unofficial mirror of notmuch@notmuchmail.org
 help / color / mirror / code / Atom feed
blob ac018005b3fd506b4190e81a40d62f7be58ff6df 6677 bytes (raw)
name: util/crypto.c 	 # note: path name is non-authoritative(*)

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
 
/* notmuch - Not much of an email program, (just index and search)
 *
 * Copyright © 2012 Jameson Rollins
 *
 * This program is free software: you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation, either version 3 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program.  If not, see https://www.gnu.org/licenses/ .
 *
 * Authors: Jameson Rollins <jrollins@finestructure.net>
 */

#include "crypto.h"
#include <strings.h>
#define unused(x) x __attribute__ ((unused))

#define ARRAY_SIZE(arr) (sizeof (arr) / sizeof (arr[0]))

#if (GMIME_MAJOR_VERSION < 3)
/* Create or pass on a GPG context (GMime 2.6) */
static notmuch_status_t
get_gpg_context (_notmuch_crypto_t *crypto, GMimeCryptoContext **ctx)
{
    if (ctx == NULL || crypto == NULL)
	return NOTMUCH_STATUS_NULL_POINTER;

    if (crypto->gpgctx) {
	*ctx = crypto->gpgctx;
	return NOTMUCH_STATUS_SUCCESS;
    }

    /* TODO: GMimePasswordRequestFunc */
    crypto->gpgctx = g_mime_gpg_context_new (NULL, crypto->gpgpath ? crypto->gpgpath : "gpg");
    if (! crypto->gpgctx) {
	return NOTMUCH_STATUS_FAILED_CRYPTO_CONTEXT_CREATION;
    }

    g_mime_gpg_context_set_use_agent ((GMimeGpgContext *) crypto->gpgctx, true);
    g_mime_gpg_context_set_always_trust ((GMimeGpgContext *) crypto->gpgctx, false);

    *ctx = crypto->gpgctx;
    return NOTMUCH_STATUS_SUCCESS;
}

/* Create or pass on a PKCS7 context (GMime 2.6) */
static notmuch_status_t
get_pkcs7_context (_notmuch_crypto_t *crypto, GMimeCryptoContext **ctx)
{
    if (ctx == NULL || crypto == NULL)
	return NOTMUCH_STATUS_NULL_POINTER;

    if (crypto->pkcs7ctx) {
	*ctx = crypto->pkcs7ctx;
	return NOTMUCH_STATUS_SUCCESS;
    }

    /* TODO: GMimePasswordRequestFunc */
    crypto->pkcs7ctx = g_mime_pkcs7_context_new (NULL);
    if (! crypto->pkcs7ctx) {
	return NOTMUCH_STATUS_FAILED_CRYPTO_CONTEXT_CREATION;
    }

    g_mime_pkcs7_context_set_always_trust ((GMimePkcs7Context *) crypto->pkcs7ctx,
					   false);

    *ctx = crypto->pkcs7ctx;
    return NOTMUCH_STATUS_SUCCESS;
}
static const struct {
    const char *protocol;
    notmuch_status_t (*get_context) (_notmuch_crypto_t *crypto, GMimeCryptoContext **ctx);
} protocols[] = {
    {
	.protocol = "application/pgp-signature",
	.get_context = get_gpg_context,
    },
    {
	.protocol = "application/pgp-encrypted",
	.get_context = get_gpg_context,
    },
    {
	.protocol = "application/pkcs7-signature",
	.get_context = get_pkcs7_context,
    },
    {
	.protocol = "application/x-pkcs7-signature",
	.get_context = get_pkcs7_context,
    },
};

/* for the specified protocol return the context pointer (initializing
 * if needed) */
notmuch_status_t
_notmuch_crypto_get_gmime_ctx_for_protocol (_notmuch_crypto_t *crypto,
					    const char *protocol,
					    GMimeCryptoContext **ctx)
{
    if (! protocol)
	return NOTMUCH_STATUS_MALFORMED_CRYPTO_PROTOCOL;

    /* As per RFC 1847 section 2.1: "the [protocol] value token is
     * comprised of the type and sub-type tokens of the Content-Type".
     * As per RFC 1521 section 2: "Content-Type values, subtypes, and
     * parameter names as defined in this document are
     * case-insensitive."  Thus, we use strcasecmp for the protocol.
     */
    for (size_t i = 0; i < ARRAY_SIZE (protocols); i++) {
	if (strcasecmp (protocol, protocols[i].protocol) == 0)
	    return protocols[i].get_context (crypto, ctx);
    }

    return NOTMUCH_STATUS_UNKNOWN_CRYPTO_PROTOCOL;
}

void
_notmuch_crypto_cleanup (_notmuch_crypto_t *crypto)
{
    if (crypto->gpgctx) {
	g_object_unref (crypto->gpgctx);
	crypto->gpgctx = NULL;
    }

    if (crypto->pkcs7ctx) {
	g_object_unref (crypto->pkcs7ctx);
	crypto->pkcs7ctx = NULL;
    }
}
#else
void _notmuch_crypto_cleanup (unused(_notmuch_crypto_t *crypto))
{
}
#endif

GMimeObject *
_notmuch_crypto_decrypt (bool *attempted,
			 notmuch_decryption_policy_t decrypt,
			 notmuch_message_t *message,
			 g_mime_3_unused(GMimeCryptoContext* crypto_ctx),
			 GMimeMultipartEncrypted *part,
			 GMimeDecryptResult **decrypt_result,
			 GError **err)
{
    GMimeObject *ret = NULL;
    if (decrypt == NOTMUCH_DECRYPT_FALSE)
	return NULL;

