/[winpt]/trunk/Src/wptGPGME.cpp
ViewVC logotype

Diff of /trunk/Src/wptGPGME.cpp

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 25 by twoaday, Wed Oct 12 10:04:26 2005 UTC revision 271 by twoaday, Sun Nov 5 08:57:45 2006 UTC
# Line 1  Line 1 
1  /* wptGPGME.cpp - WinPT GPGME interface  /* wptGPGME.cpp - WinPT GPGME interface
2   *      Copyright (C) 2001-2005 Timo Schulz   *      Copyright (C) 2001-2006 Timo Schulz
3   *   *
4   * This file is part of WinPT.   * This file is part of WinPT.
5   *   *
6   * WinPT is free software; you can redistribute it and/or   * WinPT is free software; you can redistribute it and/or
7   * modify it under the terms of the GNU General Public License   * modify it under the terms of the GNU General Public License
8   * as published by the Free Software Foundation; either version 2   * as published by the Free Software Foundation; either version 2
9   * of the License, or (at your option) any later version.   * of the License, or (at your option) any later version.
10   *     *  
11   * WinPT is distributed in the hope that it will be useful,   * WinPT is distributed in the hope that it will be useful,
12   * but WITHOUT ANY WARRANTY; without even the implied warranty of   * but WITHOUT ANY WARRANTY; without even the implied warranty of
13   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14   * General Public License for more details.   * General Public License for more details.
15   *   *
16   * You should have received a copy of the GNU General Public License   * You should have received a copy of the GNU General Public License
17   * along with WinPT; if not, write to the Free Software Foundation,   * along with WinPT; if not, write to the Free Software Foundation,
18   * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA   * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
19   */   */
20    #ifdef HAVE_CONFIG_H
21  #include <sys/types.h>  #include <config.h>
22  #include <windows.h>  #endif
23    
24  #include "../resource.h"  #include <sys/types.h>
25  #include "wptNLS.h"  #include <windows.h>
26  #include "wptGPG.h"  
27  #include "wptErrors.h"  #include "resource.h"
28  #include "wptTypes.h"  #include "wptNLS.h"
29  #include "wptW32API.h"  #include "wptGPG.h"
30  #include "wptVersion.h"  #include "wptErrors.h"
31  #include "wptCommonCtl.h"  #include "wptTypes.h"
32  #include "wptContext.h"  #include "wptW32API.h"
33  #include "wptRegistry.h"  #include "wptVersion.h"
34  #include "wptDlgs.h"  #include "wptCommonCtl.h"
35    #include "wptContext.h"
36  #include "openpgp.h"  #include "wptRegistry.h"
37    #include "wptDlgs.h"
38  BOOL CALLBACK  keycache_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam);  
39  void progress_cleanup (progress_filter_s * pfx);  #include "openpgp.h"
40    
41  static gpg_keycache_t pub = NULL;  BOOL CALLBACK  keycache_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam);
42  static gpg_keycache_t sec = NULL;  void progress_cleanup (progress_filter_s * pfx);
43  static unsigned int reload = 0;  
44  static char *gpg_secring = NULL;  /* Global GPG key cache contexts. */
45    static gpg_keycache_t pub = NULL;
46    static gpg_keycache_t sec = NULL;
47  /* Reload the key cache. */  static char *gpg_secring = NULL;
48  void  
49  keycache_reload (HWND dlg)  
50  {        /* Return 1 if no cache is available.
51      refresh_cache_s rcs;     This can be the case if WinPT were run in command line mode. */
52    int
53      memset (&rcs, 0, sizeof rcs);  keycache_not_available (void)
54      rcs.kr_reload = rcs.kr_update = 1;  {
55      rcs.tr_update = 0;      return pub == NULL;
56      DialogBoxParam (glob_hinst, (LPCSTR)IDD_WINPT_KEYCACHE, dlg,                                          }
57                      keycache_dlg_proc, (LPARAM)&rcs);  
58  }  /* Release both key cache objects. If @cleanup is 1,
59       also release other global structs. */
60    void
61  /* Release both key cache objects. If @cleanup is 1,  keycache_release (int cleanup)
62     also release other global structs. */  {
63  void      char tmpbuf[64];
64  keycache_release (int cleanup)      int n = gpg_keycache_get_size (pub);
65  {  
66      int n = gpg_keycache_get_size (pub);      /* XXX: update the value when the cache has changed. */
67      char tmpbuf[64];      _snprintf (tmpbuf, DIM (tmpbuf)-1, "%d", n);
68        set_reg_key (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys", tmpbuf);
69      /* XXX: update the value when the cache has changed. */  
70      sprintf (tmpbuf, "%d", n);      if (pub) {
71      set_reg_key (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys", tmpbuf);          gpg_keycache_release (pub);
72            pub = NULL;
73      if (pub) {      }
74          gpg_keycache_release (pub);      if (sec) {
75          pub = NULL;          gpg_keycache_release (sec);
76      }          sec = NULL;
77      if (sec) {      }
78          gpg_keycache_release (sec);      if (cleanup)
79          sec = NULL;          safe_free (gpg_secring);
80      }  }
81      if (cleanup) {  
82          if (gpg_secring)  
83              free (gpg_secring);  /* Update the key with the keyid @keyid in the key cache.
