/[winpt]/trunk/Src/wptKeylist.cpp
ViewVC logotype

Annotation of /trunk/Src/wptKeylist.cpp

Parent Directory Parent Directory | Revision Log Revision Log


Revision 48 - (hide annotations)
Mon Oct 31 21:14:11 2005 UTC (19 years, 4 months ago) by werner
File size: 25895 byte(s)
More changes.  Compiles again but there are at least gettext issues with
w32-gettext.c.  I can't get a gpg-error build with ENABLE_NLS.

1 werner 36 /* wptKeylist.cpp - Keylist element
2     * Copyright (C) 2001-2005 Timo Schulz
3     * Copyright (C) 2004 Andreas Jobs
4     *
5     * This file is part of WinPT.
6     *
7     * WinPT is free software; you can redistribute it and/or
8     * modify it under the terms of the GNU General Public License
9     * as published by the Free Software Foundation; either version 2
10     * of the License, or (at your option) any later version.
11     *
12     * WinPT is distributed in the hope that it will be useful,
13     * but WITHOUT ANY WARRANTY; without even the implied warranty of
14     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15     * General Public License for more details.
16     *
17     * You should have received a copy of the GNU General Public License
18     * along with WinPT; if not, write to the Free Software Foundation,
19     * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20     */
21 werner 42 #ifdef HAVE_CONFIG_H
22     #include <config.h>
23     #endif
24    
25 werner 36 #include <windows.h>
26     #include <commctrl.h>
27     #include <time.h>
28    
29     #include "wptCommonCtl.h"
30     #include "wptTypes.h"
31     #include "wptGPG.h"
32     #include "wptKeylist.h"
33     #include "wptKeyManager.h"
34     #include "wptW32API.h"
35     #include "wptNLS.h"
36     #include "wptErrors.h"
37     #include "wptUTF8.h"
38     #include "wptRegistry.h"
39     #include "wptContext.h"
40    
41    
42     #define key_is_useable(key) (!(key)->revoked && !(key)->expired && !(key)->disabled)
43    
44     static struct listview_column_s klist_enc[] = {
45     {0, 242, (char *)_("User ID")},
46     {1, 80, (char *)_("Key ID")},
47     {3, 46, (char *)_("Size")},
48     {4, 50, (char *)_("Cipher")},
49     {5, 70, (char *)_("Validity")},
50     {0, 0, NULL}
51     };
52     #define KLIST_ENC_ITEMS (DIM(klist_enc) -1)
53    
54     static struct listview_column_s klist[] = {
55     {0, 242, (char *)_("User ID")},
56     {1, 78, (char *)_("Key ID")},
57     {2, 52, (char *)_("Type")},
58     {3, 68, (char *)_("Size")},
59     {4, 66, (char *)_("Cipher")},
60     {5, 70, (char *)_("Validity")},
61     {6, 40, (char *)_("Trust")},
62     {7, 72, (char *)_("Creation")},
63     {0, 0, NULL}
64     };
65     #define KLIST_ITEMS (DIM(klist) - 1)
66    
67     struct key_array_s {
68     char keyid[32];
69     int checked;
70     };
71    
72     static int find_secret_key (gpgme_key_t key);
73    
74    
75     static key_array_s*
76     key_array_new( size_t items )
77     {
78     key_array_s *ka;
79     size_t j;
80    
81     if( items == 0 )
82     return NULL;
83     ka = new key_array_s[items + 1];
84     if( ka == NULL )
85     return NULL;
86     for ( j = 0; j < items; j++ )
87     ka[j].checked = 0;
88     return ka;
89     } /* key_array_new */
90    
91    
92     static void
93     key_array_release( key_array_s *ka )
94     {
95     free_if_alloc( ka );
96     } /* key_array_release */
97    
98    
99     static int
100     key_array_search( key_array_s *ka, size_t items, const char *keyid )
101     {
102     size_t j;
103    
104     /* fixme: we need a faster search method */
105     for( j = 0; j < items; j++ ) {
106     if( !strcmp( keyid, ka[j].keyid ) )
107     return 1;
108     }
109    
110     return 0;
111     } /* key_array_search */
112    
113    
114     gpgme_user_id_t
115     get_nth_userid (gpgme_key_t key, int idx)
116     {
117     gpgme_user_id_t t;
118    
119     if (!key->uids)
