/** * crypto.cpp * * Copyright (c) 2000-2005 George Staikos * 2000 Carsten Pfeiffer * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU Lesser General Public License as published * by the Free Software Foundation; either version 2.1 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. */ // // Attention. The suck factor on this code is increasing. It's a bit of a // hack. It might be time to rewrite it soon. // #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #ifdef HAVE_SSL #define crypt _openssl_crypt #include #include #include #include #include #include #include #include #undef crypt #endif #include #include #include "crypto.h" #include "certexport.h" #include "kdatetimedlg.h" using namespace KNetwork; typedef KGenericFactory KryptoFactory; K_EXPORT_COMPONENT_FACTORY( kcm_crypto, KryptoFactory("kcmcrypto") ) CipherItem::CipherItem( TQListView *view, const TQString& cipher, int bits, int maxBits, KCryptoConfig *module ) : TQCheckListItem( view, TQString(), CheckBox ) { m_cipher = cipher; m_bits = bits; m_module = module; TQString tmp( i18n("%1 (%2 of %3 bits)") ); setText( 0, tmp.arg( cipher ).arg( bits ).arg( maxBits )); } void CipherItem::stateChange( bool ) { m_module->configChanged(); } TQString CipherItem::configName() const { TQString cipherName("cipher_%1"); return cipherName.arg( m_cipher ); } OtherCertItem::OtherCertItem( TQListView *view, const TQString& sub, const TQString& md5, bool perm, int policy, TQDateTime exp, KCryptoConfig *module ) : TQListViewItem( view, TQString() ), _sub(sub), _md5(md5), _exp(exp), _perm(perm), _policy(policy) { m_module = module; KSSLX509Map cert(sub); setText(0, cert.getValue("O")); setText(1, cert.getValue("CN").replace("\n", ", ")); if (_exp.date().year() > 3000 || _exp.date().year() < 1900) _exp.setDate(TQDate(3000,1,1)); } void OtherCertItem::stateChange( bool ) { m_module->configChanged(); } TQString OtherCertItem::configName() const { return _sub; } YourCertItem::YourCertItem( TQListView *view, TQString pkcs, TQString pass, TQString name, KCryptoConfig *module ) : TQListViewItem( view, TQString() ) { m_module = module; KSSLX509Map cert(name); TQString tmp = cert.getValue("CN").replace("\n", ", "); setText(0, tmp); setText(1, cert.getValue("Email")); _pkcs = pkcs; _name = name; _pass = pass; } void YourCertItem::stateChange( bool ) { m_module->configChanged(); } TQString YourCertItem::configName() const { return _name; } CAItem::CAItem( TQListView *view, TQString name, TQString cert, bool site, bool email, bool code, KCryptoConfig *module ) : TQListViewItem( view, TQString() ) { m_module = module; KSSLX509Map mcert(name); TQString tmp; setText(0, mcert.getValue("O")); tmp = mcert.getValue("OU"); tmp.replace("\n", ", "); setText(1, tmp); tmp = mcert.getValue("CN"); tmp.replace("\n", ", "); setText(2, tmp); _name = name; _cert = cert; _site = site; _email = email; _code = code; isNew = false; modified = false; } void CAItem::stateChange( bool ) { m_module->configChanged(); } TQString CAItem::configName() const { return _name; } ////////////////////////////////////////////////////////////////////////////// ////////////////////////////////////////////////////////////////////////////// ////////////////////////////////////////////////////////////////////////////// ////////////////////////////////////////////////////////////////////////////// ////////////////////////////////////////////////////////////////////////////// KCryptoConfig::KCryptoConfig(TQWidget *parent, const char *name, const TQStringList &) : KCModule(KryptoFactory::instance(), parent, name) { TQGridLayout *grid; TQBoxLayout *top = new TQVBoxLayout(this); TQString whatstr; setQuickHelp( i18n("

Crypto

This module allows you to configure SSL for" " use with most KDE applications, as well as manage your personal" " certificates and the known certificate authorities.")); ___lehack = false; otherCertDelList.setAutoDelete(true); yourCertDelList.setAutoDelete(true); authDelList.setAutoDelete(true); caDelList.setAutoDelete(true); _signers = new KSSLSigners; KAboutData *about = new KAboutData(I18N_NOOP("kcmcrypto"), I18N_NOOP("KDE Crypto Control Module"), 0, 0, KAboutData::License_GPL, I18N_NOOP("(c) 2000 - 2001 George Staikos")); about->addAuthor("George Staikos", 0, "staikos@kde.org"); about->addAuthor("Carsten Pfeiffer", 0, "pfeiffer@kde.org"); setAboutData( about ); /////////////////////////////////////////////////////////////////////////// // Create the GUI here - there are currently a total of 6 tabs. // The first is SSL and cipher related // The second is OpenSSL settings // The third is user's SSL certificate related // The fourth is certificate authentication related // The fifth is other SSL certificate related // The sixth is CA related // The seventh is misc. settings related (unimplemented) // The eighth is peer [email] certificate related (unimplemented) /////////////////////////////////////////////////////////////////////////// tabs = new TQTabWidget(this); top->addWidget(tabs); /////////////////////////////////////////////////////////////////////////// // FIRST TAB /////////////////////////////////////////////////////////////////////////// tabSSL = new TQFrame(this); grid = new TQGridLayout(tabSSL, 7, 2, KDialog::marginHint(), KDialog::spacingHint() ); mUseTLS = new TQCheckBox(i18n("Enable &TLS support if supported by the server"), tabSSL); connect(mUseTLS, TQT_SIGNAL(clicked()), TQT_SLOT(configChanged())); grid->addWidget(mUseTLS, 0, 0); whatstr = i18n("TLS is the newest revision of the SSL protocol." " It integrates better with other protocols and has" " replaced SSL in protocols such as POP3 and SMTP."); TQWhatsThis::add(mUseTLS, whatstr); mUseSSLv2 = new TQCheckBox(i18n("Enable SSLv&2"), tabSSL); connect(mUseSSLv2, TQT_SIGNAL(clicked()), TQT_SLOT(configChanged())); grid->addWidget(mUseSSLv2, 1, 0); whatstr = i18n("SSL v2 is the second revision of the SSL protocol." " It is most common to enable v2 and v3."); TQWhatsThis::add(mUseSSLv2, whatstr); mUseSSLv3 = new TQCheckBox(i18n("Enable SSLv&3"), tabSSL); connect(mUseSSLv3, TQT_SIGNAL(clicked()), TQT_SLOT(configChanged())); grid->addWidget(mUseSSLv3, 1, 1); whatstr = i18n("SSL v3 is the third revision of the SSL protocol." " It is most common to enable v2 and v3."); TQWhatsThis::add(mUseSSLv3, whatstr); #ifdef HAVE_SSL SSLv2Box = new TQListView(tabSSL, "v2ciphers"); (void) SSLv2Box->addColumn(i18n("SSLv2 Ciphers to Use")); whatstr = i18n("Select the ciphers you wish to enable when using the" " SSL v2 protocol. The actual protocol used will be" " negotiated with the server at connection time."); TQWhatsThis::add(SSLv2Box, whatstr); SSLv2Box->setSelectionMode(TQListView::NoSelection); grid->addWidget( SSLv2Box, 2, 0 ); connect( mUseSSLv2, TQT_SIGNAL( toggled( bool ) ), SSLv2Box, TQT_SLOT( setEnabled( bool ))); #else TQLabel *nossllabel = new TQLabel(i18n("SSL ciphers cannot be configured" " because this module was not linked" " with OpenSSL."), tabSSL); grid->addMultiCellWidget(nossllabel, 2, 2, 0, 1); grid->addRowSpacing( 3, 100 ); // give minimum height to look better #endif // no need to parse kdeglobals. config = new KConfig("cryptodefaults", false, false); policies = new KSimpleConfig("ksslpolicies", false); pcerts = new KSimpleConfig("ksslcertificates", false); authcfg = new KSimpleConfig("ksslauthmap", false); #ifdef HAVE_SSL SSLv3Box = new TQListView(tabSSL, "v3ciphers"); (void) SSLv3Box->addColumn(i18n("SSLv3 Ciphers to Use")); whatstr = i18n("Select the ciphers you wish to enable when using the" " SSL v3 protocol. The actual protocol used will be" " negotiated with the server at connection time."); TQWhatsThis::add(SSLv3Box, whatstr); SSLv3Box->setSelectionMode(TQListView::NoSelection); grid->addWidget(SSLv3Box, 2, 1); connect( mUseSSLv3, TQT_SIGNAL( toggled( bool ) ), SSLv3Box, TQT_SLOT( setEnabled( bool ))); loadCiphers(); // // CipherWizards // TQHGroupBox *cwbg = new TQHGroupBox(i18n("Cipher Wizard"), tabSSL); TQComboBox *cwcb = new TQComboBox(cwbg); grid->addMultiCellWidget(cwbg, 3, 3, 0, 1); TQString whatStr = i18n("Use these preconfigurations to more easily configure the SSL encryption settings. You can choose among the following modes:
    "); cwcb->insertItem(TQString()); cwcb->insertItem(i18n("Most Compatible")); whatStr += i18n("
  • Most Compatible: Select the settings found to be most compatible.
  • "); cwcb->insertItem(i18n("US Ciphers Only")); whatStr += i18n("
  • US Ciphers Only: Select only the US strong (>= 128 bit) encryption ciphers.
  • "); cwcb->insertItem(i18n("Export Ciphers Only")); whatStr += i18n("
  • Export Ciphers Only: Select only the weak ciphers (<= 56 bit).
  • "); cwcb->insertItem(i18n("Enable All")); whatStr += i18n("
  • Enable All: Select all SSL ciphers and methods.
