diff options
author | Kirill Volinsky <mataes2007@gmail.com> | 2012-07-20 16:21:49 +0000 |
---|---|---|
committer | Kirill Volinsky <mataes2007@gmail.com> | 2012-07-20 16:21:49 +0000 |
commit | f424a18112032cf61d2871a6b91a5af607c171ae (patch) | |
tree | 88fedc4e28941ceecda7026f0b06eba6271f91d5 /plugins/CryptoPP/src/cpp_pgpw.cpp | |
parent | bfe1bd0fc087be44c70904aee0fe4276643d206d (diff) |
CryptoPP:
changed folder structure
git-svn-id: http://svn.miranda-ng.org/main/trunk@1083 1316c22d-e87f-b044-9b9b-93d7a3e3ba9c
Diffstat (limited to 'plugins/CryptoPP/src/cpp_pgpw.cpp')
-rw-r--r-- | plugins/CryptoPP/src/cpp_pgpw.cpp | 317 |
1 files changed, 317 insertions, 0 deletions
diff --git a/plugins/CryptoPP/src/cpp_pgpw.cpp b/plugins/CryptoPP/src/cpp_pgpw.cpp new file mode 100644 index 0000000000..8633690009 --- /dev/null +++ b/plugins/CryptoPP/src/cpp_pgpw.cpp @@ -0,0 +1,317 @@ +#include "commonheaders.h"
+
+
+HMODULE hpgpsdk;
+UINT pgpVer;
+HRSRC hRS_pgp;
+PBYTE pRS_pgp;
+
+
+int __cdecl _pgp_init(void);
+int __cdecl _pgp_done(void);
+int __cdecl _pgp_open_keyrings(LPSTR,LPSTR);
+int __cdecl _pgp_close_keyrings(void);
+int __cdecl _pgp_get_version(void);
+LPSTR __cdecl _pgp_get_error(void);
+int __cdecl _pgp_size_keyid(void);
+PVOID __cdecl _pgp_select_keyid(HWND,LPSTR);
+LPSTR __cdecl _pgp_encrypt_keydb(LPCSTR,PVOID);
+LPSTR __cdecl _pgp_decrypt_keydb(LPCSTR);
+//int __cdecl _pgp_check_key(LPCSTR);
+LPSTR __cdecl _pgp_encrypt_key(LPCSTR,LPCSTR);
+LPSTR __cdecl _pgp_decrypt_key(LPCSTR,LPCSTR);
+
+int (__cdecl *p_pgp_init)(void);
+int (__cdecl *p_pgp_done)(void);
+int (__cdecl *p_pgp_open_keyrings)(LPSTR,LPSTR);
+int (__cdecl *p_pgp_close_keyrings)(void);
+int (__cdecl *p_pgp_get_version)(void);
+LPSTR (__cdecl *p_pgp_get_error)(void);
+int (__cdecl *p_pgp_size_keyid)(void);
+PVOID (__cdecl *p_pgp_select_keyid)(HWND,LPSTR);
+LPSTR (__cdecl *p_pgp_encrypt_keydb)(LPCSTR,PVOID);
+LPSTR (__cdecl *p_pgp_decrypt_keydb)(LPCSTR);
+//int (__cdecl *p_pgp_check_key)(LPCSTR);
+LPSTR (__cdecl *p_pgp_encrypt_key)(LPCSTR,LPCSTR);
+LPSTR (__cdecl *p_pgp_decrypt_key)(LPCSTR,LPCSTR);
+
+
+#define GPA(x) \
+{ \
+ *((PVOID*)&p##x) = (PVOID)GetProcAddress(mod, TEXT(#x)); \
+ if (!p##x) return 0; \
+}
+
+int load_pgpsdk_dll(HMODULE mod) {
+
+ GPA(_pgp_init);
+ GPA(_pgp_done);
+ GPA(_pgp_open_keyrings);
+ GPA(_pgp_close_keyrings);
+ GPA(_pgp_get_version);
+ GPA(_pgp_get_error);
+ GPA(_pgp_size_keyid);
+ GPA(_pgp_select_keyid);
+ GPA(_pgp_encrypt_keydb);
+ GPA(_pgp_decrypt_keydb);
+ GPA(_pgp_encrypt_key);
+ GPA(_pgp_decrypt_key);
+
+ return 1;
+}
