/[winpt]/trunk/Src/wptClipSignEncDlg.cpp
ViewVC logotype

Diff of /trunk/Src/wptClipSignEncDlg.cpp

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 23 by twoaday, Fri Sep 30 10:10:16 2005 UTC revision 68 by twoaday, Sat Nov 5 12:00:55 2005 UTC
# Line 1  Line 1 
1  /* wptSignEncDlg.cpp - Sign & encrypt dialog  /* wptSignEncDlg.cpp - Sign & encrypt dialog
2   *      Copyright (C) 2000-2005 Timo Schulz   *      Copyright (C) 2000-2005 Timo Schulz
3   *   *
4   * This file is part of WinPT.   * This file is part of WinPT.
5   *   *
6   * WinPT is free software; you can redistribute it and/or modify   * WinPT is free software; you can redistribute it and/or modify
7   * it under the terms of the GNU General Public License as published by   * it under the terms of the GNU General Public License as published by
8   * the Free Software Foundation; either version 2 of the License, or   * the Free Software Foundation; either version 2 of the License, or
9   * (at your option) any later version.   * (at your option) any later version.
10   *   *
11   * WinPT is distributed in the hope that it will be useful,   * WinPT is distributed in the hope that it will be useful,
12   * but WITHOUT ANY WARRANTY; without even the implied warranty of   * but WITHOUT ANY WARRANTY; without even the implied warranty of
13   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14   * GNU General Public License for more details.   * GNU General Public License for more details.
15   *   *
16   * You should have received a copy of the GNU General Public License   * You should have received a copy of the GNU General Public License
17   * along with WinPT; if not, write to the Free Software Foundation,   * along with WinPT; if not, write to the Free Software Foundation,
18   * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA   * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
19   */   */
20    
21  #include <windows.h>  #ifdef HAVE_CONFIG_H
22  #include <commctrl.h>  #include <config.h>
23    #endif
24  #include "../resource.h"  
25  #include "wptErrors.h"  #include <windows.h>
26  #include "wptAgent.h"  #include <commctrl.h>
27  #include "wptGPG.h"  
28  #include "wptCommonCtl.h"  #include "resource.h"
29  #include "wptKeylist.h"  #include "wptErrors.h"
30  #include "wptTypes.h"  #include "wptAgent.h"
31  #include "wptNLS.h"  #include "wptCrypto.h"
32  #include "wptContext.h" /* for passphrase_s */  #include "wptGPG.h"
33  #include "wptDlgs.h"  #include "wptCommonCtl.h"
34  #include "wptW32API.h"  #include "wptKeylist.h"
35  #include "wptKeylist.h"  #include "wptTypes.h"
36  #include "wptVersion.h"  #include "wptNLS.h"
37  #include "wptGPG.h"  #include "wptContext.h" /* for passphrase_s */
38  #include "wptRegistry.h"  #include "wptDlgs.h"
39  #include "wptUTF8.h"  #include "wptW32API.h"
40    #include "wptKeylist.h"
41    #include "wptVersion.h"
42  /* Encrypt the clipboard data with the recipients from @rset and  #include "wptGPG.h"
43     additionally sign the data before @signer as the keyID.  #include "wptRegistry.h"
44     Return value: 0 on success. */  #include "wptUTF8.h"
45  gpgme_error_t  
46  gpg_clip_sign_encrypt (struct passphrase_cb_s *cb, const char *signer,  
47                         gpgme_key_t *rset, int opts)  /* Encrypt the clipboard data with the recipients from @rset and
48  {     additionally sign the data before @signer as the keyID.
