2 * Sylpheed -- a GTK+ based, lightweight, and fast e-mail client
3 * Copyright (C) 1999-2006 Hiroyuki Yamamoto
4 * This file Copyright (C) 2002-2005 Colin Leroy <colin@colino.net>
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
27 #include <openssl/ssl.h>
29 #include <glib/gi18n.h>
32 #include "prefs_common.h"
33 #include "ssl_certificate.h"
35 #include "alertpanel.h"
38 gboolean sslcertwindow_ask_new_cert(SSLCertificate *cert);
39 gboolean sslcertwindow_ask_expired_cert(SSLCertificate *cert);
40 gboolean sslcertwindow_ask_changed_cert(SSLCertificate *old_cert, SSLCertificate *new_cert);
42 GtkWidget *cert_presenter(SSLCertificate *cert)
44 GtkWidget *vbox = NULL;
45 GtkWidget *hbox = NULL;
46 GtkWidget *frame_owner = NULL;
47 GtkWidget *frame_signer = NULL;
48 GtkWidget *frame_status = NULL;
49 GtkTable *owner_table = NULL;
50 GtkTable *signer_table = NULL;
51 GtkTable *status_table = NULL;
52 GtkWidget *label = NULL;
55 char *issuer_commonname, *issuer_location, *issuer_organization;
56 char *subject_commonname, *subject_location, *subject_organization;
57 char *fingerprint, *sig_status, *exp_date;
59 unsigned char md[EVP_MAX_MD_SIZE];
64 if (X509_NAME_get_text_by_NID(X509_get_issuer_name(cert->x509_cert),
65 NID_commonName, buf, 100) >= 0)
66 issuer_commonname = g_strdup(buf);
68 issuer_commonname = g_strdup(_("<not in certificate>"));
69 if (X509_NAME_get_text_by_NID(X509_get_issuer_name(cert->x509_cert),
70 NID_localityName, buf, 100) >= 0) {
71 issuer_location = g_strdup(buf);
72 if (X509_NAME_get_text_by_NID(X509_get_issuer_name(cert->x509_cert),
73 NID_countryName, buf, 100) >= 0)
74 issuer_location = g_strconcat(issuer_location,", ",buf, NULL);
75 } else if (X509_NAME_get_text_by_NID(X509_get_issuer_name(cert->x509_cert),
76 NID_countryName, buf, 100) >= 0)
77 issuer_location = g_strdup(buf);
79 issuer_location = g_strdup(_("<not in certificate>"));
81 if (X509_NAME_get_text_by_NID(X509_get_issuer_name(cert->x509_cert),
82 NID_organizationName, buf, 100) >= 0)
83 issuer_organization = g_strdup(buf);
85 issuer_organization = g_strdup(_("<not in certificate>"));
88 if (X509_NAME_get_text_by_NID(X509_get_subject_name(cert->x509_cert),
89 NID_commonName, buf, 100) >= 0)
90 subject_commonname = g_strdup(buf);
92 subject_commonname = g_strdup(_("<not in certificate>"));
93 if (X509_NAME_get_text_by_NID(X509_get_subject_name(cert->x509_cert),
94 NID_localityName, buf, 100) >= 0) {
95 subject_location = g_strdup(buf);
96 if (X509_NAME_get_text_by_NID(X509_get_subject_name(cert->x509_cert),
97 NID_countryName, buf, 100) >= 0)
98 subject_location = g_strconcat(subject_location,", ",buf, NULL);
99 } else if (X509_NAME_get_text_by_NID(X509_get_subject_name(cert->x509_cert),
100 NID_countryName, buf, 100) >= 0)
101 subject_location = g_strdup(buf);
103 subject_location = g_strdup(_("<not in certificate>"));
105 if (X509_NAME_get_text_by_NID(X509_get_subject_name(cert->x509_cert),
106 NID_organizationName, buf, 100) >= 0)
107 subject_organization = g_strdup(buf);
109 subject_organization = g_strdup(_("<not in certificate>"));
111 if ((validity = X509_get_notAfter(cert->x509_cert)) != NULL) {
112 exp_time_t = asn1toTime(validity);
114 exp_time_t = (time_t)0;
117 memset(buf, 0, sizeof(buf));
118 strftime(buf, sizeof(buf)-1, prefs_common.date_format, localtime(&exp_time_t));
