/[winpt]/trunk/Src/wptGPGME.cpp
ViewVC logotype

Diff of /trunk/Src/wptGPGME.cpp

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 19 by twoaday, Fri May 20 08:39:15 2005 UTC revision 208 by twoaday, Mon May 1 12:22:18 2006 UTC
# Line 1  Line 1 
1  /* wptGPGME.cpp - WinPT GPGME interface  /* wptGPGME.cpp - WinPT GPGME interface
2   *      Copyright (C) 2001-2004 Timo Schulz   *      Copyright (C) 2001-2005 Timo Schulz
3   *   *
4   * This file is part of WinPT.   * This file is part of WinPT.
5   *   *
6   * WinPT is free software; you can redistribute it and/or   * WinPT is free software; you can redistribute it and/or
7   * modify it under the terms of the GNU General Public License   * modify it under the terms of the GNU General Public License
8   * as published by the Free Software Foundation; either version 2   * as published by the Free Software Foundation; either version 2
9   * of the License, or (at your option) any later version.   * of the License, or (at your option) any later version.
10   *     *  
11   * WinPT is distributed in the hope that it will be useful,   * WinPT is distributed in the hope that it will be useful,
12   * but WITHOUT ANY WARRANTY; without even the implied warranty of   * but WITHOUT ANY WARRANTY; without even the implied warranty of
13   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14   * General Public License for more details.   * General Public License for more details.
15   *   *
16   * You should have received a copy of the GNU General Public License   * You should have received a copy of the GNU General Public License
17   * along with WinPT; if not, write to the Free Software Foundation,   * along with WinPT; if not, write to the Free Software Foundation,
18   * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA   * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
19   */   */
20    #ifdef HAVE_CONFIG_H
21  #include <sys/types.h>  #include <config.h>
22  #include <windows.h>  #endif
23    
24  #include "../resource.h"  #include <sys/types.h>
25  #include "wptNLS.h"  #include <windows.h>
26  #include "wptGPG.h"  
27  #include "wptErrors.h"  #include "resource.h"
28  #include "wptTypes.h"  #include "wptNLS.h"
29  #include "wptW32API.h"  #include "wptGPG.h"
30  #include "wptVersion.h"  #include "wptErrors.h"
31  #include "wptCommonCtl.h"  #include "wptTypes.h"
32  #include "wptContext.h"  #include "wptW32API.h"
33  #include "wptRegistry.h"  #include "wptVersion.h"
34  #include "wptDlgs.h"  #include "wptCommonCtl.h"
35    #include "wptContext.h"
36  #include "openpgp.h"  #include "wptRegistry.h"
37    #include "wptDlgs.h"
38  BOOL CALLBACK  keycache_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam);  
39  void progress_cleanup (progress_filter_s * pfx);  #include "openpgp.h"
40    
41  static gpgme_keycache_t pub = NULL;  BOOL CALLBACK  keycache_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam);
42  static gpgme_keycache_t sec = NULL;  void progress_cleanup (progress_filter_s * pfx);
43  static unsigned int reload = 0;  
44    static gpg_keycache_t pub = NULL;
45    static gpg_keycache_t sec = NULL;
46  void  static char *gpg_secring = NULL;
47  keycache_reload (HWND dlg)  
48  {        
49      refresh_cache_s rcs = {0};  /* Reload the key cache. */
50    void
51      rcs.kr_reload = rcs.kr_update = 1;  keycache_reload (HWND dlg)
52      rcs.tr_update = 1;  {      
53      DialogBoxParam( glob_hinst, (LPCSTR)IDD_WINPT_KEYCACHE, dlg,                                              refresh_cache_s rcs;
54                      keycache_dlg_proc, (LPARAM)&rcs );  
55  } /* keycache_reload */      memset (&rcs, 0, sizeof rcs);
56        rcs.kr_reload = rcs.kr_update = 1;
57  void      rcs.tr_update = 0;
58  keycache_release (void)      DialogBoxParam (glob_hinst, (LPCSTR)IDD_WINPT_KEYCACHE, dlg,                                        
59  {                      keycache_dlg_proc, (LPARAM)&rcs);
60      int n = gpgme_keycache_count (pub);  }
61      char tmpbuf[64];  
62    
63      sprintf (tmpbuf, "%d", n);  /* Release both key cache objects. If @cleanup is 1,
64      set_reg_key (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys", tmpbuf);     also release other global structs. */
65    void
66      if (pub) {  keycache_release (int cleanup)
67          gpgme_keycache_release( pub );  {
68          pub = NULL;      int n = gpg_keycache_get_size (pub);
69      }      char tmpbuf[64];
70      if (sec) {  
71          gpgme_keycache_release( sec );      /* XXX: update the value when the cache has changed. */
72          sec = NULL;      sprintf (tmpbuf, "%d", n);
73      }      set_reg_key (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys", tmpbuf);
74  } /* keycache_release */  
75        if (pub) {
76            gpg_keycache_release (pub);
77  gpgme_error_t          pub = NULL;
78  keycache_update (const char *keyid)      }
79  {      if (sec) {
80      return gpgme_keycache_update_key (pub, keyid);          gpg_keycache_release (sec);
81  }          sec = NULL;
82        }
83        if (cleanup) {
84  gpgme_error_t          if (gpg_secring)
85  keycache_init (const char *pubring, const char * secring)              free (gpg_secring);
86  {          gpg_secring = NULL;
87      struct progress_filter_s pfx;      }
88      gpgme_error_t err;  }
89      int val = 0;  
90      char * p;  
91    /* Update the key with the keyid @keyid in the key cache.
