/// Asymmetrically encrypts OpenPGP messages using the openpgp crate, /// Sequoia's low-level API. use std::env; use std::io; extern crate sequoia_openpgp as openpgp; use openpgp::armor; use openpgp::constants::DataFormat; use openpgp::parse::Parse; use openpgp::serialize::stream::{ Message, LiteralWriter, Encryptor, EncryptionMode, }; fn main() { let args: Vec = env::args().collect(); if args.len() < 3 { panic!("A simple encryption filter.\n\n\ Usage: {} [at-rest|for-transport] [...] \ output\n", args[0]); } let mode = match args[1].as_ref() { "at-rest" => EncryptionMode::AtRest, "for-transport" => EncryptionMode::ForTransport, x => panic!("invalid mode: {:?}, \ must be either 'at-rest' or 'for-transport'", x), }; // Read the transferable public keys from the given files. let tpks: Vec = args[2..].iter().map(|f| { openpgp::TPK::from_file(f) .expect("Failed to read key") }).collect(); // Build a vector of references to hand to Encryptor. let recipients: Vec<&openpgp::TPK> = tpks.iter().collect(); // Compose a writer stack corresponding to the output format and // packet structure we want. First, we want the output to be // ASCII armored. let sink = armor::Writer::new(io::stdout(), armor::Kind::Message, &[]) .expect("Failed to create an armored writer"); // Stream an OpenPGP message. let message = Message::new(sink); // We want to encrypt a literal data packet. let encryptor = Encryptor::new(message, &[], // No symmetric encryption. &recipients, mode) .expect("Failed to create encryptor"); let mut literal_writer = LiteralWriter::new(encryptor, DataFormat::Binary, None, None) .expect("Failed to create literal writer"); // Copy stdin to our writer stack to encrypt the data. io::copy(&mut io::stdin(), &mut literal_writer) .expect("Failed to encrypt"); // Finally, finalize the OpenPGP message by tearing down the // writer stack. literal_writer.finalize().unwrap(); }