/[winpt]/trunk/Src/wptKeyPropsDlg.cpp
ViewVC logotype

Annotation of /trunk/Src/wptKeyPropsDlg.cpp

Parent Directory Parent Directory | Revision Log Revision Log


Revision 48 - (hide annotations)
Mon Oct 31 21:14:11 2005 UTC (19 years, 4 months ago) by werner
File size: 9968 byte(s)
More changes.  Compiles again but there are at least gettext issues with
w32-gettext.c.  I can't get a gpg-error build with ENABLE_NLS.

1 werner 36 /* wptKeyPropsDlg.cpp - WinPT key properties dialog
2     * Copyright (C) 2000, 2001, 2002, 2003, 2005 Timo Schulz
3     *
4     * This file is part of WinPT.
5     *
6     * WinPT is free software; you can redistribute it and/or modify
7     * it under the terms of the GNU General Public License as published by
8     * the Free Software Foundation; either version 2 of the License, or
9     * (at your option) any later version.
10     *
11     * WinPT is distributed in the hope that it will be useful,
12     * but WITHOUT ANY WARRANTY; without even the implied warranty of
13     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14     * GNU General Public License for more details.
15     *
16     * You should have received a copy of the GNU General Public License
17     * along with WinPT; if not, write to the Free Software Foundation,
18     * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
19     */
20    
21 werner 42 #ifdef HAVE_CONFIG_H
22     #include <config.h>
23     #endif
24    
25 werner 36 #include <windows.h>
26    
27 werner 47 #include "resource.h"
28 werner 36 #include "wptErrors.h"
29     #include "wptGPG.h"
30     #include "wptCommonCtl.h"
31     #include "wptContext.h" /* for passphrase_s */
32     #include "wptNLS.h"
33     #include "wptDlgs.h"
34     #include "wptTypes.h"
35     #include "wptKeylist.h"
36     #include "wptW32API.h"
37     #include "wptVersion.h"
38     #include "wptKeyEdit.h"
39    
40    
41     /* Check that the key is not expired or revoked. */
42     static int
43     do_check_key (gpgme_key_t key)
44     {
45     int okay = 0;
46     okay = key->expired;
47     if (!okay)
48     okay = key->revoked;
49     return okay;
50     }
51    
52    
53     /* Convert a trust integer into a string representation. */
54     static const char*
55     ownertrust_to_string (int val)
56     {
57 twoaday 41 const char *inf;
58 werner 36 int id = val;
59 twoaday 41
60 werner 36 switch (id) {
61     case 1: inf = _("Don't know"); break;
62     case 2: inf = _("I do NOT trust"); break;
63     case 3: inf = _("I trust marginally"); break;
64     case 4: inf = _("I trust fully"); break;
65     case 5:
66     case 6: inf = _("I trust ultimately"); break;
67     default:inf = _("Unknown"); break;
68     }
69    
70     return inf;
71     }
72    
73    
74     /* Generate a unique temp name for the photo which
75     depends on the dialog handle and return it. */
76     static const char*
77     get_photo_tmpname (HWND dlg)
78     {
79     static char buf[64];
80    
81     _snprintf (buf, sizeof (buf)-1, "winpt_photo_%08lX.tmp", (DWORD)dlg);
82     return buf;
83     }
84    
85    
86     /* Load the photo from the key @key */
87     static int
88     keyprops_load_photo (HWND dlg, gpgme_key_t key, gpgme_validity_t *r_valid)
89     {
90     winpt_key_s k;
91     FILE *f;
92     const BYTE *img;
93     DWORD imglen = 0;
94     int pos=0;
95    
96     winpt_get_pubkey (key->subkeys->keyid, &k);
97     img = k.ext->attrib.d;
98     imglen = k.ext->attrib.len;
99     if (!k.ext->attrib.validity)
100     get_uat_validity (key->subkeys->keyid, &k.ext->attrib.validity);
101     *r_valid = k.ext->attrib.validity;
102    
103     if (!img || !imglen)
104     return -1;
105     f = fopen (get_photo_tmpname (dlg), "wb");
106     if (f) {
107     for (pos = 0; img[pos] != 0x10; pos++)
108     ;
109     pos += 16;
110     fwrite (img + pos, 1, imglen - pos, f);
111     fwrite (img, 1, imglen, f);
112     fclose (f);
113     }
114     return 0;
115     }
116    
117    
