2023-09-15 15:11:23 +08:00
|
|
|
|
This is gpgme.info, produced by makeinfo version 6.8 from gpgme.texi.
|
2022-05-13 23:46:52 +08:00
|
|
|
|
|
|
|
|
|
Copyright © 2002–2008, 2010, 2012–2018 g10 Code GmbH.
|
|
|
|
|
|
|
|
|
|
Permission is granted to copy, distribute and/or modify this
|
|
|
|
|
document under the terms of the GNU General Public License as
|
|
|
|
|
published by the Free Software Foundation; either version 3 of the
|
|
|
|
|
License, or (at your option) any later version. The text of the
|
|
|
|
|
license can be found in the section entitled “Copying”.
|
|
|
|
|
|
|
|
|
|
This document is distributed in the hope that it will be useful, but
|
|
|
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General
|
|
|
|
|
Public License for more details.
|
|
|
|
|
INFO-DIR-SECTION GNU Libraries
|
|
|
|
|
START-INFO-DIR-ENTRY
|
|
|
|
|
* GPGME: (gpgme). Adding support for cryptography to your program.
|
|
|
|
|
END-INFO-DIR-ENTRY
|
|
|
|
|
|
|
|
|
|
This file documents the GPGME library.
|
|
|
|
|
|
2023-09-15 15:11:23 +08:00
|
|
|
|
This is Edition 1.21.1-beta16, last updated 14 August 2023, of ‘The
|
|
|
|
|
‘GnuPG Made Easy’ Reference Manual’, for Version 1.21.1-beta16.
|
2022-05-13 23:46:52 +08:00
|
|
|
|
|
|
|
|
|
Copyright © 2002–2008, 2010, 2012–2018 g10 Code GmbH.
|
|
|
|
|
|
|
|
|
|
Permission is granted to copy, distribute and/or modify this
|
|
|
|
|
document under the terms of the GNU General Public License as
|
|
|
|
|
published by the Free Software Foundation; either version 3 of the
|
|
|
|
|
License, or (at your option) any later version. The text of the
|
|
|
|
|
license can be found in the section entitled “Copying”.
|
|
|
|
|
|
|
|
|
|
This document is distributed in the hope that it will be useful, but
|
|
|
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General
|
|
|
|
|
Public License for more details.
|
|
|
|
|
|
2023-09-15 15:11:23 +08:00
|
|
|
|
|
|
|
|
|
File: gpgme.info, Node: UI Server Protocol, Next: Debugging, Prev: Contexts, Up: Top
|
|
|
|
|
|
|
|
|
|
Appendix A The GnuPG UI Server Protocol
|
|
|
|
|
***************************************
|
|
|
|
|
|
|
|
|
|
This section specifies the protocol used between clients and a User
|
|
|
|
|
Interface Server (UI server). This protocol helps to build a system
|
|
|
|
|
where all cryptographic operations are done by a server and the server
|
|
|
|
|
is responsible for all dialogs. Although GPGME has no direct support
|
|
|
|
|
for this protocol it is believed that servers will utilize the GPGME
|
|
|
|
|
library; thus having the specification included in this manual is an
|
|
|
|
|
appropriate choice. This protocol should be referenced as ‘The GnuPG UI
|
|
|
|
|
Server Protocol’.
|
|
|
|
|
|
|
|
|
|
A server needs to implement these commands:(1)
|
|
|
|
|
|
|
|
|
|
* Menu:
|
|
|
|
|
|
|
|
|
|
* UI Server Encrypt:: Encrypt a message.
|
|
|
|
|
* UI Server Sign:: Sign a message.
|
|
|
|
|
* UI Server Decrypt:: Decrypt a message.
|
|
|
|
|
* UI Server Verify:: Verify a message.
|
|
|
|
|
* UI Server Set Input Files:: Specifying the input files to operate on.
|
|
|
|
|
* UI Server Sign/Encrypt Files:: Encrypting and signing files.
|
|
|
|
|
* UI Server Verify/Decrypt Files:: Decrypting and verifying files.
|
|
|
|
|
* UI Server Import/Export Keys:: Managing certificates.
|
|
|
|
|
* UI Server Checksum Files:: Create and verify checksums for files.
|
|
|
|
|
* Miscellaneous UI Server Commands:: Commands not related to a specific operation.
|
|
|
|
|
|
|
|
|
|
---------- Footnotes ----------
|
|
|
|
|
|
|
|
|
|
(1) In all examples we assume that the connection has already been
|
|
|
|
|
established; see the Assuan manual for details.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
File: gpgme.info, Node: UI Server Encrypt, Next: UI Server Sign, Up: UI Server Protocol
|
|
|
|
|
|
|
|
|
|
A.1 UI Server: Encrypt a Message
|
|
|
|
|
================================
|
|
|
|
|
|
|
|
|
|
Before encryption can be done the recipients must be set using the
|
|
|
|
|
command:
|
|
|
|
|
|
|
|
|
|
-- Command: RECIPIENT STRING
|
|
|
|
|
|
|
|
|
|
Set the recipient for the encryption. STRING is an RFC-2822
|
|
|
|
|
recipient name ("mailbox" as per section 3.4). This command may or
|
|
|
|
|
may not check the recipient for validity right away; if it does not
|
|
|
|
|
all recipients are expected to be checked at the time of the
|
|
|
|
|
‘ENCRYPT’ command. All ‘RECIPIENT’ commands are cumulative until a
|
|
|
|
|
successful ‘ENCRYPT’ command or until a ‘RESET’ command. Linefeeds
|
|
|
|
|
are obviously not allowed in STRING and should be folded into
|
|
|
|
|
spaces (which are equivalent).
|
|
|
|
|
|
|
|
|
|
To tell the server the source and destination of the data, the next two
|
|
|
|
|
commands are to be used:
|
|
|
|
|
|
|
|
|
|
-- Command: INPUT FD=N
|
|
|
|
|
Set the file descriptor for the message to be encrypted to N. The
|
|
|
|
|
message send to the server is binary encoded.
|
|
|
|
|
|
|
|
|
|
GpgOL is a Windows only program, thus N is not a libc file
|
|
|
|
|
descriptor but a regular system handle. Given that the Assuan
|
|
|
|
|
connection works over a socket, it is not possible to use regular
|
|
|
|
|
inheritance to make the file descriptor available to the server.
|
|
|
|
|
Thus ‘DuplicateHandle’ needs to be used to duplicate a handle to
|
|
|
|
|
the server process. This is the reason that the server needs to
|
|
|
|
|
implement the ‘GETINFO pid’ command. Sending this command a second
|
|
|
|
|
time replaces the file descriptor set by the last one.
|
|
|
|
|
|
|
|
|
|
-- Command: OUTPUT FD=N [--binary]
|
|
|
|
|
Set the file descriptor to be used for the output (i.e. the
|
|
|
|
|
encrypted message) to N. If the option ‘--binary’ is given the
|
|
|
|
|
output shall be in binary format; if not given, the output for
|
|
|
|
|
OpenPGP needs to be ASCII armored and for CMS Base-64 encoded. For
|
|
|
|
|
details on the file descriptor, see the ‘INPUT’ command.
|
|
|
|
|
|
|
|
|
|
The setting of the recipients, the data source and destination may
|
|
|
|
|
happen in any order, even intermixed. If this has been done the actual
|
|
|
|
|
encryption operation is called using:
|
|
|
|
|
|
|
|
|
|
-- Command: ENCRYPT --protocol=NAME
|
|
|
|
|
|
|
|
|
|
This command reads the plaintext from the file descriptor set by
|
|
|
|
|
the ‘INPUT’ command, encrypts it and writes the ciphertext to the
|
|
|
|
|
file descriptor set by the ‘OUTPUT’ command. The server may (and
|
|
|
|
|
should) overlap reading and writing. The recipients used for the
|
|
|
|
|
encryption are all the recipients set so far. If any recipient is
|
|
|
|
|
not usable the server should take appropriate measures to notify
|
|
|
|
|
the user about the problem and may cancel the operation by
|
|
|
|
|
returning an error code. The used file descriptors are void after
|
|
|
|
|
this command; the recipient list is only cleared if the server
|
|
|
|
|
returns success.
|
|
|
|
|
|
|
|
|
|
Because GpgOL uses a streaming mode of operation the server is not
|
|
|
|
|
allowed to auto select the protocol and must obey to the mandatory
|
|
|
|
|
PROTOCOL parameter:
|
|
|
|
|
|
|
|
|
|
‘OpenPGP’
|
|
|
|
|
Use the OpenPGP protocol (RFC-2440).
|
|
|
|
|
‘CMS’
|
|
|
|
|
Use the CMS (PKCS#7) protocol (RFC-3852).
|
|
|
|
|
|
|
|
|
|
To support automagically selection of the protocol depending on the
|
|
|
|
|
selected keys, the server MAY implement the command:
|
|
|
|
|
|
|
|
|
|
-- Command: PREP_ENCRYPT [--protocol=NAME] [--expect-sign]
|
|
|
|
|
|
|
|
|
|
This commands considers all recipients set so far and decides
|
|
|
|
|
whether it is able to take input and start the actual encryption.
|
|
|
|
|
This is kind of a dry-run ‘ENCRYPT’ without requiring or using the
|
|
|
|
|
input and output file descriptors. The server shall cache the
|
|
|
|
|
result of any user selection to avoid asking this again when the
|
|
|
|
|
actual ‘ENCRYPT’ command is send. The ‘--protocol’ option is
|
|
|
|
|
optional; if it is not given, the server should allow the user to
|
|
|
|
|
select the protocol to be used based on the recipients given or by
|
|
|
|
|
any other means.
|
|
|
|
|
|
|
|
|
|
If ‘--expect-sign’ is given the server should expect that the
|
|
|
|
|
message will also be signed and use this hint to present a unified
|
|
|
|
|
recipient and signer selection dialog if possible and desired. A
|
|
|
|
|
selected signer should then be cached for the expected SIGN command
|
|
|
|
|
(which is expected in the same session but possible on another
|
|
|
|
|
connection).
|
|
|
|
|
|
|
|
|
|
If this command is given again before a successful ‘ENCRYPT’
|
|
|
|
|
command, the second one takes effect.
|
|
|
|
|
|
|
|
|
|
Before sending the OK response the server shall tell the client the
|
|
|
|
|
protocol to be used (either the one given by the argument or the
|
|
|
|
|
one selected by the user) by means of a status line:
|
|
|
|
|
|
|
|
|
|
-- Status line: PROTOCOL NAME
|
|
|
|
|
Advise the client to use the protocol NAME for the ‘ENCRYPT’
|
|
|
|
|
command. The valid protocol names are listed under the description
|
|
|
|
|
of the ‘ENCRYPT’ command. The server shall emit exactly one
|
|
|
|
|
PROTOCOL status line.
|
|
|
|
|
|
|
|
|
|
Here is an example of a complete encryption sequence; client lines are
|
|
|
|
|
indicated by a C:, server responses by C::
|
|
|
|
|
|
|
|
|
|
C: RESET
|
|
|
|
|
S: OK
|
|
|
|
|
C: RECIPIENT foo@example.net
|
|
|
|
|
S: OK
|
|
|
|
|
C: RECIPIENT bar@example.com
|
|
|
|
|
S: OK
|
|
|
|
|
C: PREP_ENCRYPT
|
|
|
|
|
S: S PROTOCOL OpenPGP
|
|
|
|
|
S: OK
|
|
|
|
|
C: INPUT FD=17
|
|
|
|
|
S: OK
|
|
|
|
|
C: OUTPUT FD=18
|
|
|
|
|
S: OK
|
|
|
|
|
C: ENCRYPT
|
|
|
|
|
S: OK
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
File: gpgme.info, Node: UI Server Sign, Next: UI Server Decrypt, Prev: UI Server Encrypt, Up: UI Server Protocol
|
|
|
|
|
|
|
|
|
|
A.2 UI Server: Sign a Message
|
|
|
|
|
=============================
|
|
|
|
|
|
|
|
|
|
The server needs to implement opaque signing as well as detached
|
|
|
|
|
signing. Due to the nature of OpenPGP messages it is always required to
|
|
|
|
|
send the entire message to the server; sending just the hash is not
|
|
|
|
|
possible. The following two commands are required to set the input and
|
|
|
|
|
output file descriptors:
|
|
|
|
|
|
|
|
|
|
-- Command: INPUT FD=N
|
|
|
|
|
Set the file descriptor for the message to be signed to N. The
|
|
|
|
|
message send to the server is binary encoded. For details on the
|
|
|
|
|
file descriptor, see the description of ‘INPUT’ in the ‘ENCRYPT’
|
|
|
|
|
section.
|
|
|
|
|
|
|
|
|
|
-- Command: OUTPUT FD=N [--binary]
|
|
|
|
|
Set the file descriptor to be used for the output. The output is
|
|
|
|
|
either the complete signed message or in case of a detached
|
|
|
|
|
signature just that detached signature. If the option ‘--binary’
|
|
|
|
|
is given the output shall be in binary format; if not given, the
|
|
|
|
|
output for OpenPGP needs to be ASCII armored and for CMS Base-64
|
|
|
|
|
encoded. For details on the file descriptor, see the ‘INPUT’
|
|
|
|
|
command.
|
|
|
|
|
|
|
|
|
|
To allow the server the selection of a non-default signing key the
|
|
|
|
|
client may optionally use the ‘SENDER’ command, see *note command
|
|
|
|
|
SENDER::.
|
|
|
|
|
|
|
|
|
|
The signing operation is then initiated by:
|
|
|
|
|
|
|
|
|
|
-- Command: SIGN --protocol=NAME [--detached]
|
|
|
|
|
Sign the data set with the ‘INPUT’ command and write it to the sink
|
|
|
|
|
set by OUTPUT. NAME is the signing protocol used for the message.
|
|
|
|
|
For a description of the allowed protocols see the ‘ENCRYPT’
|
|
|
|
|
command. With option ‘--detached’ given, a detached signature is
|
|
|
|
|
created; this is actually the usual way the command is used.
|
|
|
|
|
|
|
|
|
|
The client expects the server to send at least this status information
|
|
|
|
|
before the final OK response:
|
|
|
|
|
|
|
|
|
|
-- Status line: MICALG STRING
|
|
|
|
|
The STRING represents the hash algorithm used to create the
|
|
|
|
|
signature. It is used with RFC-1847 style signature messages and
|
|
|
|
|
defined by PGP/MIME (RFC-3156) and S/MIME (RFC-3851). The GPGME
|
|
|
|
|
library has a supporting function ‘gpgme_hash_algo_name’ to return
|
|
|
|
|
the algorithm name as a string. This string needs to be lowercased
|
|
|
|
|
and for OpenPGP prefixed with "‘pgp-’".
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
File: gpgme.info, Node: UI Server Decrypt, Next: UI Server Verify, Prev: UI Server Sign, Up: UI Server Protocol
|
|
|
|
|
|
|
|
|
|
A.3 UI Server: Decrypt a Message
|
|
|
|
|
================================
|
|
|
|
|
|
|
|
|
|
Decryption may include the verification of OpenPGP messages. This is
|
|
|
|
|
due to the often used combined signing/encryption modus of OpenPGP. The
|
|
|
|
|
client may pass an option to the server to inhibit the signature
|
|
|
|
|
verification. The following two commands are required to set the input
|
|
|
|
|
and output file descriptors:
|
|
|
|
|
|
|
|
|
|
-- Command: INPUT FD=N
|
|
|
|
|
Set the file descriptor for the message to be decrypted to N. The
|
|
|
|
|
message send to the server is either binary encoded or — in the
|
|
|
|
|
case of OpenPGP — ASCII armored. For details on the file
|
|
|
|
|
descriptor, see the description of ‘INPUT’ in the ‘ENCRYPT’
|
|
|
|
|
section.
|
|
|
|
|
|
|
|
|
|
-- Command: OUTPUT FD=N
|
|
|
|
|
Set the file descriptor to be used for the output. The output is
|
|
|
|
|
binary encoded. For details on the file descriptor, see the
|
|
|
|
|
description of ‘INPUT’ in the ‘ENCRYPT’ section.
|
|
|
|
|
|
|
|
|
|
The decryption is started with the command:
|
|
|
|
|
|
|
|
|
|
-- Command: DECRYPT --protocol=NAME [--no-verify]
|
|
|
|
|
[--export-session-key]
|
|
|
|
|
NAME is the encryption protocol used for the message. For a
|
|
|
|
|
description of the allowed protocols see the ‘ENCRYPT’ command.
|
|
|
|
|
This argument is mandatory. If the option ‘--no-verify’ is given,
|
|
|
|
|
the server should not try to verify a signature, in case the input
|
|
|
|
|
data is an OpenPGP combined message. If the option
|
|
|
|
|
‘--export-session-key’ is given and the underlying engine knows how
|
|
|
|
|
to export the session key, it will appear on a status line
|
|
|
|
|
|
2022-05-13 23:46:52 +08:00
|
|
|
|
|
|
|
|
|
File: gpgme.info, Node: UI Server Verify, Next: UI Server Set Input Files, Prev: UI Server Decrypt, Up: UI Server Protocol
|
|
|
|
|
|
|
|
|
|
A.4 UI Server: Verify a Message
|
|
|
|
|
===============================
|
|
|
|
|
|
|
|
|
|
The server needs to support the verification of opaque signatures as
|
|
|
|
|
well as detached signatures. The kind of input sources controls what
|
|
|
|
|
kind message is to be verified.
|
|
|
|
|
|
|
|
|
|
-- Command: MESSAGE FD=N
|
|
|
|
|
This command is used with detached signatures to set the file
|
|
|
|
|
descriptor for the signed data to N. The data is binary encoded
|
|
|
|
|
(used verbatim). For details on the file descriptor, see the
|
|
|
|
|
description of ‘INPUT’ in the ‘ENCRYPT’ section.
