From 460c52653ab0dcca6f19a4f492ed2c5e4e963ab0 Mon Sep 17 00:00:00 2001 From: toma Date: Wed, 25 Nov 2009 17:56:58 +0000 Subject: Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features. BUG:215923 git-svn-id: svn://anonsvn.kde.org/home/kde/branches/trinity/kdepim@1054174 283d02a7-25f6-0310-bc7c-ecb5cbfe19da --- kmail/objecttreeparser.cpp | 2872 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 2872 insertions(+) create mode 100644 kmail/objecttreeparser.cpp (limited to 'kmail/objecttreeparser.cpp') diff --git a/kmail/objecttreeparser.cpp b/kmail/objecttreeparser.cpp new file mode 100644 index 00000000..6f4bd465 --- /dev/null +++ b/kmail/objecttreeparser.cpp @@ -0,0 +1,2872 @@ +/* -*- mode: C++; c-file-style: "gnu" -*- + objecttreeparser.cpp + + This file is part of KMail, the KDE mail client. + Copyright (c) 2002-2004 Klarälvdalens Datakonsult AB + Copyright (c) 2003 Marc Mutz + + KMail is free software; you can redistribute it and/or modify it + under the terms of the GNU General Public License, version 2, as + published by the Free Software Foundation. + + KMail is distributed in the hope that it will be useful, but + WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA + + In addition, as a special exception, the copyright holders give + permission to link the code of this program with any edition of + the Qt library by Trolltech AS, Norway (or with modified versions + of Qt that use the same license as Qt), and distribute linked + combinations including the two. You must obey the GNU General + Public License in all respects for all of the code used other than + Qt. If you modify this file, you may extend this exception to + your version of the file, but you are not obligated to do so. If + you do not wish to do so, delete this exception statement from + your version. +*/ + +#include + +// my header file +#include "objecttreeparser.h" + +// other KMail headers +#include "kmkernel.h" +#include "kmreaderwin.h" +#include "partNode.h" +#include +#include +#include "partmetadata.h" +#include "attachmentstrategy.h" +#include "interfaces/htmlwriter.h" +#include "htmlstatusbar.h" +#include "csshelper.h" +#include "bodypartformatter.h" +#include "bodypartformatterfactory.h" +#include "partnodebodypart.h" +#include "interfaces/bodypartformatter.h" +#include "globalsettings.h" +#include "util.h" + +// other module headers +#include +#include +#include +#include + +#include +#include +#include +#include +#include +#include +#include +#include + +#include +#include +#include +#include +#include + +#include +#include +#include + +#include +#include +#include + +// other KDE headers +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +// other Qt headers +#include +#include +#include +#include +#include +#include +#include +#include +#include + +// other headers +#include +#include +#include +#include +#include "chiasmuskeyselector.h" + +namespace KMail { + + // A small class that eases temporary CryptPlugWrapper changes: + class ObjectTreeParser::CryptoProtocolSaver { + ObjectTreeParser * otp; + const Kleo::CryptoBackend::Protocol * protocol; + public: + CryptoProtocolSaver( ObjectTreeParser * _otp, const Kleo::CryptoBackend::Protocol* _w ) + : otp( _otp ), protocol( _otp ? _otp->cryptoProtocol() : 0 ) + { + if ( otp ) + otp->setCryptoProtocol( _w ); + } + + ~CryptoProtocolSaver() { + if ( otp ) + otp->setCryptoProtocol( protocol ); + } + }; + + + ObjectTreeParser::ObjectTreeParser( KMReaderWin * reader, const Kleo::CryptoBackend::Protocol * protocol, + bool showOnlyOneMimePart, bool keepEncryptions, + bool includeSignatures, + const AttachmentStrategy * strategy, + HtmlWriter * htmlWriter, + CSSHelper * cssHelper ) + : mReader( reader ), + mCryptoProtocol( protocol ), + mShowOnlyOneMimePart( showOnlyOneMimePart ), + mKeepEncryptions( keepEncryptions ), + mIncludeSignatures( includeSignatures ), + mAttachmentStrategy( strategy ), + mHtmlWriter( htmlWriter ), + mCSSHelper( cssHelper ) + { + if ( !attachmentStrategy() ) + mAttachmentStrategy = reader ? reader->attachmentStrategy() + : AttachmentStrategy::smart(); + if ( reader && !this->htmlWriter() ) + mHtmlWriter = reader->htmlWriter(); + if ( reader && !this->cssHelper() ) + mCSSHelper = reader->mCSSHelper; + } + + ObjectTreeParser::ObjectTreeParser( const ObjectTreeParser & other ) + : mReader( other.mReader ), + mCryptoProtocol( other.cryptoProtocol() ), + mShowOnlyOneMimePart( other.showOnlyOneMimePart() ), + mKeepEncryptions( other.keepEncryptions() ), + mIncludeSignatures( other.includeSignatures() ), + mAttachmentStrategy( other.attachmentStrategy() ), + mHtmlWriter( other.htmlWriter() ), + mCSSHelper( other.cssHelper() ) + { + + } + + ObjectTreeParser::~ObjectTreeParser() {} + + void ObjectTreeParser::insertAndParseNewChildNode( partNode& startNode, + const char* content, + const char* cntDesc, + bool append ) + { + DwBodyPart* myBody = new DwBodyPart( DwString( content ), 0 ); + myBody->Parse(); + + if ( ( !myBody->Body().FirstBodyPart() || + myBody->Body().AsString().length() == 0 ) && + startNode.dwPart() && + startNode.dwPart()->Body().Message() && + startNode.dwPart()->Body().Message()->Body().FirstBodyPart() ) + { + // if encapsulated imap messages are loaded the content-string is not complete + // so we need to keep the child dwparts + myBody = new DwBodyPart( *(startNode.dwPart()->Body().Message()) ); + } + + if ( myBody->hasHeaders() ) { + DwText& desc = myBody->Headers().ContentDescription(); + desc.FromString( cntDesc ); + desc.SetModified(); + myBody->Headers().Parse(); + } + + partNode* parentNode = &startNode; + partNode* newNode = new partNode(false, myBody); + if ( append && parentNode->firstChild() ) { + parentNode = parentNode->firstChild(); + while( parentNode->nextSibling() ) + parentNode = parentNode->nextSibling(); + parentNode->setNext( newNode ); + } else + parentNode->setFirstChild( newNode ); + + newNode->buildObjectTree( false ); + + if ( startNode.mimePartTreeItem() ) { + kdDebug(5006) << "\n -----> Inserting items into MimePartTree\n" << endl; + newNode->fillMimePartTree( startNode.mimePartTreeItem(), 0, + QString::null, QString::null, QString::null, 0, + append ); + kdDebug(5006) << "\n <----- Finished inserting items into MimePartTree\n" << endl; + } else { + kdDebug(5006) << "\n ------ Sorry, node.mimePartTreeItem() returns ZERO so" + << "\n we cannot insert new lines into MimePartTree. :-(\n" << endl; + } + kdDebug(5006) << "\n -----> Now parsing the MimePartTree\n" << endl; + ObjectTreeParser otp( mReader, cryptoProtocol() ); + otp.parseObjectTree( newNode ); + mRawReplyString += otp.rawReplyString(); + mTextualContent += otp.textualContent(); + if ( !otp.textualContentCharset().isEmpty() ) + mTextualContentCharset = otp.textualContentCharset(); + kdDebug(5006) << "\n <----- Finished parsing the MimePartTree in insertAndParseNewChildNode()\n" << endl; + } + + +//----------------------------------------------------------------------------- + + void ObjectTreeParser::parseObjectTree( partNode * node ) { + kdDebug(5006) << "ObjectTreeParser::parseObjectTree( " + << (node ? "node OK, " : "no node, ") + << "showOnlyOneMimePart: " << (showOnlyOneMimePart() ? "TRUE" : "FALSE") + << " )" << endl; + + if ( !node ) + return; + + // reset "processed" flags for... + if ( showOnlyOneMimePart() ) { + // ... this node and all descendants + node->setProcessed( false, false ); + if ( partNode * child = node->firstChild() ) + child->setProcessed( false, true ); + } else if ( mReader && !node->parentNode() ) { + // ...this node and all it's siblings and descendants + node->setProcessed( false, true ); + } + + for ( ; node ; node = node->nextSibling() ) { + if ( node->processed() ) + continue; + + ProcessResult processResult; + + if ( mReader ) + htmlWriter()->queue( QString::fromLatin1("").arg( node->nodeId() ) ); + if ( const Interface::BodyPartFormatter * formatter + = BodyPartFormatterFactory::instance()->createFor( node->typeString(), node->subTypeString() ) ) { + PartNodeBodyPart part( *node, codecFor( node ) ); + // Set the default display strategy for this body part relying on the + // identity of KMail::Interface::BodyPart::Display and AttachmentStrategy::Display + part.setDefaultDisplay( (KMail::Interface::BodyPart::Display) attachmentStrategy()->defaultDisplay( node ) ); + const Interface::BodyPartFormatter::Result result = formatter->format( &part, htmlWriter() ); + if ( mReader && node->bodyPartMemento() ) + if ( Interface::Observable * obs = node->bodyPartMemento()->asObservable() ) + obs->attach( mReader ); + switch ( result ) { + case Interface::BodyPartFormatter::AsIcon: + processResult.setNeverDisplayInline( true ); + // fall through: + case Interface::BodyPartFormatter::Failed: + defaultHandling( node, processResult ); + break; + case Interface::BodyPartFormatter::Ok: + case Interface::BodyPartFormatter::NeedContent: + // FIXME: incomplete content handling + ; + } + } else { + const BodyPartFormatter * bpf + = BodyPartFormatter::createFor( node->type(), node->subType() ); + kdFatal( !bpf, 5006 ) << "THIS SHOULD NO LONGER HAPPEN (" + << node->typeString() << '/' << node->subTypeString() + << ')' << endl; + + if ( bpf && !bpf->process( this, node, processResult ) ) + defaultHandling( node, processResult ); + } + node->setProcessed( true, false ); + + // adjust signed/encrypted flags if inline PGP was found + processResult.adjustCryptoStatesOfNode( node ); + + if ( showOnlyOneMimePart() ) + break; + } + } + + void ObjectTreeParser::defaultHandling( partNode * node, ProcessResult & result ) { + // ### (mmutz) default handling should go into the respective + // ### bodypartformatters. + if ( !mReader ) + return; + if ( attachmentStrategy() == AttachmentStrategy::hidden() && + !showOnlyOneMimePart() && + node->parentNode() /* message is not an attachment */ ) + return; + + bool asIcon = true; + if ( showOnlyOneMimePart() ) + // ### (mmutz) this is wrong! If I click on an image part, I + // want the equivalent of "view...", except for the extra + // window! + asIcon = !node->hasContentDispositionInline(); + else if ( !result.neverDisplayInline() ) + if ( const AttachmentStrategy * as = attachmentStrategy() ) + asIcon = as->defaultDisplay( node ) == AttachmentStrategy::AsIcon; + // neither image nor text -> show as icon + if ( !result.isImage() + && node->type() != DwMime::kTypeText ) + asIcon = true; + // if the image is not complete do not try to show it inline + if ( result.isImage() && !node->msgPart().isComplete() ) + asIcon = true; + if ( asIcon ) { + if ( attachmentStrategy() != AttachmentStrategy::hidden() + || showOnlyOneMimePart() ) + writePartIcon( &node->msgPart(), node->nodeId() ); + } else if ( result.isImage() ) + writePartIcon( &node->msgPart(), node->nodeId(), true ); + else + writeBodyString( node->msgPart().bodyDecoded(), + node->trueFromAddress(), + codecFor( node ), result, false ); + // end of ### + } + + void ProcessResult::adjustCryptoStatesOfNode( partNode * node ) const { + if ( ( inlineSignatureState() != KMMsgNotSigned ) || + ( inlineEncryptionState() != KMMsgNotEncrypted ) ) { + node->setSignatureState( inlineSignatureState() ); + node->setEncryptionState( inlineEncryptionState() ); + } + } + + ////////////////// + ////////////////// + ////////////////// + + static int signatureToStatus( const GpgME::Signature &sig ) + { + switch ( sig.status().code() ) { + case GPG_ERR_NO_ERROR: + return GPGME_SIG_STAT_GOOD; + case GPG_ERR_BAD_SIGNATURE: + return GPGME_SIG_STAT_BAD; + case GPG_ERR_NO_PUBKEY: + return GPGME_SIG_STAT_NOKEY; + case GPG_ERR_NO_DATA: + return GPGME_SIG_STAT_NOSIG; + case GPG_ERR_SIG_EXPIRED: + return GPGME_SIG_STAT_GOOD_EXP; + case GPG_ERR_KEY_EXPIRED: + return GPGME_SIG_STAT_GOOD_EXPKEY; + default: + return GPGME_SIG_STAT_ERROR; + } + } + + bool ObjectTreeParser::writeOpaqueOrMultipartSignedData( partNode* data, + partNode& sign, + const QString& fromAddress, + bool doCheck, + QCString* cleartextData, + std::vector paramSignatures, + bool hideErrors ) + { + bool bIsOpaqueSigned = false; + enum { NO_PLUGIN, NOT_INITIALIZED, CANT_VERIFY_SIGNATURES } + cryptPlugError = NO_PLUGIN; + + const Kleo::CryptoBackend::Protocol* cryptProto = cryptoProtocol(); + + QString cryptPlugLibName; + QString cryptPlugDisplayName; + if ( cryptProto ) { + cryptPlugLibName = cryptProto->name(); + cryptPlugDisplayName = cryptProto->displayName(); + } + +#ifndef NDEBUG + if ( !doCheck ) + kdDebug(5006) << "ObjectTreeParser::writeOpaqueOrMultipartSignedData: showing OpenPGP (Encrypted+Signed) data" << endl; + else + if ( data ) + kdDebug(5006) << "ObjectTreeParser::writeOpaqueOrMultipartSignedData: processing Multipart Signed data" << endl; + else + kdDebug(5006) << "ObjectTreeParser::writeOpaqueOrMultipartSignedData: processing Opaque Signed data" << endl; +#endif + + if ( doCheck && cryptProto ) { + kdDebug(5006) << "ObjectTreeParser::writeOpaqueOrMultipartSignedData: going to call CRYPTPLUG " + << cryptPlugLibName << endl; + } + + QCString cleartext; + QByteArray signaturetext; + + if ( doCheck && cryptProto ) { + if ( data ) { + cleartext = KMail::Util::CString( data->dwPart()->AsString() ); + + dumpToFile( "dat_01_reader_signedtext_before_canonicalization", + cleartext.data(), cleartext.length() ); + + // replace simple LFs by CRLSs + // according to RfC 2633, 3.1.1 Canonicalization + kdDebug(5006) << "Converting LF to CRLF (see RfC 2633, 3.1.1 Canonicalization)" << endl; + cleartext = Util::lf2crlf( cleartext ); + kdDebug(5006) << " done." << endl; + } + + dumpToFile( "dat_02_reader_signedtext_after_canonicalization", + cleartext.data(), cleartext.length() ); + + signaturetext = sign.msgPart().bodyDecodedBinary(); + dumpToFile( "dat_03_reader.sig", signaturetext.data(), + signaturetext.size() ); + } + + std::vector signatures; + if ( doCheck ) + signatures = paramSignatures; + + PartMetaData messagePart; + messagePart.isSigned = true; + messagePart.technicalProblem = ( cryptProto == 0 ); + messagePart.isGoodSignature = false; + messagePart.isEncrypted = false; + messagePart.isDecryptable = false; + messagePart.keyTrust = Kpgp::KPGP_VALIDITY_UNKNOWN; + messagePart.status = i18n("Wrong Crypto Plug-In."); + messagePart.status_code = GPGME_SIG_STAT_NONE; + + if ( doCheck && cryptProto ) { + GpgME::VerificationResult result; + if ( data ) { // detached + if ( Kleo::VerifyDetachedJob * const job = cryptProto->verifyDetachedJob() ) { + QByteArray plainData = cleartext; + plainData.resize( cleartext.size() - 1 ); + result = job->exec( signaturetext, plainData ); + messagePart.auditLog = job->auditLogAsHtml(); + } else { + cryptPlugError = CANT_VERIFY_SIGNATURES; + } + } else { // opaque + if ( Kleo::VerifyOpaqueJob * const job = cryptProto->verifyOpaqueJob() ) { + QByteArray plainData; + result = job->exec( signaturetext, plainData ); + cleartext = QCString( plainData.data(), plainData.size() + 1 ); + messagePart.auditLog = job->auditLogAsHtml(); + } else { + cryptPlugError = CANT_VERIFY_SIGNATURES; + } + } + signatures = result.signatures(); + } + + if ( doCheck ) + kdDebug(5006) << "\nObjectTreeParser::writeOpaqueOrMultipartSignedData: returned from CRYPTPLUG" << endl; + + // ### only one signature supported + if ( signatures.size() > 0 ) { + kdDebug(5006) << "\nObjectTreeParser::writeOpaqueOrMultipartSignedData: found signature" << endl; + GpgME::Signature signature = signatures[0]; + + messagePart.status_code = signatureToStatus( signature ); + messagePart.status = QString::fromUtf8( signature.status().asString() ); + for ( uint i = 1; i < signatures.size(); ++i ) { + if ( signatureToStatus( signatures[i] ) != messagePart.status_code ) { + messagePart.status_code = GPGME_SIG_STAT_DIFF; + messagePart.status = i18n("Different results for signatures"); + } + } + if ( messagePart.status_code & GPGME_SIG_STAT_GOOD ) + messagePart.isGoodSignature = true; + + // get key for this signature + Kleo::KeyListJob *job = cryptProto->keyListJob(); + std::vector keys; + GpgME::KeyListResult keyListRes = job->exec( QString::fromLatin1( signature.fingerprint() ), false, keys ); + GpgME::Key key; + if ( keys.size() == 1 ) + key = keys[0]; + else if ( keys.size() > 1 ) + assert( false ); // ### wtf, what should we do in this case?? + + // save extended signature status flags + messagePart.sigSummary = signature.summary(); + + if ( key.keyID() ) + messagePart.keyId = key.keyID(); + if ( messagePart.keyId.isEmpty() ) + messagePart.keyId = signature.fingerprint(); + // ### Ugh. We depend on two enums being in sync: + messagePart.keyTrust = (Kpgp::Validity)signature.validity(); + if ( key.numUserIDs() > 0 && key.userID( 0 ).id() ) + messagePart.signer = Kleo::DN( key.userID( 0 ).id() ).prettyDN(); + for ( uint iMail = 0; iMail < key.numUserIDs(); ++iMail ) { + // The following if /should/ always result in TRUE but we + // won't trust implicitely the plugin that gave us these data. + if ( key.userID( iMail ).email() ) { + QString email = QString::fromUtf8( key.userID( iMail ).email() ); + // ### work around gpgme 0.3.x / cryptplug bug where the + // ### email addresses are specified as angle-addr, not addr-spec: + if ( email.startsWith( "<" ) && email.endsWith( ">" ) ) + email = email.mid( 1, email.length() - 2 ); + if ( !email.isEmpty() ) + messagePart.signerMailAddresses.append( email ); + } + } + + if ( signature.creationTime() ) + messagePart.creationTime.setTime_t( signature.creationTime() ); + else + messagePart.creationTime = QDateTime(); + if ( messagePart.signer.isEmpty() ) { + if ( key.numUserIDs() > 0 && key.userID( 0 ).name() ) + messagePart.signer = Kleo::DN( key.userID( 0 ).name() ).prettyDN(); + if ( !messagePart.signerMailAddresses.empty() ) { + if ( messagePart.signer.isEmpty() ) + messagePart.signer = messagePart.signerMailAddresses.front(); + else + messagePart.signer += " <" + messagePart.signerMailAddresses.front() + '>'; + } + } + + kdDebug(5006) << "\n key id: " << messagePart.keyId + << "\n key trust: " << messagePart.keyTrust + << "\n signer: " << messagePart.signer << endl; + + } else { + messagePart.creationTime = QDateTime(); + } + + if ( !doCheck || !data ){ + if ( cleartextData || !cleartext.isEmpty() ) { + if ( mReader ) + htmlWriter()->queue( writeSigstatHeader( messagePart, + cryptProto, + fromAddress ) ); + bIsOpaqueSigned = true; + + CryptoProtocolSaver cpws( this, cryptProto ); + insertAndParseNewChildNode( sign, doCheck ? cleartext.data() : cleartextData->data(), + "opaqued signed data" ); + + if ( mReader ) + htmlWriter()->queue( writeSigstatFooter( messagePart ) ); + + } + else if ( !hideErrors ) { + QString txt; + txt = "

"; + txt.append( i18n( "The crypto engine returned no cleartext data." ) ); + txt.append( "

" ); + txt.append( "
 
" ); + txt.append( i18n( "Status: " ) ); + if ( !messagePart.status.isEmpty() ) { + txt.append( "" ); + txt.append( messagePart.status ); + txt.append( "" ); + } + else + txt.append( i18n("(unknown)") ); + if ( mReader ) + htmlWriter()->queue(txt); + } + } + else { + if ( mReader ) { + if ( !cryptProto ) { + QString errorMsg; + switch ( cryptPlugError ) { + case NOT_INITIALIZED: + errorMsg = i18n( "Crypto plug-in \"%1\" is not initialized." ) + .arg( cryptPlugLibName ); + break; + case CANT_VERIFY_SIGNATURES: + errorMsg = i18n( "Crypto plug-in \"%1\" cannot verify signatures." ) + .arg( cryptPlugLibName ); + break; + case NO_PLUGIN: + if ( cryptPlugDisplayName.isEmpty() ) + errorMsg = i18n( "No appropriate crypto plug-in was found." ); + else + errorMsg = i18n( "%1 is either 'OpenPGP' or 'S/MIME'", + "No %1 plug-in was found." ) + .arg( cryptPlugDisplayName ); + break; + } + messagePart.errorText = i18n( "The message is signed, but the " + "validity of the signature cannot be " + "verified.
