1 This is /home/wk/w/gpgme/doc/gpgme.info, produced by makeinfo version
2 4.13 from /home/wk/w/gpgme/doc/gpgme.texi.
4 INFO-DIR-SECTION GNU Libraries
6 * GPGME: (gpgme). Adding support for cryptography to your program.
9 Copyright (C) 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2010 g10
12 Permission is granted to copy, distribute and/or modify this
13 document under the terms of the GNU General Public License as
14 published by the Free Software Foundation; either version 3 of the
15 License, or (at your option) any later version. The text of the
16 license can be found in the section entitled "Copying".
18 This document is distributed in the hope that it will be useful, but
19 WITHOUT ANY WARRANTY; without even the implied warranty of
20 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
21 General Public License for more details.
23 This file documents the GPGME library.
25 This is Edition 1.3.2, last updated 2 May 2012, of `The `GnuPG Made
26 Easy' Reference Manual', for Version 1.3.2.
28 Copyright (C) 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2010 g10
31 Permission is granted to copy, distribute and/or modify this
32 document under the terms of the GNU General Public License as
33 published by the Free Software Foundation; either version 3 of the
34 License, or (at your option) any later version. The text of the
35 license can be found in the section entitled "Copying".
37 This document is distributed in the hope that it will be useful, but
38 WITHOUT ANY WARRANTY; without even the implied warranty of
39 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
40 General Public License for more details.
43 File: gpgme.info, Node: Copying, Next: Concept Index, Prev: Library Copying, Up: Top
45 GNU General Public License
46 **************************
48 Version 3, 29 June 2007
50 Copyright (C) 2007 Free Software Foundation, Inc. `http://fsf.org/'
52 Everyone is permitted to copy and distribute verbatim copies of this
53 license document, but changing it is not allowed.
58 The GNU General Public License is a free, copyleft license for software
59 and other kinds of works.
61 The licenses for most software and other practical works are designed
62 to take away your freedom to share and change the works. By contrast,
63 the GNU General Public License is intended to guarantee your freedom to
64 share and change all versions of a program-to make sure it remains free
65 software for all its users. We, the Free Software Foundation, use the
66 GNU General Public License for most of our software; it applies also to
67 any other work released this way by its authors. You can apply it to
70 When we speak of free software, we are referring to freedom, not
71 price. Our General Public Licenses are designed to make sure that you
72 have the freedom to distribute copies of free software (and charge for
73 them if you wish), that you receive source code or can get it if you
74 want it, that you can change the software or use pieces of it in new
75 free programs, and that you know you can do these things.
77 To protect your rights, we need to prevent others from denying you
78 these rights or asking you to surrender the rights. Therefore, you
79 have certain responsibilities if you distribute copies of the software,
80 or if you modify it: responsibilities to respect the freedom of others.
82 For example, if you distribute copies of such a program, whether
83 gratis or for a fee, you must pass on to the recipients the same
84 freedoms that you received. You must make sure that they, too, receive
85 or can get the source code. And you must show them these terms so they
88 Developers that use the GNU GPL protect your rights with two steps:
89 (1) assert copyright on the software, and (2) offer you this License
90 giving you legal permission to copy, distribute and/or modify it.
92 For the developers' and authors' protection, the GPL clearly explains
93 that there is no warranty for this free software. For both users' and
94 authors' sake, the GPL requires that modified versions be marked as
95 changed, so that their problems will not be attributed erroneously to
96 authors of previous versions.
98 Some devices are designed to deny users access to install or run
99 modified versions of the software inside them, although the
100 manufacturer can do so. This is fundamentally incompatible with the
101 aim of protecting users' freedom to change the software. The
102 systematic pattern of such abuse occurs in the area of products for
103 individuals to use, which is precisely where it is most unacceptable.
104 Therefore, we have designed this version of the GPL to prohibit the
105 practice for those products. If such problems arise substantially in
106 other domains, we stand ready to extend this provision to those domains
107 in future versions of the GPL, as needed to protect the freedom of
110 Finally, every program is threatened constantly by software patents.
111 States should not allow patents to restrict development and use of
112 software on general-purpose computers, but in those that do, we wish to
113 avoid the special danger that patents applied to a free program could
114 make it effectively proprietary. To prevent this, the GPL assures that
115 patents cannot be used to render the program non-free.
117 The precise terms and conditions for copying, distribution and
123 "This License" refers to version 3 of the GNU General Public
126 "Copyright" also means copyright-like laws that apply to other
127 kinds of works, such as semiconductor masks.
129 "The Program" refers to any copyrightable work licensed under this
130 License. Each licensee is addressed as "you". "Licensees" and
131 "recipients" may be individuals or organizations.
133 To "modify" a work means to copy from or adapt all or part of the
134 work in a fashion requiring copyright permission, other than the
135 making of an exact copy. The resulting work is called a "modified
136 version" of the earlier work or a work "based on" the earlier work.
138 A "covered work" means either the unmodified Program or a work
139 based on the Program.
141 To "propagate" a work means to do anything with it that, without
142 permission, would make you directly or secondarily liable for
143 infringement under applicable copyright law, except executing it
144 on a computer or modifying a private copy. Propagation includes
145 copying, distribution (with or without modification), making
146 available to the public, and in some countries other activities as
149 To "convey" a work means any kind of propagation that enables other
150 parties to make or receive copies. Mere interaction with a user
151 through a computer network, with no transfer of a copy, is not
154 An interactive user interface displays "Appropriate Legal Notices"
155 to the extent that it includes a convenient and prominently visible
156 feature that (1) displays an appropriate copyright notice, and (2)
157 tells the user that there is no warranty for the work (except to
158 the extent that warranties are provided), that licensees may
159 convey the work under this License, and how to view a copy of this
160 License. If the interface presents a list of user commands or
161 options, such as a menu, a prominent item in the list meets this
166 The "source code" for a work means the preferred form of the work
167 for making modifications to it. "Object code" means any
168 non-source form of a work.
170 A "Standard Interface" means an interface that either is an
171 official standard defined by a recognized standards body, or, in
172 the case of interfaces specified for a particular programming
173 language, one that is widely used among developers working in that
176 The "System Libraries" of an executable work include anything,
177 other than the work as a whole, that (a) is included in the normal
178 form of packaging a Major Component, but which is not part of that
179 Major Component, and (b) serves only to enable use of the work
180 with that Major Component, or to implement a Standard Interface
181 for which an implementation is available to the public in source
182 code form. A "Major Component", in this context, means a major
183 essential component (kernel, window system, and so on) of the
184 specific operating system (if any) on which the executable work
185 runs, or a compiler used to produce the work, or an object code
186 interpreter used to run it.
