github.com/keybase/client/go@v0.0.0-20240309051027-028f7c731f8b/protocol/keybase1/pgp.go (about)

     1  // Auto-generated to Go types and interfaces using avdl-compiler v1.4.10 (https://github.com/keybase/node-avdl-compiler)
     2  //   Input file: avdl/keybase1/pgp.avdl
     3  
     4  package keybase1
     5  
     6  import (
     7  	"fmt"
     8  	"github.com/keybase/go-framed-msgpack-rpc/rpc"
     9  	context "golang.org/x/net/context"
    10  	"time"
    11  )
    12  
    13  type SignMode int
    14  
    15  const (
    16  	SignMode_ATTACHED SignMode = 0
    17  	SignMode_DETACHED SignMode = 1
    18  	SignMode_CLEAR    SignMode = 2
    19  )
    20  
    21  func (o SignMode) DeepCopy() SignMode { return o }
    22  
    23  var SignModeMap = map[string]SignMode{
    24  	"ATTACHED": 0,
    25  	"DETACHED": 1,
    26  	"CLEAR":    2,
    27  }
    28  
    29  var SignModeRevMap = map[SignMode]string{
    30  	0: "ATTACHED",
    31  	1: "DETACHED",
    32  	2: "CLEAR",
    33  }
    34  
    35  func (e SignMode) String() string {
    36  	if v, ok := SignModeRevMap[e]; ok {
    37  		return v
    38  	}
    39  	return fmt.Sprintf("%v", int(e))
    40  }
    41  
    42  type PGPSignOptions struct {
    43  	KeyQuery  string   `codec:"keyQuery" json:"keyQuery"`
    44  	Mode      SignMode `codec:"mode" json:"mode"`
    45  	BinaryIn  bool     `codec:"binaryIn" json:"binaryIn"`
    46  	BinaryOut bool     `codec:"binaryOut" json:"binaryOut"`
    47  }
    48  
    49  func (o PGPSignOptions) DeepCopy() PGPSignOptions {
    50  	return PGPSignOptions{
    51  		KeyQuery:  o.KeyQuery,
    52  		Mode:      o.Mode.DeepCopy(),
    53  		BinaryIn:  o.BinaryIn,
    54  		BinaryOut: o.BinaryOut,
    55  	}
    56  }
    57  
    58  type PGPEncryptOptions struct {
    59  	Recipients []string `codec:"recipients" json:"recipients"`
    60  	NoSign     bool     `codec:"noSign" json:"noSign"`
    61  	NoSelf     bool     `codec:"noSelf" json:"noSelf"`
    62  	BinaryOut  bool     `codec:"binaryOut" json:"binaryOut"`
    63  	KeyQuery   string   `codec:"keyQuery" json:"keyQuery"`
    64  }
    65  
    66  func (o PGPEncryptOptions) DeepCopy() PGPEncryptOptions {
    67  	return PGPEncryptOptions{
    68  		Recipients: (func(x []string) []string {
    69  			if x == nil {
    70  				return nil
    71  			}
    72  			ret := make([]string, len(x))
    73  			for i, v := range x {
    74  				vCopy := v
    75  				ret[i] = vCopy
    76  			}
    77  			return ret
    78  		})(o.Recipients),
    79  		NoSign:    o.NoSign,
    80  		NoSelf:    o.NoSelf,
    81  		BinaryOut: o.BinaryOut,
    82  		KeyQuery:  o.KeyQuery,
    83  	}
    84  }
    85  
    86  // PGPSigVerification is returned by pgpDecrypt and pgpVerify with information
    87  // about the signature verification. If isSigned is false, there was no
    88  // signature, and the rest of the fields should be ignored.
