diff --git a/messageviewer/viewer/objecttreeparser.cpp b/messageviewer/viewer/objecttreeparser.cpp index 10e5f27644..96af6059c0 100644 --- a/messageviewer/viewer/objecttreeparser.cpp +++ b/messageviewer/viewer/objecttreeparser.cpp @@ -1,3531 +1,3531 @@ /* -*- mode: C++; c-file-style: "gnu" -*- objecttreeparser.cpp This file is part of KMail, the KDE mail client. Copyright (c) 2003 Marc Mutz Copyright (C) 2002-2004 Klarälvdalens Datakonsult AB, a KDAB Group company, info@kdab.net Copyright (c) 2009 Andras Mantia KMail is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License, version 2, as published by the Free Software Foundation. KMail is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA In addition, as a special exception, the copyright holders give permission to link the code of this program with any edition of the Qt library by Trolltech AS, Norway (or with modified versions of Qt that use the same license as Qt), and distribute linked combinations including the two. You must obey the GNU General Public License in all respects for all of the code used other than Qt. If you modify this file, you may extend this exception to your version of the file, but you are not obligated to do so. If you do not wish to do so, delete this exception statement from your version. */ // MessageViewer includes #include "objecttreeparser.h" #include "objecttreeparser_p.h" #include "objecttreesourceif.h" #include "utils/autoqpointer.h" #include "viewer/viewer_p.h" #include "partmetadata.h" #include "attachmentstrategy.h" #include "interfaces/htmlwriter.h" #include "widgets/htmlstatusbar.h" #include "csshelper.h" #include "bodypartformatter.h" #include "viewer/bodypartformatterfactory.h" #include "viewer/partnodebodypart.h" #include "interfaces/bodypartformatter.h" #include "settings/globalsettings.h" #include "utils/util.h" #include "kleojobexecutor.h" #include "viewer/nodehelper.h" #include "utils/iconnamecache.h" #include "viewer/htmlquotecolorer.h" #include "chiasmuskeyselector.h" // KDEPIM includes #include #include #include #include #include #include #include #include #include #include #include // KDEPIMLIBS includes #include #include #include #include #include #include #include #include #include // KDE includes #include #include #include #include #include #include #include #include #include #include // Qt includes #include #include #include #include #include #include #include #include #include #include #ifdef KDEPIM_NO_WEBKIT # include #else # include # include #endif // other includes #include #include #include #include #include #include #include using KPIMUtils::LinkLocator; using namespace MessageViewer; using namespace MessageCore; // A small class that eases temporary CryptPlugWrapper changes: class ObjectTreeParser::CryptoProtocolSaver { ObjectTreeParser * otp; const Kleo::CryptoBackend::Protocol * protocol; public: CryptoProtocolSaver( ObjectTreeParser * _otp, const Kleo::CryptoBackend::Protocol* _w ) : otp( _otp ), protocol( _otp ? _otp->cryptoProtocol() : 0 ) { if ( otp ) otp->setCryptoProtocol( _w ); } ~CryptoProtocolSaver() { if ( otp ) otp->setCryptoProtocol( protocol ); } }; ObjectTreeParser::ObjectTreeParser( const ObjectTreeParser *topLevelParser, bool showOnlyOneMimePart, bool keepEncryptions, bool includeSignatures, const AttachmentStrategy * strategy ) : mSource( topLevelParser->mSource ), mNodeHelper( topLevelParser->mNodeHelper ), mTopLevelContent( topLevelParser->mTopLevelContent ), mCryptoProtocol( topLevelParser->mCryptoProtocol ), mShowOnlyOneMimePart( showOnlyOneMimePart ), mKeepEncryptions( keepEncryptions ), mIncludeSignatures( includeSignatures ), mHasPendingAsyncJobs( false ), mAllowAsync( topLevelParser->mAllowAsync ), mShowRawToltecMail( false ), mAttachmentStrategy( strategy ) { init(); } ObjectTreeParser::ObjectTreeParser( ObjectTreeSourceIf *source, MessageViewer::NodeHelper* nodeHelper, const Kleo::CryptoBackend::Protocol * protocol, bool showOnlyOneMimePart, bool keepEncryptions, bool includeSignatures, const AttachmentStrategy * strategy ) : mSource( source ), mNodeHelper( nodeHelper ), mTopLevelContent( 0 ), mCryptoProtocol( protocol ), mShowOnlyOneMimePart( showOnlyOneMimePart ), mKeepEncryptions( keepEncryptions ), mIncludeSignatures( includeSignatures ), mHasPendingAsyncJobs( false ), mAllowAsync( false ), mShowRawToltecMail( false ), mAttachmentStrategy( strategy ) { init(); } void ObjectTreeParser::init() { assert( mSource ); if ( !attachmentStrategy() ) mAttachmentStrategy = mSource->attachmentStrategy(); if ( !mNodeHelper ) { mNodeHelper = new NodeHelper(); mDeleteNodeHelper = true; } else { mDeleteNodeHelper = false; } } ObjectTreeParser::ObjectTreeParser( const ObjectTreeParser & other ) : mSource( other.mSource ), mNodeHelper( other.nodeHelper() ), //TODO(Andras) hm, review what happens if mDeleteNodeHelper was true in the source mTopLevelContent( other.mTopLevelContent ), mCryptoProtocol( other.cryptoProtocol() ), mShowOnlyOneMimePart( other.showOnlyOneMimePart() ), mKeepEncryptions( other.keepEncryptions() ), mIncludeSignatures( other.includeSignatures() ), mHasPendingAsyncJobs( other.hasPendingAsyncJobs() ), mAllowAsync( other.allowAsync() ), mAttachmentStrategy( other.attachmentStrategy() ), mDeleteNodeHelper( false ) // TODO see above { } ObjectTreeParser::~ObjectTreeParser() { if ( mDeleteNodeHelper ) { delete mNodeHelper; mNodeHelper = 0; } } void ObjectTreeParser::copyContentFrom( const ObjectTreeParser *other ) { mRawDecryptedBody += other->rawDecryptedBody(); mPlainTextContent += other->plainTextContent(); mHtmlContent += other->htmlContent(); if ( !other->plainTextContentCharset().isEmpty() ) { mPlainTextContentCharset = other->plainTextContentCharset(); } if ( !other->htmlContentCharset().isEmpty() ) { mHtmlContentCharset = other->htmlContentCharset(); } } void ObjectTreeParser::createAndParseTempNode( KMime::Content* parentNode, const char* content, const char* cntDesc ) { // kDebug() << "CONTENT: " << QByteArray( content ).left( 100 ) << " CNTDESC: " << cntDesc; KMime::Content *newNode = new KMime::Content(); newNode->setContent( KMime::CRLFtoLF( content ) ); newNode->parse(); /* kDebug() << "MEDIATYPE: " << newNode->contentType()->mediaType() << newNode->contentType()->mimeType() ; kDebug() << "DECODEDCONTENT: " << newNode->decodedContent().left(400); kDebug() << "ENCODEDCONTENT: " << newNode->encodedContent().left(400); kDebug() << "BODY: " << newNode->body().left(400); */ if ( !newNode->head().isEmpty() ) { newNode->contentDescription()->from7BitString( cntDesc ); } mNodeHelper->attachExtraContent( parentNode, newNode ); ObjectTreeParser otp( this ); otp.parseObjectTreeInternal( newNode ); copyContentFrom( &otp ); } //----------------------------------------------------------------------------- void ObjectTreeParser::parseObjectTree( KMime::Content * node ) { mTopLevelContent = node; parseObjectTreeInternal( node ); } void ObjectTreeParser::parseObjectTreeInternal( KMime::Content * node ) { if ( !node ) return; // reset pending async jobs state (we'll rediscover pending jobs as we go) mHasPendingAsyncJobs = false; // reset "processed" flags for... if ( showOnlyOneMimePart() ) { // ... this node and all descendants mNodeHelper->setNodeUnprocessed( node, false ); if ( MessageCore::NodeHelper::firstChild( node ) ) { mNodeHelper->setNodeUnprocessed( node, true ); } } else if ( !node->parent() ) { // ...this node and all it's siblings and descendants mNodeHelper->setNodeUnprocessed( node, true ); } // Make sure the whole content is relative, so that nothing is painted over the header // if a malicious message uses absolute positioning. // Also force word wrapping, which is useful for printing, see https://issues.kolab.org/issue3992. bool isRoot = node->isTopLevel(); if ( isRoot && htmlWriter() ) htmlWriter()->queue( QLatin1String("
\n") ); for( ; node ; node = MessageCore::NodeHelper::nextSibling( node ) ) { if ( mNodeHelper->nodeProcessed( node ) ) { continue; } ProcessResult processResult( mNodeHelper ); KMime::ContentIndex contentIndex = node->index(); if ( htmlWriter() /*&& contentIndex.isValid()*/ ) htmlWriter()->queue( QString::fromLatin1("").arg( contentIndex.toString() ) ); QByteArray mediaType( "text" ); QByteArray subType( "plain" ); if ( node->contentType( false ) && !node->contentType()->mediaType().isEmpty() && !node->contentType()->subType().isEmpty() ) { mediaType = node->contentType()->mediaType(); subType = node->contentType()->subType(); } // First, try if an external plugin can handle this MIME part if ( const Interface::BodyPartFormatter * formatter = BodyPartFormatterFactory::instance()->createFor( mediaType, subType ) ) { PartNodeBodyPart part( mTopLevelContent, node, mNodeHelper, codecFor( node ) ); // Set the default display strategy for this body part relying on the // identity of Interface::BodyPart::Display and AttachmentStrategy::Display part.setDefaultDisplay( (Interface::BodyPart::Display) attachmentStrategy()->defaultDisplay( node ) ); writeAttachmentMarkHeader( node ); mNodeHelper->setNodeDisplayedEmbedded( node, true ); QObject * asyncResultObserver = allowAsync() ? mSource->sourceObject() : 0; const Interface::BodyPartFormatter::Result result = formatter->format( &part, htmlWriter(), asyncResultObserver ); switch ( result ) { case Interface::BodyPartFormatter::AsIcon: processResult.setNeverDisplayInline( true ); mNodeHelper->setNodeDisplayedEmbedded( node, false ); // fall through: case Interface::BodyPartFormatter::Failed: defaultHandling( node, processResult ); break; case Interface::BodyPartFormatter::Ok: case Interface::BodyPartFormatter::NeedContent: // FIXME: incomplete content handling ; } writeAttachmentMarkFooter(); // No external plugin can handle the MIME part, handle it internally } else { const BodyPartFormatter * bpf = BodyPartFormatter::createFor( mediaType, subType ); if ( !bpf ) { kFatal() << "THIS SHOULD NO LONGER HAPPEN:" << mediaType << '/' << subType; } writeAttachmentMarkHeader( node ); if ( bpf && !bpf->process( this, node, processResult ) ) { defaultHandling( node, processResult ); } writeAttachmentMarkFooter(); } mNodeHelper->setNodeProcessed( node, false); // adjust signed/encrypted flags if inline PGP was found processResult.adjustCryptoStatesOfNode( node ); if ( showOnlyOneMimePart() ) break; } if ( isRoot && htmlWriter() ) htmlWriter()->queue( QLatin1String("
\n") ); } void ObjectTreeParser::defaultHandling( KMime::Content * node, ProcessResult & result ) { // ### (mmutz) default handling should go into the respective // ### bodypartformatters. if ( !htmlWriter() ) { kWarning() << "no htmlWriter()"; return; } // always show images in multipart/related when showing in html, not with an additional icon if ( result.isImage() && node->parent() && node->parent()->contentType()->subType() == "related" && mSource->htmlMail() && !showOnlyOneMimePart() ) { QString fileName = mNodeHelper->writeNodeToTempFile( node ); QString href = QLatin1String("file:///") + fileName; QByteArray cid = node->contentID()->identifier(); htmlWriter()->embedPart( cid, href ); nodeHelper()->setNodeDisplayedEmbedded( node, true ); return; } if ( node->contentType()->mimeType() == QByteArray( "application/octet-stream" ) && ( node->contentType()->name().endsWith( QString::fromLatin1( "p7m" ) ) || node->contentType()->name().endsWith( QString::fromLatin1( "p7s" ) ) || node->contentType()->name().endsWith( QString::fromLatin1( "p7c" ) ) ) && processApplicationPkcs7MimeSubtype( node, result ) ) { return; } const AttachmentStrategy *const as = attachmentStrategy(); if ( as && as->defaultDisplay( node ) == AttachmentStrategy::None && !showOnlyOneMimePart() && node->parent() /* message is not an attachment */ ) { mNodeHelper->setNodeDisplayedHidden( node, true ); return; } bool asIcon = true; if ( !result.neverDisplayInline() ) if ( as ) asIcon = as->defaultDisplay( node ) == AttachmentStrategy::AsIcon; // Show it inline if showOnlyOneMimePart(), which means the user clicked the image // in the message structure viewer manually, and therefore wants to see the full image if ( result.isImage() && showOnlyOneMimePart() && !result.neverDisplayInline() ) asIcon = false; // neither image nor text -> show as icon if ( !result.isImage() && !node->contentType()->isText() ) asIcon = true; /*FIXME(Andras) port it // if the image is not complete do not try to show it inline if ( result.isImage() && !node->msgPart().isComplete() ) asIcon = true; */ if ( asIcon ) { if ( !