/[winpt]/trunk/Src/wptClipSignEncDlg.cpp
ViewVC logotype

Diff of /trunk/Src/wptClipSignEncDlg.cpp

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 25 by twoaday, Wed Oct 12 10:04:26 2005 UTC revision 260 by twoaday, Wed Aug 16 10:01:30 2006 UTC
# Line 1  Line 1 
1  /* wptSignEncDlg.cpp - Sign & encrypt dialog  /* wptSignEncDlg.cpp - Sign & encrypt dialog
2   *      Copyright (C) 2000-2005 Timo Schulz   *      Copyright (C) 2000-2006 Timo Schulz
3   *   *
4   * This file is part of WinPT.   * This file is part of WinPT.
5   *   *
6   * WinPT is free software; you can redistribute it and/or modify   * WinPT is free software; you can redistribute it and/or modify
7   * it under the terms of the GNU General Public License as published by   * it under the terms of the GNU General Public License as published by
8   * the Free Software Foundation; either version 2 of the License, or   * the Free Software Foundation; either version 2 of the License, or
9   * (at your option) any later version.   * (at your option) any later version.
10   *   *
11   * WinPT is distributed in the hope that it will be useful,   * WinPT is distributed in the hope that it will be useful,
12   * but WITHOUT ANY WARRANTY; without even the implied warranty of   * but WITHOUT ANY WARRANTY; without even the implied warranty of
13   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14   * GNU General Public License for more details.   * GNU General Public License for more details.
15   *   *
16   * You should have received a copy of the GNU General Public License   * You should have received a copy of the GNU General Public License
17   * along with WinPT; if not, write to the Free Software Foundation,   * along with WinPT; if not, write to the Free Software Foundation,
18   * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA   * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
19   */   */
20    #ifdef HAVE_CONFIG_H
21  #include <windows.h>  #include <config.h>
22  #include <commctrl.h>  #endif
23    
24  #include "../resource.h"  #include <windows.h>
25  #include "wptErrors.h"  #include <commctrl.h>
26  #include "wptAgent.h"  
27  #include "wptGPG.h"  #include "resource.h"
28  #include "wptCommonCtl.h"  #include "wptErrors.h"
29  #include "wptKeylist.h"  #include "wptAgent.h"
30  #include "wptTypes.h"  #include "wptCrypto.h"
31  #include "wptNLS.h"  #include "wptGPG.h"
32  #include "wptContext.h" /* for passphrase_s */  #include "wptCommonCtl.h"
33  #include "wptDlgs.h"  #include "wptKeylist.h"
34  #include "wptW32API.h"  #include "wptTypes.h"
35  #include "wptKeylist.h"  #include "wptNLS.h"
36  #include "wptVersion.h"  #include "wptContext.h" /* for passphrase_s */
37  #include "wptGPG.h"  #include "wptDlgs.h"
38  #include "wptRegistry.h"  #include "wptW32API.h"
39  #include "wptUTF8.h"  #include "wptKeylist.h"
40    #include "wptVersion.h"
41    #include "wptGPG.h"
42  /* Encrypt the clipboard data with the recipients from @rset and  #include "wptRegistry.h"
43     additionally sign the data before @signer as the keyID.  #include "wptUTF8.h"
44     Return value: 0 on success. */  
45  gpgme_error_t  
46  gpg_clip_sign_encrypt (gpgme_ctx_t ctx, const char *signer,  /* Encrypt the clipboard data with the recipients from @rset and
47                         gpgme_key_t *rset, int opts)     additionally sign the data before @signer as the keyID.
