aboutsummaryrefslogtreecommitdiffstats
path: root/src/gpg/function/BasicOperator.cpp
diff options
context:
space:
mode:
authorSaturn&Eric <[email protected]>2022-03-19 07:55:26 +0000
committerGitHub <[email protected]>2022-03-19 07:55:26 +0000
commitd1e305cda3a8ddc066213f3309826caf29064423 (patch)
treefabeb080e66df2fe944011ba5690f680ebabe7b6 /src/gpg/function/BasicOperator.cpp
parent<doc>(project): update README.md. (diff)
parentMerge branch 'main' into develop-2.0.5 (diff)
downloadGpgFrontend-d1e305cda3a8ddc066213f3309826caf29064423.tar.gz
GpgFrontend-d1e305cda3a8ddc066213f3309826caf29064423.zip
Merge pull request #49 from saturneric/develop-2.0.5
v2.0.5
Diffstat (limited to '')
-rw-r--r--src/core/function/gpg/GpgBasicOperator.cpp (renamed from src/gpg/function/BasicOperator.cpp)106
1 files changed, 49 insertions, 57 deletions
diff --git a/src/gpg/function/BasicOperator.cpp b/src/core/function/gpg/GpgBasicOperator.cpp
index 0383f8ab..b92404a9 100644
--- a/src/gpg/function/BasicOperator.cpp
+++ b/src/core/function/gpg/GpgBasicOperator.cpp
@@ -1,4 +1,6 @@
/**
+ * Copyright (C) 2021 Saturneric
+ *
* This file is part of GpgFrontend.
*
* GpgFrontend is free software: you can redistribute it and/or modify
@@ -6,29 +8,31 @@
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
- * Foobar is distributed in the hope that it will be useful,
+ * GpgFrontend is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
- * along with Foobar. If not, see <https://www.gnu.org/licenses/>.
+ * along with GpgFrontend. If not, see <https://www.gnu.org/licenses/>.
+ *
+ * The initial version of the source code is inherited from
+ * the gpg4usb project, which is under GPL-3.0-or-later.
*
- * The initial version of the source code is inherited from gpg4usb-team.
- * Their source code version also complies with GNU General Public License.
+ * All the source code of GpgFrontend was modified and released by
+ * Saturneric<[email protected]> starting on May 12, 2021.
*
- * The source code version of this software was modified and released
- * by Saturneric<[email protected]> starting on May 12, 2021.
+ * SPDX-License-Identifier: GPL-3.0-or-later
*
*/
-#include "gpg/function/BasicOperator.h"
+#include "GpgBasicOperator.h"
#include <vector>
-#include "gpg/function/GpgKeyGetter.h"
+#include "GpgKeyGetter.h"
-GpgFrontend::GpgError GpgFrontend::BasicOperator::Encrypt(
+GpgFrontend::GpgError GpgFrontend::GpgBasicOperator::Encrypt(
KeyListPtr keys, GpgFrontend::BypeArrayRef in_buffer,
GpgFrontend::ByteArrayPtr& out_buffer, GpgFrontend::GpgEncrResult& result) {
// gpgme_encrypt_result_t e_result;
@@ -43,55 +47,55 @@ GpgFrontend::GpgError GpgFrontend::BasicOperator::Encrypt(
GpgData data_in(in_buffer.data(), in_buffer.size()), data_out;
gpgme_error_t err = check_gpg_error(gpgme_op_encrypt(
- ctx, recipients, GPGME_ENCRYPT_ALWAYS_TRUST, data_in, data_out));
+ ctx_, recipients, GPGME_ENCRYPT_ALWAYS_TRUST, data_in, data_out));
auto temp_data_out = data_out.Read2Buffer();
std::swap(temp_data_out, out_buffer);
- auto temp_result = _new_result(gpgme_op_encrypt_result(ctx));
+ auto temp_result = _new_result(gpgme_op_encrypt_result(ctx_));
std::swap(result, temp_result);
return err;
}
-GpgFrontend::GpgError GpgFrontend::BasicOperator::Decrypt(
+GpgFrontend::GpgError GpgFrontend::GpgBasicOperator::Decrypt(
