/[winpt]/trunk/Src/wptKeylist.cpp
ViewVC logotype

Contents of /trunk/Src/wptKeylist.cpp

Parent Directory Parent Directory | Revision Log Revision Log


Revision 219 - (show annotations)
Sat May 27 08:56:00 2006 UTC (18 years, 9 months ago) by twoaday
File size: 27283 byte(s)
2006-05-25  Timo Schulz  <ts@g10code.de>
                                                                                
        * wptGPGUtil.cpp (gpg_rebuild_cache): Return error code.
        * wptGPGME.cpp (winpt_get_seckey): Fix off-by-one bug.
        * wptVerifyList.cpp (verlist_build): New argument type.
        Change all callers.
        (verlist_set_info_control): New.
        (verlist_set_additional_info): New.
        * wptFileVerifyDlg.cpp (file_verify_dlg_proc): Adjust code.
        * wptClipVerifyDlg.cpp (clip_verify_dlg_proc): Likewise.
        * wptFileCBS.cpp (read_cb, write_cb): Add logging.
                                                                                


1 /* wptKeylist.cpp - Keylist element
2 * Copyright (C) 2001-2006 Timo Schulz
3 * Copyright (C) 2004 Andreas Jobs
4 *
5 * This file is part of WinPT.
6 *
7 * WinPT is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU General Public License
9 * as published by the Free Software Foundation; either version 2
10 * of the License, or (at your option) any later version.
11 *
12 * WinPT is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License
18 * along with WinPT; if not, write to the Free Software Foundation,
19 * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21
22 #ifdef HAVE_CONFIG_H
23 #include <config.h>
24 #endif
25
26 #include <windows.h>
27 #include <commctrl.h>
28 #include <time.h>
29
30 #include "wptCommonCtl.h"
31 #include "wptTypes.h"
32 #include "wptGPG.h"
33 #include "wptKeylist.h"
34 #include "wptKeyManager.h"
35 #include "wptW32API.h"
36 #include "wptNLS.h"
37 #include "wptErrors.h"
38 #include "wptUTF8.h"
39 #include "wptRegistry.h"
40 #include "wptContext.h"
41 #include "wptVersion.h"
42 #include "resource.h"
43
44 #define key_is_useable(key) (!(key)->revoked && !(key)->expired && !(key)->disabled)
45
46 struct key_array_s {
47 char keyid[32];
48 int checked;
49 };
50
51 static int find_secret_key (gpgme_key_t key);
52
53
54 static key_array_s*
55 key_array_new (int items)
56 {
57 key_array_s *ka;
58 int j;
59
60 if (items == 0)
61 return NULL;
62 ka = new key_array_s[items + 1];
63 if (!ka)
64 BUG (NULL);
65 for (j = 0; j < items; j++)
66 ka[j].checked = 0;
67 return ka;
68 }
69
70
71 static void
72 key_array_release (key_array_s *ka)
73 {
74 free_if_alloc (ka);
75 }
76
77
78 /* Check if the keyid @keyid is in the key array @ka.
79 Return value: 1 if it exists, 0 otherwise. */
80 static int
81 key_array_search (key_array_s *ka, int items, const char *keyid)
82 {
83 int j;
84
85 for (j = 0; j < items; j++) {
86 if (!strcmp (keyid, ka[j].keyid ))
87 return 1;
88 }
89 return 0;
90 }
91
92
93 gpgme_user_id_t
94 get_nth_userid (gpgme_key_t key, int idx)
95 {
96 gpgme_user_id_t t;
97
98 if (!key->uids)
99 return NULL;
100 t = key->uids;
101 while (idx-- && t->next)
102 t = t->next;
103 return t;
104 }
105
106
107 int
108 count_userids (gpgme_key_t key)
109 {
110 gpgme_user_id_t u;
111 int n = 1;
112
113 u = key->uids;
114 if (!u)
115 return 0;
116 while (u->next) {
117 u = u->next;
118 n++;
119 }
120 return n;
121 }
122
123
124 gpgme_subkey_t
125 get_nth_key (gpgme_key_t key, int idx)
126 {
127 gpgme_subkey_t t;
128
129 if (!key->subkeys)
130 return NULL;
131 t = key->subkeys;
132 while (idx-- && t->next)
133 t = t->next;
134 return t;
135 }
136
137
138 int
139 count_subkeys (gpgme_key_t key)
140 {
141 gpgme_subkey_t k;
142 int n = 1;
143
144 k = key->subkeys;
145 if (!k)
146 return 0;
147 while (k->next) {
148 k = k->next;
149 n++;
150 }
151 return n;
152 }
153
154
155 /* Return the self signature of the key @keyid.
