Documentation ¶
Overview ¶
Code used in populating JSON objects to generating Keybase-style signatures.
A KeyFamily is a group of sibling keys that have equal power for a user. A family can consist of 1 PGP keys, and arbitrarily many NaCl Sibkeys. There also can be some subkeys dangling off for ECDH.
A module for syncing secrets with the server, such as SKB PGP keys, and server-halves of our various secret keys.
A module for syncing trackers from the server
Index ¶
- Constants
- Variables
- func AddPerUserKeyServerArg(serverArg JSONPayload, generation keybase1.PerUserKeyGeneration, ...)
- func AddToProofSetNoChecks(r RemoteProofChainLink, ps *ProofSet)
- func AppDataDir() (string, error)
- func AssertionIsTeam(au AssertionURL) bool
- func AttachedSignWrapper(out io.WriteCloser, key PGPKeyBundle, armored bool) (in io.WriteCloser, err error)
- func BootstrapActiveDeviceFromConfig(m MetaContext, online bool) (uid keybase1.UID, err error)
- func BootstrapActiveDeviceWithMetaContext(m MetaContext) (ok bool, uid keybase1.UID, err error)
- func BoxPublicKeyToKeybaseKID(k saltpack.BoxPublicKey) (ret keybase1.KID)
- func BtcAddrCheck(s string, _ *BtcOpts) (version int, pkhash []byte, err error)
- func CITimeMultiplier(g *GlobalContext) time.Duration
- func CTimeLog(ctx context.Context, name string, start time.Time, ...)
- func CTrace(ctx context.Context, log logger.Logger, msg string, f func() error) func()
- func CTraceOK(ctx context.Context, log logger.Logger, msg string, f func() bool) func()
- func CTraceTimed(ctx context.Context, log logger.Logger, msg string, f func() error, ...) func()
- func CanEncrypt(key GenericKey) bool
- func CanExec(p string) error
- func CancelDowngradeLease(ctx context.Context, g *GlobalContext, l keybase1.LeaseID) error
- func CanonicalProofName(t TypedChainLink) string
- func ChangeMountIcon(oldMount string, newMount string) error
- func CheckCurrentUIDDeviceID(m MetaContext) (err error)
- func CheckInstance(name string) bool
- func CheckInvitationCode(m MetaContext, code string) error
- func CheckKID(u *keybase1.UserPlusKeysV2AllIncarnations, kid keybase1.KID) (found bool, revokedAt *keybase1.KeybaseTime, deleted bool)
- func CheckPosted(m MetaContext, proofID string) (found bool, status keybase1.ProofStatus, state keybase1.ProofState, err error)
- func CheckPostedViaSigID(m MetaContext, sigID keybase1.SigID) (found bool, status keybase1.ProofStatus, state keybase1.ProofState, err error)
- func CheckTracking(g *GlobalContext) error
- func CheckUIDAgainstCasedUsername(uid keybase1.UID, username string) (err error)
- func CheckUIDAgainstUsername(uid keybase1.UID, username string) (err error)
- func Cicmp(s1, s2 string) bool
- func ClearSecretsOnDeprovision(m MetaContext, username NormalizedUsername) error
- func ClearStoredSecret(m MetaContext, username NormalizedUsername) error
- func CollectAssertions(e AssertionExpression) (remotes AssertionAnd, locals AssertionAnd)
- func CombineErrors(errs ...error) error
- func ComputeSigIDFromSigBody(body []byte) keybase1.SigID
- func Contains(s string, list []string) bool
- func CopyTagsToBackground(ctx context.Context) context.Context
- func CurrentBinaryRealpath() (string, error)
- func CurrentSaltpackVersion() saltpack.Version
- func DebugDumpKey(g *GlobalContext, name string, b []byte)
- func Decode58(inp string) (outp []byte, err error)
- func DecodeHexFixed(dst, src []byte) error
- func DefaultPassphraseArg(m MetaContext) keybase1.GUIEntryArg
- func DefaultPassphrasePromptArg(m MetaContext, username string) keybase1.GUIEntryArg
- func DelegatorAggregator(m MetaContext, ds []Delegator, extra AggSigProducer, ...) (err error)
- func DeleteAccount(m MetaContext, username NormalizedUsername, passphrase string) (err error)
- func DeletePrimary(m MetaContext) (err error)
- func DeriveFromSecret(inKey [32]byte, reason DeriveReason) (outKey [32]byte, err error)
- func DeviceStatusToString(i *int) string
- func Digest(r io.Reader) (string, error)
- func DigestForFileAtPath(path string) (string, error)
- func DisableProcessTracing() error
- func DiscardAndCloseBody(resp *http.Response) error
- func DisplayTrackArg(sessionID int, stmt string) *keybase1.DisplayTrackStatementArg
- func DrainPipe(rc io.Reader, sink func(string)) error
- func Encode58(inp []byte) string
- func EncryptPGPKey(bundle *openpgp.Entity, passphrase string) error
- func EncryptionKIDToPublicKeyBytes(bk []byte) ([]byte, error)
- func ErrToOk(err error) string
- func ExportErrorAsStatus(g *GlobalContext, e error) (ret *keybase1.Status)
- func ExportPGPIdentity(identity *openpgp.Identity) keybase1.PGPIdentity
- func ExportProofError(pe ProofError) (ret keybase1.ProofResult)
- func ExportRemoteProof(p RemoteProofChainLink) keybase1.RemoteProof
- func ExportTrackDiff(d TrackDiff) (res *keybase1.TrackDiff)
- func ExportTrackIDComponentToRevokedProof(tidc TrackIDComponent) keybase1.RevokedProof
- func ExportTrackSummary(l *TrackLookup, username string) *keybase1.TrackSummary
- func FastByteArrayEq(a, b []byte) bool
- func FileExists(path string) (bool, error)
- func FindBase64Block(s string, pattern []byte, url bool) bool
- func FindBase64Blocks(s string) []string
- func FindBase64Snippets(s string) []string
- func FindBestIdentifyComponent(e AssertionExpression) string
- func FindFirstBase64Block(s string) string
- func FindNextMerkleRootAfterReset(m MetaContext, arg keybase1.FindNextMerkleRootAfterResetArg) (res keybase1.NextMerkleRootRes, err error)
- func FindNextMerkleRootAfterRevoke(m MetaContext, arg keybase1.FindNextMerkleRootAfterRevokeArg) (res keybase1.NextMerkleRootRes, err error)
- func FindNextMerkleRootAfterTeamRemoval(m MetaContext, arg keybase1.FindNextMerkleRootAfterTeamRemovalArg) (res keybase1.NextMerkleRootRes, err error)
- func FindPGPPrivateKey(k *PGPKeyBundle) bool
- func ForceWallClock(t time.Time) time.Time
- func FormatImplicitTeamDisplayNameSuffix(conflict keybase1.ImplicitTeamConflictInfo) string
- func FormatTime(tm time.Time) string
- func GenericKeyEqual(k1, k2 GenericKey) bool
- func GetAllProvisionedUsernames(m MetaContext) (current NormalizedUsername, all []NormalizedUsername, err error)
- func GetAppStatusCode(err error) (code keybase1.StatusCode, ok bool)
- func GetBundledCAsFromHost(host string) (rootCA []byte, ok bool)
- func GetConfiguredAccounts(m MetaContext, s SecretStoreAll) ([]keybase1.ConfiguredAccount, error)
- func GetExtendedStatus(m MetaContext) (res keybase1.ExtendedStatus, err error)
- func GetInvitationCode(m MetaContext) (string, error)
- func GetKID(w *jsonw.Wrapper) (kid keybase1.KID, err error)
- func GetKeybasePassphrase(m MetaContext, ui SecretUI, username, retryMsg string) (keybase1.GetPassphraseRes, error)
- func GetLinkIDVoid(w *jsonw.Wrapper, l *LinkID, e *error)
- func GetNodeHashVoid(w *jsonw.Wrapper, nhp *NodeHash, errp *error)
- func GetOneKey(jw *jsonw.Wrapper) (*PGPKeyBundle, *Warnings, error)
- func GetPGPFingerprintVoid(w *jsonw.Wrapper, p *PGPFingerprint, e *error)
- func GetPaperKeyForCryptoPassphrase(m MetaContext, ui SecretUI, reason string, devices []*Device) (string, error)
- func GetPaperKeyPassphrase(m MetaContext, ui SecretUI, username string, lastErr error) (string, error)
- func GetPassphraseStreamViaPrompt(m MetaContext) (pps *PassphraseStream, tsec Triplesec, err error)
- func GetPassphraseUntilCheck(m MetaContext, arg keybase1.GUIEntryArg, prompter PassphrasePrompter, ...) (keybase1.GetPassphraseRes, error)
- func GetPassphraseUntilCheckWithChecker(m MetaContext, arg keybase1.GUIEntryArg, prompter PassphrasePrompter, ...) (keybase1.GetPassphraseRes, error)
- func GetPlatformString() string
- func GetProxyCAs(out *x509.CertPool, r ConfigReader) (ret *x509.CertPool, err error)
- func GetSecret(m MetaContext, ui SecretUI, title, prompt, retryMsg string, ...) (keybase1.GetPassphraseRes, error)
- func GetSigID(w *jsonw.Wrapper, suffix bool) (keybase1.SigID, error)
- func GetSortedCPUProfileFiles(dir string) ([]string, error)
- func GetSortedTraceFiles(dir string) ([]string, error)
- func GetTriplesecMaybePrompt(m MetaContext) (tsec Triplesec, ppgen PassphraseGeneration, err error)
- func GetUID(w *jsonw.Wrapper) (keybase1.UID, error)
- func GetUIDVoid(w *jsonw.Wrapper, u *keybase1.UID, e *error)
- func GiveMeAnS(i int) string
- func HexDecodeQuoted(data []byte) ([]byte, error)
- func ImportStatusAsError(g *GlobalContext, s *keybase1.Status) error
- func IsAppStatusCode(err error, code keybase1.StatusCode) bool
- func IsAppStatusErrorCode(err error, code keybase1.StatusCode) bool
- func IsArmored(buf []byte) bool
- func IsDirEmpty(dir string) (bool, error)
- func IsEmpty(s string) bool
- func IsExecError(err error) bool
- func IsIdentifyProofError(err error) bool
- func IsIn(needle string, haystack []string, ci bool) bool
- func IsKeybaseAdmin(uid keybase1.UID) bool
- func IsMobilePlatform() bool
- func IsNo(s string) bool
- func IsNoKeyError(err error) bool
- func IsNoSpaceOnDeviceError(err error) bool
- func IsNotFoundError(err error) bool
- func IsPGP(key GenericKey) bool
- func IsPGPAlgo(algo AlgoType) bool
- func IsResolutionError(err error) bool
- func IsSocialAssertion(ctx AssertionContext, s string) bool
- func IsSocketClosedError(e error) bool
- func IsSystemAdminUser() (isAdminUser bool, match string, err error)
- func IsValidHostname(s string) bool
- func IsYes(s string) bool
- func JoinPredicate(arr []string, delimeter string, f func(s string) bool) string
- func KIDIsDeviceEncrypt(kid keybase1.KID) bool
- func KIDIsDeviceVerify(kid keybase1.KID) bool
- func KIDIsPGP(kid keybase1.KID) bool
- func KbOpenSig(armored string) ([]byte, error)
- func KeyLookupByBoxPublicKey(g *GlobalContext, k saltpack.BoxPublicKey) (username string, uid keybase1.UID, err error)
- func KeyLookupKIDIncludingRevoked(g *GlobalContext, k keybase1.KID) (username string, uid keybase1.UID, err error)
- func KeyMatchesQuery(key GenericKey, q string, exact bool) bool
- func KeyProof(m MetaContext, arg Delegator) (ret *jsonw.Wrapper, err error)
- func KeybaseEmailAddress(s string) string
- func LinkEntropy() (string, error)
- func LoadUnlockedDeviceKeys(m MetaContext, uid keybase1.UID, deviceID keybase1.DeviceID, online bool) (uv keybase1.UserVersion, sib GenericKey, sub GenericKey, deviceName string, ...)
- func LoadUserEmails(g *GlobalContext) (emails []keybase1.Email, err error)
- func LoadUserPlusKeys(ctx context.Context, g *GlobalContext, uid keybase1.UID, ...) (keybase1.UserPlusKeys, error)
- func LocalDataDir() (string, error)
- func LogTagsFromContext(ctx context.Context) (map[interface{}]string, bool)
- func LogTagsToString(ctx context.Context) string
- func LookupSaltForUID(m MetaContext, uid keybase1.UID) (salt []byte, err error)
- func MPackDecode(data []byte, res interface{}) error
- func MPackEncode(input interface{}) ([]byte, error)
- func MakeAndPostKeyPseudonyms(m MetaContext, pnymInfos *[]KeyPseudonymInfo) (err error)
- func MakeByte24(a []byte) [24]byte
- func MakeByte32(a []byte) [32]byte
- func MakeByte32Soft(a []byte) ([32]byte, error)
- func MakeCPUProfileFilename(dir string, start time.Time, duration time.Duration) string
- func MakeParentDirs(log SkinnyLogger, filename string) error
- func MakeProofChecker(c ExternalServicesCollector, l RemoteProofChainLink) (ProofChecker, ProofError)
- func MakeTraceFilename(dir string, start time.Time, duration time.Duration) string
- func MakeURI(prot string, host string) string
- func MakeWrapError(g *GlobalContext) func(e error) interface{}
- func MobilePermissionDeniedCheck(g *GlobalContext, err error, msg string)
- func MsgpackDecode(dst interface{}, src []byte) (err error)
- func MsgpackDecodeAll(data []byte, handle *codec.MsgpackHandle, out interface{}) error
- func MsgpackEncode(src interface{}) (dst []byte, err error)
- func NameCmp(n1, n2 string) bool
- func NameTrim(s string) string
- func NewAPIEngines(g *GlobalContext) (*InternalAPIEngine, *ExternalAPIEngine, error)
- func NewDeviceID() (keybase1.DeviceID, error)
- func NewLoginRequiredError(s string) error
- func NewLoopbackConnPair() (*LoopbackConn, *LoopbackConn)
- func NewNoTriplesecError() error
- func NewPerUserKeyBox(contents PerUserKeySeed, receiverKey NaclDHKeyPair, senderKey NaclDHKeyPair, ...) (keybase1.PerUserKeyBox, error)
- func NewRecipientNotFoundError(message string) error
- func NewTeamProvisionalError(canKey bool, isPublic bool, dn string) error
- func NewTransportFromSocket(g *GlobalContext, s net.Conn) rpc.Transporter
- func NewTypedChainLink(cl *ChainLink) (ret TypedChainLink, w Warning)
- func NoiseXOR(secret [32]byte, noise NoiseBytes) ([]byte, error)
- func NormalizeSocialAssertion(ctx AssertionContext, s string) (keybase1.SocialAssertion, bool)
- func NormalizedUsernamesToStrings(names []NormalizedUsername) []string
- func OpenSig(armored string) (ret []byte, id keybase1.SigID, err error)
- func OpenTempFile(prefix string, suffix string, mode os.FileMode) (string, *os.File, error)
- func PGPEncrypt(source io.Reader, sink io.WriteCloser, signer *PGPKeyBundle, ...) error
- func PGPEncryptString(input string, signer *PGPKeyBundle, recipients []*PGPKeyBundle) ([]byte, error)
- func PGPKeyRawToArmored(raw []byte, priv bool) (ret string, err error)
- func PGPLookup(g *GlobalContext, id uint64) (username string, uid keybase1.UID, err error)
- func PGPLookupFingerprint(g *GlobalContext, fp *PGPFingerprint) (username string, uid keybase1.UID, err error)
- func PGPLookupHex(g *GlobalContext, hexID string) (username string, uid keybase1.UID, err error)
- func PacketArmoredEncode(p Packetable) (ret string, err error)
- func ParseCA(raw string) (*x509.CertPool, error)
- func ParseGenericKey(bundle string) (GenericKey, *Warnings, error)
- func ParseGpgIndexStream(g *GlobalContext, stream io.Reader) (ki *GpgKeyIndex, w Warnings, err error)
- func ParseImplicitTeamDisplayName(ctx AssertionContext, s string, isPublic bool) (ret keybase1.ImplicitTeamDisplayName, err error)
- func ParseImplicitTeamDisplayNameSuffix(suffix string) (ret *keybase1.ImplicitTeamConflictInfo, err error)
- func ParseImplicitTeamTLFName(ctx AssertionContext, s string) (keybase1.ImplicitTeamDisplayName, error)
- func ParseStellarAccountID(idStr string) (stellar1.AccountID, error)
- func ParseStellarSecretKey(secStr string) (stellar1.SecretKey, stellar1.AccountID, *keypair.Full, error)
- func ParseTeamPrivateKBFSPath(s string) (ret keybase1.TeamName, err error)
- func PassphraseLoginNoPrompt(m MetaContext, usernameOrEmail string, passphrase string) (err error)
- func PassphraseLoginNoPromptThenSecretStore(m MetaContext, usernameOrEmail string, passphrase string, ...) (err error)
- func PassphraseLoginPrompt(m MetaContext, usernameOrEmail string, maxAttempts int) (err error)
- func PassphraseLoginPromptThenSecretStore(m MetaContext, usernameOrEmail string, maxAttempts int, failOnStoreError bool) (err error)
- func PerUserKeyProof(m MetaContext, me *User, pukSigKID keybase1.KID, pukEncKID keybase1.KID, ...) (*jsonw.Wrapper, error)
- func PickFirstError(errors ...error) error
- func PlatformSpecificUpgradeInstructions(g *GlobalContext, upgradeURI string)
- func PlatformSpecificUpgradeInstructionsString() (string, error)
- func Pluralize(n int, singular string, plural string, nshow bool) string
- func PosixLineEndings(arg string) string
- func PostDeviceLKS(m MetaContext, deviceID keybase1.DeviceID, deviceType string, ...) error
- func PostInviteRequest(m MetaContext, arg InviteRequestArg) (err error)
- func ProofErrorIsPvlBad(pe ProofError) bool
- func ProofErrorIsSoft(pe ProofError) bool
- func ProofErrorToState(pe ProofError) keybase1.ProofState
- func RandBytes(length int) ([]byte, error)
- func RandBytesWithSuffix(length int, suffix byte) ([]byte, error)
- func RandHexString(prefix string, numbytes int) (string, error)
- func RandInt() (int, error)
- func RandInt64() (int64, error)
- func RandIntn(n int) int
- func RandString(prefix string, numbytes int) (string, error)
- func RandStringB64(numTriads int) string
- func RandomHmacKey() [32]byte
- func RandomNaclDHNonce() (nonce [NaclDHNonceSize]byte, err error)
- func ReadOneKeyFromBytes(b []byte) (*PGPKeyBundle, *Warnings, error)
- func ReadOneKeyFromString(originalArmor string) (*PGPKeyBundle, *Warnings, error)
- func ReadOneKeyFromStringLiberal(originalArmor string) (*PGPKeyBundle, *Warnings, error)
- func ReadPrivateKeyFromString(s string) (*PGPKeyBundle, *Warnings, error)
- func RemoteSettingsRepairman(g *GlobalContext) error
- func RemoveLocalTracks(m MetaContext, tracker keybase1.UID, trackee keybase1.UID) error
- func RemoveNilErrors(errs []error) []error
- func RequestDowngradeLeaseByKID(ctx context.Context, g *GlobalContext, kids []keybase1.KID) (lease *Lease, mr *MerkleRoot, err error)
- func RequestDowngradeLeaseBySigIDs(ctx context.Context, g *GlobalContext, sigIDs []keybase1.SigID) (lease *Lease, mr *MerkleRoot, err error)
- func RequestDowngradeLeaseByTeam(ctx context.Context, g *GlobalContext, teamID keybase1.TeamID, ...) (lease *Lease, mr *MerkleRoot, err error)
- func ResetAccount(m MetaContext, username NormalizedUsername, passphrase string) (err error)
- func RunBug3964Repairman(m MetaContext) error
- func RunSyncer(m MetaContext, s Syncer, uid keybase1.UID, loggedIn bool, forceReload bool) (err error)
- func RunSyncerCached(m MetaContext, s Syncer, uid keybase1.UID) (err error)
- func SafeWriteToFile(g SafeWriteLogger, t SafeWriter, mode os.FileMode) error
- func SaferDLLLoading() error
- func SaltpackDecrypt(m MetaContext, source io.Reader, sink io.WriteCloser, ...) (*saltpack.MessageKeyInfo, error)
- func SaltpackEncrypt(m MetaContext, arg *SaltpackEncryptArg) error
- func SaltpackSign(g *GlobalContext, source io.ReadCloser, sink io.WriteCloser, ...) error
- func SaltpackSignDetached(g *GlobalContext, source io.ReadCloser, sink io.WriteCloser, ...) error
- func SaltpackVerify(g SaltpackVerifyContext, source io.Reader, sink io.WriteCloser, ...) error
- func SaltpackVerifyDetached(g SaltpackVerifyContext, message io.Reader, signature []byte, ...) error
- func SaltpackVersionFromArg(saltpackVersionArg int) (saltpack.Version, error)
- func SecWordList(entropy int) ([]string, error)
- func SecureByteArrayEq(a, b []byte) bool
- func SetDeviceCloneState(m MetaContext, d DeviceCloneState) error
- func ShortCA(raw string) string
- func ShredFile(filename string) error
- func SigAssertKbPayload(armored string, expected []byte) (sigID keybase1.SigID, err error)
- func SigAssertPGPPayload(armored string, expected []byte) (sigID keybase1.SigID, err error)
- func SigAssertPayload(armored string, expected []byte) (sigID keybase1.SigID, err error)
- func SigExtractKbPayloadAndKID(armored string) (payload []byte, kid keybase1.KID, sigID keybase1.SigID, err error)
- func SigExtractPGPPayload(armored string) (payload []byte, sigID keybase1.SigID, err error)
- func SigExtractPayloadAndKID(armored string) (payload []byte, kid keybase1.KID, sigID keybase1.SigID, err error)
- func SigningPublicKeyToKeybaseKID(k saltpack.SigningPublicKey) (ret keybase1.KID)
- func SimpleSign(payload []byte, key PGPKeyBundle) (out string, id keybase1.SigID, err error)
- func SleepUntilWithContext(ctx context.Context, clock clockwork.Clock, deadline time.Time) error
- func SplitByRunes(s string, separators []rune) []string
- func SplitHost(joined string) (host string, port int, err error)
- func SplitPath(s string) []string
- func StatSKBKeyringMTime(un NormalizedUsername, g *GlobalContext) (mtime time.Time, err error)
- func StellarProof(m MetaContext, me *User, walletAddress stellar1.AccountID, ...) (*jsonw.Wrapper, error)
- func StellarSimplifyAmount(amount string) string
- func StoreLocalTrack(m MetaContext, tracker keybase1.UID, trackee keybase1.UID, expiringLocal bool, ...) error
- func StoreSecretAfterLogin(m MetaContext, n NormalizedUsername, uid keybase1.UID, ...) (err error)
- func StoreSecretAfterLoginWithLKS(m MetaContext, n NormalizedUsername, lks *LKSec) (err error)
- func StretchPassphrase(g *GlobalContext, passphrase string, salt []byte) (tsec Triplesec, pps *PassphraseStream, err error)
- func Tablify(writer io.Writer, headings []string, rowfunc func() []string)
- func TablifyWithTabWriter(w *tabwriter.Writer, headings []string, rowfunc func() []string)
- func TempFile(prefix string) (string, error)
- func TempFileName(prefix string) (tmp string, err error)
- func TimeLog(name string, start time.Time, out func(string, ...interface{}))
- func TorParseProxy(s string) (*url.URL, error)
- func Trace(log logger.Logger, msg string, f func() error) func()
- func TraceOK(log logger.Logger, msg string, f func() bool) func()
- func TraceTimed(log logger.Logger, msg string, f func() error) func()
- func TrimCicmp(s1, s2 string) bool
- func UIDFromHex(s string) (keybase1.UID, error)
- func UIDWrapper(uid keybase1.UID) *jsonw.Wrapper
- func UidsToString(uids []keybase1.UID) string
- func Uniquify(inp []string) []string
- func UnixToTimeMappingZero(unixTime int64) time.Time
- func Unquote(data []byte) string
- func UnverifiedPassphraseStream(m MetaContext, uid keybase1.UID, passphrase string) (tsec Triplesec, ret *PassphraseStream, err error)
- func UpdateDeviceCloneState(m MetaContext) (before int, after int, err error)
- func UseCITime(g *GlobalContext) bool
- func UserErrorFromStatus(s keybase1.StatusCode) error
- func UsernameToUID(s string) keybase1.UID
- func UsernameToUIDPreserveCase(s string) keybase1.UID
- func VerifyMerkleRootAndKBFS(m MetaContext, arg keybase1.VerifyMerkleRootAndKBFSArg) (err error)
- func VerifyReverseSig(g *GlobalContext, key GenericKey, path string, payload *jsonw.Wrapper, ...) (err error)
- func VersionMessage(linefn func(string))
- func VersionString() string
- func WhitespaceNormalize(s string) string
- func WithLogTag(ctx context.Context, k string) context.Context
- func WithLogTagWithValue(ctx context.Context, k, v string) context.Context
- func WrapError(e error) interface{}
- func XORBytes(dst, a, b []byte) int
- type API
- type APIArg
- type APIContext
- type APIError
- type APINetError
- type APIRes
- type APIResponseWrapper
- type APISessionType
- type APIStatus
- type APITokener
- type AccountResetError
- type ActiveDevice
- func LoadProvisionalActiveDevice(m MetaContext, uid keybase1.UID, deviceID keybase1.DeviceID, online bool) (ret *ActiveDevice, err error)
- func NewActiveDevice() *ActiveDevice
- func NewActiveDeviceWithDeviceWithKeys(m MetaContext, uv keybase1.UserVersion, d *DeviceWithKeys) *ActiveDevice
- func NewPaperKeyActiveDevice(m MetaContext, uv keybase1.UserVersion, d *DeviceWithKeys) *ActiveDevice
- func NewProvisionalActiveDevice(m MetaContext, uv keybase1.UserVersion, d keybase1.DeviceID, sigKey GenericKey, ...) *ActiveDevice
- func (a *ActiveDevice) AllFields() (uv keybase1.UserVersion, deviceID keybase1.DeviceID, deviceName string, ...)
- func (a *ActiveDevice) CachePaperKey(m MetaContext, k *DeviceWithKeys)
- func (a *ActiveDevice) CachePassphraseStream(c *PassphraseStreamCache)
- func (a *ActiveDevice) CheckForUsername(m MetaContext, n NormalizedUsername) (err error)
- func (a *ActiveDevice) Clear() error
- func (a *ActiveDevice) ClearCaches()
- func (a *ActiveDevice) ClearPaperKey(m MetaContext)
- func (a *ActiveDevice) ClearPassphraseStreamCache()
- func (a *ActiveDevice) Copy(m MetaContext, src *ActiveDevice) error
- func (a *ActiveDevice) CopyCacheToLoginContextIfForUserVersion(m MetaContext, lc LoginContext, uv keybase1.UserVersion) (err error)
- func (a *ActiveDevice) DeviceID() keybase1.DeviceID
- func (a *ActiveDevice) Dump(m MetaContext, prefix string)
- func (a *ActiveDevice) EncryptionKey() (GenericKey, error)
- func (a *ActiveDevice) GetUsernameAndUserVersionIfValid(m MetaContext) (uv keybase1.UserVersion, un NormalizedUsername)
- func (a *ActiveDevice) HaveKeys() bool
- func (a *ActiveDevice) IsValidFor(uid keybase1.UID, deviceID keybase1.DeviceID) bool
- func (a *ActiveDevice) KeyByType(t SecretKeyType) (GenericKey, error)
- func (a *ActiveDevice) Keyring(m MetaContext) (ret *SKBKeyringFile, err error)
- func (a *ActiveDevice) NIST(ctx context.Context) (*NIST, error)
- func (a *ActiveDevice) NISTAndUID(ctx context.Context) (*NIST, keybase1.UID, error)
- func (a *ActiveDevice) NaclEncryptionKey() (*NaclDHKeyPair, error)
- func (a *ActiveDevice) Name() string
- func (a *ActiveDevice) PaperKey(m MetaContext) *DeviceWithKeys
- func (a *ActiveDevice) PaperKeyWrapper(m MetaContext) *SelfDestructingDeviceWithKeys
- func (a *ActiveDevice) PassphraseStream() *PassphraseStream
- func (a *ActiveDevice) PassphraseStreamCache() *PassphraseStreamCache
- func (a *ActiveDevice) SecretPromptCancelTimer() *CancelTimer
- func (a *ActiveDevice) Set(m MetaContext, uv keybase1.UserVersion, deviceID keybase1.DeviceID, ...) error
- func (a *ActiveDevice) SetOrClear(m MetaContext, a2 *ActiveDevice) error
- func (a *ActiveDevice) SigningKey() (GenericKey, error)
- func (a *ActiveDevice) SigningKeyForUID(u keybase1.UID) GenericKey
- func (a *ActiveDevice) SyncSecrets(m MetaContext) (ret *SecretSyncer, err error)
- func (a *ActiveDevice) SyncSecretsForUID(m MetaContext, u keybase1.UID, force bool) (ret *SecretSyncer, err error)
- func (a *ActiveDevice) SyncSecretsForce(m MetaContext) (ret *SecretSyncer, err error)
- func (a *ActiveDevice) TriplesecAndGeneration() (Triplesec, PassphraseGeneration)
- func (a *ActiveDevice) UID() keybase1.UID
- func (a *ActiveDevice) UserVersion() keybase1.UserVersion
- func (a *ActiveDevice) Username(m MetaContext) NormalizedUsername
- func (a *ActiveDevice) Valid() bool
- type AggSigProducer
- type AlgoType
- type AlreadyRegisteredError
- type AppConfig
- func (c AppConfig) GetAppType() AppType
- func (c AppConfig) GetChatInboxSourceLocalizeThreads() (int, bool)
- func (c AppConfig) GetDebug() (bool, bool)
- func (c AppConfig) GetHome() string
- func (c AppConfig) GetLevelDBNumFiles() (int, bool)
- func (c AppConfig) GetLinkCacheSize() (int, bool)
- func (c AppConfig) GetLocalRPCDebug() string
- func (c AppConfig) GetLogFile() string
- func (c AppConfig) GetRunMode() (RunMode, error)
- func (c AppConfig) GetSecurityAccessGroupOverride() (bool, bool)
- func (c AppConfig) GetServerURI() string
- func (c AppConfig) GetSlowGregorConn() (bool, bool)
- func (c AppConfig) GetVDebugSetting() string
- type AppState
- type AppStatus
- type AppStatusEmbed
- type AppStatusError
- type AppType
- type ApplyFn
- type AssertionAnd
- func (a AssertionAnd) CollectUrls(v []AssertionURL) []AssertionURL
- func (a AssertionAnd) HasFactor(pf Proof) bool
- func (a AssertionAnd) HasOr() bool
- func (a AssertionAnd) Len() int
- func (a AssertionAnd) MatchSet(ps ProofSet) bool
- func (a AssertionAnd) NeedsParens() bool
- func (a AssertionAnd) String() string
- func (a AssertionAnd) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
- type AssertionContext
- type AssertionDNS
- func (a AssertionDNS) CheckAndNormalize(_ AssertionContext) (AssertionURL, error)
- func (a AssertionDNS) CollectUrls(v []AssertionURL) []AssertionURL
- func (a AssertionDNS) IsRemote() bool
- func (a AssertionDNS) MatchSet(ps ProofSet) bool
- func (a AssertionDNS) ToLookup() (key, value string, err error)
- func (a AssertionDNS) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
- type AssertionExpression
- func AssertionParse(ctx AssertionContext, s string) (AssertionExpression, error)
- func AssertionParseAndOnly(ctx AssertionContext, s string) (AssertionExpression, error)
- func ParseAssertionList(ctx AssertionContext, assertionsStr string) (res []AssertionExpression, err error)
- func ParseAssertionsWithReaders(ctx AssertionContext, assertions string) (writers, readers []AssertionExpression, err error)
- type AssertionFingerprint
- func (a AssertionFingerprint) CheckAndNormalize(_ AssertionContext) (AssertionURL, error)
- func (a AssertionFingerprint) CollectUrls(v []AssertionURL) []AssertionURL
- func (a AssertionFingerprint) IsFingerprint() bool
- func (a AssertionFingerprint) MatchProof(proof Proof) bool
- func (a AssertionFingerprint) MatchSet(ps ProofSet) bool
- func (a AssertionFingerprint) ToLookup() (key, value string, err error)
- func (a AssertionFingerprint) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
- type AssertionHTTP
- func (a AssertionHTTP) CheckAndNormalize(_ AssertionContext) (AssertionURL, error)
- func (a AssertionHTTP) CollectUrls(v []AssertionURL) []AssertionURL
- func (a AssertionHTTP) IsRemote() bool
- func (a AssertionHTTP) Keys() []string
- func (a AssertionHTTP) MatchSet(ps ProofSet) bool
- func (a AssertionHTTP) ToLookup() (key, value string, err error)
- func (a AssertionHTTP) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
- type AssertionHTTPS
- func (a AssertionHTTPS) CheckAndNormalize(_ AssertionContext) (AssertionURL, error)
- func (a AssertionHTTPS) CollectUrls(v []AssertionURL) []AssertionURL
- func (a AssertionHTTPS) IsRemote() bool
- func (a AssertionHTTPS) MatchSet(ps ProofSet) bool
- func (a AssertionHTTPS) ToLookup() (key, value string, err error)
- func (a AssertionHTTPS) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
- type AssertionKeybase
- func (a AssertionKeybase) CheckAndNormalize(_ AssertionContext) (AssertionURL, error)
- func (a AssertionKeybase) CollectUrls(v []AssertionURL) []AssertionURL
- func (a AssertionKeybase) IsKeybase() bool
- func (a AssertionKeybase) MatchSet(ps ProofSet) bool
- func (a AssertionKeybase) String() string
- func (a AssertionKeybase) ToLookup() (key, value string, err error)
- func (a AssertionKeybase) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
- type AssertionOr
- func (a AssertionOr) CollectUrls(v []AssertionURL) []AssertionURL
- func (a AssertionOr) HasOr() bool
- func (a AssertionOr) MatchSet(ps ProofSet) bool
- func (a AssertionOr) NeedsParens() bool
- func (a AssertionOr) String() string
- func (a AssertionOr) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
- type AssertionParseError
- type AssertionSocial
- func (a AssertionSocial) CheckAndNormalize(ctx AssertionContext) (AssertionURL, error)
- func (a AssertionSocial) CollectUrls(v []AssertionURL) []AssertionURL
- func (a AssertionSocial) GetValue() string
- func (a AssertionSocial) IsRemote() bool
- func (a AssertionSocial) IsSocial() bool
- func (a AssertionSocial) MatchSet(ps ProofSet) bool
- func (a AssertionSocial) ToLookup() (key, value string, err error)
- func (a AssertionSocial) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
- type AssertionTeamID
- func (a AssertionTeamID) CheckAndNormalize(_ AssertionContext) (AssertionURL, error)
- func (a AssertionTeamID) CollectUrls(v []AssertionURL) []AssertionURL
- func (a AssertionTeamID) IsTeamID() bool
- func (a AssertionTeamID) MatchSet(ps ProofSet) bool
- func (a AssertionTeamID) ToLookup() (key, value string, err error)
- func (a AssertionTeamID) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
- func (a AssertionTeamID) ToTeamID() keybase1.TeamID
- type AssertionTeamName
- func (a AssertionTeamName) CheckAndNormalize(_ AssertionContext) (AssertionURL, error)
- func (a AssertionTeamName) CollectUrls(v []AssertionURL) []AssertionURL
- func (a AssertionTeamName) IsTeamName() bool
- func (a AssertionTeamName) MatchSet(ps ProofSet) bool
- func (a AssertionTeamName) ToLookup() (key, value string, err error)
- func (a AssertionTeamName) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
- func (a AssertionTeamName) ToTeamName() keybase1.TeamName
- type AssertionUID
- func (a AssertionUID) CheckAndNormalize(_ AssertionContext) (AssertionURL, error)
- func (a AssertionUID) CollectUrls(v []AssertionURL) []AssertionURL
- func (a AssertionUID) IsUID() bool
- func (a AssertionUID) MatchSet(ps ProofSet) bool
- func (a AssertionUID) ToLookup() (key, value string, err error)
- func (a AssertionUID) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
- func (a AssertionUID) ToUID() keybase1.UID
- type AssertionURL
- type AssertionURLBase
- func (b AssertionURLBase) CacheKey() string
- func (b AssertionURLBase) GetKey() string
- func (b AssertionURLBase) GetValue() string
- func (b AssertionURLBase) HasOr() bool
- func (b AssertionURLBase) IsFingerprint() bool
- func (b AssertionURLBase) IsKeybase() bool
- func (b AssertionURLBase) IsRemote() bool
- func (b AssertionURLBase) IsSocial() bool
- func (b AssertionURLBase) IsTeamID() bool
- func (b AssertionURLBase) IsTeamName() bool
- func (b AssertionURLBase) IsUID() bool
- func (b AssertionURLBase) Keys() []string
- func (b AssertionURLBase) MatchProof(proof Proof) bool
- func (b AssertionURLBase) NeedsParens() bool
- func (b AssertionURLBase) String() string
- func (b AssertionURLBase) ToKeyValuePair() (string, string)
- func (b AssertionURLBase) ToSocialAssertionHelper() (sa keybase1.SocialAssertion, err error)
- func (b AssertionURLBase) ToTeamID() (ret keybase1.TeamID)
- func (b AssertionURLBase) ToTeamName() (ret keybase1.TeamName)
- func (b AssertionURLBase) ToUID() (ret keybase1.UID)
- type AssertionWeb
- func (a AssertionWeb) CheckAndNormalize(_ AssertionContext) (AssertionURL, error)
- func (a AssertionWeb) CollectUrls(v []AssertionURL) []AssertionURL
- func (a AssertionWeb) IsRemote() bool
- func (a AssertionWeb) Keys() []string
- func (a AssertionWeb) MatchSet(ps ProofSet) bool
- func (a AssertionWeb) ToLookup() (key, value string, err error)
- func (a AssertionWeb) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
- type B
- type BackoffPolicy
- type BadEmailError
- type BadFingerprintError
- type BadInvitationCodeError
- type BadKeyError
- type BadNameError
- type BadRevocationError
- type BadServiceError
- type BadSessionError
- type BadSigError
- type BadSignaturePrefixError
- type BadUsernameError
- type Base
- type Base64Finder
- type BaseAPIEngine
- type BaseServiceType
- func (t BaseServiceType) BaseAllStringKeys(st ServiceType) []string
- func (t BaseServiceType) BaseCheckProofForURL(text string, id keybase1.SigID) (err error)
- func (t BaseServiceType) BaseCheckProofTextFull(text string, id keybase1.SigID, sig string) (err error)
- func (t BaseServiceType) BaseCheckProofTextShort(text string, id keybase1.SigID, med bool) error
- func (t BaseServiceType) BaseGetProofType(st ServiceType) string
- func (t BaseServiceType) BaseRecheckProofPosting(tryNumber int, status keybase1.ProofStatus) (warning *Markup, err error)
- func (t BaseServiceType) BaseToServiceJSON(st ServiceType, un string) *jsonw.Wrapper
- func (t BaseServiceType) FormatProofText(m MetaContext, ppr *PostProofRes) (string, error)
- func (t BaseServiceType) GetAPIArgKey() string
- func (t BaseServiceType) IsDevelOnly() bool
- func (t BaseServiceType) LastWriterWins() bool
- func (t BaseServiceType) PreProofCheck(MetaContext, string) (*Markup, error)
- func (t BaseServiceType) PreProofWarning(remotename string) *Markup
- type BgTicker
- type BtcOpts
- type BucketDict
- type BufferCloser
- type BurstCache
- type BurstCacheKey
- type BurstCacheLoader
- type CachedFullSelf
- func (m *CachedFullSelf) HandleUserChanged(u keybase1.UID) error
- func (m *CachedFullSelf) New() FullSelfer
- func (m *CachedFullSelf) OnLogin() error
- func (m *CachedFullSelf) Update(ctx context.Context, u *User) (err error)
- func (m *CachedFullSelf) WithSelf(ctx context.Context, f func(u *User) error) error
- func (m *CachedFullSelf) WithSelfForcePoll(ctx context.Context, f func(u *User) error) error
- func (m *CachedFullSelf) WithUser(arg LoadUserArg, f func(u *User) error) (err error)
- type CachedUPAKLoader
- func (u *CachedUPAKLoader) Batcher(ctx context.Context, getArg func(int) *LoadUserArg, ...) (err error)
- func (u *CachedUPAKLoader) CheckDeviceForUIDAndUsername(ctx context.Context, uid keybase1.UID, did keybase1.DeviceID, ...) (err error)
- func (u *CachedUPAKLoader) CheckKIDForUID(ctx context.Context, uid keybase1.UID, kid keybase1.KID) (found bool, revokedAt *keybase1.KeybaseTime, deleted bool, err error)
- func (u *CachedUPAKLoader) ClearMemory()
- func (u *CachedUPAKLoader) Disable()
- func (u *CachedUPAKLoader) Invalidate(ctx context.Context, uid keybase1.UID)
- func (u *CachedUPAKLoader) ListFollowedUIDs(ctx context.Context, uid keybase1.UID) ([]keybase1.UID, error)
- func (u *CachedUPAKLoader) Load(arg LoadUserArg) (*keybase1.UserPlusAllKeys, *User, error)
- func (u *CachedUPAKLoader) LoadDeviceKey(ctx context.Context, uid keybase1.UID, deviceID keybase1.DeviceID) (upakv1 *keybase1.UserPlusAllKeys, deviceKey *keybase1.PublicKey, ...)
- func (u *CachedUPAKLoader) LoadKeyV2(ctx context.Context, uid keybase1.UID, kid keybase1.KID) (ret *keybase1.UserPlusKeysV2, key *keybase1.PublicKeyV2NaCl, ...)
- func (u *CachedUPAKLoader) LoadUPAKWithDeviceID(ctx context.Context, uid keybase1.UID, deviceID keybase1.DeviceID) (*keybase1.UserPlusKeysV2AllIncarnations, error)
- func (u *CachedUPAKLoader) LoadUserPlusKeys(ctx context.Context, uid keybase1.UID, pollForKID keybase1.KID) (keybase1.UserPlusKeys, error)
- func (u *CachedUPAKLoader) LoadV2(arg LoadUserArg) (*keybase1.UserPlusKeysV2AllIncarnations, *User, error)
- func (u *CachedUPAKLoader) LoadV2WithKID(ctx context.Context, uid keybase1.UID, kid keybase1.KID) (*keybase1.UserPlusKeysV2AllIncarnations, error)
- func (u *CachedUPAKLoader) LookupUID(ctx context.Context, un NormalizedUsername) (keybase1.UID, error)
- func (u *CachedUPAKLoader) LookupUsername(ctx context.Context, uid keybase1.UID) (NormalizedUsername, error)
- func (u *CachedUPAKLoader) LookupUsernameAndDevice(ctx context.Context, uid keybase1.UID, did keybase1.DeviceID) (username NormalizedUsername, deviceName string, deviceType string, err error)
- func (u *CachedUPAKLoader) LookupUsernameUPAK(ctx context.Context, uid keybase1.UID) (NormalizedUsername, error)
- func (u *CachedUPAKLoader) PutUserToCache(ctx context.Context, user *User) error
- type CachedUserLoadInfo
- type CancelTimer
- type CanceledError
- type ChainLink
- func (c ChainLink) AllowStubbing() bool
- func (c *ChainLink) CheckNameAndID(s NormalizedUsername, i keybase1.UID) error
- func (c *ChainLink) Copy() ChainLink
- func (c *ChainLink) GetCTime() time.Time
- func (c *ChainLink) GetETime() time.Time
- func (c *ChainLink) GetFirstAppearedMerkleSeqnoUnverified() keybase1.Seqno
- func (c *ChainLink) GetIgnoreIfSupported() SigIgnoreIfUnsupported
- func (c *ChainLink) GetKID() keybase1.KID
- func (c *ChainLink) GetMerkleHashMeta() (keybase1.HashMeta, error)
- func (c *ChainLink) GetMerkleSeqno() keybase1.Seqno
- func (c *ChainLink) GetPGPFingerprint() *PGPFingerprint
- func (c *ChainLink) GetPrev() LinkID
- func (c *ChainLink) GetRevocations() []keybase1.SigID
- func (c *ChainLink) GetRevokeKids() []keybase1.KID
- func (c *ChainLink) GetSeqno() keybase1.Seqno
- func (c *ChainLink) GetSigCheckCache() (cki *ComputedKeyInfos)
- func (c *ChainLink) GetSigID() keybase1.SigID
- func (c *ChainLink) GetSigchainV2Type(ignoreIfUnsupported SigIgnoreIfUnsupported) (SigchainV2Type, error)
- func (c *ChainLink) GetSigchainV2TypeFromV2Shell() (SigchainV2Type, error)
- func (c *ChainLink) GetUID() keybase1.UID
- func (c *ChainLink) HasRevocations() bool
- func (c *ChainLink) IsBad() (isBad bool, reason string)
- func (c *ChainLink) IsEldest() bool
- func (c *ChainLink) IsInCurrentFamily(u *User) bool
- func (c *ChainLink) IsStubbed() bool
- func (c ChainLink) LinkID() LinkID
- func (c *ChainLink) MatchFingerprint(fp PGPFingerprint) bool
- func (c *ChainLink) Pack() (*jsonw.Wrapper, error)
- func (c *ChainLink) Parent() *SigChain
- func (c *ChainLink) PutSigCheckCache(cki *ComputedKeyInfos)
- func (c *ChainLink) SetParent(parent *SigChain)
- func (c *ChainLink) Store(g *GlobalContext) (didStore bool, err error)
- func (c *ChainLink) ToEldestKID() keybase1.KID
- func (c ChainLink) ToMerkleTriple() *MerkleTriple
- func (c *ChainLink) ToSigChainLocation() keybase1.SigChainLocation
- func (c *ChainLink) Typed() TypedChainLink
- func (c *ChainLink) UnmarshalPayloadJSON() *jsonw.Wrapper
- func (c *ChainLink) Unpack(trusted bool, selfUID keybase1.UID, packed []byte) error
- func (c *ChainLink) UnpackComputedKeyInfos(data []byte) error
- func (c *ChainLink) UnpackLocal(payload []byte) (err error)
- func (c *ChainLink) VerifyLink() error
- func (c *ChainLink) VerifySigWithKeyFamily(ckf ComputedKeyFamily) (err error)
- type ChainLinkError
- type ChainLinkFingerprintMismatchError
- type ChainLinkKIDMismatchError
- type ChainLinkPrevHashMismatchError
- type ChainLinkStubbedUnsupportedError
- type ChainLinkUnpacked
- type ChainLinkWrongSeqnoError
- type ChainLinks
- type ChainType
- type ChatAlreadyDeletedError
- type ChatAlreadySupersededError
- type ChatBadMsgError
- type ChatBroadcastError
- type ChatClientError
- type ChatCollisionError
- type ChatConvExistsError
- type ChatDuplicateMessageError
- type ChatHelper
- type ChatInternalError
- type ChatMessageCollisionError
- type ChatNotInConvError
- type ChatNotInTeamError
- type ChatRateLimitError
- type ChatStalePreviousStateError
- type ChatTLFFinalizedError
- type ChatUI
- type ChatUnknownTLFIDError
- type CheckCompletedListener
- type CheckMember
- type CheckResult
- type Checker
- type CheckerWrapper
- type Client
- type ClientConfig
- type Clock
- type ClockContext
- type Command
- type CommandLine
- type ComputedKeyFamily
- func (ckf *ComputedKeyFamily) ClearActivePGPHash(kid keybase1.KID)
- func (ckf *ComputedKeyFamily) Delegate(tcl TypedChainLink) (err error)
- func (ckf *ComputedKeyFamily) DelegatePerUserKey(perUserKey keybase1.PerUserKey) (err error)
- func (ckf ComputedKeyFamily) Export() []keybase1.PublicKey
- func (ckf ComputedKeyFamily) ExportAllPGPKeys() (keys []keybase1.PublicKey)
- func (ckf ComputedKeyFamily) ExportDeletedDeviceKeys() []keybase1.PublicKey
- func (ckf ComputedKeyFamily) ExportDeviceKeys() (exportedKeys []keybase1.PublicKey, pgpKeyCount int)
- func (ckf ComputedKeyFamily) ExportPerUserKeys() (ret []keybase1.PerUserKey)
- func (ckf ComputedKeyFamily) ExportRevokedDeviceKeys() []keybase1.RevokedKey
- func (ckf ComputedKeyFamily) FindActiveEncryptionSubkey(kid keybase1.KID) (ret GenericKey, cki ComputedKeyInfo, err error)
- func (ckf ComputedKeyFamily) FindActiveSibkey(kid keybase1.KID) (key GenericKey, cki ComputedKeyInfo, err error)
- func (ckf ComputedKeyFamily) FindActiveSibkeyAtTime(kid keybase1.KID, t time.Time) (key GenericKey, cki ComputedKeyInfo, err error)
- func (ckf ComputedKeyFamily) FindKIDFromFingerprint(fp PGPFingerprint) (kid keybase1.KID, err error)
- func (ckf ComputedKeyFamily) FindKeyWithKIDUnsafe(kid keybase1.KID) (GenericKey, error)
- func (ckf ComputedKeyFamily) FindKeybaseName(s string) bool
- func (ckf ComputedKeyFamily) GetActivePGPKeys(sibkey bool) (ret []*PGPKeyBundle)
- func (ckf *ComputedKeyFamily) GetAllActiveDevices() []*Device
- func (ckf ComputedKeyFamily) GetAllActiveKeysForDevice(deviceID keybase1.DeviceID) ([]keybase1.KID, error)
- func (ckf ComputedKeyFamily) GetAllActiveKeysWithRoleAtTime(role KeyRole, t time.Time) (ret []GenericKey)
- func (ckf ComputedKeyFamily) GetAllActiveSibkeys() []GenericKey
- func (ckf ComputedKeyFamily) GetAllActiveSibkeysAtTime(t time.Time) []GenericKey
- func (ckf ComputedKeyFamily) GetAllActiveSubkeys() []GenericKey
- func (ckf ComputedKeyFamily) GetAllActiveSubkeysAtTime(t time.Time) (ret []GenericKey)
- func (ckf *ComputedKeyFamily) GetAllDevices() []*Device
- func (ckf ComputedKeyFamily) GetAllSibkeysUnchecked() (ret []GenericKey)
- func (ckf ComputedKeyFamily) GetAllSubkeysUnchecked() (ret []GenericKey)
- func (ckf *ComputedKeyFamily) GetCurrentDevice(g *GlobalContext) (*Device, error)
- func (ckf ComputedKeyFamily) GetDeletedKeys() []GenericKey
- func (ckf *ComputedKeyFamily) GetDeviceForKID(kid keybase1.KID) (*Device, error)
- func (ckf *ComputedKeyFamily) GetDeviceForKey(key GenericKey) (*Device, error)
- func (ckf *ComputedKeyFamily) GetEncryptionSubkeyForDevice(did keybase1.DeviceID) (key GenericKey, err error)
- func (ckf ComputedKeyFamily) GetKeyRole(kid keybase1.KID) (ret KeyRole)
- func (ckf ComputedKeyFamily) GetKeyRoleAtTime(kid keybase1.KID, t time.Time) (ret KeyRole)
- func (ckf *ComputedKeyFamily) GetLatestPerUserKey() *keybase1.PerUserKey
- func (ckf ComputedKeyFamily) GetRevokedKeys() []RevokedKey
- func (ckf ComputedKeyFamily) GetSaltpackSenderTypeIfInactive(kid keybase1.KID) (*keybase1.SaltpackSenderType, error)
- func (ckf *ComputedKeyFamily) GetSibkeyForDevice(did keybase1.DeviceID) (key GenericKey, err error)
- func (ckf *ComputedKeyFamily) HasActiveDevice() bool
- func (ckf *ComputedKeyFamily) HasActiveEncryptionSubkey() bool
- func (ckf ComputedKeyFamily) HasActiveKey() bool
- func (ckf ComputedKeyFamily) InsertEldestLink(tcl TypedChainLink, username NormalizedUsername) (err error)
- func (ckf *ComputedKeyFamily) Revoke(tcl TypedChainLink) (err error)
- func (ckf *ComputedKeyFamily) RevokeKid(kid keybase1.KID, tcl TypedChainLink) (err error)
- func (ckf *ComputedKeyFamily) RevokeSig(sig keybase1.SigID, tcl TypedChainLink) (err error)
- func (ckf *ComputedKeyFamily) SetActivePGPHash(kid keybase1.KID, hash string)
- func (ckf ComputedKeyFamily) ShallowCopy() *ComputedKeyFamily
- func (ckf *ComputedKeyFamily) UpdateDevices(tcl TypedChainLink) (err error)
- type ComputedKeyInfo
- type ComputedKeyInfos
- func (cki *ComputedKeyInfos) Delegate(kid keybase1.KID, tm *KeybaseTime, sigid keybase1.SigID, ...) (err error)
- func (cki *ComputedKeyInfos) DelegatePerUserKey(perUserKey keybase1.PerUserKey) (err error)
- func (cki *ComputedKeyInfos) Insert(i *ComputedKeyInfo)
- func (cki ComputedKeyInfos) InsertLocalEldestKey(kid keybase1.KID)
- func (cki ComputedKeyInfos) InsertServerEldestKey(eldestKey GenericKey, un NormalizedUsername) error
- func (cki *ComputedKeyInfos) IsStaleVersion() bool
- func (cki *ComputedKeyInfos) PaperDevices() []*Device
- func (cki ComputedKeyInfos) ShallowCopy() *ComputedKeyInfos
- type ComputedKeyInfosVersion
- type ConfigError
- type ConfigGetter
- type ConfigReader
- type ConfigWriter
- type ConfigWriterTransacter
- type ConnectionID
- type ConnectionManager
- func (c *ConnectionManager) AddConnection(xp rpc.Transporter, closeListener chan error) ConnectionID
- func (c *ConnectionManager) ApplyAll(f ApplyFn)
- func (c *ConnectionManager) Label(id ConnectionID, d keybase1.ClientDetails) error
- func (c *ConnectionManager) ListAllLabeledConnections() (ret []keybase1.ClientDetails)
- func (c *ConnectionManager) LookupByClientType(clientType keybase1.ClientType) rpc.Transporter
- func (c *ConnectionManager) LookupConnection(i ConnectionID) rpc.Transporter
- func (c *ConnectionManager) RegisterLabelCallback(f LabelCb)
- func (c *ConnectionManager) Shutdown()
- func (c *ConnectionManager) WaitForClientType(clientType keybase1.ClientType, timeout time.Duration) bool
- type ConnectivityMonitor
- type ConnectivityMonitorResult
- type Contextified
- type Contextifier
- type CryptoMessageFormat
- type CryptoMessageType
- type CryptocurrencyChainLink
- type CryptocurrencyFamily
- type CryptocurrencyPrefix
- type CryptocurrencyType
- type CtimeMismatchError
- type CurrentStatus
- type DBError
- type DNSContext
- type DNSNameServerFetcher
- type Darwin
- func (d Darwin) CacheDir() string
- func (d Darwin) ConfigDir() string
- func (d Darwin) DataDir() string
- func (d Darwin) Home(emptyOk bool) string
- func (d Darwin) InfoDir() string
- func (d Darwin) LogDir() string
- func (d Darwin) Normalize(s string) string
- func (d Darwin) RuntimeDir() string
- func (d Darwin) SandboxCacheDir() string
- func (d Darwin) ServiceSpawnDir() (string, error)
- type DbKey
- type DecryptBadNonceError
- type DecryptBadPacketTypeError
- type DecryptBadSenderError
- type DecryptOpenError
- type DecryptWrongReceiverError
- type DecryptionError
- type Delegation
- type DelegationType
- type Delegator
- func (d *Delegator) CheckArgs(m MetaContext) (err error)
- func (d Delegator) GetMerkleTriple() MerkleTriple
- func (d Delegator) GetSigningKey() GenericKey
- func (d Delegator) IsEldest() bool
- func (d Delegator) IsSibkeyOrEldest() bool
- func (d *Delegator) LoadSigningKey(m MetaContext, ui SecretUI) (err error)
- func (d *Delegator) Run(m MetaContext) (err error)
- func (d *Delegator) SignAndPost(m MetaContext, jw *jsonw.Wrapper) (err error)
- type DeletedError
- type DeriveReason
- type Device
- type DeviceAlreadyProvisionedError
- type DeviceBadNameError
- type DeviceChainLink
- type DeviceCloneState
- type DeviceCloneStateJSONFile
- type DeviceEKStorage
- type DeviceKey
- type DeviceKeyMap
- type DeviceNameInUseError
- type DeviceNotFoundError
- type DeviceRequiredError
- type DeviceStatus
- type DeviceTypeSet
- type DeviceWithKeys
- func (d DeviceWithKeys) DeviceID() keybase1.DeviceID
- func (d DeviceWithKeys) DeviceName() string
- func (d DeviceWithKeys) EncryptionKey() GenericKey
- func (d DeviceWithKeys) HasBothKeys() bool
- func (d *DeviceWithKeys) Populate(m MetaContext) (uid keybase1.UID, err error)
- func (d *DeviceWithKeys) SetDeviceInfo(i keybase1.DeviceID, n string)
- func (d DeviceWithKeys) SigningKey() GenericKey
- func (d *DeviceWithKeys) ToPaperKeyActiveDevice(m MetaContext, uv keybase1.UserVersion) *ActiveDevice
- type DirExecError
- type DumbOutputUI
- type EKLib
- type EldestChainLink
- type EldestSeqnoMissingError
- type EmptyKeyRing
- type EncryptionReason
- type Engine2
- type EnginePrereqs
- type Env
- func (e *Env) AllowPTrace() bool
- func (e *Env) DarwinForceSecretStoreFile() bool
- func (e *Env) GetAPIDump() bool
- func (e *Env) GetAPITimeout() time.Duration
- func (e *Env) GetAllowRoot() bool
- func (e *Env) GetAppType() AppType
- func (e *Env) GetAutoFork() bool
- func (e *Env) GetAutoWallet() bool
- func (e *Env) GetAvatarSource() string
- func (e *Env) GetBGIdentifierDisabled() bool
- func (e *Env) GetBool(def bool, flist ...func() (bool, bool)) bool
- func (e *Env) GetBundledCA(host string) string
- func (e *Env) GetCacheDir() string
- func (e *Env) GetChatDbFilename() string
- func (e *Env) GetChatDelivererInterval() time.Duration
- func (e *Env) GetChatInboxSourceLocalizeThreads() int
- func (e *Env) GetChatMemberType() string
- func (e *Env) GetCodeSigningKIDs() []keybase1.KID
- func (e *Env) GetCommandLine() CommandLine
- func (e *Env) GetConfig() ConfigReader
- func (e *Env) GetConfigDir() string
- func (e *Env) GetConfigFilename() string
- func (e *Env) GetConfigWriter() ConfigWriter
- func (e *Env) GetConvSourceType() string
- func (e *Env) GetDataDir() string
- func (e *Env) GetDbFilename() string
- func (e *Env) GetDebug() bool
- func (e *Env) GetDefaultLogFile() string
- func (e *Env) GetDeviceCloneStateFilename() string
- func (e *Env) GetDeviceID() keybase1.DeviceID
- func (e *Env) GetDeviceIDForUID(u keybase1.UID) keybase1.DeviceID
- func (e *Env) GetDeviceIDForUsername(u NormalizedUsername) keybase1.DeviceID
- func (e *Env) GetDisplayRawUntrustedOutput() bool
- func (e *Env) GetDoLogForward() bool
- func (e *Env) GetDuration(def time.Duration, flist ...func() (time.Duration, bool)) time.Duration
- func (e *Env) GetEmail() string
- func (e *Env) GetEmailOrUsername() string
- func (e *Env) GetFeatureFlags() FeatureFlags
- func (e *Env) GetGpg() string
- func (e *Env) GetGpgHome() string
- func (e *Env) GetGpgOptions() []string
- func (e *Env) GetGregorDisabled() bool
- func (e *Env) GetGregorPingInterval() time.Duration
- func (e *Env) GetGregorPingTimeout() time.Duration
- func (e *Env) GetGregorSaveInterval() time.Duration
- func (e *Env) GetGregorURI() string
- func (e *Env) GetHome() string
- func (e *Env) GetInboxSourceType() string
- func (e *Env) GetInfoDir() string
- func (e *Env) GetInstallID() (ret InstallID)
- func (e *Env) GetInt(def int, flist ...func() (int, bool)) int
- func (e *Env) GetKBFSInfoPath() string
- func (e *Env) GetLabel() string
- func (e *Env) GetLevelDBNumFiles() int
- func (e *Env) GetLinkCacheCleanDur() time.Duration
- func (e *Env) GetLinkCacheSize() int
- func (e *Env) GetLocalRPCDebug() string
- func (e *Env) GetLocalTrackMaxAge() time.Duration
- func (e *Env) GetLogDir() string
- func (e *Env) GetLogFile() string
- func (e *Env) GetLogFormat() string
- func (e *Env) GetLogPrefix() string
- func (e *Env) GetMerkleKIDs() []keybase1.KID
- func (e *Env) GetMountDir() (string, error)
- func (e *Env) GetNegBool(def bool, flist []NegBoolFunc) bool
- func (e *Env) GetNoPinentry() bool
- func (e *Env) GetPayloadCacheSize() int
- func (e *Env) GetPidFile() (ret string, err error)
- func (e *Env) GetPinentry() string
- func (e *Env) GetProofCacheLongDur() time.Duration
- func (e *Env) GetProofCacheMediumDur() time.Duration
- func (e *Env) GetProofCacheShortDur() time.Duration
- func (e *Env) GetProofCacheSize() int
- func (e *Env) GetProxy() string
- func (e *Env) GetPvlKitFilename() string
- func (e *Env) GetRunMode() RunMode
- func (e *Env) GetRunModeAsString() string
- func (e *Env) GetRuntimeDir() string
- func (e *Env) GetSandboxCacheDir() string
- func (e *Env) GetScraperTimeout() time.Duration
- func (e *Env) GetSecretKeyringTemplate() string
- func (e *Env) GetServerURI() string
- func (e *Env) GetServiceInfoPath() string
- func (e *Env) GetServiceSpawnDir() (string, error)
- func (e *Env) GetServiceType() string
- func (e *Env) GetSessionFilename() string
- func (e *Env) GetSkipLogoutIfRevokedCheck() bool
- func (e *Env) GetSlowGregorConn() bool
- func (e *Env) GetSocketBindFile() (string, error)
- func (e *Env) GetSocketDialFiles() ([]string, error)
- func (e *Env) GetStandalone() bool
- func (e *Env) GetStoredSecretAccessGroup() string
- func (e *Env) GetStoredSecretServiceName() string
- func (e *Env) GetString(flist ...(func() string)) string
- func (e *Env) GetStringList(list ...(func() []string)) []string
- func (e *Env) GetTimers() string
- func (e *Env) GetTorHiddenAddress() string
- func (e *Env) GetTorMode() TorMode
- func (e *Env) GetTorProxy() string
- func (e *Env) GetUID() keybase1.UID
- func (e *Env) GetUIDMapFullNameCacheSize() int
- func (e *Env) GetUPAKCacheSize() int
- func (e *Env) GetUpdateDefaultInstructions() (string, error)
- func (e *Env) GetUpdateDisabled() (bool, bool)
- func (e *Env) GetUpdateLastChecked() keybase1.Time
- func (e *Env) GetUpdatePreferenceAuto() (bool, bool)
- func (e *Env) GetUpdatePreferenceSkip() string
- func (e *Env) GetUpdatePreferenceSnoozeUntil() keybase1.Time
- func (e *Env) GetUpdateURL() string
- func (e *Env) GetUpdaterConfig() UpdaterConfigReader
- func (e *Env) GetUpdaterConfigFilename() string
- func (e *Env) GetUpgradePerUserKey() bool
- func (e *Env) GetUserCacheMaxAge() time.Duration
- func (e *Env) GetUsername() NormalizedUsername
- func (e *Env) GetUsernameForUID(u keybase1.UID) NormalizedUsername
- func (e *Env) GetVDebugSetting() string
- func (e *Env) RememberPassphrase() bool
- func (e *Env) RunningInCI() bool
- func (e *Env) SendSystemChatMessages() bool
- func (e *Env) SetCommandLine(cmd CommandLine)
- func (e *Env) SetConfig(r ConfigReader, w ConfigWriter)
- func (e *Env) SetUpdateLastChecked(t keybase1.Time) error
- func (e *Env) SetUpdatePreferenceAuto(b bool) error
- func (e *Env) SetUpdatePreferenceSkip(v string) error
- func (e *Env) SetUpdatePreferenceSnoozeUntil(t keybase1.Time) error
- func (e *Env) SetUpdaterConfig(r UpdaterConfigReader)
- func (e *Env) UseTimeClockForNISTs() bool
- func (e *Env) WantsSystemd() bool
- type EphemeralPairwiseMACsMissingUIDsError
- type ErrorUnwrapper
- type ExistsError
- type ExportableError
- type ExportedStream
- type ExportedStreams
- func (s *ExportedStreams) Close(_ context.Context, a keybase1.CloseArg) (err error)
- func (s *ExportedStreams) ExportReader(r ReadCloseSeeker) keybase1.Stream
- func (s *ExportedStreams) ExportWriter(w io.WriteCloser) keybase1.Stream
- func (s *ExportedStreams) GetReader(st keybase1.Stream) (ret io.ReadCloser, err error)
- func (s *ExportedStreams) GetWriter(st keybase1.Stream) (ret io.WriteCloser, err error)
- func (s *ExportedStreams) Read(_ context.Context, a keybase1.ReadArg) (buf []byte, err error)
- func (s *ExportedStreams) Reset(_ context.Context, a keybase1.ResetArg) error
- func (s *ExportedStreams) Write(_ context.Context, a keybase1.WriteArg) (n int, err error)
- type ExternalAPI
- type ExternalAPIEngine
- func (api *ExternalAPIEngine) DoRequest(arg APIArg, req *http.Request, restype XAPIResType) (ar *ExternalAPIRes, hr *ExternalHTMLRes, tr *ExternalTextRes, err error)
- func (api *ExternalAPIEngine) Get(arg APIArg) (res *ExternalAPIRes, err error)
- func (api *ExternalAPIEngine) GetHTML(arg APIArg) (res *ExternalHTMLRes, err error)
- func (api *ExternalAPIEngine) GetText(arg APIArg) (res *ExternalTextRes, err error)
- func (api *ExternalAPIEngine) Post(arg APIArg) (res *ExternalAPIRes, err error)
- func (api *ExternalAPIEngine) PostHTML(arg APIArg) (res *ExternalHTMLRes, err error)
- type ExternalAPIRes
- type ExternalHTMLRes
- type ExternalServicesCollector
- type ExternalTextRes
- type FailedAssertionError
- type FakeGregorDismisser
- type Feature
- type FeatureFlags
- type File
- type FileExecError
- type FirstErrorPicker
- type FishyMsgpackError
- type FullSelfer
- type GPGKey
- func (g *GPGKey) CanDecrypt() bool
- func (g *GPGKey) CanEncrypt() bool
- func (g *GPGKey) CanSign() bool
- func (g *GPGKey) CheckSecretKey() error
- func (g *GPGKey) DecryptFromString(ciphertext string) (msg []byte, sender keybase1.KID, err error)
- func (g *GPGKey) Encode() (string, error)
- func (g *GPGKey) EncryptToString(plaintext []byte, sender GenericKey) (ciphertext string, err error)
- func (g *GPGKey) ExportPublicAndPrivate() (RawPublicKey, RawPrivateKey, error)
- func (g *GPGKey) GetAlgoType() AlgoType
- func (g *GPGKey) GetBinaryKID() keybase1.BinaryKID
- func (g *GPGKey) GetFingerprintP() *PGPFingerprint
- func (g *GPGKey) GetKID() keybase1.KID
- func (g *GPGKey) HasSecretKey() bool
- func (g *GPGKey) SecretSymmetricKey(reason EncryptionReason) (NaclSecretBoxKey, error)
- func (g *GPGKey) SignToString(msg []byte) (sig string, id keybase1.SigID, err error)
- func (g *GPGKey) VerboseDescription() string
- func (g *GPGKey) VerifyString(ctx VerifyContext, sig string, msg []byte) (id keybase1.SigID, err error)
- func (g *GPGKey) VerifyStringAndExtract(ctx VerifyContext, sig string) (msg []byte, id keybase1.SigID, err error)
- type GPGUI
- type GPGUnavailableError
- type GenericChainLink
- func (g *GenericChainLink) BaseToTrackingStatement(state keybase1.ProofState) *jsonw.Wrapper
- func (g *GenericChainLink) DoOwnNewLinkFromServerNotifications(glob *GlobalContext)
- func (g *GenericChainLink) GetArmoredSig() string
- func (g *GenericChainLink) GetDelegatedKid() (kid keybase1.KID)
- func (g *GenericChainLink) GetDevice() *Device
- func (g *GenericChainLink) GetPGPFingerprint() *PGPFingerprint
- func (g *GenericChainLink) GetPGPFullHash() string
- func (g *GenericChainLink) GetParentKid() (kid keybase1.KID)
- func (g *GenericChainLink) GetRole() KeyRole
- func (g *GenericChainLink) GetSeqno() keybase1.Seqno
- func (g *GenericChainLink) GetSigID() keybase1.SigID
- func (g *GenericChainLink) GetUID() keybase1.UID
- func (g *GenericChainLink) GetUsername() string
- func (g *GenericChainLink) IsDirectlyRevoked() bool
- func (g *GenericChainLink) IsRevocationIsh() bool
- func (g *GenericChainLink) IsRevoked() bool
- func (g *GenericChainLink) ToDebugString() string
- func (g *GenericChainLink) ToDisplayString() string
- func (g *GenericChainLink) ToSigChainLocation() keybase1.SigChainLocation
- func (g *GenericChainLink) Type() string
- func (g *GenericChainLink) VerifyReverseSig(ckf ComputedKeyFamily) error
- type GenericKey
- type GetCacheDurationFunc
- type GetCheckTimeFunc
- type GetTlfPseudonymEither
- type GlobalContext
- func (g *GlobalContext) AddLoginHook(hook LoginHook)
- func (g *GlobalContext) AddLogoutHook(hook LogoutHook)
- func (g *GlobalContext) AddUserChangedHandler(h UserChangedHandler)
- func (g *GlobalContext) BindToSocket() (net.Listener, error)
- func (g *GlobalContext) BustLocalUserCache(u keybase1.UID)
- func (g *GlobalContext) CTimeBuckets(ctx context.Context) (context.Context, *profiling.TimeBuckets)
- func (g *GlobalContext) CTimeTracer(ctx context.Context, label string, enabled bool) profiling.TimeTracer
- func (g *GlobalContext) CTrace(ctx context.Context, msg string, f func() error) func()
- func (g *GlobalContext) CTraceOK(ctx context.Context, msg string, f func() bool) func()
- func (g *GlobalContext) CTraceTimed(ctx context.Context, msg string, f func() error) func()
- func (g *GlobalContext) CVTrace(ctx context.Context, lev VDebugLevel, msg string, f func() error) func()
- func (g *GlobalContext) CVTraceOK(ctx context.Context, lev VDebugLevel, msg string, f func() bool) func()
- func (g *GlobalContext) CVTraceTimed(ctx context.Context, lev VDebugLevel, msg string, f func() error) func()
- func (g *GlobalContext) CallLoginHooks()
- func (g *GlobalContext) CallLogoutHooks()
- func (g *GlobalContext) CardCache() *UserCardCache
- func (g *GlobalContext) ClearPerUserKeyring()
- func (g *GlobalContext) Clock() clockwork.Clock
- func (g *GlobalContext) CloneWithNetContext(netCtx context.Context) *GlobalContext
- func (g *GlobalContext) CloneWithNetContextAndNewLogger(netCtx context.Context) *GlobalContext
- func (g *GlobalContext) ConfigReload() error
- func (g *GlobalContext) Configure(line CommandLine, usage Usage) error
- func (g *GlobalContext) ConfigureAPI() error
- func (g *GlobalContext) ConfigureCaches() error
- func (g *GlobalContext) ConfigureCommand(line CommandLine, cmd Command) error
- func (g *GlobalContext) ConfigureConfig() error
- func (g *GlobalContext) ConfigureExportedStreams() error
- func (g *GlobalContext) ConfigureKeyring() error
- func (g *GlobalContext) ConfigureLogging() error
- func (g *GlobalContext) ConfigureMerkleClient() error
- func (g *GlobalContext) ConfigureSocketInfo() (err error)
- func (g *GlobalContext) ConfigureTimers() error
- func (g *GlobalContext) ConfigureUpdaterConfig() error
- func (g *GlobalContext) ConfigureUsage(usage Usage) error
- func (g *GlobalContext) ExitTrace(msg string, f func() error) func()
- func (g *GlobalContext) ExitTraceOK(msg string, f func() bool) func()
- func (g *GlobalContext) FlushCaches()
- func (g *GlobalContext) GetAPI() API
- func (g *GlobalContext) GetAllUserNames() (NormalizedUsername, []NormalizedUsername, error)
- func (g *GlobalContext) GetAppType() AppType
- func (g *GlobalContext) GetCacheDir() string
- func (g *GlobalContext) GetClock() clockwork.Clock
- func (g *GlobalContext) GetConfigDir() string
- func (g *GlobalContext) GetConfiguredAccounts(ctx context.Context) ([]keybase1.ConfiguredAccount, error)
- func (g *GlobalContext) GetDNSNameServerFetcher() DNSNameServerFetcher
- func (g *GlobalContext) GetDataDir() string
- func (g *GlobalContext) GetDeviceEKStorage() DeviceEKStorage
- func (g *GlobalContext) GetEKLib() EKLib
- func (g *GlobalContext) GetEnv() *Env
- func (g *GlobalContext) GetExternalAPI() ExternalAPI
- func (g *GlobalContext) GetFullSelfer() FullSelfer
- func (g *GlobalContext) GetGpgClient() *GpgCLI
- func (g *GlobalContext) GetImplicitTeamConflictInfoCacher() LRUer
- func (g *GlobalContext) GetKBFSInfoPath() string
- func (g *GlobalContext) GetKVStore() KVStorer
- func (g *GlobalContext) GetLog() logger.Logger
- func (g *GlobalContext) GetLogDir() string
- func (g *GlobalContext) GetLogf() logger.Loggerf
- func (g *GlobalContext) GetMeUV(ctx context.Context) (res keybase1.UserVersion, err error)
- func (g *GlobalContext) GetMerkleClient() *MerkleClient
- func (g *GlobalContext) GetMountDir() (string, error)
- func (g *GlobalContext) GetMyClientDetails() keybase1.ClientDetails
- func (g *GlobalContext) GetMyUID() keybase1.UID
- func (g *GlobalContext) GetNetContext() context.Context
- func (g *GlobalContext) GetOutOfDateInfo() keybase1.OutOfDateInfo
- func (g *GlobalContext) GetPerUserKeyring() (ret *PerUserKeyring, err error)
- func (g *GlobalContext) GetPvlSource() PvlSource
- func (g *GlobalContext) GetRunMode() RunMode
- func (g *GlobalContext) GetRuntimeDir() string
- func (g *GlobalContext) GetServerURI() string
- func (g *GlobalContext) GetServiceInfoPath() string
- func (g *GlobalContext) GetSocket(clearError bool) (conn net.Conn, xp rpc.Transporter, isNew bool, err error)
- func (g *GlobalContext) GetStellar() Stellar
- func (g *GlobalContext) GetStoredSecretAccessGroup() string
- func (g *GlobalContext) GetStoredSecretServiceName() string
- func (g *GlobalContext) GetTeamEKBoxStorage() TeamEKBoxStorage
- func (g *GlobalContext) GetTeamLoader() TeamLoader
- func (g *GlobalContext) GetUPAKLoader() UPAKLoader
- func (g *GlobalContext) GetUnforwardedLogger() (log UnforwardedLoggerWithLegacyInterface)
- func (g *GlobalContext) GetUserEKBoxStorage() UserEKBoxStorage
- func (g *GlobalContext) GetUsersWithStoredSecrets(ctx context.Context) ([]string, error)
- func (g *GlobalContext) GetVDebugLog() *VDebugLog
- func (g *GlobalContext) HonorPGPExpireTime(t int64) int64
- func (g *GlobalContext) HonorSigchainExpireTime(t int64) int64
- func (g *GlobalContext) Identify2Cache() Identify2Cacher
- func (g *GlobalContext) Init() *GlobalContext
- func (g *GlobalContext) IsOneshot(ctx context.Context) (bool, error)
- func (g *GlobalContext) KeyfamilyChanged(u keybase1.UID)
- func (g *GlobalContext) LinkCache() *LinkCache
- func (g *GlobalContext) LoadUserByUID(uid keybase1.UID) (*User, error)
- func (g *GlobalContext) LocalSigchainGuard() *LocalSigchainGuard
- func (g *GlobalContext) Logout() error
- func (g *GlobalContext) LogoutSelfCheck() error
- func (g *GlobalContext) MakeAssertionContext() AssertionContext
- func (g *GlobalContext) MakeLoopbackServer() (l net.Listener, err error)
- func (g *GlobalContext) NewRPCLogFactory() *RPCLogFactory
- func (g *GlobalContext) OutputBytes(b []byte)
- func (g *GlobalContext) OutputString(s string)
- func (g *GlobalContext) OverrideUPAKLoader(upak UPAKLoader)
- func (g *GlobalContext) PushShutdownHook(sh ShutdownHook)
- func (g *GlobalContext) ReplaceSecretStore(ctx context.Context) error
- func (g *GlobalContext) ResetSocket(clearError bool) (net.Conn, rpc.Transporter, bool, error)
- func (g *GlobalContext) SKBFilenameForUser(un NormalizedUsername) string
- func (g *GlobalContext) SecretStore() *SecretStoreLocked
- func (g *GlobalContext) SetClock(c clockwork.Clock)
- func (g *GlobalContext) SetCommandLine(cmd CommandLine)
- func (g *GlobalContext) SetDNSNameServerFetcher(d DNSNameServerFetcher)
- func (g *GlobalContext) SetDeviceEKStorage(s DeviceEKStorage)
- func (g *GlobalContext) SetEKLib(ekLib EKLib)
- func (g *GlobalContext) SetImplicitTeamConflictInfoCacher(l LRUer)
- func (g *GlobalContext) SetPvlSource(s PvlSource)
- func (g *GlobalContext) SetService()
- func (g *GlobalContext) SetServices(s ExternalServicesCollector)
- func (g *GlobalContext) SetStellar(s Stellar)
- func (g *GlobalContext) SetTeamEKBoxStorage(s TeamEKBoxStorage)
- func (g *GlobalContext) SetTeamLoader(l TeamLoader)
- func (g *GlobalContext) SetUI(u UI)
- func (g *GlobalContext) SetUIDMapper(u UIDMapper)
- func (g *GlobalContext) SetUIRouter(u UIRouter)
- func (g *GlobalContext) SetUserEKBoxStorage(s UserEKBoxStorage)
- func (g *GlobalContext) Shutdown() error
- func (g *GlobalContext) StartStandaloneChat()
- func (g *GlobalContext) StartupMessage()
- func (g *GlobalContext) Trace(msg string, f func() error) func()
- func (g *GlobalContext) TraceOK(msg string, f func() bool) func()
- func (g *GlobalContext) TrackCache() *TrackCache
- func (g *GlobalContext) UserChanged(u keybase1.UID)
- type GlobalTestOptions
- type GpgBaseKey
- type GpgCLI
- func (g *GpgCLI) CanExec() (bool, error)
- func (g *GpgCLI) Configure() (err error)
- func (g *GpgCLI) ExportKey(k PGPKeyBundle, private bool, batch bool) (err error)
- func (g *GpgCLI) ImportKey(secret bool, fp PGPFingerprint, tty string) (*PGPKeyBundle, error)
- func (g *GpgCLI) Index(secret bool, query string) (ki *GpgKeyIndex, w Warnings, err error)
- func (g *GpgCLI) MakeCmd(args []string, tty string) *exec.Cmd
- func (g *GpgCLI) Path() string
- func (g *GpgCLI) Run2(arg RunGpg2Arg) (res RunGpg2Res)
- func (g *GpgCLI) SemanticVersion() (*semver.Version, error)
- func (g *GpgCLI) SetTTY(t string)
- func (g *GpgCLI) Sign(fp PGPFingerprint, payload []byte) (string, error)
- func (g *GpgCLI) Version() (string, error)
- func (g *GpgCLI) VersionAtLeast(s string) (bool, error)
- type GpgError
- type GpgFingerprinter
- type GpgIndexElement
- type GpgIndexError
- type GpgIndexLine
- type GpgIndexParser
- func (p *GpgIndexParser) GetLine() (ret *GpgIndexLine, err error)
- func (p *GpgIndexParser) Parse(stream io.Reader) (ki *GpgKeyIndex, err error)
- func (p *GpgIndexParser) ParseElement() (ret GpgIndexElement, err error)
- func (p *GpgIndexParser) ParseKey(l *GpgIndexLine) (ret *GpgPrimaryKey, err error)
- func (p *GpgIndexParser) PutbackLine(line *GpgIndexLine)
- func (p *GpgIndexParser) Warn(w Warning)
- type GpgKeyIndex
- func (ki *GpgKeyIndex) AllFingerprints() []PGPFingerprint
- func (ki *GpgKeyIndex) GetRowFunc() func() []string
- func (ki *GpgKeyIndex) IndexKey(k *GpgPrimaryKey)
- func (ki *GpgKeyIndex) Len() int
- func (ki *GpgKeyIndex) Less(i, j int) bool
- func (ki *GpgKeyIndex) PushElement(e GpgIndexElement)
- func (ki *GpgKeyIndex) Sort()
- func (ki *GpgKeyIndex) Swap(i, j int)
- type GpgPrimaryKey
- func (k *GpgPrimaryKey) AddFingerprint(l *GpgIndexLine) (err error)
- func (k *GpgPrimaryKey) AddLine(l *GpgIndexLine) (err error)
- func (k *GpgPrimaryKey) AddSubkey(l *GpgIndexLine) (err error)
- func (k *GpgPrimaryKey) AddUID(l *GpgIndexLine) (err error)
- func (k *GpgPrimaryKey) GetAllID64s() []string
- func (k *GpgPrimaryKey) GetEmails() []string
- func (k *GpgPrimaryKey) GetFingerprint() *PGPFingerprint
- func (k *GpgPrimaryKey) GetPGPIdentities() []keybase1.PGPIdentity
- func (k *GpgPrimaryKey) IsValid() bool
- func (k *GpgPrimaryKey) Parse(l *GpgIndexLine) error
- func (k *GpgPrimaryKey) ToKey() *GpgPrimaryKey
- func (k *GpgPrimaryKey) ToRow(i int) []string
- type GpgSubKey
- type GregorDismisser
- type GregorFirehoseHandler
- type GregorInBandMessageHandler
- type GregorListener
- type HTTPArgs
- type HTTPRequest
- type HTTPSrv
- type HTTPSrvListenerSource
- type HTTPTime
- type HTTPValue
- type HashSummer
- type HashingWriteCloser
- type HexWrongLengthError
- type HomeFinder
- type I
- type IdentifiesFailedError
- type Identify2Cache
- func (c *Identify2Cache) Delete(uid keybase1.UID) error
- func (c *Identify2Cache) DidFullUserLoad(_ keybase1.UID)
- func (c *Identify2Cache) Get(uid keybase1.UID, gctf GetCheckTimeFunc, gcdf GetCacheDurationFunc, ...) (*keybase1.Identify2ResUPK2, error)
- func (c *Identify2Cache) Insert(up *keybase1.Identify2ResUPK2) error
- func (c *Identify2Cache) Shutdown()
- func (c *Identify2Cache) UseDiskCache() bool
- type Identify2Cacher
- type IdentifyDidNotCompleteError
- type IdentifyFailedError
- type IdentifyOutcome
- func (i *IdentifyOutcome) ActiveProofs() []RemoteProofChainLink
- func (i *IdentifyOutcome) AddProofsToSet(existing *ProofSet, okStates []keybase1.ProofState)
- func (ir *IdentifyOutcome) Export(g *GlobalContext) *keybase1.IdentifyOutcome
- func (ir IdentifyOutcome) ExportToUncheckedIdentity(g *GlobalContext) *keybase1.Identity
- func (i IdentifyOutcome) GetError() error
- func (i IdentifyOutcome) GetErrorAndWarnings(strict bool) (warnings Warnings, err error)
- func (i IdentifyOutcome) GetErrorLax() (Warnings, error)
- func (i *IdentifyOutcome) GetRemoteCheckResultFor(service string, username string) ProofError
- func (i IdentifyOutcome) IsOK() bool
- func (i IdentifyOutcome) NumProofFailures() int
- func (i IdentifyOutcome) NumProofSuccesses() int
- func (i IdentifyOutcome) NumRevoked() int
- func (i IdentifyOutcome) NumTrackChanges() int
- func (i IdentifyOutcome) NumTrackFailures() int
- func (i *IdentifyOutcome) ProofChecksSorted() []*LinkCheckResult
- func (i *IdentifyOutcome) TrackSet() *TrackSet
- func (i IdentifyOutcome) TrackStatus() keybase1.TrackStatus
- func (i IdentifyOutcome) TrackingStatement() *jsonw.Wrapper
- type IdentifyState
- func (is IdentifyState) ExportToUncheckedIdentity(g *GlobalContext) *keybase1.Identity
- func (s *IdentifyState) HasPreviousTrack() bool
- func (s *IdentifyState) Precompute(dhook func(keybase1.IdentifyKey) error)
- func (s *IdentifyState) Result() *IdentifyOutcome
- func (s *IdentifyState) SetTmpTrackLookup(t *TrackChainLink)
- func (s *IdentifyState) SetTrackLookup(t *TrackChainLink)
- func (s *IdentifyState) TmpTrackLookup() *TrackLookup
- func (s *IdentifyState) TrackLookup() *TrackLookup
- type IdentifySummaryError
- type IdentifyTableMode
- type IdentifyTimeoutError
- type IdentifyUI
- type Identities
- type Identity
- type IdentityTable
- func (idt *IdentityTable) ActiveCryptocurrency(family CryptocurrencyFamily) *CryptocurrencyChainLink
- func (idt *IdentityTable) AllActiveCryptocurrency() []CryptocurrencyChainLink
- func (idt *IdentityTable) ComputeRemoteDiff(tracked, trackedTmp, observed keybase1.ProofState) (ret TrackDiff)
- func (idt *IdentityTable) GetActiveProofsFor(st ServiceType) (ret []RemoteProofChainLink)
- func (idt *IdentityTable) GetRevokedCryptocurrencyForTesting() []CryptocurrencyChainLink
- func (idt *IdentityTable) GetTrackList() (ret []*TrackChainLink)
- func (idt *IdentityTable) GetTrackMap() map[NormalizedUsername][]*TrackChainLink
- func (idt *IdentityTable) Identify(m MetaContext, is IdentifyState, forceRemoteCheck bool, ui IdentifyUI, ...) error
- func (idt *IdentityTable) Len() int
- func (idt *IdentityTable) MarkCheckResult(err ProofError)
- func (idt *IdentityTable) StellarAccountID() *stellar1.AccountID
- func (idt *IdentityTable) TrackChainLinkFor(username NormalizedUsername, uid keybase1.UID) (*TrackChainLink, error)
- func (idt *IdentityTable) VerifySelfSig(nun NormalizedUsername, uid keybase1.UID) bool
- type ImplicitTeamConflictInfoCacher
- type ImplicitTeamDisplayNameError
- type InactiveKeyError
- type InconsistentCacheStateError
- type InputCanceledError
- type InstallID
- type InsufficientKarmaError
- type InternalAPIEngine
- func (a *InternalAPIEngine) Delete(arg APIArg) (*APIRes, error)
- func (a *InternalAPIEngine) DoRequest(arg APIArg, req *http.Request) (*APIRes, error)
- func (a *InternalAPIEngine) Get(arg APIArg) (*APIRes, error)
- func (a *InternalAPIEngine) GetDecode(arg APIArg, v APIResponseWrapper) error
- func (a *InternalAPIEngine) GetResp(arg APIArg) (*http.Response, func(), error)
- func (a *InternalAPIEngine) Post(arg APIArg) (*APIRes, error)
- func (a *InternalAPIEngine) PostDecode(arg APIArg, v APIResponseWrapper) error
- func (a *InternalAPIEngine) PostJSON(arg APIArg) (*APIRes, error)
- func (a *InternalAPIEngine) PostRaw(arg APIArg, ctype string, r io.Reader) (*APIRes, error)
- type InternalError
- type InvalidAddressError
- type InvalidArgumentError
- type InvalidHostnameError
- type InvalidKexPhraseError
- type InvalidRepoNameError
- type Invitation
- type InviteArg
- type InviteRequestArg
- type JSONConfigFile
- func (f *JSONConfigFile) Check() error
- func (f *JSONConfigFile) DeleteAtPath(p string)
- func (f *JSONConfigFile) GetAPITimeout() (time.Duration, bool)
- func (f *JSONConfigFile) GetAllUserConfigs() (current *UserConfig, all []UserConfig, err error)
- func (f *JSONConfigFile) GetAllUsernames() (current NormalizedUsername, others []NormalizedUsername, err error)
- func (f *JSONConfigFile) GetAppType() AppType
- func (f *JSONConfigFile) GetAutoFork() (bool, bool)
- func (f *JSONConfigFile) GetAutoWallet() (bool, bool)
- func (f *JSONConfigFile) GetBGIdentifierDisabled() (bool, bool)
- func (f *JSONConfigFile) GetBug3964RepairTime(un NormalizedUsername) (time.Time, error)
- func (f *JSONConfigFile) GetBundledCA(host string) (ret string)
- func (f *JSONConfigFile) GetChatDbFilename() string
- func (f *JSONConfigFile) GetChatDelivererInterval() (time.Duration, bool)
- func (f *JSONConfigFile) GetChatInboxSourceLocalizeThreads() (int, bool)
- func (f *JSONConfigFile) GetCodeSigningKIDs() []string
- func (f *JSONConfigFile) GetConfigFilename() string
- func (f *JSONConfigFile) GetDbFilename() string
- func (f *JSONConfigFile) GetDebug() (bool, bool)
- func (f *JSONConfigFile) GetDeviceCloneStateFilename() string
- func (f *JSONConfigFile) GetDeviceID() (ret keybase1.DeviceID)
- func (f *JSONConfigFile) GetDeviceIDForUID(u keybase1.UID) keybase1.DeviceID
- func (f *JSONConfigFile) GetDeviceIDForUsername(nu NormalizedUsername) keybase1.DeviceID
- func (f *JSONConfigFile) GetDisplayRawUntrustedOutput() (bool, bool)
- func (f *JSONConfigFile) GetDurationAtPath(p string) (time.Duration, bool)
- func (f *JSONConfigFile) GetFeatureFlags() (ret FeatureFlags, err error)
- func (f *JSONConfigFile) GetGpg() string
- func (f *JSONConfigFile) GetGpgHome() (ret string)
- func (f *JSONConfigFile) GetGpgOptions() []string
- func (f *JSONConfigFile) GetGregorDisabled() (bool, bool)
- func (f *JSONConfigFile) GetGregorPingInterval() (time.Duration, bool)
- func (f *JSONConfigFile) GetGregorPingTimeout() (time.Duration, bool)
- func (f *JSONConfigFile) GetGregorSaveInterval() (time.Duration, bool)
- func (f *JSONConfigFile) GetGregorURI() string
- func (f *JSONConfigFile) GetHome() string
- func (f *JSONConfigFile) GetLevelDBNumFiles() (int, bool)
- func (f *JSONConfigFile) GetLinkCacheCleanDur() (time.Duration, bool)
- func (f *JSONConfigFile) GetLinkCacheSize() (int, bool)
- func (f *JSONConfigFile) GetLocalRPCDebug() string
- func (f *JSONConfigFile) GetLocalTrackMaxAge() (time.Duration, bool)
- func (f *JSONConfigFile) GetLogFile() string
- func (f *JSONConfigFile) GetLogFormat() string
- func (f *JSONConfigFile) GetLogPrefix() string
- func (f *JSONConfigFile) GetMerkleKIDs() []string
- func (f *JSONConfigFile) GetMountDir() string
- func (f *JSONConfigFile) GetNoPinentry() (bool, bool)
- func (f *JSONConfigFile) GetPayloadCacheSize() (int, bool)
- func (f *JSONConfigFile) GetPidFile() string
- func (f *JSONConfigFile) GetPinentry() string
- func (f *JSONConfigFile) GetProofCacheLongDur() (time.Duration, bool)
- func (f *JSONConfigFile) GetProofCacheMediumDur() (time.Duration, bool)
- func (f *JSONConfigFile) GetProofCacheShortDur() (time.Duration, bool)
- func (f *JSONConfigFile) GetProofCacheSize() (int, bool)
- func (f *JSONConfigFile) GetProxy() string
- func (f *JSONConfigFile) GetProxyCACerts() (ret []string, err error)
- func (f *JSONConfigFile) GetPvlKitFilename() string
- func (f *JSONConfigFile) GetRememberPassphrase() (bool, bool)
- func (f *JSONConfigFile) GetRunMode() (ret RunMode, err error)
- func (f *JSONConfigFile) GetScraperTimeout() (time.Duration, bool)
- func (f *JSONConfigFile) GetSecretKeyringTemplate() string
- func (f *JSONConfigFile) GetSecurityAccessGroupOverride() (bool, bool)
- func (f *JSONConfigFile) GetServerURI() string
- func (f *JSONConfigFile) GetSessionFilename() string
- func (f *JSONConfigFile) GetSlowGregorConn() (bool, bool)
- func (f *JSONConfigFile) GetSocketFile() string
- func (f *JSONConfigFile) GetStandalone() (bool, bool)
- func (f *JSONConfigFile) GetTimeAtPath(path string) keybase1.Time
- func (f *JSONConfigFile) GetTimers() string
- func (f *JSONConfigFile) GetTopLevelBool(s string) (res, isSet bool)
- func (f *JSONConfigFile) GetTopLevelString(s string) (ret string)
- func (f *JSONConfigFile) GetTorHiddenAddress() string
- func (f *JSONConfigFile) GetTorMode() (ret TorMode, err error)
- func (f *JSONConfigFile) GetTorProxy() string
- func (f *JSONConfigFile) GetUID() (ret keybase1.UID)
- func (f *JSONConfigFile) GetUIDForUsername(n NormalizedUsername) keybase1.UID
- func (f *JSONConfigFile) GetUIDMapFullNameCacheSize() (int, bool)
- func (f *JSONConfigFile) GetUPAKCacheSize() (int, bool)
- func (f *JSONConfigFile) GetUpdateDisabled() (bool, bool)
- func (f *JSONConfigFile) GetUpdateLastChecked() keybase1.Time
- func (f *JSONConfigFile) GetUpdatePreferenceAuto() (bool, bool)
- func (f *JSONConfigFile) GetUpdatePreferenceSkip() string
- func (f *JSONConfigFile) GetUpdatePreferenceSnoozeUntil() keybase1.Time
- func (f *JSONConfigFile) GetUpdateURL() string
- func (f *JSONConfigFile) GetUpdaterConfigFilename() string
- func (f *JSONConfigFile) GetUpgradePerUserKey() (bool, bool)
- func (f *JSONConfigFile) GetUserCacheMaxAge() (time.Duration, bool)
- func (f *JSONConfigFile) GetUserConfig() (*UserConfig, error)
- func (f *JSONConfigFile) GetUserConfigForUID(u keybase1.UID) (*UserConfig, error)
- func (f *JSONConfigFile) GetUserConfigForUsername(nu NormalizedUsername) (*UserConfig, error)
- func (f *JSONConfigFile) GetUsername() (ret NormalizedUsername)
- func (f *JSONConfigFile) GetUsernameForUID(u keybase1.UID) NormalizedUsername
- func (f *JSONConfigFile) GetVDebugSetting() string
- func (f *JSONConfigFile) NukeUser(nu NormalizedUsername) error
- func (f *JSONConfigFile) Reset()
- func (f *JSONConfigFile) SetBug3964RepairTime(un NormalizedUsername, t time.Time) (err error)
- func (f *JSONConfigFile) SetDeviceID(did keybase1.DeviceID) (err error)
- func (f *JSONConfigFile) SetRememberPassphrase(remember bool) error
- func (f *JSONConfigFile) SetTimeAtPath(path string, t keybase1.Time) error
- func (f *JSONConfigFile) SetUpdateLastChecked(t keybase1.Time) error
- func (f *JSONConfigFile) SetUpdatePreferenceAuto(b bool) error
- func (f *JSONConfigFile) SetUpdatePreferenceSkip(v string) error
- func (f *JSONConfigFile) SetUpdatePreferenceSnoozeUntil(t keybase1.Time) error
- func (f *JSONConfigFile) SetUserConfig(u *UserConfig, overwrite bool) error
- func (f *JSONConfigFile) SetWrapperAtPath(p string, w *jsonw.Wrapper) error
- func (f *JSONConfigFile) SwitchUser(nu NormalizedUsername) error
- type JSONFile
- func (f *JSONFile) BeginTransaction() (ConfigWriterTransacter, error)
- func (f *JSONFile) Exists() bool
- func (f *JSONFile) GetBoolAtPath(p string) (ret bool, isSet bool)
- func (f *JSONFile) GetFilename() string
- func (f *JSONFile) GetIntAtPath(p string) (ret int, isSet bool)
- func (f *JSONFile) GetInterfaceAtPath(p string) (i interface{}, err error)
- func (f *JSONFile) GetNullAtPath(p string) (isSet bool)
- func (f *JSONFile) GetStringAtPath(p string) (ret string, isSet bool)
- func (f *JSONFile) GetWrapper() *jsonw.Wrapper
- func (f *JSONFile) Load(warnOnNotFound bool) error
- func (f *JSONFile) Nuke() error
- func (f *JSONFile) Save() error
- func (f *JSONFile) SetBoolAtPath(p string, v bool) error
- func (f *JSONFile) SetInt64AtPath(p string, v int64) error
- func (f *JSONFile) SetIntAtPath(p string, v int) error
- func (f *JSONFile) SetNullAtPath(p string) (err error)
- func (f *JSONFile) SetStringAtPath(p string, v string) error
- type JSONLocalDb
- func (j *JSONLocalDb) Close() error
- func (j *JSONLocalDb) Delete(id DbKey) error
- func (j *JSONLocalDb) ForceOpen() error
- func (j *JSONLocalDb) Get(id DbKey) (*jsonw.Wrapper, error)
- func (j *JSONLocalDb) GetInto(obj interface{}, id DbKey) (found bool, err error)
- func (j *JSONLocalDb) GetRaw(id DbKey) ([]byte, bool, error)
- func (j *JSONLocalDb) Lookup(id DbKey) (*jsonw.Wrapper, error)
- func (j *JSONLocalDb) Nuke() (string, error)
- func (j *JSONLocalDb) Open() error
- func (j *JSONLocalDb) OpenTransaction() (JSONLocalDbTransaction, error)
- func (j *JSONLocalDb) Put(id DbKey, aliases []DbKey, val *jsonw.Wrapper) error
- func (j *JSONLocalDb) PutObj(id DbKey, aliases []DbKey, obj interface{}) (err error)
- func (j *JSONLocalDb) PutRaw(id DbKey, b []byte) error
- type JSONLocalDbTransaction
- func (j JSONLocalDbTransaction) Commit() error
- func (j JSONLocalDbTransaction) Delete(id DbKey) error
- func (j JSONLocalDbTransaction) Discard()
- func (j JSONLocalDbTransaction) Get(id DbKey) (*jsonw.Wrapper, error)
- func (j JSONLocalDbTransaction) GetInto(obj interface{}, id DbKey) (found bool, err error)
- func (j JSONLocalDbTransaction) GetRaw(id DbKey) ([]byte, bool, error)
- func (j JSONLocalDbTransaction) Lookup(id DbKey) (*jsonw.Wrapper, error)
- func (j JSONLocalDbTransaction) Put(id DbKey, aliases []DbKey, val *jsonw.Wrapper) error
- func (j JSONLocalDbTransaction) PutObj(id DbKey, aliases []DbKey, obj interface{}) (err error)
- func (j JSONLocalDbTransaction) PutRaw(id DbKey, b []byte) error
- type JSONPayload
- type JSONReader
- type JSONUpdaterConfigFile
- type JSONWriter
- type KBFSNotRunningError
- type KVStoreContext
- type KVStorer
- type Kex2Secret
- type KexRole
- type KexRouter
- type KeyCannotDecryptError
- type KeyCannotEncryptError
- type KeyCannotSignError
- type KeyCannotVerifyError
- type KeyCorruptedError
- type KeyExistsError
- type KeyExpiredError
- type KeyFamily
- type KeyFamilyError
- type KeyGen
- type KeyGenError
- type KeyMaskNotFoundError
- type KeyPseudonym
- type KeyPseudonymError
- type KeyPseudonymGetError
- type KeyPseudonymInfo
- type KeyPseudonymNonce
- type KeyPseudonymOrError
- type KeyRevokedError
- type KeyRole
- type KeySection
- type KeyStatus
- type KeyType
- type KeyUnimplementedError
- type KeyUnlocker
- type KeyVersionError
- type KeybasePacket
- type KeybasePacketHash
- type KeybasePackets
- type KeybaseSaltpackError
- type KeybaseTime
- type KeyringFile
- type Keyrings
- func (k *Keyrings) GetSecretKeyAndSKBWithPrompt(m MetaContext, arg SecretKeyPromptArg) (key GenericKey, skb *SKB, err error)
- func (k *Keyrings) GetSecretKeyLocked(m MetaContext, ska SecretKeyArg) (ret *SKB, err error)
- func (k *Keyrings) GetSecretKeyWithPassphrase(m MetaContext, me *User, passphrase string, secretStorer SecretStorer) (key GenericKey, err error)
- func (k *Keyrings) GetSecretKeyWithPrompt(m MetaContext, arg SecretKeyPromptArg) (key GenericKey, err error)
- func (k *Keyrings) GetSecretKeyWithStoredSecret(m MetaContext, ska SecretKeyArg, me *User, secretRetriever SecretRetriever) (key GenericKey, err error)
- type LKSec
- func NewLKSec(pps *PassphraseStream, uid keybase1.UID) *LKSec
- func NewLKSecForEncrypt(m MetaContext, ui SecretUI, uid keybase1.UID) (ret *LKSec, err error)
- func NewLKSecWithClientHalf(clientHalf LKSecClientHalf, ppgen PassphraseGeneration, uid keybase1.UID) *LKSec
- func NewLKSecWithDeviceID(pps *PassphraseStream, uid keybase1.UID, deviceID keybase1.DeviceID) *LKSec
- func NewLKSecWithFullSecret(secret LKSecFullSecret, uid keybase1.UID) *LKSec
- func (s LKSec) ClientHalf() LKSecClientHalf
- func (s *LKSec) ComputeClientHalf() (ret LKSecClientHalf, err error)
- func (s *LKSec) CorruptedFullSecretForBug3964Testing(srv LKSecServerHalf) LKSecFullSecret
- func (s *LKSec) Decrypt(m MetaContext, src []byte) (res []byte, gen PassphraseGeneration, erroneousMask LKSecServerHalf, err error)
- func (s *LKSec) Encrypt(m MetaContext, src []byte) (res []byte, err error)
- func (s *LKSec) EncryptClientHalfRecovery(key GenericKey) (string, error)
- func (s *LKSec) FullSecret() LKSecFullSecret
- func (s *LKSec) GenerateServerHalf() error
- func (s LKSec) Generation() PassphraseGeneration
- func (s *LKSec) GetSecret(m MetaContext) (secret LKSecFullSecret, err error)
- func (s *LKSec) GetServerHalf() LKSecServerHalf
- func (s *LKSec) Load(m MetaContext) (err error)
- func (s *LKSec) LoadServerDetails(m MetaContext) (ret DeviceKeyMap, err error)
- func (s *LKSec) LoadServerHalf(m MetaContext) (err error)
- func (s LKSec) ServerHalf() LKSecServerHalf
- func (s *LKSec) SetClientHalf(b LKSecClientHalf)
- func (s *LKSec) SetFullSecret(m MetaContext)
- func (s *LKSec) SetServerHalf(b LKSecServerHalf)
- func (s *LKSec) SetUID(u keybase1.UID)
- func (s *LKSec) ToSKB(m MetaContext, key GenericKey) (ret *SKB, err error)
- type LKSecClientHalf
- type LKSecFullSecret
- type LKSecMask
- type LKSecServerHalf
- type LKSecServerHalfSet
- type LRUContext
- type LRUKeyer
- type LRUer
- type LabelCb
- type Lease
- type LevelDBOpenClosedError
- type LevelDb
- func (l *LevelDb) Close() error
- func (l *LevelDb) Delete(id DbKey) error
- func (l *LevelDb) ForceOpen() error
- func (l *LevelDb) Get(id DbKey) (val []byte, found bool, err error)
- func (l *LevelDb) GetFilename() string
- func (l *LevelDb) Lookup(id DbKey) (val []byte, found bool, err error)
- func (l *LevelDb) Nuke() (fn string, err error)
- func (l *LevelDb) Open() error
- func (l *LevelDb) OpenTransaction() (LocalDbTransaction, error)
- func (l *LevelDb) Opts() *opt.Options
- func (l *LevelDb) Put(id DbKey, aliases []DbKey, value []byte) error
- type LevelDbTransaction
- func (l LevelDbTransaction) Commit() (err error)
- func (l LevelDbTransaction) Delete(id DbKey) error
- func (l LevelDbTransaction) Discard()
- func (l LevelDbTransaction) Get(id DbKey) (val []byte, found bool, err error)
- func (l LevelDbTransaction) Lookup(id DbKey) (val []byte, found bool, err error)
- func (l LevelDbTransaction) Put(id DbKey, aliases []DbKey, value []byte) error
- type Lexer
- type LinkCache
- type LinkCheckResult
- func (l LinkCheckResult) Export() keybase1.LinkCheckResult
- func (l LinkCheckResult) ExportToIdentifyRow(i int) keybase1.IdentifyRow
- func (l LinkCheckResult) GetCached() *CheckResult
- func (l LinkCheckResult) GetDiff() TrackDiff
- func (l LinkCheckResult) GetError() error
- func (l LinkCheckResult) GetHint() *SigHint
- func (l LinkCheckResult) GetLink() RemoteProofChainLink
- func (l LinkCheckResult) GetPosition() int
- func (l LinkCheckResult) GetProofError() ProofError
- func (l LinkCheckResult) GetRemoteDiff() TrackDiff
- func (l LinkCheckResult) GetTorWarning() bool
- type LinkID
- func ComputeLinkID(d []byte) LinkID
- func GetLinkID(w *jsonw.Wrapper) (LinkID, error)
- func ImportLinkID(i keybase1.LinkID) (LinkID, error)
- func LinkIDFromHex(s string) (LinkID, error)
- func MakeSig(signingKey GenericKey, v1LinkType LinkType, innerLinkJSON []byte, ...) (sig string, sigID keybase1.SigID, linkID LinkID, err error)
- func MakeSigchainV2OuterSig(signingKey GenericKey, v1LinkType LinkType, seqno keybase1.Seqno, ...) (sig string, sigid keybase1.SigID, linkID LinkID, err error)
- func SignJSON(jw *jsonw.Wrapper, key GenericKey) (out string, id keybase1.SigID, lid LinkID, err error)
- type LinkType
- type LoadUserArg
- func NewLoadUserArg(g *GlobalContext) LoadUserArg
- func NewLoadUserArgWithContext(ctx context.Context, g *GlobalContext) LoadUserArg
- func NewLoadUserArgWithMetaContext(m MetaContext) LoadUserArg
- func NewLoadUserByNameArg(g *GlobalContext, name string) LoadUserArg
- func NewLoadUserByUIDArg(ctx context.Context, g *GlobalContext, uid keybase1.UID) LoadUserArg
- func NewLoadUserByUIDForceArg(g *GlobalContext, uid keybase1.UID) LoadUserArg
- func NewLoadUserForceArg(g *GlobalContext) LoadUserArg
- func NewLoadUserPubOptionalArg(g *GlobalContext) LoadUserArg
- func NewLoadUserSelfAndUIDArg(g *GlobalContext) LoadUserArg
- func NewLoadUserSelfArg(g *GlobalContext) LoadUserArg
- func (arg LoadUserArg) EnsureCtxAndLogTag() LoadUserArg
- func (arg LoadUserArg) GetNetContext() context.Context
- func (arg LoadUserArg) MetaContext() MetaContext
- func (arg LoadUserArg) String() string
- func (arg LoadUserArg) WithAbortIfSigchainUnchanged() LoadUserArg
- func (arg LoadUserArg) WithCachedOnly() LoadUserArg
- func (arg LoadUserArg) WithForcePoll(fp bool) LoadUserArg
- func (arg LoadUserArg) WithForceReload() LoadUserArg
- func (arg LoadUserArg) WithLoginContext(l LoginContext) LoadUserArg
- func (arg LoadUserArg) WithName(n string) LoadUserArg
- func (arg LoadUserArg) WithNetContext(ctx context.Context) LoadUserArg
- func (arg LoadUserArg) WithPublicKeyOptional() LoadUserArg
- func (arg LoadUserArg) WithResolveBody(r *jsonw.Wrapper) LoadUserArg
- func (arg LoadUserArg) WithSelf(self bool) LoadUserArg
- func (arg LoadUserArg) WithStaleOK(b bool) LoadUserArg
- func (arg LoadUserArg) WithUID(uid keybase1.UID) LoadUserArg
- type LocalDb
- type LocalDbOps
- type LocalDbTransaction
- type LocalSigchainGuard
- type LockPIDFile
- type LockTable
- type LockedTriplesec
- type LogContext
- type LogFunc
- type LogGetter
- type LogProfileContext
- type LogSendContext
- type LogUI
- type LoggedInError
- type LoggedInWrongUserError
- type LoginContext
- type LoginHook
- type LoginOfflineError
- type LoginRequiredError
- type LoginSession
- func (s *LoginSession) Clear() error
- func (s *LoginSession) Dump()
- func (s *LoginSession) ExistsFor(emailOrUsername string) bool
- func (s *LoginSession) Load(m MetaContext) error
- func (s *LoginSession) NotExpired() bool
- func (s *LoginSession) Salt() ([]byte, error)
- func (s *LoginSession) Session() ([]byte, error)
- func (s *LoginSession) SessionEncoded() (string, error)
- func (s *LoginSession) Status() *keybase1.SessionStatus
- type LoginSessionNotFound
- type LoginStateTimeoutError
- type LoginUI
- type LogoutError
- type LogoutHook
- type Logs
- type LoopbackAddr
- type LoopbackConn
- func (lc *LoopbackConn) Close() (err error)
- func (lc *LoopbackConn) LocalAddr() (addr net.Addr)
- func (lc *LoopbackConn) Read(b []byte) (n int, err error)
- func (lc *LoopbackConn) RemoteAddr() (addr net.Addr)
- func (lc *LoopbackConn) SetDeadline(t time.Time) (err error)
- func (lc *LoopbackConn) SetReadDeadline(t time.Time) (err error)
- func (lc *LoopbackConn) SetWriteDeadline(t time.Time) (err error)
- func (lc *LoopbackConn) Write(b []byte) (n int, err error)
- type LoopbackListener
- type Markup
- type MerkleClashError
- type MerkleClient
- func (mc *MerkleClient) FetchRootFromServer(m MetaContext, freshness time.Duration) (mr *MerkleRoot, err error)
- func (mc *MerkleClient) FetchRootFromServerBySeqno(m MetaContext, lowerBound keybase1.Seqno) (mr *MerkleRoot, err error)
- func (mc *MerkleClient) FirstSeqnoWithSkips() *keybase1.Seqno
- func (mc *MerkleClient) LastRoot() *MerkleRoot
- func (mc *MerkleClient) LastRootInfo(m MetaContext) (*chat1.MerkleRoot, error)
- func (mc *MerkleClient) LastRootToSigJSON(m MetaContext) (ret *jsonw.Wrapper, err error)
- func (mc *MerkleClient) LookupLeafAtHashMeta(m MetaContext, leafID keybase1.UserOrTeamID, hm keybase1.HashMeta) (leaf *MerkleGenericLeaf, err error)
- func (mc *MerkleClient) LookupLeafAtSeqno(m MetaContext, leafID keybase1.UserOrTeamID, s keybase1.Seqno) (leaf *MerkleGenericLeaf, root *MerkleRoot, err error)
- func (mc *MerkleClient) LookupRootAtSeqno(m MetaContext, s keybase1.Seqno) (root *MerkleRoot, err error)
- func (mc *MerkleClient) LookupTeam(m MetaContext, teamID keybase1.TeamID) (leaf *MerkleTeamLeaf, err error)
- func (mc *MerkleClient) LookupUser(m MetaContext, q HTTPArgs, sigHints *SigHints) (u *MerkleUserLeaf, err error)
- type MerkleClientError
- type MerkleGenericLeaf
- type MerklePathNotFoundError
- type MerkleResetChainTail
- type MerkleResets
- type MerkleRoot
- func (mr *MerkleRoot) Ctime() int64
- func (mr MerkleRoot) ExportToAVDL(g *GlobalContext) keybase1.MerkleRootAndTime
- func (mr *MerkleRoot) Fetched() time.Time
- func (mr *MerkleRoot) HasSkips() bool
- func (mr MerkleRoot) HashMeta() keybase1.HashMeta
- func (mr MerkleRoot) IsNil() bool
- func (mr *MerkleRoot) KBFSPrivate() (keybase1.KBFSRootHash, *keybase1.Seqno)
- func (mr *MerkleRoot) KBFSPrivateTeam() (keybase1.KBFSRootHash, *keybase1.Seqno)
- func (mr *MerkleRoot) KBFSPublic() (keybase1.KBFSRootHash, *keybase1.Seqno)
- func (mr *MerkleRoot) LegacyUIDRootHash() NodeHash
- func (mr *MerkleRoot) PvlHash() string
- func (mr *MerkleRoot) RootHash() NodeHash
- func (mr *MerkleRoot) Seqno() *keybase1.Seqno
- func (mr MerkleRoot) ShallowCopy() *MerkleRoot
- func (mr MerkleRoot) ShortHash() NodeHashShort
- func (mr *MerkleRoot) SkipToSeqno(s keybase1.Seqno) NodeHash
- func (mr *MerkleRoot) Store(storeFirstSkip bool) error
- func (mr *MerkleRoot) ToInfo() chat1.MerkleRoot
- func (mr *MerkleRoot) ToJSON() (jw *jsonw.Wrapper)
- func (mr *MerkleRoot) ToSigJSON() (ret *jsonw.Wrapper)
- type MerkleRootPayload
- type MerkleRootPayloadUnpacked
- type MerkleTeamLeaf
- type MerkleTriple
- type MerkleUserLeaf
- type MetaContext
- func NewMetaContext(ctx context.Context, g *GlobalContext) MetaContext
- func NewMetaContextBackground(g *GlobalContext) MetaContext
- func NewMetaContextForTest(tc TestContext) MetaContext
- func NewMetaContextForTestWithLogUI(tc TestContext) MetaContext
- func NewMetaContextTODO(g *GlobalContext) MetaContext
- func (m MetaContext) ActiveDevice() *ActiveDevice
- func (m MetaContext) BackgroundWithCancel() (MetaContext, func())
- func (m MetaContext) BackgroundWithLogTags() MetaContext
- func (m MetaContext) CDebugf(f string, args ...interface{})
- func (m MetaContext) CErrorf(f string, args ...interface{})
- func (m MetaContext) CInfof(f string, args ...interface{})
- func (m MetaContext) CTrace(msg string, f func() error) func()
- func (m MetaContext) CTraceOK(msg string, f func() bool) func()
- func (m MetaContext) CTraceTimed(msg string, f func() error) func()
- func (m MetaContext) CVTrace(lev VDebugLevel, msg string, f func() error) func()
- func (m MetaContext) CVTraceOK(lev VDebugLevel, msg string, f func() bool) func()
- func (m MetaContext) CWarningf(f string, args ...interface{})
- func (m MetaContext) CommitProvisionalLogin() MetaContext
- func (m MetaContext) Ctx() context.Context
- func (m MetaContext) CurrentUID() keybase1.UID
- func (m MetaContext) CurrentUserVersion() keybase1.UserVersion
- func (m MetaContext) CurrentUsername() NormalizedUsername
- func (m MetaContext) Dump()
- func (m MetaContext) EnsureCtx() MetaContext
- func (m MetaContext) G() *GlobalContext
- func (m MetaContext) HasAnySession() (ret bool)
- func (m MetaContext) Keyring() (ret *SKBKeyringFile, err error)
- func (m MetaContext) LoginContext() LoginContext
- func (m MetaContext) LogoutAndDeprovisionIfRevoked() (err error)
- func (m MetaContext) PassphraseStream() *PassphraseStream
- func (m MetaContext) PassphraseStreamAndTriplesec() (*PassphraseStream, Triplesec)
- func (m MetaContext) ProvisionalSessionArgs() (token string, csrf string)
- func (m MetaContext) SecretKeyPromptArg(ska SecretKeyArg, reason string) SecretKeyPromptArg
- func (m MetaContext) SetActiveDevice(uv keybase1.UserVersion, deviceID keybase1.DeviceID, sigKey, encKey GenericKey, ...) error
- func (m MetaContext) SetEncryptionKey(uv keybase1.UserVersion, deviceID keybase1.DeviceID, encKey GenericKey) error
- func (m MetaContext) SetSigningKey(uv keybase1.UserVersion, deviceID keybase1.DeviceID, sigKey GenericKey, ...) error
- func (m MetaContext) SwitchUser(n NormalizedUsername) error
- func (m MetaContext) SwitchUserDeprovisionNukeConfig(username NormalizedUsername) error
- func (m MetaContext) SwitchUserLoggedOut() (err error)
- func (m MetaContext) SwitchUserNewConfig(u keybase1.UID, n NormalizedUsername, salt []byte, d keybase1.DeviceID) error
- func (m MetaContext) SwitchUserNewConfigActiveDevice(uv keybase1.UserVersion, n NormalizedUsername, salt []byte, ...) error
- func (m MetaContext) SwitchUserNukeConfig(n NormalizedUsername) error
- func (m MetaContext) SwitchUserToActiveDevice(n NormalizedUsername, ad *ActiveDevice) (err error)
- func (m MetaContext) SwitchUserToActiveOneshotDevice(uv keybase1.UserVersion, nun NormalizedUsername, d *DeviceWithKeys) (err error)
- func (m MetaContext) SyncSecrets() (ss *SecretSyncer, err error)
- func (m MetaContext) SyncSecretsForUID(u keybase1.UID) (ss *SecretSyncer, err error)
- func (m MetaContext) TriplesecAndGeneration() (ret Triplesec, ppgen PassphraseGeneration)
- func (m MetaContext) UIs() UIs
- func (m MetaContext) VLogf(lev VDebugLevel, msg string, args ...interface{})
- func (m MetaContext) WithAPITokener(t APITokener) MetaContext
- func (m MetaContext) WithActiveDevice(a *ActiveDevice) MetaContext
- func (m MetaContext) WithContextCancel() (MetaContext, func())
- func (m MetaContext) WithCtx(c context.Context) MetaContext
- func (m MetaContext) WithDelegatedIdentifyUI(u IdentifyUI) MetaContext
- func (m MetaContext) WithGPGUI(u GPGUI) MetaContext
- func (m MetaContext) WithGlobalActiveDevice() MetaContext
- func (m MetaContext) WithIdentifyUI(u IdentifyUI) MetaContext
- func (m MetaContext) WithLogTag(k string) MetaContext
- func (m MetaContext) WithLogUI(u LogUI) MetaContext
- func (m MetaContext) WithLoginContext(l LoginContext) MetaContext
- func (m MetaContext) WithNewProvisionalLoginContext() MetaContext
- func (m MetaContext) WithNewProvisionalLoginContextForUser(u *User) MetaContext
- func (m MetaContext) WithNewProvisionalLoginContextForUserVersionAndUsername(uv keybase1.UserVersion, un NormalizedUsername) MetaContext
- func (m MetaContext) WithPaperKeyActiveDevice(d *DeviceWithKeys, uv keybase1.UserVersion) MetaContext
- func (m MetaContext) WithPgpUI(u PgpUI) MetaContext
- func (m MetaContext) WithSaltpackUI(s SaltpackUI) MetaContext
- func (m MetaContext) WithSecretUI(u SecretUI) MetaContext
- func (m MetaContext) WithTimeBuckets() (MetaContext, *profiling.TimeBuckets)
- func (m MetaContext) WithTimeout(timeout time.Duration) (MetaContext, func())
- func (m MetaContext) WithUIs(u UIs) MetaContext
- type MetaContextified
- type MissingDelegationTypeError
- type NIST
- type NISTFactory
- type NISTToken
- type NaclDHKeyPair
- func GenerateNaclDHKeyPair() (NaclDHKeyPair, error)
- func ImportDHKeypairFromKID(k keybase1.KID) (*NaclDHKeyPair, error)
- func ImportNaclDHKeyPairFromBytes(pub []byte, priv []byte) (ret NaclDHKeyPair, err error)
- func ImportNaclDHKeyPairFromHex(s string) (ret NaclDHKeyPair, err error)
- func MakeNaclDHKeyPairFromSecret(secret [NaclDHKeySecretSize]byte) (NaclDHKeyPair, error)
- func MakeNaclDHKeyPairFromSecretBytes(secret []byte) (NaclDHKeyPair, error)
- func (k NaclDHKeyPair) CanDecrypt() bool
- func (k NaclDHKeyPair) CanEncrypt() bool
- func (k NaclDHKeyPair) CanSign() bool
- func (k NaclDHKeyPair) CheckSecretKey() error
- func (k NaclDHKeyPair) Clone() (ret NaclDHKeyPair)
- func (k NaclDHKeyPair) Decrypt(nei *NaclEncryptionInfo) (plaintext []byte, sender keybase1.KID, err error)
- func (k NaclDHKeyPair) DecryptFromString(ciphertext string) (msg []byte, sender keybase1.KID, err error)
- func (k NaclDHKeyPair) Encode() (string, error)
- func (k NaclDHKeyPair) Encrypt(msg []byte, sender *NaclDHKeyPair) (*NaclEncryptionInfo, error)
- func (k NaclDHKeyPair) EncryptToString(plaintext []byte, sender GenericKey) (string, error)
- func (k NaclDHKeyPair) ExportPublicAndPrivate() (RawPublicKey, RawPrivateKey, error)
- func (k NaclDHKeyPair) GetAlgoType() AlgoType
- func (k NaclDHKeyPair) GetBinaryKID() (ret keybase1.BinaryKID)
- func (k NaclDHKeyPair) GetFingerprintP() *PGPFingerprint
- func (k NaclDHKeyPair) GetKID() keybase1.KID
- func (k NaclDHKeyPair) HasSecretKey() bool
- func (k NaclDHKeyPair) IsNil() bool
- func (k NaclDHKeyPair) SecretSymmetricKey(reason EncryptionReason) (NaclSecretBoxKey, error)
- func (k NaclDHKeyPair) SignToString(msg []byte) (sig string, id keybase1.SigID, err error)
- func (k NaclDHKeyPair) ToShortIDString() string
- func (k NaclDHKeyPair) VerboseDescription() string
- func (k NaclDHKeyPair) VerifyString(ctx VerifyContext, sig string, msg []byte) (id keybase1.SigID, err error)
- func (k NaclDHKeyPair) VerifyStringAndExtract(ctx VerifyContext, sig string) (msg []byte, id keybase1.SigID, err error)
- type NaclDHKeyPrivate
- type NaclDHKeyPublic
- type NaclEncryptionInfo
- type NaclGenerator
- type NaclKeyGen
- func (g *NaclKeyGen) Generate() (err error)
- func (g *NaclKeyGen) GetKeyPair() NaclKeyPair
- func (g *NaclKeyGen) Push(m MetaContext, aggregated bool) (d Delegator, err error)
- func (g *NaclKeyGen) SaveLKS(m MetaContext, lks *LKSec) error
- func (g *NaclKeyGen) UpdateArg(signer GenericKey, eldestKID keybase1.KID, delegationType DelegationType, ...)