84          gpg_secring = NULL;     If @is_sec is 1, the secret key cache is used. */
85      }  gpgme_error_t
86  }  keycache_update (int is_sec, const char *keyid)
87    {
88        gpg_keycache_t ctx = pub;
89  /* Update the key with the keyid @keyid in the key cache.      gpgme_error_t err;
90     If @is_sec is 1, the secret key cache is used. */  
91  gpgme_error_t      if (is_sec)
92  keycache_update (int is_sec, const char *keyid)          ctx = sec;
93  {      err = gpg_keycache_update_key (ctx, is_sec, pub, keyid);
94      gpg_keycache_t ctx = pub;      if (is_sec)
95      gpgme_error_t err;          gpg_keycache_prepare_single (ctx, keyid, NULL, gpg_secring);
96        return err;
97      if (is_sec)  }
98          ctx = sec;  
99      err = gpg_keycache_update_key (ctx, is_sec, pub, keyid);  
100      if (is_sec)  /* Initialize both cache contexts. Use @pubring for the public
101          gpg_keycache_prepare_single (ctx, keyid, NULL, gpg_secring);     keyring and @secring for the secret keyring. */
102      return err;  gpgme_error_t
103  }  keycache_init (const char *pubring, const char *secring)
104    {
105  /* XXX: cache_keyring_names must be called then the GPG homedir changes! */      struct progress_filter_s pfx;
106        gpgme_error_t err;
107  gpgme_error_t      int val = 0;
108  keycache_init (const char *pubring, const char * secring)      char *p;
109  {  
110      struct progress_filter_s pfx;      if (secring != NULL) {
111      gpgme_error_t err;          free_if_alloc (gpg_secring);
112      int val = 0;          gpg_secring = get_gnupg_keyring (0, NO_STRICT);
113      char * p;          log_debug ("keycache_init: secring path '%s'\r\n", gpg_secring);
114        }
115      if (secring != NULL) {      
116          free_if_alloc (gpg_secring);      p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys");
117          gpg_secring = get_gnupg_keyring (0, NO_STRICT);      if (p && *p != ' ') {
118      }          val = atoi (p);
119            free_if_alloc (p);      
120      if (reload) {      }
121          keycache_release (0);  
122          reload = 0;      memset (&pfx, 0, sizeof (pfx));
123      }      keycache_release (0); /* Release old contexts first. */
124      p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys");  
125      if (p && *p != ' ') {      err = gpg_keycache_new (&pub);
126          val = atoi (p);      if (err)
127          free_if_alloc (p);          return err;
128          memset (&pfx, 0, sizeof (pfx));      if (val != 0)
129      }          gpg_keycache_set_cb (pub, progress_callback, &pfx, val);
130        err = gpg_keycache_new (&sec);
131      err = gpg_keycache_new (&pub);      if (!err)
132      if (err)          err = gpg_keycache_init (pub, NULL, 0);
133          return err;      if (!err)
134      if (val != 0)          err = gpg_keycache_init (sec, NULL, 1);
135          gpg_keycache_set_cb (pub, progress_callback, &pfx, val);      if (!err && pubring && *pubring)
136      err = gpg_keycache_new (&sec);          err = gpg_keycache_prepare (pub, pubring, NULL);
137      if (!err)      if (!err && secring && * secring)
138          err = gpg_keycache_init (pub, NULL, 0);          err = gpg_keycache_prepare (sec, NULL, secring);
139      if (!err)      if (!err)
140          err = gpg_keycache_init( sec, NULL, 1 );          gpg_keycache_sync (pub, sec);
141      if( !err && pubring && *pubring )      if (val != 0)
142          err = gpg_keycache_prepare( pub, pubring, NULL );          progress_cleanup (&pfx);
143      if( !err && secring && * secring )      return err;
144          err = gpg_keycache_prepare( sec, NULL, secring );  }
145      if (!err)  
146          gpg_keycache_sync (pub, sec);  
147      if (val != 0)  /* Return the public cache context if @is_pub is set
148          progress_cleanup (&pfx);     the secre cache context otherwise. */
149      return err;  gpg_keycache_t
150  } /* keycache_init */  keycache_get_ctx (int is_pub)
151    {
152        gpg_keycache_t ctx;
153  void  
