/**
* crypto . cpp
*
* Copyright ( c ) 2000 - 2005 George Staikos < staikos @ kde . org >
* 2000 Carsten Pfeiffer < pfeiffer @ kde . org >
*
* This program is free software ; you can redistribute it and / or modify
* it under the terms of the GNU Lesser General Public License as published
* by the Free Software Foundation ; either version 2.1 of the License , or
* ( at your option ) any later version .
*
* This program is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU Lesser General Public License for more details .
*
* You should have received a copy of the GNU Lesser General Public License
* along with this program ; if not , write to the Free Software
* Foundation , Inc . , 51 Franklin Street , Fifth Floor , Boston , MA 02110 - 1301 , USA .
*/
//
// Attention. The suck factor on this code is increasing. It's a bit of a
// hack. </understatement> It might be time to rewrite it soon.
//
# include <sys/types.h>
# include <sys/stat.h>
# include <stdlib.h>
# include <pwd.h>
# include <unistd.h>
# include <tqbuttongroup.h>
# include <tqcheckbox.h>
# include <tqfile.h>
# include <tqfileinfo.h>
# include <tqframe.h>
# include <tqhbuttongroup.h>
# include <tqhgroupbox.h>
# include <tqlabel.h>
# include <tqlayout.h>
# include <tqpushbutton.h>
# include <tqradiobutton.h>
# include <tqregexp.h>
# include <tqvbox.h>
# include <tqvbuttongroup.h>
# include <tqvgroupbox.h>
# include <tqwhatsthis.h>
# include <kaboutdata.h>
# include <kcombobox.h>
# include <kconfig.h>
# include <kdatepicker.h>
# include <kdebug.h>
# include <kdialog.h>
# include <kfiledialog.h>
# include <kgenericfactory.h>
# include <kglobal.h>
# include <klineedit.h>
# include <klocale.h>
# include <kmdcodec.h>
# include <kmessagebox.h>
# include <kpassdlg.h>
# include <kprocess.h>
# include <kpushbutton.h>
# include <kresolver.h>
# include <kseparator.h>
# include <kstandarddirs.h>
# include <kurllabel.h>
# include <kurlrequester.h>
# include <config.h>
# ifdef HAVE_SSL
# define crypt _openssl_crypt
# include <openssl/ssl.h>
# include <openssl/x509.h>
# include <openssl/x509v3.h>
# include <openssl/pem.h>
# include <openssl/rand.h>
# include <openssl/err.h>
# include <openssl/stack.h>
# include <openssl/safestack.h>
# undef crypt
# endif
# include <ksslall.h>
# include <kopenssl.h>
# include "crypto.h"
# include "certexport.h"
# include "kdatetimedlg.h"
using namespace KNetwork ;
typedef KGenericFactory < KCryptoConfig , TQWidget > KryptoFactory ;
K_EXPORT_COMPONENT_FACTORY ( kcm_crypto , KryptoFactory ( " kcmcrypto " ) )
CipherItem : : CipherItem ( TQListView * view , const TQString & cipher , int bits ,
int maxBits , KCryptoConfig * module )
: TQCheckListItem ( view , TQString ( ) , CheckBox )
{
m_cipher = cipher ;
m_bits = bits ;
m_module = module ;
TQString tmp ( i18n ( " %1 (%2 of %3 bits) " ) ) ;
setText ( 0 , tmp . arg ( cipher ) . arg ( bits ) . arg ( maxBits ) ) ;
}
void CipherItem : : stateChange ( bool )
{
m_module - > configChanged ( ) ;
}
TQString CipherItem : : configName ( ) const
{
TQString cipherName ( " cipher_%1 " ) ;
return cipherName . arg ( m_cipher ) ;
}
OtherCertItem : : OtherCertItem ( TQListView * view , const TQString & sub , const TQString & md5 , bool perm , int policy , TQDateTime exp , KCryptoConfig * module )
: TQListViewItem ( view , TQString ( ) ) , _sub ( sub ) , _md5 ( md5 ) , _exp ( exp ) , _perm ( perm ) , _policy ( policy )
{
m_module = module ;
KSSLX509Map cert ( sub ) ;
setText ( 0 , cert . getValue ( " O " ) ) ;
setText ( 1 , cert . getValue ( " CN " ) . replace ( " \n " , " , " ) ) ;
if ( _exp . date ( ) . year ( ) > 3000 | | _exp . date ( ) . year ( ) < 1900 )
_exp . setDate ( TQDate ( 3000 , 1 , 1 ) ) ;
}
void OtherCertItem : : stateChange ( bool )
{
m_module - > configChanged ( ) ;
}
TQString OtherCertItem : : configName ( ) const
{
return _sub ;
}
YourCertItem : : YourCertItem ( TQListView * view , TQString pkcs , TQString pass , TQString name , KCryptoConfig * module )
: TQListViewItem ( view , TQString ( ) )
