| line | stmt | bran | cond | sub | pod | time | code | 
| 1 |  |  |  |  |  |  | # | 
| 2 |  |  |  |  |  |  | #    GnuPG.pm - Interface to the GNU Privacy Guard. | 
| 3 |  |  |  |  |  |  | # | 
| 4 |  |  |  |  |  |  | #    This file is part of GnuPG.pm. | 
| 5 |  |  |  |  |  |  | # | 
| 6 |  |  |  |  |  |  | #    Author: Francis J. Lacoste <francis.lacoste@Contre.COM> | 
| 7 |  |  |  |  |  |  | # | 
| 8 |  |  |  |  |  |  | #    Copyright (C) 2000 iNsu Innovations Inc. | 
| 9 |  |  |  |  |  |  | #    Copyright (C) 2001 Francis J. Lacoste | 
| 10 |  |  |  |  |  |  | # | 
| 11 |  |  |  |  |  |  | #    This program is free software; you can redistribute it and/or modify | 
| 12 |  |  |  |  |  |  | #    it under the terms of the GNU General Public License as published by | 
| 13 |  |  |  |  |  |  | #    the Free Software Foundation; either version 2 of the License, or | 
| 14 |  |  |  |  |  |  | #    (at your option) any later version. | 
| 15 |  |  |  |  |  |  | # | 
| 16 |  |  |  |  |  |  | #    This program is distributed in the hope that it will be useful, | 
| 17 |  |  |  |  |  |  | #    but WITHOUT ANY WARRANTY; without even the implied warranty of | 
| 18 |  |  |  |  |  |  | #    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
| 19 |  |  |  |  |  |  | #    GNU General Public License for more details. | 
| 20 |  |  |  |  |  |  | # | 
| 21 |  |  |  |  |  |  | #    You should have received a copy of the GNU General Public License | 
| 22 |  |  |  |  |  |  | #    along with this program; if not, write to the Free Software | 
| 23 |  |  |  |  |  |  | #    Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA | 
| 24 |  |  |  |  |  |  | # | 
| 25 |  |  |  |  |  |  | package GnuPG; | 
| 26 |  |  |  |  |  |  |  | 
| 27 |  |  |  |  |  |  |  | 
| 28 | 28 |  |  | 28 |  | 1453088 | use strict; | 
|  | 28 |  |  |  |  | 84 |  | 
|  | 28 |  |  |  |  | 1092 |  | 
| 29 |  |  |  |  |  |  |  | 
| 30 | 28 |  |  | 28 |  | 224 | use vars qw($VERSION @ISA @EXPORT @EXPORT_OK  %EXPORT_TAGS ); | 
|  | 28 |  |  |  |  | 84 |  | 
|  | 28 |  |  |  |  | 3304 |  | 
| 31 |  |  |  |  |  |  |  | 
| 32 |  |  |  |  |  |  | BEGIN { | 
| 33 | 28 |  |  | 28 |  | 168 | require Exporter; | 
| 34 |  |  |  |  |  |  |  | 
| 35 | 28 |  |  |  |  | 280 | @ISA = qw(Exporter); | 
| 36 |  |  |  |  |  |  |  | 
| 37 | 28 |  |  |  |  | 84 | @EXPORT = qw(); | 
| 38 |  |  |  |  |  |  |  | 
| 39 | 28 |  |  |  |  | 112 | %EXPORT_TAGS = ( | 
| 40 |  |  |  |  |  |  | algo   => [ qw( RSA_RSA DSA_ELGAMAL DSA RSA ) ], | 
| 41 |  |  |  |  |  |  | trust  => [ qw(    TRUST_UNDEFINED    TRUST_NEVER | 
| 42 |  |  |  |  |  |  | TRUST_MARGINAL    TRUST_FULLY | 
| 43 |  |  |  |  |  |  | TRUST_ULTIMATE ) ], | 
| 44 |  |  |  |  |  |  | ); | 
| 45 |  |  |  |  |  |  |  | 
| 46 | 28 |  |  |  |  | 1036 | Exporter::export_ok_tags( qw( algo trust ) ); | 
| 47 |  |  |  |  |  |  |  | 
| 48 | 28 |  |  |  |  | 616 | $VERSION = '0.19'; | 
| 49 |  |  |  |  |  |  | } | 
| 50 |  |  |  |  |  |  |  | 
| 51 | 28 |  |  | 28 |  | 140 | use constant RSA_RSA            => 1; | 
|  | 28 |  |  |  |  | 28 |  | 
|  | 28 |  |  |  |  | 1232 |  | 
| 52 | 28 |  |  | 28 |  | 140 | use constant DSA_ELGAMAL        => 2; | 
|  | 28 |  |  |  |  | 56 |  | 
|  | 28 |  |  |  |  | 1092 |  | 
| 53 | 28 |  |  | 28 |  | 112 | use constant DSA                => 3; | 
|  | 28 |  |  |  |  | 28 |  | 
|  | 28 |  |  |  |  | 924 |  | 
| 54 | 28 |  |  | 28 |  | 112 | use constant RSA                => 4; | 
|  | 28 |  |  |  |  | 56 |  | 
|  | 28 |  |  |  |  | 1680 |  | 
| 55 |  |  |  |  |  |  |  | 
| 56 | 28 |  |  | 28 |  | 168 | use constant TRUST_UNDEFINED    => -1; | 
|  | 28 |  |  |  |  | 28 |  | 
|  | 28 |  |  |  |  | 1064 |  | 
| 57 | 28 |  |  | 28 |  | 112 | use constant TRUST_NEVER    => 0; | 
|  | 28 |  |  |  |  | 84 |  | 
|  | 28 |  |  |  |  | 952 |  | 
| 58 | 28 |  |  | 28 |  | 112 | use constant TRUST_MARGINAL    => 1; | 
|  | 28 |  |  |  |  | 28 |  | 
|  | 28 |  |  |  |  | 952 |  | 
| 59 | 28 |  |  | 28 |  | 112 | use constant TRUST_FULLY    => 2; | 
|  | 28 |  |  |  |  | 56 |  | 
|  | 28 |  |  |  |  | 924 |  | 
| 60 | 28 |  |  | 28 |  | 140 | use constant TRUST_ULTIMATE    => 3; | 
|  | 28 |  |  |  |  | 28 |  | 
|  | 28 |  |  |  |  | 896 |  | 
| 61 |  |  |  |  |  |  |  | 
| 62 | 28 |  |  | 28 |  | 224 | use Carp; | 
|  | 28 |  |  |  |  | 56 |  | 
|  | 28 |  |  |  |  | 1484 |  | 
| 63 | 28 |  |  | 28 |  | 11396 | use POSIX qw(); | 
|  | 28 |  |  |  |  | 131768 |  | 
|  | 28 |  |  |  |  | 588 |  | 
| 64 | 28 |  |  | 28 |  | 168 | use Symbol; | 
|  | 28 |  |  |  |  | 56 |  | 
|  | 28 |  |  |  |  | 1232 |  | 
| 65 | 28 |  |  | 28 |  | 112 | use Fcntl; | 
|  | 28 |  |  |  |  | 56 |  | 
|  | 28 |  |  |  |  | 104804 |  | 
| 66 |  |  |  |  |  |  |  | 
| 67 |  |  |  |  |  |  | sub parse_trust { | 
| 68 | 34 |  |  | 34 | 0 | 170 | for (shift) { | 
| 69 | 34 | 50 |  |  |  | 251 | /ULTIMATE/  && do { return TRUST_ULTIMATE;  }; | 
|  | 34 |  |  |  |  | 136 |  | 
| 70 | 0 | 0 |  |  |  | 0 | /FULLY/        && do { return TRUST_FULLY;        }; | 
|  | 0 |  |  |  |  | 0 |  | 
| 71 | 0 | 0 |  |  |  | 0 | /MARGINAL/  && do { return TRUST_MARGINAL;  }; | 
|  | 0 |  |  |  |  | 0 |  | 
| 72 | 0 | 0 |  |  |  | 0 | /NEVER/        && do { return TRUST_NEVER;        }; | 
|  | 0 |  |  |  |  | 0 |  | 
| 73 |  |  |  |  |  |  | # Default | 
| 74 | 0 |  |  |  |  | 0 | return TRUST_UNDEFINED; | 
| 75 |  |  |  |  |  |  | } | 
| 76 |  |  |  |  |  |  | } | 
| 77 |  |  |  |  |  |  |  | 
| 78 |  |  |  |  |  |  | sub options($;$) { | 
| 79 | 432 |  |  | 432 | 1 | 1094 | my $self = shift; | 
| 80 | 432 | 100 |  |  |  | 1805 | $self->{cmd_options} = shift if ( $_[0] ); | 
| 81 | 432 |  |  |  |  | 1769 | $self->{cmd_options}; | 
| 82 |  |  |  |  |  |  | } | 
| 83 |  |  |  |  |  |  |  | 
| 84 |  |  |  |  |  |  | sub command($;$) { | 
| 85 | 432 |  |  | 432 | 0 | 1182 | my $self = shift; | 
| 86 | 432 | 100 |  |  |  | 2289 | $self->{command} = shift if ( $_[0] ); | 
| 87 | 432 |  |  |  |  | 1518 | $self->{command}; | 
| 88 |  |  |  |  |  |  | } | 
| 89 |  |  |  |  |  |  |  | 
| 90 |  |  |  |  |  |  | sub args($;$) { | 
| 91 | 432 |  |  | 432 | 0 | 1038 | my $self = shift; | 
| 92 | 432 | 100 |  |  |  | 2212 | $self->{args} = shift if ( $_[0] ); | 
| 93 | 432 |  |  |  |  | 1013 | $self->{args}; | 
| 94 |  |  |  |  |  |  | } | 
| 95 |  |  |  |  |  |  |  | 
| 96 |  |  |  |  |  |  | sub cmdline($) { | 
| 97 | 27 |  |  | 27 | 0 | 233 | my $self = shift; | 
| 98 | 27 |  |  |  |  | 907 | my $args = [ $self->{gnupg_path} ]; | 
| 99 |  |  |  |  |  |  |  | 
| 100 |  |  |  |  |  |  | # Default options | 
| 101 | 27 | 50 |  |  |  | 771 | push @$args, "--no-tty" unless $self->{trace}; | 
| 102 |  |  |  |  |  |  | push @$args, "--no-greeting", "--yes", "--status-fd", fileno $self->{status_fd}, | 
| 103 | 27 |  |  |  |  | 669 | "--command-fd", fileno $self->{command_fd}; | 
| 104 |  |  |  |  |  |  |  | 
| 105 |  |  |  |  |  |  | # Check for homedir and options file | 
| 106 | 27 | 50 |  |  |  | 560 | push @$args, "--homedir", $self->{homedir} if $self->{homedir}; | 
| 107 | 27 | 50 |  |  |  | 454 | push @$args, "--options", $self->{options} if $self->{options}; | 
| 108 |  |  |  |  |  |  |  | 
| 109 |  |  |  |  |  |  | # Command options | 
| 110 | 27 |  |  |  |  | 234 | push @$args, @{ $self->options }; | 
|  | 27 |  |  |  |  | 512 |  | 
| 111 |  |  |  |  |  |  |  | 
| 112 |  |  |  |  |  |  |  | 
| 113 |  |  |  |  |  |  | # Command and arguments | 
| 114 | 27 |  |  |  |  | 482 | push @$args, "--" . $self->command; | 
| 115 | 27 |  |  |  |  | 72 | push @$args, @{ $self->args }; | 
|  | 27 |  |  |  |  | 421 |  | 
| 116 |  |  |  |  |  |  |  | 
| 117 | 27 |  |  |  |  | 161 | return $args; | 
| 118 |  |  |  |  |  |  | } | 
| 119 |  |  |  |  |  |  |  | 
| 120 |  |  |  |  |  |  | sub end_gnupg($) { | 
| 121 | 378 |  |  | 378 | 0 | 1312 | my $self = shift; | 
| 122 |  |  |  |  |  |  |  | 
| 123 |  |  |  |  |  |  | print STDERR "GnuPG: closing status fd " . fileno ($self->{status_fd}) | 
| 124 |  |  |  |  |  |  | . "\n" | 
| 125 | 378 | 50 |  |  |  | 2837 | if $self->{trace}; | 
| 126 |  |  |  |  |  |  |  | 
| 127 |  |  |  |  |  |  | close $self->{status_fd} | 
| 128 | 378 | 50 |  |  |  | 5342 | or croak "error while closing pipe: $!\n"; | 
| 129 |  |  |  |  |  |  |  | 
| 130 |  |  |  |  |  |  | print STDERR "GnuPG: closing command fd " . fileno ($self->{command_fd}) | 
| 131 |  |  |  |  |  |  | . "\n" | 
| 132 | 378 | 50 |  |  |  | 1428 | if $self->{trace}; | 
| 133 |  |  |  |  |  |  |  | 
| 134 |  |  |  |  |  |  | close $self->{command_fd} | 
| 135 | 378 | 50 |  |  |  | 2671 | or croak "error while closing pipe: $!\n"; | 
| 136 |  |  |  |  |  |  |  | 
| 137 | 378 | 50 |  |  |  | 102404634029 | waitpid $self->{gnupg_pid}, 0 | 
| 138 |  |  |  |  |  |  | or croak "error while waiting for gpg: $!\n"; | 
| 139 |  |  |  |  |  |  |  | 
| 140 |  |  |  |  |  |  |  | 
