/[winpt]/trunk/Src/wptClipEncryptDlg.cpp
ViewVC logotype

Annotation of /trunk/Src/wptClipEncryptDlg.cpp

Parent Directory Parent Directory | Revision Log Revision Log


Revision 24 - (hide annotations)
Sat Oct 8 10:43:08 2005 UTC (19 years, 4 months ago) by twoaday
File size: 6801 byte(s)
Bug fixes to correct some problems introduced by
the MyGPGME to GPGME port.

1 twoaday 2 /* wptClipEncryptDlg.cpp - Clipboard encrypt dialog
2 twoaday 22 * Copyright (C) 2000-2005 Timo Schulz
3 twoaday 24 * Copyright (C) 2005 g10 Code GmbH
4 twoaday 2 *
5     * This file is part of WinPT.
6     *
7     * WinPT is free software; you can redistribute it and/or modify
8     * it under the terms of the GNU General Public License as published by
9     * the Free Software Foundation; either version 2 of the License, or
10     * (at your option) any later version.
11     *
12     * WinPT is distributed in the hope that it will be useful,
13     * but WITHOUT ANY WARRANTY; without even the implied warranty of
14     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15     * GNU General Public License for more details.
16     *
17     * You should have received a copy of the GNU General Public License
18     * along with WinPT; if not, write to the Free Software Foundation,
19     * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
20     */
21    
22     #include <windows.h>
23     #include <commctrl.h>
24    
25     #include "../resource.h"
26     #include "wptTypes.h"
27     #include "wptW32API.h"
28     #include "wptVersion.h"
29     #include "wptErrors.h"
30     #include "wptCommonCtl.h"
31     #include "wptGPG.h"
32     #include "wptKeylist.h"
33     #include "wptNLS.h"
34     #include "wptContext.h" /* for passphrase_s */
35     #include "wptRegistry.h"
36     #include "wptDlgs.h"
37    
38    
39 twoaday 23 /* Encrypt the contents of the clipboard with the keys in @rset.
40     If @always_trust is set, GPG is forced to trust any recipients.
41     The context is returned in @r_ctx.
42     Return value: 0 on success. */
43     gpgme_error_t
44     gpg_clip_encrypt (gpgme_key_t rset[], int always_trust, gpgme_ctx_t *r_ctx)
45     {
46     gpgme_error_t err;
47     gpgme_ctx_t ctx = NULL;
48     gpgme_data_t plain = NULL;
49     gpgme_data_t ciph = NULL;
50    
51     err = gpgme_new(&ctx);
52     if (err)
53     return err;
54    
55     gpgme_set_armor (ctx, 1);
56    
57     err = gpg_data_new_from_clipboard (&plain, 0);
58     if (err)
59     goto leave;
60     err = gpgme_data_new (&ciph);
61     if (err)
62     goto leave;
63     err = gpgme_op_encrypt (ctx, rset,
64     always_trust?GPGME_ENCRYPT_ALWAYS_TRUST : (gpgme_encrypt_flags_t)0,
65     plain, ciph);
66     if (err)
67     goto leave;
68    
69     gpg_data_release_and_set_clipboard (ciph, 1);
70     ciph = NULL;
71     *r_ctx = ctx;
72    
73     leave:
74     if (err) {
75     gpgme_release (ctx);
76     *r_ctx = NULL;
77     }
78     if (ciph)
79     gpgme_data_release (ciph);
80     gpgme_data_release (plain);
81     return err;
82     }
83    
84    
85     /* Show all invalid recipients if possible. @dlg is the
86     handle to the calling dialog and @ctx is the context
87     used for encryption.
88     Return value: 0 if invalid recipients exist -1 otherwise. */
89     static int
90     show_invalid_recipients (HWND dlg, gpgme_ctx_t ctx)
91     {
92     gpgme_encrypt_result_t res;
93     gpgme_invalid_key_t k;
94     gpgme_key_t key;
95     size_t len=0;
96     char *p;
97    
98     res = gpgme_op_encrypt_result (ctx);
99     if (!res || !res->invalid_recipients)
100     return -1;
101    
102     for (k=res->invalid_recipients; k; k = k->next) {
103     get_pubkey (k->fpr, &key);
104     len += (32 + 16 + strlen (key->uids->name) + 2) + 4;
105     }
106    
107     p = (char *)calloc (1, len+64);
108     if (!p)
109     BUG (NULL);
110     sprintf (p, _("Recipients unsuable for encryption:\n"));
111     for (k = res->invalid_recipients; k; k = k->next) {
