ooggss
initial
f0f4f2b
#include <ctype.h>
#include "dc_context.h"
#include "dc_aheader.h"
#include "dc_apeerstate.h"
#include "dc_mimeparser.h"
/**
* Empty an Autocrypt-header object and free all data associated with it.
*
* @private @memberof dc_aheader_t
* @param aheader The Autocrypt-header object. If you pass NULL here, the function does nothing.
* @return None.
*/
void dc_aheader_empty(dc_aheader_t* aheader)
{
if (aheader==NULL) {
return;
}
aheader->prefer_encrypt = 0;
free(aheader->addr);
aheader->addr = NULL;
if (aheader->public_key->binary) {
dc_key_unref(aheader->public_key);
aheader->public_key = dc_key_new();
}
}
/*******************************************************************************
* Render Autocrypt Header
******************************************************************************/
/**
* @memberof dc_aheader_t
*/
char* dc_aheader_render(const dc_aheader_t* aheader)
{
int success = 0;
char* keybase64_wrapped = NULL;
dc_strbuilder_t ret;
dc_strbuilder_init(&ret, 0);
if (aheader==NULL || aheader->addr==NULL || aheader->public_key->binary==NULL || aheader->public_key->type!=DC_KEY_PUBLIC) {
goto cleanup;
}
dc_strbuilder_cat(&ret, "addr=");
dc_strbuilder_cat(&ret, aheader->addr);
dc_strbuilder_cat(&ret, "; ");
if (aheader->prefer_encrypt==DC_PE_MUTUAL) {
dc_strbuilder_cat(&ret, "prefer-encrypt=mutual; ");
}
dc_strbuilder_cat(&ret, "keydata= "); /* the trailing space together with dc_insert_breaks() allows a proper transport */
/* adds a whitespace every 78 characters, this allows libEtPan to wrap the lines according to RFC 5322
(which may insert a linebreak before every whitespace) */
if ((keybase64_wrapped = dc_key_render_base64(aheader->public_key, 78, " ", 0/*no checksum*/))==NULL) {
goto cleanup;
}
dc_strbuilder_cat(&ret, keybase64_wrapped);
success = 1;
cleanup:
if (!success) { free(ret.buf); ret.buf = NULL; }
free(keybase64_wrapped);
return ret.buf; /* NULL on errors, this may happen for various reasons */
}
/*******************************************************************************
* Parse Autocrypt Header
******************************************************************************/
static int add_attribute(dc_aheader_t* aheader, const char* name, const char* value /*may be NULL*/)
{
/* returns 0 if the attribute will result in an invalid header, 1 if the attribute is okay */
if (strcasecmp(name, "addr")==0)
{
if (value==NULL
|| !dc_may_be_valid_addr(value)
|| aheader->addr /* email already given */) {
return 0;
}
aheader->addr = dc_addr_normalize(value);
return 1;
}
#if 0 /* autocrypt 11/2017 no longer uses the type attribute and it will make the autocrypt header invalid */
else if (strcasecmp(name, "type")==0)
{
if (value==NULL) {
return 0; /* attribute with no value results in an invalid header */
}
if (strcasecmp(value, "1")==0 || strcasecmp(value, "0" /*deprecated*/)==0 || strcasecmp(value, "p" /*deprecated*/)==0) {
return 1; /* PGP-type */
}
return 0; /* unknown types result in an invalid header */
}
#endif
else if (strcasecmp(name, "prefer-encrypt")==0)
{
if (value && strcasecmp(value, "mutual")==0) {
aheader->prefer_encrypt = DC_PE_MUTUAL;
return 1;
}
return 1; /* An Autocrypt level 0 client that sees the attribute with any other value (or that does not see the attribute at all) should interpret the value as nopreference.*/
}
else if (strcasecmp(name, "keydata")==0)
{
if (value==NULL
|| aheader->public_key->binary || aheader->public_key->bytes) {
return 0; /* there is already a k*/
}
return dc_key_set_from_base64(aheader->public_key, value, DC_KEY_PUBLIC);
}
else if (name[0]=='_')
{
/* Autocrypt-Level0: unknown attributes starting with an underscore can be safely ignored */
return 1;
}
/* Autocrypt-Level0: unknown attribute, treat the header as invalid */
return 0;
}
/**
* @memberof dc_aheader_t
*/
int dc_aheader_set_from_string(dc_aheader_t* aheader, const char* header_str__)
{
/* according to RFC 5322 (Internet Message Format), the given string may contain `\r\n` before any whitespace.
