mirror of
https://git.notmuchmail.org/git/notmuch
synced 2024-11-25 04:18:08 +01:00
fccebbaeef
Here's the configuration choice for people who want a cleartext index, but don't want stashed session keys. Interestingly, this "nostash" decryption policy is actually the same policy that should be used by "notmuch show" and "notmuch reply", since they never modify the index or database when they are invoked with --decrypt. We take advantage of this parallel to tune the behavior of those programs so that we're not requesting session keys from GnuPG during "show" and "reply" that we would then otherwise just throw away.
221 lines
6.4 KiB
C
221 lines
6.4 KiB
C
/* notmuch - Not much of an email program, (just index and search)
|
|
*
|
|
* Copyright © 2012 Jameson Rollins
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see https://www.gnu.org/licenses/ .
|
|
*
|
|
* Authors: Jameson Rollins <jrollins@finestructure.net>
|
|
*/
|
|
|
|
#include "crypto.h"
|
|
#include <strings.h>
|
|
#define unused(x) x __attribute__ ((unused))
|
|
|
|
#define ARRAY_SIZE(arr) (sizeof (arr) / sizeof (arr[0]))
|
|
|
|
#if (GMIME_MAJOR_VERSION < 3)
|
|
/* Create or pass on a GPG context (GMime 2.6) */
|
|
static notmuch_status_t
|
|
get_gpg_context (_notmuch_crypto_t *crypto, GMimeCryptoContext **ctx)
|
|
{
|
|
if (ctx == NULL || crypto == NULL)
|
|
return NOTMUCH_STATUS_NULL_POINTER;
|
|
|
|
if (crypto->gpgctx) {
|
|
*ctx = crypto->gpgctx;
|
|
return NOTMUCH_STATUS_SUCCESS;
|
|
}
|
|
|
|
/* TODO: GMimePasswordRequestFunc */
|
|
crypto->gpgctx = g_mime_gpg_context_new (NULL, crypto->gpgpath ? crypto->gpgpath : "gpg");
|
|
if (! crypto->gpgctx) {
|
|
return NOTMUCH_STATUS_FAILED_CRYPTO_CONTEXT_CREATION;
|
|
}
|
|
|
|
g_mime_gpg_context_set_use_agent ((GMimeGpgContext *) crypto->gpgctx, true);
|
|
g_mime_gpg_context_set_always_trust ((GMimeGpgContext *) crypto->gpgctx, false);
|
|
|
|
*ctx = crypto->gpgctx;
|
|
return NOTMUCH_STATUS_SUCCESS;
|
|
}
|
|
|
|
/* Create or pass on a PKCS7 context (GMime 2.6) */
|
|
static notmuch_status_t
|
|
get_pkcs7_context (_notmuch_crypto_t *crypto, GMimeCryptoContext **ctx)
|
|
{
|
|
if (ctx == NULL || crypto == NULL)
|
|
return NOTMUCH_STATUS_NULL_POINTER;
|
|
|
|
if (crypto->pkcs7ctx) {
|
|
*ctx = crypto->pkcs7ctx;
|
|
return NOTMUCH_STATUS_SUCCESS;
|
|
}
|
|
|
|
/* TODO: GMimePasswordRequestFunc */
|
|
crypto->pkcs7ctx = g_mime_pkcs7_context_new (NULL);
|
|
if (! crypto->pkcs7ctx) {
|
|
return NOTMUCH_STATUS_FAILED_CRYPTO_CONTEXT_CREATION;
|
|
}
|
|
|
|
g_mime_pkcs7_context_set_always_trust ((GMimePkcs7Context *) crypto->pkcs7ctx,
|
|
false);
|
|
|
|
*ctx = crypto->pkcs7ctx;
|
|
return NOTMUCH_STATUS_SUCCESS;
|
|
}
|
|
static const struct {
|
|
const char *protocol;
|
|
notmuch_status_t (*get_context) (_notmuch_crypto_t *crypto, GMimeCryptoContext **ctx);
|
|
} protocols[] = {
|
|
{
|
|
.protocol = "application/pgp-signature",
|
|
.get_context = get_gpg_context,
|
|
},
|
|
{
|
|
.protocol = "application/pgp-encrypted",
|
|
.get_context = get_gpg_context,
|
|
},
|
|
{
|
|
.protocol = "application/pkcs7-signature",
|
|
.get_context = get_pkcs7_context,
|
|
},
|
|
{
|
|
.protocol = "application/x-pkcs7-signature",
|
|
.get_context = get_pkcs7_context,
|
|
},
|
|
};
|
|
|
|
/* for the specified protocol return the context pointer (initializing
|
|
* if needed) */
|
|
notmuch_status_t
|
|
_notmuch_crypto_get_gmime_ctx_for_protocol (_notmuch_crypto_t *crypto,
|
|
const char *protocol,
|
|
GMimeCryptoContext **ctx)
|
|
{
|
|
if (! protocol)
|
|
return NOTMUCH_STATUS_MALFORMED_CRYPTO_PROTOCOL;
|
|
|
|
/* As per RFC 1847 section 2.1: "the [protocol] value token is
|
|
* comprised of the type and sub-type tokens of the Content-Type".
