1 |
/* wptGPGME.cpp - WinPT GPGME interface |
/* wptGPGME.cpp - WinPT GPGME interface |
2 |
* Copyright (C) 2001-2005 Timo Schulz |
* Copyright (C) 2001-2006 Timo Schulz |
3 |
* |
* |
4 |
* This file is part of WinPT. |
* This file is part of WinPT. |
5 |
* |
* |
12 |
* but WITHOUT ANY WARRANTY; without even the implied warranty of |
* but WITHOUT ANY WARRANTY; without even the implied warranty of |
13 |
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
14 |
* General Public License for more details. |
* General Public License for more details. |
|
* |
|
|
* You should have received a copy of the GNU General Public License |
|
|
* along with WinPT; if not, write to the Free Software Foundation, |
|
|
* Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
|
15 |
*/ |
*/ |
16 |
#ifdef HAVE_CONFIG_H |
#ifdef HAVE_CONFIG_H |
17 |
#include <config.h> |
#include <config.h> |
34 |
|
|
35 |
#include "openpgp.h" |
#include "openpgp.h" |
36 |
|
|
37 |
BOOL CALLBACK keycache_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam); |
BOOL CALLBACK keycache_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, |
38 |
|
LPARAM lparam); |
39 |
void progress_cleanup (progress_filter_s * pfx); |
void progress_cleanup (progress_filter_s * pfx); |
40 |
|
|
41 |
|
/* Global GPG key cache contexts. */ |
42 |
static gpg_keycache_t pub = NULL; |
static gpg_keycache_t pub = NULL; |
43 |
static gpg_keycache_t sec = NULL; |
static gpg_keycache_t sec = NULL; |
44 |
static char *gpg_secring = NULL; |
static char *gpg_secring = NULL; |
45 |
|
|
46 |
|
struct keycache_s *key_list = NULL; |
47 |
|
|
|
/* Reload the key cache. */ |
|
|
void |
|
|
keycache_reload (HWND dlg) |
|
|
{ |
|
|
refresh_cache_s rcs; |
|
|
|
|
|
memset (&rcs, 0, sizeof rcs); |
|
|
rcs.kr_reload = rcs.kr_update = 1; |
|
|
rcs.tr_update = 0; |
|
|
DialogBoxParam (glob_hinst, (LPCSTR)IDD_WINPT_KEYCACHE, dlg, |
|
|
keycache_dlg_proc, (LPARAM)&rcs); |
|
|
} |
|
48 |
|
|
49 |
|
/* Return 1 if no cache is available. |
50 |
|
This can be the case if WinPT were run in command line mode. */ |
51 |
|
int |
52 |
|
keycache_not_available (void) |
53 |
|
{ |
54 |
|
return pub == NULL; |
55 |
|
} |
56 |
|
|
57 |
/* Release both key cache objects. If @cleanup is 1, |
/* Release both key cache objects. If @cleanup is 1, |
58 |
also release other global structs. */ |
also release other global structs. */ |
59 |
void |
void |
60 |
keycache_release (int cleanup) |
keycache_release (int cleanup) |
61 |
{ |
{ |
|
int n = gpg_keycache_get_size (pub); |
|
62 |
char tmpbuf[64]; |
char tmpbuf[64]; |
63 |
|
int n = gpg_keycache_get_size (pub); |
64 |
|
|
65 |
/* XXX: update the value when the cache has changed. */ |
/* XXX: update the value when the cache has changed. */ |
66 |
sprintf (tmpbuf, "%d", n); |
_snprintf (tmpbuf, DIM (tmpbuf)-1, "%d", n); |
67 |
set_reg_key (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys", tmpbuf); |
set_reg_key (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys", tmpbuf); |
68 |
|
|
69 |
if (pub) { |
if (pub) { |
74 |
gpg_keycache_release (sec); |
gpg_keycache_release (sec); |
75 |
sec = NULL; |
sec = NULL; |
76 |
} |
} |
77 |
if (cleanup) { |
if (cleanup) |
78 |
if (gpg_secring) |
safe_free (gpg_secring); |
|
free (gpg_secring); |
|
|
gpg_secring = NULL; |
|
|
} |
|
79 |
} |
} |
80 |
|
|
81 |
|
|
103 |
{ |
{ |
104 |
struct progress_filter_s pfx; |
struct progress_filter_s pfx; |
105 |
