/[winpt]/trunk/Src/wptGPGME.cpp
ViewVC logotype

Diff of /trunk/Src/wptGPGME.cpp

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 23 by twoaday, Fri Sep 30 10:10:16 2005 UTC revision 270 by twoaday, Sat Oct 21 18:08:57 2006 UTC
# Line 1  Line 1 
1  /* wptGPGME.cpp - WinPT GPGME interface  /* wptGPGME.cpp - WinPT GPGME interface
2   *      Copyright (C) 2001-2005 Timo Schulz   *      Copyright (C) 2001-2006 Timo Schulz
3   *   *
4   * This file is part of WinPT.   * This file is part of WinPT.
5   *   *
6   * WinPT is free software; you can redistribute it and/or   * WinPT is free software; you can redistribute it and/or
7   * modify it under the terms of the GNU General Public License   * modify it under the terms of the GNU General Public License
8   * as published by the Free Software Foundation; either version 2   * as published by the Free Software Foundation; either version 2
9   * of the License, or (at your option) any later version.   * of the License, or (at your option) any later version.
10   *     *  
11   * WinPT is distributed in the hope that it will be useful,   * WinPT is distributed in the hope that it will be useful,
12   * but WITHOUT ANY WARRANTY; without even the implied warranty of   * but WITHOUT ANY WARRANTY; without even the implied warranty of
13   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14   * General Public License for more details.   * General Public License for more details.
15   *   *
16   * You should have received a copy of the GNU General Public License   * You should have received a copy of the GNU General Public License
17   * along with WinPT; if not, write to the Free Software Foundation,   * along with WinPT; if not, write to the Free Software Foundation,
18   * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA   * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
19   */   */
20    #ifdef HAVE_CONFIG_H
21  #include <sys/types.h>  #include <config.h>
22  #include <windows.h>  #endif
23    
24  #include "../resource.h"  #include <sys/types.h>
25  #include "wptNLS.h"  #include <windows.h>
26  #include "wptGPG.h"  
27  #include "wptErrors.h"  #include "resource.h"
28  #include "wptTypes.h"  #include "wptNLS.h"
29  #include "wptW32API.h"  #include "wptGPG.h"
30  #include "wptVersion.h"  #include "wptErrors.h"
31  #include "wptCommonCtl.h"  #include "wptTypes.h"
32  #include "wptContext.h"  #include "wptW32API.h"
33  #include "wptRegistry.h"  #include "wptVersion.h"
34  #include "wptDlgs.h"  #include "wptCommonCtl.h"
35    #include "wptContext.h"
36  #include "openpgp.h"  #include "wptRegistry.h"
37    #include "wptDlgs.h"
38  BOOL CALLBACK  keycache_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam);  
39  void progress_cleanup (progress_filter_s * pfx);  #include "openpgp.h"
40    
41  static gpgme_keycache_t pub = NULL;  BOOL CALLBACK  keycache_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam);
42  static gpgme_keycache_t sec = NULL;  void progress_cleanup (progress_filter_s * pfx);
43  static unsigned int reload = 0;  
44  static char *gpg_secring = NULL;  /* Global GPG key cache contexts. */
45    static gpg_keycache_t pub = NULL;
46  void  static gpg_keycache_t sec = NULL;
47  keycache_reload (HWND dlg)  static char *gpg_secring = NULL;
48  {        
49      refresh_cache_s rcs;  
50    /* Return 1 if no cache is available.
51      memset (&rcs, 0, sizeof rcs);     This can be the case if WinPT were run in command line mode. */
52      rcs.kr_reload = rcs.kr_update = 1;  int
53      rcs.tr_update = 0;  keycache_not_available (void)
54      DialogBoxParam (glob_hinst, (LPCSTR)IDD_WINPT_KEYCACHE, dlg,                                          {
55                      keycache_dlg_proc, (LPARAM)&rcs);      return pub == NULL;
56  } /* keycache_reload */  }
57    
58  void  /* Release both key cache objects. If @cleanup is 1,
59  keycache_release (void)     also release other global structs. */
60  {  void
61      int n = gpgme_keycache_count (pub);  keycache_release (int cleanup)
62      char tmpbuf[64];  {
63        char tmpbuf[64];
64      /* XXX: update the value when the cache has changed. */      int n = gpg_keycache_get_size (pub);
65      sprintf (tmpbuf, "%d", n);  
66      set_reg_key (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys", tmpbuf);      /* XXX: update the value when the cache has changed. */
67        _snprintf (tmpbuf, sizeof (tmpbuf)-1, "%d", n);
68      if (pub) {      set_reg_key (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys", tmpbuf);
69          gpgme_keycache_release (pub);  
70          pub = NULL;      if (pub) {
71      }          gpg_keycache_release (pub);
72      if (sec) {          pub = NULL;
73          gpgme_keycache_release (sec);      }
74          sec = NULL;      if (sec) {
75      }          gpg_keycache_release (sec);
76  } /* keycache_release */          sec = NULL;
77        }
78        if (cleanup)
79  gpgme_error_t          safe_free (gpg_secring);
80  keycache_update (int is_sec, const char *keyid)  }
81  {  
82      gpgme_keycache_t ctx = pub;  
83      gpgme_error_t err;  /* Update the key with the keyid @keyid in the key cache.