| 141 | 378 |  |  |  |  | 3563 | for ( qw(protocol gnupg_pid command options args status_fd command_fd | 
| 142 |  |  |  |  |  |  | input output next_status ) ) | 
| 143 |  |  |  |  |  |  | { | 
| 144 | 3780 |  |  |  |  | 20436 | delete $self->{$_}; | 
| 145 |  |  |  |  |  |  | } | 
| 146 |  |  |  |  |  |  |  | 
| 147 |  |  |  |  |  |  | } | 
| 148 |  |  |  |  |  |  |  | 
| 149 |  |  |  |  |  |  | sub abort_gnupg($$) { | 
| 150 | 0 |  |  | 0 | 0 | 0 | my ($self,$msg) = @_; | 
| 151 |  |  |  |  |  |  |  | 
| 152 |  |  |  |  |  |  | # Signal our child that it is the end | 
| 153 | 0 | 0 | 0 |  |  | 0 | if ($self->{gnupg_pid} && kill 0 => $self->{gnupg_pid} ) { | 
| 154 | 0 |  |  |  |  | 0 | kill INT => $self->{gnupg_pid}; | 
| 155 |  |  |  |  |  |  | } | 
| 156 |  |  |  |  |  |  |  | 
| 157 | 0 |  |  |  |  | 0 | $self->end_gnupg; | 
| 158 |  |  |  |  |  |  |  | 
| 159 | 0 |  |  |  |  | 0 | confess ( $msg ); | 
| 160 |  |  |  |  |  |  | } | 
| 161 |  |  |  |  |  |  |  | 
| 162 |  |  |  |  |  |  | # Used to push back status information | 
| 163 |  |  |  |  |  |  | sub next_status($$$) { | 
| 164 | 80 |  |  | 80 | 0 | 401 | my ($self,$cmd,$arg) = @_; | 
| 165 |  |  |  |  |  |  |  | 
| 166 | 80 |  |  |  |  | 793 | $self->{next_status} = [$cmd,$arg]; | 
| 167 |  |  |  |  |  |  | } | 
| 168 |  |  |  |  |  |  |  | 
| 169 |  |  |  |  |  |  | sub read_from_status($) { | 
| 170 | 1745 |  |  | 1745 | 0 | 3863 | my $self = shift; | 
| 171 |  |  |  |  |  |  | # Check if a status was pushed back | 
| 172 | 1745 | 50 |  |  |  | 5798 | if ( $self->{next_status} ) { | 
| 173 | 0 |  |  |  |  | 0 | my $status = $self->{next_status}; | 
| 174 | 0 |  |  |  |  | 0 | $self->{next_status} = undef; | 
| 175 | 0 |  |  |  |  | 0 | return @$status; | 
| 176 |  |  |  |  |  |  | } | 
| 177 |  |  |  |  |  |  |  | 
| 178 | 1745 | 50 |  |  |  | 5040 | print STDERR "GnuPG: reading from status fd " . fileno ($self->{status_fd}) . "\n" if $self->{trace}; | 
| 179 |  |  |  |  |  |  |  | 
| 180 | 1745 |  |  |  |  | 3304 | my $fd = $self->{status_fd}; | 
| 181 | 1745 |  |  |  |  | 14458 | local $/ = "\n"; # Just to be sure | 
| 182 | 1745 |  |  |  |  | 992237646 | my $line = <$fd>; | 
| 183 | 1745 | 50 |  |  |  | 8990 | unless ($line) { | 
| 184 | 0 | 0 |  |  |  | 0 | print STDERR "GnuPG: got from status fd: EOF" if $self->{trace}; | 
| 185 | 0 |  |  |  |  | 0 | return (); | 
| 186 |  |  |  |  |  |  | } | 
| 187 |  |  |  |  |  |  |  | 
| 188 | 1745 | 50 |  |  |  | 6707 | print STDERR "GnuPG: got from status fd: $line" if $self->{trace}; | 
| 189 |  |  |  |  |  |  |  | 
| 190 | 1745 |  |  |  |  | 20486 | my ( $cmd,$arg ) = $line =~ /\[GNUPG:\] (\w+) ?(.+)?$/; | 
| 191 | 1745 | 50 |  |  |  | 6264 | $self->abort_gnupg( "error communicating with gnupg: bad status line: $line\n" ) unless $cmd; | 
| 192 | 1745 | 50 |  |  |  | 5158 | print STDERR "GnuPG: Parsed as " . $cmd . " - " . $arg . "\n" if $self->{trace}; | 
| 193 | 1745 | 100 |  |  |  | 12588 | return wantarray ? ( $cmd, $arg ) : $cmd; | 
| 194 |  |  |  |  |  |  | } | 
| 195 |  |  |  |  |  |  |  | 
| 196 |  |  |  |  |  |  | sub run_gnupg($) { | 
| 197 | 405 |  |  | 405 | 0 | 997 | my $self = shift; | 
| 198 |  |  |  |  |  |  |  | 
| 199 | 405 |  |  |  |  | 2757 | my $fd  = gensym; | 
| 200 | 405 |  |  |  |  | 10428 | my $wfd = gensym; | 
| 201 |  |  |  |  |  |  |  | 
| 202 | 405 |  |  |  |  | 5660 | my $crfd = gensym;  # command read and write file descriptors | 
| 203 | 405 |  |  |  |  | 5315 | my $cwfd = gensym; | 
| 204 |  |  |  |  |  |  |  | 
| 205 | 405 | 50 |  |  |  | 13538 | pipe $fd, $wfd | 
| 206 |  |  |  |  |  |  | or croak ( "error creating status pipe: $!\n" ); | 
| 207 | 405 |  |  |  |  | 2650 | my $old = select $wfd; $| = 1;  # Unbuffer | 
|  | 405 |  |  |  |  | 2165 |  | 
| 208 | 405 |  |  |  |  | 1770 | select $old; | 
| 209 |  |  |  |  |  |  |  | 
| 210 | 405 | 50 |  |  |  | 4510 | pipe $crfd, $cwfd | 
| 211 |  |  |  |  |  |  | or croak ( "error creating command pipe: $!\n" ); | 
| 212 | 405 |  |  |  |  | 1531 | $old = select $cwfd; $| = 1;  # Unbuffer | 
|  | 405 |  |  |  |  | 1161 |  | 
| 213 | 405 |  |  |  |  | 1912 | select $old; | 
| 214 |  |  |  |  |  |  |  | 
| 215 |  |  |  |  |  |  | # Keep pipe open after close | 
| 216 | 405 | 50 |  |  |  | 2360 | fcntl( $fd, F_SETFD, 0 ) | 
| 217 |  |  |  |  |  |  | or croak "error removing close on exec flag: $!\n" ; | 
| 218 | 405 | 50 |  |  |  | 1569 | fcntl( $wfd, F_SETFD, 0 ) | 
| 219 |  |  |  |  |  |  | or croak "error removing close on exec flag: $!\n" ; | 
| 220 | 405 | 50 |  |  |  | 1625 | fcntl( $crfd, F_SETFD, 0 ) | 
| 221 |  |  |  |  |  |  | or croak "error removing close on exec flag: $!\n" ; | 
| 222 | 405 | 50 |  |  |  | 1592 | fcntl( $cwfd, F_SETFD, 0 ) | 
| 223 |  |  |  |  |  |  | or croak "error removing close on exec flag: $!\n" ; | 
| 224 |  |  |  |  |  |  |  | 
| 225 | 405 |  |  |  |  | 277322 | my $pid = fork; | 
| 226 | 405 | 50 |  |  |  | 9858 | croak( "error forking: $!" ) unless defined $pid; | 
| 227 | 405 | 100 |  |  |  | 6507 | if ( $pid ) { | 
| 228 |  |  |  |  |  |  | # Parent | 
| 229 | 378 |  |  |  |  | 10918 | close $wfd; | 
| 230 |  |  |  |  |  |  |  | 
| 231 | 378 |  |  |  |  | 7987 | $self->{status_fd}  = $fd; | 
| 232 | 378 |  |  |  |  | 3856 | $self->{gnupg_pid}  = $pid; | 
| 233 | 378 |  |  |  |  | 22119 | $self->{command_fd} = $cwfd; | 
| 234 |  |  |  |  |  |  |  | 
| 235 |  |  |  |  |  |  | } else { | 
| 236 |  |  |  |  |  |  | # Child | 
| 237 | 27 |  |  |  |  | 1137 | $self->{status_fd}  = $wfd; | 
| 238 | 27 |  |  |  |  | 349 | $self->{command_fd} = $crfd; | 
| 239 |  |  |  |  |  |  |  | 
| 240 | 27 |  |  |  |  | 969 | my $cmdline = $self->cmdline; | 
| 241 | 27 | 50 |  |  |  | 186 | unless ( $self->{trace} ) { | 
| 242 | 27 | 50 |  |  |  | 2293 | open (STDERR, "> /dev/null" ) | 
| 243 |  |  |  |  |  |  | or die "can't redirect stderr to /dev/null: $!\n"; | 
| 244 |  |  |  |  |  |  | } | 
| 245 |  |  |  |  |  |  |  | 
| 246 |  |  |  |  |  |  | # This is where we grab the data | 
| 247 | 27 | 100 | 66 |  |  | 893 | if ( ref $self->{input} && defined fileno $self->{input} ) { | 
|  |  | 50 | 66 |  |  |  |  | 
|  |  | 100 |  |  |  |  |  | 
| 248 |  |  |  |  |  |  | open ( STDIN, "<&" . fileno $self->{input} ) | 
| 249 | 5 | 50 |  |  |  | 109 | or die "error setting up data input: $!\n"; | 
| 250 |  |  |  |  |  |  | } elsif ( $self->{input} && -t STDIN) { | 
| 251 |  |  |  |  |  |  | open ( STDIN, $self->{input} ) | 
| 252 | 0 | 0 |  |  |  | 0 | or die "error setting up data input: $!\n"; | 
| 253 |  |  |  |  |  |  | } elsif ( $self->{input} ) { | 
| 254 | 16 |  |  |  |  | 40 | push(@{$cmdline}, $self->{input}); | 
|  | 16 |  |  |  |  | 122 |  | 
| 255 |  |  |  |  |  |  | }# Defaults to stdin | 
| 256 |  |  |  |  |  |  |  | 
| 257 |  |  |  |  |  |  | # This is where the output goes | 
| 258 | 27 | 100 | 66 |  |  | 768 | if ( ref $self->{output} && defined fileno $self->{output} ) { | 
|  |  | 50 | 66 |  |  |  |  | 
|  |  | 100 |  |  |  |  |  | 
| 259 |  |  |  |  |  |  | open ( STDOUT, ">&" . fileno $self->{output} ) | 
| 260 | 5 | 50 |  |  |  | 71 | or die "can't redirect stdout to proper output fd: $!\n"; | 
| 261 |  |  |  |  |  |  | } elsif ( $self->{output} && -t STDOUT ) { | 
| 262 |  |  |  |  |  |  | open ( STDOUT, ">".$self->{output} ) | 
| 263 | 0 | 0 |  |  |  | 0 | or die "can't open $self->{output} for output: $!\n"; | 
| 264 |  |  |  |  |  |  | } elsif ( $self->{output} ) { | 
| 265 | 15 |  |  |  |  | 42 | my $gpg = shift(@{$cmdline}); | 
|  | 15 |  |  |  |  | 40 |  | 
| 266 | 15 |  |  |  |  | 27 | unshift(@{$cmdline}, '--output', $self->{output}); | 
|  | 15 |  |  |  |  | 126 |  | 
| 267 | 15 |  |  |  |  | 51 | unshift(@{$cmdline}, $gpg); | 
|  | 15 |  |  |  |  | 46 |  | 
| 268 |  |  |  |  |  |  | } # Defaults to stdout | 
| 269 |  |  |  |  |  |  |  | 
| 270 |  |  |  |  |  |  | # Close all open file descriptors except STDIN, STDOUT, STDERR | 
| 271 |  |  |  |  |  |  | # and the status filedescriptor. | 
| 272 |  |  |  |  |  |  | # | 
| 273 |  |  |  |  |  |  | # This is needed for the tie interface which opens pipes which | 
| 274 |  |  |  |  |  |  | # some ends must be closed in the child. | 
| 275 |  |  |  |  |  |  | # | 
| 276 |  |  |  |  |  |  | # Besides this is just plain good hygiene | 
| 277 | 27 |  | 50 |  |  | 588 | my $max_fd = POSIX::sysconf( &POSIX::_SC_OPEN_MAX ) || 256; | 
| 278 | 27 |  |  |  |  | 539 | foreach my $f ( 3 .. $max_fd ) { | 
| 279 | 14155722 | 100 |  |  |  | 25695317 | next if $f == fileno $self->{status_fd}; | 
| 280 | 14155695 | 100 |  |  |  | 25323778 | next if $f == fileno $self->{command_fd}; | 
| 281 | 14155668 |  |  |  |  | 23340442 | POSIX::close( $f ); | 
| 282 |  |  |  |  |  |  | } | 
| 283 |  |  |  |  |  |  |  | 
| 284 |  |  |  |  |  |  | print STDERR 'GnuPG: executing `' | 
| 285 | 27 | 50 |  |  |  | 464 | . join( ' ',  @{$cmdline} ) . '`' if $self->{trace}; | 