49      gpgme_error_t err;     Return value: 0 on success. */
50      gpgme_data_t plain = NULL;  gpgme_error_t
51      gpgme_data_t ciph = NULL;  gpg_clip_sign_encrypt (gpgme_ctx_t ctx, const char *signer,
52      gpgme_key_t key = NULL;                         gpgme_key_t *rset, int opts)
53      gpgme_ctx_t ctx;  {
54        gpgme_error_t err;
55      if (!signer)      gpgme_data_t plain = NULL;
56          return gpg_error (GPG_ERR_INV_ARG);      gpgme_data_t ciph = NULL;
57      if (get_pubkey (signer, &key))      gpgme_key_t key = NULL;
58          return gpg_error (GPG_ERR_NO_PUBKEY);  
59            if (!signer)
60      err = gpgme_new (&ctx);          return gpg_error (GPG_ERR_INV_ARG);
61      if (err)      if (get_pubkey (signer, &key))
62          return err;          return gpg_error (GPG_ERR_NO_PUBKEY);
63    
64      /* Update the gpgme context manually. */      gpgme_set_armor (ctx, 1);
65      cb->gpg = ctx;      
66        err = gpg_data_new_from_clipboard (&plain, 0);
67      gpgme_set_armor (ctx, 1);      if (err)
68                goto leave;  
69      err = gpg_data_new_from_clipboard (&plain, 0);      err = gpgme_data_new (&ciph);
70      if (err)      if (err)
71          goto leave;            goto leave;
72      err = gpgme_data_new (&ciph);      err = gpgme_signers_add (ctx, key);
73      if (err)      if (err)
74          goto leave;          goto leave;
75      err = gpgme_signers_add (ctx, key);  
76      if (err)      err = gpgme_op_encrypt_sign (ctx, rset,
77          goto leave;                                   opts? GPGME_ENCRYPT_ALWAYS_TRUST : (gpgme_encrypt_flags_t)0,
78                                     plain, ciph);
79      err = gpgme_op_encrypt_sign (ctx, rset,      if (err)
80                                   opts? GPGME_ENCRYPT_ALWAYS_TRUST : (gpgme_encrypt_flags_t)0,          goto leave;
81                                   plain, ciph);  
82      if (err)      gpg_data_release_and_set_clipboard (ciph, 1);
83          goto leave;      ciph = NULL;
84    
85      gpg_data_release_and_set_clipboard (ciph, 1);  leave:
86      ciph = NULL;      if (plain)
87            gpgme_data_release (plain);
88  leave:      if (ciph)
89      if (plain)          gpgme_data_release (ciph);
90          gpgme_data_release (plain);      return err;
91      if (ciph)  }
92          gpgme_data_release (ciph);  
93      gpgme_key_release (key);  
94      gpgme_release (ctx);  /* Dialog procedure for clipboard sign + encrypt. */
95      return err;  BOOL CALLBACK
96  }  clip_signenc_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)
97    {
98        static listview_ctrl_t lv = NULL;
99  /* Dialog procedure for clipboard sign + encrypt. */      static keylist_t list = NULL;
100  BOOL CALLBACK      gpg_keycache_t kc;
101  clip_signenc_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)      gpgme_key_t *rset;
102  {      gpgme_error_t err;
103      static listview_ctrl_t lv = NULL;      gpgme_ctx_t ctx;
104      static keylist_t list = NULL;      passphrase_cb_s pwd;
105      static int enable = 0;      char *signer = NULL;
106      gpgme_keycache_t kc;      int force_trust = 0;
107      gpgme_key_t *rset;      int kmode = reg_prefs.keylist_mode? KEYLIST_ENCRYPT_MIN : KEYLIST_ENCRYPT;
108      gpgme_error_t err;      int n;
109      passphrase_cb_s pwd;      
110      char * signer = NULL;      switch( msg ) {
111      int force_trust = 0, opt = 0;      case WM_INITDIALOG:
112      int kmode = reg_prefs.keylist_mode? KEYLIST_ENCRYPT_MIN : KEYLIST_ENCRYPT;          SetWindowText (dlg, _("Sign & Encrypt"));
113      int n;  
114                kc = keycache_get_ctx( KEYCACHE_PUB );
115      switch( msg ) {          if( !kc )
116      case WM_INITDIALOG:              BUG( NULL );