112     get_pubkey (k->fpr, &key);
113     strcat (p, key->subkeys->keyid);
114     strcat (p, " : ");
115     strcat (p, key->uids->name);
116     strcat (p, "\n");
117     }
118     msg_box (dlg, p, _("Encryption"), MB_ERR);
119     free (p);
120     return 0;
121     }
122    
123    
124     /* Dialog procedure for the clipboard encryption. */
125 twoaday 2 BOOL CALLBACK
126 twoaday 23 clip_encrypt_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)
127 twoaday 2 {
128     static listview_ctrl_t lv = NULL;
129     gpgme_keycache_t kc;
130 twoaday 23 gpgme_key_t *rset;
131 twoaday 2 gpgme_ctx_t ctx;
132     gpgme_error_t err;
133     refresh_cache_s rcs = {0};
134     int force_trust = 0, opt = 0;
135     int kmode = reg_prefs.keylist_mode? KEYLIST_ENCRYPT_MIN : KEYLIST_ENCRYPT;
136 twoaday 23 int n;
137 twoaday 2
138     switch( msg ) {
139     case WM_INITDIALOG:
140     SetWindowText( dlg, _("Encryption") );
141     kc = keycache_get_ctx( KEYCACHE_PUB );
142     if( !kc )
143     BUG( NULL );
144 twoaday 23 lv = keylist_load (GetDlgItem( dlg, IDC_ENCRYPT_KEYLIST ), kc, NULL,
145     kmode, KEY_SORT_USERID);
146     center_window( dlg, NULL );
147 twoaday 2 SetForegroundWindow( dlg );
148     set_active_window( dlg );
149     return TRUE;
150    
151     case WM_DESTROY:
152     reset_active_window( );
153     if( lv ) {
154     keylist_delete( lv );
155     lv = NULL;
156     }
157     return FALSE;
158    
159     case WM_NOTIFY:
160     NMHDR *notify;
161    
162     notify = (NMHDR *)lparam;
163 twoaday 23 if (notify && notify->code == NM_DBLCLK &&
164     notify->idFrom == IDC_ENCRYPT_KEYLIST)
165 twoaday 2 PostMessage( dlg, WM_COMMAND, MAKEWPARAM( IDOK, 0 ), NULL );
166 twoaday 23 if (notify && notify->code == LVN_COLUMNCLICK &&
167     notify->idFrom == IDC_ENCRYPT_KEYLIST ) {
168 twoaday 2 NMLISTVIEW *p = (LPNMLISTVIEW) lparam;
169     int sortby = 0;
170    
171     switch( p->iSubItem ) {
172 twoaday 23 case 0: sortby = KEY_SORT_USERID; break;
173     case 1: sortby = KEY_SORT_KEYID; break;
174     case 2: sortby = KEY_SORT_LEN; break;
175     case 4: sortby = KEY_SORT_VALIDITY; break;
176     default: sortby = KEY_SORT_USERID; break;
177 twoaday 2 }
178     keylist_sort( lv, sortby );
179     }
180     return TRUE;
181    
182     case WM_SYSCOMMAND:
183     if( LOWORD( wparam ) == SC_CLOSE )
184     EndDialog( dlg, TRUE );
185     return FALSE;
186    
187     case WM_COMMAND:
188     switch( LOWORD( wparam ) ) {
189     case IDOK:
190 twoaday 23 rset = keylist_get_recipients (lv, &force_trust, &n);
191     if (!n) {
192     msg_box (dlg, _("You must select at least one key."), _("Encryption"), MB_ERR);
193     free (rset);
194 twoaday 2 return FALSE;
195     }
196 twoaday 23 err = gpg_clip_encrypt (rset, force_trust, &ctx);
197     if (err) {
198     if (show_invalid_recipients (dlg, ctx))
199     msg_box (dlg, gpgme_strerror (err), _("Encryption"), MB_ERR);
200     gpgme_release (ctx);
201     free (rset);
202 twoaday 2 return FALSE;
203     }
204     else
205     show_msg( dlg, 1500, _("GnuPG Status: Finished") );
206 twoaday 23 free (rset);
207     gpgme_release (ctx);
208     EndDialog (dlg, TRUE);
209 twoaday 2 return TRUE;
210    
211     case IDCANCEL:
212     EndDialog( dlg, FALSE );
213     return FALSE;
214    
215     case IDC_ENCRYPT_FNDCMD:
216     {
217     char tmpbuf[64];
218     int n;
219    
220     n = GetDlgItemText (dlg, IDC_ENCRYPT_FIND, tmpbuf, DIM (tmpbuf)-1);
221     if (!n)
222     break;
223     n = listview_find (lv, tmpbuf);
224 twoaday 22 if (n != -1) {
225     int oldpos = listview_get_curr_pos (lv);
226 twoaday 2 listview_select_one (lv, n);
227 twoaday 22 listview_scroll (lv, oldpos, n);
228     }
229 twoaday 2 else
230     log_box (_("Encryption"), MB_ERR, _("No recipient found with '%s'"), tmpbuf);
231     break;
232     }
233     }
234     break;
235     }
236    
237     return FALSE;
238 twoaday 23 }
239    

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26