188 The "Corresponding Source" for a work in object code form means all
189 the source code needed to generate, install, and (for an executable
190 work) run the object code and to modify the work, including
191 scripts to control those activities. However, it does not include
192 the work's System Libraries, or general-purpose tools or generally
193 available free programs which are used unmodified in performing
194 those activities but which are not part of the work. For example,
195 Corresponding Source includes interface definition files
196 associated with source files for the work, and the source code for
197 shared libraries and dynamically linked subprograms that the work
198 is specifically designed to require, such as by intimate data
199 communication or control flow between those subprograms and other
202 The Corresponding Source need not include anything that users can
203 regenerate automatically from other parts of the Corresponding
206 The Corresponding Source for a work in source code form is that
209 2. Basic Permissions.
211 All rights granted under this License are granted for the term of
212 copyright on the Program, and are irrevocable provided the stated
213 conditions are met. This License explicitly affirms your unlimited
214 permission to run the unmodified Program. The output from running
215 a covered work is covered by this License only if the output,
216 given its content, constitutes a covered work. This License
217 acknowledges your rights of fair use or other equivalent, as
218 provided by copyright law.
220 You may make, run and propagate covered works that you do not
221 convey, without conditions so long as your license otherwise
222 remains in force. You may convey covered works to others for the
223 sole purpose of having them make modifications exclusively for
224 you, or provide you with facilities for running those works,
225 provided that you comply with the terms of this License in
226 conveying all material for which you do not control copyright.
227 Those thus making or running the covered works for you must do so
228 exclusively on your behalf, under your direction and control, on
229 terms that prohibit them from making any copies of your
230 copyrighted material outside their relationship with you.
232 Conveying under any other circumstances is permitted solely under
233 the conditions stated below. Sublicensing is not allowed; section
234 10 makes it unnecessary.
236 3. Protecting Users' Legal Rights From Anti-Circumvention Law.
238 No covered work shall be deemed part of an effective technological
239 measure under any applicable law fulfilling obligations under
240 article 11 of the WIPO copyright treaty adopted on 20 December
241 1996, or similar laws prohibiting or restricting circumvention of
244 When you convey a covered work, you waive any legal power to forbid
245 circumvention of technological measures to the extent such
246 circumvention is effected by exercising rights under this License
247 with respect to the covered work, and you disclaim any intention
248 to limit operation or modification of the work as a means of
249 enforcing, against the work's users, your or third parties' legal
250 rights to forbid circumvention of technological measures.
252 4. Conveying Verbatim Copies.
254 You may convey verbatim copies of the Program's source code as you
255 receive it, in any medium, provided that you conspicuously and
256 appropriately publish on each copy an appropriate copyright notice;
257 keep intact all notices stating that this License and any
258 non-permissive terms added in accord with section 7 apply to the
259 code; keep intact all notices of the absence of any warranty; and
260 give all recipients a copy of this License along with the Program.
262 You may charge any price or no price for each copy that you convey,
263 and you may offer support or warranty protection for a fee.
265 5. Conveying Modified Source Versions.
267 You may convey a work based on the Program, or the modifications to
268 produce it from the Program, in the form of source code under the
269 terms of section 4, provided that you also meet all of these
272 a. The work must carry prominent notices stating that you
273 modified it, and giving a relevant date.
275 b. The work must carry prominent notices stating that it is
276 released under this License and any conditions added under
277 section 7. This requirement modifies the requirement in
278 section 4 to "keep intact all notices".
280 c. You must license the entire work, as a whole, under this
281 License to anyone who comes into possession of a copy. This
282 License will therefore apply, along with any applicable
283 section 7 additional terms, to the whole of the work, and all
284 its parts, regardless of how they are packaged. This License
285 gives no permission to license the work in any other way, but
286 it does not invalidate such permission if you have separately
289 d. If the work has interactive user interfaces, each must display
290 Appropriate Legal Notices; however, if the Program has
291 interactive interfaces that do not display Appropriate Legal
292 Notices, your work need not make them do so.
294 A compilation of a covered work with other separate and independent
295 works, which are not by their nature extensions of the covered
296 work, and which are not combined with it such as to form a larger
297 program, in or on a volume of a storage or distribution medium, is
298 called an "aggregate" if the compilation and its resulting
299 copyright are not used to limit the access or legal rights of the
300 compilation's users beyond what the individual works permit.
301 Inclusion of a covered work in an aggregate does not cause this
302 License to apply to the other parts of the aggregate.
304 6. Conveying Non-Source Forms.
306 You may convey a covered work in object code form under the terms
307 of sections 4 and 5, provided that you also convey the
308 machine-readable Corresponding Source under the terms of this
309 License, in one of these ways:
311 a. Convey the object code in, or embodied in, a physical product
312 (including a physical distribution medium), accompanied by the
313 Corresponding Source fixed on a durable physical medium
314 customarily used for software interchange.
316 b. Convey the object code in, or embodied in, a physical product
317 (including a physical distribution medium), accompanied by a
318 written offer, valid for at least three years and valid for
319 as long as you offer spare parts or customer support for that
320 product model, to give anyone who possesses the object code
321 either (1) a copy of the Corresponding Source for all the
322 software in the product that is covered by this License, on a
323 durable physical medium customarily used for software
324 interchange, for a price no more than your reasonable cost of
325 physically performing this conveying of source, or (2) access
326 to copy the Corresponding Source from a network server at no
329 c. Convey individual copies of the object code with a copy of
330 the written offer to provide the Corresponding Source. This
331 alternative is allowed only occasionally and noncommercially,
332 and only if you received the object code with such an offer,
333 in accord with subsection 6b.
335 d. Convey the object code by offering access from a designated
336 place (gratis or for a charge), and offer equivalent access
337 to the Corresponding Source in the same way through the same
338 place at no further charge. You need not require recipients
339 to copy the Corresponding Source along with the object code.
340 If the place to copy the object code is a network server, the
341 Corresponding Source may be on a different server (operated
342 by you or a third party) that supports equivalent copying
343 facilities, provided you maintain clear directions next to
344 the object code saying where to find the Corresponding Source.
345 Regardless of what server hosts the Corresponding Source, you
346 remain obligated to ensure that it is available for as long
347 as needed to satisfy these requirements.
349 e. Convey the object code using peer-to-peer transmission,
350 provided you inform other peers where the object code and
351 Corresponding Source of the work are being offered to the
352 general public at no charge under subsection 6d.
355 A separable portion of the object code, whose source code is
356 excluded from the Corresponding Source as a System Library, need
357 not be included in conveying the object code work.
359 A "User Product" is either (1) a "consumer product", which means
360 any tangible personal property which is normally used for personal,
361 family, or household purposes, or (2) anything designed or sold for
362 incorporation into a dwelling. In determining whether a product
363 is a consumer product, doubtful cases shall be resolved in favor of
364 coverage. For a particular product received by a particular user,
365 "normally used" refers to a typical or common use of that class of
366 product, regardless of the status of the particular user or of the
367 way in which the particular user actually uses, or expects or is
368 expected to use, the product. A product is a consumer product
369 regardless of whether the product has substantial commercial,
370 industrial or non-consumer uses, unless such uses represent the
371 only significant mode of use of the product.