117          enable = 0;          lv = keylist_load( GetDlgItem( dlg, IDC_SIGNENC_KEYLIST ),
118      #ifndef LANG_DE                             kc, NULL, kmode, KEY_SORT_USERID);
119          SetWindowText( dlg, _("Sign & Encrypt") );          seclist_init( dlg, IDC_SIGNENC_SECLIST, KEYLIST_FLAG_SHORT, &list );
120      #endif          center_window (dlg, NULL);
121          kc = keycache_get_ctx( KEYCACHE_PUB );          set_active_window (dlg);
122          if( !kc )          EnableWindow (GetDlgItem (dlg, IDC_SIGNENC_SECLIST), FALSE);
123              BUG( NULL );          SetDlgItemText (dlg, IDC_SIGNENC_SELKEY, _("Select key for signing"));
124          lv = keylist_load( GetDlgItem( dlg, IDC_SIGNENC_KEYLIST ),          SetDlgItemText (dlg, IDC_SIGNENC_SECLISTINF, _("Signing key:"));
125                             kc, NULL, kmode, KEY_SORT_USERID);          SetForegroundWindow (dlg);
126          seclist_init( dlg, IDC_SIGNENC_SECLIST, KEYLIST_FLAG_SHORT, &list );          return TRUE;
127          center_window (dlg, NULL);          
128          set_active_window (dlg);      case WM_DESTROY:
129          EnableWindow (GetDlgItem (dlg, IDC_SIGNENC_SECLIST), FALSE);          seclist_destroy (&list);
130          SetDlgItemText (dlg, IDC_SIGNENC_SELKEY, _("Select key for signing"));          reset_active_window ();
131          SetDlgItemText (dlg, IDC_SIGNENC_SECLISTINF, _("Signing key:"));          if (lv) {
132          SetForegroundWindow (dlg);              keylist_delete (lv);
133          return TRUE;              lv = NULL;
134                    }
135      case WM_DESTROY:          return FALSE;
136          seclist_destroy (&list);          
137          reset_active_window ();      case WM_NOTIFY:
138          if (lv) {          NMHDR * notify;
139              keylist_delete( lv );          notify = (NMHDR *)lparam;
140              lv = NULL;          if (notify && notify->code == NM_DBLCLK
141          }              && notify->idFrom == IDC_SIGNENC_KEYLIST)
142          return FALSE;              PostMessage (dlg, WM_COMMAND, MAKEWPARAM (IDOK, 0), 0);
143                    return TRUE;
144      case WM_NOTIFY:          
145          NMHDR * notify;      case WM_SYSCOMMAND:
146          notify = (NMHDR *)lparam;          if( LOWORD (wparam) == SC_CLOSE )
147          if( notify && notify->code == NM_DBLCLK              EndDialog( dlg, TRUE );
148              && notify->idFrom == IDC_SIGNENC_KEYLIST )          return FALSE;
149              PostMessage( dlg, WM_COMMAND, MAKEWPARAM(IDOK, 0), NULL );          
150          return TRUE;      case WM_COMMAND:
151                    if (HIWORD (wparam) == BN_CLICKED
152      case WM_SYSCOMMAND:              && LOWORD (wparam) == IDC_SIGNENC_SELKEY) {
153          if( LOWORD (wparam) == SC_CLOSE )              int enable = IsDlgButtonChecked (dlg, IDC_SIGNENC_SELKEY);
154              EndDialog( dlg, TRUE );              EnableWindow (GetDlgItem (dlg, IDC_SIGNENC_SECLIST), enable? TRUE : FALSE);
155          return FALSE;          }
156                    switch( LOWORD( wparam ) ) {
157      case WM_COMMAND:          case IDOK:
158          /* fixme: the enable seems to have a sync problem */              rset = keylist_get_recipients( lv, &force_trust, &n );
159          if( HIWORD( wparam ) == BN_CLICKED              if (!n) {
160              && LOWORD( wparam ) == IDC_SIGNENC_SELKEY ) {                  msg_box( dlg, _("You must select at least one key."), _("Sign & Encrypt"), MB_ERR );
161              enable ^= 1;                  return FALSE;
162              EnableWindow( GetDlgItem( dlg, IDC_SIGNENC_SECLIST ), enable? TRUE : FALSE );              }
163          }              if( IsDlgButtonChecked( dlg, IDC_SIGNENC_SELKEY ) ) {
