/[winpt]/trunk/Src/wptKeyPropsDlg.cpp
ViewVC logotype

Diff of /trunk/Src/wptKeyPropsDlg.cpp

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 24 by twoaday, Sat Oct 8 10:43:08 2005 UTC revision 128 by twoaday, Mon Dec 19 13:05:59 2005 UTC
# Line 1  Line 1 
1  /* wptKeyPropsDlg.cpp - WinPT key properties dialog  /* wptKeyPropsDlg.cpp - WinPT key properties dialog
2   *      Copyright (C) 2000, 2001, 2002, 2003, 2005 Timo Schulz   *      Copyright (C) 2000, 2001, 2002, 2003, 2005 Timo Schulz
3   *   *
4   * This file is part of WinPT.   * This file is part of WinPT.
5   *   *
6   * WinPT is free software; you can redistribute it and/or modify   * WinPT is free software; you can redistribute it and/or modify
7   * it under the terms of the GNU General Public License as published by   * it under the terms of the GNU General Public License as published by
8   * the Free Software Foundation; either version 2 of the License, or   * the Free Software Foundation; either version 2 of the License, or
9   * (at your option) any later version.   * (at your option) any later version.
10   *   *
11   * WinPT is distributed in the hope that it will be useful,   * WinPT is distributed in the hope that it will be useful,
12   * but WITHOUT ANY WARRANTY; without even the implied warranty of   * but WITHOUT ANY WARRANTY; without even the implied warranty of
13   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14   * GNU General Public License for more details.   * GNU General Public License for more details.
15   *   *
16   * You should have received a copy of the GNU General Public License   * You should have received a copy of the GNU General Public License
17   * along with WinPT; if not, write to the Free Software Foundation,   * along with WinPT; if not, write to the Free Software Foundation,
18   * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA   * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
19   */   */
20    #ifdef HAVE_CONFIG_H
21  #include <windows.h>  #include <config.h>
22    #endif
23  #include "../resource.h"  
24  #include "wptErrors.h"  #include <windows.h>
25  #include "wptGPG.h"  
26  #include "wptCommonCtl.h"  #include "resource.h"
27  #include "wptContext.h" /* for passphrase_s */  #include "wptErrors.h"
28  #include "wptNLS.h"  #include "wptGPG.h"
29  #include "wptDlgs.h"  #include "wptCommonCtl.h"
30  #include "wptTypes.h"  #include "wptContext.h" /* for passphrase_s */
31  #include "wptKeylist.h"  #include "wptNLS.h"
32  #include "wptW32API.h"  #include "wptDlgs.h"
33  #include "wptVersion.h"  #include "wptTypes.h"
34  #include "wptKeyEdit.h"  #include "wptKeylist.h"
35    #include "wptW32API.h"
36    #include "wptVersion.h"
37  static void  #include "wptKeyEdit.h"
38  do_change_ownertrust (winpt_key_t k, const char *s)  
39  {  
40      char ot[64];  /* Check that the key is not expired or revoked. */
41        static int
42      if( strstr( s, "ultimate" ) ) {  do_check_key (gpgme_key_t key)
43          listview_get_item_text (k->callback.ctl, k->callback.idx, 5, ot, DIM (ot)-1);  {
44          strcpy (ot, "Ultimate");      int okay = 0;
45          listview_add_sub_item (k->callback.ctl, k->callback.idx, 5, ot);      okay = key->expired;
46          /* fixme: If we switch back from Ultimate to a lower level */      if (!okay)
47      }          okay = key->revoked;
48  } /* do_change_ownertrust */      return okay;
49    }
50    
51  static int  
52  do_check_key (gpgme_key_t key)  /* Convert a trust integer into a string representation. */
53  {  static const char*
54      int okay = 0;  ownertrust_to_string (int val)
55      okay = key->expired;  {
56      if (!okay)      const char *inf;
57          okay = key->revoked;      int id = val;
