You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

328 lines
9.7 KiB
C++

// This Source Code Form is subject to the terms of the Mozilla Public
3 years ago
// License, version 2.0. If a copy of the MPL was not distributed with this
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
#include <stdlib.h>
#include <stdint.h>
#include <string.h>
#include <time.h>
#include <gpgme.h>
3 years ago
#include <weechat/weechat-plugin.h>
3 years ago
#include "plugin.hh"
#include "pgp.hh"
3 years ago
#define PGP_MESSAGE_HEADER "-----BEGIN PGP MESSAGE-----\r\n"
#define PGP_MESSAGE_FOOTER "\r\n-----END PGP MESSAGE-----"
#define PGP_SIGNATURE_HEADER "-----BEGIN PGP SIGNATURE-----\r\n"
#define PGP_SIGNATURE_FOOTER "\r\n-----END PGP SIGNATURE-----"
3 years ago
const char *PGP_ADVICE = "[PGP encrypted message (XEP-0027)]";
3 years ago
void pgp__init(struct t_pgp **pgp)
3 years ago
{
struct t_pgp *new_pgp;
gpgme_error_t err;
3 years ago
//gpgme_data_t keydata;
gpgme_check_version(NULL);
3 years ago
new_pgp = (struct t_pgp*)calloc(1, sizeof(**pgp));
3 years ago
err = gpgme_new(&new_pgp->gpgme);
if (err) {
3 years ago
weechat_printf(nullptr, "gpg (error): %s - %s",
gpgme_strsource(err), gpgme_strerror(err));
return;
}
gpgme_set_armor(new_pgp->gpgme, true);
3 years ago
//err = gpgme_data_new_from_file(&keydata, pub, true);
//if (err) {
// return;
//}
3 years ago
3 years ago
//err = gpgme_op_import(new_pgp->gpgme, keydata);
//if (err) {
// return;
//}
3 years ago
//gpgme_import_result_t impRes = gpgme_op_import_result(new_pgp->gpgme);
//weechat_printf(nullptr, "(gpg) imported %d keys", impRes->imported);
3 years ago
//err = gpgme_data_new_from_file(&keydata, sec, true);
//if (err) {
// return;
//}
3 years ago
3 years ago
//err = gpgme_op_import(new_pgp->gpgme, keydata);
//if (err) {
// return;
//}
3 years ago
3 years ago
//impRes = gpgme_op_import_result(new_pgp->gpgme);
//weechat_printf(nullptr, "(gpg) imported %d secret keys", impRes->imported);
3 years ago
*pgp = new_pgp;
}
void pgp__free(struct t_pgp *pgp)
{
if (pgp)
{
if (pgp->gpgme)
gpgme_release(pgp->gpgme);
3 years ago
free(pgp);
}
}
3 years ago
char *pgp__encrypt(struct t_gui_buffer *buffer, struct t_pgp *pgp, const char *source, std::vector<std::string>&& targets, const char *message)
3 years ago
{
std::string encrypted;
gpgme_key_t keys[3] = {NULL,NULL,NULL};
3 years ago
char * result = NULL;
int ret;
gpgme_error_t err;
gpgme_data_t in, out;
3 years ago
3 years ago
/* Initialize input buffer. */
err = gpgme_data_new_from_mem(&in, message, strlen(message), false);
if (err) {
3 years ago
goto encrypt_finish;
}
3 years ago
/* Initialize output buffer. */
err = gpgme_data_new(&out);
if (err) {
3 years ago
goto encrypt_finish;
}
3 years ago
/* Encrypt data. */
3 years ago
for (const std::string& target : targets)
{
err = gpgme_get_key(pgp->gpgme, target.data(), &keys[0], false);
if (err) {
goto encrypt_finish;
}
3 years ago
}
3 years ago
err = gpgme_get_key(pgp->gpgme, source, &keys[1], false);
if (err) {
3 years ago
goto encrypt_finish;
}
