This commit updates to images v0.117.0 so that the cross-distro.sh test works again (images removed fedora-39.json in main but the uses the previous version of images that includes fedora-39 so there is a mismatch (we should look into if there is a way to get github.com/osbuild/images@latest instead of main in the cross-arch test). It also updates all the vendor stuff that got pulled via the new images release (which is giantonormous). This update requires updating the Go version to 1.22.8
103 lines
2 KiB
C
103 lines
2 KiB
C
#include "go_gpgme.h"
|
|
|
|
gpgme_off_t gogpgme_data_seek(gpgme_data_t dh, gpgme_off_t offset, int whence) {
|
|
return gpgme_data_seek(dh, offset, whence);
|
|
}
|
|
|
|
gpgme_error_t gogpgme_op_assuan_transact_ext(
|
|
gpgme_ctx_t ctx,
|
|
char* cmd,
|
|
void* data_h,
|
|
void* inquiry_h,
|
|
void* status_h,
|
|
gpgme_error_t *operr
|
|
){
|
|
return gpgme_op_assuan_transact_ext(
|
|
ctx,
|
|
cmd,
|
|
(gpgme_assuan_data_cb_t) gogpgme_assuan_data_callback, data_h,
|
|
(gpgme_assuan_inquire_cb_t) gogpgme_assuan_inquiry_callback, inquiry_h,
|
|
(gpgme_assuan_status_cb_t) gogpgme_assuan_status_callback, status_h,
|
|
operr
|
|
);
|
|
}
|
|
|
|
unsigned int key_revoked(gpgme_key_t k) {
|
|
return k->revoked;
|
|
}
|
|
|
|
unsigned int key_expired(gpgme_key_t k) {
|
|
return k->expired;
|
|
}
|
|
|
|
unsigned int key_disabled(gpgme_key_t k) {
|
|
return k->disabled;
|
|
}
|
|
|
|
unsigned int key_invalid(gpgme_key_t k) {
|
|
return k->invalid;
|
|
}
|
|
|
|
unsigned int key_can_encrypt(gpgme_key_t k) {
|
|
return k->can_encrypt;
|
|
}
|
|
|
|
unsigned int key_can_sign(gpgme_key_t k) {
|
|
return k->can_sign;
|
|
}
|
|
|
|
unsigned int key_can_certify(gpgme_key_t k) {
|
|
return k->can_certify;
|
|
}
|
|
|
|
unsigned int key_secret(gpgme_key_t k) {
|
|
return k->secret;
|
|
}
|
|
|
|
unsigned int key_can_authenticate(gpgme_key_t k) {
|
|
return k->can_authenticate;
|
|
}
|
|
|
|
unsigned int key_is_qualified(gpgme_key_t k) {
|
|
return k->is_qualified;
|
|
}
|
|
|
|
unsigned int signature_wrong_key_usage(gpgme_signature_t s) {
|
|
return s->wrong_key_usage;
|
|
}
|
|
|
|
unsigned int signature_pka_trust(gpgme_signature_t s) {
|
|
return s->pka_trust;
|
|
}
|
|
|
|
unsigned int signature_chain_model(gpgme_signature_t s) {
|
|
return s->chain_model;
|
|
}
|
|
|
|
unsigned int subkey_revoked(gpgme_subkey_t k) {
|
|
return k->revoked;
|
|
}
|
|
|
|
unsigned int subkey_expired(gpgme_subkey_t k) {
|
|
return k->expired;
|
|
}
|
|
|
|
unsigned int subkey_disabled(gpgme_subkey_t k) {
|
|
return k->disabled;
|
|
}
|
|
|
|
unsigned int subkey_invalid(gpgme_subkey_t k) {
|
|
return k->invalid;
|
|
}
|
|
|
|
unsigned int subkey_secret(gpgme_subkey_t k) {
|
|
return k->secret;
|
|
}
|
|
|
|
unsigned int uid_revoked(gpgme_user_id_t u) {
|
|
return u->revoked;
|
|
}
|
|
|
|
unsigned int uid_invalid(gpgme_user_id_t u) {
|
|
return u->invalid;
|
|
}
|