/* * Sylpheed -- a GTK+ based, lightweight, and fast e-mail client * Copyright (C) 1999-2002 Hiroyuki Yamamoto * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */ #ifdef HAVE_CONFIG_H # include "config.h" #endif #if USE_OPENSSL #include "defs.h" #include #include "intl.h" #include "utils.h" #include "ssl.h" #include "log.h" #include "ssl_certificate.h" static SSL_CTX *ssl_ctx; void ssl_init(void) { SSL_METHOD *meth; FILE *cert_test; /* Global system initialization*/ SSL_library_init(); SSL_load_error_strings(); /* Create our context*/ meth = SSLv23_client_method(); ssl_ctx = SSL_CTX_new(meth); /* Set default certificate paths */ SSL_CTX_set_default_verify_paths(ssl_ctx); /* this problem seems quite common */ cert_test = fopen (X509_get_default_cert_file(), "r"); if (cert_test != NULL) fclose(cert_test); else { printf("ssl_init: warning, can't open %s\n", X509_get_default_cert_file()); printf("ssl_init: it means that certificates' signatures won't appear as Correct,\n"); printf("ssl_init: even if they should. Check your openssl install.\n"); } #if (OPENSSL_VERSION_NUMBER < 0x0090600fL) SSL_CTX_set_verify_depth(ctx,1); #endif } void ssl_done(void) { if (!ssl_ctx) return; SSL_CTX_free(ssl_ctx); } gboolean ssl_init_socket(SockInfo *sockinfo) { return ssl_init_socket_with_method(sockinfo, SSL_METHOD_SSLv23); } gboolean ssl_init_socket_with_method(SockInfo *sockinfo, SSLMethod method) { X509 *server_cert; SSL *ssl; ssl = SSL_new(ssl_ctx); if (ssl == NULL) { log_warning(_("Error creating ssl context\n")); return FALSE; } switch (method) { case SSL_METHOD_SSLv23: debug_print("Setting SSLv23 client method\n"); SSL_set_ssl_method(ssl, SSLv23_client_method()); break; case SSL_METHOD_TLSv1: debug_print("Setting TLSv1 client method\n"); SSL_set_ssl_method(ssl, TLSv1_client_method()); break; default: break; } SSL_set_fd(ssl, sockinfo->sock); if (SSL_connect(ssl) == -1) { log_warning(_("SSL connect failed (%s)\n"), ERR_error_string(ERR_get_error(), NULL)); SSL_free(ssl); return FALSE; } /* Get the cipher */ log_print(_("SSL connection using %s\n"), SSL_get_cipher(ssl)); /* Get server's certificate (note: beware of dynamic allocation) */ if ((server_cert = SSL_get_peer_certificate(ssl)) == NULL) { debug_print("server_cert is NULL ! this _should_not_ happen !\n"); SSL_free(ssl); return FALSE; } /* if (!ssl_certificate_check(server_cert, sockinfo->hostname, sockinfo->port)) { X509_free(server_cert); SSL_free(ssl); return FALSE; } */ X509_free(server_cert); sockinfo->ssl = ssl; return TRUE; } void ssl_done_socket(SockInfo *sockinfo) { if (sockinfo->ssl) { SSL_free(sockinfo->ssl); } } #endif /* USE_OPENSSL */