/[winpt]/trunk/Src/wptGPGME.cpp
ViewVC logotype

Diff of /trunk/Src/wptGPGME.cpp

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 32 by twoaday, Mon Oct 24 08:03:48 2005 UTC revision 255 by twoaday, Tue Aug 1 16:37:23 2006 UTC
# Line 1  Line 1 
1  /* wptGPGME.cpp - WinPT GPGME interface  /* wptGPGME.cpp - WinPT GPGME interface
2   *      Copyright (C) 2001-2005 Timo Schulz   *      Copyright (C) 2001-2006 Timo Schulz
3   *   *
4   * This file is part of WinPT.   * This file is part of WinPT.
5   *   *
6   * WinPT is free software; you can redistribute it and/or   * WinPT is free software; you can redistribute it and/or
7   * modify it under the terms of the GNU General Public License   * modify it under the terms of the GNU General Public License
8   * as published by the Free Software Foundation; either version 2   * as published by the Free Software Foundation; either version 2
9   * of the License, or (at your option) any later version.   * of the License, or (at your option) any later version.
10   *     *  
11   * WinPT is distributed in the hope that it will be useful,   * WinPT is distributed in the hope that it will be useful,
12   * but WITHOUT ANY WARRANTY; without even the implied warranty of   * but WITHOUT ANY WARRANTY; without even the implied warranty of
13   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14   * General Public License for more details.   * General Public License for more details.
15   *   *
16   * You should have received a copy of the GNU General Public License   * You should have received a copy of the GNU General Public License
17   * along with WinPT; if not, write to the Free Software Foundation,   * along with WinPT; if not, write to the Free Software Foundation,
18   * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA   * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
19   */   */
20    #ifdef HAVE_CONFIG_H
21  #include <sys/types.h>  #include <config.h>
22  #include <windows.h>  #endif
23    
24  #include "../resource.h"  #include <sys/types.h>
25  #include "wptNLS.h"  #include <windows.h>
26  #include "wptGPG.h"  
27  #include "wptErrors.h"  #include "resource.h"
28  #include "wptTypes.h"  #include "wptNLS.h"
29  #include "wptW32API.h"  #include "wptGPG.h"
30  #include "wptVersion.h"  #include "wptErrors.h"
31  #include "wptCommonCtl.h"  #include "wptTypes.h"
32  #include "wptContext.h"  #include "wptW32API.h"
33  #include "wptRegistry.h"  #include "wptVersion.h"
34  #include "wptDlgs.h"  #include "wptCommonCtl.h"
35    #include "wptContext.h"
36  #include "openpgp.h"  #include "wptRegistry.h"
37    #include "wptDlgs.h"
38  BOOL CALLBACK  keycache_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam);  
39  void progress_cleanup (progress_filter_s * pfx);  #include "openpgp.h"
40    
41  static gpg_keycache_t pub = NULL;  BOOL CALLBACK  keycache_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam);
42  static gpg_keycache_t sec = NULL;  void progress_cleanup (progress_filter_s * pfx);
43  static unsigned int reload = 0;  
44  static char *gpg_secring = NULL;  /* Global GPG key cache contexts. */
45    static gpg_keycache_t pub = NULL;
46    static gpg_keycache_t sec = NULL;
47  /* Reload the key cache. */  static char *gpg_secring = NULL;
48  void  
49  keycache_reload (HWND dlg)  
50  {        int
51      refresh_cache_s rcs;  keycache_not_available (void)
52    {
53      memset (&rcs, 0, sizeof rcs);      return pub == NULL;
54      rcs.kr_reload = rcs.kr_update = 1;  }
55      rcs.tr_update = 0;  
56      DialogBoxParam (glob_hinst, (LPCSTR)IDD_WINPT_KEYCACHE, dlg,                                          /* Release both key cache objects. If @cleanup is 1,
57                      keycache_dlg_proc, (LPARAM)&rcs);     also release other global structs. */
58  }  void
59    keycache_release (int cleanup)
60    {
61  /* Release both key cache objects. If @cleanup is 1,      char tmpbuf[64];
62     also release other global structs. */      int n = gpg_keycache_get_size (pub);
63  void  
64  keycache_release (int cleanup)      /* XXX: update the value when the cache has changed. */
65  {      sprintf (tmpbuf, "%d", n);
66      int n = gpg_keycache_get_size (pub);      set_reg_key (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys", tmpbuf);
67      char tmpbuf[64];  
68        if (pub) {
69      /* XXX: update the value when the cache has changed. */          gpg_keycache_release (pub);
70      sprintf (tmpbuf, "%d", n);          pub = NULL;
71      set_reg_key (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys", tmpbuf);      }
72        if (sec) {
73      if (pub) {          gpg_keycache_release (sec);
74          gpg_keycache_release (pub);          sec = NULL;
75          pub = NULL;      }
76      }      if (cleanup)
77      if (sec) {          safe_free (gpg_secring);
78          gpg_keycache_release (sec);  }
79          sec = NULL;  
80      }  
81      if (cleanup) {  /* Update the key with the keyid @keyid in the key cache.
