/* kpgp.h Copyright (C) 2001,2002 the KPGP authors See file AUTHORS.kpgp for details This file is part of KPGP, the KDE PGP/GnuPG support library. KPGP is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA */ #ifndef KPGP_H #define KPGP_H #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "kpgpkey.h" #include class TQLineEdit; class TQCursor; class TQCheckBox; class TQGridLayout; class KConfig; namespace Kpgp { /** This enumerated type is used by Kpgp::* to indicate which keys can be selected by the user. The following values are available: - Kpgp::PublicKeys: Public keys are shown in the selection dialog. - Kpgp::SecretKeys: Secret keys are shown in the selection dialog. - Kpgp::EncryptionKeys: Encryption keys can be selected. - Kpgp::SigningKeys: Signing keys can be selected. - Kpgp::ValidKeys: Only valid keys can be selected. - Kpgp::TrustedKeys: Only trusted keys can be selected. - Kpgp::AllKeys == PublicKeys | SecretKeys | EncryptionKeys | SigningKeys */ enum { PublicKeys = 1, SecretKeys = 2, EncryptionKeys = 4, SigningKeys = 8, ValidKeys = 16, TrustedKeys = 32, AllKeys = PublicKeys | SecretKeys | EncryptionKeys | SigningKeys, PubSecKeys = PublicKeys | SecretKeys, EncrSignKeys = EncryptionKeys | SigningKeys }; enum Result { Failure = 0, Ok = 1, Canceled = 2 }; class Base; class Block; class KDE_EXPORT Module { friend class Block; private: // the class running pgp Base *pgp; public: Module(); virtual ~Module(); /** the following virtual function form the interface to the application using Kpgp */ virtual void readConfig(); virtual void writeConfig(bool sync); virtual void init(); /** decrypts the given OpenPGP block if the passphrase is good. returns false otherwise */ bool decrypt( Block& block ); /** Tries to verify the given OpenPGP block */ bool verify( Block& block ); /** clearsigns the given OpenPGP block with the key corresponding to the given key id. The charset is needed to display the text correctly. Returns Failure if there was an unresolvable error Canceled if signing was canceled Ok if everything is o.k. */ Kpgp::Result clearsign( Block& block, const KeyID& keyId, const TQCString& charset = 0 ); /** encrypts the given OpenPGP block for a list of persons. if sign is true then the block is clearsigned with the key corresponding to the given key id. The charset is needed to display the text correctly. Returns Failure if there was an unresolvable error Canceled if encryption was canceled Ok if everything is o.k. */ Kpgp::Result encrypt( Block& block, const TQStringList& tqreceivers, const KeyID& keyId, bool sign, const TQCString& charset = 0 ); /** Determines the keys which should be used for encrypting the message to the given list of recipients. Returns: Failure if there was an unresolvable error Canceled if encryption was canceled Ok if everything is o.k. */ Kpgp::Result getEncryptionKeys( KeyIDList& encryptionKeyIds, const TQStringList& recipients, const KeyID& keyId ); /** checks if encrypting to the given list of persons is possible and desired, i.e. if we have a (trusted) key for every recipient and if encryption to all keys is allowed. Returns 0 if encryption is not possible or not desired, 1 if encryption is possible and desired, 2 if encryption is possible, but the user wants to be asked and -1 if there is a conflict which can't be automatically resolved. */ int encryptionPossible( const TQStringList& recipients ); protected: int doEncSign( Block& block, const KeyIDList& recipientKeyIds, bool sign ); public: /** sign a key in the keyring with users signature. */ bool signKey( const KeyID& keyID ); /** get the list of cached public keys. */ const KeyList publicKeys(); /** get the list of cached secret keys. */ const KeyList secretKeys(); /** Reads the list of public keys if necessary or if reread is true. */ void readPublicKeys( bool reread = false ); /** Reads the list of secret keys if necessary or if reread is true. */ void readSecretKeys( bool reread = false ); /** try to get an ascii armored key block for the given public key */ TQCString getAsciiPublicKey( const KeyID& keyID ); /** Returns the public key with the given key ID or null if no matching key is found. */ Key* publicKey( const KeyID& keyID ); /** Returns the first public key with the given user ID or null if no matching key is found. */ Key* publicKey( const