    89  type PGPSigVerification struct {
    90  	IsSigned bool      `codec:"isSigned" json:"isSigned"`
    91  	Verified bool      `codec:"verified" json:"verified"`
    92  	Signer   User      `codec:"signer" json:"signer"`
    93  	SignKey  PublicKey `codec:"signKey" json:"signKey"`
    94  	Warnings []string  `codec:"warnings" json:"warnings"`
    95  }
    96  
    97  func (o PGPSigVerification) DeepCopy() PGPSigVerification {
    98  	return PGPSigVerification{
    99  		IsSigned: o.IsSigned,
   100  		Verified: o.Verified,
   101  		Signer:   o.Signer.DeepCopy(),
   102  		SignKey:  o.SignKey.DeepCopy(),
   103  		Warnings: (func(x []string) []string {
   104  			if x == nil {
   105  				return nil
   106  			}
   107  			ret := make([]string, len(x))
   108  			for i, v := range x {
   109  				vCopy := v
   110  				ret[i] = vCopy
   111  			}
   112  			return ret
   113  		})(o.Warnings),
   114  	}
   115  }
   116  
   117  type PGPDecryptOptions struct {
   118  	AssertSigned bool   `codec:"assertSigned" json:"assertSigned"`
   119  	SignedBy     string `codec:"signedBy" json:"signedBy"`
   120  }
   121  
   122  func (o PGPDecryptOptions) DeepCopy() PGPDecryptOptions {
   123  	return PGPDecryptOptions{
   124  		AssertSigned: o.AssertSigned,
   125  		SignedBy:     o.SignedBy,
   126  	}
   127  }
   128  
   129  type PGPVerifyOptions struct {
   130  	SignedBy  string `codec:"signedBy" json:"signedBy"`
   131  	Signature []byte `codec:"signature" json:"signature"`
   132  }
   133  
   134  func (o PGPVerifyOptions) DeepCopy() PGPVerifyOptions {
   135  	return PGPVerifyOptions{
   136  		SignedBy: o.SignedBy,
   137  		Signature: (func(x []byte) []byte {
   138  			if x == nil {
   139  				return nil
   140  			}
   141  			return append([]byte{}, x...)
   142  		})(o.Signature),
   143  	}
   144  }
   145  
   146  type KeyInfo struct {
   147  	Fingerprint string `codec:"fingerprint" json:"fingerprint"`
   148  	Key         string `codec:"key" json:"key"`
   149  	Desc        string `codec:"desc" json:"desc"`
   150  }
   151  
   152  func (o KeyInfo) DeepCopy() KeyInfo {
   153  	return KeyInfo{
   154  		Fingerprint: o.Fingerprint,
   155  		Key:         o.Key,
   156  		Desc:        o.Desc,
   157  	}
   158  }
   159  
   160  type PGPQuery struct {
   161  	Secret     bool   `codec:"secret" json:"secret"`
   162  	Query      string `codec:"query" json:"query"`
   163  	ExactMatch bool   `codec:"exactMatch" json:"exactMatch"`
   164  }
   165  
   166  func (o PGPQuery) DeepCopy() PGPQuery {
   167  	return PGPQuery{
   168  		Secret:     o.Secret,
   169  		Query:      o.Query,
   170  		ExactMatch: o.ExactMatch,
   171  	}
   172  }
   173  
   174  type PGPCreateUids struct {
   175  	UseDefault bool          `codec:"useDefault" json:"useDefault"`
   176  	Ids        []PGPIdentity `codec:"ids" json:"ids"`
   177  }
   178  
   179  func (o PGPCreateUids) DeepCopy() PGPCreateUids {
   180  	return PGPCreateUids{
   181  		UseDefault: o.UseDefault,
   182  		Ids: (func(x []PGPIdentity) []PGPIdentity {
   183  			if x == nil {
   184  				return nil
   185  			}
   186  			ret := make([]PGPIdentity, len(x))
   187  			for i, v := range x {
   188  				vCopy := v.DeepCopy()
   189  				ret[i] = vCopy
   190  			}
   191  			return ret
   192  		})(o.Ids),
   193  	}
   194  }
   195  
   196  // Export all pgp keys in lksec, then if doPurge is true, remove the keys from lksec.
