123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613 |
- /*
- * PuTTY key generation front end (Windows).
- */
- #include <time.h>
- #include <stdio.h>
- #include <stdlib.h>
- #include <assert.h>
- #include "putty.h"
- #include "ssh.h"
- #include "sshkeygen.h"
- #include "licence.h"
- #include "security-api.h"
- #include "puttygen-rc.h"
- #include <commctrl.h>
- #ifdef MSVC4
- #define ICON_BIG 1
- #endif
- #define WM_DONEKEY (WM_APP + 1)
- #define DEFAULT_KEY_BITS 2048
- #define DEFAULT_ECCURVE_INDEX 0
- #define DEFAULT_EDCURVE_INDEX 0
- static char *cmdline_keyfile = NULL;
- static ptrlen cmdline_demo_keystr;
- static const char *demo_screenshot_filename = NULL;
- /*
- * Print a modal (Really Bad) message box and perform a fatal exit.
- */
- void modalfatalbox(const char *fmt, ...)
- {
- va_list ap;
- char *stuff;
- va_start(ap, fmt);
- stuff = dupvprintf(fmt, ap);
- va_end(ap);
- MessageBox(NULL, stuff, "PuTTYgen Fatal Error",
- MB_SYSTEMMODAL | MB_ICONERROR | MB_OK);
- sfree(stuff);
- exit(1);
- }
- /*
- * Print a non-fatal message box and do not exit.
- */
- void nonfatal(const char *fmt, ...)
- {
- va_list ap;
- char *stuff;
- va_start(ap, fmt);
- stuff = dupvprintf(fmt, ap);
- va_end(ap);
- MessageBox(NULL, stuff, "PuTTYgen Error",
- MB_SYSTEMMODAL | MB_ICONERROR | MB_OK);
- sfree(stuff);
- }
- /* ----------------------------------------------------------------------
- * ProgressReceiver implementation.
- */
- #define PROGRESSRANGE 65535
- struct progressphase {
- double startpoint, total;
- /* For exponential phases */
- double exp_probability, exp_current_value;
- };
- struct progress {
- size_t nphases, phasessize;
- struct progressphase *phases, *currphase;
- double scale;
- HWND progbar;
- ProgressReceiver rec;
- };
- static ProgressPhase win_progress_add_linear(
- ProgressReceiver *prog, double overall_cost) {
- struct progress *p = container_of(prog, struct progress, rec);
- sgrowarray(p->phases, p->phasessize, p->nphases);
- int phase = p->nphases++;
- p->phases[phase].total = overall_cost;
- ProgressPhase ph = { .n = phase };
- return ph;
- }
- static ProgressPhase win_progress_add_probabilistic(
- ProgressReceiver *prog, double cost_per_attempt, double probability) {
- struct progress *p = container_of(prog, struct progress, rec);
- sgrowarray(p->phases, p->phasessize, p->nphases);
- int phase = p->nphases++;
- p->phases[phase].exp_probability = 1.0 - probability;
- p->phases[phase].exp_current_value = 1.0;
- /* Expected number of attempts = 1 / probability of attempt succeeding */
- p->phases[phase].total = cost_per_attempt / probability;
- ProgressPhase ph = { .n = phase };
- return ph;
- }
- static void win_progress_ready(ProgressReceiver *prog)
- {
- struct progress *p = container_of(prog, struct progress, rec);
- double total = 0;
- for (int i = 0; i < p->nphases; i++) {
- p->phases[i].startpoint = total;
- total += p->phases[i].total;
- }
- p->scale = PROGRESSRANGE / total;
- SendMessage(p->progbar, PBM_SETRANGE, 0, MAKELPARAM(0, PROGRESSRANGE));
- }
- static void win_progress_start_phase(ProgressReceiver *prog,
- ProgressPhase phase)
- {
- struct progress *p = container_of(prog, struct progress, rec);
- assert(phase.n < p->nphases);
- p->currphase = &p->phases[phase.n];
- }
- static void win_progress_update(struct progress *p, double phasepos)
- {
- double position = (p->currphase->startpoint +
- p->currphase->total * phasepos);
- position *= p->scale;
- if (position < 0)
- position = 0;
- if (position > PROGRESSRANGE)
- position = PROGRESSRANGE;
- SendMessage(p->progbar, PBM_SETPOS, (WPARAM)position, 0);
- }
- static void win_progress_report(ProgressReceiver *prog, double progress)
- {
- struct progress *p = container_of(prog, struct progress, rec);
- win_progress_update(p, progress);
- }
- static void win_progress_report_attempt(ProgressReceiver *prog)
- {
- struct progress *p = container_of(prog, struct progress, rec);
- p->currphase->exp_current_value *= p->currphase->exp_probability;
- win_progress_update(p, 1.0 - p->currphase->exp_current_value);
- }
- static void win_progress_report_phase_complete(ProgressReceiver *prog)
- {
- struct progress *p = container_of(prog, struct progress, rec);
- win_progress_update(p, 1.0);
- }
- static const ProgressReceiverVtable win_progress_vt = {
- .add_linear = win_progress_add_linear,
- .add_probabilistic = win_progress_add_probabilistic,
- .ready = win_progress_ready,
- .start_phase = win_progress_start_phase,
- .report = win_progress_report,
- .report_attempt = win_progress_report_attempt,
- .report_phase_complete = win_progress_report_phase_complete,
- };
- static void win_progress_initialise(struct progress *p)
- {
- p->nphases = p->phasessize = 0;
- p->phases = p->currphase = NULL;
- p->rec.vt = &win_progress_vt;
- }
- static void win_progress_cleanup(struct progress *p)
- {
- sfree(p->phases);
- }
- struct PassphraseProcStruct {
- char **passphrase;
- char *comment;
- };
- /*
- * Dialog-box function for the passphrase box.
- */
- static INT_PTR CALLBACK PassphraseProc(HWND hwnd, UINT msg,
- WPARAM wParam, LPARAM lParam)
- {
- static char **passphrase = NULL;
- struct PassphraseProcStruct *p;
- switch (msg) {
- case WM_INITDIALOG:
- SetForegroundWindow(hwnd);
- SetWindowPos(hwnd, HWND_TOP, 0, 0, 0, 0,
- SWP_NOMOVE | SWP_NOSIZE | SWP_SHOWWINDOW);
- /*
- * Centre the window.
- */
- { /* centre the window */
- RECT rs, rd;
- HWND hw;
- hw = GetDesktopWindow();
- if (GetWindowRect(hw, &rs) && GetWindowRect(hwnd, &rd))
- MoveWindow(hwnd,
- (rs.right + rs.left + rd.left - rd.right) / 2,
- (rs.bottom + rs.top + rd.top - rd.bottom) / 2,
- rd.right - rd.left, rd.bottom - rd.top, true);
- }
- p = (struct PassphraseProcStruct *) lParam;
- passphrase = p->passphrase;
- if (p->comment)
- SetDlgItemText(hwnd, 101, p->comment);
- burnstr(*passphrase);
- *passphrase = dupstr("");
- SetDlgItemText(hwnd, 102, *passphrase);
- return 0;
- case WM_COMMAND:
- switch (LOWORD(wParam)) {
- case IDOK:
- if (*passphrase)
- EndDialog(hwnd, 1);
- else
- MessageBeep(0);
- return 0;
- case IDCANCEL:
- EndDialog(hwnd, 0);
- return 0;
- case 102: /* edit box */
- if ((HIWORD(wParam) == EN_CHANGE) && passphrase) {
- burnstr(*passphrase);
- *passphrase = GetDlgItemText_alloc(hwnd, 102);
- }
- return 0;
- }
- return 0;
- case WM_CLOSE:
- EndDialog(hwnd, 0);
- return 0;
- }
- return 0;
- }
- static void try_get_dlg_item_uint32(HWND hwnd, int id, uint32_t *out)
- {
- char buf[128];
- if (!GetDlgItemText(hwnd, id, buf, sizeof(buf)))
- return;
- if (!*buf)
- return;
- char *end;
- unsigned long val = strtoul(buf, &end, 10);
- if (*end)
- return;
- if ((val >> 16) >> 16)
- return;
- *out = val;
- }
- static ppk_save_parameters save_params;
- struct PPKParams {
- ppk_save_parameters params;
- uint32_t time_passes, time_ms;
- };
- /*
- * Dialog-box function for the passphrase box.
- */
- static INT_PTR CALLBACK PPKParamsProc(HWND hwnd, UINT msg,
- WPARAM wParam, LPARAM lParam)
- {
- struct PPKParams *pp;
- char *buf;
- if (msg == WM_INITDIALOG) {
- pp = (struct PPKParams *)lParam;
- SetWindowLongPtr(hwnd, GWLP_USERDATA, (LONG_PTR)pp);
- } else {
- pp = (struct PPKParams *)GetWindowLongPtr(hwnd, GWLP_USERDATA);
- }
- switch (msg) {
- case WM_INITDIALOG:
- SetForegroundWindow(hwnd);
- SetWindowPos(hwnd, HWND_TOP, 0, 0, 0, 0,
- SWP_NOMOVE | SWP_NOSIZE | SWP_SHOWWINDOW);
- if (has_help())
- SetWindowLongPtr(hwnd, GWL_EXSTYLE,
- GetWindowLongPtr(hwnd, GWL_EXSTYLE) |
- WS_EX_CONTEXTHELP);
- /*
- * Centre the window.
- */
- { /* centre the window */
- RECT rs, rd;
- HWND hw;
- hw = GetDesktopWindow();
- if (GetWindowRect(hw, &rs) && GetWindowRect(hwnd, &rd))
- MoveWindow(hwnd,
- (rs.right + rs.left + rd.left - rd.right) / 2,
- (rs.bottom + rs.top + rd.top - rd.bottom) / 2,
- rd.right - rd.left, rd.bottom - rd.top, true);
- }
- CheckRadioButton(hwnd, IDC_PPKVER_2, IDC_PPKVER_3,
- IDC_PPKVER_2 + (pp->params.fmt_version - 2));
- CheckRadioButton(
- hwnd, IDC_KDF_ARGON2ID, IDC_KDF_ARGON2D,
- (pp->params.argon2_flavour == Argon2id ? IDC_KDF_ARGON2ID :
- pp->params.argon2_flavour == Argon2i ? IDC_KDF_ARGON2I :
- /* pp->params.argon2_flavour == Argon2d ? */ IDC_KDF_ARGON2D));
- buf = dupprintf("%"PRIu32, pp->params.argon2_mem);
- SetDlgItemText(hwnd, IDC_ARGON2_MEM, buf);
- sfree(buf);
- if (pp->params.argon2_passes_auto) {
- CheckRadioButton(hwnd, IDC_PPK_AUTO_YES, IDC_PPK_AUTO_NO,
- IDC_PPK_AUTO_YES);
- buf = dupprintf("%"PRIu32, pp->time_ms);
- SetDlgItemText(hwnd, IDC_ARGON2_TIME, buf);
- sfree(buf);
- } else {
- CheckRadioButton(hwnd, IDC_PPK_AUTO_YES, IDC_PPK_AUTO_NO,
- IDC_PPK_AUTO_NO);
- buf = dupprintf("%"PRIu32, pp->time_passes);
- SetDlgItemText(hwnd, IDC_ARGON2_TIME, buf);
- sfree(buf);
- }
- buf = dupprintf("%"PRIu32, pp->params.argon2_parallelism);
- SetDlgItemText(hwnd, IDC_ARGON2_PARALLEL, buf);
- sfree(buf);
- return 0;
- case WM_COMMAND:
- switch (LOWORD(wParam)) {
- case IDOK:
- EndDialog(hwnd, 1);
- return 0;
- case IDCANCEL:
- EndDialog(hwnd, 0);
- return 0;
- case IDC_PPKVER_2:
- pp->params.fmt_version = 2;
- return 0;
- case IDC_PPKVER_3:
- pp->params.fmt_version = 3;
- return 0;
- case IDC_KDF_ARGON2ID:
- pp->params.argon2_flavour = Argon2id;
- return 0;
- case IDC_KDF_ARGON2I:
- pp->params.argon2_flavour = Argon2i;
- return 0;
- case IDC_KDF_ARGON2D:
- pp->params.argon2_flavour = Argon2d;
- return 0;
- case IDC_ARGON2_MEM:
- try_get_dlg_item_uint32(hwnd, IDC_ARGON2_MEM,
- &pp->params.argon2_mem);
- return 0;
- case IDC_PPK_AUTO_YES:
- pp->params.argon2_passes_auto = true;
- buf = dupprintf("%"PRIu32, pp->time_ms);
- SetDlgItemText(hwnd, IDC_ARGON2_TIME, buf);
- sfree(buf);
- return 0;
- case IDC_PPK_AUTO_NO:
- pp->params.argon2_passes_auto = false;
- buf = dupprintf("%"PRIu32, pp->time_passes);
- SetDlgItemText(hwnd, IDC_ARGON2_TIME, buf);
- sfree(buf);
- return 0;
- case IDC_ARGON2_TIME:
- try_get_dlg_item_uint32(hwnd, IDC_ARGON2_TIME,
- pp->params.argon2_passes_auto ?