"); TQWhatsThis::add(cwcb, whatStr); connect(cwcb, TQT_SIGNAL(activated(int)), TQT_SLOT(slotSelectCipher(int))); #endif mWarnOnEnter = new TQCheckBox(i18n("Warn on &entering SSL mode"), tabSSL); connect(mWarnOnEnter, TQT_SIGNAL(clicked()), TQT_SLOT(configChanged())); grid->addWidget(mWarnOnEnter, 5, 0); whatstr = i18n("If selected, you will be notified when entering an SSL" " enabled site"); TQWhatsThis::add(mWarnOnEnter, whatstr); mWarnOnLeave = new TQCheckBox(i18n("Warn on &leaving SSL mode"), tabSSL); connect(mWarnOnLeave, TQT_SIGNAL(clicked()), TQT_SLOT(configChanged())); grid->addWidget(mWarnOnLeave, 5, 1); whatstr = i18n("If selected, you will be notified when leaving an SSL" " based site."); TQWhatsThis::add(mWarnOnLeave, whatstr); mWarnOnUnencrypted = new TQCheckBox(i18n("Warn on sending &unencrypted data"), tabSSL); connect(mWarnOnUnencrypted, TQT_SIGNAL(clicked()), TQT_SLOT(configChanged())); grid->addWidget(mWarnOnUnencrypted, 6, 0); whatstr = i18n("If selected, you will be notified before sending" " unencrypted data via a web browser."); TQWhatsThis::add(mWarnOnUnencrypted, whatstr); #if 0 // NOT IMPLEMENTED IN KDE 3.0 mWarnOnMixed = new TQCheckBox(i18n("Warn on &mixed SSL/non-SSL pages"), tabSSL); connect(mWarnOnMixed, TQT_SIGNAL(clicked()), TQT_SLOT(configChanged())); grid->addWidget(mWarnOnMixed, 6, 1); whatstr = i18n("If selected, you will be notified if you view a page" " that has both encrypted and non-encrypted parts."); TQWhatsThis::add(mWarnOnMixed, whatstr); #endif /////////////////////////////////////////////////////////////////////////// // SECOND TAB /////////////////////////////////////////////////////////////////////////// #ifdef HAVE_SSL tabOSSL = new TQFrame(this); TQBoxLayout *vbox = new TQVBoxLayout(tabOSSL, KDialog::marginHint(), KDialog::spacingHint()); oInfo = new TQVGroupBox(i18n("Path to OpenSSL Shared Libraries"), tabOSSL); vbox->addWidget(oInfo); oPath = new KURLRequester(oInfo); oPath->setMode(KFile::Directory); oTest = new TQPushButton(i18n("&Test"), oInfo); connect(oTest, TQT_SIGNAL(clicked()), TQT_SLOT(slotTestOSSL())); connect(oPath, TQT_SIGNAL(textChanged(const TQString&)), TQT_SLOT(configChanged())); // // Settings for the EGD // TQFrame *eFrame = new TQFrame(tabOSSL); TQVBoxLayout *egrid = new TQVBoxLayout(eFrame); mUseEGD = new TQCheckBox(i18n("Use EGD"), eFrame); connect(mUseEGD, TQT_SIGNAL(clicked()), TQT_SLOT(slotUseEGD())); mUseEFile = new TQCheckBox(i18n("Use entropy file"), eFrame); connect(mUseEFile, TQT_SIGNAL(clicked()), TQT_SLOT(slotUseEFile())); vbox->addWidget(eFrame); egrid->addWidget(mUseEGD); egrid->addWidget(mUseEFile); TQFrame *egdframe = new TQFrame(tabOSSL); TQGridLayout *grid2 = new TQGridLayout(egdframe, 2, 2, KDialog::marginHint(), KDialog::spacingHint()); mEGDLabel = new TQLabel(i18n("Path to EGD:"), egdframe); grid2->addWidget(mEGDLabel, 0, 0); mEGDPath = new KURLRequester(egdframe); grid2->addWidget(mEGDPath, 0, 1); connect(mEGDPath, TQT_SIGNAL(textChanged(const TQString&)), TQT_SLOT(configChanged())); vbox->addWidget(egdframe); whatstr = i18n("If selected, OpenSSL will be asked to use the entropy gathering" " daemon (EGD) for initializing the pseudo-random number generator."); TQWhatsThis::add(mUseEGD, whatstr); whatstr = i18n("If selected, OpenSSL will be asked to use the given file" " as entropy for initializing the pseudo-random number generator."); TQWhatsThis::add(mUseEFile, whatstr); whatstr = i18n("Enter the path to the socket created by the entropy gathering" " daemon (or the entropy file) here."); TQWhatsThis::add(mEGDPath, whatstr); whatstr = i18n("Click here to browse for the EGD socket file."); TQWhatsThis::add(mEGDPath, whatstr); vbox->addStretch(); #endif /////////////////////////////////////////////////////////////////////////// // THIRD TAB /////////////////////////////////////////////////////////////////////////// tabYourSSLCert = new TQFrame(this); #ifdef HAVE_SSL grid = new TQGridLayout(tabYourSSLCert, 16, 6, KDialog::marginHint(), KDialog::spacingHint() ); yourSSLBox = new TQListView(tabYourSSLCert); yourSSLBox->setAllColumnsShowFocus(true); whatstr = i18n("This list box shows which certificates of yours KDE" " knows about. You can easily manage them from here."); TQWhatsThis::add(yourSSLBox, whatstr); grid->addMultiCellWidget(yourSSLBox, 0, 5, 0, 4); yourSSLBox->addColumn(i18n("Common Name")); yourSSLBox->addColumn(i18n("Email Address")); connect(yourSSLBox, TQT_SIGNAL(selectionChanged()), TQT_SLOT(slotYourCertSelect())); yourSSLImport = new TQPushButton(i18n("I&mport..."), tabYourSSLCert); connect(yourSSLImport, TQT_SIGNAL(clicked()), TQT_SLOT(slotYourImport())); grid->addWidget(yourSSLImport, 0, 5); yourSSLExport = new TQPushButton(i18n("&Export..."), tabYourSSLCert); yourSSLExport->setEnabled(false); connect(yourSSLExport, TQT_SIGNAL(clicked()), TQT_SLOT(slotYourExport())); grid->addWidget(yourSSLExport, 1, 5); yourSSLRemove = new TQPushButton(i18n("Remo&ve"), tabYourSSLCert); yourSSLRemove->setEnabled(false); connect(yourSSLRemove, TQT_SIGNAL(clicked()), TQT_SLOT(slotYourRemove())); grid->addWidget(yourSSLRemove, 2, 5); yourSSLUnlock = new TQPushButton(i18n("&Unlock"), tabYourSSLCert); yourSSLUnlock->setEnabled(false); connect(yourSSLUnlock, TQT_SIGNAL(clicked()), TQT_SLOT(slotYourUnlock())); grid->addWidget(yourSSLUnlock, 3, 5); yourSSLVerify = new TQPushButton(i18n("Verif&y"), tabYourSSLCert); yourSSLVerify->setEnabled(false); connect(yourSSLVerify, TQT_SIGNAL(clicked()), TQT_SLOT(slotYourVerify())); grid->addWidget(yourSSLVerify, 4, 5); yourSSLPass = new TQPushButton(i18n("Chan&ge Password..."), tabYourSSLCert); yourSSLPass->setEnabled(false); connect(yourSSLPass, TQT_SIGNAL(clicked()), TQT_SLOT(slotYourPass())); grid->addWidget(yourSSLPass, 5, 5); grid->addMultiCellWidget(new KSeparator(KSeparator::HLine, tabYourSSLCert), 6, 6, 0, 5); ySubject = KSSLInfoDlg::certInfoWidget(tabYourSSLCert, TQString(TQString())); yIssuer = KSSLInfoDlg::certInfoWidget(tabYourSSLCert, TQString(TQString())); grid->addMultiCellWidget(ySubject, 7, 11, 0, 2); grid->addMultiCellWidget(yIssuer, 7, 11, 3, 5); whatstr = i18n("This is the information known about the owner of the certificate."); TQWhatsThis::add(ySubject, whatstr); whatstr = i18n("This is the information known about the issuer of the certificate."); TQWhatsThis::add(yIssuer, whatstr); grid->addWidget(new TQLabel(i18n("Valid from:"), tabYourSSLCert), 12, 0); grid->addWidget(new TQLabel(i18n("Valid until:"), tabYourSSLCert), 13, 0); yValidFrom = new TQLabel(tabYourSSLCert); grid->addWidget(yValidFrom, 12, 1); yValidUntil = new TQLabel(tabYourSSLCert); grid->addWidget(yValidUntil, 13, 1); whatstr = i18n("The certificate is valid starting at this date."); TQWhatsThis::add(yValidFrom, whatstr); whatstr = i18n("The certificate is valid until this date."); TQWhatsThis::add(yValidUntil, whatstr); grid->addWidget(new TQLabel(i18n("MD5 digest:"), tabYourSSLCert), 14, 0); yHash = new TQLabel(tabYourSSLCert); grid->addWidget(yHash, 14, 1); whatstr = i18n("A hash of the certificate used to identify it quickly."); TQWhatsThis::add(yHash, whatstr); #if 0 TQHButtonGroup *ocbg = new TQHButtonGroup(i18n("On SSL Connection..."), tabYourSSLCert); yourSSLUseDefault = new TQRadioButton(i18n("&Use default certificate"), ocbg); yourSSLList = new TQRadioButton(i18n("&List upon connection"), ocbg); yourSSLDont = new TQRadioButton(i18n("&Do not use certificates"), ocbg); grid->addMultiCellWidget(ocbg, 14, 14, 0, 5); #endif #else nossllabel = new TQLabel(i18n("SSL certificates cannot be managed" " because this module was not linked" " with OpenSSL."), tabYourSSLCert); grid->addMultiCellWidget(nossllabel, 3, 3, 0, 5); #endif /////////////////////////////////////////////////////////////////////////// // FOURTH TAB /////////////////////////////////////////////////////////////////////////// tabAuth = new TQFrame(this); #ifdef HAVE_SSL grid = new TQGridLayout(tabAuth, 20, 6, KDialog::marginHint(), KDialog::spacingHint()); grid->addMultiCellWidget(new TQLabel(i18n("Default Authentication Certificate"), tabAuth), 0, 0, 0, 2); defCertBG = new TQVButtonGroup(i18n("Default Action"), tabAuth); defSend = new TQRadioButton(i18n("&Send"), defCertBG); defPrompt = new TQRadioButton(i18n("&Prompt"), defCertBG); defDont = new TQRadioButton(i18n("Do ¬ send"), defCertBG); grid->addMultiCellWidget(defCertBG, 1, 3, 0, 2); grid->addMultiCellWidget(new TQLabel(i18n("Default certificate:"), tabAuth), 1, 1, 3, 5); defCertBox = new KComboBox(false, tabAuth); grid->addMultiCellWidget(defCertBox, 2, 2, 3, 5); grid->addMultiCellWidget(new KSeparator(KSeparator::HLine, tabAuth), 4, 4, 0, 5); grid->addMultiCellWidget(new TQLabel(i18n("Host authentication:"), tabAuth), 5, 5, 0, 1); hostAuthList = new TQListView(tabAuth); hostAuthList->setAllColumnsShowFocus(true); grid->addMultiCellWidget(hostAuthList, 6, 13, 0, 