( as && as->defaultDisplay( node ) == AttachmentStrategy::None ) || showOnlyOneMimePart() ) { // Write the node as icon only writePartIcon( node ); } else { mNodeHelper->setNodeDisplayedHidden( node, true ); } } else if ( result.isImage() ) { // Embed the image mNodeHelper->setNodeDisplayedEmbedded( node, true ); writePartIcon( node, true ); } else { mNodeHelper->setNodeDisplayedEmbedded( node, true ); writeBodyString( node->decodedContent(), NodeHelper::fromAsString( node ), codecFor( node ), result, false ); } // end of ### } void ProcessResult::adjustCryptoStatesOfNode( KMime::Content * node ) const { if ( ( inlineSignatureState() != KMMsgNotSigned ) || ( inlineEncryptionState() != KMMsgNotEncrypted ) ) { mNodeHelper->setSignatureState( node, inlineSignatureState() ); mNodeHelper->setEncryptionState( node, inlineEncryptionState() ); } } ////////////////// ////////////////// ////////////////// static int signatureToStatus( const GpgME::Signature &sig ) { switch ( sig.status().code() ) { case GPG_ERR_NO_ERROR: return GPGME_SIG_STAT_GOOD; case GPG_ERR_BAD_SIGNATURE: return GPGME_SIG_STAT_BAD; case GPG_ERR_NO_PUBKEY: return GPGME_SIG_STAT_NOKEY; case GPG_ERR_NO_DATA: return GPGME_SIG_STAT_NOSIG; case GPG_ERR_SIG_EXPIRED: return GPGME_SIG_STAT_GOOD_EXP; case GPG_ERR_KEY_EXPIRED: return GPGME_SIG_STAT_GOOD_EXPKEY; default: return GPGME_SIG_STAT_ERROR; } } bool ObjectTreeParser::writeOpaqueOrMultipartSignedData( KMime::Content* data, KMime::Content& sign, const QString& fromAddress, bool doCheck, QByteArray* cleartextData, const std::vector & paramSignatures, bool hideErrors ) { // kDebug() << "DECRYPT" << data; bool bIsOpaqueSigned = false; enum { NO_PLUGIN, NOT_INITIALIZED, CANT_VERIFY_SIGNATURES } cryptPlugError = NO_PLUGIN; const Kleo::CryptoBackend::Protocol* cryptProto = cryptoProtocol(); QString cryptPlugLibName; QString cryptPlugDisplayName; if ( cryptProto ) { cryptPlugLibName = cryptProto->name(); cryptPlugDisplayName = cryptProto->displayName(); } #ifdef DEBUG_SIGNATURE #ifndef NDEBUG if ( !doCheck ) kDebug() << "showing OpenPGP (Encrypted+Signed) data"; else if ( data ) kDebug() << "processing Multipart Signed data"; else kDebug() << "processing Opaque Signed data"; #endif if ( doCheck && cryptProto ) { //kDebug() << "going to call CRYPTPLUG" << cryptPlugLibName; } #endif QByteArray cleartext; QByteArray signaturetext; if ( doCheck && cryptProto ) { if ( data ) { cleartext = data->encodedContent(); #ifdef DEBUG_SIGNATURE kDebug() << "ClearText : " << cleartext; dumpToFile( "dat_01_reader_signedtext_before_canonicalization", cleartext.data(), cleartext.length() ); // replace simple LFs by CRLSs // according to RfC 2633, 3.1.1 Canonicalization kDebug() << "Converting LF to CRLF (see RfC 2633, 3.1.1 Canonicalization)"; #endif cleartext = KMime::LFtoCRLF( cleartext ); #ifdef DEBUG_SIGNATURE kDebug() << " done."; #endif } dumpToFile( "dat_02_reader_signedtext_after_canonicalization", cleartext.data(), cleartext.length() ); signaturetext = sign.decodedContent(); dumpToFile( "dat_03_reader.sig", signaturetext.data(), signaturetext.size() ); } std::vector signatures; if ( !doCheck ) signatures = paramSignatures; PartMetaData messagePart; messagePart.isSigned = true; messagePart.technicalProblem = ( cryptProto == 0 ); messagePart.isGoodSignature = false; messagePart.isEncrypted = false; messagePart.isDecryptable = false; messagePart.keyTrust = Kpgp::KPGP_VALIDITY_UNKNOWN; messagePart.status = i18n("Wrong Crypto Plug-In."); messagePart.status_code = GPGME_SIG_STAT_NONE; GpgME::Key key; if ( doCheck && cryptProto ) { #ifdef DEBUG_SIGNATURE kDebug() << "tokoe: doCheck and cryptProto"; #endif GpgME::VerificationResult result; if ( data ) { // detached #ifdef DEBUG_SIGNATURE kDebug() << "tokoe: is detached signature"; #endif const VerifyDetachedBodyPartMemento * m = dynamic_cast( mNodeHelper->bodyPartMemento( &sign, "verifydetached" ) ); if ( !m ) { #ifdef DEBUG_SIGNATURE kDebug() << "tokoe: no memento available"; #endif Kleo::VerifyDetachedJob * job = cryptProto->verifyDetachedJob(); if ( !job ) { cryptPlugError = CANT_VERIFY_SIGNATURES; // PENDING(marc) cryptProto = 0 here? } else { QByteArray plainData = cleartext; VerifyDetachedBodyPartMemento * newM = new VerifyDetachedBodyPartMemento( job, cryptProto->keyListJob(), signaturetext, plainData ); if ( allowAsync() ) { #ifdef DEBUG_SIGNATURE kDebug() << "tokoe: allowAsync"; #endif QObject::connect( newM, SIGNAL(update(MessageViewer::Viewer::UpdateMode)), mSource->sourceObject(), SLOT(update(MessageViewer::Viewer::UpdateMode)) ); if ( newM->start() ) { #ifdef DEBUG_SIGNATURE kDebug() << "tokoe: new memento started"; #endif messagePart.inProgress = true; mHasPendingAsyncJobs = true; } else { m = newM; } } else { newM->exec(); m = newM; } mNodeHelper->setBodyPartMemento( &sign, "verifydetached", newM ); } } else if ( m->isRunning() ) { #ifdef DEBUG_SIGNATURE kDebug() << "tokoe: memento is running"; #endif messagePart.inProgress = true; mHasPendingAsyncJobs = true; m = 0; } if ( m ) { #ifdef DEBUG_SIGNATURE kDebug() << "tokoe: memento finished, assign result"; #endif result = m->verifyResult(); messagePart.auditLogError = m->auditLogError(); messagePart.auditLog = m->auditLogAsHtml(); key = m->signingKey(); } } else { // opaque #ifdef DEBUG_SIGNATURE kDebug() << "tokoe: is opaque signature"; #endif const VerifyOpaqueBodyPartMemento * m = dynamic_cast( mNodeHelper->bodyPartMemento( &sign, "verifyopaque" ) ); if ( !m ) { #ifdef DEBUG_SIGNATURE kDebug() << "tokoe: no memento available"; #endif Kleo::VerifyOpaqueJob * job = cryptProto->verifyOpaqueJob(); if ( !job ) { cryptPlugError = CANT_VERIFY_SIGNATURES; // PENDING(marc) cryptProto = 0 here? } else { VerifyOpaqueBodyPartMemento * newM = new VerifyOpaqueBodyPartMemento( job, cryptProto->keyListJob(), signaturetext ); if ( allowAsync() ) { #ifdef DEBUG_SIGNATURE kDebug() << "tokoe: allowAsync"; #endif QObject::connect( newM, SIGNAL(update(MessageViewer::Viewer::UpdateMode)), mSource->sourceObject(), SLOT(update(MessageViewer::Viewer::UpdateMode)) ); if ( newM->start() ) { #ifdef DEBUG_SIGNATURE kDebug() << "tokoe: new memento started"; #endif messagePart.inProgress = true; mHasPendingAsyncJobs = true; } else { m = newM; } } else { newM->exec(); m = newM; } mNodeHelper->setBodyPartMemento( &sign, "verifyopaque", newM ); } } else if ( m->isRunning() ) { #ifdef DEBUG_SIGNATURE kDebug() << "tokoe: memento is running"; #endif messagePart.inProgress = true; mHasPendingAsyncJobs = true; m = 0; } if ( m ) { #ifdef DEBUG_SIGNATURE kDebug() << "tokoe: memento finished, assign result"; #endif result = m->verifyResult(); cleartext = m->plainText(); messagePart.auditLogError = m->auditLogError(); messagePart.auditLog = m->auditLogAsHtml(); key = m->signingKey(); } } std::stringstream ss; ss << result; #ifdef DEBUG_SIGNATURE kDebug() << ss.str().c_str(); #endif signatures = result.signatures(); } else messagePart.auditLogError = GpgME::Error( GPG_ERR_NOT_IMPLEMENTED ); #ifdef DEBUG_SIGNATURE if ( doCheck ) kDebug() << "returned from CRYPTPLUG"; #endif // ### only one signature supported if ( !signatures.empty() ) { #ifdef DEBUG_SIGNATURE kDebug() << "\nFound signature"; #endif GpgME::Signature signature = signatures.front(); messagePart.status_code = signatureToStatus( signature ); messagePart.status = QString::fromLocal8Bit( signature.status().asString() ); for ( uint i = 1; i < signatures.size(); ++i ) { if ( signatureToStatus( signatures[i] ) != messagePart.status_code ) { messagePart.status_code = GPGME_SIG_STAT_DIFF; messagePart.status = i18n("Different results for signatures"); } } if ( messagePart.status_code & GPGME_SIG_STAT_GOOD ) { messagePart.isGoodSignature = true; if ( !doCheck ) { // We have a good signature but did not do a verify, // this means the signature was already validated before by // decryptverify for example. Q_ASSERT( !key.keyID() ); // There should be no key set without doCheck // Search for the key by it's fingerprint so that we can check for // trust etc. Kleo::KeyListJob * job = cryptProto->keyListJob( false ); // local, no sigs if ( !job ) { kDebug() << "The Crypto backend does not support listing keys. "; } else { std::vector found_keys; // As we are local it is ok to make this synchronous GpgME::KeyListResult res = job->exec( QStringList( QLatin1String(signature.fingerprint()) ), false, found_keys ); if ( res.error() ) { kDebug() << "Error while searching key for Fingerprint: " << signature.fingerprint(); } if ( found_keys.size() > 1 ) { // Should not Happen kDebug() << "Oops: Found more then one Key for Fingerprint: " << signature.fingerprint(); } if ( found_keys.size() != 1 ) { // Should not Happen at this point kDebug() << "Oops: Found no Key for Fingerprint: " << signature.fingerprint(); } else { key = found_keys[0]; } } } } // save extended signature status flags messagePart.sigSummary = signature.summary(); if ( key.keyID() ) messagePart.keyId = key.keyID(); if ( messagePart.keyId.isEmpty() ) messagePart.keyId = signature.fingerprint(); // ### Ugh. We depend on two enums being in sync: messagePart.keyTrust = (Kpgp::Validity)signature.validity(); if ( key.numUserIDs() > 0 && key.userID( 0 ).id() ) messagePart.signer = Kleo::DN( key.userID( 0 ).id() ).prettyDN(); for ( uint iMail = 0; iMail < key.numUserIDs(); ++iMail ) { // The following if /should/ always result in TRUE but we // won't trust implicitely the plugin that gave us these data. if ( key.userID( iMail ).email() ) { QString email = QString::fromUtf8( key.userID( iMail ).email() ); // ### work around gpgme 0.3.x / cryptplug bug where the // ### email addresses are specified as angle-addr, not addr-spec: if ( email.startsWith( QLatin1Char('<') ) && email.endsWith( QLatin1Char('>') ) ) email = email.mid( 1, email.length() - 2 ); if ( !email.isEmpty() ) messagePart.signerMailAddresses.append( email ); } } if ( signature.creationTime() ) messagePart.creationTime.setTime_t( signature.creationTime() ); else messagePart.creationTime = QDateTime(); if ( messagePart.signer.isEmpty() ) { if ( key.numUserIDs() > 0 && key.userID( 0 ).name() ) messagePart.signer = Kleo::DN( key.userID( 0 ).name() ).prettyDN(); if ( !messagePart.signerMailAddresses.empty() ) { if ( messagePart.signer.isEmpty() ) messagePart.signer = messagePart.signerMailAddresses.front(); else messagePart.signer += QLatin1String(" <") + messagePart.signerMailAddresses.front() + QLatin1Char('>'); } } #ifdef DEBUG_SIGNATURE kDebug() << "\n key id:" << messagePart.keyId << "\n key trust:" << messagePart.keyTrust << "\n signer:" << messagePart.signer; #endif } else { messagePart.creationTime = QDateTime(); } if ( !doCheck || !data ){ if ( cleartextData || !cleartext.isEmpty() ) { if ( htmlWriter() ) htmlWriter()->queue( writeSigstatHeader( messagePart, cryptProto, fromAddress ) ); bIsOpaqueSigned = true; CryptoProtocolSaver cpws( this, cryptProto ); createAndParseTempNode( &sign, doCheck ? cleartext.data() : cleartextData->data(), "opaque signed data" ); if ( htmlWriter() ) htmlWriter()->queue( writeSigstatFooter( messagePart ) ); } else if ( !hideErrors ) { QString txt; txt = QLatin1String("

"); txt.append( i18n( "The crypto engine returned no cleartext data." ) ); txt.append( QLatin1String("

" )); txt.append( QLatin1String("
 
") ); txt.append( i18n( "Status: " ) ); if ( !messagePart.status.isEmpty() ) { txt.append( QLatin1String("") ); txt.append( messagePart.status ); txt.append( QLatin1String("") ); } else txt.append( i18nc("Status of message unknown.","(unknown)") ); if ( htmlWriter() ) htmlWriter()->queue(txt); } } else { if ( htmlWriter() ) { if ( !cryptProto ) { QString errorMsg; switch ( cryptPlugError ) { case NOT_INITIALIZED: errorMsg = i18n( "Crypto plug-in \"%1\" is not initialized.", cryptPlugLibName ); break; case CANT_VERIFY_SIGNATURES: errorMsg = i18n( "Crypto plug-in \"%1\" cannot verify signatures.", cryptPlugLibName ); break; case NO_PLUGIN: if ( cryptPlugDisplayName.isEmpty() ) errorMsg = i18n( "No appropriate crypto plug-in was found." ); else errorMsg = i18nc( "%1 is either 'OpenPGP' or 'S/MIME'", "No %1 plug-in was found.", cryptPlugDisplayName ); break; } messagePart.errorText = i18n( "The message is signed, but the " "validity of the signature cannot be " "verified.
" "Reason: %1", errorMsg ); } htmlWriter()->queue( writeSigstatHeader( messagePart, cryptProto, fromAddress ) ); } ObjectTreeParser otp( this, true ); otp.setAllowAsync( allowAsync() ); otp.parseObjectTreeInternal( data ); copyContentFrom( &otp ); if ( htmlWriter() ) htmlWriter()->queue( writeSigstatFooter( messagePart ) ); } #ifdef DEBUG_SIGNATURE kDebug() << "done, returning" << ( bIsOpaqueSigned ? "TRUE" : "FALSE" ); #endif //kDebug() << "DECRYPTED" << data; return bIsOpaqueSigned; } void ObjectTreeParser::writeDeferredDecryptionBlock() { const QString iconName = QLatin1String("file:///") + KIconLoader::global()->iconPath( QLatin1String("document-decrypt"), KIconLoader::Small ); const QString decryptedData = QLatin1String("
") + i18n("This message is encrypted.") + QLatin1String("
" ""); PartMetaData messagePart; messagePart.isDecryptable = true; messagePart.isEncrypted = true; messagePart.isSigned = false; mRawDecryptedBody += decryptedData.toUtf8(); if ( htmlWriter() ) { //TODO: check if this check should be here or at the beginning of the method htmlWriter()->queue( writeSigstatHeader( messagePart, cryptoProtocol(), QString() ) ); htmlWriter()->queue( decryptedData ); htmlWriter()->queue( writeSigstatFooter( messagePart ) ); } } void ObjectTreeParser::writeDecryptionInProgressBlock() { if ( !htmlWriter() ) return; // PENDING(marc) find an animated icon here: //const QString iconName = KGlobal::instance()->iconLoader()->iconPath( "decrypted", KIcon::Small ); const QString decryptedData = i18n("Encrypted data not shown"); PartMetaData messagePart; messagePart.isDecryptable = true; messagePart.isEncrypted = true; messagePart.isSigned = false; messagePart.inProgress = true; htmlWriter()->queue( writeSigstatHeader( messagePart, cryptoProtocol(), QString() ) ); //htmlWriter()->queue( decryptedData ); htmlWriter()->queue( writeSigstatFooter( messagePart ) ); } void ObjectTreeParser::writeCertificateImportResult( const GpgME::ImportResult & res ) { if ( res.error() ) { htmlWriter()->queue( i18n( "Sorry, certificate could not be imported.
