2000-10-19 15:43:08 +00:00
|
|
|
/*
|
2004-04-27 12:31:57 +00:00
|
|
|
* PuTTY key generation front end (Windows).
|
2000-10-19 15:43:08 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <time.h>
|
|
|
|
#include <stdio.h>
|
2000-10-24 10:47:49 +00:00
|
|
|
#include <stdlib.h>
|
2011-10-02 14:14:21 +00:00
|
|
|
#include <assert.h>
|
2000-10-19 15:43:08 +00:00
|
|
|
|
|
|
|
#define PUTTY_DO_GLOBALS
|
|
|
|
|
|
|
|
#include "putty.h"
|
|
|
|
#include "ssh.h"
|
2003-10-12 13:46:12 +00:00
|
|
|
|
|
|
|
#include <commctrl.h>
|
2000-10-19 15:43:08 +00:00
|
|
|
|
2003-02-07 13:54:34 +00:00
|
|
|
#ifdef MSVC4
|
|
|
|
#define ICON_BIG 1
|
|
|
|
#endif
|
|
|
|
|
2005-08-10 18:31:24 +00:00
|
|
|
#define WM_DONEKEY (WM_APP + 1)
|
2000-10-19 15:43:08 +00:00
|
|
|
|
2012-02-19 10:44:04 +00:00
|
|
|
#define DEFAULT_KEYSIZE 2048
|
2000-10-19 15:43:08 +00:00
|
|
|
|
2002-08-06 17:48:14 +00:00
|
|
|
static char *cmdline_keyfile = NULL;
|
|
|
|
|
2002-10-09 18:09:42 +00:00
|
|
|
/*
|
|
|
|
* Print a modal (Really Bad) message box and perform a fatal exit.
|
|
|
|
*/
|
|
|
|
void modalfatalbox(char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
2002-11-07 19:49:03 +00:00
|
|
|
char *stuff;
|
2002-10-09 18:09:42 +00:00
|
|
|
|
|
|
|
va_start(ap, fmt);
|
2002-11-07 19:49:03 +00:00
|
|
|
stuff = dupvprintf(fmt, ap);
|
2002-10-09 18:09:42 +00:00
|
|
|
va_end(ap);
|
|
|
|
MessageBox(NULL, stuff, "PuTTYgen Fatal Error",
|
|
|
|
MB_SYSTEMMODAL | MB_ICONERROR | MB_OK);
|
2002-11-07 19:49:03 +00:00
|
|
|
sfree(stuff);
|
2002-10-09 18:09:42 +00:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
2013-07-22 07:11:44 +00:00
|
|
|
/*
|
|
|
|
* Print a non-fatal message box and do not exit.
|
|
|
|
*/
|
|
|
|
void nonfatal(char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
char *stuff;
|
|
|
|
|
|
|
|
va_start(ap, fmt);
|
|
|
|
stuff = dupvprintf(fmt, ap);
|
|
|
|
va_end(ap);
|
|
|
|
MessageBox(NULL, stuff, "PuTTYgen Error",
|
|
|
|
MB_SYSTEMMODAL | MB_ICONERROR | MB_OK);
|
|
|
|
sfree(stuff);
|
|
|
|
}
|
|
|
|
|
2000-10-19 15:43:08 +00:00
|
|
|
/* ----------------------------------------------------------------------
|
|
|
|
* Progress report code. This is really horrible :-)
|
|
|
|
*/
|
2001-09-22 20:52:21 +00:00
|
|
|
#define PROGRESSRANGE 65535
|
|
|
|
#define MAXPHASE 5
|
2000-10-19 15:43:08 +00:00
|
|
|
struct progress {
|
2001-09-22 20:52:21 +00:00
|
|
|
int nphases;
|
|
|
|
struct {
|
|
|
|
int exponential;
|
|
|
|
unsigned startpoint, total;
|
|
|
|
unsigned param, current, n; /* if exponential */
|
|
|
|
unsigned mult; /* if linear */
|
|
|
|
} phases[MAXPHASE];
|
|
|
|
unsigned total, divisor, range;
|
2000-10-19 15:43:08 +00:00
|
|
|
HWND progbar;
|
|
|
|
};
|
|
|
|
|
2001-09-22 20:52:21 +00:00
|
|
|
static void progress_update(void *param, int action, int phase, int iprogress)
|
2001-05-06 14:35:20 +00:00
|
|
|
{
|
|
|
|
struct progress *p = (struct progress *) param;
|
2000-10-19 15:43:08 +00:00
|
|
|
unsigned progress = iprogress;
|
|
|
|
int position;
|
|
|
|
|
2001-09-22 20:52:21 +00:00
|
|
|
if (action < PROGFN_READY && p->nphases < phase)
|
|
|
|
p->nphases = phase;
|
|
|
|
switch (action) {
|
2001-11-12 09:19:57 +00:00
|
|
|
case PROGFN_INITIALISE:
|
|
|
|
p->nphases = 0;
|
|
|
|
break;
|
2001-09-22 20:52:21 +00:00
|
|
|
case PROGFN_LIN_PHASE:
|
|
|
|
p->phases[phase-1].exponential = 0;
|
|
|
|
p->phases[phase-1].mult = p->phases[phase].total / progress;
|
|
|
|
break;
|
|
|
|
case PROGFN_EXP_PHASE:
|
|
|
|
p->phases[phase-1].exponential = 1;
|
|
|
|
p->phases[phase-1].param = 0x10000 + progress;
|
|
|
|
p->phases[phase-1].current = p->phases[phase-1].total;
|
|
|
|
p->phases[phase-1].n = 0;
|
2001-05-06 14:35:20 +00:00
|
|
|
break;
|
2001-09-22 20:52:21 +00:00
|
|
|
case PROGFN_PHASE_EXTENT:
|
|
|
|
p->phases[phase-1].total = progress;
|
|
|
|
break;
|
|
|
|
case PROGFN_READY:
|
|
|
|
{
|
|
|
|
unsigned total = 0;
|
|
|
|
int i;
|
|
|
|
for (i = 0; i < p->nphases; i++) {
|
|
|
|
p->phases[i].startpoint = total;
|
|
|
|
total += p->phases[i].total;
|
|
|
|
}
|
|
|
|
p->total = total;
|
|
|
|
p->divisor = ((p->total + PROGRESSRANGE - 1) / PROGRESSRANGE);
|
|
|
|
p->range = p->total / p->divisor;
|
|
|
|
SendMessage(p->progbar, PBM_SETRANGE, 0, MAKELPARAM(0, p->range));
|
2001-05-06 14:35:20 +00:00
|
|
|
}
|
|
|
|
break;
|
2001-09-22 20:52:21 +00:00
|
|
|
case PROGFN_PROGRESS:
|
|
|
|
if (p->phases[phase-1].exponential) {
|
|
|
|
while (p->phases[phase-1].n < progress) {
|
|
|
|
p->phases[phase-1].n++;
|
|
|
|
p->phases[phase-1].current *= p->phases[phase-1].param;
|
|
|
|
p->phases[phase-1].current /= 0x10000;
|
|
|
|
}
|
|
|
|
position = (p->phases[phase-1].startpoint +
|
|
|
|
p->phases[phase-1].total - p->phases[phase-1].current);
|
|
|
|
} else {
|
|
|
|
position = (p->phases[phase-1].startpoint +
|
|
|
|
progress * p->phases[phase-1].mult);
|
|
|
|
}
|
|
|
|
SendMessage(p->progbar, PBM_SETPOS, position / p->divisor, 0);
|
2001-05-06 14:35:20 +00:00
|
|
|
break;
|
2000-10-19 15:43:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
extern char ver[];
|
|
|
|
|
|
|
|
struct PassphraseProcStruct {
|
2011-10-02 14:14:21 +00:00
|
|
|
char **passphrase;
|
2000-10-19 15:43:08 +00:00
|
|
|
char *comment;
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Dialog-box function for the passphrase box.
|
|
|
|
*/
|
|
|
|
static int CALLBACK PassphraseProc(HWND hwnd, UINT msg,
|
2001-05-06 14:35:20 +00:00
|
|
|
WPARAM wParam, LPARAM lParam)
|
|
|
|
{
|
2011-10-02 14:14:21 +00:00
|
|
|
static char **passphrase = NULL;
|
2000-10-19 15:43:08 +00:00
|
|
|
struct PassphraseProcStruct *p;
|
|
|
|
|
|
|
|
switch (msg) {
|
|
|
|
case WM_INITDIALOG:
|
2001-05-06 14:35:20 +00:00
|
|
|
SetForegroundWindow(hwnd);
|
|
|
|
SetWindowPos(hwnd, HWND_TOP, 0, 0, 0, 0,
|
|
|
|
SWP_NOMOVE | SWP_NOSIZE | SWP_SHOWWINDOW);
|
2001-03-03 11:54:34 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Centre the window.
|
|
|
|
*/
|
|
|
|
{ /* centre the window */
|
|
|
|
RECT rs, rd;
|
|
|
|
HWND hw;
|
|
|
|
|
|
|
|
hw = GetDesktopWindow();
|
2001-05-06 14:35:20 +00:00
|
|
|
if (GetWindowRect(hw, &rs) && GetWindowRect(hwnd, &rd))
|
|
|
|
MoveWindow(hwnd,
|
|
|
|
(rs.right + rs.left + rd.left - rd.right) / 2,
|
|
|
|
(rs.bottom + rs.top + rd.top - rd.bottom) / 2,
|
|
|
|
rd.right - rd.left, rd.bottom - rd.top, TRUE);
|
2001-03-03 11:54:34 +00:00
|
|
|
}
|
|
|
|
|
2001-05-06 14:35:20 +00:00
|
|
|
p = (struct PassphraseProcStruct *) lParam;
|
|
|
|
passphrase = p->passphrase;
|
|
|
|
if (p->comment)
|
|
|
|
SetDlgItemText(hwnd, 101, p->comment);
|
2011-10-02 14:14:21 +00:00
|
|
|
burnstr(*passphrase);
|
|
|
|
*passphrase = dupstr("");
|
|
|
|
SetDlgItemText(hwnd, 102, *passphrase);
|
2001-05-06 14:35:20 +00:00
|
|
|
return 0;
|
2000-10-19 15:43:08 +00:00
|
|
|
case WM_COMMAND:
|
|
|
|
switch (LOWORD(wParam)) {
|
|
|
|
case IDOK:
|
|
|
|
if (*passphrase)
|
2001-05-06 14:35:20 +00:00
|
|
|
EndDialog(hwnd, 1);
|
2000-10-19 15:43:08 +00:00
|
|
|
else
|
2001-05-06 14:35:20 +00:00
|
|
|
MessageBeep(0);
|
2000-10-19 15:43:08 +00:00
|
|
|
return 0;
|
|
|
|
case IDCANCEL:
|
2001-05-06 14:35:20 +00:00
|
|
|
EndDialog(hwnd, 0);
|
2000-10-19 15:43:08 +00:00
|
|
|
return 0;
|
2001-05-06 14:35:20 +00:00
|
|
|
case 102: /* edit box */
|
2001-04-28 11:41:33 +00:00
|
|
|
if ((HIWORD(wParam) == EN_CHANGE) && passphrase) {
|
2011-10-02 14:14:21 +00:00
|
|
|
burnstr(*passphrase);
|
|
|
|
*passphrase = GetDlgItemText_alloc(hwnd, 102);
|
2001-05-06 14:35:20 +00:00
|
|
|
}
|
|
|
|
return 0;
|
2000-10-19 15:43:08 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
case WM_CLOSE:
|
2001-05-06 14:35:20 +00:00
|
|
|
EndDialog(hwnd, 0);
|
2000-10-19 15:43:08 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Prompt for a key file. Assumes the filename buffer is of size
|
|
|
|
* FILENAME_MAX.
|
|
|
|
*/
|
|
|
|
static int prompt_keyfile(HWND hwnd, char *dlgtitle,
|
2002-08-06 17:35:34 +00:00
|
|
|
char *filename, int save, int ppk)
|
2001-05-06 14:35:20 +00:00
|
|
|
{
|
2000-10-19 15:43:08 +00:00
|
|
|
OPENFILENAME of;
|
|
|
|
memset(&of, 0, sizeof(of));
|
|
|
|
of.hwndOwner = hwnd;
|
2002-08-06 17:35:34 +00:00
|
|
|
if (ppk) {
|
2003-01-29 16:39:18 +00:00
|
|
|
of.lpstrFilter = "PuTTY Private Key Files (*.ppk)\0*.ppk\0"
|
|
|
|
"All Files (*.*)\0*\0\0\0";
|
2002-08-06 17:35:34 +00:00
|
|
|
of.lpstrDefExt = ".ppk";
|
|
|
|
} else {
|
2003-01-29 16:39:18 +00:00
|
|
|
of.lpstrFilter = "All Files (*.*)\0*\0\0\0";
|
2002-08-06 17:35:34 +00:00
|
|
|
}
|
2000-10-19 15:43:08 +00:00
|
|
|
of.lpstrCustomFilter = NULL;
|
|
|
|
of.nFilterIndex = 1;
|
2001-05-06 14:35:20 +00:00
|
|
|
of.lpstrFile = filename;
|
|
|
|
*filename = '\0';
|
2000-10-19 15:43:08 +00:00
|
|
|
of.nMaxFile = FILENAME_MAX;
|
|
|
|
of.lpstrFileTitle = NULL;
|
|
|
|
of.lpstrTitle = dlgtitle;
|
|
|
|
of.Flags = 0;
|
2005-02-28 02:51:51 +00:00
|
|
|
return request_file(NULL, &of, FALSE, save);
|
2000-10-19 15:43:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Dialog-box function for the Licence box.