- type NaclKeyGenArg
- type NaclKeyPair
- type NaclSecretBoxKey
- type NaclSigInfo
- type NaclSignature
- type NaclSigningKeyPair
- func GenerateNaclSigningKeyPair() (NaclSigningKeyPair, error)
- func ImportNaclSigningKeyPairFromBytes(pub []byte, priv []byte) (ret NaclSigningKeyPair, err error)
- func ImportNaclSigningKeyPairFromHex(s string) (ret NaclSigningKeyPair, err error)
- func MakeNaclSigningKeyPairFromSecret(secret [NaclSigningKeySecretSize]byte) (NaclSigningKeyPair, error)
- func MakeNaclSigningKeyPairFromSecretBytes(secret []byte) (NaclSigningKeyPair, error)
- func MakeNaclSigningKeyPairFromStellarAccountID(accountID stellar1.AccountID) (res NaclSigningKeyPair, err error)
- func MakeNaclSigningKeyPairFromStellarSecretKey(sec stellar1.SecretKey) (res NaclSigningKeyPair, err error)
- func (k NaclSigningKeyPair) CanDecrypt() bool
- func (k NaclSigningKeyPair) CanEncrypt() bool
- func (k NaclSigningKeyPair) CanSign() bool
- func (k NaclSigningKeyPair) CheckSecretKey() error
- func (k NaclSigningKeyPair) DecryptFromString(ciphertext string) (msg []byte, sender keybase1.KID, err error)
- func (k NaclSigningKeyPair) Encode() (string, error)
- func (k NaclSigningKeyPair) EncryptToString(plaintext []byte, sender GenericKey) (ciphertext string, err error)
- func (k NaclSigningKeyPair) ExportPublicAndPrivate() (RawPublicKey, RawPrivateKey, error)
- func (k NaclSigningKeyPair) GetAlgoType() AlgoType
- func (k NaclSigningKeyPair) GetBinaryKID() (ret keybase1.BinaryKID)
- func (k NaclSigningKeyPair) GetFingerprintP() *PGPFingerprint
- func (k NaclSigningKeyPair) GetKID() (ret keybase1.KID)
- func (k NaclSigningKeyPair) HasSecretKey() bool
- func (k NaclSigningKeyPair) IsNil() bool
- func (k NaclSigningKeyPair) SecretSymmetricKey(reason EncryptionReason) (NaclSecretBoxKey, error)
- func (k NaclSigningKeyPair) Sign(msg []byte) (ret *NaclSigInfo, err error)
- func (k NaclSigningKeyPair) SignToString(msg []byte) (sig string, id keybase1.SigID, err error)
- func (k NaclSigningKeyPair) SignV2(msg []byte, prefix SignaturePrefix) (ret *NaclSigInfo, err error)
- func (k NaclSigningKeyPair) ToShortIDString() string
- func (k NaclSigningKeyPair) VerboseDescription() string
- func (k NaclSigningKeyPair) VerifyString(ctx VerifyContext, sig string, msg []byte) (id keybase1.SigID, err error)
- func (k NaclSigningKeyPair) VerifyStringAndExtract(ctx VerifyContext, sig string) (msg []byte, id keybase1.SigID, err error)
- type NaclSigningKeyPrivate
- type NaclSigningKeyPublic
- type NamedLock
- type NeedInputError
- type NeedOtherRekeyError
- type NeedSelfRekeyError
- type NegBoolFunc
- type NetContext
- type NoActiveDeviceError
- type NoConfigFileError
- type NoConfigWriterError
- type NoDecryptionKeyError
- type NoDeviceError
- type NoKeyError
- type NoKeyringsError
- type NoMatchingGPGKeysError
- type NoNaClEncryptionKeyError
- type NoOpError
- type NoPGPEncryptionKeyError
- type NoPaperKeysError
- type NoSecretKeyError
- type NoSelectedKeyError
- type NoSessionError
- type NoSessionWriterError
- type NoSigChainError
- type NoSpaceOnDeviceError
- type NoSyncedPGPKeyError
- type NoTriplesecError
- type NoUIDError
- type NoUIError
- type NoUserConfigError
- type NoUsernameError
- type NodeHash
- type NodeHashAny
- type NodeHashLong
- type NodeHashShort
- type NoiseBytes
- type NoopNotifyListener
- func (n *NoopNotifyListener) AvatarUpdated(name string, formats []keybase1.AvatarFormat)
- func (n *NoopNotifyListener) BadgeState(badgeState keybase1.BadgeState)
- func (n *NoopNotifyListener) Chat(uid keybase1.UID, convID chat1.ConversationID)
- func (n *NoopNotifyListener) ChatAttachmentUploadProgress(uid keybase1.UID, convID chat1.ConversationID, outboxID chat1.OutboxID, ...)
- func (n *NoopNotifyListener) ChatAttachmentUploadStart(uid keybase1.UID, convID chat1.ConversationID, outboxID chat1.OutboxID)
- func (n *NoopNotifyListener) ChatIdentifyUpdate(update keybase1.CanonicalTLFNameAndIDWithBreaks)
- func (n *NoopNotifyListener) ChatInboxStale(uid keybase1.UID)
- func (n *NoopNotifyListener) ChatInboxSyncStarted(uid keybase1.UID)
- func (n *NoopNotifyListener) ChatInboxSynced(uid keybase1.UID, topicType chat1.TopicType, syncRes chat1.ChatSyncResult)
- func (n *NoopNotifyListener) ChatJoinedConversation(uid keybase1.UID, convID chat1.ConversationID, conv *chat1.InboxUIItem)
- func (n *NoopNotifyListener) ChatKBFSToImpteamUpgrade(uid keybase1.UID, convID chat1.ConversationID)
- func (n *NoopNotifyListener) ChatLeftConversation(uid keybase1.UID, convID chat1.ConversationID)
- func (n *NoopNotifyListener) ChatResetConversation(uid keybase1.UID, convID chat1.ConversationID)
- func (n *NoopNotifyListener) ChatSetConvRetention(uid keybase1.UID, convID chat1.ConversationID)
- func (n *NoopNotifyListener) ChatSetConvSettings(uid keybase1.UID, convID chat1.ConversationID)
- func (n *NoopNotifyListener) ChatSetTeamRetention(uid keybase1.UID, teamID keybase1.TeamID)
- func (n *NoopNotifyListener) ChatTLFFinalize(uid keybase1.UID, convID chat1.ConversationID, ...)
- func (n *NoopNotifyListener) ChatTLFResolve(uid keybase1.UID, convID chat1.ConversationID, ...)
- func (n *NoopNotifyListener) ChatThreadsStale(uid keybase1.UID, updates []chat1.ConversationStaleUpdate)
- func (n *NoopNotifyListener) ChatTypingUpdate([]chat1.ConvTypingUpdate)
- func (n *NoopNotifyListener) ClientOutOfDate(to, uri, msg string)
- func (n *NoopNotifyListener) DeviceCloneCountChanged(newClones int)
- func (n *NoopNotifyListener) FSActivity(activity keybase1.FSNotification)
- func (n *NoopNotifyListener) FSEditListRequest(arg keybase1.FSEditListRequest)
- func (n *NoopNotifyListener) FSEditListResponse(arg keybase1.FSEditListArg)
- func (n *NoopNotifyListener) FSPathUpdated(path string)
- func (n *NoopNotifyListener) FSSyncEvent(arg keybase1.FSPathSyncStatus)
- func (n *NoopNotifyListener) FSSyncStatusResponse(arg keybase1.FSSyncStatusArg)
- func (n *NoopNotifyListener) FavoritesChanged(uid keybase1.UID)
- func (n *NoopNotifyListener) KeyfamilyChanged(uid keybase1.UID)
- func (n *NoopNotifyListener) Login(username string)
- func (n *NoopNotifyListener) Logout()
- func (n *NoopNotifyListener) NewChatActivity(uid keybase1.UID, activity chat1.ChatActivity, source chat1.ChatActivitySource)
- func (n *NoopNotifyListener) NewChatKBFSFileEditActivity(uid keybase1.UID, activity chat1.ChatActivity)
- func (n *NoopNotifyListener) NewTeamEK(teamID keybase1.TeamID, generation keybase1.EkGeneration)
- func (n *NoopNotifyListener) PGPKeyInSecretStoreFile()
- func (n *NoopNotifyListener) PaperKeyCached(uid keybase1.UID, encKID keybase1.KID, sigKID keybase1.KID)
- func (n *NoopNotifyListener) ReachabilityChanged(r keybase1.Reachability)
- func (n *NoopNotifyListener) TeamChangedByID(teamID keybase1.TeamID, latestSeqno keybase1.Seqno, implicitTeam bool, ...)
- func (n *NoopNotifyListener) TeamChangedByName(teamName string, latestSeqno keybase1.Seqno, implicitTeam bool, ...)
- func (n *NoopNotifyListener) TeamDeleted(teamID keybase1.TeamID)
- func (n *NoopNotifyListener) TeamExit(teamID keybase1.TeamID)
- func (n *NoopNotifyListener) TrackingChanged(uid keybase1.UID, username NormalizedUsername)
- func (n *NoopNotifyListener) UserChanged(uid keybase1.UID)
- func (n *NoopNotifyListener) WalletPaymentNotification(accountID stellar1.AccountID, paymentID stellar1.PaymentID)
- type NopWriteCloser
- type NormalizedUsername
- type NotConfirmedError
- type NotFoundError
- type NotLatestSubchainError
- type NotProvisionedError
- type NotifyListener
- type NotifyRouter
- func (n *NotifyRouter) AddConnection(xp rpc.Transporter, ch chan error) ConnectionID
- func (n *NotifyRouter) HandleAppExit()
- func (n *NotifyRouter) HandleAvatarUpdated(ctx context.Context, name string, formats []keybase1.AvatarFormat)
- func (n *NotifyRouter) HandleBadgeState(badgeState keybase1.BadgeState)
- func (n *NotifyRouter) HandleChatAttachmentUploadProgress(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, ...)
- func (n *NotifyRouter) HandleChatAttachmentUploadStart(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, ...)
- func (n *NotifyRouter) HandleChatIdentifyUpdate(ctx context.Context, update keybase1.CanonicalTLFNameAndIDWithBreaks)
- func (n *NotifyRouter) HandleChatInboxStale(ctx context.Context, uid keybase1.UID)
- func (n *NotifyRouter) HandleChatInboxSyncStarted(ctx context.Context, uid keybase1.UID)
- func (n *NotifyRouter) HandleChatInboxSynced(ctx context.Context, uid keybase1.UID, topicType chat1.TopicType, ...)
- func (n *NotifyRouter) HandleChatJoinedConversation(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, ...)
- func (n *NotifyRouter) HandleChatKBFSToImpteamUpgrade(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, ...)
- func (n *NotifyRouter) HandleChatLeftConversation(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, ...)
- func (n *NotifyRouter) HandleChatResetConversation(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, ...)
- func (n *NotifyRouter) HandleChatSetConvRetention(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, ...)
- func (n *NotifyRouter) HandleChatSetConvSettings(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, ...)
- func (n *NotifyRouter) HandleChatSetTeamRetention(ctx context.Context, uid keybase1.UID, teamID keybase1.TeamID, ...)
- func (n *NotifyRouter) HandleChatTLFFinalize(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, ...)
- func (n *NotifyRouter) HandleChatTLFResolve(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, ...)
- func (n *NotifyRouter) HandleChatThreadsStale(ctx context.Context, uid keybase1.UID, updates []chat1.ConversationStaleUpdate)
- func (n *NotifyRouter) HandleChatTypingUpdate(ctx context.Context, updates []chat1.ConvTypingUpdate)
- func (n *NotifyRouter) HandleClientOutOfDate(upgradeTo, upgradeURI, upgradeMsg string)
- func (n *NotifyRouter) HandleDeviceCloneNotification(newClones int)
- func (n *NotifyRouter) HandleFSActivity(activity keybase1.FSNotification)
- func (n *NotifyRouter) HandleFSEditListRequest(ctx context.Context, arg keybase1.FSEditListRequest)
- func (n *NotifyRouter) HandleFSEditListResponse(ctx context.Context, arg keybase1.FSEditListArg)
- func (n *NotifyRouter) HandleFSPathUpdated(path string)
- func (n *NotifyRouter) HandleFSSyncEvent(ctx context.Context, arg keybase1.FSPathSyncStatus)
- func (n *NotifyRouter) HandleFSSyncStatus(ctx context.Context, arg keybase1.FSSyncStatusArg)
- func (n *NotifyRouter) HandleFavoritesChanged(uid keybase1.UID)
- func (n *NotifyRouter) HandleKeyfamilyChanged(uid keybase1.UID)
- func (n *NotifyRouter) HandleLogin(u string)
- func (n *NotifyRouter) HandleLogout()
- func (n *NotifyRouter) HandleNewChatActivity(ctx context.Context, uid keybase1.UID, topicType chat1.TopicType, ...)
- func (n *NotifyRouter) HandleNewTeamEK(ctx context.Context, teamID keybase1.TeamID, generation keybase1.EkGeneration)
- func (n *NotifyRouter) HandlePGPKeyInSecretStoreFile()
- func (n *NotifyRouter) HandlePaperKeyCached(uid keybase1.UID, encKID keybase1.KID, sigKID keybase1.KID)
- func (n *NotifyRouter) HandleReachability(r keybase1.Reachability)
- func (n *NotifyRouter) HandleServiceShutdown()
- func (n *NotifyRouter) HandleTeamAbandoned(ctx context.Context, teamID keybase1.TeamID)
- func (n *NotifyRouter) HandleTeamChangedByBothKeys(ctx context.Context, teamID keybase1.TeamID, teamName string, ...)
- func (n *NotifyRouter) HandleTeamChangedByID(ctx context.Context, teamID keybase1.TeamID, latestSeqno keybase1.Seqno, ...)
- func (n *NotifyRouter) HandleTeamChangedByName(ctx context.Context, teamName string, latestSeqno keybase1.Seqno, ...)
- func (n *NotifyRouter) HandleTeamDeleted(ctx context.Context, teamID keybase1.TeamID)
- func (n *NotifyRouter) HandleTeamExit(ctx context.Context, teamID keybase1.TeamID)
- func (n *NotifyRouter) HandleTrackingChanged(uid keybase1.UID, username NormalizedUsername, isTracking bool)
- func (n *NotifyRouter) HandleUserChanged(uid keybase1.UID)
- func (n *NotifyRouter) HandleWalletPaymentNotification(ctx context.Context, accountID stellar1.AccountID, ...)
- func (n *NotifyRouter) SetChannels(i ConnectionID, nc keybase1.NotificationChannels)
- func (n *NotifyRouter) SetListener(listener NotifyListener)
- func (n *NotifyRouter) Shutdown()
- type NullConfiguration
- func (n NullConfiguration) GetAPIDump() (bool, bool)
- func (n NullConfiguration) GetAPITimeout() (time.Duration, bool)
- func (n NullConfiguration) GetAllUserConfigs() (*UserConfig, []UserConfig, error)
- func (n NullConfiguration) GetAllUsernames() (NormalizedUsername, []NormalizedUsername, error)
- func (n NullConfiguration) GetAppType() AppType
- func (n NullConfiguration) GetAutoFork() (bool, bool)
- func (n NullConfiguration) GetAutoWallet() (bool, bool)
- func (n NullConfiguration) GetBGIdentifierDisabled() (bool, bool)
- func (n NullConfiguration) GetBool(string, bool) (bool, bool)
- func (n NullConfiguration) GetBoolAtPath(string) (bool, bool)
- func (n NullConfiguration) GetBug3964RepairTime(NormalizedUsername) (time.Time, error)
- func (n NullConfiguration) GetBundledCA(h string) string
- func (n NullConfiguration) GetChatDbFilename() string
- func (n NullConfiguration) GetChatDelivererInterval() (time.Duration, bool)
- func (n NullConfiguration) GetChatInboxSourceLocalizeThreads() (int, bool)
- func (n NullConfiguration) GetCodeSigningKIDs() []string
- func (n NullConfiguration) GetConfigFilename() string
- func (n NullConfiguration) GetDbFilename() string
- func (n NullConfiguration) GetDebug() (bool, bool)
- func (n NullConfiguration) GetDeviceCloneStateFilename() string
- func (n NullConfiguration) GetDeviceID() keybase1.DeviceID
- func (n NullConfiguration) GetDeviceIDForUID(u keybase1.UID) keybase1.DeviceID
- func (n NullConfiguration) GetDeviceIDForUsername(un NormalizedUsername) keybase1.DeviceID
- func (n NullConfiguration) GetDisplayRawUntrustedOutput() (bool, bool)
- func (n NullConfiguration) GetEmail() string
- func (n NullConfiguration) GetFeatureFlags() (FeatureFlags, error)
- func (n NullConfiguration) GetGString(string) string
- func (n NullConfiguration) GetGpg() string
- func (n NullConfiguration) GetGpgHome() string
- func (n NullConfiguration) GetGpgOptions() []string
- func (n NullConfiguration) GetGregorDisabled() (bool, bool)
- func (n NullConfiguration) GetGregorPingInterval() (time.Duration, bool)
- func (n NullConfiguration) GetGregorPingTimeout() (time.Duration, bool)
- func (n NullConfiguration) GetGregorSaveInterval() (time.Duration, bool)
- func (n NullConfiguration) GetGregorURI() string
- func (n NullConfiguration) GetHome() string
- func (n NullConfiguration) GetIntAtPath(string) (int, bool)
- func (n NullConfiguration) GetInterfaceAtPath(string) (interface{}, error)
- func (n NullConfiguration) GetLevelDBNumFiles() (int, bool)
- func (n NullConfiguration) GetLinkCacheCleanDur() (time.Duration, bool)
- func (n NullConfiguration) GetLinkCacheSize() (int, bool)
- func (n NullConfiguration) GetLocalRPCDebug() string
- func (n NullConfiguration) GetLocalTrackMaxAge() (time.Duration, bool)
- func (n NullConfiguration) GetLogFile() string
- func (n NullConfiguration) GetLogFormat() string
- func (n NullConfiguration) GetLogPrefix() string
- func (n NullConfiguration) GetMerkleKIDs() []string
- func (n NullConfiguration) GetMountDir() string
- func (n NullConfiguration) GetNoAutoFork() (bool, bool)
- func (n NullConfiguration) GetNoPinentry() (bool, bool)
- func (n NullConfiguration) GetNullAtPath(string) bool
- func (n NullConfiguration) GetPGPFingerprint() *PGPFingerprint
- func (n NullConfiguration) GetPayloadCacheSize() (int, bool)
- func (n NullConfiguration) GetPidFile() string
- func (n NullConfiguration) GetPinentry() string
- func (n NullConfiguration) GetProofCacheLongDur() (time.Duration, bool)
- func (n NullConfiguration) GetProofCacheMediumDur() (time.Duration, bool)
- func (n NullConfiguration) GetProofCacheShortDur() (time.Duration, bool)
- func (n NullConfiguration) GetProofCacheSize() (int, bool)
- func (n NullConfiguration) GetProxy() string
- func (n NullConfiguration) GetProxyCACerts() ([]string, error)
- func (n NullConfiguration) GetPvlKitFilename() string
- func (n NullConfiguration) GetRememberPassphrase() (bool, bool)
- func (n NullConfiguration) GetRunMode() (RunMode, error)
- func (n NullConfiguration) GetSalt() []byte
- func (n NullConfiguration) GetScraperTimeout() (time.Duration, bool)
- func (n NullConfiguration) GetSecretKeyringTemplate() string
- func (n NullConfiguration) GetSecurityAccessGroupOverride() (bool, bool)
- func (n NullConfiguration) GetServerURI() string
- func (n NullConfiguration) GetSessionFilename() string
- func (n NullConfiguration) GetSlowGregorConn() (bool, bool)
- func (n NullConfiguration) GetSocketFile() string
- func (n NullConfiguration) GetStandalone() (bool, bool)
- func (n NullConfiguration) GetString(string) string
- func (n NullConfiguration) GetStringAtPath(string) (string, bool)
- func (n NullConfiguration) GetTimers() string
- func (n NullConfiguration) GetTorHiddenAddress() string
- func (n NullConfiguration) GetTorMode() (TorMode, error)
- func (n NullConfiguration) GetTorProxy() string
- func (n NullConfiguration) GetUID() (ret keybase1.UID)
- func (n NullConfiguration) GetUIDForUsername(u NormalizedUsername) keybase1.UID
- func (n NullConfiguration) GetUIDMapFullNameCacheSize() (int, bool)
- func (n NullConfiguration) GetUPAKCacheSize() (int, bool)
- func (n NullConfiguration) GetUpdateDisabled() (bool, bool)
- func (n NullConfiguration) GetUpdateLastChecked() keybase1.Time
- func (n NullConfiguration) GetUpdatePreferenceAuto() (bool, bool)
- func (n NullConfiguration) GetUpdatePreferenceSkip() string
- func (n NullConfiguration) GetUpdatePreferenceSnoozeUntil() keybase1.Time
- func (n NullConfiguration) GetUpdateURL() string
- func (n NullConfiguration) GetUpdaterConfigFilename() string
- func (n NullConfiguration) GetUpgradePerUserKey() (bool, bool)
- func (n NullConfiguration) GetUserCacheMaxAge() (time.Duration, bool)
- func (n NullConfiguration) GetUserConfig() (*UserConfig, error)
- func (n NullConfiguration) GetUserConfigForUsername(s NormalizedUsername) (*UserConfig, error)
- func (n NullConfiguration) GetUsername() NormalizedUsername
- func (n NullConfiguration) GetUsernameForUID(u keybase1.UID) NormalizedUsername
- func (n NullConfiguration) GetVDebugSetting() string
- type NullConnectivityMonitor
- type ObjType
- type OuterLinkV2
- type OuterLinkV2WithMetadata
- func (o *OuterLinkV2WithMetadata) CodecDecodeSelf(d *codec.Decoder)
- func (o *OuterLinkV2WithMetadata) CodecEncodeSelf(e *codec.Encoder)
- func (o OuterLinkV2WithMetadata) EncodeStubbed() string
- func (o OuterLinkV2WithMetadata) LinkID() LinkID
- func (o OuterLinkV2WithMetadata) Raw() []byte
- func (o OuterLinkV2WithMetadata) SigID() keybase1.SigID
- func (o OuterLinkV2WithMetadata) Verify(ctx VerifyContext) (kid keybase1.KID, err error)
- type OutputDescriptor
- type PDPKA
- type PDPKALoginPackage
- type PGPFingerprint
- func GetPGPFingerprint(w *jsonw.Wrapper) (*PGPFingerprint, error)
- func GetPGPFingerprintFromGenericKey(k GenericKey) *PGPFingerprint
- func ImportPGPFingerprintSlice(fp []byte) (ret *PGPFingerprint)
- func PGPFingerprintFromHex(s string) (*PGPFingerprint, error)
- func PGPFingerprintFromHexNoError(s string) *PGPFingerprint
- func PGPFingerprintFromSlice(b []byte) (*PGPFingerprint, error)
- func (p PGPFingerprint) Eq(p2 PGPFingerprint) bool
- func (p PGPFingerprint) GetProofState() keybase1.ProofState
- func (p PGPFingerprint) GetProofType() keybase1.ProofType
- func (p PGPFingerprint) LastWriterWins() bool
- func (p *PGPFingerprint) MarshalJSON() ([]byte, error)
- func (p *PGPFingerprint) Match(q string, exact bool) bool
- func (p PGPFingerprint) String() string
- func (p PGPFingerprint) ToDisplayString(verbose bool) string
- func (p PGPFingerprint) ToIDString() string
- func (p PGPFingerprint) ToKeyID() string
- func (p PGPFingerprint) ToKeyValuePair() (string, string)
- func (p PGPFingerprint) ToQuads() string
- func (p *PGPFingerprint) UnmarshalJSON(b []byte) error
- type PGPGenArg
- func (a *PGPGenArg) AddDefaultUID(g *GlobalContext)
- func (a *PGPGenArg) CreatePGPIDs() error
- func (a PGPGenArg) ExportTo(ret *keybase1.PGPKeyGenArg)
- func (a *PGPGenArg) Init() (err error)
- func (a *PGPGenArg) MakeAllIds(g *GlobalContext) error
- func (a *PGPGenArg) PGPUserIDs() ([]*packet.UserId, error)
- func (a *PGPGenArg) PreferredCompression() []uint8
- func (a *PGPGenArg) PreferredHash() []uint8
- func (a *PGPGenArg) PreferredSymmetric() []uint8
- type PGPKeyBundle
- func GeneratePGPKeyBundle(g *GlobalContext, arg PGPGenArg, logUI LogUI) (*PGPKeyBundle, error)
- func LoadPGPKeyFromLocalDB(k keybase1.KID, g *GlobalContext) (*PGPKeyBundle, error)
- func NewGeneratedPGPKeyBundle(entity *openpgp.Entity) *PGPKeyBundle
- func NewPGPKeyBundle(entity *openpgp.Entity) *PGPKeyBundle
- func (k *PGPKeyBundle) CanDecrypt() bool
- func (k *PGPKeyBundle) CanEncrypt() bool
- func (k *PGPKeyBundle) CanSign() bool
- func (k *PGPKeyBundle) CheckFingerprint(fp *PGPFingerprint) error
- func (k *PGPKeyBundle) CheckIdentity(kbid Identity) (match bool, ctime int64, etime int64)
- func (k *PGPKeyBundle) CheckSecretKey() (err error)
- func (k *PGPKeyBundle) DecryptFromString(ciphertext string) (msg []byte, sender keybase1.KID, err error)
- func (k PGPKeyBundle) DecryptionKeys() []openpgp.Key
- func (k *PGPKeyBundle) Encode() (ret string, err error)
- func (k *PGPKeyBundle) EncodeToStream(wc io.WriteCloser, private bool) error
- func (k *PGPKeyBundle) EncryptToString(plaintext []byte, sender GenericKey) (ciphertext string, err error)
- func (bundle *PGPKeyBundle) Export() keybase1.PublicKey
- func (k *PGPKeyBundle) ExportPublicAndPrivate() (public RawPublicKey, private RawPrivateKey, err error)
- func (k *PGPKeyBundle) FindEmail(em string) bool
- func (k *PGPKeyBundle) FindKeybaseUsername(un string) bool
- func (k *PGPKeyBundle) FullHash() (string, error)
- func (k PGPKeyBundle) GetAlgoType() AlgoType
- func (k *PGPKeyBundle) GetBinaryKID() keybase1.BinaryKID
- func (k PGPKeyBundle) GetFingerprint() PGPFingerprint
- func (k PGPKeyBundle) GetFingerprintP() *PGPFingerprint
- func (k *PGPKeyBundle) GetKID() keybase1.KID
- func (k *PGPKeyBundle) GetPGPIdentities() []keybase1.PGPIdentity
- func (k PGPKeyBundle) GetPrimaryUID() string
- func (k *PGPKeyBundle) HasSecretKey() bool
- func (k PGPKeyBundle) HumanDescription() string
- func (k *PGPKeyBundle) IdentityNames() []string
- func (k *PGPKeyBundle) InitGPGKey()
- func (k PGPKeyBundle) KeyDescription() string
- func (k PGPKeyBundle) KeyInfo() (algorithm, kid, creation string)
- func (k PGPKeyBundle) KeysById(id uint64, fp []byte) []openpgp.Key
- func (k PGPKeyBundle) KeysByIdUsage(id uint64, fp []byte, usage byte) []openpgp.Key
- func (k PGPKeyBundle) MatchesKey(key *openpgp.Key) bool
- func (to *PGPKeyBundle) MergeKey(from *PGPKeyBundle)
- func (k PGPKeyBundle) SamePrimaryAs(k2 PGPKeyBundle) bool
- func (k *PGPKeyBundle) SecretSymmetricKey(reason EncryptionReason) (NaclSecretBoxKey, error)
- func (k *PGPKeyBundle) SerializePrivate(w io.Writer) error
- func (k *PGPKeyBundle) SignToString(msg []byte) (sig string, id keybase1.SigID, err error)
- func (k *PGPKeyBundle) StoreToLocalDb(g *GlobalContext) error
- func (k *PGPKeyBundle) StripRevocations() (strippedKey *PGPKeyBundle)
- func (key *PGPKeyBundle) ToServerSKB(gc *GlobalContext, tsec Triplesec, gen PassphraseGeneration) (ret *SKB, err error)
- func (k *PGPKeyBundle) Unlock(m MetaContext, reason string, secretUI SecretUI) error
- func (k PGPKeyBundle) UsersDescription() []string
- func (k PGPKeyBundle) VerboseDescription() string
- func (k PGPKeyBundle) VerifyString(ctx VerifyContext, sig string, msg []byte) (id keybase1.SigID, err error)
- func (k PGPKeyBundle) VerifyStringAndExtract(ctx VerifyContext, sig string) (msg []byte, id keybase1.SigID, err error)
- type PGPKeySet
- type PGPPullLoggedOutError
- type PGPUpdateChainLink
- type PIDFileLockError
- type PacketTag
- type PacketVersion
- type Packetable
- type PaperChecker
- type PaperKeyPhrase
- type ParsedSig
- type Parser
- type PassphraseChecker
- type PassphraseError
- type PassphraseGeneration
- type PassphrasePrompter
- type PassphraseProvisionImpossibleError
- type PassphraseStream
- func GetPassphraseStreamStored(m MetaContext) (pps *PassphraseStream, err error)
- func GetPassphraseStreamViaPromptInLoginContext(m MetaContext) (pps *PassphraseStream, err error)
- func NewPassphraseStream(s []byte) *PassphraseStream
- func NewPassphraseStreamLKSecOnly(s *LKSec) (*PassphraseStream, error)
- func VerifyPassphraseForLoggedInUser(m MetaContext, pp string) (pps *PassphraseStream, err error)
- func VerifyPassphraseGetStreamInLoginContext(m MetaContext, passphrase string) (pps *PassphraseStream, err error)
- func (ps *PassphraseStream) Clone() *PassphraseStream
- func (ps PassphraseStream) DHSeed() []byte
- func (ps PassphraseStream) EdDSASeed() []byte
- func (ps PassphraseStream) Export() keybase1.PassphraseStream
- func (ps PassphraseStream) Generation() PassphraseGeneration
- func (ps PassphraseStream) LksClientHalf() LKSecClientHalf
- func (ps PassphraseStream) PDPKA5KID() (keybase1.KID, error)
- func (ps PassphraseStream) PWHash() []byte
- func (ps *PassphraseStream) SetGeneration(gen PassphraseGeneration)
- func (ps PassphraseStream) String() string
- func (ps PassphraseStream) ToLKSec(uid keybase1.UID) (*LKSec, error)
- type PassphraseStreamCache
- func (s *PassphraseStreamCache) Clear()
- func (s *PassphraseStreamCache) Dump()
- func (s *PassphraseStreamCache) MutatePassphraseStream(f func(*PassphraseStream)) bool
- func (s *PassphraseStreamCache) PassphraseStream() *PassphraseStream
- func (s *PassphraseStreamCache) PassphraseStreamAndTriplesec() (pps *PassphraseStream, tsec Triplesec)
- func (s *PassphraseStreamCache) TriplesecAndGeneration() (Triplesec, PassphraseGeneration)
- func (s *PassphraseStreamCache) Valid() bool
- func (s *PassphraseStreamCache) ValidPassphraseStream() bool
- func (s *PassphraseStreamCache) ValidTsec() bool
- type PassphraseType
- type PathStep
- type PathSteps
- type PayloadCache
- type PerUserKeyChainLink
- func (s *PerUserKeyChainLink) GetDelegatedKid() (res keybase1.KID)
- func (s *PerUserKeyChainLink) GetRole() KeyRole
- func (s *PerUserKeyChainLink) ToDisplayString() string
- func (s *PerUserKeyChainLink) ToPerUserKey() keybase1.PerUserKey
- func (s *PerUserKeyChainLink) Type() string
- func (s *PerUserKeyChainLink) VerifyReverseSig(_ ComputedKeyFamily) (err error)
- type PerUserKeyImportError
- type PerUserKeyPrev
- type PerUserKeySeed
- type PerUserKeyring
- func (s *PerUserKeyring) AddKey(m MetaContext, generation keybase1.PerUserKeyGeneration, seqno keybase1.Seqno, ...) error
- func (s *PerUserKeyring) CurrentGeneration() keybase1.PerUserKeyGeneration
- func (s *PerUserKeyring) GetEncryptionKeyByGeneration(m MetaContext, gen keybase1.PerUserKeyGeneration) (*NaclDHKeyPair, error)
- func (s *PerUserKeyring) GetEncryptionKeyByKID(m MetaContext, kid keybase1.KID) (*NaclDHKeyPair, error)
- func (s *PerUserKeyring) GetEncryptionKeyBySeqno(m MetaContext, seqno keybase1.Seqno) (*NaclDHKeyPair, error)
- func (s *PerUserKeyring) GetEncryptionKeyBySeqnoOrSync(m MetaContext, seqno keybase1.Seqno) (*NaclDHKeyPair, error)
- func (s *PerUserKeyring) GetLatestSigningKey(m MetaContext) (*NaclSigningKeyPair, error)
- func (s *PerUserKeyring) GetSeedByGeneration(m MetaContext, gen keybase1.PerUserKeyGeneration) (res PerUserKeySeed, err error)
- func (s *PerUserKeyring) GetSeedByGenerationOrSync(m MetaContext, gen keybase1.PerUserKeyGeneration) (res PerUserKeySeed, err error)
- func (s *PerUserKeyring) GetUID() keybase1.UID
- func (s *PerUserKeyring) HasAnyKeys() bool
- func (s *PerUserKeyring) PrepareBoxForNewDevice(m MetaContext, receiverKey NaclDHKeyPair, senderKey NaclDHKeyPair) (box keybase1.PerUserKeyBox, err error)
- func (s *PerUserKeyring) PrepareBoxesForDevices(m MetaContext, contents PerUserKeySeed, ...) (boxes []keybase1.PerUserKeyBox, err error)
- func (s *PerUserKeyring) PreparePrev(m MetaContext, newSeed PerUserKeySeed, ...) (PerUserKeyPrev, error)
- func (s *PerUserKeyring) Sync(m MetaContext) (err error)
- func (s *PerUserKeyring) SyncAsPaperKey(m MetaContext, upak *keybase1.UserPlusAllKeys, deviceID keybase1.DeviceID, ...) (err error)
- func (s *PerUserKeyring) SyncWithExtras(m MetaContext, upak *keybase1.UserPlusAllKeys) (err error)
- type PerUserKeysList
- type PgpUI
- type PortRangeListenerSource
- type PostAuthProofArg
- type PostAuthProofRes
- type PostProofArg
- type PostProofRes
- type ProfileNotPublicError
- type PromptArg
- type PromptDefault
- type PromptDescriptor
- type Proof
- type ProofAPIError
- type ProofCache
- type ProofChecker
- type ProofCheckerMode
- type ProofError
- type ProofErrorImpl
- type ProofLinkWithState
- type ProofMetadata
- type ProofNotFoundForServiceError
- type ProofNotFoundForUsernameError
- type ProofNotYetAvailableError
- type ProofSet
- type ProtocolDowngradeError
- type ProveUI
- type ProvisionFailedOfflineError
- type ProvisionUI
- type ProvisionUnavailableError
- type ProvisionViaDeviceRequiredError
- type ProvisionalLoginContext
- func (p *ProvisionalLoginContext) ClearKeyring()
- func (p *ProvisionalLoginContext) CreateLoginSessionWithSalt(emailOrUsername string, salt []byte) error
- func (p *ProvisionalLoginContext) CreateStreamCache(tsec Triplesec, pps *PassphraseStream)
- func (p *ProvisionalLoginContext) Dump(m MetaContext, prefix string)
- func (p *ProvisionalLoginContext) GetUID() keybase1.UID
- func (p *ProvisionalLoginContext) GetUnlockedPaperEncKey() GenericKey
- func (p *ProvisionalLoginContext) GetUnlockedPaperSigKey() GenericKey
- func (p *ProvisionalLoginContext) GetUserVersion() keybase1.UserVersion
- func (p *ProvisionalLoginContext) GetUsername() NormalizedUsername
- func (p *ProvisionalLoginContext) Keyring(m MetaContext) (ret *SKBKeyringFile, err error)
- func (p *ProvisionalLoginContext) LocalSession() *Session
- func (p *ProvisionalLoginContext) LoggedInLoad() (bool, error)
- func (p *ProvisionalLoginContext) LoginSession() *LoginSession
- func (p *ProvisionalLoginContext) PassphraseStream() *PassphraseStream
- func (p *ProvisionalLoginContext) PassphraseStreamCache() *PassphraseStreamCache
- func (p *ProvisionalLoginContext) RunSecretSyncer(m MetaContext, uid keybase1.UID) error
- func (p *ProvisionalLoginContext) Salt() []byte
- func (p *ProvisionalLoginContext) SaveState(sessionID, csrf string, username NormalizedUsername, uv keybase1.UserVersion, ...) (err error)
- func (p *ProvisionalLoginContext) SecretSyncer() *SecretSyncer
- func (p *ProvisionalLoginContext) SetLoginSession(l *LoginSession)
- func (p *ProvisionalLoginContext) SetStreamCache(c *PassphraseStreamCache)
- func (p *ProvisionalLoginContext) SetUsernameUserVersion(username NormalizedUsername, uv keybase1.UserVersion) error
- type PseudonymGetError
- type PublicKeyList
- type PvlKitHash
- type PvlKitString
- type PvlSource
- type PvlSourceError
- type PvlString
- type PvlUnparsed
- type RPCCanceller
- type RPCCancellerKey
- type RPCLogFactory
- type RandomPortListenerSource
- type RateLimitCategory
- type RateLimits
- type RawKeyFamily
- type RawPrivateKey
- type RawPublicKey
- type ReadCloseSeeker
- type ReadCloser
- type ReceiverDeviceError
- type RecipientNotFoundError
- type ReloginRequiredError
- type RemoteProofChainLink
- type RemoteProofLinks
- func (r *RemoteProofLinks) Active() []RemoteProofChainLink
- func (r *RemoteProofLinks) AddProofsToSet(existing *ProofSet, okStates []keybase1.ProofState)
- func (r *RemoteProofLinks) ForService(st ServiceType) []RemoteProofChainLink
- func (r *RemoteProofLinks) Insert(link RemoteProofChainLink, err ProofError)
- func (r *RemoteProofLinks) TrackSet() *TrackSet
- func (r *RemoteProofLinks) TrackingStatement() *jsonw.Wrapper
- type RemoteStream
- type RemoteStreamBuffered
- type RepoAlreadyExistsError
- type RepoDoesntExistError
- type ReportingTimer
- type ReportingTimerDummy
- type ReportingTimerReal
- type Requester
- type ResolutionError
- type ResolutionErrorKind
- type ResolveCacheStats
- type ResolveResult
- func (res ResolveResult) FailOnDeleted() ResolveResult
- func (res *ResolveResult) GetBody() *jsonw.Wrapper
- func (res *ResolveResult) GetDeleted() bool
- func (res *ResolveResult) GetError() error
- func (res *ResolveResult) GetNormalizedQueriedUsername() NormalizedUsername
- func (res *ResolveResult) GetNormalizedUsername() NormalizedUsername
- func (res *ResolveResult) GetTeamID() keybase1.TeamID
- func (res *ResolveResult) GetTeamName() keybase1.TeamName
- func (res *ResolveResult) GetUID() keybase1.UID
- func (res *ResolveResult) GetUsername() string
- func (res ResolveResult) HasPrimaryKey() bool
- func (res *ResolveResult) SetUIDForTesting(u keybase1.UID)
- func (res ResolveResult) String() string
- func (res *ResolveResult) User() keybase1.User
- func (res *ResolveResult) UserOrTeam() keybase1.UserOrTeamLite
- func (res *ResolveResult) WasKBAssertion() bool
- func (res *ResolveResult) WasTeamIDAssertion() bool
- type ResolvedAssertion
- type Resolver
- type ResolverImpl
- func (r *ResolverImpl) EnableCaching(m MetaContext)
- func (r *ResolverImpl) PurgeResolveCache(m MetaContext, input string) (err error)
- func (r *ResolverImpl) Resolve(m MetaContext, input string) ResolveResult
- func (r *ResolverImpl) ResolveFullExpression(m MetaContext, input string) (res ResolveResult)
- func (r *ResolverImpl) ResolveFullExpressionNeedUsername(m MetaContext, input string) (res ResolveResult)
- func (r *ResolverImpl) ResolveFullExpressionWithBody(m MetaContext, input string) (res ResolveResult)
- func (r *ResolverImpl) ResolveUser(m MetaContext, assertion string) (u keybase1.User, res ResolveResult, err error)
- func (r *ResolverImpl) ResolveWithBody(m MetaContext, input string) ResolveResult
- func (r *ResolverImpl) Shutdown(m MetaContext)
- type RetryExhaustedError
- type ReverseSigError
- type RevokeChainLink
- type RevokeCurrentDeviceError
- type RevokeLastDeviceError
- type RevokeLastDevicePGPError
- type RevokedKey
- type RunGpg2Arg
- type RunGpg2Res
- type RunMode
- type RunModeGetter
- type S
- type SKB
- func LockedLocalSecretKey(m MetaContext, ska SecretKeyArg) (*SKB, error)
- func NewSKB() *SKB
- func NewSKBWithGlobalContext(g *GlobalContext) *SKB
- func ToServerSKB(gc *GlobalContext, key GenericKey, tsec Triplesec, gen PassphraseGeneration) (ret *SKB, err error)
- func WriteLksSKBToKeyring(m MetaContext, k GenericKey, lks *LKSec) (skb *SKB, err error)
- func (s *SKB) ArmoredEncode() (ret string, err error)
- func (s *SKB) Dump()
- func (s *SKB) GetPubKey() (key GenericKey, err error)
- func (s *SKB) HumanDescription(owner *User) (string, error)
- func (s *SKB) PromptAndUnlock(m MetaContext, arg SecretKeyPromptArg, secretStore SecretStore, me *User) (ret GenericKey, err error)
- func (s *SKB) RawUnlockedKey() []byte
- func (s *SKB) ReadKey() (g GenericKey, err error)
- func (s *SKB) SetUID(uid keybase1.UID)
- func (s *SKB) ToPacket() (ret *KeybasePacket, err error)
- func (s *SKB) UnlockNoPrompt(m MetaContext, secretStore SecretStore) (ret GenericKey, err error)
- func (s *SKB) UnlockSecretKey(m MetaContext, passphrase string, tsec Triplesec, pps *PassphraseStream, ...) (key GenericKey, err error)
- func (s *SKB) UnlockWithStoredSecret(m MetaContext, secretRetriever SecretRetriever) (ret GenericKey, err error)
- func (s *SKB) VerboseDescription() (ret string, err error)
- type SKBKeyringFile
- func (k *SKBKeyringFile) AllPGPBlocks() ([]*SKB, error)
- func (k *SKBKeyringFile) Bug3964Repair(m MetaContext, lks *LKSec, dkm DeviceKeyMap) (ret *SKBKeyringFile, serverHalfSet *LKSecServerHalfSet, err error)
- func (k *SKBKeyringFile) FindSecretKey(kids []keybase1.KID) (ret *SKB)
- func (k *SKBKeyringFile) GetFilename() string
- func (k *SKBKeyringFile) HasPGPKeys() bool
- func (k *SKBKeyringFile) Index() (err error)
- func (k *SKBKeyringFile) IsForUsername(un NormalizedUsername) bool
- func (k *SKBKeyringFile) Load() (err error)
- func (k *SKBKeyringFile) LoadAndIndex() error
- func (k *SKBKeyringFile) LookupByFingerprint(fp PGPFingerprint) *SKB
- func (k *SKBKeyringFile) LookupByKid(kid keybase1.KID) *SKB
- func (k *SKBKeyringFile) MTime() (mtime time.Time, err error)
- func (k *SKBKeyringFile) MarkDirty()
- func (k *SKBKeyringFile) Push(skb *SKB) error
- func (k *SKBKeyringFile) PushAndSave(skb *SKB) error
- func (k *SKBKeyringFile) RemoveAllPGPBlocks() error
- func (k *SKBKeyringFile) Save() error
- func (k *SKBKeyringFile) SearchWithComputedKeyFamily(ckf *ComputedKeyFamily, ska SecretKeyArg) []*SKB
- func (k *SKBKeyringFile) Username() NormalizedUsername
- func (k *SKBKeyringFile) WriteTo(w io.Writer) (int64, error)
- type SKBPriv
- type SafeWriteLogger
- type SafeWriter
- type SaltpackEncryptArg
- type SaltpackReceiverSymmetricKey
- type SaltpackRecipientKeyfinderArg
- type SaltpackRecipientKeyfinderEngineInterface
- type SaltpackUI
- type SaltpackVerifyContext
- type SecretKeyArg
- type SecretKeyPromptArg
- type SecretKeyType
- type SecretRetriever
- type SecretStore
- type SecretStoreAll
- type SecretStoreError
- type SecretStoreFile
- func (s *SecretStoreFile) ClearSecret(m MetaContext, username NormalizedUsername) error
- func (s *SecretStoreFile) GetUsersWithStoredSecrets(m MetaContext) ([]string, error)
- func (s *SecretStoreFile) RetrieveSecret(m MetaContext, username NormalizedUsername) (LKSecFullSecret, error)
- func (s *SecretStoreFile) StoreSecret(m MetaContext, username NormalizedUsername, secret LKSecFullSecret) error
- type SecretStoreImp
- type SecretStoreLocked
- func (s *SecretStoreLocked) ClearSecret(m MetaContext, username NormalizedUsername) error
- func (s *SecretStoreLocked) GetUsersWithStoredSecrets(m MetaContext) ([]string, error)
- func (s *SecretStoreLocked) RetrieveSecret(m MetaContext, username NormalizedUsername) (LKSecFullSecret, error)
- func (s *SecretStoreLocked) StoreSecret(m MetaContext, username NormalizedUsername, secret LKSecFullSecret) error
- type SecretStoreMem
- func (s *SecretStoreMem) ClearSecret(m MetaContext, username NormalizedUsername) error
- func (s *SecretStoreMem) GetUsersWithStoredSecrets(m MetaContext) ([]string, error)
- func (s *SecretStoreMem) RetrieveSecret(m MetaContext, username NormalizedUsername) (LKSecFullSecret, error)
- func (s *SecretStoreMem) StoreSecret(m MetaContext, username NormalizedUsername, secret LKSecFullSecret) error
- type SecretStorer
- type SecretSyncer
- func (ss *SecretSyncer) ActiveDevices(includeTypesSet DeviceTypeSet) (DeviceKeyMap, error)
- func (ss *SecretSyncer) AllActiveKeys(ckf *ComputedKeyFamily) []*SKB
- func (ss *SecretSyncer) AllDevices() DeviceKeyMap
- func (ss *SecretSyncer) Clear() error
- func (ss *SecretSyncer) Devices() (DeviceKeyMap, error)
- func (ss *SecretSyncer) DumpPrivateKeys()
- func (ss *SecretSyncer) FindActiveKey(ckf *ComputedKeyFamily) (ret *SKB, err error)
- func (ss *SecretSyncer) FindDevice(id keybase1.DeviceID) (DeviceKey, error)
- func (ss *SecretSyncer) FindPrivateKey(kid string) (ServerPrivateKey, bool)
- func (ss *SecretSyncer) HasActiveDevice(includeTypesSet DeviceTypeSet) (bool, error)
- func (ss *SecretSyncer) HasDevices() bool
- func (ss *SecretSyncer) IsDeviceNameTaken(name string, includeTypesSet DeviceTypeSet) bool
- type SecretUI
- type SelfDestructingDeviceWithKeys
- type SelfNotFoundError
- type SelfSigChainLink
- func (s *SelfSigChainLink) CheckDataJSON() *jsonw.Wrapper
- func (s *SelfSigChainLink) ComputeTrackDiff(tl *TrackLookup) TrackDiff
- func (s *SelfSigChainLink) DisplayCheck(ui IdentifyUI, lcr LinkCheckResult) error
- func (s *SelfSigChainLink) GetDevice() *Device
- func (s *SelfSigChainLink) GetHostname() string
- func (s *SelfSigChainLink) GetPGPFullHash() string
- func (s *SelfSigChainLink) GetProofType() keybase1.ProofType
- func (s *SelfSigChainLink) GetProtocol() string
- func (s *SelfSigChainLink) GetRemoteUsername() string
- func (s *SelfSigChainLink) LastWriterWins() bool
- func (s *SelfSigChainLink) ParseDevice() (err error)
- func (s *SelfSigChainLink) ProofText() string
- func (s *SelfSigChainLink) TableKey() string
- func (s *SelfSigChainLink) ToDisplayString() string
- func (s *SelfSigChainLink) ToIDString() string
- func (s *SelfSigChainLink) ToKeyValuePair() (string, string)
- func (s *SelfSigChainLink) ToTrackingStatement(keybase1.ProofState) (*jsonw.Wrapper, error)
- func (s *SelfSigChainLink) Type() string
- type SelfTrackError
- type Server
- type ServerChainError
- type ServerPrivateKey
- type ServerPrivateKeyMap
- type ServerPrivateKeys
- type ServiceBlock
- type ServiceInfo
- func KeybaseServiceInfo(g *GlobalContext) ServiceInfo
- func LoadServiceInfo(path string) (*ServiceInfo, error)
- func NewServiceInfo(version string, prerelease string, label string, pid int) ServiceInfo
- func WaitForServiceInfoFile(path string, label string, pid string, timeout time.Duration, log serviceLog) (*ServiceInfo, error)
- type ServiceType
- type Session
- func (s *Session) APIArgs() (token, csrf string)
- func (s *Session) Clone() *Session
- func (s *Session) GetCsrf() string
- func (s *Session) GetDeviceID() keybase1.DeviceID
- func (s *Session) GetToken() string
- func (s *Session) GetUID() keybase1.UID
- func (s *Session) GetUsername() *NormalizedUsername
- func (s *Session) HasSessionToken() bool
- func (s *Session) Invalidate()
- func (s *Session) IsLoggedIn() bool
- func (s *Session) IsRecent() bool
- func (s *Session) IsValid() bool
- func (s *Session) SetDeviceProvisioned(devid keybase1.DeviceID) error
- func (s *Session) SetLoggedIn(sessionID, csrfToken string, username NormalizedUsername, uid keybase1.UID, ...) error
- func (s *Session) SetUsername(username NormalizedUsername)
- type ShutdownHook
- type SibkeyAlreadyExistsError
- type SibkeyChainLink
- func (s *SibkeyChainLink) GetDelegatedKid() keybase1.KID
- func (s *SibkeyChainLink) GetDevice() *Device
- func (s *SibkeyChainLink) GetPGPFullHash() string
- func (s *SibkeyChainLink) GetRole() KeyRole
- func (s *SibkeyChainLink) ToDisplayString() string
- func (s *SibkeyChainLink) Type() string
- func (s *SibkeyChainLink) VerifyReverseSig(ckf ComputedKeyFamily) (err error)
- type SigChain
- func (sc *SigChain) Bump(mt MerkleTriple)
- func (sc *SigChain) CheckFreshness(srv *MerkleTriple) (current bool, err error)
- func (sc *SigChain) Dump(w io.Writer)
- func (sc *SigChain) EldestSeqno() keybase1.Seqno
- func (sc SigChain) GetComputedKeyInfos() (cki *ComputedKeyInfos)
- func (sc SigChain) GetComputedKeyInfosWithVersionBust() (cki *ComputedKeyInfos)
- func (sc *SigChain) GetCurrentSubchain(eldest keybase1.KID) (ChainLinks, error)
- func (sc SigChain) GetCurrentTailTriple() (ret *MerkleTriple)
- func (sc SigChain) GetFirstLink() *ChainLink
- func (sc SigChain) GetFutureChainTail() (ret *MerkleTriple)
- func (sc SigChain) GetLastKnownID() (ret LinkID)
- func (sc SigChain) GetLastKnownSeqno() (ret keybase1.Seqno)
- func (sc SigChain) GetLastLink() *ChainLink
- func (sc SigChain) GetLastLoadedID() (ret LinkID)
- func (sc SigChain) GetLastLoadedSeqno() (ret keybase1.Seqno)
- func (sc *SigChain) GetLinkFromSeqno(seqno keybase1.Seqno) *ChainLink
- func (sc *SigChain) GetLinkFromSigID(id keybase1.SigID) *ChainLink
- func (sc *SigChain) GetLinkFromSigIDQuery(query string) *ChainLink
- func (sc SigChain) Len() int
- func (sc *SigChain) LoadFromServer(m MetaContext, t *MerkleTriple, selfUID keybase1.UID) (dirtyTail *MerkleTriple, err error)
- func (sc *SigChain) LoadServerBody(m MetaContext, body []byte, low keybase1.Seqno, t *MerkleTriple, ...) (dirtyTail *MerkleTriple, err error)
- func (sc *SigChain) LocalDelegate(kf *KeyFamily, key GenericKey, sigID keybase1.SigID, signingKid keybase1.KID, ...) (err error)
- func (sc *SigChain) LocalDelegatePerUserKey(perUserKey keybase1.PerUserKey) error
- func (sc *SigChain) SetUIDUsername(uid keybase1.UID, username string)
- func (sc *SigChain) Store(m MetaContext) (err error)
- func (sc *SigChain) VerifiedChainLinks(fp PGPFingerprint) (ret ChainLinks)
- func (sc *SigChain) VerifyChain(m MetaContext) (err error)
- func (sc *SigChain) VerifySigsAndComputeKeys(m MetaContext, eldest keybase1.KID, ckf *ComputedKeyFamily) (bool, error)
- type SigChainLoader
- func (l *SigChainLoader) AccessPreload() bool
- func (l *SigChainLoader) CheckFreshness() (current bool, err error)
- func (l *SigChainLoader) GetKeyFamily() (err error)
- func (l *SigChainLoader) GetMerkleTriple() (ret *MerkleTriple)
- func (l *SigChainLoader) Load() (ret *SigChain, err error)
- func (l *SigChainLoader) LoadFromServer() (err error)
- func (l *SigChainLoader) LoadLastLinkIDFromStorage() (mt *MerkleTriple, err error)
- func (l *SigChainLoader) LoadLinksFromStorage() (err error)
- func (l *SigChainLoader) MakeSigChain() error
- func (l *SigChainLoader) Store() (err error)
- func (l *SigChainLoader) StoreTail() (err error)
- func (l *SigChainLoader) VerifySigsAndComputeKeys() (err error)
- type SigHasRevokes
- type SigHint
- type SigHints
- func (sh SigHints) Lookup(i keybase1.SigID) *SigHint
- func (sh SigHints) MarshalToJSON() *jsonw.Wrapper
- func (sh *SigHints) PopulateWith(jw *jsonw.Wrapper) (err error)
- func (sh *SigHints) Refresh(m MetaContext) (err error)
- func (sh *SigHints) RefreshWith(m MetaContext, jw *jsonw.Wrapper) (err error)
- func (sh *SigHints) Store(m MetaContext) (err error)
- type SigIgnoreIfUnsupported
- type SigMultiItem
- type SigMultiItemPublicKeys
- type SigVersion
- type SigchainV2Error
- type SigchainV2MismatchedFieldError
- type SigchainV2MismatchedHashError
- type SigchainV2Required
- type SigchainV2StubbedDisallowed
- type SigchainV2StubbedFirstLinkError
- type SigchainV2StubbedSignatureNeededError
- type SigchainV2Type
- func (t SigchainV2Type) AllowStubbing() bool
- func (t SigchainV2Type) IsSupportedTeamType() bool
- func (t SigchainV2Type) IsSupportedType() bool
- func (t SigchainV2Type) IsSupportedUserType() bool
- func (t SigchainV2Type) RequiresAtLeastRole() keybase1.TeamRole
- func (t SigchainV2Type) TeamAllowStub(role keybase1.TeamRole) bool
- func (t SigchainV2Type) TeamAllowStubWithAdminFlag(isAdmin bool) bool
- type SignaturePrefix
- type SignatureStatus
- type SimpleTimer
- type SkinnyLogger
- type SkipSecretPromptError
- type SkipSequence
- type SkipTable
- type SocialProofChainLink
- func (s *SocialProofChainLink) CheckDataJSON() *jsonw.Wrapper
- func (s *SocialProofChainLink) ComputeTrackDiff(tl *TrackLookup) TrackDiff
- func (s *SocialProofChainLink) DisplayCheck(ui IdentifyUI, lcr LinkCheckResult) error
- func (s *SocialProofChainLink) GetHostname() string
- func (s *SocialProofChainLink) GetProofType() keybase1.ProofType
- func (s *SocialProofChainLink) GetProtocol() string
- func (s *SocialProofChainLink) GetRemoteUsername() string
- func (s *SocialProofChainLink) GetService() string
- func (s *SocialProofChainLink) LastWriterWins() bool
- func (s *SocialProofChainLink) ProofText() string
- func (s *SocialProofChainLink) TableKey() string
- func (s *SocialProofChainLink) ToDisplayString() string
- func (s *SocialProofChainLink) ToIDString() string
- func (s *SocialProofChainLink) ToKeyValuePair() (string, string)
- func (s *SocialProofChainLink) ToTrackingStatement(state keybase1.ProofState) (*jsonw.Wrapper, error)
- func (s *SocialProofChainLink) Type() string
- type Socket
- type SocketInfo
- type SocketWrapper
- type SpecialKeyRing
- type StandaloneChatConnector
- type Stellar
- type StreamClassification
- type StreamExistsError
- type StreamNotFoundError
- type StreamWrongKindError
- type StringWarning
- type StubAPIEngine
- type SubkeyChainLink
- type Syncer
- type TeamBadMembershipError
- type TeamEKBoxStorage
- type TeamInviteBadTokenError
- type TeamInviteTokenReusedError
- type TeamLoader
- type TeamProvisionalError
- type TeamVisibilityError
- type TerminalUI
- type TestCancelSecretUI
- type TestConfig
- type TestContext
- func (tc *TestContext) Cleanup()
- func (tc TestContext) ClearAllStoredSecrets() error
- func (tc TestContext) Clone() (ret TestContext)
- func (tc *TestContext) GenerateGPGKeyring(ids ...string) error
- func (tc *TestContext) MakePGPKey(id string) (*PGPKeyBundle, error)
- func (tc TestContext) MoveGpgKeyringTo(dst TestContext) error
- func (tc *TestContext) SetRuntimeDir(s string)
- func (tc *TestContext) SimulateServiceRestart()
- type TestCountSecretUI
- type TestLoginCancelUI
- type TestLoginUI
- func (t *TestLoginUI) DisplayPaperKeyPhrase(_ context.Context, arg keybase1.DisplayPaperKeyPhraseArg) error
- func (t *TestLoginUI) DisplayPrimaryPaperKey(_ context.Context, arg keybase1.DisplayPrimaryPaperKeyArg) error
- func (t *TestLoginUI) GetEmailOrUsername(_ context.Context, _ int) (string, error)
- func (t *TestLoginUI) PromptRevokePaperKeys(_ context.Context, arg keybase1.PromptRevokePaperKeysArg) (bool, error)
- type TestOutput
- type TestParameters
- type TestSecretUI
- type TestUIDMapper
- func (t TestUIDMapper) CheckUIDAgainstUsername(uid keybase1.UID, un NormalizedUsername) bool
- func (t TestUIDMapper) ClearUIDAtEldestSeqno(_ context.Context, _ UIDMapperContext, _ keybase1.UID, _ keybase1.Seqno) error
- func (t TestUIDMapper) InformOfEldestSeqno(ctx context.Context, g UIDMapperContext, uv keybase1.UserVersion) (bool, error)
- func (t TestUIDMapper) MapUIDsToUsernamePackages(ctx context.Context, g UIDMapperContext, uids []keybase1.UID, ...) ([]UsernamePackage, error)
- func (t TestUIDMapper) SetTestingNoCachingMode(enabled bool)
- type TestingTB
- type TimeoutError
- type TimerSelector
- type TimerSet
- type TlfPseudonym
- type TlfPseudonymInfo
- type TlfPseudonymServerInfo
- type Token
- type TooManyKeysError
- type TorMode
- type TorSessionRequiredError
- type TrackBrokenError
- type TrackCache
- type TrackChainLink
- func GetRemoteChainLinkFor(m MetaContext, follower *keybase1.UserPlusKeysV2AllIncarnations, ...) (ret *TrackChainLink, err error)
- func LocalTmpTrackChainLinkFor(m MetaContext, tracker, trackee keybase1.UID) (ret *TrackChainLink, err error)
- func LocalTrackChainLinkFor(m MetaContext, tracker, trackee keybase1.UID) (ret *TrackChainLink, err error)
- func ParseTrackChainLink(b GenericChainLink) (ret *TrackChainLink, err error)
- func TmpTrackChainLinkFor(m MetaContext, me keybase1.UID, them keybase1.UID) (tcl *TrackChainLink, err error)
- func TrackChainLinkFor(m MetaContext, me keybase1.UID, them keybase1.UID, remote *TrackChainLink, ...) (*TrackChainLink, error)
- func TrackChainLinkFromUPK2AI(m MetaContext, follower *keybase1.UserPlusKeysV2AllIncarnations, ...) (*TrackChainLink, error)
- func (l *TrackChainLink) DoOwnNewLinkFromServerNotifications(g *GlobalContext)
- func (t TrackChainLink) Export() keybase1.RemoteTrack
- func (l *TrackChainLink) GetEldestKID() (kid keybase1.KID, err error)
- func (l *TrackChainLink) GetTmpExpireTime() (ret time.Time)
- func (l *TrackChainLink) GetTrackedKeys() ([]TrackedKey, error)
- func (l *TrackChainLink) GetTrackedUID() (keybase1.UID, error)
- func (l *TrackChainLink) GetTrackedUsername() (NormalizedUsername, error)
- func (l TrackChainLink) IsRemote() bool
- func (l *TrackChainLink) IsRevoked() bool
- func (l *TrackChainLink) RemoteKeyProofs() *jsonw.Wrapper
- func (l *TrackChainLink) ToDisplayString() string
- func (l *TrackChainLink) ToServiceBlocks() (ret []*ServiceBlock)
- func (l *TrackChainLink) Type() string
- type TrackDiff
- type TrackDiffClash
- type TrackDiffNew
- type TrackDiffNewEldest
- type TrackDiffNone
- type TrackDiffNoneViaTemporary
- func (t TrackDiffNoneViaTemporary) BreaksTracking() bool
- func (t TrackDiffNoneViaTemporary) GetTrackDiffType() keybase1.TrackDiffType
- func (t TrackDiffNoneViaTemporary) IsSameAsTracked() bool
- func (t TrackDiffNoneViaTemporary) ToDisplayMarkup() *Markup
- func (t TrackDiffNoneViaTemporary) ToDisplayString() string
- type TrackDiffRemoteChanged
- type TrackDiffRemoteFail
- type TrackDiffRemoteWorking
- type TrackDiffRevoked
- type TrackDiffSnoozedRevoked
- func (t TrackDiffSnoozedRevoked) BreaksTracking() bool
- func (t TrackDiffSnoozedRevoked) GetTrackDiffType() keybase1.TrackDiffType
- func (t TrackDiffSnoozedRevoked) IsSameAsTracked() bool
- func (t TrackDiffSnoozedRevoked) ToDisplayMarkup() *Markup
- func (t TrackDiffSnoozedRevoked) ToDisplayString() string
- type TrackDiffUpgraded
- func (t TrackDiffUpgraded) BreaksTracking() bool
- func (t TrackDiffUpgraded) GetCurr() string
- func (t TrackDiffUpgraded) GetPrev() string
- func (t TrackDiffUpgraded) GetTrackDiffType() keybase1.TrackDiffType
- func (t TrackDiffUpgraded) IsSameAsTracked() bool
- func (t TrackDiffUpgraded) ToDisplayMarkup() *Markup
- func (t TrackDiffUpgraded) ToDisplayString() string
- type TrackIDComponent
- type TrackInstructions
- type TrackLookup
- func (l *TrackLookup) GetCTime() time.Time
- func (l TrackLookup) GetEldestKID() keybase1.KID
- func (l TrackLookup) GetProofState(id string) keybase1.ProofState
- func (l TrackLookup) GetTmpExpireTime() (ret time.Time)
- func (l TrackLookup) GetTrackedKeys() []TrackedKey
- func (l TrackLookup) GetTrackerSeqno() keybase1.Seqno
- func (l TrackLookup) IsRemote() bool
- func (l TrackLookup) ToSummary() TrackSummary
- type TrackSet
- type TrackStaleError
- type TrackSummary
- type TrackedKey
- type Tracker
- type Tracker2Syncer
- type TrackerSyncer
- type Trackers
- type TrackingBrokeError
- type Triplesec
- type TypedChainLink
- type U
- type UHex
- type UI
- type UIConsumer
- type UIDMapper
- type UIDMapperContext
- type UIDMismatchError
- type UIDelegationUnavailableError
- type UIDer
- type UIKind
- type UIRouter
- type UIs
- type UPAKLoader
- type UTF16UnsupportedError
- type UncachedFullSelf
- func (n *UncachedFullSelf) HandleUserChanged(u keybase1.UID) error
- func (n *UncachedFullSelf) New() FullSelfer
- func (n *UncachedFullSelf) OnLogin() error
- func (n *UncachedFullSelf) Update(ctx context.Context, u *User) error
- func (n *UncachedFullSelf) WithSelf(ctx context.Context, f func(u *User) error) error
- func (n *UncachedFullSelf) WithSelfForcePoll(ctx context.Context, f func(u *User) error) error
- func (n *UncachedFullSelf) WithUser(arg LoadUserArg, f func(u *User) error) error
- type UnexpectedChatDataFromServer
- type UnexpectedKeyError
- type UnforwardedLoggerWithLegacyInterface
- type UnhandledSignatureError
- type UnknownKeyTypeError
- type UnknownSpecialKIDError
- type UnknownStreamError
- type UnlockerFunc
- type UnmarshalError
- type UnmetAssertionError
- type UntrackChainLink
- type UntrackError
- type UpdaterConfigReader
- type Usage
- type User
- func LoadMe(arg LoadUserArg) (*User, error)
- func LoadMeByMetaContextAndUID(m MetaContext, uid keybase1.UID) (*User, error)
- func LoadMeByUID(ctx context.Context, g *GlobalContext, uid keybase1.UID) (*User, error)
- func LoadUser(arg LoadUserArg) (ret *User, err error)
- func LoadUserFromLocalStorage(m MetaContext, uid keybase1.UID) (u *User, err error)
- func LoadUserFromServer(m MetaContext, uid keybase1.UID, body *jsonw.Wrapper) (u *User, err error)
- func NewUserFromLocalStorage(g *GlobalContext, o *jsonw.Wrapper) (*User, error)
- func NewUserFromServer(g *GlobalContext, o *jsonw.Wrapper) (*User, error)
- func NewUserThin(name string, uid keybase1.UID) *User
- func (u *User) AllSyncedSecretKeys(m MetaContext) (keys []*SKB, err error)
- func (u *User) BaseProofSet() *ProofSet
- func (u *User) CheckBasicsFreshness(server int64) (current bool, err error)
- func (u *User) CryptocurrencySig(m MetaContext, key GenericKey, address string, typ CryptocurrencyType, ...) (*jsonw.Wrapper, error)
- func (u *User) DeviceNames() ([]string, error)
- func (u *User) Equal(other *User) bool
- func (u *User) Export() *keybase1.User
- func (u *User) ExportRemoteTracks() []keybase1.RemoteTrack
- func (u *User) ExportToUPKV2AllIncarnations() (*keybase1.UserPlusKeysV2AllIncarnations, error)
- func (u *User) ExportToUserPlusAllKeys() keybase1.UserPlusAllKeys
- func (u *User) ExportToUserPlusKeys() keybase1.UserPlusKeys
- func (u *User) ExportToVersionVector() keybase1.UserVersionVector
- func (u *User) FilterActivePGPKeys(sibkey bool, query string) []*PGPKeyBundle
- func (u *User) GetActivePGPFingerprints(sibkey bool) (ret []PGPFingerprint)
- func (u *User) GetActivePGPKIDs(sibkey bool) (ret []keybase1.KID)
- func (u *User) GetActivePGPKeys(sibkey bool) (ret []*PGPKeyBundle)
- func (u *User) GetComputedKeyFamily() (ret *ComputedKeyFamily)
- func (u *User) GetComputedKeyInfos() *ComputedKeyInfos
- func (u *User) GetCurrentEldestSeqno() keybase1.Seqno
- func (u *User) GetDevice(id keybase1.DeviceID) (*Device, error)
- func (u *User) GetDeviceSibkey() (GenericKey, error)
- func (u *User) GetDeviceSubkey() (subkey GenericKey, err error)
- func (u *User) GetEldestKID() (ret keybase1.KID)
- func (u *User) GetIDVersion() (int64, error)
- func (u *User) GetKeyFamily() *KeyFamily
- func (u *User) GetName() string
- func (u *User) GetNormalizedName() NormalizedUsername
- func (u *User) GetPublicChainTail() *MerkleTriple
- func (u *User) GetSalt() (salt []byte, err error)
- func (u *User) GetSigChainLastKnownID() LinkID
- func (u *User) GetSigChainLastKnownSeqno() keybase1.Seqno
- func (u *User) GetSigHintsVersion() int
- func (u *User) GetSigIDFromSeqno(seqno keybase1.Seqno) keybase1.SigID
- func (u *User) GetStatus() keybase1.StatusCode
- func (u *User) GetSyncedSecretKey(m MetaContext) (ret *SKB, err error)
- func (u *User) GetUID() keybase1.UID
- func (u *User) HasActiveKey() (ret bool)
- func (u *User) HasCurrentDeviceInCurrentInstall() bool
- func (u *User) HasDeviceInCurrentInstall(did keybase1.DeviceID) bool
- func (u *User) HasEncryptionSubkey() bool
- func (u *User) IDTable() *IdentityTable
- func (u *User) IsCachedIdentifyFresh(upk *keybase1.UserPlusKeysV2AllIncarnations) bool
- func (u *User) IsNewerThan(v *User) (bool, error)
- func (u *User) IsSigIDActive(sigID keybase1.SigID) (bool, error)
- func (u *User) LinkFromSigID(sigID keybase1.SigID) *ChainLink
- func (u *User) LoadSigChains(m MetaContext, f *MerkleUserLeaf, self bool) (err error)
- func (u *User) MakeIDTable() error
- func (u User) PartialCopy() *User
- func (u *User) RevokeKeysProof(m MetaContext, key GenericKey, kidsToRevoke []keybase1.KID, ...) (*jsonw.Wrapper, error)
- func (u *User) RevokeSigsProof(m MetaContext, key GenericKey, sigIDsToRevoke []keybase1.SigID, ...) (*jsonw.Wrapper, error)
- func (u *User) ServiceProof(m MetaContext, signingKey GenericKey, typ ServiceType, remotename string, ...) (ret *jsonw.Wrapper, err error)
- func (u *User) SigChainBump(linkID LinkID, sigID keybase1.SigID)
- func (u *User) SigChainBumpMT(mt MerkleTriple)
- func (u *User) SigChainDump(w io.Writer)
- func (u *User) SigIDSearch(query string) (keybase1.SigID, error)
- func (u *User) SigningKeyPub() (GenericKey, error)
- func (u *User) StellarAccountID() *stellar1.AccountID
- func (u *User) Store(m MetaContext) error
- func (u *User) StoreSigChain(m MetaContext) error
- func (u *User) StoreTopLevel(m MetaContext) error
- func (u *User) SyncSecrets(m MetaContext) error
- func (u *User) SyncedSecretKey(m MetaContext) (ret *SKB, err error)
- func (u *User) TmpTrackChainLinkFor(m MetaContext, username string, uid keybase1.UID) (tcl *TrackChainLink, err error)
- func (u *User) ToTrackingStatement(w *jsonw.Wrapper, outcome *IdentifyOutcome) (err error)
- func (u *User) ToTrackingStatementBasics(errp *error) *jsonw.Wrapper
- func (u *User) ToTrackingStatementKey(errp *error) *jsonw.Wrapper
- func (u *User) ToTrackingStatementPGPKeys(errp *error) *jsonw.Wrapper
- func (u *User) ToTrackingStatementSeqTail() *jsonw.Wrapper
- func (u *User) ToUntrackingStatement(w *jsonw.Wrapper) (err error)
- func (u *User) ToUntrackingStatementBasics() *jsonw.Wrapper
- func (u *User) ToUserForSignatures() (ret UserForSignatures)
- func (u *User) ToUserVersion() keybase1.UserVersion
- func (u *User) TrackChainLinkFor(m MetaContext, username NormalizedUsername, uid keybase1.UID) (*TrackChainLink, error)
- func (u *User) TrackingProofFor(m MetaContext, signingKey GenericKey, sigVersion SigVersion, u2 *User, ...) (ret *jsonw.Wrapper, err error)
- func (u *User) UntrackingProofFor(m MetaContext, signingKey GenericKey, sigVersion SigVersion, u2 *User) (ret *jsonw.Wrapper, err error)
- func (u *User) UpdateEmailProof(m MetaContext, key GenericKey, newEmail string) (*jsonw.Wrapper, error)
- func (u *User) UpdatePassphraseProof(m MetaContext, key GenericKey, pwh string, ppGen PassphraseGeneration, ...) (*jsonw.Wrapper, error)
- func (u *User) VerifySelfSig() error
- func (u *User) VerifySelfSigByKey() (ret bool)
- type UserBasic
- type UserCardCache
- type UserChangedHandler
- type UserConfig
- func ImportUserConfigFromJSONWrapper(jw *jsonw.Wrapper) (ret *UserConfig, err error)
- func NewOneshotUserConfig(id keybase1.UID, name NormalizedUsername, salt []byte, dev keybase1.DeviceID) *UserConfig
- func NewUserConfig(id keybase1.UID, name NormalizedUsername, salt []byte, dev keybase1.DeviceID) *UserConfig
- type UserConfigWrapper
- type UserDeletedError
- type UserEKBoxStorage
- type UserForSignatures
- func (u UserForSignatures) GetEldestKID() keybase1.KID
- func (u UserForSignatures) GetLatestPerUserKey() *keybase1.PerUserKey
- func (u UserForSignatures) GetName() string
- func (u UserForSignatures) GetNormalizedName() NormalizedUsername
- func (u UserForSignatures) GetUID() keybase1.UID
- func (u UserForSignatures) ToUserVersion() keybase1.UserVersion
- type UserInfo
- type UserNotFoundError
- type UserPlusKeysMemo
- type UsernamePackage
- type VDebugLevel
- type VDebugLog
- func (v *VDebugLog) CLogf(ctx context.Context, lev VDebugLevel, fs string, args ...interface{})
- func (v *VDebugLog) CLogfWithAddedDepth(ctx context.Context, lev VDebugLevel, d int, fs string, args ...interface{})
- func (v *VDebugLog) Configure(s string)
- func (v *VDebugLog) DumpPayload() bool
- func (v *VDebugLog) DumpSiteLoadUser() bool
- func (v *VDebugLog) Log(lev VDebugLevel, fs string, args ...interface{})
- type VLogContext
- type VerificationError
- type VerificationPath
- type VerifyContext
- type WaitForItError
- type WalletNetwork
- type WalletStellarChainLink
- type Warning
- type Warnings
- type WebProofChainLink
- func (w *WebProofChainLink) CheckDataJSON() *jsonw.Wrapper
- func (w *WebProofChainLink) ComputeTrackDiff(tl *TrackLookup) (res TrackDiff)
- func (w *WebProofChainLink) DisplayCheck(ui IdentifyUI, lcr LinkCheckResult) error
- func (w *WebProofChainLink) GetHostname() string
- func (w *WebProofChainLink) GetProofType() keybase1.ProofType
- func (w *WebProofChainLink) GetProtocol() string
- func (w *WebProofChainLink) GetRemoteUsername() string
- func (w *WebProofChainLink) LastWriterWins() bool
- func (w *WebProofChainLink) ProofText() string
- func (w *WebProofChainLink) TableKey() string
- func (w *WebProofChainLink) ToDisplayString() string
- func (w *WebProofChainLink) ToIDString() string
- func (w *WebProofChainLink) ToKeyValuePair() (string, string)
- func (w *WebProofChainLink) ToTrackingStatement(state keybase1.ProofState) (*jsonw.Wrapper, error)
- func (w *WebProofChainLink) Type() string
- type WebUnreachableError
- type Win32
- func (w Win32) CacheDir() string
- func (w Win32) ConfigDir() string
- func (w Win32) DataDir() string
- func (w Win32) Home(emptyOk bool) string
- func (w Win32) InfoDir() string
- func (w Win32) LogDir() string
- func (w Win32) Normalize(s string) string
- func (w Win32) RuntimeDir() string
- func (w Win32) SandboxCacheDir() string
- func (w Win32) ServiceSpawnDir() (string, error)
- func (w Win32) Split(s string) []string
- func (w Win32) Unsplit(v []string) string
- type WrongCryptoFormatError
- type WrongKeyError
- type WrongKidError
- type WrongSigError
- type XAPIResType
- type XdgPosix
- func (x XdgPosix) CacheDir() string
- func (x XdgPosix) ConfigDir() string
- func (x XdgPosix) DataDir() string
- func (x XdgPosix) Home(emptyOk bool) string
- func (x XdgPosix) InfoDir() string
- func (x XdgPosix) LogDir() string
- func (x XdgPosix) Normalize(s string) string
- func (x XdgPosix) RuntimeDir() string
- func (x XdgPosix) SandboxCacheDir() string
- func (x XdgPosix) ServiceSpawnDir() (ret string, err error)
Constants ¶
const ( NONE = iota OR AND LPAREN RPAREN URL EOF ERROR )
const ( DevelServerURI = "http://localhost:3000" StagingServerURI = "https://stage0.keybase.io" ProductionServerURI = "https://api-0.core.keybaseapi.com" TorServerURI = "http://fncuwbiisyh6ak3i.onion" )
const ( DevelGregorServerURI = "fmprpc://localhost:9911" StagingGregorServerURI = "fmprpc+tls://gregord.dev.keybase.io:443" ProductionGregorServerURI = "fmprpc+tls://chat-0.core.keybaseapi.com:443" )
const ( ConfigFile = "config.json" SessionFile = "session.json" UpdaterConfigFile = "updater.json" DeviceCloneStateFile = "device_clone.json" DBFile = "keybase.leveldb" ChatDBFile = "keybase.chat.leveldb" SocketFile = "keybased.sock" PIDFile = "keybased.pid" SecretKeyringTemplate = "secretkeys.%u.mpack" APIVersion = "1.0" APIURIPathPrefix = "/_/api/" + APIVersion DaemonPort = 40933 GoClientID = "keybase.io go client" KeybaseSaltpackBrand = "KEYBASE" )
const ( PermFile os.FileMode = 0600 PermDir os.FileMode = 0700 UmaskablePermFile os.FileMode = 0666 )
const ( UserCacheMaxAge = 5 * time.Minute PGPFingerprintHexLen = 40 ProofCacheSize = 0x1000 ProofCacheLongDur = 48 * time.Hour ProofCacheMediumDur = 6 * time.Hour ProofCacheShortDur = 30 * time.Minute // How old the merkle root must be to ask for a refresh. // Measures time since the root was fetched, not time since published. PvlSourceShouldRefresh time.Duration = 1 * time.Hour // An older merkle root than this is too old to use. All identifies will fail. PvlSourceRequireRefresh time.Duration = 24 * time.Hour Identify2CacheLongTimeout = 6 * time.Hour Identify2CacheBrokenTimeout = 1 * time.Hour Identify2CacheShortTimeout = 1 * time.Minute // How long we'll go without rerequesting hints/merkle seqno. This is used in both // CachedUPAKLoader and FullSelfCacher. Note that this timeout has to exceed the // dtime value for Gregor IBMs that deal with user and key family changed notifications. // Because if the client is offline for more than that amount of time, then our cache // could be stale. CachedUserTimeout = 10 * time.Minute LinkCacheSize = 4000 LinkCacheCleanDur = 1 * time.Minute UPAKCacheSize = 2000 UIDMapFullNameCacheSize = 100000 ImplicitTeamConflictInfoCacheSize = 10000 PayloadCacheSize = 1000 SigShortIDBytes = 27 LocalTrackMaxAge = 48 * time.Hour CriticalClockSkewLimit = time.Hour ChatBoxerMerkleFreshness = 10 * time.Minute TeamMerkleFreshnessForAdmin = 30 * time.Second EphemeralKeyMerkleFreshness = 30 * time.Second // By default, only 64 files can be opened. LevelDBNumFiles = 64 HomeCacheTimeout = (time.Hour - time.Minute) HomePeopleCacheTimeout = 10 * time.Minute )
const ( KeybaseKIDV1 = 1 // Uses SHA-256 OneYearInSeconds = 24 * 60 * 60 * 365 SigExpireIn = OneYearInSeconds * 16 // 16 years NaclEdDSAExpireIn = OneYearInSeconds * 16 // 16 years NaclDHExpireIn = OneYearInSeconds * 16 // 16 years NaclPerUserKeyExpireIn = OneYearInSeconds * 16 // 16 years KeyExpireIn = OneYearInSeconds * 16 // 16 years SubkeyExpireIn = OneYearInSeconds * 16 // 16 years AuthExpireIn = OneYearInSeconds // 1 year PaperKeyMemoryTimeout = time.Hour )
const ( SCOk = int(keybase1.StatusCode_SCOk) SCInputError = int(keybase1.StatusCode_SCInputError) SCLoginRequired = int(keybase1.StatusCode_SCLoginRequired) SCBadSession = int(keybase1.StatusCode_SCBadSession) SCNoSession = int(keybase1.StatusCode_SCNoSession) SCBadLoginUserNotFound = int(keybase1.StatusCode_SCBadLoginUserNotFound) SCBadLoginPassword = int(keybase1.StatusCode_SCBadLoginPassword) SCNotFound = int(keybase1.StatusCode_SCNotFound) SCDeleted = int(keybase1.StatusCode_SCDeleted) SCThrottleControl = int(keybase1.StatusCode_SCThrottleControl) SCGeneric = int(keybase1.StatusCode_SCGeneric) SCAlreadyLoggedIn = int(keybase1.StatusCode_SCAlreadyLoggedIn) SCCanceled = int(keybase1.StatusCode_SCCanceled) SCInputCanceled = int(keybase1.StatusCode_SCInputCanceled) SCExists = int(keybase1.StatusCode_SCExists) SCInvalidAddress = int(keybase1.StatusCode_SCInvalidAddress) SCReloginRequired = int(keybase1.StatusCode_SCReloginRequired) SCResolutionFailed = int(keybase1.StatusCode_SCResolutionFailed) SCProfileNotPublic = int(keybase1.StatusCode_SCProfileNotPublic) SCBadSignupUsernameTaken = int(keybase1.StatusCode_SCBadSignupUsernameTaken) SCBadInvitationCode = int(keybase1.StatusCode_SCBadInvitationCode) SCMissingResult = int(keybase1.StatusCode_SCMissingResult) SCKeyNotFound = int(keybase1.StatusCode_SCKeyNotFound) SCKeyCorrupted = int(keybase1.StatusCode_SCKeyCorrupted) SCKeyInUse = int(keybase1.StatusCode_SCKeyInUse) SCKeyBadGen = int(keybase1.StatusCode_SCKeyBadGen) SCKeyNoSecret = int(keybase1.StatusCode_SCKeyNoSecret) SCKeyBadUIDs = int(keybase1.StatusCode_SCKeyBadUIDs) SCKeyNoActive = int(keybase1.StatusCode_SCKeyNoActive) SCKeyNoSig = int(keybase1.StatusCode_SCKeyNoSig) SCKeyBadSig = int(keybase1.StatusCode_SCKeyBadSig) SCKeyBadEldest = int(keybase1.StatusCode_SCKeyBadEldest) SCKeyNoEldest = int(keybase1.StatusCode_SCKeyNoEldest) SCKeyDuplicateUpdate = int(keybase1.StatusCode_SCKeyDuplicateUpdate) SCKeySyncedPGPNotFound = int(keybase1.StatusCode_SCKeySyncedPGPNotFound) SCKeyNoMatchingGPG = int(keybase1.StatusCode_SCKeyNoMatchingGPG) SCKeyRevoked = int(keybase1.StatusCode_SCKeyRevoked) SCSibkeyAlreadyExists = int(keybase1.StatusCode_SCSibkeyAlreadyExists) SCDecryptionKeyNotFound = int(keybase1.StatusCode_SCDecryptionKeyNotFound) SCBadTrackSession = int(keybase1.StatusCode_SCBadTrackSession) SCDeviceBadName = int(keybase1.StatusCode_SCDeviceBadName) SCDeviceNameInUse = int(keybase1.StatusCode_SCDeviceNameInUse) SCDeviceNotFound = int(keybase1.StatusCode_SCDeviceNotFound) SCDeviceMismatch = int(keybase1.StatusCode_SCDeviceMismatch) SCDeviceRequired = int(keybase1.StatusCode_SCDeviceRequired) SCDevicePrevProvisioned = int(keybase1.StatusCode_SCDevicePrevProvisioned) SCDeviceProvisionViaDevice = int(keybase1.StatusCode_SCDeviceProvisionViaDevice) SCDeviceNoProvision = int(keybase1.StatusCode_SCDeviceNoProvision) SCDeviceProvisionOffline = int(keybase1.StatusCode_SCDeviceProvisionOffline) SCStreamExists = int(keybase1.StatusCode_SCStreamExists) SCStreamNotFound = int(keybase1.StatusCode_SCStreamNotFound) SCStreamWrongKind = int(keybase1.StatusCode_SCStreamWrongKind) SCStreamEOF = int(keybase1.StatusCode_SCStreamEOF) SCGenericAPIError = int(keybase1.StatusCode_SCGenericAPIError) SCAPINetworkError = int(keybase1.StatusCode_SCAPINetworkError) SCTimeout = int(keybase1.StatusCode_SCTimeout) SCProofError = int(keybase1.StatusCode_SCProofError) SCIdentificationExpired = int(keybase1.StatusCode_SCIdentificationExpired) SCSelfNotFound = int(keybase1.StatusCode_SCSelfNotFound) SCBadKexPhrase = int(keybase1.StatusCode_SCBadKexPhrase) SCNoUI = int(keybase1.StatusCode_SCNoUI) SCNoUIDelegation = int(keybase1.StatusCode_SCNoUIDelegation) SCIdentifyFailed = int(keybase1.StatusCode_SCIdentifyFailed) SCTrackingBroke = int(keybase1.StatusCode_SCTrackingBroke) SCKeyNoPGPEncryption = int(keybase1.StatusCode_SCKeyNoPGPEncryption) SCKeyNoNaClEncryption = int(keybase1.StatusCode_SCKeyNoNaClEncryption) SCWrongCryptoFormat = int(keybase1.StatusCode_SCWrongCryptoFormat) SCDecryptionError = int(keybase1.StatusCode_SCDecryptionError) SCChatInternal = int(keybase1.StatusCode_SCChatInternal) SCChatRateLimit = int(keybase1.StatusCode_SCChatRateLimit) SCChatConvExists = int(keybase1.StatusCode_SCChatConvExists) SCChatUnknownTLFID = int(keybase1.StatusCode_SCChatUnknownTLFID) SCChatNotInConv = int(keybase1.StatusCode_SCChatNotInConv) SCChatNotInTeam = int(keybase1.StatusCode_SCChatNotInTeam) SCChatBadMsg = int(keybase1.StatusCode_SCChatBadMsg) SCChatBroadcast = int(keybase1.StatusCode_SCChatBroadcast) SCChatAlreadySuperseded = int(keybase1.StatusCode_SCChatAlreadySuperseded) SCChatAlreadyDeleted = int(keybase1.StatusCode_SCChatAlreadyDeleted) SCChatTLFFinalized = int(keybase1.StatusCode_SCChatTLFFinalized) SCChatCollision = int(keybase1.StatusCode_SCChatCollision) SCChatStalePreviousState = int(keybase1.StatusCode_SCChatStalePreviousState) SCMerkleClientError = int(keybase1.StatusCode_SCMerkleClientError) SCBadEmail = int(keybase1.StatusCode_SCBadEmail) SCIdentifySummaryError = int(keybase1.StatusCode_SCIdentifySummaryError) SCNeedSelfRekey = int(keybase1.StatusCode_SCNeedSelfRekey) SCNeedOtherRekey = int(keybase1.StatusCode_SCNeedOtherRekey) SCChatMessageCollision = int(keybase1.StatusCode_SCChatMessageCollision) SCChatDuplicateMessage = int(keybase1.StatusCode_SCChatDuplicateMessage) SCChatClientError = int(keybase1.StatusCode_SCChatClientError) SCAccountReset = int(keybase1.StatusCode_SCAccountReset) SCIdentifiesFailed = int(keybase1.StatusCode_SCIdentifiesFailed) SCTeamReadError = int(keybase1.StatusCode_SCTeamReadError) SCNoOp = int(keybase1.StatusCode_SCNoOp) SCTeamNotFound = int(keybase1.StatusCode_SCTeamNotFound) SCTeamTarDuplicate = int(keybase1.StatusCode_SCTeamTarDuplicate) SCTeamTarNotFound = int(keybase1.StatusCode_SCTeamTarNotFound) SCTeamMemberExists = int(keybase1.StatusCode_SCTeamMemberExists) SCLoginStateTimeout = int(keybase1.StatusCode_SCLoginStateTimeout) SCRevokeCurrentDevice = int(keybase1.StatusCode_SCRevokeCurrentDevice) SCRevokeLastDevice = int(keybase1.StatusCode_SCRevokeLastDevice) SCRevokeLastDevicePGP = int(keybase1.StatusCode_SCRevokeLastDevicePGP) SCTeamKeyMaskNotFound = int(keybase1.StatusCode_SCTeamKeyMaskNotFound) SCGitInternal = int(keybase1.StatusCode_SCGitInternal) SCGitRepoAlreadyExists = int(keybase1.StatusCode_SCGitRepoAlreadyExists) SCGitInvalidRepoName = int(keybase1.StatusCode_SCGitInvalidRepoName) SCGitCannotDelete = int(keybase1.StatusCode_SCGitCannotDelete) SCGitRepoDoesntExist = int(keybase1.StatusCode_SCGitRepoDoesntExist) SCTeamBanned = int(keybase1.StatusCode_SCTeamBanned) SCTeamInvalidBan = int(keybase1.StatusCode_SCTeamInvalidBan) SCNoSpaceOnDevice = int(keybase1.StatusCode_SCNoSpaceOnDevice) SCTeamInviteBadToken = int(keybase1.StatusCode_SCTeamInviteBadToken) SCTeamInviteTokenReused = int(keybase1.StatusCode_SCTeamInviteTokenReused) SCTeamBadMembership = int(keybase1.StatusCode_SCTeamBadMembership) SCTeamProvisionalCanKey = int(keybase1.StatusCode_SCTeamProvisionalCanKey) SCTeamProvisionalCannotKey = int(keybase1.StatusCode_SCTeamProvisionalCannotKey) SCBadSignupUsernameDeleted = int(keybase1.StatusCode_SCBadSignupUsernameDeleted) SCEphemeralPairwiseMACsMissingUIDs = int(keybase1.StatusCode_SCEphemeralPairwiseMACsMissingUIDs) )
Status codes. This list should match keybase/lib/status_codes.iced.