" + "Reason: %1" ) + .arg( errorMsg ); + } + + if ( mReader ) + htmlWriter()->queue( writeSigstatHeader( messagePart, + cryptProto, + fromAddress ) ); + } + + ObjectTreeParser otp( mReader, cryptProto, true ); + otp.parseObjectTree( data ); + mRawReplyString += otp.rawReplyString(); + mTextualContent += otp.textualContent(); + if ( !otp.textualContentCharset().isEmpty() ) + mTextualContentCharset = otp.textualContentCharset(); + + if ( mReader ) + htmlWriter()->queue( writeSigstatFooter( messagePart ) ); + } + + kdDebug(5006) << "\nObjectTreeParser::writeOpaqueOrMultipartSignedData: done, returning " + << ( bIsOpaqueSigned ? "TRUE" : "FALSE" ) << endl; + return bIsOpaqueSigned; + } + + +bool ObjectTreeParser::okDecryptMIME( partNode& data, + QCString& decryptedData, + bool& signatureFound, + std::vector &signatures, + bool showWarning, + bool& passphraseError, + bool& actuallyEncrypted, + QString& aErrorText, + QString& auditLog ) +{ + passphraseError = false; + aErrorText = QString::null; + auditLog = QString::null; + bool bDecryptionOk = false; + enum { NO_PLUGIN, NOT_INITIALIZED, CANT_DECRYPT } + cryptPlugError = NO_PLUGIN; + + const Kleo::CryptoBackend::Protocol* cryptProto = cryptoProtocol(); + + QString cryptPlugLibName; + if ( cryptProto ) + cryptPlugLibName = cryptProto->name(); + + if ( mReader && !mReader->decryptMessage() ) { + QString iconName = KGlobal::instance()->iconLoader()->iconPath( "decrypted", KIcon::Small ); + decryptedData = "
" + + i18n("This message is encrypted.").utf8() + + "
" + "
"; + return false; + } + + if ( cryptProto && !kmkernel->contextMenuShown() ) { + QByteArray ciphertext( data.msgPart().bodyDecodedBinary() ); +#ifdef MARCS_DEBUG + QCString cipherStr( ciphertext.data(), ciphertext.size() + 1 ); + bool cipherIsBinary = (-1 == cipherStr.find("BEGIN ENCRYPTED MESSAGE", 0, false) ) && + (-1 == cipherStr.find("BEGIN PGP ENCRYPTED MESSAGE", 0, false) ) && + (-1 == cipherStr.find("BEGIN PGP MESSAGE", 0, false) ); + + dumpToFile( "dat_04_reader.encrypted", ciphertext.data(), ciphertext.size() ); + + QCString deb; + deb = "\n\nE N C R Y P T E D D A T A = "; + if ( cipherIsBinary ) + deb += "[binary data]"; + else { + deb += "\""; + deb += cipherStr; + deb += "\""; + } + deb += "\n\n"; + kdDebug(5006) << deb << endl; +#endif + + + kdDebug(5006) << "ObjectTreeParser::decryptMIME: going to call CRYPTPLUG " + << cryptPlugLibName << endl; + if ( mReader ) + emit mReader->noDrag(); // in case pineentry pops up, don't let kmheaders start a drag afterwards + + Kleo::DecryptVerifyJob* job = cryptProto->decryptVerifyJob(); + if ( !job ) { + cryptPlugError = CANT_DECRYPT; + cryptProto = 0; + } else { + QByteArray plainText; + const std::pair res = job->exec( ciphertext, plainText ); + const GpgME::DecryptionResult & decryptResult = res.first; + const GpgME::VerificationResult & verifyResult = res.second; + signatureFound = verifyResult.signatures().size() > 0; + signatures = verifyResult.signatures(); + bDecryptionOk = !decryptResult.error(); + passphraseError = decryptResult.error().isCanceled() + || decryptResult.error().code() == GPG_ERR_NO_SECKEY; + actuallyEncrypted = decryptResult.error().code() != GPG_ERR_NO_DATA; + aErrorText = QString::fromLocal8Bit( decryptResult.error().asString() ); + auditLog = job->auditLogAsHtml(); + + kdDebug(5006) << "ObjectTreeParser::decryptMIME: returned from CRYPTPLUG" + << endl; + if ( bDecryptionOk ) + decryptedData = QCString( plainText.data(), plainText.size() + 1 ); + else if ( mReader && showWarning ) { + decryptedData = "
" + + i18n("Encrypted data not shown.").utf8() + + "
"; + if ( !passphraseError ) + aErrorText = i18n("Crypto plug-in \"%1\" could not decrypt the data.") + .arg( cryptPlugLibName ) + + "
" + + i18n("Error: %1").arg( aErrorText ); + } + } + } + + if ( !cryptProto ) { + decryptedData = "
" + + i18n("Encrypted data not shown.").utf8() + + "
"; + switch ( cryptPlugError ) { + case NOT_INITIALIZED: + aErrorText = i18n( "Crypto plug-in \"%1\" is not initialized." ) + .arg( cryptPlugLibName ); + break; + case CANT_DECRYPT: + aErrorText = i18n( "Crypto plug-in \"%1\" cannot decrypt messages." ) + .arg( cryptPlugLibName ); + break; + case NO_PLUGIN: + aErrorText = i18n( "No appropriate crypto plug-in was found." ); + break; + } + } else if ( kmkernel->contextMenuShown() ) { + // ### Workaround for bug 56693 (kmail freeze with the complete desktop + // ### while pinentry-qt appears) + QByteArray ciphertext( data.msgPart().bodyDecodedBinary() ); + QCString cipherStr( ciphertext.data(), ciphertext.size() + 1 ); + bool cipherIsBinary = (-1 == cipherStr.find("BEGIN ENCRYPTED MESSAGE", 0, false) ) && + (-1 == cipherStr.find("BEGIN PGP ENCRYPTED MESSAGE", 0, false) ) && + (-1 == cipherStr.find("BEGIN PGP MESSAGE", 0, false) ); + if ( !cipherIsBinary ) { + decryptedData = cipherStr; + } + else { + decryptedData = "
" + + i18n("Encrypted data not shown.").utf8() + + "
"; + } + } + + dumpToFile( "dat_05_reader.decrypted", decryptedData.data(), decryptedData.size() ); + + return bDecryptionOk; +} + + //static + bool ObjectTreeParser::containsExternalReferences( const QCString & str ) + { + QRegExp httpRegExp("(\\\"|\\\'|url\\s*\\(\\s*)http[s]?:"); + int httpPos = str.find( httpRegExp, 0 ); + + while ( httpPos >= 0 ) { + // look backwards for "href" + if ( httpPos > 5 ) { + int hrefPos = str.findRev( "href", httpPos - 5, true ); + // if no 'href' is found or the distance between 'href' and '"http[s]:' + // is larger than 7 (7 is the distance in 'href = "http[s]:') then + // we assume that we have found an external reference + if ( ( hrefPos == -1 ) || ( httpPos - hrefPos > 7 ) ) + return true; + } + // find next occurrence of "http: or "https: + httpPos = str.find( httpRegExp, httpPos + 6 ); + } + return false; + } + + bool ObjectTreeParser::processTextHtmlSubtype( partNode * curNode, ProcessResult & ) { + QCString cstr( curNode->msgPart().bodyDecoded() ); + + mRawReplyString = cstr; + if ( curNode->isFirstTextPart() ) { + mTextualContent += curNode->msgPart().bodyToUnicode(); + mTextualContentCharset = curNode->msgPart().charset(); + } + + if ( !mReader ) + return true; + + if ( curNode->isFirstTextPart() || + attachmentStrategy()->defaultDisplay( curNode ) == AttachmentStrategy::Inline || + showOnlyOneMimePart() ) + { + if ( mReader->htmlMail() ) { + // ---Sven's strip and from end of attachment start- + // We must fo this, or else we will see only 1st inlined html + // attachment. It is IMHO enough to search only for and + // put \0 there. + int i = cstr.findRev("", -1, false); //case insensitive + if ( 0 <= i ) + cstr.truncate(i); + else // just in case - search for + { + i = cstr.findRev("", -1, false); //case insensitive + if ( 0 <= i ) cstr.truncate(i); + } + // ---Sven's strip and from end of attachment end- + // Show the "external references" warning (with possibility to load + // external references only if loading external references is disabled + // and the HTML code contains obvious external references). For + // messages where the external references are obfuscated the user won't + // have an easy way to load them but that shouldn't be a problem + // because only spam contains obfuscated external references. + if ( !mReader->htmlLoadExternal() && + containsExternalReferences( cstr ) ) { + htmlWriter()->queue( "
\n" ); + htmlWriter()->queue( i18n("Note: This HTML message may contain external " + "references to images etc. For security/privacy reasons " + "external references are not loaded. If you trust the " + "sender of this message then you can load the external " + "references for this message " + "by clicking here.") ); + htmlWriter()->queue( "


" ); + } + } else { + htmlWriter()->queue( "
\n" ); + htmlWriter()->queue( i18n("Note: This is an HTML message. For " + "security reasons, only the raw HTML code " + "is shown. If you trust the sender of this " + "message then you can activate formatted " + "HTML display for this message " + "by clicking here.") ); + htmlWriter()->queue( "


" ); + } + htmlWriter()->queue( codecFor( curNode )->toUnicode( mReader->htmlMail() ? cstr : KMMessage::html2source( cstr ))); + mReader->mColorBar->setHtmlMode(); + return true; + } + return false; + } +} // namespace KMail + +static bool isMailmanMessage( partNode * curNode ) { + if ( !curNode->dwPart() || !curNode->dwPart()->hasHeaders() ) + return false; + DwHeaders & headers = curNode->dwPart()->Headers(); + if ( headers.HasField("X-Mailman-Version") ) + return true; + if ( headers.HasField("X-Mailer") && + 0 == QCString( headers.FieldBody("X-Mailer").AsString().c_str() ) + .find("MAILMAN", 0, false) ) + return true; + return false; +} + +namespace KMail { + + bool ObjectTreeParser::processMailmanMessage( partNode * curNode ) { + const QCString cstr = curNode->msgPart().bodyDecoded(); + + //### + const QCString delim1( "--__--__--\n\nMessage:"); + const QCString delim2( "--__--__--\r\n\r\nMessage:"); + const QCString delimZ2("--__--__--\n\n_____________"); + const QCString delimZ1("--__--__--\r\n\r\n_____________"); + QCString partStr, digestHeaderStr; + int thisDelim = cstr.find(delim1, 0, false); + if ( thisDelim == -1 ) + thisDelim = cstr.find(delim2, 0, false); + if ( thisDelim == -1 ) { + kdDebug(5006) << " Sorry: Old style Mailman message but no delimiter found." << endl; + return false; + } + + int nextDelim = cstr.find(delim1, thisDelim+1, false); + if ( -1 == nextDelim ) + nextDelim = cstr.find(delim2, thisDelim+1, false); + if ( -1 == nextDelim ) + nextDelim = cstr.find(delimZ1, thisDelim+1, false); + if ( -1 == nextDelim ) + nextDelim = cstr.find(delimZ2, thisDelim+1, false); + if ( nextDelim < 0) + return false; + + kdDebug(5006) << " processing old style Mailman digest" << endl; + //if ( curNode->mRoot ) + // curNode = curNode->mRoot; + + // at least one message found: build a mime tree + digestHeaderStr = "Content-Type=text/plain\nContent-Description=digest header\n\n"; + digestHeaderStr += cstr.mid( 0, thisDelim ); + insertAndParseNewChildNode( *curNode, + &*digestHeaderStr, + "Digest Header", true ); + //mReader->queueHtml("


"); + // temporarily change curent node's Content-Type + // to get our embedded RfC822 messages properly inserted + curNode->setType( DwMime::kTypeMultipart ); + curNode->setSubType( DwMime::kSubtypeDigest ); + while( -1 < nextDelim ){ + int thisEoL = cstr.find("\nMessage:", thisDelim, false); + if ( -1 < thisEoL ) + thisDelim = thisEoL+1; + else{ + thisEoL = cstr.find("\n_____________", thisDelim, false); + if ( -1 < thisEoL ) + thisDelim = thisEoL+1; + } + thisEoL = cstr.find('\n', thisDelim); + if ( -1 < thisEoL ) + thisDelim = thisEoL+1; + else + thisDelim = thisDelim+1; + //while( thisDelim < cstr.size() && '\n' == cstr[thisDelim] ) + // ++thisDelim; + + partStr = "Content-Type=message/rfc822\nContent-Description=embedded message\n"; + partStr += cstr.mid( thisDelim, nextDelim-thisDelim ); + QCString subject("embedded message"); + QCString subSearch("\nSubject:"); + int subPos = partStr.find(subSearch, 0, false); + if ( -1 < subPos ){ + subject = partStr.mid(subPos+subSearch.length()); + thisEoL = subject.find('\n'); + if ( -1 < thisEoL ) + subject.truncate( thisEoL ); + } + kdDebug(5006) << " embedded message found: \"" << subject << "\"" << endl; + insertAndParseNewChildNode( *curNode, + &*partStr, + subject, true ); + //mReader->queueHtml("


"); + thisDelim = nextDelim+1; + nextDelim = cstr.find(delim1, thisDelim, false); + if ( -1 == nextDelim ) + nextDelim = cstr.find(delim2, thisDelim, false); + if ( -1 == nextDelim ) + nextDelim = cstr.find(delimZ1, thisDelim, false); + if ( -1 == nextDelim ) + nextDelim = cstr.find(delimZ2, thisDelim, false); + } + // reset curent node's Content-Type + curNode->setType( DwMime::kTypeText ); + curNode->setSubType( DwMime::kSubtypePlain ); + int thisEoL = cstr.find("_____________", thisDelim); + if ( -1 < thisEoL ){ + thisDelim = thisEoL; + thisEoL = cstr.find('\n', thisDelim); + if ( -1 < thisEoL ) + thisDelim = thisEoL+1; + } + else + thisDelim = thisDelim+1; + partStr = "Content-Type=text/plain\nContent-Description=digest footer\n\n"; + partStr += cstr.mid( thisDelim ); + insertAndParseNewChildNode( *curNode, + &*partStr, + "Digest Footer", true ); + return true; + } + + bool ObjectTreeParser::processTextPlainSubtype( partNode * curNode, ProcessResult & result ) { + if ( !mReader ) { + mRawReplyString = curNode->msgPart().bodyDecoded(); + if ( curNode->isFirstTextPart() ) { + mTextualContent += curNode->msgPart().bodyToUnicode(); + mTextualContentCharset = curNode->msgPart().charset(); + } + return true; + } + + if ( !curNode->isFirstTextPart() && + attachmentStrategy()->defaultDisplay( curNode ) != AttachmentStrategy::Inline && + !showOnlyOneMimePart() ) + return false; + + mRawReplyString = curNode->msgPart().bodyDecoded(); + if ( curNode->isFirstTextPart() ) { + mTextualContent += curNode->msgPart().bodyToUnicode(); + mTextualContentCharset = curNode->msgPart().charset(); + } + + QString label = curNode->msgPart().fileName().stripWhiteSpace(); + if ( label.isEmpty() ) + label = curNode->msgPart().name().stripWhiteSpace(); + + const bool bDrawFrame = !curNode->isFirstTextPart() + && !showOnlyOneMimePart() + && !label.isEmpty(); + if ( bDrawFrame ) { + label = KMMessage::quoteHtmlChars( label, true ); + + const QString comment = + KMMessage::quoteHtmlChars( curNode->msgPart().contentDescription(), true ); + + const QString fileName = + mReader->writeMessagePartToTempFile( &curNode->msgPart(), + curNode->nodeId() ); + + const QString dir = QApplication::reverseLayout() ? "rtl" : "ltr" ; + + QString htmlStr = "" + "
