You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
tdepim/certmanager/lib/cryptplugwrapper.cpp

851 lines
27 KiB

/**
* cryptplugwrapper.cpp
*
* Copyright (c) 2001 Karl-Heinz Zimmer, Klaraelvdalens Datakonsult AB
*
* This CRYPTPLUG wrapper implementation is based on cryptplug.h by
* Karl-Heinz Zimmer which is based on 'The Aegypten Plugin API' as
* specified by Matthias Kalle Dalheimer, Klaraelvdalens Datakonsult AB,
* see file mua-integration.sgml located on Aegypten CVS:
* http://www.gnupg.org/aegypten/development.en.html
*
* purpose: Wrap up all Aegypten Plugin API functions in one C++ class
* for usage by KDE programs, e.g. KMail (or KMime, resp.)
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; version 2 of the License.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include "cryptplugwrapper.h"
#include "cryptplug.h"
#include <backends/qgpgme/qgpgmekeylistjob.h>
#include <backends/qgpgme/qgpgmeencryptjob.h>
#include <backends/qgpgme/qgpgmedecryptjob.h>
#include <backends/qgpgme/qgpgmesignjob.h>
#include <backends/qgpgme/qgpgmeverifydetachedjob.h>
#include <backends/qgpgme/qgpgmeverifyopaquejob.h>
#include <backends/qgpgme/qgpgmekeygenerationjob.h>
#include <backends/qgpgme/qgpgmeimportjob.h>
#include <backends/qgpgme/qgpgmeexportjob.h>
#include <backends/qgpgme/qgpgmesecretkeyexportjob.h>
#include <backends/qgpgme/qgpgmedownloadjob.h>
#include <backends/qgpgme/qgpgmedeletejob.h>
#include <backends/qgpgme/qgpgmesignencryptjob.h>
#include <backends/qgpgme/qgpgmedecryptverifyjob.h>
#include <backends/qgpgme/qgpgmecryptoconfig.h>
#include <backends/qgpgme/qgpgmerefreshkeysjob.h>
// qgpgme
#include <qgpgme/dataprovider.h>
// gpgme++
#include <gpgmepp/data.h>
#include <gpgmepp/importresult.h>
#include <gpgmepp/keygenerationresult.h>
// kde
#include <kdebug.h>
#include <kapplication.h>
#include <klocale.h>
#include <kglobal.h>
#include <tdeconfig.h>
// other
#include <memory>
#include <assert.h>
#include <stdlib.h>
#include <stdio.h>
/*
*
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* *
* This file's source comments - as well as those in interface file *
* cryptplugwrapper.h - are optimized for processing by Doxygen. *
* *
* To obtain best results please get an updated version of Doxygen, *
* for sources and binaries goto http://www.doxygen.org/index.html *
* *
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
*
*/
/*! \file cryptplugwrapper.cpp
\brief C++ wrapper for the CRYPTPLUG library API.
This CRYPTPLUG wrapper implementation is based on cryptplug.h by
Karl-Heinz Zimmer which is based on 'The Aegypten Plugin API' as
specified by Matthias Kalle Dalheimer, Klaraelvdalens Datakonsult AB,
see file mua-integration.sgml located on Aegypten CVS:
http://www.gnupg.org/aegypten/development.en.html
purpose: Wrap up all Aegypten Plugin API functions in one C++ class
for usage by KDE programs, e.g. KMail (or KMime, resp.)
CRYPTPLUG is an independent cryptography plug-in API
developed for Sphinx-enabeling KMail and Mutt.
CRYPTPLUG was designed for the Aegypten project, but it may
be used by 3rd party developers as well to design pluggable
crypto backends for the above mentioned MUAs.
\note All string parameters appearing in this API are to be
interpreted as UTF-8 encoded.