const ( MerkleTreeNode = 1 MerkleTreeLeaf = 2 )
const ( LinkTypeAuthentication LinkType = "auth" LinkTypeCryptocurrency LinkType = "cryptocurrency" LinkTypeRevoke LinkType = "revoke" LinkTypeTrack LinkType = "track" LinkTypeUntrack LinkType = "untrack" LinkTypeUpdatePassphrase LinkType = "update_passphrase_hash" LinkTypeUpdateSettings LinkType = "update_settings" LinkTypeWebServiceBinding LinkType = "web_service_binding" LinkTypePerUserKey LinkType = "per_user_key" LinkTypeWalletStellar LinkType = "wallet.stellar" // team links LinkTypeTeamRoot LinkType = "team.root" LinkTypeNewSubteam LinkType = "team.new_subteam" LinkTypeChangeMembership LinkType = "team.change_membership" LinkTypeRotateKey LinkType = "team.rotate_key" LinkTypeLeave LinkType = "team.leave" LinkTypeSubteamHead LinkType = "team.subteam_head" LinkTypeRenameSubteam LinkType = "team.rename_subteam" LinkTypeInvite LinkType = "team.invite" LinkTypeRenameUpPointer LinkType = "team.rename_up_pointer" LinkTypeDeleteRoot LinkType = "team.delete_root" LinkTypeDeleteSubteam LinkType = "team.delete_subteam" LinkTypeDeleteUpPointer LinkType = "team.delete_up_pointer" LinkTypeKBFSSettings LinkType = "team.kbfs" LinkTypeSettings LinkType = "team.settings" DelegationTypeEldest DelegationType = "eldest" DelegationTypePGPUpdate DelegationType = "pgp_update" DelegationTypeSibkey DelegationType = "sibkey" DelegationTypeSubkey DelegationType = "subkey" )
const ( SigTypeNone = 0 SigTypeSelfSig = 1 SigTypeRemoteProof = 2 SigTypeTrack = 3 SigTypeUntrack = 4 SigTypeRevoke = 5 SigTypeCryptocurrency = 6 SigTypeAnnouncement = 7 )
const ( DeviceStatusNone = 0 DeviceStatusActive = 1 DeviceStatusDefunct = 2 )
const ( DeviceTypeDesktop = "desktop" DeviceTypeMobile = "mobile" DeviceTypePaper = "backup" )
these strings need to match the keys in keybase/lib_public/public_constants.iced -> public_constants.device.type
const ( HTTPDefaultTimeout = 60 * time.Second HTTPDefaultScraperTimeout = 10 * time.Second HTTPPollMaximum = 5 * time.Second HTTPFastTimeout = 5 * time.Second )
const ( HTTPRetryInitialTimeout = 1 * time.Second HTTPRetryMutliplier = 1.5 HTTPRetryCount = 6 )
The following constants apply to APIArg parameters for critical idempotent API calls
const ( HashPGPMd5 = 1 HashPGPSha1 = 2 HashPGPRipemd160 = 3 HashPGPSha256 = 8 HashPGPSha384 = 9 HashPGPSha512 = 10 HashPGPSha224 = 11 )
OpenPGP hash IDs, taken from http://tools.ietf.org/html/rfc4880#section-9.4
const ( RevSimpleDelete = 0 RevFull = 1 RevDated = 2 )
key_revocation_types
const ( KexScryptCost = 32768 KexScryptR = 8 KexScryptP = 1 KexScryptKeylen = 32 KexSessionIDEntropy = 65 // kex doc specifies 65 bits of entropy )
const ( Kex2PhraseEntropy = 88 Kex2ScryptCost = 1 << 17 Kex2ScryptLiteCost = 1 << 10 Kex2ScryptR = 8 Kex2ScryptP = 1 Kex2ScryptKeylen = 32 )
const ( PaperKeyScryptCost = 32768 PaperKeyScryptR = 8 PaperKeyScryptP = 1 PaperKeyScryptKeylen = 128 PaperKeySecretEntropy = 117 PaperKeyIDBits = 22 PaperKeyVersionBits = 4 PaperKeyVersion = 0 PaperKeyWordCountMin = 13 // this should never change to a value greater than 13 )
PaperKeyWordCountMin of 13 is based on the current state: entropy: 143 (PaperKeySecretEntropy [117] + PaperKeyIDBits [22] + PaperKeyVersionBits [4]) len(secwords): 2048
const ( IdentifySourceKBFS = "kbfs" TestInvitationCode = "202020202020202020202020" )
const ( ServiceLogFileName = "keybase.service.log" KBFSLogFileName = "keybase.kbfs.log" GitLogFileName = "keybase.git.log" UpdaterLogFileName = "keybase.updater.log" DesktopLogFileName = "Keybase.app.log" // StartLogFileName is where services can log to (on startup) before they handle their own logging StartLogFileName = "keybase.start.log" )
const ( NotificationDismissPGPPrefix = "pgp_secret_store" NotificationDismissPGPValue = "dismissed" )
const ( TeamDHDerivationString = "Keybase-Derived-Team-NaCl-DH-1" TeamEdDSADerivationString = "Keybase-Derived-Team-NaCl-EdDSA-1" TeamKBFSDerivationString = "Keybase-Derived-Team-NaCl-KBFS-1" TeamChatDerivationString = "Keybase-Derived-Team-NaCl-Chat-1" TeamSaltpackDerivationString = "Keybase-Derived-Team-NaCl-Saltpack-1" TeamPrevKeySecretBoxDerivationString = "Keybase-Derived-Team-NaCl-SecretBox-1" TeamGitMetadataDerivationString = "Keybase-Derived-Team-NaCl-GitMetadata-1" TeamSeitanTokenDerivationString = "Keybase-Derived-Team-NaCl-SeitanInviteToken-1" TeamStellarRelayDerivationString = "Keybase-Derived-Team-NaCl-StellarRelay-1" )
const ( DBUser = 0x00 DBSig = 0x0f DBTeamChain = 0x10 DBUserPlusAllKeysV1 = 0x19 DBAttachmentUploader = 0xcf DBDiskLRUEntries = 0xda DBDiskLRUIndex = 0xdb DBImplicitTeamConflictInfo = 0xdc DBUidToFullName = 0xdd DBUidToUsername = 0xde DBUserPlusKeysVersioned = 0xdf DBLink = 0xe0 DBLocalTrack = 0xe1 DBPGPKey = 0xe3 DBSigHints = 0xe4 DBProofCheck = 0xe5 DBUserSecretKeys = 0xe6 DBSigChainTailPublic = 0xe7 DBSigChainTailSemiprivate = 0xe8 DBSigChainTailEncrypted = 0xe9 DBChatActive = 0xea DBUserEKBox = 0xeb DBTeamEKBox = 0xec DBMerkleRoot = 0xf0 DBTrackers = 0xf1 DBGregor = 0xf2 DBTrackers2 = 0xf3 DBTrackers2Reverse = 0xf4 DBNotificationDismiss = 0xf5 DBChatBlockIndex = 0xf6 DBChatBlocks = 0xf7 DBChatOutbox = 0xf8 DBChatInbox = 0xf9 DBIdentify = 0xfa DBResolveUsernameToUID = 0xfb DBChatBodyHashIndex = 0xfc DBPvl = 0xfd DBChatConvFailures = 0xfe )
const ( DBLookupUsername = 0x00 DBLookupMerkleRoot = 0x01 )
const ( DeviceIDLen = 16 DeviceIDSuffix = 0x18 )
const ( NodeHashLenLong = sha512.Size // = 64 NodeHashLenShort = sha256.Size // = 32 )
const ( ResolveCacheMaxAge = 12 * time.Hour ResolveCacheMaxAgeMutable = 20 * time.Minute )
const ( TrackStatusNone = 0 TrackStatusTracking = 1 )
const APICA = `` /* 2351-byte string literal not displayed */
const CanonicalHost = "keybase.io"
const CurrentGitMetadataEncryptionVersion = 1
const (
DefaultCloneTokenValue string = "00000000000000000000000000000000"
)
const DefaultRunMode = DevelRunMode
Not a DeriveReason because it is not used in the same way.
const DownloadURL = "https://keybase.io/download"
const EphemeralKeyGenInterval = time.Hour * 24 // one day
Everyday we want to generate a new key if possible
const (
IDSuffixKID = 0x0a
)
const (
InviteIDTag = 0x27
)
const IsBrewBuild = false
const KBFSDevCA = ` -----BEGIN CERTIFICATE----- MIIFjTCCA3WgAwIBAgIQFpAR2yGFjPGpRawSbyV+JzANBgkqhkiG9w0BAQsFADBP MRIwEAYKCZImiZPyLGQBGRYCaW8xGzAZBgoJkiaJk/IsZAEZFgtkZXYua2V5YmFz ZTEcMBoGA1UEAwwTS2V5YmFzZSBLQkZTIENBIGRldjAgFw0xNzA5MjYxNzA3MDZa GA83MDE0MDYwMjE3MDcwNlowTzESMBAGCgmSJomT8ixkARkWAmlvMRswGQYKCZIm iZPyLGQBGRYLZGV2LmtleWJhc2UxHDAaBgNVBAMME0tleWJhc2UgS0JGUyBDQSBk ZXYwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCfzXIB3edtDpdpyOrS 8rSBL6STOIucCQUf8737uk1FyA8kg84YCyDUtGFe242tCncQMJ3i/3Fo4542txKf UQ6C7XCIUKP76ZvnG6N+KJkb0Tnr3N6pOYj0xQE6dldcXHNOgOC14m84mDABH0L9 0ZSpsVKmS7svn+Nr5y8hO9J2gg8/HBGl6MupJci4VGaTFgzT22D7IvjsBEcr4Pwd qX6VafdeXlRONrVvPTHWJilpwpDkOo2EV6Un+61bVxTejFVsDpSRlwxE/R4zUJjm sscE0GOpyZRyzmdAPlzEVhTqlMTjpFyODukQnXUq8CvkoZzzc+aCCFQbRw33T3eF Je+pjqJS38pzQeaxCWs35WG53+xqiAuGVuXTcc5R31gVK2E92UmrGL96V9gRSTfg YEoT4wVHzFscMIQUpKqQ2uoJm1asiOcJG6rPFSrkTTMSiCu1ITXeL62dj7Id+6gT wdUv/r2W8tt4cCv24mfZPKI1cHjXUjZFslHJtFXn1kG19ka+JLj7kIAeglCona22 xTwdsla5nsAX2xOhtiteYlmmOkhIj3CJLDm86PYcTcsTByiDqNdgUdFGk4uvnSph 1yW/NulAuY4BX7yIRGqwGLgQQvnsbdsvcH+kYxu3I2nNz8dsaoAsX6cMSLQ9tH/I 6Cu/3jaXanvem7yFnfuFuO3abQIDAQABo2MwYTAPBgNVHRMBAf8EBTADAQH/MA4G A1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUknKQ73ecH+pEfJicSJdhi7Ud4ekwHwYD VR0jBBgwFoAUknKQ73ecH+pEfJicSJdhi7Ud4ekwDQYJKoZIhvcNAQELBQADggIB AI8dK0HiAvXtdvU3sMdK1K18JKroirK7yJL2MPKAy5Fr8IT30g/9zsoWY22zTRbD iTcvjAoK/9DlcTSdxjYqh5s8D5jALBOxWi9e6TFWK71m6eec103TJJIOtwS2jC6u R3hk1W56XL7cbdptAtrUfcEf3iohbnORdd50iAsGOAl/Iv4FduQeGZNJXIBpINYc Mjo8CLA5Iw94XlyCcc8OJPYEk33Af2MiYCnccndWlophZq8fpLTaEcPGtlIYv2sA sJhGWAdvEtZ9RoI5Rp66NuP7ZuD8GSjBwglC4PsKQS+7VdLOtt2HrzX3ZXp9DT9T zjt/PriziUbyadK8PaYaJzTkGgJe4J0nA0UlNbRl8peEpepomPG2SyJSuNpkWh0d zHeusngGowrBMqn54hmBwGaAGPA+b4faIq9sHnZm1TRlg0f7GeQegeJhjigAsv7q iq2keQ2AXXnb1SUU2NbQ6GcdNEdi1eaatiWCkmp+pZLOAAJq7FsQiOF0oqo6OicX gRQVL8BaIiQ6OQYO+XpLP0Efji0aK11X0yh02oUjdTWGBfQyBAFtccwUUDZZEaRV FWG2uwh+ewaxA+3q+goIbIpzwbV8HMUcBAvEGajprdkv0Qmv3PY/ZVW+Y1SaSlIN We3c57PSYN4UV4034Wr8gAZY5nzlYb0irQnl/Kw5oyNP -----END CERTIFICATE----- ` + ` -----BEGIN CERTIFICATE----- MIIDjDCCAnSgAwIBAgIRANRMeoRz3Xg5c8kT2f5k9wMwDQYJKoZIhvcNAQELBQAw TzESMBAGCgmSJomT8ixkARkWAmlvMRswGQYKCZImiZPyLGQBGRYLZGV2LmtleWJh c2UxHDAaBgNVBAMME0tleWJhc2UgS0JGUyBDQSBkZXYwHhcNMTUwOTIzMTk0NzM3 WhcNMTcwOTIyMTk0NzM3WjBPMRIwEAYKCZImiZPyLGQBGRYCaW8xGzAZBgoJkiaJ k/IsZAEZFgtkZXYua2V5YmFzZTEcMBoGA1UEAwwTS2V5YmFzZSBLQkZTIENBIGRl djCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALWCTpo8NNeGM6nIkNW+ 4qiM8ocuFjDw2Er6XJhncgj7xjTGf/9yZqnXeGHyHGT66AtKl5bc8son4+npWmvs 47OXORF7YGi89d9KBlIC4NCetZLBSVWiSG+XXSKrmIffi6D0UojpZc2blnzgejEO ii1uCDSaj6TRLcC8z/eXKq+DtPcfNnPL0pu5CiUNrH1cA9PS+jO1OonCGPG5yVjW bBw0nQfThhapm9IohtdbYzlQiSbE1+3ctNwCPLas3mmUWkcrrVbn1Fa54LnfNR2u pnZRNZ7czfB/vtymUJ6/y8dLYTmnzMFFYy416FOmvr4NqLBkaMWg9xp+KeR30044 AicCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD VR0OBBYEFBdb6+h+Qq5vXUWo99QbatQTX6u+MB8GA1UdIwQYMBaAFBdb6+h+Qq5v XUWo99QbatQTX6u+MA0GCSqGSIb3DQEBCwUAA4IBAQArhp0KXfJHEhVcUXqYYjdn pZQjq3+0aKjMjgnVWekxwwBARh4ycy2e7066ru1eDZr6myGYK+/vjXituWtq7/c/ Fifezgje6o9lB1TPamgQeE8slqqAgc3OxTqbAAf+rxJelcI6aOm7tqX04k8Aiuhm dr64cM/NsZTKUbrCHCVNHPNj8wWkrb9pbXH/q0+Gt/gw4MiL6p1YuSr4SIENqDpP VFiOCcbOSiw5OHPe/VwLts/g3e3NSXqd53nQW1/CgpSBdT73oWw+SBfv21KuJN5K 745S8d9JfbLItWgM73o94MSLOpUEl2F7qqXj2eOBEYWIMbRjMMZ7Vzmuo5wo3M8i -----END CERTIFICATE----- ` /* ^ expired on 9/22/2017 */
const KBFSProdCA = ` -----BEGIN CERTIFICATE----- MIIFkjCCA3qgAwIBAgIRALpii0WkmMIt0pcl7fLxvogwDQYJKoZIhvcNAQELBQAw UTESMBAGCgmSJomT8ixkARkWAmlvMRwwGgYKCZImiZPyLGQBGRYMa2Jmcy5rZXli YXNlMR0wGwYDVQQDDBRLZXliYXNlIEtCRlMgQ0EgcHJvZDAgFw0xNzA5MjYxNzA3 NDJaGA83MDE0MDYwMjE3MDc0MlowUTESMBAGCgmSJomT8ixkARkWAmlvMRwwGgYK CZImiZPyLGQBGRYMa2Jmcy5rZXliYXNlMR0wGwYDVQQDDBRLZXliYXNlIEtCRlMg Q0EgcHJvZDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALtjrV8B+9ly JjyMBX3m+9O8UbotvW9OQrPbQwVUY4LG8UJEeFETjtrZlYH4MZM7QhltBgxhnPlt elCFxquCZTo8TScDzc6GdWZrvewDWjQTWRvxmNX++3dq5U9mbY8NqONoMoA9V4ZF HL2xKrOITum0dSYjAzxfx5ofvdlmZ9MXTSDRu04lB0b0i2k3MnOfGQW7fxUA11lS O5b3QrTvae20Pzhb5psjKUiaHDGMzulVO+Lz1gdsotahgxe/NCWiGjdS3OcjRbAV BqNu7K/4xbxb580P1MOE+HSrziF3RDUSuryCzP8YMMqRXIf4rjaFYFrpazKbMoqG pFZ//935i1lUopmIuaAkQjz/8Y11hYkdvSqVTHH0kyX7/kbEm+yIkLzn3VzoSJ5X EL07XmHNY46LXBeDtIs3+Fdg0ISSMeHuSVYsm/TFK1VOrsToj8mbA0mF96laNMP6 d8OPWIVCbMN48MuZCT22gZCyAeHO57vXdd0Lg456WCcYcm3rQAHP0xoiHDLGxpoF Yawl4dpj3qEdV1XJH0LQE450FVSrwfwL2FcH2+/6GVBhPEeJQgCECVbOwCbp/BPW 85Q7GntStVQQH89CqJnZEa1hglMwhaWCxVGfFDsPpM8GCh+BfXuSpQTlvOojo518 VRHxlMduI42VZMhnmHw7G4WorhhRC6inAgMBAAGjYzBhMA8GA1UdEwEB/wQFMAMB Af8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBRQmQ3lv6fySPlfpNjyUKG3wzh9 5jAfBgNVHSMEGDAWgBRQmQ3lv6fySPlfpNjyUKG3wzh95jANBgkqhkiG9w0BAQsF AAOCAgEAEoOPz2/LQJZQId69QR5nedpoWZ7d7ob0tkM0/+S5fIgQCCsC31417pRD QxFuPPnYh5XaEcdzWq3ECGMZZfSsDmfgJSgPwCOwtK6rXshKK+W66PK2/OGQD3Jx QuBzBN1ZGT6saXg1pjhY1gdYCXuYiszXoYjpJZnp+sKegRB5BujEn9a1dnBCjVM3 BzXBB9PI34yc1+OJ6RusZtMa9fNgNAKJdMSTkCzVEU9qh3MhkqD/xEneUsZmdSDk skv6/B1fpes0ctZM/JV99FrKDqq7eWnAlsF0e6GdnWL5MNOW0UupPK8edcDjr9op cULw/+/2Hp60r50L1WWIcYEjrVmGIMpybrX1eqNilpJSjgrhX0ZqtiHh03+DcxXw kZHxDQZf1bn+WwMxy0nb6YNBwcBXZEePb4S5KKy4V0T10YEDv7oOMrF6wIy/MxtU wXHjIp+cd+lZkMngsGYZQExt9dq2BVmAncUiXj4ZAGQjpgSjaEuFkKDxEnRU908n s+ljmQv1mMwPJqVyR+VIcwmAzhDSK1bwRpKgPjhkB10fBbiqPVllPuU40lSWCGEA JB1KvwsOTY92T/h43MIeXWD2q1yzLtNmXp434uTUiZZwu2rFUYJTwagGp+z7d8TO Zdjxkm8d4rsrfgqIWXdOQejJwYm8+LpRiOcUNpA47JR5l+HQAMQ= -----END CERTIFICATE----- ` + ` -----BEGIN CERTIFICATE----- MIIDkDCCAnigAwIBAgIRAL1MQ3C37AuGO8gFqfhqb9EwDQYJKoZIhvcNAQELBQAw UTESMBAGCgmSJomT8ixkARkWAmlvMRwwGgYKCZImiZPyLGQBGRYMa2Jmcy5rZXli YXNlMR0wGwYDVQQDDBRLZXliYXNlIEtCRlMgQ0EgcHJvZDAeFw0xNTExMDgyMzM3 MDFaFw0xNzExMDcyMzM3MDFaMFExEjAQBgoJkiaJk/IsZAEZFgJpbzEcMBoGCgmS JomT8ixkARkWDGtiZnMua2V5YmFzZTEdMBsGA1UEAwwUS2V5YmFzZSBLQkZTIENB IHByb2QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCr9ttTzL093jPt WstzWR19qvLprd778ALqShZYZughuXPULgOck4AQW27vlp1nY8+7sBnWgstzL6Gv dTQU61e34yOeAFYyKoWPFHyeo/g1y+LANgLdLbeOatOlWyM2sb/f0K3SKpusp/9J 0ylpDyko97MAI28spwX1d7L/qlDV6ryce4GrzElp3J8j3TZ3cju5rEldn8BSnLYw i/2/Sc93GwhkjI03MZvuWaJQXQjTMALVzx5gFzshUymV4yrJfQbmBTwODf1yucsQ NrWDiKWcFXe5dR8BWBZG7lslZeGYaHQ6lc3TgGwaPobpaZpzVEt3Crb9HAuTVl8/ Ynlw2XvzAgMBAAGjYzBhMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEG MB0GA1UdDgQWBBSg9AYko8IqCwg2awZOZO6TW+ITsjAfBgNVHSMEGDAWgBSg9AYk o8IqCwg2awZOZO6TW+ITsjANBgkqhkiG9w0BAQsFAAOCAQEAAJ2oOlY+DCDWr73m TrR3Kfx+bDzvU1IZviKKooGGPjG+apcz5rWoKhjkO593ORCrygAvITnAI4v2Eaic h2zYfWkOnCI2YYvVChR0TSJfa2+gxZFUqxRb68zMgcTxGZTZUonEX4nCJjkrSx3M ATZkFWJDPPVci6o87VbpnKOc3mep3i1s3Cvw0GMHP+yVgw8Y0BpXII5hGbCODmoh d2mdg2gjlOVBCfTEAe7cgUx9/lraQwUurUjDO3g54NZo/pcoc9koIW+Ai+saF5gA UnFkqAOuEw0y4Fxzr9pw9naKF3KMlEJf6CiDJ4xspNzPZFupuepKitRrlrzofYuW OXgZAw== -----END CERTIFICATE----- ` /* ^ expires on 11/7/2017 */
const KeyPseudonymVersion = 1
const LKSecLen = 32
const LKSecVersion = 100
const (
LinkIDLen = 32
)
const LoginSessionMemoryTimeout time.Duration = time.Minute * 5
const MaxCPUProfileFileCount = 5
The number of CPU profile files to keep around and to bundle with sent logs.
const MaxEphemeralContentLifetime = time.Hour * 24 * 7
NOTE if you change these values you should change them in go/chatbase/storage/ephemeral.go as well.
const MaxEphemeralKeyStaleness = time.Hour * 24 * 30 // one month
NOTE: If you change this value you should change it in lib/constants.iced and go/ekreaperd/reaper.go as well. Keys last at most one week
const MaxTeamMembersForPairwiseMAC = 100
const MaxTraceFileCount = 5
The number of trace files to keep around and to bundle with sent logs.
const MinEphemeralContentLifetime = time.Second * 30
const MinEphemeralKeyLifetime = MaxEphemeralContentLifetime + EphemeralKeyGenInterval
Our keys must last at least this long.
const MinPassphraseLength = 6
const NaclDHKeySecretSize = 32
TODO: Ideally, box would expose how many random bytes it needs.
const NaclDHKeysize = 32
const NaclDHNonceSize = 24
Todo: Ideally, box would specify nonce size
const NaclSecretBoxKeySize = 32
const NaclSigningKeySecretSize = 32
TODO: Ideally, ed25519 would expose how many random bytes it needs.
const (
PGPAssertionKey = "pgp"
)
const (
PGPFingerprintLen = 20
)
const PerUserKeySeedSize = 32
const RemoteIdentifyUITimeout = 5 * time.Second
const SHA256Code = 8
const (
SecretPromptCancelDuration = 5 * time.Minute
)
const (
ServerUpdateLag = time.Minute
)
const (
SigKbEddsa = KIDNaclEddsa
)
const TAliceUID = keybase1.UID("295a7eea607af32040647123732bc819")
UID of t_alice
const TrackingRateLimitSeconds = 50
const UPK2MinorVersionCurrent = keybase1.UPK2MinorVersion_V6
NOTE(max) 2018.02.28 When bumping this next, please see the fussy logic surrounding the fact that minor version 5 is still OK for non-reset accounts.
const UserSummaryLimit = 500 // max number of user summaries in one request
const Version = "2.6.0"
Version is the current version (should be MAJOR.MINOR.PATCH)
Variables ¶
var AllDeviceTypes = DeviceTypeSet{ DeviceTypeDesktop: true, DeviceTypeMobile: true, DeviceTypePaper: true, }
var BackoffDefault = BackoffPolicy{ []int{0, 10, 10, 100, 100, 500, 500, 3000, 3000, 5000}, }
BackoffDefault is a backoff policy ranging up to 5 seconds.
var CheckDeviceName = Checker{ F: func(s string) bool { return len(s) >= 3 && len(s) <= 64 && deviceRE.MatchString(s) && !badDeviceRE.MatchString(s) }, Hint: "between 3 and 64 characters long; use a-Z, 0-9, space, plus, underscore, dash and apostrophe", }
var CheckEmail = Checker{ F: func(s string) bool { return len(s) > 3 && emailRE.MatchString(s) }, Hint: "must be a valid email address", }
var CheckEmailOrUsername = Checker{ F: func(s string) bool { return CheckEmail.F(s) || CheckUsername.F(s) }, Hint: "valid usernames are 2-16 letters long", }
var CheckInviteCode = Checker{ F: func(s string) bool { return len(s) > 4 }, Hint: "Invite codes are 4 or more characters", }
var CheckNotEmpty = Checker{ F: func(s string) bool { return len(s) > 0 }, Hint: "cannot be empty", }
var CheckPassphraseNew = Checker{ F: func(s string) bool { r := []rune(s) if len(r) > 0 && unicode.IsSpace(r[0]) { return false } return len(s) >= MinPassphraseLength }, Hint: fmt.Sprintf("passphrase must be %d or more characters", MinPassphraseLength), PreserveSpace: true, }
var CheckPassphraseSimple = Checker{ F: func(s string) bool { return len(s) > 0 }, Hint: "passphrase cannot be empty", }
var CheckUsername = Checker{ F: func(s string) bool { return len(s) >= 2 && len(s) <= 16 && usernameRE.MatchString(s) }, Hint: "between 2 and 16 characters long", }
var CheckYesNo = Checker{ F: func(s string) bool { return IsYes(s) || IsNo(s) }, Hint: "'yes' or 'no'", }
var CodeSigningProdKIDs = []string{
"01209092ae4e790763dc7343851b977930f35b16cf43ab0ad900a2af3d3ad5cea1a10a",
"0120d3458bbecdfc0d0ae39fec05722c6e3e897c169223835977a8aa208dfcd902d30a",
"012065ae849d1949a8b0021b165b0edaf722e2a7a9036e07817e056e2d721bddcc0e0a",
"01203a5a45c545ef4f661b8b7573711aaecee3fd5717053484a3a3e725cd68abaa5a0a",
"012003d86864fb20e310590042ad3d5492c3f5d06728620175b03c717c211bfaccc20a",
}
var CodeSigningStagingKIDs = []string{}
var CodeSigningTestKIDs = []string{}
var DefaultDeviceTypes = DeviceTypeSet{ DeviceTypeDesktop: true, DeviceTypeMobile: true, }
var ErrLoginSessionCleared = errors.New("LoginSession already cleared")
var ErrLoginSessionNotLoaded = errors.New("LoginSession not loaded")
var ErrNilUser = errors.New("User is nil")
var ErrSecretForUserNotFound = NotFoundError{Msg: "No secret found for user"}
var ErrTrackingExpired = errors.New("Local track expired")
var ErrUnlockNotPossible = errors.New("unlock not possible")
var FirstProdMerkleSeqnoWithSigs = keybase1.Seqno(796)
We didn't have valid signatures before 796, so don't try to load them.
var FirstProdMerkleSeqnoWithSkips = keybase1.Seqno(835903)
FirstPRodMerkleSeqnoWithSkips is the first merkle root on production that has skip pointers indicating log(n) previous merkle roots.
var FirstProdMerkleTreeWithModernShape = keybase1.Seqno(531408)
Before this merkle seqno, we had the other, more bushy shape. From this point on, we have the modern shape. It's possible to tweak our clients to handle both shapes, but it's not really worth it at this time.
var GregorServerLookup = map[RunMode]string{ DevelRunMode: DevelGregorServerURI, StagingRunMode: StagingGregorServerURI, ProductionRunMode: ProductionGregorServerURI, }
var MerkleProdKIDs = []string{
"010159baae6c7d43c66adf8fb7bb2b8b4cbe408c062cfc369e693ccb18f85631dbcd0a",
"01209ec31411b9b287f62630c2486005af27548ba62a59bbc802e656b888991a20230a",
}
var MerkleStagingKIDs = []string{
"0101bed85ce72cc315828367c28b41af585b6b7d95646a62ca829691d70f49184fa70a",
}
var MerkleTestKIDs = []string{
"0101be58b6c82db64f6ccabb05088db443c69f87d5d48857d709ed6f73948dabe67d0a",
"0120328031cf9d2a6108036408aeb3646b8985f7f8ff1a8e635e829d248a48b1014d0a",
}
var PGPArmorHeaders = map[string]string{ "Version": PGPVersion, "Comment": DownloadURL, }
var PGPVersion = "Keybase Go " + Version + " (" + runtime.GOOS + ")"
var PrereleaseBuild string
PrereleaseBuild can be set at compile time for prerelease builds. CAUTION: Don't change the name of this variable without grepping for occurrences in shell scripts!
var ProofErrorDNSOverTor = &ProofErrorImpl{ Status: keybase1.ProofStatus_TOR_SKIPPED, Desc: "DNS proofs aren't reliable over Tor", }
var ProofErrorHTTPOverTor = &ProofErrorImpl{ Status: keybase1.ProofStatus_TOR_SKIPPED, Desc: "HTTP proofs aren't reliable over Tor", }
var ProofErrorUnchecked = &ProofErrorImpl{ Status: keybase1.ProofStatus_UNCHECKED, Desc: "Proof unchecked due to privacy concerns", }
var PublicChain = &ChainType{ DbType: DBSigChainTailPublic, Private: false, Encrypted: false, GetMerkleTriple: func(u *MerkleUserLeaf) *MerkleTriple { return u.public }, }
var RemoteServiceOrder = []keybase1.ProofType{ keybase1.ProofType_KEYBASE, keybase1.ProofType_TWITTER, keybase1.ProofType_FACEBOOK, keybase1.ProofType_GITHUB, keybase1.ProofType_REDDIT, keybase1.ProofType_COINBASE, keybase1.ProofType_HACKERNEWS, keybase1.ProofType_GENERIC_WEB_SITE, keybase1.ProofType_ROOTER, }
var RemoteServiceTypes = map[string]keybase1.ProofType{ "keybase": keybase1.ProofType_KEYBASE, "twitter": keybase1.ProofType_TWITTER, "facebook": keybase1.ProofType_FACEBOOK, "github": keybase1.ProofType_GITHUB, "reddit": keybase1.ProofType_REDDIT, "coinbase": keybase1.ProofType_COINBASE, "hackernews": keybase1.ProofType_HACKERNEWS, "https": keybase1.ProofType_GENERIC_WEB_SITE, "http": keybase1.ProofType_GENERIC_WEB_SITE, "dns": keybase1.ProofType_DNS, "rooter": keybase1.ProofType_ROOTER, }
var RunModes = []RunMode{DevelRunMode, StagingRunMode, ProductionRunMode}
var ServerLookup = map[RunMode]string{ DevelRunMode: DevelServerURI, StagingRunMode: StagingServerURI, ProductionRunMode: ProductionServerURI, }
var TorProxy = "localhost:9050"
var UserAgent = runtime.GOOS + ":" + "Keybase CLI (" + runtime.Version() + "):" + Version
Right now reddit is the only site that seems to have any requirements for our User-Agent string. (See https://github.com/reddit/reddit/wiki/API.)If something else comes up, we'll want to make this more configurable.
Functions ¶
func AddPerUserKeyServerArg ¶ added in v1.0.27
func AddPerUserKeyServerArg(serverArg JSONPayload, generation keybase1.PerUserKeyGeneration, pukBoxes []keybase1.PerUserKeyBox, pukPrev *PerUserKeyPrev)
Make the "per_user_key" section of an API arg. Requires one or more `pukBoxes` `pukPrev` is optional. Modifies `serverArg`.
func AddToProofSetNoChecks ¶
func AddToProofSetNoChecks(r RemoteProofChainLink, ps *ProofSet)
func AppDataDir ¶
func AssertionIsTeam ¶ added in v1.0.27
func AssertionIsTeam(au AssertionURL) bool
func AttachedSignWrapper ¶
func AttachedSignWrapper(out io.WriteCloser, key PGPKeyBundle, armored bool) ( in io.WriteCloser, err error)
func BootstrapActiveDeviceFromConfig ¶ added in v1.0.48
func BootstrapActiveDeviceFromConfig(m MetaContext, online bool) (uid keybase1.UID, err error)
BootstrapActiveDeviceFromConfig takes the user's config.json, keys.mpack file and secret store to populate ActiveDevice, and to have all credentials necessary to sign NIST tokens, allowing the user to act as if "logged in". Will return nil if everything work, LoginRequiredError if a real "login" is required to make the app work, and various errors on unexpected failures.
func BootstrapActiveDeviceWithMetaContext ¶
func BootstrapActiveDeviceWithMetaContext(m MetaContext) (ok bool, uid keybase1.UID, err error)
BootstrapActiveDeviceWithMetaContext will setup an ActiveDevice with a NIST Factory for the caller. The m.loginContext passed through isn't really needed for anything aside from assertions, but as we phase out LoginState, we'll leave it here so that assertions in LoginState can still pass.
func BoxPublicKeyToKeybaseKID ¶
func BoxPublicKeyToKeybaseKID(k saltpack.BoxPublicKey) (ret keybase1.KID)
func CITimeMultiplier ¶ added in v1.0.27
func CITimeMultiplier(g *GlobalContext) time.Duration
func CTimeLog ¶ added in v1.0.19
func CTimeLog(ctx context.Context, name string, start time.Time, out func(context.Context, string, ...interface{}))
CTimeLog calls out with the time since start. Use like this:
defer CTimeLog(ctx, "MyFunc", time.Now(), e.G().Log.Warning)
func CTraceTimed ¶ added in v1.0.19
func CanEncrypt ¶
func CanEncrypt(key GenericKey) bool
func CancelDowngradeLease ¶ added in v1.0.34
func CanonicalProofName ¶
func CanonicalProofName(t TypedChainLink) string
func ChangeMountIcon ¶ added in v1.0.19
func CheckCurrentUIDDeviceID ¶
func CheckCurrentUIDDeviceID(m MetaContext) (err error)
func CheckInvitationCode ¶
func CheckInvitationCode(m MetaContext, code string) error
func CheckKID ¶ added in v1.0.19
func CheckKID(u *keybase1.UserPlusKeysV2AllIncarnations, kid keybase1.KID) (found bool, revokedAt *keybase1.KeybaseTime, deleted bool)
func CheckPosted ¶
func CheckPosted(m MetaContext, proofID string) (found bool, status keybase1.ProofStatus, state keybase1.ProofState, err error)
func CheckPostedViaSigID ¶
func CheckPostedViaSigID(m MetaContext, sigID keybase1.SigID) (found bool, status keybase1.ProofStatus, state keybase1.ProofState, err error)
func CheckTracking ¶
func CheckTracking(g *GlobalContext) error
func CheckUIDAgainstCasedUsername ¶
CheckUIDAgainstCasedUsername takes the input string, does not convert toLower, and then hashes it to recover a UID. This is a workaround for some users whose UIDs were computed incorrectly.
func CheckUIDAgainstUsername ¶
func ClearSecretsOnDeprovision ¶
func ClearSecretsOnDeprovision(m MetaContext, username NormalizedUsername) error
XXX: THIS DELETES SECRET KEYS. Deleting the wrong secret keys can make you lose all your data forever. We only run this in the DeprovisionEngine and if we detect that our device was revoked in LogoutAndDeprovisionIfRevoked.
func ClearStoredSecret ¶
func ClearStoredSecret(m MetaContext, username NormalizedUsername) error
func CollectAssertions ¶
func CollectAssertions(e AssertionExpression) (remotes AssertionAnd, locals AssertionAnd)
func CombineErrors ¶
CombineErrors returns a single error for multiple errors, or nil if none.
func ComputeSigIDFromSigBody ¶
func CopyTagsToBackground ¶ added in v1.0.21
func CurrentBinaryRealpath ¶ added in v1.0.34
func CurrentSaltpackVersion ¶ added in v1.0.27
func DebugDumpKey ¶
func DebugDumpKey(g *GlobalContext, name string, b []byte)
DebugDumpKey is used only in debugging. For now it's not in use but we might need it in the future.
func DecodeHexFixed ¶
Decode decodes src into dst. Errors unless all of: - src is valid hex - src decodes into exactly len(dst) bytes
func DefaultPassphraseArg ¶
func DefaultPassphraseArg(m MetaContext) keybase1.GUIEntryArg
func DefaultPassphrasePromptArg ¶ added in v1.0.46
func DefaultPassphrasePromptArg(m MetaContext, username string) keybase1.GUIEntryArg
func DelegatorAggregator ¶
func DelegatorAggregator(m MetaContext, ds []Delegator, extra AggSigProducer, pukBoxes []keybase1.PerUserKeyBox, pukPrev *PerUserKeyPrev) (err error)
Run posts an array of delegations to the server. Keeping this simple as we don't need any state (yet) `extra` is optional and adds an extra sig, produced by something other than a Delegator, after the others.
func DeleteAccount ¶
func DeleteAccount(m MetaContext, username NormalizedUsername, passphrase string) (err error)
func DeletePrimary ¶
func DeletePrimary(m MetaContext) (err error)
func DeriveFromSecret ¶ added in v1.0.27
func DeriveFromSecret(inKey [32]byte, reason DeriveReason) (outKey [32]byte, err error)
Derive a key from another. Uses HMAC(key=key, data=reason) Not to be confused with DeriveSymmetricKey which has hmac inputs swapped. This one makes sense for derivation from secrets used only to derive from.
func DeviceStatusToString ¶
func DigestForFileAtPath ¶
DigestForFileAtPath returns a SHA256 digest for file at specified path
func DisableProcessTracing ¶ added in v1.0.48
func DisableProcessTracing() error
func DiscardAndCloseBody ¶
DiscardAndCloseBody reads as much as possible from the body of the given response, and then closes it.
This is because, in order to free up the current connection for re-use, a response body must be read from before being closed; see http://stackoverflow.com/a/17953506 .
Instead of doing:
res, _ := ... defer res.Body.Close()
do
res, _ := ... defer DiscardAndCloseBody(res)
instead.
func DisplayTrackArg ¶
func DisplayTrackArg(sessionID int, stmt string) *keybase1.DisplayTrackStatementArg
func EncryptPGPKey ¶ added in v1.0.29
func ExportErrorAsStatus ¶
func ExportErrorAsStatus(g *GlobalContext, e error) (ret *keybase1.Status)
func ExportPGPIdentity ¶
func ExportPGPIdentity(identity *openpgp.Identity) keybase1.PGPIdentity
func ExportProofError ¶
func ExportProofError(pe ProofError) (ret keybase1.ProofResult)
func ExportRemoteProof ¶
func ExportRemoteProof(p RemoteProofChainLink) keybase1.RemoteProof
func ExportTrackDiff ¶
func ExportTrackIDComponentToRevokedProof ¶
func ExportTrackIDComponentToRevokedProof(tidc TrackIDComponent) keybase1.RevokedProof
func ExportTrackSummary ¶
func ExportTrackSummary(l *TrackLookup, username string) *keybase1.TrackSummary
func FastByteArrayEq ¶
func FileExists ¶
exists returns whether the given file or directory exists or not
func FindBase64Blocks ¶
func FindBase64Snippets ¶
func FindBestIdentifyComponent ¶
func FindBestIdentifyComponent(e AssertionExpression) string
func FindFirstBase64Block ¶
func FindNextMerkleRootAfterReset ¶
func FindNextMerkleRootAfterReset(m MetaContext, arg keybase1.FindNextMerkleRootAfterResetArg) (res keybase1.NextMerkleRootRes, err error)
func FindNextMerkleRootAfterRevoke ¶
func FindNextMerkleRootAfterRevoke(m MetaContext, arg keybase1.FindNextMerkleRootAfterRevokeArg) (res keybase1.NextMerkleRootRes, err error)
FindNextMerkleRootAfterRevoke loads the user for the given UID, and find the next merkle root after the given key revocation happens. It uses the paremter arg.Prev to figure out where to start looking and then keeps searching forward until finding a leaf that matches arg.Loc.
func FindNextMerkleRootAfterTeamRemoval ¶
func FindNextMerkleRootAfterTeamRemoval(m MetaContext, arg keybase1.FindNextMerkleRootAfterTeamRemovalArg) (res keybase1.NextMerkleRootRes, err error)
func FindPGPPrivateKey ¶ added in v1.0.46
func FindPGPPrivateKey(k *PGPKeyBundle) bool
FindPGPPrivateKey checks if supposed secret key PGPKeyBundle contains any valid PrivateKey entities. Sometimes primary private key is stoopped out but there are subkeys with secret keys.
func ForceWallClock ¶
ForceWallClock takes a multi-personality Go time and converts it to a regular old WallClock time.
func FormatImplicitTeamDisplayNameSuffix ¶ added in v1.0.30
func FormatImplicitTeamDisplayNameSuffix(conflict keybase1.ImplicitTeamConflictInfo) string
func FormatTime ¶
func GenericKeyEqual ¶
func GenericKeyEqual(k1, k2 GenericKey) bool
func GetAllProvisionedUsernames ¶
func GetAllProvisionedUsernames(m MetaContext) (current NormalizedUsername, all []NormalizedUsername, err error)
GetAllProvisionedUsernames looks into the current config.json file, and finds all usernames that are currently provisioned on this device. That is, it filters out those that are on revoked devices or have reset their accounts. It uses UPAK loading for verifying the current user/device statuses, so should be fast if everything is cached recently.
func GetAppStatusCode ¶
func GetAppStatusCode(err error) (code keybase1.StatusCode, ok bool)
If the error is an AppStatusError, returns its code. Otherwise returns (SCGeneric, false).
func GetBundledCAsFromHost ¶ added in v1.0.34
GetBundledCAsFromHost returns in root CA in []byte for given host, or nil if no matching CA is found for host.
func GetConfiguredAccounts ¶
func GetConfiguredAccounts(m MetaContext, s SecretStoreAll) ([]keybase1.ConfiguredAccount, error)
func GetExtendedStatus ¶
func GetExtendedStatus(m MetaContext) (res keybase1.ExtendedStatus, err error)
func GetInvitationCode ¶ added in v1.0.19
func GetInvitationCode(m MetaContext) (string, error)
func GetKeybasePassphrase ¶
func GetKeybasePassphrase(m MetaContext, ui SecretUI, username, retryMsg string) (keybase1.GetPassphraseRes, error)
func GetPGPFingerprintVoid ¶
func GetPGPFingerprintVoid(w *jsonw.Wrapper, p *PGPFingerprint, e *error)
func GetPaperKeyPassphrase ¶
func GetPassphraseStreamViaPrompt ¶
func GetPassphraseStreamViaPrompt(m MetaContext) (pps *PassphraseStream, tsec Triplesec, err error)
GetPassphraseStreamViaPrompt prompts the user for a passphrase and on success returns a PassphraseStream and Triplesec derived from the user's passphrase. As a side effect, it stores the full LKSec in the secret store.
func GetPassphraseUntilCheck ¶
func GetPassphraseUntilCheck(m MetaContext, arg keybase1.GUIEntryArg, prompter PassphrasePrompter, checker PassphraseChecker) (keybase1.GetPassphraseRes, error)
func GetPassphraseUntilCheckWithChecker ¶ added in v1.0.16
func GetPassphraseUntilCheckWithChecker(m MetaContext, arg keybase1.GUIEntryArg, prompter PassphrasePrompter, checker *Checker) (keybase1.GetPassphraseRes, error)
func GetPlatformString ¶ added in v1.0.22
func GetPlatformString() string
func GetProxyCAs ¶
func GetSecret ¶
func GetSecret(m MetaContext, ui SecretUI, title, prompt, retryMsg string, allowSecretStore bool) (keybase1.GetPassphraseRes, error)
func GetSortedCPUProfileFiles ¶ added in v1.0.46
GetSortedCPUProfileFiles returns all CPU profile files in the given directory approximately sorted by increasing start time.
func GetSortedTraceFiles ¶ added in v1.0.46
GetSortedTraceFiles returns all trace files in the given directory approximately sorted by increasing start time.
func GetTriplesecMaybePrompt ¶
func GetTriplesecMaybePrompt(m MetaContext) (tsec Triplesec, ppgen PassphraseGeneration, err error)
GetTriplesecMaybePrompt will try to get the user's current triplesec. It will either pluck it out of the environment or prompt the user for a passphrase if it can't be found. The secret store is of no use here, so skip it. Recall that the full passphrase stream isn't stored to the secret store, only the bits that encrypt local keys.
func HexDecodeQuoted ¶
func ImportStatusAsError ¶
func ImportStatusAsError(g *GlobalContext, s *keybase1.Status) error
func IsAppStatusCode ¶ added in v1.0.33
func IsAppStatusCode(err error, code keybase1.StatusCode) bool
func IsAppStatusErrorCode ¶ added in v1.0.48
func IsAppStatusErrorCode(err error, code keybase1.StatusCode) bool
func IsDirEmpty ¶
IsDirEmpty returns whether directory has any files.
func IsExecError ¶ added in v1.0.16
func IsIdentifyProofError ¶ added in v1.0.27
func IsKeybaseAdmin ¶ added in v1.0.34
IsKeybaseAdmin returns true if uid is a keybase admin.
func IsMobilePlatform ¶ added in v1.0.48
func IsMobilePlatform() bool
func IsNoKeyError ¶
func IsNoSpaceOnDeviceError ¶ added in v1.0.39
IsNoSpaceOnDeviceError will return true if err is an `os` error for "no space left on device".
func IsNotFoundError ¶
func IsPGP ¶
func IsPGP(key GenericKey) bool
func IsResolutionError ¶
func IsSocialAssertion ¶
func IsSocialAssertion(ctx AssertionContext, s string) bool
IsSocialAssertion returns true for strings that are valid social assertions. They do not need to be normalized, so user@twitter and twitter:user will work, as will USER@Twitter.
func IsSocketClosedError ¶
net.errClosing isn't exported, so do this.. UGLY!
func IsSystemAdminUser ¶
IsSystemAdminUser returns true if current user is root or admin (system user, not Keybase user). WARNING: You shouldn't rely on this for security purposes.
func IsValidHostname ¶
func JoinPredicate ¶
JoinPredicate joins strings with predicate
func KIDIsDeviceEncrypt ¶
func KIDIsDeviceVerify ¶
func KeyLookupByBoxPublicKey ¶
func KeyLookupByBoxPublicKey(g *GlobalContext, k saltpack.BoxPublicKey) (username string, uid keybase1.UID, err error)
func KeyLookupKIDIncludingRevoked ¶ added in v1.0.19
func KeyMatchesQuery ¶
func KeyMatchesQuery(key GenericKey, q string, exact bool) bool
Any valid key matches the empty string.
func KeyProof ¶
func KeyProof(m MetaContext, arg Delegator) (ret *jsonw.Wrapper, err error)
arg.Me user is used to get the last known seqno in ProofMetadata. If arg.Me == nil, set arg.Seqno.
func KeybaseEmailAddress ¶
func LinkEntropy ¶ added in v1.0.47
func LoadUnlockedDeviceKeys ¶
func LoadUnlockedDeviceKeys(m MetaContext, uid keybase1.UID, deviceID keybase1.DeviceID, online bool) (uv keybase1.UserVersion, sib GenericKey, sub GenericKey, deviceName string, err error)
func LoadUserEmails ¶ added in v1.0.19
func LoadUserEmails(g *GlobalContext) (emails []keybase1.Email, err error)
LoadUserEmails returns emails for logged in user
func LoadUserPlusKeys ¶
func LoadUserPlusKeys(ctx context.Context, g *GlobalContext, uid keybase1.UID, pollForKID keybase1.KID) (keybase1.UserPlusKeys, error)
LoadUserPlusKeys loads user and keys for the given UID. If `pollForKID` is provided, we'll request this user potentially twice: the first time can hit the cache for the UID, but will force a repoll unless the pollForKID is found for the user. If pollForKID is empty, then just access the cache as normal.
func LocalDataDir ¶ added in v1.0.19
func LogTagsFromContext ¶ added in v1.0.21
LogTagsFromContext is a wrapper around logger.LogTagsFromContext that simply casts the result to the type expected by rpc.Connection.
func LogTagsToString ¶ added in v1.0.19
func LookupSaltForUID ¶
func LookupSaltForUID(m MetaContext, uid keybase1.UID) (salt []byte, err error)
func MPackDecode ¶ added in v1.0.46
func MPackEncode ¶ added in v1.0.46
func MakeAndPostKeyPseudonyms ¶
func MakeAndPostKeyPseudonyms(m MetaContext, pnymInfos *[]KeyPseudonymInfo) (err error)
MakeAndPostKeyPseudonyms fills the KeyPseudonym field of each of the pnymInfos with the appropriate KeyPseudonym.
func MakeByte24 ¶ added in v1.0.27
func MakeByte32 ¶ added in v1.0.21
func MakeByte32Soft ¶ added in v1.0.27
func MakeCPUProfileFilename ¶ added in v1.0.46
MakeCPUProfileFilename returns a filename to use for a CPU profile file in the given directory with the given start time and duration.
func MakeParentDirs ¶
func MakeParentDirs(log SkinnyLogger, filename string) error
func MakeProofChecker ¶ added in v1.0.18
func MakeProofChecker(c ExternalServicesCollector, l RemoteProofChainLink) (ProofChecker, ProofError)
func MakeTraceFilename ¶ added in v1.0.46
MakeTraceFilename returns a filename to use for a trace file in the given directory with the given start time and duration.
func MakeURI ¶
MakeURI makes a URI string out of the given protocol and host strings, adding necessary punctuation in between.
func MakeWrapError ¶ added in v1.0.30
func MakeWrapError(g *GlobalContext) func(e error) interface{}
func MobilePermissionDeniedCheck ¶ added in v1.0.39
func MobilePermissionDeniedCheck(g *GlobalContext, err error, msg string)
MobilePermissionDeniedCheck panics if err is a permission denied error and if app is a mobile app. This has caused issues opening config.json and secretkeys files, where it seems to be stuck in a permission denied state and force-killing the app is the only option.
func MsgpackDecode ¶ added in v1.0.18
func MsgpackDecodeAll ¶
func MsgpackDecodeAll(data []byte, handle *codec.MsgpackHandle, out interface{}) error
Decode data into out, but make sure that all bytes in data are used.
func MsgpackEncode ¶ added in v1.0.18
func NewAPIEngines ¶
func NewAPIEngines(g *GlobalContext) (*InternalAPIEngine, *ExternalAPIEngine, error)
Make a new InternalApiEngine and a new ExternalApiEngine, which share the same network config (i.e., TOR and Proxy parameters)
func NewDeviceID ¶
func NewLoginRequiredError ¶ added in v1.0.40
func NewLoopbackConnPair ¶
func NewLoopbackConnPair() (*LoopbackConn, *LoopbackConn)
NewLoopbackConnPair makes a new loopback connection pair
func NewNoTriplesecError ¶
func NewNoTriplesecError() error
func NewPerUserKeyBox ¶ added in v1.0.27
func NewPerUserKeyBox(contents PerUserKeySeed, receiverKey NaclDHKeyPair, senderKey NaclDHKeyPair, generation keybase1.PerUserKeyGeneration) (keybase1.PerUserKeyBox, error)
func NewTeamProvisionalError ¶ added in v1.0.39
func NewTransportFromSocket ¶
func NewTransportFromSocket(g *GlobalContext, s net.Conn) rpc.Transporter
func NewTypedChainLink ¶
func NewTypedChainLink(cl *ChainLink) (ret TypedChainLink, w Warning)
func NormalizeSocialAssertion ¶
func NormalizeSocialAssertion(ctx AssertionContext, s string) (keybase1.SocialAssertion, bool)
NormalizeSocialAssertion creates a SocialAssertion from its input and normalizes it. The service name will be lowercased. If the service is case-insensitive, then the username will also be lowercased. Colon assertions (twitter:user) will be transformed to the user@twitter format. Only registered services are allowed.
func NormalizedUsernamesToStrings ¶ added in v1.0.27
func NormalizedUsernamesToStrings(names []NormalizedUsername) []string
func OpenSig ¶
OpenSig takes an armored PGP or Keybase signature and opens the armor. It will return the body of the signature, the sigID of the body, or an error if it didn't work out.
func OpenTempFile ¶
OpenTempFile creates an opened termporary file. Use mode=0 for default permissions.
OpenTempFile("foo", ".zip", 0755) => "foo.RCG2KUSCGYOO3PCKNWQHBOXBKACOPIKL.zip" OpenTempFile(path.Join(os.TempDir(), "foo"), "", 0) => "/tmp/foo.RCG2KUSCGYOO3PCKNWQHBOXBKACOPIKL"
func PGPEncrypt ¶
func PGPEncrypt(source io.Reader, sink io.WriteCloser, signer *PGPKeyBundle, recipients []*PGPKeyBundle) error
func PGPEncryptString ¶
func PGPEncryptString(input string, signer *PGPKeyBundle, recipients []*PGPKeyBundle) ([]byte, error)
func PGPLookupFingerprint ¶
func PGPLookupFingerprint(g *GlobalContext, fp *PGPFingerprint) (username string, uid keybase1.UID, err error)
func PGPLookupHex ¶
func PacketArmoredEncode ¶
func PacketArmoredEncode(p Packetable) (ret string, err error)
func ParseGenericKey ¶
func ParseGenericKey(bundle string) (GenericKey, *Warnings, error)
func ParseGpgIndexStream ¶
func ParseGpgIndexStream(g *GlobalContext, stream io.Reader) (ki *GpgKeyIndex, w Warnings, err error)
func ParseImplicitTeamDisplayName ¶ added in v1.0.29
func ParseImplicitTeamDisplayName(ctx AssertionContext, s string, isPublic bool) (ret keybase1.ImplicitTeamDisplayName, err error)
Parse a name like "mlsteele,malgorithms@twitter#bot (conflicted copy 2017-03-04 #2)"
func ParseImplicitTeamDisplayNameSuffix ¶ added in v1.0.29
func ParseImplicitTeamDisplayNameSuffix(suffix string) (ret *keybase1.ImplicitTeamConflictInfo, err error)
func ParseImplicitTeamTLFName ¶ added in v1.0.29
func ParseImplicitTeamTLFName(ctx AssertionContext, s string) (keybase1.ImplicitTeamDisplayName, error)
Parse a name like "/keybase/private/mlsteele,malgorithms@twitter#bot (conflicted copy 2017-03-04 #2)"
func ParseStellarAccountID ¶ added in v1.0.48
ParseStellarAccountID parses an account ID and returns it. Returns helpful error messages than can be shown to users.
func ParseStellarSecretKey ¶ added in v1.0.47
func ParseStellarSecretKey(secStr string) (stellar1.SecretKey, stellar1.AccountID, *keypair.Full, error)
ParseStellarSecretKey parses a secret key and returns it and the AccountID it is the master key of. Returns helpful error messages than can be shown to users.
func ParseTeamPrivateKBFSPath ¶ added in v1.0.30
Parse a name like "/keybase/team/happy.toucans"
func PassphraseLoginNoPrompt ¶
func PassphraseLoginNoPrompt(m MetaContext, usernameOrEmail string, passphrase string) (err error)
func PassphraseLoginNoPromptThenSecretStore ¶
func PassphraseLoginNoPromptThenSecretStore(m MetaContext, usernameOrEmail string, passphrase string, failOnStoreError bool) (err error)
func PassphraseLoginPrompt ¶
func PassphraseLoginPrompt(m MetaContext, usernameOrEmail string, maxAttempts int) (err error)
func PassphraseLoginPromptThenSecretStore ¶
func PassphraseLoginPromptThenSecretStore(m MetaContext, usernameOrEmail string, maxAttempts int, failOnStoreError bool) (err error)
func PerUserKeyProof ¶ added in v1.0.27
func PerUserKeyProof(m MetaContext, me *User, pukSigKID keybase1.KID, pukEncKID keybase1.KID, generation keybase1.PerUserKeyGeneration, signingKey GenericKey) (*jsonw.Wrapper, error)
PerUserKeyProof creates a proof introducing a new per-user-key generation. `signingKey` is the key signing in this new key. Not to be confused with the derived per-user-key signing key.
func PickFirstError ¶
func PlatformSpecificUpgradeInstructions ¶ added in v1.0.17
func PlatformSpecificUpgradeInstructions(g *GlobalContext, upgradeURI string)
func Pluralize ¶
Pluralize returns pluralized string with value. For example,
Pluralize(1, "zebra", "zebras", true) => "1 zebra" Pluralize(2, "zebra", "zebras", true) => "2 zebras" Pluralize(2, "zebra", "zebras", false) => "zebras"
func PosixLineEndings ¶
func PostDeviceLKS ¶
func PostDeviceLKS(m MetaContext, deviceID keybase1.DeviceID, deviceType string, serverHalf LKSecServerHalf, ppGen PassphraseGeneration, clientHalfRecovery string, clientHalfRecoveryKID keybase1.KID) error
func PostInviteRequest ¶
func PostInviteRequest(m MetaContext, arg InviteRequestArg) (err error)
func ProofErrorIsPvlBad ¶ added in v1.0.21
func ProofErrorIsPvlBad(pe ProofError) bool
func ProofErrorIsSoft ¶
func ProofErrorIsSoft(pe ProofError) bool
func ProofErrorToState ¶
func ProofErrorToState(pe ProofError) keybase1.ProofState
func RandBytesWithSuffix ¶ added in v1.0.27
func RandHexString ¶ added in v1.0.34
func RandString ¶
RandString returns random (base32) string with prefix.
func RandStringB64 ¶ added in v1.0.19
func RandomHmacKey ¶ added in v1.0.22
func RandomHmacKey() [32]byte
func RandomNaclDHNonce ¶ added in v1.0.46
func RandomNaclDHNonce() (nonce [NaclDHNonceSize]byte, err error)
func ReadOneKeyFromBytes ¶
func ReadOneKeyFromBytes(b []byte) (*PGPKeyBundle, *Warnings, error)
func ReadOneKeyFromString ¶
func ReadOneKeyFromString(originalArmor string) (*PGPKeyBundle, *Warnings, error)
note: openpgp.ReadArmoredKeyRing only returns the first block. It will never return multiple entities.
func ReadOneKeyFromStringLiberal ¶ added in v1.0.33
func ReadOneKeyFromStringLiberal(originalArmor string) (*PGPKeyBundle, *Warnings, error)
note: openpgp.ReadArmoredKeyRing only returns the first block. It will never return multiple entities.
func ReadPrivateKeyFromString ¶
func ReadPrivateKeyFromString(s string) (*PGPKeyBundle, *Warnings, error)
ReadPrivateKeyFromString finds the first private key block in s and decodes it into a PGPKeyBundle. It is useful in the case where s contains multiple key blocks and you want the private key block. For example, the result of gpg export.
func RemoteSettingsRepairman ¶ added in v1.0.19
func RemoteSettingsRepairman(g *GlobalContext) error
func RemoveLocalTracks ¶
func RemoveNilErrors ¶
RemoveNilErrors returns error slice with ni errors removed.
func RequestDowngradeLeaseByKID ¶ added in v1.0.27
func RequestDowngradeLeaseByKID(ctx context.Context, g *GlobalContext, kids []keybase1.KID) (lease *Lease, mr *MerkleRoot, err error)
func RequestDowngradeLeaseBySigIDs ¶ added in v1.0.27
func RequestDowngradeLeaseBySigIDs(ctx context.Context, g *GlobalContext, sigIDs []keybase1.SigID) (lease *Lease, mr *MerkleRoot, err error)
func RequestDowngradeLeaseByTeam ¶ added in v1.0.27
func RequestDowngradeLeaseByTeam(ctx context.Context, g *GlobalContext, teamID keybase1.TeamID, uids []keybase1.UID) (lease *Lease, mr *MerkleRoot, err error)
func ResetAccount ¶
func ResetAccount(m MetaContext, username NormalizedUsername, passphrase string) (err error)
func RunBug3964Repairman ¶ added in v1.0.18
func RunBug3964Repairman(m MetaContext) error
func RunSyncerCached ¶ added in v1.0.22
func RunSyncerCached(m MetaContext, s Syncer, uid keybase1.UID) (err error)
func SafeWriteToFile ¶
func SafeWriteToFile(g SafeWriteLogger, t SafeWriter, mode os.FileMode) error
SafeWriteToFile is a pass-through to safeWriteToFileOnce on non-Windows.
func SaferDLLLoading ¶ added in v1.0.17
func SaferDLLLoading() error
SaferDLLLoading dummy for platforms not needing this.
func SaltpackDecrypt ¶
func SaltpackDecrypt(m MetaContext, source io.Reader, sink io.WriteCloser, decryptionKeyring saltpack.SigncryptKeyring, checkSenderMki func(*saltpack.MessageKeyInfo) error, checkSenderSigningKey func(saltpack.SigningPublicKey) error, keyResolver saltpack.SymmetricKeyResolver) (*saltpack.MessageKeyInfo, error)
func SaltpackEncrypt ¶
func SaltpackEncrypt(m MetaContext, arg *SaltpackEncryptArg) error
SaltpackEncrypt reads from the given source, encrypts it for the given receivers from the given sender, and writes it to sink. If Binary is false, the data written to sink will be armored.
func SaltpackSign ¶
func SaltpackSign(g *GlobalContext, source io.ReadCloser, sink io.WriteCloser, key NaclSigningKeyPair, binary bool, saltpackVersion saltpack.Version) error
func SaltpackSignDetached ¶
func SaltpackSignDetached(g *GlobalContext, source io.ReadCloser, sink io.WriteCloser, key NaclSigningKeyPair, binary bool, saltpackVersion saltpack.Version) error
func SaltpackVerify ¶
func SaltpackVerify(g SaltpackVerifyContext, source io.Reader, sink io.WriteCloser, checkSender func(saltpack.SigningPublicKey) error) error
func SaltpackVerifyDetached ¶
func SaltpackVerifyDetached(g SaltpackVerifyContext, message io.Reader, signature []byte, checkSender func(saltpack.SigningPublicKey) error) error
func SaltpackVersionFromArg ¶ added in v1.0.27
func SecWordList ¶
SecWordList returns an array of words from secwords. It returns enough words to satisfy the desired entropy.
func SecureByteArrayEq ¶
func SetDeviceCloneState ¶
func SetDeviceCloneState(m MetaContext, d DeviceCloneState) error
func SigAssertKbPayload ¶
func SigAssertPGPPayload ¶
func SigAssertPayload ¶
func SigExtractKbPayloadAndKID ¶ added in v1.0.21
func SigExtractPGPPayload ¶ added in v1.0.21
func SigExtractPayloadAndKID ¶ added in v1.0.21
func SigExtractPayloadAndKID(armored string) (payload []byte, kid keybase1.KID, sigID keybase1.SigID, err error)
SigExtractPayloadAndKID extracts the payload and KID of the key that was supposedly used to sign this message. A KID will only be returned for KB messages, and not for PGP messages
func SigningPublicKeyToKeybaseKID ¶
func SigningPublicKeyToKeybaseKID(k saltpack.SigningPublicKey) (ret keybase1.KID)
func SimpleSign ¶
SimpleSign signs the given data stream, outputs an armored string which is the attached signature of the input data
func SleepUntilWithContext ¶ added in v1.0.27
Sleep until `deadline` or until `ctx` is canceled, whichever occurs first. Returns an error BUT the error is not really an error. It is nil if the sleep finished, and the non-nil result of Context.Err()
func SplitByRunes ¶
SplitByRunes splits string by runes
func SplitPath ¶
SplitPath return string split by path separator: SplitPath("/a/b/c") => []string{"a", "b", "c"}
func StatSKBKeyringMTime ¶ added in v1.0.18
func StatSKBKeyringMTime(un NormalizedUsername, g *GlobalContext) (mtime time.Time, err error)
func StellarProof ¶ added in v1.0.47
func StellarProof(m MetaContext, me *User, walletAddress stellar1.AccountID, signingKey GenericKey) (*jsonw.Wrapper, error)
StellarProof creates a proof of a stellar wallet.
func StellarSimplifyAmount ¶ added in v1.0.48
SimplifyAmount Amount must be a decimal amount like "1.0" or "50" Strip trailing zeros after a "." Example: "1.0010000" -> "1.001" Example: "1.0000000" -> "1"
func StoreLocalTrack ¶
func StoreSecretAfterLogin ¶
func StoreSecretAfterLogin(m MetaContext, n NormalizedUsername, uid keybase1.UID, deviceID keybase1.DeviceID) (err error)
func StoreSecretAfterLoginWithLKS ¶
func StoreSecretAfterLoginWithLKS(m MetaContext, n NormalizedUsername, lks *LKSec) (err error)
func StretchPassphrase ¶
func StretchPassphrase(g *GlobalContext, passphrase string, salt []byte) (tsec Triplesec, pps *PassphraseStream, err error)
func TablifyWithTabWriter ¶ added in v1.0.18
func TempFileName ¶
TempFileName returns a temporary random filename
func TimeLog ¶
TimeLog calls out with the time since start. Use like this:
defer TimeLog("MyFunc", time.Now(), e.G().Log.Warning)
func TraceTimed ¶ added in v1.0.27
func UidsToString ¶ added in v1.0.48
func UnixToTimeMappingZero ¶
The standard time.Unix() converter interprets 0 as the Unix epoch (1970). But in PGP, an expiry time of zero indicates that a key never expires, and it would be nice to be able to check for that case with Time.IsZero(). This conversion special-cases 0 to be time.Time's zero-value (1 AD), so that we get that nice property.
func UnverifiedPassphraseStream ¶
func UnverifiedPassphraseStream(m MetaContext, uid keybase1.UID, passphrase string) (tsec Triplesec, ret *PassphraseStream, err error)
UnverifiedPassphraseStream takes a passphrase as a parameter and also the salt from the Account and computes a Triplesec and a passphrase stream. It's not verified through a Login.
func UpdateDeviceCloneState ¶
func UpdateDeviceCloneState(m MetaContext) (before int, after int, err error)
func UseCITime ¶
func UseCITime(g *GlobalContext) bool
func UserErrorFromStatus ¶ added in v1.0.31
func UserErrorFromStatus(s keybase1.StatusCode) error
func UsernameToUID ¶
UsernameToUID works for users created after "Fri Feb 6 19:33:08 EST 2015", with some exceptions, since we didn't ToLower() for all UIDs
func UsernameToUIDPreserveCase ¶
UsernameToUID works for users created after "Fri Feb 6 19:33:08 EST 2015". Some of them had buggy Username -> UID conversions, in which case we need to hash the original case to recover their UID.
func VerifyMerkleRootAndKBFS ¶
func VerifyMerkleRootAndKBFS(m MetaContext, arg keybase1.VerifyMerkleRootAndKBFSArg) (err error)
func VerifyReverseSig ¶ added in v1.0.27
func VerifyReverseSig(g *GlobalContext, key GenericKey, path string, payload *jsonw.Wrapper, reverseSig string) (err error)
VerifyReverseSig checks reverse signature using the key provided. does not modify `payload`. `path` is the path to the reverse sig spot to null before checking.
func VersionMessage ¶
func VersionMessage(linefn func(string))
func WhitespaceNormalize ¶
func WithLogTagWithValue ¶
Types ¶
type API ¶
type API interface { Get(APIArg) (*APIRes, error) GetDecode(APIArg, APIResponseWrapper) error GetResp(APIArg) (*http.Response, func(), error) Post(APIArg) (*APIRes, error) PostJSON(APIArg) (*APIRes, error) PostDecode(APIArg, APIResponseWrapper) error PostRaw(APIArg, string, io.Reader) (*APIRes, error) Delete(APIArg) (*APIRes, error) }
type APIArg ¶
type APIArg struct { Endpoint string Args HTTPArgs JSONPayload JSONPayload SessionType APISessionType HTTPStatus []int AppStatusCodes []int InitialTimeout time.Duration // optional RetryMultiplier float64 // optional RetryCount int // optional NetContext context.Context MetaContext MetaContext // contains filtered or unexported fields }
func NewAPIArg ¶ added in v1.0.17
NewAPIArg creates a standard APIArg that will result in one API request with the default timeout.
func NewAPIArgWithMetaContext ¶
func NewAPIArgWithMetaContext(m MetaContext, endpoint string) APIArg
func NewAPIArgWithNetContext ¶ added in v1.0.19
func NewRetryAPIArg ¶ added in v1.0.17
NewRetryAPIArg creates an APIArg that will cause the http client to use a much smaller request timeout, but retry the request several times, backing off on the timeout each time.
func (APIArg) GetMetaContext ¶
func (a APIArg) GetMetaContext(g *GlobalContext) MetaContext
type APIContext ¶ added in v1.0.18
type APIContext interface { GetAPI() API GetExternalAPI() ExternalAPI GetServerURI() string }
APIContext defines methods for accessing API server
type APIError ¶
type APINetError ¶
type APINetError struct {
// contains filtered or unexported fields
}
func (APINetError) Error ¶
func (e APINetError) Error() string
func (APINetError) ToStatus ¶
func (e APINetError) ToStatus() (s keybase1.Status)
type APIResponseWrapper ¶
type APIResponseWrapper interface {
GetAppStatus() *AppStatus
}
type APISessionType ¶ added in v1.0.21
type APISessionType int
const ( APISessionTypeNONE APISessionType = 0 APISessionTypeOPTIONAL APISessionType = 1 APISessionTypeREQUIRED APISessionType = 2 )
type APITokener ¶
type APITokener interface {
Tokens() (session, csrf string)
}
type AccountResetError ¶ added in v1.0.27
type AccountResetError struct {
// contains filtered or unexported fields
}
func NewAccountResetError ¶ added in v1.0.27
func NewAccountResetError(uv keybase1.UserVersion, r keybase1.Seqno) AccountResetError
func (AccountResetError) Error ¶ added in v1.0.27
func (e AccountResetError) Error() string
func (AccountResetError) ToStatus ¶ added in v1.0.27
func (e AccountResetError) ToStatus() keybase1.Status
type ActiveDevice ¶ added in v1.0.21
func LoadProvisionalActiveDevice ¶
func LoadProvisionalActiveDevice(m MetaContext, uid keybase1.UID, deviceID keybase1.DeviceID, online bool) (ret *ActiveDevice, err error)
func NewActiveDevice ¶
func NewActiveDevice() *ActiveDevice
func NewActiveDeviceWithDeviceWithKeys ¶
func NewActiveDeviceWithDeviceWithKeys(m MetaContext, uv keybase1.UserVersion, d *DeviceWithKeys) *ActiveDevice
func NewPaperKeyActiveDevice ¶
func NewPaperKeyActiveDevice(m MetaContext, uv keybase1.UserVersion, d *DeviceWithKeys) *ActiveDevice
func NewProvisionalActiveDevice ¶
func NewProvisionalActiveDevice(m MetaContext, uv keybase1.UserVersion, d keybase1.DeviceID, sigKey GenericKey, encKey GenericKey, deviceName string) *ActiveDevice
NewProvisionalActiveDevice creates an ActiveDevice that is "provisional", in that it should not be considered the global ActiveDevice. Instead, it should reside in thread-local context, and can be weaved through the login machinery without trampling the actual global ActiveDevice.
func (*ActiveDevice) AllFields ¶ added in v1.0.21
func (a *ActiveDevice) AllFields() (uv keybase1.UserVersion, deviceID keybase1.DeviceID, deviceName string, sigKey GenericKey, encKey GenericKey)
AllFields returns all the ActiveDevice fields via one lock for consistency. Safe for use by concurrent goroutines.
func (*ActiveDevice) CachePaperKey ¶
func (a *ActiveDevice) CachePaperKey(m MetaContext, k *DeviceWithKeys)
func (*ActiveDevice) CachePassphraseStream ¶
func (a *ActiveDevice) CachePassphraseStream(c *PassphraseStreamCache)
func (*ActiveDevice) CheckForUsername ¶
func (a *ActiveDevice) CheckForUsername(m MetaContext, n NormalizedUsername) (err error)
func (*ActiveDevice) Clear ¶ added in v1.0.48
func (a *ActiveDevice) Clear() error
func (*ActiveDevice) ClearCaches ¶
func (a *ActiveDevice) ClearCaches()
func (*ActiveDevice) ClearPaperKey ¶
func (a *ActiveDevice) ClearPaperKey(m MetaContext)
func (*ActiveDevice) ClearPassphraseStreamCache ¶
func (a *ActiveDevice) ClearPassphraseStreamCache()
func (*ActiveDevice) Copy ¶
func (a *ActiveDevice) Copy(m MetaContext, src *ActiveDevice) error
Copy ActiveDevice info from the given ActiveDevice.
func (*ActiveDevice) CopyCacheToLoginContextIfForUserVersion ¶
func (a *ActiveDevice) CopyCacheToLoginContextIfForUserVersion(m MetaContext, lc LoginContext, uv keybase1.UserVersion) (err error)
func (*ActiveDevice) DeviceID ¶ added in v1.0.21
func (a *ActiveDevice) DeviceID() keybase1.DeviceID
DeviceID returns the device ID that was provided when the device keys were cached. Safe for use by concurrent goroutines.
func (*ActiveDevice) Dump ¶
func (a *ActiveDevice) Dump(m MetaContext, prefix string)
func (*ActiveDevice) EncryptionKey ¶ added in v1.0.21
func (a *ActiveDevice) EncryptionKey() (GenericKey, error)
EncryptionKey returns the encryption key for the active device. Safe for use by concurrent goroutines.
func (*ActiveDevice) GetUsernameAndUserVersionIfValid ¶
func (a *ActiveDevice) GetUsernameAndUserVersionIfValid(m MetaContext) (uv keybase1.UserVersion, un NormalizedUsername)
func (*ActiveDevice) HaveKeys ¶ added in v1.0.22
func (a *ActiveDevice) HaveKeys() bool
func (*ActiveDevice) IsValidFor ¶ added in v1.0.48
func (*ActiveDevice) KeyByType ¶ added in v1.0.21
func (a *ActiveDevice) KeyByType(t SecretKeyType) (GenericKey, error)
KeyByType returns a cached key based on SecretKeyType. Safe for use by concurrent goroutines.
func (*ActiveDevice) Keyring ¶
func (a *ActiveDevice) Keyring(m MetaContext) (ret *SKBKeyringFile, err error)
func (*ActiveDevice) NIST ¶ added in v1.0.48
func (a *ActiveDevice) NIST(ctx context.Context) (*NIST, error)
func (*ActiveDevice) NISTAndUID ¶ added in v1.0.48
func (*ActiveDevice) NaclEncryptionKey ¶
func (a *ActiveDevice) NaclEncryptionKey() (*NaclDHKeyPair, error)
NaclEncryptionKey returns the encryption key for the active device, as a NaclDHKeyPair. If the cast fails (though that should never happen), it returns an error.
func (*ActiveDevice) Name ¶ added in v1.0.22
func (a *ActiveDevice) Name() string
func (*ActiveDevice) PaperKey ¶
func (a *ActiveDevice) PaperKey(m MetaContext) *DeviceWithKeys
func (*ActiveDevice) PaperKeyWrapper ¶
func (a *ActiveDevice) PaperKeyWrapper(m MetaContext) *SelfDestructingDeviceWithKeys
func (*ActiveDevice) PassphraseStream ¶
func (a *ActiveDevice) PassphraseStream() *PassphraseStream
func (*ActiveDevice) PassphraseStreamCache ¶
func (a *ActiveDevice) PassphraseStreamCache() *PassphraseStreamCache
func (*ActiveDevice) SecretPromptCancelTimer ¶
func (a *ActiveDevice) SecretPromptCancelTimer() *CancelTimer
func (*ActiveDevice) Set ¶ added in v1.0.48
func (a *ActiveDevice) Set(m MetaContext, uv keybase1.UserVersion, deviceID keybase1.DeviceID, sigKey, encKey GenericKey, deviceName string) error
Set acquires the write lock and sets all the fields in ActiveDevice. The acct parameter is not used for anything except to help ensure that this is called from inside a LogingState account request.
func (*ActiveDevice) SetOrClear ¶
func (a *ActiveDevice) SetOrClear(m MetaContext, a2 *ActiveDevice) error
func (*ActiveDevice) SigningKey ¶ added in v1.0.21
func (a *ActiveDevice) SigningKey() (GenericKey, error)
SigningKey returns the signing key for the active device. Safe for use by concurrent goroutines.
func (*ActiveDevice) SigningKeyForUID ¶
func (a *ActiveDevice) SigningKeyForUID(u keybase1.UID) GenericKey
func (*ActiveDevice) SyncSecrets ¶
func (a *ActiveDevice) SyncSecrets(m MetaContext) (ret *SecretSyncer, err error)
func (*ActiveDevice) SyncSecretsForUID ¶
func (a *ActiveDevice) SyncSecretsForUID(m MetaContext, u keybase1.UID, force bool) (ret *SecretSyncer, err error)
func (*ActiveDevice) SyncSecretsForce ¶
func (a *ActiveDevice) SyncSecretsForce(m MetaContext) (ret *SecretSyncer, err error)
func (*ActiveDevice) TriplesecAndGeneration ¶
func (a *ActiveDevice) TriplesecAndGeneration() (Triplesec, PassphraseGeneration)
func (*ActiveDevice) UID ¶ added in v1.0.21
func (a *ActiveDevice) UID() keybase1.UID
UID returns the user ID that was provided when the device keys were cached. Safe for use by concurrent goroutines.
func (*ActiveDevice) UserVersion ¶
func (a *ActiveDevice) UserVersion() keybase1.UserVersion
func (*ActiveDevice) Username ¶
func (a *ActiveDevice) Username(m MetaContext) NormalizedUsername
Username tries to get the active user's username by looking into the current environment and mapping an UID to a username based on our config file. It won't work halfway through a provisioning.
func (*ActiveDevice) Valid ¶ added in v1.0.27
func (a *ActiveDevice) Valid() bool
type AggSigProducer ¶ added in v1.0.27
type AggSigProducer func() (JSONPayload, error)
When run produces a map which goes into the 'key/multi' 'sigs' list.
type AlreadyRegisteredError ¶
func (AlreadyRegisteredError) Error ¶
func (u AlreadyRegisteredError) Error() string
type AppConfig ¶
type AppConfig struct { NullConfiguration HomeDir string LogFile string RunMode RunMode Debug bool LocalRPCDebug string ServerURI string VDebugSetting string SecurityAccessGroupOverride bool ChatInboxSourceLocalizeThreads int }
func (AppConfig) GetAppType ¶ added in v1.0.21
func (AppConfig) GetChatInboxSourceLocalizeThreads ¶ added in v1.0.34
func (AppConfig) GetLevelDBNumFiles ¶ added in v1.0.41
Default is 500, compacted size of each file is 2MB, so turning this down on mobile to reduce mem usage.
func (AppConfig) GetLinkCacheSize ¶ added in v1.0.41
Default is 4000. Turning down on mobile to reduce memory usage.
func (AppConfig) GetLocalRPCDebug ¶
func (AppConfig) GetLogFile ¶ added in v1.0.17
func (AppConfig) GetRunMode ¶
func (AppConfig) GetSecurityAccessGroupOverride ¶
func (AppConfig) GetServerURI ¶
func (AppConfig) GetSlowGregorConn ¶ added in v1.0.46
func (AppConfig) GetVDebugSetting ¶ added in v1.0.29
type AppState ¶ added in v1.0.27
type AppState struct { Contextified sync.Mutex // contains filtered or unexported fields }
AppState tracks the state of foreground/background status of the app in which the service is running in.
func NewAppState ¶ added in v1.0.27
func NewAppState(g *GlobalContext) *AppState
NewAppState returns a new AppState
func (*AppState) NextUpdate ¶ added in v1.0.27
NextUpdate returns a channel that triggers when the app state changes
type AppStatusEmbed ¶ added in v1.0.48
type AppStatusEmbed struct {
Status AppStatus `json:"status"`
}
func (*AppStatusEmbed) GetAppStatus ¶ added in v1.0.48
func (s *AppStatusEmbed) GetAppStatus() *AppStatus
type AppStatusError ¶
func NewAppStatusError ¶
func NewAppStatusError(ast *AppStatus) AppStatusError
func (AppStatusError) Error ¶
func (a AppStatusError) Error() string
func (AppStatusError) IsBadField ¶
func (a AppStatusError) IsBadField(s string) bool
func (AppStatusError) ToStatus ¶
func (a AppStatusError) ToStatus() keybase1.Status
type ApplyFn ¶
type ApplyFn func(i ConnectionID, xp rpc.Transporter) bool
ApplyFn can be applied to every connection. It is called with the RPC transporter, and also the connectionID. It should return a bool true to keep going and false to stop.