"; + if ( !fileName.isEmpty() ) + htmlStr += "" + + label + ""; + else + htmlStr += label; + if ( !comment.isEmpty() ) + htmlStr += "
" + comment; + htmlStr += "
"; + + htmlWriter()->queue( htmlStr ); + } + // process old style not-multipart Mailman messages to + // enable verification of the embedded messages' signatures + if ( !isMailmanMessage( curNode ) || + !processMailmanMessage( curNode ) ) + writeBodyString( mRawReplyString, curNode->trueFromAddress(), + codecFor( curNode ), result, !bDrawFrame ); + if ( bDrawFrame ) + htmlWriter()->queue( "
" ); + + return true; + } + + void ObjectTreeParser::stdChildHandling( partNode * child ) { + if ( !child ) + return; + + ObjectTreeParser otp( *this ); + otp.setShowOnlyOneMimePart( false ); + otp.parseObjectTree( child ); + mRawReplyString += otp.rawReplyString(); + mTextualContent += otp.textualContent(); + if ( !otp.textualContentCharset().isEmpty() ) + mTextualContentCharset = otp.textualContentCharset(); + } + + bool ObjectTreeParser::processMultiPartMixedSubtype( partNode * node, ProcessResult & ) { + partNode * child = node->firstChild(); + if ( !child ) + return false; + + // normal treatment of the parts in the mp/mixed container + stdChildHandling( child ); + return true; + } + + bool ObjectTreeParser::processMultiPartAlternativeSubtype( partNode * node, ProcessResult & ) { + partNode * child = node->firstChild(); + if ( !child ) + return false; + + partNode * dataHtml = child->findType( DwMime::kTypeText, + DwMime::kSubtypeHtml, false, true ); + partNode * dataPlain = child->findType( DwMime::kTypeText, + DwMime::kSubtypePlain, false, true ); + + if ( (mReader && mReader->htmlMail() && dataHtml) || + (dataHtml && dataPlain && dataPlain->msgPart().body().isEmpty()) ) { + if ( dataPlain ) + dataPlain->setProcessed( true, false ); + stdChildHandling( dataHtml ); + return true; + } + + if ( !mReader || (!mReader->htmlMail() && dataPlain) ) { + if ( dataHtml ) + dataHtml->setProcessed( true, false ); + stdChildHandling( dataPlain ); + return true; + } + + stdChildHandling( child ); + return true; + } + + bool ObjectTreeParser::processMultiPartDigestSubtype( partNode * node, ProcessResult & result ) { + return processMultiPartMixedSubtype( node, result ); + } + + bool ObjectTreeParser::processMultiPartParallelSubtype( partNode * node, ProcessResult & result ) { + return processMultiPartMixedSubtype( node, result ); + } + + bool ObjectTreeParser::processMultiPartSignedSubtype( partNode * node, ProcessResult & ) { + if ( node->childCount() != 2 ) { + kdDebug(5006) << "mulitpart/signed must have exactly two child parts!" << endl + << "processing as multipart/mixed" << endl; + if ( node->firstChild() ) + stdChildHandling( node->firstChild() ); + return node->firstChild(); + } + + partNode * signedData = node->firstChild(); + assert( signedData ); + + partNode * signature = signedData->nextSibling(); + assert( signature ); + + signature->setProcessed( true, true ); + + if ( !includeSignatures() ) { + stdChildHandling( signedData ); + return true; + } + + // FIXME(marc) check here that the protocol parameter matches the + // mimetype of "signature" (not required by the RFC, but practised + // by all implementaions of security multiparts + + const QString contentType = node->contentTypeParameter( "protocol" ).lower(); + const Kleo::CryptoBackend::Protocol *protocol = 0; + if ( contentType == "application/pkcs7-signature" || contentType == "application/x-pkcs7-signature" ) + protocol = Kleo::CryptoBackendFactory::instance()->smime(); + else if ( contentType == "application/pgp-signature" || contentType == "application/x-pgp-signature" ) + protocol = Kleo::CryptoBackendFactory::instance()->openpgp(); + + if ( !protocol ) { + signature->setProcessed( true, true ); + stdChildHandling( signedData ); + return true; + } + + CryptoProtocolSaver saver( this, protocol ); + + node->setSignatureState( KMMsgFullySigned ); + writeOpaqueOrMultipartSignedData( signedData, *signature, + node->trueFromAddress() ); + return true; + } + + bool ObjectTreeParser::processMultiPartEncryptedSubtype( partNode * node, ProcessResult & result ) { + partNode * child = node->firstChild(); + if ( !child ) + return false; + + if ( keepEncryptions() ) { + node->setEncryptionState( KMMsgFullyEncrypted ); + const QCString cstr = node->msgPart().bodyDecoded(); + if ( mReader ) + writeBodyString( cstr, node->trueFromAddress(), + codecFor( node ), result, false ); + mRawReplyString += cstr; + return true; + } + + const Kleo::CryptoBackend::Protocol * useThisCryptProto = 0; + + /* + ATTENTION: This code is to be replaced by the new 'auto-detect' feature. -------------------------------------- + */ + partNode * data = child->findType( DwMime::kTypeApplication, + DwMime::kSubtypeOctetStream, false, true ); + if ( data ) { + useThisCryptProto = Kleo::CryptoBackendFactory::instance()->openpgp(); + } + if ( !data ) { + data = child->findType( DwMime::kTypeApplication, + DwMime::kSubtypePkcs7Mime, false, true ); + if ( data ) { + useThisCryptProto = Kleo::CryptoBackendFactory::instance()->smime(); + } + } + /* + --------------------------------------------------------------------------------------------------------------- + */ + + if ( !data ) { + stdChildHandling( child ); + return true; + } + + CryptoProtocolSaver cpws( this, useThisCryptProto ); + + if ( partNode * dataChild = data->firstChild() ) { + kdDebug(5006) << "\n-----> Calling parseObjectTree( curNode->mChild )\n" << endl; + stdChildHandling( dataChild ); + kdDebug(5006) << "\n-----> Returning from parseObjectTree( curNode->mChild )\n" << endl; + return true; + } + + kdDebug(5006) << "\n-----> Initially processing encrypted data\n" << endl; + PartMetaData messagePart; + node->setEncryptionState( KMMsgFullyEncrypted ); + QCString decryptedData; + bool signatureFound; + std::vector signatures; + bool passphraseError; + bool actuallyEncrypted = true; + + bool bOkDecrypt = okDecryptMIME( *data, + decryptedData, + signatureFound, + signatures, + true, + passphraseError, + actuallyEncrypted, + messagePart.errorText, + messagePart.auditLog ); + + // paint the frame + if ( mReader ) { + messagePart.isDecryptable = bOkDecrypt; + messagePart.isEncrypted = true; + messagePart.isSigned = false; + htmlWriter()->queue( writeSigstatHeader( messagePart, + cryptoProtocol(), + node->trueFromAddress() ) ); + } + + if ( bOkDecrypt ) { + // Note: Multipart/Encrypted might also be signed + // without encapsulating a nicely formatted + // ~~~~~~~ Multipart/Signed part. + // (see RFC 3156 --> 6.2) + // In this case we paint a _2nd_ frame inside the + // encryption frame, but we do _not_ show a respective + // encapsulated MIME part in the Mime Tree Viewer + // since we do want to show the _true_ structure of the + // message there - not the structure that the sender's + // MUA 'should' have sent. :-D (khz, 12.09.2002) + // + if ( signatureFound ) { + writeOpaqueOrMultipartSignedData( 0, + *node, + node->trueFromAddress(), + false, + &decryptedData, + signatures, + false ); + node->setSignatureState( KMMsgFullySigned ); + } else { + insertAndParseNewChildNode( *node, + &*decryptedData, + "encrypted data" ); + } + } else { + mRawReplyString += decryptedData; + if ( mReader ) { + // print the error message that was returned in decryptedData + // (utf8-encoded) + htmlWriter()->queue( QString::fromUtf8( decryptedData.data() ) ); + } + } + + if ( mReader ) + htmlWriter()->queue( writeSigstatFooter( messagePart ) ); + data->setProcessed( true, false ); // Set the data node to done to prevent it from being processed + return true; + } + + + bool ObjectTreeParser::processMessageRfc822Subtype( partNode * node, ProcessResult & ) { + if ( mReader + && !attachmentStrategy()->inlineNestedMessages() + && !showOnlyOneMimePart() ) + return false; + + if ( partNode * child = node->firstChild() ) { + kdDebug(5006) << "\n-----> Calling parseObjectTree( curNode->mChild )\n" << endl; + ObjectTreeParser otp( mReader, cryptoProtocol() ); + otp.parseObjectTree( child ); + mRawReplyString += otp.rawReplyString(); + mTextualContent += otp.textualContent(); + if ( !otp.textualContentCharset().isEmpty() ) + mTextualContentCharset = otp.textualContentCharset(); + kdDebug(5006) << "\n<----- Returning from parseObjectTree( curNode->mChild )\n" << endl; + return true; + } + kdDebug(5006) << "\n-----> Initially processing data of embedded RfC 822 message\n" << endl; + // paint the frame + PartMetaData messagePart; + if ( mReader ) { + messagePart.isEncrypted = false; + messagePart.isSigned = false; + messagePart.isEncapsulatedRfc822Message = true; + QString filename = + mReader->writeMessagePartToTempFile( &node->msgPart(), + node->nodeId() ); + htmlWriter()->queue( writeSigstatHeader( messagePart, + cryptoProtocol(), + node->trueFromAddress(), + filename ) ); + } + QCString rfc822messageStr( node->msgPart().bodyDecoded() ); + // display the headers of the encapsulated message + DwMessage* rfc822DwMessage = new DwMessage(); // will be deleted by c'tor of rfc822headers + rfc822DwMessage->FromString( rfc822messageStr ); + rfc822DwMessage->Parse(); + KMMessage rfc822message( rfc822DwMessage ); + node->setFromAddress( rfc822message.from() ); + kdDebug(5006) << "\n-----> Store RfC 822 message header \"From: " << rfc822message.from() << "\"\n" << endl; + if ( mReader ) + htmlWriter()->queue( mReader->writeMsgHeader( &rfc822message ) ); + //mReader->parseMsgHeader( &rfc822message ); + // display the body of the encapsulated message + insertAndParseNewChildNode( *node, + &*rfc822messageStr, + "encapsulated message" ); + if ( mReader ) + htmlWriter()->queue( writeSigstatFooter( messagePart ) ); + return true; + } + + + bool ObjectTreeParser::processApplicationOctetStreamSubtype( partNode * node, ProcessResult & result ) { + if ( partNode * child = node->firstChild() ) { + kdDebug(5006) << "\n-----> Calling parseObjectTree( curNode->mChild )\n" << endl; + ObjectTreeParser otp( mReader, cryptoProtocol() ); + otp.parseObjectTree( child ); + mRawReplyString += otp.rawReplyString(); + mTextualContent += otp.textualContent(); + if ( !otp.textualContentCharset().isEmpty() ) + mTextualContentCharset = otp.textualContentCharset(); + kdDebug(5006) << "\n<----- Returning from parseObjectTree( curNode->mChild )\n" << endl; + return true; + } + + const Kleo::CryptoBackend::Protocol* oldUseThisCryptPlug = cryptoProtocol(); + if ( node->parentNode() + && DwMime::kTypeMultipart == node->parentNode()->type() + && DwMime::kSubtypeEncrypted == node->parentNode()->subType() ) { + kdDebug(5006) << "\n-----> Initially processing encrypted data\n" << endl; + node->setEncryptionState( KMMsgFullyEncrypted ); + if ( keepEncryptions() ) { + const QCString cstr = node->msgPart().bodyDecoded(); + if ( mReader ) + writeBodyString( cstr, node->trueFromAddress(), + codecFor( node ), result, false ); + mRawReplyString += cstr; + } else { + /* + ATTENTION: This code is to be replaced by the planned 'auto-detect' feature. + */ + PartMetaData messagePart; + setCryptoProtocol( Kleo::CryptoBackendFactory::instance()->openpgp() ); + QCString decryptedData; + bool signatureFound; + std::vector signatures; + bool passphraseError; + bool actuallyEncrypted = true; + + bool bOkDecrypt = okDecryptMIME( *node, + decryptedData, + signatureFound, + signatures, + true, + passphraseError, + actuallyEncrypted, + messagePart.errorText, + messagePart.auditLog ); + + // paint the frame + if ( mReader ) { + messagePart.isDecryptable = bOkDecrypt; + messagePart.isEncrypted = true; + messagePart.isSigned = false; + htmlWriter()->queue( writeSigstatHeader( messagePart, + cryptoProtocol(), + node->trueFromAddress() ) ); + } + + if ( bOkDecrypt ) { + // fixing the missing attachments bug #1090-b + insertAndParseNewChildNode( *node, + &*decryptedData, + "encrypted data" ); + } else { + mRawReplyString += decryptedData; + if ( mReader ) { + // print the error message that was returned in decryptedData + // (utf8-encoded) + htmlWriter()->queue( QString::fromUtf8( decryptedData.data() ) ); + } + } + + if ( mReader ) + htmlWriter()->queue( writeSigstatFooter( messagePart ) ); + } + return true; + } + setCryptoProtocol( oldUseThisCryptPlug ); + return false; + } + + bool ObjectTreeParser::processApplicationPkcs7MimeSubtype( partNode * node, ProcessResult & result ) { + if ( partNode * child = node->firstChild() ) { + kdDebug(5006) << "\n-----> Calling parseObjectTree( curNode->mChild )\n" << endl; + ObjectTreeParser otp( mReader, cryptoProtocol() ); + otp.parseObjectTree( child ); + mRawReplyString += otp.rawReplyString(); + mTextualContent += otp.textualContent(); + if ( !otp.textualContentCharset().isEmpty() ) + mTextualContentCharset = otp.textualContentCharset(); + kdDebug(5006) << "\n<----- Returning from parseObjectTree( curNode->mChild )\n" << endl; + return true; + } + + kdDebug(5006) << "\n-----> Initially processing signed and/or encrypted data\n" << endl; + if ( !node->dwPart() || !node->dwPart()->hasHeaders() ) + return false; + + const Kleo::CryptoBackend::Protocol * smimeCrypto = Kleo::CryptoBackendFactory::instance()->smime(); + + const QString smimeType = node->contentTypeParameter("smime-type").lower(); + + if ( smimeType == "certs-only" ) { + result.setNeverDisplayInline( true ); + if ( !smimeCrypto || !mReader ) + return false; + + const KConfigGroup reader( KMKernel::config(), "Reader" ); + if ( !reader.readBoolEntry( "AutoImportKeys", false ) ) + return false; + + const QByteArray certData = node->msgPart().bodyDecodedBinary(); + + Kleo::ImportJob *import = smimeCrypto->importJob(); + const GpgME::ImportResult res = import->exec( certData ); + if ( res.error() ) { + htmlWriter()->queue( i18n( "Sorry, certificate could not be imported.
