/[winpt]/trunk/Src/wptGPGME.cpp
ViewVC logotype

Diff of /trunk/Src/wptGPGME.cpp

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 20 by twoaday, Wed Jul 27 11:17:22 2005 UTC revision 219 by twoaday, Sat May 27 08:56:00 2006 UTC
# Line 1  Line 1 
1  /* wptGPGME.cpp - WinPT GPGME interface  /* wptGPGME.cpp - WinPT GPGME interface
2   *      Copyright (C) 2001-2004 Timo Schulz   *      Copyright (C) 2001-2006 Timo Schulz
3   *   *
4   * This file is part of WinPT.   * This file is part of WinPT.
5   *   *
6   * WinPT is free software; you can redistribute it and/or   * WinPT is free software; you can redistribute it and/or
7   * modify it under the terms of the GNU General Public License   * modify it under the terms of the GNU General Public License
8   * as published by the Free Software Foundation; either version 2   * as published by the Free Software Foundation; either version 2
9   * of the License, or (at your option) any later version.   * of the License, or (at your option) any later version.
10   *     *  
11   * WinPT is distributed in the hope that it will be useful,   * WinPT is distributed in the hope that it will be useful,
12   * but WITHOUT ANY WARRANTY; without even the implied warranty of   * but WITHOUT ANY WARRANTY; without even the implied warranty of
13   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14   * General Public License for more details.   * General Public License for more details.
15   *   *
16   * You should have received a copy of the GNU General Public License   * You should have received a copy of the GNU General Public License
17   * along with WinPT; if not, write to the Free Software Foundation,   * along with WinPT; if not, write to the Free Software Foundation,
18   * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA   * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
19   */   */
20    #ifdef HAVE_CONFIG_H
21  #include <sys/types.h>  #include <config.h>
22  #include <windows.h>  #endif
23    
24  #include "../resource.h"  #include <sys/types.h>
25  #include "wptNLS.h"  #include <windows.h>
26  #include "wptGPG.h"  
27  #include "wptErrors.h"  #include "resource.h"
28  #include "wptTypes.h"  #include "wptNLS.h"
29  #include "wptW32API.h"  #include "wptGPG.h"
30  #include "wptVersion.h"  #include "wptErrors.h"
31  #include "wptCommonCtl.h"  #include "wptTypes.h"
32  #include "wptContext.h"  #include "wptW32API.h"
33  #include "wptRegistry.h"  #include "wptVersion.h"
34  #include "wptDlgs.h"  #include "wptCommonCtl.h"
35    #include "wptContext.h"
36  #include "openpgp.h"  #include "wptRegistry.h"
37    #include "wptDlgs.h"
38  BOOL CALLBACK  keycache_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam);  
39  void progress_cleanup (progress_filter_s * pfx);  #include "openpgp.h"
40    
41  static gpgme_keycache_t pub = NULL;  BOOL CALLBACK  keycache_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam);
42  static gpgme_keycache_t sec = NULL;  void progress_cleanup (progress_filter_s * pfx);
43  static unsigned int reload = 0;  
44    /* Global GPG key cache contexts. */
45    static gpg_keycache_t pub = NULL;
46  void  static gpg_keycache_t sec = NULL;
47  keycache_reload (HWND dlg)  static char *gpg_secring = NULL;
48  {        
49      refresh_cache_s rcs = {0};  
50    int
51      rcs.kr_reload = rcs.kr_update = 1;  keycache_not_available (void)
52      /*rcs.tr_update = 1;*/  {
53      DialogBoxParam( glob_hinst, (LPCSTR)IDD_WINPT_KEYCACHE, dlg,                                              return pub == NULL;
54                      keycache_dlg_proc, (LPARAM)&rcs );  }
55  } /* keycache_reload */  
56    /* Release both key cache objects. If @cleanup is 1,
57  void     also release other global structs. */
58  keycache_release (void)  void
59  {  keycache_release (int cleanup)
60      int n = gpgme_keycache_count (pub);  {
61      char tmpbuf[64];      int n = gpg_keycache_get_size (pub);
62        char tmpbuf[64];
63      sprintf (tmpbuf, "%d", n);  
64      set_reg_key (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys", tmpbuf);      /* XXX: update the value when the cache has changed. */
65        sprintf (tmpbuf, "%d", n);
66      if (pub) {      set_reg_key (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys", tmpbuf);
67          gpgme_keycache_release( pub );  
68          pub = NULL;      if (pub) {
69      }          gpg_keycache_release (pub);
70      if (sec) {          pub = NULL;
71          gpgme_keycache_release( sec );      }
72          sec = NULL;      if (sec) {
73      }          gpg_keycache_release (sec);
74  } /* keycache_release */          sec = NULL;
75        }
76        if (cleanup)
77  gpgme_error_t          safe_free (gpg_secring);
78  keycache_update (int is_sec, const char *keyid)  }
79  {  
80      gpgme_keycache_t ctx = pub;  
81      if (is_sec)  /* Update the key with the keyid @keyid in the key cache.
