/[winpt]/trunk/Src/wptClipSignEncDlg.cpp
ViewVC logotype

Annotation of /trunk/Src/wptClipSignEncDlg.cpp

Parent Directory Parent Directory | Revision Log Revision Log


Revision 36 - (hide annotations)
Thu Oct 27 15:25:13 2005 UTC (19 years, 4 months ago) by werner
File size: 6123 byte(s)
First set of changes to use autotools for building.
1 werner 36 /* wptSignEncDlg.cpp - Sign & encrypt dialog
2     * Copyright (C) 2000-2005 Timo Schulz
3     *
4     * This file is part of WinPT.
5     *
6     * WinPT is free software; you can redistribute it and/or modify
7     * it under the terms of the GNU General Public License as published by
8     * the Free Software Foundation; either version 2 of the License, or
9     * (at your option) any later version.
10     *
11     * WinPT is distributed in the hope that it will be useful,
12     * but WITHOUT ANY WARRANTY; without even the implied warranty of
13     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14     * GNU General Public License for more details.
15     *
16     * You should have received a copy of the GNU General Public License
17     * along with WinPT; if not, write to the Free Software Foundation,
18     * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
19     */
20    
21     #ifdef HAVE_CONFIG_H
22     #include <config.h>
23     #endif
24    
25     #include <windows.h>
26     #include <windows.h>
27     #include <commctrl.h>
28    
29     #include "../resource.h"
30     #include "wptErrors.h"
31     #include "wptAgent.h"
32     #include "wptCrypto.h"
33     #include "wptGPG.h"
34     #include "wptCommonCtl.h"
35     #include "wptKeylist.h"
36     #include "wptTypes.h"
37     #include "wptNLS.h"
38     #include "wptContext.h" /* for passphrase_s */
39     #include "wptDlgs.h"
40     #include "wptW32API.h"
41     #include "wptKeylist.h"
42     #include "wptVersion.h"
43     #include "wptGPG.h"
44     #include "wptRegistry.h"
45     #include "wptUTF8.h"
46    
47    
48     /* Encrypt the clipboard data with the recipients from @rset and
49     additionally sign the data before @signer as the keyID.
50     Return value: 0 on success. */
51     gpgme_error_t
52     gpg_clip_sign_encrypt (gpgme_ctx_t ctx, const char *signer,
53     gpgme_key_t *rset, int opts)
54     {
55     gpgme_error_t err;
56     gpgme_data_t plain = NULL;
57     gpgme_data_t ciph = NULL;
58     gpgme_key_t key = NULL;
59    
60     if (!signer)
61     return gpg_error (GPG_ERR_INV_ARG);
62     if (get_pubkey (signer, &key))
63     return gpg_error (GPG_ERR_NO_PUBKEY);
64    
65     gpgme_set_armor (ctx, 1);
66    
67     err = gpg_data_new_from_clipboard (&plain, 0);
68     if (err)
69     goto leave;
70     err = gpgme_data_new (&ciph);
71     if (err)
72     goto leave;
73     err = gpgme_signers_add (ctx, key);
74     if (err)
75     goto leave;
76    
77     err = gpgme_op_encrypt_sign (ctx, rset,
78     opts? GPGME_ENCRYPT_ALWAYS_TRUST : (gpgme_encrypt_flags_t)0,
79     plain, ciph);
80     if (err)
81     goto leave;
82    
83     gpg_data_release_and_set_clipboard (ciph, 1);
84     ciph = NULL;
85    
86     leave:
87     if (plain)
88     gpgme_data_release (plain);
89     if (ciph)
90     gpgme_data_release (ciph);
91     return err;
92     }
93    
94    
95     /* Dialog procedure for clipboard sign + encrypt. */
96     BOOL CALLBACK
97     clip_signenc_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)
98     {
99     static listview_ctrl_t lv = NULL;
100     static keylist_t list = NULL;
101     gpg_keycache_t kc;
102     gpgme_key_t *rset;
103     gpgme_error_t err;
104     gpgme_ctx_t ctx;