" "Reason: %1", QString::fromLocal8Bit( res.error().asString() ) ) ); return; } const int nImp = res.numImported(); const int nUnc = res.numUnchanged(); const int nSKImp = res.numSecretKeysImported(); const int nSKUnc = res.numSecretKeysUnchanged(); if ( !nImp && !nSKImp && !nUnc && !nSKUnc ) { htmlWriter()->queue( i18n( "Sorry, no certificates were found in this message." ) ); return; } QString comment = QLatin1String("") + i18n( "Certificate import status:" ) + QLatin1String("
 
"); if ( nImp ) comment += i18np( "1 new certificate was imported.", "%1 new certificates were imported.", nImp ) + QLatin1String("
"); if ( nUnc ) comment += i18np( "1 certificate was unchanged.", "%1 certificates were unchanged.", nUnc ) + QLatin1String("
"); if ( nSKImp ) comment += i18np( "1 new secret key was imported.", "%1 new secret keys were imported.", nSKImp ) + QLatin1String("
"); if ( nSKUnc ) comment += i18np( "1 secret key was unchanged.", "%1 secret keys were unchanged.", nSKUnc ) + QLatin1String("
"); comment += QLatin1String(" 
"); htmlWriter()->queue( comment ); if ( !nImp && !nSKImp ) { htmlWriter()->queue( QLatin1String("
") ); return; } const std::vector imports = res.imports(); if ( imports.empty() ) { htmlWriter()->queue( i18n( "Sorry, no details on certificate import available." ) + QLatin1String("
") ); return; } htmlWriter()->queue( QLatin1String("") + i18n( "Certificate import details:" ) + QLatin1String("
") ); std::vector::const_iterator end( imports.end() ); for ( std::vector::const_iterator it = imports.begin() ; it != end ; ++it ) { if ( (*it).error() ) { htmlWriter()->queue( i18nc( "Certificate import failed.", "Failed: %1 (%2)", QLatin1String((*it).fingerprint()), QString::fromLocal8Bit( (*it).error().asString() ) ) ); } else if ( (*it).status() & ~GpgME::Import::ContainedSecretKey ) { if ( (*it).status() & GpgME::Import::ContainedSecretKey ) { htmlWriter()->queue( i18n( "New or changed: %1 (secret key available)", QLatin1String((*it).fingerprint() )) ); } else { htmlWriter()->queue( i18n( "New or changed: %1", QLatin1String((*it).fingerprint() )) ); } } htmlWriter()->queue( QLatin1String("
") ); } htmlWriter()->queue( QLatin1String("
") ); } bool ObjectTreeParser::okDecryptMIME( KMime::Content& data, QByteArray& decryptedData, bool& signatureFound, std::vector &signatures, bool showWarning, bool& passphraseError, bool& actuallyEncrypted, bool& decryptionStarted, PartMetaData &partMetaData ) { passphraseError = false; decryptionStarted = false; partMetaData.errorText.clear(); partMetaData.auditLogError = GpgME::Error(); partMetaData.auditLog.clear(); bool bDecryptionOk = false; enum { NO_PLUGIN, NOT_INITIALIZED, CANT_DECRYPT } cryptPlugError = NO_PLUGIN; const Kleo::CryptoBackend::Protocol* cryptProto = cryptoProtocol(); QString cryptPlugLibName; if ( cryptProto ) cryptPlugLibName = cryptProto->name(); assert( mSource->decryptMessage() ); const QString errorMsg = i18n( "Could not decrypt the data." ); if ( cryptProto /*FIXME(Andras) port to akonadi && !kmkernel->contextMenuShown()*/ ) { QByteArray ciphertext = data.decodedContent(); #ifdef MARCS_DEBUG QString cipherStr = QString::fromLatin1( ciphertext ); - bool cipherIsBinary = ( !cipherStr.contains("BEGIN ENCRYPTED MESSAGE", Qt::CaseInsensitive ) ) && - ( !cipherStr.contains("BEGIN PGP ENCRYPTED MESSAGE", Qt::CaseInsensitive ) ) && - ( !cipherStr.contains("BEGIN PGP MESSAGE", Qt::CaseInsensitive ) ); + bool cipherIsBinary = ( !cipherStr.contains(QLatin1String("BEGIN ENCRYPTED MESSAGE"), Qt::CaseInsensitive ) ) && + ( !cipherStr.contains(QLatin1String("BEGIN PGP ENCRYPTED MESSAGE"), Qt::CaseInsensitive ) ) && + ( !cipherStr.contains(QLatin1String("BEGIN PGP MESSAGE"), Qt::CaseInsensitive ) ); dumpToFile( "dat_04_reader.encrypted", ciphertext.data(), ciphertext.size() ); QString deb; - deb = "\n\nE N C R Y P T E D D A T A = "; + deb = QLatin1String("\n\nE N C R Y P T E D D A T A = "); if ( cipherIsBinary ) - deb += "[binary data]"; + deb += QLatin1String("[binary data]"); else { - deb += "\""; + deb += QLatin1String("\""); deb += cipherStr; - deb += "\""; + deb += QLatin1String("\""); } - deb += "\n\n"; + deb += QLatin1String("\n\n"); kDebug() << deb; #endif //kDebug() << "going to call CRYPTPLUG" << cryptPlugLibName; // Check whether the memento contains a result from last time: const DecryptVerifyBodyPartMemento * m = dynamic_cast( mNodeHelper->bodyPartMemento( &data, "decryptverify" ) ); if ( !m ) { Kleo::DecryptVerifyJob * job = cryptProto->decryptVerifyJob(); if ( !job ) { cryptPlugError = CANT_DECRYPT; cryptProto = 0; } else { DecryptVerifyBodyPartMemento * newM = new DecryptVerifyBodyPartMemento( job, ciphertext ); if ( allowAsync() ) { QObject::connect( newM, SIGNAL(update(MessageViewer::Viewer::UpdateMode)), mSource->sourceObject(), SLOT(update(MessageViewer::Viewer::UpdateMode)) ); if ( newM->start() ) { decryptionStarted = true; mHasPendingAsyncJobs = true; } else { m = newM; } } else { newM->exec(); m = newM; } mNodeHelper->setBodyPartMemento( &data, "decryptverify", newM ); } } else if ( m->isRunning() ) { decryptionStarted = true; mHasPendingAsyncJobs = true; m = 0; } if ( m ) { const QByteArray & plainText = m->plainText(); const GpgME::DecryptionResult & decryptResult = m->decryptResult(); const GpgME::VerificationResult & verifyResult = m->verifyResult(); std::stringstream ss; ss << decryptResult << '\n' << verifyResult; //kDebug() << ss.str().c_str(); signatureFound = verifyResult.signatures().size() > 0; signatures = verifyResult.signatures(); bDecryptionOk = !decryptResult.error(); passphraseError = decryptResult.error().isCanceled() || decryptResult.error().code() == GPG_ERR_NO_SECKEY; actuallyEncrypted = decryptResult.error().code() != GPG_ERR_NO_DATA; partMetaData.errorText = QString::fromLocal8Bit( decryptResult.error().asString() ); partMetaData.auditLogError = m->auditLogError(); partMetaData.auditLog = m->auditLogAsHtml(); partMetaData.isEncrypted = actuallyEncrypted; if ( actuallyEncrypted && decryptResult.numRecipients() > 0 ) partMetaData.keyId = decryptResult.recipient( 0 ).keyID(); //kDebug() << "ObjectTreeParser::decryptMIME: returned from CRYPTPLUG"; if ( bDecryptionOk ) decryptedData = plainText; else if ( htmlWriter() && showWarning ) { decryptedData = "
" + errorMsg.toUtf8() + "
"; if ( !passphraseError ) partMetaData.errorText = i18n("Crypto plug-in \"%1\" could not decrypt the data.", cryptPlugLibName ) + QLatin1String("
") + i18n("Error: %1", partMetaData.errorText ); } } } if ( !cryptProto ) { decryptedData = "
" + errorMsg.toUtf8() + "
"; switch ( cryptPlugError ) { case NOT_INITIALIZED: partMetaData.errorText = i18n( "Crypto plug-in \"%1\" is not initialized.", cryptPlugLibName ); break; case CANT_DECRYPT: partMetaData.errorText = i18n( "Crypto plug-in \"%1\" cannot decrypt messages.", cryptPlugLibName ); break; case NO_PLUGIN: partMetaData.errorText = i18n( "No appropriate crypto plug-in was found." ); break; } } else if (/*FIXME(Andras) port to akonadi kmkernel->contextMenuShown()*/ false ) { // ### Workaround for bug 56693 (kmail freeze with the complete desktop // ### while pinentry-qt appears) QByteArray ciphertext( data.decodedContent() ); QString cipherStr = QString::fromLatin1( ciphertext ); bool cipherIsBinary = ( !cipherStr.contains(QLatin1String("BEGIN ENCRYPTED MESSAGE"), Qt::CaseInsensitive ) ) && ( !cipherStr.contains(QLatin1String("BEGIN PGP ENCRYPTED MESSAGE"), Qt::CaseInsensitive ) ) && ( !cipherStr.contains(QLatin1String("BEGIN PGP MESSAGE"), Qt::CaseInsensitive ) ); if ( !cipherIsBinary ) { decryptedData = ciphertext; } else { decryptedData = "
" + errorMsg.toUtf8() + "
"; } } dumpToFile( "dat_05_reader.decrypted", decryptedData.data(), decryptedData.size() ); return bDecryptionOk; } //static bool ObjectTreeParser::containsExternalReferences( const QString & str, const QString&extraHead ) { const bool hasBaseInHeader = extraHead.contains(QLatin1String("= 0 || httpsPos >= 0 ) { // pos = index of next occurrence of "http: or "https: whichever comes first int pos = ( httpPos < httpsPos ) ? ( ( httpPos >= 0 ) ? httpPos : httpsPos ) : ( ( httpsPos >= 0 ) ? httpsPos : httpPos ); // look backwards for "href" if ( pos > 5 ) { int hrefPos = str.lastIndexOf( QLatin1String("href"), pos - 5, Qt::CaseInsensitive ); // if no 'href' is found or the distance between 'href' and '"http[s]:' // is larger than 7 (7 is the distance in 'href = "http[s]:') then // we assume that we have found an external reference if ( ( hrefPos == -1 ) || ( pos - hrefPos > 7 ) ) { // HTML messages created by KMail itself for now contain the following: // // Make sure not to show an external references warning for this string int dtdPos = str.indexOf( QLatin1String("http://www.w3.org/TR/html4/loose.dtd"), pos + 1 ); if ( dtdPos != ( pos + 1 ) ) return true; } } // find next occurrence of "http: or "https: if ( pos == httpPos ) { httpPos = str.indexOf( QLatin1String("\"http:"), httpPos + 6, Qt::CaseInsensitive ); } else { httpsPos = str.indexOf( QLatin1String("\"https:"), httpsPos + 7, Qt::CaseInsensitive ); } } return false; } bool ObjectTreeParser::processTextHtmlSubtype( KMime::Content * curNode, ProcessResult & ) { const QByteArray partBody( curNode->decodedContent() ); const QString bodyHTML = codecFor( curNode )->toUnicode( partBody ); mHtmlContent += bodyHTML; mHtmlContentCharset = NodeHelper::charset( curNode ); mRawDecryptedBody = partBody; if ( !htmlWriter() ) return true; QString bodyText; if ( mSource->htmlMail() ) { bodyText = bodyHTML; } else { bodyText = QLatin1String(StringUtil::convertAngleBracketsToHtml( partBody )); } if ( curNode->topLevel()->textContent() == curNode || attachmentStrategy()->defaultDisplay( curNode ) == AttachmentStrategy::Inline || showOnlyOneMimePart() ) { if ( mSource->htmlMail() ) { HTMLQuoteColorer colorer; QString extraHead; for ( int i = 0; i < 3; ++i ) colorer.setQuoteColor( i, cssHelper()->quoteColor( i ) ); bodyText = colorer.process( bodyText, extraHead ); mNodeHelper->setNodeDisplayedEmbedded( curNode, true ); htmlWriter()->extraHead(extraHead); // Show the "external references" warning (with possibility to load // external references only if loading external references is disabled // and the HTML code contains obvious external references). For // messages where the external references are obfuscated the user won't // have an easy way to load them but that shouldn't be a problem // because only spam contains obfuscated external references. if ( !mSource->htmlLoadExternal() && containsExternalReferences( bodyText,extraHead ) ) { htmlWriter()->queue( QLatin1String("
\n") ); htmlWriter()->queue( i18n("Note: This HTML message may contain external " "references to images etc. For security/privacy reasons " "external references are not loaded. If you trust the " "sender of this message then you can load the external " "references for this message " "by clicking here.") ); htmlWriter()->queue( QLatin1String("


") ); } } else { htmlWriter()->queue( QLatin1String("
\n") ); htmlWriter()->queue( i18n("Note: This is an HTML message. For " "security reasons, only the raw HTML code " "is shown. If you trust the sender of this " "message then you can activate formatted " "HTML display for this message " "by clicking here.") ); htmlWriter()->queue( QLatin1String("


") ); } // Make sure the body is relative, so that nothing is painted over above "Note: ..." // if a malicious message uses absolute positioning. #137643 htmlWriter()->queue( QLatin1String("
\n") ); htmlWriter()->queue( bodyText ); htmlWriter()->queue( QLatin1String("
\n" )); mSource->setHtmlMode( Util::Html ); return true; } return false; } bool ObjectTreeParser::isMailmanMessage( KMime::Content * curNode ) { if ( !curNode || curNode->head().isEmpty() ) return false; if ( curNode->hasHeader("X-Mailman-Version") ) return true; if ( curNode->hasHeader("X-Mailer") ) { KMime::Headers::Base *header = curNode->headerByType("X-Mailer"); if ( header->asUnicodeString().contains(QLatin1String("MAILMAN"), Qt::CaseInsensitive ) ) return true; } return false; } bool ObjectTreeParser::processMailmanMessage( KMime::Content* curNode ) { const QString str = QString::fromLatin1( curNode->decodedContent() ); //### const QLatin1String delim1( "--__--__--\n\nMessage:" ); const QLatin1String delim2( "--__--__--\r\n\r\nMessage:" ); const QLatin1String delimZ2( "--__--__--\n\n_____________" ); const QLatin1String delimZ1( "--__--__--\r\n\r\n_____________" ); QString partStr, digestHeaderStr; int thisDelim = str.indexOf( delim1, Qt::CaseInsensitive ); if ( thisDelim == -1 ) { thisDelim = str.indexOf( delim2, Qt::CaseInsensitive ); } if ( thisDelim == -1 ) { return false; } int nextDelim = str.indexOf( delim1, thisDelim+1, Qt::CaseInsensitive ); if ( -1 == nextDelim ) { nextDelim = str.indexOf( delim2, thisDelim+1, Qt::CaseInsensitive ); } if ( -1 == nextDelim ) { nextDelim = str.indexOf( delimZ1, thisDelim+1, Qt::CaseInsensitive ); } if ( -1 == nextDelim ) { nextDelim = str.indexOf( delimZ2, thisDelim+1, Qt::CaseInsensitive ); } if ( nextDelim < 0) { return false; } //if ( curNode->mRoot ) // curNode = curNode->mRoot; // at least one message found: build a mime tree digestHeaderStr = QLatin1String("Content-Type: text/plain\nContent-Description: digest header\n\n"); digestHeaderStr += str.mid( 0, thisDelim ); createAndParseTempNode( mTopLevelContent, digestHeaderStr.toLatin1(), "Digest Header" ); //mReader->queueHtml("


