/* -*- c++ -*- keyrequester.cpp This file is part of libkleopatra, the KDE keymanagement library Copyright (c) 2004 Klar�vdalens Datakonsult AB Libkleopatra is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. Libkleopatra is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA In addition, as a special exception, the copyright holders give permission to link the code of this program with any edition of the TQt library by Trolltech AS, Norway (or with modified versions of TQt that use the same license as TQt), and distribute linked combinations including the two. You must obey the GNU General Public License in all respects for all of the code used other than TQt. If you modify this file, you may extend this exception to your version of the file, but you are not obligated to do so. If you do not wish to do so, delete this exception statement from your version. Based on kpgpui.cpp Copyright (C) 2001,2002 the KPGP authors See file libtdenetwork/AUTHORS.kpgp for details This file is part of KPGP, the KDE PGP/GnuPG support library. KPGP is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA */ #ifdef HAVE_CONFIG_H #include #endif #include "keyrequester.h" #include "keyselectiondialog.h" #include #include #include // gpgme++ #include #include // KDE #include #include #include #include #include #include // TQt #include #include #include #include #include #include #include #include Kleo::KeyRequester::KeyRequester( unsigned int allowedKeys, bool multipleKeys, TQWidget * parent, const char * name ) : TQWidget( parent, name ), mOpenPGPBackend( 0 ), mSMIMEBackend( 0 ), mMulti( multipleKeys ), mKeyUsage( allowedKeys ), mJobs( 0 ), d( 0 ) { init(); } Kleo::KeyRequester::KeyRequester( TQWidget * parent, const char * name ) : TQWidget( parent, name ), mOpenPGPBackend( 0 ), mSMIMEBackend( 0 ), mMulti( false ), mKeyUsage( 0 ), mJobs( 0 ), d( 0 ) { init(); } void Kleo::KeyRequester::init() { TQHBoxLayout * hlay = new TQHBoxLayout( this, 0, KDialog::spacingHint() ); // the label where the key id is to be displayed: mLabel = new TQLabel( this ); mLabel->setFrameStyle( TQFrame::Panel | TQFrame::Sunken ); // the button to unset any key: mEraseButton = new KPushButton( this ); mEraseButton->setAutoDefault( false ); mEraseButton->tqsetSizePolicy( TQSizePolicy( TQSizePolicy::Minimum, TQSizePolicy::Minimum ) ); mEraseButton->setIconSet( SmallIconSet( TQApplication::reverseLayout() ? "locationbar_erase" : "clear_left" ) ); TQToolTip::add( mEraseButton, i18n("Clear") ); // the button to call the KeySelectionDialog: mDialogButton = new TQPushButton( i18n("Change..."), this ); mDialogButton->setAutoDefault( false ); hlay->addWidget( mLabel, 1 ); hlay->addWidget( mEraseButton ); hlay->addWidget( mDialogButton ); connect( mEraseButton, TQT_SIGNAL(clicked()), TQT_SLOT(slotEraseButtonClicked()) ); connect( mDialogButton, TQT_SIGNAL(clicked()), TQT_SLOT(slotDialogButtonClicked()) ); tqsetSizePolicy( TQSizePolicy( TQSizePolicy::MinimumExpanding, TQSizePolicy::Fixed ) ); setAllowedKeys( mKeyUsage ); } Kleo::KeyRequester::~KeyRequester() { } const std::vector & Kleo::KeyRequester::keys() const { return mKeys; } const GpgME::Key & Kleo::KeyRequester::key() const { if ( mKeys.empty() ) return GpgME::Key::null; else return mKeys.front(); } void Kleo::KeyRequester::setKeys( const std::vector & keys ) { mKeys.clear(); for ( std::vector::const_iterator it = keys.begin() ; it != keys.end() ; ++it ) if ( !it->isNull() ) mKeys.push_back( *it ); updateKeys(); } void Kleo::KeyRequester::setKey( const GpgME::Key & key ) { mKeys.clear(); if ( !key.isNull() ) mKeys.push_back( key ); updateKeys(); } TQString Kleo::KeyRequester::fingerprint() const { if ( mKeys.empty() ) return TQString(); else return mKeys.front().primaryFingerprint(); } TQStringList Kleo::KeyRequester::fingerprints() const { TQStringList result; for ( std::vector::const_iterator it = mKeys.begin() ; it != mKeys.end() ; ++it ) if ( !it->isNull() ) if ( const char * fpr = it->primaryFingerprint() ) result.push_back( fpr ); return result; } void Kleo::KeyRequester::setFingerprint( const TQString & fingerprint ) { startKeyListJob( fingerprint ); } void Kleo::KeyRequester::setFingerprints( const TQStringList & fingerprints ) { startKeyListJob( fingerprints ); } void Kleo::KeyRequester::updateKeys() { if ( mKeys.empty() ) { mLabel->clear(); return; } if ( mKeys.size() > 1 ) setMultipleKeysEnabled( true ); TQStringList labelTexts; TQString toolTipText; for ( std::vector::const_iterator it = mKeys.begin() ; it != mKeys.end() ; ++it ) { if ( it->isNull() ) continue; const TQString fpr = it->primaryFingerprint(); labelTexts.push_back( fpr.right(8) ); toolTipText += fpr.right(8) + ": "; if ( const char * uid = it->userID(0).id() ) if ( it->protocol() == GpgME::Context::OpenPGP ) toolTipText += TQString::fromUtf8( uid ); else toolTipText += Kleo::DN( uid ).prettyDN(); else toolTipText += i18n(""); toolTipText += '\n'; } mLabel->setText( labelTexts.join(", ") ); TQToolTip::remove( mLabel ); TQToolTip::add( mLabel, toolTipText ); } #ifndef __KLEO_UI_SHOW_KEY_LIST_ERROR_H__ #define __KLEO_UI_SHOW_KEY_LIST_ERROR_H__ static void showKeyListError( TQWidget * parent, const GpgME::Error & err ) { assert( err ); const TQString msg = i18n( "

An error occurred while fetching " "the keys from the backend:

" "

%1

" ) .tqarg( TQString::fromLocal8Bit( err.asString() ) ); KMessageBox::error( parent, msg, i18n( "Key Listing Failed" ) ); } #endif // __KLEO_UI_SHOW_KEY_LIST_ERROR_H__ void Kleo::KeyRequester::startKeyListJob( const TQStringList & fingerprints ) { if ( !mSMIMEBackend && !mOpenPGPBackend ) return; mTmpKeys.clear(); mJobs = 0; unsigned int count = 0; for ( TQStringList::const_iterator it = fingerprints.begin() ; it != fingerprints.end() ; ++it ) if ( !(*it).stripWhiteSpace().isEmpty() ) ++count; if ( !count ) { // don't fall into the trap that an empty pattern means // "return all keys" :) setKey( GpgME::Key::null ); return; } if ( mOpenPGPBackend ) { KeyListJob * job = mOpenPGPBackend->keyListJob( false ); // local, no sigs if ( !job ) { KMessageBox::error( this, i18n("The OpenPGP backend does not support listing keys. " "Check your installation."), i18n("Key Listing Failed") ); } else { connect( job, TQT_SIGNAL(result(const GpgME::KeyListResult&)), TQT_SLOT(slotKeyListResult(const GpgME::KeyListResult&)) ); connect( job, TQT_SIGNAL(nextKey(const GpgME::Key&)), TQT_SLOT(slotNextKey(const GpgME::Key&)) ); const GpgME::Error err = job->start( fingerprints, mKeyUsage & Kleo::KeySelectionDialog::SecretKeys && !( mKeyUsage & Kleo::KeySelectionDialog::PublicKeys ) ); if ( err ) showKeyListError( this, err ); else ++mJobs; } } if ( mSMIMEBackend ) { KeyListJob * job = mSMIMEBackend->keyListJob( false ); // local, no sigs if ( !job ) { KMessageBox::error( this, i18n("The S/MIME backend does not support listing keys. " "Check your installation."), i18n("Key Listing Failed") ); } else { connect( job, TQT_SIGNAL(result(const GpgME::KeyListResult&)), TQT_SLOT(slotKeyListResult(const GpgME::KeyListResult&)) ); connect( job, TQT_SIGNAL(nextKey(const GpgME::Key&)), TQT_SLOT(slotNextKey(const GpgME::Key&)) ); const GpgME::Error err = job->start( fingerprints, mKeyUsage & Kleo::KeySelectionDialog::SecretKeys && !( mKeyUsage & Kleo::KeySelectionDialog::PublicKeys ) ); if ( err ) showKeyListError( this, err ); else ++mJobs; } } if ( mJobs > 0 ) { mEraseButton->setEnabled( false ); mDialogButton->setEnabled( false ); } } void Kleo::KeyRequester::slotNextKey( const GpgME::Key & key ) { if ( !key.isNull() ) mTmpKeys.push_back( key ); } void Kleo::KeyRequester::slotKeyListResult( const GpgME::KeyListResult & res ) { if ( res.error() ) showKeyListError( this, res.error() ); if ( --mJobs <= 0 ) { mEraseButton->setEnabled( true ); mDialogButton->setEnabled( true ); setKeys( mTmpKeys ); mTmpKeys.clear(); } } void Kleo::KeyRequester::slotDialogButtonClicked() { KeySelectionDialog * dlg = mKeys.empty() ? new KeySelectionDialog( mDialogCaption, mDialogMessage, mInitialQuery, mKeyUsage, mMulti, false, this ) : new KeySelectionDialog( mDialogCaption, mDialogCaption, mKeys, mKeyUsage, mMulti, false, this ) ; if ( dlg->exec() == TQDialog::Accepted ) { if ( mMulti ) setKeys( dlg->selectedKeys() ); else setKey( dlg->selectedKey() ); emit changed(); } delete