373 "Installation Information" for a User Product means any methods,
374 procedures, authorization keys, or other information required to
375 install and execute modified versions of a covered work in that
376 User Product from a modified version of its Corresponding Source.
377 The information must suffice to ensure that the continued
378 functioning of the modified object code is in no case prevented or
379 interfered with solely because modification has been made.
381 If you convey an object code work under this section in, or with,
382 or specifically for use in, a User Product, and the conveying
383 occurs as part of a transaction in which the right of possession
384 and use of the User Product is transferred to the recipient in
385 perpetuity or for a fixed term (regardless of how the transaction
386 is characterized), the Corresponding Source conveyed under this
387 section must be accompanied by the Installation Information. But
388 this requirement does not apply if neither you nor any third party
389 retains the ability to install modified object code on the User
390 Product (for example, the work has been installed in ROM).
392 The requirement to provide Installation Information does not
393 include a requirement to continue to provide support service,
394 warranty, or updates for a work that has been modified or
395 installed by the recipient, or for the User Product in which it
396 has been modified or installed. Access to a network may be denied
397 when the modification itself materially and adversely affects the
398 operation of the network or violates the rules and protocols for
399 communication across the network.
401 Corresponding Source conveyed, and Installation Information
402 provided, in accord with this section must be in a format that is
403 publicly documented (and with an implementation available to the
404 public in source code form), and must require no special password
405 or key for unpacking, reading or copying.
409 "Additional permissions" are terms that supplement the terms of
410 this License by making exceptions from one or more of its
411 conditions. Additional permissions that are applicable to the
412 entire Program shall be treated as though they were included in
413 this License, to the extent that they are valid under applicable
414 law. If additional permissions apply only to part of the Program,
415 that part may be used separately under those permissions, but the
416 entire Program remains governed by this License without regard to
417 the additional permissions.
419 When you convey a copy of a covered work, you may at your option
420 remove any additional permissions from that copy, or from any part
421 of it. (Additional permissions may be written to require their own
422 removal in certain cases when you modify the work.) You may place
423 additional permissions on material, added by you to a covered work,
424 for which you have or can give appropriate copyright permission.
426 Notwithstanding any other provision of this License, for material
427 you add to a covered work, you may (if authorized by the copyright
428 holders of that material) supplement the terms of this License
431 a. Disclaiming warranty or limiting liability differently from
432 the terms of sections 15 and 16 of this License; or
434 b. Requiring preservation of specified reasonable legal notices
435 or author attributions in that material or in the Appropriate
436 Legal Notices displayed by works containing it; or
438 c. Prohibiting misrepresentation of the origin of that material,
439 or requiring that modified versions of such material be
440 marked in reasonable ways as different from the original
443 d. Limiting the use for publicity purposes of names of licensors
444 or authors of the material; or
446 e. Declining to grant rights under trademark law for use of some
447 trade names, trademarks, or service marks; or
449 f. Requiring indemnification of licensors and authors of that
450 material by anyone who conveys the material (or modified
451 versions of it) with contractual assumptions of liability to
452 the recipient, for any liability that these contractual
453 assumptions directly impose on those licensors and authors.
455 All other non-permissive additional terms are considered "further
456 restrictions" within the meaning of section 10. If the Program as
457 you received it, or any part of it, contains a notice stating that
458 it is governed by this License along with a term that is a further
459 restriction, you may remove that term. If a license document
460 contains a further restriction but permits relicensing or
461 conveying under this License, you may add to a covered work
462 material governed by the terms of that license document, provided
463 that the further restriction does not survive such relicensing or
466 If you add terms to a covered work in accord with this section, you
467 must place, in the relevant source files, a statement of the
468 additional terms that apply to those files, or a notice indicating
469 where to find the applicable terms.
471 Additional terms, permissive or non-permissive, may be stated in
472 the form of a separately written license, or stated as exceptions;
473 the above requirements apply either way.
477 You may not propagate or modify a covered work except as expressly
478 provided under this License. Any attempt otherwise to propagate or
479 modify it is void, and will automatically terminate your rights
480 under this License (including any patent licenses granted under
481 the third paragraph of section 11).
483 However, if you cease all violation of this License, then your
484 license from a particular copyright holder is reinstated (a)
485 provisionally, unless and until the copyright holder explicitly
486 and finally terminates your license, and (b) permanently, if the
487 copyright holder fails to notify you of the violation by some
488 reasonable means prior to 60 days after the cessation.
490 Moreover, your license from a particular copyright holder is
491 reinstated permanently if the copyright holder notifies you of the
492 violation by some reasonable means, this is the first time you have
493 received notice of violation of this License (for any work) from
494 that copyright holder, and you cure the violation prior to 30 days
495 after your receipt of the notice.
497 Termination of your rights under this section does not terminate
498 the licenses of parties who have received copies or rights from
499 you under this License. If your rights have been terminated and
500 not permanently reinstated, you do not qualify to receive new
501 licenses for the same material under section 10.
503 9. Acceptance Not Required for Having Copies.
505 You are not required to accept this License in order to receive or
506 run a copy of the Program. Ancillary propagation of a covered work
507 occurring solely as a consequence of using peer-to-peer
508 transmission to receive a copy likewise does not require
509 acceptance. However, nothing other than this License grants you
510 permission to propagate or modify any covered work. These actions
511 infringe copyright if you do not accept this License. Therefore,
512 by modifying or propagating a covered work, you indicate your
513 acceptance of this License to do so.
515 10. Automatic Licensing of Downstream Recipients.
517 Each time you convey a covered work, the recipient automatically
518 receives a license from the original licensors, to run, modify and
519 propagate that work, subject to this License. You are not
520 responsible for enforcing compliance by third parties with this
523 An "entity transaction" is a transaction transferring control of an
524 organization, or substantially all assets of one, or subdividing an
525 organization, or merging organizations. If propagation of a
526 covered work results from an entity transaction, each party to that
527 transaction who receives a copy of the work also receives whatever
528 licenses to the work the party's predecessor in interest had or
529 could give under the previous paragraph, plus a right to
530 possession of the Corresponding Source of the work from the
531 predecessor in interest, if the predecessor has it or can get it
532 with reasonable efforts.
534 You may not impose any further restrictions on the exercise of the
535 rights granted or affirmed under this License. For example, you
536 may not impose a license fee, royalty, or other charge for
537 exercise of rights granted under this License, and you may not
538 initiate litigation (including a cross-claim or counterclaim in a
539 lawsuit) alleging that any patent claim is infringed by making,
540 using, selling, offering for sale, or importing the Program or any
545 A "contributor" is a copyright holder who authorizes use under this
546 License of the Program or a work on which the Program is based.
547 The work thus licensed is called the contributor's "contributor
550 A contributor's "essential patent claims" are all patent claims
551 owned or controlled by the contributor, whether already acquired or
552 hereafter acquired, that would be infringed by some manner,
553 permitted by this License, of making, using, or selling its
554 contributor version, but do not include claims that would be
555 infringed only as a consequence of further modification of the
556 contributor version. For purposes of this definition, "control"
557 includes the right to grant patent sublicenses in a manner
558 consistent with the requirements of this License.
