Enums¶
Details¶
- class GMime.AddressType(value)¶
Bases:
GLib.Enum
An address type.
- SENDER = 0¶
Represents the addresses in the Sender header.
- FROM = 1¶
Represents the addresses in the From header.
- REPLY_TO = 2¶
Represents the addresses in the Reply-To header.
- TO = 3¶
Represents the recipients in the To header.
- CC = 4¶
Represents the recipients in the Cc header.
- BCC = 5¶
Represents the recipients in the Bcc header.
- class GMime.AutocryptPreferEncrypt(value)¶
Bases:
GLib.Enum
A description of the user’s preference for encrypted messaging.
- NONE = 0¶
No preference stated.
- MUTUAL = 1¶
Please encrypt, if you also have this preference
- class GMime.CipherAlgo(value)¶
Bases:
GLib.Enum
A cipher algorithm.
- DEFAULT = 0¶
The default (or unknown) cipher.
- IDEA = 1¶
The IDEA cipher.
- TWOFISH = 10¶
The Twofish cipher.
- CAMELLIA128 = 11¶
The Camellia-128 cipher.
- CAMELLIA192 = 12¶
The Camellia-192 cipher.
- CAMELLIA256 = 13¶
The Camellia-256 cipher.
- 3DES = 2¶
- _3DES = 2¶
The 3DES cipher.
- CAST5 = 3¶
The CAST5 cipher.
- BLOWFISH = 4¶
The Blowfish cipher.
- AES = 7¶
The AES (aka RIJANDALE) cipher.
- AES192 = 8¶
The AES-192 cipher.
- AES256 = 9¶
The AES-256 cipher.
- class GMime.ContentEncoding(value)¶
Bases:
GLib.Enum
A Content-Transfer-Encoding enumeration.
- DEFAULT = 0¶
Default transfer encoding.
- 7BIT = 1¶
- _7BIT = 1¶
7bit text transfer encoding.
- 8BIT = 2¶
- _8BIT = 2¶
8bit text transfer encoding.
- BINARY = 3¶
Binary transfer encoding.
- BASE64 = 4¶
Base64 transfer encoding.
- QUOTEDPRINTABLE = 5¶
Quoted-printable transfer encoding.
- UUENCODE = 6¶
Uuencode transfer encoding.
- class GMime.DigestAlgo(value)¶
Bases:
GLib.Enum
A hash algorithm.
- DEFAULT = 0¶
The default hash algorithm.
- MD5 = 1¶
The MD5 hash algorithm.
- SHA512 = 10¶
The SHA-512 hash algorithm.
- SHA224 = 11¶
The SHA-224 hash algorithm.
- SHA1 = 2¶
The SHA-1 hash algorithm.
- RIPEMD160 = 3¶
The RIPEMD-160 hash algorithm.
- MD4 = 301¶
The MD4 hash algorithm.
- CRC32 = 302¶
The CRC32 hash algorithm.
- CRC32_RFC1510 = 303¶
The rfc1510 CRC32 hash algorithm.
- CRC32_RFC2440 = 304¶
The rfc2440 CRC32 hash algorithm.
- MD2 = 5¶
The MD2 hash algorithm.
- TIGER192 = 6¶
The TIGER-192 hash algorithm.
- HAVAL5160 = 7¶
The HAVAL-5-160 hash algorithm.
- SHA256 = 8¶
The SHA-256 hash algorithm.
- SHA384 = 9¶
The SHA-384 hash algorithm.
- class GMime.EncodingConstraint(value)¶
Bases:
GLib.Enum
Used with functions like
GMime.FilterBest.encoding
() andGMime.Object.encode
() as the ‘constraint’ argument. These values provide a means of letting the filter know what the encoding constraints are for the stream.- 7BIT = 0¶
- _7BIT = 0¶
The stream data must fit within the 7bit ASCII range.
- 8BIT = 1¶
- _8BIT = 1¶
The stream data may have bytes with the high bit set, but no null bytes.
- BINARY = 2¶
The stream may contain any binary data.
- class GMime.FilterFromMode(value)¶
Bases:
GLib.Enum
The mode for a
GMime.FilterFrom
filter.- DEFAULT = 0¶
Default mode.
- ESCAPE = 0¶
Escape ‘From ‘ lines with a ‘>’
- ARMOR = 1¶
QP-Encode ‘From ‘ lines
- class GMime.FilterGZipMode(value)¶
Bases:
GLib.Enum
The mode for the
GMime.FilterGZip
filter.- ZIP = 0¶
Compress (zip) mode.
- UNZIP = 1¶
Uncompress (unzip) mode.
