Page Menu
Home
GnuPG
Search
Configure Global Search
Log In
Files
F19741931
run-encrypt.c
No One
Temporary
Actions
Download File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Award Token
Size
7 KB
Subscribers
None
run-encrypt.c
View Options
/* run-encrypt.c - Helper to perform an encrypt operation
* Copyright (C) 2016 g10 Code GmbH
*
* This file is part of GPGME.
*
* GPGME is free software; you can redistribute it and/or modify it
* under the terms of the GNU Lesser General Public License as
* published by the Free Software Foundation; either version 2.1 of
* the License, or (at your option) any later version.
*
* GPGME is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this program; if not, see <https://www.gnu.org/licenses/>.
*/
/* We need to include config.h so that we know whether we are building
with large file system (LFS) support. */
#ifdef HAVE_CONFIG_H
#include
<config.h>
#endif
#include
<stdlib.h>
#include
<stdio.h>
#include
<string.h>
#include
<gpgme.h>
#define PGM "run-encrypt"
#include
"run-support.h"
static
int
verbose
;
static
gpg_error_t
status_cb
(
void
*
opaque
,
const
char
*
keyword
,
const
char
*
value
)
{
(
void
)
opaque
;
fprintf
(
stderr
,
"status_cb: %s %s
\n
"
,
nonnull
(
keyword
),
nonnull
(
value
));
return
0
;
}
static
void
progress_cb
(
void
*
opaque
,
const
char
*
what
,
int
type
,
int
current
,
int
total
)
{
(
void
)
opaque
;
(
void
)
type
;
if
(
total
)
fprintf
(
stderr
,
"progress for '%s' %u%% (%d of %d)
\n
"
,
nonnull
(
what
),
(
unsigned
)(((
double
)
current
/
total
)
*
100
),
current
,
total
);
else
fprintf
(
stderr
,
"progress for '%s' %d
\n
"
,
nonnull
(
what
),
current
);
fflush
(
stderr
);
}
static
void
print_result
(
gpgme_encrypt_result_t
result
)
{
gpgme_invalid_key_t
invkey
;
for
(
invkey
=
result
->
invalid_recipients
;
invkey
;
invkey
=
invkey
->
next
)
printf
(
"Encryption key `%s' not used: %s <%s>
\n
"
,
nonnull
(
invkey
->
fpr
),
gpg_strerror
(
invkey
->
reason
),
gpg_strsource
(
invkey
->
reason
));
}
static
int
show_usage
(
int
ex
)
{
fputs
(
"usage: "
PGM
" [options] FILE
\n\n
"
"Options:
\n
"
" --verbose run in verbose mode
\n
"
" --status print status lines from the backend
\n
"
" --progress print progress info
\n
"
" --openpgp use the OpenPGP protocol (default)
\n
"
" --cms use the CMS protocol
\n
"
" --uiserver use the UI server
\n
"
" --loopback use a loopback pinentry
\n
"
" --key NAME encrypt to key NAME
\n
"
" --throw-keyids use this option
\n
"
" --wrap assume input is valid OpenPGP message
\n
"
" --symmetric encrypt symmetric (OpenPGP only)
\n
"
,
stderr
);
exit
(
ex
);
}
int
main
(
int
argc
,
char
**
argv
)
{
int
last_argc
=
-1
;
gpgme_error_t
err
;
gpgme_ctx_t
ctx
;
const
char
*
key_string
=
NULL
;
gpgme_protocol_t
protocol
=
GPGME_PROTOCOL_OpenPGP
;
gpgme_data_t
in
,
out
;
gpgme_encrypt_result_t
result
;
int
print_status
=
0
;
int
print_progress
=
0
;
int
use_loopback
=
0
;
char
*
keyargs
[
10
];
gpgme_key_t
keys
[
10
+
1
];
int
keycount
=
0
;
int
i
;
gpgme_encrypt_flags_t
flags
=
GPGME_ENCRYPT_ALWAYS_TRUST
;
gpgme_off_t
offset
;
if
(
argc
)
{
argc
--
;
argv
++
;
}
if
(
DIM
(
keys
)
!=
DIM
(
keyargs
)
+
1
)
abort
();
while
(
argc
&&
last_argc
!=
argc
)
{
last_argc
=
argc
;
if
(
!
strcmp
(
*
argv
,
"--"
))
{
argc
--
;
argv
++
;
break
;
}
else
if
(
!
strcmp
(
*
argv
,
"--help"
))
show_usage
(
0
);
else
if
(
!
strcmp
(
*
argv
,
"--verbose"
))
{
verbose
=
1
;
argc
--
;
argv
++
;
}
else
if
(
!
strcmp
(
*
argv
,
"--status"
))
{
print_status
=
1
;
argc
--
;
argv
++
;
}
else
if
(
!
strcmp
(
*
argv
,
"--progress"
))
{
print_progress
=
1
;
argc
--
;
argv
++
;
}
else
if
(
!
strcmp
(
*
argv
,
"--openpgp"
))
{
protocol
=
GPGME_PROTOCOL_OpenPGP
;
argc
--
;
argv
++
;
}
else
if
(
!
strcmp
(
*
argv
,
"--cms"
))
{
protocol
=
GPGME_PROTOCOL_CMS
;
argc
--
;
argv
++
;
}
else
if
(
!
strcmp
(
*
argv
,
"--uiserver"
))
{
protocol
=
GPGME_PROTOCOL_UISERVER
;
argc
--
;
argv
++
;
}
else
if
(
!
