You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
441 lines
16 KiB
441 lines
16 KiB
/*
|
|
certificateinfowidgetimpl.cpp
|
|
|
|
This file is part of Kleopatra, the KDE keymanager
|
|
Copyright (c) 2001,2002,2004 Klarälvdalens Datakonsult AB
|
|
|
|
Kleopatra is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
Kleopatra is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
|
|
In addition, as a special exception, the copyright holders give
|
|
permission to link the code of this program with any edition of
|
|
the TQt library by Trolltech AS, Norway (or with modified versions
|
|
of TQt that use the same license as TQt), and distribute linked
|
|
combinations including the two. You must obey the GNU General
|
|
Public License in all respects for all of the code used other than
|
|
TQt. If you modify this file, you may extend this exception to
|
|
your version of the file, but you are not obligated to do so. If
|
|
you do not wish to do so, delete this exception statement from
|
|
your version.
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include <config.h>
|
|
#endif
|
|
|
|
#include "certificateinfowidgetimpl.h"
|
|
|
|
// libkleopatra
|
|
#include <kleo/keylistjob.h>
|
|
#include <kleo/dn.h>
|
|
#include <kleo/cryptobackendfactory.h>
|
|
|
|
#include <ui/progressdialog.h>
|
|
|
|
// gpgme++
|
|
#include <gpgmepp/keylistresult.h>
|
|
|
|
// KDE
|
|
#include <klocale.h>
|
|
#include <kdialogbase.h>
|
|
#include <kmessagebox.h>
|
|
#include <kdebug.h>
|
|
#include <kprocio.h>
|
|
#include <kglobalsettings.h>
|
|
|
|
// TQt
|
|
#include <tqlistview.h>
|
|
#include <tqtextedit.h>
|
|
#include <tqheader.h>
|
|
#include <tqpushbutton.h>
|
|
#include <tqcursor.h>
|
|
#include <tqapplication.h>
|
|
#include <tqdatetime.h>
|
|
#include <tqstylesheet.h>
|
|
#include <tqtextcodec.h>
|
|
|
|
// other
|
|
#include <assert.h>
|
|
|
|
CertificateInfoWidgetImpl::CertificateInfoWidgetImpl( const GpgME::Key & key, bool external,
|
|
TQWidget * parent, const char * name )
|
|
: CertificateInfoWidget( parent, name ),
|
|
mExternal( external ),
|
|
mFoundIssuer( true ),
|
|
mHaveKeyLocally( false )
|
|
{
|
|
importButton->setEnabled( false );
|
|
|
|
listView->setColumnWidthMode( 1, TQListView::Maximum );
|
|
TQFontMetrics fm = fontMetrics();
|
|
listView->setColumnWidth( 1, fm.width( i18n("Information") ) * 5 );
|
|
|
|
listView->header()->setClickEnabled( false );
|
|
listView->setSorting( -1 );
|
|
|
|
connect( listView, TQT_SIGNAL( selectionChanged( TQListViewItem* ) ),
|
|
this, TQT_SLOT( slotShowInfo( TQListViewItem* ) ) );
|
|
pathView->setColumnWidthMode( 0, TQListView::Maximum );
|
|
pathView->header()->hide();
|
|
|
|
connect( pathView, TQT_SIGNAL( doubleClicked( TQListViewItem* ) ),
|
|
this, TQT_SLOT( slotShowCertPathDetails( TQListViewItem* ) ) );
|
|
connect( pathView, TQT_SIGNAL( returnPressed( TQListViewItem* ) ),
|
|
this, TQT_SLOT( slotShowCertPathDetails( TQListViewItem* ) ) );
|
|
connect( importButton, TQT_SIGNAL( clicked() ),
|
|
this, TQT_SLOT( slotImportCertificate() ) );
|
|
|
|
dumpView->setFont( KGlobalSettings::fixedFont() );
|
|
|
|
if ( !key.isNull() )
|
|
setKey( key );
|
|
}
|
|
|
|
static TQString time_t2string( time_t t ) {
|
|
TQDateTime dt;
|
|
dt.setTime_t( t );
|
|
return dt.toString();
|
|
}
|
|
|
|
void CertificateInfoWidgetImpl::setKey( const GpgME::Key & key ) {
|
|
mChain.clear();
|
|
mFoundIssuer = true;
|
|
mHaveKeyLocally = false;
|
|
|
|
listView->clear();
|
|
pathView->clear();
|
|
importButton->setEnabled( false );
|
|
|
|
if ( key.isNull() )
