/[winpt]/trunk/Src/wptKeyserverDlg.cpp
ViewVC logotype

Annotation of /trunk/Src/wptKeyserverDlg.cpp

Parent Directory Parent Directory | Revision Log Revision Log


Revision 133 - (hide annotations)
Mon Jan 9 09:15:29 2006 UTC (19 years, 1 month ago) by twoaday
File size: 16627 byte(s)
A lot of minor bug fixes.
New icons.

For a complete history, see the ChangeLog entries.


1 werner 36 /* wptKeyserverDlg.cpp - Keyserver dialog
2     * Copyright (C) 2000-2005 Timo Schulz
3 twoaday 115 * Copyright (C) 2005 g10 Code GmbH
4 werner 36 *
5     * This file is part of WinPT.
6     *
7     * WinPT is free software; you can redistribute it and/or modify
8     * it under the terms of the GNU General Public License as published by
9     * the Free Software Foundation; either version 2 of the License, or
10     * (at your option) any later version.
11     *
12     * WinPT is distributed in the hope that it will be useful,
13     * but WITHOUT ANY WARRANTY; without even the implied warranty of
14     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15     * GNU General Public License for more details.
16     *
17     * You should have received a copy of the GNU General Public License
18     * along with WinPT; if not, write to the Free Software Foundation,
19     * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
20     */
21 werner 42 #ifdef HAVE_CONFIG_H
22     #include <config.h>
23     #endif
24    
25 werner 36 #include <windows.h>
26     #include <commctrl.h>
27     #include <malloc.h>
28    
29 werner 47 #include "resource.h"
30 werner 36 #include "wptKeyserver.h"
31     #include "wptErrors.h"
32     #include "wptTypes.h"
33     #include "wptCommonCtl.h"
34     #include "wptNLS.h"
35     #include "wptW32API.h"
36     #include "wptVersion.h"
37     #include "wptGPG.h"
38     #include "wptKeyManager.h"
39     #include "wptContext.h" /* for passphrase_s */
40     #include "wptDlgs.h"
41 twoaday 129 #include "wptUTF8.h"
42 werner 36
43    
44     #define MAX_KEYSIZE 70000
45    
46 twoaday 109 char* get_reg_entry_keyserver (const char *);
47 werner 36 int set_reg_entry_keyserver (const char *, const char *);
48    
49    
50 twoaday 109 /* Print out keyserver error and a possible Winsock error. */
51 werner 36 static void
52 twoaday 109 hkp_err_box (HWND dlg, const char *host, WORD port, int rc)
53 werner 36 {
54 twoaday 109 const char *err = kserver_strerror ();
55 werner 36
56 twoaday 109 log_box (_("Keyserver"), MB_ERR, "%s:%d: %s",
57     host, port, winpt_strerror (rc));
58 werner 36 if (err)
59     msg_box (dlg, err, wsock_strerror (), MB_ERR);
60 twoaday 109 }
61 werner 36
62    
63 twoaday 109 /* Send the extracted key with keyid @pattern to the
64     keyserver @kserver (port @port).