|
|
|
|
*/
|
2001-05-06 14:35:20 +00:00
|
|
|
static int CALLBACK LicenceProc(HWND hwnd, UINT msg,
|
|
|
|
WPARAM wParam, LPARAM lParam)
|
|
|
|
{
|
2000-10-19 15:43:08 +00:00
|
|
|
switch (msg) {
|
|
|
|
case WM_INITDIALOG:
|
2001-03-03 11:54:34 +00:00
|
|
|
/*
|
|
|
|
* Centre the window.
|
|
|
|
*/
|
|
|
|
{ /* centre the window */
|
|
|
|
RECT rs, rd;
|
|
|
|
HWND hw;
|
|
|
|
|
|
|
|
hw = GetDesktopWindow();
|
2001-05-06 14:35:20 +00:00
|
|
|
if (GetWindowRect(hw, &rs) && GetWindowRect(hwnd, &rd))
|
|
|
|
MoveWindow(hwnd,
|
|
|
|
(rs.right + rs.left + rd.left - rd.right) / 2,
|
|
|
|
(rs.bottom + rs.top + rd.top - rd.bottom) / 2,
|
|
|
|
rd.right - rd.left, rd.bottom - rd.top, TRUE);
|
2001-03-03 11:54:34 +00:00
|
|
|
}
|
|
|
|
|
2000-10-19 15:43:08 +00:00
|
|
|
return 1;
|
|
|
|
case WM_COMMAND:
|
|
|
|
switch (LOWORD(wParam)) {
|
|
|
|
case IDOK:
|
2004-10-27 15:50:52 +00:00
|
|
|
case IDCANCEL:
|
2001-05-06 14:35:20 +00:00
|
|
|
EndDialog(hwnd, 1);
|
2000-10-19 15:43:08 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
case WM_CLOSE:
|
|
|
|
EndDialog(hwnd, 1);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Dialog-box function for the About box.
|
|
|
|
*/
|
2001-05-06 14:35:20 +00:00
|
|
|
static int CALLBACK AboutProc(HWND hwnd, UINT msg,
|
|
|
|
WPARAM wParam, LPARAM lParam)
|
|
|
|
{
|
2000-10-19 15:43:08 +00:00
|
|
|
switch (msg) {
|
|
|
|
case WM_INITDIALOG:
|
2001-03-03 11:54:34 +00:00
|
|
|
/*
|
|
|
|
* Centre the window.
|
|
|
|
*/
|
|
|
|
{ /* centre the window */
|
|
|
|
RECT rs, rd;
|
|
|
|
HWND hw;
|
|
|
|
|
|
|
|
hw = GetDesktopWindow();
|
2001-05-06 14:35:20 +00:00
|
|
|
if (GetWindowRect(hw, &rs) && GetWindowRect(hwnd, &rd))
|
|
|
|
MoveWindow(hwnd,
|
|
|
|
(rs.right + rs.left + rd.left - rd.right) / 2,
|
|
|
|
(rs.bottom + rs.top + rd.top - rd.bottom) / 2,
|
|
|
|
rd.right - rd.left, rd.bottom - rd.top, TRUE);
|
2001-03-03 11:54:34 +00:00
|
|
|
}
|
|
|
|
|
2001-05-06 14:35:20 +00:00
|
|
|
SetDlgItemText(hwnd, 100, ver);
|
2000-10-19 15:43:08 +00:00
|
|
|
return 1;
|
|
|
|
case WM_COMMAND:
|
|
|
|
switch (LOWORD(wParam)) {
|
|
|
|
case IDOK:
|
2004-10-27 15:50:52 +00:00
|
|
|
case IDCANCEL:
|
2001-05-06 14:35:20 +00:00
|
|
|
EndDialog(hwnd, 1);
|
2000-10-19 15:43:08 +00:00
|
|
|
return 0;
|
|
|
|
case 101:
|
|
|
|
EnableWindow(hwnd, 0);
|
2003-02-07 14:22:19 +00:00
|
|
|
DialogBox(hinst, MAKEINTRESOURCE(214), hwnd, LicenceProc);
|
2000-10-19 15:43:08 +00:00
|
|
|
EnableWindow(hwnd, 1);
|
2001-05-06 14:35:20 +00:00
|
|
|
SetActiveWindow(hwnd);
|
2000-10-19 15:43:08 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
case WM_CLOSE:
|
2001-05-06 14:35:20 +00:00
|
|
|
EndDialog(hwnd, 1);
|
2000-10-19 15:43:08 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-05-09 14:02:54 +00:00
|
|
|
typedef enum {RSA, DSA, ECDSA, ED25519} keytype;
|
2014-11-01 09:14:19 +00:00
|
|
|
|
2000-10-19 15:43:08 +00:00
|
|
|
/*
|
|
|
|
* Thread to generate a key.
|
|
|
|
*/
|
|
|
|
struct rsa_key_thread_params {
|
2001-05-06 14:35:20 +00:00
|
|
|
HWND progressbar; /* notify this with progress */
|
|
|
|
HWND dialog; /* notify this on completion */
|
2000-10-20 10:07:53 +00:00
|
|
|
int keysize; /* bits in key */
|
2014-11-01 09:14:19 +00:00
|
|
|
keytype keytype;
|
|
|
|
union {
|
|
|
|
struct RSAKey *key;
|
|
|
|
struct dss_key *dsskey;
|
2014-11-01 09:45:20 +00:00
|
|
|
struct ec_key *eckey;
|
2014-11-01 09:14:19 +00:00
|
|
|
};
|
2000-10-19 15:43:08 +00:00
|
|
|
};
|
2001-05-06 14:35:20 +00:00
|
|
|
static DWORD WINAPI generate_rsa_key_thread(void *param)
|
|
|
|
{
|
2000-10-19 15:43:08 +00:00
|
|
|
struct rsa_key_thread_params *params =
|
2001-05-06 14:35:20 +00:00
|
|
|
(struct rsa_key_thread_params *) param;
|
2000-10-19 15:43:08 +00:00
|
|
|
struct progress prog;
|
|
|
|
prog.progbar = params->progressbar;
|
|
|
|
|
2001-11-12 09:19:57 +00:00
|
|
|
progress_update(&prog, PROGFN_INITIALISE, 0, 0);
|
|
|
|
|
2014-11-01 09:14:19 +00:00
|
|
|
if (params->keytype == DSA)
|
2001-09-22 20:52:21 +00:00
|
|
|
dsa_generate(params->dsskey, params->keysize, progress_update, &prog);
|
2014-11-01 09:45:20 +00:00
|
|
|
else if (params->keytype == ECDSA)
|
|
|
|
ec_generate(params->eckey, params->keysize, progress_update, &prog);
|
2015-05-09 14:02:54 +00:00
|
|
|
else if (params->keytype == ED25519)
|
|
|
|
ec_edgenerate(params->eckey, params->keysize, progress_update, &prog);
|
2001-09-22 20:52:21 +00:00
|
|
|
else
|
|
|
|
rsa_generate(params->key, params->keysize, progress_update, &prog);
|
2000-10-19 15:43:08 +00:00
|
|
|
|
|
|
|
PostMessage(params->dialog, WM_DONEKEY, 0, 0);
|
|
|
|
|
2000-12-12 10:33:13 +00:00
|
|
|
sfree(params);
|
2000-10-19 15:43:08 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct MainDlgState {
|
|
|
|
int collecting_entropy;
|
|
|
|
int generation_thread_exists;
|
|
|
|
int key_exists;
|
|
|
|
int entropy_got, entropy_required, entropy_size;
|
2000-10-20 10:07:53 +00:00
|
|
|
int keysize;
|
2014-11-01 09:14:19 +00:00
|
|
|
int ssh2;
|
|
|
|
keytype keytype;
|
2001-03-03 11:54:34 +00:00
|
|
|
char **commentptr; /* points to key.comment or ssh2key.comment */
|
|
|
|
struct ssh2_userkey ssh2key;
|
2000-10-19 15:43:08 +00:00
|
|
|
unsigned *entropy;
|
2014-11-01 09:14:19 +00:00
|
|
|
union {
|
|
|
|
struct RSAKey key;
|
|
|
|
struct dss_key dsskey;
|
2014-11-01 09:45:20 +00:00
|
|
|
struct ec_key eckey;
|
2014-11-01 09:14:19 +00:00
|
|
|
};
|
2002-05-18 09:20:41 +00:00
|
|
|
HMENU filemenu, keymenu, cvtmenu;
|
2000-10-19 15:43:08 +00:00
|
|
|
};
|
|
|
|
|
2001-05-06 14:35:20 +00:00
|
|
|
static void hidemany(HWND hwnd, const int *ids, int hideit)
|
|
|
|
{
|
2000-10-19 15:43:08 +00:00
|
|
|
while (*ids) {
|
2001-05-06 14:35:20 +00:00
|
|
|
ShowWindow(GetDlgItem(hwnd, *ids++), (hideit ? SW_HIDE : SW_SHOW));
|
2000-10-19 15:43:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2001-08-27 17:40:03 +00:00
|
|
|
static void setupbigedit1(HWND hwnd, int id, int idstatic, struct RSAKey *key)
|
2001-05-06 14:35:20 +00:00
|
|
|
{
|
2015-05-12 12:42:26 +00:00
|
|
|
char *buffer = ssh1_pubkey_str(key);
|
2000-10-19 15:43:08 +00:00
|
|
|
SetDlgItemText(hwnd, id, buffer);
|
2001-08-27 17:40:03 +00:00
|
|
|
SetDlgItemText(hwnd, idstatic,
|
|
|
|
"&Public key for pasting into authorized_keys file:");
|
2000-12-12 10:33:13 +00:00
|
|
|
sfree(buffer);
|
2000-10-19 15:43:08 +00:00
|
|
|
}
|
|
|
|
|
2001-08-27 17:40:03 +00:00
|
|
|
static void setupbigedit2(HWND hwnd, int id, int idstatic,
|
|
|
|
struct ssh2_userkey *key)
|
2001-05-06 14:35:20 +00:00
|
|
|
{
|
2015-05-12 12:42:26 +00:00
|
|
|
char *buffer = ssh2_pubkey_openssh_str(key);
|
2001-03-03 11:54:34 +00:00
|
|
|
SetDlgItemText(hwnd, id, buffer);
|
2001-08-27 17:40:03 +00:00
|
|
|
SetDlgItemText(hwnd, idstatic, "&Public key for pasting into "
|
2003-11-24 13:40:58 +00:00
|
|
|
"OpenSSH authorized_keys file:");
|
2001-05-06 14:35:20 +00:00
|
|
|
sfree(buffer);
|
2001-03-03 11:54:34 +00:00
|
|
|
}
|
|
|
|
|
2001-11-25 14:31:46 +00:00
|
|
|
/*
|
|
|
|
* Warn about the obsolescent key file format.
