/[winpt]/trunk/Src/wptKeysignDlg.cpp
ViewVC logotype

Diff of /trunk/Src/wptKeysignDlg.cpp

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 25 by twoaday, Wed Oct 12 10:04:26 2005 UTC revision 181 by twoaday, Tue Mar 14 11:01:22 2006 UTC
# Line 1  Line 1 
1  /* wptKeysignDlg.cpp - Key signing dialog  /* wptKeysignDlg.cpp - Key signing dialog
2   *      Copyright (C) 2001-2005 Timo Schulz   *      Copyright (C) 2001-2006 Timo Schulz
3   *   *
4   * This file is part of WinPT.   * This file is part of WinPT.
5   *   *
6   * WinPT is free software; you can redistribute it and/or modify   * WinPT is free software; you can redistribute it and/or modify
7   * it under the terms of the GNU General Public License as published by   * it under the terms of the GNU General Public License as published by
8   * the Free Software Foundation; either version 2 of the License, or   * the Free Software Foundation; either version 2 of the License, or
9   * (at your option) any later version.   * (at your option) any later version.
10   *   *
11   * WinPT is distributed in the hope that it will be useful,   * WinPT is distributed in the hope that it will be useful,
12   * but WITHOUT ANY WARRANTY; without even the implied warranty of   * but WITHOUT ANY WARRANTY; without even the implied warranty of
13   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14   * GNU General Public License for more details.   * GNU General Public License for more details.
15   *   *
16   * You should have received a copy of the GNU General Public License   * You should have received a copy of the GNU General Public License
17   * along with WinPT; if not, write to the Free Software Foundation,   * along with WinPT; if not, write to the Free Software Foundation,
18   * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA   * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
19   */   */
20    #ifdef HAVE_CONFIG_H
21  #include <windows.h>  #include <config.h>
22  #include <commctrl.h>  #endif
23    
24  #include "../resource.h"  #include <windows.h>
25  #include "wptGPG.h"  #include <commctrl.h>
26  #include "wptNLS.h"  #include <time.h>
27  #include "wptW32API.h"  
28  #include "wptVersion.h"  #include "resource.h"
29  #include "wptTypes.h"  #include "wptGPG.h"
30  #include "wptErrors.h"  #include "wptNLS.h"
31  #include "wptCommonCtl.h"  #include "wptW32API.h"
32  #include "wptContext.h"  #include "wptVersion.h"
33  #include "wptDlgs.h"  #include "wptTypes.h"
34  #include "wptUTF8.h"  #include "wptErrors.h"
35  #include "wptRegistry.h"  #include "wptCommonCtl.h"
36  #include "wptKeyList.h"  #include "wptContext.h"
37  #include "wptKeyEdit.h"  #include "wptDlgs.h"
38    #include "wptUTF8.h"
39  static int sig_class_choice = 0;  #include "wptRegistry.h"
40    #include "wptKeylist.h"
41  /* Return a beautified printable fingerprint of @fpr. */  #include "wptKeyEdit.h"
42  static const char*  
43  get_printable_fpr (const char *fpr)  
44  {  /* Return a beautified printable fingerprint of @fpr. */
45      static char pfpr[64];      static const char*
46      int pos = 0;  get_printable_fpr (const char *fpr)
47      size_t i;  {
48        static char pfpr[64];    
49      for (i = 0; i < strlen (fpr); i += 4) {      int pos = 0;
50          pfpr[pos++] = fpr[i];      size_t i;
51          pfpr[pos++] = fpr[i+1];  
52          pfpr[pos++] = fpr[i+2];      for (i = 0; i < strlen (fpr); i += 4) {
53          pfpr[pos++] = fpr[i+3];          pfpr[pos++] = fpr[i];
54          pfpr[pos++] = ' ';          pfpr[pos++] = fpr[i+1];
55      }          pfpr[pos++] = fpr[i+2];
56      return pfpr;          pfpr[pos++] = fpr[i+3];