5); hostAuthList->addColumn(i18n("Host")); hostAuthList->addColumn(i18n("Certificate")); hostAuthList->addColumn(i18n("Policy")); grid->addWidget(new TQLabel(i18n("Host:"), tabAuth), 14, 0); grid->addWidget(new TQLabel(i18n("Certificate:"), tabAuth), 15, 0); authHost = new TQLineEdit(tabAuth); grid->addMultiCellWidget(authHost, 14, 14, 1, 4); hostCertBox = new KComboBox(false, tabAuth); grid->addMultiCellWidget(hostCertBox, 15, 15, 1, 4); hostCertBG = new TQHButtonGroup(i18n("Action"), tabAuth); hostSend = new TQRadioButton(i18n("Send"), hostCertBG); hostPrompt = new TQRadioButton(i18n("Prompt"), hostCertBG); hostDont = new TQRadioButton(i18n("Do not send"), hostCertBG); grid->addMultiCellWidget(hostCertBG, 16, 16, 0, 5); authAdd = new TQPushButton(i18n("Ne&w"), tabAuth); authRemove = new TQPushButton(i18n("Remo&ve"), tabAuth); grid->addWidget(authAdd, 17, 4); grid->addWidget(authRemove, 17, 5); authHost->setEnabled(false); hostCertBox->setEnabled(false); hostCertBG->setEnabled(false); authRemove->setEnabled(false); connect(defCertBox, TQT_SIGNAL(activated(int)), this, TQT_SLOT(configChanged())); connect(defCertBG, TQT_SIGNAL(clicked(int)), this, TQT_SLOT(configChanged())); connect(hostAuthList, TQT_SIGNAL(selectionChanged()), this, TQT_SLOT(slotAuthItemChanged())); connect(authAdd, TQT_SIGNAL(clicked()), this, TQT_SLOT(slotNewHostAuth())); connect(authRemove, TQT_SIGNAL(clicked()), this, TQT_SLOT(slotRemoveHostAuth())); connect(authHost, TQT_SIGNAL(textChanged(const TQString &)), this, TQT_SLOT(slotAuthText(const TQString &))); connect(hostCertBG, TQT_SIGNAL(clicked(int)), this, TQT_SLOT(slotAuthButtons())); connect(hostCertBox, TQT_SIGNAL(activated(int)), this, TQT_SLOT(slotAuthCombo())); #else nossllabel = new TQLabel(i18n("SSL certificates cannot be managed" " because this module was not linked" " with OpenSSL."), tabAuth); grid->addMultiCellWidget(nossllabel, 3, 3, 0, 5); #endif /////////////////////////////////////////////////////////////////////////// // FIFTH TAB /////////////////////////////////////////////////////////////////////////// tabOtherSSLCert = new TQFrame(this); #ifdef HAVE_SSL oGrid = grid = new TQGridLayout(tabOtherSSLCert, 21, 6, KDialog::marginHint(), KDialog::spacingHint()); otherSSLBox = new TQListView(tabOtherSSLCert); otherSSLBox->setAllColumnsShowFocus(true); connect(otherSSLBox, TQT_SIGNAL(selectionChanged()), TQT_SLOT(slotOtherCertSelect())); whatstr = i18n("This list box shows which site and person certificates KDE" " knows about. You can easily manage them from here."); TQWhatsThis::add(otherSSLBox, whatstr); otherSSLBox->addColumn(i18n("Organization")); otherSSLBox->addColumn(i18n("Common Name")); grid->addMultiCellWidget(otherSSLBox, 0, 7, 0, 4); otherSSLExport = new TQPushButton(i18n("&Export..."), tabOtherSSLCert); connect(otherSSLExport, TQT_SIGNAL(clicked()), TQT_SLOT(slotExportCert())); grid->addWidget(otherSSLExport, 0, 5); whatstr = i18n("This button allows you to export the selected certificate" " to a file of various formats."); TQWhatsThis::add(otherSSLExport, whatstr); otherSSLRemove = new TQPushButton(i18n("&Remove"), tabOtherSSLCert); connect(otherSSLRemove, TQT_SIGNAL(clicked()), TQT_SLOT(slotRemoveCert())); grid->addWidget(otherSSLRemove, 1, 5); whatstr = i18n("This button removes the selected certificate" " from the certificate cache."); TQWhatsThis::add(otherSSLRemove, whatstr); otherSSLVerify = new TQPushButton(i18n("&Verify"), tabOtherSSLCert); connect(otherSSLVerify, TQT_SIGNAL(clicked()), TQT_SLOT(slotVerifyCert())); grid->addWidget(otherSSLVerify, 2, 5); whatstr = i18n("This button tests the selected certificate" " for validity."); TQWhatsThis::add(otherSSLVerify, whatstr); otherSSLExport->setEnabled(false); otherSSLVerify->setEnabled(false); otherSSLRemove->setEnabled(false); grid->addMultiCellWidget(new KSeparator(KSeparator::HLine, tabOtherSSLCert), 8, 8, 0, 5); oSubject = KSSLInfoDlg::certInfoWidget(tabOtherSSLCert, TQString(TQString())); oIssuer = KSSLInfoDlg::certInfoWidget(tabOtherSSLCert, TQString(TQString())); grid->addMultiCellWidget(oSubject, 9, 13, 0, 2); grid->addMultiCellWidget(oIssuer, 9, 13, 3, 5); whatstr = i18n("This is the information known about the owner of the certificate."); TQWhatsThis::add(oSubject, whatstr); whatstr = i18n("This is the information known about the issuer of the certificate."); TQWhatsThis::add(oIssuer, whatstr); fromLabel = new TQLabel(i18n("Valid from:"), tabOtherSSLCert); untilLabel = new TQLabel(i18n("Valid until:"), tabOtherSSLCert); grid->addWidget(fromLabel, 14, 0); grid->addWidget(untilLabel, 15, 0); fromLabel->setEnabled(false); untilLabel->setEnabled(false); validFrom = new TQLabel(tabOtherSSLCert); grid->addWidget(validFrom, 14, 1); validUntil = new TQLabel(tabOtherSSLCert); grid->addWidget(validUntil, 15, 1); whatstr = i18n("The certificate is valid starting at this date."); TQWhatsThis::add(validFrom, whatstr); whatstr = i18n("The certificate is valid until this date."); TQWhatsThis::add(validUntil, whatstr); cacheGroup = new TQVButtonGroup(i18n("Cache"), tabOtherSSLCert); cachePerm = new TQRadioButton(i18n("Permanentl&y"), cacheGroup); cacheUntil = new TQRadioButton(i18n("&Until"), cacheGroup); untilDate = new KURLLabel(TQString(), TQString(), cacheGroup); cacheGroup->setEnabled(false); grid->addMultiCellWidget(cacheGroup, 16, 19, 0, 2); cachePerm->setEnabled(false); cacheUntil->setEnabled(false); untilDate->setEnabled(false); connect(cachePerm, TQT_SIGNAL(clicked()), TQT_SLOT(slotPermanent())); connect(cacheUntil, TQT_SIGNAL(clicked()), TQT_SLOT(slotUntil())); connect(untilDate, TQT_SIGNAL(leftClickedURL()), TQT_SLOT(slotDatePick())); whatstr = i18n("Select here to make the cache entry permanent."); TQWhatsThis::add(cachePerm, whatstr); whatstr = i18n("Select here to make the cache entry temporary."); TQWhatsThis::add(cacheUntil, whatstr); whatstr = i18n("The date and time until the certificate cache entry should expire."); TQWhatsThis::add(untilDate, whatstr); policyGroup = new TQVButtonGroup(i18n("Policy"), tabOtherSSLCert); policyAccept = new TQRadioButton(i18n("Accep&t"), policyGroup); policyReject = new TQRadioButton(i18n("Re&ject"), policyGroup); policyPrompt = new TQRadioButton(i18n("&Prompt"), policyGroup); policyGroup->setEnabled(false); grid->addMultiCellWidget(policyGroup, 16, 19, 3, 5); connect(policyGroup, TQT_SIGNAL(clicked(int)), TQT_SLOT(slotPolicyChanged(int))); whatstr = i18n("Select this to always accept this certificate."); TQWhatsThis::add(policyAccept, whatstr); whatstr = i18n("Select this to always reject this certificate."); TQWhatsThis::add(policyReject, whatstr); whatstr = i18n("Select this if you wish to be prompted for action when receiving this certificate."); TQWhatsThis::add(policyPrompt, whatstr); grid->addWidget(new TQLabel(i18n("MD5 digest:"), tabOtherSSLCert), 20, 0); pHash = new TQLabel(tabOtherSSLCert); grid->addWidget(pHash, 20, 1); whatstr = i18n("A hash of the certificate used to identify it quickly."); TQWhatsThis::add(pHash, whatstr); #else nossllabel = new TQLabel(i18n("SSL certificates cannot be managed" " because this module was not linked" " with OpenSSL."), tabOtherSSLCert); grid->addMultiCellWidget(nossllabel, 1, 1, 0, 1); #endif /////////////////////////////////////////////////////////////////////////// // SIXTH TAB /////////////////////////////////////////////////////////////////////////// tabSSLCA = new TQFrame(this); #ifdef HAVE_SSL grid = new TQGridLayout(tabSSLCA, 11, 8, KDialog::marginHint(), KDialog::spacingHint()); caList = new TQListView(tabSSLCA); caList->setAllColumnsShowFocus(true); whatstr = i18n("This list box shows which certificate authorities KDE" " knows about. You can easily manage them from here."); TQWhatsThis::add(caList, whatstr); grid->addMultiCellWidget(caList, 0, 3, 0, 6); caList->addColumn(i18n("Organization")); caList->addColumn(i18n("Organizational Unit")); caList->addColumn(i18n("Common Name")); connect(caList, TQT_SIGNAL(selectionChanged()), TQT_SLOT(slotCAItemChanged())); caSSLImport = new TQPushButton(i18n("I&mport..."), tabSSLCA); connect(caSSLImport, TQT_SIGNAL(clicked()), TQT_SLOT(slotCAImport())); grid->addWidget(caSSLImport, 0, 7); caSSLRemove = new TQPushButton(i18n("&Remove"), tabSSLCA); connect(caSSLRemove, TQT_SIGNAL(clicked()), TQT_SLOT(slotCARemove())); grid->addWidget(caSSLRemove, 1, 7); caSSLRemove->setEnabled(false); caSSLRestore = new TQPushButton(i18n("Res&tore"), tabSSLCA); connect(caSSLRestore, TQT_SIGNAL(clicked()), TQT_SLOT(slotCARestore())); grid->addWidget(caSSLRestore, 2, 7); caSubject = KSSLInfoDlg::certInfoWidget(tabSSLCA, TQString(TQString())); caIssuer = KSSLInfoDlg::certInfoWidget(tabSSLCA, TQString(TQString())); grid->addMultiCellWidget(caSubject, 4, 6, 0, 3); grid->addMultiCellWidget(caIssuer, 4, 6, 4, 7); // Accept for Web Site Signing, Email Signing, Code Signing caSite = new TQCheckBox(i18n("Accept