BypeArrayRef in_buffer, GpgFrontend::ByteArrayPtr& out_buffer,
GpgFrontend::GpgDecrResult& result) {
gpgme_error_t err;
GpgData data_in(in_buffer.data(), in_buffer.size()), data_out;
- err = check_gpg_error(gpgme_op_decrypt(ctx, data_in, data_out));
+ err = check_gpg_error(gpgme_op_decrypt(ctx_, data_in, data_out));
auto temp_data_out = data_out.Read2Buffer();
std::swap(temp_data_out, out_buffer);
- auto temp_result = _new_result(gpgme_op_decrypt_result(ctx));
+ auto temp_result = _new_result(gpgme_op_decrypt_result(ctx_));
std::swap(result, temp_result);
return err;
}
-GpgFrontend::GpgError GpgFrontend::BasicOperator::Verify(
+GpgFrontend::GpgError GpgFrontend::GpgBasicOperator::Verify(
BypeArrayRef& in_buffer, ByteArrayPtr& sig_buffer,
GpgVerifyResult& result) const {
gpgme_error_t err;
-
+
GpgData data_in(in_buffer.data(), in_buffer.size());
GpgData data_out;
if (sig_buffer != nullptr) {
GpgData sig_data(sig_buffer->data(), sig_buffer->size());
- err = check_gpg_error(gpgme_op_verify(ctx, sig_data, data_in, nullptr));
+ err = check_gpg_error(gpgme_op_verify(ctx_, sig_data, data_in, nullptr));
} else
- err = check_gpg_error(gpgme_op_verify(ctx, data_in, nullptr, data_out));
+ err = check_gpg_error(gpgme_op_verify(ctx_, data_in, nullptr, data_out));
- auto temp_result = _new_result(gpgme_op_verify_result(ctx));
+ auto temp_result = _new_result(gpgme_op_verify_result(ctx_));
std::swap(result, temp_result);
return err;
}
-GpgFrontend::GpgError GpgFrontend::BasicOperator::Sign(KeyListPtr keys,
+GpgFrontend::GpgError GpgFrontend::GpgBasicOperator::Sign(KeyListPtr signers,
BypeArrayRef in_buffer,
ByteArrayPtr& out_buffer,
gpgme_sig_mode_t mode,
@@ -99,57 +103,44 @@ GpgFrontend::GpgError GpgFrontend::BasicOperator::Sign(KeyListPtr keys,
gpgme_error_t err;
// Set Singers of this opera
- SetSigners(*keys);
+ SetSigners(*signers);
GpgData data_in(in_buffer.data(), in_buffer.size()), data_out;
- /**
- `GPGME_SIG_MODE_NORMAL'
- A normal signature is made, the output includes the plaintext
- and the signature.
-
- `GPGME_SIG_MODE_DETACH'
- A detached signature is made.
-
- `GPGME_SIG_MODE_CLEAR'
- A clear text signature is made. The ASCII armor and text
- mode settings of the context are ignored.
- */
-
- err = check_gpg_error(gpgme_op_sign(ctx, data_in, data_out, mode));
+ err = check_gpg_error(gpgme_op_sign(ctx_, data_in, data_out, mode));
auto temp_data_out = data_out.Read2Buffer();
std::swap(temp_data_out, out_buffer);
- auto temp_result = _new_result(gpgme_op_sign_result(ctx));
+ auto temp_result = _new_result(gpgme_op_sign_result(ctx_));
std::swap(result, temp_result);
return err;
}
-gpgme_error_t GpgFrontend::BasicOperator::DecryptVerify(
+gpgme_error_t GpgFrontend::GpgBasicOperator::DecryptVerify(
BypeArrayRef in_buffer, ByteArrayPtr& out_buffer,
GpgDecrResult& decrypt_result, GpgVerifyResult& verify_result) {
gpgme_error_t err;
GpgData data_in(in_buffer.data(), in_buffer.size()), data_out;
- err = check_gpg_error(gpgme_op_decrypt_verify(ctx, data_in, data_out));
+ err = check_gpg_error(gpgme_op_decrypt_verify(ctx_, data_in, data_out));
auto temp_data_out = data_out.Read2Buffer();
std::swap(temp_data_out, out_buffer);
- auto temp_decr_result = _new_result(gpgme_op_decrypt_result(ctx));
+ auto temp_decr_result = _new_result(gpgme_op_decrypt_result(ctx_));
