/[winpt]/trunk/Src/wptKeyPropsDlg.cpp
ViewVC logotype

Diff of /trunk/Src/wptKeyPropsDlg.cpp

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 22 by twoaday, Wed Aug 10 11:33:35 2005 UTC revision 36 by werner, Thu Oct 27 15:25:13 2005 UTC
# Line 1  Line 1 
1  /* wptKeyPropsDlg.cpp - WinPT key properties dialog  /* wptKeyPropsDlg.cpp - WinPT key properties dialog
2   *      Copyright (C) 2000, 2001, 2002, 2003, 2005 Timo Schulz   *      Copyright (C) 2000, 2001, 2002, 2003, 2005 Timo Schulz
3   *   *
4   * This file is part of WinPT.   * This file is part of WinPT.
5   *   *
6   * WinPT is free software; you can redistribute it and/or modify   * WinPT is free software; you can redistribute it and/or modify
7   * it under the terms of the GNU General Public License as published by   * it under the terms of the GNU General Public License as published by
8   * the Free Software Foundation; either version 2 of the License, or   * the Free Software Foundation; either version 2 of the License, or
9   * (at your option) any later version.   * (at your option) any later version.
10   *   *
11   * WinPT is distributed in the hope that it will be useful,   * WinPT is distributed in the hope that it will be useful,
12   * but WITHOUT ANY WARRANTY; without even the implied warranty of   * but WITHOUT ANY WARRANTY; without even the implied warranty of
13   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14   * GNU General Public License for more details.   * GNU General Public License for more details.
15   *   *
16   * You should have received a copy of the GNU General Public License   * You should have received a copy of the GNU General Public License
17   * along with WinPT; if not, write to the Free Software Foundation,   * along with WinPT; if not, write to the Free Software Foundation,
18   * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA   * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
19   */   */
20    
21  #include <windows.h>  #ifdef HAVE_CONFIG_H
22    #include <config.h>
23  #include "../resource.h"  #endif
24  #include "wptErrors.h"  
25  #include "wptGPG.h"  #include <windows.h>
26  #include "wptCommonCtl.h"  #include <windows.h>
27  #include "wptContext.h" /* for passphrase_s */  
28  #include "wptNLS.h"  #include "../resource.h"
29  #include "wptDlgs.h"  #include "wptErrors.h"
30  #include "wptTypes.h"  #include "wptGPG.h"
31  #include "wptKeylist.h"  #include "wptCommonCtl.h"
32  #include "wptW32API.h"  #include "wptContext.h" /* for passphrase_s */
33  #include "wptVersion.h"  #include "wptNLS.h"
34  #include "wptKeyEdit.h"  #include "wptDlgs.h"
35    #include "wptTypes.h"
36  int keyedit_ownertrust_get_val (void);  #include "wptKeylist.h"
37    #include "wptW32API.h"
38    #include "wptVersion.h"
39  static void  #include "wptKeyEdit.h"
40  do_change_ownertrust (winpt_key_t k, const char *s)  
41  {  static void
42      char ot[64];  do_change_ownertrust (winpt_key_t k, const char *s)
43        {
44      if( strstr( s, "ultimate" ) ) {      char ot[64];
45          listview_get_item_text (k->callback.ctl, k->callback.idx, 5, ot, DIM (ot)-1);      
46          strcpy (ot, "Ultimate");      if( strstr( s, "ultimate" ) ) {
47          listview_add_sub_item (k->callback.ctl, k->callback.idx, 5, ot);          listview_get_item_text (k->callback.ctl, k->callback.idx, 5, ot, DIM (ot)-1);
48          /* fixme: If we switch back from Ultimate to a lower level */          strcpy (ot, "Ultimate");
49      }          listview_add_sub_item (k->callback.ctl, k->callback.idx, 5, ot);
50  } /* do_change_ownertrust */          /* fixme: If we switch back from Ultimate to a lower level */
51        }
52    }
53  static int  
54  do_check_key (gpgme_key_t key)  
55  {  /* Check that the key is not expired or revoked. */
56      int okay = 0;  static int
57      okay = gpgme_key_get_ulong_attr (key, GPGME_ATTR_KEY_EXPIRED, NULL, 0);  do_check_key (gpgme_key_t key)
