Page Menu
Home
GnuPG
Search
Configure Global Search
Log In
Files
F19741701
encrypt.c
No One
Temporary
Actions
Download File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Award Token
Size
6 KB
Subscribers
None
encrypt.c
View Options
/* encrypt.c - Encrypt function.
Copyright (C) 2000 Werner Koch (dd9jn)
Copyright (C) 2001, 2002, 2003, 2004 g10 Code GmbH
This file is part of GPGME.
GPGME is free software; you can redistribute it and/or modify it
under the terms of the GNU Lesser General Public License as
published by the Free Software Foundation; either version 2.1 of
the License, or (at your option) any later version.
GPGME is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public
License along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
02111-1307, USA. */
#if HAVE_CONFIG_H
#include
<config.h>
#endif
#include
<stdlib.h>
#include
<string.h>
#include
<errno.h>
#include
"gpgme.h"
#include
"debug.h"
#include
"context.h"
#include
"ops.h"
typedef
struct
{
struct
_gpgme_op_encrypt_result
result
;
/* A pointer to the next pointer of the last invalid recipient in
the list. This makes appending new invalid recipients painless
while preserving the order. */
gpgme_invalid_key_t
*
lastp
;
}
*
op_data_t
;
static
void
release_op_data
(
void
*
hook
)
{
op_data_t
opd
=
(
op_data_t
)
hook
;
gpgme_invalid_key_t
invalid_recipient
=
opd
->
result
.
invalid_recipients
;
while
(
invalid_recipient
)
{
gpgme_invalid_key_t
next
=
invalid_recipient
->
next
;
if
(
invalid_recipient
->
fpr
)
free
(
invalid_recipient
->
fpr
);
free
(
invalid_recipient
);
invalid_recipient
=
next
;
}
}
gpgme_encrypt_result_t
gpgme_op_encrypt_result
(
gpgme_ctx_t
ctx
)
{
void
*
hook
;
op_data_t
opd
;
gpgme_error_t
err
;
TRACE_BEG
(
DEBUG_CTX
,
"gpgme_op_encrypt_result"
,
ctx
);
err
=
_gpgme_op_data_lookup
(
ctx
,
OPDATA_ENCRYPT
,
&
hook
,
-1
,
NULL
);
opd
=
hook
;
if
(
err
||
!
opd
)
{
TRACE_SUC0
(
"result=(null)"
);
return
NULL
;
}
if
(
_gpgme_debug_trace
())
{
gpgme_invalid_key_t
invkeys
=
opd
->
result
.
invalid_recipients
;
int
i
=
0
;
while
(
invkeys
)
{
TRACE_LOG3
(
"invalid_recipients[%i] = %s (%s)"
,
i
,
invkeys
->
fpr
?
invkeys
->
fpr
:
"(null)"
,
gpg_strerror
(
invkeys
->
reason
));
invkeys
=
invkeys
->
next
;
i
++
;
}
}
TRACE_SUC1
(
"result=%p"
,
&
opd
->
result
);
return
&
opd
->
result
;
}
gpgme_error_t
_gpgme_encrypt_status_handler
(
void
*
priv
,
gpgme_status_code_t
code
,
char
*
args
)
{
gpgme_ctx_t
ctx
=
(
gpgme_ctx_t
)
priv
;
gpgme_error_t
err
;
void
*
hook
;
op_data_t
opd
;
err
=
_gpgme_op_data_lookup
(
ctx
,
OPDATA_ENCRYPT
,
&
hook
,
-1
,
NULL
);
opd
=
hook
;
if
(
err
)
return
err
;
switch
(
code
)
{
case
GPGME_STATUS_EOF
:
if
(
opd
->
result
.
invalid_recipients
)
return
gpg_error
(
GPG_ERR_UNUSABLE_PUBKEY
);
break
;
case
GPGME_STATUS_INV_RECP
:
err
=
_gpgme_parse_inv_recp
(
args
,
opd
->
lastp
);
if
(
err
)
return
err
;
opd
->
lastp
=
&
(
*
opd
->
lastp
)
->
next
;
break
;
case
GPGME_STATUS_NO_RECP
:
/* Should not happen, because we require at least one recipient. */
return
gpg_error
(
GPG_ERR_GENERAL
);
default
:
break
;
}
return
0
;
}
static
gpgme_error_t
encrypt_sym_status_handler
(
void
*
priv
,
gpgme_status_code_t
code
,
char
*
args
)
{
gpgme_error_t
err
;
err
=
_gpgme_progress_status_handler
(
priv
,
code
,
args
);
if
(
!