dlg; } void Kleo::KeyRequester::slotEraseButtonClicked() { if ( !mKeys.empty() ) emit changed(); mKeys.clear(); updateKeys(); } void Kleo::KeyRequester::setDialogCaption( const TQString & caption ) { mDialogCaption = caption; } void Kleo::KeyRequester::setDialogMessage( const TQString & msg ) { mDialogMessage = msg; } bool Kleo::KeyRequester::isMultipleKeysEnabled() const { return mMulti; } void Kleo::KeyRequester::setMultipleKeysEnabled( bool multi ) { if ( multi == mMulti ) return; if ( !multi && !mKeys.empty() ) mKeys.erase( mKeys.begin() + 1, mKeys.end() ); mMulti = multi; updateKeys(); } unsigned int Kleo::KeyRequester::allowedKeys() const { return mKeyUsage; } void Kleo::KeyRequester::setAllowedKeys( unsigned int keyUsage ) { mKeyUsage = keyUsage; mOpenPGPBackend = 0; mSMIMEBackend = 0; if ( mKeyUsage & KeySelectionDialog::OpenPGPKeys ) mOpenPGPBackend = Kleo::CryptoBackendFactory::instance()->openpgp(); if ( mKeyUsage & KeySelectionDialog::SMIMEKeys ) mSMIMEBackend = Kleo::CryptoBackendFactory::instance()->smime(); if ( mOpenPGPBackend && !mSMIMEBackend ) { mDialogCaption = i18n("OpenPGP Key Selection"); mDialogMessage = i18n("Please select an OpenPGP key to use."); } else if ( !mOpenPGPBackend && mSMIMEBackend ) { mDialogCaption = i18n("S/MIME Key Selection"); mDialogMessage = i18n("Please select an S/MIME key to use."); } else { mDialogCaption = i18n("Key Selection"); mDialogMessage = i18n("Please select an (OpenPGP or S/MIME) key to use."); } } TQPushButton * Kleo::KeyRequester::dialogButton() { return mDialogButton; } TQPushButton * Kleo::KeyRequester::eraseButton() { return mEraseButton; } static inline unsigned int foo( bool openpgp, bool smime, bool trusted, bool valid ) { unsigned int result = 0; if ( openpgp ) result |= Kleo::KeySelectionDialog::OpenPGPKeys; if ( smime ) result |= Kleo::KeySelectionDialog::SMIMEKeys; if ( trusted ) result |= Kleo::KeySelectionDialog::TrustedKeys; if ( valid ) result |= Kleo::KeySelectionDialog::ValidKeys; return result; } static inline unsigned int encryptionKeyUsage( bool openpgp, bool smime, bool trusted, bool valid ) { return foo( openpgp, smime, trusted, valid ) | Kleo::KeySelectionDialog::EncryptionKeys | Kleo::KeySelectionDialog::PublicKeys; } static inline unsigned int signingKeyUsage( bool openpgp, bool smime, bool trusted, bool valid ) { return foo( openpgp, smime, trusted, valid ) | Kleo::KeySelectionDialog::SigningKeys | Kleo::KeySelectionDialog::SecretKeys; } Kleo::EncryptionKeyRequester::EncryptionKeyRequester( bool multi, unsigned int proto, TQWidget * parent, const char * name, bool onlyTrusted, bool onlyValid ) : KeyRequester( encryptionKeyUsage( proto & OpenPGP, proto & SMIME, onlyTrusted, onlyValid ), multi, parent, name ) { } Kleo::EncryptionKeyRequester::EncryptionKeyRequester( TQWidget * parent, const char * name ) : KeyRequester( 0, false, parent, name ) { } Kleo::EncryptionKeyRequester::~EncryptionKeyRequester() {} void Kleo::EncryptionKeyRequester::setAllowedKeys( unsigned int proto, bool onlyTrusted, bool onlyValid ) { KeyRequester::setAllowedKeys( encryptionKeyUsage( proto & OpenPGP, proto & SMIME, onlyTrusted, onlyValid ) ); } Kleo::SigningKeyRequester::SigningKeyRequester( bool multi, unsigned int proto, TQWidget * parent, const char * name, bool onlyTrusted, bool onlyValid ) : KeyRequester( signingKeyUsage( proto & OpenPGP, proto & SMIME, onlyTrusted, onlyValid ), multi, parent, name ) { } Kleo::SigningKeyRequester::SigningKeyRequester( TQWidget * parent, const char * name ) : KeyRequester( 0, false, parent, name ) { } Kleo::SigningKeyRequester::~SigningKeyRequester() {} void Kleo::SigningKeyRequester::setAllowedKeys( unsigned int proto, bool onlyTrusted, bool onlyValid ) { KeyRequester::setAllowedKeys( signingKeyUsage( proto & OpenPGP, proto & SMIME, onlyTrusted, onlyValid ) ); } void Kleo::KeyRequester::virtual_hook( int, void* ) {} void Kleo::EncryptionKeyRequester::virtual_hook( int id, void * data ) { KeyRequester::virtual_hook( id, data ); } void Kleo::SigningKeyRequester::virtual_hook( int id, void * data ) { KeyRequester::virtual_hook( id, data ); } #include "keyrequester.moc"