claws-mail/src/privacy.c
Claws Mail Team f100cf894f This commit was manufactured by cvs2svn to create branch 'gtk2'.
Cherrypick from master 2003-12-30 08:59:01 UTC twb 'redesign, move, fix icon theme selector':
    doc/.cvsignore
    doc/Makefile.am
    doc/src/ChangeLog.claws-pre0.8.0
    po/zh_CN.po
    src/addrdefs.h
    src/browseldap.c
    src/browseldap.h
    src/gtk/progressdialog.c
    src/gtk/progressdialog.h
    src/ldaplocate.c
    src/ldaplocate.h
    src/localfolder.c
    src/localfolder.h
    src/pgpmime.h
    src/pixmaps/check_spelling.xpm
    src/pixmaps/mime_message.xpm
    src/pixmaps/offline.xpm
    src/pixmaps/online.xpm
    src/pixmaps/privacy_expired.xpm
    src/pixmaps/privacy_failed.xpm
    src/pixmaps/privacy_passed.xpm
    src/pixmaps/privacy_signed.xpm
    src/pixmaps/privacy_unknown.xpm
    src/pixmaps/privacy_warn.xpm
    src/prefs_themes.h
    src/privacy.c
    src/privacy.h
    src/remotefolder.c
    src/remotefolder.h
    src/sgpgme.c
    src/sgpgme.h
2003-12-30 08:59:02 +00:00

227 lines
5.7 KiB
C

/*
* Sylpheed -- a GTK+ based, lightweight, and fast e-mail client
* Copyright (C) 1999-2003 Hiroyuki Yamamoto & the Sylpheed-Claws team
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
*/
#include <glib.h>
#include "intl.h"
#include "privacy.h"
#include "procmime.h"
static GSList *systems = NULL;
/**
* Register a new Privacy System
*
* \param system The Privacy System that should be registered
*/
void privacy_register_system(PrivacySystem *system)
{
systems = g_slist_append(systems, system);
}
/**
* Unregister a new Privacy System. The system must not be in
* use anymore when it is unregistered.
*
* \param system The Privacy System that should be unregistered
*/
void privacy_unregister_system(PrivacySystem *system)
{
systems = g_slist_remove(systems, system);
}
/**
* Free a PrivacyData of a PrivacySystem
*
* \param privacydata The data to free
*/
void privacy_free_privacydata(PrivacyData *privacydata)
{
g_return_if_fail(privacydata != NULL);
privacydata->system->free_privacydata(privacydata);
}
/**
* Check if a MimeInfo is signed with one of the available
* privacy system. If a privacydata is set in the MimeInfo
* it will directory return the return value by the system
* set in the privacy data or check all available privacy
* systems otherwise.
*
* \return True if the MimeInfo has a signature
*/
gboolean privacy_mimeinfo_is_signed(MimeInfo *mimeinfo)
{
GSList *cur;
g_return_val_if_fail(mimeinfo != NULL, FALSE);
if (mimeinfo->privacy != NULL) {
PrivacySystem *system = mimeinfo->privacy->system;
if (system->is_signed != NULL)
return system->is_signed(mimeinfo);
else
return FALSE;
}
for(cur = systems; cur != NULL; cur = g_slist_next(cur)) {
PrivacySystem *system = (PrivacySystem *) cur->data;
if(system->is_signed != NULL && system->is_signed(mimeinfo))
return TRUE;
}
return FALSE;
}
/**
* Check the signature of a MimeInfo. privacy_mimeinfo_is_signed
* should be called before otherwise it is done by this function.
* If the MimeInfo is not signed an error code will be returned.
*
* \return Error code indicating the result of the check,
* < 0 if an error occured
*/
gint privacy_mimeinfo_check_signature(MimeInfo *mimeinfo)
{
PrivacySystem *system;
g_return_val_if_fail(mimeinfo != NULL, -1);
if (mimeinfo->privacy == NULL)
privacy_mimeinfo_is_signed(mimeinfo);
if (mimeinfo->privacy == NULL)
return -1;
system = mimeinfo->privacy->system;
if (system->check_signature == NULL)
return -1;
return system->check_signature(mimeinfo);
}
SignatureStatus privacy_mimeinfo_get_sig_status(MimeInfo *mimeinfo)
{
PrivacySystem *system;
g_return_val_if_fail(mimeinfo != NULL, -1);
if (mimeinfo->privacy == NULL)
privacy_mimeinfo_is_signed(mimeinfo);
if (mimeinfo->privacy == NULL)
return SIGNATURE_UNCHECKED;
system = mimeinfo->privacy->system;
if (system->get_sig_status == NULL)
return SIGNATURE_UNCHECKED;
return system->get_sig_status(mimeinfo);
}
gchar *privacy_mimeinfo_sig_info_short(MimeInfo *mimeinfo)
{
PrivacySystem *system;
g_return_val_if_fail(mimeinfo != NULL, NULL);
if (mimeinfo->privacy == NULL)
privacy_mimeinfo_is_signed(mimeinfo);
if (mimeinfo->privacy == NULL)
return g_strdup(_("No signature found"));
system = mimeinfo->privacy->system;
if (system->get_sig_info_short == NULL)
return g_strdup(_("No information available"));
return system->get_sig_info_short(mimeinfo);
}
gchar *privacy_mimeinfo_sig_info_full(MimeInfo *mimeinfo)
{
PrivacySystem *system;
g_return_val_if_fail(mimeinfo != NULL, NULL);
if (mimeinfo->privacy == NULL)
privacy_mimeinfo_is_signed(mimeinfo);
if (mimeinfo->privacy == NULL)
return g_strdup(_("No signature found"));
system = mimeinfo->privacy->system;
if (system->get_sig_info_full == NULL)
return g_strdup(_("No information available"));
return system->get_sig_info_full(mimeinfo);
}
gboolean privacy_mimeinfo_is_encrypted(MimeInfo *mimeinfo)
{
GSList *cur;
g_return_val_if_fail(mimeinfo != NULL, FALSE);
for(cur = systems; cur != NULL; cur = g_slist_next(cur)) {
PrivacySystem *system = (PrivacySystem *) cur->data;
if(system->is_encrypted != NULL && system->is_encrypted(mimeinfo))
return TRUE;
}
return FALSE;
}
static gint decrypt(MimeInfo *mimeinfo, PrivacySystem *system)
{
MimeInfo *decryptedinfo, *parentinfo;
gint childnumber;
g_return_val_if_fail(system->decrypt != NULL, -1);
decryptedinfo = system->decrypt(mimeinfo);
if (decryptedinfo == NULL)
return -1;
parentinfo = procmime_mimeinfo_parent(mimeinfo);
childnumber = g_node_child_index(parentinfo->node, mimeinfo);
procmime_mimeinfo_free_all(mimeinfo);
g_node_insert(parentinfo->node, childnumber, decryptedinfo->node);
return 0;
}
gint privacy_mimeinfo_decrypt(MimeInfo *mimeinfo)
{
GSList *cur;
g_return_val_if_fail(mimeinfo != NULL, FALSE);
for(cur = systems; cur != NULL; cur = g_slist_next(cur)) {
PrivacySystem *system = (PrivacySystem *) cur->data;
if(system->is_encrypted != NULL && system->is_encrypted(mimeinfo))
return decrypt(mimeinfo, system);
}
return -1;
}