43 |
additionally sign the data before @signer as the keyID. |
additionally sign the data before @signer as the keyID. |
44 |
Return value: 0 on success. */ |
Return value: 0 on success. */ |
45 |
gpgme_error_t |
gpgme_error_t |
46 |
gpg_clip_sign_encrypt (struct passphrase_cb_s *cb, const char *signer, |
gpg_clip_sign_encrypt (gpgme_ctx_t ctx, const char *signer, |
47 |
gpgme_key_t *rset, int opts) |
gpgme_key_t *rset, int opts) |
48 |
{ |
{ |
49 |
gpgme_error_t err; |
gpgme_error_t err; |
50 |
gpgme_data_t plain = NULL; |
gpgme_data_t plain = NULL; |
51 |
gpgme_data_t ciph = NULL; |
gpgme_data_t ciph = NULL; |
52 |
gpgme_key_t key = NULL; |
gpgme_key_t key = NULL; |
|
gpgme_ctx_t ctx; |
|
53 |
|
|
54 |
if (!signer) |
if (!signer) |
55 |
return gpg_error (GPG_ERR_INV_ARG); |
return gpg_error (GPG_ERR_INV_ARG); |
56 |
if (get_pubkey (signer, &key)) |
if (get_pubkey (signer, &key)) |
57 |
return gpg_error (GPG_ERR_NO_PUBKEY); |
return gpg_error (GPG_ERR_NO_PUBKEY); |
|
|
|
|
err = gpgme_new (&ctx); |
|
|
if (err) |
|
|
return err; |
|
|
|
|
|
/* Update the gpgme context manually. */ |
|
|
cb->gpg = ctx; |
|
58 |
|
|
59 |
gpgme_set_armor (ctx, 1); |
gpgme_set_armor (ctx, 1); |
60 |
|
|
82 |
gpgme_data_release (plain); |
gpgme_data_release (plain); |
83 |
if (ciph) |
if (ciph) |
84 |
gpgme_data_release (ciph); |
gpgme_data_release (ciph); |
|
gpgme_key_release (key); |
|
|
gpgme_release (ctx); |
|
85 |
return err; |
return err; |
86 |
} |
} |
87 |
|
|
93 |
static listview_ctrl_t lv = NULL; |
static listview_ctrl_t lv = NULL; |
94 |
static keylist_t list = NULL; |
static keylist_t list = NULL; |
95 |
static int enable = 0; |
static int enable = 0; |
96 |
gpgme_keycache_t kc; |
gpg_keycache_t kc; |
97 |
gpgme_key_t *rset; |
gpgme_key_t *rset; |
98 |
gpgme_error_t err; |
gpgme_error_t err; |
99 |
|
gpgme_ctx_t ctx; |
100 |
passphrase_cb_s pwd; |
passphrase_cb_s pwd; |
101 |
char * signer = NULL; |
char *signer = NULL; |
102 |
int force_trust = 0, opt = 0; |
int force_trust = 0, opt = 0; |
103 |
int kmode = reg_prefs.keylist_mode? KEYLIST_ENCRYPT_MIN : KEYLIST_ENCRYPT; |
int kmode = reg_prefs.keylist_mode? KEYLIST_ENCRYPT_MIN : KEYLIST_ENCRYPT; |
104 |
int n; |
int n; |
178 |
return FALSE; |
return FALSE; |
179 |
} |
} |
180 |
} |
} |
181 |
|
|
182 |
set_gpg_passphrase_cb (&pwd, NULL, GPG_CMD_SIGN, dlg, _("Sign & Encrypt")); |
err = gpgme_new (&ctx); |
183 |
err = gpg_clip_sign_encrypt (&pwd, signer, rset, force_trust); |
if (err) |
184 |
|
BUG (NULL); |
185 |
|
set_gpg_passphrase_cb (&pwd, ctx, GPG_CMD_SIGN, dlg, _("Sign & Encrypt")); |
186 |
|
err = gpg_clip_sign_encrypt (ctx, signer, rset, force_trust); |
187 |
release_gpg_passphrase_cb (&pwd); |
release_gpg_passphrase_cb (&pwd); |
188 |
free (rset); |
free (rset); |
189 |
free_if_alloc (signer); |
free_if_alloc (signer); |
190 |
if (err == gpg_error (GPG_ERR_BAD_PASSPHRASE)) |
gpgme_release (ctx); |
191 |
|
if (gpgme_err_code (err) == GPG_ERR_BAD_PASSPHRASE) |
192 |
agent_del_cache (pwd.keyid); |
agent_del_cache (pwd.keyid); |
193 |
if (err) { |
if (err) { |
194 |
msg_box (dlg, gpgme_strerror (err), _("Sign & Encrypt"), MB_ERR ); |
msg_box (dlg, gpgme_strerror (err), _("Sign & Encrypt"), MB_ERR ); |