|
|
|
|
|
|
|
|
|
|
-- Command: INPUT FD=N
|
|
|
|
|
Set the file descriptor for the opaque message or the signature
|
|
|
|
|
part of a detached signature to N. The message send to the server
|
|
|
|
|
is either binary encoded or – in the case of OpenPGP – ASCII
|
|
|
|
|
armored. For details on the file descriptor, see the description
|
|
|
|
|
of ‘INPUT’ in the ‘ENCRYPT’ section.
|
|
|
|
|
|
|
|
|
|
-- Command: OUTPUT FD=N
|
|
|
|
|
Set the file descriptor to be used for the output. The output is
|
|
|
|
|
binary encoded and only used for opaque signatures. For details on
|
|
|
|
|
the file descriptor, see the description of ‘INPUT’ in the
|
|
|
|
|
‘ENCRYPT’ section.
|
|
|
|
|
|
|
|
|
|
The verification is then started using:
|
|
|
|
|
|
|
|
|
|
-- Command: VERIFY --protocol=NAME [--silent]
|
|
|
|
|
NAME is the signing protocol used for the message. For a
|
|
|
|
|
description of the allowed protocols see the ‘ENCRYPT’ command.
|
|
|
|
|
This argument is mandatory. Depending on the combination of
|
|
|
|
|
‘MESSAGE’ ‘INPUT’ and ‘OUTPUT’ commands, the server needs to select
|
|
|
|
|
the appropriate verification mode:
|
|
|
|
|
|
|
|
|
|
MESSAGE and INPUT
|
|
|
|
|
This indicates a detached signature. Output data is not
|
|
|
|
|
applicable.
|
|
|
|
|
INPUT
|
|
|
|
|
This indicates an opaque signature. As no output command has
|
|
|
|
|
been given, the server is only required to check the
|
|
|
|
|
signature.
|
|
|
|
|
INPUT and OUTPUT
|
|
|
|
|
This indicates an opaque signature. The server shall write
|
|
|
|
|
the signed data to the file descriptor set by the output
|
|
|
|
|
command. This data shall even be written if the signatures
|
|
|
|
|
can’t be verified.
|
|
|
|
|
|
|
|
|
|
With ‘--silent’ the server shall not display any dialog; this is for
|
|
|
|
|
example used by the client to get the content of opaque signed messages.
|
|
|
|
|
The client expects the server to send at least this status information
|
|
|
|
|
before the final OK response:
|
|
|
|
|
|
|
|
|
|
-- Status line: SIGSTATUS FLAG DISPLAYSTRING
|
|
|
|
|
Returns the status for the signature and a short string explaining
|
|
|
|
|
the status. Valid values for FLAG are:
|
|
|
|
|
|
|
|
|
|
‘none’
|
|
|
|
|
The message has a signature but it could not not be verified
|
|
|
|
|
due to a missing key.
|
|
|
|
|
‘green’
|
|
|
|
|
The signature is fully valid.
|
|
|
|
|
‘yellow’
|
|
|
|
|
The signature is valid but additional information was shown
|
|
|
|
|
regarding the validity of the key.
|
|
|
|
|
‘red’
|
|
|
|
|
The signature is not valid.
|
|
|
|
|
|
|
|
|
|
DISPLAYSTRING is a percent-and-plus-encoded string with a short
|
|
|
|
|
human readable description of the status. For example
|
|
|
|
|
|
|
|
|
|
S SIGSTATUS green Good+signature+from+Keith+Moon+<keith@example.net>
|
|
|
|
|
|
|
|
|
|
Note that this string needs to fit into an Assuan line and should
|
|
|
|
|
be short enough to be displayed as short one-liner on the clients
|
|
|
|
|
window. As usual the encoding of this string is UTF-8 and it
|
|
|
|
|
should be send in its translated form.
|
|
|
|
|
|
|
|
|
|
The server shall send one status line for every signature found on
|
|
|
|
|
the message.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
File: gpgme.info, Node: UI Server Set Input Files, Next: UI Server Sign/Encrypt Files, Prev: UI Server Verify, Up: UI Server Protocol
|
|
|
|
|
|
|
|
|
|
A.5 UI Server: Specifying the input files to operate on.
|
|
|
|
|
========================================================
|
|
|
|
|
|
|
|
|
|
All file related UI server commands operate on a number of input files
|
|
|
|
|
or directories, specified by one or more ‘FILE’ commands:
|
|
|
|
|
|
|
|
|
|
-- Command: FILE [--clear] NAME
|
|
|
|
|
Add the file or directory NAME to the list of pathnames to be
|
|
|
|
|
processed by the server. The parameter NAME must be an absolute
|
|
|
|
|
path name (including the drive letter) and is percent espaced (in
|
|
|
|
|
particular, the characters %, = and white space characters are
|
|
|
|
|
always escaped). If the option ‘--clear’ is given, the list of
|
|
|
|
|
files is cleared before adding NAME.
|
|
|
|
|
|
|
|
|
|
Historical note: The original spec did not define ‘--clear’ but the
|
|
|
|
|
keyword ‘--continued’ after the file name to indicate that more
|
|
|
|
|
files are to be expected. However, this has never been used and
|
|
|
|
|
thus removed from the specs.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
File: gpgme.info, Node: UI Server Sign/Encrypt Files, Next: UI Server Verify/Decrypt Files, Prev: UI Server Set Input Files, Up: UI Server Protocol
|
|
|
|
|
|
|
|
|
|
A.6 UI Server: Encrypting and signing files.
|
|
|
|
|
============================================
|
|
|
|
|
|
|
|
|
|
First, the input files need to be specified by one or more ‘FILE’
|
|
|
|
|
commands. Afterwards, the actual operation is requested:
|
|
|
|
|
|
|
|
|
|
-- Command: ENCRYPT_FILES --nohup
|
|
|
|
|
-- Command: SIGN_FILES --nohup
|
|
|
|
|
-- Command: ENCRYPT_SIGN_FILES --nohup
|
|
|
|
|
Request that the files specified by ‘FILE’ are encrypted and/or
|
|
|
|
|
signed. The command selects the default action. The UI server may
|
|
|
|
|
allow the user to change this default afterwards interactively, and
|
|
|
|
|
even abort the operation or complete it only on some of the
|
|
|
|
|
selected files and directories.
|
|
|
|
|
|
|
|
|
|
What it means to encrypt or sign a file or directory is specific to
|
|
|
|
|
the preferences of the user, the functionality the UI server
|
|
|
|
|
provides, and the selected protocol. Typically, for each input
|
|
|
|
|
file a new file is created under the original filename plus a
|
|
|
|
|
protocol specific extension (like ‘.gpg’ or ‘.sig’), which contain
|
|
|
|
|
the encrypted/signed file or a detached signature. For
|
|
|
|
|
directories, the server may offer multiple options to the user (for
|
|
|
|
|
example ignore or process recursively).
|
|
|
|
|
|
|
|
|
|
The ‘ENCRYPT_SIGN_FILES’ command requests a combined sign and
|
|
|
|
|
encrypt operation. It may not be available for all protocols (for
|
|
|
|
|
example, it is available for OpenPGP but not for CMS).
|
|
|
|
|
|
|
|
|
|
The option ‘--nohup’ is mandatory. It is currently unspecified
|
|
|
|
|
what should happen if ‘--nohup’ is not present. Because ‘--nohup’
|
|
|
|
|
is present, the server always returns ‘OK’ promptly, and completes
|
|
|
|
|
the operation asynchronously.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
File: gpgme.info, Node: UI Server Verify/Decrypt Files, Next: UI Server Import/Export Keys, Prev: UI Server Sign/Encrypt Files, Up: UI Server Protocol
|
|
|
|
|
|
|
|
|
|
A.7 UI Server: Decrypting and verifying files.
|
|
|
|
|
==============================================
|
|
|
|
|
|
|
|
|
|
First, the input files need to be specified by one or more ‘FILE’
|
|
|
|
|
commands. Afterwards, the actual operation is requested:
|
|
|
|
|
|
|
|
|
|
-- Command: DECRYPT_FILES --nohup
|
|
|
|
|
-- Command: VERIFY_FILES --nohup
|
|
|
|
|
-- Command: DECRYPT_VERIFY_FILES --nohup
|
|
|
|
|
Request that the files specified by ‘FILE’ are decrypted and/or
|
|
|
|
|
verified. The command selects the default action. The UI server
|
|
|
|
|
may allow the user to change this default afterwards interactively,
|
|
|
|
|
and even abort the operation or complete it only on some of the
|
|
|
|
|
selected files and directories.
|
|
|
|
|
|
|
|
|
|
What it means to decrypt or verify a file or directory is specific
|
|
|
|
|
to the preferences of the user, the functionality the UI server
|
|
|
|
|
provides, and the selected protocol. Typically, for decryption, a
|
|
|
|
|
new file is created for each input file under the original filename
|
|
|
|
|
minus a protocol specific extension (like ‘.gpg’) which contains
|
|
|
|
|
the original plaintext. For verification a status is displayed for
|
|
|
|
|
each signed input file, indicating if it is signed, and if yes, if
|
|
|
|
|
the signature is valid. For files that are signed and encrypted,
|
|
|
|
|
the ‘VERIFY’ command transiently decrypts the file to verify the
|
|
|
|
|
enclosed signature. For directories, the server may offer multiple
|
|
|
|
|
options to the user (for example ignore or process recursively).
|
|
|
|
|
|
|
|
|
|
The option ‘--nohup’ is mandatory. It is currently unspecified
|
|
|
|
|
what should happen if ‘--nohup’ is not present. Because ‘--nohup’
|
|
|
|
|
is present, the server always returns ‘OK’ promptly, and completes
|
|
|
|
|
the operation asynchronously.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
File: gpgme.info, Node: UI Server Import/Export Keys, Next: UI Server Checksum Files, Prev: UI Server Verify/Decrypt Files, Up: UI Server Protocol
|
|
|
|
|
|
|
|
|
|
A.8 UI Server: Managing certificates.
|
|
|
|
|
=====================================
|
|
|
|
|
|
|
|
|
|
First, the input files need to be specified by one or more ‘FILE’
|
|
|
|
|
commands. Afterwards, the actual operation is requested:
|
|
|
|
|
|
|
|
|
|
-- Command: IMPORT_FILES --nohup
|
|
|
|
|
Request that the certificates contained in the files specified by
|
|
|
|
|
‘FILE’ are imported into the local certificate databases.
|
|
|
|
|
|
|
|
|
|
For directories, the server may offer multiple options to the user
|
|
|
|
|
(for example ignore or process recursively).
|
|
|
|
|
|
|
|
|
|
The option ‘--nohup’ is mandatory. It is currently unspecified
|
|
|
|
|
what should happen if ‘--nohup’ is not present. Because ‘--nohup’
|
|
|
|
|
is present, the server always returns ‘OK’ promptly, and completes
|
|
|
|
|
the operation asynchronously.
|
|
|
|
|
|
|
|
|
|
FIXME: It may be nice to support an ‘EXPORT’ command as well, which
|
|
|
|
|
is enabled by the context menu of the background of a directory.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
File: gpgme.info, Node: UI Server Checksum Files, Next: Miscellaneous UI Server Commands, Prev: UI Server Import/Export Keys, Up: UI Server Protocol
|
|
|
|
|
|
|
|
|
|
A.9 UI Server: Create and verify checksums for files.
|
|
|
|
|
=====================================================
|
|
|
|
|
|
|
|
|
|
First, the input files need to be specified by one or more ‘FILE’
|
|
|
|
|
commands. Afterwards, the actual operation is requested:
|
|
|
|
|
|
|
|
|
|
-- Command: CHECKSUM_CREATE_FILES --nohup
|
|
|
|
|
Request that checksums are created for the files specified by
|
|
|
|
|
‘FILE’. The choice of checksum algorithm and the destination
|
|
|
|
|
storage and format for the created checksums depend on the
|
|
|
|
|
preferences of the user and the functionality provided by the UI
|
|
|
|
|
server. For directories, the server may offer multiple options to
|
|
|
|
|
the user (for example ignore or process recursively).
|
|
|
|
|
|
|
|
|
|
The option ‘--nohup’ is mandatory. It is currently unspecified
|
|
|
|
|
what should happen if ‘--nohup’ is not present. Because ‘--nohup’
|
|
|
|
|
is present, the server always returns ‘OK’ promptly, and completes
|
|
|
|
|
the operation asynchronously.
|
|
|
|
|
|
|
|
|
|
-- Command: CHECKSUM_VERIFY_FILES --nohup
|
|
|
|
|
Request that checksums are created for the files specified by
|
|
|
|
|
‘FILE’ and verified against previously created and stored
|
|
|
|
|
checksums. The choice of checksum algorithm and the source storage
|
|
|
|
|
and format for previously created checksums depend on the
|
|
|
|
|
preferences of the user and the functionality provided by the UI
|
|
|
|
|
server. For directories, the server may offer multiple options to
|
|
|
|
|
the user (for example ignore or process recursively).
|
|
|
|
|
|
|
|
|
|
If the source storage of previously created checksums is available
|
|
|
|
|
to the user through the Windows shell, this command may also accept
|
|
|
|
|
such checksum files as ‘FILE’ arguments. In this case, the UI
|
|
|
|
|
server should instead verify the checksum of the referenced files
|
|
|
|
|
as if they were given as INPUT files.
|
|
|
|
|
|
|
|
|
|
The option ‘--nohup’ is mandatory. It is currently unspecified
|
|
|
|
|
what should happen if ‘--nohup’ is not present. Because ‘--nohup’
|
|
|
|
|
is present, the server always returns ‘OK’ promptly, and completes
|
|
|
|
|
the operation asynchronously.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
File: gpgme.info, Node: Miscellaneous UI Server Commands, Prev: UI Server Checksum Files, Up: UI Server Protocol
|
|
|
|
|
|
|
|
|
|
A.10 Miscellaneous UI Server Commands
|
|
|
|
|
=====================================
|
|
|
|
|
|
|
|
|
|
The server needs to implement the following commands which are not
|
|
|
|
|
related to a specific command:
|
|
|
|
|
|
|
|
|
|
-- Command: GETINFO WHAT
|
|
|
|
|
This is a multi purpose command, commonly used to return a variety
|
|
|
|
|
of information. The required subcommands as described by the WHAT
|
|
|
|
|
parameter are:
|
|
|
|
|
|
|
|
|
|
‘pid’
|
|
|
|
|
Return the process id of the server in decimal notation using
|
|
|
|
|
an Assuan data line.
|
|
|
|
|
|
|
|
|
|
To allow the server to pop up the windows in the correct relation to the
|
|
|
|
|
client, the client is advised to tell the server by sending the option:
|
|
|
|
|
|
|
|
|
|
-- Command option: window-id NUMBER
|
|
|
|
|
The NUMBER represents the native window ID of the clients current
|
|
|
|
|
window. On Windows systems this is a windows handle (‘HWND’) and
|
|
|
|
|
on X11 systems it is the ‘X Window ID’. The number needs to be
|
|
|
|
|
given as a hexadecimal value so that it is easier to convey pointer
|
|
|
|
|
values (e.g. ‘HWND’).
|
|
|
|
|
|
|
|
|
|
A client may want to fire up the certificate manager of the server. To
|
|
|
|
|
do this it uses the Assuan command:
|
|
|
|
|
|
|
|
|
|
-- Command: START_KEYMANAGER
|
|
|
|
|
The server shall pop up the main window of the key manager (aka
|
|
|
|
|
certificate manager). The client expects that the key manager is
|
|
|
|
|
brought into the foregound and that this command immediately
|
|
|
|
|
returns (does not wait until the key manager has been fully brought
|
|
|
|
|
up).
|
|
|
|
|
|
|
|
|
|
A client may want to fire up the configuration dialog of the server. To
|
|
|
|
|
do this it uses the Assuan command:
|
|
|
|
|
|
|
|
|
|
-- Command: START_CONFDIALOG
|
|
|
|
|
The server shall pop up its configuration dialog. The client
|
|
|
|
|
expects that this dialog is brought into the foregound and that
|
|
|
|
|
this command immediately returns (i.e. it does not wait until the
|
|
|
|
|
dialog has been fully brought up).
|
|
|
|
|
|
|
|
|
|
When doing an operation on a mail, it is useful to let the server know
|
|
|
|
|
the address of the sender:
|
|
|
|
|
|
|
|
|
|
-- Command: SENDER [--info] [--protocol=NAME] EMAIL
|
|
|
|
|
EMAIL is the plain ASCII encoded address ("addr-spec" as per
|
|
|
|
|
RFC-2822) enclosed in angle brackets. The address set with this
|
|
|
|
|
command is valid until a successful completion of the operation or
|
|
|
|
|
until a ‘RESET’ command. A second command overrides the effect of
|
|
|
|
|
the first one; if EMAIL is not given and ‘--info’ is not used, the
|
|
|
|
|
server shall use the default signing key.
|
|
|
|
|
|
|
|
|
|
If option ‘--info’ is not given, the server shall also suggest a
|
|
|
|
|
protocol to use for signing. The client may use this suggested
|
|
|
|
|
protocol on its own discretion. The same status line as with
|
|
|
|
|
PREP_ENCRYPT is used for this.
|
|
|
|
|
|
|
|
|
|
The option ‘--protocol’ may be used to give the server a hint on
|
|
|
|
|
which signing protocol should be preferred.
|
|
|
|
|
|
|
|
|
|
To allow the UI-server to visually identify a running operation or to
|
|
|
|
|
associate operations the server MAY support the command:
|
|
|
|
|
|
|
|
|
|
-- Command: SESSION NUMBER [STRING]
|
|
|
|
|
The NUMBER is an arbitrary value, a server may use to associate
|
|
|
|
|
simultaneous running sessions. It is a 32 bit unsigned integer
|
|
|
|
|
with ‘0’ as a special value indicating that no session association
|
|
|
|
|
shall be done.