gpgme_error_t err; |
gpgme_error_t err; |
106 |
int val = 0; |
int val; |
107 |
char *p; |
char *p; |
108 |
|
|
109 |
if (secring != NULL) { |
if (secring != NULL) { |
110 |
free_if_alloc (gpg_secring); |
free_if_alloc (gpg_secring); |
111 |
gpg_secring = get_gnupg_keyring (0, NO_STRICT); |
gpg_secring = get_gnupg_keyring (0, NO_STRICT); |
112 |
|
log_debug ("keycache_init: secring path '%s'\r\n", gpg_secring); |
113 |
} |
} |
114 |
|
|
115 |
|
val = 0; |
116 |
p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys"); |
p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys"); |
117 |
if (p && *p != ' ') { |
if (p && *p != ' ') { |
118 |
val = atoi (p); |
val = atoi (p); |
119 |
free_if_alloc (p); |
free_if_alloc (p); |
120 |
} |
} |
121 |
|
|
122 |
memset (&pfx, 0, sizeof (pfx)); |
memset (&pfx, 0, sizeof (pfx)); |
123 |
/* Release old contexts first. */ |
keycache_release (0); /* Release old contexts first. */ |
|
keycache_release (0); |
|
124 |
|
|
125 |
err = gpg_keycache_new (&pub); |
err = gpg_keycache_new (&pub); |
126 |
if (err) |
if (err) |
140 |
gpg_keycache_sync (pub, sec); |
gpg_keycache_sync (pub, sec); |
141 |
if (val != 0) |
if (val != 0) |
142 |
progress_cleanup (&pfx); |
progress_cleanup (&pfx); |
143 |
|
|
144 |
return err; |
return err; |
145 |
} |
} |
146 |
|
|
161 |
|
|
162 |
/* Get the GPG key with keyid @keyid from the cache. Return it |
/* Get the GPG key with keyid @keyid from the cache. Return it |
163 |
in @r_key on success. */ |
in @r_key on success. */ |
164 |
static int |
static gpgme_error_t |
165 |
get_key_from_cache (const char *keyid, gpgme_key_t *r_key, |
get_key_from_cache (const char *keyid, int secret, gpgme_key_t *r_key, |
166 |
struct keycache_s **c, int secret) |
struct keycache_s **c) |
167 |
{ |
{ |
168 |
gpg_keycache_t cache; |
gpg_keycache_t cache; |
169 |
gpgme_error_t err; |
gpgme_error_t err; |
170 |
int mode = secret? KEYCACHE_PRV : KEYCACHE_PUB; |
int mode = secret? KEYCACHE_PRV : KEYCACHE_PUB; |
171 |
|
|
172 |
if (!keyid) |
if (!keyid) |
173 |
return WPTERR_GENERAL; |
return gpg_error (GPG_ERR_INV_VALUE); |
174 |
if (r_key) |
if (r_key) |
175 |
*r_key = NULL; |
*r_key = NULL; |
176 |
cache = keycache_get_ctx (mode); |
cache = keycache_get_ctx (mode); |
|
if (!cache) |
|
|
BUG (0); |
|
177 |
if (!c) |
if (!c) |
178 |
err = gpg_keycache_find_key (cache, keyid, 0, r_key); |
err = gpg_keycache_find_key (cache, keyid, 0, r_key); |
179 |
else |
else |
180 |
err = gpg_keycache_find_key2 (cache, keyid, 0, r_key, c); |
err = gpg_keycache_find_key2 (cache, keyid, 0, r_key, c); |
181 |
return err? WPTERR_GENERAL : 0; |
return err; |
182 |
} |
} |
183 |
|
|
184 |
|
|
185 |
/* Get GPG key with keyid @keyid directly from GPG and return |
/* Release the internal key structure. |
186 |
it in @r_key on success. */ |
If allocated is 0, assume fixed cache item. */ |
187 |
static int |
void |
188 |
get_key_directly (const char *keyid, gpgme_key_t *r_key, int secret) |
winpt_release_pubkey (winpt_key_s *k) |
189 |
{ |
{ |
190 |
gpgme_ctx_t ctx; |
/*log_box ("debug", 0, "alloc %d", k->allocated);*/ |
191 |
gpgme_error_t err; |
if (!k->allocated) |
192 |
|
return; |
193 |
err = gpgme_new (&ctx); |
gpg_keycache_item_release (k->ext); |
194 |
if (err) |
k->ext = NULL; |
195 |
return WPTERR_GENERAL; |
k->allocated = 0; |
|
err = gpgme_get_key (ctx, keyid, r_key, secret); |
|
|
gpgme_release (ctx); |
|
|
return err? WPTERR_GENERAL : 0; |
|
