/[winpt]/trunk/Src/wptClipEncryptDlg.cpp
ViewVC logotype

Annotation of /trunk/Src/wptClipEncryptDlg.cpp

Parent Directory Parent Directory | Revision Log Revision Log


Revision 176 - (hide annotations)
Mon Feb 13 09:38:03 2006 UTC (19 years ago) by twoaday
File size: 6551 byte(s)


1 werner 36 /* wptClipEncryptDlg.cpp - Clipboard encrypt dialog
2     * Copyright (C) 2000-2005 Timo Schulz
3     * Copyright (C) 2005 g10 Code GmbH
4     *
5     * This file is part of WinPT.
6     *
7     * WinPT is free software; you can redistribute it and/or modify
8     * it under the terms of the GNU General Public License as published by
9     * the Free Software Foundation; either version 2 of the License, or
10     * (at your option) any later version.
11     *
12     * WinPT is distributed in the hope that it will be useful,
13     * but WITHOUT ANY WARRANTY; without even the implied warranty of
14     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15     * GNU General Public License for more details.
16     *
17     * You should have received a copy of the GNU General Public License
18     * along with WinPT; if not, write to the Free Software Foundation,
19     * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
20     */
21     #ifdef HAVE_CONFIG_H
22     #include <config.h>
23     #endif
24    
25     #include <windows.h>
26     #include <commctrl.h>
27    
28 werner 47 #include "resource.h"
29 werner 36 #include "wptTypes.h"
30     #include "wptW32API.h"
31     #include "wptVersion.h"
32     #include "wptErrors.h"
33     #include "wptCommonCtl.h"
34     #include "wptGPG.h"
35     #include "wptKeylist.h"
36     #include "wptNLS.h"
37     #include "wptContext.h" /* for passphrase_s */
38     #include "wptRegistry.h"
39     #include "wptDlgs.h"
40    
41    
42     /* Encrypt the contents of the clipboard with the keys in @rset.
43     If @always_trust is set, GPG is forced to trust any recipients.
44     The context is returned in @r_ctx.
45     Return value: 0 on success. */
46     gpgme_error_t
47     gpg_clip_encrypt (gpgme_key_t rset[], int always_trust, gpgme_ctx_t *r_ctx)
48     {
49     gpgme_error_t err;
50     gpgme_ctx_t ctx = NULL;
51     gpgme_data_t plain = NULL;
52     gpgme_data_t ciph = NULL;
53    
54     err = gpgme_new (&ctx);
55     if (err)
56     return err;
57    
58     gpgme_set_armor (ctx, 1);
59 twoaday 175 gpgme_set_textmode (ctx, 1);
60 werner 36
61     err = gpg_data_new_from_clipboard (&plain, 0);
62     if (err)
63     goto leave;
64     err = gpgme_data_new (&ciph);
65     if (err)
66 twoaday 175 goto leave;
67 werner 36 err = gpgme_op_encrypt (ctx, rset,
68     always_trust?GPGME_ENCRYPT_ALWAYS_TRUST : (gpgme_encrypt_flags_t)0,
69     plain, ciph);
70     *r_ctx = ctx;
71     if (err)
72     goto leave;
73    
74     gpg_data_release_and_set_clipboard (ciph, 1);
75     ciph = NULL;
76    
77     leave:
78     if (ciph)
79     gpgme_data_release (ciph);
80     gpgme_data_release (plain);
81     return err;
82     }
83    
84    
85     /* Show all invalid recipients if possible. @dlg is the
86     handle to the calling dialog and @ctx is the context
87     used for encryption.
88     Return value: 0 if invalid recipients exist -1 otherwise. */
89     static int
90     show_invalid_recipients (HWND dlg, gpgme_ctx_t ctx)
91     {
92     gpgme_encrypt_result_t res;
93     gpgme_invalid_key_t k;
94     gpgme_key_t key;
95     size_t len=0;
96     char *p;
97    
98     if (!ctx)
99     return -1;
100     res = gpgme_op_encrypt_result (ctx);
101     if (!res || !res->invalid_recipients)
102     return -1;
103    
104     for (k=res->invalid_recipients; k; k = k->next) {
105     get_pubkey (k->fpr, &key);
106     len += (32 + 16 + strlen (key->uids->name) + 2) + 4;
107     }
108    
109     p = (char *)calloc (1, len+64);
110     if (!p)
111     BUG (NULL);
112 twoaday 68 strcpy (p, _("Recipients unsuable for encryption:\n"));
