/[winpt]/trunk/Src/wptGPGME.cpp
ViewVC logotype

Diff of /trunk/Src/wptGPGME.cpp

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 36 by werner, Thu Oct 27 15:25:13 2005 UTC revision 328 by twoaday, Fri Sep 25 16:07:38 2009 UTC
# Line 1  Line 1 
1  /* wptGPGME.cpp - WinPT GPGME interface  /* wptGPGME.cpp - WinPT GPGME interface
2   *      Copyright (C) 2001-2005 Timo Schulz   *      Copyright (C) 2001-2006 Timo Schulz
3   *   *
4   * This file is part of WinPT.   * This file is part of WinPT.
5   *   *
# Line 12  Line 12 
12   * but WITHOUT ANY WARRANTY; without even the implied warranty of   * but WITHOUT ANY WARRANTY; without even the implied warranty of
13   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14   * General Public License for more details.   * General Public License for more details.
  *  
  * You should have received a copy of the GNU General Public License  
  * along with WinPT; if not, write to the Free Software Foundation,  
  * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA  
15   */   */
   
16  #ifdef HAVE_CONFIG_H  #ifdef HAVE_CONFIG_H
17  #include <config.h>  #include <config.h>
18  #endif  #endif
19    
20  #include <sys/types.h>  #include <sys/types.h>
 #include <sys/types.h>  
21  #include <windows.h>  #include <windows.h>
22    
23  #include "../resource.h"  #include "resource.h"
24  #include "wptNLS.h"  #include "wptNLS.h"
25  #include "wptGPG.h"  #include "wptGPG.h"
26  #include "wptErrors.h"  #include "wptErrors.h"
# Line 40  Line 34 
34    
35  #include "openpgp.h"  #include "openpgp.h"
36    
37  BOOL CALLBACK  keycache_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam);  BOOL CALLBACK  keycache_dlg_proc (HWND dlg, UINT msg, WPARAM wparam,
38                                      LPARAM lparam);
39  void progress_cleanup (progress_filter_s * pfx);  void progress_cleanup (progress_filter_s * pfx);
40    
41    /* Global GPG key cache contexts. */
42  static gpg_keycache_t pub = NULL;  static gpg_keycache_t pub = NULL;
43  static gpg_keycache_t sec = NULL;  static gpg_keycache_t sec = NULL;
 static unsigned int reload = 0;  
44  static char *gpg_secring = NULL;  static char *gpg_secring = NULL;
45    
46    struct keycache_s *key_list = NULL;
47    
 /* Reload the key cache. */  
 void  
 keycache_reload (HWND dlg)  
 {        
     refresh_cache_s rcs;  
   
