sequoia-openpgp 0.19.0

OpenPGP data types and associated machinery
Documentation
/// Extracts the Web-Of-Trust, i.e. the certification relation, from
/// SKS packet dump using the openpgp crate, Sequoia's low-level API.
///
/// Note that to achieve reasonable performance, you need to compile
/// Sequoia and this program with optimizations:
///
///     % cargo run -p sequoia-openpgp --example web-of-trust --release \
///           -- <packet-dump> [<packet-dump> ...]

use std::env;

extern crate sequoia_openpgp as openpgp;
use crate::openpgp::KeyID;
use crate::openpgp::cert::prelude::*;
use crate::openpgp::parse::Parse;

fn main() {
    let args: Vec<String> = env::args().collect();
    if args.len() < 2 {
        panic!("Extracts the certification relation from OpenPGP packet dumps.\
                \n\nUsage: {} <packet-dump> [<packet-dump> ...]\n", args[0]);
    }

    // The issuer refers to a (sub)key, but we want to use the primary
    // keys as identifiers.  But, because there are no tools besides
    // Sequoia that support certification-capable subkeys, we will
    // assume for now that the issuer is always a primary key.

    eprintln!("Format: certifier, user-id, key");

    // For each input file, create a parser.
    for input in &args[1..] {
        eprintln!("Parsing {}...", input);
        let parser = CertParser::from_file(input)
            .expect("Failed to create reader");

        for cert in parser {
            match cert {
                Ok(cert) => {
                    let keyid = cert.keyid();
                    for uidb in cert.userids() {
                        for tps in uidb.certifications() {
                            for issuer in tps.get_issuers() {
                                println!("{}, {:?}, {}",
                                         KeyID::from(issuer).as_u64().unwrap(),
                                         String::from_utf8_lossy(
                                             uidb.userid().value()),
                                         keyid.as_u64().unwrap());
                            }
                        }
                    }
                },
                Err(e) =>
                    eprintln!("Parsing Cert failed: {}", e),
            }
        }
    }
}