-/*____________________________________________________________________________
- Decrypt one block of data. Output buffer must be of size at least
- maxDecryptedBufferSize from PGPGetPrivateKeyDecryptionSize.
- outSize is a return parameter. For some formatting modes the actual
- output size may be less than the maximum possible.
-____________________________________________________________________________*/
-PGPError PGPPrivateKeyDecrypt( PGPPrivateKeyContextRef ref,
- void const *in, PGPSize inSize, void *out,
- PGPSize *outSize );
-
-
-/*____________________________________________________________________________
- Sign a message hash. Output signature buffer must be of size at
- least maxSignatureSize from PGPGetPrivateKeyDecryptionSize.
- signatureSize is a return parameter. For some formatting modes
- the actual signature size may be less than the maximum possible.
- The message hash is finalized and freed by this call (and should
- not have been finalized prior to the call).
-____________________________________________________________________________*/
-
-
-PGPError PGPPrivateKeySign( PGPPrivateKeyContextRef ref,
- PGPHashContextRef hashContext,
- void *signature, PGPSize *signatureSize );
-
-/*____________________________________________________________________________
- Sign a low level signedData buffer. Output signature buffer must be
- of size at least maxSignatureSize from PGPGetPrivateKeyDecryptionSize.
- signatureSize is a return parameter. Not valid with
- kPGPPublicKeyMessageFormat_PGP contexts.
-____________________________________________________________________________*/
-
-PGPError PGPPrivateKeySignRaw( PGPPrivateKeyContextRef ref,
- void const *signedData, PGPSize signedDataSize,
- void const *signature, PGPSize *signatureSize );
-
-
-/*____________________________________________________________________________
- Miscellaneous operations
-____________________________________________________________________________*/
-
-
-
-/*____________________________________________________________________________
-Given the size of a prime modulus in bits, this returns an appropriate
-size for an exponent in bits, such that the work factor to find a
-discrete log modulo the modulus is approximately equal to half the
-length of the exponent. This makes the exponent an appropriate size
-for a subgroup in a discrete log signature scheme. For encryption
-schemes, where decryption attacks can be stealthy and undetected, we
-use 3/2 times the returned exponent size.
-____________________________________________________________________________*/
-
-PGPError PGPDiscreteLogExponentBits( PGPUInt32 modulusBits,
- PGPUInt32 *exponentBits );
-
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpPublicKey_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpRandomPool.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpRandomPool.h
deleted file mode 100644
index 5a7fabeb7e..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpRandomPool.h
+++ /dev/null
@@ -1,49 +0,0 @@
-/*____________________________________________________________________________
- pgpRandomPool.h
-
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- $Id: pgpRandomPool.h,v 1.13 1999/04/13 17:43:18 cpeterson Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpRandomPool_h /* [ */
-#define Included_pgpRandomPool_h
-
-#include "pgpBase.h"
-
-PGP_BEGIN_C_DECLARATIONS
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-PGPUInt32 PGPGlobalRandomPoolAddKeystroke( PGPInt32 event);
-PGPUInt32 PGPGlobalRandomPoolMouseMoved(void);
-PGPError PGPGlobalRandomPoolAddSystemState(void);
-
-/* Extra functions for entropy estimation */
-PGPUInt32 PGPGlobalRandomPoolGetEntropy( void );
-PGPUInt32 PGPGlobalRandomPoolGetSize( void );
-PGPUInt32 PGPGlobalRandomPoolGetMinimumEntropy( void );
-PGPBoolean PGPGlobalRandomPoolHasMinimumEntropy( void );
-
-
-#if PGP_DEPRECATED
-PGPUInt32 PGPGlobalRandomPoolAddMouse( PGPUInt32 x, PGPUInt32 y);
-#endif
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpRandomPool_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpSDKPrefs.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpSDKPrefs.h
deleted file mode 100644
index 2662786474..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpSDKPrefs.h
+++ /dev/null
@@ -1,74 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- $Id: pgpSDKPrefs.h,v 1.7 1999/05/17 07:53:20 heller Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpCDKPrefs_h /* [ */
-#define Included_pgpCDKPrefs_h
-
-#include "pgpConfig.h"
-#include "pgpPubTypes.h"
-
-
-enum PGPsdkPrefSelector_
-{
- kPGPsdkPref_DefaultKeyID = 3,
- kPGPsdkPref_PublicKeyring = 5,
- kPGPsdkPref_PrivateKeyring = 6,
- kPGPsdkPref_RandomSeedFile = 7,
- kPGPsdkPref_GroupsFile = 8,
-
- PGP_ENUM_FORCE( PGPsdkPrefSelector_ )
-};
-PGPENUM_TYPEDEF( PGPsdkPrefSelector_, PGPsdkPrefSelector );
-
-
-
-PGP_BEGIN_C_DECLARATIONS
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-/* call this if you want the CDK to use prefs stored in the prefs file */
-PGPError PGPsdkLoadPrefs( PGPContextRef context,
- PGPFileSpecRef prefSpec );
-PGPError PGPsdkLoadDefaultPrefs( PGPContextRef context );
-
-/* save any changed preferences to disk */
-PGPError PGPsdkSavePrefs( PGPContextRef context );
-
-
-PGPError PGPsdkPrefSetFileSpec( PGPContextRef context,
- PGPsdkPrefSelector selector, PGPFileSpecRef ref );
-
-/* caller must deallocate *outRef with PGPFreeFileSpec */
-PGPError PGPsdkPrefGetFileSpec( PGPContextRef context,
- PGPsdkPrefSelector selector, PGPFileSpecRef * outRef );
-
-
-PGPError PGPsdkPrefSetData( PGPContextRef context,
- PGPsdkPrefSelector selector,
- void const *data, PGPSize size );
-
-/* caller must deallocate *dataOut with PGPFreeData */
-PGPError PGPsdkPrefGetData( PGPContextRef context,
- PGPsdkPrefSelector selector,
- void **dataOut, PGPSize *sizeOut );
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpCDKPrefs_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpSockets.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpSockets.h
deleted file mode 100644
index c884cc5523..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpSockets.h
+++ /dev/null
@@ -1,476 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
-
-
- $Id: pgpSockets.h,v 1.27.6.1.6.1 1999/08/04 18:36:04 sluu Exp $
-____________________________________________________________________________*/
-
-
-#ifndef Included_pgpSockets_h /* [ */
-#define Included_pgpSockets_h
-
-#include <stdio.h>
-
-#include "pgpOptionList.h"
-#include "pgpTLS.h"
-#include "pgpErrors.h"
-
-#if PGP_UNIX
-# include <sys/types.h>
-# include <sys/socket.h>
-#if PGP_UNIX_LINUX
-# include <sys/time.h> /* Needed for unknown reason */
-# include <sys/ioctl.h> /* Need FIONREAD */
-#elif PGP_UNIX_SOLARIS
-# include <sys/filio.h>
-#elif PGP_UNIX_AIX
-# include <sys/time.h>
-# include <sys/ioctl.h>
-#endif /* ! PGP_UNIX_LINUX */
-# include <netinet/in.h>
-# include <netdb.h>
-#endif
-
-#if PGP_WIN32
-# include <winsock.h>
-#endif
-
-PGP_BEGIN_C_DECLARATIONS
-
-#if PRAGMA_IMPORT_SUPPORTED
-# pragma import on
-#endif
-
-typedef struct PGPSocket * PGPSocketRef;
-
-/*
- * Unix and Windows share the same Berkley socket interface. This isn't
- * the most efficient Windows implmentation of TCP/IP, but it is
- * compatable with UNIX berkley sockets, making cross-platform possible.
- *
- * Trying to write cross-platform win32 TCP/IP code using all the fancy
- * dancy Win32 network functions would be nearly impossible IMHO
- *
- * The Mac doesn't have the berkley stuff, so we roll our own for all
- * of the structures.
- *
- * Start with Unix and Win32
- */
-#if PGP_UNIX || PGP_WIN32
-
-# define kInvalidPGPSocketRef ((PGPSocketRef) (~0))
-
- typedef struct hostent PGPHostEntry;
- typedef struct protoent PGPProtocolEntry;
- typedef struct servent PGPServiceEntry;
- typedef struct sockaddr_in PGPSocketAddressInternet;
- typedef struct sockaddr PGPSocketAddress;
- typedef struct in_addr PGPInternetAddress;
- typedef fd_set PGPSocketSet;
- typedef struct timeval PGPSocketsTimeValue;
-
-# define PGPSOCKETSET_CLEAR(socketRef, set) FD_CLR((int) (socketRef), (set))
-# define PGPSOCKETSET_SET(socketRef, set) FD_SET((int) (socketRef), (set))
-# define PGPSOCKETSET_ZERO(set) FD_ZERO((set))
-# define PGPSOCKETSET_ISSET(socketRef, set) FD_ISSET((int) (socketRef), (set))
-
- /* Address families */
- enum {
- kPGPAddressFamilyUnspecified = AF_UNSPEC,
- kPGPAddressFamilyInternet = AF_INET
- };
-
- /* Protocol families */
- enum {
- kPGPProtocolFamilyInternet = PF_INET
- };
-
- /* Types */
- enum {
- kPGPSocketTypeStream = SOCK_STREAM,
- kPGPSocketTypeDatagram = SOCK_DGRAM
- };
-
- /* Commands for PGPIOControlSocket */
- enum {
- kPGPSocketCommandGetUnreadData = FIONREAD
- };
-
- /* Levels for PGPGetSocketOptions and PGPSetSocketOptions */
- enum {
- kPGPSocketOptionLevelSocket = SOL_SOCKET
- };
-
- /* Options for PGPGetSocketOptions and PGPSetSocketOptions */
-/* On Linux (2.0.24), include <asm/socket.h> has SOL_SOCKET and SO_TYPE, */
-/* but unclear as to what would correspond to SO_ACCEPTCONN, if any. */
-#if PGP_UNIX_LINUX
-/* #ifndef SO_ACCEPTCONN */
-#define SO_ACCEPTCONN 0
-/* #endif */ /* SO_ACCEPTCONN */
-#endif /* PGP_UNIX_LINUX */
- enum {
- kPGPSocketOptionAcceptingConnections = SO_ACCEPTCONN,
- kPGPSocketOptionType = SO_TYPE
- };
-
- /* Protocols */
- enum {
- kPGPTCPProtocol = IPPROTO_TCP,
- kPGPUDPProtocol = IPPROTO_UDP
- };
-
- /* Send flags */
- enum {
- kPGPSendFlagNone = 0
- };
-
- /* Receive flags */
- enum {
- kPGPReceiveFlagNone = 0
- };
-
- /* Internet Addresses */
- enum {
- kPGPInternetAddressAny = INADDR_ANY
- };
-
-#endif /* PGP_UNIX || PGP_WIN32 */
-
-/*
- * Onto the Mac, where we need to create our own versions of the various
- * structures.
- */
-#if PGP_MACINTOSH
-
-# define kInvalidPGPSocketRef ((PGPSocketRef) NULL)
-
- typedef struct PGPInternetAddress {
- union {
- struct {
- PGPByte s_b1;
- PGPByte s_b2;
- PGPByte s_b3;
- PGPByte s_b4;
- } S_un_b;
- struct {
- PGPUInt16 s_w1;
- PGPUInt16 s_w2;
- } S_un_w;
- PGPUInt32 S_addr;
- } S_un;
-# define s_addr S_un.S_addr
- } PGPInternetAddress;
-
- typedef struct PGPSocketAddressInternet {
- PGPInt16 sin_family;
- PGPUInt16 sin_port;
- PGPInternetAddress sin_addr;
- PGPByte sin_zero[8];
- } PGPSocketAddressInternet;
-
- typedef struct PGPSocketAddress {
- PGPUInt16 sa_family;
- PGPByte sa_data[14];
- } PGPSocketAddress;
-
- typedef struct PGPHostEntry {
- char * h_name;
- char ** unused;
- PGPInt16 h_addrtype;
- PGPInt16 h_length;
- char ** h_addr_list;
-# define h_addr h_addr_list[0]
- } PGPHostEntry;
-
- typedef struct PGPProtocolEntry {
- char * p_name;
- char ** p_aliases;
- PGPInt16 p_proto;
- } PGPProtocolEntry;
-
- typedef struct PGPServiceEntry {
- char * s_name;
- char ** s_aliases;
- PGPUInt16 s_port;
- char * s_proto;
- } PGPServiceEntry;
-
- /* Select types and defines */
-# ifndef PGPSOCKETSET_SETSIZE
-# define PGPSOCKETSET_SETSIZE 64
-# endif
-
- typedef struct PGPSocketSet {
- PGPUInt16 fd_count;
- PGPSocketRef fd_array[PGPSOCKETSET_SETSIZE];
- } PGPSocketSet;
-
-# define PGPSOCKETSET_CLEAR(socketRef, set) do { \
- PGPUInt16 __i; \
- for (__i = 0; __i < ((PGPSocketSet * (set))->fd_count; __i++) { \
- if (((PGPSocketSet *) (set))->fd_array[__i] == socketRef) { \
- while (__i < (((PGPSocketSet *) (set))->fd_count - 1)) { \
- ((PGPSocketSet *) (set))->fd_array[__i] = \
- ((PGPSocketSet *) (set))->fd_array[__i + 1]; \
- __i++; \
- } \
- ((PGPSocketSet *) (set))->fd_count--; \
- break; \
- } \
- } \
- } while (0)
-
-# define PGPSOCKETSET_SET(socketRef, set) do { \
- if (((PGPSocketSet *) (set))->fd_count < PGPSOCKETSET_SETSIZE) { \
- ((PGPSocketSet *) (set))->fd_array[((PGPSocketSet *) \
- (set))->fd_count++] = (socketRef); \
- } \
- } while (0)
-
-# define PGPSOCKETSET_ZERO(set) (((PGPSocketSet *) (set))->fd_count = 0)
-
- PGPInt32 __PGPSocketsIsSet(PGPSocketRef, PGPSocketSet *);
-
-# define PGPSOCKETSET_ISSET(socketRef, set) __PGPSocketsIsSet( \
- (socketRef),(set))
-
- typedef struct PGPSocketsTimeValue {
- PGPInt32 tv_sec; /* seconds */
- PGPInt32 tv_usec; /* and microseconds */
- } PGPSocketsTimeValue;
-
- /* Address families */
- enum {
- kPGPAddressFamilyUnspecified = 0,
- kPGPAddressFamilyInternet = 2
- };
-
- /* Protocol families */
- enum {
- kPGPProtocolFamilyInternet = kPGPAddressFamilyInternet
- };
-
- /* Types */
- enum {
- kPGPSocketTypeStream = 1,
- kPGPSocketTypeDatagram = 2
- };
-
- /* Commands for PGPIOControlSocket */
- enum {
- kPGPSocketCommandGetUnreadData = (0x40000000
- | (((long) sizeof(PGPUInt32) & 0x7F) << 16) | ('f' << 8) | 127)
- };
-
- /* Levels for PGPGetSocketOptions and PGPSetSocketOptions */
- enum {
- kPGPSocketOptionLevelSocket = 0xFFFFFFFF
- };
-
- /* Options for PGPGetSocketOptions and PGPSetSocketOptions */
- enum {
- kPGPSocketOptionAcceptingConnections = 0x00000002,
- kPGPSocketOptionType = 0x00001008
- };
-
- /* Protocols */
- enum {
- kPGPTCPProtocol = 6,
- kPGPUDPProtocol = 17
- };
-
- /* Send flags */
- enum {
- kPGPSendFlagNone = 0
- };
-
- /* Receive flags */
- enum {
- kPGPReceiveFlagNone = 0
- };
-
- /* Internet Addresses */
- enum {
- kPGPInternetAddressAny = 0x00000000
- };
-
-#endif /* PGP_MACINTOSH */
-
-/*
- * Some global things for all platforms
- */
-
-#define PGPSocketRefIsValid(ref) ((ref) != kInvalidPGPSocketRef)
-
-typedef struct PGPSocketsThreadStorage * PGPSocketsThreadStorageRef;
-# define kInvalidPGPSocketsThreadStorageRef \
- ((PGPSocketsThreadStorageRef) NULL)
-#define PGPSocketsThreadStorageRefIsValid(ref) \
- ((ref) != kInvalidPGPSocketsThreadStorageRef)
-
-/* Errors */
-#define kPGPSockets_Error -1
-
-/* Net byte ordering macros (PGP_WORDSBIGENDIAN defined by configure) */
-#if PGP_WORDSBIGENDIAN
-# define PGPHostToNetLong(x) (x)
-# define PGPHostToNetShort(x) (x)
-# define PGPNetToHostLong(x) (x)
-# define PGPNetToHostShort(x) (x)
-#else
- PGPInt32 PGPHostToNetLong(PGPInt32 x);
- PGPInt16 PGPHostToNetShort(PGPInt16 x);
- PGPInt32 PGPNetToHostLong(PGPInt32 x);
- PGPInt16 PGPNetToHostShort(PGPInt16 x);
-#endif /* PGP_WORDSBIGENDIAN */
-
-/*
- * Shared function interface (except for idle handler code)
- */
-
-/*
- * Use the idle event handler to receive periodic idle events during
- * network calls. Usually this is used only in non-preemptive multi-tasking
- * OSes to allow yielding in threads. Pre-emptive multi-tasking systems
- * should probably not use the call as it interrupts the efficient wait state
- * of threads waiting on network calls.
- *
- * Idle event handlers need to be added on a per thread basis.
- *
- * Returning an error from the idle event handler will cause the socket
- * that is blocking to close.
- *
- */
-PGPError PGPSetSocketsIdleEventHandler(
- PGPEventHandlerProcPtr inCallback,
- PGPUserValue inUserData);
-
-PGPError PGPGetSocketsIdleEventHandler(
- PGPEventHandlerProcPtr * outCallback,
- PGPUserValue * outUserData);
-
-/* Static storage creation */
-PGPError PGPSocketsCreateThreadStorage(
- PGPSocketsThreadStorageRef * outPreviousStorage);
-PGPError PGPSocketsDisposeThreadStorage(
- PGPSocketsThreadStorageRef inPreviousStorage);
-
-/* Stack based class for saving and restoring thread storage */
-#ifdef __cplusplus /* [ */
-class StPGPPreserveSocketsStorage {
-public:
- StPGPPreserveSocketsStorage() : mStorage(NULL)
- { PGPSocketsCreateThreadStorage(&mStorage); }
- ~StPGPPreserveSocketsStorage()
- { PGPSocketsDisposeThreadStorage(mStorage); }
-
-protected:
- PGPSocketsThreadStorageRef mStorage;
-};
-#endif /* ] __cplusplus */
-
-
-/* Initialization and termination */
-PGPError PGPSocketsInit(void);
-void PGPSocketsCleanup(void);
-
-/* Socket creation and destruction */
-PGPSocketRef PGPOpenSocket(PGPInt32 inAddressFamily, PGPInt32 inSocketType,
- PGPInt32 inSocketProtocol);
-PGPInt32 PGPCloseSocket(PGPSocketRef inSocketRef);
-
-/* Endpoint binding */
-PGPInt32 PGPBindSocket(PGPSocketRef inSocketRef,
- const PGPSocketAddress * inAddress,
- PGPInt32 inAddressLength);
-PGPInt32 PGPConnect(PGPSocketRef inSocketRef,
- const PGPSocketAddress * inServerAddress,
- PGPInt32 inAddressLength);
-
-/* Send functions */
-PGPInt32 PGPSend(PGPSocketRef inSocketRef, const void * inBuffer,
- PGPInt32 inBufferLength, PGPInt32 inFlags);
-PGPInt32 PGPWrite(PGPSocketRef inSocketRef, const void * inBuffer,
- PGPInt32 inBufferLength);
-PGPInt32 PGPSendTo(PGPSocketRef inSocketRef, const void * inBuffer,
- PGPInt32 inBufferLength, PGPInt32 inFlags,
- PGPSocketAddress * inAddress,
- PGPInt32 inAddressLength);
-
-/* Receive functions */
-PGPInt32 PGPReceive(PGPSocketRef inSocketRef, void * outBuffer,
- PGPInt32 inBufferSize, PGPInt32 inFlags);
-PGPInt32 PGPRead(PGPSocketRef inSocketRef, void * outBuffer,
- PGPInt32 inBufferSize);
-PGPInt32 PGPReceiveFrom(PGPSocketRef inSocketRef, void * outBuffer,
- PGPInt32 inBufferSize, PGPInt32 inFlags,
- PGPSocketAddress * outAddress,
- PGPInt32 * ioAddressLength);
-
-/* Server functions */
-PGPInt32 PGPListen(PGPSocketRef inSocketRef, PGPInt32 inMaxBacklog);
-PGPSocketRef PGPAccept(PGPSocketRef inSocketRef,
- PGPSocketAddress * outAddress,
- PGPInt32 * ioAddressLength);
-
-/* Select */
-/* Note that inNumSetCount is not used under Mac and Windows */
-PGPInt32 PGPSelect(PGPInt32 inNumSetCount,
- PGPSocketSet * ioReadSet,
- PGPSocketSet * ioWriteSet,
- PGPSocketSet * ioErrorSet,
- const PGPSocketsTimeValue * inTimeout);
-
-/* DNS and protocol services */
-PGPHostEntry * PGPGetHostByName(const char * inName);
-PGPHostEntry * PGPGetHostByAddress(const char* inAddress,
- PGPInt32 inLength,
- PGPInt32 inType);
-PGPInt32 PGPGetHostName(char * outName, PGPInt32 inNameLength);
-PGPProtocolEntry * PGPGetProtocolByName(const char * inName);
-PGPProtocolEntry * PGPGetProtocolByNumber(PGPInt32 inNumber);
-PGPServiceEntry * PGPGetServiceByName(const char * inName,
- const char * inProtocol);
-PGPServiceEntry * PGPGetServiceByPort(PGPInt32 inPort,
- const char * inProtocol);
-
-/* Error reporting */
-PGPError PGPGetLastSocketsError(void);
-
-/* Utilities */
-PGPInt32 PGPGetSocketName(PGPSocketRef inSocketRef,
- PGPSocketAddress * outName,
- PGPInt32 * ioNameLength);
-PGPInt32 PGPGetPeerName(PGPSocketRef inSocketRef,
- PGPSocketAddress * outName,
- PGPInt32 * ioNameLength);
-PGPUInt32 PGPDottedToInternetAddress(const char * inAddress);
-char * PGPInternetAddressToDottedString(PGPInternetAddress inAddress);
-
-/* Control and options */
-PGPInt32 PGPIOControlSocket(PGPSocketRef inSocketRef,
- PGPInt32 inCommand, PGPUInt32 * ioParam);
-PGPInt32 PGPGetSocketOptions(PGPSocketRef inSocketRef, PGPInt32 inLevel,
- PGPInt32 inOptionName,
- char * outOptionValue,
- PGPInt32 * ioOptionLength);
-PGPInt32 PGPSetSocketOptions(PGPSocketRef inSocketRef, PGPInt32 inLevel,
- PGPInt32 inOptionName,
- const char * inOptionValue,
- PGPInt32 inOptionLength);
-
-/* TLS */
-PGPError PGPSocketsEstablishTLSSession(PGPSocketRef inSocketRef,
- PGPtlsSessionRef inTLSSession);
-
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-
-PGP_END_C_DECLARATIONS
-
-#endif /* Included_pgpSockets_h */
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpSymmetricCipher.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpSymmetricCipher.h
deleted file mode 100644
index b1dec160e2..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpSymmetricCipher.h
+++ /dev/null
@@ -1,122 +0,0 @@
-/*____________________________________________________________________________
- pgpSymmetricCipher.h
-
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- public header file for symmetric ciphers
-
- $Id: pgpSymmetricCipher.h,v 1.22 1999/03/10 02:58:47 heller Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpSymmetricCipher_h /* [ */
-#define Included_pgpSymmetricCipher_h
-
-#include "pgpPubTypes.h"
-#include "pgpMemoryMgr.h"
-
-PGP_BEGIN_C_DECLARATIONS
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-
-
-/*____________________________________________________________________________
- Create a new cipher of the specified algorithm. Cannot be used until
- PGPSetSymmetricCipherKey() has been called.
-
- If the algorithm is not available then kPGPError_AlgorithmNotAvailable is
- returned.
-
- Existing algorithms have only one key size. Values:
- kPGPCipherAlgorithm_CAST5 128 / 8 = 16
- kPGPCipherAlgorithm_3DES 192 / 8 = 24
- kPGPCipherAlgorithm_IDEA 128 / 8 = 16
- In the future symmetric ciphers could be added that have different key
- sizes for the same algorithm.
-____________________________________________________________________________*/
-PGPError PGPNewSymmetricCipherContext( PGPMemoryMgrRef memoryMgr,
- PGPCipherAlgorithm algorithm, PGPSize keySizeInBytes,
- PGPSymmetricCipherContextRef *outRef );
-
-
-/*____________________________________________________________________________
- Disposal clears all data in memory before releasing it.
-____________________________________________________________________________*/
-PGPError PGPFreeSymmetricCipherContext( PGPSymmetricCipherContextRef ref );
-
-
-/*____________________________________________________________________________
- Make an exact copy of the cipher, including the key.
-____________________________________________________________________________*/
-PGPError PGPCopySymmetricCipherContext( PGPSymmetricCipherContextRef ref,
- PGPSymmetricCipherContextRef *outRef );
-
-
-/*____________________________________________________________________________
- The key must be set before using; a cipher can be repeatedly reset and
- reused with different keys to avoid having to create and destroy new
- contexts each time (and it's also cryptographically better not to reuse
- a key).
-
- kKey size is implicit based on algorithm. 'key' is *copied*. Caller
- may want to destroy the original after passing it in.
-____________________________________________________________________________*/
-PGPError PGPInitSymmetricCipher( PGPSymmetricCipherContextRef ref,
- const void *key );
-
-/*____________________________________________________________________________
- Wipe any sensitive data in the cipher. Cipher remains alive, but
- key must be set before any data is encrypted.
-____________________________________________________________________________*/
-PGPError PGPWipeSymmetricCipher( PGPSymmetricCipherContextRef ref );
-
-
-/*____________________________________________________________________________
- "Wash" the symmetric cipher
-____________________________________________________________________________*/
-PGPError PGPWashSymmetricCipher( PGPSymmetricCipherContextRef ref,
- void const *buf, PGPSize len);
-
-
-/*____________________________________________________________________________
- Encrypt or decrypt one "block" of data. The block size is determined
- by the cipher (see PGPGetSymmetricCipherBlockSize()).
-____________________________________________________________________________*/
-PGPError PGPSymmetricCipherEncrypt( PGPSymmetricCipherContextRef ref,
- const void *in, void *out );
-
-PGPError PGPSymmetricCipherDecrypt( PGPSymmetricCipherContextRef ref,
- const void *in, void *out );
-
-
-
-
-/*____________________________________________________________________________
- Determine key and block size for specified algorithm. Stateless routine
- does not need a context.
-____________________________________________________________________________*/
-PGPError PGPGetSymmetricCipherSizes(
- PGPSymmetricCipherContextRef ref,
- PGPSize *keySize , PGPSize *blockSize );
-
-
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-
-
-#endif /* ] Included_pgpSymmetricCipher_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpTLS.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpTLS.h
deleted file mode 100644
index ec2903aa74..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpTLS.h
+++ /dev/null
@@ -1,316 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 1997-1999 Network Associates, Inc.
- All rights reserved.
-
- $Id: pgpTLS.h,v 1.32 1999/01/25 11:31:49 wprice Exp $
-____________________________________________________________________________*/
-#ifndef Included_PGPtls_h /* [ */
-#define Included_PGPtls_h
-
-#include "pgpPubTypes.h"
-
-PGP_BEGIN_C_DECLARATIONS
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-
-typedef struct PGPtlsContext * PGPtlsContextRef;
-typedef const struct PGPtlsContext * PGPtlsConstContextRef;
-
-#define kInvalidPGPtlsContextRef ((PGPtlsContextRef) NULL)
-#define PGPtlsContextRefIsValid( ref ) ( (ref) != kInvalidPGPtlsContextRef )
-
-typedef struct PGPtlsSession * PGPtlsSessionRef;
-typedef const struct PGPtlsSession * PGPtlsConstSessionRef;
-
-#define kInvalidPGPtlsSessionRef ((PGPtlsSessionRef) NULL)
-#define PGPtlsSessionRefIsValid( ref ) ( (ref) != kInvalidPGPtlsSessionRef )
-
-
-typedef PGPFlags PGPtlsFlags;
-#define kPGPtlsFlags_ServerSide 0x01
-#define kPGPtlsFlags_ClientSide 0x02
-#define kPGPtlsFlags_RequestClientCert 0x04
-#define kPGPtlsFlags_NonBlockingIO 0x08
-
-enum PGPtlsCipherSuiteNum_
-{
- kPGPtls_TLS_NULL_WITH_NULL_NULL = 0,
- kPGPtls_TLS_PGP_DHE_DSS_WITH_CAST_CBC_SHA = 1,
- kPGPtls_TLS_PGP_DHE_RSA_WITH_CAST_CBC_SHA = 2,
- kPGPtls_TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA = 3,
- kPGPtls_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA = 4,
- kPGPtls_TLS_RSA_WITH_3DES_EDE_CBC_SHA = 5,
- kPGPtls_TLS_RSA_WITH_IDEA_CBC_SHA = 6,
- kPGPtls_TLS_PGP_RSA_WITH_CAST_CBC_SHA = 7,
- kPGPtls_TLS_PGP_DHE_DSS_WITH_NULL_SHA = 8,
- kPGPtls_TLS_DHE_DSS_WITH_NULL_SHA = 9,
-
- PGP_ENUM_FORCE( PGPtlsCipherSuiteNum_ )
-};
-PGPENUM_TYPEDEF( PGPtlsCipherSuiteNum_, PGPtlsCipherSuiteNum );
-
-enum PGPtlsProtocolState_
-{
- kPGPtls_IdleState = 0,
- kPGPtls_FatalErrorState = 1,
- kPGPtls_ClosedState = 2,
- kPGPtls_HandshakeState = 3,
- kPGPtls_ReadyState = 4,
-
- PGP_ENUM_FORCE( PGPtlsProtocolState_ )
-};
-PGPENUM_TYPEDEF( PGPtlsProtocolState_, PGPtlsProtocolState );
-
-enum PGPtlsPrime_
-{
- kPGPtls_DHPrime1024 = 0,
- kPGPtls_DHPrime1536 = 1,
- kPGPtls_DHPrime2048 = 2,
- kPGPtls_DHPrime3072 = 3,
- kPGPtls_DHPrime4096 = 4,
-
- PGP_ENUM_FORCE( PGPtlsPrime_ )
-};
-PGPENUM_TYPEDEF( PGPtlsPrime_, PGPtlsPrime );
-
-enum PGPtlsAlert_
-{
- kPGPtls_AT_CloseNotify = 0,
- kPGPtls_AT_UnexpectedMessage = 10, /* FATAL */
- kPGPtls_AT_BadRecordMAC = 20, /* FATAL */
- kPGPtls_AT_DecryptionFailed = 21, /* FATAL */
- kPGPtls_AT_RecordOverflow = 22, /* FATAL */
- kPGPtls_AT_DecompressionFailure = 30, /* FATAL */
- kPGPtls_AT_HandshakeFailure = 40, /* FATAL */
- kPGPtls_AT_NoCertificate = 41, /* SSL3 */
- kPGPtls_AT_BadCertificate = 42,
- kPGPtls_AT_UnsupportedCert = 43,
- kPGPtls_AT_CertRevoked = 44,
- kPGPtls_AT_CertExpired = 45,
- kPGPtls_AT_CertUnknown = 46,
- kPGPtls_AT_IllegalParameter = 47, /* FATAL */
- kPGPtls_AT_UnknownCA = 48, /* FATAL */
- kPGPtls_AT_AccessDenied = 49, /* FATAL */
- kPGPtls_AT_DecodeError = 50, /* FATAL */
- kPGPtls_AT_DecryptError = 51,
- kPGPtls_AT_ExportRestriction = 60, /* FATAL */
- kPGPtls_AT_ProtocolVersion = 70, /* FATAL */
- kPGPtls_AT_InsufficientSecurity = 71, /* FATAL */
- kPGPtls_AT_InternalError = 80, /* FATAL */
- kPGPtls_AT_UserCancelled = 90,
- kPGPtls_AT_NoRenegotiation = 100,
-
- kPGPtls_AT_None = 255,
-
- PGP_ENUM_FORCE( PGPtlsAlert_ )
-};
-PGPENUM_TYPEDEF( PGPtlsAlert_, PGPtlsAlert );
-
-/* The Send and Receive function pointers should return
- kPGPError_TLSWouldBlock when the socket is non-blocking and the
- call would block. The Send and Receive functions passed in will
- need to translate the platform-specific socket error in appropriate
- cases by using calls such as WSAGetLastError() on Win32. Remember
- to call PGPtlsSendQueueIdle for non-blocking sockets also if
- kPGPError_TLSWouldBlock is returned from a send on a non-blocking
- socket. */
-
-typedef PGPInt32 (* PGPtlsReceiveProcPtr)(void *inData, void *outBuffer,
- PGPInt32 inBufferSize);
-typedef PGPInt32 (* PGPtlsSendProcPtr)(void *inData, const void *inBuffer,
- PGPInt32 inBufferLength);
-
-
-PGPError PGPNewTLSContext( PGPContextRef context,
- PGPtlsContextRef *outRef );
-
-PGPError PGPFreeTLSContext( PGPtlsContextRef ref );
-
-/*____________________________________________________________________________
- The following function activates or deactivates the session key cache
- for TLS sessions. This defaults to on but can be deactivated with this
- function to force all connections to proceed through the entire
- handshake.
-____________________________________________________________________________*/
-PGPError PGPtlsSetCache( PGPtlsContextRef ref, PGPBoolean useCache );
-
-PGPError PGPtlsClearCache( PGPtlsContextRef ref );
-
-PGPError PGPNewTLSSession( PGPtlsContextRef ref,
- PGPtlsSessionRef *outRef );
-
-PGPError PGPFreeTLSSession( PGPtlsSessionRef ref );
-
-PGPError PGPCopyTLSSession( PGPtlsSessionRef ref, PGPtlsSessionRef *outRef );
-
-/* Default options are client side and no client cert request */
-PGPError PGPtlsSetProtocolOptions( PGPtlsSessionRef ref,
- PGPtlsFlags options );
-
-
-/*____________________________________________________________________________
- The following function must be called to cleanly close a TLS
- connection. If it is not called, the session will not be able
- to be resumed from the session cache.
-
- In the event the application determines any problem with the
- connection such as the remote key not being valid, call this
- function with dontCache set to true in order to not cache the
- session keys.
-____________________________________________________________________________*/
-PGPError PGPtlsClose( PGPtlsSessionRef ref,
- PGPBoolean dontCache );
-
-/*____________________________________________________________________________
- The following function must be called to initiate the PGPtls session.
- Once a TLS session has been assigned to a socket, no data can be sent
- over that socket by the application until the handshake is completed.
- Handshake completion is indicated by completion of this call without
- error or by checking the state of the PGPtlsSession. It will be
- kPGPtls_ReadyState when the application layer may send and receive
- data securely.
-
- This function performs all negotiation of the TLS connection.
-____________________________________________________________________________*/
-PGPError PGPtlsHandshake( PGPtlsSessionRef ref );
-
-/*____________________________________________________________________________
- The following function should be called before PGPtlsHandshake.
- In the general case, the remoteID will be an IP address. This
- is provided to PGPtls in order to allow it to cache the current
- session and be able to look it up later. If the remoteID passed
- into a future session is the same as a previously cached session,
- PGPtls will attempt to resume the session.
-____________________________________________________________________________*/
-PGPError PGPtlsSetRemoteUniqueID( PGPtlsSessionRef ref,
- PGPUInt32 remoteID );
-
-/*____________________________________________________________________________
- The following function sets the local private authenticating key.
-
- The passphrase and key are retained in memory. By default, no
- key is specified and a client side session will return no key in the
- client key exchange message to the server.
- It is an error not to specify a key on a server side TLS session.
- This function must be passed either PGPOPassphrase or PGPOPasskeyBuffer.
- You may pass in just a PGP key, PGP w/ X.509 cert, or both -- and they
- must be the same -- the cert must be from the key. For an X.509 cert,
- the inCertChain keyset must contain the keys of all keys in the
- certificate chain for that certificate up to the root. To disable X.509
- certs, simply pass nothing (ie. kPGPInvalidSigRef). The inCertChain
- keyset must remain valid for the lifetime of the TLS connection.
-____________________________________________________________________________*/
-PGPError PGPtlsSetLocalPrivateKey( PGPtlsSessionRef ref,
- PGPKeyRef inKey,
- PGPSigRef inX509Cert,
- PGPKeySetRef inCertChain,
- PGPOptionListRef firstOption, ... );
-
-/*____________________________________________________________________________
- The following function sets the preferred cipher suite.
-
- There is no guarantee that cipher will actually be negotiated,
- but it will be attempted in preference to others.
-____________________________________________________________________________*/
-PGPError PGPtlsSetPreferredCipherSuite( PGPtlsSessionRef ref,
- PGPtlsCipherSuiteNum cipher );
-
-/*____________________________________________________________________________
- The following function sets the desired DH prime.
-
- The requested primes are drawn from a set of primes hard-coded
- into PGPtls. New primes can be added in a fully compatible
- fashion since the server sends the prime to the client, but this
- version of the API does not support passing in a desired prime. The
- default prime if this function is not called is kPGPtls_DHPrime2048.
-____________________________________________________________________________*/
-PGPError PGPtlsSetDHPrime( PGPtlsSessionRef ref,
- PGPtlsPrime prime );
-
-/*____________________________________________________________________________
- The following function gets the authenticated remote key after a
- successful handshake. You must call this function after a successful
- handshake to verify that the remote key is authorized to make the
- connection.
-____________________________________________________________________________*/
-PGPError PGPtlsGetRemoteAuthenticatedKey( PGPtlsSessionRef ref,
- PGPKeyRef * outKey,
- PGPKeySetRef * outKeySet );
-
-/*____________________________________________________________________________
- The following function returns the negotiated symmetric cipher.
-
- This function will return an error if called before a successful
- handshake.
-____________________________________________________________________________*/
-PGPError PGPtlsGetNegotiatedCipherSuite( PGPtlsSessionRef ref,
- PGPtlsCipherSuiteNum *outCipher );
-
-PGPError PGPtlsGetState( PGPtlsSessionRef ref,
- PGPtlsProtocolState *outState );
-
-/*____________________________________________________________________________
- The following two functions process data through TLS.
-
- It is an error to call these functions without having set a
- Read function pointer or Write function pointer. Most applications
- will never need to use these functions as the function pointers
- are automatically configured by PGPsockets, and these functions
- are automatically called by the PGPsockets implementations of
- PGPWrite and PGPRead whenever a PGPtlsSessionRef has been set for
- a given socket.
-____________________________________________________________________________*/
-PGPError PGPtlsReceive( PGPtlsSessionRef ref,
- void * outBuffer,
- PGPSize * bufferSize );
-
-PGPError PGPtlsSend( PGPtlsSessionRef ref,
- const void * inBuffer,
- PGPSize inBufferLength );
-
-PGPError PGPtlsSetReceiveCallback( PGPtlsSessionRef ref,
- PGPtlsReceiveProcPtr tlsReceiveProc,
- void * inData );
-
-PGPError PGPtlsSetSendCallback( PGPtlsSessionRef ref,
- PGPtlsSendProcPtr tlsSendProc,
- void * inData );
-
-
-/*____________________________________________________________________________
- The following function is necessary *only* on a non-blocking socket.
- If a call to PGPtlsSend returns kPGPError_TLSWouldBlock, call
- the following function repeatedly until that error is no longer
- returned in order to make sure data is sent. Another call to
- PGPtlsSend will also call this function automatically and queue
- any new data if necessary.
-____________________________________________________________________________*/
-PGPError PGPtlsSendQueueIdle( PGPtlsSessionRef ref );
-
-PGPSize PGPtlsReceiveBufferSize( PGPtlsSessionRef ref );
-
-/*____________________________________________________________________________
- The following function gets the ID of the fatal alert which caused
- the TLS session to abort and go into the kPGPtls_FatalErrorState.
-____________________________________________________________________________*/
-PGPError PGPtlsGetAlert( PGPtlsSessionRef ref, PGPtlsAlert *outAlert );
-
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_PGPtls_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpUserInterface.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpUserInterface.h
deleted file mode 100644
index 8d2e05db40..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpUserInterface.h
+++ /dev/null
@@ -1,290 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- This file contains the prototypes for functions which use UI to interact
- with the user.
-
- $Id: pgpUserInterface.h,v 1.40 1999/03/10 02:59:37 heller Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpUserInterface_h /* [ */
-#define Included_pgpUserInterface_h
-
-#include "pgpPubTypes.h"
-#include "pgpGroups.h"
-
-#if PGP_WIN32
-#include "windows.h"
-#endif
-
-PGP_BEGIN_C_DECLARATIONS
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-#if PRAGMA_ALIGN_SUPPORTED
-#pragma options align=mac68k
-#endif
-
-enum PGPAdditionalRecipientRequestEnforcement_
-{
- kPGPARREnforcement_Invalid = 0,
- kPGPARREnforcement_None = 1,
- kPGPARREnforcement_Warn = 2,
- kPGPARREnforcement_Strict = 3,
-
- PGP_ENUM_FORCE( PGPAdditionalRecipientRequestEnforcement_ )
-};
-PGPENUM_TYPEDEF( PGPAdditionalRecipientRequestEnforcement_,
- PGPAdditionalRecipientRequestEnforcement );
-
-enum PGPRecipientSpecType_
-{
- kPGPRecipientSpecType_Invalid = 0,
- kPGPRecipientSpecType_Key = 1,
- kPGPRecipientSpecType_UserID = 2,
- kPGPRecipientSpecType_KeyID = 3,
-
- PGP_ENUM_FORCE( PGPRecipientSpecType_ )
-};
-PGPENUM_TYPEDEF( PGPRecipientSpecType_, PGPRecipientSpecType );
-
-typedef struct PGPRecipientSpec
-{
- PGPRecipientSpecType type;
- PGPBoolean locked;
- PGPBoolean reserved8[3]; /* Must be zero */
- PGPUInt32 reserved32[3]; /* Must be zero */
-
- union
- {
- PGPKeyRef key;
- char userIDStr[256]; /* Null terminated string */
-
- struct
- {
- PGPKeyID keyID;
- PGPPublicKeyAlgorithm algorithm;
- } id;
-
- } u;
-
-} PGPRecipientSpec;
-
-typedef struct PGPKeyServerSpec
-{
- PGPKeyServerRef server;
- const char *serverName; /* Optional */
- PGPUInt32 reserved[5]; /* Must be zero */
-
-} PGPKeyServerSpec;
-
-#if PRAGMA_ALIGN_SUPPORTED
-#pragma options align=reset
-#endif
-
-PGPError PGPRecipientDialog(
- PGPContextRef context,
- PGPKeySetRef allKeys,
- PGPBoolean alwaysDisplayDialog,
- PGPKeySetRef *recipientKeys,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPPassphraseDialog(
- PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPConfirmationPassphraseDialog(
- PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPKeyPassphraseDialog(
- PGPContextRef context,
- PGPKeyRef theKey,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPSigningPassphraseDialog(
- PGPContextRef context,
- PGPKeySetRef allKeys,
- PGPKeyRef *signingKey,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPDecryptionPassphraseDialog(
- PGPContextRef context,
- PGPKeySetRef recipientKeys,
- PGPUInt32 keyIDCount,
- const PGPKeyID keyIDList[],
- PGPKeyRef *decryptionKey,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPConventionalEncryptionPassphraseDialog(
- PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPConventionalDecryptionPassphraseDialog(
- PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPOptionsDialog(
- PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPCollectRandomDataDialog(
- PGPContextRef context,
- PGPUInt32 neededEntropyBits,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPSearchKeyServerDialog(
- PGPContextRef context,
- PGPUInt32 serverCount,
- const PGPKeyServerSpec serverList[],
- PGPtlsContextRef tlsContext,
- PGPBoolean searchAllServers,
- PGPKeySetRef *foundKeys,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPSendToKeyServerDialog(
- PGPContextRef context,
- const PGPKeyServerSpec *server,
- PGPtlsContextRef tlsContext,
- PGPKeySetRef keysToSend,
- PGPKeySetRef *failedKeys,
- PGPOptionListRef firstOption, ... );
-
-/*
-** Returns a value in the range 0-100 which crudely estimates
-** the "quality" of a passphrase.
-*/
-
-PGPUInt32 PGPEstimatePassphraseQuality(const char *passphrase);
-
-/* General dialog options */
-
-PGPOptionListRef PGPOUIDialogPrompt(PGPContextRef context,
- const char *prompt);
-
-PGPOptionListRef PGPOUIWindowTitle(PGPContextRef context,
- const char *title);
-
-PGPOptionListRef PGPOUIDialogOptions(PGPContextRef context,
- PGPOptionListRef firstOption, ...);
-
-#if PGP_WIN32
-PGPOptionListRef PGPOUIParentWindowHandle(PGPContextRef context,
- HWND hwndParent);
-#endif
-
-/* All passphrase dialogs */
-
-/* Caller should free passphrase with PGPFreeData() */
-PGPOptionListRef PGPOUIOutputPassphrase(PGPContextRef context,
- char **passphrase);
-
-PGPOptionListRef PGPOUIMinimumPassphraseQuality(PGPContextRef context,
- PGPUInt32 minimumPassphraseQuality);
-
-PGPOptionListRef PGPOUIMinimumPassphraseLength(PGPContextRef context,
- PGPUInt32 minimumPassphraseLength);
-
-/* PGPConfirmationPassphraseDialog() options */
-
-PGPOptionListRef PGPOUIShowPassphraseQuality(PGPContextRef context,
- PGPBoolean showPassphraseQuality);
-
-/* PGPSigningPassphraseDialog() and PGPDecryptionPassphraseDialog() options */
-
-PGPOptionListRef PGPOUIDefaultKey(PGPContextRef context,
- PGPKeyRef defaultKey);
-
-PGPOptionListRef PGPOUIVerifyPassphrase(PGPContextRef context,
- PGPBoolean verifyPassphrase);
-
-PGPOptionListRef PGPOUIFindMatchingKey(PGPContextRef context,
- PGPBoolean findMatchingKey);
-
-PGPOptionListRef PGPOUITextUI(PGPContextRef context, PGPBoolean textUI);
-
-/* PGPRecipientDialog() options: */
-
-PGPOptionListRef PGPOUIRecipientList(PGPContextRef context,
- PGPUInt32 *recipientCount,
- PGPRecipientSpec **recipientList);
-
-PGPOptionListRef PGPOUIDefaultRecipients(PGPContextRef context,
- PGPUInt32 recipientCount,
- const PGPRecipientSpec recipientList[]);
-
-PGPOptionListRef PGPOUIDisplayMarginalValidity(PGPContextRef context,
- PGPBoolean displayMarginalValidity);
-
-PGPOptionListRef PGPOUIIgnoreMarginalValidity(PGPContextRef context,
- PGPBoolean ignoreMarginalValidity);
-
-PGPOptionListRef PGPOUIRecipientGroups(PGPContextRef context,
- PGPGroupSetRef groupSet);
-
-PGPOptionListRef PGPOUIEnforceAdditionalRecipientRequests(
- PGPContextRef context,
- PGPAdditionalRecipientRequestEnforcement enforcement,
- PGPBoolean alwaysDisplayDialogWithARRs);
-
-/* PGPDecryptionPassphraseDialog() and PGPRecipientDialog() only: */
-
-PGPOptionListRef PGPOUIKeyServerUpdateParams(PGPContextRef context,
- PGPUInt32 serverCount,
- const PGPKeyServerSpec serverList[],
- PGPtlsContextRef tlsContext,
- PGPBoolean searchBeforeDisplay,
- PGPKeySetRef *foundKeys,
- PGPOptionListRef firstOption, ...);
-
-/* Key server search dialog options */
-
-PGPOptionListRef PGPOUIKeyServerSearchFilter(PGPContextRef context,
- PGPFilterRef filter);
-
-PGPOptionListRef PGPOUIKeyServerSearchKey(PGPContextRef context,
- PGPKeyRef key);
-
-PGPOptionListRef PGPOUIKeyServerSearchKeySet(PGPContextRef context,
- PGPKeySetRef keySet);
-
-PGPOptionListRef PGPOUIKeyServerSearchKeyIDList(PGPContextRef context,
- PGPUInt32 keyIDCount, const PGPKeyID keyIDList[] );
-
-/*
-** These options are used to build the options dialog and are only
-** applicable for the PGPOptionsDialog() and PGPOUIDialogOptions() calls.
-** The "description" parameters are optional.
-*/
-
-PGPOptionListRef PGPOUICheckbox(PGPContextRef context, PGPUInt32 itemID,
- const char *title, const char *description,
- PGPUInt32 initialValue, PGPUInt32 *resultPtr,
- PGPOptionListRef firstOption, ...);
-
-PGPOptionListRef PGPOUIPopupList(PGPContextRef context, PGPUInt32 itemID,
- const char *title, const char *description,
- PGPUInt32 listItemCount, const char *listItems[],
- PGPUInt32 initialValue, PGPUInt32 *resultPtr,
- PGPOptionListRef firstOption, ...);
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpUserInterface_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/include/pgpUtilities.h b/plugins/CryptoPP/PGPw/sdk6/include/pgpUtilities.h
deleted file mode 100644
index d92c999cf9..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/include/pgpUtilities.h
+++ /dev/null
@@ -1,231 +0,0 @@
-/*____________________________________________________________________________
- pgpUtilities.h
-
- Copyright (C) 1997 Network Associates Inc. and affiliated companies.
- All rights reserved.
-
- This file contains miscellaneous utility functions needed for the PGPsdk.
-
- $Id: pgpUtilities.h,v 1.68 1999/03/25 01:46:38 heller Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpUtilities_h /* [ */
-#define Included_pgpUtilities_h
-
-#if PGP_MACINTOSH /* [ */
-#include <Files.h>
-#endif /* ] PGP_MACINTOSH */
-
-#include "pgpPubTypes.h"
-#include "pgpMemoryMgr.h"
-
-#include <time.h>
-
-
-#if PRAGMA_ALIGN_SUPPORTED
-#pragma options align=mac68k /* [ */
-#endif
-
-
-#if PGP_MACINTOSH /* [ */
-
-#define kPGPMacFileCreator_Keys 'pgpK'
-#define kPGPMacFileCreator_DecryptedBinary '????'
