2 * Sylpheed -- a GTK+ based, lightweight, and fast e-mail client
3 * Copyright (C) 1999-2003 Hiroyuki Yamamoto & the Sylpheed-Claws team
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, write to the Free Software
17 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
32 #include "prefs_common.h"
34 #include "alertpanel.h"
35 #include "passphrase.h"
38 static void idle_function_for_gpgme(void)
40 while (gtk_events_pending())
44 static void sgpgme_disable_all(void)
46 /* FIXME: set a flag, so that we don't bother the user with failed
50 GpgmeSigStat sgpgme_verify_signature(GpgmeCtx ctx, GpgmeData sig,
55 if (gpgme_op_verify(ctx, sig, plain, &status) != GPGME_No_Error)
56 return GPGME_SIG_STAT_ERROR;
61 SignatureStatus sgpgme_sigstat_gpgme_to_privacy(GpgmeCtx ctx, GpgmeSigStat status)
63 unsigned long validity = 0;
65 validity = gpgme_get_sig_ulong_attr(ctx, 0,
66 GPGME_ATTR_VALIDITY, 0);
69 case GPGME_SIG_STAT_GOOD:
70 if ((validity != GPGME_VALIDITY_MARGINAL) &&
71 (validity != GPGME_VALIDITY_FULL) &&
72 (validity != GPGME_VALIDITY_ULTIMATE))
73 return SIGNATURE_WARN;
75 case GPGME_SIG_STAT_GOOD_EXP:
76 case GPGME_SIG_STAT_GOOD_EXPKEY:
77 case GPGME_SIG_STAT_DIFF:
78 return SIGNATURE_WARN;
79 case GPGME_SIG_STAT_BAD:
80 return SIGNATURE_INVALID;
81 case GPGME_SIG_STAT_NOKEY:
82 case GPGME_SIG_STAT_NOSIG:
83 case GPGME_SIG_STAT_ERROR:
84 return SIGNATURE_CHECK_FAILED;
85 case GPGME_SIG_STAT_NONE:
86 return SIGNATURE_UNCHECKED;
88 return SIGNATURE_CHECK_FAILED;
91 static const gchar *get_validity_str(unsigned long validity)
94 case GPGME_VALIDITY_UNKNOWN:
96 case GPGME_VALIDITY_UNDEFINED:
97 return _("Undefined");
98 case GPGME_VALIDITY_NEVER:
100 case GPGME_VALIDITY_MARGINAL:
101 return _("Marginal");
102 case GPGME_VALIDITY_FULL:
104 case GPGME_VALIDITY_ULTIMATE:
105 return _("Ultimate");
111 gchar *sgpgme_sigstat_info_short(GpgmeCtx ctx, GpgmeSigStat status)
114 case GPGME_SIG_STAT_GOOD:
117 unsigned long validity = 0;
119 if (gpgme_get_sig_key(ctx, 0, &key) != GPGME_No_Error)
120 return g_strdup(_("Error"));
122 validity = gpgme_get_sig_ulong_attr(ctx, 0,
123 GPGME_ATTR_VALIDITY, 0);
125 return g_strdup_printf(_("Valid signature by %s (Trust: %s)"),
126 gpgme_key_get_string_attr(key, GPGME_ATTR_NAME, NULL, 0),
127 get_validity_str(validity));
129 case GPGME_SIG_STAT_GOOD_EXP:
130 return g_strdup(_("The signature has expired"));
131 case GPGME_SIG_STAT_GOOD_EXPKEY:
132 return g_strdup(_("The key that was used to sign this part has expired"));
133 case GPGME_SIG_STAT_DIFF:
134 return g_strdup(_("Not all signatures are valid"));
135 case GPGME_SIG_STAT_BAD:
136 return g_strdup(_("This signature is invalid"));
137 case GPGME_SIG_STAT_NOKEY:
138 return g_strdup(_("You have no key to verify this signature"));
139 case GPGME_SIG_STAT_NOSIG:
140 return g_strdup(_("No signature found"));
141 case GPGME_SIG_STAT_ERROR:
142 return g_strdup(_("An error occured"));
143 case GPGME_SIG_STAT_NONE:
144 return g_strdup(_("The signature has not been checked"));