std::swap(decrypt_result, temp_decr_result);
- auto temp_verify_result = _new_result(gpgme_op_verify_result(ctx));
+ auto temp_verify_result = _new_result(gpgme_op_verify_result(ctx_));
std::swap(verify_result, temp_verify_result);
return err;
}
-gpgme_error_t GpgFrontend::BasicOperator::EncryptSign(
+gpgme_error_t GpgFrontend::GpgBasicOperator::EncryptSign(
KeyListPtr keys, KeyListPtr signers, BypeArrayRef in_buffer,
ByteArrayPtr& out_buffer, GpgEncrResult& encr_result,
GpgSignResult& sign_result) {
@@ -170,57 +161,58 @@ gpgme_error_t GpgFrontend::BasicOperator::EncryptSign(
// If the last parameter isnt 0, a private copy of data is made
err = check_gpg_error(gpgme_op_encrypt_sign(
- ctx, recipients, GPGME_ENCRYPT_ALWAYS_TRUST, data_in, data_out));
+ ctx_, recipients, GPGME_ENCRYPT_ALWAYS_TRUST, data_in, data_out));
auto temp_data_out = data_out.Read2Buffer();
std::swap(temp_data_out, out_buffer);
- auto temp_encr_result = _new_result(gpgme_op_encrypt_result(ctx));
+ auto temp_encr_result = _new_result(gpgme_op_encrypt_result(ctx_));
swap(encr_result, temp_encr_result);
- auto temp_sign_result = _new_result(gpgme_op_sign_result(ctx));
+ auto temp_sign_result = _new_result(gpgme_op_sign_result(ctx_));
swap(sign_result, temp_sign_result);
return err;
}
-void GpgFrontend::BasicOperator::SetSigners(KeyArgsList& keys) {
- gpgme_signers_clear(ctx);
- for (const GpgKey& key : keys) {
- DLOG(INFO) << "key" << key.fpr();
- if (key.CanSignActual()) {
+void GpgFrontend::GpgBasicOperator::SetSigners(KeyArgsList& signers) {
+ gpgme_signers_clear(ctx_);
+ for (const GpgKey& key : signers) {
+ DLOG(INFO) << "key" << key.GetFingerprint();
+ if (key.IsHasActualSigningCapability()) {
DLOG(INFO) << "signer";
- auto error = gpgme_signers_add(ctx, gpgme_key_t(key));
+ auto error = gpgme_signers_add(ctx_, gpgme_key_t(key));
check_gpg_error(error);
}
}
- if (keys.size() != gpgme_signers_count(ctx))
+ if (signers.size() != gpgme_signers_count(ctx_))
DLOG(INFO) << "No All Signers Added";
}
std::unique_ptr<GpgFrontend::KeyArgsList>
-GpgFrontend::BasicOperator::GetSigners() {
- auto count = gpgme_signers_count(ctx);
+GpgFrontend::GpgBasicOperator::GetSigners() {
+ auto count = gpgme_signers_count(ctx_);
auto signers = std::make_unique<std::vector<GpgKey>>();
for (auto i = 0u; i < count; i++) {
- auto key = GpgKey(gpgme_signers_enum(ctx, i));
+ auto key = GpgKey(gpgme_signers_enum(ctx_, i));
signers->push_back(GpgKey(std::move(key)));
}
return signers;
}
-gpg_error_t GpgFrontend::BasicOperator::EncryptSymmetric(
+
+gpg_error_t GpgFrontend::GpgBasicOperator::EncryptSymmetric(
GpgFrontend::ByteArray& in_buffer, GpgFrontend::ByteArrayPtr& out_buffer,
GpgFrontend::GpgEncrResult& result) {
GpgData data_in(in_buffer.data(), in_buffer.size()), data_out;
gpgme_error_t err = check_gpg_error(gpgme_op_encrypt(
- ctx, nullptr, GPGME_ENCRYPT_SYMMETRIC, data_in, data_out));
+ ctx_, nullptr, GPGME_ENCRYPT_SYMMETRIC, data_in, data_out));
auto temp_data_out = data_out.Read2Buffer();
std::swap(temp_data_out, out_buffer);
// TODO(Saturneric): maybe a bug of gpgme
if (gpgme_err_code(err) == GPG_ERR_NO_ERROR) {
- auto temp_result = _new_result(gpgme_op_encrypt_result(ctx));
+ auto temp_result = _new_result(gpgme_op_encrypt_result(ctx_));
std::swap(result, temp_result);
}