summaryrefslogtreecommitdiffstats
path: root/certmanager/lib/ui/keyrequester.cpp
diff options
context:
space:
mode:
authortoma <toma@283d02a7-25f6-0310-bc7c-ecb5cbfe19da>2009-11-25 17:56:58 +0000
committertoma <toma@283d02a7-25f6-0310-bc7c-ecb5cbfe19da>2009-11-25 17:56:58 +0000
commit460c52653ab0dcca6f19a4f492ed2c5e4e963ab0 (patch)
tree67208f7c145782a7e90b123b982ca78d88cc2c87 /certmanager/lib/ui/keyrequester.cpp
downloadtdepim-460c52653ab0dcca6f19a4f492ed2c5e4e963ab0.tar.gz
tdepim-460c52653ab0dcca6f19a4f492ed2c5e4e963ab0.zip
Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features.
BUG:215923 git-svn-id: svn://anonsvn.kde.org/home/kde/branches/trinity/kdepim@1054174 283d02a7-25f6-0310-bc7c-ecb5cbfe19da
Diffstat (limited to 'certmanager/lib/ui/keyrequester.cpp')
-rw-r--r--certmanager/lib/ui/keyrequester.cpp481
1 files changed, 481 insertions, 0 deletions
diff --git a/certmanager/lib/ui/keyrequester.cpp b/certmanager/lib/ui/keyrequester.cpp
new file mode 100644
index 000000000..d537affc5
--- /dev/null
+++ b/certmanager/lib/ui/keyrequester.cpp
@@ -0,0 +1,481 @@
+/* -*- c++ -*-
+ keyrequester.cpp
+
+ This file is part of libkleopatra, the KDE keymanagement library
+ Copyright (c) 2004 Klar�vdalens Datakonsult AB
+
+ Libkleopatra is free software; you can redistribute it and/or
+ modify it under the terms of the GNU General Public License as
+ published by the Free Software Foundation; either version 2 of the
+ License, or (at your option) any later version.
+
+ Libkleopatra is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program; if not, write to the Free Software
+ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
+
+ In addition, as a special exception, the copyright holders give
+ permission to link the code of this program with any edition of
+ the Qt library by Trolltech AS, Norway (or with modified versions
+ of Qt that use the same license as Qt), and distribute linked
+ combinations including the two. You must obey the GNU General
+ Public License in all respects for all of the code used other than
+ Qt. If you modify this file, you may extend this exception to
+ your version of the file, but you are not obligated to do so. If
+ you do not wish to do so, delete this exception statement from
+ your version.
+
+
+ Based on kpgpui.cpp
+ Copyright (C) 2001,2002 the KPGP authors
+ See file libkdenetwork/AUTHORS.kpgp for details
+
+ This file is part of KPGP, the KDE PGP/GnuPG support library.
+
+ KPGP is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 2 of the License, or
+ (at your option) any later version.