92      if (reload) {     If @is_sec is 1, the secret key cache is used. */
93          keycache_release ();  gpgme_error_t
94          reload = 0;  keycache_update (int is_sec, const char *keyid)
95      }  {
96      p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys");      gpg_keycache_t ctx = pub;
97      if (p && *p != ' ') {      gpgme_error_t err;
98          val = atoi (p);  
99          free_if_alloc (p);      if (is_sec)
100          memset (&pfx, 0, sizeof pfx);          ctx = sec;
101      }      err = gpg_keycache_update_key (ctx, is_sec, pub, keyid);
102        if (is_sec)
103      err = gpgme_keycache_new (&pub);          gpg_keycache_prepare_single (ctx, keyid, NULL, gpg_secring);
104      if (err)      return err;
105          return err;  }
106      if (val != 0)  
107          gpgme_keycache_set_cb (pub, progress_callback, &pfx, val);  
108      err = gpgme_keycache_new (&sec);  /* Initialize both cache contexts. Use @pubring for the public
109      if (!err)     keyring and @secring for the secret keyring. */
110          err = gpgme_keycache_init (pub, NULL, 0);  gpgme_error_t
111      if (!err)  keycache_init (const char *pubring, const char *secring)
112          err = gpgme_keycache_init( sec, NULL, 1 );  {
113      if( !err && pubring && *pubring )      struct progress_filter_s pfx;
114          err = gpgme_keycache_prepare( pub, pubring, NULL );      gpgme_error_t err;
115      if( !err && secring && * secring )      int val = 0;
116          err = gpgme_keycache_prepare( sec, NULL, secring );      char *p;
117      if (!err)  
118          gpgme_keycache_sync (pub, sec);      if (secring != NULL) {
119      if (val != 0)          free_if_alloc (gpg_secring);
120          progress_cleanup (&pfx);          gpg_secring = get_gnupg_keyring (0, NO_STRICT);
121      return err;      }
122  } /* keycache_init */      
123        p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys");
124        if (p && *p != ' ') {
125  void          val = atoi (p);
126  keycache_set_reload( int yes )          free_if_alloc (p);      
127  {      }
128      reload = yes;  
129  } /* keycache_set_reload */      memset (&pfx, 0, sizeof (pfx));
130        /* Release old contexts first. */
131        keycache_release (0);
132  int  
133  keycache_get_reload( void )      err = gpg_keycache_new (&pub);
134  {      if (err)
135      return reload;          return err;
136  } /* keycache_get_reload */      if (val != 0)
137            gpg_keycache_set_cb (pub, progress_callback, &pfx, val);
138        err = gpg_keycache_new (&sec);
139  gpgme_keycache_t      if (!err)
140  keycache_get_ctx( int is_pub )          err = gpg_keycache_init (pub, NULL, 0);
141  {      if (!err)
142      return is_pub? pub : sec;          err = gpg_keycache_init (sec, NULL, 1);
143  } /* keycache_get_ctx */      if (!err && pubring && *pubring)
144            err = gpg_keycache_prepare (pub, pubring, NULL);
145        if (!err && secring && * secring)
146  static int          err = gpg_keycache_prepare (sec, NULL, secring);
147  get_key( const char *keyid, gpgme_key_t *r_key, int secret )      if (!err)
148  {          gpg_keycache_sync (pub, sec);
149      gpgme_keycache_t cache;      if (val != 0)
150      gpgme_error_t err;          progress_cleanup (&pfx);
151      int mode = secret? KEYCACHE_PRV : KEYCACHE_PUB;      return err;
152    }
153      if( !keyid )  
154          return WPTERR_GENERAL;  
155      if( r_key )  /* Return the public cache context if @is_pub is set
156          *r_key = NULL;     the secre cache context otherwise. */
157      cache = keycache_get_ctx( mode );  gpg_keycache_t
158      if( !cache )  keycache_get_ctx (int is_pub)
159          BUG( NULL );  {
