📄 pgperr.h
字号:
PGPERR (PGPERR_IMMUTABLE, "Attempt to change an"
" immutable object")
#define PGPERR_PARSEASC_INCOMPLETE -220
PGPERR (PGPERR_PARSEASC_INCOMPLETE, "Ascii Armor Input Incomplete")
#define PGPERR_PARSEASC_BADINPUT -221
PGPERR (PGPERR_PARSEASC_BADINPUT, "PGP text input is corrupted")
#define PGPERR_FILEFIFO_SEEK -230
PGPERR (PGPERR_FILEFIFO_SEEK, "Temp-File Seek Error")
#define PGPERR_FILEFIFO_WRITE -231
PGPERR (PGPERR_FILEFIFO_WRITE, "Temp-File Write Error")
#define PGPERR_FILEFIFO_READ -232
PGPERR (PGPERR_FILEFIFO_READ, "Temp-File Read Error")
#define PGPERR_FILEIO_BADPKT -235
PGPERR (PGPERR_FILEIO_BADPKT, "Corrupted or bad packet in"
" PGP data file")
#define PGPERR_SYSTEM_PGPK -240
PGPERR (PGPERR_SYSTEM_PGPK, "Error Executing PGPK Program")
#define PGPERR_UNKNOWN_ARGUMENT -241
PGPERR (PGPERR_UNKNOWN_ARGUMENT, "Unknown argument")
#define PGPERR_MISSING_ARGUMENT -242
PGPERR (PGPERR_MISSING_ARGUMENT, "Missing argument")
/* These errors occur only in key management, and have extra info attached. */
#define PGPERR_KEYIO_READING -300
PGPERR (PGPERR_KEYIO_READING, "I/O error reading keyring")
#define PGPERR_KEYIO_WRITING -301
PGPERR (PGPERR_KEYIO_WRITING, "I/O error writing keyring")
#define PGPERR_KEYIO_FTELL -302
PGPERR (PGPERR_KEYIO_FTELL, "I/O error finding keyring position")
#define PGPERR_KEYIO_SEEKING -303
PGPERR (PGPERR_KEYIO_SEEKING, "I/O error seeking keyring")
#define PGPERR_KEYIO_OPENING -304
PGPERR (PGPERR_KEYIO_OPENING, "I/O error opening keyring")
#define PGPERR_KEYIO_CLOSING -305
PGPERR (PGPERR_KEYIO_CLOSING, "I/O error closing keyring")
#define PGPERR_KEYIO_FLUSHING -306
PGPERR (PGPERR_KEYIO_FLUSHING, "I/O error flushing keyring")
/*
* The following errors indicate that someone modified a file while it
* was open for access. These can also be found in trouble logs.
*/
/* Did a seek to a known packet, encountered EOF there! */
#define PGPERR_KEYIO_EOF -310
PGPERR (PGPERR_KEYIO_EOF, "Unexpected EOF fetching key packet")
/*
* Did a seek to a known packet, found something different there!
* If this happens after a keyring has been opened, it means that
* the keyring has been changed out from under PGP!
*/
#define PGPERR_KEYIO_BADPKT -311
PGPERR (PGPERR_KEYIO_BADPKT, "Bad data found where key"
" packet expected")
#define PGPERR_KEYIO_BADFILE -312
PGPERR (PGPERR_KEYIO_BADFILE, "Not a keyring file")
/*
* The following errors are warnings found in RingFile trouble logs only.
