/[winpt]/trunk/Src/wptGPGME.cpp
ViewVC logotype

Diff of /trunk/Src/wptGPGME.cpp

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 25 by twoaday, Wed Oct 12 10:04:26 2005 UTC revision 175 by twoaday, Tue Feb 7 08:58:04 2006 UTC
# Line 1  Line 1 
1  /* wptGPGME.cpp - WinPT GPGME interface  /* wptGPGME.cpp - WinPT GPGME interface
2   *      Copyright (C) 2001-2005 Timo Schulz   *      Copyright (C) 2001-2005 Timo Schulz
3   *   *
4   * This file is part of WinPT.   * This file is part of WinPT.
5   *   *
6   * WinPT is free software; you can redistribute it and/or   * WinPT is free software; you can redistribute it and/or
7   * modify it under the terms of the GNU General Public License   * modify it under the terms of the GNU General Public License
8   * as published by the Free Software Foundation; either version 2   * as published by the Free Software Foundation; either version 2
9   * of the License, or (at your option) any later version.   * of the License, or (at your option) any later version.
10   *     *  
11   * WinPT is distributed in the hope that it will be useful,   * WinPT is distributed in the hope that it will be useful,
12   * but WITHOUT ANY WARRANTY; without even the implied warranty of   * but WITHOUT ANY WARRANTY; without even the implied warranty of
13   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14   * General Public License for more details.   * General Public License for more details.
15   *   *
16   * You should have received a copy of the GNU General Public License   * You should have received a copy of the GNU General Public License
17   * along with WinPT; if not, write to the Free Software Foundation,   * along with WinPT; if not, write to the Free Software Foundation,
18   * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA   * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
19   */   */
20    #ifdef HAVE_CONFIG_H
21  #include <sys/types.h>  #include <config.h>
22  #include <windows.h>  #endif
23    
24  #include "../resource.h"  #include <sys/types.h>
25  #include "wptNLS.h"  #include <windows.h>
26  #include "wptGPG.h"  
27  #include "wptErrors.h"  #include "resource.h"
28  #include "wptTypes.h"  #include "wptNLS.h"
29  #include "wptW32API.h"  #include "wptGPG.h"
30  #include "wptVersion.h"  #include "wptErrors.h"
31  #include "wptCommonCtl.h"  #include "wptTypes.h"
32  #include "wptContext.h"  #include "wptW32API.h"
33  #include "wptRegistry.h"  #include "wptVersion.h"
34  #include "wptDlgs.h"  #include "wptCommonCtl.h"
35    #include "wptContext.h"
36  #include "openpgp.h"  #include "wptRegistry.h"
37    #include "wptDlgs.h"
38  BOOL CALLBACK  keycache_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam);  
39  void progress_cleanup (progress_filter_s * pfx);  #include "openpgp.h"
40    
41  static gpg_keycache_t pub = NULL;  BOOL CALLBACK  keycache_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam);
42  static gpg_keycache_t sec = NULL;  void progress_cleanup (progress_filter_s * pfx);
43  static unsigned int reload = 0;  
44  static char *gpg_secring = NULL;  static gpg_keycache_t pub = NULL;
45    static gpg_keycache_t sec = NULL;
46    static char *gpg_secring = NULL;
47  /* Reload the key cache. */  
48  void  
49  keycache_reload (HWND dlg)  /* Reload the key cache. */
50  {        void
51      refresh_cache_s rcs;  keycache_reload (HWND dlg)
52    {      
53      memset (&rcs, 0, sizeof rcs);      refresh_cache_s rcs;
54      rcs.kr_reload = rcs.kr_update = 1;  
55      rcs.tr_update = 0;      memset (&rcs, 0, sizeof rcs);
56      DialogBoxParam (glob_hinst, (LPCSTR)IDD_WINPT_KEYCACHE, dlg,                                              rcs.kr_reload = rcs.kr_update = 1;
57                      keycache_dlg_proc, (LPARAM)&rcs);      rcs.tr_update = 0;
58  }      DialogBoxParam (glob_hinst, (LPCSTR)IDD_WINPT_KEYCACHE, dlg,                                        
59                        keycache_dlg_proc, (LPARAM)&rcs);
60    }
61  /* Release both key cache objects. If @cleanup is 1,  
62     also release other global structs. */  
63  void  /* Release both key cache objects. If @cleanup is 1,
64  keycache_release (int cleanup)     also release other global structs. */
65  {  void
66      int n = gpg_keycache_get_size (pub);  keycache_release (int cleanup)
67      char tmpbuf[64];  {
68        int n = gpg_keycache_get_size (pub);
69      /* XXX: update the value when the cache has changed. */      char tmpbuf[64];
70      sprintf (tmpbuf, "%d", n);  
71      set_reg_key (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys", tmpbuf);      /* XXX: update the value when the cache has changed. */
72        sprintf (tmpbuf, "%d", n);
73      if (pub) {      set_reg_key (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys", tmpbuf);
74          gpg_keycache_release (pub);  
75          pub = NULL;      if (pub) {
76      }          gpg_keycache_release (pub);
77      if (sec) {          pub = NULL;
78          gpg_keycache_release (sec);      }
79          sec = NULL;      if (sec) {
80      }          gpg_keycache_release (sec);
81      if (cleanup) {          sec = NULL;
82          if (gpg_secring)      }
83              free (gpg_secring);      if (cleanup) {
84          gpg_secring = NULL;          if (gpg_secring)
85      }              free (gpg_secring);
86  }          gpg_secring = NULL;
87        }
88    }
89  /* Update the key with the keyid @keyid in the key cache.  