   197  type PGPPurgeRes struct {
   198  	Filenames []string `codec:"filenames" json:"filenames"`
   199  }
   200  
   201  func (o PGPPurgeRes) DeepCopy() PGPPurgeRes {
   202  	return PGPPurgeRes{
   203  		Filenames: (func(x []string) []string {
   204  			if x == nil {
   205  				return nil
   206  			}
   207  			ret := make([]string, len(x))
   208  			for i, v := range x {
   209  				vCopy := v
   210  				ret[i] = vCopy
   211  			}
   212  			return ret
   213  		})(o.Filenames),
   214  	}
   215  }
   216  
   217  type PGPSignArg struct {
   218  	SessionID int            `codec:"sessionID" json:"sessionID"`
   219  	Source    Stream         `codec:"source" json:"source"`
   220  	Sink      Stream         `codec:"sink" json:"sink"`
   221  	Opts      PGPSignOptions `codec:"opts" json:"opts"`
   222  }
   223  
   224  type PGPPullArg struct {
   225  	SessionID   int      `codec:"sessionID" json:"sessionID"`
   226  	UserAsserts []string `codec:"userAsserts" json:"userAsserts"`
   227  }
   228  
   229  type PGPEncryptArg struct {
   230  	SessionID int               `codec:"sessionID" json:"sessionID"`
   231  	Source    Stream            `codec:"source" json:"source"`
   232  	Sink      Stream            `codec:"sink" json:"sink"`
   233  	Opts      PGPEncryptOptions `codec:"opts" json:"opts"`
   234  }
   235  
   236  type PGPDecryptArg struct {
   237  	SessionID int               `codec:"sessionID" json:"sessionID"`
   238  	Source    Stream            `codec:"source" json:"source"`
   239  	Sink      Stream            `codec:"sink" json:"sink"`
   240  	Opts      PGPDecryptOptions `codec:"opts" json:"opts"`
   241  }
   242  
   243  type PGPVerifyArg struct {
   244  	SessionID int              `codec:"sessionID" json:"sessionID"`
   245  	Source    Stream           `codec:"source" json:"source"`
   246  	Opts      PGPVerifyOptions `codec:"opts" json:"opts"`
   247  }
   248  
   249  type PGPImportArg struct {
   250  	SessionID  int    `codec:"sessionID" json:"sessionID"`
   251  	Key        []byte `codec:"key" json:"key"`
   252  	PushSecret bool   `codec:"pushSecret" json:"pushSecret"`
   253  }
   254  
   255  type PGPExportArg struct {
   256  	SessionID int      `codec:"sessionID" json:"sessionID"`
   257  	Options   PGPQuery `codec:"options" json:"options"`
   258  	Encrypted bool     `codec:"encrypted" json:"encrypted"`
   259  }
   260  
   261  type PGPExportByFingerprintArg struct {
   262  	SessionID int      `codec:"sessionID" json:"sessionID"`
   263  	Options   PGPQuery `codec:"options" json:"options"`
   264  	Encrypted bool     `codec:"encrypted" json:"encrypted"`
   265  }
   266  
   267  type PGPExportByKIDArg struct {
   268  	SessionID int      `codec:"sessionID" json:"sessionID"`
   269  	Options   PGPQuery `codec:"options" json:"options"`
   270  	Encrypted bool     `codec:"encrypted" json:"encrypted"`
   271  }
   272  
   273  type PGPKeyGenArg struct {
   274  	SessionID       int           `codec:"sessionID" json:"sessionID"`
   275  	PrimaryBits     int           `codec:"primaryBits" json:"primaryBits"`
   276  	SubkeyBits      int           `codec:"subkeyBits" json:"subkeyBits"`
   277  	CreateUids      PGPCreateUids `codec:"createUids" json:"createUids"`
   278  	AllowMulti      bool          `codec:"allowMulti" json:"allowMulti"`
   279  	DoExport        bool          `codec:"doExport" json:"doExport"`
   280  	ExportEncrypted bool          `codec:"exportEncrypted" json:"exportEncrypted"`
   281  	PushSecret      bool          `codec:"pushSecret" json:"pushSecret"`
   282  }
   283  
   284  type PGPKeyGenDefaultArg struct {
   285  	SessionID  int           `codec:"sessionID" json:"sessionID"`
   286  	CreateUids PGPCreateUids `codec:"createUids" json:"createUids"`
   287  }
   288  
   289  type PGPDeletePrimaryArg struct {
   290  	SessionID int `codec:"sessionID" json:"sessionID"`
   291  }
   292  
   293  type PGPSelectArg struct {
   294  	SessionID        int    `codec:"sessionID" json:"sessionID"`
   295  	FingerprintQuery string `codec:"fingerprintQuery" json:"fingerprintQuery"`
   296  	AllowMulti       bool   `codec:"allowMulti" json:"allowMulti"`
   297  	SkipImport       bool   `codec:"skipImport" json:"skipImport"`
   298  	OnlyImport       bool   `codec:"onlyImport" json:"onlyImport"`
   299  }
   300  
   301  type PGPUpdateArg struct {
   302  	SessionID    int      `codec:"sessionID" json:"sessionID"`
   303  	All          bool     `codec:"all" json:"all"`
   304  	Fingerprints []string `codec:"fingerprints" json:"fingerprints"`
   305  }
   306  
   307  type PGPPurgeArg struct {
   308  	SessionID int  `codec:"sessionID" json:"sessionID"`
   309  	DoPurge   bool `codec:"doPurge" json:"doPurge"`
   310  }
   311  
   312  type PGPStorageDismissArg struct {
   313  	SessionID int `codec:"sessionID" json:"sessionID"`
   314  }
   315  
   316  type PGPPushPrivateArg struct {
   317  	SessionID    int              `codec:"sessionID" json:"sessionID"`
   318  	Fingerprints []PGPFingerprint `codec:"fingerprints" json:"fingerprints"`
   319  }
   320  
   321  type PGPPullPrivateArg struct {
   322  	SessionID    int              `codec:"sessionID" json:"sessionID"`
   323  	Fingerprints []PGPFingerprint `codec:"fingerprints" json:"fingerprints"`
   324  }
   325  
   326  type PGPInterface interface {
   327  	PGPSign(context.Context, PGPSignArg) error
   328  	// Download PGP keys for tracked users and update the local GPG keyring.