- &pp->time_ms : &pp->time_passes);
- return 0;
- case IDC_ARGON2_PARALLEL:
- try_get_dlg_item_uint32(hwnd, IDC_ARGON2_PARALLEL,
- &pp->params.argon2_parallelism);
- return 0;
- }
- return 0;
- case WM_HELP: {
- int id = ((LPHELPINFO)lParam)->iCtrlId;
- const char *topic = NULL;
- switch (id) {
- case IDC_PPKVER_STATIC:
- case IDC_PPKVER_2:
- case IDC_PPKVER_3:
- topic = WINHELP_CTX_puttygen_ppkver; break;
- case IDC_KDF_STATIC:
- case IDC_KDF_ARGON2ID:
- case IDC_KDF_ARGON2I:
- case IDC_KDF_ARGON2D:
- case IDC_ARGON2_MEM_STATIC:
- case IDC_ARGON2_MEM:
- case IDC_ARGON2_MEM_STATIC2:
- case IDC_ARGON2_TIME_STATIC:
- case IDC_ARGON2_TIME:
- case IDC_PPK_AUTO_YES:
- case IDC_PPK_AUTO_NO:
- case IDC_ARGON2_PARALLEL_STATIC:
- case IDC_ARGON2_PARALLEL:
- topic = WINHELP_CTX_puttygen_kdfparam; break;
- }
- if (topic) {
- launch_help(hwnd, topic);
- } else {
- MessageBeep(0);
- }
- break;
- }
- case WM_CLOSE:
- EndDialog(hwnd, 0);
- return 0;
- }
- return 0;
- }
- /*
- * Prompt for a key file. Assumes the filename buffer is of size
- * FILENAME_MAX.
- */
- static bool prompt_keyfile(HWND hwnd, char *dlgtitle,
- char *filename, bool save, bool ppk)
- {
- OPENFILENAME of;
- memset(&of, 0, sizeof(of));
- of.hwndOwner = hwnd;
- if (ppk) {
- of.lpstrFilter = "PuTTY Private Key Files (*.ppk)\0*.ppk\0"
- "All Files (*.*)\0*\0\0\0";
- of.lpstrDefExt = ".ppk";
- } else {
- of.lpstrFilter = "All Files (*.*)\0*\0\0\0";
- }
- of.lpstrCustomFilter = NULL;
- of.nFilterIndex = 1;
- of.lpstrFile = filename;
- *filename = '\0';
- of.nMaxFile = FILENAME_MAX;
- of.lpstrFileTitle = NULL;
- of.lpstrTitle = dlgtitle;
- of.Flags = 0;
- return request_file(NULL, &of, false, save);
- }
- /*
- * Dialog-box function for the Licence box.
- */
- static INT_PTR CALLBACK LicenceProc(HWND hwnd, UINT msg,
- WPARAM wParam, LPARAM lParam)
- {
- switch (msg) {
- case WM_INITDIALOG: {
- /*
- * Centre the window.
- */
- RECT rs, rd;
- HWND hw;
- hw = GetDesktopWindow();
- if (GetWindowRect(hw, &rs) && GetWindowRect(hwnd, &rd))
- MoveWindow(hwnd,
- (rs.right + rs.left + rd.left - rd.right) / 2,
- (rs.bottom + rs.top + rd.top - rd.bottom) / 2,
- rd.right - rd.left, rd.bottom - rd.top, true);
- SetDlgItemText(hwnd, 1000, LICENCE_TEXT("\r\n\r\n"));
- return 1;
- }
- case WM_COMMAND:
- switch (LOWORD(wParam)) {
- case IDOK:
- case IDCANCEL:
- EndDialog(hwnd, 1);
- return 0;
- }
- return 0;
- case WM_CLOSE:
- EndDialog(hwnd, 1);
- return 0;
- }
- return 0;
- }
- /*
- * Dialog-box function for the About box.
- */
- static INT_PTR CALLBACK AboutProc(HWND hwnd, UINT msg,
- WPARAM wParam, LPARAM lParam)
- {
- switch (msg) {
- case WM_INITDIALOG:
- /*
- * Centre the window.
- */
- { /* centre the window */
- RECT rs, rd;
- HWND hw;
- hw = GetDesktopWindow();
- if (GetWindowRect(hw, &rs) && GetWindowRect(hwnd, &rd))
- MoveWindow(hwnd,
- (rs.right + rs.left + rd.left - rd.right) / 2,
- (rs.bottom + rs.top + rd.top - rd.bottom) / 2,
- rd.right - rd.left, rd.bottom - rd.top, true);
- }
- {
- char *buildinfo_text = buildinfo("\r\n");
- char *text = dupprintf(
- "PuTTYgen\r\n\r\n%s\r\n\r\n%s\r\n\r\n%s",
- ver, buildinfo_text,
- "\251 " SHORT_COPYRIGHT_DETAILS ". All rights reserved.");
- sfree(buildinfo_text);
- SetDlgItemText(hwnd, 1000, text);
- MakeDlgItemBorderless(hwnd, 1000);
- sfree(text);
- }
- return 1;
- case WM_COMMAND:
- switch (LOWORD(wParam)) {
- case IDOK:
- case IDCANCEL:
- EndDialog(hwnd, 1);
- return 0;
- case 101:
- EnableWindow(hwnd, 0);
- DialogBox(hinst, MAKEINTRESOURCE(214), hwnd, LicenceProc);
- EnableWindow(hwnd, 1);
- SetActiveWindow(hwnd);
- return 0;
- case 102:
- /* Load web browser */
- ShellExecute(hwnd, "open",
- "https://www.chiark.greenend.org.uk/~sgtatham/putty/",
- 0, 0, SW_SHOWDEFAULT);
- return 0;
- }
- return 0;
- case WM_CLOSE:
- EndDialog(hwnd, 1);
- return 0;
- }
- return 0;
- }
- typedef enum {RSA, DSA, ECDSA, EDDSA} keytype;
- /*
- * Thread to generate a key.
- */
- struct rsa_key_thread_params {
- HWND progressbar; /* notify this with progress */
- HWND dialog; /* notify this on completion */
- int key_bits; /* bits in key modulus (RSA, DSA) */
- int curve_bits; /* bits in elliptic curve (ECDSA) */
- keytype keytype;
- const PrimeGenerationPolicy *primepolicy;
- bool rsa_strong;
- union {
- RSAKey *key;
- struct dsa_key *dsakey;
- struct ecdsa_key *eckey;
- struct eddsa_key *edkey;
- };
- };
- static DWORD WINAPI generate_key_thread(void *param)
- {
- struct rsa_key_thread_params *params =
- (struct rsa_key_thread_params *) param;
- struct progress prog;
- prog.progbar = params->progressbar;
- win_progress_initialise(&prog);
- PrimeGenerationContext *pgc = primegen_new_context(params->primepolicy);
- if (params->keytype == DSA)
- dsa_generate(params->dsakey, params->key_bits, pgc, &prog.rec);
- else if (params->keytype == ECDSA)
- ecdsa_generate(params->eckey, params->curve_bits);
- else if (params->keytype == EDDSA)
- eddsa_generate(params->edkey, params->curve_bits);
- else
- rsa_generate(params->key, params->key_bits, params->rsa_strong,
- pgc, &prog.rec);
- primegen_free_context(pgc);
- PostMessage(params->dialog, WM_DONEKEY, 0, 0);
- win_progress_cleanup(&prog);
- sfree(params);
- return 0;
- }
- struct InitialParams {
- int keybutton;
- int primepolicybutton;
- bool rsa_strong;
- FingerprintType fptype;
- int keybits;
- int eccurve_index, edcurve_index;
- };
- struct MainDlgState {
- bool generation_thread_exists;
- bool key_exists;
- int entropy_got, entropy_required;
- strbuf *entropy;
- ULONG entropy_prev_msgtime;
- int key_bits, curve_bits;
- bool ssh2;
- keytype keytype;
- const PrimeGenerationPolicy *primepolicy;
- bool rsa_strong;
- FingerprintType fptype;
- char **commentptr; /* points to key.comment or ssh2key.comment */
- ssh2_userkey ssh2key;
- union {
- RSAKey key;
- struct dsa_key dsakey;
- struct ecdsa_key eckey;
- struct eddsa_key edkey;
- };
- HMENU filemenu, keymenu, cvtmenu;
- };
- /*
- * Rate limit for incrementing the entropy_got counter.
- *
- * Some pointing devices (e.g. gaming mice) can be set to send
- * mouse-movement events at an extremely high sample rate like 1kHz.
- * In that situation, there's likely to be a strong correlation
- * between the contents of successive movement events, so you have to
- * regard the mouse movements as containing less entropy each.
- *
- * A reasonably simple approach to this is to continue to buffer all
- * mouse data, but limit the rate at which we increment the counter
- * for how much entropy we think we've collected. That way, the user
- * still has to spend time wiggling the mouse back and forth in a way
- * that varies with muscle motions and introduces randomness.
- */
- #define ENTROPY_RATE_LIMIT 10 /* in units of GetMessageTime(), i.e. ms */
- static void hidemany(HWND hwnd, const int *ids, bool hideit)
- {
- while (*ids) {
- ShowWindow(GetDlgItem(hwnd, *ids++), (hideit ? SW_HIDE : SW_SHOW));
- }
- }
- enum {
- controlidstart = 100,
- IDC_QUIT,
- IDC_TITLE,
- IDC_BOX_KEY,
- IDC_NOKEY,
- IDC_GENERATING,
- IDC_PROGRESS,
- IDC_PKSTATIC, IDC_KEYDISPLAY,
- IDC_CERTSTATIC, IDC_CERTMOREINFO,
- IDC_FPSTATIC, IDC_FINGERPRINT,
- IDC_COMMENTSTATIC, IDC_COMMENTEDIT,
- IDC_PASSPHRASE1STATIC, IDC_PASSPHRASE1EDIT,
- IDC_PASSPHRASE2STATIC, IDC_PASSPHRASE2EDIT,
- IDC_BOX_ACTIONS,
- IDC_GENSTATIC, IDC_GENERATE,
- IDC_LOADSTATIC, IDC_LOAD,
- IDC_SAVESTATIC, IDC_SAVE, IDC_SAVEPUB,
- IDC_BOX_PARAMS,
- IDC_TYPESTATIC, IDC_KEYSSH1, IDC_KEYSSH2RSA, IDC_KEYSSH2DSA,
- IDC_KEYSSH2ECDSA, IDC_KEYSSH2EDDSA,
- IDC_PRIMEGEN_PROB, IDC_PRIMEGEN_MAURER_SIMPLE, IDC_PRIMEGEN_MAURER_COMPLEX,
- IDC_RSA_STRONG,
- IDC_FPTYPE_SHA256, IDC_FPTYPE_MD5,
- IDC_PPK_PARAMS,
- IDC_BITSSTATIC, IDC_BITS,
- IDC_ECCURVESTATIC, IDC_ECCURVE,
- IDC_EDCURVESTATIC, IDC_EDCURVE,
- IDC_NOTHINGSTATIC,
- IDC_ABOUT,
- IDC_GIVEHELP,
- IDC_IMPORT,
- IDC_EXPORT_OPENSSH_AUTO, IDC_EXPORT_OPENSSH_NEW,
- IDC_EXPORT_SSHCOM,
- IDC_ADDCERT, IDC_REMCERT,
- };
- static void setupbigedit1(HWND hwnd, RSAKey *key)
- {
- ShowWindow(GetDlgItem(hwnd, IDC_CERTSTATIC), SW_HIDE);
- ShowWindow(GetDlgItem(hwnd, IDC_CERTMOREINFO), SW_HIDE);
- ShowWindow(GetDlgItem(hwnd, IDC_PKSTATIC), SW_SHOW);
- ShowWindow(GetDlgItem(hwnd, IDC_KEYDISPLAY), SW_SHOW);
- SetDlgItemText(hwnd, IDC_PKSTATIC,
- "&Public key for pasting into authorized_keys file:");
- char *buffer = ssh1_pubkey_str(key);
- SetDlgItemText(hwnd, IDC_KEYDISPLAY, buffer);
- sfree(buffer);
- }
- static void setupbigedit2(HWND hwnd, ssh2_userkey *key)
- {
- if (ssh_key_alg(key->key)->is_certificate) {
- ShowWindow(GetDlgItem(hwnd, IDC_CERTSTATIC), SW_SHOW);
- ShowWindow(GetDlgItem(hwnd, IDC_CERTMOREINFO), SW_SHOW);
- ShowWindow(GetDlgItem(hwnd, IDC_PKSTATIC), SW_HIDE);
- ShowWindow(GetDlgItem(hwnd, IDC_KEYDISPLAY), SW_HIDE);
- SetDlgItemText(hwnd, IDC_CERTSTATIC,
- "This public key contains an OpenSSH certificate.");
- } else {
- ShowWindow(GetDlgItem(hwnd, IDC_CERTSTATIC), SW_HIDE);
- ShowWindow(GetDlgItem(hwnd, IDC_CERTMOREINFO), SW_HIDE);
- ShowWindow(GetDlgItem(hwnd, IDC_PKSTATIC), SW_SHOW);
- ShowWindow(GetDlgItem(hwnd, IDC_KEYDISPLAY), SW_SHOW);
- SetDlgItemText(hwnd, IDC_PKSTATIC, "&Public key for pasting into "
- "OpenSSH authorized_keys file:");
- char *buffer = ssh2_pubkey_openssh_str(key);
- SetDlgItemText(hwnd, IDC_KEYDISPLAY, buffer);
- sfree(buffer);
- }
- }
- /*
- * Warn about the obsolescent key file format.