|
|
return;
|
|
|
|
mChain.push_front( key );
|
|
startKeyExistanceCheck(); // starts a local keylisting to enable the
|
|
// importButton if needed
|
|
|
|
TQListViewItem * item = 0;
|
|
item = new TQListViewItem( listView, item, i18n("Valid"), TQString("From %1 to %2")
|
|
.arg( time_t2string( key.subkey(0).creationTime() ),
|
|
time_t2string( key.subkey(0).expirationTime() ) ) );
|
|
item = new TQListViewItem( listView, item, i18n("Can be used for signing"),
|
|
key.canSign() ? i18n("Yes") : i18n("No") );
|
|
item = new TQListViewItem( listView, item, i18n("Can be used for encryption"),
|
|
key.canEncrypt() ? i18n("Yes") : i18n("No") );
|
|
item = new TQListViewItem( listView, item, i18n("Can be used for certification"),
|
|
key.canCertify() ? i18n("Yes") : i18n("No") );
|
|
item = new TQListViewItem( listView, item, i18n("Can be used for authentication"),
|
|
key.canAuthenticate() ? i18n("Yes") : i18n("No" ) );
|
|
item = new TQListViewItem( listView, item, i18n("Fingerprint"), key.primaryFingerprint() );
|
|
item = new TQListViewItem( listView, item, i18n("Issuer"), Kleo::DN( key.issuerName() ).prettyDN() );
|
|
item = new TQListViewItem( listView, item, i18n("Serial Number"), key.issuerSerial() );
|
|
|
|
const Kleo::DN dn = key.userID(0).id();
|
|
|
|
// FIXME: use the attributeLabelMap from certificatewizardimpl.cpp:
|
|
static TQMap<TQString,TQString> dnComponentNames;
|
|
if ( dnComponentNames.isEmpty() ) {
|
|
dnComponentNames["C"] = i18n("Country");
|
|
dnComponentNames["OU"] = i18n("Organizational Unit");
|
|
dnComponentNames["O"] = i18n("Organization");
|
|
dnComponentNames["L"] = i18n("Location");
|
|
dnComponentNames["CN"] = i18n("Common Name");
|
|
dnComponentNames["EMAIL"] = i18n("Email");
|
|
}
|
|
|
|
for ( Kleo::DN::const_iterator dnit = dn.begin() ; dnit != dn.end() ; ++dnit ) {
|
|
TQString displayName = (*dnit).name();
|
|
if( dnComponentNames.contains(displayName) ) displayName = dnComponentNames[displayName];
|
|
item = new TQListViewItem( listView, item, displayName, (*dnit).value() );
|
|
}
|
|
|
|
const std::vector<GpgME::UserID> uids = key.userIDs();
|
|
if ( !uids.empty() ) {
|
|
item = new TQListViewItem( listView, item, i18n("Subject"),
|
|
Kleo::DN( uids.front().id() ).prettyDN() );
|
|
for ( std::vector<GpgME::UserID>::const_iterator it = uids.begin() + 1 ; it != uids.end() ; ++it ) {
|
|
if ( !(*it).id() )
|
|
continue;
|
|
const TQString email = TQString::fromUtf8( (*it).id() ).stripWhiteSpace();
|
|
if ( email.isEmpty() )
|
|
continue;
|
|
if ( email.startsWith( "<" ) )
|
|
item = new TQListViewItem( listView, item, i18n("Email"),
|
|
email.mid( 1, email.length()-2 ) );
|
|
else
|
|
item = new TQListViewItem( listView, item, i18n("A.k.a."), email );
|
|
}
|
|
}
|
|
|
|
updateChainView();
|
|
startCertificateChainListing();
|
|
startCertificateDump();
|
|
}
|
|
|
|
static void showChainListError( TQWidget * parent, const GpgME::Error & err, const char * subject ) {
|
|
assert( err );
|
|
const TQString msg = i18n("<qt><p>An error occurred while fetching "
|
|
"the certificate <b>%1</b> from the backend:</p>"
|
|
"<p><b>%2</b></p></qt>")
|
|
.arg( subject ? TQString::fromUtf8( subject ) : TQString(),
|
|
TQString::fromLocal8Bit( err.asString() ) );
|
|
KMessageBox::error( parent, msg, i18n("Certificate Listing Failed" ) );
|
|
}
|
|
|
|
void CertificateInfoWidgetImpl::startCertificateChainListing() {
|
|
kdDebug() << "CertificateInfoWidgetImpl::startCertificateChainListing()" << endl;
|
|
|
|
if ( mChain.empty() ) {
|
|
// we need a seed...
