mirror of
https://github.com/deltachat/deltachat-core.git
synced 2025-10-06 03:50:08 +02:00
100 lines
88 KiB
HTML
100 lines
88 KiB
HTML
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
|
<html xmlns="http://www.w3.org/1999/xhtml">
|
|
<head>
|
|
<meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/>
|
|
<meta http-equiv="X-UA-Compatible" content="IE=9"/>
|
|
<meta name="generator" content="Doxygen 1.8.11"/>
|
|
<title>Delta Chat Core C-Library: /home/bpetersen/projects/deltachat-core/src/mrpgp.c Source File</title>
|
|
<link href="tabs.css" rel="stylesheet" type="text/css"/>
|
|
<script type="text/javascript" src="jquery.js"></script>
|
|
<script type="text/javascript" src="dynsections.js"></script>
|
|
<link href="search/search.css" rel="stylesheet" type="text/css"/>
|
|
<script type="text/javascript" src="search/searchdata.js"></script>
|
|
<script type="text/javascript" src="search/search.js"></script>
|
|
<script type="text/javascript">
|
|
$(document).ready(function() { init_search(); });
|
|
</script>
|
|
<link href="doxygen.css" rel="stylesheet" type="text/css" />
|
|
<link href="user.css" rel="stylesheet" type="text/css"/>
|
|
</head>
|
|
<body>
|
|
<div id="top"><!-- do not remove this div, it is closed by doxygen! -->
|
|
<div id="titlearea">
|
|
<table cellspacing="0" cellpadding="0">
|
|
<tbody>
|
|
<tr style="height: 56px;">
|
|
<td id="projectalign" style="padding-left: 0.5em;">
|
|
<div id="projectname">Delta Chat Core C-Library
|
|
</div>
|
|
</td>
|
|
</tr>
|
|
</tbody>
|
|
</table>
|
|
</div>
|
|
<!-- end header part -->
|
|
<!-- Generated by Doxygen 1.8.11 -->
|
|
<script type="text/javascript">
|
|
var searchBox = new SearchBox("searchBox", "search",false,'Search');
|
|
</script>
|
|
<div id="navrow1" class="tabs">
|
|
<ul class="tablist">
|
|
<li><a href="index.html"><span>Main Page</span></a></li>
|
|
<li><a href="annotated.html"><span>Classes</span></a></li>
|
|
<li class="current"><a href="files.html"><span>Files</span></a></li>
|
|
<li>
|
|
<div id="MSearchBox" class="MSearchBoxInactive">
|
|
<span class="left">
|
|
<img id="MSearchSelect" src="search/mag_sel.png"
|
|
onmouseover="return searchBox.OnSearchSelectShow()"
|
|
onmouseout="return searchBox.OnSearchSelectHide()"
|
|
alt=""/>
|
|
<input type="text" id="MSearchField" value="Search" accesskey="S"
|
|
onfocus="searchBox.OnSearchFieldFocus(true)"
|
|
onblur="searchBox.OnSearchFieldFocus(false)"
|
|
onkeyup="searchBox.OnSearchFieldChange(event)"/>
|
|
</span><span class="right">
|
|
<a id="MSearchClose" href="javascript:searchBox.CloseResultsWindow()"><img id="MSearchCloseImg" border="0" src="search/close.png" alt=""/></a>
|
|
</span>
|
|
</div>
|
|
</li>
|
|
</ul>
|
|
</div>
|
|
<div id="navrow2" class="tabs2">
|
|
<ul class="tablist">
|
|
<li><a href="files.html"><span>File List</span></a></li>
|
|
</ul>
|
|
</div>
|
|
<!-- window showing the filter options -->
|
|
<div id="MSearchSelectWindow"
|
|
onmouseover="return searchBox.OnSearchSelectShow()"
|
|
onmouseout="return searchBox.OnSearchSelectHide()"
|
|
onkeydown="return searchBox.OnSearchSelectKey(event)">
|
|
</div>
|
|
|
|
<!-- iframe showing the search results (closed by default) -->
|
|
<div id="MSearchResultsWindow">
|
|
<iframe src="javascript:void(0)" frameborder="0"
|
|
name="MSearchResults" id="MSearchResults">
|
|
</iframe>
|
|
</div>
|
|
|
|
<div id="nav-path" class="navpath">
|
|
<ul>
|
|
<li class="navelem"><a class="el" href="dir_68267d1309a1af8e8297ef4c3efbcdba.html">src</a></li> </ul>
|
|
</div>
|
|
</div><!-- top -->
|
|
<div class="header">
|
|
<div class="headertitle">
|
|
<div class="title">mrpgp.c</div> </div>
|
|
</div><!--header-->
|
|
<div class="contents">
|
|
<div class="fragment"><div class="line"><a name="l00001"></a><span class="lineno"> 1</span> <span class="comment">/*******************************************************************************</span></div><div class="line"><a name="l00002"></a><span class="lineno"> 2</span> <span class="comment"> *</span></div><div class="line"><a name="l00003"></a><span class="lineno"> 3</span> <span class="comment"> * Delta Chat Core</span></div><div class="line"><a name="l00004"></a><span class="lineno"> 4</span> <span class="comment"> * Copyright (C) 2017 Björn Petersen</span></div><div class="line"><a name="l00005"></a><span class="lineno"> 5</span> <span class="comment"> * Contact: r10s@b44t.com, http://b44t.com</span></div><div class="line"><a name="l00006"></a><span class="lineno"> 6</span> <span class="comment"> *</span></div><div class="line"><a name="l00007"></a><span class="lineno"> 7</span> <span class="comment"> * This program is free software: you can redistribute it and/or modify it under</span></div><div class="line"><a name="l00008"></a><span class="lineno"> 8</span> <span class="comment"> * the terms of the GNU General Public License as published by the Free Software</span></div><div class="line"><a name="l00009"></a><span class="lineno"> 9</span> <span class="comment"> * Foundation, either version 3 of the License, or (at your option) any later</span></div><div class="line"><a name="l00010"></a><span class="lineno"> 10</span> <span class="comment"> * version.</span></div><div class="line"><a name="l00011"></a><span class="lineno"> 11</span> <span class="comment"> *</span></div><div class="line"><a name="l00012"></a><span class="lineno"> 12</span> <span class="comment"> * This program is distributed in the hope that it will be useful, but WITHOUT</span></div><div class="line"><a name="l00013"></a><span class="lineno"> 13</span> <span class="comment"> * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS</span></div><div class="line"><a name="l00014"></a><span class="lineno"> 14</span> <span class="comment"> * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more</span></div><div class="line"><a name="l00015"></a><span class="lineno"> 15</span> <span class="comment"> * details.</span></div><div class="line"><a name="l00016"></a><span class="lineno"> 16</span> <span class="comment"> *</span></div><div class="line"><a name="l00017"></a><span class="lineno"> 17</span> <span class="comment"> * You should have received a copy of the GNU General Public License along with</span></div><div class="line"><a name="l00018"></a><span class="lineno"> 18</span> <span class="comment"> * this program. If not, see http://www.gnu.org/licenses/ .</span></div><div class="line"><a name="l00019"></a><span class="lineno"> 19</span> <span class="comment"> *</span></div><div class="line"><a name="l00020"></a><span class="lineno"> 20</span> <span class="comment"> ******************************************************************************/</span></div><div class="line"><a name="l00021"></a><span class="lineno"> 21</span> </div><div class="line"><a name="l00022"></a><span class="lineno"> 22</span> </div><div class="line"><a name="l00023"></a><span class="lineno"> 23</span> <span class="comment">/* End-to-end-encryption and other cryptographic functions based upon OpenSSL</span></div><div class="line"><a name="l00024"></a><span class="lineno"> 24</span> <span class="comment">and BSD's netpgp.</span></div><div class="line"><a name="l00025"></a><span class="lineno"> 25</span> <span class="comment"></span></div><div class="line"><a name="l00026"></a><span class="lineno"> 26</span> <span class="comment">If we want to switch to other encryption engines, here are the functions to</span></div><div class="line"><a name="l00027"></a><span class="lineno"> 27</span> <span class="comment">be replaced.</span></div><div class="line"><a name="l00028"></a><span class="lineno"> 28</span> <span class="comment"></span></div><div class="line"><a name="l00029"></a><span class="lineno"> 29</span> <span class="comment">However, eg. GpgME cannot (easily) be used standalone and GnuPG's licence</span></div><div class="line"><a name="l00030"></a><span class="lineno"> 30</span> <span class="comment">would not allow the original creator of Delta Chat to release a proprietary</span></div><div class="line"><a name="l00031"></a><span class="lineno"> 31</span> <span class="comment">version, which, however, is required for the Apple store. (NB: the original</span></div><div class="line"><a name="l00032"></a><span class="lineno"> 32</span> <span class="comment">creator is the only person who could do this, a normal licensee is not</span></div><div class="line"><a name="l00033"></a><span class="lineno"> 33</span> <span class="comment">allowed to do so at all)</span></div><div class="line"><a name="l00034"></a><span class="lineno"> 34</span> <span class="comment"></span></div><div class="line"><a name="l00035"></a><span class="lineno"> 35</span> <span class="comment">So, we do not see a simple alternative - but everyone is welcome to implement</span></div><div class="line"><a name="l00036"></a><span class="lineno"> 36</span> <span class="comment">one :-) */</span></div><div class="line"><a name="l00037"></a><span class="lineno"> 37</span> </div><div class="line"><a name="l00038"></a><span class="lineno"> 38</span> </div><div class="line"><a name="l00039"></a><span class="lineno"> 39</span> <span class="preprocessor">#include <openssl/ssl.h></span></div><div class="line"><a name="l00040"></a><span class="lineno"> 40</span> <span class="preprocessor">#include <openssl/rand.h></span></div><div class="line"><a name="l00041"></a><span class="lineno"> 41</span> <span class="preprocessor">#include <openssl/rsa.h></span></div><div class="line"><a name="l00042"></a><span class="lineno"> 42</span> <span class="preprocessor">#include <openssl/evp.h></span></div><div class="line"><a name="l00043"></a><span class="lineno"> 43</span> <span class="preprocessor">#include <netpgp-extra.h></span></div><div class="line"><a name="l00044"></a><span class="lineno"> 44</span> <span class="preprocessor">#include "mrmailbox_internal.h"</span></div><div class="line"><a name="l00045"></a><span class="lineno"> 45</span> <span class="preprocessor">#include "mrkey.h"</span></div><div class="line"><a name="l00046"></a><span class="lineno"> 46</span> <span class="preprocessor">#include "mrkeyring.h"</span></div><div class="line"><a name="l00047"></a><span class="lineno"> 47</span> <span class="preprocessor">#include "mrpgp.h"</span></div><div class="line"><a name="l00048"></a><span class="lineno"> 48</span> </div><div class="line"><a name="l00049"></a><span class="lineno"> 49</span> </div><div class="line"><a name="l00050"></a><span class="lineno"> 50</span> <span class="keyword">static</span> pgp_io_t s_io;</div><div class="line"><a name="l00051"></a><span class="lineno"> 51</span> </div><div class="line"><a name="l00052"></a><span class="lineno"> 52</span> </div><div class="line"><a name="l00053"></a><span class="lineno"> 53</span> <span class="keywordtype">void</span> mrpgp_init(<a class="code" href="structmrmailbox__t.html">mrmailbox_t</a>* mailbox)</div><div class="line"><a name="l00054"></a><span class="lineno"> 54</span> {</div><div class="line"><a name="l00055"></a><span class="lineno"> 55</span> <span class="preprocessor"> #ifdef __APPLE__</span></div><div class="line"><a name="l00056"></a><span class="lineno"> 56</span>  OPENSSL_init();</div><div class="line"><a name="l00057"></a><span class="lineno"> 57</span> <span class="preprocessor"> #else</span></div><div class="line"><a name="l00058"></a><span class="lineno"> 58</span>  SSL_library_init(); <span class="comment">/* older, but more compatible function, simply defined as OPENSSL_init_ssl().