for site signing"), tabSSLCA); caEmail = new TQCheckBox(i18n("Accept for email signing"), tabSSLCA); caCode = new TQCheckBox(i18n("Accept for code signing"), tabSSLCA); grid->addMultiCellWidget(caSite, 7, 7, 0, 3); connect(caSite, TQT_SIGNAL(clicked()), TQT_SLOT(slotCAChecked())); grid->addMultiCellWidget(caEmail, 8, 8, 0, 3); connect(caEmail, TQT_SIGNAL(clicked()), TQT_SLOT(slotCAChecked())); grid->addMultiCellWidget(caCode, 9, 9, 0, 3); connect(caCode, TQT_SIGNAL(clicked()), TQT_SLOT(slotCAChecked())); caSite->setEnabled(false); caEmail->setEnabled(false); caCode->setEnabled(false); grid->addWidget(new TQLabel(i18n("MD5 digest:"), tabSSLCA), 10, 0); cHash = new TQLabel(tabSSLCA); grid->addWidget(cHash, 10, 1); whatstr = i18n("A hash of the certificate used to identify it quickly."); TQWhatsThis::add(cHash, whatstr); #else nossllabel = new TQLabel(i18n("SSL certificates cannot be managed" " because this module was not linked" " with OpenSSL."), tabSSLCA); grid->addMultiCellWidget(nossllabel, 1, 1, 0, 1); #endif #if 0 /////////////////////////////////////////////////////////////////////////// // SEVENTH TAB /////////////////////////////////////////////////////////////////////////// tabSSLCOpts = new TQFrame(this); #ifdef HAVE_SSL grid = new TQGridLayout(tabSSLCOpts, 9, 4, KDialog::marginHint(), KDialog::spacingHint()); mWarnSelfSigned = new TQCheckBox(i18n("Warn on &self-signed certificates or unknown CA's"), tabSSLCOpts); connect(mWarnSelfSigned, TQT_SIGNAL(clicked()), TQT_SLOT(configChanged())); mWarnExpired = new TQCheckBox(i18n("Warn on &expired certificates"), tabSSLCOpts); connect(mWarnExpired, TQT_SIGNAL(clicked()), TQT_SLOT(configChanged())); mWarnRevoked = new TQCheckBox(i18n("Warn on re&voked certificates"), tabSSLCOpts); connect(mWarnRevoked, TQT_SIGNAL(clicked()), TQT_SLOT(configChanged())); grid->addMultiCellWidget(mWarnSelfSigned, 0, 0, 0, 3); grid->addMultiCellWidget(mWarnExpired, 1, 1, 0, 3); grid->addMultiCellWidget(mWarnRevoked, 2, 2, 0, 3); macCert = new TQLineEdit(tabSSLCOpts); grid->addMultiCellWidget(macCert, 4, 4, 0, 2); macBox = new TQListBox(tabSSLCOpts); whatstr = i18n("This list box shows which sites you have decided to accept" " a certificate from even though the certificate might fail" " the validation procedure."); TQWhatsThis::add(macBox, whatstr); caSSLBox->setSelectionMode(TQListBox::Single); caSSLBox->setColumnMode(TQListBox::FixedNumber); grid->addMultiCellWidget(macBox, 5, 8, 0, 2); macAdd = new TQPushButton(i18n("&Add"), tabSSLCOpts); //connect(macAdd, TQT_SIGNAL(), TQT_SLOT()); grid->addWidget(macAdd, 4, 3); macRemove = new TQPushButton(i18n("&Remove"), tabSSLCOpts); //connect(macRemove, TQT_SIGNAL(), TQT_SLOT()); grid->addWidget(macRemove, 5, 3); macClear = new KPushButton(KGuiItem::clear(), tabSSLCOpts); //connect(macAdd, TQT_SIGNAL(), TQT_SLOT()); grid->addWidget(macClear, 6, 3); #else nossllabel = new TQLabel(i18n("These options are not configurable" " because this module was not linked" " with OpenSSL."), tabSSLCOpts); grid->addMultiCellWidget(nossllabel, 1, 1, 0, 1); #endif #endif /////////////////////////////////////////////////////////////////////////// // Add the tabs and startup /////////////////////////////////////////////////////////////////////////// tabs->addTab(tabSSL, i18n("SSL")); #ifdef HAVE_SSL tabs->addTab(tabOSSL, i18n("OpenSSL")); #endif tabs->addTab(tabYourSSLCert, i18n("Your Certificates")); tabs->addTab(tabAuth, i18n("Authentication")); tabs->addTab(tabOtherSSLCert, i18n("Peer SSL Certificates")); tabs->addTab(tabSSLCA, i18n("SSL Signers")); #if 0 tabs->addTab(tabSSLCOpts, i18n("Validation Options")); #endif tabs->resize(tabs->sizeHint()); load(); } KCryptoConfig::~KCryptoConfig() { delete config; delete policies; delete pcerts; delete authcfg; delete _signers; } void KCryptoConfig::configChanged() { emit changed(true); } void KCryptoConfig::load() { load( false ); } void KCryptoConfig::load( bool useDefaults ) { config->setReadDefaults( useDefaults ); #ifdef HAVE_SSL otherCertDelList.clear(); yourCertDelList.clear(); authDelList.clear(); caDelList.clear(); config->setGroup("TLS"); mUseTLS->setChecked(config->readBoolEntry("Enabled", true)); config->setGroup("SSLv2"); mUseSSLv2->setChecked(config->readBoolEntry("Enabled", true)); #ifdef OPENSSL_NO_SSL2 mUseSSLv2->setChecked(false); mUseSSLv2->setEnabled(false); #endif config->setGroup("SSLv3"); mUseSSLv3->setChecked(config->readBoolEntry("Enabled", true)); config->setGroup("Warnings"); mWarnOnEnter->setChecked(config->readBoolEntry("OnEnter", false)); mWarnOnLeave->setChecked(config->readBoolEntry("OnLeave", true)); mWarnOnUnencrypted->setChecked(config->readBoolEntry("OnUnencrypted", true)); #if 0 // NOT IMPLEMENTED IN KDE 2.0 mWarnOnMixed->setChecked(config->readBoolEntry("OnMixed", true)); config->setGroup("Validation"); mWarnSelfSigned->setChecked(config->readBoolEntry("WarnSelfSigned", true)); mWarnExpired->setChecked(config->readBoolEntry("WarnExpired", true)); mWarnRevoked->setChecked(config->readBoolEntry("WarnRevoked", true)); #endif config->setGroup("EGD"); slotUseEGD(); // set the defaults if (config->readBoolEntry("UseEGD", false)) { mUseEGD->setChecked(true); slotUseEGD(); } else if (config->readBoolEntry("UseEFile", false)) { mUseEFile->setChecked(true); slotUseEFile(); } mEGDPath->setURL(config->readPathEntry("EGDPath")); #ifdef HAVE_SSL config->setGroup("OpenSSL"); oPath->setURL(config->readPathEntry("Path")); #endif config->setGroup("SSLv2"); CipherItem *item = static_cast(SSLv2Box->firstChild()); while ( item ) { item->setOn(config->readBoolEntry(item->configName(), item->bits() >= 56)); item = static_cast(item->nextSibling()); } config->setGroup("SSLv3"); item = static_cast(SSLv3Box->firstChild()); while ( item ) { item->setOn(config->readBoolEntry(item->configName(), item->bits() >= 56)); item = static_cast(item->nextSibling()); } #ifdef OPENSSL_NO_SSL2 SSLv2Box->setEnabled( false ); #else SSLv2Box->setEnabled( mUseSSLv2->isChecked() ); #endif SSLv3Box->setEnabled( mUseSSLv3->isChecked() ); TQStringList groups = policies->groupList(); otherSSLBox->clear(); for (TQStringList::Iterator i = groups.begin(); i != groups.end(); ++i) { if ((*i).isEmpty() || *i == "" || *i == "General") continue; policies->setGroup(*i); KSSLCertificate *cert = KSSLCertificate::fromString(policies->readEntry("Certificate", TQString()).local8Bit()); if (cert) { new OtherCertItem(otherSSLBox, cert->getSubject(), *i, policies->readBoolEntry("Permanent", true), policies->readNumEntry("Policy", 3), policies->readDateTimeEntry("Expires"), this ); delete cert; } } groups = pcerts->groupList(); yourSSLBox->clear(); for (TQStringList::Iterator i = groups.begin(); i != groups.end(); ++i) { if ((*i).isEmpty() || *i == "") continue; pcerts->setGroup(*i); YourCertItem *j = new YourCertItem(yourSSLBox, pcerts->readEntry("PKCS12Base64"), pcerts->readEntry("Password"), *i, this ); j->setPassCache(TQString()); } setAuthCertLists(); config->setGroup("Auth"); TQString whichAuth = config->readEntry("AuthMethod", "none"); if (whichAuth == "send") defCertBG->setButton(defCertBG->id(defSend)); else if (whichAuth == "prompt") defCertBG->setButton(defCertBG->id(defPrompt)); else defCertBG->setButton(defCertBG->id(defDont)); TQString whichCert = config->readEntry("DefaultCert"); defCertBox->setCurrentItem(0); for (int i = 0; i < defCertBox->count(); i++) { if (defCertBox->text(i) == whichCert) { defCertBox->setCurrentItem(i); break; } } hostAuthList->clear(); groups = authcfg->groupList(); for (TQStringList::Iterator i = groups.begin(); i != groups.end(); ++i) { if ((*i).isEmpty() || *i == "") continue; authcfg->setGroup(*i); KSSLCertificateHome::KSSLAuthAction aa = KSSLCertificateHome::AuthDont; if (authcfg->readBoolEntry("send", false) == true) aa = KSSLCertificateHome::AuthSend; else if (authcfg->readBoolEntry("prompt", false) == true) aa = KSSLCertificateHome::AuthPrompt; HostAuthItem *j = new HostAuthItem(hostAuthList, KResolver::domainToAscii(*i), authcfg->readEntry("certificate"), this ); j->setAction(aa); j->setOriginalName(*i); } groups = _signers->list(); KConfig sigcfg("ksslcalist", true, false); caList->clear(); for (TQStringList::Iterator i = groups.begin(); i != groups.end(); ++i) { if ((*i).isEmpty() || *i == "") continue; if (!sigcfg.hasGroup(*i)) continue; sigcfg.setGroup(*i); if (!sigcfg.hasKey("x509")) continue; new CAItem(caList, (*i), sigcfg.readEntry("x509"), sigcfg.readBoolEntry("site", false), sigcfg.readBoolEntry("email", false), sigcfg.readBoolEntry("code", false), this ); } slotCAItemChanged(); slotOtherCertSelect(); slotYourCertSelect(); #endif emit changed( useDefaults ); } void KCryptoConfig::save() { #ifdef HAVE_SSL if (!mUseSSLv2->isChecked() && !mUseSSLv3->isChecked()) KMessageBox::information(this, i18n("If you do not select at least one" " SSL algorithm, either SSL will not" " work or the