claws-mail/src/privacy.c
Colin Leroy 49a81f6a9c 2009-02-23 [cleroy] 3.7.0cvs73
* src/account.c
	* src/action.c
	* src/addr_compl.c
	* src/addrbook.c
	* src/addrcache.c
	* src/addrcindex.c
	* src/addrclip.c
	* src/addrduplicates.c
	* src/addressadd.c
	* src/addressbook.c
	* src/addressbook_foldersel.c
	* src/addrharvest.c
	* src/addrindex.c
	* src/addritem.c
	* src/addrquery.c
	* src/addrselect.c
	* src/codeconv.c
	* src/compose.c
	* src/customheader.c
	* src/editaddress.c
	* src/editaddress_other_attributes_ldap.c
	* src/editgroup.c
	* src/editldap.c
	* src/enriched.c
	* src/exporthtml.c
	* src/exportldif.c
	* src/filtering.c
	* src/folder.c
	* src/foldersel.c
	* src/folderutils.c
	* src/folderview.c
	* src/gedit-print.c
	* src/html.c
	* src/imap.c
	* src/imap_gtk.c
	* src/inc.c
	* src/jpilot.c
	* src/ldapctrl.c
	* src/ldapquery.c
	* src/ldapserver.c
	* src/ldapupdate.c
	* src/ldif.c
	* src/localfolder.c
	* src/main.c
	* src/mainwindow.c
	* src/matcher.c
	* src/mbox.c
	* src/messageview.c
	* src/mh.c
	* src/mh_gtk.c
	* src/mimeview.c
	* src/msgcache.c
	* src/mutt.c
	* src/news.c
	* src/news_gtk.c
	* src/noticeview.c
	* src/pine.c
	* src/pop.c
	* src/prefs_account.c
	* src/prefs_actions.c
	* src/prefs_common.c
	* src/prefs_filtering.c
	* src/prefs_filtering_action.c
	* src/prefs_folder_column.c
	* src/prefs_folder_item.c
	* src/prefs_gtk.c
	* src/prefs_matcher.c
	* src/prefs_quote.c
	* src/prefs_send.c
	* src/prefs_summaries.c
	* src/prefs_summary_column.c
	* src/prefs_template.c
	* src/prefs_themes.c
	* src/prefs_toolbar.c
	* src/printing.c
	* src/privacy.c
	* src/procheader.c
	* src/procmime.c
	* src/procmsg.c
	* src/quote_fmt.c
	* src/remotefolder.c
	* src/send_message.c
	* src/sourcewindow.c
	* src/statusbar.c
	* src/stock_pixmap.c
	* src/summary_search.c
	* src/summaryview.c
	* src/textview.c
	* src/toolbar.c
	* src/undo.c
	* src/uri_opener.c
	* src/vcard.c
	* src/common/base64.c
	* src/common/claws.c
	* src/common/hooks.c
	* src/common/plugin.c
	* src/common/prefs.c
	* src/common/session.c
	* src/common/smtp.c
	* src/common/socket.c
	* src/common/string_match.c
	* src/common/stringtable.c
	* src/common/utils.c
	* src/common/utils.h
	* src/common/xml.c
	* src/common/xmlprops.c
	* src/gtk/colorlabel.c
	* src/gtk/combobox.c
	* src/gtk/foldersort.c
	* src/gtk/gtkaspell.c
	* src/gtk/gtkcmclist.c
	* src/gtk/gtkcmctree.c
	* src/gtk/gtkcmoptionmenu.c
	* src/gtk/gtksctree.c
	* src/gtk/gtkshruler.c
	* src/gtk/gtksourceprintjob.c
	* src/gtk/gtkutils.c
	* src/gtk/gtkvscrollbutton.c
	* src/gtk/logwindow.c
	* src/gtk/menu.c
	* src/gtk/pluginwindow.c
	* src/gtk/prefswindow.c
	* src/gtk/quicksearch.c
	* src/gtk/spell_entry.c
	* src/plugins/pgpcore/select-keys.c
	* src/plugins/pgpinline/pgpinline.c
	* src/plugins/pgpmime/pgpmime.c
	* src/plugins/smime/smime.c
	* src/plugins/spamassassin/spamassassin_gtk.c
		Mass commit changing g_return_* to cm_return_*
		and making these more interesting
2009-02-23 16:55:51 +00:00

500 lines
12 KiB
C

/*
* Sylpheed -- a GTK+ based, lightweight, and fast e-mail client
* Copyright (C) 1999-2009 Hiroyuki Yamamoto & the Claws Mail team
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
*/
#include <glib.h>
#include <glib/gi18n.h>
#include "privacy.h"
#include "procmime.h"
static GSList *systems = NULL;
static gchar *privacy_last_error = NULL;
void privacy_set_error(const gchar *format, ...)
