/[winpt]/trunk/Src/wptClipSignEncDlg.cpp
ViewVC logotype

Diff of /trunk/Src/wptClipSignEncDlg.cpp

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 12 by twoaday, Thu Apr 14 12:56:25 2005 UTC revision 175 by twoaday, Tue Feb 7 08:58:04 2006 UTC
# Line 1  Line 1 
1  /* wptSignEncDlg.cpp - Sign & encrypt dialog  /* wptSignEncDlg.cpp - Sign & encrypt dialog
2   *      Copyright (C) 2000-2005 Timo Schulz   *      Copyright (C) 2000-2005 Timo Schulz
3   *   *
4   * This file is part of WinPT.   * This file is part of WinPT.
5   *   *
6   * WinPT is free software; you can redistribute it and/or modify   * WinPT is free software; you can redistribute it and/or modify
7   * it under the terms of the GNU General Public License as published by   * it under the terms of the GNU General Public License as published by
8   * the Free Software Foundation; either version 2 of the License, or   * the Free Software Foundation; either version 2 of the License, or
9   * (at your option) any later version.   * (at your option) any later version.
10   *   *
11   * WinPT is distributed in the hope that it will be useful,   * WinPT is distributed in the hope that it will be useful,
12   * but WITHOUT ANY WARRANTY; without even the implied warranty of   * but WITHOUT ANY WARRANTY; without even the implied warranty of
13   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14   * GNU General Public License for more details.   * GNU General Public License for more details.
15   *   *
16   * You should have received a copy of the GNU General Public License   * You should have received a copy of the GNU General Public License
17   * along with WinPT; if not, write to the Free Software Foundation,   * along with WinPT; if not, write to the Free Software Foundation,
18   * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA   * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
19   */   */
20    #ifdef HAVE_CONFIG_H
21  #include <windows.h>  #include <config.h>
22  #include <commctrl.h>  #endif
23    
24  #include "../resource.h"  #include <windows.h>
25  #include "wptErrors.h"  #include <commctrl.h>
26  #include "wptAgent.h"  
27  #include "wptGPG.h"  #include "resource.h"
28  #include "wptCommonCtl.h"  #include "wptErrors.h"
29  #include "wptKeylist.h"  #include "wptAgent.h"
30  #include "wptTypes.h"  #include "wptCrypto.h"
31  #include "wptNLS.h"  #include "wptGPG.h"
32  #include "wptContext.h" /* for passphrase_s */  #include "wptCommonCtl.h"
33  #include "wptDlgs.h"  #include "wptKeylist.h"
34  #include "wptW32API.h"  #include "wptTypes.h"
35  #include "wptKeylist.h"  #include "wptNLS.h"
36  #include "wptVersion.h"  #include "wptContext.h" /* for passphrase_s */
37  #include "wptGPG.h"  #include "wptDlgs.h"
38  #include "wptRegistry.h"  #include "wptW32API.h"
39  #include "wptUTF8.h"  #include "wptKeylist.h"
40    #include "wptVersion.h"
41    #include "wptGPG.h"
42  BOOL CALLBACK  #include "wptRegistry.h"
43  clip_signenc_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)  #include "wptUTF8.h"
44  {  
45      static listview_ctrl_t lv = NULL;  
46      static keylist_t list = NULL;  /* Encrypt the clipboard data with the recipients from @rset and
47      static int enable = 0;     additionally sign the data before @signer as the keyID.
48      gpgme_ctx_t ctx;     Return value: 0 on success. */
49      gpgme_keycache_t kc;  gpgme_error_t
50      gpgme_recipients_t rset;  gpg_clip_sign_encrypt (gpgme_ctx_t ctx, const char *signer,
51      gpgme_error_t err;                         gpgme_key_t *rset, int opts)
52      passphrase_cb_s pwd;  {
53      char * signer = NULL;      gpgme_error_t err;
54      int force_trust = 0, opt = 0;      gpgme_data_t plain = NULL;
55      int kmode = reg_prefs.keylist_mode? KEYLIST_ENCRYPT_MIN : KEYLIST_ENCRYPT;      gpgme_data_t ciph = NULL;
56            gpgme_key_t key = NULL;
57      switch( msg ) {  
58      case WM_INITDIALOG:      if (!signer)
59          enable = 0;          return gpg_error (GPG_ERR_INV_ARG);
60  #ifndef LANG_DE      if (get_pubkey (signer, &key))
61          SetWindowText( dlg, _("Sign & Encrypt") );          return gpg_error (GPG_ERR_NO_PUBKEY);
62  #endif  
63          kc = keycache_get_ctx( KEYCACHE_PUB );      gpgme_set_armor (ctx, 1);
64          if( !kc )      gpgme_set_textmode (ctx, 1);
65              BUG( NULL );      
66          lv = keylist_load( GetDlgItem( dlg, IDC_SIGNENC_KEYLIST ),      err = gpg_data_new_from_clipboard (&plain, 0);
67                             kc, NULL, kmode, GPGME_ATTR_USERID );      if (err)
68          seclist_init( dlg, IDC_SIGNENC_SECLIST, KEYLIST_FLAG_SHORT, &list );          goto leave;  