|  | 0 |  |  |  |  | 0 |  | 
| 286 |  |  |  |  |  |  |  | 
| 287 | 27 | 0 |  |  |  | 0 | exec ( @$cmdline ) | 
| 288 |  |  |  |  |  |  | or CORE::die "can't exec gnupg: $!\n"; | 
| 289 |  |  |  |  |  |  | } | 
| 290 |  |  |  |  |  |  | } | 
| 291 |  |  |  |  |  |  |  | 
| 292 |  |  |  |  |  |  | sub cpr_maybe_send($$$) { | 
| 293 | 96 |  |  | 96 | 0 | 707 | ($_[0])->cpr_send( @_[1, $#_], 1); | 
| 294 |  |  |  |  |  |  | } | 
| 295 |  |  |  |  |  |  |  | 
| 296 |  |  |  |  |  |  |  | 
| 297 |  |  |  |  |  |  | sub cpr_send($$$;$) { | 
| 298 | 426 |  |  | 426 | 0 | 2877 | my ($self,$key,$value, $optional) = @_; | 
| 299 | 426 |  |  |  |  | 1079 | my $fd = $self->{command_fd}; | 
| 300 |  |  |  |  |  |  |  | 
| 301 | 426 |  |  |  |  | 2068 | my ( $cmd, $arg ) = $self->read_from_status; | 
| 302 | 426 | 100 | 66 |  |  | 4536 | unless ( defined $cmd && $cmd =~ /^GET_/) { | 
| 303 | 80 | 50 |  |  |  | 514 | $self->abort_gnupg( "protocol error: expected GET_XXX got $cmd\n" ) | 
| 304 |  |  |  |  |  |  | unless $optional; | 
| 305 | 80 |  |  |  |  | 1117 | $self->next_status( $cmd, $arg ); | 
| 306 | 80 |  |  |  |  | 432 | return; | 
| 307 |  |  |  |  |  |  | } | 
| 308 |  |  |  |  |  |  |  | 
| 309 | 346 | 50 |  |  |  | 1239 | unless ( $arg eq $key ) { | 
| 310 | 0 | 0 |  |  |  | 0 | $self->abort_gnupg ( "protocol error: expected key $key got $arg\n" ) | 
| 311 |  |  |  |  |  |  | unless $optional; | 
| 312 | 0 |  |  |  |  | 0 | return; | 
| 313 |  |  |  |  |  |  | } | 
| 314 |  |  |  |  |  |  |  | 
| 315 | 346 | 50 |  |  |  | 1221 | print STDERR "GnuPG: writing to command fd " . fileno ($fd) . ": $value\n" if $self->{trace}; | 
| 316 |  |  |  |  |  |  |  | 
| 317 | 346 |  |  |  |  | 7758 | print $fd $value . "\n"; | 
| 318 |  |  |  |  |  |  |  | 
| 319 | 346 |  |  |  |  | 1300 | ( $cmd, $arg ) = $self->read_from_status; | 
| 320 | 346 | 50 | 33 |  |  | 3181 | unless ( defined $cmd && $cmd =~ /^GOT_IT/) { | 
| 321 | 0 |  |  |  |  | 0 | $self->next_status( $cmd, $arg ); | 
| 322 |  |  |  |  |  |  | } | 
| 323 |  |  |  |  |  |  | } | 
| 324 |  |  |  |  |  |  |  | 
| 325 |  |  |  |  |  |  |  | 
| 326 |  |  |  |  |  |  | sub send_passphrase($$) { | 
| 327 | 168 |  |  | 168 | 0 | 1137 | my ($self,$passwd) = @_; | 
| 328 |  |  |  |  |  |  |  | 
| 329 |  |  |  |  |  |  | # GnuPG should now tell us that it needs a passphrase | 
| 330 | 168 |  |  |  |  | 921 | my $cmd = $self->read_from_status; | 
| 331 |  |  |  |  |  |  | # Skip UserID hint | 
| 332 | 168 | 100 |  |  |  | 1917 | $cmd = $self->read_from_status if ( $cmd =~ /USERID_HINT/ ); | 
| 333 | 168 | 50 |  |  |  | 815 | if ($cmd =~ /GOOD_PASSPHRASE/) { # This means we didnt need a passphrase | 
| 334 | 0 |  |  |  |  | 0 | $self->next_status($cmd); # We push this back on for read_from_status | 
| 335 | 0 |  |  |  |  | 0 | return; | 
| 336 |  |  |  |  |  |  | } | 
| 337 | 168 | 50 |  |  |  | 1133 | $self->abort_gnupg( "Protocol error: expected NEED_PASSPHRASE.* got $cmd\n") | 
| 338 |  |  |  |  |  |  | unless $cmd =~ /NEED_PASSPHRASE/; | 
| 339 | 168 |  |  |  |  | 979 | $self->cpr_send( "passphrase.enter", $passwd ); | 
| 340 | 168 | 50 |  |  |  | 787 | unless ( $passwd ) { | 
| 341 | 0 |  |  |  |  | 0 | my $cmd = $self->read_from_status; | 
| 342 | 0 | 0 |  |  |  | 0 | $self->abort_gnupg( "Protocol error: expected MISSING_PASSPHRASE got $cmd\n" ) | 
| 343 |  |  |  |  |  |  | unless $cmd eq "MISSING_PASSPHRASE"; | 
| 344 |  |  |  |  |  |  | } | 
| 345 |  |  |  |  |  |  | } | 
| 346 |  |  |  |  |  |  |  | 
| 347 |  |  |  |  |  |  | sub new($%) { | 
| 348 | 46 |  |  | 46 | 1 | 35561 | my $proto = shift; | 
| 349 | 46 |  | 33 |  |  | 433 | my $class = ref $proto || $proto; | 
| 350 |  |  |  |  |  |  |  | 
| 351 | 46 |  |  |  |  | 340 | my %args = @_; | 
| 352 |  |  |  |  |  |  |  | 
| 353 | 46 |  |  |  |  | 126 | my $self = {}; | 
| 354 | 46 | 50 |  |  |  | 234 | if ($args{homedir}) { | 
| 355 |  |  |  |  |  |  | croak ( "Invalid home directory: $args{homedir}\n") | 
| 356 | 46 | 50 | 33 |  |  | 1024 | unless -d $args{homedir} && -x _; | 
| 357 | 46 |  |  |  |  | 235 | $self->{homedir} = $args{homedir}; | 
| 358 |  |  |  |  |  |  | } | 
| 359 | 46 | 50 |  |  |  | 230 | if ($args{options}) { | 
| 360 |  |  |  |  |  |  | croak ( "Invalid options file: $args{options}\n") | 
| 361 | 0 | 0 |  |  |  | 0 | unless -r $args{options}; | 
| 362 | 0 |  |  |  |  | 0 | $self->{options} = $args{options}; | 
| 363 |  |  |  |  |  |  | } | 
| 364 | 46 | 50 |  |  |  | 197 | if ( $args{gnupg_path} ) { | 
| 365 |  |  |  |  |  |  | croak ( "Invalid gpg path: $args{gnupg_path}\n") | 
| 366 | 0 | 0 |  |  |  | 0 | unless -x $args{gnupg_path}; | 
| 367 | 0 |  |  |  |  | 0 | $self->{gnupg_path} = $args{gnupg_path}; | 
| 368 |  |  |  |  |  |  | } else { | 
| 369 | 46 |  |  |  |  | 383 | my ($path) = grep { -x "$_/gpg" } split /:/, $ENV{PATH}; | 
|  | 414 |  |  |  |  | 7514 |  | 
| 370 | 46 | 50 |  |  |  | 306 | croak ( "Couldn't find gpg in PATH ($ENV{PATH})\n" ) | 
| 371 |  |  |  |  |  |  | unless $path; | 
| 372 | 46 |  |  |  |  | 271 | $self->{gnupg_path} = "$path/gpg"; | 
| 373 |  |  |  |  |  |  | } | 
| 374 | 46 | 50 |  |  |  | 297 | $self->{trace} = $args{trace} ? 1 : 0; | 
| 375 |  |  |  |  |  |  |  | 
| 376 | 46 |  |  |  |  | 424 | bless $self, $class; | 
| 377 |  |  |  |  |  |  | } | 
| 378 |  |  |  |  |  |  |  | 
| 379 |  |  |  |  |  |  | sub DESTROY { | 
| 380 | 14 |  |  | 14 |  | 400 | my $self = shift; | 
| 381 |  |  |  |  |  |  | # Signal our child that it is the end | 
| 382 | 14 | 50 | 33 |  |  | 196 | if ($self->{gnupg_pid} && kill 0 => $self->{gnupg_pid} ) { | 
| 383 | 0 |  |  |  |  | 0 | kill INT => $self->{gnupg_pid}; | 
| 384 |  |  |  |  |  |  | } | 
| 385 |  |  |  |  |  |  | } | 
| 386 |  |  |  |  |  |  |  | 
| 387 |  |  |  |  |  |  | sub gen_key($%) { | 
| 388 | 28 |  |  | 28 | 1 | 15820 | my ($self,%args) = @_; | 
| 389 | 28 |  |  |  |  | 140 | my $cmd; | 
| 390 |  |  |  |  |  |  | my $arg; | 
| 391 |  |  |  |  |  |  |  | 
| 392 | 28 |  |  |  |  | 112 | my $algo      = $args{algo}; | 
| 393 | 28 |  | 50 |  |  | 252 | $algo ||= RSA_RSA; | 
| 394 |  |  |  |  |  |  |  | 
| 395 | 28 |  |  |  |  | 84 | my $size      = $args{size}; | 
| 396 | 28 |  | 50 |  |  | 280 | $size ||= 1024; | 
| 397 | 28 | 50 |  |  |  | 140 | croak ( "Keysize is too small: $size" ) if $size < 768; | 
| 398 | 28 | 50 |  |  |  | 140 | croak ( "Keysize is too big: $size" )   if $size > 2048; | 
| 399 |  |  |  |  |  |  |  | 
| 400 | 28 |  |  |  |  | 112 | my $expire      = $args{valid}; | 
| 401 | 28 |  | 50 |  |  | 224 | $expire          ||= 0; | 
| 402 |  |  |  |  |  |  |  | 
| 403 | 28 |  | 50 |  |  | 168 | my $passphrase = $args{passphrase} || ""; | 
| 404 | 28 |  |  |  |  | 84 | my $name      = $args{name}; | 
| 405 |  |  |  |  |  |  |  | 
| 406 | 28 | 50 |  |  |  | 168 | croak "Missing key name\n"      unless $name; | 
| 407 | 28 | 50 |  |  |  | 280 | croak "Invalid name: $name\n" | 
| 408 |  |  |  |  |  |  | unless $name =~ /^\s*[^0-9\<\(\[\]\)\>][^\<\(\[\]\)\>]+$/; | 
| 409 |  |  |  |  |  |  |  | 
| 410 | 28 |  |  |  |  | 112 | my $email      = $args{email}; | 
| 411 | 28 | 50 |  |  |  | 140 | if ( $email ) { | 
| 412 | 0 | 0 | 0 |  |  | 0 | croak "Invalid email address: $email" | 
| 413 |  |  |  |  |  |  | unless $email =~ /^\s*        # Whitespace are okay | 
| 414 |  |  |  |  |  |  | [a-zA-Z0-9_-]    # Doesn't start with a dot | 
| 415 |  |  |  |  |  |  | [a-zA-Z0-9_.-]* | 
| 416 |  |  |  |  |  |  | \@        # Contains at most one at | 
| 417 |  |  |  |  |  |  | [a-zA-Z0-9_.-]+ | 
| 418 |  |  |  |  |  |  | [a-zA-Z0-9_-]    # Doesn't end in a dot | 
| 419 |  |  |  |  |  |  | /x | 
| 420 |  |  |  |  |  |  | && $email !~ /\.\./; | 
| 421 |  |  |  |  |  |  | } else { | 
| 422 | 28 |  |  |  |  | 84 | $email = ""; | 
| 423 |  |  |  |  |  |  | } | 
| 424 |  |  |  |  |  |  |  | 
| 425 | 28 |  |  |  |  | 84 | my $comment      = $args{comment}; | 
| 426 | 28 | 50 |  |  |  | 112 | if ( $comment ) { | 
| 427 | 0 | 0 |  |  |  | 0 | croak "Invalid characters in comment" if $comment =~ /[()]/; | 
| 428 |  |  |  |  |  |  | } else { | 
| 429 | 28 |  |  |  |  | 420 | $comment = ""; | 
| 430 |  |  |  |  |  |  | } | 
| 431 |  |  |  |  |  |  |  | 
| 432 | 28 |  |  |  |  | 252 | $self->command( "gen-key" ); | 
| 433 | 28 |  |  |  |  | 196 | $self->options( [] ); | 
| 434 | 28 |  |  |  |  | 140 | $self->args( [] ); | 
| 435 |  |  |  |  |  |  |  | 
| 436 | 28 |  |  |  |  | 224 | $self->run_gnupg; | 
| 437 |  |  |  |  |  |  |  | 
| 438 | 27 |  |  |  |  | 945 | $self->cpr_send("keygen.algo", $algo ); | 
| 439 |  |  |  |  |  |  | #    if ( $algo == ELGAMAL ) { | 
| 440 |  |  |  |  |  |  | #        # Shitty interactive program, yes I'm sure. | 
| 441 |  |  |  |  |  |  | #        # I'm a program, I can't change my mind now. | 
| 442 |  |  |  |  |  |  | #        $self->cpr_send( "keygen.algo.elg_se", 1 ) | 
| 443 |  |  |  |  |  |  | #    } | 