</span></div><div class="line"><a name="l00059"></a><span class="lineno"> 59</span> <span class="comment"> SSL_library_init() should be called from the main thread before OpenSSL is called from other threads.</span></div><div class="line"><a name="l00060"></a><span class="lineno"> 60</span> <span class="comment"> libEtPan may call SSL_library_init() again later, however, this should be no problem.</span></div><div class="line"><a name="l00061"></a><span class="lineno"> 61</span> <span class="comment"> SSL_library_init() always returns "1", so it is safe to discard the return value */</span></div><div class="line"><a name="l00062"></a><span class="lineno"> 62</span> <span class="preprocessor"> #endif</span></div><div class="line"><a name="l00063"></a><span class="lineno"> 63</span> </div><div class="line"><a name="l00064"></a><span class="lineno"> 64</span>  <span class="comment">/* setup i/o structure */</span></div><div class="line"><a name="l00065"></a><span class="lineno"> 65</span>  memset(&s_io, 0, <span class="keyword">sizeof</span>(pgp_io_t));</div><div class="line"><a name="l00066"></a><span class="lineno"> 66</span>  s_io.outs = stdout;</div><div class="line"><a name="l00067"></a><span class="lineno"> 67</span>  s_io.errs = stderr;</div><div class="line"><a name="l00068"></a><span class="lineno"> 68</span>  s_io.res = stderr;</div><div class="line"><a name="l00069"></a><span class="lineno"> 69</span> }</div><div class="line"><a name="l00070"></a><span class="lineno"> 70</span> </div><div class="line"><a name="l00071"></a><span class="lineno"> 71</span> </div><div class="line"><a name="l00072"></a><span class="lineno"> 72</span> <span class="keywordtype">void</span> mrpgp_exit(<a class="code" href="structmrmailbox__t.html">mrmailbox_t</a>* mailbox)</div><div class="line"><a name="l00073"></a><span class="lineno"> 73</span> {</div><div class="line"><a name="l00074"></a><span class="lineno"> 74</span> }</div><div class="line"><a name="l00075"></a><span class="lineno"> 75</span> </div><div class="line"><a name="l00076"></a><span class="lineno"> 76</span> </div><div class="line"><a name="l00077"></a><span class="lineno"> 77</span> <span class="keywordtype">void</span> mrpgp_rand_seed(<a class="code" href="structmrmailbox__t.html">mrmailbox_t</a>* mailbox, <span class="keyword">const</span> <span class="keywordtype">void</span>* buf, <span class="keywordtype">size_t</span> bytes)</div><div class="line"><a name="l00078"></a><span class="lineno"> 78</span> {</div><div class="line"><a name="l00079"></a><span class="lineno"> 79</span>  <span class="keywordflow">if</span>( buf == NULL || bytes <= 0 ) {</div><div class="line"><a name="l00080"></a><span class="lineno"> 80</span>  <span class="keywordflow">return</span>;</div><div class="line"><a name="l00081"></a><span class="lineno"> 81</span>  }</div><div class="line"><a name="l00082"></a><span class="lineno"> 82</span> </div><div class="line"><a name="l00083"></a><span class="lineno"> 83</span>  RAND_seed(buf, bytes);</div><div class="line"><a name="l00084"></a><span class="lineno"> 84</span> }</div><div class="line"><a name="l00085"></a><span class="lineno"> 85</span> </div><div class="line"><a name="l00086"></a><span class="lineno"> 86</span> </div><div class="line"><a name="l00087"></a><span class="lineno"> 87</span> <span class="comment">/*******************************************************************************</span></div><div class="line"><a name="l00088"></a><span class="lineno"> 88</span> <span class="comment"> * Key generatation</span></div><div class="line"><a name="l00089"></a><span class="lineno"> 89</span> <span class="comment"> ******************************************************************************/</span></div><div class="line"><a name="l00090"></a><span class="lineno"> 90</span> </div><div class="line"><a name="l00091"></a><span class="lineno"> 91</span> </div><div class="line"><a name="l00092"></a><span class="lineno"> 92</span> <span class="keyword">static</span> <span class="keywordtype">unsigned</span> add_key_prefs(pgp_create_sig_t *sig)</div><div class="line"><a name="l00093"></a><span class="lineno"> 93</span> {</div><div class="line"><a name="l00094"></a><span class="lineno"> 94</span>  <span class="comment">/* similar to pgp_add_key_prefs(), Mimic of GPG default settings, limited to supported algos */</span></div><div class="line"><a name="l00095"></a><span class="lineno"> 95</span>  <span class="keywordflow">return</span></div><div class="line"><a name="l00096"></a><span class="lineno"> 96</span>  <span class="comment">/* Symmetric algo prefs */</span></div><div class="line"><a name="l00097"></a><span class="lineno"> 97</span>  pgp_write_ss_header(sig->output, 6, PGP_PTAG_SS_PREFERRED_SKA) &&</div><div class="line"><a name="l00098"></a><span class="lineno"> 98</span>  pgp_write_scalar(sig->output, PGP_SA_AES_256, 1) &&</div><div class="line"><a name="l00099"></a><span class="lineno"> 99</span>  pgp_write_scalar(sig->output, PGP_SA_AES_128, 1) &&</div><div class="line"><a name="l00100"></a><span class="lineno"> 100</span>  pgp_write_scalar(sig->output, PGP_SA_CAST5, 1) &&</div><div class="line"><a name="l00101"></a><span class="lineno"> 101</span>  pgp_write_scalar(sig->output, PGP_SA_TRIPLEDES, 1) &&</div><div class="line"><a name="l00102"></a><span class="lineno"> 102</span>  pgp_write_scalar(sig->output, PGP_SA_IDEA, 1) &&</div><div class="line"><a name="l00103"></a><span class="lineno"> 103</span> </div><div class="line"><a name="l00104"></a><span class="lineno"> 104</span>  <span class="comment">/* Hash algo prefs, the first algo is the preferred algo */</span></div><div class="line"><a name="l00105"></a><span class="lineno"> 105</span>  pgp_write_ss_header(sig->output, 6, PGP_PTAG_SS_PREFERRED_HASH) &&</div><div class="line"><a name="l00106"></a><span class="lineno"> 106</span>  pgp_write_scalar(sig->output, PGP_HASH_SHA256, 1) &&</div><div class="line"><a name="l00107"></a><span class="lineno"> 107</span>  pgp_write_scalar(sig->output, PGP_HASH_SHA384, 1) &&</div><div class="line"><a name="l00108"></a><span class="lineno"> 108</span>  pgp_write_scalar(sig->output, PGP_HASH_SHA512, 1) &&</div><div class="line"><a name="l00109"></a><span class="lineno"> 109</span>  pgp_write_scalar(sig->output, PGP_HASH_SHA224, 1) &&</div><div class="line"><a name="l00110"></a><span class="lineno"> 110</span>  pgp_write_scalar(sig->output, PGP_HASH_SHA1, 1) && <span class="comment">/* Edit for Autocrypt/Delta Chat: due to the weak SHA1, it should not be preferred */</span></div><div class="line"><a name="l00111"></a><span class="lineno"> 111</span> </div><div class="line"><a name="l00112"></a><span class="lineno"> 112</span>  <span class="comment">/* Compression algo prefs */</span></div><div class="line"><a name="l00113"></a><span class="lineno"> 113</span>  pgp_write_ss_header(sig->output, 2<span class="comment">/*1+number of following items*/</span>, PGP_PTAG_SS_PREF_COMPRESS) &&</div><div class="line"><a name="l00114"></a><span class="lineno"> 114</span>  pgp_write_scalar(sig->output, PGP_C_ZLIB, 1) <span class="comment">/*&& -- not sure if Delta Chat will support bzip2 on all platforms, however, this is not that important as typical files are compressed themselves and text is not that big</span></div><div class="line"><a name="l00115"></a><span class="lineno"> 115</span> <span class="comment"> pgp_write_scalar(sig->output, PGP_C_BZIP2, 1) -- if you re-enable this, do not forget to modifiy the header count*/</span>;</div><div class="line"><a name="l00116"></a><span class="lineno"> 116</span> }</div><div class="line"><a name="l00117"></a><span class="lineno"> 117</span> </div><div class="line"><a name="l00118"></a><span class="lineno"> 118</span> </div><div class="line"><a name="l00119"></a><span class="lineno"> 119</span> <span class="keyword">static</span> <span class="keywordtype">void</span> add_selfsigned_userid(pgp_key_t *skey, pgp_key_t *pkey, <span class="keyword">const</span> uint8_t *userid, time_t key_expiry)</div><div class="line"><a name="l00120"></a><span class="lineno"> 120</span> {</div><div class="line"><a name="l00121"></a><span class="lineno"> 121</span>  <span class="comment">/* similar to pgp_add_selfsigned_userid() which, however, uses different key flags */</span></div><div class="line"><a name="l00122"></a><span class="lineno"> 122</span>  pgp_create_sig_t *sig;</div><div class="line"><a name="l00123"></a><span class="lineno"> 123</span>  pgp_subpacket_t sigpacket;</div><div class="line"><a name="l00124"></a><span class="lineno"> 124</span>  pgp_memory_t *mem_sig = NULL;</div><div class="line"><a name="l00125"></a><span class="lineno"> 125</span>  pgp_output_t *sigoutput = NULL;</div><div class="line"><a name="l00126"></a><span class="lineno"> 126</span> </div><div class="line"><a name="l00127"></a><span class="lineno"> 127</span>  <span class="comment">/* create sig for this pkt */</span></div><div class="line"><a name="l00128"></a><span class="lineno"> 128</span>  sig = pgp_create_sig_new();</div><div class="line"><a name="l00129"></a><span class="lineno"> 