560 Each contributor grants you a non-exclusive, worldwide,
561 royalty-free patent license under the contributor's essential
562 patent claims, to make, use, sell, offer for sale, import and
563 otherwise run, modify and propagate the contents of its
566 In the following three paragraphs, a "patent license" is any
567 express agreement or commitment, however denominated, not to
568 enforce a patent (such as an express permission to practice a
569 patent or covenant not to sue for patent infringement). To
570 "grant" such a patent license to a party means to make such an
571 agreement or commitment not to enforce a patent against the party.
573 If you convey a covered work, knowingly relying on a patent
574 license, and the Corresponding Source of the work is not available
575 for anyone to copy, free of charge and under the terms of this
576 License, through a publicly available network server or other
577 readily accessible means, then you must either (1) cause the
578 Corresponding Source to be so available, or (2) arrange to deprive
579 yourself of the benefit of the patent license for this particular
580 work, or (3) arrange, in a manner consistent with the requirements
581 of this License, to extend the patent license to downstream
582 recipients. "Knowingly relying" means you have actual knowledge
583 that, but for the patent license, your conveying the covered work
584 in a country, or your recipient's use of the covered work in a
585 country, would infringe one or more identifiable patents in that
586 country that you have reason to believe are valid.
588 If, pursuant to or in connection with a single transaction or
589 arrangement, you convey, or propagate by procuring conveyance of, a
590 covered work, and grant a patent license to some of the parties
591 receiving the covered work authorizing them to use, propagate,
592 modify or convey a specific copy of the covered work, then the
593 patent license you grant is automatically extended to all
594 recipients of the covered work and works based on it.
596 A patent license is "discriminatory" if it does not include within
597 the scope of its coverage, prohibits the exercise of, or is
598 conditioned on the non-exercise of one or more of the rights that
599 are specifically granted under this License. You may not convey a
600 covered work if you are a party to an arrangement with a third
601 party that is in the business of distributing software, under
602 which you make payment to the third party based on the extent of
603 your activity of conveying the work, and under which the third
604 party grants, to any of the parties who would receive the covered
605 work from you, a discriminatory patent license (a) in connection
606 with copies of the covered work conveyed by you (or copies made
607 from those copies), or (b) primarily for and in connection with
608 specific products or compilations that contain the covered work,
609 unless you entered into that arrangement, or that patent license
610 was granted, prior to 28 March 2007.
612 Nothing in this License shall be construed as excluding or limiting
613 any implied license or other defenses to infringement that may
614 otherwise be available to you under applicable patent law.
616 12. No Surrender of Others' Freedom.
618 If conditions are imposed on you (whether by court order,
619 agreement or otherwise) that contradict the conditions of this
620 License, they do not excuse you from the conditions of this
621 License. If you cannot convey a covered work so as to satisfy
622 simultaneously your obligations under this License and any other
623 pertinent obligations, then as a consequence you may not convey it
624 at all. For example, if you agree to terms that obligate you to
625 collect a royalty for further conveying from those to whom you
626 convey the Program, the only way you could satisfy both those
627 terms and this License would be to refrain entirely from conveying
630 13. Use with the GNU Affero General Public License.
632 Notwithstanding any other provision of this License, you have
633 permission to link or combine any covered work with a work licensed
634 under version 3 of the GNU Affero General Public License into a
635 single combined work, and to convey the resulting work. The terms
636 of this License will continue to apply to the part which is the
637 covered work, but the special requirements of the GNU Affero
638 General Public License, section 13, concerning interaction through
639 a network will apply to the combination as such.
641 14. Revised Versions of this License.
643 The Free Software Foundation may publish revised and/or new
644 versions of the GNU General Public License from time to time.
645 Such new versions will be similar in spirit to the present
646 version, but may differ in detail to address new problems or
649 Each version is given a distinguishing version number. If the
650 Program specifies that a certain numbered version of the GNU
651 General Public License "or any later version" applies to it, you
652 have the option of following the terms and conditions either of
653 that numbered version or of any later version published by the
654 Free Software Foundation. If the Program does not specify a
655 version number of the GNU General Public License, you may choose
656 any version ever published by the Free Software Foundation.
658 If the Program specifies that a proxy can decide which future
659 versions of the GNU General Public License can be used, that
660 proxy's public statement of acceptance of a version permanently
661 authorizes you to choose that version for the Program.
663 Later license versions may give you additional or different
664 permissions. However, no additional obligations are imposed on any
665 author or copyright holder as a result of your choosing to follow a
668 15. Disclaimer of Warranty.
670 THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
671 APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE
672 COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS"
673 WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
674 INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
675 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE
676 RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.
677 SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL
678 NECESSARY SERVICING, REPAIR OR CORRECTION.
680 16. Limitation of Liability.
682 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
683 WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES
684 AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU
685 FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
686 CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE
687 THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA
688 BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
689 PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
690 PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF
691 THE POSSIBILITY OF SUCH DAMAGES.
693 17. Interpretation of Sections 15 and 16.
695 If the disclaimer of warranty and limitation of liability provided
696 above cannot be given local legal effect according to their terms,
697 reviewing courts shall apply local law that most closely
698 approximates an absolute waiver of all civil liability in
699 connection with the Program, unless a warranty or assumption of
700 liability accompanies a copy of the Program in return for a fee.
702 END OF TERMS AND CONDITIONS
703 How to Apply These Terms to Your New Programs
704 =============================================
706 If you develop a new program, and you want it to be of the greatest
707 possible use to the public, the best way to achieve this is to make it
708 free software which everyone can redistribute and change under these
711 To do so, attach the following notices to the program. It is
712 safest to attach them to the start of each source file to most
713 effectively state the exclusion of warranty; and each file should have
714 at least the "copyright" line and a pointer to where the full notice is
716 ONE LINE TO GIVE THE PROGRAM'S NAME AND A BRIEF IDEA OF WHAT IT DOES.
717 Copyright (C) YEAR NAME OF AUTHOR
719 This program is free software: you can redistribute it and/or modify
720 it under the terms of the GNU General Public License as published by
721 the Free Software Foundation, either version 3 of the License, or (at
722 your option) any later version.
724 This program is distributed in the hope that it will be useful, but
725 WITHOUT ANY WARRANTY; without even the implied warranty of
726 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
727 General Public License for more details.
729 You should have received a copy of the GNU General Public License
730 along with this program. If not, see `http://www.gnu.org/licenses/'.