* The only other possibilities found in trouble logs are
* - PGPERR_KEYIO_READING
* - PGPERR_KEYIO_FTELL
* - PGPERR_KEYIO_EOF
* - PGPERR_KEYIO_BADPKT
* - PGPERR_NOMEM
*/
#define PGPERR_TROUBLE_MAX -318
#define PGPERR_TROUBLE_MIN -349
#define PGPERR_TROUBLE_KEYSUBKEY -318
PGPERR (PGPERR_TROUBLE_KEYSUBKEY, "Key matches subkey")
#define PGPERR_TROUBLE_SIGSUBKEY -319
PGPERR (PGPERR_TROUBLE_SIGSUBKEY, "Signature by subkey")
#define PGPERR_TROUBLE_BADTRUST -320
PGPERR (PGPERR_TROUBLE_BADTRUST, "Trust packet malformed")
#define PGPERR_TROUBLE_UNKPKTBYTE -321
PGPERR (PGPERR_TROUBLE_UNKPKTBYTE, "Unknown packet byte in keyring")
#define PGPERR_TROUBLE_UNXSUBKEY -322
PGPERR (PGPERR_TROUBLE_UNXSUBKEY, "Unexpected subkey (before key)")
#define PGPERR_TROUBLE_UNXNAME -323
PGPERR (PGPERR_TROUBLE_UNXNAME, "Unexpected name (before key)")
#define PGPERR_TROUBLE_UNXSIG -324
PGPERR (PGPERR_TROUBLE_UNXSIG, "Unexpected sig (before key)")
#define PGPERR_TROUBLE_UNXUNK -325
PGPERR (PGPERR_TROUBLE_UNXUNK, "Packet of unknown type in unexpected"
" location (before key)")
#define PGPERR_TROUBLE_UNXTRUST -326
PGPERR (PGPERR_TROUBLE_UNXTRUST, "Unexpected trust packet")
#define PGPERR_TROUBLE_KEY2BIG -327
PGPERR (PGPERR_TROUBLE_KEY2BIG, "Key grossly oversized")
#define PGPERR_TROUBLE_SEC2BIG -328
PGPERR (PGPERR_TROUBLE_SEC2BIG, "Secret key grossly oversized")
#define PGPERR_TROUBLE_NAME2BIG -329
PGPERR (PGPERR_TROUBLE_NAME2BIG, "Name grossly oversized")
#define PGPERR_TROUBLE_SIG2BIG -330
PGPERR (PGPERR_TROUBLE_SIG2BIG, "Sig grossly oversized")
#define PGPERR_TROUBLE_UNK2BIG -331
PGPERR (PGPERR_TROUBLE_UNK2BIG, "Packet of unknown type too large"
" to handle")
#define PGPERR_TROUBLE_DUPKEYID -332
PGPERR (PGPERR_TROUBLE_DUPKEYID, "Duplicate KeyID, different keys")
#define PGPERR_TROUBLE_DUPKEY -333
PGPERR (PGPERR_TROUBLE_DUPKEY, "Duplicate key (in same keyring)")
#define PGPERR_TROUBLE_DUPSEC -334
PGPERR (PGPERR_TROUBLE_DUPSEC, "Duplicate secret (in same keyring)")
#define PGPERR_TROUBLE_DUPNAME -335
PGPERR (PGPERR_TROUBLE_DUPNAME, "Duplicate name (in same keyring)")
#define PGPERR_TROUBLE_DUPSIG -336
PGPERR (PGPERR_TROUBLE_DUPSIG, "Duplicate signature (in same keyring)")
#define PGPERR_TROUBLE_DUPUNK -337
PGPERR (PGPERR_TROUBLE_DUPUNK, "Duplicate unknown \"thing\" in keyring")
#define PGPERR_TROUBLE_BAREKEY -338
PGPERR (PGPERR_TROUBLE_BAREKEY, "Key found with no names")
#define PGPERR_TROUBLE_VERSION_BUG_PREV -339
PGPERR (PGPERR_TROUBLE_VERSION_BUG_PREV, "Bug introduced by legal_kludge")
#define PGPERR_TROUBLE_VERSION_BUG_CUR -340
PGPERR (PGPERR_TROUBLE_VERSION_BUG_CUR, "Bug introduced by legal_kludge")
#define PGPERR_TROUBLE_OLDSEC -341
PGPERR (PGPERR_TROUBLE_OLDSEC, "Passphrase is out of date")
#define PGPERR_TROUBLE_NEWSEC -342
PGPERR (PGPERR_TROUBLE_NEWSEC, "Passphrase is newer than another")
/*
* Errors that can be encountered when parsing a key.
* If multiple errors apply, only the last is reported.
*
* Note: Obviously the modulus n = p*q must be odd, if p and q
* are both large primes, since all primes greater than 2 are odd.
* The exponent e must have a corresponding decryption exponent
* d such that e*d mod gcd(p-1,q-1) = 1. Since p-1 and q-1 are both
* even, their gcd must also be even and thus e*d mod 2 = 1, implying
* that e mod 2 = 1.
* I.e. if e were even, the message would not be decryptable.
*
* ANY ERRORS NOT IN THE RANGE PGPERR_KEY_MAX..PGPERR_KEY_MIN, IF ENCOUNTERED
* DURING A MAINTENANCE PASS, HAVE THE EFFECT OF ABORTING THE PASS. ANY NEW
* KEY-ASSOCIATED ERROR MUST BE ADDED TO THIS RANGE IF THE MAINTENANCE PASS
* IS TO JUST SKIP THAT KEY AND NOT ABORT THE WHOLE PASS.