|
|
|
|
*/
|
|
|
|
void old_keyfile_warning(void)
|
|
|
|
{
|
|
|
|
static const char mbtitle[] = "PuTTY Key File Warning";
|
|
|
|
static const char message[] =
|
2005-03-10 16:36:05 +00:00
|
|
|
"You are loading an SSH-2 private key which has an\n"
|
2001-11-25 14:31:46 +00:00
|
|
|
"old version of the file format. This means your key\n"
|
|
|
|
"file is not fully tamperproof. Future versions of\n"
|
|
|
|
"PuTTY may stop supporting this private key format,\n"
|
|
|
|
"so we recommend you convert your key to the new\n"
|
|
|
|
"format.\n"
|
|
|
|
"\n"
|
|
|
|
"Once the key is loaded into PuTTYgen, you can perform\n"
|
|
|
|
"this conversion simply by saving it again.";
|
|
|
|
|
|
|
|
MessageBox(NULL, message, mbtitle, MB_OK);
|
|
|
|
}
|
|
|
|
|
2001-08-27 17:40:03 +00:00
|
|
|
static int save_ssh2_pubkey(char *filename, struct ssh2_userkey *key)
|
|
|
|
{
|
|
|
|
unsigned char *pub_blob;
|
|
|
|
char *p;
|
|
|
|
int pub_len;
|
|
|
|
int i, column;
|
|
|
|
FILE *fp;
|
|
|
|
|
|
|
|
pub_blob = key->alg->public_blob(key->data, &pub_len);
|
|
|
|
|
|
|
|
fp = fopen(filename, "wb");
|
|
|
|
if (!fp)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
fprintf(fp, "---- BEGIN SSH2 PUBLIC KEY ----\n");
|
|
|
|
|
|
|
|
fprintf(fp, "Comment: \"");
|
|
|
|
for (p = key->comment; *p; p++) {
|
|
|
|
if (*p == '\\' || *p == '\"')
|
|
|
|
fputc('\\', fp);
|
|
|
|
fputc(*p, fp);
|
|
|
|
}
|
|
|
|
fprintf(fp, "\"\n");
|
|
|
|
|
|
|
|
i = 0;
|
|
|
|
column = 0;
|
|
|
|
while (i < pub_len) {
|
|
|
|
char buf[5];
|
|
|
|
int n = (pub_len - i < 3 ? pub_len - i : 3);
|
|
|
|
base64_encode_atom(pub_blob + i, n, buf);
|
|
|
|
i += n;
|
|
|
|
buf[4] = '\0';
|
|
|
|
fputs(buf, fp);
|
|
|
|
if (++column >= 16) {
|
|
|
|
fputc('\n', fp);
|
|
|
|
column = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (column > 0)
|
|
|
|
fputc('\n', fp);
|
|
|
|
|
|
|
|
fprintf(fp, "---- END SSH2 PUBLIC KEY ----\n");
|
|
|
|
fclose(fp);
|
|
|
|
sfree(pub_blob);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2002-05-15 20:07:11 +00:00
|
|
|
enum {
|
|
|
|
controlidstart = 100,
|
|
|
|
IDC_QUIT,
|
|
|
|
IDC_TITLE,
|
|
|
|
IDC_BOX_KEY,
|
|
|
|
IDC_NOKEY,
|
|
|
|
IDC_GENERATING,
|
|
|
|
IDC_PROGRESS,
|
|
|
|
IDC_PKSTATIC, IDC_KEYDISPLAY,
|
|
|
|
IDC_FPSTATIC, IDC_FINGERPRINT,
|
|
|
|
IDC_COMMENTSTATIC, IDC_COMMENTEDIT,
|
|
|
|
IDC_PASSPHRASE1STATIC, IDC_PASSPHRASE1EDIT,
|
|
|
|
IDC_PASSPHRASE2STATIC, IDC_PASSPHRASE2EDIT,
|
|
|
|
IDC_BOX_ACTIONS,
|
|
|
|
IDC_GENSTATIC, IDC_GENERATE,
|
|
|
|
IDC_LOADSTATIC, IDC_LOAD,
|
|
|
|
IDC_SAVESTATIC, IDC_SAVE, IDC_SAVEPUB,
|
|
|
|
IDC_BOX_PARAMS,
|
|
|
|
IDC_TYPESTATIC, IDC_KEYSSH1, IDC_KEYSSH2RSA, IDC_KEYSSH2DSA,
|
2015-05-09 14:02:54 +00:00
|
|
|
IDC_KEYSSH2ECDSA, IDC_KEYSSH2ED25519,
|
2002-05-15 20:07:11 +00:00
|
|
|
IDC_BITSSTATIC, IDC_BITS,
|
|
|
|
IDC_ABOUT,
|
|
|
|
IDC_GIVEHELP,
|
2015-04-28 18:46:58 +00:00
|
|
|
IDC_IMPORT,
|
2015-05-10 06:42:48 +00:00
|
|
|
IDC_EXPORT_OPENSSH_AUTO, IDC_EXPORT_OPENSSH_NEW,
|
2015-04-28 18:46:58 +00:00
|
|
|
IDC_EXPORT_SSHCOM
|
2002-05-15 20:07:11 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static const int nokey_ids[] = { IDC_NOKEY, 0 };
|
|
|
|
static const int generating_ids[] = { IDC_GENERATING, IDC_PROGRESS, 0 };
|
|
|
|
static const int gotkey_ids[] = {
|
|
|
|
IDC_PKSTATIC, IDC_KEYDISPLAY,
|
|
|
|
IDC_FPSTATIC, IDC_FINGERPRINT,
|
|
|
|
IDC_COMMENTSTATIC, IDC_COMMENTEDIT,
|
|
|
|
IDC_PASSPHRASE1STATIC, IDC_PASSPHRASE1EDIT,
|
|
|
|
IDC_PASSPHRASE2STATIC, IDC_PASSPHRASE2EDIT, 0
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Small UI helper function to switch the state of the main dialog
|
|
|
|
* by enabling and disabling controls and menu items.
|
|
|
|
*/
|
|
|
|
void ui_set_state(HWND hwnd, struct MainDlgState *state, int status)
|
|
|
|
{
|
|
|
|
int type;
|
|
|
|
|
|
|
|
switch (status) {
|
|
|
|
case 0: /* no key */
|
|
|
|
hidemany(hwnd, nokey_ids, FALSE);
|
|
|
|
hidemany(hwnd, generating_ids, TRUE);
|
|
|
|
hidemany(hwnd, gotkey_ids, TRUE);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_GENERATE), 1);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_LOAD), 1);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_SAVE), 0);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_SAVEPUB), 0);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH1), 1);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2RSA), 1);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2DSA), 1);
|
2014-11-01 09:45:20 +00:00
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2ECDSA), 1);
|
2015-05-09 14:02:54 +00:00
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2ED25519), 1);
|
2002-05-15 20:07:11 +00:00
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_BITS), 1);
|
|
|
|
EnableMenuItem(state->filemenu, IDC_LOAD, MF_ENABLED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->filemenu, IDC_SAVE, MF_GRAYED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->filemenu, IDC_SAVEPUB, MF_GRAYED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->keymenu, IDC_GENERATE, MF_ENABLED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->keymenu, IDC_KEYSSH1, MF_ENABLED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->keymenu, IDC_KEYSSH2RSA, MF_ENABLED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->keymenu, IDC_KEYSSH2DSA, MF_ENABLED|MF_BYCOMMAND);
|
2014-11-01 09:45:20 +00:00
|
|
|
EnableMenuItem(state->keymenu, IDC_KEYSSH2ECDSA,
|
|
|
|
MF_ENABLED|MF_BYCOMMAND);
|
2015-05-09 14:02:54 +00:00
|
|
|
EnableMenuItem(state->keymenu, IDC_KEYSSH2ED25519,
|
|
|
|
MF_ENABLED|MF_BYCOMMAND);
|
2002-05-18 09:20:41 +00:00
|
|
|
EnableMenuItem(state->cvtmenu, IDC_IMPORT, MF_ENABLED|MF_BYCOMMAND);
|
2015-05-10 06:42:48 +00:00
|
|
|
EnableMenuItem(state->cvtmenu, IDC_EXPORT_OPENSSH_AUTO,
|
2015-04-28 18:46:58 +00:00
|
|
|
MF_GRAYED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->cvtmenu, IDC_EXPORT_OPENSSH_NEW,
|
2002-05-15 20:07:11 +00:00
|
|
|
MF_GRAYED|MF_BYCOMMAND);
|
2002-05-18 09:20:41 +00:00
|
|
|
EnableMenuItem(state->cvtmenu, IDC_EXPORT_SSHCOM,
|
2002-05-15 20:07:11 +00:00
|
|
|
MF_GRAYED|MF_BYCOMMAND);
|
|
|
|
break;
|
|
|
|
case 1: /* generating key */
|
|
|
|
hidemany(hwnd, nokey_ids, TRUE);
|
|
|
|
hidemany(hwnd, generating_ids, FALSE);
|
|
|
|
hidemany(hwnd, gotkey_ids, TRUE);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_GENERATE), 0);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_LOAD), 0);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_SAVE), 0);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_SAVEPUB), 0);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH1), 0);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2RSA), 0);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2DSA), 0);
|
2014-11-01 09:45:20 +00:00
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2ECDSA), 0);
|
2015-05-09 14:02:54 +00:00
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2ED25519), 0);
|
2002-05-15 20:07:11 +00:00
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_BITS), 0);
|
|
|
|
EnableMenuItem(state->filemenu, IDC_LOAD, MF_GRAYED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->filemenu, IDC_SAVE, MF_GRAYED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->filemenu, IDC_SAVEPUB, MF_GRAYED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->keymenu, IDC_GENERATE, MF_GRAYED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->keymenu, IDC_KEYSSH1, MF_GRAYED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->keymenu, IDC_KEYSSH2RSA, MF_GRAYED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->keymenu, IDC_KEYSSH2DSA, MF_GRAYED|MF_BYCOMMAND);
|
2014-11-01 09:45:20 +00:00
|
|
|
EnableMenuItem(state->keymenu, IDC_KEYSSH2ECDSA,
|
|
|
|
MF_GRAYED|MF_BYCOMMAND);
|
2015-05-09 14:02:54 +00:00
|
|
|
EnableMenuItem(state->keymenu, IDC_KEYSSH2ED25519,
|
|
|
|
MF_GRAYED|MF_BYCOMMAND);
|
2002-05-18 09:20:41 +00:00
|
|
|
EnableMenuItem(state->cvtmenu, IDC_IMPORT, MF_GRAYED|MF_BYCOMMAND);
|
2015-05-10 06:42:48 +00:00
|
|
|
EnableMenuItem(state->cvtmenu, IDC_EXPORT_OPENSSH_AUTO,
|
2015-04-28 18:46:58 +00:00
|
|
|
MF_GRAYED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->cvtmenu, IDC_EXPORT_OPENSSH_NEW,
|
2002-05-15 20:07:11 +00:00
|
|
|
MF_GRAYED|MF_BYCOMMAND);
|
2002-05-18 09:20:41 +00:00
|
|
|
EnableMenuItem(state->cvtmenu, IDC_EXPORT_SSHCOM,
|
2002-05-15 20:07:11 +00:00
|
|
|
MF_GRAYED|MF_BYCOMMAND);
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
hidemany(hwnd, nokey_ids, TRUE);
|
|
|
|
hidemany(hwnd, generating_ids, TRUE);
|
|
|
|
hidemany(hwnd, gotkey_ids, FALSE);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_GENERATE), 1);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_LOAD), 1);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_SAVE), 1);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_SAVEPUB), 1);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH1), 1);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2RSA), 1);
|
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2DSA), 1);
|
2014-11-01 09:45:20 +00:00
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2ECDSA), 1);
|
2015-05-09 14:02:54 +00:00
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2ED25519), 1);
|
2002-05-15 20:07:11 +00:00
|
|
|
EnableWindow(GetDlgItem(hwnd, IDC_BITS), 1);
|
|
|
|
EnableMenuItem(state->filemenu, IDC_LOAD, MF_ENABLED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->filemenu, IDC_SAVE, MF_ENABLED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->filemenu, IDC_SAVEPUB, MF_ENABLED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->keymenu, IDC_GENERATE, MF_ENABLED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->keymenu, IDC_KEYSSH1, MF_ENABLED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->keymenu, IDC_KEYSSH2RSA,MF_ENABLED|MF_BYCOMMAND);
|
|
|
|
EnableMenuItem(state->keymenu, IDC_KEYSSH2DSA,MF_ENABLED|MF_BYCOMMAND);
|
2014-11-01 09:45:20 +00:00
|
|
|
EnableMenuItem(state->keymenu, IDC_KEYSSH2ECDSA,
|
|
|
|
MF_ENABLED|MF_BYCOMMAND);
|
2015-05-09 14:02:54 +00:00
|
|
|
EnableMenuItem(state->keymenu, IDC_KEYSSH2ED25519,
|
|
|
|
MF_ENABLED|MF_BYCOMMAND);
|
2002-05-18 09:20:41 +00:00
|
|
|
EnableMenuItem(state->cvtmenu, IDC_IMPORT, MF_ENABLED|MF_BYCOMMAND);
|
2002-05-15 20:07:11 +00:00
|
|
|
/*
|
|
|
|
* Enable export menu items if and only if the key type
|
|
|
|
* supports this kind of export.