| 444 |  |  |  |  |  |  |  | 
| 445 | 27 |  |  |  |  | 243 | $self->cpr_send( "keygen.size",        $size ); | 
| 446 | 27 |  |  |  |  | 135 | $self->cpr_send( "keygen.valid",    $expire ); | 
| 447 | 27 |  |  |  |  | 108 | $self->cpr_send( "keygen.name",        $name ); | 
| 448 | 27 |  |  |  |  | 135 | $self->cpr_send( "keygen.email",    $email ); | 
| 449 | 27 |  |  |  |  | 108 | $self->cpr_send( "keygen.comment",    $comment ); | 
| 450 |  |  |  |  |  |  |  | 
| 451 | 27 |  |  |  |  | 189 | $self->send_passphrase( $passphrase ); | 
| 452 |  |  |  |  |  |  |  | 
| 453 | 27 |  |  |  |  | 270 | $self->end_gnupg; | 
| 454 |  |  |  |  |  |  |  | 
| 455 |  |  |  |  |  |  | # Woof. We should now have a generated key ! | 
| 456 |  |  |  |  |  |  | } | 
| 457 |  |  |  |  |  |  |  | 
| 458 |  |  |  |  |  |  | sub import_keys($%) { | 
| 459 | 78 |  |  | 78 | 1 | 66165 | my ($self,%args) = @_; | 
| 460 |  |  |  |  |  |  |  | 
| 461 |  |  |  |  |  |  |  | 
| 462 | 78 |  |  |  |  | 882 | $self->command( "import" ); | 
| 463 | 78 |  |  |  |  | 621 | $self->options( [] ); | 
| 464 |  |  |  |  |  |  |  | 
| 465 | 78 |  |  |  |  | 260 | my $count; | 
| 466 | 78 | 100 |  |  |  | 494 | if ( ref $args{keys} ) { | 
| 467 | 25 |  |  |  |  | 825 | $self->args( $args{keys} ); | 
| 468 |  |  |  |  |  |  | } else { | 
| 469 |  |  |  |  |  |  | # Only one file to import | 
| 470 | 53 |  |  |  |  | 238 | $self->{input} = $args{keys}; | 
| 471 | 53 |  |  |  |  | 291 | $self->args( [] ); | 
| 472 |  |  |  |  |  |  | } | 
| 473 |  |  |  |  |  |  |  | 
| 474 | 78 |  |  |  |  | 520 | $self->run_gnupg; | 
| 475 |  |  |  |  |  |  | FILE: | 
| 476 | 75 | 100 |  |  |  | 2171 | my $num_files = ref $args{keys} ? @{$args{keys}} : 1; | 
|  | 24 |  |  |  |  | 504 |  | 
| 477 | 75 |  |  |  |  | 733 | my ($cmd,$arg); | 
| 478 |  |  |  |  |  |  |  | 
| 479 |  |  |  |  |  |  | # We will see one IMPORTED for each key that is imported | 
| 480 |  |  |  |  |  |  | KEY: | 
| 481 | 75 |  |  |  |  | 251 | while ( 1 ) { | 
| 482 | 101 |  |  |  |  | 1602 | ($cmd,$arg) = $self->read_from_status; | 
| 483 | 101 | 100 |  |  |  | 1111 | last KEY unless $cmd =~ /IMPORTED/; | 
| 484 | 26 |  |  |  |  | 156 | $count++ | 
| 485 |  |  |  |  |  |  | } | 
| 486 |  |  |  |  |  |  |  | 
| 487 |  |  |  |  |  |  | # We will see one IMPORT_RES for all files processed | 
| 488 | 75 | 50 |  |  |  | 553 | $self->abort_gnupg ( "protocol error expected IMPORT_OK got $cmd\n" ) | 
| 489 |  |  |  |  |  |  | unless $cmd =~ /IMPORT_OK/; | 
| 490 | 75 |  |  |  |  | 756 | $self->end_gnupg; | 
| 491 |  |  |  |  |  |  |  | 
| 492 |  |  |  |  |  |  | # We return the number of imported keys | 
| 493 | 75 |  |  |  |  | 1783 | return $count; | 
| 494 |  |  |  |  |  |  | } | 
| 495 |  |  |  |  |  |  |  | 
| 496 |  |  |  |  |  |  | sub export_keys($%) { | 
| 497 | 69 |  |  | 69 | 1 | 45009 | my ($self,%args) = @_; | 
| 498 |  |  |  |  |  |  |  | 
| 499 | 69 |  |  |  |  | 231 | my $options = []; | 
| 500 | 69 | 50 |  |  |  | 556 | push @$options, "--armor"        if $args{armor}; | 
| 501 |  |  |  |  |  |  |  | 
| 502 | 69 |  |  |  |  | 185 | $self->{output} = $args{output}; | 
| 503 |  |  |  |  |  |  |  | 
| 504 | 69 |  |  |  |  | 208 | my $keys = []; | 
| 505 | 69 | 100 |  |  |  | 300 | if ( $args{keys}) { | 
| 506 |  |  |  |  |  |  | push @$keys, | 
| 507 | 24 | 50 |  |  |  | 168 | ref $args{keys} ? @{$args{keys}} : $args{keys}; | 
|  | 0 |  |  |  |  | 0 |  | 
| 508 |  |  |  |  |  |  | } | 
| 509 |  |  |  |  |  |  |  | 
| 510 | 69 | 100 |  |  |  | 350 | if ( $args{secret} ) { | 
|  |  | 50 |  |  |  |  |  | 
| 511 | 22 |  |  |  |  | 264 | $self->command( "export-secret-keys" ); | 
| 512 |  |  |  |  |  |  | } elsif ( $args{all} ){ | 
| 513 | 0 |  |  |  |  | 0 | $self->command( "export-all" ); | 
| 514 |  |  |  |  |  |  | } else { | 
| 515 | 47 |  |  |  |  | 377 | $self->command( "export" ); | 
| 516 |  |  |  |  |  |  | } | 
| 517 | 69 |  |  |  |  | 486 | $self->options( $options ); | 
| 518 | 69 |  |  |  |  | 345 | $self->args( $keys ); | 
| 519 |  |  |  |  |  |  |  | 
| 520 | 69 |  |  |  |  | 393 | $self->run_gnupg; | 
| 521 | 66 |  |  |  |  | 1298 | $self->end_gnupg; | 
| 522 |  |  |  |  |  |  | } | 
| 523 |  |  |  |  |  |  |  | 
| 524 |  |  |  |  |  |  | sub encrypt($%) { | 
| 525 | 104 |  |  | 104 | 1 | 98737 | my ($self,%args) = @_; | 
| 526 |  |  |  |  |  |  |  | 
| 527 | 104 |  |  |  |  | 429 | my $options = []; | 
| 528 |  |  |  |  |  |  | croak ( "no recipient specified\n" ) | 
| 529 | 104 | 50 | 66 |  |  | 722 | unless $args{recipient} or $args{symmetric}; | 
| 530 |  |  |  |  |  |  |  | 
| 531 | 104 | 100 |  |  |  | 809 | for my $recipient ( | 
| 532 |  |  |  |  |  |  | ref $args{recipient} eq 'ARRAY' | 
| 533 | 2 |  |  |  |  | 8 | ? @{ $args{recipient} } | 
| 534 |  |  |  |  |  |  | : $args{recipient}              ) { | 
| 535 | 106 |  |  |  |  | 833 | $recipient =~ s/ /\ /g; # Escape spaces in the recipient. This fills some strange edge case | 
| 536 | 106 |  |  |  |  | 624 | push @$options, "--recipient" => $recipient; | 
| 537 |  |  |  |  |  |  | } | 
| 538 |  |  |  |  |  |  |  | 
| 539 | 104 | 100 |  |  |  | 457 | push @$options, "--sign"        if $args{sign}; | 
| 540 |  |  |  |  |  |  | croak ( "can't sign an symmetric encrypted message\n" ) | 
| 541 | 104 | 50 | 66 |  |  | 603 | if $args{sign} and $args{symmetric}; | 
| 542 |  |  |  |  |  |  |  | 
| 543 | 104 |  | 100 |  |  | 677 | my $passphrase  = $args{passphrase} || ""; | 
| 544 |  |  |  |  |  |  |  | 
| 545 | 104 | 50 |  |  |  | 554 | push @$options, "--armor"        if $args{armor}; | 
| 546 |  |  |  |  |  |  | push @$options, "--local-user", $args{"local-user"} | 
| 547 | 104 | 50 |  |  |  | 433 | if defined $args{"local-user"}; | 
| 548 |  |  |  |  |  |  |  | 
| 549 | 104 |  | 66 |  |  | 830 | $self->{input}  = $args{plaintext} || $args{input}; | 
| 550 | 104 |  |  |  |  | 290 | $self->{output} = $args{output}; | 
| 551 | 104 | 100 |  |  |  | 385 | if ( $args{symmetric} ) { | 
| 552 | 17 |  |  |  |  | 136 | $self->command( "symmetric" ); | 
| 553 |  |  |  |  |  |  | } else { | 
| 554 | 87 |  |  |  |  | 785 | $self->command( "encrypt" ); | 
| 555 |  |  |  |  |  |  | } | 
| 556 | 104 |  |  |  |  | 582 | $self->options( $options ); | 
| 557 | 104 |  |  |  |  | 522 | $self->args( [] ); | 
| 558 |  |  |  |  |  |  |  | 
| 559 | 104 |  |  |  |  | 493 | $self->run_gnupg; | 
| 560 |  |  |  |  |  |  |  | 
| 561 |  |  |  |  |  |  | # Unless we decided to sign or are using symmetric cipher, we are done | 
| 562 | 96 | 100 | 66 |  |  | 2129 | if ( $args{sign} or $args{symmetric} ) { | 
| 563 | 48 |  |  |  |  | 979 | $self->send_passphrase( $passphrase ); | 
| 564 | 48 | 100 |  |  |  | 358 | if ( $args{sign} ) { | 
| 565 | 32 |  |  |  |  | 147 | my ($cmd,$line) = $self->read_from_status; | 
| 566 | 32 | 50 |  |  |  | 443 | $self->abort_gnupg( "invalid passphrase - $cmd\n" ) | 
| 567 |  |  |  |  |  |  | unless $cmd =~ /GOOD_PASSPHRASE/; | 
| 568 |  |  |  |  |  |  | } | 
| 569 |  |  |  |  |  |  | } | 
| 570 |  |  |  |  |  |  |  | 
| 571 |  |  |  |  |  |  | # It is possible that this key has no assigned trust value. | 
| 572 |  |  |  |  |  |  | # Assume the caller knows what he is doing. | 
| 573 | 96 |  |  |  |  | 944 | $self->cpr_maybe_send( "untrusted_key.override", 'y' ); | 
| 574 |  |  |  |  |  |  |  | 
| 575 | 96 | 100 |  |  |  | 1242 | $self->end_gnupg unless $args{tie_mode}; | 
| 576 |  |  |  |  |  |  | } | 
| 577 |  |  |  |  |  |  |  | 
| 578 |  |  |  |  |  |  | sub sign($%) { | 
| 579 | 33 |  |  | 33 | 1 | 14979 | my ($self,%args) = @_; | 
| 580 |  |  |  |  |  |  |  | 
| 581 | 33 |  |  |  |  | 114 | my $options = []; | 
| 582 | 33 |  | 50 |  |  | 191 | my $passphrase  = $args{passphrase} || ""; | 
| 583 |  |  |  |  |  |  |  | 
| 584 | 33 | 50 |  |  |  | 190 | push @$options, "--armor"        if $args{armor}; | 
| 585 |  |  |  |  |  |  | push @$options, "--local-user", $args{"local-user"} | 
| 586 | 33 | 50 |  |  |  | 159 | if defined $args{"local-user"}; | 
| 587 |  |  |  |  |  |  |  | 
| 588 | 33 |  | 33 |  |  | 182 | $self->{input}  = $args{plaintext} || $args{input}; | 
| 589 | 33 |  |  |  |  | 55 | $self->{output} = $args{output}; | 
| 590 | 33 | 100 |  |  |  | 217 | if ( $args{clearsign} ) { | 
|  |  | 100 |  |  |  |  |  | 
| 591 | 10 |  |  |  |  | 90 | $self->command( "clearsign" ); | 
| 592 |  |  |  |  |  |  | } elsif ( $args{"detach-sign"}) { | 
| 593 | 11 |  |  |  |  | 99 | $self->command( "detach-sign" ); | 
| 594 |  |  |  |  |  |  | } else { | 
| 595 | 12 |  |  |  |  | 120 | $self->command( "sign" ); | 
| 596 |  |  |  |  |  |  | } | 
| 597 | 33 |  |  |  |  | 168 | $self->options( $options ); | 
| 598 | 33 |  |  |  |  | 154 | $self->args( [] ); | 
| 599 |  |  |  |  |  |  |  | 
| 600 | 33 |  |  |  |  | 134 | $self->run_gnupg; | 
| 601 |  |  |  |  |  |  |  | 
| 602 |  |  |  |  |  |  | # We need to unlock the private key | 