84       If @is_sec is 1, the secret key cache is used. */
85      if (is_sec)  gpgme_error_t
86          ctx = sec;  keycache_update (int is_sec, const char *keyid)
87      err =  gpgme_keycache_update_key (ctx, is_sec, pub, keyid);  {
88      if (is_sec)      gpg_keycache_t ctx = pub;
89          gpgme_keycache_prepare_single (ctx, keyid, NULL, gpg_secring);      gpgme_error_t err;
90      return err;  
91  }      if (is_sec)
92            ctx = sec;
93  /* XXX: cache_keyring_names must be called then the GPG homedir changes! */      err = gpg_keycache_update_key (ctx, is_sec, pub, keyid);
94        if (is_sec)
95  gpgme_error_t          gpg_keycache_prepare_single (ctx, keyid, NULL, gpg_secring);
96  keycache_init (const char *pubring, const char * secring)      return err;
97  {  }
98      struct progress_filter_s pfx;  
99      gpgme_error_t err;  
100      int val = 0;  /* Initialize both cache contexts. Use @pubring for the public
101      char * p;     keyring and @secring for the secret keyring. */
102    gpgme_error_t
103      if (secring != NULL) {  keycache_init (const char *pubring, const char *secring)
104          free_if_alloc (gpg_secring);  {
105          gpg_secring = get_gnupg_keyring (0, NO_STRICT);      struct progress_filter_s pfx;
106      }      gpgme_error_t err;
107        int val = 0;
108      if (reload) {      char *p;
109          keycache_release ();  
110          reload = 0;      if (secring != NULL) {
111      }          free_if_alloc (gpg_secring);
112      p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys");          gpg_secring = get_gnupg_keyring (0, NO_STRICT);
113      if (p && *p != ' ') {          log_debug ("keycache_init: secring path '%s'\r\n", gpg_secring);
114          val = atoi (p);      }
115          free_if_alloc (p);      
116          memset (&pfx, 0, sizeof (pfx));      p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys");
117      }      if (p && *p != ' ') {
118            val = atoi (p);
119      err = gpgme_keycache_new (&pub);          free_if_alloc (p);      
120      if (err)      }
121          return err;  
122      if (val != 0)      memset (&pfx, 0, sizeof (pfx));
123          gpgme_keycache_set_cb (pub, progress_callback, &pfx, val);      keycache_release (0); /* Release old contexts first. */
124      err = gpgme_keycache_new (&sec);  
125      if (!err)      err = gpg_keycache_new (&pub);
126          err = gpgme_keycache_init (pub, NULL, 0);      if (err)
127      if (!err)          return err;
128          err = gpgme_keycache_init( sec, NULL, 1 );      if (val != 0)
129      if( !err && pubring && *pubring )          gpg_keycache_set_cb (pub, progress_callback, &pfx, val);
130          err = gpgme_keycache_prepare( pub, pubring, NULL );      err = gpg_keycache_new (&sec);
131      if( !err && secring && * secring )      if (!err)
132          err = gpgme_keycache_prepare( sec, NULL, secring );          err = gpg_keycache_init (pub, NULL, 0);
133      if (!err)      if (!err)
134          gpgme_keycache_sync (pub, sec);          err = gpg_keycache_init (sec, NULL, 1);
135      if (val != 0)      if (!err && pubring && *pubring)
136          progress_cleanup (&pfx);          err = gpg_keycache_prepare (pub, pubring, NULL);
137      return err;      if (!err && secring && * secring)
138  } /* keycache_init */          err = gpg_keycache_prepare (sec, NULL, secring);
139        if (!err)
140            gpg_keycache_sync (pub, sec);
141  void      if (val != 0)
142  keycache_set_reload( int yes )          progress_cleanup (&pfx);
143  {      return err;
144      reload = yes;  }
145  } /* keycache_set_reload */  
146    
147    /* Return the public cache context if @is_pub is set
148  int     the secre cache context otherwise. */
149  keycache_get_reload( void )  gpg_keycache_t
150  {  keycache_get_ctx (int is_pub)
151      return reload;  {
152  } /* keycache_get_reload */      gpg_keycache_t ctx;
153    
154        ctx = is_pub? pub : sec;