90     If @is_sec is 1, the secret key cache is used. */  
91  gpgme_error_t  /* Update the key with the keyid @keyid in the key cache.
92  keycache_update (int is_sec, const char *keyid)     If @is_sec is 1, the secret key cache is used. */
93  {  gpgme_error_t
94      gpg_keycache_t ctx = pub;  keycache_update (int is_sec, const char *keyid)
95      gpgme_error_t err;  {
96        gpg_keycache_t ctx = pub;
97      if (is_sec)      gpgme_error_t err;
98          ctx = sec;  
99      err = gpg_keycache_update_key (ctx, is_sec, pub, keyid);      if (is_sec)
100      if (is_sec)          ctx = sec;
101          gpg_keycache_prepare_single (ctx, keyid, NULL, gpg_secring);      err = gpg_keycache_update_key (ctx, is_sec, pub, keyid);
102      return err;      if (is_sec)
103  }          gpg_keycache_prepare_single (ctx, keyid, NULL, gpg_secring);
104        return err;
105  /* XXX: cache_keyring_names must be called then the GPG homedir changes! */  }
106    
107  gpgme_error_t  
108  keycache_init (const char *pubring, const char * secring)  /* Initialize both cache contexts. Use @pubring for the public
109  {     keyring and @secring for the secret keyring. */
110      struct progress_filter_s pfx;  gpgme_error_t
111      gpgme_error_t err;  keycache_init (const char *pubring, const char *secring)
112      int val = 0;  {
113      char * p;      struct progress_filter_s pfx;
114        gpgme_error_t err;
115      if (secring != NULL) {      int val = 0;
116          free_if_alloc (gpg_secring);      char *p;
117          gpg_secring = get_gnupg_keyring (0, NO_STRICT);  
118      }      if (secring != NULL) {
119            free_if_alloc (gpg_secring);
120      if (reload) {          gpg_secring = get_gnupg_keyring (0, NO_STRICT);
121          keycache_release (0);      }
122          reload = 0;      
123      }      p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys");
124      p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys");      if (p && *p != ' ') {
125      if (p && *p != ' ') {          val = atoi (p);
126          val = atoi (p);          free_if_alloc (p);
127          free_if_alloc (p);          memset (&pfx, 0, sizeof (pfx));
128          memset (&pfx, 0, sizeof (pfx));      }
129      }  
130        /* Release old contexts first. */
131      err = gpg_keycache_new (&pub);      keycache_release (0);
132      if (err)  
133          return err;      err = gpg_keycache_new (&pub);
134      if (val != 0)      if (err)
135          gpg_keycache_set_cb (pub, progress_callback, &pfx, val);          return err;
136      err = gpg_keycache_new (&sec);      if (val != 0)
137      if (!err)          gpg_keycache_set_cb (pub, progress_callback, &pfx, val);
138          err = gpg_keycache_init (pub, NULL, 0);      err = gpg_keycache_new (&sec);
139      if (!err)      if (!err)
140          err = gpg_keycache_init( sec, NULL, 1 );          err = gpg_keycache_init (pub, NULL, 0);
141      if( !err && pubring && *pubring )      if (!err)
142          err = gpg_keycache_prepare( pub, pubring, NULL );          err = gpg_keycache_init (sec, NULL, 1);
143      if( !err && secring && * secring )      if (!err && pubring && *pubring)
144          err = gpg_keycache_prepare( sec, NULL, secring );          err = gpg_keycache_prepare( pub, pubring, NULL);
145      if (!err)      if (!err && secring && * secring)
146          gpg_keycache_sync (pub, sec);          err = gpg_keycache_prepare (sec, NULL, secring);
147      if (val != 0)      if (!err)
148          progress_cleanup (&pfx);          gpg_keycache_sync (pub, sec);
149      return err;      if (val != 0)
150  } /* keycache_init */          progress_cleanup (&pfx);
151        return err;
152    }
153  void  
154  keycache_set_reload( int yes )  
155  {  /* Return the public cache context if @is_pub is set
156      reload = yes;     the secre cache context otherwise. */
157  } /* keycache_set_reload */  gpg_keycache_t
158    keycache_get_ctx (int is_pub)
159    {
160  int      return is_pub? pub : sec;
161  keycache_get_reload( void )  }
162  {  
163      return reload;  
164  } /* keycache_get_reload */  /* Get the GPG key with keyid @keyid from the cache. Return it