     memset (&rcs, 0, sizeof rcs);  
     rcs.kr_reload = rcs.kr_update = 1;  
     rcs.tr_update = 0;  
     DialogBoxParam (glob_hinst, (LPCSTR)IDD_WINPT_KEYCACHE, dlg,                                          
                     keycache_dlg_proc, (LPARAM)&rcs);  
 }  
48    
49    /* Return 1 if no cache is available.
50       This can be the case if WinPT were run in command line mode. */
51    int
52    keycache_not_available (void)
53    {
54        return pub == NULL;
55    }
56    
57  /* Release both key cache objects. If @cleanup is 1,  /* Release both key cache objects. If @cleanup is 1,
58     also release other global structs. */     also release other global structs. */
59  void  void
60  keycache_release (int cleanup)  keycache_release (int cleanup)
61  {  {
     int n = gpg_keycache_get_size (pub);  
62      char tmpbuf[64];      char tmpbuf[64];
63        int n = gpg_keycache_get_size (pub);
64    
65      /* XXX: update the value when the cache has changed. */      /* XXX: update the value when the cache has changed. */
66      sprintf (tmpbuf, "%d", n);      _snprintf (tmpbuf, DIM (tmpbuf)-1, "%d", n);
67      set_reg_key (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys", tmpbuf);      set_reg_key (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys", tmpbuf);
68    
69      if (pub) {      if (pub) {
# Line 83  keycache_release (int cleanup) Line 74  keycache_release (int cleanup)
74          gpg_keycache_release (sec);          gpg_keycache_release (sec);
75          sec = NULL;          sec = NULL;
76      }      }
77      if (cleanup) {      if (cleanup)
78          if (gpg_secring)          safe_free (gpg_secring);
             free (gpg_secring);  
         gpg_secring = NULL;  
     }  
79  }  }
80    
81    
# Line 107  keycache_update (int is_sec, const char Line 95  keycache_update (int is_sec, const char
95      return err;      return err;
96  }  }
97    
 /* XXX: cache_keyring_names must be called then the GPG homedir changes! */  
98    
99  /* Initialize both cache contexts. Use @pubring for the public  /* Initialize both cache contexts. Use @pubring for the public
100     keyring and @secring for the secret keyring. */     keyring and @secring for the secret keyring. */
# Line 116  keycache_init (const char *pubring, cons Line 103  keycache_init (const char *pubring, cons
103  {  {
104      struct progress_filter_s pfx;      struct progress_filter_s pfx;
105      gpgme_error_t err;      gpgme_error_t err;
106      int val = 0;      int val;
107      char *p;      char *p;
108    
109      if (secring != NULL) {      if (secring != NULL) {
110          free_if_alloc (gpg_secring);          free_if_alloc (gpg_secring);
111          gpg_secring = get_gnupg_keyring (0, NO_STRICT);          gpg_secring = get_gnupg_keyring (0, NO_STRICT);
112            log_debug ("keycache_init: secring path '%s'\r\n", gpg_secring);
113      }      }
114        
115      if (reload) {      val = 0;
         keycache_release (0);  
         reload = 0;  
     }  
116      p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys");      p = get_reg_entry (HKEY_CURRENT_USER, "Software\\WinPT", "nKeys");
117      if (p && *p != ' ') {      if (p && *p != ' ') {
118          val = atoi (p);          val = atoi (p);
119          free_if_alloc (p);          free_if_alloc (p);
         memset (&pfx, 0, sizeof (pfx));  
120      }      }
121    
122        memset (&pfx, 0, sizeof (pfx));
123        keycache_release (0); /* Release old contexts first. */
124    
125      err = gpg_keycache_new (&pub);      err = gpg_keycache_new (&pub);
126      if (err)      if (err)
127          return err;          return err;
# Line 144  keycache_init (const char *pubring, cons Line 131  keycache_init (const char *pubring, cons
131      if (!err)      if (!err)
132          err = gpg_keycache_init (pub, NULL, 0);          err = gpg_keycache_init (pub, NULL, 0);
133      if (!err)      if (!err)
134          err = gpg_keycache_init( sec, NULL, 1 );          err = gpg_keycache_init (sec, NULL, 1);
135      if( !err && pubring && *pubring )      if (!err && pubring && *pubring)
136          err = gpg_keycache_prepare( pub, pubring, NULL );          err = gpg_keycache_prepare (pub, pubring, NULL);
137      if( !err && secring && * secring )      if (!err && secring && * secring)
138          err = gpg_keycache_prepare( sec, NULL, secring );          err = gpg_keycache_prepare (sec, NULL, secring);
139      if (!err)      if (!err)
140          gpg_keycache_sync (pub, sec);          gpg_keycache_sync (pub, sec);
141      if (val != 0)      if (val != 0)
142          progress_cleanup (&pfx);          progress_cleanup (&pfx);
143        
144      return err;      return err;
145  }  }
146    
147    
 /* If @val = 1 indicate to reload the cache. */  
 void  
 keycache_set_reload (int val)  
 {  
     reload = val;  
 }  
   
   
 /* Return the reload cache flag. */  
 int  
 keycache_get_reload (void)  
 {  
     return reload;  
 }  
   