156 If first is set, the first self sig will be returned. */
157 gpgme_key_sig_t
158 get_selfsig (gpgme_key_sig_t sigs, const char *keyid, int first)
159 {
160 gpgme_key_sig_t s, self_sig=NULL;
161 long timestamp=0;
162 int off = 0;
163
164 if (strlen (keyid) == 8)
165 off = 8;
166
167 for (s = sigs; s; s = s->next) {
168 if (!strcmp (s->keyid+off, keyid) && s->timestamp > timestamp) {
169 self_sig = s;
170 timestamp = s->timestamp;
171 if (first)
172 break;
173 }
174 }
175 return self_sig;
176 }
177
178
179 const char*
180 get_key_algo (gpgme_key_t key, int keyidx)
181 {
182 static char algo_id[128];
183 gpgme_subkey_t k;
184 char alg[32];
185 const char *subalg;
186 int n=0;
187
188 if (keyidx > 0) {
189 k = get_nth_key (key, keyidx-1);
190 subalg = get_key_pubalgo (k->pubkey_algo);
191 _snprintf (algo_id, DIM (algo_id)-1, "%s", subalg);
192 return algo_id;
193 }
194 strcpy (alg, get_key_pubalgo (key->subkeys->pubkey_algo));
195 n = count_subkeys (key);
196 if (n > 1) {
197 do {
198 k = get_nth_key (key, --n);
199 if (k->revoked || k->expired)
200 continue;
201 else
202 break;
203 } while (n > 0);
204 subalg = get_key_pubalgo (k->pubkey_algo);
205 if (k == key->subkeys)
206 _snprintf (algo_id, DIM (algo_id)-1, "%s", subalg);
207 else
208 _snprintf (algo_id, DIM (algo_id)-1, "%s/%s", alg, subalg);
209 return algo_id;
210 }
211 return get_key_pubalgo (key->subkeys->pubkey_algo);
212 }
213
214
215 const char*
216 get_key_created (long timestamp)
217 {
218 static char timebuf[128];
219 struct tm *warp;
220 const char *dat;
221
222 if (timestamp < 1)
223 return "????" "-??" "-??";
224 dat = get_locale_date (timestamp, timebuf, sizeof (timebuf)-1);
225 if (dat)
226 return dat;
227 warp = localtime (&timestamp);
228 _snprintf (timebuf, sizeof timebuf - 1, "%04d-%02d-%02d",
229 warp->tm_year + 1900, warp->tm_mon + 1, warp->tm_mday);
230 return timebuf;
231 }
232
233
234 /* Return a string presentation of the time @timestamp. */
235 const char*
236 get_key_expire_date (long timestamp)
237 {
238 static char timebuf[64];
239 struct tm *warp;
240 const char *dat;
241
242 if (timestamp == 0)
243 return _("Never");
244 dat = get_locale_date (timestamp, timebuf, sizeof (timebuf)-1);
245 if (dat)
246 return dat;
247 warp = localtime (&timestamp);
248 _snprintf (timebuf, sizeof timebuf -1, "%04d-%02d-%02d",
249 warp->tm_year + 1900, warp->tm_mon + 1, warp->tm_mday);
250 return timebuf;
251 }
252
253
254 const char*
255 get_key_type (gpgme_key_t key)
256 {
257 int type = find_secret_key (key);
258
259 if (type == 1)
260 return _("Key Pair");
261 else if (type == 2)
262 return _("Key Pair (Card)");
263 return _("Public Key");
264 }
265
266
267 const char*
268 get_key_size (gpgme_key_t key, int keyidx)
269 {
270 static char size_id[64];
271 gpgme_subkey_t k;
272 int n, size_main, size_sub;
273
274 if (keyidx > 0) {
275 k = get_nth_key (key, keyidx-1);
276 size_main = k->length;
277 _snprintf (size_id, DIM (size_id)-1, "%d", size_main);
278 return size_id;
279 }
280 size_main = key->subkeys->length;
281 n = count_subkeys (key);
282 if (n > 1) {
283 k = get_nth_key (key, n-1);
284 size_sub = k->length;
285 _snprintf (size_id, sizeof (size_id) - 1, "%d/%d",
286 size_main, size_sub);
287 return size_id;
288 }
289 _snprintf( size_id, sizeof (size_id) - 1, "%d", size_main );
290 return size_id;
291 }
292
293
294 const char*
295 get_key_pubalgo2 (gpgme_pubkey_algo_t alg)
296 {
297 switch (alg) {
298 case GPGME_PK_DSA: return "D";
299 case GPGME_PK_RSA: return "R";
300 case GPGME_PK_ELG: return "G";
301 default: return "?";
302 }
303 return "?";
304 }
305
306
307 const char*
308 get_key_pubalgo (gpgme_pubkey_algo_t alg)
309 {
310 switch (alg) {
311 case GPGME_PK_DSA: return "DSA";
312 case GPGME_PK_ELG:
313 case GPGME_PK_ELG_E: return "ELG";
314 case 0: /* XXX: gpgme returned pubkey algo 0 for a RSA made sig. */
315 case GPGME_PK_RSA: return "RSA";
316 default: return "???";
317 }
318 return "???";
319 }
320
321 const char*
322 get_key_fpr (gpgme_key_t key)
323 {
324 static char fpr_md[64];
325 const char *fpr;
326 char t[16], tmp[40];
327 size_t i=0;
328
329 memset (fpr_md, 0, sizeof (fpr_md));
330 fpr = key->subkeys->fpr;
331 if (!fpr || !*fpr) {
332 memset (tmp, '0', 40);
333 fpr = tmp;
334 }
335 if (strlen (fpr) == 32) {
336 strcat (fpr_md, " ");
337 for (i=0; i < strlen (fpr)/2; i++) {
338 sprintf (t, "%c%c ", fpr[2*i], fpr[2*i+1]);
339 strcat (fpr_md, t);
340 }
341 }
342 else {
343 strcat (fpr_md, " ");
344 for (i = 0; i < strlen (fpr) / 4; i++) {
345 sprintf (t, "%c%c%c%c ", fpr[4*i], fpr[4*i+1], fpr[4*i+2], fpr[4*i+3]);
346 strcat (fpr_md, t);
347 }
348 }
349 return fpr_md;
350 }
351
352
353 /* Extract the key ID from the fingerprint.