|
|
|
|
*/
|
|
|
|
type = state->ssh2 ? SSH_KEYTYPE_SSH2 : SSH_KEYTYPE_SSH1;
|
|
|
|
#define do_export_menuitem(x,y) \
|
2002-05-18 09:20:41 +00:00
|
|
|
EnableMenuItem(state->cvtmenu, x, MF_BYCOMMAND | \
|
2002-05-15 20:07:11 +00:00
|
|
|
(import_target_type(y)==type?MF_ENABLED:MF_GRAYED))
|
2015-05-10 06:42:48 +00:00
|
|
|
do_export_menuitem(IDC_EXPORT_OPENSSH_AUTO, SSH_KEYTYPE_OPENSSH_AUTO);
|
2015-04-28 18:46:58 +00:00
|
|
|
do_export_menuitem(IDC_EXPORT_OPENSSH_NEW, SSH_KEYTYPE_OPENSSH_NEW);
|
2002-05-15 20:07:11 +00:00
|
|
|
do_export_menuitem(IDC_EXPORT_SSHCOM, SSH_KEYTYPE_SSHCOM);
|
|
|
|
#undef do_export_menuitem
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2002-08-06 17:48:14 +00:00
|
|
|
void load_key_file(HWND hwnd, struct MainDlgState *state,
|
2011-10-02 11:01:57 +00:00
|
|
|
Filename *filename, int was_import_cmd)
|
2002-08-06 17:48:14 +00:00
|
|
|
{
|
2011-10-02 14:14:21 +00:00
|
|
|
char *passphrase;
|
2002-08-06 17:48:14 +00:00
|
|
|
int needs_pass;
|
|
|
|
int type, realtype;
|
|
|
|
int ret;
|
2005-02-27 23:01:11 +00:00
|
|
|
const char *errmsg = NULL;
|
2002-08-06 17:48:14 +00:00
|
|
|
char *comment;
|
|
|
|
struct RSAKey newkey1;
|
|
|
|
struct ssh2_userkey *newkey2 = NULL;
|
|
|
|
|
2011-10-02 11:01:57 +00:00
|
|
|
type = realtype = key_type(filename);
|
2002-08-06 17:48:14 +00:00
|
|
|
if (type != SSH_KEYTYPE_SSH1 &&
|
|
|
|
type != SSH_KEYTYPE_SSH2 &&
|
|
|
|
!import_possible(type)) {
|
2005-02-27 23:01:11 +00:00
|
|
|
char *msg = dupprintf("Couldn't load private key (%s)",
|
|
|
|
key_type_to_str(type));
|
2005-03-01 01:16:57 +00:00
|
|
|
message_box(msg, "PuTTYgen Error", MB_OK | MB_ICONERROR,
|
|
|
|
HELPCTXID(errors_cantloadkey));
|
2005-02-27 23:01:11 +00:00
|
|
|
sfree(msg);
|
2002-08-06 17:48:14 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (type != SSH_KEYTYPE_SSH1 &&
|
|
|
|
type != SSH_KEYTYPE_SSH2) {
|
|
|
|
realtype = type;
|
|
|
|
type = import_target_type(type);
|
|
|
|
}
|
|
|
|
|
|
|
|
comment = NULL;
|
2011-10-02 14:14:21 +00:00
|
|
|
passphrase = NULL;
|
2002-08-06 17:48:14 +00:00
|
|
|
if (realtype == SSH_KEYTYPE_SSH1)
|
2011-10-02 11:01:57 +00:00
|
|
|
needs_pass = rsakey_encrypted(filename, &comment);
|
2002-08-06 17:48:14 +00:00
|
|
|
else if (realtype == SSH_KEYTYPE_SSH2)
|
2011-10-02 11:01:57 +00:00
|
|
|
needs_pass = ssh2_userkey_encrypted(filename, &comment);
|
2002-08-06 17:48:14 +00:00
|
|
|
else
|
2011-10-02 11:01:57 +00:00
|
|
|
needs_pass = import_encrypted(filename, realtype, &comment);
|
2002-08-06 17:48:14 +00:00
|
|
|
do {
|
2011-10-02 14:14:21 +00:00
|
|
|
burnstr(passphrase);
|
|
|
|
passphrase = NULL;
|
|
|
|
|
2002-08-06 17:48:14 +00:00
|
|
|
if (needs_pass) {
|
|
|
|
int dlgret;
|
2011-10-02 14:14:21 +00:00
|
|
|
struct PassphraseProcStruct pps;
|
|
|
|
pps.passphrase = &passphrase;
|
|
|
|
pps.comment = comment;
|
2002-08-06 17:48:14 +00:00
|
|
|
dlgret = DialogBoxParam(hinst,
|
|
|
|
MAKEINTRESOURCE(210),
|
|
|
|
NULL, PassphraseProc,
|
2005-03-02 15:53:50 +00:00
|
|
|
(LPARAM) &pps);
|
2002-08-06 17:48:14 +00:00
|
|
|
if (!dlgret) {
|
|
|
|
ret = -2;
|
|
|
|
break;
|
|
|
|
}
|
2011-10-02 14:14:21 +00:00
|
|
|
assert(passphrase != NULL);
|
2002-08-06 17:48:14 +00:00
|
|
|
} else
|
2011-10-02 14:14:21 +00:00
|
|
|
passphrase = dupstr("");
|
2002-08-06 17:48:14 +00:00
|
|
|
if (type == SSH_KEYTYPE_SSH1) {
|
|
|
|
if (realtype == type)
|
2011-10-02 11:01:57 +00:00
|
|
|
ret = loadrsakey(filename, &newkey1, passphrase, &errmsg);
|
2002-08-06 17:48:14 +00:00
|
|
|
else
|
2011-10-02 11:01:57 +00:00
|
|
|
ret = import_ssh1(filename, realtype, &newkey1,
|
|
|
|
passphrase, &errmsg);
|
2002-08-06 17:48:14 +00:00
|
|
|
} else {
|
|
|
|
if (realtype == type)
|
2011-10-02 11:01:57 +00:00
|
|
|
newkey2 = ssh2_load_userkey(filename, passphrase, &errmsg);
|
2002-08-06 17:48:14 +00:00
|
|
|
else
|
2011-10-02 11:01:57 +00:00
|
|
|
newkey2 = import_ssh2(filename, realtype, passphrase, &errmsg);
|
2002-08-06 17:48:14 +00:00
|
|
|
if (newkey2 == SSH2_WRONG_PASSPHRASE)
|
|
|
|
ret = -1;
|
|
|
|
else if (!newkey2)
|
|
|
|
ret = 0;
|
|
|
|
else
|
|
|
|
ret = 1;
|
|
|
|
}
|
|
|
|
} while (ret == -1);
|
|
|
|
if (comment)
|
|
|
|
sfree(comment);
|
|
|
|
if (ret == 0) {
|
2005-02-27 23:01:11 +00:00
|
|
|
char *msg = dupprintf("Couldn't load private key (%s)", errmsg);
|
2005-03-01 01:16:57 +00:00
|
|
|
message_box(msg, "PuTTYgen Error", MB_OK | MB_ICONERROR,
|
|
|
|
HELPCTXID(errors_cantloadkey));
|
2005-02-27 23:01:11 +00:00
|
|
|
sfree(msg);
|
2002-08-06 17:48:14 +00:00
|
|
|
} else if (ret == 1) {
|
|
|
|
/*
|
|
|
|
* Now update the key controls with all the
|
|
|
|
* key data.
|
|
|
|
*/
|
|
|
|
{
|
|
|
|
SetDlgItemText(hwnd, IDC_PASSPHRASE1EDIT,
|
|
|
|
passphrase);
|
|
|
|
SetDlgItemText(hwnd, IDC_PASSPHRASE2EDIT,
|
|
|
|
passphrase);
|
|
|
|
if (type == SSH_KEYTYPE_SSH1) {
|
|
|
|
char buf[128];
|
|
|
|
char *savecomment;
|
|
|
|
|
|
|
|
state->ssh2 = FALSE;
|
|
|
|
state->commentptr = &state->key.comment;
|
|
|
|
state->key = newkey1;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Set the key fingerprint.
|
|
|
|
*/
|
|
|
|
savecomment = state->key.comment;
|
|
|
|
state->key.comment = NULL;
|
|
|
|
rsa_fingerprint(buf, sizeof(buf),
|
|
|
|
&state->key);
|
|
|
|
state->key.comment = savecomment;
|
|
|
|
|
|
|
|
SetDlgItemText(hwnd, IDC_FINGERPRINT, buf);
|
|
|
|
/*
|
|
|
|
* Construct a decimal representation
|
|
|
|
* of the key, for pasting into
|
|
|
|
* .ssh/authorized_keys on a Unix box.
|
|
|
|
*/
|
|
|
|
setupbigedit1(hwnd, IDC_KEYDISPLAY,
|
|
|
|
IDC_PKSTATIC, &state->key);
|
|
|
|
} else {
|
|
|
|
char *fp;
|
|
|
|
char *savecomment;
|
|
|
|
|
|
|
|
state->ssh2 = TRUE;
|
|
|
|
state->commentptr =
|
|
|
|
&state->ssh2key.comment;
|
|
|
|
state->ssh2key = *newkey2; /* structure copy */
|
|
|
|
sfree(newkey2);
|
|
|
|
|
|
|
|
savecomment = state->ssh2key.comment;
|
|
|
|
state->ssh2key.comment = NULL;
|
|
|
|
fp =
|
|
|
|
state->ssh2key.alg->
|
|
|
|
fingerprint(state->ssh2key.data);
|
|
|
|
state->ssh2key.comment = savecomment;
|
|
|
|
|
|
|
|
SetDlgItemText(hwnd, IDC_FINGERPRINT, fp);
|
|
|
|
sfree(fp);
|
|
|
|
|
|
|
|
setupbigedit2(hwnd, IDC_KEYDISPLAY,
|
|
|
|
IDC_PKSTATIC, &state->ssh2key);
|
|
|
|
}
|
|
|
|
SetDlgItemText(hwnd, IDC_COMMENTEDIT,
|
|
|
|
*state->commentptr);
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Finally, hide the progress bar and show
|
|
|
|
* the key data.
|
|
|
|
*/
|
|
|
|
ui_set_state(hwnd, state, 2);
|
|
|
|
state->key_exists = TRUE;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If the user has imported a foreign key
|
|
|
|
* using the Load command, let them know.
|
|
|
|
* If they've used the Import command, be
|
|
|
|
* silent.
|
|
|
|
*/
|
|
|
|
if (realtype != type && !was_import_cmd) {
|
|
|
|
char msg[512];
|
|
|
|
sprintf(msg, "Successfully imported foreign key\n"
|
|
|
|
"(%s).\n"
|
|
|
|
"To use this key with PuTTY, you need to\n"
|
|
|
|
"use the \"Save private key\" command to\n"
|
|
|
|
"save it in PuTTY's own format.",
|
|
|
|
key_type_to_str(realtype));
|
|
|
|
MessageBox(NULL, msg, "PuTTYgen Notice",
|
|
|
|
MB_OK | MB_ICONINFORMATION);
|
|
|
|
}
|
|
|
|
}
|
2011-10-02 14:14:21 +00:00
|
|
|
burnstr(passphrase);
|
2002-08-06 17:48:14 +00:00
|
|
|
}
|
|
|
|
|
2000-10-19 15:43:08 +00:00
|
|
|
/*
|
|
|
|
* Dialog-box function for the main PuTTYgen dialog box.
|
|
|
|
*/
|
2001-05-06 14:35:20 +00:00
|
|
|
static int CALLBACK MainDlgProc(HWND hwnd, UINT msg,
|
|
|
|
WPARAM wParam, LPARAM lParam)
|
|
|
|
{
|
2000-10-19 15:43:08 +00:00
|
|
|
static const char generating_msg[] =
|
2001-05-06 14:35:20 +00:00
|
|
|
"Please wait while a key is generated...";
|
2000-10-19 15:43:08 +00:00
|
|
|
static const char entropy_msg[] =
|
2001-05-06 14:35:20 +00:00
|
|
|
"Please generate some randomness by moving the mouse over the blank area.";
|
2000-10-19 15:43:08 +00:00
|
|
|
struct MainDlgState *state;
|
|
|
|
|
|
|
|
switch (msg) {
|
|
|
|
case WM_INITDIALOG:
|
2006-12-17 11:16:07 +00:00
|
|
|
if (has_help())
|
2005-05-21 14:16:43 +00:00
|
|
|
SetWindowLongPtr(hwnd, GWL_EXSTYLE,
|
|
|
|
GetWindowLongPtr(hwnd, GWL_EXSTYLE) |
|
|
|
|
WS_EX_CONTEXTHELP);
|
2001-12-12 18:45:56 +00:00
|
|
|
else {
|
|
|
|
/*
|
|
|
|
* If we add a Help button, this is where we destroy it
|
|
|
|
* if the help file isn't present.
