forked from neomutt/neomutt
-
Notifications
You must be signed in to change notification settings - Fork 0
/
crypt_mod_smime_classic.c
114 lines (97 loc) · 2.91 KB
/
crypt_mod_smime_classic.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
/**
* Copyright (C) 2004 g10 Code GmbH
*
* This program is free software: you can redistribute it and/or modify it under
* the terms of the GNU General Public License as published by the Free Software
* Foundation, either version 2 of the License, or (at your option) any later
* version.
*
* This program is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
* FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
* details.
*
* You should have received a copy of the GNU General Public License along with
* this program. If not, see <http://www.gnu.org/licenses/>.
*/
/*
This is a crytpo module wrapping the classic smime code.
*/
#include "config.h"
#include "crypt_mod.h"
#include "smime.h"
static void crypt_mod_smime_void_passphrase(void)
{
smime_void_passphrase();
}
static int crypt_mod_smime_valid_passphrase(void)
{
return smime_valid_passphrase();
}
static int crypt_mod_smime_decrypt_mime(FILE *a, FILE **b, BODY *c, BODY **d)
{
return smime_decrypt_mime(a, b, c, d);
}
static int crypt_mod_smime_application_handler(BODY *m, STATE *s)
{
return smime_application_smime_handler(m, s);
}
static char *crypt_mod_smime_findkeys(ADDRESS *adrlist, int oppenc_mode)
{
return smime_find_keys(adrlist, oppenc_mode);
}
static BODY *crypt_mod_smime_sign_message(BODY *a)
{
return smime_sign_message(a);
}
static int crypt_mod_smime_verify_one(BODY *sigbdy, STATE *s, const char *tempf)
{
return smime_verify_one(sigbdy, s, tempf);
}
static int crypt_mod_smime_send_menu(HEADER *msg)
{
return smime_send_menu(msg);
}
static void crypt_mod_smime_getkeys(ENVELOPE *env)
{
smime_getkeys(env);
}
static int crypt_mod_smime_verify_sender(HEADER *h)
{
return smime_verify_sender(h);
}
static BODY *crypt_mod_smime_build_smime_entity(BODY *a, char *certlist)
{
return smime_build_smime_entity(a, certlist);
}
static void crypt_mod_smime_invoke_import(char *infile, char *mailbox)
{
smime_invoke_import(infile, mailbox);
}
struct crypt_module_specs crypt_mod_smime_classic = {
APPLICATION_SMIME,
{
NULL, /* init */
crypt_mod_smime_void_passphrase,
crypt_mod_smime_valid_passphrase,
crypt_mod_smime_decrypt_mime,
crypt_mod_smime_application_handler,
NULL, /* encrypted_handler */
crypt_mod_smime_findkeys,
crypt_mod_smime_sign_message,
crypt_mod_smime_verify_one,
crypt_mod_smime_send_menu,
NULL,
NULL, /* pgp_encrypt_message */
NULL, /* pgp_make_key_attachment */
NULL, /* pgp_check_traditional */
NULL, /* pgp_traditional_encryptsign */
NULL, /* pgp_invoke_getkeys */
NULL, /* pgp_invoke_import */
NULL, /* pgp_extract_keys_from_attachment_list */
crypt_mod_smime_getkeys,
crypt_mod_smime_verify_sender,
crypt_mod_smime_build_smime_entity,
crypt_mod_smime_invoke_import,
},
};