57  }          pfpr[pos++] = ' ';
58        }
59        return pfpr;
60  /* Return human friendly information about the key @key. */  }
61  static const char*  
62  get_keyinfo (gpgme_key_t key)  
63  {  /* Return human friendly information about the key @key. */
64      static char buf[64+16];  static const char*
65      struct winpt_key_s k;  get_keyinfo (gpgme_key_t key)
66    {
67      memset (&k, 0, sizeof (k));      static char buf[64+16];
68      winpt_get_seckey (key->subkeys->keyid, &k);      struct winpt_key_s k;
69      _snprintf (buf, DIM (buf)-1-16, "%d-bit %s key, ID %s",  
70          key->subkeys->length,      memset (&k, 0, sizeof (k));
71          get_key_pubalgo (key->subkeys->pubkey_algo),      winpt_get_seckey (key->subkeys->keyid, &k);
72          key->subkeys->keyid+8);      _snprintf (buf, DIM (buf)-1-16, "%d-bit %s key, ID %s",
73      if (k.ext->gloflags.divert_to_card)          key->subkeys->length,
74          strcat (buf, " (Card)");          get_key_pubalgo (key->subkeys->pubkey_algo),
75      return buf;          key->subkeys->keyid+8);
76  }      if (k.ext->gloflags.divert_to_card)
77            strcat (buf, " (Card)");
78        return buf;
79  /* Fill the secret key combo-box with all entries from the cache.  }
80     @dlg is the handle to the combo-box. @keyid show which key to skip.  
81     Return value: 0 on success. */  
82  static int  /* Fill the secret key combo-box with all entries from the cache.
83  do_fill_seckeylist (HWND dlg, const char *keyid)     @dlg is the handle to the combo-box. @keyid show which key to skip.
84  {     Return value: 0 on success. */
85      gpg_keycache_t sec;  static int
86      gpgme_key_t pk;  do_fill_seckeylist (HWND dlg, const char *keyid)
87      const char * s;  {
88      char * uid, * p;          gpg_keycache_t sec;
89      int i = 0, n=0;      gpgme_key_t pk, defkey;
90        const char *s;
91      sec = keycache_get_ctx (0);      char *uid, *p;
92      if (!sec)      int i = 0, n = 0, curr_sel = 0;
93          BUG (0);  
94      gpg_keycache_rewind (sec);      sec = keycache_get_ctx (0);
95      while (!gpg_keycache_next_key (sec, 1, &pk)) {      if (!sec)
96          if (!pk)          BUG (0);
97              continue;      gpg_keycache_get_default_key (sec, &defkey);
98          s = pk->subkeys->keyid;      gpg_keycache_rewind (sec);
99          if (!strcmp (s, keyid))      while (!gpg_keycache_next_key (sec, 1, &pk)) {
100              continue;          if (!pk)
101          /* skip all ElGamal sign+encrypt keys */              continue;
102          if (pk->subkeys->pubkey_algo == GPGME_PK_ELG)          s = pk->subkeys->keyid;
103              continue;          if (!strcmp (s, keyid))
104          /* make sure the public key is okay not: revoked, expired or disabled. */              continue;
105          if (pk->expired ||pk->revoked || pk->disabled)          /* skip all ElGamal sign+encrypt keys */
106              continue;          if (pk->subkeys->pubkey_algo == GPGME_PK_ELG)
107          s = pk->uids->name;              continue;
108          if (!s)          /* make sure the public key is okay not: revoked, expired or disabled. */
109              continue;          if (pk->expired ||pk->revoked || pk->disabled)
110          uid = utf8_to_wincp (s, strlen (s));              continue;
111          p = new char[strlen (uid) + 64];          s = pk->uids->name;
112          if (!p)          if (!s)
113              BUG (NULL);              continue;
114          _snprintf (p, strlen (uid) + 63, "%s (%s)", uid, get_keyinfo (pk));          if (defkey && !strcmp (defkey->subkeys->keyid, pk->subkeys->keyid))