| 603 | 30 |  |  |  |  | 577 | $self->send_passphrase( $passphrase ); | 
| 604 | 30 |  |  |  |  | 132 | my ($cmd,$line) = $self->read_from_status; | 
| 605 | 30 | 50 |  |  |  | 285 | $self->abort_gnupg( "invalid passphrase - $cmd\n" ) | 
| 606 |  |  |  |  |  |  | unless $cmd =~ /GOOD_PASSPHRASE/; | 
| 607 |  |  |  |  |  |  |  | 
| 608 | 30 | 50 |  |  |  | 285 | $self->end_gnupg unless $args{tie_mode}; | 
| 609 |  |  |  |  |  |  | } | 
| 610 |  |  |  |  |  |  |  | 
| 611 |  |  |  |  |  |  | sub clearsign($%) { | 
| 612 | 10 |  |  | 10 | 1 | 5910 | my $self = shift; | 
| 613 | 10 |  |  |  |  | 70 | $self->sign( @_, clearsign => 1 ); | 
| 614 |  |  |  |  |  |  | } | 
| 615 |  |  |  |  |  |  |  | 
| 616 |  |  |  |  |  |  |  | 
| 617 |  |  |  |  |  |  | sub check_sig($;$$) { | 
| 618 | 34 |  |  | 34 | 0 | 227 | my ( $self, $cmd, $arg) = @_; | 
| 619 |  |  |  |  |  |  |  | 
| 620 |  |  |  |  |  |  | # Our caller may already have grabbed the first line of | 
| 621 |  |  |  |  |  |  | # signature reporting. | 
| 622 | 34 | 100 |  |  |  | 370 | ($cmd,$arg) = $self->read_from_status unless ( $cmd ); | 
| 623 |  |  |  |  |  |  |  | 
| 624 |  |  |  |  |  |  | # Ignore patent warnings. | 
| 625 | 34 | 50 |  |  |  | 229 | ( $cmd, $arg ) = $self->read_from_status() | 
| 626 |  |  |  |  |  |  | if ( $cmd =~ /RSA_OR_IDEA/ ); | 
| 627 |  |  |  |  |  |  |  | 
| 628 |  |  |  |  |  |  | # Ignore automatic key imports | 
| 629 | 34 | 50 |  |  |  | 188 | ( $cmd, $arg ) = $self->read_from_status() | 
| 630 |  |  |  |  |  |  | if ( $cmd =~ /IMPORTED/ ); | 
| 631 |  |  |  |  |  |  |  | 
| 632 | 34 | 50 |  |  |  | 135 | ( $cmd, $arg ) = $self->read_from_status() | 
| 633 |  |  |  |  |  |  | if ( $cmd =~ /IMPORT_OK/ ); | 
| 634 |  |  |  |  |  |  |  | 
| 635 | 34 | 50 |  |  |  | 127 | ( $cmd, $arg ) = $self->read_from_status() | 
| 636 |  |  |  |  |  |  | if ( $cmd =~ /IMPORT_RES/ ); | 
| 637 |  |  |  |  |  |  |  | 
| 638 | 34 | 50 |  |  |  | 324 | $self->abort_gnupg( "invalid signature from ", $arg =~ /[^ ](.+)/, "\n" ) | 
| 639 |  |  |  |  |  |  | if ( $cmd =~ /BADSIG/); | 
| 640 |  |  |  |  |  |  |  | 
| 641 | 34 | 50 |  |  |  | 215 | if ( $cmd =~ /ERRSIG/) | 
| 642 |  |  |  |  |  |  | { | 
| 643 | 0 |  |  |  |  | 0 | my ($keyid, $key_algo, $digest_algo, $sig_class, $timestamp, $rc) | 
| 644 |  |  |  |  |  |  | = split ' ', $arg; | 
| 645 | 0 | 0 |  |  |  | 0 | if ($rc == 9) | 
| 646 |  |  |  |  |  |  | { | 
| 647 | 0 |  |  |  |  | 0 | ($cmd, $arg) = $self->read_from_status(); | 
| 648 | 0 |  |  |  |  | 0 | $self->abort_gnupg( "no public key $keyid" ); | 
| 649 |  |  |  |  |  |  | } | 
| 650 | 0 |  |  |  |  | 0 | $self->abort_gnupg( "error verifying signature from $keyid" ) | 
| 651 |  |  |  |  |  |  | } | 
| 652 |  |  |  |  |  |  |  | 
| 653 | 34 | 50 |  |  |  | 210 | $self->abort_gnupg ( "protocol error: expected SIG_ID" ) | 
| 654 |  |  |  |  |  |  | unless $cmd =~ /SIG_ID/; | 
| 655 | 34 |  |  |  |  | 421 | my ( $sigid, $date, $time ) = split /\s+/, $arg; | 
| 656 |  |  |  |  |  |  |  | 
| 657 | 34 |  |  |  |  | 246 | ( $cmd, $arg ) = $self->read_from_status; | 
| 658 | 34 | 50 |  |  |  | 277 | $self->abort_gnupg ( "protocol error: expected GOODSIG" ) | 
| 659 |  |  |  |  |  |  | unless $cmd =~ /GOODSIG/; | 
| 660 | 34 |  |  |  |  | 202 | my ( $keyid, $name ) = split /\s+/, $arg, 2; | 
| 661 |  |  |  |  |  |  |  | 
| 662 | 34 |  |  |  |  | 149 | ( $cmd, $arg ) = $self->read_from_status; | 
| 663 | 34 |  |  |  |  | 101 | my $policy_url = undef; | 
| 664 | 34 | 50 |  |  |  | 141 | if ( $cmd =~ /POLICY_URL/ ) { | 
| 665 | 0 |  |  |  |  | 0 | $policy_url = $arg; | 
| 666 | 0 |  |  |  |  | 0 | ( $cmd, $arg ) = $self->read_from_status; | 
| 667 |  |  |  |  |  |  | } | 
| 668 |  |  |  |  |  |  |  | 
| 669 | 34 | 50 |  |  |  | 183 | $self->abort_gnupg ( "protocol error: expected VALIDSIG" ) | 
| 670 |  |  |  |  |  |  | unless $cmd =~ /VALIDSIG/; | 
| 671 | 34 |  |  |  |  | 154 | my ( $fingerprint ) = split /\s+/, $arg, 2; | 
| 672 |  |  |  |  |  |  |  | 
| 673 | 34 |  |  |  |  | 123 | ( $cmd, $arg ) = $self->read_from_status; | 
| 674 | 34 | 50 |  |  |  | 209 | $self->abort_gnupg ( "protocol error: expected TRUST*" ) | 
| 675 |  |  |  |  |  |  | unless $cmd =~ /TRUST/; | 
| 676 | 34 |  |  |  |  | 238 | my ($trust) = parse_trust( $cmd ); | 
| 677 |  |  |  |  |  |  |  | 
| 678 | 34 |  |  |  |  | 618 | return { sigid        => $sigid, | 
| 679 |  |  |  |  |  |  | date        => $date, | 
| 680 |  |  |  |  |  |  | timestamp        => $time, | 
| 681 |  |  |  |  |  |  | keyid        => $keyid, | 
| 682 |  |  |  |  |  |  | user        => $name, | 
| 683 |  |  |  |  |  |  | fingerprint    => $fingerprint, | 
| 684 |  |  |  |  |  |  | trust        => $trust, | 
| 685 |  |  |  |  |  |  | policy_url        => $policy_url, | 
| 686 |  |  |  |  |  |  | }; | 
| 687 |  |  |  |  |  |  | } | 
| 688 |  |  |  |  |  |  |  | 
| 689 |  |  |  |  |  |  | sub verify($%) { | 
| 690 | 24 |  |  | 24 | 1 | 15056 | my ($self,%args) = @_; | 
| 691 |  |  |  |  |  |  |  | 
| 692 | 24 | 50 |  |  |  | 163 | croak ( "missing signature argument\n" ) unless $args{signature}; | 
| 693 | 24 |  |  |  |  | 64 | my $files = []; | 
| 694 | 24 | 100 |  |  |  | 116 | if ( $args{file} ) { | 
| 695 |  |  |  |  |  |  | croak ( "detached signature must be in a file\n" ) | 
| 696 | 8 | 50 |  |  |  | 168 | unless -f $args{signature}; | 
| 697 |  |  |  |  |  |  | push @$files, $args{signature}, | 
| 698 | 8 | 50 |  |  |  | 64 | ref $args{file} ? @{$args{file}} : $args{file}; | 
|  | 0 |  |  |  |  | 0 |  | 
| 699 |  |  |  |  |  |  | } else { | 
| 700 | 16 |  |  |  |  | 46 | $self->{input} = $args{signature}; | 
| 701 |  |  |  |  |  |  | } | 
| 702 | 24 |  |  |  |  | 174 | $self->command( "verify" ); | 
| 703 | 24 |  |  |  |  | 113 | $self->options( [] ); | 
| 704 | 24 |  |  |  |  | 112 | $self->args( $files ); | 
| 705 |  |  |  |  |  |  |  | 
| 706 | 24 |  |  |  |  | 112 | $self->run_gnupg; | 
| 707 | 21 |  |  |  |  | 447 | my $sig = $self->check_sig; | 
| 708 |  |  |  |  |  |  |  | 
| 709 | 21 |  |  |  |  | 142 | $self->end_gnupg; | 
| 710 |  |  |  |  |  |  |  | 
| 711 | 21 |  |  |  |  | 442 | return $sig; | 
| 712 |  |  |  |  |  |  | } | 
| 713 |  |  |  |  |  |  |  | 
| 714 |  |  |  |  |  |  | sub decrypt($%) { | 
| 715 | 69 |  |  | 69 | 1 | 97761 | my $self = shift; | 
| 716 | 69 |  |  |  |  | 835 | my %args = @_; | 
| 717 |  |  |  |  |  |  |  | 
| 718 | 69 |  | 66 |  |  | 583 | $self->{input}  = $args{ciphertext} || $args{input}; | 
| 719 | 69 |  |  |  |  | 309 | $self->{output} = $args{output}; | 
| 720 | 69 |  |  |  |  | 717 | $self->command( "decrypt" ); | 
| 721 | 69 |  |  |  |  | 518 | $self->options( [] ); | 
| 722 | 69 |  |  |  |  | 465 | $self->args( [] ); | 
| 723 |  |  |  |  |  |  |  | 
| 724 | 69 |  |  |  |  | 474 | $self->run_gnupg; | 
| 725 |  |  |  |  |  |  |  | 
| 726 | 63 | 100 |  |  |  | 2835 | return $self->decrypt_postwrite( @_ ) unless $args{tie_mode}; | 
| 727 |  |  |  |  |  |  | } | 
| 728 |  |  |  |  |  |  |  | 
| 729 |  |  |  |  |  |  | sub decrypt_postwrite($%) { | 
| 730 | 63 |  |  | 63 | 0 | 2160 | my ($self,%args) = @_; | 
| 731 |  |  |  |  |  |  |  | 
| 732 | 63 |  | 50 |  |  | 464 | my $passphrase  = $args{passphrase} || ""; | 
| 733 |  |  |  |  |  |  |  | 
| 734 | 63 |  |  |  |  | 273 | my ( $cmd, $arg ); | 
| 735 | 63 | 100 |  |  |  | 377 | unless ( $args{symmetric} ) { | 
| 736 | 51 |  |  |  |  | 485 | ( $cmd, $arg ) = $self->read_from_status; | 
| 737 | 51 | 50 |  |  |  | 704 | $self->abort_gnupg ( "protocol error: expected ENC_TO got $cmd: \n" ) | 
| 738 |  |  |  |  |  |  | unless $cmd =~ /ENC_TO/; | 
| 739 |  |  |  |  |  |  | } | 
| 740 |  |  |  |  |  |  |  | 
| 741 | 63 |  |  |  |  | 683 | $self->send_passphrase( $passphrase ); | 
| 742 | 63 |  |  |  |  | 366 | ($cmd,$arg) = $self->read_from_status; | 
| 743 |  |  |  |  |  |  |  | 
| 744 | 63 | 50 |  |  |  | 480 | $self->abort_gnupg ( "invalid passphrase - $cmd\n" ) | 
| 745 |  |  |  |  |  |  | if $cmd =~ /BAD_PASSPHRASE/; | 
| 746 |  |  |  |  |  |  |  | 
| 747 | 63 |  |  |  |  | 287 | my $sig = undef; | 
| 748 |  |  |  |  |  |  |  | 
| 749 | 63 | 100 |  |  |  | 365 | if ( ! $args{symmetric} ) { | 
| 750 | 51 | 50 |  |  |  | 666 | $self->abort_gnupg ( "protocol error: expected GOOD_PASSPHRASE got $cmd: \n" ) | 
| 751 |  |  |  |  |  |  | unless $cmd =~ /GOOD_PASSPHRASE/; | 
| 752 |  |  |  |  |  |  |  | 
| 753 | 51 | 100 |  |  |  | 852 | $sig = $self->decrypt_postread() unless $args{tie_mode}; | 
| 754 |  |  |  |  |  |  | } else { | 
| 755 |  |  |  |  |  |  | # gnupg 1.0.2 adds this status message | 
| 756 | 12 | 50 |  |  |  | 288 | ( $cmd, $arg ) = $self->read_from_status() if $cmd =~ /BEGIN_DECRYPTION/; | 
| 757 |  |  |  |  |  |  | # gnupg 1.4.12 adds this status message | 
| 758 | 12 | 50 |  |  |  | 252 | ( $cmd, $arg ) = $self->read_from_status() if $cmd =~ /DECRYPTION_INFO/; | 
