1 /* decrypt.c - verify signed data
2 * Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003
3 * 2004 Free Software Foundation, Inc.
5 * This file is part of GnuPG.
7 * GnuPG is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
12 * GnuPG is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301,
44 * Assume that the input is an encrypted message and decrypt
45 * (and if signed, verify the signature on) it.
46 * This command differs from the default operation, as it never
47 * writes to the filename which is included in the file and it
48 * rejects files which don't begin with an encrypted message.
52 decrypt_message( const char *filename
)
55 armor_filter_context_t afx
;
56 progress_filter_context_t pfx
;
60 /* Open the message file. */
61 fp
= iobuf_open(filename
);
62 if (fp
&& is_secured_file (iobuf_get_fd (fp
)))
69 rc
= gpg_error_from_errno (errno
);
70 log_error (_("can't open `%s': %s\n"), print_fname_stdin(filename
),
75 handle_progress (&pfx
, fp
, filename
);
78 if( use_armor_filter( fp
) ) {
79 memset( &afx
, 0, sizeof afx
);
80 iobuf_push_filter( fp
, armor_filter
, &afx
);
88 rc
= proc_encryption_packets( NULL
, fp
);
96 decrypt_messages(int nfiles
, char *files
[])
99 armor_filter_context_t afx
;
100 progress_filter_context_t pfx
;
101 char *p
, *output
= NULL
;
102 int rc
=0,use_stdin
=0;
107 log_error(_("--output doesn't work for this command\n"));
122 if(fgets(line
, DIM(line
), stdin
))
125 if (!*line
|| line
[strlen(line
)-1] != '\n')
126 log_error("input line %u too long or missing LF\n", lno
);
129 line
[strlen(line
)-1] = '\0';
147 print_file_status(STATUS_FILE_START
, filename
, 3);
148 output
= make_outfile_name(filename
);
151 fp
= iobuf_open(filename
);
153 iobuf_ioctl (fp
,3,1,NULL
); /* disable fd caching */
154 if (fp
&& is_secured_file (iobuf_get_fd (fp
)))
162 log_error(_("can't open `%s'\n"), print_fname_stdin(filename
));
166 handle_progress (&pfx
, fp
, filename
);
170 if (use_armor_filter(fp
))
172 memset(&afx
, 0, sizeof afx
);
173 iobuf_push_filter(fp
, armor_filter
, &afx
);
176 rc
= proc_packets(NULL
, fp
);
179 log_error("%s: decryption failed: %s\n", print_fname_stdin(filename
),
181 p
= get_last_passphrase();
182 set_next_passphrase(p
);
186 /* Note that we emit file_done even after an error. */
187 write_status( STATUS_FILE_DONE
);
191 set_next_passphrase(NULL
);