732 Also add information on how to contact you by electronic and paper
735 If the program does terminal interaction, make it output a short
736 notice like this when it starts in an interactive mode:
738 PROGRAM Copyright (C) YEAR NAME OF AUTHOR
739 This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
740 This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details.
742 The hypothetical commands `show w' and `show c' should show the
743 appropriate parts of the General Public License. Of course, your
744 program's commands might be different; for a GUI interface, you would
747 You should also get your employer (if you work as a programmer) or
748 school, if any, to sign a "copyright disclaimer" for the program, if
749 necessary. For more information on this, and how to apply and follow
750 the GNU GPL, see `http://www.gnu.org/licenses/'.
752 The GNU General Public License does not permit incorporating your
753 program into proprietary programs. If your program is a subroutine
754 library, you may consider it more useful to permit linking proprietary
755 applications with the library. If this is what you want to do, use the
756 GNU Lesser General Public License instead of this License. But first,
757 please read `http://www.gnu.org/philosophy/why-not-lgpl.html'.
761 File: gpgme.info, Node: Function and Data Index, Prev: Concept Index, Up: Top
763 Function and Data Index
764 ***********************
769 * AM_PATH_GPGME: Using Automake. (line 13)
770 * AM_PATH_GPGME_PTH: Using Automake. (line 15)
771 * AM_PATH_GPGME_PTHREAD: Using Automake. (line 17)
772 * CHECKSUM_CREATE_FILES: UI Server Checksum Files.
774 * CHECKSUM_VERIFY_FILES: UI Server Checksum Files.
776 * DECRYPT: UI Server Decrypt. (line 27)
777 * DECRYPT_FILES: UI Server Verify/Decrypt Files.
779 * DECRYPT_VERIFY_FILES: UI Server Verify/Decrypt Files.
781 * ENCRYPT: UI Server Encrypt. (line 46)
782 * ENCRYPT_FILES: UI Server Sign/Encrypt Files.
784 * ENCRYPT_SIGN_FILES: UI Server Sign/Encrypt Files.
786 * enum gpgme_data_encoding_t: Data Buffer Meta-Data.
788 * enum gpgme_event_io_t: I/O Callback Interface.
790 * enum gpgme_hash_algo_t: Hash Algorithms. (line 10)
791 * enum gpgme_protocol_t: Protocols and Engines.
793 * enum gpgme_pubkey_algo_t: Public Key Algorithms.
795 * enum gpgme_sig_mode_t: Creating a Signature.
797 * enum gpgme_sig_stat_t: Verify. (line 277)
798 * FILE: UI Server Set Input Files.
800 * GETINFO: Miscellaneous UI Server Commands.
802 * gpgme_attr_t <1>: Key Signatures. (line 20)
803 * gpgme_attr_t: Information About Keys.
805 * gpgme_cancel: Cancellation. (line 17)
806 * gpgme_cancel_async: Cancellation. (line 38)
807 * gpgme_check_version: Library Version Check.
809 * gpgme_ctx_get_engine_info: Crypto Engine. (line 14)
810 * gpgme_ctx_set_engine_info: Crypto Engine. (line 27)
811 * gpgme_ctx_t: Contexts. (line 13)
812 * gpgme_data_encoding_t: Data Buffer Meta-Data.
814 * gpgme_data_get_encoding: Data Buffer Meta-Data.
816 * gpgme_data_get_file_name: Data Buffer Meta-Data.
818 * gpgme_data_new: Memory Based Data Buffers.
820 * gpgme_data_new_from_cbs: Callback Based Data Buffers.
822 * gpgme_data_new_from_fd: File Based Data Buffers.
824 * gpgme_data_new_from_file: Memory Based Data Buffers.
826 * gpgme_data_new_from_filepart: Memory Based Data Buffers.
828 * gpgme_data_new_from_mem: Memory Based Data Buffers.
830 * gpgme_data_new_from_stream: File Based Data Buffers.
832 * gpgme_data_new_with_read_cb: Callback Based Data Buffers.
834 * gpgme_data_read: Data Buffer I/O Operations.
836 * gpgme_data_read_cb_t: Callback Based Data Buffers.
838 * gpgme_data_release: Destroying Data Buffers.
840 * gpgme_data_release_and_get_mem: Destroying Data Buffers.
842 * gpgme_data_release_cb_t: Callback Based Data Buffers.
844 * gpgme_data_rewind: Data Buffer I/O Operations.
846 * gpgme_data_seek: Data Buffer I/O Operations.
848 * gpgme_data_seek_cb_t: Callback Based Data Buffers.
850 * gpgme_data_set_encoding: Data Buffer Meta-Data.
852 * gpgme_data_set_file_name: Data Buffer Meta-Data.
854 * gpgme_data_t: Exchanging Data. (line 14)
855 * gpgme_data_write: Data Buffer I/O Operations.
857 * gpgme_data_write_cb_t: Callback Based Data Buffers.
859 * gpgme_decrypt_result_t: Decrypt. (line 58)
860 * gpgme_edit_cb_t: Advanced Key Editing.
862 * gpgme_encrypt_result_t: Encrypting a Plaintext.
864 * gpgme_engine_check_version: Engine Version Check.
866 * gpgme_engine_info_t: Engine Information. (line 7)
867 * gpgme_err_code: Error Values. (line 44)
868 * gpgme_err_code_from_errno: Error Values. (line 101)
869 * gpgme_err_code_t: Error Values. (line 7)
870 * gpgme_err_code_to_errno: Error Values. (line 106)
871 * gpgme_err_make: Error Values. (line 60)
872 * gpgme_err_make_from_errno: Error Values. (line 87)
873 * gpgme_err_source: Error Values. (line 52)
874 * gpgme_err_source_t: Error Values. (line 14)
875 * gpgme_error: Error Values. (line 69)
876 * gpgme_error_from_errno: Error Values. (line 92)
877 * gpgme_error_t: Error Values. (line 25)
878 * gpgme_error_t (*gpgme_edit_cb_t) (void *HANDLE, gpgme_status_code_t STATUS, const char *ARGS, int FD): Advanced Key Editing.
880 * gpgme_error_t (*gpgme_io_cb_t) (void *DATA, int FD): I/O Callback Interface.
882 * gpgme_error_t (*gpgme_passphrase_cb_t)(void *HOOK, const char *UID_HINT, const char *PASSPHRASE_INFO, int PREV_WAS_BAD, int FD): Passphrase Callback.
884 * gpgme_error_t (*gpgme_register_io_cb_t) (void *DATA, int FD, int DIR, gpgme_io_cb_t FNC, void *FNC_DATA, void **TAG): I/O Callback Interface.
886 * gpgme_event_io_t <1>: Registering I/O Callbacks.
888 * gpgme_event_io_t: I/O Callback Interface.
890 * gpgme_free: Destroying Data Buffers.