48  {     Return value: 0 on success. */
49      gpgme_error_t err;  gpgme_error_t
50      gpgme_data_t plain = NULL;  gpg_clip_sign_encrypt (gpgme_ctx_t ctx, const char *signer,
51      gpgme_data_t ciph = NULL;                         gpgme_key_t *rset, int opts)
52      gpgme_key_t key = NULL;  {
53        gpgme_error_t err;
54      if (!signer)      gpgme_data_t plain = NULL;
55          return gpg_error (GPG_ERR_INV_ARG);      gpgme_data_t ciph = NULL;
56      if (get_pubkey (signer, &key))      gpgme_key_t key = NULL;
57          return gpg_error (GPG_ERR_NO_PUBKEY);  
58        if (!signer)
59      gpgme_set_armor (ctx, 1);          return gpg_error (GPG_ERR_INV_ARG);
60            if (get_pubkey (signer, &key))
61      err = gpg_data_new_from_clipboard (&plain, 0);          return gpg_error (GPG_ERR_NO_PUBKEY);
62      if (err)  
63          goto leave;        gpgme_set_armor (ctx, 1);
64      err = gpgme_data_new (&ciph);      gpgme_set_textmode (ctx, 1);
65      if (err)      
66          goto leave;      err = gpg_data_new_from_clipboard (&plain, 0);
67      err = gpgme_signers_add (ctx, key);      if (err)
68      if (err)          goto leave;  
69          goto leave;      err = gpgme_data_new (&ciph);
70        if (err)
71      err = gpgme_op_encrypt_sign (ctx, rset,          goto leave;
72                                   opts? GPGME_ENCRYPT_ALWAYS_TRUST : (gpgme_encrypt_flags_t)0,      err = gpgme_signers_add (ctx, key);
73                                   plain, ciph);      if (err)
74      if (err)          goto leave;
75          goto leave;  
76        err = gpgme_op_encrypt_sign (ctx, rset,
77      gpg_data_release_and_set_clipboard (ciph, 1);                                   opts? GPGME_ENCRYPT_ALWAYS_TRUST : (gpgme_encrypt_flags_t)0,
78      ciph = NULL;                                   plain, ciph);
79        if (err)
80  leave:          goto leave;
81      if (plain)  
82          gpgme_data_release (plain);      gpg_data_release_and_set_clipboard (ciph, 1);
83      if (ciph)      ciph = NULL;
84          gpgme_data_release (ciph);  
85      return err;  leave:
86  }      if (plain)
87            gpgme_data_release (plain);
88        if (ciph)
89  /* Dialog procedure for clipboard sign + encrypt. */          gpgme_data_release (ciph);
90  BOOL CALLBACK      return err;
91  clip_signenc_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)  }
92  {  
93      static listview_ctrl_t lv = NULL;  
94      static keylist_t list = NULL;  /* Dialog procedure for clipboard sign + encrypt. */
95      static int enable = 0;  BOOL CALLBACK
96      gpg_keycache_t kc;  clip_signenc_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)
97      gpgme_key_t *rset;  {
98      gpgme_error_t err;      static listview_ctrl_t lv = NULL;
99      gpgme_ctx_t ctx;      static keylist_t list = NULL;
100      passphrase_cb_s pwd;      gpg_keycache_t kc;
101      char *signer = NULL;      gpgme_key_t *rset;
102      int force_trust = 0, opt = 0;      gpgme_error_t err;
103      int kmode = reg_prefs.keylist_mode? KEYLIST_ENCRYPT_MIN : KEYLIST_ENCRYPT;      gpgme_ctx_t ctx;
104      int n;      passphrase_cb_s pwd;
105            char *signer = NULL;
106      switch( msg ) {      size_t n;
107      case WM_INITDIALOG:      int force_trust = 0;
108          enable = 0;      
109      #ifndef LANG_DE      switch (msg) {
110          SetWindowText( dlg, _("Sign & Encrypt") );      case WM_INITDIALOG:
111      #endif          SetWindowText (dlg, _("Sign & Encrypt"));
112          kc = keycache_get_ctx( KEYCACHE_PUB );          SetDlgItemText (dlg, IDCANCEL, _("&Cancel"));
113          if( !kc )          kc = keycache_get_ctx (KEYCACHE_PUB);