58      if (!okay)  {
59          okay = gpgme_key_get_ulong_attr (key, GPGME_ATTR_KEY_REVOKED, NULL, 0);      int okay = 0;
60      return okay;      okay = key->expired;
61  } /* do_check_key */      if (!okay)
62            okay = key->revoked;
63        return okay;
64  static const char*  }
65  ownertrust_to_string (gpgme_editkey_t ctx, int val)  
66  {  
67      const char * inf;  /* Convert a trust integer into a string representation. */
68      int id;  static const char*
69        ownertrust_to_string (int val)
70      if (ctx)  {
71          id = keyedit_ownertrust_get_val ();      const char * inf;
72      else if (!ctx && val)      int id = val;
73          id = val;      switch (id) {
74      switch (id) {      case 1: inf = _("Don't know");         break;
75      case 1: inf = _("Don't know");         break;      case 2: inf = _("I do NOT trust");     break;
76      case 2: inf = _("I do NOT trust");     break;      case 3: inf = _("I trust marginally"); break;
77      case 3: inf = _("I trust marginally"); break;      case 4: inf = _("I trust fully");      break;
78      case 4: inf = _("I trust fully");      break;      case 5:
79      case 5:      case 6: inf = _("I trust ultimately"); break;
80      case 6: inf = _("I trust ultimately"); break;      default:inf = _("Unknown");            break;
81      default:inf = _("Unknown");            break;      }
82      }      
83            return inf;
84      return inf;  }
85  } /* ownertrust_to_string */  
86    
87    /* Generate a unique temp name for the photo which
88  #define PHOTO_TMPNAME "winpt_temp_photo.jpg"     depends on the dialog handle and return it. */
89    static const char*
90  static int  get_photo_tmpname (HWND dlg)
91  keyprops_show_photo (HWND dlg, gpgme_key_t key)  {
92  {      static char buf[64];
93      RECT r;      
94      POINT p;      _snprintf (buf, sizeof (buf)-1, "winpt_photo_%08lX.tmp", (DWORD)dlg);
95      HWND h;      return buf;
96      const BYTE *img;  }
97      DWORD imglen = 0;  
98      int pos=0;  
99    /* Load the photo from the key @key */
100      img = (const byte *)gpgme_key_get_string_attr (key, GPGME_ATTR_PHOTO,  static int
101                                                     (void **)&imglen, 0);  keyprops_load_photo (HWND dlg, gpgme_key_t key, gpgme_validity_t *r_valid)
102      if (!img || !imglen)  {
103          return -1;      winpt_key_s k;
104      FILE *f = fopen (PHOTO_TMPNAME, "wb");      FILE *f;
105      if (f) {      const BYTE *img;
106          for (pos = 0; img[pos] != 0x10; pos++)      DWORD imglen = 0;
107                  ;      int pos=0;
108          pos += 16;  
109          fwrite (img + pos, 1, imglen - pos, f);      winpt_get_pubkey (key->subkeys->keyid, &k);
110          fwrite (img, 1, imglen, f);      img = k.ext->attrib.d;
111          fclose (f);      imglen = k.ext->attrib.len;
112      }      if (!k.ext->attrib.validity)
113            get_uat_validity (key->subkeys->keyid, &k.ext->attrib.validity);
114      h = GetDlgItem (dlg, IDC_KEYPROPS_IMG);      *r_valid = k.ext->attrib.validity;
115      GetWindowRect (h, &r);  
116      p.x = r.left + 5;      if (!img || !imglen)
117      p.y = r.top - 2;          return -1;
118      memset (&p, 0, sizeof (p));      f = fopen (get_photo_tmpname (dlg), "wb");
119      PTD_jpg_show (h, &p, PHOTO_TMPNAME);      if (f) {
120      unlink (PHOTO_TMPNAME);          for (pos = 0; img[pos] != 0x10; pos++)
121                    ;
122      return 0;          pos += 16;
123  }          fwrite (img + pos, 1, imglen - pos, f);
124            fwrite (img, 1, imglen, f);
125            fclose (f);
126  static const char*      }
127  get_validity (gpgme_key_t key)      return 0;
128  {  }
129      int val;  
130      val = gpgme_key_get_ulong_attr (key, GPGME_ATTR_KEY_EXPIRED, NULL, 0);  
131      if (val)  /* Display the photo in the image control in the dialog @dlg. */
132          return "Expired";        static int
133      val = gpgme_key_get_ulong_attr( key, GPGME_ATTR_KEY_REVOKED, NULL, 0 );  keyprops_show_photo (HWND dlg)
134      if (val)  {
135          return "Revoked";      RECT r;    
136      val = gpgme_key_get_ulong_attr (key, GPGME_ATTR_VALIDITY, NULL, 0);      POINT p;
137      return gpgme_key_expand_attr (GPGME_ATTR_VALIDITY, val);      HWND h;
138  }  
139        h = GetDlgItem (dlg, IDC_KEYPROPS_IMG);
140        GetWindowRect (h, &r);
141  BOOL CALLBACK      p.x = r.left + 5;
142  keyprops_dlg_proc( HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam )      p.y = r.top - 2;
143  {      memset (&p, 0, sizeof (p));
144      static winpt_key_t k;      PTD_jpg_show (h, &p, get_photo_tmpname (dlg));
145      static gpgme_key_t key, sk;      
146      static int photo_done = 0;      return 0;
147      gpgme_editkey_t ek;  }
148      gpgme_ctx_t ctx;  
149      gpgme_error_t ec;      
150      refresh_cache_s rcs = {0};  /* Return string representation of the key validity. @key. */
151      const char *inf;  static const char*
152      const char * sym_prefs;  get_validity (gpgme_key_t key)
153      char info[2048], dummy_symprefs[] = {0x01, 0x00};  {
154      u32 created, expires;      int val;
155      int ot, cancel = 0;      val = key->expired;
156      int rc;      if (val)
157                return _("Expired");    
158      switch (msg) {      val = key->revoked;
159      case WM_INITDIALOG:      if (val)
160          if (!lparam)          return _("Revoked");
161              dlg_fatal_error( dlg, "Could not get dialog param!" );      return get_key_trust2 (NULL, key->uids->validity, 0, 0);
162          k = (winpt_key_t)lparam;  }
163          #ifndef LANG_DE  
164          SetWindowText( dlg, _("Key Properties") );  
165          SetDlgItemText (dlg, IDC_KEYPROPS_OT_CHANGE, _("&Change"));  /* Return the preferred sym. algorithm from @key as a string. */
166          SetDlgItemText (dlg, IDC_KEYPROPS_REVOKERS, _("&Revokers"));  static const char*
167          SetDlgItemText (dlg, IDC_KEYPROPS_CHANGE_PWD, _("Change &Passwd"));  get_pref_cipher (winpt_key_t k)
168          #endif    {
169        const char *sym_prefs=NULL;    
170          photo_done = 0;  
171          get_seckey (k->keyid, &sk);      if (k->is_v3)
172          if (sk)          return "IDEA";
173              k->is_protected = gpgme_key_get_ulong_attr( sk, GPGME_ATTR_IS_PROTECTED, NULL, 0 );      if (!k->ext->sym_prefs)
174          if (get_pubkey (k->keyid, &key))          return "3DES";
175              BUG (0);      switch (*k->ext->sym_prefs) {
176          created = gpgme_key_get_ulong_attr( key, GPGME_ATTR_CREATED, NULL, 0 );      case 1: return "IDEA";
177          expires = gpgme_key_get_ulong_attr( key, GPGME_ATTR_EXPIRES, NULL, 0 );      case 2: return "3DES";
178          sym_prefs = gpgme_key_get_string_attr( key, GPGME_ATTR_KEY_SYMPREFS, NULL, 0 );      case 3: return "CAST5";
179          if (!sym_prefs)      case 4: return "Blowfish";
180              sym_prefs = dummy_symprefs;            case 7:
181          _snprintf (info, sizeof info -1,      case 8:
182                    "Type: %s\r\n"      case 9: return "AES";
183                    "Key ID: %s\r\n"      case 10:return "Twofish";
184                    "Algorithm: %s\r\n"      }
185                    "Size: %s\r\n"      return "Unknown";
186                    "Created: %s\r\n"  }
187                    "Expires: %s\r\n"  
188                    "Validity: %s\r\n"  
189                    "Cipher: %s\r\n",  /* Return true if the key has designated revokers. */
190                    get_key_type( key ),  static bool
191                    k->keyid,  check_for_desig_rev (gpgme_key_t key)
192                    get_key_algo( key, 0 ),  {
193                    get_key_size( key, 0 ),      winpt_key_s k;
194                    get_key_created( created ),      memset (&k, 0, sizeof (k));