892 * gpgme_genkey_result_t: Generating Keys. (line 75)
893 * gpgme_get_armor: ASCII Armor. (line 14)
894 * gpgme_get_engine_info: Engine Information. (line 47)
895 * gpgme_get_include_certs: Included Certificates.
897 * gpgme_get_io_cbs: Registering I/O Callbacks.
899 * gpgme_get_key: Listing Keys. (line 149)
900 * gpgme_get_keylist_mode: Key Listing Mode. (line 64)
901 * gpgme_get_passphrase_cb: Passphrase Callback. (line 54)
902 * gpgme_get_progress_cb: Progress Meter Callback.
904 * gpgme_get_protocol: Protocol Selection. (line 22)
905 * gpgme_get_protocol_name: Protocols and Engines.
907 * gpgme_get_sig_key: Verify. (line 477)
908 * gpgme_get_sig_status: Verify. (line 326)
909 * gpgme_get_sig_string_attr: Verify. (line 381)
910 * gpgme_get_sig_ulong_attr: Verify. (line 415)
911 * gpgme_get_textmode: Text Mode. (line 21)
912 * gpgme_hash_algo_name: Hash Algorithms. (line 40)
913 * gpgme_hash_algo_t: Hash Algorithms. (line 10)
914 * gpgme_import_result_t: Importing Keys. (line 111)
915 * gpgme_import_status_t: Importing Keys. (line 73)
916 * gpgme_invalid_key_t: Crypto Operations. (line 11)
917 * gpgme_io_cb_t: I/O Callback Interface.
919 * gpgme_key_get_string_attr: Information About Keys.
921 * gpgme_key_get_ulong_attr: Information About Keys.
923 * gpgme_key_ref: Manipulating Keys. (line 7)
924 * gpgme_key_release: Manipulating Keys. (line 20)
925 * gpgme_key_sig_get_string_attr: Key Signatures. (line 78)
926 * gpgme_key_sig_get_ulong_attr: Key Signatures. (line 92)
927 * gpgme_key_sig_t: Key Management. (line 82)
928 * gpgme_key_t: Key Management. (line 190)
929 * gpgme_key_unref: Manipulating Keys. (line 11)
930 * gpgme_keylist_result_t: Listing Keys. (line 125)
931 * gpgme_new: Creating Contexts. (line 7)
932 * gpgme_new_signature_t: Creating a Signature.
934 * gpgme_op_card_edit: Advanced Key Editing.
936 * gpgme_op_card_edit_start: Advanced Key Editing.
938 * gpgme_op_decrypt: Decrypt. (line 8)
939 * gpgme_op_decrypt_result: Decrypt. (line 81)
940 * gpgme_op_decrypt_start: Decrypt. (line 22)
941 * gpgme_op_decrypt_verify: Decrypt and Verify. (line 8)
942 * gpgme_op_delete: Deleting Keys. (line 8)
943 * gpgme_op_delete_start: Deleting Keys. (line 22)
944 * gpgme_op_edit: Advanced Key Editing.
946 * gpgme_op_edit_start: Advanced Key Editing.
948 * gpgme_op_encrypt: Encrypting a Plaintext.
950 * gpgme_op_encrypt_result: Encrypting a Plaintext.
952 * gpgme_op_encrypt_sign: Encrypting a Plaintext.
954 * gpgme_op_encrypt_sign_start: Encrypting a Plaintext.
956 * gpgme_op_encrypt_start: Encrypting a Plaintext.
958 * gpgme_op_export: Exporting Keys. (line 27)
959 * gpgme_op_export_ext: Exporting Keys. (line 58)
960 * gpgme_op_export_ext_start: Exporting Keys. (line 79)
961 * gpgme_op_export_keys: Exporting Keys. (line 90)
962 * gpgme_op_export_keys_start: Exporting Keys. (line 113)
963 * gpgme_op_export_start: Exporting Keys. (line 47)
964 * gpgme_op_genkey: Generating Keys. (line 8)
965 * gpgme_op_genkey_result: Generating Keys. (line 97)
966 * gpgme_op_genkey_start: Generating Keys. (line 65)
967 * gpgme_op_import: Importing Keys. (line 11)
968 * gpgme_op_import_ext: Importing Keys. (line 176)
969 * gpgme_op_import_keys: Importing Keys. (line 37)
970 * gpgme_op_import_keys_start: Importing Keys. (line 62)
971 * gpgme_op_import_result: Importing Keys. (line 162)
972 * gpgme_op_import_start: Importing Keys. (line 26)
973 * gpgme_op_keylist_end: Listing Keys. (line 82)
974 * gpgme_op_keylist_ext_start: Listing Keys. (line 36)
975 * gpgme_op_keylist_next: Listing Keys. (line 67)
976 * gpgme_op_keylist_result: Listing Keys. (line 137)
977 * gpgme_op_keylist_start: Listing Keys. (line 8)
978 * gpgme_op_passwd: Changing Passphrases.
980 * gpgme_op_passwd_start: Changing Passphrases.
982 * gpgme_op_sign: Creating a Signature.
984 * gpgme_op_sign_result: Creating a Signature.
986 * gpgme_op_sign_start: Creating a Signature.
988 * gpgme_op_trustlist_end: Listing Trust Items. (line 45)
989 * gpgme_op_trustlist_next: Listing Trust Items. (line 29)
990 * gpgme_op_trustlist_start: Listing Trust Items. (line 8)
991 * gpgme_op_verify: Verify. (line 9)
992 * gpgme_op_verify_result: Verify. (line 261)
993 * gpgme_op_verify_start: Verify. (line 29)
994 * gpgme_passphrase_cb_t: Passphrase Callback. (line 8)
995 * gpgme_progress_cb_t: Progress Meter Callback.
997 * gpgme_protocol_t <1>: Engine Information. (line 7)
998 * gpgme_protocol_t: Protocols and Engines.
1000 * gpgme_pubkey_algo_name: Public Key Algorithms.
1002 * gpgme_pubkey_algo_t: Public Key Algorithms.
1004 * gpgme_recipient_t: Decrypt. (line 31)
1005 * gpgme_register_io_cb_t: I/O Callback Interface.
1007 * gpgme_release: Destroying Contexts. (line 7)
1008 * gpgme_result_ref: Result Management. (line 15)
1009 * gpgme_result_unref: Result Management. (line 21)
1010 * gpgme_set_armor: ASCII Armor. (line 7)
1011 * gpgme_set_engine_info: Engine Configuration.
1013 * gpgme_set_include_certs: Included Certificates.
1015 * gpgme_set_io_cbs: Registering I/O Callbacks.
1017 * gpgme_set_keylist_mode: Key Listing Mode. (line 8)
1018 * gpgme_set_locale: Locale. (line 16)
1019 * gpgme_set_passphrase_cb: Passphrase Callback. (line 35)
1020 * gpgme_set_progress_cb: Progress Meter Callback.