-#define kPGPMacFileCreator_DecryptedText 'ttxt'
-#define kPGPMacFileCreator_Tools 'pgpM'
-
-#define kPGPMacFileType_ArmorFile 'TEXT'
-#define kPGPMacFileType_EncryptedData 'pgEF'
-#define kPGPMacFileType_SignedData 'pgSF'
-#define kPGPMacFileType_DetachedSig 'pgDS'
-#define kPGPMacFileType_RandomSeed 'pgRS'
-#define kPGPMacFileType_PrivRing 'pgRR'
-#define kPGPMacFileType_PubRing 'pgPR'
-#define kPGPMacFileType_Groups 'pgGR'
-#define kPGPMacFileType_Preferences 'pref'
-#define kPGPMacFileType_DecryptedText 'TEXT'
-#define kPGPMacFileType_DecryptedBinary 'BINA'
-#define kPGPMacFileType_KeyShares 'pgSK'
-#define kPGPMacFileType_Exported509Keys 'pgX5'
-
-#endif /* ] PGP_MACINTOSH */
-
-PGP_BEGIN_C_DECLARATIONS
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-/*____________________________________________________________________________
- Context routines
-____________________________________________________________________________*/
-
-/*____________________________________________________________________________
- API version:
- Top byte is major, next 3 nibbles minor, next 2 bug fix,
- last nibble reserved: 0xMMmmmrrR
-
- example: 1.0.0 = 0x01000000
-
- 0x01000000 SDK 1.0.0
- 0x02000000 SDK 1.1.0
- 0x02000010 SDK 1.1.1
- 0x03000000 SDK 1.5
- 0x03000010 SDK 1.5.1
- 0x03000020 SDK 1.5.2
- 0x03001000 SDK 1.6
- 0x03002000 SDK 1.7
- 0x03002010 SDK 1.7.1
-_____________________________________________________________________________*/
-#define kPGPsdkAPIVersion ( (PGPUInt32)0x03002010 )
-#define PGPMajorVersion( v ) ( ( ((PGPUInt32)(v)) & 0xFF000000 ) >> 24 )
-#define PGPMinorVersion( v ) ( ( ((PGPUInt32)(v)) & 0x00FFF000 ) >> 16 )
-#define PGPRevVersion( v ) ( ( ((PGPUInt32)(v)) & 0x00000FF0 ) >> 4 )
-
-typedef struct PGPNewContextStruct
-{
- /* sizeofStruct must be inited to sizeof( PGPNewContextStruct ) */
- PGPUInt32 sizeofStruct;
- PGPMemoryMgrRef memoryMgr;
-} PGPNewContextStruct;
-
-
-
-/* always pass kPGPsdkVersion */
-PGPError PGPNewContext( PGPUInt32 clientAPIVersion,
- PGPContextRef *newContext );
-PGPError PGPNewContextCustom( PGPUInt32 clientAPIVersion,
- PGPNewContextStruct const *custom,
- PGPContextRef *newContext );
-
-PGPError PGPFreeContext( PGPContextRef context );
-
-PGPError PGPGetContextUserValue( PGPContextRef context,
- PGPUserValue *userValue );
-PGPError PGPSetContextUserValue( PGPContextRef context,
- PGPUserValue userValue );
-
-PGPError PGPContextGetRandomBytes(PGPContextRef context,
- void *buf, PGPSize len );
-
-
-PGPMemoryMgrRef PGPGetContextMemoryMgr( PGPContextRef context );
-
-
-
-/*____________________________________________________________________________
- FileRefs
-____________________________________________________________________________*/
-
-PGPError PGPCopyFileSpec(PGPFileSpecRef fileRef,
- PGPFileSpecRef *ref);
-PGPError PGPFreeFileSpec(PGPFileSpecRef fileRef);
-
-#if PGP_MACINTOSH /* [ */
-
-PGPError PGPNewFileSpecFromFSSpec(PGPContextRef context,
- const FSSpec *spec, PGPFileSpecRef *ref);
-PGPError PGPGetFSSpecFromFileSpec(PGPFileSpecRef fileRef,
- FSSpec *spec);
-#else
-
-PGPError PGPNewFileSpecFromFullPath( PGPContextRef context,
- char const *path, PGPFileSpecRef *ref);
-
-/* *fullPathPtr ***must*** be freed with PGPFreeData */
-PGPError PGPGetFullPathFromFileSpec( PGPFileSpecRef fileRef,
- char ** fullPathPtr);
-
-#endif /* ] PGP_MACINTOSH */
-
-
-
-/*____________________________________________________________________________
- Time
-____________________________________________________________________________*/
-PGPTime PGPGetTime(void);
-
-/* these use time_t type as returned by time() in Std C libraries */
-time_t PGPGetStdTimeFromPGPTime(PGPTime theTime);
-PGPTime PGPGetPGPTimeFromStdTime(time_t theTime);
-
-
-/* year, month, day may be NULL if desired */
-void PGPGetYMDFromPGPTime( PGPTime theTime,
- PGPUInt16 *year, PGPUInt16 *month, PGPUInt16 *day );
-
-
-#if PGP_MACINTOSH /* [ */
-PGPUInt32 PGPTimeToMacTime(PGPTime theTime);
-PGPTime PGPTimeFromMacTime(PGPUInt32 theTime);
-#endif /* ] PGP_MACINTOSH */
-
-
-
-/*____________________________________________________________________________
- MacBinary support
-____________________________________________________________________________*/
-
-
-/*____________________________________________________________________________
- Examine the input file to see if it's a MacBinary file. If it is
- not a MacBinary file, then the original file is unaltered.
- Otherwise, the file is converted and the original file is deleted.
-
- The resulting file is designated by 'outPGPSpec' and may have a different
- name than the original.
-
- If the file is a TEXT file, appropriate line-end conversion is done.
-
- creator and type code pointers may be
- null but otherwise contain the mac creator and type.
-
- This routine can be called on a Mac, but generally doesn't need to be.
-____________________________________________________________________________*/
-PGPError PGPMacBinaryToLocal( PGPFileSpecRef inSpec,
- PGPFileSpecRef * outSpec,
- PGPUInt32 * macCreator, PGPUInt32 * macTypeCode );
-
-
-
-
-/*____________________________________________________________________________
- Library initialization
-
- Call PGPsdkXXXInit() before using that particular library.
- Call PGPsdkXXXCleanup() when you are done (but after disposing of any
- PGPContexts).
-
- You may call PGPsdkXXXInit multiple times (with no effect), but be sure
- to call the matching PGPsdkXXXCleanup() for each call to PGPsdkXXXInit().
-____________________________________________________________________________*/
-
-PGPError PGPsdkInit( void );
-PGPError PGPsdkCleanup( void );
-
-PGPError PGPsdkNetworkLibInit( void );
-PGPError PGPsdkNetworkLibCleanup( void );
-
-PGPError PGPsdkUILibInit( void );
-PGPError PGPsdkUILibCleanup( void );
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-
-
-#if PRAGMA_ALIGN_SUPPORTED
-#pragma options align=reset /* ] */
-#endif
-
-#endif /* ] Included_pgpUtilities_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk6/lib/PGP_SDK.lib b/plugins/CryptoPP/PGPw/sdk6/lib/PGP_SDK.lib
deleted file mode 100644
index 9332eae432..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/lib/PGP_SDK.lib
+++ /dev/null
Binary files differ
diff --git a/plugins/CryptoPP/PGPw/sdk6/lib/PGPsdkNL.lib b/plugins/CryptoPP/PGPw/sdk6/lib/PGPsdkNL.lib
deleted file mode 100644
index 30c53907d9..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/lib/PGPsdkNL.lib
+++ /dev/null
Binary files differ
diff --git a/plugins/CryptoPP/PGPw/sdk6/lib/PGPsdkUI.lib b/plugins/CryptoPP/PGPw/sdk6/lib/PGPsdkUI.lib
deleted file mode 100644
index 65f6c55e7b..0000000000
--- a/plugins/CryptoPP/PGPw/sdk6/lib/PGPsdkUI.lib
+++ /dev/null
Binary files differ
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pflTypes.h b/plugins/CryptoPP/PGPw/sdk8/include/pflTypes.h
deleted file mode 100644
index 00f3242fd4..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pflTypes.h
+++ /dev/null
@@ -1,52 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pflTypes.h,v 1.5 2003/11/20 21:15:48 vinnie Exp $
-____________________________________________________________________________*/
-#ifndef Included_pflTypes_h /* [ */
-#define Included_pflTypes_h
-
-#include "pgpBase.h"
-
-/* opaque declarations */
-typedef struct PFLFileSpec * PFLFileSpecRef;
-typedef struct PFLFileSpec const * PFLConstFileSpecRef;
-
-typedef struct PFLDirectoryIter * PFLDirectoryIterRef;
-typedef struct PFLDirectoryIter const * PFLConstDirectoryIterRef;
-
-/* Validity checks */
-#define kInvalidPFLFileSpecRef ((PFLFileSpecRef) NULL)
-#define kInvalidPFLDirectoryIterRef ((PFLDirectoryIterRef) NULL)
-
-#define PFLFileSpecRefIsValid( ref ) ( (ref) != kInvalidPFLFileSpecRef )
-#define PFLDirectoryIterRefIsValid( ref ) \
- ( (ref) != kInvalidPFLDirectoryIterRef )
-
-/* Languages supported by pgpLocStrings */
-enum PFLLanguage_
-{
- kPFLLanguage_Default = 0,
- kPFLLanguage_English = 1,
- kPFLLanguage_Japanese = 2,
- kPFLLanguage_German = 3,
- kPFLLanguage_Spanish = 4,
-
- PGP_ENUM_FORCE( PFLLanguage_ )
-};
-
-PGPENUM_TYPEDEF( PFLLanguage_, PFLLanguage );
-
-
-#endif /* ] Included_pflTypes_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpAPIAdapter.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpAPIAdapter.h
deleted file mode 100644
index e473df49e2..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpAPIAdapter.h
+++ /dev/null
@@ -1,186 +0,0 @@
-/*____________________________________________________________________________
- * Copyright (C) 2003 PGP Corporation
- * All rights reserved.
- *
- * Size of UTF-16 string is always given in 16 bit characters. This includes
- * PGPGetKeyDBObjDataPropertyU16 and PGPGetKeyDBObjAllocatedDataPropertyU16
- * for which void* is assumed to be PGPChar16* where applicable.
- * So you can write like this:
- *
- * wchar_t s[80];
- * PGPSize size;
- * PGPGetPrimaryUserIDNameU16( key, s, sizeof(s)/sizeof(s[0]), &size );
- *
- * $Id: pgpAPIAdapter.h,v 1.12 2004/05/07 08:29:12 bgaiser Exp $
- *____________________________________________________________________________*/
-#ifndef Included_pgpAPIAdapter_h /* [ */
-#define Included_pgpAPIAdapter_h
-
-#include "pgpKeys.h"
-#include "pgpKeyServer.h"
-
-#include "pgpMemoryMgr.h"
-#include "pgpUtilities.h"
-#include "pgpPFLErrors.h"
-#include "pgpFileSpec.h"
-#include "pgpHashWords.h"
-#include "pgpShareFile.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-PGPError PGPGetErrorStringU8( PGPError theError, PGPSize bufferSize, PGPChar8 * theString );
-PGPError PGPGetErrorStringU16( PGPError theError, PGPSize bufferSize, PGPChar16 * theString );
-
-PGPError PGPGetPGPsdkVersionStringU8( PGPChar8 versionString[ 256 ] );
-PGPError PGPGetPGPsdkVersionStringU16( PGPChar16 versionString[ 256 ] );
-
-PGPError PGPNewFileSpecFromFullPathU8( PGPContextRef context, const PGPChar8 *path, PGPFileSpecRef *ref );
-PGPError PGPNewFileSpecFromFullPathU16( PGPContextRef context, const PGPChar16 *path, PGPFileSpecRef *ref );
-
-PGPError PGPGetFullPathFromFileSpecU8( PGPFileSpecRef fileRef, PGPChar8 **fullPathPtr);
-PGPError PGPGetFullPathFromFileSpecU16( PGPFileSpecRef fileRef, PGPChar16 **fullPathPtr);
-
-PGPError PGPRenameFileU8( PGPFileSpecRef fileRef, const PGPChar8 *newName );
-PGPError PGPRenameFileU16( PGPFileSpecRef fileRef, const PGPChar16 *newName );
-
-PGPOptionListRef PGPOPassphraseBufferU8( PGPContextRef context, const PGPChar8 *passphrase, PGPSize passphraseLength);
-PGPOptionListRef PGPOPassphraseBufferU16( PGPContextRef context, const PGPChar16 *passphrase, PGPSize passphraseLength);
-
-PGPOptionListRef PGPOPassphraseU8( PGPContextRef context, const PGPChar8 *passphrase);
-PGPOptionListRef PGPOPassphraseU16( PGPContextRef context, const PGPChar16 *passphrase);
-
-PGPOptionListRef PGPOPGPMIMEEncodingU8(PGPContextRef context, PGPBoolean mimeEncoding, PGPSize *mimeBodyOffset, PGPChar8 mimeSeparator[ kPGPMimeSeparatorSize ]);
-PGPOptionListRef PGPOPGPMIMEEncodingU16(PGPContextRef context, PGPBoolean mimeEncoding, PGPSize *mimeBodyOffset, PGPChar16 mimeSeparator[ kPGPMimeSeparatorSize ]);
-
-PGPOptionListRef PGPOKeyGenNameU8( PGPContextRef context, const void *name, PGPSize nameLength );
-PGPOptionListRef PGPOKeyGenNameU16( PGPContextRef context, const void *name, PGPSize nameLength );
-
-PGPOptionListRef PGPOPreferredKeyServerU8( PGPContextRef context, PGPChar8 const * server );
-PGPOptionListRef PGPOPreferredKeyServerU16( PGPContextRef context, PGPChar16 const * server );
-
-PGPOptionListRef PGPOCommentStringU8( PGPContextRef context,PGPChar8 const *comment);
-PGPOptionListRef PGPOCommentStringU16( PGPContextRef context,PGPChar16 const *comment);
-
-PGPOptionListRef PGPOVersionStringU8( PGPContextRef context, PGPChar8 const *version);
-PGPOptionListRef PGPOVersionStringU16( PGPContextRef context, PGPChar16 const *version);
-
-PGPOptionListRef PGPOFileNameStringU8( PGPContextRef context, PGPChar8 const *fileName);
-PGPOptionListRef PGPOFileNameStringU16( PGPContextRef context, PGPChar16 const *fileName);
-
-PGPOptionListRef PGPOSigRegularExpressionU8(PGPContextRef context, PGPChar8 const *regularExpression);
-PGPOptionListRef PGPOSigRegularExpressionU16(PGPContextRef context, PGPChar16 const *regularExpression);
-
-PGPError PGPGetKeyDBObjDataPropertyU8( PGPKeyDBObjRef key, PGPKeyDBObjProperty whichProperty, void *buffer, PGPSize bufferSize, PGPSize *dataSize);
-PGPError PGPGetKeyDBObjDataPropertyU16( PGPKeyDBObjRef key, PGPKeyDBObjProperty whichProperty, void *buffer, PGPSize bufferSize, PGPSize *dataSize);
-
-PGPError PGPGetKeyDBObjAllocatedDataPropertyU8( PGPKeyDBObjRef obj, PGPKeyDBObjProperty prop, void **buffer, PGPSize *dataSize );
-PGPError PGPGetKeyDBObjAllocatedDataPropertyU16( PGPKeyDBObjRef obj, PGPKeyDBObjProperty prop, void **buffer, PGPSize *dataSize );
-
-PGPError PGPNewKeyDBObjDataFilterU8( PGPContextRef context, PGPKeyDBObjProperty prop, const void *val, PGPSize len, PGPMatchCriterion match, PGPFilterRef *outFilter );
-PGPError PGPNewKeyDBObjDataFilterU16( PGPContextRef context, PGPKeyDBObjProperty prop, const void *val, PGPSize len, PGPMatchCriterion match, PGPFilterRef *outFilter );
-
-PGPError PGPLDAPQueryFromFilterU8( PGPFilterRef filter, PGPChar8 **queryOut );
-PGPError PGPLDAPQueryFromFilterU16( PGPFilterRef filter, PGPChar16 **queryOut );
-
-PGPError PGPLDAPX509QueryFromFilterU8( PGPFilterRef filter,PGPChar8 **queryOut );
-PGPError PGPLDAPX509QueryFromFilterU16( PGPFilterRef filter,PGPChar16 **queryOut );
-
-PGPError PGPHKSQueryFromFilterU8( PGPFilterRef filter, PGPChar8 **queryOut );
-PGPError PGPHKSQueryFromFilterU16( PGPFilterRef filter, PGPChar16 **queryOut );
-
-PGPError PGPNetToolsCAHTTPQueryFromFilterU8( PGPFilterRef filter, PGPChar8 **queryOut );
-PGPError PGPNetToolsCAHTTPQueryFromFilterU16( PGPFilterRef filter, PGPChar16 **queryOut );
-
-PGPError PGPAddUserIDU8( PGPKeyDBObjRef key, PGPChar8 const *userID, PGPOptionListRef firstOption, ...);
-PGPError PGPAddUserIDU16( PGPKeyDBObjRef key, PGPChar16 const *userID, PGPOptionListRef firstOption, ...);
-
-PGPInt32 PGPCompareUserIDStringsU8(PGPChar8 const *a, PGPChar8 const *b);
-PGPInt32 PGPCompareUserIDStringsU16(PGPChar16 const *a, PGPChar16 const *b);
-
-PGPError PGPGetKeyIDStringU8( PGPKeyID const * ref, PGPKeyIDStringType type, PGPChar8 outString[ kPGPMaxKeyIDStringSize ] );
-PGPError PGPGetKeyIDStringU16( PGPKeyID const * ref, PGPKeyIDStringType type, PGPChar16 outString[ kPGPMaxKeyIDStringSize ] );
-
-PGPError PGPNewKeyIDFromStringU8( const PGPChar8 *string, PGPPublicKeyAlgorithm pkalg, PGPKeyID * outID );
-PGPError PGPNewKeyIDFromStringU16( const PGPChar16 *string, PGPPublicKeyAlgorithm pkalg, PGPKeyID * outID );
-
-PGPError PGPSetPKCS11DrvFileU8( PGPChar8 *module );
-PGPError PGPSetPKCS11DrvFileU16( PGPChar16 *module );
-
-PGPError PGPGetTokenInfoDataPropertyU8( PGPContextRef context, PGPUInt32 tokenNumber, PGPTokenProperty prop, PGPByte *value, PGPSize size, PGPSize *sizeout );
-PGPError PGPGetTokenInfoDataPropertyU16( PGPContextRef context, PGPUInt32 tokenNumber, PGPTokenProperty prop, void *value, PGPSize size, PGPSize *sizeout );
-
-PGPError PGPCreateDistinguishedNameU8( PGPContextRef context, PGPChar8 const *str, PGPByte **pdname, PGPSize *pdnamelen );
-PGPError PGPCreateDistinguishedNameU16( PGPContextRef context, PGPChar16 const *str, PGPByte **pdname, PGPSize *pdnamelen );
-
-PGPError PGPGetPrimaryUserIDNameU8(PGPKeyDBObjRef key, PGPChar8 *buffer, PGPSize bufferSize, PGPSize *dataSize);
-PGPError PGPGetPrimaryUserIDNameU16(PGPKeyDBObjRef key, PGPChar16 *buffer, PGPSize bufferSize, PGPSize *dataSize);
-
-PGPError PGPGetHashWordStringU8( PGPUInt32 index, PGPHashWordList list, PGPChar8 hashWordString[ 12 ] );
-PGPError PGPGetHashWordStringU16( PGPUInt32 index, PGPHashWordList list, PGPChar16 hashWordString[ 12 ] );
-
-PGPError PGPSetShareFileUserIDU8( PGPShareFileRef shareFileRef, const PGPUTF8 *userID );
-PGPError PGPSetShareFileUserIDU16( PGPShareFileRef shareFileRef, const PGPChar16 *userID );
-
-PGPError PGPGetShareFileUserIDU8( PGPShareFileRef shareFileRef, PGPSize bufferSize, PGPUTF8 *userID, PGPSize *fullSize );
-PGPError PGPGetShareFileUserIDU16( PGPShareFileRef shareFileRef, PGPSize bufferSize, PGPChar16 *userID, PGPSize *fullSize );
-
-PGPError PGPGetTARCacheObjDataPropertyU8( PGPTARCacheObjRef obj, PGPTARCacheObjProperty prop, void *buffer, PGPSize bufSize, PGPSize *dataSize );
-PGPError PGPGetTARCacheObjDataPropertyU16( PGPTARCacheObjRef obj, PGPTARCacheObjProperty prop, void *buffer, PGPSize bufSize, PGPSize *dataSize );
-
-
-/* ----- SDK UI ----- */
-PGPUInt32 PGPEstimatePassphraseQualityU8( const PGPChar8 *passphrase );
-PGPUInt32 PGPEstimatePassphraseQualityU16( const PGPChar16 *passphrase );
-
-PGPOptionListRef PGPOUIDialogPromptU8( PGPContextRef context, const PGPChar8 *prompt );
-PGPOptionListRef PGPOUIDialogPromptU16( PGPContextRef context, const PGPChar16 *prompt );
-
-PGPOptionListRef PGPOUIWindowTitleU8( PGPContextRef context, const PGPChar8 *title );
-PGPOptionListRef PGPOUIWindowTitleU16( PGPContextRef context, const PGPChar16 *title );
-
-PGPOptionListRef PGPOUIOutputPassphraseU8( PGPContextRef context, PGPChar8 **passphrase );
-PGPOptionListRef PGPOUIOutputPassphraseU16( PGPContextRef context, PGPChar16 **passphrase );
-
-PGPOptionListRef PGPOUICheckboxU8(PGPContextRef context, PGPUInt32 itemID, const PGPChar8 *title, const PGPChar8 *description, PGPUInt32 initialValue, PGPUInt32 *resultPtr, PGPOptionListRef firstOption, ...);
-PGPOptionListRef PGPOUICheckboxU16(PGPContextRef context, PGPUInt32 itemID, const PGPChar16 *title, const PGPChar16 *description, PGPUInt32 initialValue, PGPUInt32 *resultPtr, PGPOptionListRef firstOption, ...);
-
-PGPOptionListRef PGPOUIPopupListU8(PGPContextRef context, PGPUInt32 itemID, const PGPChar8 *title, const PGPChar8 *description,PGPUInt32 listItemCount, const PGPChar16 *listItems[], PGPUInt32 initialValue, PGPUInt32 *resultPtr, PGPOptionListRef firstOption, ...);
-PGPOptionListRef PGPOUIPopupListU16(PGPContextRef context, PGPUInt32 itemID, const PGPChar16 *title, const PGPChar16 *description,PGPUInt32 listItemCount, const PGPChar16 *listItems[], PGPUInt32 initialValue, PGPUInt32 *resultPtr, PGPOptionListRef firstOption, ...);
-
-
-/* ----- SDK Network ----- */
-PGPOptionListRef PGPONetURLU8(PGPContextRef context, const PGPChar8 *url);
-PGPOptionListRef PGPONetURLU16(PGPContextRef context, const PGPChar16 *url);
-
-PGPOptionListRef PGPONetHostNameU8(PGPContextRef context, const PGPChar8 *hostName, PGPUInt16 port);
-PGPOptionListRef PGPONetHostNameU16(PGPContextRef context, const PGPChar16 *hostName, PGPUInt16 port);
-
-PGPOptionListRef PGPOKeyServerKeyStoreDNU8(PGPContextRef context, const PGPChar8 *szKeyStoreDn);
-PGPOptionListRef PGPOKeyServerKeyStoreDNU16(PGPContextRef context, const PGPChar16 *szKeyStoreDn);
-
-PGPError PGPGetKeyServerHostNameU8(PGPKeyServerRef inKeyServerRef, PGPChar8 ** outHostName); /* Use PGPFreeData to free */
-PGPError PGPGetKeyServerHostNameU16(PGPKeyServerRef inKeyServerRef, PGPChar16 ** outHostName); /* Use PGPFreeData to free */
-
-PGPError PGPGetKeyServerPathU8(PGPKeyServerRef inKeyServerRef, PGPChar8 ** outPath); /* Use PGPFreeData to free */
-PGPError PGPGetKeyServerPathU16(PGPKeyServerRef inKeyServerRef, PGPChar16 ** outPath); /* Use PGPFreeData to free */
-
-PGPError PGPGetLastKeyServerErrorStringU8(PGPKeyServerRef inKeyServerRef,PGPChar8 ** outErrorString);
-PGPError PGPGetLastKeyServerErrorStringU16(PGPKeyServerRef inKeyServerRef,PGPChar16 ** outErrorString);
-
-PGPError PGPGetProxyServerU8(PGPContextRef context, PGPProxyServerType type, PGPChar8 **proxyAddress, PGPUInt16 *proxyPort );
-PGPError PGPGetProxyServerU16(PGPContextRef context, PGPProxyServerType type, PGPChar16 **proxyAddress, PGPUInt16 *proxyPort );
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpAPIAdapter_h */
-
-
-/*__Editor_settings____
- *
- * Local Variables:
- * tab-width: 4
- * End:
- * vi: ts=4 sw=4
- * vim: si
- *_____________________*/
-
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpBER.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpBER.h
deleted file mode 100644
index ad20d033fd..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpBER.h
+++ /dev/null
@@ -1,175 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpBER.h,v 1.15 2003/08/08 04:40:39 ajivsov Exp $
-____________________________________________________________________________*/
-
-/*
- * For extremely detailed explanation of all the BER types and
- * encoding, see X.208 (Specification of Abstract Syntax Notation One (ASN.1))
- * and X.209 (Specification of Basic Encoding Rules for Abstract Syntax
- * Notation One (ASN.1)).
- *
- * These two sources will tell you everything you would ever need (and want)
- * to know about BER and ASN.1.
- */
-
-#ifndef Included_pgpBER_h /* [ */
-#define Included_pgpBER_h
-
-#include "pgpPubTypes.h"
-#include "pgpMemoryMgr.h"
-#include "pgpSockets.h"
-
-/* BER types */
-/* The X.209 BER specification actually defines a lot more
- * types than is listed here, but these are the only ones
- * the current PGPldap implementation uses. */
-enum PGPberType_
-{
- kPGPberType_Boolean = 0x01, /* tag = 0x01 */
- kPGPberType_Int = 0x02, /* tag = 0x02 */
- kPGPberType_Bitstring = 0x03, /* tag = 0x03 */
- kPGPberType_Octetstring = 0x04, /* tag = 0x04 */
- kPGPberType_NULL = 0x05, /* tag = 0x05 */
- kPGPberType_ObjectID = 0x06, /* tag = 0x06 */
- kPGPberType_Enumeration = 0x0A, /* tag = 0x0A */
- kPGPberType_PrintableString = 0x0D, /* tag = 0x0D */
- kPGPberType_Sequence = 0x30, /* constructed, tag = 0x10 */
- kPGPberType_Set = 0x31, /* constructed, tag = 0x11 */
-
- kPGPberType_None = 0xFFFFFFFF
-};
-PGPENUM_TYPEDEF (PGPberType_, PGPberType);
-
-enum PGPberFormatSpecifier_
-{
- kPGPberFormatSpecifier_Boolean = 'b',
- kPGPberFormatSpecifier_Int = 'i',
- kPGPberFormatSpecifier_Octetstring = 'o',
- kPGPberFormatSpecifier_String = 's',
- kPGPberFormatSpecifier_StringVector = 'v',
- kPGPberFormatSpecifier_BERVector = 'V', /* strings and lengths */
- kPGPberFormatSpecifier_NULL = 'n',
- kPGPberFormatSpecifier_Enumeration = 'e',
- kPGPberFormatSpecifier_Tag = 't',
- kPGPberFormatSpecifier_BeginSequence= '{',
- kPGPberFormatSpecifier_EndSequence = '}',
- kPGPberFormatSpecifier_BeginSet = '[',
- kPGPberFormatSpecifier_EndSet = ']',
-
- kPGPberFormatSpecifier_Force = '*'
-};
-PGPENUM_TYPEDEF (PGPberFormatSpecifier_, PGPberFormatSpecifier);
-
-
-typedef struct PGPberElement * PGPberElementRef;
-
-#define kInvalidPGPberElementRef ( (PGPberElementRef) NULL)
-#define PGPberElementRefIsValid(ber) \
- ( (ber) != kInvalidPGPberElementRef )
-#define PGPValidateBERElementRef(ber) \
- PGPValidateParam( PGPberElementRefIsValid( ber ) )
-
-typedef struct PGPberValue
-{
- PGPSize length;
- PGPByte *value;
-} PGPberValue;
-
-/* Functions */
-
- PGPError
-PGPNewBERElement(
- PGPContextRef context,
- PGPberElementRef * ber );
-
-/* ber_free */
- PGPError
-PGPFreeBERElement(
- PGPberElementRef ber );
-
-/* BER encoding functions */
- PGPError
-PGPberAppend(
- PGPberElementRef ber,
- const PGPChar8 * s,
- ... );
-
- PGPError
-PGPberGetEncoding(
- PGPberElementRef ber,
- PGPByte ** encoding );
-
-/* BER decoding functions */
- PGPError
-PGPberRead(
- PGPberElementRef ber,
- const PGPChar8 * fmt,
- ... );
-
- PGPError
-PGPberGetLength(
- PGPberElementRef ber,
- PGPSize * length );
-
- PGPError
-PGPberRewind(
- PGPberElementRef ber );
-
- PGPError
-PGPberNextPrimitive(
- PGPberElementRef ber );
-
- PGPError
-PGPberNextConstructed(
- PGPberElementRef ber );
-
- PGPError
-PGPberNext(
- PGPberElementRef ber );
-
- PGPError
-PGPberSkip(
- PGPberElementRef ber );
-
- PGPError
-PGPberPeek(
- PGPberElementRef ber,
- PGPberType * tag,
- PGPSize * len );
-
- PGPError
-PGPberGetIndex(
- PGPberElementRef ber,
- PGPUInt32 * index );
-
- PGPError
-PGPberSetIndex(
- PGPberElementRef ber,
- PGPUInt32 index );
-
- PGPError
-PGPberReadResponse(
- PGPberElementRef ber,
- PGPSocketRef sock );
-
- PGPError
-PGPberSetData(
- PGPberElementRef ber,
- PGPByte * data,
- PGPSize len );
-
-
-#endif /* ] Included_pgpBER_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpBase.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpBase.h
deleted file mode 100644
index 53a1df46e7..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpBase.h
+++ /dev/null
@@ -1,451 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- This file deals with system dependencies to derive our very basic data
- types. It should not contain any higher level types.
-
-
- $Id: pgpBase.h,v 1.30 2004/02/09 23:30:31 vinnie Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpBase_h /* [ */
-#define Included_pgpBase_h
-
-#include "pgpPFLConfig.h"
-
-#if !( defined(PGP_MACINTOSH) || defined(PGP_UNIX) || defined(PGP_WIN32) )
-#error one of {PGP_MACINTOSH, PGP_UNIX, PGP_WIN32} must be defined
-#endif
-
-#if PGP_MACINTOSH
-#include <stddef.h>
-#if __MWERKS__ && ! defined( __dest_os )
- #include <ansi_parms.h>
- #define __dest_os __mac_os
-#endif
-#else
- /* aCC bars on <sys/time.h> if this file is not included first */
- #if PGP_COMPILER_HPUX
- #include <sys/sigevent.h>
- #endif /* PGP_COMPILER_HPUX */
- #include <sys/types.h>
-#endif
-
-#if PGP_WIN32
-#include <stddef.h> /* For size_t */
-#endif
-
-#if ! NO_LIMITS_H
-#include <limits.h>
-#endif
-
-#ifndef PGP_UNICODE
-#define PGP_UNICODE 0
-#endif
-
-#if PGP_WIN32
- /* check for inconsistent usage of UNICODE symbols */
- #if PGP_UNICODE
- #if !defined(UNICODE) || !defined(_UNICODE)
- #error UNICODE and _UNICODE must be defined
- #endif
- #else
- #if defined(UNICODE) || defined(_UNICODE)
- #error UNICODE and _UNICODE should not be defined
- #endif
- #endif
-#endif
-
-
-/*____________________________________________________________________________
- PGP basic types
-____________________________________________________________________________*/
-
-typedef unsigned char PGPBoolean; /* can be TRUE or FALSE */
-
-#ifndef TRUE
-#define TRUE 1
-#endif
-
-#ifndef FALSE
-#define FALSE 0
-#endif
-
-/* PGPUInt8, PGPInt8 */
-#if UCHAR_MAX == 0xff
-
-typedef unsigned char PGPUInt8;
-typedef signed char PGPInt8;
-#define MAX_PGPUInt8 UCHAR_MAX
-#define MAX_PGPInt8 SCHAR_MAX
-
-#else
-#error This machine has no 8-bit type
-#endif
-
-
-/* PGPUInt16, PGPInt16 */
-#if UINT_MAX == 0xffff
-
-typedef unsigned int PGPUInt16;
-typedef int PGPInt16;
-#define MAX_PGPUInt16 UINT_MAX
-#define MAX_PGPInt16 INT_MAX
-
-#elif USHRT_MAX == 0xffff
-
-typedef unsigned short PGPUInt16;
-typedef short PGPInt16;
-#define MAX_PGPUInt16 USHRT_MAX
-#define MAX_PGPInt16 SHRT_MAX
-
-#else
-#error This machine has no 16-bit type
-#endif
-
-
-/* PGPUInt32, PGPInt32 */
-#if UINT_MAX == 0xfffffffful
-
-typedef unsigned int PGPUInt32;
-typedef int PGPInt32;
-#define MAX_PGPUInt32 UINT_MAX
-#define MAX_PGPInt32 INT_MAX
-
-#elif ULONG_MAX == 0xfffffffful
-
-typedef unsigned long PGPUInt32;
-typedef long PGPInt32;
-#define MAX_PGPUInt32 ULONG_MAX
-#define MAX_PGPInt32 LONG_MAX
-
-#elif USHRT_MAX == 0xfffffffful
-
-typedef unsigned short PGPUInt32;
-typedef short PGPInt32;
-#define MAX_PGPUInt32 USHRT_MAX
-#define MAX_PGPInt32 SHRT_MAX
-
-#else
-#error This machine has no 32-bit type
-#endif
-
-
-/*____________________________________________________________________________
- PGPUInt64, PGPInt64
-
- Find a 64-bit data type, if possible.
- The conditions here are more complicated to avoid using numbers that
- will choke lesser preprocessors (like 0xffffffffffffffff) unless
- we're reasonably certain that they'll be acceptable.
-
- Some *preprocessors* choke on constants that long even if the
- compiler can accept them, so it doesn't work reliably to test values.
- So cross our fingers and hope that it's a 64-bit type.
-
- GCC uses ULONG_LONG_MAX. Solaris uses ULLONG_MAX.
- IRIX uses ULONGLONG_MAX. Are there any other names for this?
-____________________________________________________________________________*/
-
-
-#if ULONG_MAX > 0xfffffffful
-#if ULONG_MAX == 0xfffffffffffffffful
-
-typedef ulong PGPUInt64;
-typedef long PGPInt64;
-#define PGP_HAVE64 1
-
-#endif
-#endif
-
-
-#ifndef PGP_HAVE64
-
-#if defined(ULONG_LONG_MAX) || defined (ULLONG_MAX) || defined(ULONGLONG_MAX) || defined(__LONG_LONG_MAX__)
-typedef unsigned long long PGPUInt64;
-typedef long long PGPInt64;
-#define PGP_HAVE64 1
-
-#endif
-#endif
-
-/*____________________________________________________________________________
- This was added because for some reason or another, __LONG_LONG_MAX__ is
- not defined on Linux 6.1. Hopefully this doesn't break older versions of
- Linux but you never know.....
-____________________________________________________________________________*/
-#if defined(PGP_UNIX_LINUX) && !defined(PGP_HAVE64)
-typedef long long PGPInt64;
-typedef unsigned long long PGPUInt64;
-#define PGP_HAVE64 1
-#endif
-
-
-#ifndef PGP_HAVE64
-#if defined(__MWERKS__)
-#if __option( longlong )
-
-typedef unsigned long long PGPUInt64;
-typedef long long PGPInt64;
-#define PGP_HAVE64 1
-
-#endif
-#endif
-#endif
-
-#if PGP_HAVE64
-/* too painful to test all the variants above, so just do it this way */
-#define MAX_PGPUInt64 ((PGPUInt64)0xfffffffffffffffful)
-#define MAX_PGPInt64 ((PGPInt64)0x7fffffffffffffff)
-#endif
-
-
-/*____________________________________________________________________________
- PGPInt, PGPUInt, PGPLong, PGPULong
-
- Architecture-specific data types.
-
- PGPLong will be 64 bits on 64-bit architectures (Linux on AMD64 or WIN64).
- PGPLong is hardware-supported integeral type such that
- sizeof(PGPULong)==sizeof(void*)
-
- PGPInt is the most efficient harware-supported integeral type that is at
- least 32 bit long. It should be the main type for internal counters, sizes,
- offsets etc unless possibly the larger space of PGPSize is required.
-____________________________________________________________________________*/
-
-/* note that this should be changed for 16 bit platform */
-typedef int PGPInt;
-typedef unsigned int PGPUInt;
-
-#if PGP_WIN32
- #if defined(_WIN64)
- #if PGP_HAVE_64_HARDWARE==0
- #error "Configuration error: PGP_HAVE_64_HARDWARE must be 1 for WIN64"
- #endif
- typedef __int64 PGPLong;
- typedef unsigned __int64 PGPULong;
- #else
- #ifndef _W64
- /* (this definition is only need for WINNT) */
- #define _W64
- #endif
- typedef _W64 __int32 PGPLong;
- typedef _W64 unsigned __int32 PGPULong;
- #endif
-#else
- typedef unsigned long PGPULong;
- typedef long PGPLong;
-#endif
-
-#if INT_MAX == 0x7FFFFFFFL
-#define PGPENUM_TYPEDEF( enumName, typeName ) typedef enum enumName typeName
-#else
-#define PGPENUM_TYPEDEF( enumName, typeName ) typedef PGPInt32 typeName
-#endif
-#define kPGPEnumMaxValue INT_MAX
-
-#define PGP_ENUM_FORCE( enumName ) \
- k ## enumName ## force = kPGPEnumMaxValue
-
-
-typedef PGPUInt8 PGPByte;
-
-typedef PGPInt32 PGPError;
-
-/* a simple value sufficient to hold any numeric or pointer type */
-typedef void * PGPUserValue;
-
-/* A PGPSize refers to in memory sizes. Use PGPFileOffset for file offsets */
-typedef size_t PGPSize;
-#define MAX_PGPSize ( ~(PGPSize)0 )
-
-/* An offset or size of a file */
-#if PGP_UNIX
-#ifdef HAVE_64BIT_FILES
-typedef off64_t PGPFileOffset;
-#else /* !HAVE_64BIT_FILES */
-typedef off_t PGPFileOffset;
-#endif /* HAVE_64BIT_FILES */
-#else
-#if PGP_HAVE64
-typedef PGPInt64 PGPFileOffset;
-#else
-typedef PGPInt32 PGPFileOffset;
-#endif
-#endif
-
-typedef PGPUInt32 PGPFlags;
-typedef time_t PGPTime;
-typedef PGPULong PGPTimeInterval; /* In milliseconds */
-
-#define kPGPMaxTimeInterval (~(PGPTimeInterval)0)
-
-typedef struct PGPVersion
-{
- PGPUInt16 majorVersion;
- PGPUInt16 minorVersion;
-
-} PGPVersion;
-
-/* character types useful for Unicode issues */
-typedef char PGPChar8;
-typedef PGPUInt16 PGPChar16;
-typedef PGPUInt32 PGPChar32;
-typedef unsigned char PGPUTF8;
-
-#if PGP_UNICODE
-typedef PGPUInt16 PGPChar;
-#else
-typedef char PGPChar;
-#endif
-
-typedef char PFLChar;
-typedef char SDKUIChar;
-
-
-/*____________________________________________________________________________
- These macros should surround all C declarations in public
- header files which define function or data symbols.
-____________________________________________________________________________*/
-
-#ifdef __cplusplus /* [ */
-
-#define PGP_BEGIN_C_DECLARATIONS extern "C" {
-#define PGP_END_C_DECLARATIONS }
-
-#else /* ] __cplusplus [ */
-
-#define PGP_BEGIN_C_DECLARATIONS
-#define PGP_END_C_DECLARATIONS
-
-#endif /* ] __cplusplus */
-
-
-#ifndef pgpMin
-#define pgpMin(x,y) (((x)<(y)) ? (x) : (y))
-#endif
-
-#ifndef pgpMax
-#define pgpMax(x,y) (((x)>(y)) ? (x) : (y))
-#endif
-
-#ifndef PGP_DEPRECATED
-#define PGP_DEPRECATED 1
-#endif
-
-#if PGP_WIN32
-# define BIG_ENDIAN 123
-# define LITTLE_ENDIAN 321
-# define BYTE_ORDER LITTLE_ENDIAN
-#endif
-
-#if BYTE_ORDER == BIG_ENDIAN
-# define PGP_WORDSBIGENDIAN 1
-# define PGP_WORDSLITTLEENDIAN 0
-#elif BYTE_ORDER == LITTLE_ENDIAN
-# define PGP_WORDSBIGENDIAN 0
-# define PGP_WORDSLITTLEENDIAN 1
-#else
-# error define your byte order
-#endif
-
-/*____________________________________________________________________________
- * The PGP equivalent of the MS "TEXT" macro. PGPTEXT wraps a string literal
- * and causes it to compile as 8 or 16 bit characters on the basis of the
- * PGP_UNICODE symbol.
- */
-#if PGP_UNICODE
- #define PGPTEXT(literal) L##literal
-#else
- #define PGPTEXT(literal) literal
-#endif
-
-/*____________________________________________________________________________
- * Macros for wrapping text literals. These macros serve two purposes:
- * (a) to indicate to the reader of the source code the way in which the
- * literal is used (and therefore why the string should not be externalized
- * and localized), and (b) to indicate to the compiler whether the literal
- * should be compiled as 8-bit or 16-bit characters.
- *
- * To the right of each macro is the abbreviation to use when naming
- * string resources.
- */
-
-/* PGPTXT_USER should be used for strings which are to be displayed
- * to the user, but which we have decided not to translate, for whatever
- * reason.
- */
-#define PGPTXT_USER(literal) PGPTEXT(literal) /* USR */
-#define PGPTXT_USER8(literal) literal
-#define PGPTXT_USER16(literal) L##literal
-
-/* PGPTXT_ADMIN is for messages to be seen by an admin; we may choose to
- * translate these in the future.
- */
-#define PGPTXT_ADMIN(literal) PGPTEXT(literal) /* ADM */
-
-/* PGPTXT_MACHINE strings are meant to be read by a machine. That is,
- * the usual usage would be that this string is never seen by anyone,
- * neither users, developers, admins nor qa; it is only seen by programs.
- * This includes textual material in tables where that is meant to be
- * compared against hardcoded strings looking for a match. Explicit
- * 8- and 16-bit versions are provided.
- */
-#define PGPTXT_MACHINE(literal) PGPTEXT(literal) /* MAC */
-#define PGPTXT_MACHINE8(literal) literal
-#define PGPTXT_MACHINE16(literal) L##literal
-
-#define PFLTXT_MACHINE PGPTXT_MACHINE8
-#define SDKUITXT_MACHINE PGPTXT_DEBUG8
-#define SDKUITXT_USER PGPTXT_MACHINE8
-
-/* String literals in obsolete sections of code may be left in for
- * clarity or historical reasons. They should be marked with the
- * PGPTXT_OBSOLETE macro.
- */
-#define PGPTXT_OBSOLETE(literal) literal /* OBS */
-
-/* PGPTXT_FIXBEFORESHIP is for strings for which the tagger is not sure
- * what to do with them, but which will need to be decided eventually.
- */
-#define PGPTXT_FIXBEFORESHIP(literal) literal /* FIX */
-
-/* PGPTXT_DEBUG should be used for strings which are to be seen only by
- * developers or testers. This would include compiled-out self-test
- * code, debugging code, printf's, messageboxes, debug logs, and asserts.
- */
-#define PGPTXT_DEBUG(literal) PGPTEXT(literal) /* DBG */
-#define PGPTXT_DEBUG8(literal) literal
-#define PGPTXT_DEBUG16(literal) L##literal
-
-#define PFLTXT_DEBUG PGPTXT_DEBUG8
-#define SDKUITXT_DEBUG PGPTXT_DEBUG8
-
-/* PGPTXT_DEFERRED is used to mark text for which externalization
- * has been deferred because the text is not actually used in the
- * current implementation but it may be someday. Externalizing
- * such text would create unnecessary work for the localizers at
- * this point in time.
- */
-#define PGPTXT_DEFERRED(literal) PGPTEXT(literal)
-#define PGPTXT_DEFERRED8(literal) literal
-#define PGPTXT_DEFERRED16(literal) L##literal
-
-#if defined(__GNUC__) && (__GNUC__ >= 3) && (__GNUC_MINOR__ >= 1) && PGP_OSX
-#define PGP_WEAK_IMPORT __attribute__((weak_import))
-#else
-#define PGP_WEAK_IMPORT
-#endif
-
-#endif /* ] Included_pgpBase_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpBigNum.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpBigNum.h
deleted file mode 100644
index fdc65e2017..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpBigNum.h
+++ /dev/null
@@ -1,177 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpBigNum.h,v 1.7 2002/08/06 20:11:16 dallen Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpBigNum_h
-#define Included_pgpBigNum_h
-
-#include "pgpBase.h"
-#include "pgpUtilities.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-typedef struct PGPBigNum * PGPBigNumRef;
-#define kPGPInvalidBigNumRef ( (PGPBigNumRef)NULL )
-
-/*____________________________________________________________________________
- Bignum basics
-____________________________________________________________________________*/
-PGPError PGPNewBigNum( PGPContextRef context, PGPBoolean secure,
- PGPBigNumRef *newBN );
-
-PGPError PGPFreeBigNum( PGPBigNumRef bn );
-
-PGPError PGPCopyBigNum( PGPBigNumRef src, PGPBigNumRef * dest );
-PGPError PGPAssignBigNum( PGPBigNumRef src, PGPBigNumRef dest );
-PGPError PGPSwapBigNum( PGPBigNumRef a, PGPBigNumRef b);
-
-/*
-** Move bytes between the given buffer and the given BigNum encoded in
-** base 256. I.e. after either of these, the buffer will be equal to
-** (bn / 256^lsbyte) % 256^len. The difference is which is altered to
-** match the other!
-*/
-PGPError PGPBigNumExtractBigEndianBytes( PGPBigNumRef bn,
- PGPByte *dest, PGPUInt32 lsbyte, PGPUInt32 len );
-
-PGPError PGPBigNumInsertBigEndianBytes(PGPBigNumRef bn,
- PGPByte const *src, PGPUInt32 lsbyte, PGPUInt32 len );
-
-/* The same, but the buffer is little-endian. */
-PGPError PGPBigNumExtractLittleEndianBytes( PGPBigNumRef bn,
- PGPByte *dest, PGPUInt32 lsbyte, PGPUInt32 len );
-
-PGPError PGPBigNumInsertLittleEndianBytes(PGPBigNumRef bn,
- PGPByte const *src, PGPUInt32 lsbyte, PGPUInt32 len );
-
-/* Return the least-significant bits (at least 16) of the BigNum */
-PGPUInt16 PGPBigNumGetLSWord( PGPBigNumRef bn );
-
-/*
- * Return the number of significant bits in the BigNum.
- * 0 or 1+floor(log2(src))
- */
-PGPUInt32 PGPBigNumGetSignificantBits( PGPBigNumRef bn );
-
-/*
- * Adds two bignums into dest. Faster if dest is same as lhs or rhs.
- */
-PGPError PGPBigNumAdd( PGPBigNumRef lhs, PGPBigNumRef rhs,
- PGPBigNumRef dest );
-
-/*
- * lhs-rhs. dest and src may be the same, but bnSetQ(dest, 0) is faster.
- * if dest < src, returns error and dest is undefined.
- */
-PGPError PGPBigNumSubtract( PGPBigNumRef lhs, PGPBigNumRef rhs,
- PGPBigNumRef dest, PGPBoolean *underflow );
-
-/* Return sign (-1, 0, +1) of a-b. a <=> b --> bnCmpQ(a, b) <=> 0 */
-PGPInt32 PGPBigNumCompareQ( PGPBigNumRef bn, PGPUInt16 sm );
-
-/* dest = src, where 0 <= src < 2^16. */
-PGPError PGPBigNumSetQ( PGPBigNumRef dest, PGPUInt16 sm );
-
-/* dest = bn + sm, where 0 <= sm < 2^16 */
-PGPError PGPBigNumAddQ( PGPBigNumRef bn, PGPUInt16 sm,
- PGPBigNumRef dest);
-
-/* dest = bn + sm, where 0 <= sm < 2^16 */
-PGPError PGPBigNumSubtractQ( PGPBigNumRef bn, PGPUInt16 sm,
- PGPBigNumRef dest, PGPBoolean *underflow);
-
-/* Return sign (-1, 0, +1) of a-b. a <=> b --> bnCmp(a, b) <=> 0 */
-PGPInt32 PGPBigNumCompare( PGPBigNumRef lhs, PGPBigNumRef rhs);
-
-/* dest = src * src. dest may be the same as src, but it costs time. */
-PGPError PGPBigNumSquare( PGPBigNumRef src, PGPBigNumRef dest);
-
-/* dest = a * b. dest may be the same as a or b, but it costs time. */
-PGPError PGPBigNumMultiply( PGPBigNumRef lhs, PGPBigNumRef rhs,
- PGPBigNumRef dest);
-
-/* dest = a * b, where 0 <= b < 2^16. dest and a may be the same. */
-PGPError PGPBigNumMultiplyQ( PGPBigNumRef lhs, PGPUInt16 sm,
- PGPBigNumRef dest);
-
-/*
- * q = n/d, r = n%d. r may be the same as n, but not d,
- * and q may not be the same as n or d.
- * re-entrancy issue: this temporarily modifies d, but restores
- * it for return.
- */
-PGPError PGPBigNumDivide( PGPBigNumRef numerator, PGPBigNumRef denominator,
- PGPBigNumRef quotient, PGPBigNumRef remainder);
-/*
- * dest = n % d. dest and src may be the same, but not dest and d.
- * re-entrancy issue: this temporarily modifies d, but restores
- * it for return.
- */
-PGPError PGPBigNumMod( PGPBigNumRef numerator, PGPBigNumRef denominator,
- PGPBigNumRef dest );
-
-/* return src % d, where 0 <= d < 2^16. */
-PGPUInt16 PGPBigNumModQ( PGPBigNumRef numerator, PGPUInt16 denominator );
-
-/* n = n^exp, modulo "mod" "mod" *must* be odd */
-PGPError PGPBigNumExpMod( PGPBigNumRef n, PGPBigNumRef exponent,
- PGPBigNumRef mod, PGPBigNumRef dest );
-
-/*
- * dest = n1^e1 * n2^e2, modulo "mod". "mod" *must* be odd.
- * dest may be the same as n1 or n2.
- */
-PGPError PGPBigNumDoubleExpMod( PGPBigNumRef n1, PGPBigNumRef exponent1,
- PGPBigNumRef n2, PGPBigNumRef exponent2,
- PGPBigNumRef mod, PGPBigNumRef dest );
-
-/* dest = 2^exp, modulo "mod" "mod" *must* be odd */
-PGPError PGPBigNumTwoExpMod( PGPBigNumRef exponent, PGPBigNumRef mod,
- PGPBigNumRef dest );
-
-/* dest = gcd(a, b). The inputs may overlap arbitrarily. */
-PGPError PGPBigNumGCD( PGPBigNumRef a, PGPBigNumRef b, PGPBigNumRef dest );
-
-/* dest = src^-1, modulo "mod". dest may be the same as src. */
-PGPError PGPBigNumInv( PGPBigNumRef src, PGPBigNumRef mod,
- PGPBigNumRef dest );
-
-
-/* Shift dest left "amt" places */
-PGPError PGPBigNumLeftShift( PGPBigNumRef dest, PGPUInt32 amt );
-
-/* Shift dest right "amt" places, discarding low-order bits */
-PGPError PGPBigNumRightShift( PGPBigNumRef dest, PGPUInt32 amt );
-
-/* right shift all low order 0-bits, return number of bits shifted */
-PGPUInt16 PGPBigNumMakeOdd( PGPBigNumRef dest );
-
-
-PGP_END_C_DECLARATIONS
-
-#endif /* Included_pgpBigNum_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
-
-
-
-
-
-
-
-
-
-
-
-
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpCBC.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpCBC.h
deleted file mode 100644
index 26ae61d57f..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpCBC.h
+++ /dev/null
@@ -1,82 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpCBC.h,v 1.6 2002/08/06 20:11:16 dallen Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpCBC_h /* [ */
-#define Included_pgpCBC_h
-
-#include "pgpSymmetricCipher.h"
-
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- A CBC context requires use of a symmetric cipher which has been created
- and whose key has been set. An error will be returned if this is not
- the case.
-
- After the call, the CBCContextRef "owns" the
- symmetric ref and will dispose of it properly (even if an error
- occurs). The caller should no longer reference it.
-____________________________________________________________________________*/
-
-PGPError PGPNewCBCContext( PGPSymmetricCipherContextRef ref,
- PGPCBCContextRef *outRef );
-
-/*____________________________________________________________________________
- Disposal clears all data in memory before releasing it.
-____________________________________________________________________________*/
-
-PGPError PGPFreeCBCContext( PGPCBCContextRef ref );
-
-/*____________________________________________________________________________
- Make an exact copy, including current state. Original is not changed.
-____________________________________________________________________________*/
-
-PGPError PGPCopyCBCContext( PGPCBCContextRef ref, PGPCBCContextRef *outRef );
-
-/*____________________________________________________________________________
- IV size is implicit (same size as the symmetric cipher block size).
- IV is *copied*.
- Caller may want to destroy the original after passing it in.
-____________________________________________________________________________*/
-
-PGPError PGPInitCBC( PGPCBCContextRef ref, const void *key,
- const void *initializationVector );
-
-/*____________________________________________________________________________
- Call repeatedly to process arbitrary amounts of data. Each call must
- have bytesIn be a multiple of the cipher block size.
-____________________________________________________________________________*/
-
-PGPError PGPCBCEncrypt( PGPCBCContextRef ref, const void *in,
- PGPSize bytesIn, void *out );
-
-PGPError PGPCBCDecrypt( PGPCBCContextRef ref, const void *in,
- PGPSize bytesIn, void *out );
-
-/*____________________________________________________________________________
- Get the symmetric cipher being used for this CBC context.
- You can use this to determine useful things about the underlying cipher
- such as its block size.
-____________________________________________________________________________*/
-
-PGPError PGPCBCGetSymmetricCipher( PGPCBCContextRef ref,
- PGPSymmetricCipherContextRef *outRef );
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpCBC_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpCFB.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpCFB.h
deleted file mode 100644
index 9745f969ec..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpCFB.h
+++ /dev/null
@@ -1,115 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpCFB.h,v 1.6 2002/08/06 20:11:16 dallen Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpCFB_h /* [ */
-#define Included_pgpCFB_h
-
-#include "pgpSymmetricCipher.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- A CFB context requires use of a symmetric cipher which has been created
- and whose key has been set. An error will be returned if this is not
- the case.
-
- After the call, the CFBRef "owns" the symmetric ref and will
- dispose of it properly (even if an error occurs).
- The caller should no longer reference it.