- */
- void old_keyfile_warning(void)
- {
- static const char mbtitle[] = "PuTTY Key File Warning";
- static const char message[] =
- "You are loading an SSH-2 private key which has an\n"
- "old version of the file format. This means your key\n"
- "file is not fully tamperproof. Future versions of\n"
- "PuTTY may stop supporting this private key format,\n"
- "so we recommend you convert your key to the new\n"
- "format.\n"
- "\n"
- "Once the key is loaded into PuTTYgen, you can perform\n"
- "this conversion simply by saving it again.";
- MessageBox(NULL, message, mbtitle, MB_OK);
- }
- static const int nokey_ids[] = { IDC_NOKEY, 0 };
- static const int generating_ids[] = { IDC_GENERATING, IDC_PROGRESS, 0 };
- static const int gotkey_ids_unconditional[] = {
- IDC_FPSTATIC, IDC_FINGERPRINT,
- IDC_COMMENTSTATIC, IDC_COMMENTEDIT,
- IDC_PASSPHRASE1STATIC, IDC_PASSPHRASE1EDIT,
- IDC_PASSPHRASE2STATIC, IDC_PASSPHRASE2EDIT, 0
- };
- static const int gotkey_ids_conditional[] = {
- IDC_PKSTATIC, IDC_KEYDISPLAY,
- IDC_CERTSTATIC, IDC_CERTMOREINFO,
- };
- /*
- * Small UI helper function to switch the state of the main dialog
- * by enabling and disabling controls and menu items.
- */
- void ui_set_state(HWND hwnd, struct MainDlgState *state, int status)
- {
- int type;
- switch (status) {
- case 0: /* no key */
- hidemany(hwnd, nokey_ids, false);
- hidemany(hwnd, generating_ids, true);
- hidemany(hwnd, gotkey_ids_unconditional, true);
- hidemany(hwnd, gotkey_ids_conditional, true);
- EnableWindow(GetDlgItem(hwnd, IDC_GENERATE), 1);
- EnableWindow(GetDlgItem(hwnd, IDC_LOAD), 1);
- EnableWindow(GetDlgItem(hwnd, IDC_SAVE), 0);
- EnableWindow(GetDlgItem(hwnd, IDC_SAVEPUB), 0);
- EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH1), 1);
- EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2RSA), 1);
- EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2DSA), 1);
- EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2ECDSA), 1);
- EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2EDDSA), 1);
- EnableWindow(GetDlgItem(hwnd, IDC_BITS), 1);
- EnableMenuItem(state->filemenu, IDC_LOAD, MF_ENABLED|MF_BYCOMMAND);
- EnableMenuItem(state->filemenu, IDC_SAVE, MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->filemenu, IDC_SAVEPUB, MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_GENERATE, MF_ENABLED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_KEYSSH1, MF_ENABLED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_KEYSSH2RSA, MF_ENABLED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_KEYSSH2DSA, MF_ENABLED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_KEYSSH2ECDSA,
- MF_ENABLED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_KEYSSH2EDDSA,
- MF_ENABLED|MF_BYCOMMAND);
- EnableMenuItem(state->cvtmenu, IDC_IMPORT, MF_ENABLED|MF_BYCOMMAND);
- EnableMenuItem(state->cvtmenu, IDC_EXPORT_OPENSSH_AUTO,
- MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->cvtmenu, IDC_EXPORT_OPENSSH_NEW,
- MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->cvtmenu, IDC_EXPORT_SSHCOM,
- MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_ADDCERT, MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_REMCERT, MF_GRAYED|MF_BYCOMMAND);
- break;
- case 1: /* generating key */
- hidemany(hwnd, nokey_ids, true);
- hidemany(hwnd, generating_ids, false);
- hidemany(hwnd, gotkey_ids_unconditional, true);
- hidemany(hwnd, gotkey_ids_conditional, true);
- EnableWindow(GetDlgItem(hwnd, IDC_GENERATE), 0);
- EnableWindow(GetDlgItem(hwnd, IDC_LOAD), 0);
- EnableWindow(GetDlgItem(hwnd, IDC_SAVE), 0);
- EnableWindow(GetDlgItem(hwnd, IDC_SAVEPUB), 0);
- EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH1), 0);
- EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2RSA), 0);
- EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2DSA), 0);
- EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2ECDSA), 0);
- EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2EDDSA), 0);
- EnableWindow(GetDlgItem(hwnd, IDC_BITS), 0);
- EnableMenuItem(state->filemenu, IDC_LOAD, MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->filemenu, IDC_SAVE, MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->filemenu, IDC_SAVEPUB, MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_GENERATE, MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_KEYSSH1, MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_KEYSSH2RSA, MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_KEYSSH2DSA, MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_KEYSSH2ECDSA,
- MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_KEYSSH2EDDSA,
- MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->cvtmenu, IDC_IMPORT, MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->cvtmenu, IDC_EXPORT_OPENSSH_AUTO,
- MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->cvtmenu, IDC_EXPORT_OPENSSH_NEW,
- MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->cvtmenu, IDC_EXPORT_SSHCOM,
- MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_ADDCERT, MF_GRAYED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_REMCERT, MF_GRAYED|MF_BYCOMMAND);
- break;
- case 2:
- hidemany(hwnd, nokey_ids, true);
- hidemany(hwnd, generating_ids, true);
- hidemany(hwnd, gotkey_ids_unconditional, false);
- // gotkey_ids_conditional will be unhidden by setupbigedit2
- EnableWindow(GetDlgItem(hwnd, IDC_GENERATE), 1);
- EnableWindow(GetDlgItem(hwnd, IDC_LOAD), 1);
- EnableWindow(GetDlgItem(hwnd, IDC_SAVE), 1);
- EnableWindow(GetDlgItem(hwnd, IDC_SAVEPUB), 1);
- EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH1), 1);
- EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2RSA), 1);
- EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2DSA), 1);
- EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2ECDSA), 1);
- EnableWindow(GetDlgItem(hwnd, IDC_KEYSSH2EDDSA), 1);
- EnableWindow(GetDlgItem(hwnd, IDC_BITS), 1);
- EnableMenuItem(state->filemenu, IDC_LOAD, MF_ENABLED|MF_BYCOMMAND);
- EnableMenuItem(state->filemenu, IDC_SAVE, MF_ENABLED|MF_BYCOMMAND);
- EnableMenuItem(state->filemenu, IDC_SAVEPUB, MF_ENABLED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_GENERATE, MF_ENABLED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_KEYSSH1, MF_ENABLED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_KEYSSH2RSA,MF_ENABLED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_KEYSSH2DSA,MF_ENABLED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_KEYSSH2ECDSA,
- MF_ENABLED|MF_BYCOMMAND);
- EnableMenuItem(state->keymenu, IDC_KEYSSH2EDDSA,
- MF_ENABLED|MF_BYCOMMAND);
- EnableMenuItem(state->cvtmenu, IDC_IMPORT, MF_ENABLED|MF_BYCOMMAND);
- /*
- * Enable export menu items if and only if the key type
- * supports this kind of export.
- */
- type = state->ssh2 ? SSH_KEYTYPE_SSH2 : SSH_KEYTYPE_SSH1;
- #define do_export_menuitem(x,y) \
- EnableMenuItem(state->cvtmenu, x, MF_BYCOMMAND | \
- (import_target_type(y)==type?MF_ENABLED:MF_GRAYED))
- do_export_menuitem(IDC_EXPORT_OPENSSH_AUTO, SSH_KEYTYPE_OPENSSH_AUTO);
- do_export_menuitem(IDC_EXPORT_OPENSSH_NEW, SSH_KEYTYPE_OPENSSH_NEW);
- do_export_menuitem(IDC_EXPORT_SSHCOM, SSH_KEYTYPE_SSHCOM);
- #undef do_export_menuitem
- /*
- * Enable certificate menu items similarly.
- */
- {
- bool add_cert_allowed = false, rem_cert_allowed = false;
- if (state->ssh2 && state->ssh2key.key) {
- const ssh_keyalg *alg = ssh_key_alg(state->ssh2key.key);
- if (alg->is_certificate) {
- /* If there's a certificate, we can remove it */
- rem_cert_allowed = true;
- /* And reset to the base algorithm for the next check */
- alg = alg->base_alg;
- }
- /* Now, do we have any certified version of this alg? */
- for (size_t i = 0; i < n_keyalgs; i++) {
- if (all_keyalgs[i]->base_alg == alg) {
- add_cert_allowed = true;
- break;
- }
- }
- }
- EnableMenuItem(state->keymenu, IDC_ADDCERT, MF_BYCOMMAND |
- (add_cert_allowed ? MF_ENABLED : MF_GRAYED));
- EnableMenuItem(state->keymenu, IDC_REMCERT, MF_BYCOMMAND |
- (rem_cert_allowed ? MF_ENABLED : MF_GRAYED));
- }
- break;
- }
- }
- /*
- * Helper functions to set the key type, taking care of keeping the
- * menu and radio button selections in sync and also showing/hiding
- * the appropriate size/curve control for the current key type.