195                    get_key_expire_date( expires ),      if (!winpt_get_pubkey (key->subkeys->keyid, &k))
196                    get_validity (key),          return k.ext->gloflags.has_desig_rev? true : false;
197                    gpgme_key_expand_attr( GPGME_ATTR_KEY_SYMPREFS, *sym_prefs ) );      return false;
198          SetDlgItemText( dlg, IDC_KEYPROPS_INFO, info );  }
199          SetDlgItemText( dlg, IDC_KEYPROPS_FPR, get_key_fpr( key ) );  
200          ot = gpgme_key_get_ulong_attr( key, GPGME_ATTR_OTRUST, NULL, 0 );                
201          inf = ownertrust_to_string( NULL, ot );  /* Print information (name) of the smart card. */
202          SetDlgItemText( dlg, IDC_KEYPROPS_OT, inf );  static const char*
203          if( k->key_pair )  get_card_type (winpt_key_t k)
204              EnableWindow( GetDlgItem( dlg, IDC_KEYPROPS_CHANGE_PWD ), TRUE );  {    
205          if( gpgme_key_count_items( key, GPGME_ATTR_REVKEY_FPR ) )      static char buf[64];
206              EnableWindow( GetDlgItem( dlg, IDC_KEYPROPS_REVOKERS ), TRUE );  
207          center_window (dlg);      if (!k->ext->card_type)
208          SetForegroundWindow (dlg);                return "";
209          return TRUE;      _snprintf (buf, sizeof (buf)-1, _("Card-Type: %s\r\n"), k->ext->card_type);
210              return buf;
211      case WM_PAINT:        }
212          if (photo_done == 0) {  
213              photo_done = 1;  
214              keyprops_show_photo (dlg, key);  /* Display the key information for key @k.
215          }     Return value: gpgme key on success. */
216          break;  static void
217    display_key_info (HWND dlg, winpt_key_t k, gpgme_key_t *r_key)
218      case WM_SYSCOMMAND:  {
219          if( LOWORD( wparam ) == SC_CLOSE )      struct winpt_key_s k2;
220              EndDialog( dlg, TRUE );      gpgme_key_t sk, key;
221          return FALSE;      char info[512];
222                const char *inf;
223      case WM_COMMAND:      u32 created, expires;    
224          switch( LOWORD( wparam ) ) {  
225          case IDOK:      memset (&k2, 0, sizeof (k2));      
226              EndDialog( dlg, TRUE );      if (k->key_pair)
227              return TRUE;          winpt_get_seckey (k->keyid, &k2);
228                    else    
229          case IDC_KEYPROPS_OT_CHANGE:          winpt_get_pubkey (k->keyid, &k2);
230              if( do_check_key( key ) ) {      sk = k2.ctx;        
231                  msg_box( dlg, _("The status of this key is 'revoked' or 'expired'.\n"      if (sk)
232                                  "You cannot change the ownertrust of such keys."),          k->is_protected = k2.is_protected;
233                                  _("WinPT Warning"), MB_ERR );      if (get_pubkey (k->keyid, &key))
234                  return FALSE;          BUG (0);    
235              }      created = key->subkeys->timestamp;  
236              if( !k->key_pair && gpgme_key_get_ulong_attr( key, GPGME_ATTR_VALIDITY, NULL, 0 ) < 3 ) {      expires = key->subkeys->expires;    
237                  rc = msg_box( dlg, _("This is a non-valid key.\n"      _snprintf (info, DIM (info)-1,
238                                       "Modifying the ownertrust has no effect on such keys.\n"                 _("Type: %s\r\n"
239                                       "Do you really want to continue?"),                 "Key ID: %s\r\n"
240                                       _("WinPT Warning"), MB_ICONWARNING|MB_YESNO );                 "Algorithm: %s\r\n"
241                  if (rc == IDNO)                 "Size: %s\r\n"
242                      return FALSE;                 "Created: %s\r\n"
243              }                 "Expires: %s\r\n"
244              GetDlgItemText( dlg, IDC_KEYPROPS_OT, info, sizeof info -1 );                 "Validity: %s\r\n"
245              gpgme_editkey_new( &ek );                 "Cipher: %s\r\n"
246              gpgme_editkey_is_secret( ek, k->key_pair );                 "%s\r\n"),
247              dialog_box_param( glob_hinst, (LPCSTR)IDD_WINPT_KEYEDIT_OWNERTRUST,                 get_key_type (key),
248                               dlg, (DLGPROC)keyedit_ownertrust_dlg_proc,                 k->keyid,
249                               (LPARAM)ek, _("Change Ownertrust"),                 get_key_algo (key, 0),
250                               IDS_WINPT_KEYEDIT_OWNERTRUST );                 get_key_size (key, 0),
251              if (!gpgme_editkey_is_valid (ek))                 get_key_created (created),
252                  return FALSE;                 get_key_expire_date (expires),
253              ec = gpgme_new (&ctx);                 get_validity (key),
254              if (ec)                 get_pref_cipher (&k2),
255                  BUG (0);                 get_card_type (&k2));
256              gpgme_set_edit_ctx( ctx, ek, GPGME_EDITKEY_TRUST );  
257              ec = gpgme_op_editkey( ctx, k->keyid );      SetDlgItemText (dlg, IDC_KEYPROPS_INFO, info);
258              gpgme_editkey_release( ek );      SetDlgItemText (dlg, IDC_KEYPROPS_FPR, get_key_fpr (key));  
259                  gpgme_release( ctx );      inf = ownertrust_to_string (key->owner_trust);
260              if( ec ) {      SetDlgItemText (dlg, IDC_KEYPROPS_OT, inf);
261                  msg_box( dlg, gpgme_strerror( ec ), _("Ownertrust"), MB_ERR );  
262                  return FALSE;      *r_key = key;
263              }  }
264              inf = ownertrust_to_string (ek, 0);  
265              k->callback.new_val = keyedit_ownertrust_get_val ();  
266              do_change_ownertrust (k, inf);  /* Dialog box procedure to show the key properties. */
267              SetDlgItemText (dlg, IDC_KEYPROPS_OT, inf);  BOOL CALLBACK
268              msg_box (dlg, _("Ownertrust successfully changed."), _("GnuPG Status"), MB_OK);  keyprops_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)
269                {
270              /* reload only the keylist */      static winpt_key_t k;
271              rcs.kr_reload = 1; rcs.kr_update = 1;      static gpgme_key_t key;
272              rcs.tr_update = 0;      gpgme_validity_t valid;
273              DialogBoxParam( glob_hinst, (LPCSTR)IDD_WINPT_KEYCACHE, dlg,      refresh_cache_s rcs = {0};
274                              keycache_dlg_proc, (LPARAM)&rcs );      const char *inf;
275              get_seckey (k->keyid, &sk);      int cancel = 0;
276              if (get_pubkey (k->keyid, &key))      int rc;
277                  BUG (0);      
278              return TRUE;      /* XXX: static variable (k) prevent that the dialog can
279                            be opened twice. */
280          case IDC_KEYPROPS_CHANGE_PWD:      switch (msg) {
281              keyedit_change_passwd (k, dlg);              case WM_INITDIALOG:
282              return TRUE;          if (!lparam)
283                dlg_fatal_error (dlg, "Could not get dialog param!");
284          case IDC_KEYPROPS_REVOKERS:                  k = (winpt_key_t)lparam;
285              dialog_box_param( glob_hinst, (LPCTSTR)IDD_WINPT_KEYREVOKERS, dlg,          #ifndef LANG_DE
286                                key_revokers_dlg_proc, (LPARAM)key, _("Key Revokers"),          SetWindowText (dlg, _("Key Properties"));
287                                IDS_WINPT_KEY_REVOKERS );          SetDlgItemText (dlg, IDC_KEYPROPS_OT_CHANGE, _("&Change"));
288              break;          SetDlgItemText (dlg, IDC_KEYPROPS_REVOKERS, _("&Revokers"));
289          }          SetDlgItemText (dlg, IDC_KEYPROPS_CHANGE_PWD, _("Change &Passwd"));
290      }          SetDlgItemText (dlg, IDC_KEYPROPS_OTINF, _("Ownertrust"));
291                #endif  
292      return FALSE;  
293  } /* keyprops_dlg_proc */          display_key_info (dlg, k, &key);
294            if (!keyprops_load_photo (dlg, key, &valid)) {
295                k->has_photo = 1;  