-____________________________________________________________________________*/
-
-PGPError PGPNewCFBContext( PGPSymmetricCipherContextRef ref,
- PGPUInt16 interleaveFactor,
- PGPCFBContextRef *outRef );
-
-/*____________________________________________________________________________
- Disposal clears all data in memory before releasing it.
-____________________________________________________________________________*/
-
-PGPError PGPFreeCFBContext( PGPCFBContextRef ref );
-
-/*____________________________________________________________________________
- Make an exact copy, including current state. Original is not changed.
-____________________________________________________________________________*/
-
-PGPError PGPCopyCFBContext( PGPCFBContextRef ref,
- PGPCFBContextRef *outRef );
-
-/*____________________________________________________________________________
- IV size is implicit (same size as the symmetric cipher block size).
- IV is *copied*.
- Caller may want to destroy the original after passing it in.
- Calling this implicitly calls PGPResetCFB().
-____________________________________________________________________________*/
-
-PGPError PGPInitCFB( PGPCFBContextRef ref, const void *key,
- const void *initializationVector );
-
-/*____________________________________________________________________________
- Call repeatedly to process arbitrary amounts of data.
-____________________________________________________________________________*/
-
-PGPError PGPCFBEncrypt( PGPCFBContextRef ref, const void *in,
- PGPSize bytesIn, void *out );
-
-PGPError PGPCFBDecrypt( PGPCFBContextRef ref, const void *in,
- PGPSize bytesIn, void *out );
-
-/*____________________________________________________________________________
- Get the symmetric cipher being used for this CFB context.
- You can use this to determine useful things about the underlying cipher
- such as its block size.
-____________________________________________________________________________*/
-
-PGPError PGPCFBGetSymmetricCipher(PGPCFBContextRef ref,
- PGPSymmetricCipherContextRef *outRef );
-
-/*____________________________________________________________________________
- Reset the feedback mechanism to use whatever we have so far, plus previous
- bytes for a total of the cipher block size bytes. This effectively
- changes the cipher block boundary.
-____________________________________________________________________________*/
-
-PGPError PGPCFBSync( PGPCFBContextRef ref );
-
-/*____________________________________________________________________________
- Fetch random bytes from the cipher. Returns the actual number of
- random bytes obtained.
-____________________________________________________________________________*/
-
-PGPError PGPCFBGetRandom( PGPCFBContextRef ref, PGPSize requestCount,
- void *out, PGPSize *outCount);
-
-/*____________________________________________________________________________
- Make more random bytes available using the supplied salt, which must
- be the same as the symmetric cipher block size.
-____________________________________________________________________________*/
-
-PGPError PGPCFBRandomCycle( PGPCFBContextRef ref, const void *salt);
-
-/*____________________________________________________________________________
- Make more random bytes available using the supplied salt, which must
- be the same as the symmetric cipher block size.
-____________________________________________________________________________*/
-
-PGPError PGPCFBRandomWash( PGPCFBContextRef ref, const void *in,
- PGPSize bytesIn );
-
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpCFB_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpConfig.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpConfig.h
deleted file mode 100644
index f2e9f883a1..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpConfig.h
+++ /dev/null
@@ -1,96 +0,0 @@
-/*
- * pgpConfig.h -- Configuration for the PGPsdk. This file contains
- * the configuration information for the PGPsdk, and it should be
- * included in all PGPsdk source files.
- *
- * $Id: pgpConfig.h,v 1.1.1.1 1999/08/08 19:38:33 heller Exp $
- */
-
-/* Define to empty if the compiler does not support 'const' variables. */
-/* #undef const */
-
-/* Define to `long' if <sys/types.h> doesn't define. */
-/* #undef off_t */
-
-/* Define to `unsigned' if <sys/types.h> doesn't define. */
-/* #undef size_t */
-
-
-#ifndef Included_pgpConfig_h /* [ */
-#define Included_pgpConfig_h
-
-#include "pgpPFLConfig.h"
-
-
-
-
-
-#ifndef Included_pgpPFLConfig_h /* [ */
-
-#define HAVE_STDARG_H 1
-#define HAVE_STDLIB_H 1
-#define HAVE_UNISTD_H 0
-#define HAVE_USHORT 0
-#define HAVE_UINT 0
-#define HAVE_ULONG 0
-#define NO_LIMITS_H 0
-#define NO_POPEN 1
-
-#if defined( _MSC_VER )
-#define PGP_HAVE64 1
-typedef __int64 PGPInt64;
-typedef unsigned __int64 PGPUInt64;
-
-#elif defined( __MWERKS__ )
-
-#define PGP_HAVE64 0
-
-#endif
-
-
-
-#endif /*Included_pgpPFLConfig_h*/ /* ] */
-
-
-/* Checks for various types */
-#define HAVE_UCHAR 0
-
-/* Define if you have the ANSI C header files. */
-#define STDC_HEADERS 1
-
-/* Checks for various specific header files */
-#define HAVE_FCNTL_H 1
-#define HAVE_LIMITS_H 1
-#define HAVE_SYS_IOCTL_H 0
-#define HAVE_SYS_TIME_H 0
-#define HAVE_SYS_TIMEB_H 1
-#define HAVE_SYS_PARAM_H 0
-
-/* Check if <sys/time.h> is broken and #includes <time.h> wrong */
-#define TIME_WITH_SYS_TIME 0
-
-/* Checks for various functions */
-#define HAVE_GETHRTIME 0
-#define HAVE_CLOCK_GETTIME 0
-#define HAVE_CLOCK_GETRES 0
-#define HAVE_GETTIMEOFDAY 0
-#define HAVE_GETITIMER 0
-#define HAVE_SETITIMER 0
-#define HAVE_FTIME 1
-#define HAVE_MKSTEMP 0
-
-
-#if defined( __MWERKS__ )
-
-#define PGPTTYE /* nothing */
-
-#elif defined( _MSC_VER )
-
-/* Tags for exported functions, needed for dynamic linking on some platforms */
-#define PGPTTYE /* nothing */
-
-#endif
-
-
-
-#endif /* ] Included_pgpConfig_h */
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpEC.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpEC.h
deleted file mode 100644
index c12ded4444..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpEC.h
+++ /dev/null
@@ -1,78 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpEC.h,v 1.12 2003/12/13 01:20:39 dallen Exp $
-____________________________________________________________________________*/
-
-#ifndef PGP_EC_PUB_H
-#define PGP_EC_PUB_H
-
-PGP_BEGIN_C_DECLARATIONS
-
-/* Wrapper for the ec* routines and data types.
- These are exported functions from PGPsdk
- */
-
-typedef signed char ** PGPECContextRef;
-typedef signed short ** PGPECPointRef;
-typedef signed int ** PGPECScalarRef;
-
-enum PGPECMemoryUsage_
-{
- kPGPECMemoryMedium = 0,
- kPGPECMemoryHigh = 1,
-
- PGP_ENUM_FORCE( PGPECMemoryUsage_ )
-};
-PGPENUM_TYPEDEF( PGPECMemoryUsage_, PGPECMemoryUsage );
-
-PGPError PGPECCreate2mContext( PGPMemoryMgrRef memoryMgr,
- PGPSize bitsize, PGPECMemoryUsage memUsage,
- PGPECContextRef *c );
-
-PGPError PGPECFreeContext( PGPECContextRef p );
-
-PGPError PGPECSetEC2mParamA( PGPECContextRef c, const unsigned *a );
-PGPError PGPECSetEC2mParamB( PGPECContextRef c, const unsigned *b );
-PGPError PGPECSetEC2mParamAInt( PGPECContextRef c, unsigned a );
-PGPError PGPECSetEC2mParamBInt( PGPECContextRef c, unsigned b );
-
-PGPError PGPECGetBufferSize( PGPECContextRef c,
- PGPSize *coordinateSize, PGPSize *scalarSize,
- PGPSize *pointDecomprSize, PGPSize *pointComprSize );
-
-PGPError PGPECScalarCreate( PGPECContextRef c, PGPECScalarRef *s, PGPBoolean isSecure );
-PGPError PGPECScalarFree( PGPECScalarRef s );
-PGPError PGPECScalarInsertBytes( PGPECScalarRef s,
- const PGPByte *scalar /*network order*/, PGPECScalarRef G_ord );
-
-PGPError PGPECPointCreate( PGPECContextRef c, PGPECPointRef *p );
-PGPError PGPECPointFree( PGPECPointRef p );
-
-PGPError PGPECPointExtractBytes( PGPECPointRef p, PGPByte *out, unsigned flags );
-PGPError PGPECPointExtractXYBytes( PGPECPointRef p, PGPByte *out_x, PGPByte *out_y, unsigned flags );
-PGPError PGPECPointInsertBytes( PGPECPointRef p, const PGPByte *in, unsigned flags );
-
-PGPError PGPECPointAssignContext( PGPECPointRef p, PGPECContextRef c );
-
-PGPError PGPECPointPrefBasis( PGPECPointRef p );
-
-PGPError PGPECPointMul( PGPECPointRef p,
- PGPECScalarRef scalar,
- PGPBoolean isPrecomputed, /* PGPECPointPrecomp already called */
- PGPECPointRef out );
-
-PGPError PGPECPointAdd( PGPECPointRef p0, const PGPECPointRef p1, PGPECPointRef sum );
-
-PGPError PGPECPointSetZero( PGPECPointRef p );
-PGPBoolean PGPECPointIsZero( PGPECPointRef p );
-
-PGPBoolean PGPECPointIsConsistent( PGPECPointRef p );
-
-PGPError PGPECPointCompress( PGPECPointRef p );
-PGPError PGPECPointDecompress( PGPECPointRef p );
-
-PGP_END_C_DECLARATIONS
-
-#endif /* PGP_EC_PUB_H */
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpEncode.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpEncode.h
deleted file mode 100644
index 9f2830ddf0..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpEncode.h
+++ /dev/null
@@ -1,306 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- This file contains the prototypes for functions which encode/decode files
- and buffers.
-
- $Id: pgpEncode.h,v 1.20 2003/09/24 03:09:32 ajivsov Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpEncode_h /* [ */
-#define Included_pgpEncode_h
-
-#include "pgpPubTypes.h"
-#include "pgpTLS.h"
-
-#if PGP_MACINTOSH
-#pragma options align=mac68k
-#endif
-
-/*____________________________________________________________________________
- PGP Events
-
- The PGPEvent structure is used to notify clients of the encode API of
- various events. Each event is denoted by an event type:
-____________________________________________________________________________*/
-
-enum PGPEventType_
-{
- kPGPEvent_NullEvent = 0, /* Nothing happened */
- kPGPEvent_InitialEvent = 1, /* Final event */
- kPGPEvent_FinalEvent = 2, /* Final event */
- kPGPEvent_ErrorEvent = 3, /* An error occurred */
- kPGPEvent_WarningEvent = 4, /* Warning event */
- kPGPEvent_EntropyEvent = 5, /* More entropy is needed */
- kPGPEvent_PassphraseEvent = 6, /* A passphrase is needed */
- kPGPEvent_InsertKeyEvent = 7, /* Smart card must be inserted */
- kPGPEvent_AnalyzeEvent = 8, /* Initial analysis event,
- before any output */
- kPGPEvent_RecipientsEvent = 9, /* Recipient list report,
- before any output */
- kPGPEvent_KeyFoundEvent = 10, /* Key packet found */
- kPGPEvent_OutputEvent = 11, /* Output specification needed */
- kPGPEvent_SignatureEvent = 12, /* Signature status report */
- kPGPEvent_BeginLexEvent = 13, /* Initial event per lexical unit*/
- kPGPEvent_EndLexEvent = 14, /* Final event per lexical unit */
- kPGPEvent_RecursionEvent = 15, /* Notification of recursive
- job creation */
- kPGPEvent_DetachedSignatureEvent = 16, /* Need input for verification of
- detached signature */
- kPGPEvent_KeyGenEvent = 17, /* Key generation progress */
-
- kPGPEvent_KeyServerEvent = 18, /* Key Server progress */
- kPGPEvent_KeyServerSignEvent= 19, /* Key Server passphrase */
- kPGPEvent_KeyServerTLSEvent = 20, /* Key Server TLS event */
- kPGPEvent_KeyServerIdleEvent= 21, /* Idle during keyserver call */
-
- kPGPEvent_SocketsIdleEvent = 22, /* Idle during sockets */
- kPGPEvent_DecryptionEvent = 23, /* Decryption data report */
- kPGPEvent_EncryptionEvent = 24, /* Encryption data report */
-
- kPGPEvent_ToBeSignedEvent = 25, /* To-be-signed hash */
-
- PGP_ENUM_FORCE( PGPEventType_ )
-};
-PGPENUM_TYPEDEF( PGPEventType_, PGPEventType );
-
-
-/* PGP Analyze event callback codes */
-
-enum PGPAnalyzeType_
-{
- kPGPAnalyze_Encrypted = 0, /* Encrypted message */
- kPGPAnalyze_Signed = 1, /* Signed message */
- kPGPAnalyze_DetachedSignature = 2, /* Detached signature */
- kPGPAnalyze_Key = 3, /* Key data */
- kPGPAnalyze_Unknown = 4, /* Non-pgp message */
- kPGPAnalyze_X509Certificate = 5, /* X.509 certificate */
- kPGPAnalyze_SMIMEBody = 6, /* SMIME body */
-
- PGP_ENUM_FORCE( PGPAnalyzeType_ )
-};
-PGPENUM_TYPEDEF( PGPAnalyzeType_, PGPAnalyzeType );
-
-/* Individual event information structs, combined as a union in PGPEvent */
-
-typedef struct PGPEventNullData_
-{
- PGPFileOffset bytesWritten;
- PGPFileOffset bytesTotal;
-} PGPEventNullData;
-
-typedef struct PGPEventErrorData_
-{
- PGPError error;
- void *errorArg;
-} PGPEventErrorData;
-
-typedef struct PGPEventWarningData_
-{
- PGPError warning;
- void *warningArg;
-} PGPEventWarningData;
-
-typedef struct PGPEventEntropyData_
-{
- PGPUInt32 entropyBitsNeeded;
-} PGPEventEntropyData;
-
-typedef struct PGPEventPassphraseData_
-{
- PGPBoolean fConventional;
- PGPKeySetRef keyset;
- const PGPByte *ESKs;
- PGPSize ESKsLength;
-} PGPEventPassphraseData;
-
-typedef struct PGPEventRecipientsData_
-{
- PGPKeySetRef recipientSet;
- PGPUInt32 conventionalPassphraseCount;
- PGPUInt32 keyCount;
- PGPKeyID const * keyIDArray;
-} PGPEventRecipientsData;
-
-typedef struct PGPEventKeyFoundData_
-{
- PGPKeyDBRef keyDB;
-} PGPEventKeyFoundData;
-
-typedef struct PGPEventSignatureData_
-{
- PGPKeyID signingKeyID;
- PGPKeyDBObjRef signingKey;
- PGPBoolean checked;
- PGPBoolean verified;
- PGPBoolean keyRevoked;
- PGPBoolean keyDisabled;
- PGPBoolean keyExpired;
- PGPBoolean keyMeetsValidityThreshold;
- PGPValidity keyValidity;
- PGPTime creationTime;
- PGPUInt32 expirationPeriod;
-} PGPEventSignatureData;
-
-typedef struct PGPEventDecryptionData_
-{
- PGPCipherAlgorithm cipherAlgorithm;
- PGPByte *sessionKey;
- PGPSize sessionKeyLength;
- PGPUInt32 keyCount; /* keyids of keys that can decrypt, */
- PGPKeyID const * keyIDArray; /* a subset of keys in PGPEventRecipientsData */
-} PGPEventDecryptionData;
-
-typedef struct PGPEventEncryptionData_
-{
- PGPCipherAlgorithm cipherAlgorithm;
- PGPByte *sessionKey;
- PGPSize sessionKeyLength;
-} PGPEventEncryptionData;
-
-typedef struct PGPEventAnalyzeData_
-{
- PGPAnalyzeType sectionType;
-} PGPEventAnalyzeData;
-
-typedef struct PGPEventOutputData_
-{
- PGPUInt32 messageType;
- PGPChar8 *suggestedName;
- PGPBoolean forYourEyesOnly;
-} PGPEventOutputData;
-
-typedef struct PGPEventBeginLexData_
-{
- PGPUInt32 sectionNumber;
- PGPSize sectionOffset;
-} PGPEventBeginLexData;
-
-typedef struct PGPEventEndLexData_
-{
- PGPUInt32 sectionNumber;
-} PGPEventEndLexData;
-
-typedef struct PGPEventKeyGenData_
-{
- PGPUInt32 state;
-} PGPEventKeyGenData;
-
-typedef struct PGPEventKeyServerData_
-{
- PGPKeyServerRef keyServerRef;
- PGPUInt32 state; /* PGPKeyServerState */
-} PGPEventKeyServerData;
-
-typedef struct PGPEventKeyServerSignData_
-{
- PGPKeyServerRef keyServerRef;
-} PGPEventKeyServerSignData;
-
-typedef struct PGPEventKeyServerTLSData_
-{
- PGPKeyServerRef keyServerRef;
- PGPUInt32 state; /* PGPKeyServerState */
- PGPtlsSessionRef tlsSession;
-} PGPEventKeyServerTLSData;
-
-typedef struct PGPEventKeyServerIdleData_
-{
- PGPKeyServerRef keyServerRef;
-} PGPEventKeyServerIdleData;
-
-typedef struct PGPEventToBeSignedData_
-{
- PGPKeyID keyID;
- PGPHashAlgorithm hashAlg;
- PGPByte hash[512/8];
- PGPSize hashSize;
-} PGPEventToBeSignedData;
-
-/*
- * The following events have no event-specific data defined for them:
- * kPGPEvent_InsertKeyEvent
- * kPGPEvent_RecursionEvent
- * kPGPEvent_DetachedSignatureEvent
- * kPGPEvent_InitialEvent
- * kPGPEvent_FinalEvent
- * kPGPEvent_SocketsIdleEvent
- */
-
-/* Union of all event data structures above */
-typedef union PGPEventData_
-{
- PGPEventNullData nullData;
- PGPEventErrorData errorData;
- PGPEventWarningData warningData;
- PGPEventEntropyData entropyData;
- PGPEventPassphraseData passphraseData;
- PGPEventRecipientsData recipientsData;
- PGPEventKeyFoundData keyFoundData;
- PGPEventSignatureData signatureData;
- PGPEventDecryptionData decryptionData;
- PGPEventEncryptionData encryptionData;
- PGPEventAnalyzeData analyzeData;
- PGPEventOutputData outputData;
- PGPEventBeginLexData beginLexData;
- PGPEventEndLexData endLexData;
- PGPEventKeyGenData keyGenData;
- PGPEventKeyServerData keyServerData;
- PGPEventKeyServerSignData keyServerSignData;
- PGPEventKeyServerTLSData keyServerTLSData;
- PGPEventKeyServerIdleData keyServerIdleData;
- PGPEventToBeSignedData tbsData;
-} PGPEventData;
-
-/* Refs to internal "job" structure */
-typedef struct PGPJob * PGPJobRef;
-
-#define kInvalidPGPJobRef ((PGPJobRef) NULL)
-#define PGPJobRefIsValid( ref ) ( (ref) != kInvalidPGPJobRef )
-
-/* PGPEvent structure */
-
-struct PGPEvent
-{
- PGPVersion version; /* Version of event structure */
- struct PGPEvent_ *nextEvent; /* Allow lists of events */
- PGPJobRef job; /* Associated with what job */
- PGPEventType type; /* Type of event */
- PGPEventData data; /* Event specific data */
-};
-typedef struct PGPEvent PGPEvent;
-
-
-#if PGP_MACINTOSH
-#pragma options align=reset
-#endif
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*
-** Functions to encode and decode. The variable parameters are one or more
-** PGPOptionListRef's which describe the inputs, outputs, and options.
-*/
-
-PGPError PGPEncode(PGPContextRef context,
- PGPOptionListRef firstOption, ...);
-PGPError PGPDecode(PGPContextRef context,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPAddJobOptions(PGPJobRef job,
- PGPOptionListRef firstOption, ...);
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpEncode_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpErrors.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpErrors.h
deleted file mode 100644
index 7174b0a9e6..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpErrors.h
+++ /dev/null
@@ -1,393 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- Error codes for all PGPsdk errors can be found in this file.
-
- $Id: pgpErrors.h,v 1.28 2004/04/26 21:23:53 vinnie Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpErrors_h /* [ */
-#define Included_pgpErrors_h
-
-#include "pgpPubTypes.h"
-
-
-#include "pgpPFLErrors.h"
-
-#define kPGPErrorRange 1000
-
-enum PGPError_
-{
- /*
- NOTE: error code values must not be changed;
- compiled client code depends on them.
- */
- kPGPError_FirstError = -11500,
- kPGPError_Last = -10500,
-
- kPGPError_BadPassphrase = -11500,
- kPGPError_OptionNotFound = -11499,
-
-/* Errors from pgpEncode */
- kPGPError_RedundantOptions = -11498,
- kPGPError_KeyRevoked = -11497,
- kPGPError_KeyExpired = -11496,
- kPGPError_KeyDisabled = -11495,
- kPGPError_KeyInvalid = -11494,
- kPGPError_KeyUnusableForEncryption = -11493,
- kPGPError_KeyUnusableForSignature = -11492,
- kPGPError_OutputBufferTooSmall = -11491,
- kPGPError_InconsistentEncryptionAlgorithms = -11490,
- kPGPError_MissingPassphrase = -11489,
- kPGPError_CombinedConventionalAndPublicEncryption= -11488,
- kPGPError_DetachedSignatureWithoutSigningKey= -11487,
- kPGPError_DetachedSignatureWithEncryption = -11486,
- kPGPError_NoInputOptions = -11485,
- kPGPError_MultipleInputOptions = -11484,
- kPGPError_InputFile = -11483,
- kPGPError_NoOutputOptions = -11482,
- kPGPError_MultipleOutputOptions = -11481,
- kPGPError_MissingEventHandler = -11480,
- kPGPError_MissingKeyDB = -11479,
- kPGPError_DetachedSignatureFound = -11478,
- kPGPError_NoDecryptionKeyFound = -11477,
- kPGPError_CorruptSessionKey = -11476,
- kPGPError_SkipSection = -11475,
- kPGPError_Interrupted = -11474,
- kPGPError_TooManyARRKs = -11473,
- kPGPError_KeyUnusableForDecryption = -11472,
- kPGPError_KeygenTimedOut = -11471,
-
- kPGPError_IncompatibleAPI = -11460,
-
-/* misc errors */
- kPGPError_CompressionFailed = -11453,
- kPGPError_UnTARFailed = -11452,
- kPGPError_MinorUnTARError = -11451,
- kPGPError_NotMacBinary = -11450,
- kPGPError_NoMacBinaryTranslationAvailable = -11449,
- kPGPError_BadSignature = -11448,
- kPGPError_CAPIUnsupportedKey = -11447,
- kPGPError_SelfTestFailed = -11446,
- kPGPError_SelfTestsNotExecuted = -11445,
- kPGPError_BadIntegrity = -11444,
- kPGPError_DeCompressionFailed = -11443,
- kPGPError_DeletingSelfSig = -11442,
-
-/* filter errors */
-
- kPGPError_InconsistentFilterClasses = -11440,
- kPGPError_UnsupportedLDAPFilter = -11439,
- kPGPError_UnsupportedHKPFilter = -11438,
- kPGPError_UnknownFilterType = -11437,
- kPGPError_InvalidFilterParameter = -11436,
- kPGPError_UnsupportedNetToolsCAFilter = -11435,
-
-/* old errors: */
-
- kPGPError_OutOfRings = -11420,
- kPGPError_BadHashNumber = -11419,
- kPGPError_BadCipherNumber = -11418,
- kPGPError_BadKeyLength = -11417,
- kPGPError_SizeAdviseFailure = -11416,
- kPGPError_ConfigParseFailure = -11415,
- kPGPError_ConfigParseFailureBadFunction = -11414,
- kPGPError_ConfigParseFailureBadOptions = -11413,
- kPGPError_KeyIsLocked = -11412,
- kPGPError_CantDecrypt = -11411,
- kPGPError_UnknownString2Key = -11410,
- kPGPError_BadSessionKeySize = -11409,
- kPGPError_UnknownVersion = -11408,
- kPGPError_BadSessionKeyAlgorithm = -11407,
- kPGPError_UnknownSignatureType = -11406,
- kPGPError_BadSignatureSize = -11405,
- kPGPError_SignatureBitsWrong = -11404,
- kPGPError_ExtraDateOnSignature = -11403,
- kPGPError_SecretKeyNotFound = -11402,
- kPGPError_AdditionalRecipientRequestKeyNotFound = -11401,
- kPGPError_InvalidCommit = -11400,
- kPGPError_CantHash = -11399,
- kPGPError_UnbalancedScope = -11398,
- kPGPError_WrongScope = -11397,
- kPGPError_FIFOReadError = -11396,
- kPGPError_RandomSeedTooSmall = -11395,
- kPGPError_EnvPriorityTooLow = -11394,
- kPGPError_UnknownCharMap = -11393,
- kPGPError_AsciiParseIncomplete = -11392,
- kPGPError_BadPacket = -11391,
-
- kPGPError_TroubleKeySubKey = -11390,
- kPGPError_TroubleSigSubKey = -11389,
- kPGPError_TroubleBadTrust = -11388,
- kPGPError_TroubleUnknownPacketByte = -11387,
- kPGPError_TroubleUnexpectedSubKey = -11386,
- kPGPError_TroubleUnexpectedName = -11385,
- kPGPError_TroubleUnexpectedSignature = -11384,
- kPGPError_TroubleUnexpectedUnknown = -11383,
- kPGPError_TroubleUnexpectedTrust = -11382,
- kPGPError_TroubleKeyTooBig = -11381,
- kPGPError_TroubleSecretKeyTooBig = -11380,
- kPGPError_TroubleNameTooBig = -11379,
- kPGPError_TroubleSignatureTooBig = -11378,
- kPGPError_TroubleUnknownTooBig = -11377,
- kPGPError_TroubleDuplicateKeyID = -11376,
- kPGPError_TroubleDuplicateKey = -11375,
- kPGPError_TroubleDuplicateSecretKey = -11374,
- kPGPError_TroubleDuplicateName = -11373,
- kPGPError_TroubleDuplicateSignature = -11372,
- kPGPError_TroubleDuplicateUnknown = -11371,
- kPGPError_TroubleBareKey = -11370,
- kPGPError_TroubleVersionBugPrev = -11369,
- kPGPError_TroubleVersionBugCur = -11368,
- kPGPError_TroubleOldSecretKey = -11367,
- kPGPError_TroubleNewSecretKey = -11366,
- kPGPError_TroubleImportingNonexportableSignature= -11365,
- kPGPError_TroubleDuplicateCRL = -11364,
- kPGPError_TroubleCRLTooBig = -11363,
-
- kPGPError_BadCompressionNumber = -11362,
-
- /*
- * The set of errors in this range are the ones which will NOT abort
- * a keyring check operation. These errors just make us skip the key
- * and go on to the next.
- */
-kPGPError_KEY_MIN = -11350,
- kPGPError_KEY_LONG = kPGPError_KEY_MIN,
- kPGPError_KeyPacketTruncated = -11349,
- kPGPError_UnknownKeyVersion = -11348,
- kPGPError_UnknownPublicKeyAlgorithm = -11347,
- kPGPError_MalformedKeyModulus = -11346,
- kPGPError_MalformedKeyExponent = -11345,
- kPGPError_RSAPublicModulusIsEven = -11344,
- kPGPError_RSAPublicExponentIsEven = -11343,
- kPGPError_MalformedKeyComponent = -11342,
- kPGPError_KeyTooLarge = -11341,
- kPGPError_PublicKeyTooSmall = -11340,
- kPGPError_PublicKeyTooLarge = -11339,
- kPGPError_PublicKeyUnimplemented = -11338,
- kPGPError_CRLPacketTruncated = -11337,
- kPGPError_CorruptPrivateKey = -11336,
- kPGPError_UnknownPaddingType = -11335,
-kPGPError_KEY_MAX = kPGPError_CorruptPrivateKey,
-
-
-/* kPGPError_SIG_MAX */
- kPGPError_SIG_LONG = -11330,
- kPGPError_TruncatedSignature = -11329,
- kPGPError_MalformedSignatureInteger = -11328,
- kPGPError_UnknownSignatureAlgorithm = -11327,
- kPGPError_ExtraSignatureMaterial = -11326,
- kPGPError_UnknownSignatureVersion = -11325,
- kPGPError_RevocationKeyNotFound = -11324,
-/* kPGPError_SIG_MIN */
-
-/* kPGPError_KEYDB_MAX */
- kPGPError_OutOfEntropy = -11320,
- kPGPError_ItemIsReadOnly = -11319,
- kPGPError_InvalidProperty = -11318,
- kPGPError_FileCorrupt = -11317,
- kPGPError_DuplicateCert = -11316,
- kPGPError_DuplicateUserID = -11315,
- kPGPError_CertifyingKeyDead = -11314,
- kPGPError_ItemWasDeleted = -11313,
- kPGPError_KeyDBMismatch = -11312,
-/* kPGPError_KEYDB_MIN = kPGPError_KeyDBMismatch */
-
-/* kPGPError_SERVER_MAX */
- kPGPError_ServerInProgress = -11300,
- kPGPError_ServerOperationNotSupported = -11299,
- kPGPError_ServerInvalidProtocol = -11298,
- kPGPError_ServerRequestFailed = -11297,
- kPGPError_ServerOpen = -11296,
- kPGPError_ServerNotOpen = -11295,
- kPGPError_ServerKeyAlreadyExists = -11294,
- kPGPError_ServerNotInitialized = -11293,
- kPGPError_ServerPartialAddFailure = -11292,
- kPGPError_ServerCorruptKeyBlock = -11291,
- kPGPError_ServerUnknownResponse = -11290,
- kPGPError_ServerTimedOut = -11289,
- kPGPError_ServerOpenFailed = -11288,
- kPGPError_ServerAuthorizationRequired = -11287,
- kPGPError_ServerAuthorizationFailed = -11286,
- kPGPError_ServerSearchFailed = -11285,
- kPGPError_ServerPartialSearchResults = -11284,
- kPGPError_ServerBadKeysInSearchResults = -11283,
- kPGPError_ServerKeyFailedPolicy = -11282,
- kPGPError_ServerOperationRequiresTLS = -11281,
- kPGPError_ServerNoStaticStorage = -11280,
- kPGPError_ServerCertNotFound = -11279,
-
-/* TLS errors */
- kPGPError_TLSUnexpectedClose = -11250,
- kPGPError_TLSProtocolViolation = -11249,
- kPGPError_TLSVersionUnsupported = -11248,
- kPGPError_TLSWrongState = -11247,
- kPGPError_TLSAlertReceived = -11246,
- kPGPError_TLSKeyUnusable = -11245,
- kPGPError_TLSNoCommonCipher = -11244,
- kPGPError_TLSWouldBlock = -11243,
- kPGPError_TLSRcvdHandshakeRequest = -11242,
-
-/* X509 certificate errors */
- kPGPError_X509NeededCertNotAvailable = -11240,
- kPGPError_X509SelfSignedCert = -11239,
- kPGPError_X509InvalidCertificateSignature = -11238,
- kPGPError_X509InvalidCertificateFormat = -11237,
- kPGPError_X509InvalidCertificateTree = -11236,
-
-/* Key Splitting errors */
- kPGPError_SplitNotEnoughSharesInObject = -11230,
- kPGPError_SplitDifferentSplitKeys = -11229,
- kPGPError_SplitDifferentSharePool = -11228,
- kPGPError_SplitIdenticalShares = -11227,
- kPGPError_SKEPRejectedAuthentication = -11226,
- kPGPError_SKEPIncorrectVersion = -11225,
-
-/* SECSH errors */
- kPGPError_SECSHUnexpectedClose = -11220,
- kPGPError_SECSHProtocolViolation = -11219,
- kPGPError_SECSHVersionUnsupported = -11218,
- kPGPError_SECSHWrongState = -11217,
- kPGPError_SECSHAlertReceived = -11216,
- kPGPError_SECSHKeyUnusable = -11215,
- kPGPError_SECSHNoCommonCipher = -11214,
- kPGPError_SECSHWouldBlock = -11213,
- kPGPError_SECSHRcvdHandshakeRequest = -11212,
-
- kPGPError_BigNumNoInverse = -11150,
-
-/* PGPSockets errors */
- kPGPError_SocketsNetworkDown = -11100,
- kPGPError_SocketsNotInitialized = -11099,
- kPGPError_SocketsInProgress = -11098,
- kPGPError_SocketsNotConnected = -11097,
- kPGPError_SocketsNotBound = -11096,
- kPGPError_SocketsOperationNotSupported = -11095,
- kPGPError_SocketsProtocolNotSupported = -11094,
- kPGPError_SocketsAddressFamilyNotSupported = -11093,
- kPGPError_SocketsNotASocket = -11092,
- kPGPError_SocketsAddressInUse = -11091,
- kPGPError_SocketsBufferOverflow = -11090,
- kPGPError_SocketsListenQueueFull = -11089,
- kPGPError_SocketsAddressNotAvailable = -11088,
- kPGPError_SocketsAlreadyConnected = -11087,
- kPGPError_SocketsTimedOut = -11086,
- kPGPError_SocketsNoStaticStorage = -11085,
-
- kPGPError_SocketsHostNotFound = -11050,
- kPGPError_SocketsDomainServerError = -11049,
-
-/* Errors from X.509 layer */
- kPGPError_X509AttributeNotSupported = -10999,
- kPGPError_InvalidPKCS7Encoding = -10998,
- kPGPError_CMSInitialization = -10997,
- kPGPError_InvalidDistinguishedName = -10996,
- kPGPError_CertRequestCreationFailure = -10995,
- kPGPError_MissingX509Certificate = -10994,
- kPGPError_PKCS7SignFailure = -10993,
- kPGPError_ASNPackFailure = -10992,
- kPGPError_InvalidInputFormat = -10991,
- kPGPError_InvalidOutputFormat = -10990,
- kPGPError_InvalidCertificateExtension = -10989,
- kPGPError_PublicKeyNotFound = -10988,
-
- kPGPError_CRSMissingRequiredAttribute = -10979,
- kPGPError_CRSInvalidCharacter = -10978,
- kPGPError_CRSInvalidAttributeType = -10977,
- kPGPError_CRSInvalidCertType = -10976,
- kPGPError_CRSInvalidAttributeValueLength = -10975,
- kPGPError_CRSInvalidAuthenticateValue = -10974,
-
- kPGPError_X509CertificateParseError = -10973,
- kPGPError_PKCS7EncryptFailure = -10972,
- kPGPError_PKCS7DecryptFailure = -10971,
-
- kPGPError_InvalidCertificateFormat = -11970,
-
-/* LDAP Errors */
-kPGPError_LDAPMIN = -10950,
- kPGPError_LDAPOperationsError = kPGPError_LDAPMIN,
- kPGPError_LDAPProtocolError = -10949,
- kPGPError_LDAPTimelimitExceeded = -10948,
- kPGPError_LDAPSizelimitExceeded = -10947,
- kPGPError_LDAPStrongAuthNotSupported = -10946,
- kPGPError_LDAPStrongAuthRequired = -10945,
- kPGPError_LDAPPartialResults = -10944,
- kPGPError_LDAPNoSuchAttribute = -10943,
- kPGPError_LDAPUndefinedType = -10942,
- kPGPError_LDAPInappropriateMatching = -10941,
- kPGPError_LDAPConstraintViolation = -10940,
- kPGPError_LDAPTypeOrValueExists = -10939,
- kPGPError_LDAPInvalidSyntax = -10938,
- kPGPError_LDAPNoSuchObject = -10937,
- kPGPError_LDAPAliasProblem = -10936,
- kPGPError_LDAPInvalidDNSyntax = -10935,
- kPGPError_LDAPIsLeaf = -10934,
- kPGPError_LDAPAliasDerefProblem = -10933,
- kPGPError_LDAPInappropriateAuth = -10932,
- kPGPError_LDAPInvalidCredentials = -10931,
- kPGPError_LDAPInsufficientAccess = -10930,
- kPGPError_LDAPBusy = -10929,
- kPGPError_LDAPUnavailable = -10928,
- kPGPError_LDAPUnwillingToPerform = -10927,
- kPGPError_LDAPLoopDetect = -10926,
- kPGPError_LDAPNamingViolation = -10925,
- kPGPError_LDAPObjectClassViolation = -10924,
- kPGPError_LDAPNotAllowedOnNonleaf = -10923,
- kPGPError_LDAPNotAllowedOnRDN = -10922,
- kPGPError_LDAPAlreadyExists = -10921,
- kPGPError_LDAPNoObjectClassMods = -10920,
- kPGPError_LDAPResultsTooLarge = -10919,
- kPGPError_LDAPOther = -10918,
- kPGPError_LDAPServerDown = -10917,
- kPGPError_LDAPLocalError = -10916,
- kPGPError_LDAPEncodingError = -10915,
- kPGPError_LDAPDecodingError = -10914,
- kPGPError_LDAPTimeout = -10913,
- kPGPError_LDAPAuthUnknown = -10912,
- kPGPError_LDAPFilterError = -10911,
- kPGPError_LDAPUserCancelled = -10910,
- kPGPError_LDAPParamError = -10909,
- kPGPError_LDAPConnectError = -10908,
- /* Reserve errors -10907 through -10881 for future LDAP versions */
- kPGPError_LDAPNotLDAPURL = -10880,
- kPGPError_LDAPNoDN = -10879,
- kPGPError_LDAPBadScope = -10878,
-kPGPError_LDAPMAX = kPGPError_LDAPBadScope,
-
- /* Smart Card Errors */
- kPGPError_SmartCardError = -10850,
- kPGPError_SmartCardOutOfMemory = -10849,
- kPGPError_SmartCardKeyNotFound = -10848,
- kPGPError_SmartCardX509Exists = -10847,
- kPGPError_SmartCardKeyExists = -10846,
- kPGPError_SmartCardPinLocked = -10845,
- kPGPError_SmartCardNotFound = -10844,
-
- kPGPError_DummyEnumValue
- /* kPGPError_Last */
-} ;
-
-
-PGP_BEGIN_C_DECLARATIONS
-
-#undef PGPGetErrorString
-PGPError PGPGetErrorString( PGPError theError,
- PGPSize bufferSize, PGPChar8 * theString );
-
-PGP_END_C_DECLARATIONS
-
-
-#endif /* ] Included_pgpErrors_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpFeatures.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpFeatures.h
deleted file mode 100644
index ad628a283b..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpFeatures.h
+++ /dev/null
@@ -1,143 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- Determine which features are present in the PGPsdk. This is the only
- way to correctly determine which features are present. The version
- number may be the same for different builds that lack some features.
-
- $Id: pgpFeatures.h,v 1.13 2004/03/15 19:18:55 vinnie Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpFeatures_h /* [ */
-#define Included_pgpFeatures_h
-
-#include "pgpPubTypes.h"
-
-#if PGP_MACINTOSH
-#pragma options align=mac68k /* [ */
-#endif
-
-/*____________________________________________________________________________
- Each selector designates a PGPFlags word, which can be obtained via
- PGPGetFeatureFlags(). The flags can be tested using the
- supplied masks. We can add more selectors as needed. The masks
- are not intended to be restricted to a single bit.
- Flags should not be used for attributes that have unknown length.
-
- A kPGPError_ItemNotFound will be returned if the caller specifies
- a selector which is not recognized by the PGPsdk. This could
- occur if an app links to an older version of the SDK.
-____________________________________________________________________________*/
-
-/* selectors which are passed to PGPGetFeatureFlags */
-enum PGPFeatureSelector_
-{
- kPGPFeatures_GeneralSelector = 1,
- kPGPFeatures_ImplementationSelector = 2,
-
- PGP_ENUM_FORCE( PGPFeatureSelector_ )
-};
-PGPENUM_TYPEDEF( PGPFeatureSelector_, PGPFeatureSelector );
-
-
-/* flags for kPGPFeatures_GeneralSelector */
-enum
-{
- kPGPFeatureMask_CanEncrypt = (1UL << 0),
- kPGPFeatureMask_CanDecrypt = (1UL << 1),
- kPGPFeatureMask_CanSign = (1UL << 2),
- kPGPFeatureMask_CanVerify = (1UL << 3),
- kPGPFeatureMask_CanGenerateKey = (1UL << 4),
- kPGPFeatureMask_RngHardware = (1UL << 5),
- kPGPFeatureMask_FIPSmode = (1UL << 6)
-};
-
-/* flags for kPGPFeatures_ImplementationSelector */
-enum
-{
- kPGPFeatureMask_IsDebugBuild = (1UL << 0),
- kPGPFeatureMask_HasTimeout = (1UL << 0)
-};
-
-#define kPGPAlgorithmInfoFlags_FIPS (PGPFlags)(1UL << 1 )
-
-typedef struct PGPAlgorithmInfo
-{
- PGPChar8 shortName[ 32 ];
- PGPChar8 longName[ 96 ];
- PGPChar8 copyright[ 128 ];
- PGPFlags flags;
- PGPUInt32 reserved[ 16 ]; /* reserved; 0 for now */
-
-} PGPAlgorithmInfo;
-
-typedef struct PGPPublicKeyAlgorithmInfo
-{
- PGPAlgorithmInfo info;
-
- PGPPublicKeyAlgorithm algID;
-
- PGPBoolean canEncrypt;
- PGPBoolean canDecrypt;
- PGPBoolean canSign;
- PGPBoolean canVerify;
- PGPBoolean canGenerateKey;
- PGPBoolean reserved1;
- PGPBoolean reserved2;
- PGPBoolean reserved3;
-
- PGPUInt32 reserved[ 8 ];
-
-} PGPPublicKeyAlgorithmInfo;
-
-typedef struct PGPSymmetricCipherInfo
-{
- PGPAlgorithmInfo info;
- PGPCipherAlgorithm algID;
-
- PGPUInt32 reserved[ 8 ];
-
-} PGPSymmetricCipherInfo;
-
-#if PGP_MACINTOSH
-#pragma options align=reset /* ] */
-#endif
-
-PGP_BEGIN_C_DECLARATIONS
-
-/* return a flags word for the feature selector */
-PGPError PGPGetFeatureFlags( PGPFeatureSelector selector,
- PGPFlags *flags );
-
-/* use this to test whether a feature exists after getting flags */
-#define PGPFeatureExists( flags, maskValue ) ( ( (flags) & (maskValue) ) != 0 )
-
-
-/*____________________________________________________________________________
- Routines to determine which algorithms are present.
-
- To determine if a specific algorithm is available, you will need to
- index through the available algorithms and check the algorithm ID.
-____________________________________________________________________________*/
-
-PGPError PGPCountPublicKeyAlgorithms( PGPUInt32 *numPKAlgs );
-PGPError PGPGetIndexedPublicKeyAlgorithmInfo( PGPUInt32 theIndex,
- PGPPublicKeyAlgorithmInfo *info);
-
-PGPError PGPCountSymmetricCiphers( PGPUInt32 *numPKAlgs );
-PGPError PGPGetIndexedSymmetricCipherInfo( PGPUInt32 theIndex,
- PGPSymmetricCipherInfo *info);
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpFeatures_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpGroups.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpGroups.h
deleted file mode 100644
index 2f6ebd07af..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpGroups.h
+++ /dev/null
@@ -1,315 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpGroups.h,v 1.12 2003/08/08 04:40:39 ajivsov Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpGroups_h /* [ */
-#define Included_pgpGroups_h
-
-/*____________________________________________________________________________
- Note: All functions in this file have been deprecated and will be
- replaced in the future with equivalent functionality.
-____________________________________________________________________________*/
-
-#include "pgpPubTypes.h"
-#include "pgpEncode.h"
-
-#if PGP_DEPRECATED /* [ */
-
-#if PGP_MACINTOSH
-#include <Files.h>
-#endif
-
-#if PGP_MACINTOSH
-#pragma options align=mac68k
-#endif
-
-#define kPGPMaxGroupNameLength 63
-#define kPGPMaxGroupDescriptionLength 63
-
-typedef PGPChar8 PGPGroupName[ kPGPMaxGroupNameLength + 1 ];
-typedef PGPChar8 PGPGroupDescription[ kPGPMaxGroupDescriptionLength + 1 ];
-
-
-typedef struct PGPGroupSet * PGPGroupSetRef;
-typedef struct PGPGroupIter * PGPGroupItemIterRef;
-
-#define kInvalidPGPGroupSetRef ((PGPGroupSetRef) NULL)
-#define kInvalidPGPGroupItemIterRef ((PGPGroupItemIterRef) NULL)
-
-#define PGPGroupSetRefIsValid(ref) ((ref) != kInvalidPGPGroupSetRef)
-#define PGPGroupItemIterRefIsValid(ref) ((ref) != kInvalidPGPGroupItemIterRef)
-
-/* any type will do that is distinct */
-typedef PGPUInt32 PGPGroupID;
-#define kPGPInvalidGroupID ( (PGPGroupID)0 )
-
-enum PGPGroupItemType_
-{
- kPGPGroupItem_KeyID = 1,
- kPGPGroupItem_Group,
-
- PGP_ENUM_FORCE( PGPGroupItemType_)
-};
-PGPENUM_TYPEDEF( PGPGroupItemType_, PGPGroupItemType );
-
-/*____________________________________________________________________________
- A run-time group item, used when iterating through a group.
- For client use; not necessarily the internal storage format.
-
- 'userValue' is *not* saved to disk.
-____________________________________________________________________________*/
-
-typedef struct PGPGroupItem
-{
- PGPGroupItemType type;
- PGPUserValue userValue;
-
- union
- {
- PGPGroupID groupID;
- PGPKeyID keyID;
- } u;
-} PGPGroupItem;
-
-
-typedef PGPInt32 (*PGPGroupItemCompareProc)( PGPGroupItem *,
- PGPGroupItem *, PGPUserValue userValue );
-
-/*____________________________________________________________________________
- Info obtained via PGPGetGroupInfo.
-____________________________________________________________________________*/
-
-typedef struct PGPGroupInfo
-{
- PGPGroupID id;
- PGPGroupName name;
- PGPGroupName description;
- PGPUserValue userValue;
-
-} PGPGroupInfo;
-
-
-typedef PGPFlags PGPGroupItemIterFlags;
-/* flag (1UL << 0 ) is reserved */
-#define kPGPGroupIterFlags_Recursive (PGPFlags)(1UL << 1 )
-#define kPGPGroupIterFlags_Keys (PGPFlags)(1UL << 2 )
-#define kPGPGroupIterFlags_Groups (PGPFlags)(1UL << 3 )
-
-#define kPGPGroupIterFlags_AllKeysRecursive \
- ( kPGPGroupIterFlags_Recursive | kPGPGroupIterFlags_Keys )
-
-#define kPGPGroupIterFlags_AllGroupsRecursive \
- ( kPGPGroupIterFlags_Recursive | kPGPGroupIterFlags_Groups )
-
-#define kPGPGroupIterFlags_AllItems \
- ( kPGPGroupIterFlags_Keys | kPGPGroupIterFlags_Groups )
-
-#define kPGPGroupIterFlags_AllRecursive \
- ( kPGPGroupIterFlags_Recursive | kPGPGroupIterFlags_AllItems )
-
-
-
-#if PGP_MACINTOSH
-#pragma options align=reset
-#endif
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- Manipulating pgp group sets (PGPGroupSetRef)
-____________________________________________________________________________*/
-/* create a new, empty groups collection */
-PGPError PGPNewGroupSet( PGPContextRef context, PGPGroupSetRef *outRef );
-
-/* file is *not* left open; all data is loaded into memory */
-PGPError PGPNewGroupSetFromFile( PGPContextRef context,
- PGPFileSpecRef file,
- PGPGroupSetRef *outRef );
-
-#if PGP_MACINTOSH || PGP_OSX
-PGPError PGPNewGroupSetFromFSSpec( PGPContextRef context,
- const struct FSSpec *spec, PGPGroupSetRef *outRef );
-#endif
-
-/* overwrites existing. Don't bother unless PGPGroupSetNeedsCommit() */
-PGPError PGPSaveGroupSetToFile( PGPGroupSetRef set, PGPFileSpecRef file );
-
-/* free all data structures; be sure to save first if you want */
-PGPError PGPFreeGroupSet( PGPGroupSetRef set );
-
-
-/* has the group changed? */
-PGPBoolean PGPGroupSetNeedsCommit( PGPGroupSetRef set );
-
-PGPContextRef PGPGetGroupSetContext( PGPGroupSetRef set );
-
-/* export the groupset to a buffer. Use PGPFreeData to free the buffer */
-PGPError PGPExportGroupSetToBuffer( PGPGroupSetRef set, void **buffer,
- PGPSize *bufferSize );
-
-/* import a groupset from a buffer */
-PGPError PGPImportGroupSetFromBuffer(PGPContextRef context, void *buffer,
- PGPSize bufSize, PGPGroupSetRef *outSet );
-
-/*____________________________________________________________________________
- Manipulating groups
-
- Groups are always referred to by IDs which remain valid until the set
- is disposed.
-____________________________________________________________________________*/
-
-/* initial parent ID is kPGPInvalidGroupID */
-PGPError PGPNewGroup( PGPGroupSetRef set,
- const PGPChar8 * name, const PGPChar8 *description,
- PGPGroupID *id );
-
-PGPError PGPCountGroupsInSet( PGPGroupSetRef set,
- PGPUInt32 *numGroups);
-PGPError PGPGetIndGroupID( PGPGroupSetRef set,
- PGPUInt32 groupIndex, PGPGroupID *id );
-
-/* delete this group from the set */
-/* All references to it are removed in all sets */
-PGPError PGPDeleteGroup( PGPGroupSetRef set, PGPGroupID id );
-
-/* delete the indexed item from the group */
-/* the item may be a group or a key */
-PGPError PGPDeleteIndItemFromGroup( PGPGroupSetRef set,
- PGPGroupID id, PGPUInt32 item );
-
-/* same as PGPDeleteIndItemFromGroup, but accepts an item */
-PGPError PGPDeleteItemFromGroup( PGPGroupSetRef set,
- PGPGroupID id, PGPGroupItem const *item );
-
-
-PGPError PGPGetGroupInfo( PGPGroupSetRef set,
- PGPGroupID id, PGPGroupInfo *info );
-
-PGPError PGPSetGroupName( PGPGroupSetRef set,
- PGPGroupID id, const PGPChar8 * name );
-PGPError PGPSetGroupUserValue( PGPGroupSetRef set,
- PGPGroupID id, PGPUserValue userValue );
-PGPError PGPSetGroupDescription( PGPGroupSetRef set,
- PGPGroupID id, const PGPChar8 * name );
-
-/* 'item' specifies a group or a key id */
-/* you must fill the item in completely */
-PGPError PGPAddItemToGroup( PGPGroupSetRef set,
- PGPGroupItem const *item, PGPGroupID group );
-
-
-PGPError PGPMergeGroupIntoDifferentSet( PGPGroupSetRef fromSet,
- PGPGroupID fromID, PGPGroupSetRef toSet );
-
-PGPError PGPMergeGroupSets( PGPGroupSetRef fromSet,
- PGPGroupSetRef intoSet );
-
-PGPError PGPCopyGroupSet(PGPGroupSetRef sourceSet,
- PGPGroupSetRef *destSet);
-
-/*____________________________________________________________________________
- Manipulating group items
-____________________________________________________________________________*/
-
-/* count how many items there are in a group */
-/* totalItems includes keys and groups */
-PGPError PGPCountGroupItems( PGPGroupSetRef set,
- PGPGroupID id, PGPBoolean recursive,
- PGPUInt32 * numKeys,
- PGPUInt32 * totalItems );
-
-/* non-recursive call; index only applies to group itself */
-PGPError PGPGetIndGroupItem( PGPGroupSetRef set,
- PGPGroupID id, PGPUInt32 groupIndex, PGPGroupItem * item );
-
-/* use PGPGetIndGroupItem() if you want to get the user value */
-PGPError PGPSetIndGroupItemUserValue( PGPGroupSetRef set,
- PGPGroupID id, PGPUInt32 groupIndex, PGPUserValue userValue );
-
-PGPError PGPSortGroupItems( PGPGroupSetRef set, PGPGroupID id,
- PGPGroupItemCompareProc, PGPUserValue userValue );
-
-PGPError PGPSortGroupSet( PGPGroupSetRef set,
- PGPGroupItemCompareProc, PGPUserValue userValue );
-
-/*____________________________________________________________________________
- PGPGroupItemIterRef--iterator through group items.
-
- Special note: this is not a full-fledged iterator. You may *not* add
- or delete items while iterating and you may only move forward. However,
- you may change the values of items.
-____________________________________________________________________________*/
-
-PGPError PGPNewGroupItemIter( PGPGroupSetRef set, PGPGroupID id,
- PGPGroupItemIterFlags flags, PGPGroupItemIterRef *iter );
-
-PGPError PGPFreeGroupItemIter( PGPGroupItemIterRef iter );
-
-/* returns kPGPError_EndOfIteration when done */
-PGPError PGPGroupItemIterNext( PGPGroupItemIterRef iter,
- PGPGroupItem * item );
-
-/*____________________________________________________________________________
- Group utilities
-____________________________________________________________________________*/
-
-/*____________________________________________________________________________
- Return the lowest validity of any item in the group
- keyset should contain all keys available
- It is not an error if keys can't be found; you may want to check
- the not found count.