type AssertionAnd ¶
type AssertionAnd struct {
// contains filtered or unexported fields
}
func NewAssertionAnd ¶
func NewAssertionAnd(left, right AssertionExpression) AssertionAnd
func (AssertionAnd) CollectUrls ¶
func (a AssertionAnd) CollectUrls(v []AssertionURL) []AssertionURL
func (AssertionAnd) HasFactor ¶
func (a AssertionAnd) HasFactor(pf Proof) bool
func (AssertionAnd) HasOr ¶
func (a AssertionAnd) HasOr() bool
func (AssertionAnd) Len ¶
func (a AssertionAnd) Len() int
func (AssertionAnd) MatchSet ¶
func (a AssertionAnd) MatchSet(ps ProofSet) bool
func (AssertionAnd) NeedsParens ¶ added in v1.0.17
func (a AssertionAnd) NeedsParens() bool
func (AssertionAnd) String ¶
func (a AssertionAnd) String() string
func (AssertionAnd) ToSocialAssertion ¶ added in v1.0.30
func (a AssertionAnd) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
type AssertionContext ¶ added in v1.0.18
type AssertionContext interface {
NormalizeSocialName(service string, username string) (string, error)
}
func MakeAssertionContext ¶ added in v1.0.18
func MakeAssertionContext(s ExternalServicesCollector) AssertionContext
type AssertionDNS ¶
type AssertionDNS struct{ AssertionURLBase }
func (AssertionDNS) CheckAndNormalize ¶ added in v1.0.17
func (a AssertionDNS) CheckAndNormalize(_ AssertionContext) (AssertionURL, error)
func (AssertionDNS) CollectUrls ¶
func (a AssertionDNS) CollectUrls(v []AssertionURL) []AssertionURL
func (AssertionDNS) IsRemote ¶ added in v1.0.17
func (a AssertionDNS) IsRemote() bool
func (AssertionDNS) MatchSet ¶
func (a AssertionDNS) MatchSet(ps ProofSet) bool
func (AssertionDNS) ToLookup ¶
func (a AssertionDNS) ToLookup() (key, value string, err error)
func (AssertionDNS) ToSocialAssertion ¶ added in v1.0.30
func (a AssertionDNS) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
type AssertionExpression ¶
type AssertionExpression interface { String() string MatchSet(ps ProofSet) bool HasOr() bool NeedsParens() bool CollectUrls([]AssertionURL) []AssertionURL ToSocialAssertion() (keybase1.SocialAssertion, error) }
func AssertionParse ¶
func AssertionParse(ctx AssertionContext, s string) (AssertionExpression, error)
func AssertionParseAndOnly ¶
func AssertionParseAndOnly(ctx AssertionContext, s string) (AssertionExpression, error)
func ParseAssertionList ¶ added in v1.0.30
func ParseAssertionList(ctx AssertionContext, assertionsStr string) (res []AssertionExpression, err error)
Parse a string into one or more assertions. Only AND assertions are allowed within each part. like "alice,bob&&bob@twitter"
func ParseAssertionsWithReaders ¶ added in v1.0.30
func ParseAssertionsWithReaders(ctx AssertionContext, assertions string) (writers, readers []AssertionExpression, err error)
Parse an assertion list like "alice,bob&&bob@twitter#char" OR nodes are not allowed (asides from the commas)
type AssertionFingerprint ¶
type AssertionFingerprint struct{ AssertionURLBase }
func (AssertionFingerprint) CheckAndNormalize ¶ added in v1.0.17
func (a AssertionFingerprint) CheckAndNormalize(_ AssertionContext) (AssertionURL, error)
func (AssertionFingerprint) CollectUrls ¶
func (a AssertionFingerprint) CollectUrls(v []AssertionURL) []AssertionURL
func (AssertionFingerprint) IsFingerprint ¶
func (a AssertionFingerprint) IsFingerprint() bool
func (AssertionFingerprint) MatchProof ¶
func (a AssertionFingerprint) MatchProof(proof Proof) bool
Fingerprint matching is on the suffixes. If the assertion matches any suffix of the proof, then we're OK
func (AssertionFingerprint) MatchSet ¶
func (a AssertionFingerprint) MatchSet(ps ProofSet) bool
func (AssertionFingerprint) ToLookup ¶
func (a AssertionFingerprint) ToLookup() (key, value string, err error)
func (AssertionFingerprint) ToSocialAssertion ¶ added in v1.0.30
func (a AssertionFingerprint) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
type AssertionHTTP ¶
type AssertionHTTP struct{ AssertionURLBase }
func (AssertionHTTP) CheckAndNormalize ¶ added in v1.0.17
func (a AssertionHTTP) CheckAndNormalize(_ AssertionContext) (AssertionURL, error)
func (AssertionHTTP) CollectUrls ¶
func (a AssertionHTTP) CollectUrls(v []AssertionURL) []AssertionURL
func (AssertionHTTP) IsRemote ¶
func (a AssertionHTTP) IsRemote() bool
func (AssertionHTTP) Keys ¶
func (a AssertionHTTP) Keys() []string
func (AssertionHTTP) MatchSet ¶
func (a AssertionHTTP) MatchSet(ps ProofSet) bool
func (AssertionHTTP) ToLookup ¶
func (a AssertionHTTP) ToLookup() (key, value string, err error)
func (AssertionHTTP) ToSocialAssertion ¶ added in v1.0.30
func (a AssertionHTTP) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
type AssertionHTTPS ¶
type AssertionHTTPS struct{ AssertionURLBase }
func (AssertionHTTPS) CheckAndNormalize ¶ added in v1.0.17
func (a AssertionHTTPS) CheckAndNormalize(_ AssertionContext) (AssertionURL, error)
func (AssertionHTTPS) CollectUrls ¶
func (a AssertionHTTPS) CollectUrls(v []AssertionURL) []AssertionURL
func (AssertionHTTPS) IsRemote ¶
func (a AssertionHTTPS) IsRemote() bool
func (AssertionHTTPS) MatchSet ¶
func (a AssertionHTTPS) MatchSet(ps ProofSet) bool
func (AssertionHTTPS) ToLookup ¶
func (a AssertionHTTPS) ToLookup() (key, value string, err error)
func (AssertionHTTPS) ToSocialAssertion ¶ added in v1.0.30
func (a AssertionHTTPS) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
type AssertionKeybase ¶
type AssertionKeybase struct{ AssertionURLBase }
func NewAssertionKeybaseUsername ¶ added in v1.0.30
func NewAssertionKeybaseUsername(username string) AssertionKeybase
func (AssertionKeybase) CheckAndNormalize ¶ added in v1.0.17
func (a AssertionKeybase) CheckAndNormalize(_ AssertionContext) (AssertionURL, error)
func (AssertionKeybase) CollectUrls ¶
func (a AssertionKeybase) CollectUrls(v []AssertionURL) []AssertionURL
func (AssertionKeybase) IsKeybase ¶
func (a AssertionKeybase) IsKeybase() bool
func (AssertionKeybase) MatchSet ¶
func (a AssertionKeybase) MatchSet(ps ProofSet) bool
func (AssertionKeybase) String ¶ added in v1.0.17
func (a AssertionKeybase) String() string
func (AssertionKeybase) ToLookup ¶
func (a AssertionKeybase) ToLookup() (key, value string, err error)
func (AssertionKeybase) ToSocialAssertion ¶ added in v1.0.30
func (a AssertionKeybase) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
type AssertionOr ¶
type AssertionOr struct {
// contains filtered or unexported fields
}
func NewAssertionOr ¶
func NewAssertionOr(left, right AssertionExpression, symbol string) AssertionOr
func (AssertionOr) CollectUrls ¶
func (a AssertionOr) CollectUrls(v []AssertionURL) []AssertionURL
func (AssertionOr) HasOr ¶
func (a AssertionOr) HasOr() bool
func (AssertionOr) MatchSet ¶
func (a AssertionOr) MatchSet(ps ProofSet) bool
func (AssertionOr) NeedsParens ¶ added in v1.0.17
func (a AssertionOr) NeedsParens() bool
func (AssertionOr) String ¶
func (a AssertionOr) String() string
func (AssertionOr) ToSocialAssertion ¶ added in v1.0.30
func (a AssertionOr) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
type AssertionParseError ¶
type AssertionParseError struct {
// contains filtered or unexported fields
}
func NewAssertionParseError ¶
func NewAssertionParseError(s string, a ...interface{}) AssertionParseError
func NewNeedInputError ¶
func NewNeedInputError(s string, a ...interface{}) AssertionParseError
func (AssertionParseError) Error ¶
func (e AssertionParseError) Error() string
type AssertionSocial ¶
type AssertionSocial struct{ AssertionURLBase }
func (AssertionSocial) CheckAndNormalize ¶ added in v1.0.17
func (a AssertionSocial) CheckAndNormalize(ctx AssertionContext) (AssertionURL, error)
func (AssertionSocial) CollectUrls ¶
func (a AssertionSocial) CollectUrls(v []AssertionURL) []AssertionURL
func (AssertionSocial) GetValue ¶ added in v1.0.17
func (a AssertionSocial) GetValue() string
func (AssertionSocial) IsRemote ¶
func (a AssertionSocial) IsRemote() bool
func (AssertionSocial) IsSocial ¶
func (a AssertionSocial) IsSocial() bool
func (AssertionSocial) MatchSet ¶
func (a AssertionSocial) MatchSet(ps ProofSet) bool
func (AssertionSocial) ToLookup ¶
func (a AssertionSocial) ToLookup() (key, value string, err error)
func (AssertionSocial) ToSocialAssertion ¶ added in v1.0.30
func (a AssertionSocial) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
type AssertionTeamID ¶ added in v1.0.27
type AssertionTeamID struct { AssertionURLBase // contains filtered or unexported fields }
func (AssertionTeamID) CheckAndNormalize ¶ added in v1.0.27
func (a AssertionTeamID) CheckAndNormalize(_ AssertionContext) (AssertionURL, error)
func (AssertionTeamID) CollectUrls ¶ added in v1.0.27
func (a AssertionTeamID) CollectUrls(v []AssertionURL) []AssertionURL
func (AssertionTeamID) IsTeamID ¶ added in v1.0.27
func (a AssertionTeamID) IsTeamID() bool
func (AssertionTeamID) MatchSet ¶ added in v1.0.27
func (a AssertionTeamID) MatchSet(ps ProofSet) bool
func (AssertionTeamID) ToLookup ¶ added in v1.0.27
func (a AssertionTeamID) ToLookup() (key, value string, err error)
func (AssertionTeamID) ToSocialAssertion ¶ added in v1.0.30
func (a AssertionTeamID) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
func (AssertionTeamID) ToTeamID ¶ added in v1.0.27
func (a AssertionTeamID) ToTeamID() keybase1.TeamID
type AssertionTeamName ¶ added in v1.0.27
type AssertionTeamName struct { AssertionURLBase // contains filtered or unexported fields }
func (AssertionTeamName) CheckAndNormalize ¶ added in v1.0.27
func (a AssertionTeamName) CheckAndNormalize(_ AssertionContext) (AssertionURL, error)
func (AssertionTeamName) CollectUrls ¶ added in v1.0.27
func (a AssertionTeamName) CollectUrls(v []AssertionURL) []AssertionURL
func (AssertionTeamName) IsTeamName ¶ added in v1.0.27
func (a AssertionTeamName) IsTeamName() bool
func (AssertionTeamName) MatchSet ¶ added in v1.0.27
func (a AssertionTeamName) MatchSet(ps ProofSet) bool
func (AssertionTeamName) ToLookup ¶ added in v1.0.27
func (a AssertionTeamName) ToLookup() (key, value string, err error)
func (AssertionTeamName) ToSocialAssertion ¶ added in v1.0.30
func (a AssertionTeamName) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
func (AssertionTeamName) ToTeamName ¶ added in v1.0.27
func (a AssertionTeamName) ToTeamName() keybase1.TeamName
type AssertionUID ¶
type AssertionUID struct { AssertionURLBase // contains filtered or unexported fields }
func (AssertionUID) CheckAndNormalize ¶ added in v1.0.17
func (a AssertionUID) CheckAndNormalize(_ AssertionContext) (AssertionURL, error)
func (AssertionUID) CollectUrls ¶
func (a AssertionUID) CollectUrls(v []AssertionURL) []AssertionURL
func (AssertionUID) IsUID ¶
func (a AssertionUID) IsUID() bool
func (AssertionUID) MatchSet ¶
func (a AssertionUID) MatchSet(ps ProofSet) bool
func (AssertionUID) ToLookup ¶
func (a AssertionUID) ToLookup() (key, value string, err error)
func (AssertionUID) ToSocialAssertion ¶ added in v1.0.30
func (a AssertionUID) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
func (AssertionUID) ToUID ¶
func (a AssertionUID) ToUID() keybase1.UID
type AssertionURL ¶
type AssertionURL interface { AssertionExpression Keys() []string CheckAndNormalize(ctx AssertionContext) (AssertionURL, error) IsKeybase() bool IsUID() bool ToUID() keybase1.UID IsTeamID() bool IsTeamName() bool ToTeamID() keybase1.TeamID ToTeamName() keybase1.TeamName IsSocial() bool IsRemote() bool IsFingerprint() bool MatchProof(p Proof) bool ToKeyValuePair() (string, string) CacheKey() string GetValue() string GetKey() string ToLookup() (string, string, error) }
func FindBestIdentifyComponentURL ¶
func FindBestIdentifyComponentURL(e AssertionExpression) AssertionURL
func ParseAssertionURL ¶
func ParseAssertionURL(ctx AssertionContext, s string, strict bool) (ret AssertionURL, err error)
func ParseAssertionURLKeyValue ¶
func ParseAssertionURLKeyValue(ctx AssertionContext, key string, val string, strict bool) (ret AssertionURL, err error)
type AssertionURLBase ¶
type AssertionURLBase struct {
Key, Value string
}
func (AssertionURLBase) CacheKey ¶
func (b AssertionURLBase) CacheKey() string
func (AssertionURLBase) GetKey ¶ added in v1.0.17
func (b AssertionURLBase) GetKey() string
func (AssertionURLBase) GetValue ¶
func (b AssertionURLBase) GetValue() string
func (AssertionURLBase) HasOr ¶
func (b AssertionURLBase) HasOr() bool
func (AssertionURLBase) IsFingerprint ¶
func (b AssertionURLBase) IsFingerprint() bool
func (AssertionURLBase) IsKeybase ¶
func (b AssertionURLBase) IsKeybase() bool
func (AssertionURLBase) IsRemote ¶
func (b AssertionURLBase) IsRemote() bool
func (AssertionURLBase) IsSocial ¶
func (b AssertionURLBase) IsSocial() bool
func (AssertionURLBase) IsTeamID ¶ added in v1.0.27
func (b AssertionURLBase) IsTeamID() bool
func (AssertionURLBase) IsTeamName ¶ added in v1.0.27
func (b AssertionURLBase) IsTeamName() bool
func (AssertionURLBase) IsUID ¶
func (b AssertionURLBase) IsUID() bool
func (AssertionURLBase) Keys ¶
func (b AssertionURLBase) Keys() []string
func (AssertionURLBase) MatchProof ¶
func (b AssertionURLBase) MatchProof(proof Proof) bool
func (AssertionURLBase) NeedsParens ¶ added in v1.0.17
func (b AssertionURLBase) NeedsParens() bool
func (AssertionURLBase) String ¶
func (b AssertionURLBase) String() string
func (AssertionURLBase) ToKeyValuePair ¶
func (b AssertionURLBase) ToKeyValuePair() (string, string)
func (AssertionURLBase) ToSocialAssertionHelper ¶ added in v1.0.30
func (b AssertionURLBase) ToSocialAssertionHelper() (sa keybase1.SocialAssertion, err error)
func (AssertionURLBase) ToTeamID ¶ added in v1.0.27
func (b AssertionURLBase) ToTeamID() (ret keybase1.TeamID)
func (AssertionURLBase) ToTeamName ¶ added in v1.0.27
func (b AssertionURLBase) ToTeamName() (ret keybase1.TeamName)
func (AssertionURLBase) ToUID ¶
func (b AssertionURLBase) ToUID() (ret keybase1.UID)
type AssertionWeb ¶
type AssertionWeb struct{ AssertionURLBase }
func (AssertionWeb) CheckAndNormalize ¶ added in v1.0.17
func (a AssertionWeb) CheckAndNormalize(_ AssertionContext) (AssertionURL, error)
func (AssertionWeb) CollectUrls ¶
func (a AssertionWeb) CollectUrls(v []AssertionURL) []AssertionURL
func (AssertionWeb) IsRemote ¶
func (a AssertionWeb) IsRemote() bool
func (AssertionWeb) Keys ¶
func (a AssertionWeb) Keys() []string
func (AssertionWeb) MatchSet ¶
func (a AssertionWeb) MatchSet(ps ProofSet) bool
func (AssertionWeb) ToLookup ¶
func (a AssertionWeb) ToLookup() (key, value string, err error)
func (AssertionWeb) ToSocialAssertion ¶ added in v1.0.30
func (a AssertionWeb) ToSocialAssertion() (sa keybase1.SocialAssertion, err error)
type BackoffPolicy ¶ added in v1.0.18
type BackoffPolicy struct {
Millis []int
}
BackoffPolicy implements a backoff policy, randomizing its delays and saturating at the final value in Millis.
type BadEmailError ¶ added in v1.0.18
type BadEmailError struct {
Msg string
}
func (BadEmailError) Error ¶ added in v1.0.18
func (e BadEmailError) Error() string
func (BadEmailError) ToStatus ¶ added in v1.0.18
func (e BadEmailError) ToStatus() keybase1.Status
type BadFingerprintError ¶
type BadFingerprintError struct {
// contains filtered or unexported fields
}
func (BadFingerprintError) Error ¶
func (b BadFingerprintError) Error() string
type BadInvitationCodeError ¶
type BadInvitationCodeError struct{}
func (BadInvitationCodeError) Error ¶
func (e BadInvitationCodeError) Error() string
func (BadInvitationCodeError) ToStatus ¶
func (e BadInvitationCodeError) ToStatus(s keybase1.Status)
type BadKeyError ¶
type BadKeyError struct {
Msg string
}
func (BadKeyError) Error ¶
func (p BadKeyError) Error() string
type BadNameError ¶
type BadNameError string
func (BadNameError) Error ¶
func (e BadNameError) Error() string
type BadRevocationError ¶
type BadRevocationError struct {
// contains filtered or unexported fields
}
func (BadRevocationError) Error ¶
func (e BadRevocationError) Error() string
type BadServiceError ¶
type BadServiceError struct {
Service string
}
func (BadServiceError) Error ¶
func (e BadServiceError) Error() string
type BadSessionError ¶ added in v1.0.27
type BadSessionError struct {
Desc string
}
func (BadSessionError) Error ¶ added in v1.0.27
func (e BadSessionError) Error() string
func (BadSessionError) ToStatus ¶ added in v1.0.27
func (e BadSessionError) ToStatus() (s keybase1.Status)
type BadSigError ¶
type BadSigError struct {
E string
}
func (BadSigError) Error ¶
func (e BadSigError) Error() string
type BadSignaturePrefixError ¶ added in v1.0.18
type BadSignaturePrefixError struct{}
func (BadSignaturePrefixError) Error ¶ added in v1.0.18
func (e BadSignaturePrefixError) Error() string
type BadUsernameError ¶
type BadUsernameError struct { N string // contains filtered or unexported fields }
func NewBadUsernameError ¶ added in v1.0.18
func NewBadUsernameError(n string) BadUsernameError
func NewBadUsernameErrorWithFullMessage ¶ added in v1.0.29
func NewBadUsernameErrorWithFullMessage(format string, args ...interface{}) BadUsernameError
func (BadUsernameError) Error ¶
func (e BadUsernameError) Error() string
type Base64Finder ¶
type Base64Finder struct {
// contains filtered or unexported fields
}
func NewBase64Finder ¶
func NewBase64Finder(i string) *Base64Finder
func (*Base64Finder) Run ¶
func (s *Base64Finder) Run() []string
type BaseAPIEngine ¶
type BaseAPIEngine struct { Contextified // contains filtered or unexported fields }
Shared code across Internal and External APIs
func (*BaseAPIEngine) PrepareGet ¶
func (*BaseAPIEngine) PrepareMethodWithBody ¶ added in v1.0.22
type BaseServiceType ¶
type BaseServiceType struct{}
func (BaseServiceType) BaseAllStringKeys ¶
func (t BaseServiceType) BaseAllStringKeys(st ServiceType) []string
func (BaseServiceType) BaseCheckProofForURL ¶
func (t BaseServiceType) BaseCheckProofForURL(text string, id keybase1.SigID) (err error)
func (BaseServiceType) BaseCheckProofTextFull ¶
func (BaseServiceType) BaseCheckProofTextShort ¶
func (BaseServiceType) BaseGetProofType ¶
func (t BaseServiceType) BaseGetProofType(st ServiceType) string
func (BaseServiceType) BaseRecheckProofPosting ¶
func (t BaseServiceType) BaseRecheckProofPosting(tryNumber int, status keybase1.ProofStatus) (warning *Markup, err error)
func (BaseServiceType) BaseToServiceJSON ¶
func (t BaseServiceType) BaseToServiceJSON(st ServiceType, un string) *jsonw.Wrapper
func (BaseServiceType) FormatProofText ¶
func (t BaseServiceType) FormatProofText(m MetaContext, ppr *PostProofRes) (string, error)
func (BaseServiceType) GetAPIArgKey ¶
func (t BaseServiceType) GetAPIArgKey() string
func (BaseServiceType) IsDevelOnly ¶ added in v1.0.18
func (t BaseServiceType) IsDevelOnly() bool
func (BaseServiceType) LastWriterWins ¶
func (t BaseServiceType) LastWriterWins() bool
func (BaseServiceType) PreProofCheck ¶
func (t BaseServiceType) PreProofCheck(MetaContext, string) (*Markup, error)
func (BaseServiceType) PreProofWarning ¶
func (t BaseServiceType) PreProofWarning(remotename string) *Markup
type BgTicker ¶ added in v1.0.48
func NewBgTicker ¶ added in v1.0.48
NewBgTicker will panic if wait > duration as time.Ticker does with a negative duration.
func NewBgTickerWithWait ¶ added in v1.0.48
type BucketDict ¶
type BucketDict struct {
// contains filtered or unexported fields
}
func NewBuckDict ¶
func NewBuckDict() *BucketDict
func (*BucketDict) Add ¶
func (bd *BucketDict) Add(k string, v *GpgPrimaryKey)
func (BucketDict) Get ¶
func (bd BucketDict) Get(k string) []*GpgPrimaryKey
func (BucketDict) Get0Or1 ¶
func (bd BucketDict) Get0Or1(k string) (ret *GpgPrimaryKey, err error)
type BufferCloser ¶
BufferCloser is a Buffer that satisfies the io.Closer interface.
func NewBufferCloser ¶
func NewBufferCloser() *BufferCloser
func (*BufferCloser) Close ¶
func (b *BufferCloser) Close() error
type BurstCache ¶ added in v1.0.48
type BurstCache struct { Contextified // contains filtered or unexported fields }
BurstCachce is an LRU+SingleFlighter useful for absorbing short-lived bursts of lookups. If multiple goroutines are fetching resource A, they all will block on the first fetch, and can (if the fetch returns without error) share the answer of the first request.
func NewBurstCache ¶ added in v1.0.48
func NewBurstCache(g *GlobalContext, cacheSize int, cacheLife time.Duration, cacheName string) *BurstCache
NewBurstCache makes a new burst cache with the given size and cacheLife. The cache will be at most cacheSize items long, and items will live in there for at most cacheLife duration. For debug logging purposes, this cache will be known as cacheName.
func (*BurstCache) Load ¶ added in v1.0.48
func (b *BurstCache) Load(ctx context.Context, key BurstCacheKey, loader BurstCacheLoader) (ret interface{}, err error)
Load item key from the burst cache. On a cache miss, load with the given loader function. Return the object as an interface{}, so the caller needs to cast out of this burst cache.
type BurstCacheKey ¶ added in v1.0.48
type BurstCacheKey interface {
String() string
}
BurstCacheKey is a key for a burst cache resource. Needs to implement the one method --- String() --- used for turning the key into an LRU and LockTab key.
type BurstCacheLoader ¶ added in v1.0.48
type BurstCacheLoader func() (obj interface{}, err error)
BurstCacherLoader is a function that loads an item (from network or whatnot). On success, its result will be cached into the burst cache. Maps a key to an object as an interface{}. The caller to Load() should wrap into the closure all parameters needed to actually fetch the object. They called Load(), so they likely have them handy.
type CachedFullSelf ¶ added in v1.0.19
type CachedFullSelf struct { Contextified sync.Mutex TestDeadlocker func() // contains filtered or unexported fields }
CachedFullSelf caches a full-on *User for the "me" or "self" user. Because it's a full-on *User, it contains many pointers and can't reasonably be deep-copied. So we're going to insist that access to the cached user is protected inside a lock.
func NewCachedFullSelf ¶ added in v1.0.19
func NewCachedFullSelf(g *GlobalContext) *CachedFullSelf
NewCachedFullSelf makes a new full self cacher in the given GlobalContext
func (*CachedFullSelf) HandleUserChanged ¶ added in v1.0.19
func (m *CachedFullSelf) HandleUserChanged(u keybase1.UID) error
HandleUserChanged clears the cached self user if it's the UID of the self user.
func (*CachedFullSelf) New ¶ added in v1.0.47
func (m *CachedFullSelf) New() FullSelfer
func (*CachedFullSelf) OnLogin ¶ added in v1.0.19
func (m *CachedFullSelf) OnLogin() error
OnLogin clears the cached self user if it differs from what's already cached.
func (*CachedFullSelf) Update ¶ added in v1.0.19
func (m *CachedFullSelf) Update(ctx context.Context, u *User) (err error)
Update updates the CachedFullSelf with a User loaded from someplace else -- let's say the UPAK loader. We throw away objects for other users or that aren't newer than the one we have.
CALLER BEWARE! You must only provide this function with a user you know to be "self". This function will not do any checking along those lines (see comment below).
func (*CachedFullSelf) WithSelf ¶ added in v1.0.19
WithSelf loads only the self user, and maybe hits the cache. It takes a closure, in which the user object is locked and accessible, but we should be sure the user never escapes this closure. If the user is fresh-loaded, then it is stored in memory.
func (*CachedFullSelf) WithSelfForcePoll ¶ added in v1.0.34
WithSelfForcePoll is like WithSelf but forces a poll. I.e., it will always go to the server for a merkle check, regardless of when the existing self was cached.
func (*CachedFullSelf) WithUser ¶ added in v1.0.19
func (m *CachedFullSelf) WithUser(arg LoadUserArg, f func(u *User) error) (err error)
WithUser loads any old user. If it happens to be the self user, then it behaves as in WithSelf. Otherwise, it will just load the user, and throw it out when done. WithUser supports other so that code doesn't need to change if we're doing the operation for the user or someone else.
type CachedUPAKLoader ¶ added in v1.0.19
type CachedUPAKLoader struct { Contextified Freshness time.Duration TestDeadlocker func() // contains filtered or unexported fields }
CachedUPAKLoader is a UPAKLoader implementation that can cache results both in memory and on disk.
func NewCachedUPAKLoader ¶ added in v1.0.19
func NewCachedUPAKLoader(g *GlobalContext, f time.Duration) *CachedUPAKLoader
NewCachedUPAKLoader constructs a new CachedUPAKLoader
func (*CachedUPAKLoader) Batcher ¶
func (u *CachedUPAKLoader) Batcher(ctx context.Context, getArg func(int) *LoadUserArg, processResult func(int, *keybase1.UserPlusKeysV2AllIncarnations), window int) (err error)
Batcher loads a batch of UPAKs with the given window width. It keeps calling getArg(i) with an increasing i, until that getArg return nil, in which case the production of UPAK loads is over. UPAKs will be loaded and fed into processResult() as they come in. Both getArg() and processResult() are called in the same mutex to simplify synchronization.
func (*CachedUPAKLoader) CheckDeviceForUIDAndUsername ¶
func (u *CachedUPAKLoader) CheckDeviceForUIDAndUsername(ctx context.Context, uid keybase1.UID, did keybase1.DeviceID, n NormalizedUsername) (err error)
func (*CachedUPAKLoader) CheckKIDForUID ¶ added in v1.0.19
func (*CachedUPAKLoader) ClearMemory ¶ added in v1.0.19
func (u *CachedUPAKLoader) ClearMemory()
func (*CachedUPAKLoader) Disable ¶ added in v1.0.19
func (u *CachedUPAKLoader) Disable()
func (*CachedUPAKLoader) Invalidate ¶ added in v1.0.19
func (u *CachedUPAKLoader) Invalidate(ctx context.Context, uid keybase1.UID)
func (*CachedUPAKLoader) ListFollowedUIDs ¶ added in v1.0.19
func (*CachedUPAKLoader) Load ¶ added in v1.0.19
func (u *CachedUPAKLoader) Load(arg LoadUserArg) (*keybase1.UserPlusAllKeys, *User, error)
Load a UserPlusKeysV2AllIncarnations from the local cache, falls back to LoadUser, and cache the user. Can only perform lookups by UID. Will return a non-nil UserPlusKeysV2AllIncarnations, or a non-nil error, but never both non-nil, nor never both nil. If we had to do a full LoadUser as part of the request, it's returned too. Convert to UserPlusAllKeys on the way out, for backwards compatibility.
func (*CachedUPAKLoader) LoadDeviceKey ¶ added in v1.0.19
func (u *CachedUPAKLoader) LoadDeviceKey(ctx context.Context, uid keybase1.UID, deviceID keybase1.DeviceID) (upakv1 *keybase1.UserPlusAllKeys, deviceKey *keybase1.PublicKey, revoked *keybase1.RevokedKey, err error)
Load the PublicKey for a user's device from the local cache, falling back to LoadUser, and cache the user. If the user exists but the device doesn't, will force a load in case the device is very new.
func (*CachedUPAKLoader) LoadKeyV2 ¶ added in v1.0.27
func (u *CachedUPAKLoader) LoadKeyV2(ctx context.Context, uid keybase1.UID, kid keybase1.KID) (ret *keybase1.UserPlusKeysV2, key *keybase1.PublicKeyV2NaCl, linkMap map[keybase1.Seqno]keybase1.LinkID, err error)
LoadKeyV2 looks through all incarnations for the user and returns the incarnation with the given KID, as well as the Key data associated with that KID. It picks the latest such incarnation if there are multiple.
func (*CachedUPAKLoader) LoadUPAKWithDeviceID ¶
func (u *CachedUPAKLoader) LoadUPAKWithDeviceID(ctx context.Context, uid keybase1.UID, deviceID keybase1.DeviceID) (*keybase1.UserPlusKeysV2AllIncarnations, error)
If the user exists but the device doesn't, will force a load in case the device is very new.
func (*CachedUPAKLoader) LoadUserPlusKeys ¶ added in v1.0.19
func (u *CachedUPAKLoader) LoadUserPlusKeys(ctx context.Context, uid keybase1.UID, pollForKID keybase1.KID) (keybase1.UserPlusKeys, error)
func (*CachedUPAKLoader) LoadV2 ¶ added in v1.0.27
func (u *CachedUPAKLoader) LoadV2(arg LoadUserArg) (*keybase1.UserPlusKeysV2AllIncarnations, *User, error)
Load a UserPlusKeysV2AllIncarnations from the local cache, falls back to LoadUser, and cache the user. Can only perform lookups by UID. Will return a non-nil UserPlusKeysV2AllIncarnations, or a non-nil error, but never both non-nil, nor never both nil. If we had to do a full LoadUser as part of the request, it's returned too.
func (*CachedUPAKLoader) LoadV2WithKID ¶ added in v1.0.46
func (u *CachedUPAKLoader) LoadV2WithKID(ctx context.Context, uid keybase1.UID, kid keybase1.KID) (*keybase1.UserPlusKeysV2AllIncarnations, error)
func (*CachedUPAKLoader) LookupUID ¶ added in v1.0.27
func (u *CachedUPAKLoader) LookupUID(ctx context.Context, un NormalizedUsername) (keybase1.UID, error)
LookupUID is a verified map of username -> UID. IT calls into the resolver, which gives un untrusted UID, but verifies with the UPAK loader that the mapping UID -> username is correct.
func (*CachedUPAKLoader) LookupUsername ¶ added in v1.0.19
func (u *CachedUPAKLoader) LookupUsername(ctx context.Context, uid keybase1.UID) (NormalizedUsername, error)
LookupUsername uses the UIDMapper to find a username for uid.
func (*CachedUPAKLoader) LookupUsernameAndDevice ¶ added in v1.0.19
func (*CachedUPAKLoader) LookupUsernameUPAK ¶ added in v1.0.34
func (u *CachedUPAKLoader) LookupUsernameUPAK(ctx context.Context, uid keybase1.UID) (NormalizedUsername, error)
LookupUsernameUPAK uses the upak loader to find a username for uid.
func (*CachedUPAKLoader) PutUserToCache ¶ added in v1.0.19
func (u *CachedUPAKLoader) PutUserToCache(ctx context.Context, user *User) error
type CachedUserLoadInfo ¶ added in v1.0.19
type CancelTimer ¶
type CancelTimer struct {
// contains filtered or unexported fields
}
func (*CancelTimer) Reset ¶
func (c *CancelTimer) Reset()
func (*CancelTimer) SetNow ¶
func (c *CancelTimer) SetNow(m MetaContext)
func (*CancelTimer) WasRecentlyCanceled ¶
func (c *CancelTimer) WasRecentlyCanceled(m MetaContext) bool
type CanceledError ¶
type CanceledError struct {
M string
}
func NewCanceledError ¶
func NewCanceledError(m string) CanceledError
func (CanceledError) Error ¶
func (c CanceledError) Error() string
func (CanceledError) ToStatus ¶
func (c CanceledError) ToStatus() (s keybase1.Status)
type ChainLink ¶
type ChainLink struct { Contextified // contains filtered or unexported fields }
func ImportLinkFromServer ¶
func ImportLinkFromStorage ¶
func NewChainLink ¶
func NewChainLink(g *GlobalContext, parent *SigChain, id LinkID) *ChainLink
func (ChainLink) AllowStubbing ¶ added in v1.0.48
func (*ChainLink) CheckNameAndID ¶
func (c *ChainLink) CheckNameAndID(s NormalizedUsername, i keybase1.UID) error
func (*ChainLink) GetFirstAppearedMerkleSeqnoUnverified ¶ added in v1.0.27
func (*ChainLink) GetIgnoreIfSupported ¶ added in v1.0.48
func (c *ChainLink) GetIgnoreIfSupported() SigIgnoreIfUnsupported
func (*ChainLink) GetMerkleHashMeta ¶ added in v1.0.27
func (*ChainLink) GetMerkleSeqno ¶
func (*ChainLink) GetPGPFingerprint ¶
func (c *ChainLink) GetPGPFingerprint() *PGPFingerprint
func (*ChainLink) GetRevocations ¶
func (*ChainLink) GetRevokeKids ¶
func (*ChainLink) GetSigCheckCache ¶
func (c *ChainLink) GetSigCheckCache() (cki *ComputedKeyInfos)
func (*ChainLink) GetSigchainV2Type ¶ added in v1.0.21
func (c *ChainLink) GetSigchainV2Type(ignoreIfUnsupported SigIgnoreIfUnsupported) (SigchainV2Type, error)
func (*ChainLink) GetSigchainV2TypeFromV2Shell ¶ added in v1.0.46
func (c *ChainLink) GetSigchainV2TypeFromV2Shell() (SigchainV2Type, error)
func (*ChainLink) HasRevocations ¶ added in v1.0.21
func (*ChainLink) IsBad ¶
Returns whether or not this chain link is bad, and if so, what the reason is.
func (*ChainLink) IsInCurrentFamily ¶
========================================================================= IsInCurrentFamily checks to see if the given chainlink was signed by a key in the current family.
func (*ChainLink) MatchFingerprint ¶
func (c *ChainLink) MatchFingerprint(fp PGPFingerprint) bool
func (*ChainLink) PutSigCheckCache ¶
func (c *ChainLink) PutSigCheckCache(cki *ComputedKeyInfos)
func (*ChainLink) ToEldestKID ¶
func (ChainLink) ToMerkleTriple ¶
func (c ChainLink) ToMerkleTriple() *MerkleTriple
ToLinkSummary converts a ChainLink into a MerkleTriple object.
func (*ChainLink) ToSigChainLocation ¶ added in v1.0.27
func (c *ChainLink) ToSigChainLocation() keybase1.SigChainLocation
func (*ChainLink) Typed ¶
func (c *ChainLink) Typed() TypedChainLink
func (*ChainLink) UnmarshalPayloadJSON ¶ added in v1.0.41
func (*ChainLink) UnpackComputedKeyInfos ¶
func (*ChainLink) UnpackLocal ¶
func (*ChainLink) VerifyLink ¶
func (*ChainLink) VerifySigWithKeyFamily ¶
func (c *ChainLink) VerifySigWithKeyFamily(ckf ComputedKeyFamily) (err error)
type ChainLinkError ¶
type ChainLinkError struct {
// contains filtered or unexported fields
}
func (ChainLinkError) Error ¶
func (c ChainLinkError) Error() string
type ChainLinkFingerprintMismatchError ¶
type ChainLinkFingerprintMismatchError struct {
Msg string
}
func (ChainLinkFingerprintMismatchError) Error ¶
func (e ChainLinkFingerprintMismatchError) Error() string
type ChainLinkKIDMismatchError ¶
type ChainLinkKIDMismatchError struct {
Msg string
}
func (ChainLinkKIDMismatchError) Error ¶
func (e ChainLinkKIDMismatchError) Error() string
type ChainLinkPrevHashMismatchError ¶
type ChainLinkPrevHashMismatchError struct {
Msg string
}
func (ChainLinkPrevHashMismatchError) Error ¶
func (e ChainLinkPrevHashMismatchError) Error() string
type ChainLinkStubbedUnsupportedError ¶ added in v1.0.48
type ChainLinkStubbedUnsupportedError struct {
// contains filtered or unexported fields
}
func (ChainLinkStubbedUnsupportedError) Error ¶ added in v1.0.48
func (c ChainLinkStubbedUnsupportedError) Error() string
type ChainLinkUnpacked ¶
type ChainLinkUnpacked struct {
// contains filtered or unexported fields
}
func (*ChainLinkUnpacked) HasRevocations ¶ added in v1.0.42
func (tmp *ChainLinkUnpacked) HasRevocations(payload []byte) bool
func (*ChainLinkUnpacked) Payload ¶ added in v1.0.42
func (tmp *ChainLinkUnpacked) Payload() ([]byte, error)
type ChainLinkWrongSeqnoError ¶
type ChainLinkWrongSeqnoError struct {
Msg string
}
func (ChainLinkWrongSeqnoError) Error ¶
func (e ChainLinkWrongSeqnoError) Error() string
type ChainLinks ¶ added in v1.0.27
type ChainLinks []*ChainLink
func (ChainLinks) EldestSeqno ¶ added in v1.0.27
func (c ChainLinks) EldestSeqno() keybase1.Seqno
func (ChainLinks) GetComputedKeyInfos ¶ added in v1.0.27
func (c ChainLinks) GetComputedKeyInfos() (cki *ComputedKeyInfos)
type ChainType ¶
type ChainType struct { DbType ObjType Private bool Encrypted bool GetMerkleTriple func(u *MerkleUserLeaf) *MerkleTriple }
type ChatAlreadyDeletedError ¶ added in v1.0.18
type ChatAlreadyDeletedError struct {
Msg string
}
func (ChatAlreadyDeletedError) Error ¶ added in v1.0.18
func (e ChatAlreadyDeletedError) Error() string
func (ChatAlreadyDeletedError) IsImmediateFail ¶
func (e ChatAlreadyDeletedError) IsImmediateFail() (chat1.OutboxErrorType, bool)
func (ChatAlreadyDeletedError) ToStatus ¶ added in v1.0.18
func (e ChatAlreadyDeletedError) ToStatus() keybase1.Status
type ChatAlreadySupersededError ¶ added in v1.0.18
type ChatAlreadySupersededError struct {
Msg string
}
func (ChatAlreadySupersededError) Error ¶ added in v1.0.18
func (e ChatAlreadySupersededError) Error() string
func (ChatAlreadySupersededError) IsImmediateFail ¶
func (e ChatAlreadySupersededError) IsImmediateFail() (chat1.OutboxErrorType, bool)
func (ChatAlreadySupersededError) ToStatus ¶ added in v1.0.18
func (e ChatAlreadySupersededError) ToStatus() keybase1.Status
type ChatBadMsgError ¶ added in v1.0.18
type ChatBadMsgError struct {
Msg string
}
func (ChatBadMsgError) Error ¶ added in v1.0.18
func (e ChatBadMsgError) Error() string
func (ChatBadMsgError) IsImmediateFail ¶
func (e ChatBadMsgError) IsImmediateFail() (chat1.OutboxErrorType, bool)
func (ChatBadMsgError) ToStatus ¶ added in v1.0.18
func (e ChatBadMsgError) ToStatus() keybase1.Status
type ChatBroadcastError ¶ added in v1.0.18
type ChatBroadcastError struct {
Msg string
}
func (ChatBroadcastError) Error ¶ added in v1.0.18
func (e ChatBroadcastError) Error() string
func (ChatBroadcastError) ToStatus ¶ added in v1.0.18
func (e ChatBroadcastError) ToStatus() keybase1.Status
type ChatClientError ¶ added in v1.0.27
type ChatClientError struct {
Msg string
}
func (ChatClientError) Error ¶ added in v1.0.27
func (e ChatClientError) Error() string
func (ChatClientError) IsImmediateFail ¶
func (e ChatClientError) IsImmediateFail() (chat1.OutboxErrorType, bool)
func (ChatClientError) ToStatus ¶ added in v1.0.27
func (e ChatClientError) ToStatus() keybase1.Status
type ChatCollisionError ¶ added in v1.0.19
type ChatCollisionError struct { }
func (ChatCollisionError) Error ¶ added in v1.0.19
func (e ChatCollisionError) Error() string
func (ChatCollisionError) ToStatus ¶ added in v1.0.19
func (e ChatCollisionError) ToStatus() keybase1.Status
type ChatConvExistsError ¶ added in v1.0.18
type ChatConvExistsError struct {
ConvID chat1.ConversationID
}
func (ChatConvExistsError) Error ¶ added in v1.0.18
func (e ChatConvExistsError) Error() string
func (ChatConvExistsError) ToStatus ¶ added in v1.0.18
func (e ChatConvExistsError) ToStatus() keybase1.Status
type ChatDuplicateMessageError ¶ added in v1.0.27
func (ChatDuplicateMessageError) Error ¶ added in v1.0.27
func (e ChatDuplicateMessageError) Error() string
func (ChatDuplicateMessageError) IsImmediateFail ¶
func (e ChatDuplicateMessageError) IsImmediateFail() (chat1.OutboxErrorType, bool)
func (ChatDuplicateMessageError) ToStatus ¶ added in v1.0.27
func (e ChatDuplicateMessageError) ToStatus() keybase1.Status
type ChatHelper ¶ added in v1.0.34
type ChatHelper interface { SendTextByID(ctx context.Context, convID chat1.ConversationID, trip chat1.ConversationIDTriple, tlfName string, text string) error SendMsgByID(ctx context.Context, convID chat1.ConversationID, trip chat1.ConversationIDTriple, tlfName string, body chat1.MessageBody, msgType chat1.MessageType) error SendTextByIDNonblock(ctx context.Context, convID chat1.ConversationID, trip chat1.ConversationIDTriple, tlfName string, text string) error SendMsgByIDNonblock(ctx context.Context, convID chat1.ConversationID, trip chat1.ConversationIDTriple, tlfName string, body chat1.MessageBody, msgType chat1.MessageType) error SendTextByName(ctx context.Context, name string, topicName *string, membersType chat1.ConversationMembersType, ident keybase1.TLFIdentifyBehavior, text string) error SendMsgByName(ctx context.Context, name string, topicName *string, membersType chat1.ConversationMembersType, ident keybase1.TLFIdentifyBehavior, body chat1.MessageBody, msgType chat1.MessageType) error SendTextByNameNonblock(ctx context.Context, name string, topicName *string, membersType chat1.ConversationMembersType, ident keybase1.TLFIdentifyBehavior, text string) error SendMsgByNameNonblock(ctx context.Context, name string, topicName *string, membersType chat1.ConversationMembersType, ident keybase1.TLFIdentifyBehavior, body chat1.MessageBody, msgType chat1.MessageType) error FindConversations(ctx context.Context, useLocalData bool, name string, topicName *string, topicType chat1.TopicType, membersType chat1.ConversationMembersType, vis keybase1.TLFVisibility) ([]chat1.ConversationLocal, error) FindConversationsByID(ctx context.Context, convIDs []chat1.ConversationID) ([]chat1.ConversationLocal, error) GetChannelTopicName(context.Context, keybase1.TeamID, chat1.TopicType, chat1.ConversationID) (string, error) GetMessages(ctx context.Context, uid gregor1.UID, convID chat1.ConversationID, msgIDs []chat1.MessageID, resolveSupersedes bool) ([]chat1.MessageUnboxed, error) UpgradeKBFSToImpteam(ctx context.Context, tlfName string, tlfID chat1.TLFID, public bool) error UnboxMobilePushNotification(ctx context.Context, uid gregor1.UID, convID chat1.ConversationID, membersType chat1.ConversationMembersType, payload string) (string, error) AckMobileNotificationSuccess(ctx context.Context, pushIDs []string) }
type ChatInternalError ¶ added in v1.0.18
type ChatInternalError struct{}
func (ChatInternalError) Error ¶ added in v1.0.18
func (e ChatInternalError) Error() string
func (ChatInternalError) ToStatus ¶ added in v1.0.18
func (e ChatInternalError) ToStatus() keybase1.Status
type ChatMessageCollisionError ¶ added in v1.0.21
type ChatMessageCollisionError struct {
HeaderHash string
}
func (ChatMessageCollisionError) Error ¶ added in v1.0.21
func (e ChatMessageCollisionError) Error() string
func (ChatMessageCollisionError) ToStatus ¶ added in v1.0.21
func (e ChatMessageCollisionError) ToStatus() keybase1.Status
type ChatNotInConvError ¶ added in v1.0.18
func (ChatNotInConvError) Error ¶ added in v1.0.18
func (e ChatNotInConvError) Error() string
func (ChatNotInConvError) IsImmediateFail ¶ added in v1.0.27
func (e ChatNotInConvError) IsImmediateFail() (chat1.OutboxErrorType, bool)
func (ChatNotInConvError) ToStatus ¶ added in v1.0.18
func (e ChatNotInConvError) ToStatus() keybase1.Status
type ChatNotInTeamError ¶ added in v1.0.27
func (ChatNotInTeamError) Error ¶ added in v1.0.27
func (e ChatNotInTeamError) Error() string
func (ChatNotInTeamError) IsImmediateFail ¶ added in v1.0.27
func (e ChatNotInTeamError) IsImmediateFail() (chat1.OutboxErrorType, bool)
func (ChatNotInTeamError) ToStatus ¶ added in v1.0.27
func (e ChatNotInTeamError) ToStatus() keybase1.Status
type ChatRateLimitError ¶ added in v1.0.18
func (ChatRateLimitError) Error ¶ added in v1.0.18
func (e ChatRateLimitError) Error() string
func (ChatRateLimitError) ToStatus ¶ added in v1.0.18
func (e ChatRateLimitError) ToStatus() keybase1.Status
type ChatStalePreviousStateError ¶ added in v1.0.27
type ChatStalePreviousStateError struct{}
func (ChatStalePreviousStateError) Error ¶ added in v1.0.27
func (e ChatStalePreviousStateError) Error() string
func (ChatStalePreviousStateError) ToStatus ¶ added in v1.0.27
func (e ChatStalePreviousStateError) ToStatus() keybase1.Status
type ChatTLFFinalizedError ¶ added in v1.0.18
func (ChatTLFFinalizedError) Error ¶ added in v1.0.18
func (e ChatTLFFinalizedError) Error() string
func (ChatTLFFinalizedError) ToStatus ¶ added in v1.0.18
func (e ChatTLFFinalizedError) ToStatus() keybase1.Status
type ChatUI ¶ added in v1.0.18
type ChatUI interface { ChatAttachmentDownloadStart(context.Context) error ChatAttachmentDownloadProgress(context.Context, chat1.ChatAttachmentDownloadProgressArg) error ChatAttachmentDownloadDone(context.Context) error ChatInboxUnverified(context.Context, chat1.ChatInboxUnverifiedArg) error ChatInboxConversation(context.Context, chat1.ChatInboxConversationArg) error ChatInboxFailed(context.Context, chat1.ChatInboxFailedArg) error ChatThreadCached(context.Context, chat1.ChatThreadCachedArg) error ChatThreadFull(context.Context, chat1.ChatThreadFullArg) error ChatConfirmChannelDelete(context.Context, chat1.ChatConfirmChannelDeleteArg) (bool, error) ChatSearchHit(context.Context, chat1.ChatSearchHitArg) error ChatSearchDone(context.Context, chat1.ChatSearchDoneArg) error }
type ChatUnknownTLFIDError ¶ added in v1.0.18
func (ChatUnknownTLFIDError) Error ¶ added in v1.0.18
func (e ChatUnknownTLFIDError) Error() string
func (ChatUnknownTLFIDError) ToStatus ¶ added in v1.0.18
func (e ChatUnknownTLFIDError) ToStatus() keybase1.Status
type CheckCompletedListener ¶
type CheckCompletedListener interface {
CCLCheckCompleted(lcr *LinkCheckResult)
}
type CheckMember ¶
type CheckMember struct {
Set []string
}
func (CheckMember) Checker ¶
func (c CheckMember) Checker() Checker
type CheckResult ¶
type CheckResult struct { Contextified Status ProofError // Or nil if it was a success Time time.Time // When the last check was PvlHash string // Added after other fields. Some entries may not have this packed. }
func NewCheckResult ¶
func NewCheckResult(g *GlobalContext, jw *jsonw.Wrapper) (res *CheckResult, err error)
func NewNowCheckResult ¶
func NewNowCheckResult(g *GlobalContext, pe ProofError) *CheckResult
func (CheckResult) Export ¶
func (cr CheckResult) Export() *keybase1.CheckResult
func (CheckResult) Freshness ¶
func (cr CheckResult) Freshness() keybase1.CheckResultFreshness
func (CheckResult) Pack ¶
func (cr CheckResult) Pack() *jsonw.Wrapper
type Checker ¶
func MakeCheckKex2SecretPhrase ¶ added in v1.0.31
func MakeCheckKex2SecretPhrase(g *GlobalContext) Checker
type CheckerWrapper ¶ added in v1.0.16
type CheckerWrapper struct {
// contains filtered or unexported fields
}
CheckerWrapper wraps a Checker type to make it conform to the PassphraseChecker interface.
func (*CheckerWrapper) Check ¶ added in v1.0.16
func (w *CheckerWrapper) Check(m MetaContext, s string) error
Check s using checker, respond with checker.Hint if check fails.
type ClientConfig ¶
type ClockContext ¶ added in v1.0.33
type CommandLine ¶
type ComputedKeyFamily ¶
type ComputedKeyFamily struct { Contextified // contains filtered or unexported fields }
ComputedKeyFamily is a joining of two sets of data; the KeyFamily is what the server returned and is not to be trusted; the ComputedKeyInfos is what we compute as a result of playing the user's sigchain forward.
func (*ComputedKeyFamily) ClearActivePGPHash ¶ added in v1.0.22
func (ckf *ComputedKeyFamily) ClearActivePGPHash(kid keybase1.KID)
ClearActivePGPHash clears authoritative hash of PGP key, after a revoke.
func (*ComputedKeyFamily) Delegate ¶
func (ckf *ComputedKeyFamily) Delegate(tcl TypedChainLink) (err error)
Delegate performs a delegation to the key described in the given TypedChainLink. This maybe be a sub- or sibkey delegation.
func (*ComputedKeyFamily) DelegatePerUserKey ¶ added in v1.0.27
func (ckf *ComputedKeyFamily) DelegatePerUserKey(perUserKey keybase1.PerUserKey) (err error)
func (ComputedKeyFamily) Export ¶
func (ckf ComputedKeyFamily) Export() []keybase1.PublicKey
Export is used by IDRes. It includes PGP keys.
func (ComputedKeyFamily) ExportAllPGPKeys ¶ added in v1.0.19
func (ckf ComputedKeyFamily) ExportAllPGPKeys() (keys []keybase1.PublicKey)
ExportAllPGPKeys exports all pgp keys.
func (ComputedKeyFamily) ExportDeletedDeviceKeys ¶ added in v1.0.19
func (ckf ComputedKeyFamily) ExportDeletedDeviceKeys() []keybase1.PublicKey
ExportDeletedDeviceKeys is used by ExportToUserPlusKeys. The key list only contains deleted device keys.
func (ComputedKeyFamily) ExportDeviceKeys ¶
func (ckf ComputedKeyFamily) ExportDeviceKeys() (exportedKeys []keybase1.PublicKey, pgpKeyCount int)
ExportDeviceKeys is used by ExportToUserPlusKeys. The key list only contains device keys. It also returns the number of PGP keys in the key family.
func (ComputedKeyFamily) ExportPerUserKeys ¶ added in v1.0.27
func (ckf ComputedKeyFamily) ExportPerUserKeys() (ret []keybase1.PerUserKey)
ExportPerUserKeys exports the per-user public KIDs.
func (ComputedKeyFamily) ExportRevokedDeviceKeys ¶
func (ckf ComputedKeyFamily) ExportRevokedDeviceKeys() []keybase1.RevokedKey
func (ComputedKeyFamily) FindActiveEncryptionSubkey ¶
func (ckf ComputedKeyFamily) FindActiveEncryptionSubkey(kid keybase1.KID) (ret GenericKey, cki ComputedKeyInfo, err error)
FindActiveEncryptionSubkey takes a given KID and finds the corresponding active encryption subkey in the current key family. If for any reason it cannot find the key, it will return an error saying why. Otherwise, it will return the key. In this case either key is non-nil, or err is non-nil.
func (ComputedKeyFamily) FindActiveSibkey ¶
func (ckf ComputedKeyFamily) FindActiveSibkey(kid keybase1.KID) (key GenericKey, cki ComputedKeyInfo, err error)
FindActiveSibkey takes a given KID and finds the corresponding active sibkey in the current key family. If it cannot find the key, or if the key is no longer active (either by revocation, or by expiring), it will return an error saying why. Otherwise, it will return the key. In this case either key is non-nil, or err is non-nil.
func (ComputedKeyFamily) FindActiveSibkeyAtTime ¶
func (ckf ComputedKeyFamily) FindActiveSibkeyAtTime(kid keybase1.KID, t time.Time) (key GenericKey, cki ComputedKeyInfo, err error)
As FindActiveSibkey, but for a specific time. Note that going back in time only affects expiration, not revocation. Thus this function is mainly useful for validating the sigchain, when each delegation and revocation is getting replayed in order.
func (ComputedKeyFamily) FindKIDFromFingerprint ¶
func (ckf ComputedKeyFamily) FindKIDFromFingerprint(fp PGPFingerprint) (kid keybase1.KID, err error)
func (ComputedKeyFamily) FindKeyWithKIDUnsafe ¶
func (ckf ComputedKeyFamily) FindKeyWithKIDUnsafe(kid keybase1.KID) (GenericKey, error)
FindKeyWithKIDUnsafe returns a key given a KID. It doesn't check if the key is expired or revoked, so most callers should use the FindActive* methods.
func (ComputedKeyFamily) FindKeybaseName ¶
func (ckf ComputedKeyFamily) FindKeybaseName(s string) bool
FindKeybaseName looks at all PGP keys in this key family that are active sibkeys to find a key with a signed identity of <name@keybase.io>. IF found return true, and otherwise false.
func (ComputedKeyFamily) GetActivePGPKeys ¶
func (ckf ComputedKeyFamily) GetActivePGPKeys(sibkey bool) (ret []*PGPKeyBundle)
GetActivePGPKeys gets the active PGP keys from the ComputedKeyFamily. If sibkey is False it will return all active PGP keys. Otherwise, it will return only the Sibkeys. Note the keys need to be non-canceled, and non-expired.
func (*ComputedKeyFamily) GetAllActiveDevices ¶
func (ckf *ComputedKeyFamily) GetAllActiveDevices() []*Device
func (ComputedKeyFamily) GetAllActiveKeysForDevice ¶
func (ComputedKeyFamily) GetAllActiveKeysWithRoleAtTime ¶
func (ckf ComputedKeyFamily) GetAllActiveKeysWithRoleAtTime(role KeyRole, t time.Time) (ret []GenericKey)
GetAllActiveSibkeys gets all active Sibkeys from given ComputedKeyFamily.
func (ComputedKeyFamily) GetAllActiveSibkeys ¶
func (ckf ComputedKeyFamily) GetAllActiveSibkeys() []GenericKey
GetAllActiveSibkeys gets all active Sibkeys from given ComputedKeyFamily.
func (ComputedKeyFamily) GetAllActiveSibkeysAtTime ¶
func (ckf ComputedKeyFamily) GetAllActiveSibkeysAtTime(t time.Time) []GenericKey
GetAllActiveSibkeys gets all active Sibkeys from given ComputedKeyFamily.
func (ComputedKeyFamily) GetAllActiveSubkeys ¶
func (ckf ComputedKeyFamily) GetAllActiveSubkeys() []GenericKey
func (ComputedKeyFamily) GetAllActiveSubkeysAtTime ¶
func (ckf ComputedKeyFamily) GetAllActiveSubkeysAtTime(t time.Time) (ret []GenericKey)
func (*ComputedKeyFamily) GetAllDevices ¶
func (ckf *ComputedKeyFamily) GetAllDevices() []*Device
func (ComputedKeyFamily) GetAllSibkeysUnchecked ¶ added in v1.0.27
func (ckf ComputedKeyFamily) GetAllSibkeysUnchecked() (ret []GenericKey)
GetAllSibkeysUnchecked gets all sibkeys, dead or otherwise, that were at one point associated with this key family.
func (ComputedKeyFamily) GetAllSubkeysUnchecked ¶ added in v1.0.27
func (ckf ComputedKeyFamily) GetAllSubkeysUnchecked() (ret []GenericKey)
GetAllSubkeysUnchecked gets all sibkeys, dead or otherwise, that were at one point associated with this key family.
func (*ComputedKeyFamily) GetCurrentDevice ¶
func (ckf *ComputedKeyFamily) GetCurrentDevice(g *GlobalContext) (*Device, error)
GetCurrentDevice returns the current device.
func (ComputedKeyFamily) GetDeletedKeys ¶ added in v1.0.19
func (ckf ComputedKeyFamily) GetDeletedKeys() []GenericKey
func (*ComputedKeyFamily) GetDeviceForKID ¶
func (ckf *ComputedKeyFamily) GetDeviceForKID(kid keybase1.KID) (*Device, error)
func (*ComputedKeyFamily) GetDeviceForKey ¶
func (ckf *ComputedKeyFamily) GetDeviceForKey(key GenericKey) (*Device, error)
GetDeviceForKey gets the device that this key is bound to, if any.
func (*ComputedKeyFamily) GetEncryptionSubkeyForDevice ¶
func (ckf *ComputedKeyFamily) GetEncryptionSubkeyForDevice(did keybase1.DeviceID) (key GenericKey, err error)
GetEncryptionSubkeyForDevice gets the current encryption subkey for the given device.
func (ComputedKeyFamily) GetKeyRole ¶
func (ckf ComputedKeyFamily) GetKeyRole(kid keybase1.KID) (ret KeyRole)
GetKeyRole returns the KeyRole (sibkey/subkey/none), taking into account whether the key has been cancelled.
func (ComputedKeyFamily) GetKeyRoleAtTime ¶
GetKeyRoleAtTime returns the KeyRole (sibkey/subkey/none), taking into account whether the key has been cancelled at time t.
func (*ComputedKeyFamily) GetLatestPerUserKey ¶ added in v1.0.27
func (ckf *ComputedKeyFamily) GetLatestPerUserKey() *keybase1.PerUserKey
If there aren't any per-user-keys for the user, return nil.
func (ComputedKeyFamily) GetRevokedKeys ¶
func (ckf ComputedKeyFamily) GetRevokedKeys() []RevokedKey
func (ComputedKeyFamily) GetSaltpackSenderTypeIfInactive ¶ added in v1.0.19
func (ckf ComputedKeyFamily) GetSaltpackSenderTypeIfInactive(kid keybase1.KID) (*keybase1.SaltpackSenderType, error)
Returns (&senderType, err). A non-nil error indicates some unexpected condition (like the key doesn't exist at all), which should be propagated. If the sender type is nil, the key is active, and the caller should proceed with an identify. Otherwise the key is no longer active, and the sender type indicates why.
func (*ComputedKeyFamily) GetSibkeyForDevice ¶
func (ckf *ComputedKeyFamily) GetSibkeyForDevice(did keybase1.DeviceID) (key GenericKey, err error)
GetSibkeyForDevice gets the current per-device key for the given Device. Will return nil if one isn't found, and set err for a real error. The sibkey should be a signing key, not an encryption key of course.
func (*ComputedKeyFamily) HasActiveDevice ¶
func (ckf *ComputedKeyFamily) HasActiveDevice() bool
func (*ComputedKeyFamily) HasActiveEncryptionSubkey ¶
func (ckf *ComputedKeyFamily) HasActiveEncryptionSubkey() bool
func (ComputedKeyFamily) HasActiveKey ¶
func (ckf ComputedKeyFamily) HasActiveKey() bool
HasActiveKey returns if the given ComputeKeyFamily has any active keys. The key has to be in the server-given KeyFamily and also in our ComputedKeyFamily. The former check is so that we can handle the case nuked sigchains.
func (ComputedKeyFamily) InsertEldestLink ¶
func (ckf ComputedKeyFamily) InsertEldestLink(tcl TypedChainLink, username NormalizedUsername) (err error)
func (*ComputedKeyFamily) Revoke ¶
func (ckf *ComputedKeyFamily) Revoke(tcl TypedChainLink) (err error)
Revoke examines a TypeChainLink and applies any revocations in the link to the current ComputedKeyInfos.
func (*ComputedKeyFamily) RevokeKid ¶
func (ckf *ComputedKeyFamily) RevokeKid(kid keybase1.KID, tcl TypedChainLink) (err error)
func (*ComputedKeyFamily) RevokeSig ¶
func (ckf *ComputedKeyFamily) RevokeSig(sig keybase1.SigID, tcl TypedChainLink) (err error)
func (*ComputedKeyFamily) SetActivePGPHash ¶
func (ckf *ComputedKeyFamily) SetActivePGPHash(kid keybase1.KID, hash string)
SetPGPHash sets the authoritative version (by hash) of a PGP key
func (ComputedKeyFamily) ShallowCopy ¶ added in v1.0.19
func (ckf ComputedKeyFamily) ShallowCopy() *ComputedKeyFamily
func (*ComputedKeyFamily) UpdateDevices ¶
func (ckf *ComputedKeyFamily) UpdateDevices(tcl TypedChainLink) (err error)
UpdateDevices takes the Device object from the given ChainLink and updates keys to reflects any device changes encoded therein.
type ComputedKeyInfo ¶
type ComputedKeyInfo struct { Contextified // Repeat the KID inside, for lookups if we get here via the // `Sigs` map in ComputedKeyInfos KID keybase1.KID Status KeyStatus Eldest bool Sibkey bool // These have to be ints so they can be written to disk and read // back in. CTime int64 // In Seconds since the Epoch ETime int64 // In Seconds since the Epoch or 0 if none // For subkeys, the KID of our parent (if valid) Parent keybase1.KID // For sibkeys, the KID of last-added subkey (if valid) Subkey keybase1.KID // Map of SigID -> KID Delegations map[keybase1.SigID]keybase1.KID // List of the same delegations as above, in a way that preserves ordering. // NOTE: This is not populated in older cached CKI's. DelegationsList []Delegation // Merkle Timestamps and Friends for delegation. Suboptimal grouping of concerns // due to backwards compatibility and sensitivity to preexisting ondisk representations. DelegatedAt *KeybaseTime // The Seqno/Ctime signed into the link, so jus before the actual delegation! DelegatedAtHashMeta keybase1.HashMeta // The HashMeta at the time of the delegation FirstAppearedUnverified keybase1.Seqno // What the server claims was the first merkle appearance of this seqno DelegatedAtSigChainLocation keybase1.SigChainLocation // Where the delegation was in our sigchain // Merkle Timestamps and Friends for revocation. RevokedAt *KeybaseTime // The Seqno/Ctime signed into the signature RevokedBy keybase1.KID RevokedAtHashMeta keybase1.HashMeta // The hash_meta signed in at the time of the revocation RevokeFirstAppearedUnverified keybase1.Seqno // What the server claims was the first merkle appearance of this revoke RevokedAtSigChainLocation *keybase1.SigChainLocation // Where the revocation was in our sigchain // For PGP keys, the active version of the key. If unspecified, use the // legacy behavior of combining every instance of this key that we got from // the server minus revocations. ActivePGPHash string }
refers to exactly one ServerKeyInfo.
func NewComputedKeyInfo ¶
func (ComputedKeyInfo) GetCTime ¶
func (cki ComputedKeyInfo) GetCTime() time.Time
func (ComputedKeyInfo) GetETime ¶
func (cki ComputedKeyInfo) GetETime() time.Time
type ComputedKeyInfos ¶
type ComputedKeyInfos struct { Contextified // Now set to 1. Everything before that is thrown away on sigchain load. Version ComputedKeyInfosVersion // Map of KID to a computed info Infos map[keybase1.KID]*ComputedKeyInfo // Map of a SigID (in binary) to the ComputedKeyInfo describing when the key was // delegated. Sigs map[keybase1.SigID]*ComputedKeyInfo // Map of DeviceID to the most current device object Devices map[keybase1.DeviceID]*Device // Map of KID -> DeviceID KIDToDeviceID map[keybase1.KID]keybase1.DeviceID // For each generation, the public KIDs that correspond to the // per-user-key for a given generation. // Starts at gen=1. PerUserKeys map[keybase1.PerUserKeyGeneration]keybase1.PerUserKey // contains filtered or unexported fields }
When we play a sigchain forward, it yields ComputedKeyInfos (CKIs). We're going to store CKIs separately from the keys, since the server can clobber the former. We should rewrite CKIs every time we (re)check a user's SigChain
func NewComputedKeyInfos ¶
func NewComputedKeyInfos(g *GlobalContext) *ComputedKeyInfos
func (*ComputedKeyInfos) Delegate ¶
func (cki *ComputedKeyInfos) Delegate(kid keybase1.KID, tm *KeybaseTime, sigid keybase1.SigID, signingKid, parentKID keybase1.KID, pgpHash string, isSibkey bool, ctime, etime time.Time, merkleHashMeta keybase1.HashMeta, fau keybase1.Seqno, dascl keybase1.SigChainLocation) (err error)
Delegate marks the given ComputedKeyInfos object that the given kid is now delegated, as of time tm, in sigid, as signed by signingKid, etc. fau = "FirstAppearedUnverified", a hint from the server that we're going to persist. dascl = "DelegatedAtSigChainLocation"
func (*ComputedKeyInfos) DelegatePerUserKey ¶ added in v1.0.27
func (cki *ComputedKeyInfos) DelegatePerUserKey(perUserKey keybase1.PerUserKey) (err error)
DelegatePerUserKey inserts the new per-user key into the list of known per-user keys.
func (*ComputedKeyInfos) Insert ¶
func (cki *ComputedKeyInfos) Insert(i *ComputedKeyInfo)
Insert inserts the given ComputedKeyInfo object 1 or 2 times, depending on if a KID or PGPFingerprint or both are available.
func (ComputedKeyInfos) InsertLocalEldestKey ¶
func (cki ComputedKeyInfos) InsertLocalEldestKey(kid keybase1.KID)
func (ComputedKeyInfos) InsertServerEldestKey ¶
func (cki ComputedKeyInfos) InsertServerEldestKey(eldestKey GenericKey, un NormalizedUsername) error
For use when there are no chain links at all, so all we can do is trust the eldest key that the server reported.
func (*ComputedKeyInfos) IsStaleVersion ¶ added in v1.0.27
func (cki *ComputedKeyInfos) IsStaleVersion() bool
func (*ComputedKeyInfos) PaperDevices ¶
func (cki *ComputedKeyInfos) PaperDevices() []*Device
PaperDevices returns a list of all the paperkey devices.
func (ComputedKeyInfos) ShallowCopy ¶
func (cki ComputedKeyInfos) ShallowCopy() *ComputedKeyInfos
TODO: Figure out whether this needs to be a deep copy. See https://github.com/keybase/client/issues/414 .
type ComputedKeyInfosVersion ¶ added in v1.0.27
type ComputedKeyInfosVersion int
const ( ComputedKeyInfosV1 ComputedKeyInfosVersion = ComputedKeyInfosVersion(1) ComputedKeyInfosV2 ComputedKeyInfosVersion = ComputedKeyInfosVersion(2) ComputedKeyInfosV3 ComputedKeyInfosVersion = ComputedKeyInfosVersion(3) ComputedKeyInfosV4 ComputedKeyInfosVersion = ComputedKeyInfosVersion(4) ComputedKeyInfosVersionCurrent = ComputedKeyInfosV4 )
type ConfigError ¶
type ConfigError struct {
// contains filtered or unexported fields
}
func (ConfigError) Error ¶
func (c ConfigError) Error() string
type ConfigGetter ¶
type ConfigGetter func() string
type ConfigReader ¶
type ConfigReader interface { JSONReader GetUserConfig() (*UserConfig, error) GetUserConfigForUsername(s NormalizedUsername) (*UserConfig, error) GetBundledCA(host string) string GetProofCacheLongDur() (time.Duration, bool) GetProofCacheMediumDur() (time.Duration, bool) GetProofCacheShortDur() (time.Duration, bool) GetLinkCacheCleanDur() (time.Duration, bool) GetNoPinentry() (bool, bool) GetDeviceID() keybase1.DeviceID GetDeviceIDForUsername(nu NormalizedUsername) keybase1.DeviceID GetDeviceIDForUID(u keybase1.UID) keybase1.DeviceID GetUsernameForUID(u keybase1.UID) NormalizedUsername GetUIDForUsername(n NormalizedUsername) keybase1.UID GetUsername() NormalizedUsername GetAllUsernames() (current NormalizedUsername, others []NormalizedUsername, err error) GetAllUserConfigs() (*UserConfig, []UserConfig, error) GetUID() keybase1.UID GetProxyCACerts() ([]string, error) GetSecurityAccessGroupOverride() (bool, bool) GetBug3964RepairTime(NormalizedUsername) (time.Time, error) GetUpdatePreferenceAuto() (bool, bool) GetUpdatePreferenceSkip() string GetUpdatePreferenceSnoozeUntil() keybase1.Time GetUpdateLastChecked() keybase1.Time GetUpdateURL() string GetUpdateDisabled() (bool, bool) // contains filtered or unexported methods }
type ConfigWriter ¶
type ConfigWriter interface { JSONWriter SetUserConfig(cfg *UserConfig, overwrite bool) error SwitchUser(un NormalizedUsername) error NukeUser(un NormalizedUsername) error SetDeviceID(keybase1.DeviceID) error SetWrapperAtPath(string, *jsonw.Wrapper) error DeleteAtPath(string) SetUpdatePreferenceAuto(bool) error SetUpdatePreferenceSkip(string) error SetUpdatePreferenceSnoozeUntil(keybase1.Time) error SetUpdateLastChecked(keybase1.Time) error SetBug3964RepairTime(NormalizedUsername, time.Time) error SetRememberPassphrase(bool) error Reset() BeginTransaction() (ConfigWriterTransacter, error) }
type ConfigWriterTransacter ¶
type ConnectionID ¶
type ConnectionID int
ConnectionID is a sequential integer assigned to each RPC connection that this process serves. No IDs are reused.
type ConnectionManager ¶
ConnectionManager manages all active connections for a given service. It can be called from multiple goroutines.
func NewConnectionManager ¶
func NewConnectionManager() *ConnectionManager
NewConnectionManager makes a new ConnectionManager.
func (*ConnectionManager) AddConnection ¶
func (c *ConnectionManager) AddConnection(xp rpc.Transporter, closeListener chan error) ConnectionID
AddConnection adds a new connection to the table of Connection object, with a related closeListener. We'll listen for a close on that channel, and when one occurs, we'll remove the connection from the pool.
func (*ConnectionManager) ApplyAll ¶
func (c *ConnectionManager) ApplyAll(f ApplyFn)
ApplyAll applies the given function f to all connections in the table. If you're going to do something blocking, please do it in a GoRoutine, since we're holding the lock for all connections as we do this.
func (*ConnectionManager) Label ¶
func (c *ConnectionManager) Label(id ConnectionID, d keybase1.ClientDetails) error
func (*ConnectionManager) ListAllLabeledConnections ¶
func (c *ConnectionManager) ListAllLabeledConnections() (ret []keybase1.ClientDetails)
func (*ConnectionManager) LookupByClientType ¶ added in v1.0.17
func (c *ConnectionManager) LookupByClientType(clientType keybase1.ClientType) rpc.Transporter
func (*ConnectionManager) LookupConnection ¶
func (c *ConnectionManager) LookupConnection(i ConnectionID) rpc.Transporter
LookupConnection looks up a connection given a connectionID, or returns nil if no such connection was found.
func (*ConnectionManager) RegisterLabelCallback ¶ added in v1.0.41
func (c *ConnectionManager) RegisterLabelCallback(f LabelCb)
func (*ConnectionManager) Shutdown ¶
func (c *ConnectionManager) Shutdown()
func (*ConnectionManager) WaitForClientType ¶ added in v1.0.19
func (c *ConnectionManager) WaitForClientType(clientType keybase1.ClientType, timeout time.Duration) bool
WaitForClientType returns true if client type is connected, or waits until timeout for the connection
type ConnectivityMonitor ¶ added in v1.0.21
type ConnectivityMonitorResult ¶ added in v1.0.22
type ConnectivityMonitorResult int
const ( ConnectivityMonitorYes ConnectivityMonitorResult = iota ConnectivityMonitorNo ConnectivityMonitorUnknown )
type Contextified ¶
type Contextified struct {
// contains filtered or unexported fields
}
Contextified objects have explicit references to the GlobalContext, so that G can be swapped out for something else. We're going to incrementally start moving objects over to this system.
func NewContextified ¶
func NewContextified(gc *GlobalContext) Contextified
func (Contextified) G ¶
func (c Contextified) G() *GlobalContext
func (Contextified) GStrict ¶
func (c Contextified) GStrict() *GlobalContext
func (Contextified) MetaContext ¶
func (c Contextified) MetaContext(ctx context.Context) MetaContext
func (*Contextified) SetGlobalContext ¶
func (c *Contextified) SetGlobalContext(g *GlobalContext)
type Contextifier ¶ added in v1.0.18
type Contextifier interface {
G() *GlobalContext
}
type CryptoMessageFormat ¶
type CryptoMessageFormat string
CryptoMessageFormat is one of the known crypto message formats that we admit
const ( // CryptoMessageFormatPGP is for PGP CryptoMessageFormatPGP CryptoMessageFormat = "pgp" // CryptoMessageFormatKeybaseV0 is for the zeroth version of Keybase signatures, which // will eventually be deprecated. CryptoMessageFormatKeybaseV0 CryptoMessageFormat = "kbv0" // CryptoMessageFormatSaltpack is the Saltpack messaging format for encrypted and signed // messages CryptoMessageFormatSaltpack CryptoMessageFormat = "saltpack" )
type CryptoMessageType ¶
type CryptoMessageType int
CryptoMessageType says what type of crypto message it is, regardless of Format
const ( // CryptoMessageTypeEncryption is for an encrypted message CryptoMessageTypeEncryption CryptoMessageType = 0 // CryptoMessageTypeAttachedSignature is for an attached signature CryptoMessageTypeAttachedSignature CryptoMessageType = 1 // CryptoMessageTypeDetachedSignature is for a detached signature CryptoMessageTypeDetachedSignature CryptoMessageType = 2 // CryptoMessageTypeClearSignature is for PGP clearsigning CryptoMessageTypeClearSignature CryptoMessageType = 3 // CryptoMessageTypeAmbiguous is for an ambiguous message based on the stream prefix CryptoMessageTypeAmbiguous CryptoMessageType = 4 // CryptoMessageTypeSignature is for a sig that can be either attached or detached CryptoMessageTypeSignature CryptoMessageType = 5 )
type CryptocurrencyChainLink ¶
type CryptocurrencyChainLink struct { GenericChainLink // contains filtered or unexported fields }
func ParseCryptocurrencyChainLink ¶
func ParseCryptocurrencyChainLink(b GenericChainLink) ( cl *CryptocurrencyChainLink, err error)
func (CryptocurrencyChainLink) Display ¶
func (c CryptocurrencyChainLink) Display(ui IdentifyUI) error
func (CryptocurrencyChainLink) Export ¶
func (c CryptocurrencyChainLink) Export() (ret keybase1.Cryptocurrency)
func (CryptocurrencyChainLink) GetAddress ¶
func (c CryptocurrencyChainLink) GetAddress() string
func (*CryptocurrencyChainLink) ToDisplayString ¶
func (c *CryptocurrencyChainLink) ToDisplayString() string
func (*CryptocurrencyChainLink) Type ¶
func (c *CryptocurrencyChainLink) Type() string
type CryptocurrencyFamily ¶ added in v1.0.19
type CryptocurrencyFamily string
const ( CryptocurrencyFamilyNone CryptocurrencyFamily = "" CryptocurrencyFamilyBitcoin CryptocurrencyFamily = "bitcoin" CryptocurrencyFamilyZCash CryptocurrencyFamily = "zcash" )
type CryptocurrencyPrefix ¶ added in v1.0.19
type CryptocurrencyPrefix struct { Type CryptocurrencyType Prefix []byte Len int }
type CryptocurrencyType ¶
type CryptocurrencyType int
const ( CryptocurrencyTypeNone CryptocurrencyType = -1 CryptocurrencyTypeBTC CryptocurrencyType = 0 // 0x0 CryptocurrencyTypeBTCMultiSig CryptocurrencyType = 5 // 0x5 CryptocurrencyTypeZCashShielded CryptocurrencyType = 5786 // 0x169a CryptocurrencyTypeZCashTransparentP2PKH CryptocurrencyType = 7352 // 0x1cb8 CryptocurrencyTypeZCashTransparentP2SH CryptocurrencyType = 7357 // 0x1cbd )
func CryptocurrencyParseAndCheck ¶ added in v1.0.19
func CryptocurrencyParseAndCheck(s string) (CryptocurrencyType, []byte, error)
func (CryptocurrencyType) String ¶ added in v1.0.19
func (p CryptocurrencyType) String() string
func (CryptocurrencyType) ToCryptocurrencyFamily ¶ added in v1.0.19
func (p CryptocurrencyType) ToCryptocurrencyFamily() CryptocurrencyFamily
type CtimeMismatchError ¶
type CtimeMismatchError struct {
Msg string
}
func (CtimeMismatchError) Error ¶
func (e CtimeMismatchError) Error() string
type CurrentStatus ¶
type CurrentStatus struct { Configured bool Registered bool LoggedIn bool SessionIsValid bool User *User }
func GetCurrentStatus ¶
func GetCurrentStatus(ctx context.Context, g *GlobalContext) (res CurrentStatus, err error)
func (CurrentStatus) Export ¶
func (c CurrentStatus) Export() (ret keybase1.GetCurrentStatusRes)
type DBError ¶ added in v1.0.19
type DBError struct {
Msg string
}
func NewDBError ¶ added in v1.0.19
type DNSContext ¶ added in v1.0.21
type DNSContext interface {
GetDNSNameServerFetcher() DNSNameServerFetcher
}
type DNSNameServerFetcher ¶ added in v1.0.21
type DNSNameServerFetcher interface {
GetServers() []string
}
type Darwin ¶
type Darwin struct {
Base
}
func (Darwin) RuntimeDir ¶
func (Darwin) SandboxCacheDir ¶ added in v1.0.18
func (Darwin) ServiceSpawnDir ¶
type DbKey ¶
func DbKeyNotificationDismiss ¶ added in v1.0.18
func DbKeyNotificationDismiss(prefix string, username NormalizedUsername) DbKey
func ImportDbKey ¶ added in v1.0.19
type DecryptBadNonceError ¶
type DecryptBadNonceError struct{}
func (DecryptBadNonceError) Error ¶
func (d DecryptBadNonceError) Error() string
type DecryptBadPacketTypeError ¶
type DecryptBadPacketTypeError struct{}
func (DecryptBadPacketTypeError) Error ¶
func (d DecryptBadPacketTypeError) Error() string
type DecryptBadSenderError ¶
type DecryptBadSenderError struct{}
func (DecryptBadSenderError) Error ¶
func (d DecryptBadSenderError) Error() string
type DecryptOpenError ¶
type DecryptOpenError struct {
What string
}
func NewDecryptOpenError ¶ added in v1.0.48
func NewDecryptOpenError(what string) DecryptOpenError
func (DecryptOpenError) Error ¶
func (d DecryptOpenError) Error() string
type DecryptWrongReceiverError ¶
type DecryptWrongReceiverError struct{}
func (DecryptWrongReceiverError) Error ¶
func (d DecryptWrongReceiverError) Error() string
type DecryptionError ¶
type DecryptionError struct{}
func (DecryptionError) Error ¶
func (e DecryptionError) Error() string
func (DecryptionError) ToStatus ¶ added in v1.0.17
func (e DecryptionError) ToStatus() keybase1.Status
type Delegation ¶ added in v1.0.27
Struct for the DelegationsList
type DelegationType ¶
type DelegationType LinkType
type Delegator ¶
type Delegator struct { Contextified // Set these fields NewKey GenericKey ExistingKey GenericKey EldestKID keybase1.KID Me *User Expire int Device *Device RevSig string ServerHalf []byte EncodedPrivateKey string Ctime int64 DelegationType DelegationType Aggregated bool // During aggregation we skip some steps (posting, updating some state) PerUserKeyGeneration keybase1.PerUserKeyGeneration MerkleRoot *MerkleRoot // Optional precalculated values used by KeyProof Seqno keybase1.Seqno // kex2 HandleDidCounterSign needs to sign subkey without a user but we know what the last seqno was PrevLinkID LinkID // kex2 HandleDidCounterSign calculates previous link id without a user SigningUser UserBasic // kex2 doesn't have a full user, but does have basic user info // contains filtered or unexported fields }
func (*Delegator) CheckArgs ¶
func (d *Delegator) CheckArgs(m MetaContext) (err error)
func (Delegator) GetMerkleTriple ¶
func (d Delegator) GetMerkleTriple() MerkleTriple
GetMerkleTriple gets the new MerkleTriple that came about as a result of performing the key delegation.
func (Delegator) GetSigningKey ¶
func (d Delegator) GetSigningKey() GenericKey
func (Delegator) IsSibkeyOrEldest ¶
func (*Delegator) LoadSigningKey ¶
func (d *Delegator) LoadSigningKey(m MetaContext, ui SecretUI) (err error)
LoadSigningKey can be called before Run() to load the signing key into the delegator. This will check the given key first, then a device Key if we have one, and otherwise will leave the signing key unset so that we will set it as the eldest key on upload. m.LoginContext can be nil.
func (*Delegator) Run ¶
func (d *Delegator) Run(m MetaContext) (err error)
Run the Delegator, performing all necessary internal operations. Return err on failure and nil on success.
func (*Delegator) SignAndPost ¶
func (d *Delegator) SignAndPost(m MetaContext, jw *jsonw.Wrapper) (err error)
type DeletedError ¶ added in v1.0.18
type DeletedError = UserDeletedError
Keep the previous name around until KBFS revendors and updates.
type DeriveReason ¶ added in v1.0.27
type DeriveReason string
const ( DeriveReasonPUKSigning DeriveReason = "Derived-User-NaCl-EdDSA-1" DeriveReasonPUKEncryption DeriveReason = "Derived-User-NaCl-DH-1" // Context used for chaining generations of PerUserKeys. DeriveReasonPUKPrev DeriveReason = "Derived-User-NaCl-SecretBox-1" DeriveReasonPUKStellarBundle DeriveReason = "Derived-User-NaCl-SecretBox-StellarBundle-1" DeriveReasonPUKStellarNoteSelf DeriveReason = "Derived-User-NaCl-SecretBox-StellarSelfNote-1" DeriveReasonDeviceEKEncryption DeriveReason = "Derived-Ephemeral-Device-NaCl-DH-1" DeriveReasonUserEKEncryption DeriveReason = "Derived-Ephemeral-User-NaCl-DH-1" DeriveReasonTeamEKEncryption DeriveReason = "Derived-Ephemeral-Team-NaCl-DH-1" DeriveReasonTeamEKExplodingChat DeriveReason = "Derived-Ephemeral-Team-NaCl-SecretBox-ExplodingChat-1" DeriveReasonChatPairwiseMAC DeriveReason = "Derived-Chat-Pairwise-HMAC-SHA256-1" )
type Device ¶
type Device struct { ID keybase1.DeviceID `json:"id"` Kid keybase1.KID `json:"kid,omitempty"` Description *string `json:"name,omitempty"` Status *int `json:"status,omitempty"` Type string `json:"type"` CTime keybase1.Time `json:"ctime"` MTime keybase1.Time `json:"mtime"` }
func NewPaperDevice ¶
NewPaperDevice creates a new paper backup key device
func (*Device) ProtExport ¶
func (*Device) StatusString ¶
type DeviceAlreadyProvisionedError ¶
type DeviceAlreadyProvisionedError struct{}
func (DeviceAlreadyProvisionedError) Error ¶
func (e DeviceAlreadyProvisionedError) Error() string
func (DeviceAlreadyProvisionedError) ToStatus ¶
func (e DeviceAlreadyProvisionedError) ToStatus() keybase1.Status
type DeviceBadNameError ¶ added in v1.0.18
type DeviceBadNameError struct{}
func (DeviceBadNameError) Error ¶ added in v1.0.18
func (e DeviceBadNameError) Error() string
type DeviceChainLink ¶
type DeviceChainLink struct { GenericChainLink // contains filtered or unexported fields }
func ParseDeviceChainLink ¶
func ParseDeviceChainLink(b GenericChainLink) (ret *DeviceChainLink, err error)
func (*DeviceChainLink) GetDevice ¶
func (s *DeviceChainLink) GetDevice() *Device
type DeviceCloneState ¶
func GetDeviceCloneState ¶
func GetDeviceCloneState(m MetaContext) (DeviceCloneState, error)
type DeviceCloneStateJSONFile ¶
type DeviceCloneStateJSONFile struct {
*JSONFile
}
type DeviceEKStorage ¶ added in v1.0.46
type DeviceEKStorage interface { Put(ctx context.Context, generation keybase1.EkGeneration, deviceEK keybase1.DeviceEk) error Get(ctx context.Context, generation keybase1.EkGeneration) (keybase1.DeviceEk, error) GetAllActive(ctx context.Context, merkleRoot MerkleRoot) ([]keybase1.DeviceEkMetadata, error) MaxGeneration(ctx context.Context) (keybase1.EkGeneration, error) DeleteExpired(ctx context.Context, merkleRoot MerkleRoot) ([]keybase1.EkGeneration, error) ClearCache() // Dangerous! Only for deprovisioning. ForceDeleteAll(ctx context.Context, username NormalizedUsername) error // For keybase log send ListAllForUser(ctx context.Context) ([]string, error) }
type DeviceKey ¶
type DeviceKey struct { Type string `json:"type"` CTime int64 `json:"ctime"` MTime int64 `json:"mtime"` Description string `json:"name"` Status int `json:"status"` LksServerHalf string `json:"lks_server_half"` PPGen PassphraseGeneration `json:"passphrase_generation"` LastUsedTime int64 `json:"last_used_time"` }
func (DeviceKey) ToLKSec ¶ added in v1.0.18
func (d DeviceKey) ToLKSec() (LKSecServerHalf, error)
type DeviceKeyMap ¶
type DeviceNameInUseError ¶ added in v1.0.18
type DeviceNameInUseError struct{}
func (DeviceNameInUseError) Error ¶ added in v1.0.18
func (e DeviceNameInUseError) Error() string
func (DeviceNameInUseError) ToStatus ¶ added in v1.0.18
func (e DeviceNameInUseError) ToStatus() (s keybase1.Status)
type DeviceNotFoundError ¶ added in v1.0.19
func (DeviceNotFoundError) Error ¶ added in v1.0.19
func (e DeviceNotFoundError) Error() string
type DeviceRequiredError ¶
type DeviceRequiredError struct{}
func (DeviceRequiredError) Error ¶
func (e DeviceRequiredError) Error() string
func (DeviceRequiredError) ToStatus ¶
func (e DeviceRequiredError) ToStatus() keybase1.Status
type DeviceStatus ¶
type DeviceTypeSet ¶
type DeviceWithKeys ¶
type DeviceWithKeys struct {
// contains filtered or unexported fields
}
func NewDeviceWithKeys ¶
func NewDeviceWithKeys(s GenericKey, e GenericKey, d keybase1.DeviceID, n string) *DeviceWithKeys
func NewDeviceWithKeysOnly ¶
func NewDeviceWithKeysOnly(e GenericKey, s GenericKey) *DeviceWithKeys
func (DeviceWithKeys) DeviceID ¶
func (d DeviceWithKeys) DeviceID() keybase1.DeviceID
func (DeviceWithKeys) DeviceName ¶
func (d DeviceWithKeys) DeviceName() string
func (DeviceWithKeys) EncryptionKey ¶
func (d DeviceWithKeys) EncryptionKey() GenericKey
func (DeviceWithKeys) HasBothKeys ¶
func (d DeviceWithKeys) HasBothKeys() bool
func (*DeviceWithKeys) Populate ¶
func (d *DeviceWithKeys) Populate(m MetaContext) (uid keybase1.UID, err error)
func (*DeviceWithKeys) SetDeviceInfo ¶
func (d *DeviceWithKeys) SetDeviceInfo(i keybase1.DeviceID, n string)
func (DeviceWithKeys) SigningKey ¶
func (d DeviceWithKeys) SigningKey() GenericKey
func (*DeviceWithKeys) ToPaperKeyActiveDevice ¶
func (d *DeviceWithKeys) ToPaperKeyActiveDevice(m MetaContext, uv keybase1.UserVersion) *ActiveDevice
type DirExecError ¶ added in v1.0.16
type DirExecError struct {
Path string
}
func (DirExecError) Error ¶ added in v1.0.16
func (e DirExecError) Error() string
type DumbOutputUI ¶
type EKLib ¶ added in v1.0.46
type EKLib interface { KeygenIfNeeded(ctx context.Context) error GetOrCreateLatestTeamEK(ctx context.Context, teamID keybase1.TeamID) (keybase1.TeamEk, error) GetTeamEK(ctx context.Context, teamID keybase1.TeamID, generation keybase1.EkGeneration) (keybase1.TeamEk, error) PurgeTeamEKGenCache(teamID keybase1.TeamID, generation keybase1.EkGeneration) NewEphemeralSeed() (keybase1.Bytes32, error) DeriveDeviceDHKey(seed keybase1.Bytes32) *NaclDHKeyPair SignedDeviceEKStatementFromSeed(ctx context.Context, generation keybase1.EkGeneration, seed keybase1.Bytes32, signingKey GenericKey) (keybase1.DeviceEkStatement, string, error) BoxLatestUserEK(ctx context.Context, receiverKey NaclDHKeyPair, deviceEKGeneration keybase1.EkGeneration) (*keybase1.UserEkBoxed, error) PrepareNewUserEK(ctx context.Context, merkleRoot MerkleRoot, pukSeed PerUserKeySeed) (string, []keybase1.UserEkBoxMetadata, keybase1.UserEkMetadata, *keybase1.UserEkBoxed, error) BoxLatestTeamEK(ctx context.Context, teamID keybase1.TeamID, uids []keybase1.UID) (*[]keybase1.TeamEkBoxMetadata, error) PrepareNewTeamEK(ctx context.Context, teamID keybase1.TeamID, signingKey NaclSigningKeyPair, uids []keybase1.UID) (string, *[]keybase1.TeamEkBoxMetadata, keybase1.TeamEkMetadata, *keybase1.TeamEkBoxed, error) // For testing NewTeamEKNeeded(ctx context.Context, teamID keybase1.TeamID) (bool, error) }
type EldestChainLink ¶ added in v1.0.27
type EldestChainLink struct { GenericChainLink // contains filtered or unexported fields }
func ParseEldestChainLink ¶ added in v1.0.27
func ParseEldestChainLink(b GenericChainLink) (ret *EldestChainLink, err error)
func (*EldestChainLink) GetDelegatedKid ¶ added in v1.0.27
func (s *EldestChainLink) GetDelegatedKid() keybase1.KID
func (*EldestChainLink) GetDevice ¶ added in v1.0.27
func (s *EldestChainLink) GetDevice() *Device
func (*EldestChainLink) GetPGPFullHash ¶ added in v1.0.27
func (s *EldestChainLink) GetPGPFullHash() string
func (*EldestChainLink) GetRole ¶ added in v1.0.27
func (s *EldestChainLink) GetRole() KeyRole
func (*EldestChainLink) ToDisplayString ¶ added in v1.0.27
func (s *EldestChainLink) ToDisplayString() string
func (*EldestChainLink) Type ¶ added in v1.0.27
func (s *EldestChainLink) Type() string
type EldestSeqnoMissingError ¶ added in v1.0.27
type EldestSeqnoMissingError struct{}
func (EldestSeqnoMissingError) Error ¶ added in v1.0.27
func (e EldestSeqnoMissingError) Error() string
type EmptyKeyRing ¶
type EmptyKeyRing struct{}
func (EmptyKeyRing) DecryptionKeys ¶
func (k EmptyKeyRing) DecryptionKeys() []openpgp.Key
func (EmptyKeyRing) KeysByIdUsage ¶
type EncryptionReason ¶ added in v1.0.18
type EncryptionReason string
const ( EncryptionReasonChatLocalStorage EncryptionReason = "Keybase-Chat-Local-Storage-1" EncryptionReasonChatMessage EncryptionReason = "Keybase-Chat-Message-1" EncryptionReasonTeamsLocalStorage EncryptionReason = "Keybase-Teams-Local-Storage-1" EncryptionReasonErasableKVLocalStorage EncryptionReason = "Keybase-Erasable-KV-Local-Storage-1" )
func (EncryptionReason) Bytes ¶ added in v1.0.18
func (r EncryptionReason) Bytes() []byte
type Engine2 ¶
type Engine2 interface { Run(MetaContext) error Prereqs() EnginePrereqs UIConsumer }
type EnginePrereqs ¶
type Env ¶
type Env struct { sync.RWMutex HomeFinder HomeFinder Test *TestParameters // contains filtered or unexported fields }
func NewEnv ¶
func NewEnv(cmd CommandLine, config ConfigReader, getLog LogGetter) *Env
func (*Env) AllowPTrace ¶ added in v1.0.48
func (*Env) DarwinForceSecretStoreFile ¶ added in v1.0.34
func (*Env) GetAPIDump ¶
func (*Env) GetAPITimeout ¶
func (*Env) GetAllowRoot ¶ added in v1.0.48
func (*Env) GetAppType ¶ added in v1.0.21
func (*Env) GetAutoFork ¶
func (*Env) GetAutoWallet ¶ added in v1.0.48
Automatically create a wallet for the logged-in user.
func (*Env) GetAvatarSource ¶ added in v1.0.46
func (*Env) GetBGIdentifierDisabled ¶ added in v1.0.19
func (*Env) GetBundledCA ¶
func (*Env) GetCacheDir ¶
func (*Env) GetChatDbFilename ¶ added in v1.0.18
func (*Env) GetChatDelivererInterval ¶ added in v1.0.19
func (*Env) GetChatInboxSourceLocalizeThreads ¶ added in v1.0.34
func (*Env) GetChatMemberType ¶ added in v1.0.29
GetChatMemberType returns the default member type for new conversations.
func (*Env) GetCodeSigningKIDs ¶
func (*Env) GetCommandLine ¶
func (e *Env) GetCommandLine() CommandLine
func (*Env) GetConfig ¶
func (e *Env) GetConfig() ConfigReader
func (*Env) GetConfigDir ¶
func (*Env) GetConfigFilename ¶
func (*Env) GetConfigWriter ¶
func (e *Env) GetConfigWriter() ConfigWriter
func (*Env) GetConvSourceType ¶ added in v1.0.18
func (*Env) GetDataDir ¶
func (*Env) GetDbFilename ¶
func (*Env) GetDefaultLogFile ¶
func (*Env) GetDeviceCloneStateFilename ¶
func (*Env) GetDeviceID ¶
func (*Env) GetDeviceIDForUID ¶ added in v1.0.19
func (*Env) GetDeviceIDForUsername ¶ added in v1.0.19
func (e *Env) GetDeviceIDForUsername(u NormalizedUsername) keybase1.DeviceID
func (*Env) GetDisplayRawUntrustedOutput ¶
func (*Env) GetDoLogForward ¶
func (*Env) GetDuration ¶
func (*Env) GetEmailOrUsername ¶
func (*Env) GetFeatureFlags ¶ added in v1.0.19
func (e *Env) GetFeatureFlags() FeatureFlags
func (*Env) GetGpgHome ¶
func (*Env) GetGpgOptions ¶
func (*Env) GetGregorDisabled ¶ added in v1.0.17
func (*Env) GetGregorPingInterval ¶ added in v1.0.17
func (*Env) GetGregorPingTimeout ¶ added in v1.0.19
func (*Env) GetGregorSaveInterval ¶ added in v1.0.16
func (*Env) GetGregorURI ¶ added in v1.0.16
func (*Env) GetInboxSourceType ¶ added in v1.0.19
func (*Env) GetInfoDir ¶ added in v1.0.39
func (*Env) GetInstallID ¶ added in v1.0.16
func (*Env) GetKBFSInfoPath ¶ added in v1.0.17
GetKBFSInfoPath returns path to info file written by the KBFS service after startup
func (*Env) GetLevelDBNumFiles ¶ added in v1.0.27
func (*Env) GetLinkCacheCleanDur ¶
func (*Env) GetLinkCacheSize ¶
func (*Env) GetLocalRPCDebug ¶
func (*Env) GetLocalTrackMaxAge ¶
func (*Env) GetLogFile ¶
func (*Env) GetLogFormat ¶
func (*Env) GetLogPrefix ¶
func (*Env) GetMerkleKIDs ¶
func (*Env) GetMountDir ¶
func (*Env) GetNegBool ¶
func (e *Env) GetNegBool(def bool, flist []NegBoolFunc) bool
GetNegBool gets a negatable bool. You can give it a list of functions, and also possible negations for those functions.
func (*Env) GetNoPinentry ¶
func (*Env) GetPayloadCacheSize ¶ added in v1.0.41
func (*Env) GetPidFile ¶
func (*Env) GetPinentry ¶
func (*Env) GetProofCacheLongDur ¶
func (*Env) GetProofCacheMediumDur ¶
func (*Env) GetProofCacheShortDur ¶
func (*Env) GetProofCacheSize ¶
func (*Env) GetPvlKitFilename ¶ added in v1.0.21
GetPvlKitFilename gets the path to pvl kit file. Its value is usually "" which means to use the server.
func (*Env) GetRunMode ¶
func (*Env) GetRunModeAsString ¶
func (*Env) GetRuntimeDir ¶
func (*Env) GetSandboxCacheDir ¶ added in v1.0.18
func (*Env) GetScraperTimeout ¶
func (*Env) GetSecretKeyringTemplate ¶
func (*Env) GetServerURI ¶
func (*Env) GetServiceInfoPath ¶
GetServiceInfoPath returns path to info file written by the Keybase service after startup
func (*Env) GetServiceSpawnDir ¶
func (*Env) GetServiceType ¶
func (*Env) GetSessionFilename ¶
func (*Env) GetSkipLogoutIfRevokedCheck ¶ added in v1.0.46
If true, do not logout after user.key_change notification handler decides that current device has been revoked.
func (*Env) GetSlowGregorConn ¶ added in v1.0.46
func (*Env) GetSocketBindFile ¶ added in v1.0.18
func (*Env) GetSocketDialFiles ¶ added in v1.0.18
func (*Env) GetStandalone ¶
func (*Env) GetStoredSecretAccessGroup ¶
func (*Env) GetStoredSecretServiceName ¶
func (*Env) GetStringList ¶
func (*Env) GetTorHiddenAddress ¶
func (*Env) GetTorMode ¶
func (*Env) GetTorProxy ¶
func (*Env) GetUIDMapFullNameCacheSize ¶ added in v1.0.33
func (*Env) GetUPAKCacheSize ¶ added in v1.0.31
func (*Env) GetUpdateDefaultInstructions ¶
func (*Env) GetUpdateDisabled ¶ added in v1.0.16
func (*Env) GetUpdateLastChecked ¶
func (*Env) GetUpdatePreferenceAuto ¶
func (*Env) GetUpdatePreferenceSkip ¶
func (*Env) GetUpdatePreferenceSnoozeUntil ¶
func (*Env) GetUpdateURL ¶
func (*Env) GetUpdaterConfig ¶ added in v1.0.16
func (e *Env) GetUpdaterConfig() UpdaterConfigReader
func (*Env) GetUpdaterConfigFilename ¶ added in v1.0.16
func (*Env) GetUpgradePerUserKey ¶ added in v1.0.27
Upgrade sigchains to contain per-user-keys.
