/*
* Sylpheed -- a GTK+ based, lightweight, and fast e-mail client
- * Copyright (C) 1999-2001 Hiroyuki Yamamoto
+ * Copyright (C) 1999-2002 Hiroyuki Yamamoto
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
#if USE_SSL
+#include "defs.h"
+
+#include <glib.h>
+
#include "intl.h"
#include "utils.h"
#include "ssl.h"
+#include "ssl_certificate.h"
-SSL_CTX *ssl_ctx_SSLv23;
-SSL_CTX *ssl_ctx_TLSv1;
+static SSL_CTX *ssl_ctx_SSLv23;
+static SSL_CTX *ssl_ctx_TLSv1;
-void ssl_init() {
- SSL_METHOD *meth;
-
- SSL_library_init();
- SSL_load_error_strings();
-
- ssl_ctx_SSLv23 = SSL_CTX_new(SSLv23_client_method());
- if(ssl_ctx_SSLv23 == NULL) {
- debug_print(_("SSLv23 not available\n"));
- } else {
- debug_print(_("SSLv23 available\n"));
- }
-
- ssl_ctx_TLSv1 = SSL_CTX_new(TLSv1_client_method());
- if(ssl_ctx_TLSv1 == NULL) {
- debug_print(_("TLSv1 not available\n"));
- } else {
- debug_print(_("TLSv1 available\n"));
- }
+void ssl_init(void)
+{
+ SSL_library_init();
+ SSL_load_error_strings();
+
+ ssl_ctx_SSLv23 = SSL_CTX_new(SSLv23_client_method());
+ if (ssl_ctx_SSLv23 == NULL) {
+ debug_print("SSLv23 not available\n");
+ } else {
+ debug_print("SSLv23 available\n");
+ }
+
+ ssl_ctx_TLSv1 = SSL_CTX_new(TLSv1_client_method());
+ if (ssl_ctx_TLSv1 == NULL) {
+ debug_print("TLSv1 not available\n");
+ } else {
+ debug_print("TLSv1 available\n");
+ }
}
-void ssl_done() {
- if(ssl_ctx_SSLv23) {
- SSL_CTX_free(ssl_ctx_SSLv23);
- }
+void ssl_done(void)
+{
+ if (ssl_ctx_SSLv23) {
+ SSL_CTX_free(ssl_ctx_SSLv23);
+ }
- if(ssl_ctx_TLSv1) {
- SSL_CTX_free(ssl_ctx_TLSv1);
- }
+ if (ssl_ctx_TLSv1) {
+ SSL_CTX_free(ssl_ctx_TLSv1);
+ }
}
-gboolean ssl_init_socket(SockInfo *sockinfo) {
- return ssl_init_socket_with_method(sockinfo, SSL_METHOD_SSLv23);
+gboolean ssl_init_socket(SockInfo *sockinfo)
+{
+ return ssl_init_socket_with_method(sockinfo, SSL_METHOD_SSLv23);
}
-gboolean ssl_init_socket_with_method(SockInfo *sockinfo, SSL_METHODs method) {
- X509 *server_cert;
- int ret;
+gboolean ssl_init_socket_with_method(SockInfo *sockinfo, SSLMethod method)
+{
+ X509 *server_cert;
+ gboolean ret;
+ unsigned char md[EVP_MAX_MD_SIZE];
+ char *issuer;
+ char *subject;
- switch(method) {
+ switch (method) {
case SSL_METHOD_SSLv23:
- if(!ssl_ctx_SSLv23) {
- log_warning(_("SSL method not available\n"));
- return FALSE;
- }
- sockinfo->ssl = SSL_new(ssl_ctx_SSLv23);
- break;
+ if (!ssl_ctx_SSLv23) {
+ log_warning(_("SSL method not available\n"));
+ return FALSE;
+ }
+ sockinfo->ssl = SSL_new(ssl_ctx_SSLv23);
+ break;
case SSL_METHOD_TLSv1:
- if(!ssl_ctx_TLSv1) {
- log_warning(_("SSL method not available\n"));
- return FALSE;
- }
- sockinfo->ssl = SSL_new(ssl_ctx_TLSv1);
- break;
+ if (!ssl_ctx_TLSv1) {
