/[winpt]/trunk/Src/wptFileManager.cpp
ViewVC logotype

Diff of /trunk/Src/wptFileManager.cpp

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 28 by twoaday, Thu Oct 20 12:35:59 2005 UTC revision 214 by twoaday, Sun May 14 18:40:36 2006 UTC
# Line 1  Line 1 
1  /* wptFileManager.cpp - File Manager routines  /* wptFileManager.cpp - File Manager routines
2   *      Copyright (C) 2001-2005 Timo Schulz   *      Copyright (C) 2001-2006 Timo Schulz
3   *      Copyright (C) 2005 g10 Code GmbH   *      Copyright (C) 2005 g10 Code GmbH
4   *   *
5   * This file is part of WinPT.   * This file is part of WinPT.
6   *   *
7   * WinPT is free software; you can redistribute it and/or   * WinPT is free software; you can redistribute it and/or
8   * modify it under the terms of the GNU General Public License   * modify it under the terms of the GNU General Public License
9   * as published by the Free Software Foundation; either version 2   * as published by the Free Software Foundation; either version 2
10   * of the License, or (at your option) any later version.   * of the License, or (at your option) any later version.
11   *     *  
12   * WinPT is distributed in the hope that it will be useful,   * WinPT is distributed in the hope that it will be useful,
13   * but WITHOUT ANY WARRANTY; without even the implied warranty of   * but WITHOUT ANY WARRANTY; without even the implied warranty of
14   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15   * General Public License for more details.   * General Public License for more details.
16   *   *
17   * You should have received a copy of the GNU General Public License   * You should have received a copy of the GNU General Public License
18   * along with WinPT; if not, write to the Free Software Foundation,   * along with WinPT; if not, write to the Free Software Foundation,
19   * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA   * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20   */   */
21  /* TODO:  
22   *    check_armor_type: we should check the whole file and not only the first line!  #ifdef HAVE_CONFIG_H
23   */  #include <config.h>
24    #endif
25  #include <sys/types.h>  
26  #include <windows.h>  #include <sys/types.h>
27  #include <commdlg.h>  #include <windows.h>
28  #include <io.h>  #include <commdlg.h>
29    #include <io.h>
30  #include "../resource.h"  #include <stdio.h>
31  #include "wptTypes.h"  
32  #include "wptGPG.h"  #include "resource.h"
33  #include "wptAgent.h"  #include "wptTypes.h"
34  #include "wptCommonCtl.h"  #include "wptGPG.h"
35  #include "wptContext.h"  #include "wptAgent.h"
36  #include "wptErrors.h"  #include "wptCommonCtl.h"
37  #include "wptKeylist.h"  #include "wptContext.h"
38  #include "wptFileManager.h"  #include "wptErrors.h"
39  #include "wptNLS.h"  #include "wptKeylist.h"
40  #include "wptW32API.h"  #include "wptFileManager.h"
41  #include "wptVersion.h"  #include "wptNLS.h"
42  #include "wptDlgs.h"  #include "wptW32API.h"
43  #include "wptGPGZIP.h"  #include "wptVersion.h"
44  #include "wptUTF8.h"  #include "wptDlgs.h"
45  #include "wptRegistry.h"  #include "wptZIP.h"
46  #include "wptImport.h"  #include "wptUTF8.h"
47    #include "wptRegistry.h"
48  #include "openpgp.h"  #include "wptImport.h"
49    #include "wptCrypto.h"
50  void progress_cleanup (progress_filter_s *pfx);  #include "wptKeyManager.h"
51    #include "openpgp.h"
52  char* gpg_keylist_to_pattern (gpgme_key_t *rset, int n);  
53  gpgme_error_t sym_passphrase_cb (void *hook, const char *hint, const char *pass_inf,  
54                                   int prev_was_bad, int fd);  void progress_cleanup (progress_filter_s *pfx);
55    BOOL CALLBACK file_secdel_confirm_dlg_proc (HWND dlg, UINT msg,
56  /*-- wptFileVerifyDlg.cpp --*/                                              WPARAM wparam, LPARAM lparam);
57  int  file_verify_add_state (file_sig_ctx_t c);  char* gpg_keylist_to_pattern (gpgme_key_t *rset, int n);
58  void file_verify_use_event (void);  gpgme_error_t sym_passphrase_cb (void *hook, const char *hint, const char *pass_inf,
59  void file_verify_wait (void);                                   int prev_was_bad, int fd);
60    
61  static const char * mm_files[] = {".mov", ".avi", ".mpg", ".mpeg",  
62                                    ".mp3", ".wav", ".mid", ".wma",  /* Symbolic column IDs. */
63                                    ".gif", ".jpg", ".png", ".jpeg", ".dib", 0};  enum {
64        FM_COL_STAT = 0,
65        FM_COL_NAME = 1,
66  char *      FM_COL_OP   = 2
67  fm_quote_file (const char * name)  };
68  {  
69      char * p;  static const char *mm_files[] = {".mov", ".avi", ".mpg", ".mpeg",
70      size_t len = strlen (name) + 8;                                    ".mp3", ".wav", ".mid", ".wma",
71                                      ".gif", ".jpg", ".png", ".jpeg", ".dib", 0};
72      if (*name == '"')  
73          return m_strdup (name); /* avoid double quotes */  
74      p = new char[len + 1];  /* Check if the drive given by @fname is a floppy disc.
75      if (!p)     Return value: -1 for success. */
76          BUG (0);  static int
77      _snprintf (p, len, "\"%s\"", name);  is_floppy_disc (const char *fname)
78    {
79      return p;      char drv[32] = {0};    
80  } /* fm_quote_file */      int max = sizeof (drv)-1;
81        int i=0;
82    
83  int      if (!strstr (fname, ":\\"))
84  overwrite_file (const char * fname)          return 0;
85  {  
86      int id;      while (fname && *fname && *fname != '\\' && i < max)
87            drv[i++] = *fname++;
88      if (file_exist_check (fname))      drv[i++] = '\\';
89          return -1;      drv[i++] = '\0';
90      id = log_box (_("File Manager"), MB_YESNO,      i = GetDriveType (drv);
91                    _("\"%s\" already exists.\n"      if (i == DRIVE_REMOVABLE)
92                      "Replace existing file?"), fname);          return -1;
93      return id == IDNO ? 0 : -1;      return 0;
94  } /* overwrite_file */  }
95    
96    
97  static void  /* Ask the user to overwrite file @fname.
98  remove_crit_file_attrs (const char * fname, int force)     Return value: 0 for cancel. */
99  {  static int
100      u32 f_attr;  overwrite_file (const char *fname)
101      int id;  {
102        int id;
103      if (file_exist_check (fname))  
104          return; /* Does not exist */      if (file_exist_check (fname))
105                    return -1;
106      f_attr = GetFileAttributes (fname);      id = log_box (_("File Manager"), MB_YESNO,
107      if ((f_attr & FILE_ATTRIBUTE_READONLY) && force)                    _("\"%s\" already exists.\n"
108          SetFileAttributes (fname, FILE_ATTRIBUTE_NORMAL);                      "Replace existing file?"), fname);
109      else if (f_attr & FILE_ATTRIBUTE_READONLY) {      return id == IDNO ? 0 : -1;
110          id = log_box (_("File Manager"), MB_YESNO,            }
111                        _("\"%s\" has read-only attribute.\n"  
112                          "Set attribute to normal?"), fname);  
113          if (id == IDYES)  /* Removes 'critical' attributes from the file @fname.
114              SetFileAttributes (fname, FILE_ATTRIBUTE_NORMAL);     If @force is 1, the user is not asked for permission. */
115      }  void
116  } /* remove_crit_file_attrs */  remove_crit_file_attrs (const char *fname, int force)
117    {
118        DWORD fattr;
119  static int inline      int id = 0;
120  is_directory (const char * fname)  
121  {          if (file_exist_check (fname))
122      return GetFileAttributes (fname) & FILE_ATTRIBUTE_DIRECTORY? 1 : 0;          return; /* Does not exist */
123  } /* is_directory */          
124        fattr = GetFileAttributes (fname);
125        if ((fattr & FILE_ATTRIBUTE_READONLY) && force)
126  static int inline          id = IDYES;
127  is_openpgp_ext (const char * name)      else if (fattr & FILE_ATTRIBUTE_READONLY)
128  {          id = log_box (_("File Manager"), MB_YESNO,          
129      if (strstr (name, ".gpg") || strstr (name, ".asc")                        _("\"%s\" has read-only attribute.\n"
130          || strstr (name, ".sig") || strstr (name, ".pgp"))                          "Set attribute to normal?"), fname);
131          return -1;      if (id == IDYES) {
132      return 0;          if (!SetFileAttributes (fname, FILE_ATTRIBUTE_NORMAL))
133  }              msg_box (NULL, _("Could not reset file attribute to normal."),
134                         _("File Manager"), MB_ERR);
135        }
136  static int  }
137  is_multi_media (const char * name)  
138  {      
139      const char * val;  /* Return 1 if the given path @fname is a directory, 0 otherwise. */
140      char * p;  static int
141      int i;  is_directory (const char *fname)
142      int ans=0;  {
143        return GetFileAttributes (fname) & FILE_ATTRIBUTE_DIRECTORY? 1 : 0;
144      i = get_reg_winpt_single (CFG_NOZIP_MMEDIA);  }
145      if (i == -1)  
146      {  
147          ans = msg_box (NULL, _("Multi-Media files are already compressed, GPG would compress\n"  /* Return -1 if the given name @name is a valid PGP extension. */
148                                 "them anyway and this costs a lot of time.\n"  static int
149                                 "It is possible to disable compression for these files.\n"  is_openpgp_ext (const char *name)
150                                 "Do you want to disable it?"),  {
151                                 _("File Manager"), MB_YESNO|MB_INFO);      if (stristr (name, ".gpg") || stristr (name, ".asc")
152          set_reg_winpt_single (CFG_NOZIP_MMEDIA, ans == IDYES? 1 : 0);          || stristr (name, ".sig") || stristr (name, ".pgp"))
153          if (ans == IDNO)          return -1;
154              return 0;      return 0;
155      }  }
156      else if (i == 0)  
157          return 0;  
158    static int
159      p = strrchr (name, '.');  is_multi_media (const char * name)
160      if (!p)  {    
161          return 0;      const char * val;
162      for (i=0; (val = mm_files[i]); i++)      char * p;
163      {      int i;
164          if (!stricmp (p, val))      int ans=0;
165              return -1;  
166      }      i = get_reg_winpt_single (CFG_NOZIP_MMEDIA);
167      return 0;      if (i == -1)
168  }      {
169            ans = msg_box (NULL, _("Multi-Media files are already compressed, GPG would compress\n"
170                                   "them anyway and this costs a lot of time.\n"
171  const char*                                 "It is possible to disable compression for these files.\n"
172  file_get_extension (gpgme_ctx_t ctx, gpgme_sig_mode_t sigmode)                                 "Do you want to disable it?"),
173  {                                 _("File Manager"), MB_YESNO|MB_INFO);
174      int use_armor = gpgme_get_armor (ctx);          set_reg_winpt_single (CFG_NOZIP_MMEDIA, ans == IDYES? 1 : 0);
175            if (ans == IDNO)
176      if (use_armor || sigmode == GPGME_SIG_MODE_CLEAR)              return 0;
177          return ".asc";      }
178      if (!use_armor && sigmode == GPGME_SIG_MODE_DETACH)      else if (i == 0)
179          return ".sig";          return 0;
180      return ".gpg";  
181  } /* file_get_extension */      p = strrchr (name, '.');
182        if (!p)
183            return 0;
184  int      for (i=0; (val = mm_files[i]); i++) {
185  fm_build( listview_ctrl_t *lv, HWND ctrl )          if (!stricmp (p, val))
186  {              return -1;
187      int i, rc = 0;      }
188      listview_ctrl_t c;      return 0;
189      struct listview_column_s col[] =  }
190      {  
191          {0,  80, (char *)_("Status") },  
192          {1, 256, (char *)_("Name") },  /* Return a GPG file extension which depends on the operation
193          {2, 128, (char *)_("Operation") },     mode in @ctx and the sig mode @sigmode. */
194          {0,   0, NULL }  const char*
195      };  file_get_extension (gpgme_ctx_t ctx, gpgme_sig_mode_t sigmode)
196            {
197      rc = listview_new( &c );      int use_armor = gpgme_get_armor (ctx);
198      if( rc )  
199          BUG( NULL );      if (use_armor || sigmode == GPGME_SIG_MODE_CLEAR)
200      c->ctrl = ctrl;          return ".asc";
201      for ( i = 0; col[i].width; i++ )      if (!use_armor && sigmode == GPGME_SIG_MODE_DETACH)
202          listview_add_column( c, &col[i] );          return ".sig";
203      listview_set_ext_style( c );      return ".gpg";
204      if( lv )  }
205          *lv = c;  
206      return 0;  
207  } /* fm_build */  /* Quote a file to avoid shell problems with spaces in the files. */
208    char*
209    fm_quote_file (const char * name)
210  void  {
211  fm_delete( listview_ctrl_t lv )      char * p;
212  {      size_t len = strlen (name) + 8;
213      if( lv ) {  
214          listview_release( lv );      if (*name == '"')
215      }          return m_strdup (name); /* avoid double quotes */
216  } /* fm_delete */      p = new char[len + 1];
217        if (!p)
218            BUG (0);
219  int      _snprintf (p, len, "\"%s\"", name);
220  fm_state_new (fm_state_t * ctx)  
221  {      return p;
222      gpgme_error_t rc;  }
223      fm_state_s * c;  
224    
225      c = new fm_state_s;  
226      if (!c)  /* Check the armor type of the file @fname and return
227          BUG (0);     a string representation of it. */
228      memset (c, 0, sizeof * c);  static const char*
229      rc = gpgme_new (&c->ctx);  fm_check_armor_type (const char *fname, int *r_type)
230      if (rc)  {
231          BUG (0);      FILE *fp;
232      /* XXX rc = gpgme_recipients_new (&c->recp);*/      char header[768], *p;
233      /* XXX gpgme_set_comment (c->ctx, "Generated by WinPT "PGM_VERSION); */      
234      *ctx = c;      if (r_type)
235      return 0;          *r_type = PGP_NONE;
236  } /* fm_state_new */      fp = fopen (fname, "rb");
237        if (!fp)
238            return "UNKNOWN";
239  /* Release the FM state handle @c. */      p = fgets (header, sizeof (header) - 1, fp);
240  void      fclose (fp);
241  fm_state_release (fm_state_t c)      if (!p)
242  {          return "UNKNOWN";
243      if (!c)  
244          return;      if (strncmp (header, "-----", 5))
245      if (c->recp)          goto leave;
246          free (c->recp);      if (strstr( header, "BEGIN PGP PUBLIC KEY" )) {
247      if (c->ctx) {          if (r_type) *r_type = PGP_PUBKEY;
248          gpgme_release (c->ctx);          return "PUBKEY";
249          c->ctx = NULL;        }
250      }      else if (strstr (header, "BEGIN PGP PRIVATE KEY") ||
251      free_if_alloc (c->opaque);               strstr (header, "BEGIN PGP SECRET KEY")) {
252      free_if_alloc (c->output);          if (r_type) *r_type = PGP_SECKEY;
253      delete c; c = NULL;              return "SECKEY";
254  }      }
255        else if (strstr (header, "BEGIN PGP MESSAGE")) {
256  static int          if (r_type) *r_type = PGP_MESSAGE;
257  fm_check_for_entry( listview_ctrl_t lv, const char *file )          return "ENCRYPTED";
258  {      }
259      char name[512];      else if (strstr( header, "BEGIN PGP SIGNED MESSAGE")) {