65     Return value: 0 on success. */
66 werner 36 int
67 twoaday 109 hkp_send_key (HWND dlg, const char *kserver, WORD port, const char *pattern)
68 werner 36 {
69 twoaday 109 gpgme_ctx_t ctx;
70 werner 36 gpgme_data_t keydata;
71     gpgme_error_t ec;
72 twoaday 109 char *rawkey = NULL;
73     char msg[384];
74 werner 36 size_t n;
75    
76 twoaday 109 ec = gpgme_new (&ctx);
77     if (ec)
78     BUG (NULL);
79     gpgme_set_armor (ctx, 1);
80     ec = gpgme_data_new (&keydata);
81     if (ec)
82     BUG (NULL);
83     ec = gpgme_op_export (ctx, pattern, 0, keydata);
84     if (ec) {
85     msg_box (dlg, gpgme_strerror (ec), _("Export"), MB_ERR);
86 werner 36 goto leave;
87     }
88     rawkey = gpgme_data_release_and_get_mem (keydata, &n);
89 twoaday 109 ec = kserver_sendkey (kserver, port, rawkey, n);
90     if (ec) {
91     hkp_err_box (dlg, kserver, port, ec);
92 werner 36 goto leave;
93     }
94    
95     _snprintf (msg, sizeof (msg) -1, _("Key '%s' successfully sent"), pattern);
96     status_box (dlg, msg, _("GnuPG status"));
97    
98     leave:
99 twoaday 109 gpgme_release (ctx);
100 werner 36 if (rawkey)
101     gpgme_free (rawkey);
102 twoaday 109 return ec? -1 : 0;
103     }
104 werner 36
105    
106 twoaday 117
107 twoaday 118 /* Show all received keys from the keyserver. */
108 twoaday 117 static void
109     show_imported_keys (gpgme_import_result_t res)
110     {
111     gpgme_import_status_t t;
112     gpgme_key_t key;
113     gpgme_data_t msg;
114     gpgme_ctx_t ctx;
115     gpgme_error_t err;
116     const char *s;
117 twoaday 129 char *p, *uid;
118 twoaday 117 size_t n=0;
119    
120 twoaday 118 if (!res)
121     return;
122    
123 twoaday 117 err = gpgme_data_new (&msg);
124     if (err)
125     BUG (NULL);
126     err = gpgme_new (&ctx);
127     if (err)
128     BUG (NULL);
129 twoaday 118 if (res->considered > 1) {
130     s = _("WARNING: multiple keys matched request.\n\n");
131     gpgme_data_write (msg, s, strlen (s));
132     }
133    
134     if (res->unchanged == res->considered)
135     s = _("Key(s) successfully received but nothing was changed.");
136     else
137     s = _("Key(s) sucessfully received and imported.");
138 twoaday 117 gpgme_data_write (msg, s, strlen (s));
139 twoaday 118 gpgme_data_write (msg, "\n\n", 2);
140    
141 twoaday 117 for (t=res->imports; t; t = t->next) {
142     if (!gpgme_get_key (ctx, t->fpr, &key, 0)) {
143 twoaday 129 s = uid = utf8_to_wincp2 (key->uids->uid);
144 twoaday 117 gpgme_data_write (msg, s, strlen (s));
145     gpgme_data_write (msg, "\n", 1);
146     gpgme_key_release (key);
147 twoaday 129 free (uid);
148 twoaday 117 }
149     }
150     gpgme_data_write (msg, "\0", 1);
151     p = gpgme_data_release_and_get_mem (msg, &n);
152     if (p != NULL) {
153     msg_box (NULL, p, _("Imported Keys"), MB_INFO);
154     gpgme_free (p);
155     }
156     gpgme_release (ctx);
157     }
158    
159    
160 twoaday 109 /* Receive a key from the keyserver @kserver (port @port)
161     with the pattern @pattern.
162     Return value: 0 on success. */
163 twoaday 133 static int
164     keyserver_recv_key (HWND dlg, const char *kserver, WORD port,
165     const char *pattern, int proto, int flags,
166     char **r_fpr)
167 werner 36 {
168     gpgme_ctx_t ctx;
169     gpgme_data_t keydata;
170     gpgme_error_t ec;
171 twoaday 115 gpgme_import_result_t import_res = NULL;
172 twoaday 109 char *rawkey = NULL;
173 twoaday 115 int rc;