|
|
|
|
|
|
|
|
|
|
If STRING is given, the server may use this as the title of a
|
|
|
|
|
window or, in the case of an email operation, to extract the
|
|
|
|
|
sender’s address. The string may contain spaces; thus no
|
|
|
|
|
plus-escaping is used.
|
|
|
|
|
|
|
|
|
|
This command may be used at any time and overrides the effect of
|
|
|
|
|
the last command. A ‘RESET’ undoes the effect of this command.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
File: gpgme.info, Node: Debugging, Next: Deprecated Functions, Prev: UI Server Protocol, Up: Top
|
|
|
|
|
|
|
|
|
|
Appendix B How to solve problems
|
|
|
|
|
********************************
|
|
|
|
|
|
|
|
|
|
Everyone knows that software often does not do what it should do and
|
|
|
|
|
thus there is a need to track down problems. This is in particular true
|
|
|
|
|
for applications using a complex library like GPGME and of course also
|
|
|
|
|
for the library itself. Here we give a few hints on how to solve such
|
|
|
|
|
problems.
|
|
|
|
|
|
|
|
|
|
First of all you should make sure that the keys you want to use are
|
|
|
|
|
installed in the GnuPG engine and are usable. Thus the first test is to
|
|
|
|
|
run the desired operation using ‘gpg’ or ‘gpgsm’ on the command line.
|
|
|
|
|
If you can’t figure out why things don’t work, you may use GPGME’s built
|
|
|
|
|
in trace feature. This feature is either enabled using the environment
|
|
|
|
|
variable ‘GPGME_DEBUG’ or, if this is not possible, by calling the
|
|
|
|
|
function ‘gpgme_set_global_flag’. The value is the trace level and an
|
|
|
|
|
optional file name. If no file name is given the trace output is
|
|
|
|
|
printed to ‘stderr’.
|
|
|
|
|
|
|
|
|
|
For example
|
|
|
|
|
GPGME_DEBUG=9:/home/user/mygpgme.log
|
|
|
|
|
(Note that under Windows you use a semicolon in place of the colon to
|
|
|
|
|
separate the fields.)
|
|
|
|
|
|
|
|
|
|
A trace level of 9 is pretty verbose and thus you may want to start
|
|
|
|
|
off with a lower level. The exact definition of the trace levels and
|
|
|
|
|
the output format may change with any release; you need to check the
|
|
|
|
|
source code for details. In any case the trace log should be helpful to
|
|
|
|
|
understand what is going going on. Warning: The trace log may reveal
|
|
|
|
|
sensitive details like passphrases or other data you use in your
|
|
|
|
|
application. If you are asked to send a log file, make sure that you
|
|
|
|
|
run your tests only with play data.
|
|
|
|
|
|
2023-09-15 15:11:23 +08:00
|
|
|
|
The trace function makes use of gpgrt’s logging function and thus the
|
|
|
|
|
special ‘socket://’ and ‘tcp://’ files may be used. Because this
|
|
|
|
|
conflicts with the use of colons to separate fields, the following hack
|
|
|
|
|
is used: If the file name contains the string ‘^//’ all carets are
|
|
|
|
|
replaced by colons. For example to log to TCP port 42042 this can be
|
|
|
|
|
used:
|
|
|
|
|
GPGME_DEBUG=5:tcp^//127.0.0.1^42042
|
|
|
|
|
|
2022-05-13 23:46:52 +08:00
|
|
|
|
|
|
|
|
|
File: gpgme.info, Node: Deprecated Functions, Next: Library Copying, Prev: Debugging, Up: Top
|
|
|
|
|
|
|
|
|
|
Appendix C Deprecated Functions
|
|
|
|
|
*******************************
|
|
|
|
|
|
|
|
|
|
For backward compatibility GPGME has a number of functions, data types
|
|
|
|
|
and constants which are deprecated and should not be used anymore. We
|
|
|
|
|
document here those which are really old to help understanding old code
|
|
|
|
|
and to allow migration to their modern counterparts.
|
|
|
|
|
|
|
|
|
|
*Warning:* These interfaces will be removed in a future version of
|
|
|
|
|
GPGME.
|
|
|
|
|
|
|
|
|
|
-- Function: void gpgme_key_release (gpgme_key_t KEY)
|
|
|
|
|
The function ‘gpgme_key_release’ is equivalent to
|
|
|
|
|
‘gpgme_key_unref’.
|
|
|
|
|
|
|
|
|
|
-- Function: gpgme_error_t gpgme_op_import_ext (gpgme_ctx_t CTX,
|
|
|
|
|
gpgme_data_t KEYDATA, int *NR)
|
|
|
|
|
SINCE: 0.3.9
|
|
|
|
|
|
|
|
|
|
The function ‘gpgme_op_import_ext’ is equivalent to:
|
|
|
|
|
|
|
|
|
|
gpgme_error_t err = gpgme_op_import (ctx, keydata);
|
|
|
|
|
if (!err)
|
|
|
|
|
{
|
|
|
|
|
gpgme_import_result_t result = gpgme_op_import_result (ctx);
|
|
|
|
|
*nr = result->considered;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
-- Data type: gpgme_error_t (*gpgme_edit_cb_t) (void *HANDLE,
|
|
|
|
|
gpgme_status_code_t STATUS, const char *ARGS, int FD)
|
|
|
|
|
The ‘gpgme_edit_cb_t’ type is the type of functions which GPGME
|
|
|
|
|
calls if it a key edit operation is on-going. The status code
|
|
|
|
|
STATUS and the argument line ARGS are passed through by GPGME from
|
|
|
|
|
the crypto engine. The file descriptor FD is -1 for normal status
|
|
|
|
|
messages. If STATUS indicates a command rather than a status
|
|
|
|
|
message, the response to the command should be written to FD. The
|
|
|
|
|
HANDLE is provided by the user at start of operation.
|
|
|
|
|
|
|
|
|
|
The function should return ‘GPG_ERR_FALSE’ if it did not handle the
|
|
|
|
|
status code, ‘0’ for success, or any other error value.
|
|
|
|
|
|
|
|
|
|
-- Function: gpgme_error_t gpgme_op_edit (gpgme_ctx_t CTX,
|
|
|
|
|
gpgme_key_t KEY, gpgme_edit_cb_t FNC, void *HANDLE,
|
|
|
|
|
gpgme_data_t OUT)
|
|
|
|
|
SINCE: 0.3.9
|
|
|
|
|
|
|
|
|
|
Note: This function is deprecated, please use ‘gpgme_op_interact’
|
|
|
|
|
instead.
|
|
|
|
|
|
|
|
|
|
The function ‘gpgme_op_edit’ processes the key KEY interactively,
|
|
|
|
|
using the edit callback function FNC with the handle HANDLE. The
|
|
|
|
|
callback is invoked for every status and command request from the
|
|
|
|
|
crypto engine. The output of the crypto engine is written to the
|
|
|
|
|
data object OUT.
|
|
|
|
|
|
|
|
|
|
Note that the protocol between the callback function and the crypto
|
|
|
|
|
engine is specific to the crypto engine and no further support in
|
|
|
|
|
implementing this protocol correctly is provided by GPGME.
|
|
|
|
|
|
|
|
|
|
The function returns the error code ‘GPG_ERR_NO_ERROR’ if the edit
|
|
|
|
|
operation completes successfully, ‘GPG_ERR_INV_VALUE’ if CTX or KEY
|
|
|
|
|
is not a valid pointer, and any error returned by the crypto engine
|
|
|
|
|
or the edit callback handler.
|
|
|
|
|
|
|
|
|
|
-- Function: gpgme_error_t gpgme_op_edit_start (gpgme_ctx_t CTX,
|
|
|
|
|
gpgme_key_t KEY, gpgme_edit_cb_t FNC, void *HANDLE,
|
|
|
|
|
gpgme_data_t OUT)
|
|
|
|
|
|
|
|
|
|
SINCE: 0.3.9
|
|
|
|
|
|
|
|
|
|
Note: This function is deprecated, please use
|
|
|
|
|
‘gpgme_op_interact_start’ instead.
|
|
|
|
|
|
|
|
|
|
The function ‘gpgme_op_edit_start’ initiates a ‘gpgme_op_edit’
|
|
|
|
|
operation. It can be completed by calling ‘gpgme_wait’ on the
|
|
|
|
|
context. *Note Waiting For Completion::.
|
|
|
|
|
|
|
|
|
|
The function returns the error code ‘GPG_ERR_NO_ERROR’ if the
|
|
|
|
|
operation was started successfully, and ‘GPG_ERR_INV_VALUE’ if CTX
|
|
|
|
|
or KEY is not a valid pointer.
|
|
|
|
|
|
|
|
|
|
-- Function: gpgme_error_t gpgme_op_card_edit (gpgme_ctx_t CTX,
|
|
|
|
|
gpgme_key_t KEY, gpgme_edit_cb_t FNC, void *HANDLE,
|
|
|
|
|
gpgme_data_t OUT)
|
|
|
|
|
Note: This function is deprecated, please use ‘gpgme_op_interact’
|
|
|
|
|
with the flag ‘GPGME_INTERACT_CARD’ instead.
|
|
|
|
|
|
|
|
|
|
The function ‘gpgme_op_card_edit’ is analogous to ‘gpgme_op_edit’,
|
|
|
|
|
but should be used to process the smart card corresponding to the
|
|
|
|
|
key KEY.
|
|
|
|
|
|
|
|
|
|
-- Function: gpgme_error_t gpgme_op_card_edit_start (gpgme_ctx_t CTX,
|
|
|
|
|
gpgme_key_t KEY, gpgme_edit_cb_t FNC, void *HANDLE,
|
|
|
|
|
gpgme_data_t OUT)
|
|
|
|
|
Note: This function is deprecated, please use
|
|
|
|
|
‘gpgme_op_interact_start’ with the flag ‘GPGME_INTERACT_CARD’
|
|
|
|
|
instead.
|
|
|
|
|
|
|
|
|
|
The function ‘gpgme_op_card_edit_start’ initiates a
|
|
|
|
|
‘gpgme_op_card_edit’ operation. It can be completed by calling
|
|
|
|
|
‘gpgme_wait’ on the context. *Note Waiting For Completion::.
|
|
|
|
|
|
|
|
|
|
The function returns the error code ‘GPG_ERR_NO_ERROR’ if the
|
|
|
|
|
operation was started successfully, and ‘GPG_ERR_INV_VALUE’ if CTX
|
|
|
|
|
or KEY is not a valid pointer.
|
|
|
|
|
|
|
|
|
|
-- Function: gpgme_error_t gpgme_data_new_with_read_cb
|
|
|
|
|
(gpgme_data_t *DH, int (*READFUNC) (void *HOOK, char *BUFFER,
|
|
|
|
|
size_t COUNT, size_t *NREAD), void *HOOK_VALUE)
|
|
|
|
|
The function ‘gpgme_data_new_with_read_cb’ creates a new
|
|
|
|
|
‘gpgme_data_t’ object and uses the callback function READFUNC to
|
|
|
|
|
retrieve the data on demand. As the callback function can supply
|
|
|
|
|
the data in any way it wants, this is the most flexible data type
|
|
|
|
|
GPGME provides. However, it can not be used to write data.
|
|
|
|
|
|
|
|
|
|
The callback function receives HOOK_VALUE as its first argument
|
|
|
|
|
whenever it is invoked. It should return up to COUNT bytes in
|
|
|
|
|
BUFFER, and return the number of bytes actually read in NREAD. It
|
|
|
|
|
may return ‘0’ in NREAD if no data is currently available. To
|
|
|
|
|
indicate ‘EOF’ the function should return with an error code of
|
|
|
|
|
‘-1’ and set NREAD to ‘0’. The callback function may support to
|
|
|
|
|
reset its internal read pointer if it is invoked with BUFFER and
|
|
|
|
|
NREAD being ‘NULL’ and COUNT being ‘0’.
|
|
|
|
|
|
|
|
|
|
The function returns the error code ‘GPG_ERR_NO_ERROR’ if the data
|
|
|
|
|
object was successfully created, ‘GPG_ERR_INV_VALUE’ if DH or
|
|
|
|
|
READFUNC is not a valid pointer, and ‘GPG_ERR_ENOMEM’ if not enough
|
|
|
|
|
memory is available.
|
|
|
|
|
|
|
|
|
|
-- Function: gpgme_error_t gpgme_data_rewind (gpgme_data_t DH)
|
|
|
|
|
The function ‘gpgme_data_rewind’ is equivalent to:
|
|
|
|
|
|
|
|
|
|
return (gpgme_data_seek (dh, 0, SEEK_SET) == -1)
|
|
|
|
|
? gpgme_error_from_errno (errno) : 0;
|
|
|
|
|
|
|
|
|
|
-- Data type: gpgme_attr_t
|
|
|
|
|
The ‘gpgme_attr_t’ type is used to specify a key or trust item
|
|
|
|
|
attribute. The following attributes are defined:
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_KEYID’
|
|
|
|
|
This is the key ID of a sub key. It is representable as a
|
|
|
|
|
string.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_FPR’
|
|
|
|
|
This is the fingerprint of a sub key. It is representable as
|
|
|
|
|
a string.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_ALGO’
|
|
|
|
|
This is the crypto algorithm for which the sub key can be
|
|
|
|
|
used. It is representable as a string and as a number. The
|
|
|
|
|
numbers correspond to the ‘enum gcry_pk_algos’ values in the
|
|
|
|
|
gcrypt library.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_LEN’
|
|
|
|
|
This is the key length of a sub key. It is representable as a
|
|
|
|
|
number.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_CREATED’
|
|
|
|
|
This is the timestamp at creation time of a sub key. It is
|
|
|
|
|
representable as a number.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_EXPIRE’
|
|
|
|
|
This is the expiration time of a sub key. It is representable
|
|
|
|
|
as a number.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_USERID’
|
|
|
|
|
This is a user ID. There can be more than one user IDs in a
|
|
|
|
|
GPGME_KEY_T object. The first one (with index 0) is the
|
|
|
|
|
primary user ID. The user ID is representable as a number.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_NAME’
|
|
|
|
|
This is the name belonging to a user ID. It is representable
|
|
|
|
|
as a string.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_EMAIL’
|
|
|
|
|
This is the email address belonging to a user ID. It is
|
|
|
|
|
representable as a string.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_COMMENT’
|
|
|
|
|
This is the comment belonging to a user ID. It is
|
|
|
|
|
representable as a string.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_VALIDITY’
|
|
|
|
|
This is the validity belonging to a user ID. It is
|
|
|
|
|
representable as a string and as a number. See below for a
|
|
|
|
|
list of available validities.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_UID_REVOKED’
|
|
|
|
|
This specifies if a user ID is revoked. It is representable
|
|
|
|
|
as a number, and is ‘1’ if the user ID is revoked, and ‘0’
|
|
|
|
|
otherwise.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_UID_INVALID’
|
|
|
|
|
This specifies if a user ID is invalid. It is representable
|
|
|
|
|
as a number, and is ‘1’ if the user ID is invalid, and ‘0’
|
|
|
|
|
otherwise.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_TYPE’
|
|
|
|
|
This returns information about the type of key. For the
|
|
|
|
|
string function this will eother be "PGP" or "X.509". The
|
2023-09-15 15:11:23 +08:00
|
|
|
|
integer function returns 0 for PGP and 1 for X.509.
|
2022-05-13 23:46:52 +08:00
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_IS_SECRET’
|
|
|
|
|
This specifies if the key is a secret key. It is
|
|
|
|
|
representable as a number, and is ‘1’ if the key is revoked,
|
|
|
|
|
and ‘0’ otherwise.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_KEY_REVOKED’
|
|
|
|
|
This specifies if a sub key is revoked. It is representable
|
|
|
|
|
as a number, and is ‘1’ if the key is revoked, and ‘0’
|
|
|
|
|
otherwise.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_KEY_INVALID’
|
|
|
|
|
This specifies if a sub key is invalid. It is representable
|
|
|
|
|
as a number, and is ‘1’ if the key is invalid, and ‘0’
|
|
|
|
|
otherwise.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_KEY_EXPIRED’
|
|
|
|
|
This specifies if a sub key is expired. It is representable
|
|
|
|
|
as a number, and is ‘1’ if the key is expired, and ‘0’
|
|
|
|
|
otherwise.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_KEY_DISABLED’
|
|
|
|
|
This specifies if a sub key is disabled. It is representable
|
|
|
|
|
as a number, and is ‘1’ if the key is disabled, and ‘0’
|
|
|
|
|
otherwise.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_KEY_CAPS’
|
|
|
|
|
This is a description of the capabilities of a sub key. It is
|
|
|
|
|
representable as a string. The string contains the letter “e”
|
|
|
|
|
if the key can be used for encryption, “s” if the key can be
|
|
|
|
|
used for signatures, and “c” if the key can be used for
|
|
|
|
|
certifications.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_CAN_ENCRYPT’
|
|
|
|
|
This specifies if a sub key can be used for encryption. It is
|
|
|
|
|
representable as a number, and is ‘1’ if the sub key can be
|
|
|
|
|
used for encryption, and ‘0’ otherwise.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_CAN_SIGN’
|
|
|
|
|
This specifies if a sub key can be used to create data
|
|
|
|
|
signatures. It is representable as a number, and is ‘1’ if
|
|
|
|
|
the sub key can be used for signatures, and ‘0’ otherwise.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_CAN_CERTIFY’
|
|
|
|
|
This specifies if a sub key can be used to create key
|
|
|
|
|
certificates. It is representable as a number, and is ‘1’ if
|
|
|
|
|
the sub key can be used for certifications, and ‘0’ otherwise.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_SERIAL’
|
|
|
|
|
The X.509 issuer serial attribute of the key. It is
|
|
|
|
|
representable as a string.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_ISSUE’
|
|
|
|
|
The X.509 issuer name attribute of the key. It is
|
|
|
|
|
representable as a string.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_CHAINID’
|
|
|
|
|
The X.509 chain ID can be used to build the certification
|
|
|
|
|
chain. It is representable as a string.