260      int i;          if (r_type) *r_type = PGP_CLEARSIG;
261            return "SIGNED-CLEAR";
262      memset (name, 0, sizeof (name));      }
263      for( i = 0; i < listview_count_items( lv, 0 ); i++ )      else if (strstr(header, "BEGIN PGP SIGNATURE")) {
264      {          if (r_type) *r_type = PGP_SIG;
265          listview_get_item_text( lv, i, 1, name, sizeof (name) - 1 );          return "SIGNED-DETACH";
266          if( !strcmp( name, file ) )      }
267              return 1; /* found */        
268      }  leave:
269        return "UNKNOWN";
270      return 0;  }
271  } /* fm_check_for_entry */  
272    
273    /* Extract file type from @fname. If @r_type is valid,
274  static int     it contains the PGP type on success. */
275  fm_set_ftype (listview_ctrl_t lv, const char * name)  static const char*
276  {  fm_get_file_type (const char *fname, int *r_type)
277      const char *type;  {        
278      int rc;      gpg_iobuf_t inp;
279        armor_filter_context_t afx;
280      rc = fm_check_for_entry (lv, name);      PACKET *pkt;
281      if (rc)      const char *s = NULL;
282          return 0;      size_t count = 0, compr = 0;
283      type = fm_get_file_type (name);      int rc = 0;
284      if (!type || !strcmp (type, "UNKNOWN"))  
285          type = gnupg_check_file_ext (name);          if (r_type)
286      rc = listview_add_item (lv, " ");          *r_type = PGP_NONE;
287      if (rc)      if (!fname) {
288          return -1;          log_debug ("fm_get_file_type: !fname\r\n");
289      listview_add_sub_item (lv, 0, 0, type);          return NULL;
290      listview_add_sub_item (lv, 0, 1, name);      }
291      return 0;  
292  }      if (is_floppy_disc (fname))
293            return fm_check_armor_type (fname, r_type);
294    
295  static int      inp = gpg_iobuf_open (fname);
296  fm_add_dir_files (listview_ctrl_t lv, char *path)      if (!inp) {
297  {          const char *err = winpt_strerror (WPTERR_FILE_OPEN);
298      struct _finddata_t fd;          log_box (_("File Manager"), MB_ERR, "\"%s\": %s", fname, err);
299      char * p;          return NULL;
300      long hd;      }
301        gpg_iobuf_ioctl (inp, 3, 1, NULL); /* disable cache */
302      strcat (path, "\\*");      if (gpg_iobuf_get_filelength (inp) > 32000000 /* 32MB */
303      hd = _findfirst (path, &fd);          && !is_openpgp_ext (fname)) {
304      do {          gpg_iobuf_close (inp);
305          p = new char [(strlen (path) + strlen (fd.name))+1];          return "UNKNOWN";
306          if (!p)      }
307              BUG (0);  
308          memcpy (p, path, strlen (path)-1);      if (gpg_use_armor_filter(inp)) {
309          p[strlen (path)-1] = 0;          memset (&afx, 0, sizeof (afx));
310          strcat (p, fd.name);          gpg_iobuf_push_filter (inp, gpg_armor_filter, &afx);
311          if (!is_directory (p))      }
312              fm_set_ftype (lv, p);      pkt = (PACKET *)calloc (1, sizeof *pkt);
313          free_if_alloc (p);      if (!pkt)
314                    BUG (NULL);
315      } while (_findnext (hd, &fd) == 0);      gpg_init_packet (pkt);
316      _findclose (hd);      while (!(rc = gpg_parse_packet (inp, pkt))) {
317      return 0;          switch (pkt->pkttype) {
318  }          case PKT_PUBKEY_ENC:
319                s = "ENCRYPTED";rc = -2;
320                if (r_type) *r_type = PGP_MESSAGE;
321  /* Add the drag & drop files from @dd_files to the              break;
322     list view control @lv. */          case PKT_SYMKEY_ENC:
323  int          case PKT_ENCRYPTED:
324  fm_add_dropped_files (listview_ctrl_t lv, HDROP dd_files)              s = "SYMKEYENC";rc = -2;
325  {              if (r_type) *r_type = PGP_MESSAGE;
326      char name[384+4];              break;
327      int nfiles, rc, i;          case PKT_SIGNATURE:
328                case PKT_ONEPASS_SIG:
329      memset (name, 0, sizeof (name));              s = "SIGNED";   rc = -2;
330      nfiles = DragQueryFile (dd_files, 0xFFFFFFFF, NULL, 0);              if (r_type) *r_type = PGP_SIG;
331      for (i = 0;  i < nfiles; i++) {              break;
332          DragQueryFile (dd_files, i, name, sizeof (name) -1);          case PKT_PUBLIC_KEY:
333          if (is_directory (name))              s = "PUBKEY";   rc = -2;
334              rc = fm_add_dir_files (lv, name);              if (r_type) *r_type = PGP_PUBKEY;
335          else              break;
336              rc = fm_set_ftype (lv, name);          case PKT_SECRET_KEY:
337          if (rc == -1)              s = "SECKEY";   rc = -2;
338              break;              if (r_type) *r_type = PGP_SECKEY;
339      }              break;
340      return rc;  
341  }          case PKT_COMPRESSED:
342                /* If we only find 1 packet and it is compressed,
343                   we assume a compress one-pass signature. */
344  int              if (count != 0)
345  fm_add_opened_files (listview_ctrl_t lv, HWND dlg)                  break;
346  {              s = "SIGNED";   rc = -2;
347      OPENFILENAME open;              compr = 1;
348      const char *type;                break;
349      char file[1024] = "";  
350      int rc;          default:
351                    break;
352      memset( &open, 0, sizeof (open) );          }
353      open.lStructSize = sizeof (OPENFILENAME);          count++;
354      open.hInstance = glob_hinst;          gpg_free_packet (pkt);
355      open.lpstrTitle = _("File Open");          gpg_init_packet (pkt);
356      open.lpstrFilter = _("All Files (*.*)\0*.*\0\0");          if (rc == -2)
357      open.hwndOwner = dlg;              break; /* found */
358      open.lpstrFile = file;      }
359      open.nMaxFile = sizeof (file) - 1;      safe_free (pkt);
360      open.Flags = 0;      gpg_iobuf_close (inp);
361            if (!s)
362      if (GetOpenFileName (&open)) {          s = fm_check_armor_type (fname, r_type);
363          type = fm_get_file_type (open.lpstrFile);      if (!s)
364          if (!type)          s = "UNKNOWN";
365              return WPTERR_FILE_OPEN;      if (!strcmp (s, "SIGNED") && !compr
366          if (!strcmp (type, "UNKNOWN"))          && strcmp (fm_check_armor_type (fname, r_type), "SIGNED-CLEAR ")) {
367              type = gnupg_check_file_ext (open.lpstrFile);          if (r_type) *r_type = PGP_SIG;
368          rc = listview_add_item (lv, "");          s = "SIGNED-DETACH";
369          if( !rc ) {      }
370              listview_add_sub_item (lv, 0, 0, type);      return s;
371              listview_add_sub_item (lv, 0, 1, open.lpstrFile);  }
372          }  
373      }  
374        /* Build the File Manager list view control. */
375      return rc;  int
376  }  fm_build (listview_ctrl_t *lv, HWND ctrl)
377    {
378        int i;
379  /* Check the armor type of the file @fname and return      listview_ctrl_t c;
380     a string representation of it. */      struct listview_column_s col[] = {
381  static const char *          {0,  80, (char *)_("Status") },
382  fm_check_armor_type (const char *fname)          {1, 256, (char *)_("Name") },
383  {          {2, 128, (char *)_("Operation") },
384      FILE * fp;          {0,   0, NULL}  
385      char header[768], * p;      };
386                
387      fp = fopen (fname, "rb");      listview_new (&c, ctrl);
388      if (!fp)      for (i = 0; col[i].width; i++)
389          return "UNKNOWN";          listview_add_column (c, &col[i]);
390      p = fgets (header, sizeof (header) - 1, fp);      listview_set_ext_style (c);
391      fclose (fp);      if (lv)
392      if (!p)          *lv = c;
393          return "UNKNOWN";      return 0;
394    }
395      if( strncmp( header, "-----", 5 ) )  
396          goto leave;  
397      if( strstr( header, "BEGIN PGP PUBLIC KEY" ) )  /* Release the File Manager listview control. */
398          return "PUBKEY";  void
399      else if( strstr( header, "BEGIN PGP PRIVATE KEY" ) )  fm_delete (listview_ctrl_t lv)
400          return "SECKEY";  {
401      else if( strstr( header, "BEGIN PGP SECRET KEY" ) )      if (lv) {
402          return "SECKEY";          listview_release(lv);  
403      else if( strstr( header, "BEGIN PGP MESSAGE" ) )      }
404          return "ENCRYPTED";  }
405      else if( strstr( header, "BEGIN PGP SIGNED MESSAGE" ) )  
406          return "SIGNED-CLEAR";  
407      else if( strstr(header, "BEGIN PGP SIGNATURE" ) )  int
408          return "SIGNED-DETACH";  fm_state_new (fm_state_t * ctx)
409    {
410  leave:      fm_state_s *c;
411      return "UNKNOWN";  
412  }      c = new fm_state_s;
413        if (!c)
414            BUG (0);
415  int      memset (c, 0, sizeof *c);
416  fm_assume_onepass_sig (const char * fname)      if (gpgme_new (&c->ctx))
417  {          BUG (0);
418      gpgme_data_t dat;      *ctx = c;
419      armor_filter_context_t afx;      return 0;
420      gpg_iobuf_t fp;  }
421      PACKET * pkt = (PACKET *)calloc (1, sizeof *pkt);  
422      int check = 0;  
423    /* Release the FM state handle @c. */
424      if (!fname)  void
425      {  fm_state_release (fm_state_t c)
426          gpg_data_new_from_clipboard (&dat, 0);  {
427          gpg_data_release_and_set_file (dat, "gpgme.tmp");      if (!c)
428            return;
429          fp = gpg_iobuf_open ("gpgme.tmp");      if (c->ctx) {
430          if (!fp)          gpgme_release (c->ctx);
431              return 0;          c->ctx = NULL;  
432          gpg_iobuf_ioctl (fp, 3, 1, NULL);      }
433          if (gpg_use_armor_filter(fp))      safe_free (c->recp);
434          {      free_if_alloc (c->opaque);
435              memset (&afx, 0, sizeof (afx));      free_if_alloc (c->output);
436              gpg_iobuf_push_filter (fp, gpg_armor_filter, &afx);      delete c;
437          }  }
438          gpg_init_packet (pkt);  
439          if (!gpg_parse_packet (fp, pkt)  
440              && pkt->pkttype == PKT_COMPRESSED)  static int
441              check = 1;    fm_check_for_entry( listview_ctrl_t lv, const char *file )
442          gpg_free_packet (pkt);  {
443          safe_free (pkt);      char name[512];
444          gpg_iobuf_close (fp);      int i;
445          unlink ("gpgme.tmp");  
446      }      memset (name, 0, sizeof (name));
447      /* XXX: implement it for real files */      for (i = 0; i < listview_count_items( lv, 0 ); i++) {
448      return check;          listview_get_item_text( lv, i, 1, name, sizeof (name) - 1 );
449  }          if( !strcmp( name, file ) )
450                return 1; /* found */      
451        }
452  static int  
453  is_floppy_disc (const char * fname)      return 0;
454  {  }
455      char drv[32] = {0};  
456      int i=0;  
457    static int
458      if (!strstr (fname, ":\\"))  fm_set_ftype (listview_ctrl_t lv, const char *name)
459          return 0;  {
460        const char *type;
461      while (fname && *fname && *fname != '\\')      int rc;
462          drv[i++] = *fname++;  
463      drv[i++] = '\\';      rc = fm_check_for_entry (lv, name);
464      drv[i++] = '\0';      if (rc)
465      i = GetDriveType (drv);          return 0;
466      if (i == DRIVE_REMOVABLE)      type = fm_get_file_type (name, NULL);
467          return -1;      if (!type || !strcmp (type, "UNKNOWN"))
468      return 0;          type = gnupg_check_file_ext (name, NULL);
469  }      rc = listview_add_item (lv, " ");
470        if (rc)
471            return -1;
472  const char *      listview_add_sub_item (lv, 0, 0, type);
473  fm_get_file_type (const char * fname)      listview_add_sub_item (lv, 0, 1, name);
474  {              return 0;
475      gpg_iobuf_t inp;  }
476      armor_filter_context_t afx;  
477      PACKET * pkt = (PACKET *)calloc (1, sizeof *pkt);  
478      int i = 0, rc = 0;  /* Add all files from the directory @path to the list view @lv. */
479      const char * s = NULL;  static int
480    fm_add_dir_files (listview_ctrl_t lv, char *path)
481      if (!fname) {  {
482          safe_free (pkt);      struct _finddata_t fd;
483          return NULL;      char * p;
484      }      long hd;
485    
486      if (is_floppy_disc (fname))      strcat (path, "\\*");
487          return fm_check_armor_type (fname);      hd = _findfirst (path, &fd);
488        do {
489      inp = gpg_iobuf_open (fname);          p = new char [(strlen (path) + strlen (fd.name))+1];
490      if (!inp) {          if (!p)
491          const char *s = winpt_strerror (WPTERR_FILE_OPEN);              BUG (0);
492          log_box( _("File Manager"), MB_ERR, "\"%s\": %s", fname, s );          memcpy (p, path, strlen (path)-1);
493          safe_free( pkt );          p[strlen (path)-1] = 0;
494          return NULL;          strcat (p, fd.name);
495      }          if (!is_directory (p))
496      gpg_iobuf_ioctl (inp, 3, 1, NULL); /* disable cache */              fm_set_ftype (lv, p);
497      if (gpg_iobuf_get_filelength (inp) > 32000000 /* 32MB */          free_if_alloc (p);
498          && !is_openpgp_ext (fname)) {      } while (_findnext (hd, &fd) == 0);
499          gpg_iobuf_close (inp);      _findclose (hd);
500          return "UNKNOWN";      return 0;
501      }  }
502    
503      if (gpg_use_armor_filter(inp)) {  
504          memset (&afx, 0, sizeof (afx));  /* Add the drag & drop files from @dd_files to the
505          gpg_iobuf_push_filter (inp, gpg_armor_filter, &afx);     list view control @lv. */
506      }  int
507        fm_add_dropped_files (listview_ctrl_t lv, HDROP dd_files)
508      gpg_init_packet (pkt);  {
509      while (!(rc = gpg_parse_packet (inp, pkt))) {      char name[384+4];
510          switch (pkt->pkttype) {      int nfiles;
511          case PKT_PUBKEY_ENC:  s = "ENCRYPTED";rc = -2; break;      int rc = 0;
512          case PKT_SYMKEY_ENC:      int i;
513          case PKT_ENCRYPTED:   s = "SYMKEYENC";rc = -2; break;      
514          case PKT_SIGNATURE:      memset (name, 0, sizeof (name));
515          case PKT_ONEPASS_SIG: s = "SIGNED";   rc = -2; break;      nfiles = DragQueryFile (dd_files, 0xFFFFFFFF, NULL, 0);
516          case PKT_PUBLIC_KEY:  s = "PUBKEY";   rc = -2; break;      for (i = 0;  i < nfiles; i++) {
517          case PKT_SECRET_KEY:  s = "SECKEY";   rc = -2; break;          DragQueryFile (dd_files, i, name, sizeof (name) -1);
518          }          if (is_directory (name))
519          gpg_free_packet (pkt);              rc = fm_add_dir_files (lv, name);
520          gpg_init_packet (pkt);          else
521          if (rc == -2)              rc = fm_set_ftype (lv, name);
522              break; /* found */          if (rc == -1)
523      }              break; /* XXX: fixme? */
524      safe_free (pkt);      }
525      gpg_iobuf_close (inp);      DragFinish (dd_files);
526      if (!s)      return rc;
527          s = fm_check_armor_type (fname);  }
528      if (!s)  
529          s = "UNKNOWN";  
530      if (!strcmp( s, "SIGNED")  /* Add a single file @name to the list view and before
531          && strcmp (fm_check_armor_type (fname), "SIGNED-CLEAR "))     figure out the type of it.