\see cryptplugwrapper.h
*/
// a little helper class for reordering of DN attributes
class DNBeautifier {
public:
enum UnknownAttrsHandling { unknownAttrsHide,
unknownAttrsPrefix,
unknownAttrsPostfix,
unknownAttrsInfix };
// infix: at the position of "_X_", if any, else Postfix
DNBeautifier()
{
// the attrOrder is defaulted to an empty string automatically
_unknownAttrsHandling = unknownAttrsInfix;
_unknownAttrsHandlingChar = "INFIX";
}
DNBeautifier( TDEConfig* config,
const TQString& cfgGroup,
const TQString& cfgAttributeOrderEntry,
const TQString& cfgUnknownAttrsEntry,
const TQStringList& fallbackAttrOrder = TQStringList(),
UnknownAttrsHandling fallbackUnknowAttrsHandling = unknownAttrsInfix )
{
_unknownAttrsHandling = unknownAttrsInfix;
_unknownAttrsHandlingChar = "INFIX";
if( config ){
const TQString oldGroup( config->group() );
config->setGroup( cfgGroup ); // e.g. "General"
_attrOrder =
config->readListEntry( cfgAttributeOrderEntry ); // e.g. "DNAttributeOrder"
_unknownAttrsHandlingChar =
config->readEntry( cfgUnknownAttrsEntry ).upper().latin1(); // e.g. "DNUnknownAttributes"
config->setGroup( oldGroup );
if( _unknownAttrsHandlingChar == "HIDE" )
_unknownAttrsHandling = unknownAttrsHide;
else if( _unknownAttrsHandlingChar == "PREFIX" )
_unknownAttrsHandling = unknownAttrsPrefix;
else if( _unknownAttrsHandlingChar == "POSTFIX" )
_unknownAttrsHandling = unknownAttrsPostfix;
else if( _unknownAttrsHandlingChar == "INFIX" )
_unknownAttrsHandling = unknownAttrsInfix;
else
_unknownAttrsHandlingChar = "INFIX";
}
if( _attrOrder.isEmpty() && ! fallbackAttrOrder.isEmpty() )
_attrOrder = fallbackAttrOrder;
if( _attrOrder.isEmpty() ){
_attrOrderChar = 0;
}else{
_attrOrderChar = new char*[ _attrOrder.count()+1 ];
int i=0;
for( TQStringList::ConstIterator itOrder = _attrOrder.begin();
itOrder != _attrOrder.end();
++itOrder ){
_attrOrderChar[ i ] = (char*)malloc( ((*itOrder).length()+1)*sizeof(char) );
strcpy( _attrOrderChar[ i ], (*itOrder).latin1() );
++i;
}
_attrOrderChar[ i ] = NULL;
}
}
~DNBeautifier()
{
int i=0;
for( TQStringList::ConstIterator itOrder = _attrOrder.begin();
itOrder != _attrOrder.end();
++itOrder ){
free( _attrOrderChar[ i ] );
++i;
}
delete[] _attrOrderChar;
}
TQStringList attrOrder() const
{
return _attrOrder;
}
char** attrOrderChar()
{
return _attrOrderChar;
}
UnknownAttrsHandling unknownAttrsHandling() const
{
return _unknownAttrsHandling;
}
const char* unknownAttrsHandlingChar() const
{
return _unknownAttrsHandlingChar;
}
TQValueList< TQPair<TQString,TQString> > reorder( const TQValueList< TQPair<TQString,TQString> > & dn ) const
{
return reorder( dn, _attrOrder, _unknownAttrsHandling );
}
static TQValueList< TQPair<TQString,TQString> > reorder(
const TQValueList< TQPair<TQString,TQString> > & dn,
TQStringList attrOrder,
UnknownAttrsHandling unknownAttrsHandling )
{
if( !attrOrder.isEmpty() ){
TQPtrList< TQPair<TQString,TQString> > unknownEntries;
TQValueList< TQPair<TQString,TQString> > dnNew;
TQPair<TQString,TQString>* unknownEntry;
TQStringList::ConstIterator itOrder;
TQValueList< TQPair<TQString,TQString> >::ConstIterator itDN;
bool bFound;
if( unknownAttrsHandling != unknownAttrsHide ){
// find all unknown entries in their order of appearance
for( itDN = dn.begin(); itDN != dn.end(); ++itDN ){
bFound = false;
for( itOrder = attrOrder.begin(); itOrder != attrOrder.end(); ++itOrder ){
if( (*itOrder) == (*itDN).first ){
bFound = true;
break;
}
}
if( !bFound )
unknownEntries.append( &(*itDN) );
}
}
// prepend the unknown attrs (if desired)
if( unknownAttrsHandling == unknownAttrsPrefix ){
for( unknownEntry = unknownEntries.first(); unknownEntry; unknownEntry = unknownEntries.next() ){
dnNew << *unknownEntry;
}
}
// process the known attrs in the desired order
bool b_X_declared = false;
for( itOrder = attrOrder.begin(); itOrder != attrOrder.end(); ++itOrder ){
if( (*itOrder) == "_X_" ){
b_X_declared = true;
// insert the unknown attrs (if desired)
if( unknownAttrsHandling == unknownAttrsInfix ){
for( unknownEntry = unknownEntries.first(); unknownEntry; unknownEntry = unknownEntries.next() ){
dnNew << *unknownEntry;
}
}
}else{