1022 * gpgme_set_protocol: Protocol Selection. (line 8)
1023 * gpgme_set_textmode: Text Mode. (line 7)
1024 * gpgme_sig_mode_t: Creating a Signature.
1026 * gpgme_sig_notation_add: Signature Notation Data.
1028 * gpgme_sig_notation_clear: Signature Notation Data.
1030 * gpgme_sig_notation_get: Signature Notation Data.
1032 * gpgme_sig_notation_t: Verify. (line 39)
1033 * gpgme_sig_stat_t: Verify. (line 277)
1034 * gpgme_sign_result_t: Creating a Signature.
1036 * gpgme_signature_t: Verify. (line 92)
1037 * gpgme_signers_add: Selecting Signers. (line 15)
1038 * gpgme_signers_clear: Selecting Signers. (line 7)
1039 * gpgme_signers_enum: Selecting Signers. (line 22)
1040 * gpgme_strerror: Error Strings. (line 7)
1041 * gpgme_strerror_r: Error Strings. (line 17)
1042 * gpgme_strsource: Error Strings. (line 27)
1043 * gpgme_sub_key_t: Key Management. (line 12)
1044 * gpgme_trust_item_get_int_attr: Information About Trust Items.
1046 * gpgme_trust_item_get_string_attr: Information About Trust Items.
1048 * gpgme_trust_item_ref: Manipulating Trust Items.
1050 * gpgme_trust_item_release: Manipulating Trust Items.
1052 * gpgme_trust_item_t: Trust Item Management.
1054 * gpgme_trust_item_unref: Manipulating Trust Items.
1056 * gpgme_user_id_t: Key Management. (line 155)
1057 * gpgme_validity_t: Information About Keys.
1059 * gpgme_verify_result_t: Verify. (line 245)
1060 * gpgme_wait: Waiting For Completion.
1062 * IMPORT_FILES: UI Server Import/Export Keys.
1064 * INPUT <1>: UI Server Verify. (line 17)
1065 * INPUT <2>: UI Server Decrypt. (line 13)
1066 * INPUT <3>: UI Server Sign. (line 13)
1067 * INPUT: UI Server Encrypt. (line 23)
1068 * MESSAGE: UI Server Verify. (line 11)
1069 * MICALG: UI Server Sign. (line 43)
1070 * off_t (*gpgme_data_seek_cb_t) (void *HANDLE, off_t OFFSET, int WHENCE): Callback Based Data Buffers.
1072 * OUTPUT <1>: UI Server Verify. (line 24)
1073 * OUTPUT <2>: UI Server Decrypt. (line 20)
1074 * OUTPUT <3>: UI Server Sign. (line 19)
1075 * OUTPUT: UI Server Encrypt. (line 36)
1076 * PREP_ENCRYPT: UI Server Encrypt. (line 72)
1077 * PROTOCOL: UI Server Encrypt. (line 97)
1078 * RECIPIENT: UI Server Encrypt. (line 10)
1079 * SENDER: Miscellaneous UI Server Commands.
1081 * SESSION: Miscellaneous UI Server Commands.
1083 * SIGN: UI Server Sign. (line 33)
1084 * SIGN_FILES: UI Server Sign/Encrypt Files.
1086 * SIGSTATUS: UI Server Verify. (line 59)
1087 * ssize_t (*gpgme_data_read_cb_t) (void *HANDLE, void *BUFFER, size_t SIZE): Callback Based Data Buffers.
1089 * ssize_t (*gpgme_data_write_cb_t) (void *HANDLE, const void *BUFFER, size_t SIZE): Callback Based Data Buffers.
1091 * START_CONFDIALOG: Miscellaneous UI Server Commands.
1093 * START_KEYMANAGER: Miscellaneous UI Server Commands.
1095 * struct gpgme_data_cbs: Callback Based Data Buffers.
1097 * struct gpgme_io_cb_ts: Registering I/O Callbacks.
1099 * VERIFY: UI Server Verify. (line 32)
1100 * VERIFY_FILES: UI Server Verify/Decrypt Files.
1102 * void (*gpgme_data_release_cb_t) (void *HANDLE): Callback Based Data Buffers.
1104 * void (*gpgme_event_io_cb_t) (void *DATA, gpgme_event_io_t TYPE, void *TYPE_DATA): I/O Callback Interface.
1106 * void (*gpgme_progress_cb_t)(void *HOOK, const char *WHAT, int TYPE, int CURRENT, int TOTAL): Progress Meter Callback.
1108 * void (*gpgme_remove_io_cb_t) (void *TAG): I/O Callback Interface.
1110 * window-id: Miscellaneous UI Server Commands.
1114 File: gpgme.info, Node: Concept Index, Next: Function and Data Index, Prev: Copying, Up: Top
1122 * aborting operations: Cancellation. (line 6)
1123 * algorithms: Algorithms. (line 6)
1124 * algorithms, hash: Hash Algorithms. (line 6)
1125 * algorithms, message digest: Hash Algorithms. (line 6)
1126 * algorithms, public key: Public Key Algorithms. (line 6)
1127 * armor mode: ASCII Armor. (line 6)
1128 * ASCII armor: ASCII Armor. (line 6)
1129 * attributes, of a key: Information About Keys.
1131 * attributes, of a trust item: Information About Trust Items.
1133 * autoconf: Using Automake. (line 6)
1134 * automake: Using Automake. (line 6)
1135 * backend: Protocols and Engines. (line 6)
1136 * callback, passphrase: Passphrase Callback. (line 6)
1137 * callback, progress meter: Progress Meter Callback.
1139 * cancelling operations: Cancellation. (line 6)
1140 * canonical text mode: Text Mode. (line 6)
1141 * certificates, included: Included Certificates. (line 6)
1142 * CMS: Cryptographic Message Syntax.
1144 * compiler flags: Building the Source. (line 6)
1145 * compiler options: Building the Source. (line 6)
1146 * configuration of crypto backend: Engine Configuration. (line 6)
1147 * context: Contexts. (line 6)
1148 * context, armor mode: ASCII Armor. (line 6)
1149 * context, attributes: Context Attributes. (line 6)
1150 * context, configuring engine: Crypto Engine. (line 6)
1151 * context, creation: Creating Contexts. (line 6)
1152 * context, destruction: Destroying Contexts. (line 6)
1153 * context, result of operation: Result Management. (line 6)
1154 * context, selecting protocol: Protocol Selection. (line 6)
1155 * context, text mode: Text Mode. (line 6)
1156 * crypto backend: Protocols and Engines. (line 6)
1157 * crypto engine: Protocols and Engines. (line 6)
1158 * cryptographic message syntax: Cryptographic Message Syntax.
1160 * cryptographic operation: Crypto Operations. (line 6)
1161 * cryptographic operation, aborting: Cancellation. (line 6)
1162 * cryptographic operation, cancelling: Cancellation. (line 6)
1163 * cryptographic operation, decryption: Decrypt. (line 6)
1164 * cryptographic operation, decryption and verification: Decrypt and Verify.
