X-Git-Url: http://git.madism.org/?p=apps%2Fmadmutt.git;a=blobdiff_plain;f=lib-crypt%2Fpgp.c;h=ea63f2c76eb33833e0589e0352bacef8d8deb146;hp=8875ed998cae8ee5f9b9656792dbb7784bf46ebc;hb=9ed7a487e3a922f2cbb222961c2c9710c3a65f91;hpb=1ee89902de184a640c171ae3285bff6882a791bd diff --git a/lib-crypt/pgp.c b/lib-crypt/pgp.c index 8875ed9..ea63f2c 100644 --- a/lib-crypt/pgp.c +++ b/lib-crypt/pgp.c @@ -24,12 +24,13 @@ #endif #include +#include #include #include #include +#include -#include "mutt.h" #include "handler.h" #include "pgp.h" #include "copy.h" @@ -265,8 +266,8 @@ int pgp_application_pgp_handler (BODY * m, STATE * s) have_any_sigs = have_any_sigs || (clearsign && (s->flags & M_VERIFY)); /* Copy PGP material to temporary file */ - mutt_mktemp (tmpfname); - if ((tmpfp = safe_fopen (tmpfname, "w+")) == NULL) { + tmpfp = m_tempfile(tmpfname, sizeof(tmpfname), NONULL(Tempdir), NULL); + if (tmpfp == NULL) { mutt_perror (tmpfname); return (-1); } @@ -294,16 +295,16 @@ int pgp_application_pgp_handler (BODY * m, STATE * s) /* Invoke PGP if needed */ if (!clearsign || (s->flags & M_VERIFY)) { - mutt_mktemp (outfile); - if ((pgpout = safe_fopen (outfile, "w+")) == NULL) { - mutt_perror (tmpfname); + pgpout = m_tempfile(outfile, sizeof(outfile), NONULL(Tempdir), NULL); + if (pgpout == NULL) { + mutt_perror (outfile); return (-1); } if ((thepid = pgp_invoke_decode (&pgpin, NULL, &pgperr, -1, fileno (pgpout), -1, tmpfname, needpass)) == -1) { - safe_fclose (&pgpout); + m_fclose(&pgpout); maybe_goodsig = 0; pgpin = NULL; pgperr = NULL; @@ -321,14 +322,14 @@ int pgp_application_pgp_handler (BODY * m, STATE * s) fprintf (pgpin, "%s\n", PgpPass); } - safe_fclose (&pgpin); + m_fclose(&pgpin); if (s->flags & M_DISPLAY) { crypt_current_time (s, "PGP"); rc = pgp_copy_checksig (pgperr, s->fpout); } - safe_fclose (&pgperr); + m_fclose(&pgperr); rv = mutt_wait_filter (thepid); if (s->flags & M_DISPLAY) { @@ -429,11 +430,11 @@ out: m->goodsig = (maybe_goodsig && have_any_sigs); if (tmpfp) { - safe_fclose (&tmpfp); + m_fclose(&tmpfp); mutt_unlink (tmpfname); } if (pgpout) { - safe_fclose (&pgpout); + m_fclose(&pgpout); mutt_unlink (outfile); } @@ -485,7 +486,7 @@ static int pgp_check_traditional_one_body (FILE * fp, BODY * b, key = 1; } } - safe_fclose (&tfp); + m_fclose(&tfp); unlink (tempfile); if (!enc && !sgn && !key) @@ -544,10 +545,10 @@ int pgp_verify_one (BODY * sigbdy, STATE * s, const char *tempfile) fseeko (s->fpin, sigbdy->offset, 0); mutt_copy_bytes (s->fpin, fp, sigbdy->length); - fclose (fp); + m_fclose(&fp); - mutt_mktemp (pgperrfile); - if (!