113 werner 36 for (k = res->invalid_recipients; k; k = k->next) {
114     get_pubkey (k->fpr, &key);
115     strcat (p, key->subkeys->keyid+8);
116     strcat (p, " : ");
117     strcat (p, key->uids->name);
118     strcat (p, "\n");
119     }
120     msg_box (dlg, p, _("Encryption"), MB_ERR);
121     free (p);
122     return 0;
123     }
124    
125    
126     /* Dialog procedure for the clipboard encryption. */
127     BOOL CALLBACK
128     clip_encrypt_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)
129     {
130     static listview_ctrl_t lv = NULL;
131     gpg_keycache_t kc;
132     gpgme_key_t *rset;
133     gpgme_ctx_t ctx=NULL;
134     gpgme_error_t err;
135 twoaday 68 int force_trust = 0;
136 werner 36 int n;
137    
138     switch( msg ) {
139     case WM_INITDIALOG:
140 twoaday 105 SetWindowText (dlg, _("Encryption"));
141     SetDlgItemText (dlg, IDC_ENCRYPT_FNDCMD, _("&Find"));
142     SetDlgItemText (dlg, IDCANCEL, _("&Cancel"));
143 werner 36 kc = keycache_get_ctx( KEYCACHE_PUB );
144     if( !kc )
145     BUG( NULL );
146     lv = keylist_load (GetDlgItem( dlg, IDC_ENCRYPT_KEYLIST ), kc, NULL,
147 twoaday 176 KEYLIST_ENCRYPT_MIN, KEY_SORT_USERID);
148 werner 36 center_window( dlg, NULL );
149     SetForegroundWindow( dlg );
150     return TRUE;
151    
152     case WM_DESTROY:
153     if( lv ) {
154     keylist_delete( lv );
155     lv = NULL;
156     }
157     return FALSE;
158    
159     case WM_NOTIFY:
160     NMHDR *notify;
161    
162     notify = (NMHDR *)lparam;
163     if (notify && notify->code == NM_DBLCLK &&
164     notify->idFrom == IDC_ENCRYPT_KEYLIST)
165 twoaday 105 PostMessage( dlg, WM_COMMAND, MAKEWPARAM( IDOK, 0 ), 0 );
166 werner 36 if (notify && notify->code == LVN_COLUMNCLICK &&
167     notify->idFrom == IDC_ENCRYPT_KEYLIST ) {
168     NMLISTVIEW *p = (LPNMLISTVIEW) lparam;
169     int sortby = 0;
170    
171     switch( p->iSubItem ) {
172     case 0: sortby = KEY_SORT_USERID; break;
173     case 1: sortby = KEY_SORT_KEYID; break;
174     case 2: sortby = KEY_SORT_LEN; break;
175     case 4: sortby = KEY_SORT_VALIDITY; break;
176     default: sortby = KEY_SORT_USERID; break;
177     }
178     keylist_sort( lv, sortby );
179     }
180     return TRUE;
181    
182     case WM_SYSCOMMAND:
183     if( LOWORD( wparam ) == SC_CLOSE )
184     EndDialog( dlg, TRUE );
185     return FALSE;
186    
187     case WM_COMMAND:
188     switch( LOWORD( wparam ) ) {
189     case IDOK:
190     rset = keylist_get_recipients (lv, &force_trust, &n);
191     if (!n) {
192     msg_box (dlg, _("You must select at least one key."), _("Encryption"), MB_ERR);
193     free (rset);
194     return FALSE;
195     }
196     err = gpg_clip_encrypt (rset, force_trust, &ctx);
197     if (err) {
198     if (show_invalid_recipients (dlg, ctx))
199     msg_box (dlg, gpgme_strerror (err), _("Encryption"), MB_ERR);
200     if (ctx)
201     gpgme_release (ctx);
202     free (rset);
203     return FALSE;
204     }
205     else
206     show_msg( dlg, 1500, _("GnuPG Status: Finished") );
207     free (rset);
208     gpgme_release (ctx);
209     EndDialog (dlg, TRUE);
210     return TRUE;
211    
212     case IDCANCEL:
213     EndDialog( dlg, FALSE );
214     return FALSE;
215    
216     case IDC_ENCRYPT_FNDCMD:
217     {
218     char tmpbuf[64];
219    
220     n = GetDlgItemText (dlg, IDC_ENCRYPT_FIND, tmpbuf, DIM (tmpbuf)-1);
221     if (!n)
222     break;
223     n = listview_find (lv, tmpbuf);
224     if (n != -1) {
225     int oldpos = listview_get_curr_pos (lv);
226     listview_select_one (lv, n);
227     listview_scroll (lv, oldpos, n);
228     }
229     else
230     log_box (_("Encryption"), MB_ERR, _("No recipient found with '%s'"), tmpbuf);
231     break;
232     }
233     }
234     break;
235     }
236    
237     return FALSE;
238     }
239    

Properties

Name Value
svn:eol-style native

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26