105     passphrase_cb_s pwd;
106     char *signer = NULL;
107     int force_trust = 0, opt = 0;
108     int kmode = reg_prefs.keylist_mode? KEYLIST_ENCRYPT_MIN : KEYLIST_ENCRYPT;
109     int n;
110    
111     switch( msg ) {
112     case WM_INITDIALOG:
113     SetWindowText (dlg, _("Sign & Encrypt"));
114    
115     kc = keycache_get_ctx( KEYCACHE_PUB );
116     if( !kc )
117     BUG( NULL );
118     lv = keylist_load( GetDlgItem( dlg, IDC_SIGNENC_KEYLIST ),
119     kc, NULL, kmode, KEY_SORT_USERID);
120     seclist_init( dlg, IDC_SIGNENC_SECLIST, KEYLIST_FLAG_SHORT, &list );
121     center_window (dlg, NULL);
122     set_active_window (dlg);
123     EnableWindow (GetDlgItem (dlg, IDC_SIGNENC_SECLIST), FALSE);
124     SetDlgItemText (dlg, IDC_SIGNENC_SELKEY, _("Select key for signing"));
125     SetDlgItemText (dlg, IDC_SIGNENC_SECLISTINF, _("Signing key:"));
126     SetForegroundWindow (dlg);
127     return TRUE;
128    
129     case WM_DESTROY:
130     seclist_destroy (&list);
131     reset_active_window ();
132     if (lv) {
133     keylist_delete (lv);
134     lv = NULL;
135     }
136     return FALSE;
137    
138     case WM_NOTIFY:
139     NMHDR * notify;
140     notify = (NMHDR *)lparam;
141     if (notify && notify->code == NM_DBLCLK
142     && notify->idFrom == IDC_SIGNENC_KEYLIST)
143     PostMessage (dlg, WM_COMMAND, MAKEWPARAM (IDOK, 0), NULL);
144     return TRUE;
145    
146     case WM_SYSCOMMAND:
147     if( LOWORD (wparam) == SC_CLOSE )
148     EndDialog( dlg, TRUE );
149     return FALSE;
150    
151     case WM_COMMAND:
152     if (HIWORD (wparam) == BN_CLICKED
153     && LOWORD (wparam) == IDC_SIGNENC_SELKEY) {
154     int enable = IsDlgButtonChecked (dlg, IDC_SIGNENC_SELKEY);
155     EnableWindow (GetDlgItem (dlg, IDC_SIGNENC_SECLIST), enable? TRUE : FALSE);
156     }
157     switch( LOWORD( wparam ) ) {
158     case IDOK:
159     rset = keylist_get_recipients( lv, &force_trust, &n );
160     if (!n) {
161     msg_box( dlg, _("You must select at least one key."), _("Sign & Encrypt"), MB_ERR );
162     return FALSE;
163     }
164     if( IsDlgButtonChecked( dlg, IDC_SIGNENC_SELKEY ) ) {
165     gpgme_key_t key;
166     const char * s;
167    
168     if( seclist_select_key( dlg, IDC_SIGNENC_SECLIST, &key ) ) {
169     msg_box( dlg, _("No key was selected."), _("Signing"), MB_ERR );
170     return FALSE;
171     }
172     s = key->subkeys->keyid;
173     if (s)
174     signer = m_strdup(s+8);
175     }
176     else {
177     signer = get_gnupg_default_key ();
178     if (!signer) {
179     msg_box (dlg, _("Could not get default key."), _("Signing"), MB_ERR);
180     return FALSE;
181     }
182     }
183    
184     err = gpgme_new (&ctx);
185     if (err)
186     BUG (NULL);
187     set_gpg_passphrase_cb (&pwd, ctx, GPG_CMD_SIGN, dlg, _("Sign & Encrypt"));
188     err = gpg_clip_sign_encrypt (ctx, signer, rset, force_trust);
189     release_gpg_passphrase_cb (&pwd);
190     free (rset);
191     free_if_alloc (signer);
192     gpgme_release (ctx);
193     if (gpgme_err_code (err) == GPG_ERR_BAD_PASSPHRASE)
194     agent_del_cache (pwd.keyid);
195     if (err) {
196     msg_box (dlg, gpgme_strerror (err), _("Sign & Encrypt"), MB_ERR );
197     return FALSE;
198     }
199     show_msg (dlg, 1500, _("GnuPG Status: Finished"));
200     EndDialog (dlg, TRUE);
201     return TRUE;
202    
203     case IDCANCEL:
204     EndDialog( dlg, FALSE );
205     return FALSE;
206     }
207     break;
208     }
209    
210     return FALSE;
211     }

Properties

Name Value
svn:eol-style native

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26