120     return NULL;
121     t = key->uids;
122     while (idx-- && t->next)
123     t = t->next;
124     return t;
125     }
126    
127    
128     int
129     count_userids (gpgme_key_t key)
130     {
131     gpgme_user_id_t u;
132     int n = 1;
133    
134     u = key->uids;
135     if (!u)
136     return 0;
137     while (u->next) {
138     u = u->next;
139     n++;
140     }
141     return n;
142     }
143    
144    
145     gpgme_subkey_t
146     get_nth_key (gpgme_key_t key, int idx)
147     {
148     gpgme_subkey_t t;
149    
150     if (!key->subkeys)
151     return NULL;
152     t = key->subkeys;
153     while (idx-- && t->next)
154     t = t->next;
155     return t;
156     }
157    
158    
159     int
160     count_subkeys (gpgme_key_t key)
161     {
162     gpgme_subkey_t k;
163     int n = 1;
164    
165     k = key->subkeys;
166     if (!k)
167     return 0;
168     while (k->next) {
169     k = k->next;
170     n++;
171     }
172     return n;
173     }
174    
175    
176     gpgme_key_sig_t
177     get_selfsig (gpgme_user_id_t uid, const char *keyid, int first)
178     {
179     gpgme_key_sig_t s, self_sig=NULL;
180     long timestamp=0;
181    
182     for (s = uid->signatures; s; s = s->next) {
183     if (!strcmp (s->keyid+8, keyid) && s->timestamp > timestamp) {
184     self_sig = s;
185     timestamp = s->timestamp;
186     if (first)
187     break;
188     }
189     }
190     return self_sig;
191     }
192    
193    
194    
195     const char*
196     get_key_algo (gpgme_key_t key, int keyidx)
197     {
198     static char algo_id[128];
199     gpgme_subkey_t k;
200     char alg[32];
201     const char *subalg;
202     int n=0;
203    
204     if (keyidx > 0) {
205     k = get_nth_key (key, keyidx-1);
206     subalg = get_key_pubalgo (k->pubkey_algo);
207     _snprintf( algo_id, DIM (algo_id)-1, "%s", subalg);
208     return algo_id;
209     }
210     strcpy (alg, get_key_pubalgo (key->subkeys->pubkey_algo));
211     n = count_subkeys (key);
212     if (n > 1) {
213     k = get_nth_key (key, n-1);
214     subalg = get_key_pubalgo (k->pubkey_algo);
215     _snprintf (algo_id, DIM (algo_id)-1, "%s/%s", alg, subalg);
216     return algo_id;
217     }
218     return get_key_pubalgo (key->subkeys->pubkey_algo);
219     } /* get_key_algo */
220    
221    
222     const char*
223 twoaday 41 get_key_created (long timestamp)
224 werner 36 {
225     static char timebuf[128];
226     struct tm *warp;
227    
228     if (timestamp == 0 || timestamp == -1)
229 werner 48 return "????" "-??" "-??";
230 werner 36 warp = localtime( &timestamp );
231     _snprintf( timebuf, sizeof timebuf - 1, "%04d-%02d-%02d",
232     warp->tm_year + 1900, warp->tm_mon + 1, warp->tm_mday );
233     return timebuf;
234     } /* get_key_created */
235    
236    
237 twoaday 41 /* Return a string presentation of the time @timestamp. */
238 werner 36 const char*
239     get_key_expire_date (long timestamp)
240     {
241     static char timebuf[64];
242     struct tm *warp;
243    
244     if( !timestamp )
245     return _("Never");
246     warp = localtime( &timestamp );
247 twoaday 41 _snprintf (timebuf, sizeof timebuf -1, "%04d-%02d-%02d",
248     warp->tm_year + 1900, warp->tm_mon + 1, warp->tm_mday);
249 werner 36 return timebuf;
250 twoaday 41 }
251 werner 36
252    
253     const char*
254     get_key_type (gpgme_key_t key)
255     {
256     int type = find_secret_key (key);
257    
258     if (type == 1)
259     return _("Key Pair");
260     else if (type == 2)
261     return _("Key Pair (Card)");
262     return _("Public Key");
263     } /* get_key_type */
264    
265    
266     const char*
267     get_key_size (gpgme_key_t key, int keyidx)
268     {
269     static char size_id[64];
270     gpgme_subkey_t k;
271     int n, size_main, size_sub;
272    
273     if (keyidx > 0) {
274     k = get_nth_key (key, keyidx-1);