+
+ You should have received a copy of the GNU General Public License
+ along with this program; if not, write to the Free Software Foundation,
+ Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
+ */
+
+#ifdef HAVE_CONFIG_H
+#include <config.h>
+#endif
+
+#include "keyrequester.h"
+
+#include "keyselectiondialog.h"
+
+#include <kleo/keylistjob.h>
+#include <kleo/dn.h>
+#include <kleo/cryptobackendfactory.h>
+
+// gpgme++
+#include <gpgmepp/key.h>
+#include <gpgmepp/keylistresult.h>
+
+// KDE
+#include <klocale.h>
+#include <kiconloader.h>
+#include <kdialog.h>
+#include <kdebug.h>
+#include <kmessagebox.h>
+#include <kpushbutton.h>
+
+// Qt
+#include <qapplication.h>
+#include <qlayout.h>
+#include <qtooltip.h>
+#include <qstring.h>
+#include <qstringlist.h>
+#include <qlabel.h>
+#include <qregexp.h>
+
+#include <assert.h>
+
+Kleo::KeyRequester::KeyRequester( unsigned int allowedKeys, bool multipleKeys,
+ QWidget * parent, const char * name )
+ : QWidget( parent, name ),
+ mOpenPGPBackend( 0 ),
+ mSMIMEBackend( 0 ),
+ mMulti( multipleKeys ),
+ mKeyUsage( allowedKeys ),
+ mJobs( 0 ),
+ d( 0 )
+{
+ init();
+}
+
+Kleo::KeyRequester::KeyRequester( QWidget * parent, const char * name )
+ : QWidget( parent, name ),
+ mOpenPGPBackend( 0 ),
+ mSMIMEBackend( 0 ),
+ mMulti( false ),
+ mKeyUsage( 0 ),
+ mJobs( 0 ),
+ d( 0 )
+{
+ init();
+}
+
+void Kleo::KeyRequester::init()
+{
+ QHBoxLayout * hlay = new QHBoxLayout( this, 0, KDialog::spacingHint() );
+
+ // the label where the key id is to be displayed:
+ mLabel = new QLabel( this );
+ mLabel->setFrameStyle( QFrame::Panel | QFrame::Sunken );
+
+ // the button to unset any key:
+ mEraseButton = new KPushButton( this );
+ mEraseButton->setAutoDefault( false );
+ mEraseButton->setSizePolicy( QSizePolicy( QSizePolicy::Minimum,
+ QSizePolicy::Minimum ) );
+ mEraseButton->setIconSet( SmallIconSet( QApplication::reverseLayout() ? "locationbar_erase" : "clear_left" ) );
+ QToolTip::add( mEraseButton, i18n("Clear") );
+
+ // the button to call the KeySelectionDialog:
+ mDialogButton = new QPushButton( i18n("Change..."), this );
+ mDialogButton->setAutoDefault( false );
+
+ hlay->addWidget( mLabel, 1 );
+ hlay->addWidget( mEraseButton );
+ hlay->addWidget( mDialogButton );
+
+ connect( mEraseButton, SIGNAL(clicked()), SLOT(slotEraseButtonClicked()) );
+ connect( mDialogButton, SIGNAL(clicked()), SLOT(slotDialogButtonClicked()) );
+
+ setSizePolicy( QSizePolicy( QSizePolicy::MinimumExpanding,
+ QSizePolicy::Fixed ) );
+
+ setAllowedKeys( mKeyUsage );
+}
+
+Kleo::KeyRequester::~KeyRequester() {
+
+}
+
+const std::vector<GpgME::Key> & Kleo::KeyRequester::keys() const {
+ return mKeys;
+}
+
+const GpgME::Key & Kleo::KeyRequester::key() const {
+ if ( mKeys.empty() )
+ return GpgME::Key::null;
+ else
+ return mKeys.front();
+}
+
+void Kleo::KeyRequester::setKeys( const std::vector<GpgME::Key> & keys ) {
+ mKeys.clear();
+ for ( std::vector<GpgME::Key>::const_iterator it = keys.begin() ; it != keys.end() ; ++it )
+ if ( !it->isNull() )
+ mKeys.push_back( *it );
+ updateKeys();
+}
+
+void Kleo::KeyRequester::setKey( const GpgME::Key & key ) {
+ mKeys.clear();
