claws-mail/src/common/ssl_certificate.h
Colin Leroy 78965aa3b7 Add a per-account preference to allow automatically accepting unknown
and changed SSL certificates, if they're valid (that is, if the root CA
is trusted by the distro).
2014-05-28 21:18:34 +02:00

76 lines
2.7 KiB
C

/*
* Claws Mail -- a GTK+ based, lightweight, and fast e-mail client
* Copyright (C) 1999-2012 Colin Leroy <colin@colino.net>
* and the Claws Mail team
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
*/
#ifndef __SSL_CERTIFICATE_H__
#define __SSL_CERTIFICATE_H__
#ifdef HAVE_CONFIG_H
#include "claws-features.h"
#endif
#ifdef USE_GNUTLS
#include <gnutls/gnutls.h>
#include <gnutls/x509.h>
#include <glib.h>
#define SSLCERT_ASK_HOOKLIST "sslcert_ask"
#define SSLCERT_GET_CLIENT_CERT_HOOKLIST "sslcert_get_client_cert"
#define SSL_CERT_GET_PASSWORD "sslcert_get_password"
typedef struct _SSLCertificate SSLCertificate;
struct _SSLCertificate
{
gnutls_x509_crt_t x509_cert;
gchar *host;
gushort port;
gchar *fingerprint;
guint status;
};
typedef struct _SSLCertHookData SSLCertHookData;
struct _SSLCertHookData
{
SSLCertificate *cert;
SSLCertificate *old_cert;
gboolean expired;
gboolean accept;
};
SSLCertificate *ssl_certificate_find (const gchar *host, gushort port, const gchar *fingerprint);
gboolean ssl_certificate_check (gnutls_x509_crt_t x509_cert, guint status, const gchar *host, gushort port, gboolean accept_if_valid);
gboolean ssl_certificate_check_chain(gnutls_x509_crt_t *certs, gint chain_len, const gchar *host, gushort port, gboolean accept_if_valid);
void ssl_certificate_destroy(SSLCertificate *cert);
void ssl_certificate_delete_from_disk(SSLCertificate *cert);
char * readable_fingerprint(unsigned char *src, int len);
char *ssl_certificate_check_signer (SSLCertificate *cert, guint status);
gnutls_x509_crt_t ssl_certificate_get_x509_from_pem_file(const gchar *file);
gnutls_x509_privkey_t ssl_certificate_get_pkey_from_pem_file(const gchar *file);
void ssl_certificate_get_x509_and_pkey_from_p12_file(const gchar *file,
const gchar *password, gnutls_x509_crt_t *crt, gnutls_x509_privkey_t *key);
size_t gnutls_i2d_X509(gnutls_x509_crt_t x509_cert, unsigned char **output);
size_t gnutls_i2d_PrivateKey(gnutls_x509_privkey_t pkey, unsigned char **output);
gboolean ssl_certificate_check_subject_cn(SSLCertificate *cert);
gchar *ssl_certificate_get_subject_cn(SSLCertificate *cert);
#endif /* USE_GNUTLS */
#endif /* SSL_CERTIFICATE_H */