155  gpgme_keycache_t      if (!ctx)
156  keycache_get_ctx (int is_pub)          BUG (0);
157  {      return ctx;
158      return is_pub? pub : sec;  }
159  } /* keycache_get_ctx */  
160    
161    /* Get the GPG key with keyid @keyid from the cache. Return it
162  static int     in @r_key on success. */
163  get_key (const char *keyid, gpgme_key_t *r_key, struct keycache_s **c, int secret)  static gpgme_error_t
164  {  get_key_from_cache (const char *keyid, int secret, gpgme_key_t *r_key,
165      gpgme_keycache_t cache;                      struct keycache_s **c)
166      gpgme_error_t err;  {
167      int mode = secret? KEYCACHE_PRV : KEYCACHE_PUB;      gpg_keycache_t cache;
168        gpgme_error_t err;
169      if( !keyid )      int mode = secret? KEYCACHE_PRV : KEYCACHE_PUB;
170          return WPTERR_GENERAL;  
171      if( r_key )      if (!keyid)
172          *r_key = NULL;          return gpg_error (GPG_ERR_INV_VALUE);
173      cache = keycache_get_ctx (mode);      if (r_key)
174      if( !cache )          *r_key = NULL;
175          BUG( NULL );      cache = keycache_get_ctx (mode);
176      if (!c)      if (!c)
177          err = gpgme_keycache_find_key( cache, keyid, 0, r_key );          err = gpg_keycache_find_key (cache, keyid, 0, r_key);
178      else      else
179          err = gpgme_keycache_find_key2 (cache, keyid, 0, r_key, c);          err = gpg_keycache_find_key2 (cache, keyid, 0, r_key, c);
180      if( err )      return err;
181          return WPTERR_GENERAL;  }
182      return 0;  
183  } /* get_key */  
184    /* Release the internal key structure.
185       If allocated is 0, assume fixed cache item. */
186  static int  void
187  get_key2( const char * keyid, gpgme_key_t * r_key, int secret )  winpt_release_pubkey (winpt_key_s *k)
188  {  {
189      gpg_iobuf_t inp;      /*log_box ("debug", 0, "alloc %d", k->allocated);*/
190      char * p;      if (!k->allocated)
191      int rc;          return;
192        gpg_keycache_item_release (k->ext);
193      p = get_gnupg_keyring (1, !NO_STRICT);      k->ext = NULL;
194      if( !p )      k->allocated = 0;
195          BUG( NULL );  }
196    
197      inp = gpg_iobuf_open( p );  
198      if( !inp ) {  /* Search the public key with @keyid as the keyid in the cache and
199          const char *s = winpt_strerror( WPTERR_FILE_OPEN );     return the item in @k. */
200          log_box( _("WinPT Error"), 0, "%s: %s", p, s );  gpgme_error_t
201          free_if_alloc( p );  winpt_get_pubkey (const char *keyid, winpt_key_s *k)
202          return NULL;  {
203      }      gpgme_error_t err = gpg_error (GPG_ERR_NO_ERROR);
204      gpg_iobuf_ioctl( inp, 3, 1, NULL ); /* disable cache */      
205      rc = gpgme_getkey_bykeyid( inp, keyid, r_key );      if (pub)
206            err = get_key_from_cache (keyid, 0, &k->ctx, &k->ext);
207      gpg_iobuf_close( inp );      else
208      free_if_alloc( p );          err = gpg_keycache_fetch_key (keyid, 0, &k->ctx, &k->ext);
209      return rc;      if (err)
210  } /* get_key2 */          return err;
211        k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&
212                    strlen (k->ctx->subkeys->fpr) == 32;
213  int      k->is_protected = k->ext->gloflags.is_protected;
214  winpt_get_pubkey (const char *keyid, winpt_key_s *k)      k->keyid = k->ctx->subkeys->keyid+8;
215  {      k->uid = k->ext->uids->uid;
216      int rc;      k->allocated = pub? 0 : 1;
217            return 0;
218      rc = get_key (keyid, &k->ctx, &k->ext, 0);  }
219      if (rc)  
220          return rc;  
221      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA && strlen (k->ctx->subkeys->fpr) == 32;  gpgme_error_t
222      k->is_protected = k->ext->gloflags.is_protected;  winpt_get_seckey (const char *keyid, winpt_key_s *k)
223      k->keyid = k->ctx->subkeys->keyid;  {
224      k->uid = k->ctx->uids->uid;      gpgme_error_t err;
225      return rc;  
226  }      if (sec)