164          switch( LOWORD( wparam ) ) {                  gpgme_key_t key;
165          case IDOK:                  const char * s;
166              rset = keylist_get_recipients( lv, &force_trust, &n );  
167              if (!n) {                  if( seclist_select_key( dlg, IDC_SIGNENC_SECLIST, &key ) ) {
168                  msg_box( dlg, _("You must select at least one key."), _("Sign & Encrypt"), MB_ERR );                      msg_box( dlg, _("No key was selected."), _("Signing"), MB_ERR );
169                  return FALSE;                      return FALSE;
170              }                  }
171              if( IsDlgButtonChecked( dlg, IDC_SIGNENC_SELKEY ) ) {                  s = key->subkeys->keyid;
172                  gpgme_key_t key;                  if (s)
173                  const char * s;                      signer = m_strdup(s+8);
174                }
175                  if( seclist_select_key( dlg, IDC_SIGNENC_SECLIST, &key ) ) {              else {
176                      msg_box( dlg, _("No key was selected."), _("Signing"), MB_ERR );                  signer = get_gnupg_default_key ();
177                      return FALSE;                  if (!signer) {
178                  }                      msg_box (dlg, _("Could not get default key."), _("Signing"), MB_ERR);
179                  s = key->subkeys->keyid;                      return FALSE;
180                  if (s)                  }
181                      signer = m_strdup(s+8);              }
182              }  
183              else {              err = gpgme_new (&ctx);
184                  signer = get_gnupg_default_key ();              if (err)
185                  if (!signer) {                  BUG (NULL);
186                      msg_box (dlg, _("Could not get default key."), _("Signing"), MB_ERR);              set_gpg_passphrase_cb (&pwd, ctx, GPG_CMD_SIGN, dlg, _("Sign & Encrypt"));
187                      return FALSE;              err = gpg_clip_sign_encrypt (ctx, signer, rset, force_trust);
188                  }              release_gpg_passphrase_cb (&pwd);
189              }              free (rset);
190                                free_if_alloc (signer);
191              set_gpg_passphrase_cb (&pwd, NULL, GPG_CMD_SIGN, dlg, _("Sign & Encrypt"));              gpgme_release (ctx);
192              err = gpg_clip_sign_encrypt (&pwd, signer, rset, force_trust);              if (gpgme_err_code (err) ==  GPG_ERR_BAD_PASSPHRASE)
193              release_gpg_passphrase_cb (&pwd);                  agent_del_cache (pwd.keyid);
194              free (rset);              if (err) {
195              free_if_alloc (signer);                  msg_box (dlg, gpgme_strerror (err), _("Sign & Encrypt"), MB_ERR );
196              if (err == gpg_error (GPG_ERR_BAD_PASSPHRASE))                  return FALSE;
197                  agent_del_cache (pwd.keyid);              }
198              if (err) {              show_msg (dlg, 1500, _("GnuPG Status: Finished"));
199                  msg_box (dlg, gpgme_strerror (err), _("Sign & Encrypt"), MB_ERR );              EndDialog (dlg, TRUE);
200                  return FALSE;              return TRUE;
201              }              
202              show_msg (dlg, 1500, _("GnuPG Status: Finished"));          case IDCANCEL:
203              EndDialog (dlg, TRUE);              EndDialog( dlg, FALSE );
204              return TRUE;              return FALSE;
205                        }
206          case IDCANCEL:          break;
207              EndDialog( dlg, FALSE );      }
208              return FALSE;      
209          }      return FALSE;
210          break;  }
     }  
       
     return FALSE;  
 }  

Legend:
Removed from v.23  
changed lines
  Added in v.68

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26