129</span>  pgp_sig_start_key_sig(sig, &skey->key.seckey.pubkey, NULL, userid, PGP_CERT_POSITIVE);</div><div class="line"><a name="l00130"></a><span class="lineno"> 130</span> </div><div class="line"><a name="l00131"></a><span class="lineno"> 131</span>  pgp_add_creation_time(sig, time(NULL));</div><div class="line"><a name="l00132"></a><span class="lineno"> 132</span>  pgp_add_key_expiration_time(sig, key_expiry);</div><div class="line"><a name="l00133"></a><span class="lineno"> 133</span>  pgp_add_primary_userid(sig, 1);</div><div class="line"><a name="l00134"></a><span class="lineno"> 134</span>  pgp_add_key_flags(sig, PGP_KEYFLAG_SIGN_DATA|PGP_KEYFLAG_CERT_KEYS);</div><div class="line"><a name="l00135"></a><span class="lineno"> 135</span>  add_key_prefs(sig);</div><div class="line"><a name="l00136"></a><span class="lineno"> 136</span>  pgp_add_key_features(sig); <span class="comment">/* will add 0x01 - modification detection */</span></div><div class="line"><a name="l00137"></a><span class="lineno"> 137</span> </div><div class="line"><a name="l00138"></a><span class="lineno"> 138</span>  pgp_end_hashed_subpkts(sig);</div><div class="line"><a name="l00139"></a><span class="lineno"> 139</span> </div><div class="line"><a name="l00140"></a><span class="lineno"> 140</span>  pgp_add_issuer_keyid(sig, skey->pubkeyid); <span class="comment">/* the issuer keyid is not hashed by definition */</span></div><div class="line"><a name="l00141"></a><span class="lineno"> 141</span> </div><div class="line"><a name="l00142"></a><span class="lineno"> 142</span>  pgp_setup_memory_write(&sigoutput, &mem_sig, 128);</div><div class="line"><a name="l00143"></a><span class="lineno"> 143</span>  pgp_write_sig(sigoutput, sig, &skey->key.seckey.pubkey, &skey->key.seckey);</div><div class="line"><a name="l00144"></a><span class="lineno"> 144</span> </div><div class="line"><a name="l00145"></a><span class="lineno"> 145</span>  <span class="comment">/* add this packet to key */</span></div><div class="line"><a name="l00146"></a><span class="lineno"> 146</span>  sigpacket.length = pgp_mem_len(mem_sig);</div><div class="line"><a name="l00147"></a><span class="lineno"> 147</span>  sigpacket.raw = pgp_mem_data(mem_sig);</div><div class="line"><a name="l00148"></a><span class="lineno"> 148</span> </div><div class="line"><a name="l00149"></a><span class="lineno"> 149</span>  <span class="comment">/* add user id and signature to key */</span></div><div class="line"><a name="l00150"></a><span class="lineno"> 150</span>  pgp_update_userid(skey, userid, &sigpacket, &sig->sig.info);</div><div class="line"><a name="l00151"></a><span class="lineno"> 151</span>  <span class="keywordflow">if</span>(pkey) {</div><div class="line"><a name="l00152"></a><span class="lineno"> 152</span>  pgp_update_userid(pkey, userid, &sigpacket, &sig->sig.info);</div><div class="line"><a name="l00153"></a><span class="lineno"> 153</span>  }</div><div class="line"><a name="l00154"></a><span class="lineno"> 154</span> </div><div class="line"><a name="l00155"></a><span class="lineno"> 155</span>  <span class="comment">/* cleanup */</span></div><div class="line"><a name="l00156"></a><span class="lineno"> 156</span>  pgp_create_sig_delete(sig);</div><div class="line"><a name="l00157"></a><span class="lineno"> 157</span>  pgp_output_delete(sigoutput);</div><div class="line"><a name="l00158"></a><span class="lineno"> 158</span>  pgp_memory_free(mem_sig);</div><div class="line"><a name="l00159"></a><span class="lineno"> 159</span> }</div><div class="line"><a name="l00160"></a><span class="lineno"> 160</span> </div><div class="line"><a name="l00161"></a><span class="lineno"> 161</span> </div><div class="line"><a name="l00162"></a><span class="lineno"> 162</span> <span class="keyword">static</span> <span class="keywordtype">void</span> add_subkey_binding_signature(pgp_subkeysig_t* p, pgp_key_t* primarykey, pgp_key_t* subkey, pgp_key_t* seckey)</div><div class="line"><a name="l00163"></a><span class="lineno"> 163</span> {</div><div class="line"><a name="l00164"></a><span class="lineno"> 164</span>  <span class="comment">/*add "0x18: Subkey Binding Signature" packet, PGP_SIG_SUBKEY */</span></div><div class="line"><a name="l00165"></a><span class="lineno"> 165</span>  pgp_create_sig_t* sig;</div><div class="line"><a name="l00166"></a><span class="lineno"> 166</span>  pgp_output_t* sigoutput = NULL;</div><div class="line"><a name="l00167"></a><span class="lineno"> 167</span>  pgp_memory_t* mem_sig = NULL;</div><div class="line"><a name="l00168"></a><span class="lineno"> 168</span> </div><div class="line"><a name="l00169"></a><span class="lineno"> 169</span>  sig = pgp_create_sig_new();</div><div class="line"><a name="l00170"></a><span class="lineno"> 170</span>  pgp_sig_start_key_sig(sig, &primarykey->key.pubkey, &subkey->key.pubkey, NULL, PGP_SIG_SUBKEY);</div><div class="line"><a name="l00171"></a><span class="lineno"> 171</span> </div><div class="line"><a name="l00172"></a><span class="lineno"> 172</span>  pgp_add_creation_time(sig, time(NULL));</div><div class="line"><a name="l00173"></a><span class="lineno"> 173</span>  pgp_add_key_expiration_time(sig, 0);</div><div class="line"><a name="l00174"></a><span class="lineno"> 174</span>  pgp_add_key_flags(sig, PGP_KEYFLAG_ENC_STORAGE|PGP_KEYFLAG_ENC_COMM); <span class="comment">/* NB: algo/hash/compression preferences are not added to subkeys */</span></div><div class="line"><a name="l00175"></a><span class="lineno"> 175</span> </div><div class="line"><a name="l00176"></a><span class="lineno"> 176</span>  pgp_end_hashed_subpkts(sig);</div><div class="line"><a name="l00177"></a><span class="lineno"> 177</span> </div><div class="line"><a name="l00178"></a><span class="lineno"> 178</span>  pgp_add_issuer_keyid(sig, seckey->pubkeyid); <span class="comment">/* the issuer keyid is not hashed by definition */</span></div><div class="line"><a name="l00179"></a><span class="lineno"> 179</span> </div><div class="line"><a name="l00180"></a><span class="lineno"> 180</span>  pgp_setup_memory_write(&sigoutput, &mem_sig, 128);</div><div class="line"><a name="l00181"></a><span class="lineno"> 181</span>  pgp_write_sig(sigoutput, sig, &seckey->key.seckey.pubkey, &seckey->key.seckey);</div><div class="line"><a name="l00182"></a><span class="lineno"> 182</span> </div><div class="line"><a name="l00183"></a><span class="lineno"> 183</span>  p->subkey = primarykey->subkeyc-1; <span class="comment">/* index of subkey in array */</span></div><div class="line"><a name="l00184"></a><span class="lineno"> 184</span>  p->packet.length = mem_sig->length;</div><div class="line"><a name="l00185"></a><span class="lineno"> 185</span>  p->packet.raw = mem_sig->buf; mem_sig->buf = NULL; <span class="comment">/* move ownership to packet */</span></div><div class="line"><a name="l00186"></a><span class="lineno"> 186</span>  copy_sig_info(&p->siginfo, &sig->sig.info); <span class="comment">/* not sure, if this is okay, however, siginfo should be set up, otherwise we get "bad info-type" errors */</span></div><div class="line"><a name="l00187"></a><span class="lineno"> 187</span> </div><div class="line"><a name="l00188"></a><span class="lineno"> 188</span>  pgp_create_sig_delete(sig);</div><div class="line"><a name="l00189"></a><span class="lineno"> 189</span>  pgp_output_delete(sigoutput);</div><div class="line"><a name="l00190"></a><span class="lineno"> 190</span>  free(mem_sig); <span class="comment">/* do not use pgp_memory_free() as this would also free mem_sig->buf which is owned by the packet */</span></div><div class="line"><a name="l00191"></a><span class="lineno"> 191</span> }</div><div class="line"><a name="l00192"></a><span class="lineno"> 192</span> </div><div class="line"><a name="l00193"></a><span class="lineno"> 193</span> </div><div class="line"><a name="l00194"></a><span class="lineno"> 194</span> <span class="keywordtype">int</span> mrpgp_create_keypair(<a class="code" href="structmrmailbox__t.html">mrmailbox_t</a>* mailbox, <span class="keyword">const</span> <span class="keywordtype">char</span>* addr, mrkey_t* ret_public_key, mrkey_t* ret_private_key)</div><div class="line"><a name="l00195"></a><span class="lineno"> 195</span> {</div><div class="line"><a name="l00196"></a><span class="lineno"> 196</span>  <span class="keywordtype">int</span> success = 0;</div><div class="line"><a name="l00197"></a><span class="lineno"> 197</span>  pgp_key_t seckey, pubkey, subkey;</div><div class="line"><a name="l00198"></a><span class="lineno"> 198</span>  uint8_t subkeyid[PGP_KEY_ID_SIZE];</div><div class="line"><a name="l00199"></a><span class="lineno"> 199</span>  uint8_t* user_id = NULL;</div><div class="line"><a name="l00200"></a><span class="lineno"> 200</span>  pgp_memory_t *pubmem = pgp_memory_new(), *secmem = pgp_memory_new();</div><div class="line"><a name="l00201"></a><span class="lineno"> 201</span>  pgp_output_t *pubout = pgp_output_new(), *secout = pgp_output_new();</div><div class="line"><a name="l00202"></a><span class="lineno"> 202</span> </div><div class="line"><a name="l00203"></a><span class="lineno"> 203</span>  memset(&seckey, 0, <span class="keyword">sizeof</span>(pgp_key_t));</div><div class="line"><a name="l00204"></a><span class="lineno"> 204</span>  memset(&pubkey, 0, <span class="keyword">sizeof</span>(pgp_key_t));</div><div class="line"><a name="l00205"></a><span class="lineno"> 205</span>  memset(&subkey, 0, <span class="keyword">sizeof</span>(pgp_key_t));</div><div class="line"><a name="l00206"></a><span class="lineno"> 206</span> </div><div class="line"><a name="l00207"></a><span class="lineno"> 207</span>  <span class="keywordflow">if</span>( mailbox==NULL || addr==NULL || ret_public_key==NULL || ret_private_key==NULL</div><div class="line"><a name="l00208"></a><span class="lineno"> 208</span>  || pubmem==NULL || secmem==NULL || pubout==NULL || secout==NULL ) {</div><div class="line"><a name="l00209"></a><span class="lineno"> 209</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00210"></a><span class="lineno"> 210</span>  }</div><div class="line"><a name="l00211"></a><span class="lineno"> 211</span> </div><div class="line"><a name="l00212"></a><span class="lineno"> 212</span>  <span class="comment">/* Generate User ID. For convention, use the same address as given in `Autocrypt: to=...