/[winpt]/trunk/Src/wptGPGME.cpp
ViewVC logotype

Diff of /trunk/Src/wptGPGME.cpp

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 2 by twoaday, Mon Jan 31 11:02:21 2005 UTC revision 212 by twoaday, Tue May 9 10:29:07 2006 UTC
# Line 1  Line 1 
1  /* wptGPGME.cpp - WinPT GPGME interface  /* wptGPGME.cpp - WinPT GPGME interface
2   *      Copyright (C) 2001-2004 Timo Schulz   *      Copyright (C) 2001-2005 Timo Schulz
3   *   *
4   * This file is part of WinPT.   * This file is part of WinPT.
5   *   *
6   * WinPT is free software; you can redistribute it and/or   * WinPT is free software; you can redistribute it and/or
7   * modify it under the terms of the GNU General Public License   * modify it under the terms of the GNU General Public License
8   * as published by the Free Software Foundation; either version 2   * as published by the Free Software Foundation; either version 2
9   * of the License, or (at your option) any later version.   * of the License, or (at your option) any later version.
10   *     *  
11   * WinPT is distributed in the hope that it will be useful,   * WinPT is distributed in the hope that it will be useful,
12   * but WITHOUT ANY WARRANTY; without even the implied warranty of   * but WITHOUT ANY WARRANTY; without even the implied warranty of
13   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14   * General Public License for more details.   * General Public License for more details.
15   *   *
16   * You should have received a copy of the GNU General Public License   * You should have received a copy of the GNU General Public License
17   * along with WinPT; if not, write to the Free Software Foundation,   * along with WinPT; if not, write to the Free Software Foundation,
18   * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA   * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
19   */   */
20    #ifdef HAVE_CONFIG_H
21  #include <sys/types.h>  #include <config.h>
22  #include <windows.h>  #endif
23    
24  #include "../resource.h"  #include <sys/types.h>
25  #include "wptNLS.h"  #include <windows.h>
26  #include "wptGPG.h"  
27  #include "wptErrors.h"  #include "resource.h"
28  #include "wptTypes.h"  #include "wptNLS.h"
29  #include "wptW32API.h"  #include "wptGPG.h"
30  #include "wptVersion.h"  #include "wptErrors.h"
31  #include "wptCommonCtl.h"  #include "wptTypes.h"
32  #include "wptContext.h"  #include "wptW32API.h"
33  #include "wptRegistry.h"  #include "wptVersion.h"
34  #include "wptDlgs.h"  #include "wptCommonCtl.h"
35    #include "wptContext.h"
36  #include "openpgp.h"  #include "wptRegistry.h"
37    #include "wptDlgs.h"
38  BOOL CALLBACK  keycache_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam);  
39  void progress_cleanup (progress_filter_s * pfx);  #include "openpgp.h"
40    
41  static gpgme_keycache_t pub = NULL;  BOOL CALLBACK  keycache_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam);
42  static gpgme_keycache_t sec = NULL;  void progress_cleanup (progress_filter_s * pfx);
43  static unsigned int reload = 0;  
44    /* Global GPG key cache contexts. */
45    static gpg_keycache_t pub = NULL;
46  void  static gpg_keycache_t sec = NULL;
47  keycache_reload (HWND dlg)  static char *gpg_secring = NULL;
48  {        
49      refresh_cache_s rcs = {0};  
50    /* Reload the key cache. */
51      rcs.kr_reload = rcs.kr_update = 1;  void
52      rcs.tr_update = 1;  keycache_reload (HWND dlg)
53      DialogBoxParam( glob_hinst, (LPCSTR)IDD_WINPT_KEYCACHE, dlg,                                          {      
54                      keycache_dlg_proc, (LPARAM)&rcs );      refresh_cache_s rcs;
55  } /* keycache_reload */  
56        memset (&rcs, 0, sizeof rcs);
57  void      rcs.kr_reload = rcs.kr_update = 1;
58  keycache_release (void)      rcs.tr_update = 0;
59  {      DialogBoxParam (glob_hinst, (LPCSTR)IDD_WINPT_KEYCACHE, dlg,                                        
60      int n = gpgme_keycache_count (pub);                      keycache_dlg_proc, (LPARAM)&rcs);
61      char tmpbuf[64];  }
62    
63      sprintf (tmpbuf, "%d", n);  
64      set_reg_key (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys", tmpbuf);  /* Release both key cache objects. If @cleanup is 1,
65       also release other global structs. */
66      if (pub) {  void
67          gpgme_keycache_release( pub );  keycache_release (int cleanup)
68          pub = NULL;  {
69      }      int n = gpg_keycache_get_size (pub);
70      if (sec) {      char tmpbuf[64];
71          gpgme_keycache_release( sec );  
72          sec = NULL;      /* XXX: update the value when the cache has changed. */
73      }      sprintf (tmpbuf, "%d", n);
74  } /* keycache_release */      set_reg_key (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys", tmpbuf);
75    
76        if (pub) {
77  gpgme_error_t          gpg_keycache_release (pub);
78  keycache_init( const char *pubring, const char * secring )          pub = NULL;
79  {      }
80      struct progress_filter_s pfx;      if (sec) {
81      gpgme_error_t err;          gpg_keycache_release (sec);
82      int val = 0;          sec = NULL;
83      char * p;      }
84        if (cleanup)
85      if (reload) {          safe_free (gpg_secring);
86          keycache_release ();  }
87          reload = 0;  
88      }  
89      p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys");  /* Update the key with the keyid @keyid in the key cache.