58      return okay;  
59  } /* do_check_key */      switch (id) {
60        case 1: inf = _("Don't know");         break;
61        case 2: inf = _("I do NOT trust");     break;
62  static const char*      case 3: inf = _("I trust marginally"); break;
63  ownertrust_to_string (int val)      case 4: inf = _("I trust fully");      break;
64  {      case 5:
65      const char * inf;      case 6: inf = _("I trust ultimately"); break;
66      int id = val;      default:inf = _("Unknown");            break;
67      switch (id) {      }
68      case 1: inf = _("Don't know");         break;      
69      case 2: inf = _("I do NOT trust");     break;      return inf;
70      case 3: inf = _("I trust marginally"); break;  }
71      case 4: inf = _("I trust fully");      break;  
72      case 5:  
73      case 6: inf = _("I trust ultimately"); break;  /* Generate a unique temp name for the photo which
74      default:inf = _("Unknown");            break;     depends on the dialog handle and return it. */
75      }  static const char*
76        get_photo_tmpname (HWND dlg)
77      return inf;  {
78  } /* ownertrust_to_string */      static char buf[64];
79    
80        _snprintf (buf, sizeof (buf)-1, "winpt_photo_%08lX.tmp", (DWORD)dlg);
81  #define PHOTO_TMPNAME "winpt_temp_photo.jpg"      return buf;
82    }
83  static int  
84  keyprops_show_photo (HWND dlg, gpgme_key_t key)  
85  {  /* Load the photo from the key @key */
86      RECT r;      static int
87      POINT p;  keyprops_load_photo (HWND dlg, gpgme_key_t key, gpgme_validity_t *r_valid)
88      HWND h;  {
89      const BYTE *img;      winpt_key_s k;
90      DWORD imglen = 0;      FILE *f;
91      int pos=0;      const BYTE *img;
92      winpt_key_s k;      DWORD imglen = 0;
93        int pos=0;
94      winpt_get_pubkey (key->subkeys->keyid, &k);  
95      img = k.ext->attrib.d;      winpt_get_pubkey (key->subkeys->keyid, &k);
96      imglen = k.ext->attrib.len;      img = k.ext->attrib.d;
97        imglen = k.ext->attrib.len;
98      if (!img || !imglen)      if (!k.ext->attrib.validity)
99          return -1;          get_uat_validity (key->subkeys->keyid, &k.ext->attrib.validity);
100      FILE *f = fopen (PHOTO_TMPNAME, "wb");      *r_valid = k.ext->attrib.validity;
101      if (f) {  
102          for (pos = 0; img[pos] != 0x10; pos++)      if (!img || !imglen)
103                  ;          return -1;
104          pos += 16;      f = fopen (get_photo_tmpname (dlg), "wb");
105          fwrite (img + pos, 1, imglen - pos, f);      if (f) {
106          fwrite (img, 1, imglen, f);          for (pos = 0; img[pos] != 0x10; pos++)
107          fclose (f);                  ;
108      }          pos += 16;
109            fwrite (img + pos, 1, imglen - pos, f);
110      h = GetDlgItem (dlg, IDC_KEYPROPS_IMG);          fwrite (img, 1, imglen, f);
111      GetWindowRect (h, &r);          fclose (f);
112      p.x = r.left + 5;      }
113      p.y = r.top - 2;      return 0;
114      memset (&p, 0, sizeof (p));  }
115      PTD_jpg_show (h, &p, PHOTO_TMPNAME);  
116      unlink (PHOTO_TMPNAME);  
117    /* Display the photo in the image control in the dialog @dlg. */
118      return 0;  static int
119  }  keyprops_show_photo (HWND dlg)
120    {
121        RECT r;    
122  /* Return string representation of the key validity. @key. */      POINT p;
123  static const char*      HWND h;
124  get_validity (gpgme_key_t key)  
125  {      h = GetDlgItem (dlg, IDC_KEYPROPS_IMG);
126      int val;      GetWindowRect (h, &r);
127      val = key->expired;      p.x = r.left + 5;
128      if (val)      p.y = r.top - 2;
129          return "Expired";            memset (&p, 0, sizeof (p));
130      val = key->revoked;      PTD_jpg_show (h, &p, get_photo_tmpname (dlg));
131      if (val)      
132          return "Revoked";      return 0;
133      return get_key_trust2 (NULL, key->uids->validity, 0, 0);  }
134  }  
135    
136    /* Return string representation of the key validity. @key. */
137  /* Return the preferred sym. algorithm from @key as a string. */  static const char*
138  static const char*  get_validity (gpgme_key_t key)
139  get_pref_cipher (winpt_key_t k)  {
140  {      int val;
141      const char *sym_prefs=NULL;          val = key->expired;
142        if (val)
143      if (k->is_v3)          return _("Expired");    
144          return "IDEA";      val = key->revoked;
145      if (!k->ext->sym_prefs)      if (val)
146          return "3DES";          return _("Revoked");
147      switch (*k->ext->sym_prefs) {      val = key->disabled;
148      case 1: return "IDEA";      if (val)
149      case 2: return "3DES";          return _("Disabled");
150      case 3: return "CAST5";      return get_key_trust2 (NULL, key->uids->validity, 0, 0);
151      case 4: return "Blowfish";  }
152      case 7:  
153      case 8:  
154      case 9: return "AES";  /* Return the preferred sym. algorithm from @key as a string. */
155      case 10:return "Twofish";  static const char*
156      }  get_pref_cipher (winpt_key_t k)
157      return "Unknown";  {
158  }      if (k->is_v3)
159            return "IDEA";
160        if (!k->ext->sym_prefs)
161  /* Return true if the key has designated revokers. */          return "3DES";
162  static bool      switch (*k->ext->sym_prefs) {
163  check_for_desig_rev (gpgme_key_t key)      case 1: return "IDEA";
164  {      case 2: return "3DES";
165      winpt_key_s k;      case 3: return "CAST5";
166      memset (&k, 0, sizeof (k));      case 4: return "Blowfish";
167      if (!winpt_get_pubkey (key->subkeys->keyid, &k))      case 7:
168          return k.ext->gloflags.has_desig_rev? true : false;      case 8:
169      return false;      case 9: return "AES";
170  }      case 10:return "Twofish";
171        }
172        return "Unknown";
173  /* Dialog box procedure to show the key properties. */  }
174  BOOL CALLBACK  
175  keyprops_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)  
176  {  /* Return true if the key has designated revokers. */
177      static winpt_key_t k;  static bool
178      static gpgme_key_t key, sk;  check_for_desig_rev (gpgme_key_t key)
179      static int photo_done = 0;  {
180      struct winpt_key_s k2;      winpt_key_s k;
181      refresh_cache_s rcs = {0};      memset (&k, 0, sizeof (k));
182      const char *inf;      if (!winpt_get_pubkey (key->subkeys->keyid, &k))
183      char info[2048];          return k.ext->gloflags.has_desig_rev? true : false;
184      u32 created, expires;      return false;
185      int ot, cancel = 0;  }
186      int rc;  
187        
188      switch (msg) {  /* Print information (name) of the smart card. */
189      case WM_INITDIALOG:  static const char*
190          if (!lparam)  get_card_type (winpt_key_t k)
191              dlg_fatal_error( dlg, "Could not get dialog param!" );  {    
192          k = (winpt_key_t)lparam;      static char buf[64];
193          #ifndef LANG_DE  
194          SetWindowText( dlg, _("Key Properties") );      if (!k->ext->card_type)
195          SetDlgItemText (dlg, IDC_KEYPROPS_OT_CHANGE, _("&Change"));          return "";
196          SetDlgItemText (dlg, IDC_KEYPROPS_REVOKERS, _("&Revokers"));      _snprintf (buf, sizeof (buf)-1, _("Card-Type: %s\r\n"), k->ext->card_type);
197          SetDlgItemText (dlg, IDC_KEYPROPS_CHANGE_PWD, _("Change &Passwd"));      return buf;
198          #endif    }
199    
200          photo_done = 0;  
201          memset (&k2, 0, sizeof (k2));  /* Display the key information for key @k.