354 A long ID will be converted into a short ID. */
355 const char*
356 get_keyid_from_fpr (const char *fpr)
357 {
358 if (!fpr)
359 return "????????";
360 if (strlen (fpr) == 40)
361 fpr += 32;
362 else if (strlen (fpr) == 32)
363 fpr += 24;
364 else if (strlen (fpr) == 16)
365 fpr += 8;
366 else
367 return "????????";
368 return fpr;
369 }
370
371
372 const char*
373 get_key_trust2 (gpgme_key_t key, int val, int uididx, int listmode)
374 {
375 if (key)
376 val = key->owner_trust; /* uididx?? */
377 switch (val) {
378 case GPGME_VALIDITY_UNKNOWN:
379 case GPGME_VALIDITY_UNDEFINED:
380 return _("None");
381 case GPGME_VALIDITY_NEVER:
382 return _("Never");
383 case GPGME_VALIDITY_MARGINAL:
384 return _("Marginal");
385 case GPGME_VALIDITY_FULL:
386 return _("Full");
387 case GPGME_VALIDITY_ULTIMATE:
388 return _("Ultimate");
389 }
390 return "";
391 }
392
393
394 const char*
395 get_key_trust (gpgme_key_t key, int uididx, int listmode)
396 {
397 return get_key_trust2 (key, 0, uididx, listmode);
398 }
399
400
401 const char*
402 get_key_trust_str (int val)
403 {
404 return get_key_trust2 (NULL, val, 0, 0);
405 }
406
407
408 /* Return the status of the key @key. */
409 char*
410 get_key_status (gpgme_key_t key, int uididx, int listmode)
411 {
412 gpgme_user_id_t u;
413 const char *attr;
414 u32 key_attr =0;
415
416 if (uididx < 0 || count_userids (key) > uididx)
417 uididx = 0;
418 if (listmode) {
419 const char *s;
420 if (key->revoked)
421 s = _("Revoked");
422 else if (key->expired)
423 s = _("Expired");
424 else if (key->disabled)
425 s = _("Disabled");
426 else
427 s = "";
428 /* if the key has a special status, we don't continue to figure out
429 the user-id validities. */
430 if (*s)
431 return m_strdup (s);
432 }
433 u = get_nth_userid (key, uididx);
434 key_attr = u->validity;
435 attr = get_key_trust2 (NULL, key_attr, 0, 0);
436 return m_strdup (attr);
437 }
438
439
440 /* Return human readable description of the key @key. */
441 char*
442 get_key_desc (gpgme_key_t key)
443 {
444 gpgme_key_t sk;
445 const char *state, *alg, *type;
446 char *p;
447
448 /* XXX: problems with the German translation. */
449 state = "";
450 if (key->disabled)
451 state = _("Disabled");
452 if (key->expired)
453 state = _("Expired");
454 if (key->revoked)
455 state = _("Revoked");
456 alg = "OpenPGP";
457 if (strlen (key->subkeys->fpr) == 32)
458 alg = "RSA Legacy";
459 type = _("public key");
460 if (!get_seckey (key->subkeys->keyid+8, &sk))
461 type = _("key pair");
462 p = new char[strlen (state) + strlen (alg) + strlen (type) + 4 + 1];
463 if (!p)
464 BUG (0);
465 sprintf (p, "%s %s %s", state, alg, type);
466 return p;
467 }
468
469
470 /* Integer comparsion of @a and @b.