174 werner 36
175 twoaday 115 /* XXX: implement dynamic buffers. */
176 werner 36 rawkey = new char[MAX_KEYSIZE];
177     if (!rawkey)
178     BUG (0);
179     memset (rawkey, 0, MAX_KEYSIZE);
180 twoaday 109 if (proto == KSPROTO_LDAP) {
181     rc = ldap_recvkey (kserver, pattern, rawkey, MAX_KEYSIZE-1);
182     if (rc) {
183     msg_box (dlg, _("LDAP key import failed.\n"
184 werner 36 "Please make sure you have an online connection"
185     " and gpgkeys_ldap.exe is installed"),
186 twoaday 109 _("Keyserver"), MB_ERR);
187     free_if_alloc (rawkey);
188 werner 36 return rc;
189     }
190     }
191     else if (proto == KSPROTO_FINGER) {
192     rc = finger_recvkey (kserver, pattern, rawkey, MAX_KEYSIZE-1);
193     if (rc) {
194 twoaday 109 log_box (_("Keyserver"), MB_ERR,
195     _("Finger key import failed: %s\n"), winpt_strerror (rc));
196 werner 36 free_if_alloc (rawkey);
197     return rc;
198     }
199     }
200 twoaday 109 else if ((rc = kserver_recvkey (kserver, port,
201     kserver_check_keyid (pattern),
202     rawkey, MAX_KEYSIZE-1))) {
203 werner 36 hkp_err_box (dlg, kserver, port, rc);
204     free_if_alloc (rawkey);
205     return rc;
206     }
207     else {
208 twoaday 109 if (!strstr (rawkey, "BEGIN PGP PUBLIC KEY BLOCK")) {
209     msg_box (dlg, _("This is not a valid OpenPGP key."),
210     _("Keyserver"), MB_ERR);
211 werner 36 goto leave;
212     }
213 twoaday 109 ec = gpgme_new (&ctx);
214     if (ec)
215     BUG (NULL);
216     gpgme_data_new_from_mem (&keydata, rawkey, strlen (rawkey), 1);
217     rc = gpgme_op_import (ctx, keydata);
218     if (rc) {
219     msg_box (dlg, gpgme_strerror ((gpgme_error_t)rc), _("Import"), MB_ERR);
220 werner 36 goto leave;
221     }
222     import_res = gpgme_op_import_result (ctx);
223 twoaday 117 if (import_res && r_fpr)
224 twoaday 115 *r_fpr = m_strdup (import_res->imports->fpr);
225 werner 36 }
226    
227     /* if we use the refresh mode, a lot of keys will be fetched and thus only
228     a summarize at the end is presented and not for each key. */
229     if (!(flags & KM_KS_REFRESH)) {
230 twoaday 118 show_imported_keys (import_res);
231 twoaday 117 if (import_res && import_res->unchanged == import_res->considered) {
232 twoaday 118 rc = WPTERR_GENERAL; /* no keys updated. */
233 werner 36 goto leave;
234     }
235     }
236 twoaday 118
237 werner 36 leave:
238     free_if_alloc (rawkey);
239     gpgme_release (ctx);
240     gpgme_data_release (keydata);
241    
242     return rc;
243 twoaday 109 }
244 werner 36
245    
246 twoaday 133 /* Alias for keyserver_recv_key but without the ability to return
247 twoaday 115 the fingerprint of the key. */
248     int
249     hkp_recv_key (HWND dlg, const char *kserver, WORD port,
250     const char *pattern, int proto, int flags)
251     {
252 twoaday 133 return keyserver_recv_key (dlg, kserver, port, pattern,
253     proto, flags, NULL);
254 twoaday 115 }
255    
256    
257 twoaday 109 #define my_iskeychar(a) (((a) >='0' && (a) <= '9' ) || ((a) >= 'A' && (a) <= 'F'))
258 werner 36
259     static int
260 twoaday 109 check_pattern (const char *pattern)
261 werner 36 {
262     int rc = 1;
263    
264     /* Whitespace are not allowed! */
265 twoaday 109 if (strchr( pattern, ' ')) {
266 werner 36 rc = WPTERR_GENERAL;
267     goto leave;
268     }
269    
270 twoaday 109 if (((strstr (pattern, "0x")) && (strlen (pattern) == 10)) ||
271     (strstr(pattern, "0x")) && (strlen (pattern) == 18)) {