(pgperr = safe_fopen (pgperrfile, "w+"))) { + pgperr = m_tempfile(pgperrfile, sizeof(pgperrfile), NONULL(Tempdir), NULL); + if (pgperr == NULL) { mutt_perror (pgperrfile); unlink (sigfile); return -1; @@ -562,7 +563,7 @@ int pgp_verify_one (BODY * sigbdy, STATE * s, const char *tempfile) badsig = 0; - safe_fclose (&pgpout); + m_fclose(&pgpout); fflush (pgperr); rewind (pgperr); @@ -573,7 +574,7 @@ int pgp_verify_one (BODY * sigbdy, STATE * s, const char *tempfile) badsig = -1; } - safe_fclose (&pgperr); + m_fclose(&pgperr); state_attach_puts (_("[-- End of PGP output --]\n\n"), s); @@ -586,69 +587,14 @@ int pgp_verify_one (BODY * sigbdy, STATE * s, const char *tempfile) /* Extract pgp public keys from messages or attachments */ -void pgp_extract_keys_from_messages (HEADER * h) -{ - int i; - char tempfname[_POSIX_PATH_MAX]; - FILE *fpout; - - if (h) { - mutt_parse_mime_message (Context, h); - if (h->security & PGPENCRYPT && !pgp_valid_passphrase ()) - return; - } - - mutt_mktemp (tempfname); - if (!(fpout = safe_fopen (tempfname, "w"))) { - mutt_perror (tempfname); - return; - } - - set_option (OPTDONTHANDLEPGPKEYS); - - if (!h) { - for (i = 0; i < Context->vcount; i++) { - if (Context->hdrs[Context->v2r[i]]->tagged) { - mutt_parse_mime_message (Context, Context->hdrs[Context->v2r[i]]); - if (Context->hdrs[Context->v2r[i]]->security & PGPENCRYPT - && !pgp_valid_passphrase ()) { - fclose (fpout); - goto bailout; - } - mutt_copy_message (fpout, Context, Context->hdrs[Context->v2r[i]], - M_CM_DECODE | M_CM_CHARCONV, 0); - } - } - } - else { - mutt_parse_mime_message (Context, h); - if (h->security & PGPENCRYPT && !pgp_valid_passphrase ()) { - fclose (fpout); - goto bailout; - } - mutt_copy_message (fpout, Context, h, M_CM_DECODE | M_CM_CHARCONV, 0); - } - - fclose (fpout); - mutt_endwin (NULL); - pgp_invoke_import (tempfname); - mutt_any_key_to_continue (NULL); - -bailout: - - mutt_unlink (tempfname); - unset_option (OPTDONTHANDLEPGPKEYS); - -} - static void pgp_extract_keys_from_attachment (FILE * fp, BODY * top) { STATE s; FILE *tempfp; char tempfname[_POSIX_PATH_MAX]; - mutt_mktemp (tempfname); - if (!(tempfp = safe_fopen (tempfname, "w"))) { + tempfp = m_tempfile(tempfname, sizeof(tempfname), NONULL(Tempdir), NULL); + if (tempfp == NULL) { mutt_perror (tempfname); return; } @@ -660,7 +606,7 @@ static void pgp_extract_keys_from_attachment (FILE * fp, BODY * top) mutt_body_handler (top, &s); - fclose (tempfp); + m_fclose(&tempfp); pgp_invoke_import (tempfname); mutt_any_key_to_continue (NULL); @@ -702,17 +648,17 @@ BODY *pgp_decrypt_part (BODY * a, STATE * s, FILE * fpout, BODY * p) pid_t thepid; int rv; - mutt_mktemp (pgperrfile); - if ((pgperr = safe_fopen (pgperrfile, "w+")) == NULL) { + pgperr = m_tempfile(pgperrfile, sizeof(pgperrfile), NONULL(Tempdir), NULL); + if (pgperr == NULL) { mutt_perror (pgperrfile); return NULL; } unlink (pgperrfile); - mutt_mktemp (pgptmpfile); - if ((pgptmp = safe_fopen (pgptmpfile, "w")) == NULL) { + pgptmp = m_tempfile(pgptmpfile, sizeof(pgptmpfile), NONULL(Tempdir), NULL); + if (!pgptmp == NULL) { mutt_perror (pgptmpfile); - fclose (pgperr); + m_fclose(&pgperr); return NULL; } @@ -722,11 +668,11 @@ BODY *pgp_decrypt_part (BODY * a, STATE * s, FILE * fpout, BODY * p) fseeko (s->fpin, a->offset, 0); mutt_copy_bytes (s->fpin, pgptmp, a->length); - fclose (pgptmp); + m_fclose(&pgptmp); if ((thepid = pgp_invoke_decrypt (&pgpin, &pgpout, NULL, -1, -1, fileno (pgperr), pgptmpfile)) == -1) { - fclose (pgperr); + m_fclose(&pgperr); unlink (pgptmpfile); if (s->flags & M_DISPLAY) state_attach_puts (_ @@ -741,7 +687,7 @@ BODY *pgp_decrypt_part (BODY * a, STATE * s, FILE * fpout, BODY * p) if (!pgp_use_gpg_agent ()) fputs (PgpPass, pgpin); fputc ('\n', pgpin); - fclose (pgpin); + m_fclose(&pgpin); /* Read the output from PGP, and make sure to change CRLF to LF, otherwise * read_mime_header has a hard time parsing the message. @@ -753,7 +699,7 @@ BODY *pgp_decrypt_part (BODY * a, STATE * s, FILE * fpout, BODY * p) fputs (buf, fpout); } - fclose (pgpout); + m_fclose(&pgpout); rv = mutt_wait_filter (thepid); mutt_unlink (pgptmpfile); @@ -766,7 +712,7 @@ BODY *pgp_decrypt_part (BODY * a, STATE * s, FILE * fpout, BODY * p) p->goodsig = 0; state_attach_puts (_("[-- End of PGP output --]\n\n"), s); } - fclose (pgperr); + m_fclose(&pgperr); fflush (fpout); rewind (fpout); @@ -810,8 +756,8 @@ int pgp_decrypt_mime (FILE * fpin, FILE ** fpout, BODY * b, BODY ** cur) p_clear(&s, 1); s.fpin = fpin; - mutt_mktemp (tempfile); - if ((*fpout = safe_fopen (tempfile, "w+")) == NULL) { + *fpout = m_tempfile(tempfile, sizeof(tempfile), NONULL(Tempdir), NULL); + if (*fpout == NULL) { mutt_perror (tempfile); return (-1); } @@ -851,8 +797,8 @@ int pgp_encrypted_handler (BODY * a, STATE * s) */ a = a->next; - mutt_mktemp (tempfile); - if ((fpout = safe_fopen (tempfile, "w+")) == NULL) { + fpout = m_tempfile(tempfile, sizeof(tempfile), NONULL(Tempdir), NULL); + if (fpout == NULL) { if (s->flags & M_DISPLAY) state_attach_puts (_ ("[-- Error: could not create temporary file! --]\n"), @@ -898,7 +844,7 @@ int pgp_encrypted_handler (BODY * a, STATE * s) rc = -1; } - fclose (fpout); + m_fclose(&fpout); mutt_unlink (tempfile); return (rc); @@ -921,15 +867,15 @@ BODY *pgp_sign_message (BODY * a) convert_to_7bit (a); /* Signed data _must_ be in 7-bit format. */ - mutt_mktemp (sigfile); - if ((fp = safe_fopen (sigfile, "w")) == NULL) { + fp = m_tempfile(sigfile, sizeof(sigfile), NONULL(Tempdir), NULL); + if (fp == NULL) { return (NULL); } - mutt_mktemp (signedfile); - if ((sfp = safe_fopen (signedfile, "w")) == NULL) { + sfp = m_tempfile(signedfile, sizeof(signedfile), NONULL(Tempdir), NULL); + if (sfp == NULL) { mutt_perror (signedfile); - fclose (fp); + m_fclose(&fp); unlink (sigfile); return NULL; } @@ -937,13 +883,13 @@ BODY *pgp_sign_message (BODY * a) mutt_write_mime_header (a, sfp); fputc ('\n', sfp); mutt_write_mime_body (a, sfp); - fclose (sfp); + m_fclose(&sfp); if ((thepid = pgp_invoke_sign (&pgpin, &pgpout, &pgperr, -1, -1, -1, signedfile)) == -1) { mutt_perror (_("Can't open PGP subprocess!")); - fclose (fp); + m_fclose(&fp); unlink (sigfile); unlink (signedfile); return NULL; @@ -952,7 +898,7 @@ BODY *pgp_sign_message (BODY * a) if (!pgp_use_gpg_agent ()) fputs (PgpPass, pgpin); fputc ('\n', pgpin); - fclose (pgpin); + m_fclose(&pgpin); /* * Read back the PGP signature. Also, change MESSAGE=>SIGNATURE as @@ -978,11 +924,11 @@ BODY *pgp_sign_message (BODY * a) if (mutt_wait_filter (thepid) && option (OPTPGPCHECKEXIT)) empty = 1; - fclose (pgperr); - fclose (pgpout); + m_fclose(&pgperr); + m_fclose(&pgpout); unlink (signedfile); - if (fclose (fp) != 0) { + if (m_fclose(&fp) != 0) { mutt_perror ("fclose"); unlink (sigfile); return (NULL); @@ -1044,7 +990,8 @@ static short is_numerical_keyid (const char *s) */ char *pgp_findKeys (address_t * to, address_t * cc, address_t * bcc) { - char *keyID, *keylist = NULL, *t; + char *keylist = NULL, *t; + const char *keyID; size_t keylist_size = 0; size_t keylist_used = 0; address_t *tmp = NULL, *addr = NULL; @@ -1078,7 +1025,7 @@ char *pgp_findKeys (address_t * to, address_t * cc, address_t * bcc) if (fqdn) rfc822_qualify (tmp, fqdn); - address_list_uniq(&tmp); + address_list_uniq(tmp); for (p = tmp; p; p = p->next) { char buf[LONG_STRING]; @@ -1166,27 +1113,28 @@ BODY *pgp_encrypt_message (BODY * a, char *keylist, int sign) int empty = 0; pid_t thepid; - mutt_mktemp (tempfile); - if ((fpout = safe_fopen (tempfile, "w+")) == NULL) { + fpout = m_tempfile(tempfile, sizeof(tempfile), NONULL(Tempdir), NULL); + if (fpout == NULL) { mutt_perror (tempfile); return (NULL); } - mutt_mktemp (pgperrfile); - if ((pgperr = safe_fopen (pgperrfile, "w+")) == NULL) { + pgperr = m_tempfile(pgperrfile, sizeof(pgperrfile), NONULL(Tempdir), NULL); + if (pgperr == NULL) { mutt_perror (pgperrfile); + m_fclose(&fpout); unlink (tempfile); - fclose (fpout); return NULL; } unlink (pgperrfile); - mutt_mktemp (pgpinfile); - if ((fptmp = safe_fopen (pgpinfile, "w")) == NULL) { + fptmp = m_tempfile(pgpinfile, sizeof(pgpinfile), NONULL(Tempdir), NULL); + if (fptmp == NULL) { mutt_perror (pgpinfile); + m_fclose(&fpout); unlink (tempfile); - fclose (fpout); - fclose (pgperr); + m_fclose(&pgperr); + unlink (pgperrfile); return NULL; } @@ -1196,12 +1144,12 @@ BODY *pgp_encrypt_message (BODY * a, char *keylist, int sign) mutt_write_mime_header (a, fptmp); fputc ('\n', fptmp); mutt_write_mime_body (a, fptmp); - fclose (fptmp); + m_fclose(&fptmp); if ((thepid = pgp_invoke_encrypt (&pgpin, NULL, NULL, -1, fileno (fpout), fileno (pgperr), pgpinfile, keylist, sign)) == -1) { - fclose (pgperr); + m_fclose(&pgperr); unlink (pgpinfile); return (NULL); } @@ -1211,7 +1159,7 @@ BODY *pgp_encrypt_message (BODY * a, char *keylist, int sign) fputs (PgpPass, pgpin); fputc ('\n', pgpin); } - fclose (pgpin); + m_fclose(&pgpin); if (mutt_wait_filter (thepid) && option (OPTPGPCHECKEXIT)) empty = 1; @@ -1222,7 +1170,7 @@ BODY *pgp_encrypt_message (BODY * a, char *keylist, int sign) rewind (fpout); if (!empty) empty = (fgetc (fpout) == EOF); - fclose (fpout); + m_fclose(&fpout); fflush (pgperr); rewind (pgperr); @@ -1230,7 +1178,7 @@ BODY *pgp_encrypt_message (BODY * a, char *keylist, int sign) err = 1; fputs (buf, stdout); } - fclose (pgperr); + m_fclose(&pgperr); /* pause if there is any error output from PGP */ if (err) @@ -1304,10 +1252,10 @@ BODY *pgp_traditional_encryptsign (BODY * a, int flags, char *keylist) return NULL; } - mutt_mktemp (pgpinfile); - if ((pgpin = safe_fopen (pgpinfile, "w")) == NULL) { + pgpin = m_tempfile(pgpinfile, sizeof(pgpinfile), NONULL(Tempdir), NULL); + if (pgpin == NULL) { mutt_perror (pgpinfile); - fclose (fp); + m_fclose(&fp); return NULL; } @@ -1342,19 +1290,19 @@ BODY *pgp_traditional_encryptsign (BODY * a, int flags, char *keylist) send_charset = "us-ascii"; mutt_copy_stream (fp, pgpin); } - safe_fclose (&fp); - fclose (pgpin); + m_fclose(&fp); + m_fclose(&pgpin); - mutt_mktemp (pgpoutfile); - mutt_mktemp (pgperrfile); - if ((pgpout = safe_fopen (pgpoutfile, "w+")) == NULL || - (pgperr = safe_fopen (pgperrfile, "w+")) == NULL) { + pgpout = m_tempfile(pgpoutfile, sizeof(pgpoutfile), NONULL(Tempdir), NULL); + pgperr = m_tempfile(pgperrfile, sizeof(pgperrfile), NONULL(Tempdir), NULL); + if (pgpout == NULL || pgperr == NULL) { mutt_perror (pgpout ? pgperrfile : pgpoutfile); + m_fclose(&pgpin); unlink (pgpinfile); - if (pgpout) { - fclose (pgpout); - unlink (pgpoutfile); - } + m_fclose(&pgpout); + unlink (pgpoutfile); + m_fclose(&pgperr); + unlink(pgperrfile); return NULL; } @@ -1365,8 +1313,8 @@ BODY *pgp_traditional_encryptsign (BODY * a, int flags, char *keylist) pgpinfile, keylist, flags)) == -1) { mutt_perror (_("Can't invoke PGP")); - fclose (pgpout); - fclose (pgperr); + m_fclose(&pgpout); + m_fclose(&pgperr); mutt_unlink (pgpinfile); unlink (pgpoutfile); return NULL; @@ -1376,7 +1324,7 @@ BODY *pgp_traditional_encryptsign (BODY * a, int flags, char *keylist) *PgpPass = 0; if (flags & SIGN) fprintf (pgpin, "%s\n", PgpPass); - fclose (pgpin); + m_fclose(&pgpin); if (mutt_wait_filter (thepid) && option (OPTPGPCHECKEXIT)) empty = 1; @@ -1391,7 +1339,7 @@ BODY *pgp_traditional_encryptsign (BODY * a, int flags, char *keylist) if (!empty) empty = (fgetc (pgpout) == EOF); - fclose (pgpout); + m_fclose(&pgpout); err = 0; @@ -1400,7 +1348,7 @@ BODY *pgp_traditional_encryptsign (BODY * a, int flags, char *keylist) fputs (buff, stdout); } - fclose (pgperr); + m_fclose(&pgperr); if (err) mutt_any_key_to_continue (NULL);