f100cf894f
Cherrypick from master 2003-12-30 08:59:01 UTC twb 'redesign, move, fix icon theme selector': doc/.cvsignore doc/Makefile.am doc/src/ChangeLog.claws-pre0.8.0 po/zh_CN.po src/addrdefs.h src/browseldap.c src/browseldap.h src/gtk/progressdialog.c src/gtk/progressdialog.h src/ldaplocate.c src/ldaplocate.h src/localfolder.c src/localfolder.h src/pgpmime.h src/pixmaps/check_spelling.xpm src/pixmaps/mime_message.xpm src/pixmaps/offline.xpm src/pixmaps/online.xpm src/pixmaps/privacy_expired.xpm src/pixmaps/privacy_failed.xpm src/pixmaps/privacy_passed.xpm src/pixmaps/privacy_signed.xpm src/pixmaps/privacy_unknown.xpm src/pixmaps/privacy_warn.xpm src/prefs_themes.h src/privacy.c src/privacy.h src/remotefolder.c src/remotefolder.h src/sgpgme.c src/sgpgme.h
227 lines
5.7 KiB
C
227 lines
5.7 KiB
C
/*
|
|
* Sylpheed -- a GTK+ based, lightweight, and fast e-mail client
|
|
* Copyright (C) 1999-2003 Hiroyuki Yamamoto & the Sylpheed-Claws team
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
|
*/
|
|
|
|
#include <glib.h>
|
|
|
|
#include "intl.h"
|
|
#include "privacy.h"
|
|
#include "procmime.h"
|
|
|
|
static GSList *systems = NULL;
|
|
|
|
/**
|
|
* Register a new Privacy System
|
|
*
|
|
* \param system The Privacy System that should be registered
|
|
*/
|
|
void privacy_register_system(PrivacySystem *system)
|
|
{
|
|
systems = g_slist_append(systems, system);
|
|
}
|
|
|
|
/**
|
|
* Unregister a new Privacy System. The system must not be in
|
|
* use anymore when it is unregistered.
|
|
*
|
|
* \param system The Privacy System that should be unregistered
|
|
*/
|
|
void privacy_unregister_system(PrivacySystem *system)
|
|
{
|
|
systems = g_slist_remove(systems, system);
|
|
}
|
|
|
|
/**
|
|
* Free a PrivacyData of a PrivacySystem
|
|
*
|
|
* \param privacydata The data to free
|
|
*/
|
|
void privacy_free_privacydata(PrivacyData *privacydata)
|
|
{
|
|
g_return_if_fail(privacydata != NULL);
|
|
|
|
privacydata->system->free_privacydata(privacydata);
|
|
}
|
|
|
|
/**
|
|
* Check if a MimeInfo is signed with one of the available
|
|
* privacy system. If a privacydata is set in the MimeInfo
|
|
* it will directory return the return value by the system
|
|
* set in the privacy data or check all available privacy
|
|
* systems otherwise.
|
|
*
|
|
* \return True if the MimeInfo has a signature
|
|
*/
|
|
gboolean privacy_mimeinfo_is_signed(MimeInfo *mimeinfo)
|
|
{
|
|
GSList *cur;
|
|
g_return_val_if_fail(mimeinfo != NULL, FALSE);
|
|
|
|
if (mimeinfo->privacy != NULL) {
|
|
PrivacySystem *system = mimeinfo->privacy->system;
|
|
|
|
if (system->is_signed != NULL)
|
|
return system->is_signed(mimeinfo);
|
|
else
|
|
return FALSE;
|
|
}
|
|
|
|
for(cur = systems; cur != NULL; cur = g_slist_next(cur)) {
|
|
PrivacySystem *system = (PrivacySystem *) cur->data;
|
|
|
|
if(system->is_signed != NULL && system->is_signed(mimeinfo))
|
|
return TRUE;
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
/**
|
|
* Check the signature of a MimeInfo. privacy_mimeinfo_is_signed
|
|
* should be called before otherwise it is done by this function.
|
|
* If the MimeInfo is not signed an error code will be returned.