-
- The lowest validity is kPGPValidity_Invalid and kPGPValidity_Unknown
- is never returned.
-____________________________________________________________________________*/
-PGPError PGPGetGroupLowestValidity( PGPGroupSetRef set, PGPGroupID id,
- PGPKeyDBRef keyDB, PGPValidity * lowestValidity,
- PGPUInt32 * numKeysNotFound);
-
-/*____________________________________________________________________________
- All all the keys in the group (and its subgroups) to the keyset
-____________________________________________________________________________*/
-PGPError PGPNewKeySetFromGroup( PGPGroupSetRef set, PGPGroupID id,
- PGPKeyDBRef keyDB, PGPKeySetRef * resultSet,
- PGPUInt32 * numKeysNotFound);
-
-/*____________________________________________________________________________
- Create a simple, flattened group of unique key IDs from the source group.
- Note that sourceSet and destSet must be different.
-____________________________________________________________________________*/
-PGPError PGPNewFlattenedGroupFromGroup(PGPGroupSetRef sourceSet,
- PGPGroupID sourceID, PGPGroupSetRef destSet,
- PGPGroupID *destID);
-
-/*____________________________________________________________________________
- Perform a "standard" sort on a group
-____________________________________________________________________________*/
-PGPError PGPSortGroupSetStd( PGPGroupSetRef set, PGPKeyDBRef keydb );
-
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] PGP_DEPRECATED */
-
-#endif /* ] Included_pgpGroups_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
-
-
-
-
-
-
-
-
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpHMAC.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpHMAC.h
deleted file mode 100644
index 3dc58a6ff9..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpHMAC.h
+++ /dev/null
@@ -1,67 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpHMAC.h,v 1.6 2002/08/06 20:11:16 dallen Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpHMAC_h /* [ */
-#define Included_pgpHMAC_h
-
-#include "pgpPubTypes.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- Create a new HMAC of the specified algorithm.
-
- If the algorithm is not available then kPGPError_AlgorithmNotAvailable is
- returned.
-____________________________________________________________________________*/
-
-PGPError PGPNewHMACContext( PGPContextRef context,
- PGPHashAlgorithm algorithm, PGPByte *secret,
- PGPSize secretLen, PGPHMACContextRef *outRef );
-
-/*____________________________________________________________________________
- Any existing intermediate HMAC is lost.
-____________________________________________________________________________*/
-
-PGPError PGPFreeHMACContext( PGPHMACContextRef ref );
-
-/*____________________________________________________________________________
- Reset an HMAC as if it had been created anew. Any existing intermediate
- hash is lost.
-____________________________________________________________________________*/
-
-PGPError PGPResetHMAC( PGPHMACContextRef ref );
-
-/*____________________________________________________________________________
- Continue the HMAC, accumulating an intermediate result
-____________________________________________________________________________*/
-
-PGPError PGPContinueHMAC( PGPHMACContextRef ref, const void *in,
- PGPSize numBytes );
-
-/*____________________________________________________________________________
- Finalize the HMAC, depositing the result into 'hmacOut'.
-
- This size of the output will be the same size as the hash
- algorithm output.
-____________________________________________________________________________*/
-
-PGPError PGPFinalizeHMAC( PGPHMACContextRef ref, void *hmacOut );
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpHMAC_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpHash.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpHash.h
deleted file mode 100644
index 44225347ee..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpHash.h
+++ /dev/null
@@ -1,86 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpHash.h,v 1.6 2002/08/06 20:11:16 dallen Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpHashing_h /* [ */
-#define Included_pgpHashing_h
-
-#include "pgpPubTypes.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- Create a new hash of the specified algorithm.
-
- If the algorithm is not available then kPGPError_AlgorithmNotAvailable is
- returned.
-____________________________________________________________________________*/
-
-PGPError PGPNewHashContext( PGPContextRef context,
- PGPHashAlgorithm algorithm,
- PGPHashContextRef * outRef );
-
-/*____________________________________________________________________________
- Any existing intermediate hash is lost.
-____________________________________________________________________________*/
-
-PGPError PGPFreeHashContext( PGPHashContextRef ref );
-
-/*____________________________________________________________________________
- An exact duplicate of the hash is made.
-____________________________________________________________________________*/
-
-PGPError PGPCopyHashContext( PGPHashContextRef ref,
- PGPHashContextRef * outRef);
-
-/*____________________________________________________________________________
- Reset a hash as if it had been created anew. Any existing intermediate
- hash is lost.
-____________________________________________________________________________*/
-
-PGPError PGPResetHash( PGPHashContextRef ref );
-
-/*____________________________________________________________________________
- Continue the hash, accumulating an intermediate result
-____________________________________________________________________________*/
-
-PGPError PGPContinueHash( PGPHashContextRef ref, const void *in,
- PGPSize numBytes );
-
-/*____________________________________________________________________________
- Finalize the hash, depositing the result into 'hashOut'.
-
- After calling this routine, the hash is reset via PGPResetHash().
- If you want an intermediate result, use PGPCopyHash() and finalize the
- copy.
-____________________________________________________________________________*/
-
-PGPError PGPFinalizeHash( PGPHashContextRef ref, void *hashOut );
-
-/*____________________________________________________________________________
- Determine size of resulting hash in bytes e.g. a 160 bit hash yields 20.
- Used for generic code which may not know how big a hash is being produced.
-
- Question: can we reasonably assume 8 bits per byte? If not, how does
- PGPFinalizeHash return its result?
-____________________________________________________________________________*/
-
-PGPError PGPGetHashSize( PGPHashContextRef ref, PGPSize *hashSize );
-
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpHashing_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpHashWords.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpHashWords.h
deleted file mode 100644
index 4c3c82cb8b..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpHashWords.h
+++ /dev/null
@@ -1,40 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpHashWords.h,v 1.2 2004/01/03 02:25:31 bgaiser Exp $
-____________________________________________________________________________*/
-#ifndef HASHWORDLIST_H
-#define HASHWORDLIST_H
-
-#include "pgpBase.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- Hash word list types
-____________________________________________________________________________*/
-enum PGPHashWordList_
-{
- kPGPHashWordList_Even = 0,
- kPGPHashWordList_Odd = 1,
-
- PGP_ENUM_FORCE( PGPHashWordList_ )
-};
-PGPENUM_TYPEDEF( PGPHashWordList_, PGPHashWordList );
-
-/*____________________________________________________________________________
- Hash word functions
-____________________________________________________________________________*/
-
- PGPError
-PGPGetHashWordString(
- PGPUInt32 index,
- PGPHashWordList list,
- PGPChar8 hashWordString[ 12 ]);
-
-
-PGP_END_C_DECLARATIONS
-
-#endif
-
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpIKE.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpIKE.h
deleted file mode 100644
index 23a28c8bc2..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpIKE.h
+++ /dev/null
@@ -1,784 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpIKE.h,v 1.39 2003/09/24 03:09:32 ajivsov Exp $
-____________________________________________________________________________*/
-#ifndef Included_PGPike_h /* [ */
-#define Included_PGPike_h
-
-#include "pgpPubTypes.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-#if PGP_WIN32
-# pragma pack(push, 8)
-#endif
-
-#ifdef _MSC_VER
-#pragma warning (disable:4200)
-#endif
-
-typedef struct PGPikeContext * PGPikeContextRef;
-
-#define kInvalidPGPikeContextRef ((PGPikeContextRef) NULL)
-#define PGPikeContextRefIsValid( ref ) ( (ref) != kInvalidPGPikeContextRef )
-
-#define kPGPike_CommonPort 500
-#define kPGPike_AuthMaximumKeySize (512/8)
-#define kPGPike_ESPMaximumKeySize 32 /* 256 bits */
-#define kPGPike_MaxExplicitIVSize 16
-#define kPGPike_MaxTransforms 3
-#define kPGPike_DefaultKBLife 1048576 /* 1GB */
-#define kPGPike_DefaultSecLife 86400 /* 1 Day */
-#define kPGPike_UserDataSize 96
-#define kPGPike_XAuthStringLen 128
-#define kPGPike_XAuthMessageLen 256
-
-typedef PGPByte PGPipsecSPI[4];
-
-enum PGPikeDOI_
-{
- kPGPike_DOI_IKE = 0,
- kPGPike_DOI_IPSEC = 1,
-
- PGP_ENUM_FORCE( PGPikeDOI_ )
-};
-PGPENUM_TYPEDEF( PGPikeDOI_, PGPikeDOI );
-
-enum PGPikeAlert_
-{
- kPGPike_AL_None = 0,
-
- /* Error Types */
- kPGPike_AL_InvalidPayload = 1,
- kPGPike_AL_DOIUnsupported = 2,
- kPGPike_AL_SituationUnsupported = 3,
- kPGPike_AL_InvalidCookie = 4,
- kPGPike_AL_InvalidMajorVersion = 5,
- kPGPike_AL_InvalidMinorVersion = 6,
- kPGPike_AL_InvalidExchange = 7,
- kPGPike_AL_InvalidFlags = 8,
- kPGPike_AL_InvalidMessageID = 9,
- kPGPike_AL_InvalidProtocolID = 10,
- kPGPike_AL_InvalidSPI = 11,
- kPGPike_AL_InvalidTransform = 12,
- kPGPike_AL_InvalidAttribute = 13,
- kPGPike_AL_NoProposalChoice = 14,
- kPGPike_AL_BadProposal = 15,
- kPGPike_AL_PayloadMalformed = 16,
- kPGPike_AL_InvalidKey = 17,
- kPGPike_AL_InvalidID = 18,
- kPGPike_AL_InvalidCertEncoding = 19,
- kPGPike_AL_InvalidCert = 20,
- kPGPike_AL_UnsupportedCert = 21,
- kPGPike_AL_InvalidCertAuthority = 22,
- kPGPike_AL_InvalidHash = 23,
- kPGPike_AL_AuthenticationFailed = 24,
- kPGPike_AL_InvalidSignature = 25,
- kPGPike_AL_AddressNotification = 26,
- kPGPike_AL_NotifySALifetime = 27,
- kPGPike_AL_CertUnavailable = 28,
- kPGPike_AL_UnsupportedExchange = 29,
- kPGPike_AL_UnequalPayloadLengths = 30,
-
- kPGPike_AL_NATTranslationFailure = 16300,
- kPGPike_AL_LastErrorType = 16301,
-
- /* Status Types */
- kPGPike_AL_Connected = 16384,
- kPGPike_AL_ResponderLifetime = 24576, /* IPSEC DOI */
- kPGPike_AL_ReplayStatus = 24577, /* IPSEC DOI */
- kPGPike_AL_InitialContact = 24578, /* IPSEC DOI */
-
- PGP_ENUM_FORCE( PGPikeAlert_ )
-};
-PGPENUM_TYPEDEF( PGPikeAlert_, PGPikeAlert );
-
-enum PGPikeInternalAlert_
-{
- kPGPike_IA_None = 0,
-
- kPGPike_IA_ResponseTimeout = 1,
- kPGPike_IA_NoProposals = 2,
- kPGPike_IA_NewPhase1SA = 3,
- kPGPike_IA_NewPhase2SA = 4,
- kPGPike_IA_DeadPhase1SA = 5,
- kPGPike_IA_DeadPhase2SA = 6,
- kPGPike_IA_TooManyExchanges = 7,
- kPGPike_IA_XAuthSuccess = 8,
- kPGPike_IA_XAuthFailed = 9,
-
- PGP_ENUM_FORCE( PGPikeInternalAlert_ )
-};
-PGPENUM_TYPEDEF( PGPikeInternalAlert_, PGPikeInternalAlert );
-
-enum PGPikePref_
-{
- kPGPike_PF_None = 0,
-
- kPGPike_PF_Expiration = 1,
- kPGPike_PF_AllowedAlgorithms = 2,
- kPGPike_PF_IKEProposals = 3,
- kPGPike_PF_IPSECProposals = 4,
-
- PGP_ENUM_FORCE( PGPikePref_ )
-};
-PGPENUM_TYPEDEF( PGPikePref_, PGPikePref );
-
-enum PGPipsecEncapsulation_
-{
- kPGPike_PM_None = 0,
-
- kPGPike_PM_Tunnel = 1,
- kPGPike_PM_Transport = 2,
- kPGPike_PM_UDPencapsulatedTunnel = 61443,
- kPGPike_PM_UDPencapsulatedTransport = 61444,
-
- PGP_ENUM_FORCE( PGPipsecEncapsulation_ )
-};
-PGPENUM_TYPEDEF( PGPipsecEncapsulation_, PGPipsecEncapsulation );
-
-enum PGPikeLifeType_
-{
- kPGPike_LT_None = 0,
-
- kPGPike_LT_Seconds = 1,
- kPGPike_LT_Kilobytes = 2,
-
- PGP_ENUM_FORCE( PGPikeLifeType_ )
-};
-PGPENUM_TYPEDEF( PGPikeLifeType_, PGPikeLifeType );
-
-enum PGPipsecIdentity_
-{
- kPGPike_ID_None = 0,
-
- kPGPike_ID_IPV4_Addr,
- kPGPike_ID_FQDN,
- kPGPike_ID_UserFQDN,
- kPGPike_ID_IPV4_Addr_Subnet,
- kPGPike_ID_IPV6_Addr,
- kPGPike_ID_IPV6_Addr_Subnet,
- kPGPike_ID_IPV4_Addr_Range,
- kPGPike_ID_IPV6_Addr_Range,
- kPGPike_ID_DER_ASN1_DN,
- kPGPike_ID_DER_ASN1_GN,
- kPGPike_ID_Key_ID, /* used for PGP fingerprint */
-
- PGP_ENUM_FORCE( PGPipsecIdentity_ )
-};
-PGPENUM_TYPEDEF( PGPipsecIdentity_, PGPipsecIdentity );
-
-/* If it doesn't say supported, it isn't. */
-enum PGPipsecAHTransformID_
-{
- kPGPike_AH_None = 0,
-
- kPGPike_AH_MD5 = 2, /* supported */
- kPGPike_AH_SHA = 3, /* supported */
- kPGPike_AH_DES = 4,
- kPGPike_AH_SHA2_256 = 5, /* supported */
- kPGPike_AH_SHA2_384 = 6, /* supported */
- kPGPike_AH_SHA2_512 = 7, /* supported */
-
- PGP_ENUM_FORCE( PGPipsecAHTransformID_ )
-};
-PGPENUM_TYPEDEF( PGPipsecAHTransformID_, PGPipsecAHTransformID );
-
-enum PGPipsecAuthAttribute_
-{
- kPGPike_AA_None = 0,
-
- kPGPike_AA_HMAC_MD5 = 1, /* supported */
- kPGPike_AA_HMAC_SHA = 2, /* supported */
- kPGPike_AA_DES_MAC = 3,
- kPGPike_AA_KPDK = 4,
- kPGPike_AA_HMAC_SHA2_256 = 5, /* supported */
- kPGPike_AA_HMAC_SHA2_384 = 6, /* supported */
- kPGPike_AA_HMAC_SHA2_512 = 7, /* supported */
-
- PGP_ENUM_FORCE( PGPipsecAuthAttribute_ )
-};
-PGPENUM_TYPEDEF( PGPipsecAuthAttribute_, PGPipsecAuthAttribute );
-
-enum PGPipsecESPTransformID_
-{
- kPGPike_ET_DES_IV64 = 1, /* supported */
- kPGPike_ET_DES = 2, /* supported */
- kPGPike_ET_3DES = 3, /* supported */
- kPGPike_ET_RC5 = 4,
- kPGPike_ET_IDEA = 5,
- kPGPike_ET_CAST = 6, /* supported */
- kPGPike_ET_Blowfish = 7,
- kPGPike_ET_3IDEA = 8,
- kPGPike_ET_DES_IV32 = 9,
- kPGPike_ET_RC4 = 10,
- kPGPike_ET_NULL = 11, /* supported */
- kPGPike_ET_AES = 12,
-
- PGP_ENUM_FORCE( PGPipsecESPTransformID_ )
-};
-PGPENUM_TYPEDEF( PGPipsecESPTransformID_, PGPipsecESPTransformID );
-
-/* IPCOMP is not supported by this version of PGPike */
-enum PGPipsecIPCOMPTransformID_
-{
- kPGPike_IC_None = 0,
-
- kPGPike_IC_OUI = 1,
- kPGPike_IC_Deflate = 2, /* supported */
- kPGPike_IC_LZS = 3, /* supported */
- kPGPike_IC_V42bis = 4,
-
- PGP_ENUM_FORCE( PGPipsecIPCOMPTransformID_ )
-};
-PGPENUM_TYPEDEF( PGPipsecIPCOMPTransformID_, PGPipsecIPCOMPTransformID );
-
-enum PGPipsecProtocol_
-{
- kPGPike_PR_None = 0,
- kPGPike_PR_IKE = 1,
- kPGPike_PR_AH = 2,
- kPGPike_PR_ESP = 3,
- kPGPike_PR_IPCOMP = 4,
-
- PGP_ENUM_FORCE( PGPipsecProtocol_ )
-};
-PGPENUM_TYPEDEF( PGPipsecProtocol_, PGPipsecProtocol );
-
-enum PGPikeGroupID_
-{
- kPGPike_GR_None = 0, /* supported */
-
- kPGPike_GR_MODPOne = 1, /* supported */
- kPGPike_GR_MODPTwo = 2, /* supported */
- kPGPike_GR_MODPFive = 5, /* supported */
-
- kPGPike_GR_ECSix = 6, /* supported */
- kPGPike_GR_ECSeven = 7, /* supported */
-
- kPGPike_GR_ECEight = 8, /* supported */
- kPGPike_GR_ECNine = 9, /* supported */
-
- kPGPike_GR_MODP2048 = 42048,/* unassigned */
- kPGPike_GR_MODP3072 = 43072,/* unassigned */
- kPGPike_GR_MODP4096 = 44096,/* unassigned */
- kPGPike_GR_MODP6144 = 46144,/* unassigned */
- kPGPike_GR_MODP8192 = 48192,/* unassigned */
-
- PGP_ENUM_FORCE( PGPikeGroupID_ )
-};
-PGPENUM_TYPEDEF( PGPikeGroupID_, PGPikeGroupID );
-
-enum PGPikeCipher_
-{
- kPGPike_SC_None = 0,
-
- kPGPike_SC_DES_CBC = 1, /* supported */
- kPGPike_SC_IDEA_CBC = 2,
- kPGPike_SC_Blowfish_CBC = 3,
- kPGPike_SC_RC5_R16_B64_CBC = 4,
- kPGPike_SC_3DES_CBC = 5, /* supported */
- kPGPike_SC_CAST_CBC = 6, /* supported */
- kPGPike_SC_AES_CBC = 7,
-
- PGP_ENUM_FORCE( PGPikeCipher_ )
-};
-PGPENUM_TYPEDEF( PGPikeCipher_, PGPikeCipher );
-
-enum PGPikeHash_
-{
- kPGPike_HA_None = 0,
-
- kPGPike_HA_MD5 = 1, /* supported */
- kPGPike_HA_SHA1 = 2, /* supported */
- kPGPike_HA_Tiger = 3,
- kPGPike_HA_SHA2_256 = 4,
- kPGPike_HA_SHA2_384 = 5,
- kPGPike_HA_SHA2_512 = 6,
-
- PGP_ENUM_FORCE( PGPikeHash_ )
-};
-PGPENUM_TYPEDEF( PGPikeHash_, PGPikeHash );
-
-enum PGPikeAuthMethod_
-{
- kPGPike_AM_None = 0,
-
- kPGPike_AM_PreSharedKey = 1, /* supported */
- kPGPike_AM_DSS_Sig = 2, /* supported */
- kPGPike_AM_RSA_Sig = 3, /* supported */
- kPGPike_AM_RSA_Encrypt = 4,
- kPGPike_AM_RSA_Encrypt_R = 5,
-
- kPGPike_AM_HAuth_InitRSA = 64221,
- kPGPike_AM_HAuth_RespRSA = 64222,
- kPGPike_AM_HAuth_InitDSS = 64223,
- kPGPike_AM_HAuth_RespDSS = 64224,
-
- kPGPike_AM_XAuth_InitPreShared = 65001,
- kPGPike_AM_XAuth_RespPreShared = 65002,
- kPGPike_AM_XAuth_InitDSS = 65003,
- kPGPike_AM_XAuth_RespDSS = 65004,
- kPGPike_AM_XAuth_InitRSA = 65005,
- kPGPike_AM_XAuth_RespRSA = 65006,
- kPGPike_AM_XAuth_InitRSAEncryption = 65007,
- kPGPike_AM_XAuth_RespRSAEncryption = 65008,
- kPGPike_AM_XAuth_InitRSAREncryption = 65009,
- kPGPike_AM_XAuth_RespRSAREncryption = 65010,
-
- PGP_ENUM_FORCE( PGPikeAuthMethod_ )
-};
-PGPENUM_TYPEDEF( PGPikeAuthMethod_, PGPikeAuthMethod );
-
-enum PGPikeAuthStyle_
-{
- kPGPike_AS_Normal = 0,
-
- kPGPike_AS_XAuth = 1,
- kPGPike_AS_HybridAuth = 2,
-
- PGP_ENUM_FORCE( PGPikeAuthStyle_ )
-};
-PGPENUM_TYPEDEF( PGPikeAuthStyle_, PGPikeAuthStyle );
-
-enum PGPikeXAuthType_
-{
- kPGPike_XT_Generic = 0,
-
- kPGPike_XT_RADIUS_CHAP = 1,
- kPGPike_XT_OTP = 2,
- kPGPike_XT_SKEY = 3,
-
- PGP_ENUM_FORCE( PGPikeXAuthType_ )
-};
-PGPENUM_TYPEDEF( PGPikeXAuthType_, PGPikeXAuthType );
-
-enum PGPikeEncapsulateMode_
-{
- kPGPike_EM_Auto = 0,
-
- kPGPike_EM_Always = 1,
- kPGPike_EM_Never = 2,
-
- PGP_ENUM_FORCE( PGPikeEncapsulateMode_ )
-};
-PGPENUM_TYPEDEF( PGPikeEncapsulateMode_, PGPikeEncapsulateMode );
-
-typedef struct PGPipsecESPTransform
-{
- PGPipsecESPTransformID cipher;
- PGPUInt32 keyLength;
- /* cipher key bit size, must be 0 for all except AES */
- PGPipsecAuthAttribute authAttr;
- PGPipsecEncapsulation mode;
-} PGPipsecESPTransform;
-
-typedef struct PGPipsecAHTransform
-{
- PGPipsecAHTransformID authAlg;
- PGPipsecAuthAttribute authAttr;
- PGPipsecEncapsulation mode;
-} PGPipsecAHTransform;
-
-typedef struct PGPipsecIPCOMPTransform
-{
- PGPipsecIPCOMPTransformID compAlg;
-} PGPipsecIPCOMPTransform;
-
-typedef struct PGPikeTransform
-{
- PGPikeAuthMethod authMethod;
- PGPikeHash hash;
- PGPikeCipher cipher;
- PGPUInt32 keyLength; /* cipher key bit size, must be 0 for all except AES */
- PGPikeGroupID groupID;
-} PGPikeTransform;
-
-typedef struct PGPipsecTransform
-{
- PGPBoolean useESP;
- PGPipsecESPTransform esp;
-
- PGPBoolean useAH;
- PGPipsecAHTransform ah;
-
- PGPBoolean useIPCOMP;
- PGPipsecIPCOMPTransform ipcomp;
-
- PGPikeGroupID groupID;
-} PGPipsecTransform;
-
-typedef struct PGPipsecDOIParams
-{
- PGPipsecSPI inSPI;
- PGPipsecSPI outSPI;
- PGPipsecProtocol protocol;
-
- union
- {
- struct
- {
- PGPipsecAHTransform t;
- PGPByte inAuthKey[kPGPike_AuthMaximumKeySize];
- PGPByte outAuthKey[kPGPike_AuthMaximumKeySize];
- } ah;
-
- struct
- {
- PGPipsecESPTransform t;
- PGPByte inESPKey[kPGPike_ESPMaximumKeySize];
- PGPByte outESPKey[kPGPike_ESPMaximumKeySize];
- PGPByte inAuthKey[kPGPike_AuthMaximumKeySize];
- PGPByte outAuthKey[kPGPike_AuthMaximumKeySize];
- PGPByte explicitIV[kPGPike_MaxExplicitIVSize];
- } esp;
-
- struct
- {
- PGPipsecIPCOMPTransform t;
- } ipcomp;
- } u;
-} PGPipsecDOIParams;
-
-typedef struct PGPipsecSA
-{
- struct PGPipsecSA * nextSA; /* INTERNAL USE ONLY */
- struct PGPipsecSA * prevSA; /* INTERNAL USE ONLY */
- PGPUInt32 ipAddress; /* PreNATted(Original) IP Address */
- PGPBoolean destIsRange; /* dest is IP range */
- PGPUInt32 ipAddrStart; /* IP address */
- PGPUInt32 ipMaskEnd; /* mask or end range IP address */
- PGPByte ipProtocol; /* 0 if all protocols */
- PGPUInt16 ipPort; /* 0 if all ports */
-
- PGPBoolean bNATTraversal; /* NAT Encapsulation is enabled if true */
- PGPBoolean bIsLocalIPNAT; /* if non-zero, our local IP is natted */
- PGPBoolean bIsRemoteIPNAT; /* if non-zero, remote IP is NATed */
- PGPUInt32 natIPAddress; /* NATed Dest IP Address, 0 if not NATed */
- PGPUInt16 nboNATPort; /* NATed Dest Port value */
-
- PGPUInt32 assignedIP; /* if non-zero, use as tunnel IP */
- PGPUInt32 assignedDNS; /* if non-zero, use as tunnel DNS */
- PGPUInt32 assignedWINS; /* if non-zero, use as tunnel WINS */
-
- PGPBoolean initiator; /* was this SA initiated locally */
- PGPBoolean activeIn; /* use for inbound data */
- PGPBoolean activeOut; /* use for outbound data */
- PGPUInt32 kbLifeTime; /* max KB to be sent on this SA */
- PGPUInt32 secLifeTime; /* max seconds this SA will live */
- /* 0 means no limit for either */
- PGPTime birthTime;
-
- PGPUInt16 numTransforms;
- PGPipsecDOIParams transform[kPGPike_MaxTransforms];
-
- PGPTime termSchedule; /* SA will be terminated, private */
- PGPByte userData[kPGPike_UserDataSize];/* for your use */
-} PGPipsecSA;
-
-/* When sent a kPGPike_MT_SARequest, pgpIKE will expect that
- all fields below will be filled in. The approved member is
- irrelevant in that case.
-
- When you are called with kPGPike_MT_PolicyCheck, pgpIKE will
- set everything to 0 except the IP address. You are expected
- to fill in the other fields with local policy. The PolicyCheck
- is used for remote-initiated SA negotiation. Since you cannot
- predict which remote network might be trying to communicate
- with us, you should leave the destIsRange/ipAddrStart/ipMaskEnd
- and ipPort/ipProtocol fields set to 0 for this message. You
- will be called to check those later with the ClientIDCheck.
-*/
-typedef struct PGPikeMTSASetup
-{
- PGPBoolean approved; /* > */
-
- PGPUInt32 ipAddress; /* destination */
- PGPUInt32 localIPAddress; /* source */
- PGPByte ipProtocol;
- PGPUInt16 ipPort;
- PGPByte * sharedKey; /* null if none, data will be copied */
- PGPSize sharedKeySize; /* w/o NULL-terminate */
- PGPBoolean aggressive; /* set for aggressive mode */
- PGPBoolean lightweight; /* only for SARequest, set to
- TRUE for only 1 retry */
- /* set the fields below to use tunnel mode */
- PGPBoolean destIsRange;
- PGPUInt32 ipAddrStart;
- PGPUInt32 ipMaskEnd;
-
- PGPBoolean virtualIP; /* whether to use mode-cfg */
- PGPikeAuthStyle authStyle; /* whether to use xauth/hybrid */
- PGPikeEncapsulateMode encapsulateMode; /* Force NAT Traversal mode */
-
- PGPipsecIdentity idType; /* only useful in shared key mode */
- PGPByte * idData; /* data will be copied */
- PGPSize idDataSize; /* this is the Phase 1 ID */
-} PGPikeMTSASetup;
-
-/*
- When you are called with a kPGPike_MT_ClientIDCheck, all fields
- will be set appropriately. If the destIsRange/ipAddrStart/ipMaskEnd
- triad is permitted to be represented by the IP address, set
- the approved field to true. This message is only sent in the case
- where the remote side is the initiator and you have already been
- called with a kPGPike_MT_PolicyCheck message.
-*/
-typedef struct PGPikeMTClientIDCheck
-{
- PGPBoolean approved; /* > */
-
- PGPUInt32 ipAddress;
- PGPByte ipProtocol;
- PGPUInt16 ipPort;
-
- PGPBoolean destIsRange;
- PGPUInt32 ipAddrStart;
- PGPUInt32 ipMaskEnd;
-} PGPikeMTClientIDCheck;
-
-typedef struct PGPikeMTSAEstablished
-{
- PGPipsecSA * sa;
- PGPBoolean remoteValid;
- PGPByte * remoteAuthKey; /* binary exported key data */
- PGPSize remoteAuthKeySize;
-} PGPikeMTSAEstablished;
-
-typedef struct PGPikeMTSAFailed
-{
- PGPUInt32 ipAddress; /* destination */
- PGPByte ipProtocol;
- PGPUInt16 ipPort;
-
- PGPBoolean destIsRange;
- PGPUInt32 ipAddrStart;
- PGPUInt32 ipMaskEnd;
-
-} PGPikeMTSAFailed;
-
-typedef struct PGPikeMTCert
-{
- PGPUInt32 ipAddress; /* < */
- PGPKeyDBRef baseKeyDB; /* > */
- PGPKeyDBObjRef authObj; /* > PGP key or X.509 cert */
-
- PGPBoolean isPassKey; /* > */
- void * pass; /* > null-term if passphrase, Unicode, copied */
- PGPSize passLength; /* > in PGPChar8s */
-} PGPikeMTCert;
-
-typedef struct PGPikeMTRemoteCert
-{
- PGPBoolean approved; /* > */
- PGPBoolean valid; /* > */
- PGPUInt32 ipAddress; /* < */
- PGPKeyDBObjRef remoteObj; /* < PGPkey or X.509 cert */
- PGPKeyDBRef remoteKeyDB; /* < any other keys/certs are part of
- this cert's chain */
-} PGPikeMTRemoteCert;
-
-typedef struct PGPikeMTPacket
-{
- PGPUInt32 ipAddress; /* source or destination */
- PGPUInt16 port; /* usually UDP 500, but might not be */
- PGPSize packetSize;
- PGPByte * packet; /* msg *sender* must free this */
-} PGPikeMTPacket;
-
-typedef struct PGPikeMTIdentity
-{
- PGPBoolean active; /* TRUE = set it, FALSE= dead */
- PGPUInt32 ipAddress; /* Gateway IP */
- PGPUInt32 assignedIP;
- PGPUInt32 assignedDNS;
- PGPUInt32 assignedWINS;
-} PGPikeMTIdentity;
-
-typedef struct PGPikeMTAlert
-{
- PGPikeAlert alert;
- PGPUInt32 ipAddress;
- PGPikeInternalAlert value; /* used if alert is kPGPike_AL_None */
- PGPBoolean remoteGenerated;
-} PGPikeMTAlert;
-
-typedef PGPUInt32 PGPikeAESKeyLengthMask;
-
-#define kPGPike_AESKeyLength128 1
-#define kPGPike_AESKeyLength192 2
-#define kPGPike_AESKeyLength256 4
-#define kPGPike_AESKeyLengthAll 7
-
-typedef struct PGPikeAllowedAlgorithms
-{
- PGPBoolean cast5;
- PGPBoolean tripleDES;
- PGPBoolean singleDES;
- PGPikeAESKeyLengthMask aes;
- PGPBoolean espNULL;
-
- PGPBoolean sha1;
- PGPBoolean md5;
- PGPBoolean sha2_256;
- PGPBoolean sha2_384;
- PGPBoolean sha2_512;
- PGPBoolean noAuth;
-
- PGPBoolean lzs;
- PGPBoolean deflate;
-
- PGPBoolean modpOne768;
- PGPBoolean modpTwo1024;
- PGPBoolean modpFive1536;
-
- PGPBoolean ec2n163;
- PGPBoolean ec2n283;
-
- PGPBoolean modp2048;
- PGPBoolean modp3072;
- PGPBoolean modp4096;
- PGPBoolean modp6144;
- PGPBoolean modp8192;
-
-} PGPikeAllowedAlgorithms;
-
-typedef struct PGPikeMTPref
-{
- PGPikePref pref;
-
- union
- {
- struct
- {
- PGPUInt32 kbLifeTimeIKE;
- PGPUInt32 secLifeTimeIKE;
- PGPUInt32 kbLifeTimeIPSEC;
- PGPUInt32 secLifeTimeIPSEC;
- } expiration; /* kPGPike_PF_Expiration */
-
- struct
- {
- PGPUInt32 numTransforms;
- PGPikeTransform * t;
- } ikeProposals; /* kPGPike_PF_IKEProposals */
-
-
- struct
- {
- PGPUInt32 numTransforms;
- PGPipsecTransform * t;
- } ipsecProposals; /* kPGPike_PF_IPSECProposals */
-
- PGPikeAllowedAlgorithms allowedAlgorithms;
- /*kPGPike_PF_AllowedAlgorithms*/
- } u;
-} PGPikeMTPref;
-
-/* This message will be sent to check extended authentication. The buffer
- will be freed after your callback is called, so if you need it,
- copy the data elsewhere. You must retrieve the information and then
- send an AuthCheck message back to IKE with the contents filled in,
- and all contents preserved other than what you filled in. The message
- you send back is your memory, IKE will not free it. */
-typedef struct PGPikeMTAuthCheck
-{
- PGPBoolean success; /* set to true unless user aborts */
- PGPUInt32 gatewayIP;
- PGPikeXAuthType xauthType;
- PGPUInt16 transactionID; /* private */
- PGPBoolean includeType; /* private */
-
- PGPBoolean useUserName;
- PGPBoolean usePassword;
- PGPBoolean usePasscode;
- PGPBoolean useMessage;
- PGPBoolean useChallenge;
- PGPBoolean useDomain;
-
- PGPChar8 userName[kPGPike_XAuthStringLen];
- PGPChar8 password[kPGPike_XAuthStringLen];
- PGPChar8 passcode[kPGPike_XAuthStringLen];
- PGPChar8 message[kPGPike_XAuthMessageLen];
- PGPChar8 challenge[kPGPike_XAuthStringLen];
- PGPChar8 domain[kPGPike_XAuthStringLen];
- PGPSize challengeSize;
-} PGPikeMTAuthCheck;
-
-enum PGPikeMessageType_
-{
- /*
- Message types followed by ">" may be sent to PGPike
- Message typed followed by "<" may be sent by PGPike
- */
- kPGPike_MT_Idle = 0, /* > call this often */
- kPGPike_MT_SARequest, /* > PGPikeMTSASetup */
- kPGPike_MT_SARequestFailed, /* < PGPikeMTSAFailed */
- kPGPike_MT_SAEstablished, /* < PGPikeMTSAEstablished */
- kPGPike_MT_SARekey, /* > PGPipsecSA */
- kPGPike_MT_SADied, /* >< PGPipsecSA */
- kPGPike_MT_SAUpdate, /* < PGPipsecSA */
- kPGPike_MT_SAKillAll, /* > none */
-
- kPGPike_MT_PolicyCheck, /* < PGPikeMTSASetup */
- kPGPike_MT_ClientIDCheck, /* < PGPikeMTClientIDCheck */
- kPGPike_MT_AuthCheck, /* >< PGPikeMTAuthCheck */
- kPGPike_MT_LocalPGPCert, /* < PGPikeMTCert */
- kPGPike_MT_LocalX509Cert, /* < PGPikeMTCert */
- kPGPike_MT_RemoteCert, /* < PGPikeMTRemoteCert */
- kPGPike_MT_Identity, /* < PGPikeMTIdentity */
-
- kPGPike_MT_Packet, /* >< PGPikeMTPacket */
- kPGPike_MT_Alert, /* < PGPikeMTAlert */
-
- kPGPike_MT_Pref, /* > PGPikeMTPref */
-
- kPGPike_MT_DebugLog, /* < PGPChar8 * */
-
- PGP_ENUM_FORCE( PGPikeMessageType_ )
-};
-PGPENUM_TYPEDEF( PGPikeMessageType_, PGPikeMessageType );
-
-typedef PGPError (* PGPikeMessageProcPtr)(
- PGPikeContextRef ike,
- void * inUserData,
- PGPikeMessageType msg,
- void * data );
-
-PGPError PGPNewIKEContext(
- PGPContextRef context,
- PGPikeMessageProcPtr ikeMessageProc,
- void * inUserData,
- PGPikeContextRef * outRef );
-
-PGPError PGPFreeIKEContext(
- PGPikeContextRef ref );
-
-/* Any error from PGPikeProcessMessage is fatal. Non-fatal
- errors are sent through the kPGPike_MT_Alert message. */
-
-PGPError PGPikeProcessMessage(
- PGPikeContextRef ref,
- PGPikeMessageType msg,
- void * data );
-
-
-#if PGP_WIN32
-# pragma pack(pop)
-#endif
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_PGPike_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpKeyServer.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpKeyServer.h
deleted file mode 100644
index 27594ea8b1..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpKeyServer.h
+++ /dev/null
@@ -1,339 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpKeyServer.h,v 1.20 2004/01/23 08:12:49 dallen Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpKeyServer_h
-#define Included_pgpKeyServer_h
-
-#include "pgpOptionList.h"
-#include "pgpErrors.h"
-#include "pgpGroups.h"
-#include "pgpTLS.h"
-
-
-enum PGPKeyServerState_
-{
- kPGPKeyServerState_Invalid = 0,
- kPGPKeyServerState_Opening = 1,
- kPGPKeyServerState_Querying = 2,
- kPGPKeyServerState_ReceivingResults = 3,
- kPGPKeyServerState_ProcessingResults = 4,
- kPGPKeyServerState_Uploading = 5,
- kPGPKeyServerState_Deleting = 6,
- kPGPKeyServerState_Disabling = 7,
- kPGPKeyServerState_Closing = 8,
-
- kPGPKeyServerState_TLSUnableToSecureConnection = 9,
- kPGPKeyServerState_TLSConnectionSecured = 10,
-
- PGP_ENUM_FORCE(PGPKeyServerState_)
-};
-
-PGPENUM_TYPEDEF(PGPKeyServerState_, PGPKeyServerState);
-
-enum PGPKeyServerProtocol_
-{
- kPGPKeyServerProtocol_Invalid = 0,
- kPGPKeyServerProtocol_LDAP = 1,
- kPGPKeyServerProtocol_HTTP = 2,
- kPGPKeyServerProtocol_LDAPS = 3,
- kPGPKeyServerProtocol_HTTPS = 4,
-
- PGP_ENUM_FORCE( PGPKeyServerProtocol_ )
-};
-
-PGPENUM_TYPEDEF( PGPKeyServerProtocol_, PGPKeyServerProtocol );
-
-enum PGPKeyServerClass_
-{
- kPGPKeyServerClass_Invalid = 0,
- kPGPKeyServerClass_PGP = 1,
- kPGPKeyServerClass_LDAPX509 = 2,
- kPGPKeyServerClass_LDAPPGP = 3, /* deprecated, use kPGPKeyServerClass_PGP instead */
-
- /* CA types */
- kPGPKeyServerClass_NetToolsCA = 10,
- kPGPKeyServerClass_Verisign = 11,
- kPGPKeyServerClass_Entrust = 12,
- kPGPKeyServerClass_Netscape = 13,
- kPGPKeyServerClass_Microsoft = 14,
-
- PGP_ENUM_FORCE( PGPKeyServerClass_ )
-};
-
-PGPENUM_TYPEDEF( PGPKeyServerClass_, PGPKeyServerClass );
-
-enum PGPKeyServerKeySpace_ /* These are only valid for LDAP keyservers */
-{
- kPGPKeyServerKeySpace_Invalid = 0,
- kPGPKeyServerKeySpace_Default = 1,
- kPGPKeyServerKeySpace_Normal = 2,
- kPGPKeyServerKeySpace_Pending = 3,
-
- PGP_ENUM_FORCE( PGPKeyServerKeySpace_ )
-};
-
-PGPENUM_TYPEDEF( PGPKeyServerKeySpace_, PGPKeyServerKeySpace );
-
-enum PGPKeyServerAccessType_ /* These are only valid for LDAP keyservers */
-{
- kPGPKeyServerAccessType_Invalid = 0,
- kPGPKeyServerAccessType_Default = 1,
- kPGPKeyServerAccessType_Normal = 2,
- kPGPKeyServerAccessType_Administrator = 3,
-
- PGP_ENUM_FORCE( PGPKeyServerAccessType_ )
-};
-
-PGPENUM_TYPEDEF( PGPKeyServerAccessType_, PGPKeyServerAccessType );
-
-enum PGPProxyServerType_
-{
- kPGPProxyServerType_Invalid = 0,
- kPGPProxyServerType_HTTP = 1,
- kPGPProxyServerType_HTTPS = 2,
-
- PGP_ENUM_FORCE(PGPProxyServerType_)
-};
-
-PGPENUM_TYPEDEF(PGPProxyServerType_, PGPProxyServerType);
-
-/* PGPKeyServerMonitorValues are null terminated linked lists.
- The values member is a null terminated array of char*s.
-*/
-
-typedef struct PGPKeyServerMonitorValues
-{
- PGPChar8 * name;
- PGPChar8 ** values;
- struct PGPKeyServerMonitorValues * next;
-} PGPKeyServerMonitorValues;
-
-typedef struct PGPKeyServerMonitor
-{
- PGPKeyServerRef keyServerRef;
- PGPKeyServerMonitorValues * valuesHead;
-} PGPKeyServerMonitor;
-
-
-typedef struct PGPKeyServerThreadStorage * PGPKeyServerThreadStorageRef;
-# define kInvalidPGPKeyServerThreadStorageRef \
- ((PGPKeyServerThreadStorageRef) NULL)
-#define PGPKeyServerThreadStorageRefIsValid(ref) \
- ((ref) != kInvalidPGPKeyServerThreadStorageRef)
-
-PGP_BEGIN_C_DECLARATIONS
-
-
-/* Use the idle event handler to receive periodic idle events during
- network calls. Usually this is used only in non-preemptive multi-tasking
- OSes to allow yielding in threads. Pre-emptive multi-tasking systems
- should probably not use the call as it interrupts the efficient wait state
- of threads waiting on network calls.
-
- Idle event handlers need to be added on a per thread basis.
-
- Returning an error from the idle event handler will cause the keyserver
- to quit processing and to return a kPGPError_UserAbort. */
-PGPError PGPSetKeyServerIdleEventHandler(
- PGPEventHandlerProcPtr inCallback,
- PGPUserValue inUserData);
-
-PGPError PGPGetKeyServerIdleEventHandler(
- PGPEventHandlerProcPtr * outCallback,
- PGPUserValue * outUserData);
-
-/* Network library options */
-
-#undef PGPONetURL
-PGPOptionListRef PGPONetURL(PGPContextRef context, const PGPChar8 *url);
-
-#undef PGPONetHostName
-PGPOptionListRef PGPONetHostName(PGPContextRef context,
- const PGPChar8 *hostName, PGPUInt16 port);
-
-PGPOptionListRef PGPONetHostAddress(PGPContextRef context,
- PGPUInt32 hostAddress, PGPUInt16 port);
-
-PGPOptionListRef PGPONetConnectTimeout(PGPContextRef context,
- PGPUInt32 timeout);
-
-PGPOptionListRef PGPONetReadTimeout(PGPContextRef context,
- PGPUInt32 timeout);
-
-PGPOptionListRef PGPONetWriteTimeout(PGPContextRef context,
- PGPUInt32 timeout);
-
-PGPOptionListRef PGPOKeyServerProtocol(PGPContextRef context,
- PGPKeyServerProtocol serverProtocol);
-
-PGPOptionListRef PGPOKeyServerKeySpace(PGPContextRef context,
- PGPKeyServerKeySpace serverSpace);
-
-#undef PGPOKeyServerKeyStoreDN
-PGPOptionListRef PGPOKeyServerKeyStoreDN(PGPContextRef context,
- const PGPChar8 *szKeyStoreDn);
-
-PGPOptionListRef PGPOKeyServerAccessType(PGPContextRef context,
- PGPKeyServerAccessType accessType);
-
-PGPOptionListRef PGPOKeyServerCAKey(PGPContextRef context,
- PGPKeyDBObjRef caKeyDBObjRef);
-
-PGPOptionListRef PGPOKeyServerRequestKey(PGPContextRef context,
- PGPKeyDBObjRef requestKeyDBObjRef);
-
-PGPOptionListRef PGPOKeyServerSearchKey(PGPContextRef context,
- PGPKeyDBObjRef searchKeyDBObjRef);
-
-PGPOptionListRef PGPOKeyServerSearchFilter(PGPContextRef context,
- PGPFilterRef searchFilter);
-
-/* Static storage creation */
-PGPError PGPKeyServerCreateThreadStorage(
- PGPKeyServerThreadStorageRef * outPreviousStorage);
-PGPError PGPKeyServerDisposeThreadStorage(
- PGPKeyServerThreadStorageRef inPreviousStorage);
-
-/* Initialize and close the keyserver library */
-PGPError PGPKeyServerInit(void);
-
-PGPError PGPKeyServerCleanup(void);
-
-
-/* Creating and freeing a keyserver ref. */
-PGPError PGPNewKeyServer(
- PGPContextRef inContext,
- PGPKeyServerClass inClass,
- PGPKeyServerRef *outKeyServerRef,
- PGPOptionListRef firstOption,
- ... );
-
-PGPError PGPFreeKeyServer(PGPKeyServerRef inKeyServerRef);
-PGPError PGPIncKeyServerRefCount(PGPKeyServerRef inKeyServerRef);
-
-
-/* Set and get the keyserver's event handler. Note that returning an error
- for a keyserver event will abort the current call. */
-PGPError PGPSetKeyServerEventHandler(
- PGPKeyServerRef inKeyServerRef,
- PGPEventHandlerProcPtr inCallback,
- PGPUserValue inUserData);
-
-PGPError PGPGetKeyServerEventHandler(
- PGPKeyServerRef inKeyServerRef,
- PGPEventHandlerProcPtr * outCallback,
- PGPUserValue * outUserData);
-
-
-/* Canceling a call to a keyserver. This is the only call that can be made
- to a keyserver that is currently in another call. Also, once you have
- returned from a canceled call, you may only close the keyserver. */
-PGPError PGPCancelKeyServerCall(PGPKeyServerRef inKeyServerRef);
-
-
-/* Opening and closing the keyserver. A keyserver ref can be opened and
- closed multiple times as necessary. */
-PGPError PGPKeyServerOpen(PGPKeyServerRef inKeyServerRef,
- PGPtlsSessionRef inTLSSessionRef);
-
-PGPError PGPKeyServerClose(PGPKeyServerRef inKeyServerRef);
-
-
-/* Get keyserver info. */
-PGPError PGPGetKeyServerTLSSession(PGPKeyServerRef inKeyServerRef,
- PGPtlsSessionRef * outTLSSessionRef);
-
-PGPError PGPGetKeyServerProtocol(PGPKeyServerRef inKeyServerRef,
- PGPKeyServerProtocol * outType);
-
-PGPError PGPGetKeyServerAccessType(PGPKeyServerRef inKeyServerRef,
- PGPKeyServerAccessType * outAccessType);
-
-PGPError PGPGetKeyServerKeySpace(PGPKeyServerRef inKeyServerRef,
- PGPKeyServerKeySpace * outKeySpace);
-
-PGPError PGPGetKeyServerPort(PGPKeyServerRef inKeyServerRef,
- PGPUInt16 * outPort);
-
-#undef PGPGetKeyServerHostName
-PGPError PGPGetKeyServerHostName(PGPKeyServerRef inKeyServerRef,
- PGPChar8 ** outHostName); /* Use PGPFreeData to free */
-
-PGPError PGPGetKeyServerAddress(PGPKeyServerRef inKeyServerRef,
- PGPUInt32 * outAddress);
-
-#undef PGPGetKeyServerPath
-PGPError PGPGetKeyServerPath(PGPKeyServerRef inKeyServerRef,
- PGPChar8 ** outPath); /* Use PGPFreeData to free */
-
-PGPContextRef PGPGetKeyServerContext(PGPKeyServerRef inKeyServerRef);
-
-/* If there was an error string returned from the server, you can get it with
- this function. Note that if there is no string, the function will return
- kPGPError_NoErr and *outErrorString will be NULL */
-#undef PGPGetLastKeyServerErrorString
-PGPError PGPGetLastKeyServerErrorString(
- PGPKeyServerRef inKeyServerRef,
- PGPChar8 ** outErrorString); /* Use PGPFreeData to free */
-
-
-/* These functions may be used with both HTTP and LDAP keyservers */
-PGPError PGPQueryKeyServer(PGPKeyServerRef inKeyServerRef,
- PGPFilterRef inFilterRef,
- PGPKeyDBRef *searchResultsDB);
-
-PGPError PGPUploadToKeyServer(PGPKeyServerRef inKeyServerRef,
- PGPKeySetRef inKeysToUpload,
- PGPKeySetRef * outKeysThatFailed);
-
-
-/* These functions may only be used with LDAP keyservers */
-PGPError PGPDeleteFromKeyServer(PGPKeyServerRef inKeyServerRef,
- PGPKeySetRef inKeysToDelete,
- PGPKeySetRef * outKeysThatFailed);
-
-PGPError PGPDisableFromKeyServer(PGPKeyServerRef inKeyServerRef,
- PGPKeySetRef inKeysToDisable,
- PGPKeySetRef * outKeysThatFailed);
-
-PGPError PGPSendGroupsToServer(PGPKeyServerRef inKeyServerRef,
- PGPGroupSetRef inGroupSetRef);
-
-PGPError PGPRetrieveGroupsFromServer(
- PGPKeyServerRef inKeyServerRef,
- PGPGroupSetRef * outGroupSetRef);
-
-PGPError PGPNewServerMonitor(PGPKeyServerRef inKeyServerRef,
- PGPKeyServerMonitor ** outMonitor);
-
-PGPError PGPFreeServerMonitor(PGPKeyServerMonitor * inMonitor);
-
-/* X.509 Certificate Request functions */
-
-PGPError PGPSendCertificateRequest(
- PGPKeyServerRef inKeyServerRef,
- PGPOptionListRef firstOption,
- ... );
-
-PGPError PGPRetrieveCertificate(
- PGPKeyServerRef inKeyServerRef,
- PGPOptionListRef firstOption,
- ... );
-
-PGPError PGPRetrieveCertificateRevocationList(
- PGPKeyServerRef inKeyServerRef,
- PGPOptionListRef firstOption,
- ... );
-/* Queries HTTP proxy information. proxyAddress must be freed with PGPFreeData */
-#undef PGPGetProxyServer
-PGPError PGPGetProxyServer(
- PGPContextRef context, PGPProxyServerType type,
- PGPChar8 **proxyAddress, PGPUInt16 *proxyPort );
-
-PGP_END_C_DECLARATIONS
-
-#endif
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpKeys.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpKeys.h
deleted file mode 100644
index 8700cee34e..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpKeys.h
+++ /dev/null
@@ -1,831 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpKeys.h,v 1.76 2004/05/19 00:09:07 ajivsov Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpKeys_h /* [ */
-#define Included_pgpKeys_h
-
-#include "pgpPubTypes.h"
-#include "pgpHash.h"
-#include "pgpOptionList.h"
-
-/* Key ordering */
-
-enum PGPKeyOrdering_
-{
- kPGPKeyOrdering_Invalid = 0,
- kPGPKeyOrdering_Any = 1,
- kPGPKeyOrdering_UserID = 2,
- kPGPKeyOrdering_KeyID = 3,
- kPGPKeyOrdering_Validity = 4,
- kPGPKeyOrdering_Trust = 5,
- kPGPKeyOrdering_EncryptionKeySize = 6,
- kPGPKeyOrdering_SigningKeySize = 7,
- kPGPKeyOrdering_CreationDate = 8,
- kPGPKeyOrdering_ExpirationDate = 9,
-
- PGP_ENUM_FORCE( PGPKeyOrdering_ )
-} ;
-PGPENUM_TYPEDEF( PGPKeyOrdering_, PGPKeyOrdering );
-
-
-/* Key properties */
-
-enum PGPKeyDBObjProperty_
-{
- kPGPKeyDBObjProperty_Invalid = 0,
-
- /* Generic numeric properties */
- kPGPKeyDBObjProperty_ObjectType = 20,
-
- /* Key boolean properties */
- kPGPKeyProperty_IsSecret = 100,
- kPGPKeyProperty_IsAxiomatic = 101,
- kPGPKeyProperty_IsRevoked = 102,
- kPGPKeyProperty_IsDisabled = 103,
- kPGPKeyProperty_IsNotCorrupt = 104,
- kPGPKeyProperty_IsExpired = 105,
- kPGPKeyProperty_NeedsPassphrase = 106,
- kPGPKeyProperty_HasUnverifiedRevocation = 107,
- kPGPKeyProperty_CanEncrypt = 108,
- kPGPKeyProperty_CanDecrypt = 109,
- kPGPKeyProperty_CanSign = 110,
- kPGPKeyProperty_CanVerify = 111,
- kPGPKeyProperty_IsEncryptionKey = 112,
- kPGPKeyProperty_IsSigningKey = 113,
- kPGPKeyProperty_IsSecretShared = 114,
- kPGPKeyProperty_IsRevocable = 115,
- kPGPKeyProperty_HasThirdPartyRevocation = 116,
- kPGPKeyProperty_HasCRL = 117,
- kPGPKeyProperty_IsOnToken = 118,
- kPGPKeyProperty_IsStubKey = 119, /* used to filter dummy keys from inclusive key set */
-
- /* Key numeric properties */
- kPGPKeyProperty_AlgorithmID = 200,
- kPGPKeyProperty_Bits = 201,
- kPGPKeyProperty_Trust = 202,
- kPGPKeyProperty_Validity = 203,
- kPGPKeyProperty_LockingAlgorithmID = 204,
- kPGPKeyProperty_LockingBits = 205,
- kPGPKeyProperty_Flags = 206,
- kPGPKeyProperty_HashAlgorithmID = 207,
- kPGPKeyProperty_Version = 208,
- kPGPKeyProperty_KeyServerPreferences = 209,
- kPGPKeyProperty_TokenNum = 210,
- kPGPKeyProperty_Features = 211,
-
- /* Key time properties */
- kPGPKeyProperty_Creation = 300,
- kPGPKeyProperty_Expiration = 301,
- kPGPKeyProperty_CRLThisUpdate = 302,
- kPGPKeyProperty_CRLNextUpdate = 303,
-
- /* Key data (variable sized) properties */
- kPGPKeyProperty_Fingerprint = 401,
- kPGPKeyProperty_KeyID = 402,
- kPGPKeyProperty_PreferredAlgorithms = 403,
- kPGPKeyProperty_ThirdPartyRevocationKeyID = 404,
- kPGPKeyProperty_KeyData = 405,
- kPGPKeyProperty_X509MD5Hash = 406,
- kPGPKeyProperty_PreferredKeyServer = 407,
- kPGPKeyProperty_PreferredCompressionAlgorithms = 408,
-
- /* SubKey boolean properties */
- kPGPSubKeyProperty_IsRevoked = 501,
- kPGPSubKeyProperty_IsNotCorrupt = 502,
- kPGPSubKeyProperty_IsExpired = 503,
- kPGPSubKeyProperty_NeedsPassphrase = 504,
- kPGPSubKeyProperty_HasUnverifiedRevocation = 505,
- kPGPSubKeyProperty_IsRevocable = 506,
- kPGPSubKeyProperty_HasThirdPartyRevocation = 507,
- kPGPSubKeyProperty_IsOnToken = 508,
-
- /* SubKey numeric properties */
- kPGPSubKeyProperty_AlgorithmID = 600,
- kPGPSubKeyProperty_Bits = 601,
- kPGPSubKeyProperty_LockingAlgorithmID = 602,
- kPGPSubKeyProperty_LockingBits = 603,
- kPGPSubKeyProperty_Version = 604,
- kPGPSubKeyProperty_Flags = 605,
-
- /* SubKey time properties */
- kPGPSubKeyProperty_Creation = 700,
- kPGPSubKeyProperty_Expiration = 701,
-
- /* SubKey data (variable sized) properties */
- kPGPSubKeyProperty_KeyData = 800,
- kPGPSubKeyProperty_KeyID = 801,
-
- /* User ID boolean properties */
- kPGPUserIDProperty_IsAttribute = 900,
- kPGPUserIDProperty_IsRevoked = 901,
-
- /* User ID numeric properties */
- kPGPUserIDProperty_Validity = 1000,
- kPGPUserIDProperty_Confidence = 1001,
- kPGPUserIDProperty_AttributeType = 1002,
-
- /* No User ID time properties */
-
- /* User ID data (variable sized) properties */
- kPGPUserIDProperty_Name = 1200,
- kPGPUserIDProperty_AttributeData = 1201,
- kPGPUserIDProperty_CommonName = 1202,
- kPGPUserIDProperty_EmailAddress = 1203,
- kPGPUserIDProperty_SMIMEPreferredAlgorithms = 1204,
-
- /* Signature boolean properties */
- kPGPSigProperty_IsRevoked = 1300,
- kPGPSigProperty_IsNotCorrupt = 1301,
- kPGPSigProperty_IsTried = 1302,
- kPGPSigProperty_IsVerified = 1303,
- kPGPSigProperty_IsMySig = 1304,
- kPGPSigProperty_IsExportable = 1305,
- kPGPSigProperty_HasUnverifiedRevocation = 1306,
- kPGPSigProperty_IsExpired = 1307,
- kPGPSigProperty_IsX509 = 1308,
-
- /* Signature numeric properties */
- kPGPSigProperty_AlgorithmID = 1400,
- kPGPSigProperty_TrustLevel = 1401,
- kPGPSigProperty_TrustValue = 1402,
-
- /* Signature time properties */
- kPGPSigProperty_Creation = 1500,
- kPGPSigProperty_Expiration = 1501,
-
- /* Signature data (variable sized) properties */
- kPGPSigProperty_KeyID = 1600,
- kPGPSigProperty_X509Certificate = 1601,
- kPGPSigProperty_X509IASN = 1602,
- kPGPSigProperty_X509LongName = 1603,
- kPGPSigProperty_X509IssuerLongName = 1604,
- kPGPSigProperty_X509DNSName = 1605,
- kPGPSigProperty_X509IPAddress = 1606,
- kPGPSigProperty_X509DERDName = 1607,
- kPGPSigProperty_RegularExpression = 1608,
-
- PGP_ENUM_FORCE( PGPKeyDBObjProperty_ )
-} ;
-PGPENUM_TYPEDEF( PGPKeyDBObjProperty_, PGPKeyDBObjProperty );
-
-
-/* For kPGPKeyProperty_Version */
-enum PGPKeyVersion_
-{
- kPGPKeyVersion_V3 = 3,
- kPGPKeyVersion_V4 = 4,
-
- PGP_ENUM_FORCE( PGPKeyVersion_ )
-} ;
-PGPENUM_TYPEDEF( PGPKeyVersion_, PGPKeyVersion );
-
-
-/* kPGPKeyPropFlags bits */
-
-enum /* PGPKeyPropertyFlags */
-{
- kPGPKeyPropertyFlags_UsageSignUserIDs = (1UL << 0 ),
- kPGPKeyPropertyFlags_UsageSignMessages = (1UL << 1 ),
- kPGPKeyPropertyFlags_UsageEncryptCommunications = (1UL << 2 ),
- kPGPKeyPropertyFlags_UsageEncryptStorage = (1UL << 3 ),
-
- kPGPKeyPropertyFlags_PrivateSplit = (1UL << 4 ),
- kPGPKeyPropertyFlags_PrivateShared = (1UL << 7 )
-} ;
-typedef PGPFlags PGPKeyPropertyFlags;
-#define kPGPKeyPropertyFlags_UsageSign \
- (kPGPKeyPropertyFlags_UsageSignUserIDs | \
- kPGPKeyPropertyFlags_UsageSignMessages)
-#define kPGPKeyPropertyFlags_UsageEncrypt \
- (kPGPKeyPropertyFlags_UsageEncryptCommunications | \
- kPGPKeyPropertyFlags_UsageEncryptStorage)
-#define kPGPKeyPropertyFlags_UsageSignEncrypt \
- (kPGPKeyPropertyFlags_UsageSign | \
- kPGPKeyPropertyFlags_UsageEncrypt)
-
-/* Attribute types, for use with kPGPUserIDPropAttributeType */
-enum PGPAttributeType_
-{
- kPGPAttribute_Image = 1,
- kPGPAttribute_IPAddress = 10,
- kPGPAttribute_DNSName = 11,
- kPGPAttribute_Notation = 20,
-
- PGP_ENUM_FORCE( PGPAttributeType_ )
-} ;
-PGPENUM_TYPEDEF( PGPAttributeType_, PGPAttributeType );
-
-/* kPGPKeyPropFlags bits */
-
-enum /* PGPKeyServerPreferencesFlags */
-{
- kPGPKeyServerPreferences_NoModify = (1UL << 7 )
-} ;
-typedef PGPFlags PGPKeyServerPreferencesFlags;
-
-/* Implementation features like Modification Detection support */
-
-enum
-{
- kPGPKeyFeatures_ModificationDetection = 1
-} ;
-typedef PGPFlags PGPKeyFeaturesFlags;
-
-
-/* Key DB object types for the property kPGPKeyDBObjProperty_ObjectType */
-enum PGPKeyDBObjType_
-{
- kPGPKeyDBObjType_Invalid = 0,
- kPGPKeyDBObjType_Key = (1UL << 0),
- kPGPKeyDBObjType_SubKey = (1UL << 1),
- kPGPKeyDBObjType_UserID = (1UL << 2),
- kPGPKeyDBObjType_Signature = (1UL << 3),
-#ifdef __MVS__
- kPGPKeyDBObjType_Any = -1,
-#else
- kPGPKeyDBObjType_Any = 0xFFFFFFFF,
-#endif
-
- PGP_ENUM_FORCE( PGPKeyDBObjType_ )
-} ;
-PGPENUM_TYPEDEF( PGPKeyDBObjType_, PGPKeyDBObjType );
-
-/*
- * Used by filtering functions to specify type of match.
