7d0fd9f52190c1e42f44c997d06bfe70c1a94db6
[claws.git] / src / plugins / pgpcore / sgpgme.c
1 /*
2  * Claws Mail -- a GTK+ based, lightweight, and fast e-mail client
3  * Copyright (C) 1999-2012 the Claws Mail team
4  *
5  * This program is free software; you can redistribute it and/or modify
6  * it under the terms of the GNU General Public License as published by
7  * the Free Software Foundation; either version 3 of the License, or
8  * (at your option) any later version.
9  *
10  * This program is distributed in the hope that it will be useful,
11  * but WITHOUT ANY WARRANTY; without even the implied warranty of
12  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
13  * GNU General Public License for more details.
14  *
15  * You should have received a copy of the GNU General Public License
16  * along with this program. If not, see <http://www.gnu.org/licenses/>.
17  * 
18  */
19  
20 #ifdef HAVE_CONFIG_H
21 #  include "config.h"
22 #include "claws-features.h"
23 #endif
24  
25 #ifdef USE_GPGME
26
27 #include <time.h>
28 #include <gtk/gtk.h>
29 #include <gpgme.h>
30 #include <glib.h>
31 #include <glib/gi18n.h>
32 #include <stdio.h>
33 #include <string.h>
34 #include <stdlib.h>
35 #include <errno.h>
36 #include <sys/types.h>
37 #ifndef G_OS_WIN32
38 #  include <sys/wait.h>
39 #endif
40 #if (defined(__DragonFly__) || defined(SOLARIS) || defined (__NetBSD__) || defined (__FreeBSD__) || defined (__OpenBSD__))
41 #  include <sys/signal.h>
42 #endif
43 #ifndef G_OS_WIN32
44 #include <sys/mman.h>
45 #endif
46 #if HAVE_LOCALE_H
47 #  include <locale.h>
48 #endif
49
50 #include "sgpgme.h"
51 #include "privacy.h"
52 #include "prefs_common.h"
53 #include "utils.h"
54 #include "alertpanel.h"
55 #include "passphrase.h"
56 #include "prefs_gpg.h"
57 #include "account.h"
58 #include "select-keys.h"
59
60 static void sgpgme_disable_all(void)
61 {
62     /* FIXME: set a flag, so that we don't bother the user with failed
63      * gpgme messages */
64 }
65
66 gpgme_verify_result_t sgpgme_verify_signature(gpgme_ctx_t ctx, gpgme_data_t sig, 
67                                         gpgme_data_t plain, gpgme_data_t dummy)
68 {
69         gpgme_verify_result_t status = NULL;
70         gpgme_error_t err;
71
72         if ((err = gpgme_op_verify(ctx, sig, plain, dummy)) != GPG_ERR_NO_ERROR) {
73                 debug_print("op_verify err %s\n", gpgme_strerror(err));
74                 privacy_set_error("%s", gpgme_strerror(err));
75                 return GINT_TO_POINTER(-GPG_ERR_SYSTEM_ERROR);
76         }
77         status = gpgme_op_verify_result(ctx);
78         if (status && status->signatures == NULL) {
79                 debug_print("no signature found\n");
80                 privacy_set_error(_("No signature found"));
81                 return GINT_TO_POINTER(-GPG_ERR_SYSTEM_ERROR);
82         }
83         return status;
84 }
85
86 SignatureStatus sgpgme_sigstat_gpgme_to_privacy(gpgme_ctx_t ctx, gpgme_verify_result_t status)
87 {
88         gpgme_signature_t sig = NULL;
89         
90         if (GPOINTER_TO_INT(status) == -GPG_ERR_SYSTEM_ERROR) {
91                 debug_print("system error\n");
92                 return SIGNATURE_CHECK_FAILED;
93         }
94
95         if (status == NULL) {
96                 debug_print("status == NULL\n");
97                 return SIGNATURE_UNCHECKED;
98         }
99         sig = status->signatures;
100
101         if (sig == NULL) {
102                 debug_print("sig == NULL\n");
103                 return SIGNATURE_UNCHECKED;
104         }
105
106         debug_print("err code %d\n", gpg_err_code(sig->status));
107         switch (gpg_err_code(sig->status)) {
108         case GPG_ERR_NO_ERROR:
109                 switch (gpg_err_code(sig->validity)) {
110                 case GPGME_VALIDITY_NEVER:
111                         return SIGNATURE_INVALID;
112                 case GPGME_VALIDITY_UNKNOWN:
113                 case GPGME_VALIDITY_UNDEFINED:
114                 case GPGME_VALIDITY_MARGINAL:
115                 case GPGME_VALIDITY_FULL:
116                 case GPGME_VALIDITY_ULTIMATE:
117                         return SIGNATURE_OK;
118                 default:
119                         return SIGNATURE_CHECK_FAILED;
120                 }
121         case GPG_ERR_SIG_EXPIRED:
122         case GPG_ERR_CERT_REVOKED:
123                 return SIGNATURE_WARN;
124         case GPG_ERR_KEY_EXPIRED:
125                 return SIGNATURE_KEY_EXPIRED;
126         case GPG_ERR_BAD_SIGNATURE:
127                 return SIGNATURE_INVALID;
128         case GPG_ERR_NO_PUBKEY:
129                 return SIGNATURE_CHECK_FAILED;
130         default:
131                 return SIGNATURE_CHECK_FAILED;
132         }
133         return SIGNATURE_CHECK_FAILED;
134 }
135
136 static const gchar *get_validity_str(unsigned long validity)
137 {
138         switch (gpg_err_code(validity)) {
139         case GPGME_VALIDITY_UNKNOWN:
140                 return _("Unknown");
141         case GPGME_VALIDITY_UNDEFINED:
142                 return _("Undefined");
143         case GPGME_VALIDITY_NEVER:
144                 return _("Never");
145         case GPGME_VALIDITY_MARGINAL:
146                 return _("Marginal");
147         case GPGME_VALIDITY_FULL:
148                 return _("Full");