90      if (p && *p != ' ')     If @is_sec is 1, the secret key cache is used. */
91      {  gpgme_error_t
92          val = atoi (p);  keycache_update (int is_sec, const char *keyid)
93          free_if_alloc (p);  {
94          memset (&pfx, 0, sizeof pfx);      gpg_keycache_t ctx = pub;
95      }      gpgme_error_t err;
96    
97      err = gpgme_keycache_new (&pub);      if (is_sec)
98      if (err)          ctx = sec;
99          return err;      err = gpg_keycache_update_key (ctx, is_sec, pub, keyid);
100      if (val != 0)      if (is_sec)
101          gpgme_keycache_set_cb (pub, progress_callback, &pfx, val);          gpg_keycache_prepare_single (ctx, keyid, NULL, gpg_secring);
102      err = gpgme_keycache_new (&sec);      return err;
103      if (!err)  }
104          err = gpgme_keycache_init (pub, NULL, 0);  
105      if (!err)  
106          err = gpgme_keycache_init( sec, NULL, 1 );  /* Initialize both cache contexts. Use @pubring for the public
107      if( !err && pubring && *pubring )     keyring and @secring for the secret keyring. */
108          err = gpgme_keycache_prepare( pub, pubring, NULL );  gpgme_error_t
109      if( !err && secring && * secring )  keycache_init (const char *pubring, const char *secring)
110          err = gpgme_keycache_prepare( sec, NULL, secring );  {
111      if (!err)      struct progress_filter_s pfx;
112          gpgme_keycache_sync (pub, sec);      gpgme_error_t err;
113      if (val != 0)      int val = 0;
114          progress_cleanup (&pfx);      char *p;
115      return err;  
116  } /* keycache_init */      if (secring != NULL) {
117            free_if_alloc (gpg_secring);
118            gpg_secring = get_gnupg_keyring (0, NO_STRICT);
119  void      }
120  keycache_set_reload( int yes )      
121  {      p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys");
122      reload = yes;      if (p && *p != ' ') {
123  } /* keycache_set_reload */          val = atoi (p);
124            free_if_alloc (p);      
125        }
126  int  
127  keycache_get_reload( void )      memset (&pfx, 0, sizeof (pfx));
128  {      /* Release old contexts first. */
129      return reload;      keycache_release (0);
130  } /* keycache_get_reload */  
131        err = gpg_keycache_new (&pub);
132        if (err)
133  gpgme_keycache_t          return err;
134  keycache_get_ctx( int is_pub )      if (val != 0)
135  {          gpg_keycache_set_cb (pub, progress_callback, &pfx, val);
136      return is_pub? pub : sec;      err = gpg_keycache_new (&sec);
137  } /* keycache_get_ctx */      if (!err)
138            err = gpg_keycache_init (pub, NULL, 0);
139        if (!err)
140  static int          err = gpg_keycache_init (sec, NULL, 1);
141  get_key( const char *keyid, gpgme_key_t *r_key, int secret )      if (!err && pubring && *pubring)
142  {          err = gpg_keycache_prepare (pub, pubring, NULL);
143      gpgme_keycache_t cache;      if (!err && secring && * secring)
144      gpgme_error_t err;          err = gpg_keycache_prepare (sec, NULL, secring);
145      int mode = secret? KEYCACHE_PRV : KEYCACHE_PUB;      if (!err)
146            gpg_keycache_sync (pub, sec);
147      if( !keyid )      if (val != 0)
148          return WPTERR_GENERAL;          progress_cleanup (&pfx);
149      if( r_key )      return err;
150          *r_key = NULL;  }
151      cache = keycache_get_ctx( mode );  
152      if( !cache )  
153          BUG( NULL );  /* Return the public cache context if @is_pub is set
154      err = gpgme_keycache_find_key( cache, keyid, 0, r_key );     the secre cache context otherwise. */
155      if( err )  gpg_keycache_t
156          return WPTERR_GENERAL;  keycache_get_ctx (int is_pub)