|
|
|
|
|
|
|
|
|
|
-- Function: const char * gpgme_key_get_string_attr (gpgme_key_t KEY,
|
|
|
|
|
gpgme_attr_t WHAT, const void *RESERVED, int IDX)
|
|
|
|
|
The function ‘gpgme_key_get_string_attr’ returns the value of the
|
|
|
|
|
string-representable attribute WHAT of key KEY. If the attribute
|
|
|
|
|
is an attribute of a sub key or an user ID, IDX specifies the sub
|
|
|
|
|
key or user ID of which the attribute value is returned. The
|
|
|
|
|
argument RESERVED is reserved for later use and should be ‘NULL’.
|
|
|
|
|
|
|
|
|
|
The string returned is only valid as long as the key is valid.
|
|
|
|
|
|
|
|
|
|
The function returns ‘0’ if an attribute can’t be returned as a
|
|
|
|
|
string, KEY is not a valid pointer, IDX out of range, or RESERVED
|
|
|
|
|
not ‘NULL’.
|
|
|
|
|
|
|
|
|
|
-- Function: unsigned long gpgme_key_get_ulong_attr (gpgme_key_t KEY,
|
|
|
|
|
gpgme_attr_t WHAT, const void *RESERVED, int IDX)
|
|
|
|
|
The function ‘gpgme_key_get_ulong_attr’ returns the value of the
|
|
|
|
|
number-representable attribute WHAT of key KEY. If the attribute
|
|
|
|
|
is an attribute of a sub key or an user ID, IDX specifies the sub
|
|
|
|
|
key or user ID of which the attribute value is returned. The
|
|
|
|
|
argument RESERVED is reserved for later use and should be ‘NULL’.
|
|
|
|
|
|
|
|
|
|
The function returns ‘0’ if the attribute can’t be returned as a
|
|
|
|
|
number, KEY is not a valid pointer, IDX out of range, or RESERVED
|
|
|
|
|
not ‘NULL’.
|
|
|
|
|
|
|
|
|
|
The signatures on a key are only available if the key was retrieved
|
|
|
|
|
via a listing operation with the ‘GPGME_KEYLIST_MODE_SIGS’ mode enabled,
|
|
|
|
|
because it is expensive to retrieve all signatures of a key.
|
|
|
|
|
|
|
|
|
|
So, before using the below interfaces to retrieve the signatures on a
|
|
|
|
|
key, you have to make sure that the key was listed with signatures
|
|
|
|
|
enabled. One convenient, but blocking, way to do this is to use the
|
|
|
|
|
function ‘gpgme_get_key’.
|
|
|
|
|
|
|
|
|
|
-- Data type: gpgme_attr_t
|
|
|
|
|
The ‘gpgme_attr_t’ type is used to specify a key signature
|
|
|
|
|
attribute. The following attributes are defined:
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_KEYID’
|
|
|
|
|
This is the key ID of the key which was used for the
|
|
|
|
|
signature. It is representable as a string.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_ALGO’
|
|
|
|
|
This is the crypto algorithm used to create the signature. It
|
|
|
|
|
is representable as a string and as a number. The numbers
|
|
|
|
|
correspond to the ‘enum gcry_pk_algos’ values in the gcrypt
|
|
|
|
|
library.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_CREATED’
|
|
|
|
|
This is the timestamp at creation time of the signature. It
|
|
|
|
|
is representable as a number.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_EXPIRE’
|
|
|
|
|
This is the expiration time of the signature. It is
|
|
|
|
|
representable as a number.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_USERID’
|
|
|
|
|
This is the user ID associated with the signing key. The user
|
|
|
|
|
ID is representable as a number.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_NAME’
|
|
|
|
|
This is the name belonging to a user ID. It is representable
|
|
|
|
|
as a string.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_EMAIL’
|
|
|
|
|
This is the email address belonging to a user ID. It is
|
|
|
|
|
representable as a string.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_COMMENT’
|
|
|
|
|
This is the comment belonging to a user ID. It is
|
|
|
|
|
representable as a string.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_KEY_REVOKED’
|
|
|
|
|
This specifies if a key signature is a revocation signature.
|
|
|
|
|
It is representable as a number, and is ‘1’ if the key is
|
|
|
|
|
revoked, and ‘0’ otherwise.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_SIG_CLASS’
|
|
|
|
|
This specifies the signature class of a key signature. It is
|
|
|
|
|
representable as a number. The meaning is specific to the
|
|
|
|
|
crypto engine.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_SIG_CLASS’
|
|
|
|
|
This specifies the signature class of a key signature. It is
|
|
|
|
|
representable as a number. The meaning is specific to the
|
|
|
|
|
crypto engine.
|
|
|
|
|
|
|
|
|
|
‘GPGME_ATTR_SIG_STATUS’
|
|
|
|
|
This is the same value as returned by ‘gpgme_get_sig_status’.
|
|
|
|
|
|
|
|
|
|
-- Function: const char * gpgme_key_sig_get_string_attr
|
|
|
|
|
(gpgme_key_t KEY, int UID_IDX, gpgme_attr_t WHAT,
|
|
|
|
|
const void *RESERVED, int IDX)
|
|
|
|
|
The function ‘gpgme_key_sig_get_string_attr’ returns the value of
|
|
|
|
|
the string-representable attribute WHAT of the signature IDX on the
|
|
|
|
|
user ID UID_IDX in the key KEY. The argument RESERVED is reserved
|
|
|
|
|
for later use and should be ‘NULL’.
|
|
|
|
|
|
|
|
|
|
The string returned is only valid as long as the key is valid.
|
|
|
|
|
|
|
|
|
|
The function returns ‘0’ if an attribute can’t be returned as a
|
|
|
|
|
string, KEY is not a valid pointer, UID_IDX or IDX out of range, or
|
|
|
|
|
RESERVED not ‘NULL’.
|
|
|
|
|
|
|
|
|
|
-- Function: unsigned long gpgme_key_sig_get_ulong_attr
|
|
|
|
|
(gpgme_key_t KEY, int UID_IDX, gpgme_attr_t WHAT,
|
|
|
|
|
const void *RESERVED, int IDX)
|
|
|
|
|
The function ‘gpgme_key_sig_get_ulong_attr’ returns the value of
|
|
|
|
|
the number-representable attribute WHAT of the signature IDX on the
|
|
|
|
|
user ID UID_IDX in the key KEY. The argument RESERVED is reserved
|
|
|
|
|
for later use and should be ‘NULL’.
|
|
|
|
|
|
|
|
|
|
The function returns ‘0’ if an attribute can’t be returned as a
|
|
|
|
|
string, KEY is not a valid pointer, UID_IDX or IDX out of range, or
|
|
|
|
|
RESERVED not ‘NULL’.
|
|
|
|
|
|
|
|
|
|
-- Data type: enum gpgme_sig_stat_t
|
|
|
|
|
The ‘gpgme_sig_stat_t’ type holds the result of a signature check,
|
|
|
|
|
or the combined result of all signatures. The following results
|
|
|
|
|
are possible:
|
|
|
|
|
|
|
|
|
|
‘GPGME_SIG_STAT_NONE’
|
|
|
|
|
This status should not occur in normal operation.
|
|
|
|
|
|
|
|
|
|
‘GPGME_SIG_STAT_GOOD’
|
|
|
|
|
This status indicates that the signature is valid. For the
|
|
|
|
|
combined result this status means that all signatures are
|
|
|
|
|
valid.
|
|
|
|
|
|
|
|
|
|
‘GPGME_SIG_STAT_GOOD_EXP’
|
|
|
|
|
This status indicates that the signature is valid but expired.
|
|
|
|
|
For the combined result this status means that all signatures
|
|
|
|
|
are valid and expired.
|
|
|
|
|
|
|
|
|
|
‘GPGME_SIG_STAT_GOOD_EXPKEY’
|
|
|
|
|
This status indicates that the signature is valid but the key
|
|
|
|
|
used to verify the signature has expired. For the combined
|
|
|
|
|
result this status means that all signatures are valid and all
|
|
|
|
|
keys are expired.
|
|
|
|
|
|
|
|
|
|
‘GPGME_SIG_STAT_BAD’
|
|
|
|
|
This status indicates that the signature is invalid. For the
|
|
|
|
|
combined result this status means that all signatures are
|
|
|
|
|
invalid.
|
|
|
|
|
|
|
|
|
|
‘GPGME_SIG_STAT_NOKEY’
|
|
|
|
|
This status indicates that the signature could not be verified
|
|
|
|
|
due to a missing key. For the combined result this status
|
|
|
|
|
means that all signatures could not be checked due to missing
|
|
|
|
|
keys.
|
|
|
|
|
|
|
|
|
|
‘GPGME_SIG_STAT_NOSIG’
|
|
|
|
|
This status indicates that the signature data provided was not
|
|
|
|
|
a real signature.
|
|
|
|
|
|
|
|
|
|
‘GPGME_SIG_STAT_ERROR’
|
|
|
|
|
This status indicates that there was some other error which
|
|
|
|
|
prevented the signature verification.
|
|
|
|
|
|
|
|
|
|
‘GPGME_SIG_STAT_DIFF’
|
|
|
|
|
For the combined result this status means that at least two
|
|
|
|
|
signatures have a different status. You can get each key’s
|
|
|
|
|
status with ‘gpgme_get_sig_status’.
|
|
|
|
|
|
|
|
|
|
-- Function: const char * gpgme_get_sig_status (gpgme_ctx_t CTX,
|
|
|
|
|
int IDX, gpgme_sig_stat_t *R_STAT, time_t *R_CREATED)
|
|
|
|
|
The function ‘gpgme_get_sig_status’ is equivalent to:
|
|
|
|
|
|
|
|
|
|
gpgme_verify_result_t result;
|
|
|
|
|
gpgme_signature_t sig;
|
|
|
|
|
|
|
|
|
|
result = gpgme_op_verify_result (ctx);
|
|
|
|
|
sig = result->signatures;
|
|
|
|
|
|
|
|
|
|
while (sig && idx)
|
|
|
|
|
{
|
|
|
|
|
sig = sig->next;
|
|
|
|
|
idx--;
|
|
|
|
|
}
|
|
|
|
|
if (!sig || idx)
|
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
if (r_stat)
|
|
|
|
|
{
|
|
|
|
|
switch (gpg_err_code (sig->status))
|
2023-09-15 15:11:23 +08:00
|
|
|
|
{
|
2022-05-13 23:46:52 +08:00
|
|
|
|
case GPG_ERR_NO_ERROR:
|
|
|
|
|
*r_stat = GPGME_SIG_STAT_GOOD;
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case GPG_ERR_BAD_SIGNATURE:
|
|
|
|
|
*r_stat = GPGME_SIG_STAT_BAD;
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case GPG_ERR_NO_PUBKEY:
|
|
|
|
|
*r_stat = GPGME_SIG_STAT_NOKEY;
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case GPG_ERR_NO_DATA:
|
|
|
|
|
*r_stat = GPGME_SIG_STAT_NOSIG;
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case GPG_ERR_SIG_EXPIRED:
|
|
|
|
|
*r_stat = GPGME_SIG_STAT_GOOD_EXP;
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case GPG_ERR_KEY_EXPIRED:
|
|
|
|
|
*r_stat = GPGME_SIG_STAT_GOOD_EXPKEY;
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
*r_stat = GPGME_SIG_STAT_ERROR;
|
|
|
|
|
break;
|
2023-09-15 15:11:23 +08:00
|
|
|
|
}
|
2022-05-13 23:46:52 +08:00
|
|
|
|
}
|
|
|
|
|
if (r_created)
|
|
|
|
|
*r_created = sig->timestamp;
|
|
|
|
|
return sig->fpr;
|
|
|
|
|
|
|
|
|
|
-- Function: const char * gpgme_get_sig_string_attr (gpgme_ctx_t CTX,
|
|
|
|
|
int IDX, gpgme_attr_t WHAT, int WHATIDX)
|
|
|
|
|
The function ‘gpgme_get_sig_string_attr’ is equivalent to:
|
|
|
|
|
|
|
|
|
|
gpgme_verify_result_t result;
|
|
|
|
|
gpgme_signature_t sig;
|
|
|
|
|
|
|
|
|
|
result = gpgme_op_verify_result (ctx);
|
|
|
|
|
sig = result->signatures;
|
|
|
|
|
|
|
|
|
|
while (sig && idx)
|
|
|
|
|
{
|
|
|
|
|
sig = sig->next;
|
|
|
|
|
idx--;
|
|
|
|
|
}
|
|
|
|
|
if (!sig || idx)
|
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
switch (what)
|
|
|
|
|
{
|
|
|
|
|
case GPGME_ATTR_FPR:
|
|
|
|
|
return sig->fpr;
|
|
|
|
|
|
|
|
|
|
case GPGME_ATTR_ERRTOK:
|
|
|
|
|
if (whatidx == 1)
|
|
|
|
|
return sig->wrong_key_usage ? "Wrong_Key_Usage" : "";
|
|
|
|
|
else
|
|
|
|
|
return "";
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
-- Function: const char * gpgme_get_sig_ulong_attr (gpgme_ctx_t CTX,
|
|
|
|
|
int IDX, gpgme_attr_t WHAT, int WHATIDX)
|
|
|
|
|
The function ‘gpgme_get_sig_ulong_attr’ is equivalent to:
|
|
|
|
|
|
|
|
|
|
gpgme_verify_result_t result;
|
|
|
|
|
gpgme_signature_t sig;
|
|
|
|
|
|
|
|
|
|
result = gpgme_op_verify_result (ctx);
|
|
|
|
|
sig = result->signatures;
|
|
|
|
|
|
|
|
|
|
while (sig && idx)
|
|
|
|
|
{
|
|
|
|
|
sig = sig->next;
|
|
|
|
|
idx--;
|
|
|
|
|
}
|
|
|
|
|
if (!sig || idx)
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
|
|
switch (what)
|
|
|
|
|
{
|
|
|
|
|
case GPGME_ATTR_CREATED:
|
|
|
|
|
return sig->timestamp;
|
|
|
|
|
|
|
|
|
|
case GPGME_ATTR_EXPIRE:
|
|
|
|
|
return sig->exp_timestamp;
|
|
|
|
|
|
|
|
|
|
case GPGME_ATTR_VALIDITY:
|
|
|
|
|
return (unsigned long) sig->validity;
|
|
|
|
|
|
|
|
|
|
case GPGME_ATTR_SIG_STATUS:
|
|
|
|
|
switch (sig->status)
|
2023-09-15 15:11:23 +08:00
|
|
|
|
{
|
2022-05-13 23:46:52 +08:00
|
|
|
|
case GPG_ERR_NO_ERROR:
|
|
|
|
|
return GPGME_SIG_STAT_GOOD;
|
|
|
|
|
|
|
|
|
|
case GPG_ERR_BAD_SIGNATURE:
|
|
|
|
|
return GPGME_SIG_STAT_BAD;
|
|
|
|
|
|
|
|
|
|
case GPG_ERR_NO_PUBKEY:
|
|
|
|
|
return GPGME_SIG_STAT_NOKEY;
|
|
|
|
|
|
|
|
|
|
case GPG_ERR_NO_DATA:
|
|
|
|
|
return GPGME_SIG_STAT_NOSIG;
|
|
|
|
|
|
|
|
|
|
case GPG_ERR_SIG_EXPIRED:
|
|
|
|
|
return GPGME_SIG_STAT_GOOD_EXP;
|
|
|
|
|
|
|
|
|
|
case GPG_ERR_KEY_EXPIRED:
|
|
|
|
|
return GPGME_SIG_STAT_GOOD_EXPKEY;
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
return GPGME_SIG_STAT_ERROR;
|
2023-09-15 15:11:23 +08:00
|
|
|
|
}
|
2022-05-13 23:46:52 +08:00
|
|
|
|
|
|
|
|
|
case GPGME_ATTR_SIG_SUMMARY:
|
|
|
|
|
return sig->summary;
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
|
|
-- Function: const char * gpgme_get_sig_key (gpgme_ctx_t CTX, int IDX,
|
|
|
|
|
gpgme_key_t *R_KEY)
|
|
|
|
|
The function ‘gpgme_get_sig_key’ is equivalent to:
|
|
|
|
|
|
|
|
|
|
gpgme_verify_result_t result;
|
|
|
|
|
gpgme_signature_t sig;
|
|
|
|
|
|
|
|
|
|
result = gpgme_op_verify_result (ctx);
|
|
|
|
|
sig = result->signatures;
|
|
|
|
|
|
|
|
|
|
while (sig && idx)
|
|
|
|
|
{
|
|
|
|
|
sig = sig->next;
|
|
|
|
|
idx--;
|
|
|
|
|
}
|
|
|
|
|
if (!sig || idx)
|
|
|
|
|
return gpg_error (GPG_ERR_EOF);
|
|
|
|
|
|
|
|
|
|
return gpgme_get_key (ctx, sig->fpr, r_key, 0);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
File: gpgme.info, Node: Library Copying, Next: Copying, Prev: Deprecated Functions, Up: Top
|
|
|
|
|
|
|
|
|
|
GNU Lesser General Public License
|
|
|
|
|
*********************************
|
|
|
|
|
|
|
|
|
|
Version 2.1, February 1999
|
|
|
|
|
|
|
|
|
|
Copyright © 1991, 1999 Free Software Foundation, Inc.
|
|
|
|
|
59 Temple Place – Suite 330, Boston, MA 02111-1307, USA
|
|
|
|
|
|
|
|
|
|
Everyone is permitted to copy and distribute verbatim copies
|
|
|
|
|
of this license document, but changing it is not allowed.