296                if (valid < GPGME_VALIDITY_MARGINAL)
297                    SetDlgItemText (dlg, IDC_KEYPROPS_IMGINF, _("Photo-ID not validated."));
298            }
299            if (k->key_pair)
300                EnableWindow (GetDlgItem (dlg, IDC_KEYPROPS_CHANGE_PWD), TRUE);
301            if (check_for_desig_rev (key))
302                EnableWindow (GetDlgItem (dlg, IDC_KEYPROPS_REVOKERS), TRUE);
303            center_window (dlg, NULL);
304            SetForegroundWindow (dlg);      
305            return TRUE;
306    
307        case WM_DESTROY:
308            unlink (get_photo_tmpname (dlg));
309            break;
310          
311        case WM_PAINT:
312            if (k->has_photo)
313                keyprops_show_photo (dlg);
314            break;
315    
316        case WM_SYSCOMMAND:
317            if (LOWORD (wparam) == SC_CLOSE)
318                EndDialog (dlg, TRUE);
319            return FALSE;
320            
321        case WM_COMMAND:
322            switch (LOWORD (wparam)) {
323            case IDOK:
324                EndDialog (dlg, TRUE);
325                return TRUE;
326                
327            case IDC_KEYPROPS_OT_CHANGE:
328                if (do_check_key (key)) {
329                    msg_box (dlg, _("The status of this key is 'revoked' or 'expired'.\n"
330                                    "You cannot change the ownertrust of such keys."),
331                                    _("WinPT Warning"), MB_ERR);
332                    return TRUE;
333                }
334                if( !k->key_pair && key->uids->validity < 3 ) {
335                    rc = msg_box( dlg, _("This is a non-valid key.\n"
336                                         "Modifying the ownertrust has no effect on such keys.\n\n"
337                                         "Do you really want to continue?"),
338                                         _("WinPT Warning"), MB_ICONWARNING|MB_YESNO );
339                    if (rc == IDNO)
340                        return TRUE;
341                }
342                //GetDlgItemText (dlg, IDC_KEYPROPS_OT, info, sizeof info -1);
343                dialog_box_param (glob_hinst, (LPCSTR)IDD_WINPT_KEYEDIT_OWNERTRUST,
344                                  dlg, (DLGPROC)keyedit_ownertrust_dlg_proc,
345                                  (LPARAM)k, _("Change Ownertrust"),
346                                  IDS_WINPT_KEYEDIT_OWNERTRUST);
347                if (k->callback.new_val == -1) { /* Cancel */
348                    EndDialog (dlg, FALSE);
349                    break;
350                }
351    
352                inf = ownertrust_to_string (k->callback.new_val);
353                do_change_ownertrust (k, inf);
354                SetDlgItemText (dlg, IDC_KEYPROPS_OT, inf);
355                msg_box (dlg, _("Ownertrust successfully changed."),
356                         _("GnuPG Status"), MB_OK);
357                
358                /* reload only the keylist */
359                rcs.kr_reload = 1; rcs.kr_update = 1;
360                rcs.tr_update = 0;
361                DialogBoxParam (glob_hinst, (LPCSTR)IDD_WINPT_KEYCACHE, dlg,
362                                keycache_dlg_proc, (LPARAM)&rcs);
363                return TRUE;
364                
365            case IDC_KEYPROPS_CHANGE_PWD:
366                keyedit_change_passwd (k, dlg);        
367                return TRUE;
368    
369            case IDC_KEYPROPS_REVOKERS:
370                dialog_box_param (glob_hinst, (LPCTSTR)IDD_WINPT_KEYREVOKERS, dlg,
371                                  key_revokers_dlg_proc, (LPARAM)key, _("Key Revokers"),
372                                  IDS_WINPT_KEY_REVOKERS);
373                break;
374            }
375        }
376        
377        return FALSE;
378    }

Legend:
Removed from v.22  
changed lines
  Added in v.36

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26