` in angle brackets</span></div><div class="line"><a name="l00213"></a><span class="lineno"> 213</span> <span class="comment"> (RFC 2822 grammar angle-addr, see also https://autocrypt.org/en/latest/level0.html#type-p-openpgp-based-key-data )</span></div><div class="line"><a name="l00214"></a><span class="lineno"> 214</span> <span class="comment"> We do not add the name to the ID for the following reasons:</span></div><div class="line"><a name="l00215"></a><span class="lineno"> 215</span> <span class="comment"> - privacy</span></div><div class="line"><a name="l00216"></a><span class="lineno"> 216</span> <span class="comment"> - the name may be changed</span></div><div class="line"><a name="l00217"></a><span class="lineno"> 217</span> <span class="comment"> - shorter keys</span></div><div class="line"><a name="l00218"></a><span class="lineno"> 218</span> <span class="comment"> - the name is already taken from From:</span></div><div class="line"><a name="l00219"></a><span class="lineno"> 219</span> <span class="comment"> - not Autocrypt:-standard */</span></div><div class="line"><a name="l00220"></a><span class="lineno"> 220</span>  user_id = (uint8_t*)mr_mprintf(<span class="stringliteral">"<%s>"</span>, addr);</div><div class="line"><a name="l00221"></a><span class="lineno"> 221</span> </div><div class="line"><a name="l00222"></a><span class="lineno"> 222</span>  <span class="comment">/* generate two keypairs */</span></div><div class="line"><a name="l00223"></a><span class="lineno"> 223</span>  <span class="keywordflow">if</span>( !pgp_rsa_generate_keypair(&seckey, 3072<span class="comment">/*bits*/</span>, 65537UL<span class="comment">/*e*/</span>, NULL, NULL, NULL, 0)</div><div class="line"><a name="l00224"></a><span class="lineno"> 224</span>  || !pgp_rsa_generate_keypair(&subkey, 3072<span class="comment">/*bits*/</span>, 65537UL<span class="comment">/*e*/</span>, NULL, NULL, NULL, 0) ) {</div><div class="line"><a name="l00225"></a><span class="lineno"> 225</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00226"></a><span class="lineno"> 226</span>  }</div><div class="line"><a name="l00227"></a><span class="lineno"> 227</span> </div><div class="line"><a name="l00228"></a><span class="lineno"> 228</span> </div><div class="line"><a name="l00229"></a><span class="lineno"> 229</span>  <span class="comment">/* Create public key, bind public subkey to public key</span></div><div class="line"><a name="l00230"></a><span class="lineno"> 230</span> <span class="comment"> ------------------------------------------------------------------------ */</span></div><div class="line"><a name="l00231"></a><span class="lineno"> 231</span> </div><div class="line"><a name="l00232"></a><span class="lineno"> 232</span>  pubkey.type = PGP_PTAG_CT_PUBLIC_KEY;</div><div class="line"><a name="l00233"></a><span class="lineno"> 233</span>  pgp_pubkey_dup(&pubkey.key.pubkey, &seckey.key.pubkey);</div><div class="line"><a name="l00234"></a><span class="lineno"> 234</span>  memcpy(pubkey.pubkeyid, seckey.pubkeyid, PGP_KEY_ID_SIZE);</div><div class="line"><a name="l00235"></a><span class="lineno"> 235</span>  pgp_fingerprint(&pubkey.pubkeyfpr, &seckey.key.pubkey, 0);</div><div class="line"><a name="l00236"></a><span class="lineno"> 236</span>  add_selfsigned_userid(&seckey, &pubkey, (<span class="keyword">const</span> uint8_t*)user_id, 0<span class="comment">/*never expire*/</span>);</div><div class="line"><a name="l00237"></a><span class="lineno"> 237</span> </div><div class="line"><a name="l00238"></a><span class="lineno"> 238</span>  EXPAND_ARRAY((&pubkey), subkey);</div><div class="line"><a name="l00239"></a><span class="lineno"> 239</span>  {</div><div class="line"><a name="l00240"></a><span class="lineno"> 240</span>  pgp_subkey_t* p = &pubkey.subkeys[pubkey.subkeyc++];</div><div class="line"><a name="l00241"></a><span class="lineno"> 241</span>  pgp_pubkey_dup(&p->key.pubkey, &subkey.key.pubkey);</div><div class="line"><a name="l00242"></a><span class="lineno"> 242</span>  pgp_keyid(subkeyid, PGP_KEY_ID_SIZE, &pubkey.key.pubkey, PGP_HASH_SHA1);</div><div class="line"><a name="l00243"></a><span class="lineno"> 243</span>  memcpy(p->id, subkeyid, PGP_KEY_ID_SIZE);</div><div class="line"><a name="l00244"></a><span class="lineno"> 244</span>  }</div><div class="line"><a name="l00245"></a><span class="lineno"> 245</span> </div><div class="line"><a name="l00246"></a><span class="lineno"> 246</span>  EXPAND_ARRAY((&pubkey), subkeysig);</div><div class="line"><a name="l00247"></a><span class="lineno"> 247</span>  add_subkey_binding_signature(&pubkey.subkeysigs[pubkey.subkeysigc++], &pubkey, &subkey, &seckey);</div><div class="line"><a name="l00248"></a><span class="lineno"> 248</span> </div><div class="line"><a name="l00249"></a><span class="lineno"> 249</span> </div><div class="line"><a name="l00250"></a><span class="lineno"> 250</span>  <span class="comment">/* Create secret key, bind secret subkey to secret key</span></div><div class="line"><a name="l00251"></a><span class="lineno"> 251</span> <span class="comment"> ------------------------------------------------------------------------ */</span></div><div class="line"><a name="l00252"></a><span class="lineno"> 252</span> </div><div class="line"><a name="l00253"></a><span class="lineno"> 253</span>  EXPAND_ARRAY((&seckey), subkey);</div><div class="line"><a name="l00254"></a><span class="lineno"> 254</span>  {</div><div class="line"><a name="l00255"></a><span class="lineno"> 255</span>  pgp_subkey_t* p = &seckey.subkeys[seckey.subkeyc++];</div><div class="line"><a name="l00256"></a><span class="lineno"> 256</span>  pgp_seckey_dup(&p->key.seckey, &subkey.key.seckey);</div><div class="line"><a name="l00257"></a><span class="lineno"> 257</span>  pgp_keyid(subkeyid, PGP_KEY_ID_SIZE, &seckey.key.pubkey, PGP_HASH_SHA1);</div><div class="line"><a name="l00258"></a><span class="lineno"> 258</span>  memcpy(p->id, subkeyid, PGP_KEY_ID_SIZE);</div><div class="line"><a name="l00259"></a><span class="lineno"> 259</span>  }</div><div class="line"><a name="l00260"></a><span class="lineno"> 260</span> </div><div class="line"><a name="l00261"></a><span class="lineno"> 261</span>  EXPAND_ARRAY((&seckey), subkeysig);</div><div class="line"><a name="l00262"></a><span class="lineno"> 262</span>  add_subkey_binding_signature(&seckey.subkeysigs[seckey.subkeysigc++], &seckey, &subkey, &seckey);</div><div class="line"><a name="l00263"></a><span class="lineno"> 263</span> </div><div class="line"><a name="l00264"></a><span class="lineno"> 264</span> </div><div class="line"><a name="l00265"></a><span class="lineno"> 265</span>  <span class="comment">/* Done with key generation, write binary keys to memory</span></div><div class="line"><a name="l00266"></a><span class="lineno"> 266</span> <span class="comment"> ------------------------------------------------------------------------ */</span></div><div class="line"><a name="l00267"></a><span class="lineno"> 267</span> </div><div class="line"><a name="l00268"></a><span class="lineno"> 268</span>  pgp_writer_set_memory(pubout, pubmem);</div><div class="line"><a name="l00269"></a><span class="lineno"> 269</span>  <span class="keywordflow">if</span>( !pgp_write_xfer_key(pubout, &pubkey, 0<span class="comment">/*armored*/</span>)</div><div class="line"><a name="l00270"></a><span class="lineno"> 270</span>  || pubmem->buf == NULL || pubmem->length <= 0 ) {</div><div class="line"><a name="l00271"></a><span class="lineno"> 271</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00272"></a><span class="lineno"> 272</span>  }</div><div class="line"><a name="l00273"></a><span class="lineno"> 273</span> </div><div class="line"><a name="l00274"></a><span class="lineno"> 274</span>  pgp_writer_set_memory(secout, secmem);</div><div class="line"><a name="l00275"></a><span class="lineno"> 275</span>  <span class="keywordflow">if</span>( !pgp_write_xfer_key(secout, &seckey, 0<span class="comment">/*armored*/</span>)</div><div class="line"><a name="l00276"></a><span class="lineno"> 276</span>  || secmem->buf == NULL || secmem->length <= 0 ) {</div><div class="line"><a name="l00277"></a><span class="lineno"> 277</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00278"></a><span class="lineno"> 278</span>  }</div><div class="line"><a name="l00279"></a><span class="lineno"> 279</span> </div><div class="line"><a name="l00280"></a><span class="lineno"> 280</span>  mrkey_set_from_raw(ret_public_key, pubmem->buf, pubmem->length, MR_PUBLIC);</div><div class="line"><a name="l00281"></a><span class="lineno"> 281</span>  mrkey_set_from_raw(ret_private_key, secmem->buf, secmem->length, MR_PRIVATE);</div><div class="line"><a name="l00282"></a><span class="lineno"> 282</span> </div><div class="line"><a name="l00283"></a><span class="lineno"> 283</span>  success = 1;</div><div class="line"><a name="l00284"></a><span class="lineno"> 284</span> </div><div class="line"><a name="l00285"></a><span class="lineno"> 285</span> cleanup:</div><div class="line"><a name="l00286"></a><span class="lineno"> 286</span>  <span class="keywordflow">if</span>( pubout ) { pgp_output_delete(pubout); }</div><div class="line"><a name="l00287"></a><span class="lineno"> 287</span>  <span class="keywordflow">if</span>( secout ) { pgp_output_delete(secout); }</div><div class="line"><a name="l00288"></a><span class="lineno"> 288</span>  <span class="keywordflow">if</span>( pubmem ) { pgp_memory_free(pubmem); }</div><div class="line"><a name="l00289"></a><span class="lineno"> 289</span>  <span class="keywordflow">if</span>( secmem ) { pgp_memory_free(secmem); }</div><div class="line"><a name="l00290"></a><span class="lineno"> 290</span>  pgp_key_free(&seckey); <span class="comment">/* not: pgp_keydata_free() which will also free the pointer itself (we created it on the stack) */</span></div><div class="line"><a name="l00291"></a><span class="lineno"> 291</span>  pgp_key_free(&pubkey);</div><div class="line"><a name="l00292"></a><span class="lineno"> 292</span>  pgp_key_free(&subkey);</div><div class="line"><a name="l00293"></a><span class="lineno"> 293</span>  free(user_id);</div><div class="line"><a name="l00294"></a><span class="lineno"> 294</span>  <span class="keywordflow">return</span> success;</div><div