160      err = gpgme_keycache_find_key( cache, keyid, 0, r_key );      gpg_keycache_t ctx;
161      if( err )  
162          return WPTERR_GENERAL;      ctx = is_pub? pub : sec;
163      return 0;      if (!ctx)
164  } /* get_key */          BUG (0);
165        return ctx;
166    }
167  static int  
168  get_key2( const char * keyid, gpgme_key_t * r_key, int secret )  
169  {  /* Get the GPG key with keyid @keyid from the cache. Return it
170      gpg_iobuf_t inp;     in @r_key on success. */
171      char * p;  static int
172      int rc;  get_key_from_cache (const char *keyid, gpgme_key_t *r_key,
173                        struct keycache_s **c, int secret)
174      p = get_gnupg_keyring (1, !NO_STRICT);  {
175      if( !p )      gpg_keycache_t cache;
176          BUG( NULL );      gpgme_error_t err;
177        int mode = secret? KEYCACHE_PRV : KEYCACHE_PUB;
178      inp = gpg_iobuf_open( p );  
179      if( !inp ) {      if (!keyid)
180          const char *s = winpt_strerror( WPTERR_FILE_OPEN );          return WPTERR_GENERAL;
181          log_box( _("WinPT Error"), 0, "%s: %s", p, s );      if (r_key)
182          free_if_alloc( p );          *r_key = NULL;
183          return NULL;      cache = keycache_get_ctx (mode);
184      }      if (!cache)
185      gpg_iobuf_ioctl( inp, 3, 1, NULL ); /* disable cache */          BUG (0);
186      rc = gpgme_getkey_bykeyid( inp, keyid, r_key );      if (!c)
187            err = gpg_keycache_find_key (cache, keyid, 0, r_key);
188      gpg_iobuf_close( inp );      else
189      free_if_alloc( p );          err = gpg_keycache_find_key2 (cache, keyid, 0, r_key, c);
190      return rc;      return err? WPTERR_GENERAL : 0;
191  } /* get_key2 */  }
192    
193    
194  int  /* Get GPG key with keyid @keyid directly from GPG and return
195  get_pubkey( const char *keyid, gpgme_key_t *ret_key )     it in @r_key on success. */
196  {  static int
197      int rc = 0;  get_key_directly (const char *keyid, gpgme_key_t *r_key, int secret)
198    {
199      if( pub && sec )      gpgme_ctx_t ctx;
200          rc = get_key( keyid, ret_key, 0 );      gpgme_error_t err;
201      else  
202          rc = get_key2( keyid, ret_key, 0 );      err = gpgme_new (&ctx);
203      return rc;      if (err)
204  } /* get_pubkey */          return WPTERR_GENERAL;
205        err = gpgme_get_key (ctx, keyid, r_key, secret);
206        gpgme_release (ctx);
207  int      return err? WPTERR_GENERAL : 0;
208  get_seckey( const char *keyid, gpgme_key_t *ret_skey )  }
209  {  
210      int rc = 0;  
211    /* Search the public key with @keyid as the keyid in the cache and
212      if( pub && sec )     return the item in @k. */
213          rc = get_key( keyid, ret_skey, 1 );  int
214      else  winpt_get_pubkey (const char *keyid, winpt_key_s *k)
215          rc = get_key2( keyid, ret_skey, 1 );  {
216      return rc;      int rc;
217  } /* get_seckey */      
218        rc = get_key_from_cache (keyid, &k->ctx, &k->ext, 0);
219        if (rc)
220  int          return rc;
221  count_insecure_elgkeys (void)      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&
222  {                  strlen (k->ctx->subkeys->fpr) == 32;
223      gpgme_keycache_t pc;      k->is_protected = k->ext->gloflags.is_protected;
224      gpgme_key_t key;      k->keyid = k->ctx->subkeys->keyid;
225      int n=0;      k->uid = k->ctx->uids->uid;
226        return rc;
227      pc = keycache_get_ctx (1);  }
228      if (!pc)  
229          BUG (0);  
230      while (!gpgme_keycache_next_key (pc, 0, &key)) {  int
231          if (gpgme_key_get_ulong_attr (key, GPGME_ATTR_ALGO, NULL, 0)  winpt_get_seckey (const char *keyid, winpt_key_s *k)
232              == GPGME_PK_ELG_ES)  {