|
|
|
|
*/
|
|
|
|
}
|
2003-02-07 13:54:34 +00:00
|
|
|
SendMessage(hwnd, WM_SETICON, (WPARAM) ICON_BIG,
|
|
|
|
(LPARAM) LoadIcon(hinst, MAKEINTRESOURCE(200)));
|
2001-12-12 18:45:56 +00:00
|
|
|
|
2003-03-29 16:14:26 +00:00
|
|
|
state = snew(struct MainDlgState);
|
2002-05-15 20:07:11 +00:00
|
|
|
state->generation_thread_exists = FALSE;
|
|
|
|
state->collecting_entropy = FALSE;
|
|
|
|
state->entropy = NULL;
|
|
|
|
state->key_exists = FALSE;
|
2005-05-21 14:16:43 +00:00
|
|
|
SetWindowLongPtr(hwnd, GWLP_USERDATA, (LONG_PTR) state);
|
2002-05-11 16:45:29 +00:00
|
|
|
{
|
|
|
|
HMENU menu, menu1;
|
|
|
|
|
|
|
|
menu = CreateMenu();
|
|
|
|
|
|
|
|
menu1 = CreateMenu();
|
|
|
|
AppendMenu(menu1, MF_ENABLED, IDC_LOAD, "&Load private key");
|
|
|
|
AppendMenu(menu1, MF_ENABLED, IDC_SAVEPUB, "Save p&ublic key");
|
|
|
|
AppendMenu(menu1, MF_ENABLED, IDC_SAVE, "&Save private key");
|
2002-05-15 20:07:11 +00:00
|
|
|
AppendMenu(menu1, MF_SEPARATOR, 0, 0);
|
|
|
|
AppendMenu(menu1, MF_ENABLED, IDC_QUIT, "E&xit");
|
2002-05-11 16:45:29 +00:00
|
|
|
AppendMenu(menu, MF_POPUP | MF_ENABLED, (UINT) menu1, "&File");
|
2002-05-15 20:07:11 +00:00
|
|
|
state->filemenu = menu1;
|
|
|
|
|
|
|
|
menu1 = CreateMenu();
|
|
|
|
AppendMenu(menu1, MF_ENABLED, IDC_GENERATE, "&Generate key pair");
|
|
|
|
AppendMenu(menu1, MF_SEPARATOR, 0, 0);
|
2005-03-10 16:36:05 +00:00
|
|
|
AppendMenu(menu1, MF_ENABLED, IDC_KEYSSH1, "SSH-&1 key (RSA)");
|
|
|
|
AppendMenu(menu1, MF_ENABLED, IDC_KEYSSH2RSA, "SSH-2 &RSA key");
|
|
|
|
AppendMenu(menu1, MF_ENABLED, IDC_KEYSSH2DSA, "SSH-2 &DSA key");
|
2014-11-01 09:45:20 +00:00
|
|
|
AppendMenu(menu1, MF_ENABLED, IDC_KEYSSH2ECDSA, "SSH-2 &ECDSA key");
|
2015-05-09 14:02:54 +00:00
|
|
|
AppendMenu(menu1, MF_ENABLED, IDC_KEYSSH2ED25519, "SSH-2 ED&25519 key");
|
2002-05-15 20:07:11 +00:00
|
|
|
AppendMenu(menu, MF_POPUP | MF_ENABLED, (UINT) menu1, "&Key");
|
|
|
|
state->keymenu = menu1;
|
2002-05-11 16:45:29 +00:00
|
|
|
|
|
|
|
menu1 = CreateMenu();
|
2002-05-18 09:20:41 +00:00
|
|
|
AppendMenu(menu1, MF_ENABLED, IDC_IMPORT, "&Import key");
|
|
|
|
AppendMenu(menu1, MF_SEPARATOR, 0, 0);
|
2015-05-10 06:42:48 +00:00
|
|
|
AppendMenu(menu1, MF_ENABLED, IDC_EXPORT_OPENSSH_AUTO,
|
|
|
|
"Export &OpenSSH key");
|
2015-04-28 18:46:58 +00:00
|
|
|
AppendMenu(menu1, MF_ENABLED, IDC_EXPORT_OPENSSH_NEW,
|
2015-05-10 06:42:48 +00:00
|
|
|
"Export &OpenSSH key (force new file format)");
|
2002-05-11 16:45:29 +00:00
|
|
|
AppendMenu(menu1, MF_ENABLED, IDC_EXPORT_SSHCOM,
|
|
|
|
"Export &ssh.com key");
|
|
|
|
AppendMenu(menu, MF_POPUP | MF_ENABLED, (UINT) menu1,
|
2003-05-24 18:02:49 +00:00
|
|
|
"Con&versions");
|
2002-05-18 09:20:41 +00:00
|
|
|
state->cvtmenu = menu1;
|
2002-05-11 16:45:29 +00:00
|
|
|
|
|
|
|
menu1 = CreateMenu();
|
|
|
|
AppendMenu(menu1, MF_ENABLED, IDC_ABOUT, "&About");
|
2006-12-17 11:16:07 +00:00
|
|
|
if (has_help())
|
2002-05-11 16:45:29 +00:00
|
|
|
AppendMenu(menu1, MF_ENABLED, IDC_GIVEHELP, "&Help");
|
|
|
|
AppendMenu(menu, MF_POPUP | MF_ENABLED, (UINT) menu1, "&Help");
|
|
|
|
|
|
|
|
SetMenu(hwnd, menu);
|
|
|
|
}
|
|
|
|
|
2001-03-03 11:54:34 +00:00
|
|
|
/*
|
|
|
|
* Centre the window.
|
|
|
|
*/
|
|
|
|
{ /* centre the window */
|
|
|
|
RECT rs, rd;
|
|
|
|
HWND hw;
|
|
|
|
|
|
|
|
hw = GetDesktopWindow();
|
2001-05-06 14:35:20 +00:00
|
|
|
if (GetWindowRect(hw, &rs) && GetWindowRect(hwnd, &rd))
|
|
|
|
MoveWindow(hwnd,
|
|
|
|
(rs.right + rs.left + rd.left - rd.right) / 2,
|
|
|
|
(rs.bottom + rs.top + rd.top - rd.bottom) / 2,
|
|
|
|
rd.right - rd.left, rd.bottom - rd.top, TRUE);
|
2001-03-03 11:54:34 +00:00
|
|
|
}
|
|
|
|
|
2001-05-06 14:35:20 +00:00
|
|
|
{
|
|
|
|
struct ctlpos cp, cp2;
|
2000-10-19 15:43:08 +00:00
|
|
|
|
2014-11-01 19:33:29 +00:00
|
|
|
/* Accelerators used: acglops1rbde */
|
2000-10-20 09:31:16 +00:00
|
|
|
|
2001-10-30 22:12:49 +00:00
|
|
|
ctlposinit(&cp, hwnd, 4, 4, 4);
|
2001-05-06 14:35:20 +00:00
|
|
|
beginbox(&cp, "Key", IDC_BOX_KEY);
|
|
|
|
cp2 = cp;
|
2001-09-09 10:35:56 +00:00
|
|
|
statictext(&cp2, "No key.", 1, IDC_NOKEY);
|
2001-05-06 14:35:20 +00:00
|
|
|
cp2 = cp;
|
2001-09-09 10:35:56 +00:00
|
|
|
statictext(&cp2, "", 1, IDC_GENERATING);
|
2001-05-06 14:35:20 +00:00
|
|
|
progressbar(&cp2, IDC_PROGRESS);
|
|
|
|
bigeditctrl(&cp,
|
|
|
|
"&Public key for pasting into authorized_keys file:",
|
2001-10-30 22:12:49 +00:00
|
|
|
IDC_PKSTATIC, IDC_KEYDISPLAY, 5);
|
2001-05-06 14:35:20 +00:00
|
|
|
SendDlgItemMessage(hwnd, IDC_KEYDISPLAY, EM_SETREADONLY, 1, 0);
|
2003-05-24 18:02:49 +00:00
|
|
|
staticedit(&cp, "Key f&ingerprint:", IDC_FPSTATIC,
|
2001-05-06 14:35:20 +00:00
|
|
|
IDC_FINGERPRINT, 75);
|
|
|
|
SendDlgItemMessage(hwnd, IDC_FINGERPRINT, EM_SETREADONLY, 1,
|
|
|
|
0);
|
|
|
|
staticedit(&cp, "Key &comment:", IDC_COMMENTSTATIC,
|
|
|
|
IDC_COMMENTEDIT, 75);
|
|
|
|
staticpassedit(&cp, "Key p&assphrase:", IDC_PASSPHRASE1STATIC,
|
|
|
|
IDC_PASSPHRASE1EDIT, 75);
|
|
|
|
staticpassedit(&cp, "C&onfirm passphrase:",
|
|
|
|
IDC_PASSPHRASE2STATIC, IDC_PASSPHRASE2EDIT, 75);
|
|
|
|
endbox(&cp);
|
|
|
|
beginbox(&cp, "Actions", IDC_BOX_ACTIONS);
|
|
|
|
staticbtn(&cp, "Generate a public/private key pair",
|
|
|
|
IDC_GENSTATIC, "&Generate", IDC_GENERATE);
|
|
|
|
staticbtn(&cp, "Load an existing private key file",
|
|
|
|
IDC_LOADSTATIC, "&Load", IDC_LOAD);
|
2001-08-27 17:40:03 +00:00
|
|
|
static2btn(&cp, "Save the generated key", IDC_SAVESTATIC,
|
|
|
|
"Save p&ublic key", IDC_SAVEPUB,
|
|
|
|
"&Save private key", IDC_SAVE);
|
2001-05-06 14:35:20 +00:00
|
|
|
endbox(&cp);
|
|
|
|
beginbox(&cp, "Parameters", IDC_BOX_PARAMS);
|
2014-11-01 19:33:29 +00:00
|
|
|
radioline(&cp, "Type of key to generate:", IDC_TYPESTATIC, 4,
|
2005-03-10 16:36:05 +00:00
|
|
|
"SSH-&1 (RSA)", IDC_KEYSSH1,
|
|
|
|
"SSH-2 &RSA", IDC_KEYSSH2RSA,
|
2014-11-01 09:45:20 +00:00
|
|
|
"SSH-2 &DSA", IDC_KEYSSH2DSA,
|
2015-05-09 14:02:54 +00:00
|
|
|
"SSH-2 &ECDSA", IDC_KEYSSH2ECDSA,
|
|
|
|
"SSH-2 ED&25519", IDC_KEYSSH2ED25519, NULL);
|
2001-05-06 14:35:20 +00:00
|
|
|
staticedit(&cp, "Number of &bits in a generated key:",
|
2000-10-20 10:07:53 +00:00
|
|
|
IDC_BITSSTATIC, IDC_BITS, 20);
|
2001-05-06 14:35:20 +00:00
|
|
|
endbox(&cp);
|
|
|
|
}
|
2014-11-01 09:45:20 +00:00
|
|
|
CheckRadioButton(hwnd, IDC_KEYSSH1, IDC_KEYSSH2ECDSA, IDC_KEYSSH2RSA);
|
|
|
|
CheckMenuRadioItem(state->keymenu, IDC_KEYSSH1, IDC_KEYSSH2ECDSA,
|
2004-08-31 18:26:54 +00:00
|
|
|
IDC_KEYSSH2RSA, MF_BYCOMMAND);
|
2000-10-20 10:07:53 +00:00
|
|
|
SetDlgItemInt(hwnd, IDC_BITS, DEFAULT_KEYSIZE, FALSE);
|
|
|
|
|
2001-05-06 14:35:20 +00:00
|
|
|
/*
|
|
|
|
* Initially, hide the progress bar and the key display,
|
|
|
|
* and show the no-key display. Also disable the Save
|
2001-08-27 17:40:03 +00:00
|
|
|
* buttons, because with no key we obviously can't save
|
2001-05-06 14:35:20 +00:00
|
|
|
* anything.
|
|
|
|
*/
|
2002-05-15 20:07:11 +00:00
|
|
|
ui_set_state(hwnd, state, 0);
|
2000-10-19 15:43:08 +00:00
|
|
|
|
2002-08-06 17:48:14 +00:00
|
|
|
/*
|
|
|
|
* Load a key file if one was provided on the command line.