+
+#undef GPA
+
+
+#define GPA(x) \
+{ \
+ *((PVOID*)&p##x) = (PVOID)MemGetProcAddress(mod, TEXT(#x)); \
+ if (!p##x) { \
+ return 0; \
+ } \
+}
+
+int load_pgpsdk_mem(HMODULE mod) {
+
+ GPA(_pgp_init);
+ GPA(_pgp_done);
+ GPA(_pgp_open_keyrings);
+ GPA(_pgp_close_keyrings);
+ GPA(_pgp_get_version);
+ GPA(_pgp_get_error);
+ GPA(_pgp_size_keyid);
+ GPA(_pgp_select_keyid);
+ GPA(_pgp_encrypt_keydb);
+ GPA(_pgp_decrypt_keydb);
+ GPA(_pgp_encrypt_key);
+ GPA(_pgp_decrypt_key);
+
+ return 1;
+}
+
+#undef GPA
+
+
+BOOL load_pgp_sdk(int type, int id)
+{
+ int r; char t[MAX_PATH];
+ pgpVer = 0;
+
+ if ( isVista ) {
+ sprintf(t,"%s\\pgpsdkw.dll",TEMP);
+ ExtractFile(t,type,id);
+ hpgpsdk = LoadLibraryA(t);
+ }
+ else {
+ hRS_pgp = FindResource( g_hInst, MAKEINTRESOURCE(id), MAKEINTRESOURCE(type) );
+ pRS_pgp = (PBYTE) LoadResource( g_hInst, hRS_pgp ); LockResource( pRS_pgp );
+ hpgpsdk = MemLoadLibrary( pRS_pgp );
+ }
+ if (hpgpsdk) {
+ if ( isVista ) load_pgpsdk_dll(hpgpsdk);
+ else load_pgpsdk_mem(hpgpsdk);
+ r = p_pgp_init();
+ if (r) {
+ pgpVer = p_pgp_get_version();
+ return r;
+ }
+ if ( isVista ) {
+ FreeLibrary(hpgpsdk);
+ }
+ else {
+ MemFreeLibrary(hpgpsdk);
+ UnlockResource( pRS_pgp );
+ FreeResource( pRS_pgp );
+ }
+ }
+ return 0;
+}
+
+
+int __cdecl pgp_init()
+{
+ int r;
+
+ if ( !hPGPPRIV ) {
+ // create context for private pgp keys
+ hPGPPRIV = (HANDLE) cpp_create_context(MODE_PGP|MODE_PRIV_KEY);
+ pCNTX tmp = (pCNTX) hPGPPRIV;
+ tmp->pdata = (PBYTE) malloc(sizeof(PGPDATA));
+ memset(tmp->pdata,0,sizeof(PGPDATA));
+ }
+
+ if ( r = load_pgp_sdk(666,6) ) return r;
+ if ( r = load_pgp_sdk(666,8) ) return r;
+
+ hpgpsdk = 0;
+
+ return 0;
+}
+
+
+int __cdecl pgp_done()
+{
+ int r = 0;
+ pgpVer = 0;
+ if (hpgpsdk) {
+ r = p_pgp_done();
+ if ( isVista ) {
+ FreeLibrary(hpgpsdk);
+ }
+ else {
+ MemFreeLibrary(hpgpsdk);
+ UnlockResource( pRS_pgp );
+ FreeResource( pRS_pgp );
+ }
+ hpgpsdk = 0;
+ }
+ return r;
+}
+
+
+int __cdecl pgp_open_keyrings(LPSTR PubRingPath, LPSTR SecRingPath)
+{
+ return p_pgp_open_keyrings(PubRingPath,SecRingPath);
+}
+
+
+int __cdecl pgp_close_keyrings()
+{
+ return p_pgp_close_keyrings();
+}
+
+
+int __cdecl pgp_get_version()
+{
+ return pgpVer;
+}
+
+LPSTR __cdecl pgp_get_error()
+{
+ return p_pgp_get_error();
+}
+
+LPSTR __cdecl pgp_encrypt(pCNTX ptr, LPCSTR szPlainMsg)
+{
+ ptr->error = ERROR_NONE;
+ pPGPDATA p = (pPGPDATA) ptr->pdata;
+ SAFE_FREE(ptr->tmp);
+
+ LPSTR szEncMsg;
+ if (p->pgpKey)
+ szEncMsg = p_pgp_encrypt_key(szPlainMsg,(LPCSTR)p->pgpKey);
+ else
