Server IP : 85.214.239.14 / Your IP : 52.15.187.50 Web Server : Apache/2.4.62 (Debian) System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Tue Jan 9 19:45:01 MSK 2024 x86_64 User : www-data ( 33) PHP Version : 7.4.18 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, MySQL : OFF | cURL : OFF | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : OFF Directory : /proc/2/task/2/root/usr/share/perl5/Dpkg/OpenPGP/ |
Upload File : |
# Copyright © 2017, 2022 Guillem Jover <guillem@debian.org> # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see <https://www.gnu.org/licenses/>. package Dpkg::OpenPGP::Backend; use strict; use warnings; our $VERSION = '0.01'; use List::Util qw(first); use Dpkg::Path qw(find_command); use Dpkg::OpenPGP::ErrorCodes; sub DEFAULT_CMDV { return []; } sub DEFAULT_CMDSTORE { return []; } sub DEFAULT_CMD { return []; } sub _detect_cmd { my ($cmd, $default) = @_; if (! defined $cmd || $cmd eq 'auto') { return first { find_command($_) } @{$default}; } else { return find_command($cmd); } } sub new { my ($this, %opts) = @_; my $class = ref($this) || $this; my $self = { strict_verify => $opts{strict_verify} // 1, }; bless $self, $class; $self->{cmdv} = _detect_cmd($opts{cmdv}, $self->DEFAULT_CMDV()); $self->{cmdstore} = _detect_cmd($opts{cmdstore}, $self->DEFAULT_CMDSTORE()); $self->{cmd} = _detect_cmd($opts{cmd}, $self->DEFAULT_CMD()); return $self; } sub has_backend_cmd { my $self = shift; return defined $self->{cmd}; } sub has_verify_cmd { my $self = shift; return defined $self->{cmd}; } sub has_keystore { my $self = shift; return 0; } sub can_use_key { my ($self, $key) = @_; return $self->has_keystore() if $key->needs_keystore(); return 1; } sub get_trusted_keyrings { my $self = shift; return (); } sub armor { my ($self, $type, $in, $out) = @_; return OPENPGP_UNSUPPORTED_SUBCMD; } sub dearmor { my ($self, $type, $in, $out) = @_; return OPENPGP_UNSUPPORTED_SUBCMD; } sub inline_verify { my ($self, $inlinesigned, $data, @certs) = @_; return OPENPGP_UNSUPPORTED_SUBCMD; } sub verify { my ($self, $data, $sig, @certs) = @_; return OPENPGP_UNSUPPORTED_SUBCMD; } sub inline_sign { my ($self, $data, $inlinesigned, $key) = @_; return OPENPGP_UNSUPPORTED_SUBCMD; } 1;