114              BUG( NULL );          lv = keylist_load (GetDlgItem (dlg, IDC_SIGNENC_KEYLIST),
115          lv = keylist_load( GetDlgItem( dlg, IDC_SIGNENC_KEYLIST ),                             kc, NULL, KEYLIST_ENCRYPT_MIN, KEY_SORT_USERID);
116                             kc, NULL, kmode, KEY_SORT_USERID);          seclist_init (dlg, IDC_SIGNENC_SECLIST, KEYLIST_FLAG_SHORT, &list);
117          seclist_init( dlg, IDC_SIGNENC_SECLIST, KEYLIST_FLAG_SHORT, &list );          center_window (dlg, NULL);
118          center_window (dlg, NULL);          EnableWindow (GetDlgItem (dlg, IDC_SIGNENC_SECLIST), FALSE);
119          set_active_window (dlg);          SetDlgItemText (dlg, IDC_SIGNENC_SELKEY, _("Select key for signing"));
120          EnableWindow (GetDlgItem (dlg, IDC_SIGNENC_SECLIST), FALSE);          SetDlgItemText (dlg, IDC_SIGNENC_SECLISTINF, _("Signing key:"));
121          SetDlgItemText (dlg, IDC_SIGNENC_SELKEY, _("Select key for signing"));          SetForegroundWindow (dlg);
122          SetDlgItemText (dlg, IDC_SIGNENC_SECLISTINF, _("Signing key:"));          return TRUE;
123          SetForegroundWindow (dlg);          
124          return TRUE;      case WM_DESTROY:
125                    seclist_destroy (&list);
126      case WM_DESTROY:          if (lv) {
127          seclist_destroy (&list);              keylist_delete (lv);
128          reset_active_window ();              lv = NULL;
129          if (lv) {          }
130              keylist_delete( lv );          return FALSE;
131              lv = NULL;          
132          }      case WM_NOTIFY:
133          return FALSE;          NMHDR *notify;
134                    notify = (NMHDR *)lparam;
135      case WM_NOTIFY:          if (notify && notify->code == NM_DBLCLK
136          NMHDR * notify;              && notify->idFrom == IDC_SIGNENC_KEYLIST)
137          notify = (NMHDR *)lparam;              PostMessage (dlg, WM_COMMAND, MAKEWPARAM (IDOK, 0), 0);
138          if( notify && notify->code == NM_DBLCLK          return TRUE;
139              && notify->idFrom == IDC_SIGNENC_KEYLIST )          
140              PostMessage( dlg, WM_COMMAND, MAKEWPARAM(IDOK, 0), NULL );      case WM_COMMAND:
141          return TRUE;          if (HIWORD (wparam) == BN_CLICKED
142                        && LOWORD (wparam) == IDC_SIGNENC_SELKEY) {
143      case WM_SYSCOMMAND:              int enable = IsDlgButtonChecked (dlg, IDC_SIGNENC_SELKEY);
144          if( LOWORD (wparam) == SC_CLOSE )              EnableWindow (GetDlgItem (dlg, IDC_SIGNENC_SECLIST), enable? TRUE : FALSE);
145              EndDialog( dlg, TRUE );          }
146          return FALSE;          switch (LOWORD (wparam)) {
147                    case IDOK:
148      case WM_COMMAND:              rset = keylist_get_recipients (lv, &force_trust, &n);
149          /* fixme: the enable seems to have a sync problem */              if (!n) {
150          if( HIWORD( wparam ) == BN_CLICKED                  msg_box (dlg, _("You must select at least one key."),
151              && LOWORD( wparam ) == IDC_SIGNENC_SELKEY ) {                           _("Sign & Encrypt"), MB_ERR);
152              enable ^= 1;                  return FALSE;
153              EnableWindow( GetDlgItem( dlg, IDC_SIGNENC_SECLIST ), enable? TRUE : FALSE );              }
154          }              if (IsDlgButtonChecked (dlg, IDC_SIGNENC_SELKEY)) {
155          switch( LOWORD( wparam ) ) {                  gpgme_key_t key;
156          case IDOK:                  const char *s;
157              rset = keylist_get_recipients( lv, &force_trust, &n );  
158              if (!n) {                  if (seclist_select_key (dlg, IDC_SIGNENC_SECLIST, &key)) {
