b0b627
# HG changeset patch
b0b627
# User Kai Engert <kaie@kuix.de>
b0b627
# Date 1664378971 0
b0b627
#      Wed Sep 28 15:29:31 2022 +0000
b0b627
# Node ID 98bde42cf14e966da1cdf098e2d0917032c0f327
b0b627
# Parent  af0b1f5e4c7710f824c6141103e516ca60bc78aa
b0b627
Bug 1791195 - Adjust OpenPGP signature handling for RNP >= 0.16.2. r=mkmelin
b0b627
b0b627
Differential Revision: https://phabricator.services.mozilla.com/D158270
b0b627
b0b627
diff --git a/comm/mail/extensions/openpgp/content/modules/RNP.jsm b/comm/mail/extensions/openpgp/content/modules/RNP.jsm
b0b627
--- a/comm/mail/extensions/openpgp/content/modules/RNP.jsm
b0b627
+++ b/comm/mail/extensions/openpgp/content/modules/RNP.jsm
b0b627
@@ -1150,22 +1150,25 @@ var RNP = {
b0b627
 
b0b627
     result.exitCode = RNPLib.rnp_op_verify_execute(verify_op);
b0b627
 
b0b627
     let rnpCannotDecrypt = false;
b0b627
     let queryAllEncryptionRecipients = false;
b0b627
+    let stillUndecidedIfSignatureIsBad = false;
b0b627
 
b0b627
     let useDecodedData;
b0b627
     let processSignature;
b0b627
     switch (result.exitCode) {
b0b627
       case RNPLib.RNP_SUCCESS:
b0b627
         useDecodedData = true;
b0b627
         processSignature = true;
b0b627
         break;
b0b627
       case RNPLib.RNP_ERROR_SIGNATURE_INVALID:
b0b627
-        result.statusFlags |= EnigmailConstants.BAD_SIGNATURE;
b0b627
+        // Either the signing key is unavailable, or the signature is
b0b627
+        // indeed bad. Must check signature status below.
b0b627
+        stillUndecidedIfSignatureIsBad = true;
b0b627
         useDecodedData = true;
b0b627
-        processSignature = false;
b0b627
+        processSignature = true;
b0b627
         break;
b0b627
       case RNPLib.RNP_ERROR_SIGNATURE_EXPIRED:
b0b627
         useDecodedData = true;
b0b627
         processSignature = false;
b0b627
         result.statusFlags |= EnigmailConstants.EXPIRED_SIGNATURE;
b0b627
@@ -1320,13 +1323,30 @@ var RNP = {
b0b627
           options.fromAddr,
b0b627
           options.msgDate,
b0b627
           verify_op,
b0b627
           result
b0b627
         );
b0b627
+
b0b627
+        if (
b0b627
+          (result.statusFlags &
b0b627
+            (EnigmailConstants.GOOD_SIGNATURE |
b0b627
+              EnigmailConstants.UNCERTAIN_SIGNATURE |
b0b627
+              EnigmailConstants.EXPIRED_SIGNATURE |
b0b627
+              EnigmailConstants.BAD_SIGNATURE)) !=
b0b627
+          0
b0b627
+        ) {
b0b627
+          // A decision was already made.
b0b627
+          stillUndecidedIfSignatureIsBad = false;
b0b627
+        }
b0b627
       }
b0b627
     }
b0b627
 
b0b627
+    if (stillUndecidedIfSignatureIsBad) {
b0b627
+      // We didn't find more details above, so conclude it's bad.
b0b627
+      result.statusFlags |= EnigmailConstants.BAD_SIGNATURE;
b0b627
+    }
b0b627
+
b0b627
     RNPLib.rnp_input_destroy(input_from_memory);
b0b627
     RNPLib.rnp_output_destroy(output_to_memory);
b0b627
     RNPLib.rnp_op_verify_destroy(verify_op);
b0b627
 
b0b627
     if (
b0b627
@@ -1458,10 +1478,12 @@ var RNP = {
b0b627
     let have_signer_key = false;
b0b627
     let use_signer_key = false;
b0b627
 
b0b627
     if (query_signer) {
b0b627
       if (RNPLib.rnp_op_verify_signature_get_key(sig, signer_key.address())) {
b0b627
+        // If sig_status isn't RNP_ERROR_KEY_NOT_FOUND then we must
b0b627
+        // be able to obtain the signer key.
b0b627
         throw new Error("rnp_op_verify_signature_get_key");
b0b627
       }
b0b627
 
b0b627
       have_signer_key = true;
b0b627
       use_signer_key = !this.isBadKey(signer_key);