272     rc = 0; /* Either long or short keyid */
273 werner 36 goto leave;
274     }
275    
276     if( (( my_iskeychar( pattern[0] )) && ( strlen( pattern ) == 8 ) )
277     || (my_iskeychar(pattern[0])) && ( strlen( pattern ) == 16) ) {
278     rc = 0;
279     goto leave;
280     }
281    
282     if( ( strchr( pattern, '@' ) ) && ( strlen( pattern ) >= 3 ) ) {
283     rc = 0;
284     goto leave;
285     }
286    
287     leave:
288     return rc;
289     } /* check_pattern */
290    
291    
292     static void
293     set_proxy (HWND dlg)
294     {
295 twoaday 109 char proxy[256];
296 werner 36 int port = 0;
297    
298     strcpy (proxy, "HTTP proxy: ");
299     if (kserver_get_proxy (&port)) {
300 twoaday 109 char t[128];
301 werner 36 const char *http = kserver_get_proxy (&port);
302     _snprintf (t, sizeof (t) - 1, "\"%s:%d\"", http, port);
303     strcat (proxy, t);
304     }
305     else
306 twoaday 109 strcat (proxy, "none");
307     SetDlgItemText (dlg, IDC_KEYSERVER_PROXY, proxy);
308 werner 36 } /* set_proxy */
309    
310    
311     static int inline
312     kserver_get_pos (listview_ctrl_t lv)
313     {
314     if (listview_count_items (lv, 0) == 1)
315     return 0;
316     return listview_get_curr_pos (lv);
317     }
318    
319    
320     static u16 inline
321     kserver_get_port (listview_ctrl_t lv)
322     {
323     char buf[16];
324    
325     listview_get_item_text (lv, kserver_get_pos (lv), 3, buf, 15);
326     return (u16)strtoul (buf, NULL, 10);
327     }
328    
329     static void
330     load_default_ks (listview_ctrl_t lv)
331     {
332     char * p, buf[192];
333     int i;
334    
335     p = get_reg_entry_keyserver ("Default");
336     if (!p)
337     return;
338     for( i = 0; i < listview_count_items( lv, 0 ); i++ ) {
339     listview_get_item_text( lv, i, 0, buf, sizeof (buf)-1 );
340     if( !strncmp( p, buf, strlen( p ) ) ) {
341     listview_add_sub_item( lv, i, 2, "x" );
342     break;
343     }
344     }
345     free_if_alloc (p);
346     } /* load_default_ks */
347    
348    
349     static int
350     save_default_ks (listview_ctrl_t lv)
351     {
352     char buf[192], port[32];
353     int idx, i;
354    
355     idx = listview_get_curr_pos( lv );
356     if( idx == -1 ) {
357     msg_box( NULL, _("Please select one of the servers."), _("Keyserver"), MB_ERR );
358     return -1;
359     }
360     listview_get_item_text( lv, idx, 1, buf, sizeof (buf)-1 );
361     if( *buf != 'H' ) {
362     msg_box( NULL, _("Only HTTP keyserver can be used."), _("Keyserver"), MB_ERR );
363     return -1;
364     }
365     for (i = 0; i < listview_count_items( lv, 0 ); i++)
366     listview_add_sub_item (lv, i, 2, "");
367     listview_add_sub_item (lv, idx, 2, "x");
368     listview_get_item_text (lv, idx, 0, buf, sizeof (buf)-1);
369     set_reg_entry_keyserver ("Default", buf);
370     i = kserver_get_port (lv);
371     sprintf (port, "%d", i);
372     set_reg_entry_keyserver ("Default_Port", port);
373     keyserver_set_default (buf, (u16)i);
374     return 0;
375     } /* save_default_ks */
376    
377    
378     int
379     keyserver_list_build (listview_ctrl_t *r_lv, HWND hwnd)
380     {
381     struct listview_column_s keyserver[] = {
382     {0, 160, (char *)_("DNS Name")},
383     {1, 52, (char *)_("Protocol")},
384     {2, 46, (char *)_("Default")},
385     {3, 46, (char *)_("Port")},
386     {0, 0, NULL}
387     };
