Files
evolution/mail/session.c
Dan Winship 324b1e8675 New code to spawn off GPG/PGP to do stuff. Currently only deals with
* mail-crypto.c: New code to spawn off GPG/PGP to do stuff.
	Currently only deals with decryption. From Nathan Thompson-Amato
	<ndt@jps.net>, with bunches of changes from me.

	* session.c (mail_request_dialog): Expose the password dialog to
	the rest of the app (for use by the GPG/PGP code).

	* mail-format.c (handle_text_plain): Handle special inline data
	types. (Currently uuencoding, BinHex, and PGP encryption.) This is
	not the best way to deal with it, but it works for now.
	(try_inline_pgp): Convert an inline PGP-encrypted message into a
	multipart/encrypted part.
	(try_inline_binhex): Convert an inline BinHex attachment into an
	application/mac-binhex40 part (which we currently don't deal
	with...)
	(try_uudecoding): Convert a uuencoded attachment to an
	application/octet-stream part.
	(handle_multipart_encrypted): Deal with RFC2015 MIME-encoded PGP
	encrypted messages. (From ndt.)

	* mail-display.c (mail_text_write, mail_error_write): New utility
	functions.

	* Makefile.am (evolution_mail_SOURCES): add mail-crypto.c

svn path=/trunk/; revision=4466
2000-08-02 02:56:48 +00:00

141 lines
2.8 KiB
C

/*
* session.c: handles the session information and resource manipulation
*
* Author:
* Miguel de Icaza (miguel@gnu.org)
*
* (C) 2000 Helix Code, Inc. http://www.helixcode.com
*/
#include <config.h>
#include <gnome.h>
#include "mail.h"
#include "mail-threads.h"
#include "e-util/e-setup.h"
CamelSession *session;
GHashTable *passwords;
/* FIXME: Will this ever be called in a non-async
* manner? Better hope not, cause if that happens
* we deadlock....
*/
#ifdef USE_BROKEN_THREADS
#define ASYNC_AUTH_CALLBACK
#endif
#ifndef ASYNC_AUTH_CALLBACK
static void
request_callback (gchar *string, gpointer data)
{
char **ans = data;
if (string)
*ans = g_strdup(string);
else
*ans = NULL;
}
#endif
char *
mail_request_dialog (const char *prompt, gboolean secret, const char *key)
{
#ifndef ASYNC_AUTH_CALLBACK
GtkWidget *dialog;
#endif
char *ans;
if (!passwords)
passwords = g_hash_table_new (g_str_hash, g_str_equal);
ans = g_hash_table_lookup (passwords, key);
if (ans)
return g_strdup (ans);
#ifndef ASYNC_AUTH_CALLBACK
/* XXX parent window? */
dialog = gnome_request_dialog (secret, prompt, NULL, 0,
request_callback, &ans, NULL);
if (!dialog)
return NULL;
if (gnome_dialog_run_and_close (GNOME_DIALOG (dialog)) == -1 ||
ans == NULL)
return NULL;
#else
if (!mail_op_get_password (data, secret, &ans))
return NULL;
#endif
g_hash_table_insert (passwords, g_strdup (key), g_strdup (ans));
return ans;
}
static char *
auth_callback (CamelAuthCallbackMode mode, char *data, gboolean secret,
CamelService *service, char *item, CamelException *ex)
{
char *key, *ans;
if (!passwords)
passwords = g_hash_table_new (g_str_hash, g_str_equal);
key = g_strdup_printf ("%s:%s",
camel_url_to_string (service->url, FALSE),
item);
if (mode == CAMEL_AUTHENTICATOR_TELL) {
if (!data) {
g_hash_table_remove (passwords, key);
g_free (key);
} else {
gpointer old_key, old_data;
if (g_hash_table_lookup_extended (passwords, key,
&old_key,
&old_data)) {
g_hash_table_insert (passwords, old_key, data);
g_free (old_data);
g_free (key);
} else
g_hash_table_insert (passwords, key, data);
}
return NULL;
}
ans = mail_request_dialog (data, secret, key);
g_free (key);
if (!ans) {
camel_exception_set (ex, CAMEL_EXCEPTION_USER_CANCEL,
"User canceled operation.");
}
return ans;
}
void
session_init (void)
{
e_setup_base_dir ();
camel_init ();
session = camel_session_new (auth_callback);
}
static gboolean
free_entry (gpointer key, gpointer value, gpointer user_data)
{
g_free (key);
memset (value, 0, strlen (value));
g_free (value);
return TRUE;
}
void
forget_passwords (BonoboUIHandler *uih, void *user_data, const char *path)
{
g_hash_table_foreach_remove (passwords, free_entry, NULL);
}