for( itDN = dn.begin(); itDN != dn.end(); ++itDN ){
if( (*itOrder) == (*itDN).first ){
dnNew << *itDN;
//kdDebug(5150) << TQString((*itDN).first) <<" = " << TQString((*itDN).second) << endl;;
}
}
}
}
// append the unknown attrs (if desired)
if( unknownAttrsHandling == unknownAttrsPostfix ||
( unknownAttrsHandling == unknownAttrsInfix && ! b_X_declared ) ){
for( unknownEntry = unknownEntries.first(); unknownEntry; unknownEntry = unknownEntries.next() ){
dnNew << *unknownEntry;
}
}
return dnNew;
}
return dn;
}
private:
TQStringList _attrOrder;
char** _attrOrderChar;
UnknownAttrsHandling _unknownAttrsHandling;
TQCString _unknownAttrsHandlingChar;
};
/* special helper class to be used by signing/encrypting functions *******/
StructuringInfoWrapper::StructuringInfoWrapper( CryptPlugWrapper* wrapper )
: _initDone( false ), _wrapper( wrapper )
{
initMe();
}
StructuringInfoWrapper::~StructuringInfoWrapper()
{
freeMe();
}
void StructuringInfoWrapper::reset()
{
freeMe();
initMe();
}
void StructuringInfoWrapper::initMe()
{
if ( _wrapper && _wrapper->cryptPlug() ) {
_wrapper->cryptPlug()->init_StructuringInfo( &data );
_initDone = true;
}
}
void StructuringInfoWrapper::freeMe()
{
if( _wrapper && _wrapper->cryptPlug() && _initDone ) {
_wrapper->cryptPlug()->free_StructuringInfo( &data );
_initDone = false;
}
}
class CryptPlugWrapper::Config {
public:
Config( gpgme_protocol_t proto );
~Config();
const char* signatureKeyCertificate;
SignatureAlgorithm signatureAlgorithm;
SignatureCompoundMode signatureCompoundMode;
SendCertificates sendCertificates;
bool saveSentSignatures;
bool warnNoCertificate;
bool signatureUseCRLs;
EncryptionAlgorithm encryptionAlgorithm;
EncryptEmail encryptEmail;
bool saveMessagesEncrypted;
bool encryptionUseCRLs;
bool encryptionCRLExpiryNearWarning;
int encryptionCRLNearExpiryInterval;
CertificateSource certificateSource;
bool warnSendUnsigned;
bool signatureCertificateExpiryNearWarning;
int signatureCertificateExpiryNearInterval;
bool cACertificateExpiryNearWarning;
int cACertificateExpiryNearInterval;
bool rootCertificateExpiryNearWarning;
int rootCertificateExpiryNearInterval;
bool warnSendUnencrypted;
bool checkCertificatePath;
bool receiverCertificateExpiryNearWarning;
int receiverCertificateExpiryNearWarningInterval;
bool certificateInChainExpiryNearWarning;
int certificateInChainExpiryNearWarningInterval;
bool receiverEmailAddressNotInCertificateWarning;
const char* libVersion; /* a statically allocated string with the GPGME Version used */
};
static const int NEAR_EXPIRY = 14;
CryptPlugWrapper::Config::Config( gpgme_protocol_t proto )
{
signatureAlgorithm = SignAlg_SHA1;
if ( proto == GPGME_PROTOCOL_CMS )
signatureCompoundMode = SignatureCompoundMode_Opaque;
else
signatureCompoundMode = SignatureCompoundMode_Detached;
sendCertificates = SendCert_SendChainWithRoot;
saveSentSignatures = true;
warnNoCertificate = true;
signatureUseCRLs = true;
encryptionAlgorithm = EncryptAlg_RSA;
encryptEmail = EncryptEmail_Ask;
saveMessagesEncrypted = true;
encryptionUseCRLs = true;
encryptionCRLExpiryNearWarning = false;
encryptionCRLNearExpiryInterval = NEAR_EXPIRY;
certificateSource = CertSrc_Server;
warnSendUnsigned = true;
signatureCertificateExpiryNearWarning = true;
signatureCertificateExpiryNearInterval = NEAR_EXPIRY;
cACertificateExpiryNearWarning = true;
cACertificateExpiryNearInterval = NEAR_EXPIRY;
rootCertificateExpiryNearWarning = true;
rootCertificateExpiryNearInterval = NEAR_EXPIRY;
warnSendUnencrypted = false;
checkCertificatePath = true;
receiverCertificateExpiryNearWarning = true;
receiverCertificateExpiryNearWarningInterval = NEAR_EXPIRY;
certificateInChainExpiryNearWarning = true;
certificateInChainExpiryNearWarningInterval = NEAR_EXPIRY;
receiverEmailAddressNotInCertificateWarning = true;
libVersion = gpgme_check_version (NULL);
}
CryptPlugWrapper::Config::~Config() {
}
/* Some multi purpose functions ******************************************/
TQString CryptPlugWrapper::errorIdToText( int errId, bool & isPassphraseError ) {
const GpgME::Error err( errId );
isPassphraseError = err.isCanceled()
|| gpgme_err_code( errId ) == GPG_ERR_NO_SECKEY ; // FIXME: more?