func (*Env) GetUserCacheMaxAge ¶
func (*Env) GetUsername ¶
func (e *Env) GetUsername() NormalizedUsername
func (*Env) GetUsernameForUID ¶
func (e *Env) GetUsernameForUID(u keybase1.UID) NormalizedUsername
func (*Env) GetVDebugSetting ¶
func (*Env) RememberPassphrase ¶ added in v1.0.43
func (*Env) RunningInCI ¶ added in v1.0.27
func (*Env) SendSystemChatMessages ¶ added in v1.0.48
func (*Env) SetCommandLine ¶
func (e *Env) SetCommandLine(cmd CommandLine)
func (*Env) SetConfig ¶
func (e *Env) SetConfig(r ConfigReader, w ConfigWriter)
func (*Env) SetUpdatePreferenceAuto ¶
func (*Env) SetUpdatePreferenceSkip ¶
func (*Env) SetUpdatePreferenceSnoozeUntil ¶
func (*Env) SetUpdaterConfig ¶ added in v1.0.16
func (e *Env) SetUpdaterConfig(r UpdaterConfigReader)
func (*Env) UseTimeClockForNISTs ¶ added in v1.0.48
func (*Env) WantsSystemd ¶ added in v1.0.34
type EphemeralPairwiseMACsMissingUIDsError ¶
func (EphemeralPairwiseMACsMissingUIDsError) Error ¶
func (e EphemeralPairwiseMACsMissingUIDsError) Error() string
func (EphemeralPairwiseMACsMissingUIDsError) ToStatus ¶
func (e EphemeralPairwiseMACsMissingUIDsError) ToStatus() (ret keybase1.Status)
type ErrorUnwrapper ¶
type ErrorUnwrapper struct {
Contextified
}
func NewContextifiedErrorUnwrapper ¶ added in v1.0.30
func NewContextifiedErrorUnwrapper(g *GlobalContext) ErrorUnwrapper
func (ErrorUnwrapper) MakeArg ¶
func (c ErrorUnwrapper) MakeArg() interface{}
func (ErrorUnwrapper) UnwrapError ¶
func (c ErrorUnwrapper) UnwrapError(arg interface{}) (appError error, dispatchError error)
type ExistsError ¶ added in v1.0.19
type ExistsError struct {
Msg string
}
func (ExistsError) Error ¶ added in v1.0.19
func (e ExistsError) Error() string
func (ExistsError) ToStatus ¶ added in v1.0.19
func (e ExistsError) ToStatus() keybase1.Status
type ExportableError ¶
type ExportedStream ¶
type ExportedStream struct {
// contains filtered or unexported fields
}
func (*ExportedStream) Export ¶
func (s *ExportedStream) Export() keybase1.Stream
type ExportedStreams ¶
func NewExportedStreams ¶
func NewExportedStreams() *ExportedStreams
func (*ExportedStreams) ExportReader ¶
func (s *ExportedStreams) ExportReader(r ReadCloseSeeker) keybase1.Stream
func (*ExportedStreams) ExportWriter ¶
func (s *ExportedStreams) ExportWriter(w io.WriteCloser) keybase1.Stream
func (*ExportedStreams) GetReader ¶
func (s *ExportedStreams) GetReader(st keybase1.Stream) (ret io.ReadCloser, err error)
func (*ExportedStreams) GetWriter ¶
func (s *ExportedStreams) GetWriter(st keybase1.Stream) (ret io.WriteCloser, err error)
type ExternalAPI ¶
type ExternalAPI interface { Get(APIArg) (*ExternalAPIRes, error) Post(APIArg) (*ExternalAPIRes, error) GetHTML(APIArg) (*ExternalHTMLRes, error) GetText(APIArg) (*ExternalTextRes, error) PostHTML(APIArg) (*ExternalHTMLRes, error) }
type ExternalAPIEngine ¶
type ExternalAPIEngine struct {
BaseAPIEngine
}
func (*ExternalAPIEngine) DoRequest ¶
func (api *ExternalAPIEngine) DoRequest( arg APIArg, req *http.Request, restype XAPIResType) ( ar *ExternalAPIRes, hr *ExternalHTMLRes, tr *ExternalTextRes, err error)
func (*ExternalAPIEngine) Get ¶
func (api *ExternalAPIEngine) Get(arg APIArg) (res *ExternalAPIRes, err error)
func (*ExternalAPIEngine) GetHTML ¶
func (api *ExternalAPIEngine) GetHTML(arg APIArg) (res *ExternalHTMLRes, err error)
func (*ExternalAPIEngine) GetText ¶
func (api *ExternalAPIEngine) GetText(arg APIArg) (res *ExternalTextRes, err error)
func (*ExternalAPIEngine) Post ¶
func (api *ExternalAPIEngine) Post(arg APIArg) (res *ExternalAPIRes, err error)
func (*ExternalAPIEngine) PostHTML ¶
func (api *ExternalAPIEngine) PostHTML(arg APIArg) (res *ExternalHTMLRes, err error)
type ExternalAPIRes ¶
type ExternalHTMLRes ¶
type ExternalServicesCollector ¶ added in v1.0.18
type ExternalServicesCollector interface { GetServiceType(n string) ServiceType ListProofCheckers(mode RunMode) []string }
type ExternalTextRes ¶
type FailedAssertionError ¶
type FailedAssertionError struct {
// contains filtered or unexported fields
}
func (FailedAssertionError) Error ¶
func (u FailedAssertionError) Error() string
type FakeGregorDismisser ¶ added in v1.0.16
type FakeGregorDismisser struct {
// contains filtered or unexported fields
}
func (*FakeGregorDismisser) DismissItem ¶ added in v1.0.16
func (f *FakeGregorDismisser) DismissItem(_ context.Context, cli gregor1.IncomingInterface, id gregor.MsgID) error
func (*FakeGregorDismisser) LocalDismissItem ¶ added in v1.0.39
type FeatureFlags ¶ added in v1.0.19
type FeatureFlags []Feature
func StringToFeatureFlags ¶ added in v1.0.19
func StringToFeatureFlags(s string) (ret FeatureFlags)
StringToFeatureFlags returns a set of feature flags
func (FeatureFlags) Admin ¶ added in v1.0.19
func (set FeatureFlags) Admin() bool
Admin returns true if the admin feature set is on
func (FeatureFlags) Empty ¶ added in v1.0.19
func (set FeatureFlags) Empty() bool
type File ¶
type File struct {
// contains filtered or unexported fields
}
File defines a default SafeWriter implementation
type FileExecError ¶ added in v1.0.16
type FileExecError struct {
Path string
}
func (FileExecError) Error ¶ added in v1.0.16
func (e FileExecError) Error() string
type FirstErrorPicker ¶
type FirstErrorPicker struct {
// contains filtered or unexported fields
}
func (*FirstErrorPicker) Error ¶
func (p *FirstErrorPicker) Error() error
func (*FirstErrorPicker) Push ¶
func (p *FirstErrorPicker) Push(e error)
type FishyMsgpackError ¶
type FishyMsgpackError struct {
// contains filtered or unexported fields
}
func (FishyMsgpackError) Error ¶
func (e FishyMsgpackError) Error() string
type FullSelfer ¶ added in v1.0.19
type FullSelfer interface { WithSelf(ctx context.Context, f func(u *User) error) error WithSelfForcePoll(ctx context.Context, f func(u *User) error) error WithUser(arg LoadUserArg, f func(u *User) error) (err error) HandleUserChanged(u keybase1.UID) error Update(ctx context.Context, u *User) error New() FullSelfer OnLogin() error }
type GPGKey ¶
type GPGKey struct { Contextified // contains filtered or unexported fields }
GPGKey is a shell around gpg cli commands that implements the GenericKey interface.
func NewGPGKey ¶
func NewGPGKey(g *GlobalContext, fp *PGPFingerprint, kid keybase1.KID, ui GPGUI, ct keybase1.ClientType) *GPGKey
func (*GPGKey) CanDecrypt ¶
func (*GPGKey) CanEncrypt ¶
func (*GPGKey) CheckSecretKey ¶
func (*GPGKey) DecryptFromString ¶
func (*GPGKey) EncryptToString ¶
func (g *GPGKey) EncryptToString(plaintext []byte, sender GenericKey) (ciphertext string, err error)
func (*GPGKey) ExportPublicAndPrivate ¶ added in v1.0.18
func (g *GPGKey) ExportPublicAndPrivate() (RawPublicKey, RawPrivateKey, error)
func (*GPGKey) GetAlgoType ¶
func (*GPGKey) GetBinaryKID ¶ added in v1.0.18
func (*GPGKey) GetFingerprintP ¶
func (g *GPGKey) GetFingerprintP() *PGPFingerprint
func (*GPGKey) HasSecretKey ¶
func (*GPGKey) SecretSymmetricKey ¶ added in v1.0.18
func (g *GPGKey) SecretSymmetricKey(reason EncryptionReason) (NaclSecretBoxKey, error)
func (*GPGKey) SignToString ¶
func (*GPGKey) VerboseDescription ¶
func (*GPGKey) VerifyString ¶
func (*GPGKey) VerifyStringAndExtract ¶
type GPGUI ¶
type GPGUI interface { keybase1.GpgUiInterface }
type GPGUnavailableError ¶ added in v1.0.16
type GPGUnavailableError struct{}
func (GPGUnavailableError) Error ¶ added in v1.0.16
func (g GPGUnavailableError) Error() string
func (GPGUnavailableError) ToStatus ¶ added in v1.0.16
func (e GPGUnavailableError) ToStatus() keybase1.Status
type GenericChainLink ¶
type GenericChainLink struct {
*ChainLink
}
func (*GenericChainLink) BaseToTrackingStatement ¶
func (g *GenericChainLink) BaseToTrackingStatement(state keybase1.ProofState) *jsonw.Wrapper
func (*GenericChainLink) DoOwnNewLinkFromServerNotifications ¶
func (g *GenericChainLink) DoOwnNewLinkFromServerNotifications(glob *GlobalContext)
func (*GenericChainLink) GetArmoredSig ¶
func (g *GenericChainLink) GetArmoredSig() string
func (*GenericChainLink) GetDelegatedKid ¶
func (g *GenericChainLink) GetDelegatedKid() (kid keybase1.KID)
func (*GenericChainLink) GetDevice ¶
func (g *GenericChainLink) GetDevice() *Device
func (*GenericChainLink) GetPGPFingerprint ¶
func (g *GenericChainLink) GetPGPFingerprint() *PGPFingerprint
func (*GenericChainLink) GetPGPFullHash ¶
func (g *GenericChainLink) GetPGPFullHash() string
func (*GenericChainLink) GetParentKid ¶
func (g *GenericChainLink) GetParentKid() (kid keybase1.KID)
func (*GenericChainLink) GetRole ¶
func (g *GenericChainLink) GetRole() KeyRole
func (*GenericChainLink) GetSeqno ¶
func (g *GenericChainLink) GetSeqno() keybase1.Seqno
func (*GenericChainLink) GetSigID ¶
func (g *GenericChainLink) GetSigID() keybase1.SigID
func (*GenericChainLink) GetUID ¶
func (g *GenericChainLink) GetUID() keybase1.UID
func (*GenericChainLink) GetUsername ¶
func (g *GenericChainLink) GetUsername() string
func (*GenericChainLink) IsDirectlyRevoked ¶ added in v1.0.28
func (g *GenericChainLink) IsDirectlyRevoked() bool
func (*GenericChainLink) IsRevocationIsh ¶
func (g *GenericChainLink) IsRevocationIsh() bool
func (*GenericChainLink) IsRevoked ¶
func (g *GenericChainLink) IsRevoked() bool
func (*GenericChainLink) ToDebugString ¶
func (g *GenericChainLink) ToDebugString() string
func (*GenericChainLink) ToDisplayString ¶
func (g *GenericChainLink) ToDisplayString() string
func (*GenericChainLink) ToSigChainLocation ¶ added in v1.0.27
func (g *GenericChainLink) ToSigChainLocation() keybase1.SigChainLocation
func (*GenericChainLink) Type ¶
func (g *GenericChainLink) Type() string
func (*GenericChainLink) VerifyReverseSig ¶
func (g *GenericChainLink) VerifyReverseSig(ckf ComputedKeyFamily) error
type GenericKey ¶
type GenericKey interface { GetKID() keybase1.KID GetBinaryKID() keybase1.BinaryKID GetAlgoType() AlgoType // Sign to an ASCII signature (which includes the message // itself) and return it, along with a derived ID. SignToString(msg []byte) (sig string, id keybase1.SigID, err error) // Verify that the given signature is valid and extracts the // embedded message from it. Also returns the signature ID. VerifyStringAndExtract(ctx VerifyContext, sig string) (msg []byte, id keybase1.SigID, err error) // Verify that the given signature is valid and that its // embedded message matches the given one. Also returns the // signature ID. VerifyString(ctx VerifyContext, sig string, msg []byte) (id keybase1.SigID, err error) // Encrypt to an ASCII armored encryption; optionally include a sender's // (private) key so that we can provably see who sent the message. EncryptToString(plaintext []byte, sender GenericKey) (ciphertext string, err error) // Decrypt the output of Encrypt above; provide the plaintext and also // the KID of the key that sent the message (if applicable). DecryptFromString(ciphertext string) (msg []byte, sender keybase1.KID, err error) // Derive a secret key from a DH secret key SecretSymmetricKey(reason EncryptionReason) (NaclSecretBoxKey, error) VerboseDescription() string CheckSecretKey() error CanSign() bool CanEncrypt() bool CanDecrypt() bool HasSecretKey() bool Encode() (string, error) // encode public key to string // ExportPublicAndPrivate to special-purpose types so there is no way we can // accidentally reverse them. ExportPublicAndPrivate() (public RawPublicKey, private RawPrivateKey, err error) }
func ImportKeypairFromKID ¶
func ImportKeypairFromKID(k keybase1.KID) (key GenericKey, err error)
func NaclVerifyAndExtract ¶
func NaclVerifyAndExtract(s string) (key GenericKey, payload []byte, fullBody []byte, err error)
NaclVerifyAndExtract interprets the given string as a NaCl-signed messaged, in the keybase NaclSigInfo (v1) format. It will check that the signature verified, and if so, will return the key that was used for the verification, the payload of the signature, the full body of the decoded SignInfo, and an error
type GetCacheDurationFunc ¶ added in v1.0.19
type GetCacheDurationFunc func(keybase1.Identify2ResUPK2) time.Duration
type GetCheckTimeFunc ¶
type GetCheckTimeFunc func(keybase1.Identify2ResUPK2) keybase1.Time
type GetTlfPseudonymEither ¶ added in v1.0.21
type GetTlfPseudonymEither struct { // Exactly one of these 2 fields is nil. Err error Info *TlfPseudonymServerInfo }
func GetTlfPseudonyms ¶ added in v1.0.21
func GetTlfPseudonyms(ctx context.Context, g *GlobalContext, pnyms []TlfPseudonym) ([]GetTlfPseudonymEither, error)
GetTlfPseudonyms fetches info for a list of pseudonyms. The output structs are returned in the order corresponding to the inputs. The top-level error is filled if the entire request fails. The each-struct errors may be filled for per-pseudonym errors.
type GlobalContext ¶
type GlobalContext struct { Log logger.Logger // Handles all logging VDL *VDebugLog // verbose debug log Env *Env // Env variables, cmdline args & config SKBKeyringMu *sync.Mutex // Protects all attempts to mutate the SKBKeyringFile Keyrings *Keyrings // Gpg Keychains holding keys API API // How to make a REST call to the server Resolver Resolver // cache of resolve results LocalDb *JSONLocalDb // Local DB for cache LocalChatDb *JSONLocalDb // Local DB for cache MerkleClient *MerkleClient // client for querying server's merkle sig tree XAPI ExternalAPI // for contacting Twitter, Github, etc. Output io.Writer // where 'Stdout'-style output goes DNSNSFetcher DNSNameServerFetcher // The mobile apps potentially pass an implementor of this interface which is used to grab currently configured DNS name servers AppState *AppState // The state of focus for the currently running instance of the app ChatHelper ChatHelper // conveniently send chat messages RPCCanceller *RPCCanceller // register live RPCs so they can be cancelleed en masse ProofCache *ProofCache // where to cache proof results PayloadCache *PayloadCache // cache of ChainLink payload json wrappers GpgClient *GpgCLI // A standard GPG-client (optional) ShutdownHooks []ShutdownHook // on shutdown, fire these... SocketInfo Socket // which socket to bind/connect to SocketWrapper *SocketWrapper // only need one connection per LoopbackListener *LoopbackListener // If we're in loopback mode, we'll connect through here XStreams *ExportedStreams // a table of streams we've exported to the daemon (or vice-versa) Timers *TimerSet // Which timers are currently configured on UI UI // Interact with the UI Service bool // whether we're in server mode Standalone bool // whether we're launched as standalone command ConnectionManager *ConnectionManager // keep tabs on all active client connections NotifyRouter *NotifyRouter // How to route notifications // How to route UIs. Nil if we're in standalone mode or in // tests, and non-nil in service mode. UIRouter UIRouter // How to route UIs Services ExternalServicesCollector // All known external services UIDMapper UIDMapper // maps from UID to Usernames ExitCode keybase1.ExitCode // Value to return to OS on Exit() RateLimits *RateLimits // tracks the last time certain actions were taken GregorDismisser GregorDismisser // for dismissing gregor items that we've handled GregorListener GregorListener // for alerting about clients connecting and registering UI protocols UserChangedHandlers []UserChangedHandler // a list of handlers that deal generically with userchanged events ConnectivityMonitor ConnectivityMonitor // Detect whether we're connected or not. StandaloneChatConnector StandaloneChatConnector // Can be overloaded by tests to get an improvement in performance NewTriplesec func(pw []byte, salt []byte) (Triplesec, error) // Options specified for testing only TestOptions GlobalTestOptions ActiveDevice *ActiveDevice NetContext context.Context // contains filtered or unexported fields }
func MakeThinGlobalContextForTesting ¶ added in v1.0.31
func MakeThinGlobalContextForTesting(t TestingTB) *GlobalContext
func NewGlobalContext ¶
func NewGlobalContext() *GlobalContext
Note: all these sync.Mutex fields are pointers so that the Clone funcs work.
func NewGlobalContextInit ¶
func NewGlobalContextInit() *GlobalContext
func (*GlobalContext) AddLoginHook ¶ added in v1.0.16
func (g *GlobalContext) AddLoginHook(hook LoginHook)
func (*GlobalContext) AddLogoutHook ¶ added in v1.0.16
func (g *GlobalContext) AddLogoutHook(hook LogoutHook)
func (*GlobalContext) AddUserChangedHandler ¶ added in v1.0.19
func (g *GlobalContext) AddUserChangedHandler(h UserChangedHandler)
func (*GlobalContext) BindToSocket ¶
func (g *GlobalContext) BindToSocket() (net.Listener, error)
func (*GlobalContext) BustLocalUserCache ¶ added in v1.0.19
func (g *GlobalContext) BustLocalUserCache(u keybase1.UID)
func (*GlobalContext) CTimeBuckets ¶ added in v1.0.43
func (g *GlobalContext) CTimeBuckets(ctx context.Context) (context.Context, *profiling.TimeBuckets)
func (*GlobalContext) CTimeTracer ¶ added in v1.0.31
func (g *GlobalContext) CTimeTracer(ctx context.Context, label string, enabled bool) profiling.TimeTracer
func (*GlobalContext) CTrace ¶ added in v1.0.19
func (g *GlobalContext) CTrace(ctx context.Context, msg string, f func() error) func()
func (*GlobalContext) CTraceOK ¶ added in v1.0.19
func (g *GlobalContext) CTraceOK(ctx context.Context, msg string, f func() bool) func()
func (*GlobalContext) CTraceTimed ¶ added in v1.0.19
func (g *GlobalContext) CTraceTimed(ctx context.Context, msg string, f func() error) func()
func (*GlobalContext) CVTrace ¶ added in v1.0.19
func (g *GlobalContext) CVTrace(ctx context.Context, lev VDebugLevel, msg string, f func() error) func()
func (*GlobalContext) CVTraceOK ¶ added in v1.0.19
func (g *GlobalContext) CVTraceOK(ctx context.Context, lev VDebugLevel, msg string, f func() bool) func()
func (*GlobalContext) CVTraceTimed ¶
func (g *GlobalContext) CVTraceTimed(ctx context.Context, lev VDebugLevel, msg string, f func() error) func()
func (*GlobalContext) CallLoginHooks ¶ added in v1.0.16
func (g *GlobalContext) CallLoginHooks()
func (*GlobalContext) CallLogoutHooks ¶ added in v1.0.16
func (g *GlobalContext) CallLogoutHooks()
func (*GlobalContext) CardCache ¶ added in v1.0.18
func (g *GlobalContext) CardCache() *UserCardCache
func (*GlobalContext) ClearPerUserKeyring ¶ added in v1.0.27
func (g *GlobalContext) ClearPerUserKeyring()
func (*GlobalContext) Clock ¶
func (g *GlobalContext) Clock() clockwork.Clock
func (*GlobalContext) CloneWithNetContext ¶ added in v1.0.19
func (g *GlobalContext) CloneWithNetContext(netCtx context.Context) *GlobalContext
func (*GlobalContext) CloneWithNetContextAndNewLogger ¶ added in v1.0.19
func (g *GlobalContext) CloneWithNetContextAndNewLogger(netCtx context.Context) *GlobalContext
func (*GlobalContext) ConfigReload ¶
func (g *GlobalContext) ConfigReload() error
func (*GlobalContext) Configure ¶
func (g *GlobalContext) Configure(line CommandLine, usage Usage) error
func (*GlobalContext) ConfigureAPI ¶
func (g *GlobalContext) ConfigureAPI() error
func (*GlobalContext) ConfigureCaches ¶
func (g *GlobalContext) ConfigureCaches() error
func (*GlobalContext) ConfigureCommand ¶
func (g *GlobalContext) ConfigureCommand(line CommandLine, cmd Command) error
func (*GlobalContext) ConfigureConfig ¶
func (g *GlobalContext) ConfigureConfig() error
func (*GlobalContext) ConfigureExportedStreams ¶
func (g *GlobalContext) ConfigureExportedStreams() error
func (*GlobalContext) ConfigureKeyring ¶
func (g *GlobalContext) ConfigureKeyring() error
func (*GlobalContext) ConfigureLogging ¶
func (g *GlobalContext) ConfigureLogging() error
func (*GlobalContext) ConfigureMerkleClient ¶
func (g *GlobalContext) ConfigureMerkleClient() error
func (*GlobalContext) ConfigureSocketInfo ¶
func (g *GlobalContext) ConfigureSocketInfo() (err error)
func (*GlobalContext) ConfigureTimers ¶
func (g *GlobalContext) ConfigureTimers() error
func (*GlobalContext) ConfigureUpdaterConfig ¶ added in v1.0.16
func (g *GlobalContext) ConfigureUpdaterConfig() error
func (*GlobalContext) ConfigureUsage ¶
func (g *GlobalContext) ConfigureUsage(usage Usage) error
func (*GlobalContext) ExitTrace ¶ added in v1.0.19
func (g *GlobalContext) ExitTrace(msg string, f func() error) func()
func (*GlobalContext) ExitTraceOK ¶ added in v1.0.19
func (g *GlobalContext) ExitTraceOK(msg string, f func() bool) func()
func (*GlobalContext) FlushCaches ¶ added in v1.0.41
func (g *GlobalContext) FlushCaches()
func (*GlobalContext) GetAPI ¶ added in v1.0.18
func (g *GlobalContext) GetAPI() API
func (*GlobalContext) GetAllUserNames ¶
func (g *GlobalContext) GetAllUserNames() (NormalizedUsername, []NormalizedUsername, error)
func (*GlobalContext) GetAppType ¶ added in v1.0.22
func (g *GlobalContext) GetAppType() AppType
to implement ProofContext
func (*GlobalContext) GetCacheDir ¶
func (g *GlobalContext) GetCacheDir() string
func (*GlobalContext) GetClock ¶
func (g *GlobalContext) GetClock() clockwork.Clock
func (*GlobalContext) GetConfigDir ¶ added in v1.0.17
func (g *GlobalContext) GetConfigDir() string
func (*GlobalContext) GetConfiguredAccounts ¶
func (g *GlobalContext) GetConfiguredAccounts(ctx context.Context) ([]keybase1.ConfiguredAccount, error)
func (*GlobalContext) GetDNSNameServerFetcher ¶ added in v1.0.21
func (g *GlobalContext) GetDNSNameServerFetcher() DNSNameServerFetcher
func (*GlobalContext) GetDataDir ¶ added in v1.0.18
func (g *GlobalContext) GetDataDir() string
func (*GlobalContext) GetDeviceEKStorage ¶ added in v1.0.46
func (g *GlobalContext) GetDeviceEKStorage() DeviceEKStorage
func (*GlobalContext) GetEKLib ¶ added in v1.0.46
func (g *GlobalContext) GetEKLib() EKLib
func (*GlobalContext) GetEnv ¶ added in v1.0.21
func (g *GlobalContext) GetEnv() *Env
func (*GlobalContext) GetExternalAPI ¶ added in v1.0.18
func (g *GlobalContext) GetExternalAPI() ExternalAPI
func (*GlobalContext) GetFullSelfer ¶ added in v1.0.19
func (g *GlobalContext) GetFullSelfer() FullSelfer
func (*GlobalContext) GetGpgClient ¶
func (g *GlobalContext) GetGpgClient() *GpgCLI
func (*GlobalContext) GetImplicitTeamConflictInfoCacher ¶ added in v1.0.39
func (g *GlobalContext) GetImplicitTeamConflictInfoCacher() LRUer
func (*GlobalContext) GetKBFSInfoPath ¶ added in v1.0.17
func (g *GlobalContext) GetKBFSInfoPath() string
GetKBFSInfoPath returns path to info file written by the KBFS service after startup
func (*GlobalContext) GetKVStore ¶ added in v1.0.33
func (g *GlobalContext) GetKVStore() KVStorer
func (*GlobalContext) GetLog ¶ added in v1.0.16
func (g *GlobalContext) GetLog() logger.Logger
func (*GlobalContext) GetLogDir ¶ added in v1.0.17
func (g *GlobalContext) GetLogDir() string
func (*GlobalContext) GetLogf ¶ added in v1.0.17
func (g *GlobalContext) GetLogf() logger.Loggerf
GetLogf returns a logger with a minimal formatter style interface
func (*GlobalContext) GetMeUV ¶ added in v1.0.48
func (g *GlobalContext) GetMeUV(ctx context.Context) (res keybase1.UserVersion, err error)
func (*GlobalContext) GetMerkleClient ¶ added in v1.0.19
func (g *GlobalContext) GetMerkleClient() *MerkleClient
func (*GlobalContext) GetMountDir ¶ added in v1.0.17
func (g *GlobalContext) GetMountDir() (string, error)
func (*GlobalContext) GetMyClientDetails ¶
func (g *GlobalContext) GetMyClientDetails() keybase1.ClientDetails
func (*GlobalContext) GetMyUID ¶
func (g *GlobalContext) GetMyUID() keybase1.UID
func (*GlobalContext) GetNetContext ¶ added in v1.0.19
func (g *GlobalContext) GetNetContext() context.Context
func (*GlobalContext) GetOutOfDateInfo ¶ added in v1.0.19
func (g *GlobalContext) GetOutOfDateInfo() keybase1.OutOfDateInfo
func (*GlobalContext) GetPerUserKeyring ¶ added in v1.0.27
func (g *GlobalContext) GetPerUserKeyring() (ret *PerUserKeyring, err error)
GetPerUserKeyring recreates PerUserKeyring if the uid changes or this is none installed.
func (*GlobalContext) GetPvlSource ¶ added in v1.0.21
func (g *GlobalContext) GetPvlSource() PvlSource
to implement ProofContext
func (*GlobalContext) GetRunMode ¶
func (g *GlobalContext) GetRunMode() RunMode
func (*GlobalContext) GetRuntimeDir ¶
func (g *GlobalContext) GetRuntimeDir() string
func (*GlobalContext) GetServerURI ¶ added in v1.0.18
func (g *GlobalContext) GetServerURI() string
func (*GlobalContext) GetServiceInfoPath ¶ added in v1.0.17
func (g *GlobalContext) GetServiceInfoPath() string
GetServiceInfoPath returns path to info file written by the Keybase service after startup
func (*GlobalContext) GetSocket ¶
func (g *GlobalContext) GetSocket(clearError bool) (conn net.Conn, xp rpc.Transporter, isNew bool, err error)
func (*GlobalContext) GetStellar ¶ added in v1.0.48
func (g *GlobalContext) GetStellar() Stellar
func (*GlobalContext) GetStoredSecretAccessGroup ¶
func (g *GlobalContext) GetStoredSecretAccessGroup() string
func (*GlobalContext) GetStoredSecretServiceName ¶
func (g *GlobalContext) GetStoredSecretServiceName() string
func (*GlobalContext) GetTeamEKBoxStorage ¶ added in v1.0.46
func (g *GlobalContext) GetTeamEKBoxStorage() TeamEKBoxStorage
func (*GlobalContext) GetTeamLoader ¶ added in v1.0.27
func (g *GlobalContext) GetTeamLoader() TeamLoader
func (*GlobalContext) GetUPAKLoader ¶ added in v1.0.19
func (g *GlobalContext) GetUPAKLoader() UPAKLoader
func (*GlobalContext) GetUnforwardedLogger ¶
func (g *GlobalContext) GetUnforwardedLogger() (log UnforwardedLoggerWithLegacyInterface)
func (*GlobalContext) GetUserEKBoxStorage ¶ added in v1.0.46
func (g *GlobalContext) GetUserEKBoxStorage() UserEKBoxStorage
func (*GlobalContext) GetUsersWithStoredSecrets ¶
func (g *GlobalContext) GetUsersWithStoredSecrets(ctx context.Context) ([]string, error)
func (*GlobalContext) GetVDebugLog ¶ added in v1.0.19
func (g *GlobalContext) GetVDebugLog() *VDebugLog
func (*GlobalContext) HonorPGPExpireTime ¶ added in v1.0.48
func (g *GlobalContext) HonorPGPExpireTime(t int64) int64
HonorPGPExpireTime determines whether expiration time on PGP sigs should be honored during sigchain playback. For now, we don't see any reason not to, but we might find a situation in the future that makes PGP expiration times hard to work around. Return the expiration time (in seconds after the UTC Epoch) to "honor" it, and "0" to ignore it. So honor it.
func (*GlobalContext) HonorSigchainExpireTime ¶ added in v1.0.48
func (g *GlobalContext) HonorSigchainExpireTime(t int64) int64
HonorSigchainExpireTime determines whether expiration time on sigchain links should be honored or ignored. When keybase first started in 2014, there were some links that were intended to expire in 5 years. With the benefit of 5 years of expirience, we can now see little security rationale for this expiration, but tons of churn if we decided to force key rotations. So return "0" to mean we no longer will expire these keys automatically. They can of course be explicitly revoked. If you fork this client, feel free to return "t" meaning yes, honor the expiration time advertised in the sigchain. -- MK 2018.04.03
func (*GlobalContext) Identify2Cache ¶
func (g *GlobalContext) Identify2Cache() Identify2Cacher
func (*GlobalContext) Init ¶
func (g *GlobalContext) Init() *GlobalContext
func (*GlobalContext) IsOneshot ¶ added in v1.0.48
func (g *GlobalContext) IsOneshot(ctx context.Context) (bool, error)
func (*GlobalContext) KeyfamilyChanged ¶ added in v1.0.19
func (g *GlobalContext) KeyfamilyChanged(u keybase1.UID)
func (*GlobalContext) LinkCache ¶
func (g *GlobalContext) LinkCache() *LinkCache
func (*GlobalContext) LoadUserByUID ¶ added in v1.0.18
func (g *GlobalContext) LoadUserByUID(uid keybase1.UID) (*User, error)
func (*GlobalContext) LocalSigchainGuard ¶ added in v1.0.27
func (g *GlobalContext) LocalSigchainGuard() *LocalSigchainGuard
func (*GlobalContext) Logout ¶
func (g *GlobalContext) Logout() error
func (*GlobalContext) LogoutSelfCheck ¶ added in v1.0.34
func (g *GlobalContext) LogoutSelfCheck() error
LogoutSelfCheck checks with the API server to see if this uid+device pair should logout.
func (*GlobalContext) MakeAssertionContext ¶ added in v1.0.18
func (g *GlobalContext) MakeAssertionContext() AssertionContext
func (*GlobalContext) MakeLoopbackServer ¶
func (g *GlobalContext) MakeLoopbackServer() (l net.Listener, err error)
func (*GlobalContext) NewRPCLogFactory ¶ added in v1.0.17
func (g *GlobalContext) NewRPCLogFactory() *RPCLogFactory
func (*GlobalContext) OutputBytes ¶
func (g *GlobalContext) OutputBytes(b []byte)
func (*GlobalContext) OutputString ¶
func (g *GlobalContext) OutputString(s string)
func (*GlobalContext) OverrideUPAKLoader ¶ added in v1.0.19
func (g *GlobalContext) OverrideUPAKLoader(upak UPAKLoader)
func (*GlobalContext) PushShutdownHook ¶
func (g *GlobalContext) PushShutdownHook(sh ShutdownHook)
func (*GlobalContext) ReplaceSecretStore ¶ added in v1.0.43
func (g *GlobalContext) ReplaceSecretStore(ctx context.Context) error
ReplaceSecretStore gets the existing secret out of the existing secret store, creates a new secret store (could be a new type of SecretStore based on a config change), and inserts the secret into the new secret store.
func (*GlobalContext) ResetSocket ¶ added in v1.0.17
func (g *GlobalContext) ResetSocket(clearError bool) (net.Conn, rpc.Transporter, bool, error)
ResetSocket clears and returns a new socket
func (*GlobalContext) SKBFilenameForUser ¶
func (g *GlobalContext) SKBFilenameForUser(un NormalizedUsername) string
func (*GlobalContext) SecretStore ¶ added in v1.0.43
func (g *GlobalContext) SecretStore() *SecretStoreLocked
func (*GlobalContext) SetClock ¶ added in v1.0.17
func (g *GlobalContext) SetClock(c clockwork.Clock)
func (*GlobalContext) SetCommandLine ¶
func (g *GlobalContext) SetCommandLine(cmd CommandLine)
func (*GlobalContext) SetDNSNameServerFetcher ¶ added in v1.0.21
func (g *GlobalContext) SetDNSNameServerFetcher(d DNSNameServerFetcher)
func (*GlobalContext) SetDeviceEKStorage ¶ added in v1.0.46
func (g *GlobalContext) SetDeviceEKStorage(s DeviceEKStorage)
func (*GlobalContext) SetEKLib ¶ added in v1.0.46
func (g *GlobalContext) SetEKLib(ekLib EKLib)
func (*GlobalContext) SetImplicitTeamConflictInfoCacher ¶ added in v1.0.39
func (g *GlobalContext) SetImplicitTeamConflictInfoCacher(l LRUer)
func (*GlobalContext) SetPvlSource ¶ added in v1.0.21
func (g *GlobalContext) SetPvlSource(s PvlSource)
func (*GlobalContext) SetService ¶
func (g *GlobalContext) SetService()
func (*GlobalContext) SetServices ¶ added in v1.0.18
func (g *GlobalContext) SetServices(s ExternalServicesCollector)
func (*GlobalContext) SetStellar ¶ added in v1.0.48
func (g *GlobalContext) SetStellar(s Stellar)
func (*GlobalContext) SetTeamEKBoxStorage ¶ added in v1.0.46
func (g *GlobalContext) SetTeamEKBoxStorage(s TeamEKBoxStorage)
func (*GlobalContext) SetTeamLoader ¶ added in v1.0.27
func (g *GlobalContext) SetTeamLoader(l TeamLoader)
func (*GlobalContext) SetUI ¶
func (g *GlobalContext) SetUI(u UI)
func (*GlobalContext) SetUIDMapper ¶ added in v1.0.33
func (g *GlobalContext) SetUIDMapper(u UIDMapper)
func (*GlobalContext) SetUIRouter ¶
func (g *GlobalContext) SetUIRouter(u UIRouter)
func (*GlobalContext) SetUserEKBoxStorage ¶ added in v1.0.46
func (g *GlobalContext) SetUserEKBoxStorage(s UserEKBoxStorage)
func (*GlobalContext) Shutdown ¶
func (g *GlobalContext) Shutdown() error
Shutdown is called exactly once per-process and does whatever cleanup is necessary to shut down the server.
func (*GlobalContext) StartStandaloneChat ¶ added in v1.0.27
func (g *GlobalContext) StartStandaloneChat()
func (*GlobalContext) StartupMessage ¶
func (g *GlobalContext) StartupMessage()
func (*GlobalContext) Trace ¶
func (g *GlobalContext) Trace(msg string, f func() error) func()
func (*GlobalContext) TraceOK ¶ added in v1.0.19
func (g *GlobalContext) TraceOK(msg string, f func() bool) func()
func (*GlobalContext) TrackCache ¶
func (g *GlobalContext) TrackCache() *TrackCache
func (*GlobalContext) UserChanged ¶ added in v1.0.19
func (g *GlobalContext) UserChanged(u keybase1.UID)
type GlobalTestOptions ¶ added in v1.0.18
type GlobalTestOptions struct {
NoBug3964Repair bool
}
type GpgBaseKey ¶
type GpgBaseKey struct { Type string Trust string Bits int Algo int ID64 string Created int64 Expires int64 // contains filtered or unexported fields }
func (GpgBaseKey) AlgoString ¶
func (k GpgBaseKey) AlgoString() string
func (GpgBaseKey) CreatedString ¶
func (k GpgBaseKey) CreatedString() string
func (GpgBaseKey) ExpirationString ¶
func (k GpgBaseKey) ExpirationString() string
func (*GpgBaseKey) ParseBase ¶
func (k *GpgBaseKey) ParseBase(line *GpgIndexLine) (err error)
func (*GpgBaseKey) SetFingerprint ¶
func (k *GpgBaseKey) SetFingerprint(pgp *PGPFingerprint)
type GpgCLI ¶
type GpgCLI struct { Contextified // contains filtered or unexported fields }
func NewGpgCLI ¶
func NewGpgCLI(g *GlobalContext, logUI LogUI) *GpgCLI
func (*GpgCLI) ExportKey ¶
func (g *GpgCLI) ExportKey(k PGPKeyBundle, private bool, batch bool) (err error)
func (*GpgCLI) ImportKey ¶
func (g *GpgCLI) ImportKey(secret bool, fp PGPFingerprint, tty string) (*PGPKeyBundle, error)
func (*GpgCLI) Path ¶
Path returns the path of the gpg executable. Path is only available if CanExec() is true.
func (*GpgCLI) Run2 ¶
func (g *GpgCLI) Run2(arg RunGpg2Arg) (res RunGpg2Res)
func (*GpgCLI) SemanticVersion ¶ added in v1.0.17
type GpgFingerprinter ¶
type GpgFingerprinter interface {
SetFingerprint(pgp *PGPFingerprint)
}
type GpgIndexElement ¶
type GpgIndexElement interface {
ToKey() *GpgPrimaryKey
}
type GpgIndexError ¶
type GpgIndexError struct {
// contains filtered or unexported fields
}
func ErrorToGpgIndexError ¶
func ErrorToGpgIndexError(l int, e error) GpgIndexError
func (GpgIndexError) Error ¶
func (e GpgIndexError) Error() string
type GpgIndexLine ¶
type GpgIndexLine struct {
// contains filtered or unexported fields
}
func (GpgIndexLine) At ¶
func (g GpgIndexLine) At(i int) string
func (GpgIndexLine) IsNewKey ¶
func (g GpgIndexLine) IsNewKey() bool
func (GpgIndexLine) Len ¶
func (g GpgIndexLine) Len() int
type GpgIndexParser ¶
type GpgIndexParser struct { Contextified // contains filtered or unexported fields }
func NewGpgIndexParser ¶
func NewGpgIndexParser(g *GlobalContext) *GpgIndexParser
func (*GpgIndexParser) GetLine ¶
func (p *GpgIndexParser) GetLine() (ret *GpgIndexLine, err error)
func (*GpgIndexParser) Parse ¶
func (p *GpgIndexParser) Parse(stream io.Reader) (ki *GpgKeyIndex, err error)
func (*GpgIndexParser) ParseElement ¶
func (p *GpgIndexParser) ParseElement() (ret GpgIndexElement, err error)
func (*GpgIndexParser) ParseKey ¶
func (p *GpgIndexParser) ParseKey(l *GpgIndexLine) (ret *GpgPrimaryKey, err error)
func (*GpgIndexParser) PutbackLine ¶
func (p *GpgIndexParser) PutbackLine(line *GpgIndexLine)
func (*GpgIndexParser) Warn ¶
func (p *GpgIndexParser) Warn(w Warning)
type GpgKeyIndex ¶
type GpgKeyIndex struct { Keys []*GpgPrimaryKey Emails, Fingerprints, ID64s *BucketDict }
func NewGpgKeyIndex ¶
func NewGpgKeyIndex() *GpgKeyIndex
func (*GpgKeyIndex) AllFingerprints ¶
func (ki *GpgKeyIndex) AllFingerprints() []PGPFingerprint
func (*GpgKeyIndex) GetRowFunc ¶
func (ki *GpgKeyIndex) GetRowFunc() func() []string
func (*GpgKeyIndex) IndexKey ¶
func (ki *GpgKeyIndex) IndexKey(k *GpgPrimaryKey)
func (*GpgKeyIndex) Len ¶
func (ki *GpgKeyIndex) Len() int
func (*GpgKeyIndex) Less ¶
func (ki *GpgKeyIndex) Less(i, j int) bool
func (*GpgKeyIndex) PushElement ¶
func (ki *GpgKeyIndex) PushElement(e GpgIndexElement)
func (*GpgKeyIndex) Sort ¶
func (ki *GpgKeyIndex) Sort()
func (*GpgKeyIndex) Swap ¶
func (ki *GpgKeyIndex) Swap(i, j int)
type GpgPrimaryKey ¶
type GpgPrimaryKey struct { Contextified GpgBaseKey // contains filtered or unexported fields }
func NewGpgPrimaryKey ¶
func NewGpgPrimaryKey(g *GlobalContext) *GpgPrimaryKey
func ParseGpgPrimaryKey ¶
func ParseGpgPrimaryKey(g *GlobalContext, l *GpgIndexLine) (key *GpgPrimaryKey, err error)
func (*GpgPrimaryKey) AddFingerprint ¶
func (k *GpgPrimaryKey) AddFingerprint(l *GpgIndexLine) (err error)
func (*GpgPrimaryKey) AddLine ¶
func (k *GpgPrimaryKey) AddLine(l *GpgIndexLine) (err error)
func (*GpgPrimaryKey) AddSubkey ¶
func (k *GpgPrimaryKey) AddSubkey(l *GpgIndexLine) (err error)
func (*GpgPrimaryKey) AddUID ¶
func (k *GpgPrimaryKey) AddUID(l *GpgIndexLine) (err error)
func (*GpgPrimaryKey) GetAllID64s ¶
func (k *GpgPrimaryKey) GetAllID64s() []string
func (*GpgPrimaryKey) GetEmails ¶
func (k *GpgPrimaryKey) GetEmails() []string
func (*GpgPrimaryKey) GetFingerprint ¶
func (k *GpgPrimaryKey) GetFingerprint() *PGPFingerprint
func (*GpgPrimaryKey) GetPGPIdentities ¶
func (k *GpgPrimaryKey) GetPGPIdentities() []keybase1.PGPIdentity
func (*GpgPrimaryKey) IsValid ¶
func (k *GpgPrimaryKey) IsValid() bool
func (*GpgPrimaryKey) Parse ¶
func (k *GpgPrimaryKey) Parse(l *GpgIndexLine) error
func (*GpgPrimaryKey) ToKey ¶
func (k *GpgPrimaryKey) ToKey() *GpgPrimaryKey
func (*GpgPrimaryKey) ToRow ¶
func (k *GpgPrimaryKey) ToRow(i int) []string
type GpgSubKey ¶
type GpgSubKey struct {
GpgBaseKey
}
func ParseGpgSubKey ¶
func ParseGpgSubKey(l *GpgIndexLine) (sk *GpgSubKey, err error)
type GregorDismisser ¶ added in v1.0.16
type GregorFirehoseHandler ¶ added in v1.0.17
type GregorFirehoseHandler interface { IsAlive() bool PushState(gregor1.State, keybase1.PushReason) PushOutOfBandMessages([]gregor1.OutOfBandMessage) }
type GregorInBandMessageHandler ¶ added in v1.0.17
type GregorListener ¶ added in v1.0.17
type GregorListener interface { PushHandler(handler GregorInBandMessageHandler) PushFirehoseHandler(handler GregorFirehoseHandler) }
type HTTPArgs ¶
func NewHTTPArgs ¶
func NewHTTPArgs() HTTPArgs
func (HTTPArgs) EncodeToString ¶
type HTTPRequest ¶
type HTTPRequest interface {
SetEnvironment(env Env)
}
type HTTPSrv ¶ added in v1.0.46
type HTTPSrv struct { sync.Mutex *http.ServeMux Contextified // contains filtered or unexported fields }
HTTPSrv starts a simple HTTP server with a parameter for a module to provide a listener source
func NewHTTPSrv ¶ added in v1.0.46
func NewHTTPSrv(g *GlobalContext, listenerSource HTTPSrvListenerSource) *HTTPSrv
type HTTPSrvListenerSource ¶ added in v1.0.46
type HashSummer ¶
type HashSummer func() []byte
func ArmoredAttachedSign ¶
func ArmoredAttachedSign(out io.WriteCloser, signed openpgp.Entity, hints *openpgp.FileHints, config *packet.Config) (in io.WriteCloser, h HashSummer, err error)
type HashingWriteCloser ¶
type HashingWriteCloser struct {
// contains filtered or unexported fields
}
func (HashingWriteCloser) Close ¶
func (h HashingWriteCloser) Close() error
type HexWrongLengthError ¶
type HexWrongLengthError struct {
// contains filtered or unexported fields
}
func NewHexWrongLengthError ¶
func NewHexWrongLengthError(msg string) HexWrongLengthError
func (HexWrongLengthError) Error ¶
func (e HexWrongLengthError) Error() string
type HomeFinder ¶
type HomeFinder interface { CacheDir() string ConfigDir() string Home(emptyOk bool) string DataDir() string RuntimeDir() string Normalize(s string) string LogDir() string ServiceSpawnDir() (string, error) SandboxCacheDir() string // For macOS InfoDir() string }
func NewHomeFinder ¶
func NewHomeFinder(appName string, getHome ConfigGetter, osname string, getRunMode RunModeGetter, getLog LogGetter) HomeFinder
type IdentifiesFailedError ¶ added in v1.0.29
type IdentifiesFailedError struct { }
func NewIdentifiesFailedError ¶ added in v1.0.30
func NewIdentifiesFailedError() IdentifiesFailedError
func (IdentifiesFailedError) Error ¶ added in v1.0.29
func (e IdentifiesFailedError) Error() string
func (IdentifiesFailedError) ToStatus ¶ added in v1.0.29
func (e IdentifiesFailedError) ToStatus() keybase1.Status
type Identify2Cache ¶
type Identify2Cache struct {
// contains filtered or unexported fields
}
Identify2Cache stores User objects in memory for a fixed amount of time.
func NewIdentify2Cache ¶
func NewIdentify2Cache(maxAge time.Duration) *Identify2Cache
NewIdentify2Cache creates a Identify2Cache and sets the object max age to maxAge. Once a user is inserted, after maxAge duration passes, the user will be removed from the cache.
func (*Identify2Cache) Delete ¶ added in v1.0.19
func (c *Identify2Cache) Delete(uid keybase1.UID) error
func (*Identify2Cache) DidFullUserLoad ¶ added in v1.0.19
func (c *Identify2Cache) DidFullUserLoad(_ keybase1.UID)
DidFullUserLoad is a noop unless we're testing...
func (*Identify2Cache) Get ¶
func (c *Identify2Cache) Get(uid keybase1.UID, gctf GetCheckTimeFunc, gcdf GetCacheDurationFunc, breaksOK bool) (*keybase1.Identify2ResUPK2, error)
Get returns a user object. If none exists for uid, it will return nil.
func (*Identify2Cache) Insert ¶
func (c *Identify2Cache) Insert(up *keybase1.Identify2ResUPK2) error
Insert adds a user to the cache, keyed on UID.
func (*Identify2Cache) Shutdown ¶
func (c *Identify2Cache) Shutdown()
Shutdown stops any goroutines in the cache.
func (*Identify2Cache) UseDiskCache ¶ added in v1.0.19
func (c *Identify2Cache) UseDiskCache() bool
type Identify2Cacher ¶
type Identify2Cacher interface { Get(keybase1.UID, GetCheckTimeFunc, GetCacheDurationFunc, bool) (*keybase1.Identify2ResUPK2, error) Insert(up *keybase1.Identify2ResUPK2) error DidFullUserLoad(keybase1.UID) Shutdown() Delete(uid keybase1.UID) error UseDiskCache() bool }
type IdentifyDidNotCompleteError ¶
type IdentifyDidNotCompleteError struct{}
func (IdentifyDidNotCompleteError) Error ¶
func (e IdentifyDidNotCompleteError) Error() string
func (IdentifyDidNotCompleteError) ToStatus ¶
func (e IdentifyDidNotCompleteError) ToStatus() keybase1.Status
type IdentifyFailedError ¶
func (IdentifyFailedError) Error ¶
func (e IdentifyFailedError) Error() string
func (IdentifyFailedError) ToStatus ¶
func (e IdentifyFailedError) ToStatus() keybase1.Status
type IdentifyOutcome ¶
type IdentifyOutcome struct { Contextified Username NormalizedUsername Error error KeyDiffs []TrackDiff Revoked []TrackDiff RevokedDetails []keybase1.RevokedProof ProofChecks []*LinkCheckResult Warnings []Warning TrackUsed *TrackLookup TrackEqual bool // Whether the track statement was equal to what we saw TrackOptions keybase1.TrackOptions Reason keybase1.IdentifyReason ResponsibleGregorItem gregor.Item }
func NewIdentifyOutcomeWithUsername ¶
func NewIdentifyOutcomeWithUsername(g *GlobalContext, u NormalizedUsername) *IdentifyOutcome
func (*IdentifyOutcome) ActiveProofs ¶
func (i *IdentifyOutcome) ActiveProofs() []RemoteProofChainLink
func (*IdentifyOutcome) AddProofsToSet ¶
func (i *IdentifyOutcome) AddProofsToSet(existing *ProofSet, okStates []keybase1.ProofState)
func (*IdentifyOutcome) Export ¶
func (ir *IdentifyOutcome) Export(g *GlobalContext) *keybase1.IdentifyOutcome
func (IdentifyOutcome) ExportToUncheckedIdentity ¶
func (ir IdentifyOutcome) ExportToUncheckedIdentity(g *GlobalContext) *keybase1.Identity
func (IdentifyOutcome) GetError ¶
func (i IdentifyOutcome) GetError() error
func (IdentifyOutcome) GetErrorAndWarnings ¶
func (i IdentifyOutcome) GetErrorAndWarnings(strict bool) (warnings Warnings, err error)
func (IdentifyOutcome) GetErrorLax ¶
func (i IdentifyOutcome) GetErrorLax() (Warnings, error)
func (*IdentifyOutcome) GetRemoteCheckResultFor ¶
func (i *IdentifyOutcome) GetRemoteCheckResultFor(service string, username string) ProofError
func (IdentifyOutcome) IsOK ¶
func (i IdentifyOutcome) IsOK() bool
func (IdentifyOutcome) NumProofFailures ¶
func (i IdentifyOutcome) NumProofFailures() int
The number of proofs that failed.
func (IdentifyOutcome) NumProofSuccesses ¶
func (i IdentifyOutcome) NumProofSuccesses() int
The number of proofs that actually worked
func (IdentifyOutcome) NumRevoked ¶
func (i IdentifyOutcome) NumRevoked() int
Revoked proofs are those we used to look for but are gone!
func (IdentifyOutcome) NumTrackChanges ¶
func (i IdentifyOutcome) NumTrackChanges() int
A "Track Change" isn't necessary a failure, maybe they upgraded a proof from HTTP to HTTPS. But we still should retrack if we can.
func (IdentifyOutcome) NumTrackFailures ¶
func (i IdentifyOutcome) NumTrackFailures() int
A "Track Failure" is when we previously tracked this user, and some aspect of their proof changed. Like their key changed, or they changed Twitter names
func (*IdentifyOutcome) ProofChecksSorted ¶
func (i *IdentifyOutcome) ProofChecksSorted() []*LinkCheckResult
func (*IdentifyOutcome) TrackSet ¶
func (i *IdentifyOutcome) TrackSet() *TrackSet
func (IdentifyOutcome) TrackStatus ¶
func (i IdentifyOutcome) TrackStatus() keybase1.TrackStatus
func (IdentifyOutcome) TrackingStatement ¶
func (i IdentifyOutcome) TrackingStatement() *jsonw.Wrapper
type IdentifyState ¶
type IdentifyState struct { Contextified // contains filtered or unexported fields }
func NewIdentifyStateWithGregorItem ¶ added in v1.0.16
func NewIdentifyStateWithGregorItem(g *GlobalContext, item gregor.Item, u *User) IdentifyState
func (IdentifyState) ExportToUncheckedIdentity ¶
func (is IdentifyState) ExportToUncheckedIdentity(g *GlobalContext) *keybase1.Identity
func (*IdentifyState) HasPreviousTrack ¶
func (s *IdentifyState) HasPreviousTrack() bool
func (*IdentifyState) Precompute ¶
func (s *IdentifyState) Precompute(dhook func(keybase1.IdentifyKey) error)
func (*IdentifyState) Result ¶
func (s *IdentifyState) Result() *IdentifyOutcome
func (*IdentifyState) SetTmpTrackLookup ¶
func (s *IdentifyState) SetTmpTrackLookup(t *TrackChainLink)
func (*IdentifyState) SetTrackLookup ¶
func (s *IdentifyState) SetTrackLookup(t *TrackChainLink)
func (*IdentifyState) TmpTrackLookup ¶ added in v1.0.19
func (s *IdentifyState) TmpTrackLookup() *TrackLookup
func (*IdentifyState) TrackLookup ¶
func (s *IdentifyState) TrackLookup() *TrackLookup
type IdentifySummaryError ¶ added in v1.0.18
type IdentifySummaryError struct {
// contains filtered or unexported fields
}
func NewIdentifySummaryError ¶ added in v1.0.27
func NewIdentifySummaryError(failure keybase1.TLFIdentifyFailure) IdentifySummaryError
func (IdentifySummaryError) Error ¶ added in v1.0.18
func (e IdentifySummaryError) Error() string
func (IdentifySummaryError) IsImmediateFail ¶ added in v1.0.19
func (e IdentifySummaryError) IsImmediateFail() (chat1.OutboxErrorType, bool)
func (IdentifySummaryError) ToStatus ¶ added in v1.0.19
func (e IdentifySummaryError) ToStatus() keybase1.Status
type IdentifyTableMode ¶ added in v1.0.19
type IdentifyTableMode int
const ( IdentifyTableModePassive IdentifyTableMode = iota IdentifyTableModeActive IdentifyTableMode = iota )
type IdentifyTimeoutError ¶
type IdentifyTimeoutError struct{}
func (IdentifyTimeoutError) Error ¶
func (e IdentifyTimeoutError) Error() string
func (IdentifyTimeoutError) ToStatus ¶
func (e IdentifyTimeoutError) ToStatus() keybase1.Status
type IdentifyUI ¶
type IdentifyUI interface { Start(string, keybase1.IdentifyReason, bool) error FinishWebProofCheck(keybase1.RemoteProof, keybase1.LinkCheckResult) error FinishSocialProofCheck(keybase1.RemoteProof, keybase1.LinkCheckResult) error Confirm(*keybase1.IdentifyOutcome) (keybase1.ConfirmResult, error) DisplayCryptocurrency(keybase1.Cryptocurrency) error DisplayKey(keybase1.IdentifyKey) error ReportLastTrack(*keybase1.TrackSummary) error LaunchNetworkChecks(*keybase1.Identity, *keybase1.User) error DisplayTrackStatement(string) error DisplayUserCard(keybase1.UserCard) error ReportTrackToken(keybase1.TrackToken) error Cancel() error Finish() error DisplayTLFCreateWithInvite(keybase1.DisplayTLFCreateWithInviteArg) error Dismiss(string, keybase1.DismissReason) error }
type Identities ¶
type Identities []Identity
func ImportPGPIdentities ¶
func ImportPGPIdentities(ids []keybase1.PGPIdentity) (ret Identities)
func (Identities) Export ¶
func (ids Identities) Export() (res []keybase1.PGPIdentity)
type Identity ¶
func ImportPGPIdentity ¶
func ImportPGPIdentity(arg keybase1.PGPIdentity) (ret Identity)
func KeybaseIdentity ¶
func KeybaseIdentity(g *GlobalContext, un NormalizedUsername) Identity
func ParseIdentity ¶
func (Identity) Export ¶
func (id Identity) Export() (ret keybase1.PGPIdentity)
func (Identity) ToPGPUserID ¶
type IdentityTable ¶
type IdentityTable struct { Contextified Order []TypedChainLink // contains filtered or unexported fields }
func NewIdentityTable ¶
func NewIdentityTable(g *GlobalContext, eldest keybase1.KID, sc *SigChain, h *SigHints) (*IdentityTable, error)
func (*IdentityTable) ActiveCryptocurrency ¶
func (idt *IdentityTable) ActiveCryptocurrency(family CryptocurrencyFamily) *CryptocurrencyChainLink
func (*IdentityTable) AllActiveCryptocurrency ¶ added in v1.0.19
func (idt *IdentityTable) AllActiveCryptocurrency() []CryptocurrencyChainLink
func (*IdentityTable) ComputeRemoteDiff ¶
func (idt *IdentityTable) ComputeRemoteDiff(tracked, trackedTmp, observed keybase1.ProofState) (ret TrackDiff)
ComputeRemoteDiff takes as input three tracking results: the permanent track, the local temporary track, and the one it observed remotely. It favors the permanent track but will roll back to the temporary track if needs be.
func (*IdentityTable) GetActiveProofsFor ¶
func (idt *IdentityTable) GetActiveProofsFor(st ServiceType) (ret []RemoteProofChainLink)
func (*IdentityTable) GetRevokedCryptocurrencyForTesting ¶
func (idt *IdentityTable) GetRevokedCryptocurrencyForTesting() []CryptocurrencyChainLink
func (*IdentityTable) GetTrackList ¶
func (idt *IdentityTable) GetTrackList() (ret []*TrackChainLink)
func (*IdentityTable) GetTrackMap ¶
func (idt *IdentityTable) GetTrackMap() map[NormalizedUsername][]*TrackChainLink
func (*IdentityTable) Identify ¶
func (idt *IdentityTable) Identify(m MetaContext, is IdentifyState, forceRemoteCheck bool, ui IdentifyUI, ccl CheckCompletedListener, itm IdentifyTableMode) error
func (*IdentityTable) Len ¶
func (idt *IdentityTable) Len() int
func (*IdentityTable) MarkCheckResult ¶
func (idt *IdentityTable) MarkCheckResult(err ProofError)
func (*IdentityTable) StellarAccountID ¶
func (idt *IdentityTable) StellarAccountID() *stellar1.AccountID
Return the active stellar public address for a user. Returns nil if there is none or it has not been loaded.
func (*IdentityTable) TrackChainLinkFor ¶
func (idt *IdentityTable) TrackChainLinkFor(username NormalizedUsername, uid keybase1.UID) (*TrackChainLink, error)
func (*IdentityTable) VerifySelfSig ¶
func (idt *IdentityTable) VerifySelfSig(nun NormalizedUsername, uid keybase1.UID) bool
type ImplicitTeamConflictInfoCacher ¶ added in v1.0.39
type ImplicitTeamDisplayNameError ¶ added in v1.0.29
type ImplicitTeamDisplayNameError struct {
// contains filtered or unexported fields
}
func NewImplicitTeamDisplayNameError ¶ added in v1.0.29
func NewImplicitTeamDisplayNameError(format string, args ...interface{}) ImplicitTeamDisplayNameError
func (ImplicitTeamDisplayNameError) Error ¶ added in v1.0.29
func (e ImplicitTeamDisplayNameError) Error() string
type InactiveKeyError ¶
type InactiveKeyError struct {
// contains filtered or unexported fields
}
func (InactiveKeyError) Error ¶
func (i InactiveKeyError) Error() string
type InconsistentCacheStateError ¶ added in v1.0.19
type InconsistentCacheStateError struct{}
func (InconsistentCacheStateError) Error ¶ added in v1.0.19
func (e InconsistentCacheStateError) Error() string
type InputCanceledError ¶
type InputCanceledError struct{}
func (InputCanceledError) Error ¶
func (e InputCanceledError) Error() string
func (InputCanceledError) ToStatus ¶
func (e InputCanceledError) ToStatus() (s keybase1.Status)
type InsufficientKarmaError ¶
type InsufficientKarmaError struct {
// contains filtered or unexported fields
}
func NewInsufficientKarmaError ¶ added in v1.0.18
func NewInsufficientKarmaError(un string) InsufficientKarmaError
func (InsufficientKarmaError) Error ¶
func (e InsufficientKarmaError) Error() string
type InternalAPIEngine ¶
type InternalAPIEngine struct {
BaseAPIEngine
}
func NewInternalAPIEngine ¶
func NewInternalAPIEngine(g *GlobalContext) (*InternalAPIEngine, error)
NewInternalAPIEngine makes an API engine for internally querying the keybase API server
func (*InternalAPIEngine) Delete ¶ added in v1.0.22
func (a *InternalAPIEngine) Delete(arg APIArg) (*APIRes, error)
func (*InternalAPIEngine) GetDecode ¶
func (a *InternalAPIEngine) GetDecode(arg APIArg, v APIResponseWrapper) error
GetDecode performs a GET request and decodes the response via JSON into the value pointed to by v.
func (*InternalAPIEngine) GetResp ¶
func (a *InternalAPIEngine) GetResp(arg APIArg) (*http.Response, func(), error)
GetResp performs a GET request and returns the http response. The finisher second arg should be called whenever we're done with the response (if it's non-nil).
func (*InternalAPIEngine) PostDecode ¶
func (a *InternalAPIEngine) PostDecode(arg APIArg, v APIResponseWrapper) error
type InternalError ¶
type InternalError struct {
Msg string
}
func (InternalError) Error ¶
func (e InternalError) Error() string
type InvalidAddressError ¶ added in v1.0.19
type InvalidAddressError struct {
Msg string
}
func (InvalidAddressError) Error ¶ added in v1.0.19
func (e InvalidAddressError) Error() string
func (InvalidAddressError) ToStatus ¶ added in v1.0.19
func (e InvalidAddressError) ToStatus() keybase1.Status
type InvalidArgumentError ¶
type InvalidArgumentError struct {
Msg string
}
func (InvalidArgumentError) Error ¶
func (e InvalidArgumentError) Error() string
type InvalidHostnameError ¶
type InvalidHostnameError struct {
// contains filtered or unexported fields
}
func NewInvalidHostnameError ¶ added in v1.0.18
func NewInvalidHostnameError(h string) InvalidHostnameError
func (InvalidHostnameError) Error ¶
func (e InvalidHostnameError) Error() string
type InvalidKexPhraseError ¶
type InvalidKexPhraseError struct{}
func (InvalidKexPhraseError) Error ¶
func (e InvalidKexPhraseError) Error() string
func (InvalidKexPhraseError) ToStatus ¶
func (e InvalidKexPhraseError) ToStatus() keybase1.Status
type InvalidRepoNameError ¶ added in v1.0.33
type InvalidRepoNameError struct {
Name string
}
InvalidRepoNameError indicates that a repo name is invalid.
func (InvalidRepoNameError) Error ¶ added in v1.0.33
func (e InvalidRepoNameError) Error() string
func (InvalidRepoNameError) ToStatus ¶ added in v1.0.33
func (e InvalidRepoNameError) ToStatus() (s keybase1.Status)
type Invitation ¶ added in v1.0.16
func GenerateInvitationCode ¶ added in v1.0.16
func GenerateInvitationCode(g *GlobalContext, arg InviteArg) (*Invitation, error)
func GenerateInvitationCodeForAssertion ¶ added in v1.0.16
func GenerateInvitationCodeForAssertion(g *GlobalContext, assertion keybase1.SocialAssertion, arg InviteArg) (*Invitation, error)
func SendInvitation ¶ added in v1.0.16
func SendInvitation(g *GlobalContext, email string, arg InviteArg) (*Invitation, error)
func (Invitation) Link ¶ added in v1.0.16
func (i Invitation) Link() string
type InviteArg ¶ added in v1.0.16
InviteArg contains optional invitation arguments.
func (InviteArg) ToHTTPArgs ¶ added in v1.0.16
type InviteRequestArg ¶
type JSONConfigFile ¶
type JSONConfigFile struct { *JSONFile // contains filtered or unexported fields }
func NewJSONConfigFile ¶
func NewJSONConfigFile(g *GlobalContext, s string) *JSONConfigFile
func (*JSONConfigFile) Check ¶
func (f *JSONConfigFile) Check() error
Check looks inside the JSON file to see if any fields are poorly specified
func (*JSONConfigFile) DeleteAtPath ¶
func (f *JSONConfigFile) DeleteAtPath(p string)
func (*JSONConfigFile) GetAPITimeout ¶
func (f *JSONConfigFile) GetAPITimeout() (time.Duration, bool)
func (*JSONConfigFile) GetAllUserConfigs ¶
func (f *JSONConfigFile) GetAllUserConfigs() (current *UserConfig, all []UserConfig, err error)
func (*JSONConfigFile) GetAllUsernames ¶
func (f *JSONConfigFile) GetAllUsernames() (current NormalizedUsername, others []NormalizedUsername, err error)
func (*JSONConfigFile) GetAppType ¶ added in v1.0.21
func (f *JSONConfigFile) GetAppType() AppType
func (*JSONConfigFile) GetAutoFork ¶
func (f *JSONConfigFile) GetAutoFork() (bool, bool)
func (*JSONConfigFile) GetAutoWallet ¶ added in v1.0.48
func (f *JSONConfigFile) GetAutoWallet() (bool, bool)
func (*JSONConfigFile) GetBGIdentifierDisabled ¶ added in v1.0.19
func (f *JSONConfigFile) GetBGIdentifierDisabled() (bool, bool)
func (*JSONConfigFile) GetBug3964RepairTime ¶ added in v1.0.18
func (f *JSONConfigFile) GetBug3964RepairTime(un NormalizedUsername) (time.Time, error)
func (*JSONConfigFile) GetBundledCA ¶
func (f *JSONConfigFile) GetBundledCA(host string) (ret string)
func (*JSONConfigFile) GetChatDbFilename ¶ added in v1.0.18
func (f *JSONConfigFile) GetChatDbFilename() string
func (*JSONConfigFile) GetChatDelivererInterval ¶ added in v1.0.19
func (f *JSONConfigFile) GetChatDelivererInterval() (time.Duration, bool)
func (*JSONConfigFile) GetChatInboxSourceLocalizeThreads ¶ added in v1.0.34
func (f *JSONConfigFile) GetChatInboxSourceLocalizeThreads() (int, bool)
func (*JSONConfigFile) GetCodeSigningKIDs ¶
func (f *JSONConfigFile) GetCodeSigningKIDs() []string
func (*JSONConfigFile) GetConfigFilename ¶
func (f *JSONConfigFile) GetConfigFilename() string
func (*JSONConfigFile) GetDbFilename ¶
func (f *JSONConfigFile) GetDbFilename() string
func (*JSONConfigFile) GetDebug ¶
func (f *JSONConfigFile) GetDebug() (bool, bool)
func (*JSONConfigFile) GetDeviceCloneStateFilename ¶
func (f *JSONConfigFile) GetDeviceCloneStateFilename() string
func (*JSONConfigFile) GetDeviceID ¶
func (f *JSONConfigFile) GetDeviceID() (ret keybase1.DeviceID)
func (*JSONConfigFile) GetDeviceIDForUID ¶ added in v1.0.19
func (f *JSONConfigFile) GetDeviceIDForUID(u keybase1.UID) keybase1.DeviceID
func (*JSONConfigFile) GetDeviceIDForUsername ¶ added in v1.0.19
func (f *JSONConfigFile) GetDeviceIDForUsername(nu NormalizedUsername) keybase1.DeviceID
func (*JSONConfigFile) GetDisplayRawUntrustedOutput ¶
func (f *JSONConfigFile) GetDisplayRawUntrustedOutput() (bool, bool)
func (*JSONConfigFile) GetDurationAtPath ¶
func (f *JSONConfigFile) GetDurationAtPath(p string) (time.Duration, bool)
func (*JSONConfigFile) GetFeatureFlags ¶ added in v1.0.19
func (f *JSONConfigFile) GetFeatureFlags() (ret FeatureFlags, err error)
func (*JSONConfigFile) GetGpg ¶
func (f *JSONConfigFile) GetGpg() string
func (*JSONConfigFile) GetGpgHome ¶
func (f *JSONConfigFile) GetGpgHome() (ret string)
func (*JSONConfigFile) GetGpgOptions ¶
func (f *JSONConfigFile) GetGpgOptions() []string
func (*JSONConfigFile) GetGregorDisabled ¶ added in v1.0.17
func (f *JSONConfigFile) GetGregorDisabled() (bool, bool)
func (*JSONConfigFile) GetGregorPingInterval ¶ added in v1.0.17
func (f *JSONConfigFile) GetGregorPingInterval() (time.Duration, bool)
func (*JSONConfigFile) GetGregorPingTimeout ¶ added in v1.0.19
func (f *JSONConfigFile) GetGregorPingTimeout() (time.Duration, bool)
func (*JSONConfigFile) GetGregorSaveInterval ¶ added in v1.0.16
func (f *JSONConfigFile) GetGregorSaveInterval() (time.Duration, bool)
func (*JSONConfigFile) GetGregorURI ¶ added in v1.0.16
func (f *JSONConfigFile) GetGregorURI() string
func (*JSONConfigFile) GetHome ¶
func (f *JSONConfigFile) GetHome() string
func (*JSONConfigFile) GetLevelDBNumFiles ¶ added in v1.0.27
func (f *JSONConfigFile) GetLevelDBNumFiles() (int, bool)
func (*JSONConfigFile) GetLinkCacheCleanDur ¶
func (f *JSONConfigFile) GetLinkCacheCleanDur() (time.Duration, bool)
func (*JSONConfigFile) GetLinkCacheSize ¶
func (f *JSONConfigFile) GetLinkCacheSize() (int, bool)
func (*JSONConfigFile) GetLocalRPCDebug ¶
func (f *JSONConfigFile) GetLocalRPCDebug() string
func (*JSONConfigFile) GetLocalTrackMaxAge ¶
func (f *JSONConfigFile) GetLocalTrackMaxAge() (time.Duration, bool)
func (*JSONConfigFile) GetLogFile ¶
func (f *JSONConfigFile) GetLogFile() string
func (*JSONConfigFile) GetLogFormat ¶
func (f *JSONConfigFile) GetLogFormat() string
func (*JSONConfigFile) GetLogPrefix ¶
func (f *JSONConfigFile) GetLogPrefix() string
func (*JSONConfigFile) GetMerkleKIDs ¶
func (f *JSONConfigFile) GetMerkleKIDs() []string
func (*JSONConfigFile) GetMountDir ¶ added in v1.0.17
func (f *JSONConfigFile) GetMountDir() string
func (*JSONConfigFile) GetNoPinentry ¶
func (f *JSONConfigFile) GetNoPinentry() (bool, bool)
func (*JSONConfigFile) GetPayloadCacheSize ¶ added in v1.0.41
func (f *JSONConfigFile) GetPayloadCacheSize() (int, bool)
func (*JSONConfigFile) GetPidFile ¶
func (f *JSONConfigFile) GetPidFile() string
func (*JSONConfigFile) GetPinentry ¶
func (f *JSONConfigFile) GetPinentry() string
func (*JSONConfigFile) GetProofCacheLongDur ¶
func (f *JSONConfigFile) GetProofCacheLongDur() (time.Duration, bool)
func (*JSONConfigFile) GetProofCacheMediumDur ¶
func (f *JSONConfigFile) GetProofCacheMediumDur() (time.Duration, bool)
func (*JSONConfigFile) GetProofCacheShortDur ¶
func (f *JSONConfigFile) GetProofCacheShortDur() (time.Duration, bool)
func (*JSONConfigFile) GetProofCacheSize ¶
func (f *JSONConfigFile) GetProofCacheSize() (int, bool)
func (*JSONConfigFile) GetProxy ¶
func (f *JSONConfigFile) GetProxy() string
func (*JSONConfigFile) GetProxyCACerts ¶
func (f *JSONConfigFile) GetProxyCACerts() (ret []string, err error)
func (*JSONConfigFile) GetPvlKitFilename ¶ added in v1.0.21
func (f *JSONConfigFile) GetPvlKitFilename() string
func (*JSONConfigFile) GetRememberPassphrase ¶ added in v1.0.43
func (f *JSONConfigFile) GetRememberPassphrase() (bool, bool)
func (*JSONConfigFile) GetRunMode ¶
func (f *JSONConfigFile) GetRunMode() (ret RunMode, err error)
func (*JSONConfigFile) GetScraperTimeout ¶
func (f *JSONConfigFile) GetScraperTimeout() (time.Duration, bool)
func (*JSONConfigFile) GetSecretKeyringTemplate ¶
func (f *JSONConfigFile) GetSecretKeyringTemplate() string
func (*JSONConfigFile) GetSecurityAccessGroupOverride ¶
func (f *JSONConfigFile) GetSecurityAccessGroupOverride() (bool, bool)
func (*JSONConfigFile) GetServerURI ¶
func (f *JSONConfigFile) GetServerURI() string
func (*JSONConfigFile) GetSessionFilename ¶
func (f *JSONConfigFile) GetSessionFilename() string
func (*JSONConfigFile) GetSlowGregorConn ¶ added in v1.0.46
func (f *JSONConfigFile) GetSlowGregorConn() (bool, bool)
func (*JSONConfigFile) GetSocketFile ¶
func (f *JSONConfigFile) GetSocketFile() string
func (*JSONConfigFile) GetStandalone ¶
func (f *JSONConfigFile) GetStandalone() (bool, bool)
func (*JSONConfigFile) GetTimeAtPath ¶
func (f *JSONConfigFile) GetTimeAtPath(path string) keybase1.Time
func (*JSONConfigFile) GetTimers ¶
func (f *JSONConfigFile) GetTimers() string
func (*JSONConfigFile) GetTopLevelBool ¶
func (f *JSONConfigFile) GetTopLevelBool(s string) (res, isSet bool)
func (*JSONConfigFile) GetTopLevelString ¶
func (f *JSONConfigFile) GetTopLevelString(s string) (ret string)
func (*JSONConfigFile) GetTorHiddenAddress ¶
func (f *JSONConfigFile) GetTorHiddenAddress() string
func (*JSONConfigFile) GetTorMode ¶
func (f *JSONConfigFile) GetTorMode() (ret TorMode, err error)
func (*JSONConfigFile) GetTorProxy ¶
func (f *JSONConfigFile) GetTorProxy() string
func (*JSONConfigFile) GetUID ¶
func (f *JSONConfigFile) GetUID() (ret keybase1.UID)
func (*JSONConfigFile) GetUIDForUsername ¶
func (f *JSONConfigFile) GetUIDForUsername(n NormalizedUsername) keybase1.UID
func (*JSONConfigFile) GetUIDMapFullNameCacheSize ¶ added in v1.0.33
func (f *JSONConfigFile) GetUIDMapFullNameCacheSize() (int, bool)
func (*JSONConfigFile) GetUPAKCacheSize ¶ added in v1.0.31
func (f *JSONConfigFile) GetUPAKCacheSize() (int, bool)
func (*JSONConfigFile) GetUpdateDisabled ¶ added in v1.0.16
func (f *JSONConfigFile) GetUpdateDisabled() (bool, bool)
func (*JSONConfigFile) GetUpdateLastChecked ¶
func (f *JSONConfigFile) GetUpdateLastChecked() keybase1.Time
func (*JSONConfigFile) GetUpdatePreferenceAuto ¶
func (f *JSONConfigFile) GetUpdatePreferenceAuto() (bool, bool)
func (*JSONConfigFile) GetUpdatePreferenceSkip ¶
func (f *JSONConfigFile) GetUpdatePreferenceSkip() string
func (*JSONConfigFile) GetUpdatePreferenceSnoozeUntil ¶
func (f *JSONConfigFile) GetUpdatePreferenceSnoozeUntil() keybase1.Time
func (*JSONConfigFile) GetUpdateURL ¶
func (f *JSONConfigFile) GetUpdateURL() string
func (*JSONConfigFile) GetUpdaterConfigFilename ¶ added in v1.0.16
func (f *JSONConfigFile) GetUpdaterConfigFilename() string
func (*JSONConfigFile) GetUpgradePerUserKey ¶ added in v1.0.27
func (f *JSONConfigFile) GetUpgradePerUserKey() (bool, bool)
func (*JSONConfigFile) GetUserCacheMaxAge ¶
func (f *JSONConfigFile) GetUserCacheMaxAge() (time.Duration, bool)
func (*JSONConfigFile) GetUserConfig ¶
func (f *JSONConfigFile) GetUserConfig() (*UserConfig, error)
func (*JSONConfigFile) GetUserConfigForUID ¶ added in v1.0.19
func (f *JSONConfigFile) GetUserConfigForUID(u keybase1.UID) (*UserConfig, error)
GetUserConfigForUID sees if there's a UserConfig object for the given UIDs previously stored.
func (*JSONConfigFile) GetUserConfigForUsername ¶
func (f *JSONConfigFile) GetUserConfigForUsername(nu NormalizedUsername) (*UserConfig, error)
GetUserConfigForUsername sees if there's a UserConfig object for the given username previously stored.
func (*JSONConfigFile) GetUsername ¶
func (f *JSONConfigFile) GetUsername() (ret NormalizedUsername)
func (*JSONConfigFile) GetUsernameForUID ¶
func (f *JSONConfigFile) GetUsernameForUID(u keybase1.UID) NormalizedUsername
func (*JSONConfigFile) GetVDebugSetting ¶
func (f *JSONConfigFile) GetVDebugSetting() string
func (*JSONConfigFile) NukeUser ¶
func (f *JSONConfigFile) NukeUser(nu NormalizedUsername) error
NukeUser deletes the given user from the config file, or if the given user is empty, deletes the current user from the config file.
func (*JSONConfigFile) Reset ¶
func (f *JSONConfigFile) Reset()
func (*JSONConfigFile) SetBug3964RepairTime ¶ added in v1.0.18
func (f *JSONConfigFile) SetBug3964RepairTime(un NormalizedUsername, t time.Time) (err error)
func (*JSONConfigFile) SetDeviceID ¶
func (f *JSONConfigFile) SetDeviceID(did keybase1.DeviceID) (err error)
SetDeviceID sets the device field of the UserConfig object
func (*JSONConfigFile) SetRememberPassphrase ¶ added in v1.0.43
func (f *JSONConfigFile) SetRememberPassphrase(remember bool) error
func (*JSONConfigFile) SetTimeAtPath ¶
func (f *JSONConfigFile) SetTimeAtPath(path string, t keybase1.Time) error
func (*JSONConfigFile) SetUpdateLastChecked ¶
func (f *JSONConfigFile) SetUpdateLastChecked(t keybase1.Time) error
func (*JSONConfigFile) SetUpdatePreferenceAuto ¶
func (f *JSONConfigFile) SetUpdatePreferenceAuto(b bool) error
func (*JSONConfigFile) SetUpdatePreferenceSkip ¶
func (f *JSONConfigFile) SetUpdatePreferenceSkip(v string) error
func (*JSONConfigFile) SetUpdatePreferenceSnoozeUntil ¶
func (f *JSONConfigFile) SetUpdatePreferenceSnoozeUntil(t keybase1.Time) error
func (*JSONConfigFile) SetUserConfig ¶
func (f *JSONConfigFile) SetUserConfig(u *UserConfig, overwrite bool) error
SetUserConfig writes this UserConfig to the config file and updates the currently active UserConfig in memory. If the given UserConfig is nil, then just empty everything out and clear the `current_user` field. Note that we never actually overwrite users.<username>, we just write it if it doesn't already exist, and we update the `current_user` pointer.
func (*JSONConfigFile) SetWrapperAtPath ¶
func (f *JSONConfigFile) SetWrapperAtPath(p string, w *jsonw.Wrapper) error
func (*JSONConfigFile) SwitchUser ¶
func (f *JSONConfigFile) SwitchUser(nu NormalizedUsername) error
type JSONFile ¶
type JSONFile struct { Contextified // contains filtered or unexported fields }
func NewJSONFile ¶
func NewJSONFile(g *GlobalContext, filename, which string) *JSONFile
func (*JSONFile) BeginTransaction ¶
func (f *JSONFile) BeginTransaction() (ConfigWriterTransacter, error)
func (*JSONFile) GetFilename ¶
func (*JSONFile) GetInterfaceAtPath ¶
func (*JSONFile) GetNullAtPath ¶
func (*JSONFile) GetStringAtPath ¶
func (*JSONFile) GetWrapper ¶
func (*JSONFile) SetNullAtPath ¶
type JSONLocalDb ¶
type JSONLocalDb struct {
// contains filtered or unexported fields
}
func NewJSONLocalDb ¶
func NewJSONLocalDb(e LocalDb) *JSONLocalDb
func (*JSONLocalDb) Close ¶
func (j *JSONLocalDb) Close() error
func (*JSONLocalDb) Delete ¶
func (j *JSONLocalDb) Delete(id DbKey) error
func (*JSONLocalDb) ForceOpen ¶
func (j *JSONLocalDb) ForceOpen() error
func (*JSONLocalDb) GetInto ¶
func (j *JSONLocalDb) GetInto(obj interface{}, id DbKey) (found bool, err error)
func (*JSONLocalDb) GetRaw ¶ added in v1.0.16
func (j *JSONLocalDb) GetRaw(id DbKey) ([]byte, bool, error)
func (*JSONLocalDb) Nuke ¶
func (j *JSONLocalDb) Nuke() (string, error)
func (*JSONLocalDb) Open ¶
func (j *JSONLocalDb) Open() error
func (*JSONLocalDb) OpenTransaction ¶ added in v1.0.18
func (j *JSONLocalDb) OpenTransaction() (JSONLocalDbTransaction, error)
type JSONLocalDbTransaction ¶ added in v1.0.18
type JSONLocalDbTransaction struct {
// contains filtered or unexported fields
}
func (JSONLocalDbTransaction) Commit ¶ added in v1.0.18
func (j JSONLocalDbTransaction) Commit() error
func (JSONLocalDbTransaction) Delete ¶ added in v1.0.18
func (j JSONLocalDbTransaction) Delete(id DbKey) error
func (JSONLocalDbTransaction) Discard ¶ added in v1.0.18
func (j JSONLocalDbTransaction) Discard()
func (JSONLocalDbTransaction) Get ¶ added in v1.0.18
func (j JSONLocalDbTransaction) Get(id DbKey) (*jsonw.Wrapper, error)
func (JSONLocalDbTransaction) GetInto ¶ added in v1.0.18
func (j JSONLocalDbTransaction) GetInto(obj interface{}, id DbKey) (found bool, err error)
func (JSONLocalDbTransaction) GetRaw ¶ added in v1.0.18
func (j JSONLocalDbTransaction) GetRaw(id DbKey) ([]byte, bool, error)
func (JSONLocalDbTransaction) Lookup ¶ added in v1.0.18
func (j JSONLocalDbTransaction) Lookup(id DbKey) (*jsonw.Wrapper, error)
type JSONPayload ¶
type JSONPayload map[string]interface{}
func PerUserKeyProofReverseSigned ¶ added in v1.0.27
func PerUserKeyProofReverseSigned(m MetaContext, me *User, perUserKeySeed PerUserKeySeed, generation keybase1.PerUserKeyGeneration, signer GenericKey) (JSONPayload, error)
Make a per-user key proof with a reverse sig. Modifies the User `me` with a sigchain bump and key delegation. Returns a JSONPayload ready for use in "sigs" in sig/multi.
func StellarProofReverseSigned ¶ added in v1.0.47
func StellarProofReverseSigned(m MetaContext, me *User, walletAddress stellar1.AccountID, stellarSigner stellar1.SecretKey, signer GenericKey) (JSONPayload, error)
Make a stellar proof with a reverse sig. Modifies the User `me` with a sigchain bump and key delegation. Returns a JSONPayload ready for use in "sigs" in sig/multi.
type JSONReader ¶
type JSONUpdaterConfigFile ¶ added in v1.0.16
type JSONUpdaterConfigFile struct {
*JSONFile
}
func NewJSONUpdaterConfigFile ¶ added in v1.0.16
func NewJSONUpdaterConfigFile(g *GlobalContext) *JSONUpdaterConfigFile
func (*JSONUpdaterConfigFile) GetInstallID ¶ added in v1.0.16
func (j *JSONUpdaterConfigFile) GetInstallID() (ret InstallID)
type JSONWriter ¶
type KBFSNotRunningError ¶ added in v1.0.27
type KBFSNotRunningError struct{}
func (KBFSNotRunningError) Error ¶ added in v1.0.27
func (e KBFSNotRunningError) Error() string
type KVStoreContext ¶ added in v1.0.33
type KVStoreContext interface {
GetKVStore() KVStorer
}
type Kex2Secret ¶
type Kex2Secret struct {
// contains filtered or unexported fields
}
func NewKex2Secret ¶
func NewKex2Secret(mobile bool) (*Kex2Secret, error)
func NewKex2SecretFromPhrase ¶
func NewKex2SecretFromPhrase(phrase string) (*Kex2Secret, error)
func (*Kex2Secret) Phrase ¶
func (s *Kex2Secret) Phrase() string
func (*Kex2Secret) Secret ¶
func (s *Kex2Secret) Secret() kex2.Secret
type KexRouter ¶
type KexRouter struct {
MetaContextified
}
KexRouter implements the kex2.MessageRouter interface.
func NewKexRouter ¶
func NewKexRouter(m MetaContext) *KexRouter
NewKexRouter creates a contextified KexRouter.
type KeyCannotDecryptError ¶
type KeyCannotDecryptError struct{}
func (KeyCannotDecryptError) Error ¶
func (k KeyCannotDecryptError) Error() string
type KeyCannotEncryptError ¶
type KeyCannotEncryptError struct{}
func (KeyCannotEncryptError) Error ¶
func (k KeyCannotEncryptError) Error() string
type KeyCannotSignError ¶
type KeyCannotSignError struct{}
func (KeyCannotSignError) Error ¶
func (s KeyCannotSignError) Error() string
type KeyCannotVerifyError ¶
type KeyCannotVerifyError struct{}
func (KeyCannotVerifyError) Error ¶
func (k KeyCannotVerifyError) Error() string
type KeyCorruptedError ¶ added in v1.0.27
type KeyCorruptedError struct {
Msg string
}
func (KeyCorruptedError) Error ¶ added in v1.0.27
func (e KeyCorruptedError) Error() string
func (KeyCorruptedError) ToStatus ¶ added in v1.0.27
func (c KeyCorruptedError) ToStatus() (s keybase1.Status)
type KeyExistsError ¶
type KeyExistsError struct {
Key *PGPFingerprint
}
func (KeyExistsError) Error ¶
func (k KeyExistsError) Error() string
func (KeyExistsError) ToStatus ¶
func (c KeyExistsError) ToStatus() (s keybase1.Status)
type KeyExpiredError ¶
type KeyExpiredError struct {
// contains filtered or unexported fields
}
func (KeyExpiredError) Error ¶
func (r KeyExpiredError) Error() string
type KeyFamily ¶
type KeyFamily struct { AllKIDs map[keybase1.KID]bool // PGP keys have a permissively merged version and individual versions by // hash. See the comment in PGPKeySet.addKey, above, for details. PGPKeySets map[keybase1.KID]*PGPKeySet SingleKeys map[keybase1.KID]GenericKey // Currently just NaCl keys BundlesForTesting []string Contextified // contains filtered or unexported fields }
Once the client downloads a RawKeyFamily, it converts it into a KeyFamily, which has some additional information about Fingerprints and PGP keys
func ParseKeyFamily ¶
func ParseKeyFamily(g *GlobalContext, jw *jsonw.Wrapper) (ret *KeyFamily, err error)
ParseKeyFamily takes as input a dictionary from a JSON file and returns a parsed version for manipulation in the program.
func (*KeyFamily) LocalDelegate ¶
func (kf *KeyFamily) LocalDelegate(key GenericKey) (err error)
LocalDelegate performs a local key delegation, without the server's permissions. We'll need to do this when a key is locally generated.
func (KeyFamily) ShallowCopy ¶ added in v1.0.19
type KeyFamilyError ¶
type KeyFamilyError struct {
Msg string
}
func (KeyFamilyError) Error ¶
func (e KeyFamilyError) Error() string
type KeyGenError ¶
type KeyGenError struct {
Msg string
}
func (KeyGenError) Error ¶
func (e KeyGenError) Error() string
func (KeyGenError) ToStatus ¶
func (e KeyGenError) ToStatus() (s keybase1.Status)
type KeyMaskNotFoundError ¶ added in v1.0.30
type KeyMaskNotFoundError struct { App keybase1.TeamApplication Gen keybase1.PerTeamKeyGeneration }
func (KeyMaskNotFoundError) Error ¶ added in v1.0.30
func (e KeyMaskNotFoundError) Error() string
func (KeyMaskNotFoundError) ToStatus ¶ added in v1.0.30
func (e KeyMaskNotFoundError) ToStatus() keybase1.Status
type KeyPseudonym ¶
type KeyPseudonym [32]byte
KeyPseudonym is a "random looking" identifier which refers to a specific application key belonging to a user or team (the key is referred to by the application id, the generation number and the user or team id). Pseudonyms are only used for saltpack encryption at the moment, but more applications are possible. They are used to avoid that, when decrypting a message encrypted with a team key, a user has to loop through all the keys of all the teams he is part of to find the right one. To avoid this, when encrypting for a team, the sender generates such a pseudonym (which refers to the key it used to encrypt), sends it to the server and includes it as a recipient identifier for the appropriare recipient payload box in the header of the saltpack message. When decrypting a saltpack message, a recipient can ask the server if any of the recipient identifiers in the message correspond to known pseudonyms (for teams the user is part of), and use the response from the server to identify which key to use for decryption. This mechanism substitutes an older kbfs based one (which is still supported to allow decryptions of old saltpack messages).
