2 * Sylpheed -- a GTK+ based, lightweight, and fast e-mail client
3 * Copyright (C) 1999-2003 Hiroyuki Yamamoto & the Sylpheed-Claws team
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, write to the Free Software
17 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
30 #include <glib/gi18n.h>
34 #include "prefs_common.h"
36 #include "alertpanel.h"
37 #include "passphrase.h"
38 #include "prefs_gpg.h"
39 #include "select-keys.h"
41 static void idle_function_for_gpgme(void)
43 while (gtk_events_pending())
47 static void sgpgme_disable_all(void)
49 /* FIXME: set a flag, so that we don't bother the user with failed
53 GpgmeSigStat sgpgme_verify_signature(GpgmeCtx ctx, GpgmeData sig,
58 if (gpgme_op_verify(ctx, sig, plain, &status) != GPGME_No_Error)
59 return GPGME_SIG_STAT_ERROR;
64 SignatureStatus sgpgme_sigstat_gpgme_to_privacy(GpgmeCtx ctx, GpgmeSigStat status)
66 unsigned long validity = 0;
68 validity = gpgme_get_sig_ulong_attr(ctx, 0,
69 GPGME_ATTR_VALIDITY, 0);
72 case GPGME_SIG_STAT_GOOD:
73 if ((validity != GPGME_VALIDITY_MARGINAL) &&
74 (validity != GPGME_VALIDITY_FULL) &&
75 (validity != GPGME_VALIDITY_ULTIMATE))
76 return SIGNATURE_WARN;
78 case GPGME_SIG_STAT_GOOD_EXP:
79 case GPGME_SIG_STAT_GOOD_EXPKEY:
80 case GPGME_SIG_STAT_DIFF:
81 return SIGNATURE_WARN;
82 case GPGME_SIG_STAT_BAD:
83 return SIGNATURE_INVALID;
84 case GPGME_SIG_STAT_NOKEY:
85 case GPGME_SIG_STAT_NOSIG:
86 case GPGME_SIG_STAT_ERROR:
87 return SIGNATURE_CHECK_FAILED;
88 case GPGME_SIG_STAT_NONE:
89 return SIGNATURE_UNCHECKED;
91 return SIGNATURE_CHECK_FAILED;
94 static const gchar *get_validity_str(unsigned long validity)
97 case GPGME_VALIDITY_UNKNOWN:
99 case GPGME_VALIDITY_UNDEFINED:
100 return _("Undefined");
101 case GPGME_VALIDITY_NEVER:
103 case GPGME_VALIDITY_MARGINAL:
104 return _("Marginal");
105 case GPGME_VALIDITY_FULL:
107 case GPGME_VALIDITY_ULTIMATE:
108 return _("Ultimate");
114 gchar *sgpgme_sigstat_info_short(GpgmeCtx ctx, GpgmeSigStat status)
117 case GPGME_SIG_STAT_GOOD:
120 unsigned long validity = 0;
122 if (gpgme_get_sig_key(ctx, 0, &key) != GPGME_No_Error)
123 return g_strdup(_("Error"));
125 validity = gpgme_get_sig_ulong_attr(ctx, 0,
126 GPGME_ATTR_VALIDITY, 0);
128 return g_strdup_printf(_("Valid signature by %s (Trust: %s)"),
129 gpgme_key_get_string_attr(key, GPGME_ATTR_NAME, NULL, 0),
130 get_validity_str(validity));
132 case GPGME_SIG_STAT_GOOD_EXP:
133 return g_strdup(_("The signature has expired"));
134 case GPGME_SIG_STAT_GOOD_EXPKEY:
135 return g_strdup(_("The key that was used to sign this part has expired"));
136 case GPGME_SIG_STAT_DIFF:
137 return g_strdup(_("Not all signatures are valid"));
138 case GPGME_SIG_STAT_BAD:
139 return g_strdup(_("This signature is invalid"));
140 case GPGME_SIG_STAT_NOKEY:
141 return g_strdup(_("You have no key to verify this signature"));
142 case GPGME_SIG_STAT_NOSIG:
143 return g_strdup(_("No signature found"));
144 case GPGME_SIG_STAT_ERROR:
145 return g_strdup(_("An error occured"));
146 case GPGME_SIG_STAT_NONE:
147 return g_strdup(_("The signature has not been checked"));
149 return g_strdup(_("Error"));
152 gchar *sgpgme_sigstat_info_full(GpgmeCtx ctx, GpgmeSigStat status)
159 siginfo = g_string_sized_new(64);
160 while (gpgme_get_sig_key(ctx, i, &key) != GPGME_EOF) {
161 time_t sigtime, expiretime;
162 GpgmeSigStat sigstatus;
164 const gchar *keytype, *keyid, *uid;
166 sigtime = gpgme_get_sig_ulong_attr(ctx, i, GPGME_ATTR_CREATED, 0);
167 strftime(timestr, 64, "%c", gmtime(&sigtime));
168 keytype = gpgme_key_get_string_attr(key, GPGME_ATTR_ALGO, NULL, 0);
169 keyid = gpgme_key_get_string_attr(key, GPGME_ATTR_KEYID, NULL, 0);
170 g_string_append_printf(siginfo,
171 _("Signature made %s using %s key ID %s\n"),