159                  msg_box( dlg, _("You must select at least one key."), _("Sign & Encrypt"), MB_ERR );                      msg_box (dlg, _("No key was selected."), _("Signing"), MB_ERR);
160                  return FALSE;                      safe_free (rset);
161              }                      return FALSE;
162              if( IsDlgButtonChecked( dlg, IDC_SIGNENC_SELKEY ) ) {                  }
163                  gpgme_key_t key;                  s = key->subkeys->keyid;
164                  const char * s;                  if (s)
165                        signer = m_strdup(s+8);
166                  if( seclist_select_key( dlg, IDC_SIGNENC_SECLIST, &key ) ) {              }
167                      msg_box( dlg, _("No key was selected."), _("Signing"), MB_ERR );              else {
168                      return FALSE;                  signer = get_gnupg_default_key ();
169                  }                  if (!signer) {
170                  s = key->subkeys->keyid;                      msg_box (dlg, _("Could not get default key."), _("Signing"), MB_ERR);
171                  if (s)                      safe_free (rset);
172                      signer = m_strdup(s+8);                      return FALSE;
173              }                  }
174              else {              }
175                  signer = get_gnupg_default_key ();  
176                  if (!signer) {              err = gpgme_new (&ctx);
177                      msg_box (dlg, _("Could not get default key."), _("Signing"), MB_ERR);              if (err)
178                      return FALSE;                  BUG (NULL);
179                  }              set_gpg_passphrase_cb (&pwd, ctx, GPG_CMD_SIGN, dlg, _("Sign & Encrypt"));
180              }              err = gpg_clip_sign_encrypt (ctx, signer, rset, force_trust);
181                release_gpg_passphrase_cb (&pwd);
182              err = gpgme_new (&ctx);              safe_free (rset);
183              if (err)              free_if_alloc (signer);
184                  BUG (NULL);              gpgme_release (ctx);
185              set_gpg_passphrase_cb (&pwd, ctx, GPG_CMD_SIGN, dlg, _("Sign & Encrypt"));              if (gpgme_err_code (err) ==  GPG_ERR_BAD_PASSPHRASE)
186              err = gpg_clip_sign_encrypt (ctx, signer, rset, force_trust);                  agent_del_cache (pwd.keyid);
187              release_gpg_passphrase_cb (&pwd);              if (err)
188              free (rset);                  msg_box (dlg, gpgme_strerror (err), _("Sign & Encrypt"), MB_ERR);
189              free_if_alloc (signer);              else {
190              gpgme_release (ctx);                  show_msg (dlg, 1500, _("GnuPG Status: Finished"));
191              if (gpgme_err_code (err) ==  GPG_ERR_BAD_PASSPHRASE)                  EndDialog (dlg, TRUE);
192                  agent_del_cache (pwd.keyid);              }
193              if (err) {              return TRUE;
194                  msg_box (dlg, gpgme_strerror (err), _("Sign & Encrypt"), MB_ERR );              
195                  return FALSE;          case IDCANCEL:
196              }              EndDialog (dlg, FALSE);
197              show_msg (dlg, 1500, _("GnuPG Status: Finished"));              return FALSE;
198              EndDialog (dlg, TRUE);          }
199              return TRUE;          break;
200                    }
201          case IDCANCEL:      
202              EndDialog( dlg, FALSE );      return FALSE;
203              return FALSE;  }
         }  
         break;  
     }  
       
     return FALSE;  
 }  

Legend:
Removed from v.25  
changed lines
  Added in v.260

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26