1 /* decrypt.c - decrypt and verify data
2 * Copyright (C) 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006,
3 * 2007, 2009 Free Software Foundation, Inc.
5 * This file is part of GnuPG.
7 * GnuPG is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 3 of the License, or
10 * (at your option) any later version.
12 * GnuPG is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, see <http://www.gnu.org/licenses/>.
39 /* Assume that the input is an encrypted message and decrypt
40 * (and if signed, verify the signature on) it.
41 * This command differs from the default operation, as it never
42 * writes to the filename which is included in the file and it
43 * rejects files which don't begin with an encrypted message.
46 decrypt_message (const char *filename
)
49 armor_filter_context_t
*afx
= NULL
;
50 progress_filter_context_t
*pfx
;
54 pfx
= new_progress_context ();
56 /* Open the message file. */
57 fp
= iobuf_open (filename
);
58 if (fp
&& is_secured_file (iobuf_get_fd (fp
)))
66 rc
= gpg_error_from_syserror ();
67 log_error (_("can't open `%s': %s\n"), print_fname_stdin(filename
),
69 release_progress_context (pfx
);
73 handle_progress (pfx
, fp
, filename
);
77 if ( use_armor_filter( fp
) )
79 afx
= new_armor_context ();
80 push_armor_filter ( afx
, fp
);
89 rc
= proc_encryption_packets ( NULL
, fp
);
94 release_armor_context (afx
);
95 release_progress_context (pfx
);
101 decrypt_messages (int nfiles
, char *files
[])
104 armor_filter_context_t
*afx
= NULL
;
105 progress_filter_context_t
*pfx
;
106 char *p
, *output
= NULL
;
107 int rc
=0,use_stdin
=0;
112 log_error(_("--output doesn't work for this command\n"));
116 pfx
= new_progress_context ();
128 if(fgets(line
, DIM(line
), stdin
))
131 if (!*line
|| line
[strlen(line
)-1] != '\n')
132 log_error("input line %u too long or missing LF\n", lno
);
135 line
[strlen(line
)-1] = '\0';
153 print_file_status(STATUS_FILE_START
, filename
, 3);
154 output
= make_outfile_name(filename
);
157 fp
= iobuf_open(filename
);
159 iobuf_ioctl (fp
,3,1,NULL
); /* disable fd caching */
160 if (fp
&& is_secured_file (iobuf_get_fd (fp
)))
168 log_error(_("can't open `%s'\n"), print_fname_stdin(filename
));
172 handle_progress (pfx
, fp
, filename
);
176 if (use_armor_filter(fp
))
178 afx
= new_armor_context ();
179 push_armor_filter ( afx
, fp
);
182 rc
= proc_packets(NULL
, fp
);
185 log_error("%s: decryption failed: %s\n", print_fname_stdin(filename
),
187 p
= get_last_passphrase();
188 set_next_passphrase(p
);
192 /* Note that we emit file_done even after an error. */
193 write_status( STATUS_FILE_DONE
);
195 reset_literals_seen();
198 set_next_passphrase(NULL
);
199 release_armor_context (afx
);
200 release_progress_context (pfx
);