{
va_list args;
gchar buf[BUFSIZ];
va_start(args, format);
g_vsnprintf(buf, BUFSIZ, format, args);
va_end(args);
g_free(privacy_last_error);
privacy_last_error = g_strdup(buf);
}
static gchar tmp_privacy_error[BUFSIZ];
void privacy_reset_error(void)
{
g_free(privacy_last_error);
privacy_last_error = NULL;
}
gboolean privacy_peek_error(void)
{
return (privacy_last_error != NULL);
}
const gchar *privacy_get_error (void)
{
if (privacy_last_error) {
strncpy2(tmp_privacy_error, privacy_last_error, BUFSIZ-1);
privacy_reset_error();
return tmp_privacy_error;
} else {
return _("Unknown error");
}
}
static PrivacySystem *privacy_data_get_system(PrivacyData *data)
{
/* Make sure the cached system is still registered */
if (data->system && g_slist_find(systems, data->system))
return data->system;
else
return NULL;
}
/**
* Register a new Privacy System
*
* \param system The Privacy System that should be registered
*/
void privacy_register_system(PrivacySystem *system)
{
systems = g_slist_append(systems, system);
}
/**
* Unregister a new Privacy System. The system must not be in
* use anymore when it is unregistered.
*
* \param system The Privacy System that should be unregistered
*/
void privacy_unregister_system(PrivacySystem *system)
{
systems = g_slist_remove(systems, system);
}
/**
* Free a PrivacyData of a PrivacySystem
*
* \param privacydata The data to free
*/
void privacy_free_privacydata(PrivacyData *privacydata)
{
PrivacySystem *system = NULL;
cm_return_if_fail(privacydata != NULL);
system = privacy_data_get_system(privacydata);
if (!system)
return;
system->free_privacydata(privacydata);
}
/**
* Check if a MimeInfo is signed with one of the available
* privacy system. If a privacydata is set in the MimeInfo
* it will directory return the return value by the system
* set in the privacy data or check all available privacy
* systems otherwise.
*
* \return True if the MimeInfo has a signature
*/
gboolean privacy_mimeinfo_is_signed(MimeInfo *mimeinfo)
{
GSList *cur;
cm_return_val_if_fail(mimeinfo != NULL, FALSE);
if (mimeinfo->privacy != NULL) {
PrivacySystem *system =
privacy_data_get_system(mimeinfo->privacy);
if (system == NULL) {
mimeinfo->privacy = NULL;
goto try_others;
}
if (system->is_signed != NULL)
return system->is_signed(mimeinfo);
else
return FALSE;
}
try_others:
for(cur = systems; cur != NULL; cur = g_slist_next(cur)) {
PrivacySystem *system = (PrivacySystem *) cur->data;
if(system->is_signed != NULL && system->is_signed(mimeinfo))
return TRUE;
}
return FALSE;
}
struct SignedState {
MsgInfo *msginfo;
gchar **system;
};
static void msginfo_set_signed_flag(GNode *node, gpointer data)
{
struct SignedState *sstate = (struct SignedState *)data;
MsgInfo *msginfo = sstate->msginfo;
MimeInfo *mimeinfo = node->data;
if (privacy_mimeinfo_is_signed(mimeinfo)) {
procmsg_msginfo_set_flags(msginfo, 0, MSG_SIGNED);
if (sstate->system && !*(sstate->system) && mimeinfo->privacy)
*(sstate->system) = g_strdup(mimeinfo->privacy->system->id);
}
if (privacy_mimeinfo_is_encrypted(mimeinfo)) {
procmsg_msginfo_set_flags(msginfo, 0, MSG_ENCRYPTED);
if (sstate->system && !*(sstate->system) && mimeinfo->privacy)
*(sstate->system) = g_strdup(mimeinfo->privacy->system->id);
} else {
/* searching inside encrypted parts doesn't really make sense */
g_node_children_foreach(mimeinfo->node, G_TRAVERSE_ALL, msginfo_set_signed_flag, sstate);
}
}
void privacy_msginfo_get_signed_state(MsgInfo *msginfo, gchar **system)
{
struct SignedState sstate;
MimeInfo *mimeinfo = procmime_scan_message(msginfo);
if (!mimeinfo)
return;
sstate.msginfo = msginfo;
sstate.system = system;
g_node_children_foreach(mimeinfo->node, G_TRAVERSE_ALL, msginfo_set_signed_flag, &sstate);
}
/**
* Check the signature of a MimeInfo. privacy_mimeinfo_is_signed
* should be called before otherwise it is done by this function.