"); // temporarily change curent node's Content-Type // to get our embedded RfC822 messages properly inserted curNode->contentType()->setMimeType( "multipart/digest" ); while( -1 < nextDelim ){ int thisEoL = str.indexOf(QLatin1String("\nMessage:"), thisDelim, Qt::CaseInsensitive ); if ( -1 < thisEoL ) thisDelim = thisEoL+1; else{ thisEoL = str.indexOf(QLatin1String("\n_____________"), thisDelim, Qt::CaseInsensitive ); if ( -1 < thisEoL ) thisDelim = thisEoL+1; } thisEoL = str.indexOf( QLatin1Char('\n'), thisDelim ); if ( -1 < thisEoL ) thisDelim = thisEoL+1; else thisDelim = thisDelim+1; //while( thisDelim < cstr.size() && '\n' == cstr[thisDelim] ) // ++thisDelim; partStr = QLatin1String("Content-Type: message/rfc822\nContent-Description: embedded message\n\n"); partStr += QLatin1String("Content-Type: text/plain\n"); partStr += str.mid( thisDelim, nextDelim-thisDelim ); QString subject = QString::fromLatin1("embedded message"); QString subSearch = QString::fromLatin1("\nSubject:"); int subPos = partStr.indexOf(subSearch, 0, Qt::CaseInsensitive ); if ( -1 < subPos ){ subject = partStr.mid(subPos+subSearch.length()); thisEoL = subject.indexOf(QLatin1Char('\n')); if ( -1 < thisEoL ) subject.truncate( thisEoL ); } kDebug() << " embedded message found: \"" << subject; createAndParseTempNode( mTopLevelContent, partStr.toLatin1(), subject.toLatin1() ); //mReader->queueHtml("


"); thisDelim = nextDelim+1; nextDelim = str.indexOf(delim1, thisDelim, Qt::CaseInsensitive ); if ( -1 == nextDelim ) nextDelim = str.indexOf(delim2, thisDelim, Qt::CaseInsensitive); if ( -1 == nextDelim ) nextDelim = str.indexOf(delimZ1, thisDelim, Qt::CaseInsensitive); if ( -1 == nextDelim ) nextDelim = str.indexOf(delimZ2, thisDelim, Qt::CaseInsensitive); } // reset curent node's Content-Type curNode->contentType()->setMimeType( "text/plain" ); int thisEoL = str.indexOf( QLatin1String("_____________"), thisDelim ); if ( -1 < thisEoL ){ thisDelim = thisEoL; thisEoL = str.indexOf( QLatin1Char('\n'), thisDelim ); if ( -1 < thisEoL ) thisDelim = thisEoL+1; } else thisDelim = thisDelim+1; partStr = QLatin1String("Content-Type: text/plain\nContent-Description: digest footer\n\n"); partStr += str.mid( thisDelim ); createAndParseTempNode( mTopLevelContent, partStr.toLatin1(), "Digest Footer" ); return true; } void ObjectTreeParser::extractNodeInfos( KMime::Content *curNode, bool isFirstTextPart ) { mRawDecryptedBody = curNode->decodedContent(); if ( isFirstTextPart ) { mPlainTextContent += curNode->decodedText(); mPlainTextContentCharset += NodeHelper::charset( curNode ); } } bool ObjectTreeParser::processTextPlainSubtype( KMime::Content *curNode, ProcessResult & result ) { const bool isFirstTextPart = ( curNode->topLevel()->textContent() == curNode ); if ( !isFirstTextPart && attachmentStrategy()->defaultDisplay( curNode ) != AttachmentStrategy::Inline && !showOnlyOneMimePart() ) return false; extractNodeInfos( curNode, isFirstTextPart ); QString label = NodeHelper::fileName( curNode ); const bool bDrawFrame = !isFirstTextPart && !showOnlyOneMimePart() && !label.isEmpty(); if ( bDrawFrame && htmlWriter()) { label = StringUtil::quoteHtmlChars( label, true ); const QString comment = StringUtil::quoteHtmlChars( curNode->contentDescription()->asUnicodeString(), true ); const QString fileName; mNodeHelper->writeNodeToTempFile( curNode ); const QString dir = QApplication::isRightToLeft() ? QLatin1String("rtl") : QLatin1String("ltr") ; QString htmlStr = QLatin1String("" "
"); if ( !fileName.isEmpty() ) htmlStr += QLatin1String("asHREF( curNode, QLatin1String("body") ) + QLatin1String("\">") + label + QLatin1String(""); else htmlStr += label; if ( !comment.isEmpty() ) htmlStr += QLatin1String("
") + comment; htmlStr += QLatin1String("
"); htmlWriter()->queue( htmlStr ); } // process old style not-multipart Mailman messages to // enable verification of the embedded messages' signatures if ( !isMailmanMessage( curNode ) || !processMailmanMessage( curNode ) ) { const QString oldPlainText = mPlainTextContent; writeBodyString( mRawDecryptedBody, NodeHelper::fromAsString( curNode ), codecFor( curNode ), result, !bDrawFrame ); // Revert changes to mPlainTextContent made by writeBodyString if this is not the first // text part. The plain text content shall not contain any text/plain attachment, as it is content // of the main text node. if ( !isFirstTextPart ) { mPlainTextContent = oldPlainText; } mNodeHelper->setNodeDisplayedEmbedded( curNode, true ); } if( bDrawFrame && htmlWriter() ) { htmlWriter()->queue( QLatin1String("
") ); } return true; } void ObjectTreeParser::stdChildHandling( KMime::Content * child ) { if ( !child ) return; ObjectTreeParser otp( *this ); otp.setShowOnlyOneMimePart( false ); otp.parseObjectTreeInternal( child ); copyContentFrom( &otp ); } QString ObjectTreeParser::defaultToltecReplacementText() { return i18n( "This message is a Toltec Groupware object, it can only be viewed with " "Microsoft Outlook in combination with the Toltec connector." ); } bool ObjectTreeParser::processToltecMail( KMime::Content *node ) { if ( !node || !htmlWriter() || !GlobalSettings::self()->showToltecReplacementText() || !NodeHelper::isToltecMessage( node ) || mShowRawToltecMail ) return false; htmlWriter()->queue( GlobalSettings::self()->toltecReplacementText() ); htmlWriter()->queue( QLatin1String("

") + i18n( "Show Raw Message" ) + QLatin1String("") ); return true; } bool ObjectTreeParser::processMultiPartMixedSubtype( KMime::Content * node, ProcessResult & ) { if ( processToltecMail( node ) ) { return true; } KMime::Content * child = MessageCore::NodeHelper::firstChild( node ); if ( !child ) return false; // normal treatment of the parts in the mp/mixed container stdChildHandling( child ); return true; } bool ObjectTreeParser::processMultiPartAlternativeSubtype( KMime::Content * node, ProcessResult & ) { KMime::Content * child = MessageCore::NodeHelper::firstChild( node ); if ( !child ) return false; KMime::Content* dataHtml = findType( child, "text/html", false, true ); KMime::Content* dataPlain = findType( child, "text/plain", false, true ); if ( !dataHtml ) { // If we didn't find the HTML part as the first child of the multipart/alternative, it might // be that this is a HTML message with images, and text/plain and multipart/related are the // immediate children of this multipart/alternative node. // In this case, the HTML node is a child of multipart/related. dataHtml = findType( child, "multipart/related", false, true ); // Still not found? Stupid apple mail actually puts the attachments inside of the // multipart/alternative, which is wrong. Therefore we also have to look for multipart/mixed // here. // Do this only when prefering HTML mail, though, since otherwise the attachments are hidden // when displaying plain text. if ( !dataHtml && mSource->htmlMail() ) { dataHtml = findType( child, "multipart/mixed", false, true ); } } // If there is no HTML writer, process both the HTML and the plain text nodes, as we're collecting // the plainTextContent and the htmlContent if ( !htmlWriter() ) { if ( dataPlain ) { stdChildHandling( dataPlain ); } if ( dataHtml ) { stdChildHandling( dataHtml ); } return true; } if ( ( mSource->htmlMail() && dataHtml) || (dataHtml && dataPlain && dataPlain->body().isEmpty()) ) { if ( dataPlain ) mNodeHelper->setNodeProcessed( dataPlain, false); stdChildHandling( dataHtml ); mSource->setHtmlMode( Util::MultipartHtml ); return true; } if ( !htmlWriter() || (!mSource->htmlMail() && dataPlain) ) { mNodeHelper->setNodeProcessed( dataHtml, false ); stdChildHandling( dataPlain ); mSource->setHtmlMode( Util::MultipartPlain ); return true; } stdChildHandling( child ); return true; } bool ObjectTreeParser::processMultiPartDigestSubtype( KMime::Content * node, ProcessResult & result ) { return processMultiPartMixedSubtype( node, result ); } bool ObjectTreeParser::processMultiPartParallelSubtype( KMime::Content * node, ProcessResult & result ) { return processMultiPartMixedSubtype( node, result ); } bool ObjectTreeParser::processMultiPartSignedSubtype( KMime::Content * node, ProcessResult & ) { KMime::Content * child = MessageCore::NodeHelper::firstChild( node ); if ( node->contents().size() != 2 ) { kDebug() << "mulitpart/signed must have exactly two child parts!" << endl << "processing as multipart/mixed"; if ( child ) stdChildHandling( child ); return child; } KMime::Content * signedData = child; assert( signedData ); KMime::Content * signature = node->contents().at(1); assert( signature ); mNodeHelper->setNodeProcessed( signature, true); if ( !includeSignatures() ) { stdChildHandling( signedData ); return true; } QString protocolContentType = node->contentType()->parameter( QLatin1String("protocol") ).toLower(); const QString signatureContentType = QLatin1String(signature->contentType()->mimeType().toLower()); if ( protocolContentType.isEmpty() ) { kWarning() << "Message doesn't set the protocol for the multipart/signed content-type, " "using content-type of the signature:" << signatureContentType; protocolContentType = signatureContentType; } const Kleo::CryptoBackend::Protocol *protocol = 0; if ( protocolContentType == QLatin1String( "application/pkcs7-signature" ) || protocolContentType == QLatin1String( "application/x-pkcs7-signature" ) ) protocol = Kleo::CryptoBackendFactory::instance()->smime(); else if ( protocolContentType == QLatin1String( "application/pgp-signature" ) || protocolContentType == QLatin1String( "application/x-pgp-signature" ) ) protocol = Kleo::CryptoBackendFactory::instance()->openpgp(); if ( !protocol ) { mNodeHelper->setNodeProcessed( signature, true ); stdChildHandling( signedData ); return true; } CryptoProtocolSaver saver( this, protocol ); mNodeHelper->setSignatureState( node, KMMsgFullySigned); writeOpaqueOrMultipartSignedData( signedData, *signature, NodeHelper::fromAsString( node ) ); return true; } bool ObjectTreeParser::processMultiPartEncryptedSubtype( KMime::Content * node, ProcessResult & result ) { KMime::Content * child = MessageCore::NodeHelper::firstChild( node ); if ( !child ) return false; if ( keepEncryptions() ) { mNodeHelper->setEncryptionState( node, KMMsgFullyEncrypted ); const QByteArray cstr = node->decodedContent(); if ( htmlWriter() ) { writeBodyString( cstr, NodeHelper::fromAsString( node ), codecFor( node ), result, false ); } mRawDecryptedBody += cstr; return true; } const Kleo::CryptoBackend::Protocol * useThisCryptProto = 0; /* ATTENTION: This code is to be replaced by the new 'auto-detect' feature. -------------------------------------- */ KMime::Content* data = findType( child, "application/octet-stream", false, true ); if ( data ) { useThisCryptProto = Kleo::CryptoBackendFactory::instance()->openpgp(); } if ( !data ) { data = findType( child, "application/pkcs7-mime", false, true ); if ( data ) { useThisCryptProto = Kleo::CryptoBackendFactory::instance()->smime(); } } /* --------------------------------------------------------------------------------------------------------------- */ if ( !data ) { stdChildHandling( child ); return true; } CryptoProtocolSaver cpws( this, useThisCryptProto ); KMime::Content * dataChild = MessageCore::NodeHelper::firstChild( data ); if ( dataChild ) { stdChildHandling( dataChild ); return true; } mNodeHelper->setEncryptionState( node, KMMsgFullyEncrypted ); if ( !mSource->decryptMessage() ) { writeDeferredDecryptionBlock(); mNodeHelper->setNodeProcessed( data, false );// Set the data node to done to prevent it from being processed return true; } PartMetaData messagePart; // if we already have a decrypted node for this encrypted node, don't do the decryption again if ( KMime::Content * newNode = mNodeHelper->decryptedNodeForContent( data ) ) { // if( NodeHelper::nodeProcessed( data ) ) ObjectTreeParser otp( this ); otp.parseObjectTreeInternal( newNode ); copyContentFrom( &otp ); messagePart = mNodeHelper->partMetaData( node ); } else { QByteArray decryptedData; bool signatureFound; std::vector signatures; bool passphraseError; bool actuallyEncrypted = true; bool decryptionStarted; bool bOkDecrypt = okDecryptMIME( *data, decryptedData, signatureFound, signatures, true, passphraseError, actuallyEncrypted, decryptionStarted, messagePart ); //kDebug() << "decrypted, signed?:" << signatureFound; if ( decryptionStarted ) { writeDecryptionInProgressBlock(); return true; } mNodeHelper->setNodeProcessed( data, false ); // Set the data node to done to prevent it from being processed // paint the frame if ( htmlWriter() ) { messagePart.isDecryptable = bOkDecrypt; messagePart.isEncrypted = true; messagePart.isSigned = false; htmlWriter()->queue( writeSigstatHeader( messagePart, cryptoProtocol(), NodeHelper::fromAsString( node ) ) ); } if ( bOkDecrypt ) { // Note: Multipart/Encrypted might also be signed // without encapsulating a nicely formatted // ~~~~~~~ Multipart/Signed part. // (see RFC 3156 --> 6.2) // In this case we paint a _2nd_ frame inside the // encryption frame, but we do _not_ show a respective // encapsulated MIME part in the Mime Tree Viewer // since we do want to show the _true_ structure of the // message there - not the structure that the sender's // MUA 'should' have sent. :-D (khz, 12.09.2002) // if ( signatureFound ) { writeOpaqueOrMultipartSignedData( 0, *node, NodeHelper::fromAsString( node ), false, &decryptedData, signatures, false ); mNodeHelper->setSignatureState( node, KMMsgFullySigned); //kDebug() << "setting FULLY SIGNED to:" << node; } else { decryptedData = KMime::CRLFtoLF( decryptedData ); //KMime works with LF only inside insertAndParseNewChildNode createAndParseTempNode( node, decryptedData.constData(),"encrypted data" ); } } else { mRawDecryptedBody += decryptedData; if ( htmlWriter() ) { // print the error message that was returned in decryptedData // (utf8-encoded) htmlWriter()->queue( QString::fromUtf8( decryptedData.data() ) ); } } mNodeHelper->setPartMetaData( node, messagePart ); } if ( htmlWriter() ) htmlWriter()->queue( writeSigstatFooter( messagePart ) ); return true; } bool ObjectTreeParser::processMessageRfc822Subtype( KMime::Content * node, ProcessResult & ) { if ( htmlWriter() && !attachmentStrategy()->inlineNestedMessages() && !showOnlyOneMimePart() ) return false; PartMetaData messagePart; messagePart.isEncrypted = false; messagePart.isSigned = false; messagePart.isEncapsulatedRfc822Message = true; KMime::Message::Ptr message = node->bodyAsMessage(); if ( !message ) { kWarning() << "Node is of type message/rfc822 but doesn't have a message!"; } if ( htmlWriter() && message ) { // The link to "Encapsulated message" is clickable, therefore the temp file needs to exists, // since the user can click the link and expect to have normal attachment operations there. mNodeHelper->writeNodeToTempFile( message.get() ); // Paint the frame header htmlWriter()->queue( writeSigstatHeader( messagePart, cryptoProtocol(), message->from()->asUnicodeString(), message.get() ) ); // Paint the message header htmlWriter()->queue( mSource->createMessageHeader( message.get() ) ); // Process the message, i.e. paint it by processing it with an OTP ObjectTreeParser otp( this ); otp.parseObjectTreeInternal( message.get() ); // Don't add the resulting textual content to our textual content here. // That is unwanted when inline forwarding a message, since the encapsulated message will // already be in the forward message as attachment, so don't duplicate the textual content // by adding it to the inline body as well // Paint the frame footer htmlWriter()->queue( writeSigstatFooter( messagePart ) ); } mNodeHelper->setNodeDisplayedEmbedded( node, true ); mNodeHelper->setPartMetaData( node, messagePart ); return true; } bool ObjectTreeParser::processApplicationOctetStreamSubtype( KMime::Content * node, ProcessResult & result ) { if ( KMime::Content * child = mNodeHelper->decryptedNodeForContent( node ) ) { ObjectTreeParser otp( this ); otp.parseObjectTreeInternal( child ); copyContentFrom( &otp ); return true; } const Kleo::CryptoBackend::Protocol* oldUseThisCryptPlug = cryptoProtocol(); if ( node->parent() && node->parent()->contentType()->mimeType() == "multipart/encrypted" ) { mNodeHelper->setEncryptionState( node, KMMsgFullyEncrypted ); if ( keepEncryptions() ) { const QByteArray cstr = node->decodedContent(); if ( htmlWriter() ) { writeBodyString( cstr, NodeHelper::fromAsString( node ), codecFor( node ), result, false ); } mRawDecryptedBody += cstr; } else if ( !mSource->decryptMessage() ) { writeDeferredDecryptionBlock(); } else { /* ATTENTION: This code is to be replaced by the planned 'auto-detect' feature. */ PartMetaData messagePart; setCryptoProtocol( Kleo::CryptoBackendFactory::instance()->openpgp() ); QByteArray decryptedData; bool signatureFound; std::vector signatures; bool passphraseError; bool actuallyEncrypted = true; bool decryptionStarted; bool bOkDecrypt = okDecryptMIME( *node, decryptedData, signatureFound, signatures, true, passphraseError, actuallyEncrypted, decryptionStarted, messagePart ); if ( decryptionStarted ) { writeDecryptionInProgressBlock(); return true; } // paint the frame if ( htmlWriter() ) { messagePart.isDecryptable = bOkDecrypt; messagePart.isEncrypted = true; messagePart.isSigned = false; htmlWriter()->queue( writeSigstatHeader( messagePart, cryptoProtocol(), NodeHelper::fromAsString( node ) ) ); } if ( bOkDecrypt ) { // fixing the missing attachments bug #1090-b createAndParseTempNode( node, decryptedData.constData(), "encrypted data" ); } else { mRawDecryptedBody += decryptedData; if ( htmlWriter() ) { // print the error message that was returned in decryptedData // (utf8-encoded) htmlWriter()->queue( QString::fromUtf8( decryptedData.data() ) ); } } if ( htmlWriter() ) htmlWriter()->queue( writeSigstatFooter( messagePart ) ); mNodeHelper->setPartMetaData( node, messagePart ); } return true; } setCryptoProtocol( oldUseThisCryptPlug ); return false; } bool ObjectTreeParser::processApplicationPkcs7MimeSubtype( KMime::Content * node, ProcessResult & result ) { if ( KMime::Content * child = mNodeHelper->decryptedNodeForContent( node ) ) { ObjectTreeParser otp( this ); otp.parseObjectTreeInternal( child ); copyContentFrom( &otp ); return true; } if ( node->head().isEmpty() ) return false; const Kleo::CryptoBackend::Protocol * smimeCrypto = Kleo::CryptoBackendFactory::instance()->smime(); if ( !smimeCrypto ) return false; const QString smimeType = node->contentType()->parameter(QLatin1String("smime-type")).toLower(); if ( smimeType == QLatin1String( "certs-only" ) ) { result.setNeverDisplayInline( true ); if ( !htmlWriter() ) return false; if ( !GlobalSettings::self()->autoImportKeys() ) return false; const QByteArray certData = node->decodedContent(); Kleo::ImportJob *import = smimeCrypto->importJob(); KleoJobExecutor executor; const GpgME::ImportResult res = executor.exec( import, certData ); writeCertificateImportResult( res ); return true; } CryptoProtocolSaver cpws( this, smimeCrypto ); bool isSigned = ( smimeType == QLatin1String( "signed-data" ) ); bool isEncrypted = ( smimeType == QLatin1String( "enveloped-data" ) ); // Analyze "signTestNode" node to find/verify a signature. // If zero this verification was successfully done after // decrypting via recursion by insertAndParseNewChildNode(). KMime::Content* signTestNode = isEncrypted ? 0 : node; // We try decrypting the content // if we either *know* that it is an encrypted message part // or there is neither signed nor encrypted parameter. if ( !isSigned ) { if ( isEncrypted ) { ;//kDebug() << "pkcs7 mime == S/MIME TYPE: enveloped (encrypted) data"; } else { ;//kDebug() << "pkcs7 mime - type unknown - enveloped (encrypted) data ?"; } QByteArray decryptedData; PartMetaData messagePart; messagePart.isEncrypted = true; messagePart.isSigned = false; bool signatureFound; std::vector signatures; bool passphraseError; bool actuallyEncrypted = true; bool decryptionStarted; if ( !mSource->decryptMessage() ) { writeDeferredDecryptionBlock(); isEncrypted = true; signTestNode = 0; // PENDING(marc) to be abs. sure, we'd need to have to look at the content } else { const bool bOkDecrypt = okDecryptMIME( *node, decryptedData, signatureFound, signatures, false, passphraseError, actuallyEncrypted, decryptionStarted, messagePart ); //kDebug() << "PKCS7 found signature?" << signatureFound; if ( decryptionStarted ) { writeDecryptionInProgressBlock(); return true; } if ( bOkDecrypt ) { //kDebug() << "pkcs7 mime - encryption found - enveloped (encrypted) data !"; isEncrypted = true; mNodeHelper->setEncryptionState( node, KMMsgFullyEncrypted ); if( signatureFound ) mNodeHelper->setSignatureState( node, KMMsgFullySigned ); signTestNode = 0; // paint the frame messagePart.isDecryptable = true; if ( htmlWriter() ) htmlWriter()->queue( writeSigstatHeader( messagePart, cryptoProtocol(), NodeHelper::fromAsString( node ) ) ); createAndParseTempNode( node, decryptedData.constData(), "encrypted data" ); if ( htmlWriter() ) htmlWriter()->queue( writeSigstatFooter( messagePart ) ); } else { // decryption failed, which could be because the part was encrypted but // decryption failed, or because we didn't know if it was encrypted, tried, // and failed. If the message was not actually encrypted, we continue // assuming it's signed if ( passphraseError || ( smimeType.isEmpty() && actuallyEncrypted ) ) { isEncrypted = true; signTestNode = 0; } if ( isEncrypted ) { //kDebug() << "pkcs7 mime - ERROR: COULD NOT DECRYPT enveloped data !"; // paint the frame messagePart.isDecryptable = false; if ( htmlWriter() ) { htmlWriter()->queue( writeSigstatHeader( messagePart, cryptoProtocol(), NodeHelper::fromAsString( node ) ) ); assert( mSource->decryptMessage() ); // handled above writePartIcon( node ); htmlWriter()->queue( writeSigstatFooter( messagePart ) ); } } else { //kDebug() << "pkcs7 mime - NO encryption found"; } } } if ( isEncrypted ) mNodeHelper->setEncryptionState( node, KMMsgFullyEncrypted ); mNodeHelper->setPartMetaData( node, messagePart ); } // We now try signature verification if necessarry. if ( signTestNode ) { if ( isSigned ) { ;//kDebug() << "pkcs7 mime == S/MIME TYPE: opaque signed data"; } else { ;//kDebug() << "pkcs7 mime - type unknown - opaque signed data ?"; } bool sigFound = writeOpaqueOrMultipartSignedData( 0, *signTestNode, NodeHelper::fromAsString( node ), true, 0, std::vector(), isEncrypted ); if ( sigFound ) { if ( !isSigned ) { //kDebug() << "pkcs7 mime - signature found - opaque signed data !"; isSigned = true; } mNodeHelper->setSignatureState( signTestNode, KMMsgFullySigned ); if ( signTestNode != node ) mNodeHelper->setSignatureState( node, KMMsgFullySigned ); } else { //kDebug() << "pkcs7 mime - NO signature found :-("; } } return isSigned || isEncrypted; } bool ObjectTreeParser::decryptChiasmus( const QByteArray& data, QByteArray& bodyDecoded, QString& errorText ) { const Kleo::CryptoBackend::Protocol * chiasmus = Kleo::CryptoBackendFactory::instance()->protocol( "Chiasmus" ); if ( !chiasmus ) return false; const std::auto_ptr listjob( chiasmus->specialJob( "x-obtain-keys", QMap() ) ); if ( !listjob.get() ) { errorText = i18n( "Chiasmus backend does not offer the " "\"x-obtain-keys\" function. Please report this bug." ); return false; } if ( listjob->exec() ) { errorText = i18n( "Chiasmus Backend Error" ); return false; } const QVariant result = listjob->property( "result" ); if ( result.type() != QVariant::StringList ) { errorText = i18n( "Unexpected return value from Chiasmus backend: " "The \"x-obtain-keys\" function did not return a " "string list. Please report this bug." ); return false; } const QStringList keys = result.toStringList(); if ( keys.empty() ) { errorText = i18n( "No keys have been found. Please check that a " "valid key path has been set in the Chiasmus " "configuration." ); return false; } AutoQPointer selectorDlg( new ChiasmusKeySelector( /*mReader*/0, i18n( "Chiasmus Decryption Key Selection" ), keys, GlobalSettings::chiasmusDecryptionKey(), GlobalSettings::chiasmusDecryptionOptions() ) ); if ( selectorDlg->exec() != KDialog::Accepted || !selectorDlg ) { return false; } GlobalSettings::setChiasmusDecryptionOptions( selectorDlg->options() ); GlobalSettings::setChiasmusDecryptionKey( selectorDlg->key() ); assert( !GlobalSettings::chiasmusDecryptionKey().isEmpty() ); Kleo::SpecialJob * job = chiasmus->specialJob( "x-decrypt", QMap() ); if ( !job ) { errorText = i18n( "Chiasmus backend does not offer the " "\"x-decrypt\" function. Please report this bug." ); return false; } if ( !job->setProperty( "key", GlobalSettings::chiasmusDecryptionKey() ) || !job->setProperty( "options", GlobalSettings::chiasmusDecryptionOptions() ) || !job->setProperty( "input", data ) ) { errorText = i18n( "The \"x-decrypt\" function does not accept " "the expected parameters. Please report this bug." ); return false; } if ( job->exec() ) { errorText = i18n( "Chiasmus Decryption Error" ); return false; } const QVariant resultData = job->property( "result" ); if ( resultData.type() != QVariant::ByteArray ) { errorText = i18n( "Unexpected return value from Chiasmus backend: " "The \"x-decrypt\" function did not return a " "byte array. Please report this bug." ); return false; } bodyDecoded = resultData.toByteArray(); return true; } bool ObjectTreeParser::processApplicationChiasmusTextSubtype( KMime::Content * curNode, ProcessResult & result ) { if ( !htmlWriter() ) { mRawDecryptedBody = curNode->decodedContent(); // ### Surely this is totally wrong? The decoded text of this node is just garbage, since it is // encrypted. This whole if statement should be removed, and the decrypted body // should be added to mPlainTextContent. Needs testing with Chiasmus though, which I don't have. mPlainTextContent += curNode->decodedText(); mPlainTextContentCharset = NodeHelper::charset( curNode ); return true; } QByteArray