we can ignore this issue as
(a) no key or value is expected to contain spaces,
(b) for the key, non-base64-characters are ignored and
(c) for parsing, we ignore `\r\n` as well as tabs for spaces */
#define AHEADER_WS "\t\r\n "
char* header_str = NULL;
char* p = NULL;
char* beg_attr_name = NULL;
char* after_attr_name = NULL;
char* beg_attr_value = NULL;
int success = 0;
dc_aheader_empty(aheader);
if (aheader==NULL || header_str__==NULL) {
goto cleanup;
}
aheader->prefer_encrypt = DC_PE_NOPREFERENCE; /* value to use if the prefer-encrypted header is missing */
header_str = dc_strdup(header_str__);
p = header_str;
while (*p)
{
p += strspn(p, AHEADER_WS "=;"); /* forward to first attribute name beginning */
beg_attr_name = p;
beg_attr_value = NULL;
p += strcspn(p, AHEADER_WS "=;"); /* get end of attribute name (an attribute may have no value) */
if (p!=beg_attr_name)
{
/* attribute found */
after_attr_name = p;
p += strspn(p, AHEADER_WS); /* skip whitespace between attribute name and possible `=` */
if (*p=='=')
{
p += strspn(p, AHEADER_WS "="); /* skip spaces and equal signs */
/* read unquoted attribute value until the first semicolon */
beg_attr_value = p;
p += strcspn(p, ";");
if (*p!='\0') {
*p = '\0';
p++;
}
dc_trim(beg_attr_value);
}
else
{
p += strspn(p, AHEADER_WS ";");
}
*after_attr_name = '\0';
if (!add_attribute(aheader, beg_attr_name, beg_attr_value)) {
goto cleanup; /* a bad attribute makes the whole header invalid */
}
}
}
/* all needed data found? */
if (aheader->addr && aheader->public_key->binary) {
success = 1;
}
cleanup:
free(header_str);
if (!success) { dc_aheader_empty(aheader); }
return success;
}
/*******************************************************************************
* Main interface
******************************************************************************/
/**
* @memberof dc_aheader_t
*/
dc_aheader_t* dc_aheader_new()
{
dc_aheader_t* aheader = NULL;
if ((aheader=calloc(1, sizeof(dc_aheader_t)))==NULL) {
exit(37); /* cannot allocate little memory, unrecoverable error */
}
aheader->public_key = dc_key_new();
return aheader;
}
/**
* @memberof dc_aheader_t
*/
void dc_aheader_unref(dc_aheader_t* aheader)
{
if (aheader==NULL) {
return;
}
free(aheader->addr);
dc_key_unref(aheader->public_key);
free(aheader);
}
/**
* @memberof dc_aheader_t
*/
dc_aheader_t* dc_aheader_new_from_imffields(const char* wanted_from, const struct mailimf_fields* header)
{
clistiter* cur = NULL;
dc_aheader_t* fine_header = NULL;
if (wanted_from==NULL || header==NULL) {
return 0;
}
for (cur = clist_begin(header->fld_list); cur!=NULL ; cur=clist_next(cur))
{
struct mailimf_field* field = (struct mailimf_field*)clist_content(cur);
if (field && field->fld_type==MAILIMF_FIELD_OPTIONAL_FIELD)
{
struct mailimf_optional_field* optional_field = field->fld_data.fld_optional_field;
if (optional_field && optional_field->fld_name && strcasecmp(optional_field->fld_name, "Autocrypt")==0)
{
/* header found, check if it is valid and matched the wanted address */
dc_aheader_t* test = dc_aheader_new();
if (!dc_aheader_set_from_string(test, optional_field->fld_value)
|| dc_addr_cmp(test->addr, wanted_from)!=0) {
dc_aheader_unref(test);
test = NULL;
}
if (fine_header==NULL) {
fine_header = test; /* may still be NULL */
}
else if (test) {
dc_aheader_unref(fine_header);
dc_aheader_unref(test);
return NULL; /* more than one valid header for the same address results in an error, see Autocrypt Level 1 */
}
}
}
}
return fine_header; /* may be NULL */
}