532          s = "SIGNED-DETACH";     Return value: 0 on success. */
533      return s;  static int
534  } /* fm_get_file_type */  add_single_file (listview_ctrl_t lv, const char *name)
535    {
536        const char *type;
537  int      int rc = 0;
538  fm_get_current_pos (listview_ctrl_t lv)  
539  {      type = fm_get_file_type (name, NULL);
540      int i = 0, items;      if (!type)
541            return WPTERR_FILE_OPEN;
542      items = listview_count_items (lv, 0);      if (!strcmp (type, "UNKNOWN"))      
543      if (!items)          type = gnupg_check_file_ext (name, NULL);
544          return -1;      rc = listview_add_item (lv, "");
545      else if (items == 1)      if (!rc) {
546      {          listview_add_sub_item (lv, 0, 0, type);
547          listview_select_one (lv, 0);          listview_add_sub_item (lv, 0, 1, name);
548          return 0;      }
549      }      return rc;
550      else if (items > 1)  }
551      {  
552          i = listview_get_curr_pos (lv);  
553          if (i == -1)  /* Use the common Open-File-Dialog to allow the user to
554          {     add one ore more selected files to the listview @lv. */
555              msg_box (lv->ctrl, _("Please select a file."), _("File Manager"), MB_ERR);  int
556              return -1;  fm_add_opened_files (listview_ctrl_t lv, HWND dlg)
557          }  {
558          return i;      OPENFILENAME open;
559      }      char file[512], name[MAX_PATH+1];
560        char *path = NULL;
561      return -1;      const char *s;
562  } /* fm_get_current_pos */      int i, len=0, n=0;
563        int rc=0;
564    
565  static int      memset (&open, 0, sizeof (open));
566  fm_check_detached_sig( listview_ctrl_t lv, int pos )      open.lStructSize = sizeof (OPENFILENAME);
567  {      open.hInstance = glob_hinst;
568      char type[128];      open.lpstrTitle = _("File Open");
569        open.lpstrFilter = "All Files (*.*)\0*.*\0\0";
570      listview_get_item_text( lv, pos, 0, type, 127 );      open.hwndOwner = dlg;
571      return !strcmp( type, "SIGNED-DETACH" )? 1 : 0;      open.lpstrFile = file;
572  } /* fm_check_detached_sig */      open.nMaxFile = sizeof (file) - 1;
573        open.Flags = OFN_ALLOWMULTISELECT|OFN_EXPLORER ;
574        
575  int      memset (file, 0, sizeof file);
576  fm_check_file_type (listview_ctrl_t lv, int pos, int fm_cmd)      if (!GetOpenFileName (&open))
577  {          return 0;
578      char status[128];  
579      int rc = 0;      s = file;
580            len = sizeof (file)-1;
581      listview_get_item_text (lv, pos, 0, status, sizeof (status) - 1);      for (;;) {
582                if (len < 2 || (*s == '\0' && *(s+1) == '\0'))
583      switch (fm_cmd) {              break;
584      case FM_ENCRYPT:          memset (name, 0, sizeof (name));
585      case FM_ENCRYPT_DIR:          for (i=0; len > 0; len--, i++) {
586      case FM_SIGNENCRYPT:                if (*s == '\0') {
587          if (strcmp (status, "ENCRYPTED")                  name[i] = *s++;
588              && strcmp (status, "SYMKEYENC"))                  break;
589              rc = 1;              }
590          break;              name[i] = *s++;
591                    }
592      case FM_DECRYPT:          if (n == 0)
593          if (!strcmp (status, "DATA")              path = strdup (name);
594              || !strcmp (status, "ENCRYPTED")          else {
595              || !strcmp (status, "SYMKEYENC")              char *p = make_filename (path, name, NULL);
596              || !strcmp (status, "ARMORED"))              rc = add_single_file (lv, p);
597              rc = 1;              safe_free (p);
598          break;          }
599                    n++;
600      case FM_SIGN:      }
601          if( strncmp( status, "SIGNED", 6 ) )      if (n == 1) /* single file selected. */
602              rc = 1;          rc = add_single_file (lv, path);
603          break;      safe_free (path);
604                return rc;
605      case FM_VERIFY:  }
606          if( !strncmp( status, "SIGNED", 6 )  
607               || !strcmp( status, "COMPRESSED" ) )  
608              rc = 1;  int
609          break;  fm_assume_onepass_sig (const char *fname)
610            {    
611      case FM_SYMENC:      armor_filter_context_t afx;
612          if( strcmp( status, "SYMKEYENC" ) )      gpg_iobuf_t fp;
613              rc = 1;      gpgme_data_t dat;
614          break;      PACKET *pkt;
615                char tmpfile[MAX_PATH+1];
616      case FM_IMPORT:      int check = 0;
617          if( !strcmp( status, "PUBKEY" )  
618              || !strcmp( status, "SECKEY" ) )      pkt = (PACKET *)calloc (1, sizeof *pkt);
619              rc = 1;      if (!fname) {
620          break;          get_temp_name (tmpfile, sizeof (tmpfile)-1, "gpgme.tmp");
621                    gpg_data_new_from_clipboard (&dat, 0);
622      case FM_WIPE:          gpg_data_release_and_set_file (dat, tmpfile);
623      case FM_LIST:  
624          rc = 1;          fp = gpg_iobuf_open (tmpfile);
625          break;            if (!fp)
626      }              return 0;
627                gpg_iobuf_ioctl (fp, 3, 1, NULL);
628      return rc;          if (gpg_use_armor_filter(fp)) {
629  } /* fm_check_file_type */              memset (&afx, 0, sizeof (afx));
630                gpg_iobuf_push_filter (fp, gpg_armor_filter, &afx);
631            }
632  static void          gpg_init_packet (pkt);
633  fm_set_status (listview_ctrl_t lv, int pos, int fm_cmd, int success,          if (!gpg_parse_packet (fp, pkt)
634                 const char * output)              && pkt->pkttype == PKT_COMPRESSED)
635  {              check = 1;  
636      char status[128], operat[128];          gpg_free_packet (pkt);
637      int update = 1;          gpg_iobuf_close (fp);
638      const char *s;          remove (tmpfile);
639        }
640      if ( fm_cmd == FM_LIST )      /* XXX: implement it for real files */
641          return;      safe_free (pkt);
642      success ? s = "SUCCESS" : s = "FAILED";      return check;
643      strcpy( operat, s );  }
644    
645      switch (fm_cmd) {  
646      case FM_ENCRYPT:  int
647      case FM_ENCRYPT_DIR:  fm_get_current_pos (listview_ctrl_t lv)
648      case FM_SIGNENCRYPT: strcpy( status, "ENCRYPTED" ); break;  {
649      case FM_DECRYPT:     strcpy( status, "UNKNOWN" );   break;      int i = 0, items;
650      case FM_SIGN:        strcpy( status, "SIGNED" );    break;  
651      case FM_VERIFY:      update = 0;                    break;      items = listview_count_items (lv, 0);
652      case FM_SYMENC:      strcpy( status, "SYMKEYENC" ); break;      if (!items)
653      case FM_IMPORT:      update = 0;                    break;          return -1;
654      case FM_WIPE:        strcpy( status, "WIPED" );     break;      else if (items == 1) {
655      default:             strcpy( status, "UNKNOWN");    break;          listview_select_one (lv, 0);
656      }          return 0;
657        }
658      if (success) {      else if (items > 1) {
659          if (update) {          i = listview_get_curr_pos (lv);
660              listview_add_sub_item (lv, pos, 0, status);          if (i == -1) {
661              listview_add_sub_item (lv, pos, 1, output);              msg_box (lv->ctrl, _("Please select a file."),
662          }                       _("File Manager"), MB_ERR);
663      }              return -1;
664      listview_add_sub_item( lv, pos, 2, operat );          }
665  } /* fm_set_status */          return i;
666        }
667    
668  int      return -1;
669  fm_clearsign_8bit (listview_ctrl_t lv, fm_state_s *ctx)  }
670  {  
671      FILE *f;  
672      byte buf[32];  static int
673      char name[256];  fm_check_detached_sig (listview_ctrl_t lv, int pos)
674      int i, n, cnt=0;  {
675        char type[128];
676      if (ctx->sigmode != GPGME_SIG_MODE_CLEAR)  
677          return 0;      listview_get_item_text (lv, pos, 0, type, sizeof (type)-1);
678      listview_get_item_text (lv, -1, 1, name, sizeof (name)-1);      return !strcmp (type, "SIGNED-DETACH")? 1 : 0;
679      if (stristr (name, ".TXT"))  }
680          return 0;  
681      f = fopen (name, "rb");  
682      if (!f)  int
683          return -1; /* should never happen */  fm_check_file_type (listview_ctrl_t lv, int pos, int fm_cmd)
684      n = fread (buf, 1, 32, f);  {
685      for (i = 0; i < n; i++) {      char status[128];
686          if (buf[i] == 0x00 || buf[i] > 170)      int rc = 0;
687              cnt++;      
688      }      listview_get_item_text (lv, pos, 0, status, sizeof (status) - 1);
689      fclose (f);      
690      if (!cnt)      switch (fm_cmd) {
691          return 0;      case FM_ENCRYPT:
692      n = -1;      case FM_ENCRYPT_DIR:
693      i = log_box (_("File Manager"), MB_WARN|MB_YESNO,      case FM_SIGNENCRYPT:  
694                   _("\"%s\" does not seems to be a text file.\n"          if (strcmp (status, "ENCRYPTED")
695                     "Do you really want to clearsign it?"), name);              && strcmp (status, "SYMKEYENC"))
696      if (i == IDYES)              rc = 1;
697          n = 0;          break;
698      return n;          
699  }      case FM_DECRYPT:
700            if (!strcmp (status, "DATA")
701  int              || !strcmp (status, "ENCRYPTED")
702  fm_parse_files (listview_ctrl_t lv, HWND dlg, int cmd)              || !strcmp (status, "SYMKEYENC")
703  {              || !strcmp (status, "ARMORED"))
704      struct secdel_confirm_s confirm = {0};              rc = 1;
705      struct progress_filter_s pfx, pfx2;          break;
706      fm_state_s * ctx;          
707      int fm_cmd, sig_detached = 0;      case FM_SIGN:
708      int rc = 0, i, n, ndel = 0;          if( strncmp( status, "SIGNED", 6 ) )
709      char fname[512], status[128];              rc = 1;
710                break;
711      switch (cmd) {          
712      case ID_FILEMISC_ENCRYPT: fm_cmd = FM_ENCRYPT; break;      case FM_VERIFY:
713      case ID_FILEMISC_DECRYPT: fm_cmd = FM_DECRYPT; break;          if( !strncmp( status, "SIGNED", 6 )
714      case ID_FILEMISC_SYMENC:  fm_cmd = FM_SYMENC;  break;               || !strcmp( status, "COMPRESSED" ) )
715      case ID_FILEMISC_SIGN:    fm_cmd = FM_SIGN;    break;                  rc = 1;
716      case ID_FILEMISC_VERIFY:  fm_cmd = FM_VERIFY;  break;          break;
717      case ID_FILEMISC_IMPORT:  fm_cmd = FM_IMPORT;  break;          
718      case ID_FILEMISC_WIPE:    fm_cmd = FM_WIPE;    break;      case FM_SYMENC:
719      case ID_FILEMISC_LIST:    fm_cmd = FM_LIST;    break;          if( strcmp( status, "SYMKEYENC" ) )
720      case ID_FILEMISC_SIGNENC: fm_cmd = FM_SIGNENCRYPT; break;              rc = 1;
721      default: return 1; /* unknown command */          break;
722      }          
723            case FM_IMPORT:
724      if (fm_get_current_pos (lv) == -1)          if( !strcmp( status, "PUBKEY" )
725          return WPTERR_GENERAL;                  || !strcmp( status, "SECKEY" ) )
726      rc = fm_state_new (&ctx);              rc = 1;
727      if (rc)          break;
728          BUG (0);          
729      ctx->dlg = dlg;      case FM_WIPE:
730        case FM_LIST:
731      // XXX: for file operations the progress dialog will be          rc = 1;
732      //       reloaded somewhere and thus a 'dummy' dialog remains          break;  
733        }
734      /* we use it here to make sure that pfx_cleanup will not use      
735         any weird values. */      return rc;
736      memset (&pfx, 0, sizeof (pfx));  }
737      ctx->prog_cb = NULL;  
738      if (cmd != FM_VERIFY && cmd != FM_SIGN /*&& reg_prefs.fm.progress > 0*/) {  
739          pfx.hwnd = dlg;  /* Set the file status of the given command @fm_cmd.