return TQString::fromLocal8Bit( err.asString() );
}
/* some special functions ************************************************/
CryptPlugWrapper::CryptPlugWrapper( const TQString& name,
const TQString& libName,
const TQString& update,
bool active )
: Kleo::CryptoBackend::Protocol(),
_name( name ),
_libName( libName ),
_updateURL( update ),
_active( active ),
_iniStatus( IniStatus_undef ),
_cp( 0 ),
_config( 0 ),
_cryptoConfig( 0 )
{
const bool ok = initialize( 0, 0 );
assert( ok );
}
CryptPlugWrapper::~CryptPlugWrapper()
{
deinitialize();
}
void CryptPlugWrapper::setActive( bool active )
{
_active = active;
}
bool CryptPlugWrapper::active() const
{
return _active;
}
bool CryptPlugWrapper::setLibName( const TQString& libName )
{
bool bOk = ! _cp; // Changing the lib name is only allowed
if( bOk ) // when either no initialization took
_libName = libName; // place or 'deinitialize()' has been
return bOk; // called afterwards.
}
TQString CryptPlugWrapper::libName() const
{
return _libName;
}
TQString CryptPlugWrapper::protocol() const
{
if ( _libName.contains( "smime" ) )
return "SMIME";
if ( _libName.contains( "openpgp" ) )
return "OpenPGP";
return TQString();
}
void CryptPlugWrapper::setDisplayName( const TQString& name )
{
_name = name;
}
TQString CryptPlugWrapper::displayName() const
{
if ( !_name.isEmpty() )
return _name;
if ( _libName.contains( "smime" ) )
return "gpgsm";
if ( _libName.contains( "openpgp" ) )
return "gpg";
return i18n("(Unknown Protocol)");
}
bool CryptPlugWrapper::initialize( IniStatus* iniStatus, TQString* errorMsg )
{
if ( _cp )
return true;
_iniStatus = IniStatus_undef;
/* make sure we have a lib name */
if ( _libName.isEmpty() ) {
_iniStatus = IniStatus_NoLibName;
kdDebug(5150) << "No library name was given.\n" << endl;
} else {
if ( _libName.contains( "smime" ) ) {
_cp = new SMIMECryptPlug();
_config = new Config( GPGME_PROTOCOL_CMS );
} else if ( _libName.contains( "openpgp" ) ) {
_cp = new OpenPGPCryptPlug();
_config = new Config( GPGME_PROTOCOL_OpenPGP );
} else {
_cp = 0;
_config = 0;
}
if ( !_cp ) {
_iniStatus = IniStatus_LoadError;
kdDebug(5150) << "Couldn't create '" << _libName.latin1() << "'" << endl;
} else {
/* now call the init function */
if( !_cp->initialize() ) {
_iniStatus = IniStatus_InitError;
kdDebug(5150) << "Error while executing function 'initialize' on plugin " << _libName << endl;
_lastError = i18n("Error while initializing plugin \"%1\"").arg( _libName );
if ( errorMsg )
*errorMsg = _lastError;
delete _cp; _cp = 0;
delete _config; _config = 0;
} else {
_iniStatus = IniStatus_Ok;
}
}
}
if( iniStatus )
*iniStatus = _iniStatus;
return _iniStatus == IniStatus_Ok;
}
void CryptPlugWrapper::deinitialize()
{
delete _cp; _cp = 0;
delete _config; _config = 0;
delete _cryptoConfig; _cryptoConfig = 0;
}
CryptPlugWrapper::IniStatus CryptPlugWrapper::iniStatus( TQString* errorMsg ) const
{
if( errorMsg )
*errorMsg = _lastError;
return _iniStatus;
}
bool CryptPlugWrapper::hasFeature( Feature flag )
{
return _cp && _cp->hasFeature( flag );
}
/* normal functions ******************************************************/
bool CryptPlugWrapper::checkMessageSignature( char** cleartext,
const char* signaturetext,
bool signatureIsBinary,
int signatureLen,
CryptPlug::SignatureMetaData* sigmeta )
{
DNBeautifier dnBeautifier( kapp->config(),
"DN",
"AttributeOrder",
"UnknownAttributes" );
return _cp && _cp->checkMessageSignature( cleartext,