275     size_main = k->length;
276     _snprintf (size_id, DIM (size_id)-1, "%d", size_main);
277     return size_id;
278     }
279     size_main = key->subkeys->length;
280     n = count_subkeys (key);
281     if (n > 1) {
282     k = get_nth_key (key, n-1);
283     size_sub = k->length;
284     _snprintf( size_id, sizeof (size_id) - 1, "%d/%d", size_main, size_sub );
285     return size_id;
286     }
287     _snprintf( size_id, sizeof (size_id) - 1, "%d", size_main );
288     return size_id;
289     } /* get_key_size */
290    
291    
292     const char*
293     get_key_pubalgo (gpgme_pubkey_algo_t alg)
294     {
295     switch (alg) {
296     case GPGME_PK_DSA: return "DSA";
297     case GPGME_PK_ELG:
298     case GPGME_PK_ELG_E: return "ELG";
299     case GPGME_PK_RSA: return "RSA";
300     }
301     return "???";
302     }
303    
304     const char *
305     get_key_fpr (gpgme_key_t key)
306     {
307     static char fpr_md[64];
308     const char *fpr;
309     char t[16], tmp[40];
310     size_t i=0;
311    
312     memset (fpr_md, 0, sizeof (fpr_md));
313     fpr = key->subkeys->fpr;
314     if (!fpr || !*fpr) {
315     memset (tmp, '0', 40);
316     fpr = tmp;
317     }
318     if (strlen (fpr) == 32) {
319     strcat (fpr_md, " ");
320     for (i=0; i < strlen (fpr)/2; i++) {
321     sprintf (t, "%c%c ", fpr[2*i], fpr[2*i+1]);
322     strcat (fpr_md, t);
323     }
324     }
325     else {
326     strcat (fpr_md, " ");
327     for (i = 0; i < strlen (fpr) / 4; i++) {
328     sprintf (t, "%c%c%c%c ", fpr[4*i], fpr[4*i+1], fpr[4*i+2], fpr[4*i+3]);
329     strcat (fpr_md, t);
330     }
331     }
332     return fpr_md;
333     } /* get_key_fpr */
334    
335    
336     const char *
337     get_key_trust2 (gpgme_key_t key, int val, int uididx, int listmode)
338     {
339     if (key)
340     val = key->owner_trust; /* uididx?? */
341     switch (val) {
342     case GPGME_VALIDITY_UNKNOWN:
343     case GPGME_VALIDITY_UNDEFINED:
344     return "None";
345     case GPGME_VALIDITY_NEVER:
346     return "Never";
347     case GPGME_VALIDITY_MARGINAL:
348     return "Marginal";
349     case GPGME_VALIDITY_FULL:
350     case GPGME_VALIDITY_ULTIMATE:
351     return "Full";
352     }
353     return "";
354     }
355    
356    
357     const char *
358     get_key_trust (gpgme_key_t key, int uididx, int listmode)
359     {
360     return get_key_trust2 (key, 0, uididx, listmode);
361     }
362    
363    
364     const char *
365     get_key_trust_str (int val)
366     {
367     return get_key_trust2 (NULL, val, 0, 0);
368     }
369    
370    
371     char*
372     get_key_status (gpgme_key_t key, int uididx, int listmode)
373     {
374     gpgme_user_id_t u;
375 werner 48 char * p;
376 werner 36 const char * attr;
377     int i = 0;
378     u32 key_attr =0;
379    
380     if (uididx < 0 || count_userids (key) > uididx)
381     uididx = 0;
382     if (listmode) {
383 werner 48 const char *s;
384    
385 werner 36 if (key->revoked)
386 werner 48 s = _("Revoked");
387 werner 36 else if (key->expired)
388 werner 48 s = _("Expired");
389 werner 36 else if (key->disabled)
390 werner 48 s = _("Disabled");
391     else
392     s = "";
393    
394 werner 36 /* if the key has a special status, we don't continue to figure out
395     what any user-id validities. */
396 werner 48 if (*s)
397     return m_strdup (s);
398 werner 36 }
399     u = get_nth_userid (key, uididx);
400     key_attr = u->validity;
401     attr = get_key_trust2 (NULL, key_attr, 0, 0);
402 werner 48 /* FIXME: Why not just strdup and why does this function either
403     * return a new allocated or an m_strdup allocated string? This
404     * is very dangerous!!! */
405 werner 36 p = new char[strlen( attr ) + 2];
406     if (!p)
407     BUG (NULL);
408 werner 48 strcpy (p, attr);
409 werner 36 return p;
410     } /* get_key_status */
411    
412    
413     /* Integer comparsion of @a and @b.