149         case GPGME_VALIDITY_ULTIMATE:
150                 return _("Ultimate");
151         default:
152                 return _("Error");
153         }
154 }
155
156 static gchar *extract_name(const char *uid)
157 {
158         if (uid == NULL)
159                 return NULL;
160         if (!strncmp(uid, "CN=", 3)) {
161                 gchar *result = g_strdup(uid+3);
162                 if (strstr(result, ","))
163                         *(strstr(result, ",")) = '\0';
164                 return result;
165         } else if (strstr(uid, ",CN=")) {
166                 gchar *result = g_strdup(strstr(uid, ",CN=")+4);
167                 if (strstr(result, ","))
168                         *(strstr(result, ",")) = '\0';
169                 return result;
170         } else {
171                 return g_strdup(uid);
172         }
173 }
174 gchar *sgpgme_sigstat_info_short(gpgme_ctx_t ctx, gpgme_verify_result_t status)
175 {
176         gpgme_signature_t sig = NULL;
177         gchar *uname = NULL;
178         gpgme_key_t key;
179         gchar *result = NULL;
180         gpgme_error_t err = 0;
181         static gboolean warned = FALSE;
182
183         if (GPOINTER_TO_INT(status) == -GPG_ERR_SYSTEM_ERROR) {
184                 return g_strdup_printf(_("The signature can't be checked - %s"), privacy_get_error());
185         }
186
187         if (status == NULL) {
188                 return g_strdup(_("The signature has not been checked."));
189         }
190         sig = status->signatures;
191         if (sig == NULL) {
192                 return g_strdup(_("The signature has not been checked."));
193         }
194
195         err = gpgme_get_key(ctx, sig->fpr, &key, 0);
196         if (gpg_err_code(err) == GPG_ERR_NO_AGENT) {
197                 if (!warned)
198                         alertpanel_error(_("PGP Core: Can't get key - no gpg-agent running."));
199                 else
200                         g_warning(_("PGP Core: Can't get key - no gpg-agent running."));
201                 warned = TRUE;
202         } else if (gpg_err_code(err) != GPG_ERR_NO_ERROR && gpg_err_code(err) != GPG_ERR_EOF) {
203                 return g_strdup_printf(_("The signature can't be checked - %s"), 
204                         gpgme_strerror(err));
205         }
206         if (key)
207                 uname = extract_name(key->uids->uid);
208         else
209                 uname = g_strdup("<?>");
210         switch (gpg_err_code(sig->status)) {
211         case GPG_ERR_NO_ERROR:
212                 switch (gpg_err_code(sig->validity)) {
213                 case GPGME_VALIDITY_FULL:
214                 case GPGME_VALIDITY_ULTIMATE:
215                         result = g_strdup_printf(_("Good signature from %s."), uname);
216                         break;
217                 case GPGME_VALIDITY_MARGINAL:
218                 case GPGME_VALIDITY_UNKNOWN:
219                 case GPGME_VALIDITY_UNDEFINED:
220                 case GPGME_VALIDITY_NEVER:
221                 default:
222                         result = g_strdup_printf(_("Good signature (untrusted) from %s."), uname);
223                         break;
224                 }
225                 break;
226         case GPG_ERR_SIG_EXPIRED:
227                 result = g_strdup_printf(_("Expired signature from %s."), uname);
228                 break;
229         case GPG_ERR_KEY_EXPIRED:
230                 result = g_strdup_printf(_("Expired key from %s."), uname);
231                 break;
232         case GPG_ERR_BAD_SIGNATURE:
233                 result = g_strdup_printf(_("Bad signature from %s."), uname);
234                 break;
235         case GPG_ERR_NO_PUBKEY: {
236                 gchar *id = g_strdup(sig->fpr + strlen(sig->fpr)-8);
237                 result = g_strdup_printf(_("Key 0x%s not available to verify this signature."), id);
238                 g_free(id);
239                 break;
240                 }
241         default:
242                 result = g_strdup(_("The signature has not been checked."));
243                 break;
244         }
245         if (result == NULL)
246                 result = g_strdup(_("Error"));
247         g_free(uname);
248         return result;
249 }
250
251 gchar *sgpgme_sigstat_info_full(gpgme_ctx_t ctx, gpgme_verify_result_t status)
252 {
253         gint i = 0;
254         gchar *ret;
255         GString *siginfo;
256         gpgme_signature_t sig = NULL;
257
258         siginfo = g_string_sized_new(64);
259         if (status == NULL) {
260                 g_string_append_printf(siginfo,
261                         _("Error checking signature: no status\n"));
262                 goto bail;
263          }
264
265         sig = status->signatures;
266         
267         while (sig) {
268                 gpgme_user_id_t user = NULL;
269                 gpgme_key_t key;
270                 gpgme_error_t err;
271                 const gchar *keytype, *keyid, *uid;
272                 
273                 err = gpgme_get_key(ctx, sig->fpr, &key, 0);
274
275                 if (err != GPG_ERR_NO_ERROR) {
276                         key = NULL;
277                         g_string_append_printf(siginfo, 
278                                 _("Error checking signature: %s\n"),
279                                 gpgme_strerror(err));