471 Return values: same as in strcmp. */
472 static inline int
473 int_cmp (int a, int b)
474 {
475 if (a == b) return 0;
476 else if (a > b) return 1;
477 else return -1;
478 return 0;
479 }
480
481
482 /* To allow to sort the keys, we need to take care of
483 the expired/revoke status also. */
484 static int
485 get_ext_validity (gpgme_key_t k)
486 {
487 if (k->revoked)
488 return GPGME_VALIDITY_ULTIMATE+1;
489 else if (k->expired)
490 return GPGME_VALIDITY_ULTIMATE+2;
491 else if (k->disabled)
492 return GPGME_VALIDITY_ULTIMATE+3;
493 return k->uids->validity;
494 }
495
496
497 /* List view sorting callback. */
498 static int CALLBACK
499 keylist_cmp_cb (LPARAM first, LPARAM second, LPARAM sortby)
500 {
501 struct keycache_s *aa, *bb;
502 gpgme_key_t a, b;
503 int cmpresult = 0;
504
505 aa = (struct keycache_s *)first;
506 bb = (struct keycache_s *)second;
507 if (!aa || !bb)
508 BUG (NULL);
509 a = aa->key;
510 b = bb->key;
511
512 switch (sortby & ~KEYLIST_SORT_DESC) {
513 case KEY_SORT_USERID:
514 cmpresult = strcmpi (a->uids->uid, b->uids->uid);
515 break;
516
517 case KEY_SORT_KEYID:
518 cmpresult = strcmpi (a->subkeys->keyid+8,
519 b->subkeys->keyid+8);
520 break;
521
522 case KEY_SORT_VALIDITY:
523 cmpresult = int_cmp (get_ext_validity (a),
524 get_ext_validity (b));
525 break;
526
527 case KEY_SORT_OTRUST:
528 cmpresult = int_cmp (a->owner_trust, b->owner_trust);
529 break;
530
531 case KEY_SORT_IS_SECRET:
532 get_seckey (a->subkeys->keyid, &a);
533 get_seckey (b->subkeys->keyid, &b);
534 cmpresult = int_cmp (a? a->secret : 0, b? b->secret : 0);
535 break;
536
537 case KEY_SORT_LEN:
538 cmpresult = int_cmp (a->subkeys->length,
539 b->subkeys->length);
540 break;
541
542 case KEY_SORT_CREATED:
543 cmpresult = int_cmp (a->subkeys->timestamp,
544 b->subkeys->timestamp);
545 break;
546
547 case KEY_SORT_ALGO:
548 cmpresult = int_cmp (a->subkeys->pubkey_algo,
549 b->subkeys->pubkey_algo);
550 break;
551
552 default:
553 cmpresult = strcmpi (a->uids->uid, b->uids->uid);
554 break;
555 }
556 if (sortby & KEYLIST_SORT_DESC)
557 return (~cmpresult + 1);
558 else
559 return cmpresult;
560 }
561
562
563 int
564 keylist_add_groups (listview_ctrl_t lv)
565 {
566 return 0;
567 }
568
569
570 /* Create a listview for listing keys. Use the mode given in @mode
571 and the control is given in @ctrl. */
572 static int
573 keylist_build (listview_ctrl_t *r_lv, HWND ctrl, int mode)
574 {
575 struct listview_column_s klist_enc[] = {
576 {0, 242, (char *)_("User ID")},
577 {1, 80, (char *)_("Key ID")},
578 {3, 46, (char *)_("Size")},
579 {4, 50, (char *)_("Cipher")},
580 {5, 70, (char *)_("Validity")},
581 {0, 0, NULL}
582 };
583 struct listview_column_s klist[] = {
584 {0, 240, (char *)_("User ID")},
585 {1, 78, (char *)_("Key ID")},
586 {2, 52, (char *)_("Type")},
587 {3, 66, (char *)_("Size")},
588 {4, 60, (char *)_("Cipher")},
589 {5, 66, (char *)_("Validity")},
590 {6, 58, (char *)_("Trust")},
591 {7, 72, (char *)_("Creation")},
592 {0, 0, NULL}
593 };
594 HICON ico[2];
595 listview_ctrl_t lv;
596 listview_column_t col;
597 int j, n = 0, ext_chk = 0;
598
599 listview_new (&lv, ctrl);
600 if (mode & KEYLIST_ENCRYPT_MIN) {
601 col = klist_enc;
602 n = (DIM (klist_enc) -1);
603 ext_chk = 1;
604 }
605 else if ((mode & KEYLIST_SIGN)) {
606 col = klist_enc;
607 n = (DIM (klist_enc) - 1) - 1;
608 ext_chk = 1;
609 }
610 else {
611 col = klist;
612 n = (DIM (klist) - 1);
613 }
614
615 for (j = 0; j < n; j++)
616 listview_add_column (lv, &col[j]);
617 listview_set_ext_style (lv);
618 if (ext_chk)
619 listview_set_chkbox_style (lv);
620 ico[0] = LoadIcon (glob_hinst, (LPCTSTR)IDI_PUBKEY);
621 ico[1] = LoadIcon (glob_hinst, (LPCTSTR)IDI_KEYPAIR);
622 listview_set_image_list (lv, 22, 14, ico, 2);
623 listview_del_all_items (lv);
624
625 *r_lv = lv;
626 return 0;
627 }
628
629
630 static void
631 keylist_load_keycache (listview_ctrl_t lv, int mode,
632 gpg_keycache_t pubkc, gpg_keycache_t seckc)
633 {
634 gpgme_error_t err = gpg_error (GPG_ERR_NO_ERROR);
635 gpgme_key_t key, skey;
636 struct keycache_s *c;
637 const char *keyid;
638
639 if (pubkc && seckc) {
640 gpg_keycache_rewind (pubkc);
641 while (!gpg_keycache_next_key2 (pubkc, 0, &c, &key)) {
642 keyid = key->subkeys->keyid;
643 if (keyid && !gpg_keycache_find_key (seckc, keyid, 0, &skey))
644 keylist_add_key (lv, mode, c, key);
645 }
646 }
647 else if (pubkc) {
648 gpg_keycache_rewind (pubkc);
649 while (!err) {
650 err = gpg_keycache_next_key2 (pubkc, 0, &c, &key);
651 if (!err)
652 keylist_add_key (lv, mode, c, key);
653 }
654 }
655 }
656
657
658 /* Load the list view @ctrl with the keys from the cache.