414     Return values: same as in strcmp. */
415     static inline int
416     int_cmp (int a, int b)
417     {
418     if (a == b) return 0;
419     else if (a > b) return 1;
420     else return -1;
421     return 0;
422     }
423    
424    
425     /* To allow to sort the keys, we need to take care of
426     the expired/revoke status also. */
427     static int
428     get_ext_validity (gpgme_key_t k)
429     {
430     if (k->revoked)
431     return GPGME_VALIDITY_ULTIMATE+1;
432     else if (k->expired)
433     return GPGME_VALIDITY_ULTIMATE+2;
434     return k->uids->validity;
435     }
436    
437    
438     /* List view sorting callback. */
439     static int CALLBACK
440     keylist_cmp_cb (LPARAM first, LPARAM second, LPARAM sortby)
441     {
442     gpgme_key_t a, b;
443     int cmpresult = 0;
444    
445     a = (gpgme_key_t)first;
446     b = (gpgme_key_t)second;
447     if (!a || !b)
448     BUG (NULL);
449    
450     switch (sortby & ~KEYLIST_SORT_DESC) {
451     case KEY_SORT_USERID:
452 twoaday 25 cmpresult = strcmpi (a->uids->uid, b->uids->uid);
453 werner 36 break;
454    
455     case KEY_SORT_KEYID:
456     cmpresult = strcmpi (a->subkeys->keyid+8,
457     b->subkeys->keyid+8);
458     break;
459    
460     case KEY_SORT_VALIDITY:
461     cmpresult = int_cmp (get_ext_validity (a),
462     get_ext_validity (b));
463     break;
464    
465     case KEY_SORT_OTRUST:
466     cmpresult = int_cmp (a->owner_trust, b->owner_trust);
467     break;
468    
469     case KEY_SORT_IS_SECRET:
470     get_seckey (a->subkeys->keyid, &a);
471     get_seckey (b->subkeys->keyid, &b);
472     cmpresult = int_cmp (a? a->secret : 0, b? b->secret : 0);
473     break;
474    
475     case KEY_SORT_LEN:
476     cmpresult = int_cmp (a->subkeys->length,
477     b->subkeys->length);
478     break;
479    
480     case KEY_SORT_CREATED:
481     cmpresult = int_cmp (a->subkeys->timestamp,
482     b->subkeys->timestamp);
483     break;
484    
485     case KEY_SORT_ALGO:
486     cmpresult = int_cmp (a->subkeys->pubkey_algo,
487     b->subkeys->pubkey_algo);
488     break;
489    
490     default:
491     cmpresult = strcmpi (a->uids->uid, b->uids->uid);
492     break;
493     }
494     if (sortby & KEYLIST_SORT_DESC)
495     return (~cmpresult + 1);
496     else
497     return cmpresult;
498     }
499    
500    
501     /* Return the validity of the group @grp. */
502     static const char*
503     calc_validity (gpg_group_t grp)
504     {
505     int level = 0, valid;
506     gpg_member_t mbr;
507     gpgme_key_t key;
508    
509     for (mbr = grp->list; mbr; mbr = mbr->next) {
510     if (get_pubkey (mbr->name, &key))
511     continue;
512     valid = key->uids->validity;
513     switch (valid) {
514     case GPGME_VALIDITY_MARGINAL:
515     case GPGME_VALIDITY_NEVER:
516     case GPGME_VALIDITY_UNDEFINED:
517     return get_key_trust2 (NULL, valid, 0, 0);
518     }
519     }
520     return _("Full");
521     }
522    
523    
524     int
525     keylist_add_groups( listview_ctrl_t lv )
526     {
527     #if 0
528     gpg_optfile_t gh;
529     gpg_group_t grp;
530     const char *valid;
531    
532     gh = km_groupdb_open( );
533     if( !gh )
534     return WPTERR_FILE_OPEN;
535    
536     for( grp = gh->grp; grp; grp = grp->next ) {
537     valid = calc_validity( grp );
538     listview_add_item( lv, " " );
539     listview_add_sub_item( lv, 0, 0, grp->name );
540     listview_add_sub_item( lv, 0, 1, "gpg_group_t" );
541     listview_add_sub_item( lv, 0, 2, "" );
542     listview_add_sub_item( lv, 0, 3, "Unknown" );
543     listview_add_sub_item( lv, 0, 4, valid?valid : "Unknown" );
544     }
545     #endif
546     return 0;
547     } /* keylist_add_groups */
548    
549    
550     /* Create a listview for listing keys. Use the mode given in @mode
551     and the control is given in @ctrl. */
552     static int
553     keylist_build (listview_ctrl_t *r_lv, HWND ctrl, int mode)
554     {
555     listview_ctrl_t lv;
556     listview_column_t col;
557     int j, n = 0;
558     int kl_nolist = 0, rc = 0;
559    
560     rc = listview_new (&lv);
561     if( rc )
562     return rc;
563    
564     lv->ctrl = ctrl;
565     if ((mode & KEYLIST_ENCRYPT) || (mode & KEYLIST_ENCRYPT_MIN)) {
566     col = klist_enc;
567     n = KLIST_ENC_ITEMS;
568     }
569     else if ((mode & KEYLIST_SIGN)) {
570     col = klist_enc;
571     n = KLIST_ENC_ITEMS - 1;
572     }
573     else {
574     col = klist;
575     n = KLIST_ITEMS;
576     }
577    
578     for( j = 0; j < n; j++ )
579     listview_add_column( lv, &col[j] );
580     listview_set_ext_style( lv );
581     *r_lv = lv;
582    
583     return 0;
584     }
585    
586    
587     static void
588     keylist_load_keycache (listview_ctrl_t lv, int mode,
589     gpg_keycache_t pubkc, gpg_keycache_t seckc)
590     {
591     gpgme_error_t err = gpg_error (GPG_ERR_NO_ERROR);
592     gpgme_key_t key, skey;
593     const char * keyid;
594    
595     if (pubkc && seckc) {
596     gpg_keycache_rewind (pubkc);
597     while (!gpg_keycache_next_key (pubkc, 0, &key)) {
598     keyid = key->subkeys->keyid;
599     if (keyid && !gpg_keycache_find_key (seckc, keyid, 0, &skey))
600     keylist_add_key (lv, mode, key);
601     }
602     }
603     else if (pubkc) {
604     gpg_keycache_rewind (pubkc);
605     while (!err) {
606     err = gpg_keycache_next_key (pubkc, 0, &key);
607     if (!err)
608     keylist_add_key (lv, mode, key);
609     }
610     }
611     }
612    
613    
614     /* Load the list view @ctrl with the keys from the cache.