233              n++;      int rc;
234      }      rc = get_key_from_cache (keyid, &k->ctx, &k->ext, 1);
235      gpgme_keycache_rewind (pc);      if (rc)
236      return n;          return rc;
237  }      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&
238                    strlen (k->ctx->subkeys->fpr) == 32;
239        k->is_protected = k->ext->gloflags.is_protected;
240        k->keyid = k->ctx->subkeys->keyid;
241        k->uid = k->ctx->uids->uid;
242        return rc;
243    }
244    
245    
246    int
247    get_pubkey (const char *keyid, gpgme_key_t *ret_key)
248    {
249        int rc;
250    
251        if (pub && sec)
252            rc = get_key_from_cache (keyid, ret_key, NULL, 0);
253        else
254            rc = get_key_directly (keyid, ret_key, 0);
255        return rc;
256    }
257    
258    
259    int
260    get_seckey (const char *keyid, gpgme_key_t *ret_skey)
261    {
262        int rc;
263    
264        if (pub && sec)
265            rc = get_key_from_cache (keyid, ret_skey, NULL, 1);
266        else
267            rc = get_key_directly (keyid, ret_skey, 1);
268        return rc;
269    }
270    
271    
272    /* Search for insecure ElGamal keys and return the
273       number of founded keys. */
274    int
275    count_insecure_elgkeys (void)
276    {
277        gpg_keycache_t pc;
278        gpgme_key_t key;
279        int n=0;
280    
281        pc = keycache_get_ctx (1);
282        if (!pc)
283            BUG (0);
284        while (!gpg_keycache_next_key (pc, 0, &key)) {
285            if (key->subkeys->pubkey_algo == GPGME_PK_ELG)
286                n++;
287        }
288        gpg_keycache_rewind (pc);
289        return n;
290    }
291    
292    
293    
294    /* Map the signature summary in @sum to signature status table index.
295       Return value: index to table. */
296    static int
297    sigsum_to_index (gpgme_sigsum_t sum)
298    {
299        if ((sum & GPGME_SIGSUM_VALID) && (sum & GPGME_SIGSUM_KEY_REVOKED))
300            return 7;
301        if ((sum & GPGME_SIGSUM_VALID) && (sum & GPGME_SIGSUM_SIG_EXPIRED))
302            return 6;
303        if (sum & GPGME_SIGSUM_GREEN)
304            return 1;
305        else if (sum & GPGME_SIGSUM_RED)
306            return 2;
307        else if (sum & GPGME_SIGSUM_KEY_MISSING)
308            return 3;
309        return 0;
310    }
311    
312    
313    /* Return a humand readable description for the signature status @sum. */
314    const char*
315    get_gpg_sigstat (gpgme_sigsum_t sum)
316    {
317        const char *gpg_sigstat[] = {
318            _("Error during verification process."),
319            _("The signature is good."),
320            _("The signature is BAD!"),
321            _("The signature could not be checked due to a missing key."),
322            _("No valid OpenPGP signature."),
323            _("Signature Error"),
324            _("Good Signature (Expired Key)"),
325            _("Good Signature (Revoked Key)"),
326            NULL
327        };
328        const unsigned int mask = 8;
329    
330        return gpg_sigstat[sigsum_to_index (sum) % mask];
331    }
332    
333    
334    /* Check if the secret keyring contains at least one
335       key with ultimate trust.
336       Return value: 0 on success. */
337    int
338    check_ultimate_trusted_key (void)
339    {
340        struct keycache_s *n;
341    
342        for (n = sec->item; n; n = n->next) {
343            if (n->pubpart &&
344                n->pubpart->key->owner_trust == GPGME_VALIDITY_ULTIMATE)
345            return 0;
346        }
347        return -1;
348    }

Legend:
Removed from v.19  
changed lines
  Added in v.208

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26