err
)
err
=
_gpgme_passphrase_status_handler
(
priv
,
code
,
args
);
return
err
;
}
static
gpgme_error_t
encrypt_status_handler
(
void
*
priv
,
gpgme_status_code_t
code
,
char
*
args
)
{
return
_gpgme_progress_status_handler
(
priv
,
code
,
args
)
||
_gpgme_encrypt_status_handler
(
priv
,
code
,
args
);
}
gpgme_error_t
_gpgme_op_encrypt_init_result
(
gpgme_ctx_t
ctx
)
{
gpgme_error_t
err
;
void
*
hook
;
op_data_t
opd
;
err
=
_gpgme_op_data_lookup
(
ctx
,
OPDATA_ENCRYPT
,
&
hook
,
sizeof
(
*
opd
),
release_op_data
);
opd
=
hook
;
if
(
err
)
return
err
;
opd
->
lastp
=
&
opd
->
result
.
invalid_recipients
;
return
0
;
}
static
gpgme_error_t
encrypt_start
(
gpgme_ctx_t
ctx
,
int
synchronous
,
gpgme_key_t
recp
[],
gpgme_encrypt_flags_t
flags
,
gpgme_data_t
plain
,
gpgme_data_t
cipher
)
{
gpgme_error_t
err
;
int
symmetric
=
0
;
err
=
_gpgme_op_reset
(
ctx
,
synchronous
);
if
(
err
)
return
err
;
err
=
_gpgme_op_encrypt_init_result
(
ctx
);
if
(
err
)
return
err
;
if
(
!
recp
)
symmetric
=
1
;
if
(
!
plain
)
return
gpg_error
(
GPG_ERR_NO_DATA
);
if
(
!
cipher
)
return
gpg_error
(
GPG_ERR_INV_VALUE
);
if
(
recp
&&
!
*
recp
)
return
gpg_error
(
GPG_ERR_INV_VALUE
);
if
(
symmetric
&&
ctx
->
passphrase_cb
)
{
/* Symmetric encryption requires a passphrase. */
err
=
_gpgme_engine_set_command_handler
(
ctx
->
engine
,
_gpgme_passphrase_command_handler
,
ctx
,
NULL
);
if
(
err
)
return
err
;
}
_gpgme_engine_set_status_handler
(
ctx
->
engine
,
symmetric
?
encrypt_sym_status_handler
:
encrypt_status_handler
,
ctx
);
return
_gpgme_engine_op_encrypt
(
ctx
->
engine
,
recp
,
flags
,
plain
,
cipher
,
ctx
->
use_armor
);
}
gpgme_error_t
gpgme_op_encrypt_start
(
gpgme_ctx_t
ctx
,
gpgme_key_t
recp
[],
gpgme_encrypt_flags_t
flags
,
gpgme_data_t
plain
,
gpgme_data_t
cipher
)
{
gpgme_error_t
err
;
TRACE_BEG3
(
DEBUG_CTX
,
"gpgme_op_encrypt_start"
,
ctx
,
"flags=0x%x, plain=%p, cipher=%p"
,
flags
,
plain
,
cipher
);
if
(
_gpgme_debug_trace
()
&&
recp
)
{
int
i
=
0
;
while
(
recp
[
i
])
{
TRACE_LOG3
(
"recipient[%i] = %p (%s)"
,
i
,
recp
[
i
],
(
recp
[
i
]
->
subkeys
&&
recp
[
i
]
->
subkeys
->
fpr
)
?
recp
[
i
]
->
subkeys
->
fpr
:
"invalid"
);
i
++
;
}
}
err
=
encrypt_start
(
ctx
,
0
,
recp
,
flags
,
plain
,
cipher
);
return
TRACE_ERR
(
err
);
}
/* Encrypt plaintext PLAIN within CTX for the recipients RECP and
store the resulting ciphertext in CIPHER. */
gpgme_error_t
gpgme_op_encrypt
(
gpgme_ctx_t
ctx
,
gpgme_key_t
recp
[],
gpgme_encrypt_flags_t
flags
,
gpgme_data_t
plain
,
gpgme_data_t
cipher
)
{
gpgme_error_t
err
;
TRACE_BEG3
(
DEBUG_CTX
,
"gpgme_op_encrypt"
,
ctx
,
"flags=0x%x, plain=%p, cipher=%p"
,
flags
,
plain
,
cipher
);
if
(
_gpgme_debug_trace
()
&&
recp
)
{
int
i
=
0
;
while
(
recp
[
i
])
{
TRACE_LOG3
(
"recipient[%i] = %p (%s)"
,
i
,
recp
[
i
],
(
recp
[
i
]
->
subkeys
&&
recp
[
i
]
->
subkeys
->
fpr
)
?
recp
[
i
]
->
subkeys
->
fpr
:
"invalid"
);
i
++
;
}
}
err
=
encrypt_start
(
ctx
,
1
,
recp
,
flags
,
plain
,
cipher
);
if
(
!
err
)
err
=
_gpgme_wait_one
(
ctx
);
return
TRACE_ERR
(
err
);
}
File Metadata
Details
Attached
Mime Type
text/x-c
Expires
Sat, Feb 1, 9:06 AM (1 d, 4 h)
Storage Engine
local-disk
Storage Format
Raw Data
Storage Handle
42/a8/d858fa60320714af71807878cde1
Attached To
rM GPGME
Event Timeline
Log In to Comment