172 timestr, keytype, keyid);
174 sigstatus = gpgme_get_sig_ulong_attr(ctx, i, GPGME_ATTR_SIG_STATUS, 0);
175 uid = gpgme_key_get_string_attr(key, GPGME_ATTR_USERID, NULL, 0);
177 case GPGME_SIG_STAT_GOOD:
178 case GPGME_SIG_STAT_GOOD_EXPKEY:
179 g_string_append_printf(siginfo,
180 _("Good signature from \"%s\"\n"),
183 case GPGME_SIG_STAT_GOOD_EXP:
184 g_string_append_printf(siginfo,
185 _("Expired signature from \"%s\"\n"),
188 case GPGME_SIG_STAT_BAD:
189 g_string_append_printf(siginfo,
190 _("BAD signature from \"%s\"\n"),
196 if (sigstatus != GPGME_SIG_STAT_BAD) {
199 while ((uid = gpgme_key_get_string_attr(key, GPGME_ATTR_USERID, NULL, j)) != 0) {
200 g_string_append_printf(siginfo,
205 g_string_append_printf(siginfo,
206 _("Primary key fingerprint: %s\n"),
207 gpgme_key_get_string_attr(key, GPGME_ATTR_FPR, NULL, 0));
211 expiretime = gpgme_get_sig_ulong_attr(ctx, i, GPGME_ATTR_EXPIRE, 0);
212 if (expiretime > 0) {
215 strftime(timestr, 64, "%c", gmtime(&expiretime));
216 if (time(NULL) < expiretime)
217 format = _("Signature expires %s\n");
219 format = _("Signature expired %s\n");
220 g_string_append_printf(siginfo, format, timestr);
223 g_string_append(siginfo, "\n");
228 g_string_free(siginfo, FALSE);
232 GpgmeData sgpgme_data_from_mimeinfo(MimeInfo *mimeinfo)
236 gpgme_data_new_from_filepart(&data,
237 mimeinfo->data.filename,
245 GpgmeData sgpgme_decrypt_verify(GpgmeData cipher, GpgmeSigStat *status, GpgmeCtx ctx)
247 struct passphrase_cb_info_s info;
251 memset (&info, 0, sizeof info);
253 if (gpgme_data_new(&plain) != GPGME_No_Error) {
258 if (!getenv("GPG_AGENT_INFO")) {
260 gpgme_set_passphrase_cb (ctx, gpgmegtk_passphrase_cb, &info);
263 err = gpgme_op_decrypt_verify(ctx, cipher, plain, status);
265 if (err != GPGME_No_Error) {
266 gpgmegtk_free_passphrase();
267 gpgme_data_release(plain);
274 gchar *sgpgme_get_encrypt_data(GSList *recp_names)
277 GpgmeRecipients recp;
280 const gchar *recipient;
283 recp = gpgmegtk_recipient_selection(recp_names);
287 if (gpgme_recipients_enum_open(recp, &iter) != GPGME_No_Error) {
288 gpgme_recipients_release(recp);
292 encdata = g_string_sized_new(64);
293 while ((recipient = gpgme_recipients_enum_read(recp, &iter)) != NULL) {
294 if (encdata->len > 0)
295 g_string_append_c(encdata, ' ');
296 g_string_append(encdata, recipient);
299 gpgme_recipients_release(recp);
302 g_string_free(encdata, FALSE);
307 gboolean sgpgme_setup_signers(GpgmeCtx ctx, PrefsAccount *account)
309 GPGAccountConfig *config;
311 gpgme_signers_clear(ctx);
313 config = prefs_gpg_account_get_config(account);
315 if (config->sign_key != SIGN_KEY_DEFAULT) {
319 if (config->sign_key == SIGN_KEY_BY_FROM)
320 keyid = account->address;
321 else if (config->sign_key == SIGN_KEY_CUSTOM)
322 keyid = config->sign_key_id;
326 gpgme_op_keylist_start(ctx, keyid, 1);
327 while (!gpgme_op_keylist_next(ctx, &key)) {
328 debug_print("adding key: %s\n",
329 gpgme_key_get_string_attr(key, GPGME_ATTR_KEYID, NULL, 0));
330 gpgme_signers_add(ctx, key);
331 gpgme_key_release(key);
333 gpgme_op_keylist_end(ctx);
336 prefs_gpg_account_free_config(config);
343 if (gpgme_engine_check_version(GPGME_PROTOCOL_OpenPGP) !=
344 GPGME_No_Error) { /* Also does some gpgme init */
345 sgpgme_disable_all();
346 debug_print("gpgme_engine_version:\n%s\n",
347 gpgme_get_engine_info());
349 if (prefs_gpg_get_config()->gpg_warning) {
352 val = alertpanel_message_with_disable
354 _("GnuPG is not installed properly, or needs "
356 "OpenPGP support disabled."),
357 NULL, NULL, NULL, ALERT_WARNING);
358 if (val & G_ALERTDISABLE)
359 prefs_gpg_get_config()->gpg_warning = FALSE;
363 gpgme_register_idle(idle_function_for_gpgme);
368 gpgmegtk_free_passphrase();
369 gpgme_register_idle(NULL);
372 #endif /* USE_GPGME */