280                         goto bail;
281                 }
282                 if (key) {
283                         user = key->uids;
284                         keytype = gpgme_pubkey_algo_name(
285                                         key->subkeys->pubkey_algo);
286                         keyid = key->subkeys->keyid;
287                         uid = user->uid;
288                 } else {
289                         keytype = "?";
290                         keyid = "?";
291                         uid = "?";
292                 }
293                 g_string_append_printf(siginfo,
294                         _("Signature made using %s key ID %s\n"),
295                         keytype, keyid);
296                 
297                 switch (gpg_err_code(sig->status)) {
298                 case GPG_ERR_NO_ERROR:
299                 case GPG_ERR_KEY_EXPIRED:
300                         g_string_append_printf(siginfo,
301                                 _("Good signature from uid \"%s\" (Validity: %s)\n"),
302                                 uid, get_validity_str(user?user->validity:GPGME_VALIDITY_UNKNOWN));
303                         break;
304                 case GPG_ERR_SIG_EXPIRED:
305                         g_string_append_printf(siginfo,
306                                 _("Expired signature from uid \"%s\" (Validity: %s)\n"),
307                                 uid, get_validity_str(user?user->validity:GPGME_VALIDITY_UNKNOWN));
308                         break;
309                 case GPG_ERR_BAD_SIGNATURE:
310                         g_string_append_printf(siginfo,
311                                 _("BAD signature from \"%s\"\n"),
312                                 uid);
313                         break;
314                 default:
315                         break;
316                 }
317                 if (sig->status != GPG_ERR_BAD_SIGNATURE) {
318                         gint j = 1;
319                         user = user ? user->next : NULL;
320                         while (user != NULL) {
321                                 g_string_append_printf(siginfo,
322                                         _("                    uid \"%s\" (Validity: %s)\n"),
323                                         user->uid,
324                                         get_validity_str(user->validity));
325                                 j++;
326                                 user = user->next;
327                         }
328                         g_string_append(siginfo,
329                                 _("Primary key fingerprint:"));
330                         const char* primary_fpr = NULL;
331                         if (key && key->subkeys && key->subkeys->fpr)
332                                 primary_fpr = key->subkeys->fpr;
333                         else
334                                 g_string_append(siginfo, " ?");
335                         int idx; /* now pretty-print the fingerprint */
336                         for (idx=0; primary_fpr && *primary_fpr!='\0'; idx++, primary_fpr++) {
337                                 if (idx%4==0)
338                                         g_string_append_c(siginfo, ' ');
339                                 if (idx%20==0)
340                                         g_string_append_c(siginfo, ' ');
341                                 g_string_append_c(siginfo, (gchar)*primary_fpr);
342                         }
343                         g_string_append_c(siginfo, '\n');
344 #ifdef HAVE_GPGME_PKA_TRUST
345                         if (sig->pka_trust == 1 && sig->pka_address) {
346                                 g_string_append_printf(siginfo,
347                                    _("WARNING: Signer's address \"%s\" "
348                                       "does not match DNS entry\n"), 
349                                    sig->pka_address);
350                         }
351                         else if (sig->pka_trust == 2 && sig->pka_address) {
352                                 g_string_append_printf(siginfo,
353                                    _("Verified signer's address is \"%s\"\n"),
354                                    sig->pka_address);
355                                 /* FIXME: Compare the address to the
356                                  * From: address.  */
357                         }
358 #endif /*HAVE_GPGME_PKA_TRUST*/
359                 }
360
361                 g_string_append(siginfo, "\n");
362                 i++;
363                 sig = sig->next;
364         }
365 bail:
366         ret = siginfo->str;
367         g_string_free(siginfo, FALSE);
368         return ret;
369 }
370
371 gpgme_data_t sgpgme_data_from_mimeinfo(MimeInfo *mimeinfo)
372 {
373         gpgme_data_t data = NULL;
374         gpgme_error_t err;
375         FILE *fp = g_fopen(mimeinfo->data.filename, "rb");
376         gchar *tmp_file = NULL;
377
378         if (!fp) 
379                 return NULL;
380
381         tmp_file = get_tmp_file();
382         copy_file_part(fp, mimeinfo->offset, mimeinfo->length, tmp_file);
383         fclose(fp);
384         fp = NULL;
385         debug_print("tmp file %s\n", tmp_file);
386         
387         err = gpgme_data_new_from_file(&data, tmp_file, 1);