- */
- void ui_update_key_type_ctrls(HWND hwnd)
- {
- enum { BITS, ECCURVE, EDCURVE, NOTHING } which;
- static const int bits_ids[] = {
- IDC_BITSSTATIC, IDC_BITS, 0
- };
- static const int eccurve_ids[] = {
- IDC_ECCURVESTATIC, IDC_ECCURVE, 0
- };
- static const int edcurve_ids[] = {
- IDC_EDCURVESTATIC, IDC_EDCURVE, 0
- };
- static const int nothing_ids[] = {
- IDC_NOTHINGSTATIC, 0
- };
- if (IsDlgButtonChecked(hwnd, IDC_KEYSSH1) ||
- IsDlgButtonChecked(hwnd, IDC_KEYSSH2RSA) ||
- IsDlgButtonChecked(hwnd, IDC_KEYSSH2DSA)) {
- which = BITS;
- } else if (IsDlgButtonChecked(hwnd, IDC_KEYSSH2ECDSA)) {
- which = ECCURVE;
- } else if (IsDlgButtonChecked(hwnd, IDC_KEYSSH2EDDSA)) {
- which = EDCURVE;
- } else {
- /* Currently not used since Ed25519 stopped being the only
- * thing in its class, but I'll keep it here in case it comes
- * in useful again */
- which = NOTHING;
- }
- hidemany(hwnd, bits_ids, which != BITS);
- hidemany(hwnd, eccurve_ids, which != ECCURVE);
- hidemany(hwnd, edcurve_ids, which != EDCURVE);
- hidemany(hwnd, nothing_ids, which != NOTHING);
- }
- void ui_set_key_type(HWND hwnd, struct MainDlgState *state, int button)
- {
- CheckRadioButton(hwnd, IDC_KEYSSH1, IDC_KEYSSH2EDDSA, button);
- CheckMenuRadioItem(state->keymenu, IDC_KEYSSH1, IDC_KEYSSH2EDDSA,
- button, MF_BYCOMMAND);
- ui_update_key_type_ctrls(hwnd);
- }
- void ui_set_primepolicy(HWND hwnd, struct MainDlgState *state, int option)
- {
- CheckMenuRadioItem(state->keymenu, IDC_PRIMEGEN_PROB,
- IDC_PRIMEGEN_MAURER_COMPLEX, option, MF_BYCOMMAND);
- switch (option) {
- case IDC_PRIMEGEN_PROB:
- state->primepolicy = &primegen_probabilistic;
- break;
- case IDC_PRIMEGEN_MAURER_SIMPLE:
- state->primepolicy = &primegen_provable_maurer_simple;
- break;
- case IDC_PRIMEGEN_MAURER_COMPLEX:
- state->primepolicy = &primegen_provable_maurer_complex;
- break;
- }
- }
- void ui_set_rsa_strong(HWND hwnd, struct MainDlgState *state, bool enable)
- {
- state->rsa_strong = enable;
- CheckMenuItem(state->keymenu, IDC_RSA_STRONG,
- (enable ? MF_CHECKED : 0) | MF_BYCOMMAND);
- }
- static FingerprintType idc_to_fptype(int option)
- {
- switch (option) {
- case IDC_FPTYPE_SHA256:
- return SSH_FPTYPE_SHA256;
- case IDC_FPTYPE_MD5:
- return SSH_FPTYPE_MD5;
- default:
- unreachable("bad control id in idc_to_fptype");
- }
- }
- static int fptype_to_idc(FingerprintType fptype)
- {
- switch (fptype) {
- case SSH_FPTYPE_SHA256:
- return IDC_FPTYPE_SHA256;
- case SSH_FPTYPE_MD5:
- return IDC_FPTYPE_MD5;
- default:
- unreachable("bad fptype in fptype_to_idc");
- }
- }
- void ui_set_fptype(HWND hwnd, struct MainDlgState *state, int option)
- {
- CheckMenuRadioItem(state->keymenu, IDC_FPTYPE_SHA256,
- IDC_FPTYPE_MD5, option, MF_BYCOMMAND);
- state->fptype = idc_to_fptype(option);
- if (state->key_exists && state->ssh2) {
- char *fp = ssh2_fingerprint(state->ssh2key.key, state->fptype);
- SetDlgItemText(hwnd, IDC_FINGERPRINT, fp);
- sfree(fp);
- }
- }
- static void update_ui_after_ssh2_pubkey_change(
- HWND hwnd, struct MainDlgState *state)
- {
- /* Smaller version of update_ui_after_load which doesn't need to
- * be told things like the passphrase, which we aren't changing
- * anyway */
- char *savecomment = state->ssh2key.comment;
- state->ssh2key.comment = NULL;
- char *fp = ssh2_fingerprint(state->ssh2key.key, state->fptype);
- state->ssh2key.comment = savecomment;
- SetDlgItemText(hwnd, IDC_FINGERPRINT, fp);
- sfree(fp);
- setupbigedit2(hwnd, &state->ssh2key);
- }
- static void update_ui_after_load(HWND hwnd, struct MainDlgState *state,
- const char *passphrase, int type,
- RSAKey *newkey1, ssh2_userkey *newkey2)
- {
- SetDlgItemText(hwnd, IDC_PASSPHRASE1EDIT, passphrase);
- SetDlgItemText(hwnd, IDC_PASSPHRASE2EDIT, passphrase);
- if (type == SSH_KEYTYPE_SSH1) {
- char *fingerprint, *savecomment;
- state->ssh2 = false;
- state->commentptr = &state->key.comment;
- state->key = *newkey1; /* structure copy */
- /*
- * Set the key fingerprint.
- */
- savecomment = state->key.comment;
- state->key.comment = NULL;
- fingerprint = rsa_ssh1_fingerprint(&state->key);
- state->key.comment = savecomment;
- SetDlgItemText(hwnd, IDC_FINGERPRINT, fingerprint);
- sfree(fingerprint);
- /*
- * Construct a decimal representation of the key, for pasting
- * into .ssh/authorized_keys on a Unix box.
- */
- setupbigedit1(hwnd, &state->key);
- } else {
- state->ssh2 = true;
- state->commentptr = &state->ssh2key.comment;
- state->ssh2key = *newkey2; /* structure copy */
- sfree(newkey2);
- update_ui_after_ssh2_pubkey_change(hwnd, state);
- }
- SetDlgItemText(hwnd, IDC_COMMENTEDIT,
- *state->commentptr);
- /*
- * Finally, hide the progress bar and show the key data.
- */
- ui_set_state(hwnd, state, 2);
- state->key_exists = true;
- }
- void load_key_file(HWND hwnd, struct MainDlgState *state,
- Filename *filename, bool was_import_cmd)
- {
- char *passphrase;
- bool needs_pass;
- int type, realtype;
- int ret;
- const char *errmsg = NULL;
- char *comment;
- RSAKey newkey1;
- ssh2_userkey *newkey2 = NULL;
- type = realtype = key_type(filename);
- if (type != SSH_KEYTYPE_SSH1 &&
- type != SSH_KEYTYPE_SSH2 &&
- !import_possible(type)) {
- char *msg = dupprintf("Couldn't load private key (%s)",
- key_type_to_str(type));
- message_box(hwnd, msg, "PuTTYgen Error", MB_OK | MB_ICONERROR,
- false, HELPCTXID(errors_cantloadkey));
- sfree(msg);
- return;
- }
- if (type != SSH_KEYTYPE_SSH1 &&
- type != SSH_KEYTYPE_SSH2) {
- realtype = type;
- type = import_target_type(type);
- }
- comment = NULL;
- passphrase = NULL;
- if (realtype == SSH_KEYTYPE_SSH1)
- needs_pass = rsa1_encrypted_f(filename, &comment);
- else if (realtype == SSH_KEYTYPE_SSH2)
- needs_pass = ppk_encrypted_f(filename, &comment);
- else
- needs_pass = import_encrypted(filename, realtype, &comment);
- do {
- burnstr(passphrase);
- passphrase = NULL;
- if (needs_pass) {
- int dlgret;
- struct PassphraseProcStruct pps;
- pps.passphrase = &passphrase;
- pps.comment = comment;
- dlgret = DialogBoxParam(hinst,
- MAKEINTRESOURCE(210),
- NULL, PassphraseProc,
- (LPARAM) &pps);
- if (!dlgret) {
- ret = -2;
- break;
- }
- assert(passphrase != NULL);
- } else
- passphrase = dupstr("");
- if (type == SSH_KEYTYPE_SSH1) {
- if (realtype == type)
- ret = rsa1_load_f(filename, &newkey1, passphrase, &errmsg);
- else
- ret = import_ssh1(filename, realtype, &newkey1,
- passphrase, &errmsg);
- } else {
- if (realtype == type)
- newkey2 = ppk_load_f(filename, passphrase, &errmsg);
- else
- newkey2 = import_ssh2(filename, realtype, passphrase, &errmsg);
- if (newkey2 == SSH2_WRONG_PASSPHRASE)
- ret = -1;
- else if (!newkey2)
- ret = 0;
- else
- ret = 1;
- }
- } while (ret == -1);
- if (comment)
- sfree(comment);
- if (ret == 0) {
- char *msg = dupprintf("Couldn't load private key (%s)", errmsg);
- message_box(hwnd, msg, "PuTTYgen Error", MB_OK | MB_ICONERROR,
- false, HELPCTXID(errors_cantloadkey));
- sfree(msg);
- } else if (ret == 1) {
- /*
- * Now update the key controls with all the
- * key data.
- */
- update_ui_after_load(hwnd, state, passphrase, type, &newkey1, newkey2);
- /*
- * If the user has imported a foreign key
- * using the Load command, let them know.
- * If they've used the Import command, be
- * silent.
- */
- if (realtype != type && !was_import_cmd) {
- char msg[512];
- sprintf(msg, "Successfully imported foreign key\n"
- "(%s).\n"
- "To use this key with PuTTY, you need to\n"
- "use the \"Save private key\" command to\n"
- "save it in PuTTY's own format.",
- key_type_to_str(realtype));
- MessageBox(NULL, msg, "PuTTYgen Notice",
- MB_OK | MB_ICONINFORMATION);
- }
- }
- burnstr(passphrase);
- }
- void add_certificate(HWND hwnd, struct MainDlgState *state,
- Filename *filename)
- {
- int type = key_type(filename);
- if (type != SSH_KEYTYPE_SSH2_PUBLIC_RFC4716 &&
- type != SSH_KEYTYPE_SSH2_PUBLIC_OPENSSH) {
- char *msg = dupprintf("Couldn't load certificate (%s)",
- key_type_to_str(type));
- message_box(hwnd, msg, "PuTTYgen Error", MB_OK | MB_ICONERROR,
- false, HELPCTXID(errors_cantloadkey));
- sfree(msg);
- return;
- }
- char *algname = NULL;
- char *comment = NULL;
- const char *error = NULL;
- strbuf *pub = strbuf_new();
- if (!ppk_loadpub_f(filename, &algname, BinarySink_UPCAST(pub), &comment,
- &error)) {
- char *msg = dupprintf("Couldn't load certificate (%s)", error);
- message_box(hwnd, msg, "PuTTYgen Error", MB_OK | MB_ICONERROR,
- false, HELPCTXID(errors_cantloadkey));
- sfree(msg);
- strbuf_free(pub);
- return;
- }
- sfree(comment);
- const ssh_keyalg *alg = find_pubkey_alg(algname);
- if (!alg) {
- char *msg = dupprintf("Couldn't load certificate (unsupported "
- "algorithm name '%s')", algname);
- message_box(hwnd, msg, "PuTTYgen Error", MB_OK | MB_ICONERROR,
- false, HELPCTXID(errors_cantloadkey));
- sfree(msg);
- sfree(algname);
- strbuf_free(pub);
- return;
- }
- sfree(algname);
- /* Check the two public keys match apart from certificates */
- strbuf *old_basepub = strbuf_new();
- ssh_key_public_blob(ssh_key_base_key(state->ssh2key.key),
- BinarySink_UPCAST(old_basepub));
- ssh_key *new_pubkey = ssh_key_new_pub(alg, ptrlen_from_strbuf(pub));
- strbuf *new_basepub = strbuf_new();
- ssh_key_public_blob(ssh_key_base_key(new_pubkey),
- BinarySink_UPCAST(new_basepub));
- ssh_key_free(new_pubkey);
- bool match = ptrlen_eq_ptrlen(ptrlen_from_strbuf(old_basepub),
- ptrlen_from_strbuf(new_basepub));
- strbuf_free(old_basepub);
- strbuf_free(new_basepub);
- if (!match) {
- char *msg = dupprintf("Certificate is for a different public key");
- message_box(hwnd, msg, "PuTTYgen Error", MB_OK | MB_ICONERROR,
- false, HELPCTXID(errors_cantloadkey));
- sfree(msg);
- strbuf_free(pub);
- return;
- }
- strbuf *priv = strbuf_new_nm();
- ssh_key_private_blob(state->ssh2key.key, BinarySink_UPCAST(priv));
- ssh_key *newkey = ssh_key_new_priv(
- alg, ptrlen_from_strbuf(pub), ptrlen_from_strbuf(priv));
- strbuf_free(pub);
- strbuf_free(priv);
- if (!newkey) {
- char *msg = dupprintf("Couldn't combine certificate with key");
- message_box(hwnd, msg, "PuTTYgen Error", MB_OK | MB_ICONERROR,
- false, HELPCTXID(errors_cantloadkey));
- sfree(msg);
- return;
- }
- ssh_key_free(state->ssh2key.key);
- state->ssh2key.key = newkey;
- update_ui_after_ssh2_pubkey_change(hwnd, state);
- ui_set_state(hwnd, state, 2);
- }
- void remove_certificate(HWND hwnd, struct MainDlgState *state)
- {
- ssh_key *newkey = ssh_key_clone(ssh_key_base_key(state->ssh2key.key));
- ssh_key_free(state->ssh2key.key);
- state->ssh2key.key = newkey;
- update_ui_after_ssh2_pubkey_change(hwnd, state);
- ui_set_state(hwnd, state, 2);
- }
- static void start_generating_key(HWND hwnd, struct MainDlgState *state)
- {
- static const char generating_msg[] =
- "Please wait while a key is generated...";
- struct rsa_key_thread_params *params;
- DWORD threadid;
- SetDlgItemText(hwnd, IDC_GENERATING, generating_msg);
- SendDlgItemMessage(hwnd, IDC_PROGRESS, PBM_SETRANGE, 0,
- MAKELPARAM(0, PROGRESSRANGE));
- SendDlgItemMessage(hwnd, IDC_PROGRESS, PBM_SETPOS, 0, 0);
- params = snew(struct rsa_key_thread_params);
- params->progressbar = GetDlgItem(hwnd, IDC_PROGRESS);
- params->dialog = hwnd;
- params->key_bits = state->key_bits;
- params->curve_bits = state->curve_bits;
- params->keytype = state->keytype;
- params->primepolicy = state->primepolicy;
- params->rsa_strong = state->rsa_strong;
- params->key = &state->key;
- params->dsakey = &state->dsakey;
- HANDLE hThread = CreateThread(NULL, 0, generate_key_thread,
- params, 0, &threadid);
- if (!hThread) {
- MessageBox(hwnd, "Out of thread resources",
- "Key generation error",
- MB_OK | MB_ICONERROR);
- sfree(params);
- } else {
- CloseHandle(hThread); /* we don't need the thread handle */
- state->generation_thread_exists = true;
- }
- }
- /*
- * Dialog-box function and context structure for the 'Certificate
- * info' button.