119 exp_date = buf? g_strdup(buf):g_strdup("?");
122 X509_digest(cert->x509_cert, EVP_md5(), md, &n);
123 fingerprint = readable_fingerprint(md, (int)n);
126 sig_status = ssl_certificate_check_signer(cert->x509_cert);
128 if (sig_status==NULL)
129 sig_status = g_strdup(_("correct"));
131 vbox = gtk_vbox_new(FALSE, 5);
132 hbox = gtk_hbox_new(FALSE, 5);
134 frame_owner = gtk_frame_new(_("Owner"));
135 frame_signer = gtk_frame_new(_("Signer"));
136 frame_status = gtk_frame_new(_("Status"));
138 owner_table = GTK_TABLE(gtk_table_new(3, 2, FALSE));
139 signer_table = GTK_TABLE(gtk_table_new(3, 2, FALSE));
140 status_table = GTK_TABLE(gtk_table_new(3, 2, FALSE));
142 label = gtk_label_new(_("Name: "));
143 gtk_misc_set_alignment (GTK_MISC (label), 1, 0.5);
144 gtk_table_attach(owner_table, label, 0, 1, 0, 1, GTK_EXPAND|GTK_FILL, 0, 0, 0);
145 label = gtk_label_new(subject_commonname);
146 gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
147 gtk_table_attach(owner_table, label, 1, 2, 0, 1, GTK_EXPAND|GTK_FILL, 0, 0, 0);
149 label = gtk_label_new(_("Organization: "));
150 gtk_misc_set_alignment (GTK_MISC (label), 1, 0.5);
151 gtk_table_attach(owner_table, label, 0, 1, 1, 2, GTK_EXPAND|GTK_FILL, 0, 0, 0);
152 label = gtk_label_new(subject_organization);
153 gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
154 gtk_table_attach(owner_table, label, 1, 2, 1, 2, GTK_EXPAND|GTK_FILL, 0, 0, 0);
156 label = gtk_label_new(_("Location: "));
157 gtk_misc_set_alignment (GTK_MISC (label), 1, 0.5);
158 gtk_table_attach(owner_table, label, 0, 1, 2, 3, GTK_EXPAND|GTK_FILL, 0, 0, 0);
159 label = gtk_label_new(subject_location);
160 gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
161 gtk_table_attach(owner_table, label, 1, 2, 2, 3, GTK_EXPAND|GTK_FILL, 0, 0, 0);
163 label = gtk_label_new(_("Name: "));
164 gtk_misc_set_alignment (GTK_MISC (label), 1, 0.5);
165 gtk_table_attach(signer_table, label, 0, 1, 0, 1, GTK_EXPAND|GTK_FILL, 0, 0, 0);
166 label = gtk_label_new(issuer_commonname);
167 gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
168 gtk_table_attach(signer_table, label, 1, 2, 0, 1, GTK_EXPAND|GTK_FILL, 0, 0, 0);
170 label = gtk_label_new(_("Organization: "));
171 gtk_misc_set_alignment (GTK_MISC (label), 1, 0.5);
172 gtk_table_attach(signer_table, label, 0, 1, 1, 2, GTK_EXPAND|GTK_FILL, 0, 0, 0);
173 label = gtk_label_new(issuer_organization);
174 gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
175 gtk_table_attach(signer_table, label, 1, 2, 1, 2, GTK_EXPAND|GTK_FILL, 0, 0, 0);
177 label = gtk_label_new(_("Location: "));
178 gtk_misc_set_alignment (GTK_MISC (label), 1, 0.5);
179 gtk_table_attach(signer_table, label, 0, 1, 2, 3, GTK_EXPAND|GTK_FILL, 0, 0, 0);
180 label = gtk_label_new(issuer_location);
181 gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
182 gtk_table_attach(signer_table, label, 1, 2, 2, 3, GTK_EXPAND|GTK_FILL, 0, 0, 0);
184 label = gtk_label_new(_("Fingerprint: "));
185 gtk_misc_set_alignment (GTK_MISC (label), 1, 0.5);
186 gtk_table_attach(status_table, label, 0, 1, 0, 1, GTK_EXPAND|GTK_FILL, 0, 0, 0);
187 label = gtk_label_new(fingerprint);
188 gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
189 gtk_table_attach(status_table, label, 1, 2, 0, 1, GTK_EXPAND|GTK_FILL, 0, 0, 0);