659 Return value: list view context on success. */
660 listview_ctrl_t
661 keylist_load (HWND ctrl, gpg_keycache_t pubkc, gpg_keycache_t seckc,
662 int mode, int sortby)
663 {
664 listview_ctrl_t lv;
665 int rc = 0;
666
667 rc = keylist_build (&lv, ctrl, mode);
668 if (rc)
669 return NULL;
670 keylist_load_keycache (lv, mode, pubkc, seckc);
671 keylist_sort (lv, sortby);
672 if (mode & KEYLIST_ENCRYPT_MIN)
673 keylist_add_groups (lv);
674 return lv;
675 }
676
677
678 /* Reload the given key list control @lv. */
679 int
680 keylist_reload (listview_ctrl_t lv, gpg_keycache_t pubkc, int mode, int sortby)
681 {
682 listview_del_all_items (lv);
683 keylist_load_keycache (lv, mode, pubkc, NULL);
684 keylist_sort (lv, sortby);
685 return 0;
686 }
687
688
689 void
690 keylist_delete (listview_ctrl_t lv)
691 {
692 if (lv) {
693 listview_release (lv);
694 }
695 }
696
697
698 /* Return if there is a secret for @key.
699 0 means success. */
700 static int
701 find_secret_key (gpgme_key_t key)
702 {
703 const char *keyid;
704 winpt_key_s skey;
705
706 memset (&skey, 0, sizeof (skey));
707 keyid = key->subkeys->keyid;
708 if (!keyid)
709 return 0;
710 winpt_get_seckey (keyid, &skey);
711 if (skey.ext && skey.ext->gloflags.divert_to_card)
712 return 2;
713 return skey.ctx? 1 : 0;
714 }
715
716
717 static int
718 do_addkey (listview_ctrl_t lv, struct keycache_s *ctx, gpgme_key_t key,
719 int uididx, int keyidx, int list)
720 {
721 LV_ITEM lvi;
722 gpgme_user_id_t u;
723 gpgme_subkey_t k;
724 char fmt[128], *p;
725 const char *attr;
726 u32 key_attr;
727 int idx = 0;
728
729 /* we check the pubkey algorithm here to make sure that no ElGamal
730 sign+encrypt key is used in _any_ mode */
731 if (list != 1 && key->subkeys->pubkey_algo == GPGME_PK_ELG) {
732 log_debug ("ElGamal (E+S) key found: %s (%s)\n",
733 key->uids->name, key->subkeys->keyid);
734 return 0;
735 }
736
737 if (listview_add_item2 (lv, " ", (void *)ctx))
738 return WPTERR_GENERAL;
739
740 attr = ctx->uids->uid;
741 memset (&lvi, 0, sizeof lvi);
742 lvi.mask = LVIF_TEXT | LVIF_PARAM | LVIF_IMAGE;
743 lvi.pszText = (char *)attr;
744 lvi.iImage = find_secret_key (key)? 1 : 0;
745 lvi.lParam = (LPARAM )ctx;
746 if (ListView_SetItem (lv->ctrl, &lvi) == FALSE)
747 return WPTERR_GENERAL;
748
749 if (uididx == -1) { /* request the primary user-id of the key. */
750 attr = ctx->uids->uid;
751 uididx = 0;
752 }
753 else {
754 u = get_nth_userid (key, uididx);
755 if (!u || u->revoked || uididx < 0)
756 uididx = 0;
757 u = get_nth_userid (key, uididx);
758 attr = u->uid;
759 }
760 if (attr == NULL || strlen (attr) < 5) { /* normal userids are > 5 chars */
761 attr = _("Invalid User ID");
762 listview_add_sub_item (lv, 0, idx++, attr);
763 }
764 else
765 listview_add_sub_item (lv, 0, idx++, attr);
766 k = get_nth_key (key, keyidx);
767 if (k && k->keyid) {
768 _snprintf (fmt, sizeof fmt -1, "0x%s", k->keyid + 8);
769 listview_add_sub_item (lv, 0, idx++, fmt);
770 }
771 if (list > 0) {
772 key_attr = find_secret_key (key);
773 if (!key_attr)
774 attr = "pub";
775 else
776 attr = key_attr == 1? "pub/sec" : "pub/crd";
777 listview_add_sub_item (lv, 0, idx++, attr);
778 }
779 if (lv->cols >= 2) {
780 attr = get_key_size (key, list == -1? keyidx+1 : 0);
781 if (attr)
782 listview_add_sub_item (lv, 0, idx++, attr);
783 }
784 if (lv->cols >= 3) {
785 attr = get_key_algo (key, list == -1? keyidx+1 : 0);
786 if (attr)
787 listview_add_sub_item( lv, 0, idx++, attr);
788 }
789 if (lv->cols >= 4) {