* If the MimeInfo is not signed an error code will be returned.
*
* \return Error code indicating the result of the check,
* < 0 if an error occured
*/
gint privacy_mimeinfo_check_signature(MimeInfo *mimeinfo)
{
PrivacySystem *system;
cm_return_val_if_fail(mimeinfo != NULL, -1);
if (mimeinfo->privacy == NULL)
privacy_mimeinfo_is_signed(mimeinfo);
if (mimeinfo->privacy == NULL)
return -1;
system = privacy_data_get_system(mimeinfo->privacy);
if (system == NULL)
return -1;
if (system->check_signature == NULL)
return -1;
return system->check_signature(mimeinfo);
}
SignatureStatus privacy_mimeinfo_get_sig_status(MimeInfo *mimeinfo)
{
PrivacySystem *system;
cm_return_val_if_fail(mimeinfo != NULL, -1);
if (mimeinfo->privacy == NULL)
privacy_mimeinfo_is_signed(mimeinfo);
if (mimeinfo->privacy == NULL)
return SIGNATURE_UNCHECKED;
system = privacy_data_get_system(mimeinfo->privacy);
if (system == NULL)
return SIGNATURE_UNCHECKED;
if (system->get_sig_status == NULL)
return SIGNATURE_UNCHECKED;
return system->get_sig_status(mimeinfo);
}
gchar *privacy_mimeinfo_sig_info_short(MimeInfo *mimeinfo)
{
PrivacySystem *system;
cm_return_val_if_fail(mimeinfo != NULL, NULL);
if (mimeinfo->privacy == NULL)
privacy_mimeinfo_is_signed(mimeinfo);
if (mimeinfo->privacy == NULL)
return g_strdup(_("No signature found"));
system = privacy_data_get_system(mimeinfo->privacy);
if (system == NULL)
return g_strdup(_("No signature found"));
if (system->get_sig_info_short == NULL)
return g_strdup(_("No information available"));
return system->get_sig_info_short(mimeinfo);
}
gchar *privacy_mimeinfo_sig_info_full(MimeInfo *mimeinfo)
{
PrivacySystem *system;
cm_return_val_if_fail(mimeinfo != NULL, NULL);
if (mimeinfo->privacy == NULL)
privacy_mimeinfo_is_signed(mimeinfo);
if (mimeinfo->privacy == NULL)
return g_strdup(_("No signature found"));
system = privacy_data_get_system(mimeinfo->privacy);
if (system == NULL)
return g_strdup(_("No signature found"));
if (system->get_sig_info_full == NULL)
return g_strdup(_("No information available"));
return system->get_sig_info_full(mimeinfo);
}
gboolean privacy_mimeinfo_is_encrypted(MimeInfo *mimeinfo)
{
GSList *cur;
cm_return_val_if_fail(mimeinfo != NULL, FALSE);
for(cur = systems; cur != NULL; cur = g_slist_next(cur)) {
PrivacySystem *system = (PrivacySystem *) cur->data;
if(system->is_encrypted != NULL && system->is_encrypted(mimeinfo))
return TRUE;
}
return FALSE;
}
static gint decrypt(MimeInfo *mimeinfo, PrivacySystem *system)
{
MimeInfo *decryptedinfo, *parentinfo;
gint childnumber;
cm_return_val_if_fail(system->decrypt != NULL, -1);
decryptedinfo = system->decrypt(mimeinfo);
if (decryptedinfo == NULL)
return -1;
parentinfo = procmime_mimeinfo_parent(mimeinfo);
childnumber = g_node_child_index(parentinfo->node, mimeinfo);
procmime_mimeinfo_free_all(mimeinfo);
g_node_insert(parentinfo->node, childnumber, decryptedinfo->node);
return 0;
}
gint privacy_mimeinfo_decrypt(MimeInfo *mimeinfo)
{
GSList *cur;
cm_return_val_if_fail(mimeinfo != NULL, FALSE);
for(cur = systems; cur != NULL; cur = g_slist_next(cur)) {
PrivacySystem *system = (PrivacySystem *) cur->data;
if(system->is_encrypted != NULL && system->is_encrypted(mimeinfo))
return decrypt(mimeinfo, system);
}
return -1;
}
GSList *privacy_get_system_ids()
{
GSList *cur;
GSList *ret = NULL;