*/
#define PGPERR_KEY_MAX -347
#define PGPERR_KEY_MIN -359
#define PGPERR_KEY_NO_RSA_ENCRYPT -347
PGPERR (PGPERR_KEY_NO_RSA_ENCRYPT, "No RSA Encryption/Signature support")
#define PGPERR_KEY_NO_RSA_DECRYPT -348
PGPERR (PGPERR_KEY_NO_RSA_DECRYPT, "No RSA Decryption/Verification support")
#define PGPERR_KEY_NO_RSA -349
PGPERR (PGPERR_KEY_NO_RSA, "No RSA key support")
/* PGPERR_KEY_LONG is a warning only */
#define PGPERR_KEY_LONG -350
PGPERR (PGPERR_KEY_LONG, "Key packet has trailing junk")
#define PGPERR_KEY_SHORT -351
PGPERR (PGPERR_KEY_SHORT, "Key packet truncated")
#define PGPERR_KEY_VERSION -352
PGPERR (PGPERR_KEY_VERSION, "Key version unknown")
#define PGPERR_KEY_PKALG -353
PGPERR (PGPERR_KEY_PKALG, "Key algorithm unknown")
#define PGPERR_KEY_MODMPI -354
PGPERR (PGPERR_KEY_MODMPI, "Key modulus mis-formatted")
#define PGPERR_KEY_EXPMPI -355
PGPERR (PGPERR_KEY_EXPMPI, "Key exponent mis-formatted")
#define PGPERR_KEY_MODEVEN -356
PGPERR (PGPERR_KEY_MODEVEN, "RSA public modulus is even")
#define PGPERR_KEY_EXPEVEN -357
PGPERR (PGPERR_KEY_EXPEVEN, "RSA public exponent is even")
#define PGPERR_KEY_MPI -358
PGPERR (PGPERR_KEY_MPI, "Key component mis-formatted")
#define PGPERR_KEY_UNSUPP -359
PGPERR (PGPERR_KEY_UNSUPP, "Key is not supported by this version of PGP")
/*
* Errors that can be encountered when parsing a signature.
* If multiple errors apply, only the last is reported.
*/
#define PGPERR_SIG_MAX -360
#define PGPERR_SIG_MIN -369
#define PGPERR_SIG_LONG -360
PGPERR (PGPERR_SIG_LONG, "Signature packet has trailing junk")
#define PGPERR_SIG_SHORT -361
PGPERR (PGPERR_SIG_SHORT, "Signature truncated")
#define PGPERR_SIG_MPI -362
PGPERR (PGPERR_SIG_MPI, "Signature integer mis-formatted")
#define PGPERR_SIG_PKALG -363
PGPERR (PGPERR_SIG_PKALG, "Signature algorithm unknown")
#define PGPERR_SIG_EXTRALEN -364
PGPERR (PGPERR_SIG_EXTRALEN, "Bad signature extra material (not 5)")
#define PGPERR_SIG_VERSION -355
PGPERR (PGPERR_SIG_VERSION, "Signature version unknown")
/* Mid-level key manipulation API error codes */
#define PGPERR_KEYDB_MAX -370
#define PGPERR_KEYDB_MIN -383
#define PGPERR_KEYDB_BADPASSPHRASE -370
PGPERR (PGPERR_KEYDB_BADPASSPHRASE, "Bad passphrase")
#define PGPERR_KEYDB_KEYDBREADONLY -371
PGPERR (PGPERR_KEYDB_KEYDBREADONLY, "Key database is read-only")
#define PGPERR_KEYDB_NEEDMOREBITS -372
PGPERR (PGPERR_KEYDB_NEEDMOREBITS, "Insufficient random bits")
#define PGPERR_KEYDB_OBJECTREADONLY -373
PGPERR (PGPERR_KEYDB_OBJECTREADONLY, "Object is read-only")
#define PGPERR_KEYDB_INVALIDPROPERTY -374
PGPERR (PGPERR_KEYDB_INVALIDPROPERTY, "Invalid property name")
#define PGPERR_KEYDB_BUFFERTOOSHORT -375
PGPERR (PGPERR_KEYDB_BUFFERTOOSHORT, "Buffer too short")
#define PGPERR_KEYDB_CORRUPT -376
PGPERR (PGPERR_KEYDB_CORRUPT, "Key database is corrupt")
#define PGPERR_KEYDB_VERSIONTOONEW -377
PGPERR (PGPERR_KEYDB_VERSIONTOONEW, "Data is too new to be read"
" by this version")
#define PGPERR_KEYDB_IOERROR -378
PGPERR (PGPERR_KEYDB_IOERROR, "Input/output error")
#define PGPERR_KEYDB_VALUETOOLONG -379
PGPERR (PGPERR_KEYDB_VALUETOOLONG, "Value too long")
#define PGPERR_KEYDB_DUPLICATE_CERT -380
PGPERR (PGPERR_KEYDB_DUPLICATE_CERT, "Duplicate certification")
#define PGPERR_KEYDB_DUPLICATE_USERID -381
PGPERR (PGPERR_KEYDB_DUPLICATE_USERID, "Duplicate UserID")
#define PGPERR_KEYDB_CERTIFYINGKEY_DEAD -382
PGPERR (PGPERR_KEYDB_CERTIFYINGKEY_DEAD, "Certifying key no longer"
" valid")
#define PGPERR_KEYDB_OBJECT_DELETED -383
PGPERR (PGPERR_KEYDB_OBJECT_DELETED, "Object has been deleted")
#endif /* PGPERR_H */
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -