Mercurial > pidgin.yaz
view finch/gntcertmgr.c @ 20329:24ce4fcce5b0
applied changes from e56db1b8a7bb8729e30fb3bf99a94ff7887fe4ec
through 3efb5d625e5a73423be8be77a6baeed0b65f7e55
applied changes from 74f0e6698f9f17bc8335cf2454c06e6b13748039
through 017296ee954fb91349806c809983c916842603da
applied changes from c8ff393c43d8a5f4136c653853a95284cc5710dc
through f53dbbff44537aa86b1cb8788fd306c90e6ccca9
applied changes from f53dbbff44537aa86b1cb8788fd306c90e6ccca9
through 5798594431164383deacd7d4aad5a9a0d5b867ae
applied changes from 5798594431164383deacd7d4aad5a9a0d5b867ae
through 0822c640f22b63d7bc8992e62b80bccd1eea12a2
applied changes from 703c3f9437d5e71255819c747f9690d19c6ba6e3
through b7a2c4d81867c3bbd262c2a4b1d924ea7fd3afb6
applied changes from b7a2c4d81867c3bbd262c2a4b1d924ea7fd3afb6
through 5ea15b000ee727088be88bb335c2ded6b2ab96e3
applied changes from 5ea15b000ee727088be88bb335c2ded6b2ab96e3
through c5051010dd50f9fdb7f85d779d882ce8bbc149f2
author | Luke Schierer <lschiere@pidgin.im> |
---|---|
date | Fri, 19 Oct 2007 18:14:53 +0000 |
parents | 6b8bc3309ab7 |
children | 591267f6f1d5 |
line wrap: on
line source
/** * @file gntcertmgr.c GNT Certificate Manager API * @ingroup finch */ /* finch * * Finch is the legal property of its developers, whose names are too numerous * to list here. Please refer to the COPYRIGHT file distributed with this * source distribution. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02111-1301 USA * */ #include "internal.h" #include "certificate.h" #include "debug.h" #include "notify.h" #include "request.h" #include "finch.h" #include "gntcertmgr.h" #include "gntbutton.h" #include "gntlabel.h" #include "gnttree.h" #include "gntutils.h" #include "gntwindow.h" struct { GntWidget *window; GntWidget *tree; PurpleCertificatePool *pool; } certmgr; /* Pretty much Xerox of gtkcertmgr */ /* Add certificate */ static void tls_peers_mgmt_import_ok2_cb(gpointer data, const char *result) { PurpleCertificate *crt = (PurpleCertificate *) data; const char *id = result; /* TODO: Perhaps prompt if you're overwriting a cert? */ purple_certificate_pool_store(purple_certificate_find_pool("x509", "tls_peers"), id, crt); purple_certificate_destroy(crt); } static void tls_peers_mgmt_import_cancel2_cb(gpointer data, const char *result) { PurpleCertificate *crt = (PurpleCertificate *) data; purple_certificate_destroy(crt); } static void tls_peers_mgmt_import_ok_cb(gpointer data, const char *filename) { PurpleCertificateScheme *x509; PurpleCertificate *crt; x509 = purple_certificate_pool_get_scheme(purple_certificate_find_pool("x509", "tls_peers")); crt = purple_certificate_import(x509, filename); if (crt != NULL) { gchar *default_hostname; default_hostname = purple_certificate_get_subject_name(crt); purple_request_input(NULL, _("Certificate Import"), _("Specify a hostname"), _("Type the host name this certificate is for."), default_hostname, FALSE, FALSE, NULL, _("OK"), G_CALLBACK(tls_peers_mgmt_import_ok2_cb), _("Cancel"), G_CALLBACK(tls_peers_mgmt_import_cancel2_cb), NULL, NULL, NULL, crt); g_free(default_hostname); } else { gchar * secondary; secondary = g_strdup_printf(_("File %s could not be imported.\nMake sure that the file is readable and in PEM format.\n"), filename); purple_notify_error(NULL, _("Certificate Import Error"), _("X.509 certificate import failed"), secondary); g_free(secondary); } } static void add_cert_cb(GntWidget *button, gpointer null) { purple_request_file(NULL, _("Select a PEM certificate"), "certificate.pem", FALSE, G_CALLBACK(tls_peers_mgmt_import_ok_cb), NULL, NULL, NULL, NULL, NULL ); } /* Save certs in some file */ static void tls_peers_mgmt_export_ok_cb(gpointer data, const char *filename) { PurpleCertificate *crt = (PurpleCertificate *) data; if (!purple_certificate_export(filename, crt)) { gchar * secondary; secondary = g_strdup_printf(_("Export to file %s failed.\nCheck that you have write permission to the target path\n"), filename); purple_notify_error(NULL, _("Certificate Export Error"), _("X.509 certificate export failed"), secondary); g_free(secondary); } purple_certificate_destroy(crt); } static void save_cert_cb(GntWidget *button, gpointer null) { PurpleCertificate *crt; const char *key; if (!certmgr.window) return; key = gnt_tree_get_selection_data(GNT_TREE(certmgr.tree)); if (!key) return; crt = purple_certificate_pool_retrieve(certmgr.pool, key); if (!crt) { purple_debug_error("gntcertmgr/tls_peers_mgmt", "Id %s was not in the peers cache?!