" + "Reason: %1").arg( QString::fromLocal8Bit( res.error().asString() ) ) ); + return true; + } + + const int nImp = res.numImported(); + const int nUnc = res.numUnchanged(); + const int nSKImp = res.numSecretKeysImported(); + const int nSKUnc = res.numSecretKeysUnchanged(); + if ( !nImp && !nSKImp && !nUnc && !nSKUnc ) { + htmlWriter()->queue( i18n( "Sorry, no certificates were found in this message." ) ); + return true; + } + QString comment = "" + i18n( "Certificate import status:" ) + "
 
"; + if ( nImp ) + comment += i18n( "1 new certificate was imported.", + "%n new certificates were imported.", nImp ) + "
"; + if ( nUnc ) + comment += i18n( "1 certificate was unchanged.", + "%n certificates were unchanged.", nUnc ) + "
"; + if ( nSKImp ) + comment += i18n( "1 new secret key was imported.", + "%n new secret keys were imported.", nSKImp ) + "
"; + if ( nSKUnc ) + comment += i18n( "1 secret key was unchanged.", + "%n secret keys were unchanged.", nSKUnc ) + "
"; + comment += " 
"; + htmlWriter()->queue( comment ); + if ( !nImp && !nSKImp ) { + htmlWriter()->queue( "
" ); + return true; + } + const std::vector imports = res.imports(); + if ( imports.empty() ) { + htmlWriter()->queue( i18n( "Sorry, no details on certificate import available." ) + "
" ); + return true; + } + htmlWriter()->queue( "" + i18n( "Certificate import details:" ) + "
" ); + for ( std::vector::const_iterator it = imports.begin() ; it != imports.end() ; ++it ) { + if ( (*it).error() ) + htmlWriter()->queue( i18n( "Failed: %1 (%2)" ) + .arg( (*it).fingerprint(), + QString::fromLocal8Bit( (*it).error().asString() ) ) ); + else if ( (*it).status() & ~GpgME::Import::ContainedSecretKey ) + if ( (*it).status() & GpgME::Import::ContainedSecretKey ) + htmlWriter()->queue( i18n( "New or changed: %1 (secret key available)" ).arg( (*it).fingerprint() ) ); + else + htmlWriter()->queue( i18n( "New or changed: %1" ).arg( (*it).fingerprint() ) ); + htmlWriter()->queue( "
" ); + } + + htmlWriter()->queue( "
" ); + return true; + } + + if ( !smimeCrypto ) + return false; + CryptoProtocolSaver cpws( this, smimeCrypto ); + + bool isSigned = smimeType == "signed-data"; + bool isEncrypted = smimeType == "enveloped-data"; + + // Analyze "signTestNode" node to find/verify a signature. + // If zero this verification was successfully done after + // decrypting via recursion by insertAndParseNewChildNode(). + partNode* signTestNode = isEncrypted ? 0 : node; + + + // We try decrypting the content + // if we either *know* that it is an encrypted message part + // or there is neither signed nor encrypted parameter. + if ( !isSigned ) { + if ( isEncrypted ) + kdDebug(5006) << "pkcs7 mime == S/MIME TYPE: enveloped (encrypted) data" << endl; + else + kdDebug(5006) << "pkcs7 mime - type unknown - enveloped (encrypted) data ?" << endl; + QCString decryptedData; + PartMetaData messagePart; + messagePart.isEncrypted = true; + messagePart.isSigned = false; + bool signatureFound; + std::vector signatures; + bool passphraseError; + bool actuallyEncrypted = true; + + if ( okDecryptMIME( *node, + decryptedData, + signatureFound, + signatures, + false, + passphraseError, + actuallyEncrypted, + messagePart.errorText, + messagePart.auditLog ) ) { + kdDebug(5006) << "pkcs7 mime - encryption found - enveloped (encrypted) data !" << endl; + isEncrypted = true; + node->setEncryptionState( KMMsgFullyEncrypted ); + signTestNode = 0; + // paint the frame + messagePart.isDecryptable = true; + if ( mReader ) + htmlWriter()->queue( writeSigstatHeader( messagePart, + cryptoProtocol(), + node->trueFromAddress() ) ); + insertAndParseNewChildNode( *node, + &*decryptedData, + "encrypted data" ); + if ( mReader ) + htmlWriter()->queue( writeSigstatFooter( messagePart ) ); + } else { + // decryption failed, which could be because the part was encrypted but + // decryption failed, or because we didn't know if it was encrypted, tried, + // and failed. If the message was not actually encrypted, we continue + // assuming it's signed + if ( passphraseError || ( smimeType.isEmpty() && actuallyEncrypted ) ) { + isEncrypted = true; + signTestNode = 0; + } + + if ( isEncrypted ) { + kdDebug(5006) << "pkcs7 mime - ERROR: COULD NOT DECRYPT enveloped data !" << endl; + // paint the frame + messagePart.isDecryptable = false; + if ( mReader ) { + htmlWriter()->queue( writeSigstatHeader( messagePart, + cryptoProtocol(), + node->trueFromAddress() ) ); + if ( mReader->decryptMessage() ) + writePartIcon( &node->msgPart(), node->nodeId() ); + else + htmlWriter()->queue( QString::fromUtf8( decryptedData ) ); + htmlWriter()->queue( writeSigstatFooter( messagePart ) ); + } + } else { + kdDebug(5006) << "pkcs7 mime - NO encryption found" << endl; + } + } + if ( isEncrypted ) + node->setEncryptionState( KMMsgFullyEncrypted ); + } + + // We now try signature verification if necessarry. + if ( signTestNode ) { + if ( isSigned ) + kdDebug(5006) << "pkcs7 mime == S/MIME TYPE: opaque signed data" << endl; + else + kdDebug(5006) << "pkcs7 mime - type unknown - opaque signed data ?" << endl; + + bool sigFound = writeOpaqueOrMultipartSignedData( 0, + *signTestNode, + node->trueFromAddress(), + true, + 0, + std::vector(), + isEncrypted ); + if ( sigFound ) { + if ( !isSigned ) { + kdDebug(5006) << "pkcs7 mime - signature found - opaque signed data !" << endl; + isSigned = true; + } + signTestNode->setSignatureState( KMMsgFullySigned ); + if ( signTestNode != node ) + node->setSignatureState( KMMsgFullySigned ); + } else { + kdDebug(5006) << "pkcs7 mime - NO signature found :-(" << endl; + } + } + + return isSigned || isEncrypted; +} + +bool ObjectTreeParser::decryptChiasmus( const QByteArray& data, QByteArray& bodyDecoded, QString& errorText ) +{ + const Kleo::CryptoBackend::Protocol * chiasmus = + Kleo::CryptoBackendFactory::instance()->protocol( "Chiasmus" ); + Q_ASSERT( chiasmus ); + if ( !chiasmus ) + return false; + + const STD_NAMESPACE_PREFIX auto_ptr listjob( chiasmus->specialJob( "x-obtain-keys", QMap() ) ); + if ( !listjob.get() ) { + errorText = i18n( "Chiasmus backend does not offer the " + "\"x-obtain-keys\" function. Please report this bug." ); + return false; + } + + if ( listjob->exec() ) { + errorText = i18n( "Chiasmus Backend Error" ); + return false; + } + + const QVariant result = listjob->property( "result" ); + if ( result.type() != QVariant::StringList ) { + errorText = i18n( "Unexpected return value from Chiasmus backend: " + "The \"x-obtain-keys\" function did not return a " + "string list. Please report this bug." ); + return false; + } + + const QStringList keys = result.toStringList(); + if ( keys.empty() ) { + errorText = i18n( "No keys have been found. Please check that a " + "valid key path has been set in the Chiasmus " + "configuration." ); + return false; + } + + emit mReader->noDrag(); + ChiasmusKeySelector selectorDlg( mReader, i18n( "Chiasmus Decryption Key Selection" ), + keys, GlobalSettings::chiasmusDecryptionKey(), + GlobalSettings::chiasmusDecryptionOptions() ); + if ( selectorDlg.exec() != QDialog::Accepted ) + return false; + + GlobalSettings::setChiasmusDecryptionOptions( selectorDlg.options() ); + GlobalSettings::setChiasmusDecryptionKey( selectorDlg.key() ); + assert( !GlobalSettings::chiasmusDecryptionKey().isEmpty() ); + + Kleo::SpecialJob * job = chiasmus->specialJob( "x-decrypt", QMap() ); + if ( !job ) { + errorText = i18n( "Chiasmus backend does not offer the " + "\"x-decrypt\" function. Please report this bug." ); + return false; + } + + if ( !job->setProperty( "key", GlobalSettings::chiasmusDecryptionKey() ) || + !job->setProperty( "options", GlobalSettings::chiasmusDecryptionOptions() ) || + !job->setProperty( "input", data ) ) { + errorText = i18n( "The \"x-decrypt\" function does not accept " + "the expected parameters. Please report this bug." ); + return false; + } + + if ( job->exec() ) { + errorText = i18n( "Chiasmus Decryption Error" ); + return false; + } + + const QVariant resultData = job->property( "result" ); + if ( resultData.type() != QVariant::ByteArray ) { + errorText = i18n( "Unexpected return value from Chiasmus backend: " + "The \"x-decrypt\" function did not return a " + "byte array. Please report this bug." ); + return false; + } + bodyDecoded = resultData.toByteArray(); + return true; +} + +bool ObjectTreeParser::processApplicationChiasmusTextSubtype( partNode * curNode, ProcessResult & result ) +{ + if ( !mReader ) { + mRawReplyString = curNode->msgPart().bodyDecoded(); + mTextualContent += curNode->msgPart().bodyToUnicode(); + mTextualContentCharset = curNode->msgPart().charset(); + return true; + } + + QByteArray decryptedBody; + QString errorText; + const QByteArray data = curNode->msgPart().bodyDecodedBinary(); + bool bOkDecrypt = decryptChiasmus( data, decryptedBody, errorText ); + PartMetaData messagePart; + messagePart.isDecryptable = bOkDecrypt; + messagePart.isEncrypted = true; + messagePart.isSigned = false; + messagePart.errorText = errorText; + if ( mReader ) + htmlWriter()->queue( writeSigstatHeader( messagePart, + 0, //cryptPlugWrapper(), + curNode->trueFromAddress() ) ); + const QByteArray body = bOkDecrypt ? decryptedBody : data; + const QString chiasmusCharset = curNode->contentTypeParameter("chiasmus-charset"); + const QTextCodec* aCodec = chiasmusCharset.isEmpty() + ? codecFor( curNode ) + : KMMsgBase::codecForName( chiasmusCharset.ascii() ); + htmlWriter()->queue( quotedHTML( aCodec->toUnicode( body ), false /*decorate*/ ) ); + result.setInlineEncryptionState( KMMsgFullyEncrypted ); + if ( mReader ) + htmlWriter()->queue( writeSigstatFooter( messagePart ) ); + return true; +} + +bool ObjectTreeParser::processApplicationMsTnefSubtype( partNode *node, ProcessResult &result ) +{ + Q_UNUSED( result ); + if ( !mReader ) + return false; + + const QString fileName = mReader->writeMessagePartToTempFile( &node->msgPart(), node->nodeId() ); + KTNEFParser parser; + if ( !parser.openFile( fileName ) || !parser.message()) { + kdDebug() << k_funcinfo << "Could not parse " << fileName << endl; + return false; + } + + QPtrList tnefatts = parser.message()->attachmentList(); + if ( tnefatts.isEmpty() ) { + kdDebug() << k_funcinfo << "No attachments found in " << fileName << endl; + return false; + } + + if ( !showOnlyOneMimePart() ) { + QString label = node->msgPart().fileName().stripWhiteSpace(); + if ( label.isEmpty() ) + label = node->msgPart().name().stripWhiteSpace(); + label = KMMessage::quoteHtmlChars( label, true ); + const QString comment = KMMessage::quoteHtmlChars( node->msgPart().contentDescription(), true ); + const QString dir = QApplication::reverseLayout() ? "rtl" : "ltr" ; + + QString htmlStr = "" + "
