/[winpt]/trunk/Src/wptClipEncryptDlg.cpp
ViewVC logotype

Annotation of /trunk/Src/wptClipEncryptDlg.cpp

Parent Directory Parent Directory | Revision Log Revision Log


Revision 48 - (hide annotations)
Mon Oct 31 21:14:11 2005 UTC (19 years, 4 months ago) by werner
File size: 6601 byte(s)
More changes.  Compiles again but there are at least gettext issues with
w32-gettext.c.  I can't get a gpg-error build with ENABLE_NLS.

1 werner 36 /* wptClipEncryptDlg.cpp - Clipboard encrypt dialog
2     * Copyright (C) 2000-2005 Timo Schulz
3     * Copyright (C) 2005 g10 Code GmbH
4     *
5     * This file is part of WinPT.
6     *
7     * WinPT is free software; you can redistribute it and/or modify
8     * it under the terms of the GNU General Public License as published by
9     * the Free Software Foundation; either version 2 of the License, or
10     * (at your option) any later version.
11     *
12     * WinPT is distributed in the hope that it will be useful,
13     * but WITHOUT ANY WARRANTY; without even the implied warranty of
14     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15     * GNU General Public License for more details.
16     *
17     * You should have received a copy of the GNU General Public License
18     * along with WinPT; if not, write to the Free Software Foundation,
19     * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
20     */
21 twoaday 23
22 werner 36 #ifdef HAVE_CONFIG_H
23     #include <config.h>
24     #endif
25    
26     #include <windows.h>
27     #include <commctrl.h>
28    
29 werner 47 #include "resource.h"
30 werner 36 #include "wptTypes.h"
31     #include "wptW32API.h"
32     #include "wptVersion.h"
33     #include "wptErrors.h"
34     #include "wptCommonCtl.h"
35     #include "wptGPG.h"
36     #include "wptKeylist.h"
37     #include "wptNLS.h"
38     #include "wptContext.h" /* for passphrase_s */
39     #include "wptRegistry.h"
40     #include "wptDlgs.h"
41    
42    
43     /* Encrypt the contents of the clipboard with the keys in @rset.
44     If @always_trust is set, GPG is forced to trust any recipients.
45     The context is returned in @r_ctx.
46     Return value: 0 on success. */
47     gpgme_error_t
48     gpg_clip_encrypt (gpgme_key_t rset[], int always_trust, gpgme_ctx_t *r_ctx)
49     {
50     gpgme_error_t err;
51     gpgme_ctx_t ctx = NULL;
52     gpgme_data_t plain = NULL;
53     gpgme_data_t ciph = NULL;
54    
55     err = gpgme_new (&ctx);
56     if (err)
57     return err;
58    
59     gpgme_set_armor (ctx, 1);
60    
61     err = gpg_data_new_from_clipboard (&plain, 0);
62     if (err)
63     goto leave;
64     err = gpgme_data_new (&ciph);
65     if (err)
66     goto leave;
67     err = gpgme_op_encrypt (ctx, rset,
68     always_trust?GPGME_ENCRYPT_ALWAYS_TRUST : (gpgme_encrypt_flags_t)0,
69     plain, ciph);
70     *r_ctx = ctx;
71     if (err)
72     goto leave;
73    
74     gpg_data_release_and_set_clipboard (ciph, 1);
75     ciph = NULL;
76    
77     leave:
78     if (ciph)
79     gpgme_data_release (ciph);
80     gpgme_data_release (plain);
81     return err;
82     }
83    
84    
85     /* Show all invalid recipients if possible. @dlg is the
86     handle to the calling dialog and @ctx is the context
87     used for encryption.
88     Return value: 0 if invalid recipients exist -1 otherwise. */
89     static int
90     show_invalid_recipients (HWND dlg, gpgme_ctx_t ctx)
91     {
92     gpgme_encrypt_result_t res;
93     gpgme_invalid_key_t k;
94     gpgme_key_t key;
95     size_t len=0;
96     char *p;
97    
98     if (!ctx)
99     return -1;
100     res = gpgme_op_encrypt_result (ctx);
101     if (!res || !res->invalid_recipients)
102     return -1;
103    
104     for (k=res->invalid_recipients; k; k = k->next) {
105     get_pubkey (k->fpr, &key);
106     len += (32 + 16 + strlen (key->uids->name) + 2) + 4;
107     }
108    
109     p = (char *)calloc (1, len+64);
110     if (!p)
111     BUG (NULL);