|
|
|
|
*/
|
2013-07-22 19:55:55 +00:00
|
|
|
if (cmdline_keyfile) {
|
|
|
|
Filename *fn = filename_from_str(cmdline_keyfile);
|
|
|
|
load_key_file(hwnd, state, fn, 0);
|
|
|
|
filename_free(fn);
|
|
|
|
}
|
2002-08-06 17:48:14 +00:00
|
|
|
|
2000-10-19 15:43:08 +00:00
|
|
|
return 1;
|
|
|
|
case WM_MOUSEMOVE:
|
2005-05-21 14:16:43 +00:00
|
|
|
state = (struct MainDlgState *) GetWindowLongPtr(hwnd, GWLP_USERDATA);
|
2001-05-06 14:35:20 +00:00
|
|
|
if (state->collecting_entropy &&
|
|
|
|
state->entropy && state->entropy_got < state->entropy_required) {
|
|
|
|
state->entropy[state->entropy_got++] = lParam;
|
|
|
|
state->entropy[state->entropy_got++] = GetMessageTime();
|
|
|
|
SendDlgItemMessage(hwnd, IDC_PROGRESS, PBM_SETPOS,
|
|
|
|
state->entropy_got, 0);
|
|
|
|
if (state->entropy_got >= state->entropy_required) {
|
|
|
|
struct rsa_key_thread_params *params;
|
|
|
|
DWORD threadid;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Seed the entropy pool
|
|
|
|
*/
|
|
|
|
random_add_heavynoise(state->entropy, state->entropy_size);
|
2012-07-22 19:51:50 +00:00
|
|
|
smemclr(state->entropy, state->entropy_size);
|
2001-05-06 14:35:20 +00:00
|
|
|
sfree(state->entropy);
|
|
|
|
state->collecting_entropy = FALSE;
|
|
|
|
|
|
|
|
SetDlgItemText(hwnd, IDC_GENERATING, generating_msg);
|
|
|
|
SendDlgItemMessage(hwnd, IDC_PROGRESS, PBM_SETRANGE, 0,
|
|
|
|
MAKELPARAM(0, PROGRESSRANGE));
|
|
|
|
SendDlgItemMessage(hwnd, IDC_PROGRESS, PBM_SETPOS, 0, 0);
|
|
|
|
|
2003-03-29 16:14:26 +00:00
|
|
|
params = snew(struct rsa_key_thread_params);
|
2001-05-06 14:35:20 +00:00
|
|
|
params->progressbar = GetDlgItem(hwnd, IDC_PROGRESS);
|
|
|
|
params->dialog = hwnd;
|
2000-10-20 10:07:53 +00:00
|
|
|
params->keysize = state->keysize;
|
2014-11-01 09:14:19 +00:00
|
|
|
params->keytype = state->keytype;
|
2001-05-06 14:35:20 +00:00
|
|
|
params->key = &state->key;
|
2001-09-22 20:52:21 +00:00
|
|
|
params->dsskey = &state->dsskey;
|
2001-05-06 14:35:20 +00:00
|
|
|
|
|
|
|
if (!CreateThread(NULL, 0, generate_rsa_key_thread,
|
|
|
|
params, 0, &threadid)) {
|
|
|
|
MessageBox(hwnd, "Out of thread resources",
|
|
|
|
"Key generation error",
|
|
|
|
MB_OK | MB_ICONERROR);
|
|
|
|
sfree(params);
|
|
|
|
} else {
|
|
|
|
state->generation_thread_exists = TRUE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
2000-10-19 15:43:08 +00:00
|
|
|
case WM_COMMAND:
|
|
|
|
switch (LOWORD(wParam)) {
|
2002-05-15 20:07:11 +00:00
|
|
|
case IDC_KEYSSH1:
|
|
|
|
case IDC_KEYSSH2RSA:
|
|
|
|
case IDC_KEYSSH2DSA:
|
2014-11-01 09:45:20 +00:00
|
|
|
case IDC_KEYSSH2ECDSA:
|
2015-05-09 14:02:54 +00:00
|
|
|
case IDC_KEYSSH2ED25519:
|
2002-05-15 20:07:11 +00:00
|
|
|
{
|
|
|
|
state = (struct MainDlgState *)
|
2005-05-21 14:16:43 +00:00
|
|
|
GetWindowLongPtr(hwnd, GWLP_USERDATA);
|
2002-05-15 20:07:11 +00:00
|
|
|
if (!IsDlgButtonChecked(hwnd, LOWORD(wParam)))
|
|
|
|
CheckRadioButton(hwnd, IDC_KEYSSH1, IDC_KEYSSH2DSA,
|
|
|
|
LOWORD(wParam));
|
|
|
|
CheckMenuRadioItem(state->keymenu, IDC_KEYSSH1, IDC_KEYSSH2DSA,
|
|
|
|
LOWORD(wParam), MF_BYCOMMAND);
|
2014-11-01 09:45:20 +00:00
|
|
|
CheckRadioButton(hwnd, IDC_KEYSSH1, IDC_KEYSSH2ECDSA,
|
|
|
|
LOWORD(wParam));
|
|
|
|
CheckMenuRadioItem(state->keymenu, IDC_KEYSSH1,
|
|
|
|
IDC_KEYSSH2ECDSA,
|
|
|
|
LOWORD(wParam), MF_BYCOMMAND);
|
2002-05-15 20:07:11 +00:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case IDC_QUIT:
|
|
|
|
PostMessage(hwnd, WM_CLOSE, 0, 0);
|
|
|
|
break;
|
2000-10-19 15:43:08 +00:00
|
|
|
case IDC_COMMENTEDIT:
|
|
|
|
if (HIWORD(wParam) == EN_CHANGE) {
|
2001-05-06 14:35:20 +00:00
|
|
|
state = (struct MainDlgState *)
|
2005-05-21 14:16:43 +00:00
|
|
|
GetWindowLongPtr(hwnd, GWLP_USERDATA);
|
2001-05-06 14:35:20 +00:00
|
|
|
if (state->key_exists) {
|
|
|
|
HWND editctl = GetDlgItem(hwnd, IDC_COMMENTEDIT);
|
|
|
|
int len = GetWindowTextLength(editctl);
|
|
|
|
if (*state->commentptr)
|
|
|
|
sfree(*state->commentptr);
|
2003-03-29 16:14:26 +00:00
|
|
|
*state->commentptr = snewn(len + 1, char);
|
2001-05-06 14:35:20 +00:00
|
|
|
GetWindowText(editctl, *state->commentptr, len + 1);
|
2001-03-10 10:22:18 +00:00
|
|
|
if (state->ssh2) {
|
2001-08-27 17:40:03 +00:00
|
|
|
setupbigedit2(hwnd, IDC_KEYDISPLAY, IDC_PKSTATIC,
|
2001-05-06 14:35:20 +00:00
|
|
|
&state->ssh2key);
|
2001-03-10 10:22:18 +00:00
|
|
|
} else {
|
2001-08-27 17:40:03 +00:00
|
|
|
setupbigedit1(hwnd, IDC_KEYDISPLAY, IDC_PKSTATIC,
|
|
|
|
&state->key);
|
2001-03-10 10:22:18 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2000-10-19 15:43:08 +00:00
|
|
|
break;
|
|
|
|
case IDC_ABOUT:
|
|
|
|
EnableWindow(hwnd, 0);
|
2003-02-07 14:22:19 +00:00
|
|
|
DialogBox(hinst, MAKEINTRESOURCE(213), hwnd, AboutProc);
|
2000-10-19 15:43:08 +00:00
|
|
|
EnableWindow(hwnd, 1);
|
2001-05-06 14:35:20 +00:00
|
|
|
SetActiveWindow(hwnd);
|
2000-10-19 15:43:08 +00:00
|
|
|
return 0;
|
2002-05-11 16:45:29 +00:00
|
|
|
case IDC_GIVEHELP:
|
|
|
|
if (HIWORD(wParam) == BN_CLICKED ||
|
|
|
|
HIWORD(wParam) == BN_DOUBLECLICKED) {
|
2006-12-17 11:16:07 +00:00
|
|
|
launch_help(hwnd, WINHELP_CTX_puttygen_general);
|
2002-05-11 16:45:29 +00:00
|
|
|
}
|
|
|
|
return 0;
|
2001-05-06 14:35:20 +00:00
|
|
|
case IDC_GENERATE:
|
2003-03-22 09:22:52 +00:00
|
|
|
if (HIWORD(wParam) != BN_CLICKED &&
|
|
|
|
HIWORD(wParam) != BN_DOUBLECLICKED)
|
|
|
|
break;
|
2001-05-06 14:35:20 +00:00
|
|
|
state =
|
2005-05-21 14:16:43 +00:00
|
|
|
(struct MainDlgState *) GetWindowLongPtr(hwnd, GWLP_USERDATA);
|
2001-05-06 14:35:20 +00:00
|
|
|
if (!state->generation_thread_exists) {
|
|
|
|
BOOL ok;
|
|
|
|
state->keysize = GetDlgItemInt(hwnd, IDC_BITS, &ok, FALSE);
|
|
|
|
if (!ok)
|
|
|
|
state->keysize = DEFAULT_KEYSIZE;
|
2001-03-03 11:54:34 +00:00
|
|
|
/* If we ever introduce a new key type, check it here! */
|
|
|
|
state->ssh2 = !IsDlgButtonChecked(hwnd, IDC_KEYSSH1);
|
2014-11-01 09:14:19 +00:00
|
|
|
state->keytype = RSA;
|
|
|
|
if (IsDlgButtonChecked(hwnd, IDC_KEYSSH2DSA)) {
|
|
|
|
state->keytype = DSA;
|
2014-11-01 09:45:20 +00:00
|
|
|
} else if (IsDlgButtonChecked(hwnd, IDC_KEYSSH2ECDSA)) {
|
|
|
|
state->keytype = ECDSA;
|
2015-05-09 14:02:54 +00:00
|
|
|
} else if (IsDlgButtonChecked(hwnd, IDC_KEYSSH2ED25519)) {
|
|
|
|
state->keytype = ED25519;
|
2014-11-01 09:14:19 +00:00
|
|
|
}
|
2001-05-06 14:35:20 +00:00
|
|
|
if (state->keysize < 256) {
|
|
|
|
int ret = MessageBox(hwnd,
|
|
|
|
"PuTTYgen will not generate a key"
|
|
|
|
" smaller than 256 bits.\n"
|
|
|
|
"Key length reset to 256. Continue?",
|
|
|
|
"PuTTYgen Warning",
|
|
|
|
MB_ICONWARNING | MB_OKCANCEL);
|
|
|
|
if (ret != IDOK)
|
|
|
|
break;
|
|
|
|
state->keysize = 256;
|
|
|
|
SetDlgItemInt(hwnd, IDC_BITS, 256, FALSE);
|
|
|
|
}
|
2014-11-01 09:45:20 +00:00
|
|
|
if (state->keytype == ECDSA && !(state->keysize == 256 ||
|
|
|
|
state->keysize == 384 ||
|
|
|
|
state->keysize == 521)) {
|
|
|
|
int ret = MessageBox(hwnd,
|
|
|
|
"Only 256, 384 and 521 bit elliptic"
|
|
|
|
" curves are supported.\n"
|
|
|
|
"Key length reset to 256. Continue?",
|
|
|
|
"PuTTYgen Warning",
|
|
|
|
MB_ICONWARNING | MB_OKCANCEL);
|
|
|
|
if (ret != IDOK)
|
|
|
|
break;
|
|
|
|
state->keysize = 256;
|
|
|
|
SetDlgItemInt(hwnd, IDC_BITS, 256, FALSE);
|
|
|
|
}
|
2015-05-09 14:02:54 +00:00
|
|
|
if (state->keytype == ED25519 && state->keysize != 256) {
|
|
|
|
int ret = MessageBox(hwnd,
|
|
|
|
"Only 256 bit Edwards elliptic"
|
|
|
|
" curves are supported.\n"
|
|
|
|
"Key length reset to 256. Continue?",
|
|
|
|
"PuTTYgen Warning",
|
|
|
|
MB_ICONWARNING | MB_OKCANCEL);
|
|
|
|
if (ret != IDOK)
|
|
|
|
break;
|
|
|
|
state->keysize = 256;
|
|
|
|
SetDlgItemInt(hwnd, IDC_BITS, 256, FALSE);
|
|
|
|
}
|
2002-05-15 20:07:11 +00:00
|
|
|
ui_set_state(hwnd, state, 1);
|
2001-05-06 14:35:20 +00:00
|
|
|
SetDlgItemText(hwnd, IDC_GENERATING, entropy_msg);
|
2002-05-15 20:07:11 +00:00
|
|
|
state->key_exists = FALSE;
|
2001-05-06 14:35:20 +00:00
|
|
|
state->collecting_entropy = TRUE;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* My brief statistical tests on mouse movements
|
|
|
|
* suggest that there are about 2.5 bits of
|
|
|
|
* randomness in the x position, 2.5 in the y
|
|
|
|
* position, and 1.7 in the message time, making
|
|
|
|
* 5.7 bits of unpredictability per mouse movement.
|
|
|
|
* However, other people have told me it's far less
|
|
|
|
* than that, so I'm going to be stupidly cautious
|
|
|
|
* and knock that down to a nice round 2. With this
|
|
|
|
* method, we require two words per mouse movement,
|
|
|
|
* so with 2 bits per mouse movement we expect 2
|
|
|
|
* bits every 2 words.