    /* the versions of notmuch that can support session key decryption */
#if (GMIME_MAJOR_VERSION >= 3 || (GMIME_MAJOR_VERSION == 2 && GMIME_MINOR_VERSION == 6 && GMIME_MICRO_VERSION >= 21))
    if (message) {
	notmuch_message_properties_t *list = NULL;

	for (list = notmuch_message_get_properties (message, "session-key", TRUE);
	     notmuch_message_properties_valid (list); notmuch_message_properties_move_to_next (list)) {
	    if (attempted)
		*attempted = true;
#if (GMIME_MAJOR_VERSION < 3)
	    ret = g_mime_multipart_encrypted_decrypt_session (part,
							      crypto_ctx,
							      notmuch_message_properties_value (list),
							      decrypt_result, err);
#else
	    ret = g_mime_multipart_encrypted_decrypt (part,
						      GMIME_DECRYPT_NONE,
						      notmuch_message_properties_value (list),
						      decrypt_result, err);
#endif
	    if (ret)
		break;
	}
	if (list)
	    notmuch_message_properties_destroy (list);
	if (ret)
	    return ret;
    }
#endif

    if (decrypt == NOTMUCH_DECRYPT_AUTO)
	return ret;

    if (attempted)
	*attempted = true;
#if (GMIME_MAJOR_VERSION < 3)
#if (GMIME_MAJOR_VERSION == 2 && GMIME_MINOR_VERSION == 6 && GMIME_MICRO_VERSION >= 21)
    gboolean oldgetsk = g_mime_crypto_context_get_retrieve_session_key (crypto_ctx);
    gboolean newgetsk = (decrypt == NOTMUCH_DECRYPT_TRUE && decrypt_result);
    if (newgetsk != oldgetsk)
	/* This could return an error, but we can't do anything about it, so ignore it */
	g_mime_crypto_context_set_retrieve_session_key (crypto_ctx, newgetsk, NULL);
#endif
    ret = g_mime_multipart_encrypted_decrypt(part, crypto_ctx,
					     decrypt_result, err);
#if (GMIME_MAJOR_VERSION == 2 && GMIME_MINOR_VERSION == 6 && GMIME_MICRO_VERSION >= 21)
    if (newgetsk != oldgetsk)
	g_mime_crypto_context_set_retrieve_session_key (crypto_ctx, oldgetsk, NULL);
#endif
#else
    GMimeDecryptFlags flags = GMIME_DECRYPT_NONE;
    if (decrypt == NOTMUCH_DECRYPT_TRUE && decrypt_result)
	flags |= GMIME_DECRYPT_EXPORT_SESSION_KEY;
    ret = g_mime_multipart_encrypted_decrypt(part, flags, NULL,
					     decrypt_result, err);
#endif
    return ret;
}

debug log:

solving ac018005 ...
found ac018005 in https://yhetil.org/notmuch/20171025065203.24403-17-dkg@fifthhorseman.net/
found ba9bfa7b in https://yhetil.org/notmuch/20171025065203.24403-16-dkg@fifthhorseman.net/
found ae6b94be in https://yhetil.org/notmuch/20171025065203.24403-13-dkg@fifthhorseman.net/
found 9789f203 in https://yhetil.org/notmuch/20171025065203.24403-8-dkg@fifthhorseman.net/
found e014db5d in https://yhetil.org/notmuch/20171025065203.24403-4-dkg@fifthhorseman.net/
found 087536ec in https://yhetil.org/notmuch.git/
preparing index
index prepared:
100644 087536ec7ed97156459339eb6f2b3b09cc5409d8	util/crypto.c

applying [1/5] https://yhetil.org/notmuch/20171025065203.24403-4-dkg@fifthhorseman.net/
diff --git a/util/crypto.c b/util/crypto.c
index 087536ec..e014db5d 100644


applying [2/5] https://yhetil.org/notmuch/20171025065203.24403-8-dkg@fifthhorseman.net/
diff --git a/util/crypto.c b/util/crypto.c
index e014db5d..9789f203 100644


applying [3/5] https://yhetil.org/notmuch/20171025065203.24403-13-dkg@fifthhorseman.net/
diff --git a/util/crypto.c b/util/crypto.c
index 9789f203..ae6b94be 100644


applying [4/5] https://yhetil.org/notmuch/20171025065203.24403-16-dkg@fifthhorseman.net/
diff --git a/util/crypto.c b/util/crypto.c
index ae6b94be..ba9bfa7b 100644


applying [5/5] https://yhetil.org/notmuch/20171025065203.24403-17-dkg@fifthhorseman.net/
diff --git a/util/crypto.c b/util/crypto.c
index ba9bfa7b..ac018005 100644

Checking patch util/crypto.c...
Applied patch util/crypto.c cleanly.
Checking patch util/crypto.c...
Applied patch util/crypto.c cleanly.
Checking patch util/crypto.c...
Applied patch util/crypto.c cleanly.
Checking patch util/crypto.c...
Applied patch util/crypto.c cleanly.
Checking patch util/crypto.c...
Applied patch util/crypto.c cleanly.

index at:
100644 ac018005b3fd506b4190e81a40d62f7be58ff6df	util/crypto.c

(*) Git path names are given by the tree(s) the blob belongs to.
    Blobs themselves have no identifier aside from the hash of its contents.^

Code repositories for project(s) associated with this public inbox

	https://yhetil.org/notmuch.git/

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).