class="line"><a name="l00295"></a><span class="lineno"> 295</span> }</div><div class="line"><a name="l00296"></a><span class="lineno"> 296</span> </div><div class="line"><a name="l00297"></a><span class="lineno"> 297</span> </div><div class="line"><a name="l00298"></a><span class="lineno"> 298</span> <span class="comment">/*******************************************************************************</span></div><div class="line"><a name="l00299"></a><span class="lineno"> 299</span> <span class="comment"> * Check keys</span></div><div class="line"><a name="l00300"></a><span class="lineno"> 300</span> <span class="comment"> ******************************************************************************/</span></div><div class="line"><a name="l00301"></a><span class="lineno"> 301</span> </div><div class="line"><a name="l00302"></a><span class="lineno"> 302</span> </div><div class="line"><a name="l00303"></a><span class="lineno"> 303</span> <span class="keywordtype">int</span> mrpgp_is_valid_key(<a class="code" href="structmrmailbox__t.html">mrmailbox_t</a>* mailbox, <span class="keyword">const</span> mrkey_t* raw_key)</div><div class="line"><a name="l00304"></a><span class="lineno"> 304</span> {</div><div class="line"><a name="l00305"></a><span class="lineno"> 305</span>  <span class="keywordtype">int</span> key_is_valid = 0;</div><div class="line"><a name="l00306"></a><span class="lineno"> 306</span>  pgp_keyring_t* public_keys = calloc(1, <span class="keyword">sizeof</span>(pgp_keyring_t));</div><div class="line"><a name="l00307"></a><span class="lineno"> 307</span>  pgp_keyring_t* private_keys = calloc(1, <span class="keyword">sizeof</span>(pgp_keyring_t));</div><div class="line"><a name="l00308"></a><span class="lineno"> 308</span>  pgp_memory_t* keysmem = pgp_memory_new();</div><div class="line"><a name="l00309"></a><span class="lineno"> 309</span> </div><div class="line"><a name="l00310"></a><span class="lineno"> 310</span>  <span class="keywordflow">if</span>( mailbox==NULL || raw_key==NULL</div><div class="line"><a name="l00311"></a><span class="lineno"> 311</span>  || raw_key->m_binary == NULL || raw_key->m_bytes <= 0</div><div class="line"><a name="l00312"></a><span class="lineno"> 312</span>  || public_keys==NULL || private_keys==NULL || keysmem==NULL ) {</div><div class="line"><a name="l00313"></a><span class="lineno"> 313</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00314"></a><span class="lineno"> 314</span>  }</div><div class="line"><a name="l00315"></a><span class="lineno"> 315</span> </div><div class="line"><a name="l00316"></a><span class="lineno"> 316</span>  pgp_memory_add(keysmem, raw_key->m_binary, raw_key->m_bytes);</div><div class="line"><a name="l00317"></a><span class="lineno"> 317</span> </div><div class="line"><a name="l00318"></a><span class="lineno"> 318</span>  pgp_filter_keys_from_mem(&s_io, public_keys, private_keys, NULL, 0, keysmem); <span class="comment">/* function returns 0 on any error in any packet - this does not mean, we cannot use the key. We check the details below therefore. */</span></div><div class="line"><a name="l00319"></a><span class="lineno"> 319</span> </div><div class="line"><a name="l00320"></a><span class="lineno"> 320</span>  <span class="keywordflow">if</span>( raw_key->m_type == MR_PUBLIC && public_keys->keyc >= 1 ) {</div><div class="line"><a name="l00321"></a><span class="lineno"> 321</span>  key_is_valid = 1;</div><div class="line"><a name="l00322"></a><span class="lineno"> 322</span>  }</div><div class="line"><a name="l00323"></a><span class="lineno"> 323</span>  <span class="keywordflow">else</span> <span class="keywordflow">if</span>( raw_key->m_type == MR_PRIVATE && private_keys->keyc >= 1 ) {</div><div class="line"><a name="l00324"></a><span class="lineno"> 324</span>  key_is_valid = 1;</div><div class="line"><a name="l00325"></a><span class="lineno"> 325</span>  }</div><div class="line"><a name="l00326"></a><span class="lineno"> 326</span> </div><div class="line"><a name="l00327"></a><span class="lineno"> 327</span> cleanup:</div><div class="line"><a name="l00328"></a><span class="lineno"> 328</span>  <span class="keywordflow">if</span>( keysmem ) { pgp_memory_free(keysmem); }</div><div class="line"><a name="l00329"></a><span class="lineno"> 329</span>  <span class="keywordflow">if</span>( public_keys ) { pgp_keyring_purge(public_keys); free(public_keys); } <span class="comment">/*pgp_keyring_free() frees the content, not the pointer itself*/</span></div><div class="line"><a name="l00330"></a><span class="lineno"> 330</span>  <span class="keywordflow">if</span>( private_keys ) { pgp_keyring_purge(private_keys); free(private_keys); }</div><div class="line"><a name="l00331"></a><span class="lineno"> 331</span>  <span class="keywordflow">return</span> key_is_valid;</div><div class="line"><a name="l00332"></a><span class="lineno"> 332</span> }</div><div class="line"><a name="l00333"></a><span class="lineno"> 333</span> </div><div class="line"><a name="l00334"></a><span class="lineno"> 334</span> </div><div class="line"><a name="l00335"></a><span class="lineno"> 335</span> <span class="keywordtype">int</span> mrpgp_calc_fingerprint(<a class="code" href="structmrmailbox__t.html">mrmailbox_t</a>* mailbox, <span class="keyword">const</span> mrkey_t* raw_key, uint8_t** ret_fingerprint, <span class="keywordtype">size_t</span>* ret_fingerprint_bytes)</div><div class="line"><a name="l00336"></a><span class="lineno"> 336</span> {</div><div class="line"><a name="l00337"></a><span class="lineno"> 337</span>  <span class="keywordtype">int</span> success = 0;</div><div class="line"><a name="l00338"></a><span class="lineno"> 338</span>  pgp_keyring_t* public_keys = calloc(1, <span class="keyword">sizeof</span>(pgp_keyring_t));</div><div class="line"><a name="l00339"></a><span class="lineno"> 339</span>  pgp_keyring_t* private_keys = calloc(1, <span class="keyword">sizeof</span>(pgp_keyring_t));</div><div class="line"><a name="l00340"></a><span class="lineno"> 340</span>  pgp_memory_t* keysmem = pgp_memory_new();</div><div class="line"><a name="l00341"></a><span class="lineno"> 341</span> </div><div class="line"><a name="l00342"></a><span class="lineno"> 342</span>  <span class="keywordflow">if</span>( mailbox==NULL || raw_key==NULL || ret_fingerprint==NULL || *ret_fingerprint!=NULL || ret_fingerprint_bytes==NULL || *ret_fingerprint_bytes!=0</div><div class="line"><a name="l00343"></a><span class="lineno"> 343</span>  || raw_key->m_binary == NULL || raw_key->m_bytes <= 0</div><div class="line"><a name="l00344"></a><span class="lineno"> 344</span>  || public_keys==NULL || private_keys==NULL || keysmem==NULL ) {</div><div class="line"><a name="l00345"></a><span class="lineno"> 345</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00346"></a><span class="lineno"> 346</span>  }</div><div class="line"><a name="l00347"></a><span class="lineno"> 347</span> </div><div class="line"><a name="l00348"></a><span class="lineno"> 348</span>  pgp_memory_add(keysmem, raw_key->m_binary, raw_key->m_bytes);</div><div class="line"><a name="l00349"></a><span class="lineno"> 349</span> </div><div class="line"><a name="l00350"></a><span class="lineno"> 350</span>  pgp_filter_keys_from_mem(&s_io, public_keys, private_keys, NULL, 0, keysmem);</div><div class="line"><a name="l00351"></a><span class="lineno"> 351</span> </div><div class="line"><a name="l00352"></a><span class="lineno"> 352</span>  <span class="keywordflow">if</span>( raw_key->m_type != MR_PUBLIC || public_keys->keyc <= 0 ) {</div><div class="line"><a name="l00353"></a><span class="lineno"> 353</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00354"></a><span class="lineno"> 354</span>  }</div><div class="line"><a name="l00355"></a><span class="lineno"> 355</span> </div><div class="line"><a name="l00356"></a><span class="lineno"> 356</span>  pgp_key_t* key0 = &public_keys->keys[0];</div><div class="line"><a name="l00357"></a><span class="lineno"> 357</span>  pgp_pubkey_t* pubkey0 = &key0->key.pubkey;</div><div class="line"><a name="l00358"></a><span class="lineno"> 358</span>  <span class="keywordflow">if</span>( !pgp_fingerprint(&key0->pubkeyfpr, pubkey0, 0) ) {</div><div class="line"><a name="l00359"></a><span class="lineno"> 359</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00360"></a><span class="lineno"> 360</span>  }</div><div class="line"><a name="l00361"></a><span class="lineno"> 361</span> </div><div class="line"><a name="l00362"></a><span class="lineno"> 362</span>  *ret_fingerprint_bytes = key0->pubkeyfpr.length;</div><div class="line"><a name="l00363"></a><span class="lineno"> 363</span>  *ret_fingerprint = malloc(*ret_fingerprint_bytes);</div><div class="line"><a name="l00364"></a><span class="lineno"> 364</span>  memcpy(*ret_fingerprint, key0->pubkeyfpr.fingerprint, *ret_fingerprint_bytes);</div><div class="line"><a name="l00365"></a><span class="lineno"> 365</span> </div><div class="line"><a name="l00366"></a><span class="lineno"> 366</span>  success = 1;</div><div class="line"><a name="l00367"></a><span class="lineno"> 367</span> </div><div class="line"><a name="l00368"></a><span class="lineno"> 368</span> cleanup:</div><div class="line"><a name="l00369"></a><span class="lineno"> 369</span>  <span class="keywordflow">if</span>( keysmem ) { pgp_memory_free(keysmem); }</div><div class="line"><a name="l00370"></a><span class="lineno"> 370</span>  <span class="keywordflow">if</span>( public_keys ) { pgp_keyring_purge(public_keys); free(public_keys); } <span class="comment">/*pgp_keyring_free() frees the content, not the pointer itself*/</span></div><div class="line"><a name="l00371"></a><span class="lineno"> 371</span>  <span class="keywordflow">if</span>( private_keys ) { pgp_keyring_purge(private_keys); free(private_keys); }</div><div class="line"><a name="l00372"></a><span class="lineno"> 372</span>  <span class="keywordflow">return</span> success;</div><div class="line"><a name="l00373"></a><span class="lineno"> 373</span> }</div><div class="line"><a name="l00374"></a><span class="lineno"> 374</span> </div><div class="line"><a name="l00375"></a><span class="lineno"> 375</span> </div><div class="line"><a name="l00376"></a><span class="lineno"> 376</span> <span