application may be" " forced to choose a suitable default."), i18n("SSL")); config->setGroup("TLS"); config->writeEntry("Enabled", mUseTLS->isChecked()); config->setGroup("SSLv2"); #ifdef OPENSSL_NO_SSL2 config->writeEntry("Enabled", false); #else config->writeEntry("Enabled", mUseSSLv2->isChecked()); #endif config->setGroup("SSLv3"); config->writeEntry("Enabled", mUseSSLv3->isChecked()); config->setGroup("Warnings"); config->writeEntry("OnEnter", mWarnOnEnter->isChecked()); config->writeEntry("OnLeave", mWarnOnLeave->isChecked()); config->writeEntry("OnUnencrypted", mWarnOnUnencrypted->isChecked()); config->setGroup("EGD"); config->writeEntry("UseEGD", mUseEGD->isChecked()); config->writeEntry("UseEFile", mUseEFile->isChecked()); config->writePathEntry("EGDPath", mEGDPath->url()); #if 0 // NOT IMPLEMENTED IN KDE 2.0 config->writeEntry("OnMixed", mWarnOnMixed->isChecked()); config->setGroup("Validation"); config->writeEntry("WarnSelfSigned", mWarnSelfSigned->isChecked()); config->writeEntry("WarnExpired", mWarnExpired->isChecked()); config->writeEntry("WarnRevoked", mWarnRevoked->isChecked()); #endif #ifdef HAVE_SSL config->setGroup("OpenSSL"); config->writePathEntry("Path", oPath->url()); #endif int ciphercount = 0; config->setGroup("SSLv2"); CipherItem *item = static_cast(SSLv2Box->firstChild()); while ( item ) { if (item->isOn()) { config->writeEntry(item->configName(), true); ciphercount++; } else config->writeEntry(item->configName(), false); item = static_cast(item->nextSibling()); } if (mUseSSLv2->isChecked() && ciphercount == 0) KMessageBox::information(this, i18n("If you do not select at least one" " cipher, SSLv2 will not work."), i18n("SSLv2 Ciphers")); ciphercount = 0; config->setGroup("SSLv3"); item = static_cast(SSLv3Box->firstChild()); while ( item ) { if (item->isOn()) { config->writeEntry(item->configName(), true); ciphercount++; } else config->writeEntry(item->configName(), false); item = static_cast(item->nextSibling()); } KSSLCertificateCache _cc; if (mUseSSLv3->isChecked() && ciphercount == 0) KMessageBox::information(this, i18n("If you do not select at least one" " cipher, SSLv3 will not work."), i18n("SSLv3 Ciphers")); // SSL Policies code for (OtherCertItem *x = otherCertDelList.first(); x != 0; x = otherCertDelList.next()) { KSSLX509Map cert(x->configName()); TQString thisCN = cert.getValue("CN"); _cc.removeByCN(thisCN); otherCertDelList.remove(x); } // Go through the non-deleted ones and save them for (OtherCertItem *x = static_cast(otherSSLBox->firstChild()); x; x = static_cast(x->nextSibling())) { KSSLX509Map cert(x->configName()); TQString thisCN = cert.getValue("CN"); TQDateTime expires = x->getExpires(); _cc.modifyByCN(thisCN, (KSSLCertificateCache::KSSLCertificatePolicy)x->getPolicy(), x->isPermanent(), expires); } // SSL Personal certificates code for (YourCertItem *x = yourCertDelList.first(); x != 0; x = yourCertDelList.next()) { pcerts->deleteGroup(x->configName()); yourCertDelList.remove(x); } // Go through the non-deleted ones and save them for (YourCertItem *x = static_cast(yourSSLBox->firstChild()); x; x = static_cast(x->nextSibling())) { pcerts->setGroup(x->configName()); pcerts->writeEntry("PKCS12Base64", x->getPKCS()); pcerts->writeEntry("Password", x->getPass()); } bool doGen = false; // CA certificates code for (CAItem *x = caDelList.first(); x != 0; x = caDelList.next()) { _signers->remove(x->configName()); caDelList.remove(x); doGen = true; } // Go through the non-deleted ones and save them for (CAItem *x = static_cast(caList->firstChild()); x; x = static_cast(x->nextSibling())) { if (!x->modified && !x->isNew) continue; if (x->isNew) { x->isNew = false; _signers->addCA(x->getCert(), x->getSite(), x->getEmail(), x->getCode()); } else { _signers->setUse(x->configName(), x->getSite(), x->getEmail(), x->getCode()); } x->modified = false; doGen = true; } if (doGen) genCAList(); config->setGroup("Auth"); TQString whichAuth = config->readEntry("AuthMethod", "none"); if (defCertBG->selected() == defSend) config->writeEntry("AuthMethod", "send"); else if (defCertBG->selected() == defPrompt) config->writeEntry("AuthMethod", "prompt"); else config->writeEntry("AuthMethod", "none"); if (defCertBox->currentItem() == 0) config->writeEntry("DefaultCert", TQString()); else config->writeEntry("DefaultCert", defCertBox->currentText()); for (HostAuthItem *x = authDelList.first(); x != 0; x = authDelList.next()) { authcfg->deleteGroup(x->configName()); authDelList.remove(x); } for (HostAuthItem *x = static_cast(hostAuthList->firstChild()); x; x = static_cast(x->nextSibling())) { if (!x->originalName().isNull()) authcfg->deleteGroup(x->originalName()); } for (HostAuthItem *x = static_cast(hostAuthList->firstChild()); x; x = static_cast(x->nextSibling())) { authcfg->setGroup(KResolver::domainToAscii(x->configName())); authcfg->writeEntry("certificate", x->getCertName()); authcfg->writeEntry("prompt", (x->getAction() == KSSLCertificateHome::AuthPrompt)); authcfg->writeEntry("send", (x->getAction() == KSSLCertificateHome::AuthSend)); } #endif config->sync(); policies->sync(); pcerts->sync(); authcfg->sync(); // insure proper permissions -- contains sensitive data TQString cfgName(KGlobal::dirs()->findResource("config", "cryptodefaults")); if (!cfgName.isEmpty()) ::chmod(TQFile::encodeName(cfgName), 0600); emit changed(false); } void KCryptoConfig::defaults() { load( true ); } void KCryptoConfig::genCAList() { _signers->regenerate(); } void KCryptoConfig::slotSelectCipher(int id) { switch(id) { case 1: cwCompatible(); break; case 2: cwUS(); break; case 3: cwExp(); break; case 4: cwAll(); } } void KCryptoConfig::cwCompatible() { #ifdef HAVE_SSL CipherItem *item; for ( item = static_cast(SSLv2Box->firstChild()); item; item = static_cast(item->nextSibling()) ) { item->setOn( item->bits() >= 56 && item->bits() <= 128 ); } for ( item = static_cast(SSLv3Box->firstChild()); item; item = static_cast(item->nextSibling()) ) { item->setOn( item->bits() >= 56 && item->bits() <= 128 ); } mUseTLS->setChecked(true); #ifdef OPENSSL_NO_SSL2 mUseSSLv2->setChecked(false); #else mUseSSLv2->setChecked(true); #endif mUseSSLv3->setChecked(true); configChanged(); #endif } void KCryptoConfig::cwUS() { #ifdef HAVE_SSL CipherItem *item; for ( item = static_cast(SSLv2Box->firstChild()); item; item = static_cast(item->nextSibling()) ) { item->setOn( item->bits() >= 128 ); } for ( item = static_cast(SSLv3Box->firstChild()); item; item = static_cast(item->nextSibling()) ) { item->setOn( item->bits() >= 128 ); } configChanged(); #endif } void KCryptoConfig::cwExp() { #ifdef HAVE_SSL CipherItem *item; for ( item = static_cast(SSLv2Box->firstChild()); item; item = static_cast(item->nextSibling()) ) { item->setOn( item->bits() <= 56 && item->bits() > 0); } for ( item = static_cast(SSLv3Box->firstChild()); item; item = static_cast(item->nextSibling()) ) { item->setOn( item->bits() <= 56 && item->bits() > 0); } configChanged(); #endif } void KCryptoConfig::cwAll() { #ifdef HAVE_SSL CipherItem *item; for ( item = static_cast(SSLv2Box->firstChild()); item; item = static_cast(item->nextSibling()) ) { item->setOn( true ); } for ( item = static_cast(SSLv3Box->firstChild()); item; item = static_cast(item->nextSibling()) ) { item->setOn( true ); } mUseTLS->setChecked(true); #ifdef OPENSSL_NO_SSL2 mUseSSLv2->setChecked(false); #else mUseSSLv2->setChecked(true); #endif mUseSSLv3->setChecked(true); configChanged(); #endif } void KCryptoConfig::slotExportCert() { OtherCertItem *x = static_cast(otherSSLBox->selectedItem()); if (x) { policies->setGroup(x->getMD5()); KSSLCertificate *cert = KSSLCertificate::fromString(policies->readEntry("Certificate", TQString()).local8Bit()); if (cert) { KCertExport kce; kce.setCertificate(cert); kce.exec(); delete cert; } else KMessageBox::sorry(this, i18n("Could not open the certificate."), i18n("SSL")); } } void KCryptoConfig::slotRemoveCert() { TQListViewItem *act = otherSSLBox->selectedItem(); OtherCertItem *x = static_cast(act); if (x) { TQListViewItem *next = act->itemBelow(); if (!next) next = act->itemAbove(); otherSSLBox->takeItem(x); otherCertDelList.append(x); configChanged(); if (next) otherSSLBox->setSelected(next, true); } } void KCryptoConfig::slotVerifyCert() { OtherCertItem *x = static_cast(otherSSLBox->selectedItem()); if (!x) return; policies->setGroup(x->getMD5()); KSSLCertificate *cert = KSSLCertificate::fromString(policies->readEntry("Certificate", TQString()).local8Bit()); if (!cert) { KMessageBox::error(this, i18n("Error obtaining the certificate."), i18n("SSL")); return; } cert->chain().setCertChain(policies->readListEntry("Chain")); KSSLCertificate::KSSLValidation v = cert->revalidate(KSSLCertificate::SSLServer); /* * Don't enable this until we keep this info in the cache if (v != KSSLCerticiate::Ok) v = cert->revalidate(KSSLCertificate::SMIMESign); if (v != KSSLCerticiate::Ok) v = cert->revalidate(KSSLCertificate::SMIMEEncrypt); */ if (v == KSSLCertificate::Ok) { KMessageBox::information(this, i18n("This certificate passed the verification tests successfully."), i18n("SSL")); } else { KMessageBox::detailedError(this, i18n("This certificate has failed the tests and should be considered invalid."), KSSLCertificate::verifyText(v), i18n("SSL")); } delete cert; } void KCryptoConfig::slotUntil() { OtherCertItem *x = static_cast(otherSSLBox->selectedItem()); cachePerm->setChecked(false); untilDate->setEnabled(true); if (!x) return; x->setPermanent(false); configChanged(); } void KCryptoConfig::slotPermanent() { OtherCertItem *x = static_cast(otherSSLBox->selectedItem()); cacheUntil->setChecked(false); untilDate->setEnabled(false); if (!x) return; x->setPermanent(true); configChanged(); } void KCryptoConfig::slotPolicyChanged(int id) { OtherCertItem *x = static_cast(otherSSLBox->selectedItem()); if (!x) return; if (id == policyGroup->id(policyAccept)) { x->setPolicy(KSSLCertificateCache::Accept); } else if (id == policyGroup->id(policyReject)) { x->setPolicy(KSSLCertificateCache::Reject); } else if (id == policyGroup->id(policyPrompt)) { x->setPolicy(KSSLCertificateCache::Prompt); } configChanged(); } void KCryptoConfig::slotDatePick() { KDateTimeDlg kdtd; OtherCertItem *x = static_cast(otherSSLBox->selectedItem()); if (!x || !untilDate->isEnabled()) return; TQDateTime qdt = x->getExpires(); kdtd.setDateTime(qdt); int rc = kdtd.exec(); if (rc == KDialog::Accepted) { x->setExpires(kdtd.getDateTime()); untilDate->setText(KGlobal::locale()->formatDateTime(x->getExpires())); configChanged(); } } void KCryptoConfig::slotOtherCertSelect() { OtherCertItem *x = static_cast(otherSSLBox->selectedItem()); TQString iss = TQString(); if (x) { otherSSLExport->setEnabled(true); otherSSLVerify->setEnabled(true); otherSSLRemove->setEnabled(true); fromLabel->setEnabled(true); untilLabel->setEnabled(true); policyGroup->setEnabled(true); cacheGroup->setEnabled(true); cachePerm->setEnabled(true); cacheUntil->setEnabled(true); policies->setGroup(x->getMD5()); KSSLCertificate *cert = KSSLCertificate::fromString(policies->readEntry("Certificate", TQString()).local8Bit()); if (cert) { TQPalette cspl; iss = cert->getIssuer(); cspl = validFrom->palette(); if (TQDateTime::currentDateTime(Qt::UTC) < cert->getQDTNotBefore()) { cspl.setColor(TQColorGroup::Foreground, TQColor(196,33,21)); } else { cspl.setColor(TQColorGroup::Foreground, TQColor(42,153,59)); } validFrom->setPalette(cspl); cspl = validUntil->palette(); if (TQDateTime::currentDateTime(Qt::UTC) > cert->getQDTNotAfter()) { cspl.setColor(TQColorGroup::Foreground, TQColor(196,33,21)); } else { cspl.setColor(TQColorGroup::Foreground, TQColor(42,153,59)); } validUntil->setPalette(cspl); validFrom->setText(cert->getNotBefore()); validUntil->setText(cert->getNotAfter()); untilDate->setText(x ? KGlobal::locale()->formatDateTime(x->getExpires()) : KGlobal::locale()->formatDateTime(TQDateTime::currentDateTime(Qt::UTC))); untilDate->setEnabled(x && !x->isPermanent()); pHash->setText(cert->getMD5DigestText()); delete cert; } else { validFrom->setText(TQString()); validUntil->setText(TQString()); pHash->clear(); } switch(x->getPolicy()) { case KSSLCertificateCache::Accept: policyGroup->setButton(policyGroup->id(policyAccept)); break; case KSSLCertificateCache::Reject: policyGroup->setButton(policyGroup->id(policyReject)); break; case KSSLCertificateCache::Prompt: policyGroup->setButton(policyGroup->id(policyPrompt)); break; } cachePerm->setChecked(x->isPermanent()); cacheUntil->setChecked(!x->isPermanent()); } else { otherSSLExport->setEnabled(false); otherSSLVerify->setEnabled(false); otherSSLRemove->setEnabled(false); fromLabel->setEnabled(false); untilLabel->setEnabled(false); policyGroup->setEnabled(false); cacheGroup->setEnabled(false); cachePerm->setChecked(false); cacheUntil->setChecked(false); policyAccept->setChecked(false); policyReject->setChecked(false); policyPrompt->setChecked(false); cachePerm->setEnabled(false); cacheUntil->setEnabled(false); validFrom->setText(TQString()); validUntil->setText(TQString()); untilDate->setText(TQString()); untilDate->setEnabled(false); pHash->clear(); } oSubject->setValues(x ? x->getSub() : TQString(TQString())); oIssuer->setValues(iss); } void KCryptoConfig::slotYourImport() { TQString certFile = KFileDialog::getOpenFileName(TQString(), "application/x-pkcs12"); if (certFile.isEmpty()) return; #ifdef HAVE_SSL KSSLPKCS12 *cert = NULL; TQCString pass; TryImportPassAgain: int rc = KPasswordDialog::getPassword(pass, i18n("Certificate password")); if (rc != KPasswordDialog::Accepted) return; cert = KSSLPKCS12::loadCertFile(certFile, TQString(pass)); if (!cert) { rc = KMessageBox::warningYesNo(this, i18n("The certificate file could not be loaded. Try a different password?"), i18n("SSL"),i18n("Try"),i18n("Do Not Try")); if (rc == KMessageBox::Yes) goto TryImportPassAgain; return; } // At this point, we know that we can read the certificate in. // The procedure will be to convert it to Base64 in it's raw form // and add it to the ListView - eventually going into the SimpleConfig. // FIXME: prompt if the user wants the password stored along with the // certificate TQString name = cert->getCertificate()->getSubject(); for (YourCertItem *i = static_cast(yourSSLBox->firstChild()); i; i = static_cast(i->nextSibling())) { if (i->configName() == name) { rc = KMessageBox::warningContinueCancel(this, i18n("A certificate with that name already exists. Are you sure that you wish to replace it?"), i18n("SSL"), i18n("Replace")); if (rc == KMessageBox::Cancel) { delete cert; return; } yourSSLBox->takeItem(i); yourCertDelList.append(i); } } new YourCertItem(yourSSLBox, cert->toString(), TQString(), // the password - don't store it yet! name, this ); setAuthCertLists(); configChanged(); delete cert; #endif offerImportToKMail( certFile ); } void KCryptoConfig::slotYourExport() { YourCertItem *x = static_cast(yourSSLBox->selectedItem()); if (!x) return; KSSLPKCS12 *pkcs = KSSLPKCS12::fromString(x->getPKCS(), x->getPass()); if (!pkcs) pkcs = KSSLPKCS12::fromString(x->getPKCS(), x->getPassCache()); if (!pkcs) { TQString pprompt = i18n("Enter the certificate password:"); TQCString oldpass; do { int i = KPasswordDialog::getPassword(oldpass, pprompt); if (i != KPasswordDialog::Accepted) return; pkcs = KSSLPKCS12::fromString(x->getPKCS(), oldpass); pprompt = i18n("Decoding failed. Please try again:"); } while (!pkcs); x->setPassCache(oldpass); slotYourUnlock(); } // For now, we will only export to PKCS#12 TQString certFile = KFileDialog::getSaveFileName(TQString(), "application/x-pkcs12"); if (certFile.isEmpty()) return; if (!pkcs->toFile(certFile)) KMessageBox::sorry(this, i18n("Export failed."), i18n("SSL")); } void KCryptoConfig::slotYourVerify() { YourCertItem *x = static_cast(yourSSLBox->selectedItem()); TQString iss; if (!x) return; KSSLPKCS12 *pkcs = KSSLPKCS12::fromString(x->getPKCS(), x->getPass()); if (!pkcs) pkcs = KSSLPKCS12::fromString(x->getPKCS(), x->getPassCache()); if (!pkcs) { TQString pprompt = i18n("Enter the certificate password:"); TQCString oldpass; do { int i = KPasswordDialog::getPassword(oldpass, pprompt); if (i != KPasswordDialog::Accepted) return; pkcs = KSSLPKCS12::fromString(x->getPKCS(), oldpass); pprompt = i18n("Decoding failed. Please try again:"); } while (!pkcs); x->setPassCache(oldpass); slotYourUnlock(); } KSSLCertificate::KSSLValidation v = pkcs->revalidate(KSSLCertificate::SSLClient); if (v != KSSLCertificate::Ok) v = pkcs->revalidate(KSSLCertificate::SMIMEEncrypt); if (v != KSSLCertificate::Ok) v = pkcs->revalidate(KSSLCertificate::SMIMESign); if (v == KSSLCertificate::Ok) { KMessageBox::information(this, i18n("This certificate passed the verification tests successfully."), i18n("SSL")); } else { KMessageBox::detailedError(this, i18n("This certificate has failed the tests and should be considered invalid."), KSSLCertificate::verifyText(v), i18n("SSL")); } delete pkcs; } void KCryptoConfig::slotYourRemove() { YourCertItem *x = static_cast(yourSSLBox->selectedItem()); if (x) { yourSSLBox->takeItem(x); yourCertDelList.append(x); setAuthCertLists(); configChanged(); } } void KCryptoConfig::slotYourUnlock() { YourCertItem *x = static_cast(yourSSLBox->selectedItem()); TQString iss; if (!x || !yourSSLUnlock->isEnabled()) return; KSSLPKCS12 *pkcs = KSSLPKCS12::fromString(x->getPKCS(), x->getPass()); if (!pkcs) pkcs = KSSLPKCS12::fromString(x->getPKCS(), x->getPassCache()); if (!pkcs) { TQString pprompt = i18n("Enter the certificate password:"); TQCString oldpass; do { int i = KPasswordDialog::getPassword(oldpass, pprompt); if (i != KPasswordDialog::Accepted) return; pkcs = KSSLPKCS12::fromString(x->getPKCS(), oldpass); pprompt = i18n("Decoding failed. Please try again:"); } while (!pkcs); x->setPassCache(oldpass); } // update