190 label = gtk_label_new(_("Signature status: "));
191 gtk_misc_set_alignment (GTK_MISC (label), 1, 0.5);
192 gtk_table_attach(status_table, label, 0, 1, 1, 2, GTK_EXPAND|GTK_FILL, 0, 0, 0);
193 label = gtk_label_new(sig_status);
194 gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
195 gtk_table_attach(status_table, label, 1, 2, 1, 2, GTK_EXPAND|GTK_FILL, 0, 0, 0);
196 label = gtk_label_new(_("Expires on: "));
197 gtk_misc_set_alignment (GTK_MISC (label), 1, 0.5);
198 gtk_table_attach(status_table, label, 0, 1, 2, 3, GTK_EXPAND|GTK_FILL, 0, 0, 0);
199 label = gtk_label_new(exp_date);
200 gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
201 gtk_table_attach(status_table, label, 1, 2, 2, 3, GTK_EXPAND|GTK_FILL, 0, 0, 0);
203 gtk_container_add(GTK_CONTAINER(frame_owner), GTK_WIDGET(owner_table));
204 gtk_container_add(GTK_CONTAINER(frame_signer), GTK_WIDGET(signer_table));
205 gtk_container_add(GTK_CONTAINER(frame_status), GTK_WIDGET(status_table));
207 gtk_box_pack_end(GTK_BOX(hbox), frame_signer, TRUE, TRUE, 0);
208 gtk_box_pack_end(GTK_BOX(hbox), frame_owner, TRUE, TRUE, 0);
209 gtk_box_pack_end(GTK_BOX(vbox), frame_status, TRUE, TRUE, 0);
210 gtk_box_pack_end(GTK_BOX(vbox), hbox, TRUE, TRUE, 0);
212 gtk_widget_show_all(vbox);
214 g_free(issuer_commonname);
215 g_free(issuer_location);
216 g_free(issuer_organization);
217 g_free(subject_commonname);
218 g_free(subject_location);
219 g_free(subject_organization);
226 static gboolean sslcert_ask_hook(gpointer source, gpointer data)
228 SSLCertHookData *hookdata = (SSLCertHookData *)source;
229 if (hookdata == NULL) {
232 if (hookdata->old_cert == NULL) {
233 if (hookdata->expired)
234 hookdata->accept = sslcertwindow_ask_expired_cert(hookdata->cert);
236 hookdata->accept = sslcertwindow_ask_new_cert(hookdata->cert);
238 hookdata->accept = sslcertwindow_ask_changed_cert(hookdata->old_cert, hookdata->cert);
243 void sslcertwindow_register_hook(void)
245 hooks_register_hook(SSLCERT_ASK_HOOKLIST, sslcert_ask_hook, NULL);
248 void sslcertwindow_show_cert(SSLCertificate *cert)
250 GtkWidget *cert_widget = cert_presenter(cert);
253 buf = g_strdup_printf(_("SSL certificate for %s"), cert->host);
254 alertpanel_full(buf, NULL, GTK_STOCK_CLOSE, NULL, NULL,
255 FALSE, cert_widget, ALERT_NOTICE, G_ALERTDEFAULT);
259 gboolean sslcertwindow_ask_new_cert(SSLCertificate *cert)
261 gchar *buf, *sig_status;
266 GtkWidget *cert_widget;
268 vbox = gtk_vbox_new(FALSE, 5);
269 buf = g_strdup_printf(_("Certificate for %s is unknown.\nDo you want to accept it?"), cert->host);
270 label = gtk_label_new(buf);
271 gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
272 gtk_box_pack_start(GTK_BOX(vbox), label, TRUE, TRUE, 0);
275 sig_status = ssl_certificate_check_signer(cert->x509_cert);
277 if (sig_status==NULL)
278 sig_status = g_strdup(_("correct"));
280 buf = g_strdup_printf(_("Signature status: %s"), sig_status);
281 label = gtk_label_new(buf);
282 gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
283 gtk_box_pack_start(GTK_BOX(vbox), label, TRUE, TRUE, 0);
287 button = gtk_expander_new_with_mnemonic(_("_View certificate"));
288 gtk_box_pack_start(GTK_BOX(vbox), button, FALSE, FALSE, 0);
289 cert_widget = cert_presenter(cert);
290 gtk_container_add(GTK_CONTAINER(button), cert_widget);