69          center_window (dlg);      err = gpgme_data_new (&ciph);
70          set_active_window (dlg);      if (err)
71          EnableWindow (GetDlgItem (dlg, IDC_SIGNENC_SECLIST), FALSE);          goto leave;
72          SetDlgItemText (dlg, IDC_SIGNENC_SELKEY, _("Select key for signing"));      err = gpgme_signers_add (ctx, key);
73          SetDlgItemText (dlg, IDC_SIGNENC_SECLISTINF, _("Signing key:"));      if (err)
74          SetForegroundWindow (dlg);          goto leave;
75          return TRUE;  
76                err = gpgme_op_encrypt_sign (ctx, rset,
77      case WM_DESTROY:                                   opts? GPGME_ENCRYPT_ALWAYS_TRUST : (gpgme_encrypt_flags_t)0,
78          seclist_destroy( &list );                                   plain, ciph);
79          reset_active_window( );      if (err)
80          if( lv ) {          goto leave;
81              keylist_delete( lv );  
82              lv = NULL;      gpg_data_release_and_set_clipboard (ciph, 1);
83          }      ciph = NULL;
84          memset( pwd.pwd, 0, sizeof pwd.pwd );  
85          return FALSE;  leave:
86                if (plain)
87      case WM_NOTIFY:          gpgme_data_release (plain);
88          NMHDR * notify;      if (ciph)
89          notify = (NMHDR *)lparam;          gpgme_data_release (ciph);
90          if( notify && notify->code == NM_DBLCLK      return err;
91              && notify->idFrom == IDC_SIGNENC_KEYLIST )  }
92              PostMessage( dlg, WM_COMMAND, MAKEWPARAM(IDOK, 0), NULL );  
93          return TRUE;  
94            /* Dialog procedure for clipboard sign + encrypt. */
95      case WM_SYSCOMMAND:  BOOL CALLBACK
96          if( LOWORD (wparam) == SC_CLOSE )  clip_signenc_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)
97              EndDialog( dlg, TRUE );  {
98          return FALSE;      static listview_ctrl_t lv = NULL;
99                static keylist_t list = NULL;
100      case WM_COMMAND:      gpg_keycache_t kc;
101          /* fixme: the enable seems to have a sync problem */      gpgme_key_t *rset;
102          if( HIWORD( wparam ) == BN_CLICKED      gpgme_error_t err;
103              && LOWORD( wparam ) == IDC_SIGNENC_SELKEY ) {      gpgme_ctx_t ctx;
104              enable ^= 1;      passphrase_cb_s pwd;
105              EnableWindow( GetDlgItem( dlg, IDC_SIGNENC_SECLIST ), enable? TRUE : FALSE );      char *signer = NULL;
106          }      int force_trust = 0;
107          switch( LOWORD( wparam ) ) {      int kmode = reg_prefs.keylist_mode? KEYLIST_ENCRYPT_MIN : KEYLIST_ENCRYPT;
108          case IDOK:      int n;
109              rset = keylist_get_recipients( lv, &force_trust, NULL );      
110              if( !gpgme_recipients_count( rset ) ) {      switch( msg ) {
111                  msg_box( dlg, _("You must select at least one key."), _("Sign & Encrypt"), MB_ERR );      case WM_INITDIALOG:
112                  gpgme_recipients_release( rset );          SetWindowText (dlg, _("Sign & Encrypt"));
113                  return FALSE;          SetDlgItemText (dlg, IDCANCEL, _("&Cancel"));
114              }          kc = keycache_get_ctx (KEYCACHE_PUB);
115              if( IsDlgButtonChecked( dlg, IDC_SIGNENC_SELKEY ) ) {          if (!kc)
116                  gpgme_key_t key;              BUG (NULL);
117                  const char * s;          lv = keylist_load (GetDlgItem (dlg, IDC_SIGNENC_KEYLIST),
118                               kc, NULL, kmode, KEY_SORT_USERID);
119                  if( seclist_select_key( dlg, IDC_SIGNENC_SECLIST, &key ) ) {          seclist_init (dlg, IDC_SIGNENC_SECLIST, KEYLIST_FLAG_SHORT, &list);
120                      msg_box( dlg, _("No key was selected."), _("Signing"), MB_ERR );          center_window (dlg, NULL);
121                      return FALSE;          EnableWindow (GetDlgItem (dlg, IDC_SIGNENC_SECLIST), FALSE);
122                  }          SetDlgItemText (dlg, IDC_SIGNENC_SELKEY, _("Select key for signing"));
123                  s = gpgme_key_get_string_attr( key, GPGME_ATTR_KEYID, NULL, 0 );          SetDlgItemText (dlg, IDC_SIGNENC_SECLISTINF, _("Signing key:"));
124                  if( s )          SetForegroundWindow (dlg);
125                      signer = m_strdup( s+8 );          return TRUE;
126              }          
127              else {      case WM_DESTROY:
128                  signer = get_gnupg_default_key( );          seclist_destroy (&list);
129                  if( !signer ) {          if (lv) {
130                      msg_box( dlg, _("Could not get default key."), _("Signing"), MB_ERR );              keylist_delete (lv);