388     listview_ctrl_t lv;
389     char buf[32];
390     int j;
391    
392     listview_new (&lv);
393     lv->ctrl = hwnd;
394     for (j=0; keyserver[j].fieldname; j++)
395     listview_add_column (lv, &keyserver[j]);
396     for (j = 0; j<MAX_KEYSERVERS; j++) {
397     if (!server[j].used)
398     continue;
399     listview_add_item (lv, " ");
400     listview_add_sub_item (lv, 0, 0, server[j].name);
401     switch (server[j].proto) {
402     case KSPROTO_HTTP:
403     listview_add_sub_item( lv, 0, 1, "H" ); break;
404     case KSPROTO_LDAP:
405     listview_add_sub_item( lv, 0, 1, "L" ); break;
406     case KSPROTO_FINGER:
407     listview_add_sub_item( lv, 0, 1, "F" ); break;
408     }
409     sprintf (buf, "%d", server[j].port);
410     listview_add_sub_item (lv, 0, 3, buf);
411     }
412     load_default_ks (lv);
413     if (listview_count_items (lv, 0) == 0) {
414     listview_add_item (lv, "");
415     listview_add_sub_item (lv, 0, 0, DEF_HKP_KEYSERVER);
416     listview_add_sub_item (lv, 0, 1, "H");
417     }
418     listview_set_ext_style (lv);
419     *r_lv = lv;
420     return 0;
421     }
422    
423    
424 twoaday 109 /* Dialog box procedure to access keyservers. */
425 werner 36 BOOL CALLBACK
426     keyserver_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)
427     {
428     static listview_ctrl_t lv = NULL;
429     static int lv_idx = 0;
430 twoaday 115 static struct genkey_s *key;
431     keyserver_ctx ksc;
432     char kserver[128], pattern[128];
433     char proto[16];
434 werner 36 int rc, proto_nr = 0;
435    
436 twoaday 115 switch (msg) {
437 werner 36 case WM_INITDIALOG:
438 twoaday 115 if (lparam != 0)
439     key = (struct genkey_s*)lparam;
440 werner 36 SetWindowText (dlg, _("Keyserver Access"));
441     SetDlgItemText (dlg, IDC_KEYSERVER_RECV, _("&Receive"));
442     SetDlgItemText (dlg, IDC_KEYSERVER_SEND,
443     _("Send key (default is receiving)"));
444     SetDlgItemText (dlg, IDC_KEYSERVER_INFO,
445     _("Please enter the key ID or email address you search for"));
446     SetDlgItemText (dlg, IDC_KEYSERVER_INDEX, _("&Search"));
447     SetDlgItemText (dlg, IDC_KEYSERVER_PROXSETT, _("C&hange"));
448     SetDlgItemText (dlg, IDC_KEYSERVER_DEFAULT, _("Set &default"));
449 twoaday 117 SetDlgItemText (dlg, IDCANCEL, _("&Close"));
450 twoaday 101
451 werner 36 set_proxy (dlg);
452     keyserver_list_build (&lv, GetDlgItem (dlg, IDC_KEYSERVER_LIST));
453     center_window (dlg, NULL);
454     SetForegroundWindow (dlg);
455     return TRUE;
456    
457     case WM_NOTIFY:
458     NMHDR *notify;
459     notify = (NMHDR *)lparam;
460 twoaday 115 if (notify && notify->code == NM_CLICK
461     && notify->idFrom == IDC_KEYSERVER_LIST)
462     lv_idx = listview_get_curr_pos (lv);
463 werner 36 return TRUE;
464    
465     case WM_DESTROY:
466 twoaday 115 if (lv) {
467     listview_release (lv);
468 werner 36 lv = NULL;
469     }
470     lv_idx = 0;
471     return FALSE;
472    
473     case WM_SYSCOMMAND:
474 twoaday 115 if (LOWORD (wparam) == SC_CLOSE)
475     EndDialog (dlg, TRUE);
476 werner 36 return FALSE;
477    
478     case WM_COMMAND:
479 twoaday 115 switch (LOWORD (wparam)) {
480 werner 36 case IDC_KEYSERVER_PROXSETT:
481 twoaday 115 dialog_box_param (glob_hinst, (LPCTSTR)IDD_WINPT_KEYSERVER_PROXY,
482 twoaday 117 dlg, keyserver_proxy_dlg_proc, NULL,
483 twoaday 115 _("Proxy Settings"), IDS_WINPT_KEYSERVER_PROXY);
484     set_proxy (dlg);
