text stringlengths 0 357 |
|---|
} |
*ret_ctext = (void*)rpgp_cvec_data(armored); |
*ret_ctext_bytes = rpgp_cvec_len(armored); |
// No drop as we only remove the struct |
free(armored); |
} |
success = 1; |
cleanup: |
if (private_key) { rpgp_skey_drop(private_key); } |
for (i = 0; i < public_keys_len; i++) { |
rpgp_pkey_drop(public_keys[i]); |
} |
if (encrypted) { rpgp_msg_drop(encrypted); } |
return success; |
} |
#else // !DC_USE_RPGP |
int dc_pgp_pk_encrypt( dc_context_t* context, |
const void* plain_text, |
size_t plain_bytes, |
const dc_keyring_t* raw_public_keys_for_encryption, |
const dc_key_t* raw_private_key_for_signing, |
int use_armor, |
void** ret_ctext, |
size_t* ret_ctext_bytes) |
{ |
pgp_keyring_t* public_keys = calloc(1, sizeof(pgp_keyring_t)); |
pgp_keyring_t* private_keys = calloc(1, sizeof(pgp_keyring_t)); |
pgp_keyring_t* dummy_keys = calloc(1, sizeof(pgp_keyring_t)); |
pgp_memory_t* keysmem = pgp_memory_new(); |
pgp_memory_t* signedmem = NULL; |
int i = 0; |
int success = 0; |
if (context==NULL || plain_text==NULL || plain_bytes==0 || ret_ctext==NULL || ret_ctext_bytes==NULL |
|| raw_public_keys_for_encryption==NULL || raw_public_keys_for_encryption->count<=0 |
|| keysmem==NULL || public_keys==NULL || private_keys==NULL || dummy_keys==NULL) { |
goto cleanup; |
} |
*ret_ctext = NULL; |
*ret_ctext_bytes = 0; |
/* setup keys (the keys may come from pgp_filter_keys_fileread(), see also pgp_keyring_add(rcpts, key)) */ |
for (i = 0; i < raw_public_keys_for_encryption->count; i++) { |
pgp_memory_clear(keysmem); |
pgp_memory_add(keysmem, raw_public_keys_for_encryption->keys[i]->binary, raw_public_keys_for_encryption->keys[i]->bytes); |
pgp_filter_keys_from_mem(&s_io, public_keys, private_keys/*should stay empty*/, NULL, 0, keysmem); |
} |
if (public_keys->keyc <=0 || private_keys->keyc!=0) { |
dc_log_warning(context, 0, "Encryption-keyring contains unexpected data (%i/%i)", public_keys->keyc, private_keys->keyc); |
goto cleanup; |
} |
/* encrypt */ |
{ |
const void* signed_text = NULL; |
size_t signed_bytes = 0; |
int encrypt_raw_packet = 0; |
clock_t sign_clocks = 0; |
clock_t encrypt_clocks = 0; |
if (raw_private_key_for_signing) { |
pgp_memory_clear(keysmem); |
pgp_memory_add(keysmem, raw_private_key_for_signing->binary, raw_private_key_for_signing->bytes); |
pgp_filter_keys_from_mem(&s_io, dummy_keys, private_keys, NULL, 0, keysmem); |
if (private_keys->keyc <= 0) { |
dc_log_warning(context, 0, "No key for signing found."); |
goto cleanup; |
} |
clock_t start = clock(); |
pgp_key_t* sk0 = &private_keys->keys[0]; |
signedmem = pgp_sign_buf(&s_io, plain_text, plain_bytes, &sk0->key.seckey, time(NULL)/*birthtime*/, 0/*duration*/, |
NULL/*hash, defaults to sha256*/, 0/*armored*/, 0/*cleartext*/); |
sign_clocks = clock()-start; |
if (signedmem==NULL) { |
dc_log_warning(context, 0, "Signing failed."); |
goto cleanup; |
} |
signed_text = signedmem->buf; |
signed_bytes = signedmem->length; |
encrypt_raw_packet = 1; |
} |
else { |
signed_text = plain_text; |
signed_bytes = plain_bytes; |
encrypt_raw_packet = 0; |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.