http://qs321.pair.com?node_id=326235
Category: Cryptography
Author/Contact Info hv
Description:

Crypt::OpenPGP provides no overt mechanism to interrogate a self-signed key to determine the owner's preferred encryption mechanisms. After pointers in Crypt::OpenPGP - determining which cipher to use I came up with this sample code that shows how you can do that.

Caveats: delves into object innards, provided for education only, tested only with modern (v4) signatures, assumption that code is self-documenting may be dubious.

#!/usr/bin/perl -w
use Crypt::OpenPGP;
use Crypt::OpenPGP::KeyRing;

my($keyfile, $email) = @ARGV;
my $ring = Crypt::OpenPGP::KeyRing->new(Filename => $keyfile);
my $pgp = Crypt::OpenPGP->new(PubRing => $ring);
my $kb = $ring->find_keyblock_by_uid($email);
my $alg = $kb->preferred_sk_alg;
my $crypt = $pgp->encrypt(
    Data => 'squeamish ossifrage',
    Recipients => [ $email ],
    Armour => 1,
    ($alg ? (Cipher => $alg) : ()), # use default if no preference loc
+ated
);
print $crypt;
exit 0;

{
    package Crypt::OpenPGP::KeyBlock;
    sub preferred_sk_alg {
        my $self = shift;
        use Crypt::OpenPGP::Cipher;
        my $supported = Crypt::OpenPGP::Cipher->supported;
        my @prefs;
        for my $sig (@{ $self->get('Crypt::OpenPGP::Signature') }) {
            if ($sig->is_primary) {
                unshift @prefs, @{ $sig->preferred_sk_alg };
            } else {
                push @prefs, @{ $sig->preferred_sk_alg };
            }
        }
        for (@prefs) {
            return $_ if $supported->{$_};
        }
        return;
    }
}
{
    package Crypt::OpenPGP::Signature;
    sub is_primary {
        my $self = shift;
        my $packet = $self->find_subpacket(25); # primary user id
        ($packet && $packet->{data}) || 0;
    }
    sub preferred_sk_alg {
        my $self = shift;
        my $packet = $self->find_subpacket(11); # preferred SK algorit
+hms
        $packet ? $packet->{data} : [];
    }
}