\n", key); return; } purple_request_file((void*)key, _("PEM X.509 Certificate Export"), "certificate.pem", TRUE, G_CALLBACK(tls_peers_mgmt_export_ok_cb), G_CALLBACK(purple_certificate_destroy), NULL, NULL, NULL, crt); } /* Show information about a cert */ static void info_cert_cb(GntWidget *button, gpointer null) { const char *key; PurpleCertificate *crt; gchar *subject; GByteArray *fpr_sha1; gchar *fpr_sha1_asc; gchar *primary, *secondary; if (!certmgr.window) return; key = gnt_tree_get_selection_data(GNT_TREE(certmgr.tree)); if (!key) return; crt = purple_certificate_pool_retrieve(certmgr.pool, key); g_return_if_fail(crt); primary = g_strdup_printf(_("Certificate for %s"), key); fpr_sha1 = purple_certificate_get_fingerprint_sha1(crt); fpr_sha1_asc = purple_base16_encode_chunked(fpr_sha1->data, fpr_sha1->len); subject = purple_certificate_get_subject_name(crt); secondary = g_strdup_printf(_("Common name: %s\n\nSHA1 fingerprint:\n%s"), subject, fpr_sha1_asc); purple_notify_info(NULL, _("SSL Host Certificate"), primary, secondary); g_free(primary); g_free(secondary); g_byte_array_free(fpr_sha1, TRUE); g_free(fpr_sha1_asc); g_free(subject); purple_certificate_destroy(crt); } /* Delete a cert */ static void tls_peers_mgmt_delete_confirm_cb(gchar *id, gint dontcare) { if (!purple_certificate_pool_delete(certmgr.pool, id)) { purple_debug_warning("gntcertmgr/tls_peers_mgmt", "Deletion failed on id %s\n", id); }; g_free(id); } static void delete_cert_cb(GntWidget *button, gpointer null) { gchar *primary; const char *key; if (!certmgr.window) return; key = gnt_tree_get_selection_data(GNT_TREE(certmgr.tree)); if (!key) return; primary = g_strdup_printf(_("Really delete certificate for %s?"), key); purple_request_close_with_handle((void *)key); purple_request_yes_no((void *)key, _("Confirm certificate delete"), primary, NULL, 2, NULL, NULL, NULL, g_strdup(key), tls_peers_mgmt_delete_confirm_cb, g_free); g_free(primary); } /* populate the list */ static void populate_cert_list() { GList *idlist, *l; if (!certmgr.window) return; gnt_tree_remove_all(GNT_TREE(certmgr.tree)); idlist = purple_certificate_pool_get_idlist(purple_certificate_find_pool("x509", "tls_peers")); for (l = idlist; l; l = l->next) { gnt_tree_add_row_last(GNT_TREE(certmgr.tree), g_strdup(l->data), gnt_tree_create_row(GNT_TREE(certmgr.tree), l->data), NULL); } purple_certificate_pool_destroy_idlist(idlist); } static void cert_list_added(PurpleCertificatePool *pool, const char *id, gpointer null) { g_return_if_fail(certmgr.window); gnt_tree_add_row_last(GNT_TREE(certmgr.tree), g_strdup(id), gnt_tree_create_row(GNT_TREE(certmgr.tree), id), NULL); } static void cert_list_removed(PurpleCertificatePool *pool, const char *id, gpointer null) { g_return_if_fail(certmgr.window); purple_request_close_with_handle((void*)id); gnt_tree_remove(GNT_TREE(certmgr.tree), (void*)id); } void finch_certmgr_show(void) { GntWidget *win, *tree, *box, *button; PurpleCertificatePool *pool; if (certmgr.window) { gnt_window_present(certmgr.window); return; } certmgr.window = win = gnt_vwindow_new(FALSE); gnt_box_set_title(GNT_BOX(win), _("Certificate Manager")); gnt_box_set_pad(GNT_BOX(win), 0); certmgr.tree = tree = gnt_tree_new(); gnt_tree_set_hash_fns(GNT_TREE(tree), g_str_hash, g_str_equal, g_free); gnt_tree_set_column_title(GNT_TREE(tree), 0, _("Hostname")); gnt_tree_set_show_title(GNT_TREE(tree), TRUE); gnt_box_add_widget(GNT_BOX(win), tree); box = gnt_hbox_new(FALSE); gnt_box_add_widget(GNT_BOX(win), box); button = gnt_button_new(_("Add")); gnt_box_add_widget(GNT_BOX(box), button); g_signal_connect(G_OBJECT(button), "activate", G_CALLBACK(add_cert_cb), NULL); gnt_util_set_trigger_widget(GNT_WIDGET(tree), GNT_KEY_INS, button); button = gnt_button_new(_("Save")); gnt_box_add_widget(GNT_BOX(box), button); g_signal_connect(G_OBJECT(button), "activate", G_CALLBACK(save_cert_cb), NULL); button = gnt_button_new(_("Info")); gnt_box_add_widget(GNT_BOX(box), button); g_signal_connect(G_OBJECT(button), "activate", G_CALLBACK(info_cert_cb), NULL); button = gnt_button_new(_("Delete")); gnt_box_add_widget(GNT_BOX(box), button); g_signal_connect(G_OBJECT(button), "activate", G_CALLBACK(delete_cert_cb), NULL); gnt_util_set_trigger_widget(GNT_WIDGET(tree), GNT_KEY_DEL, button); button = gnt_button_new(_("Close")); gnt_box_add_widget(GNT_BOX(box), button); g_signal_connect_swapped(G_OBJECT(button), "activate", G_CALLBACK(gnt_widget_destroy), win); g_signal_connect_swapped(G_OBJECT(win), "destroy", G_CALLBACK(g_nullify_pointer), &certmgr.window); populate_cert_list(); pool = certmgr.pool = purple_certificate_find_pool("x509", "tls_peers"); purple_signal_connect(pool, "certificate-stored", win, PURPLE_CALLBACK(cert_list_added), NULL); purple_signal_connect(pool, "certificate-deleted", win, PURPLE_CALLBACK(cert_list_removed), NULL); g_signal_connect(G_OBJECT(win), "destroy", G_CALLBACK(purple_signals_disconnect_by_handle), NULL); gnt_widget_show(certmgr.window); }