signaturetext,
signatureIsBinary,
signatureLen,
sigmeta,
dnBeautifier.attrOrderChar(),
dnBeautifier.unknownAttrsHandlingChar() );
}
bool CryptPlugWrapper::decryptMessage( const char* ciphertext,
bool cipherIsBinary,
int cipherLen,
char** cleartext,
const char* certificate,
int* errId,
char** errTxt )
{
return _cp && _cp->decryptMessage( ciphertext, cipherIsBinary, cipherLen,
(const char**)cleartext, certificate, errId, errTxt );
}
bool CryptPlugWrapper::decryptAndCheckMessage(
const char* ciphertext,
bool cipherIsBinary,
int cipherLen,
char** cleartext,
const char* certificate,
bool* signatureFound,
CryptPlug::SignatureMetaData* sigmeta,
int* errId,
char** errTxt )
{
DNBeautifier dnBeautifier( kapp->config(),
"DN",
"AttributeOrder",
"UnknownAttributes" );
return _cp && _cp->decryptAndCheckMessage( ciphertext,
cipherIsBinary,
cipherLen,
(const char**)cleartext,
certificate,
signatureFound,
sigmeta,
errId,
errTxt,
dnBeautifier.attrOrderChar(),
dnBeautifier.unknownAttrsHandlingChar() );
}
void CryptPlugWrapper::freeSignatureMetaData( CryptPlug::SignatureMetaData* sigmeta )
{
if ( !sigmeta )
return;
free( sigmeta->status );
for( int i = 0; i < sigmeta->extended_info_count; ++i ) {
free( sigmeta->extended_info[i].creation_time );
free( (void*)sigmeta->extended_info[i].status_text );
free( (void*)sigmeta->extended_info[i].keyid );
free( (void*)sigmeta->extended_info[i].fingerprint );
free( (void*)sigmeta->extended_info[i].algo );
free( (void*)sigmeta->extended_info[i].userid );
free( (void*)sigmeta->extended_info[i].name );
free( (void*)sigmeta->extended_info[i].comment );
if( sigmeta->extended_info[i].emailCount ){
for( int j=0; j < sigmeta->extended_info[i].emailCount; ++j)
if( sigmeta->extended_info[i].emailList[j] )
free( (void*)sigmeta->extended_info[i].emailList[j] );
free( (void*)sigmeta->extended_info[i].emailList );
}
}
free( sigmeta->extended_info );
}
GpgME::ImportResult CryptPlugWrapper::importCertificate( const char* data, size_t length )
{
if ( !_cp )
return GpgME::ImportResult();
return _cp->importCertificateFromMem( data, length );
}
Kleo::KeyListJob * CryptPlugWrapper::keyListJob( bool remote, bool includeSigs, bool validate ) const {
if ( !_cp )
return 0;
GpgME::Context * context = GpgME::Context::createForProtocol( _cp->mProtocol );
if ( !context )
return 0;
unsigned int mode = context->keyListMode();
if ( remote ) {
mode |= GpgME::Context::Extern;
mode &= ~GpgME::Context::Local;
} else {
mode |= GpgME::Context::Local;
mode &= ~GpgME::Context::Extern;
}
if ( includeSigs ) mode |= GpgME::Context::Signatures;
if ( validate ) mode |= GpgME::Context::Validate;
context->setKeyListMode( mode );
return new Kleo::QGpgMEKeyListJob( context );
}
Kleo::EncryptJob * CryptPlugWrapper::encryptJob( bool armor, bool textmode ) const {
if ( !_cp )
return 0;
GpgME::Context * context = GpgME::Context::createForProtocol( _cp->mProtocol );
if ( !context )
return 0;
context->setArmor( armor );
context->setTextMode( textmode );
return new Kleo::QGpgMEEncryptJob( context );
}
Kleo::DecryptJob * CryptPlugWrapper::decryptJob() const {
if ( !_cp )
return 0;
GpgME::Context * context = GpgME::Context::createForProtocol( _cp->mProtocol );
if ( !context )
return 0;
return new Kleo::QGpgMEDecryptJob( context );
}
Kleo::SignJob * CryptPlugWrapper::signJob( bool armor, bool textMode ) const {
if ( !_cp )
return 0;
GpgME::Context * context = GpgME::Context::createForProtocol( _cp->mProtocol );