class="keywordtype">int</span> mrpgp_split_key(<a class="code" href="structmrmailbox__t.html">mrmailbox_t</a>* mailbox, <span class="keyword">const</span> mrkey_t* private_in, mrkey_t* ret_public_key)</div><div class="line"><a name="l00377"></a><span class="lineno"> 377</span> {</div><div class="line"><a name="l00378"></a><span class="lineno"> 378</span>  <span class="keywordtype">int</span> success = 0;</div><div class="line"><a name="l00379"></a><span class="lineno"> 379</span>  pgp_keyring_t* public_keys = calloc(1, <span class="keyword">sizeof</span>(pgp_keyring_t));</div><div class="line"><a name="l00380"></a><span class="lineno"> 380</span>  pgp_keyring_t* private_keys = calloc(1, <span class="keyword">sizeof</span>(pgp_keyring_t));</div><div class="line"><a name="l00381"></a><span class="lineno"> 381</span>  pgp_memory_t* keysmem = pgp_memory_new();</div><div class="line"><a name="l00382"></a><span class="lineno"> 382</span>  pgp_memory_t* pubmem = pgp_memory_new();</div><div class="line"><a name="l00383"></a><span class="lineno"> 383</span>  pgp_output_t* pubout = pgp_output_new();</div><div class="line"><a name="l00384"></a><span class="lineno"> 384</span> </div><div class="line"><a name="l00385"></a><span class="lineno"> 385</span>  <span class="keywordflow">if</span>( mailbox == NULL || private_in==NULL || ret_public_key==NULL</div><div class="line"><a name="l00386"></a><span class="lineno"> 386</span>  || public_keys==NULL || private_keys==NULL || keysmem==NULL || pubmem==NULL || pubout==NULL ) {</div><div class="line"><a name="l00387"></a><span class="lineno"> 387</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00388"></a><span class="lineno"> 388</span>  }</div><div class="line"><a name="l00389"></a><span class="lineno"> 389</span> </div><div class="line"><a name="l00390"></a><span class="lineno"> 390</span>  pgp_memory_add(keysmem, private_in->m_binary, private_in->m_bytes);</div><div class="line"><a name="l00391"></a><span class="lineno"> 391</span>  pgp_filter_keys_from_mem(&s_io, public_keys, private_keys, NULL, 0, keysmem);</div><div class="line"><a name="l00392"></a><span class="lineno"> 392</span> </div><div class="line"><a name="l00393"></a><span class="lineno"> 393</span>  <span class="keywordflow">if</span>( private_in->m_type!=MR_PRIVATE || private_keys->keyc <= 0 ) {</div><div class="line"><a name="l00394"></a><span class="lineno"> 394</span>  mrmailbox_log_warning(mailbox, 0, <span class="stringliteral">"Split key: Given key is no private key."</span>);</div><div class="line"><a name="l00395"></a><span class="lineno"> 395</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00396"></a><span class="lineno"> 396</span>  }</div><div class="line"><a name="l00397"></a><span class="lineno"> 397</span> </div><div class="line"><a name="l00398"></a><span class="lineno"> 398</span>  <span class="keywordflow">if</span>( public_keys->keyc <= 0 ) {</div><div class="line"><a name="l00399"></a><span class="lineno"> 399</span>  mrmailbox_log_warning(mailbox, 0, <span class="stringliteral">"Split key: Given key does not contain a public key."</span>);</div><div class="line"><a name="l00400"></a><span class="lineno"> 400</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00401"></a><span class="lineno"> 401</span>  }</div><div class="line"><a name="l00402"></a><span class="lineno"> 402</span> </div><div class="line"><a name="l00403"></a><span class="lineno"> 403</span>  pgp_writer_set_memory(pubout, pubmem);</div><div class="line"><a name="l00404"></a><span class="lineno"> 404</span>  <span class="keywordflow">if</span>( !pgp_write_xfer_key(pubout, &public_keys->keys[0], 0<span class="comment">/*armored*/</span>)</div><div class="line"><a name="l00405"></a><span class="lineno"> 405</span>  || pubmem->buf == NULL || pubmem->length <= 0 ) {</div><div class="line"><a name="l00406"></a><span class="lineno"> 406</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00407"></a><span class="lineno"> 407</span>  }</div><div class="line"><a name="l00408"></a><span class="lineno"> 408</span> </div><div class="line"><a name="l00409"></a><span class="lineno"> 409</span>  mrkey_set_from_raw(ret_public_key, pubmem->buf, pubmem->length, MR_PUBLIC);</div><div class="line"><a name="l00410"></a><span class="lineno"> 410</span> </div><div class="line"><a name="l00411"></a><span class="lineno"> 411</span>  success = 1;</div><div class="line"><a name="l00412"></a><span class="lineno"> 412</span> </div><div class="line"><a name="l00413"></a><span class="lineno"> 413</span> cleanup:</div><div class="line"><a name="l00414"></a><span class="lineno"> 414</span>  <span class="keywordflow">if</span>( pubout ) { pgp_output_delete(pubout); }</div><div class="line"><a name="l00415"></a><span class="lineno"> 415</span>  <span class="keywordflow">if</span>( pubmem ) { pgp_memory_free(pubmem); }</div><div class="line"><a name="l00416"></a><span class="lineno"> 416</span>  <span class="keywordflow">if</span>( keysmem ) { pgp_memory_free(keysmem); }</div><div class="line"><a name="l00417"></a><span class="lineno"> 417</span>  <span class="keywordflow">if</span>( public_keys ) { pgp_keyring_purge(public_keys); free(public_keys); } <span class="comment">/*pgp_keyring_free() frees the content, not the pointer itself*/</span></div><div class="line"><a name="l00418"></a><span class="lineno"> 418</span>  <span class="keywordflow">if</span>( private_keys ) { pgp_keyring_purge(private_keys); free(private_keys); }</div><div class="line"><a name="l00419"></a><span class="lineno"> 419</span>  <span class="keywordflow">return</span> success;</div><div class="line"><a name="l00420"></a><span class="lineno"> 420</span> }</div><div class="line"><a name="l00421"></a><span class="lineno"> 421</span> </div><div class="line"><a name="l00422"></a><span class="lineno"> 422</span> </div><div class="line"><a name="l00423"></a><span class="lineno"> 423</span> <span class="comment">/*******************************************************************************</span></div><div class="line"><a name="l00424"></a><span class="lineno"> 424</span> <span class="comment"> * Public key encrypt/decrypt</span></div><div class="line"><a name="l00425"></a><span class="lineno"> 425</span> <span class="comment"> ******************************************************************************/</span></div><div class="line"><a name="l00426"></a><span class="lineno"> 426</span> </div><div class="line"><a name="l00427"></a><span class="lineno"> 427</span> </div><div class="line"><a name="l00428"></a><span class="lineno"> 428</span> <span class="keywordtype">int</span> mrpgp_pk_encrypt( <a class="code" href="structmrmailbox__t.html">mrmailbox_t</a>* mailbox,</div><div class="line"><a name="l00429"></a><span class="lineno"> 429</span>  <span class="keyword">const</span> <span class="keywordtype">void</span>* plain_text,</div><div class="line"><a name="l00430"></a><span class="lineno"> 430</span>  <span class="keywordtype">size_t</span> plain_bytes,</div><div class="line"><a name="l00431"></a><span class="lineno"> 431</span>  <span class="keyword">const</span> mrkeyring_t* raw_public_keys_for_encryption,</div><div class="line"><a name="l00432"></a><span class="lineno"> 432</span>  <span class="keyword">const</span> mrkey_t* raw_private_key_for_signing,</div><div class="line"><a name="l00433"></a><span class="lineno"> 433</span>  <span class="keywordtype">int</span> use_armor,</div><div class="line"><a name="l00434"></a><span class="lineno"> 434</span>  <span class="keywordtype">void</span>** ret_ctext,</div><div class="line"><a name="l00435"></a><span class="lineno"> 435</span>  <span class="keywordtype">size_t</span>* ret_ctext_bytes)</div><div class="line"><a name="l00436"></a><span class="lineno"> 436</span> {</div><div class="line"><a name="l00437"></a><span class="lineno"> 437</span>  pgp_keyring_t* public_keys = calloc(1, <span class="keyword">sizeof</span>(pgp_keyring_t));</div><div class="line"><a name="l00438"></a><span class="lineno"> 438</span>  pgp_keyring_t* private_keys = calloc(1, <span class="keyword">sizeof</span>(pgp_keyring_t));</div><div class="line"><a name="l00439"></a><span class="lineno"> 439</span>  pgp_keyring_t* dummy_keys = calloc(1, <span class="keyword">sizeof</span>(pgp_keyring_t));</div><div class="line"><a name="l00440"></a><span class="lineno"> 440</span>  pgp_memory_t* keysmem = pgp_memory_new();</div><div class="line"><a name="l00441"></a><span class="lineno"> 441</span>  pgp_memory_t* signedmem = NULL;</div><div class="line"><a name="l00442"></a><span class="lineno"> 442</span>  <span class="keywordtype">int</span> i, success = 0;</div><div class="line"><a name="l00443"></a><span class="lineno"> 443</span> </div><div class="line"><a name="l00444"></a><span class="lineno"> 444</span>  <span class="keywordflow">if</span>( mailbox==NULL || plain_text==NULL || plain_bytes==0 || ret_ctext==NULL || ret_ctext_bytes==NULL</div><div class="line"><a name="l00445"></a><span class="lineno"> 445</span>  || raw_public_keys_for_encryption==NULL || raw_public_keys_for_encryption->m_count<=0</div><div class="line"><a name="l00446"></a><span class="lineno"> 446</span>  || keysmem==NULL || public_keys==NULL || private_keys==NULL || dummy_keys==NULL ) {</div><div class="line"><a name="l00447"></a><span class="lineno"> 447</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00448"></a><span class="lineno"> 448</span>  }</div><div class="line"><a name="l00449"></a><span class="lineno"> 449</span> </div><div class="line"><a name="l00450"></a><span class="lineno"> 450</span>  *ret_ctext = NULL;</div><div class="line"><a name="l00451"></a><span class="lineno"> 451</span>  *ret_ctext_bytes = 0;</div><div class="line"><a name="l00452"></a><span class="lineno"> 452</span> </div><div class="line"><a name="l00453"></a><span class="lineno"> 453</span>  <span class="comment">/* setup keys (the keys may come from pgp_filter_keys_fileread(), see also pgp_keyring_add(rcpts, key)) */</span></div><div class="line"><a name="l00454"></a><span class="lineno"> 454</span>  <span class="keywordflow">for</span>( i = 0; i < raw_public_keys_for_encryption->m_count; i++ ) {</div><div class="line"><a name="l00455"></a><span class="lineno"> 455</span>  pgp_memory_add(keysmem, raw_public_keys_for_encryption->m_keys[i]->m_binary, raw_public_keys_for_encryption->m_keys[i]->m_bytes);</div><div class="line"><a name="l00456"></a><span class="lineno"> 456</span>  }</div><div class="line"><a name="l00457"></a><span class="lineno"> 457</span> </div><div class="line"><a name="l00458"></a><span class="lineno"> 458</span>  pgp_filter_keys_from_mem(&s_io, public_keys, private_keys<span class="comment">/*should stay empty*/</span>, NULL, 0, keysmem);</div><div class="line"><a name="l00459"></a><span class="lineno"> 459</span>  <span class="keywordflow">if</span>( public_keys->keyc <=0 || private_keys->keyc!