for(cur = systems; cur != NULL; cur = g_slist_next(cur)) {
PrivacySystem *system = (PrivacySystem *) cur->data;
ret = g_slist_append(ret, g_strdup(system->id));
}
return ret;
}
static PrivacySystem *privacy_get_system(const gchar *id)
{
GSList *cur;
cm_return_val_if_fail(id != NULL, NULL);
for(cur = systems; cur != NULL; cur = g_slist_next(cur)) {
PrivacySystem *system = (PrivacySystem *) cur->data;
if(strcmp(id, system->id) == 0)
return system;
}
return NULL;
}
const gchar *privacy_system_get_name(const gchar *id)
{
PrivacySystem *system;
cm_return_val_if_fail(id != NULL, NULL);
system = privacy_get_system(id);
if (system == NULL)
return NULL;
return system->name;
}
gboolean privacy_system_can_sign(const gchar *id)
{
PrivacySystem *system;
cm_return_val_if_fail(id != NULL, FALSE);
system = privacy_get_system(id);
if (system == NULL)
return FALSE;
return system->can_sign;
}
gboolean privacy_system_can_encrypt(const gchar *id)
{
PrivacySystem *system;
cm_return_val_if_fail(id != NULL, FALSE);
system = privacy_get_system(id);
if (system == NULL)
return FALSE;
return system->can_encrypt;
}
gboolean privacy_sign(const gchar *id, MimeInfo *target, PrefsAccount *account, const gchar *from_addr)
{
PrivacySystem *system;
cm_return_val_if_fail(id != NULL, FALSE);
cm_return_val_if_fail(target != NULL, FALSE);
system = privacy_get_system(id);
if (system == NULL)
return FALSE;
if (!system->can_sign)
return FALSE;
if (system->sign == NULL)
return FALSE;
return system->sign(target, account, from_addr);
}
gchar *privacy_get_encrypt_data(const gchar *id, GSList *recp_names)
{
PrivacySystem *system;
gchar *ret = NULL;
GSList *uniq_names = NULL, *cur;
cm_return_val_if_fail(id != NULL, NULL);
cm_return_val_if_fail(recp_names != NULL, NULL);
system = privacy_get_system(id);
if (system == NULL)
return NULL;
if (!system->can_encrypt)
return NULL;
if (system->get_encrypt_data == NULL)
return NULL;
for (cur = recp_names; cur; cur = cur->next) {
if (!g_slist_find_custom(uniq_names, cur->data, (GCompareFunc)strcmp)) {
uniq_names = g_slist_prepend(uniq_names, cur->data);
}
}
ret = system->get_encrypt_data(uniq_names);
g_slist_free(uniq_names);
return ret;
}
const gchar *privacy_get_encrypt_warning(const gchar *id)
{
PrivacySystem *system;
cm_return_val_if_fail(id != NULL, NULL);
system = privacy_get_system(id);
if (system == NULL)
return NULL;
if (!system->can_encrypt)
return NULL;
if (system->get_encrypt_warning == NULL)
return NULL;
return system->get_encrypt_warning();
}
void privacy_inhibit_encrypt_warning(const gchar *id, gboolean inhibit)
{
PrivacySystem *system;
cm_return_if_fail(id != NULL);
system = privacy_get_system(id);
if (system == NULL)
return;
if (!system->can_encrypt)
return;
if (system->inhibit_encrypt_warning == NULL)
return;
system->inhibit_encrypt_warning(inhibit);
}
gboolean privacy_encrypt(const gchar *id, MimeInfo *mimeinfo, const gchar *encdata)
{
PrivacySystem *system;
cm_return_val_if_fail(id != NULL, FALSE);
cm_return_val_if_fail(mimeinfo != NULL, FALSE);
if (encdata == NULL) {
privacy_set_error(_("No recipient keys defined."));
return FALSE;
}
system = privacy_get_system(id);
if (system == NULL)
return FALSE;
if (!system->can_encrypt)
return FALSE;
if (system->encrypt == NULL)
return FALSE;
return system->encrypt(mimeinfo, encdata);
}