|
|
|
|
|
|
|
|
|
|
[This is the first released version of the Lesser GPL. It also counts
|
|
|
|
|
as the successor of the GNU Library Public License, version 2, hence the
|
|
|
|
|
version number 2.1.]
|
|
|
|
|
|
|
|
|
|
Preamble
|
|
|
|
|
========
|
|
|
|
|
|
|
|
|
|
The licenses for most software are designed to take away your freedom to
|
|
|
|
|
share and change it. By contrast, the GNU General Public Licenses are
|
|
|
|
|
intended to guarantee your freedom to share and change free software—to
|
|
|
|
|
make sure the software is free for all its users.
|
|
|
|
|
|
|
|
|
|
This license, the Lesser General Public License, applies to some
|
|
|
|
|
specially designated software—typically libraries—of the Free Software
|
|
|
|
|
Foundation and other authors who decide to use it. You can use it too,
|
|
|
|
|
but we suggest you first think carefully about whether this license or
|
|
|
|
|
the ordinary General Public License is the better strategy to use in any
|
|
|
|
|
particular case, based on the explanations below.
|
|
|
|
|
|
|
|
|
|
When we speak of free software, we are referring to freedom of use,
|
|
|
|
|
not price. Our General Public Licenses are designed to make sure that
|
|
|
|
|
you have the freedom to distribute copies of free software (and charge
|
|
|
|
|
for this service if you wish); that you receive source code or can get
|
|
|
|
|
it if you want it; that you can change the software and use pieces of it
|
|
|
|
|
in new free programs; and that you are informed that you can do these
|
|
|
|
|
things.
|
|
|
|
|
|
|
|
|
|
To protect your rights, we need to make restrictions that forbid
|
|
|
|
|
distributors to deny you these rights or to ask you to surrender these
|
|
|
|
|
rights. These restrictions translate to certain responsibilities for
|
|
|
|
|
you if you distribute copies of the library or if you modify it.
|
|
|
|
|
|
|
|
|
|
For example, if you distribute copies of the library, whether gratis
|
|
|
|
|
or for a fee, you must give the recipients all the rights that we gave
|
|
|
|
|
you. You must make sure that they, too, receive or can get the source
|
|
|
|
|
code. If you link other code with the library, you must provide
|
|
|
|
|
complete object files to the recipients, so that they can relink them
|
|
|
|
|
with the library after making changes to the library and recompiling it.
|
|
|
|
|
And you must show them these terms so they know their rights.
|
|
|
|
|
|
|
|
|
|
We protect your rights with a two-step method: (1) we copyright the
|
|
|
|
|
library, and (2) we offer you this license, which gives you legal
|
|
|
|
|
permission to copy, distribute and/or modify the library.
|
|
|
|
|
|
|
|
|
|
To protect each distributor, we want to make it very clear that there
|
|
|
|
|
is no warranty for the free library. Also, if the library is modified
|
|
|
|
|
by someone else and passed on, the recipients should know that what they
|
|
|
|
|
have is not the original version, so that the original author’s
|
|
|
|
|
reputation will not be affected by problems that might be introduced by
|
|
|
|
|
others.
|
|
|
|
|
|
|
|
|
|
Finally, software patents pose a constant threat to the existence of
|
|
|
|
|
any free program. We wish to make sure that a company cannot
|
|
|
|
|
effectively restrict the users of a free program by obtaining a
|
|
|
|
|
restrictive license from a patent holder. Therefore, we insist that any
|
|
|
|
|
patent license obtained for a version of the library must be consistent
|
|
|
|
|
with the full freedom of use specified in this license.
|
|
|
|
|
|
|
|
|
|
Most GNU software, including some libraries, is covered by the
|
|
|
|
|
ordinary GNU General Public License. This license, the GNU Lesser
|
|
|
|
|
General Public License, applies to certain designated libraries, and is
|
|
|
|
|
quite different from the ordinary General Public License. We use this
|
|
|
|
|
license for certain libraries in order to permit linking those libraries
|
|
|
|
|
into non-free programs.
|
|
|
|
|
|
|
|
|
|
When a program is linked with a library, whether statically or using
|
|
|
|
|
a shared library, the combination of the two is legally speaking a
|
|
|
|
|
combined work, a derivative of the original library. The ordinary
|
|
|
|
|
General Public License therefore permits such linking only if the entire
|
|
|
|
|
combination fits its criteria of freedom. The Lesser General Public
|
|
|
|
|
License permits more lax criteria for linking other code with the
|
|
|
|
|
library.
|
|
|
|
|
|
|
|
|
|
We call this license the “Lesser” General Public License because it
|
|
|
|
|
does _Less_ to protect the user’s freedom than the ordinary General
|
|
|
|
|
Public License. It also provides other free software developers Less of
|
|
|
|
|
an advantage over competing non-free programs. These disadvantages are
|
|
|
|
|
the reason we use the ordinary General Public License for many
|
|
|
|
|
libraries. However, the Lesser license provides advantages in certain
|
|
|
|
|
special circumstances.
|
|
|
|
|
|
|
|
|
|
For example, on rare occasions, there may be a special need to
|
|
|
|
|
encourage the widest possible use of a certain library, so that it
|
|
|
|
|
becomes a de-facto standard. To achieve this, non-free programs must be
|
|
|
|
|
allowed to use the library. A more frequent case is that a free library
|
|
|
|
|
does the same job as widely used non-free libraries. In this case,
|
|
|
|
|
there is little to gain by limiting the free library to free software
|
|
|
|
|
only, so we use the Lesser General Public License.
|
|
|
|
|
|
|
|
|
|
In other cases, permission to use a particular library in non-free
|
|
|
|
|
programs enables a greater number of people to use a large body of free
|
|
|
|
|
software. For example, permission to use the GNU C Library in non-free
|
|
|
|
|
programs enables many more people to use the whole GNU operating system,
|
|
|
|
|
as well as its variant, the GNU/Linux operating system.
|
|
|
|
|
|
|
|
|
|
Although the Lesser General Public License is Less protective of the
|
|
|
|
|
users’ freedom, it does ensure that the user of a program that is linked
|
|
|
|
|
with the Library has the freedom and the wherewithal to run that program
|
|
|
|
|
using a modified version of the Library.
|
|
|
|
|
|
|
|
|
|
The precise terms and conditions for copying, distribution and
|
|
|
|
|
modification follow. Pay close attention to the difference between a
|
|
|
|
|
“work based on the library” and a “work that uses the library”. The
|
|
|
|
|
former contains code derived from the library, whereas the latter must
|
|
|
|
|
be combined with the library in order to run.
|
|
|
|
|
|
|
|
|
|
GNU LESSER GENERAL PUBLIC LICENSE
|
|
|
|
|
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
|
|
|
|
|
|
|
|
|
|
0. This License Agreement applies to any software library or other
|
|
|
|
|
program which contains a notice placed by the copyright holder or
|
|
|
|
|
other authorized party saying it may be distributed under the terms
|
|
|
|
|
of this Lesser General Public License (also called “this License”).
|
|
|
|
|
Each licensee is addressed as “you”.
|
|
|
|
|
|
|
|
|
|
A “library” means a collection of software functions and/or data
|
|
|
|
|
prepared so as to be conveniently linked with application programs
|
|
|
|
|
(which use some of those functions and data) to form executables.
|
|
|
|
|
|
|
|
|
|
The “Library”, below, refers to any such software library or work
|
|
|
|
|
which has been distributed under these terms. A “work based on the
|
|
|
|
|
Library” means either the Library or any derivative work under
|
|
|
|
|
copyright law: that is to say, a work containing the Library or a
|
|
|
|
|
portion of it, either verbatim or with modifications and/or
|
|
|
|
|
translated straightforwardly into another language. (Hereinafter,
|
|
|
|
|
translation is included without limitation in the term
|
|
|
|
|
“modification”.)
|
|
|
|
|
|
|
|
|
|
“Source code” for a work means the preferred form of the work for
|
|
|
|
|
making modifications to it. For a library, complete source code
|
|
|
|
|
means all the source code for all modules it contains, plus any
|
|
|
|
|
associated interface definition files, plus the scripts used to
|
|
|
|
|
control compilation and installation of the library.
|
|
|
|
|
|
|
|
|
|
Activities other than copying, distribution and modification are
|
|
|
|
|
not covered by this License; they are outside its scope. The act
|
|
|
|
|
of running a program using the Library is not restricted, and
|
|
|
|
|
output from such a program is covered only if its contents
|
|
|
|
|
constitute a work based on the Library (independent of the use of
|
|
|
|
|
the Library in a tool for writing it). Whether that is true
|
|
|
|
|
depends on what the Library does and what the program that uses the
|
|
|
|
|
Library does.
|
|
|
|
|
|
|
|
|
|
1. You may copy and distribute verbatim copies of the Library’s
|
|
|
|
|
complete source code as you receive it, in any medium, provided
|
|
|
|
|
that you conspicuously and appropriately publish on each copy an
|
|
|
|
|
appropriate copyright notice and disclaimer of warranty; keep
|
|
|
|
|
intact all the notices that refer to this License and to the
|
|
|
|
|
absence of any warranty; and distribute a copy of this License
|
|
|
|
|
along with the Library.
|
|
|
|
|
|
|
|
|
|
You may charge a fee for the physical act of transferring a copy,
|
|
|
|
|
and you may at your option offer warranty protection in exchange
|
|
|
|
|
for a fee.
|
|
|
|
|
|
|
|
|
|
2. You may modify your copy or copies of the Library or any portion of
|
|
|
|
|
it, thus forming a work based on the Library, and copy and
|
|
|
|
|
distribute such modifications or work under the terms of Section 1
|
|
|
|
|
above, provided that you also meet all of these conditions:
|
|
|
|
|
|
|
|
|
|
a. The modified work must itself be a software library.
|
|
|
|
|
|
|
|
|
|
b. You must cause the files modified to carry prominent notices
|
|
|
|
|
stating that you changed the files and the date of any change.
|
|
|
|
|
|
|
|
|
|
c. You must cause the whole of the work to be licensed at no
|
|
|
|
|
charge to all third parties under the terms of this License.
|
|
|
|
|
|
|
|
|
|
d. If a facility in the modified Library refers to a function or
|
|
|
|
|
a table of data to be supplied by an application program that
|
|
|
|
|
uses the facility, other than as an argument passed when the
|
|
|
|
|
facility is invoked, then you must make a good faith effort to
|
|
|
|
|
ensure that, in the event an application does not supply such
|
|
|
|
|
function or table, the facility still operates, and performs
|
|
|
|
|
whatever part of its purpose remains meaningful.
|
|
|
|
|
|
|
|
|
|
(For example, a function in a library to compute square roots
|
|
|
|
|
has a purpose that is entirely well-defined independent of the
|
|
|
|
|
application. Therefore, Subsection 2d requires that any
|
|
|
|
|
application-supplied function or table used by this function
|
|
|
|
|
must be optional: if the application does not supply it, the
|
|
|
|
|
square root function must still compute square roots.)
|
|
|
|
|
|
|
|
|
|
These requirements apply to the modified work as a whole. If
|
|
|
|
|
identifiable sections of that work are not derived from the
|
|
|
|
|
Library, and can be reasonably considered independent and separate
|
|
|
|
|
works in themselves, then this License, and its terms, do not apply
|
|
|
|
|
to those sections when you distribute them as separate works. But
|
|
|
|
|
when you distribute the same sections as part of a whole which is a
|
|
|
|
|
work based on the Library, the distribution of the whole must be on
|
|
|
|
|
the terms of this License, whose permissions for other licensees
|
|
|
|
|
extend to the entire whole, and thus to each and every part
|
|
|
|
|
regardless of who wrote it.
|
|
|
|
|
|
|
|
|
|
Thus, it is not the intent of this section to claim rights or
|
|
|
|
|
contest your rights to work written entirely by you; rather, the
|
|
|
|
|
intent is to exercise the right to control the distribution of
|
|
|
|
|
derivative or collective works based on the Library.
|
|
|
|
|
|
|
|
|
|
In addition, mere aggregation of another work not based on the
|
|
|
|
|
Library with the Library (or with a work based on the Library) on a
|
|
|
|
|
volume of a storage or distribution medium does not bring the other
|
|
|
|
|
work under the scope of this License.
|
|
|
|
|
|
|
|
|
|
3. You may opt to apply the terms of the ordinary GNU General Public
|
|
|
|
|
License instead of this License to a given copy of the Library. To
|
|
|
|
|
do this, you must alter all the notices that refer to this License,
|
|
|
|
|
so that they refer to the ordinary GNU General Public License,
|
|
|
|
|
version 2, instead of to this License. (If a newer version than
|
|
|
|
|
version 2 of the ordinary GNU General Public License has appeared,
|
|
|
|
|
then you can specify that version instead if you wish.) Do not
|
|
|
|
|
make any other change in these notices.
|
|
|
|
|
|
|
|
|
|
Once this change is made in a given copy, it is irreversible for
|
|
|
|
|
that copy, so the ordinary GNU General Public License applies to
|
|
|
|
|
all subsequent copies and derivative works made from that copy.
|
|
|
|
|
|
|
|
|
|
This option is useful when you wish to copy part of the code of the
|
|
|
|
|
Library into a program that is not a library.
|
|
|
|
|
|
|
|
|
|
4. You may copy and distribute the Library (or a portion or derivative
|
|
|
|
|
of it, under Section 2) in object code or executable form under the
|
|
|
|
|
terms of Sections 1 and 2 above provided that you accompany it with
|
|
|
|
|
the complete corresponding machine-readable source code, which must
|
|
|
|
|
be distributed under the terms of Sections 1 and 2 above on a
|
|
|
|
|
medium customarily used for software interchange.
|
|
|
|
|
|
|
|
|
|
If distribution of object code is made by offering access to copy
|
|
|
|
|
from a designated place, then offering equivalent access to copy
|
|
|
|
|
the source code from the same place satisfies the requirement to
|
|
|
|
|
distribute the source code, even though third parties are not
|
|
|
|
|
compelled to copy the source along with the object code.
|
|
|
|
|
|
|
|
|
|
5. A program that contains no derivative of any portion of the
|
|
|
|
|
Library, but is designed to work with the Library by being compiled
|
|
|
|
|
or linked with it, is called a “work that uses the Library”. Such
|
|
|
|
|
a work, in isolation, is not a derivative work of the Library, and
|
|
|
|
|
therefore falls outside the scope of this License.
|
|
|
|
|
|
|
|
|
|
However, linking a “work that uses the Library” with the Library
|
|
|
|
|
creates an executable that is a derivative of the Library (because
|
|
|
|
|
it contains portions of the Library), rather than a “work that uses
|
|
|
|
|
the library”. The executable is therefore covered by this License.
|
|
|
|
|
Section 6 states terms for distribution of such executables.
|
|
|
|
|
|
|
|
|
|
When a “work that uses the Library” uses material from a header
|
|
|
|
|
file that is part of the Library, the object code for the work may
|
|
|
|
|
be a derivative work of the Library even though the source code is
|
|
|
|
|
not. Whether this is true is especially significant if the work
|
|
|
|
|
can be linked without the Library, or if the work is itself a
|
|
|
|
|
library. The threshold for this to be true is not precisely
|
|
|
|
|
defined by law.
|
|
|
|
|
|
|
|
|
|
If such an object file uses only numerical parameters, data
|
|
|
|
|
structure layouts and accessors, and small macros and small inline
|
|
|
|
|
functions (ten lines or less in length), then the use of the object
|
|
|
|
|
file is unrestricted, regardless of whether it is legally a
|
|
|
|
|
derivative work. (Executables containing this object code plus
|
|
|
|
|
portions of the Library will still fall under Section 6.)
|
|
|
|
|
|
|
|
|
|
Otherwise, if the work is a derivative of the Library, you may
|
|
|
|
|
distribute the object code for the work under the terms of Section
|
|
|
|
|
6. Any executables containing that work also fall under Section 6,
|
|
|
|
|
whether or not they are linked directly with the Library itself.
|
|
|
|
|
|
|
|
|
|
6. As an exception to the Sections above, you may also combine or link
|
|
|
|
|
a “work that uses the Library” with the Library to produce a work
|
|
|
|
|
containing portions of the Library, and distribute that work under
|
|
|
|
|
terms of your choice, provided that the terms permit modification
|
|
|
|
|
of the work for the customer’s own use and reverse engineering for
|
|
|
|
|
debugging such modifications.
|
|
|
|
|
|
|
|
|
|
You must give prominent notice with each copy of the work that the
|
|
|
|
|
Library is used in it and that the Library and its use are covered
|
|
|
|
|
by this License. You must supply a copy of this License. If the
|
|
|
|
|
work during execution displays copyright notices, you must include
|
|
|
|
|
the copyright notice for the Library among them, as well as a
|
|
|
|
|
reference directing the user to the copy of this License. Also,
|
|
|
|
|
you must do one of these things:
|
|
|
|
|
|
|
|
|
|
a. Accompany the work with the complete corresponding
|
|
|
|
|
machine-readable source code for the Library including
|
|
|
|
|
whatever changes were used in the work (which must be
|
|
|
|
|
distributed under Sections 1 and 2 above); and, if the work is
|
|
|
|
|
an executable linked with the Library, with the complete
|
|
|
|
|
machine-readable “work that uses the Library”, as object code
|
|
|
|
|
and/or source code, so that the user can modify the Library
|
|
|
|
|
and then relink to produce a modified executable containing
|
|
|
|
|
the modified Library. (It is understood that the user who
|
|
|
|
|
changes the contents of definitions files in the Library will
|
|
|
|
|
not necessarily be able to recompile the application to use
|
|
|
|
|
the modified definitions.)