+ log_warning(_("SSL method not available\n"));
+ return FALSE;
+ }
+ sockinfo->ssl = SSL_new(ssl_ctx_TLSv1);
+ break;
default:
- log_warning(_("Unknown SSL method *PROGRAM BUG*\n"));
- return FALSE;
- break;
- }
-
- if(sockinfo->ssl == NULL) {
- log_warning(_("Error creating ssl context\n"));
+ log_warning(_("Unknown SSL method *PROGRAM BUG*\n"));
+ return FALSE;
+ break;
+ }
- return FALSE;
- }
+ if (sockinfo->ssl == NULL) {
+ log_warning(_("Error creating ssl context\n"));
+ return FALSE;
+ }
- SSL_set_fd(sockinfo->ssl, sockinfo->sock);
- if((ret = SSL_connect(sockinfo->ssl)) == -1) {
- log_warning(_("SSL connect failed (%s)\n"), ERR_error_string(ERR_get_error(), NULL));
+ SSL_set_fd(sockinfo->ssl, sockinfo->sock);
+ if ((ret = SSL_connect(sockinfo->ssl)) == -1) {
+ log_warning(_("SSL connect failed (%s)\n"),
+ ERR_error_string(ERR_get_error(), NULL));
+ return FALSE;
+ }
- return FALSE;
- }
+ /* Get the cipher */
- /* Get the cipher */
+ log_print(_("SSL connection using %s\n"), SSL_get_cipher(sockinfo->ssl));
- log_print(_("SSL connection using %s\n"), SSL_get_cipher(sockinfo->ssl));
+ /* Get server's certificate (note: beware of dynamic allocation) */
- /* Get server's certificate (note: beware of dynamic allocation) */
+ if ((server_cert = SSL_get_peer_certificate(sockinfo->ssl)) != NULL) {
+ int j;
+ unsigned int n;
+ EVP_MD *digest = EVP_md5();
+
+ log_print(_("Server certificate:\n"));
- if((server_cert = SSL_get_peer_certificate(sockinfo->ssl)) != NULL) {
- char *str;
-
- log_print(_("Server certificate:\n"));
+ if ((subject = X509_NAME_oneline(X509_get_subject_name(server_cert), 0, 0)) != NULL) {
+ log_print(_(" Subject: %s\n"), subject);
+ }
- if((str = X509_NAME_oneline(X509_get_subject_name (server_cert),0,0)) != NULL) {
- log_print(_(" Subject: %s\n"), str);
- free(str);
- }
-
- if((str = X509_NAME_oneline(X509_get_issuer_name (server_cert),0,0)) != NULL) {
- log_print(_(" Issuer: %s\n"), str);
- free(str);
+ if ((issuer = X509_NAME_oneline(X509_get_issuer_name(server_cert), 0, 0)) != NULL) {
+ log_print(_(" Issuer: %s\n"), issuer);
+ }
+
+ if (!X509_digest(server_cert, digest, md, &n))
+ printf("Can't get fingerprint !\n");
+
+ ret = ssl_certificate_check (server_cert, sockinfo->hostname, issuer, subject, md);
+ X509_free(server_cert);
}
+ if (!ret)
- X509_free(server_cert);
- }
-
- return TRUE;
+ if (issuer)
+ free(issuer);
+ if (subject)
+ free(subject);
+ return ret;
}
-void ssl_done_socket(SockInfo *sockinfo) {
- if(sockinfo->ssl) {
- SSL_free(sockinfo->ssl);
- }
+void ssl_done_socket(SockInfo *sockinfo)
+{
+ if (sockinfo->ssl) {
+ SSL_free(sockinfo->ssl);
+ }
}
-#endif /* USE_SSL */
\ No newline at end of file
+#endif /* USE_SSL */