790 p = get_key_status( key, uididx, list > 0? 1 : 0 );
791 if (!p)
792 return WPTERR_GENERAL;
793 listview_add_sub_item (lv, 0, idx++, p);
794 free_if_alloc (p);
795 }
796 if (lv->cols >= 5) {
797 attr = get_key_trust (key, uididx, list > 0? 1 : 0);
798 listview_add_sub_item (lv, 0, idx++, attr);
799 }
800 if( lv->cols >= 6 ) {
801 k = get_nth_key (key, keyidx);
802 key_attr = k->timestamp;
803 if( key_attr ) {
804 attr = get_key_created (key_attr);
805 listview_add_sub_item( lv, 0, idx++, attr );
806 }
807 }
808
809 return 0;
810 }
811
812
813 /* Update a single column @col but for each element in the
814 listview @lv. */
815 void
816 keylist_upd_col (listview_ctrl_t lv, int col)
817 {
818 gpgme_key_t key;
819 const char *s;
820 char buf[32], *p;
821 int i;
822
823 for (i=0; i < listview_count_items (lv, 0); i++) {
824 key = km_get_key_ptr (lv, i, NULL);
825 if (!key)
826 continue;
827 switch (col) {
828 case KM_COL_KEYID:
829 _snprintf (buf, sizeof (buf)-1, "0x%s", key->subkeys->keyid+8);
830 listview_add_sub_item (lv, i, col, buf);
831 break;
832
833 case KM_COL_CIPHER:
834 s = get_key_algo (key, 0);
835 listview_add_sub_item (lv, i, col, s);
836 break;
837
838 case KM_COL_TYPE:
839 s = find_secret_key (key)? "pub/sec" : "pub";
840 listview_add_sub_item (lv, i, col, s);
841 break;
842
843 case KM_COL_CREAT:
844 s = get_key_created (key->subkeys->timestamp);
845 listview_add_sub_item (lv, i, col, s);
846 break;
847
848 case KM_COL_DESC:
849 p = get_key_desc (key);
850 listview_add_sub_item (lv, i, col, p);
851 free_if_alloc (p);
852 break;
853 }
854 }
855 }
856
857
858 /* Update the listview item at position @pos with the data from
859 the key @key. */
860 void
861 keylist_upd_key (listview_ctrl_t lv, int pos,
862 struct keycache_s *ctx, gpgme_key_t key)
863 {
864 const char *s;
865 char *p;
866 char tmp[32];
867
868 listview_set_item2 (lv, pos, (void *)ctx);
869 /* the only mode we support is KEYLIST_LIST in the Key Manager */
870
871 s = ctx->uids->uid;
872 if (s)
873 listview_add_sub_item (lv, pos, KM_COL_UID, s);
874
875 s = key->subkeys->keyid;
876 if (s) {
877 sprintf (tmp, "0x%s", s+8);
878 listview_add_sub_item (lv, pos, KM_COL_KEYID, tmp);
879 }
880
881 s = find_secret_key (key)? "pub/sec" : "pub";
882 listview_add_sub_item (lv, pos, KM_COL_TYPE, s);
883
884 s = get_key_size (key, 0);
885 if (s)
886 listview_add_sub_item (lv, pos, KM_COL_SIZE, s);
887
888 s = get_key_algo (key, 0);
889 if (s)
890 listview_add_sub_item (lv, pos, KM_COL_CIPHER, s);
891
892 p = get_key_status (key, 0, 1);
893 if (p) {
894 listview_add_sub_item (lv, pos, KM_COL_VALID, p);
895 free_if_alloc (p);
896 }
897
898 s = get_key_trust (key, 0, 1);
899 if (s)
900 listview_add_sub_item (lv, pos, KM_COL_TRUST, s);
901
902 long t = key->subkeys->timestamp;
903 s = get_key_created (t);
904 if (s)
905 listview_add_sub_item (lv, pos, KM_COL_CREAT, s);
906 }
907
908
909 int
910 keylist_add_key (listview_ctrl_t lv, int mode,
911 struct keycache_s *ctx, gpgme_key_t key)
912 {
913 int uids, rc = 0, i;
914 gpgme_subkey_t k;
915
916 /* if the entire key is disabled, just return. */
917 if (key->disabled && !(mode & KEYLIST_LIST))
918 return 0;
919
920 for (k=key->subkeys, i = 0; i < count_subkeys (key); i++, k=k->next) {
921 if (k->invalid) {
922 log_debug ("keylist_add_key: invalid key \"%s\"\n", key->uids->name);
923 continue; /* Don't use invalid keys */
924 }
925
926 if (mode & KEYLIST_ALL) {
927 uids = count_userids (key);
928 rc = do_addkey (lv, ctx, key, uids, i, 0);
929 if (rc)
930 return rc;
931 }