- */
-
-enum PGPMatchCriterion_
-{
- kPGPMatchCriterion_Equal = 1, /* searched == val */
- kPGPMatchCriterion_GreaterOrEqual = 2, /* searched >= val */
- kPGPMatchCriterion_LessOrEqual = 3, /* searched <= val */
- kPGPMatchCriterion_SubString = 4, /* searched is contained in supplied */
-
- PGP_ENUM_FORCE( PGPMatchCriterion_ )
-} ;
-PGPENUM_TYPEDEF( PGPMatchCriterion_, PGPMatchCriterion );
-
-
-/* This is the value of the expiration time which means "never expires" */
-#define kPGPExpirationTime_Never ( (PGPTime)0 )
-
-enum PGPOpenKeyDBFileOptions_
-{
- kPGPOpenKeyDBFileOptions_None = 0,
- kPGPOpenKeyDBFileOptions_Mutable = (1UL << 0 ),
- kPGPOpenKeyDBFileOptions_Create = (1UL << 1 ),
-
- PGP_ENUM_FORCE( PGPOpenKeyDBFileOptions_ )
-} ;
-
-PGPENUM_TYPEDEF( PGPOpenKeyDBFileOptions_, PGPOpenKeyDBFileOptions );
-
-/* Public entry points */
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- Key DB functions
-____________________________________________________________________________*/
-
-/* Creat a new, in-memory temporary key DB */
-PGPError PGPNewKeyDB( PGPContextRef context, PGPKeyDBRef *keyDBRef );
-
-/* Open a (possibly) existing key ring pair on disk */
-PGPError PGPOpenKeyDBFile( PGPContextRef context,
- PGPOpenKeyDBFileOptions options,
- PGPFileSpecRef pubKeysFileSpec,
- PGPFileSpecRef privKeysFileSpec,
- PGPKeyDBRef *keyDBRef );
-
-PGPError PGPFreeKeyDB( PGPKeyDBRef keyDBRef );
-
-PGPError PGPFlushKeyDB( PGPKeyDBRef keyDBRef );
-
-PGPError PGPIncKeyDBRefCount( PGPKeyDBRef keyDBRef );
-
-PGPBoolean PGPKeyDBIsMutable( PGPKeyDBRef keyDBRef );
-
-PGPError PGPFindKeyByKeyID( PGPKeyDBRef keyDBRef, const PGPKeyID * keyID,
- PGPKeyDBObjRef *keyRef);
-
-PGPError PGPCountKeysInKeyDB( PGPKeyDBRef keyDBRef, PGPUInt32 *numKeys );
-
-PGPError PGPKeyDBIsUpdated( PGPKeyDBRef keyDBRef, PGPBoolean *isUpdated );
-
-/* Cache a keydb in memory for specified number of seconds */
-PGPError PGPCacheKeyDB( PGPKeyDBRef keyDBRef, PGPUInt32 timeoutSeconds );
-
-/* Remove all cached keydbs from memory */
-PGPError PGPPurgeKeyDBCache( PGPContextRef context );
-
-/*____________________________________________________________________________
- Key set functions
-____________________________________________________________________________*/
-
-/* Create a new key set containing all of the keys in the key DB */
-PGPError PGPNewKeySet( PGPKeyDBRef keyDB, PGPKeySetRef *keySet );
-
-/* Create a new, empty key set */
-PGPError PGPNewEmptyKeySet( PGPKeyDBRef keyDB, PGPKeySetRef *keySet );
-
-/* Create a new key set containing a single key */
-PGPError PGPNewOneKeySet( PGPKeyDBObjRef key, PGPKeySetRef *keySet );
-
-/* Like PGPNewKeySet but allows certain stub key objects */
-PGPError PGPNewEmptyInclusiveKeySet( PGPKeyDBRef keyDB, PGPKeySetRef *pset );
-
-/* Like PGPNewOneKeySet but allows certain stub key objects */
-PGPError PGPNewOneInclusiveKeySet( PGPKeyDBObjRef key, PGPKeySetRef *keySet );
-
-PGPError PGPFreeKeySet( PGPKeySetRef keys);
-
-PGPError PGPIncKeySetRefCount( PGPKeySetRef keys);
-
-PGPBoolean PGPKeySetIsMember( PGPKeyDBObjRef key, PGPKeySetRef set );
-
-PGPError PGPCountKeys( PGPKeySetRef keys, PGPUInt32 *numKeys );
-
-PGPError PGPAddKey( PGPKeyDBObjRef keyToAdd, PGPKeySetRef set );
-
-PGPError PGPAddKeys( PGPKeySetRef keysToAdd, PGPKeySetRef set );
-
-PGPKeyDBRef PGPPeekKeySetKeyDB( PGPKeySetRef keySet );
-PGPKeySetRef PGPPeekKeyDBRootKeySet( PGPKeyDBRef keyDB );
-
-/*____________________________________________________________________________
- Key DB object properties
-____________________________________________________________________________*/
-
-PGPError PGPGetKeyDBObjBooleanProperty( PGPKeyDBObjRef key,
- PGPKeyDBObjProperty whichProperty, PGPBoolean *prop );
-
-PGPError PGPGetKeyDBObjNumericProperty( PGPKeyDBObjRef key,
- PGPKeyDBObjProperty whichProperty, PGPInt32 *prop );
-
-PGPError PGPGetKeyDBObjTimeProperty( PGPKeyDBObjRef key,
- PGPKeyDBObjProperty whichProperty, PGPTime *prop);
-/*
-** Get the data for a binary property. Returns kPGPError_BufferTooSmall if
-** the buffer is too small. Both buffer and dataSize can be NULL.
-*/
-
-#undef PGPGetKeyDBObjDataProperty
-PGPError PGPGetKeyDBObjDataProperty( PGPKeyDBObjRef key,
- PGPKeyDBObjProperty whichProperty, void *buffer,
- PGPSize bufferSize, PGPSize *dataSize);
-/*
-** Get the data for a binary property using an allocated output buffer. The
-** allocated buffer must be freed with PGPFreeData(). For convenience, the
-** allocated buffer is null-terminated. The terminating null byte is NOT included
-** is the output dataSize parameter.
-*/
-
-PGPError PGPGetKeyDBObjAllocatedDataProperty( PGPKeyDBObjRef key,
- PGPKeyDBObjProperty whichProperty, void **buffer,
- PGPSize *dataSize);
-
-PGPError PGPSetKeyEnabled( PGPKeyDBObjRef key, PGPBoolean enable );
-
-PGPError PGPSetKeyAxiomatic( PGPKeyDBObjRef key, PGPBoolean setAxiomatic,
- PGPOptionListRef firstOption, ...);
-
-/*____________________________________________________________________________
- Key DB object property convenience functions
-____________________________________________________________________________*/
-
-/* Get the key ID of a key or subkey key DB object */
-PGPError PGPGetKeyID( PGPKeyDBObjRef key, PGPKeyID *keyID );
-
-PGPError PGPGetPrimaryUserID( PGPKeyDBObjRef key, PGPKeyDBObjRef *outRef );
-
-PGPError PGPGetPrimaryAttributeUserID (PGPKeyDBObjRef key,
- PGPAttributeType attributeType, PGPKeyDBObjRef *outRef);
-
-PGPError PGPGetPrimaryUserIDValidity(PGPKeyDBObjRef key,
- PGPValidity *validity);
-
-PGPError PGPGetPrimaryUserIDName(PGPKeyDBObjRef key, void *buffer,
- PGPSize bufferSize, PGPSize *dataSize);
-
-PGPError PGPGetKeyForUsage( PGPKeyDBObjRef key, PGPUInt32 usageFlags,
- PGPKeyDBObjRef *outRef );
-
-
-
-/*____________________________________________________________________________
- Key filters
-____________________________________________________________________________*/
-
-PGPError PGPNewKeyDBObjBooleanFilter( PGPContextRef context,
- PGPKeyDBObjProperty whichProperty, PGPBoolean match,
- PGPFilterRef *outFilter );
-
-PGPError PGPNewKeyDBObjNumericFilter( PGPContextRef context,
- PGPKeyDBObjProperty whichProperty, PGPUInt32 matchValue,
- PGPMatchCriterion matchCriteria, PGPFilterRef *outFilter );
-
-PGPError PGPNewKeyDBObjTimeFilter( PGPContextRef context,
- PGPKeyDBObjProperty whichProperty, PGPTime matchValue,
- PGPMatchCriterion matchCriteria, PGPFilterRef *outFilter );
-
-PGPError PGPNewKeyDBObjDataFilter( PGPContextRef context,
- PGPKeyDBObjProperty whichProperty, const void *matchData,
- PGPSize matchDataSize, PGPMatchCriterion matchCriteria,
- PGPFilterRef *outFilter );
-
-PGPError PGPFreeFilter( PGPFilterRef filter );
-
-PGPError PGPIncFilterRefCount( PGPFilterRef filter );
-
-PGPError PGPFilterChildObjects( PGPFilterRef filter,
- PGPBoolean filterChildren );
-
-/* freeing outfilter will call PGPFreeFilter on filter */
-PGPError PGPNegateFilter( PGPFilterRef filter, PGPFilterRef *outFilter);
-
-/* freeing outfilter will call PGPFreeFilter on filter1, filter2 */
-PGPError PGPIntersectFilters( PGPFilterRef filter1, PGPFilterRef filter2,
- PGPFilterRef *outFilter);
-
-/* freeing outfilter will call PGPFreeFilter on filter1, filter2 */
-PGPError PGPUnionFilters( PGPFilterRef filter1, PGPFilterRef filter2,
- PGPFilterRef *outFilter);
-
-PGPError PGPFilterKeySet( PGPKeySetRef origSet, PGPFilterRef filter,
- PGPKeySetRef *resultSet );
-
-PGPError PGPFilterKeyDB( PGPKeyDBRef keyDB, PGPFilterRef filter,
- PGPKeySetRef *resultSet );
-
-/* Keyserver filter functions */
-#undef PGPLDAPQueryFromFilter
-PGPError PGPLDAPQueryFromFilter( PGPFilterRef filter, PGPChar8 **queryOut );
-
-#undef PGPLDAPX509QueryFromFilter
-PGPError PGPLDAPX509QueryFromFilter( PGPFilterRef filter,
- PGPChar8 **queryOut );
-
-#undef PGPHKSQueryFromFilter
-PGPError PGPHKSQueryFromFilter( PGPFilterRef filter, PGPChar8 **queryOut );
-
-#undef PGPNetToolsCAHTTPQueryFromFilter
-PGPError PGPNetToolsCAHTTPQueryFromFilter( PGPFilterRef filter,
- PGPChar8 **queryOut );
-
-/*____________________________________________________________________________
- Key/signature validation
-____________________________________________________________________________*/
-
-PGPError PGPCalculateTrust( PGPKeySetRef keySet, PGPKeyDBRef optionalKeyDB);
-
-PGPError PGPCheckKeyRingSigs( PGPKeySetRef keysToCheck,
- PGPKeyDBRef optionalSigningKeyDB, PGPBoolean checkAll,
- PGPEventHandlerProcPtr eventHandler,
- PGPUserValue eventHandlerData );
-
-/*____________________________________________________________________________
- Key DB object creation/deletion
-____________________________________________________________________________*/
-
-PGPError PGPGenerateKey( PGPContextRef context, PGPKeyDBObjRef *key,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPGenerateSubKey( PGPContextRef context, PGPKeyDBObjRef *subkey,
- PGPOptionListRef firstOption, ...);
-
-PGPUInt32 PGPGetKeyEntropyNeeded( PGPContextRef context,
- PGPOptionListRef firstOption, ...);
-
-#undef PGPAddUserID
-PGPError PGPAddUserID( PGPKeyDBObjRef key, PGPChar8 const *userID,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPAddAttributeUserID( PGPKeyDBObjRef key,
- PGPAttributeType attributeType,
- PGPByte *attributeData, PGPSize attributeLength,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPCertifyUserID( PGPKeyDBObjRef userID,
- PGPKeyDBObjRef certifyingKey,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPCopyKeyDBObj( PGPKeyDBObjRef keyDBObj, PGPKeyDBRef destKeyDB,
- PGPKeyDBObjRef *destKeyDBObj );
-
-PGPError PGPCopyKeys( PGPKeySetRef keySet, PGPKeyDBRef destKeyDB,
- PGPKeySetRef *destKeySet );
-
-PGPError PGPDeleteKeyDBObj( PGPKeyDBObjRef keyDBObj );
-
-PGPError PGPDeleteKeys( PGPKeySetRef keySet );
-
-/*____________________________________________________________________________
- Key manipulation
-____________________________________________________________________________*/
-
-PGPError PGPSetPrimaryUserID( PGPKeyDBObjRef userID,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPGetSigCertifierKey( PGPKeyDBObjRef cert,
- PGPKeyDBRef searchKeyDB, PGPKeyDBObjRef *certkey);
-
-PGPError PGPGetSigX509CertifierSig( PGPKeyDBObjRef cert,
- PGPKeyDBRef searchKeyDB, PGPKeyDBObjRef *certsig);
-
-PGPError PGPGetSigX509TopSig( PGPKeyDBObjRef sig,
- PGPKeyDBRef otherdb, PGPKeyDBRef cadb,
- PGPBoolean *knownCA, PGPKeyDBObjRef *certsig );
-
-PGPError PGPGetKnownX509CAs( PGPContextRef context, PGPKeyDBRef *keydbout );
-
-PGPError PGPX509MatchNetworkName( PGPKeyDBObjRef sig, const PGPByte *networkName,
- PGPBoolean *matched );
-
-PGPError PGPCountAdditionalRecipientRequests( PGPKeyDBObjRef basekey,
- PGPUInt32 * numARKeys);
-
-PGPError PGPGetIndexedAdditionalRecipientRequestKey( PGPKeyDBObjRef basekey,
- PGPUInt32 nth, PGPKeyDBObjRef *arkey,
- PGPKeyID *arkeyid, PGPByte *arclass );
-
-PGPError PGPGetAdditionalRecipientRequests( PGPKeyDBObjRef basekey,
- PGPKeySetRef keySet );
-
-PGPError PGPCountRevocationKeys( PGPKeyDBObjRef basekey,
- PGPUInt32 * numRevKeys);
-
-PGPError PGPGetIndexedRevocationKey( PGPKeyDBObjRef basekey, PGPUInt32 nth,
- PGPKeyDBObjRef *revkey, PGPKeyID *revkeyid );
-
-PGPError PGPGetRevocationKeys( PGPKeyDBObjRef basekey, PGPKeySetRef keySet );
-
-PGPError PGPGetCRLDistributionPoints( PGPKeyDBObjRef cakey,
- PGPUInt32 *pnDistPoints, PGPByte **pDpoints,
- PGPSize **pdpointLengths );
-
-PGPError PGPGetCRLDistributionPointsPrintable( PGPKeyDBObjRef cakey,
- PGPUInt32 *pnDistPoints, PGPByte **pDpoints );
-
-PGPError PGPExport( PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPImport( PGPContextRef context, PGPKeyDBRef *importedKeysDB,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPRevokeSig( PGPKeyDBObjRef cert,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPRevoke( PGPKeyDBObjRef key,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPChangePassphrase( PGPKeyDBObjRef key,
- PGPOptionListRef firstOption, ...);
-
-PGPBoolean PGPPassphraseIsValid( PGPKeyDBObjRef key,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPPurgePassphraseCache( PGPContextRef context );
-
-PGPError PGPCountCachedPassphrases( PGPContextRef context,
- PGPUInt32 *pnLocal, PGPUInt32 *pnGlobal,
- PGPUInt32 *pnOtherLocal );
-
-PGPBoolean PGPTokenAuthIsValid( PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-/*
- * Trust values for PGPSetKeyTrust and kPGPKeyPropTrust property:
- *
- * kPGPKeyTrust_Undefined (do not pass to PGPSetKeyTrust)
- * kPGPKeyTrust_Unknown (unknown)
- * kPGPKeyTrust_Never (never)
- * kPGPKeyTrust_Marginal (sometimes)
- * kPGPKeyTrust_Complete (always)
- * kPGPKeyTrust_Ultimate (do not pass to PGPSetKeyTrust)
- */
-
-PGPError PGPSetKeyTrust( PGPKeyDBObjRef key, PGPUInt32 trust);
-
-PGPInt32 PGPCompareKeys( PGPKeyDBObjRef a, PGPKeyDBObjRef b,
- PGPKeyOrdering order );
-
-#undef PGPCompareUserIDStrings
-PGPInt32 PGPCompareUserIDStrings(PGPChar8 const *a, PGPChar8 const *b);
-
-/*____________________________________________________________________________
- Key lists
-____________________________________________________________________________*/
-
-PGPError PGPOrderKeySet( PGPKeySetRef src, PGPKeyOrdering order,
- PGPBoolean reverseOrder, PGPKeyListRef *outRef );
-
-PGPError PGPIncKeyListRefCount( PGPKeyListRef keys);
-
-PGPError PGPFreeKeyList( PGPKeyListRef keys );
-
-/*____________________________________________________________________________
- Key list iteration
-____________________________________________________________________________*/
-
-PGPError PGPNewKeyIter( PGPKeyListRef keys, PGPKeyIterRef *outRef);
-
-PGPError PGPNewKeyIterFromKeySet( PGPKeySetRef keys, PGPKeyIterRef *outRef);
-
-PGPError PGPNewKeyIterFromKeyDB( PGPKeyDBRef keyDB, PGPKeyIterRef *outRef);
-
-PGPError PGPCopyKeyIter( PGPKeyIterRef orig, PGPKeyIterRef *outRef);
-
-PGPError PGPFreeKeyIter( PGPKeyIterRef iter);
-
-PGPInt32 PGPKeyIterIndex( PGPKeyIterRef iter);
-
-PGPError PGPKeyIterRewind( PGPKeyIterRef iter, PGPKeyDBObjType objectType);
-
-PGPInt32 PGPKeyIterSeek( PGPKeyIterRef iter, PGPKeyDBObjRef key);
-
-PGPError PGPKeyIterMove( PGPKeyIterRef iter, PGPInt32 relOffset,
- PGPKeyDBObjRef *outRef);
-
-PGPError PGPKeyIterNextKeyDBObj( PGPKeyIterRef iter,
- PGPKeyDBObjType objectType, PGPKeyDBObjRef *outRef);
-
-PGPError PGPKeyIterPrevKeyDBObj( PGPKeyIterRef iter,
- PGPKeyDBObjType objectType, PGPKeyDBObjRef *outRef);
-
-PGPError PGPKeyIterGetKeyDBObj( PGPKeyIterRef iter,
- PGPKeyDBObjType objectType, PGPKeyDBObjRef *outRef);
-
-
-/*____________________________________________________________________________
- Get/set user value
-____________________________________________________________________________*/
-
-PGPError PGPSetKeyDBObjUserValue( PGPKeyDBObjRef key,
- PGPUserValue userValue);
-
-PGPError PGPGetKeyDBObjUserValue( PGPKeyDBObjRef key,
- PGPUserValue *userValue);
-
-/* Passphrase conversion to passkeybuffer */
-/* The size of the output buffer is from the kPGPKeyPropLockingBits property */
-
-PGPError PGPGetPasskeyBuffer ( PGPKeyDBObjRef key,
- void *passkeyBuffer, PGPOptionListRef firstOption,...);
-
-/* Change key options which are stored in self signatures internally */
-
-PGPError PGPAddKeyOptions( PGPKeyDBObjRef key,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPRemoveKeyOptions( PGPKeyDBObjRef key,
- PGPOptionListRef firstOption, ...);
-
-PGPError PGPUpdateKeyOptions( PGPKeyDBObjRef key,
- PGPOptionListRef firstOption, ...);
-
-/*____________________________________________________________________________
- Key IDs
-____________________________________________________________________________*/
-
-PGPError PGPNewKeyID( const PGPByte *keyIDBytes, PGPSize numKeyIDBytes,
- PGPPublicKeyAlgorithm pkalg, PGPKeyID *id );
-#undef PGPNewKeyIDFromString
-PGPError PGPNewKeyIDFromString( const PGPChar8 *string,
- PGPPublicKeyAlgorithm pkalg, PGPKeyID *id );
-PGPError PGPGetKeyIDAlgorithm( const PGPKeyID *keyID,
- PGPPublicKeyAlgorithm *pkalg );
-
-enum PGPKeyIDStringType_
-{
- kPGPKeyIDString_Abbreviated = 1,
- kPGPKeyIDString_Full = 2,
-
- PGP_ENUM_FORCE( PGPKeyIDStringType_ )
-};
-PGPENUM_TYPEDEF( PGPKeyIDStringType_, PGPKeyIDStringType );
-
-
-#define kPGPMaxKeyIDStringSize ( 127 + 1 )
-#undef PGPGetKeyIDString
-PGPError PGPGetKeyIDString( PGPKeyID const * ref, PGPKeyIDStringType type,
- PGPChar8 outString[ kPGPMaxKeyIDStringSize ] );
-
-/* returns 0 if equal, -1 if key1 < key2, 1 if key1 > key2 */
-PGPInt32 PGPCompareKeyIDs( PGPKeyID const * key, PGPKeyID const * key2);
-
-/*____________________________________________________________________________
- Token functions
-____________________________________________________________________________*/
-
-PGPError PGPCountTokens( PGPContextRef context, PGPUInt32 *numTokens );
-
-PGPError PGPDeleteKeyOnToken( PGPKeyDBObjRef key,
- PGPUInt32 tokNumber /*-1 for any token*/,
- const PGPByte *pin, PGPSize pinLen );
-PGPError PGPWipeToken( PGPContextRef context, PGPUInt32 tokNumber,
- PGPByte const *passphrase, PGPSize passphraseLength );
-PGPError PGPFormatToken( PGPContextRef context, PGPUInt32 tokNumber,
- PGPByte const * adminPin, PGPSize adminPinLen,
- PGPByte const * newUserPin, PGPSize newUserPinLen );
-PGPError PGPTokenPassphraseIsValid( PGPContextRef context,
- PGPUInt32 tokNumber, PGPByte const *passphrase,
- PGPSize passphraseLength );
-
-#undef PGPSetPKCS11DrvFile
-PGPError PGPSetPKCS11DrvFile( PGPChar8 *module );
-
-PGPError PGPSyncTokenKeys( PGPContextRef context, PGPUInt32 tokenNum,
- PGPKeyDBRef destKeyDB, PGPBoolean *hadChanges );
-
-PGPError PGPGetTokenInfoBooleanProperty( PGPContextRef context,
- PGPUInt32 tokenNumber, PGPTokenProperty prop,
- PGPBoolean *value );
-PGPError PGPGetTokenInfoNumericProperty( PGPContextRef context,
- PGPUInt32 tokenNumber, PGPTokenProperty prop,
- PGPUInt32 *value );
-#undef PGPGetTokenInfoDataProperty
-PGPError PGPGetTokenInfoDataProperty( PGPContextRef context,
- PGPUInt32 tokenNumber, PGPTokenProperty prop,
- void *value, PGPSize size, PGPSize *sizeout );
-
-/* Deprecated, use PGPGetTokenInfo*() */
-PGPError PGPGetTokenInfo( PGPContextRef context,
- PGPUInt32 tokNumber, PGPTokenInfo *tokenInfo);
-
-/*____________________________________________________________________________
- Getting contexts back from key related items.
-____________________________________________________________________________*/
-
-PGPContextRef PGPPeekKeyDBContext( PGPKeyDBRef ref );
-PGPContextRef PGPPeekKeyDBObjContext( PGPKeyDBObjRef ref );
-PGPContextRef PGPPeekKeyListContext( PGPKeyListRef ref );
-PGPContextRef PGPPeekKeySetContext( PGPKeySetRef ref );
-PGPContextRef PGPPeekKeyIterContext( PGPKeyIterRef ref );
-
-/*____________________________________________________________________________
- Getting parent objects from key related items. If the input is invalid,
- you get kInvalidPGPKeyDBObjRef back.
-____________________________________________________________________________*/
-
-PGPKeyDBRef PGPPeekKeyDBObjKeyDB( PGPKeyDBObjRef ref );
-PGPKeyDBObjRef PGPPeekKeyDBObjKey( PGPKeyDBObjRef ref );
-PGPKeyDBObjRef PGPPeekKeyDBObjUserID( PGPKeyDBObjRef ref );
-
-/*____________________________________________________________________________
- Secret sharing functionality
-____________________________________________________________________________*/
-
-PGPError PGPSecretShareData(PGPContextRef context,
- void const * input, PGPSize inputBytes,
- PGPUInt32 threshold, PGPUInt32 nShares, void * output);
-
-PGPError PGPSecretReconstructData(PGPContextRef context,
- void * input, PGPSize outputBytes,
- PGPUInt32 nShares, void * output);
-
-/*____________________________________________________________________________
- X509 certificate specific
-____________________________________________________________________________*/
-
-PGPError PGPVerifyX509CertificateChain (PGPContextRef context,
- PGPByte *certchain, PGPByte *rootcerts);
-
-#undef PGPCreateDistinguishedName
-PGPError PGPCreateDistinguishedName( PGPContextRef context,
- PGPChar8 const *str, PGPByte **pdname, PGPSize *pdnamelen );
-
-PGPError PGPCreateX509Certificate(PGPKeyDBObjRef signingSig,
- PGPKeyDBObjRef signedKey, PGPKeyDBObjRef *newSig,
- PGPOptionListRef firstOption, ...);
-
-/* Pass PKCS-10 format request in PGPOInput.... */
-PGPError PGPCreateX509CertificateFromRequest(PGPKeyDBObjRef signingSig,
- PGPKeyDBObjRef *newSig, PGPOptionListRef firstOption, ...);
-
-PGPError PGPCreateSelfSignedX509Certificate(PGPKeyDBObjRef signingKey,
- PGPKeyDBObjRef *newSig, PGPOptionListRef firstOption, ...);
-
-PGPError PGPCreateX509CRL(PGPKeyDBObjRef signingKey,
- PGPKeySetRef revokedSigs,
- PGPOptionListRef firstOption, ...);
-
-
-
-PGP_END_C_DECLARATIONS
-
-
-#endif /* ] Included_pgpKeys_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpLDAP.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpLDAP.h
deleted file mode 100644
index 1cdce41630..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpLDAP.h
+++ /dev/null
@@ -1,722 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpLDAP.h,v 1.24 2004/01/23 08:12:49 dallen Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpLDAP_h /* [ */
-#define Included_pgpLDAP_h
-
-#include "pgpBase.h"
-#include "pgpPubTypes.h"
-#include "pgpMemoryMgr.h"
-#include "pgpSockets.h"
-#include "pgpBER.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-/* LDAP parameters and constants */
-#define kPGPldap_DefaultPort 389
-#define kPGPldap_DefaultSecurePort 636
-#define kPGPldap_DefaultVersion 2
-
-#define kPGPldapScopeString_Base PGPTXT_MACHINE8("base")
-#define kPGPldapScopeString_OneLevel PGPTXT_MACHINE8("one")
-#define kPGPldapScopeString_Subtree PGPTXT_MACHINE8("sub")
-
-#define kPGPldap_DefaultFilterString PGPTXT_MACHINE8("(objectclass=*)")
-
-
-
-/* Session options */
-#define kPGPldapOpt_Deref 1
-#define kPGPldapOpt_Sizelimit 2
-#define kPGPldapOpt_Timelimit 3
-#define kPGPldapOpt_Desc 4
-
-#define kPGPldapOpt_ON ((void *) 1)
-#define kPGPldapOpt_OFF ((void *) 0)
-
-enum PGPldapResult_
-{
- kPGPldapResult_Success = 0x00,
- kPGPldapResult_OperationsError = 0x01,
- kPGPldapResult_ProtocolError = 0x02,
- kPGPldapResult_TimelimitExceeded = 0x03,
- kPGPldapResult_SizelimitExceeded = 0x04,
- kPGPldapResult_CompareFalse = 0x05,
- kPGPldapResult_CompareTrue = 0x06,
- kPGPldapResult_StrongAuthNotSupported = 0x07,
- kPGPldapResult_StrongAuthRequired = 0x08,
- kPGPldapResult_PartialResults = 0x09,
- kPGPldapResult_NoSuchAttribute = 0x10,
- kPGPldapResult_UndefinedType = 0x11,
- kPGPldapResult_InappropriateMatching = 0x12,
- kPGPldapResult_ConstraintViolation = 0x13,
- kPGPldapResult_TypeOrValueExists = 0x14,
- kPGPldapResult_InvalidSyntax = 0x15,
- kPGPldapResult_NoSuchObject = 0x20,
- kPGPldapResult_AliasProblem = 0x21,
- kPGPldapResult_InvalidDNSyntax = 0x22,
- kPGPldapResult_IsLeaf = 0x23,
- kPGPldapResult_AliasDerefProblem = 0x24,
- kPGPldapResult_InappropriateAuth = 0x30,
- kPGPldapResult_InvalidCredentials = 0x31,
- kPGPldapResult_InsufficientAccess = 0x32,
- kPGPldapResult_Busy = 0x33,
- kPGPldapResult_Unavailable = 0x34,
- kPGPldapResult_UnwillingToPerform = 0x35,
- kPGPldapResult_LoopDetect = 0x36,
- kPGPldapResult_NamingViolation = 0x40,
- kPGPldapResult_ObjectClassViolation = 0x41,
- kPGPldapResult_NotAllowedOnNonleaf = 0x42,
- kPGPldapResult_NotAllowedOnRDN = 0x43,
- kPGPldapResult_AlreadyExists = 0x44,
- kPGPldapResult_NoObjectClassMods = 0x45,
- kPGPldapResult_ResultsTooLarge = 0x46,
- kPGPldapResult_Other = 0x50,
- kPGPldapResult_ServerDown = 0x51,
- kPGPldapResult_LocalError = 0x52,
- kPGPldapResult_EncodingError = 0x53,
- kPGPldapResult_DecodingError = 0x54,
- kPGPldapResult_Timeout = 0x55,
- kPGPldapResult_AuthUnknown = 0x56,
- kPGPldapResult_FilterError = 0x57,
- kPGPldapResult_UserCancelled = 0x58,
- kPGPldapResult_ParamError = 0x59,
- kPGPldapResult_NoMemory = 0x5a,
- kPGPldapResult_ConnectError = 0x5b,
-
- kPGPldapResult_None = 0xFFFFFFFF
-};
-PGPENUM_TYPEDEF (PGPldapResult_, PGPldapResult);
-
-enum PGPldapType_
-{
- kPGPldapType_None = 0,
-
- kPGPldapRequest_Bind = 0x60, /* application + constructed */
- kPGPldapRequest_Unbind = 0x42, /* application + primitive */
- kPGPldapRequest_Search = 0x63, /* application + constructed */
- kPGPldapRequest_Modify = 0x66, /* application + constructed */
- kPGPldapRequest_Add = 0x68, /* application + constructed */
- kPGPldapRequest_Delete = 0x4A, /* application + primitive */
- kPGPldapRequest_ModifyRDN = 0x6C, /* application + constructed */
- kPGPldapRequest_Compare = 0x6E, /* application + constructed */
- kPGPldapRequest_Abandon = 0x50, /* application + primitive */
-
- kPGPldapResponse_Bind = 0x61, /* application + constructed */
- kPGPldapResponse_SearchEntry = 0x64, /* application + constructed */
- kPGPldapResponse_SearchResult = 0x65, /* application + constructed */
- kPGPldapResponse_Modify = 0x67, /* application + constructed */
- kPGPldapResponse_Add = 0x69, /* application + constructed */
- kPGPldapResponse_Delete = 0x6B, /* application + constructed */
- kPGPldapResponse_ModifyRDN = 0x6D, /* application + constructed */
- kPGPldapResponse_Compare = 0x6F, /* application + constructed */
-
- kPGPldapResponse_Any = 0xFFFFFFFF
-};
-PGPENUM_TYPEDEF (PGPldapType_, PGPldapType);
-
-enum PGPldapScope_
-{
- kPGPldapScope_Base = 0,
- kPGPldapScope_OneLevel = 1,
- kPGPldapScope_Subtree = 2,
-
- kPGPldapScope_None = -1
-};
-PGPENUM_TYPEDEF (PGPldapScope_, PGPldapScope);
-
-enum PGPldapDeref_
-{
- kPGPldapDeref_Never = 0,
- kPGPldapDeref_Searching = 1,
- kPGPldapDeref_Finding = 2,
- kPGPldapDeref_Always = 3
-};
-PGPENUM_TYPEDEF (PGPldapDeref_, PGPldapDeref);
-
-enum PGPldapAuth_
-{
- kPGPldapAuth_Simple = 0x80 /* context-specific + primitive, tag = 0 */
- /* Not implemented -- kPGPldapAuth_Kerb41 = 0x81, */
- /* Not implemented -- kPGPldapAuth_Kerb42 = 0x82 */
-};
-PGPENUM_TYPEDEF (PGPldapAuth_, PGPldapAuth);
-
-enum PGPldapFilter_
-{
- kPGPldapFilter_And = 0xA0, /* context specific + constructed, tag = 0 */
- kPGPldapFilter_Or = 0xA1, /* context specific + constructed, tag = 1 */
- kPGPldapFilter_Not = 0xA2, /* context specific + constructed, tag = 2 */
- kPGPldapFilter_Equal = 0xA3, /* context specific + constructed, tag = 3 */
- kPGPldapFilter_Substrings = 0xA4, /* context specific + constructed, tag = 4 */
- kPGPldapFilter_GE = 0xA5, /* context specific + constructed, tag = 5 */
- kPGPldapFilter_LE = 0xA6, /* context specific + constructed, tag = 6 */
- kPGPldapFilter_Present = 0x87, /* context specific + primitive, tag = 7 */
- kPGPldapFilter_Approx = 0xA8, /* context specific + constructed, tag = 8 */
-
- kPGPldapFilter_None = (-1L)
-};
-PGPENUM_TYPEDEF( PGPldapFilter_, PGPldapFilter );
-
-enum PGPldapSubstring_
-{
- kPGPldapSubstring_Initial = 0x80, /* context specific + primitive, tag = 0 */
- kPGPldapSubstring_Any = 0x81, /* context specific + primitive, tag = 1 */
- kPGPldapSubstring_Final = 0x82, /* context specific + primitive, tag = 2 */
-
- kPGPldapSubstring_None = (-1L)
-};
-PGPENUM_TYPEDEF( PGPldapSubstring_, PGPldapSubstring );
-
-enum PGPldapModOp_
-{
- kPGPldapModOp_Add = 0x00,
- kPGPldapModOp_Delete = 0x01,
- kPGPldapModOp_Replace = 0x02,
-
- kPGPldapModOp_None = (-1L)
-};
-PGPENUM_TYPEDEF( PGPldapModOp_, PGPldapModOp );
-
-#define kPGPldapModOpMask_UseBERValues 0x10
-
-
-/* LDAP Data types: typedefs, structs, and whatnot */
-
-typedef PGPUInt32 PGPldapMessageID;
-
-#define kPGPldapMessageID_Any ( (PGPldapMessageID) -1 )
-#define kInvalidPGPldapMessageID ( (PGPldapMessageID) 0 )
-#define PGPldapMessageIDIsValid(messageID) \
- ( (messageID) != kInvalidPGPldapMessageID )
-#define PGPValidateLDAPMessageID(messageID) \
- PGPValidateParam( PGPldapMessageIDIsValid( messageID ) )
-
-typedef struct PGPldapContext * PGPldapContextRef;
-
-#define kInvalidPGPldapContextRef ( (PGPldapContextRef) NULL )
-#define PGPldapContextRefIsValid(pgpLDAP) \
- ( (pgpLDAP) != kInvalidPGPldapContextRef )
-#define PGPValidateLDAPContextRef(context) \
- PGPValidateParam( PGPldapContextRefIsValid( context ) )
-
-typedef struct PGPldapMessage * PGPldapMessageRef;
-
-#define kInvalidPGPldapMessageRef ( (PGPldapMessageRef) NULL)
-#define PGPldapMessageRefIsValid(message) \
- ( (message) != kInvalidPGPldapMessageRef )
-#define PGPValidateLDAPMessageRef(message) \
- PGPValidateParam( PGPldapMessageRefIsValid( message ) )
-
-
-#define IsPGPldapError(err) \
- ( ( (err) >= kPGPError_LDAPMIN ) && ( (err) <= kPGPError_LDAPMAX ) )
-
-
-/* Callbacks for using LDAP functions in multithreaded apps */
-typedef struct PGPldapThreadFns
-{
- void * (*pgpLDAPThread_MutexAlloc) (void);
- void (*pgpLDAPThread_MutexFree) (void *);
- PGPError (*pgpLDAPThread_MutexLock) (void *);
- PGPError (*pgpLDAPThread_MutexUnlock) (void *);
- void (*pgpLDAPThread_SetErrno) (int);
- PGPError (*pgpLDAPThread_GetErrno) (void);
- void (*pgpLDAPThread_SetLDAPErrno) (PGPInt32, PGPChar8 *, PGPChar8 *);
- PGPInt32 (*pgpLDAPThread_GetLDAPErrno) (PGPChar8 **, PGPChar8 **);
-} PGPldapThreadFns;
-
-typedef struct PGPldapMod
-{
- PGPldapModOp op;
- PGPChar8 * type;
-
- PGPChar8 ** value;
- PGPberValue ** bvalue;
-} PGPldapMod;
-
-typedef struct PGPldapURLDesc
-{
- PGPChar8 * host;
- PGPUInt16 port;
-
- PGPChar8 * dn;
- PGPChar8 ** attrs;
-
- PGPldapScope scope;
- PGPChar8 * filter;
-
-} PGPldapURLDesc;
-
-typedef PGPError (* PGPldapRebindProcPtr )(
- PGPldapContextRef pgpLDAP,
- PGPChar8 ** dnp,
- PGPChar8 ** pwp,
- PGPInt32 * method,
- PGPBoolean freeIt,
- PGPChar8 * arg );
-
-
-/* LDAP function prototypes */
-/*
- * Above each function is the name of the analogous function
- * in the UMich or Netscape LDAP SDK. While there are some subtle
- * differences, for the most part, each function works basically
- * the same as it's UMich/Netscape SDK counterpart.
- */
-
-/* Memory management functions */
- PGPError
-PGPNewLDAPContext(
- PGPContextRef context,
- PGPldapContextRef *pgpLDAP );
-
- PGPError
-PGPNewLDAPMessage(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef * message );
-
- PGPError
-PGPFreeLDAPContext(
- PGPldapContextRef pgpLDAP );
-
- PGPError
-PGPFreeLDAPMessage(
- PGPldapMessageRef message );
-
- /* ldap_value_free */
- PGPError
-PGPFreeLDAPValues(
- PGPChar8 ** vals );
-
- /* ldap_value_free_len */
- PGPError
-PGPFreeLDAPValuesLen(
- PGPberValue ** bvals );
-
- PGPError
-PGPFreeLDAPURLDesc(
- PGPldapURLDesc * lud );
-
-
-/* Result-handling functions */
- /* ldap_get_lderrno */
- PGPError
-PGPldapGetErrno(
- PGPldapContextRef pgpLDAP,
- PGPChar8 ** matched,
- PGPChar8 ** message,
- PGPldapResult * result );
-
- PGPError
-PGPldapResultToError(
- PGPldapContextRef pgpLDAP,
- PGPldapResult result );
-
-/* LDAP option functions */
- /* ldap_set_option */
- PGPError
-PGPldapSetOption(
- PGPldapContextRef pgpLDAP,
- PGPUInt32 option,
- void * value );
-
- /* ldap_get_option */
- PGPError
-PGPldapGetOption(
- PGPldapContextRef pgpLDAP,
- PGPUInt32 option,
- void * value );
-
-
-/* Connection starting and stopping functions */
- /* ldap_open */
- PGPError
-PGPldapOpen(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * host,
- PGPUInt16 port );
-
- PGPError
-PGPldapOpenTimeout(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * host,
- PGPUInt16 port,
- PGPSocketsTimeValue *tv );
-
- /* ldap_simple_bind_s */
- PGPError
-PGPldapSimpleBindSync(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPChar8 * password );
-
- /* ldap_simple_bind_st (extension) */
- PGPError
-PGPldapSimpleBindSyncTimeout(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPChar8 * password,
- PGPSocketsTimeValue *tv);
-
- /* ldap_simple_bind */
- PGPError
-PGPldapSimpleBind(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPChar8 * password,
- PGPldapMessageID * messageID );
-
- /* ldap_bind_s */
- PGPError
-PGPldapBindSync(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPChar8 * password,
- PGPldapAuth method );
-
- /* ldap_bind */
- PGPError
-PGPldapBind(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPChar8 * password,
- PGPldapAuth method,
- PGPldapMessageID * messageID );
-
- /* ldap_unbind */
- PGPError
-PGPldapUnbind(
- PGPldapContextRef pgpLDAP );
-
-
-/* Searching functions */
- /* ldap_search_s */
- PGPError
-PGPldapSearchSync(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * base,
- PGPldapScope scope,
- PGPChar8 * filter,
- PGPChar8 * attrs[],
- PGPBoolean attrsOnly,
- PGPldapMessageRef resultMessage );
-
- /* ldap_search_st */
- PGPError
-PGPldapSearchSyncTimeout(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * base,
- PGPldapScope scope,
- PGPChar8 * filter,
- PGPChar8 * attrs[],
- PGPBoolean attrsOnly,
- PGPSocketsTimeValue * tv,
- PGPldapMessageRef resultMessage );
-
- /* ldap_search */
- PGPError
-PGPldapSearch(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * base,
- PGPldapScope scope,
- PGPChar8 * filter,
- PGPChar8 * attrs[],
- PGPBoolean attrsOnly,
- PGPldapMessageID * messageID );
-
- /* ldap_count_entries */
- PGPError
-PGPldapCountEntries(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef result,
- PGPInt32 * num );
-
- /* ldap_first_entry */
- PGPError
-PGPldapFirstEntry(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef result,
- PGPldapMessageRef * outMessage );
-
- /* ldap_next_entry */
- PGPError
-PGPldapNextEntry(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef prevEntry,
- PGPldapMessageRef * outMessage );
-
- /* ldap_get_dn */
- PGPError
-PGPldapGetDN(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef entry,
- PGPChar8 ** dn ); /* Should be freed by PGPFreeData */
-
- /* ldap_first_attribute */
- PGPError
-PGPldapFirstAttribute(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef entry,
- PGPberElementRef * ber,
- PGPChar8 ** attr ); /* Should be freed by PGPFreeData */
-
- /* ldap_next_attribute */
- PGPError
-PGPldapNextAttribute(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef entry,
- PGPberElementRef ber,
- PGPChar8 ** attr ); /* Should be freed by PGPFreeData */
-
- /* ldap_get_values */
- PGPError
-PGPldapGetValues(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef entry,
- PGPChar8 * attr,
- PGPChar8 *** values ); /* Should be freed by PGPFreeLDAPValues */
-
- /* ldap_get_values_len */
- PGPError
-PGPldapGetValuesLen(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef entry,
- PGPChar8 * attr,
- PGPberValue *** values ); /* Should be freed by PGPFreeLDAPValuesLen */
-
- /* ldap_count_values */
- PGPError
-PGPldapCountValues(
- PGPldapContextRef pgpLDAP,
- PGPChar8 ** values,
- PGPSize * num );
-
- /* ldap_count_values_len */
- PGPError
-PGPldapCountValuesLen(
- PGPldapContextRef pgpLDAP,
- PGPberValue ** values,
- PGPSize * num );
-
-
-/* Update functions */
-
- /* ldap_modify */
- PGPError
-PGPldapModify(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPldapMod * mod[],
- PGPldapMessageID * messageID );
-
- /* ldap_modify_s */
- PGPError
-PGPldapModifySync(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPldapMod * mod[] );
-
- /* ldap_modify_st (extension) */
- PGPError
-PGPldapModifySyncTimeout(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPldapMod * mod[],
- PGPSocketsTimeValue *tv);
-
- /* ldap_add */
- PGPError
-PGPldapAdd(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPldapMod * mod[],
- PGPldapMessageID * messageID );
-
- /* ldap_add_s */
- PGPError
-PGPldapAddSync(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPldapMod * mod[] );
-
- /* ldap_add_st (extension) */
- PGPError
-PGPldapAddSyncTimeout(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPldapMod * mod[],
- PGPSocketsTimeValue *tv );
-
- /* ldap_delete */
- PGPError
-PGPldapDelete(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPldapMessageID * messageID );
-
- /* ldap_delete_s */
- PGPError
-PGPldapDeleteSync(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn );
-
- /* ldap_delete_st (extension) */
- PGPError
-PGPldapDeleteSyncTimeout(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPSocketsTimeValue *tv);
-
- /* ldap_modrdn2 */
- PGPError
-PGPldapModifyRDN(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPChar8 * newRDN,
- PGPBoolean deleteOldRDN,
- PGPldapMessageID * messageID );
-
- /* ldap_modrdn2_s */
- PGPError
-PGPldapModifyRDNSync(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPChar8 * newRDN,
- PGPBoolean deleteOldRDN );
-
- /* ldap_compare */
- PGPError
-PGPldapCompare(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPChar8 * type,
- PGPChar8 * value,
- PGPldapMessageID * messageID );
-
- /* ldap_compare_s */
- PGPError
-PGPldapCompareSync(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPChar8 * type,
- PGPChar8 * value,
- PGPBoolean * equal );
-
- PGPError
-PGPldapGetCompareResult(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageID messageID,
- PGPBoolean * equal );
-
-
-/* Other functions */
- /* ldap_result */
- PGPError
-PGPldapGetResult(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageID messageID,
- PGPBoolean all,
- PGPSocketsTimeValue * timeout,
- PGPldapMessageRef result,
- PGPldapType * messageType );
-
- /* ldap_abandon */
- PGPError
-PGPldapAbandon(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageID messageID );
-
- /* ldap_msgid */
- PGPError
-PGPldapGetMessageID(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef result,
- PGPldapMessageID * messageID );
-
- /* ldap_is_ldap_url */
- PGPError
-PGPldapIsLDAPURL(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * url,
- PGPBoolean * isURL );
-
- /* ldap_url_parse */
- PGPError
-PGPldapURLParse(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * url,
- PGPldapURLDesc ** outLDAPDesc ); /* Should be freed by PGPFreeLDAPURLDesc */
-
- /* ldap_url_search */
- PGPError
-PGPldapURLSearch(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * url,
- PGPBoolean attrsOnly,
- PGPldapMessageID * messageID );
-
- /* ldap_url_search */
- PGPError
-PGPldapURLSearchSync(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * url,
- PGPBoolean attrsOnly,
- PGPldapMessageRef resultMessage );
-
- /* ldap_url_search */
- PGPError
-PGPldapURLSearchSyncTimeout(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * url,
- PGPBoolean attrsOnly,
- PGPSocketsTimeValue * tv,
- PGPldapMessageRef resultMessage );
-
- /* ldap_explode_dn */
- PGPError
-PGPldapExplodeDN(
- PGPldapContextRef pgpLDAP,
- PGPChar8 * dn,
- PGPBoolean noTypes,
- PGPChar8 *** components ); /* Should be freed by PGPFreeLDAPValues */
-
- /* ldap_sort_entries */
- PGPError
-PGPldapSortEntries(
- PGPldapContextRef pgpLDAP,
- PGPldapMessageRef chain,
- PGPChar8 * attr,
- PGPInt32 (*compare)( PGPChar8 ** a, PGPChar8 ** b ),
- PGPldapMessageRef sortedChain );
-
- /* ldap_sort_values */
- PGPError
-PGPldapSortValues(
- PGPldapContextRef pgpLDAP,
- PGPChar8 ** vals,
- PGPInt32 (*compare)( PGPChar8 ** a, PGPChar8 ** b ),
- PGPChar8 *** sortedVals );
-
- /* ldap_sort_strcasecmp */
- PGPInt32
-PGPldapCompareStringsIgnoreCase(
- PGPChar8 ** s1,
- PGPChar8 ** s2 );
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpLDAP_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpMemoryMgr.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpMemoryMgr.h
deleted file mode 100644
index 1a86a22a46..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpMemoryMgr.h
+++ /dev/null
@@ -1,220 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpMemoryMgr.h,v 1.9 2003/11/08 04:04:49 ajivsov Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpMemoryMgr_h /* [ */
-#define Included_pgpMemoryMgr_h
-
-#include "pgpBase.h"
-
-/*____________________________________________________________________________
- Mini-tutorial:
-
- A PGPMemoryMgr is an object which implements memory management, including
- allocation, reallocation, deallocation, and secure versions of the same.