146 return g_strdup(_("Error"));
149 gchar *sgpgme_sigstat_info_full(GpgmeCtx ctx, GpgmeSigStat status)
156 siginfo = g_string_sized_new(64);
157 while (gpgme_get_sig_key(ctx, i, &key) != GPGME_EOF) {
158 time_t sigtime, expiretime;
159 GpgmeSigStat sigstatus;
161 const gchar *keytype, *keyid, *uid;
163 sigtime = gpgme_get_sig_ulong_attr(ctx, i, GPGME_ATTR_CREATED, 0);
164 strftime(timestr, 64, "%c", gmtime(&sigtime));
165 keytype = gpgme_key_get_string_attr(key, GPGME_ATTR_ALGO, NULL, 0);
166 keyid = gpgme_key_get_string_attr(key, GPGME_ATTR_KEYID, NULL, 0);
167 g_string_sprintfa(siginfo,
168 _("Signature made %s using %s key ID %s\n"),
169 timestr, keytype, keyid);
171 sigstatus = gpgme_get_sig_ulong_attr(ctx, i, GPGME_ATTR_SIG_STATUS, 0);
172 uid = gpgme_key_get_string_attr(key, GPGME_ATTR_USERID, NULL, 0);
174 case GPGME_SIG_STAT_GOOD:
175 case GPGME_SIG_STAT_GOOD_EXPKEY:
176 g_string_sprintfa(siginfo,
177 _("Good signature from \"%s\"\n"),
180 case GPGME_SIG_STAT_GOOD_EXP:
181 g_string_sprintfa(siginfo,
182 _("Expired signature from \"%s\"\n"),
185 case GPGME_SIG_STAT_BAD:
186 g_string_sprintfa(siginfo,
187 _("BAD signature from \"%s\"\n"),
193 if (sigstatus != GPGME_SIG_STAT_BAD) {
196 while ((uid = gpgme_key_get_string_attr(key, GPGME_ATTR_USERID, NULL, j)) != 0) {
197 g_string_sprintfa(siginfo,
202 g_string_sprintfa(siginfo,
203 _("Primary key fingerprint: %s\n"),
204 gpgme_key_get_string_attr(key, GPGME_ATTR_FPR, NULL, 0));
208 expiretime = gpgme_get_sig_ulong_attr(ctx, i, GPGME_ATTR_EXPIRE, 0);
209 if (expiretime > 0) {
212 strftime(timestr, 64, "%c", gmtime(&expiretime));
213 if (time(NULL) < expiretime)
214 format = _("Signature expires %s\n");
216 format = _("Signature expired %s\n");
217 g_string_sprintfa(siginfo, format, timestr);
220 g_string_append(siginfo, "\n");
225 g_string_free(siginfo, FALSE);
229 GpgmeData sgpgme_data_from_mimeinfo(MimeInfo *mimeinfo)
233 gpgme_data_new_from_filepart(&data,
242 GpgmeData sgpgme_decrypt(GpgmeData cipher)
245 struct passphrase_cb_info_s info;
249 memset (&info, 0, sizeof info);
251 if (gpgme_new(&ctx) != GPGME_No_Error)
254 if (gpgme_data_new(&plain) != GPGME_No_Error) {
259 if (!getenv("GPG_AGENT_INFO")) {
261 gpgme_set_passphrase_cb (ctx, gpgmegtk_passphrase_cb, &info);
264 err = gpgme_op_decrypt(ctx, cipher, plain);
267 if (err != GPGME_No_Error) {
268 gpgmegtk_free_passphrase();
269 gpgme_data_release(plain);
278 if (gpgme_engine_check_version(GPGME_PROTOCOL_OpenPGP) !=
279 GPGME_No_Error) { /* Also does some gpgme init */
280 sgpgme_disable_all();
281 debug_print("gpgme_engine_version:\n%s\n",
282 gpgme_get_engine_info());
284 if (prefs_common.gpg_warning) {
287 val = alertpanel_message_with_disable
289 _("GnuPG is not installed properly, or needs to be upgraded.\n"
290 "OpenPGP support disabled."));
291 if (val & G_ALERTDISABLE)
292 prefs_common.gpg_warning = FALSE;
296 gpgme_register_idle(idle_function_for_gpgme);
301 gpgmegtk_free_passphrase();
304 #endif /* USE_GPGME */