"; + if ( !fileName.isEmpty() ) + htmlStr += "" + + label + ""; + else + htmlStr += label; + if ( !comment.isEmpty() ) + htmlStr += "
" + comment; + htmlStr += "
"; + htmlWriter()->queue( htmlStr ); + } + + for ( uint i = 0; i < tnefatts.count(); ++i ) { + KTNEFAttach *att = tnefatts.at( i ); + QString label = att->displayName(); + if( label.isEmpty() ) + label = att->name(); + label = KMMessage::quoteHtmlChars( label, true ); + + QString dir = mReader->createTempDir( "ktnef-" + QString::number( i ) ); + parser.extractFileTo( att->name(), dir ); + mReader->mTempFiles.append( dir + QDir::separator() + att->name() ); + QString href = "file:" + KURL::encode_string( dir + QDir::separator() + att->name() ); + + KMimeType::Ptr mimeType = KMimeType::mimeType( att->mimeTag() ); + QString iconName = KGlobal::instance()->iconLoader()->iconPath( mimeType->icon( QString(), false ), KIcon::Desktop ); + + htmlWriter()->queue( "
" ); + } + + if ( !showOnlyOneMimePart() ) + htmlWriter()->queue( "
" ); + + return true; +} + + void ObjectTreeParser::writeBodyString( const QCString & bodyString, + const QString & fromAddress, + const QTextCodec * codec, + ProcessResult & result, + bool decorate ) { + assert( mReader ); assert( codec ); + KMMsgSignatureState inlineSignatureState = result.inlineSignatureState(); + KMMsgEncryptionState inlineEncryptionState = result.inlineEncryptionState(); + writeBodyStr( bodyString, codec, fromAddress, + inlineSignatureState, inlineEncryptionState, decorate ); + result.setInlineSignatureState( inlineSignatureState ); + result.setInlineEncryptionState( inlineEncryptionState ); + } + + void ObjectTreeParser::writePartIcon( KMMessagePart * msgPart, int partNum, bool inlineImage ) { + if ( !mReader || !msgPart ) + return; + + kdDebug(5006) << "writePartIcon: PartNum: " << partNum << endl; + + QString label = msgPart->fileName(); + if( label.isEmpty() ) + label = msgPart->name(); + if( label.isEmpty() ) + label = "unnamed"; + label = KMMessage::quoteHtmlChars( label, true ); + + QString comment = msgPart->contentDescription(); + comment = KMMessage::quoteHtmlChars( comment, true ); + if ( label == comment ) comment = QString::null; + + QString fileName = mReader->writeMessagePartToTempFile( msgPart, partNum ); + + QString href = fileName.isEmpty() ? + "part://" + QString::number( partNum + 1 ) : + "file:" + KURL::encode_string( fileName ) ; + + QString iconName; + if( inlineImage ) + iconName = href; + else { + iconName = msgPart->iconName(); + if( iconName.right( 14 ) == "mime_empty.png" ) { + msgPart->magicSetType(); + iconName = msgPart->iconName(); + } + } + + QCString contentId = msgPart->contentId(); + if ( !contentId.isEmpty() ) { + htmlWriter()->embedPart( contentId, href ); + } + + if( inlineImage ) + // show the filename of the image below the embedded image + htmlWriter()->queue( "
" + "" + "
" + "" + "
" + comment + "

" ); + else + // show the filename next to the image + htmlWriter()->queue( "" + "
" + comment + "

" ); + } + +#define SIG_FRAME_COL_UNDEF 99 +#define SIG_FRAME_COL_RED -1 +#define SIG_FRAME_COL_YELLOW 0 +#define SIG_FRAME_COL_GREEN 1 +QString ObjectTreeParser::sigStatusToString( const Kleo::CryptoBackend::Protocol* cryptProto, + int status_code, + GpgME::Signature::Summary summary, + int& frameColor, + bool& showKeyInfos ) +{ + // note: At the moment frameColor and showKeyInfos are + // used for CMS only but not for PGP signatures + // pending(khz): Implement usage of these for PGP sigs as well. + showKeyInfos = true; + QString result; + if( cryptProto ) { + if( cryptProto == Kleo::CryptoBackendFactory::instance()->openpgp() ) { + // process enum according to it's definition to be read in + // GNU Privacy Guard CVS repository /gpgme/gpgme/gpgme.h + switch( status_code ) { + case 0: // GPGME_SIG_STAT_NONE + result = i18n("Error: Signature not verified"); + break; + case 1: // GPGME_SIG_STAT_GOOD + result = i18n("Good signature"); + break; + case 2: // GPGME_SIG_STAT_BAD + result = i18n("Bad signature"); + break; + case 3: // GPGME_SIG_STAT_NOKEY + result = i18n("No public key to verify the signature"); + break; + case 4: // GPGME_SIG_STAT_NOSIG + result = i18n("No signature found"); + break; + case 5: // GPGME_SIG_STAT_ERROR + result = i18n("Error verifying the signature"); + break; + case 6: // GPGME_SIG_STAT_DIFF + result = i18n("Different results for signatures"); + break; + /* PENDING(khz) Verify exact meaning of the following values: + case 7: // GPGME_SIG_STAT_GOOD_EXP + return i18n("Signature certificate is expired"); + break; + case 8: // GPGME_SIG_STAT_GOOD_EXPKEY + return i18n("One of the certificate's keys is expired"); + break; + */ + default: + result = ""; // do *not* return a default text here ! + break; + } + } + else if ( cryptProto == Kleo::CryptoBackendFactory::instance()->smime() ) { + // process status bits according to SigStatus_... + // definitions in kdenetwork/libkdenetwork/cryptplug.h + + if( summary == GpgME::Signature::None ) { + result = i18n("No status information available."); + frameColor = SIG_FRAME_COL_YELLOW; + showKeyInfos = false; + return result; + } + + if( summary & GpgME::Signature::Valid ) { + result = i18n("Good signature."); + // Note: + // Here we are work differently than KMail did before! + // + // The GOOD case ( == sig matching and the complete + // certificate chain was verified and is valid today ) + // by definition does *not* show any key + // information but just states that things are OK. + // (khz, according to LinuxTag 2002 meeting) + frameColor = SIG_FRAME_COL_GREEN; + showKeyInfos = false; + return result; + } + + // we are still there? OK, let's test the different cases: + + // we assume green, test for yellow or red (in this order!) + frameColor = SIG_FRAME_COL_GREEN; + QString result2; + if( summary & GpgME::Signature::KeyExpired ){ + // still is green! + result2 += i18n("One key has expired."); + } + if( summary & GpgME::Signature::SigExpired ){ + // and still is green! + result2 += i18n("The signature has expired."); + } + + // test for yellow: + if( summary & GpgME::Signature::KeyMissing ) { + result2 += i18n("Unable to verify: key missing."); + // if the signature certificate is missing + // we cannot show infos on it + showKeyInfos = false; + frameColor = SIG_FRAME_COL_YELLOW; + } + if( summary & GpgME::Signature::CrlMissing ){ + result2 += i18n("CRL not available."); + frameColor = SIG_FRAME_COL_YELLOW; + } + if( summary & GpgME::Signature::CrlTooOld ){ + result2 += i18n("Available CRL is too old."); + frameColor = SIG_FRAME_COL_YELLOW; + } + if( summary & GpgME::Signature::BadPolicy ){ + result2 += i18n("A policy was not met."); + frameColor = SIG_FRAME_COL_YELLOW; + } + if( summary & GpgME::Signature::SysError ){ + result2 += i18n("A system error occurred."); + // if a system error occurred + // we cannot trust any information + // that was given back by the plug-in + showKeyInfos = false; + frameColor = SIG_FRAME_COL_YELLOW; + } + + // test for red: + if( summary & GpgME::Signature::KeyRevoked ){ + // this is red! + result2 += i18n("One key has been revoked."); + frameColor = SIG_FRAME_COL_RED; + } + if( summary & GpgME::Signature::Red ) { + if( result2.isEmpty() ) + // Note: + // Here we are work differently than KMail did before! + // + // The BAD case ( == sig *not* matching ) + // by definition does *not* show any key + // information but just states that things are BAD. + // + // The reason for this: In this case ALL information + // might be falsificated, we can NOT trust the data + // in the body NOT the signature - so we don't show + // any key/signature information at all! + // (khz, according to LinuxTag 2002 meeting) + showKeyInfos = false; + frameColor = SIG_FRAME_COL_RED; + } + else + result = ""; + + if( SIG_FRAME_COL_GREEN == frameColor ) { + result = i18n("Good signature."); + } else if( SIG_FRAME_COL_RED == frameColor ) { + result = i18n("Bad signature."); + } else + result = ""; + + if( !result2.isEmpty() ) { + if( !result.isEmpty() ) + result.append("
"); + result.append( result2 ); + } + } + /* + // add i18n support for 3rd party plug-ins here: + else if (0 <= cryptPlug->libName().find( "yetanotherpluginname", 0, false )) { + + } + */ + } + return result; +} + + +static QString writeSimpleSigstatHeader( const PartMetaData &block ) +{ + QString html; + html += "
"; + + if ( block.signClass == "signErr" ) { + html += i18n( "Invalid signature." ); + } else if ( block.signClass == "signOkKeyBad" || block.signClass == "signWarn" ) { + html += i18n( "Not enough information to check signature validity." ); + } else if ( block.signClass == "signOkKeyOk" ) { + QString addr; + if ( !block.signerMailAddresses.isEmpty() ) + addr = block.signerMailAddresses.first(); + QString name = addr; + if ( name.isEmpty() ) + name = block.signer; + if ( addr.isEmpty() ) { + html += i18n( "Signature is valid." ); + } else { + html += i18n( "Signed by %2." ).arg( addr, name ); + } + } else { + // should not happen + html += i18n( "Unknown signature state" ); + } + html += ""; + html += ""; + html += i18n( "Show Details" ); + html += "
"; + return html; +} + +static QString beginVerboseSigstatHeader() +{ + return ""; + html += "
"; +} + +static QString makeShowAuditLogLink( const QString & auditLog ) { + if ( auditLog.isEmpty() ) + return i18n("No Audit Log available"); + + KURL url; + url.setProtocol( "kmail" ); + url.setPath( "showAuditLog" ); + url.addQueryItem( "log", auditLog ); + + return "" + i18n("The Audit Log is a detailed error log from the gnupg backend", "Show Audit Log") + ""; +} + +static QString endVerboseSigstatHeader( const PartMetaData & pmd ) +{ + QString html; + html += ""; + html += ""; + html += i18n( "Hide Details" ); + html += "