decryptedBody; QString errorText; const QByteArray data = curNode->decodedContent(); bool bOkDecrypt = decryptChiasmus( data, decryptedBody, errorText ); PartMetaData messagePart; messagePart.isDecryptable = bOkDecrypt; messagePart.isEncrypted = true; messagePart.isSigned = false; messagePart.errorText = errorText; if ( htmlWriter() ) htmlWriter()->queue( writeSigstatHeader( messagePart, 0, //cryptPlugWrapper(), NodeHelper::fromAsString( curNode ) ) ); const QByteArray body = bOkDecrypt ? decryptedBody : data; const QString chiasmusCharset = curNode->contentType()->parameter(QLatin1String("chiasmus-charset")); const QTextCodec* aCodec = chiasmusCharset.isEmpty() ? codecFor( curNode ) : NodeHelper::codecForName( chiasmusCharset.toLatin1() ); htmlWriter()->queue( quotedHTML( aCodec->toUnicode( body ), false /*decorate*/ ) ); result.setInlineEncryptionState( KMMsgFullyEncrypted ); if ( htmlWriter() ) htmlWriter()->queue( writeSigstatFooter( messagePart ) ); mNodeHelper->setPartMetaData( curNode, messagePart ); return true; } void ObjectTreeParser::writeBodyString( const QByteArray & bodyString, const QString & fromAddress, const QTextCodec * codec, ProcessResult & result, bool decorate ) { assert( codec ); KMMsgSignatureState inlineSignatureState = result.inlineSignatureState(); KMMsgEncryptionState inlineEncryptionState = result.inlineEncryptionState(); writeBodyStr( bodyString, codec, fromAddress, inlineSignatureState, inlineEncryptionState, decorate ); result.setInlineSignatureState( inlineSignatureState ); result.setInlineEncryptionState( inlineEncryptionState ); } void ObjectTreeParser::writePartIcon( KMime::Content * msgPart, bool inlineImage ) { if ( !htmlWriter() || !msgPart ) return; const QString name = msgPart->contentType()->name(); QString label = name.isEmpty() ? NodeHelper::fileName( msgPart ) : name; if ( label.isEmpty() ) label = i18nc( "display name for an unnamed attachment", "Unnamed" ); label = StringUtil::quoteHtmlChars( label, true ); QString comment = msgPart->contentDescription()->asUnicodeString(); comment = StringUtil::quoteHtmlChars( comment, true ); if ( label == comment ) comment.clear(); QString href = mNodeHelper->asHREF( msgPart, QLatin1String("body") ); if ( inlineImage ) { const QString fileName = mNodeHelper->writeNodeToTempFile( msgPart ); // show the filename of the image below the embedded image htmlWriter()->queue( QLatin1String("
" "" "
" "" "
") + comment + QLatin1String("

") ); } else { // show the filename next to the image const QString iconName = mNodeHelper->iconName( msgPart ); if( iconName.right( 14 ) == QLatin1String( "mime_empty.png" ) ) { mNodeHelper->magicSetType( msgPart ); //iconName = mNodeHelper->iconName( msgPart ); } htmlWriter()->queue( QLatin1String("" "
") + comment +QLatin1String( "

") ); } } static const int SIG_FRAME_COL_UNDEF = 99; #define SIG_FRAME_COL_RED -1 #define SIG_FRAME_COL_YELLOW 0 #define SIG_FRAME_COL_GREEN 1 QString ObjectTreeParser::sigStatusToString( const Kleo::CryptoBackend::Protocol* cryptProto, int status_code, GpgME::Signature::Summary summary, int& frameColor, bool& showKeyInfos ) { // note: At the moment frameColor and showKeyInfos are // used for CMS only but not for PGP signatures // pending(khz): Implement usage of these for PGP sigs as well. showKeyInfos = true; QString result; if( cryptProto ) { if( cryptProto == Kleo::CryptoBackendFactory::instance()->openpgp() ) { // process enum according to it's definition to be read in // GNU Privacy Guard CVS repository /gpgme/gpgme/gpgme.h switch( status_code ) { case 0: // GPGME_SIG_STAT_NONE result = i18n("Error: Signature not verified"); break; case 1: // GPGME_SIG_STAT_GOOD result = i18n("Good signature"); break; case 2: // GPGME_SIG_STAT_BAD result = i18n("Bad signature"); break; case 3: // GPGME_SIG_STAT_NOKEY result = i18n("No public key to verify the signature"); break; case 4: // GPGME_SIG_STAT_NOSIG result = i18n("No signature found"); break; case 5: // GPGME_SIG_STAT_ERROR result = i18n("Error verifying the signature"); break; case 6: // GPGME_SIG_STAT_DIFF result = i18n("Different results for signatures"); break; /* PENDING(khz) Verify exact meaning of the following values: case 7: // GPGME_SIG_STAT_GOOD_EXP return i18n("Signature certificate is expired"); break; case 8: // GPGME_SIG_STAT_GOOD_EXPKEY return i18n("One of the certificate's keys is expired"); break; */ default: result.clear(); // do *not* return a default text here ! break; } } else if ( cryptProto == Kleo::CryptoBackendFactory::instance()->smime() ) { // process status bits according to SigStatus_... // definitions in kdenetwork/libkdenetwork/cryptplug.h if( summary == GpgME::Signature::None ) { result = i18n("No status information available."); frameColor = SIG_FRAME_COL_YELLOW; showKeyInfos = false; return result; } if( summary & GpgME::Signature::Valid ) { result = i18n("Good signature."); // Note: // Here we are work differently than KMail did before! // // The GOOD case ( == sig matching and the complete // certificate chain was verified and is valid today ) // by definition does *not* show any key // information but just states that things are OK. // (khz, according to LinuxTag 2002 meeting) frameColor = SIG_FRAME_COL_GREEN; showKeyInfos = false; return result; } // we are still there? OK, let's test the different cases: // we assume green, test for yellow or red (in this order!) frameColor = SIG_FRAME_COL_GREEN; QString result2; if( summary & GpgME::Signature::KeyExpired ){ // still is green! result2 += i18n("One key has expired."); } if( summary & GpgME::Signature::SigExpired ){ // and still is green! result2 += i18n("The signature has expired."); } // test for yellow: if( summary & GpgME::Signature::KeyMissing ) { result2 += i18n("Unable to verify: key missing."); // if the signature certificate is missing // we cannot show information on it showKeyInfos = false; frameColor = SIG_FRAME_COL_YELLOW; } if( summary & GpgME::Signature::CrlMissing ){ result2 += i18n("CRL not available."); frameColor = SIG_FRAME_COL_YELLOW; } if( summary & GpgME::Signature::CrlTooOld ){ result2 += i18n("Available CRL is too old."); frameColor = SIG_FRAME_COL_YELLOW; } if( summary & GpgME::Signature::BadPolicy ){ result2 += i18n("A policy was not met."); frameColor = SIG_FRAME_COL_YELLOW; } if( summary & GpgME::Signature::SysError ){ result2 += i18n("A system error occurred."); // if a system error occurred // we cannot trust any information // that was given back by the plug-in showKeyInfos = false; frameColor = SIG_FRAME_COL_YELLOW; } // test for red: if( summary & GpgME::Signature::KeyRevoked ){ // this is red! result2 += i18n("One key has been revoked."); frameColor = SIG_FRAME_COL_RED; } if( summary & GpgME::Signature::Red ) { if( result2.isEmpty() ) // Note: // Here we are work differently than KMail did before! // // The BAD case ( == sig *not* matching ) // by definition does *not* show any key // information but just states that things are BAD. // // The reason for this: In this case ALL information // might be falsificated, we can NOT trust the data // in the body NOT the signature - so we don't show // any key/signature information at all! // (khz, according to LinuxTag 2002 meeting) showKeyInfos = false; frameColor = SIG_FRAME_COL_RED; } else result.clear(); if( SIG_FRAME_COL_GREEN == frameColor ) { result = i18n("Good signature."); } else if( SIG_FRAME_COL_RED == frameColor ) { result = i18n("Bad signature."); } else result.clear(); if( !result2.isEmpty() ) { if( !result.isEmpty() ) result.append(QLatin1String("
")); result.append( result2 ); } } /* // add i18n support for 3rd party plug-ins here: else if ( cryptPlug->libName().contains( "yetanotherpluginname", Qt::CaseInsensitive )) { } */ } return result; } static QString writeSimpleSigstatHeader( const PartMetaData &block ) { QString html; html += QLatin1String("
"); if ( block.signClass == QLatin1String( "signErr" ) ) { html += i18n( "Invalid signature." ); } else if ( block.signClass == QLatin1String( "signOkKeyBad" ) || block.signClass == QLatin1String( "signWarn" ) ) { html += i18n( "Not enough information to check signature validity." ); } else if ( block.signClass == QLatin1String( "signOkKeyOk" ) ) { QString addr; if ( !block.signerMailAddresses.isEmpty() ) addr = block.signerMailAddresses.first(); QString name = addr; if ( name.isEmpty() ) name = block.signer; if ( addr.isEmpty() ) { html += i18n( "Signature is valid." ); } else { html += i18n( "Signed by %2.", addr, name ); } } else { // should not happen html += i18n( "Unknown signature state" ); } html += QLatin1String(""); html += QLatin1String(""); html += i18n( "Show Details" ); html += QLatin1String("
"); return html; } static QString beginVerboseSigstatHeader() { return QLatin1String(""); html += QLatin1String("
"); } static QString makeShowAuditLogLink( const GpgME::Error & err, const QString & auditLog ) { // more or less the same as // kleopatra/utils/auditlog.cpp:formatLink(), so any bug fixed here // equally applies there: if ( const unsigned int code = err.code() ) { if ( code == GPG_ERR_NOT_IMPLEMENTED ) { kDebug() << "not showing link (not implemented)"; return QString(); } else if ( code == GPG_ERR_NO_DATA ) { kDebug() << "not showing link (not available)"; return i18n("No Audit Log available"); } else { return i18n("Error Retrieving Audit Log: %1", QString::fromLocal8Bit( err.asString() ) ); } } if ( !auditLog.isEmpty() ) { KUrl url; url.setScheme( QLatin1String("kmail") ); url.setPath( QLatin1String("showAuditLog") ); url.addQueryItem( QLatin1String("log"), auditLog ); return QLatin1String("") + i18nc("The Audit Log is a detailed error log from the gnupg backend", "Show Audit Log") + QLatin1String(""); } return QString(); } static QString endVerboseSigstatHeader( const PartMetaData & pmd ) { QString html; html += QLatin1String(""); html += QLatin1String(""); html += i18n( "Hide Details" ); html += QLatin1String("
"); html += makeShowAuditLogLink( pmd.auditLogError, pmd.auditLog ); html += QLatin1String("
"); return html; } QString ObjectTreeParser::writeSigstatHeader( PartMetaData & block, const Kleo::CryptoBackend::Protocol * cryptProto, const QString & fromAddress, KMime::Content *node ) { const bool isSMIME = cryptProto && ( cryptProto == Kleo::CryptoBackendFactory::instance()->smime() ); QString signer = block.signer; QString htmlStr, simpleHtmlStr; const QString dir = QApplication::isRightToLeft() ? QLatin1String("rtl") : QLatin1String("ltr"); QString cellPadding(QLatin1String("cellpadding=\"1\"")); if( block.isEncapsulatedRfc822Message ) { htmlStr += QLatin1String("" "
"); if( node ) { htmlStr += QLatin1String("asHREF( node, QLatin1String("body") ) + QLatin1String("\">") + i18n("Encapsulated message") + QLatin1String(""); } else { htmlStr += i18n("Encapsulated message"); } htmlStr += QLatin1String("
"); } if( block.isEncrypted ) { htmlStr += QLatin1String("" "
"); if ( block.inProgress ) { htmlStr += i18n("Please wait while the message is being decrypted..."); } else if( block.isDecryptable ) { htmlStr += i18n("Encrypted message"); } else { htmlStr += i18n("Encrypted message (decryption not possible)"); if( !block.errorText.isEmpty() ) { htmlStr += QLatin1String("
") + i18n("Reason: %1", block.errorText ); } } htmlStr += QLatin1String("
"); } if ( block.isSigned && block.inProgress ) { block.signClass =QLatin1String( "signInProgress"); htmlStr += QLatin1String("" "
"); htmlStr += i18n("Please wait while the signature is being verified..."); htmlStr += QLatin1String("
"); } simpleHtmlStr = htmlStr; if( block.isSigned && !block.inProgress ) { QStringList& blockAddrs( block.signerMailAddresses ); // note: At the moment frameColor and showKeyInfos are // used for CMS only but not for PGP signatures // pending(khz): Implement usage of these for PGP sigs as well. int frameColor = SIG_FRAME_COL_UNDEF; bool showKeyInfos; bool onlyShowKeyURL = false; bool cannotCheckSignature = true; QString statusStr = sigStatusToString( cryptProto, block.status_code, block.sigSummary, frameColor, showKeyInfos ); // if needed fallback to english status text // that was reported by the plugin if( statusStr.isEmpty() ) statusStr = block.status; if( block.technicalProblem ) frameColor = SIG_FRAME_COL_YELLOW; switch( frameColor ){ case SIG_FRAME_COL_RED: cannotCheckSignature = false; break; case SIG_FRAME_COL_YELLOW: cannotCheckSignature = true; break; case SIG_FRAME_COL_GREEN: cannotCheckSignature = false; break; } // compose the string for displaying the key ID // either as URL or not linked (for unknown crypto) // note: Once we can start PGP key manager programs // from within KMail we could change this and // always show the URL. (khz, 2002/06/27) QString startKeyHREF; QString keyWithWithoutURL; if ( cryptProto ) { startKeyHREF = QString::fromLatin1("") .arg( cryptProto->displayName(), cryptProto->name(), QString::fromLatin1( block.keyId ) ); keyWithWithoutURL = QString::fromLatin1("%1%2").arg( startKeyHREF, QString::fromLatin1(QByteArray(QByteArray("0x") + block.keyId)) ); } else { keyWithWithoutURL = QLatin1String("0x") + QString::fromUtf8( block.keyId ); } // temporary hack: always show key information! showKeyInfos = true; // Sorry for using 'black' as null color but .isValid() // checking with QColor default c'tor did not work for // some reason. if( isSMIME && (SIG_FRAME_COL_UNDEF != frameColor) ) { // new frame settings for CMS: // beautify the status string if( !statusStr.isEmpty() ) { statusStr.prepend(QLatin1String("")); statusStr.append( QLatin1String("")); } // special color handling: S/MIME uses only green/yellow/red. switch( frameColor ) { case SIG_FRAME_COL_RED: block.signClass = QLatin1String("signErr");//"signCMSRed"; onlyShowKeyURL = true; break; case SIG_FRAME_COL_YELLOW: if( block.technicalProblem ) block.signClass = QLatin1String("signWarn"); else block.signClass = QLatin1String("signOkKeyBad");//"signCMSYellow"; break; case SIG_FRAME_COL_GREEN: block.signClass = QLatin1String("signOkKeyOk");//"signCMSGreen"; // extra hint for green case // that email addresses in DN do not match fromAddress QString greenCaseWarning; QString msgFrom( KPIMUtils::extractEmailAddress(fromAddress) ); QString certificate; if( block.keyId.isEmpty() ) certificate = i18n("certificate"); else certificate = startKeyHREF + i18n("certificate") + QLatin1String(""); if( !blockAddrs.empty() ){ if( !blockAddrs.contains( msgFrom, Qt::CaseInsensitive ) ) { greenCaseWarning = QLatin1String("") + i18nc("Start of warning message." ,"Warning:") + QLatin1String(" ") + i18n("Sender's mail address is not stored " "in the %1 used for signing.", certificate) + QLatin1String("