615     Return value: list view context on success. */
616     listview_ctrl_t
617     keylist_load (HWND ctrl, gpg_keycache_t pubkc, gpg_keycache_t seckc,
618     int mode, int sortby)
619     {
620     listview_ctrl_t lv;
621     int rc = 0;
622    
623     rc = keylist_build (&lv, ctrl, mode);
624     if (rc)
625     return NULL;
626     keylist_load_keycache (lv, mode, pubkc, seckc);
627     keylist_sort (lv, sortby);
628     if ((mode & KEYLIST_ENCRYPT) || (mode & KEYLIST_ENCRYPT_MIN))
629     keylist_add_groups (lv);
630     return lv;
631     }
632    
633    
634     /* Reload the given key list control @lv. */
635     int
636     keylist_reload (listview_ctrl_t lv, gpg_keycache_t pubkc, int mode, int sortby)
637     {
638     listview_del_all (lv);
639     keylist_load_keycache( lv, mode, pubkc, NULL );
640     keylist_sort (lv, sortby);
641     return 0;
642     }
643    
644    
645     void
646     keylist_delete (listview_ctrl_t lv)
647     {
648     if (lv) {
649     listview_release (lv);
650     }
651     }
652    
653    
654     /* Return if there is a secret for @key.
655     0 means success. */
656     static int
657     find_secret_key (gpgme_key_t key)
658     {
659     const char *keyid;
660     winpt_key_s skey;
661    
662     memset (&skey, 0, sizeof (skey));
663     keyid = key->subkeys->keyid;
664     if (!keyid)
665     return 0;
666     winpt_get_seckey (keyid, &skey);
667     if (skey.ext && skey.ext->gloflags.divert_to_card)
668     return 2;
669     return skey.ctx? 1 : 0;
670     }
671    
672    
673     static int
674     do_addkey (listview_ctrl_t lv, gpgme_key_t key, int uididx, int keyidx, int list)
675     {
676     LV_ITEM lvi;
677     gpgme_user_id_t u;
678     gpgme_subkey_t k;
679     char fmt[128], *p;
680     const char *attr;
681     u32 key_attr;
682     int idx = 0;
683    
684     /* we check the pubkey algorithm here to make sure that no ElGamal
685     sign+encrypt key is used in _any_ mode */
686     if (list != 1 && key->subkeys->pubkey_algo == GPGME_PK_ELG) {
687     log_debug ("ElGamal (E+S) key found: %s (%s)\n",
688     key->uids->name, key->subkeys->keyid);
689     return 0;
690     }
691    
692    
693     if (listview_add_item2 (lv, " ", (void *)key))
694     return WPTERR_GENERAL;
695    
696     attr = key->uids->uid;
697     memset (&lvi, 0, sizeof lvi);
698     lvi.mask = LVIF_TEXT | LVIF_PARAM;
699     lvi.pszText = (char *)attr;
700     lvi.lParam = (LPARAM )key;
701     if (ListView_SetItem( lv->ctrl, &lvi ) == FALSE)
702     return WPTERR_GENERAL;
703    
704     if (uididx == -1) { /* request the primary user-id of the key. */
705     attr = key->uids->uid;
706     uididx = 0;
707     }
708     else {
709     u = get_nth_userid (key, uididx);
710     if (!u || u->revoked || uididx < 0)
711     uididx = 0; /* fixme: this happen sometimes but it's illegal! (<0) */
712     u = get_nth_userid (key, uididx);
713     /*attr = key->uids->uid; XXX*/
714     attr = u->uid;
715     }
716     if (attr == NULL || strlen (attr) < 5) { /* normal userids are >= 5 chars */
717     attr = _("Invalid User ID");
718     listview_add_sub_item (lv, 0, idx++, attr);
719     }
720     else {
721     char *uid = utf8_to_wincp (attr, strlen (attr));
722     if (uid) {
723     listview_add_sub_item (lv, 0, idx++, uid);
724     free (uid);
725     }
726     }
727     k = get_nth_key (key, keyidx);
728     if (k && k->keyid) {
729     _snprintf (fmt, sizeof fmt -1, "0x%s", k->keyid + 8);
730     listview_add_sub_item( lv, 0, idx++, fmt );
731     }
732     if (list > 0) {
733     key_attr = find_secret_key (key);
734     if (!key_attr)
735     attr = "pub";
736     else
737     attr = key_attr == 1? "pub/sec" : "pub/crd";
738     listview_add_sub_item (lv, 0, idx++, attr);
739     }
740     if (lv->cols >= 2) {
741     attr = get_key_size (key, list == -1? keyidx+1 : 0);
742     if (attr)
743     listview_add_sub_item (lv, 0, idx++, attr);
744     }
745     if (lv->cols >= 3) {
746     attr = get_key_algo (key, list == -1? keyidx+1 : 0);
747     if (attr)
748     listview_add_sub_item( lv, 0, idx++, attr);
749     }
750     if( lv->cols >= 4 ) {
751     p = get_key_status( key, uididx, list > 0? 1 : 0 );
752     if (!p)
753     return WPTERR_GENERAL;