   
148  /* Return the public cache context if @is_pub is set  /* Return the public cache context if @is_pub is set
149     the secre cache context otherwise. */     the secre cache context otherwise. */
150  gpg_keycache_t  gpg_keycache_t
151  keycache_get_ctx (int is_pub)  keycache_get_ctx (int is_pub)
152  {  {
153      return is_pub? pub : sec;      gpg_keycache_t ctx;
154    
155        ctx = is_pub? pub : sec;
156        if (!ctx)
157            BUG (0);
158        return ctx;
159  }  }
160    
161    
162  /* Get the GPG key with keyid @keyid from the cache. Return it  /* Get the GPG key with keyid @keyid from the cache. Return it
163     in @r_key on success. */     in @r_key on success. */
164  static int  static gpgme_error_t
165  get_key_from_cache (const char *keyid, gpgme_key_t *r_key,  get_key_from_cache (const char *keyid, int secret, gpgme_key_t *r_key,
166                      struct keycache_s **c, int secret)                      struct keycache_s **c)
167  {  {
168      gpg_keycache_t cache;      gpg_keycache_t cache;
169      gpgme_error_t err;      gpgme_error_t err;
170      int mode = secret? KEYCACHE_PRV : KEYCACHE_PUB;      int mode = secret? KEYCACHE_PRV : KEYCACHE_PUB;
171    
172      if (!keyid)      if (!keyid)
173          return WPTERR_GENERAL;          return gpg_error (GPG_ERR_INV_VALUE);
174      if (r_key)      if (r_key)
175          *r_key = NULL;          *r_key = NULL;
176      cache = keycache_get_ctx (mode);      cache = keycache_get_ctx (mode);
     if (!cache)  
         BUG( NULL );  
177      if (!c)      if (!c)
178          err = gpg_keycache_find_key (cache, keyid, 0, r_key);          err = gpg_keycache_find_key (cache, keyid, 0, r_key);
179      else      else
180          err = gpg_keycache_find_key2 (cache, keyid, 0, r_key, c);          err = gpg_keycache_find_key2 (cache, keyid, 0, r_key, c);
181      return err? WPTERR_GENERAL : 0;      return err;
182  }  }
183    
184    
185  /* Get GPG key with keyid @keyid directly from GPG and return  /* Release the internal key structure.
186     it in @r_key on success. */     If allocated is 0, assume fixed cache item. */
187  static int  void
188  get_key_directly (const char *keyid, gpgme_key_t *r_key, int secret)  winpt_release_pubkey (winpt_key_s *k)
189  {  {
190      gpgme_ctx_t ctx;      /*log_box ("debug", 0, "alloc %d", k->allocated);*/
191      gpgme_error_t err;      if (!k->allocated)
192            return;
193      err = gpgme_new (&ctx);      gpg_keycache_item_release (k->ext);
194      if (err)      k->ext = NULL;
195          return WPTERR_GENERAL;      k->allocated = 0;
     err = gpgme_get_key (ctx, keyid, r_key, secret);  
     gpgme_release (ctx);  
     return err? WPTERR_GENERAL : 0;  
196  }  }
197    
198    
199  /* Search the public key with @keyid as the keyid in the cache and  /* Search the public key with @keyid as the keyid in the cache and
200     return the item in @k. */     return the item in @k. */
201  int  gpgme_error_t
202  winpt_get_pubkey (const char *keyid, winpt_key_s *k)  winpt_get_pubkey (const char *keyid, winpt_key_s *k)
203  {  {
204      int rc;      gpgme_error_t err = gpg_error (GPG_ERR_NO_ERROR);
205            
206      rc = get_key_from_cache (keyid, &k->ctx, &k->ext, 0);      if (pub)
207      if (rc)          err = get_key_from_cache (keyid, 0, &k->ctx, &k->ext);
208          return rc;      else
209            err = gpg_keycache_fetch_key (keyid, 0, &k->ctx, &k->ext);
210        if (err)
211            return err;
212      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&
213                  strlen (k->ctx->subkeys->fpr) == 32;                  strlen (k->ctx->subkeys->fpr) == 32;
214      k->is_protected = k->ext->gloflags.is_protected;      k->is_protected = k->ext->gloflags.is_protected;
215      k->keyid = k->ctx->subkeys->keyid;      k->keyid = k->ctx->subkeys->keyid+8;
216      k->uid = k->ctx->uids->uid;      k->uid = k->ext->uids->uid;
217      return rc;      k->allocated = pub? 0 : 1;
218        return 0;
219  }  }
220    
221    
222  int  gpgme_error_t
223  winpt_get_seckey (const char *keyid, winpt_key_s *k)  winpt_get_seckey (const char *keyid, winpt_key_s *k)
224  {  {
225      int rc;      gpgme_error_t err;
226      rc = get_key_from_cache (keyid, &k->ctx, &k->ext, 1);  
227      if (rc)      if (sec)
228          return rc;          err = get_key_from_cache (keyid, 1, &k->ctx, &k->ext);
229        else
230            err = gpg_keycache_fetch_key (keyid, 1, &k->ctx, &k->ext);
231        if (err)
232            return err;
233      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&      k->is_v3 = k->ctx->subkeys->pubkey_algo == GPGME_PK_RSA &&
234                  strlen (k->ctx->subkeys->fpr) == 32;                  strlen (k->ctx->subkeys->fpr) == 32;
235      k->is_protected = k->ext->gloflags.is_protected;      k->is_protected = k->ext->gloflags.is_protected;
236      k->keyid = k->ctx->subkeys->keyid;      k->keyid = k->ctx->subkeys->keyid+8;
237      k->uid = k->ctx->uids->uid;      k->uid = k->ext->uids->uid;
238      return rc;      k->allocated = sec? 0 : 1;
239        return 0;
240  }  }
241    
242    
243  int  gpgme_error_t
244  get_pubkey (const char *keyid, gpgme_key_t *ret_key)  get_pubkey (const char *keyid, gpgme_key_t *ret_key)
245  {  {
246      int rc;      return get_key_from_cache (keyid, 0, ret_key, NULL);
   
