/usr/include/dar/crypto_asym.hpp is in libdar-dev 2.5.14+bis-1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 | //*********************************************************************/
// dar - disk archive - a backup/restoration program
// Copyright (C) 2002-2052 Denis Corbin
//
// This program is free software; you can redistribute it and/or
// modify it under the terms of the GNU General Public License
// as published by the Free Software Foundation; either version 2
// of the License, or (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with this program; if not, write to the Free Software
// Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
//
// to contact the author : http://dar.linux.free.fr/email.html
/*********************************************************************/
/// \file crypto_asym.hpp
/// \brief the asymetric cryptographical algoritms relying on gpgme
/// \ingroup Private
#ifndef CRYPTO_ASYM_HPP
#define CRYPTO_ASYM_HPP
extern "C"
{
#if LIBDAR_HAS_GPGME_H
#include <gpgme.h>
#endif
}
#include "/usr/include/dar/libdar_my_config.h"
#include "/usr/include/dar/generic_file.hpp"
#include "/usr/include/dar/generic_file_overlay_for_gpgme.hpp"
#include "/usr/include/dar/erreurs.hpp"
#include "/usr/include/dar/mem_ui.hpp"
#include "/usr/include/dar/crypto.hpp"
#include <list>
namespace libdar
{
/// \ingroup Private
/// @}
class crypto_asym : public mem_ui
{
public:
/// general use constructor
crypto_asym(const user_interaction & ui) : mem_ui(ui) { build_context(); has_signatories = false; };
/// the destructor
~crypto_asym() { release_context(); };
/// disabling copy constructor
crypto_asym(const crypto_asym & ref): mem_ui(ref) { throw SRC_BUG; };
/// disabling object assignment
const crypto_asym & operator = (const crypto_asym & ref) { throw SRC_BUG; };
/// defines the list of email which associated key will be used for signing
void set_signatories(const std::vector<std::string> & signatories);
/// encrypt (and sign if signatures have been given using set_signatories) data for the given recipients
///
/// \param[in] recipients_email list of email of recipient that will be able to read the encrypted data
/// \param[in] clear where to read from clear data to be encrypted (the object must be readable)
/// \param[out] ciphered where to write down encrypted data (the object must be writable)
/// \note this assumes the GnuPG keyring has the public keys of the recipient listed
void encrypt(const std::vector<std::string> & recipients_email, generic_file & clear, generic_file & ciphered);
/// un-cipher data
///
/// \param[in] ciphered contains the encrypted data to decipher
/// \param[out] clear resulting un-ciphered (thus clear) data (the object must be readable)
/// \note this assumes the GnuPG keyring has an appropriated private key (the objet must be writable)
void decrypt(generic_file & ciphered, generic_file & clear);
/// after un-ciphering data retrieve the list of signature that were used beside encryption
/// return a sorted list of signatories
const std::list<signator> & verify() const { return signing_result; };
/// exposing to public visibility the protected method of mem_ui
user_interaction & get_ui() const { return mem_ui::get_ui(); };
private:
bool has_signatories;
std::list<signator> signing_result;
#if GPGME_SUPPORT
gpgme_ctx_t context; //< GPGME context
void release_context() { gpgme_release(context); };
void build_key_list(const std::vector<std::string> & recipients_email, //< list of email to find a key for
gpgme_key_t * & ciphering_keys, //< resulting nullptr terminated list of keys
bool signatories); //< false if email key need encryption capability, true for signing
void release_key_list(gpgme_key_t * & ciphering_keys);
void fill_signing_result();
#else
void release_context() {};
#endif
void build_context();
};
/// @}
} // end of namespace
#endif
|