932 else if (mode & KEYLIST_LIST)
933 return do_addkey (lv, ctx, key, -1, i, 1);
934 else if (mode & KEYLIST_ENCRYPT) {
935 if (k->can_encrypt && key_is_useable (k)) {
936 if (mode & KEYLIST_FLAG_FILE) {
937 rc = do_addkey (lv, ctx, key, -1, i, -1);
938 if (rc)
939 return rc;
940 }
941 else {
942 for (uids = 0; uids < count_userids (key); uids++) {
943 rc = do_addkey (lv, ctx, key, uids, i, -1);
944 if (rc)
945 return rc;
946 }
947 }
948 }
949 }
950 else if (mode & KEYLIST_ENCRYPT_MIN) {
951 if( k->can_encrypt && key_is_useable (k))
952 {
953 rc = do_addkey (lv, ctx, key, -1, i, -1);
954 return rc;
955 }
956 }
957 else if (mode & KEYLIST_SIGN) {
958 if (k->can_sign
959 && find_secret_key (key)
960 && key_is_useable (k)) {
961 rc = do_addkey (lv, ctx, key, -1, i, -1);
962 if (rc)
963 return rc;
964 }
965 }
966 }
967
968 return rc;
969 }
970
971
972 int
973 keylist_sort (listview_ctrl_t lv, int sortby)
974 {
975 return listview_sort_items (lv, sortby, keylist_cmp_cb);
976 }
977
978
979 /* Check that the validity @validity is at least >= marginal. */
980 static int
981 key_check_validity (gpgme_key_t key)
982 {
983 gpgme_user_id_t u;
984
985 for (u=key->uids; u; u =u->next) {
986 if (u->validity >= GPGME_VALIDITY_MARGINAL)
987 return -1;
988 }
989
990 return 0;
991 }
992
993
994 /* Extract all selected recipients from the list @lv and return them
995 as a vector. @r_force_trust is >= 1 if one of the recipients is not
996 fully trusted. @r_count returns the number of selected keys.
997 Return value: the key list on success, NULL otherwise. */
998 gpgme_key_t*
999 keylist_get_recipients (listview_ctrl_t lv, int *r_force_trust, int *r_count)
1000 {
1001 key_array_s *ka = NULL;
1002 keycache_s *c;
1003 gpgme_key_t *keybuf, key;
1004 int count = 0, force_trust = 0;
1005 int n, j, ka_pos = 0, rc = 0;
1006 int k_pos=0;
1007
1008 n = listview_count_items (lv, 0);
1009
1010 ka = key_array_new (n);
1011 if (!ka)
1012 BUG (NULL);
1013
1014 keybuf = (gpgme_key_t*)calloc (n+1, sizeof (gpgme_key_t));
1015 if (!keybuf)
1016 BUG (NULL);
1017
1018 for (j = 0; j < n; j++) {
1019 if (listview_get_item_state (lv, j) || n == 1) {
1020 key = km_get_key_ptr (lv, j, &c);
1021 if (!key)
1022 BUG (0);
1023 if (!key_check_validity (key) &&
1024 !key_array_search (ka, ka_pos, key->subkeys->keyid)) {
1025 char *warn = new char[512+strlen (c->uids->uid) + 1];
1026 if (!warn)
1027 BUG (0);
1028 sprintf (warn,
1029 _("It is NOT certain that the key belongs to the person\n"
1030 "named in the user ID. If you *really* know what you are\n"
1031 "doing, you may answer the next question with yes\n"
1032 "\n"
1033 "Use \"%s\" anyway?"), c->uids->uid);
1034 if (reg_prefs.always_trust)
1035 rc = IDYES;
1036 else
1037 rc = msg_box (NULL, warn, _("Recipients"), MB_ERR_ASK);
1038 if (rc == IDYES) {
1039 keybuf[k_pos++] = key;
1040 force_trust++;
1041 ka[ka_pos].checked = 1;
1042 strcpy (ka[ka_pos++].keyid, key->subkeys->keyid);
1043 count++;
1044 }
1045 free_if_alloc (warn);
1046 }
1047 else {
1048 keybuf[k_pos++] = key;
1049 count++;
1050 }
1051 }
1052 }
1053 key_array_release (ka);
1054 if (r_force_trust)
1055 *r_force_trust = force_trust;
1056 if (r_count)
1057 *r_count = count;
1058 return keybuf;
1059 }
1060
1061
1062 static int
1063 keylist_get_keyflags (gpgme_key_t key)
1064 {
1065 int flags = KEYFLAG_NONE;
1066
1067 if (key->revoked)
1068 flags |= KEYFLAG_REVOKED;
1069 if (key->expired)
1070 flags |= KEYFLAG_EXPIRED;
1071 if (key->disabled)
1072 flags |= KEYFLAG_DISABLED;
1073
