summaryrefslogtreecommitdiff
path: root/src/leap/mail/incoming/service.py
diff options
context:
space:
mode:
authorCaio Carrara <ccarrara@thoughtworks.com>2016-05-25 16:11:34 -0300
committerCaio Carrara <ccarrara@thoughtworks.com>2016-05-25 16:11:34 -0300
commit1a6aa67ea31b4bedb2a59a84659f7e19b385ec12 (patch)
treea8d3d18efb4ac8980fa9998e1818eba45057ac8f /src/leap/mail/incoming/service.py
parentff75ceecbff76bc9142516c198d726422c050797 (diff)
[refactor] change the check to validate signature from Apple Mail
It changes the way that incoming service checks if a additional verification is needed to validate signature. The way before was checking by the type of signature object and calling the verify signature method if the type is different from OpenPGPKey. However it could be more readable if we check the type of decrypted message. If it's a multipart/signed message and not a plain/text we need to verify the signature because keymanager couldn't do it during the decryption process.
Diffstat (limited to 'src/leap/mail/incoming/service.py')
-rw-r--r--src/leap/mail/incoming/service.py8
1 files changed, 3 insertions, 5 deletions
diff --git a/src/leap/mail/incoming/service.py b/src/leap/mail/incoming/service.py
index bf850b5..58a19c8 100644
--- a/src/leap/mail/incoming/service.py
+++ b/src/leap/mail/incoming/service.py
@@ -530,11 +530,9 @@ class IncomingMail(Service):
def verify_signature_after_decrypt_an_email(res):
decrdata, signkey = res
- if not isinstance(signkey, OpenPGPKey):
- try:
- return self._verify_signature_not_encrypted_msg(decrdata, senderAddress)
- except:
- pass
+ if decrdata.get_content_type() == MULTIPART_SIGNED:
+ res = self._verify_signature_not_encrypted_msg(decrdata,
+ senderAddress)
return res
d = self._keymanager.decrypt(