") + i18n("sender: ") + msgFrom + QLatin1String("
") + i18n("stored: "); // We cannot use Qt's join() function here but // have to join the addresses manually to // extract the mail addresses (without '<''>') // before including it into our string: bool bStart = true; for(QStringList::ConstIterator it = blockAddrs.constBegin(); it != blockAddrs.constEnd(); ++it ){ if( !bStart ) greenCaseWarning.append(QLatin1String(",
   ")); bStart = false; greenCaseWarning.append( KPIMUtils::extractEmailAddress(*it) ); } } } else { greenCaseWarning = QLatin1String("") + i18nc("Start of warning message.","Warning:") + QLatin1String(" ") + i18n("No mail address is stored in the %1 used for signing, " "so we cannot compare it to the sender's address %2.", certificate, msgFrom); } if( !greenCaseWarning.isEmpty() ) { if( !statusStr.isEmpty() ) statusStr.append(QLatin1String("
 
")); statusStr.append( greenCaseWarning ); } break; } QString frame = QLatin1String("" "
"); htmlStr += frame + beginVerboseSigstatHeader(); simpleHtmlStr += frame; simpleHtmlStr += writeSimpleSigstatHeader( block ); if( block.technicalProblem ) { htmlStr += block.errorText; } else if( showKeyInfos ) { if( cannotCheckSignature ) { htmlStr += i18n( "Not enough information to check " "signature. %1", keyWithWithoutURL ); } else { if (block.signer.isEmpty()) signer.clear(); else { if( !blockAddrs.empty() ){ const KUrl address = KPIMUtils::encodeMailtoUrl( blockAddrs.first() ); signer = QLatin1String("") + signer + QLatin1String(""); } } if( block.keyId.isEmpty() ) { if( signer.isEmpty() || onlyShowKeyURL ) htmlStr += i18n( "Message was signed with unknown key." ); else htmlStr += i18n( "Message was signed by %1.", signer ); } else { QDateTime created = block.creationTime; if( created.isValid() ) { if( signer.isEmpty() ) { if( onlyShowKeyURL ) htmlStr += i18n( "Message was signed with key %1.", keyWithWithoutURL ); else htmlStr += i18n( "Message was signed on %1 with key %2.", KGlobal::locale()->formatDateTime( created ), keyWithWithoutURL ); } else { if( onlyShowKeyURL ) htmlStr += i18n( "Message was signed with key %1.", keyWithWithoutURL ); else htmlStr += i18n( "Message was signed by %3 on %1 with key %2", KGlobal::locale()->formatDateTime( created ), keyWithWithoutURL, signer ); } } else { if( signer.isEmpty() || onlyShowKeyURL ) htmlStr += i18n( "Message was signed with key %1.", keyWithWithoutURL ); else htmlStr += i18n( "Message was signed by %2 with key %1.", keyWithWithoutURL, signer ); } } } htmlStr += QLatin1String("
"); if( !statusStr.isEmpty() ) { htmlStr += QLatin1String(" 
"); htmlStr += i18n( "Status: " ); htmlStr += statusStr; } } else { htmlStr += statusStr; } frame = QLatin1String("
"); htmlStr += endVerboseSigstatHeader( block ) + frame; simpleHtmlStr += frame; } else { // old frame settings for PGP: if( block.signer.isEmpty() || block.technicalProblem ) { block.signClass = QLatin1String("signWarn"); QString frame = QLatin1String("" "
"); htmlStr += frame + beginVerboseSigstatHeader(); simpleHtmlStr += frame; simpleHtmlStr += writeSimpleSigstatHeader( block ); if( block.technicalProblem ) { htmlStr += block.errorText; } else { if( !block.keyId.isEmpty() ) { QDateTime created = block.creationTime; if ( created.isValid() ) htmlStr += i18n( "Message was signed on %1 with unknown key %2.", KGlobal::locale()->formatDateTime( created ), keyWithWithoutURL ); else htmlStr += i18n( "Message was signed with unknown key %1.", keyWithWithoutURL ); } else htmlStr += i18n( "Message was signed with unknown key." ); htmlStr += QLatin1String("
"); htmlStr += i18n( "The validity of the signature cannot be " "verified." ); if( !statusStr.isEmpty() ) { htmlStr += QLatin1String("
"); htmlStr += i18n( "Status: " ); htmlStr += QLatin1String(""); htmlStr += statusStr; htmlStr += QLatin1String(""); } } frame = QLatin1String("
"); htmlStr += endVerboseSigstatHeader( block ) + frame; simpleHtmlStr += frame; } else { // HTMLize the signer's user id and create mailto: link signer = StringUtil::quoteHtmlChars( signer, true ); signer = QLatin1String("") + signer + QLatin1String(""); if (block.isGoodSignature) { if( block.keyTrust < Kpgp::KPGP_VALIDITY_MARGINAL ) block.signClass = QLatin1String("signOkKeyBad"); else block.signClass = QLatin1String("signOkKeyOk"); QString frame = QLatin1String("" "" "
"); htmlStr += frame + beginVerboseSigstatHeader(); simpleHtmlStr += frame; simpleHtmlStr += writeSimpleSigstatHeader( block ); if( !block.keyId.isEmpty() ) htmlStr += i18n( "Message was signed by %2 (Key ID: %1).", keyWithWithoutURL, signer ); else htmlStr += i18n( "Message was signed by %1.", signer ); htmlStr += QLatin1String("
"); switch( block.keyTrust ) { case Kpgp::KPGP_VALIDITY_UNKNOWN: htmlStr += i18n( "The signature is valid, but the key's " "validity is unknown." ); break; case Kpgp::KPGP_VALIDITY_MARGINAL: htmlStr += i18n( "The signature is valid and the key is " "marginally trusted." ); break; case Kpgp::KPGP_VALIDITY_FULL: htmlStr += i18n( "The signature is valid and the key is " "fully trusted." ); break; case Kpgp::KPGP_VALIDITY_ULTIMATE: htmlStr += i18n( "The signature is valid and the key is " "ultimately trusted." ); break; default: htmlStr += i18n( "The signature is valid, but the key is " "untrusted." ); } frame = QLatin1String("
"); htmlStr += endVerboseSigstatHeader( block ) + frame; simpleHtmlStr += frame; } else { block.signClass = QLatin1String("signErr"); QString frame = QLatin1String("" "" ""); htmlStr += QLatin1String("
"); htmlStr += frame + beginVerboseSigstatHeader(); simpleHtmlStr += frame; simpleHtmlStr += writeSimpleSigstatHeader( block ); if( !block.keyId.isEmpty() ) htmlStr += i18n( "Message was signed by %2 (Key ID: %1).", keyWithWithoutURL, signer ); else htmlStr += i18n( "Message was signed by %1.", signer ); htmlStr += QLatin1String("
"); htmlStr += i18n("Warning: The signature is bad."); frame = QLatin1String("
"); htmlStr += endVerboseSigstatHeader( block ) + frame; simpleHtmlStr += frame; } } } } if ( mSource->showSignatureDetails() ) return htmlStr; return simpleHtmlStr; } QString ObjectTreeParser::writeSigstatFooter( PartMetaData& block ) { const QString dir = ( QApplication::isRightToLeft() ? QLatin1String("rtl") : QLatin1String("ltr") ); QString htmlStr; if (block.isSigned) { htmlStr += QLatin1String("
") + i18n( "End of signed message" ) + QLatin1String("
"); } if (block.isEncrypted) { htmlStr += QLatin1String("
") + i18n( "End of encrypted message" ) + QLatin1String("
"); } if( block.isEncapsulatedRfc822Message ) { htmlStr += QLatin1String("
") + i18n( "End of encapsulated message" ) + QLatin1String("
"); } return htmlStr; } //----------------------------------------------------------------------------- void ObjectTreeParser::writeAttachmentMarkHeader( KMime::Content *node ) { if ( !htmlWriter() ) return; htmlWriter()->queue( QString::fromLatin1( "
\n" ).arg( node->index().toString() ) ); } //----------------------------------------------------------------------------- void ObjectTreeParser::writeAttachmentMarkFooter() { if ( !htmlWriter() ) return; htmlWriter()->queue( QLatin1String( "
" ) ); } //----------------------------------------------------------------------------- void ObjectTreeParser::writeBodyStr( const QByteArray& aStr, const QTextCodec *aCodec, const QString& fromAddress ) { KMMsgSignatureState dummy1; KMMsgEncryptionState dummy2; writeBodyStr( aStr, aCodec, fromAddress, dummy1, dummy2, false ); } //----------------------------------------------------------------------------- void ObjectTreeParser::writeBodyStr( const QByteArray& aStr, const QTextCodec *aCodec, const QString& fromAddress, KMMsgSignatureState& inlineSignatureState, KMMsgEncryptionState& inlineEncryptionState, bool decorate ) { const QString dir = ( QApplication::isRightToLeft() ? QLatin1String("rtl") : QLatin1String("ltr") ); //QString headerStr = QString::fromLatin1("
").arg(dir); inlineSignatureState = KMMsgNotSigned; inlineEncryptionState = KMMsgNotEncrypted; QList pgpBlocks; QList nonPgpBlocks; if( Kpgp::Module::prepareMessageForDecryption( aStr, pgpBlocks, nonPgpBlocks ) ) { const Kleo::CryptoBackend::Protocol* cryptProto = Kleo::CryptoBackendFactory::instance()->openpgp(); setCryptoProtocol( cryptProto ); QString htmlStr; QString plainTextStr; bool fullySignedOrEncrypted = true; QList::iterator pbit = pgpBlocks.begin(); QListIterator npbit( nonPgpBlocks ); for( ; pbit != pgpBlocks.end(); ++pbit ) { // insert the next Non-OpenPGP block QByteArray str( npbit.next() ); if( !str.trimmed().isEmpty() ) { const QString text = aCodec->toUnicode( str ); plainTextStr += text; if ( htmlWriter() ) { htmlStr += quotedHTML( text, decorate ); } kDebug() << "Non-empty Non-OpenPGP block found: '" << str << "'"; fullySignedOrEncrypted = false; } Kpgp::Block &block = *pbit; KMime::Content* content = new KMime::Content; content->setBody( block.text() ); content->parse(); std::vector signatures; bool passphraseError; PartMetaData messagePart; messagePart.isEncrypted = false; messagePart.isSigned = false; QString text; if ( block.type() == Kpgp::PgpMessageBlock ) { QByteArray decryptedData; bool signatureFound; bool actuallyEncrypted = true; bool decryptionStarted; bool bOkDecrypt = okDecryptMIME( *content, decryptedData, signatureFound, signatures, true, passphraseError, actuallyEncrypted, decryptionStarted, messagePart ); if ( decryptionStarted ) { writeDecryptionInProgressBlock(); return; } messagePart.isDecryptable = bOkDecrypt; messagePart.isEncrypted = actuallyEncrypted; messagePart.isSigned = signatureFound; text = aCodec->toUnicode( decryptedData ); } else if ( block.type() == Kpgp::ClearsignedBlock ) { //copied from ObjectTreeParser::writeOpaqueOrMultipartSignedData messagePart.isSigned = false; messagePart.technicalProblem = ( cryptProto == 0 ); messagePart.isEncrypted = false; messagePart.isDecryptable = false; messagePart.keyTrust = Kpgp::KPGP_VALIDITY_UNKNOWN; messagePart.status = i18n("Wrong Crypto Plug-In."); messagePart.status_code = GPGME_SIG_STAT_NONE; Kleo::VerifyOpaqueJob * job = cryptProto->verifyOpaqueJob(); VerifyOpaqueBodyPartMemento * m = new VerifyOpaqueBodyPartMemento( job, cryptProto->keyListJob(), block.text() ); m->exec(); if ( m ) { text = aCodec->toUnicode( m->plainText() ); messagePart.auditLogError = m->auditLogError(); messagePart.auditLog = m->auditLogAsHtml(); signatures = m->verifyResult().signatures(); messagePart.isSigned = signatures.size() > 0; } } if (!messagePart.isEncrypted && !messagePart.isSigned ) { text = aCodec->toUnicode( block.text() ); } if ( messagePart.isEncrypted ) inlineEncryptionState = KMMsgPartiallyEncrypted; if ( messagePart.isSigned ) { inlineSignatureState = KMMsgPartiallySigned; //copied from ObjectTreeParser::writeOpaqueOrMultipartSignedData GpgME::Signature signature = signatures.front(); GpgME::Key key; messagePart.status_code = signatureToStatus( signature ); messagePart.isGoodSignature = messagePart.status_code & GPGME_SIG_STAT_GOOD; // save extended signature status flags messagePart.sigSummary = signature.summary(); // Search for the key by it's fingerprint so that we can check for // trust etc. Kleo::KeyListJob * job = cryptProto->keyListJob( false ); // local, no sigs if ( !job ) { kDebug() << "The Crypto backend does not support listing keys. "; } else { std::vector found_keys; // As we are local it is ok to make this synchronous GpgME::KeyListResult res = job->exec( QStringList( QLatin1String(signature.fingerprint()) ), false, found_keys ); if ( res.error() ) { kDebug() << "Error while searching