err = gpgme_op_encrypt(pgp->gpgme, keys, GPGME_ENCRYPT_ALWAYS_TRUST, in, out);
if (err) {
3 years ago
goto encrypt_finish;
}
3 years ago
if (gpgme_encrypt_result_t enc_result = gpgme_op_encrypt_result(pgp->gpgme);
enc_result->invalid_recipients)
3 years ago
{
3 years ago
goto encrypt_finish;
3 years ago
}
gpgme_data_seek(out, 0, SEEK_SET);
char data[512 + 1];
while ((ret = gpgme_data_read(out, data, 512)) > 0)
{
encrypted += std::string_view(data, ret);
3 years ago
}
3 years ago
gpgme_data_release(in);
gpgme_data_release(out);
3 years ago
result = strndup(encrypted.data() + strlen(PGP_MESSAGE_HEADER),
encrypted.size() - strlen(PGP_MESSAGE_HEADER) - strlen(PGP_MESSAGE_FOOTER));
3 years ago
encrypt_finish:
3 years ago
if (err) {
weechat_printf(buffer, "[PGP]\t%s - %s",
gpgme_strsource(err), gpgme_strerror(err));
}
3 years ago
return result;
}
//"hQIMAzlgcSFDGLKEAQ//cGG3DFughC5xBF7xeXz1RdayOfhBAPfoZIq62MVuSnfS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\npw==\n=euIB"
char *pgp__decrypt(struct t_gui_buffer *buffer, struct t_pgp *pgp, const char *ciphertext)
3 years ago
{
std::string decrypted;
3 years ago
uint8_t * buf = NULL;
size_t buf_len = 0;
char * result = NULL;
int ret;
3 years ago
buf_len = strlen(PGP_MESSAGE_HEADER) + strlen(ciphertext) + strlen(PGP_MESSAGE_FOOTER) + 1;
buf = (uint8_t*)malloc(sizeof(char) * buf_len);
3 years ago
buf_len = snprintf((char *)buf, buf_len, PGP_MESSAGE_HEADER "%s" PGP_MESSAGE_FOOTER, ciphertext);
gpgme_error_t err;
gpgme_data_t in, out;
3 years ago
/* Initialize input buffer. */
err = gpgme_data_new_from_mem(&in, (char *)buf, buf_len, false);
if (err) {
3 years ago
goto decrypt_finish;
}
3 years ago
/* Initialize output buffer. */
err = gpgme_data_new(&out);
if (err) {
3 years ago
goto decrypt_finish;
}
3 years ago
/* Decrypt data. */
err = gpgme_op_decrypt(pgp->gpgme, in, out);
if (err) {
3 years ago
goto decrypt_finish;
}
3 years ago
if (gpgme_decrypt_result_t dec_result = gpgme_op_decrypt_result(pgp->gpgme);
dec_result->unsupported_algorithm)
3 years ago
{
3 years ago
goto decrypt_finish;
3 years ago
}
gpgme_data_seek(out, 0, SEEK_SET);
char data[512 + 1];
while ((ret = gpgme_data_read(out, data, 512)) > 0)
{
decrypted += std::string_view(data, ret);
3 years ago
}
3 years ago
gpgme_data_release(in);
gpgme_data_release(out);
result = strndup(decrypted.data(), decrypted.size());
3 years ago
decrypt_finish:
3 years ago
if (err) {
weechat_printf(buffer, "[PGP]\t%s - %s",
gpgme_strsource(err), gpgme_strerror(err));
}
3 years ago
return result;
}
char *pgp__verify(struct t_gui_buffer *buffer, struct t_pgp *pgp, const char *certificate)
3 years ago
{
uint8_t * buf = NULL;
size_t buf_len = 0;
char * result = NULL;
3 years ago
buf_len = strlen(PGP_SIGNATURE_HEADER) + strlen(certificate) + strlen(PGP_SIGNATURE_FOOTER) + 1;
buf = (uint8_t*)malloc(sizeof(char) * buf_len);
3 years ago
buf_len = snprintf((char *)buf, buf_len, PGP_SIGNATURE_HEADER "%s" PGP_SIGNATURE_FOOTER, certificate);
3 years ago
gpgme_verify_result_t vrf_result;
gpgme_error_t err;
gpgme_data_t in, out;
3 years ago
gpgme_key_t key;
3 years ago
3 years ago
