2480{
2481 int needpass = -1;
2482 bool pgp_keyblock = false;
2483 bool clearsign = false;
2484 long bytes;
2485 LOFF_T last_pos;
2486 LOFF_T block_begin;
2487 LOFF_T block_end;
2488 char buf[8192] = { 0 };
2489 FILE *fp_out = NULL;
2490
2491 gpgme_error_t err = GPG_ERR_NO_ERROR;
2492 gpgme_data_t armored_data = NULL;
2493
2494 bool maybe_goodsig = true;
2495 bool have_any_sigs = false;
2496
2497 char body_charset[256] = { 0 };
2498 char *gpgcharset = NULL;
2499
2501
2502
2503
2505 mutt_str_copy(body_charset,
"iso-8859-1",
sizeof(body_charset));
2506
2508 {
2509 return -1;
2510 }
2512
2513 for (bytes = b->
length; bytes > 0;)
2514 {
2515
2516 block_begin = last_pos;
2517
2518 if (!fgets(buf,
sizeof(buf), state->
fp_in))
2519 break;
2520
2521 LOFF_T offset = ftello(state->
fp_in);
2522 if (offset < 0)
2523 {
2525 offset = 0;
2526 }
2527 bytes -= (offset - last_pos);
2528 last_pos = offset;
2529
2531 if (plen != 0)
2532 {
2533 needpass = 0;
2534 clearsign = false;
2535 pgp_keyblock = false;
2536
2538 {
2539 needpass = 1;
2540 }
2542 {
2543 clearsign = true;
2544 }
2546 {
2547 pgp_keyblock = true;
2548 }
2549 else
2550 {
2551
2555 continue;
2556 }
2557
2558
2559 while ((bytes > 0) && (fgets(buf,
sizeof(buf) - 1, state->
fp_in) != NULL))
2560 {
2561 offset = ftello(state->
fp_in);
2562 if (offset < 0)
2563 {
2565 offset = 0;
2566 }
2567 bytes -= (offset - last_pos);
2568 last_pos = offset;
2569
2570 if (needpass &&
mutt_str_equal(
"-----END PGP MESSAGE-----\n", buf))
2571 {
2572 break;
2573 }
2574
2575 if (!needpass && (
mutt_str_equal(
"-----END PGP SIGNATURE-----\n", buf) ||
2577 {
2578 break;
2579 }
2580
2581
2583 {
2584 size_t l = 0;
2587 if ((l =
mutt_str_len(gpgcharset)) > 0 && gpgcharset[l - 1] ==
'\n')
2588 gpgcharset[l - 1] = 0;
2591 }
2592 }
2593 block_end = ftello(state->
fp_in);
2594 if (block_end < 0)
2595 {
2597 block_end = 0;
2598 }
2599
2600 have_any_sigs = (have_any_sigs || (clearsign && (state->
flags &
STATE_VERIFY)));
2601
2602
2604 fseeko(state->
fp_in, block_end, 0);
2605
2606
2607 if (pgp_keyblock)
2608 {
2610 }
2612 {
2615
2616 if (clearsign)
2617 {
2618 err = gpgme_op_verify(ctx, armored_data, NULL, plaintext);
2619 }
2620 else
2621 {
2622 err = gpgme_op_decrypt_verify(ctx, armored_data, plaintext);
2623 if (gpg_err_code(err) == GPG_ERR_NO_DATA)
2624 {
2625
2626 gpgme_data_seek(armored_data, 0, SEEK_SET);
2627
2628 gpgme_data_release(plaintext);
2630 err = gpgme_op_verify(ctx, armored_data, NULL, plaintext);
2631 }
2632 }
2634
2635 gpgme_decrypt_result_t result = gpgme_op_decrypt_result(ctx);
2638
2639 if (err != GPG_ERR_NO_ERROR)
2640 {
2641 char errbuf[200] = { 0 };
2642
2643 snprintf(errbuf, sizeof(errbuf) - 1,
2644 _(
"Error: decryption/verification failed: %s\n"), gpgme_strerror(err));
2646 }
2647 else
2648 {
2649
2650
2652
2653 bool sig_stat = false;
2654 char *tmpfname = NULL;
2655
2656
2657 gpgme_verify_result_t verify_result = gpgme_op_verify_result(ctx);
2658 if (verify_result->signatures)
2659 sig_stat = true;
2660
2661 have_any_sigs = false;
2662 maybe_goodsig = false;
2664 {
2665 int res, idx;
2666 bool anybad = false;
2667
2669 have_any_sigs = true;
2671 {
2672 if (res == 1)
2673 anybad = true;
2674 }
2675 if (!anybad && idx)
2676 maybe_goodsig = true;
2677
2679 }
2680
2682 if (tmpfname)
2683 {
2684 unlink(tmpfname);
2686 }
2687 else
2688 {
2690 state_puts(state,
_(
"Error: copy data failed\n"));
2691 }
2692 }
2693 gpgme_data_release(plaintext);
2694 gpgme_release(ctx);
2695 }
2696
2697
2698
2699
2701 {
2702 if (needpass)
2704 else if (pgp_keyblock)
2706 else
2708 }
2709
2710 if (clearsign)
2711 {
2713 }
2714 else if (fp_out)
2715 {
2716 int c;
2717 char *expected_charset = gpgcharset && *gpgcharset ? gpgcharset : "utf-8";
2718 rewind(fp_out);
2722 {
2724 if ((c ==
'\n') && state->
prefix)
2726 }
2728 }
2729
2731 {
2733 if (needpass)
2735 else if (pgp_keyblock)
2737 else
2739 }
2740
2741
2742 gpgme_data_release(armored_data);
2744 }
2745 else
2746 {
2747
2748
2752 }
2753 }
2755
2756 b->
goodsig = (maybe_goodsig && have_any_sigs);
2757
2758 if (needpass == -1)
2759 {
2760 state_attach_puts(state,
_(
"[-- Error: could not find beginning of PGP message --]\n\n"));
2761 return 1;
2762 }
2764
2765 return err;
2766}
const char * cc_charset(void)
Get the cached value of $charset.