165       in @r_key on success. */
166    static int
167  gpg_keycache_t  get_key_from_cache (const char *keyid, gpgme_key_t *r_key,
168  keycache_get_ctx (int is_pub)                      struct keycache_s **c, int secret)
169  {  {
170      return is_pub? pub : sec;      gpg_keycache_t cache;
171  }      gpgme_error_t err;
172        int mode = secret? KEYCACHE_PRV : KEYCACHE_PUB;
173    
174  /* Get the GPG key with keyid @keyid from the cache. Return it      if (!keyid)
175     in @r_key on success. */          return WPTERR_GENERAL;
176  static int      if (r_key)
177  get_key_from_cache (const char *keyid, gpgme_key_t *r_key,          *r_key = NULL;
178                      struct keycache_s **c, int secret)      cache = keycache_get_ctx (mode);
179  {      if (!cache)
180      gpg_keycache_t cache;          BUG( NULL );
181      gpgme_error_t err;      if (!c)
182      int mode = secret? KEYCACHE_PRV : KEYCACHE_PUB;          err = gpg_keycache_find_key (cache, keyid, 0, r_key);
183        else
184      if (!keyid)          err = gpg_keycache_find_key2 (cache, keyid, 0, r_key, c);
185          return WPTERR_GENERAL;      return err? WPTERR_GENERAL : 0;
186      if (r_key)  }
187          *r_key = NULL;  
188      cache = keycache_get_ctx (mode);  
189      if (!cache)  /* Get GPG key with keyid @keyid directly from GPG and return
190          BUG( NULL );     it in @r_key on success. */
191      if (!c)  static int
192          err = gpg_keycache_find_key (cache, keyid, 0, r_key);  get_key_directly (const char *keyid, gpgme_key_t *r_key, int secret)
193      else  {
194          err = gpg_keycache_find_key2 (cache, keyid, 0, r_key, c);      gpgme_ctx_t ctx;
195      return err? WPTERR_GENERAL : 0;      gpgme_error_t err;
196  }  
197        err = gpgme_new (&ctx);
198        if (err)
199  /* Get GPG key with keyid @keyid directly from GPG and return          return WPTERR_GENERAL;
200     it in @r_key on success. */      err = gpgme_get_key (ctx, keyid, r_key, secret);
201  static int      gpgme_release (ctx);
202  get_key_directly (const char *keyid, gpgme_key_t *r_key, int secret)      return err? WPTERR_GENERAL : 0;
203  {  }
204      gpgme_ctx_t ctx;  
205      gpgme_error_t err;  
206    /* Search the public key with @keyid as the keyid in the cache and
207      err = gpgme_new (&ctx);     return the item in @k. */
208      if (err)  int
209          return WPTERR_GENERAL;  winpt_get_pubkey (const char *keyid, winpt_key_s *k)
210      err = gpgme_get_key (ctx, keyid, r_key, secret);  {
211      gpgme_release (ctx);      int rc;
212      return err? WPTERR_GENERAL : 0;      
213  }      rc = get_key_from_cache (keyid, &k->ctx, &k->ext, 0);
214        if (rc)
215            return rc;
216  int      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&
217  winpt_get_pubkey (const char *keyid, winpt_key_s *k)                  strlen (k->ctx->subkeys->fpr) == 32;
218  {      k->is_protected = k->ext->gloflags.is_protected;
219      int rc;      k->keyid = k->ctx->subkeys->keyid;
220            k->uid = k->ctx->uids->uid;
221      rc = get_key_from_cache (keyid, &k->ctx, &k->ext, 0);      return rc;
222      if (rc)  }
223          return rc;  
224      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA && strlen (k->ctx->subkeys->fpr) == 32;  
225      k->is_protected = k->ext->gloflags.is_protected;  int
226      k->keyid = k->ctx->subkeys->keyid;  winpt_get_seckey (const char *keyid, winpt_key_s *k)
227      k->uid = k->ctx->uids->uid;  {
228      return rc;      int rc;
229  }      rc = get_key_from_cache (keyid, &k->ctx, &k->ext, 1);
230        if (rc)
231            return rc;
232  int      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&
233  winpt_get_seckey (const char *keyid, winpt_key_s *k)                  strlen (k->ctx->subkeys->fpr) == 32;
234  {      k->is_protected = k->ext->gloflags.is_protected;
235      int rc;      k->keyid = k->ctx->subkeys->keyid;
236      rc = get_key_from_cache (keyid, &k->ctx, &k->ext, 1);      k->uid = k->ctx->uids->uid;
237      if (rc)      return rc;
238          return rc;  }
239      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA && strlen (k->ctx->subkeys->fpr) == 32;  