82          if (gpg_secring)     If @is_sec is 1, the secret key cache is used. */
83              free (gpg_secring);  gpgme_error_t
84          gpg_secring = NULL;  keycache_update (int is_sec, const char *keyid)
85      }  {
86  }      gpg_keycache_t ctx = pub;
87        gpgme_error_t err;
88    
89  /* Update the key with the keyid @keyid in the key cache.      if (is_sec)
90     If @is_sec is 1, the secret key cache is used. */          ctx = sec;
91  gpgme_error_t      err = gpg_keycache_update_key (ctx, is_sec, pub, keyid);
92  keycache_update (int is_sec, const char *keyid)      if (is_sec)
93  {          gpg_keycache_prepare_single (ctx, keyid, NULL, gpg_secring);
94      gpg_keycache_t ctx = pub;      return err;
95      gpgme_error_t err;  }
96    
97      if (is_sec)  
98          ctx = sec;  /* Initialize both cache contexts. Use @pubring for the public
99      err = gpg_keycache_update_key (ctx, is_sec, pub, keyid);     keyring and @secring for the secret keyring. */
100      if (is_sec)  gpgme_error_t
101          gpg_keycache_prepare_single (ctx, keyid, NULL, gpg_secring);  keycache_init (const char *pubring, const char *secring)
102      return err;  {
103  }      struct progress_filter_s pfx;
104        gpgme_error_t err;
105  /* XXX: cache_keyring_names must be called then the GPG homedir changes! */      int val = 0;
106        char *p;
107  /* Initialize both cache contexts. Use @pubring for the public  
108     keyring and @secring for the secret keyring. */      if (secring != NULL) {
109  gpgme_error_t          free_if_alloc (gpg_secring);
110  keycache_init (const char *pubring, const char *secring)          gpg_secring = get_gnupg_keyring (0, NO_STRICT);
111  {      }
112      struct progress_filter_s pfx;      
113      gpgme_error_t err;      p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys");
114      int val = 0;      if (p && *p != ' ') {
115      char *p;          val = atoi (p);
116            free_if_alloc (p);      
117      if (secring != NULL) {      }
118          free_if_alloc (gpg_secring);  
119          gpg_secring = get_gnupg_keyring (0, NO_STRICT);      memset (&pfx, 0, sizeof (pfx));
120      }      keycache_release (0); /* Release old contexts first. */
121    
122      if (reload) {      err = gpg_keycache_new (&pub);
123          keycache_release (0);      if (err)
124          reload = 0;          return err;
125      }      if (val != 0)
126      p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys");          gpg_keycache_set_cb (pub, progress_callback, &pfx, val);
127      if (p && *p != ' ') {      err = gpg_keycache_new (&sec);
128          val = atoi (p);      if (!err)
129          free_if_alloc (p);          err = gpg_keycache_init (pub, NULL, 0);
130          memset (&pfx, 0, sizeof (pfx));      if (!err)
131      }          err = gpg_keycache_init (sec, NULL, 1);
132        if (!err && pubring && *pubring)
133      err = gpg_keycache_new (&pub);          err = gpg_keycache_prepare (pub, pubring, NULL);
134      if (err)      if (!err && secring && * secring)
135          return err;          err = gpg_keycache_prepare (sec, NULL, secring);
136      if (val != 0)      if (!err)
137          gpg_keycache_set_cb (pub, progress_callback, &pfx, val);          gpg_keycache_sync (pub, sec);
138      err = gpg_keycache_new (&sec);      if (val != 0)
139      if (!err)          progress_cleanup (&pfx);
140          err = gpg_keycache_init (pub, NULL, 0);      return err;
141      if (!err)  }
142          err = gpg_keycache_init( sec, NULL, 1 );  
143      if( !err && pubring && *pubring )  
144          err = gpg_keycache_prepare( pub, pubring, NULL );  /* Return the public cache context if @is_pub is set
145      if( !err && secring && * secring )     the secre cache context otherwise. */
146          err = gpg_keycache_prepare( sec, NULL, secring );  gpg_keycache_t
147      if (!err)  keycache_get_ctx (int is_pub)
148          gpg_keycache_sync (pub, sec);  {
149      if (val != 0)      gpg_keycache_t ctx;
150          progress_cleanup (&pfx);  