the info iss = pkcs->getCertificate()->getIssuer(); ySubject->setValues(x ? x->getName() : TQString(TQString())); yIssuer->setValues(iss); TQPalette cspl; KSSLCertificate *cert = pkcs->getCertificate(); cspl = yValidFrom->palette(); if (TQDateTime::currentDateTime(Qt::UTC) < cert->getQDTNotBefore()) { cspl.setColor(TQColorGroup::Foreground, TQColor(196,33,21)); } else { cspl.setColor(TQColorGroup::Foreground, TQColor(42,153,59)); } yValidFrom->setPalette(cspl); cspl = yValidUntil->palette(); if (TQDateTime::currentDateTime(Qt::UTC) > cert->getQDTNotAfter()) { cspl.setColor(TQColorGroup::Foreground, TQColor(196,33,21)); } else { cspl.setColor(TQColorGroup::Foreground, TQColor(42,153,59)); } yValidUntil->setPalette(cspl); yValidFrom->setText(cert->getNotBefore()); yValidUntil->setText(cert->getNotAfter()); yHash->setText(cert->getMD5DigestText()); yourSSLUnlock->setEnabled(false); delete pkcs; } void KCryptoConfig::slotYourCertSelect() { YourCertItem *x = static_cast(yourSSLBox->selectedItem()); TQString iss; yourSSLExport->setEnabled(x != NULL); yourSSLPass->setEnabled(x != NULL); yourSSLUnlock->setEnabled(false); yourSSLVerify->setEnabled(x != NULL); yourSSLRemove->setEnabled(x != NULL); if (x) { KSSLPKCS12 *pkcs = KSSLPKCS12::fromString(x->getPKCS(), x->getPass()); if (pkcs) { TQPalette cspl; KSSLCertificate *cert = pkcs->getCertificate(); iss = cert->getIssuer(); cspl = yValidFrom->palette(); if (TQDateTime::currentDateTime(Qt::UTC) < cert->getQDTNotBefore()) { cspl.setColor(TQColorGroup::Foreground, TQColor(196,33,21)); } else { cspl.setColor(TQColorGroup::Foreground, TQColor(42,153,59)); } yValidFrom->setPalette(cspl); cspl = yValidUntil->palette(); if (TQDateTime::currentDateTime(Qt::UTC) > cert->getQDTNotAfter()) { cspl.setColor(TQColorGroup::Foreground, TQColor(196,33,21)); } else { cspl.setColor(TQColorGroup::Foreground, TQColor(42,153,59)); } yValidUntil->setPalette(cspl); yValidFrom->setText(cert->getNotBefore()); yValidUntil->setText(cert->getNotAfter()); yHash->setText(cert->getMD5DigestText()); delete pkcs; } else { yourSSLUnlock->setEnabled(x != NULL); yHash->clear(); } } else { yHash->clear(); } ySubject->setValues(x ? x->getName() : TQString(TQString())); yIssuer->setValues(iss); } void KCryptoConfig::slotYourPass() { YourCertItem *x = static_cast(yourSSLBox->selectedItem()); TQCString oldpass = ""; if (!x) return; KSSLPKCS12 *pkcs = KSSLPKCS12::fromString(x->getPKCS(), x->getPass()); if (!pkcs) pkcs = KSSLPKCS12::fromString(x->getPKCS(), x->getPassCache()); if (!pkcs) { TQString pprompt = i18n("Enter the OLD password for the certificate:"); do { int i = KPasswordDialog::getPassword(oldpass, pprompt); if (i != KPasswordDialog::Accepted) break; pkcs = KSSLPKCS12::fromString(x->getPKCS(), oldpass); pprompt = i18n("Decoding failed. Please try again:"); } while (!pkcs); } if (pkcs) { x->setPassCache(oldpass); slotYourUnlock(); KPasswordDialog *kpd = new KPasswordDialog(KPasswordDialog::NewPassword, false, 0, this); kpd->setPrompt(i18n("Enter the new certificate password")); kpd->setAllowEmptyPasswords(true); int i = kpd->exec(); if (i == KPasswordDialog::Accepted) { TQCString pass = kpd->password(); pkcs->changePassword(TQString(oldpass), TQString(pass)); x->setPKCS(pkcs->toString()); x->setPassCache(pass); configChanged(); } delete kpd; delete pkcs; } } void KCryptoConfig::slotCAImport() { TQString certFile = KFileDialog::getOpenFileName(TQString(), "application/x-x509-ca-cert"); if (certFile.isEmpty()) return; #ifdef HAVE_SSL #define sk_free KOSSL::self()->sk_free #define sk_num KOSSL::self()->sk_num #define sk_value KOSSL::self()->sk_value // First try to load using the OpenSSL method X509_STORE *certStore = KOSSL::self()->X509_STORE_new(); X509_LOOKUP *certLookup = KOSSL::self()->X509_STORE_add_lookup(certStore, KOSSL::self()->X509_LOOKUP_file()); if (certLookup && KOSSL::self()->X509_LOOKUP_load_file(certLookup, certFile.local8Bit(), X509_FILETYPE_PEM)) { for (int i = 0; i < sk_X509_OBJECT_num(certStore->objs); i++) { X509_OBJECT* x5o = sk_X509_OBJECT_value(certStore->objs, i); if (!x5o) continue; if (x5o->type != X509_LU_X509) continue; X509 *x5 = x5o->data.x509; if (!x5) continue; // Easier to use in this form KSSLCertificate *x = KSSLCertificate::fromX509(x5); // Only import CA's if (!x || !x->x509V3Extensions().certTypeCA()) { if (x) { TQString emsg = x->getSubject() + ":\n" + i18n("This is not a signer certificate."); KMessageBox::error(this, emsg, i18n("SSL")); delete x; } continue; } TQString name = x->getSubject(); // search for dups for (CAItem *m = static_cast(caList->firstChild()); m; m = static_cast(m->nextSibling())) { if (m->configName() == name) { KSSLCertificate *y = KSSLCertificate::fromString(m->getCert().local8Bit()); if (!y) continue; if (*x == *y) { TQString emsg = name + ":\n" + i18n("You already have this signer certificate installed."); KMessageBox::error(this, emsg, i18n("SSL")); delete x; delete y; x = NULL; break; } delete y; } } if (!x) continue; // Ok, add it to the list (new CAItem(caList, name, x->toString(), true, true, true, this) )->isNew = true; delete x; } // Can the PEM code be wiped out now? } else { // try to load it manually as a single X.509 DER encoded // ASSUMPTION: we only read one certificate in this code TQFile qf(certFile); TQString name; TQString certtext; KSSLCertificate *x; qf.open(IO_ReadOnly); qf.readLine(certtext, qf.size()); if (certStore) { KOSSL::self()->X509_STORE_free(certStore); certStore = NULL; } if (certtext.contains("-----BEGIN CERTIFICATE-----")) { qf.reset(); certtext = TQString(); while (!qf.atEnd()) { TQString xx; qf.readLine(xx, qf.size()); certtext += xx; } certtext = certtext.replace("-----BEGIN CERTIFICATE-----", TQString()); certtext = certtext.replace("-----END CERTIFICATE-----", TQString()); certtext = certtext.stripWhiteSpace(); certtext = certtext.replace("\n", TQString()); } else { // Must [could?] be DER qf.close(); qf.open(IO_ReadOnly); char *cr; cr = new char[qf.size()+1]; qf.readBlock(cr, qf.size()); TQByteArray qba; qba.duplicate(cr, qf.size()); certtext = KCodecs::base64Encode(qba); delete [] cr; } qf.close(); x = KSSLCertificate::fromString(certtext.latin1()); if (!x) { KMessageBox::sorry(this, i18n("The certificate file could not be loaded."), i18n("SSL")); return; } if (!x->x509V3Extensions().certTypeCA()) { KMessageBox::sorry(this, i18n("This is not a signer certificate."), i18n("SSL")); return; } name = x->getSubject(); for (CAItem *i = static_cast(caList->firstChild()); i; i = static_cast(i->nextSibling())) { if (i->configName() == name) { KSSLCertificate *y = KSSLCertificate::fromString(i->getCert().local8Bit()); if (!y) continue; if (*x == *y) { KMessageBox::error(this, i18n("You already have this signer certificate installed."), i18n("SSL")); delete x; delete y; return; } delete y; } } (new CAItem(caList, name, x->toString(), true, true, true, this))->isNew = true; delete x; } if (certStore) KOSSL::self()->X509_STORE_free(certStore); configChanged(); #undef sk_free #undef sk_num #undef sk_value #endif offerImportToKMail( certFile ); } void KCryptoConfig::offerImportToKMail( const TQString& certFile ) { if ( KMessageBox::questionYesNo( this, i18n( "Do you want to make this certificate available to KMail as well?" ), TQString(), i18n("Make Available"), i18n("Do Not Make Available") ) == KMessageBox::Yes ) { KProcess proc; proc << "kleopatra"; proc << "--import-certificate"; proc << certFile; if ( !proc.start( KProcess::DontCare ) ) KMessageBox::error( this, i18n( "Could not execute Kleopatra. You might have to install or update the tdepim package." ) ); } } void KCryptoConfig::slotCARemove() { CAItem *x = static_cast(caList->selectedItem()); if (x) { caList->takeItem(x); caDelList.append(x); configChanged(); slotCAItemChanged(); } } void KCryptoConfig::slotCARestore() { int rc = KMessageBox::warningContinueCancel(this, i18n("This will revert your certificate signers database to the KDE default.\nThis operation cannot be undone.