227            err = get_key_from_cache (keyid, 1, &k->ctx, &k->ext);
228        else
229  int          err = gpg_keycache_fetch_key (keyid, 1, &k->ctx, &k->ext);
230  winpt_get_seckey (const char *keyid, winpt_key_s *k)      if (err)
231  {          return err;
232      int rc;      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&
233      rc = get_key (keyid, &k->ctx, &k->ext, 1);                  strlen (k->ctx->subkeys->fpr) == 32;
234      if (rc)      k->is_protected = k->ext->gloflags.is_protected;
235          return rc;      k->keyid = k->ctx->subkeys->keyid+8;
236      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA && strlen (k->ctx->subkeys->fpr) == 32;      k->uid = k->ext->uids->uid;
237      k->is_protected = k->ext->gloflags.is_protected;      k->allocated = sec? 0 : 1;
238      k->keyid = k->ctx->subkeys->keyid;      return 0;
239      k->uid = k->ctx->uids->uid;  }
240      return rc;  
241  }  
242    gpgme_error_t
243    get_pubkey (const char *keyid, gpgme_key_t *ret_key)
244  int  {
245  get_pubkey (const char *keyid, gpgme_key_t *ret_key)      return get_key_from_cache (keyid, 0, ret_key, NULL);
246  {  }
247      int rc = 0;  
248    
249      if (pub && sec)  gpgme_error_t
250          rc = get_key (keyid, ret_key, NULL, 0);  get_seckey (const char *keyid, gpgme_key_t *ret_skey)
251      else  {
252          rc = get_key2 (keyid, ret_key, 0);      return get_key_from_cache (keyid, 1, ret_skey, NULL);
253      return rc;  }
254  } /* get_pubkey */  
255    
256    
257  int  /* Map the signature summary in @sum to signature status table index.
258  get_seckey( const char *keyid, gpgme_key_t *ret_skey )     Return value: index to table. */
259  {  static int
260      int rc = 0;  sigsum_to_index (gpgme_sigsum_t sum)
261    {
262      if( pub && sec )      if (sum & GPGME_SIGSUM_RED)
263          rc = get_key( keyid, ret_skey, NULL, 1 );          return 2;
264      else      else if (sum & GPGME_SIGSUM_SIG_EXPIRED)
265          rc = get_key2( keyid, ret_skey, 1 );          return 8;
266      return rc;      else if (sum & GPGME_SIGSUM_KEY_REVOKED)
267  } /* get_seckey */          return 7;
268        else if (sum & GPGME_SIGSUM_KEY_EXPIRED)
269            return 6;
270  int      else if (sum & GPGME_SIGSUM_GREEN)
271  count_insecure_elgkeys (void)          return 1;
272  {      else if (sum & GPGME_SIGSUM_KEY_MISSING)
273      gpgme_keycache_t pc;          return 3;
274      gpgme_key_t key;      return 0;
275      int n=0;  }
276    
277      pc = keycache_get_ctx (1);  
278      if (!pc)  /* Return a humand readable description for the signature status @sum.
279          BUG (0);     Warning: this function does not consider the validity of the key. */
280      while (!gpgme_keycache_next_key (pc, 0, &key)) {  const char*
281          if (key->subkeys->pubkey_algo == GPGME_PK_ELG)  get_gpg_sigstat (gpgme_sigsum_t sum)
282              n++;  {
283      }      const char *gpg_sigstat[] = {
284      gpgme_keycache_rewind (pc);          _("Error during verification process"),
285      return n;          _("The signature is good"),
286  }          _("The signature is BAD!"),
287            _("The signature could not be checked due to a missing key"),
288            _("No valid OpenPGP signature"),
289            _("Signature Error"),
290            _("Good signature (Expired Key)"),
291            _("Good signature (Revoked Key)"),
292            _("Good signature (Expired)"),
293            NULL
294        };
295        const unsigned int mask = 9;
296    
297        return gpg_sigstat[sigsum_to_index (sum) % mask];
298    }
299    
300    
301    /* Return true if at least one secret key is available. */
302    bool
303    secret_key_available (void)
304    {
305        if (!sec || gpg_keycache_get_size (sec) == 0)
306            return false;
307        return true;
308    }

Legend:
Removed from v.23  
changed lines
  Added in v.270

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26