|
|
*
|
|
* \return Error code indicating the result of the check,
|
|
* < 0 if an error occured
|
|
*/
|
|
gint privacy_mimeinfo_check_signature(MimeInfo *mimeinfo)
|
|
{
|
|
PrivacySystem *system;
|
|
|
|
g_return_val_if_fail(mimeinfo != NULL, -1);
|
|
|
|
if (mimeinfo->privacy == NULL)
|
|
privacy_mimeinfo_is_signed(mimeinfo);
|
|
|
|
if (mimeinfo->privacy == NULL)
|
|
return -1;
|
|
|
|
system = mimeinfo->privacy->system;
|
|
if (system->check_signature == NULL)
|
|
return -1;
|
|
|
|
return system->check_signature(mimeinfo);
|
|
}
|
|
|
|
SignatureStatus privacy_mimeinfo_get_sig_status(MimeInfo *mimeinfo)
|
|
{
|
|
PrivacySystem *system;
|
|
|
|
g_return_val_if_fail(mimeinfo != NULL, -1);
|
|
|
|
if (mimeinfo->privacy == NULL)
|
|
privacy_mimeinfo_is_signed(mimeinfo);
|
|
|
|
if (mimeinfo->privacy == NULL)
|
|
return SIGNATURE_UNCHECKED;
|
|
|
|
system = mimeinfo->privacy->system;
|
|
if (system->get_sig_status == NULL)
|
|
return SIGNATURE_UNCHECKED;
|
|
|
|
return system->get_sig_status(mimeinfo);
|
|
}
|
|
|
|
gchar *privacy_mimeinfo_sig_info_short(MimeInfo *mimeinfo)
|
|
{
|
|
PrivacySystem *system;
|
|
|
|
g_return_val_if_fail(mimeinfo != NULL, NULL);
|
|
|
|
if (mimeinfo->privacy == NULL)
|
|
privacy_mimeinfo_is_signed(mimeinfo);
|
|
|
|
if (mimeinfo->privacy == NULL)
|
|
return g_strdup(_("No signature found"));
|
|
|
|
system = mimeinfo->privacy->system;
|
|
if (system->get_sig_info_short == NULL)
|
|
return g_strdup(_("No information available"));
|
|
|
|
return system->get_sig_info_short(mimeinfo);
|
|
}
|
|
|
|
gchar *privacy_mimeinfo_sig_info_full(MimeInfo *mimeinfo)
|
|
{
|
|
PrivacySystem *system;
|
|
|
|
g_return_val_if_fail(mimeinfo != NULL, NULL);
|
|
|
|
if (mimeinfo->privacy == NULL)
|
|
privacy_mimeinfo_is_signed(mimeinfo);
|
|
|
|
if (mimeinfo->privacy == NULL)
|
|
return g_strdup(_("No signature found"));
|
|
|
|
system = mimeinfo->privacy->system;
|
|
if (system->get_sig_info_full == NULL)
|
|
return g_strdup(_("No information available"));
|
|
|
|
return system->get_sig_info_full(mimeinfo);
|
|
}
|
|
|
|
gboolean privacy_mimeinfo_is_encrypted(MimeInfo *mimeinfo)
|
|
{
|
|
GSList *cur;
|
|
g_return_val_if_fail(mimeinfo != NULL, FALSE);
|
|
|
|
for(cur = systems; cur != NULL; cur = g_slist_next(cur)) {
|
|
PrivacySystem *system = (PrivacySystem *) cur->data;
|
|
|
|
if(system->is_encrypted != NULL && system->is_encrypted(mimeinfo))
|
|
return TRUE;
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
static gint decrypt(MimeInfo *mimeinfo, PrivacySystem *system)
|
|
{
|
|
MimeInfo *decryptedinfo, *parentinfo;
|
|
gint childnumber;
|
|
|
|
g_return_val_if_fail(system->decrypt != NULL, -1);
|
|
|
|
decryptedinfo = system->decrypt(mimeinfo);
|
|
if (decryptedinfo == NULL)
|
|
return -1;
|
|
|
|
parentinfo = procmime_mimeinfo_parent(mimeinfo);
|
|
childnumber = g_node_child_index(parentinfo->node, mimeinfo);
|
|
|
|
procmime_mimeinfo_free_all(mimeinfo);
|
|
|
|
g_node_insert(parentinfo->node, childnumber, decryptedinfo->node);
|
|
|
|
return 0;
|
|
}
|
|
|
|
gint privacy_mimeinfo_decrypt(MimeInfo *mimeinfo)
|
|
{
|
|
GSList *cur;
|
|
g_return_val_if_fail(mimeinfo != NULL, FALSE);
|
|
|
|
for(cur = systems; cur != NULL; cur = g_slist_next(cur)) {
|
|
PrivacySystem *system = (PrivacySystem *) cur->data;
|
|
|
|
if(system->is_encrypted != NULL && system->is_encrypted(mimeinfo))
|
|
return decrypt(mimeinfo, system);
|
|
}
|
|
|
|
return -1;
|
|
}
|