154  keycache_set_reload( int yes )      ctx = is_pub? pub : sec;
155  {      if (!ctx)
156      reload = yes;          BUG (0);
157  } /* keycache_set_reload */      return ctx;
158    }
159    
160  int  
161  keycache_get_reload( void )  /* Get the GPG key with keyid @keyid from the cache. Return it
162  {     in @r_key on success. */
163      return reload;  static gpgme_error_t
164  } /* keycache_get_reload */  get_key_from_cache (const char *keyid, int secret, gpgme_key_t *r_key,
165                        struct keycache_s **c)
166    {
167  gpg_keycache_t      gpg_keycache_t cache;
168  keycache_get_ctx (int is_pub)      gpgme_error_t err;
169  {      int mode = secret? KEYCACHE_PRV : KEYCACHE_PUB;
170      return is_pub? pub : sec;  
171  }      if (!keyid)
172            return gpg_error (GPG_ERR_INV_VALUE);
173        if (r_key)
174  /* Get the GPG key with keyid @keyid from the cache. Return it          *r_key = NULL;
175     in @r_key on success. */      cache = keycache_get_ctx (mode);
176  static int      if (!c)
177  get_key_from_cache (const char *keyid, gpgme_key_t *r_key,          err = gpg_keycache_find_key (cache, keyid, 0, r_key);
178                      struct keycache_s **c, int secret)      else
179  {          err = gpg_keycache_find_key2 (cache, keyid, 0, r_key, c);
180      gpg_keycache_t cache;      return err;
181      gpgme_error_t err;  }
182      int mode = secret? KEYCACHE_PRV : KEYCACHE_PUB;  
183    
184      if (!keyid)  /* Release the internal key structure.
185          return WPTERR_GENERAL;     If allocated is 0, assume fixed cache item. */
186      if (r_key)  void
187          *r_key = NULL;  winpt_release_pubkey (winpt_key_s *k)
188      cache = keycache_get_ctx (mode);  {
189      if (!cache)      /*log_box ("debug", 0, "alloc %d", k->allocated);*/
190          BUG( NULL );      if (!k->allocated)
191      if (!c)          return;
192          err = gpg_keycache_find_key (cache, keyid, 0, r_key);      gpg_keycache_item_release (k->ext);
193      else      k->ext = NULL;
194          err = gpg_keycache_find_key2 (cache, keyid, 0, r_key, c);      k->allocated = 0;
195      return err? WPTERR_GENERAL : 0;  }
196  }  
197    
198    /* Search the public key with @keyid as the keyid in the cache and
199  /* Get GPG key with keyid @keyid directly from GPG and return     return the item in @k. */
200     it in @r_key on success. */  gpgme_error_t
201  static int  winpt_get_pubkey (const char *keyid, winpt_key_s *k)
202  get_key_directly (const char *keyid, gpgme_key_t *r_key, int secret)  {
203  {      gpgme_error_t err = gpg_error (GPG_ERR_NO_ERROR);
204      gpgme_ctx_t ctx;      
205      gpgme_error_t err;      if (pub)
206            err = get_key_from_cache (keyid, 0, &k->ctx, &k->ext);
207      err = gpgme_new (&ctx);      else
208      if (err)          err = gpg_keycache_fetch_key (keyid, 0, &k->ctx, &k->ext);
209          return WPTERR_GENERAL;      if (err)
210      err = gpgme_get_key (ctx, keyid, r_key, secret);          return err;
211      gpgme_release (ctx);      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&
212      return err? WPTERR_GENERAL : 0;                  strlen (k->ctx->subkeys->fpr) == 32;
213  }      k->is_protected = k->ext->gloflags.is_protected;
214        k->keyid = k->ctx->subkeys->keyid+8;
215        k->uid = k->ext->uids->uid;
216  int      k->allocated = pub? 0 : 1;
217  winpt_get_pubkey (const char *keyid, winpt_key_s *k)      return 0;
218  {  }
219      int rc;  
220        
221      rc = get_key_from_cache (keyid, &k->ctx, &k->ext, 0);  gpgme_error_t
222      if (rc)  winpt_get_seckey (const char *keyid, winpt_key_s *k)
223          return rc;  {
224      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA && strlen (k->ctx->subkeys->fpr) == 32;      gpgme_error_t err;
225      k->is_protected = k->ext->gloflags.is_protected;  
226      k->keyid = k->ctx->subkeys->keyid;      if (sec)
227      k->uid = k->ctx->uids->uid;          err = get_key_from_cache (keyid, 1, &k->ctx, &k->ext);