\nAre you sure you wish to continue?"), i18n("SSL"),i18n("Revert")); if (rc == KMessageBox::Cancel) { return; } // For now, we just rm the existing file and rebuild TQString path = KGlobal::dirs()->saveLocation("config"); path += "/ksslcalist"; TQFile::remove(path); // Remove all our old work and rebuild the GUI/List caDelList.clear(); caList->clear(); TQStringList groups = _signers->list(); KConfig sigcfg("ksslcalist", true, false); for (TQStringList::Iterator i = groups.begin(); i != groups.end(); ++i) { if ((*i).isEmpty() || *i == "") continue; if (!sigcfg.hasGroup(*i)) continue; sigcfg.setGroup(*i); if (!sigcfg.hasKey("x509")) continue; new CAItem(caList, (*i), sigcfg.readEntry("x509", TQString()), sigcfg.readBoolEntry("site", false), sigcfg.readBoolEntry("email", false), sigcfg.readBoolEntry("code", false), this ); } genCAList(); slotCAItemChanged(); } void KCryptoConfig::slotCAItemChanged() { CAItem *x = static_cast(caList->selectedItem()); if (x) { caSSLRemove->setEnabled(true); caSubject->setValues(x ? x->getName() : TQString(TQString())); KSSLCertificate *cert = KSSLCertificate::fromString(x->getCert().local8Bit()); if (!cert) { caIssuer->setValues(TQString(TQString())); caSite->setEnabled(false); caEmail->setEnabled(false); caCode->setEnabled(false); caSite->setChecked(false); caEmail->setChecked(false); caCode->setChecked(false); cHash->clear(); } else { caSite->setEnabled(cert->x509V3Extensions().certTypeSSLCA()); caEmail->setEnabled(cert->x509V3Extensions().certTypeEmailCA()); caCode->setEnabled(cert->x509V3Extensions().certTypeCodeCA()); caSite->setChecked(x->getSite()); caEmail->setChecked(x->getEmail()); caCode->setChecked(x->getCode()); caIssuer->setValues(cert->getIssuer()); cHash->setText(cert->getMD5DigestText()); delete cert; } } else { caSSLRemove->setEnabled(false); caSite->setEnabled(false); caEmail->setEnabled(false); caCode->setEnabled(false); caSubject->setValues(TQString(TQString())); caIssuer->setValues(TQString(TQString())); cHash->clear(); } } void KCryptoConfig::slotCAChecked() { CAItem *x = static_cast(caList->selectedItem()); if (x) { x->setSite(caSite->isChecked()); x->setEmail(caEmail->isChecked()); x->setCode(caCode->isChecked()); x->modified = true; configChanged(); } } void KCryptoConfig::slotNewHostAuth() { HostAuthItem *j = new HostAuthItem(hostAuthList, TQString(), TQString(), this ); j->setAction(KSSLCertificateHome::AuthSend); hostAuthList->setSelected(j, true); authHost->setEnabled(true); hostCertBox->setEnabled(true); hostCertBG->setEnabled(true); authRemove->setEnabled(true); hostCertBG->setButton(0); authHost->setFocus(); } void KCryptoConfig::slotRemoveHostAuth() { TQListViewItem *act = hostAuthList->selectedItem(); HostAuthItem *x = static_cast(act); if (x) { TQListViewItem *next = act->itemBelow(); if (!next) next = act->itemAbove(); hostAuthList->takeItem(x); authDelList.append(x); configChanged(); if (next) hostAuthList->setSelected(next, true); } } void KCryptoConfig::slotAuthItemChanged() { HostAuthItem *x = static_cast(hostAuthList->selectedItem()); if (x) { // Make sure the fields are enabled authHost->setEnabled(true); hostCertBox->setEnabled(true); hostCertBG->setEnabled(true); authRemove->setEnabled(true); // Populate the fields switch(x->getAction()) { case KSSLCertificateHome::AuthSend: hostCertBG->setButton(hostCertBG->id(hostSend)); break; case KSSLCertificateHome::AuthPrompt: hostCertBG->setButton(hostCertBG->id(hostPrompt)); break; case KSSLCertificateHome::AuthDont: hostCertBG->setButton(hostCertBG->id(hostDont)); break; default: hostSend->setChecked(false); hostPrompt->setChecked(false); hostDont->setChecked(false); break; } ___lehack = true; authHost->setText(x->configName()); ___lehack = false; hostCertBox->setCurrentItem(0); TQString theCert = x->getCertName(); for (int i = 0; i < hostCertBox->count(); i++) { if (hostCertBox->text(i) == theCert) { hostCertBox->setCurrentItem(i); break; } } } else { authHost->clear(); authHost->setEnabled(false); hostCertBox->setEnabled(false); hostCertBG->setEnabled(false); authRemove->setEnabled(false); } } void KCryptoConfig::slotAuthText(const TQString &t) { if (___lehack) return; HostAuthItem *x = static_cast(hostAuthList->selectedItem()); if (x) { x->setHost(t); configChanged(); } } void KCryptoConfig::slotAuthButtons() { HostAuthItem *x = static_cast(hostAuthList->selectedItem()); if (x) { KSSLCertificateHome::KSSLAuthAction aa = KSSLCertificateHome::AuthDont; int sel = hostCertBG->id(hostCertBG->selected()); if (sel == hostCertBG->id(hostSend)) aa = KSSLCertificateHome::AuthSend; else if (sel == hostCertBG->id(hostPrompt)) aa = KSSLCertificateHome::AuthPrompt; else aa = KSSLCertificateHome::AuthDont; x->setAction(aa); configChanged(); } } void KCryptoConfig::slotAuthCombo() { HostAuthItem *x = static_cast(hostAuthList->selectedItem()); if (x) { if (hostCertBox->currentItem() == 0) x->setCertName(TQString()); else x->setCertName(hostCertBox->currentText()); configChanged(); } } void KCryptoConfig::slotTestOSSL() { KOSSL::self()->destroy(); if (!KOSSL::self()->hasLibSSL()) { KMessageBox::detailedSorry(this, i18n("Failed to load OpenSSL."), i18n("libssl was not found or successfully loaded."), i18n("OpenSSL")); return; } if (!KOSSL::self()->hasLibCrypto()) { KMessageBox::detailedSorry(this, i18n("Failed to load OpenSSL."), i18n("libcrypto was not found or successfully loaded."), i18n("OpenSSL")); return; } KMessageBox::information(this, i18n("OpenSSL was successfully loaded."), i18n("OpenSSL")); } void KCryptoConfig::slotUseEGD() { if (mUseEGD->isChecked()) { mUseEFile->setChecked(false); } mEGDLabel->setText(i18n("Path to EGD:")); mEGDPath->setEnabled(mUseEGD->isChecked()); mEGDLabel->setEnabled(mUseEGD->isChecked()); configChanged(); } void KCryptoConfig::slotUseEFile() { if (mUseEFile->isChecked()) { mUseEGD->setChecked(false); } mEGDLabel->setText(i18n("Path to entropy file:")); mEGDPath->setEnabled(mUseEFile->isChecked()); mEGDLabel->setEnabled(mUseEFile->isChecked()); configChanged(); } // Lets make this a separate module. it's a whole lot of work and can really be // encompassed in a separate module quite nicely. void KCryptoConfig::slotGeneratePersonal() { #if 0 TQStringList qslCertTypes; qslCertTypes << i18n("Personal SSL") << i18n("Server SSL") << i18n("S/MIME") << i18n("PGP") << i18n("GPG") << i18n("SSL Personal Request") << i18n("SSL Server Request") << i18n("Netscape SSL") << i18n("Server certificate authority", "Server CA") << i18n("Personal certificate authority", "Personal CA") << i18n("Secure MIME certificate authority", "S/MIME CA"); #endif } #ifdef HAVE_SSL #if OPENSSL_VERSION_NUMBER >= 0x10000000L #define SSL_CONST const #else #define SSL_CONST #endif // This gets all the available ciphers from OpenSSL bool KCryptoConfig::loadCiphers() { unsigned int i; SSL_CTX *ctx; SSL *ssl; SSL_CONST SSL_METHOD *meth; SSLv2Box->clear(); SSLv3Box->clear(); #ifndef OPENSSL_NO_SSL2 meth = SSLv2_client_method(); SSLeay_add_ssl_algorithms(); ctx = SSL_CTX_new(meth); if (ctx == NULL) return false; ssl = SSL_new(ctx); if (!ssl) return false; CipherItem *item; for (i=0; ; i++) { int j, k; SSL_CONST SSL_CIPHER *sc; sc = (meth->get_cipher)(i); if (!sc) break; // Leak of sc*? TQString scn(sc->name); if (scn.contains("ADH-") || scn.contains("NULL-") || scn.contains("DES-CBC3-SHA") || scn.contains("FZA-")) { continue; } k = SSL_CIPHER_get_bits(sc, &j); item = new CipherItem( SSLv2Box, sc->name, k, j, this ); } if (ctx) SSL_CTX_free(ctx); if (ssl) SSL_free(ssl); #else CipherItem *item; #endif // We repeat for SSLv3 meth = SSLv3_client_method(); SSLeay_add_ssl_algorithms(); ctx = SSL_CTX_new(meth); if (ctx == NULL) return false; ssl = SSL_new(ctx); if (!ssl) return false; for (i=0; ; i++) { int j, k; SSL_CONST SSL_CIPHER *sc; sc = (meth->get_cipher)(i); if (!sc) break; // Leak of sc*? TQString scn(sc->name); if (scn.contains("ADH-") || scn.contains("NULL-") || scn.contains("DES-CBC3-SHA") || scn.contains("FZA-")) { continue; } k = SSL_CIPHER_get_bits(sc, &j); item = new CipherItem( SSLv3Box, sc->name, k, j, this ); } if (ctx) SSL_CTX_free(ctx); if (ssl) SSL_free(ssl); return true; } #endif void KCryptoConfig::setAuthCertLists() { TQString oldDef, oldHost; bool noneDef, noneHost; // get the old setting oldDef = defCertBox->currentText(); oldHost = hostCertBox->currentText(); noneDef = (0 == defCertBox->currentItem()); noneHost = (0 == hostCertBox->currentItem()); // repopulate defCertBox->clear(); hostCertBox->clear(); TQStringList defCertStrList; // = KSSLCertificateHome::getCertificateList(); defCertStrList.append(i18n("None")); for (YourCertItem *x = static_cast(yourSSLBox->firstChild()); x; x = static_cast(x->nextSibling())) { defCertStrList.append(x->configName()); } defCertBox->insertStringList(defCertStrList); hostCertBox->insertStringList(defCertStrList); // try to restore it defCertBox->setCurrentItem(0); if (!noneDef) { for (int i = 0; i < defCertBox->count(); i++) { if (defCertBox->text(i) == oldDef) { defCertBox->setCurrentItem(i); break; } } } if (!noneDef && defCertBox->currentItem() == 0) configChanged(); hostCertBox->setCurrentItem(0); if (!noneHost) { for (int i = 0; i < hostCertBox->count(); i++) { if (hostCertBox->text(i) == oldHost) { hostCertBox->setCurrentItem(i); break; } } } if (!noneHost && hostCertBox->currentItem() == 0) configChanged(); // Update the host entries too for (HostAuthItem *x = static_cast(hostAuthList->firstChild()); x; x = static_cast(x->nextSibling())) { TQString newValue = TQString(); for (int i = 1; i < hostCertBox->count(); i++) { if (hostCertBox->text(i) == x->getCertName()) { newValue = x->getCertName(); break; } } if (newValue != x->getCertName()) configChanged(); x->setCertName(newValue); } } #include "crypto.moc"