740          /*gpgme_set_progress_cb (ctx->ctx, progress_callback, &pfx);*/     @success is 0 on success. */
741          /*ctx->prog_cb = &pfx;*/  static void
742      }  fm_set_status (listview_ctrl_t lv, int pos, int fm_cmd,
743                       gpgme_sig_mode_t sigmode, int success, const char *output)
744      /* Commands we need before we can perform the main command */  {
745      switch (fm_cmd) {      char status[128], operat[128];
746      case FM_ENCRYPT:      int update = 1;
747      case FM_SIGNENCRYPT:      const char *s;
748          if (fm_cmd == FM_SIGNENCRYPT)  
749              ctx->req_signer = 1;      if (fm_cmd == FM_LIST)
750          DialogBoxParam (glob_hinst, (LPCTSTR)IDD_WINPT_FILE_ENCRYPT, ctx->dlg,          return;
751                          file_encrypt_dlg_proc, (LPARAM)ctx);      success ? s = "SUCCESS" : s = "FAILED";
752          if (ctx->cancel == 1) {      strcpy (operat, s);
753              rc = WPTERR_GENERAL;  
754              goto leave;      switch (fm_cmd) {
755          }      case FM_ENCRYPT:
756          break;      case FM_ENCRYPT_DIR:
757                case FM_SIGNENCRYPT: strcpy (status, "ENCRYPTED"); break;
758      case FM_SIGN:      case FM_DECRYPT:     strcpy (status, "UNKNOWN");   break;
759          DialogBoxParam (glob_hinst, (LPCSTR)IDD_WINPT_FILE_SIGN, dlg,      case FM_SIGN:
760                          file_sign_dlg_proc, (LPARAM) ctx);          if (sigmode == GPGME_SIG_MODE_DETACH)
761          if (ctx->cancel == 1 || fm_clearsign_8bit (lv, ctx)) {              strcpy (status, "SIGNED-DETACH");
762              rc = WPTERR_GENERAL;          else if (sigmode == GPGME_SIG_MODE_CLEAR)
763              goto leave;              strcpy (status, "SIGNED-CLEAR");
764          }          else
765          break;              strcpy (status, "SIGNED");
766            break;
767      case FM_WIPE:      case FM_VERIFY:      update = 0;                    break;
768          memset (&pfx2, 0, sizeof (pfx2));      case FM_SYMENC:      strcpy (status, "SYMKEYENC"); break;
769          secure_unlink_set_cb (progress_callback, &pfx2);      case FM_IMPORT:      update = 0;                    break;
770          break;      case FM_WIPE:        strcpy (status, "WIPED");     break;
771      }      default:             strcpy (status, "UNKNOWN");    break;
772            }
773      for( i = 0, n = 0;  i < listview_count_items( lv, 0 ); i++ ) {  
774          if( !listview_get_item_state( lv, i ) )      if (success && update) {
775              continue;          listview_add_sub_item (lv, pos, 0, status);
776          listview_get_item_text( lv, i, 0, status, sizeof (status) -1 );          listview_add_sub_item (lv, pos, 1, output);
777          if (!strcmp( status, "ENCRYPTED" ) && fm_cmd == FM_DECRYPT)      }
778              n++;      listview_add_sub_item( lv, pos, 2, operat );
779          if (!strcmp( status, "UNKNOWN" ) && fm_cmd == FM_SIGN)  }
780              n++;  
781          if (fm_cmd == FM_WIPE)  
782              ndel++;  int
783      }  fm_clearsign_8bit (listview_ctrl_t lv, fm_state_s *ctx)
784        {
785      if (n > 1 && fm_cmd != FM_SYMENC)      FILE *f;
786          ctx->cache_cb = 1;      byte buf[32];
787        char name[256];
788      if (fm_cmd == FM_WIPE && ndel > 0) {      int i, n, cnt=0;
789          memset (&confirm, 0, sizeof confirm);  
790          confirm.lv_files = lv;      if (ctx->sigmode != GPGME_SIG_MODE_CLEAR)
791          DialogBoxParam (glob_hinst, (LPCTSTR)IDD_WINPT_FILES_SECDEL, ctx->dlg,          return 0;
792                              file_secdel_confirm_dlg_proc, (LPARAM)&confirm);      listview_get_item_text (lv, -1, 1, name, sizeof (name)-1);
793          if (!confirm.yes)      if (stristr (name, ".TXT"))
794              goto leave;          return 0;
795      }      f = fopen (name, "rb");
796            if (!f)
797      for( i = 0; i < listview_count_items( lv, 0 ); i++ ) {          return -1; /* should never happen */
798          if( !listview_get_item_state( lv, i ) )      n = fread (buf, 1, 32, f);
799              continue;      for (i = 0; i < n; i++) {
800          listview_get_item_text( lv, i, 1, fname, sizeof (fname) - 1 );          if (buf[i] == 0x00 || buf[i] > 170)
801          if( file_exist_check( fname ) && !is_directory( fname ) ) {              cnt++;
802              log_box( _("File Manager"), MB_ERR, _("\"%s\" does not exist"), fname );      }
803              continue;      fclose (f);
804          }      if (!cnt)
805          if( is_directory( fname ) )          return 0;
806              fm_cmd = FM_ENCRYPT_DIR;              n = -1;
807          if( !fm_check_file_type( lv, i, fm_cmd ) )      i = log_box (_("File Manager"), MB_WARN|MB_YESNO,
808              continue;                   _("\"%s\" does not seems to be a text file.\n"
809          sig_detached = fm_check_detached_sig( lv, i );                     "Do you really want to clearsign it?"), name);
810          switch( fm_cmd ) {      if (i == IDYES)
811          case FM_LIST:        rc = fm_list( fname, dlg );       break;          n = 0;
812          case FM_WIPE:        rc = fm_wipe( fname );            break;      return n;
813          case FM_ENCRYPT:     rc = fm_encrypt( ctx, fname, 0 ); break;  }
814          case FM_ENCRYPT_DIR: rc = fm_encrypt_directory( ctx, fname ); break;  
815          case FM_SIGNENCRYPT: rc = fm_encrypt( ctx, fname, 1 ); break;  
816          case FM_DECRYPT:     rc = fm_decrypt( ctx, fname );    break;  int
817          case FM_SIGN:        rc = fm_sign( ctx, fname );       break;  fm_parse_files (listview_ctrl_t lv, HWND dlg, int cmd)
818          case FM_SYMENC:      rc = fm_sym_encrypt( ctx, fname );break;  {
819          case FM_VERIFY:      rc = fm_verify (ctx, sig_detached, fname);break;      struct secdel_confirm_s confirm = {0};
820          case FM_IMPORT:      struct progress_filter_s pfx, pfx2;
821              free_if_alloc (ctx->opaque);      fm_state_s * ctx;
822              ctx->opaque = m_strdup (fname);      int fm_cmd, sig_detached = 0;
823              if (!ctx->opaque)      int rc = 0, i, n, ndel = 0;
824                  BUG (0);      char fname[512], status[128];
825              DialogBoxParam( glob_hinst, (LPCSTR)IDD_WINPT_IMPORT, dlg,      
826                             file_import_dlg_proc, (LPARAM)ctx );      switch (cmd) {
827              if (ctx->cancel == 1)      case ID_FILEMISC_ENCRYPT: fm_cmd = FM_ENCRYPT; break;
828                  continue;      case ID_FILEMISC_ENCRYPT_ZIP:fm_cmd = FM_ENCRYPT_ZIP; break;
829              rc = fm_import (ctx, fname);      case ID_FILEMISC_DECRYPT: fm_cmd = FM_DECRYPT; break;
830              break;      case ID_FILEMISC_SYMENC:  fm_cmd = FM_SYMENC;  break;
831          }      case ID_FILEMISC_SIGN:    fm_cmd = FM_SIGN;    break;    
832          fm_set_status (lv, i, fm_cmd, !rc, ctx->output);      case ID_FILEMISC_VERIFY:  fm_cmd = FM_VERIFY;  break;
833          free_if_alloc (ctx->output);      case ID_FILEMISC_IMPORT:  fm_cmd = FM_IMPORT;  break;
834          progress_cleanup (&pfx);      case ID_FILEMISC_WIPE:    fm_cmd = FM_WIPE;    break;
835      }      case ID_FILEMISC_LIST:    fm_cmd = FM_LIST;    break;
836      if (fm_cmd == FM_WIPE) {      case ID_FILEMISC_SIGNENC: fm_cmd = FM_SIGNENCRYPT; break;
837          secure_unlink_set_cb (NULL, NULL);      default: return 1; /* unknown command */
838          progress_cleanup (&pfx2);      }
839      }      
840      if (ctx->cache_cb) {      if (fm_get_current_pos (lv) == -1)
841          release_gpg_passphrase_cb (&ctx->pass_cb);          return WPTERR_GENERAL;
842          ctx->cache_cb = 0; /* make sure it's only used for this session! */      rc = fm_state_new (&ctx);
843      }      if (rc)
844                BUG (0);
845      /* remove wipe files from the list */      ctx->dlg = dlg;
846      n = listview_count_items (lv, 0);  
847      while (n--) {      // XXX: for file operations the progress dialog will be
848          char status[128];      //       reloaded somewhere and thus a 'dummy' dialog remains
849          listview_get_item_text (lv, n, 0, status, sizeof (status) - 1);  
850          if( !strcmp (status, "WIPED"))      /* we use it here to make sure that pfx_cleanup will not use
851              listview_del_item (lv, n);         any weird values. */
852      }      memset (&pfx, 0, sizeof (pfx));
853            ctx->prog_cb = NULL;
854  leave:      if (cmd != FM_VERIFY && cmd != FM_SIGN /*&& reg_prefs.fm.progress > 0*/) {
855      if (!rc)          pfx.hwnd = dlg;
856          fm_state_release (ctx);          /*gpgme_set_progress_cb (ctx->ctx, progress_callback, &pfx);*/
857      progress_cleanup (&pfx);          /*ctx->prog_cb = &pfx;*/
858      return rc;      }
859  } /* fm_parse_files */      
860        /* Commands we need before we can perform the main command */
861        switch (fm_cmd) {
862  /* Wipe the given file @name with the delete mode      case FM_ENCRYPT_ZIP:
863     from the configuration.      case FM_ENCRYPT:
864     Return value: 0 on success. */      case FM_SIGNENCRYPT:
865  int          if (fm_cmd == FM_SIGNENCRYPT)
866  fm_wipe (const char *name)              ctx->req_signer = 1;
867  {          DialogBoxParam (glob_hinst, (LPCTSTR)IDD_WINPT_FILE_ENCRYPT,
868      int rc;                          ctx->dlg, file_encrypt_dlg_proc, (LPARAM)ctx);
869            if (ctx->cancel == 1) {
870      SetCursor (LoadCursor (NULL, IDC_WAIT));              rc = WPTERR_GENERAL;
871      remove_crit_file_attrs (name, 1);              goto leave;
872      rc = secure_unlink (name, reg_prefs.wipe_mode);          }
873      SetCursor (LoadCursor (NULL, IDC_ARROW));          break;
874      return rc;          
875  }      case FM_SIGN:
876            DialogBoxParam (glob_hinst, (LPCSTR)IDD_WINPT_FILE_SIGN, dlg,
877                            file_sign_dlg_proc, (LPARAM) ctx);
878  /* Dump out the given PGP packets from file @name in a dialog. */          if (ctx->cancel == 1 || fm_clearsign_8bit (lv, ctx)) {
879  int              rc = WPTERR_GENERAL;
880  fm_list (const char *name, HWND dlg)              goto leave;
881  {          }
882      dialog_box_param( glob_hinst, (LPCTSTR)IDD_WINPT_FILE_STAT, dlg,          break;
883                        file_stat_dlg_proc, (LPARAM)name, _("File Status"),  
884                        IDS_WINPT_FILE_STAT );      case FM_WIPE:
885      return 0;          memset (&pfx2, 0, sizeof (pfx2));
886  }          secure_unlink_set_cb (progress_callback, &pfx2);
887            break;
888        }
889  static int      
890  ask_filename (fm_state_t c, const char *msg, char **dst)      for( i = 0, n = 0;  i < listview_count_items( lv, 0 ); i++ ) {
891  {          if( !listview_get_item_state( lv, i ) )
892      const char * s;              continue;
893            listview_get_item_text( lv, i, 0, status, sizeof (status) -1 );
894      s = get_filename_dlg (c->dlg, FILE_SAVE, msg, NULL, NULL);          if (!strcmp( status, "ENCRYPTED" ) && fm_cmd == FM_DECRYPT)
895      if (!s)              n++;
896          return WPTERR_GENERAL;          if (!strcmp( status, "UNKNOWN" ) && fm_cmd == FM_SIGN)
897                n++;
898      if (dst != NULL)          if (fm_cmd == FM_WIPE)
899          free_if_alloc (*dst);              ndel++;
900      free_if_alloc (c->output);      }
901      c->output = m_strdup (s);      
902      if (!c->output)      if (n > 1 && fm_cmd != FM_SYMENC)
903          BUG (0);          ctx->cache_cb = 1;
904      if (dst)  
905          *dst = fm_quote_file (s);      if (fm_cmd == FM_WIPE && ndel > 0) {
906      return 0;          memset (&confirm, 0, sizeof confirm);
907  }          confirm.lv_files = lv;
908            DialogBoxParam (glob_hinst, (LPCTSTR)IDD_WINPT_FILES_SECDEL, ctx->dlg,
909                            file_secdel_confirm_dlg_proc, (LPARAM)&confirm);
910  int          if (!confirm.yes)
911  fm_encrypt (fm_state_t c, const char *name, int sign)              goto leave;
912  {      }
913      gpgme_error_t err;  
914      gpgme_key_t key = NULL;      if (fm_cmd == FM_ENCRYPT_ZIP)
915      gpgme_ctx_t ctx = c->ctx;          fm_encrypt_into_zip (ctx, lv);
916      file_data_t in=NULL, out=NULL;  
917      char *keyid = NULL, ext[5];      for (i = 0; i < listview_count_items (lv, 0); i++) {
918      int no_compr = 0;          if (!listview_get_item_state (lv, i))
919      int rc = 0;              continue;
920            listview_get_item_text (lv, i, 1, fname, sizeof (fname) - 1);
921      c->output = new char[strlen (name) + 5 + 1];          if( file_exist_check (fname) && !is_directory (fname)) {
922      if (!c->output)              log_box (_("File Manager"), MB_ERR,
923          BUG (0);                       _("\"%s\" does not exist"), fname);
924      strcpy (ext, file_get_extension (ctx, c->sigmode));              continue;
925      strcpy (c->output, name);          }
926      strcat (c->output, ext);                  if (is_directory (fname))
927                    fm_cmd = FM_ENCRYPT_DIR;        
928      if (!overwrite_file (c->output)) {          if (!fm_check_file_type (lv, i, fm_cmd))
929          rc = ask_filename (c, _("Enter filename for encrypted file"), NULL);              continue;
930          if (rc)          sig_detached = fm_check_detached_sig (lv, i);
931              goto leave;          switch (fm_cmd) {
932      }          case FM_LIST:        rc = fm_list( fname, dlg );       break;
933            case FM_WIPE:        rc = fm_wipe( fname );            break;
934      err = gpg_file_data_new (name, 1, &in);          case FM_ENCRYPT:     rc = fm_encrypt( ctx, fname, 0 ); break;
935      if (err)          case FM_ENCRYPT_DIR: rc = fm_encrypt_directory( ctx, fname ); break;
936          goto leave;          case FM_SIGNENCRYPT: rc = fm_encrypt( ctx, fname, 1 ); break;
937      err = gpg_file_data_new (c->output, 0, &out);          case FM_DECRYPT:     rc = fm_decrypt( ctx, fname );    break;
938      if (err)          case FM_SIGN:        rc = fm_sign( ctx, fname );       break;
939          goto leave;          case FM_SYMENC:      rc = fm_sym_encrypt (ctx, fname); break;
940            case FM_VERIFY:      rc = fm_verify (ctx, sig_detached, fname);break;
941      /*          case FM_IMPORT:
942      if (c->prog_cb) {              free_if_alloc (ctx->opaque);
943          c->prog_cb->what = name;              ctx->opaque = m_strdup (fname);
944          gpg_file_data_set_cb (in, c->prog_cb);              DialogBoxParam (glob_hinst, (LPCSTR)IDD_WINPT_IMPORT, dlg,
945      }                              file_import_dlg_proc, (LPARAM)ctx);
946      */              if (ctx->cancel == 1)
947                        continue;
948      /* XXX              rc = fm_import (ctx, fname);
949      no_compr = is_multi_media (name);              break;
950      gpgme_control (ctx, GPGME_CTRL_NO_COMPR, no_compr);          }
951      */          if (ctx->cancel == 1) {
952                ctx->cancel = 0;
953      if (sign) {              continue;
954          if (gpgme_signers_enum (ctx, 0) == NULL) {          }
955              keyid = get_gnupg_default_key ();          fm_set_status (lv, i, fm_cmd, ctx->sigmode, !rc, ctx->output);
956              if (!keyid) {          free_if_alloc (ctx->output);
957                  msg_box (c->dlg, _("Could not get default secret key."),          progress_cleanup (&pfx);
958                           _("Signing"), MB_ERR);      }
959                  rc = WPTERR_GENERAL;  
960                  goto leave;      if (fm_cmd == FM_WIPE) {
961              }          secure_unlink_set_cb (NULL, NULL);
962              if (get_seckey (keyid, &key))          progress_cleanup (&pfx2);
963                  BUG (0);      }
964              gpgme_signers_add (ctx, key);      if (ctx->cache_cb) {
965          }          release_gpg_passphrase_cb (&ctx->pass_cb);
966          else {          ctx->cache_cb = 0; /* make sure it's only used for this session! */
967              gpgme_key_t key = gpgme_signers_enum (ctx, 0);      }
968              if (key && key->subkeys) {      
969                  keyid = m_strdup (key->subkeys->keyid);      /* remove wipe files from the list */
970                  if (!keyid)      n = listview_count_items (lv, 0);
971                      BUG (NULL);      while (n--) {
972              }          listview_get_item_text (lv, n, 0, status, sizeof (status) - 1);
973          }          if (!strcmp (status, "WIPED"))
974          if (!c->init_cb || !c->cache_cb) {              listview_del_item (lv, n);
975              set_gpg_passphrase_cb (&c->pass_cb, c->ctx, GPG_CMD_SIGN,      }
976                                     c->dlg, _("Signing"));      
977              c->init_cb = 1;  leave:
978          }      if (!rc)
979          err = gpgme_op_encrypt_sign (ctx, c->recp, GPGME_ENCRYPT_ALWAYS_TRUST,          fm_state_release (ctx);
980                                       in->dat, out->dat);      progress_cleanup (&pfx);
981          if (!c->cache_cb)      return rc;
982              release_gpg_passphrase_cb (&c->pass_cb);  } /* fm_parse_files */
983          if (c->pass_cb.cancel) {  
984              rc = WPTERR_GENERAL;  
985              goto leave;  /* Wipe the given file @name with the delete mode
986          }     from the configuration.