A pseudonym is computed as an HMAC (with a random nonce as a key) of the information it refers to in order to prevent the server from tampering with the mapping (we rely on collision resistance and not unforgeability, as the server knows the nonce, so a simple SHA256 would have worked as well).
func MakeKeyPseudonym ¶
func MakeKeyPseudonym(info KeyPseudonymInfo) (KeyPseudonym, error)
MakePseudonym makes a key pseudonym from the given input.
func (KeyPseudonym) Eq ¶
func (p KeyPseudonym) Eq(r KeyPseudonym) bool
func (*KeyPseudonym) MarshalJSON ¶
func (p *KeyPseudonym) MarshalJSON() ([]byte, error)
func (KeyPseudonym) String ¶
func (p KeyPseudonym) String() string
func (*KeyPseudonym) UnmarshalJSON ¶
func (p *KeyPseudonym) UnmarshalJSON(b []byte) error
type KeyPseudonymError ¶
type KeyPseudonymError struct {
// contains filtered or unexported fields
}
func NewKeyPseudonymError ¶
func NewKeyPseudonymError(message string) KeyPseudonymError
func (KeyPseudonymError) Error ¶
func (e KeyPseudonymError) Error() string
type KeyPseudonymGetError ¶
type KeyPseudonymGetError struct {
// contains filtered or unexported fields
}
PseudonymGetError is sometimes written by unmarshaling (some fields of) a server response.
func (KeyPseudonymGetError) Error ¶
func (e KeyPseudonymGetError) Error() string
type KeyPseudonymInfo ¶
type KeyPseudonymInfo struct { KeyPseudonym KeyPseudonym ID keybase1.UserOrTeamID Application keybase1.TeamApplication KeyGen KeyGen Nonce KeyPseudonymNonce }
KeyPseudonymInfo contains the KeyPseudonym as well as information about the key it represents.
type KeyPseudonymNonce ¶
type KeyPseudonymNonce [32]byte
func RandomPseudonymNonce ¶
func RandomPseudonymNonce() KeyPseudonymNonce
RandomPseudonymNonce returns a random nonce, which is used as an HMAC key.
func (*KeyPseudonymNonce) MarshalJSON ¶
func (p *KeyPseudonymNonce) MarshalJSON() ([]byte, error)
func (KeyPseudonymNonce) String ¶
func (p KeyPseudonymNonce) String() string
func (*KeyPseudonymNonce) UnmarshalJSON ¶
func (p *KeyPseudonymNonce) UnmarshalJSON(b []byte) error
type KeyPseudonymOrError ¶
type KeyPseudonymOrError struct { // Exactly one of these 2 fields is nil. Err error Info *KeyPseudonymInfo }
func GetKeyPseudonyms ¶
func GetKeyPseudonyms(m MetaContext, pnyms []KeyPseudonym) ([]KeyPseudonymOrError, error)
GetKeyPseudonyms fetches info for a list of pseudonyms. The output structs are returned in the order corresponding to the inputs. The top-level error is filled if the entire request fails. The error in each of the returned structs may be filled for per-pseudonym errors.
type KeyRevokedError ¶
type KeyRevokedError struct {
// contains filtered or unexported fields
}
func NewKeyRevokedError ¶ added in v1.0.48
func NewKeyRevokedError(m string) KeyRevokedError
func (KeyRevokedError) Error ¶
func (r KeyRevokedError) Error() string
func (KeyRevokedError) ToStatus ¶ added in v1.0.17
func (e KeyRevokedError) ToStatus() keybase1.Status
type KeySection ¶
type KeyUnimplementedError ¶
type KeyUnimplementedError struct{}
func (KeyUnimplementedError) Error ¶
func (k KeyUnimplementedError) Error() string
type KeyUnlocker ¶
type KeyUnlocker struct {
// contains filtered or unexported fields
}
func NewKeyUnlocker ¶ added in v1.0.19
func NewKeyUnlocker(tries int, reason string, keyDesc string, which PassphraseType, useSecretStore bool, ui SecretUI, unlocker UnlockerFunc) KeyUnlocker
func (KeyUnlocker) Run ¶
func (arg KeyUnlocker) Run(m MetaContext) (ret GenericKey, err error)
type KeyVersionError ¶
type KeyVersionError struct{}
func (KeyVersionError) Error ¶
func (k KeyVersionError) Error() string
type KeybasePacket ¶
type KeybasePacket struct { Body interface{} `codec:"body"` Hash *KeybasePacketHash `codec:"hash,omitempty"` Tag PacketTag `codec:"tag"` Version PacketVersion `codec:"version"` }
func DecodeArmoredPacket ¶
func DecodeArmoredPacket(s string) (*KeybasePacket, error)
func DecodePacket ¶
func DecodePacket(data []byte) (ret *KeybasePacket, err error)
func NewKeybasePacket ¶ added in v1.0.17
func NewKeybasePacket(body interface{}, tag PacketTag, version PacketVersion) (*KeybasePacket, error)
func (*KeybasePacket) ArmoredEncode ¶
func (p *KeybasePacket) ArmoredEncode() (ret string, err error)
func (*KeybasePacket) Encode ¶
func (p *KeybasePacket) Encode() ([]byte, error)
func (KeybasePacket) ToNaclSigInfo ¶
func (p KeybasePacket) ToNaclSigInfo() (*NaclSigInfo, error)
func (KeybasePacket) ToSKB ¶
func (p KeybasePacket) ToSKB() (*SKB, error)
type KeybasePacketHash ¶
type KeybasePackets ¶
type KeybasePackets []*KeybasePacket
func DecodePacketsUnchecked ¶
func DecodePacketsUnchecked(reader io.Reader) (ret KeybasePackets, err error)
DecodePacketsUnchecked decodes an array of packets from `reader`. It does *not* check that the stream was canonical msgpack.
func (KeybasePackets) Encode ¶
func (p KeybasePackets) Encode() ([]byte, error)
func (KeybasePackets) ToListOfSKBs ¶
func (p KeybasePackets) ToListOfSKBs(g *GlobalContext) ([]*SKB, error)
type KeybaseSaltpackError ¶
type KeybaseSaltpackError struct{}
func (KeybaseSaltpackError) Error ¶
func (e KeybaseSaltpackError) Error() string
type KeybaseTime ¶
type KeybaseTime struct { Unix int64 // UTC wallclock time Chain keybase1.Seqno // Merkle root chain time }
We have two notions of time we can use -- standard UTC which might be screwy (skewy) based upon local clock problems; or MerkleRoot seqno, which is totally ordered and all clients and server ought to agree on it. The issue is that we're not uniformly signing Merkle roots into signatures, especially those generated on the Web site.
func NowAsKeybaseTime ¶
func NowAsKeybaseTime(seqno keybase1.Seqno) *KeybaseTime
NowAsKeybaseTime makes a representation of now. IF we don't know the MerkleTree chain seqno, just use 0
func TclToKeybaseTime ¶
func TclToKeybaseTime(tcl TypedChainLink) *KeybaseTime
TclToKeybaseTime turns a TypedChainLink into a KeybaseTime tuple, looking inside the chainlink for the Unix wallclock and the global MerkleChain seqno.
type KeyringFile ¶
type KeyringFile struct { Entities openpgp.EntityList Contextified // contains filtered or unexported fields }
func (KeyringFile) GetFilename ¶
func (k KeyringFile) GetFilename() string
func (*KeyringFile) Index ¶
func (k *KeyringFile) Index() error
func (*KeyringFile) Load ¶
func (k *KeyringFile) Load() error
func (*KeyringFile) LoadAndIndex ¶
func (k *KeyringFile) LoadAndIndex() error
func (KeyringFile) Save ¶
func (k KeyringFile) Save(g *GlobalContext) error
type Keyrings ¶
type Keyrings struct {
Contextified
}
func NewKeyrings ¶
func NewKeyrings(g *GlobalContext) *Keyrings
func (*Keyrings) GetSecretKeyAndSKBWithPrompt ¶
func (k *Keyrings) GetSecretKeyAndSKBWithPrompt(m MetaContext, arg SecretKeyPromptArg) (key GenericKey, skb *SKB, err error)
func (*Keyrings) GetSecretKeyLocked ¶
func (k *Keyrings) GetSecretKeyLocked(m MetaContext, ska SecretKeyArg) (ret *SKB, err error)
GetSecretKeyLocked gets a secret key for the current user by first looking for keys synced from the server, and if that fails, tries those in the local Keyring that are also active for the user. In any case, the key will be locked.
func (*Keyrings) GetSecretKeyWithPassphrase ¶
func (k *Keyrings) GetSecretKeyWithPassphrase(m MetaContext, me *User, passphrase string, secretStorer SecretStorer) (key GenericKey, err error)
func (*Keyrings) GetSecretKeyWithPrompt ¶
func (k *Keyrings) GetSecretKeyWithPrompt(m MetaContext, arg SecretKeyPromptArg) (key GenericKey, err error)
TODO: Figure out whether and how to dep-inject the SecretStore.
func (*Keyrings) GetSecretKeyWithStoredSecret ¶
func (k *Keyrings) GetSecretKeyWithStoredSecret(m MetaContext, ska SecretKeyArg, me *User, secretRetriever SecretRetriever) (key GenericKey, err error)
type LKSec ¶
type LKSec struct {
// contains filtered or unexported fields
}
func NewLKSecForEncrypt ¶
NewLKSForEncrypt gets a verified passphrase stream, and returns an LKS that works for encryption.
func NewLKSecWithClientHalf ¶
func NewLKSecWithClientHalf(clientHalf LKSecClientHalf, ppgen PassphraseGeneration, uid keybase1.UID) *LKSec
func NewLKSecWithDeviceID ¶
func NewLKSecWithFullSecret ¶
func NewLKSecWithFullSecret(secret LKSecFullSecret, uid keybase1.UID) *LKSec
func (LKSec) ClientHalf ¶ added in v1.0.18
func (s LKSec) ClientHalf() LKSecClientHalf
func (*LKSec) ComputeClientHalf ¶ added in v1.0.18
func (s *LKSec) ComputeClientHalf() (ret LKSecClientHalf, err error)
func (*LKSec) CorruptedFullSecretForBug3964Testing ¶ added in v1.0.18
func (s *LKSec) CorruptedFullSecretForBug3964Testing(srv LKSecServerHalf) LKSecFullSecret
func (*LKSec) Decrypt ¶
func (s *LKSec) Decrypt(m MetaContext, src []byte) (res []byte, gen PassphraseGeneration, erroneousMask LKSecServerHalf, err error)
func (*LKSec) EncryptClientHalfRecovery ¶
func (s *LKSec) EncryptClientHalfRecovery(key GenericKey) (string, error)
EncryptClientHalfRecovery takes the client half of the LKS secret and encrypts it for the given key. This is for recovery of passphrases on device recovery operations.
func (*LKSec) FullSecret ¶ added in v1.0.18
func (s *LKSec) FullSecret() LKSecFullSecret
func (*LKSec) GenerateServerHalf ¶
func (LKSec) Generation ¶
func (s LKSec) Generation() PassphraseGeneration
Generation returns the passphrase generation that this local key security object is derived from.
func (*LKSec) GetSecret ¶
func (s *LKSec) GetSecret(m MetaContext) (secret LKSecFullSecret, err error)
func (*LKSec) GetServerHalf ¶
func (s *LKSec) GetServerHalf() LKSecServerHalf
func (*LKSec) Load ¶
func (s *LKSec) Load(m MetaContext) (err error)
func (*LKSec) LoadServerDetails ¶ added in v1.0.18
func (s *LKSec) LoadServerDetails(m MetaContext) (ret DeviceKeyMap, err error)
func (*LKSec) LoadServerHalf ¶ added in v1.0.17
func (s *LKSec) LoadServerHalf(m MetaContext) (err error)
func (LKSec) ServerHalf ¶ added in v1.0.18
func (s LKSec) ServerHalf() LKSecServerHalf
func (*LKSec) SetClientHalf ¶
func (s *LKSec) SetClientHalf(b LKSecClientHalf)
func (*LKSec) SetFullSecret ¶ added in v1.0.18
func (s *LKSec) SetFullSecret(m MetaContext)
func (*LKSec) SetServerHalf ¶
func (s *LKSec) SetServerHalf(b LKSecServerHalf)
func (*LKSec) ToSKB ¶ added in v1.0.18
func (s *LKSec) ToSKB(m MetaContext, key GenericKey) (ret *SKB, err error)
ToSKB exports a generic key with the given LKSec to a SecretKeyBundle, performing all necessary encryption.
type LKSecClientHalf ¶ added in v1.0.18
type LKSecClientHalf struct {
// contains filtered or unexported fields
}
func NewLKSecClientHalfFromBytes ¶ added in v1.0.18
func NewLKSecClientHalfFromBytes(b []byte) (ret LKSecClientHalf, err error)
func (LKSecClientHalf) Bytes ¶ added in v1.0.18
func (c LKSecClientHalf) Bytes() []byte
func (LKSecClientHalf) ComputeMask ¶ added in v1.0.18
func (c LKSecClientHalf) ComputeMask(c2 LKSecClientHalf) LKSecMask
func (LKSecClientHalf) Equal ¶ added in v1.0.18
func (c LKSecClientHalf) Equal(c2 LKSecClientHalf) bool
func (LKSecClientHalf) IsNil ¶ added in v1.0.18
func (c LKSecClientHalf) IsNil() bool
type LKSecFullSecret ¶ added in v1.0.18
type LKSecFullSecret struct {
// contains filtered or unexported fields
}
func (LKSecFullSecret) Bytes ¶ added in v1.0.18
func (f LKSecFullSecret) Bytes() []byte
func (LKSecFullSecret) Equal ¶ added in v1.0.18
func (f LKSecFullSecret) Equal(f2 LKSecFullSecret) bool
func (LKSecFullSecret) IsNil ¶ added in v1.0.18
func (f LKSecFullSecret) IsNil() bool
type LKSecMask ¶ added in v1.0.18
type LKSecMask struct {
// contains filtered or unexported fields
}
func (LKSecMask) EncodeToHex ¶ added in v1.0.18
type LKSecServerHalf ¶ added in v1.0.18
type LKSecServerHalf struct {
// contains filtered or unexported fields
}
func NewLKSecServerHalfFromHex ¶ added in v1.0.18
func NewLKSecServerHalfFromHex(s string) (ret LKSecServerHalf, err error)
func NewLKSecServerHalfZeros ¶ added in v1.0.18
func NewLKSecServerHalfZeros() LKSecServerHalf
func (LKSecServerHalf) Bytes ¶ added in v1.0.18
func (s LKSecServerHalf) Bytes() []byte
func (LKSecServerHalf) ComputeClientHalf ¶ added in v1.0.18
func (s LKSecServerHalf) ComputeClientHalf(f LKSecFullSecret) LKSecClientHalf
func (LKSecServerHalf) ComputeFullSecret ¶ added in v1.0.18
func (s LKSecServerHalf) ComputeFullSecret(c LKSecClientHalf) LKSecFullSecret
func (LKSecServerHalf) EncodeToHex ¶ added in v1.0.18
func (s LKSecServerHalf) EncodeToHex() string
func (LKSecServerHalf) IsNil ¶ added in v1.0.18
func (s LKSecServerHalf) IsNil() bool
type LKSecServerHalfSet ¶ added in v1.0.18
type LKSecServerHalfSet struct {
// contains filtered or unexported fields
}
func NewLKSecServerHalfSet ¶ added in v1.0.18
func NewLKSecServerHalfSet() *LKSecServerHalfSet
func (*LKSecServerHalfSet) Add ¶ added in v1.0.18
func (l *LKSecServerHalfSet) Add(s LKSecServerHalf)
func (*LKSecServerHalfSet) EncodeToHexList ¶ added in v1.0.18
func (l *LKSecServerHalfSet) EncodeToHexList() string
type LRUContext ¶ added in v1.0.39
type LRUContext interface { VLogContext KVStoreContext ClockContext }
type LRUer ¶ added in v1.0.39
type LRUer interface { Get(context.Context, LRUContext, LRUKeyer) (interface{}, error) Put(context.Context, LRUContext, LRUKeyer, interface{}) error }
type LabelCb ¶ added in v1.0.41
type LabelCb func(typ keybase1.ClientType)
LabelCb is a callback to be run when a client connects and labels itself.
type LevelDBOpenClosedError ¶ added in v1.0.19
type LevelDBOpenClosedError struct{}
func (LevelDBOpenClosedError) Error ¶ added in v1.0.19
func (e LevelDBOpenClosedError) Error() string
type LevelDb ¶
type LevelDb struct { // We use a RWMutex here to ensure close doesn't happen in the middle of // other DB operations, and DB operations doesn't happen after close. The // lock should be considered for the db pointer and dbOpenerOnce pointer, // rather than the DB itself. More specifically, close does Lock(), while // other DB operations does RLock(). sync.RWMutex Contextified // contains filtered or unexported fields }
func NewLevelDb ¶
func NewLevelDb(g *GlobalContext, filename func() string) *LevelDb
func (*LevelDb) ForceOpen ¶
ForceOpen opens the leveldb file. This is used in situations where we want to get around the lazy open and make sure we can use it later.
func (*LevelDb) GetFilename ¶
func (*LevelDb) OpenTransaction ¶ added in v1.0.18
func (l *LevelDb) OpenTransaction() (LocalDbTransaction, error)
type LevelDbTransaction ¶ added in v1.0.18
type LevelDbTransaction struct {
// contains filtered or unexported fields
}
func (LevelDbTransaction) Commit ¶ added in v1.0.18
func (l LevelDbTransaction) Commit() (err error)
func (LevelDbTransaction) Delete ¶ added in v1.0.18
func (l LevelDbTransaction) Delete(id DbKey) error
func (LevelDbTransaction) Discard ¶ added in v1.0.18
func (l LevelDbTransaction) Discard()
func (LevelDbTransaction) Get ¶ added in v1.0.18
func (l LevelDbTransaction) Get(id DbKey) (val []byte, found bool, err error)
type LinkCache ¶
LinkCache is a cache of ChainLinks. It is safe to use concurrently.
func NewLinkCache ¶
NewLinkCache creates a LinkCache. When finished using this LinkCache, call Shutdown on it to clean up.
func (*LinkCache) Get ¶
Get retrieves a ChainLink from the cache. If nothing exists for this LinkID, it will return false for ok.
type LinkCheckResult ¶
type LinkCheckResult struct {
// contains filtered or unexported fields
}
func (LinkCheckResult) Export ¶
func (l LinkCheckResult) Export() keybase1.LinkCheckResult
func (LinkCheckResult) ExportToIdentifyRow ¶
func (l LinkCheckResult) ExportToIdentifyRow(i int) keybase1.IdentifyRow
func (LinkCheckResult) GetCached ¶
func (l LinkCheckResult) GetCached() *CheckResult
func (LinkCheckResult) GetDiff ¶
func (l LinkCheckResult) GetDiff() TrackDiff
func (LinkCheckResult) GetError ¶
func (l LinkCheckResult) GetError() error
func (LinkCheckResult) GetHint ¶
func (l LinkCheckResult) GetHint() *SigHint
func (LinkCheckResult) GetLink ¶
func (l LinkCheckResult) GetLink() RemoteProofChainLink
func (LinkCheckResult) GetPosition ¶
func (l LinkCheckResult) GetPosition() int
func (LinkCheckResult) GetProofError ¶
func (l LinkCheckResult) GetProofError() ProofError
func (LinkCheckResult) GetRemoteDiff ¶
func (l LinkCheckResult) GetRemoteDiff() TrackDiff
func (LinkCheckResult) GetTorWarning ¶
func (l LinkCheckResult) GetTorWarning() bool
type LinkID ¶
type LinkID []byte
func ComputeLinkID ¶
func LinkIDFromHex ¶
func MakeSig ¶ added in v1.0.46
func MakeSig( signingKey GenericKey, v1LinkType LinkType, innerLinkJSON []byte, hasRevokes SigHasRevokes, seqType keybase1.SeqType, ignoreIfUnsupported SigIgnoreIfUnsupported, me *User, sigVersion SigVersion) (sig string, sigID keybase1.SigID, linkID LinkID, err error)
func MakeSigchainV2OuterSig ¶ added in v1.0.43
func MakeSigchainV2OuterSig( signingKey GenericKey, v1LinkType LinkType, seqno keybase1.Seqno, innerLinkJSON []byte, prevLinkID LinkID, hasRevokes SigHasRevokes, seqType keybase1.SeqType, ignoreIfUnsupported SigIgnoreIfUnsupported, ) (sig string, sigid keybase1.SigID, linkID LinkID, err error)
func SignJSON ¶
func SignJSON(jw *jsonw.Wrapper, key GenericKey) (out string, id keybase1.SigID, lid LinkID, err error)
SimpleSignJson marshals the given Json structure and then signs it.
func (*LinkID) MarshalJSON ¶
func (*LinkID) UnmarshalJSON ¶
type LoadUserArg ¶
type LoadUserArg struct {
// contains filtered or unexported fields
}
func NewLoadUserArg ¶
func NewLoadUserArg(g *GlobalContext) LoadUserArg
func NewLoadUserArgWithContext ¶ added in v1.0.27
func NewLoadUserArgWithContext(ctx context.Context, g *GlobalContext) LoadUserArg
func NewLoadUserArgWithMetaContext ¶
func NewLoadUserArgWithMetaContext(m MetaContext) LoadUserArg
func NewLoadUserByNameArg ¶
func NewLoadUserByNameArg(g *GlobalContext, name string) LoadUserArg
func NewLoadUserByUIDArg ¶
func NewLoadUserByUIDArg(ctx context.Context, g *GlobalContext, uid keybase1.UID) LoadUserArg
func NewLoadUserByUIDForceArg ¶ added in v1.0.19
func NewLoadUserByUIDForceArg(g *GlobalContext, uid keybase1.UID) LoadUserArg
func NewLoadUserForceArg ¶
func NewLoadUserForceArg(g *GlobalContext) LoadUserArg
func NewLoadUserPubOptionalArg ¶
func NewLoadUserPubOptionalArg(g *GlobalContext) LoadUserArg
func NewLoadUserSelfAndUIDArg ¶ added in v1.0.34
func NewLoadUserSelfAndUIDArg(g *GlobalContext) LoadUserArg
func NewLoadUserSelfArg ¶ added in v1.0.19
func NewLoadUserSelfArg(g *GlobalContext) LoadUserArg
func (LoadUserArg) EnsureCtxAndLogTag ¶
func (arg LoadUserArg) EnsureCtxAndLogTag() LoadUserArg
func (LoadUserArg) GetNetContext ¶ added in v1.0.19
func (arg LoadUserArg) GetNetContext() context.Context
func (LoadUserArg) MetaContext ¶
func (arg LoadUserArg) MetaContext() MetaContext
func (LoadUserArg) String ¶ added in v1.0.19
func (arg LoadUserArg) String() string
func (LoadUserArg) WithAbortIfSigchainUnchanged ¶ added in v1.0.34
func (arg LoadUserArg) WithAbortIfSigchainUnchanged() LoadUserArg
func (LoadUserArg) WithCachedOnly ¶ added in v1.0.34
func (arg LoadUserArg) WithCachedOnly() LoadUserArg
func (LoadUserArg) WithForcePoll ¶ added in v1.0.27
func (arg LoadUserArg) WithForcePoll(fp bool) LoadUserArg
func (LoadUserArg) WithForceReload ¶ added in v1.0.34
func (arg LoadUserArg) WithForceReload() LoadUserArg
func (LoadUserArg) WithLoginContext ¶ added in v1.0.34
func (arg LoadUserArg) WithLoginContext(l LoginContext) LoadUserArg
func (LoadUserArg) WithName ¶ added in v1.0.34
func (arg LoadUserArg) WithName(n string) LoadUserArg
func (LoadUserArg) WithNetContext ¶ added in v1.0.19
func (arg LoadUserArg) WithNetContext(ctx context.Context) LoadUserArg
func (LoadUserArg) WithPublicKeyOptional ¶ added in v1.0.19
func (arg LoadUserArg) WithPublicKeyOptional() LoadUserArg
func (LoadUserArg) WithResolveBody ¶ added in v1.0.34
func (arg LoadUserArg) WithResolveBody(r *jsonw.Wrapper) LoadUserArg
func (LoadUserArg) WithSelf ¶ added in v1.0.22
func (arg LoadUserArg) WithSelf(self bool) LoadUserArg
func (LoadUserArg) WithStaleOK ¶ added in v1.0.34
func (arg LoadUserArg) WithStaleOK(b bool) LoadUserArg
func (LoadUserArg) WithUID ¶ added in v1.0.19
func (arg LoadUserArg) WithUID(uid keybase1.UID) LoadUserArg
type LocalDb ¶
type LocalDb interface { LocalDbOps Open() error ForceOpen() error Close() error Nuke() (string, error) OpenTransaction() (LocalDbTransaction, error) }
type LocalDbOps ¶ added in v1.0.18
type LocalDbTransaction ¶ added in v1.0.18
type LocalDbTransaction interface { LocalDbOps Commit() error Discard() }
type LocalSigchainGuard ¶ added in v1.0.27
type LocalSigchainGuard struct { Contextified // contains filtered or unexported fields }
A guard used to tell background tasks to stay off the sigchain while the user is changing their sigchain on purpose. Don't treat this as a lock, it's very sloppy. The guard exists to avoid races where an intentional action like provisioning loads the sigchain, but then it gets changed by a background task, so the intentional action would fail. This is just an atomic bool. Intentional actions can acquire it multiple times, release it even when others have it, so it's sloppy, but you'll never deadlock.
func NewLocalSigchainGuard ¶ added in v1.0.27
func NewLocalSigchainGuard(g *GlobalContext) *LocalSigchainGuard
func (*LocalSigchainGuard) Clear ¶ added in v1.0.27
func (l *LocalSigchainGuard) Clear(ctx context.Context, reason string)
func (*LocalSigchainGuard) IsAvailable ¶ added in v1.0.27
func (l *LocalSigchainGuard) IsAvailable(ctx context.Context, reason string) bool
type LockPIDFile ¶
type LockPIDFile struct { Contextified // contains filtered or unexported fields }
func NewLockPIDFile ¶
func NewLockPIDFile(g *GlobalContext, s string) *LockPIDFile
func (*LockPIDFile) Close ¶
func (f *LockPIDFile) Close() (err error)
func (*LockPIDFile) Lock ¶
func (f *LockPIDFile) Lock() (err error)
Lock writes the pid to filename after acquiring a lock on the file. When the process exits, the lock will be released.
type LockTable ¶
func (*LockTable) AcquireOnName ¶
type LockedTriplesec ¶
LockedTriplesec is a wrapper around a Triplesec interface, which allows multiple goroutines to handle the same underlying Triplesec at the same time. The mechanism is simply a mutex wrapping all accesses.
func NewLockedTriplesec ¶
func NewLockedTriplesec(t Triplesec) *LockedTriplesec
func (*LockedTriplesec) DeriveKey ¶
func (t *LockedTriplesec) DeriveKey(l int) ([]byte, []byte, error)
func (*LockedTriplesec) Scrub ¶
func (t *LockedTriplesec) Scrub()
type LogContext ¶ added in v1.0.18
type LogProfileContext ¶
type LogProfileContext struct { Contextified Path string }
LogProfileContext for LogProfile
func (*LogProfileContext) LogProfile ¶
func (l *LogProfileContext) LogProfile(path string) ([]string, error)
type LogSendContext ¶ added in v1.0.17
type LogSendContext struct { Contextified Logs Logs }
LogSendContext for LogSend
func (*LogSendContext) LogSend ¶ added in v1.0.17
func (l *LogSendContext) LogSend(statusJSON, feedback string, sendLogs bool, numBytes int, uid keybase1.UID, installID InstallID, mergeExtendedStatus bool) (string, error)
LogSend sends the tails of log files to kb, and also the last few trace output files.
type LoggedInError ¶
type LoggedInError struct{}
func (LoggedInError) Error ¶
func (e LoggedInError) Error() string
func (LoggedInError) ToStatus ¶
func (e LoggedInError) ToStatus() (s keybase1.Status)
type LoggedInWrongUserError ¶
type LoggedInWrongUserError struct { ExistingName NormalizedUsername AttemptedName NormalizedUsername }
func (LoggedInWrongUserError) Error ¶
func (e LoggedInWrongUserError) Error() string
func (LoggedInWrongUserError) ToStatus ¶
func (e LoggedInWrongUserError) ToStatus() (s keybase1.Status)
type LoginContext ¶
type LoginContext interface { LoggedInLoad() (bool, error) Salt() []byte CreateStreamCache(tsec Triplesec, pps *PassphraseStream) SetStreamCache(c *PassphraseStreamCache) PassphraseStreamCache() *PassphraseStreamCache CreateLoginSessionWithSalt(emailOrUsername string, salt []byte) error LoginSession() *LoginSession SetLoginSession(l *LoginSession) LocalSession() *Session GetUID() keybase1.UID GetUsername() NormalizedUsername GetUserVersion() keybase1.UserVersion SaveState(sessionID, csrf string, username NormalizedUsername, uv keybase1.UserVersion, deviceID keybase1.DeviceID) error SetUsernameUserVersion(username NormalizedUsername, uv keybase1.UserVersion) error Keyring(m MetaContext) (*SKBKeyringFile, error) ClearKeyring() SecretSyncer() *SecretSyncer RunSecretSyncer(m MetaContext, uid keybase1.UID) error Dump(m MetaContext, prefix string) }
LoginContext is passed to all loginHandler functions. It allows them safe access to various parts of the LoginState during the login process.
type LoginOfflineError ¶ added in v1.0.22
type LoginOfflineError struct {
// contains filtered or unexported fields
}
func NewLoginOfflineError ¶ added in v1.0.22
func NewLoginOfflineError(msg string) LoginOfflineError
func (LoginOfflineError) Error ¶ added in v1.0.22
func (e LoginOfflineError) Error() string
type LoginRequiredError ¶
type LoginRequiredError struct {
Context string
}
func (LoginRequiredError) Error ¶
func (e LoginRequiredError) Error() string
func (LoginRequiredError) ToStatus ¶
func (u LoginRequiredError) ToStatus() (s keybase1.Status)
type LoginSession ¶
type LoginSession struct { Contextified // contains filtered or unexported fields }
func NewLoginSession ¶
func NewLoginSession(g *GlobalContext, emailOrUsername string) *LoginSession
func NewLoginSessionWithSalt ¶
func NewLoginSessionWithSalt(g *GlobalContext, emailOrUsername string, salt []byte) *LoginSession
Upon signup, a login session is created with a generated salt.
func (*LoginSession) Clear ¶
func (s *LoginSession) Clear() error
Clear removes the loginSession value from s. It does not clear the salt. Unclear how this is useful.
func (*LoginSession) Dump ¶
func (s *LoginSession) Dump()
func (*LoginSession) ExistsFor ¶
func (s *LoginSession) ExistsFor(emailOrUsername string) bool
func (*LoginSession) Load ¶
func (s *LoginSession) Load(m MetaContext) error
func (*LoginSession) NotExpired ¶
func (s *LoginSession) NotExpired() bool
func (*LoginSession) Salt ¶
func (s *LoginSession) Salt() ([]byte, error)
func (*LoginSession) Session ¶
func (s *LoginSession) Session() ([]byte, error)
func (*LoginSession) SessionEncoded ¶
func (s *LoginSession) SessionEncoded() (string, error)
func (*LoginSession) Status ¶
func (s *LoginSession) Status() *keybase1.SessionStatus
type LoginSessionNotFound ¶
type LoginSessionNotFound struct {
SessionID int
}
func (LoginSessionNotFound) Error ¶
func (e LoginSessionNotFound) Error() string
type LoginStateTimeoutError ¶ added in v1.0.27
type LoginStateTimeoutError struct { ActiveRequest string AttemptedRequest string Duration time.Duration }
func (LoginStateTimeoutError) Error ¶ added in v1.0.27
func (e LoginStateTimeoutError) Error() string
func (LoginStateTimeoutError) ToStatus ¶ added in v1.0.27
func (e LoginStateTimeoutError) ToStatus() keybase1.Status
type LoginUI ¶
type LoginUI interface { keybase1.LoginUiInterface }
type LogoutError ¶
type LogoutError struct{}
func (LogoutError) Error ¶
func (e LogoutError) Error() string
type LogoutHook ¶ added in v1.0.16
type LogoutHook interface {
OnLogout() error
}
type Logs ¶ added in v1.0.17
type Logs struct { Desktop string Kbfs string Service string Updater string Start string Install string System string Git string Trace string Watchdog string }
Logs is the struct to specify the path of log files
type LoopbackAddr ¶
type LoopbackAddr struct{}
LoopbackAddr is an address class that implement the net.Addr interface for loopback devices
func (LoopbackAddr) Network ¶
func (la LoopbackAddr) Network() (s string)
Network returns the name of the network
func (LoopbackAddr) String ¶
func (la LoopbackAddr) String() (s string)
String returns the string form of address
type LoopbackConn ¶
type LoopbackConn struct {
// contains filtered or unexported fields
}
LoopbackConn implments the net.Conn interface but is used to loopback from a process to itself. It is goroutine safe.
func (*LoopbackConn) Close ¶
func (lc *LoopbackConn) Close() (err error)
Close closes the connection. Any blocked Read or Write operations will be unblocked and return errors.
func (*LoopbackConn) LocalAddr ¶
func (lc *LoopbackConn) LocalAddr() (addr net.Addr)
LocalAddr returns the local network address.
func (*LoopbackConn) Read ¶
func (lc *LoopbackConn) Read(b []byte) (n int, err error)
Read reads data from the connection.
func (*LoopbackConn) RemoteAddr ¶
func (lc *LoopbackConn) RemoteAddr() (addr net.Addr)
RemoteAddr returns the remote network address.
func (*LoopbackConn) SetDeadline ¶
func (lc *LoopbackConn) SetDeadline(t time.Time) (err error)
SetDeadline sets the read and write deadlines associated with the connection. It is equivalent to calling both SetReadDeadline and SetWriteDeadline.
A deadline is an absolute time after which I/O operations fail with a timeout (see type Error) instead of blocking. The deadline applies to all future I/O, not just the immediately following call to Read or Write.
An idle timeout can be implemented by repeatedly extending the deadline after successful Read or Write calls.
A zero value for t means I/O operations will not time out.
func (*LoopbackConn) SetReadDeadline ¶
func (lc *LoopbackConn) SetReadDeadline(t time.Time) (err error)
SetReadDeadline sets the deadline for future Read calls. A zero value for t means Read will not time out.
func (*LoopbackConn) SetWriteDeadline ¶
func (lc *LoopbackConn) SetWriteDeadline(t time.Time) (err error)
SetWriteDeadline sets the deadline for future Write calls. Even if write times out, it may return n > 0, indicating that some of the data was successfully written. A zero value for t means Write will not time out.
type LoopbackListener ¶
type LoopbackListener struct {
// contains filtered or unexported fields
}
LoopbackListener is a listener that creates new loopback connections. It is goroutine safe.
func NewLoopbackListener ¶
func NewLoopbackListener(ctx LogContext) *LoopbackListener
NewLoopbackListener creates a new Loopback listener
func (*LoopbackListener) Accept ¶
func (ll *LoopbackListener) Accept() (ret net.Conn, err error)
Accept waits for and returns the next connection to the listener.
func (*LoopbackListener) Addr ¶
func (ll *LoopbackListener) Addr() (addr net.Addr)
Addr returns the listener's network address.
func (*LoopbackListener) Close ¶
func (ll *LoopbackListener) Close() (err error)
Close closes the listener. Any blocked Accept operations will be unblocked and return errors
type MerkleClashError ¶
type MerkleClashError struct {
// contains filtered or unexported fields
}
func (MerkleClashError) Error ¶
func (m MerkleClashError) Error() string
type MerkleClient ¶
type MerkleClient struct { Contextified // protects whole object sync.RWMutex // contains filtered or unexported fields }
func NewMerkleClient ¶
func NewMerkleClient(g *GlobalContext) *MerkleClient
func (*MerkleClient) FetchRootFromServer ¶ added in v1.0.27
func (mc *MerkleClient) FetchRootFromServer(m MetaContext, freshness time.Duration) (mr *MerkleRoot, err error)
func (*MerkleClient) FetchRootFromServerBySeqno ¶ added in v1.0.27
func (mc *MerkleClient) FetchRootFromServerBySeqno(m MetaContext, lowerBound keybase1.Seqno) (mr *MerkleRoot, err error)
func (*MerkleClient) FirstSeqnoWithSkips ¶ added in v1.0.19
func (mc *MerkleClient) FirstSeqnoWithSkips() *keybase1.Seqno
func (*MerkleClient) LastRoot ¶ added in v1.0.19
func (mc *MerkleClient) LastRoot() *MerkleRoot
func (*MerkleClient) LastRootInfo ¶ added in v1.0.19
func (mc *MerkleClient) LastRootInfo(m MetaContext) (*chat1.MerkleRoot, error)
Can return (nil, nil) if no root is known.
func (*MerkleClient) LastRootToSigJSON ¶
func (mc *MerkleClient) LastRootToSigJSON(m MetaContext) (ret *jsonw.Wrapper, err error)
func (*MerkleClient) LookupLeafAtHashMeta ¶ added in v1.0.27
func (mc *MerkleClient) LookupLeafAtHashMeta(m MetaContext, leafID keybase1.UserOrTeamID, hm keybase1.HashMeta) (leaf *MerkleGenericLeaf, err error)
func (*MerkleClient) LookupLeafAtSeqno ¶
func (mc *MerkleClient) LookupLeafAtSeqno(m MetaContext, leafID keybase1.UserOrTeamID, s keybase1.Seqno) (leaf *MerkleGenericLeaf, root *MerkleRoot, err error)
func (*MerkleClient) LookupRootAtSeqno ¶
func (mc *MerkleClient) LookupRootAtSeqno(m MetaContext, s keybase1.Seqno) (root *MerkleRoot, err error)
func (*MerkleClient) LookupTeam ¶ added in v1.0.27
func (mc *MerkleClient) LookupTeam(m MetaContext, teamID keybase1.TeamID) (leaf *MerkleTeamLeaf, err error)
func (*MerkleClient) LookupUser ¶
func (mc *MerkleClient) LookupUser(m MetaContext, q HTTPArgs, sigHints *SigHints) (u *MerkleUserLeaf, err error)
type MerkleClientError ¶
type MerkleClientError struct {
// contains filtered or unexported fields
}
func (MerkleClientError) Error ¶
func (m MerkleClientError) Error() string
func (MerkleClientError) IsNotFound ¶
func (m MerkleClientError) IsNotFound() bool
func (MerkleClientError) IsOldTree ¶
func (m MerkleClientError) IsOldTree() bool
func (MerkleClientError) ToStatus ¶
func (e MerkleClientError) ToStatus() (ret keybase1.Status)
type MerkleGenericLeaf ¶ added in v1.0.27
type MerkleGenericLeaf struct { LeafID keybase1.UserOrTeamID Public *MerkleTriple Private *MerkleTriple // contains filtered or unexported fields }
type MerklePathNotFoundError ¶
type MerklePathNotFoundError struct {
// contains filtered or unexported fields
}
func (MerklePathNotFoundError) Error ¶
func (m MerklePathNotFoundError) Error() string
type MerkleResetChainTail ¶ added in v1.0.46
type MerkleResets ¶ added in v1.0.46
type MerkleResets struct {
// contains filtered or unexported fields
}
type MerkleRoot ¶
type MerkleRoot struct { Contextified // contains filtered or unexported fields }
func NewMerkleRootFromJSON ¶
func NewMerkleRootFromJSON(m MetaContext, jw *jsonw.Wrapper) (ret *MerkleRoot, err error)
func (*MerkleRoot) Ctime ¶ added in v1.0.19
func (mr *MerkleRoot) Ctime() int64
func (MerkleRoot) ExportToAVDL ¶ added in v1.0.27
func (mr MerkleRoot) ExportToAVDL(g *GlobalContext) keybase1.MerkleRootAndTime
func (*MerkleRoot) Fetched ¶ added in v1.0.21
func (mr *MerkleRoot) Fetched() time.Time
func (*MerkleRoot) HasSkips ¶ added in v1.0.19
func (mr *MerkleRoot) HasSkips() bool
func (MerkleRoot) HashMeta ¶ added in v1.0.27
func (mr MerkleRoot) HashMeta() keybase1.HashMeta
func (MerkleRoot) IsNil ¶
func (mr MerkleRoot) IsNil() bool
func (*MerkleRoot) KBFSPrivate ¶ added in v1.0.48
func (mr *MerkleRoot) KBFSPrivate() (keybase1.KBFSRootHash, *keybase1.Seqno)
func (*MerkleRoot) KBFSPrivateTeam ¶ added in v1.0.48
func (mr *MerkleRoot) KBFSPrivateTeam() (keybase1.KBFSRootHash, *keybase1.Seqno)
func (*MerkleRoot) KBFSPublic ¶ added in v1.0.48
func (mr *MerkleRoot) KBFSPublic() (keybase1.KBFSRootHash, *keybase1.Seqno)
func (*MerkleRoot) LegacyUIDRootHash ¶ added in v1.0.19
func (mr *MerkleRoot) LegacyUIDRootHash() NodeHash
func (*MerkleRoot) PvlHash ¶ added in v1.0.21
func (mr *MerkleRoot) PvlHash() string
func (*MerkleRoot) RootHash ¶ added in v1.0.19
func (mr *MerkleRoot) RootHash() NodeHash
func (*MerkleRoot) Seqno ¶ added in v1.0.19
func (mr *MerkleRoot) Seqno() *keybase1.Seqno
func (MerkleRoot) ShallowCopy ¶ added in v1.0.19
func (mr MerkleRoot) ShallowCopy() *MerkleRoot
func (MerkleRoot) ShortHash ¶ added in v1.0.19
func (mr MerkleRoot) ShortHash() NodeHashShort
func (*MerkleRoot) SkipToSeqno ¶ added in v1.0.19
func (mr *MerkleRoot) SkipToSeqno(s keybase1.Seqno) NodeHash
func (*MerkleRoot) Store ¶
func (mr *MerkleRoot) Store(storeFirstSkip bool) error
func (*MerkleRoot) ToInfo ¶ added in v1.0.19
func (mr *MerkleRoot) ToInfo() chat1.MerkleRoot
func (*MerkleRoot) ToJSON ¶
func (mr *MerkleRoot) ToJSON() (jw *jsonw.Wrapper)
func (*MerkleRoot) ToSigJSON ¶
func (mr *MerkleRoot) ToSigJSON() (ret *jsonw.Wrapper)
type MerkleRootPayload ¶ added in v1.0.19
type MerkleRootPayload struct {
// contains filtered or unexported fields
}
func NewMerkleRootPayloadFromJSONString ¶ added in v1.0.19
func NewMerkleRootPayloadFromJSONString(s string) (ret MerkleRootPayload, err error)
type MerkleRootPayloadUnpacked ¶ added in v1.0.19
type MerkleRootPayloadUnpacked struct { Body struct { Kbfs struct { Private struct { Root keybase1.KBFSRootHash `json:"root"` Version *keybase1.Seqno `json:"version"` } `json:"private"` Public struct { Root keybase1.KBFSRootHash `json:"root"` Version *keybase1.Seqno `json:"version"` } `json:"public"` PrivateTeam struct { Root keybase1.KBFSRootHash `json:"root"` Version *keybase1.Seqno `json:"version"` } `json:"privateteam"` } `json:"kbfs"` LegacyUIDRoot NodeHashShort `json:"legacy_uid_root"` Prev NodeHashLong `json:"prev"` Root NodeHashLong `json:"root"` Seqno keybase1.Seqno `json:"seqno"` Skips SkipTable `json:"skips"` Txid string `json:"txid"` Type string `json:"type"` Version int `json:"version"` PvlHash string `json:"pvl_hash"` } `json:"body"` Ctime int64 `json:"ctime"` Tag string `json:"tag"` }
type MerkleTeamLeaf ¶ added in v1.0.27
type MerkleTeamLeaf struct { TeamID keybase1.TeamID Public *MerkleTriple Private *MerkleTriple }
func (MerkleTeamLeaf) MerkleGenericLeaf ¶ added in v1.0.27
func (l MerkleTeamLeaf) MerkleGenericLeaf() *MerkleGenericLeaf
type MerkleTriple ¶
type MerkleTriple struct { Seqno keybase1.Seqno `json:"seqno"` LinkID LinkID `json:"id"` SigID keybase1.SigID `json:"sigid,omitempty"` }
func GetMerkleTriple ¶
func GetMerkleTriple(jw *jsonw.Wrapper) (ret *MerkleTriple, err error)
func (MerkleTriple) Eq ¶ added in v1.0.27
func (mt MerkleTriple) Eq(mt2 MerkleTriple) bool
func (MerkleTriple) Less ¶
func (mt MerkleTriple) Less(mt2 MerkleTriple) bool
type MerkleUserLeaf ¶
type MerkleUserLeaf struct {
// contains filtered or unexported fields
}
func (*MerkleUserLeaf) MatchUser ¶
func (mul *MerkleUserLeaf) MatchUser(u *User, uid keybase1.UID, nun NormalizedUsername) (err error)
func (MerkleUserLeaf) MerkleGenericLeaf ¶ added in v1.0.27
func (mul MerkleUserLeaf) MerkleGenericLeaf() *MerkleGenericLeaf
func (MerkleUserLeaf) Public ¶ added in v1.0.27
func (mul MerkleUserLeaf) Public() *MerkleTriple
type MetaContext ¶
type MetaContext struct {
// contains filtered or unexported fields
}
func NewMetaContext ¶
func NewMetaContext(ctx context.Context, g *GlobalContext) MetaContext
func NewMetaContextBackground ¶
func NewMetaContextBackground(g *GlobalContext) MetaContext
func NewMetaContextForTest ¶
func NewMetaContextForTest(tc TestContext) MetaContext
func NewMetaContextForTestWithLogUI ¶
func NewMetaContextForTestWithLogUI(tc TestContext) MetaContext
func NewMetaContextTODO ¶
func NewMetaContextTODO(g *GlobalContext) MetaContext
func (MetaContext) ActiveDevice ¶
func (m MetaContext) ActiveDevice() *ActiveDevice
func (MetaContext) BackgroundWithCancel ¶
func (m MetaContext) BackgroundWithCancel() (MetaContext, func())
func (MetaContext) BackgroundWithLogTags ¶
func (m MetaContext) BackgroundWithLogTags() MetaContext
func (MetaContext) CDebugf ¶
func (m MetaContext) CDebugf(f string, args ...interface{})
func (MetaContext) CErrorf ¶
func (m MetaContext) CErrorf(f string, args ...interface{})
func (MetaContext) CInfof ¶
func (m MetaContext) CInfof(f string, args ...interface{})
func (MetaContext) CTrace ¶
func (m MetaContext) CTrace(msg string, f func() error) func()
func (MetaContext) CTraceOK ¶
func (m MetaContext) CTraceOK(msg string, f func() bool) func()
func (MetaContext) CTraceTimed ¶
func (m MetaContext) CTraceTimed(msg string, f func() error) func()
func (MetaContext) CVTrace ¶
func (m MetaContext) CVTrace(lev VDebugLevel, msg string, f func() error) func()
func (MetaContext) CVTraceOK ¶
func (m MetaContext) CVTraceOK(lev VDebugLevel, msg string, f func() bool) func()
func (MetaContext) CWarningf ¶
func (m MetaContext) CWarningf(f string, args ...interface{})
func (MetaContext) CommitProvisionalLogin ¶
func (m MetaContext) CommitProvisionalLogin() MetaContext
func (MetaContext) Ctx ¶
func (m MetaContext) Ctx() context.Context
func (MetaContext) CurrentUID ¶
func (m MetaContext) CurrentUID() keybase1.UID
func (MetaContext) CurrentUserVersion ¶
func (m MetaContext) CurrentUserVersion() keybase1.UserVersion
func (MetaContext) CurrentUsername ¶
func (m MetaContext) CurrentUsername() NormalizedUsername
func (MetaContext) Dump ¶
func (m MetaContext) Dump()
func (MetaContext) EnsureCtx ¶
func (m MetaContext) EnsureCtx() MetaContext
func (MetaContext) G ¶
func (m MetaContext) G() *GlobalContext
func (MetaContext) HasAnySession ¶
func (m MetaContext) HasAnySession() (ret bool)
func (MetaContext) Keyring ¶
func (m MetaContext) Keyring() (ret *SKBKeyringFile, err error)
func (MetaContext) LoginContext ¶
func (m MetaContext) LoginContext() LoginContext
func (MetaContext) LogoutAndDeprovisionIfRevoked ¶
func (m MetaContext) LogoutAndDeprovisionIfRevoked() (err error)
LogoutAndDeprovisionIfRevoked loads the user and checks if the current device keys have been revoked. If so, it calls Logout and then runs the ClearSecretsOnDeprovision
func (MetaContext) PassphraseStream ¶
func (m MetaContext) PassphraseStream() *PassphraseStream
func (MetaContext) PassphraseStreamAndTriplesec ¶
func (m MetaContext) PassphraseStreamAndTriplesec() (*PassphraseStream, Triplesec)
func (MetaContext) ProvisionalSessionArgs ¶
func (m MetaContext) ProvisionalSessionArgs() (token string, csrf string)
func (MetaContext) SecretKeyPromptArg ¶
func (m MetaContext) SecretKeyPromptArg(ska SecretKeyArg, reason string) SecretKeyPromptArg
func (MetaContext) SetActiveDevice ¶
func (m MetaContext) SetActiveDevice(uv keybase1.UserVersion, deviceID keybase1.DeviceID, sigKey, encKey GenericKey, deviceName string) error
SetActiveDevice sets the active device to have the UserVersion, deviceID, sigKey, encKey and deviceName as specified, and does so while grabbing the global switchUser lock, since it should be sycnhronized with attempts to switch the global logged in user. It does not, however, change the `current_user` in the config file, or edit the global config file in any way.
func (MetaContext) SetEncryptionKey ¶
func (m MetaContext) SetEncryptionKey(uv keybase1.UserVersion, deviceID keybase1.DeviceID, encKey GenericKey) error
func (MetaContext) SetSigningKey ¶
func (m MetaContext) SetSigningKey(uv keybase1.UserVersion, deviceID keybase1.DeviceID, sigKey GenericKey, deviceName string) error
func (MetaContext) SwitchUser ¶
func (m MetaContext) SwitchUser(n NormalizedUsername) error
func (MetaContext) SwitchUserDeprovisionNukeConfig ¶
func (m MetaContext) SwitchUserDeprovisionNukeConfig(username NormalizedUsername) error
func (MetaContext) SwitchUserLoggedOut ¶
func (m MetaContext) SwitchUserLoggedOut() (err error)
SiwtchUserLoggedOut clears the active device and the current_user stanza of the config file, all while holding the switchUserMu
func (MetaContext) SwitchUserNewConfig ¶
func (m MetaContext) SwitchUserNewConfig(u keybase1.UID, n NormalizedUsername, salt []byte, d keybase1.DeviceID) error
SwitchUserNewConfig switches the global active "user" as far as the global config file is concerned. It switches the user to a new user, and therefore you should specify the username, salt, and device ID for this user on this device. It will take out the global `switchUserMu` and also clear out the global ActiveDevice at the same time. We follow the same pattern here and elsewhere: atomically mutate the `current_user` of the config file as we set the global ActiveDevice.
func (MetaContext) SwitchUserNewConfigActiveDevice ¶
func (m MetaContext) SwitchUserNewConfigActiveDevice(uv keybase1.UserVersion, n NormalizedUsername, salt []byte, d keybase1.DeviceID, sigKey GenericKey, encKey GenericKey, deviceName string) error
SwitchUserNewConfigActiveDevice creates a new config file stanza and an active device for the given user, all while holding the switchUserMu lock.
func (MetaContext) SwitchUserNukeConfig ¶
func (m MetaContext) SwitchUserNukeConfig(n NormalizedUsername) error
SwitchUserNukeConfig removes the given username from the config file, and then switches to not having a current user (by clearing the ActiveDevice, etc). It does this in a critical section, holding switchUserMu.
func (MetaContext) SwitchUserToActiveDevice ¶
func (m MetaContext) SwitchUserToActiveDevice(n NormalizedUsername, ad *ActiveDevice) (err error)
func (MetaContext) SwitchUserToActiveOneshotDevice ¶
func (m MetaContext) SwitchUserToActiveOneshotDevice(uv keybase1.UserVersion, nun NormalizedUsername, d *DeviceWithKeys) (err error)
SetActiveOneshotDevice acquires the switchUserMu mutex, setting the active device to one that corresponds to the given UID and DeviceWithKeys, and also sets the config file to a temporary in-memory config (not writing to disk) to satisfy local requests for g.Env.*
func (MetaContext) SyncSecrets ¶
func (m MetaContext) SyncSecrets() (ss *SecretSyncer, err error)
func (MetaContext) SyncSecretsForUID ¶
func (m MetaContext) SyncSecretsForUID(u keybase1.UID) (ss *SecretSyncer, err error)
func (MetaContext) TriplesecAndGeneration ¶
func (m MetaContext) TriplesecAndGeneration() (ret Triplesec, ppgen PassphraseGeneration)
func (MetaContext) UIs ¶
func (m MetaContext) UIs() UIs
func (MetaContext) VLogf ¶
func (m MetaContext) VLogf(lev VDebugLevel, msg string, args ...interface{})
func (MetaContext) WithAPITokener ¶
func (m MetaContext) WithAPITokener(t APITokener) MetaContext
func (MetaContext) WithActiveDevice ¶
func (m MetaContext) WithActiveDevice(a *ActiveDevice) MetaContext
func (MetaContext) WithContextCancel ¶
func (m MetaContext) WithContextCancel() (MetaContext, func())
func (MetaContext) WithCtx ¶
func (m MetaContext) WithCtx(c context.Context) MetaContext
func (MetaContext) WithDelegatedIdentifyUI ¶
func (m MetaContext) WithDelegatedIdentifyUI(u IdentifyUI) MetaContext
func (MetaContext) WithGPGUI ¶
func (m MetaContext) WithGPGUI(u GPGUI) MetaContext
func (MetaContext) WithGlobalActiveDevice ¶
func (m MetaContext) WithGlobalActiveDevice() MetaContext
func (MetaContext) WithIdentifyUI ¶
func (m MetaContext) WithIdentifyUI(u IdentifyUI) MetaContext
func (MetaContext) WithLogTag ¶
func (m MetaContext) WithLogTag(k string) MetaContext
func (MetaContext) WithLogUI ¶
func (m MetaContext) WithLogUI(u LogUI) MetaContext
func (MetaContext) WithLoginContext ¶
func (m MetaContext) WithLoginContext(l LoginContext) MetaContext
func (MetaContext) WithNewProvisionalLoginContext ¶
func (m MetaContext) WithNewProvisionalLoginContext() MetaContext
func (MetaContext) WithNewProvisionalLoginContextForUser ¶
func (m MetaContext) WithNewProvisionalLoginContextForUser(u *User) MetaContext
func (MetaContext) WithNewProvisionalLoginContextForUserVersionAndUsername ¶
func (m MetaContext) WithNewProvisionalLoginContextForUserVersionAndUsername(uv keybase1.UserVersion, un NormalizedUsername) MetaContext
func (MetaContext) WithPaperKeyActiveDevice ¶
func (m MetaContext) WithPaperKeyActiveDevice(d *DeviceWithKeys, uv keybase1.UserVersion) MetaContext
func (MetaContext) WithPgpUI ¶
func (m MetaContext) WithPgpUI(u PgpUI) MetaContext
func (MetaContext) WithSaltpackUI ¶
func (m MetaContext) WithSaltpackUI(s SaltpackUI) MetaContext
func (MetaContext) WithSecretUI ¶
func (m MetaContext) WithSecretUI(u SecretUI) MetaContext
func (MetaContext) WithTimeBuckets ¶
func (m MetaContext) WithTimeBuckets() (MetaContext, *profiling.TimeBuckets)
func (MetaContext) WithTimeout ¶
func (m MetaContext) WithTimeout(timeout time.Duration) (MetaContext, func())
func (MetaContext) WithUIs ¶
func (m MetaContext) WithUIs(u UIs) MetaContext
type MetaContextified ¶
type MetaContextified struct {
// contains filtered or unexported fields
}
func NewMetaContextified ¶
func NewMetaContextified(m MetaContext) MetaContextified
func (MetaContextified) G ¶
func (m MetaContextified) G() *GlobalContext
func (MetaContextified) M ¶
func (m MetaContextified) M() MetaContext
type MissingDelegationTypeError ¶
type MissingDelegationTypeError struct{}
func (MissingDelegationTypeError) Error ¶
func (e MissingDelegationTypeError) Error() string
type NIST ¶ added in v1.0.48
type NIST struct { Contextified sync.RWMutex // contains filtered or unexported fields }
func (*NIST) MarkFailure ¶ added in v1.0.48
func (n *NIST) MarkFailure()
func (*NIST) MarkSuccess ¶ added in v1.0.48
func (n *NIST) MarkSuccess()
type NISTFactory ¶ added in v1.0.48
type NISTFactory struct { Contextified sync.Mutex // contains filtered or unexported fields }
func NewNISTFactory ¶ added in v1.0.48
func NewNISTFactory(g *GlobalContext, uid keybase1.UID, deviceID keybase1.DeviceID, key GenericKey) *NISTFactory
type NaclDHKeyPair ¶
type NaclDHKeyPair struct { Public NaclDHKeyPublic Private *NaclDHKeyPrivate }
func GenerateNaclDHKeyPair ¶
func GenerateNaclDHKeyPair() (NaclDHKeyPair, error)
func ImportDHKeypairFromKID ¶
func ImportDHKeypairFromKID(k keybase1.KID) (*NaclDHKeyPair, error)
func ImportNaclDHKeyPairFromBytes ¶
func ImportNaclDHKeyPairFromBytes(pub []byte, priv []byte) (ret NaclDHKeyPair, err error)
func ImportNaclDHKeyPairFromHex ¶
func ImportNaclDHKeyPairFromHex(s string) (ret NaclDHKeyPair, err error)
func MakeNaclDHKeyPairFromSecret ¶
func MakeNaclDHKeyPairFromSecret(secret [NaclDHKeySecretSize]byte) (NaclDHKeyPair, error)
MakeNaclDHKeyPairFromSecret makes a DH key pair given a secret. Of course, the security of depends entirely on the randomness of the bytes in the secret.
func MakeNaclDHKeyPairFromSecretBytes ¶ added in v1.0.22
func MakeNaclDHKeyPairFromSecretBytes(secret []byte) (NaclDHKeyPair, error)
func (NaclDHKeyPair) CanDecrypt ¶
func (k NaclDHKeyPair) CanDecrypt() bool
CanDecrypt returns true if there's a private key available
func (NaclDHKeyPair) CanEncrypt ¶
func (k NaclDHKeyPair) CanEncrypt() bool
CanEncrypt always returns true for an encryption key pair.
func (NaclDHKeyPair) CanSign ¶
func (k NaclDHKeyPair) CanSign() bool
func (NaclDHKeyPair) CheckSecretKey ¶
func (k NaclDHKeyPair) CheckSecretKey() error
func (NaclDHKeyPair) Clone ¶ added in v1.0.22
func (k NaclDHKeyPair) Clone() (ret NaclDHKeyPair)
func (NaclDHKeyPair) Decrypt ¶
func (k NaclDHKeyPair) Decrypt(nei *NaclEncryptionInfo) (plaintext []byte, sender keybase1.KID, err error)
Decrypt a NaclEncryptionInfo packet, and on success return the plaintext and the KID of the sender (which might be an ephemeral key).
func (NaclDHKeyPair) DecryptFromString ¶
func (k NaclDHKeyPair) DecryptFromString(ciphertext string) (msg []byte, sender keybase1.KID, err error)
DecryptFromString decrypts the output of EncryptToString above, and returns the KID of the other end.
func (NaclDHKeyPair) Encode ¶
func (k NaclDHKeyPair) Encode() (string, error)
func (NaclDHKeyPair) Encrypt ¶
func (k NaclDHKeyPair) Encrypt(msg []byte, sender *NaclDHKeyPair) (*NaclEncryptionInfo, error)
Encrypt a message to the key `k` from the given `sender`. If sender is nil, an ephemeral keypair will be invented
func (NaclDHKeyPair) EncryptToString ¶
func (k NaclDHKeyPair) EncryptToString(plaintext []byte, sender GenericKey) (string, error)
EncryptToString encrypts the plaintext using DiffieHelman; the this object is the receiver, and the passed sender is optional. If not provided, we'll make up an ephemeral key.
func (NaclDHKeyPair) ExportPublicAndPrivate ¶ added in v1.0.18
func (k NaclDHKeyPair) ExportPublicAndPrivate() (RawPublicKey, RawPrivateKey, error)
func (NaclDHKeyPair) GetAlgoType ¶
func (k NaclDHKeyPair) GetAlgoType() AlgoType
func (NaclDHKeyPair) GetBinaryKID ¶ added in v1.0.18
func (k NaclDHKeyPair) GetBinaryKID() (ret keybase1.BinaryKID)
func (NaclDHKeyPair) GetFingerprintP ¶
func (k NaclDHKeyPair) GetFingerprintP() *PGPFingerprint
func (NaclDHKeyPair) GetKID ¶
func (k NaclDHKeyPair) GetKID() keybase1.KID
func (NaclDHKeyPair) HasSecretKey ¶
func (k NaclDHKeyPair) HasSecretKey() bool
func (NaclDHKeyPair) IsNil ¶
func (k NaclDHKeyPair) IsNil() bool
func (NaclDHKeyPair) SecretSymmetricKey ¶ added in v1.0.18
func (k NaclDHKeyPair) SecretSymmetricKey(reason EncryptionReason) (NaclSecretBoxKey, error)
func (NaclDHKeyPair) SignToString ¶
func (NaclDHKeyPair) ToShortIDString ¶
func (k NaclDHKeyPair) ToShortIDString() string
func (NaclDHKeyPair) VerboseDescription ¶
func (k NaclDHKeyPair) VerboseDescription() string
func (NaclDHKeyPair) VerifyString ¶
func (k NaclDHKeyPair) VerifyString(ctx VerifyContext, sig string, msg []byte) (id keybase1.SigID, err error)
func (NaclDHKeyPair) VerifyStringAndExtract ¶
func (k NaclDHKeyPair) VerifyStringAndExtract(ctx VerifyContext, sig string) (msg []byte, id keybase1.SigID, err error)
type NaclDHKeyPrivate ¶
type NaclDHKeyPrivate [NaclDHKeysize]byte
type NaclDHKeyPublic ¶
type NaclDHKeyPublic [NaclDHKeysize]byte
func (NaclDHKeyPublic) GetBinaryKID ¶ added in v1.0.18
func (k NaclDHKeyPublic) GetBinaryKID() keybase1.BinaryKID
func (NaclDHKeyPublic) GetKID ¶
func (k NaclDHKeyPublic) GetKID() keybase1.KID
type NaclEncryptionInfo ¶
type NaclEncryptionInfo struct { Ciphertext []byte `codec:"ciphertext"` EncryptionType AlgoType `codec:"enc_type"` Nonce []byte `codec:"nonce"` Receiver []byte `codec:"receiver_key"` Sender []byte `codec:"sender_key"` }
func (*NaclEncryptionInfo) ToPacket ¶
func (k *NaclEncryptionInfo) ToPacket() (ret *KeybasePacket, err error)
ToPacket implements the Packetable interface.
type NaclGenerator ¶
type NaclGenerator func() (NaclKeyPair, error)
type NaclKeyGen ¶
type NaclKeyGen struct {
// contains filtered or unexported fields
}
func NewNaclKeyGen ¶
func NewNaclKeyGen(arg NaclKeyGenArg) *NaclKeyGen
func (*NaclKeyGen) Generate ¶
func (g *NaclKeyGen) Generate() (err error)
func (*NaclKeyGen) GetKeyPair ¶
func (g *NaclKeyGen) GetKeyPair() NaclKeyPair
func (*NaclKeyGen) Push ¶
func (g *NaclKeyGen) Push(m MetaContext, aggregated bool) (d Delegator, err error)
func (*NaclKeyGen) SaveLKS ¶
func (g *NaclKeyGen) SaveLKS(m MetaContext, lks *LKSec) error
func (*NaclKeyGen) UpdateArg ¶
func (g *NaclKeyGen) UpdateArg(signer GenericKey, eldestKID keybase1.KID, delegationType DelegationType, user *User)
type NaclKeyGenArg ¶
type NaclKeyGenArg struct { Signer GenericKey // who is going to sign us into the Chain ExpiresIn int Generator NaclGenerator Me *User DelegationType DelegationType ExpireIn int // how long it lasts EldestKeyID keybase1.KID // the eldest KID for this epoch Device *Device RevSig string // optional reverse sig. set to nil for autogenerate. }
type NaclKeyPair ¶
type NaclKeyPair interface { GenericKey }
type NaclSecretBoxKey ¶ added in v1.0.21
type NaclSecretBoxKey [NaclSecretBoxKeySize]byte
func DeriveSymmetricKey ¶ added in v1.0.21
func DeriveSymmetricKey(inKey NaclSecretBoxKey, reason EncryptionReason) (NaclSecretBoxKey, error)
Derive a symmetric key. Uses HMAC(key=reason, data=key) Note the message and data are swapped as inputs to HMAC because that is less likely to be accidentally used for another purpose such as authentication.
func (NaclSecretBoxKey) IsZero ¶ added in v1.0.48
func (k NaclSecretBoxKey) IsZero() bool
type NaclSigInfo ¶
type NaclSigInfo struct { Kid keybase1.BinaryKID `codec:"key"` Payload []byte `codec:"payload,omitempty"` Sig NaclSignature `codec:"sig"` SigType AlgoType `codec:"sig_type"` HashType int `codec:"hash_type"` Detached bool `codec:"detached"` Version int `codec:"version,omitempty"` Prefix SignaturePrefix `codec:"prefix,omitempty"` }
func (*NaclSigInfo) ArmoredEncode ¶
func (s *NaclSigInfo) ArmoredEncode() (ret string, err error)
func (*NaclSigInfo) ToPacket ¶
func (s *NaclSigInfo) ToPacket() (ret *KeybasePacket, err error)
func (NaclSigInfo) Verify ¶
func (s NaclSigInfo) Verify() (*NaclSigningKeyPublic, error)
type NaclSignature ¶
type NaclSignature [ed25519.SignatureSize]byte
type NaclSigningKeyPair ¶
type NaclSigningKeyPair struct { Public NaclSigningKeyPublic Private *NaclSigningKeyPrivate }
func GenerateNaclSigningKeyPair ¶
func GenerateNaclSigningKeyPair() (NaclSigningKeyPair, error)
func ImportNaclSigningKeyPairFromBytes ¶
func ImportNaclSigningKeyPairFromBytes(pub []byte, priv []byte) (ret NaclSigningKeyPair, err error)
func ImportNaclSigningKeyPairFromHex ¶
func ImportNaclSigningKeyPairFromHex(s string) (ret NaclSigningKeyPair, err error)
func MakeNaclSigningKeyPairFromSecret ¶
func MakeNaclSigningKeyPairFromSecret(secret [NaclSigningKeySecretSize]byte) (NaclSigningKeyPair, error)
MakeNaclSigningKeyPairFromSecret makes a signing key pair given a secret. Of course, the security of depends entirely on the randomness of the bytes in the secret.
func MakeNaclSigningKeyPairFromSecretBytes ¶ added in v1.0.27
func MakeNaclSigningKeyPairFromSecretBytes(secret []byte) (NaclSigningKeyPair, error)
func MakeNaclSigningKeyPairFromStellarAccountID ¶ added in v1.0.46
func MakeNaclSigningKeyPairFromStellarAccountID(accountID stellar1.AccountID) (res NaclSigningKeyPair, err error)
func MakeNaclSigningKeyPairFromStellarSecretKey ¶ added in v1.0.46
func MakeNaclSigningKeyPairFromStellarSecretKey(sec stellar1.SecretKey) (res NaclSigningKeyPair, err error)
func (NaclSigningKeyPair) CanDecrypt ¶
func (k NaclSigningKeyPair) CanDecrypt() bool
CanDecrypt always returns false for a signing key pair.
func (NaclSigningKeyPair) CanEncrypt ¶
func (k NaclSigningKeyPair) CanEncrypt() bool
CanEncrypt always returns false for a signing key pair.
func (NaclSigningKeyPair) CanSign ¶
func (k NaclSigningKeyPair) CanSign() bool
func (NaclSigningKeyPair) CheckSecretKey ¶
func (k NaclSigningKeyPair) CheckSecretKey() error
func (NaclSigningKeyPair) DecryptFromString ¶
func (k NaclSigningKeyPair) DecryptFromString(ciphertext string) (msg []byte, sender keybase1.KID, err error)
DecryptFromString fails for this type of key.
func (NaclSigningKeyPair) Encode ¶
func (k NaclSigningKeyPair) Encode() (string, error)
func (NaclSigningKeyPair) EncryptToString ¶
func (k NaclSigningKeyPair) EncryptToString(plaintext []byte, sender GenericKey) (ciphertext string, err error)
EncryptToString fails for this type of key.
func (NaclSigningKeyPair) ExportPublicAndPrivate ¶ added in v1.0.18
func (k NaclSigningKeyPair) ExportPublicAndPrivate() (RawPublicKey, RawPrivateKey, error)
func (NaclSigningKeyPair) GetAlgoType ¶
func (k NaclSigningKeyPair) GetAlgoType() AlgoType
func (NaclSigningKeyPair) GetBinaryKID ¶ added in v1.0.18
func (k NaclSigningKeyPair) GetBinaryKID() (ret keybase1.BinaryKID)
func (NaclSigningKeyPair) GetFingerprintP ¶
func (k NaclSigningKeyPair) GetFingerprintP() *PGPFingerprint
func (NaclSigningKeyPair) GetKID ¶
func (k NaclSigningKeyPair) GetKID() (ret keybase1.KID)
func (NaclSigningKeyPair) HasSecretKey ¶
func (k NaclSigningKeyPair) HasSecretKey() bool
func (NaclSigningKeyPair) IsNil ¶ added in v1.0.27
func (k NaclSigningKeyPair) IsNil() bool
func (NaclSigningKeyPair) SecretSymmetricKey ¶ added in v1.0.18
func (k NaclSigningKeyPair) SecretSymmetricKey(reason EncryptionReason) (NaclSecretBoxKey, error)
func (NaclSigningKeyPair) Sign ¶
func (k NaclSigningKeyPair) Sign(msg []byte) (ret *NaclSigInfo, err error)
func (NaclSigningKeyPair) SignToString ¶
func (NaclSigningKeyPair) SignV2 ¶ added in v1.0.18
func (k NaclSigningKeyPair) SignV2(msg []byte, prefix SignaturePrefix) (ret *NaclSigInfo, err error)
func (NaclSigningKeyPair) ToShortIDString ¶
func (k NaclSigningKeyPair) ToShortIDString() string
func (NaclSigningKeyPair) VerboseDescription ¶
func (k NaclSigningKeyPair) VerboseDescription() string
func (NaclSigningKeyPair) VerifyString ¶
func (k NaclSigningKeyPair) VerifyString(ctx VerifyContext, sig string, msg []byte) (id keybase1.SigID, err error)
func (NaclSigningKeyPair) VerifyStringAndExtract ¶
func (k NaclSigningKeyPair) VerifyStringAndExtract(ctx VerifyContext, sig string) (msg []byte, id keybase1.SigID, err error)
type NaclSigningKeyPrivate ¶
type NaclSigningKeyPrivate [ed25519.PrivateKeySize]byte
func (NaclSigningKeyPrivate) Sign ¶
func (k NaclSigningKeyPrivate) Sign(msg []byte) *NaclSignature
type NaclSigningKeyPublic ¶
type NaclSigningKeyPublic [ed25519.PublicKeySize]byte
func KIDToNaclSigningKeyPublic ¶
func KIDToNaclSigningKeyPublic(bk []byte) *NaclSigningKeyPublic
func (NaclSigningKeyPublic) GetBinaryKID ¶ added in v1.0.18
func (k NaclSigningKeyPublic) GetBinaryKID() keybase1.BinaryKID
func (NaclSigningKeyPublic) GetKID ¶
func (k NaclSigningKeyPublic) GetKID() keybase1.KID
func (NaclSigningKeyPublic) Verify ¶
func (k NaclSigningKeyPublic) Verify(msg []byte, sig *NaclSignature) bool
type NeedInputError ¶
type NeedInputError struct {
// contains filtered or unexported fields
}
func (NeedInputError) Error ¶
func (e NeedInputError) Error() string
type NeedOtherRekeyError ¶ added in v1.0.19
NeedOtherRekeyError indicates that the folder in question needs to be rekeyed for the local device, and can only done so by one of the other users.
func (NeedOtherRekeyError) Error ¶ added in v1.0.19
func (e NeedOtherRekeyError) Error() string
func (NeedOtherRekeyError) ToStatus ¶ added in v1.0.19
func (e NeedOtherRekeyError) ToStatus() keybase1.Status
type NeedSelfRekeyError ¶ added in v1.0.19
NeedSelfRekeyError indicates that the folder in question needs to be rekeyed for the local device, and can be done so by one of the other user's devices.
func (NeedSelfRekeyError) Error ¶ added in v1.0.19
func (e NeedSelfRekeyError) Error() string
func (NeedSelfRekeyError) ToStatus ¶ added in v1.0.19
func (e NeedSelfRekeyError) ToStatus() keybase1.Status
type NegBoolFunc ¶
type NegBoolFunc struct {
// contains filtered or unexported fields
}
type NetContext ¶ added in v1.0.19
type NoActiveDeviceError ¶
type NoActiveDeviceError struct{}
func (NoActiveDeviceError) Error ¶
func (e NoActiveDeviceError) Error() string
type NoConfigFileError ¶
type NoConfigFileError struct{}
func (NoConfigFileError) Error ¶
func (n NoConfigFileError) Error() string
type NoConfigWriterError ¶
type NoConfigWriterError struct{}
func (NoConfigWriterError) Error ¶
func (e NoConfigWriterError) Error() string
type NoDecryptionKeyError ¶
type NoDecryptionKeyError struct {
Msg string
}
func (NoDecryptionKeyError) Error ¶
func (e NoDecryptionKeyError) Error() string
func (NoDecryptionKeyError) ToStatus ¶
func (e NoDecryptionKeyError) ToStatus() (s keybase1.Status)
type NoDeviceError ¶
type NoDeviceError struct {
Reason string
}
func NewNoDeviceError ¶ added in v1.0.48
func NewNoDeviceError(s string) NoDeviceError
func (NoDeviceError) Error ¶
func (e NoDeviceError) Error() string
func (NoDeviceError) ToStatus ¶
func (e NoDeviceError) ToStatus() keybase1.Status
type NoKeyError ¶
type NoKeyError struct {
Msg string
}
func (NoKeyError) Error ¶
func (u NoKeyError) Error() string
func (NoKeyError) ToStatus ¶
func (e NoKeyError) ToStatus() (s keybase1.Status)
type NoKeyringsError ¶
type NoKeyringsError struct{}
func (NoKeyringsError) Error ¶
func (k NoKeyringsError) Error() string
type NoMatchingGPGKeysError ¶
type NoMatchingGPGKeysError struct { Fingerprints []string HasActiveDevice bool // true if the user has an active device that they chose not to use }
func (NoMatchingGPGKeysError) Error ¶
func (e NoMatchingGPGKeysError) Error() string
func (NoMatchingGPGKeysError) ToStatus ¶
func (e NoMatchingGPGKeysError) ToStatus() keybase1.Status
type NoNaClEncryptionKeyError ¶
type NoNaClEncryptionKeyError struct { Username string HasPGPKey bool HasPUK bool HasDeviceKey bool HasPaperKey bool }
func (NoNaClEncryptionKeyError) Error ¶
func (e NoNaClEncryptionKeyError) Error() string
func (NoNaClEncryptionKeyError) ToStatus ¶
func (e NoNaClEncryptionKeyError) ToStatus() keybase1.Status
type NoOpError ¶ added in v1.0.34
type NoOpError struct {
Desc string
}
NoOpError is returned when an RPC call is issued but it would result in no change, so the call is dropped.
type NoPGPEncryptionKeyError ¶
func (NoPGPEncryptionKeyError) Error ¶
func (e NoPGPEncryptionKeyError) Error() string
func (NoPGPEncryptionKeyError) ToStatus ¶
func (e NoPGPEncryptionKeyError) ToStatus() keybase1.Status
type NoPaperKeysError ¶
type NoPaperKeysError struct { }
func (NoPaperKeysError) Error ¶
func (u NoPaperKeysError) Error() string
type NoSecretKeyError ¶
type NoSecretKeyError struct { }
func (NoSecretKeyError) Error ¶
func (u NoSecretKeyError) Error() string
func (NoSecretKeyError) ToStatus ¶
func (u NoSecretKeyError) ToStatus() (s keybase1.Status)
type NoSelectedKeyError ¶
type NoSelectedKeyError struct {
// contains filtered or unexported fields
}
func (NoSelectedKeyError) Error ¶
func (n NoSelectedKeyError) Error() string
type NoSessionError ¶ added in v1.0.21
type NoSessionError struct{}
func (NoSessionError) Error ¶ added in v1.0.21
func (e NoSessionError) Error() string
KBFS currently matching on this string, so be careful changing this:
func (NoSessionError) ToStatus ¶ added in v1.0.21
func (u NoSessionError) ToStatus() (s keybase1.Status)
type NoSessionWriterError ¶
type NoSessionWriterError struct{}
func (NoSessionWriterError) Error ¶
func (e NoSessionWriterError) Error() string
type NoSigChainError ¶
type NoSigChainError struct{}
func (NoSigChainError) Error ¶
func (e NoSigChainError) Error() string
func (NoSigChainError) ToStatus ¶ added in v1.0.17
func (e NoSigChainError) ToStatus() keybase1.Status
type NoSpaceOnDeviceError ¶ added in v1.0.39
type NoSpaceOnDeviceError struct {
Desc string
}
func (NoSpaceOnDeviceError) Error ¶ added in v1.0.39
func (e NoSpaceOnDeviceError) Error() string
func (NoSpaceOnDeviceError) ToStatus ¶ added in v1.0.39
func (e NoSpaceOnDeviceError) ToStatus() (s keybase1.Status)
type NoSyncedPGPKeyError ¶
type NoSyncedPGPKeyError struct{}
func (NoSyncedPGPKeyError) Error ¶
func (e NoSyncedPGPKeyError) Error() string
func (NoSyncedPGPKeyError) ToStatus ¶
func (e NoSyncedPGPKeyError) ToStatus() keybase1.Status
type NoTriplesecError ¶
type NoTriplesecError struct{}
func (NoTriplesecError) Error ¶
func (e NoTriplesecError) Error() string
type NoUIDError ¶
type NoUIDError struct{}
func (NoUIDError) Error ¶
func (e NoUIDError) Error() string
type NoUserConfigError ¶
type NoUserConfigError struct{}
func (NoUserConfigError) Error ¶
func (n NoUserConfigError) Error() string
type NoUsernameError ¶
type NoUsernameError struct{}
func NewNoUsernameError ¶
func NewNoUsernameError() NoUsernameError
func (NoUsernameError) Error ¶
func (e NoUsernameError) Error() string
type NodeHash ¶
type NodeHash interface { Check(s string) bool // Check if the node hashes to this string String() string IsNil() bool // contains filtered or unexported methods }
func NodeHashFromHex ¶
type NodeHashAny ¶ added in v1.0.19
type NodeHashAny struct {
// contains filtered or unexported fields
}
NodeHashAny incorporates either a short (256-bit) or a long (512-bit) hash. It's unfortunate we need it, but I didn't see any other way to use the Go json marshal/unmarshal system where the hashes might be either short or long. Our hacky solution is to have a union-type struct that supports both, and just to unmarshal into the relevant field. Note this type also fits ths NodeHash interface.
func (NodeHashAny) Check ¶ added in v1.0.19
func (h NodeHashAny) Check(s string) bool
func (NodeHashAny) IsNil ¶ added in v1.0.19
func (h NodeHashAny) IsNil() bool
func (*NodeHashAny) MarshalJSON ¶ added in v1.0.19
func (h *NodeHashAny) MarshalJSON() ([]byte, error)
func (NodeHashAny) String ¶ added in v1.0.19
func (h NodeHashAny) String() string
func (*NodeHashAny) UnmarshalJSON ¶ added in v1.0.19
func (h *NodeHashAny) UnmarshalJSON(b []byte) error
type NodeHashLong ¶
type NodeHashLong [NodeHashLenLong]byte
func (NodeHashLong) Check ¶
func (h1 NodeHashLong) Check(s string) bool
func (NodeHashLong) IsNil ¶ added in v1.0.19
func (h1 NodeHashLong) IsNil() bool
func (NodeHashLong) String ¶
func (h1 NodeHashLong) String() string
func (*NodeHashLong) UnmarshalJSON ¶ added in v1.0.19
func (h1 *NodeHashLong) UnmarshalJSON(b []byte) error
type NodeHashShort ¶
type NodeHashShort [NodeHashLenShort]byte
func (NodeHashShort) Check ¶
func (h1 NodeHashShort) Check(s string) bool
func (NodeHashShort) ExportToHashMeta ¶ added in v1.0.27
func (h1 NodeHashShort) ExportToHashMeta() keybase1.HashMeta
func (NodeHashShort) IsNil ¶ added in v1.0.19
func (h1 NodeHashShort) IsNil() bool
func (NodeHashShort) String ¶
func (h1 NodeHashShort) String() string
func (*NodeHashShort) UnmarshalJSON ¶ added in v1.0.19
func (h1 *NodeHashShort) UnmarshalJSON(b []byte) error
type NoiseBytes ¶ added in v1.0.46
type NoiseBytes [noiseFileLen]byte
func MakeNoise ¶ added in v1.0.46
func MakeNoise() (nb NoiseBytes, err error)
type NoopNotifyListener ¶ added in v1.0.34
type NoopNotifyListener struct{}
func (*NoopNotifyListener) AvatarUpdated ¶
func (n *NoopNotifyListener) AvatarUpdated(name string, formats []keybase1.AvatarFormat)
func (*NoopNotifyListener) BadgeState ¶ added in v1.0.34
func (n *NoopNotifyListener) BadgeState(badgeState keybase1.BadgeState)
func (*NoopNotifyListener) Chat ¶ added in v1.0.41
func (n *NoopNotifyListener) Chat(uid keybase1.UID, convID chat1.ConversationID)
func (*NoopNotifyListener) ChatAttachmentUploadProgress ¶
func (n *NoopNotifyListener) ChatAttachmentUploadProgress(uid keybase1.UID, convID chat1.ConversationID, outboxID chat1.OutboxID, bytesComplete, bytesTotal int64)
func (*NoopNotifyListener) ChatAttachmentUploadStart ¶
func (n *NoopNotifyListener) ChatAttachmentUploadStart(uid keybase1.UID, convID chat1.ConversationID, outboxID chat1.OutboxID)
func (*NoopNotifyListener) ChatIdentifyUpdate ¶ added in v1.0.34
func (n *NoopNotifyListener) ChatIdentifyUpdate(update keybase1.CanonicalTLFNameAndIDWithBreaks)
func (*NoopNotifyListener) ChatInboxStale ¶ added in v1.0.34
func (n *NoopNotifyListener) ChatInboxStale(uid keybase1.UID)
func (*NoopNotifyListener) ChatInboxSyncStarted ¶ added in v1.0.34
func (n *NoopNotifyListener) ChatInboxSyncStarted(uid keybase1.UID)
func (*NoopNotifyListener) ChatInboxSynced ¶ added in v1.0.34
func (n *NoopNotifyListener) ChatInboxSynced(uid keybase1.UID, topicType chat1.TopicType, syncRes chat1.ChatSyncResult)
func (*NoopNotifyListener) ChatJoinedConversation ¶ added in v1.0.34
func (n *NoopNotifyListener) ChatJoinedConversation(uid keybase1.UID, convID chat1.ConversationID, conv *chat1.InboxUIItem)
func (*NoopNotifyListener) ChatKBFSToImpteamUpgrade ¶ added in v1.0.41
func (n *NoopNotifyListener) ChatKBFSToImpteamUpgrade(uid keybase1.UID, convID chat1.ConversationID)
func (*NoopNotifyListener) ChatLeftConversation ¶ added in v1.0.34
func (n *NoopNotifyListener) ChatLeftConversation(uid keybase1.UID, convID chat1.ConversationID)
func (*NoopNotifyListener) ChatResetConversation ¶ added in v1.0.34
func (n *NoopNotifyListener) ChatResetConversation(uid keybase1.UID, convID chat1.ConversationID)
func (*NoopNotifyListener) ChatSetConvRetention ¶ added in v1.0.41
func (n *NoopNotifyListener) ChatSetConvRetention(uid keybase1.UID, convID chat1.ConversationID)
func (*NoopNotifyListener) ChatSetConvSettings ¶
func (n *NoopNotifyListener) ChatSetConvSettings(uid keybase1.UID, convID chat1.ConversationID)
func (*NoopNotifyListener) ChatSetTeamRetention ¶ added in v1.0.41
func (n *NoopNotifyListener) ChatSetTeamRetention(uid keybase1.UID, teamID keybase1.TeamID)
func (*NoopNotifyListener) ChatTLFFinalize ¶ added in v1.0.34
func (n *NoopNotifyListener) ChatTLFFinalize(uid keybase1.UID, convID chat1.ConversationID, finalizeInfo chat1.ConversationFinalizeInfo)
func (*NoopNotifyListener) ChatTLFResolve ¶ added in v1.0.34
func (n *NoopNotifyListener) ChatTLFResolve(uid keybase1.UID, convID chat1.ConversationID, resolveInfo chat1.ConversationResolveInfo)
func (*NoopNotifyListener) ChatThreadsStale ¶ added in v1.0.34
func (n *NoopNotifyListener) ChatThreadsStale(uid keybase1.UID, updates []chat1.ConversationStaleUpdate)
func (*NoopNotifyListener) ChatTypingUpdate ¶ added in v1.0.34
func (n *NoopNotifyListener) ChatTypingUpdate([]chat1.ConvTypingUpdate)
func (*NoopNotifyListener) ClientOutOfDate ¶ added in v1.0.34
func (n *NoopNotifyListener) ClientOutOfDate(to, uri, msg string)
func (*NoopNotifyListener) DeviceCloneCountChanged ¶
func (n *NoopNotifyListener) DeviceCloneCountChanged(newClones int)
func (*NoopNotifyListener) FSActivity ¶ added in v1.0.34
func (n *NoopNotifyListener) FSActivity(activity keybase1.FSNotification)
func (*NoopNotifyListener) FSEditListRequest ¶ added in v1.0.34
func (n *NoopNotifyListener) FSEditListRequest(arg keybase1.FSEditListRequest)
func (*NoopNotifyListener) FSEditListResponse ¶ added in v1.0.34
func (n *NoopNotifyListener) FSEditListResponse(arg keybase1.FSEditListArg)
func (*NoopNotifyListener) FSPathUpdated ¶
func (n *NoopNotifyListener) FSPathUpdated(path string)
func (*NoopNotifyListener) FSSyncEvent ¶ added in v1.0.34
func (n *NoopNotifyListener) FSSyncEvent(arg keybase1.FSPathSyncStatus)
func (*NoopNotifyListener) FSSyncStatusResponse ¶ added in v1.0.34
func (n *NoopNotifyListener) FSSyncStatusResponse(arg keybase1.FSSyncStatusArg)
func (*NoopNotifyListener) FavoritesChanged ¶ added in v1.0.34
func (n *NoopNotifyListener) FavoritesChanged(uid keybase1.UID)
func (*NoopNotifyListener) KeyfamilyChanged ¶ added in v1.0.34
func (n *NoopNotifyListener) KeyfamilyChanged(uid keybase1.UID)
func (*NoopNotifyListener) Login ¶ added in v1.0.34
func (n *NoopNotifyListener) Login(username string)
func (*NoopNotifyListener) Logout ¶ added in v1.0.34
func (n *NoopNotifyListener) Logout()
func (*NoopNotifyListener) NewChatActivity ¶ added in v1.0.34
func (n *NoopNotifyListener) NewChatActivity(uid keybase1.UID, activity chat1.ChatActivity, source chat1.ChatActivitySource)
func (*NoopNotifyListener) NewChatKBFSFileEditActivity ¶
func (n *NoopNotifyListener) NewChatKBFSFileEditActivity(uid keybase1.UID, activity chat1.ChatActivity)
func (*NoopNotifyListener) NewTeamEK ¶ added in v1.0.46
func (n *NoopNotifyListener) NewTeamEK(teamID keybase1.TeamID, generation keybase1.EkGeneration)
func (*NoopNotifyListener) PGPKeyInSecretStoreFile ¶ added in v1.0.34
func (n *NoopNotifyListener) PGPKeyInSecretStoreFile()
func (*NoopNotifyListener) PaperKeyCached ¶ added in v1.0.34
func (*NoopNotifyListener) ReachabilityChanged ¶ added in v1.0.34
func (n *NoopNotifyListener) ReachabilityChanged(r keybase1.Reachability)
func (*NoopNotifyListener) TeamChangedByID ¶ added in v1.0.39
func (n *NoopNotifyListener) TeamChangedByID(teamID keybase1.TeamID, latestSeqno keybase1.Seqno, implicitTeam bool, changes keybase1.TeamChangeSet)
func (*NoopNotifyListener) TeamChangedByName ¶ added in v1.0.39
func (n *NoopNotifyListener) TeamChangedByName(teamName string, latestSeqno keybase1.Seqno, implicitTeam bool, changes keybase1.TeamChangeSet)
func (*NoopNotifyListener) TeamDeleted ¶ added in v1.0.34
func (n *NoopNotifyListener) TeamDeleted(teamID keybase1.TeamID)
func (*NoopNotifyListener) TeamExit ¶ added in v1.0.34
func (n *NoopNotifyListener) TeamExit(teamID keybase1.TeamID)
func (*NoopNotifyListener) TrackingChanged ¶ added in v1.0.34
func (n *NoopNotifyListener) TrackingChanged(uid keybase1.UID, username NormalizedUsername)
func (*NoopNotifyListener) UserChanged ¶ added in v1.0.34
func (n *NoopNotifyListener) UserChanged(uid keybase1.UID)
func (*NoopNotifyListener) WalletPaymentNotification ¶
func (n *NoopNotifyListener) WalletPaymentNotification(accountID stellar1.AccountID, paymentID stellar1.PaymentID)
type NopWriteCloser ¶
NopWriteCloser is like an ioutil.NopCloser, but for an io.Writer. TODO: we have two of these in OpenPGP packages alone. This probably needs to be promoted somewhere more common.
From here:
https://code.google.com/p/go/source/browse/openpgp/write.go?repo=crypto&r=1e7a3e301825bf9cb32e0535f3761d62d2d369d1#364
func (NopWriteCloser) Close ¶
func (c NopWriteCloser) Close() error
type NormalizedUsername ¶
type NormalizedUsername string
NormalizedUsername is a username that has been normalized (toLowered) and therefore will compare correctly against other normalized usernames.
func NewNormalizedUsername ¶
func NewNormalizedUsername(s string) NormalizedUsername
NewNormalizedUsername makes a normalized username out of a non-normalized plain string username
func NormalizedUsernameFromUPK2 ¶
func NormalizedUsernameFromUPK2(u keybase1.UserPlusKeysV2) NormalizedUsername
func ValidateNormalizedUsername ¶ added in v1.0.27
func ValidateNormalizedUsername(username string) (NormalizedUsername, error)
func (NormalizedUsername) CheckValid ¶
func (n NormalizedUsername) CheckValid() error
func (NormalizedUsername) Eq ¶
func (n NormalizedUsername) Eq(n2 NormalizedUsername) bool
Eq returns true if the given normalized usernames are equal
func (NormalizedUsername) IsNil ¶
func (n NormalizedUsername) IsNil() bool
IsNil returns true if the username is the empty string
func (NormalizedUsername) String ¶
func (n NormalizedUsername) String() string
String returns the normalized username as a string (in lower case)
type NotConfirmedError ¶
type NotConfirmedError struct{}
func (NotConfirmedError) Error ¶
func (e NotConfirmedError) Error() string
type NotFoundError ¶
type NotFoundError struct {
Msg string
}
func (NotFoundError) Error ¶
func (e NotFoundError) Error() string
func (NotFoundError) ToStatus ¶ added in v1.0.16
func (e NotFoundError) ToStatus() keybase1.Status
type NotLatestSubchainError ¶
type NotLatestSubchainError struct {
Msg string
}
func (NotLatestSubchainError) Error ¶
func (e NotLatestSubchainError) Error() string
type NotProvisionedError ¶
type NotProvisionedError struct{}
func (NotProvisionedError) Error ¶
func (e NotProvisionedError) Error() string
type NotifyListener ¶ added in v1.0.16
type NotifyListener interface { Logout() Login(username string) ClientOutOfDate(to, uri, msg string) UserChanged(uid keybase1.UID) TrackingChanged(uid keybase1.UID, username NormalizedUsername) FSActivity(activity keybase1.FSNotification) FSPathUpdated(path string) FSEditListResponse(arg keybase1.FSEditListArg) FSSyncStatusResponse(arg keybase1.FSSyncStatusArg) FSSyncEvent(arg keybase1.FSPathSyncStatus) FSEditListRequest(arg keybase1.FSEditListRequest) FavoritesChanged(uid keybase1.UID) PaperKeyCached(uid keybase1.UID, encKID keybase1.KID, sigKID keybase1.KID) KeyfamilyChanged(uid keybase1.UID) NewChatActivity(uid keybase1.UID, activity chat1.ChatActivity, source chat1.ChatActivitySource) NewChatKBFSFileEditActivity(uid keybase1.UID, activity chat1.ChatActivity) ChatIdentifyUpdate(update keybase1.CanonicalTLFNameAndIDWithBreaks) ChatTLFFinalize(uid keybase1.UID, convID chat1.ConversationID, finalizeInfo chat1.ConversationFinalizeInfo) ChatTLFResolve(uid keybase1.UID, convID chat1.ConversationID, resolveInfo chat1.ConversationResolveInfo) ChatInboxStale(uid keybase1.UID) ChatThreadsStale(uid keybase1.UID, updates []chat1.ConversationStaleUpdate) ChatInboxSynced(uid keybase1.UID, topicType chat1.TopicType, syncRes chat1.ChatSyncResult) ChatInboxSyncStarted(uid keybase1.UID) ChatTypingUpdate([]chat1.ConvTypingUpdate) ChatJoinedConversation(uid keybase1.UID, convID chat1.ConversationID, conv *chat1.InboxUIItem) ChatLeftConversation(uid keybase1.UID, convID chat1.ConversationID) ChatResetConversation(uid keybase1.UID, convID chat1.ConversationID) ChatSetConvRetention(uid keybase1.UID, convID chat1.ConversationID) ChatSetTeamRetention(uid keybase1.UID, teamID keybase1.TeamID) ChatSetConvSettings(uid keybase1.UID, convID chat1.ConversationID) ChatKBFSToImpteamUpgrade(uid keybase1.UID, convID chat1.ConversationID) ChatAttachmentUploadStart(uid keybase1.UID, convID chat1.ConversationID, outboxID chat1.OutboxID) ChatAttachmentUploadProgress(uid keybase1.UID, convID chat1.ConversationID, outboxID chat1.OutboxID, bytesComplete, bytesTotal int64) PGPKeyInSecretStoreFile() BadgeState(badgeState keybase1.BadgeState) ReachabilityChanged(r keybase1.Reachability) TeamChangedByID(teamID keybase1.TeamID, latestSeqno keybase1.Seqno, implicitTeam bool, changes keybase1.TeamChangeSet) TeamChangedByName(teamName string, latestSeqno keybase1.Seqno, implicitTeam bool, changes keybase1.TeamChangeSet) TeamDeleted(teamID keybase1.TeamID) TeamExit(teamID keybase1.TeamID) NewTeamEK(teamID keybase1.TeamID, generation keybase1.EkGeneration) AvatarUpdated(name string, formats []keybase1.AvatarFormat) DeviceCloneCountChanged(newClones int) WalletPaymentNotification(accountID stellar1.AccountID, paymentID stellar1.PaymentID) }
NotifyListener provides hooks for listening for when notifications are called. It is intended to simplify testing notifications.
type NotifyRouter ¶
type NotifyRouter struct { sync.Mutex Contextified // contains filtered or unexported fields }
NotifyRouter routes notifications to the various active RPC connections. It's careful only to route to those who are interested
func NewNotifyRouter ¶
func NewNotifyRouter(g *GlobalContext) *NotifyRouter
NewNotifyRouter makes a new notification router; we should only make one of these per process.
func (*NotifyRouter) AddConnection ¶
func (n *NotifyRouter) AddConnection(xp rpc.Transporter, ch chan error) ConnectionID
AddConnection should be called every time there's a new RPC connection established for this server. The caller should pass in the Transporter and also the channel that will get messages when the channel closes.
func (*NotifyRouter) HandleAppExit ¶ added in v1.0.17
func (n *NotifyRouter) HandleAppExit()
HandleAppExit is called whenever an app exit command is issued
func (*NotifyRouter) HandleAvatarUpdated ¶
func (n *NotifyRouter) HandleAvatarUpdated(ctx context.Context, name string, formats []keybase1.AvatarFormat)
func (*NotifyRouter) HandleBadgeState ¶ added in v1.0.19
func (n *NotifyRouter) HandleBadgeState(badgeState keybase1.BadgeState)
HandleBadgeState is called whenever the badge state changes It will broadcast the messages to all curious listeners.
func (*NotifyRouter) HandleChatAttachmentUploadProgress ¶
func (n *NotifyRouter) HandleChatAttachmentUploadProgress(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, outboxID chat1.OutboxID, bytesComplete, bytesTotal int64)
func (*NotifyRouter) HandleChatAttachmentUploadStart ¶
func (n *NotifyRouter) HandleChatAttachmentUploadStart(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, outboxID chat1.OutboxID)
func (*NotifyRouter) HandleChatIdentifyUpdate ¶ added in v1.0.19
func (n *NotifyRouter) HandleChatIdentifyUpdate(ctx context.Context, update keybase1.CanonicalTLFNameAndIDWithBreaks)
func (*NotifyRouter) HandleChatInboxStale ¶ added in v1.0.19
func (n *NotifyRouter) HandleChatInboxStale(ctx context.Context, uid keybase1.UID)
func (*NotifyRouter) HandleChatInboxSyncStarted ¶ added in v1.0.34
func (n *NotifyRouter) HandleChatInboxSyncStarted(ctx context.Context, uid keybase1.UID)
func (*NotifyRouter) HandleChatInboxSynced ¶ added in v1.0.34
func (n *NotifyRouter) HandleChatInboxSynced(ctx context.Context, uid keybase1.UID, topicType chat1.TopicType, syncRes chat1.ChatSyncResult)
func (*NotifyRouter) HandleChatJoinedConversation ¶ added in v1.0.27
func (n *NotifyRouter) HandleChatJoinedConversation(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, topicType chat1.TopicType, conv *chat1.InboxUIItem)
func (*NotifyRouter) HandleChatKBFSToImpteamUpgrade ¶ added in v1.0.41
func (n *NotifyRouter) HandleChatKBFSToImpteamUpgrade(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, topicType chat1.TopicType)
func (*NotifyRouter) HandleChatLeftConversation ¶ added in v1.0.27
func (n *NotifyRouter) HandleChatLeftConversation(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, topicType chat1.TopicType)
func (*NotifyRouter) HandleChatResetConversation ¶ added in v1.0.34
func (n *NotifyRouter) HandleChatResetConversation(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, topicType chat1.TopicType)
func (*NotifyRouter) HandleChatSetConvRetention ¶ added in v1.0.41
func (n *NotifyRouter) HandleChatSetConvRetention(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, topicType chat1.TopicType, conv *chat1.InboxUIItem)
func (*NotifyRouter) HandleChatSetConvSettings ¶
func (n *NotifyRouter) HandleChatSetConvSettings(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, topicType chat1.TopicType, conv *chat1.InboxUIItem)
func (*NotifyRouter) HandleChatSetTeamRetention ¶ added in v1.0.41
func (*NotifyRouter) HandleChatTLFFinalize ¶ added in v1.0.19
func (n *NotifyRouter) HandleChatTLFFinalize(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, topicType chat1.TopicType, finalizeInfo chat1.ConversationFinalizeInfo, conv *chat1.InboxUIItem)
func (*NotifyRouter) HandleChatTLFResolve ¶ added in v1.0.19
func (n *NotifyRouter) HandleChatTLFResolve(ctx context.Context, uid keybase1.UID, convID chat1.ConversationID, topicType chat1.TopicType, resolveInfo chat1.ConversationResolveInfo)
func (*NotifyRouter) HandleChatThreadsStale ¶ added in v1.0.19
func (n *NotifyRouter) HandleChatThreadsStale(ctx context.Context, uid keybase1.UID, updates []chat1.ConversationStaleUpdate)
func (*NotifyRouter) HandleChatTypingUpdate ¶ added in v1.0.27
func (n *NotifyRouter) HandleChatTypingUpdate(ctx context.Context, updates []chat1.ConvTypingUpdate)
func (*NotifyRouter) HandleClientOutOfDate ¶
func (n *NotifyRouter) HandleClientOutOfDate(upgradeTo, upgradeURI, upgradeMsg string)
ClientOutOfDate is called whenever the API server tells us our client is out of date. (This is done by adding special headers to every API response that an out-of-date client makes.)
func (*NotifyRouter) HandleDeviceCloneNotification ¶
func (n *NotifyRouter) HandleDeviceCloneNotification(newClones int)
HandleDeviceCloneNotification is called when a run of the device clone status update finds a newly-added, possible clone. It will broadcast the messages to all curious listeners.
func (*NotifyRouter) HandleFSActivity ¶
func (n *NotifyRouter) HandleFSActivity(activity keybase1.FSNotification)
HandleFSActivity is called for any KBFS notification. It will broadcast the messages to all curious listeners.
func (*NotifyRouter) HandleFSEditListRequest ¶ added in v1.0.18
func (n *NotifyRouter) HandleFSEditListRequest(ctx context.Context, arg keybase1.FSEditListRequest)
HandleFSEditListRequest is called for KBFS edit list request notifications.
func (*NotifyRouter) HandleFSEditListResponse ¶ added in v1.0.18
func (n *NotifyRouter) HandleFSEditListResponse(ctx context.Context, arg keybase1.FSEditListArg)
HandleFSEditListResponse is called for KBFS edit list response notifications.
func (*NotifyRouter) HandleFSPathUpdated ¶
func (n *NotifyRouter) HandleFSPathUpdated(path string)
HandleFSPathUpdated is called for any path update notification. It will broadcast the messages to all curious listeners.
func (*NotifyRouter) HandleFSSyncEvent ¶ added in v1.0.19
func (n *NotifyRouter) HandleFSSyncEvent(ctx context.Context, arg keybase1.FSPathSyncStatus)
HandleFSSyncEvent is called for KBFS sync event notifications.
func (*NotifyRouter) HandleFSSyncStatus ¶ added in v1.0.19
func (n *NotifyRouter) HandleFSSyncStatus(ctx context.Context, arg keybase1.FSSyncStatusArg)
HandleFSSyncStatus is called for KBFS sync status notifications.
func (*NotifyRouter) HandleFavoritesChanged ¶ added in v1.0.16
func (n *NotifyRouter) HandleFavoritesChanged(uid keybase1.UID)
HandleFavoritesChanged is called whenever the kbfs favorites change for a user (and caches should be invalidated). It will broadcast the messages to all curious listeners.
func (*NotifyRouter) HandleKeyfamilyChanged ¶ added in v1.0.17
func (n *NotifyRouter) HandleKeyfamilyChanged(uid keybase1.UID)
HandleKeyfamilyChanged is called whenever a user's keyfamily changes.
func (*NotifyRouter) HandleLogin ¶
func (n *NotifyRouter) HandleLogin(u string)
HandleLogin is called whenever a user logs in. It will broadcast the message to all connections who care about such a message.
func (*NotifyRouter) HandleLogout ¶
func (n *NotifyRouter) HandleLogout()
HandleLogout is called whenever the current user logged out. It will broadcast the message to all connections who care about such a message.
func (*NotifyRouter) HandleNewChatActivity ¶ added in v1.0.18
func (n *NotifyRouter) HandleNewChatActivity(ctx context.Context, uid keybase1.UID, topicType chat1.TopicType, activity *chat1.ChatActivity, source chat1.ChatActivitySource)
func (*NotifyRouter) HandleNewTeamEK ¶ added in v1.0.46
func (n *NotifyRouter) HandleNewTeamEK(ctx context.Context, teamID keybase1.TeamID, generation keybase1.EkGeneration)
func (*NotifyRouter) HandlePGPKeyInSecretStoreFile ¶ added in v1.0.18
func (n *NotifyRouter) HandlePGPKeyInSecretStoreFile()
HandlePGPKeyInSecretStoreFile is called to notify a user that they have a PGP key that is unlockable by a secret stored in a file in their home directory.
func (*NotifyRouter) HandlePaperKeyCached ¶ added in v1.0.17
func (n *NotifyRouter) HandlePaperKeyCached(uid keybase1.UID, encKID keybase1.KID, sigKID keybase1.KID)
HandlePaperKeyCached is called whenever a paper key is cached in response to a rekey harassment.
func (*NotifyRouter) HandleReachability ¶ added in v1.0.19
func (n *NotifyRouter) HandleReachability(r keybase1.Reachability)
func (*NotifyRouter) HandleServiceShutdown ¶ added in v1.0.17
func (n *NotifyRouter) HandleServiceShutdown()
HandleServiceShutdown is called whenever the service shuts down.
func (*NotifyRouter) HandleTeamAbandoned ¶ added in v1.0.41
func (n *NotifyRouter) HandleTeamAbandoned(ctx context.Context, teamID keybase1.TeamID)
func (*NotifyRouter) HandleTeamChangedByBothKeys ¶ added in v1.0.39
func (n *NotifyRouter) HandleTeamChangedByBothKeys(ctx context.Context, teamID keybase1.TeamID, teamName string, latestSeqno keybase1.Seqno, implicitTeam bool, changes keybase1.TeamChangeSet)
teamID and teamName are not necessarily the same team
func (*NotifyRouter) HandleTeamChangedByID ¶ added in v1.0.39
func (n *NotifyRouter) HandleTeamChangedByID(ctx context.Context, teamID keybase1.TeamID, latestSeqno keybase1.Seqno, implicitTeam bool, changes keybase1.TeamChangeSet)
func (*NotifyRouter) HandleTeamChangedByName ¶ added in v1.0.39
func (n *NotifyRouter) HandleTeamChangedByName(ctx context.Context, teamName string, latestSeqno keybase1.Seqno, implicitTeam bool, changes keybase1.TeamChangeSet)
func (*NotifyRouter) HandleTeamDeleted ¶ added in v1.0.30
func (n *NotifyRouter) HandleTeamDeleted(ctx context.Context, teamID keybase1.TeamID)
func (*NotifyRouter) HandleTeamExit ¶ added in v1.0.34
func (n *NotifyRouter) HandleTeamExit(ctx context.Context, teamID keybase1.TeamID)
func (*NotifyRouter) HandleTrackingChanged ¶
func (n *NotifyRouter) HandleTrackingChanged(uid keybase1.UID, username NormalizedUsername, isTracking bool)
HandleTrackingChanged is called whenever we have a new tracking or untracking chain link related to a given user. It will broadcast the messages to all curious listeners. isTracking is set to true if current user is tracking uid.
func (*NotifyRouter) HandleUserChanged ¶
func (n *NotifyRouter) HandleUserChanged(uid keybase1.UID)
HandleUserChanged is called whenever we know that a given user has changed (and must be cache-busted). It will broadcast the messages to all curious listeners.
func (*NotifyRouter) HandleWalletPaymentNotification ¶
func (*NotifyRouter) SetChannels ¶
func (n *NotifyRouter) SetChannels(i ConnectionID, nc keybase1.NotificationChannels)
SetChannels sets which notification channels are interested for the connection with the given connection ID.