131                      return FALSE;              lv = NULL;
132                  }          }
133              }          return FALSE;
134              memset( &pwd, 0, sizeof pwd );          
135              err = gpgme_new( &ctx );      case WM_NOTIFY:
136              if( err )          NMHDR * notify;
137                  BUG( dlg );          notify = (NMHDR *)lparam;
138              gpgme_enable_logging( ctx );          if (notify && notify->code == NM_DBLCLK
139              set_gpg_passphrase_cb( ctx, &pwd, GPG_CMD_SIGN, dlg, _("Sign & Encrypt") );              && notify->idFrom == IDC_SIGNENC_KEYLIST)
140              if( force_trust )              PostMessage (dlg, WM_COMMAND, MAKEWPARAM (IDOK, 0), 0);
141                  opt |= GPGME_CTRL_FORCETRUST;          return TRUE;
142              err = gpgme_op_clip_sign_encrypt( ctx, rset, signer, opt );          
143              memset( pwd.pwd, 0, sizeof pwd.pwd );      case WM_SYSCOMMAND:
144              gpgme_recipients_release( rset );          if (LOWORD (wparam) == SC_CLOSE)
145              free_if_alloc( signer );              EndDialog (dlg, TRUE);
146              if( err == GPGME_Bad_Passphrase )              return FALSE;
147                  agent_del_cache( pwd.keyid );          
148              if( err ) {      case WM_COMMAND:
149                  gpgme_show_error( dlg, err, ctx, _("Sign & Encrypt"), MB_ERR );          if (HIWORD (wparam) == BN_CLICKED
150                  gpgme_release( ctx );              && LOWORD (wparam) == IDC_SIGNENC_SELKEY) {
151                  return FALSE;              int enable = IsDlgButtonChecked (dlg, IDC_SIGNENC_SELKEY);
152              }              EnableWindow (GetDlgItem (dlg, IDC_SIGNENC_SECLIST), enable? TRUE : FALSE);
153              gpgme_release( ctx );          }
154              show_msg( dlg, 1500, _("GnuPG Status: Finished") );          switch (LOWORD (wparam)) {
155              EndDialog( dlg, TRUE );          case IDOK:
156              return TRUE;              rset = keylist_get_recipients (lv, &force_trust, &n);
157                            if (!n) {
158          case IDCANCEL:                  msg_box (dlg, _("You must select at least one key."),
159              EndDialog( dlg, FALSE );                           _("Sign & Encrypt"), MB_ERR);
160              return FALSE;                  return FALSE;
161          }              }
162          break;              if( IsDlgButtonChecked( dlg, IDC_SIGNENC_SELKEY ) ) {
163      }                  gpgme_key_t key;
164                        const char * s;
165      return FALSE;  
166  } /* clip_signenc_dlg_proc */                  if( seclist_select_key( dlg, IDC_SIGNENC_SECLIST, &key ) ) {
167                        msg_box (dlg, _("No key was selected."), _("Signing"), MB_ERR);
168                        return FALSE;
169                    }
170                    s = key->subkeys->keyid;
171                    if (s)
172                        signer = m_strdup(s+8);
173                }
174                else {
175                    signer = get_gnupg_default_key ();
176                    if (!signer) {
177                        msg_box (dlg, _("Could not get default key."), _("Signing"), MB_ERR);
178                        return FALSE;
179                    }
180                }
181    
182                err = gpgme_new (&ctx);
183                if (err)
184                    BUG (NULL);
185    
186                set_gpg_passphrase_cb (&pwd, ctx, GPG_CMD_SIGN, dlg, _("Sign & Encrypt"));
187                err = gpg_clip_sign_encrypt (ctx, signer, rset, force_trust);
188                release_gpg_passphrase_cb (&pwd);
189                free (rset);
190                free_if_alloc (signer);
191                gpgme_release (ctx);
192                if (gpgme_err_code (err) ==  GPG_ERR_BAD_PASSPHRASE)
193                    agent_del_cache (pwd.keyid);
194                if (err) {
195                    msg_box (dlg, gpgme_strerror (err), _("Sign & Encrypt"), MB_ERR );
196                    return FALSE;
197                }
198                show_msg (dlg, 1500, _("GnuPG Status: Finished"));
199                EndDialog (dlg, TRUE);
200                return TRUE;
201                
202            case IDCANCEL:
203                EndDialog( dlg, FALSE );
204                return FALSE;
205            }
206            break;
207        }
208        
209        return FALSE;
210    }

Legend:
Removed from v.12  
changed lines
  Added in v.175

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26