-
- *** Using it ***
- A typical sequence of calls is as follows:
- PGPNewMemoryMgr
- ...
- PGPNewData or PGPNewSecureData
- PGPFreeData
- ...
- PGPFreeMemoryMgr
-
- Typically, a program will create one PGPMemoryMgr per thread at
- thread creation time and use that memory mgr until the thread dies.
- Generally, an individual PGPMemoryMgr instance is not thread-safe;
- you must either synchronize or use one PGPMemoryMgr per thread.
-
-
- *** Custom Allocators ***
-
- Default allocators are supplied, but the client can create a custom
- PGPMemoryMgr using PGPNewMemoryMgrCustom() which uses client-supplied
- routines.
- Custom routines need only concern themselves with the actual
- allocation and deallocation.
- The following should be kept in mind for user supplied routines:
- - they can ignore the allocation flags passed
- - leaks, memory clearing, etc is done by the PGPMemoryMgr
- - secure allocator must set 'isNonPageable' to TRUE only if the
- memory really can't be paged.
- - the user value is not interpreted by the PGPMemoryMgr. Typically,
- it would be a pointer to some data the allocation routines use
- to store state.
-
-
- *** Secure memory allocation ***
-
- Blocks can be allocated as "Secure" blocks. Secure blocks are guaranteed
- to be wiped when they are deallocated. Additionally, if the operating
- system and the current conditions allow, the block will be allocated
- in non-pageable memory. You can determine the attributes of a block using
- PGPGetMemoryMgrDataInfo().
-
-
- *** Leaks tracking ***
-
- Leaks tracking is implemented when debugging is on,
- but currently reporting is limited to reporting the number of leaks
- outstanding when the PGPMemoryMgr is disposed.
-
-
- *** Debugging ***
-
- For debugging purposes, blocks may be larger in debug mode to accomodate
- various schemes to detect stray pointers, etc.
-____________________________________________________________________________*/
-
-#if PGP_MACINTOSH
-#pragma options align=mac68k
-#endif
-
-enum
-{
- kPGPMemoryMgrFlags_None = 0,
- kPGPMemoryMgrFlags_Clear = 1
-};
-
-typedef PGPFlags PGPMemoryMgrFlags;
-
-typedef struct PGPMemoryMgr * PGPMemoryMgrRef;
-
-#define kInvalidPGPMemoryMgrRef ((PGPMemoryMgrRef) NULL)
-#define PGPMemoryMgrRefIsValid(ref) ((ref) != kInvalidPGPMemoryMgrRef)
-
-typedef void *(*PGPMemoryMgrAllocationProc)( PGPMemoryMgrRef mgr,
- PGPUserValue userValue,
- PGPSize requestSize, PGPMemoryMgrFlags flags );
-
-/* realloc not be implemented using PGPNewData() */
-typedef PGPError (*PGPMemoryMgrReallocationProc)( PGPMemoryMgrRef mgr,
- PGPUserValue userValue,
- void **allocation, PGPSize newAllocationSize,
- PGPMemoryMgrFlags flags, PGPSize existingSize );
-
-typedef PGPError (*PGPMemoryMgrDeallocationProc)( PGPMemoryMgrRef mgr,
- PGPUserValue userValue,
- void *allocation, PGPSize allocationSize );
-
-
-typedef void *(*PGPMemoryMgrSecureAllocationProc)( PGPMemoryMgrRef mgr,
- PGPUserValue userValue,
- PGPSize requestSize, PGPMemoryMgrFlags flags,
- PGPBoolean *isNonPageable );
-
-
-/* deallocation proc need not clear the memory upon deallocation since
- PGPFreeData() does it automatically */
-typedef PGPError (*PGPMemoryMgrSecureDeallocationProc)( PGPMemoryMgrRef mgr,
- PGPUserValue userValue,
- void *allocation, PGPSize allocationSize,
- PGPBoolean wasLocked );
-
-typedef struct PGPNewMemoryMgrStruct
-{
- /* sizeofStruct must be inited to sizeof( PGPNewMemoryMgrStruct ) */
- PGPUInt32 sizeofStruct;
- PGPFlags reservedFlags;
-
- PGPMemoryMgrAllocationProc allocProc;
- PGPMemoryMgrReallocationProc reallocProc;
- PGPMemoryMgrDeallocationProc deallocProc;
-
- PGPMemoryMgrSecureAllocationProc secureAllocProc;
- void * reserved; /* MUST be zeroed */
- PGPMemoryMgrSecureDeallocationProc secureDeallocProc;
-
- PGPUserValue customValue;
- void * pad[ 8 ]; /* MUST be zeroed */
-} PGPNewMemoryMgrStruct;
-
-PGP_BEGIN_C_DECLARATIONS
-
-
-/*____________________________________________________________________________
- Memory Mgr routines
-____________________________________________________________________________*/
-
-PGPError PGPNewMemoryMgr( PGPFlags reserved, PGPMemoryMgrRef *newMemoryMgr );
-
-PGPError PGPNewMemoryMgrCustom( PGPNewMemoryMgrStruct const * custom,
- PGPMemoryMgrRef *newMemoryMgr );
-
-PGPError PGPFreeMemoryMgr( PGPMemoryMgrRef mgr );
-
-PGPError PGPGetMemoryMgrCustomValue( PGPMemoryMgrRef mgr,
- PGPUserValue *customValue );
-PGPError PGPSetMemoryMgrCustomValue( PGPMemoryMgrRef mgr,
- PGPUserValue customValue );
-
-PGPError PGPValidateMemoryMgr( PGPMemoryMgrRef mgr );
-
-/* allocate a block of the specified size */
-void * PGPNewData( PGPMemoryMgrRef mgr,
- PGPSize requestSize, PGPMemoryMgrFlags flags );
-
-/* allocate a block of the specified size in non-pageable memory */
-/* *isSecure is TRUE if the block definitely can't be paged */
-void * PGPNewSecureData( PGPMemoryMgrRef mgr,
- PGPSize requestSize, PGPMemoryMgrFlags flags );
-
-/* properly reallocs secure or non-secure blocks */
-/* WARNING: the block may move, even if its size is being reduced */
-PGPError PGPReallocData( PGPMemoryMgrRef mgr,
- void **allocation, PGPSize newAllocationSize,
- PGPMemoryMgrFlags flags );
-
-/* properly frees secure or non-secure blocks */
-PGPError PGPFreeData( void *allocation );
-
-
-/*____________________________________________________________________________
- Block Info:
- kPGPMemoryMgrBlockInfo_Valid it's a valid block
- kPGPMemoryMgrBlockInfo_Secure block is a secure allocation
- kPGPMemoryMgrBlockInfo_NonPageable block cannot be paged by VM
-
- Secure blocks are always wiped before being disposed,
- but may or may not be pageable, depending on the OS facilities. Some
- OSs may not provide the ability to make blocks non-pageable.
-
- You should check these flags if the information matters to you.
-____________________________________________________________________________*/
-#define kPGPMemoryMgrBlockInfo_Valid ( ((PGPFlags)1) << 0 )
-#define kPGPMemoryMgrBlockInfo_Secure ( ((PGPFlags)1) << 1 )
-#define kPGPMemoryMgrBlockInfo_NonPageable ( ((PGPFlags)1) << 2 )
-PGPFlags PGPGetMemoryMgrDataInfo( void *allocation );
-
-
-/*____________________________________________________________________________
- Default memory manager routines:
-____________________________________________________________________________*/
-
-PGPMemoryMgrRef PGPGetDefaultMemoryMgr(void);
-PGPError PGPSetDefaultMemoryMgr(PGPMemoryMgrRef memoryMgr);
-
-
-PGP_END_C_DECLARATIONS
-
-
-
-#if PGP_MACINTOSH
-#pragma options align=reset
-#endif
-
-
-#endif /* ] Included_pgpMemoryMgr_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpOptionList.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpOptionList.h
deleted file mode 100644
index a0ef6ceab6..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpOptionList.h
+++ /dev/null
@@ -1,542 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- This file contains the types and prototypes for functions which manipulate
- PGPOptionList data structures.
-
- $Id: pgpOptionList.h,v 1.43 2004/05/15 02:48:39 ajivsov Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpOptionList_h /* [ */
-#define Included_pgpOptionList_h
-
-#include <stdarg.h>
-
-#include "pgpPubTypes.h"
-
-#if PGP_MACINTOSH
-#include <Files.h>
-#elif PGP_OSX
- struct FSSpec;
-#endif
-
-/* Standard event callback declaration */
-struct PGPEvent;
-typedef PGPError (*PGPEventHandlerProcPtr)(PGPContextRef context,
- struct PGPEvent *event, PGPUserValue userValue);
-
-/* Export formats for exporting functions */
-enum PGPExportFormat_
-{
- kPGPExportFormat_Basic = 1,
- kPGPExportFormat_Complete = 255,
-
- kPGPExportFormat_TokenKeyContainer = 256,
-
- kPGPExportFormat_X509Cert = 10000,
- kPGPExportFormat_PKCS8,
-
- kPGPExportFormat_X509CertReq = 11000,
- kPGPExportFormat_NetToolsCAV1_CertReq,
- kPGPExportFormat_VerisignV1_CertReq,
- kPGPExportFormat_EntrustV1_CertReq,
- kPGPExportFormat_NetscapeV1_CertReq,
- kPGPExportFormat_MicrosoftV1_CertReq,
-
- kPGPExportFormat_X509GetCertInitial = 11010,
- kPGPExportFormat_NetToolsCAV1_GetCertInitial,
- kPGPExportFormat_VerisignV1_GetCertInitial,
- kPGPExportFormat_EntrustV1_GetCertInitial,
- kPGPExportFormat_NetscapeV1_GetCertInitial,
- kPGPExportFormat_MicrosoftV1_GetCertInitial,
-
- kPGPExportFormat_X509GetCRL = 11020,
- kPGPExportFormat_NetToolsCAV1_GetCRL,
- kPGPExportFormat_VerisignV1_GetCRL,
- kPGPExportFormat_EntrustV1_GetCRL,
- kPGPExportFormat_NetscapeV1_GetCRL,
- kPGPExportFormat_MicrosoftV1_GetCRL,
-
- PGP_ENUM_FORCE( PGPExportFormat_ )
-};
-PGPENUM_TYPEDEF( PGPExportFormat_, PGPExportFormat );
-
-/* Input formats for PGPOInputFormat */
-enum PGPInputFormat_
-{
- kPGPInputFormat_Unknown = 0,
- kPGPInputFormat_PGP = 1,
-
- kPGPInputFormat_X509DataInPKCS7 = 10000,
- kPGPInputFormat_NetToolsCAV1_DataInPKCS7,
- kPGPInputFormat_VerisignV1_DataInPKCS7,
- kPGPInputFormat_EntrustV1_DataInPKCS7,
- kPGPInputFormat_MicrosoftV1_DataInPKCS7,
- kPGPInputFormat_NetscapeV1_DataInPKCS7,
-
- kPGPInputFormat_PEMEncodedX509Cert,
- kPGPInputFormat_NetToolsCAV1_PEMEncoded,
- kPGPInputFormat_VerisignV1_PEMEncoded,
- kPGPInputFormat_EntrustV1_PEMEncoded,
- kPGPInputFormat_MicrosoftV1_PEMEncoded,
- kPGPInputFormat_NetscapeV1_PEMEncoded,
-
- /* Input formats for X.509 private keys */
- kPGPInputFormat_PrivateKeyInfo,
- kPGPInputFormat_PKCS12,
-
- kPGPInputFormat_SMIMEBody = 12000,
- kPGPInputFormat_SMIMEBodySignedData = 12001,
- kPGPInputFormat_SMIMEBodyEncryptedData = 12002,
-
- PGP_ENUM_FORCE( PGPInputFormat_ )
-};
-PGPENUM_TYPEDEF( PGPInputFormat_, PGPInputFormat );
-
-/* Output formats for PGPOOutputFormat */
-enum PGPOutputFormat_
-{
- kPGPOutputFormat_Unknown = 0,
- kPGPOutputFormat_PGP = 1,
-
- kPGPOutputFormat_X509CertReqInPKCS7 = 10000,
- kPGPOutputFormat_NetToolsCAV1_CertReqInPKCS7,
- kPGPOutputFormat_VerisignV1_CertReqInPKCS7,
- kPGPOutputFormat_EntrustV1_CertReqInPKCS7,
- kPGPOutputFormat_NetscapeV1_CertReqInPKCS7,
- kPGPOutputFormat_MicrosoftV1_CertReqInPKCS7,
-
- kPGPOutputFormat_X509GetCertInitialInPKCS7 = 10010,
- kPGPOutputFormat_NetToolsCAV1_GetCertInitialInPKCS7,
- kPGPOutputFormat_VerisignV1_GetCertInitialInPKCS7,
- kPGPOutputFormat_EntrustV1_GetCertInitialInPKCS7,
- kPGPOutputFormat_NetscapeV1_GetCertInitialInPKCS7,
- kPGPOutputFormat_MicrosoftV1_GetCertInitialInPKCS7,
-
- kPGPOutputFormat_X509GetCRLInPKCS7 = 10020,
- kPGPOutputFormat_NetToolsCAV1_GetCRLInPKCS7,
- kPGPOutputFormat_VerisignV1_GetCRLInPKCS7,
- kPGPOutputFormat_EntrustV1_GetCRLInPKCS7,
- kPGPOutputFormat_NetscapeV1_GetCRLInPKCS7,
- kPGPOutputFormat_MicrosoftV1_GetCRLInPKCS7,
-
- kPGPOutputFormat_SMIMEBodySignedData = 12001,
- kPGPOutputFormat_SMIMEBodyEncryptedData = 12002,
-
- PGP_ENUM_FORCE( PGPOutputFormat_ )
-};
-PGPENUM_TYPEDEF( PGPOutputFormat_, PGPOutputFormat );
-
-/* Attribute-Value structure for PGPOAttributeValue */
-enum PGPAVAttribute_
-{
- /* Pointer properties */
- kPGPAVAttributeFirstPointer = 0,
- kPGPAVAttribute_CommonName = kPGPAVAttributeFirstPointer,
- kPGPAVAttribute_Email,
- kPGPAVAttribute_OrganizationName,
- kPGPAVAttribute_OrganizationalUnitName,
- kPGPAVAttribute_SurName,
- kPGPAVAttribute_SerialNumber,
- kPGPAVAttribute_Country,
- kPGPAVAttribute_Locality,
- kPGPAVAttribute_State,
- kPGPAVAttribute_StreetAddress,
- kPGPAVAttribute_Title,
- kPGPAVAttribute_Description,
- kPGPAVAttribute_PostalCode,
- kPGPAVAttribute_POBOX,
- kPGPAVAttribute_PhysicalDeliveryOfficeName,
- kPGPAVAttribute_TelephoneNumber,
- kPGPAVAttribute_X121Address,
- kPGPAVAttribute_ISDN,
- kPGPAVAttribute_DestinationIndicator,
- kPGPAVAttribute_Name,
- kPGPAVAttribute_GivenName,
- kPGPAVAttribute_Initials,
- kPGPAVAttribute_HouseIdentifier,
- kPGPAVAttribute_DirectoryManagementDomain,
- kPGPAVAttribute_DomainComponent,
- kPGPAVAttribute_UnstructuredName,
- kPGPAVAttribute_UnstructuredAddress,
- kPGPAVAttribute_RFC822Name,
- kPGPAVAttribute_DNSName,
- kPGPAVAttribute_AnotherName,
- kPGPAVAttribute_IPAddress,
- kPGPAVAttribute_CertificateExtension,
- kPGPAVAttribute_SCEPChallenge,
-
- /* Verisign specific */
- kPGPAVAttribute_Challenge,
- kPGPAVAttribute_CertType,
- kPGPAVAttribute_MailFirstName,
- kPGPAVAttribute_MailMiddleName,
- kPGPAVAttribute_MailLastName,
- kPGPAVAttribute_EmployeeID,
- kPGPAVAttribute_MailStop,
- kPGPAVAttribute_AdditionalField4,
- kPGPAVAttribute_AdditionalField5,
- kPGPAVAttribute_AdditionalField6,
- kPGPAVAttribute_Authenticate,
-
- /* Generic pointer properties continue */
- kPGPAVAttribute_KeyID = kPGPAVAttribute_Authenticate+100,
-
- kPGPAVAttributeLastPointer = kPGPAVAttribute_KeyID,
-
- /* Boolean properties */
- kPGPAVAttributeFirstBoolean = 1000,
-
- /* Verisign specific */
- kPGPAVAttribute_EmbedEmail,
-
-
- /* Numeric (PGPUInt32) properties */
- kPGPAVAttributeFirstNumber = 2000,
-
- PGP_ENUM_FORCE( PGPAVAttribute_ )
-} ;
-PGPENUM_TYPEDEF( PGPAVAttribute_, PGPAVAttribute );
-
-typedef struct PGPAttributeValue
-{
- PGPAVAttribute attribute;
- PGPUInt32 size;
- union
- {
- PGPBoolean booleanvalue;
- PGPUInt32 longvalue;
- void *pointervalue;
-
- } value;
-
- PGPUInt32 unused;
-} PGPAttributeValue ;
-
-enum PGPSMIMEMatchCriterion_
-{
- kPGPSMIMEMatchCriterion_Exact = 1, /* exact matching per SMIME spec (default) */
- kPGPSMIMEMatchCriterion_Related = 2, /* use Issuer from IASN, use Exact first then Any for keyIdentifier */
- kPGPSMIMEMatchCriterion_Any = 3, /* try all */
-
- PGP_ENUM_FORCE( PGPSMIMEMatchCriterion_ )
-} ;
-PGPENUM_TYPEDEF( PGPSMIMEMatchCriterion_, PGPSMIMEMatchCriterion );
-
-PGP_BEGIN_C_DECLARATIONS
-
-
-PGPError PGPNewOptionList( PGPContextRef context, PGPOptionListRef *outList );
-PGPError PGPAppendOptionList( PGPOptionListRef optionList,
- PGPOptionListRef firstOption, ... );
-PGPError PGPBuildOptionList( PGPContextRef context,
- PGPOptionListRef *outList,
- PGPOptionListRef firstOption, ... );
-PGPError PGPCopyOptionList( PGPOptionListRef optionList,
- PGPOptionListRef *outList );
-PGPError PGPFreeOptionList( PGPOptionListRef optionList );
-
-/*
-** The following functions are used to create PGPOptionListRef's for
-** specifying the various options to several SDK functions. The
-** functions can be used as inline parameters in a temporary manner or
-** used with PGPBuildOptionList() to create persistent lists.
-*/
-
-/*
-** Special PGPOptionListRef to mark last option passed to those functions
-** which take variable lists of PGPOptionListRef's:
-*/
-
-PGPOptionListRef PGPOLastOption( PGPContextRef context );
-
-/* Special PGPOptionListRef which is always ignored: */
-
-PGPOptionListRef PGPONullOption( PGPContextRef context);
-
-/* Data input (required): */
-
-PGPOptionListRef PGPOInputFile( PGPContextRef context,
- PGPFileSpecRef fileRef );
-PGPOptionListRef PGPOInputBuffer( PGPContextRef context,
- void const *buffer, PGPSize bufferSize );
-#if PGP_MACINTOSH || PGP_OSX
-PGPOptionListRef PGPOInputFileFSSpec( PGPContextRef context,
- const struct FSSpec *fileSpec );
-#endif
-
-/* Data output (optional, generates event if missing): */
-
-PGPOptionListRef PGPOOutputFile( PGPContextRef context,
- PGPFileSpecRef fileRef );
-PGPOptionListRef PGPOOutputBuffer( PGPContextRef context,
- void *buffer, PGPSize bufferSize,
- PGPSize *outputDataLength );
-PGPOptionListRef PGPOOutputDirectory( PGPContextRef context,
- PGPFileSpecRef fileRef );
-#if PGP_MACINTOSH || PGP_OSX
-PGPOptionListRef PGPOOutputFileFSSpec( PGPContextRef context,
- const struct FSSpec *fileSpec );
-#endif
-
-/* Filepath modifiers (used for Archiving )*/
-
-PGPOptionListRef PGPORelativePath( PGPContextRef context,
- PGPFileSpecRef dirRef );
-
-PGPOptionListRef PGPORootPath( PGPContextRef context,
- PGPFileSpecRef dirRef );
-
-/* '*buffer' must be disposed of via PGPFreeData() */
-/* maximum memory usage will be no more than maximumBufferSize */
-PGPOptionListRef PGPOAllocatedOutputBuffer(PGPContextRef context,
- void **buffer, PGPSize maximumBufferSize,
- PGPSize *actualBufferSize);
-PGPOptionListRef PGPOAppendOutput( PGPContextRef context,
- PGPBoolean appendOutput );
-PGPOptionListRef PGPODiscardOutput( PGPContextRef context,
- PGPBoolean discardOutput );
-PGPOptionListRef PGPOAllocatedOutputKeyContainer(PGPContextRef context,
- void **keyContName, PGPSize maximumKeyContNameSize,
- PGPSize *actualKeyContNameSize );
-
-/* Encrypting and signing */
-
-PGPOptionListRef PGPOEncryptToKeyDBObj( PGPContextRef context,
- PGPKeyDBObjRef keyDBObjRef);
-PGPOptionListRef PGPOEncryptToKeySet( PGPContextRef context,
- PGPKeySetRef keySetRef);
-PGPOptionListRef PGPOIntegrityProtection( PGPContextRef context,
- PGPBoolean integrity);
-PGPOptionListRef PGPOSignWithKey( PGPContextRef context,
- PGPKeyDBObjRef keyDBObjRef,
- PGPOptionListRef firstOption, ...);
-PGPOptionListRef PGPOConventionalEncrypt( PGPContextRef context,
- PGPOptionListRef firstOption,
- ...);
-#undef PGPOPassphraseBuffer
-PGPOptionListRef PGPOPassphraseBuffer( PGPContextRef context,
- const PGPChar8 *passphrase,
- PGPSize passphraseLength);
-#undef PGPOPassphrase
-PGPOptionListRef PGPOPassphrase( PGPContextRef context,
- const PGPChar8 *passphrase);
-PGPOptionListRef PGPOPasskeyBuffer( PGPContextRef context,
- const void *passkey, PGPSize passkeyLength);
-
-PGPOptionListRef PGPOCachePassphrase( PGPContextRef context,
- PGPUInt32 timeOutSeconds, PGPBoolean globalCache);
-PGPOptionListRef PGPOSessionKey( PGPContextRef context,
- const void *sessionKey, PGPSize sessionKeyLength);
-PGPOptionListRef PGPOSignedHash( PGPContextRef context,
- void const *hash, PGPSize hashSize );
-PGPOptionListRef PGPOAllowBareESKs( PGPContextRef context,
- PGPBoolean allowBareESKs );
-PGPOptionListRef PGPOAskUserForEntropy( PGPContextRef context,
- PGPBoolean askUserForEntropy );
-PGPOptionListRef PGPORawPGPInput( PGPContextRef context,
- PGPBoolean rawPGPInput );
-PGPOptionListRef PGPOCompression( PGPContextRef context,
- PGPBoolean compression );
-
-PGPOptionListRef PGPOLocalEncoding( PGPContextRef context,
- PGPLocalEncodingFlags localEncode);
-PGPOptionListRef PGPOOutputLineEndType(PGPContextRef context,
- PGPLineEndType lineEnd);
-#undef PGPOPGPMIMEEncoding
-PGPOptionListRef PGPOPGPMIMEEncoding(PGPContextRef context,
- PGPBoolean mimeEncoding, PGPSize *mimeBodyOffset,
- PGPChar8 mimeSeparator[ kPGPMimeSeparatorSize ]);
-PGPOptionListRef PGPOOmitMIMEVersion( PGPContextRef context,
- PGPBoolean omitVersion);
-PGPOptionListRef PGPOX509Encoding( PGPContextRef context,
- PGPBoolean x509Encoding);
-
-PGPOptionListRef PGPODetachedSig( PGPContextRef context,
- PGPOptionListRef firstOption,
- ...);
-
-PGPOptionListRef PGPOCipherAlgorithm( PGPContextRef context,
- PGPCipherAlgorithm algorithm);
-PGPOptionListRef PGPOHashAlgorithm( PGPContextRef context,
- PGPHashAlgorithm algorithm);
-PGPOptionListRef PGPOCompressionAlgorithm( PGPContextRef context,
- PGPCompressionAlgorithm algorithm);
-
-PGPOptionListRef PGPOFailBelowValidity( PGPContextRef context,
- PGPValidity minValidity);
-PGPOptionListRef PGPOWarnBelowValidity( PGPContextRef context,
- PGPValidity minValidity);
-
-
-PGPOptionListRef PGPOEventHandler( PGPContextRef context,
- PGPEventHandlerProcPtr eventHandler,
- PGPUserValue eventHandlerData);
-PGPOptionListRef PGPOSendNullEvents( PGPContextRef context,
- PGPTimeInterval approxInterval);
-
-PGPOptionListRef PGPOArmorOutput( PGPContextRef context,
- PGPBoolean armorOutput );
-PGPOptionListRef PGPODataIsASCII( PGPContextRef context,
- PGPBoolean dataIsASCII );
-PGPOptionListRef PGPOClearSign( PGPContextRef context,
- PGPBoolean clearSign );
-PGPOptionListRef PGPOForYourEyesOnly( PGPContextRef context,
- PGPBoolean forYourEyesOnly );
-PGPOptionListRef PGPOKeyDBRef( PGPContextRef context,
- PGPKeyDBRef keydbRef);
-
-PGPOptionListRef PGPOExportKeySet( PGPContextRef context,
- PGPKeySetRef keysetRef);
-PGPOptionListRef PGPOExportKeyDBObj( PGPContextRef context,
- PGPKeyDBObjRef keyDBObjRef);
-
-PGPOptionListRef PGPOImportKeysTo( PGPContextRef context,
- PGPKeyDBRef keydbRef);
-PGPOptionListRef PGPOSendEventIfKeyFound( PGPContextRef context,
- PGPBoolean sendEventIfKeyFound );
-PGPOptionListRef PGPOPassThroughIfUnrecognized( PGPContextRef context,
- PGPBoolean passThroughIfUnrecognized );
-PGPOptionListRef PGPOPassThroughClearSigned( PGPContextRef context,
- PGPBoolean passThroughClearSigned );
-PGPOptionListRef PGPOPassThroughKeys( PGPContextRef context,
- PGPBoolean passThroughKeys );
-PGPOptionListRef PGPORecursivelyDecode( PGPContextRef context,
- PGPBoolean recurse );
-
-PGPOptionListRef PGPOKeyGenParams( PGPContextRef context,
- PGPPublicKeyAlgorithm pubKeyAlg,
- PGPUInt32 bits);
-
-#undef PGPOKeyGenName
-PGPOptionListRef PGPOKeyGenName( PGPContextRef context,
- const void *name, PGPSize nameLength);
-
-PGPOptionListRef PGPOCreationDate( PGPContextRef context,
- PGPTime creationDate);
-PGPOptionListRef PGPOExpiration( PGPContextRef context,
- PGPUInt32 expirationDays);
-
-PGPOptionListRef PGPOAdditionalRecipientRequestKeySet(
- PGPContextRef context,
- PGPKeySetRef arKeySetRef, PGPByte arkClass);
-
-PGPOptionListRef PGPORevocationKeySet(PGPContextRef context,
- PGPKeySetRef raKeySetRef);
-
-PGPOptionListRef PGPOKeyGenMasterKey( PGPContextRef context,
- PGPKeyDBObjRef masterKeyDBObjRef);
-
-PGPOptionListRef PGPOPreferredAlgorithms(
- PGPContextRef context,
- PGPCipherAlgorithm const *prefAlg,
- PGPUInt32 numAlgs);
-
-#undef PGPOPreferredKeyServer
-PGPOptionListRef PGPOPreferredKeyServer(
- PGPContextRef context,
- PGPChar8 const * server );
-
-PGPOptionListRef PGPOKeyFeatures( PGPContextRef context,
- PGPUInt32 features);
-
-PGPOptionListRef PGPOKeyFlags( PGPContextRef context,
- PGPUInt32 flags);
-
-PGPOptionListRef PGPOKeyServerPreferences( PGPContextRef context,
- PGPUInt32 preferences);
-
-PGPOptionListRef PGPOKeyGenFast( PGPContextRef context,
- PGPBoolean fastGen);
-
-PGPOptionListRef PGPOTokenNumber( PGPContextRef context,
- PGPUInt32 tokenID);
-#define PGPOKeyGenOnToken PGPOTokenNumber
-
-PGPOptionListRef PGPOOutputToken( PGPContextRef context, PGPUInt32 token );
-
-PGPOptionListRef PGPOKeyContainer( PGPContextRef context,
- const PGPByte *keyContainerName,
- PGPSize keyContainerNameSize );
-
-PGPOptionListRef PGPOKeyGenUseExistingEntropy( PGPContextRef context,
- PGPBoolean useExistingEntropy);
-
-PGPOptionListRef PGPOPreferredCompressionAlgorithms(
- PGPContextRef context,
- PGPCompressionAlgorithm const *prefAlg,
- PGPUInt32 numAlgs);
-
-#undef PGPOCommentString
-PGPOptionListRef PGPOCommentString( PGPContextRef context,
- PGPChar8 const *comment);
-
-#undef PGPOVersionString
-PGPOptionListRef PGPOVersionString( PGPContextRef context,
- PGPChar8 const *version);
-
-#undef PGPOFileNameString
-PGPOptionListRef PGPOFileNameString( PGPContextRef context,
- PGPChar8 const *fileName);
-
-#undef PGPOSigRegularExpression
-PGPOptionListRef PGPOSigRegularExpression(PGPContextRef context,
- PGPChar8 const *regularExpression);
-
-PGPOptionListRef PGPOExportPrivateKeys( PGPContextRef context,
- PGPBoolean exportKeys);
-
-PGPOptionListRef PGPOExportPrivateSubkeys( PGPContextRef context,
- PGPBoolean exportSubkeys);
-
-PGPOptionListRef PGPOExportFormat(PGPContextRef context,
- PGPExportFormat exportFormat);
-
-PGPOptionListRef PGPOExportable( PGPContextRef context,
- PGPBoolean exportable);
-
-PGPOptionListRef PGPOSigTrust( PGPContextRef context,
- PGPUInt32 trustLevel,
- PGPUInt32 trustValue);
-
-PGPOptionListRef PGPOInputFormat( PGPContextRef context,
- PGPInputFormat inputFormat );
-
-PGPOptionListRef PGPOOutputFormat( PGPContextRef context,
- PGPOutputFormat outputFormat );
-
-PGPOptionListRef PGPOAttributeValue( PGPContextRef context,
- PGPAttributeValue *attributeValue,
- PGPUInt32 attributeValueCount);
-
-PGPOptionListRef PGPOInputTARCache( PGPContextRef context,
- PGPFileSpecRef cacheFileRef,
- const PGPByte *sessionKey,
- PGPSize sessionKeySize );
-
-PGPOptionListRef PGPOOutputTARCache( PGPContextRef context,
- PGPFileSpecRef cacheFileRef );
-
-PGPOptionListRef PGPOIssueRevocations( PGPContextRef context,
- PGPBoolean issueRevocations );
-
-PGPOptionListRef PGPOSMIMEMatchCriterion( PGPContextRef context,
- PGPSMIMEMatchCriterion criterion );
-
-PGPOptionListRef PGPOSMIMESigner( PGPContextRef context,
- PGPKeyDBObjRef signer );
-
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpOptionList_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpPFLConfig.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpPFLConfig.h
deleted file mode 100644
index 8474d66aa0..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpPFLConfig.h
+++ /dev/null
@@ -1,52 +0,0 @@
-/*____________________________________________________________________________
- pgpPFLConfig.h (Win32 version)
-
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- This file contains the Win32 version of the configuration file
- normally generated by the automatic configure script on Unix.
-
- $Id: pgpPFLConfig.h,v 1.3 2002/08/06 20:10:45 dallen Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpPFLConfig_h /* [ */
-#define Included_pgpPFLConfig_h
-
-#define HAVE_STDARG_H 1
-#define HAVE_STDLIB_H 1
-#define HAVE_SYS_STAT_H 1
-#define HAVE_UNISTD_H 0
-#define HAVE_USHORT 0
-#define HAVE_UINT 0
-#define HAVE_ULONG 0
-#define NO_LIMITS_H 0
-#define NO_POPEN 1
-
-#if defined( __MWERKS__ )
-
- #define PGP_HAVE64 0
-
-
-#elif defined( _MSC_VER )
- // wjb-for FileOffsets to be 64 bit
- #define PGP_HAVE64 1
- typedef __int64 PGPInt64;
- typedef unsigned __int64 PGPUInt64;
-
-
-
-#endif
-
-
-
-
-#endif /* ] Included_pgpPFLConfig_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpPFLErrors.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpPFLErrors.h
deleted file mode 100644
index f0264cafd0..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpPFLErrors.h
+++ /dev/null
@@ -1,116 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpPFLErrors.h,v 1.20 2004/04/25 03:31:03 bzhao Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpPFLErrors_h /* [ */
-#define Included_pgpPFLErrors_h
-
-#include "pgpBase.h"
-
-#define kPGPPFLErrorBase -12000
-#define kPGPPFLErrorRange 500
-
-enum
-{
- /*
- NOTE: error numbers must not be changed as compile clients depend on them.
- */
-
- kPGPError_NoErr = 0,
-
- kPGPError_BadParams = -12000,
- kPGPError_OutOfMemory = -11999,
- kPGPError_BufferTooSmall = -11998,
-
- kPGPError_FileNotFound = -11997,
- kPGPError_CantOpenFile = -11996,
- kPGPError_FilePermissions = -11995,
- kPGPError_FileLocked = -11994,
- /* Unused = -11993, */
- kPGPError_IllegalFileOp = -11992,
- kPGPError_FileOpFailed = -11991,
- kPGPError_ReadFailed = -11990,
- kPGPError_WriteFailed = -11989,
- kPGPError_EOF = -11988,
-
- kPGPError_UserAbort = -11987,
- kPGPError_UnknownRequest = -11986,
- kPGPError_LazyProgrammer = -11985,
- kPGPError_ItemNotFound = -11984,
- kPGPError_ItemAlreadyExists = -11983,
- kPGPError_AssertFailed = -11982,
- kPGPError_BadMemAddress = -11981,
- kPGPError_UnknownError = -11980,
-
- kPGPError_PrefNotFound = -11979,
- kPGPError_EndOfIteration = -11978,
- kPGPError_ImproperInitialization = -11977,
- kPGPError_CorruptData = -11976,
- kPGPError_FeatureNotAvailable = -11975,
- kPGPError_MatchNotFound = -11974,
- kPGPError_ResourceUnavailable = -11973,
- kPGPError_InsufficientPrivileges = -11972,
- kPGPError_AlreadyInUse = -11971,
- kPGPError_Deadlocked = -11970,
- kPGPError_NotConnected = -11969,
- kPGPError_BufferTooLarge = -11968,
- kPGPError_SizeTooLarge = -11967,
-
- kPGPError_DiskFull = -11960,
- kPGPError_DiskLocked = -11959,
-
- kPGPError_GraphicsOpFailed = -11956,
- kPGPError_MemoryOpFailed = -11955,
- kPGPError_NetworkOpFailed = -11954,
- kPGPError_SecurityOpFailed = -11953,
- kPGPError_StringOpFailed = -11952,
- kPGPError_SyncObjOpFailed = -11951,
- kPGPError_ThreadOpFailed = -11950,
- kPGPError_VolumeOpFailed = -11949,
-
- kPGPError_NTDrvIopOpFailed = -11947,
- kPGPError_NTDrvObjectOpFailed = -11946,
-
- kPGPError_Win32COMOpFailed = -11945,
- kPGPError_Win32CommCtrlOpFailed = -11944,
- kPGPError_Win32DllOpFailed = -11943,
- kPGPError_Win32RegistryOpFailed = -11942,
- kPGPError_Win32ResourceOpFailed = -11941,
- kPGPError_Win32WindowOpFailed = -11940,
- kPGPError_RPCFailed = -11939,
- kPGPError_RPCGarbledMsg = -11938,
- kPGPError_NoUnicodeEquivalent = -11937,
-
- kPGPError_NetLARefused = -11936,
- kPGPError_NetLAMismatch = -11935,
- kPGPError_NetLATooManyRetrievals = -11934,
- kPGPError_LNCorrupt = -11933,
- kPGPError_LACorrupt = -11932,
- kPGPError_LNInvalid = -11931,
- kPGPError_NetInvalidProdID = -11930,
- // PGPwde error code
- kPGPError_DiskNotFound = -11929,
- kPGPError_LastPFLError = kPGPPFLErrorBase + kPGPPFLErrorRange - 1
-};
-
-#define IsPGPError( err ) ( (err) != kPGPError_NoErr )
-#define IsntPGPError( err ) ( (err) == kPGPError_NoErr )
-
-PGP_BEGIN_C_DECLARATIONS
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpPFLErrors_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpPubTypes.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpPubTypes.h
deleted file mode 100644
index 6082d4bb62..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpPubTypes.h
+++ /dev/null
@@ -1,350 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpPubTypes.h,v 1.22 2004/04/13 20:50:53 ajivsov Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpPubTypes_h /* [ */
-#define Included_pgpPubTypes_h
-
-#include "pgpConfig.h"
-#include "pgpBase.h"
-
-/*____________________________________________________________________________
- General data types used by PGPsdk
-____________________________________________________________________________*/
-
-typedef struct PGPContext * PGPContextRef;
-typedef struct PGPFileSpec * PGPFileSpecRef;
-typedef struct PGPOptionList * PGPOptionListRef;
-
-/*____________________________________________________________________________
- Data types used by the key manipulation functions
-____________________________________________________________________________*/
-
-typedef struct PGPKeyDB * PGPKeyDBRef;
-typedef struct PGPKeyDBObj * PGPKeyDBObjRef;
-typedef struct PGPKeySet * PGPKeySetRef;
-typedef struct PGPKeyList * PGPKeyListRef;
-typedef struct PGPKeyIter * PGPKeyIterRef;
-typedef struct PGPFilter * PGPFilterRef;
-
-typedef struct PGPKeyID
-{
- /* do not attempt to interpret these bytes; they *will* change */
- PGPByte opaqueBytes[ 36 ];
-} PGPKeyID;
-
-/*____________________________________________________________________________
- Data types used by symmetric ciphers, cipher modes, hashing
-____________________________________________________________________________*/
-
-typedef struct PGPHashContext * PGPHashContextRef;
-typedef struct PGPHMACContext * PGPHMACContextRef;
-typedef struct PGPPublicKeyContext * PGPPublicKeyContextRef;
-typedef struct PGPPrivateKeyContext * PGPPrivateKeyContextRef;
-typedef struct PGPCBCContext * PGPCBCContextRef;
-typedef struct PGPCFBContext * PGPCFBContextRef;
-typedef struct PGPSymmetricCipherContext * PGPSymmetricCipherContextRef;
-
-/*____________________________________________________________________________
-Disk Wiping Patterns
-____________________________________________________________________________*/
-
-typedef struct PGPWipePatternContext * PGPWipePatternContextRef;
-
-/*____________________________________________________________________________
-PGP Tar Cache, Objects and Iterators
-____________________________________________________________________________*/
-typedef struct PGPTARCache * PGPTARCacheRef;
-typedef struct PGPTARCacheIter * PGPTARCacheIterRef;
-typedef struct PGPTARCacheObj * PGPTARCacheObjRef;
-
-/*____________________________________________________________________________
- Data types used by keyserver code
-____________________________________________________________________________*/
-
-typedef struct PGPKeyServer * PGPKeyServerRef;
-
-/*____________________________________________________________________________
- Invalid values for each of the "ref" data types. Use these for assignment
- and initialization only. Use the PGPXXXRefIsValid macros (below) to test
- for valid/invalid values.
-____________________________________________________________________________*/
-
-#define kInvalidPGPContextRef ((PGPContextRef) NULL)
-#define kInvalidPGPFileSpecRef ((PGPFileSpecRef) NULL)
-#define kInvalidPGPOptionListRef ((PGPOptionListRef) NULL)
-#define kInvalidPGPKeyDBRef ((PGPKeyDBRef) NULL)
-#define kInvalidPGPKeyDBObjRef ((PGPKeyDBObjRef) NULL)
-#define kInvalidPGPKeySetRef ((PGPKeySetRef) NULL)
-#define kInvalidPGPKeyListRef ((PGPKeyListRef) NULL)
-#define kInvalidPGPKeyIterRef ((PGPKeyIterRef) NULL)
-#define kInvalidPGPFilterRef ((PGPFilterRef) NULL)
-#define kInvalidPGPKeyServerRef ((PGPKeyServerRef) NULL)
-#define kInvalidPGPHashContextRef ((PGPHashContextRef) NULL)
-#define kInvalidPGPHMACContextRef ((PGPHMACContextRef) NULL)
-#define kInvalidPGPCFBContextRef ((PGPCFBContextRef) NULL)
-#define kInvalidPGPCBCContextRef ((PGPCBCContextRef) NULL)
-
-#define kInvalidPGPSymmetricCipherContextRef \
- ((PGPSymmetricCipherContextRef) NULL)
-#define kInvalidPGPPublicKeyContextRef \
- ((PGPPublicKeyContextRef) NULL)
-#define kInvalidPGPPrivateKeyContextRef \
- ((PGPPrivateKeyContextRef) NULL)
-#define kInvalidPGWipePatternContextRef \
- ((PGPWipePatternContextRef) NULL)
-#define kInvalidPGPTARCacheRef \
- ((PGPTARCacheRef) NULL)
-#define kInvalidPGPTARCacheIterRef \
- ((PGPTARCacheIterRef) NULL)
-#define kInvalidPGPTARCacheObjRef \
- ((PGPTARCacheObjRef) NULL)
-
-
-/*____________________________________________________________________________
- Macros to test for ref validity. Use these in preference to comparing
- directly with the kInvalidXXXRef values.
-____________________________________________________________________________*/
-
-#define PGPContextRefIsValid( ref ) ( (ref) != kInvalidPGPContextRef )
-#define PGPFileSpecRefIsValid( ref ) ( (ref) != kInvalidPGPFileSpecRef )
-#define PGPOptionListRefIsValid( ref ) ( (ref) != kInvalidPGPOptionListRef )
-#define PGPKeyDBRefIsValid( ref ) ( (ref) != kInvalidPGPKeyDBRef )
-#define PGPKeyDBObjRefIsValid( ref ) ( (ref) != kInvalidPGPKeyDBObjRef )
-#define PGPKeySetRefIsValid( ref ) ( (ref) != kInvalidPGPKeySetRef )
-#define PGPKeyListRefIsValid( ref ) ( (ref) != kInvalidPGPKeyListRef )
-#define PGPKeyIterRefIsValid( ref ) ( (ref) != kInvalidPGPKeyIterRef )
-#define PGPFilterRefIsValid( ref ) ( (ref) != kInvalidPGPFilterRef )
-#define PGPKeyServerRefIsValid( ref ) ( (ref) != kInvalidPGPKeyServerRef )
-#define PGPHashContextRefIsValid( ref ) ( (ref) != kInvalidPGPHashContextRef )
-#define PGPHMACContextRefIsValid( ref ) ( (ref) != kInvalidPGPHMACContextRef )
-#define PGPCFBContextRefIsValid( ref ) ( (ref) != kInvalidPGPCFBContextRef )
-#define PGPCBCContextRefIsValid( ref ) ( (ref) != kInvalidPGPCBCContextRef )
-
-#define PGPSymmetricCipherContextRefIsValid( ref ) \
- ( (ref) != kInvalidPGPSymmetricCipherContextRef )
-#define PGPPublicKeyContextRefIsValid( ref ) \
- ( (ref) != kInvalidPGPPublicKeyContextRef )
-#define PGPPrivateKeyContextRefIsValid( ref ) \
- ( (ref) != kInvalidPGPPrivateKeyContextRef )
-#define PGPWipePatternContextRefIsValid( ref ) \
- ( (ref) != kInvalidPGWipePatternContextRef )
- #define PGPTARCacheRefIsValid( ref ) \
- ( (ref) != kInvalidPGPTARCacheRef )
-#define PGPTARCacheObjRefIsValid( ref ) \
- ( (ref) != kInvalidPGPTARCacheObjRef )
-#define PGPTARCacheIterRefIsValid( ref) \
- ( (ref) != kInvalidPGPTARCacheIterRef )
-
-/*____________________________________________________________________________
- Symmetric Ciphers
-____________________________________________________________________________*/
-
-enum PGPCipherAlgorithm_
-{
- kPGPCipherAlgorithm_None = 0,
- kPGPCipherAlgorithm_IDEA = 1,
- kPGPCipherAlgorithm_3DES = 2,
- kPGPCipherAlgorithm_CAST5 = 3,
- kPGPCipherAlgorithm_Blowfish = 4,
- kPGPCipherAlgorithm_AES128 = 7,
- kPGPCipherAlgorithm_AES192 = 8,
- kPGPCipherAlgorithm_AES256 = 9,
- kPGPCipherAlgorithm_Twofish256 = 10,
-
- PGP_ENUM_FORCE( PGPCipherAlgorithm_ )
-};
-PGPENUM_TYPEDEF( PGPCipherAlgorithm_, PGPCipherAlgorithm );
-
-/*____________________________________________________________________________
- Hash algorithms
-____________________________________________________________________________*/
-
-enum PGPHashAlgorithm_
-{
- kPGPHashAlgorithm_Invalid = 0,
- kPGPHashAlgorithm_MD5 = 1,
- kPGPHashAlgorithm_SHA = 2,
- kPGPHashAlgorithm_RIPEMD160 = 3,
- kPGPHashAlgorithm_SHA256 = 8, /* from draft-ietf-openpgp-rfc2440bis-03.txt */
- kPGPHashAlgorithm_SHA384 = 9,
- kPGPHashAlgorithm_SHA512 = 10,
-
- PGP_ENUM_FORCE( PGPHashAlgorithm_ )
-};
-PGPENUM_TYPEDEF( PGPHashAlgorithm_, PGPHashAlgorithm );
-
-/*____________________________________________________________________________
- Public/Private key algorithms
-____________________________________________________________________________*/
-enum PGPPublicKeyAlgorithm_
-{
-#ifdef __MVS__
- kPGPPublicKeyAlgorithm_Invalid = -1,
-#else
- kPGPPublicKeyAlgorithm_Invalid = 0xFFFFFFFF,
-#endif
- kPGPPublicKeyAlgorithm_RSA = 1,
- kPGPPublicKeyAlgorithm_RSAEncryptOnly = 2,
- kPGPPublicKeyAlgorithm_RSASignOnly = 3,
- kPGPPublicKeyAlgorithm_ElGamal = 0x10, /* A.K.A.Diffie-Hellman */
- kPGPPublicKeyAlgorithm_DSA = 0x11,
- kPGPPublicKeyAlgorithm_ECEncrypt = 0x12,
- kPGPPublicKeyAlgorithm_ECSign = 0x13,
-
- PGP_ENUM_FORCE( PGPPublicKeyAlgorithm_ )
-};
-PGPENUM_TYPEDEF( PGPPublicKeyAlgorithm_, PGPPublicKeyAlgorithm );
-
-/*____________________________________________________________________________
- Trust values, used to set validity values
-____________________________________________________________________________*/
-
-#define kPGPKeyTrust_Mask 0x7u
-#define kPGPKeyTrust_Undefined 0x0u
-#define kPGPKeyTrust_Unknown 0x1u
-#define kPGPKeyTrust_Never 0x2u
-#define kPGPKeyTrust_Marginal 0x5u
-#define kPGPKeyTrust_Complete 0x6u
-#define kPGPKeyTrust_Ultimate 0x7u
-
-#define kPGPUserIDTrust_Mask 0x3u
-#define kPGPUserIDTrust_Unknown 0x0u
-#define kPGPUserIDTrust_Untrusted 0x1u
-#define kPGPUserIDTrust_Marginal 0x2u
-#define kPGPUserIDTrust_Complete 0x3u
-
-/*____________________________________________________________________________
- Validity levels, used for thresholds in options
-____________________________________________________________________________*/
-
-enum PGPValidity_
-{
- kPGPValidity_Unknown = kPGPUserIDTrust_Unknown,
- kPGPValidity_Invalid = kPGPUserIDTrust_Untrusted,
- kPGPValidity_Marginal = kPGPUserIDTrust_Marginal,
- kPGPValidity_Complete = kPGPUserIDTrust_Complete,
-
- PGP_ENUM_FORCE( PGPValidity_ )
-} ;
-PGPENUM_TYPEDEF( PGPValidity_, PGPValidity );
-
-/*____________________________________________________________________________
- Line endings types
-____________________________________________________________________________*/
-
-enum PGPLineEndType_
-{
- kPGPLineEnd_Default = 0,
- kPGPLineEnd_LF = 1,
- kPGPLineEnd_CR = 2,
- kPGPLineEnd_CRLF = (kPGPLineEnd_LF | kPGPLineEnd_CR),
-
- PGP_ENUM_FORCE( PGPLineEndType_ )
-};
-PGPENUM_TYPEDEF( PGPLineEndType_, PGPLineEndType );
-
-/*____________________________________________________________________________
- Local encoding types
-
- Only one of Force or Auto should be used. The other values are modifiers
-____________________________________________________________________________*/
-
-#define kPGPLocalEncoding_None 0x0 /* nothing on */
-#define kPGPLocalEncoding_Force 0x01
-#define kPGPLocalEncoding_Auto 0x02
-#define kPGPLocalEncoding_NoMacBinCRCOkay 0x04
-
-typedef PGPFlags PGPLocalEncodingFlags;
-
-
-/* max length is 255; the +1 is for the trailing \0 */
-#define kPGPMaxUserIDSize ( (PGPSize)255 + 1 )
-
-/* Size of buffer for PGP-MIME separator (null terminated) */
-#define kPGPMimeSeparatorSize 81
-
-enum PGPTokenProperty_
-{
- kPGPTokenProperty_Invalid = 0,
-
- /* boolean properties */
- kPGPTokenProperty_DirectAuth = 1,
-
- /* numeric properties */
- kPGPTokenProperty_KeyGenAlgorithm = 100,
- kPGPTokenProperty_PrivateKeys = 101,
- kPGPTokenProperty_PublicKeys = 102,
- kPGPTokenProperty_SlotID = 103,
- kPGPTokenProperty_MinPINSize = 104,
- kPGPTokenProperty_MaxPINSize = 105,
- kPGPTokenProperty_MinKeySize = 106,
- kPGPTokenProperty_MaxKeySize = 107,
-
- /* string / data properties */
- kPGPTokenProperty_SerialNumber = 500,
- kPGPTokenProperty_Model = 501,
- kPGPTokenProperty_ManufacturerID = 502,
- kPGPTokenProperty_TokenLabel = 503,
-
- PGP_ENUM_FORCE( PGPTokenProperty_ )
-};
-PGPENUM_TYPEDEF( PGPTokenProperty_, PGPTokenProperty );
-
-/* Token capabilities / information. 4 byte packing.