151      return err;      ctx = is_pub? pub : sec;
152  }      if (!ctx)
153            BUG (0);
154        return ctx;
155  /* If @val = 1 indicate to reload the cache. */  }
156  void  
157  keycache_set_reload (int val)  
158  {  /* Get the GPG key with keyid @keyid from the cache. Return it
159      reload = val;     in @r_key on success. */
160  }  static gpgme_error_t
161    get_key_from_cache (const char *keyid, int secret, gpgme_key_t *r_key,
162                        struct keycache_s **c)
163  /* Return the reload cache flag. */  {
164  int      gpg_keycache_t cache;
165  keycache_get_reload (void)      gpgme_error_t err;
166  {      int mode = secret? KEYCACHE_PRV : KEYCACHE_PUB;
167      return reload;  
168  }      if (!keyid)
169            return gpg_error (GPG_ERR_INV_VALUE);
170        if (r_key)
171  /* Return the public cache context if @is_pub is set          *r_key = NULL;
172     the secre cache context otherwise. */      cache = keycache_get_ctx (mode);
173  gpg_keycache_t      if (!c)
174  keycache_get_ctx (int is_pub)          err = gpg_keycache_find_key (cache, keyid, 0, r_key);
175  {      else
176      return is_pub? pub : sec;          err = gpg_keycache_find_key2 (cache, keyid, 0, r_key, c);
177  }      return err;
178    }
179    
180  /* Get the GPG key with keyid @keyid from the cache. Return it  
181     in @r_key on success. */  /* Release the internal key structure.
182  static int     If allocated is 0, assume fixed cache item. */
183  get_key_from_cache (const char *keyid, gpgme_key_t *r_key,  void
184                      struct keycache_s **c, int secret)  winpt_release_pubkey (winpt_key_s *k)
185  {  {
186      gpg_keycache_t cache;      /*log_box ("debug", 0, "alloc %d", k->allocated);*/
187      gpgme_error_t err;      if (!k->allocated)
188      int mode = secret? KEYCACHE_PRV : KEYCACHE_PUB;          return;
189        gpg_keycache_item_release (k->ext);
190      if (!keyid)      k->ext = NULL;
191          return WPTERR_GENERAL;      k->allocated = 0;
192      if (r_key)  }
193          *r_key = NULL;  
194      cache = keycache_get_ctx (mode);  
195      if (!cache)  /* Search the public key with @keyid as the keyid in the cache and
196          BUG( NULL );     return the item in @k. */
197      if (!c)  gpgme_error_t
198          err = gpg_keycache_find_key (cache, keyid, 0, r_key);  winpt_get_pubkey (const char *keyid, winpt_key_s *k)
199      else  {
200          err = gpg_keycache_find_key2 (cache, keyid, 0, r_key, c);      gpgme_error_t err = gpg_error (GPG_ERR_NO_ERROR);
201      return err? WPTERR_GENERAL : 0;      
202  }      if (pub)
203            err = get_key_from_cache (keyid, 0, &k->ctx, &k->ext);
204        else
205  /* Get GPG key with keyid @keyid directly from GPG and return          err = gpg_keycache_fetch_key (keyid, 0, &k->ctx, &k->ext);
206     it in @r_key on success. */      if (err)
207  static int          return err;
208  get_key_directly (const char *keyid, gpgme_key_t *r_key, int secret)      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&
209  {                  strlen (k->ctx->subkeys->fpr) == 32;
210      gpgme_ctx_t ctx;      k->is_protected = k->ext->gloflags.is_protected;
211      gpgme_error_t err;      k->keyid = k->ctx->subkeys->keyid+8;
212        k->uid = k->ext->uids->uid;
213      err = gpgme_new (&ctx);      k->allocated = pub? 0 : 1;
214      if (err)      return 0;
215          return WPTERR_GENERAL;  }
216      err = gpgme_get_key (ctx, keyid, r_key, secret);  
217      gpgme_release (ctx);  
218      return err? WPTERR_GENERAL : 0;  gpgme_error_t
219  }  winpt_get_seckey (const char *keyid, winpt_key_s *k)
220    {
221        gpgme_error_t err;
222  /* Search the public key with @keyid as the keyid in the cache and  
223     return the item in @k. */      if (sec)
224  int          err = get_key_from_cache (keyid, 1, &k->ctx, &k->ext);
225  winpt_get_pubkey (const char *keyid, winpt_key_s *k)      else
226  {          err = gpg_keycache_fetch_key (keyid, 1, &k->ctx, &k->ext);