| 759 |  |  |  |  |  |  |  | 
| 760 | 12 | 50 |  |  |  | 156 | $self->abort_gnupg( "invalid passphrase - $cmd" ) unless $cmd =~ /PLAINTEXT/; | 
| 761 |  |  |  |  |  |  | } | 
| 762 |  |  |  |  |  |  |  | 
| 763 | 63 | 100 |  |  |  | 628 | $self->end_gnupg() unless $args{tie_mode}; | 
| 764 |  |  |  |  |  |  |  | 
| 765 | 63 | 100 |  |  |  | 1320 | return $sig ? $sig : 1; | 
| 766 |  |  |  |  |  |  | } | 
| 767 |  |  |  |  |  |  |  | 
| 768 |  |  |  |  |  |  | sub decrypt_postread($) { | 
| 769 | 51 |  |  | 51 | 0 | 240 | my $self = shift; | 
| 770 |  |  |  |  |  |  |  | 
| 771 | 51 |  |  |  |  | 174 | my @cmds; | 
| 772 |  |  |  |  |  |  | # gnupg 1.0.2 adds this status message | 
| 773 | 51 |  |  |  |  | 265 | my ( $cmd, $arg ) = $self->read_from_status; | 
| 774 | 51 |  |  |  |  | 250 | push @cmds, $cmd; | 
| 775 |  |  |  |  |  |  |  | 
| 776 | 51 | 50 |  |  |  | 362 | if ($cmd =~ /BEGIN_DECRYPTION/) { | 
| 777 | 51 |  |  |  |  | 291 | ( $cmd, $arg ) = $self->read_from_status(); | 
| 778 | 51 |  |  |  |  | 188 | push @cmds, $cmd; | 
| 779 |  |  |  |  |  |  | }; | 
| 780 |  |  |  |  |  |  |  | 
| 781 | 51 |  |  |  |  | 136 | my $sig = undef; | 
| 782 | 51 |  | 66 |  |  | 688 | while (defined $cmd && !($cmd =~ /DECRYPTION_OKAY/)) { | 
| 783 | 166 | 100 |  |  |  | 646 | if ( $cmd =~ /SIG_ID/ ) { | 
| 784 | 13 |  |  |  |  | 325 | $sig = $self->check_sig( $cmd, $arg ); | 
| 785 |  |  |  |  |  |  | } | 
| 786 | 166 |  |  |  |  | 561 | ( $cmd, $arg ) = $self->read_from_status(); | 
| 787 | 166 | 50 |  |  |  | 1821 | push @cmds, $cmd if defined $cmd; | 
| 788 |  |  |  |  |  |  | }; | 
| 789 |  |  |  |  |  |  |  | 
| 790 | 51 |  |  |  |  | 442 | my $cmds = join ', ', @cmds; | 
| 791 | 51 | 50 |  |  |  | 460 | $self->abort_gnupg( "protocol error: expected DECRYPTION_OKAY but never got it (all I saw was: $cmds): \n" ) | 
| 792 |  |  |  |  |  |  | unless $cmd =~ /DECRYPTION_OKAY/; | 
| 793 |  |  |  |  |  |  |  | 
| 794 | 51 | 100 |  |  |  | 505 | return $sig ? $sig : 1; | 
| 795 |  |  |  |  |  |  | } | 
| 796 |  |  |  |  |  |  |  | 
| 797 |  |  |  |  |  |  | 1; | 
| 798 |  |  |  |  |  |  | __END__ | 
| 799 |  |  |  |  |  |  |  | 
| 800 |  |  |  |  |  |  | =pod | 
| 801 |  |  |  |  |  |  |  | 
| 802 |  |  |  |  |  |  | =head1 NAME | 
| 803 |  |  |  |  |  |  |  | 
| 804 |  |  |  |  |  |  | GnuPG - Perl module interface to the GNU Privacy Guard (v1.x.x series) | 
| 805 |  |  |  |  |  |  |  | 
| 806 |  |  |  |  |  |  | =head1 SYNOPSIS | 
| 807 |  |  |  |  |  |  |  | 
| 808 |  |  |  |  |  |  | use GnuPG qw( :algo ); | 
| 809 |  |  |  |  |  |  |  | 
| 810 |  |  |  |  |  |  | my $gpg = new GnuPG(); | 
| 811 |  |  |  |  |  |  |  | 
| 812 |  |  |  |  |  |  | $gpg->encrypt(  plaintext    => "file.txt",    output        => "file.gpg", | 
| 813 |  |  |  |  |  |  | armor    => 1,         sign    => 1, | 
| 814 |  |  |  |  |  |  | passphrase  => $secret ); | 
| 815 |  |  |  |  |  |  |  | 
| 816 |  |  |  |  |  |  | $gpg->decrypt( ciphertext    => "file.gpg",    output        => "file.txt" ); | 
| 817 |  |  |  |  |  |  |  | 
| 818 |  |  |  |  |  |  | $gpg->clearsign( plaintext => "file.txt", output => "file.txt.asc", | 
| 819 |  |  |  |  |  |  | passphrase => $secret,   armor => 1, | 
| 820 |  |  |  |  |  |  | ); | 
| 821 |  |  |  |  |  |  |  | 
| 822 |  |  |  |  |  |  | $gpg->verify( signature => "file.txt.asc", file => "file.txt" ); | 
| 823 |  |  |  |  |  |  |  | 
| 824 |  |  |  |  |  |  | $gpg->gen_key( name => "Joe Blow",        comment => "My GnuPG key", | 
| 825 |  |  |  |  |  |  | passphrase => $secret, | 
| 826 |  |  |  |  |  |  | ); | 
| 827 |  |  |  |  |  |  |  | 
| 828 |  |  |  |  |  |  | =head1 DESCRIPTION | 
| 829 |  |  |  |  |  |  |  | 
| 830 |  |  |  |  |  |  | GnuPG is a perl interface to the GNU Privacy Guard. It uses the | 
| 831 |  |  |  |  |  |  | shared memory coprocess interface that gpg provides for its | 
| 832 |  |  |  |  |  |  | wrappers. It tries its best to map the interactive interface of | 
| 833 |  |  |  |  |  |  | the gpg to a more programmatic model. | 
| 834 |  |  |  |  |  |  |  | 
| 835 |  |  |  |  |  |  | =head1 API OVERVIEW | 
| 836 |  |  |  |  |  |  |  | 
| 837 |  |  |  |  |  |  | The API is accessed through methods on a GnuPG object which is | 
| 838 |  |  |  |  |  |  | a wrapper around the B<gpg> program.  All methods takes their | 
| 839 |  |  |  |  |  |  | argument using named parameters, and errors are returned by | 
| 840 |  |  |  |  |  |  | throwing an exception (using croak).  If you wan't to catch | 
| 841 |  |  |  |  |  |  | errors you will have to use eval. | 
| 842 |  |  |  |  |  |  |  | 
| 843 |  |  |  |  |  |  | When handed in a file handle for input or output parameters | 
| 844 |  |  |  |  |  |  | on many of the functions, the API attempts to tie that | 
| 845 |  |  |  |  |  |  | handle to STDIN and STDOUT. In certain persistent environments | 
| 846 |  |  |  |  |  |  | (particularly a web environment), this will not work. This | 
| 847 |  |  |  |  |  |  | problem can be avoided by passing in file names to all | 
| 848 |  |  |  |  |  |  | relevant parameters rather than a Perl file handle. | 
| 849 |  |  |  |  |  |  |  | 
| 850 |  |  |  |  |  |  | There is also a tied file handle interface which you may find more | 
| 851 |  |  |  |  |  |  | convenient for encryption and decryption. See GnuPG::Tie(3) for details. | 
| 852 |  |  |  |  |  |  |  | 
| 853 |  |  |  |  |  |  | =head1 CONSTRUCTOR | 
| 854 |  |  |  |  |  |  |  | 
| 855 |  |  |  |  |  |  | =head2 new ( [params] ) | 
| 856 |  |  |  |  |  |  |  | 
| 857 |  |  |  |  |  |  | You create a new GnuPG wrapper object by invoking its new method. | 
| 858 |  |  |  |  |  |  | (How original !).  The module will try to finds the B<gpg> program | 
| 859 |  |  |  |  |  |  | in your path and will croak if it can't find it. Here are the | 
| 860 |  |  |  |  |  |  | parameters that it accepts : | 
| 861 |  |  |  |  |  |  |  | 
| 862 |  |  |  |  |  |  | =over | 
| 863 |  |  |  |  |  |  |  | 
| 864 |  |  |  |  |  |  | =item gnupg_path | 
| 865 |  |  |  |  |  |  |  | 
| 866 |  |  |  |  |  |  | Path to the B<gpg> program. | 
| 867 |  |  |  |  |  |  |  | 
| 868 |  |  |  |  |  |  | =item options | 
| 869 |  |  |  |  |  |  |  | 
| 870 |  |  |  |  |  |  | Path to the options file for B<gpg>. If not specified, it will use | 
| 871 |  |  |  |  |  |  | the default one (usually F<~/.gnupg/options>). | 
| 872 |  |  |  |  |  |  |  | 
| 873 |  |  |  |  |  |  | =item homedir | 
| 874 |  |  |  |  |  |  |  | 
| 875 |  |  |  |  |  |  | Path to the B<gpg> home directory. This is the directory that contains | 
| 876 |  |  |  |  |  |  | the default F<options> file, the public and private key rings as well | 
| 877 |  |  |  |  |  |  | as the trust database. | 
| 878 |  |  |  |  |  |  |  | 
| 879 |  |  |  |  |  |  | =item trace | 
| 880 |  |  |  |  |  |  |  | 
| 881 |  |  |  |  |  |  | If this variable is set to true, B<gpg> debugging output will be sent | 
| 882 |  |  |  |  |  |  | to stderr. | 
| 883 |  |  |  |  |  |  |  | 
| 884 |  |  |  |  |  |  | =back | 
| 885 |  |  |  |  |  |  |  | 
| 886 |  |  |  |  |  |  | Example: my $gpg = new GnuPG(); | 
| 887 |  |  |  |  |  |  |  | 
| 888 |  |  |  |  |  |  | =head1 METHODS | 
| 889 |  |  |  |  |  |  |  | 
| 890 |  |  |  |  |  |  | =head2 gen_key( [params] ) | 
| 891 |  |  |  |  |  |  |  | 
| 892 |  |  |  |  |  |  | This methods is used to create a new gpg key pair. The methods croaks | 
| 893 |  |  |  |  |  |  | if there is an error. It is a good idea to press random keys on the | 
| 894 |  |  |  |  |  |  | keyboard while running this methods because it consumes a lot of | 
| 895 |  |  |  |  |  |  | entropy from the computer. Here are the parameters it accepts : | 
| 896 |  |  |  |  |  |  |  | 
| 897 |  |  |  |  |  |  | =over | 
| 898 |  |  |  |  |  |  |  | 
| 899 |  |  |  |  |  |  | =item algo | 
| 900 |  |  |  |  |  |  |  | 
| 901 |  |  |  |  |  |  | This is the algorithm use to create the key. Can be I<DSA_ELGAMAL>, | 
| 902 |  |  |  |  |  |  | I<DSA>, I<RSA_RSA> or I<RSA>. | 
| 903 |  |  |  |  |  |  | It defaults to I<DSA_ELGAMAL>. To import | 
| 904 |  |  |  |  |  |  | those constant in your name space, use the I<:algo> tag. | 
| 905 |  |  |  |  |  |  |  | 
| 906 |  |  |  |  |  |  | =item size | 
| 907 |  |  |  |  |  |  |  | 
| 908 |  |  |  |  |  |  | The size of the public key. Defaults to 1024. Cannot be less than | 
| 909 |  |  |  |  |  |  | 768 bits, and keys longer than 2048 are also discouraged. (You *DO* | 
| 910 |  |  |  |  |  |  | know that your monitor may be leaking sensitive information ;-). | 
| 911 |  |  |  |  |  |  |  | 
| 912 |  |  |  |  |  |  | =item valid | 
| 913 |  |  |  |  |  |  |  | 
| 914 |  |  |  |  |  |  | How long the key is valid. Defaults to 0 or never expire. | 
| 915 |  |  |  |  |  |  |  | 
| 916 |  |  |  |  |  |  | =item name | 
| 917 |  |  |  |  |  |  |  | 
