/[winpt]/trunk/Src/wptClipSignEncDlg.cpp
ViewVC logotype

Annotation of /trunk/Src/wptClipSignEncDlg.cpp

Parent Directory Parent Directory | Revision Log Revision Log


Revision 175 - (hide annotations)
Tue Feb 7 08:58:04 2006 UTC (19 years ago) by twoaday
File size: 6099 byte(s)
2006-02-04  Timo Schulz  <ts@g10code.de>
                                                                                                                            
        * wptKeyManagerDlg.cpp (keymanager_dlg_proc): Check for
        at least one ultimately trusted key.
        * wptKeyManager.cpp (km_refresh_key_from_keyserver):
        Only check inet connection if we refresh all keys.
        * wptGPGUtil.cpp (gpg_extract_keys): New.
        * wptClipEncryptDlg.cpp (clip_encrypt_dlg_proc): Use textmode.
        * wptClipSignEncDlg.cpp (clip_signenc_dlg_proc): Likewise.
        * wptClipSignDlg.cpp (get_selected_key): New.
        (one_key_proc): Use it here.
        (count_useable_seckeys): New.
        * wptSigTreeDlg.cpp (sigtree_dlg_proc): New.
        * wptKeyEditDlgs.cpp (diff_time): Removed.
        (w32_mktime): New.
        (keyedit_addsubkey_dlg_proc): Use it here.
                                                                                                                            
2006-02-02  Timo Schulz  <ts@g10code.de>
                                                                                                                            
        * wptW32API.cpp (get_temp_name): New.
        * wptKeyserver.cpp (ldap_recvkey): Use it here.
        * wptKeyPropsDlg.cpp (get_photo_tmpname): Likewise.
        * wptGPGUtil.cpp (create_tempfile): Likewise.
        * wptImportList.cpp (implist_load): Likewise.
        * wptKeyCache.cpp (parse_attr_data): Likewise.
        (w32_tempfile): Removed.
        * wptGPGME.cpp (check_ultimate_trusted_key): New.
                                                                                                                            

