aboutsummaryrefslogtreecommitdiffstats
path: root/smime/gui/component.c
blob: bf172194c11a3a48ce6d1f3daa2c8517f77a59e0 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
/*
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2 of the License, or (at your option) version 3.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with the program; if not, see <http://www.gnu.org/licenses/>
 *
 *
 * Authors:
 *      Chris Toshok <toshok@ximian.com>
 *
 * Copyright (C) 1999-2008 Novell, Inc. (www.novell.com)
 *
 */

#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

#include "component.h"

#include <gtk/gtk.h>

#include <glib/gi18n.h>
#include <libedataserverui/libedataserverui.h>

#include "ca-trust-dialog.h"
#include "e-cert-db.h"
#include "pk11func.h"

static gboolean
smime_pk11_passwd (ECertDB *db,
                   PK11SlotInfo *slot,
                   gboolean retry,
                   gchar **passwd,
                   gpointer arg)
{
    gchar *prompt;
    gchar *slot_name = g_strdup (PK11_GetSlotName (slot));

    g_strchomp (slot_name);

    prompt = g_strdup_printf (_("Enter the password for '%s'"), slot_name);
    g_free (slot_name);

    *passwd = e_passwords_ask_password (
        _("Enter password"), NULL, "", prompt,
        E_PASSWORDS_REMEMBER_NEVER | E_PASSWORDS_SECRET,
        NULL, NULL);

    g_free (prompt);

    /* this should return FALSE if they canceled. */
    return TRUE;
}

static gboolean
smime_pk11_change_passwd (ECertDB *db,
                          gchar **old_passwd,
                          gchar **passwd,
                          gpointer arg)
{
    gchar *prompt;

    /* XXX need better strings here, just copy mozilla's? */

    if (!old_passwd) {
        /* we're setting the password initially */
        prompt = _("Enter new password for certificate database");

        *passwd = e_passwords_ask_password (
            _("Enter new password"), NULL, "", prompt,
            E_PASSWORDS_REMEMBER_NEVER | E_PASSWORDS_SECRET,
            NULL, NULL);
    }
    else {
        /* we're changing the password */
        /* XXX implement this... */
    }

    /* this should return FALSE if they canceled. */
    return TRUE;
}

static gboolean
smime_confirm_ca_cert_import (ECertDB *db,
                              ECert *cert,
                              gboolean *trust_ssl,
                              gboolean *trust_email,
                              gboolean *trust_objsign,
                              gpointer arg)
{
    GtkWidget *dialog = ca_trust_dialog_show (cert, TRUE);
    gint response;

    response = gtk_dialog_run (GTK_DIALOG (dialog));

    ca_trust_dialog_get_trust (dialog, trust_ssl, trust_email, trust_objsign);

    gtk_widget_destroy (dialog);

    return response != GTK_RESPONSE_CANCEL;
}

void
smime_component_init (void)
{
    static gboolean init_done = FALSE;
    if (init_done)
        return;

    init_done = TRUE;
    g_signal_connect (
        e_cert_db_peek (), "pk11_passwd",
        G_CALLBACK (smime_pk11_passwd), NULL);

    g_signal_connect (
        e_cert_db_peek (), "pk11_change_passwd",
        G_CALLBACK (smime_pk11_change_passwd), NULL);

    g_signal_connect (
        e_cert_db_peek (), "confirm_ca_cert_import",
        G_CALLBACK (smime_confirm_ca_cert_import), NULL);
}