+ szEncMsg = p_pgp_encrypt_keydb(szPlainMsg,p->pgpKeyID);
+ if (!szEncMsg) return 0;
+
+ ptr->tmp = (LPSTR) _strdup(szEncMsg);
+ LocalFree((LPVOID)szEncMsg);
+
+ return ptr->tmp;
+}
+
+
+LPSTR __cdecl pgp_decrypt(pCNTX ptr, LPCSTR szEncMsg)
+{
+ ptr->error = ERROR_NONE;
+ SAFE_FREE(ptr->tmp);
+
+ LPSTR szPlainMsg = p_pgp_decrypt_keydb(szEncMsg);
+ if (!szPlainMsg) {
+ ptr = get_context_on_id(hPGPPRIV); // find private pgp keys
+ if (ptr) {
+ pPGPDATA p = (pPGPDATA) ptr->pdata;
+ if (p->pgpKey)
+ szPlainMsg = p_pgp_decrypt_key(szEncMsg,(LPCSTR)p->pgpKey);
+ }
+ if (!szPlainMsg) return NULL;
+ }
+
+ ptr->tmp = (LPSTR) _strdup(szPlainMsg);
+ LocalFree((LPVOID)szPlainMsg);
+
+ return ptr->tmp;
+}
+
+
+LPSTR __cdecl pgp_encode(HANDLE context, LPCSTR szPlainMsg)
+{
+ pCNTX ptr = get_context_on_id(context); if (!ptr) return NULL;
+ pPGPDATA p = (pPGPDATA) cpp_alloc_pdata(ptr);
+ if ( !p->pgpKeyID && !p->pgpKey ) {
+ ptr->error = ERROR_NO_PGP_KEY;
+ return NULL;
+ }
+
+ // utf8 message: encrypt.
+ return pgp_encrypt(ptr, szPlainMsg);
+}
+
+
+LPSTR __cdecl pgp_decode(HANDLE context, LPCSTR szEncMsg)
+{
+ pCNTX ptr = get_context_on_id(context);
+ if (!ptr) return NULL;
+
+ LPSTR szNewMsg = NULL;
+ LPSTR szOldMsg = pgp_decrypt(ptr, szEncMsg);
+
+ if (szOldMsg) {
+ if ( !is_7bit_string(szOldMsg) && !is_utf8_string(szOldMsg) ) {
+ size_t slen = strlen(szOldMsg)+1;
+ LPWSTR wszMsg = (LPWSTR) alloca(slen*sizeof(WCHAR));
+ MultiByteToWideChar(CP_ACP, 0, szOldMsg, -1, wszMsg, slen*sizeof(WCHAR));
+ szNewMsg = _strdup(utf8encode(wszMsg));
+ }
+ else szNewMsg = _strdup(szOldMsg);
+ }
+ SAFE_FREE(ptr->tmp);
+ ptr->tmp = szNewMsg;
+ return szNewMsg;
+}
+
+
+int __cdecl pgp_set_priv_key(LPCSTR LocalKey)
+{
+ return pgp_set_key(hPGPPRIV,LocalKey);
+}
+
+
+int __cdecl pgp_set_key(HANDLE context, LPCSTR RemoteKey)
+{
+ pCNTX ptr = get_context_on_id(context); if (!ptr) return 0;
+ pPGPDATA p = (pPGPDATA) cpp_alloc_pdata(ptr);
+ ptr->error = ERROR_NONE;
+
+ SAFE_FREE(p->pgpKey);
+ p->pgpKey = (PBYTE) _strdup(RemoteKey);
+
+ return 1;
+}
+
+
+int __cdecl pgp_set_keyid(HANDLE context, PVOID RemoteKeyID)
+{
+ pCNTX ptr = get_context_on_id(context); if (!ptr) return 0;
+ pPGPDATA p = (pPGPDATA) cpp_alloc_pdata(ptr);
+ ptr->error = ERROR_NONE;
+
+ SAFE_FREE(p->pgpKeyID);
+ p->pgpKeyID = (PBYTE) malloc(p_pgp_size_keyid());
+ memcpy(p->pgpKeyID,RemoteKeyID,p_pgp_size_keyid());
+
+ return 1;
+}
+
+
+int __cdecl pgp_size_keyid()
+{
+ return p_pgp_size_keyid();
+}
+
+
+PVOID __cdecl pgp_select_keyid(HWND hDlg,LPSTR szKeyID)
+{
+ return p_pgp_select_keyid(hDlg,szKeyID);
+}
+
|