   329  	// If usernames is nonempty, update only those users.
   330  	PGPPull(context.Context, PGPPullArg) error
   331  	PGPEncrypt(context.Context, PGPEncryptArg) error
   332  	PGPDecrypt(context.Context, PGPDecryptArg) (PGPSigVerification, error)
   333  	PGPVerify(context.Context, PGPVerifyArg) (PGPSigVerification, error)
   334  	PGPImport(context.Context, PGPImportArg) error
   335  	// Exports active PGP keys. Only allows armored export.
   336  	PGPExport(context.Context, PGPExportArg) ([]KeyInfo, error)
   337  	PGPExportByFingerprint(context.Context, PGPExportByFingerprintArg) ([]KeyInfo, error)
   338  	PGPExportByKID(context.Context, PGPExportByKIDArg) ([]KeyInfo, error)
   339  	PGPKeyGen(context.Context, PGPKeyGenArg) error
   340  	PGPKeyGenDefault(context.Context, PGPKeyGenDefaultArg) error
   341  	PGPDeletePrimary(context.Context, int) error
   342  	// Select an existing key and add to Keybase.
   343  	PGPSelect(context.Context, PGPSelectArg) error
   344  	// Push updated key(s) to the server.
   345  	PGPUpdate(context.Context, PGPUpdateArg) error
   346  	PGPPurge(context.Context, PGPPurgeArg) (PGPPurgeRes, error)
   347  	// Dismiss the PGP unlock via secret_store_file notification.
   348  	PGPStorageDismiss(context.Context, int) error
   349  	// push the PGP key that matches the given fingerprints from GnuPG to KBFS. If it is empty, then
   350  	// push all matching PGP keys in the user's sigchain.
   351  	PGPPushPrivate(context.Context, PGPPushPrivateArg) error
   352  	// pull the given PGP keys from KBFS to the local GnuPG keychain. If it is empty, then
   353  	// attempt to pull all matching PGP keys in the user's sigchain.
