text stringlengths 0 357 |
|---|
} |
clock_t start = clock(); |
pgp_memory_t* outmem = pgp_encrypt_buf(&s_io, signed_text, signed_bytes, public_keys, use_armor, NULL/*cipher*/, encrypt_raw_packet); |
encrypt_clocks = clock()-start; |
dc_log_info(context, 0, "Message signed in %.3f ms and encrypted in %.3f ms.", (double)(sign_clocks)*1000.0/CLOCKS_PER_SEC, (double)(encrypt_clocks)*1000.0/CLOCKS_PER_SEC); |
if (outmem==NULL) { |
dc_log_warning(context, 0, "Encryption failed."); |
goto cleanup; |
} |
*ret_ctext = outmem->buf; |
*ret_ctext_bytes = outmem->length; |
free(outmem); /* do not use pgp_memory_free() as we took ownership of the buffer */ |
} |
success = 1; |
cleanup: |
if (keysmem) { pgp_memory_free(keysmem); } |
if (signedmem) { pgp_memory_free(signedmem); } |
if (public_keys) { pgp_keyring_purge(public_keys); free(public_keys); } /*pgp_keyring_free() frees the content, not the pointer itself*/ |
if (private_keys) { pgp_keyring_purge(private_keys); free(private_keys); } |
if (dummy_keys) { pgp_keyring_purge(dummy_keys); free(dummy_keys); } |
return success; |
} |
#endif // !DC_USE_RPGP |
#ifdef DC_USE_RPGP |
int dc_pgp_pk_decrypt( dc_context_t* context, |
const void* ctext, |
size_t ctext_bytes, |
const dc_keyring_t* raw_private_keys_for_decryption, |
const dc_keyring_t* raw_public_keys_for_validation, |
int use_armor, |
void** ret_plain, |
size_t* ret_plain_bytes, |
dc_hash_t* ret_signature_fingerprints) |
{ |
int i = 0; |
int success = 0; |
rpgp_message* encrypted = NULL; |
rpgp_message_decrypt_result* decrypted = NULL; |
int private_keys_len = 0; |
int public_keys_len = 0; |
rpgp_signed_secret_key* *private_keys = NULL; |
rpgp_signed_public_key* *public_keys = NULL; |
if (context==NULL || ctext==NULL || ctext_bytes==0 || ret_plain==NULL |
|| ret_plain_bytes==NULL || raw_private_keys_for_decryption==NULL |
|| raw_private_keys_for_decryption->count<=0 |
|| use_armor==0 /* only support use_armor=1 */) { |
goto cleanup; |
} |
*ret_plain = NULL; |
*ret_plain_bytes = 0; |
private_keys_len = raw_private_keys_for_decryption->count; |
private_keys = malloc(sizeof(rpgp_signed_secret_key*) * private_keys_len); |
if (raw_public_keys_for_validation) { |
public_keys_len = raw_public_keys_for_validation->count; |
public_keys = malloc(sizeof(rpgp_signed_public_key*) * public_keys_len); |
} |
/* setup secret keys for decryption */ |
for (i = 0; i < raw_private_keys_for_decryption->count; i++) { |
private_keys[i] = rpgp_skey_from_bytes(raw_private_keys_for_decryption->keys[i]->binary, |
raw_private_keys_for_decryption->keys[i]->bytes); |
if (dc_pgp_handle_rpgp_error(context)) { |
goto cleanup; |
} |
} |
/* setup public keys for validation */ |
if (raw_public_keys_for_validation) { |
for (i = 0; i < raw_public_keys_for_validation->count; i++) { |
public_keys[i] = rpgp_pkey_from_bytes(raw_public_keys_for_validation->keys[i]->binary, |
raw_public_keys_for_validation->keys[i]->bytes); |
if (dc_pgp_handle_rpgp_error(context)) { |
goto cleanup; |
} |
} |
} |
/* decrypt */ |
{ |
encrypted = rpgp_msg_from_armor(ctext, ctext_bytes); |
if (dc_pgp_handle_rpgp_error(context)) { |
goto cleanup; |
} |
decrypted = rpgp_msg_decrypt_no_pw(encrypted, |
(const rpgp_signed_secret_key* const*)private_keys, private_keys_len, |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.