strcmp
(
*
argv
,
"--key"
))
{
argc
--
;
argv
++
;
if
(
!
argc
)
show_usage
(
1
);
if
(
keycount
==
DIM
(
keyargs
))
show_usage
(
1
);
keyargs
[
keycount
++
]
=
*
argv
;
argc
--
;
argv
++
;
}
else
if
(
!
strcmp
(
*
argv
,
"--throw-keyids"
))
{
flags
|=
GPGME_ENCRYPT_THROW_KEYIDS
;
argc
--
;
argv
++
;
}
else
if
(
!
strcmp
(
*
argv
,
"--wrap"
))
{
flags
|=
GPGME_ENCRYPT_WRAP
;
argc
--
;
argv
++
;
}
else
if
(
!
strcmp
(
*
argv
,
"--loopback"
))
{
use_loopback
=
1
;
argc
--
;
argv
++
;
}
else
if
(
!
strcmp
(
*
argv
,
"--symmetric"
))
{
flags
|=
GPGME_ENCRYPT_SYMMETRIC
;
argc
--
;
argv
++
;
}
else
if
(
!
strncmp
(
*
argv
,
"--"
,
2
))
show_usage
(
1
);
}
if
(
argc
!=
1
)
show_usage
(
1
);
if
(
key_string
&&
protocol
==
GPGME_PROTOCOL_UISERVER
)
{
fprintf
(
stderr
,
PGM
": ignoring --key in UI-server mode
\n
"
);
key_string
=
NULL
;
}
if
(
!
key_string
)
key_string
=
"test"
;
init_gpgme
(
protocol
);
err
=
gpgme_new
(
&
ctx
);
fail_if_err
(
err
);
gpgme_set_protocol
(
ctx
,
protocol
);
gpgme_set_armor
(
ctx
,
1
);
if
(
print_status
)
{
gpgme_set_status_cb
(
ctx
,
status_cb
,
NULL
);
gpgme_set_ctx_flag
(
ctx
,
"full-status"
,
"1"
);
}
if
(
print_progress
)
gpgme_set_progress_cb
(
ctx
,
progress_cb
,
NULL
);
if
(
use_loopback
)
{
gpgme_set_pinentry_mode
(
ctx
,
GPGME_PINENTRY_MODE_LOOPBACK
);
gpgme_set_passphrase_cb
(
ctx
,
passphrase_cb
,
NULL
);
}
for
(
i
=
0
;
i
<
keycount
;
i
++
)
{
err
=
gpgme_get_key
(
ctx
,
keyargs
[
i
],
&
keys
[
i
],
0
);
fail_if_err
(
err
);
}
keys
[
i
]
=
NULL
;
err
=
gpgme_data_new_from_file
(
&
in
,
*
argv
,
1
);
if
(
err
)
{
fprintf
(
stderr
,
PGM
": error reading `%s': %s
\n
"
,
*
argv
,
gpg_strerror
(
err
));
exit
(
1
);
}
offset
=
gpgme_data_seek
(
in
,
0
,
SEEK_END
);
if
(
offset
==
(
gpgme_off_t
)(
-1
))
{
err
=
gpg_error_from_syserror
();
fprintf
(
stderr
,
PGM
": error seeking `%s': %s
\n
"
,
*
argv
,
gpg_strerror
(
err
));
exit
(
1
);
}
if
(
gpgme_data_seek
(
in
,
0
,
SEEK_SET
)
==
(
gpgme_off_t
)(
-1
))
{
err
=
gpg_error_from_syserror
();
fprintf
(
stderr
,
PGM
": error seeking `%s': %s
\n
"
,
*
argv
,
gpg_strerror
(
err
));
exit
(
1
);
}
{
char
numbuf
[
50
];
char
*
p
;
p
=
numbuf
+
sizeof
numbuf
;
*--
p
=
0
;
do
{
*--
p
=
'0'
+
(
offset
%
10
);
offset
/=
10
;
}
while
(
offset
);
err
=
gpgme_data_set_flag
(
in
,
"size-hint"
,
p
);
if
(
err
)
{
fprintf
(
stderr
,
PGM
": error setting size-hint for `%s': %s
\n
"
,
*
argv
,
gpg_strerror
(
err
));
exit
(
1
);
}
}
err
=
gpgme_data_new
(
&
out
);
fail_if_err
(
err
);
err
=
gpgme_op_encrypt
(
ctx
,
keycount
?
keys
:
NULL
,
flags
,
in
,
out
);
result
=
gpgme_op_encrypt_result
(
ctx
);
if
(
result
)
print_result
(
result
);
if
(
err
)
{
fprintf
(
stderr
,
PGM
": encrypting failed: %s
\n
"
,
gpg_strerror
(
err
));
exit
(
1
);
}
fputs
(
"Begin Output:
\n
"
,
stdout
);
print_data
(
out
);
fputs
(
"End Output.
\n
"
,
stdout
);
gpgme_data_release
(
out
);
gpgme_data_release
(
in
);
for
(
i
=
0
;
i
<
keycount
;
i
++
)
gpgme_key_unref
(
keys
[
i
]);
gpgme_release
(
ctx
);
return
0
;
}
File Metadata
Details
Attached
Mime Type
text/x-c
Expires
Sat, Feb 1, 9:26 AM (1 d, 13 h)
Storage Engine
local-disk
Storage Format
Raw Data
Storage Handle
43/8b/00132cd2d736623cb573a8eb5389
Attached To
rM GPGME
Event Timeline
Log In to Comment