key for Fingerprint: " << signature.fingerprint(); } if ( found_keys.size() > 1 ) { // Should not Happen kDebug() << "Oops: Found more then one Key for Fingerprint: " << signature.fingerprint(); } if ( found_keys.size() != 1 ) { // Should not Happen at this point kDebug() << "Oops: Found no Key for Fingerprint: " << signature.fingerprint(); } else { key = found_keys[0]; } } if ( key.keyID() ) { messagePart.keyId = key.keyID(); } if ( messagePart.keyId.isEmpty() ) messagePart.keyId = signature.fingerprint(); // ### Ugh. We depend on two enums being in sync: messagePart.keyTrust = (Kpgp::Validity)signature.validity(); if ( key.numUserIDs() > 0 && key.userID( 0 ).id() ) messagePart.signer = Kleo::DN( key.userID( 0 ).id() ).prettyDN(); for ( uint iMail = 0; iMail < key.numUserIDs(); ++iMail ) { // The following if /should/ always result in TRUE but we // won't trust implicitely the plugin that gave us these data. if ( key.userID( iMail ).email() ) { QString email = QString::fromUtf8( key.userID( iMail ).email() ); // ### work around gpgme 0.3.x / cryptplug bug where the // ### email addresses are specified as angle-addr, not addr-spec: if ( email.startsWith( QLatin1Char('<') ) && email.endsWith( QLatin1Char('>') ) ) email = email.mid( 1, email.length() - 2 ); if ( !email.isEmpty() ) messagePart.signerMailAddresses.append( email ); } } if ( signature.creationTime() ) messagePart.creationTime.setTime_t( signature.creationTime() ); else messagePart.creationTime = QDateTime(); if ( messagePart.signer.isEmpty() ) { if ( key.numUserIDs() > 0 && key.userID( 0 ).name() ) messagePart.signer = Kleo::DN( key.userID( 0 ).name() ).prettyDN(); if ( !messagePart.signerMailAddresses.empty() ) { if ( messagePart.signer.isEmpty() ) messagePart.signer = messagePart.signerMailAddresses.front(); else messagePart.signer += QLatin1String(" <") + messagePart.signerMailAddresses.front() + QLatin1Char('>'); } } } plainTextStr += text; if ( htmlWriter() ) { if (messagePart.isEncrypted || messagePart.isSigned) htmlStr += writeSigstatHeader( messagePart, cryptProto, fromAddress ); if (messagePart.isEncrypted && !messagePart.isDecryptable) htmlStr += text; //Do not quote ErrorText else htmlStr += quotedHTML( text, decorate ); if ( messagePart.isEncrypted || messagePart.isSigned ) htmlStr += writeSigstatFooter( messagePart ); } } // add the last Non-OpenPGP block QByteArray str( nonPgpBlocks.last() ); if( !str.trimmed().isEmpty() ) { const QString text = aCodec->toUnicode( str ); plainTextStr += text; if ( htmlWriter() ) { htmlStr += quotedHTML( text, decorate ); } } //Do we have an fully Signed/Encrypted Message? if( fullySignedOrEncrypted ) { if( inlineSignatureState == KMMsgPartiallySigned ) inlineSignatureState = KMMsgFullySigned; if( inlineEncryptionState == KMMsgPartiallyEncrypted ) inlineEncryptionState = KMMsgFullyEncrypted; } if ( htmlWriter() ) { htmlWriter()->queue( htmlStr ); } mPlainTextContent = plainTextStr; mPlainTextContentCharset = aCodec->name(); } else { // No inline PGP encryption const QString plainText = aCodec->toUnicode( aStr ); if ( mPlainTextContent.isEmpty() ) { mPlainTextContent = plainText; mPlainTextContentCharset = aCodec->name(); } if ( htmlWriter() ) { htmlWriter()->queue( quotedHTML( plainText, decorate ) ); } } } QString ObjectTreeParser::quotedHTML( const QString& s, bool decorate ) { assert( cssHelper() ); int convertFlags = LinkLocator::PreserveSpaces | LinkLocator::HighlightText; if ( decorate && GlobalSettings::self()->showEmoticons() ) { convertFlags |= LinkLocator::ReplaceSmileys; } QString htmlStr; const QString normalStartTag = cssHelper()->nonQuotedFontTag(); QString quoteFontTag[3]; QString deepQuoteFontTag[3]; for ( int i = 0 ; i < 3 ; ++i ) { quoteFontTag[i] = cssHelper()->quoteFontTag( i ); deepQuoteFontTag[i] = cssHelper()->quoteFontTag( i+3 ); } const QString normalEndTag = QLatin1String("
"); const QString quoteEnd = QLatin1String(""); const unsigned int length = s.length(); bool paraIsRTL = false; bool startNewPara = true; unsigned int pos, beg; // skip leading empty lines for ( pos = 0; pos < length && s[pos] <= QLatin1Char(' '); pos++ ) ; while (pos > 0 && (s[pos-1] == QLatin1Char(' ') || s[pos-1] == QLatin1Char('\t'))) pos--; beg = pos; int currQuoteLevel = -2; // -2 == no previous lines bool curHidden = false; // no hide any block if ( GlobalSettings::self()->showExpandQuotesMark() ) { // Cache Icons if ( mCollapseIcon.isEmpty() ) { mCollapseIcon= LinkLocator::pngToDataUrl( IconNameCache::instance()->iconPath( QLatin1String("quotecollapse"), 0 )); } if ( mExpandIcon.isEmpty() ) mExpandIcon= LinkLocator::pngToDataUrl( IconNameCache::instance()->iconPath( QLatin1String("quoteexpand"), 0 )); } while (beg': case '|': actQuoteLevel++; break; case ' ': // spaces and tabs are allowed between the quote markers case '\t': case '\r': break; default: // stop quoting depth calculation p = numberOfCaracters; break; } } /* for() */ bool actHidden = false; // This quoted line needs be hidden if (GlobalSettings::self()->showExpandQuotesMark() && mSource->levelQuote() >= 0 && mSource->levelQuote() <= ( actQuoteLevel ) ) actHidden = true; if ( actQuoteLevel != currQuoteLevel ) { /* finish last quotelevel */ if (currQuoteLevel == -1) { htmlStr.append( normalEndTag ); } else if ( currQuoteLevel >= 0 && !curHidden ) { htmlStr.append( quoteEnd ); } /* start new quotelevel */ if (actQuoteLevel == -1) { htmlStr += normalStartTag; } else { if ( GlobalSettings::self()->showExpandQuotesMark() ) { if ( actHidden ) { //only show the QuoteMark when is the first line of the level hidden if ( !curHidden ) { //Expand all quotes htmlStr += QLatin1String("
") ; htmlStr += QString::fromLatin1( "" "\"\"" ) .arg(-1) .arg( mExpandIcon ); htmlStr += QLatin1String("

"); htmlStr += quoteEnd; } } else { htmlStr += QLatin1String("
" ); htmlStr += QString::fromLatin1( "" "\"\"" ) .arg(actQuoteLevel) .arg( mCollapseIcon); htmlStr += QLatin1String("
"); if ( actQuoteLevel < 3 ) { htmlStr += quoteFontTag[actQuoteLevel]; } else { htmlStr += deepQuoteFontTag[actQuoteLevel%3]; } } } else { if ( actQuoteLevel < 3 ) { htmlStr += quoteFontTag[actQuoteLevel]; } else { htmlStr += deepQuoteFontTag[actQuoteLevel%3]; } } } currQuoteLevel = actQuoteLevel; } curHidden = actHidden; if ( !actHidden ) { // don't write empty
blocks (they have zero height) // ignore ^M DOS linebreaks if( !line.remove( QLatin1Char('\015') ).isEmpty() ) { if ( startNewPara ) paraIsRTL = line.isRightToLeft(); htmlStr += QString::fromLatin1( "
" ).arg( paraIsRTL ? QLatin1String("rtl") : QLatin1String("ltr") ); htmlStr += LinkLocator::convertToHtml( line, convertFlags ); htmlStr += QLatin1String( "
" ); startNewPara = looksLikeParaBreak( s, pos ); } else { htmlStr += QLatin1String("
"); // after an empty line, always start a new paragraph startNewPara = true; } } } /* while() */ /* really finish the last quotelevel */ if (currQuoteLevel == -1) { htmlStr.append( normalEndTag ); } else { htmlStr.append( quoteEnd ); } //kDebug() << "========================================\n" // << htmlStr // << "\n======================================\n"; return htmlStr; } const QTextCodec * ObjectTreeParser::codecFor( KMime::Content * node ) const { assert( node ); if ( mSource->overrideCodec() ) return mSource->overrideCodec(); return mNodeHelper->codec( node ); } // Guesstimate if the newline at newLinePos actually separates paragraphs in the text s // We use several heuristics: // 1. If newLinePos points after or before (=at the very beginning of) text, it is not between paragraphs // 2. If the previous line was longer than the wrap size, we want to consider it a paragraph on its own // (some clients, notably Outlook, send each para as a line in the plain-text version). // 3. Otherwise, we check if the newline could have been inserted for wrapping around; if this // was the case, then the previous line will be shorter than the wrap size (which we already // know because of item 2 above), but adding the first word from the next line will make it // longer than the wrap size. bool ObjectTreeParser::looksLikeParaBreak( const QString& s, unsigned int newLinePos ) const { const unsigned int WRAP_COL = 78; unsigned int length = s.length(); // 1. Is newLinePos at an end of the text? if ( newLinePos >= length-1 || newLinePos == 0 ) { return false; } // 2. Is the previous line really a paragraph -- longer than the wrap size? // First char of prev line -- works also for first line unsigned prevStart = s.lastIndexOf( QLatin1Char('\n'), newLinePos - 1 ) + 1; unsigned prevLineLength = newLinePos - prevStart; if ( prevLineLength > WRAP_COL ) { return true; } // find next line to delimit search for first word unsigned int nextStart = newLinePos + 1; int nextEnd = s.indexOf( QLatin1Char('\n'), nextStart ); if ( nextEnd == -1 ) { nextEnd = length; } QString nextLine = s.mid( nextStart, nextEnd - nextStart ); length = nextLine.length(); // search for first word in next line unsigned int wordStart; bool found = false; for ( wordStart = 0; !found && wordStart < length; wordStart++ ) { switch ( nextLine[wordStart].toLatin1() ) { case '>': case '|': case ' ': // spaces, tabs and quote markers don't count case '\t': case '\r': break; default: found = true; break; } } /* for() */ if ( !found ) { // next line is essentially empty, it seems -- empty lines are // para separators return true; } //Find end of first word. //Note: flowText (in kmmessage.cpp) separates words for wrap by //spaces only. This should be consistent, which calls for some //refactoring. int wordEnd = nextLine.indexOf( QLatin1Char(' '), wordStart ); if ( wordEnd == (-1) ) { wordEnd = length; } int wordLength = wordEnd - wordStart; // 3. If adding a space and the first word to the prev line don't // make it reach the wrap column, then the break was probably // meaningful return prevLineLength + wordLength + 1 < WRAP_COL; } #ifdef MARCS_DEBUG void ObjectTreeParser::dumpToFile( const char * filename, const char * start, size_t len ) { assert( filename ); - QFile f( filename ); + QFile f( QString::fromAscii(filename) ); if ( f.open( QIODevice::WriteOnly ) ) { if ( start ) { QDataStream ds( &f ); ds.writeRawData( start, len ); } f.close(); // If data is 0 we just create a zero length file. } } #endif // !NDEBUG KMime::Content* ObjectTreeParser::findType( KMime::Content* content, const QByteArray& mimeType, bool deep, bool wide ) { if( ( !content->contentType()->isEmpty() ) && ( mimeType.isEmpty() || ( mimeType == content->contentType()->mimeType() ) ) ) return content; KMime::Content *child = MessageCore::NodeHelper::firstChild( content ); if ( child && deep ) //first child return findType( child, mimeType, deep, wide ); KMime::Content *next = MessageCore::NodeHelper::nextSibling( content ); if (next && wide ) //next on the same level return findType( next, mimeType, deep, wide ); return 0; } KMime::Content* ObjectTreeParser::findType( KMime::Content* content, const QByteArray& mediaType, const QByteArray& subType, bool deep, bool wide ) { if ( !content->contentType()->isEmpty() ) { if ( ( mediaType.isEmpty() || mediaType == content->contentType()->mediaType() ) && ( subType.isEmpty() || subType == content->contentType()->subType() ) ) return content; } KMime::Content *child = MessageCore::NodeHelper::firstChild( content ); if ( child && deep ) //first child return findType( child, mediaType, subType, deep, wide ); KMime::Content *next = MessageCore::NodeHelper::nextSibling( content ); if (next && wide ) //next on the same level return findType( next, mediaType, subType, deep, wide ); return 0; } KMime::Content* ObjectTreeParser::findTypeNot( KMime::Content * content, const QByteArray& mediaType, const QByteArray& subType, bool deep, bool wide ) { if( ( !content->contentType()->isEmpty() ) && ( mediaType.isEmpty() || content->contentType()->mediaType() != mediaType ) && ( subType.isEmpty() || content->contentType()->subType() != subType ) ) return content; KMime::Content *child = MessageCore::NodeHelper::firstChild( content ); if ( child && deep ) return findTypeNot( child, mediaType, subType, deep, wide ); KMime::Content *next = MessageCore::NodeHelper::nextSibling( content ); if ( next && wide ) return findTypeNot( next, mediaType, subType, deep, wide ); return 0; } QString ObjectTreeParser::convertedTextContent() const { QString plainTextContent = mPlainTextContent; if( plainTextContent.isEmpty() ) { #ifdef KDEPIM_NO_WEBKIT QTextDocument doc; doc.setHtml( mHtmlContent ); plainTextContent = doc.toPlainText(); #else QWebPage doc; doc.mainFrame()->setHtml( mHtmlContent ); plainTextContent = doc.mainFrame()->toPlainText(); #endif } return plainTextContent.append(QLatin1Char('\n')); } QString ObjectTreeParser::convertedHtmlContent() const { QString htmlContent = mHtmlContent; if( htmlContent.isEmpty() ) { QString convertedHtml = Qt::escape( mPlainTextContent ); convertedHtml.append(QLatin1String("")); convertedHtml.prepend(QLatin1String("")); htmlContent = convertedHtml.replace( QRegExp( QLatin1String("\n" )), QLatin1String("
") ); } return htmlContent.append(QLatin1Char('\n')); }