/* Initialize input buffer. */
err = gpgme_data_new_from_mem(&in, (char *)buf, buf_len, false);
if (err) {
3 years ago
goto verify_finish;
}
3 years ago
/* Initialize output buffer. */
err = gpgme_data_new(&out);
if (err) {
3 years ago
goto verify_finish;
}
3 years ago
/* Verify data. */
err = gpgme_op_verify(pgp->gpgme, in, out, nullptr);
if (err) {
3 years ago
goto verify_finish;
}
3 years ago
if (vrf_result = gpgme_op_verify_result(pgp->gpgme);
!(vrf_result->signatures->summary & GPGME_SIGSUM_VALID))
3 years ago
{
3 years ago
//goto verify_finish;
3 years ago
}
3 years ago
result = strdup(vrf_result->signatures->fpr);
3 years ago
3 years ago
err = gpgme_get_key(pgp->gpgme, result, &key, false);
if (err) {
const char *keyids[2] = { result, nullptr };
err = gpgme_op_receive_keys(pgp->gpgme, keyids);
}
3 years ago
verify_finish:
3 years ago
if (err) {
weechat_printf(buffer, "[PGP]\t%s - %s",
gpgme_strsource(err), gpgme_strerror(err));
}
3 years ago
return result;
}
3 years ago
char *pgp__sign(struct t_gui_buffer *buffer, struct t_pgp *pgp, const char *source, const char *message)
{
std::string signature;
3 years ago
char * result = NULL;
int ret;
3 years ago
gpgme_error_t err;
gpgme_data_t in, out;
gpgme_key_t key;
3 years ago
3 years ago
/* Initialize input buffer. */
err = gpgme_data_new_from_mem(&in, (char *)message, strlen(message), false);
if (err) {
3 years ago
goto sign_finish;
}
3 years ago
/* Initialize output buffer. */
err = gpgme_data_new(&out);
if (err) {
3 years ago
goto sign_finish;
}
/* Include signature within key. */
{
gpgme_keylist_mode_t kmode = gpgme_get_keylist_mode(pgp->gpgme);
3 years ago
kmode |= GPGME_KEYLIST_MODE_LOCATE;
kmode |= GPGME_KEYLIST_MODE_SIGS;
err = gpgme_set_keylist_mode(pgp->gpgme, kmode);
}
if (err) {
3 years ago
goto sign_finish;
}
3 years ago
err = gpgme_get_key(pgp->gpgme, source, &key, false);
if (err) {
weechat_printf(nullptr, "(gpg) get key fail for %s", source);
3 years ago
goto sign_finish;
}
3 years ago
err = gpgme_signers_add(pgp->gpgme, key);
if (err) {
weechat_printf(nullptr, "(gpg) add key fail for %s", source);
3 years ago
goto sign_finish;
}
3 years ago
/* Sign data. */
err = gpgme_op_sign(pgp->gpgme, in, out, GPGME_SIG_MODE_DETACH);
if (err) {
weechat_printf(nullptr, "(gpg) sign fail for %s", source);
3 years ago
goto sign_finish;
}
3 years ago
if (gpgme_sign_result_t sgn_result = gpgme_op_sign_result(pgp->gpgme);
!sgn_result->signatures)
3 years ago
{
weechat_printf(nullptr, "(gpg) signature fail for %s", source);
3 years ago
}
gpgme_data_seek(out, 0, SEEK_SET);
char data[512 + 1];
while ((ret = gpgme_data_read(out, data, 512)) > 0)
{
signature += std::string_view(data, ret);
}
3 years ago
gpgme_data_release(in);
gpgme_data_release(out);
3 years ago
result = strndup(signature.data() + strlen(PGP_SIGNATURE_HEADER),
signature.size() - strlen(PGP_SIGNATURE_HEADER) - strlen(PGP_SIGNATURE_FOOTER));
3 years ago
sign_finish:
3 years ago
if (err) {
weechat_printf(buffer, "[PGP]\t%s - %s",
gpgme_strsource(err), gpgme_strerror(err));
}
3 years ago
return result;
}