+ if ( !key.isNull() )
+ mKeys.push_back( key );
+ updateKeys();
+}
+
+QString Kleo::KeyRequester::fingerprint() const {
+ if ( mKeys.empty() )
+ return QString::null;
+ else
+ return mKeys.front().primaryFingerprint();
+}
+
+QStringList Kleo::KeyRequester::fingerprints() const {
+ QStringList result;
+ for ( std::vector<GpgME::Key>::const_iterator it = mKeys.begin() ; it != mKeys.end() ; ++it )
+ if ( !it->isNull() )
+ if ( const char * fpr = it->primaryFingerprint() )
+ result.push_back( fpr );
+ return result;
+}
+
+void Kleo::KeyRequester::setFingerprint( const QString & fingerprint ) {
+ startKeyListJob( fingerprint );
+}
+
+void Kleo::KeyRequester::setFingerprints( const QStringList & fingerprints ) {
+ startKeyListJob( fingerprints );
+}
+
+void Kleo::KeyRequester::updateKeys() {
+ if ( mKeys.empty() ) {
+ mLabel->clear();
+ return;
+ }
+ if ( mKeys.size() > 1 )
+ setMultipleKeysEnabled( true );
+
+ QStringList labelTexts;
+ QString toolTipText;
+ for ( std::vector<GpgME::Key>::const_iterator it = mKeys.begin() ; it != mKeys.end() ; ++it ) {
+ if ( it->isNull() )
+ continue;
+ const QString fpr = it->primaryFingerprint();
+ labelTexts.push_back( fpr.right(8) );
+ toolTipText += fpr.right(8) + ": ";
+ if ( const char * uid = it->userID(0).id() )
+ if ( it->protocol() == GpgME::Context::OpenPGP )
+ toolTipText += QString::fromUtf8( uid );
+ else
+ toolTipText += Kleo::DN( uid ).prettyDN();
+ else
+ toolTipText += i18n("<unknown>");
+ toolTipText += '\n';
+ }
+
+ mLabel->setText( labelTexts.join(", ") );
+ QToolTip::remove( mLabel );
+ QToolTip::add( mLabel, toolTipText );
+}
+
+#ifndef __KLEO_UI_SHOW_KEY_LIST_ERROR_H__
+#define __KLEO_UI_SHOW_KEY_LIST_ERROR_H__
+static void showKeyListError( QWidget * parent, const GpgME::Error & err ) {
+ assert( err );
+ const QString msg = i18n( "<qt><p>An error occurred while fetching "
+ "the keys from the backend:</p>"
+ "<p><b>%1</b></p></qt>" )
+ .arg( QString::fromLocal8Bit( err.asString() ) );
+
+ KMessageBox::error( parent, msg, i18n( "Key Listing Failed" ) );
+}
+#endif // __KLEO_UI_SHOW_KEY_LIST_ERROR_H__
+
+void Kleo::KeyRequester::startKeyListJob( const QStringList & fingerprints ) {
+ if ( !mSMIMEBackend && !mOpenPGPBackend )
+ return;
+
+ mTmpKeys.clear();
+ mJobs = 0;
+
+ unsigned int count = 0;
+ for ( QStringList::const_iterator it = fingerprints.begin() ; it != fingerprints.end() ; ++it )
+ if ( !(*it).stripWhiteSpace().isEmpty() )
+ ++count;
+
+ if ( !count ) {
+ // don't fall into the trap that an empty pattern means
+ // "return all keys" :)
+ setKey( GpgME::Key::null );
+ return;
+ }
+
+ if ( mOpenPGPBackend ) {
+ KeyListJob * job = mOpenPGPBackend->keyListJob( false ); // local, no sigs
+ if ( !job ) {
+ KMessageBox::error( this,
+ i18n("The OpenPGP backend does not support listing keys. "
+ "Check your installation."),
+ i18n("Key Listing Failed") );
+ } else {
+ connect( job, SIGNAL(result(const GpgME::KeyListResult&)),
+ SLOT(slotKeyListResult(const GpgME::KeyListResult&)) );
+ connect( job, SIGNAL(nextKey(const GpgME::Key&)),
+ SLOT(slotNextKey(const GpgME::Key&)) );
+
+ const GpgME::Error err = job->start( fingerprints,