1166 * cryptographic operation, encryption: Encrypt. (line 6)
1167 * cryptographic operation, running: Run Control. (line 6)
1168 * cryptographic operation, signature check: Verify. (line 6)
1169 * cryptographic operation, signing: Sign. (line 6)
1170 * cryptographic operation, verification: Verify. (line 6)
1171 * cryptographic operation, wait for: Waiting For Completion.
1173 * data buffer, creation: Creating Data Buffers. (line 6)
1174 * data buffer, destruction: Destroying Data Buffers.
1176 * data buffer, encoding: Data Buffer Meta-Data. (line 6)
1177 * data buffer, file name: Data Buffer Meta-Data. (line 6)
1178 * data buffer, I/O operations: Data Buffer I/O Operations.
1180 * data buffer, manipulation: Manipulating Data Buffers.
1182 * data buffer, meta-data: Data Buffer Meta-Data. (line 6)
1183 * data buffer, read: Data Buffer I/O Operations.
1185 * data buffer, seek: Data Buffer I/O Operations.
1187 * data buffer, write: Data Buffer I/O Operations.
1189 * data, exchanging: Exchanging Data. (line 6)
1190 * decryption: Decrypt. (line 6)
1191 * decryption and verification: Decrypt and Verify. (line 6)
1192 * encryption: Encrypt. (line 6)
1193 * engine: Protocols and Engines. (line 6)
1194 * engine, configuration of: Engine Configuration. (line 6)
1195 * engine, configuration per context: Crypto Engine. (line 6)
1196 * engine, GnuPG: OpenPGP. (line 6)
1197 * engine, GpgSM: Cryptographic Message Syntax.
1199 * engine, information about: Engine Information. (line 6)
1200 * error codes: Error Values. (line 6)
1201 * error codes, list of <1>: Error Codes. (line 6)
1202 * error codes, list of: Error Sources. (line 6)
1203 * error codes, printing of: Error Strings. (line 6)
1204 * error handling: Error Handling. (line 6)
1205 * error sources: Error Values. (line 6)
1206 * error sources, printing of: Error Strings. (line 6)
1207 * error strings: Error Strings. (line 6)
1208 * error values: Error Values. (line 6)
1209 * error values, printing of: Error Strings. (line 6)
1210 * event loop, external: Using External Event Loops.
1212 * GDK, using GPGME with: I/O Callback Example GDK.
1214 * GnuPG: OpenPGP. (line 6)
1215 * GpgSM: Cryptographic Message Syntax.
1217 * GTK+, using GPGME with: I/O Callback Example GTK+.
1219 * hash algorithms: Hash Algorithms. (line 6)
1220 * header file: Header. (line 6)
1221 * include file: Header. (line 6)
1222 * key listing: Listing Keys. (line 6)
1223 * key listing mode: Key Listing Mode. (line 6)
1224 * key listing, mode of: Key Listing Mode. (line 6)
1225 * key listing, start: Listing Keys. (line 6)
1226 * key management: Key Management. (line 6)
1227 * key ring, add: Generating Keys. (line 6)
1228 * key ring, delete from: Deleting Keys. (line 6)
1229 * key ring, export from: Exporting Keys. (line 6)
1230 * key ring, import to: Importing Keys. (line 6)
1231 * key ring, list: Listing Keys. (line 6)
1232 * key ring, search: Listing Keys. (line 6)
1233 * key, attributes: Information About Keys.
1235 * key, creation: Generating Keys. (line 6)
1236 * key, delete: Deleting Keys. (line 6)
1237 * key, edit: Advanced Key Editing. (line 6)
1238 * key, export: Exporting Keys. (line 6)
1239 * key, import: Importing Keys. (line 6)
1240 * key, information about: Information About Keys.
1242 * key, manipulation: Manipulating Keys. (line 6)
1243 * key, signatures: Key Signatures. (line 6)
1244 * largefile support: Largefile Support (LFS).
1246 * LFS: Largefile Support (LFS).
1248 * LGPL, Lesser General Public License: Library Copying. (line 6)
1249 * libtool: Using Libtool. (line 6)
1250 * listing keys: Listing Keys. (line 6)
1251 * locale, default: Locale. (line 6)
1252 * locale, of a context: Locale. (line 6)
1253 * message digest algorithms: Hash Algorithms. (line 6)
1254 * multi-threading: Multi Threading. (line 6)
1255 * notation data <1>: Signature Notation Data.
1257 * notation data: Verify. (line 6)
1258 * OpenPGP: OpenPGP. (line 6)
1259 * passphrase callback: Passphrase Callback. (line 6)
1260 * passphrase, change: Changing Passphrases. (line 6)
1261 * policy URL: Signature Notation Data.
1263 * progress meter callback: Progress Meter Callback.
1265 * protocol: Protocols and Engines. (line 6)
1266 * protocol, CMS: Cryptographic Message Syntax.
1268 * protocol, GnuPG: OpenPGP. (line 6)
1269 * protocol, S/MIME: Cryptographic Message Syntax.
1271 * protocol, selecting: Protocol Selection. (line 6)
1272 * public key algorithms: Public Key Algorithms. (line 6)
1273 * Qt, using GPGME with: I/O Callback Example Qt.
1275 * run control: Run Control. (line 6)
1276 * S/MIME: Cryptographic Message Syntax.
1278 * sign: Sign. (line 6)
1279 * signal handling: Signal Handling. (line 6)
1280 * signals: Signal Handling. (line 6)
1281 * signature check: Decrypt and Verify. (line 6)
1282 * signature notation data <1>: Signature Notation Data.
1284 * signature notation data: Verify. (line 6)
1285 * signature, creation: Sign. (line 6)
1286 * signature, selecting signers: Selecting Signers. (line 6)
1287 * signature, verification: Verify. (line 6)
1288 * signatures, on a key: Key Signatures. (line 6)
1289 * signers, selecting: Selecting Signers. (line 6)
1290 * text mode: Text Mode. (line 6)
1291 * thread-safeness: Multi Threading. (line 6)
1292 * trust item: Trust Item Management. (line 6)
1293 * trust item list: Listing Trust Items. (line 6)
1294 * trust item, attributes: Information About Trust Items.
1296 * trust item, information about: Information About Trust Items.
1298 * trust item, manipulation: Manipulating Trust Items.
1300 * UI server: UI Server Protocol. (line 6)
1301 * user interface server: UI Server Protocol. (line 6)
1302 * verification: Verify. (line 6)
1303 * verification and decryption: Decrypt and Verify. (line 6)
1304 * version check, of the engines: Engine Version Check. (line 6)
1305 * version check, of the library: Library Version Check. (line 6)
1306 * wait for completion: Waiting For Completion.