388         claws_unlink(tmp_file);
389         g_free(tmp_file);
390
391         debug_print("data %p (%d %d)\n", (void *)&data, mimeinfo->offset, mimeinfo->length);
392         if (err) {
393                 debug_print ("gpgme_data_new_from_file failed: %s\n",
394                              gpgme_strerror (err));
395                 privacy_set_error(_("Couldn't get data from message, %s"), gpgme_strerror(err));
396                 return NULL;
397         }
398         return data;
399 }
400
401 gpgme_data_t sgpgme_decrypt_verify(gpgme_data_t cipher, gpgme_verify_result_t *status, gpgme_ctx_t ctx)
402 {
403         struct passphrase_cb_info_s info;
404         gpgme_data_t plain;
405         gpgme_error_t err;
406
407         memset (&info, 0, sizeof info);
408         
409         if ((err = gpgme_data_new(&plain)) != GPG_ERR_NO_ERROR) {
410                 gpgme_release(ctx);
411                 privacy_set_error(_("Couldn't initialize data, %s"), gpgme_strerror(err));
412                 return NULL;
413         }
414         
415         if (gpgme_get_protocol(ctx) == GPGME_PROTOCOL_OpenPGP) {
416                 prefs_gpg_enable_agent(prefs_gpg_get_config()->use_gpg_agent);
417                 if (!getenv("GPG_AGENT_INFO") || !prefs_gpg_get_config()->use_gpg_agent) {
418                         info.c = ctx;
419                         gpgme_set_passphrase_cb (ctx, gpgmegtk_passphrase_cb, &info);
420                 }
421         } else {
422                 prefs_gpg_enable_agent(TRUE);
423                 info.c = ctx;
424                 gpgme_set_passphrase_cb (ctx, NULL, &info);
425         }
426         
427         
428         if (gpgme_get_protocol(ctx) == GPGME_PROTOCOL_OpenPGP) {
429                 err = gpgme_op_decrypt_verify(ctx, cipher, plain);
430                 if (err != GPG_ERR_NO_ERROR) {
431                         debug_print("can't decrypt (%s)\n", gpgme_strerror(err));
432                         privacy_set_error("%s", gpgme_strerror(err));
433                         gpgmegtk_free_passphrase();
434                         gpgme_data_release(plain);
435                         return NULL;
436                 }
437
438                 err = cm_gpgme_data_rewind(plain);
439                 if (err) {
440                         debug_print("can't seek (%d %d %s)\n", err, errno, strerror(errno));
441                 }
442
443                 debug_print("decrypted.\n");
444                 *status = gpgme_op_verify_result (ctx);
445         } else {
446                 err = gpgme_op_decrypt(ctx, cipher, plain);
447                 if (err != GPG_ERR_NO_ERROR) {
448                         debug_print("can't decrypt (%s)\n", gpgme_strerror(err));
449                         privacy_set_error("%s", gpgme_strerror(err));
450                         gpgmegtk_free_passphrase();
451                         gpgme_data_release(plain);
452                         return NULL;
453                 }
454
455                 err = cm_gpgme_data_rewind(plain);
456                 if (err) {
457                         debug_print("can't seek (%d %d %s)\n", err, errno, strerror(errno));
458                 }
459
460                 debug_print("decrypted.\n");
461                 *status = gpgme_op_verify_result (ctx);
462         }
463         return plain;
464 }
465
466 gchar *sgpgme_get_encrypt_data(GSList *recp_names, gpgme_protocol_t proto)
467 {
468         SelectionResult result = KEY_SELECTION_CANCEL;
469         gpgme_key_t *keys = gpgmegtk_recipient_selection(recp_names, &result,
470                                 proto);
471         gchar *ret = NULL;
472         int i = 0;
473
474         if (!keys) {
475                 if (result == KEY_SELECTION_DONT)
476                         return g_strdup("_DONT_ENCRYPT_");
477                 else
478                         return NULL;
479         }
480         while (keys[i]) {
481                 gpgme_subkey_t skey = keys[i]->subkeys;
482                 gchar *fpr = skey->fpr;
483                 gchar *tmp = NULL;
484                 debug_print("adding %s\n", fpr);
485                 tmp = g_strconcat(ret?ret:"", fpr, " ", NULL);
486                 g_free(ret);
487                 ret = tmp;
488                 i++;
489         }
490         return ret;
491 }
492
493 gboolean sgpgme_setup_signers(gpgme_ctx_t ctx, PrefsAccount *account,
494                               const gchar *from_addr)
495 {
496         GPGAccountConfig *config;
497         const gchar *signer_addr = account->address;
498
499         gpgme_signers_clear(ctx);
500
501         if (from_addr)
502                 signer_addr = from_addr;
503         config = prefs_gpg_account_get_config(account);
504
505         switch(config->sign_key) {
506         case SIGN_KEY_DEFAULT:
507                 debug_print("using default gnupg key\n");
508                 break;
509         case SIGN_KEY_BY_FROM:
510                 debug_print("using key for %s\n", signer_addr);
511                 break;
512         case SIGN_KEY_CUSTOM:
513                 debug_print("using key for %s\n", config->sign_key_id);
514                 break;
515         }
516
517         if (config->sign_key != SIGN_KEY_DEFAULT) {
518                 const gchar *keyid;
519                 gpgme_key_t key, key2;