- */
- struct certinfo_dialog_ctx {
- SeatDialogText *text;
- };
- static INT_PTR CertInfoProc(HWND hwnd, UINT msg, WPARAM wParam,
- LPARAM lParam, void *vctx)
- {
- struct certinfo_dialog_ctx *ctx = (struct certinfo_dialog_ctx *)vctx;
- switch (msg) {
- case WM_INITDIALOG: {
- int index = 100, y = 12;
- WPARAM font = SendMessage(hwnd, WM_GETFONT, 0, 0);
- const char *key = NULL;
- for (SeatDialogTextItem *item = ctx->text->items,
- *end = item + ctx->text->nitems; item < end; item++) {
- switch (item->type) {
- case SDT_MORE_INFO_KEY:
- key = item->text;
- break;
- case SDT_MORE_INFO_VALUE_SHORT:
- case SDT_MORE_INFO_VALUE_BLOB: {
- RECT rk, rv;
- DWORD editstyle = WS_CHILD | WS_VISIBLE | WS_TABSTOP |
- ES_AUTOHSCROLL | ES_READONLY;
- if (item->type == SDT_MORE_INFO_VALUE_BLOB) {
- rk.left = 12;
- rk.right = 286;
- rk.top = y;
- rk.bottom = 8;
- y += 10;
- editstyle |= ES_MULTILINE;
- rv.left = 12;
- rv.right = 286;
- rv.top = y;
- rv.bottom = 64;
- y += 68;
- } else {
- rk.left = 12;
- rk.right = 130;
- rk.top = y+2;
- rk.bottom = 8;
- rv.left = 150;
- rv.right = 298;
- rv.top = y;
- rv.bottom = 12;
- y += 16;
- }
- MapDialogRect(hwnd, &rk);
- HWND ctl = CreateWindowEx(
- 0, "STATIC", key, WS_CHILD | WS_VISIBLE,
- rk.left, rk.top, rk.right, rk.bottom,
- hwnd, (HMENU)(ULONG_PTR)index++, hinst, NULL);
- SendMessage(ctl, WM_SETFONT, font, MAKELPARAM(true, 0));
- MapDialogRect(hwnd, &rv);
- ctl = CreateWindowEx(
- WS_EX_CLIENTEDGE, "EDIT", item->text, editstyle,
- rv.left, rv.top, rv.right, rv.bottom,
- hwnd, (HMENU)(ULONG_PTR)index++, hinst, NULL);
- SendMessage(ctl, WM_SETFONT, font, MAKELPARAM(true, 0));
- break;
- }
- default:
- break;
- }
- }
- /*
- * Now resize the overall window, and move the Close button at
- * the bottom.
- */
- RECT r;
- r.left = 176;
- r.top = y + 10;
- r.right = r.bottom = 0;
- MapDialogRect(hwnd, &r);
- HWND ctl = GetDlgItem(hwnd, IDOK);
- SetWindowPos(ctl, NULL, r.left, r.top, 0, 0,
- SWP_NOSIZE | SWP_NOREDRAW | SWP_NOZORDER);
- r.left = r.top = r.right = 0;
- r.bottom = 300;
- MapDialogRect(hwnd, &r);
- int oldheight = r.bottom;
- r.left = r.top = r.right = 0;
- r.bottom = y + 30;
- MapDialogRect(hwnd, &r);
- int newheight = r.bottom;
- GetWindowRect(hwnd, &r);
- SetWindowPos(hwnd, NULL, 0, 0, r.right - r.left,
- r.bottom - r.top + newheight - oldheight,
- SWP_NOMOVE | SWP_NOREDRAW | SWP_NOZORDER);
- ShowWindow(hwnd, SW_SHOWNORMAL);
- return 1;
- }
- case WM_COMMAND:
- switch (LOWORD(wParam)) {
- case IDOK:
- ShinyEndDialog(hwnd, 0);
- return 0;
- }
- return 0;
- case WM_CLOSE:
- ShinyEndDialog(hwnd, 0);
- return 0;
- }
- return 0;
- }
- /*
- * Dialog-box function for the main PuTTYgen dialog box.
- */
- static INT_PTR CALLBACK MainDlgProc(HWND hwnd, UINT msg,
- WPARAM wParam, LPARAM lParam)
- {
- const int DEMO_SCREENSHOT_TIMER_ID = 1230;
- static const char entropy_msg[] =
- "Please generate some randomness by moving the mouse over the blank area.";
- struct MainDlgState *state;
- switch (msg) {
- case WM_INITDIALOG:
- if (has_help())
- SetWindowLongPtr(hwnd, GWL_EXSTYLE,
- GetWindowLongPtr(hwnd, GWL_EXSTYLE) |
- WS_EX_CONTEXTHELP);
- else {
- /*
- * If we add a Help button, this is where we destroy it
- * if the help file isn't present.
- */
- }
- SendMessage(hwnd, WM_SETICON, (WPARAM) ICON_BIG,
- (LPARAM) LoadIcon(hinst, MAKEINTRESOURCE(200)));
- state = snew(struct MainDlgState);
- state->generation_thread_exists = false;
- state->entropy = NULL;
- state->key_exists = false;
- SetWindowLongPtr(hwnd, GWLP_USERDATA, (LONG_PTR) state);
- {
- HMENU menu, menu1;
- menu = CreateMenu();
- menu1 = CreateMenu();
- AppendMenu(menu1, MF_ENABLED, IDC_LOAD, "&Load private key");
- AppendMenu(menu1, MF_ENABLED, IDC_SAVEPUB, "Save p&ublic key");
- AppendMenu(menu1, MF_ENABLED, IDC_SAVE, "&Save private key");
- AppendMenu(menu1, MF_SEPARATOR, 0, 0);
- AppendMenu(menu1, MF_ENABLED, IDC_QUIT, "E&xit");
- AppendMenu(menu, MF_POPUP | MF_ENABLED, (UINT_PTR) menu1, "&File");
- state->filemenu = menu1;
- menu1 = CreateMenu();
- AppendMenu(menu1, MF_ENABLED, IDC_GENERATE, "&Generate key pair");
- AppendMenu(menu1, MF_SEPARATOR, 0, 0);
- AppendMenu(menu1, MF_ENABLED, IDC_ADDCERT,
- "Add &certificate to key");
- AppendMenu(menu1, MF_ENABLED, IDC_REMCERT,
- "Remove certificate from key");
- AppendMenu(menu1, MF_SEPARATOR, 0, 0);
- AppendMenu(menu1, MF_ENABLED, IDC_KEYSSH1, "SSH-&1 key (RSA)");
- AppendMenu(menu1, MF_ENABLED, IDC_KEYSSH2RSA, "SSH-2 &RSA key");
- AppendMenu(menu1, MF_ENABLED, IDC_KEYSSH2DSA, "SSH-2 &DSA key");
- AppendMenu(menu1, MF_ENABLED, IDC_KEYSSH2ECDSA, "SSH-2 &ECDSA key");
- AppendMenu(menu1, MF_ENABLED, IDC_KEYSSH2EDDSA, "SSH-2 EdD&SA key");
- AppendMenu(menu1, MF_SEPARATOR, 0, 0);
- AppendMenu(menu1, MF_ENABLED, IDC_PRIMEGEN_PROB,
- "Use probable primes (fast)");
- AppendMenu(menu1, MF_ENABLED, IDC_PRIMEGEN_MAURER_SIMPLE,
- "Use proven primes (slower)");
- AppendMenu(menu1, MF_ENABLED, IDC_PRIMEGEN_MAURER_COMPLEX,
- "Use proven primes with even distribution (slowest)");
- AppendMenu(menu1, MF_SEPARATOR, 0, 0);
- AppendMenu(menu1, MF_ENABLED, IDC_RSA_STRONG,
- "Use \"strong\" primes as RSA key factors");
- AppendMenu(menu1, MF_SEPARATOR, 0, 0);
- AppendMenu(menu1, MF_ENABLED, IDC_PPK_PARAMS,
- "Parameters for saving key files...");
- AppendMenu(menu1, MF_SEPARATOR, 0, 0);
- AppendMenu(menu1, MF_ENABLED, IDC_FPTYPE_SHA256,
- "Show fingerprint as SHA256");
- AppendMenu(menu1, MF_ENABLED, IDC_FPTYPE_MD5,
- "Show fingerprint as MD5");
- AppendMenu(menu, MF_POPUP | MF_ENABLED, (UINT_PTR) menu1, "&Key");
- state->keymenu = menu1;
- menu1 = CreateMenu();
- AppendMenu(menu1, MF_ENABLED, IDC_IMPORT, "&Import key");
- AppendMenu(menu1, MF_SEPARATOR, 0, 0);
- AppendMenu(menu1, MF_ENABLED, IDC_EXPORT_OPENSSH_AUTO,
- "Export &OpenSSH key");
- AppendMenu(menu1, MF_ENABLED, IDC_EXPORT_OPENSSH_NEW,
- "Export &OpenSSH key (force new file format)");
- AppendMenu(menu1, MF_ENABLED, IDC_EXPORT_SSHCOM,
- "Export &ssh.com key");
- AppendMenu(menu, MF_POPUP | MF_ENABLED, (UINT_PTR) menu1,
- "Con&versions");
- state->cvtmenu = menu1;
- menu1 = CreateMenu();
- AppendMenu(menu1, MF_ENABLED, IDC_ABOUT, "&About");
- if (has_help())
- AppendMenu(menu1, MF_ENABLED, IDC_GIVEHELP, "&Help");
- AppendMenu(menu, MF_POPUP | MF_ENABLED, (UINT_PTR) menu1, "&Help");
- SetMenu(hwnd, menu);
- }
- /*
- * Centre the window.