|
|
|
|
|
|
|
|
|
|
b. Use a suitable shared library mechanism for linking with the
|
|
|
|
|
Library. A suitable mechanism is one that (1) uses at run
|
|
|
|
|
time a copy of the library already present on the user’s
|
|
|
|
|
computer system, rather than copying library functions into
|
|
|
|
|
the executable, and (2) will operate properly with a modified
|
|
|
|
|
version of the library, if the user installs one, as long as
|
|
|
|
|
the modified version is interface-compatible with the version
|
|
|
|
|
that the work was made with.
|
|
|
|
|
|
|
|
|
|
c. Accompany the work with a written offer, valid for at least
|
|
|
|
|
three years, to give the same user the materials specified in
|
|
|
|
|
Subsection 6a, above, for a charge no more than the cost of
|
|
|
|
|
performing this distribution.
|
|
|
|
|
|
|
|
|
|
d. If distribution of the work is made by offering access to copy
|
|
|
|
|
from a designated place, offer equivalent access to copy the
|
|
|
|
|
above specified materials from the same place.
|
|
|
|
|
|
|
|
|
|
e. Verify that the user has already received a copy of these
|
|
|
|
|
materials or that you have already sent this user a copy.
|
|
|
|
|
|
|
|
|
|
For an executable, the required form of the “work that uses the
|
|
|
|
|
Library” must include any data and utility programs needed for
|
|
|
|
|
reproducing the executable from it. However, as a special
|
|
|
|
|
exception, the materials to be distributed need not include
|
|
|
|
|
anything that is normally distributed (in either source or binary
|
|
|
|
|
form) with the major components (compiler, kernel, and so on) of
|
|
|
|
|
the operating system on which the executable runs, unless that
|
|
|
|
|
component itself accompanies the executable.
|
|
|
|
|
|
|
|
|
|
It may happen that this requirement contradicts the license
|
|
|
|
|
restrictions of other proprietary libraries that do not normally
|
|
|
|
|
accompany the operating system. Such a contradiction means you
|
|
|
|
|
cannot use both them and the Library together in an executable that
|
|
|
|
|
you distribute.
|
|
|
|
|
|
|
|
|
|
7. You may place library facilities that are a work based on the
|
|
|
|
|
Library side-by-side in a single library together with other
|
|
|
|
|
library facilities not covered by this License, and distribute such
|
|
|
|
|
a combined library, provided that the separate distribution of the
|
|
|
|
|
work based on the Library and of the other library facilities is
|
|
|
|
|
otherwise permitted, and provided that you do these two things:
|
|
|
|
|
|
|
|
|
|
a. Accompany the combined library with a copy of the same work
|
|
|
|
|
based on the Library, uncombined with any other library
|
|
|
|
|
facilities. This must be distributed under the terms of the
|
|
|
|
|
Sections above.
|
|
|
|
|
|
|
|
|
|
b. Give prominent notice with the combined library of the fact
|
|
|
|
|
that part of it is a work based on the Library, and explaining
|
|
|
|
|
where to find the accompanying uncombined form of the same
|
|
|
|
|
work.
|
|
|
|
|
|
|
|
|
|
8. You may not copy, modify, sublicense, link with, or distribute the
|
|
|
|
|
Library except as expressly provided under this License. Any
|
|
|
|
|
attempt otherwise to copy, modify, sublicense, link with, or
|
|
|
|
|
distribute the Library is void, and will automatically terminate
|
|
|
|
|
your rights under this License. However, parties who have received
|
|
|
|
|
copies, or rights, from you under this License will not have their
|
|
|
|
|
licenses terminated so long as such parties remain in full
|
|
|
|
|
compliance.
|
|
|
|
|
|
|
|
|
|
9. You are not required to accept this License, since you have not
|
|
|
|
|
signed it. However, nothing else grants you permission to modify
|
|
|
|
|
or distribute the Library or its derivative works. These actions
|
|
|
|
|
are prohibited by law if you do not accept this License.
|
|
|
|
|
Therefore, by modifying or distributing the Library (or any work
|
|
|
|
|
based on the Library), you indicate your acceptance of this License
|
|
|
|
|
to do so, and all its terms and conditions for copying,
|
|
|
|
|
distributing or modifying the Library or works based on it.
|
|
|
|
|
|
|
|
|
|
10. Each time you redistribute the Library (or any work based on the
|
|
|
|
|
Library), the recipient automatically receives a license from the
|
|
|
|
|
original licensor to copy, distribute, link with or modify the
|
|
|
|
|
Library subject to these terms and conditions. You may not impose
|
|
|
|
|
any further restrictions on the recipients’ exercise of the rights
|
|
|
|
|
granted herein. You are not responsible for enforcing compliance
|
|
|
|
|
by third parties with this License.
|
|
|
|
|
|
|
|
|
|
11. If, as a consequence of a court judgment or allegation of patent
|
|
|
|
|
infringement or for any other reason (not limited to patent
|
|
|
|
|
issues), conditions are imposed on you (whether by court order,
|
|
|
|
|
agreement or otherwise) that contradict the conditions of this
|
|
|
|
|
License, they do not excuse you from the conditions of this
|
|
|
|
|
License. If you cannot distribute so as to satisfy simultaneously
|
|
|
|
|
your obligations under this License and any other pertinent
|
|
|
|
|
obligations, then as a consequence you may not distribute the
|
|
|
|
|
Library at all. For example, if a patent license would not permit
|
|
|
|
|
royalty-free redistribution of the Library by all those who receive
|
|
|
|
|
copies directly or indirectly through you, then the only way you
|
|
|
|
|
could satisfy both it and this License would be to refrain entirely
|
|
|
|
|
from distribution of the Library.
|
|
|
|
|
|
|
|
|
|
If any portion of this section is held invalid or unenforceable
|
|
|
|
|
under any particular circumstance, the balance of the section is
|
|
|
|
|
intended to apply, and the section as a whole is intended to apply
|
|
|
|
|
in other circumstances.
|
|
|
|
|
|
|
|
|
|
It is not the purpose of this section to induce you to infringe any
|
|
|
|
|
patents or other property right claims or to contest validity of
|
|
|
|
|
any such claims; this section has the sole purpose of protecting
|
|
|
|
|
the integrity of the free software distribution system which is
|
|
|
|
|
implemented by public license practices. Many people have made
|
|
|
|
|
generous contributions to the wide range of software distributed
|
|
|
|
|
through that system in reliance on consistent application of that
|
|
|
|
|
system; it is up to the author/donor to decide if he or she is
|
|
|
|
|
willing to distribute software through any other system and a
|
|
|
|
|
licensee cannot impose that choice.
|
|
|
|
|
|
|
|
|
|
This section is intended to make thoroughly clear what is believed
|
|
|
|
|
to be a consequence of the rest of this License.
|
|
|
|
|
|
|
|
|
|
12. If the distribution and/or use of the Library is restricted in
|
|
|
|
|
certain countries either by patents or by copyrighted interfaces,
|
|
|
|
|
the original copyright holder who places the Library under this
|
|
|
|
|
License may add an explicit geographical distribution limitation
|
|
|
|
|
excluding those countries, so that distribution is permitted only
|
|
|
|
|
in or among countries not thus excluded. In such case, this
|
|
|
|
|
License incorporates the limitation as if written in the body of
|
|
|
|
|
this License.
|
|
|
|
|
|
|
|
|
|
13. The Free Software Foundation may publish revised and/or new
|
|
|
|
|
versions of the Lesser General Public License from time to time.
|
|
|
|
|
Such new versions will be similar in spirit to the present version,
|
|
|
|
|
but may differ in detail to address new problems or concerns.
|
|
|
|
|
|
|
|
|
|
Each version is given a distinguishing version number. If the
|
|
|
|
|
Library specifies a version number of this License which applies to
|
|
|
|
|
it and “any later version”, you have the option of following the
|
|
|
|
|
terms and conditions either of that version or of any later version
|
|
|
|
|
published by the Free Software Foundation. If the Library does not
|
|
|
|
|
specify a license version number, you may choose any version ever
|
|
|
|
|
published by the Free Software Foundation.
|
|
|
|
|
|
|
|
|
|
14. If you wish to incorporate parts of the Library into other free
|
|
|
|
|
programs whose distribution conditions are incompatible with these,
|
|
|
|
|
write to the author to ask for permission. For software which is
|
|
|
|
|
copyrighted by the Free Software Foundation, write to the Free
|
|
|
|
|
Software Foundation; we sometimes make exceptions for this. Our
|
|
|
|
|
decision will be guided by the two goals of preserving the free
|
|
|
|
|
status of all derivatives of our free software and of promoting the
|
|
|
|
|
sharing and reuse of software generally.
|
|
|
|
|
|
|
|
|
|
NO WARRANTY
|
|
|
|
|
|
|
|
|
|
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO
|
|
|
|
|
WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE
|
|
|
|
|
LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS
|
|
|
|
|
AND/OR OTHER PARTIES PROVIDE THE LIBRARY “AS IS” WITHOUT WARRANTY
|
|
|
|
|
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT
|
|
|
|
|
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
|
|
|
FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND
|
|
|
|
|
PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE
|
|
|
|
|
DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR
|
|
|
|
|
OR CORRECTION.
|
|
|
|
|
|
|
|
|
|
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
|
|
|
|
|
WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY
|
|
|
|
|
MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE
|
|
|
|
|
LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL,
|
|
|
|
|
INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
|
|
|
|
|
INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF
|
|
|
|
|
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU
|
|
|
|
|
OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY
|
|
|
|
|
OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN
|
|
|
|
|
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
|
|
|
|
|
|
|
|
|
|
END OF TERMS AND CONDITIONS
|
|
|
|
|
|
|
|
|
|
How to Apply These Terms to Your New Libraries
|
|
|
|
|
==============================================
|
|
|
|
|
|
|
|
|
|
If you develop a new library, and you want it to be of the greatest
|
|
|
|
|
possible use to the public, we recommend making it free software that
|
|
|
|
|
everyone can redistribute and change. You can do so by permitting
|
|
|
|
|
redistribution under these terms (or, alternatively, under the terms of
|
|
|
|
|
the ordinary General Public License).
|
|
|
|
|
|
|
|
|
|
To apply these terms, attach the following notices to the library.
|
|
|
|
|
It is safest to attach them to the start of each source file to most
|
|
|
|
|
effectively convey the exclusion of warranty; and each file should have
|
|
|
|
|
at least the “copyright” line and a pointer to where the full notice is
|
|
|
|
|
found.
|
|
|
|
|
|
|
|
|
|
ONE LINE TO GIVE THE LIBRARY'S NAME AND AN IDEA OF WHAT IT DOES.
|
|
|
|
|
Copyright (C) YEAR NAME OF AUTHOR
|
|
|
|
|
|
|
|
|
|
This library is free software; you can redistribute it and/or modify it
|
|
|
|
|
under the terms of the GNU Lesser General Public License as published by
|
|
|
|
|
the Free Software Foundation; either version 2.1 of the License, or (at
|
|
|
|
|
your option) any later version.
|
|
|
|
|
|
|
|
|
|
This library is distributed in the hope that it will be useful, but
|
|
|
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
|
Lesser General Public License for more details.
|
|
|
|
|
|
|
|
|
|
You should have received a copy of the GNU Lesser General Public
|
|
|
|
|
License along with this library; if not, write to the Free Software
|
|
|
|
|
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307,
|
|
|
|
|
USA.
|
|
|
|
|
|
|
|
|
|
Also add information on how to contact you by electronic and paper
|
|
|
|
|
mail.
|
|
|
|
|
|
|
|
|
|
You should also get your employer (if you work as a programmer) or
|
|
|
|
|
your school, if any, to sign a “copyright disclaimer” for the library,
|
|
|
|
|
if necessary. Here is a sample; alter the names:
|
|
|
|
|
|
|
|
|
|
Yoyodyne, Inc., hereby disclaims all copyright interest in the library
|
|
|
|
|
`Frob' (a library for tweaking knobs) written by James Random Hacker.
|
|
|
|
|
|
|
|
|
|
SIGNATURE OF TY COON, 1 April 1990
|
|
|
|
|
Ty Coon, President of Vice
|
|
|
|
|
|
|
|
|
|
That’s all there is to it!
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
File: gpgme.info, Node: Copying, Next: Concept Index, Prev: Library Copying, Up: Top
|
|
|
|
|
|
|
|
|
|
GNU General Public License
|
|
|
|
|
**************************
|
|
|
|
|
|
|
|
|
|
Version 3, 29 June 2007
|
|
|
|
|
|
|
|
|
|
Copyright © 2007 Free Software Foundation, Inc. <https://fsf.org/>
|
|
|
|
|
|
|
|
|
|
Everyone is permitted to copy and distribute verbatim copies of this
|
|
|
|
|
license document, but changing it is not allowed.
|
|
|
|
|
|
|
|
|
|
Preamble
|
|
|
|
|
========
|
|
|
|
|
|
|
|
|
|
The GNU General Public License is a free, copyleft license for software
|
|
|
|
|
and other kinds of works.
|
|
|
|
|
|
|
|
|
|
The licenses for most software and other practical works are designed
|
|
|
|
|
to take away your freedom to share and change the works. By contrast,
|
|
|
|
|
the GNU General Public License is intended to guarantee your freedom to
|
|
|
|
|
share and change all versions of a program–to make sure it remains free
|
|
|
|
|
software for all its users. We, the Free Software Foundation, use the
|
|
|
|
|
GNU General Public License for most of our software; it applies also to
|
|
|
|
|
any other work released this way by its authors. You can apply it to
|
|
|
|
|
your programs, too.
|
|
|
|
|
|
|
|
|
|
When we speak of free software, we are referring to freedom, not
|
|
|
|
|
price. Our General Public Licenses are designed to make sure that you
|
|
|
|
|
have the freedom to distribute copies of free software (and charge for
|
|
|
|
|
them if you wish), that you receive source code or can get it if you
|
|
|
|
|
want it, that you can change the software or use pieces of it in new
|
|
|
|
|
free programs, and that you know you can do these things.
|
|
|
|
|
|
|
|
|
|
To protect your rights, we need to prevent others from denying you
|
|
|
|
|
these rights or asking you to surrender the rights. Therefore, you have
|
|
|
|
|
certain responsibilities if you distribute copies of the software, or if
|
|
|
|
|
you modify it: responsibilities to respect the freedom of others.
|
|
|
|
|
|
|
|
|
|
For example, if you distribute copies of such a program, whether
|
|
|
|
|
gratis or for a fee, you must pass on to the recipients the same
|
|
|
|
|
freedoms that you received. You must make sure that they, too, receive
|
|
|
|
|
or can get the source code. And you must show them these terms so they
|
|
|
|
|
know their rights.
|
|
|
|
|
|
|
|
|
|
Developers that use the GNU GPL protect your rights with two steps:
|
|
|
|
|
(1) assert copyright on the software, and (2) offer you this License
|
|
|
|
|
giving you legal permission to copy, distribute and/or modify it.
|
|
|
|
|
|
|
|
|
|
For the developers’ and authors’ protection, the GPL clearly explains
|
|
|
|
|
that there is no warranty for this free software. For both users’ and
|
|
|
|
|
authors’ sake, the GPL requires that modified versions be marked as
|
|
|
|
|
changed, so that their problems will not be attributed erroneously to
|
|
|
|
|
authors of previous versions.
|
|
|
|
|
|
|
|
|
|
Some devices are designed to deny users access to install or run
|
|
|
|
|
modified versions of the software inside them, although the manufacturer
|
|
|
|
|
can do so. This is fundamentally incompatible with the aim of
|
|
|
|
|
protecting users’ freedom to change the software. The systematic
|
|
|
|
|
pattern of such abuse occurs in the area of products for individuals to
|
|
|
|
|
use, which is precisely where it is most unacceptable. Therefore, we
|
|
|
|
|
have designed this version of the GPL to prohibit the practice for those
|
|
|
|
|
products. If such problems arise substantially in other domains, we
|
|
|
|
|
stand ready to extend this provision to those domains in future versions
|
|
|
|
|
of the GPL, as needed to protect the freedom of users.
|
|
|
|
|
|
|
|
|
|
Finally, every program is threatened constantly by software patents.
|
|
|
|
|
States should not allow patents to restrict development and use of
|
|
|
|
|
software on general-purpose computers, but in those that do, we wish to
|
|
|
|
|
avoid the special danger that patents applied to a free program could
|
|
|
|
|
make it effectively proprietary. To prevent this, the GPL assures that
|
|
|
|
|
patents cannot be used to render the program non-free.
|
|
|
|
|
|
|
|
|
|
The precise terms and conditions for copying, distribution and
|
|
|
|
|
modification follow.
|
|
|
|
|
|
|
|
|
|
TERMS AND CONDITIONS
|
|
|
|
|
|
|
|
|
|
0. Definitions.
|
|
|
|
|
|
|
|
|
|
“This License” refers to version 3 of the GNU General Public
|
|
|
|
|
License.
|
|
|
|
|
|
|
|
|
|
“Copyright” also means copyright-like laws that apply to other
|
|
|
|
|
kinds of works, such as semiconductor masks.
|
|
|
|
|
|
|
|
|
|
“The Program” refers to any copyrightable work licensed under this
|
|
|
|
|
License. Each licensee is addressed as “you”. “Licensees” and
|
|
|
|
|
“recipients” may be individuals or organizations.
|
|
|
|
|
|
|
|
|
|
To “modify” a work means to copy from or adapt all or part of the
|
|
|
|
|
work in a fashion requiring copyright permission, other than the
|
|
|
|
|
making of an exact copy. The resulting work is called a “modified
|
|
|
|
|
version” of the earlier work or a work “based on” the earlier work.
|
|
|
|
|
|
|
|
|
|
A “covered work” means either the unmodified Program or a work
|
|
|
|
|
based on the Program.
|
|
|
|
|
|
|
|
|
|
To “propagate” a work means to do anything with it that, without
|
|
|
|
|
permission, would make you directly or secondarily liable for
|
|
|
|
|
infringement under applicable copyright law, except executing it on
|
|
|
|
|
a computer or modifying a private copy. Propagation includes
|
|
|
|
|
copying, distribution (with or without modification), making
|
|
|
|
|
available to the public, and in some countries other activities as
|
|
|
|
|
well.