| 918 |  |  |  |  |  |  | This is the only mandatory argument. This is the name that will used | 
| 919 |  |  |  |  |  |  | to construct the user id. | 
| 920 |  |  |  |  |  |  |  | 
| 921 |  |  |  |  |  |  | =item email | 
| 922 |  |  |  |  |  |  |  | 
| 923 |  |  |  |  |  |  | Optional email portion of the user id. | 
| 924 |  |  |  |  |  |  |  | 
| 925 |  |  |  |  |  |  | =item comment | 
| 926 |  |  |  |  |  |  |  | 
| 927 |  |  |  |  |  |  | Optional comment portion of the user id. | 
| 928 |  |  |  |  |  |  |  | 
| 929 |  |  |  |  |  |  | =item passphrase | 
| 930 |  |  |  |  |  |  |  | 
| 931 |  |  |  |  |  |  | The passphrase that will be used to encrypt the private key. Optional | 
| 932 |  |  |  |  |  |  | but strongly recommended. | 
| 933 |  |  |  |  |  |  |  | 
| 934 |  |  |  |  |  |  | =back | 
| 935 |  |  |  |  |  |  |  | 
| 936 |  |  |  |  |  |  | Example: $gpg->gen_key( algo => DSA_ELGAMAL, size => 1024, | 
| 937 |  |  |  |  |  |  | name => "My name" ); | 
| 938 |  |  |  |  |  |  |  | 
| 939 |  |  |  |  |  |  | =head2 import_keys( [params] ) | 
| 940 |  |  |  |  |  |  |  | 
| 941 |  |  |  |  |  |  | Import keys into the GnuPG private or public keyring. The method | 
| 942 |  |  |  |  |  |  | croaks if it encounters an error. It returns the number of | 
| 943 |  |  |  |  |  |  | keys imported. Parameters : | 
| 944 |  |  |  |  |  |  |  | 
| 945 |  |  |  |  |  |  | =over | 
| 946 |  |  |  |  |  |  |  | 
| 947 |  |  |  |  |  |  | =item keys | 
| 948 |  |  |  |  |  |  |  | 
| 949 |  |  |  |  |  |  | Only parameter and mandatory. It can either be a filename or a | 
| 950 |  |  |  |  |  |  | reference to an array containing a list of files that will be | 
| 951 |  |  |  |  |  |  | imported. | 
| 952 |  |  |  |  |  |  |  | 
| 953 |  |  |  |  |  |  | =back | 
| 954 |  |  |  |  |  |  |  | 
| 955 |  |  |  |  |  |  | Example: $gpg->import_keys( keys => [ qw( key.pub key.sec ) ] ); | 
| 956 |  |  |  |  |  |  |  | 
| 957 |  |  |  |  |  |  | =head2 export_keys( [params] ) | 
| 958 |  |  |  |  |  |  |  | 
| 959 |  |  |  |  |  |  | Exports keys from the GnuPG keyrings. The method croaks if it | 
| 960 |  |  |  |  |  |  | encounters an error. Parameters : | 
| 961 |  |  |  |  |  |  |  | 
| 962 |  |  |  |  |  |  | =over | 
| 963 |  |  |  |  |  |  |  | 
| 964 |  |  |  |  |  |  | =item keys | 
| 965 |  |  |  |  |  |  |  | 
| 966 |  |  |  |  |  |  | Optional argument that restricts the keys that will be exported. | 
| 967 |  |  |  |  |  |  | Can either be a user id or a reference to an array of userid that | 
| 968 |  |  |  |  |  |  | specifies the keys to be exported. If left unspecified, all keys | 
| 969 |  |  |  |  |  |  | will be exported. | 
| 970 |  |  |  |  |  |  |  | 
| 971 |  |  |  |  |  |  | =item secret | 
| 972 |  |  |  |  |  |  |  | 
| 973 |  |  |  |  |  |  | If this argument is to true, the secret keys rather than the public | 
| 974 |  |  |  |  |  |  | ones will be exported. | 
| 975 |  |  |  |  |  |  |  | 
| 976 |  |  |  |  |  |  | =item all | 
| 977 |  |  |  |  |  |  |  | 
| 978 |  |  |  |  |  |  | If this argument is set to true, all keys (even those that aren't | 
| 979 |  |  |  |  |  |  | OpenPGP compliant) will be exported. | 
| 980 |  |  |  |  |  |  |  | 
| 981 |  |  |  |  |  |  | =item output | 
| 982 |  |  |  |  |  |  |  | 
| 983 |  |  |  |  |  |  | This argument specifies where the keys will be exported. Can be either | 
| 984 |  |  |  |  |  |  | a file name or a reference to a file handle. If not specified, the | 
| 985 |  |  |  |  |  |  | keys will be exported to stdout. | 
| 986 |  |  |  |  |  |  |  | 
| 987 |  |  |  |  |  |  | =item armor | 
| 988 |  |  |  |  |  |  |  | 
| 989 |  |  |  |  |  |  | Set this parameter to true, if you want the exported keys to be ASCII | 
| 990 |  |  |  |  |  |  | armored. | 
| 991 |  |  |  |  |  |  |  | 
| 992 |  |  |  |  |  |  | =back | 
| 993 |  |  |  |  |  |  |  | 
| 994 |  |  |  |  |  |  | Example: $gpg->export_keys( armor => 1, output => "keyring.pub" ); | 
| 995 |  |  |  |  |  |  |  | 
| 996 |  |  |  |  |  |  |  | 
| 997 |  |  |  |  |  |  | =head2 encrypt( [params] ) | 
| 998 |  |  |  |  |  |  |  | 
| 999 |  |  |  |  |  |  | This method is used to encrypt a message, either using assymetric | 
| 1000 |  |  |  |  |  |  | or symmetric cryptography. The methods croaks if an error is | 
| 1001 |  |  |  |  |  |  | encountered. Parameters: | 
| 1002 |  |  |  |  |  |  |  | 
| 1003 |  |  |  |  |  |  | =over | 
| 1004 |  |  |  |  |  |  |  | 
| 1005 |  |  |  |  |  |  | =item plaintext | 
| 1006 |  |  |  |  |  |  |  | 
| 1007 |  |  |  |  |  |  | This argument specifies what to encrypt. It can be either a filename | 
| 1008 |  |  |  |  |  |  | or a reference to a file handle. If left unspecified, STDIN will be | 
| 1009 |  |  |  |  |  |  | encrypted. | 
| 1010 |  |  |  |  |  |  |  | 
| 1011 |  |  |  |  |  |  | =item output | 
| 1012 |  |  |  |  |  |  |  | 
| 1013 |  |  |  |  |  |  | This optional argument specifies where the ciphertext will be output. | 
| 1014 |  |  |  |  |  |  | It can be either a file name or a reference to a file handle. If left | 
| 1015 |  |  |  |  |  |  | unspecified, the ciphertext will be sent to STDOUT. | 
| 1016 |  |  |  |  |  |  |  | 
| 1017 |  |  |  |  |  |  | =item armor | 
| 1018 |  |  |  |  |  |  |  | 
| 1019 |  |  |  |  |  |  | If this parameter is set to true, the ciphertext will be ASCII | 
| 1020 |  |  |  |  |  |  | armored. | 
| 1021 |  |  |  |  |  |  |  | 
| 1022 |  |  |  |  |  |  | =item symmetric | 
| 1023 |  |  |  |  |  |  |  | 
| 1024 |  |  |  |  |  |  | If this parameter is set to true, symmetric cryptography will be | 
| 1025 |  |  |  |  |  |  | used to encrypt the message. You will need to provide a I<passphrase> | 
| 1026 |  |  |  |  |  |  | parameter. | 
| 1027 |  |  |  |  |  |  |  | 
| 1028 |  |  |  |  |  |  | =item recipient | 
| 1029 |  |  |  |  |  |  |  | 
| 1030 |  |  |  |  |  |  | If not using symmetric cryptography, you will have to provide this | 
| 1031 |  |  |  |  |  |  | parameter. It should contains the userid of the intended recipient of | 
| 1032 |  |  |  |  |  |  | the message. It will be used to look up the key to use to encrypt the | 
| 1033 |  |  |  |  |  |  | message. The parameter can also take an array ref, if you want to encrypt | 
| 1034 |  |  |  |  |  |  | the message for a group of recipients. | 
| 1035 |  |  |  |  |  |  |  | 
| 1036 |  |  |  |  |  |  | =item sign | 
| 1037 |  |  |  |  |  |  |  | 
| 1038 |  |  |  |  |  |  | If this parameter is set to true, the message will also be signed. You | 
| 1039 |  |  |  |  |  |  | will probably have to use the I<passphrase> parameter to unlock the | 
| 1040 |  |  |  |  |  |  | private key used to sign message. This option is incompatible with | 
| 1041 |  |  |  |  |  |  | the I<symmetric> one. | 
| 1042 |  |  |  |  |  |  |  | 
| 1043 |  |  |  |  |  |  | =item local-user | 
| 1044 |  |  |  |  |  |  |  | 
| 1045 |  |  |  |  |  |  | This parameter is used to specified the private key that will be used | 
| 1046 |  |  |  |  |  |  | to sign the message. If left unspecified, the default user will be | 
| 1047 |  |  |  |  |  |  | used. This option only makes sense when using the I<sign> option. | 
| 1048 |  |  |  |  |  |  |  | 
| 1049 |  |  |  |  |  |  | =item passphrase | 
| 1050 |  |  |  |  |  |  |  | 
| 1051 |  |  |  |  |  |  | This parameter contains either the secret passphrase for the symmetric | 
| 1052 |  |  |  |  |  |  | algorithm or the passphrase that should be used to decrypt the private | 
| 1053 |  |  |  |  |  |  | key. | 
| 1054 |  |  |  |  |  |  |  | 
| 1055 |  |  |  |  |  |  | =back | 
| 1056 |  |  |  |  |  |  |  | 
| 1057 |  |  |  |  |  |  | Example: $gpg->encrypt( plaintext => file.txt, output => "file.gpg", | 
| 1058 |  |  |  |  |  |  | sign => 1, passphrase => $secret | 
| 1059 |  |  |  |  |  |  | ); | 
| 1060 |  |  |  |  |  |  |  | 
| 1061 |  |  |  |  |  |  | =head2 sign( [params] ) | 
| 1062 |  |  |  |  |  |  |  | 
| 1063 |  |  |  |  |  |  | This method is used create a signature for a file or stream of data. | 
| 1064 |  |  |  |  |  |  | This method croaks on errors. Parameters : | 
| 1065 |  |  |  |  |  |  |  | 
| 1066 |  |  |  |  |  |  | =over | 
| 1067 |  |  |  |  |  |  |  | 
| 1068 |  |  |  |  |  |  | =item plaintext | 
| 1069 |  |  |  |  |  |  |  | 
| 1070 |  |  |  |  |  |  | This argument specifies what  to sign. It can be either a filename | 
| 1071 |  |  |  |  |  |  | or a reference to a file handle. If left unspecified, the data read on | 
| 1072 |  |  |  |  |  |  | STDIN will be signed. | 
| 1073 |  |  |  |  |  |  |  | 
| 1074 |  |  |  |  |  |  | =item output | 
| 1075 |  |  |  |  |  |  |  | 
| 1076 |  |  |  |  |  |  | This optional argument specifies where the signature will be output. | 
| 1077 |  |  |  |  |  |  | It can be either a file name or a reference to a file handle. If left | 
| 1078 |  |  |  |  |  |  | unspecified, the signature will be sent to STDOUT. | 