static void show_encryption_info(struct State *state, gpgme_decrypt_result_t result)
Show encryption information.
static gpgme_data_t create_gpgme_data(void)
Create a new GPGME data object.
gpgme_ctx_t create_gpgme_context(bool for_smime)
Create a new GPGME context.
#define SIGNED_MESSAGE(_y)
static gpgme_data_t file_to_data_object(FILE *fp, long offset, size_t length)
Create GPGME data object from file.
#define PUBLIC_KEY_BLOCK(_y)
static char * data_object_to_tempfile(gpgme_data_t data, FILE **fp_ret)
Copy a data object to a temporary file.
static void redraw_if_needed(gpgme_ctx_t ctx)
Accommodate for a redraw if needed.
static int pgp_gpgme_extract_keys(gpgme_data_t keydata, FILE **fp)
Write PGP keys to a file.
static void copy_clearsigned(gpgme_data_t data, struct State *state, char *charset)
Copy a clearsigned message.
static int show_one_sig_status(gpgme_ctx_t ctx, int idx, struct State *state)
Show information about one signature.
char * mutt_body_get_charset(struct Body *b, char *buf, size_t buflen)
Get a body's character set.
bool mutt_file_seek(FILE *fp, LOFF_T offset, int whence)
Wrapper for fseeko with error handling.
#define mutt_file_fclose(FP)
#define mutt_message(...)
#define mutt_debug(LEVEL,...)
@ LL_DEBUG2
Log at debug level 2.
@ LL_DEBUG1
Log at debug level 1.
#define FREE(x)
Free memory and set the pointer to NULL.
bool mutt_ch_check_charset(const char *cs, bool strict)
Does iconv understand a character set?
int mutt_ch_fgetconv(struct FgetConv *fc)
Convert a file's character set.
struct FgetConv * mutt_ch_fgetconv_open(FILE *fp, const char *from, const char *to, uint8_t flags)
Prepare a file for charset conversion.
void mutt_ch_fgetconv_close(struct FgetConv **ptr)
Close an fgetconv handle.
#define MUTT_ICONV_HOOK_FROM
apply charset-hooks to fromcode
void state_attach_puts(struct State *state, const char *t)
Write a string to the state.
#define state_puts(STATE, STR)
#define STATE_DISPLAY
Output is displayed to the user.
#define state_putc(STATE, STR)
#define STATE_VERIFY
Perform signature verification.
char * mutt_str_dup(const char *str)
Copy a string, safely.
bool mutt_str_equal(const char *a, const char *b)
Compare two strings.
bool mutt_strn_equal(const char *a, const char *b, size_t num)
Check for equality of two strings (to a maximum), safely.
size_t mutt_str_startswith(const char *str, const char *prefix)
Check whether a string starts with a prefix.
size_t mutt_str_len(const char *a)
Calculate the length of a string, safely.
size_t mutt_str_copy(char *dest, const char *src, size_t dsize)
Copy a string into a buffer (guaranteeing NUL-termination)
char * mutt_str_replace(char **p, const char *s)
Replace one string with another.
LOFF_T offset
offset where the actual data begins
LOFF_T length
length (in bytes) of attachment
bool goodsig
Good cryptographic signature.
Cursor for converting a file's encoding.
StateFlags flags
Flags, e.g. STATE_DISPLAY.
FILE * fp_in
File to read from.
const char * prefix
String to add to the beginning of each output line.