118     /* Display the photo in the image control in the dialog @dlg. */
119     static int
120     keyprops_show_photo (HWND dlg)
121     {
122     RECT r;
123     POINT p;
124     HWND h;
125    
126     h = GetDlgItem (dlg, IDC_KEYPROPS_IMG);
127     GetWindowRect (h, &r);
128     p.x = r.left + 5;
129     p.y = r.top - 2;
130     memset (&p, 0, sizeof (p));
131     PTD_jpg_show (h, &p, get_photo_tmpname (dlg));
132    
133     return 0;
134     }
135    
136    
137     /* Return string representation of the key validity. @key. */
138     static const char*
139     get_validity (gpgme_key_t key)
140     {
141     int val;
142     val = key->expired;
143     if (val)
144     return _("Expired");
145     val = key->revoked;
146     if (val)
147     return _("Revoked");
148 twoaday 41 val = key->disabled;
149     if (val)
150     return _("Disabled");
151 werner 36 return get_key_trust2 (NULL, key->uids->validity, 0, 0);
152     }
153    
154    
155     /* Return the preferred sym. algorithm from @key as a string. */
156     static const char*
157     get_pref_cipher (winpt_key_t k)
158     {
159     const char *sym_prefs=NULL;
160    
161     if (k->is_v3)
162     return "IDEA";
163     if (!k->ext->sym_prefs)
164     return "3DES";
165     switch (*k->ext->sym_prefs) {
166     case 1: return "IDEA";
167     case 2: return "3DES";
168     case 3: return "CAST5";
169     case 4: return "Blowfish";
170     case 7:
171     case 8:
172     case 9: return "AES";
173     case 10:return "Twofish";
174     }
175     return "Unknown";
176     }
177    
178    
179     /* Return true if the key has designated revokers. */
180     static bool
181     check_for_desig_rev (gpgme_key_t key)
182     {
183     winpt_key_s k;
184     memset (&k, 0, sizeof (k));
185     if (!winpt_get_pubkey (key->subkeys->keyid, &k))
186     return k.ext->gloflags.has_desig_rev? true : false;
187     return false;
188     }
189    
190    
191     /* Print information (name) of the smart card. */
192     static const char*
193     get_card_type (winpt_key_t k)
194     {
195     static char buf[64];
196    
197     if (!k->ext->card_type)
198     return "";
199     _snprintf (buf, sizeof (buf)-1, _("Card-Type: %s\r\n"), k->ext->card_type);
200     return buf;
201     }
202    
203    
204     /* Display the key information for key @k.
205     Return value: gpgme key on success. */
206     static void
207     display_key_info (HWND dlg, winpt_key_t k, gpgme_key_t *r_key)
208     {
209     struct winpt_key_s k2;
210     gpgme_key_t sk, key;
211     char info[512];
212     const char *inf;
213     u32 created, expires;
214    
215     memset (&k2, 0, sizeof (k2));
216     if (k->key_pair)
217     winpt_get_seckey (k->keyid, &k2);
218     else
219     winpt_get_pubkey (k->keyid, &k2);
220     sk = k2.ctx;
221     if (sk)
222     k->is_protected = k2.is_protected;
223     if (get_pubkey (k->keyid, &key))
224     BUG (0);
225     created = key->subkeys->timestamp;
226     expires = key->subkeys->expires;
227     _snprintf (info, DIM (info)-1,
228     _("Type: %s\r\n"
229     "Key ID: %s\r\n"
230     "Algorithm: %s\r\n"
231     "Size: %s\r\n"
232     "Created: %s\r\n"
233     "Expires: %s\r\n"
234     "Validity: %s\r\n"
235     "Cipher: %s\r\n"
236     "%s\r\n"),
237     get_key_type (key),
238     k->keyid,
239     get_key_algo (key, 0),
240     get_key_size (key, 0),
241     get_key_created (created),
242     get_key_expire_date (expires),
243     get_validity (key),
244     get_pref_cipher (&k2),
245     get_card_type (&k2));
246    
247     SetDlgItemText (dlg, IDC_KEYPROPS_INFO, info);
248     SetDlgItemText (dlg, IDC_KEYPROPS_FPR, get_key_fpr (key));
249     inf = ownertrust_to_string (key->owner_trust);
250     SetDlgItemText (dlg, IDC_KEYPROPS_OT, inf);
251    
252     *r_key = key;
253     }
254    
255    
256     /* Dialog box procedure to show the key properties. */
257     BOOL CALLBACK
258     keyprops_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)