115          SendDlgItemMessage (dlg, IDC_KEYSIGN_KEYLIST, CB_ADDSTRING, i, (LPARAM)(char *)p);              curr_sel = i;
116          SendDlgItemMessage (dlg, IDC_KEYSIGN_KEYLIST, CB_SETITEMDATA, i++, (LPARAM)(DWORD)pk);          uid = utf8_to_wincp (s, strlen (s));
117          free_if_alloc (p);          p = new char[strlen (uid) + 64];
118          free (uid);          if (!p)
119          n++;              BUG (NULL);
120      }          _snprintf (p, strlen (uid) + 63, "%s (%s)", uid, get_keyinfo (pk));
121      SendDlgItemMessage (dlg, IDC_KEYSIGN_KEYLIST, CB_SETCURSEL, 0, 0);          SendDlgItemMessage (dlg, IDC_KEYSIGN_KEYLIST,
122      if (!n)                              CB_ADDSTRING, i, (LPARAM)(char *)p);
123          return -1;          SendDlgItemMessage (dlg, IDC_KEYSIGN_KEYLIST,
124      return 0;                              CB_SETITEMDATA, i++, (LPARAM)(DWORD)pk);
125  }          free_if_alloc (p);
126            free (uid);
127            n++;
128  /* Check if the selected key is protected and en- or disable the      }
129     passphrase control. */      SendDlgItemMessage (dlg, IDC_KEYSIGN_KEYLIST,
130  static void                          CB_SETCURSEL, (WPARAM)curr_sel, 0);
131  do_check_protection (HWND dlg)      if (!n)
132  {          return -1;
133      int idx, protec;      return 0;
134      gpgme_key_t key;  }
135      struct winpt_key_s k;  
136    
137      idx = SendDlgItemMessage( dlg, IDC_KEYSIGN_KEYLIST, CB_GETCURSEL, 0, 0 );  /* Check if the selected key is protected and en- or disable the
138      key = (gpgme_key_t)SendDlgItemMessage( dlg, IDC_KEYSIGN_KEYLIST, CB_GETITEMDATA, (WPARAM)idx, 0 );     passphrase control. */
139      if (key) {  static void
140          winpt_get_seckey (key->subkeys->keyid, &k);  do_check_protection (HWND dlg)
141          protec = k.is_protected;  {
142          if (!protec)      int idx, protec;
143              protec = k.ext->gloflags.divert_to_card;      gpgme_key_t key;
144          EnableWindow (GetDlgItem (dlg, IDC_KEYSIGN_PASSPHRASE), protec? TRUE : FALSE);      struct winpt_key_s k;
145      }  
146  }      idx = SendDlgItemMessage( dlg, IDC_KEYSIGN_KEYLIST, CB_GETCURSEL, 0, 0 );
147        key = (gpgme_key_t)SendDlgItemMessage( dlg, IDC_KEYSIGN_KEYLIST, CB_GETITEMDATA, (WPARAM)idx, 0 );
148        if (key) {
149  /* Dialog box procedure to choose the signature class. */          winpt_get_seckey (key->subkeys->keyid, &k);
150  BOOL CALLBACK          protec = k.is_protected;
151  sig_class_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)          if (!protec)
152  {              protec = k.ext->gloflags.divert_to_card;
153      switch (msg) {          EnableWindow (GetDlgItem (dlg, IDC_KEYSIGN_PASSPHRASE), protec? TRUE : FALSE);
154      case WM_INITDIALOG:      }
155          SetWindowText (dlg, _("Choose Signature Class"));  }
156          SetDlgItemText (dlg, IDC_SIGCLASS_TITLEINF, _("How carefully have you verified the key you are about to sign actually belongs to the person? If you don't know what to anwser, use \"0\"."));  
157          SetDlgItemText (dlg, IDC_SIGCLASS_CLASS0, _("(0) I will not answer (default)"));  
158          SetDlgItemText (dlg, IDC_SIGCLASS_CLASS1, _("(1) I have not checked at all."));  /* Dialog box procedure to choose the signature class. */
159          SetDlgItemText (dlg, IDC_SIGCLASS_CLASS2, _("(2) I have done causal checking."));  BOOL CALLBACK
160          SetDlgItemText (dlg, IDC_SIGCLASS_CLASS3, _("(3) I have done very careful checkings."));  sig_class_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)
161          CheckDlgButton (dlg, IDC_SIGCLASS_CLASS0, BST_CHECKED);  {