   354  	PGPPullPrivate(context.Context, PGPPullPrivateArg) error
   355  }
   356  
   357  func PGPProtocol(i PGPInterface) rpc.Protocol {
   358  	return rpc.Protocol{
   359  		Name: "keybase.1.pgp",
   360  		Methods: map[string]rpc.ServeHandlerDescription{
   361  			"pgpSign": {
   362  				MakeArg: func() interface{} {
   363  					var ret [1]PGPSignArg
   364  					return &ret
   365  				},
   366  				Handler: func(ctx context.Context, args interface{}) (ret interface{}, err error) {
   367  					typedArgs, ok := args.(*[1]PGPSignArg)
   368  					if !ok {
   369  						err = rpc.NewTypeError((*[1]PGPSignArg)(nil), args)
   370  						return
   371  					}
   372  					err = i.PGPSign(ctx, typedArgs[0])
   373  					return
   374  				},
   375  			},
   376  			"pgpPull": {
   377  				MakeArg: func() interface{} {
   378  					var ret [1]PGPPullArg
   379  					return &ret
   380  				},
   381  				Handler: func(ctx context.Context, args interface{}) (ret interface{}, err error) {
   382  					typedArgs, ok := args.(*[1]PGPPullArg)
   383  					if !ok {
   384  						err = rpc.NewTypeError((*[1]PGPPullArg)(nil), args)
   385  						return
   386  					}
   387  					err = i.PGPPull(ctx, typedArgs[0])
   388  					return
   389  				},
   390  			},
   391  			"pgpEncrypt": {
   392  				MakeArg: func() interface{} {
   393  					var ret [1]PGPEncryptArg
   394  					return &ret
   395  				},
   396  				Handler: func(ctx context.Context, args interface{}) (ret interface{}, err error) {
   397  					typedArgs, ok := args.(*[1]PGPEncryptArg)
   398  					if !ok {
   399  						err = rpc.NewTypeError((*[1]PGPEncryptArg)(nil), args)
   400  						return
   401  					}
   402  					err = i.PGPEncrypt(ctx, typedArgs[0])
   403  					return
   404  				},
   405  			},
   406  			"pgpDecrypt": {
   407  				MakeArg: func() interface{} {
   408  					var ret [1]PGPDecryptArg
   409  					return &ret
   410  				},
   411  				Handler: func(ctx context.Context, args interface{}) (ret interface{}, err error) {
   412  					typedArgs, ok := args.(*[1]PGPDecryptArg)
   413  					if !ok {
   414  						err = rpc.NewTypeError((*[1]PGPDecryptArg)(nil), args)
   415  						return
   416  					}
   417  					ret, err = i.PGPDecrypt(ctx, typedArgs[0])
   418  					return
   419  				},
   420  			},
   421  			"pgpVerify": {
   422  				MakeArg: func() interface{} {
   423  					var ret [1]PGPVerifyArg
   424  					return &ret
   425  				},
   426  				Handler: func(ctx context.Context, args interface{}) (ret interface{}, err error) {
   427  					typedArgs, ok := args.(*[1]PGPVerifyArg)
   428  					if !ok {
   429  						err = rpc.NewTypeError((*[1]PGPVerifyArg)(nil), args)
   430  						return
   431  					}
   432  					ret, err = i.PGPVerify(ctx, typedArgs[0])
   433  					return
   434  				},
   435  			},
   436  			"pgpImport": {
   437  				MakeArg: func() interface{} {
   438  					var ret [1]PGPImportArg
   439  					return &ret
   440  				},
   441  				Handler: func(ctx context.Context, args interface{}) (ret interface{}, err error) {
   442  					typedArgs, ok := args.(*[1]PGPImportArg)
   443  					if !ok {
   444  						err = rpc.NewTypeError((*[1]PGPImportArg)(nil), args)
   445  						return
   446  					}
   447  					err = i.PGPImport(ctx, typedArgs[0])
   448  					return
   449  				},
   450  			},
   451  			"pgpExport": {
   452  				MakeArg: func() interface{} {
   453  					var ret [1]PGPExportArg
   454  					return &ret
   455  				},
   456  				Handler: func(ctx context.Context, args interface{}) (ret interface{}, err error) {
   457  					typedArgs, ok := args.(*[1]PGPExportArg)
   458  					if !ok {
   459  						err = rpc.NewTypeError((*[1]PGPExportArg)(nil), args)
   460  						return
   461  					}
   462  					ret, err = i.PGPExport(ctx, typedArgs[0])
   463  					return
   464  				},