|
|
|
|
*/
|
|
|
|
state->entropy_required = (state->keysize / 2) * 2;
|
|
|
|
state->entropy_got = 0;
|
|
|
|
state->entropy_size = (state->entropy_required *
|
2003-03-29 16:14:26 +00:00
|
|
|
sizeof(unsigned));
|
|
|
|
state->entropy = snewn(state->entropy_required, unsigned);
|
2001-05-06 14:35:20 +00:00
|
|
|
|
|
|
|
SendDlgItemMessage(hwnd, IDC_PROGRESS, PBM_SETRANGE, 0,
|
|
|
|
MAKELPARAM(0, state->entropy_required));
|
|
|
|
SendDlgItemMessage(hwnd, IDC_PROGRESS, PBM_SETPOS, 0, 0);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case IDC_SAVE:
|
2015-05-10 06:42:48 +00:00
|
|
|
case IDC_EXPORT_OPENSSH_AUTO:
|
2015-04-28 18:46:58 +00:00
|
|
|
case IDC_EXPORT_OPENSSH_NEW:
|
2002-05-13 16:56:11 +00:00
|
|
|
case IDC_EXPORT_SSHCOM:
|
2003-05-14 18:53:28 +00:00
|
|
|
if (HIWORD(wParam) != BN_CLICKED)
|
|
|
|
break;
|
2001-05-06 14:35:20 +00:00
|
|
|
state =
|
2005-05-21 14:16:43 +00:00
|
|
|
(struct MainDlgState *) GetWindowLongPtr(hwnd, GWLP_USERDATA);
|
2001-05-06 14:35:20 +00:00
|
|
|
if (state->key_exists) {
|
|
|
|
char filename[FILENAME_MAX];
|
2011-10-02 14:14:21 +00:00
|
|
|
char *passphrase, *passphrase2;
|
2002-05-13 16:56:11 +00:00
|
|
|
int type, realtype;
|
|
|
|
|
|
|
|
if (state->ssh2)
|
|
|
|
realtype = SSH_KEYTYPE_SSH2;
|
|
|
|
else
|
|
|
|
realtype = SSH_KEYTYPE_SSH1;
|
|
|
|
|
2015-05-10 06:42:48 +00:00
|
|
|
if (LOWORD(wParam) == IDC_EXPORT_OPENSSH_AUTO)
|
|
|
|
type = SSH_KEYTYPE_OPENSSH_AUTO;
|
2015-04-28 18:46:58 +00:00
|
|
|
else if (LOWORD(wParam) == IDC_EXPORT_OPENSSH_NEW)
|
|
|
|
type = SSH_KEYTYPE_OPENSSH_NEW;
|
2002-05-13 16:56:11 +00:00
|
|
|
else if (LOWORD(wParam) == IDC_EXPORT_SSHCOM)
|
|
|
|
type = SSH_KEYTYPE_SSHCOM;
|
|
|
|
else
|
|
|
|
type = realtype;
|
|
|
|
|
|
|
|
if (type != realtype &&
|
|
|
|
import_target_type(type) != realtype) {
|
|
|
|
char msg[256];
|
2005-03-10 16:36:05 +00:00
|
|
|
sprintf(msg, "Cannot export an SSH-%d key in an SSH-%d"
|
2002-05-13 16:56:11 +00:00
|
|
|
" format", (state->ssh2 ? 2 : 1),
|
|
|
|
(state->ssh2 ? 1 : 2));
|
|
|
|
MessageBox(hwnd, msg,
|
|
|
|
"PuTTYgen Error", MB_OK | MB_ICONERROR);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2011-10-02 14:14:21 +00:00
|
|
|
passphrase = GetDlgItemText_alloc(hwnd, IDC_PASSPHRASE1EDIT);
|
|
|
|
passphrase2 = GetDlgItemText_alloc(hwnd, IDC_PASSPHRASE2EDIT);
|
2000-10-20 09:31:16 +00:00
|
|
|
if (strcmp(passphrase, passphrase2)) {
|
2001-05-06 14:35:20 +00:00
|
|
|
MessageBox(hwnd,
|
2000-10-20 09:31:16 +00:00
|
|
|
"The two passphrases given do not match.",
|
2001-05-06 14:35:20 +00:00
|
|
|
"PuTTYgen Error", MB_OK | MB_ICONERROR);
|
2011-10-02 14:14:21 +00:00
|
|
|
burnstr(passphrase);
|
|
|
|
burnstr(passphrase2);
|
2000-10-20 09:31:16 +00:00
|
|
|
break;
|
|
|
|
}
|
2011-10-02 14:14:21 +00:00
|
|
|
burnstr(passphrase2);
|
2001-05-06 14:35:20 +00:00
|
|
|
if (!*passphrase) {
|
|
|
|
int ret;
|
|
|
|
ret = MessageBox(hwnd,
|
|
|
|
"Are you sure you want to save this key\n"
|
|
|
|
"without a passphrase to protect it?",
|
|
|
|
"PuTTYgen Warning",
|
|
|
|
MB_YESNO | MB_ICONWARNING);
|
2011-10-02 14:14:21 +00:00
|
|
|
if (ret != IDYES) {
|
|
|
|
burnstr(passphrase);
|
|
|
|
break;
|
|
|
|
}
|
2001-05-06 14:35:20 +00:00
|
|
|
}
|
|
|
|
if (prompt_keyfile(hwnd, "Save private key as:",
|
2002-08-06 17:35:34 +00:00
|
|
|
filename, 1, (type == realtype))) {
|
2000-10-20 09:43:58 +00:00
|
|
|
int ret;
|
2000-10-20 09:41:13 +00:00
|
|
|
FILE *fp = fopen(filename, "r");
|
|
|
|
if (fp) {
|
2002-11-07 19:49:03 +00:00
|
|
|
char *buffer;
|
2000-10-20 09:41:13 +00:00
|
|
|
fclose(fp);
|
2002-11-07 19:49:03 +00:00
|
|
|
buffer = dupprintf("Overwrite existing file\n%s?",
|
|
|
|
filename);
|
2000-10-20 09:41:13 +00:00
|
|
|
ret = MessageBox(hwnd, buffer, "PuTTYgen Warning",
|
|
|
|
MB_YESNO | MB_ICONWARNING);
|
2002-11-07 19:49:03 +00:00
|
|
|
sfree(buffer);
|
2011-10-02 14:14:21 +00:00
|
|
|
if (ret != IDYES) {
|
|
|
|
burnstr(passphrase);
|
2000-10-20 09:41:13 +00:00
|
|
|
break;
|
2011-10-02 14:14:21 +00:00
|
|
|
}
|
2000-10-20 09:41:13 +00:00
|
|
|
}
|
2002-05-13 16:56:11 +00:00
|
|
|
|
2001-03-03 11:54:34 +00:00
|
|
|
if (state->ssh2) {
|
2011-10-02 11:01:57 +00:00
|
|
|
Filename *fn = filename_from_str(filename);
|
2002-05-13 16:56:11 +00:00
|
|
|
if (type != realtype)
|
2011-10-02 11:01:57 +00:00
|
|
|
ret = export_ssh2(fn, type, &state->ssh2key,
|
2002-05-13 16:56:11 +00:00
|
|
|
*passphrase ? passphrase : NULL);
|
|
|
|
else
|
2011-10-02 11:01:57 +00:00
|
|
|
ret = ssh2_save_userkey(fn, &state->ssh2key,
|
2002-05-13 16:56:11 +00:00
|
|
|
*passphrase ? passphrase :
|
|
|
|
NULL);
|
2011-10-02 11:01:57 +00:00
|
|
|
filename_free(fn);
|
2001-03-03 11:54:34 +00:00
|
|
|
} else {
|
2011-10-02 11:01:57 +00:00
|
|
|
Filename *fn = filename_from_str(filename);
|
2002-05-13 16:56:11 +00:00
|
|
|
if (type != realtype)
|
2011-10-02 11:01:57 +00:00
|
|
|
ret = export_ssh1(fn, type, &state->key,
|
2002-05-13 16:56:11 +00:00
|
|
|
*passphrase ? passphrase : NULL);
|
|
|
|
else
|
2011-10-02 11:01:57 +00:00
|
|
|
ret = saversakey(fn, &state->key,
|
2002-05-13 16:56:11 +00:00
|
|
|
*passphrase ? passphrase : NULL);
|
2011-10-02 11:01:57 +00:00
|
|
|
filename_free(fn);
|
2001-03-03 11:54:34 +00:00
|
|
|
}
|
2000-10-20 09:43:58 +00:00
|
|
|
if (ret <= 0) {
|
|
|
|
MessageBox(hwnd, "Unable to save key file",
|
2001-05-06 14:35:20 +00:00
|
|
|
"PuTTYgen Error", MB_OK | MB_ICONERROR);
|
2000-10-20 09:43:58 +00:00
|
|
|
}
|
2001-05-06 14:35:20 +00:00
|
|
|
}
|
2011-10-02 14:14:21 +00:00
|
|
|
burnstr(passphrase);
|
2001-05-06 14:35:20 +00:00
|
|
|
}
|
|
|
|
break;
|
2001-08-27 17:40:03 +00:00
|
|
|
case IDC_SAVEPUB:
|
2003-05-14 18:53:28 +00:00
|
|
|
if (HIWORD(wParam) != BN_CLICKED)
|
|
|
|
break;
|
2001-08-27 17:40:03 +00:00
|
|
|
state =
|
2005-05-21 14:16:43 +00:00
|
|
|
(struct MainDlgState *) GetWindowLongPtr(hwnd, GWLP_USERDATA);
|
2001-08-27 17:40:03 +00:00
|
|
|
if (state->key_exists) {
|
|
|
|
char filename[FILENAME_MAX];
|
|
|
|
if (prompt_keyfile(hwnd, "Save public key as:",
|
2002-08-06 17:35:34 +00:00
|
|
|
filename, 1, 0)) {
|
2001-08-27 17:40:03 +00:00
|
|
|
int ret;
|
|
|
|
FILE *fp = fopen(filename, "r");
|
|
|
|
if (fp) {
|
2002-11-07 19:49:03 +00:00
|
|
|
char *buffer;
|
2001-08-27 17:40:03 +00:00
|
|
|
fclose(fp);
|
2002-11-07 19:49:03 +00:00
|
|
|
buffer = dupprintf("Overwrite existing file\n%s?",
|
|
|
|
filename);
|
2001-08-27 17:40:03 +00:00
|
|
|
ret = MessageBox(hwnd, buffer, "PuTTYgen Warning",
|
|
|
|
MB_YESNO | MB_ICONWARNING);
|
2002-11-07 19:49:03 +00:00
|
|
|
sfree(buffer);
|
2001-08-27 17:40:03 +00:00
|
|
|
if (ret != IDYES)
|
|
|
|
break;
|
|
|
|
}
|
2015-05-12 12:42:26 +00:00
|
|
|
fp = fopen(filename, "w");
|
|
|
|
if (!fp) {
|
|
|
|
MessageBox(hwnd, "Unable to open key file",
|
|
|
|
"PuTTYgen Error", MB_OK | MB_ICONERROR);
|
|
|
|
} else {
|
|
|
|
if (state->ssh2) {
|
|
|
|
int bloblen;
|
|
|
|
unsigned char *blob;
|
|
|
|
blob = state->ssh2key.alg->public_blob
|
|
|
|
(state->ssh2key.data, &bloblen);
|
|
|
|
ssh2_write_pubkey(fp, state->ssh2key.comment,
|
|
|
|
blob, bloblen,
|
|
|
|
SSH_KEYTYPE_SSH2_PUBLIC_RFC4716);
|
|
|
|
} else {
|
|
|
|
ssh1_write_pubkey(fp, &state->key);
|
|
|
|
}
|
|
|
|
if (fclose(fp) < 0) {
|
|
|
|
MessageBox(hwnd, "Unable to save key file",
|
|
|
|
"PuTTYgen Error", MB_OK | MB_ICONERROR);
|
|
|
|
}
|
|
|
|
}
|
2001-08-27 17:40:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
2001-05-06 14:35:20 +00:00
|
|
|
case IDC_LOAD:
|
2002-05-18 09:20:41 +00:00
|
|
|
case IDC_IMPORT:
|
2003-05-14 18:53:28 +00:00
|
|
|
if (HIWORD(wParam) != BN_CLICKED)
|
|
|
|
break;
|
2001-05-06 14:35:20 +00:00
|
|
|
state =
|
2005-05-21 14:16:43 +00:00
|
|
|
(struct MainDlgState *) GetWindowLongPtr(hwnd, GWLP_USERDATA);
|
2001-05-06 14:35:20 +00:00
|
|
|
if (!state->generation_thread_exists) {
|
|
|
|
char filename[FILENAME_MAX];
|
2002-08-06 17:35:34 +00:00
|
|
|
if (prompt_keyfile(hwnd, "Load private key:",
|
2013-07-22 07:11:54 +00:00
|
|
|
filename, 0, LOWORD(wParam)==IDC_LOAD)) {
|
|
|
|
Filename *fn = filename_from_str(filename);
|
|
|
|
load_key_file(hwnd, state, fn, LOWORD(wParam) != IDC_LOAD);
|
|
|
|
filename_free(fn);
|
|
|
|
}
|
2001-05-06 14:35:20 +00:00
|
|
|
}
|
|
|
|
break;
|
2000-10-19 15:43:08 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
case WM_DONEKEY:
|
2005-05-21 14:16:43 +00:00
|
|
|
state = (struct MainDlgState *) GetWindowLongPtr(hwnd, GWLP_USERDATA);
|
2001-05-06 14:35:20 +00:00
|
|
|
state->generation_thread_exists = FALSE;
|
|
|
|
state->key_exists = TRUE;
|
2001-09-22 20:52:21 +00:00
|
|
|
SendDlgItemMessage(hwnd, IDC_PROGRESS, PBM_SETRANGE, 0,
|
|
|
|
MAKELPARAM(0, PROGRESSRANGE));
|
|
|
|
SendDlgItemMessage(hwnd, IDC_PROGRESS, PBM_SETPOS, PROGRESSRANGE, 0);
|
2001-03-03 12:05:36 +00:00
|
|
|
if (state->ssh2) {
|
2014-11-01 09:14:19 +00:00
|
|
|
if (state->keytype == DSA) {
|
2001-09-22 20:52:21 +00:00
|
|
|
state->ssh2key.data = &state->dsskey;
|
|
|
|
state->ssh2key.alg = &ssh_dss;
|
2014-11-01 09:45:20 +00:00
|
|
|
} else if (state->keytype == ECDSA) {
|
|
|
|
state->ssh2key.data = &state->eckey;
|
|
|
|
if (state->eckey.publicKey.curve->fieldBits == 256)
|
|
|
|
state->ssh2key.alg = &ssh_ecdsa_nistp256;
|
|
|
|
else if (state->eckey.publicKey.curve->fieldBits == 384)
|
|
|
|
state->ssh2key.alg = &ssh_ecdsa_nistp384;
|
|
|
|
else
|
|
|
|
state->ssh2key.alg = &ssh_ecdsa_nistp521;
|
2015-05-09 14:02:54 +00:00
|
|
|
} else if (state->keytype == ED25519) {
|
|
|
|
state->ssh2key.data = &state->eckey;
|
|
|
|
state->ssh2key.alg = &ssh_ecdsa_ed25519;
|
2001-09-22 20:52:21 +00:00
|
|
|
} else {
|
|
|
|
state->ssh2key.data = &state->key;
|
|
|
|
state->ssh2key.alg = &ssh_rsa;
|
|
|
|
}
|
2001-03-03 11:54:34 +00:00
|
|
|
state->commentptr = &state->ssh2key.comment;
|
2001-03-03 12:05:36 +00:00
|
|
|
} else {
|
2001-03-03 11:54:34 +00:00
|
|
|
state->commentptr = &state->key.comment;
|
2001-03-03 12:05:36 +00:00
|
|
|
}
|
2001-05-06 14:35:20 +00:00
|
|
|
/*
|
|
|
|
* Invent a comment for the key. We'll do this by including
|
|
|
|
* the date in it. This will be so horrifyingly ugly that
|
|
|
|
* the user will immediately want to change it, which is
|
|
|
|
* what we want :-)
|
|
|
|
*/
|
2003-03-29 16:14:26 +00:00
|
|
|
*state->commentptr = snewn(30, char);
|
2001-05-06 14:35:20 +00:00
|
|
|
{
|
2005-01-09 14:27:48 +00:00
|
|
|
struct tm tm;
|
|
|
|
tm = ltime();
|
2014-11-01 09:14:19 +00:00
|
|
|
if (state->keytype == DSA)
|
2005-01-09 14:27:48 +00:00
|
|
|
strftime(*state->commentptr, 30, "dsa-key-%Y%m%d", &tm);
|
2014-11-01 09:45:20 +00:00
|
|
|
else if (state->keytype == ECDSA)
|
|
|
|
strftime(*state->commentptr, 30, "ecdsa-key-%Y%m%d", &tm);
|
2015-05-09 14:02:54 +00:00
|
|
|
else if (state->keytype == ED25519)
|
|
|
|
strftime(*state->commentptr, 30, "ed25519-key-%Y%m%d", &tm);
|
2001-09-22 20:52:21 +00:00
|
|
|
else
|
2005-01-09 14:27:48 +00:00
|
|
|
strftime(*state->commentptr, 30, "rsa-key-%Y%m%d", &tm);
|
2001-05-06 14:35:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Now update the key controls with all the key data.