162          SetForegroundWindow (dlg);      int sig_class = 0;
163          center_window (dlg, NULL);  
164          return TRUE;      switch (msg) {
165        case WM_INITDIALOG:
166      case WM_COMMAND:          SetWindowText (dlg, _("Choose Signature Class"));
167          switch( LOWORD( wparam ) ) {          SetDlgItemText (dlg, IDC_SIGCLASS_TITLEINF, _("How carefully have you verified the key you are about to sign actually belongs to the person? If you don't know what to anwser, use \"0\"."));
168          case IDOK:          SetDlgItemText (dlg, IDC_SIGCLASS_CLASS0, _("(0) I will not answer (default)"));
169              if (IsDlgButtonChecked (dlg, IDC_SIGCLASS_CLASS0))          SetDlgItemText (dlg, IDC_SIGCLASS_CLASS1, _("(1) I have not checked at all."));
170                  sig_class_choice = 0;          SetDlgItemText (dlg, IDC_SIGCLASS_CLASS2, _("(2) I have done causal checking."));
171              else if (IsDlgButtonChecked (dlg, IDC_SIGCLASS_CLASS1))          SetDlgItemText (dlg, IDC_SIGCLASS_CLASS3, _("(3) I have done very careful checkings."));
172                  sig_class_choice = 1;          CheckDlgButton (dlg, IDC_SIGCLASS_CLASS0, BST_CHECKED);
173              else if (IsDlgButtonChecked (dlg, IDC_SIGCLASS_CLASS2))          SetForegroundWindow (dlg);
174                  sig_class_choice = 2;          center_window (dlg, NULL);
175              else if (IsDlgButtonChecked (dlg, IDC_SIGCLASS_CLASS3))          return TRUE;
176                  sig_class_choice = 3;  
177              else      case WM_COMMAND:
178                  sig_class_choice = 0;          switch (LOWORD (wparam)) {
179              EndDialog (dlg, TRUE);          case IDOK:
180              return TRUE;              if (IsDlgButtonChecked (dlg, IDC_SIGCLASS_CLASS0))
181          }                  sig_class = 0;
182          break;              else if (IsDlgButtonChecked (dlg, IDC_SIGCLASS_CLASS1))
183      }                  sig_class = 1;
184                else if (IsDlgButtonChecked (dlg, IDC_SIGCLASS_CLASS2))
185      return FALSE;                  sig_class = 2;
186  }              else if (IsDlgButtonChecked (dlg, IDC_SIGCLASS_CLASS3))
187                    sig_class = 3;
188                else
189  /* Return the humand friendly expiration date of @key. */                  sig_class = 0;
190  static const char*              EndDialog (dlg, sig_class);
191  get_expire_date (gpgme_key_t key)              return TRUE;
192  {  
193      static char tmp[64];          case IDCANCEL:
194                EndDialog (dlg, 0);
195      u32 u = key->subkeys->expires;              return TRUE;
196      if (!u)          }
197          return "never";          break;
198      return get_key_expire_date (u);      }
199  }  
200        return FALSE;
201    }
202  /* Dialog box procedure to sign a key. */  
203  BOOL CALLBACK  
204  keysign_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)  /* Return the humand friendly expiration date of @key. */
205  {  static const char*
206      static winpt_key_t key;  get_expire_date (gpgme_key_t key)
207      GpgKeyEdit *ke;  {
208      gpgme_error_t err;      u32 u = key->subkeys->expires;
209      gpgme_key_t k;      if (!u)
210      SYSTEMTIME st;          return _("never");
211      HWND h;      return get_key_expire_date (u);
212      char keymsg[4096], pwd[256], *uid = NULL;  }
213      const char *keyid, *s;  
214      u32 created;  /* Display photo of key @key in a separate window. */
215      int type, expires=0, idx;  static void
216        show_photo (winpt_key_t key)
217      switch ( msg )  {  {