   465  			},
   466  			"pgpExportByFingerprint": {
   467  				MakeArg: func() interface{} {
   468  					var ret [1]PGPExportByFingerprintArg
   469  					return &ret
   470  				},
   471  				Handler: func(ctx context.Context, args interface{}) (ret interface{}, err error) {
   472  					typedArgs, ok := args.(*[1]PGPExportByFingerprintArg)
   473  					if !ok {
   474  						err = rpc.NewTypeError((*[1]PGPExportByFingerprintArg)(nil), args)
   475  						return
   476  					}
   477  					ret, err = i.PGPExportByFingerprint(ctx, typedArgs[0])
   478  					return
   479  				},
   480  			},
   481  			"pgpExportByKID": {
   482  				MakeArg: func() interface{} {
   483  					var ret [1]PGPExportByKIDArg
   484  					return &ret
   485  				},
   486  				Handler: func(ctx context.Context, args interface{}) (ret interface{}, err error) {
   487  					typedArgs, ok := args.(*[1]PGPExportByKIDArg)
   488  					if !ok {
   489  						err = rpc.NewTypeError((*[1]PGPExportByKIDArg)(nil), args)
   490  						return
   491  					}
   492  					ret, err = i.PGPExportByKID(ctx, typedArgs[0])
   493  					return
   494  				},
   495  			},
   496  			"pgpKeyGen": {
   497  				MakeArg: func() interface{} {
   498  					var ret [1]PGPKeyGenArg
   499  					return &ret
   500  				},
   501  				Handler: func(ctx context.Context, args interface{}) (ret interface{}, err error) {
   502  					typedArgs, ok := args.(*[1]PGPKeyGenArg)
   503  					if !ok {
   504  						err = rpc.NewTypeError((*[1]PGPKeyGenArg)(nil), args)
   505  						return
   506  					}
   507  					err = i.PGPKeyGen(ctx, typedArgs[0])
   508  					return
   509  				},
   510  			},
   511  			"pgpKeyGenDefault": {
   512  				MakeArg: func() interface{} {
   513  					var ret [1]PGPKeyGenDefaultArg
   514  					return &ret
   515  				},
   516  				Handler: func(ctx context.Context, args interface{}) (ret interface{}, err error) {
   517  					typedArgs, ok := args.(*[1]PGPKeyGenDefaultArg)
   518  					if !ok {
   519  						err = rpc.NewTypeError((*[1]PGPKeyGenDefaultArg)(nil), args)
   520  						return
   521  					}
   522  					err = i.PGPKeyGenDefault(ctx, typedArgs[0])
   523  					return
   524  				},
   525  			},
   526  			"pgpDeletePrimary": {
   527  				MakeArg: func() interface{} {
   528  					var ret [1]PGPDeletePrimaryArg
   529  					return &ret
   530  				},
   531  				Handler: func(ctx context.Context, args interface{}) (ret interface{}, err error) {
   532  					typedArgs, ok := args.(*[1]PGPDeletePrimaryArg)
   533  					if !ok {
   534  						err = rpc.NewTypeError((*[1]PGPDeletePrimaryArg)(nil), args)
   535  						return
   536  					}
   537  					err = i.PGPDeletePrimary(ctx, typedArgs[0].SessionID)
   538  					return
   539  				},
   540  			},
   541  			"pgpSelect": {
   542  				MakeArg: func() interface{} {
   543  					var ret [1]PGPSelectArg
   544  					return &ret
   545  				},
   546  				Handler: func(ctx context.Context, args interface{}) (ret interface{}, err error) {
   547  					typedArgs, ok := args.(*[1]PGPSelectArg)
   548  					if !ok {
   549  						err = rpc.NewTypeError((*[1]PGPSelectArg)(nil), args)
   550  						return
   551  					}
   552  					err = i.PGPSelect(ctx, typedArgs[0])
   553  					return
   554  				},
   555  			},
   556  			"pgpUpdate": {
   557  				MakeArg: func() interface{} {
   558  					var ret [1]PGPUpdateArg
   559  					return &ret
   560  				},
   561  				Handler: func(ctx context.Context, args interface{}) (ret interface{}, err error) {
   562  					typedArgs, ok := args.(*[1]PGPUpdateArg)
   563  					if !ok {
   564  						err = rpc.NewTypeError((*[1]PGPUpdateArg)(nil), args)
   565  						return
   566  					}
   567  					err = i.PGPUpdate(ctx, typedArgs[0])
   568  					return
   569  				},
   570  			},
   571  			"pgpPurge": {
   572  				MakeArg: func() interface{} {