202          if (k->key_pair)     Return value: gpgme key on success. */
203              winpt_get_seckey (k->keyid, &k2);  static void
204          else  display_key_info (HWND dlg, winpt_key_t k, gpgme_key_t *r_key)
205              winpt_get_pubkey (k->keyid, &k2);  {
206          sk = k2.ctx;      struct winpt_key_s k2;
207          if (sk)      gpgme_key_t sk, key;
208              k->is_protected = k2.is_protected;      char info[512];
209          if (get_pubkey (k->keyid, &key))      const char *inf;
210              BUG (0);      u32 created, expires;
211          created = key->subkeys->timestamp;  
212          expires = key->subkeys->expires;      memset (&k2, 0, sizeof (k2));      
213          _snprintf (info, DIM (info)-1,      if (k->key_pair)
214                    "Type: %s\r\n"          winpt_get_seckey (k->keyid, &k2);
215                    "Key ID: %s\r\n"      else    
216                    "Algorithm: %s\r\n"          winpt_get_pubkey (k->keyid, &k2);
217                    "Size: %s\r\n"      sk = k2.ctx;
218                    "Created: %s\r\n"      if (sk)
219                    "Expires: %s\r\n"          k->is_protected = k2.is_protected;
220                    "Validity: %s\r\n"      if (get_pubkey (k->keyid, &key))
221                    "Cipher: %s\r\n",          BUG (0);    
222                    get_key_type (key),      created = key->subkeys->timestamp;  
223                    k->keyid,      expires = key->subkeys->expires;    
224                    get_key_algo (key, 0),      _snprintf (info, DIM (info)-1,
225                    get_key_size (key, 0),                 _("Type: %s\r\n"
226                    get_key_created (created),                 "Key ID: %s\r\n"
227                    get_key_expire_date (expires),                 "Algorithm: %s\r\n"
228                    get_validity (key),                 "Size: %s bits\r\n"
229                    get_pref_cipher (&k2));                 "Created: %s\r\n"
230          SetDlgItemText (dlg, IDC_KEYPROPS_INFO, info);                 "Expires: %s\r\n"
231          SetDlgItemText (dlg, IDC_KEYPROPS_FPR, get_key_fpr (key));                 "Validity: %s\r\n"
232          ot = gpgme_key_get_ulong_attr( key, GPGME_ATTR_OTRUST, NULL, 0 );                               "Cipher: %s\r\n"
233          inf = ownertrust_to_string (ot);                 "%s\r\n"),
234          SetDlgItemText( dlg, IDC_KEYPROPS_OT, inf );                 get_key_type (key),
235          if (k->key_pair)                 k->keyid,
236              EnableWindow( GetDlgItem( dlg, IDC_KEYPROPS_CHANGE_PWD ), TRUE );                 get_key_algo (key, 0),
237          if (check_for_desig_rev (key))                 get_key_size (key, 0),
238              EnableWindow( GetDlgItem( dlg, IDC_KEYPROPS_REVOKERS ), TRUE );                 get_key_created (created),
239          center_window (dlg, NULL);                 get_key_expire_date (expires),
240          SetForegroundWindow (dlg);                       get_validity (key),
241          return TRUE;                 get_pref_cipher (&k2),
242                         get_card_type (&k2));
243      case WM_PAINT:        
244          if (photo_done == 0) {      SetDlgItemText (dlg, IDC_KEYPROPS_INFO, info);
245              photo_done = 1;      SetDlgItemText (dlg, IDC_KEYPROPS_FPR, get_key_fpr (key));  
246              keyprops_show_photo (dlg, key);      inf = ownertrust_to_string (key->owner_trust);
247          }      SetDlgItemText (dlg, IDC_KEYPROPS_OT, inf);
248          break;  
249        *r_key = key;
250      case WM_SYSCOMMAND:  }
251          if( LOWORD( wparam ) == SC_CLOSE )  
252              EndDialog( dlg, TRUE );  
253          return FALSE;  /* Dialog box procedure to show the key properties. */
254            BOOL CALLBACK