987          if (err) {     Return value: 0 on success. */
988              msg_box (c->dlg, gpgme_strerror (err), _("Sign"), MB_ERR);  int
989              if (gpgme_err_code (err) == GPG_ERR_BAD_PASSPHRASE)  fm_wipe (const char *name)
990                  agent_del_cache (keyid);  {
991              rc = WPTERR_GENERAL;      int rc;
992              goto leave;  
993          }      SetCursor (LoadCursor (NULL, IDC_WAIT));
994      }      remove_crit_file_attrs (name, 1);
995      else {      rc = secure_unlink (name, reg_prefs.wipe_mode);
996          err = gpgme_op_encrypt (ctx, c->recp, GPGME_ENCRYPT_ALWAYS_TRUST,      SetCursor (LoadCursor (NULL, IDC_ARROW));
997                                  in->dat, out->dat);      return rc;
998          if (err) {  }
999              msg_box (c->dlg, gpgme_strerror (err), _("Encrypt"), MB_ERR);  
1000              rc = WPTERR_GENERAL;  
1001              goto leave;  /* Dump out the given PGP packets from file @name in a dialog. */
1002          }  int
1003      }  fm_list (const char *name, HWND dlg)
1004      if (c->wipe)  {
1005          secure_unlink (name, WIPE_MODE_SIMPLE);      dialog_box_param( glob_hinst, (LPCTSTR)IDD_WINPT_FILE_STAT, dlg,
1006                              file_stat_dlg_proc, (LPARAM)name, _("File Status"),
1007  leave:                        IDS_WINPT_FILE_STAT );
1008      if (in)      return 0;
1009          gpg_file_data_release (in);  }
1010      if (out)  
1011          gpg_file_data_release (out);  
1012      free_if_alloc (keyid);  static int
1013      return rc;  ask_filename (fm_state_t c, const char *msg, char **dst)
1014  }  {
1015        const char * s;
1016    
1017  int      s = get_filesave_dlg (c->dlg, msg, NULL, NULL);
1018  fm_sym_encrypt (fm_state_t c, const char * name)      if (!s)
1019  {          return WPTERR_GENERAL;
1020      gpgme_ctx_t ctx = c->ctx;  
1021      gpgme_error_t err;          if (dst != NULL)
1022      file_data_t in=NULL, out=NULL;          free_if_alloc (*dst);
1023      int rc = 0, cancel = 0;      free_if_alloc (c->output);
1024      char * src = NULL, * dst = NULL;      c->output = m_strdup (s);
1025      char ext[5], * pass;          if (dst)
1026                *dst = fm_quote_file (s);
1027      pass = request_passphrase2 (_("Symmetric"), 0, &cancel);      return 0;
1028      if (cancel)  }
1029          return 0;  
1030        
1031      /* XXX gpgme_control (ctx, GPGME_CTRL_CIPHER, -1);*/  int
1032      c->output = new char[strlen (name) + 5 + 1];  fm_encrypt (fm_state_t c, const char *name, int sign)
1033      if (!c->output)  {
1034          BUG (0);      gpgme_error_t err;
1035      strcpy (ext, file_get_extension (ctx, c->sigmode));      gpgme_key_t key = NULL;
1036      strcpy (c->output, name);      gpgme_ctx_t ctx = c->ctx;
1037      strcat (c->output, ext);      file_data_t in=NULL, out=NULL;
1038        char *keyid = NULL, ext[5];
1039      if (overwrite_file (c->output) == 0) {      /*int no_compr = 0;*/
1040          rc = WPTERR_GENERAL;      int rc = 0;
1041          goto leave;      
1042      }      c->output = new char[strlen (name) + 5 + 1];
1043        if (!c->output)
1044      gpgme_set_passphrase_cb (ctx, sym_passphrase_cb, pass);              BUG (0);
1045        strcpy (ext, file_get_extension (ctx, c->sigmode));
1046      err = gpg_file_data_new (name, 1, &in);      strcpy (c->output, name);
1047      if (err)      strcat (c->output, ext);
1048          goto leave;      
1049      err = gpg_file_data_new (c->output, 0, &out);      if (!overwrite_file (c->output)) {
1050      if (err)          rc = ask_filename (c, _("Enter filename for encrypted file"), NULL);
1051          goto leave;          if (rc)
1052                goto leave;
1053      err = gpgme_op_encrypt (ctx, NULL, GPGME_ENCRYPT_ALWAYS_TRUST, in->dat, out->dat);      }
1054      if (err) {  
1055          msg_box (c->dlg, gpgme_strerror (err), _("Symmetric"), MB_ERR);      err = gpg_file_data_new (name, F_DATA_READ, &in);
1056          rc = WPTERR_GENERAL;      if (err)
1057          goto leave;          goto leave;
1058      }      remove_crit_file_attrs (c->output, 0);
1059      if (file_exist_check (c->output)) {      err = gpg_file_data_new (c->output, F_DATA_WRITE, &out);
1060          msg_box (c->dlg, _("Encryption failed."), _("Symmetric"), MB_ERR);      if (err)
1061          rc = WPTERR_GENERAL;          goto leave;
1062      }  
1063            /*
1064  leave:      if (c->prog_cb) {
1065      if (in)          c->prog_cb->what = name;
1066          gpg_file_data_release (in);          gpg_file_data_set_cb (in, c->prog_cb);
1067      if (out)      }
1068          gpg_file_data_release (out);      */
1069      sfree_if_alloc (pass);      
1070      return rc;      /* XXX: disable compression for multi-media files.
1071  } /* fm_sym_encrypt */      no_compr = is_multi_media (name);
1072        gpgme_control (ctx, GPGME_CTRL_NO_COMPR, no_compr);
1073        */
1074  /* Show the human readable verify result from @sigres. */  
1075  static void      if (sign) {
1076  show_verify_result (gpgme_verify_result_t sigres)          if (gpgme_signers_enum (ctx, 0) == NULL) {
1077  {              keyid = get_gnupg_default_key ();
1078      gpgme_key_t key=NULL;              if (!keyid) {
1079      gpgme_signature_t sig=sigres->signatures;                  msg_box (c->dlg, _("Could not get default secret key."),
1080      const char *s, *keyid;                           _("Signing"), MB_ERR);
1081      int sigok = 0;                  rc = WPTERR_GENERAL;
1082      int type;                  goto leave;
1083      char buf[384];              }
1084                if (get_seckey (keyid, &key))
1085      sig = sigres->signatures;                  BUG (0);
1086      sigok = sig->summary & GPGME_SIGSUM_GREEN;              gpgme_signers_add (ctx, key);
1087      s = sigok? _("Good signature") : _("BAD signature");          }
1088      type = sigok? MB_OK: MB_ICONWARNING|MB_OK;          else {
1089      keyid = sig->fpr;                gpgme_key_t sigkey = gpgme_signers_enum (ctx, 0);
1090      if (!keyid)              if (sigkey && sigkey->subkeys) {
1091          return;                  keyid = m_strdup (sigkey->subkeys->keyid);
1092                }
1093      keyid = strlen (sig->fpr) == 40? sig->fpr+32 : sig->fpr + 24;          }
1094      get_pubkey (sig->fpr, &key);          if (!c->init_cb || !c->cache_cb) {
1095      _snprintf (buf, sizeof (buf)-1, "Signature made %s using %s key ID %s\n"              set_gpg_passphrase_cb (&c->pass_cb, c->ctx, GPG_CMD_SIGN,
1096                                      "%s from \"%s\"",                                     c->dlg, _("Signing"));
1097                  strtimestamp (sig->timestamp), get_key_pubalgo (sig->pubkey_algo),              c->init_cb = 1;
1098                  keyid, s, key? key->uids->uid : _("user ID not found"));          }
1099      msg_box (NULL, buf, _("Decrypt Verify"), type);          op_begin ();
1100  }          err = gpgme_op_encrypt_sign (ctx, c->recp, GPGME_ENCRYPT_ALWAYS_TRUST,
1101                                         in->dat, out->dat);
1102            op_end ();
1103  /* Check the recipients if we have at least one secret key. */          if (!c->cache_cb)
1104  bool              release_gpg_passphrase_cb (&c->pass_cb);
1105  secret_key_available (gpgme_recipient_t rset)          if (c->pass_cb.cancel) {
1106  {              rc = WPTERR_GENERAL;
1107      gpgme_recipient_t r;              goto leave;
1108      gpgme_key_t key;          }
1109            if (err) {
1110      for (r=rset; r; r = r->next) {                    msg_box (c->dlg, gpgme_strerror (err), _("Sign"), MB_ERR);
1111          if (gpgme_err_code (r->status) == GPG_ERR_NO_SECKEY)              if (gpgme_err_code (err) == GPG_ERR_BAD_PASSPHRASE)
1112              continue;                  agent_del_cache (keyid);
1113          else {              rc = WPTERR_GENERAL;
1114              /* extra check to make sure the key is available right now. */              goto leave;
1115              if (!get_seckey (r->keyid, &key))          }
1116                  return true;      }
1117          }      else {
1118      }          op_begin ();
1119      return false;          err = gpgme_op_encrypt (ctx, c->recp, GPGME_ENCRYPT_ALWAYS_TRUST,
1120  }                                  in->dat, out->dat);
1121            op_end ();
1122            if (err) {
1123  /* Decrypt the file @name. */              msg_box (c->dlg, gpgme_strerror (err), _("Encrypt"), MB_ERR);
1124  int              rc = WPTERR_GENERAL;
1125  fm_decrypt (fm_state_t c, const char *name)              goto leave;
1126  {          }
1127      gpgme_error_t err;      }
1128      gpgme_ctx_t ctx = c->ctx;          
1129      gpgme_decrypt_result_t res;  leave:
1130      gpgme_verify_result_t sigres;      if (in)
1131      file_data_t in =NULL, out=NULL;          gpg_file_data_release (in);
1132      int is_signed = 0;      if (out)
1133      int rc = 0;          gpg_file_data_release (out);
1134            free_if_alloc (keyid);
1135      if (!c->init_cb || !c->cache_cb) {      if (!rc && c->wipe)
1136          set_gpg_passphrase_cb (&c->pass_cb, c->ctx, GPG_CMD_DECRYPT,          secure_unlink (name, WIPE_MODE_SIMPLE);
1137                                 c->dlg, _("Decryption"));      return rc;
1138          c->init_cb = 1;  }
1139      }      
1140        
1141      c->output = m_strdup (name);  int
1142      if (!c->output)  fm_sym_encrypt (fm_state_t c, const char * name)
1143          BUG (0);  {
1144      if (is_openpgp_ext (c->output))      gpgme_ctx_t ctx = c->ctx;
1145          c->output[strlen (c->output)-4] = '\0';      gpgme_error_t err;    
1146      else {      file_data_t in=NULL, out=NULL;
1147          const char *s = get_filesave_dlg (c->dlg, _("Choose Filename for Output"),      int rc = 0, cancel = 0;
1148                                            NULL, NULL);      char ext[5], * pass;    
1149          if (s) {      
1150              free_if_alloc (c->output);      pass = request_passphrase2 (_("Symmetric"), 0, &cancel);
1151              c->output = m_strdup (s);      if (cancel) {
1152              if (!c->output)          c->cancel = 1;
1153                  BUG (NULL);          return 0;
1154          }      }
1155      }      
1156        /* XXX gpgme_control (ctx, GPGME_CTRL_CIPHER, -1);*/
1157      if (overwrite_file (c->output) == 0) {      c->output = new char[strlen (name) + 5 + 1];
1158          rc = ask_filename (c, _("Please enter filename for plaintext file"), NULL);      if (!c->output)
1159          if (rc)          BUG (0);
1160              goto leave;      strcpy (ext, file_get_extension (ctx, c->sigmode));
1161      }          strcpy (c->output, name);
1162        strcat (c->output, ext);
1163      remove_crit_file_attrs (c->output, 0);  
1164        if (overwrite_file (c->output) == 0) {
1165      err = gpg_file_data_new (name, 1, &in);          rc = WPTERR_GENERAL;
1166      if (err)          goto leave;    
1167          goto leave;      }
1168      err = gpg_file_data_new (c->output, 0, &out);  
1169      if (err)      gpgme_set_passphrase_cb (ctx, sym_passphrase_cb, pass);    
1170          goto leave;  
1171        err = gpg_file_data_new (name, 1, &in);
1172      err = gpgme_op_decrypt_verify (ctx, in->dat, out->dat);      if (err)
1173      if (!c->cache_cb)          goto leave;
1174          release_gpg_passphrase_cb (&c->pass_cb);      err = gpg_file_data_new (c->output, 0, &out);
1175      if (c->pass_cb.cancel) {      if (err)
1176          rc = WPTERR_GENERAL;          goto leave;
1177          goto leave;  
1178      }      op_begin ();
1179        err = gpgme_op_encrypt (ctx, NULL, GPGME_ENCRYPT_ALWAYS_TRUST,
1180      res = gpgme_op_decrypt_result (ctx);                              in->dat, out->dat);
1181      if (res && res->recipients && !secret_key_available (res->recipients)) {      op_end ();
1182          const char *keyid = res->recipients->keyid;      if (err) {
1183          char *p = get_key_userid (keyid+8);          msg_box (c->dlg, gpgme_strerror (err), _("Symmetric"), MB_ERR);
1184          gpgme_pubkey_algo_t pkalgo = res->recipients->pubkey_algo;          rc = WPTERR_GENERAL;
1185                    goto leave;
1186          log_box( _("Decryption"), MB_ERR,      }
1187                   _("Encrypted with %s key, ID %s.%s\n"      if (file_exist_check (c->output)) {
1188                     "Decryption failed: secret key not available."),          msg_box (c->dlg, _("Encryption failed."), _("Symmetric"), MB_ERR);
1189                     get_key_pubalgo (pkalgo), keyid+8, p);          rc = WPTERR_GENERAL;
1190          rc = WPTERR_GENERAL;      }
1191          free_if_alloc (p);      
1192          goto leave;  leave:
1193      }      if (in)
1194      else if (err) {          gpg_file_data_release (in);
1195          msg_box (c->dlg, gpgme_strerror (err), _("Decrypt"), MB_ERR);      if (out)
1196          rc = WPTERR_GENERAL;          gpg_file_data_release (out);
1197          goto leave;      sfree_if_alloc (pass);
1198      }      return rc;
1199      if (file_exist_check (c->output)) {  }
1200          log_box ("Decrypt", MB_ERR, _("Decryption failed.\n%s: does not exist."), c->output);  
1201          rc = WPTERR_GENERAL;  
1202      }  char* get_pka_status (gpgme_signature_t sig);
1203        
1204      sigres = gpgme_op_verify_result (ctx);  
1205      if (sigres && sigres->signatures)  /* Show the human readable verify result from @sigres. */
1206          show_verify_result (sigres);  static void
1207    show_verify_result (gpgme_verify_result_t sigres)
1208        {    
1209  leave:      gpgme_signature_t sig=sigres->signatures;
1210      if (in)      winpt_key_s key;
1211          gpg_file_data_release (in);      const char *s, *keyid, *uid;
1212      if (out)      char *pka_info;