TQString& userID ); /** Returns the secret key with the given key ID or null if no matching key is found. */ Key* secretKey( const KeyID& keyID ); /** Returns the trust value for the given key. This is the maximal trust value of any of the user ids of this key. */ Validity keyTrust( const KeyID& keyID ); /** Returns the trust value of a key with the given user id. If more than one key have this user id then the first key with this user id will be chosen. */ Validity keyTrust( const TQString& userID ); /** Returns TRUE if the given key is at least trusted marginally. Otherwise FALSE is returned. */ bool isTrusted( const KeyID& keyID ); /** Rereads the key data for the given key and returns the reread data. If readTrust is true then the trust of this key will be determined. */ Key* rereadKey( const KeyID& keyID, const bool readTrust = true ); /** Request the change of the passphrase of the actual secret key. TBI */ bool changePassPhrase(); /** set a user identity to use (if you have more than one...) by default, pgp uses the identity which was generated last. */ void setUser(const KeyID& keyID); /** Returns the actual key ID of the currently set key. */ const KeyID user() const; /** always encrypt message to oneself? */ void setEncryptToSelf(bool flag); bool encryptToSelf(void) const; /** store passphrase in pgp object Problem: passphrase stays in memory. Advantage: you can call en-/decrypt without always passing the passphrase */ void setStorePassPhrase(bool); bool storePassPhrase(void) const; /** clears everything from memory */ void clear(const bool erasePassPhrase = FALSE); /** returns the last error that occurred */ const TQString lastErrorMsg(void) const; // what version of PGP/GPG should we use enum PGPType { tAuto, tGPG, tPGP2, tPGP5, tPGP6, tOff } pgpType; // did we find a pgp executable? bool havePGP(void) const; /** Should PGP/GnuPG be used? */ bool usePGP(void) const { return (havePGP() && (pgpType != tOff)); } // show the result of encryption/signing? void setShowCipherText(const bool flag); bool showCipherText(void) const; // show the encryption keys for approval? void setShowKeyApprovalDlg(const bool flag); bool showKeyApprovalDlg(void) const; /** Shows a key selection dialog with all secret keys and the given title and the (optional) text. If keyId is given, then the corresponding key is selected. */ KeyID selectSecretKey( const TQString& title, const TQString& text = TQString::null, const KeyID& keyId = KeyID() ); /** Shows a key selection dialog with all public keys and the given title and the (optional) text. If oldKeyId is given, then the corresponding key is selected. If address is given, then the chosen key will be stored (if the user wants it to be stored). mode specifies which keys can be selected. */ KeyID selectPublicKey( const TQString& title, const TQString& text = TQString::null, const KeyID& oldKeyId = KeyID(), const TQString& address = TQString::null, const unsigned int allowedKeys = AllKeys ); /** Shows a key selection dialog with all public keys and the given title and the (optional) text. If oldKeyId is given, then the corresponding key is selected. If address is given, then the chosen key will be stored (if the user wants it to be stored). mode specifies which keys can be selected. */ KeyIDList selectPublicKeys( const TQString& title, const TQString& text = TQString::null, const KeyIDList& oldKeyIds = KeyIDList(), const TQString& address = TQString::null, const unsigned int allowedKeys = AllKeys ); // FIXME: key management /** Reads the encryption preference for the given address from the config file. */ EncryptPref encryptionPreference( const TQString& address ); /** Writes the given encryption preference for the given address to the config file. */ void setEncryptionPreference( const TQString& address, const EncryptPref pref ); // -- static member functions -------------------------------------------- /** return the actual pgp object */ static Kpgp::Module *getKpgp(); /** get the kpgp config object */ static KConfig *getConfig(); /** Parses the given message and splits it into OpenPGP blocks and Non-OpenPGP blocks. Returns TRUE if the message tqcontains at least one OpenPGP block and FALSE otherwise. The format is then:
      1st Non-OpenPGP block
      1st OpenPGP block
      2nd Non-OpenPGP block
      ...