520                 gpgme_error_t err;
521
522                 if (config->sign_key == SIGN_KEY_BY_FROM)
523                         keyid = signer_addr;
524                 else if (config->sign_key == SIGN_KEY_CUSTOM)
525                         keyid = config->sign_key_id;
526                 else
527                         goto bail;
528
529                 err = gpgme_op_keylist_start(ctx, keyid, 1);
530                 if (!err) {
531                         do {
532                                 err = gpgme_op_keylist_next(ctx, &key);
533                                 if (!err && key && key->protocol == gpgme_get_protocol(ctx) &&
534                                     !key->expired && !key->revoked && !key->disabled)
535                                         break;
536                                 if (!err && key && key->protocol != gpgme_get_protocol(ctx)) {
537                                         debug_print("skipping a key (wrong protocol %d)\n", key->protocol);
538                                         gpgme_key_release(key);
539                                 }
540                                 if (!err && key && (key->expired || key->revoked || key->disabled)) {
541                                         
542                                         debug_print("skipping a key");
543                                         if (key->expired) 
544                                                 debug_print(" expired");
545                                         if (key->revoked) 
546                                                 debug_print(" revoked");
547                                         if (key->disabled) 
548                                                 debug_print(" disabled");
549                                         debug_print("\n");
550                                         gpgme_key_release(key);
551                                 }
552                         } while (!err);
553                 }
554                 if (err) {
555                         g_warning("setup_signers start: %s", gpgme_strerror(err));
556                         privacy_set_error(_("Secret key not found (%s)"), gpgme_strerror(err));
557                         goto bail;
558                 }
559                 
560                 do {
561                         err = gpgme_op_keylist_next(ctx, &key2);
562                         if (!err && key2 && key2->protocol == gpgme_get_protocol(ctx) &&
563                             !key2->expired && !key2->revoked && !key2->disabled)
564                                 break;
565                         if (!err && key2 && key2->protocol != gpgme_get_protocol(ctx)) {
566                                 debug_print("skipping a key (wrong protocol %d)\n", key2->protocol);
567                                 gpgme_key_release(key2);
568                         }
569                         if (!err && key2 && (key2->expired || key2->revoked || key2->disabled)) {
570                                         debug_print("skipping a key");
571                                         if (key2->expired) 
572                                                 debug_print(" expired");
573                                         if (key2->revoked) 
574                                                 debug_print(" revoked");
575                                         if (key2->disabled) 
576                                                 debug_print(" disabled");
577                                         debug_print("\n");
578                                 gpgme_key_release(key2);
579                         }
580                 } while (!err);
581                 if (!err) {
582                         gpgme_key_release(key2);
583                         g_warning("ambiguous specification of secret key '%s'\n",
584                                 keyid);
585                         privacy_set_error(_("Secret key specification is ambiguous"));
586                         goto bail;
587                 }
588                 
589                 gpgme_op_keylist_end(ctx);
590                 err = gpgme_signers_add(ctx, key);
591                 debug_print("got key (proto %d (pgp %d, smime %d).\n", key->protocol,
592                                 GPGME_PROTOCOL_OpenPGP, GPGME_PROTOCOL_CMS);
593                 gpgme_key_release(key);
594                 
595                 if (err) {
596                         g_warning("error adding secret key: %s\n", gpgme_strerror(err));
597                         privacy_set_error(_("Error setting secret key: %s"), gpgme_strerror(err));
598                         goto bail;
599                 }
600         }
601
602         prefs_gpg_account_free_config(config);
603
604         return TRUE;
605 bail:
606         prefs_gpg_account_free_config(config);
607         return FALSE;
608 }
609
610 void sgpgme_init()
611 {
612         gchar *ctype_locale = NULL, *messages_locale = NULL;
613         gchar *ctype_utf8_locale = NULL, *messages_utf8_locale = NULL;
614
615         gpgme_engine_info_t engineInfo;
616         if (gpgme_check_version("1.0.0")) {
617 #ifdef LC_CTYPE
618                 ctype_locale = g_strdup(setlocale(LC_CTYPE, NULL));
619                 if (strchr(ctype_locale, '.'))