218      case WM_INITDIALOG:      /* XXX: fill it with life. */
219          if (lparam == NULL)  }
220              dlg_fatal_error (dlg, "Could not get dialog param.");  
221          #ifndef LANG_DE  
222          SetWindowText (dlg, _("Key Signing"));  /* Check if the given system time @st points to today. */
223          #endif  static int
224          key = (winpt_key_t) lparam;  date_is_today (SYSTEMTIME *st)
225          created = key->ctx->subkeys->timestamp;  {
226          s = key->ctx->uids->uid;      time_t t;
227          if (s)      struct tm *tm;
228              uid = utf8_to_wincp (s, strlen (s));  
229          _snprintf (keymsg, sizeof keymsg -1,      t = time (NULL);
230                     _("pub %d/%s  created: %s    expires: %s\n\n"      tm = localtime (&t);
231                       "Primary key fingerprint: %s\n\n"      if (st->wDay == tm->tm_mday &&
232                       "\t%s\n\n"          st->wYear == tm->tm_year+1900 &&
233                       "\nAre you really sure that you want to sign this key with YOUR key?\n"),          st->wMonth == tm->tm_mon+1)
234                     key->ctx->subkeys->length,          return -1;
235                     key->ctx->subkeys->keyid+8,      return 0;
236                     get_key_created (key->ctx->subkeys->timestamp),  }
237                     get_expire_date (key->ctx),  
238                     get_printable_fpr (key->ctx->subkeys->fpr),  
239                     uid);  /* Dialog box procedure to sign a key. */
240          free (uid);  BOOL CALLBACK
241          s = key->ctx->subkeys->keyid;  keysign_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)
242          if (do_fill_seckeylist (dlg, s)) {  {
243              msg_box( dlg, _("No valid secret key found."), _("Key Signing"), MB_ERR );      static winpt_key_t key;
244              EndDialog( dlg, FALSE );      GpgKeyEdit *ke;
245          }      gpgme_error_t err;
246          SetDlgItemText (dlg, IDC_KEYSIGN_INFOS, keymsg);      gpgme_key_t k;
247          #ifndef LANG_DE      SYSTEMTIME st;
248          SetDlgItemText (dlg, IDC_KEYSIGN_LOCAL, _("Sign local only (non exportable signature)"));      HWND h;
249          SetDlgItemText (dlg, IDC_KEYSIGN_EXPSIG, _("Signature expires on"));      char keymsg[2048], pwd[256];
250          SetDlgItemText (dlg, IDC_KEYSIGN_NREV, _("Sign non-revocably"));      char *uid = NULL;
251          #endif      const char *keyid, *s;
252          CheckDlgButton (dlg, IDC_KEYSIGN_LOCAL, BST_CHECKED);      int type, expires=0, idx;
253          CheckDlgButton (dlg, IDC_KEYSIGN_EXPSIG, BST_UNCHECKED);      int sig_class = 0;
254          CheckDlgButton (dlg, IDC_KEYSIGN_ASKLEVEL, BST_UNCHECKED);      
255          EnableWindow (GetDlgItem (dlg, IDC_KEYSIGN_EXPIRES), FALSE);      switch (msg)  {
256          if (reg_prefs.expert == 0)      case WM_INITDIALOG:
257              ShowWindow (GetDlgItem (dlg, IDC_KEYSIGN_NREV), SW_HIDE);          if (lparam == 0)
258          SetForegroundWindow( dlg );              dlg_fatal_error (dlg, "could not get dialog param.");
259          h = GetDlgItem( dlg, IDC_KEYSIGN_PASSPHRASE );          SetWindowText (dlg, _("Key Signing"));
260          SetFocus( h );          key = (winpt_key_t) lparam;
261          return FALSE;          s = key->ctx->uids->uid;
262                uid = utf8_to_wincp (s, strlen (s));
263      case WM_DESTROY:          _snprintf (keymsg, sizeof keymsg -1,
264          sig_class_choice = 0;                     _("pub %d/%s  created: %s    expires: %s\n\n"
265          break;                       "Primary key fingerprint: %s\n\n"
266                         "\t%s\n\n"
