File: crypt_gpgme.h

package info (click to toggle)
neomutt 20250510%2Bdfsg-2
  • links: PTS, VCS
  • area: main
  • in suites: trixie
  • size: 23,372 kB
  • sloc: ansic: 171,730; sh: 5,357; perl: 1,121; tcl: 1,065; python: 443; makefile: 48
file content (124 lines) | stat: -rw-r--r-- 5,330 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
/**
 * @file
 * Wrapper for PGP/SMIME calls to GPGME
 *
 * @authors
 * Copyright (C) 2017-2024 Richard Russon <rich@flatcap.org>
 * Copyright (C) 2019-2021 Pietro Cerutti <gahr@gahr.ch>
 *
 * @copyright
 * This program is free software: you can redistribute it and/or modify it under
 * the terms of the GNU General Public License as published by the Free Software
 * Foundation, either version 2 of the License, or (at your option) any later
 * version.
 *
 * This program is distributed in the hope that it will be useful, but WITHOUT
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
 * FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more
 * details.
 *
 * You should have received a copy of the GNU General Public License along with
 * this program.  If not, see <http://www.gnu.org/licenses/>.
 */

#ifndef MUTT_NCRYPT_CRYPT_GPGME_H
#define MUTT_NCRYPT_CRYPT_GPGME_H

#include <gpgme.h>
#include <stdbool.h>
#include <stdio.h>
#include "mutt/lib.h"
#include "lib.h"

struct AddressList;
struct Body;
struct Email;
struct Message;

/* We work based on user IDs, getting from a user ID to the key is
 * check and does not need any memory (GPGME uses reference counting). */
/**
 * struct CryptKeyInfo - A stored PGP key
 */
struct CryptKeyInfo
{
  struct CryptKeyInfo *next; ///< Linked list
  gpgme_key_t kobj;
  int idx;                   ///< and the user ID at this index
  const char *uid;           ///< and for convenience point to this user ID
  KeyFlags flags;            ///< global and per uid flags (for convenience)
  gpgme_validity_t validity; ///< uid validity (cached for convenience)
};
ARRAY_HEAD(CryptKeyInfoArray, struct CryptKeyInfo *);

/**
 * enum KeyInfo - PGP Key info
 */
enum KeyInfo
{
  KIP_NAME = 0,    ///< PGP Key field: Name
  KIP_AKA,         ///< PGP Key field: aka (Also Known As)
  KIP_VALID_FROM,  ///< PGP Key field: Valid From date
  KIP_VALID_TO,    ///< PGP Key field: Valid To date
  KIP_KEY_TYPE,    ///< PGP Key field: Key Type
  KIP_KEY_USAGE,   ///< PGP Key field: Key Usage
  KIP_FINGERPRINT, ///< PGP Key field: Fingerprint
  KIP_SERIAL_NO,   ///< PGP Key field: Serial number
  KIP_ISSUED_BY,   ///< PGP Key field: Issued By
  KIP_SUBKEY,      ///< PGP Key field: Subkey
  KIP_MAX,
};

/**
 * enum KeyCap - PGP/SMIME Key Capabilities
 */
enum KeyCap
{
  KEY_CAP_CAN_ENCRYPT, ///< Key can be used for encryption
  KEY_CAP_CAN_SIGN,    ///< Key can be used for signing
  KEY_CAP_CAN_CERTIFY, ///< Key can be used to certify
};

/**
 * struct CryptEntry - An entry in the Select-Key menu
 */
struct CryptEntry
{
  size_t num;               ///< Index number
  struct CryptKeyInfo *key; ///< Key
};

void                 pgp_gpgme_set_sender           (const char *sender);

int                  pgp_gpgme_application_handler  (struct Body *b, struct State *state);
bool                 pgp_gpgme_check_traditional    (FILE *fp, struct Body *b, bool just_one);
int                  pgp_gpgme_decrypt_mime         (FILE *fp_in, FILE **fp_out, struct Body *b, struct Body **b_dec);
int                  pgp_gpgme_encrypted_handler    (struct Body *b, struct State *state);
struct Body *        pgp_gpgme_encrypt_message      (struct Body *b, char *keylist, bool sign, const struct AddressList *from);
char *               pgp_gpgme_find_keys            (const struct AddressList *addrlist, bool oppenc_mode);
void                 pgp_gpgme_invoke_import        (const char *fname);
struct Body *        pgp_gpgme_make_key_attachment  (void);
SecurityFlags        pgp_gpgme_send_menu            (struct Email *e);
struct Body *        pgp_gpgme_sign_message         (struct Body *b, const struct AddressList *from);
int                  pgp_gpgme_verify_one           (struct Body *b, struct State *state, const char *tempfile);

int                  smime_gpgme_application_handler(struct Body *b, struct State *state);
struct Body *        smime_gpgme_build_smime_entity (struct Body *b, char *keylist);
int                  smime_gpgme_decrypt_mime       (FILE *fp_in, FILE **fp_out, struct Body *b, struct Body **b_dec);
char *               smime_gpgme_find_keys          (const struct AddressList *addrlist, bool oppenc_mode);
void                 smime_gpgme_init               (void);
SecurityFlags        smime_gpgme_send_menu          (struct Email *e);
struct Body *        smime_gpgme_sign_message       (struct Body *b, const struct AddressList *from);
int                  smime_gpgme_verify_one         (struct Body *b, struct State *state, const char *tempfile);
int                  smime_gpgme_verify_sender      (struct Email *e, struct Message *msg);

gpgme_ctx_t          create_gpgme_context           (bool for_smime);
struct CryptKeyInfo *crypt_copy_key                 (struct CryptKeyInfo *key);
const char *         crypt_fpr_or_lkeyid            (struct CryptKeyInfo *k);
bool                 crypt_id_is_strong             (struct CryptKeyInfo *key);
int                  crypt_id_is_valid              (struct CryptKeyInfo *key);
const char *         crypt_keyid                    (struct CryptKeyInfo *k);
int                  digit                          (const char *s);
unsigned int         key_check_cap                  (gpgme_key_t key, enum KeyCap cap);

#endif /* MUTT_NCRYPT_CRYPT_GPGME_H */