   573  					var ret [1]PGPPurgeArg
   574  					return &ret
   575  				},
   576  				Handler: func(ctx context.Context, args interface{}) (ret interface{}, err error) {
   577  					typedArgs, ok := args.(*[1]PGPPurgeArg)
   578  					if !ok {
   579  						err = rpc.NewTypeError((*[1]PGPPurgeArg)(nil), args)
   580  						return
   581  					}
   582  					ret, err = i.PGPPurge(ctx, typedArgs[0])
   583  					return
   584  				},
   585  			},
   586  			"pgpStorageDismiss": {
   587  				MakeArg: func() interface{} {
   588  					var ret [1]PGPStorageDismissArg
   589  					return &ret
   590  				},
   591  				Handler: func(ctx context.Context, args interface{}) (ret interface{}, err error) {
   592  					typedArgs, ok := args.(*[1]PGPStorageDismissArg)
   593  					if !ok {
   594  						err = rpc.NewTypeError((*[1]PGPStorageDismissArg)(nil), args)
   595  						return
   596  					}
   597  					err = i.PGPStorageDismiss(ctx, typedArgs[0].SessionID)
   598  					return
   599  				},
   600  			},
   601  			"pgpPushPrivate": {
   602  				MakeArg: func() interface{} {
   603  					var ret [1]PGPPushPrivateArg
   604  					return &ret
   605  				},
   606  				Handler: func(ctx context.Context, args interface{}) (ret interface{}, err error) {
   607  					typedArgs, ok := args.(*[1]PGPPushPrivateArg)
   608  					if !ok {
   609  						err = rpc.NewTypeError((*[1]PGPPushPrivateArg)(nil), args)
   610  						return
   611  					}
   612  					err = i.PGPPushPrivate(ctx, typedArgs[0])
   613  					return
   614  				},
   615  			},
   616  			"pgpPullPrivate": {
   617  				MakeArg: func() interface{} {
   618  					var ret [1]PGPPullPrivateArg
   619  					return &ret
   620  				},
   621  				Handler: func(ctx context.Context, args interface{}) (ret interface{}, err error) {
   622  					typedArgs, ok := args.(*[1]PGPPullPrivateArg)
   623  					if !ok {
   624  						err = rpc.NewTypeError((*[1]PGPPullPrivateArg)(nil), args)
   625  						return
   626  					}
   627  					err = i.PGPPullPrivate(ctx, typedArgs[0])
   628  					return
   629  				},
   630  			},
   631  		},
   632  	}
   633  }
   634  
   635  type PGPClient struct {
   636  	Cli rpc.GenericClient
   637  }
   638  
   639  func (c PGPClient) PGPSign(ctx context.Context, __arg PGPSignArg) (err error) {
   640  	err = c.Cli.Call(ctx, "keybase.1.pgp.pgpSign", []interface{}{__arg}, nil, 0*time.Millisecond)
   641  	return
   642  }
   643  
   644  // Download PGP keys for tracked users and update the local GPG keyring.
   645  // If usernames is nonempty, update only those users.
   646  func (c PGPClient) PGPPull(ctx context.Context, __arg PGPPullArg) (err error) {
   647  	err = c.Cli.Call(ctx, "keybase.1.pgp.pgpPull", []interface{}{__arg}, nil, 0*time.Millisecond)
   648  	return
   649  }
   650  
   651  func (c PGPClient) PGPEncrypt(ctx context.Context, __arg PGPEncryptArg) (err error) {
   652  	err = c.Cli.Call(ctx, "keybase.1.pgp.pgpEncrypt", []interface{}{__arg}, nil, 0*time.Millisecond)
   653  	return
   654  }
   655  
   656  func (c PGPClient) PGPDecrypt(ctx context.Context, __arg PGPDecryptArg) (res PGPSigVerification, err error) {
   657  	err = c.Cli.Call(ctx, "keybase.1.pgp.pgpDecrypt", []interface{}{__arg}, &res, 0*time.Millisecond)
   658  	return
   659  }
   660  
   661  func (c PGPClient) PGPVerify(ctx context.Context, __arg PGPVerifyArg) (res PGPSigVerification, err error) {
   662  	err = c.Cli.Call(ctx, "keybase.1.pgp.pgpVerify", []interface{}{__arg}, &res, 0*time.Millisecond)
   663  	return
   664  }
   665  
   666  func (c PGPClient) PGPImport(ctx context.Context, __arg PGPImportArg) (err error) {
   667  	err = c.Cli.Call(ctx, "keybase.1.pgp.pgpImport", []interface{}{__arg}, nil, 0*time.Millisecond)
   668  	return
   669  }
   670  
   671  // Exports active PGP keys. Only allows armored export.