267      case WM_SYSCOMMAND:                       "\nAre you really sure that you want to sign this key with YOUR key?\n"),
268          if( LOWORD( wparam ) == SC_CLOSE ) {                     key->ctx->subkeys->length,
269              SetDlgItemText( dlg, IDC_KEYSIGN_PASSPHRASE, "" );                     key->ctx->subkeys->keyid+8,
270              EndDialog( dlg, TRUE );                     get_key_created (key->ctx->subkeys->timestamp),
271          }                     get_expire_date (key->ctx),
272          return FALSE;                     get_printable_fpr (key->ctx->subkeys->fpr),
273                               uid);
274      case WM_COMMAND:          safe_free (uid);
275          if( HIWORD( wparam ) == CBN_SELCHANGE ) {          s = key->ctx->subkeys->keyid;
276              do_check_protection( dlg );          if (do_fill_seckeylist (dlg, s)) {
277              break;              msg_box (dlg, _("No valid secret key found."), _("Key Signing"), MB_ERR);
278          }              EndDialog (dlg, FALSE);
279          if (HIWORD (wparam) == BN_CLICKED && LOWORD (wparam) == IDC_KEYSIGN_EXPSIG) {          }
280              int enable = IsDlgButtonChecked (dlg, IDC_KEYSIGN_EXPSIG);          do_check_protection (dlg);
281              EnableWindow (GetDlgItem (dlg, IDC_KEYSIGN_EXPIRES), enable? TRUE : FALSE);          SetDlgItemText (dlg, IDC_KEYSIGN_INFOS, keymsg);
282          }          SetDlgItemText (dlg, IDC_KEYSIGN_LOCAL, _("Sign local only (non exportable signature)"));
283            SetDlgItemText (dlg, IDC_KEYSIGN_EXPSIG, _("Signature expires on"));
284          switch( LOWORD( wparam ) ) {          SetDlgItemText (dlg, IDC_KEYSIGN_NREV, _("Sign non-revocably"));
285          case IDOK:          SetDlgItemText (dlg, IDC_KEYSIGN_ASKLEVEL, _("&Ask for certification level"));
286              if (IsDlgButtonChecked (dlg, IDC_KEYSIGN_ASKLEVEL))          SetDlgItemText (dlg, IDC_KEYSIGN_PWDINF, _("Passphrase"));
287                  dialog_box_param (glob_hinst, (LPCSTR)IDD_WINPT_SIGCLASS, dlg,          SetDlgItemText (dlg, IDCANCEL, _("&Cancel"));
288                                    sig_class_dlg_proc, (LPARAM)NULL,          SetDlgItemText (dlg, IDC_KEYSIGN_SHOWIMG, _("&Show photo"));
289                                    _("Choose Signature Class"),  IDS_WINPT_SIGCLASS);          SetDlgItemText (dlg, IDC_KEYSIGN_HIDE, _("&Hide Typing"));
290              type = IsDlgButtonChecked (dlg, IDC_KEYSIGN_LOCAL);          CheckDlgButton (dlg, IDC_KEYSIGN_LOCAL, BST_CHECKED);
291              if (type)          CheckDlgButton (dlg, IDC_KEYSIGN_EXPSIG, BST_UNCHECKED);
292                  type = GPG_EDITKEY_LSIGN;          CheckDlgButton (dlg, IDC_KEYSIGN_ASKLEVEL, BST_UNCHECKED);
293              else          EnableWindow (GetDlgItem (dlg, IDC_KEYSIGN_EXPIRES), FALSE);
294                  type = GPG_EDITKEY_SIGN;          if (reg_prefs.expert == 0)
295                ShowWindow (GetDlgItem (dlg, IDC_KEYSIGN_NREV), SW_HIDE);
296              if (reg_prefs.expert && IsDlgButtonChecked (dlg, IDC_KEYSIGN_NREV)) {          if (key->ext && key->ext->attrib.len > 0)
297                  type = GPG_EDITKEY_NRSIGN;              EnableWindow (GetDlgItem (dlg, IDC_KEYSIGN_SHOWIMG), TRUE);
298                  if (type == GPG_EDITKEY_LSIGN)          if (!reg_prefs.gpg.ask_cert_level)
299                      type = GPG_EDITKEY_NRLSIGN;              EnableWindow (GetDlgItem (dlg, IDC_KEYSIGN_ASKLEVEL), FALSE);
300              }          if (!reg_prefs.gpg.ask_cert_expire)
301              if (IsDlgButtonChecked (dlg, IDC_KEYSIGN_EXPSIG)) {              EnableWindow (GetDlgItem (dlg, IDC_KEYSIGN_EXPSIG), FALSE);