227      int rc;      if (err)
228                return err;
229      rc = get_key_from_cache (keyid, &k->ctx, &k->ext, 0);      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&
230      if (rc)                  strlen (k->ctx->subkeys->fpr) == 32;
231          return rc;      k->is_protected = k->ext->gloflags.is_protected;
232      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&      k->keyid = k->ctx->subkeys->keyid+8;
233                  strlen (k->ctx->subkeys->fpr) == 32;      k->uid = k->ext->uids->uid;
234      k->is_protected = k->ext->gloflags.is_protected;      k->allocated = sec? 0 : 1;
235      k->keyid = k->ctx->subkeys->keyid;      return 0;
236      k->uid = k->ctx->uids->uid;  }
237      return rc;  
238  }  
239    gpgme_error_t
240    get_pubkey (const char *keyid, gpgme_key_t *ret_key)
241  int  {
242  winpt_get_seckey (const char *keyid, winpt_key_s *k)      return get_key_from_cache (keyid, 0, ret_key, NULL);
243  {  }
244      int rc;  
245      rc = get_key_from_cache (keyid, &k->ctx, &k->ext, 1);  
246      if (rc)  gpgme_error_t
247          return rc;  get_seckey (const char *keyid, gpgme_key_t *ret_skey)
248      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&  {
249                  strlen (k->ctx->subkeys->fpr) == 32;      return get_key_from_cache (keyid, 1, ret_skey, NULL);
250      k->is_protected = k->ext->gloflags.is_protected;  }
251      k->keyid = k->ctx->subkeys->keyid;  
252      k->uid = k->ctx->uids->uid;  
253      return rc;  
254  }  /* Map the signature summary in @sum to signature status table index.
255       Return value: index to table. */
256    static int
257  int  sigsum_to_index (gpgme_sigsum_t sum)
258  get_pubkey (const char *keyid, gpgme_key_t *ret_key)  {
259  {      if ((sum & GPGME_SIGSUM_VALID) && (sum & GPGME_SIGSUM_KEY_REVOKED))
260      int rc;          return 7;
261        if ((sum & GPGME_SIGSUM_VALID) && (sum & GPGME_SIGSUM_SIG_EXPIRED))
262      if (pub && sec)          return 6;
263          rc = get_key_from_cache (keyid, ret_key, NULL, 0);      if (sum & GPGME_SIGSUM_GREEN)
264      else          return 1;
265          rc = get_key_directly (keyid, ret_key, 0);      else if (sum & GPGME_SIGSUM_RED)
266      return rc;          return 2;
267  }      else if (sum & GPGME_SIGSUM_KEY_MISSING)
268            return 3;
269        return 0;
270  int  }
271  get_seckey (const char *keyid, gpgme_key_t *ret_skey)  
272  {  
273      int rc;  /* Return a humand readable description for the signature status @sum. */
274    const char*
275      if (pub && sec)  get_gpg_sigstat (gpgme_sigsum_t sum)
276          rc = get_key_from_cache (keyid, ret_skey, NULL, 1);  {
277      else      const char *gpg_sigstat[] = {
278          rc = get_key_directly (keyid, ret_skey, 1);          _("Error during verification process"),
279      return rc;          _("The signature is good"),
280  }          _("The signature is BAD!"),
281            _("The signature could not be checked due to a missing key"),
282            _("No valid OpenPGP signature"),
283  /* Search for insecure ElGamal keys and return the          _("Signature Error"),
284     number of founded keys. */          _("Good Signature (Expired Key)"),
285  int          _("Good Signature (Revoked Key)"),
286  count_insecure_elgkeys (void)          NULL
287  {      };
288      gpg_keycache_t pc;      const unsigned int mask = 8;
289      gpgme_key_t key;  
290      int n=0;      return gpg_sigstat[sigsum_to_index (sum) % mask];
291    }
292      pc = keycache_get_ctx (1);  
293      if (!pc)  
294          BUG (0);  bool
295      while (!gpg_keycache_next_key (pc, 0, &key)) {  secret_key_available (void)
296          if (key->subkeys->pubkey_algo == GPGME_PK_ELG)  {
297              n++;      if (!sec || gpg_keycache_get_size (sec) == 0)
298      }          return false;
299      gpg_keycache_rewind (pc);      return true;
300      return n;  }
 }  

Legend:
Removed from v.32  
changed lines
  Added in v.255

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26