82          ctx = sec;     If @is_sec is 1, the secret key cache is used. */
83      return gpgme_keycache_update_key (ctx, is_sec, pub, keyid);  gpgme_error_t
84  }  keycache_update (int is_sec, const char *keyid)
85    {
86        gpg_keycache_t ctx = pub;
87  gpgme_error_t      gpgme_error_t err;
88  keycache_init (const char *pubring, const char * secring)  
89  {      if (is_sec)
90      struct progress_filter_s pfx;          ctx = sec;
91      gpgme_error_t err;      err = gpg_keycache_update_key (ctx, is_sec, pub, keyid);
92      int val = 0;      if (is_sec)
93      char * p;          gpg_keycache_prepare_single (ctx, keyid, NULL, gpg_secring);
94        return err;
95      if (reload) {  }
96          keycache_release ();  
97          reload = 0;  
98      }  /* Initialize both cache contexts. Use @pubring for the public
99      p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys");     keyring and @secring for the secret keyring. */
100      if (p && *p != ' ') {  gpgme_error_t
101          val = atoi (p);  keycache_init (const char *pubring, const char *secring)
102          free_if_alloc (p);  {
103          memset (&pfx, 0, sizeof pfx);      struct progress_filter_s pfx;
104      }      gpgme_error_t err;
105        int val = 0;
106      err = gpgme_keycache_new (&pub);      char *p;
107      if (err)  
108          return err;      if (secring != NULL) {
109      if (val != 0)          free_if_alloc (gpg_secring);
110          gpgme_keycache_set_cb (pub, progress_callback, &pfx, val);          gpg_secring = get_gnupg_keyring (0, NO_STRICT);
111      err = gpgme_keycache_new (&sec);      }
112      if (!err)      
113          err = gpgme_keycache_init (pub, NULL, 0);      p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys");
114      if (!err)      if (p && *p != ' ') {
115          err = gpgme_keycache_init( sec, NULL, 1 );          val = atoi (p);
116      if( !err && pubring && *pubring )          free_if_alloc (p);      
117          err = gpgme_keycache_prepare( pub, pubring, NULL );      }
118      if( !err && secring && * secring )  
119          err = gpgme_keycache_prepare( sec, NULL, secring );      memset (&pfx, 0, sizeof (pfx));
120      if (!err)      keycache_release (0); /* Release old contexts first. */
121          gpgme_keycache_sync (pub, sec);  
122      if (val != 0)      err = gpg_keycache_new (&pub);
123          progress_cleanup (&pfx);      if (err)
124      return err;          return err;
125  } /* keycache_init */      if (val != 0)
126            gpg_keycache_set_cb (pub, progress_callback, &pfx, val);
127        err = gpg_keycache_new (&sec);
128  void      if (!err)
129  keycache_set_reload( int yes )          err = gpg_keycache_init (pub, NULL, 0);
130  {      if (!err)
131      reload = yes;          err = gpg_keycache_init (sec, NULL, 1);
132  } /* keycache_set_reload */      if (!err && pubring && *pubring)
133            err = gpg_keycache_prepare (pub, pubring, NULL);
134        if (!err && secring && * secring)
135  int          err = gpg_keycache_prepare (sec, NULL, secring);
136  keycache_get_reload( void )      if (!err)
137  {          gpg_keycache_sync (pub, sec);
138      return reload;      if (val != 0)
139  } /* keycache_get_reload */          progress_cleanup (&pfx);
140        return err;
141    }
142  gpgme_keycache_t  
143  keycache_get_ctx( int is_pub )  
144  {  /* Return the public cache context if @is_pub is set
145      return is_pub? pub : sec;     the secre cache context otherwise. */