302                  expires = 1;          CheckDlgButton (dlg, IDC_KEYSIGN_HIDE, BST_CHECKED);
303                  DateTime_GetSystemtime (GetDlgItem (dlg, IDC_KEYSIGN_EXPIRES), &st);          SetForegroundWindow (dlg);
304                  sprintf (keymsg, "%04d-%02d-%02d", st.wYear, st.wMonth, st.wDay);          h = GetDlgItem (dlg, IDC_KEYSIGN_PASSPHRASE);
305              }          SetFocus (h);
306            return FALSE;
307              /* XXX: check for --ask-cert-level and --ask-cert-expire in the gpg.conf  
308                      if an advanced button is checked and offer to add it to the config      case WM_SYSCOMMAND:
309                      file. */          if (LOWORD (wparam) == SC_CLOSE) {
310                SetDlgItemText (dlg, IDC_KEYSIGN_PASSPHRASE, "");
311              GetDlgItemText( dlg, IDC_KEYSIGN_PASSPHRASE, pwd, DIM (pwd)-1);              EndDialog (dlg, TRUE);
312              keyid = key->ctx->subkeys->keyid;          }
313              if( !keyid ) {          return FALSE;
314                  msg_box( dlg, _("Could not get Key ID from key."), _("Key Signing"), MB_ERR );          
315                  return TRUE;      case WM_COMMAND:
316              }          if (HIWORD (wparam) == CBN_SELCHANGE) {
317              ke = new GpgKeyEdit (keyid);              do_check_protection (dlg);
318              if (!ke)              break;
319                  BUG (NULL);          }
320              ke->setPassphrase (pwd);          if (HIWORD (wparam) == BN_CLICKED &&
321              idx = SendDlgItemMessage (dlg, IDC_KEYSIGN_KEYLIST, CB_GETCURSEL, 0, 0);              LOWORD (wparam) == IDC_KEYSIGN_EXPSIG) {
322              k = (gpgme_key_t)SendDlgItemMessage (dlg, IDC_KEYSIGN_KEYLIST,              int enable = IsDlgButtonChecked (dlg, IDC_KEYSIGN_EXPSIG);
323                                                   CB_GETITEMDATA, (WPARAM)idx, 0);              EnableWindow (GetDlgItem (dlg, IDC_KEYSIGN_EXPIRES), enable? TRUE : FALSE);
324              if (k)          }
325                  ke->setLocalUser (k);          if (HIWORD (wparam) == BN_CLICKED &&
326                LOWORD (wparam) == IDC_KEYSIGN_HIDE) {
327              err = ke->signKey (type, sig_class_choice, expires? keymsg : "0");              HWND hwnd = GetDlgItem (dlg, IDC_KEYSIGN_PASSPHRASE);
328              memset (&pwd, 0, sizeof pwd);                        int hide = IsDlgButtonChecked (dlg, IDC_KEYSIGN_HIDE);
329              if (err) {              SendMessage (hwnd, EM_SETPASSWORDCHAR, hide? '*' : 0, 0);
330                  delete ke;              SetFocus (hwnd);
331                  msg_box (dlg, gpgme_strerror (err), _("Key Signing"), MB_ERR);          }
332                  return TRUE;  
333              }          switch (LOWORD (wparam)) {
334              if (ke->getResultValue () != 0)          case IDOK:
335                  msg_box (dlg, _("This key is already signed by your key"), _("Key Signing"), MB_INFO);              if (IsDlgButtonChecked (dlg, IDC_KEYSIGN_ASKLEVEL))
336              else {                  sig_class = dialog_box_param (glob_hinst,
337                  status_box (dlg, _("Key successfully signed."), PGM_NAME);                                                (LPCSTR)IDD_WINPT_SIGCLASS, dlg,
338                  key->update = 1;                                                sig_class_dlg_proc, (LPARAM)NULL,
339              }                                                _("Choose Signature Class"),
340              delete ke;                                                IDS_WINPT_SIGCLASS);