754     listview_add_sub_item (lv, 0, idx++, p);
755     free_if_alloc (p);
756     }
757     if (lv->cols >= 5) {
758     attr = get_key_trust (key, uididx, list > 0? 1 : 0);
759     listview_add_sub_item (lv, 0, idx++, attr);
760     }
761     if( lv->cols >= 6 ) {
762     k = get_nth_key (key, keyidx);
763     key_attr = k->timestamp;
764     if( key_attr ) {
765     attr = get_key_created (key_attr);
766     listview_add_sub_item( lv, 0, idx++, attr );
767     }
768     }
769    
770     return 0;
771     }
772    
773    
774     void
775     keylist_upd_key (listview_ctrl_t lv, int pos, gpgme_key_t key)
776     {
777     const char *s;
778     char tmp[32];
779    
780     listview_set_item2 (lv, pos, (void *)key);
781     /* the only mode we support is KYLIST_LIST in the Key Manager */
782    
783     s = key->uids->uid;
784     if (s)
785     listview_add_sub_item (lv, pos, 0, s);
786    
787     s = key->subkeys->keyid;
788     if (s) {
789     sprintf (tmp, "0x%s", s+8);
790     listview_add_sub_item (lv, pos, 1, tmp);
791     }
792    
793     s = find_secret_key (key)? "pub/sec" : "pub";
794     listview_add_sub_item (lv, pos, 2, s);
795    
796     s = get_key_size (key, 0);
797     if (s)
798     listview_add_sub_item (lv, pos, 3, s);
799    
800     s = get_key_algo (key, 0);
801     if (s)
802     listview_add_sub_item (lv, pos, 4, s);
803    
804     s = get_key_status (key, 0, 1);
805     if (s)
806     listview_add_sub_item (lv, pos, 5, s);
807    
808     s = get_key_trust (key, 0, 1);
809     if (s)
810     listview_add_sub_item (lv, pos, 6, s);
811    
812     long t = key->subkeys->timestamp;
813     s = get_key_created (t);
814     if (s)
815     listview_add_sub_item (lv, pos, 7, s);
816     }
817    
818    
819     int
820     keylist_add_key (listview_ctrl_t lv, int mode, gpgme_key_t key)
821     {
822     int uids, rc = 0, i, n = 0;
823     gpgme_subkey_t k;
824    
825 twoaday 41 /* if the entire key is disabled, just return. */
826     if (key->disabled)
827     return 0;
828    
829 werner 36 for (k=key->subkeys, i = 0; i < count_subkeys (key); i++, k=k->next) {
830     if (k->invalid) {
831     log_debug ("keylist_add_key: invalid key \"%s\"\n", key->uids->name);
832     continue; /* Don't use invalid keys */
833     }
834    
835     if (mode & KEYLIST_ALL) {
836     uids = count_userids (key);
837     rc = do_addkey (lv, key, uids, i, 0);
838     if( rc )
839     return rc;
840     }
841     else if (mode & KEYLIST_LIST)
842     return do_addkey (lv, key, -1, i, 1);
843     else if (mode & KEYLIST_ENCRYPT) {
844     if (k->can_encrypt && key_is_useable (k)) {
845     if (mode & KEYLIST_FLAG_FILE) {
846     rc = do_addkey (lv, key, -1, i, -1);
847     if (rc)
848     return rc;
849     }
850     else {
851     for( uids = 0; uids < count_userids (key); uids++ ) {
852     rc = do_addkey( lv, key, uids, i, -1 );
853     if( rc )
854     return rc;
855     }
856     }
857     }
858     }
859     else if (mode & KEYLIST_ENCRYPT_MIN) {
860     if( k->can_encrypt && key_is_useable (k))
861     {
862     rc = do_addkey (lv, key, -1, i, -1);
863     return rc;
864     }
865     }
866     else if (mode & KEYLIST_SIGN) {
867 twoaday 41 if (k->can_sign
868     && find_secret_key (key)
869     && key_is_useable (k)) {
870 werner 36 rc = do_addkey (lv, key, -1, i, -1);
871 twoaday 41 if (rc)
872 werner 36 return rc;
873     }
874     }
875     }
876    
877     return rc;
878     } /* keylist_add_key */
879    
880    
881     int
882     keylist_sort (listview_ctrl_t lv, int sortby)
883     {
884     return listview_sort_items (lv, sortby, keylist_cmp_cb);
885     }
886    
887    
888     /* Check that the validity @validity is at least >= marginal. */
889     static int
890     key_check_validity (const char *validity)
891     {
892     if (strstr (validity, "Unknown") ||
893     strstr (validity, "Undefined") ||
894     strstr (validity, "Never") ||
895     strstr (validity, "None"))
896     return 0;
897     return 1;
898     }
899    
900    
901     /* Extract all selected recipients from the list @lv and return them
902     as a vector. @r_force_trust is >= 1 if one of the recipients is not
903     fully trusted. @r_count returns the number of selected keys.
