64
64
import weechat , string , os , subprocess , base64 , time
65
65
66
66
67
- # Global buffers used to store message parts, pending requests, configuration
67
+ # Global memory used to store message parts, pending requests, configuration
68
68
# options, keys, etc.
69
- ircrypt_msg_buffer = {}
69
+ ircrypt_msg_memory = {}
70
70
ircrypt_config_file = None
71
71
ircrypt_config_section = {}
72
72
ircrypt_config_option = {}
73
73
ircrypt_keys = {}
74
74
ircrypt_asym_id = {}
75
75
ircrypt_cipher = {}
76
- ircrypt_buffer = None
77
- ircrypt_pending_requests = []
78
- ircrypt_request_buffer = {}
79
- ircrypt_pending_keys = []
80
- ircrypt_keys_buffer = {}
76
+ ircrypt_keys_memory = {}
81
77
ircrypt_gpg_binary = None
82
78
ircrypt_message_plain = {}
83
79
ircrypt_gpg_homedir = None
99
95
%(bold)sIRCrypt command options: %(normal)s
100
96
101
97
list List set keys, ids and ciphers
102
- buffer Switch to/Open IRCrypt buffer
103
98
set-key [-server <server>] <target> <key> Set key for target
104
99
remove-key [-server <server>] <target> Remove key for target
105
100
set-gpg-id [-server <server>] <nick> <id> Set public key identifier for nick
@@ -217,24 +212,23 @@ def ircrypt_public_key_send(server, args, info):
217
212
218
213
219
214
def ircrypt_public_key_get (server , args , info ):
220
- global ircrypt_keys_buffer , ircrypt_asym_id
215
+ global ircrypt_keys_memory , ircrypt_asym_id
221
216
222
217
# Get prefix, number and message
223
218
pre , message = args .split ('>KCRY-' , 1 )
224
219
number , message = message .split (' ' , 1 )
225
220
226
- # Get key for the request buffer
227
221
buf_key = (server , info ['channel' ], info ['nick' ])
228
222
229
223
# Check if we got the last part of the message otherwise put the message
230
- # into a global buffer and quit
224
+ # into a global memory and quit
231
225
if int (number ):
232
- if not buf_key in ircrypt_keys_buffer :
226
+ if not buf_key in ircrypt_keys_memory :
233
227
# - First element is list of requests
234
228
# - Second element is currently received request
235
- ircrypt_keys_buffer [buf_key ] = MessageParts ()
229
+ ircrypt_keys_memory [buf_key ] = MessageParts ()
236
230
# Add parts to current request
237
- ircrypt_keys_buffer [buf_key ].update (int (number ), message )
231
+ ircrypt_keys_memory [buf_key ].update (int (number ), message )
238
232
return ''
239
233
else :
240
234
target = ('%s/%s' % (server , info ['nick' ])).lower ()
@@ -249,7 +243,7 @@ def ircrypt_public_key_get(server, args, info):
249
243
'--import' ], stdin = subprocess .PIPE , stdout = subprocess .PIPE ,
250
244
stderr = subprocess .PIPE )
251
245
(out , err ) = p .communicate (base64 .b64decode (message +
252
- ircrypt_keys_buffer [buf_key ].message ))
246
+ ircrypt_keys_memory [buf_key ].message ))
253
247
254
248
weechat .prnt ('' , err )
255
249
@@ -273,8 +267,8 @@ def ircrypt_public_key_get(server, args, info):
273
267
274
268
# Set asymmetric identifier
275
269
ircrypt_asym_id [target .lower ()] = gpg_id
276
- # Print status message in current buffer
277
270
weechat .prnt ('' , 'Set gpg key for %s' % target )
271
+ # Print status message in current buffer
278
272
ircrypt_sym_ex (server , info ['nick' ])
279
273
return ''
280
274
@@ -384,25 +378,25 @@ def ircrypt_decrypt_sym(server, args, info, key):
384
378
:param info: dictionary created by info_get_hashtable
385
379
:param key: key for decryption
386
380
'''
387
- global ircrypt_msg_buffer , ircrypt_config_option
381
+ global ircrypt_msg_memory , ircrypt_config_option
388
382
389
383
pre , message = string .split (args , '>CRY-' , 1 )
390
384
number , message = string .split (message , ' ' , 1 )
391
385
392
- # Get key for the message buffer
386
+ # Get key for the message memory
393
387
buf_key = '%s.%s.%s' % (server , info ['channel' ], info ['nick' ])
394
388
395
389
# Decrypt only if we got last part of the message
396
- # otherwise put the message into a globa buffer and quit
390
+ # otherwise put the message into a global memory and quit
397
391
if int (number ) != 0 :
398
- if not buf_key in ircrypt_msg_buffer :
399
- ircrypt_msg_buffer [buf_key ] = MessageParts ()
400
- ircrypt_msg_buffer [buf_key ].update (int (number ), message )
392
+ if not buf_key in ircrypt_msg_memory :
393
+ ircrypt_msg_memory [buf_key ] = MessageParts ()
394
+ ircrypt_msg_memory [buf_key ].update (int (number ), message )
401
395
return ''
402
396
403
397
# Get whole message
404
398
try :
405
- message = message + ircrypt_msg_buffer [buf_key ].message
399
+ message = message + ircrypt_msg_memory [buf_key ].message
406
400
except KeyError :
407
401
pass
408
402
@@ -432,9 +426,9 @@ def ircrypt_decrypt_sym(server, args, info, key):
432
426
elif err :
433
427
weechat .prnt (buf , '%s%s' % (weechat .color ('gray' ), err ))
434
428
435
- # Remove old messages from buffer
429
+ # Remove old messages from memory
436
430
try :
437
- del ircrypt_msg_buffer [buf_key ]
431
+ del ircrypt_msg_memory [buf_key ]
438
432
except KeyError :
439
433
pass
440
434
return '%s%s' % (pre , decrypted )
@@ -1087,7 +1081,6 @@ def ircrypt_key_generated_cb(data, command, errorcode, out, err):
1087
1081
1088
1082
weechat .hook_command ('ircrypt' , 'Manage IRCrypt Keys and public key identifier' ,
1089
1083
'[list] '
1090
- '| buffer '
1091
1084
'| set-key [-server <server>] <target> <key> '
1092
1085
'| remove-key [-server <server>] <target> '
1093
1086
'| request-public-key [-server <server>] <nick>'
@@ -1099,7 +1092,7 @@ def ircrypt_key_generated_cb(data, command, errorcode, out, err):
1099
1092
'| verify-keys [-server <server>] [<nick>] '
1100
1093
'| plain [-server <server>] [-channel <channel>] <message>' ,
1101
1094
ircrypt_help_text ,
1102
- 'list || buffer || set-key %(irc_channel)|%(nicks)|-server %(irc_servers) %- '
1095
+ 'list || set-key %(irc_channel)|%(nicks)|-server %(irc_servers) %- '
1103
1096
'|| remove-key %(irc_channel)|%(nicks)|-server %(irc_servers) %- '
1104
1097
'|| exchange %(nicks) %(irc_channel) -server %(irc_servers)'
1105
1098
'|| verify-requests %(nicks)|-server %(irc_servers) %- '
0 commit comments