1074 return flags;
1075 }
1076
1077
1078 gpgme_key_t*
1079 keylist_enum_recipients (listview_ctrl_t lv, int listype, int *r_count)
1080 {
1081 struct keycache_s *c;
1082 gpgme_key_t *rset;
1083 gpgme_key_t key;
1084 int i, n, id, k_pos=0;
1085
1086 n = listview_count_items (lv, 0);
1087 if (!n)
1088 return 0;
1089 rset = (gpgme_key_t*)calloc (n+1, sizeof (gpgme_key_t));
1090 if (!rset)
1091 BUG (NULL);
1092 for (i = 0; i < n; i++) {
1093 if (!listview_get_item_state (lv, i))
1094 continue;
1095 key = km_get_key_ptr (lv, i, &c);
1096 switch (listype) {
1097 case KEYLIST_LIST:
1098 if (keylist_get_keyflags (key) & KEYFLAG_REVOKED) {
1099 id = printf_box (_("Recipients"), MB_INFO|MB_YESNO,
1100 _("KeyID %s.\nDo you really want to export a revoked key?"),
1101 c->uids->uid);
1102 if (id == IDNO)
1103 continue;
1104 }
1105 break;
1106 }
1107 rset[k_pos++] = key;
1108 }
1109 if (r_count)
1110 *r_count = k_pos;
1111 return rset;
1112 }
1113
1114
1115 void
1116 seclist_destroy (keylist_t *list)
1117 {
1118 keylist_t l2;
1119 while (*list) {
1120 l2 = (*list)->next;
1121 safe_free (*list);
1122 *list = l2;
1123 }
1124 list = NULL;
1125 }
1126
1127
1128 void
1129 seclist_init (HWND dlg, int ctlid, int flags, keylist_t * ret_list)
1130 {
1131 gpg_keycache_t kc = NULL;
1132 gpgme_key_t key = NULL;
1133 HWND kb;
1134 keylist_t list=NULL, l, l2;
1135 long pos = 0;
1136
1137 SendDlgItemMessage (dlg, ctlid, CB_RESETCONTENT, 0, 0);
1138 kb = GetDlgItem (dlg, ctlid);
1139 kc = keycache_get_ctx (0);
1140 if (!kc)
1141 BUG (0);
1142 gpg_keycache_rewind (kc);
1143
1144 while (!gpg_keycache_next_key (kc, 1, &key)) {
1145 char *inf = NULL, *uid = NULL;
1146 const char *id;
1147 const char *keyid;
1148 int algo;
1149 size_t size = 0;
1150
1151 if (flags & KEYLIST_FLAG_SHORT)
1152 id = key->uids->name;
1153 else
1154 id = key->uids->uid;
1155 keyid = key->subkeys->keyid;
1156 algo = key->subkeys->pubkey_algo;
1157 if (!id || !keyid)
1158 continue;
1159 if (key->disabled || !key_is_useable (key->subkeys))
1160 continue;
1161
1162 uid = utf8_to_native (id);
1163 size = strlen (uid) + strlen (keyid) + 32;
1164 inf = new char[size+1];
1165 if (!inf)
1166 BUG (NULL);
1167 _snprintf (inf, size, "%s (%s/0x%s)", uid,
1168 get_key_pubalgo (key->subkeys->pubkey_algo), keyid + 8);
1169 combox_add_string (kb, inf);
1170 free_if_alloc (inf);
1171 free (uid);
1172 l = (struct keylist_s *)calloc (1, sizeof * l);
1173 if (!l)
1174 BUG (0);
1175 l->key = key;
1176 if (!list)
1177 list = l;
1178 else {
1179 for( l2 = list; l2->next; l2 = l2->next )
1180 ;
1181 l2->next = l;
1182 }
1183 }
1184 for (pos = 0, l2=list; pos < SendMessage (kb, CB_GETCOUNT, 0, 0);
1185 pos++, l2=l2->next)
1186 SendMessage (kb, CB_SETITEMDATA, pos, (LPARAM)(DWORD)l2->key);
1187 SendMessage (kb, CB_SETCURSEL, 0, 0);
1188 *ret_list = list;
1189 }
1190
1191
1192 /* Select a secret key from the combo box with the ID @ctlid.
1193 Return the code on success in @ret_key. */
1194 int
1195 seclist_select_key (HWND dlg, int ctlid, gpgme_key_t *ret_key)
1196 {
1197 int pos;
1198 DWORD k = 0;
1199
1200 pos = SendDlgItemMessage (dlg, ctlid, CB_GETCURSEL, 0, 0);
1201 if (pos == CB_ERR) {
1202 msg_box (dlg, _("No key was selected."), _("Secret Key List"), MB_ERR);
1203 *ret_key = NULL;
1204 }
1205 else {
1206 k = SendDlgItemMessage (dlg, ctlid, CB_GETITEMDATA, pos, 0);
1207 *ret_key = (gpgme_key_t)k;
1208 }
1209 return k? 0 : -1;
1210 }

Properties

Name Value
svn:eol-style native

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26