- class GMime.Format(value)¶
Bases:
GLib.Enum
An enum of formats.
- MESSAGE = 0¶
The stream contains a single message.
- MBOX = 1¶
The stream is in the UNIX mbox format.
- MMDF = 2¶
The stream is in the MMDF format.
- class GMime.NewLineFormat(value)¶
Bases:
GLib.Enum
There are two commonly used line-endings used by modern Operating Systems. Unix-based systems such as Linux and Mac OS use a single character (’\n’ aka LF) to represent the end of line where-as Windows (or DOS) uses a sequence of two characters (”\r\n” aka CRLF). Most text-based network protocols such as SMTP, POP3, and IMAP use the CRLF sequence as well.
- UNIX = 0¶
The Unix New-Line format (”\n”).
- DOS = 1¶
The DOS New-Line format (”\r\n”).
- class GMime.OpenPGPData(value)¶
Bases:
GLib.Enum
The type of OpenPGP data found, if any.
- NONE = 0¶
No OpenPGP data found.
- ENCRYPTED = 1¶
The content contains OpenPGP encrypted data.
- SIGNED = 2¶
The content contains OpenPGP signed data.
- PUBLIC_KEY = 3¶
The content contains OpenPGP public key data.
- PRIVATE_KEY = 4¶
The content contains OpenPGP private key data.
- class GMime.ParamEncodingMethod(value)¶
Bases:
GLib.Enum
The MIME specifications specify that the proper method for encoding Content-Type and Content-Disposition parameter values is the method described in
rfc2231. However, it is common for some older email clients to improperly encode using the method described in
rfc2047 instead.
- DEFAULT = 0¶
Use the default encoding method set on the
GMime.FormatOptions
.
- RFC2231 = 1¶
Use the encoding method described in rfc2231.
- RFC2047 = 2¶
Use the encoding method described in rfc2047.
- class GMime.ParserWarning(value)¶
Bases:
GLib.Enum
Issues the GMimeParser detects. Note that the
GMIME_CRIT_*
issues indicate that some parts of the GMimeParser input may be ignored or will be interpreted differently by other software products.- WARN_DUPLICATED_HEADER = 1¶
Repeated exactly the same header which should exist only once.
- CRIT_CONFLICTING_HEADER = 10¶
Conflicting header.
- CRIT_CONFLICTING_PARAMETER = 11¶
Conflicting header parameter.
- CRIT_MULTIPART_WITHOUT_BOUNDARY = 12¶
A multipart lacks the required boundary parameter.
- WARN_INVALID_PARAMETER = 13¶
Invalid header parameter.
- WARN_INVALID_ADDRESS_LIST = 14¶
Invalid address list.
- CRIT_NESTING_OVERFLOW = 15¶
The maximum MIME nesting level has been exceeded. This is very likely to be an attempt to exploit the MIME parser.
- WARN_PART_WITHOUT_CONTENT = 16¶
A MIME part’s headers were terminated by a boundary marker.
- CRIT_PART_WITHOUT_HEADERS_OR_CONTENT = 17¶
A MIME part was encountered without any headers -or- content. This is very likely to be an attempt to exploit the MIME parser.
- WARN_DUPLICATED_PARAMETER = 2¶
Repeated exactly the same header parameter.
- WARN_UNENCODED_8BIT_HEADER = 3¶
A header contains unencoded 8-bit characters.
- WARN_INVALID_CONTENT_TYPE = 4¶
Invalid content type, assuming
application/octet-stream
.
- WARN_INVALID_RFC2047_HEADER_VALUE = 5¶
Invalid RFC 2047 encoded header value.
- WARN_MALFORMED_MULTIPART = 6¶
No child parts detected within a multipart.
- WARN_TRUNCATED_MESSAGE = 7¶
The message is truncated.
- WARN_MALFORMED_MESSAGE = 8¶
The message is malformed.
- CRIT_INVALID_HEADER_NAME = 9¶
Invalid header name, the parser may skip the message or parts of it.
- class GMime.PubKeyAlgo(value)¶
Bases:
GLib.Enum
A public-key algorithm.
- DEFAULT = 0¶
The default public-key algorithm.
- RSA = 1¶
The RSA algorithm.
- ELG_E = 16¶
An encryption-only ElGamal algorithm.
- DSA = 17¶
The DSA algorithm.
- ECC = 18¶
The Eliptic Curve algorithm.
- RSA_E = 2¶
An encryption-only RSA algorithm.
- ELG = 20¶
The ElGamal algorithm.
- RSA_S = 3¶
A signature-only RSA algorithm.
- ECDSA = 301¶
The Eliptic Curve + DSA algorithm.