     if (pub && sec)  
         rc = get_key_from_cache (keyid, ret_key, NULL, 0);  
     else  
         rc = get_key_directly (keyid, ret_key, 0);  
     return rc;  
247  }  }
248    
249    
250  int  gpgme_error_t
251  get_seckey (const char *keyid, gpgme_key_t *ret_skey)  get_seckey (const char *keyid, gpgme_key_t *ret_skey)
252  {  {
253      int rc;      return get_key_from_cache (keyid, 1, ret_skey, NULL);
   
     if (pub && sec)  
         rc = get_key_from_cache (keyid, ret_skey, NULL, 1);  
     else  
         rc = get_key_directly (keyid, ret_skey, 1);  
     return rc;  
254  }  }
255    
256    
257  /* Search for insecure ElGamal keys and return the  /* Map the signature summary in @sum to signature status table index.
258     number of founded keys. */     Return value: index to table. */
259  int  static int
260  count_insecure_elgkeys (void)  sigsum_to_index (gpgme_sigsum_t sum)
261  {  {
262      gpg_keycache_t pc;      if (sum & GPGME_SIGSUM_RED)
263      gpgme_key_t key;          return 2;
264      int n=0;      else if (sum & GPGME_SIGSUM_SIG_EXPIRED)
265            return 8;
266        else if (sum & GPGME_SIGSUM_KEY_REVOKED)
267            return 7;
268        else if (sum & GPGME_SIGSUM_KEY_EXPIRED)
269            return 6;
270        else if (sum & GPGME_SIGSUM_GREEN)
271            return 1;
272        else if (sum & GPGME_SIGSUM_KEY_MISSING)
273            return 3;
274        return 0;
275    }
276    
277      pc = keycache_get_ctx (1);  
278      if (!pc)  /* Return a humand readable description for the signature status @sum.
279          BUG (0);     Warning: this function does not consider the validity of the key. */
280      while (!gpg_keycache_next_key (pc, 0, &key)) {  const char*
281          if (key->subkeys->pubkey_algo == GPGME_PK_ELG)  get_gpg_sigstat (gpgme_sigsum_t sum)
282              n++;  {
283      }      const char *gpg_sigstat[] = {
284      gpg_keycache_rewind (pc);          _("Error during verification process"),
285      return n;          _("The signature is good"),
286            _("The signature is BAD!"),
287            _("The signature could not be checked due to a missing key"),
288            _("No valid OpenPGP signature"),
289            _("Signature Error"),
290            _("Good signature (Expired Key)"),
291            _("Good signature (Revoked Key)"),
292            _("Good signature (Expired)"),
293            NULL
294        };
295        const unsigned int mask = 9;
296    
297        return gpg_sigstat[sigsum_to_index (sum) % mask];
298    }
299    
300    
301    /* Return true if at least one secret key is available. */
302    bool
303    secret_key_available (void)
304    {
305        if (!sec || gpg_keycache_get_size (sec) == 0)
306            return false;
307        return true;
308  }  }

Legend:
Removed from v.36  
changed lines
  Added in v.328

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26