255      case WM_COMMAND:  keyprops_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)
256          switch( LOWORD( wparam ) ) {  {
257          case IDOK:      static winpt_key_t k;
258              EndDialog( dlg, TRUE );      static gpgme_key_t key;
259              return TRUE;      gpgme_validity_t valid;
260                    refresh_cache_s rcs = {0};
261          case IDC_KEYPROPS_OT_CHANGE:      const char *inf;
262              if( do_check_key( key ) ) {      int rc;
263                  msg_box( dlg, _("The status of this key is 'revoked' or 'expired'.\n"      
264                                  "You cannot change the ownertrust of such keys."),      /* XXX: static variable (k) prevent that the dialog can
265                                  _("WinPT Warning"), MB_ERR );              be opened twice. */
266                  return FALSE;      switch (msg) {
267              }      case WM_INITDIALOG:
268              if( !k->key_pair && key->uids->validity < 3 ) {          if (!lparam)
269                  rc = msg_box( dlg, _("This is a non-valid key.\n"              dlg_fatal_error (dlg, "Could not get dialog param!");
270                                       "Modifying the ownertrust has no effect on such keys.\n\n"          k = (winpt_key_t)lparam;
271                                       "Do you really want to continue?"),          SetWindowText (dlg, _("Key Properties"));
272                                       _("WinPT Warning"), MB_ICONWARNING|MB_YESNO );          SetDlgItemText (dlg, IDC_KEYPROPS_OT_CHANGE, _("&Change"));
273                  if (rc == IDNO)          SetDlgItemText (dlg, IDC_KEYPROPS_REVOKERS, _("&Revokers"));
274                      return FALSE;          SetDlgItemText (dlg, IDC_KEYPROPS_CHANGE_PWD, _("Change &Passwd"));
275              }          SetDlgItemText (dlg, IDC_KEYPROPS_OTINF, _("Ownertrust"));
276              GetDlgItemText( dlg, IDC_KEYPROPS_OT, info, sizeof info -1 );  
277            display_key_info (dlg, k, &key);
278                        if (!keyprops_load_photo (dlg, key, &valid)) {
279              dialog_box_param (glob_hinst, (LPCSTR)IDD_WINPT_KEYEDIT_OWNERTRUST,              k->has_photo = 1;  
280                                dlg, (DLGPROC)keyedit_ownertrust_dlg_proc,              if (valid < GPGME_VALIDITY_MARGINAL)
281                                (LPARAM)k, _("Change Ownertrust"),                  SetDlgItemText (dlg, IDC_KEYPROPS_IMGINF, _("Photo-ID not validated."));
282                                IDS_WINPT_KEYEDIT_OWNERTRUST);          }
283              if (k->callback.new_val == -1) { /* Cancel */          if (k->key_pair)
284                  EndDialog (dlg, FALSE);              EnableWindow (GetDlgItem (dlg, IDC_KEYPROPS_CHANGE_PWD), TRUE);
285                  break;          if (check_for_desig_rev (key))
286              }              EnableWindow (GetDlgItem (dlg, IDC_KEYPROPS_REVOKERS), TRUE);
287            center_window (dlg, NULL);
288              inf = ownertrust_to_string (k->callback.new_val);          SetForegroundWindow (dlg);      
289              do_change_ownertrust (k, inf);          return TRUE;
290              SetDlgItemText (dlg, IDC_KEYPROPS_OT, inf);  
291              msg_box (dlg, _("Ownertrust successfully changed."), _("GnuPG Status"), MB_OK);      case WM_DESTROY:
292                        remove (get_photo_tmpname (dlg));
293              /* reload only the keylist */          break;
294              rcs.kr_reload = 1; rcs.kr_update = 1;        
295              rcs.tr_update = 0;      case WM_PAINT:
296              DialogBoxParam( glob_hinst, (LPCSTR)IDD_WINPT_KEYCACHE, dlg,          if (k->has_photo)
297                              keycache_dlg_proc, (LPARAM)&rcs );              keyprops_show_photo (dlg);
