pEpCOMServerAdapter.idl
branchkeysync
changeset 174 1fa1296363f9
parent 172 112b0fac353d
child 177 4d197f1c3abb
     1.1 --- a/pEpCOMServerAdapter.idl	Mon Oct 03 22:16:01 2016 +0200
     1.2 +++ b/pEpCOMServerAdapter.idl	Tue Oct 04 12:31:52 2016 +0200
     1.3 @@ -126,28 +126,28 @@
     1.4          pEpCtB0rkenCrypto = 0x0b,
     1.5          pEpCtKeyTooShort = 0x0c,
     1.6  
     1.7 -        pEpCtCompromised = 0x0e,                  // known compromized connection
     1.8 -        pEpCtMistrusted = 0x0f,                   // known mistrusted key
     1.9 +        pEpCtCompromised = 0x0e,                 // known compromized connection
    1.10 +        pEpCtMistrusted = 0x0f,                  // known mistrusted key
    1.11  
    1.12          // range 0x10 to 0x3f: unconfirmed encryption
    1.13  
    1.14          pEpCtUnconfirmedEncryption = 0x10,       // generic
    1.15 -        pEpCtOpenPGPWeakUnconfirmed = 0x11,     // RSA 1024 is weak
    1.16 +        pEpCtOpenPGPWeakUnconfirmed = 0x11,      // RSA 1024 is weak
    1.17  
    1.18 -        pEpCtToBeChecked = 0x20,                // generic
    1.19 +        pEpCtToBeChecked = 0x20,                 // generic
    1.20          pEpCtSMIMEUnconfirmed = 0x21,
    1.21          pEpCtCMSUnconfirmed = 0x22,
    1.22  
    1.23 -        pEpCtStrongButUnconfirmed = 0x30,       // generic
    1.24 +        pEpCtStrongButUnconfirmed = 0x30,        // generic
    1.25          pEpCtOpenPGPUnconfirmed = 0x38,          // key at least 2048 bit RSA or EC
    1.26          pEpCtOTRUnconfirmed = 0x3a,
    1.27  
    1.28          // range 0x40 to 0x7f: unconfirmed encryption and anonymization
    1.29  
    1.30 -        pEpCtUnconfirmedEncAnon = 0x40,         // generic
    1.31 +        pEpCtUnconfirmedEncAnon = 0x40,          // generic
    1.32          pEpCtpEpUnconfirmed = 0x7f,
    1.33  
    1.34 -        pEpCtConfirmed = 0x80,                    // this bit decides if trust is confirmed
    1.35 +        pEpCtConfirmed = 0x80,                   // this bit decides if trust is confirmed
    1.36  
    1.37          // range 0x81 to 0x8f: reserved
    1.38          // range 0x90 to 0xbf: confirmed encryption
    1.39 @@ -155,17 +155,17 @@
    1.40          pEpCtConfirmedEncryption = 0x90,         // generic
    1.41          pEpCtOpenPGPWeak = 0x91,                 // RSA 1024 is weak
    1.42  
    1.43 -        pEpCtToBeCheckedConfirmed = 0xa0,      //generic
    1.44 +        pEpCtToBeCheckedConfirmed = 0xa0,        // generic
    1.45          pEpCtSMIME = 0xa1,
    1.46          pEpCtCMS = 0xa2,
    1.47  
    1.48          pEpCtStrongEncryption = 0xb0,            // generic
    1.49 -        pEpCtOpenPGP = 0xb8,                      // key at least 2048 bit RSA or EC
    1.50 +        pEpCtOpenPGP = 0xb8,                     // key at least 2048 bit RSA or EC
    1.51          pEpCtOTR = 0xba,
    1.52  
    1.53          // range 0xc0 to 0xff: confirmed encryption and anonymization
    1.54  
    1.55 -        pEpCtConfirmedEncAnon = 0xc0,           // generic
    1.56 +        pEpCtConfirmedEncAnon = 0xc0,            // generic
    1.57          pEpCtpEp = 0xff
    1.58      } pEpComType;
    1.59  
    1.60 @@ -207,6 +207,7 @@
    1.61      HRESULT BlacklistRetreive([out, retval] SAFEARRAY(BSTR) *blacklist);
    1.62  
    1.63  	// PGP compatibility functions
    1.64 +
    1.65  	HRESULT OpenPGP_list_keyinfo([in] BSTR search_pattern, [out, retval] SAFEARRAY(struct StringPair)* keyinfo_list);
    1.66  
    1.67      // Message API
    1.68 @@ -297,7 +298,6 @@
    1.69  	HRESULT ColorFromRating([in] pEpRating rating, [out, retval] pEpColor* pVal);
    1.70  
    1.71  	HRESULT RegisterCallbacks([in] IpEpEngineCallbacks* new_callback);
    1.72 -
    1.73  	HRESULT UnregisterCallbacks([in] IpEpEngineCallbacks* obsolete_callback);
    1.74  };
    1.75