292 val = alertpanel_full(_("Unknown SSL Certificate"), NULL,
293 _("_Accept and save"), _("_Cancel connection"), NULL,
294 FALSE, vbox, ALERT_QUESTION, G_ALERTDEFAULT);
296 return (val == G_ALERTDEFAULT);
299 gboolean sslcertwindow_ask_expired_cert(SSLCertificate *cert)
301 gchar *buf, *sig_status;
306 GtkWidget *cert_widget;
308 vbox = gtk_vbox_new(FALSE, 5);
309 buf = g_strdup_printf(_("Certificate for %s is expired.\nDo you want to continue?"), cert->host);
310 label = gtk_label_new(buf);
311 gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
312 gtk_box_pack_start(GTK_BOX(vbox), label, TRUE, TRUE, 0);
315 sig_status = ssl_certificate_check_signer(cert->x509_cert);
317 if (sig_status==NULL)
318 sig_status = g_strdup(_("correct"));
320 buf = g_strdup_printf(_("Signature status: %s"), sig_status);
321 label = gtk_label_new(buf);
322 gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
323 gtk_box_pack_start(GTK_BOX(vbox), label, TRUE, TRUE, 0);
327 button = gtk_expander_new_with_mnemonic(_("_View certificate"));
328 gtk_box_pack_start(GTK_BOX(vbox), button, FALSE, FALSE, 0);
329 cert_widget = cert_presenter(cert);
330 gtk_container_add(GTK_CONTAINER(button), cert_widget);
332 val = alertpanel_full(_("Expired SSL Certificate"), NULL,
333 _("_Accept"), _("_Cancel connection"), NULL,
334 FALSE, vbox, ALERT_QUESTION, G_ALERTDEFAULT);
336 return (val == G_ALERTDEFAULT);
339 gboolean sslcertwindow_ask_changed_cert(SSLCertificate *old_cert, SSLCertificate *new_cert)
341 GtkWidget *old_cert_widget = cert_presenter(old_cert);
342 GtkWidget *new_cert_widget = cert_presenter(new_cert);
344 gchar *buf, *sig_status;
350 vbox = gtk_vbox_new(FALSE, 5);
351 label = gtk_label_new(_("New certificate:"));
352 gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
353 gtk_box_pack_end(GTK_BOX(vbox), new_cert_widget, TRUE, TRUE, 0);
354 gtk_box_pack_end(GTK_BOX(vbox), label, TRUE, TRUE, 0);
355 gtk_box_pack_end(GTK_BOX(vbox), gtk_hseparator_new(), TRUE, TRUE, 0);
356 label = gtk_label_new(_("Known certificate:"));
357 gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
358 gtk_box_pack_end(GTK_BOX(vbox), old_cert_widget, TRUE, TRUE, 0);
359 gtk_box_pack_end(GTK_BOX(vbox), label, TRUE, TRUE, 0);
360 gtk_widget_show_all(vbox);
362 vbox2 = gtk_vbox_new(FALSE, 5);
363 buf = g_strdup_printf(_("Certificate for %s has changed. Do you want to accept it?"), new_cert->host);
364 label = gtk_label_new(buf);
365 gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
366 gtk_box_pack_start(GTK_BOX(vbox2), label, TRUE, TRUE, 0);
369 sig_status = ssl_certificate_check_signer(new_cert->x509_cert);
371 if (sig_status==NULL)
372 sig_status = g_strdup(_("correct"));
374 buf = g_strdup_printf(_("Signature status: %s"), sig_status);
375 label = gtk_label_new(buf);
376 gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
377 gtk_box_pack_start(GTK_BOX(vbox2), label, TRUE, TRUE, 0);
381 button = gtk_expander_new_with_mnemonic(_("_View certificates"));
382 gtk_box_pack_start(GTK_BOX(vbox2), button, FALSE, FALSE, 0);
383 gtk_container_add(GTK_CONTAINER(button), vbox);
385 val = alertpanel_full(_("Changed SSL Certificate"), NULL,
386 _("_Accept and save"), _("_Cancel connection"), NULL,
387 FALSE, vbox2, ALERT_WARNING, G_ALERTDEFAULT);
389 return (val == G_ALERTDEFAULT);