1 /* decrypt.c - verify signed data
2 * Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006,
3 * 2007 Free Software Foundation, Inc.
5 * This file is part of GnuPG.
7 * GnuPG is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 3 of the License, or
10 * (at your option) any later version.
12 * GnuPG is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, see <http://www.gnu.org/licenses/>.
42 * Assume that the input is an encrypted message and decrypt
43 * (and if signed, verify the signature on) it.
44 * This command differs from the default operation, as it never
45 * writes to the filename which is included in the file and it
46 * rejects files which don't begin with an encrypted message.
50 decrypt_message( const char *filename
)
53 armor_filter_context_t
*afx
= NULL
;
54 progress_filter_context_t
*pfx
;
58 pfx
= new_progress_context ();
60 /* Open the message file. */
61 fp
= iobuf_open(filename
);
62 if (fp
&& is_secured_file (iobuf_get_fd (fp
)))
69 rc
= gpg_error_from_syserror ();
70 log_error (_("can't open `%s': %s\n"), print_fname_stdin(filename
),
72 release_progress_context (pfx
);
76 handle_progress (pfx
, fp
, filename
);
79 if( use_armor_filter( fp
) ) {
80 afx
= new_armor_context ();
81 push_armor_filter ( afx
, fp
);
89 rc
= proc_encryption_packets( NULL
, fp
);
93 release_armor_context (afx
);
94 release_progress_context (pfx
);
99 decrypt_messages(int nfiles
, char *files
[])
102 armor_filter_context_t
*afx
= NULL
;
103 progress_filter_context_t
*pfx
;
104 char *p
, *output
= NULL
;
105 int rc
=0,use_stdin
=0;
110 log_error(_("--output doesn't work for this command\n"));
114 pfx
= new_progress_context ();
126 if(fgets(line
, DIM(line
), stdin
))
129 if (!*line
|| line
[strlen(line
)-1] != '\n')
130 log_error("input line %u too long or missing LF\n", lno
);
133 line
[strlen(line
)-1] = '\0';
151 print_file_status(STATUS_FILE_START
, filename
, 3);
152 output
= make_outfile_name(filename
);
155 fp
= iobuf_open(filename
);
157 iobuf_ioctl (fp
,3,1,NULL
); /* disable fd caching */
158 if (fp
&& is_secured_file (iobuf_get_fd (fp
)))
166 log_error(_("can't open `%s'\n"), print_fname_stdin(filename
));
170 handle_progress (pfx
, fp
, filename
);
174 if (use_armor_filter(fp
))
176 afx
= new_armor_context ();
177 push_armor_filter ( afx
, fp
);
180 rc
= proc_packets(NULL
, fp
);
183 log_error("%s: decryption failed: %s\n", print_fname_stdin(filename
),
185 p
= get_last_passphrase();
186 set_next_passphrase(p
);
190 /* Note that we emit file_done even after an error. */
191 write_status( STATUS_FILE_DONE
);
193 reset_literals_seen();
196 set_next_passphrase(NULL
);
197 release_armor_context (afx
);
198 release_progress_context (pfx
);