- */
- { /* centre the window */
- RECT rs, rd;
- HWND hw;
- hw = GetDesktopWindow();
- if (GetWindowRect(hw, &rs) && GetWindowRect(hwnd, &rd))
- MoveWindow(hwnd,
- (rs.right + rs.left + rd.left - rd.right) / 2,
- (rs.bottom + rs.top + rd.top - rd.bottom) / 2,
- rd.right - rd.left, rd.bottom - rd.top, true);
- }
- {
- struct ctlpos cp, cp2;
- int ymax;
- /* Accelerators used: acglops1rbvde */
- ctlposinit(&cp, hwnd, 4, 4, 4);
- beginbox(&cp, "Key", IDC_BOX_KEY);
- cp2 = cp;
- statictext(&cp2, "No key.", 1, IDC_NOKEY);
- cp2 = cp;
- statictext(&cp2, "", 1, IDC_GENERATING);
- progressbar(&cp2, IDC_PROGRESS);
- cp2 = cp;
- bigeditctrl(&cp2, NULL, -1, IDC_CERTSTATIC, 3);
- {
- HWND child = GetDlgItem(hwnd, IDC_CERTSTATIC);
- LONG_PTR style = GetWindowLongPtr(child, GWL_STYLE);
- style &= ~WS_VSCROLL;
- SetWindowLongPtr(child, GWL_STYLE, style);
- SendMessage(child, EM_SETREADONLY, true, 0);
- }
- MakeDlgItemBorderless(hwnd, IDC_CERTSTATIC);
- cp2.xoff = cp2.width = cp2.width / 3;
- button(&cp2, "Certificate info...", IDC_CERTMOREINFO, false);
- bigeditctrl(&cp,
- "&Public key for pasting into authorized_keys file:",
- IDC_PKSTATIC, IDC_KEYDISPLAY, 5);
- SendDlgItemMessage(hwnd, IDC_KEYDISPLAY, EM_SETREADONLY, 1, 0);
- staticedit(&cp, "Key f&ingerprint:", IDC_FPSTATIC,
- IDC_FINGERPRINT, 82);
- SendDlgItemMessage(hwnd, IDC_FINGERPRINT, EM_SETREADONLY, 1,
- 0);
- staticedit(&cp, "Key &comment:", IDC_COMMENTSTATIC,
- IDC_COMMENTEDIT, 82);
- staticpassedit(&cp, "Key p&assphrase:", IDC_PASSPHRASE1STATIC,
- IDC_PASSPHRASE1EDIT, 82);
- staticpassedit(&cp, "C&onfirm passphrase:",
- IDC_PASSPHRASE2STATIC, IDC_PASSPHRASE2EDIT, 82);
- endbox(&cp);
- beginbox(&cp, "Actions", IDC_BOX_ACTIONS);
- staticbtn(&cp, "Generate a public/private key pair",
- IDC_GENSTATIC, "&Generate", IDC_GENERATE);
- staticbtn(&cp, "Load an existing private key file",
- IDC_LOADSTATIC, "&Load", IDC_LOAD);
- static2btn(&cp, "Save the generated key", IDC_SAVESTATIC,
- "Save p&ublic key", IDC_SAVEPUB,
- "&Save private key", IDC_SAVE);
- endbox(&cp);
- beginbox(&cp, "Parameters", IDC_BOX_PARAMS);
- radioline(&cp, "Type of key to generate:", IDC_TYPESTATIC, 5,
- "&RSA", IDC_KEYSSH2RSA,
- "&DSA", IDC_KEYSSH2DSA,
- "&ECDSA", IDC_KEYSSH2ECDSA,
- "EdD&SA", IDC_KEYSSH2EDDSA,
- "SSH-&1 (RSA)", IDC_KEYSSH1,
- NULL);
- cp2 = cp;
- staticedit(&cp2, "Number of &bits in a generated key:",
- IDC_BITSSTATIC, IDC_BITS, 20);
- ymax = cp2.ypos;
- cp2 = cp;
- staticddl(&cp2, "Cur&ve to use for generating this key:",
- IDC_ECCURVESTATIC, IDC_ECCURVE, 30);
- SendDlgItemMessage(hwnd, IDC_ECCURVE, CB_RESETCONTENT, 0, 0);
- {
- int i, bits;
- const struct ec_curve *curve;
- const ssh_keyalg *alg;
- for (i = 0; i < n_ec_nist_curve_lengths; i++) {
- bits = ec_nist_curve_lengths[i];
- ec_nist_alg_and_curve_by_bits(bits, &curve, &alg);
- SendDlgItemMessage(hwnd, IDC_ECCURVE, CB_ADDSTRING, 0,
- (LPARAM)curve->textname);
- }
- }
- ymax = ymax > cp2.ypos ? ymax : cp2.ypos;
- cp2 = cp;
- staticddl(&cp2, "Cur&ve to use for generating this key:",
- IDC_EDCURVESTATIC, IDC_EDCURVE, 30);
- SendDlgItemMessage(hwnd, IDC_EDCURVE, CB_RESETCONTENT, 0, 0);
- {
- int i, bits;
- const struct ec_curve *curve;
- const ssh_keyalg *alg;
- for (i = 0; i < n_ec_ed_curve_lengths; i++) {
- bits = ec_ed_curve_lengths[i];
- ec_ed_alg_and_curve_by_bits(bits, &curve, &alg);
- char *desc = dupprintf("%s (%d bits)",
- curve->textname, bits);
- SendDlgItemMessage(hwnd, IDC_EDCURVE, CB_ADDSTRING, 0,
- (LPARAM)desc);
- sfree(desc);
- }
- }
- ymax = ymax > cp2.ypos ? ymax : cp2.ypos;
- cp2 = cp;
- statictext(&cp2, "(nothing to configure for this key type)",
- 1, IDC_NOTHINGSTATIC);
- ymax = ymax > cp2.ypos ? ymax : cp2.ypos;
- cp.ypos = ymax;
- endbox(&cp);
- }
- struct InitialParams *params = (struct InitialParams *)lParam;
- ui_set_key_type(hwnd, state, params->keybutton);
- ui_set_primepolicy(hwnd, state, params->primepolicybutton);
- ui_set_rsa_strong(hwnd, state, params->rsa_strong);
- ui_set_fptype(hwnd, state, fptype_to_idc(params->fptype));
- SetDlgItemInt(hwnd, IDC_BITS, params->keybits, false);
- SendDlgItemMessage(hwnd, IDC_ECCURVE, CB_SETCURSEL,
- params->eccurve_index, 0);
- SendDlgItemMessage(hwnd, IDC_EDCURVE, CB_SETCURSEL,
- params->edcurve_index, 0);
- /*
- * Initially, hide the progress bar and the key display,
- * and show the no-key display. Also disable the Save
- * buttons, because with no key we obviously can't save
- * anything.
- */
- ui_set_state(hwnd, state, 0);
- /*
- * Load a key file if one was provided on the command line.
- */
- if (cmdline_keyfile) {
- Filename *fn = filename_from_str(cmdline_keyfile);
- load_key_file(hwnd, state, fn, false);
- filename_free(fn);
- } else if (cmdline_demo_keystr.ptr) {
- BinarySource src[1];
- BinarySource_BARE_INIT_PL(src, cmdline_demo_keystr);
- const char *errmsg;
- ssh2_userkey *k = ppk_load_s(src, NULL, &errmsg);
- assert(!errmsg);
- update_ui_after_load(hwnd, state, "demo passphrase",
- SSH_KEYTYPE_SSH2, NULL, k);
- SetTimer(hwnd, DEMO_SCREENSHOT_TIMER_ID, TICKSPERSEC, NULL);
- }
- return 1;
- case WM_TIMER:
- if ((UINT_PTR)wParam == DEMO_SCREENSHOT_TIMER_ID) {
- KillTimer(hwnd, DEMO_SCREENSHOT_TIMER_ID);
- char *err = save_screenshot(hwnd, demo_screenshot_filename);
- if (err) {
- MessageBox(hwnd, err, "Demo screenshot failure",
- MB_OK | MB_ICONERROR);
- sfree(err);
- }
- EndDialog(hwnd, 0);
- }
- return 0;
- case WM_MOUSEMOVE:
- state = (struct MainDlgState *) GetWindowLongPtr(hwnd, GWLP_USERDATA);
- if (state->entropy && state->entropy_got < state->entropy_required) {
- ULONG msgtime = GetMessageTime();
- put_uint32(state->entropy, lParam);
- put_uint32(state->entropy, msgtime);
- if (msgtime - state->entropy_prev_msgtime > ENTROPY_RATE_LIMIT) {
- state->entropy_got += 2;
- state->entropy_prev_msgtime = msgtime;
- }
- SendDlgItemMessage(hwnd, IDC_PROGRESS, PBM_SETPOS,
- state->entropy_got, 0);
- if (state->entropy_got >= state->entropy_required) {
- /*
- * Seed the entropy pool
- */
- random_reseed(ptrlen_from_strbuf(state->entropy));
- strbuf_free(state->entropy);
- state->entropy = NULL;
- start_generating_key(hwnd, state);
- }
- }
- break;
- case WM_COMMAND:
- switch (LOWORD(wParam)) {
- case IDC_KEYSSH1:
- case IDC_KEYSSH2RSA:
- case IDC_KEYSSH2DSA:
- case IDC_KEYSSH2ECDSA:
- case IDC_KEYSSH2EDDSA: {
- state = (struct MainDlgState *)
- GetWindowLongPtr(hwnd, GWLP_USERDATA);
- ui_set_key_type(hwnd, state, LOWORD(wParam));
- break;
- }
- case IDC_PRIMEGEN_PROB:
- case IDC_PRIMEGEN_MAURER_SIMPLE:
- case IDC_PRIMEGEN_MAURER_COMPLEX: {
- state = (struct MainDlgState *)
- GetWindowLongPtr(hwnd, GWLP_USERDATA);
- ui_set_primepolicy(hwnd, state, LOWORD(wParam));
- break;
- }
- case IDC_FPTYPE_SHA256:
- case IDC_FPTYPE_MD5: {
- state = (struct MainDlgState *)
- GetWindowLongPtr(hwnd, GWLP_USERDATA);
- ui_set_fptype(hwnd, state, LOWORD(wParam));
- break;
- }
- case IDC_RSA_STRONG: {
- state = (struct MainDlgState *)
- GetWindowLongPtr(hwnd, GWLP_USERDATA);
- ui_set_rsa_strong(hwnd, state, !state->rsa_strong);
- break;
- }
- case IDC_PPK_PARAMS: {
- struct PPKParams pp[1];
- pp->params = save_params;
- if (pp->params.argon2_passes_auto) {
- pp->time_ms = pp->params.argon2_milliseconds;
- pp->time_passes = 13;
- } else {
- pp->time_ms = 100;
- pp->time_passes = pp->params.argon2_passes;
- }
- int dlgret = DialogBoxParam(hinst, MAKEINTRESOURCE(215),
- NULL, PPKParamsProc, (LPARAM)pp);
- if (dlgret) {
- if (pp->params.argon2_passes_auto) {
- pp->params.argon2_milliseconds = pp->time_ms;
- } else {
- pp->params.argon2_passes = pp->time_passes;
- }
- save_params = pp->params;
- }
- break;
- }
- case IDC_QUIT:
- PostMessage(hwnd, WM_CLOSE, 0, 0);
- break;
- case IDC_COMMENTEDIT:
- if (HIWORD(wParam) == EN_CHANGE) {
- state = (struct MainDlgState *)
- GetWindowLongPtr(hwnd, GWLP_USERDATA);
- if (state->key_exists) {
- HWND editctl = GetDlgItem(hwnd, IDC_COMMENTEDIT);
- int len = GetWindowTextLength(editctl);
- if (*state->commentptr)
- sfree(*state->commentptr);
- *state->commentptr = snewn(len + 1, char);
- GetWindowText(editctl, *state->commentptr, len + 1);
- if (state->ssh2) {
- setupbigedit2(hwnd, &state->ssh2key);
- } else {
- setupbigedit1(hwnd, &state->key);
- }
- }
- }
- break;
- case IDC_ABOUT:
- EnableWindow(hwnd, 0);
- DialogBox(hinst, MAKEINTRESOURCE(213), hwnd, AboutProc);
- EnableWindow(hwnd, 1);
- SetActiveWindow(hwnd);
- return 0;
- case IDC_GIVEHELP:
- if (HIWORD(wParam) == BN_CLICKED ||
- HIWORD(wParam) == BN_DOUBLECLICKED) {
- launch_help(hwnd, WINHELP_CTX_puttygen_general);
- }
- return 0;
- case IDC_GENERATE:
- if (HIWORD(wParam) != BN_CLICKED &&
- HIWORD(wParam) != BN_DOUBLECLICKED)
- break;
- state =
- (struct MainDlgState *) GetWindowLongPtr(hwnd, GWLP_USERDATA);
- if (!state->generation_thread_exists) {
- unsigned raw_entropy_required;
- unsigned char *raw_entropy_buf;
- BOOL ok;
- state->key_bits = GetDlgItemInt(hwnd, IDC_BITS, &ok, false);
- if (!ok)
- state->key_bits = DEFAULT_KEY_BITS;
- state->ssh2 = true;
- if (IsDlgButtonChecked(hwnd, IDC_KEYSSH1)) {
- state->ssh2 = false;
- state->keytype = RSA;
- } else if (IsDlgButtonChecked(hwnd, IDC_KEYSSH2RSA)) {
- state->keytype = RSA;
- } else if (IsDlgButtonChecked(hwnd, IDC_KEYSSH2DSA)) {
- state->keytype = DSA;
- } else if (IsDlgButtonChecked(hwnd, IDC_KEYSSH2ECDSA)) {
- state->keytype = ECDSA;
- int curveindex = SendDlgItemMessage(hwnd, IDC_ECCURVE,
- CB_GETCURSEL, 0, 0);
- assert(curveindex >= 0);
- assert(curveindex < n_ec_nist_curve_lengths);
- state->curve_bits = ec_nist_curve_lengths[curveindex];
- } else if (IsDlgButtonChecked(hwnd, IDC_KEYSSH2EDDSA)) {
- state->keytype = EDDSA;
- int curveindex = SendDlgItemMessage(hwnd, IDC_EDCURVE,
- CB_GETCURSEL, 0, 0);
- assert(curveindex >= 0);
- assert(curveindex < n_ec_ed_curve_lengths);
- state->curve_bits = ec_ed_curve_lengths[curveindex];
- } else {
- /* Somehow, no button was checked */
- break;
- }
- if ((state->keytype == RSA || state->keytype == DSA) &&
- state->key_bits < 256) {
- char *message = dupprintf(
- "PuTTYgen will not generate a key smaller than 256"
- " bits.\nKey length reset to default %d. Continue?",
- DEFAULT_KEY_BITS);
- int ret = MessageBox(hwnd, message, "PuTTYgen Warning",
- MB_ICONWARNING | MB_OKCANCEL);
- sfree(message);
- if (ret != IDOK)
- break;
- state->key_bits = DEFAULT_KEY_BITS;
- SetDlgItemInt(hwnd, IDC_BITS, DEFAULT_KEY_BITS, false);
- } else if ((state->keytype == RSA || state->keytype == DSA) &&
- state->key_bits < DEFAULT_KEY_BITS) {
- char *message = dupprintf(
- "Keys shorter than %d bits are not recommended. "
- "Really generate this key?", DEFAULT_KEY_BITS);
- int ret = MessageBox(hwnd, message, "PuTTYgen Warning",
- MB_ICONWARNING | MB_OKCANCEL);
- sfree(message);
- if (ret != IDOK)
- break;
- }
- if (state->keytype == RSA || state->keytype == DSA)
- raw_entropy_required = (state->key_bits / 2) * 2;
- else if (state->keytype == ECDSA || state->keytype == EDDSA)
- raw_entropy_required = (state->curve_bits / 2) * 2;
- else
- unreachable("we must have initialised keytype by now");
- /* Bound the entropy collection above by the amount of
- * data we can actually fit into the PRNG. Any more
- * than that and it's doing no more good. */
- if (raw_entropy_required > random_seed_bits())
- raw_entropy_required = random_seed_bits();
- raw_entropy_buf = snewn(raw_entropy_required, unsigned char);
- if (win_read_random(raw_entropy_buf, raw_entropy_required)) {
- /*
- * If we can get entropy from CryptGenRandom, use
- * it. But CryptGenRandom isn't a kernel-level
- * CPRNG (according to Wikipedia), and papers have
- * been published cryptanalysing it. So we'll
- * still do manual entropy collection; we'll just
- * do it _as well_ as this.