      n-th OpenPGP block
      (n+1)-th Non-OpenPGP block
      
*/ static bool prepareMessageForDecryption( const TQCString& msg, TQPtrList& pgpBlocks, TQStrList& nonPgpBlocks ); private: /** check if we have a trusted encryption key for the given person */ bool haveTrustedEncryptionKey( const TQString& person ); /** get a list of encryption keys to be used for the given recipient */ KeyIDList getEncryptionKeys( const TQString& person ); /** Set pass phrase */ bool setPassPhrase(const char* pass); /** test if the PGP executable is found and if there is a passphrase set or given. Returns: 1 if everything is ok 0 (together with some warning message) if something is missing -1 if the passphrase dialog was canceled */ int prepare(bool needPassPhrase=FALSE, Block* block = 0 ); /** cleanup passphrase if it should not be stored. */ void cleanupPass() { if (!storePass) wipePassPhrase(); } /** Wipes and optionally frees the memory used to hold the passphrase. */ void wipePassPhrase(bool free=false); // transform an address into canonical form TQString canonicalAddress( const TQString& person ); /** Shows a dialog to let the user select a key from the given list of keys */ KeyID selectKey( const KeyList& keys, const TQString& title, const TQString& text = TQString::null, const KeyID& keyId = KeyID(), const unsigned int allowedKeys = AllKeys ); /** Shows a dialog to let the user select a key from the given list of keys */ KeyIDList selectKeys( const KeyList& keys, const TQString& title, const TQString& text = TQString::null, const KeyIDList& keyIds = KeyIDList(), const unsigned int allowedKeys = AllKeys ); /** Shows a dialog to let the user select a key from the given list of keys. The dialog includes a checkbox ("Remember decision"). The state of the checkbox is returned in rememberChoice. */ KeyID selectKey( bool& rememberChoice, const KeyList& keys, const TQString& title, const TQString& text = TQString::null, const KeyID& keyId = KeyID(), const unsigned int allowedKeys = AllKeys ); /** Shows a dialog to let the user select a list of keys from the given list of keys. The dialog includes a checkbox ("Remember decision"). The state of the checkbox is returned in rememberChoice. */ KeyIDList selectKeys( bool& rememberChoice, const KeyList& keys, const TQString& title, const TQString& text = TQString::null, const KeyIDList& keyIds = KeyIDList(), const unsigned int allowedKeys = AllKeys ); /** Returns the OpenPGP keys which should be used for encryption to the given address. */ KeyIDList keysForAddress( const TQString& address ); /** Set an email address -> list of OpenPGP keys association. */ void setKeysForAddress( const TQString& address, const KeyIDList& keyIDs ); /** Remove an email address -> OpenPGP key association. */ void removeKeyForAddress( const TQString& address ); /** Reads the email address -> OpenPGP key associations from the config file. */ void readAddressData(); /** Writes the email address -> OpenPGP key associations to the config file. */ void writeAddressData(); bool checkForPGP(void); void assignPGPBase(void); static Kpgp::Module *kpgpObject; KConfig *config; struct AddressData { KeyIDList keyIds; EncryptPref encrPref; }; typedef TQMap AddressDataDict; AddressDataDict addressDataDict; KeyList mPublicKeys; bool mPublicKeysCached : 1; // did we already read the public keys? KeyList mSecretKeys; bool mSecretKeysCached : 1; // did we already read the secret keys? bool storePass : 1; char * passphrase; size_t passphrase_buffer_len; TQString errMsg; KeyID pgpUser; // the key ID which is used to sign/encrypt to self bool flagEncryptToSelf : 1; bool havePgp : 1; bool havePGP5 : 1; bool haveGpg : 1; bool havePassPhrase : 1; bool showEncryptionResult : 1; bool mShowKeyApprovalDlg : 1; }; // class Module // -- inlined member functions --------------------------------------------- inline void Module::setShowKeyApprovalDlg( const bool flag ) { mShowKeyApprovalDlg = flag; } inline bool Module::showKeyApprovalDlg( void ) const { return mShowKeyApprovalDlg; } // ------------------------------------------------------------------------- } // namespace Kpgp #endif