- * Deprecated, use PGPTokenInfoGet*() with PGPTokenProperty
- *
- */
-typedef struct _PGPTokenInfo {
- /* The size of the structure, including this field.
- Must be the first field */
- PGPUInt32 size;
-
- /* Identification information */
- PGPByte manufacturerID[32];
- PGPByte model[16];
- PGPByte serialNumber[16];
-
- PGPBoolean bRsa;
- PGPUInt32 minRsaKeySize;
- PGPUInt32 maxRsaKeySize;
-
- /* General capabilities */
- PGPUInt32 minPinLen;
- PGPUInt32 maxPinLen;
-
- /* Number of objects */
- PGPUInt32 numPrivKeys; /* Possibly, non-PGP keys */
- PGPUInt32 numPubKeys; /* Possibly, non-PGP keys */
-
- PGPByte reserved[4];
-} PGPTokenInfo;
-
-/*____________________________________________________________________________
- Compression algorithms
-____________________________________________________________________________*/
-
-enum PGPCompressionAlgorithm_
-{
- kPGPCompressionAlgorithm_None = 0,
- kPGPCompressionAlgorithm_ZIP = 1,
- kPGPCompressionAlgorithm_ZLIB = 2,
- kPGPCompressionAlgorithm_BZIP2 = 3,
-
- PGP_ENUM_FORCE( PGPCompressionAlgorithm_ )
-};
-PGPENUM_TYPEDEF( PGPCompressionAlgorithm_, PGPCompressionAlgorithm );
-
-#endif /* ] Included_pgpPubTypes_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpPublicKey.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpPublicKey.h
deleted file mode 100644
index 8ed1adc9ae..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpPublicKey.h
+++ /dev/null
@@ -1,207 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpPublicKey.h,v 1.9 2003/10/03 00:38:40 vinnie Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpPublicKey_h /* [ */
-#define Included_pgpPublicKey_h
-
-#include "pgpPubTypes.h"
-#include "pgpOptionList.h"
-
-/*____________________________________________________________________________
- Encryption/Signature Message Formats
-____________________________________________________________________________*/
-
-enum PGPPublicKeyMessageFormat_
-{
- kPGPPublicKeyMessageFormat_PGP = 1,
- kPGPPublicKeyMessageFormat_PKCS1 = 2,
- kPGPPublicKeyMessageFormat_X509 = 3,
- kPGPPublicKeyMessageFormat_IKE = 4,
-
- kPGPPublicKeyMessageFormat_PKCS1_OAEP = 5, /* default is MGF1 with SHA1 */
-
- PGP_ENUM_FORCE( PGPPublicKeyMessageFormat_ )
-};
-PGPENUM_TYPEDEF( PGPPublicKeyMessageFormat_, PGPPublicKeyMessageFormat );
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- Public-key operations
-
- Return a context for public-key operations based on the specified key.
- The specified message format is used for all operations with this
- context.
-____________________________________________________________________________*/
-
-PGPError PGPNewPublicKeyContext( PGPKeyDBObjRef publicKeyDBObjRef,
- PGPPublicKeyMessageFormat messageFormat,
- PGPPublicKeyContextRef *outRef );
-
-/*____________________________________________________________________________
- Dispose of a public-key context.
-____________________________________________________________________________*/
-
-PGPError PGPFreePublicKeyContext( PGPPublicKeyContextRef ref );
-
-/*____________________________________________________________________________
- Determine maximum sizes for inputs and outputs.
-____________________________________________________________________________*/
-
-PGPError PGPGetPublicKeyOperationSizes( PGPPublicKeyContextRef ref,
- PGPSize *maxDecryptedBufferSize,
- PGPSize *maxEncryptedBufferSize,
- PGPSize *maxSignatureSize );
-
-/*____________________________________________________________________________
- Encrypt one block of data, using PKCS-1 padding. Output buffer must
- be of size maxEncryptedBufferSize from PGPGetPublicKeyEncryptionSize.
- outSize is a return parameter. For some formatting modes the actual
- output size may be less than the maximum possible.
-____________________________________________________________________________*/
-
-PGPError PGPPublicKeyEncrypt( PGPPublicKeyContextRef ref,
- void const *in, PGPSize inSize, void *out,
- PGPSize *outSize );
-
-/*____________________________________________________________________________
- Verify a signature on a message hash. Returns kPGPError_NoErr on
- correct verification, else an error code. The message hash is
- finalized and freed by this call (and should not have been finalized
- prior to the call).
-____________________________________________________________________________*/
-
-PGPError PGPPublicKeyVerifySignature( PGPPublicKeyContextRef ref,
- PGPHashContextRef hashContext, void const *signature,
- PGPSize signatureSize );
-
-/*____________________________________________________________________________
- Verify a signature on a low-level buffer. Returns kPGPError_NOErr
- correct verification, else an error code. Not valid with
- kPGPPublicKeyMessageFormat_PGP contexts.
-____________________________________________________________________________*/
-
-PGPError PGPPublicKeyVerifyRaw( PGPPublicKeyContextRef ref,
- void const *signedData, PGPSize signedDataSize,
- void const *signature, PGPSize signatureSize );
-
-/*____________________________________________________________________________
- Private-key operations
-
- Return a context for private-key operations based on the specified
- key (which must have a private part). The specified message
- format is used for all operations with this context. Unlocks key
- data using passphrase.
-____________________________________________________________________________*/
-
-PGPError PGPNewPrivateKeyContext( PGPKeyDBObjRef privateKeyDBObjRef,
- PGPPublicKeyMessageFormat messageFormat,
- PGPPrivateKeyContextRef *outRef,
- PGPOptionListRef firstOption, ...);
-
-/*____________________________________________________________________________
- Dispose of a private-key context. All sensitive data is wiped before
- being deleted.
-____________________________________________________________________________*/
-
-PGPError PGPFreePrivateKeyContext( PGPPrivateKeyContextRef ref );
-
-/*____________________________________________________________________________
- Determine maximum sizes for inputs and outputs.
-____________________________________________________________________________*/
-
-PGPError PGPGetPrivateKeyOperationSizes( PGPPrivateKeyContextRef ref,
- PGPSize *maxDecryptedBufferSize,
- PGPSize *maxEncryptedBufferSize,
- PGPSize *maxSignatureSize);
-
-/*____________________________________________________________________________
- Decrypt one block of data. Output buffer must be of size at least
- maxDecryptedBufferSize from PGPGetPrivateKeyDecryptionSize.
- outSize is a return parameter. For some formatting modes the actual
- output size may be less than the maximum possible.
-____________________________________________________________________________*/
-
-PGPError PGPPrivateKeyDecrypt( PGPPrivateKeyContextRef ref, void const *in,
- PGPSize inSize, void *out, PGPSize *outSize );
-
-/*____________________________________________________________________________
- Sign a message hash. Output signature buffer must be of size at
- least maxSignatureSize from PGPGetPrivateKeyDecryptionSize.
- signatureSize is a return parameter. For some formatting modes
- the actual signature size may be less than the maximum possible.
- The message hash is finalized and freed by this call (and should
- not have been finalized prior to the call).
-____________________________________________________________________________*/
-
-PGPError PGPPrivateKeySign( PGPPrivateKeyContextRef ref,
- PGPHashContextRef hashContext, void *signature,
- PGPSize *signatureSize );
-
-/*____________________________________________________________________________
- Sign a low level signedData buffer. Output signature buffer must be
- of size at least maxSignatureSize from PGPGetPrivateKeyDecryptionSize.
- signatureSize is a return parameter. Not valid with
- kPGPPublicKeyMessageFormat_PGP contexts.
-____________________________________________________________________________*/
-
-PGPError PGPPrivateKeySignRaw( PGPPrivateKeyContextRef ref,
- void const *signedData, PGPSize signedDataSize,
- void *signature, PGPSize *signatureSize );
-
-/*____________________________________________________________________________
- Miscellaneous operations
-____________________________________________________________________________*/
-
-/*____________________________________________________________________________
- Given the size of a prime modulus in bits, this returns an appropriate
- size for an exponent in bits, such that the work factor to find a
- discrete log modulo the modulus is approximately equal to half the
- length of the exponent. This makes the exponent an appropriate size
- for a subgroup in a discrete log signature scheme. For encryption
- schemes, where decryption attacks can be stealthy and undetected, we
- use 3/2 times the returned exponent size.
-____________________________________________________________________________*/
-
-PGPError PGPDiscreteLogExponentBits( PGPUInt32 modulusBits,
- PGPUInt32 *exponentBits );
-
-
-/*____________________________________________________________________________
- Low level Function used for verifying FIPS 186-2 DSA signatures
- using P, Q, G, Y key values.
-____________________________________________________________________________*/
-
-PGPError PGPDSAKeyVerifyRaw(
- PGPContextRef context,
- PGPByte const* P,
- PGPSize PLen,
- PGPByte const* Q,
- PGPSize QLen,
- PGPByte const* G,
- PGPSize GLen,
- PGPByte const* Y,
- PGPSize YLen,
- PGPByte const* sig,
- PGPSize sigLen,
- PGPByte const * hash,
- PGPSize hashLen);
-
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpPublicKey_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpRandomPool.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpRandomPool.h
deleted file mode 100644
index b965b498d3..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpRandomPool.h
+++ /dev/null
@@ -1,46 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpRandomPool.h,v 1.7 2002/08/06 20:11:16 dallen Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpRandomPool_h /* [ */
-#define Included_pgpRandomPool_h
-
-#include "pgpBase.h"
-#include "pflTypes.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-PGPError PGPSetRandSeedFile( PFLFileSpecRef randSeedFile );
-
-PGPUInt32 PGPGlobalRandomPoolAddKeystroke( PGPInt32 event);
-PGPUInt32 PGPGlobalRandomPoolMouseMoved(void);
-PGPError PGPGlobalRandomPoolAddSystemState(void);
-PGPBoolean PGPGlobalRandomPoolHasIntelRNG(void);
-
-/* Extra functions for entropy estimation */
-PGPUInt32 PGPGlobalRandomPoolGetEntropy( void );
-PGPUInt32 PGPGlobalRandomPoolGetSize( void );
-PGPUInt32 PGPGlobalRandomPoolGetMinimumEntropy( void );
-PGPBoolean PGPGlobalRandomPoolHasMinimumEntropy( void );
-
-
-#if PGP_DEPRECATED
-PGPUInt32 PGPGlobalRandomPoolAddMouse( PGPUInt32 x, PGPUInt32 y);
-#endif
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpRandomPool_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpReconstruct.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpReconstruct.h
deleted file mode 100644
index 756a19619e..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpReconstruct.h
+++ /dev/null
@@ -1,117 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpReconstruct.h,v 1.1 2003/12/29 08:12:20 wprice Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpReconstruct_h /* [ */
-#define Included_pgpReconstruct_h
-
-#include "pgpPubTypes.h"
-#include "pgpKeyServer.h"
-
-#define kPGPRecon_NumShares 5
-#define kPGPRecon_Threshold 3
-#define kPGPRecon_MaxPromptLen ( 96 - 1 )
-#define kPGPRecon_MaxURLLen ( 256 - 1 )
-#define kPGPRecon_MaxPassLen ( 256 - 1 )
-#define kPGPRecon_MaxUserNameLen ( 128 - 1 )
-#define kPGPRecon_MaxPasswordLen ( 128 - 1 )
-
-
-typedef struct PGPReconContext * PGPReconContextRef;
-
-#define kInvalidPGPReconContextRef ((PGPReconContextRef) NULL)
-#define PGPReconContextRefIsValid( ref ) ( (ref) != kInvalidPGPReconContextRef )
-
-typedef char PGPReconPrompts[kPGPRecon_NumShares][kPGPRecon_MaxPromptLen + 1];
-
-typedef char PGPReconPasses[kPGPRecon_NumShares][kPGPRecon_MaxPassLen + 1];
-
-typedef PGPError (*PGPReconstructEventHandler)(PGPContextRef recon,
- PGPEvent *event, PGPUserValue userValue);
-
-/* inAuthUser and inAuthPass are not needed if the server class
- is kPGPKeyServerClass_PGP. */
- PGPError
-PGPNewReconstruct(
- PGPKeyDBObjRef inTargetKey,
- PGPUTF8 *inAuthUser, /* can be NULL */
- PGPUTF8 *inAuthPass, /* can be NULL */
- PGPReconstructEventHandler inHandler,
- PGPUserValue inUserValue,
- PGPReconContextRef *outRef );
-
-/* This is only needed if you have to change the event handler after
- allocating the PGPReconContextRef */
- PGPError
-PGPSetReconstructionEventHandler(
- PGPReconContextRef reconRef,
- PGPReconstructEventHandler inHandler,
- PGPUserValue inUserValue );
-
-
-/* I don't think it makes sense to support split keys for reconstruction,
- so we only take a passphrase below */
- PGPError
-PGPMakeReconstruction(
- PGPReconContextRef reconRef,
- PGPReconPrompts inPromptInfo,
- PGPReconPasses inPassInfo,
- PGPUTF8 *inPassphrase );
-
- PGPError
-PGPGetReconstruction(
- PGPReconContextRef reconRef,
- PGPByte **reconData, /* must be freed by caller */
- PGPSize *reconDataSize );
-
- PGPError
-PGPSendReconstruction(
- PGPReconContextRef reconRef );
-
- PGPError
-PGPGetReconstructionPrompts(
- PGPReconContextRef reconRef,
- PGPReconPrompts outPromptInfo );
-
- PGPError
-PGPGetReconstructionData(
- PGPReconContextRef reconRef,
- PGPReconPasses inPassInfo,
- PGPByte **outReconData, /* must be freed by caller */
- PGPSize *outReconSize );
-
-/* Reconstructed private key will be returned in
- outReconstructedKey if successful. The imported
- key will have no passphrase and thus the user must
- then be forced to choose a new passphrase. */
- PGPError
-PGPReconstruct(
- PGPReconContextRef reconRef,
- PGPReconPasses inPassInfo,
- PGPByte *inReconData,
- PGPSize inReconDataSize,
- PGPKeyDBRef *outReconstructedKey );
-
- PGPError
-PGPFreeReconstruct(
- PGPReconContextRef reconRef );
-
- PGPError
-PGPSetReconstructionServerURL(
- PGPReconContextRef reconRef,
- PGPUTF8 *pszServerURL,
- PGPKeyServerClass dwServerType );
-
-#endif /* ] Included_pgpReconstruct_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpSECSH.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpSECSH.h
deleted file mode 100644
index 4a964f40ed..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpSECSH.h
+++ /dev/null
@@ -1,308 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpSECSH.h,v 1.5 2002/08/06 20:11:16 dallen Exp $
-____________________________________________________________________________*/
-#ifndef Included_PGPsecsh_h /* [ */
-#define Included_PGPsecsh_h
-
-#include "pgpPubTypes.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-
-/* Message Types */
-#define kPGPsecsh_Msg_None 0
-#define kPGPsecsh_Msg_Disconnect 1
-#define kPGPsecsh_SMsg_PublicKey 2
-#define kPGPsecsh_CMsg_SessionKey 3
-#define kPGPsecsh_CMsg_User 4
-#define kPGPsecsh_CMsg_AuthRHosts 5
-#define kPGPsecsh_CMsg_AuthRSA 6
-#define kPGPsecsh_SMsg_AuthRSAChallenge 7
-#define kPGPsecsh_CMsg_AuthRSAResponse 8
-#define kPGPsecsh_CMsg_AuthRSAPassword 9
-#define kPGPsecsh_CMsg_RequestPTY 10
-#define kPGPsecsh_CMsg_WindowSize 11
-#define kPGPsecsh_CMsg_ExecShell 12
-#define kPGPsecsh_CMsg_ExecCommand 13
-#define kPGPsecsh_SMsg_Success 14
-#define kPGPsecsh_SMsg_Failure 15
-#define kPGPsecsh_CMsg_StdinData 16
-#define kPGPsecsh_SMsg_StdoutData 17
-#define kPGPsecsh_SMsg_StderrData 18
-#define kPGPsecsh_CMsg_EOF 19
-#define kPGPsecsh_SMsg_ExitStatus 20
-#define kPGPsecsh_Msg_ChannelOpenConfirm 21
-#define kPGPsecsh_Msg_ChannelOpenFailure 22
-#define kPGPsecsh_Msg_ChannelData 23
-#define kPGPsecsh_Msg_ChannelClose 24
-#define kPGPsecsh_Msg_ChannelCloseConfirm 25
-#define kPGPsecsh_SMsg_X11Open 27
-#define kPGPsecsh_CMsg_PortForwardRequest 28
-#define kPGPsecsh_Msg_PortOpen 29
-#define kPGPsecsh_CMsg_AgentRequestForwarding 30
-#define kPGPsecsh_SMsg_AgentOpen 31
-#define kPGPsecsh_Msg_Ignore 32
-#define kPGPsecsh_CMsg_ExitConfirm 33
-#define kPGPsecsh_CMsg_X11RequestForwarding 34
-#define kPGPsecsh_CMsg_AuthRHostsRSA 35
-#define kPGPsecsh_SMsg_Debug 36
-#define kPGPsecsh_CMsg_RequestCompression 37
-#define kPGPsecsh_CMsg_MaxPacketSize 38
-#define kPGPsecsh_CMsg_AuthTIS 39
-#define kPGPsecsh_SMsg_AuthTISChallenge 40
-#define kPGPsecsh_CMsg_AuthTISResponse 41
-#define kPGPsecsh_CMsg_AuthKerberos 42
-#define kPGPsecsh_SMsg_AuthKerberosResponse 43
-#define kPGPsecsh_CMsg_HaveKerberosTgt 44
-
-
-typedef struct PGPsecshContext * PGPsecshContextRef;
-typedef const struct PGPsecshContext * PGPsecshConstContextRef;
-
-#define kInvalidPGPsecshContextRef ((PGPsecshContextRef) NULL)
-#define PGPsecshContextRefIsValid( ref ) ( (ref) != kInvalidPGPsecshContextRef )
-
-typedef struct PGPsecshSession * PGPsecshSessionRef;
-typedef const struct PGPsecshSession * PGPsecshConstSessionRef;
-
-#define kInvalidPGPsecshSessionRef ((PGPsecshSessionRef) NULL)
-#define PGPsecshSessionRefIsValid( ref ) ( (ref) != kInvalidPGPsecshSessionRef )
-
-
-typedef PGPFlags PGPsecshFlags;
-#define kPGPsecshFlags_ServerSide 0x01
-#define kPGPsecshFlags_ClientSide 0x02
-#define kPGPsecshFlags_NonBlockingIO 0x04
-
-typedef PGPFlags PGPsecshProtocolFlags;
-#define kPGPsecshProtocolFlags_ScreenNumber 0x01
-#define kPGPsecshProtocolFlags_HostInFwdOpen 0x02
-
-enum PGPsecshProtocolState_
-{
- kPGPsecsh_IdleState = 0,
- kPGPsecsh_FatalErrorState = 1,
- kPGPsecsh_ClosedState = 2,
- kPGPsecsh_HandshakeState = 3,
- kPGPsecsh_ReadyState = 4,
-
- PGP_ENUM_FORCE( PGPsecshProtocolState_ )
-};
-PGPENUM_TYPEDEF( PGPsecshProtocolState_, PGPsecshProtocolState );
-
-enum PGPsecshAlert_
-{
- kPGPsecsh_AT_CloseNotify = 0,
- kPGPsecsh_AT_UnexpectedMessage = 10, /* FATAL */
- kPGPsecsh_AT_BadRecordCRC = 20, /* FATAL */
- kPGPsecsh_AT_DecryptionFailed = 21, /* FATAL */
- kPGPsecsh_AT_RecordOverflow = 22, /* FATAL */
- kPGPsecsh_AT_DecompressionFailure = 30, /* FATAL */
- kPGPsecsh_AT_HandshakeFailure = 40, /* FATAL */
- kPGPsecsh_AT_IDFailure = 41,
- kPGPsecsh_AT_UnsupportedVersion = 42,
- kPGPsecsh_AT_UnsupportedCert = 43,
- kPGPsecsh_AT_CertRevoked = 44,
- kPGPsecsh_AT_CertExpired = 45,
- kPGPsecsh_AT_CertUnknown = 46,
- kPGPsecsh_AT_IllegalParameter = 47, /* FATAL */
- kPGPsecsh_AT_UnknownCA = 48, /* FATAL */
- kPGPsecsh_AT_AccessDenied = 49, /* FATAL */
- kPGPsecsh_AT_DecodeError = 50, /* FATAL */
- kPGPsecsh_AT_DecryptError = 51,
- kPGPsecsh_AT_ExportRestriction = 60, /* FATAL */
- kPGPsecsh_AT_ProtocolVersion = 70, /* FATAL */
- kPGPsecsh_AT_InsufficientSecurity = 71, /* FATAL */
- kPGPsecsh_AT_InternalError = 80, /* FATAL */
- kPGPsecsh_AT_UserCancelled = 90,
- kPGPsecsh_AT_NoRenegotiation = 100,
-
- kPGPsecsh_AT_None = 255,
-
- PGP_ENUM_FORCE( PGPsecshAlert_ )
-};
-PGPENUM_TYPEDEF( PGPsecshAlert_, PGPsecshAlert );
-
-/* The Send and Receive function pointers should return
- kPGPError_SECSHWouldBlock when the socket is non-blocking and the
- call would block. The Send and Receive functions passed in will
- need to translate the platform-specific socket error in appropriate
- cases by using calls such as WSAGetLastError() on Win32. Remember
- to call PGPsecshSendQueueIdle for non-blocking sockets also if
- kPGPError_SECSHWouldBlock is returned from a send on a non-blocking
- socket. */
-
-typedef PGPInt32 (* PGPsecshReceiveProcPtr)(void *inData, void *outBuffer,
- PGPInt32 inBufferSize);
-typedef PGPInt32 (* PGPsecshSendProcPtr)(void *inData, const void *inBuffer,
- PGPInt32 inBufferLength);
-
-
-PGPError PGPNewSECSHContext( PGPContextRef context,
- PGPsecshContextRef *outRef );
-
-PGPError PGPFreeSECSHContext( PGPsecshContextRef ref );
-
-/*____________________________________________________________________________
- The following function activates or deactivates the session key cache
- for SECSH sessions. This defaults to on but can be deactivated with this
- function to force all connections to proceed through the entire
- handshake.
-____________________________________________________________________________*/
-PGPError PGPsecshSetCache( PGPsecshContextRef ref, PGPBoolean useCache );
-
-PGPError PGPsecshClearCache( PGPsecshContextRef ref );
-
-PGPError PGPNewSECSHSession( PGPsecshContextRef ref, PGPsecshSessionRef *outRef );
-
-PGPError PGPFreeSECSHSession( PGPsecshSessionRef ref );
-
-PGPError PGPCopySECSHSession( PGPsecshSessionRef ref, PGPsecshSessionRef *outRef );
-
-/* Default options are: client side, no protocol flags */
-PGPError PGPsecshSetProtocolOptions( PGPsecshSessionRef ref,
- PGPsecshFlags options,
- PGPsecshProtocolFlags pflags );
-
-
-/*____________________________________________________________________________
- The following function must be called to cleanly close a SECSH
- connection. If it is not called, the session will not be able
- to be resumed from the session cache.
-
- In the event the application determines any problem with the
- connection such as the remote key not being valid, call this
- function with dontCache set to true in order to not cache the
- session keys.
-____________________________________________________________________________*/
-PGPError PGPsecshClose( PGPsecshSessionRef ref,
- PGPBoolean dontCache );
-
-/*____________________________________________________________________________
- The following function must be called to initiate the PGPsecsh session.
- Once a SECSH session has been assigned to a socket, no data can be sent
- over that socket by the application until the handshake is completed.
- Handshake completion is indicated by completion of this call without
- error or by checking the state of the PGPsecshSession. It will be
- kPGPsecsh_ReadyState when the application layer may send and receive
- data securely.
-
- This function performs all negotiation of the SECSH connection.
-____________________________________________________________________________*/
-PGPError PGPsecshHandshake( PGPsecshSessionRef ref );
-
-/*____________________________________________________________________________
- The following function sets the local private authenticating key,
- as well as other relevant data.
-
- The passphrase, key etc. are retained in memory.
- It is an error not to specify a key.
- This function must be passed either PGPOPassphrase or PGPOPasskeyBuffer.
- inKeyObject must be in a PGP private key. inHostKeys should be a keyset
- where the host key of the remote system is found, if we are checking
- for consistency of that key. See PGPsecshGetRemoteAuthenticatedKey
- for how to learn what host key was used.
- inUserName is used to log in on the remote system.
- inHostName is used for the username on the host key if it isn't found
- on the inHostKeys keyset.
-____________________________________________________________________________*/
-PGPError PGPsecshSetLocalPrivateKey( PGPsecshSessionRef ref,
- char * inUserName,
- PGPKeyDBObjRef inKeyObject,
- char * inHostName,
- PGPKeySetRef inHostKeys,
- PGPOptionListRef firstOption, ... );
-
-/*____________________________________________________________________________
- The following function gets the authenticated remote host key after a
- successful handshake. You can call this function after a successful
- handshake to verify that the remote key is authorized to make the
- connection. The key returned will be on the inHostKeys keyset if it
- matched one of the keys there; if it is a new host key which was not
- in that keyset then it will be in a keyset & keydb of its own.
-____________________________________________________________________________*/
-PGPError PGPsecshGetRemoteAuthenticatedKey( PGPsecshSessionRef ref,
- PGPKeyDBObjRef *outKey,
- PGPKeyDBRef * outKeyDB );
-
-/*____________________________________________________________________________
- The following function exports a PGP key in SECSH format. The resulting
- line can be copied into the SECSH host file. inKey is the key to
- export, and inUserName is the name which is put at the end of the line,
- which is used only as a convenient label by SECSH software.
- The data is returned in a null-terminated allocated buffer which the
- caller should free.
-____________________________________________________________________________*/
- PGPError
-PGPsecshExportPublicKey(
- PGPKeyDBObjRef inKey,
- char * inUserName,
- char ** outBuffer,
- PGPSize * outLength);
-
-/*____________________________________________________________________________
- The following two functions process data through SECSH.
-
- It is an error to call these functions without having set a
- Read function pointer or Write function pointer.
-____________________________________________________________________________*/
-PGPError PGPsecshReceive( PGPsecshSessionRef ref,
- PGPByte * outType,
- void ** outBuffer,
- PGPSize * bufferSize );
-
-PGPError PGPsecshSend( PGPsecshSessionRef ref,
- PGPByte pktType,
- const void * inBuffer,
- PGPSize inBufferLength );
-
-/*____________________________________________________________________________
- The following two functions set the callbacks which do the actual I/O.
-
- The inData parameter is passed to the callback and may be e.g. a socket
- handle.
-____________________________________________________________________________*/
-PGPError PGPsecshSetReceiveCallback( PGPsecshSessionRef ref,
- PGPsecshReceiveProcPtr secshReceiveProc,
- void * inData );
-
-PGPError PGPsecshSetSendCallback( PGPsecshSessionRef ref,
- PGPsecshSendProcPtr secshSendProc,
- void * inData );
-
-
-/*____________________________________________________________________________
- The following function is necessary *only* on a non-blocking socket.
- If a call to PGPsecshSend returns kPGPError_SECSHWouldBlock, call
- the following function repeatedly until that error is no longer
- returned in order to make sure data is sent. Another call to
- PGPsecshSend will also call this function automatically and queue
- any new data if necessary.
-____________________________________________________________________________*/
-PGPError PGPsecshSendQueueIdle( PGPsecshSessionRef ref );
-
-PGPSize PGPsecshReceiveBufferSize( PGPsecshSessionRef ref );
-
-/*____________________________________________________________________________
- The following function gets the ID of the fatal alert which caused
- the SECSH session to abort and go into the kPGPsecsh_FatalErrorState.
-____________________________________________________________________________*/
-PGPError PGPsecshGetAlert( PGPsecshSessionRef ref, PGPsecshAlert *outAlert );
-
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_PGPsecsh_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpSKEP.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpSKEP.h
deleted file mode 100644
index 217c88e1b8..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpSKEP.h
+++ /dev/null
@@ -1,120 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpSKEP.h,v 1.1 2004/04/01 11:45:40 wprice Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpSKEP_h /* [ */
-#define Included_pgpSKEP_h
-
-#include "pgpConfig.h"
-#include "pgpBase.h"
-#include "pgpErrors.h"
-#include "pgpShare.h"
-#include "pgpKeys.h"
-#include "pgpTLS.h"
-
-typedef struct PGPskep * PGPskepRef;
-
-#define kInvalidPGPskepRef ((PGPskepRef) NULL)
-#define PGPskepRefIsValid( ref ) ( (ref) != kInvalidPGPskepRef )
-
-typedef enum _PGPskepEventType
-{
- kPGPskepEvent_NullEvent = 0, /* Nothing is happening */
- kPGPskepEvent_ListenEvent = 1, /* Listening for data */
- kPGPskepEvent_ConnectEvent = 2, /* Connection established */
- kPGPskepEvent_AuthenticateEvent = 3, /* Remote site authenticated */
- kPGPskepEvent_ProgressEvent = 4, /* Data flow progress */
- kPGPskepEvent_CloseEvent = 5, /* Connection closing */
- kPGPskepEvent_ShareEvent = 6, /* Share received */
- kPGPskepEvent_PassphraseEvent = 7 /* Passphrase needed */
-} PGPskepEventType;
-
-typedef struct _PGPskepEventAuthenticateData
-{
- PGPKeyDBObjRef remoteKey;
- const char * remoteHostname;
- const char * remoteIPAddress;
- PGPtlsCipherSuiteNum tlsCipher;
-} PGPskepEventAuthenticateData;
-
-typedef struct _PGPskepEventProgressData
-{
- PGPUInt32 bytesSoFar;
- PGPUInt32 bytesTotal;
-} PGPskepEventProgressData;
-
-typedef struct _PGPskepEventShareData
-{
- PGPShareRef shares;
-} PGPskepEventShareData;
-
-typedef struct _PGPskepEventPassphraseData
-{
- char * passphrase;
- PGPByte * passkey;
- PGPSize passkeySize;
-} PGPskepEventPassphraseData;
-
-typedef union _PGPskepEventData
-{
- PGPskepEventAuthenticateData ad;
- PGPskepEventProgressData pd;
- PGPskepEventShareData sd;
- PGPskepEventPassphraseData ppd;
-} PGPskepEventData;
-
-typedef struct _PGPskepEvent
-{
- PGPskepEventType type;
- PGPskepEventData data;
-} PGPskepEvent;
-
-typedef PGPError (*PGPskepEventHandler)(PGPskepRef skep,
- PGPskepEvent *event, PGPUserValue userValue);
-
-
-PGP_BEGIN_C_DECLARATIONS
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-PGPError PGPNewSKEP(PGPContextRef context,
- PGPtlsContextRef tlsContext,
- PGPskepRef *skep);
-
-PGPError PGPskepSetEventHandler(PGPskepRef skep,
- PGPskepEventHandler handler, PGPUserValue userValue);
-
-PGPError PGPskepSendShares(PGPskepRef skep, PGPKeyDBObjRef authKey,
- const char *passphrase, PGPShareRef shares,
- const char *destSocketAddress);
-
-PGPError PGPskepReceiveShares(PGPskepRef skep, PGPKeyDBObjRef authKey,
- const char *passphrase);
-
-PGPError PGPskepCancel(PGPskepRef skep);
-
-PGPError PGPFreeSKEP(PGPskepRef skep);
-
-PGPContextRef PGPGetSKEPContext(PGPskepRef skep);
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpSKEP_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpShare.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpShare.h
deleted file mode 100644
index 04d6da569c..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpShare.h
+++ /dev/null
@@ -1,80 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpShare.h,v 1.1 2004/04/01 11:45:40 wprice Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpShare_h /* [ */
-#define Included_pgpShare_h
-
-#include "pgpConfig.h"
-#include "pgpBase.h"
-#include "pgpKeys.h"
-
-typedef struct PGPShare * PGPShareRef;
-
-typedef struct PGPShareID_
-{
- PGPByte data[8];
-} PGPShareID;
-
-#define kInvalidPGPShareRef ((PGPShareRef) NULL)
-#define PGPShareRefIsValid( ref ) ( (ref) != kInvalidPGPShareRef )
-
-PGP_BEGIN_C_DECLARATIONS
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-PGPError PGPCreateShares(PGPContextRef context, PGPKeyDBObjRef key,
- PGPUInt32 threshold, PGPUInt32 numShares,
- PGPShareRef *share);
-
-/* The passkey needs to be freed with PGPFreeData(passkey) */
-PGPError PGPGetPasskeyFromShares(PGPShareRef share, PGPByte **passkey,
- PGPSize *passkeySize);
-
-PGPError PGPSplitShares(PGPShareRef share, PGPUInt32 numShares,
- PGPShareRef *splitShares);
-
-/* The share objects being combined are NOT freed by this function */
-PGPError PGPCombineShares(PGPShareRef firstShare, PGPShareRef secondShare,
- PGPShareRef *combinedShares);
-
-PGPError PGPFreeShares(PGPShareRef share);
-
-PGPError PGPGetKeyIDFromShares(PGPShareRef share, PGPKeyID *id);
-
-PGPError PGPGetShareID(PGPShareRef share, PGPShareID *id);
-
-PGPUInt32 PGPGetShareThreshold(PGPShareRef share);
-
-/* This is the number of shares contained in the share object */
-PGPUInt32 PGPGetNumberOfShares(PGPShareRef share);
-
-/* The share object may contain less than the total number of shares */
-PGPUInt32 PGPGetTotalNumberOfShares(PGPShareRef share);
-
-PGPBoolean IsSamePGPShares(PGPShareRef firstShare, PGPShareRef secondShare);
-
-/* If firstID < secondID, -1 */
-/* If firstID > secondID, 1 */
-/* If firstID = secondID, 0 */
-PGPInt32 PGPCompareShareIDs(PGPShareID firstID, PGPShareID secondID);
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpShare_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpShareFile.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpShareFile.h
deleted file mode 100644
index 4a7aa3e920..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpShareFile.h
+++ /dev/null
@@ -1,95 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpShareFile.h,v 1.1 2004/04/01 11:45:40 wprice Exp $
-____________________________________________________________________________*/
-#ifndef Included_pgpShareFile_h /* [ */
-#define Included_pgpShareFile_h
-
-#include "pgpConfig.h"
-#include "pgpBase.h"
-#include "pgpErrors.h"
-#include "pgpPubTypes.h"
-#include "pflTypes.h"
-#include "pgpShare.h"
-
-typedef struct PGPShareFile * PGPShareFileRef;
-
-#define kInvalidPGPShareFileRef ((PGPShareFileRef) NULL)
-#define PGPShareFileRefIsValid( ref ) ( (ref) != kInvalidPGPShareFileRef )
-
-PGP_BEGIN_C_DECLARATIONS
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import on
-#endif
-
-PGPError PGPNewShareFile(PFLFileSpecRef shareFileSpec,
- PGPShareFileRef *shareFileRef);
-
-PGPError PGPFreeShareFile(PGPShareFileRef shareFileRef);
-
-/* The share object needs to be freed with PGPFreeShares(shares) */
-PGPError PGPCopySharesFromFile(PGPContextRef context,
- PGPShareFileRef shareFileRef, PGPOptionListRef optionList,
- PGPShareRef *shares);
-
-PGPError PGPCopySharesToFile(PGPContextRef context,
- PGPShareFileRef shareFileRef, PGPOptionListRef optionList,
- PGPShareRef shares);
-
-PGPError PGPGetShareFileUserID(PGPShareFileRef shareFileRef,
- PGPSize bufferSize, PGPUTF8 *userID, PGPSize *fullSize);
-
-PGPError PGPSetShareFileUserID(PGPShareFileRef shareFileRef,
- const PGPUTF8 *userID);
-
-PGPError PGPOpenShareFile(PFLFileSpecRef shareFileSpec,
- PGPShareFileRef *shareFileRef);
-
-PGPError PGPSaveShareFile(PGPShareFileRef shareFileRef);
-
-PGPError PGPGetShareFileSpec(PGPShareFileRef shareFileRef,
- PFLFileSpecRef *shareFileSpec);
-
-PGPError PGPGetShareFileShareID(PGPShareFileRef shareFileRef,
- PGPShareID *id);
-
-PGPError PGPGetShareFileOwnerKeyID(PGPShareFileRef shareFileRef,
- PGPKeyID *id);
-
-PGPError PGPSetShareFileOwnerKeyID(PGPShareFileRef shareFileRef,
- const PGPKeyID id);
-
-PGPError PGPGetShareFileOwnerFingerprint(PGPShareFileRef shareFileRef,
- PGPSize bufferSize, void *fingerprint, PGPSize *fullSize);
-
-PGPError PGPSetShareFileOwnerFingerprint(PGPShareFileRef shareFileRef,
- PGPSize bufferSize, const void *fingerprint);
-
-PGPError PGPGetShareFileSharedKeyID(PGPShareFileRef shareFileRef,
- PGPKeyID *id);
-
-PGPUInt32 PGPGetShareThresholdInFile(PGPShareFileRef shareFileRef);
-
-PGPUInt32 PGPGetNumSharesInFile(PGPShareFileRef shareFileRef);
-
-PGPBoolean IsSamePGPSharesInFiles(PGPShareFileRef firstFile,
- PGPShareFileRef secondFile);
-
-#if PRAGMA_IMPORT_SUPPORTED
-#pragma import reset
-#endif
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpShareFile_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpSockets.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpSockets.h
deleted file mode 100644
index e82ab45026..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpSockets.h
+++ /dev/null
@@ -1,464 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpSockets.h,v 1.8 2003/12/13 01:20:39 dallen Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpSockets_h /* [ */
-#define Included_pgpSockets_h
-
-#include <stdio.h>
-
-#include "pgpOptionList.h"
-#include "pgpTLS.h"
-#include "pgpErrors.h"
-
-#if PGP_UNIX
-# include <sys/types.h>
-# include <sys/socket.h>
-# include <sys/time.h> /* Needed for struct timeval */
-#if PGP_UNIX_LINUX
-# include <sys/ioctl.h> /* Need FIONREAD */
-#elif PGP_UNIX_SOLARIS || PGP_UNIX_DARWIN
-# include <sys/filio.h>
-#elif PGP_UNIX_AIX
-#include <sys/ioctl.h>
-#endif /* ! PGP_UNIX_LINUX */
-# include <netinet/in.h>
-# include <netdb.h>
-#endif
-
-#if PGP_WIN32
-# include <winsock.h>
-#endif
-
-PGP_BEGIN_C_DECLARATIONS
-
-#if PGP_UNIX
-typedef int PGPSocketRef;
-#else
-typedef SOCKET PGPSocketRef;
-#endif
-
-
-/*
- * Unix and Windows share the same Berkeley socket interface. This isn't
- * the most efficient Windows implmentation of TCP/IP, but it is
- * compatible with UNIX berkeley sockets, making cross-platform possible.
- *
- * Trying to write cross-platform win32 TCP/IP code using all the fancy
- * dancy Win32 network functions would be nearly impossible IMHO
- *
- * The Mac doesn't have the berkeley stuff, so we roll our own for all
- * of the structures.
- *
- * Start with Unix and Win32
- */
-#if PGP_UNIX || PGP_WIN32
-
-# define kInvalidPGPSocketRef ((PGPSocketRef) (~0))
-
- typedef struct hostent PGPHostEntry;
- typedef struct protoent PGPProtocolEntry;
- typedef struct servent PGPServiceEntry;
- typedef struct sockaddr_in PGPSocketAddressInternet;
- typedef struct sockaddr PGPSocketAddress;
- typedef struct in_addr PGPInternetAddress;
- typedef fd_set PGPSocketSet;
- typedef struct timeval PGPSocketsTimeValue;
-
-# define PGPSOCKETSET_CLEAR(socketRef, set) FD_CLR((int) (socketRef), (set))
-# define PGPSOCKETSET_SET(socketRef, set) FD_SET((int) (socketRef), (set))
-# define PGPSOCKETSET_ZERO(set) FD_ZERO((set))
-# define PGPSOCKETSET_ISSET(socketRef, set) FD_ISSET((int) (socketRef), (set))
-
- /* Address families */
- enum {
- kPGPAddressFamilyUnspecified = AF_UNSPEC,
- kPGPAddressFamilyInternet = AF_INET
- };
-
- /* Protocol families */
- enum {
- kPGPProtocolFamilyInternet = PF_INET
- };
-
- /* Types */
- enum {
- kPGPSocketTypeStream = SOCK_STREAM,
- kPGPSocketTypeDatagram = SOCK_DGRAM
- };
-
- /* Commands for PGPIOControlSocket */
- enum {
- kPGPSocketCommandGetUnreadData = FIONREAD
- };
-
- /* Levels for PGPGetSocketOptions and PGPSetSocketOptions */
- enum {
- kPGPSocketOptionLevelSocket = SOL_SOCKET
- };
-
- /* Options for PGPGetSocketOptions and PGPSetSocketOptions */
- enum {
- kPGPSocketOptionAcceptingConnections = SO_ACCEPTCONN,
- kPGPSocketOptionType = SO_TYPE
- };
-
- /* Protocols */
- enum {
- kPGPTCPProtocol = IPPROTO_TCP,
- kPGPUDPProtocol = IPPROTO_UDP
- };
-
- /* Send flags */
- enum {
- kPGPSendFlagNone = 0
- };
-
- /* Receive flags */
- enum {
- kPGPReceiveFlagNone = 0
- };
-
- /* Internet Addresses */
- enum {
- kPGPInternetAddressAny = INADDR_ANY
- };
-
-#endif /* PGP_UNIX || PGP_WIN32 */
-
-/*
- * Onto the Mac, where we need to create our own versions of the various
- * structures.
- */
-#if PGP_MACINTOSH
-
-# define kInvalidPGPSocketRef ((PGPSocketRef) NULL)
-
- typedef struct PGPInternetAddress {
- union {
- struct {
- PGPByte s_b1;
- PGPByte s_b2;
- PGPByte s_b3;
- PGPByte s_b4;
- } S_un_b;
- struct {
- PGPUInt16 s_w1;
- PGPUInt16 s_w2;
- } S_un_w;
- PGPUInt32 S_addr;
- } S_un;
-# define s_addr S_un.S_addr
- } PGPInternetAddress;
-
- typedef struct PGPSocketAddressInternet {
- PGPInt16 sin_family;
- PGPUInt16 sin_port;
- PGPInternetAddress sin_addr;
- PGPByte sin_zero[8];
- } PGPSocketAddressInternet;
-
- typedef struct PGPSocketAddress {
- PGPUInt16 sa_family;
- PGPByte sa_data[14];
- } PGPSocketAddress;
-
- typedef struct PGPHostEntry {
- char * h_name;
- char ** unused;
- PGPInt16 h_addrtype;
- PGPInt16 h_length;
- char ** h_addr_list;
-# define h_addr h_addr_list[0]
- } PGPHostEntry;
-
- typedef struct PGPProtocolEntry {
- char * p_name;
- char ** p_aliases;
- PGPInt16 p_proto;
- } PGPProtocolEntry;
-
- typedef struct PGPServiceEntry {
- char * s_name;
- char ** s_aliases;
- PGPUInt16 s_port;
- char * s_proto;
- } PGPServiceEntry;
-
- /* Select types and defines */
-# ifndef PGPSOCKETSET_SETSIZE
-# define PGPSOCKETSET_SETSIZE 64
-# endif
-
- typedef struct PGPSocketSet {
- PGPUInt16 fd_count;
- PGPSocketRef fd_array[PGPSOCKETSET_SETSIZE];
- } PGPSocketSet;
-
-# define PGPSOCKETSET_CLEAR(socketRef, set) do { \
- PGPUInt16 __i; \
- for (__i = 0; __i < ((PGPSocketSet * (set))->fd_count; __i++) { \
- if (((PGPSocketSet *) (set))->fd_array[__i] == socketRef) { \
- while (__i < (((PGPSocketSet *) (set))->fd_count - 1)) { \
- ((PGPSocketSet *) (set))->fd_array[__i] = \
- ((PGPSocketSet *) (set))->fd_array[__i + 1]; \
- __i++; \
- } \
- ((PGPSocketSet *) (set))->fd_count--; \
- break; \
- } \
- } \
- } while (0)
-
-# define PGPSOCKETSET_SET(socketRef, set) do { \
- if (((PGPSocketSet *) (set))->fd_count < PGPSOCKETSET_SETSIZE) { \
- ((PGPSocketSet *) (set))->fd_array[((PGPSocketSet *) \
- (set))->fd_count++] = (socketRef); \
- } \
- } while (0)
-
-# define PGPSOCKETSET_ZERO(set) (((PGPSocketSet *) (set))->fd_count = 0)
-
- PGPInt32 __PGPSocketsIsSet(PGPSocketRef, PGPSocketSet *);
-
-# define PGPSOCKETSET_ISSET(socketRef, set) __PGPSocketsIsSet( \
- (socketRef),(set))
-
- typedef struct PGPSocketsTimeValue {
- PGPInt32 tv_sec; /* seconds */
- PGPInt32 tv_usec; /* and microseconds */
- } PGPSocketsTimeValue;
-
- /* Address families */
- enum {
- kPGPAddressFamilyUnspecified = 0,
- kPGPAddressFamilyInternet = 2
- };
-
- /* Protocol families */
- enum {
- kPGPProtocolFamilyInternet = kPGPAddressFamilyInternet
- };
-
- /* Types */
- enum {
- kPGPSocketTypeStream = 1,
- kPGPSocketTypeDatagram = 2
- };
-
- /* Commands for PGPIOControlSocket */
- enum {
- kPGPSocketCommandGetUnreadData = (0x40000000
- | (((long) sizeof(PGPUInt32) & 0x7F) << 16) | ('f' << 8) | 127)
- };
-
- /* Levels for PGPGetSocketOptions and PGPSetSocketOptions */
- enum {
- kPGPSocketOptionLevelSocket = 0xFFFFFFFF
- };
-
- /* Options for PGPGetSocketOptions and PGPSetSocketOptions */
- enum {
- kPGPSocketOptionAcceptingConnections = 0x00000002,
- kPGPSocketOptionType = 0x00001008
- };
-
- /* Protocols */
- enum {
- kPGPTCPProtocol = 6,
- kPGPUDPProtocol = 17
- };
-
- /* Send flags */
- enum {
- kPGPSendFlagNone = 0
- };
-
- /* Receive flags */
- enum {
- kPGPReceiveFlagNone = 0
- };
-
- /* Internet Addresses */
- enum {
- kPGPInternetAddressAny = 0x00000000
- };
-
-#endif /* PGP_MACINTOSH */
-
-/*
- * Some global things for all platforms
- */
-
-#define PGPSocketRefIsValid(ref) ((ref) != kInvalidPGPSocketRef)
-
-typedef struct PGPSocketsThreadStorage * PGPSocketsThreadStorageRef;
-# define kInvalidPGPSocketsThreadStorageRef \
- ((PGPSocketsThreadStorageRef) NULL)
-#define PGPSocketsThreadStorageRefIsValid(ref) \
- ((ref) != kInvalidPGPSocketsThreadStorageRef)
-
-extern PGPSocketAddressInternet kPGPAddressAny;
-
-/* Errors */
-#define kPGPSockets_Error -1
-
-/* Net byte ordering macros (PGP_WORDSBIGENDIAN defined by configure) */
-#if PGP_WORDSBIGENDIAN
-# define PGPHostToNetLong(x) (x)
-# define PGPHostToNetShort(x) (x)
-# define PGPNetToHostLong(x) (x)
-# define PGPNetToHostShort(x) (x)
-#else
- PGPInt32 PGPHostToNetLong(PGPInt32 x);
- PGPInt16 PGPHostToNetShort(PGPInt16 x);
- PGPInt32 PGPNetToHostLong(PGPInt32 x);
- PGPInt16 PGPNetToHostShort(PGPInt16 x);
-#endif /* PGP_WORDSBIGENDIAN */
-
-/*
- * Shared function interface (except for idle handler code)
- */
-
-/*
- * Use the idle event handler to receive periodic idle events during
- * network calls. Usually this is used only in non-preemptive multi-tasking
- * OSes to allow yielding in threads. Pre-emptive multi-tasking systems
- * should probably not use the call as it interrupts the efficient wait state
- * of threads waiting on network calls.
- *
- * Idle event handlers need to be added on a per thread basis.
- *
- * Returning an error from the idle event handler will cause the socket
- * that is blocking to close.