"; + html += makeShowAuditLogLink( pmd.auditLog ); + html += "
"; + return html; +} + +QString ObjectTreeParser::writeSigstatHeader( PartMetaData & block, + const Kleo::CryptoBackend::Protocol * cryptProto, + const QString & fromAddress, + const QString & filename ) +{ + const bool isSMIME = cryptProto && ( cryptProto == Kleo::CryptoBackendFactory::instance()->smime() ); + QString signer = block.signer; + + QString htmlStr, simpleHtmlStr; + QString dir = ( QApplication::reverseLayout() ? "rtl" : "ltr" ); + QString cellPadding("cellpadding=\"1\""); + + if( block.isEncapsulatedRfc822Message ) + { + htmlStr += "" + "
"; + if( !filename.isEmpty() ) + htmlStr += "" + + i18n("Encapsulated message") + ""; + else + htmlStr += i18n("Encapsulated message"); + htmlStr += "
"; + } + + if( block.isEncrypted ) + { + htmlStr += "" + "
"; + if( block.isDecryptable ) + htmlStr += i18n("Encrypted message"); + else { + htmlStr += i18n("Encrypted message (decryption not possible)"); + if( !block.errorText.isEmpty() ) + htmlStr += "
" + i18n("Reason: %1").arg( block.errorText ); + } + htmlStr += "
"; + } + simpleHtmlStr = htmlStr; + + if( block.isSigned ) { + QStringList& blockAddrs( block.signerMailAddresses ); + // note: At the moment frameColor and showKeyInfos are + // used for CMS only but not for PGP signatures + // pending(khz): Implement usage of these for PGP sigs as well. + int frameColor = SIG_FRAME_COL_UNDEF; + bool showKeyInfos; + bool onlyShowKeyURL = false; + bool cannotCheckSignature = true; + QString statusStr = sigStatusToString( cryptProto, + block.status_code, + block.sigSummary, + frameColor, + showKeyInfos ); + // if needed fallback to english status text + // that was reported by the plugin + if( statusStr.isEmpty() ) + statusStr = block.status; + if( block.technicalProblem ) + frameColor = SIG_FRAME_COL_YELLOW; + + switch( frameColor ){ + case SIG_FRAME_COL_RED: + cannotCheckSignature = false; + break; + case SIG_FRAME_COL_YELLOW: + cannotCheckSignature = true; + break; + case SIG_FRAME_COL_GREEN: + cannotCheckSignature = false; + break; + } + + // compose the string for displaying the key ID + // either as URL or not linked (for PGP) + // note: Once we can start PGP key manager programs + // from within KMail we could change this and + // always show the URL. (khz, 2002/06/27) + QString startKeyHREF; + if( isSMIME ) + startKeyHREF = + QString("") + .arg( cryptProto->displayName(), + cryptProto->name(), + block.keyId ); + QString keyWithWithoutURL + = isSMIME + ? QString("%1%2") + .arg( startKeyHREF, + cannotCheckSignature ? i18n("[Details]") : ("0x" + block.keyId) ) + : "0x" + QString::fromUtf8( block.keyId ); + + + // temporary hack: always show key infos! + showKeyInfos = true; + + // Sorry for using 'black' as null color but .isValid() + // checking with QColor default c'tor did not work for + // some reason. + if( isSMIME && (SIG_FRAME_COL_UNDEF != frameColor) ) { + + // new frame settings for CMS: + // beautify the status string + if( !statusStr.isEmpty() ) { + statusStr.prepend(""); + statusStr.append( ""); + } + + // special color handling: S/MIME uses only green/yellow/red. + switch( frameColor ) { + case SIG_FRAME_COL_RED: + block.signClass = "signErr";//"signCMSRed"; + onlyShowKeyURL = true; + break; + case SIG_FRAME_COL_YELLOW: + if( block.technicalProblem ) + block.signClass = "signWarn"; + else + block.signClass = "signOkKeyBad";//"signCMSYellow"; + break; + case SIG_FRAME_COL_GREEN: + block.signClass = "signOkKeyOk";//"signCMSGreen"; + // extra hint for green case + // that email addresses in DN do not match fromAddress + QString greenCaseWarning; + QString msgFrom( KPIM::getEmailAddress(fromAddress) ); + QString certificate; + if( block.keyId.isEmpty() ) + certificate = i18n("certificate"); + else + certificate = startKeyHREF + i18n("certificate") + ""; + if( !blockAddrs.empty() ){ + if( blockAddrs.grep( + msgFrom, + false ).isEmpty() ) { + greenCaseWarning = + "" + + i18n("Warning:") + + " " + + i18n("Sender's mail address is not stored " + "in the %1 used for signing.").arg(certificate) + + "
" + + i18n("sender: ") + + msgFrom + + "
" + + i18n("stored: "); + // We cannot use Qt's join() function here but + // have to join the addresses manually to + // extract the mail addresses (without '<''>') + // before including it into our string: + bool bStart = true; + for(QStringList::ConstIterator it = blockAddrs.begin(); + it != blockAddrs.end(); ++it ){ + if( !bStart ) + greenCaseWarning.append(",
   "); + bStart = false; + greenCaseWarning.append( KPIM::getEmailAddress(*it) ); + } + } + } else { + greenCaseWarning = + "" + + i18n("Warning:") + + " " + + i18n("No mail address is stored in the %1 used for signing, " + "so we cannot compare it to the sender's address %2.") + .arg(certificate,msgFrom); + } + if( !greenCaseWarning.isEmpty() ) { + if( !statusStr.isEmpty() ) + statusStr.append("
 
"); + statusStr.append( greenCaseWarning ); + } + break; + } + + QString frame = "" + "
"; + htmlStr += frame + beginVerboseSigstatHeader(); + simpleHtmlStr += frame; + simpleHtmlStr += writeSimpleSigstatHeader( block ); + if( block.technicalProblem ) { + htmlStr += block.errorText; + } + else if( showKeyInfos ) { + if( cannotCheckSignature ) { + htmlStr += i18n( "Not enough information to check " + "signature. %1" ) + .arg( keyWithWithoutURL ); + } + else { + + if (block.signer.isEmpty()) + signer = ""; + else { + if( !blockAddrs.empty() ){ + QString address = KMMessage::encodeMailtoUrl( blockAddrs.first() ); + signer = "" + signer + ""; + } + } + + if( block.keyId.isEmpty() ) { + if( signer.isEmpty() || onlyShowKeyURL ) + htmlStr += i18n( "Message was signed with unknown key." ); + else + htmlStr += i18n( "Message was signed by %1." ) + .arg( signer ); + } else { + QDateTime created = block.creationTime; + if( created.isValid() ) { + if( signer.isEmpty() ) { + if( onlyShowKeyURL ) + htmlStr += i18n( "Message was signed with key %1." ) + .arg( keyWithWithoutURL ); + else + htmlStr += i18n( "Message was signed on %1 with key %2." ) + .arg( KGlobal::locale()->formatDateTime( created ), + keyWithWithoutURL ); + } + else { + if( onlyShowKeyURL ) + htmlStr += i18n( "Message was signed with key %1." ) + .arg( keyWithWithoutURL ); + else + htmlStr += i18n( "Message was signed by %3 on %1 with key %2" ) + .arg( KGlobal::locale()->formatDateTime( created ), + keyWithWithoutURL, + signer ); + } + } + else { + if( signer.isEmpty() || onlyShowKeyURL ) + htmlStr += i18n( "Message was signed with key %1." ) + .arg( keyWithWithoutURL ); + else + htmlStr += i18n( "Message was signed by %2 with key %1." ) + .arg( keyWithWithoutURL, + signer ); + } + } + } + htmlStr += "
"; + if( !statusStr.isEmpty() ) { + htmlStr += " 
"; + htmlStr += i18n( "Status: " ); + htmlStr += statusStr; + } + } else { + htmlStr += statusStr; + } + frame = "
"; + htmlStr += endVerboseSigstatHeader( block ) + frame; + simpleHtmlStr += frame; + + } else { + + // old frame settings for PGP: + + if( block.signer.isEmpty() || block.technicalProblem ) { + block.signClass = "signWarn"; + QString frame = "" + "
"; + htmlStr += frame + beginVerboseSigstatHeader(); + simpleHtmlStr += frame; + simpleHtmlStr += writeSimpleSigstatHeader( block ); + if( block.technicalProblem ) { + htmlStr += block.errorText; + } + else { + if( !block.keyId.isEmpty() ) { + QDateTime created = block.creationTime; + if ( created.isValid() ) + htmlStr += i18n( "Message was signed on %1 with unknown key %2." ) + .arg( KGlobal::locale()->formatDateTime( created ), + keyWithWithoutURL ); + else + htmlStr += i18n( "Message was signed with unknown key %1." ) + .arg( keyWithWithoutURL ); + } + else + htmlStr += i18n( "Message was signed with unknown key." ); + htmlStr += "
"; + htmlStr += i18n( "The validity of the signature cannot be " + "verified." ); + if( !statusStr.isEmpty() ) { + htmlStr += "
"; + htmlStr += i18n( "Status: " ); + htmlStr += ""; + htmlStr += statusStr; + htmlStr += ""; + } + } + frame = "
"; + htmlStr += endVerboseSigstatHeader( block ) + frame; + simpleHtmlStr += frame; + } + else + { + // HTMLize the signer's user id and create mailto: link + signer = KMMessage::quoteHtmlChars( signer, true ); + signer = "" + signer + ""; + + if (block.isGoodSignature) { + if( block.keyTrust < Kpgp::KPGP_VALIDITY_MARGINAL ) + block.signClass = "signOkKeyBad"; + else + block.signClass = "signOkKeyOk"; + QString frame = "" + "" + "
"; + htmlStr += frame + beginVerboseSigstatHeader(); + simpleHtmlStr += frame; + simpleHtmlStr += writeSimpleSigstatHeader( block ); + if( !block.keyId.isEmpty() ) + htmlStr += i18n( "Message was signed by %2 (Key ID: %1)." ) + .arg( keyWithWithoutURL, + signer ); + else + htmlStr += i18n( "Message was signed by %1." ).arg( signer ); + htmlStr += "
"; + + switch( block.keyTrust ) + { + case Kpgp::KPGP_VALIDITY_UNKNOWN: + htmlStr += i18n( "The signature is valid, but the key's " + "validity is unknown." ); + break; + case Kpgp::KPGP_VALIDITY_MARGINAL: + htmlStr += i18n( "The signature is valid and the key is " + "marginally trusted." ); + break; + case Kpgp::KPGP_VALIDITY_FULL: + htmlStr += i18n( "The signature is valid and the key is " + "fully trusted." ); + break; + case Kpgp::KPGP_VALIDITY_ULTIMATE: + htmlStr += i18n( "The signature is valid and the key is " + "ultimately trusted." ); + break; + default: + htmlStr += i18n( "The signature is valid, but the key is " + "untrusted." ); + } + frame = "
"; + htmlStr += endVerboseSigstatHeader( block ) + frame; + simpleHtmlStr += frame; + } + else + { + block.signClass = "signErr"; + QString frame = "" + "" + ""; + htmlStr += "
"; + htmlStr += frame + beginVerboseSigstatHeader(); + simpleHtmlStr += frame; + simpleHtmlStr += writeSimpleSigstatHeader( block ); + if( !block.keyId.isEmpty() ) + htmlStr += i18n( "Message was signed by %2 (Key ID: %1)." ) + .arg( keyWithWithoutURL, + signer ); + else + htmlStr += i18n( "Message was signed by %1." ).arg( signer ); + htmlStr += "
"; + htmlStr += i18n("Warning: The signature is bad."); + frame = "