1213          gpg_file_data_release (out);      char buf[384];
1214      return rc;      int sigok = 0;
1215  }  
1216        sig = sigres->signatures;
1217        sigok = sig->summary & GPGME_SIGSUM_GREEN;
1218  int      s = sigok? _("Good signature") : _("BAD signature");
1219  fm_sign (fm_state_t c, const char * name)      keyid = sig->fpr;
1220  {            if (!keyid)
1221      int rc = 0;          return;
1222      gpgme_ctx_t ctx = c->ctx;      pka_info = get_pka_status (sig);
1223      gpgme_error_t err;      keyid = get_keyid_from_fpr (sig->fpr);
1224      file_data_t in=NULL, out=NULL;      memset (&key, 0, sizeof (key));
1225      char ext[5];      if (!winpt_get_pubkey (sig->fpr, &key))
1226            uid = key.ext->uids->uid;
1227      if (!c->init_cb || !c->cache_cb) {      else
1228          set_gpg_passphrase_cb (&c->pass_cb, c->ctx, GPG_CMD_SIGN, c->dlg, _("Signing") );          uid = _("user ID not found");
1229          c->init_cb = 1;      _snprintf (buf, sizeof (buf)-1, _("Signature made %s using %s key ID %s\n"
1230      }                                        "%s from \"%s\"\n%s"),
1231                        strtimestamp (sig->timestamp),
1232      free_if_alloc (c->output);                  get_key_pubalgo (sig->pubkey_algo),
1233      c->output = new char[strlen (name) + 5 + 1];                  keyid, s, uid, pka_info? pka_info : "");
1234      if( !c->output)      msg_box (NULL, buf, _("Decrypt Verify"), sigok? MB_OK: MB_ICONWARNING|MB_OK);
1235          BUG( NULL );      free_if_alloc (pka_info);
1236      strcpy (ext, file_get_extension (ctx, c->sigmode));  }
1237      strcpy (c->output, name);  
1238      strcat (c->output, ext);  
1239        /* Check the recipients if we have at least one secret key. */
1240      if (!overwrite_file (c->output)) {  bool
1241          rc = ask_filename (c, _("Enter filename for signed file"), NULL);  secret_key_available (gpgme_recipient_t rset)
1242          if (rc)  {
1243              goto leave;      gpgme_recipient_t r;
1244      }      gpgme_key_t key;
1245      remove_crit_file_attrs (c->output, 0);  
1246        for (r=rset; r; r = r->next) {
1247      err = gpg_file_data_new (name, 1, &in);          if (gpgme_err_code (r->status) == GPG_ERR_NO_SECKEY)
1248      if (err)              continue;
1249          goto leave;          else {
1250      err = gpg_file_data_new (c->output, 0, &out);              /* extra check to make sure the key is available right now. */
1251      if (err)              if (!get_seckey (r->keyid, &key))
1252          goto leave;                  return true;
1253            }
1254      err = gpgme_op_sign (ctx, in->dat, out->dat, c->sigmode);      }
1255      if( !c->cache_cb )      return false;
1256          release_gpg_passphrase_cb (&c->pass_cb);  }
1257      if( c->pass_cb.cancel ) {  
1258          rc = WPTERR_GENERAL;  
1259          goto leave;  /* If the decrypt result contains the original file name,
1260      }     we use it instead of the artificial "output - .gpg" string. */
1261      if( err ) {  static int
1262          msg_box( c->dlg, gpgme_strerror( err ), _("Sign"), MB_ERR );  restore_original_name (const char *output, const char *file_name)
1263          rc = WPTERR_GENERAL;  {
1264          goto leave;          char *dir;
1265      }      char *orig;
1266        int rc = 0;
1267  leave:  
1268      if (in)      dir = strrchr (output, '\\');
1269          gpg_file_data_release (in);      if (!dir)
1270      if (out)          orig = strdup (file_name);
1271          gpg_file_data_release (out);      else {
1272      return rc;          orig = (char*)calloc (1, strlen (file_name)+ 1 +
1273  }                                   strlen (output)+1);
1274            if (!orig)
1275                BUG (0);
1276  static int          memcpy (orig, output, (dir-output)+1);
1277  fm_add_sig_stat (file_sig_ctx_t log)          strcat (orig, file_name);
1278  {      }
1279      gpgme_key_t key;          /* XXX: we need to find out if the string needs to be utf8 decoded. */
1280      const char *kid;      if (overwrite_file (orig)) {
1281      int not_found = 0;          DeleteFile (orig);
1282            if (!MoveFile (output, orig))
1283      kid = log->sig->fpr;              rc = -1;
1284      if (!kid)      }
1285          BUG (NULL);      safe_free (orig);
1286      if (strlen (kid) == 40)      return rc;
1287          kid += 32;        }
1288      else if (strlen (kid) == 32)  
1289          kid += 24;  
1290      if (get_pubkey (kid, &key))  /* Decrypt the file @name. */
1291          log->use_uid = 0;  int
1292      else {  fm_decrypt (fm_state_t c, const char *name)
1293          log->user_id = key->uids->uid;  {
1294          log->use_uid = 1;      gpgme_error_t err;
1295      }      gpgme_ctx_t ctx = c->ctx;    
1296      file_verify_add_state (log);      gpgme_decrypt_result_t res;
1297      return 0;      gpgme_verify_result_t sigres;
1298  }      file_data_t in = NULL, out = NULL;
1299        int rc = 0;
1300        
1301  static int      if (!c->init_cb || !c->cache_cb) {
1302  verify_pasted (listview_ctrl_t lv, fm_state_t ctx, const char * dat,          set_gpg_passphrase_cb (&c->pass_cb, c->ctx, GPG_CMD_DECRYPT,
1303                 int i, HWND dlg)                                 c->dlg, _("Decryption"));
1304  {          c->init_cb = 1;
1305      FILE * fp;      }
1306      char stat[32];      
1307      char file[256], * fname = NULL;      c->output = m_strdup (name);
1308      int del_end=0;      if (is_openpgp_ext (c->output))
1309            c->output[strlen (c->output)-4] = '\0';
1310      listview_get_item_text (lv, i, 0, stat, sizeof (stat)-1);      else {
1311      listview_get_item_text (lv, i, 1, file, sizeof (file)-1);          const char *s;
1312      if (strcmp (stat, "UNKNOWN"))          s = get_filesave_dlg (c->dlg, _("Choose Filename for Output"),
1313          return 0;                                NULL, NULL);
1314      fname = make_filename (NULL, file, "asc");          if (s) {
1315      if (file_exist_check (fname) != 0) {              free_if_alloc (c->output);
1316          fp = fopen (fname, "wb");              c->output = m_strdup (s);
1317          if (fp == NULL) {          }
1318              log_box (_("File Manager"), MB_ERR, "could not create '%s'", fname);      }
1319              free_if_alloc (fname);  
1320              return WPTERR_GENERAL;            if (overwrite_file (c->output) == 0) {
1321          }                rc = ask_filename (c, _("Please enter filename for plaintext file"), NULL);
1322          fwrite (dat, 1, strlen (dat), fp);          if (rc)
1323          fclose (fp);              goto leave;
1324          del_end = 1;      }
1325      }  
1326      fm_verify (ctx, 1, fname);      /* we fetch all recipients here to make sure they list is complete. */
1327      if (del_end)      release_gpg_recipients (&c->pass_cb.recipients);
1328          unlink (fname);      gpg_get_recipients (name, &c->pass_cb.recipients);
1329      free_if_alloc (fname);  
1330      return 0;      err = gpg_file_data_new (name, F_DATA_READ, &in);
1331  }      if (err)
1332            goto leave;
1333        remove_crit_file_attrs (c->output, 0);
1334  int      err = gpg_file_data_new (c->output, F_DATA_WRITE, &out);
1335  fm_verify_pasted_detsig (listview_ctrl_t lv, HWND dlg)      if (err)
1336  {          goto leave;
1337      fm_state_t ctx = NULL;      
1338      char * dat=NULL;      op_begin ();
1339      int i, fnd = 0;      err = gpgme_op_decrypt_verify (ctx, in->dat, out->dat);
1340        op_end ();
1341      dat = get_clip_text (NULL);      if (!c->cache_cb)
1342      if (!dat || !strstr (dat, "BEGIN PGP SIGNATURE")) {          release_gpg_passphrase_cb (&c->pass_cb);
1343          msg_box (dlg, _("Could not find detached signature in the clipboard."),      if (c->pass_cb.cancel) {
1344                   _("File Manager"), MB_ERR);          rc = WPTERR_GENERAL;
1345          free_if_alloc (dat);          goto leave;
1346          return WPTERR_GENERAL;      }
1347      }  
1348      /* XXX find a way to filter out bad signatures or just ignore all in      res = gpgme_op_decrypt_result (ctx);
1349             this case */      if (res && res->recipients && !secret_key_available (res->recipients)) {
1350      fm_state_new (&ctx);          const char *keyid = res->recipients->keyid;
1351      if ((i=listview_get_curr_pos (lv)) != -1) {          char *p = get_key_userid (keyid+8);
1352          verify_pasted (lv, ctx, dat, i, dlg);          gpgme_pubkey_algo_t pkalgo = res->recipients->pubkey_algo;
1353          fnd = 1;          
1354      }          log_box (_("Decryption"), MB_ERR,
1355      else {                   _("Encrypted with %s key, ID %s.%s\n"
1356          for (i=0; i < listview_count_items (lv, 0); i++) {                     "Decryption failed: secret key not available."),
1357              verify_pasted (lv, ctx, dat, i, dlg);                     get_key_pubalgo (pkalgo), keyid+8, p);
1358              fnd = 1;          rc = WPTERR_GENERAL;
1359          }          free_if_alloc (p);
1360      }          goto leave;
1361      if (!fnd)      }
1362          msg_box (dlg, _("No files to check."), _("File Manager"), MB_INFO);      else if (err) {
1363      free_if_alloc (dat);          msg_box (c->dlg, gpgme_strerror (err), _("Decrypt"), MB_ERR);
1364      fm_state_release (ctx);          rc = WPTERR_GENERAL;
1365      return 0;          goto leave;
1366  }      }
1367        if (file_exist_check (c->output)) {
1368            log_box ("Decrypt", MB_ERR,
1369  /* Extract automatically the output file name from @name.                   _("Decryption failed.\n%s: does not exist."), c->output);
1370     If @detached is 1, a detached sig is assumed. */          rc = WPTERR_GENERAL;
1371  static int          goto leave;
1372  get_output_file (fm_state_t c, const char *name, int detached)      }
1373  {      else if (res && res->file_name) {
1374      const char *file = NULL;          char *file;
1375      const char *title;          int id;
1376      char fname[384];  
1377                file = strrchr (c->output, '\\');
1378      if (detached)          if (!file)
1379          title = _("Select Data File");              file = c->output;
1380      else          else
1381          title = _("Selected Output File");              file++;
1382            id = log_box (_("Decrypt"), MB_QUEST_ASK,
1383      if (strstr (name, ".sig") || strstr (name, ".asc") || strstr (name, ".gpg")) {                        _("The original file name is '%s'.\n\n"
1384          _snprintf (fname, sizeof (fname) - 1, "%s", name);                          "Do you want to use this instead of '%s'?"),
1385          fname[strlen (fname) - 4] = '\0';                        res->file_name, file);
1386          if (file_exist_check (fname) == 0 && detached)            if (id == IDYES) {
1387              file = fname;              /* before we can move the file, it needs to be closed first. */
1388          else if (!detached) {              gpg_file_data_release (out);
1389              /* If the signature is clear or normal, make sure we do not              out = NULL;
1390                 overwrite the original file if it exists. */              restore_original_name (c->output, res->file_name);
1391              if (file_exist_check (fname) == 0 && !overwrite_file (fname)) {          }
1392                  file = get_filesave_dlg (c->dlg, title, NULL, NULL);      }
1393                  if (!file)      sigres = gpgme_op_verify_result (ctx);
1394                      return WPTERR_GENERAL;      if (sigres && sigres->signatures)
1395              }          show_verify_result (sigres);    
1396              else      
1397                  file = fname;  leave:
1398          }      if (in)
1399      }          gpg_file_data_release (in);
1400      if (!file)      if (out)
1401          file = get_fileopen_dlg (c->dlg, title, NULL, NULL);          gpg_file_data_release (out);
1402      if (file) {      
1403          free_if_alloc (c->output);          return rc;
1404          c->output = m_strdup (file);  }
1405          if (!c->output)  
1406              BUG (NULL);  
1407      }  int
1408      else {  fm_sign (fm_state_t c, const char * name)
1409          msg_box (c->dlg, _("Invalid file name. Exit"), _("Verify"), MB_ERR);  {
1410          return WPTERR_GENERAL;        gpgme_ctx_t ctx = c->ctx;
1411      }      gpgme_error_t err;
1412      if (detached)      file_data_t in=NULL, out=NULL;
1413          c->sigmode = GPGME_SIG_MODE_DETACH;      char ext[5];
1414      else {      int rc = 0;
1415          if (strstr (name, ".asc"))  
1416              c->sigmode = GPGME_SIG_MODE_CLEAR;      if (!c->init_cb || !c->cache_cb) {
1417          else          set_gpg_passphrase_cb (&c->pass_cb, c->ctx,
1418              c->sigmode = GPGME_SIG_MODE_NORMAL;                                 GPG_CMD_SIGN, c->dlg, _("Signing"));
1419      }          c->init_cb = 1;
1420      return 0;      }
1421  }      
1422        free_if_alloc (c->output);
1423        c->output = new char[strlen (name) + 5 + 1];
1424  /* Verify the signature from the file @name. If @detached 1,      if (!c->output)
1425     it is assumed that a detached signature should be checked. */          BUG (NULL);
1426  int      strcpy (ext, file_get_extension (ctx, c->sigmode));
1427  fm_verify (fm_state_t c, int detached, const char *name)      strcpy (c->output, name);
1428  {      strcat (c->output, ext);
1429      gpgme_ctx_t ctx = c->ctx;      
1430      gpgme_error_t err;      if (!overwrite_file (c->output)) {
1431      gpgme_signature_t s;          rc = ask_filename (c, _("Enter filename for signed file"), NULL);
1432      gpgme_verify_result_t res;          if (rc)
1433      struct file_sig_ctx_s log;              goto leave;
1434      file_data_t in=NULL, out=NULL;      }