   672  func (c PGPClient) PGPExport(ctx context.Context, __arg PGPExportArg) (res []KeyInfo, err error) {
   673  	err = c.Cli.Call(ctx, "keybase.1.pgp.pgpExport", []interface{}{__arg}, &res, 0*time.Millisecond)
   674  	return
   675  }
   676  
   677  func (c PGPClient) PGPExportByFingerprint(ctx context.Context, __arg PGPExportByFingerprintArg) (res []KeyInfo, err error) {
   678  	err = c.Cli.Call(ctx, "keybase.1.pgp.pgpExportByFingerprint", []interface{}{__arg}, &res, 0*time.Millisecond)
   679  	return
   680  }
   681  
   682  func (c PGPClient) PGPExportByKID(ctx context.Context, __arg PGPExportByKIDArg) (res []KeyInfo, err error) {
   683  	err = c.Cli.Call(ctx, "keybase.1.pgp.pgpExportByKID", []interface{}{__arg}, &res, 0*time.Millisecond)
   684  	return
   685  }
   686  
   687  func (c PGPClient) PGPKeyGen(ctx context.Context, __arg PGPKeyGenArg) (err error) {
   688  	err = c.Cli.Call(ctx, "keybase.1.pgp.pgpKeyGen", []interface{}{__arg}, nil, 0*time.Millisecond)
   689  	return
   690  }
   691  
   692  func (c PGPClient) PGPKeyGenDefault(ctx context.Context, __arg PGPKeyGenDefaultArg) (err error) {
   693  	err = c.Cli.Call(ctx, "keybase.1.pgp.pgpKeyGenDefault", []interface{}{__arg}, nil, 0*time.Millisecond)
   694  	return
   695  }
   696  
   697  func (c PGPClient) PGPDeletePrimary(ctx context.Context, sessionID int) (err error) {
   698  	__arg := PGPDeletePrimaryArg{SessionID: sessionID}
   699  	err = c.Cli.Call(ctx, "keybase.1.pgp.pgpDeletePrimary", []interface{}{__arg}, nil, 0*time.Millisecond)
   700  	return
   701  }
   702  
   703  // Select an existing key and add to Keybase.
   704  func (c PGPClient) PGPSelect(ctx context.Context, __arg PGPSelectArg) (err error) {
   705  	err = c.Cli.Call(ctx, "keybase.1.pgp.pgpSelect", []interface{}{__arg}, nil, 0*time.Millisecond)
   706  	return
   707  }
   708  
   709  // Push updated key(s) to the server.
   710  func (c PGPClient) PGPUpdate(ctx context.Context, __arg PGPUpdateArg) (err error) {
   711  	err = c.Cli.Call(ctx, "keybase.1.pgp.pgpUpdate", []interface{}{__arg}, nil, 0*time.Millisecond)
   712  	return
   713  }
   714  
   715  func (c PGPClient) PGPPurge(ctx context.Context, __arg PGPPurgeArg) (res PGPPurgeRes, err error) {
   716  	err = c.Cli.Call(ctx, "keybase.1.pgp.pgpPurge", []interface{}{__arg}, &res, 0*time.Millisecond)
   717  	return
   718  }
   719  
   720  // Dismiss the PGP unlock via secret_store_file notification.
   721  func (c PGPClient) PGPStorageDismiss(ctx context.Context, sessionID int) (err error) {
   722  	__arg := PGPStorageDismissArg{SessionID: sessionID}
   723  	err = c.Cli.Call(ctx, "keybase.1.pgp.pgpStorageDismiss", []interface{}{__arg}, nil, 0*time.Millisecond)
   724  	return
   725  }
   726  
   727  // push the PGP key that matches the given fingerprints from GnuPG to KBFS. If it is empty, then
   728  // push all matching PGP keys in the user's sigchain.
   729  func (c PGPClient) PGPPushPrivate(ctx context.Context, __arg PGPPushPrivateArg) (err error) {
   730  	err = c.Cli.Call(ctx, "keybase.1.pgp.pgpPushPrivate", []interface{}{__arg}, nil, 0*time.Millisecond)
   731  	return
   732  }
   733  
   734  // pull the given PGP keys from KBFS to the local GnuPG keychain. If it is empty, then
   735  // attempt to pull all matching PGP keys in the user's sigchain.
   736  func (c PGPClient) PGPPullPrivate(ctx context.Context, __arg PGPPullPrivateArg) (err error) {
   737  	err = c.Cli.Call(ctx, "keybase.1.pgp.pgpPullPrivate", []interface{}{__arg}, nil, 0*time.Millisecond)
   738  	return
   739  }