157      return 0;  {
158  } /* get_key */      gpg_keycache_t ctx;
159    
160        ctx = is_pub? pub : sec;
161  static int      if (!ctx)
162  get_key2( const char * keyid, gpgme_key_t * r_key, int secret )          BUG (0);
163  {      return ctx;
164      gpg_iobuf_t inp;  }
165      char * p;  
166      int rc;  
167    /* Get the GPG key with keyid @keyid from the cache. Return it
168      p = get_gnupg_keyring (1, !NO_STRICT);     in @r_key on success. */
169      if( !p )  static gpgme_error_t
170          BUG( NULL );  get_key_from_cache (const char *keyid, gpgme_key_t *r_key,
171                        struct keycache_s **c, int secret)
172      inp = gpg_iobuf_open( p );  {
173      if( !inp ) {      gpg_keycache_t cache;
174          const char *s = winpt_strerror( WPTERR_FILE_OPEN );      gpgme_error_t err;
175          log_box( _("WinPT Error"), 0, "%s: %s", p, s );      int mode = secret? KEYCACHE_PRV : KEYCACHE_PUB;
176          free_if_alloc( p );  
177          return NULL;      if (!keyid)
178      }          return gpg_error (GPG_ERR_INV_VALUE);
179      gpg_iobuf_ioctl( inp, 3, 1, NULL ); /* disable cache */      if (r_key)
180      rc = gpgme_getkey_bykeyid( inp, keyid, r_key );          *r_key = NULL;
181        cache = keycache_get_ctx (mode);
182      gpg_iobuf_close( inp );      if (!c)
183      free_if_alloc( p );          err = gpg_keycache_find_key (cache, keyid, 0, r_key);
184      return rc;      else
185  } /* get_key2 */          err = gpg_keycache_find_key2 (cache, keyid, 0, r_key, c);
186        return err;
187    }
188  int  
189  get_pubkey( const char *keyid, gpgme_key_t *ret_key )  
190  {  /* Get GPG key with keyid @keyid directly from GPG and return
191      int rc = 0;     it in @r_key on success. */
192    static gpgme_error_t
193      if( pub && sec )  get_key_directly (const char *keyid, gpgme_key_t *r_key, int secret)
194          rc = get_key( keyid, ret_key, 0 );  {
195      else      gpgme_ctx_t ctx;
196          rc = get_key2( keyid, ret_key, 0 );      gpgme_error_t err;
197      return rc;  
198  } /* get_pubkey */      err = gpgme_new (&ctx);
199        if (err)
200            return err;
201  int      err = gpgme_get_key (ctx, keyid, r_key, secret);
202  get_seckey( const char *keyid, gpgme_key_t *ret_skey )      gpgme_release (ctx);
203  {      return err;
204      int rc = 0;  }
205    
206      if( pub && sec )  
207          rc = get_key( keyid, ret_skey, 1 );  /* Search the public key with @keyid as the keyid in the cache and
208      else     return the item in @k. */
209          rc = get_key2( keyid, ret_skey, 1 );  gpgme_error_t
210      return rc;  winpt_get_pubkey (const char *keyid, winpt_key_s *k)
211  } /* get_seckey */  {
212        gpgme_error_t err;
213        
214  int      err = get_key_from_cache (keyid, &k->ctx, &k->ext, 0);
215  count_insecure_elgkeys (void)      if (err)
216  {          return err;
217      gpgme_keycache_t pc;      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&
218      gpgme_key_t key;                  strlen (k->ctx->subkeys->fpr) == 32;
219      int n=0;      k->is_protected = k->ext->gloflags.is_protected;
220        k->keyid = k->ctx->subkeys->keyid+8;
221      pc = keycache_get_ctx (1);      k->uid = k->ext->uids->uid;
222      if (!pc)      return 0;
223          BUG (0);  }
224      while (!gpgme_keycache_next_key (pc, 0, &key)) {  
225          if (gpgme_key_get_ulong_attr (key, GPGME_ATTR_ALGO, NULL, 0)  
226              == GPGME_PK_ELG_ES)  gpgme_error_t
227              n++;  winpt_get_seckey (const char *keyid, winpt_key_s *k)
228      }  {
229      gpgme_keycache_rewind (pc);      gpgme_error_t err;