298              /* XXX: old code!?          break;
299              get_seckey (k->keyid, &sk);  
300              if (get_pubkey (k->keyid, &key))      case WM_SYSCOMMAND:
301                  BUG (0);          if (LOWORD (wparam) == SC_CLOSE)
302              */              EndDialog (dlg, TRUE);
303              return TRUE;          return FALSE;
304                        
305          case IDC_KEYPROPS_CHANGE_PWD:      case WM_COMMAND:
306              keyedit_change_passwd (k, dlg);                  switch (LOWORD (wparam)) {
307              return TRUE;          case IDOK:
308                EndDialog (dlg, TRUE);
309          case IDC_KEYPROPS_REVOKERS:                      return TRUE;
310              dialog_box_param (glob_hinst, (LPCTSTR)IDD_WINPT_KEYREVOKERS, dlg,              
311                                key_revokers_dlg_proc, (LPARAM)key, _("Key Revokers"),          case IDC_KEYPROPS_OT_CHANGE:
312                                IDS_WINPT_KEY_REVOKERS);              if (do_check_key (key)) {
313              break;                  msg_box (dlg, _("The status of this key is 'revoked' or 'expired'.\n"
314          }                                  "You cannot change the ownertrust of such keys."),
315      }                                  _("WinPT Warning"), MB_ERR);
316                        return TRUE;
317      return FALSE;              }
318  }              if( !k->key_pair && key->uids->validity < 3 ) {
319                    rc = msg_box( dlg, _("This is a non-valid key.\n"
320                                         "Modifying the ownertrust has no effect on such keys.\n\n"
321                                         "Do you really want to continue?"),
322                                         _("WinPT Warning"), MB_ICONWARNING|MB_YESNO );
323                    if (rc == IDNO)
324                        return TRUE;
325                }
326                dialog_box_param (glob_hinst, (LPCSTR)IDD_WINPT_KEYEDIT_OWNERTRUST,
327                                  dlg, (DLGPROC)keyedit_ownertrust_dlg_proc,
328                                  (LPARAM)k, _("Change Ownertrust"),
329                                  IDS_WINPT_KEYEDIT_OWNERTRUST);
330                if (k->callback.new_val == -1) { /* Cancel */
331                    EndDialog (dlg, FALSE);
332                    break;
333                }
334    
335                inf = ownertrust_to_string (k->callback.new_val);
336                SetDlgItemText (dlg, IDC_KEYPROPS_OT, inf);
337                msg_box (dlg, _("Ownertrust successfully changed."),
338                         _("GnuPG Status"), MB_OK);
339                
340                /* XXX: modified ownertrust values can effect the entire
341                        WoT so we reload the cache. But this is very slow. */
342                memset (&rcs, 0, sizeof (rcs));
343                rcs.kr_reload = 1; rcs.kr_update = 1; /* reload only keylist */
344                DialogBoxParam (glob_hinst, (LPCSTR)IDD_WINPT_KEYCACHE, dlg,
345                                keycache_dlg_proc, (LPARAM)&rcs);
346                return TRUE;
347                
348            case IDC_KEYPROPS_CHANGE_PWD:
349                keyedit_change_passwd (k, dlg);        
350                return TRUE;
351    
352            case IDC_KEYPROPS_REVOKERS:
353                dialog_box_param (glob_hinst, (LPCTSTR)IDD_WINPT_KEYREVOKERS, dlg,
354                                  key_revokers_dlg_proc, (LPARAM)key,
355                                  _("Key Revokers"), IDS_WINPT_KEY_REVOKERS);
356                break;
357            }
358        }
359        
360        return FALSE;
361    }

Legend:
Removed from v.24  
changed lines
  Added in v.128

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26