+ mKeyUsage & Kleo::KeySelectionDialog::SecretKeys &&
+ !( mKeyUsage & Kleo::KeySelectionDialog::PublicKeys ) );
+
+ if ( err )
+ showKeyListError( this, err );
+ else
+ ++mJobs;
+ }
+ }
+
+ if ( mSMIMEBackend ) {
+ KeyListJob * job = mSMIMEBackend->keyListJob( false ); // local, no sigs
+ if ( !job ) {
+ KMessageBox::error( this,
+ i18n("The S/MIME backend does not support listing keys. "
+ "Check your installation."),
+ i18n("Key Listing Failed") );
+ } else {
+ connect( job, SIGNAL(result(const GpgME::KeyListResult&)),
+ SLOT(slotKeyListResult(const GpgME::KeyListResult&)) );
+ connect( job, SIGNAL(nextKey(const GpgME::Key&)),
+ SLOT(slotNextKey(const GpgME::Key&)) );
+
+ const GpgME::Error err = job->start( fingerprints,
+ mKeyUsage & Kleo::KeySelectionDialog::SecretKeys &&
+ !( mKeyUsage & Kleo::KeySelectionDialog::PublicKeys ) );
+
+ if ( err )
+ showKeyListError( this, err );
+ else
+ ++mJobs;
+ }
+ }
+
+ if ( mJobs > 0 ) {
+ mEraseButton->setEnabled( false );
+ mDialogButton->setEnabled( false );
+ }
+}
+
+void Kleo::KeyRequester::slotNextKey( const GpgME::Key & key ) {
+ if ( !key.isNull() )
+ mTmpKeys.push_back( key );
+}
+
+void Kleo::KeyRequester::slotKeyListResult( const GpgME::KeyListResult & res ) {
+ if ( res.error() )
+ showKeyListError( this, res.error() );
+
+ if ( --mJobs <= 0 ) {
+ mEraseButton->setEnabled( true );
+ mDialogButton->setEnabled( true );
+
+ setKeys( mTmpKeys );
+ mTmpKeys.clear();
+ }
+}
+
+
+void Kleo::KeyRequester::slotDialogButtonClicked() {
+ KeySelectionDialog * dlg = mKeys.empty()
+ ? new KeySelectionDialog( mDialogCaption, mDialogMessage, mInitialQuery, mKeyUsage, mMulti, false, this )
+ : new KeySelectionDialog( mDialogCaption, mDialogCaption, mKeys, mKeyUsage, mMulti, false, this ) ;
+
+ if ( dlg->exec() == QDialog::Accepted ) {
+ if ( mMulti )
+ setKeys( dlg->selectedKeys() );
+ else
+ setKey( dlg->selectedKey() );
+ emit changed();
+ }
+
+ delete dlg;
+}
+
+void Kleo::KeyRequester::slotEraseButtonClicked() {
+ if ( !mKeys.empty() )
+ emit changed();
+ mKeys.clear();
+ updateKeys();
+}
+
+void Kleo::KeyRequester::setDialogCaption( const QString & caption ) {
+ mDialogCaption = caption;
+}
+
+void Kleo::KeyRequester::setDialogMessage( const QString & msg ) {
+ mDialogMessage = msg;
+}
+
+bool Kleo::KeyRequester::isMultipleKeysEnabled() const {
+ return mMulti;
+}
+
+void Kleo::KeyRequester::setMultipleKeysEnabled( bool multi ) {
+ if ( multi == mMulti ) return;
+
+ if ( !multi && !mKeys.empty() )
+ mKeys.erase( mKeys.begin() + 1, mKeys.end() );
+
+ mMulti = multi;
+ updateKeys();
+}
+
+unsigned int Kleo::KeyRequester::allowedKeys() const {
+ return mKeyUsage;
+}
+
+void Kleo::KeyRequester::setAllowedKeys( unsigned int keyUsage ) {
+ mKeyUsage = keyUsage;
+ mOpenPGPBackend = 0;
+ mSMIMEBackend = 0;
+
+ if ( mKeyUsage & KeySelectionDialog::OpenPGPKeys )
+ mOpenPGPBackend = Kleo::CryptoBackendFactory::instance()->openpgp();
+ if ( mKeyUsage & KeySelectionDialog::SMIMEKeys )
+ mSMIMEBackend = Kleo::CryptoBackendFactory::instance()->smime();
+
+ if ( mOpenPGPBackend && !mSMIMEBackend ) {
+ mDialogCaption = i18n("OpenPGP Key Selection");