if ( !context )
return 0;
context->setArmor( armor );
context->setTextMode( textMode );
return new Kleo::QGpgMESignJob( context );
}
Kleo::VerifyDetachedJob * CryptPlugWrapper::verifyDetachedJob( bool textMode ) const {
if ( !_cp )
return 0;
GpgME::Context * context = GpgME::Context::createForProtocol( _cp->mProtocol );
if ( !context )
return 0;
context->setTextMode( textMode );
return new Kleo::QGpgMEVerifyDetachedJob( context );
}
Kleo::VerifyOpaqueJob * CryptPlugWrapper::verifyOpaqueJob( bool textMode ) const {
if ( !_cp )
return 0;
GpgME::Context * context = GpgME::Context::createForProtocol( _cp->mProtocol );
if ( !context )
return 0;
context->setTextMode( textMode );
return new Kleo::QGpgMEVerifyOpaqueJob( context );
}
Kleo::KeyGenerationJob * CryptPlugWrapper::keyGenerationJob() const {
if ( !_cp )
return 0;
GpgME::Context * context = GpgME::Context::createForProtocol( _cp->mProtocol );
if ( !context )
return 0;
return new Kleo::QGpgMEKeyGenerationJob( context );
}
Kleo::ImportJob * CryptPlugWrapper::importJob() const {
if ( !_cp )
return 0;
GpgME::Context * context = GpgME::Context::createForProtocol( _cp->mProtocol );
if ( !context )
return 0;
return new Kleo::QGpgMEImportJob( context );
}
Kleo::ExportJob * CryptPlugWrapper::publicKeyExportJob( bool armor ) const {
if ( !_cp )
return 0;
GpgME::Context * context = GpgME::Context::createForProtocol( _cp->mProtocol );
if ( !context )
return 0;
context->setArmor( armor );
return new Kleo::QGpgMEExportJob( context );
}
Kleo::ExportJob * CryptPlugWrapper::secretKeyExportJob( bool armor, const TQString& charset ) const {
if ( !_cp || _cp->mProtocol != GpgME::Context::CMS ) // fixme: add support for gpg, too
return 0;
// this operation is not supported by gpgme, so we have to call gpgsm ourselves:
return new Kleo::QGpgMESecretKeyExportJob( armor, charset );
}
Kleo::RefreshKeysJob * CryptPlugWrapper::refreshKeysJob() const {
if ( !_cp || _cp->mProtocol != GpgME::Context::CMS ) // fixme: add support for gpg, too
return 0;
// this operation is not supported by gpgme, so we have to call gpgsm ourselves:
return new Kleo::QGpgMERefreshKeysJob();
}
Kleo::DownloadJob * CryptPlugWrapper::downloadJob( bool armor ) const {
if ( !_cp )
return 0;
GpgME::Context * context = GpgME::Context::createForProtocol( _cp->mProtocol );
if ( !context )
return 0;
context->setArmor( armor );
// this is the hackish interface for downloading from keyserers currently:
context->setKeyListMode( GpgME::Context::Extern );
return new Kleo::QGpgMEDownloadJob( context );
}
Kleo::DeleteJob * CryptPlugWrapper::deleteJob() const {
if ( !_cp )
return 0;
GpgME::Context * context = GpgME::Context::createForProtocol( _cp->mProtocol );
if ( !context )
return 0;
return new Kleo::QGpgMEDeleteJob( context );
}
Kleo::SignEncryptJob * CryptPlugWrapper::signEncryptJob( bool armor, bool textMode ) const {
if ( !_cp )
return 0;
GpgME::Context * context = GpgME::Context::createForProtocol( _cp->mProtocol );
if ( !context )
return 0;
context->setArmor( armor );
context->setTextMode( textMode );
return new Kleo::QGpgMESignEncryptJob( context );
}
Kleo::DecryptVerifyJob * CryptPlugWrapper::decryptVerifyJob( bool textMode ) const {
if ( !_cp )
return 0;
GpgME::Context * context = GpgME::Context::createForProtocol( _cp->mProtocol );
if ( !context )
return 0;
context->setTextMode( textMode );
return new Kleo::QGpgMEDecryptVerifyJob( context );
}