620                         *(strchr(ctype_locale, '.')) = '\0';
621                 else if (strchr(ctype_locale, '@'))
622                         *(strchr(ctype_locale, '@')) = '\0';
623                 ctype_utf8_locale = g_strconcat(ctype_locale, ".UTF-8", NULL);
624
625                 gpgme_set_locale(NULL, LC_CTYPE, ctype_utf8_locale);
626
627                 g_free(ctype_utf8_locale);
628                 g_free(ctype_locale);
629 #endif
630 #ifdef LC_MESSAGES
631                 messages_locale = g_strdup(setlocale(LC_MESSAGES, NULL));
632                 if (strchr(messages_locale, '.'))
633                         *(strchr(messages_locale, '.')) = '\0';
634                 else if (strchr(messages_locale, '@'))
635                         *(strchr(messages_locale, '@')) = '\0';
636                 messages_utf8_locale = g_strconcat(messages_locale, ".UTF-8", NULL);
637
638                 gpgme_set_locale(NULL, LC_MESSAGES, messages_utf8_locale);
639
640                 g_free(messages_utf8_locale);
641                 g_free(messages_locale);
642 #endif
643                 if (!gpgme_get_engine_info(&engineInfo)) {
644                         while (engineInfo) {
645 #ifndef G_OS_WIN32
646                                 debug_print("GpgME Protocol: %s\n"
647                                             "Version: %s (req %s)\n"
648                                             "Executable: %s\n",
649                                         gpgme_get_protocol_name(engineInfo->protocol) ? gpgme_get_protocol_name(engineInfo->protocol):"???",
650                                         engineInfo->version ? engineInfo->version:"???",
651                                         engineInfo->req_version ? engineInfo->req_version:"???",
652                                         engineInfo->file_name ? engineInfo->file_name:"???");
653 #endif
654                                 if (engineInfo->protocol == GPGME_PROTOCOL_OpenPGP
655                                 &&  gpgme_engine_check_version(engineInfo->protocol) != 
656                                         GPG_ERR_NO_ERROR) {
657                                         if (engineInfo->file_name && !engineInfo->version) {
658                                                 alertpanel_error(_("Gpgme protocol '%s' is unusable: "
659                                                                    "Engine '%s' isn't installed properly."),
660                                                                    gpgme_get_protocol_name(engineInfo->protocol),
661                                                                    engineInfo->file_name);
662                                         } else if (engineInfo->file_name && engineInfo->version
663                                           && engineInfo->req_version) {
664                                                 alertpanel_error(_("Gpgme protocol '%s' is unusable: "
665                                                                    "Engine '%s' version %s is installed, "
666                                                                    "but version %s is required.\n"),
667                                                                    gpgme_get_protocol_name(engineInfo->protocol),
668                                                                    engineInfo->file_name,
669                                                                    engineInfo->version,
670                                                                    engineInfo->req_version);
671                                         } else {
672                                                 alertpanel_error(_("Gpgme protocol '%s' is unusable "
673                                                                    "(unknown problem)"),
674                                                                    gpgme_get_protocol_name(engineInfo->protocol));
675                                         }
676                                 }
677                                 engineInfo = engineInfo->next;
678                         }
679                 }
680         } else {
681                 sgpgme_disable_all();
682
683                 if (prefs_gpg_get_config()->gpg_warning) {
684                         AlertValue val;
685
686                         val = alertpanel_full
687                                 (_("Warning"),
688                                  _("GnuPG is not installed properly, or needs "
689                                  "to be upgraded.\n"
690                                  "OpenPGP support disabled."),
691                                  GTK_STOCK_CLOSE, NULL, NULL, TRUE, NULL,
692                                  ALERT_WARNING, G_ALERTDEFAULT);
693                         if (val & G_ALERTDISABLE)
694                                 prefs_gpg_get_config()->gpg_warning = FALSE;
695                 }
696         }
697 }
698
699 void sgpgme_done()
700 {
701         gpgmegtk_free_passphrase();
702 }
703
704 void sgpgme_create_secret_key(PrefsAccount *account, gboolean ask_create)
705 {
706         AlertValue val = G_ALERTDEFAULT;
707         gchar *key_parms = NULL;
708         gchar *name = NULL;
709         gchar *email = NULL;
710         gchar *passphrase = NULL, *passphrase_second = NULL;
711         gint prev_bad = 0;