341              EndDialog (dlg, TRUE);              type = IsDlgButtonChecked (dlg, IDC_KEYSIGN_LOCAL);
342              return TRUE;              if (type)
343                                type = GPG_EDITKEY_LSIGN;
344          case IDCANCEL:              else
345              EndDialog (dlg, FALSE);                  type = GPG_EDITKEY_SIGN;
346              return TRUE;  
347          }              if (reg_prefs.expert && IsDlgButtonChecked (dlg, IDC_KEYSIGN_NREV)) {
348          break;                  type = GPG_EDITKEY_NRSIGN;
349      }                  if (type == GPG_EDITKEY_LSIGN)
350                            type = GPG_EDITKEY_NRLSIGN;
351      return FALSE;              }
352  }              if (IsDlgButtonChecked (dlg, IDC_KEYSIGN_EXPSIG)) {
353                    DateTime_GetSystemtime (GetDlgItem (dlg, IDC_KEYSIGN_EXPIRES), &st);
354                    if (date_is_today (&st)) {
355                        msg_box (dlg, _("You cannot select today as the expiration date."),
356                                 _("Key Signing"), MB_INFO);
357                        return TRUE;
358                    }
359                    else
360                        expires = 1;
361                    sprintf (keymsg, "%04d-%02d-%02d", st.wYear, st.wMonth, st.wDay);
362                }
363    
364                /* XXX: check for --ask-cert-level and --ask-cert-expire in the gpg.conf
365                        if an advanced button is checked and offer to add it to the config
366                        file. */
367    
368                GetDlgItemText( dlg, IDC_KEYSIGN_PASSPHRASE, pwd, DIM (pwd)-1);
369                keyid = key->ctx->subkeys->keyid;
370                if( !keyid ) {
371                    msg_box( dlg, _("Could not get Key ID from key."), _("Key Signing"), MB_ERR );
372                    return TRUE;
373                }
374                ke = new GpgKeyEdit (keyid);
375                if (!ke)
376                    BUG (NULL);
377                ke->setPassphrase (pwd);
378                idx = SendDlgItemMessage (dlg, IDC_KEYSIGN_KEYLIST, CB_GETCURSEL, 0, 0);
379                k = (gpgme_key_t)SendDlgItemMessage (dlg, IDC_KEYSIGN_KEYLIST,
380                                                     CB_GETITEMDATA, (WPARAM)idx, 0);
381                if (k)
382                    ke->setLocalUser (k);
383    
384                err = ke->signKey (type, sig_class, expires? keymsg : "0");
385                wipememory (pwd, sizeof (pwd));
386                if (err) {
387                    delete ke;
388                    msg_box (dlg, gpgme_strerror (err), _("Key Signing"), MB_ERR);
389                    return TRUE;
390                }
391                if (ke->getResult () != 0)
392                    msg_box (dlg, _("This key is already signed by your key"),
393                             _("Key Signing"), MB_INFO);
394                else {
395                    status_box (dlg, _("Key successfully signed."), _("Key Signing"));
396                    key->update = 1;
397                }
398                delete ke;
399                EndDialog (dlg, TRUE);
400                return TRUE;
401                
402            case IDCANCEL:
403                EndDialog (dlg, FALSE);
404                return TRUE;
405    
406            case IDC_KEYSIGN_SHOWIMG:
407                show_photo (key);
408                return TRUE;
409            }
410            break;
411        }
412        
413        return FALSE;
414    }
415    

Legend:
Removed from v.25  
changed lines
  Added in v.181

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26