230      return n;  
231  }      err = get_key_from_cache (keyid, &k->ctx, &k->ext, 1);
232        if (err)
233            return err;
234        k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&
235                    strlen (k->ctx->subkeys->fpr) == 32;
236        k->is_protected = k->ext->gloflags.is_protected;
237        k->keyid = k->ctx->subkeys->keyid+8;
238        k->uid = k->ext->uids->uid;
239        return 0;
240    }
241    
242    
243    gpgme_error_t
244    get_pubkey (const char *keyid, gpgme_key_t *ret_key)
245    {
246        gpgme_error_t rc;
247    
248        if (pub && sec)
249            rc = get_key_from_cache (keyid, ret_key, NULL, 0);
250        else
251            rc = get_key_directly (keyid, ret_key, 0);
252        return rc;
253    }
254    
255    
256    gpgme_error_t
257    get_seckey (const char *keyid, gpgme_key_t *ret_skey)
258    {
259        gpgme_error_t rc;
260    
261        if (pub && sec)
262            rc = get_key_from_cache (keyid, ret_skey, NULL, 1);
263        else
264            rc = get_key_directly (keyid, ret_skey, 1);
265        return rc;
266    }
267    
268    
269    /* Search for insecure ElGamal keys and return the
270       number of founded keys. */
271    int
272    count_insecure_elgkeys (void)
273    {
274        gpg_keycache_t pc;
275        gpgme_key_t key;
276        int n=0;
277    
278        pc = keycache_get_ctx (1);
279        while (!gpg_keycache_next_key (pc, 0, &key)) {
280            if (key->subkeys->pubkey_algo == GPGME_PK_ELG)
281                n++;
282        }
283        gpg_keycache_rewind (pc);
284        return n;
285    }
286    
287    
288    
289    /* Map the signature summary in @sum to signature status table index.
290       Return value: index to table. */
291    static int
292    sigsum_to_index (gpgme_sigsum_t sum)
293    {
294        if ((sum & GPGME_SIGSUM_VALID) && (sum & GPGME_SIGSUM_KEY_REVOKED))
295            return 7;
296        if ((sum & GPGME_SIGSUM_VALID) && (sum & GPGME_SIGSUM_SIG_EXPIRED))
297            return 6;
298        if (sum & GPGME_SIGSUM_GREEN)
299            return 1;
300        else if (sum & GPGME_SIGSUM_RED)
301            return 2;
302        else if (sum & GPGME_SIGSUM_KEY_MISSING)
303            return 3;
304        return 0;
305    }
306    
307    
308    /* Return a humand readable description for the signature status @sum. */
309    const char*
310    get_gpg_sigstat (gpgme_sigsum_t sum)
311    {
312        const char *gpg_sigstat[] = {
313            _("Error during verification process."),
314            _("The signature is good."),
315            _("The signature is BAD!"),
316            _("The signature could not be checked due to a missing key."),
317            _("No valid OpenPGP signature."),
318            _("Signature Error"),
319            _("Good Signature (Expired Key)"),
320            _("Good Signature (Revoked Key)"),
321            NULL
322        };
323        const unsigned int mask = 8;
324    
325        return gpg_sigstat[sigsum_to_index (sum) % mask];
326    }
327    
328    
329    /* Check if the secret keyring contains at least one
330       key with ultimate trust.
331       Return value: 0 on success. */
332    int
333    check_ultimate_trusted_key (void)
334    {
335        struct keycache_s *n;
336    
337        for (n = sec->item; n; n = n->next) {
338            if (n->pubpart &&
339                n->pubpart->key->owner_trust == GPGME_VALIDITY_ULTIMATE)
340            return 0;
341        }
342        return -1;
343    }

Legend:
Removed from v.2  
changed lines
  Added in v.212

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26