196 |
} |
} |
197 |
|
|
198 |
|
|
199 |
/* Search the public key with @keyid as the keyid in the cache and |
/* Search the public key with @keyid as the keyid in the cache and |
200 |
return the item in @k. */ |
return the item in @k. */ |
201 |
int |
gpgme_error_t |
202 |
winpt_get_pubkey (const char *keyid, winpt_key_s *k) |
winpt_get_pubkey (const char *keyid, winpt_key_s *k) |
203 |
{ |
{ |
204 |
int rc; |
gpgme_error_t err = gpg_error (GPG_ERR_NO_ERROR); |
205 |
|
|
206 |
rc = get_key_from_cache (keyid, &k->ctx, &k->ext, 0); |
if (pub) |
207 |
if (rc) |
err = get_key_from_cache (keyid, 0, &k->ctx, &k->ext); |
208 |
return rc; |
else |
209 |
|
err = gpg_keycache_fetch_key (keyid, 0, &k->ctx, &k->ext); |
210 |
|
if (err) |
211 |
|
return err; |
212 |
k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA && |
k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA && |
213 |
strlen (k->ctx->subkeys->fpr) == 32; |
strlen (k->ctx->subkeys->fpr) == 32; |
214 |
k->is_protected = k->ext->gloflags.is_protected; |
k->is_protected = k->ext->gloflags.is_protected; |
215 |
k->keyid = k->ctx->subkeys->keyid; |
k->keyid = k->ctx->subkeys->keyid+8; |
216 |
k->uid = k->ctx->uids->uid; |
k->uid = k->ext->uids->uid; |
217 |
return rc; |
k->allocated = pub? 0 : 1; |
218 |
|
return 0; |
219 |
} |
} |
220 |
|
|
221 |
|
|
222 |
int |
gpgme_error_t |
223 |
winpt_get_seckey (const char *keyid, winpt_key_s *k) |
winpt_get_seckey (const char *keyid, winpt_key_s *k) |
224 |
{ |
{ |
225 |
int rc; |
gpgme_error_t err; |
226 |
rc = get_key_from_cache (keyid, &k->ctx, &k->ext, 1); |
|
227 |
if (rc) |
if (sec) |
228 |
return rc; |
err = get_key_from_cache (keyid, 1, &k->ctx, &k->ext); |
229 |
|
else |
230 |
|
err = gpg_keycache_fetch_key (keyid, 1, &k->ctx, &k->ext); |
231 |
|
if (err) |
232 |
|
return err; |
233 |
k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA && |
k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA && |
234 |
strlen (k->ctx->subkeys->fpr) == 32; |
strlen (k->ctx->subkeys->fpr) == 32; |
235 |
k->is_protected = k->ext->gloflags.is_protected; |
k->is_protected = k->ext->gloflags.is_protected; |
236 |
k->keyid = k->ctx->subkeys->keyid; |
k->keyid = k->ctx->subkeys->keyid+8; |
237 |
k->uid = k->ctx->uids->uid; |
k->uid = k->ext->uids->uid; |
238 |
return rc; |
k->allocated = sec? 0 : 1; |
239 |
|
return 0; |
240 |
} |
} |
241 |
|
|
242 |
|
|
243 |
int |
gpgme_error_t |
244 |
get_pubkey (const char *keyid, gpgme_key_t *ret_key) |
get_pubkey (const char *keyid, gpgme_key_t *ret_key) |
245 |
{ |
{ |
246 |
int rc; |
return get_key_from_cache (keyid, 0, ret_key, NULL); |
|
|
|
|
if (pub && sec) |
|
|
rc = get_key_from_cache (keyid, ret_key, NULL, 0); |
|
|
else |
|
|
rc = get_key_directly (keyid, ret_key, 0); |
|
|
return rc; |
|
247 |
} |
} |
248 |
|
|
249 |
|
|
250 |
int |
gpgme_error_t |
251 |
get_seckey (const char *keyid, gpgme_key_t *ret_skey) |
get_seckey (const char *keyid, gpgme_key_t *ret_skey) |
252 |
{ |
{ |
253 |
int rc; |
return get_key_from_cache (keyid, 1, ret_skey, NULL); |
|
|
|
|
if (pub && sec) |
|
|
rc = get_key_from_cache (keyid, ret_skey, NULL, 1); |
|
|
else |
|
|
rc = get_key_directly (keyid, ret_skey, 1); |
|
|
return rc; |
|
254 |
} |
} |
255 |
|
|
256 |
|
|
|
/* Search for insecure ElGamal keys and return the |
|
|
number of founded keys. */ |
|
|
int |
|
|
count_insecure_elgkeys (void) |
|
|
{ |
|
|
gpg_keycache_t pc; |
|
|
gpgme_key_t key; |