- *
- */
-PGPError PGPSetSocketsIdleEventHandler(
- PGPEventHandlerProcPtr inCallback,
- PGPUserValue inUserData);
-
-PGPError PGPGetSocketsIdleEventHandler(
- PGPEventHandlerProcPtr * outCallback,
- PGPUserValue * outUserData);
-
-/* Static storage creation */
-PGPError PGPSocketsCreateThreadStorage(
- PGPSocketsThreadStorageRef * outPreviousStorage);
-PGPError PGPSocketsDisposeThreadStorage(
- PGPSocketsThreadStorageRef inPreviousStorage);
-
-/* Stack based class for saving and restoring thread storage */
-#ifdef __cplusplus /* [ */
-class StPGPPreserveSocketsStorage {
-public:
- StPGPPreserveSocketsStorage() : mStorage(NULL)
- { PGPSocketsCreateThreadStorage(&mStorage); }
- ~StPGPPreserveSocketsStorage()
- { PGPSocketsDisposeThreadStorage(mStorage); }
-
-protected:
- PGPSocketsThreadStorageRef mStorage;
-};
-#endif /* ] __cplusplus */
-
-
-/* Initialization and termination */
-PGPError PGPSocketsInit(void);
-void PGPSocketsCleanup(void);
-
-/* Socket creation and destruction */
-PGPSocketRef PGPOpenSocket(PGPInt32 inAddressFamily, PGPInt32 inSocketType,
- PGPInt32 inSocketProtocol);
-PGPInt32 PGPCloseSocket(PGPSocketRef inSocketRef);
-
-/* Endpoint binding */
-PGPInt32 PGPBindSocket(PGPSocketRef inSocketRef,
- const PGPSocketAddress * inAddress,
- PGPInt32 inAddressLength);
-PGPInt32 PGPConnect(PGPSocketRef inSocketRef,
- const PGPSocketAddress * inServerAddress,
- PGPInt32 inAddressLength);
-
-/* Send functions */
-PGPInt32 PGPSend(PGPSocketRef inSocketRef, const void * inBuffer,
- PGPInt32 inBufferLength, PGPInt32 inFlags);
-PGPInt32 PGPWrite(PGPSocketRef inSocketRef, const void * inBuffer,
- PGPInt32 inBufferLength);
-PGPInt32 PGPSendTo(PGPSocketRef inSocketRef, const void * inBuffer,
- PGPInt32 inBufferLength, PGPInt32 inFlags,
- PGPSocketAddress * inAddress,
- PGPInt32 inAddressLength);
-
-/* Receive functions */
-PGPInt32 PGPReceive(PGPSocketRef inSocketRef, void * outBuffer,
- PGPInt32 inBufferSize, PGPInt32 inFlags);
-PGPInt32 PGPRead(PGPSocketRef inSocketRef, void * outBuffer,
- PGPInt32 inBufferSize);
-PGPInt32 PGPReceiveFrom(PGPSocketRef inSocketRef, void * outBuffer,
- PGPInt32 inBufferSize, PGPInt32 inFlags,
- PGPSocketAddress * outAddress,
- PGPInt32 * ioAddressLength);
-
-/* Server functions */
-PGPInt32 PGPListen(PGPSocketRef inSocketRef, PGPInt32 inMaxBacklog);
-PGPSocketRef PGPAccept(PGPSocketRef inSocketRef,
- PGPSocketAddress * outAddress,
- PGPInt32 * ioAddressLength);
-
-/* Select */
-/* Note that inNumSetCount is not used under Mac and Windows */
-PGPInt32 PGPSelect(PGPInt32 inNumSetCount,
- PGPSocketSet * ioReadSet,
- PGPSocketSet * ioWriteSet,
- PGPSocketSet * ioErrorSet,
- const PGPSocketsTimeValue * inTimeout);
-
-/* DNS and protocol services */
-PGPHostEntry * PGPGetHostByName(const PGPChar8 * inName);
-PGPHostEntry * PGPGetHostByAddress(const PGPChar8 * inAddress,
- PGPInt32 inLength,
- PGPInt32 inType);
-PGPInt32 PGPGetHostName(PGPChar8 * outName, PGPInt32 inNameLength);
-PGPProtocolEntry * PGPGetProtocolByName(const PGPChar8 * inName);
-PGPProtocolEntry * PGPGetProtocolByNumber(PGPInt32 inNumber);
-PGPServiceEntry * PGPGetServiceByName(const PGPChar8 * inName,
- const PGPChar8 * inProtocol);
-PGPServiceEntry * PGPGetServiceByPort(PGPInt32 inPort,
- const PGPChar8 * inProtocol);
-
-/* Error reporting */
-PGPError PGPGetLastSocketsError(void);
-
-/* Utilities */
-PGPInt32 PGPGetSocketName(PGPSocketRef inSocketRef,
- PGPSocketAddress * outName,
- PGPInt32 * ioNameLength);
-PGPInt32 PGPGetPeerName(PGPSocketRef inSocketRef,
- PGPSocketAddress * outName,
- PGPInt32 * ioNameLength);
-PGPUInt32 PGPDottedToInternetAddress(const PGPChar8 * inAddress);
-PGPChar8 * PGPInternetAddressToDottedString(PGPInternetAddress inAddress);
-
-/* Control and options */
-PGPInt32 PGPIOControlSocket(PGPSocketRef inSocketRef,
- PGPInt32 inCommand, PGPUInt32 * ioParam);
-PGPInt32 PGPGetSocketOptions(PGPSocketRef inSocketRef, PGPInt32 inLevel,
- PGPInt32 inOptionName,
- PGPChar8 * outOptionValue,
- PGPInt32 * ioOptionLength);
-PGPInt32 PGPSetSocketOptions(PGPSocketRef inSocketRef, PGPInt32 inLevel,
- PGPInt32 inOptionName,
- const PGPChar8 * inOptionValue,
- PGPInt32 inOptionLength);
-
-/* TLS */
-PGPError PGPSocketsEstablishTLSSession(PGPSocketRef inSocketRef,
- PGPtlsSessionRef inTLSSession);
-
-
-PGP_END_C_DECLARATIONS
-
-#endif /* Included_pgpSockets_h */
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpSymmetricCipher.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpSymmetricCipher.h
deleted file mode 100644
index 61a700e33e..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpSymmetricCipher.h
+++ /dev/null
@@ -1,114 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpSymmetricCipher.h,v 1.7 2003/10/07 01:29:44 ajivsov Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpSymmetricCipher_h /* [ */
-#define Included_pgpSymmetricCipher_h
-
-#include "pgpPubTypes.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- Create a new cipher of the specified algorithm. The cipher cannot be used
- until PGPInitSymmetricCipher() has been called.
-
- If the algorithm is not available then kPGPError_AlgorithmNotAvailable is
- returned.
-____________________________________________________________________________*/
-
-PGPError PGPNewSymmetricCipherContext( PGPContextRef context,
- PGPCipherAlgorithm algorithm,
- PGPSymmetricCipherContextRef *outRef );
-
-/*____________________________________________________________________________
- Disposal clears all data in memory before releasing it.
-____________________________________________________________________________*/
-
-PGPError PGPFreeSymmetricCipherContext( PGPSymmetricCipherContextRef ref );
-
-/*____________________________________________________________________________
- Make an exact copy of the cipher, including the key.
-____________________________________________________________________________*/
-
-PGPError PGPCopySymmetricCipherContext( PGPSymmetricCipherContextRef ref,
- PGPSymmetricCipherContextRef *outRef );
-
-/*____________________________________________________________________________
- The key must be set before using; a cipher can be repeatedly reset and
- reused with different keys to avoid having to create and destroy new
- contexts each time (and it's also cryptographically better not to reuse
- a key).
- Key size is implicit based on algorithm. 'key' is *copied*. Caller
- may want to destroy the original after passing it in.
-____________________________________________________________________________*/
-
-PGPError PGPInitSymmetricCipher( PGPSymmetricCipherContextRef ref,
- const void *key );
-
-/*____________________________________________________________________________
- Wipe any sensitive data in the cipher. Cipher remains alive, but
- key must be set before any data is encrypted.
-____________________________________________________________________________*/
-
-PGPError PGPWipeSymmetricCipher( PGPSymmetricCipherContextRef ref );
-
-/*____________________________________________________________________________
- "Wash" the symmetric cipher
-____________________________________________________________________________*/
-
-PGPError PGPWashSymmetricCipher( PGPSymmetricCipherContextRef ref,
- void const *buf, PGPSize len);
-
-/*____________________________________________________________________________
- Encrypt or decrypt one "block" of data. The block size is determined
- by the cipher (see PGPGetSymmetricCipherSizes()).
-____________________________________________________________________________*/
-
-PGPError PGPSymmetricCipherEncrypt( PGPSymmetricCipherContextRef ref,
- const void *in, void *out );
-
-PGPError PGPSymmetricCipherDecrypt( PGPSymmetricCipherContextRef ref,
- const void *in, void *out );
-
-/*____________________________________________________________________________
- Determine key and block size for specified algorithm. Stateless routine
- does not need a context.
-____________________________________________________________________________*/
-PGPError PGPGetSymmetricCipherSizes( PGPSymmetricCipherContextRef ref,
- PGPSize *keySize, PGPSize *blockSize );
-
-/*____________________________________________________________________________
- * This function integrates stream ciphers into framework of block API.
- * To encrypt/decrypt data, the caller works with stream cipher in ECB block
- * mode and calls this function before and after the last block.
- * There is a feedback between the previous block and the current
- * block for stream ciphers, so ECB for stream ciphers is similiar to CBC
- * with fixed IV for block ciphers.
- *
- * To indicate the real size of input data the caller must call this function
- * with 'size'=0xffffffff before the last block to save a state and then
- * call this function again after the last block was encrypted/decrypted
- * with the 'size' set to the real number of bytes in the buffer. This
- * operation is similiar to padding for block ciphers.
-____________________________________________________________________________*/
-PGPError PGPSymmetricCipherRollback( PGPSymmetricCipherContextRef ref,
- PGPSize size );
-
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpSymmetricCipher_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpTLS.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpTLS.h
deleted file mode 100644
index f901b1b0db..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpTLS.h
+++ /dev/null
@@ -1,336 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- $Id: pgpTLS.h,v 1.13 2004/04/06 05:00:58 wprice Exp $
-____________________________________________________________________________*/
-#ifndef Included_PGPtls_h /* [ */
-#define Included_PGPtls_h
-
-#include "pgpPubTypes.h"
-
-PGP_BEGIN_C_DECLARATIONS
-
-
-typedef struct PGPtlsContext * PGPtlsContextRef;
-typedef const struct PGPtlsContext * PGPtlsConstContextRef;
-
-#define kInvalidPGPtlsContextRef ((PGPtlsContextRef) NULL)
-#define PGPtlsContextRefIsValid( ref ) ( (ref) != kInvalidPGPtlsContextRef )
-
-typedef struct PGPtlsSession * PGPtlsSessionRef;
-typedef const struct PGPtlsSession * PGPtlsConstSessionRef;
-
-#define kInvalidPGPtlsSessionRef ((PGPtlsSessionRef) NULL)
-#define PGPtlsSessionRefIsValid( ref ) ( (ref) != kInvalidPGPtlsSessionRef )
-
-
-typedef PGPFlags PGPtlsFlags;
-#define kPGPtlsFlags_ServerSide 0x01
-#define kPGPtlsFlags_ClientSide 0x02
-#define kPGPtlsFlags_RequestClientCert 0x04
-#define kPGPtlsFlags_NonBlockingIO 0x08
-
-enum PGPtlsCipherSuiteNum_
-{
- kPGPtls_TLS_NULL_WITH_NULL_NULL = 0,
- kPGPtls_TLS_PGP_DHE_DSS_WITH_CAST_CBC_SHA = 1,
- kPGPtls_TLS_PGP_DHE_RSA_WITH_CAST_CBC_SHA = 2,
- kPGPtls_TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA = 3,
- kPGPtls_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA = 4,
- kPGPtls_TLS_RSA_WITH_3DES_EDE_CBC_SHA = 5,
- kPGPtls_TLS_RSA_WITH_IDEA_CBC_SHA = 6,
- kPGPtls_TLS_PGP_RSA_WITH_CAST_CBC_SHA = 7,
- kPGPtls_TLS_PGP_DHE_DSS_WITH_NULL_SHA = 8,
- kPGPtls_TLS_DHE_DSS_WITH_NULL_SHA = 9,
- kPGPtls_TLS_RSA_WITH_ARC4_128_SHA = 10,
-
- kPGPtls_TLS_RSA_WITH_AES_128_CBC_SHA = 11,
- kPGPtls_TLS_DHE_DSS_WITH_AES_128_CBC_SHA = 12,
- kPGPtls_TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 13,
-
- kPGPtls_TLS_RSA_WITH_AES_256_CBC_SHA = 15,
- kPGPtls_TLS_DHE_DSS_WITH_AES_256_CBC_SHA = 16,
- kPGPtls_TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 17,
-
- PGP_ENUM_FORCE( PGPtlsCipherSuiteNum_ )
-};
-PGPENUM_TYPEDEF( PGPtlsCipherSuiteNum_, PGPtlsCipherSuiteNum );
-
-enum PGPtlsProtocolState_
-{
- kPGPtls_IdleState = 0,
- kPGPtls_FatalErrorState = 1,
- kPGPtls_ClosedState = 2,
- kPGPtls_HandshakeState = 3,
- kPGPtls_ReadyState = 4,
-
- PGP_ENUM_FORCE( PGPtlsProtocolState_ )
-};
-PGPENUM_TYPEDEF( PGPtlsProtocolState_, PGPtlsProtocolState );
-
-enum PGPtlsPrime_
-{
- kPGPtls_DHPrime1024 = 0,
- kPGPtls_DHPrime1536 = 1,
- kPGPtls_DHPrime2048 = 2,
- kPGPtls_DHPrime3072 = 3,
- kPGPtls_DHPrime4096 = 4,
-
- PGP_ENUM_FORCE( PGPtlsPrime_ )
-};
-PGPENUM_TYPEDEF( PGPtlsPrime_, PGPtlsPrime );
-
-enum PGPtlsAlert_
-{
- kPGPtls_AT_CloseNotify = 0,
- kPGPtls_AT_UnexpectedMessage = 10, /* FATAL */
- kPGPtls_AT_BadRecordMAC = 20, /* FATAL */
- kPGPtls_AT_DecryptionFailed = 21, /* FATAL */
- kPGPtls_AT_RecordOverflow = 22, /* FATAL */
- kPGPtls_AT_DecompressionFailure = 30, /* FATAL */
- kPGPtls_AT_HandshakeFailure = 40, /* FATAL */
- kPGPtls_AT_NoCertificate = 41, /* SSL3 */
- kPGPtls_AT_BadCertificate = 42,
- kPGPtls_AT_UnsupportedCert = 43,
- kPGPtls_AT_CertRevoked = 44,
- kPGPtls_AT_CertExpired = 45,
- kPGPtls_AT_CertUnknown = 46,
- kPGPtls_AT_IllegalParameter = 47, /* FATAL */
- kPGPtls_AT_UnknownCA = 48, /* FATAL */
- kPGPtls_AT_AccessDenied = 49, /* FATAL */
- kPGPtls_AT_DecodeError = 50, /* FATAL */
- kPGPtls_AT_DecryptError = 51,
- kPGPtls_AT_ExportRestriction = 60, /* FATAL */
- kPGPtls_AT_ProtocolVersion = 70, /* FATAL */
- kPGPtls_AT_InsufficientSecurity = 71, /* FATAL */
- kPGPtls_AT_InternalError = 80, /* FATAL */
- kPGPtls_AT_UserCancelled = 90,
- kPGPtls_AT_NoRenegotiation = 100,
-
- kPGPtls_AT_None = 255,
-
- PGP_ENUM_FORCE( PGPtlsAlert_ )
-};
-PGPENUM_TYPEDEF( PGPtlsAlert_, PGPtlsAlert );
-
-/* The Send and Receive function pointers should return
- kPGPError_TLSWouldBlock when the socket is non-blocking and the
- call would block. The Send and Receive functions passed in will
- need to translate the platform-specific socket error in appropriate
- cases by using calls such as WSAGetLastError() on Win32. Remember
- to call PGPtlsSendQueueIdle for non-blocking sockets also if
- kPGPError_TLSWouldBlock is returned from a send on a non-blocking
- socket. */
-
-typedef PGPInt32 (* PGPtlsReceiveProcPtr)(void *inData, void *outBuffer,
- PGPInt32 outBufferSize);
-typedef PGPInt32 (* PGPtlsSendProcPtr)(void *inData, const void *inBuffer,
- PGPInt32 inBufferLength);
-typedef PGPInt32 (* PGPtlsPeekProcPtr)(void *inData, void *outBuffer,
- PGPInt32 outBufferSize);
-
-PGPError PGPNewTLSContext( PGPContextRef context,
- PGPtlsContextRef *outRef );
-
-PGPError PGPFreeTLSContext( PGPtlsContextRef ref );
-
-/*____________________________________________________________________________
- The following function activates or deactivates the session key cache
- for TLS sessions. This defaults to on but can be deactivated with this
- function to force all connections to proceed through the entire
- handshake.
-____________________________________________________________________________*/
-PGPError PGPtlsSetCache( PGPtlsContextRef ref, PGPBoolean useCache );
-
-PGPError PGPtlsClearCache( PGPtlsContextRef ref );
-
-PGPError PGPNewTLSSession( PGPtlsContextRef ref, PGPtlsSessionRef *outRef );
-
-PGPError PGPFreeTLSSession( PGPtlsSessionRef ref );
-
-PGPError PGPCopyTLSSession( PGPtlsSessionRef ref, PGPtlsSessionRef *outRef );
-
-/* Default options are client side and no client cert request */
-PGPError PGPtlsSetProtocolOptions( PGPtlsSessionRef ref,
- PGPtlsFlags options );
-
-
-/*____________________________________________________________________________
- The following function must be called to cleanly close a TLS
- connection. If it is not called, the session will not be able
- to be resumed from the session cache.
-
- In the event the application determines any problem with the
- connection such as the remote key not being valid, call this
- function with dontCache set to true in order to not cache the
- session keys.
-____________________________________________________________________________*/
-PGPError PGPtlsClose( PGPtlsSessionRef ref,
- PGPBoolean dontCache );
-
-/*____________________________________________________________________________
- The following function must be called to identify cached TLS session.
-
- During a handshake resulting in reused TLS sessions no certificate exchange
- is taking place, so certificate or certificate chain cannot be queried by
- a call to PGPtlsGetRemoteAuthenticatedKey(). Remote peer's authentication
- keys are assumed to be authorized by the application when it earlier placed
- a session into a cache by calling PGPtlsClose(session, FALSE), so the "TRUE"
- return value means "already authorized session".
-
- There is no need to call this function if no caching is done, for example,
- if PGPtlsClose(session, FALSE) is never called or cache is
- disabled / cleared in PGPtlsContextRef.
-____________________________________________________________________________*/
-PGPError PGPtlsIsReusedSession( PGPtlsSessionRef ref, PGPBoolean *reused );
-
-/*____________________________________________________________________________
- The following function must be called to initiate the PGPtls session.
- Once a TLS session has been assigned to a socket, no data can be sent
- over that socket by the application until the handshake is completed.
- Handshake completion is indicated by completion of this call without
- error or by checking the state of the PGPtlsSession. It will be
- kPGPtls_ReadyState when the application layer may send and receive
- data securely.
-
- This function performs all negotiation of the TLS connection.
-____________________________________________________________________________*/
-PGPError PGPtlsHandshake( PGPtlsSessionRef ref );
-
-/*____________________________________________________________________________
- The following function should be called before PGPtlsHandshake.
- In the general case, the remoteID will be an IP address. This
- is provided to PGPtls in order to allow it to cache the current
- session and be able to look it up later. If the remoteID passed
- into a future session is the same as a previously cached session,
- PGPtls will attempt to resume the session.
-____________________________________________________________________________*/
-PGPError PGPtlsSetRemoteUniqueID( PGPtlsSessionRef ref,
- PGPUInt32 remoteID );
-
-/*____________________________________________________________________________
- The following function sets the local private authenticating key.
-
- The passphrase and key are retained in memory. By default, no
- key is specified and a client side session will return no key in the
- client key exchange message to the server.
- It is an error not to specify a key on a server side TLS session.
- This function must be passed either PGPOPassphrase or PGPOPasskeyBuffer.
- You may pass in just a PGP key, PGP w/ X.509 cert, or both -- and they
- must be the same -- the cert must be from the key. For an X.509 cert,
- the inCertChain keyset must contain the keys of all keys in the
- certificate chain for that certificate up to the root. The inCertChain
- keyset must remain valid for the lifetime of the TLS connection.
-____________________________________________________________________________*/
-PGPError PGPtlsSetLocalPrivateKey( PGPtlsSessionRef ref,
- PGPKeyDBObjRef inKeyObject,
- PGPKeySetRef inCertChain,
- PGPOptionListRef firstOption, ... );
-
-/*____________________________________________________________________________
- The following function sets the preferred cipher suite.
-
- There is no guarantee that cipher will actually be negotiated,
- but it will be attempted in preference to others.
-____________________________________________________________________________*/
-PGPError PGPtlsSetPreferredCipherSuite( PGPtlsSessionRef ref,
- PGPtlsCipherSuiteNum cipher );
-
-/*____________________________________________________________________________
- The following function sets the desired DH prime.
-
- The requested primes are drawn from a set of primes hard-coded
- into PGPtls. New primes can be added in a fully compatible
- fashion since the server sends the prime to the client, but this
- version of the API does not support passing in a desired prime. The
- default prime if this function is not called is kPGPtls_DHPrime2048.
-____________________________________________________________________________*/
-PGPError PGPtlsSetDHPrime( PGPtlsSessionRef ref,
- PGPtlsPrime prime );
-
-/*____________________________________________________________________________
- The following function gets the authenticated remote key after a
- successful handshake. You must call this function after a successful
- handshake to verify that the remote key is authorized to make the
- connection.
-____________________________________________________________________________*/
-PGPError PGPtlsGetRemoteAuthenticatedKey( PGPtlsSessionRef ref,
- PGPKeyDBObjRef *outKey,
- PGPKeyDBRef * outKeyDB );
-
-/*____________________________________________________________________________
- The following function returns the negotiated symmetric cipher.
-
- This function will return an error if called before a successful
- handshake.
-____________________________________________________________________________*/
-PGPError PGPtlsGetNegotiatedCipherSuite( PGPtlsSessionRef ref,
- PGPtlsCipherSuiteNum *outCipher );
-
-PGPError PGPtlsGetState( PGPtlsSessionRef ref,
- PGPtlsProtocolState *outState );
-
-/*____________________________________________________________________________
- The following two functions process data through TLS.
-
- It is an error to call these functions without having set a
- Read function pointer or Write function pointer. Most applications
- will never need to use these functions as the function pointers
- are automatically configured by PGPsockets, and these functions
- are automatically called by the PGPsockets implementations of
- PGPWrite and PGPRead whenever a PGPtlsSessionRef has been set for
- a given socket.
-____________________________________________________________________________*/
-PGPError PGPtlsReceive( PGPtlsSessionRef ref,
- void * outBuffer,
- PGPSize * bufferSize );
-
-PGPError PGPtlsSend( PGPtlsSessionRef ref,
- const void * inBuffer,
- PGPSize inBufferLength );
-
-PGPError PGPtlsSetReceiveCallback( PGPtlsSessionRef ref,
- PGPtlsReceiveProcPtr tlsReceiveProc,
- void * inData );
-
-PGPError PGPtlsSetSendCallback( PGPtlsSessionRef ref,
- PGPtlsSendProcPtr tlsSendProc,
- void * inData );
-
-PGPError PGPtlsSetPeekCallback( PGPtlsSessionRef ref,
- PGPtlsPeekProcPtr tlsPeekProc,
- void * inData );
-
-/*____________________________________________________________________________
- The following function is necessary *only* on a non-blocking socket.
- If a call to PGPtlsSend returns kPGPError_TLSWouldBlock, call
- the following function repeatedly until that error is no longer
- returned in order to make sure data is sent. Another call to
- PGPtlsSend will also call this function automatically and queue
- any new data if necessary.
-____________________________________________________________________________*/
-PGPError PGPtlsSendQueueIdle( PGPtlsSessionRef ref );
-
-PGPSize PGPtlsReceiveBufferSize( PGPtlsSessionRef ref );
-
-/*____________________________________________________________________________
- The following function gets the ID of the fatal alert which caused
- the TLS session to abort and go into the kPGPtls_FatalErrorState.
-____________________________________________________________________________*/
-PGPError PGPtlsGetAlert( PGPtlsSessionRef ref, PGPtlsAlert *outAlert );
-const PGPChar * PGPtlsGetAlertString( PGPtlsAlert alert );
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_PGPtls_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpUserInterface.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpUserInterface.h
deleted file mode 100644
index 210f1656f2..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpUserInterface.h
+++ /dev/null
@@ -1,284 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- This file contains the prototypes for functions which use UI to interact
- with the user.
-
- $Id: pgpUserInterface.h,v 1.21 2003/09/24 03:09:32 ajivsov Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpUserInterface_h /* [ */
-#define Included_pgpUserInterface_h
-
-#include "pgpPubTypes.h"
-#include "pgpTLS.h"
-
-#if PGP_WIN32
-#include "windows.h"
-#endif
-
-PGP_BEGIN_C_DECLARATIONS
-
-#if PGP_MACINTOSH
-#pragma options align=mac68k
-#endif
-
-enum PGPAdditionalRecipientRequestEnforcement_
-{
- kPGPARREnforcement_Invalid = 0,
- kPGPARREnforcement_None = 1,
- kPGPARREnforcement_Warn = 2,
- kPGPARREnforcement_Strict = 3,
-
- PGP_ENUM_FORCE( PGPAdditionalRecipientRequestEnforcement_ )
-};
-PGPENUM_TYPEDEF( PGPAdditionalRecipientRequestEnforcement_,
- PGPAdditionalRecipientRequestEnforcement );
-
-enum PGPRecipientSpecType_
-{
- kPGPRecipientSpecType_Invalid = 0,
- kPGPRecipientSpecType_Key = 1,
- kPGPRecipientSpecType_UserID = 2,
- kPGPRecipientSpecType_KeyID = 3,
-
- PGP_ENUM_FORCE( PGPRecipientSpecType_ )
-};
-PGPENUM_TYPEDEF( PGPRecipientSpecType_, PGPRecipientSpecType );
-
-enum PGPRecipientSpecFlags_
-{
- kPGPRecipientSpecFlags_Locked = (1UL << 0),
-
- PGP_ENUM_FORCE( PGPRecipientSpecFlags_ )
-};
-
-typedef PGPFlags PGPRecipientSpecFlags;
-
-typedef struct PGPRecipientSpec
-{
- PGPRecipientSpecType type;
- PGPRecipientSpecFlags flags;
- PGPUInt32 reserved32[3]; /* Must be zero */
-
- union
- {
- PGPKeyDBObjRef key;
- PGPChar8 userIDStr[256]; /* Null terminated string */
- PGPKeyID keyID;
- } u;
-
-} PGPRecipientSpec;
-
-typedef struct PGPKeyServerSpec
-{
- PGPKeyServerRef server;
- const PGPChar8 *serverName; /* Optional */
- const PGPChar8 *serverDomain; /* Optional */
-
-} PGPKeyServerSpec;
-
-#if PGP_MACINTOSH
-#pragma options align=reset
-#endif
-
-PGPError PGPRecipientDialog( PGPContextRef context, PGPKeyDBRef sourceKeys,
- PGPBoolean alwaysDisplayDialog, PGPKeyDBRef *recipientKeys,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPPassphraseDialog( PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPConfirmationPassphraseDialog( PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPKeyPassphraseDialog( PGPContextRef context,
- PGPKeyDBObjRef keyDBObject, PGPOptionListRef firstOption, ... );
-
-PGPError PGPSigningPassphraseDialog( PGPContextRef context,
- PGPKeyDBRef sourceKeys, PGPKeyDBObjRef *signingKey,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPDecryptionPassphraseDialog( PGPContextRef context,
- PGPKeySetRef recipientKeys, PGPUInt32 keyIDCount,
- const PGPKeyID keyIDList[], PGPKeyDBObjRef *decryptionKey,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPConventionalEncryptionPassphraseDialog( PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPConventionalDecryptionPassphraseDialog( PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPOptionsDialog( PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPCollectRandomDataDialog( PGPContextRef context,
- PGPUInt32 neededEntropyBits,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPSearchKeyServerDialog(
- PGPContextRef context,
- PGPUInt32 serverCount,
- const PGPKeyServerSpec serverList[],
- PGPtlsContextRef tlsContext,
- PGPBoolean searchAllServers,
- PGPKeyDBRef *foundKeys,
- PGPOptionListRef firstOption, ... );
-
-PGPError PGPSendToKeyServerDialog(
- PGPContextRef context,
- const PGPKeyServerSpec *server,
- PGPtlsContextRef tlsContext,
- PGPKeySetRef keysToSend,
- PGPKeySetRef *failedKeys,
- PGPOptionListRef firstOption, ... );
-
-/*
-** Returns a value in the range 0-100 which crudely estimates
-** the "quality" of a passphrase.
-*/
-
-#undef PGPEstimatePassphraseQuality
-PGPUInt32 PGPEstimatePassphraseQuality( const PGPChar8 *passphrase );
-
-/* General dialog options */
-
-#undef PGPOUIDialogPrompt
-PGPOptionListRef PGPOUIDialogPrompt( PGPContextRef context,
- const PGPChar8 *prompt );
-
-#undef PGPOUIWindowTitle
-PGPOptionListRef PGPOUIWindowTitle( PGPContextRef context,
- const PGPChar8 *title );
-
-PGPOptionListRef PGPOUIDialogOptions( PGPContextRef context,
- PGPOptionListRef firstOption, ... );
-
-PGPOptionListRef PGPOUIDialogContextHelpButton(PGPContextRef context,
- PGPBoolean showDialogContextHelpButton);
-
-#if PGP_WIN32
-PGPOptionListRef PGPOUIParentWindowHandle( PGPContextRef context,
- HWND hwndParent );
-#endif
-
-/* All passphrase dialogs */
-
-/* Caller should free passphrase with PGPFreeData() */
-#undef PGPOUIOutputPassphrase
-PGPOptionListRef PGPOUIOutputPassphrase( PGPContextRef context,
- PGPChar8 **passphrase );
-
-PGPOptionListRef PGPOUIMinimumPassphraseQuality( PGPContextRef context,
- PGPUInt32 minimumPassphraseQuality );
-
-PGPOptionListRef PGPOUIMinimumPassphraseLength( PGPContextRef context,
- PGPUInt32 minimumPassphraseLength );
-
-/* Will cause the dialog to cancel if there has been no activity for x seconds */
-PGPOptionListRef PGPOUIDialogTimeout( PGPContextRef context,
- PGPUInt32 seconds);
-
-/* PGPConfirmationPassphraseDialog() options */
-
-PGPOptionListRef PGPOUIShowPassphraseQuality( PGPContextRef context,
- PGPBoolean showPassphraseQuality );
-
-/* PGPSigningPassphraseDialog() and PGPDecryptionPassphraseDialog() options */
-
-PGPOptionListRef PGPOUIDefaultKey( PGPContextRef context,
- PGPKeyDBObjRef defaultKey );
-
-PGPOptionListRef PGPOUIVerifyPassphrase( PGPContextRef context,
- PGPBoolean verifyPassphrase );
-
-PGPOptionListRef PGPOUIFindMatchingKey( PGPContextRef context,
- PGPBoolean findMatchingKey );
-
-PGPOptionListRef PGPOUITextUI( PGPContextRef context, PGPBoolean textUI );
-
-/* PGPRecipientDialog() options: */
-
-PGPOptionListRef PGPOUIRecipientList( PGPContextRef context,
- PGPUInt32 *recipientCount,
- PGPRecipientSpec **recipientList );
-
-PGPOptionListRef PGPOUIDefaultRecipients( PGPContextRef context,
- PGPUInt32 recipientCount,
- const PGPRecipientSpec recipientList[] );
-
-PGPOptionListRef PGPOUIDisplayMarginalValidity( PGPContextRef context,
- PGPBoolean displayMarginalValidity );
-
-PGPOptionListRef PGPOUIIgnoreMarginalValidity( PGPContextRef context,
- PGPBoolean ignoreMarginalValidity );
-
-PGPOptionListRef PGPOUIEnforceAdditionalRecipientRequests(
- PGPContextRef context,
- PGPAdditionalRecipientRequestEnforcement enforcement,
- PGPBoolean alwaysDisplayDialogWithARRs);
-
-/* PGPDecryptionPassphraseDialog() and PGPRecipientDialog() only: */
-
-PGPOptionListRef PGPOUIKeyServerUpdateParams(PGPContextRef context,
- PGPUInt32 serverCount,
- const PGPKeyServerSpec serverList[],
- PGPtlsContextRef tlsContext,
- PGPBoolean searchBeforeDisplay,
- PGPKeyDBRef *foundKeys,
- PGPOptionListRef firstOption, ...);
-
-/* Key server search dialog options */
-
-PGPOptionListRef PGPOUIKeyServerSearchFilter(PGPContextRef context,
- PGPFilterRef filter);
-
-PGPOptionListRef PGPOUIKeyServerSearchKey(PGPContextRef context,
- PGPKeyDBObjRef searchKeyObject);
-
-PGPOptionListRef PGPOUIKeyServerSearchKeySet(PGPContextRef context,
- PGPKeySetRef keySet);
-
-PGPOptionListRef PGPOUIKeyServerSearchKeyIDList(PGPContextRef context,
- PGPUInt32 keyIDCount, const PGPKeyID keyIDList[] );
-
-/*
-** These options are used to build the options dialog and are only
-** applicable for the PGPOptionsDialog() and PGPOUIDialogOptions() calls.
-** The "description" parameters are optional.
-*/
-#undef PGPOUICheckbox
-PGPOptionListRef PGPOUICheckbox(PGPContextRef context, PGPUInt32 itemID,
- const PGPChar8 *title, const PGPChar8 *description,
- PGPUInt32 initialValue, PGPUInt32 *resultPtr,
- PGPOptionListRef firstOption, ...);
-#undef PGPOUIPopupList
-PGPOptionListRef PGPOUIPopupList(PGPContextRef context, PGPUInt32 itemID,
- const PGPChar8 *title, const PGPChar8 *description,
- PGPUInt32 listItemCount, const PGPChar8 *listItems[],
- PGPUInt32 initialValue, PGPUInt32 *resultPtr,
- PGPOptionListRef firstOption, ...);
-
-#if PGP_DEPRECATED
-
-#include "pgpGroups.h"
-
-PGPOptionListRef PGPOUIRecipientGroups(PGPContextRef context,
- PGPGroupSetRef groupSet);
-#endif
-
-PGP_END_C_DECLARATIONS
-
-#endif /* ] Included_pgpUserInterface_h */
-
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/include/pgpUtilities.h b/plugins/CryptoPP/PGPw/sdk8/include/pgpUtilities.h
deleted file mode 100644
index dc1ca20d62..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/include/pgpUtilities.h
+++ /dev/null
@@ -1,464 +0,0 @@
-/*____________________________________________________________________________
- Copyright (C) 2002 PGP Corporation
- All rights reserved.
-
- This file contains miscellaneous utility functions needed for the PGPsdk.
-
- $Id: pgpUtilities.h,v 1.54.2.1 2004/05/05 17:02:51 vinnie Exp $
-____________________________________________________________________________*/
-
-#ifndef Included_pgpUtilities_h /* [ */
-#define Included_pgpUtilities_h
-
-#include <time.h>
-#include "pgpBase.h"
-#include "pflTypes.h"
-#include "pgpPubTypes.h"
-#include "pgpMemoryMgr.h"
-
-#if PGP_MACINTOSH /* [ */
-#include <Files.h>
-#elif PGP_OSX
- struct FSSpec;
-#endif /* ] PGP_MACINTOSH */
-
-#if PGP_MACINTOSH
-#pragma options align=mac68k /* [ */
-#endif
-
-enum
-{
- kPGPsdk20APIVersion = 0x01000000,
-
- kPGPsdkAPIVersion = kPGPsdk20APIVersion
-};
-
-enum PGPNotificationReason_
-{
- kPGPNotification_KeyDBChanged = 0,
- kPGPNotification_PassphraseCacheChanged = 1,
-
- PGP_ENUM_FORCE( PGPNotificationReason_ )
-};
-
-PGPENUM_TYPEDEF( PGPNotificationReason_, PGPNotificationReason );
-
-typedef PFLLanguage PGPLanguage;
-
-enum PGPLanguage_
-{
- kPGPLanguage_Default = 0,
- kPGPLanguage_English = 1,
- kPGPLanguage_Japanese = 2,
- kPGPLanguage_German = 3,
- kPGPLanguage_Spanish = 4,
-
- PGP_ENUM_FORCE( PGPLanguage_ )
-};
-
-#if PGP_MACINTOSH || PGP_OSX /* [ */
-
-#define kPGPMacFileCreator_PGPkeys 'pgpK'
-#define kPGPMacFileCreator_PGPtools 'pgpM'
-#define kPGPMacFileCreator_PGPnet 'PGPn'
-#define kPGPMacFileCreator_PGPdisk 'pgpD'
-#define kPGPMacFileCreator_PGPadmin 'PGPa'
-#define kPGPMacFileCreator_DecryptedBinary '\?\?\?\?'
-#define kPGPMacFileCreator_DecryptedText 'ttxt'
-
-#define kPGPMacFileType_ArmorFile 'TEXT'
-#define kPGPMacFileType_EncryptedData 'pgEF'
-#define kPGPMacFileType_SignedData 'pgSF'
-#define kPGPMacFileType_DetachedSig 'pgDS'
-#define kPGPMacFileType_RandomSeed 'pgRS'
-#define kPGPMacFileType_PrivRing 'pgRR'
-#define kPGPMacFileType_PubRing 'pgPR'
-#define kPGPMacFileType_Groups 'pgGR'
-#define kPGPMacFileType_NetHosts 'pgHO'
-#define kPGPMacFileType_NetRules 'pgRU'
-#define kPGPMacFileType_Preferences 'pref'
-#define kPGPMacFileType_DecryptedText 'TEXT'
-#define kPGPMacFileType_DecryptedBinary 'BINA'
-#define kPGPMacFileType_KeyShares 'pgSK'
-#define kPGPMacFileType_Exported509Keys 'pgX5'
-
-#endif /* ] PGP_MACINTOSH */
-
-PGP_BEGIN_C_DECLARATIONS
-
-/*____________________________________________________________________________
- PGPsdk initialization
-
- Call PGPsdkXXXInit() before using that particular library.
- Call PGPsdkXXXCleanup() when you are done (but after disposing of any
- PGPContexts).
-
- You may call PGPsdkXXXInit multiple times (with no effect), but be sure
- to call the matching PGPsdkXXXCleanup() for each call to PGPsdkXXXInit().
-____________________________________________________________________________*/
-#define kPGPFlags_ForceLocalExecution 0x2
-#define kPGPFlags_SuppressCacheThread 0x4
-
-PGPError PGPsdkInit( PGPFlags options ) ;
-PGPError PGPsdkSetLanguage( PGPFileSpecRef langStringsHome, PGPLanguage lang );
-PGPError PGPsdkCleanup( void );
-
-PGPError PGPsdkNetworkLibInit( PGPFlags options );
-PGPError PGPsdkNetworkLibCleanup( void );
-
-PGPError PGPsdkUILibInit( PGPFlags options );
-PGPError PGPsdkUILibCleanup( void );
-
-PGPError PGPLoadPluginModule( PGPContextRef context,
- PGPFileSpecRef moduleFile, PGPFileSpecRef sigFile,
- PGPUInt32 *nCipher, PGPUInt32 *nHash, PGPUInt32 *nPubkey );
-
-
-/*____________________________________________________________________________
- PGPsdk version information
-
- A version in the PGPsdk is expressed as follows:
-
- Major version (1 byte)
- Minor version (1 byte)
- Bug fix revision (1 byte)
- Reserved (1 byte)
-
- example: 1.7.1 = 0x01070100
-____________________________________________________________________________*/
-
-PGPUInt32 PGPGetPGPsdkVersion( void );
-
-/*____________________________________________________________________________
- PGPsdk version string
-
- Return a C string of the form:
-
- "PGPsdk 3.0 Copyright (C) 2003 PGP Corporation
-____________________________________________________________________________*/
-
-#undef PGPGetPGPsdkVersionString
-PGPError PGPGetPGPsdkVersionString( PGPChar8 versionString[ 256 ] );
-
-/*____________________________________________________________________________
- PGPsdk API version information
-
- The API version of the PGPsdk is distinct from the externally visible
- version number. The API version is revised only when API changes are made,
- while the external version is changed whenever any code is changed, API or
- otherwise. The format of the API version is identical to the format of the
- external version. A change in the major API version implies incompatability
- with previous API versions while a change in the minor version implies API
- additions which maintain backwards compatability.
-_____________________________________________________________________________*/
-
-PGPUInt32 PGPGetPGPsdkAPIVersion( void );
-
-/*____________________________________________________________________________
- PGPsdk context manipulation
-_____________________________________________________________________________*/
-
-typedef struct PGPCustomContextInfo
-{
- PGPUInt32 sdkAPIVersion; /* Use kPGPsdkAPIVersion */
- PGPMemoryMgrRef memoryMgr;
- PGPUserValue userValue;
-
-} PGPCustomContextInfo;
-
-
-PGPError PGPNewContext( PGPUInt32 sdkAPIVersion, PGPContextRef *newContext );
-PGPError PGPNewContextCustom( const PGPCustomContextInfo *contextInfo,
- PGPContextRef *newContext );
-
-PGPError PGPFreeContext( PGPContextRef context );
-
-PGPError PGPGetContextUserValue( PGPContextRef context,
- PGPUserValue *userValue );
-PGPError PGPSetContextUserValue( PGPContextRef context,
- PGPUserValue userValue );
-
-PGPError PGPContextGetRandomBytes(PGPContextRef context,
- void *buf, PGPSize len );
-
-PGPUInt32 PGPContextReserveRandomBytes(PGPContextRef context,
- PGPUInt32 minSize );
-
-PGPMemoryMgrRef PGPPeekContextMemoryMgr( PGPContextRef context );
-
-/*____________________________________________________________________________
- PGP file management
-
- All files in PGP are represented using an opage data type PGPFileSpecRef.
- These data types are created using a fully qualified path or, on the
- Macintosh, an FSSpec. The
-____________________________________________________________________________*/
-
-#if PGP_MACINTOSH || PGP_OSX /* [ */
-
-PGPError PGPNewFileSpecFromFSSpec( PGPContextRef context, const struct FSSpec *spec,
- PGPFileSpecRef *ref );
-PGPError PGPGetFSSpecFromFileSpec( PGPFileSpecRef fileRef, struct FSSpec *spec );
-
-#endif
-
-#if ! PGP_MACINTOSH
-
-#undef PGPNewFileSpecFromFullPath
-PGPError PGPNewFileSpecFromFullPath( PGPContextRef context,
- const PGPChar8 *path, PGPFileSpecRef *ref );
-/*
-** The full path is an allocated object which needs to be deallocated with
-** PGPFreeData()
-*/
-
-#undef PGPGetFullPathFromFileSpec
-PGPError PGPGetFullPathFromFileSpec( PGPFileSpecRef fileRef,
- PGPChar8 **fullPathPtr);
-
-#endif
-
-PGPError PGPCopyFileSpec( PGPFileSpecRef fileRef, PGPFileSpecRef *ref );
-PGPError PGPFreeFileSpec( PGPFileSpecRef fileRef );
-
-#undef PGPRenameFile
-PGPError PGPRenameFile( PGPFileSpecRef fileRef, const PGPChar8 *newName );
-PGPError PGPDeleteFile( PGPFileSpecRef fileRef );
-
-/*____________________________________________________________________________
- PGP time/date functions
-____________________________________________________________________________*/
-
-PGPTime PGPGetTime(void);
-
-/* these use time_t type as returned by time() in Std C libraries */
-time_t PGPGetStdTimeFromPGPTime( PGPTime theTime );
-PGPTime PGPGetPGPTimeFromStdTime( time_t theTime );
-
-/* year, month, day may be NULL if desired */
-void PGPGetYMDFromPGPTime( PGPTime theTime, PGPUInt16 *year,
- PGPUInt16 *month, PGPUInt16 *day );
-
-#if PGP_MACINTOSH || PGP_OSX /* [ */
-
-PGPUInt32 PGPTimeToMacTime( PGPTime theTime );
-PGPTime PGPTimeFromMacTime( PGPUInt32 theTime );
-
-#endif /* ] PGP_MACINTOSH */
-
-/*____________________________________________________________________________
- MacBinary support
-
- Examine the input file to see if it's a MacBinary file. If it is
- not a MacBinary file, then the original file is unaltered.
- Otherwise, the file is converted and the original file is deleted.
-
- The resulting file is designated by 'outPGPSpec' and may have a different
- name than the original.
-
- If the file is a TEXT file, appropriate line-end conversion is done.
-
- creator and type code pointers may be
- null but otherwise contain the mac creator and type.
-
- This routine can be called on a Mac, but generally doesn't need to be.
-____________________________________________________________________________*/
-
-PGPError PGPMacBinaryToLocal( PGPFileSpecRef inSpec,
- PGPFileSpecRef * outSpec, PGPUInt32 * macCreator,
- PGPUInt32 * macTypeCode );
-
-/*____________________________________________________________________________
- Notification callbacks on PGPKeyDB changes from SDK Service
-_____________________________________________________________________________*/
-
-typedef void (*PGPNotificationHandlerProc)( PGPUserValue userValue,
- PGPNotificationReason reason,
- PGPUInt32 param1,
- PGPUInt32 param2 );
-
-PGPError PGPSetNotificationCallback( PGPNotificationHandlerProc proc,
- PGPUserValue userValue );
-
-/*____________________________________________________________________________
-Disk and File Wipe Pattern Support
-____________________________________________________________________________*/
-
-PGPError PGPNewWipePatternContext ( PGPContextRef context,
- PGPInt32 numPasses,
- PGPWipePatternContextRef *outRef);
-
-/* fill a 1024 byte, long word alligned buffer with a pattern to wipe with */
-PGPError PGPWipePatternNext( PGPWipePatternContextRef ref,
- void * buffer, PGPSize bufferSize);
-
-PGPError PGPWipePatternRewind( PGPWipePatternContextRef wipeRef);
-
-PGPError PGPFreeWipePatternContext(PGPWipePatternContextRef ref);
-
-PGPError PGPWipeFile( PGPContextRef context,
- PGPInt32 numPasses,
- PGPOptionListRef firstOption,
- ...);
-
-/*____________________________________________________________________________
- PGP TAR/UnTAR functions that work with TAR cache
-____________________________________________________________________________*/
-
-enum PGPTARCacheObjAttributeType_
-{
- kPGPTARCacheObjAttribute_Invalid = 0,
- kPGPTARCacheObjAttribute_File = 1,
- kPGPTARCacheObjAttribute_SymLink = 2,
- kPGPTARCacheObjAttribute_Directory = 3,
- kPGPTARCacheObjAttribute_Deleted = 4,
-
- PGP_ENUM_FORCE( PGPTARCacheObjAttributeType_ )
-} ;
-
-PGPENUM_TYPEDEF( PGPTARCacheObjAttributeType_, PGPTARCacheObjAttributeType );
-
-enum PGPTARCacheObjProperty_
-{
- kPGPTARCacheObjProperty_Invalid = 0,
-
- /* string properties */
- kPGPTARCacheObjProperty_Name = 100,
- kPGPTARCacheObjProperty_User = 101,
- kPGPTARCacheObjProperty_Group = 102,
- kPGPTARCacheObjProperty_Contents = 103,
- kPGPTARCacheObjProperty_Link = 104,
- kPGPTARCacheObjProperty_Size = 105, /* PGPUInt64 */
- kPGPTARCacheObjProperty_FilePos = 106, /* PGPFileOffset */
-
- /* PGPTime properties */
- kPGPTARCacheObjProperty_Date = 200,
-
- /* Numeric properties */
- kPGPTARCacheObjProperty_Mode = 302,
- kPGPTARCacheObjProperty_Attribute = 303,
-
- PGP_ENUM_FORCE( PGPTARCacheObjProperty_ )
-} ;
-
-PGPENUM_TYPEDEF( PGPTARCacheObjProperty_, PGPTARCacheObjProperty );
-enum PGPOpenTARCacheFileOptions_
-{
- kPGPOpenTARCacheFileOptions_None = 0,
- kPGPOpenTARCacheFileOptions_Mutable = (1UL << 0 ),
- kPGPOpenTARCacheFileOptions_Create = (1UL << 1 ),
- kPGPOpenTARCacheFileOptions_PreloadAll = (1UL << 2 ),
-
- PGP_ENUM_FORCE( PGPOpenTARCacheFileOptions_ )
-} ;
-
-PGPENUM_TYPEDEF( PGPOpenTARCacheFileOptions_, PGPOpenTARCacheFileOptions );
-
-
-PGPError PGPOpenTARCacheFile( PGPContextRef context,
- PGPOpenTARCacheFileOptions options,
- PGPFileSpecRef tarcache,
- void *sessionKey,
- PGPSize sessionKeyBufferSize,
- PGPSize *sessionKeySize, /* can be NULL if not kPGPOpenTARCacheFileOptions_Create */
- PGPTARCacheRef *outRef,
- PGPOptionListRef firstOption,
- ...);
-
-PGPError PGPFreeTARCache(PGPTARCacheRef ref);
-
-PGPError PGPNewTARCacheIter( PGPTARCacheRef tar, PGPTARCacheIterRef *outRef);
-
-PGPError PGPFreeTARCacheIter( PGPTARCacheIterRef iter);
-
-PGPInt32 PGPTARCacheIterIndex( PGPTARCacheIterRef iter);
-
-PGPError PGPTARCacheIterRewind( PGPTARCacheIterRef iter);
-
-PGPError PGPTARCacheIterMove( PGPTARCacheIterRef iter, PGPInt32 relOffset, PGPTARCacheObjRef *outRef);
-
-PGPError PGPTARCacheIterNextTARCacheObj( PGPTARCacheIterRef iter, PGPTARCacheObjRef *outRef);
-
-PGPError PGPTARCacheIterPrevTARCacheObj( PGPTARCacheIterRef iter, PGPTARCacheObjRef *outRef);
-
-PGPError PGPTARCacheIterGetTARCacheObj( PGPTARCacheIterRef iter, PGPTARCacheObjRef *outRef);
-
-PGPError PGPGetTARCacheObjNumericProperty( PGPTARCacheObjRef obj,
- PGPTARCacheObjProperty whichProperty, PGPInt32 *prop );
-
-PGPError PGPGetTARCacheObjTimeProperty( PGPTARCacheObjRef obj,
- PGPTARCacheObjProperty whichProperty, PGPTime *prop);
-
- PGPError PGPGetTARCacheObjDataProperty( PGPTARCacheObjRef obj,
- PGPTARCacheObjProperty whichProperty, void *buffer,
- PGPSize bufferSize, PGPSize *dataSize);
-
-PGPError PGPGetTARCacheObjAllocatedDataProperty( PGPTARCacheObjRef obj,
- PGPTARCacheObjProperty whichProperty, void **buffer,
- PGPSize *dataSize);
-
-
-PGPError PGPDeleteTARCacheObj( PGPTARCacheObjRef tarObj );
-
-PGPError PGPExportTARCacheObj( PGPTARCacheObjRef tarObj,
- PGPFileSpecRef fileRef,
- PGPOptionListRef firstOption,
- ...);
-
-
-PGPError PGPCountObjsInTARCache( PGPTARCacheRef ref, PGPUInt32 *numItems );
-
-PGPError PGPImportTARCacheObj( PGPTARCacheRef tarCache,
- PGPFileSpecRef fileRef,
- PGPTARCacheObjRef *outRef,
- PGPOptionListRef firstOption,
- ...);
-
-/*____________________________________________________________________________
-FIPS 140-2 Support
-____________________________________________________________________________*/
-
-enum PGPsdkSelfTest_
-{
- kPGPsdkSelfTest_Invalid = 0,
- kPGPsdkSelfTest_FirstTest = 1,
-
- kPGPsdkSelfTest_3DES = 1,
- kPGPsdkSelfTest_DSA = 2,
- kPGPsdkSelfTest_AES = 3,
- kPGPsdkSelfTest_RSA = 4,
- kPGPsdkSelfTest_SHA = 5,
- kPGPsdkSelfTest_HMAC = 6,
- kPGPsdkSelfTest_EC = 7,
- kPGPsdkSelfTest_PRNG = 8,
- kPGPsdkSelfTest_Integrity = 9,
-
- kPGPsdkSelfTest_LastTest = kPGPsdkSelfTest_Integrity,
-
- PGP_ENUM_FORCE( PGPsdkSelfTest_ )
-};
-
-PGPENUM_TYPEDEF( PGPsdkSelfTest_, PGPsdkSelfTest );
-
-PGPError PGPEnableFIPSMode(void);
-PGPError PGPGetSDKErrorState(void);
-PGPError PGPResetSDKErrorState(void);
-PGPError PGPRunSDKSelfTest(PGPsdkSelfTest whichTest);
-PGPError PGPRunAllSDKSelfTests(void);
-
-PGP_END_C_DECLARATIONS
-
-#if PGP_MACINTOSH
-#pragma options align=reset /* ] */
-#endif
-
-#endif /* ] Included_pgpUtilities_h */
-
-/*__Editor_settings____
-
- Local Variables:
- tab-width: 4
- End:
- vi: ts=4 sw=4
- vim: si
-_____________________*/
diff --git a/plugins/CryptoPP/PGPw/sdk8/lib/PGPsdk.lib b/plugins/CryptoPP/PGPw/sdk8/lib/PGPsdk.lib
deleted file mode 100644
index c0950deded..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/lib/PGPsdk.lib
+++ /dev/null
Binary files differ
diff --git a/plugins/CryptoPP/PGPw/sdk8/lib/PGPsdkNL.lib b/plugins/CryptoPP/PGPw/sdk8/lib/PGPsdkNL.lib
deleted file mode 100644
index 09b4a3463e..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/lib/PGPsdkNL.lib
+++ /dev/null
Binary files differ
diff --git a/plugins/CryptoPP/PGPw/sdk8/lib/PGPsdkUI.lib b/plugins/CryptoPP/PGPw/sdk8/lib/PGPsdkUI.lib
deleted file mode 100644
index 9a9ae7f89c..0000000000
--- a/plugins/CryptoPP/PGPw/sdk8/lib/PGPsdkUI.lib
+++ /dev/null
Binary files differ