text
stringlengths
0
357
}
*ret_ctext = (void*)rpgp_cvec_data(armored);
*ret_ctext_bytes = rpgp_cvec_len(armored);
// No drop as we only remove the struct
free(armored);
}
success = 1;
cleanup:
if (private_key) { rpgp_skey_drop(private_key); }
for (i = 0; i < public_keys_len; i++) {
rpgp_pkey_drop(public_keys[i]);
}
if (encrypted) { rpgp_msg_drop(encrypted); }
return success;
}
#else // !DC_USE_RPGP
int dc_pgp_pk_encrypt( dc_context_t* context,
const void* plain_text,
size_t plain_bytes,
const dc_keyring_t* raw_public_keys_for_encryption,
const dc_key_t* raw_private_key_for_signing,
int use_armor,
void** ret_ctext,
size_t* ret_ctext_bytes)
{
pgp_keyring_t* public_keys = calloc(1, sizeof(pgp_keyring_t));
pgp_keyring_t* private_keys = calloc(1, sizeof(pgp_keyring_t));
pgp_keyring_t* dummy_keys = calloc(1, sizeof(pgp_keyring_t));
pgp_memory_t* keysmem = pgp_memory_new();
pgp_memory_t* signedmem = NULL;
int i = 0;
int success = 0;
if (context==NULL || plain_text==NULL || plain_bytes==0 || ret_ctext==NULL || ret_ctext_bytes==NULL
|| raw_public_keys_for_encryption==NULL || raw_public_keys_for_encryption->count<=0
|| keysmem==NULL || public_keys==NULL || private_keys==NULL || dummy_keys==NULL) {
goto cleanup;
}
*ret_ctext = NULL;
*ret_ctext_bytes = 0;
/* setup keys (the keys may come from pgp_filter_keys_fileread(), see also pgp_keyring_add(rcpts, key)) */
for (i = 0; i < raw_public_keys_for_encryption->count; i++) {
pgp_memory_clear(keysmem);
pgp_memory_add(keysmem, raw_public_keys_for_encryption->keys[i]->binary, raw_public_keys_for_encryption->keys[i]->bytes);
pgp_filter_keys_from_mem(&s_io, public_keys, private_keys/*should stay empty*/, NULL, 0, keysmem);
}
if (public_keys->keyc <=0 || private_keys->keyc!=0) {
dc_log_warning(context, 0, "Encryption-keyring contains unexpected data (%i/%i)", public_keys->keyc, private_keys->keyc);
goto cleanup;
}
/* encrypt */
{
const void* signed_text = NULL;
size_t signed_bytes = 0;
int encrypt_raw_packet = 0;
clock_t sign_clocks = 0;
clock_t encrypt_clocks = 0;
if (raw_private_key_for_signing) {
pgp_memory_clear(keysmem);
pgp_memory_add(keysmem, raw_private_key_for_signing->binary, raw_private_key_for_signing->bytes);
pgp_filter_keys_from_mem(&s_io, dummy_keys, private_keys, NULL, 0, keysmem);
if (private_keys->keyc <= 0) {
dc_log_warning(context, 0, "No key for signing found.");
goto cleanup;
}
clock_t start = clock();
pgp_key_t* sk0 = &private_keys->keys[0];
signedmem = pgp_sign_buf(&s_io, plain_text, plain_bytes, &sk0->key.seckey, time(NULL)/*birthtime*/, 0/*duration*/,
NULL/*hash, defaults to sha256*/, 0/*armored*/, 0/*cleartext*/);
sign_clocks = clock()-start;
if (signedmem==NULL) {
dc_log_warning(context, 0, "Signing failed.");
goto cleanup;
}
signed_text = signedmem->buf;
signed_bytes = signedmem->length;
encrypt_raw_packet = 1;
}
else {
signed_text = plain_text;
signed_bytes = plain_bytes;
encrypt_raw_packet = 0;