|
|
kdWarning() << "CertificateInfoWidgetImpl::startCertificateChainListing(): mChain is empty!" << endl;
|
|
return;
|
|
}
|
|
const char * chainID = mChain.front().chainID();
|
|
if ( !chainID || !*chainID ) {
|
|
// cert not found:
|
|
kdDebug() << "CertificateInfoWidgetImpl::startCertificateChainListing(): empty chain ID - root not found" << endl;
|
|
return;
|
|
}
|
|
const char * fpr = mChain.front().primaryFingerprint();
|
|
if ( tqstricmp( fpr, chainID ) == 0 ) {
|
|
kdDebug() << "CertificateInfoWidgetImpl::startCertificateChainListing(): chain_id equals fingerprint -> found root" << endl;
|
|
return;
|
|
}
|
|
if ( mChain.size() > 100 ) {
|
|
// safe guard against certificate loops (paranoia factor 8 out of 10)...
|
|
kdWarning() << "CertificateInfoWidgetImpl::startCertificateChainListing(): maximum chain length of 100 exceeded!" << endl;
|
|
return;
|
|
}
|
|
if ( !mFoundIssuer ) {
|
|
// key listing failed. Don't end up in endless loop
|
|
kdDebug() << "CertificateInfoWidgetImpl::startCertificateChainListing(): issuer not found - giving up" << endl;
|
|
return;
|
|
}
|
|
|
|
mFoundIssuer = false;
|
|
|
|
// gpgsm / dirmngr / LDAP / whoever doesn't support looking up
|
|
// external keys by fingerprint. Furthermore, since we actually got
|
|
// a chain-id set on the key, we know that we have the issuer's cert
|
|
// in the local keyring, so just use local keylisting.
|
|
Kleo::KeyListJob * job =
|
|
Kleo::CryptoBackendFactory::instance()->smime()->keyListJob( false );
|
|
assert( job );
|
|
|
|
connect( job, TQT_SIGNAL(result(const GpgME::KeyListResult&)),
|
|
TQT_SLOT(slotCertificateChainListingResult(const GpgME::KeyListResult&)) );
|
|
connect( job, TQT_SIGNAL(nextKey(const GpgME::Key&)),
|
|
TQT_SLOT(slotNextKey(const GpgME::Key&)) );
|
|
|
|
kdDebug() << "Going to fetch" << endl
|
|
<< " issuer : \"" << mChain.front().issuerName() << "\"" << endl
|
|
<< " chain id: " << mChain.front().chainID() << endl
|
|
<< "for" << endl
|
|
<< " subject : \"" << mChain.front().userID(0).id() << "\"" << endl
|
|
<< " subj.fpr: " << mChain.front().primaryFingerprint() << endl;
|
|
|
|
const GpgME::Error err = job->start( mChain.front().chainID() );
|
|
|
|
if ( err )
|
|
showChainListError( this, err, mChain.front().issuerName() );
|
|
else
|
|
(void)new Kleo::ProgressDialog( job, i18n("Fetching Certificate Chain"), this );
|
|
}
|
|
|
|
void CertificateInfoWidgetImpl::startCertificateDump() {
|
|
KProcess* proc = new KProcess( TQT_TQOBJECT(this) );
|
|
(*proc) << "gpgsm"; // must be in the PATH
|
|
(*proc) << "--dump-keys";
|
|
(*proc) << mChain.front().primaryFingerprint();
|
|
|
|
TQObject::connect( proc, TQT_SIGNAL( receivedStdout(KProcess *, char *, int) ),
|
|
this, TQT_SLOT( slotCollectStdout(KProcess *, char *, int) ) );
|
|
TQObject::connect( proc, TQT_SIGNAL( receivedStderr(KProcess *, char *, int) ),
|
|
this, TQT_SLOT( slotCollectStderr(KProcess *, char *, int) ) );
|
|
TQObject::connect( proc, TQT_SIGNAL( processExited(KProcess*) ),
|
|
this, TQT_SLOT( slotDumpProcessExited(KProcess*) ) );
|
|
|
|
if ( !proc->start( KProcess::NotifyOnExit, (KProcess::Communication)(KProcess::Stdout | KProcess::Stderr) ) ) {
|
|