112     sprintf (p, _("Recipients unsuable for encryption:\n"));
113     for (k = res->invalid_recipients; k; k = k->next) {
114     get_pubkey (k->fpr, &key);
115     strcat (p, key->subkeys->keyid+8);
116     strcat (p, " : ");
117     strcat (p, key->uids->name);
118     strcat (p, "\n");
119     }
120     msg_box (dlg, p, _("Encryption"), MB_ERR);
121     free (p);
122     return 0;
123     }
124    
125    
126     /* Dialog procedure for the clipboard encryption. */
127     BOOL CALLBACK
128     clip_encrypt_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)
129     {
130     static listview_ctrl_t lv = NULL;
131     gpg_keycache_t kc;
132     gpgme_key_t *rset;
133     gpgme_ctx_t ctx=NULL;
134     gpgme_error_t err;
135     refresh_cache_s rcs = {0};
136     int force_trust = 0, opt = 0;
137     int kmode = reg_prefs.keylist_mode? KEYLIST_ENCRYPT_MIN : KEYLIST_ENCRYPT;
138     int n;
139    
140     switch( msg ) {
141     case WM_INITDIALOG:
142     SetWindowText( dlg, _("Encryption") );
143     kc = keycache_get_ctx( KEYCACHE_PUB );
144     if( !kc )
145     BUG( NULL );
146     lv = keylist_load (GetDlgItem( dlg, IDC_ENCRYPT_KEYLIST ), kc, NULL,
147     kmode, KEY_SORT_USERID);
148     center_window( dlg, NULL );
149     SetForegroundWindow( dlg );
150     set_active_window( dlg );
151     return TRUE;
152    
153     case WM_DESTROY:
154     reset_active_window( );
155     if( lv ) {
156     keylist_delete( lv );
157     lv = NULL;
158     }
159     return FALSE;
160    
161     case WM_NOTIFY:
162     NMHDR *notify;
163    
164     notify = (NMHDR *)lparam;
165     if (notify && notify->code == NM_DBLCLK &&
166     notify->idFrom == IDC_ENCRYPT_KEYLIST)
167     PostMessage( dlg, WM_COMMAND, MAKEWPARAM( IDOK, 0 ), NULL );
168     if (notify && notify->code == LVN_COLUMNCLICK &&
169     notify->idFrom == IDC_ENCRYPT_KEYLIST ) {
170     NMLISTVIEW *p = (LPNMLISTVIEW) lparam;
171     int sortby = 0;
172    
173     switch( p->iSubItem ) {
174     case 0: sortby = KEY_SORT_USERID; break;
175     case 1: sortby = KEY_SORT_KEYID; break;
176     case 2: sortby = KEY_SORT_LEN; break;
177     case 4: sortby = KEY_SORT_VALIDITY; break;
178     default: sortby = KEY_SORT_USERID; break;
179     }
180     keylist_sort( lv, sortby );
181     }
182     return TRUE;
183    
184     case WM_SYSCOMMAND:
185     if( LOWORD( wparam ) == SC_CLOSE )
186     EndDialog( dlg, TRUE );
187     return FALSE;
188    
189     case WM_COMMAND:
190     switch( LOWORD( wparam ) ) {
191     case IDOK:
192     rset = keylist_get_recipients (lv, &force_trust, &n);
193     if (!n) {
194     msg_box (dlg, _("You must select at least one key."), _("Encryption"), MB_ERR);
195     free (rset);
196     return FALSE;
197     }
198     err = gpg_clip_encrypt (rset, force_trust, &ctx);
199     if (err) {
200     if (show_invalid_recipients (dlg, ctx))
201     msg_box (dlg, gpgme_strerror (err), _("Encryption"), MB_ERR);
202     if (ctx)
203     gpgme_release (ctx);
204     free (rset);
205     return FALSE;
206     }
207     else
208     show_msg( dlg, 1500, _("GnuPG Status: Finished") );
209     free (rset);
210     gpgme_release (ctx);
211     EndDialog (dlg, TRUE);
212     return TRUE;
213    
214     case IDCANCEL:
215     EndDialog( dlg, FALSE );
216     return FALSE;
217    
218     case IDC_ENCRYPT_FNDCMD:
219     {
220     char tmpbuf[64];
221     int n;
222    
223     n = GetDlgItemText (dlg, IDC_ENCRYPT_FIND, tmpbuf, DIM (tmpbuf)-1);
224     if (!n)
225     break;
226     n = listview_find (lv, tmpbuf);
227     if (n != -1) {
228     int oldpos = listview_get_curr_pos (lv);
229     listview_select_one (lv, n);
230     listview_scroll (lv, oldpos, n);
231     }
232     else
233     log_box (_("Encryption"), MB_ERR, _("No recipient found with '%s'"), tmpbuf);
234     break;
235     }
236     }
237     break;
238     }
239    
240     return FALSE;
241     }
242    

Properties

Name Value
svn:eol-style native

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26