228      return rc;      else
229  }          err = gpg_keycache_fetch_key (keyid, 1, &k->ctx, &k->ext);
230        if (err)
231            return err;
232  int      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&
233  winpt_get_seckey (const char *keyid, winpt_key_s *k)                  strlen (k->ctx->subkeys->fpr) == 32;
234  {      k->is_protected = k->ext->gloflags.is_protected;
235      int rc;      k->keyid = k->ctx->subkeys->keyid+8;
236      rc = get_key_from_cache (keyid, &k->ctx, &k->ext, 1);      k->uid = k->ext->uids->uid;
237      if (rc)      k->allocated = sec? 0 : 1;
238          return rc;      return 0;
239      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA && strlen (k->ctx->subkeys->fpr) == 32;  }
240      k->is_protected = k->ext->gloflags.is_protected;  
241      k->keyid = k->ctx->subkeys->keyid;  
242      k->uid = k->ctx->uids->uid;  gpgme_error_t
243      return rc;  get_pubkey (const char *keyid, gpgme_key_t *ret_key)
244  }  {
245        return get_key_from_cache (keyid, 0, ret_key, NULL);
246    }
247  int  
248  get_pubkey (const char *keyid, gpgme_key_t *ret_key)  
249  {  gpgme_error_t
250      int rc = 0;  get_seckey (const char *keyid, gpgme_key_t *ret_skey)
251    {
252      if (pub && sec)      return get_key_from_cache (keyid, 1, ret_skey, NULL);
253          rc = get_key_from_cache (keyid, ret_key, NULL, 0);  }
254      else  
255          rc = get_key_directly (keyid, ret_key, 0);  
256      return rc;  /* Map the signature summary in @sum to signature status table index.
257  }     Return value: index to table. */
258    static int
259    sigsum_to_index (gpgme_sigsum_t sum)
260  int  {
261  get_seckey (const char *keyid, gpgme_key_t *ret_skey)      if (sum & GPGME_SIGSUM_RED)
262  {          return 2;
263      int rc = 0;      else if (sum & GPGME_SIGSUM_SIG_EXPIRED)
264            return 8;
265      if (pub && sec)      else if (sum & GPGME_SIGSUM_KEY_REVOKED)
266          rc = get_key_from_cache (keyid, ret_skey, NULL, 1);          return 7;
267      else      else if (sum & GPGME_SIGSUM_KEY_EXPIRED)
268          rc = get_key_directly (keyid, ret_skey, 1);          return 6;
269      return rc;      else if (sum & GPGME_SIGSUM_GREEN)
270  }          return 1;
271        else if (sum & GPGME_SIGSUM_KEY_MISSING)
272            return 3;
273  /* Search for insecure ElGamal keys and return the      return 0;
274     number of founded keys. */  }
275  int  
276  count_insecure_elgkeys (void)  
277  {  /* Return a humand readable description for the signature status @sum.
278      gpg_keycache_t pc;     Warning: this function does not consider the validity of the key. */
279      gpgme_key_t key;  const char*
280      int n=0;  get_gpg_sigstat (gpgme_sigsum_t sum)
281    {
282      pc = keycache_get_ctx (1);      const char *gpg_sigstat[] = {
283      if (!pc)          _("Error during verification process"),
284          BUG (0);          _("The signature is good"),
285      while (!gpg_keycache_next_key (pc, 0, &key)) {          _("The signature is BAD!"),
286          if (key->subkeys->pubkey_algo == GPGME_PK_ELG)          _("The signature could not be checked due to a missing key"),
287              n++;          _("No valid OpenPGP signature"),
288      }          _("Signature Error"),
289      gpg_keycache_rewind (pc);          _("Good signature (Expired Key)"),
290      return n;          _("Good signature (Revoked Key)"),
291  }          _("Good signature (Expired)"),
292            NULL
293        };
294        const unsigned int mask = 9;
295    
296        return gpg_sigstat[sigsum_to_index (sum) % mask];
297    }
298    
299    
300    /* Return true if at least one secret key is available. */
301    bool
302    secret_key_available (void)
303    {
304        if (!sec || gpg_keycache_get_size (sec) == 0)
305            return false;
306        return true;
307    }

Legend:
Removed from v.25  
changed lines
  Added in v.271

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26