- ECDH = 302¶
The Eliptic Curve + Diffie Helman algorithm.
- EDDSA = 303¶
The Eliptic Curve + DSA algorithm.
- class GMime.RfcComplianceMode(value)¶
Bases:
GLib.Enum
An RFC compliance mode.
- LOOSE = 0¶
Attempt to be much more liberal accepting broken and/or invalid formatting.
- STRICT = 1¶
Do not attempt to be overly liberal in accepting broken and/or invalid formatting.
- class GMime.SecureMimeType(value)¶
Bases:
GLib.Enum
The S/MIME data type.
- COMPRESSED_DATA = 0¶
The S/MIME content contains compressed data.
- ENVELOPED_DATA = 1¶
The S/MIME content contains enveloped data.
- SIGNED_DATA = 2¶
The S/MIME content contains signed data.
- CERTS_ONLY = 3¶
The S/MIME content contains only certificates.
- UNKNOWN = 4¶
The S/MIME content is unknown.
- class GMime.SeekWhence(value)¶
Bases:
GLib.Enum
Relative seek position.
- SET = 0¶
Seek relative to the beginning of the stream.
- CUR = 1¶
Seek relative to the current position in the stream.
- END = 2¶
Seek relative to the end of the stream.
- class GMime.SignatureStatus(value)¶
Bases:
GLib.Enum
A value representing the signature status bit flags for a particular
GMime.Signature
.- VALID = 1¶
The signature is fully valid.
- BAD_POLICY = 1024¶
A policy was not met.
- KEY_MISSING = 128¶
Can’t verify due to missing key.
- KEY_REVOKED = 16¶
The key has been revoked.
- GREEN = 2¶
The signature is good.
- SYS_ERROR = 2048¶
A system error occurred.
- CRL_MISSING = 256¶
CRL not available.
- KEY_EXPIRED = 32¶
The key has expired.
- RED = 4¶
The signature is bad.
- TOFU_CONFLICT = 4096¶
Tofu conflict detected.
- CRL_TOO_OLD = 512¶
Available CRL is too old.
- SIG_EXPIRED = 64¶
The signature has expired.
- class GMime.StreamBufferMode(value)¶
Bases:
GLib.Enum
The buffering mode for a
GMime.StreamBuffer
stream.- READ = 0¶
Read in 4k blocks.
- WRITE = 1¶
Write in 4k blocks.
- class GMime.Trust(value)¶
Bases:
GLib.Enum
The trust level of a certificate. Trust level tries to answer the question: “How much is the user willing to rely on cryptographic identity assertions made by the owner of this certificate?”
By way of comparison with web browser X.509 certificate validation stacks, the certificate of a “Root CA” has
GMime.Trust.ULTIMATE
, while the certificate of an intermediate CA hasGMime.Trust.FULL
, and an end-entity certificate (e.g., with CA:FALSE set) would haveGMime.Trust.NEVER
.- UNKNOWN = 0¶
We do not know whether to rely on identity assertions made by the certificate.
- UNDEFINED = 1¶
We do not have enough information to decide whether to rely on identity assertions made by the certificate.
- NEVER = 2¶
We should never rely on identity assertions made by the certificate.
- MARGINAL = 3¶
We can rely on identity assertions made by this certificate as long as they are corroborated by other marginally-trusted certificates.
- FULL = 4¶
We can rely on identity assertions made by this certificate.
- ULTIMATE = 5¶
This certificate is an undeniable root of trust (e.g. normally, this is a certificate controlled by the user themselves).
- class GMime.Validity(value)¶
Bases:
GLib.Enum
The validity level of a certificate’s User ID. Validity level tries to answer the question: “How strongly do we believe that this certificate belongs to the party it says it belongs to?”
Note that some OpenPGP certificates have multiple User IDs, and each User ID may have a different validity level (e.g. depending on which third parties have certified which User IDs, and which third parties the local user has chosen to trust).
Similarly, an X.509 certificate can have multiple SubjectAltNames, and each name may also have a different validity level (e.g. if the issuing CA is bound by name constraints).
Note that the GMime API currently only exposes the highest-validty User ID for any given certificate.
- UNKNOWN = 0¶
The User ID of the certificate is of unknown validity.
- UNDEFINED = 1¶
The User ID of the certificate is undefined.
- NEVER = 2¶
The User ID of the certificate is never to be treated as valid.
- MARGINAL = 3¶
The User ID of the certificate is marginally valid (e.g. it has been certified by only one marginally-trusted party).
- FULL = 4¶
The User ID of the certificate is fully valid.
- ULTIMATE = 5¶
The User ID of the certificate is ultimately valid (i.e., usually the certificate belongs to the local user themselves).