+ mDialogMessage = i18n("Please select an OpenPGP key to use.");
+ } else if ( !mOpenPGPBackend && mSMIMEBackend ) {
+ mDialogCaption = i18n("S/MIME Key Selection");
+ mDialogMessage = i18n("Please select an S/MIME key to use.");
+ } else {
+ mDialogCaption = i18n("Key Selection");
+ mDialogMessage = i18n("Please select an (OpenPGP or S/MIME) key to use.");
+ }
+}
+
+QPushButton * Kleo::KeyRequester::dialogButton() {
+ return mDialogButton;
+}
+
+QPushButton * Kleo::KeyRequester::eraseButton() {
+ return mEraseButton;
+}
+
+static inline unsigned int foo( bool openpgp, bool smime, bool trusted, bool valid ) {
+ unsigned int result = 0;
+ if ( openpgp )
+ result |= Kleo::KeySelectionDialog::OpenPGPKeys;
+ if ( smime )
+ result |= Kleo::KeySelectionDialog::SMIMEKeys;
+ if ( trusted )
+ result |= Kleo::KeySelectionDialog::TrustedKeys;
+ if ( valid )
+ result |= Kleo::KeySelectionDialog::ValidKeys;
+ return result;
+}
+
+static inline unsigned int encryptionKeyUsage( bool openpgp, bool smime, bool trusted, bool valid ) {
+ return foo( openpgp, smime, trusted, valid ) | Kleo::KeySelectionDialog::EncryptionKeys | Kleo::KeySelectionDialog::PublicKeys;
+}
+
+static inline unsigned int signingKeyUsage( bool openpgp, bool smime, bool trusted, bool valid ) {
+ return foo( openpgp, smime, trusted, valid ) | Kleo::KeySelectionDialog::SigningKeys | Kleo::KeySelectionDialog::SecretKeys;
+}
+
+Kleo::EncryptionKeyRequester::EncryptionKeyRequester( bool multi, unsigned int proto,
+ QWidget * parent, const char * name,
+ bool onlyTrusted, bool onlyValid )
+ : KeyRequester( encryptionKeyUsage( proto & OpenPGP, proto & SMIME, onlyTrusted, onlyValid ), multi,
+ parent, name )
+{
+}
+
+Kleo::EncryptionKeyRequester::EncryptionKeyRequester( QWidget * parent, const char * name )
+ : KeyRequester( 0, false, parent, name )
+{
+}
+
+Kleo::EncryptionKeyRequester::~EncryptionKeyRequester() {}
+
+
+void Kleo::EncryptionKeyRequester::setAllowedKeys( unsigned int proto, bool onlyTrusted, bool onlyValid )
+{
+ KeyRequester::setAllowedKeys( encryptionKeyUsage( proto & OpenPGP, proto & SMIME, onlyTrusted, onlyValid ) );
+}
+
+Kleo::SigningKeyRequester::SigningKeyRequester( bool multi, unsigned int proto,
+ QWidget * parent, const char * name,
+ bool onlyTrusted, bool onlyValid )
+ : KeyRequester( signingKeyUsage( proto & OpenPGP, proto & SMIME, onlyTrusted, onlyValid ), multi,
+ parent, name )
+{
+}
+
+Kleo::SigningKeyRequester::SigningKeyRequester( QWidget * parent, const char * name )
+ : KeyRequester( 0, false, parent, name )
+{
+}
+
+Kleo::SigningKeyRequester::~SigningKeyRequester() {}
+
+void Kleo::SigningKeyRequester::setAllowedKeys( unsigned int proto, bool onlyTrusted, bool onlyValid )
+{
+ KeyRequester::setAllowedKeys( signingKeyUsage( proto & OpenPGP, proto & SMIME, onlyTrusted, onlyValid ) );
+}
+
+void Kleo::KeyRequester::virtual_hook( int, void* ) {}
+void Kleo::EncryptionKeyRequester::virtual_hook( int id, void * data ) {
+ KeyRequester::virtual_hook( id, data );
+}
+void Kleo::SigningKeyRequester::virtual_hook( int id, void * data ) {
+ KeyRequester::virtual_hook( id, data );
+}
+
+#include "keyrequester.moc"