TQString wmsg = i18n("Failed to execute gpgsm:\n%1").arg( i18n( "program not found" ) );
|
|
dumpView->setText( TQStyleSheet::escape( wmsg ) );
|
|
delete proc;
|
|
}
|
|
}
|
|
|
|
void CertificateInfoWidgetImpl::slotCollectStdout(KProcess *, char *buffer, int buflen)
|
|
{
|
|
mDumpOutput += TQCString(buffer, buflen+1); // like KProcIO does
|
|
}
|
|
|
|
void CertificateInfoWidgetImpl::slotCollectStderr(KProcess *, char *buffer, int buflen)
|
|
{
|
|
mDumpError += TQCString(buffer, buflen+1); // like KProcIO does
|
|
}
|
|
|
|
void CertificateInfoWidgetImpl::slotDumpProcessExited(KProcess* proc) {
|
|
int rc = ( proc->normalExit() ) ? proc->exitStatus() : -1 ;
|
|
|
|
if ( rc == 0 ) {
|
|
dumpView->setText( TQStyleSheet::escape( TQString::fromUtf8( mDumpOutput ) ) );
|
|
} else {
|
|
if ( !mDumpError.isEmpty() ) {
|
|
dumpView->setText( TQStyleSheet::escape( TQString::fromUtf8( mDumpError ) ) );
|
|
} else
|
|
{
|
|
TQString wmsg = i18n("Failed to execute gpgsm:\n%1");
|
|
if ( rc == -1 )
|
|
wmsg = wmsg.arg( i18n( "program cannot be executed" ) );
|
|
else
|
|
wmsg = wmsg.arg( strerror(rc) );
|
|
dumpView->setText( TQStyleSheet::escape( wmsg ) );
|
|
}
|
|
}
|
|
|
|
proc->deleteLater();
|
|
}
|
|
|
|
void CertificateInfoWidgetImpl::slotNextKey( const GpgME::Key & key ) {
|
|
kdDebug() << "CertificateInfoWidgetImpl::slotNextKey( \""
|
|
<< key.userID(0).id() << "\" )" << endl;
|
|
if ( key.isNull() )
|
|
return;
|
|
|
|
mFoundIssuer = true;
|
|
mChain.push_front( key );
|
|
updateChainView();
|
|
// FIXME: cancel the keylisting. We're only interested in _one_ key.
|
|
}
|
|
|
|
void CertificateInfoWidgetImpl::updateChainView() {
|
|
pathView->clear();
|
|
if ( mChain.empty() )
|
|
return;
|
|
TQListViewItem * item = 0;
|
|
|
|
TQValueList<GpgME::Key>::const_iterator it = mChain.begin();
|
|
// root item:
|
|
if ( (*it).chainID() && qstrcmp( (*it).chainID(), (*it).primaryFingerprint() ) == 0 )
|
|
item = new TQListViewItem( pathView, Kleo::DN( (*it++).userID(0).id() ).prettyDN() );
|
|
else {
|
|
item = new TQListViewItem( pathView, i18n("Issuer certificate not found ( %1)")
|
|
.arg( Kleo::DN( (*it).issuerName() ).prettyDN() ) );
|
|
item->setOpen( true ); // TQt bug: doesn't open after setEnabled( false ) :/
|
|
item->setEnabled( false );
|
|
}
|
|
item->setOpen( true );
|
|
|
|
// subsequent items:
|
|
while ( it != mChain.end() ) {
|
|
item = new TQListViewItem( item, Kleo::DN( (*it++).userID(0).id() ).prettyDN() );
|
|
item->setOpen( true );
|
|
}
|
|
}
|
|
|
|
void CertificateInfoWidgetImpl::slotCertificateChainListingResult( const GpgME::KeyListResult & res ) {
|
|
if ( res.error() )
|
|
return showChainListError( this, res.error(), mChain.front().issuerName() );
|
|
else
|
|
startCertificateChainListing();
|
|
}
|
|
|
|
void CertificateInfoWidgetImpl::slotShowInfo( TQListViewItem * item ) {
|
|
textView->setText( item->text(1) );
|
|
}
|
|
|
|
void CertificateInfoWidgetImpl::slotShowCertPathDetails( TQListViewItem * item ) {
|
|
if ( !item )
|
|
return;
|
|
|
|
// find the key corresponding to "item". This hack would not be
|
|
// necessary if pathView was a Kleo::KeyListView, but it's
|
|
// TQt-Designer-generated and I don't feel like creating a custom
|
|
// widget spec for Kleo::KeyListView.