1 werner 36 /* wptSignEncDlg.cpp - Sign & encrypt dialog
2     * Copyright (C) 2000-2005 Timo Schulz
3     *
4     * This file is part of WinPT.
5     *
6     * WinPT is free software; you can redistribute it and/or modify
7     * it under the terms of the GNU General Public License as published by
8     * the Free Software Foundation; either version 2 of the License, or
9     * (at your option) any later version.
10     *
11     * WinPT is distributed in the hope that it will be useful,
12     * but WITHOUT ANY WARRANTY; without even the implied warranty of
13     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14     * GNU General Public License for more details.
15     *
16     * You should have received a copy of the GNU General Public License
17     * along with WinPT; if not, write to the Free Software Foundation,
18     * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
19     */
20     #ifdef HAVE_CONFIG_H
21     #include <config.h>
22     #endif
23    
24     #include <windows.h>
25     #include <commctrl.h>
26    
27 werner 47 #include "resource.h"
28 werner 36 #include "wptErrors.h"
29     #include "wptAgent.h"
30     #include "wptCrypto.h"
31     #include "wptGPG.h"
32     #include "wptCommonCtl.h"
33     #include "wptKeylist.h"
34     #include "wptTypes.h"
35     #include "wptNLS.h"
36     #include "wptContext.h" /* for passphrase_s */
37     #include "wptDlgs.h"
38     #include "wptW32API.h"
39     #include "wptKeylist.h"
40     #include "wptVersion.h"
41     #include "wptGPG.h"
42     #include "wptRegistry.h"
43     #include "wptUTF8.h"
44    
45    
46     /* Encrypt the clipboard data with the recipients from @rset and
47     additionally sign the data before @signer as the keyID.
48     Return value: 0 on success. */
49     gpgme_error_t
50     gpg_clip_sign_encrypt (gpgme_ctx_t ctx, const char *signer,
51     gpgme_key_t *rset, int opts)
52     {
53     gpgme_error_t err;
54     gpgme_data_t plain = NULL;
55     gpgme_data_t ciph = NULL;
56     gpgme_key_t key = NULL;
57    
58     if (!signer)
59     return gpg_error (GPG_ERR_INV_ARG);
60     if (get_pubkey (signer, &key))
61     return gpg_error (GPG_ERR_NO_PUBKEY);
62    
63     gpgme_set_armor (ctx, 1);
64 twoaday 175 gpgme_set_textmode (ctx, 1);
65 werner 36
66     err = gpg_data_new_from_clipboard (&plain, 0);
67     if (err)
68     goto leave;
69     err = gpgme_data_new (&ciph);
70     if (err)
71     goto leave;
72     err = gpgme_signers_add (ctx, key);
73     if (err)
74     goto leave;
75    
76     err = gpgme_op_encrypt_sign (ctx, rset,
77     opts? GPGME_ENCRYPT_ALWAYS_TRUST : (gpgme_encrypt_flags_t)0,
78     plain, ciph);
79     if (err)
80     goto leave;
81    
82     gpg_data_release_and_set_clipboard (ciph, 1);
83     ciph = NULL;
84    
85     leave:
86     if (plain)
87     gpgme_data_release (plain);
88     if (ciph)
89     gpgme_data_release (ciph);
90     return err;
91     }
92    
93    
94     /* Dialog procedure for clipboard sign + encrypt. */
95     BOOL CALLBACK
96     clip_signenc_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)
97     {
98     static listview_ctrl_t lv = NULL;
99     static keylist_t list = NULL;
100     gpg_keycache_t kc;
101     gpgme_key_t *rset;
102     gpgme_error_t err;
103     gpgme_ctx_t ctx;
104     passphrase_cb_s pwd;
105     char *signer = NULL;
106 twoaday 68 int force_trust = 0;
107 werner 36 int kmode = reg_prefs.keylist_mode? KEYLIST_ENCRYPT_MIN : KEYLIST_ENCRYPT;
108     int n;
109    
110     switch( msg ) {
111     case WM_INITDIALOG:
112     SetWindowText (dlg, _("Sign & Encrypt"));
113 twoaday 105 SetDlgItemText (dlg, IDCANCEL, _("&Cancel"));
114     kc = keycache_get_ctx (KEYCACHE_PUB);
115     if (!kc)
116     BUG (NULL);
117     lv = keylist_load (GetDlgItem (dlg, IDC_SIGNENC_KEYLIST),
118 werner 36 kc, NULL, kmode, KEY_SORT_USERID);
119 twoaday 105 seclist_init (dlg, IDC_SIGNENC_SECLIST, KEYLIST_FLAG_SHORT, &list);
120 werner 36 center_window (dlg, NULL);
121     EnableWindow (GetDlgItem (dlg, IDC_SIGNENC_SECLIST), FALSE);
122     SetDlgItemText (dlg, IDC_SIGNENC_SELKEY, _("Select key for signing"));
123     SetDlgItemText (dlg, IDC_SIGNENC_SECLISTINF, _("Signing key:"));
124     SetForegroundWindow (dlg);
125     return TRUE;
126    
127     case WM_DESTROY:
128     seclist_destroy (&list);
129     if (lv) {
130     keylist_delete (lv);
131     lv = NULL;
132     }
133     return FALSE;
134    
135     case WM_NOTIFY:
136     NMHDR * notify;
137     notify = (NMHDR *)lparam;
138     if (notify && notify->code == NM_DBLCLK
139     && notify->idFrom == IDC_SIGNENC_KEYLIST)
140 twoaday 65 PostMessage (dlg, WM_COMMAND, MAKEWPARAM (IDOK, 0), 0);
141 werner 36 return TRUE;
142    
143     case WM_SYSCOMMAND:
144 twoaday 105 if (LOWORD (wparam) == SC_CLOSE)
145     EndDialog (dlg, TRUE);
146 werner 36 return FALSE;
147    
148     case WM_COMMAND:
149     if (HIWORD (wparam) == BN_CLICKED
150     && LOWORD (wparam) == IDC_SIGNENC_SELKEY) {
151     int enable = IsDlgButtonChecked (dlg, IDC_SIGNENC_SELKEY);
152     EnableWindow (GetDlgItem (dlg, IDC_SIGNENC_SECLIST), enable? TRUE : FALSE);
153     }
154 twoaday 105 switch (LOWORD (wparam)) {
155 werner 36 case IDOK:
156 twoaday 105 rset = keylist_get_recipients (lv, &force_trust, &n);
157 werner 36 if (!n) {
158 twoaday 105 msg_box (dlg, _("You must select at least one key."),
159     _("Sign & Encrypt"), MB_ERR);
160 werner 36 return FALSE;
161     }
162     if( IsDlgButtonChecked( dlg, IDC_SIGNENC_SELKEY ) ) {
163     gpgme_key_t key;
164     const char * s;
165    
166     if( seclist_select_key( dlg, IDC_SIGNENC_SECLIST, &key ) ) {
167 twoaday 105 msg_box (dlg, _("No key was selected."), _("Signing"), MB_ERR);
168 werner 36 return FALSE;
169     }
170     s = key->subkeys->keyid;
171     if (s)
172     signer = m_strdup(s+8);
173     }
174     else {
175     signer = get_gnupg_default_key ();
176     if (!signer) {
177     msg_box (dlg, _("Could not get default key."), _("Signing"), MB_ERR);
178     return FALSE;
179     }
180     }
181    
182     err = gpgme_new (&ctx);
183     if (err)
184     BUG (NULL);
185 twoaday 105
186 werner 36 set_gpg_passphrase_cb (&pwd, ctx, GPG_CMD_SIGN, dlg, _("Sign & Encrypt"));
187     err = gpg_clip_sign_encrypt (ctx, signer, rset, force_trust);
188     release_gpg_passphrase_cb (&pwd);
189     free (rset);
190     free_if_alloc (signer);
191     gpgme_release (ctx);
192     if (gpgme_err_code (err) == GPG_ERR_BAD_PASSPHRASE)
193     agent_del_cache (pwd.keyid);
194     if (err) {
195     msg_box (dlg, gpgme_strerror (err), _("Sign & Encrypt"), MB_ERR );
196     return FALSE;
197     }
198     show_msg (dlg, 1500, _("GnuPG Status: Finished"));
199     EndDialog (dlg, TRUE);
200     return TRUE;
201    
202     case IDCANCEL:
203     EndDialog( dlg, FALSE );
204     return FALSE;
205     }
206     break;
207     }
208    
209     return FALSE;
210     }

Properties

Name Value
svn:eol-style native

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26