| 1079 |  |  |  |  |  |  |  | 
| 1080 |  |  |  |  |  |  | =item armor | 
| 1081 |  |  |  |  |  |  |  | 
| 1082 |  |  |  |  |  |  | If this parameter is set to true, the signature will be ASCII armored. | 
| 1083 |  |  |  |  |  |  |  | 
| 1084 |  |  |  |  |  |  | =item passphrase | 
| 1085 |  |  |  |  |  |  |  | 
| 1086 |  |  |  |  |  |  | This parameter contains the secret that should be used to decrypt the | 
| 1087 |  |  |  |  |  |  | private key. | 
| 1088 |  |  |  |  |  |  |  | 
| 1089 |  |  |  |  |  |  | =item local-user | 
| 1090 |  |  |  |  |  |  |  | 
| 1091 |  |  |  |  |  |  | This parameter is used to specified the private key that will be used | 
| 1092 |  |  |  |  |  |  | to make the signature . If left unspecified, the default user will be | 
| 1093 |  |  |  |  |  |  | used. | 
| 1094 |  |  |  |  |  |  |  | 
| 1095 |  |  |  |  |  |  | =item detach-sign | 
| 1096 |  |  |  |  |  |  |  | 
| 1097 |  |  |  |  |  |  | If set to true, a digest of the data will be signed rather than | 
| 1098 |  |  |  |  |  |  | the whole file. | 
| 1099 |  |  |  |  |  |  |  | 
| 1100 |  |  |  |  |  |  | =back | 
| 1101 |  |  |  |  |  |  |  | 
| 1102 |  |  |  |  |  |  | Example: $gpg->sign( plaintext => "file.txt", output => "file.txt.asc", | 
| 1103 |  |  |  |  |  |  | armor => 1, | 
| 1104 |  |  |  |  |  |  | ); | 
| 1105 |  |  |  |  |  |  |  | 
| 1106 |  |  |  |  |  |  | =head2 clearsign( [params] ) | 
| 1107 |  |  |  |  |  |  |  | 
| 1108 |  |  |  |  |  |  | This methods clearsign a message. The output will contains the original | 
| 1109 |  |  |  |  |  |  | message with a signature appended. It takes the same parameters as | 
| 1110 |  |  |  |  |  |  | the B<sign> method. | 
| 1111 |  |  |  |  |  |  |  | 
| 1112 |  |  |  |  |  |  | =head2 verify( [params] ) | 
| 1113 |  |  |  |  |  |  |  | 
| 1114 |  |  |  |  |  |  | This method verifies a signature against the signed message. The | 
| 1115 |  |  |  |  |  |  | methods croaks if the signature is invalid or an error is | 
| 1116 |  |  |  |  |  |  | encountered. If the signature is valid, it returns an hash with | 
| 1117 |  |  |  |  |  |  | the signature parameters. Here are the method's parameters : | 
| 1118 |  |  |  |  |  |  |  | 
| 1119 |  |  |  |  |  |  | =over | 
| 1120 |  |  |  |  |  |  |  | 
| 1121 |  |  |  |  |  |  | =item signature | 
| 1122 |  |  |  |  |  |  |  | 
| 1123 |  |  |  |  |  |  | If the message and the signature are in the same file (i.e. a | 
| 1124 |  |  |  |  |  |  | clearsigned message), this parameter can be either a file name or a | 
| 1125 |  |  |  |  |  |  | reference to a file handle. If the signature doesn't follows the | 
| 1126 |  |  |  |  |  |  | message, than it must be the name of the file that contains the | 
| 1127 |  |  |  |  |  |  | signature. | 
| 1128 |  |  |  |  |  |  |  | 
| 1129 |  |  |  |  |  |  | =item file | 
| 1130 |  |  |  |  |  |  |  | 
| 1131 |  |  |  |  |  |  | This is a file name or a reference to an array of file names that | 
| 1132 |  |  |  |  |  |  | contains the signed data. | 
| 1133 |  |  |  |  |  |  |  | 
| 1134 |  |  |  |  |  |  | =back | 
| 1135 |  |  |  |  |  |  |  | 
| 1136 |  |  |  |  |  |  | When the signature is valid, here are the elements of the hash | 
| 1137 |  |  |  |  |  |  | that is returned by the method : | 
| 1138 |  |  |  |  |  |  |  | 
| 1139 |  |  |  |  |  |  | =over | 
| 1140 |  |  |  |  |  |  |  | 
| 1141 |  |  |  |  |  |  | =item sigid | 
| 1142 |  |  |  |  |  |  |  | 
| 1143 |  |  |  |  |  |  | The signature id. This can be used to protect against replay | 
| 1144 |  |  |  |  |  |  | attack. | 
| 1145 |  |  |  |  |  |  |  | 
| 1146 |  |  |  |  |  |  | =item date | 
| 1147 |  |  |  |  |  |  |  | 
| 1148 |  |  |  |  |  |  | The data at which the signature has been made. | 
| 1149 |  |  |  |  |  |  |  | 
| 1150 |  |  |  |  |  |  | =item timestamp | 
| 1151 |  |  |  |  |  |  |  | 
| 1152 |  |  |  |  |  |  | The epoch timestamp of the signature. | 
| 1153 |  |  |  |  |  |  |  | 
| 1154 |  |  |  |  |  |  | =item keyid | 
| 1155 |  |  |  |  |  |  |  | 
| 1156 |  |  |  |  |  |  | The key id used to make the signature. | 
| 1157 |  |  |  |  |  |  |  | 
| 1158 |  |  |  |  |  |  | =item user | 
| 1159 |  |  |  |  |  |  |  | 
| 1160 |  |  |  |  |  |  | The userid of the signer. | 
| 1161 |  |  |  |  |  |  |  | 
| 1162 |  |  |  |  |  |  | =item fingerprint | 
| 1163 |  |  |  |  |  |  |  | 
| 1164 |  |  |  |  |  |  | The fingerprint of the signature. | 
| 1165 |  |  |  |  |  |  |  | 
| 1166 |  |  |  |  |  |  | =item trust | 
| 1167 |  |  |  |  |  |  |  | 
| 1168 |  |  |  |  |  |  | The trust value of the public key of the signer. Those are values that | 
| 1169 |  |  |  |  |  |  | can be imported in your namespace with the :trust tag. They are | 
| 1170 |  |  |  |  |  |  | (TRUST_UNDEFINED, TRUST_NEVER, TRUST_MARGINAL, TRUST_FULLY, TRUST_ULTIMATE). | 
| 1171 |  |  |  |  |  |  |  | 
| 1172 |  |  |  |  |  |  | =back | 
| 1173 |  |  |  |  |  |  |  | 
| 1174 |  |  |  |  |  |  | Example : my $sig = $gpg->verify( signature => "file.txt.asc", | 
| 1175 |  |  |  |  |  |  | file => "file.txt" ); | 
| 1176 |  |  |  |  |  |  |  | 
| 1177 |  |  |  |  |  |  | =head2 decrypt( [params] ) | 
| 1178 |  |  |  |  |  |  |  | 
| 1179 |  |  |  |  |  |  | This method decrypts an encrypted message. It croaks, if there is an | 
| 1180 |  |  |  |  |  |  | error while decrypting the message. If the message was signed, this | 
| 1181 |  |  |  |  |  |  | method also verifies the signature. If decryption is sucessful, the | 
| 1182 |  |  |  |  |  |  | method either returns the valid signature parameters if present, or | 
| 1183 |  |  |  |  |  |  | true. Method parameters : | 
| 1184 |  |  |  |  |  |  |  | 
| 1185 |  |  |  |  |  |  | =over | 
| 1186 |  |  |  |  |  |  |  | 
| 1187 |  |  |  |  |  |  | =item ciphertext | 
| 1188 |  |  |  |  |  |  |  | 
| 1189 |  |  |  |  |  |  | This optional parameter contains either the name of the file | 
| 1190 |  |  |  |  |  |  | containing the ciphertext or a reference to a file handle containing | 
| 1191 |  |  |  |  |  |  | the ciphertext. If not present, STDIN will be decrypted. | 
| 1192 |  |  |  |  |  |  |  | 
| 1193 |  |  |  |  |  |  | =item output | 
| 1194 |  |  |  |  |  |  |  | 
| 1195 |  |  |  |  |  |  | This optional parameter determines where the plaintext will be stored. | 
| 1196 |  |  |  |  |  |  | It can be either a file name or a reference to a file handle.  If left | 
| 1197 |  |  |  |  |  |  | unspecified, the plaintext will be sent to STDOUT. | 
| 1198 |  |  |  |  |  |  |  | 
| 1199 |  |  |  |  |  |  | =item symmetric | 
| 1200 |  |  |  |  |  |  |  | 
| 1201 |  |  |  |  |  |  | This should be set to true, if the message is encrypted using | 
| 1202 |  |  |  |  |  |  | symmetric cryptography. | 
| 1203 |  |  |  |  |  |  |  | 
| 1204 |  |  |  |  |  |  | =item passphrase | 
| 1205 |  |  |  |  |  |  |  | 
| 1206 |  |  |  |  |  |  | The passphrase that should be used to decrypt the message (in the case | 
| 1207 |  |  |  |  |  |  | of a message encrypted using a symmetric cipher) or the secret that | 
| 1208 |  |  |  |  |  |  | will unlock the private key that should be used to decrypt the | 
| 1209 |  |  |  |  |  |  | message. | 
| 1210 |  |  |  |  |  |  |  | 
| 1211 |  |  |  |  |  |  | =back | 
| 1212 |  |  |  |  |  |  |  | 
| 1213 |  |  |  |  |  |  | Example: $gpg->decrypt( ciphertext => "file.gpg", output => "file.txt" | 
| 1214 |  |  |  |  |  |  | passphrase => $secret ); | 
| 1215 |  |  |  |  |  |  |  | 
| 1216 |  |  |  |  |  |  | =head1 BUGS AND LIMITATIONS | 
| 1217 |  |  |  |  |  |  |  | 
| 1218 |  |  |  |  |  |  | This module doesn't work (yet) with the v2 branch of GnuPG. | 
| 1219 |  |  |  |  |  |  |  | 
| 1220 |  |  |  |  |  |  | =head1 AUTHOR | 
| 1221 |  |  |  |  |  |  |  | 
| 1222 |  |  |  |  |  |  | Francis J. Lacoste <francis.lacoste@Contre.COM> | 
| 1223 |  |  |  |  |  |  |  | 
| 1224 |  |  |  |  |  |  | =head1 COPYRIGHT | 
| 1225 |  |  |  |  |  |  |  | 
| 1226 |  |  |  |  |  |  | Copyright (c) 1999,2000 iNsu Innovations. Inc. | 
| 1227 |  |  |  |  |  |  | Copyright (c) 2001 Francis J. Lacoste | 
| 1228 |  |  |  |  |  |  |  | 
| 1229 |  |  |  |  |  |  | This program is free software; you can redistribute it and/or modify | 
| 1230 |  |  |  |  |  |  | it under the terms of the GNU General Public License as published by | 
| 1231 |  |  |  |  |  |  | the Free Software Foundation; either version 2 of the License, or | 
| 1232 |  |  |  |  |  |  | (at your option) any later version. | 
| 1233 |  |  |  |  |  |  |  | 
| 1234 |  |  |  |  |  |  | =head1 SEE ALSO | 
| 1235 |  |  |  |  |  |  |  | 
| 1236 |  |  |  |  |  |  | L<GnuPG::Tie> | 
| 1237 |  |  |  |  |  |  |  | 
| 1238 |  |  |  |  |  |  | Alternative module: L<GnuPG::Interface> | 
| 1239 |  |  |  |  |  |  |  | 
| 1240 |  |  |  |  |  |  | gpg(1) | 
| 1241 |  |  |  |  |  |  |  | 
| 1242 |  |  |  |  |  |  | =cut |