diff options
| author | Wilmer van der Gaast <wilmer@gaast.net> | 2005-11-06 19:23:18 +0100 | 
|---|---|---|
| committer | Wilmer van der Gaast <wilmer@gaast.net> | 2005-11-06 19:23:18 +0100 | 
| commit | b7d3cc34f68dab7b8f7d0777711317b334fc2219 (patch) | |
| tree | 6aa4d6332c96654fda79fe18993ab0e35d36a52b /protocols/ssl_nss.c | |
Initial repository (0.99 release tree)0.99
Diffstat (limited to 'protocols/ssl_nss.c')
| -rw-r--r-- | protocols/ssl_nss.c | 180 | 
1 files changed, 180 insertions, 0 deletions
| diff --git a/protocols/ssl_nss.c b/protocols/ssl_nss.c new file mode 100644 index 00000000..0815f952 --- /dev/null +++ b/protocols/ssl_nss.c @@ -0,0 +1,180 @@ +  /********************************************************************\ +  * BitlBee -- An IRC to other IM-networks gateway                     * +  *                                                                    * +  * Copyright 2002-2004 Wilmer van der Gaast and others                * +  \********************************************************************/ + +/* SSL module - NSS version                                             */ + +/* Copyright 2004 Jelmer Vernooij                                       */ + +/* +  This program is free software; you can redistribute it and/or modify +  it under the terms of the GNU General Public License as published by +  the Free Software Foundation; either version 2 of the License, or +  (at your option) any later version. + +  This program is distributed in the hope that it will be useful, +  but WITHOUT ANY WARRANTY; without even the implied warranty of +  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the +  GNU General Public License for more details. + +  You should have received a copy of the GNU General Public License with +  the Debian GNU/Linux distribution in /usr/share/common-licenses/GPL; +  if not, write to the Free Software Foundation, Inc., 59 Temple Place, +  Suite 330, Boston, MA  02111-1307  USA +*/ + +#include "bitlbee.h" +#include "proxy.h" +#include "ssl_client.h" +#include "sock.h" +#include <nspr.h> +#include <prio.h> +#include <sslproto.h> +#include <nss.h> +#include <private/pprio.h> +#include <ssl.h> +#include <secerr.h> +#include <sslerr.h> + +static gboolean initialized = FALSE; + +struct scd +{ +	SslInputFunction func; +	gpointer data; +	int fd; +	PRFileDesc *prfd; +	gboolean established; +}; + +static void ssl_connected( gpointer data, gint source, GaimInputCondition cond ); + + +static SECStatus nss_auth_cert (void *arg, PRFileDesc *socket, PRBool checksig, PRBool isserver) +{ +	return SECSuccess; +} + +static SECStatus nss_bad_cert (void *arg, PRFileDesc *socket)  +{ +	PRErrorCode err; + +	if(!arg) return SECFailure; + +	*(PRErrorCode *)arg = err = PORT_GetError(); + +	switch(err) { +	case SEC_ERROR_INVALID_AVA: +	case SEC_ERROR_INVALID_TIME: +	case SEC_ERROR_BAD_SIGNATURE: +	case SEC_ERROR_EXPIRED_CERTIFICATE: +	case SEC_ERROR_UNKNOWN_ISSUER: +	case SEC_ERROR_UNTRUSTED_CERT: +	case SEC_ERROR_CERT_VALID: +	case SEC_ERROR_EXPIRED_ISSUER_CERTIFICATE: +	case SEC_ERROR_CRL_EXPIRED: +	case SEC_ERROR_CRL_BAD_SIGNATURE: +	case SEC_ERROR_EXTENSION_VALUE_INVALID: +	case SEC_ERROR_CA_CERT_INVALID: +	case SEC_ERROR_CERT_USAGES_INVALID: +	case SEC_ERROR_UNKNOWN_CRITICAL_EXTENSION: +		return SECSuccess; + +	default: +		return SECFailure; +	} +} + + +void *ssl_connect( char *host, int port, SslInputFunction func, gpointer data ) +{ +	struct scd *conn = g_new0( struct scd, 1 ); +	 +	conn->fd = proxy_connect( host, port, ssl_connected, conn ); +	conn->func = func; +	conn->data = data; +	 +	if( conn->fd < 0 ) +	{ +		g_free( conn ); +		return( NULL ); +	} +	 +	if( !initialized ) +	{ +		PR_Init( PR_SYSTEM_THREAD, PR_PRIORITY_NORMAL, 1); +		NSS_NoDB_Init(NULL); +		NSS_SetDomesticPolicy(); +	} + +	 +	return( conn ); +} + +static void ssl_connected( gpointer data, gint source, GaimInputCondition cond ) +{ +	struct scd *conn = data; +	 +	if( source == -1 ) +		goto ssl_connected_failure; + +	 + + +	conn->prfd = SSL_ImportFD(NULL, PR_ImportTCPSocket(source)); +	SSL_OptionSet(conn->prfd, SSL_SECURITY, PR_TRUE); +	SSL_OptionSet(conn->prfd, SSL_HANDSHAKE_AS_CLIENT, PR_TRUE); +	SSL_BadCertHook(conn->prfd, (SSLBadCertHandler)nss_bad_cert, NULL); +	SSL_AuthCertificateHook(conn->prfd, (SSLAuthCertificate)nss_auth_cert, (void *)CERT_GetDefaultCertDB()); +	SSL_ResetHandshake(conn->prfd, PR_FALSE); + +	if (SSL_ForceHandshake(conn->prfd)) { +		goto ssl_connected_failure; +	} +	 +	 +	conn->established = TRUE; +	conn->func( conn->data, conn, cond ); +	return; +	 +	ssl_connected_failure: +	 +	conn->func( conn->data, NULL, cond ); +	 +	PR_Close( conn -> prfd ); +	if( source >= 0 ) closesocket( source ); +	g_free( conn ); +} + +int ssl_read( void *conn, char *buf, int len ) +{ +	if( !((struct scd*)conn)->established ) +		return( 0 ); +	 +	return( PR_Read( ((struct scd*)conn)->prfd, buf, len ) ); +} + +int ssl_write( void *conn, const char *buf, int len ) +{ +	if( !((struct scd*)conn)->established ) +		return( 0 ); +	 +	return( PR_Write ( ((struct scd*)conn)->prfd, buf, len ) ); +} + +void ssl_disconnect( void *conn_ ) +{ +	struct scd *conn = conn_; +	 +	PR_Close( conn->prfd ); +	closesocket( conn->fd ); +	 +	g_free( conn ); +} + +int ssl_getfd( void *conn ) +{ +	return( ((struct scd*)conn)->fd ); +} | 