|
|
|
|
|
|
|
|
|
|
To “convey” a work means any kind of propagation that enables other
|
|
|
|
|
parties to make or receive copies. Mere interaction with a user
|
|
|
|
|
through a computer network, with no transfer of a copy, is not
|
|
|
|
|
conveying.
|
|
|
|
|
|
|
|
|
|
An interactive user interface displays “Appropriate Legal Notices”
|
|
|
|
|
to the extent that it includes a convenient and prominently visible
|
|
|
|
|
feature that (1) displays an appropriate copyright notice, and (2)
|
|
|
|
|
tells the user that there is no warranty for the work (except to
|
|
|
|
|
the extent that warranties are provided), that licensees may convey
|
|
|
|
|
the work under this License, and how to view a copy of this
|
|
|
|
|
License. If the interface presents a list of user commands or
|
|
|
|
|
options, such as a menu, a prominent item in the list meets this
|
|
|
|
|
criterion.
|
|
|
|
|
|
|
|
|
|
1. Source Code.
|
|
|
|
|
|
|
|
|
|
The “source code” for a work means the preferred form of the work
|
|
|
|
|
for making modifications to it. “Object code” means any non-source
|
|
|
|
|
form of a work.
|
|
|
|
|
|
|
|
|
|
A “Standard Interface” means an interface that either is an
|
|
|
|
|
official standard defined by a recognized standards body, or, in
|
|
|
|
|
the case of interfaces specified for a particular programming
|
|
|
|
|
language, one that is widely used among developers working in that
|
|
|
|
|
language.
|
|
|
|
|
|
|
|
|
|
The “System Libraries” of an executable work include anything,
|
|
|
|
|
other than the work as a whole, that (a) is included in the normal
|
|
|
|
|
form of packaging a Major Component, but which is not part of that
|
|
|
|
|
Major Component, and (b) serves only to enable use of the work with
|
|
|
|
|
that Major Component, or to implement a Standard Interface for
|
|
|
|
|
which an implementation is available to the public in source code
|
|
|
|
|
form. A “Major Component”, in this context, means a major
|
|
|
|
|
essential component (kernel, window system, and so on) of the
|
|
|
|
|
specific operating system (if any) on which the executable work
|
|
|
|
|
runs, or a compiler used to produce the work, or an object code
|
|
|
|
|
interpreter used to run it.
|
|
|
|
|
|
|
|
|
|
The “Corresponding Source” for a work in object code form means all
|
|
|
|
|
the source code needed to generate, install, and (for an executable
|
|
|
|
|
work) run the object code and to modify the work, including scripts
|
|
|
|
|
to control those activities. However, it does not include the
|
|
|
|
|
work’s System Libraries, or general-purpose tools or generally
|
|
|
|
|
available free programs which are used unmodified in performing
|
|
|
|
|
those activities but which are not part of the work. For example,
|
|
|
|
|
Corresponding Source includes interface definition files associated
|
|
|
|
|
with source files for the work, and the source code for shared
|
|
|
|
|
libraries and dynamically linked subprograms that the work is
|
|
|
|
|
specifically designed to require, such as by intimate data
|
|
|
|
|
communication or control flow between those subprograms and other
|
|
|
|
|
parts of the work.
|
|
|
|
|
|
|
|
|
|
The Corresponding Source need not include anything that users can
|
|
|
|
|
regenerate automatically from other parts of the Corresponding
|
|
|
|
|
Source.
|
|
|
|
|
|
|
|
|
|
The Corresponding Source for a work in source code form is that
|
|
|
|
|
same work.
|
|
|
|
|
|
|
|
|
|
2. Basic Permissions.
|
|
|
|
|
|
|
|
|
|
All rights granted under this License are granted for the term of
|
|
|
|
|
copyright on the Program, and are irrevocable provided the stated
|
|
|
|
|
conditions are met. This License explicitly affirms your unlimited
|
|
|
|
|
permission to run the unmodified Program. The output from running
|
|
|
|
|
a covered work is covered by this License only if the output, given
|
|
|
|
|
its content, constitutes a covered work. This License acknowledges
|
|
|
|
|
your rights of fair use or other equivalent, as provided by
|
|
|
|
|
copyright law.
|
|
|
|
|
|
|
|
|
|
You may make, run and propagate covered works that you do not
|
|
|
|
|
convey, without conditions so long as your license otherwise
|
|
|
|
|
remains in force. You may convey covered works to others for the
|
|
|
|
|
sole purpose of having them make modifications exclusively for you,
|
|
|
|
|
or provide you with facilities for running those works, provided
|
|
|
|
|
that you comply with the terms of this License in conveying all
|
|
|
|
|
material for which you do not control copyright. Those thus making
|
|
|
|
|
or running the covered works for you must do so exclusively on your
|
|
|
|
|
behalf, under your direction and control, on terms that prohibit
|
|
|
|
|
them from making any copies of your copyrighted material outside
|
|
|
|
|
their relationship with you.
|
|
|
|
|
|
|
|
|
|
Conveying under any other circumstances is permitted solely under
|
|
|
|
|
the conditions stated below. Sublicensing is not allowed; section
|
|
|
|
|
10 makes it unnecessary.
|
|
|
|
|
|
|
|
|
|
3. Protecting Users’ Legal Rights From Anti-Circumvention Law.
|
|
|
|
|
|
|
|
|
|
No covered work shall be deemed part of an effective technological
|
|
|
|
|
measure under any applicable law fulfilling obligations under
|
|
|
|
|
article 11 of the WIPO copyright treaty adopted on 20 December
|
|
|
|
|
1996, or similar laws prohibiting or restricting circumvention of
|
|
|
|
|
such measures.
|
|
|
|
|
|
|
|
|
|
When you convey a covered work, you waive any legal power to forbid
|
|
|
|
|
circumvention of technological measures to the extent such
|
|
|
|
|
circumvention is effected by exercising rights under this License
|
|
|
|
|
with respect to the covered work, and you disclaim any intention to
|
|
|
|
|
limit operation or modification of the work as a means of
|
|
|
|
|
enforcing, against the work’s users, your or third parties’ legal
|
|
|
|
|
rights to forbid circumvention of technological measures.
|
|
|
|
|
|
|
|
|
|
4. Conveying Verbatim Copies.
|
|
|
|
|
|
|
|
|
|
You may convey verbatim copies of the Program’s source code as you
|
|
|
|
|
receive it, in any medium, provided that you conspicuously and
|
|
|
|
|
appropriately publish on each copy an appropriate copyright notice;
|
|
|
|
|
keep intact all notices stating that this License and any
|
|
|
|
|
non-permissive terms added in accord with section 7 apply to the
|
|
|
|
|
code; keep intact all notices of the absence of any warranty; and
|
|
|
|
|
give all recipients a copy of this License along with the Program.
|
|
|
|
|
|
|
|
|
|
You may charge any price or no price for each copy that you convey,
|
|
|
|
|
and you may offer support or warranty protection for a fee.
|
|
|
|
|
|
|
|
|
|
5. Conveying Modified Source Versions.
|
|
|
|
|
|
|
|
|
|
You may convey a work based on the Program, or the modifications to
|
|
|
|
|
produce it from the Program, in the form of source code under the
|
|
|
|
|
terms of section 4, provided that you also meet all of these
|
|
|
|
|
conditions:
|
|
|
|
|
|
|
|
|
|
a. The work must carry prominent notices stating that you
|
|
|
|
|
modified it, and giving a relevant date.
|
|
|
|
|
|
|
|
|
|
b. The work must carry prominent notices stating that it is
|
|
|
|
|
released under this License and any conditions added under
|
|
|
|
|
section 7. This requirement modifies the requirement in
|
|
|
|
|
section 4 to “keep intact all notices”.
|
|
|
|
|
|
|
|
|
|
c. You must license the entire work, as a whole, under this
|
|
|
|
|
License to anyone who comes into possession of a copy. This
|
|
|
|
|
License will therefore apply, along with any applicable
|
|
|
|
|
section 7 additional terms, to the whole of the work, and all
|
|
|
|
|
its parts, regardless of how they are packaged. This License
|
|
|
|
|
gives no permission to license the work in any other way, but
|
|
|
|
|
it does not invalidate such permission if you have separately
|
|
|
|
|
received it.
|
|
|
|
|
|
|
|
|
|
d. If the work has interactive user interfaces, each must display
|
|
|
|
|
Appropriate Legal Notices; however, if the Program has
|
|
|
|
|
interactive interfaces that do not display Appropriate Legal
|
|
|
|
|
Notices, your work need not make them do so.
|
|
|
|
|
|
|
|
|
|
A compilation of a covered work with other separate and independent
|
|
|
|
|
works, which are not by their nature extensions of the covered
|
|
|
|
|
work, and which are not combined with it such as to form a larger
|
|
|
|
|
program, in or on a volume of a storage or distribution medium, is
|
|
|
|
|
called an “aggregate” if the compilation and its resulting
|
|
|
|
|
copyright are not used to limit the access or legal rights of the
|
|
|
|
|
compilation’s users beyond what the individual works permit.
|
|
|
|
|
Inclusion of a covered work in an aggregate does not cause this
|
|
|
|
|
License to apply to the other parts of the aggregate.
|
|
|
|
|
|
|
|
|
|
6. Conveying Non-Source Forms.
|
|
|
|
|
|
|
|
|
|
You may convey a covered work in object code form under the terms
|
|
|
|
|
of sections 4 and 5, provided that you also convey the
|
|
|
|
|
machine-readable Corresponding Source under the terms of this
|
|
|
|
|
License, in one of these ways:
|
|
|
|
|
|
|
|
|
|
a. Convey the object code in, or embodied in, a physical product
|
|
|
|
|
(including a physical distribution medium), accompanied by the
|
|
|
|
|
Corresponding Source fixed on a durable physical medium
|
|
|
|
|
customarily used for software interchange.
|
|
|
|
|
|
|
|
|
|
b. Convey the object code in, or embodied in, a physical product
|
|
|
|
|
(including a physical distribution medium), accompanied by a
|
|
|
|
|
written offer, valid for at least three years and valid for as
|
|
|
|
|
long as you offer spare parts or customer support for that
|
|
|
|
|
product model, to give anyone who possesses the object code
|
|
|
|
|
either (1) a copy of the Corresponding Source for all the
|
|
|
|
|
software in the product that is covered by this License, on a
|
|
|
|
|
durable physical medium customarily used for software
|
|
|
|
|
interchange, for a price no more than your reasonable cost of
|
|
|
|
|
physically performing this conveying of source, or (2) access
|
|
|
|
|
to copy the Corresponding Source from a network server at no
|
|
|
|
|
charge.
|
|
|
|
|
|
|
|
|
|
c. Convey individual copies of the object code with a copy of the
|
|
|
|
|
written offer to provide the Corresponding Source. This
|
|
|
|
|
alternative is allowed only occasionally and noncommercially,
|
|
|
|
|
and only if you received the object code with such an offer,
|
|
|
|
|
in accord with subsection 6b.
|
|
|
|
|
|
|
|
|
|
d. Convey the object code by offering access from a designated
|
|
|
|
|
place (gratis or for a charge), and offer equivalent access to
|
|
|
|
|
the Corresponding Source in the same way through the same
|
|
|
|
|
place at no further charge. You need not require recipients
|
|
|
|
|
to copy the Corresponding Source along with the object code.
|
|
|
|
|
If the place to copy the object code is a network server, the
|
|
|
|
|
Corresponding Source may be on a different server (operated by
|
|
|
|
|
you or a third party) that supports equivalent copying
|
|
|
|
|
facilities, provided you maintain clear directions next to the
|
|
|
|
|
object code saying where to find the Corresponding Source.
|
|
|
|
|
Regardless of what server hosts the Corresponding Source, you
|
|
|
|
|
remain obligated to ensure that it is available for as long as
|
|
|
|
|
needed to satisfy these requirements.
|
|
|
|
|
|
|
|
|
|
e. Convey the object code using peer-to-peer transmission,
|
|
|
|
|
provided you inform other peers where the object code and
|
|
|
|
|
Corresponding Source of the work are being offered to the
|
|
|
|
|
general public at no charge under subsection 6d.
|
|
|
|
|
|
|
|
|
|
A separable portion of the object code, whose source code is
|
|
|
|
|
excluded from the Corresponding Source as a System Library, need
|
|
|
|
|
not be included in conveying the object code work.
|
|
|
|
|
|
|
|
|
|
A “User Product” is either (1) a “consumer product”, which means
|
|
|
|
|
any tangible personal property which is normally used for personal,
|
|
|
|
|
family, or household purposes, or (2) anything designed or sold for
|
|
|
|
|
incorporation into a dwelling. In determining whether a product is
|
|
|
|
|
a consumer product, doubtful cases shall be resolved in favor of
|
|
|
|
|
coverage. For a particular product received by a particular user,
|
|
|
|
|
“normally used” refers to a typical or common use of that class of
|
|
|
|
|
product, regardless of the status of the particular user or of the
|
|
|
|
|
way in which the particular user actually uses, or expects or is
|
|
|
|
|
expected to use, the product. A product is a consumer product
|
|
|
|
|
regardless of whether the product has substantial commercial,
|
|
|
|
|
industrial or non-consumer uses, unless such uses represent the
|
|
|
|
|
only significant mode of use of the product.
|
|
|
|
|
|
|
|
|
|
“Installation Information” for a User Product means any methods,
|
|
|
|
|
procedures, authorization keys, or other information required to
|
|
|
|
|
install and execute modified versions of a covered work in that
|
|
|
|
|
User Product from a modified version of its Corresponding Source.
|
|
|
|
|
The information must suffice to ensure that the continued
|
|
|
|
|
functioning of the modified object code is in no case prevented or
|
|
|
|
|
interfered with solely because modification has been made.
|
|
|
|
|
|
|
|
|
|
If you convey an object code work under this section in, or with,
|
|
|
|
|
or specifically for use in, a User Product, and the conveying
|
|
|
|
|
occurs as part of a transaction in which the right of possession
|
|
|
|
|
and use of the User Product is transferred to the recipient in
|
|
|
|
|
perpetuity or for a fixed term (regardless of how the transaction
|
|
|
|
|
is characterized), the Corresponding Source conveyed under this
|
|
|
|
|
section must be accompanied by the Installation Information. But
|
|
|
|
|
this requirement does not apply if neither you nor any third party
|
|
|
|
|
retains the ability to install modified object code on the User
|
|
|
|
|
Product (for example, the work has been installed in ROM).
|
|
|
|
|
|
|
|
|
|
The requirement to provide Installation Information does not
|
|
|
|
|
include a requirement to continue to provide support service,
|
|
|
|
|
warranty, or updates for a work that has been modified or installed
|
|
|
|
|
by the recipient, or for the User Product in which it has been
|
|
|
|
|
modified or installed. Access to a network may be denied when the
|
|
|
|
|
modification itself materially and adversely affects the operation
|
|
|
|
|
of the network or violates the rules and protocols for
|
|
|
|
|
communication across the network.
|
|
|
|
|
|
|
|
|
|
Corresponding Source conveyed, and Installation Information
|
|
|
|
|
provided, in accord with this section must be in a format that is
|
|
|
|
|
publicly documented (and with an implementation available to the
|
|
|
|
|
public in source code form), and must require no special password
|
|
|
|
|
or key for unpacking, reading or copying.
|
|
|
|
|
|
|
|
|
|
7. Additional Terms.
|
|
|
|
|
|
|
|
|
|
“Additional permissions” are terms that supplement the terms of
|
|
|
|
|
this License by making exceptions from one or more of its
|
|
|
|
|
conditions. Additional permissions that are applicable to the
|
|
|
|
|
entire Program shall be treated as though they were included in
|
|
|
|
|
this License, to the extent that they are valid under applicable
|
|
|
|
|
law. If additional permissions apply only to part of the Program,
|
|
|
|
|
that part may be used separately under those permissions, but the
|
|
|
|
|
entire Program remains governed by this License without regard to
|
|
|
|
|
the additional permissions.
|
|
|
|
|
|
|
|
|
|
When you convey a copy of a covered work, you may at your option
|
|
|
|
|
remove any additional permissions from that copy, or from any part
|
|
|
|
|
of it. (Additional permissions may be written to require their own
|
|
|
|
|
removal in certain cases when you modify the work.) You may place
|
|
|
|
|
additional permissions on material, added by you to a covered work,
|
|
|
|
|
for which you have or can give appropriate copyright permission.
|
|
|
|
|
|
|
|
|
|
Notwithstanding any other provision of this License, for material
|
|
|
|
|
you add to a covered work, you may (if authorized by the copyright
|
|
|
|
|
holders of that material) supplement the terms of this License with
|
|
|
|
|
terms:
|
|
|
|
|
|
|
|
|
|
a. Disclaiming warranty or limiting liability differently from
|
|
|
|
|
the terms of sections 15 and 16 of this License; or
|
|
|
|
|
|
|
|
|
|
b. Requiring preservation of specified reasonable legal notices
|
|
|
|
|
or author attributions in that material or in the Appropriate
|
|
|
|
|
Legal Notices displayed by works containing it; or
|
|
|
|
|
|
|
|
|
|
c. Prohibiting misrepresentation of the origin of that material,
|
|
|
|
|
or requiring that modified versions of such material be marked
|
|
|
|
|
in reasonable ways as different from the original version; or
|
|
|
|
|
|
|
|
|
|
d. Limiting the use for publicity purposes of names of licensors
|
|
|
|
|
or authors of the material; or
|
|
|
|
|
|
|
|
|
|
e. Declining to grant rights under trademark law for use of some
|
|
|
|
|
trade names, trademarks, or service marks; or
|
|
|
|
|
|
|
|
|
|
f. Requiring indemnification of licensors and authors of that
|
|
|
|
|
material by anyone who conveys the material (or modified
|
|
|
|
|
versions of it) with contractual assumptions of liability to
|
|
|
|
|
the recipient, for any liability that these contractual
|
|
|
|
|
assumptions directly impose on those licensors and authors.