func (*NotifyRouter) SetListener ¶ added in v1.0.16
func (n *NotifyRouter) SetListener(listener NotifyListener)
func (*NotifyRouter) Shutdown ¶
func (n *NotifyRouter) Shutdown()
type NullConfiguration ¶
type NullConfiguration struct{}
func (NullConfiguration) GetAPIDump ¶
func (n NullConfiguration) GetAPIDump() (bool, bool)
func (NullConfiguration) GetAPITimeout ¶
func (n NullConfiguration) GetAPITimeout() (time.Duration, bool)
func (NullConfiguration) GetAllUserConfigs ¶
func (n NullConfiguration) GetAllUserConfigs() (*UserConfig, []UserConfig, error)
func (NullConfiguration) GetAllUsernames ¶
func (n NullConfiguration) GetAllUsernames() (NormalizedUsername, []NormalizedUsername, error)
func (NullConfiguration) GetAppType ¶ added in v1.0.21
func (n NullConfiguration) GetAppType() AppType
func (NullConfiguration) GetAutoFork ¶
func (n NullConfiguration) GetAutoFork() (bool, bool)
func (NullConfiguration) GetAutoWallet ¶ added in v1.0.48
func (n NullConfiguration) GetAutoWallet() (bool, bool)
func (NullConfiguration) GetBGIdentifierDisabled ¶ added in v1.0.19
func (n NullConfiguration) GetBGIdentifierDisabled() (bool, bool)
func (NullConfiguration) GetBoolAtPath ¶
func (n NullConfiguration) GetBoolAtPath(string) (bool, bool)
func (NullConfiguration) GetBug3964RepairTime ¶ added in v1.0.18
func (n NullConfiguration) GetBug3964RepairTime(NormalizedUsername) (time.Time, error)
func (NullConfiguration) GetBundledCA ¶
func (n NullConfiguration) GetBundledCA(h string) string
func (NullConfiguration) GetChatDbFilename ¶ added in v1.0.18
func (n NullConfiguration) GetChatDbFilename() string
func (NullConfiguration) GetChatDelivererInterval ¶ added in v1.0.19
func (n NullConfiguration) GetChatDelivererInterval() (time.Duration, bool)
func (NullConfiguration) GetChatInboxSourceLocalizeThreads ¶ added in v1.0.34
func (n NullConfiguration) GetChatInboxSourceLocalizeThreads() (int, bool)
func (NullConfiguration) GetCodeSigningKIDs ¶
func (n NullConfiguration) GetCodeSigningKIDs() []string
func (NullConfiguration) GetConfigFilename ¶
func (n NullConfiguration) GetConfigFilename() string
func (NullConfiguration) GetDbFilename ¶
func (n NullConfiguration) GetDbFilename() string
func (NullConfiguration) GetDebug ¶
func (n NullConfiguration) GetDebug() (bool, bool)
func (NullConfiguration) GetDeviceCloneStateFilename ¶
func (n NullConfiguration) GetDeviceCloneStateFilename() string
func (NullConfiguration) GetDeviceID ¶
func (n NullConfiguration) GetDeviceID() keybase1.DeviceID
func (NullConfiguration) GetDeviceIDForUID ¶ added in v1.0.19
func (n NullConfiguration) GetDeviceIDForUID(u keybase1.UID) keybase1.DeviceID
func (NullConfiguration) GetDeviceIDForUsername ¶ added in v1.0.19
func (n NullConfiguration) GetDeviceIDForUsername(un NormalizedUsername) keybase1.DeviceID
func (NullConfiguration) GetDisplayRawUntrustedOutput ¶
func (n NullConfiguration) GetDisplayRawUntrustedOutput() (bool, bool)
func (NullConfiguration) GetEmail ¶
func (n NullConfiguration) GetEmail() string
func (NullConfiguration) GetFeatureFlags ¶ added in v1.0.19
func (n NullConfiguration) GetFeatureFlags() (FeatureFlags, error)
func (NullConfiguration) GetGString ¶
func (n NullConfiguration) GetGString(string) string
func (NullConfiguration) GetGpg ¶
func (n NullConfiguration) GetGpg() string
func (NullConfiguration) GetGpgHome ¶
func (n NullConfiguration) GetGpgHome() string
func (NullConfiguration) GetGpgOptions ¶
func (n NullConfiguration) GetGpgOptions() []string
func (NullConfiguration) GetGregorDisabled ¶ added in v1.0.17
func (n NullConfiguration) GetGregorDisabled() (bool, bool)
func (NullConfiguration) GetGregorPingInterval ¶ added in v1.0.17
func (n NullConfiguration) GetGregorPingInterval() (time.Duration, bool)
func (NullConfiguration) GetGregorPingTimeout ¶ added in v1.0.19
func (n NullConfiguration) GetGregorPingTimeout() (time.Duration, bool)
func (NullConfiguration) GetGregorSaveInterval ¶ added in v1.0.16
func (n NullConfiguration) GetGregorSaveInterval() (time.Duration, bool)
func (NullConfiguration) GetGregorURI ¶ added in v1.0.16
func (n NullConfiguration) GetGregorURI() string
func (NullConfiguration) GetHome ¶
func (n NullConfiguration) GetHome() string
func (NullConfiguration) GetIntAtPath ¶
func (n NullConfiguration) GetIntAtPath(string) (int, bool)
func (NullConfiguration) GetInterfaceAtPath ¶
func (n NullConfiguration) GetInterfaceAtPath(string) (interface{}, error)
func (NullConfiguration) GetLevelDBNumFiles ¶ added in v1.0.27
func (n NullConfiguration) GetLevelDBNumFiles() (int, bool)
func (NullConfiguration) GetLinkCacheCleanDur ¶
func (n NullConfiguration) GetLinkCacheCleanDur() (time.Duration, bool)
func (NullConfiguration) GetLinkCacheSize ¶
func (n NullConfiguration) GetLinkCacheSize() (int, bool)
func (NullConfiguration) GetLocalRPCDebug ¶
func (n NullConfiguration) GetLocalRPCDebug() string
func (NullConfiguration) GetLocalTrackMaxAge ¶
func (n NullConfiguration) GetLocalTrackMaxAge() (time.Duration, bool)
func (NullConfiguration) GetLogFile ¶
func (n NullConfiguration) GetLogFile() string
func (NullConfiguration) GetLogFormat ¶
func (n NullConfiguration) GetLogFormat() string
func (NullConfiguration) GetLogPrefix ¶
func (n NullConfiguration) GetLogPrefix() string
func (NullConfiguration) GetMerkleKIDs ¶
func (n NullConfiguration) GetMerkleKIDs() []string
func (NullConfiguration) GetMountDir ¶ added in v1.0.17
func (n NullConfiguration) GetMountDir() string
func (NullConfiguration) GetNoAutoFork ¶
func (n NullConfiguration) GetNoAutoFork() (bool, bool)
func (NullConfiguration) GetNoPinentry ¶
func (n NullConfiguration) GetNoPinentry() (bool, bool)
func (NullConfiguration) GetNullAtPath ¶
func (n NullConfiguration) GetNullAtPath(string) bool
func (NullConfiguration) GetPGPFingerprint ¶
func (n NullConfiguration) GetPGPFingerprint() *PGPFingerprint
func (NullConfiguration) GetPayloadCacheSize ¶ added in v1.0.41
func (n NullConfiguration) GetPayloadCacheSize() (int, bool)
func (NullConfiguration) GetPidFile ¶
func (n NullConfiguration) GetPidFile() string
func (NullConfiguration) GetPinentry ¶
func (n NullConfiguration) GetPinentry() string
func (NullConfiguration) GetProofCacheLongDur ¶
func (n NullConfiguration) GetProofCacheLongDur() (time.Duration, bool)
func (NullConfiguration) GetProofCacheMediumDur ¶
func (n NullConfiguration) GetProofCacheMediumDur() (time.Duration, bool)
func (NullConfiguration) GetProofCacheShortDur ¶
func (n NullConfiguration) GetProofCacheShortDur() (time.Duration, bool)
func (NullConfiguration) GetProofCacheSize ¶
func (n NullConfiguration) GetProofCacheSize() (int, bool)
func (NullConfiguration) GetProxy ¶
func (n NullConfiguration) GetProxy() string
func (NullConfiguration) GetProxyCACerts ¶
func (n NullConfiguration) GetProxyCACerts() ([]string, error)
func (NullConfiguration) GetPvlKitFilename ¶ added in v1.0.21
func (n NullConfiguration) GetPvlKitFilename() string
func (NullConfiguration) GetRememberPassphrase ¶ added in v1.0.43
func (n NullConfiguration) GetRememberPassphrase() (bool, bool)
func (NullConfiguration) GetRunMode ¶
func (n NullConfiguration) GetRunMode() (RunMode, error)
func (NullConfiguration) GetSalt ¶
func (n NullConfiguration) GetSalt() []byte
func (NullConfiguration) GetScraperTimeout ¶
func (n NullConfiguration) GetScraperTimeout() (time.Duration, bool)
func (NullConfiguration) GetSecretKeyringTemplate ¶
func (n NullConfiguration) GetSecretKeyringTemplate() string
func (NullConfiguration) GetSecurityAccessGroupOverride ¶
func (n NullConfiguration) GetSecurityAccessGroupOverride() (bool, bool)
func (NullConfiguration) GetServerURI ¶
func (n NullConfiguration) GetServerURI() string
func (NullConfiguration) GetSessionFilename ¶
func (n NullConfiguration) GetSessionFilename() string
func (NullConfiguration) GetSlowGregorConn ¶ added in v1.0.46
func (n NullConfiguration) GetSlowGregorConn() (bool, bool)
func (NullConfiguration) GetSocketFile ¶
func (n NullConfiguration) GetSocketFile() string
func (NullConfiguration) GetStandalone ¶
func (n NullConfiguration) GetStandalone() (bool, bool)
func (NullConfiguration) GetString ¶
func (n NullConfiguration) GetString(string) string
func (NullConfiguration) GetStringAtPath ¶
func (n NullConfiguration) GetStringAtPath(string) (string, bool)
func (NullConfiguration) GetTimers ¶
func (n NullConfiguration) GetTimers() string
func (NullConfiguration) GetTorHiddenAddress ¶
func (n NullConfiguration) GetTorHiddenAddress() string
func (NullConfiguration) GetTorMode ¶
func (n NullConfiguration) GetTorMode() (TorMode, error)
func (NullConfiguration) GetTorProxy ¶
func (n NullConfiguration) GetTorProxy() string
func (NullConfiguration) GetUID ¶
func (n NullConfiguration) GetUID() (ret keybase1.UID)
func (NullConfiguration) GetUIDForUsername ¶
func (n NullConfiguration) GetUIDForUsername(u NormalizedUsername) keybase1.UID
func (NullConfiguration) GetUIDMapFullNameCacheSize ¶ added in v1.0.33
func (n NullConfiguration) GetUIDMapFullNameCacheSize() (int, bool)
func (NullConfiguration) GetUPAKCacheSize ¶ added in v1.0.31
func (n NullConfiguration) GetUPAKCacheSize() (int, bool)
func (NullConfiguration) GetUpdateDisabled ¶ added in v1.0.16
func (n NullConfiguration) GetUpdateDisabled() (bool, bool)
func (NullConfiguration) GetUpdateLastChecked ¶
func (n NullConfiguration) GetUpdateLastChecked() keybase1.Time
func (NullConfiguration) GetUpdatePreferenceAuto ¶
func (n NullConfiguration) GetUpdatePreferenceAuto() (bool, bool)
func (NullConfiguration) GetUpdatePreferenceSkip ¶
func (n NullConfiguration) GetUpdatePreferenceSkip() string
func (NullConfiguration) GetUpdatePreferenceSnoozeUntil ¶
func (n NullConfiguration) GetUpdatePreferenceSnoozeUntil() keybase1.Time
func (NullConfiguration) GetUpdateURL ¶
func (n NullConfiguration) GetUpdateURL() string
func (NullConfiguration) GetUpdaterConfigFilename ¶ added in v1.0.16
func (n NullConfiguration) GetUpdaterConfigFilename() string
func (NullConfiguration) GetUpgradePerUserKey ¶ added in v1.0.27
func (n NullConfiguration) GetUpgradePerUserKey() (bool, bool)
func (NullConfiguration) GetUserCacheMaxAge ¶
func (n NullConfiguration) GetUserCacheMaxAge() (time.Duration, bool)
func (NullConfiguration) GetUserConfig ¶
func (n NullConfiguration) GetUserConfig() (*UserConfig, error)
func (NullConfiguration) GetUserConfigForUsername ¶
func (n NullConfiguration) GetUserConfigForUsername(s NormalizedUsername) (*UserConfig, error)
func (NullConfiguration) GetUsername ¶
func (n NullConfiguration) GetUsername() NormalizedUsername
func (NullConfiguration) GetUsernameForUID ¶
func (n NullConfiguration) GetUsernameForUID(u keybase1.UID) NormalizedUsername
func (NullConfiguration) GetVDebugSetting ¶
func (n NullConfiguration) GetVDebugSetting() string
type NullConnectivityMonitor ¶ added in v1.0.21
type NullConnectivityMonitor struct { }
func (NullConnectivityMonitor) CheckReachability ¶ added in v1.0.29
func (s NullConnectivityMonitor) CheckReachability(ctx context.Context) error
func (NullConnectivityMonitor) IsConnected ¶ added in v1.0.21
func (s NullConnectivityMonitor) IsConnected(ctx context.Context) ConnectivityMonitorResult
type OuterLinkV2 ¶ added in v1.0.21
type OuterLinkV2 struct { Version int `codec:"version"` Seqno keybase1.Seqno `codec:"seqno"` Prev LinkID `codec:"prev"` Curr LinkID `codec:"curr"` LinkType SigchainV2Type `codec:"type"` // -- Links exist in the wild that are missing fields below this line. SeqType keybase1.SeqType `codec:"seqtype"` // -- Links exist in the wild that are missing fields below this line too. // Whether the link can be ignored by clients that do not support its link type. // This does _not_ mean the link can be ignored if the client supports the link type. // When it comes to stubbing, if the link is unsupported and this bit is set then // - it can be stubbed for non-admins // - it cannot be stubbed for admins IgnoreIfUnsupported SigIgnoreIfUnsupported `codec:"ignore_if_unsupported"` // contains filtered or unexported fields }
OuterLinkV2 is the second version of Keybase sigchain signatures.
func (OuterLinkV2) AssertFields ¶ added in v1.0.21
func (o OuterLinkV2) AssertFields( version int, seqno keybase1.Seqno, prev LinkID, curr LinkID, linkType SigchainV2Type, seqType keybase1.SeqType, ignoreIfUnsupported SigIgnoreIfUnsupported, ) (err error)
func (OuterLinkV2) AssertSomeFields ¶ added in v1.0.27
func (o OuterLinkV2) AssertSomeFields( version int, seqno keybase1.Seqno, ) (err error)
func (OuterLinkV2) Encode ¶ added in v1.0.21
func (o OuterLinkV2) Encode() ([]byte, error)
type OuterLinkV2WithMetadata ¶ added in v1.0.21
type OuterLinkV2WithMetadata struct { OuterLinkV2 // contains filtered or unexported fields }
func DecodeOuterLinkV2 ¶ added in v1.0.21
func DecodeOuterLinkV2(armored string) (*OuterLinkV2WithMetadata, error)
func DecodeStubbedOuterLinkV2 ¶ added in v1.0.21
func DecodeStubbedOuterLinkV2(b64encoded string) (*OuterLinkV2WithMetadata, error)
func (*OuterLinkV2WithMetadata) CodecDecodeSelf ¶ added in v1.0.46
func (o *OuterLinkV2WithMetadata) CodecDecodeSelf(d *codec.Decoder)
func (*OuterLinkV2WithMetadata) CodecEncodeSelf ¶ added in v1.0.46
func (o *OuterLinkV2WithMetadata) CodecEncodeSelf(e *codec.Encoder)
func (OuterLinkV2WithMetadata) EncodeStubbed ¶ added in v1.0.21
func (o OuterLinkV2WithMetadata) EncodeStubbed() string
func (OuterLinkV2WithMetadata) LinkID ¶ added in v1.0.27
func (o OuterLinkV2WithMetadata) LinkID() LinkID
func (OuterLinkV2WithMetadata) Raw ¶ added in v1.0.27
func (o OuterLinkV2WithMetadata) Raw() []byte
func (OuterLinkV2WithMetadata) SigID ¶
func (o OuterLinkV2WithMetadata) SigID() keybase1.SigID
func (OuterLinkV2WithMetadata) Verify ¶ added in v1.0.27
func (o OuterLinkV2WithMetadata) Verify(ctx VerifyContext) (kid keybase1.KID, err error)
type OutputDescriptor ¶
type OutputDescriptor int
type PDPKA ¶ added in v1.0.18
type PDPKA string
PDPKA is a "Passphrase-Derived Public Key Authentication". In this case, it's a armored, packed, signature that's been output by our signing interface.
type PDPKALoginPackage ¶ added in v1.0.18
type PDPKALoginPackage struct {
// contains filtered or unexported fields
}
PDPKALoginPackage contains all relevant PDPKA versions in use at this time. For now, versions 4 and 5.
func ComputeLoginPackage2 ¶
func ComputeLoginPackage2(m MetaContext, pps *PassphraseStream) (ret PDPKALoginPackage, err error)
ComputeLoginPackage2 computes the login package for the given UID as dictated by the context. It assumes that a passphrase stream has already been loaded. A LoginSession is optional. If not available, a new one is requested. Eventually we will kill ComputeLoginPackage and rename this to that.
func (PDPKALoginPackage) PDPKA4 ¶ added in v1.0.18
func (lp PDPKALoginPackage) PDPKA4() PDPKA
PDPKA4 gets the v4 of the PDPKA token for this login package
func (PDPKALoginPackage) PDPKA5 ¶ added in v1.0.18
func (lp PDPKALoginPackage) PDPKA5() PDPKA
PDPKA5 gets the v4 of the PDPKA token for this login package
func (PDPKALoginPackage) PopulateArgs ¶ added in v1.0.18
func (lp PDPKALoginPackage) PopulateArgs(h *HTTPArgs)
PopulateArgs populates the given HTTP args with parameters in this PDPKA package. Right now that includes v4 and v5 of the PDPKA login system.
type PGPFingerprint ¶
type PGPFingerprint [PGPFingerprintLen]byte
func GetPGPFingerprint ¶
func GetPGPFingerprint(w *jsonw.Wrapper) (*PGPFingerprint, error)
func GetPGPFingerprintFromGenericKey ¶ added in v1.0.18
func GetPGPFingerprintFromGenericKey(k GenericKey) *PGPFingerprint
func ImportPGPFingerprintSlice ¶
func ImportPGPFingerprintSlice(fp []byte) (ret *PGPFingerprint)
func PGPFingerprintFromHex ¶
func PGPFingerprintFromHex(s string) (*PGPFingerprint, error)
func PGPFingerprintFromHexNoError ¶
func PGPFingerprintFromHexNoError(s string) *PGPFingerprint
func PGPFingerprintFromSlice ¶
func PGPFingerprintFromSlice(b []byte) (*PGPFingerprint, error)
func (PGPFingerprint) Eq ¶
func (p PGPFingerprint) Eq(p2 PGPFingerprint) bool
func (PGPFingerprint) GetProofState ¶
func (p PGPFingerprint) GetProofState() keybase1.ProofState
func (PGPFingerprint) GetProofType ¶
func (p PGPFingerprint) GetProofType() keybase1.ProofType
func (PGPFingerprint) LastWriterWins ¶
func (p PGPFingerprint) LastWriterWins() bool
func (*PGPFingerprint) MarshalJSON ¶ added in v1.0.19
func (p *PGPFingerprint) MarshalJSON() ([]byte, error)
func (PGPFingerprint) String ¶
func (p PGPFingerprint) String() string
func (PGPFingerprint) ToDisplayString ¶
func (p PGPFingerprint) ToDisplayString(verbose bool) string
func (PGPFingerprint) ToIDString ¶
func (p PGPFingerprint) ToIDString() string
func (PGPFingerprint) ToKeyID ¶
func (p PGPFingerprint) ToKeyID() string
func (PGPFingerprint) ToKeyValuePair ¶
func (p PGPFingerprint) ToKeyValuePair() (string, string)
func (PGPFingerprint) ToQuads ¶
func (p PGPFingerprint) ToQuads() string
func (*PGPFingerprint) UnmarshalJSON ¶ added in v1.0.19
func (p *PGPFingerprint) UnmarshalJSON(b []byte) error
type PGPGenArg ¶
type PGPGenArg struct { PrimaryBits int SubkeyBits int Ids Identities Config *packet.Config PGPUids []string PrimaryLifetime int SubkeyLifetime int }
func ImportKeyGenArg ¶
func ImportKeyGenArg(a keybase1.PGPKeyGenArg) (ret PGPGenArg)
func (*PGPGenArg) AddDefaultUID ¶
func (a *PGPGenArg) AddDefaultUID(g *GlobalContext)
Just for testing
func (*PGPGenArg) CreatePGPIDs ¶
CreateIDs creates identities for KeyGenArg.Ids if none exist. It uses PGPUids to determine the set of Ids. It does not set the default keybase.io uid. AddDefaultUid() does that.
func (PGPGenArg) ExportTo ¶
func (a PGPGenArg) ExportTo(ret *keybase1.PGPKeyGenArg)
func (*PGPGenArg) MakeAllIds ¶
func (a *PGPGenArg) MakeAllIds(g *GlobalContext) error
Just for testing
func (*PGPGenArg) PreferredCompression ¶
func (*PGPGenArg) PreferredHash ¶
func (*PGPGenArg) PreferredSymmetric ¶
type PGPKeyBundle ¶
type PGPKeyBundle struct { *openpgp.Entity // GPGFallbackKey to be used as a fallback if given dummy a PrivateKey. GPGFallbackKey GenericKey // We make the (fairly dangerous) assumption that the key will never be // modified. This avoids the issue that encoding an openpgp.Entity is // nondeterministic due to Go's randomized iteration order (so different // exports of the same key may hash differently). // // If you're *sure* that you're creating a PGPKeyBundle from an armored // *public* key, you can prefill this field and Export() will use it. ArmoredPublicKey string // True if this key was generated by this program Generated bool }
func GeneratePGPKeyBundle ¶
func GeneratePGPKeyBundle(g *GlobalContext, arg PGPGenArg, logUI LogUI) (*PGPKeyBundle, error)
NewEntity returns an Entity that contains a fresh RSA/RSA keypair with a single identity composed of the given full name, comment and email, any of which may be empty but must not contain any of "()<>\x00". If config is nil, sensible defaults will be used.
Modification of: https://code.google.com/p/go/source/browse/openpgp/keys.go?repo=crypto&r=8fec09c61d5d66f460d227fd1df3473d7e015bc6#456
From golang.com/x/crypto/openpgp/keys.go
func LoadPGPKeyFromLocalDB ¶
func LoadPGPKeyFromLocalDB(k keybase1.KID, g *GlobalContext) (*PGPKeyBundle, error)
func NewGeneratedPGPKeyBundle ¶
func NewGeneratedPGPKeyBundle(entity *openpgp.Entity) *PGPKeyBundle
func NewPGPKeyBundle ¶
func NewPGPKeyBundle(entity *openpgp.Entity) *PGPKeyBundle
func (*PGPKeyBundle) CanDecrypt ¶
func (k *PGPKeyBundle) CanDecrypt() bool
CanDecrypt returns false for now, since we haven't implemented PGP encryption of packets for metadata operations
func (*PGPKeyBundle) CanEncrypt ¶
func (k *PGPKeyBundle) CanEncrypt() bool
CanEncrypt returns false for now, since we haven't implemented PGP encryption of packets for metadata operations
func (*PGPKeyBundle) CanSign ¶
func (k *PGPKeyBundle) CanSign() bool
func (*PGPKeyBundle) CheckFingerprint ¶
func (k *PGPKeyBundle) CheckFingerprint(fp *PGPFingerprint) error
func (*PGPKeyBundle) CheckIdentity ¶
func (k *PGPKeyBundle) CheckIdentity(kbid Identity) (match bool, ctime int64, etime int64)
CheckIdentity finds the foo_user@keybase.io PGP identity and figures out when it was created and when it's slated to expire. We plan to start phasing out use of PGP-specified Expiration times as far as sigchain walking is concerned. But for now, there are a few places where it's still used (see ComputedKeyInfos#InsertServerEldestKey).
func (*PGPKeyBundle) CheckSecretKey ¶
func (k *PGPKeyBundle) CheckSecretKey() (err error)
func (*PGPKeyBundle) DecryptFromString ¶
func (k *PGPKeyBundle) DecryptFromString(ciphertext string) (msg []byte, sender keybase1.KID, err error)
DecryptFromString fails for this type of key, since we haven't implemented it yet
func (PGPKeyBundle) DecryptionKeys ¶
func (k PGPKeyBundle) DecryptionKeys() []openpgp.Key
func (*PGPKeyBundle) Encode ¶
func (k *PGPKeyBundle) Encode() (ret string, err error)
func (*PGPKeyBundle) EncodeToStream ¶
func (k *PGPKeyBundle) EncodeToStream(wc io.WriteCloser, private bool) error
func (*PGPKeyBundle) EncryptToString ¶
func (k *PGPKeyBundle) EncryptToString(plaintext []byte, sender GenericKey) (ciphertext string, err error)
EncryptToString fails for this type of key, since we haven't implemented it yet
func (*PGPKeyBundle) Export ¶
func (bundle *PGPKeyBundle) Export() keybase1.PublicKey
func (*PGPKeyBundle) ExportPublicAndPrivate ¶ added in v1.0.18
func (k *PGPKeyBundle) ExportPublicAndPrivate() (public RawPublicKey, private RawPrivateKey, err error)
func (*PGPKeyBundle) FindEmail ¶
func (k *PGPKeyBundle) FindEmail(em string) bool
func (*PGPKeyBundle) FindKeybaseUsername ¶
func (k *PGPKeyBundle) FindKeybaseUsername(un string) bool
XXX for now this is OK but probably we need a PGP uid parser as in pgp-utils
func (*PGPKeyBundle) FullHash ¶
func (k *PGPKeyBundle) FullHash() (string, error)
func (PGPKeyBundle) GetAlgoType ¶
func (k PGPKeyBundle) GetAlgoType() AlgoType
func (*PGPKeyBundle) GetBinaryKID ¶ added in v1.0.18
func (k *PGPKeyBundle) GetBinaryKID() keybase1.BinaryKID
func (PGPKeyBundle) GetFingerprint ¶
func (k PGPKeyBundle) GetFingerprint() PGPFingerprint
func (PGPKeyBundle) GetFingerprintP ¶
func (k PGPKeyBundle) GetFingerprintP() *PGPFingerprint
func (*PGPKeyBundle) GetKID ¶
func (k *PGPKeyBundle) GetKID() keybase1.KID
func (*PGPKeyBundle) GetPGPIdentities ¶
func (k *PGPKeyBundle) GetPGPIdentities() []keybase1.PGPIdentity
func (PGPKeyBundle) GetPrimaryUID ¶
func (k PGPKeyBundle) GetPrimaryUID() string
GetPrimaryUID gets the primary UID in the given key bundle, returned in the 'Max K (foo) <bar@baz.com>' convention.
func (*PGPKeyBundle) HasSecretKey ¶
func (k *PGPKeyBundle) HasSecretKey() bool
HasSecretKey checks if the PGPKeyBundle contains secret key. This function returning true does not indicate that the key is functional - it may also be a key stub.
func (PGPKeyBundle) HumanDescription ¶
func (k PGPKeyBundle) HumanDescription() string
func (*PGPKeyBundle) IdentityNames ¶
func (k *PGPKeyBundle) IdentityNames() []string
func (*PGPKeyBundle) InitGPGKey ¶
func (k *PGPKeyBundle) InitGPGKey()
func (PGPKeyBundle) KeyDescription ¶
func (k PGPKeyBundle) KeyDescription() string
func (PGPKeyBundle) KeyInfo ¶
func (k PGPKeyBundle) KeyInfo() (algorithm, kid, creation string)
func (PGPKeyBundle) KeysByIdUsage ¶
func (PGPKeyBundle) MatchesKey ¶
func (k PGPKeyBundle) MatchesKey(key *openpgp.Key) bool
func (*PGPKeyBundle) MergeKey ¶
func (to *PGPKeyBundle) MergeKey(from *PGPKeyBundle)
MergeKey adds the identities, revocations, and subkeys of another PGPKeyBundle to this key
func (PGPKeyBundle) SamePrimaryAs ¶
func (k PGPKeyBundle) SamePrimaryAs(k2 PGPKeyBundle) bool
func (*PGPKeyBundle) SecretSymmetricKey ¶ added in v1.0.18
func (k *PGPKeyBundle) SecretSymmetricKey(reason EncryptionReason) (NaclSecretBoxKey, error)
func (*PGPKeyBundle) SerializePrivate ¶
func (k *PGPKeyBundle) SerializePrivate(w io.Writer) error
func (*PGPKeyBundle) SignToString ¶
func (*PGPKeyBundle) StoreToLocalDb ¶
func (k *PGPKeyBundle) StoreToLocalDb(g *GlobalContext) error
func (*PGPKeyBundle) StripRevocations ¶
func (k *PGPKeyBundle) StripRevocations() (strippedKey *PGPKeyBundle)
StripRevocations returns a copy of the key with revocations removed
func (*PGPKeyBundle) ToServerSKB ¶
func (key *PGPKeyBundle) ToServerSKB(gc *GlobalContext, tsec Triplesec, gen PassphraseGeneration) (ret *SKB, err error)
func (*PGPKeyBundle) Unlock ¶
func (k *PGPKeyBundle) Unlock(m MetaContext, reason string, secretUI SecretUI) error
func (PGPKeyBundle) UsersDescription ¶
func (k PGPKeyBundle) UsersDescription() []string
func (PGPKeyBundle) VerboseDescription ¶
func (k PGPKeyBundle) VerboseDescription() string
func (PGPKeyBundle) VerifyString ¶
func (k PGPKeyBundle) VerifyString(ctx VerifyContext, sig string, msg []byte) (id keybase1.SigID, err error)
func (PGPKeyBundle) VerifyStringAndExtract ¶
func (k PGPKeyBundle) VerifyStringAndExtract(ctx VerifyContext, sig string) (msg []byte, id keybase1.SigID, err error)
type PGPKeySet ¶
type PGPKeySet struct { Contextified PermissivelyMergedKey *PGPKeyBundle KeysByHash map[string]*PGPKeyBundle }
PGPKeySet represents a collection of versions of a PGP key. It includes a merged version of the key without revocations, and each individual version of the key with revocations intact.
type PGPPullLoggedOutError ¶
type PGPPullLoggedOutError struct{}
func (PGPPullLoggedOutError) Error ¶
func (e PGPPullLoggedOutError) Error() string
type PGPUpdateChainLink ¶
type PGPUpdateChainLink struct { GenericChainLink // contains filtered or unexported fields }
PGPUpdateChainLink represents a chain link which marks a new version of a PGP key as current. The KID and a new full hash are included in the pgp_update section of the body.
func ParsePGPUpdateChainLink ¶
func ParsePGPUpdateChainLink(b GenericChainLink) (ret *PGPUpdateChainLink, err error)
ParsePGPUpdateChainLink creates a PGPUpdateChainLink from a GenericChainLink and verifies that its pgp_update section contains a KID and full_hash
func (*PGPUpdateChainLink) GetPGPFullHash ¶
func (l *PGPUpdateChainLink) GetPGPFullHash() string
func (*PGPUpdateChainLink) ToDisplayString ¶
func (l *PGPUpdateChainLink) ToDisplayString() string
func (*PGPUpdateChainLink) Type ¶
func (l *PGPUpdateChainLink) Type() string
type PIDFileLockError ¶
type PIDFileLockError struct {
Filename string
}
func (PIDFileLockError) Error ¶
func (e PIDFileLockError) Error() string
type PacketTag ¶
type PacketTag uint
PacketTag are tags for OpenPGP and Keybase packets. It is a uint to be backwards compatible with older versions of codec that encoded positive ints as uints.
type Packetable ¶
type Packetable interface {
ToPacket() (*KeybasePacket, error)
}
type PaperChecker ¶ added in v1.0.16
type PaperChecker struct{}
PaperChecker implements PassphraseChecker for paper keys.
func (*PaperChecker) Check ¶ added in v1.0.16
func (p *PaperChecker) Check(m MetaContext, s string) error
Check a paper key format. Will return a detailed error message specific to the problems found in s.
type PaperKeyPhrase ¶
type PaperKeyPhrase string
PaperKeyPhrase is the string that can generate a paper key. It is versioned and forced to be lowercase. To make a new random phrase, use MakePaperKeyPhrase. To convert a string to a PaperKeyPhrase, use NewPaperKeyPhrase.
func MakePaperKeyPhrase ¶
func MakePaperKeyPhrase(version uint8) (PaperKeyPhrase, error)
MakePaperKeyPhrase creates a new, random paper key phrase for the given version.
func NewPaperKeyPhrase ¶
func NewPaperKeyPhrase(phrase string) PaperKeyPhrase
NewPaperKeyPhrase converts a string into a PaperKeyPhrase.
func NewPaperKeyPhraseCheckVersion ¶
func NewPaperKeyPhraseCheckVersion(m MetaContext, passphrase string) (ret PaperKeyPhrase, err error)
func (PaperKeyPhrase) Bytes ¶
func (p PaperKeyPhrase) Bytes() []byte
Bytes returns a byte slice of the phrase.
func (PaperKeyPhrase) InvalidWords ¶ added in v1.0.16
func (p PaperKeyPhrase) InvalidWords() (words []string)
func (PaperKeyPhrase) NumWords ¶ added in v1.0.17
func (p PaperKeyPhrase) NumWords() int
func (PaperKeyPhrase) Prefix ¶
func (p PaperKeyPhrase) Prefix() string
Prefix returns the first two words in the phrase.
func (PaperKeyPhrase) String ¶
func (p PaperKeyPhrase) String() string
String returns a string representation of the phrase.
func (PaperKeyPhrase) Version ¶
func (p PaperKeyPhrase) Version() (uint8, error)
Version calculates the phrase version. 0-15 are possible versions.
type ParsedSig ¶
type ParsedSig struct { Block *armor.Block SigBody []byte MD *openpgp.MessageDetails LiteralData []byte }
func PGPOpenSig ¶
func (*ParsedSig) AssertPayload ¶
func (*ParsedSig) ExtractPayload ¶ added in v1.0.21
func (*ParsedSig) Verify ¶
func (ps *ParsedSig) Verify(k PGPKeyBundle) (err error)
type Parser ¶
type Parser struct {
// contains filtered or unexported fields
}
func (*Parser) Parse ¶
func (p *Parser) Parse(ctx AssertionContext) AssertionExpression
type PassphraseChecker ¶ added in v1.0.16
type PassphraseChecker interface {
Check(MetaContext, string) error
}
PassphraseChecker is an interface for checking the format of a passphrase. Returns nil if the format is ok, or a descriptive hint otherwise.
type PassphraseError ¶
type PassphraseError struct {
Msg string
}
func (PassphraseError) Error ¶
func (p PassphraseError) Error() string
func (PassphraseError) ToStatus ¶
func (p PassphraseError) ToStatus() (s keybase1.Status)
type PassphraseGeneration ¶
type PassphraseGeneration int
PassphraseGeneration represents which generation of the passphrase is currently in use. It's used to guard against race conditions in which the passphrase is changed on one device which the other still has it cached.
func (PassphraseGeneration) IsNil ¶
func (p PassphraseGeneration) IsNil() bool
IsNil returns true if this PassphraseGeneration isn't initialized.
type PassphrasePrompter ¶
type PassphrasePrompter interface {
Prompt(keybase1.GUIEntryArg) (keybase1.GetPassphraseRes, error)
}
type PassphraseProvisionImpossibleError ¶
type PassphraseProvisionImpossibleError struct{}
func (PassphraseProvisionImpossibleError) Error ¶
func (e PassphraseProvisionImpossibleError) Error() string
type PassphraseStream ¶
type PassphraseStream struct {
// contains filtered or unexported fields
}
func GetPassphraseStreamStored ¶
func GetPassphraseStreamStored(m MetaContext) (pps *PassphraseStream, err error)
GetPassphraseStreamStored either returns a cached, verified passphrase stream from a previous login, the secret store, or generates a new one via login. NOTE: this function can return a partial passphrase stream if it reads from the secret store. It won't have the material used to decrypt server-synced keys or to generate PDPKA material in that case.
func GetPassphraseStreamViaPromptInLoginContext ¶
func GetPassphraseStreamViaPromptInLoginContext(m MetaContext) (pps *PassphraseStream, err error)
GetFullPassphraseStreamViaPrompt gets the user's passphrase stream either cached from the LoginContext or from the prompt. It doesn't involve the secret store at all, since the full passphrase stream isn't stored in the secret store. And also it doesn't write the secret store because this function is called right before the user changes to a new passphrase, so what's the point. It's assumed that the login context is set to non-nil by the caller.
func NewPassphraseStream ¶
func NewPassphraseStream(s []byte) *PassphraseStream
func NewPassphraseStreamLKSecOnly ¶ added in v1.0.17
func NewPassphraseStreamLKSecOnly(s *LKSec) (*PassphraseStream, error)
NewPassphraseStreamLKSecOnly creates a PassphraseStream only with the lks bytes (stream[lksIndex:]). The rest of the stream is zeros. This is used to create a passphrase stream from the information in the secret store, which only contains the lksec portion of the stream.
func VerifyPassphraseForLoggedInUser ¶
func VerifyPassphraseForLoggedInUser(m MetaContext, pp string) (pps *PassphraseStream, err error)
VerifyPassphraseForLoggedInUser verifies that the current passphrase is correct for the logged in user, returning nil if correct, and an error if not. Only used in tests right now, but it's fine to use in production code if it seems appropriate.
func VerifyPassphraseGetStreamInLoginContext ¶
func VerifyPassphraseGetStreamInLoginContext(m MetaContext, passphrase string) (pps *PassphraseStream, err error)
VerifyPassphraseGetFullStream verifies the current passphrase is a correct login and if so, will return a full passphrase stream derived from it. Assumes the caller made a non-nil LoginContext for us to operate in.
func (*PassphraseStream) Clone ¶
func (ps *PassphraseStream) Clone() *PassphraseStream
Clone a passphrase stream and return a copy.
func (PassphraseStream) DHSeed ¶
func (ps PassphraseStream) DHSeed() []byte
func (PassphraseStream) EdDSASeed ¶
func (ps PassphraseStream) EdDSASeed() []byte
func (PassphraseStream) Export ¶
func (ps PassphraseStream) Export() keybase1.PassphraseStream
func (PassphraseStream) Generation ¶
func (ps PassphraseStream) Generation() PassphraseGeneration
Generation returns the generation of this passphrase stream. It is >=0 for valid generation #. If 0, then we assume the passphrase has never been reset.
func (PassphraseStream) LksClientHalf ¶
func (ps PassphraseStream) LksClientHalf() LKSecClientHalf
func (PassphraseStream) PDPKA5KID ¶ added in v1.0.18
func (ps PassphraseStream) PDPKA5KID() (keybase1.KID, error)
func (PassphraseStream) PWHash ¶
func (ps PassphraseStream) PWHash() []byte
func (*PassphraseStream) SetGeneration ¶
func (ps *PassphraseStream) SetGeneration(gen PassphraseGeneration)
func (PassphraseStream) String ¶
func (ps PassphraseStream) String() string
type PassphraseStreamCache ¶
func NewPassphraseStreamCache ¶
func NewPassphraseStreamCache(tsec Triplesec, ps *PassphraseStream) *PassphraseStreamCache
func (*PassphraseStreamCache) Clear ¶
func (s *PassphraseStreamCache) Clear()
func (*PassphraseStreamCache) Dump ¶
func (s *PassphraseStreamCache) Dump()
func (*PassphraseStreamCache) MutatePassphraseStream ¶
func (s *PassphraseStreamCache) MutatePassphraseStream(f func(*PassphraseStream)) bool
func (*PassphraseStreamCache) PassphraseStream ¶
func (s *PassphraseStreamCache) PassphraseStream() *PassphraseStream
PassphraseStream returns a copy of the currently cached passphrase stream, or nil if none exists.
func (*PassphraseStreamCache) PassphraseStreamAndTriplesec ¶
func (s *PassphraseStreamCache) PassphraseStreamAndTriplesec() (pps *PassphraseStream, tsec Triplesec)
func (*PassphraseStreamCache) TriplesecAndGeneration ¶
func (s *PassphraseStreamCache) TriplesecAndGeneration() (Triplesec, PassphraseGeneration)
func (*PassphraseStreamCache) Valid ¶
func (s *PassphraseStreamCache) Valid() bool
func (*PassphraseStreamCache) ValidPassphraseStream ¶ added in v1.0.17
func (s *PassphraseStreamCache) ValidPassphraseStream() bool
func (*PassphraseStreamCache) ValidTsec ¶ added in v1.0.17
func (s *PassphraseStreamCache) ValidTsec() bool
type PassphraseType ¶ added in v1.0.19
type PassphraseType string
const ( PassphraseTypeKeybase PassphraseType = "Keybase" PassphraseTypePGP PassphraseType = "PGP" )
type PayloadCache ¶ added in v1.0.41
type PayloadCache struct { Contextified // contains filtered or unexported fields }
func NewPayloadCache ¶ added in v1.0.41
func NewPayloadCache(g *GlobalContext, maxNumElements int) *PayloadCache
func (*PayloadCache) GetOrPrime ¶ added in v1.0.41
func (p *PayloadCache) GetOrPrime(link *ChainLink) (*jsonw.Wrapper, error)
type PerUserKeyChainLink ¶ added in v1.0.27
type PerUserKeyChainLink struct { GenericChainLink // contains filtered or unexported fields }
func ParsePerUserKeyChainLink ¶ added in v1.0.27
func ParsePerUserKeyChainLink(b GenericChainLink) (ret *PerUserKeyChainLink, err error)
func (*PerUserKeyChainLink) GetDelegatedKid ¶ added in v1.0.27
func (s *PerUserKeyChainLink) GetDelegatedKid() (res keybase1.KID)
func (*PerUserKeyChainLink) GetRole ¶ added in v1.0.27
func (s *PerUserKeyChainLink) GetRole() KeyRole
Don't consider per-user-keys as normal delegations. Because they have multiple kids and initially can't delegate further. They are handled separately by the sigchain loader.
func (*PerUserKeyChainLink) ToDisplayString ¶ added in v1.0.27
func (s *PerUserKeyChainLink) ToDisplayString() string
func (*PerUserKeyChainLink) ToPerUserKey ¶ added in v1.0.27
func (s *PerUserKeyChainLink) ToPerUserKey() keybase1.PerUserKey
func (*PerUserKeyChainLink) Type ¶ added in v1.0.27
func (s *PerUserKeyChainLink) Type() string
func (*PerUserKeyChainLink) VerifyReverseSig ¶ added in v1.0.27
func (s *PerUserKeyChainLink) VerifyReverseSig(_ ComputedKeyFamily) (err error)
VerifyReverseSig checks a SibkeyChainLink's reverse signature using the ComputedKeyFamily provided.
type PerUserKeyImportError ¶ added in v1.0.27
type PerUserKeyImportError struct {
// contains filtered or unexported fields
}
func NewPerUserKeyImportError ¶ added in v1.0.27
func NewPerUserKeyImportError(format string, args ...interface{}) PerUserKeyImportError
func (PerUserKeyImportError) Error ¶ added in v1.0.27
func (e PerUserKeyImportError) Error() string
type PerUserKeyPrev ¶ added in v1.0.27
type PerUserKeyPrev string
A secretbox containg a seed encrypted for its successor generation
type PerUserKeySeed ¶ added in v1.0.27
type PerUserKeySeed [PerUserKeySeedSize]byte
func GeneratePerUserKeySeed ¶ added in v1.0.27
func GeneratePerUserKeySeed() (res PerUserKeySeed, err error)
func (*PerUserKeySeed) DeriveDHKey ¶ added in v1.0.27
func (s *PerUserKeySeed) DeriveDHKey() (*NaclDHKeyPair, error)
func (*PerUserKeySeed) DeriveSigningKey ¶ added in v1.0.27
func (s *PerUserKeySeed) DeriveSigningKey() (*NaclSigningKeyPair, error)
func (*PerUserKeySeed) DeriveSymmetricKey ¶ added in v1.0.46
func (s *PerUserKeySeed) DeriveSymmetricKey(reason DeriveReason) (res NaclSecretBoxKey, err error)
func (*PerUserKeySeed) IsBlank ¶ added in v1.0.27
func (s *PerUserKeySeed) IsBlank() bool
type PerUserKeyring ¶ added in v1.0.27
type PerUserKeyring struct { Contextified sync.Mutex // contains filtered or unexported fields }
PerUserKeyring holds on to all versions of the per user key. Generation=0 should be nil, but all others should be present.
func NewPerUserKeyring ¶ added in v1.0.27
func NewPerUserKeyring(g *GlobalContext, uid keybase1.UID) (*PerUserKeyring, error)
NewPerUserKeyring makes a new per-user-key keyring for a given UID.
func (*PerUserKeyring) AddKey ¶ added in v1.0.27
func (s *PerUserKeyring) AddKey(m MetaContext, generation keybase1.PerUserKeyGeneration, seqno keybase1.Seqno, seed PerUserKeySeed) error
AddKey registers a full key locally.
func (*PerUserKeyring) CurrentGeneration ¶ added in v1.0.27
func (s *PerUserKeyring) CurrentGeneration() keybase1.PerUserKeyGeneration
CurrentGeneration returns what generation we're on. The version possible Version is 1. Version 0 implies no keys are available.
func (*PerUserKeyring) GetEncryptionKeyByGeneration ¶ added in v1.0.27
func (s *PerUserKeyring) GetEncryptionKeyByGeneration(m MetaContext, gen keybase1.PerUserKeyGeneration) (*NaclDHKeyPair, error)
Get the encryption key of a generation.
func (*PerUserKeyring) GetEncryptionKeyByKID ¶ added in v1.0.27
func (s *PerUserKeyring) GetEncryptionKeyByKID(m MetaContext, kid keybase1.KID) (*NaclDHKeyPair, error)
GetEncryptionKeyByKID finds an encryption key that matches kid.
func (*PerUserKeyring) GetEncryptionKeyBySeqno ¶ added in v1.0.27
func (s *PerUserKeyring) GetEncryptionKeyBySeqno(m MetaContext, seqno keybase1.Seqno) (*NaclDHKeyPair, error)
Get the encryption key at the user sigchain seqno.
func (*PerUserKeyring) GetEncryptionKeyBySeqnoOrSync ¶ added in v1.0.48
func (s *PerUserKeyring) GetEncryptionKeyBySeqnoOrSync(m MetaContext, seqno keybase1.Seqno) (*NaclDHKeyPair, error)
func (*PerUserKeyring) GetLatestSigningKey ¶ added in v1.0.27
func (s *PerUserKeyring) GetLatestSigningKey(m MetaContext) (*NaclSigningKeyPair, error)
func (*PerUserKeyring) GetSeedByGeneration ¶ added in v1.0.46
func (s *PerUserKeyring) GetSeedByGeneration(m MetaContext, gen keybase1.PerUserKeyGeneration) (res PerUserKeySeed, err error)
func (*PerUserKeyring) GetSeedByGenerationOrSync ¶ added in v1.0.48
func (s *PerUserKeyring) GetSeedByGenerationOrSync(m MetaContext, gen keybase1.PerUserKeyGeneration) (res PerUserKeySeed, err error)
func (*PerUserKeyring) GetUID ¶ added in v1.0.27
func (s *PerUserKeyring) GetUID() keybase1.UID
func (*PerUserKeyring) HasAnyKeys ¶ added in v1.0.27
func (s *PerUserKeyring) HasAnyKeys() bool
func (*PerUserKeyring) PrepareBoxForNewDevice ¶ added in v1.0.27
func (s *PerUserKeyring) PrepareBoxForNewDevice(m MetaContext, receiverKey NaclDHKeyPair, senderKey NaclDHKeyPair) (box keybase1.PerUserKeyBox, err error)
PrepareBoxForNewDevice encrypts the latest shared key seed for a new device. The returned box should be pushed to the server.
func (*PerUserKeyring) PrepareBoxesForDevices ¶ added in v1.0.27
func (s *PerUserKeyring) PrepareBoxesForDevices(m MetaContext, contents PerUserKeySeed, generation keybase1.PerUserKeyGeneration, receiverKeys []NaclDHKeyPair, senderKey GenericKey) (boxes []keybase1.PerUserKeyBox, err error)
Encrypt seed for receiverKeys. Use senderKey to encrypt. Does not use the keyring at all. Attached for organizational purposes. Used when creating a new seed.
func (*PerUserKeyring) PreparePrev ¶ added in v1.0.27
func (s *PerUserKeyring) PreparePrev(m MetaContext, newSeed PerUserKeySeed, newGeneration keybase1.PerUserKeyGeneration) (PerUserKeyPrev, error)
Prepares a prev secretbox containing generation n-1 encrypted for generation n. Asserts that the current generation is n-1. The `generation` parameter is n.
func (*PerUserKeyring) Sync ¶ added in v1.0.27
func (s *PerUserKeyring) Sync(m MetaContext) (err error)
Sync our PerUserKeyring with the server. It will either add all new keys since our last update, or not at all if there was an error. Pass it a standard Go network context.
func (*PerUserKeyring) SyncAsPaperKey ¶ added in v1.0.27
func (s *PerUserKeyring) SyncAsPaperKey(m MetaContext, upak *keybase1.UserPlusAllKeys, deviceID keybase1.DeviceID, decryptionKey GenericKey) (err error)
`m.LoginContext` and `upak` are optional
func (*PerUserKeyring) SyncWithExtras ¶ added in v1.0.27
func (s *PerUserKeyring) SyncWithExtras(m MetaContext, upak *keybase1.UserPlusAllKeys) (err error)
`m.LoginContext` and `upak` are optional
type PerUserKeysList ¶ added in v1.0.27
type PerUserKeysList []keybase1.PerUserKey
func (PerUserKeysList) Len ¶ added in v1.0.27
func (p PerUserKeysList) Len() int
func (PerUserKeysList) Less ¶ added in v1.0.27
func (p PerUserKeysList) Less(i, j int) bool
func (PerUserKeysList) Swap ¶ added in v1.0.27
func (p PerUserKeysList) Swap(i, j int)
type PgpUI ¶
type PgpUI interface { keybase1.PGPUiInterface }
type PortRangeListenerSource ¶ added in v1.0.46
func NewFixedPortListenerSource ¶ added in v1.0.46
func NewFixedPortListenerSource(port int) *PortRangeListenerSource
func NewPortRangeListenerSource ¶ added in v1.0.46
func NewPortRangeListenerSource(low, high int) *PortRangeListenerSource
func (*PortRangeListenerSource) GetListener ¶ added in v1.0.46
func (p *PortRangeListenerSource) GetListener() (listener net.Listener, address string, err error)
type PostAuthProofArg ¶
type PostAuthProofArg struct {
// contains filtered or unexported fields
}
type PostAuthProofRes ¶
type PostAuthProofRes struct { SessionID string `json:"session"` AuthID string `json:"auth_id"` CSRFToken string `json:"csrf_token"` UIDHex string `json:"uid"` Username string `json:"username"` PPGen int `json:"passphrase_generation"` }
func PostAuthProof ¶
func PostAuthProof(m MetaContext, arg PostAuthProofArg) (*PostAuthProofRes, error)
type PostProofArg ¶
type PostProofRes ¶
func PostProof ¶
func PostProof(m MetaContext, arg PostProofArg) (*PostProofRes, error)
type ProfileNotPublicError ¶
type ProfileNotPublicError struct {
// contains filtered or unexported fields
}
func NewProfileNotPublicError ¶ added in v1.0.18
func NewProfileNotPublicError(s string) ProfileNotPublicError
func (ProfileNotPublicError) Error ¶
func (p ProfileNotPublicError) Error() string
func (ProfileNotPublicError) ToStatus ¶
func (e ProfileNotPublicError) ToStatus() keybase1.Status
type PromptDefault ¶
type PromptDefault int
const ( PromptDefaultNo PromptDefault = iota PromptDefaultYes PromptDefaultNeither )
type PromptDescriptor ¶
type PromptDescriptor int
type Proof ¶
type Proof struct {
Key, Value string
}
func RemoteProofChainLinkToProof ¶
func RemoteProofChainLinkToProof(r RemoteProofChainLink) Proof
type ProofAPIError ¶
type ProofAPIError struct { ProofErrorImpl // contains filtered or unexported fields }
func NewProofAPIError ¶
func NewProofAPIError(s keybase1.ProofStatus, u string, d string, a ...interface{}) *ProofAPIError
func XapiError ¶
func XapiError(err error, u string) *ProofAPIError
type ProofCache ¶
type ProofCache struct { Contextified sync.RWMutex // contains filtered or unexported fields }
func NewProofCache ¶
func NewProofCache(g *GlobalContext, capac int) *ProofCache
func (*ProofCache) DisableDisk ¶ added in v1.0.19
func (pc *ProofCache) DisableDisk()
func (*ProofCache) Get ¶
func (pc *ProofCache) Get(sid keybase1.SigID, pvlHash PvlKitHash) *CheckResult
func (*ProofCache) Put ¶
func (pc *ProofCache) Put(sid keybase1.SigID, pe ProofError, pvlHash PvlKitHash) error
func (*ProofCache) Reset ¶ added in v1.0.19
func (pc *ProofCache) Reset() error
type ProofChecker ¶
type ProofChecker interface { CheckStatus(m MetaContext, h SigHint, pcm ProofCheckerMode, pvlU PvlUnparsed) ProofError GetTorError() ProofError }
type ProofCheckerMode ¶ added in v1.0.19
type ProofCheckerMode int
const ( ProofCheckerModePassive ProofCheckerMode = iota ProofCheckerModeActive ProofCheckerMode = iota )
type ProofError ¶
type ProofError interface { error GetProofStatus() keybase1.ProofStatus GetDesc() string }
func ImportProofError ¶
func ImportProofError(e keybase1.ProofResult) ProofError
type ProofErrorImpl ¶
type ProofErrorImpl struct { Status keybase1.ProofStatus Desc string }
func NewProofError ¶
func NewProofError(s keybase1.ProofStatus, d string, a ...interface{}) *ProofErrorImpl
func (*ProofErrorImpl) Error ¶
func (e *ProofErrorImpl) Error() string
func (*ProofErrorImpl) GetDesc ¶
func (e *ProofErrorImpl) GetDesc() string
func (*ProofErrorImpl) GetProofStatus ¶
func (e *ProofErrorImpl) GetProofStatus() keybase1.ProofStatus
type ProofLinkWithState ¶
type ProofLinkWithState struct {
// contains filtered or unexported fields
}
ProofLinkWithState contains a RemoteProofChainLink and the proof state. In addition, it satisfies the TrackIdComponent interface.
func (ProofLinkWithState) GetProofState ¶
func (p ProofLinkWithState) GetProofState() keybase1.ProofState
func (ProofLinkWithState) GetProofType ¶
func (p ProofLinkWithState) GetProofType() keybase1.ProofType
func (ProofLinkWithState) LastWriterWins ¶
func (p ProofLinkWithState) LastWriterWins() bool
func (ProofLinkWithState) ToIDString ¶
func (p ProofLinkWithState) ToIDString() string
func (ProofLinkWithState) ToKeyValuePair ¶
func (p ProofLinkWithState) ToKeyValuePair() (string, string)
type ProofMetadata ¶
type ProofMetadata struct { Me *User SigningUser UserBasic Seqno keybase1.Seqno PrevLinkID LinkID LinkType LinkType SigningKey GenericKey Eldest keybase1.KID CreationTime int64 ExpireIn int IncludePGPHash bool SigVersion SigVersion SeqType keybase1.SeqType MerkleRoot *MerkleRoot IgnoreIfUnsupported SigIgnoreIfUnsupported }
func (ProofMetadata) ToJSON ¶
func (arg ProofMetadata) ToJSON(m MetaContext) (ret *jsonw.Wrapper, err error)
type ProofNotFoundForServiceError ¶
type ProofNotFoundForServiceError struct {
Service string
}
func (ProofNotFoundForServiceError) Error ¶
func (e ProofNotFoundForServiceError) Error() string
func (ProofNotFoundForServiceError) ToStatus ¶
func (e ProofNotFoundForServiceError) ToStatus() (s keybase1.Status)
type ProofNotFoundForUsernameError ¶
func (ProofNotFoundForUsernameError) Error ¶
func (e ProofNotFoundForUsernameError) Error() string
func (ProofNotFoundForUsernameError) ToStatus ¶
func (e ProofNotFoundForUsernameError) ToStatus() (s keybase1.Status)
type ProofNotYetAvailableError ¶
type ProofNotYetAvailableError struct{}
func (ProofNotYetAvailableError) Error ¶
func (e ProofNotYetAvailableError) Error() string
type ProofSet ¶
type ProofSet struct {
// contains filtered or unexported fields
}
func BaseProofSet ¶ added in v1.0.19
func BaseProofSet(u *keybase1.UserPlusKeysV2AllIncarnations) *ProofSet
BaseProofSet creates a basic proof set for a user with their keybase and uid proofs and any pgp fingerprint proofs.
func NewProofSet ¶
type ProtocolDowngradeError ¶
type ProtocolDowngradeError struct {
// contains filtered or unexported fields
}
func NewProtocolDowngradeError ¶ added in v1.0.18
func NewProtocolDowngradeError(msg string) ProtocolDowngradeError
func (ProtocolDowngradeError) Error ¶
func (h ProtocolDowngradeError) Error() string
type ProveUI ¶
type ProveUI interface { PromptOverwrite(context.Context, keybase1.PromptOverwriteArg) (bool, error) PromptUsername(context.Context, keybase1.PromptUsernameArg) (string, error) OutputPrechecks(context.Context, keybase1.OutputPrechecksArg) error PreProofWarning(context.Context, keybase1.PreProofWarningArg) (bool, error) OutputInstructions(context.Context, keybase1.OutputInstructionsArg) error OkToCheck(context.Context, keybase1.OkToCheckArg) (bool, error) DisplayRecheckWarning(context.Context, keybase1.DisplayRecheckWarningArg) error }
type ProvisionFailedOfflineError ¶ added in v1.0.30
type ProvisionFailedOfflineError struct{}
func (ProvisionFailedOfflineError) Error ¶ added in v1.0.30
func (e ProvisionFailedOfflineError) Error() string
func (ProvisionFailedOfflineError) ToStatus ¶ added in v1.0.30
func (e ProvisionFailedOfflineError) ToStatus() keybase1.Status
type ProvisionUI ¶
type ProvisionUI interface { keybase1.ProvisionUiInterface }
type ProvisionUnavailableError ¶
type ProvisionUnavailableError struct{}
func (ProvisionUnavailableError) Error ¶
func (e ProvisionUnavailableError) Error() string
func (ProvisionUnavailableError) ToStatus ¶
func (e ProvisionUnavailableError) ToStatus() keybase1.Status
type ProvisionViaDeviceRequiredError ¶ added in v1.0.27
type ProvisionViaDeviceRequiredError struct{}
func (ProvisionViaDeviceRequiredError) Error ¶ added in v1.0.27
func (e ProvisionViaDeviceRequiredError) Error() string
func (ProvisionViaDeviceRequiredError) ToStatus ¶ added in v1.0.27
func (e ProvisionViaDeviceRequiredError) ToStatus() keybase1.Status
type ProvisionalLoginContext ¶
type ProvisionalLoginContext struct { MetaContextified // contains filtered or unexported fields }
func (*ProvisionalLoginContext) ClearKeyring ¶
func (p *ProvisionalLoginContext) ClearKeyring()
func (*ProvisionalLoginContext) CreateLoginSessionWithSalt ¶
func (p *ProvisionalLoginContext) CreateLoginSessionWithSalt(emailOrUsername string, salt []byte) error
func (*ProvisionalLoginContext) CreateStreamCache ¶
func (p *ProvisionalLoginContext) CreateStreamCache(tsec Triplesec, pps *PassphraseStream)
func (*ProvisionalLoginContext) Dump ¶
func (p *ProvisionalLoginContext) Dump(m MetaContext, prefix string)
func (*ProvisionalLoginContext) GetUID ¶
func (p *ProvisionalLoginContext) GetUID() keybase1.UID
func (*ProvisionalLoginContext) GetUnlockedPaperEncKey ¶
func (p *ProvisionalLoginContext) GetUnlockedPaperEncKey() GenericKey
func (*ProvisionalLoginContext) GetUnlockedPaperSigKey ¶
func (p *ProvisionalLoginContext) GetUnlockedPaperSigKey() GenericKey
func (*ProvisionalLoginContext) GetUserVersion ¶
func (p *ProvisionalLoginContext) GetUserVersion() keybase1.UserVersion
func (*ProvisionalLoginContext) GetUsername ¶
func (p *ProvisionalLoginContext) GetUsername() NormalizedUsername
func (*ProvisionalLoginContext) Keyring ¶
func (p *ProvisionalLoginContext) Keyring(m MetaContext) (ret *SKBKeyringFile, err error)
func (*ProvisionalLoginContext) LocalSession ¶
func (p *ProvisionalLoginContext) LocalSession() *Session
func (*ProvisionalLoginContext) LoggedInLoad ¶
func (p *ProvisionalLoginContext) LoggedInLoad() (bool, error)
func (*ProvisionalLoginContext) LoginSession ¶
func (p *ProvisionalLoginContext) LoginSession() *LoginSession
func (*ProvisionalLoginContext) PassphraseStream ¶
func (p *ProvisionalLoginContext) PassphraseStream() *PassphraseStream
func (*ProvisionalLoginContext) PassphraseStreamCache ¶
func (p *ProvisionalLoginContext) PassphraseStreamCache() *PassphraseStreamCache
func (*ProvisionalLoginContext) RunSecretSyncer ¶
func (p *ProvisionalLoginContext) RunSecretSyncer(m MetaContext, uid keybase1.UID) error
func (*ProvisionalLoginContext) Salt ¶
func (p *ProvisionalLoginContext) Salt() []byte
func (*ProvisionalLoginContext) SaveState ¶
func (p *ProvisionalLoginContext) SaveState(sessionID, csrf string, username NormalizedUsername, uv keybase1.UserVersion, deviceID keybase1.DeviceID) (err error)
func (*ProvisionalLoginContext) SecretSyncer ¶
func (p *ProvisionalLoginContext) SecretSyncer() *SecretSyncer
func (*ProvisionalLoginContext) SetLoginSession ¶
func (p *ProvisionalLoginContext) SetLoginSession(l *LoginSession)
func (*ProvisionalLoginContext) SetStreamCache ¶
func (p *ProvisionalLoginContext) SetStreamCache(c *PassphraseStreamCache)
func (*ProvisionalLoginContext) SetUsernameUserVersion ¶
func (p *ProvisionalLoginContext) SetUsernameUserVersion(username NormalizedUsername, uv keybase1.UserVersion) error
type PseudonymGetError ¶ added in v1.0.21
type PseudonymGetError struct {
// contains filtered or unexported fields
}
PseudonymGetError is sometimes written by unmarshaling (no fields of) a server response.
func (PseudonymGetError) Error ¶ added in v1.0.21
func (e PseudonymGetError) Error() string
type PublicKeyList ¶
func (PublicKeyList) Len ¶
func (l PublicKeyList) Len() int
func (PublicKeyList) Less ¶
func (l PublicKeyList) Less(i, j int) bool
func (PublicKeyList) Swap ¶
func (l PublicKeyList) Swap(i, j int)
type PvlSource ¶ added in v1.0.21
type PvlSource interface {
GetPVL(m MetaContext) (PvlUnparsed, error)
}
type PvlSourceError ¶ added in v1.0.21
type PvlSourceError struct {
// contains filtered or unexported fields
}
func NewPvlSourceError ¶ added in v1.0.21
func NewPvlSourceError(msgf string, a ...interface{}) PvlSourceError
func (PvlSourceError) Error ¶ added in v1.0.21
func (e PvlSourceError) Error() string
type PvlUnparsed ¶ added in v1.0.21
type PvlUnparsed struct { Hash PvlKitHash Pvl PvlString }
type RPCCanceller ¶
func NewRPCCanceller ¶
func NewRPCCanceller() *RPCCanceller
func (*RPCCanceller) CancelLiveContexts ¶
func (r *RPCCanceller) CancelLiveContexts()
func (*RPCCanceller) RegisterContext ¶
func (r *RPCCanceller) RegisterContext(ctx context.Context) (context.Context, RPCCancellerKey)
func (*RPCCanceller) UnregisterContext ¶
func (r *RPCCanceller) UnregisterContext(id RPCCancellerKey)
type RPCCancellerKey ¶
type RPCCancellerKey string
func NewRPCCancellerKey ¶
func NewRPCCancellerKey() RPCCancellerKey
type RPCLogFactory ¶
type RPCLogFactory struct {
Contextified
}
func NewRPCLogFactory ¶
func NewRPCLogFactory(g *GlobalContext) *RPCLogFactory
func (*RPCLogFactory) NewLog ¶
func (r *RPCLogFactory) NewLog(a net.Addr) rpc.LogInterface
type RandomPortListenerSource ¶ added in v1.0.46
type RandomPortListenerSource struct{}
func NewRandomPortListenerSource ¶ added in v1.0.46
func NewRandomPortListenerSource() *RandomPortListenerSource
func (RandomPortListenerSource) GetListener ¶ added in v1.0.46
func (r RandomPortListenerSource) GetListener() (net.Listener, string, error)
type RateLimitCategory ¶
type RateLimitCategory string
const ( CheckTrackingRateLimit RateLimitCategory = "CheckTrackingRateLimit" TestEventRateLimit RateLimitCategory = "TestEventRateLimit" )
type RateLimits ¶
type RateLimits struct { Contextified sync.Mutex // contains filtered or unexported fields }
func NewRateLimits ¶
func NewRateLimits(g *GlobalContext) *RateLimits
func (*RateLimits) GetPermission ¶
func (r *RateLimits) GetPermission(category RateLimitCategory, interval time.Duration) bool
type RawKeyFamily ¶
type RawKeyFamily struct {
AllBundles []string `json:"all_bundles"`
}
As returned by user/lookup.json
type RawPrivateKey ¶ added in v1.0.18
type RawPrivateKey []byte
type RawPublicKey ¶ added in v1.0.18
type RawPublicKey []byte
type ReadCloseSeeker ¶ added in v1.0.19
type ReadCloseSeeker interface { io.ReadCloser io.Seeker }
type ReadCloser ¶
type ReadCloser struct {
// contains filtered or unexported fields
}
type ReceiverDeviceError ¶
type ReceiverDeviceError struct {
Msg string
}
func NewReceiverDeviceError ¶
func NewReceiverDeviceError(expected, received keybase1.DeviceID) ReceiverDeviceError
func (ReceiverDeviceError) Error ¶
func (e ReceiverDeviceError) Error() string
func (ReceiverDeviceError) ToStatus ¶
func (e ReceiverDeviceError) ToStatus() keybase1.Status
type RecipientNotFoundError ¶
type RecipientNotFoundError struct {
// contains filtered or unexported fields
}
type ReloginRequiredError ¶
type ReloginRequiredError struct{}
func (ReloginRequiredError) Error ¶
func (e ReloginRequiredError) Error() string
func (ReloginRequiredError) ToStatus ¶
func (e ReloginRequiredError) ToStatus() keybase1.Status
type RemoteProofChainLink ¶
type RemoteProofChainLink interface { TypedChainLink TableKey() string LastWriterWins() bool GetRemoteUsername() string GetHostname() string GetProtocol() string DisplayCheck(ui IdentifyUI, lcr LinkCheckResult) error ToTrackingStatement(keybase1.ProofState) (*jsonw.Wrapper, error) CheckDataJSON() *jsonw.Wrapper ToIDString() string ToKeyValuePair() (string, string) ComputeTrackDiff(tl *TrackLookup) TrackDiff GetProofType() keybase1.ProofType ProofText() string }
========================================================================= Remote, Web and Social
func ParseWebServiceBinding ¶
func ParseWebServiceBinding(base GenericChainLink) (ret RemoteProofChainLink, e error)
To be used for signatures in a user's signature chain.
type RemoteProofLinks ¶
type RemoteProofLinks struct { Contextified // contains filtered or unexported fields }
RemoteProofLinks holds a set of RemoteProofChainLinks, organized by service.
func NewRemoteProofLinks ¶
func NewRemoteProofLinks(g *GlobalContext) *RemoteProofLinks
NewRemoteProofLinks creates a new empty collection of proof links.
func (*RemoteProofLinks) Active ¶
func (r *RemoteProofLinks) Active() []RemoteProofChainLink
Active returns all the active proof links, deduplicating any and honoring the LastWriterWins option.
func (*RemoteProofLinks) AddProofsToSet ¶
func (r *RemoteProofLinks) AddProofsToSet(existing *ProofSet, okStates []keybase1.ProofState)
AddProofsToSet adds the active proofs to an existing ProofSet, if they're one of the given OkStates. If okStates is nil, then we check only against keybase1.ProofState_OK.
func (*RemoteProofLinks) ForService ¶
func (r *RemoteProofLinks) ForService(st ServiceType) []RemoteProofChainLink
ForService returns all the active proof links for a service.
func (*RemoteProofLinks) Insert ¶
func (r *RemoteProofLinks) Insert(link RemoteProofChainLink, err ProofError)
Insert adds a link to the collection of proof links.
func (*RemoteProofLinks) TrackSet ¶
func (r *RemoteProofLinks) TrackSet() *TrackSet
TrackSet creates a new TrackSet with all the active proofs.
func (*RemoteProofLinks) TrackingStatement ¶
func (r *RemoteProofLinks) TrackingStatement() *jsonw.Wrapper
TrackingStatement generates the remote proofs portions of the tracking statement from the active proofs.
type RemoteStream ¶
type RemoteStream struct { Stream keybase1.Stream Cli *keybase1.StreamUiClient SessionID int }
func (RemoteStream) Close ¶
func (ewc RemoteStream) Close() (err error)
func (RemoteStream) Reset ¶ added in v1.0.19
func (ewc RemoteStream) Reset() (err error)
type RemoteStreamBuffered ¶
type RemoteStreamBuffered struct {
// contains filtered or unexported fields
}
func NewRemoteStreamBuffered ¶
func NewRemoteStreamBuffered(s keybase1.Stream, c *keybase1.StreamUiClient, sessionID int) *RemoteStreamBuffered
func (*RemoteStreamBuffered) Close ¶
func (x *RemoteStreamBuffered) Close() error
func (*RemoteStreamBuffered) Reset ¶ added in v1.0.19
func (x *RemoteStreamBuffered) Reset() (err error)
type RepoAlreadyExistsError ¶ added in v1.0.33
RepoAlreadyCreatedError is returned when trying to create a repo that already exists.
func (RepoAlreadyExistsError) Error ¶ added in v1.0.33
func (e RepoAlreadyExistsError) Error() string
func (RepoAlreadyExistsError) ToStatus ¶ added in v1.0.33
func (e RepoAlreadyExistsError) ToStatus() (s keybase1.Status)
type RepoDoesntExistError ¶ added in v1.0.34
type RepoDoesntExistError struct {
Name string
}
RepoDoesntExistError is returned when trying to delete a repo that doesn't exist.
func (RepoDoesntExistError) Error ¶ added in v1.0.34
func (e RepoDoesntExistError) Error() string
func (RepoDoesntExistError) ToStatus ¶ added in v1.0.34
func (e RepoDoesntExistError) ToStatus() (s keybase1.Status)
type ReportingTimer ¶
type ReportingTimer interface {
Report(prefix string)
}
ReportingTimer is an interface shared between ReportingTimerReal and ReportingTimerDummy, to allow for convenient disabling of timer features.
type ReportingTimerDummy ¶
type ReportingTimerDummy struct{}
ReportingTimerDummy fulfills the ReportingTimer interface but doesn't do anything when done.
func (ReportingTimerDummy) Report ¶
func (r ReportingTimerDummy) Report(prefix string)
Report is a noop.
type ReportingTimerReal ¶
type ReportingTimerReal struct { SimpleTimer Contextified }
ReportingTimerReal is a SimpleTimer that reports after the timing measurement is done.
func NewReportingTimerReal ¶
func NewReportingTimerReal(ctx Contextified) *ReportingTimerReal
NewReportingTimerReal returns an initialized reporting timer that actually reports timing information.
func (*ReportingTimerReal) Report ¶
func (r *ReportingTimerReal) Report(prefix string)
Report stops and resets the timer, then logs to Info what the duration was.
type Requester ¶
type Requester interface {
// contains filtered or unexported methods
}
Internal and External APIs both implement these methods, allowing us to share the request-making code below in doRequest
type ResolutionError ¶
type ResolutionError struct { Input string Msg string Kind ResolutionErrorKind }
func (ResolutionError) Error ¶
func (e ResolutionError) Error() string
func (ResolutionError) ToStatus ¶
func (e ResolutionError) ToStatus() keybase1.Status
type ResolutionErrorKind ¶ added in v1.0.27
type ResolutionErrorKind int
const ( ResolutionErrorGeneral ResolutionErrorKind = iota ResolutionErrorNotFound ResolutionErrorAmbiguous )
type ResolveCacheStats ¶ added in v1.0.18
type ResolveCacheStats struct {
// contains filtered or unexported fields
}
func (ResolveCacheStats) Eq ¶ added in v1.0.18
func (s ResolveCacheStats) Eq(m, t, mt, et, h int) bool
func (ResolveCacheStats) EqWithDiskHits ¶ added in v1.0.19
func (s ResolveCacheStats) EqWithDiskHits(m, t, mt, et, h, dh int) bool
type ResolveResult ¶
type ResolveResult struct {
// contains filtered or unexported fields
}
func (ResolveResult) FailOnDeleted ¶ added in v1.0.42
func (res ResolveResult) FailOnDeleted() ResolveResult
func (*ResolveResult) GetBody ¶
func (res *ResolveResult) GetBody() *jsonw.Wrapper
func (*ResolveResult) GetDeleted ¶ added in v1.0.42
func (res *ResolveResult) GetDeleted() bool
func (*ResolveResult) GetError ¶
func (res *ResolveResult) GetError() error
func (*ResolveResult) GetNormalizedQueriedUsername ¶
func (res *ResolveResult) GetNormalizedQueriedUsername() NormalizedUsername
func (*ResolveResult) GetNormalizedUsername ¶
func (res *ResolveResult) GetNormalizedUsername() NormalizedUsername
func (*ResolveResult) GetTeamID ¶ added in v1.0.27
func (res *ResolveResult) GetTeamID() keybase1.TeamID
func (*ResolveResult) GetTeamName ¶ added in v1.0.27
func (res *ResolveResult) GetTeamName() keybase1.TeamName
func (*ResolveResult) GetUID ¶
func (res *ResolveResult) GetUID() keybase1.UID
func (*ResolveResult) GetUsername ¶
func (res *ResolveResult) GetUsername() string
func (ResolveResult) HasPrimaryKey ¶ added in v1.0.27
func (res ResolveResult) HasPrimaryKey() bool
func (*ResolveResult) SetUIDForTesting ¶
func (res *ResolveResult) SetUIDForTesting(u keybase1.UID)
func (ResolveResult) String ¶ added in v1.0.19
func (res ResolveResult) String() string
func (*ResolveResult) User ¶ added in v1.0.27
func (res *ResolveResult) User() keybase1.User
func (*ResolveResult) UserOrTeam ¶ added in v1.0.27
func (res *ResolveResult) UserOrTeam() keybase1.UserOrTeamLite
func (*ResolveResult) WasKBAssertion ¶ added in v1.0.17
func (res *ResolveResult) WasKBAssertion() bool
func (*ResolveResult) WasTeamIDAssertion ¶ added in v1.0.27
func (res *ResolveResult) WasTeamIDAssertion() bool
type ResolvedAssertion ¶ added in v1.0.31
type ResolvedAssertion struct { UID keybase1.UID Assertion AssertionExpression ResolveResult ResolveResult }
type Resolver ¶
type Resolver interface { EnableCaching(m MetaContext) Shutdown(m MetaContext) ResolveFullExpression(m MetaContext, input string) (res ResolveResult) ResolveFullExpressionNeedUsername(m MetaContext, input string) (res ResolveResult) ResolveFullExpressionWithBody(m MetaContext, input string) (res ResolveResult) ResolveUser(m MetaContext, assertion string) (u keybase1.User, res ResolveResult, err error) ResolveWithBody(m MetaContext, input string) ResolveResult Resolve(m MetaContext, input string) ResolveResult PurgeResolveCache(m MetaContext, input string) error }
Resolver resolves human-readable usernames (joe) and user asssertions (joe+joe@github) into UIDs. It is based on sever-trust. All results are unverified. So you should check its answer if used in a security-sensitive setting. (See engine.ResolveAndCheck)
type ResolverImpl ¶
type ResolverImpl struct { Stats ResolveCacheStats // contains filtered or unexported fields }
func NewResolverImpl ¶
func NewResolverImpl() *ResolverImpl
func (*ResolverImpl) EnableCaching ¶
func (r *ResolverImpl) EnableCaching(m MetaContext)
func (*ResolverImpl) PurgeResolveCache ¶
func (r *ResolverImpl) PurgeResolveCache(m MetaContext, input string) (err error)
func (*ResolverImpl) Resolve ¶
func (r *ResolverImpl) Resolve(m MetaContext, input string) ResolveResult
func (*ResolverImpl) ResolveFullExpression ¶
func (r *ResolverImpl) ResolveFullExpression(m MetaContext, input string) (res ResolveResult)
func (*ResolverImpl) ResolveFullExpressionNeedUsername ¶
func (r *ResolverImpl) ResolveFullExpressionNeedUsername(m MetaContext, input string) (res ResolveResult)
func (*ResolverImpl) ResolveFullExpressionWithBody ¶
func (r *ResolverImpl) ResolveFullExpressionWithBody(m MetaContext, input string) (res ResolveResult)
func (*ResolverImpl) ResolveUser ¶
func (r *ResolverImpl) ResolveUser(m MetaContext, assertion string) (u keybase1.User, res ResolveResult, err error)
func (*ResolverImpl) ResolveWithBody ¶
func (r *ResolverImpl) ResolveWithBody(m MetaContext, input string) ResolveResult
func (*ResolverImpl) Shutdown ¶
func (r *ResolverImpl) Shutdown(m MetaContext)
type RetryExhaustedError ¶
type RetryExhaustedError struct { }
func (RetryExhaustedError) Error ¶
func (e RetryExhaustedError) Error() string
type ReverseSigError ¶
type ReverseSigError struct {
// contains filtered or unexported fields
}
func NewReverseSigError ¶ added in v1.0.27
func NewReverseSigError(msgf string, a ...interface{}) ReverseSigError
func (ReverseSigError) Error ¶
func (r ReverseSigError) Error() string
type RevokeChainLink ¶
type RevokeChainLink struct { GenericChainLink // contains filtered or unexported fields }
func ParseRevokeChainLink ¶
func ParseRevokeChainLink(b GenericChainLink) (ret *RevokeChainLink, err error)
func (*RevokeChainLink) GetDevice ¶
func (r *RevokeChainLink) GetDevice() *Device
func (*RevokeChainLink) IsRevocationIsh ¶
func (r *RevokeChainLink) IsRevocationIsh() bool
func (*RevokeChainLink) ToDisplayString ¶
func (r *RevokeChainLink) ToDisplayString() string
func (*RevokeChainLink) Type ¶
func (r *RevokeChainLink) Type() string
type RevokeCurrentDeviceError ¶ added in v1.0.27
type RevokeCurrentDeviceError struct{}
func (RevokeCurrentDeviceError) Error ¶ added in v1.0.27
func (e RevokeCurrentDeviceError) Error() string
func (RevokeCurrentDeviceError) ToStatus ¶ added in v1.0.27
func (e RevokeCurrentDeviceError) ToStatus() keybase1.Status
type RevokeLastDeviceError ¶ added in v1.0.27
type RevokeLastDeviceError struct{}
func (RevokeLastDeviceError) Error ¶ added in v1.0.27
func (e RevokeLastDeviceError) Error() string
func (RevokeLastDeviceError) ToStatus ¶ added in v1.0.27
func (e RevokeLastDeviceError) ToStatus() keybase1.Status
type RevokeLastDevicePGPError ¶ added in v1.0.34
type RevokeLastDevicePGPError struct{}
users with PGP keys who try to revoke last device get this:
func (RevokeLastDevicePGPError) Error ¶ added in v1.0.34
func (e RevokeLastDevicePGPError) Error() string
func (RevokeLastDevicePGPError) ToStatus ¶ added in v1.0.34
func (e RevokeLastDevicePGPError) ToStatus() keybase1.Status
type RevokedKey ¶
type RevokedKey struct { Key GenericKey RevokedAt *KeybaseTime RevokedBy keybase1.KID }
type RunGpg2Arg ¶
type RunGpg2Res ¶
type RunGpg2Res struct { Stdin io.WriteCloser Stdout io.ReadCloser Stderr io.ReadCloser Wait func() error Err error }
type RunMode ¶
type RunMode string
func StringToRunMode ¶
StringToRunMode turns a string into a run-mode
type RunModeGetter ¶
type RunModeGetter func() RunMode
type SKB ¶
type SKB struct { Priv SKBPriv `codec:"priv"` Pub []byte `codec:"pub"` Type AlgoType `codec:"type,omitempty"` Contextified sync.Mutex // currently only for uid // contains filtered or unexported fields }
func LockedLocalSecretKey ¶
func LockedLocalSecretKey(m MetaContext, ska SecretKeyArg) (*SKB, error)
LockedLocalSecretKey looks in the local keyring to find a key for the given user. Returns non-nil if one was found, and nil otherwise.
func NewSKBWithGlobalContext ¶ added in v1.0.33
func NewSKBWithGlobalContext(g *GlobalContext) *SKB
func ToServerSKB ¶ added in v1.0.18
func ToServerSKB(gc *GlobalContext, key GenericKey, tsec Triplesec, gen PassphraseGeneration) (ret *SKB, err error)
func WriteLksSKBToKeyring ¶
func WriteLksSKBToKeyring(m MetaContext, k GenericKey, lks *LKSec) (skb *SKB, err error)
func (*SKB) ArmoredEncode ¶
func (*SKB) GetPubKey ¶
func (s *SKB) GetPubKey() (key GenericKey, err error)
func (*SKB) PromptAndUnlock ¶
func (s *SKB) PromptAndUnlock(m MetaContext, arg SecretKeyPromptArg, secretStore SecretStore, me *User) (ret GenericKey, err error)
func (*SKB) RawUnlockedKey ¶
func (*SKB) ReadKey ¶
func (s *SKB) ReadKey() (g GenericKey, err error)
func (*SKB) ToPacket ¶
func (s *SKB) ToPacket() (ret *KeybasePacket, err error)
func (*SKB) UnlockNoPrompt ¶
func (s *SKB) UnlockNoPrompt(m MetaContext, secretStore SecretStore) (ret GenericKey, err error)
func (*SKB) UnlockSecretKey ¶
func (s *SKB) UnlockSecretKey(m MetaContext, passphrase string, tsec Triplesec, pps *PassphraseStream, secretStorer SecretStorer) (key GenericKey, err error)
func (*SKB) UnlockWithStoredSecret ¶
func (s *SKB) UnlockWithStoredSecret(m MetaContext, secretRetriever SecretRetriever) (ret GenericKey, err error)
func (*SKB) VerboseDescription ¶
type SKBKeyringFile ¶
type SKBKeyringFile struct { Contextified sync.Mutex Blocks []*SKB // contains filtered or unexported fields }
func LoadSKBKeyring ¶
func LoadSKBKeyring(un NormalizedUsername, g *GlobalContext) (*SKBKeyringFile, error)
func LoadSKBKeyringFromMetaContext ¶
func LoadSKBKeyringFromMetaContext(m MetaContext) (*SKBKeyringFile, error)
func NewSKBKeyringFile ¶
func NewSKBKeyringFile(g *GlobalContext, un NormalizedUsername) *SKBKeyringFile
func (*SKBKeyringFile) AllPGPBlocks ¶ added in v1.0.18
func (k *SKBKeyringFile) AllPGPBlocks() ([]*SKB, error)
func (*SKBKeyringFile) Bug3964Repair ¶ added in v1.0.18
func (k *SKBKeyringFile) Bug3964Repair(m MetaContext, lks *LKSec, dkm DeviceKeyMap) (ret *SKBKeyringFile, serverHalfSet *LKSecServerHalfSet, err error)
func (*SKBKeyringFile) FindSecretKey ¶
func (k *SKBKeyringFile) FindSecretKey(kids []keybase1.KID) (ret *SKB)
FindSecretKey will, given a list of KIDs, find the first one in the list that has a corresponding secret key in the keyring file.
func (*SKBKeyringFile) GetFilename ¶
func (k *SKBKeyringFile) GetFilename() string
GetFilename is only called from within Save(), so it's called with a lock. Needs to be called GetFilename() to meet the interface required by SafeSaveToFile
func (*SKBKeyringFile) HasPGPKeys ¶
func (k *SKBKeyringFile) HasPGPKeys() bool
func (*SKBKeyringFile) Index ¶
func (k *SKBKeyringFile) Index() (err error)
func (*SKBKeyringFile) IsForUsername ¶ added in v1.0.19
func (k *SKBKeyringFile) IsForUsername(un NormalizedUsername) bool
func (*SKBKeyringFile) Load ¶
func (k *SKBKeyringFile) Load() (err error)
func (*SKBKeyringFile) LoadAndIndex ¶
func (k *SKBKeyringFile) LoadAndIndex() error
func (*SKBKeyringFile) LookupByFingerprint ¶
func (k *SKBKeyringFile) LookupByFingerprint(fp PGPFingerprint) *SKB
func (*SKBKeyringFile) LookupByKid ¶
func (k *SKBKeyringFile) LookupByKid(kid keybase1.KID) *SKB
func (*SKBKeyringFile) MTime ¶ added in v1.0.18
func (k *SKBKeyringFile) MTime() (mtime time.Time, err error)
func (*SKBKeyringFile) MarkDirty ¶ added in v1.0.18
func (k *SKBKeyringFile) MarkDirty()
func (*SKBKeyringFile) Push ¶
func (k *SKBKeyringFile) Push(skb *SKB) error
func (*SKBKeyringFile) PushAndSave ¶
func (k *SKBKeyringFile) PushAndSave(skb *SKB) error
func (*SKBKeyringFile) RemoveAllPGPBlocks ¶ added in v1.0.18
func (k *SKBKeyringFile) RemoveAllPGPBlocks() error
func (*SKBKeyringFile) Save ¶
func (k *SKBKeyringFile) Save() error
func (*SKBKeyringFile) SearchWithComputedKeyFamily ¶
func (k *SKBKeyringFile) SearchWithComputedKeyFamily(ckf *ComputedKeyFamily, ska SecretKeyArg) []*SKB
func (*SKBKeyringFile) Username ¶ added in v1.0.19
func (k *SKBKeyringFile) Username() NormalizedUsername
type SafeWriteLogger ¶ added in v1.0.18
type SafeWriter ¶
type SaltpackEncryptArg ¶
type SaltpackEncryptArg struct { Source io.Reader Sink io.WriteCloser Receivers []NaclDHKeyPublic Sender NaclDHKeyPair SenderSigning NaclSigningKeyPair Binary bool EncryptionOnlyMode bool SymmetricReceivers []saltpack.ReceiverSymmetricKey SaltpackVersion saltpack.Version VisibleRecipientsForTesting bool }
type SaltpackRecipientKeyfinderArg ¶
type SaltpackRecipientKeyfinderArg struct { Recipients []string // usernames or user assertions TeamRecipients []string // team names NoSelfEncrypt bool UseEntityKeys bool // Both per user and per team keys (and implicit teams for non existing users) UsePaperKeys bool UseDeviceKeys bool // Does not include Paper Keys UseRepudiableAuth bool // This is needed as team keys (implicit or not) are not compatible with repudiable authentication, so we can error out. }
type SaltpackRecipientKeyfinderEngineInterface ¶
type SaltpackRecipientKeyfinderEngineInterface interface { Engine2 GetPublicKIDs() []keybase1.KID GetSymmetricKeys() []SaltpackReceiverSymmetricKey }
type SaltpackUI ¶
type SaltpackVerifyContext ¶ added in v1.0.16
SaltpackVerifyContext is context for engine calls
type SecretKeyArg ¶
type SecretKeyArg struct { // Whose keys to use. Must be non-nil. Me *User // The allowed key types. KeyType SecretKeyType // For non-device keys, a string that the key has to match. If // empty, any valid key is allowed. KeyQuery string ExactMatch bool // if set, full equality required }
type SecretKeyPromptArg ¶
type SecretKeyPromptArg struct { Ska SecretKeyArg SecretUI SecretUI Reason string UseCancelCache bool /* if true, when user cancels prompt, don't prompt again for 5m */ }
type SecretKeyType ¶
type SecretKeyType int
const ( // The current device signing key. DeviceSigningKeyType SecretKeyType = iota // The current device encryption key. DeviceEncryptionKeyType // A PGP key (including the synced PGP key, if there is one). PGPKeyType )
func (SecretKeyType) String ¶
func (t SecretKeyType) String() string
type SecretRetriever ¶
type SecretRetriever interface {
RetrieveSecret(m MetaContext) (LKSecFullSecret, error)
}
type SecretStore ¶
type SecretStore interface { SecretRetriever SecretStorer }
SecretStore stores/retreives the keyring-resident secrets for a given user.
func NewSecretStore ¶
func NewSecretStore(g *GlobalContext, username NormalizedUsername) SecretStore
NewSecretStore returns a SecretStore interface that is only used for a short period of time (i.e. one function block). Multiple calls to RetrieveSecret() will only call the underlying store.RetrieveSecret once.
type SecretStoreAll ¶
type SecretStoreAll interface { RetrieveSecret(m MetaContext, username NormalizedUsername) (LKSecFullSecret, error) StoreSecret(m MetaContext, username NormalizedUsername, secret LKSecFullSecret) error ClearSecret(m MetaContext, username NormalizedUsername) error GetUsersWithStoredSecrets(m MetaContext) ([]string, error) }
SecretStoreall stores/retreives the keyring-resider secrets for **all** users on this system.
func NewSecretStoreAll ¶
func NewSecretStoreAll(m MetaContext) SecretStoreAll
type SecretStoreError ¶
type SecretStoreError struct {
Msg string
}
func (SecretStoreError) Error ¶
func (e SecretStoreError) Error() string
type SecretStoreFile ¶ added in v1.0.16
type SecretStoreFile struct {
// contains filtered or unexported fields
}
func NewSecretStoreFile ¶ added in v1.0.16
func NewSecretStoreFile(dir string) *SecretStoreFile
func (*SecretStoreFile) ClearSecret ¶ added in v1.0.16
func (s *SecretStoreFile) ClearSecret(m MetaContext, username NormalizedUsername) error
func (*SecretStoreFile) GetUsersWithStoredSecrets ¶ added in v1.0.16
func (s *SecretStoreFile) GetUsersWithStoredSecrets(m MetaContext) ([]string, error)
func (*SecretStoreFile) RetrieveSecret ¶ added in v1.0.16
func (s *SecretStoreFile) RetrieveSecret(m MetaContext, username NormalizedUsername) (LKSecFullSecret, error)
func (*SecretStoreFile) StoreSecret ¶ added in v1.0.16
func (s *SecretStoreFile) StoreSecret(m MetaContext, username NormalizedUsername, secret LKSecFullSecret) error
type SecretStoreImp ¶
SecretStoreImp is a specialization of a SecretStoreAll for just one username. You specify that username at the time on construction and then it doesn't change.
func (*SecretStoreImp) RetrieveSecret ¶
func (s *SecretStoreImp) RetrieveSecret(m MetaContext) (LKSecFullSecret, error)
func (*SecretStoreImp) StoreSecret ¶
func (s *SecretStoreImp) StoreSecret(m MetaContext, secret LKSecFullSecret) error
type SecretStoreLocked ¶ added in v1.0.18
SecretStoreLocked protects a SecretStoreAll with a mutex. It wraps two different SecretStoreAlls: one in memory and one in disk. In all cases, we always have a memory backing. If the OS and options provide one, we can additionally have a disk-backed secret store. It's a write-through cache, so on RetrieveSecret, the memory store will be checked first, and then the disk store.
func NewSecretStoreLocked ¶ added in v1.0.18
func NewSecretStoreLocked(m MetaContext) *SecretStoreLocked
func (*SecretStoreLocked) ClearSecret ¶ added in v1.0.18
func (s *SecretStoreLocked) ClearSecret(m MetaContext, username NormalizedUsername) error
func (*SecretStoreLocked) GetUsersWithStoredSecrets ¶ added in v1.0.18
func (s *SecretStoreLocked) GetUsersWithStoredSecrets(m MetaContext) ([]string, error)
func (*SecretStoreLocked) RetrieveSecret ¶ added in v1.0.18
func (s *SecretStoreLocked) RetrieveSecret(m MetaContext, username NormalizedUsername) (LKSecFullSecret, error)
func (*SecretStoreLocked) StoreSecret ¶ added in v1.0.18
func (s *SecretStoreLocked) StoreSecret(m MetaContext, username NormalizedUsername, secret LKSecFullSecret) error
type SecretStoreMem ¶ added in v1.0.43
type SecretStoreMem struct {
// contains filtered or unexported fields
}
func NewSecretStoreMem ¶ added in v1.0.43
func NewSecretStoreMem() *SecretStoreMem
func (*SecretStoreMem) ClearSecret ¶ added in v1.0.43
func (s *SecretStoreMem) ClearSecret(m MetaContext, username NormalizedUsername) error
func (*SecretStoreMem) GetUsersWithStoredSecrets ¶ added in v1.0.43
func (s *SecretStoreMem) GetUsersWithStoredSecrets(m MetaContext) ([]string, error)
func (*SecretStoreMem) RetrieveSecret ¶ added in v1.0.43
func (s *SecretStoreMem) RetrieveSecret(m MetaContext, username NormalizedUsername) (LKSecFullSecret, error)
func (*SecretStoreMem) StoreSecret ¶ added in v1.0.43
func (s *SecretStoreMem) StoreSecret(m MetaContext, username NormalizedUsername, secret LKSecFullSecret) error
type SecretStorer ¶
type SecretStorer interface {
StoreSecret(m MetaContext, secret LKSecFullSecret) error
}
type SecretSyncer ¶
type SecretSyncer struct { sync.Mutex Contextified // contains filtered or unexported fields }
func NewSecretSyncer ¶
func NewSecretSyncer(g *GlobalContext) *SecretSyncer
func (*SecretSyncer) ActiveDevices ¶
func (ss *SecretSyncer) ActiveDevices(includeTypesSet DeviceTypeSet) (DeviceKeyMap, error)
ActiveDevices returns all the active desktop and mobile devices.
func (*SecretSyncer) AllActiveKeys ¶
func (ss *SecretSyncer) AllActiveKeys(ckf *ComputedKeyFamily) []*SKB
AllActiveKeys returns all the active synced PGP keys.
func (*SecretSyncer) AllDevices ¶ added in v1.0.18
func (ss *SecretSyncer) AllDevices() DeviceKeyMap
func (*SecretSyncer) Clear ¶
func (ss *SecretSyncer) Clear() error
func (*SecretSyncer) Devices ¶
func (ss *SecretSyncer) Devices() (DeviceKeyMap, error)
func (*SecretSyncer) DumpPrivateKeys ¶
func (ss *SecretSyncer) DumpPrivateKeys()
func (*SecretSyncer) FindActiveKey ¶
func (ss *SecretSyncer) FindActiveKey(ckf *ComputedKeyFamily) (ret *SKB, err error)
FindActiveKey examines the synced keys, looking for one that's currently active. Returns ret=nil if none was found.
func (*SecretSyncer) FindDevice ¶
func (ss *SecretSyncer) FindDevice(id keybase1.DeviceID) (DeviceKey, error)
func (*SecretSyncer) FindPrivateKey ¶
func (ss *SecretSyncer) FindPrivateKey(kid string) (ServerPrivateKey, bool)
func (*SecretSyncer) HasActiveDevice ¶
func (ss *SecretSyncer) HasActiveDevice(includeTypesSet DeviceTypeSet) (bool, error)
HasActiveDevice returns true if there is an active desktop or mobile device available.
func (*SecretSyncer) HasDevices ¶
func (ss *SecretSyncer) HasDevices() bool
func (*SecretSyncer) IsDeviceNameTaken ¶
func (ss *SecretSyncer) IsDeviceNameTaken(name string, includeTypesSet DeviceTypeSet) bool
IsDeviceNameTaken returns true if a desktop or mobile device is using a name already.
type SecretUI ¶
type SecretUI interface {
GetPassphrase(pinentry keybase1.GUIEntryArg, terminal *keybase1.SecretEntryArg) (keybase1.GetPassphraseRes, error)
}
type SelfDestructingDeviceWithKeys ¶
func NewSelfDestructingDeviceWithKeys ¶
func NewSelfDestructingDeviceWithKeys(m MetaContext, k *DeviceWithKeys, d time.Duration) *SelfDestructingDeviceWithKeys
func (*SelfDestructingDeviceWithKeys) DeviceWithKeys ¶
func (s *SelfDestructingDeviceWithKeys) DeviceWithKeys() *DeviceWithKeys
func (*SelfDestructingDeviceWithKeys) SetTestPostCleanHook ¶
func (s *SelfDestructingDeviceWithKeys) SetTestPostCleanHook(f func())
type SelfNotFoundError ¶
type SelfNotFoundError struct {
// contains filtered or unexported fields
}
func (SelfNotFoundError) Error ¶
func (e SelfNotFoundError) Error() string
func (SelfNotFoundError) ToStatus ¶
func (e SelfNotFoundError) ToStatus() keybase1.Status
type SelfSigChainLink ¶
type SelfSigChainLink struct { GenericChainLink // contains filtered or unexported fields }
func ParseSelfSigChainLink ¶
func ParseSelfSigChainLink(base GenericChainLink) (ret *SelfSigChainLink, err error)
func (*SelfSigChainLink) CheckDataJSON ¶
func (s *SelfSigChainLink) CheckDataJSON() *jsonw.Wrapper
func (*SelfSigChainLink) ComputeTrackDiff ¶
func (s *SelfSigChainLink) ComputeTrackDiff(tl *TrackLookup) TrackDiff
func (*SelfSigChainLink) DisplayCheck ¶
func (s *SelfSigChainLink) DisplayCheck(ui IdentifyUI, lcr LinkCheckResult) error
func (*SelfSigChainLink) GetDevice ¶
func (s *SelfSigChainLink) GetDevice() *Device
func (*SelfSigChainLink) GetHostname ¶
func (s *SelfSigChainLink) GetHostname() string
func (*SelfSigChainLink) GetPGPFullHash ¶
func (s *SelfSigChainLink) GetPGPFullHash() string
func (*SelfSigChainLink) GetProofType ¶
func (s *SelfSigChainLink) GetProofType() keybase1.ProofType
func (*SelfSigChainLink) GetProtocol ¶
func (s *SelfSigChainLink) GetProtocol() string
func (*SelfSigChainLink) GetRemoteUsername ¶
func (s *SelfSigChainLink) GetRemoteUsername() string
func (*SelfSigChainLink) LastWriterWins ¶
func (s *SelfSigChainLink) LastWriterWins() bool
func (*SelfSigChainLink) ParseDevice ¶
func (s *SelfSigChainLink) ParseDevice() (err error)
func (*SelfSigChainLink) ProofText ¶
func (s *SelfSigChainLink) ProofText() string
func (*SelfSigChainLink) TableKey ¶
func (s *SelfSigChainLink) TableKey() string
func (*SelfSigChainLink) ToDisplayString ¶
func (s *SelfSigChainLink) ToDisplayString() string
func (*SelfSigChainLink) ToIDString ¶
func (s *SelfSigChainLink) ToIDString() string
func (*SelfSigChainLink) ToKeyValuePair ¶
func (s *SelfSigChainLink) ToKeyValuePair() (string, string)
func (*SelfSigChainLink) ToTrackingStatement ¶
func (s *SelfSigChainLink) ToTrackingStatement(keybase1.ProofState) (*jsonw.Wrapper, error)
func (*SelfSigChainLink) Type ¶
func (s *SelfSigChainLink) Type() string
type SelfTrackError ¶
type SelfTrackError struct{}
func (SelfTrackError) Error ¶
func (e SelfTrackError) Error() string
type ServerChainError ¶
type ServerChainError struct {
// contains filtered or unexported fields
}
func NewServerChainError ¶
func NewServerChainError(d string, a ...interface{}) ServerChainError
func (ServerChainError) Error ¶
func (e ServerChainError) Error() string
type ServerPrivateKey ¶
type ServerPrivateKey struct { Kid string `json:"kid"` KeyType KeyType `json:"key_type"` Bundle string `json:"bundle"` Mtime int `json:"mtime"` Ctime int `json:"ctime"` KeyBits int `json:"key_bits"` KeyAlgo int `json:"key_algo"` }
func (*ServerPrivateKey) FindActiveKey ¶
func (k *ServerPrivateKey) FindActiveKey(g *GlobalContext, ckf *ComputedKeyFamily) (ret *SKB, err error)
func (ServerPrivateKey) ToSKB ¶
func (k ServerPrivateKey) ToSKB(gc *GlobalContext) (*SKB, error)
type ServerPrivateKeyMap ¶
type ServerPrivateKeyMap map[string]ServerPrivateKey
type ServerPrivateKeys ¶
type ServerPrivateKeys struct { Status APIStatus `json:"status"` Version int `json:"version"` Mtime *int `json:"mtime"` PrivateKeys ServerPrivateKeyMap `json:"private_keys"` // note these are only PGP keys Devices DeviceKeyMap `json:"devices"` }
type ServiceBlock ¶
type ServiceBlock struct {
// contains filtered or unexported fields
}
Can be used to either parse a proof `service` JSON block, or a `remote_key_proof` JSON block in a tracking statement.