712         gchar *tmp = NULL;
713         gpgme_error_t err = 0;
714         gpgme_ctx_t ctx;
715         GtkWidget *window = NULL;
716         gpgme_genkey_result_t key;
717
718         if (account == NULL)
719                 account = account_get_default();
720
721         if (account->address == NULL) {
722                 alertpanel_error(_("You have to save the account's information with \"OK\" "
723                                    "before being able to generate a key pair.\n"));
724                 return;
725         }
726         if (ask_create) {
727                 val = alertpanel(_("No PGP key found"),
728                                 _("Claws Mail did not find a secret PGP key, "
729                                   "which means that you won't be able to sign "
730                                   "emails or receive encrypted emails.\n"
731                                   "Do you want to create a new key pair now?"),
732                                   GTK_STOCK_NO, "+" GTK_STOCK_YES, NULL);
733                 if (val == G_ALERTDEFAULT) {
734                         prefs_gpg_get_config()->gpg_ask_create_key = FALSE;
735                         prefs_gpg_save_config();
736                         return;
737                 }
738         }
739
740         if (account->name) {
741                 name = g_strdup(account->name);
742         } else {
743                 name = g_strdup(account->address);
744         }
745         email = g_strdup(account->address);
746         tmp = g_strdup_printf("%s <%s>", account->name?account->name:account->address, account->address);
747 again:
748         passphrase = passphrase_mbox(tmp, NULL, prev_bad, 1);
749         if (passphrase == NULL) {
750                 g_free(tmp);
751                 g_free(email);
752                 g_free(name);           
753                 return;
754         }
755         passphrase_second = passphrase_mbox(tmp, NULL, 0, 2);
756         if (passphrase_second == NULL) {
757                 g_free(tmp);
758                 g_free(email);
759                 g_free(passphrase);             
760                 g_free(name);           
761                 return;
762         }
763         if (strcmp(passphrase, passphrase_second)) {
764                 g_free(passphrase);
765                 g_free(passphrase_second);
766                 prev_bad = 1;
767                 goto again;
768         }
769         
770         key_parms = g_strdup_printf("<GnupgKeyParms format=\"internal\">\n"
771                                         "Key-Type: DSA\n"
772                                         "Key-Length: 1024\n"
773                                         "Subkey-Type: ELG-E\n"
774                                         "Subkey-Length: 2048\n"
775                                         "Name-Real: %s\n"
776                                         "Name-Email: %s\n"
777                                         "Expire-Date: 0\n"
778                                         "%s%s%s"
779                                         "</GnupgKeyParms>\n",
780                                         name, email, 
781                                         strlen(passphrase)?"Passphrase: ":"",
782                                         passphrase,
783                                         strlen(passphrase)?"\n":"");
784 #ifndef G_PLATFORM_WIN32
785         if (mlock(passphrase, strlen(passphrase)) == -1)
786                 debug_print("couldn't lock passphrase\n");
787         if (mlock(passphrase_second, strlen(passphrase_second)) == -1)
788                 debug_print("couldn't lock passphrase2\n");
789 #endif
790         g_free(tmp);
791         g_free(email);
792         g_free(name);
793         g_free(passphrase_second);
794         g_free(passphrase);
795         
796         err = gpgme_new (&ctx);
797         if (err) {
798                 alertpanel_error(_("Couldn't generate a new key pair: %s"),
799                                  gpgme_strerror(err));
800                 g_free(key_parms);
801                 return;
802         }
803         
804
805         window = label_window_create(_("Generating your new key pair... Please move the mouse "
806                               "around to help generate entropy..."));
807
808         err = gpgme_op_genkey(ctx, key_parms, NULL, NULL);
809         g_free(key_parms);
810
811         label_window_destroy(window);
812
813         if (err) {
814                 alertpanel_error(_("Couldn't generate a new key pair: %s"), gpgme_strerror(err));
815                 gpgme_release(ctx);
816                 return;
817         }
818         key = gpgme_op_genkey_result(ctx);
819         if (key == NULL) {
820                 alertpanel_error(_("Couldn't generate a new key pair: unknown error"));
821                 gpgme_release(ctx);
822                 return;
823         } else {
824                 gchar *buf = g_strdup_printf(_("Your new key pair has been generated. "
825                                     "Its fingerprint is:\n%s\n\nDo you want to export it "
826                                     "to a keyserver?"),
827                                     key->fpr ? key->fpr:"null");
828                 AlertValue val = alertpanel(_("Key generated"), buf,