"; + htmlStr += endVerboseSigstatHeader( block ) + frame; + simpleHtmlStr += frame; + } + } + } + } + + if ( mReader->showSignatureDetails() ) + return htmlStr; + return simpleHtmlStr; +} + +QString ObjectTreeParser::writeSigstatFooter( PartMetaData& block ) +{ + QString dir = ( QApplication::reverseLayout() ? "rtl" : "ltr" ); + + QString htmlStr; + + if (block.isSigned) { + htmlStr += "
" + + i18n( "End of signed message" ) + + "
"; + } + + if (block.isEncrypted) { + htmlStr += "
" + + i18n( "End of encrypted message" ) + + "
"; + } + + if( block.isEncapsulatedRfc822Message ) + { + htmlStr += "
" + + i18n( "End of encapsulated message" ) + + "
"; + } + + return htmlStr; +} + +//----------------------------------------------------------------------------- +void ObjectTreeParser::writeBodyStr( const QCString& aStr, const QTextCodec *aCodec, + const QString& fromAddress ) +{ + KMMsgSignatureState dummy1; + KMMsgEncryptionState dummy2; + writeBodyStr( aStr, aCodec, fromAddress, dummy1, dummy2, false ); +} + +//----------------------------------------------------------------------------- +void ObjectTreeParser::writeBodyStr( const QCString& aStr, const QTextCodec *aCodec, + const QString& fromAddress, + KMMsgSignatureState& inlineSignatureState, + KMMsgEncryptionState& inlineEncryptionState, + bool decorate ) +{ + bool goodSignature = false; + Kpgp::Module* pgp = Kpgp::Module::getKpgp(); + assert(pgp != 0); + bool isPgpMessage = false; // true if the message contains at least one + // PGP MESSAGE or one PGP SIGNED MESSAGE block + QString dir = ( QApplication::reverseLayout() ? "rtl" : "ltr" ); + QString headerStr = QString("
").arg(dir); + + inlineSignatureState = KMMsgNotSigned; + inlineEncryptionState = KMMsgNotEncrypted; + QPtrList pgpBlocks; + QStrList nonPgpBlocks; + if( Kpgp::Module::prepareMessageForDecryption( aStr, pgpBlocks, nonPgpBlocks ) ) + { + bool isEncrypted = false, isSigned = false; + bool fullySignedOrEncrypted = true; + bool firstNonPgpBlock = true; + bool couldDecrypt = false; + QString signer; + QCString keyId; + QString decryptionError; + Kpgp::Validity keyTrust = Kpgp::KPGP_VALIDITY_FULL; + + QPtrListIterator pbit( pgpBlocks ); + + QStrListIterator npbit( nonPgpBlocks ); + + QString htmlStr; + for( ; *pbit != 0; ++pbit, ++npbit ) + { + // insert the next Non-OpenPGP block + QCString str( *npbit ); + if( !str.isEmpty() ) { + htmlStr += quotedHTML( aCodec->toUnicode( str ), decorate ); + kdDebug( 5006 ) << "Non-empty Non-OpenPGP block found: '" << str + << "'" << endl; + // treat messages with empty lines before the first clearsigned + // block as fully signed/encrypted + if( firstNonPgpBlock ) { + // check whether str only consists of \n + for( QCString::ConstIterator c = str.begin(); *c; ++c ) { + if( *c != '\n' ) { + fullySignedOrEncrypted = false; + break; + } + } + } + else { + fullySignedOrEncrypted = false; + } + } + firstNonPgpBlock = false; + + //htmlStr += "
"; + + Kpgp::Block* block = *pbit; + if( ( block->type() == Kpgp::PgpMessageBlock && + // ### Workaround for bug 56693 + !kmkernel->contextMenuShown() ) || + ( block->type() == Kpgp::ClearsignedBlock ) ) + { + isPgpMessage = true; + if( block->type() == Kpgp::PgpMessageBlock ) + { + if ( mReader ) + emit mReader->noDrag(); + // try to decrypt this OpenPGP block + couldDecrypt = block->decrypt(); + isEncrypted = block->isEncrypted(); + if (!couldDecrypt) { + decryptionError = pgp->lastErrorMsg(); + } + } + else + { + // try to verify this OpenPGP block + block->verify(); + } + + isSigned = block->isSigned(); + if( isSigned ) + { + keyId = block->signatureKeyId(); + signer = block->signatureUserId(); + if( !signer.isEmpty() ) + { + goodSignature = block->goodSignature(); + + if( !keyId.isEmpty() ) { + keyTrust = pgp->keyTrust( keyId ); + Kpgp::Key* key = pgp->publicKey( keyId ); + if ( key ) { + // Use the user ID from the key because this one + // is charset safe. + signer = key->primaryUserID(); + } + } + else + // This is needed for the PGP 6 support because PGP 6 doesn't + // print the key id of the signing key if the key is known. + keyTrust = pgp->keyTrust( signer ); + } + } + + if( isSigned ) + inlineSignatureState = KMMsgPartiallySigned; + if( isEncrypted ) + inlineEncryptionState = KMMsgPartiallyEncrypted; + + PartMetaData messagePart; + + messagePart.isSigned = isSigned; + messagePart.technicalProblem = false; + messagePart.isGoodSignature = goodSignature; + messagePart.isEncrypted = isEncrypted; + messagePart.isDecryptable = couldDecrypt; + messagePart.decryptionError = decryptionError; + messagePart.signer = signer; + messagePart.keyId = keyId; + messagePart.keyTrust = keyTrust; + + htmlStr += writeSigstatHeader( messagePart, 0, fromAddress ); + + htmlStr += quotedHTML( aCodec->toUnicode( block->text() ), decorate ); + htmlStr += writeSigstatFooter( messagePart ); + } + else // block is neither message block nor clearsigned block + htmlStr += quotedHTML( aCodec->toUnicode( block->text() ), + decorate ); + } + + // add the last Non-OpenPGP block + QCString str( nonPgpBlocks.last() ); + if( !str.isEmpty() ) { + htmlStr += quotedHTML( aCodec->toUnicode( str ), decorate ); + // Even if the trailing Non-OpenPGP block isn't empty we still + // consider the message part fully signed/encrypted because else + // all inline signed mailing list messages would only be partially + // signed because of the footer which is often added by the mailing + // list software. IK, 2003-02-15 + } + if( fullySignedOrEncrypted ) { + if( inlineSignatureState == KMMsgPartiallySigned ) + inlineSignatureState = KMMsgFullySigned; + if( inlineEncryptionState == KMMsgPartiallyEncrypted ) + inlineEncryptionState = KMMsgFullyEncrypted; + } + htmlWriter()->queue( htmlStr ); + } + else + htmlWriter()->queue( quotedHTML( aCodec->toUnicode( aStr ), decorate ) ); +} + + +QString ObjectTreeParser::quotedHTML( const QString& s, bool decorate ) +{ + assert( mReader ); + assert( cssHelper() ); + + int convertFlags = LinkLocator::PreserveSpaces; + if ( decorate && GlobalSettings::self()->showEmoticons() ) { + convertFlags |= LinkLocator::ReplaceSmileys; + } + QString htmlStr; + const QString normalStartTag = cssHelper()->nonQuotedFontTag(); + QString quoteFontTag[3]; + QString deepQuoteFontTag[3]; + for ( int i = 0 ; i < 3 ; ++i ) { + quoteFontTag[i] = cssHelper()->quoteFontTag( i ); + deepQuoteFontTag[i] = cssHelper()->quoteFontTag( i+3 ); + } + const QString normalEndTag = "
"; + const QString quoteEnd = ""; + + unsigned int pos, beg; + const unsigned int length = s.length(); + + // skip leading empty lines + for ( pos = 0; pos < length && s[pos] <= ' '; pos++ ); + while (pos > 0 && (s[pos-1] == ' ' || s[pos-1] == '\t')) pos--; + beg = pos; + + int currQuoteLevel = -2; // -2 == no previous lines + bool curHidden = false; // no hide any block + + while (begshowExpandQuotesMark() ) + { + // Cache Icons + if ( mCollapseIcon.isEmpty() ) { + mCollapseIcon= LinkLocator::pngToDataUrl( + KGlobal::instance()->iconLoader()->iconPath( "quotecollapse",0 )); + } + if ( mExpandIcon.isEmpty() ) + mExpandIcon= LinkLocator::pngToDataUrl( + KGlobal::instance()->iconLoader()->iconPath( "quoteexpand",0 )); + } + + for (unsigned int p=0; p': + case '|': + actQuoteLevel++; + break; + case ' ': // spaces and tabs are allowed between the quote markers + case '\t': + case '\r': + break; + default: // stop quoting depth calculation + p = line.length(); + break; + } + } /* for() */ + + bool actHidden = false; + QString textExpand; + + // This quoted line needs be hiden + if (GlobalSettings::self()->showExpandQuotesMark() && mReader->mLevelQuote >= 0 + && mReader->mLevelQuote <= ( actQuoteLevel ) ) + actHidden = true; + + if ( actQuoteLevel != currQuoteLevel ) { + /* finish last quotelevel */ + if (currQuoteLevel == -1) + htmlStr.append( normalEndTag ); + else if ( currQuoteLevel >= 0 && !curHidden ) + htmlStr.append( quoteEnd ); + + /* start new quotelevel */ + if (actQuoteLevel == -1) + htmlStr += normalStartTag; + else + { + if ( GlobalSettings::self()->showExpandQuotesMark() ) + { + if ( actHidden ) + { + //only show the QuoteMark when is the first line of the level hidden + if ( !curHidden ) + { + //Expand all quotes + htmlStr += "
" ; + htmlStr += QString( "" + "\"\"" ) + .arg(-1) + .arg( mExpandIcon ); + htmlStr += "

"; + htmlStr += quoteEnd; + } + }else { + htmlStr += "
" ; + htmlStr += QString( "" + "\"\"" ) + .arg(actQuoteLevel) + .arg( mCollapseIcon); + htmlStr += "
"; + if ( actQuoteLevel < 3 ) + htmlStr += quoteFontTag[actQuoteLevel]; + else + htmlStr += deepQuoteFontTag[actQuoteLevel%3]; + } + } else + if ( actQuoteLevel < 3 ) + htmlStr += quoteFontTag[actQuoteLevel]; + else + htmlStr += deepQuoteFontTag[actQuoteLevel%3]; + } + currQuoteLevel = actQuoteLevel; + } + curHidden = actHidden; + + + if ( !actHidden ) + { + // don't write empty
blocks (they have zero height) + // ignore ^M DOS linebreaks + if( !line.replace('\015', "").isEmpty() ) + { + htmlStr +=QString( "
" ).arg( line.isRightToLeft() ? "rtl":"ltr" ); + htmlStr += LinkLocator::convertToHtml( line, convertFlags ); + htmlStr += QString( "
" ); + } + else + htmlStr += "
"; + } + } /* while() */ + + /* really finish the last quotelevel */ + if (currQuoteLevel == -1) + htmlStr.append( normalEndTag ); + else + htmlStr.append( quoteEnd ); + + //kdDebug(5006) << "KMReaderWin::quotedHTML:\n" + // << "========================================\n" + // << htmlStr + // << "\n======================================\n"; + return htmlStr; +} + + + + const QTextCodec * ObjectTreeParser::codecFor( partNode * node ) const { + assert( node ); + if ( mReader && mReader->overrideCodec() ) + return mReader->overrideCodec(); + return node->msgPart().codec(); + } + +#ifdef MARCS_DEBUG + void ObjectTreeParser::dumpToFile( const char * filename, const char * start, + size_t len ) { + assert( filename ); + + QFile f( filename ); + if ( f.open( IO_WriteOnly ) ) { + if ( start ) { + QDataStream ds( &f ); + ds.writeRawBytes( start, len ); + } + f.close(); // If data is 0 we just create a zero length file. + } + } +#endif // !NDEBUG + + +} // namespace KMail -- cgit v1.2.3