- */
- random_reseed(
- make_ptrlen(raw_entropy_buf, raw_entropy_required));
- }
- /*
- * Manual entropy input, by making the user wave the
- * mouse over the window a lot.
- *
- * My brief statistical tests on mouse movements
- * suggest that there are about 2.5 bits of randomness
- * in the x position, 2.5 in the y position, and 1.7
- * in the message time, making 5.7 bits of
- * unpredictability per mouse movement. However, other
- * people have told me it's far less than that, so I'm
- * going to be stupidly cautious and knock that down
- * to a nice round 2. With this method, we require two
- * words per mouse movement, so with 2 bits per mouse
- * movement we expect 2 bits every 2 words, i.e. the
- * number of _words_ of mouse data we want to collect
- * is just the same as the number of _bits_ of entropy
- * we want.
- */
- state->entropy_required = raw_entropy_required;
- ui_set_state(hwnd, state, 1);
- SetDlgItemText(hwnd, IDC_GENERATING, entropy_msg);
- state->key_exists = false;
- state->entropy_got = 0;
- state->entropy = strbuf_new_nm();
- state->entropy_prev_msgtime = GetMessageTime();
- SendDlgItemMessage(hwnd, IDC_PROGRESS, PBM_SETRANGE, 0,
- MAKELPARAM(0, state->entropy_required));
- SendDlgItemMessage(hwnd, IDC_PROGRESS, PBM_SETPOS, 0, 0);
- smemclr(raw_entropy_buf, raw_entropy_required);
- sfree(raw_entropy_buf);
- }
- break;
- case IDC_SAVE:
- case IDC_EXPORT_OPENSSH_AUTO:
- case IDC_EXPORT_OPENSSH_NEW:
- case IDC_EXPORT_SSHCOM:
- if (HIWORD(wParam) != BN_CLICKED)
- break;
- state =
- (struct MainDlgState *) GetWindowLongPtr(hwnd, GWLP_USERDATA);
- if (state->key_exists) {
- char filename[FILENAME_MAX];
- char *passphrase, *passphrase2;
- int type, realtype;
- if (state->ssh2)
- realtype = SSH_KEYTYPE_SSH2;
- else
- realtype = SSH_KEYTYPE_SSH1;
- if (LOWORD(wParam) == IDC_EXPORT_OPENSSH_AUTO)
- type = SSH_KEYTYPE_OPENSSH_AUTO;
- else if (LOWORD(wParam) == IDC_EXPORT_OPENSSH_NEW)
- type = SSH_KEYTYPE_OPENSSH_NEW;
- else if (LOWORD(wParam) == IDC_EXPORT_SSHCOM)
- type = SSH_KEYTYPE_SSHCOM;
- else
- type = realtype;
- if (type != realtype &&
- import_target_type(type) != realtype) {
- char msg[256];
- sprintf(msg, "Cannot export an SSH-%d key in an SSH-%d"
- " format", (state->ssh2 ? 2 : 1),
- (state->ssh2 ? 1 : 2));
- MessageBox(hwnd, msg,
- "PuTTYgen Error", MB_OK | MB_ICONERROR);
- break;
- }
- passphrase = GetDlgItemText_alloc(hwnd, IDC_PASSPHRASE1EDIT);
- passphrase2 = GetDlgItemText_alloc(hwnd, IDC_PASSPHRASE2EDIT);
- if (strcmp(passphrase, passphrase2)) {
- MessageBox(hwnd,
- "The two passphrases given do not match.",
- "PuTTYgen Error", MB_OK | MB_ICONERROR);
- burnstr(passphrase);
- burnstr(passphrase2);
- break;
- }
- burnstr(passphrase2);
- if (!*passphrase) {
- int ret;
- ret = MessageBox(hwnd,
- "Are you sure you want to save this key\n"
- "without a passphrase to protect it?",
- "PuTTYgen Warning",
- MB_YESNO | MB_ICONWARNING);
- if (ret != IDYES) {
- burnstr(passphrase);
- break;
- }
- }
- if (prompt_keyfile(hwnd, "Save private key as:",
- filename, true, (type == realtype))) {
- int ret;
- FILE *fp = fopen(filename, "r");
- if (fp) {
- char *buffer;
- fclose(fp);
- buffer = dupprintf("Overwrite existing file\n%s?",
- filename);
- ret = MessageBox(hwnd, buffer, "PuTTYgen Warning",
- MB_YESNO | MB_ICONWARNING);
- sfree(buffer);
- if (ret != IDYES) {
- burnstr(passphrase);
- break;
- }
- }
- if (state->ssh2) {
- Filename *fn = filename_from_str(filename);
- if (type != realtype)
- ret = export_ssh2(fn, type, &state->ssh2key,
- *passphrase ? passphrase : NULL);
- else
- ret = ppk_save_f(fn, &state->ssh2key,
- *passphrase ? passphrase : NULL,
- &save_params);
- filename_free(fn);
- } else {
- Filename *fn = filename_from_str(filename);
- if (type != realtype)
- ret = export_ssh1(fn, type, &state->key,
- *passphrase ? passphrase : NULL);
- else
- ret = rsa1_save_f(fn, &state->key,
- *passphrase ? passphrase : NULL);
- filename_free(fn);
- }
- if (ret <= 0) {
- MessageBox(hwnd, "Unable to save key file",
- "PuTTYgen Error", MB_OK | MB_ICONERROR);
- }
- }
- burnstr(passphrase);
- }
- break;
- case IDC_SAVEPUB:
- if (HIWORD(wParam) != BN_CLICKED)
- break;
- state =
- (struct MainDlgState *) GetWindowLongPtr(hwnd, GWLP_USERDATA);
- if (state->key_exists) {
- char filename[FILENAME_MAX];
- if (prompt_keyfile(hwnd, "Save public key as:",
- filename, true, false)) {
- int ret;
- FILE *fp = fopen(filename, "r");
- if (fp) {
- char *buffer;
- fclose(fp);
- buffer = dupprintf("Overwrite existing file\n%s?",
- filename);
- ret = MessageBox(hwnd, buffer, "PuTTYgen Warning",
- MB_YESNO | MB_ICONWARNING);
- sfree(buffer);
- if (ret != IDYES)
- break;
- }
- fp = fopen(filename, "w");
- if (!fp) {
- MessageBox(hwnd, "Unable to open key file",
- "PuTTYgen Error", MB_OK | MB_ICONERROR);
- } else {
- if (state->ssh2) {
- strbuf *blob = strbuf_new();
- ssh_key_public_blob(
- state->ssh2key.key, BinarySink_UPCAST(blob));
- ssh2_write_pubkey(fp, state->ssh2key.comment,
- blob->u, blob->len,
- SSH_KEYTYPE_SSH2_PUBLIC_RFC4716);
- strbuf_free(blob);
- } else {
- ssh1_write_pubkey(fp, &state->key);
- }
- if (fclose(fp) < 0) {
- MessageBox(hwnd, "Unable to save key file",
- "PuTTYgen Error", MB_OK | MB_ICONERROR);
- }
- }
- }
- }
- break;
- case IDC_LOAD:
- case IDC_IMPORT:
- if (HIWORD(wParam) != BN_CLICKED)
- break;
- state =
- (struct MainDlgState *) GetWindowLongPtr(hwnd, GWLP_USERDATA);
- if (!state->generation_thread_exists) {
- char filename[FILENAME_MAX];
- if (prompt_keyfile(hwnd, "Load private key:", filename, false,
- LOWORD(wParam) == IDC_LOAD)) {
- Filename *fn = filename_from_str(filename);
- load_key_file(hwnd, state, fn, LOWORD(wParam) != IDC_LOAD);
- filename_free(fn);
- }
- }
- break;
- case IDC_ADDCERT:
- if (HIWORD(wParam) != BN_CLICKED)
- break;
- state =
- (struct MainDlgState *) GetWindowLongPtr(hwnd, GWLP_USERDATA);
- if (state->key_exists && !state->generation_thread_exists) {
- char filename[FILENAME_MAX];
- if (prompt_keyfile(hwnd, "Load certificate:", filename, false,
- false)) {
- Filename *fn = filename_from_str(filename);
- add_certificate(hwnd, state, fn);
- filename_free(fn);
- }
- }
- break;
- case IDC_REMCERT:
- if (HIWORD(wParam) != BN_CLICKED)
- break;
- state =
- (struct MainDlgState *) GetWindowLongPtr(hwnd, GWLP_USERDATA);
- if (state->key_exists && !state->generation_thread_exists) {
- remove_certificate(hwnd, state);
- }
- break;
- case IDC_CERTMOREINFO: {
- if (HIWORD(wParam) != BN_CLICKED)
- break;
- state =
- (struct MainDlgState *) GetWindowLongPtr(hwnd, GWLP_USERDATA);
- if (!state->key_exists || !state->ssh2 || !state->ssh2key.key)
- break;
- if (!ssh_key_alg(state->ssh2key.key)->is_certificate)
- break;
- struct certinfo_dialog_ctx ctx[1];
- ctx->text = ssh_key_cert_info(state->ssh2key.key);
- ShinyDialogBox(hinst, MAKEINTRESOURCE(216),
- "PuTTYgenCertInfo", hwnd, CertInfoProc, ctx);
- seat_dialog_text_free(ctx->text);
- break;
- }
- }
- return 0;
- case WM_DONEKEY:
- state = (struct MainDlgState *) GetWindowLongPtr(hwnd, GWLP_USERDATA);
- state->generation_thread_exists = false;
- state->key_exists = true;
- SendDlgItemMessage(hwnd, IDC_PROGRESS, PBM_SETRANGE, 0,
- MAKELPARAM(0, PROGRESSRANGE));
- SendDlgItemMessage(hwnd, IDC_PROGRESS, PBM_SETPOS, PROGRESSRANGE, 0);
- if (state->ssh2) {
- if (state->keytype == DSA) {
- state->ssh2key.key = &state->dsakey.sshk;
- } else if (state->keytype == ECDSA) {
- state->ssh2key.key = &state->eckey.sshk;
- } else if (state->keytype == EDDSA) {
- state->ssh2key.key = &state->edkey.sshk;
- } else {
- state->ssh2key.key = &state->key.sshk;
- }
- state->commentptr = &state->ssh2key.comment;
- } else {
- state->commentptr = &state->key.comment;
- }
- /*
- * Invent a comment for the key. We'll do this by including
- * the date in it. This will be so horrifyingly ugly that
- * the user will immediately want to change it, which is
- * what we want :-)
- */
- *state->commentptr = snewn(30, char);
- {
- struct tm tm;
- tm = ltime();
- if (state->keytype == DSA)
- strftime(*state->commentptr, 30, "dsa-key-%Y%m%d", &tm);
- else if (state->keytype == ECDSA)
- strftime(*state->commentptr, 30, "ecdsa-key-%Y%m%d", &tm);
- else if (state->keytype == EDDSA)
- strftime(*state->commentptr, 30, "eddsa-key-%Y%m%d", &tm);
- else
- strftime(*state->commentptr, 30, "rsa-key-%Y%m%d", &tm);
- }
- /*
- * Now update the key controls with all the key data.
- */
- {
- char *fp, *savecomment;
- /*
- * Blank passphrase, initially. This isn't dangerous,
- * because we will warn (Are You Sure?) before allowing
- * the user to save an unprotected private key.