|
|
unsigned int totalCount = 0;
|
|
int itemIndex = -1;
|
|
for ( const TQListViewItem * i = pathView->firstChild() ; i ; i = i->firstChild() ) {
|
|
if ( i == item )
|
|
itemIndex = totalCount;
|
|
++totalCount;
|
|
}
|
|
|
|
assert( totalCount == mChain.size() || totalCount == mChain.size() + 1 );
|
|
|
|
// skip pseudo root item with "not found message":
|
|
if ( totalCount == mChain.size() + 1 )
|
|
--itemIndex;
|
|
|
|
assert( itemIndex >= 0 );
|
|
|
|
KDialogBase * dialog =
|
|
new KDialogBase( this, "dialog", false, i18n("Additional Information for Key"),
|
|
KDialogBase::Close, KDialogBase::Close );
|
|
CertificateInfoWidgetImpl * top =
|
|
new CertificateInfoWidgetImpl( mChain[itemIndex], mExternal, dialog );
|
|
dialog->setMainWidget( top );
|
|
// proxy the signal to our receiver:
|
|
connect( top, TQT_SIGNAL(requestCertificateDownload(const TQString&, const TQString&)),
|
|
TQT_SIGNAL(requestCertificateDownload(const TQString&, const TQString&)) );
|
|
dialog->show();
|
|
}
|
|
|
|
|
|
void CertificateInfoWidgetImpl::slotImportCertificate()
|
|
{
|
|
if ( mChain.empty() || mChain.back().isNull() )
|
|
return;
|
|
const Kleo::DN dn = mChain.back().userID( 0 ).id();
|
|
emit requestCertificateDownload( mChain.back().primaryFingerprint(), dn.prettyDN() );
|
|
importButton->setEnabled( false );
|
|
}
|
|
|
|
void CertificateInfoWidgetImpl::startKeyExistanceCheck() {
|
|
if ( !mExternal )
|
|
// we already have it if it's from a local keylisting :)
|
|
return;
|
|
if ( mChain.empty() || mChain.back().isNull() )
|
|
// need a key to look for
|
|
return;
|
|
const TQString fingerprint = mChain.back().primaryFingerprint();
|
|
if ( fingerprint.isEmpty() )
|
|
// empty pattern means list all keys. We don't want that
|
|
return;
|
|
|
|
// start _local_ keylistjob (no progressdialog needed here):
|
|
Kleo::KeyListJob * job =
|
|
Kleo::CryptoBackendFactory::instance()->smime()->keyListJob( false );
|
|
assert( job );
|
|
|
|
connect( job, TQT_SIGNAL(nextKey(const GpgME::Key&)),
|
|
TQT_SLOT(slotKeyExistanceCheckNextCandidate(const GpgME::Key&)) );
|
|
connect( job, TQT_SIGNAL(result(const GpgME::KeyListResult&)),
|
|
TQT_SLOT(slotKeyExistanceCheckFinished()) );
|
|
// nor to check for errors:
|
|
job->start( fingerprint );
|
|
}
|
|
|
|
void CertificateInfoWidgetImpl::slotKeyExistanceCheckNextCandidate( const GpgME::Key & key ) {
|
|
if ( key.isNull() || mChain.empty() || !key.primaryFingerprint() )
|
|
return;
|
|
|
|
if ( qstrcmp( key.primaryFingerprint(),
|
|
mChain.back().primaryFingerprint() ) == 0 )
|
|
mHaveKeyLocally = true;
|
|
}
|
|
|
|
void CertificateInfoWidgetImpl::slotKeyExistanceCheckFinished() {
|
|
importButton->setEnabled( !mHaveKeyLocally );
|
|
}
|
|
|
|
|
|
#include "certificateinfowidgetimpl.moc"
|