|
|
* As per RFC 1521 section 2: "Content-Type values, subtypes, and
|
|
* parameter names as defined in this document are
|
|
* case-insensitive." Thus, we use strcasecmp for the protocol.
|
|
*/
|
|
for (size_t i = 0; i < ARRAY_SIZE (protocols); i++) {
|
|
if (strcasecmp (protocol, protocols[i].protocol) == 0)
|
|
return protocols[i].get_context (crypto, ctx);
|
|
}
|
|
|
|
return NOTMUCH_STATUS_UNKNOWN_CRYPTO_PROTOCOL;
|
|
}
|
|
|
|
void
|
|
_notmuch_crypto_cleanup (_notmuch_crypto_t *crypto)
|
|
{
|
|
if (crypto->gpgctx) {
|
|
g_object_unref (crypto->gpgctx);
|
|
crypto->gpgctx = NULL;
|
|
}
|
|
|
|
if (crypto->pkcs7ctx) {
|
|
g_object_unref (crypto->pkcs7ctx);
|
|
crypto->pkcs7ctx = NULL;
|
|
}
|
|
}
|
|
#else
|
|
void _notmuch_crypto_cleanup (unused(_notmuch_crypto_t *crypto))
|
|
{
|
|
}
|
|
#endif
|
|
|
|
GMimeObject *
|
|
_notmuch_crypto_decrypt (bool *attempted,
|
|
notmuch_decryption_policy_t decrypt,
|
|
notmuch_message_t *message,
|
|
g_mime_3_unused(GMimeCryptoContext* crypto_ctx),
|
|
GMimeMultipartEncrypted *part,
|
|
GMimeDecryptResult **decrypt_result,
|
|
GError **err)
|
|
{
|
|
GMimeObject *ret = NULL;
|
|
if (decrypt == NOTMUCH_DECRYPT_FALSE)
|
|
return NULL;
|
|
|
|
/* the versions of notmuch that can support session key decryption */
|
|
#if HAVE_GMIME_SESSION_KEYS
|
|
if (message) {
|
|
notmuch_message_properties_t *list = NULL;
|
|
|
|
for (list = notmuch_message_get_properties (message, "session-key", TRUE);
|
|
notmuch_message_properties_valid (list); notmuch_message_properties_move_to_next (list)) {
|
|
if (err && *err) {
|
|
g_error_free (*err);
|
|
*err = NULL;
|
|
}
|
|
if (attempted)
|
|
*attempted = true;
|
|
#if (GMIME_MAJOR_VERSION < 3)
|
|
ret = g_mime_multipart_encrypted_decrypt_session (part,
|
|
crypto_ctx,
|
|
notmuch_message_properties_value (list),
|
|
decrypt_result, err);
|
|
#else
|
|
ret = g_mime_multipart_encrypted_decrypt (part,
|
|
GMIME_DECRYPT_NONE,
|
|
notmuch_message_properties_value (list),
|
|
decrypt_result, err);
|
|
#endif
|
|
if (ret)
|
|
break;
|
|
}
|
|
if (list)
|
|
notmuch_message_properties_destroy (list);
|
|
if (ret)
|
|
return ret;
|
|
}
|
|
#endif
|
|
|
|
if (err && *err) {
|
|
g_error_free (*err);
|
|
*err = NULL;
|
|
}
|
|
|
|
if (decrypt == NOTMUCH_DECRYPT_AUTO)
|
|
return ret;
|
|
|
|
if (attempted)
|
|
*attempted = true;
|
|
#if (GMIME_MAJOR_VERSION < 3)
|
|
#if HAVE_GMIME_SESSION_KEYS
|
|
gboolean oldgetsk = g_mime_crypto_context_get_retrieve_session_key (crypto_ctx);
|
|
gboolean newgetsk = (decrypt == NOTMUCH_DECRYPT_TRUE && decrypt_result);
|
|
if (newgetsk != oldgetsk)
|
|
/* This could return an error, but we can't do anything about it, so ignore it */
|
|
g_mime_crypto_context_set_retrieve_session_key (crypto_ctx, newgetsk, NULL);
|
|
#endif
|
|
ret = g_mime_multipart_encrypted_decrypt(part, crypto_ctx,
|
|
decrypt_result, err);
|
|
#if HAVE_GMIME_SESSION_KEYS
|
|
if (newgetsk != oldgetsk)
|
|
g_mime_crypto_context_set_retrieve_session_key (crypto_ctx, oldgetsk, NULL);
|
|
#endif
|
|
#else
|
|
GMimeDecryptFlags flags = GMIME_DECRYPT_NONE;
|
|
if (decrypt == NOTMUCH_DECRYPT_TRUE && decrypt_result)
|
|
flags |= GMIME_DECRYPT_EXPORT_SESSION_KEY;
|
|
ret = g_mime_multipart_encrypted_decrypt(part, flags, NULL,
|
|
decrypt_result, err);
|
|
#endif
|
|
return ret;
|
|
}
|