- */
- SetDlgItemText(hwnd, IDC_PASSPHRASE1EDIT, "");
- SetDlgItemText(hwnd, IDC_PASSPHRASE2EDIT, "");
- /*
- * Set the comment.
- */
- SetDlgItemText(hwnd, IDC_COMMENTEDIT, *state->commentptr);
- /*
- * Set the key fingerprint.
- */
- savecomment = *state->commentptr;
- *state->commentptr = NULL;
- if (state->ssh2)
- fp = ssh2_fingerprint(state->ssh2key.key, state->fptype);
- else
- fp = rsa_ssh1_fingerprint(&state->key);
- SetDlgItemText(hwnd, IDC_FINGERPRINT, fp);
- sfree(fp);
- *state->commentptr = savecomment;
- /*
- * Construct a decimal representation of the key, for
- * pasting into .ssh/authorized_keys or
- * .ssh/authorized_keys2 on a Unix box.
- */
- if (state->ssh2) {
- setupbigedit2(hwnd, &state->ssh2key);
- } else {
- setupbigedit1(hwnd, &state->key);
- }
- }
- /*
- * Finally, hide the progress bar and show the key data.
- */
- ui_set_state(hwnd, state, 2);
- break;
- case WM_HELP: {
- int id = ((LPHELPINFO)lParam)->iCtrlId;
- const char *topic = NULL;
- switch (id) {
- case IDC_GENERATING:
- case IDC_PROGRESS:
- case IDC_GENSTATIC:
- case IDC_GENERATE:
- topic = WINHELP_CTX_puttygen_generate; break;
- case IDC_PKSTATIC:
- case IDC_KEYDISPLAY:
- topic = WINHELP_CTX_puttygen_pastekey; break;
- case IDC_FPSTATIC:
- case IDC_FINGERPRINT:
- topic = WINHELP_CTX_puttygen_fingerprint; break;
- case IDC_COMMENTSTATIC:
- case IDC_COMMENTEDIT:
- topic = WINHELP_CTX_puttygen_comment; break;
- case IDC_PASSPHRASE1STATIC:
- case IDC_PASSPHRASE1EDIT:
- case IDC_PASSPHRASE2STATIC:
- case IDC_PASSPHRASE2EDIT:
- topic = WINHELP_CTX_puttygen_passphrase; break;
- case IDC_LOADSTATIC:
- case IDC_LOAD:
- topic = WINHELP_CTX_puttygen_load; break;
- case IDC_SAVESTATIC:
- case IDC_SAVE:
- topic = WINHELP_CTX_puttygen_savepriv; break;
- case IDC_SAVEPUB:
- topic = WINHELP_CTX_puttygen_savepub; break;
- case IDC_TYPESTATIC:
- case IDC_KEYSSH1:
- case IDC_KEYSSH2RSA:
- case IDC_KEYSSH2DSA:
- case IDC_KEYSSH2ECDSA:
- case IDC_KEYSSH2EDDSA:
- topic = WINHELP_CTX_puttygen_keytype; break;
- case IDC_BITSSTATIC:
- case IDC_BITS:
- topic = WINHELP_CTX_puttygen_bits; break;
- case IDC_IMPORT:
- case IDC_EXPORT_OPENSSH_AUTO:
- case IDC_EXPORT_OPENSSH_NEW:
- case IDC_EXPORT_SSHCOM:
- topic = WINHELP_CTX_puttygen_conversions; break;
- }
- if (topic) {
- launch_help(hwnd, topic);
- } else {
- MessageBeep(0);
- }
- break;
- }
- case WM_CLOSE:
- state = (struct MainDlgState *) GetWindowLongPtr(hwnd, GWLP_USERDATA);
- sfree(state);
- quit_help(hwnd);
- EndDialog(hwnd, 1);
- return 0;
- }
- return 0;
- }
- void cleanup_exit(int code)
- {
- shutdown_help();
- exit(code);
- }
- HINSTANCE hinst;
- static NORETURN void opt_error(const char *fmt, ...)
- {
- va_list ap;
- va_start(ap, fmt);
- char *msg = dupvprintf(fmt, ap);
- va_end(ap);
- MessageBox(NULL, msg, "PuTTYgen command line error", MB_ICONERROR | MB_OK);
- exit(1);
- }
- int WINAPI WinMain(HINSTANCE inst, HINSTANCE prev, LPSTR cmdline, int show)
- {
- int argc;
- char **argv;
- int ret;
- struct InitialParams params[1];
- dll_hijacking_protection();
- init_common_controls();
- hinst = inst;
- /*
- * See if we can find our Help file.
- */
- init_help();
- params->keybutton = IDC_KEYSSH2RSA;
- params->primepolicybutton = IDC_PRIMEGEN_PROB;
- params->rsa_strong = false;
- params->fptype = SSH_FPTYPE_DEFAULT;
- params->keybits = DEFAULT_KEY_BITS;
- params->eccurve_index = DEFAULT_ECCURVE_INDEX;
- params->edcurve_index = DEFAULT_EDCURVE_INDEX;
- save_params = ppk_save_default_parameters;
- split_into_argv(cmdline, false, &argc, &argv, NULL);
- int argbits = -1;
- AuxMatchOpt amo = aux_match_opt_init(argc, argv, 0, opt_error);
- while (!aux_match_done(&amo)) {
- char *val;
- #define match_opt(...) aux_match_opt( \
- &amo, NULL, __VA_ARGS__, (const char *)NULL)
- #define match_optval(...) aux_match_opt( \
- &amo, &val, __VA_ARGS__, (const char *)NULL)
- if (aux_match_arg(&amo, &val)) {
- if (!cmdline_keyfile) {
- /*
- * Assume the first argument to be a private key file, and
- * attempt to load it.
- */
- cmdline_keyfile = val;
- continue;
- } else {
- opt_error("unexpected extra argument '%s'\n", val);
- }
- } else if (match_opt("-pgpfp")) {
- pgp_fingerprints_msgbox(NULL);
- return 1;
- } else if (match_opt("-restrict-acl", "-restrict_acl",
- "-restrictacl")) {
- restrict_process_acl();
- } else if (match_optval("-t")) {
- if (!strcmp(val, "rsa") || !strcmp(val, "rsa2")) {
- params->keybutton = IDC_KEYSSH2RSA;
- } else if (!strcmp(val, "rsa1")) {
- params->keybutton = IDC_KEYSSH1;
- } else if (!strcmp(val, "dsa") || !strcmp(val, "dss")) {
- params->keybutton = IDC_KEYSSH2DSA;
- } else if (!strcmp(val, "ecdsa")) {
- params->keybutton = IDC_KEYSSH2ECDSA;
- } else if (!strcmp(val, "eddsa")) {
- params->keybutton = IDC_KEYSSH2EDDSA;
- } else if (!strcmp(val, "ed25519")) {
- params->keybutton = IDC_KEYSSH2EDDSA;
- argbits = 255;
- } else if (!strcmp(val, "ed448")) {
- params->keybutton = IDC_KEYSSH2EDDSA;
- argbits = 448;
- } else {
- opt_error("unknown key type '%s'\n", val);
- }
- } else if (match_optval("-b")) {
- argbits = atoi(val);
- } else if (match_optval("-E")) {
- if (!strcmp(val, "md5"))
- params->fptype = SSH_FPTYPE_MD5;
- else if (!strcmp(val, "sha256"))
- params->fptype = SSH_FPTYPE_SHA256;
- else
- opt_error("unknown fingerprint type '%s'\n", val);
- } else if (match_optval("-primes")) {
- if (!strcmp(val, "probable") ||
- !strcmp(val, "probabilistic")) {
- params->primepolicybutton = IDC_PRIMEGEN_PROB;
- } else if (!strcmp(val, "provable") ||
- !strcmp(val, "proven") ||
- !strcmp(val, "simple") ||
- !strcmp(val, "maurer-simple")) {
- params->primepolicybutton = IDC_PRIMEGEN_MAURER_SIMPLE;
- } else if (!strcmp(val, "provable-even") ||
- !strcmp(val, "proven-even") ||
- !strcmp(val, "even") ||
- !strcmp(val, "complex") ||
- !strcmp(val, "maurer-complex")) {
- params->primepolicybutton = IDC_PRIMEGEN_MAURER_COMPLEX;
- } else {
- opt_error("unrecognised prime-generation mode '%s'\n", val);
- }
- } else if (match_opt("-strong-rsa")) {
- params->rsa_strong = true;
- } else if (match_optval("-ppk-param", "-ppk-params")) {
- char *nextval;
- for (; val; val = nextval) {
- nextval = strchr(val, ',');
- if (nextval)
- *nextval++ = '\0';
- char *optvalue = strchr(val, '=');
- if (!optvalue)
- opt_error("PPK parameter '%s' expected a value\n", val);
- *optvalue++ = '\0';
- /* Non-numeric options */
- if (!strcmp(val, "kdf")) {
- if (!strcmp(optvalue, "Argon2id") ||
- !strcmp(optvalue, "argon2id")) {
- save_params.argon2_flavour = Argon2id;
- } else if (!strcmp(optvalue, "Argon2i") ||
- !strcmp(optvalue, "argon2i")) {
- save_params.argon2_flavour = Argon2i;
- } else if (!strcmp(optvalue, "Argon2d") ||
- !strcmp(optvalue, "argon2d")) {
- save_params.argon2_flavour = Argon2d;
- } else {
- opt_error("unrecognised kdf '%s'\n", optvalue);
- }
- continue;
- }
- char *end;
- unsigned long n = strtoul(optvalue, &end, 0);
- if (!*optvalue || *end)
- opt_error("value '%s' for PPK parameter '%s': expected a "
- "number\n", optvalue, val);
- if (!strcmp(val, "version")) {
- save_params.fmt_version = n;
- } else if (!strcmp(val, "memory") ||
- !strcmp(val, "mem")) {
- save_params.argon2_mem = n;
- } else if (!strcmp(val, "time")) {
- save_params.argon2_passes_auto = true;
- save_params.argon2_milliseconds = n;
- } else if (!strcmp(val, "passes")) {
- save_params.argon2_passes_auto = false;
- save_params.argon2_passes = n;
- } else if (!strcmp(val, "parallelism") ||
- !strcmp(val, "parallel")) {
- save_params.argon2_parallelism = n;
- } else {
- opt_error("unrecognised PPK parameter '%s'\n", val);
- }
- }
- } else if (match_optval("-demo-screenshot")) {
- demo_screenshot_filename = val;
- cmdline_demo_keystr = PTRLEN_LITERAL(
- "PuTTY-User-Key-File-3: ssh-ed25519\n"
- "Encryption: none\n"
- "Comment: ed25519-key-20220402\n"
- "Public-Lines: 2\n"
- "AAAAC3NzaC1lZDI1NTE5AAAAILzuIFwZ"
- "8ZhgOlilcSb+9zPuCf/DmKJiloVlmWGy\n"
- "xa/F\n"
- "Private-Lines: 1\n"
- "AAAAIPca6vLwtB2NJhZUpABQISR0gcQH8jjQLta19VyzA3wc\n"
- "Private-MAC: 1159e9628259b35933b397379bbe8a14"
- "a1f1d97fe91e446e45a9581a3408b70e\n");
- params->keybutton = IDC_KEYSSH2EDDSA;
- argbits = 255;
- } else {
- opt_error("unrecognised option '%s'\n", amo.argv[amo.index]);
- }
- }
- /* Translate argbits into eccurve_index and edcurve_index */
- if (argbits > 0) {
- switch (params->keybutton) {
- case IDC_KEYSSH2RSA:
- case IDC_KEYSSH1:
- case IDC_KEYSSH2DSA:
- params->keybits = argbits;
- break;
- case IDC_KEYSSH2ECDSA: {
- bool found = false;
- for (int j = 0; j < n_ec_nist_curve_lengths; j++)
- if (argbits == ec_nist_curve_lengths[j]) {
- params->eccurve_index = j;
- found = true;
- break;
- }
- if (!found)
- opt_error("unsupported ECDSA bit length %d", argbits);
- break;
- }
- case IDC_KEYSSH2EDDSA: {
- bool found = false;
- for (int j = 0; j < n_ec_ed_curve_lengths; j++)
- if (argbits == ec_ed_curve_lengths[j]) {
- params->edcurve_index = j;
- found = true;
- break;
- }
- if (!found)
- opt_error("unsupported EDDSA bit length %d", argbits);
- break;
- }
- }
- }
- random_setup_special();
- ret = DialogBoxParam(hinst, MAKEINTRESOURCE(201), NULL, MainDlgProc,
- (LPARAM)params) != IDOK;
- cleanup_exit(ret);
- return ret; /* just in case optimiser complains */
- }
|