{
m_module = module ;
KSSLX509Map cert ( name ) ;
TQString tmp = cert . getValue ( " CN " ) . replace ( " \n " , " , " ) ;
setText ( 0 , tmp ) ;
setText ( 1 , cert . getValue ( " Email " ) ) ;
_pkcs = pkcs ;
_name = name ;
_pass = pass ;
}
void YourCertItem : : stateChange ( bool )
{
m_module - > configChanged ( ) ;
}
TQString YourCertItem : : configName ( ) const
{
return _name ;
}
CAItem : : CAItem ( TQListView * view , TQString name , TQString cert , bool site , bool email , bool code , KCryptoConfig * module )
: TQListViewItem ( view , TQString ( ) )
{
m_module = module ;
KSSLX509Map mcert ( name ) ;
TQString tmp ;
setText ( 0 , mcert . getValue ( " O " ) ) ;
tmp = mcert . getValue ( " OU " ) ;
tmp . replace ( " \n " , " , " ) ;
setText ( 1 , tmp ) ;
tmp = mcert . getValue ( " CN " ) ;
tmp . replace ( " \n " , " , " ) ;
setText ( 2 , tmp ) ;
_name = name ;
_cert = cert ;
_site = site ;
_email = email ;
_code = code ;
isNew = false ;
modified = false ;
}
void CAItem : : stateChange ( bool )
{
m_module - > configChanged ( ) ;
}
TQString CAItem : : configName ( ) const
{
return _name ;
}
//////////////////////////////////////////////////////////////////////////////
//////////////////////////////////////////////////////////////////////////////
//////////////////////////////////////////////////////////////////////////////
//////////////////////////////////////////////////////////////////////////////
//////////////////////////////////////////////////////////////////////////////
KCryptoConfig : : KCryptoConfig ( TQWidget * parent , const char * name , const TQStringList & )
: KCModule ( KryptoFactory : : instance ( ) , parent , name )
{
TQGridLayout * grid ;
TQBoxLayout * top = new TQVBoxLayout ( this ) ;
TQString whatstr ;
setQuickHelp ( i18n ( " <h1>Crypto</h1> This module allows you to configure SSL for "
" use with most KDE applications, as well as manage your personal "
" certificates and the known certificate authorities. " ) ) ;
___lehack = false ;
otherCertDelList . setAutoDelete ( true ) ;
yourCertDelList . setAutoDelete ( true ) ;
authDelList . setAutoDelete ( true ) ;
caDelList . setAutoDelete ( true ) ;
_signers = new KSSLSigners ;
KAboutData * about =
new KAboutData ( I18N_NOOP ( " kcmcrypto " ) , I18N_NOOP ( " KDE Crypto Control Module " ) ,
0 , 0 , KAboutData : : License_GPL ,
I18N_NOOP ( " (c) 2000 - 2001 George Staikos " ) ) ;
about - > addAuthor ( " George Staikos " , 0 , " staikos@kde.org " ) ;
about - > addAuthor ( " Carsten Pfeiffer " , 0 , " pfeiffer@kde.org " ) ;
setAboutData ( about ) ;
///////////////////////////////////////////////////////////////////////////
// Create the GUI here - there are currently a total of 6 tabs.
// The first is SSL and cipher related
// The second is OpenSSL settings
// The third is user's SSL certificate related
// The fourth is certificate authentication related
// The fifth is other SSL certificate related
// The sixth is CA related
// The seventh is misc. settings related (unimplemented)
// The eighth is peer [email] certificate related (unimplemented)
///////////////////////////////////////////////////////////////////////////
tabs = new TQTabWidget ( this ) ;
top - > addWidget ( tabs ) ;
///////////////////////////////////////////////////////////////////////////
// FIRST TAB
///////////////////////////////////////////////////////////////////////////
tabSSL = new TQFrame ( this ) ;
grid = new TQGridLayout ( tabSSL , 7 , 2 , KDialog : : marginHint ( ) ,
KDialog : : spacingHint ( ) ) ;
mUseTLS = new TQCheckBox ( i18n ( " Enable &TLS support if supported by the server " ) , tabSSL ) ;
connect ( mUseTLS , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( configChanged ( ) ) ) ;
grid - > addWidget ( mUseTLS , 0 , 0 ) ;
whatstr = i18n ( " TLS is the newest revision of the SSL protocol. "
" It integrates better with other protocols and has "
" replaced SSL in protocols such as POP3 and SMTP. " ) ;
TQWhatsThis : : add ( mUseTLS , whatstr ) ;