146  } /* keycache_get_ctx */  gpg_keycache_t
147    keycache_get_ctx (int is_pub)
148    {
149  static int      gpg_keycache_t ctx;
150  get_key( const char *keyid, gpgme_key_t *r_key, int secret )  
151  {      ctx = is_pub? pub : sec;
152      gpgme_keycache_t cache;      if (!ctx)
153      gpgme_error_t err;          BUG (0);
154      int mode = secret? KEYCACHE_PRV : KEYCACHE_PUB;      return ctx;
155    }
156      if( !keyid )  
157          return WPTERR_GENERAL;  
158      if( r_key )  /* Get the GPG key with keyid @keyid from the cache. Return it
159          *r_key = NULL;     in @r_key on success. */
160      cache = keycache_get_ctx( mode );  static gpgme_error_t
161      if( !cache )  get_key_from_cache (const char *keyid, int secret, gpgme_key_t *r_key,
162          BUG( NULL );                      struct keycache_s **c)
163      err = gpgme_keycache_find_key( cache, keyid, 0, r_key );  {
164      if( err )      gpg_keycache_t cache;
165          return WPTERR_GENERAL;      gpgme_error_t err;
166      return 0;      int mode = secret? KEYCACHE_PRV : KEYCACHE_PUB;
167  } /* get_key */  
168        if (!keyid)
169            return gpg_error (GPG_ERR_INV_VALUE);
170  static int      if (r_key)
171  get_key2( const char * keyid, gpgme_key_t * r_key, int secret )          *r_key = NULL;
172  {      cache = keycache_get_ctx (mode);
173      gpg_iobuf_t inp;      if (!c)
174      char * p;          err = gpg_keycache_find_key (cache, keyid, 0, r_key);
175      int rc;      else
176            err = gpg_keycache_find_key2 (cache, keyid, 0, r_key, c);
177      p = get_gnupg_keyring (1, !NO_STRICT);      return err;
178      if( !p )  }
179          BUG( NULL );  
180    
181      inp = gpg_iobuf_open( p );  /* Release the internal key structure.
182      if( !inp ) {     If allocated is 0, assume fixed cache item. */
183          const char *s = winpt_strerror( WPTERR_FILE_OPEN );  void
184          log_box( _("WinPT Error"), 0, "%s: %s", p, s );  winpt_release_pubkey (winpt_key_s *k)
185          free_if_alloc( p );  {
186          return NULL;      /*log_box ("debug", 0, "alloc %d", k->allocated);*/
187      }      if (!k->allocated)
188      gpg_iobuf_ioctl( inp, 3, 1, NULL ); /* disable cache */          return;
189      rc = gpgme_getkey_bykeyid( inp, keyid, r_key );      gpg_keycache_item_release (k->ext);
190        k->ext = NULL;
191      gpg_iobuf_close( inp );      k->allocated = 0;
192      free_if_alloc( p );  }
193      return rc;  
194  } /* get_key2 */  
195    /* Search the public key with @keyid as the keyid in the cache and
196       return the item in @k. */
197  int  gpgme_error_t
198  get_pubkey( const char *keyid, gpgme_key_t *ret_key )  winpt_get_pubkey (const char *keyid, winpt_key_s *k)
199  {  {
200      int rc = 0;      gpgme_error_t err = gpg_error (GPG_ERR_NO_ERROR);
201        
202      if( pub && sec )      if (pub)
203          rc = get_key( keyid, ret_key, 0 );          err = get_key_from_cache (keyid, 0, &k->ctx, &k->ext);
204      else      else
205          rc = get_key2( keyid, ret_key, 0 );          err = gpg_keycache_fetch_key (keyid, 0, &k->ctx, &k->ext);
206      return rc;      if (err)
207  } /* get_pubkey */          return err;
208        k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&
209                    strlen (k->ctx->subkeys->fpr) == 32;
210  int      k->is_protected = k->ext->gloflags.is_protected;