904     Return value: the key list on success, NULL otherwise. */
905     gpgme_key_t*
906     keylist_get_recipients (listview_ctrl_t lv, int *r_force_trust, int *r_count)
907     {
908     int count = 0, force_trust = 0;
909     int n, j, ka_pos = 0, rc = 0;
910     int k_pos=0;
911     char keyid[32], valid[32], id[100];
912     key_array_s *ka = NULL;
913     gpgme_key_t *keybuf;
914    
915     n = listview_count_items( lv, 0 );
916    
917     ka = key_array_new( n );
918     if (!ka)
919     BUG (NULL);
920    
921     keybuf = (gpgme_key_t*)calloc (n, sizeof (gpgme_key_t));
922     if (!keybuf)
923     BUG (NULL);
924    
925     for( j = 0; j < n; j++ ) {
926     if( listview_get_item_state (lv, j) || n == 1) {
927     listview_get_item_text (lv, j, 0, id, sizeof id-1);
928     listview_get_item_text (lv, j, 1, keyid, sizeof keyid - 1);
929     listview_get_item_text (lv, j, 4, valid, sizeof valid -1);
930     if( !key_check_validity (valid)
931     && !key_array_search( ka, ka_pos, keyid )) {
932     char *warn = new char[512+strlen (id) + 1];
933     if (!warn)
934     BUG (0);
935     sprintf (warn,
936     _("It is NOT certain that the key belongs to the person\n"
937     "named in the user ID. If you *really* know what you are\n"
938     "doing, you may answer the next question with yes\n"
939     "\n"
940     "Use \"%s\" anyway?"), id);
941     if (reg_prefs.always_trust)
942     rc = IDYES;
943     else
944     rc = msg_box (NULL, warn, _("Recipients"), MB_ERR_ASK);
945     if (rc == IDYES) {
946     gpgme_key_t k;
947     get_pubkey (keyid, &k);
948     keybuf[k_pos++] = k;
949     force_trust++;
950     ka[ka_pos].checked = 1;
951     strcpy (ka[ka_pos++].keyid, keyid);
952     count++;
953     }
954     free_if_alloc (warn);
955     }
956     else {
957     gpgme_key_t k;
958     listview_get_item_text( lv, j, 1, keyid, sizeof keyid -1 );
959     get_pubkey (keyid, &k);
960     keybuf[k_pos++] = k;
961     count++;
962     }
963     }
964     }
965     key_array_release (ka);
966     if (r_force_trust)
967     *r_force_trust = force_trust;
968     if (r_count)
969     *r_count = count;
970     return keybuf;
971     }
972    
973    
974     static int
975     keylist_get_keyflags (const char *buf, size_t buflen)
976     {
977     int c = 0, flags = 0;
978    
979     if( *buf != '[' )
980     return KEYFLAG_NONE;
981     while (buf && c != ']')
982     {
983     c = *buf++;
984     if (c == 'R')
985     flags |= KEYFLAG_REVOKED;
986     if (c == 'E')
987     flags |= KEYFLAG_EXPIRED;
988     if (c == 'D')
989     flags |= KEYFLAG_DISABLED;
990     }
991    
992     return flags;
993     } /* keylist_get_keyflags */
994    
995    
996     gpgme_key_t*
997     keylist_enum_recipients (listview_ctrl_t lv, int listype, int *r_count)
998     {
999     gpgme_key_t* rset;
1000     gpgme_key_t k;
1001     int i, n, id, k_pos=0;
1002     char keyid[32], t[128], t2[128];
1003    
1004     n = listview_count_items (lv, 0);
1005     if (!n)
1006     return 0;
1007     rset = (gpgme_key_t*)calloc (n, sizeof (gpgme_key_t));
1008     if (!rset)
1009     BUG (NULL);
1010     for( i = 0; i < n; i++ ) {
1011     if( !listview_get_item_state( lv, i ) )
1012     continue;
1013     listview_get_item_text( lv, i, 1, keyid, sizeof keyid - 1 );
1014     switch( listype ) {
1015     case KEYLIST_LIST:
1016     listview_get_item_text( lv, i, 5, t, sizeof t - 1 );
1017     if( keylist_get_keyflags( t, strlen( t ) ) & KEYFLAG_REVOKED ) {