259     {
260     static winpt_key_t k;
261     static gpgme_key_t key;
262     gpgme_validity_t valid;
263     refresh_cache_s rcs = {0};
264     const char *inf;
265     int rc;
266    
267     /* XXX: static variable (k) prevent that the dialog can
268     be opened twice. */
269     switch (msg) {
270     case WM_INITDIALOG:
271     if (!lparam)
272     dlg_fatal_error (dlg, "Could not get dialog param!");
273     k = (winpt_key_t)lparam;
274     #ifndef LANG_DE
275     SetWindowText (dlg, _("Key Properties"));
276     SetDlgItemText (dlg, IDC_KEYPROPS_OT_CHANGE, _("&Change"));
277     SetDlgItemText (dlg, IDC_KEYPROPS_REVOKERS, _("&Revokers"));
278     SetDlgItemText (dlg, IDC_KEYPROPS_CHANGE_PWD, _("Change &Passwd"));
279     SetDlgItemText (dlg, IDC_KEYPROPS_OTINF, _("Ownertrust"));
280     #endif
281    
282     display_key_info (dlg, k, &key);
283     if (!keyprops_load_photo (dlg, key, &valid)) {
284     k->has_photo = 1;
285     if (valid < GPGME_VALIDITY_MARGINAL)
286     SetDlgItemText (dlg, IDC_KEYPROPS_IMGINF, _("Photo-ID not validated."));
287     }
288     if (k->key_pair)
289     EnableWindow (GetDlgItem (dlg, IDC_KEYPROPS_CHANGE_PWD), TRUE);
290     if (check_for_desig_rev (key))
291     EnableWindow (GetDlgItem (dlg, IDC_KEYPROPS_REVOKERS), TRUE);
292     center_window (dlg, NULL);
293     SetForegroundWindow (dlg);
294     return TRUE;
295    
296     case WM_DESTROY:
297 werner 47 remove (get_photo_tmpname (dlg));
298 werner 36 break;
299    
300     case WM_PAINT:
301     if (k->has_photo)
302     keyprops_show_photo (dlg);
303     break;
304    
305     case WM_SYSCOMMAND:
306     if (LOWORD (wparam) == SC_CLOSE)
307     EndDialog (dlg, TRUE);
308     return FALSE;
309    
310     case WM_COMMAND:
311     switch (LOWORD (wparam)) {
312     case IDOK:
313     EndDialog (dlg, TRUE);
314     return TRUE;
315    
316     case IDC_KEYPROPS_OT_CHANGE:
317     if (do_check_key (key)) {
318     msg_box (dlg, _("The status of this key is 'revoked' or 'expired'.\n"
319     "You cannot change the ownertrust of such keys."),
320     _("WinPT Warning"), MB_ERR);
321     return TRUE;
322     }
323     if( !k->key_pair && key->uids->validity < 3 ) {
324     rc = msg_box( dlg, _("This is a non-valid key.\n"
325     "Modifying the ownertrust has no effect on such keys.\n\n"
326     "Do you really want to continue?"),
327     _("WinPT Warning"), MB_ICONWARNING|MB_YESNO );
328     if (rc == IDNO)
329     return TRUE;
330     }
331     //GetDlgItemText (dlg, IDC_KEYPROPS_OT, info, sizeof info -1);
332     dialog_box_param (glob_hinst, (LPCSTR)IDD_WINPT_KEYEDIT_OWNERTRUST,
333     dlg, (DLGPROC)keyedit_ownertrust_dlg_proc,
334     (LPARAM)k, _("Change Ownertrust"),
335     IDS_WINPT_KEYEDIT_OWNERTRUST);
336     if (k->callback.new_val == -1) { /* Cancel */
337     EndDialog (dlg, FALSE);
338     break;
339     }
340    
341     inf = ownertrust_to_string (k->callback.new_val);
342     SetDlgItemText (dlg, IDC_KEYPROPS_OT, inf);
343     msg_box (dlg, _("Ownertrust successfully changed."),
344     _("GnuPG Status"), MB_OK);
345    
346 twoaday 41 /* XXX: modified ownertrust values can effect the entire
347     WoT so we reload the cache. But this is very slow. */
348     memset (&rcs, 0, sizeof (rcs));
349     rcs.kr_reload = 1; rcs.kr_update = 1; /* reload only keylist */
350 werner 36 DialogBoxParam (glob_hinst, (LPCSTR)IDD_WINPT_KEYCACHE, dlg,
351     keycache_dlg_proc, (LPARAM)&rcs);
352     return TRUE;
353    
354     case IDC_KEYPROPS_CHANGE_PWD:
355     keyedit_change_passwd (k, dlg);
356     return TRUE;
357    
358     case IDC_KEYPROPS_REVOKERS:
359     dialog_box_param (glob_hinst, (LPCTSTR)IDD_WINPT_KEYREVOKERS, dlg,
360 twoaday 41 key_revokers_dlg_proc, (LPARAM)key,
361     _("Key Revokers"), IDS_WINPT_KEY_REVOKERS);
362 werner 36 break;
363     }
364     }
365    
366     return FALSE;
367     }

Properties

Name Value
svn:eol-style native

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26