|
|
|
|
|
|
|
|
|
|
All other non-permissive additional terms are considered “further
|
|
|
|
|
restrictions” within the meaning of section 10. If the Program as
|
|
|
|
|
you received it, or any part of it, contains a notice stating that
|
|
|
|
|
it is governed by this License along with a term that is a further
|
|
|
|
|
restriction, you may remove that term. If a license document
|
|
|
|
|
contains a further restriction but permits relicensing or conveying
|
|
|
|
|
under this License, you may add to a covered work material governed
|
|
|
|
|
by the terms of that license document, provided that the further
|
|
|
|
|
restriction does not survive such relicensing or conveying.
|
|
|
|
|
|
|
|
|
|
If you add terms to a covered work in accord with this section, you
|
|
|
|
|
must place, in the relevant source files, a statement of the
|
|
|
|
|
additional terms that apply to those files, or a notice indicating
|
|
|
|
|
where to find the applicable terms.
|
|
|
|
|
|
|
|
|
|
Additional terms, permissive or non-permissive, may be stated in
|
|
|
|
|
the form of a separately written license, or stated as exceptions;
|
|
|
|
|
the above requirements apply either way.
|
|
|
|
|
|
|
|
|
|
8. Termination.
|
|
|
|
|
|
|
|
|
|
You may not propagate or modify a covered work except as expressly
|
|
|
|
|
provided under this License. Any attempt otherwise to propagate or
|
|
|
|
|
modify it is void, and will automatically terminate your rights
|
|
|
|
|
under this License (including any patent licenses granted under the
|
|
|
|
|
third paragraph of section 11).
|
|
|
|
|
|
|
|
|
|
However, if you cease all violation of this License, then your
|
|
|
|
|
license from a particular copyright holder is reinstated (a)
|
|
|
|
|
provisionally, unless and until the copyright holder explicitly and
|
|
|
|
|
finally terminates your license, and (b) permanently, if the
|
|
|
|
|
copyright holder fails to notify you of the violation by some
|
|
|
|
|
reasonable means prior to 60 days after the cessation.
|
|
|
|
|
|
|
|
|
|
Moreover, your license from a particular copyright holder is
|
|
|
|
|
reinstated permanently if the copyright holder notifies you of the
|
|
|
|
|
violation by some reasonable means, this is the first time you have
|
|
|
|
|
received notice of violation of this License (for any work) from
|
|
|
|
|
that copyright holder, and you cure the violation prior to 30 days
|
|
|
|
|
after your receipt of the notice.
|
|
|
|
|
|
|
|
|
|
Termination of your rights under this section does not terminate
|
|
|
|
|
the licenses of parties who have received copies or rights from you
|
|
|
|
|
under this License. If your rights have been terminated and not
|
|
|
|
|
permanently reinstated, you do not qualify to receive new licenses
|
|
|
|
|
for the same material under section 10.
|
|
|
|
|
|
|
|
|
|
9. Acceptance Not Required for Having Copies.
|
|
|
|
|
|
|
|
|
|
You are not required to accept this License in order to receive or
|
|
|
|
|
run a copy of the Program. Ancillary propagation of a covered work
|
|
|
|
|
occurring solely as a consequence of using peer-to-peer
|
|
|
|
|
transmission to receive a copy likewise does not require
|
|
|
|
|
acceptance. However, nothing other than this License grants you
|
|
|
|
|
permission to propagate or modify any covered work. These actions
|
|
|
|
|
infringe copyright if you do not accept this License. Therefore,
|
|
|
|
|
by modifying or propagating a covered work, you indicate your
|
|
|
|
|
acceptance of this License to do so.
|
|
|
|
|
|
|
|
|
|
10. Automatic Licensing of Downstream Recipients.
|
|
|
|
|
|
|
|
|
|
Each time you convey a covered work, the recipient automatically
|
|
|
|
|
receives a license from the original licensors, to run, modify and
|
|
|
|
|
propagate that work, subject to this License. You are not
|
|
|
|
|
responsible for enforcing compliance by third parties with this
|
|
|
|
|
License.
|
|
|
|
|
|
|
|
|
|
An “entity transaction” is a transaction transferring control of an
|
|
|
|
|
organization, or substantially all assets of one, or subdividing an
|
|
|
|
|
organization, or merging organizations. If propagation of a
|
|
|
|
|
covered work results from an entity transaction, each party to that
|
|
|
|
|
transaction who receives a copy of the work also receives whatever
|
|
|
|
|
licenses to the work the party’s predecessor in interest had or
|
|
|
|
|
could give under the previous paragraph, plus a right to possession
|
|
|
|
|
of the Corresponding Source of the work from the predecessor in
|
|
|
|
|
interest, if the predecessor has it or can get it with reasonable
|
|
|
|
|
efforts.
|
|
|
|
|
|
|
|
|
|
You may not impose any further restrictions on the exercise of the
|
|
|
|
|
rights granted or affirmed under this License. For example, you
|
|
|
|
|
may not impose a license fee, royalty, or other charge for exercise
|
|
|
|
|
of rights granted under this License, and you may not initiate
|
|
|
|
|
litigation (including a cross-claim or counterclaim in a lawsuit)
|
|
|
|
|
alleging that any patent claim is infringed by making, using,
|
|
|
|
|
selling, offering for sale, or importing the Program or any portion
|
|
|
|
|
of it.
|
|
|
|
|
|
|
|
|
|
11. Patents.
|
|
|
|
|
|
|
|
|
|
A “contributor” is a copyright holder who authorizes use under this
|
|
|
|
|
License of the Program or a work on which the Program is based.
|
|
|
|
|
The work thus licensed is called the contributor’s “contributor
|
|
|
|
|
version”.
|
|
|
|
|
|
|
|
|
|
A contributor’s “essential patent claims” are all patent claims
|
|
|
|
|
owned or controlled by the contributor, whether already acquired or
|
|
|
|
|
hereafter acquired, that would be infringed by some manner,
|
|
|
|
|
permitted by this License, of making, using, or selling its
|
|
|
|
|
contributor version, but do not include claims that would be
|
|
|
|
|
infringed only as a consequence of further modification of the
|
|
|
|
|
contributor version. For purposes of this definition, “control”
|
|
|
|
|
includes the right to grant patent sublicenses in a manner
|
|
|
|
|
consistent with the requirements of this License.
|
|
|
|
|
|
|
|
|
|
Each contributor grants you a non-exclusive, worldwide,
|
|
|
|
|
royalty-free patent license under the contributor’s essential
|
|
|
|
|
patent claims, to make, use, sell, offer for sale, import and
|
|
|
|
|
otherwise run, modify and propagate the contents of its contributor
|
|
|
|
|
version.
|
|
|
|
|
|
|
|
|
|
In the following three paragraphs, a “patent license” is any
|
|
|
|
|
express agreement or commitment, however denominated, not to
|
|
|
|
|
enforce a patent (such as an express permission to practice a
|
|
|
|
|
patent or covenant not to sue for patent infringement). To “grant”
|
|
|
|
|
such a patent license to a party means to make such an agreement or
|
|
|
|
|
commitment not to enforce a patent against the party.
|
|
|
|
|
|
|
|
|
|
If you convey a covered work, knowingly relying on a patent
|
|
|
|
|
license, and the Corresponding Source of the work is not available
|
|
|
|
|
for anyone to copy, free of charge and under the terms of this
|
|
|
|
|
License, through a publicly available network server or other
|
|
|
|
|
readily accessible means, then you must either (1) cause the
|
|
|
|
|
Corresponding Source to be so available, or (2) arrange to deprive
|
|
|
|
|
yourself of the benefit of the patent license for this particular
|
|
|
|
|
work, or (3) arrange, in a manner consistent with the requirements
|
|
|
|
|
of this License, to extend the patent license to downstream
|
|
|
|
|
recipients. “Knowingly relying” means you have actual knowledge
|
|
|
|
|
that, but for the patent license, your conveying the covered work
|
|
|
|
|
in a country, or your recipient’s use of the covered work in a
|
|
|
|
|
country, would infringe one or more identifiable patents in that
|
|
|
|
|
country that you have reason to believe are valid.
|
|
|
|
|
|
|
|
|
|
If, pursuant to or in connection with a single transaction or
|
|
|
|
|
arrangement, you convey, or propagate by procuring conveyance of, a
|
|
|
|
|
covered work, and grant a patent license to some of the parties
|
|
|
|
|
receiving the covered work authorizing them to use, propagate,
|
|
|
|
|
modify or convey a specific copy of the covered work, then the
|
|
|
|
|
patent license you grant is automatically extended to all
|
|
|
|
|
recipients of the covered work and works based on it.
|
|
|
|
|
|
|
|
|
|
A patent license is “discriminatory” if it does not include within
|
|
|
|
|
the scope of its coverage, prohibits the exercise of, or is
|
|
|
|
|
conditioned on the non-exercise of one or more of the rights that
|
|
|
|
|
are specifically granted under this License. You may not convey a
|
|
|
|
|
covered work if you are a party to an arrangement with a third
|
|
|
|
|
party that is in the business of distributing software, under which
|
|
|
|
|
you make payment to the third party based on the extent of your
|
|
|
|
|
activity of conveying the work, and under which the third party
|
|
|
|
|
grants, to any of the parties who would receive the covered work
|
|
|
|
|
from you, a discriminatory patent license (a) in connection with
|
|
|
|
|
copies of the covered work conveyed by you (or copies made from
|
|
|
|
|
those copies), or (b) primarily for and in connection with specific
|
|
|
|
|
products or compilations that contain the covered work, unless you
|
|
|
|
|
entered into that arrangement, or that patent license was granted,
|
|
|
|
|
prior to 28 March 2007.
|
|
|
|
|
|
|
|
|
|
Nothing in this License shall be construed as excluding or limiting
|
|
|
|
|
any implied license or other defenses to infringement that may
|
|
|
|
|
otherwise be available to you under applicable patent law.
|
|
|
|
|
|
|
|
|
|
12. No Surrender of Others’ Freedom.
|
|
|
|
|
|
|
|
|
|
If conditions are imposed on you (whether by court order, agreement
|
|
|
|
|
or otherwise) that contradict the conditions of this License, they
|
|
|
|
|
do not excuse you from the conditions of this License. If you
|
|
|
|
|
cannot convey a covered work so as to satisfy simultaneously your
|
|
|
|
|
obligations under this License and any other pertinent obligations,
|
|
|
|
|
then as a consequence you may not convey it at all. For example,
|
|
|
|
|
if you agree to terms that obligate you to collect a royalty for
|
|
|
|
|
further conveying from those to whom you convey the Program, the
|
|
|
|
|
only way you could satisfy both those terms and this License would
|
|
|
|
|
be to refrain entirely from conveying the Program.
|
|
|
|
|
|
|
|
|
|
13. Use with the GNU Affero General Public License.
|
|
|
|
|
|
|
|
|
|
Notwithstanding any other provision of this License, you have
|
|
|
|
|
permission to link or combine any covered work with a work licensed
|
|
|
|
|
under version 3 of the GNU Affero General Public License into a
|
|
|
|
|
single combined work, and to convey the resulting work. The terms
|
|
|
|
|
of this License will continue to apply to the part which is the
|
|
|
|
|
covered work, but the special requirements of the GNU Affero
|
|
|
|
|
General Public License, section 13, concerning interaction through
|
|
|
|
|
a network will apply to the combination as such.
|
|
|
|
|
|
|
|
|
|
14. Revised Versions of this License.
|
|
|
|
|
|
|
|
|
|
The Free Software Foundation may publish revised and/or new
|
|
|
|
|
versions of the GNU General Public License from time to time. Such
|
|
|
|
|
new versions will be similar in spirit to the present version, but
|
|
|
|
|
may differ in detail to address new problems or concerns.
|
|
|
|
|
|
|
|
|
|
Each version is given a distinguishing version number. If the
|
|
|
|
|
Program specifies that a certain numbered version of the GNU
|
|
|
|
|
General Public License “or any later version” applies to it, you
|
|
|
|
|
have the option of following the terms and conditions either of
|
|
|
|
|
that numbered version or of any later version published by the Free
|
|
|
|
|
Software Foundation. If the Program does not specify a version
|
|
|
|
|
number of the GNU General Public License, you may choose any
|
|
|
|
|
version ever published by the Free Software Foundation.
|
|
|
|
|
|
|
|
|
|
If the Program specifies that a proxy can decide which future
|
|
|
|
|
versions of the GNU General Public License can be used, that
|
|
|
|
|
proxy’s public statement of acceptance of a version permanently
|
|
|
|
|
authorizes you to choose that version for the Program.
|
|
|
|
|
|
|
|
|
|
Later license versions may give you additional or different
|
|
|
|
|
permissions. However, no additional obligations are imposed on any
|
|
|
|
|
author or copyright holder as a result of your choosing to follow a
|
|
|
|
|
later version.
|
|
|
|
|
|
|
|
|
|
15. Disclaimer of Warranty.
|
|
|
|
|
|
|
|
|
|
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
|
|
|
|
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE
|
|
|
|
|
COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS”
|
|
|
|
|
WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
|
|
|
|
|
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
|
|
|
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE
|
|
|
|
|
RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.
|
|
|
|
|
SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL
|
|
|
|
|
NECESSARY SERVICING, REPAIR OR CORRECTION.
|
|
|
|
|
|
|
|
|
|
16. Limitation of Liability.
|
|
|
|
|
|
|
|
|
|
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
|
|
|
|
|
WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES
|
|
|
|
|
AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR
|
|
|
|
|
DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
|
|
|
|
|
CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE
|
|
|
|
|
THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA
|
|
|
|
|
BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
|
|
|
|
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
|
|
|
|
|
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF
|
|
|
|
|
THE POSSIBILITY OF SUCH DAMAGES.
|
|
|
|
|
|
|
|
|
|
17. Interpretation of Sections 15 and 16.
|
|
|
|
|
|
|
|
|
|
If the disclaimer of warranty and limitation of liability provided
|
|
|
|
|
above cannot be given local legal effect according to their terms,
|
|
|
|
|
reviewing courts shall apply local law that most closely
|
|
|
|
|
approximates an absolute waiver of all civil liability in
|
|
|
|
|
connection with the Program, unless a warranty or assumption of
|
|
|
|
|
liability accompanies a copy of the Program in return for a fee.
|
|
|
|
|
|
|
|
|
|
END OF TERMS AND CONDITIONS
|
|
|
|
|
|
|
|
|
|
How to Apply These Terms to Your New Programs
|
|
|
|
|
=============================================
|
|
|
|
|
|
|
|
|
|
If you develop a new program, and you want it to be of the greatest
|
|
|
|
|
possible use to the public, the best way to achieve this is to make it
|
|
|
|
|
free software which everyone can redistribute and change under these
|
|
|
|
|
terms.
|
|
|
|
|
|
|
|
|
|
To do so, attach the following notices to the program. It is safest
|
|
|
|
|
to attach them to the start of each source file to most effectively
|
|
|
|
|
state the exclusion of warranty; and each file should have at least the
|
|
|
|
|
“copyright” line and a pointer to where the full notice is found.
|
|
|
|
|
|
|
|
|
|
ONE LINE TO GIVE THE PROGRAM'S NAME AND A BRIEF IDEA OF WHAT IT DOES.
|
|
|
|
|
Copyright (C) YEAR NAME OF AUTHOR
|
|
|
|
|
|
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
|
the Free Software Foundation, either version 3 of the License, or (at
|
|
|
|
|
your option) any later version.
|
|
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful, but
|
|
|
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
|
General Public License for more details.
|
|
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
|
along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
|
|
Also add information on how to contact you by electronic and paper mail.
|
|
|
|
|
|
|
|
|
|
If the program does terminal interaction, make it output a short notice
|
|
|
|
|
like this when it starts in an interactive mode:
|
|
|
|
|
|
|
|
|
|
PROGRAM Copyright (C) YEAR NAME OF AUTHOR
|
|
|
|
|
This program comes with ABSOLUTELY NO WARRANTY; for details
|
|
|
|
|
type ‘show w’. This is free software, and you are
|
|
|
|
|
welcome to redistribute it under certain conditions;
|
|
|
|
|
type ‘show c’ for details.
|
|
|
|
|
|
|
|
|
|
The hypothetical commands ‘show w’ and ‘show c’ should show the
|
|
|
|
|
appropriate parts of the General Public License. Of course, your
|
|
|
|
|
program’s commands might be different; for a GUI interface, you would
|
|
|
|
|
use an “about box”.
|
|
|
|
|
|
|
|
|
|
You should also get your employer (if you work as a programmer) or
|
|
|
|
|
school, if any, to sign a “copyright disclaimer” for the program, if
|
|
|
|
|
necessary. For more information on this, and how to apply and follow
|
|
|
|
|
the GNU GPL, see <https://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
|
|
The GNU General Public License does not permit incorporating your
|
|
|
|
|
program into proprietary programs. If your program is a subroutine
|
|
|
|
|
library, you may consider it more useful to permit linking proprietary
|
|
|
|
|
applications with the library. If this is what you want to do, use the
|
|
|
|
|
GNU Lesser General Public License instead of this License. But first,
|
|
|
|
|
please read <https://www.gnu.org/philosophy/why-not-lgpl.html>.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
File: gpgme.info, Node: Concept Index, Next: Function and Data Index, Prev: Copying, Up: Top
|
|
|
|
|
|
|
|
|
|
Concept Index
|
|
|
|
|
*************
|
|
|
|
|
|
|
|
|
|
|