|
|
int n=0; |
|
|
|
|
|
pc = keycache_get_ctx (1); |
|
|
if (!pc) |
|
|
BUG (0); |
|
|
while (!gpg_keycache_next_key (pc, 0, &key)) { |
|
|
if (key->subkeys->pubkey_algo == GPGME_PK_ELG) |
|
|
n++; |
|
|
} |
|
|
gpg_keycache_rewind (pc); |
|
|
return n; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
257 |
/* Map the signature summary in @sum to signature status table index. |
/* Map the signature summary in @sum to signature status table index. |
258 |
Return value: index to table. */ |
Return value: index to table. */ |
259 |
static int |
static int |
260 |
sigsum_to_index (gpgme_sigsum_t sum) |
sigsum_to_index (gpgme_sigsum_t sum) |
261 |
{ |
{ |
262 |
if ((sum & GPGME_SIGSUM_VALID) && (sum & GPGME_SIGSUM_KEY_REVOKED)) |
if (sum & GPGME_SIGSUM_RED) |
263 |
|
return 2; |
264 |
|
else if (sum & GPGME_SIGSUM_SIG_EXPIRED) |
265 |
|
return 8; |
266 |
|
else if (sum & GPGME_SIGSUM_KEY_REVOKED) |
267 |
return 7; |
return 7; |
268 |
if ((sum & GPGME_SIGSUM_VALID) && (sum & GPGME_SIGSUM_SIG_EXPIRED)) |
else if (sum & GPGME_SIGSUM_KEY_EXPIRED) |
269 |
return 6; |
return 6; |
270 |
if (sum & GPGME_SIGSUM_GREEN) |
else if (sum & GPGME_SIGSUM_GREEN) |
271 |
return 1; |
return 1; |
|
else if (sum & GPGME_SIGSUM_RED) |
|
|
return 2; |
|
272 |
else if (sum & GPGME_SIGSUM_KEY_MISSING) |
else if (sum & GPGME_SIGSUM_KEY_MISSING) |
273 |
return 3; |
return 3; |
274 |
return 0; |
return 0; |
275 |
} |
} |
276 |
|
|
277 |
|
|
278 |
/* Return a humand readable description for the signature status @sum. */ |
/* Return a humand readable description for the signature status @sum. |
279 |
|
Warning: this function does not consider the validity of the key. */ |
280 |
const char* |
const char* |
281 |
get_gpg_sigstat (gpgme_sigsum_t sum) |
get_gpg_sigstat (gpgme_sigsum_t sum) |
282 |
{ |
{ |
283 |
const char *gpg_sigstat[] = { |
const char *gpg_sigstat[] = { |
284 |
_("Error during verification process."), |
_("Error during verification process"), |
285 |
_("The signature is good."), |
_("The signature is good"), |
286 |
_("The signature is BAD!"), |
_("The signature is BAD!"), |
287 |
_("The signature could not be checked due to a missing key."), |
_("The signature could not be checked due to a missing key"), |
288 |
_("No valid OpenPGP signature."), |
_("No valid OpenPGP signature"), |
289 |
_("Signature Error"), |
_("Signature Error"), |
290 |
_("Good Signature (Expired Key)"), |
_("Good signature (Expired Key)"), |
291 |
_("Good Signature (Revoked Key)"), |
_("Good signature (Revoked Key)"), |
292 |
|
_("Good signature (Expired)"), |
293 |
NULL |
NULL |
294 |
}; |
}; |
295 |
const unsigned int mask = 8; |
const unsigned int mask = 9; |
296 |
|
|
297 |
return gpg_sigstat[sigsum_to_index (sum) % mask]; |
return gpg_sigstat[sigsum_to_index (sum) % mask]; |
298 |
} |
} |
299 |
|
|
300 |
|
|
301 |
/* Check if the secret keyring contains at least one |
/* Return true if at least one secret key is available. */ |
302 |
key with ultimate trust. |
bool |
303 |
Return value: 0 on success. */ |
secret_key_available (void) |
304 |
int |
{ |
305 |
check_ultimate_trusted_key (void) |
if (!sec || gpg_keycache_get_size (sec) == 0) |
306 |
{ |
return false; |
307 |
struct keycache_s *n; |
return true; |
|
|
|
|
for (n = sec->item; n; n = n->next) { |
|
|
if (n->pubpart && |
|
|
n->pubpart->key->owner_trust == GPGME_VALIDITY_ULTIMATE) |
|
|
return 0; |
|
|
} |
|
|
return -1; |
|
308 |
} |
} |