829                                   GTK_STOCK_NO, "+" GTK_STOCK_YES, NULL);
830                 g_free(buf);
831                 if (val == G_ALERTALTERNATE) {
832 #ifndef G_OS_WIN32
833                         gchar *cmd = g_strdup_printf("gpg --no-tty --send-keys %s", key->fpr);
834                         int res = 0;
835                         pid_t pid = 0;
836                         pid = fork();
837                         if (pid == -1) {
838                                 res = -1;
839                         } else if (pid == 0) {
840                                 /* son */
841                                 res = system(cmd);
842                                 res = WEXITSTATUS(res);
843                                 _exit(res);
844                         } else {
845                                 int status = 0;
846                                 time_t start_wait = time(NULL);
847                                 res = -1;
848                                 do {
849                                         if (waitpid(pid, &status, WNOHANG) == 0 || !WIFEXITED(status)) {
850                                                 usleep(200000);
851                                         } else {
852                                                 res = WEXITSTATUS(status);
853                                                 break;
854                                         }
855                                         if (time(NULL) - start_wait > 5) {
856                                                 debug_print("SIGTERM'ing gpg\n");
857                                                 kill(pid, SIGTERM);
858                                         }
859                                         if (time(NULL) - start_wait > 6) {
860                                                 debug_print("SIGKILL'ing gpg\n");
861                                                 kill(pid, SIGKILL);
862                                                 break;
863                                         }
864                                 } while(1);
865                         }
866                         if (res == 0) {
867                                 alertpanel_notice(_("Key exported."));
868                         } else {
869                                 alertpanel_error(_("Couldn't export key."));
870                         }
871                         g_free(cmd);
872 #else
873                         alertpanel_error(_("Key export isn't implemented in Windows."));
874 #endif
875                 }
876         }
877         prefs_gpg_get_config()->gpg_ask_create_key = FALSE;
878         prefs_gpg_save_config();
879         gpgme_release(ctx);
880 }
881
882 gboolean sgpgme_has_secret_key(void)
883 {
884         gpgme_error_t err = 0;
885         gpgme_ctx_t ctx;
886         gpgme_key_t key;
887
888         err = gpgme_new (&ctx);
889         if (err) {
890                 debug_print("err : %s\n", gpgme_strerror(err));
891                 return TRUE;
892         }
893 check_again:
894         err = gpgme_op_keylist_start(ctx, NULL, TRUE);
895         if (!err)
896                 err = gpgme_op_keylist_next(ctx, &key);
897         gpgme_op_keylist_end(ctx);
898         if (gpg_err_code(err) == GPG_ERR_EOF) {
899                 if (gpgme_get_protocol(ctx) != GPGME_PROTOCOL_CMS) {
900                         gpgme_set_protocol(ctx, GPGME_PROTOCOL_CMS);
901                         goto check_again;
902                 }
903                 gpgme_release(ctx);
904                 return FALSE;
905         } else {
906                 gpgme_release(ctx);
907                 return TRUE;
908         }
909 }
910
911 void sgpgme_check_create_key(void)
912 {
913         if (prefs_gpg_get_config()->gpg_ask_create_key &&
914             !sgpgme_has_secret_key()) {
915                 sgpgme_create_secret_key(NULL, TRUE);
916         } else {
917                 prefs_gpg_get_config()->gpg_ask_create_key = FALSE;
918                 prefs_gpg_save_config();
919         }       
920 }
921
922 void *sgpgme_data_release_and_get_mem(gpgme_data_t data, size_t *len)
923 {
924         char buf[BUFSIZ];
925         void *result = NULL;
926         ssize_t r = 0;
927         size_t w = 0;
928         
929         if (data == NULL)
930                 return NULL;
931         if (len == NULL)
932                 return NULL;
933
934         /* I know it's deprecated, but we don't compile with _LARGEFILE */
935         cm_gpgme_data_rewind(data);
936         while ((r = gpgme_data_read(data, buf, BUFSIZ)) > 0) {
937                 result = realloc(result, r + w);
938                 memcpy(result+w, buf, r);
939                 w += r;
940         }
941         
942         *len = w;
943
944         gpgme_data_release(data);
945         if (r < 0) {
946                 free(result);
947                 *len = 0;
948                 return NULL;
949         }
950         return result;
951 }
952
953 gpgme_error_t cm_gpgme_data_rewind(gpgme_data_t dh)
954 {
955 #if defined(_FILE_OFFSET_BITS) && _FILE_OFFSET_BITS == 64
956         if (gpgme_data_seek(dh, (off_t)0, SEEK_SET) == -1)
957                 return gpg_error_from_errno(errno);
958         else
959                 return 0;
960 #else
961         return gpgme_data_rewind(dh);
962 #endif
963 }
964
965 #endif /* USE_GPGME */