1435      int rc = 0;      
1436        err = gpg_file_data_new (name, F_DATA_READ, &in);
1437      if (strstr (name, ".sig"))      if (err)
1438          detached = 1;          goto leave;
1439        remove_crit_file_attrs (c->output, 0);
1440      if (get_output_file (c, name, detached))      err = gpg_file_data_new (c->output, F_DATA_WRITE, &out);
1441          return WPTERR_GENERAL;      if (err)
1442            goto leave;
1443      memset (&log, 0, sizeof (log));  
1444      log.file = m_strdup (name);      op_begin ();
1445      if (!log.file)      err = gpgme_op_sign (ctx, in->dat, out->dat, c->sigmode);
1446          BUG (NULL);      op_end ();
1447      file_verify_create_dlg ();      if (!c->cache_cb)
1448            release_gpg_passphrase_cb (&c->pass_cb);
1449      err = gpg_file_data_new (name, 1, &in);      if (c->pass_cb.cancel) {
1450      if (err)          rc = WPTERR_GENERAL;
1451          goto leave;          goto leave;
1452      err = gpg_file_data_new (c->output, detached? 1 : 0, &out);      }
1453      if (err)      if (err) {
1454          goto leave;          msg_box (c->dlg, gpgme_strerror (err), _("Sign"), MB_ERR);
1455            rc = WPTERR_GENERAL;
1456      if (c->sigmode == GPGME_SIG_MODE_DETACH)          goto leave;    
1457          err = gpgme_op_verify (ctx, in->dat, out->dat, NULL);      }
1458      else  
1459          err = gpgme_op_verify (ctx, in->dat, in->dat, out->dat);  leave:
1460      if (err) {      if (in)
1461          msg_box (c->dlg, gpgme_strerror (err), _("Verify"), MB_ERR);          gpg_file_data_release (in);
1462          rc = WPTERR_GENERAL;      if (out)
1463          goto leave;          gpg_file_data_release (out);
1464      }          return rc;
1465    }
1466      res = gpgme_op_verify_result (ctx);  
1467      for (s=res->signatures; s; s=s->next) {  
1468          log.sig = s;  static void
1469          fm_add_sig_stat (&log);  fm_add_sig_stat (file_sig_ctx_t log)
1470      }  {
1471      if (!c->output)      struct winpt_key_s key;
1472          c->output = m_strdup (name); /* for later use */      const char *kid;
1473    
1474  leave:      memset (&key, 0, sizeof (key));
1475      if (in)      kid = get_keyid_from_fpr (log->sig->fpr);
1476          gpg_file_data_release (in);      log->use_uid = 0;
1477      if (out)      if (!winpt_get_pubkey (kid, &key)) {
1478          gpg_file_data_release (out);          log->user_id = key.ext->uids->uid;
1479      if (log.file)          log->use_uid = 1;
1480          delete []log.file;      }
1481      return rc;      file_verify_add_state (log);
1482  }  }
1483    
1484    
1485  int  /* Verify a detached signature from the clipboard. */  
1486  fm_import (fm_state_t c, const char *name)  static int
1487  {  verify_pasted (listview_ctrl_t lv, fm_state_t ctx,
1488      gpgme_ctx_t ctx = c->ctx;                 const char *dat, int pos, HWND dlg)
1489      gpgme_error_t err;  {
1490      gpgme_import_result_t res;      FILE *fp;
1491      file_data_t keydata = NULL;      char stat[32];
1492      int rc = 0;      char file[256], *fname = NULL;
1493        int del_end = 0;
1494      free_if_alloc (c->output);  
1495      c->output = m_strdup (name);      listview_get_item_text (lv, pos, 0, stat, sizeof (stat)-1);
1496      if (!c->output)      listview_get_item_text (lv, pos, 1, file, sizeof (file)-1);
1497          BUG (NULL);      if (strcmp (stat, "UNKNOWN"))
1498            return 0;
1499      err = gpg_file_data_new (name, 1, &keydata);      fname = make_filename (NULL, file, "asc");
1500      if (err)      if (file_exist_check (fname) != 0) {
1501          goto leave;          fp = fopen (fname, "wb");
1502            if (fp == NULL) {
1503      err = gpgme_op_import (ctx, keydata->dat);              log_box (_("File Manager"), MB_ERR, "could not create '%s'", fname);
1504      if (err) {              free_if_alloc (fname);
1505          msg_box (c->dlg, gpgme_strerror (err), _("Import"), MB_ERR);              return WPTERR_GENERAL;
1506          rc = WPTERR_GENERAL;          }
1507          goto leave;          fwrite (dat, 1, strlen (dat), fp);
1508      }          fclose (fp);
1509            del_end = 1;
1510      res = gpgme_op_import_result (ctx);      }
1511      print_import_status (res);      fm_verify (ctx, 1, fname);
1512      if (res->no_user_id > 0) {      if (del_end)
1513          msg_box (c->dlg, _("Key without a self signature was dectected!\n"                remove (fname);
1514                             "(This key is NOT usable for encryption, etc)\n"      free_if_alloc (fname);
1515                             "\n"      return 0;
1516                             "Cannot import these key(s)!"), _("Import"), MB_INFO);  }
1517      }  
1518    
1519  leave:  /* Figure out if the clipboard contains a detached signature. */
1520      if (keydata)  int
1521          gpg_file_data_release (keydata);  fm_verify_pasted_detsig (listview_ctrl_t lv, HWND dlg)
1522      return rc;  {
1523  } /* fm_import */      fm_state_t ctx = NULL;
1524        char * dat=NULL;
1525        int i, fnd = 0;
1526  /* Export the selected keys from the File Manager to a file. */  
1527  int      dat = get_clip_text (NULL);
1528  fm_export (fm_state_t c)      if (!dat || !strstr (dat, "BEGIN PGP SIGNATURE")) {
1529  {          msg_box (dlg, _("Could not find detached signature in the clipboard."),
1530      int rc = 0, id = 0;                   _("File Manager"), MB_ERR);
1531      gpgme_ctx_t ctx = c->ctx;          free_if_alloc (dat);
1532      gpgme_error_t err;          return WPTERR_GENERAL;
1533      gpgme_key_t *rset = c->recp;      }
1534      file_data_t keydata = NULL;      /* XXX find a way to filter out bad signatures or just ignore all in
1535      const char *name, *s = NULL;             this case */
1536      char *p = NULL, *patt = NULL;      fm_state_new (&ctx);
1537        i = listview_get_curr_pos (lv);
1538      if (!rset || !rset[0]) {      if (i= -1) {
1539          msg_box (c->dlg, _("No key was selected for export."), _("Export"), MB_ERR);          verify_pasted (lv, ctx, dat, i, dlg);
1540          rc = WPTERR_GENERAL;          fnd = 1;
1541          goto leave;      }
1542      }      else {
1543            for (i=0; i < listview_count_items (lv, 0); i++) {
1544      if (rset[1] == NULL) { /* count == 1*/              verify_pasted (lv, ctx, dat, i, dlg);
1545          gpgme_key_t k = rset[0];              fnd = 1;
1546          const char *s = k->uids->name;          }
1547          p = new char[strlen (s)+1+8];      }
1548          if (!p)      if (!fnd)
1549              BUG (NULL);          msg_box (dlg, _("No files to check."), _("File Manager"), MB_INFO);
1550          strcpy (p, s );      free_if_alloc (dat);
1551          strcat (p, ".asc");      fm_state_release (ctx);
1552      }      return 0;
1553    }
1554      name = get_filename_dlg (c->dlg, FILE_SAVE, _("Choose Name for Key File"),  
1555                               NULL, p? p : NULL);  
1556                                /* Extract automatically the output file name from @name.
1557      if (!name)     If @detached is 1, a detached sig is assumed. */
1558          name = "keys.gpg";  static int
1559    get_output_file (fm_state_t c, const char *name, int detached)
1560      patt = gpg_keylist_to_pattern (rset, c->n_recp);  {
1561        const char *file = NULL;
1562      err = gpg_file_data_new (name, 0, &keydata);      const char *title;
1563      if (err)      char fname[384];
1564          goto leave;      
1565        if (detached)
1566      err = gpgme_op_export (ctx, patt, 0, keydata->dat);          title = _("Select Data File");
1567      if (err) {      else
1568          msg_box (c->dlg, gpgme_strerror (err), _("Export"), MB_ERR);          title = _("Selected Output File");
1569          rc = WPTERR_GENERAL;  
1570          goto leave;          if (stristr (name, ".sig") ||
1571      }          stristr (name, ".asc") ||
1572      log_box (_("GnuPG status"), MB_OK, _("Finished (Output: %s)"),  name);          stristr (name, ".gpg")) {
1573            _snprintf (fname, sizeof (fname) - 1, "%s", name);
1574  leave:          fname[strlen (fname) - 4] = '\0';
1575      if (keydata)          if (file_exist_check (fname) == 0 && detached)  
1576          gpg_file_data_release (keydata);              file = fname;
1577      if (patt)          else if (!detached) {
1578          free (patt);              /* If the signature is clear or normal, make sure we do not
1579      free_if_alloc (p);                 overwrite the original file if it exists. */
1580                        if (file_exist_check (fname) == 0 && !overwrite_file (fname)) {
1581      return rc;                  file = get_filesave_dlg (c->dlg, title, NULL, NULL);
1582  }                  if (!file)
1583                        return WPTERR_GENERAL;
1584                }
1585  int              else
1586  fm_parse_command_line (char *cmdl)                  file = fname;
1587  {          }
1588      fm_state_t ctx;      }
1589      const char *s;      if (!file)
1590      char *p, *fn = NULL;          file = get_fileopen_dlg (c->dlg, title, NULL, NULL);
1591      int count = 0, detached = 0;      if (file) {    
1592                free_if_alloc (c->output);    
1593      if( !cmdl || !*cmdl )          c->output = m_strdup (file);
1594          return 0;      }
1595        else {
1596      fm_state_new( &ctx );              msg_box (c->dlg, _("Invalid file name. Exit"), _("Verify"), MB_ERR);
1597      ctx->dlg = GetActiveWindow( );          return WPTERR_GENERAL;  
1598      ctx->cache_cb = 1;              }
1599            if (detached)
1600      p = cmdl;          c->sigmode = GPGME_SIG_MODE_DETACH;
1601      if( p && *p > 32 && !stristr( p, "winpt.exe" )      else {
1602                       && !strstr( p, "--" ) ) {          if (stristr (name, ".asc"))
1603          count++;              c->sigmode = GPGME_SIG_MODE_CLEAR;
1604          if (*p == '"') { /* need to remove quotes */          else
1605              fn = new char[strlen( p )];              c->sigmode = GPGME_SIG_MODE_NORMAL;
1606              if (!fn)      }
1607                  BUG( NULL );      return 0;
1608              memcpy( fn, p+1, strlen( p ) - 2 );  }
1609              fn[strlen( p ) -2] = '\0';  
1610          }  
1611          else  /* Verify the signature from the file @name. If @detached 1,
1612              fn = m_strdup (p);     it is assumed that a detached signature should be checked. */
1613          s = fm_get_file_type (fn);  int
1614          if (!s || !strcmp (s, "UNKNOWN"))  fm_verify (fm_state_t c, int detached, const char *name)
1615              s = gnupg_check_file_ext (fn);  {
1616          if (*s == 'U') {      gpgme_ctx_t ctx = c->ctx;
1617              log_box( _("File Manager"), MB_ERR, _("%s: no valid OpenPGP data found."), p );      gpgme_error_t err;
1618              return count;      gpgme_signature_t s;
1619          }      gpgme_verify_result_t res;
1620                struct file_sig_ctx_s log;
1621          switch( *s ) {      file_data_t in=NULL, out=NULL;
1622          case 'E': fm_decrypt (ctx, fn); break;      int rc = 0;
1623          case 'P': fm_import (ctx, fn); break;  
1624          case 'S':      if (stristr (name, ".sig"))
1625              if (s[1] == 'Y') {          detached = 1;
1626                  fm_decrypt (ctx, fn);  
1627                  break;      if (get_output_file (c, name, detached))
1628              }          return WPTERR_GENERAL;
1629              file_verify_use_event ();  
1630              if (s[1] == 'I') {      memset (&log, 0, sizeof (log));
1631                  if (strlen (s) == 13 && s[7] == 'D')      log.file = m_strdup (name);
1632                      detached = 1;      file_verify_create_dlg ();
1633                  fm_verify( ctx, detached, fn );  
1634              }      err = gpg_file_data_new (name, F_DATA_READ, &in);
1635              file_verify_wait( );      if (err)
1636              break;          goto leave;
1637          }      err = gpg_file_data_new (c->output,
1638      }                               detached? F_DATA_READ : F_DATA_WRITE, &out);
1639        if (err)
1640      memset( &ctx->pass_cb, 0, sizeof (ctx->pass_cb) );          goto leave;
1641      safe_free( fn );  
1642      fm_state_release( ctx );      op_begin ();
1643      return count;      if (c->sigmode == GPGME_SIG_MODE_DETACH)
1644  } /* fm_parse_command_line */          err = gpgme_op_verify (ctx, in->dat, out->dat, NULL);
1645        else
1646            err = gpgme_op_verify (ctx, in->dat, in->dat, out->dat);
1647  const char *      op_end ();
1648  default_dirname( const char * name )      if (err) {
1649  {          msg_box (c->dlg, gpgme_strerror (err), _("Verify"), MB_ERR);
1650      char * p = strrchr( name, '\\' );          rc = WPTERR_GENERAL;
1651      if( !p )          goto leave;
1652          return NULL;      }    
1653      return p+1;  
1654  } /* default_dirname */      res = gpgme_op_verify_result (ctx);
1655        for (s=res->signatures; s; s=s->next) {
1656            log.sig = s;
1657  int          fm_add_sig_stat (&log);
1658  fm_encrypt_directory( fm_state_t c, const char * name )      }
1659  {      if (!c->output)
1660      PK_FILE_LIST list = NULL;          c->output = m_strdup (name); /* for later use */
1661      WIN32_FIND_DATA findbuf;  
1662      HANDLE hd;  leave:
1663      const char * s;      if (in)
1664      char * patt = NULL, * p;          gpg_file_data_release (in);
1665      int rc = 0;      if (out)
1666                gpg_file_data_release (out);
1667      if( !is_directory( name ) )          free_if_alloc (log.file);
1668          return -1;      return rc;
1669      patt = new char[strlen( name ) + 4];  }
1670      if( !patt )  
1671          BUG( NULL );  
1672      strcpy( patt, name );  /* Import the keys from the file @name.