func ParseServiceBlock ¶
func (ServiceBlock) GetProofState ¶
func (sb ServiceBlock) GetProofState() keybase1.ProofState
func (ServiceBlock) GetProofType ¶
func (sb ServiceBlock) GetProofType() keybase1.ProofType
func (ServiceBlock) IsSocial ¶
func (sb ServiceBlock) IsSocial() bool
func (ServiceBlock) LastWriterWins ¶
func (sb ServiceBlock) LastWriterWins() bool
func (ServiceBlock) ToIDString ¶
func (sb ServiceBlock) ToIDString() string
func (ServiceBlock) ToKeyValuePair ¶
func (sb ServiceBlock) ToKeyValuePair() (string, string)
type ServiceInfo ¶
type ServiceInfo struct { Version string `json:"version,omitempty"` Label string `json:"label,omitempty"` Pid int `json:"pid,omitempty"` }
ServiceInfo describes runtime info for a service. This is primarily used to detect service updates.
func KeybaseServiceInfo ¶
func KeybaseServiceInfo(g *GlobalContext) ServiceInfo
KeybaseServiceInfo is runtime info for the Keybase service.
func LoadServiceInfo ¶ added in v1.0.34
func LoadServiceInfo(path string) (*ServiceInfo, error)
func NewServiceInfo ¶
func NewServiceInfo(version string, prerelease string, label string, pid int) ServiceInfo
NewServiceInfo generates service info for other services (like KBFS).
func WaitForServiceInfoFile ¶
func WaitForServiceInfoFile(path string, label string, pid string, timeout time.Duration, log serviceLog) (*ServiceInfo, error)
WaitForServiceInfoFile tries to wait for a service info file, which should be written on successful service startup.
type ServiceType ¶
type ServiceType interface { AllStringKeys() []string // NormalizeUsername normalizes the given username, assuming // that it's free of any leading strings like '@' or 'dns://'. NormalizeUsername(string) (string, error) // NormalizeRemote normalizes the given remote username, which // is usually but not always the same as the username. It also // allows leaders like '@' and 'dns://'. // // In the case of Facebook, this version does the standard downcasing, but // leaves the dots in (that NormalizeUsername above would strip out). This // lets us keep the dots in the proof text, and display them on your // profile page, even though we ignore them for proof checking. NormalizeRemoteName(m MetaContext, name string) (string, error) GetPrompt() string LastWriterWins() bool PreProofCheck(m MetaContext, remotename string) (*Markup, error) PreProofWarning(remotename string) *Markup ToServiceJSON(remotename string) *jsonw.Wrapper PostInstructions(remotename string) *Markup DisplayName(remotename string) string RecheckProofPosting(tryNumber int, status keybase1.ProofStatus, remotename string) (warning *Markup, err error) GetProofType() string GetTypeName() string CheckProofText(text string, id keybase1.SigID, sig string) error FormatProofText(MetaContext, *PostProofRes) (string, error) GetAPIArgKey() string IsDevelOnly() bool MakeProofChecker(l RemoteProofChainLink) ProofChecker }
ServiceType is an interface for describing an external proof service, like 'Twitter' or 'GitHub', etc.
type Session ¶
type Session struct { Contextified // contains filtered or unexported fields }
func NewSessionThin ¶
func NewSessionThin(uid keybase1.UID, username NormalizedUsername, token string) *Session
NewSessionThin creates a minimal (thin) session of just the uid and username. Clients of the daemon that use the session protocol need this.
func (*Session) GetDeviceID ¶ added in v1.0.21
func (*Session) GetUsername ¶
func (s *Session) GetUsername() *NormalizedUsername
func (*Session) HasSessionToken ¶
func (*Session) Invalidate ¶
func (s *Session) Invalidate()
Invalidate marks the session as invalid and posts a logout notification.
func (*Session) IsLoggedIn ¶
func (*Session) SetDeviceProvisioned ¶
func (*Session) SetLoggedIn ¶
func (*Session) SetUsername ¶
func (s *Session) SetUsername(username NormalizedUsername)
type ShutdownHook ¶
type ShutdownHook func() error
type SibkeyAlreadyExistsError ¶
type SibkeyAlreadyExistsError struct{}
func (SibkeyAlreadyExistsError) Error ¶
func (e SibkeyAlreadyExistsError) Error() string
func (SibkeyAlreadyExistsError) ToStatus ¶
func (e SibkeyAlreadyExistsError) ToStatus() keybase1.Status
type SibkeyChainLink ¶
type SibkeyChainLink struct { GenericChainLink // contains filtered or unexported fields }
func ParseSibkeyChainLink ¶
func ParseSibkeyChainLink(b GenericChainLink) (ret *SibkeyChainLink, err error)
func (*SibkeyChainLink) GetDelegatedKid ¶
func (s *SibkeyChainLink) GetDelegatedKid() keybase1.KID
func (*SibkeyChainLink) GetDevice ¶
func (s *SibkeyChainLink) GetDevice() *Device
func (*SibkeyChainLink) GetPGPFullHash ¶
func (s *SibkeyChainLink) GetPGPFullHash() string
func (*SibkeyChainLink) GetRole ¶
func (s *SibkeyChainLink) GetRole() KeyRole
func (*SibkeyChainLink) ToDisplayString ¶
func (s *SibkeyChainLink) ToDisplayString() string
func (*SibkeyChainLink) Type ¶
func (s *SibkeyChainLink) Type() string
func (*SibkeyChainLink) VerifyReverseSig ¶
func (s *SibkeyChainLink) VerifyReverseSig(ckf ComputedKeyFamily) (err error)
VerifyReverseSig checks a SibkeyChainLink's reverse signature using the ComputedKeyFamily provided.
type SigChain ¶
type SigChain struct { Contextified // contains filtered or unexported fields }
func (*SigChain) Bump ¶
func (sc *SigChain) Bump(mt MerkleTriple)
func (*SigChain) CheckFreshness ¶
func (sc *SigChain) CheckFreshness(srv *MerkleTriple) (current bool, err error)
func (*SigChain) EldestSeqno ¶ added in v1.0.27
func (SigChain) GetComputedKeyInfos ¶
func (sc SigChain) GetComputedKeyInfos() (cki *ComputedKeyInfos)
func (SigChain) GetComputedKeyInfosWithVersionBust ¶ added in v1.0.27
func (sc SigChain) GetComputedKeyInfosWithVersionBust() (cki *ComputedKeyInfos)
func (*SigChain) GetCurrentSubchain ¶
func (sc *SigChain) GetCurrentSubchain(eldest keybase1.KID) (ChainLinks, error)
GetCurrentSubchain takes the given sigchain and walks backward until it finds the start of the current subchain, returning all the links in the subchain. See isSubchainStart for the details of the logic here.
func (SigChain) GetCurrentTailTriple ¶
func (sc SigChain) GetCurrentTailTriple() (ret *MerkleTriple)
func (SigChain) GetFirstLink ¶
func (SigChain) GetFutureChainTail ¶
func (sc SigChain) GetFutureChainTail() (ret *MerkleTriple)
func (SigChain) GetLastKnownID ¶
func (SigChain) GetLastKnownSeqno ¶
func (SigChain) GetLastLink ¶
func (SigChain) GetLastLoadedID ¶
func (SigChain) GetLastLoadedSeqno ¶
func (*SigChain) GetLinkFromSeqno ¶
func (*SigChain) GetLinkFromSigID ¶
func (*SigChain) GetLinkFromSigIDQuery ¶
GetLinkFromSigIDQuery will return true if it finds a ChainLink with a SigID that starts with query.
func (*SigChain) LoadFromServer ¶
func (sc *SigChain) LoadFromServer(m MetaContext, t *MerkleTriple, selfUID keybase1.UID) (dirtyTail *MerkleTriple, err error)
func (*SigChain) LoadServerBody ¶ added in v1.0.42
func (sc *SigChain) LoadServerBody(m MetaContext, body []byte, low keybase1.Seqno, t *MerkleTriple, selfUID keybase1.UID) (dirtyTail *MerkleTriple, err error)
func (*SigChain) LocalDelegate ¶
func (*SigChain) LocalDelegatePerUserKey ¶ added in v1.0.27
func (sc *SigChain) LocalDelegatePerUserKey(perUserKey keybase1.PerUserKey) error
func (*SigChain) SetUIDUsername ¶ added in v1.0.42
func (*SigChain) Store ¶
func (sc *SigChain) Store(m MetaContext) (err error)
func (*SigChain) VerifiedChainLinks ¶
func (sc *SigChain) VerifiedChainLinks(fp PGPFingerprint) (ret ChainLinks)
func (*SigChain) VerifyChain ¶
func (sc *SigChain) VerifyChain(m MetaContext) (err error)
func (*SigChain) VerifySigsAndComputeKeys ¶
func (sc *SigChain) VerifySigsAndComputeKeys(m MetaContext, eldest keybase1.KID, ckf *ComputedKeyFamily) (bool, error)
VerifySigsAndComputeKeys iterates over all potentially all incarnations of the user, trying to compute multiple subchains. It returns (bool, error), where bool is true if the load hit the cache, and false otherwise.
type SigChainLoader ¶
type SigChainLoader struct { MetaContextified // contains filtered or unexported fields }
func (*SigChainLoader) AccessPreload ¶
func (l *SigChainLoader) AccessPreload() bool
func (*SigChainLoader) CheckFreshness ¶
func (l *SigChainLoader) CheckFreshness() (current bool, err error)
func (*SigChainLoader) GetKeyFamily ¶
func (l *SigChainLoader) GetKeyFamily() (err error)
func (*SigChainLoader) GetMerkleTriple ¶
func (l *SigChainLoader) GetMerkleTriple() (ret *MerkleTriple)
func (*SigChainLoader) Load ¶
func (l *SigChainLoader) Load() (ret *SigChain, err error)
Load is the main entry point into the SigChain loader. It runs through all of the steps to load a chain in from storage, to refresh it against the server, and to verify its integrity.
func (*SigChainLoader) LoadFromServer ¶
func (l *SigChainLoader) LoadFromServer() (err error)
func (*SigChainLoader) LoadLastLinkIDFromStorage ¶
func (l *SigChainLoader) LoadLastLinkIDFromStorage() (mt *MerkleTriple, err error)
func (*SigChainLoader) LoadLinksFromStorage ¶
func (l *SigChainLoader) LoadLinksFromStorage() (err error)
func (*SigChainLoader) MakeSigChain ¶
func (l *SigChainLoader) MakeSigChain() error
func (*SigChainLoader) Store ¶
func (l *SigChainLoader) Store() (err error)
Store a SigChain to local storage as a result of having loaded it. We eagerly write loaded chain links to storage if they verify properly.
func (*SigChainLoader) StoreTail ¶
func (l *SigChainLoader) StoreTail() (err error)
func (*SigChainLoader) VerifySigsAndComputeKeys ¶
func (l *SigChainLoader) VerifySigsAndComputeKeys() (err error)
type SigHasRevokes ¶ added in v1.0.46
type SigHasRevokes bool
type SigHint ¶
type SigHint struct {
// contains filtered or unexported fields
}
func (SigHint) GetCheckText ¶
func (SigHint) GetHumanURL ¶
func (SigHint) MarshalToJSON ¶
type SigHints ¶
type SigHints struct { Contextified // contains filtered or unexported fields }
func LoadAndRefreshSigHints ¶
func LoadAndRefreshSigHints(m MetaContext, uid keybase1.UID) (sh *SigHints, err error)
func LoadSigHints ¶
func LoadSigHints(m MetaContext, uid keybase1.UID) (sh *SigHints, err error)
func NewSigHints ¶
func (SigHints) MarshalToJSON ¶
func (*SigHints) Refresh ¶
func (sh *SigHints) Refresh(m MetaContext) (err error)
func (*SigHints) RefreshWith ¶ added in v1.0.18
func (sh *SigHints) RefreshWith(m MetaContext, jw *jsonw.Wrapper) (err error)
func (*SigHints) Store ¶
func (sh *SigHints) Store(m MetaContext) (err error)
type SigIgnoreIfUnsupported ¶ added in v1.0.46
type SigIgnoreIfUnsupported bool
func (SigIgnoreIfUnsupported) Bool ¶ added in v1.0.48
func (b SigIgnoreIfUnsupported) Bool() bool
type SigMultiItem ¶ added in v1.0.27
type SigMultiItem struct { Sig string `json:"sig"` SigningKID keybase1.KID `json:"signing_kid"` Type string `json:"type"` SeqType keybase1.SeqType `json:"seq_type"` SigInner string `json:"sig_inner"` TeamID keybase1.TeamID `json:"team_id"` PublicKeys *SigMultiItemPublicKeys `json:"public_keys,omitempty"` }
type SigMultiItemPublicKeys ¶ added in v1.0.27
type SigVersion ¶ added in v1.0.27
type SigVersion int
const ( KeybaseNullSigVersion SigVersion = 0 KeybaseSignatureV1 SigVersion = 1 KeybaseSignatureV2 SigVersion = 2 )
func GetDefaultSigVersion ¶ added in v1.0.46
func GetDefaultSigVersion(g *GlobalContext) SigVersion
type SigchainV2Error ¶ added in v1.0.21
type SigchainV2Error struct {
// contains filtered or unexported fields
}
func (SigchainV2Error) Error ¶ added in v1.0.21
func (s SigchainV2Error) Error() string
type SigchainV2MismatchedFieldError ¶ added in v1.0.21
type SigchainV2MismatchedFieldError struct {
// contains filtered or unexported fields
}
func (SigchainV2MismatchedFieldError) Error ¶ added in v1.0.21
func (s SigchainV2MismatchedFieldError) Error() string
type SigchainV2MismatchedHashError ¶ added in v1.0.21
type SigchainV2MismatchedHashError struct{}
func (SigchainV2MismatchedHashError) Error ¶ added in v1.0.21
func (s SigchainV2MismatchedHashError) Error() string
type SigchainV2Required ¶ added in v1.0.46
type SigchainV2Required struct{}
func (SigchainV2Required) Error ¶ added in v1.0.46
func (s SigchainV2Required) Error() string
type SigchainV2StubbedDisallowed ¶ added in v1.0.46
type SigchainV2StubbedDisallowed struct{}
func (SigchainV2StubbedDisallowed) Error ¶ added in v1.0.46
func (s SigchainV2StubbedDisallowed) Error() string
type SigchainV2StubbedFirstLinkError ¶ added in v1.0.21
type SigchainV2StubbedFirstLinkError struct{}
func (SigchainV2StubbedFirstLinkError) Error ¶ added in v1.0.21
func (s SigchainV2StubbedFirstLinkError) Error() string
type SigchainV2StubbedSignatureNeededError ¶ added in v1.0.21
type SigchainV2StubbedSignatureNeededError struct{}
func (SigchainV2StubbedSignatureNeededError) Error ¶ added in v1.0.21
func (s SigchainV2StubbedSignatureNeededError) Error() string
type SigchainV2Type ¶ added in v1.0.21
type SigchainV2Type int
const ( SigchainV2TypeNone SigchainV2Type = 0 SigchainV2TypeEldest SigchainV2Type = 1 SigchainV2TypeWebServiceBinding SigchainV2Type = 2 SigchainV2TypeTrack SigchainV2Type = 3 SigchainV2TypeUntrack SigchainV2Type = 4 SigchainV2TypeRevoke SigchainV2Type = 5 SigchainV2TypeCryptocurrency SigchainV2Type = 6 SigchainV2TypeAnnouncement SigchainV2Type = 7 SigchainV2TypeDevice SigchainV2Type = 8 SigchainV2TypeWebServiceBindingWithRevoke SigchainV2Type = 9 SigchainV2TypeCryptocurrencyWithRevoke SigchainV2Type = 10 SigchainV2TypeSibkey SigchainV2Type = 11 SigchainV2TypeSubkey SigchainV2Type = 12 SigchainV2TypePGPUpdate SigchainV2Type = 13 SigchainV2TypePerUserKey SigchainV2Type = 14 SigchainV2TypeWalletStellar SigchainV2Type = 15 // Team link types // If you add a new one be sure to get all of these too: // - A corresponding libkb.LinkType in constants.go // - SigchainV2TypeFromV1TypeTeams // - SigChainV2Type.IsSupportedTeamType // - SigChainV2Type.RequiresAdminPermission // - SigChainV2Type.TeamAllowStub // - TeamSigChainPlayer.addInnerLink (add a case) SigchainV2TypeTeamRoot SigchainV2Type = 33 SigchainV2TypeTeamNewSubteam SigchainV2Type = 34 SigchainV2TypeTeamChangeMembership SigchainV2Type = 35 SigchainV2TypeTeamRotateKey SigchainV2Type = 36 SigchainV2TypeTeamLeave SigchainV2Type = 37 SigchainV2TypeTeamSubteamHead SigchainV2Type = 38 SigchainV2TypeTeamRenameSubteam SigchainV2Type = 39 SigchainV2TypeTeamInvite SigchainV2Type = 40 SigchainV2TypeTeamRenameUpPointer SigchainV2Type = 41 SigchainV2TypeTeamDeleteRoot SigchainV2Type = 42 SigchainV2TypeTeamDeleteSubteam SigchainV2Type = 43 SigchainV2TypeTeamDeleteUpPointer SigchainV2Type = 44 // Note that 45 is skipped, since it's retired; used to be LegacyTLFUpgrade SigchainV2TypeTeamSettings SigchainV2Type = 46 SigchainV2TypeTeamKBFSSettings SigchainV2Type = 47 )
These values must match constants.iced in the proofs library.
func SigchainV2TypeFromV1TypeAndRevocations ¶ added in v1.0.21
func SigchainV2TypeFromV1TypeAndRevocations(s string, hasRevocations SigHasRevokes, ignoreIfUnsupported SigIgnoreIfUnsupported) (ret SigchainV2Type, err error)
func SigchainV2TypeFromV1TypeTeams ¶ added in v1.0.27
func SigchainV2TypeFromV1TypeTeams(s string) (ret SigchainV2Type, err error)
func (SigchainV2Type) AllowStubbing ¶ added in v1.0.48
func (t SigchainV2Type) AllowStubbing() bool
NeedsSignature is untrue of most supported link types. If a link can be stubbed, that means we potentially won't get to verify its signature, since we need the full link to verify signatures. However, in some cases, signature verification is required, and hence stubbing is disallowed.
func (SigchainV2Type) IsSupportedTeamType ¶ added in v1.0.34
func (t SigchainV2Type) IsSupportedTeamType() bool
Whether a type is for team sigchains. Also the list of which types are supported by this client.
func (SigchainV2Type) IsSupportedType ¶ added in v1.0.48
func (t SigchainV2Type) IsSupportedType() bool
func (SigchainV2Type) IsSupportedUserType ¶ added in v1.0.48
func (t SigchainV2Type) IsSupportedUserType() bool
func (SigchainV2Type) RequiresAtLeastRole ¶ added in v1.0.41
func (t SigchainV2Type) RequiresAtLeastRole() keybase1.TeamRole
func (SigchainV2Type) TeamAllowStub ¶ added in v1.0.27
func (t SigchainV2Type) TeamAllowStub(role keybase1.TeamRole) bool
Whether the type can be stubbed for a team member with role
func (SigchainV2Type) TeamAllowStubWithAdminFlag ¶ added in v1.0.27
func (t SigchainV2Type) TeamAllowStubWithAdminFlag(isAdmin bool) bool
type SignaturePrefix ¶ added in v1.0.18
type SignaturePrefix string
const ( SignaturePrefixKBFS SignaturePrefix = "Keybase-KBFS-1" SignaturePrefixSigchain SignaturePrefix = "Keybase-Sigchain-1" SignaturePrefixChatAttachment SignaturePrefix = "Keybase-Chat-Attachment-1" SignaturePrefixTesting SignaturePrefix = "Keybase-Testing-1" SignaturePrefixNIST SignaturePrefix = "Keybase-Auth-NIST-1" // Chat prefixes for each MessageBoxedVersion. SignaturePrefixChatMBv1 SignaturePrefix = "Keybase-Chat-1" SignaturePrefixChatMBv2 SignaturePrefix = "Keybase-Chat-2" )
func (SignaturePrefix) Prefix ¶ added in v1.0.18
func (p SignaturePrefix) Prefix(msg []byte) []byte
type SignatureStatus ¶
type SignatureStatus struct { IsSigned bool Verified bool SignatureError error KeyID uint64 Entity *openpgp.Entity SignatureTime time.Time RecipientKeyIDs []uint64 }
func PGPDecrypt ¶
func PGPDecrypt(g *GlobalContext, source io.Reader, sink io.Writer, kr openpgp.KeyRing) (*SignatureStatus, error)
func PGPDecryptWithBundles ¶
func PGPDecryptWithBundles(g *GlobalContext, source io.Reader, sink io.Writer, keys []*PGPKeyBundle) (*SignatureStatus, error)
type SimpleTimer ¶
type SimpleTimer struct {
// contains filtered or unexported fields
}
SimpleTimer keeps track of how long something is taking, like a network API call. Meant to be very simple. It is not meant to be goroutine safe and should only be called from one Goroutine.
func (*SimpleTimer) GetTotal ¶
func (s *SimpleTimer) GetTotal() time.Duration
GetTotal gets the total duration spent in the timer.
func (*SimpleTimer) Start ¶
func (s *SimpleTimer) Start()
Start the timer running, if it's not already started.
func (*SimpleTimer) Stop ¶
func (s *SimpleTimer) Stop() time.Duration
Stop the timer; panic if it hasn't been previously started. Return the total duration spent in the timer.
type SkinnyLogger ¶ added in v1.0.33
type SkipSecretPromptError ¶
type SkipSecretPromptError struct{}
func (SkipSecretPromptError) Error ¶
func (e SkipSecretPromptError) Error() string
func (SkipSecretPromptError) ToStatus ¶
func (e SkipSecretPromptError) ToStatus() (s keybase1.Status)
type SkipSequence ¶ added in v1.0.19
type SkipSequence []MerkleRootPayload
type SkipTable ¶ added in v1.0.19
type SkipTable map[keybase1.Seqno]NodeHashAny
type SocialProofChainLink ¶
type SocialProofChainLink struct { GenericChainLink // contains filtered or unexported fields }
func NewSocialProofChainLink ¶
func NewSocialProofChainLink(b GenericChainLink, s, u, proofText string) *SocialProofChainLink
func (*SocialProofChainLink) CheckDataJSON ¶
func (s *SocialProofChainLink) CheckDataJSON() *jsonw.Wrapper
func (*SocialProofChainLink) ComputeTrackDiff ¶
func (s *SocialProofChainLink) ComputeTrackDiff(tl *TrackLookup) TrackDiff
func (*SocialProofChainLink) DisplayCheck ¶
func (s *SocialProofChainLink) DisplayCheck(ui IdentifyUI, lcr LinkCheckResult) error
func (*SocialProofChainLink) GetHostname ¶
func (s *SocialProofChainLink) GetHostname() string
func (*SocialProofChainLink) GetProofType ¶
func (s *SocialProofChainLink) GetProofType() keybase1.ProofType
func (*SocialProofChainLink) GetProtocol ¶
func (s *SocialProofChainLink) GetProtocol() string
func (*SocialProofChainLink) GetRemoteUsername ¶
func (s *SocialProofChainLink) GetRemoteUsername() string
func (*SocialProofChainLink) GetService ¶
func (s *SocialProofChainLink) GetService() string
func (*SocialProofChainLink) LastWriterWins ¶
func (s *SocialProofChainLink) LastWriterWins() bool
func (*SocialProofChainLink) ProofText ¶
func (s *SocialProofChainLink) ProofText() string
func (*SocialProofChainLink) TableKey ¶
func (s *SocialProofChainLink) TableKey() string
func (*SocialProofChainLink) ToDisplayString ¶
func (s *SocialProofChainLink) ToDisplayString() string
func (*SocialProofChainLink) ToIDString ¶
func (s *SocialProofChainLink) ToIDString() string
func (*SocialProofChainLink) ToKeyValuePair ¶
func (s *SocialProofChainLink) ToKeyValuePair() (string, string)
func (*SocialProofChainLink) ToTrackingStatement ¶
func (s *SocialProofChainLink) ToTrackingStatement(state keybase1.ProofState) (*jsonw.Wrapper, error)
func (*SocialProofChainLink) Type ¶
func (s *SocialProofChainLink) Type() string
type Socket ¶
NewSocket() (Socket, err) is defined in the various platform-specific socket_*.go files.
func NewSocket ¶
func NewSocket(g *GlobalContext) (ret Socket, err error)
type SocketInfo ¶
type SocketInfo struct {
// contains filtered or unexported fields
}
func (SocketInfo) BindToSocket ¶
func (s SocketInfo) BindToSocket() (ret net.Listener, err error)
func (SocketInfo) DialSocket ¶
func (s SocketInfo) DialSocket() (net.Conn, error)
func (SocketInfo) GetBindFile ¶ added in v1.0.18
func (s SocketInfo) GetBindFile() string
func (SocketInfo) GetDialFiles ¶ added in v1.0.18
func (s SocketInfo) GetDialFiles() []string
type SocketWrapper ¶
type SocketWrapper struct { Conn net.Conn Transporter rpc.Transporter Err error }
type SpecialKeyRing ¶
type SpecialKeyRing struct { Contextified // contains filtered or unexported fields }
SpecialKeyRing holds blessed keys, like the one Keybase uses to sign its Merkle Root.
func NewSpecialKeyRing ¶
func NewSpecialKeyRing(v []keybase1.KID, g *GlobalContext) *SpecialKeyRing
NewSpecialKeyRing allocates a new SpecialKeyRing with the given vector of KIDs. For NaCl keys, it will actually import those keys into the Keyring.
func (*SpecialKeyRing) IsValidKID ¶
func (sk *SpecialKeyRing) IsValidKID(kid keybase1.KID) bool
IsValidKID returns if this KID is valid (blessed) according to this Keyring
func (*SpecialKeyRing) Load ¶
func (sk *SpecialKeyRing) Load(kid keybase1.KID) (GenericKey, error)
Load takes a blessed KID and returns, if possible, the GenericKey associated with that KID, for signature verification. If the key isn't found in memory or on disk (in the case of PGP), then it will attempt to fetch the key from the keybase server.
type StandaloneChatConnector ¶ added in v1.0.27
type StandaloneChatConnector interface {
StartStandaloneChat(g *GlobalContext) error
}
type StreamClassification ¶
type StreamClassification struct { Format CryptoMessageFormat Type CryptoMessageType Armored bool }
StreamClassification tells what Format the stream is, if it's a Public signature or a Private Message, if it's a detached or attached signature in the public case, and if it's armored or binary.
func ClassifyStream ¶
ClassifyStream takes a stream reader in, and returns a likely classification of that stream without consuming any data from it. It returns a reader that you should read from instead, in addition to the classification. If classification fails, there will be a `UnknownStreamError`, or additional EOF errors if the stream ended before classification could go.
type StreamExistsError ¶
type StreamExistsError struct{}
func (StreamExistsError) Error ¶
func (s StreamExistsError) Error() string
func (StreamExistsError) ToStatus ¶
func (e StreamExistsError) ToStatus(s keybase1.Status)
type StreamNotFoundError ¶
type StreamNotFoundError struct{}
func (StreamNotFoundError) Error ¶
func (s StreamNotFoundError) Error() string
func (StreamNotFoundError) ToStatus ¶
func (e StreamNotFoundError) ToStatus(s keybase1.Status)
type StreamWrongKindError ¶
type StreamWrongKindError struct{}
func (StreamWrongKindError) Error ¶
func (s StreamWrongKindError) Error() string
func (StreamWrongKindError) ToStatus ¶
func (e StreamWrongKindError) ToStatus(s keybase1.Status)
type StringWarning ¶
type StringWarning string
func (StringWarning) Warn ¶
func (s StringWarning) Warn(g *GlobalContext)
func (StringWarning) Warning ¶
func (s StringWarning) Warning() string
type StubAPIEngine ¶
type StubAPIEngine struct {
*ExternalAPIEngine
}
func NewStubAPIEngine ¶
func NewStubAPIEngine(g *GlobalContext) *StubAPIEngine
func (*StubAPIEngine) Get ¶
func (e *StubAPIEngine) Get(arg APIArg) (res *ExternalAPIRes, err error)
func (*StubAPIEngine) GetHTML ¶
func (e *StubAPIEngine) GetHTML(arg APIArg) (res *ExternalHTMLRes, err error)
func (*StubAPIEngine) GetText ¶
func (e *StubAPIEngine) GetText(arg APIArg) (*ExternalTextRes, error)
type SubkeyChainLink ¶
type SubkeyChainLink struct { GenericChainLink // contains filtered or unexported fields }
func ParseSubkeyChainLink ¶
func ParseSubkeyChainLink(b GenericChainLink) (ret *SubkeyChainLink, err error)
func (*SubkeyChainLink) GetDelegatedKid ¶
func (s *SubkeyChainLink) GetDelegatedKid() keybase1.KID
func (*SubkeyChainLink) GetParentKid ¶
func (s *SubkeyChainLink) GetParentKid() keybase1.KID
func (*SubkeyChainLink) GetRole ¶
func (s *SubkeyChainLink) GetRole() KeyRole
func (*SubkeyChainLink) ToDisplayString ¶
func (s *SubkeyChainLink) ToDisplayString() string
func (*SubkeyChainLink) Type ¶
func (s *SubkeyChainLink) Type() string
type Syncer ¶
type Syncer interface { Contextifier sync.Locker // contains filtered or unexported methods }
type TeamBadMembershipError ¶ added in v1.0.39
type TeamBadMembershipError struct{}
func (TeamBadMembershipError) Error ¶ added in v1.0.39
func (e TeamBadMembershipError) Error() string
func (TeamBadMembershipError) ToStatus ¶ added in v1.0.39
func (e TeamBadMembershipError) ToStatus() (s keybase1.Status)
type TeamEKBoxStorage ¶ added in v1.0.46
type TeamEKBoxStorage interface { Put(ctx context.Context, teamID keybase1.TeamID, generation keybase1.EkGeneration, teamEKBoxed keybase1.TeamEkBoxed) error Get(ctx context.Context, teamID keybase1.TeamID, generation keybase1.EkGeneration) (keybase1.TeamEk, error) MaxGeneration(ctx context.Context, teamID keybase1.TeamID) (keybase1.EkGeneration, error) DeleteExpired(ctx context.Context, teamID keybase1.TeamID, merkleRoot MerkleRoot) ([]keybase1.EkGeneration, error) ClearCache() }
type TeamInviteBadTokenError ¶ added in v1.0.39
type TeamInviteBadTokenError struct{}
func (TeamInviteBadTokenError) Error ¶ added in v1.0.39
func (e TeamInviteBadTokenError) Error() string
func (TeamInviteBadTokenError) ToStatus ¶ added in v1.0.39
func (e TeamInviteBadTokenError) ToStatus() (s keybase1.Status)
type TeamInviteTokenReusedError ¶ added in v1.0.39
type TeamInviteTokenReusedError struct{}
func (TeamInviteTokenReusedError) Error ¶ added in v1.0.39
func (e TeamInviteTokenReusedError) Error() string
func (TeamInviteTokenReusedError) ToStatus ¶ added in v1.0.39
func (e TeamInviteTokenReusedError) ToStatus() (s keybase1.Status)
type TeamLoader ¶ added in v1.0.27
type TeamLoader interface { VerifyTeamName(ctx context.Context, id keybase1.TeamID, name keybase1.TeamName) error ImplicitAdmins(ctx context.Context, teamID keybase1.TeamID) (impAdmins []keybase1.UserVersion, err error) NotifyTeamRename(ctx context.Context, id keybase1.TeamID, newName string) error Load(context.Context, keybase1.LoadTeamArg) (*keybase1.TeamData, error) // Delete the cache entry. Does not error if there is no cache entry. Delete(ctx context.Context, teamID keybase1.TeamID) error // Untrusted hint of what a team's latest seqno is HintLatestSeqno(ctx context.Context, id keybase1.TeamID, seqno keybase1.Seqno) error ResolveNameToIDUntrusted(ctx context.Context, teamName keybase1.TeamName, public bool, allowCache bool) (id keybase1.TeamID, err error) OnLogout() // Clear the in-memory cache. Does not affect the disk cache. ClearMem() }
type TeamProvisionalError ¶ added in v1.0.39
func (TeamProvisionalError) Error ¶ added in v1.0.39
func (e TeamProvisionalError) Error() string
func (TeamProvisionalError) ToStatus ¶ added in v1.0.39
func (e TeamProvisionalError) ToStatus() keybase1.Status
type TeamVisibilityError ¶ added in v1.0.30
type TeamVisibilityError struct {
// contains filtered or unexported fields
}
func NewTeamVisibilityError ¶ added in v1.0.34
func NewTeamVisibilityError(wantedPublic, gotPublic bool) TeamVisibilityError
func (TeamVisibilityError) Error ¶ added in v1.0.30
func (e TeamVisibilityError) Error() string
type TerminalUI ¶
type TerminalUI interface { // The ErrorWriter is not escaped: it should not be used to show unescaped user-originated data. ErrorWriter() io.Writer Output(string) error OutputDesc(OutputDescriptor, string) error OutputWriter() io.Writer UnescapedOutputWriter() io.Writer Printf(fmt string, args ...interface{}) (int, error) PrintfUnescaped(fmt string, args ...interface{}) (int, error) // Prompt strings are not escaped: they should not be used to show unescaped user-originated data. Prompt(PromptDescriptor, string) (string, error) PromptForConfirmation(prompt string) error PromptPassword(PromptDescriptor, string) (string, error) PromptYesNo(PromptDescriptor, string, PromptDefault) (bool, error) Tablify(headings []string, rowfunc func() []string) TerminalSize() (width int, height int) }
type TestCancelSecretUI ¶
type TestCancelSecretUI struct {
CallCount int
}
func (*TestCancelSecretUI) GetPassphrase ¶
func (t *TestCancelSecretUI) GetPassphrase(_ keybase1.GUIEntryArg, _ *keybase1.SecretEntryArg) (keybase1.GetPassphraseRes, error)
type TestConfig ¶
type TestConfig struct {
// contains filtered or unexported fields
}
TestConfig tracks libkb config during a test
func (*TestConfig) CleanTest ¶
func (c *TestConfig) CleanTest()
func (*TestConfig) GetConfigFileName ¶
func (c *TestConfig) GetConfigFileName() string
type TestContext ¶
type TestContext struct { G *GlobalContext PrevGlobal *GlobalContext Tp *TestParameters // TODO: Rename this to TB. T TestingTB }
func SetupTest ¶
func SetupTest(tb TestingTB, name string, depth int) (tc TestContext)
The depth argument is now ignored.
func (*TestContext) Cleanup ¶
func (tc *TestContext) Cleanup()
func (TestContext) ClearAllStoredSecrets ¶
func (tc TestContext) ClearAllStoredSecrets() error
func (TestContext) Clone ¶
func (tc TestContext) Clone() (ret TestContext)
func (*TestContext) GenerateGPGKeyring ¶
func (tc *TestContext) GenerateGPGKeyring(ids ...string) error
func (*TestContext) MakePGPKey ¶
func (tc *TestContext) MakePGPKey(id string) (*PGPKeyBundle, error)
func (TestContext) MoveGpgKeyringTo ¶
func (tc TestContext) MoveGpgKeyringTo(dst TestContext) error
func (*TestContext) SetRuntimeDir ¶
func (tc *TestContext) SetRuntimeDir(s string)
func (*TestContext) SimulateServiceRestart ¶
func (tc *TestContext) SimulateServiceRestart()
SimulatServiceRestart simulates a shutdown and restart (for client state). Used by tests that need to clear out cached login state without logging out.
type TestCountSecretUI ¶ added in v1.0.34
func (*TestCountSecretUI) GetPassphrase ¶ added in v1.0.34
func (t *TestCountSecretUI) GetPassphrase(p keybase1.GUIEntryArg, terminal *keybase1.SecretEntryArg) (keybase1.GetPassphraseRes, error)
type TestLoginCancelUI ¶
type TestLoginCancelUI struct {
TestLoginUI
}
func (*TestLoginCancelUI) GetEmailOrUsername ¶
type TestLoginUI ¶
func (*TestLoginUI) DisplayPaperKeyPhrase ¶
func (t *TestLoginUI) DisplayPaperKeyPhrase(_ context.Context, arg keybase1.DisplayPaperKeyPhraseArg) error
func (*TestLoginUI) DisplayPrimaryPaperKey ¶
func (t *TestLoginUI) DisplayPrimaryPaperKey(_ context.Context, arg keybase1.DisplayPrimaryPaperKeyArg) error
func (*TestLoginUI) GetEmailOrUsername ¶
func (*TestLoginUI) PromptRevokePaperKeys ¶
func (t *TestLoginUI) PromptRevokePaperKeys(_ context.Context, arg keybase1.PromptRevokePaperKeysArg) (bool, error)
type TestOutput ¶
type TestOutput struct {
// contains filtered or unexported fields
}
TestOutput is a mock interface for capturing and testing output
func NewTestOutput ¶
func NewTestOutput(e string, t TestingTB, c *bool) TestOutput
type TestParameters ¶
type TestParameters struct { ConfigFilename string Home string GPG string GPGHome string GPGOptions []string Debug bool // Whether we are in Devel Mode Devel bool // If we're in dev mode, the name for this test, with a random // suffix. DevelName string RuntimeDir string DisableUpgradePerUserKey bool DisableAutoWallet bool // set to true to use production run mode in tests UseProductionRunMode bool // whether LogoutIfRevoked check should be skipped to avoid races // during resets. SkipLogoutIfRevokedCheck bool // On if, in test, we want to skip sending system chat messages SkipSendingSystemChatMessages bool // If we need to use the real clock for NIST generation (as in really // whacky tests liks TestRekey). UseTimeClockForNISTs bool }
func (TestParameters) GetDebug ¶
func (tp TestParameters) GetDebug() (bool, bool)
type TestSecretUI ¶
func (*TestSecretUI) GetPassphrase ¶
func (t *TestSecretUI) GetPassphrase(p keybase1.GUIEntryArg, terminal *keybase1.SecretEntryArg) (keybase1.GetPassphraseRes, error)
type TestUIDMapper ¶ added in v1.0.33
type TestUIDMapper struct {
// contains filtered or unexported fields
}
func NewTestUIDMapper ¶ added in v1.0.33
func NewTestUIDMapper(ul UPAKLoader) TestUIDMapper
func (TestUIDMapper) CheckUIDAgainstUsername ¶ added in v1.0.33
func (t TestUIDMapper) CheckUIDAgainstUsername(uid keybase1.UID, un NormalizedUsername) bool
func (TestUIDMapper) ClearUIDAtEldestSeqno ¶ added in v1.0.34
func (t TestUIDMapper) ClearUIDAtEldestSeqno(_ context.Context, _ UIDMapperContext, _ keybase1.UID, _ keybase1.Seqno) error
func (TestUIDMapper) InformOfEldestSeqno ¶ added in v1.0.40
func (t TestUIDMapper) InformOfEldestSeqno(ctx context.Context, g UIDMapperContext, uv keybase1.UserVersion) (bool, error)
func (TestUIDMapper) MapUIDsToUsernamePackages ¶ added in v1.0.33
func (t TestUIDMapper) MapUIDsToUsernamePackages(ctx context.Context, g UIDMapperContext, uids []keybase1.UID, fullNameFreshness time.Duration, networkTimeBudget time.Duration, forceNetworkForFullNames bool) ([]UsernamePackage, error)
func (TestUIDMapper) SetTestingNoCachingMode ¶ added in v1.0.34
func (t TestUIDMapper) SetTestingNoCachingMode(enabled bool)
type TestingTB ¶ added in v1.0.34
type TestingTB interface { Error(args ...interface{}) Errorf(format string, args ...interface{}) Fail() FailNow() Failed() bool Fatal(args ...interface{}) Fatalf(format string, args ...interface{}) Log(args ...interface{}) Logf(format string, args ...interface{}) Name() string Skip(args ...interface{}) SkipNow() Skipf(format string, args ...interface{}) Skipped() bool Helper() }
TestingTB is a copy of the exported parts of testing.TB. We define this in order to avoid pulling in the "testing" package in exported code.
type TimeoutError ¶
type TimeoutError struct{}
func (TimeoutError) Error ¶
func (e TimeoutError) Error() string
func (TimeoutError) ToStatus ¶
func (e TimeoutError) ToStatus() keybase1.Status
type TimerSelector ¶
type TimerSelector int
TimerSelector allows us to select which timers we want on.
const ( // TimerNone means Timers Disabled TimerNone TimerSelector = 0 // TimerAPI enables API timers TimerAPI TimerSelector = 1 << iota // TimerXAPI enables External API timers TimerXAPI // TimerRPC enables RPC timers TimerRPC )
type TimerSet ¶
type TimerSet struct { Contextified // contains filtered or unexported fields }
TimerSet is the set of currently active timers
func NewTimerSet ¶
func NewTimerSet(g *GlobalContext) *TimerSet
NewTimerSet looks into the given context for configuration information about how to set up timers. It then returns the corresponding TimerSet.
func (TimerSet) Start ¶
func (s TimerSet) Start(sel TimerSelector) ReportingTimer
Start allocates and starts a new timer if the passed TimerSelector is currently enabled. Otherwise, it just returns a Dummy timer.
type TlfPseudonym ¶ added in v1.0.21
type TlfPseudonym [32]byte
TLFPseudonym is an identifier for a key in a tlf
func MakePseudonym ¶ added in v1.0.21
func MakePseudonym(info TlfPseudonymInfo) (TlfPseudonym, error)
MakePseudonym makes a TLF pseudonym from the given input.
func PostTlfPseudonyms ¶ added in v1.0.21
func PostTlfPseudonyms(ctx context.Context, g *GlobalContext, pnymInfos []TlfPseudonymInfo) ([]TlfPseudonym, error)
func (TlfPseudonym) Eq ¶ added in v1.0.21
func (t TlfPseudonym) Eq(r TlfPseudonym) bool
func (TlfPseudonym) String ¶ added in v1.0.21
func (t TlfPseudonym) String() string
type TlfPseudonymInfo ¶ added in v1.0.21
type TlfPseudonymInfo struct { // TLF name like: /keybase/private/a,b Name string // TLF id ID tlfID KeyGen KeyGen HmacKey [32]byte }
TlfPseudonymInfo is what a pseudonym represents
type TlfPseudonymServerInfo ¶ added in v1.0.22
type TlfPseudonymServerInfo struct { TlfPseudonymInfo // Using untrusted data during decryption is safe because we don't rely on // TLF keys for sender authenticity. (Note however that senders must not // use untrusted keys, or else they'd lose all privacy.) UntrustedCurrentName string }
The server returns the current full name of the TLF, in addition to the TlfPseudonymInfo above.
type TooManyKeysError ¶
type TooManyKeysError struct {
// contains filtered or unexported fields
}
func (TooManyKeysError) Error ¶
func (e TooManyKeysError) Error() string
type TorMode ¶
type TorMode int
func StringToTorMode ¶
func (TorMode) UseCookies ¶
func (TorMode) UseHeaders ¶
func (TorMode) UseSession ¶
type TorSessionRequiredError ¶
type TorSessionRequiredError struct{}
func (TorSessionRequiredError) Error ¶
func (t TorSessionRequiredError) Error() string
type TrackBrokenError ¶ added in v1.0.19
type TrackBrokenError struct{}
func (TrackBrokenError) Error ¶ added in v1.0.19
func (e TrackBrokenError) Error() string
type TrackCache ¶
type TrackCache struct {
// contains filtered or unexported fields
}
func NewTrackCache ¶
func NewTrackCache() *TrackCache
func (*TrackCache) Delete ¶
func (c *TrackCache) Delete(key keybase1.TrackToken) error
func (*TrackCache) Get ¶
func (c *TrackCache) Get(key keybase1.TrackToken) (*IdentifyOutcome, error)
func (*TrackCache) Insert ¶
func (c *TrackCache) Insert(outcome *IdentifyOutcome) (keybase1.TrackToken, error)
func (*TrackCache) Shutdown ¶
func (c *TrackCache) Shutdown()
type TrackChainLink ¶
type TrackChainLink struct { GenericChainLink // contains filtered or unexported fields }
========================================================================= TrackChainLink
func GetRemoteChainLinkFor ¶ added in v1.0.19
func GetRemoteChainLinkFor(m MetaContext, follower *keybase1.UserPlusKeysV2AllIncarnations, followeeUsername NormalizedUsername, followeeUID keybase1.UID) (ret *TrackChainLink, err error)
func LocalTmpTrackChainLinkFor ¶
func LocalTmpTrackChainLinkFor(m MetaContext, tracker, trackee keybase1.UID) (ret *TrackChainLink, err error)
func LocalTrackChainLinkFor ¶
func LocalTrackChainLinkFor(m MetaContext, tracker, trackee keybase1.UID) (ret *TrackChainLink, err error)
func ParseTrackChainLink ¶
func ParseTrackChainLink(b GenericChainLink) (ret *TrackChainLink, err error)
func TmpTrackChainLinkFor ¶ added in v1.0.19
func TmpTrackChainLinkFor(m MetaContext, me keybase1.UID, them keybase1.UID) (tcl *TrackChainLink, err error)
func TrackChainLinkFor ¶ added in v1.0.19
func TrackChainLinkFor(m MetaContext, me keybase1.UID, them keybase1.UID, remote *TrackChainLink, remoteErr error) (*TrackChainLink, error)
func TrackChainLinkFromUPK2AI ¶
func TrackChainLinkFromUPK2AI(m MetaContext, follower *keybase1.UserPlusKeysV2AllIncarnations, followeeUsername NormalizedUsername, followeeUID keybase1.UID) (*TrackChainLink, error)
func (*TrackChainLink) DoOwnNewLinkFromServerNotifications ¶
func (l *TrackChainLink) DoOwnNewLinkFromServerNotifications(g *GlobalContext)
func (TrackChainLink) Export ¶ added in v1.0.19
func (t TrackChainLink) Export() keybase1.RemoteTrack
func (*TrackChainLink) GetEldestKID ¶
func (l *TrackChainLink) GetEldestKID() (kid keybase1.KID, err error)
func (*TrackChainLink) GetTmpExpireTime ¶
func (l *TrackChainLink) GetTmpExpireTime() (ret time.Time)
func (*TrackChainLink) GetTrackedKeys ¶
func (l *TrackChainLink) GetTrackedKeys() ([]TrackedKey, error)
func (*TrackChainLink) GetTrackedUID ¶
func (l *TrackChainLink) GetTrackedUID() (keybase1.UID, error)
func (*TrackChainLink) GetTrackedUsername ¶
func (l *TrackChainLink) GetTrackedUsername() (NormalizedUsername, error)
func (TrackChainLink) IsRemote ¶
func (l TrackChainLink) IsRemote() bool
func (*TrackChainLink) IsRevoked ¶
func (l *TrackChainLink) IsRevoked() bool
func (*TrackChainLink) RemoteKeyProofs ¶
func (l *TrackChainLink) RemoteKeyProofs() *jsonw.Wrapper
func (*TrackChainLink) ToDisplayString ¶
func (l *TrackChainLink) ToDisplayString() string
func (*TrackChainLink) ToServiceBlocks ¶
func (l *TrackChainLink) ToServiceBlocks() (ret []*ServiceBlock)
func (*TrackChainLink) Type ¶
func (l *TrackChainLink) Type() string
type TrackDiffClash ¶
type TrackDiffClash struct {
// contains filtered or unexported fields
}
func (TrackDiffClash) BreaksTracking ¶
func (t TrackDiffClash) BreaksTracking() bool
func (TrackDiffClash) GetTrackDiffType ¶
func (t TrackDiffClash) GetTrackDiffType() keybase1.TrackDiffType
func (TrackDiffClash) IsSameAsTracked ¶
func (t TrackDiffClash) IsSameAsTracked() bool
func (TrackDiffClash) ToDisplayMarkup ¶
func (t TrackDiffClash) ToDisplayMarkup() *Markup
func (TrackDiffClash) ToDisplayString ¶
func (t TrackDiffClash) ToDisplayString() string
type TrackDiffNew ¶
type TrackDiffNew struct{}
func (TrackDiffNew) BreaksTracking ¶
func (t TrackDiffNew) BreaksTracking() bool
func (TrackDiffNew) GetTrackDiffType ¶
func (t TrackDiffNew) GetTrackDiffType() keybase1.TrackDiffType
func (TrackDiffNew) IsSameAsTracked ¶
func (t TrackDiffNew) IsSameAsTracked() bool
func (TrackDiffNew) ToDisplayMarkup ¶
func (t TrackDiffNew) ToDisplayMarkup() *Markup
func (TrackDiffNew) ToDisplayString ¶
func (t TrackDiffNew) ToDisplayString() string
type TrackDiffNewEldest ¶
type TrackDiffNewEldest struct {
// contains filtered or unexported fields
}
func (TrackDiffNewEldest) BreaksTracking ¶
func (t TrackDiffNewEldest) BreaksTracking() bool
func (TrackDiffNewEldest) GetTrackDiffType ¶
func (t TrackDiffNewEldest) GetTrackDiffType() keybase1.TrackDiffType
func (TrackDiffNewEldest) IsSameAsTracked ¶
func (t TrackDiffNewEldest) IsSameAsTracked() bool
func (TrackDiffNewEldest) ToDisplayMarkup ¶
func (t TrackDiffNewEldest) ToDisplayMarkup() *Markup
func (TrackDiffNewEldest) ToDisplayString ¶
func (t TrackDiffNewEldest) ToDisplayString() string
type TrackDiffNone ¶
type TrackDiffNone struct{}
func (TrackDiffNone) BreaksTracking ¶
func (t TrackDiffNone) BreaksTracking() bool
func (TrackDiffNone) GetTrackDiffType ¶
func (t TrackDiffNone) GetTrackDiffType() keybase1.TrackDiffType
func (TrackDiffNone) IsSameAsTracked ¶
func (t TrackDiffNone) IsSameAsTracked() bool
func (TrackDiffNone) ToDisplayMarkup ¶
func (t TrackDiffNone) ToDisplayMarkup() *Markup
func (TrackDiffNone) ToDisplayString ¶
func (t TrackDiffNone) ToDisplayString() string
type TrackDiffNoneViaTemporary ¶
type TrackDiffNoneViaTemporary struct{}
func (TrackDiffNoneViaTemporary) BreaksTracking ¶
func (t TrackDiffNoneViaTemporary) BreaksTracking() bool
func (TrackDiffNoneViaTemporary) GetTrackDiffType ¶
func (t TrackDiffNoneViaTemporary) GetTrackDiffType() keybase1.TrackDiffType
func (TrackDiffNoneViaTemporary) IsSameAsTracked ¶
func (t TrackDiffNoneViaTemporary) IsSameAsTracked() bool
func (TrackDiffNoneViaTemporary) ToDisplayMarkup ¶
func (t TrackDiffNoneViaTemporary) ToDisplayMarkup() *Markup
func (TrackDiffNoneViaTemporary) ToDisplayString ¶
func (t TrackDiffNoneViaTemporary) ToDisplayString() string
type TrackDiffRemoteChanged ¶
type TrackDiffRemoteChanged struct {
// contains filtered or unexported fields
}
func (TrackDiffRemoteChanged) BreaksTracking ¶
func (t TrackDiffRemoteChanged) BreaksTracking() bool
func (TrackDiffRemoteChanged) GetTrackDiffType ¶
func (t TrackDiffRemoteChanged) GetTrackDiffType() keybase1.TrackDiffType
func (TrackDiffRemoteChanged) IsSameAsTracked ¶
func (t TrackDiffRemoteChanged) IsSameAsTracked() bool
func (TrackDiffRemoteChanged) ToDisplayMarkup ¶
func (t TrackDiffRemoteChanged) ToDisplayMarkup() *Markup
func (TrackDiffRemoteChanged) ToDisplayString ¶
func (t TrackDiffRemoteChanged) ToDisplayString() string
type TrackDiffRemoteFail ¶
type TrackDiffRemoteFail struct {
// contains filtered or unexported fields
}
func (TrackDiffRemoteFail) BreaksTracking ¶
func (t TrackDiffRemoteFail) BreaksTracking() bool
func (TrackDiffRemoteFail) GetTrackDiffType ¶
func (t TrackDiffRemoteFail) GetTrackDiffType() keybase1.TrackDiffType
func (TrackDiffRemoteFail) IsSameAsTracked ¶
func (t TrackDiffRemoteFail) IsSameAsTracked() bool
func (TrackDiffRemoteFail) ToDisplayMarkup ¶
func (t TrackDiffRemoteFail) ToDisplayMarkup() *Markup
func (TrackDiffRemoteFail) ToDisplayString ¶
func (t TrackDiffRemoteFail) ToDisplayString() string
type TrackDiffRemoteWorking ¶
type TrackDiffRemoteWorking struct {
// contains filtered or unexported fields
}
func (TrackDiffRemoteWorking) BreaksTracking ¶
func (t TrackDiffRemoteWorking) BreaksTracking() bool
func (TrackDiffRemoteWorking) GetTrackDiffType ¶
func (t TrackDiffRemoteWorking) GetTrackDiffType() keybase1.TrackDiffType
func (TrackDiffRemoteWorking) IsSameAsTracked ¶
func (t TrackDiffRemoteWorking) IsSameAsTracked() bool
func (TrackDiffRemoteWorking) ToDisplayMarkup ¶
func (t TrackDiffRemoteWorking) ToDisplayMarkup() *Markup
func (TrackDiffRemoteWorking) ToDisplayString ¶
func (t TrackDiffRemoteWorking) ToDisplayString() string
type TrackDiffRevoked ¶
type TrackDiffRevoked struct {
// contains filtered or unexported fields
}
func (TrackDiffRevoked) BreaksTracking ¶
func (t TrackDiffRevoked) BreaksTracking() bool
func (TrackDiffRevoked) GetTrackDiffType ¶
func (t TrackDiffRevoked) GetTrackDiffType() keybase1.TrackDiffType
func (TrackDiffRevoked) IsSameAsTracked ¶
func (t TrackDiffRevoked) IsSameAsTracked() bool
func (TrackDiffRevoked) ToDisplayMarkup ¶
func (t TrackDiffRevoked) ToDisplayMarkup() *Markup
func (TrackDiffRevoked) ToDisplayString ¶
func (t TrackDiffRevoked) ToDisplayString() string
type TrackDiffSnoozedRevoked ¶ added in v1.0.17
type TrackDiffSnoozedRevoked struct {
// contains filtered or unexported fields
}
func (TrackDiffSnoozedRevoked) BreaksTracking ¶ added in v1.0.17
func (t TrackDiffSnoozedRevoked) BreaksTracking() bool
func (TrackDiffSnoozedRevoked) GetTrackDiffType ¶ added in v1.0.17
func (t TrackDiffSnoozedRevoked) GetTrackDiffType() keybase1.TrackDiffType
func (TrackDiffSnoozedRevoked) IsSameAsTracked ¶ added in v1.0.17
func (t TrackDiffSnoozedRevoked) IsSameAsTracked() bool
func (TrackDiffSnoozedRevoked) ToDisplayMarkup ¶ added in v1.0.17
func (t TrackDiffSnoozedRevoked) ToDisplayMarkup() *Markup
func (TrackDiffSnoozedRevoked) ToDisplayString ¶ added in v1.0.17
func (t TrackDiffSnoozedRevoked) ToDisplayString() string
type TrackDiffUpgraded ¶
type TrackDiffUpgraded struct {
// contains filtered or unexported fields
}
func (TrackDiffUpgraded) BreaksTracking ¶
func (t TrackDiffUpgraded) BreaksTracking() bool
func (TrackDiffUpgraded) GetCurr ¶
func (t TrackDiffUpgraded) GetCurr() string
func (TrackDiffUpgraded) GetPrev ¶
func (t TrackDiffUpgraded) GetPrev() string
func (TrackDiffUpgraded) GetTrackDiffType ¶
func (t TrackDiffUpgraded) GetTrackDiffType() keybase1.TrackDiffType
func (TrackDiffUpgraded) IsSameAsTracked ¶
func (t TrackDiffUpgraded) IsSameAsTracked() bool
func (TrackDiffUpgraded) ToDisplayMarkup ¶
func (t TrackDiffUpgraded) ToDisplayMarkup() *Markup
func (TrackDiffUpgraded) ToDisplayString ¶
func (t TrackDiffUpgraded) ToDisplayString() string
type TrackIDComponent ¶
type TrackIDComponent interface { ToIDString() string ToKeyValuePair() (string, string) GetProofState() keybase1.ProofState LastWriterWins() bool GetProofType() keybase1.ProofType }
Can be a ProofLinkWithState, one of the identities listed in a tracking statement, or a PGP Fingerprint!
type TrackInstructions ¶
type TrackLookup ¶
type TrackLookup struct { Contextified // contains filtered or unexported fields }
func NewTrackLookup ¶
func NewTrackLookup(g *GlobalContext, link *TrackChainLink) *TrackLookup
func (*TrackLookup) GetCTime ¶
func (l *TrackLookup) GetCTime() time.Time
func (TrackLookup) GetEldestKID ¶
func (l TrackLookup) GetEldestKID() keybase1.KID
func (TrackLookup) GetProofState ¶
func (l TrackLookup) GetProofState(id string) keybase1.ProofState
func (TrackLookup) GetTmpExpireTime ¶
func (l TrackLookup) GetTmpExpireTime() (ret time.Time)
func (TrackLookup) GetTrackedKeys ¶
func (l TrackLookup) GetTrackedKeys() []TrackedKey
func (TrackLookup) GetTrackerSeqno ¶
func (l TrackLookup) GetTrackerSeqno() keybase1.Seqno
func (TrackLookup) IsRemote ¶
func (l TrackLookup) IsRemote() bool
func (TrackLookup) ToSummary ¶
func (l TrackLookup) ToSummary() TrackSummary
type TrackSet ¶
type TrackSet struct {
// contains filtered or unexported fields
}
func NewTrackSet ¶
func NewTrackSet() *TrackSet
func (TrackSet) Add ¶
func (ts TrackSet) Add(t TrackIDComponent)
func (TrackSet) GetProofState ¶
func (ts TrackSet) GetProofState(id string) keybase1.ProofState
func (TrackSet) HasMember ¶
func (ts TrackSet) HasMember(t TrackIDComponent) bool
func (TrackSet) Subtract ¶
func (ts TrackSet) Subtract(b TrackSet) (out []TrackIDComponent)
type TrackStaleError ¶
type TrackStaleError struct {
FirstTrack bool
}
func (TrackStaleError) Error ¶
func (e TrackStaleError) Error() string
type TrackSummary ¶
type TrackSummary struct {
// contains filtered or unexported fields
}
func ImportTrackSummary ¶
func ImportTrackSummary(s *keybase1.TrackSummary) *TrackSummary
func (TrackSummary) Export ¶
func (s TrackSummary) Export(username string) (ret keybase1.TrackSummary)
func (TrackSummary) GetCTime ¶
func (s TrackSummary) GetCTime() time.Time
func (TrackSummary) IsRemote ¶
func (s TrackSummary) IsRemote() bool
func (TrackSummary) Username ¶
func (s TrackSummary) Username() string
type TrackedKey ¶
type TrackedKey struct { KID keybase1.KID Fingerprint *PGPFingerprint }
type Tracker2Syncer ¶ added in v1.0.17
type Tracker2Syncer struct { sync.Mutex Contextified // contains filtered or unexported fields }
func NewTracker2Syncer ¶ added in v1.0.17
func NewTracker2Syncer(g *GlobalContext, callerUID keybase1.UID, reverse bool) *Tracker2Syncer
func (*Tracker2Syncer) Result ¶ added in v1.0.17
func (t *Tracker2Syncer) Result() keybase1.UserSummary2Set
type TrackerSyncer ¶
type TrackerSyncer struct { // Locks the whole object sync.RWMutex Contextified // contains filtered or unexported fields }
func NewTrackerSyncer ¶
func NewTrackerSyncer(uid keybase1.UID, g *GlobalContext) *TrackerSyncer
func (*TrackerSyncer) Trackers ¶
func (t *TrackerSyncer) Trackers() *Trackers
type TrackingBrokeError ¶
type TrackingBrokeError struct{}
func (TrackingBrokeError) Error ¶
func (e TrackingBrokeError) Error() string
func (TrackingBrokeError) ToStatus ¶
func (e TrackingBrokeError) ToStatus() keybase1.Status
type Triplesec ¶ added in v1.0.17
type TypedChainLink ¶
type TypedChainLink interface { GetRevocations() []keybase1.SigID GetRevokeKids() []keybase1.KID GetSigID() keybase1.SigID GetArmoredSig() string ToDebugString() string Type() string ToDisplayString() string IsRevocationIsh() bool IsRevoked() bool IsDirectlyRevoked() bool GetRole() KeyRole GetSeqno() keybase1.Seqno GetCTime() time.Time GetETime() time.Time GetPGPFingerprint() *PGPFingerprint GetPGPFullHash() string GetKID() keybase1.KID IsInCurrentFamily(u *User) bool GetUsername() string GetUID() keybase1.UID GetDelegatedKid() keybase1.KID GetMerkleHashMeta() (keybase1.HashMeta, error) GetParentKid() keybase1.KID VerifyReverseSig(ckf ComputedKeyFamily) error GetMerkleSeqno() keybase1.Seqno GetFirstAppearedMerkleSeqnoUnverified() keybase1.Seqno GetDevice() *Device DoOwnNewLinkFromServerNotifications(g *GlobalContext) ToSigChainLocation() keybase1.SigChainLocation // contains filtered or unexported methods }
type UI ¶
type UI interface { GetIdentifyUI() IdentifyUI GetIdentifyTrackUI() IdentifyUI GetLoginUI() LoginUI GetSecretUI() SecretUI GetTerminalUI() TerminalUI GetDumbOutputUI() DumbOutputUI GetProveUI() ProveUI GetLogUI() LogUI GetGPGUI() GPGUI GetProvisionUI(role KexRole) ProvisionUI GetPgpUI() PgpUI Configure() error Shutdown() error }
type UIConsumer ¶
type UIConsumer interface { Name() string RequiredUIs() []UIKind SubConsumers() []UIConsumer }
type UIDMapper ¶ added in v1.0.33
type UIDMapper interface { // CheckUIDAginstUsername makes sure that the UID actually does map to the given username. // For new UIDs, it's a question of just SHA2'ing. For legacy usernames, we check the // hardcoded map. CheckUIDAgainstUsername(uid keybase1.UID, un NormalizedUsername) bool // MapUIDToUsernamePackages maps the given set of UIDs to the username packages, which include // a username and a fullname, and when the mapping was loaded from the server. It blocks // on the network until all usernames are known. If the `forceNetworkForFullNames` flag is specified, // it will block on the network too. If the flag is not specified, then stale values (or unknown values) // are OK, we won't go to network if we lack them. All network calls are limited by the given timeBudget, // or if 0 is specified, there is indefinite budget. In the response, a nil FullNamePackage means that the // lookup failed. A non-nil FullNamePackage means that some previous lookup worked, but // might be arbitrarily out of date (depending on the cachedAt time). A non-nil FullNamePackage // with an empty fullName field means that the user just hasn't supplied a fullName. // // *NOTE* that this function can return useful data and an error. In this regard, the error is more // like a warning. But if, for instance, the mapper runs out of time budget, it will return the data MapUIDsToUsernamePackages(ctx context.Context, g UIDMapperContext, uids []keybase1.UID, fullNameFreshness time.Duration, networktimeBudget time.Duration, forceNetworkForFullNames bool) ([]UsernamePackage, error) // SetTestingNoCachingMode puts the UID mapper into a mode where it never serves cached results, *strictly // for use in tests* SetTestingNoCachingMode(enabled bool) // ClearUID is called to clear the given UID out of the cache, if the given eldest // seqno doesn't match what's currently cached. ClearUIDAtEldestSeqno(context.Context, UIDMapperContext, keybase1.UID, keybase1.Seqno) error // InformOfEldestSeqno informs the mapper of an up-to-date (uid,eldestSeqno) pair. // If the cache has a different value, it will clear the cache and then plumb // the pair all the way through to the server, whose cache may also be in need // of busting. Will return true if the cached value was up-to-date, and false // otherwise. InformOfEldestSeqno(context.Context, UIDMapperContext, keybase1.UserVersion) (bool, error) }
type UIDMapperContext ¶ added in v1.0.33
type UIDMapperContext interface { VLogContext APIContext KVStoreContext ClockContext }
type UIDMismatchError ¶
type UIDMismatchError struct {
Msg string
}
func NewUIDMismatchError ¶
func NewUIDMismatchError(m string) UIDMismatchError
func (UIDMismatchError) Error ¶
func (u UIDMismatchError) Error() string
type UIDelegationUnavailableError ¶
type UIDelegationUnavailableError struct{}
func (UIDelegationUnavailableError) Error ¶
func (e UIDelegationUnavailableError) Error() string
func (UIDelegationUnavailableError) ToStatus ¶
func (e UIDelegationUnavailableError) ToStatus() keybase1.Status
type UIRouter ¶
type UIRouter interface { SetUI(ConnectionID, UIKind) // These are allowed to return nil for the UI even if // error is nil. GetIdentifyUI() (IdentifyUI, error) GetIdentifyUICtx(ctx context.Context) (int, IdentifyUI, error) GetSecretUI(sessionID int) (SecretUI, error) GetRekeyUI() (keybase1.RekeyUIInterface, int, error) GetRekeyUINoSessionID() (keybase1.RekeyUIInterface, error) GetHomeUI() (keybase1.HomeUIInterface, error) Shutdown() }
type UIs ¶
type UIs struct { GPGUI GPGUI LogUI LogUI LoginUI LoginUI SecretUI SecretUI IdentifyUI IdentifyUI PgpUI PgpUI ProveUI ProveUI ProvisionUI ProvisionUI SaltpackUI SaltpackUI // Usually set to `NONE`, meaning none specified. // But if we know it, specify the end client type here // since some things like GPG shell-out work differently // depending. ClientType keybase1.ClientType // Special-case flag for identifyUI -- if it's been delegated // to the electron UI, then it's rate-limitable IdentifyUIIsDelegated bool SessionID int }
type UPAKLoader ¶ added in v1.0.19
type UPAKLoader interface { ClearMemory() Load(arg LoadUserArg) (ret *keybase1.UserPlusAllKeys, user *User, err error) LoadV2(arg LoadUserArg) (ret *keybase1.UserPlusKeysV2AllIncarnations, user *User, err error) CheckKIDForUID(ctx context.Context, uid keybase1.UID, kid keybase1.KID) (found bool, revokedAt *keybase1.KeybaseTime, deleted bool, err error) LoadUserPlusKeys(ctx context.Context, uid keybase1.UID, pollForKID keybase1.KID) (keybase1.UserPlusKeys, error) LoadKeyV2(ctx context.Context, uid keybase1.UID, kid keybase1.KID) (*keybase1.UserPlusKeysV2, *keybase1.PublicKeyV2NaCl, map[keybase1.Seqno]keybase1.LinkID, error) Invalidate(ctx context.Context, uid keybase1.UID) LoadDeviceKey(ctx context.Context, uid keybase1.UID, deviceID keybase1.DeviceID) (upak *keybase1.UserPlusAllKeys, deviceKey *keybase1.PublicKey, revoked *keybase1.RevokedKey, err error) LoadUPAKWithDeviceID(ctx context.Context, uid keybase1.UID, deviceID keybase1.DeviceID) (*keybase1.UserPlusKeysV2AllIncarnations, error) LookupUsername(ctx context.Context, uid keybase1.UID) (NormalizedUsername, error) LookupUsernameUPAK(ctx context.Context, uid keybase1.UID) (NormalizedUsername, error) LookupUID(ctx context.Context, un NormalizedUsername) (keybase1.UID, error) LookupUsernameAndDevice(ctx context.Context, uid keybase1.UID, did keybase1.DeviceID) (username NormalizedUsername, deviceName string, deviceType string, err error) ListFollowedUIDs(ctx context.Context, uid keybase1.UID) ([]keybase1.UID, error) PutUserToCache(ctx context.Context, user *User) error LoadV2WithKID(ctx context.Context, uid keybase1.UID, kid keybase1.KID) (*keybase1.UserPlusKeysV2AllIncarnations, error) CheckDeviceForUIDAndUsername(ctx context.Context, uid keybase1.UID, did keybase1.DeviceID, n NormalizedUsername) error Batcher(ctx context.Context, getArg func(int) *LoadUserArg, processResult func(int, *keybase1.UserPlusKeysV2AllIncarnations), window int) (err error) }
UPAK Loader is a loader for UserPlusKeysV2AllIncarnations. It's a thin user object that is almost as good for many purposes, but can be safely copied and serialized.
func NewUncachedUPAKLoader ¶ added in v1.0.19
func NewUncachedUPAKLoader(g *GlobalContext) UPAKLoader
NewUncachedUPAKLoader creates a UPAK loader that doesn't do any caching. It uses the implementation of CachedUPAKLoader but disables all caching.
type UTF16UnsupportedError ¶ added in v1.0.19
type UTF16UnsupportedError struct{}
func (UTF16UnsupportedError) Error ¶ added in v1.0.19
func (e UTF16UnsupportedError) Error() string
type UncachedFullSelf ¶ added in v1.0.19
type UncachedFullSelf struct {
Contextified
}
func NewUncachedFullSelf ¶ added in v1.0.19
func NewUncachedFullSelf(g *GlobalContext) *UncachedFullSelf
func (*UncachedFullSelf) HandleUserChanged ¶ added in v1.0.19
func (n *UncachedFullSelf) HandleUserChanged(u keybase1.UID) error
func (*UncachedFullSelf) New ¶ added in v1.0.47
func (n *UncachedFullSelf) New() FullSelfer
func (*UncachedFullSelf) OnLogin ¶ added in v1.0.19
func (n *UncachedFullSelf) OnLogin() error
func (*UncachedFullSelf) Update ¶ added in v1.0.19
func (n *UncachedFullSelf) Update(ctx context.Context, u *User) error
func (*UncachedFullSelf) WithSelfForcePoll ¶ added in v1.0.34
func (*UncachedFullSelf) WithUser ¶ added in v1.0.19
func (n *UncachedFullSelf) WithUser(arg LoadUserArg, f func(u *User) error) error
type UnexpectedChatDataFromServer ¶ added in v1.0.18
type UnexpectedChatDataFromServer struct {
Msg string
}
func (UnexpectedChatDataFromServer) Error ¶ added in v1.0.18
func (e UnexpectedChatDataFromServer) Error() string
type UnexpectedKeyError ¶
type UnexpectedKeyError struct { }
func (UnexpectedKeyError) Error ¶
func (e UnexpectedKeyError) Error() string
type UnforwardedLoggerWithLegacyInterface ¶ added in v1.0.17
type UnhandledSignatureError ¶ added in v1.0.18
type UnhandledSignatureError struct {
// contains filtered or unexported fields
}
func (UnhandledSignatureError) Error ¶ added in v1.0.18
func (e UnhandledSignatureError) Error() string
type UnknownKeyTypeError ¶
type UnknownKeyTypeError struct {
// contains filtered or unexported fields
}
func (UnknownKeyTypeError) Error ¶
func (e UnknownKeyTypeError) Error() string
type UnknownSpecialKIDError ¶
type UnknownSpecialKIDError struct {
// contains filtered or unexported fields
}
func (UnknownSpecialKIDError) Error ¶
func (u UnknownSpecialKIDError) Error() string
type UnknownStreamError ¶
type UnknownStreamError struct{}
func (UnknownStreamError) Error ¶
func (e UnknownStreamError) Error() string
type UnlockerFunc ¶ added in v1.0.19
type UnlockerFunc func(pw string, storeSecret bool) (ret GenericKey, err error)
type UnmarshalError ¶
type UnmarshalError struct {
T string
}
func (UnmarshalError) Error ¶
func (u UnmarshalError) Error() string
type UnmetAssertionError ¶
func (UnmetAssertionError) Error ¶
func (e UnmetAssertionError) Error() string
type UntrackChainLink ¶
type UntrackChainLink struct { GenericChainLink // contains filtered or unexported fields }
func ParseUntrackChainLink ¶
func ParseUntrackChainLink(b GenericChainLink) (ret *UntrackChainLink, err error)
func (*UntrackChainLink) DoOwnNewLinkFromServerNotifications ¶
func (u *UntrackChainLink) DoOwnNewLinkFromServerNotifications(g *GlobalContext)
func (*UntrackChainLink) IsRevocationIsh ¶
func (u *UntrackChainLink) IsRevocationIsh() bool
func (*UntrackChainLink) ToDisplayString ¶
func (u *UntrackChainLink) ToDisplayString() string
func (*UntrackChainLink) Type ¶
func (u *UntrackChainLink) Type() string
type UntrackError ¶
type UntrackError struct {
// contains filtered or unexported fields
}
func NewUntrackError ¶
func NewUntrackError(d string, a ...interface{}) UntrackError
func (UntrackError) Error ¶
func (e UntrackError) Error() string
type UpdaterConfigReader ¶ added in v1.0.16
type UpdaterConfigReader interface {
GetInstallID() InstallID
}
type Usage ¶
type Usage struct { Config bool GpgKeyring bool KbKeyring bool API bool Socket bool AllowRoot bool }
func (Usage) UseKeyring ¶
type User ¶
type User struct { Contextified // contains filtered or unexported fields }
func LoadMe ¶
func LoadMe(arg LoadUserArg) (*User, error)
func LoadMeByMetaContextAndUID ¶
func LoadMeByMetaContextAndUID(m MetaContext, uid keybase1.UID) (*User, error)
func LoadMeByUID ¶
func LoadUser ¶
func LoadUser(arg LoadUserArg) (ret *User, err error)
func LoadUserFromLocalStorage ¶ added in v1.0.22
func LoadUserFromLocalStorage(m MetaContext, uid keybase1.UID) (u *User, err error)
func LoadUserFromServer ¶ added in v1.0.17
func NewUserFromLocalStorage ¶
func NewUserFromLocalStorage(g *GlobalContext, o *jsonw.Wrapper) (*User, error)
func NewUserFromServer ¶
func NewUserFromServer(g *GlobalContext, o *jsonw.Wrapper) (*User, error)
func (*User) AllSyncedSecretKeys ¶
func (u *User) AllSyncedSecretKeys(m MetaContext) (keys []*SKB, err error)
AllSyncedSecretKeys returns all the PGP key blocks that were synced to API server. LoginContext can be nil if this isn't used while logging in, signing up.
func (*User) BaseProofSet ¶
BaseProofSet creates a basic proof set for a user with their keybase and uid proofs and any pgp fingerprint proofs.
func (*User) CheckBasicsFreshness ¶
func (*User) CryptocurrencySig ¶
func (u *User) CryptocurrencySig(m MetaContext, key GenericKey, address string, typ CryptocurrencyType, sigToRevoke keybase1.SigID, merkleRoot *MerkleRoot, sigVersion SigVersion) (*jsonw.Wrapper, error)
func (*User) DeviceNames ¶
func (*User) ExportRemoteTracks ¶ added in v1.0.19
func (u *User) ExportRemoteTracks() []keybase1.RemoteTrack
NOTE: This list *must* be in sorted order. If we ever write V3, be careful to keep it sorted!
func (*User) ExportToUPKV2AllIncarnations ¶ added in v1.0.27
func (u *User) ExportToUPKV2AllIncarnations() (*keybase1.UserPlusKeysV2AllIncarnations, error)
func (*User) ExportToUserPlusAllKeys ¶ added in v1.0.19
func (u *User) ExportToUserPlusAllKeys() keybase1.UserPlusAllKeys
func (*User) ExportToUserPlusKeys ¶
func (u *User) ExportToUserPlusKeys() keybase1.UserPlusKeys
func (*User) ExportToVersionVector ¶
func (u *User) ExportToVersionVector() keybase1.UserVersionVector
func (*User) FilterActivePGPKeys ¶
func (u *User) FilterActivePGPKeys(sibkey bool, query string) []*PGPKeyBundle
FilterActivePGPKeys returns the active pgp keys that match query.
func (*User) GetActivePGPFingerprints ¶
func (u *User) GetActivePGPFingerprints(sibkey bool) (ret []PGPFingerprint)
GetActivePGPFingerprints looks into the user's ComputedKeyFamily and returns only the fingerprint of the active PGP keys. If you want only sibkeys, then // specify sibkey=true.
func (*User) GetActivePGPKeys ¶
func (u *User) GetActivePGPKeys(sibkey bool) (ret []*PGPKeyBundle)
GetActivePGPKeys looks into the user's ComputedKeyFamily and returns only the active PGP keys. If you want only sibkeys, then specify sibkey=true.
func (*User) GetComputedKeyFamily ¶
func (u *User) GetComputedKeyFamily() (ret *ComputedKeyFamily)
func (*User) GetComputedKeyInfos ¶
func (u *User) GetComputedKeyInfos() *ComputedKeyInfos
func (*User) GetCurrentEldestSeqno ¶ added in v1.0.27
func (*User) GetDeviceSibkey ¶
func (u *User) GetDeviceSibkey() (GenericKey, error)
func (*User) GetDeviceSubkey ¶
func (u *User) GetDeviceSubkey() (subkey GenericKey, err error)
func (*User) GetEldestKID ¶
May return an empty KID
func (*User) GetIDVersion ¶
func (*User) GetKeyFamily ¶
func (*User) GetNormalizedName ¶
func (u *User) GetNormalizedName() NormalizedUsername
func (*User) GetPublicChainTail ¶
func (u *User) GetPublicChainTail() *MerkleTriple
func (*User) GetSigChainLastKnownID ¶ added in v1.0.43
func (*User) GetSigChainLastKnownSeqno ¶
func (*User) GetSigHintsVersion ¶
func (*User) GetSigIDFromSeqno ¶
func (*User) GetStatus ¶ added in v1.0.31
func (u *User) GetStatus() keybase1.StatusCode
func (*User) GetSyncedSecretKey ¶
func (u *User) GetSyncedSecretKey(m MetaContext) (ret *SKB, err error)
func (*User) HasActiveKey ¶
func (*User) HasCurrentDeviceInCurrentInstall ¶
func (*User) HasDeviceInCurrentInstall ¶
Returns whether or not the current install has an active device sibkey.
func (*User) HasEncryptionSubkey ¶
func (*User) IDTable ¶
func (u *User) IDTable() *IdentityTable
func (*User) IsCachedIdentifyFresh ¶
func (u *User) IsCachedIdentifyFresh(upk *keybase1.UserPlusKeysV2AllIncarnations) bool
func (*User) LoadSigChains ¶
func (u *User) LoadSigChains(m MetaContext, f *MerkleUserLeaf, self bool) (err error)
func (*User) MakeIDTable ¶
func (User) PartialCopy ¶ added in v1.0.19
PartialCopy copies some fields of the User object, but not all. For instance, it doesn't copy the SigChain or IDTable, and it only makes a shallow copy of the ComputedKeyFamily.
func (*User) RevokeKeysProof ¶
func (u *User) RevokeKeysProof(m MetaContext, key GenericKey, kidsToRevoke []keybase1.KID, deviceToDisable keybase1.DeviceID, merkleRoot *MerkleRoot) (*jsonw.Wrapper, error)
func (*User) RevokeSigsProof ¶
func (u *User) RevokeSigsProof(m MetaContext, key GenericKey, sigIDsToRevoke []keybase1.SigID, merkleRoot *MerkleRoot) (*jsonw.Wrapper, error)
func (*User) ServiceProof ¶
func (u *User) ServiceProof(m MetaContext, signingKey GenericKey, typ ServiceType, remotename string, sigVersion SigVersion) (ret *jsonw.Wrapper, err error)
func (*User) SigChainBumpMT ¶
func (u *User) SigChainBumpMT(mt MerkleTriple)
func (*User) SigChainDump ¶
func (*User) SigningKeyPub ¶
func (u *User) SigningKeyPub() (GenericKey, error)
func (*User) StellarAccountID ¶
Return the active stellar public address for a user. Returns nil if there is none or it has not been loaded.
func (*User) Store ¶
func (u *User) Store(m MetaContext) error
func (*User) StoreSigChain ¶
func (u *User) StoreSigChain(m MetaContext) error
func (*User) StoreTopLevel ¶
func (u *User) StoreTopLevel(m MetaContext) error
func (*User) SyncSecrets ¶
func (u *User) SyncSecrets(m MetaContext) error
func (*User) SyncedSecretKey ¶
func (u *User) SyncedSecretKey(m MetaContext) (ret *SKB, err error)
func (*User) TmpTrackChainLinkFor ¶
func (u *User) TmpTrackChainLinkFor(m MetaContext, username string, uid keybase1.UID) (tcl *TrackChainLink, err error)
func (*User) ToTrackingStatement ¶
func (u *User) ToTrackingStatement(w *jsonw.Wrapper, outcome *IdentifyOutcome) (err error)
func (*User) ToTrackingStatementBasics ¶
func (*User) ToTrackingStatementKey ¶
func (*User) ToTrackingStatementPGPKeys ¶
func (*User) ToTrackingStatementSeqTail ¶
func (*User) ToUntrackingStatement ¶
func (*User) ToUntrackingStatementBasics ¶
func (*User) ToUserForSignatures ¶ added in v1.0.48
func (u *User) ToUserForSignatures() (ret UserForSignatures)
func (*User) ToUserVersion ¶ added in v1.0.27
func (u *User) ToUserVersion() keybase1.UserVersion
func (*User) TrackChainLinkFor ¶
func (u *User) TrackChainLinkFor(m MetaContext, username NormalizedUsername, uid keybase1.UID) (*TrackChainLink, error)
func (*User) TrackingProofFor ¶
func (u *User) TrackingProofFor(m MetaContext, signingKey GenericKey, sigVersion SigVersion, u2 *User, outcome *IdentifyOutcome) (ret *jsonw.Wrapper, err error)
func (*User) UntrackingProofFor ¶
func (u *User) UntrackingProofFor(m MetaContext, signingKey GenericKey, sigVersion SigVersion, u2 *User) (ret *jsonw.Wrapper, err error)
func (*User) UpdateEmailProof ¶ added in v1.0.18
func (u *User) UpdateEmailProof(m MetaContext, key GenericKey, newEmail string) (*jsonw.Wrapper, error)
func (*User) UpdatePassphraseProof ¶
func (u *User) UpdatePassphraseProof(m MetaContext, key GenericKey, pwh string, ppGen PassphraseGeneration, pdpka5kid string) (*jsonw.Wrapper, error)
func (*User) VerifySelfSig ¶
func (*User) VerifySelfSigByKey ¶
type UserCardCache ¶ added in v1.0.18
type UserCardCache struct {
// contains filtered or unexported fields
}
UserCardCache caches keybase1.UserCard objects in memory.
func NewUserCardCache ¶ added in v1.0.18
func NewUserCardCache(maxAge time.Duration) *UserCardCache
NewUserCardCache creates a UserCardCache. keybase1.UserCards will expire after maxAge.
func (*UserCardCache) Delete ¶ added in v1.0.19
func (c *UserCardCache) Delete(uid keybase1.UID) error
func (*UserCardCache) Get ¶ added in v1.0.18
Get looks for a keybase1.UserCard for uid. It returns nil, nil if not found. useSession is set if the card is being looked up with a session.
func (*UserCardCache) Set ¶ added in v1.0.18
func (c *UserCardCache) Set(card *keybase1.UserCard, usedSession bool) error
Set stores card in the UserCardCache. usedSession is set based on whether user/card was looked up with a session or not.
func (*UserCardCache) Shutdown ¶ added in v1.0.18
func (c *UserCardCache) Shutdown()
Shutdown stops any goroutines in the cache.
type UserChangedHandler ¶ added in v1.0.19
type UserChangedHandler interface { // HandlerUserChanged is called when the with User with the given UID has // changed, either because of a sigchain change, or a profile change. HandleUserChanged(uid keybase1.UID) error }
UserChangedHandler is a generic interface for handling user changed events. If the call returns an error, we'll remove this handler from the list, under the supposition that it's now dead.
type UserConfig ¶
type UserConfig struct { ID string `json:"id"` Name NormalizedUsername `json:"name"` Salt string `json:"salt"` Device *string `json:"device"` // contains filtered or unexported fields }
func ImportUserConfigFromJSONWrapper ¶
func ImportUserConfigFromJSONWrapper(jw *jsonw.Wrapper) (ret *UserConfig, err error)
func NewOneshotUserConfig ¶ added in v1.0.48
func NewOneshotUserConfig(id keybase1.UID, name NormalizedUsername, salt []byte, dev keybase1.DeviceID) *UserConfig
func NewUserConfig ¶
func NewUserConfig(id keybase1.UID, name NormalizedUsername, salt []byte, dev keybase1.DeviceID) *UserConfig
func (UserConfig) GetDeviceID ¶
func (u UserConfig) GetDeviceID() keybase1.DeviceID
func (UserConfig) GetUID ¶
func (u UserConfig) GetUID() keybase1.UID
func (UserConfig) GetUsername ¶
func (u UserConfig) GetUsername() NormalizedUsername
func (*UserConfig) Import ¶
func (u *UserConfig) Import() (err error)
func (UserConfig) IsOneshot ¶ added in v1.0.48
func (u UserConfig) IsOneshot() bool
func (*UserConfig) SetDevice ¶
func (u *UserConfig) SetDevice(d keybase1.DeviceID)
type UserConfigWrapper ¶
type UserDeletedError ¶ added in v1.0.48
type UserDeletedError struct {
Msg string
}
func (UserDeletedError) Error ¶ added in v1.0.48
func (e UserDeletedError) Error() string
func (UserDeletedError) ToStatus ¶ added in v1.0.48
func (e UserDeletedError) ToStatus() keybase1.Status
type UserEKBoxStorage ¶ added in v1.0.46
type UserEKBoxStorage interface { Put(ctx context.Context, generation keybase1.EkGeneration, userEKBoxed keybase1.UserEkBoxed) error Get(ctx context.Context, generation keybase1.EkGeneration) (keybase1.UserEk, error) MaxGeneration(ctx context.Context) (keybase1.EkGeneration, error) DeleteExpired(ctx context.Context, merkleRoot MerkleRoot) ([]keybase1.EkGeneration, error) ClearCache() }
type UserForSignatures ¶ added in v1.0.48
type UserForSignatures struct {
// contains filtered or unexported fields
}
func LoadSelfForTeamSignatures ¶ added in v1.0.48
func LoadSelfForTeamSignatures(ctx context.Context, g *GlobalContext) (ret UserForSignatures, err error)
func (UserForSignatures) GetEldestKID ¶ added in v1.0.48
func (u UserForSignatures) GetEldestKID() keybase1.KID
func (UserForSignatures) GetLatestPerUserKey ¶ added in v1.0.48
func (u UserForSignatures) GetLatestPerUserKey() *keybase1.PerUserKey
func (UserForSignatures) GetName ¶ added in v1.0.48
func (u UserForSignatures) GetName() string
func (UserForSignatures) GetNormalizedName ¶ added in v1.0.48
func (u UserForSignatures) GetNormalizedName() NormalizedUsername
func (UserForSignatures) GetUID ¶ added in v1.0.48
func (u UserForSignatures) GetUID() keybase1.UID
func (UserForSignatures) ToUserVersion ¶ added in v1.0.48
func (u UserForSignatures) ToUserVersion() keybase1.UserVersion
type UserNotFoundError ¶
func (UserNotFoundError) Error ¶
func (u UserNotFoundError) Error() string
type UserPlusKeysMemo ¶ added in v1.0.17
type UserPlusKeysMemo struct { sync.RWMutex Contextified // contains filtered or unexported fields }
func NewUserPlusKeysMemo ¶ added in v1.0.17
func NewUserPlusKeysMemo(g *GlobalContext) *UserPlusKeysMemo
func (*UserPlusKeysMemo) Clear ¶ added in v1.0.17
func (u *UserPlusKeysMemo) Clear()
func (*UserPlusKeysMemo) Get ¶ added in v1.0.17
func (u *UserPlusKeysMemo) Get(uid keybase1.UID) (keybase1.UserPlusKeys, bool)
func (*UserPlusKeysMemo) Set ¶ added in v1.0.17
func (u *UserPlusKeysMemo) Set(upk keybase1.UserPlusKeys)
type UsernamePackage ¶ added in v1.0.33
type UsernamePackage struct { NormalizedUsername NormalizedUsername FullName *keybase1.FullNamePackage }
type VDebugLevel ¶
type VDebugLevel int
const ( VLogNone VDebugLevel = iota - 1 VLog0 VLog1 VLog2 VLog3 )
type VDebugLog ¶
type VDebugLog struct {
// contains filtered or unexported fields
}
VDebugLog is a "Verbose" debug logger; enable it if you really want spam and/or minutiae
func NewVDebugLog ¶
func (*VDebugLog) CLogf ¶ added in v1.0.19
func (v *VDebugLog) CLogf(ctx context.Context, lev VDebugLevel, fs string, args ...interface{})
func (*VDebugLog) CLogfWithAddedDepth ¶
func (*VDebugLog) DumpPayload ¶ added in v1.0.27
func (*VDebugLog) DumpSiteLoadUser ¶ added in v1.0.19
func (*VDebugLog) Log ¶
func (v *VDebugLog) Log(lev VDebugLevel, fs string, args ...interface{})
type VLogContext ¶ added in v1.0.19
type VLogContext interface { LogContext GetVDebugLog() *VDebugLog }
type VerificationError ¶
type VerificationError struct{}
func (VerificationError) Error ¶
func (v VerificationError) Error() string
type VerificationPath ¶
type VerificationPath struct { Contextified // contains filtered or unexported fields }
type VerifyContext ¶ added in v1.0.18
type VerifyContext interface {
Debug(format string, args ...interface{})
}
type WaitForItError ¶
type WaitForItError struct{}
func (WaitForItError) Error ¶
func (e WaitForItError) Error() string
type WalletNetwork ¶ added in v1.0.46
type WalletNetwork string
Wallet and cryptocurrency are separate systems. Wallet links have reverse signatures, and the control secrets are in keybase. Whereas Cryptocurrency links are generally are public only and have no reverse sigs. CryptocurrencyFamily and WalletNetwork are defined next to each other so that someone will notice if they start to overlap.
const (
WalletNetworkStellar WalletNetwork = "stellar"
)
type WalletStellarChainLink ¶ added in v1.0.47
type WalletStellarChainLink struct { GenericChainLink // contains filtered or unexported fields }
func ParseWalletStellarChainLink ¶ added in v1.0.47
func ParseWalletStellarChainLink(b GenericChainLink) (ret *WalletStellarChainLink, err error)
func (*WalletStellarChainLink) ToDisplayString ¶ added in v1.0.47
func (s *WalletStellarChainLink) ToDisplayString() string
func (*WalletStellarChainLink) Type ¶ added in v1.0.47
func (s *WalletStellarChainLink) Type() string
func (*WalletStellarChainLink) VerifyReverseSig ¶ added in v1.0.47
func (s *WalletStellarChainLink) VerifyReverseSig(_ ComputedKeyFamily) (err error)
VerifyReverseSig checks a SibkeyChainLink's reverse signature using the ComputedKeyFamily provided.
type Warning ¶
type Warning interface { Warning() string Warn(g *GlobalContext) }
func ErrorToWarning ¶
type Warnings ¶
type Warnings struct {
// contains filtered or unexported fields
}
func ImportWarnings ¶
func (Warnings) Warn ¶
func (w Warnings) Warn(g *GlobalContext)
type WebProofChainLink ¶
type WebProofChainLink struct { GenericChainLink // contains filtered or unexported fields }
func NewWebProofChainLink ¶
func NewWebProofChainLink(b GenericChainLink, p, h, proofText string) *WebProofChainLink
func (*WebProofChainLink) CheckDataJSON ¶
func (w *WebProofChainLink) CheckDataJSON() *jsonw.Wrapper
func (*WebProofChainLink) ComputeTrackDiff ¶
func (w *WebProofChainLink) ComputeTrackDiff(tl *TrackLookup) (res TrackDiff)
func (*WebProofChainLink) DisplayCheck ¶
func (w *WebProofChainLink) DisplayCheck(ui IdentifyUI, lcr LinkCheckResult) error
func (*WebProofChainLink) GetHostname ¶
func (w *WebProofChainLink) GetHostname() string
func (*WebProofChainLink) GetProofType ¶
func (w *WebProofChainLink) GetProofType() keybase1.ProofType
func (*WebProofChainLink) GetProtocol ¶
func (w *WebProofChainLink) GetProtocol() string
func (*WebProofChainLink) GetRemoteUsername ¶
func (w *WebProofChainLink) GetRemoteUsername() string
func (*WebProofChainLink) LastWriterWins ¶
func (w *WebProofChainLink) LastWriterWins() bool
func (*WebProofChainLink) ProofText ¶
func (w *WebProofChainLink) ProofText() string
func (*WebProofChainLink) TableKey ¶
func (w *WebProofChainLink) TableKey() string
func (*WebProofChainLink) ToDisplayString ¶
func (w *WebProofChainLink) ToDisplayString() string
func (*WebProofChainLink) ToIDString ¶
func (w *WebProofChainLink) ToIDString() string
func (*WebProofChainLink) ToKeyValuePair ¶
func (w *WebProofChainLink) ToKeyValuePair() (string, string)
func (*WebProofChainLink) ToTrackingStatement ¶
func (w *WebProofChainLink) ToTrackingStatement(state keybase1.ProofState) (*jsonw.Wrapper, error)
func (*WebProofChainLink) Type ¶
func (w *WebProofChainLink) Type() string
type WebUnreachableError ¶
type WebUnreachableError struct {
// contains filtered or unexported fields
}
func NewWebUnreachableError ¶ added in v1.0.18
func NewWebUnreachableError(h string) WebUnreachableError
func (WebUnreachableError) Error ¶
func (h WebUnreachableError) Error() string
type Win32 ¶
type Win32 struct {
Base
}
func (Win32) RuntimeDir ¶
func (Win32) SandboxCacheDir ¶ added in v1.0.18
func (Win32) ServiceSpawnDir ¶
type WrongCryptoFormatError ¶
type WrongCryptoFormatError struct {
Wanted, Received CryptoMessageFormat
Operation string
}
func (WrongCryptoFormatError) Error ¶
func (e WrongCryptoFormatError) Error() string
func (WrongCryptoFormatError) ToStatus ¶
func (e WrongCryptoFormatError) ToStatus() keybase1.Status
type WrongKeyError ¶
type WrongKeyError struct {
// contains filtered or unexported fields
}
func (WrongKeyError) Error ¶
func (e WrongKeyError) Error() string
type WrongKidError ¶
type WrongKidError struct {
// contains filtered or unexported fields
}
func NewWrongKidError ¶ added in v1.0.27
func NewWrongKidError(w keybase1.KID, g keybase1.KID) WrongKidError
func (WrongKidError) Error ¶
func (w WrongKidError) Error() string
type WrongSigError ¶
type WrongSigError struct {
// contains filtered or unexported fields
}
func (WrongSigError) Error ¶
func (e WrongSigError) Error() string
type XAPIResType ¶ added in v1.0.18
type XAPIResType int
const ( XAPIResJSON XAPIResType = iota XAPIResHTML XAPIResText )
type XdgPosix ¶
type XdgPosix struct {
Base
}
func (XdgPosix) RuntimeDir ¶
func (XdgPosix) SandboxCacheDir ¶ added in v1.0.18
func (XdgPosix) ServiceSpawnDir ¶
Source Files ¶
- active_device.go
- all_provisioned_usernames.go
- api.go
- api_stub.go
- apiarg.go
- appstate.go
- assertion.go
- assertion_parser.go
- backoff.go
- base58.go
- base64_finder.go
- bgticker.go
- bootstrap_active_device.go
- buf.go
- bug_3964_repair.go
- bug_3964_repairman.go
- burst_cache.go
- ca.go
- cancel_timer.go
- chain_link.go
- chain_link_v2.go
- check_tracking.go
- checkers.go
- client.go
- config.go
- connectivity_monitor.go
- connmgr.go
- constants.go
- constants_devel.go
- constants_nonbrew.go
- context.go
- cryptocurrency.go
- db.go
- delegatekey.go
- delegatekeyaggregator.go
- deprovision.go
- device.go
- device_clone_state.go
- device_with_keys.go
- downgrade_leases.go
- env.go
- env_default.go
- errors.go
- expire_times.go
- features.go
- file.go
- flock.go
- flock_nix.go
- full_self_cacher.go
- generickey.go
- globals.go
- gpg_cli.go
- gpg_index.go
- gpg_key.go
- home.go
- http.go
- httpsrv.go
- httputil.go
- id_table.go
- identify2_cache.go
- identify_outcome.go
- identify_state.go
- identity.go
- interfaces.go
- invite.go
- json.go
- kbpackets.go
- kbsig.go
- kex2_router.go
- kex2_secret.go
- key_lookup.go
- key_pseudonym.go
- keyfamily.go
- keylock.go
- keymerge.go
- keyring.go
- kid.go
- leveldb.go
- link_cache.go
- lksec.go
- loaduser.go
- locktab.go
- log_profile.go
- log_send.go
- login_session.go
- login_state.go
- loopback.go
- markup.go
- merkle_client.go
- merkle_reset_chain.go
- merkle_tools.go
- naclgen.go
- naclwrap.go
- net_context.go
- nist.go
- notify_router.go
- paperkey_phrase.go
- passphrase_helper.go
- passphrase_login.go
- passphrase_stream.go
- passphrase_stream_cache.go
- payload_cache.go
- pdpka.go
- per_user_key.go
- pgp_dec.go
- pgp_enc.go
- pgp_gen.go
- pgp_key.go
- post.go
- pprof.go
- proof_cache.go
- provisional_login_context.go
- proxyca.go
- pseudonym.go
- ptrace_other.go
- ratelimit.go
- remote_proof_links.go
- reset_delete.go
- resolve.go
- rpc_exim.go
- rpc_log.go
- rpccanceller.go
- runmode.go
- saferdllloading_dummy.go
- saltpack.go
- saltpack_dec.go
- saltpack_enc.go
- saltpack_sign.go
- saltpack_verify.go
- secret_store.go
- secret_store_file.go
- secret_store_mem.go
- secret_store_other.go
- secwords.go
- service_info.go
- services.go
- session.go
- sig.go
- sig_chain.go
- sig_hints.go
- sig_info.go
- sigchain_guard.go
- sign.go
- skb.go
- skb_keyring.go
- social_assertion.go
- socket.go
- socket_nix.go
- special_keys.go
- status.go
- stellar.go
- stellar_stub.go
- stream.go
- stream_classifier.go
- sync_secret.go
- sync_trackers.go
- sync_trackers2.go
- syncer.go
- tablify.go
- team_stub.go
- test_common.go
- timer.go
- tmpfile.go
- tor.go
- track.go
- track_cache.go
- uid.go
- uigroup.go
- upak.go
- upak_loader.go
- updater_config.go
- upgrade_instructions.go
- user.go
- usercard_cache.go
- userconfig.go
- usermemo.go
- util.go
- util_nix.go
- vdebug.go
- version.go
- warning.go