=0 ) {</div><div class="line"><a name="l00460"></a><span class="lineno"> 460</span>  mrmailbox_log_warning(mailbox, 0, <span class="stringliteral">"Encryption-keyring contains unexpected data (%i/%i)"</span>, public_keys->keyc, private_keys->keyc);</div><div class="line"><a name="l00461"></a><span class="lineno"> 461</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00462"></a><span class="lineno"> 462</span>  }</div><div class="line"><a name="l00463"></a><span class="lineno"> 463</span> </div><div class="line"><a name="l00464"></a><span class="lineno"> 464</span>  <span class="comment">/* encrypt */</span></div><div class="line"><a name="l00465"></a><span class="lineno"> 465</span>  {</div><div class="line"><a name="l00466"></a><span class="lineno"> 466</span>  <span class="keyword">const</span> <span class="keywordtype">void</span>* signed_text = NULL;</div><div class="line"><a name="l00467"></a><span class="lineno"> 467</span>  <span class="keywordtype">size_t</span> signed_bytes = 0;</div><div class="line"><a name="l00468"></a><span class="lineno"> 468</span>  <span class="keywordtype">int</span> encrypt_raw_packet = 0;</div><div class="line"><a name="l00469"></a><span class="lineno"> 469</span> </div><div class="line"><a name="l00470"></a><span class="lineno"> 470</span>  <span class="keywordflow">if</span>( raw_private_key_for_signing ) {</div><div class="line"><a name="l00471"></a><span class="lineno"> 471</span>  pgp_memory_clear(keysmem);</div><div class="line"><a name="l00472"></a><span class="lineno"> 472</span>  pgp_memory_add(keysmem, raw_private_key_for_signing->m_binary, raw_private_key_for_signing->m_bytes);</div><div class="line"><a name="l00473"></a><span class="lineno"> 473</span>  pgp_filter_keys_from_mem(&s_io, dummy_keys, private_keys, NULL, 0, keysmem);</div><div class="line"><a name="l00474"></a><span class="lineno"> 474</span>  <span class="keywordflow">if</span>( private_keys->keyc <= 0 ) {</div><div class="line"><a name="l00475"></a><span class="lineno"> 475</span>  mrmailbox_log_warning(mailbox, 0, <span class="stringliteral">"No key for signing found."</span>);</div><div class="line"><a name="l00476"></a><span class="lineno"> 476</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00477"></a><span class="lineno"> 477</span>  }</div><div class="line"><a name="l00478"></a><span class="lineno"> 478</span> </div><div class="line"><a name="l00479"></a><span class="lineno"> 479</span>  pgp_key_t* sk0 = &private_keys->keys[0];</div><div class="line"><a name="l00480"></a><span class="lineno"> 480</span>  signedmem = pgp_sign_buf(&s_io, plain_text, plain_bytes, &sk0->key.seckey, time(NULL)<span class="comment">/*birthtime*/</span>, 0<span class="comment">/*duration*/</span>, <span class="stringliteral">"sha1"</span>, 0<span class="comment">/*armored*/</span>, 0<span class="comment">/*cleartext*/</span>);</div><div class="line"><a name="l00481"></a><span class="lineno"> 481</span>  <span class="keywordflow">if</span>( signedmem == NULL ) {</div><div class="line"><a name="l00482"></a><span class="lineno"> 482</span>  mrmailbox_log_warning(mailbox, 0, <span class="stringliteral">"Signing failed."</span>);</div><div class="line"><a name="l00483"></a><span class="lineno"> 483</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00484"></a><span class="lineno"> 484</span>  }</div><div class="line"><a name="l00485"></a><span class="lineno"> 485</span>  signed_text = signedmem->buf;</div><div class="line"><a name="l00486"></a><span class="lineno"> 486</span>  signed_bytes = signedmem->length;</div><div class="line"><a name="l00487"></a><span class="lineno"> 487</span>  encrypt_raw_packet = 1;</div><div class="line"><a name="l00488"></a><span class="lineno"> 488</span>  }</div><div class="line"><a name="l00489"></a><span class="lineno"> 489</span>  <span class="keywordflow">else</span> {</div><div class="line"><a name="l00490"></a><span class="lineno"> 490</span>  signed_text = plain_text;</div><div class="line"><a name="l00491"></a><span class="lineno"> 491</span>  signed_bytes = plain_bytes;</div><div class="line"><a name="l00492"></a><span class="lineno"> 492</span>  encrypt_raw_packet = 0;</div><div class="line"><a name="l00493"></a><span class="lineno"> 493</span>  }</div><div class="line"><a name="l00494"></a><span class="lineno"> 494</span> </div><div class="line"><a name="l00495"></a><span class="lineno"> 495</span>  pgp_memory_t* outmem = pgp_encrypt_buf(&s_io, signed_text, signed_bytes, public_keys, use_armor, NULL<span class="comment">/*cipher*/</span>, encrypt_raw_packet);</div><div class="line"><a name="l00496"></a><span class="lineno"> 496</span>  <span class="keywordflow">if</span>( outmem == NULL ) {</div><div class="line"><a name="l00497"></a><span class="lineno"> 497</span>  mrmailbox_log_warning(mailbox, 0, <span class="stringliteral">"Encryption failed."</span>);</div><div class="line"><a name="l00498"></a><span class="lineno"> 498</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00499"></a><span class="lineno"> 499</span>  }</div><div class="line"><a name="l00500"></a><span class="lineno"> 500</span>  *ret_ctext = outmem->buf;</div><div class="line"><a name="l00501"></a><span class="lineno"> 501</span>  *ret_ctext_bytes = outmem->length;</div><div class="line"><a name="l00502"></a><span class="lineno"> 502</span>  free(outmem); <span class="comment">/* do not use pgp_memory_free() as we took ownership of the buffer */</span></div><div class="line"><a name="l00503"></a><span class="lineno"> 503</span>  }</div><div class="line"><a name="l00504"></a><span class="lineno"> 504</span> </div><div class="line"><a name="l00505"></a><span class="lineno"> 505</span>  success = 1;</div><div class="line"><a name="l00506"></a><span class="lineno"> 506</span> </div><div class="line"><a name="l00507"></a><span class="lineno"> 507</span> cleanup:</div><div class="line"><a name="l00508"></a><span class="lineno"> 508</span>  <span class="keywordflow">if</span>( keysmem ) { pgp_memory_free(keysmem); }</div><div class="line"><a name="l00509"></a><span class="lineno"> 509</span>  <span class="keywordflow">if</span>( signedmem ) { pgp_memory_free(signedmem); }</div><div class="line"><a name="l00510"></a><span class="lineno"> 510</span>  <span class="keywordflow">if</span>( public_keys ) { pgp_keyring_purge(public_keys); free(public_keys); } <span class="comment">/*pgp_keyring_free() frees the content, not the pointer itself*/</span></div><div class="line"><a name="l00511"></a><span class="lineno"> 511</span>  <span class="keywordflow">if</span>( private_keys ) { pgp_keyring_purge(private_keys); free(private_keys); }</div><div class="line"><a name="l00512"></a><span class="lineno"> 512</span>  <span class="keywordflow">if</span>( dummy_keys ) { pgp_keyring_purge(dummy_keys); free(dummy_keys); }</div><div class="line"><a name="l00513"></a><span class="lineno"> 513</span>  <span class="keywordflow">return</span> success;</div><div class="line"><a name="l00514"></a><span class="lineno"> 514</span> }</div><div class="line"><a name="l00515"></a><span class="lineno"> 515</span> </div><div class="line"><a name="l00516"></a><span class="lineno"> 516</span> </div><div class="line"><a name="l00517"></a><span class="lineno"> 517</span> <span class="keywordtype">int</span> mrpgp_pk_decrypt( <a class="code" href="structmrmailbox__t.html">mrmailbox_t</a>* mailbox,</div><div class="line"><a name="l00518"></a><span class="lineno"> 518</span>  <span class="keyword">const</span> <span class="keywordtype">void</span>* ctext,</div><div class="line"><a name="l00519"></a><span class="lineno"> 519</span>  <span class="keywordtype">size_t</span> ctext_bytes,</div><div class="line"><a name="l00520"></a><span class="lineno"> 520</span>  <span class="keyword">const</span> mrkeyring_t* raw_private_keys_for_decryption,</div><div class="line"><a name="l00521"></a><span class="lineno"> 521</span>  <span class="keyword">const</span> mrkey_t* raw_public_key_for_validation,</div><div class="line"><a name="l00522"></a><span class="lineno"> 522</span>  <span class="keywordtype">int</span> use_armor,</div><div class="line"><a name="l00523"></a><span class="lineno"> 523</span>  <span class="keywordtype">void</span>** ret_plain,</div><div class="line"><a name="l00524"></a><span class="lineno"> 524</span>  <span class="keywordtype">size_t</span>* ret_plain_bytes,</div><div class="line"><a name="l00525"></a><span class="lineno"> 525</span>  <span class="keywordtype">int</span>* ret_validation_errors)</div><div class="line"><a name="l00526"></a><span class="lineno"> 526</span> {</div><div class="line"><a name="l00527"></a><span class="lineno"> 527</span>  pgp_keyring_t* public_keys = calloc(1, <span class="keyword">sizeof</span>(pgp_keyring_t)); <span class="comment">/*should be 0 after parsing*/</span></div><div class="line"><a name="l00528"></a><span class="lineno"> 528</span>  pgp_keyring_t* private_keys = calloc(1, <span class="keyword">sizeof</span>(pgp_keyring_t));</div><div class="line"><a name="l00529"></a><span class="lineno"> 529</span>  pgp_keyring_t* dummy_keys = calloc(1, <span class="keyword">sizeof</span>(pgp_keyring_t));</div><div class="line"><a name="l00530"></a><span class="lineno"> 530</span>  pgp_validation_t* vresult = calloc(1, <span class="keyword">sizeof</span>(pgp_validation_t));</div><div class="line"><a name="l00531"></a><span class="lineno"> 531</span>  key_id_t* recipients_key_ids = NULL;</div><div class="line"><a name="l00532"></a><span class="lineno"> 532</span>  <span class="keywordtype">unsigned</span> recipients_count = 0;</div><div class="line"><a name="l00533"></a><span class="lineno"> 533</span>  pgp_memory_t* keysmem = pgp_memory_new();</div><div class="line"><a name="l00534"></a><span class="lineno"> 534</span>  <span class="keywordtype">int</span> i, success = 0;</div><div class="line"><a name="l00535"></a><span class="lineno"> 535</span> </div><div class="line"><a name="l00536"></a><span class="lineno"> 536</span>  <span class="keywordflow">if</span>( mailbox==NULL || ctext==NULL || ctext_bytes==0 || ret_plain==NULL || ret_plain_bytes==NULL || ret_validation_errors==NULL</div><div class="line"><a name="l00537"></a><span class="lineno"> 537</span>  || raw_private_keys_for_decryption==NULL || raw_private_keys_for_decryption->m_count<=0</div><div class="line"><a name="l00538"></a><span class="lineno"> 538</span>  || vresult==NULL || keysmem==NULL || public_keys==NULL || private_keys==NULL ) {</div><div class="line"><a name="l00539"></a><span class="lineno"> 539</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00540"></a><span class="lineno"> 540</span>  }</div><div class="line"><a name="l00541"></a><span class="lineno"> 541</span> </div><div class="line"><a name="l00542"></a><span class="lineno"> 542</span>  *ret_plain = NULL;</div><div class="line"><a name="l00543"></a><span class="lineno"> 543</span>  *ret_plain_bytes = 0;</div><div class="line"><a name="l00544"></a><span class="lineno"> 544</span> </div><div class="line"><a name="l00545"></a><span class="lineno"> 545</span>  <span class="comment">/* setup keys (the keys may come from pgp_filter_keys_fileread(), see also pgp_keyring_add(rcpts, key)) */</span></div><div class="line"><a name="l00546"></a><span class="lineno"> 546</span>  <span class="keywordflow">for</span>( i = 0; i < raw_private_keys_for_decryption->m_count; i++ ) {</div><div class="line"><a name="l00547"></a><span class="lineno"> 547</span>  pgp_memory_add(keysmem, raw_private_keys_for_decryption->m_keys[i]->m_binary, raw_private_keys_for_decryption->m_keys[i]->m_bytes);</div><div class="line"><a name="l00548"></a><span class="lineno"> 548</span>  }</div><div class="line"><a name="l00549"></a><span class="lineno"> 549</span> </div><div class="line"><a name="l00550"></a><span class="lineno"> 550</span>  pgp_filter_keys_from_mem(&s_io, dummy_keys<span class="comment">/*should stay empty*/</span>, private_keys, NULL, 0, keysmem);</div><div class="line"><a name="l00551"></a><span class="lineno"> 551</span>  <span class="keywordflow">if</span>( private_keys->keyc<=0 ) {</div><div class="line"><a name="l00552"></a><span class="lineno"> 552</span>  mrmailbox_log_warning(mailbox, 0, <span class="stringliteral">"Decryption-keyring contains unexpected data (%i/%i)"</span>, public_keys->keyc, private_keys->keyc);</div><div class="line"><a name="l00553"></a><span class="lineno"> 553</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00554"></a><span class="lineno"> 554</span>  }</div><div class="line"><a name="l00555"></a><span class="lineno"> 555</span> </div><div class="line"><a name="l00556"></a><span class="lineno"> 556</span>  <span class="keywordflow">if</span>( raw_public_key_for_validation ) {</div><div class="line"><a name="l00557"></a><span class="lineno"> 557</span>  pgp_memory_clear(keysmem);</div><div class="line"><a name="l00558"></a><span class="lineno"> 558</span>  pgp_memory_add(keysmem, raw_public_key_for_validation->m_binary, raw_public_key_for_validation->m_bytes);</div><div class="line"><a name="l00559"></a><span class="lineno"> 559</span>  pgp_filter_keys_from_mem(&s_io, public_keys, dummy_keys<span class="comment">/*should stay empty*/</span>, NULL, 0, keysmem);</div><div class="line"><a name="l00560"></a><span class="lineno"> 560</span>  }</div><div class="line"><a name="l00561"></a><span class="lineno"> 561</span> </div><div class="line"><a name="l00562"></a><span class="lineno"> 562</span>  <span class="comment">/* decrypt */</span></div><div class="line"><a name="l00563"></a><span class="lineno"> 563</span>  {</div><div class="line"><a name="l00564"></a><span class="lineno"> 564</span>  pgp_memory_t* outmem = pgp_decrypt_and_validate_buf(&s_io, vresult, ctext, ctext_bytes, private_keys, public_keys,</div><div class="line"><a name="l00565"></a><span class="lineno"> 565</span>  use_armor, &recipients_key_ids, &recipients_count);</div><div class="line"><a name="l00566"></a><span class="lineno"> 566</span>  <span class="keywordflow">if</span>( outmem == NULL ) {</div><div class="line"><a name="l00567"></a><span class="lineno"> 567</span>  mrmailbox_log_warning(mailbox, 0, <span class="stringliteral">"Decryption failed."</span>);</div><div class="line"><a name="l00568"></a><span class="lineno"> 568</span>  <span class="keywordflow">goto</span> cleanup;</div><div class="line"><a name="l00569"></a><span class="lineno"> 569</span>  }</div><div class="line"><a name="l00570"></a><span class="lineno"> 570</span>  *ret_plain = outmem->buf;</div><div class="line"><a name="l00571"></a><span class="lineno"> 571</span>  *ret_plain_bytes = outmem->length;</div><div class="line"><a name="l00572"></a><span class="lineno"> 572</span>  free(outmem); <span class="comment">/* do not use pgp_memory_free() as we took ownership of the buffer */</span></div><div class="line"><a name="l00573"></a><span class="lineno"> 573</span> </div><div class="line"><a name="l00574"></a><span class="lineno"> 574</span>  <span class="comment">/* validate */</span></div><div class="line"><a name="l00575"></a><span class="lineno"> 575</span>  *ret_validation_errors = 0;</div><div class="line"><a name="l00576"></a><span class="lineno"> 576</span>  <span class="keywordflow">if</span>( vresult->validc <= 0 && vresult->invalidc <= 0 && vresult->unknownc <= 0 )</div><div class="line"><a name="l00577"></a><span class="lineno"> 577</span>  {</div><div class="line"><a name="l00578"></a><span class="lineno"> 578</span>  <span class="comment">/* no valid nor invalid signatures found */</span></div><div class="line"><a name="l00579"></a><span class="lineno"> 579</span>  *ret_validation_errors = MR_VALIDATE_NO_SIGNATURE;</div><div class="line"><a name="l00580"></a><span class="lineno"> 580</span>  }</div><div class="line"><a name="l00581"></a><span class="lineno"> 581</span>  <span class="keywordflow">else</span> <span class="keywordflow">if</span>( raw_public_key_for_validation==NULL || vresult->unknownc > 0 )</div><div class="line"><a name="l00582"></a><span class="lineno"> 582</span>  {</div><div class="line"><a name="l00583"></a><span class="lineno"> 583</span>  <span class="comment">/* at least one valid or invalid signature found, but no key for verification */</span></div><div class="line"><a name="l00584"></a><span class="lineno"> 584</span>  *ret_validation_errors = MR_VALIDATE_UNKNOWN_SIGNATURE;</div><div class="line"><a name="l00585"></a><span class="lineno"> 585</span>  }</div><div class="line"><a name="l00586"></a><span class="lineno"> 586</span>  <span class="keywordflow">else</span> <span class="keywordflow">if</span>( vresult->invalidc > 0 )</div><div class="line"><a name="l00587"></a><span class="lineno"> 587</span>  {</div><div class="line"><a name="l00588"></a><span class="lineno"> 588</span>  <span class="comment">/* at least one invalid signature found */</span></div><div class="line"><a name="l00589"></a><span class="lineno"> 589</span>  *ret_validation_errors = MR_VALIDATE_BAD_SIGNATURE;</div><div class="line"><a name="l00590"></a><span class="lineno"> 590</span>  }</div><div class="line"><a name="l00591"></a><span class="lineno"> 591</span>  <span class="keywordflow">else</span></div><div class="line"><a name="l00592"></a><span class="lineno"> 592</span>  {</div><div class="line"><a name="l00593"></a><span class="lineno"> 593</span>  <span class="comment">/* only valid signatures found */</span></div><div class="line"><a name="l00594"></a><span class="lineno"> 594</span>  ;</div><div class="line"><a name="l00595"></a><span class="lineno"> 595</span>  }</div><div class="line"><a name="l00596"></a><span class="lineno"> 596</span>  }</div><div class="line"><a name="l00597"></a><span class="lineno"> 597</span> </div><div class="line"><a name="l00598"></a><span class="lineno"> 598</span>  success = 1;</div><div class="line"><a name="l00599"></a><span class="lineno"> 599</span> </div><div class="line"><a name="l00600"></a><span class="lineno"> 600</span> cleanup:</div><div class="line"><a name="l00601"></a><span class="lineno"> 601</span>  <span class="keywordflow">if</span>( keysmem ) { pgp_memory_free(keysmem); }</div><div class="line"><a name="l00602"></a><span class="lineno"> 602</span>  <span class="keywordflow">if</span>( public_keys ) { pgp_keyring_purge(public_keys); free(public_keys); } <span class="comment">/*pgp_keyring_free() frees the content, not the pointer itself*/</span></div><div class="line"><a name="l00603"></a><span class="lineno"> 603</span>  <span class="keywordflow">if</span>( private_keys ) { pgp_keyring_purge(private_keys); free(private_keys); }</div><div class="line"><a name="l00604"></a><span class="lineno"> 604</span>  <span class="keywordflow">if</span>( dummy_keys ) { pgp_keyring_purge(dummy_keys); free(dummy_keys); }</div><div class="line"><a name="l00605"></a><span class="lineno"> 605</span>  <span class="keywordflow">if</span>( vresult ) { pgp_validate_result_free(vresult); }</div><div class="line"><a name="l00606"></a><span class="lineno"> 606</span>  <span class="keywordflow">if</span>( recipients_key_ids ) { free(recipients_key_ids); }</div><div class="line"><a name="l00607"></a><span class="lineno"> 607</span>  <span class="keywordflow">return</span> success;</div><div class="line"><a name="l00608"></a><span class="lineno"> 608</span> }</div><div class="ttc" id="structmrmailbox__t_html"><div class="ttname"><a href="structmrmailbox__t.html">mrmailbox_t</a></div><div class="ttdoc">An object representing a single mailbox. </div><div class="ttdef"><b>Definition:</b> <a href="mrmailbox_8h_source.html#l00141">mrmailbox.h:141</a></div></div>
|
|
</div><!-- fragment --></div><!-- contents -->
|
|
<!-- start footer part -->
|
|
<hr class="footer"/><address class="footer"><small>
|
|
Generated on Tue Nov 14 2017 02:47:14 for Delta Chat Core C-Library by  <a href="http://www.doxygen.org/index.html">
|
|
<img class="footer" src="doxygen.png" alt="doxygen"/>
|
|
</a> 1.8.11
|
|
</small></address>
|
|
</body>
|
|
</html>
|