1673      strcat( patt, "\\*" );     Return value: 0 on success. */
1674      hd = FindFirstFile( patt, &findbuf );      int
1675      if( !hd ) {  fm_import (fm_state_t c, const char *name)
1676          free_if_alloc( patt );    {
1677          return -1;            gpgme_ctx_t ctx = c->ctx;
1678      }      gpgme_error_t err;
1679      if( strcmp( findbuf.cFileName, "." ) && strcmp( findbuf.cFileName, ".." ) ) {      gpgme_import_result_t res;
1680          p = make_filename( name, findbuf.cFileName, NULL );      file_data_t keydata = NULL;
1681          pk_list_add( &list, p );      int rc = 0;
1682          free_if_alloc( p );  
1683      }      free_if_alloc (c->output);
1684      while( FindNextFile( hd, &findbuf ) ) {      c->output = m_strdup (name);
1685          if( strcmp( findbuf.cFileName, "." ) && strcmp( findbuf.cFileName, ".." ) ) {  
1686              p = make_filename( name, findbuf.cFileName, NULL );      err = gpg_file_data_new (name, F_DATA_READ, &keydata);
1687              pk_list_add( &list, p );      if (err)
1688              free_if_alloc( p );          goto leave;
1689          }  
1690      }      op_begin ();
1691      s = get_filename_dlg( c->dlg, FILE_SAVE, _("Choose a Name for the Archive"),      err = gpgme_op_import (ctx, keydata->dat);
1692                            NULL, default_dirname( name ) );      op_end ();
1693      if( !s ) {      if (err) {
1694          msg_box( c->dlg, _("Invalid archive name. Exit."), _("Encrypt Directory"), MB_ERR );          msg_box (c->dlg, gpgme_strerror (err), _("Import"), MB_ERR);
1695          rc = -1;          rc = WPTERR_GENERAL;
1696          goto leave;          goto leave;
1697      }      }
1698    
1699      rc = pk_archiv_create( list, s );      res = gpgme_op_import_result (ctx);
1700      if( rc )      print_import_status (res);
1701          msg_box( c->dlg, _("Could not create zip archive."), _("Encrypt Directory"), MB_ERR );      if (res->no_user_id > 0) {
1702      else {          msg_box (c->dlg, _("Key without a self signature was dectected!\n"
1703          fm_encrypt( c, s, 0 );                             "(This key is NOT usable for encryption, etc)\n"
1704          unlink( s );                             "\n"
1705      }                             "Cannot import these key(s)!"), _("Import"), MB_INFO);
1706  leave:      }
1707      pk_list_free( list );  
1708      free_if_alloc( patt );  leave:
1709      return rc;      if (keydata)
1710  } /* fm_encrypt_directory */          gpg_file_data_release (keydata);
1711        return rc;
1712    }
1713  static int CALLBACK  
1714  fm_cmp_cb( LPARAM first, LPARAM second, LPARAM sortby )  
1715  {  /* Export the selected keys from the File Manager to a file. */
1716      const char * a = 0, * b = 0;  int
1717    fm_export (fm_state_t c)
1718      switch( (int)sortby ) {  {    
1719      case FM_SORT_STAT:      gpgme_ctx_t ctx = c->ctx;
1720          break;      gpgme_error_t err;
1721      case FM_SORT_NAME:      gpgme_key_t *rset = c->recp;
1722          break;      file_data_t keydata = NULL;
1723      case FM_SORT_OP:      const char *name;
1724          break;      char *p = NULL, *patt = NULL;
1725      }      int rc = 0;
1726      return stricmp( a, b );  
1727  } /* fm_cmp_cb */      if (!rset || !rset[0]) {
1728                    msg_box (c->dlg, _("No key was selected for export."), _("Export"), MB_ERR);
1729            rc = WPTERR_GENERAL;
1730  int          goto leave;
1731  fm_sort( listview_ctrl_t lv, int sortby )      }
1732  {  
1733      return listview_sort_items( lv, sortby, fm_cmp_cb );      if (rset[1] == NULL) /* count == 1*/
1734  } /* fm_sort */          p = km_gen_export_filename (rset[0]->subkeys->keyid+8, 0);
1735    
1736        name = get_filesave_dlg (c->dlg, _("Choose Name for Key File"),
1737  void                               NULL, p? p : NULL);
1738  fm_print_md( listview_ctrl_t lv, HWND dlg, int mdalgo )      if (!name)
1739  {          name = "keys.gpg";
1740      struct md_file_s mdctx;  
1741        patt = gpg_keylist_to_pattern (rset, c->n_recp);
1742      if( listview_count_items( lv, 0 ) == 0 )  
1743          return;      err = gpg_file_data_new (name, F_DATA_WRITE, &keydata);
1744      memset( &mdctx, 0, sizeof (mdctx) );      if (err)
1745      mdctx.lv = lv;          goto leave;
1746      mdctx.mdalgo = mdalgo;  
1747      DialogBoxParam( glob_hinst, (LPCTSTR)IDD_WINPT_FILE_MDSUM, dlg,      op_begin ();
1748                      mdsum_dlg_proc, (LPARAM)&mdctx );      err = gpgme_op_export (ctx, patt, 0, keydata->dat);
1749  } /* fm_print_md */      op_end ();
1750        if (err) {
1751            msg_box (c->dlg, gpgme_strerror (err), _("Export"), MB_ERR);
1752  int          rc = WPTERR_GENERAL;
1753  fm_send_file (listview_ctrl_t lv)          goto leave;    
1754  {      }
1755      char buf[128];      log_box (_("GnuPG status"), MB_OK, _("Finished (Output: %s)"),  name);
1756      int rc;  
1757    leave:
1758      rc = listview_get_item_text (lv, -1, 1, buf, sizeof (buf)-1);      if (keydata)
1759      if (rc == -1)          gpg_file_data_release (keydata);
1760          return 0;      safe_free (patt);
1761      /*mapi_send_ascfile (buf); XXX */      free_if_alloc (p);
1762      return 0;      return rc;
1763  }  }
1764    
1765    
1766    /* Parse the command line and process the given file. */  
1767    int
1768    fm_parse_command_line (char *cmdl)
1769    {
1770        fm_state_t ctx;
1771        const char *s;
1772        char *p, *fn = NULL;
1773        int count = 0, detached = 0;
1774        int type;
1775        
1776        if (!cmdl || !*cmdl)
1777            return 0;
1778    
1779        fm_state_new (&ctx);    
1780        ctx->dlg = GetActiveWindow ();
1781        ctx->cache_cb = 1;
1782        
1783        p = cmdl;
1784        if (p && *p > 32 && !stristr (p, "winpt.exe")
1785                         && !strstr (p, "--" )) {
1786            count++;
1787            if (*p == '"') { /* need to remove quotes */
1788                fn = new char[strlen (p)];
1789                if (!fn)
1790                    BUG (NULL);
1791                memcpy (fn, p+1, strlen (p) - 2);
1792                fn[strlen (p) -2] = '\0';
1793            }
1794            else
1795                fn = m_strdup (p);
1796            s = fm_get_file_type (fn, &type);
1797            if (!s || !strcmp (s, "UNKNOWN"))
1798                s = gnupg_check_file_ext (fn, &type);
1799            if (type == PGP_NONE) {
1800                log_box (_("File Manager"), MB_ERR,
1801                         _("%s: no valid OpenPGP data found."), p);
1802                free_if_alloc (fn);
1803                return count;
1804            }
1805            switch (type) {
1806            case PGP_MESSAGE:
1807                fm_decrypt (ctx, fn);
1808                break;
1809    
1810            case PGP_PUBKEY:
1811            case PGP_SECKEY:
1812                fm_import (ctx, fn);
1813                break;
1814    
1815            case PGP_SIG:
1816            case PGP_CLEARSIG:
1817                if (type == PGP_SIG)    
1818                    detached = 1;
1819                fm_verify (ctx, detached, fn);
1820                file_verify_wait ();
1821                break;
1822    
1823            default:
1824                break;
1825            }
1826        }
1827    
1828        wipememory (&ctx->pass_cb, sizeof (ctx->pass_cb));
1829        free_if_alloc (fn);
1830        fm_state_release (ctx);
1831        return count;
1832    }
1833    
1834    
1835    /* Extract the last folder name from @name. */
1836    const char*
1837    default_dirname (const char *name)
1838    {
1839        char *p = strrchr (name, '\\');
1840        if (!p)
1841            return NULL;
1842        return p+1;
1843    }
1844    
1845    
1846    /* Store all selected files from @lv in a zip archive
1847       and encrypt the zip archive then.
1848       Return value: 0 on success. */
1849    int
1850    fm_encrypt_into_zip (fm_state_t ctx, listview_ctrl_t lv)
1851    {
1852        PK_FILE_LIST list=NULL;
1853        const char *outfile, *ext;
1854        char *out_enc;
1855        int nitems;
1856        int i, idx = -1;
1857        int rc;
1858    
1859        nitems = listview_count_items (lv, 0);
1860        if (!nitems) {
1861            msg_box (NULL, _("Encrypting into a ZIP archive makes sense with multiple files"),
1862                     _("File Manager"), MB_ERR);
1863            return WPTERR_GENERAL;
1864        }
1865    
1866        outfile = get_filesave_dlg (ctx->dlg, _("Choose File Name for Output"),
1867                                    NULL, "Encrypted_Files.zip");
1868        if (!outfile)
1869            return WPTERR_GENERAL;
1870    
1871        for (i=0; i < nitems; i++) {
1872            char name[300];
1873            if (!listview_get_item_state (lv, i))
1874                continue;
1875            if (idx == -1)
1876                idx = i;
1877            listview_get_item_text (lv, i, 1, name, sizeof (name)-1);
1878            pk_list_add (&list, name);
1879        }    
1880    
1881        pk_archiv_create (list, outfile);
1882        pk_list_free (list);
1883    
1884        rc = fm_encrypt (ctx, outfile, 0);
1885        DeleteFile (outfile);
1886        if (rc)
1887            return rc;
1888    
1889        ext = file_get_extension (ctx->ctx, ctx->sigmode)+1;
1890        out_enc = make_filename (NULL, outfile, ext);
1891        fm_set_status (lv, idx, FM_ENCRYPT, (gpgme_sig_mode_t)0, 1, out_enc);
1892        free_if_alloc (out_enc);
1893    
1894        for (i=0; i < nitems; i++) {
1895            if (i != idx && listview_get_item_state (lv, i))
1896                listview_del_item (lv, i);
1897        }
1898        return 0;
1899    }
1900    
1901    
1902    int
1903    fm_encrypt_directory (fm_state_t c, const char *name)
1904    {
1905        PK_FILE_LIST list = NULL;
1906        WIN32_FIND_DATA findbuf;
1907        HANDLE hd;
1908        const char * s;
1909        char * patt = NULL, * p;
1910        int rc = 0;
1911        
1912        if (!is_directory (name))
1913            return -1;
1914        patt = new char[strlen (name) + 4];
1915        if (!patt)
1916            BUG (NULL);
1917        strcpy (patt, name);
1918        strcat (patt, "\\*");
1919        hd = FindFirstFile (patt, &findbuf);
1920        if (!hd) {
1921            free_if_alloc (patt);
1922            return WPTERR_GENERAL;
1923        }
1924        if( strcmp( findbuf.cFileName, "." ) && strcmp( findbuf.cFileName, ".." ) ) {
1925            p = make_filename( name, findbuf.cFileName, NULL );
1926            pk_list_add( &list, p );
1927            free_if_alloc( p );
1928        }
1929        while( FindNextFile( hd, &findbuf ) ) {
1930            if( strcmp( findbuf.cFileName, "." ) && strcmp( findbuf.cFileName, ".." ) ) {
1931                p = make_filename( name, findbuf.cFileName, NULL );
1932                pk_list_add( &list, p );
1933                free_if_alloc( p );
1934            }
1935        }
1936        s = get_filesave_dlg (c->dlg, _("Choose a Name for the Archive"),
1937                              NULL, default_dirname (name));
1938        if( !s ) {
1939            msg_box( c->dlg, _("Invalid archive name. Exit."), _("Encrypt Directory"), MB_ERR );
1940            rc = -1;
1941            goto leave;
1942        }
1943    
1944        rc = pk_archiv_create( list, s );
1945        if( rc )
1946            msg_box( c->dlg, _("Could not create zip archive."), _("Encrypt Directory"), MB_ERR );
1947        else {
1948            fm_encrypt( c, s, 0 );
1949            remove( s );
1950        }
1951    leave:
1952        FindClose (hd);
1953        pk_list_free( list );
1954        free_if_alloc( patt );
1955        return rc;
1956    }
1957    
1958    
1959    static int CALLBACK
1960    fm_cmp_cb (LPARAM first, LPARAM second, LPARAM sortby)
1961    {
1962        const char *a = 0;
1963        const char *b = 0;
1964    
1965        switch ((int)sortby) {
1966        case FM_SORT_STAT:
1967            break;
1968        case FM_SORT_NAME:
1969            break;
1970        case FM_SORT_OP:
1971            break;
1972        }
1973        return stricmp (a, b);
1974    }
1975            
1976    
1977    /* Sort the list items from @lv with the mode given by @sortby. */
1978    int
1979    fm_sort (listview_ctrl_t lv, int sortby)
1980    {
1981        return listview_sort_items (lv, sortby, fm_cmp_cb);
1982    }
1983    
1984    
1985    /* Start the 'print md' dialog. Pass over the listview control
1986       @lv and the digest algo @mdalgo. */
1987    void
1988    fm_print_md (listview_ctrl_t lv, HWND dlg, int mdalgo)
1989    {
1990        struct md_file_s mdctx;
1991    
1992        if (listview_count_items (lv, 0) == 0)
1993            return;
1994        memset (&mdctx, 0, sizeof (mdctx));
1995        mdctx.lv = lv;
1996        mdctx.mdalgo = mdalgo;
1997        DialogBoxParam (glob_hinst, (LPCTSTR)IDD_WINPT_FILE_MDSUM, dlg,
1998                        mdsum_dlg_proc, (LPARAM)&mdctx);
1999    }
2000    
2001    
2002    /* Send the selected file in @lv via MAPI to a mail recipient. */
2003    int
2004    fm_send_file (listview_ctrl_t lv)
2005    {
2006        char buf[128];
2007        int rc;
2008    
2009        rc = listview_get_item_text (lv, -1, 1, buf, sizeof (buf)-1);
2010        if (rc != -1)
2011            mapi_send_ascfile (buf);
2012        return 0;
2013    }

Legend:
Removed from v.28  
changed lines
  Added in v.214

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26