1018     _snprintf( t2, sizeof t2 -1,
1019     _("KeyID %s.\nDo you really want to export a revoked key?"), keyid );
1020     id = msg_box( lv->ctrl, t2, _("Recipients"), MB_INFO|MB_YESNO );
1021     if( id == IDNO )
1022     continue;
1023     }
1024     break;
1025     }
1026     get_pubkey (keyid, &k);
1027     rset[k_pos++] = k;
1028     }
1029     if (r_count)
1030     *r_count = k_pos;
1031     return rset;
1032     } /* keylist_enum_recipients */
1033    
1034    
1035     void
1036     seclist_destroy (keylist_t * list)
1037     {
1038     keylist_t l2;
1039     while (*list) {
1040     l2 = (*list)->next;
1041     safe_free (*list);
1042     *list = l2;
1043     }
1044     list = NULL;
1045     } /* seclist_destroy */
1046    
1047    
1048     void
1049     seclist_init (HWND dlg, int ctlid, int flags, keylist_t * ret_list)
1050     {
1051     gpg_keycache_t kc = NULL;
1052     gpgme_key_t key = NULL;
1053     HWND kb;
1054     keylist_t list=NULL, l, l2;
1055     long pos = 0;
1056    
1057     SendDlgItemMessage (dlg, ctlid, CB_RESETCONTENT, 0, 0);
1058     kb = GetDlgItem (dlg, ctlid);
1059     kc = keycache_get_ctx (0);
1060     if (!kc)
1061     BUG (0);
1062     gpg_keycache_rewind (kc);
1063    
1064     while (!gpg_keycache_next_key (kc, 1, &key)) {
1065 twoaday 41 char *inf = NULL, *uid = NULL;
1066     const char *id;
1067     const char *keyid;
1068 werner 36 int algo;
1069     size_t size = 0;
1070    
1071     if (flags & KEYLIST_FLAG_SHORT)
1072     id = key->uids->name;
1073     else
1074     id = key->uids->uid;
1075     keyid = key->subkeys->keyid;
1076     algo = key->subkeys->pubkey_algo;
1077     if (!id || !keyid)
1078     continue;
1079 twoaday 41 if (key->disabled || !key_is_useable (key->subkeys))
1080     continue;
1081 werner 36
1082     uid = utf8_to_wincp (id, strlen (id));
1083     size = strlen( uid ) + strlen( keyid ) + 32;
1084     inf = new char[size+1];
1085     if( !inf )
1086     BUG( NULL );
1087     _snprintf (inf, size, "%s (%s/0x%s)", uid,
1088     get_key_pubalgo (key->subkeys->pubkey_algo), keyid + 8);
1089     combox_add_string (kb, inf);
1090     free_if_alloc (inf);
1091     free (uid);
1092     l = (struct keylist_s *)calloc (1, sizeof * l);
1093     if (!l)
1094     BUG (0);
1095     l->key = key;
1096     if (!list)
1097     list = l;
1098     else {
1099     for( l2 = list; l2->next; l2 = l2->next )
1100     ;
1101     l2->next = l;
1102     }
1103     }
1104     for( pos = 0, l2=list; pos < SendMessage( kb, CB_GETCOUNT, 0, 0 ); pos++, l2=l2->next )
1105     SendMessage( kb, CB_SETITEMDATA, pos, (LPARAM)(DWORD)l2->key );
1106     SendMessage( kb, CB_SETCURSEL, 0, 0 );
1107     *ret_list = list;
1108     }
1109    
1110    
1111     /* Select a secret key from the combo box with the ID @ctlid.
1112     Return the code on success in @ret_key. */
1113     int
1114     seclist_select_key (HWND dlg, int ctlid, gpgme_key_t *ret_key)
1115     {
1116     int pos;
1117     DWORD k = 0;
1118    
1119     pos = SendDlgItemMessage (dlg, ctlid, CB_GETCURSEL, 0, 0);
1120     if (pos == CB_ERR) {
1121     msg_box (dlg, _("No key was selected."), _("Secret Key List"), MB_ERR);
1122     *ret_key = NULL;
1123     }
1124     else {
1125     k = SendDlgItemMessage (dlg, ctlid, CB_GETITEMDATA, pos, 0);
1126     *ret_key = (gpgme_key_t)k;
1127     }
1128     return k? 0 : -1;
1129     }

Properties

Name Value
svn:eol-style native

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26