|
|
|
|
*/
|
|
|
|
{
|
2001-03-03 11:54:34 +00:00
|
|
|
char *savecomment;
|
2001-05-06 14:35:20 +00:00
|
|
|
/*
|
|
|
|
* Blank passphrase, initially. This isn't dangerous,
|
|
|
|
* because we will warn (Are You Sure?) before allowing
|
|
|
|
* the user to save an unprotected private key.
|
|
|
|
*/
|
|
|
|
SetDlgItemText(hwnd, IDC_PASSPHRASE1EDIT, "");
|
|
|
|
SetDlgItemText(hwnd, IDC_PASSPHRASE2EDIT, "");
|
|
|
|
/*
|
|
|
|
* Set the comment.
|
|
|
|
*/
|
|
|
|
SetDlgItemText(hwnd, IDC_COMMENTEDIT, *state->commentptr);
|
|
|
|
/*
|
|
|
|
* Set the key fingerprint.
|
|
|
|
*/
|
2001-03-03 11:54:34 +00:00
|
|
|
savecomment = *state->commentptr;
|
|
|
|
*state->commentptr = NULL;
|
2001-05-06 14:35:20 +00:00
|
|
|
if (state->ssh2) {
|
2001-03-03 11:54:34 +00:00
|
|
|
char *fp;
|
2001-05-06 14:35:20 +00:00
|
|
|
fp = state->ssh2key.alg->fingerprint(state->ssh2key.data);
|
2001-03-03 11:54:34 +00:00
|
|
|
SetDlgItemText(hwnd, IDC_FINGERPRINT, fp);
|
|
|
|
sfree(fp);
|
|
|
|
} else {
|
|
|
|
char buf[128];
|
2001-05-06 14:35:20 +00:00
|
|
|
rsa_fingerprint(buf, sizeof(buf), &state->key);
|
2001-03-03 11:54:34 +00:00
|
|
|
SetDlgItemText(hwnd, IDC_FINGERPRINT, buf);
|
2001-05-06 14:35:20 +00:00
|
|
|
}
|
2001-03-03 11:54:34 +00:00
|
|
|
*state->commentptr = savecomment;
|
2001-05-06 14:35:20 +00:00
|
|
|
/*
|
|
|
|
* Construct a decimal representation of the key, for
|
2001-08-27 17:40:03 +00:00
|
|
|
* pasting into .ssh/authorized_keys or
|
|
|
|
* .ssh/authorized_keys2 on a Unix box.
|
2001-05-06 14:35:20 +00:00
|
|
|
*/
|
2001-03-03 11:54:34 +00:00
|
|
|
if (state->ssh2) {
|
2001-08-27 17:40:03 +00:00
|
|
|
setupbigedit2(hwnd, IDC_KEYDISPLAY,
|
|
|
|
IDC_PKSTATIC, &state->ssh2key);
|
2001-03-03 11:54:34 +00:00
|
|
|
} else {
|
2001-08-27 17:40:03 +00:00
|
|
|
setupbigedit1(hwnd, IDC_KEYDISPLAY,
|
|
|
|
IDC_PKSTATIC, &state->key);
|
2001-03-03 11:54:34 +00:00
|
|
|
}
|
2001-05-06 14:35:20 +00:00
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Finally, hide the progress bar and show the key data.
|
|
|
|
*/
|
2002-05-15 20:07:11 +00:00
|
|
|
ui_set_state(hwnd, state, 2);
|
2001-05-06 14:35:20 +00:00
|
|
|
break;
|
2001-12-12 18:45:56 +00:00
|
|
|
case WM_HELP:
|
2006-12-17 11:16:07 +00:00
|
|
|
{
|
2001-12-12 18:45:56 +00:00
|
|
|
int id = ((LPHELPINFO)lParam)->iCtrlId;
|
2005-02-16 01:47:10 +00:00
|
|
|
char *topic = NULL;
|
2001-12-12 18:45:56 +00:00
|
|
|
switch (id) {
|
|
|
|
case IDC_GENERATING:
|
|
|
|
case IDC_PROGRESS:
|
|
|
|
case IDC_GENSTATIC:
|
|
|
|
case IDC_GENERATE:
|
2006-12-17 11:16:07 +00:00
|
|
|
topic = WINHELP_CTX_puttygen_generate; break;
|
2001-12-12 18:45:56 +00:00
|
|
|
case IDC_PKSTATIC:
|
|
|
|
case IDC_KEYDISPLAY:
|
2006-12-17 11:16:07 +00:00
|
|
|
topic = WINHELP_CTX_puttygen_pastekey; break;
|
2001-12-12 18:45:56 +00:00
|
|
|
case IDC_FPSTATIC:
|
|
|
|
case IDC_FINGERPRINT:
|
2006-12-17 11:16:07 +00:00
|
|
|
topic = WINHELP_CTX_puttygen_fingerprint; break;
|
2001-12-12 18:45:56 +00:00
|
|
|
case IDC_COMMENTSTATIC:
|
|
|
|
case IDC_COMMENTEDIT:
|
2006-12-17 11:16:07 +00:00
|
|
|
topic = WINHELP_CTX_puttygen_comment; break;
|
2001-12-12 18:45:56 +00:00
|
|
|
case IDC_PASSPHRASE1STATIC:
|
|
|
|
case IDC_PASSPHRASE1EDIT:
|
|
|
|
case IDC_PASSPHRASE2STATIC:
|
|
|
|
case IDC_PASSPHRASE2EDIT:
|
2006-12-17 11:16:07 +00:00
|
|
|
topic = WINHELP_CTX_puttygen_passphrase; break;
|
2001-12-12 18:45:56 +00:00
|
|
|
case IDC_LOADSTATIC:
|
|
|
|
case IDC_LOAD:
|
2006-12-17 11:16:07 +00:00
|
|
|
topic = WINHELP_CTX_puttygen_load; break;
|
2001-12-12 18:45:56 +00:00
|
|
|
case IDC_SAVESTATIC:
|
|
|
|
case IDC_SAVE:
|
2006-12-17 11:16:07 +00:00
|
|
|
topic = WINHELP_CTX_puttygen_savepriv; break;
|
2001-12-12 18:45:56 +00:00
|
|
|
case IDC_SAVEPUB:
|
2006-12-17 11:16:07 +00:00
|
|
|
topic = WINHELP_CTX_puttygen_savepub; break;
|
2001-12-12 18:45:56 +00:00
|
|
|
case IDC_TYPESTATIC:
|
|
|
|
case IDC_KEYSSH1:
|
|
|
|
case IDC_KEYSSH2RSA:
|
|
|
|
case IDC_KEYSSH2DSA:
|
2014-11-01 09:45:20 +00:00
|
|
|
case IDC_KEYSSH2ECDSA:
|
2015-05-09 14:02:54 +00:00
|
|
|
case IDC_KEYSSH2ED25519:
|
2006-12-17 11:16:07 +00:00
|
|
|
topic = WINHELP_CTX_puttygen_keytype; break;
|
2001-12-12 18:45:56 +00:00
|
|
|
case IDC_BITSSTATIC:
|
|
|
|
case IDC_BITS:
|
2006-12-17 11:16:07 +00:00
|
|
|
topic = WINHELP_CTX_puttygen_bits; break;
|
2002-05-18 09:20:41 +00:00
|
|
|
case IDC_IMPORT:
|
2015-05-10 06:42:48 +00:00
|
|
|
case IDC_EXPORT_OPENSSH_AUTO:
|
2015-04-28 18:46:58 +00:00
|
|
|
case IDC_EXPORT_OPENSSH_NEW:
|
2002-05-15 20:07:11 +00:00
|
|
|
case IDC_EXPORT_SSHCOM:
|
2006-12-17 11:16:07 +00:00
|
|
|
topic = WINHELP_CTX_puttygen_conversions; break;
|
2001-12-12 18:45:56 +00:00
|
|
|
}
|
2005-02-16 01:47:10 +00:00
|
|
|
if (topic) {
|
2006-12-17 11:16:07 +00:00
|
|
|
launch_help(hwnd, topic);
|
2001-12-12 18:45:56 +00:00
|
|
|
} else {
|
|
|
|
MessageBeep(0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
2000-10-19 15:43:08 +00:00
|
|
|
case WM_CLOSE:
|
2005-05-21 14:16:43 +00:00
|
|
|
state = (struct MainDlgState *) GetWindowLongPtr(hwnd, GWLP_USERDATA);
|
2001-05-06 14:35:20 +00:00
|
|
|
sfree(state);
|
2006-12-17 11:16:07 +00:00
|
|
|
quit_help(hwnd);
|
2001-05-06 14:35:20 +00:00
|
|
|
EndDialog(hwnd, 1);
|
2000-10-19 15:43:08 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-12-17 11:16:07 +00:00
|
|
|
void cleanup_exit(int code)
|
|
|
|
{
|
|
|
|
shutdown_help();
|
|
|
|
exit(code);
|
|
|
|
}
|
2002-03-06 20:13:22 +00:00
|
|
|
|
2001-05-06 14:35:20 +00:00
|
|
|
int WINAPI WinMain(HINSTANCE inst, HINSTANCE prev, LPSTR cmdline, int show)
|
|
|
|
{
|
2002-08-06 17:48:14 +00:00
|
|
|
int argc;
|
|
|
|
char **argv;
|
2006-12-17 11:16:07 +00:00
|
|
|
int ret;
|
2002-08-06 17:48:14 +00:00
|
|
|
|
2000-10-20 09:24:44 +00:00
|
|
|
InitCommonControls();
|
2000-10-19 15:43:08 +00:00
|
|
|
hinst = inst;
|
2005-03-01 01:16:57 +00:00
|
|
|
hwnd = NULL;
|
2001-12-12 18:45:56 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* See if we can find our Help file.
|
|
|
|
*/
|
2006-12-17 11:16:07 +00:00
|
|
|
init_help();
|
2001-12-12 18:45:56 +00:00
|
|
|
|
2005-03-19 02:26:58 +00:00
|
|
|
split_into_argv(cmdline, &argc, &argv, NULL);
|
|
|
|
|
|
|
|
if (argc > 0) {
|
|
|
|
if (!strcmp(argv[0], "-pgpfp")) {
|
|
|
|
pgp_fingerprints();
|
|
|
|
exit(1);
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* Assume the first argument to be a private key file, and
|
|
|
|
* attempt to load it.
|
|
|
|
*/
|
|
|
|
cmdline_keyfile = argv[0];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-11-27 19:56:38 +00:00
|
|
|
random_ref();
|
2006-12-17 11:16:07 +00:00
|
|
|
ret = DialogBox(hinst, MAKEINTRESOURCE(201), NULL, MainDlgProc) != IDOK;
|
|
|
|
|
|
|
|
cleanup_exit(ret);
|
|
|
|
return ret; /* just in case optimiser complains */
|
2000-10-19 15:43:08 +00:00
|
|
|
}
|