211  get_seckey( const char *keyid, gpgme_key_t *ret_skey )      k->keyid = k->ctx->subkeys->keyid+8;
212  {      k->uid = k->ext->uids->uid;
213      int rc = 0;      k->allocated = pub? 0 : 1;
214        return 0;
215      if( pub && sec )  }
216          rc = get_key( keyid, ret_skey, 1 );  
217      else  
218          rc = get_key2( keyid, ret_skey, 1 );  gpgme_error_t
219      return rc;  winpt_get_seckey (const char *keyid, winpt_key_s *k)
220  } /* get_seckey */  {
221        gpgme_error_t err;
222    
223  int      if (sec)
224  count_insecure_elgkeys (void)          err = get_key_from_cache (keyid, 1, &k->ctx, &k->ext);
225  {      else
226      gpgme_keycache_t pc;          err = gpg_keycache_fetch_key (keyid, 1, &k->ctx, &k->ext);
227      gpgme_key_t key;      if (err)
228      int n=0;          return err;
229        k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&
230      pc = keycache_get_ctx (1);                  strlen (k->ctx->subkeys->fpr) == 32;
231      if (!pc)      k->is_protected = k->ext->gloflags.is_protected;
232          BUG (0);      k->keyid = k->ctx->subkeys->keyid+8;
233      while (!gpgme_keycache_next_key (pc, 0, &key)) {      k->uid = k->ext->uids->uid;
234          if (gpgme_key_get_ulong_attr (key, GPGME_ATTR_ALGO, NULL, 0)      k->allocated = sec? 0 : 1;
235              == GPGME_PK_ELG_ES)      return 0;
236              n++;  }
237      }  
238      gpgme_keycache_rewind (pc);  
239      return n;  gpgme_error_t
240  }  get_pubkey (const char *keyid, gpgme_key_t *ret_key)
241    {
242        return get_key_from_cache (keyid, 0, ret_key, NULL);
243    }
244    
245    
246    gpgme_error_t
247    get_seckey (const char *keyid, gpgme_key_t *ret_skey)
248    {
249        return get_key_from_cache (keyid, 1, ret_skey, NULL);
250    }
251    
252    
253    
254    /* Map the signature summary in @sum to signature status table index.
255       Return value: index to table. */
256    static int
257    sigsum_to_index (gpgme_sigsum_t sum)
258    {
259        if ((sum & GPGME_SIGSUM_VALID) && (sum & GPGME_SIGSUM_KEY_REVOKED))
260            return 7;
261        if ((sum & GPGME_SIGSUM_VALID) && (sum & GPGME_SIGSUM_SIG_EXPIRED))
262            return 6;
263        if (sum & GPGME_SIGSUM_GREEN)
264            return 1;
265        else if (sum & GPGME_SIGSUM_RED)
266            return 2;
267        else if (sum & GPGME_SIGSUM_KEY_MISSING)
268            return 3;
269        return 0;
270    }
271    
272    
273    /* Return a humand readable description for the signature status @sum. */
274    const char*
275    get_gpg_sigstat (gpgme_sigsum_t sum)
276    {
277        const char *gpg_sigstat[] = {
278            _("Error during verification process."),
279            _("The signature is good."),
280            _("The signature is BAD!"),
281            _("The signature could not be checked due to a missing key."),
282            _("No valid OpenPGP signature."),
283            _("Signature Error"),
284            _("Good Signature (Expired Key)"),
285            _("Good Signature (Revoked Key)"),
286            NULL
287        };
288        const unsigned int mask = 8;
289    
290        return gpg_sigstat[sigsum_to_index (sum) % mask];
291    }
292    
293    
294    bool
295    secret_key_available (void)
296    {
297        if (!sec || gpg_keycache_get_size (sec) == 0)
298            return false;
299        return true;
300    }

Legend:
Removed from v.20  
changed lines
  Added in v.219

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26