240      k->is_protected = k->ext->gloflags.is_protected;  
241      k->keyid = k->ctx->subkeys->keyid;  int
242      k->uid = k->ctx->uids->uid;  get_pubkey (const char *keyid, gpgme_key_t *ret_key)
243      return rc;  {
244  }      int rc;
245    
246        if (pub && sec)
247  int          rc = get_key_from_cache (keyid, ret_key, NULL, 0);
248  get_pubkey (const char *keyid, gpgme_key_t *ret_key)      else
249  {          rc = get_key_directly (keyid, ret_key, 0);
250      int rc = 0;      return rc;
251    }
252      if (pub && sec)  
253          rc = get_key_from_cache (keyid, ret_key, NULL, 0);  
254      else  int
255          rc = get_key_directly (keyid, ret_key, 0);  get_seckey (const char *keyid, gpgme_key_t *ret_skey)
256      return rc;  {
257  }      int rc;
258    
259        if (pub && sec)
260  int          rc = get_key_from_cache (keyid, ret_skey, NULL, 1);
261  get_seckey (const char *keyid, gpgme_key_t *ret_skey)      else
262  {          rc = get_key_directly (keyid, ret_skey, 1);
263      int rc = 0;      return rc;
264    }
265      if (pub && sec)  
266          rc = get_key_from_cache (keyid, ret_skey, NULL, 1);  
267      else  /* Search for insecure ElGamal keys and return the
268          rc = get_key_directly (keyid, ret_skey, 1);     number of founded keys. */
269      return rc;  int
270  }  count_insecure_elgkeys (void)
271    {
272        gpg_keycache_t pc;
273  /* Search for insecure ElGamal keys and return the      gpgme_key_t key;
274     number of founded keys. */      int n=0;
275  int  
276  count_insecure_elgkeys (void)      pc = keycache_get_ctx (1);
277  {      if (!pc)
278      gpg_keycache_t pc;          BUG (0);
279      gpgme_key_t key;      while (!gpg_keycache_next_key (pc, 0, &key)) {
280      int n=0;          if (key->subkeys->pubkey_algo == GPGME_PK_ELG)
281                n++;
282      pc = keycache_get_ctx (1);      }
283      if (!pc)      gpg_keycache_rewind (pc);
284          BUG (0);      return n;
285      while (!gpg_keycache_next_key (pc, 0, &key)) {  }
286          if (key->subkeys->pubkey_algo == GPGME_PK_ELG)  
287              n++;  
288      }  
289      gpg_keycache_rewind (pc);  /* Map the signature summary in @sum to signature status table index.
290      return n;     Return value: index to table. */
291  }  static int
292    sigsum_to_index (gpgme_sigsum_t sum)
293    {
294        if ((sum & GPGME_SIGSUM_VALID) && (sum & GPGME_SIGSUM_KEY_REVOKED))
295            return 7;
296        if ((sum & GPGME_SIGSUM_VALID) && (sum & GPGME_SIGSUM_SIG_EXPIRED))
297            return 6;
298        if (sum & GPGME_SIGSUM_GREEN)
299            return 1;
300        else if (sum & GPGME_SIGSUM_RED)
301            return 2;
302        else if (sum & GPGME_SIGSUM_KEY_MISSING)
303            return 3;
304        return 0;
305    }
306    
307    
308    /* Return a humand readable description for the signature status @sum. */
309    const char*
310    get_gpg_sigstat (gpgme_sigsum_t sum)
311    {
312        const char *gpg_sigstat[] = {
313            _("Error during verification process."),
314            _("The signature is good."),
315            _("The signature is BAD!"),
316            _("The signature could not be checked due to a missing key."),
317            _("No valid OpenPGP signature."),
318            _("Signature Error"),
319            _("Good Signature (Expired Key)"),
320            _("Good Signature (Revoked Key)"),
321            NULL
322        };
323        const unsigned int mask = 8;
324    
325        return gpg_sigstat[sigsum_to_index (sum) % mask];
326    }
327    
328    
329    /* Check if the secret keyring contains at least one
330       key with ultimate trust.
331       Return value: 0 on success. */
332    int
333    check_ultimate_trusted_key (void)
334    {
335        struct keycache_s *n;
336    
337        for (n = sec->item; n; n = n->next) {
338            if (n->pubpart &&
339                n->pubpart->key->owner_trust == GPGME_VALIDITY_ULTIMATE)
340            return 0;
341        }
342        return -1;
343    }

Legend:
Removed from v.25  
changed lines
  Added in v.175

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26