485 werner 36 return TRUE;
486    
487     case IDC_KEYSERVER_INDEX:
488     if (!lv_idx) {
489     lv_idx = kserver_get_pos (lv);
490     if (lv_idx == -1) {
491 twoaday 109 msg_box (dlg, _("Please select one of the keyservers."),
492     _("Keyserver"), MB_INFO);
493 werner 36 return FALSE;
494     }
495     }
496     listview_get_item_text (lv, lv_idx, 1, proto, sizeof (proto)-1);
497     if (*proto == 'L') {
498 twoaday 115 msg_box (dlg, _("This is not implemented yet!"),
499     _("Keyserver"), MB_ERR);
500 werner 36 return FALSE;
501     }
502     listview_get_item_text (lv, lv_idx, 0, kserver, sizeof (kserver)-1);
503     if (!GetDlgItemText (dlg, IDC_KEYSERVER_SEARCH, pattern, sizeof (pattern)-1)) {
504 twoaday 115 msg_box (dlg, _("Please enter the search pattern."),
505     _("Keyserver"), MB_INFO);
506 werner 36 return FALSE;
507     }
508     ksc.name = kserver;
509     ksc.pattern = pattern;
510     ksc.port = kserver_get_port (lv);
511 twoaday 115 DialogBoxParam (glob_hinst, (LPCSTR)IDD_WINPT_HKPSEARCH, dlg,
512     hkpsearch_dlg_proc, (LPARAM) &ksc);
513 werner 36 return TRUE;
514    
515     case IDC_KEYSERVER_RECV:
516     memset (&kserver, 0, sizeof (kserver));
517     if (!lv_idx) {
518     lv_idx = kserver_get_pos (lv);
519     if (lv_idx == -1) {
520 twoaday 109 msg_box (dlg, _("Please select one of the keyservers."),
521     _("Keyserver"), MB_INFO);
522 werner 36 return FALSE;
523     }
524     }
525     listview_get_item_text( lv, lv_idx, 1, proto, sizeof (proto)-1 );
526     proto_nr = KSPROTO_HTTP;
527 twoaday 115 if (*proto == 'L')
528 werner 36 proto_nr = KSPROTO_LDAP;
529 twoaday 115 else if (*proto == 'F')
530 werner 36 proto_nr = KSPROTO_FINGER;
531 twoaday 115 listview_get_item_text (lv, lv_idx, 0, kserver, sizeof (kserver)-1);
532     if( !GetDlgItemText( dlg, IDC_KEYSERVER_SEARCH, pattern, sizeof (pattern)-1)) {
533     msg_box (dlg, _("Please enter the search pattern."),
534     _("Keyserver"), MB_INFO);
535 werner 36 return FALSE;
536     }
537 twoaday 115 if (proto_nr == KSPROTO_LDAP && strchr (pattern, '@')) {
538     msg_box (dlg, _("Only keyids are allowed."), _("LDAP Keyserver"), MB_INFO);
539 werner 36 return FALSE;
540     }
541     else if (proto_nr == KSPROTO_FINGER) {
542     if (strchr (pattern, '@') || strchr (pattern, ' ')) {
543 twoaday 115 msg_box (dlg, _("Only enter the name of the user."),
544     _("FINGER Keyserver"), MB_INFO);
545 werner 36 return FALSE;
546     }
547     }
548 twoaday 115 else if (check_pattern (pattern)) {
549     msg_box (dlg, _("Only email addresses or keyids are allowed."),
550     _("HKP Keyserver"), MB_INFO);
551 werner 36 return FALSE;
552     }
553 twoaday 133 rc = keyserver_recv_key (dlg, kserver, kserver_get_port (lv),
554     pattern, proto_nr, 0,
555     key? &key->fpr : NULL);
556 twoaday 115 if (!rc && key->fpr != NULL) {
557     keycache_update (0, key->fpr);
558     get_pubkey (key->fpr, &key->newkey);
559     /* we do not need the fingerprint any longer. */
560     free_if_alloc (key->fpr);
561     }
562 werner 36 return TRUE;
563    
564     case IDC_KEYSERVER_DEFAULT:
565 twoaday 109 save_default_ks (lv);
566 werner 36 break;
567    
568     case IDCANCEL:
569 twoaday 109 EndDialog (dlg, FALSE);
570 werner 36 return FALSE;
571     }
572     break;
573     }
574    
575     return FALSE;
576 twoaday 109 }

Properties

Name Value
svn:eol-style native

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26