mUseSSLv2 = new TQCheckBox ( i18n ( " Enable SSLv&2 " ) , tabSSL ) ;
connect ( mUseSSLv2 , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( configChanged ( ) ) ) ;
grid - > addWidget ( mUseSSLv2 , 1 , 0 ) ;
whatstr = i18n ( " SSL v2 is the second revision of the SSL protocol. "
" It is most common to enable v2 and v3. " ) ;
TQWhatsThis : : add ( mUseSSLv2 , whatstr ) ;
mUseSSLv3 = new TQCheckBox ( i18n ( " Enable SSLv&3 " ) , tabSSL ) ;
connect ( mUseSSLv3 , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( configChanged ( ) ) ) ;
grid - > addWidget ( mUseSSLv3 , 1 , 1 ) ;
whatstr = i18n ( " SSL v3 is the third revision of the SSL protocol. "
" It is most common to enable v2 and v3. " ) ;
TQWhatsThis : : add ( mUseSSLv3 , whatstr ) ;
# ifdef HAVE_SSL
SSLv2Box = new TQListView ( tabSSL , " v2ciphers " ) ;
( void ) SSLv2Box - > addColumn ( i18n ( " SSLv2 Ciphers to Use " ) ) ;
whatstr = i18n ( " Select the ciphers you wish to enable when using the "
" SSL v2 protocol. The actual protocol used will be "
" negotiated with the server at connection time. " ) ;
TQWhatsThis : : add ( SSLv2Box , whatstr ) ;
SSLv2Box - > setSelectionMode ( TQListView : : NoSelection ) ;
grid - > addWidget ( SSLv2Box , 2 , 0 ) ;
connect ( mUseSSLv2 , TQT_SIGNAL ( toggled ( bool ) ) ,
SSLv2Box , TQT_SLOT ( setEnabled ( bool ) ) ) ;
# else
TQLabel * nossllabel = new TQLabel ( i18n ( " SSL ciphers cannot be configured "
" because this module was not linked "
" with OpenSSL. " ) , tabSSL ) ;
grid - > addMultiCellWidget ( nossllabel , 2 , 2 , 0 , 1 ) ;
grid - > addRowSpacing ( 3 , 100 ) ; // give minimum height to look better
# endif
// no need to parse kdeglobals.
config = new KConfig ( " cryptodefaults " , false , false ) ;
policies = new KSimpleConfig ( " ksslpolicies " , false ) ;
pcerts = new KSimpleConfig ( " ksslcertificates " , false ) ;
authcfg = new KSimpleConfig ( " ksslauthmap " , false ) ;
# ifdef HAVE_SSL
SSLv3Box = new TQListView ( tabSSL , " v3ciphers " ) ;
( void ) SSLv3Box - > addColumn ( i18n ( " SSLv3 Ciphers to Use " ) ) ;
whatstr = i18n ( " Select the ciphers you wish to enable when using the "
" SSL v3 protocol. The actual protocol used will be "
" negotiated with the server at connection time. " ) ;
TQWhatsThis : : add ( SSLv3Box , whatstr ) ;
SSLv3Box - > setSelectionMode ( TQListView : : NoSelection ) ;
grid - > addWidget ( SSLv3Box , 2 , 1 ) ;
connect ( mUseSSLv3 , TQT_SIGNAL ( toggled ( bool ) ) ,
SSLv3Box , TQT_SLOT ( setEnabled ( bool ) ) ) ;
loadCiphers ( ) ;
//
// CipherWizards
//
TQHGroupBox * cwbg = new TQHGroupBox ( i18n ( " Cipher Wizard " ) , tabSSL ) ;
TQComboBox * cwcb = new TQComboBox ( cwbg ) ;
grid - > addMultiCellWidget ( cwbg , 3 , 3 , 0 , 1 ) ;
TQString whatStr = i18n ( " <qt>Use these preconfigurations to more easily configure the SSL encryption settings. You can choose among the following modes: <ul> " ) ;
cwcb - > insertItem ( TQString ( ) ) ;
cwcb - > insertItem ( i18n ( " Most Compatible " ) ) ;
whatStr + = i18n ( " <li><b>Most Compatible:</b> Select the settings found to be most compatible.</li> " ) ;
cwcb - > insertItem ( i18n ( " US Ciphers Only " ) ) ;
whatStr + = i18n ( " <li><b>US Ciphers Only:</b> Select only the US strong (>= 128 bit) encryption ciphers.</li> " ) ;
cwcb - > insertItem ( i18n ( " Export Ciphers Only " ) ) ;
whatStr + = i18n ( " <li><b>Export Ciphers Only:</b> Select only the weak ciphers (<= 56 bit).</li> " ) ;
cwcb - > insertItem ( i18n ( " Enable All " ) ) ;
whatStr + = i18n ( " <li><b>Enable All:</b> Select all SSL ciphers and methods.</li></ul> " ) ;
TQWhatsThis : : add ( cwcb , whatStr ) ;
connect ( cwcb , TQT_SIGNAL ( activated ( int ) ) , TQT_SLOT ( slotSelectCipher ( int ) ) ) ;
# endif
mWarnOnEnter = new TQCheckBox ( i18n ( " Warn on &entering SSL mode " ) , tabSSL ) ;
connect ( mWarnOnEnter , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( configChanged ( ) ) ) ;
grid - > addWidget ( mWarnOnEnter , 5 , 0 ) ;
whatstr = i18n ( " If selected, you will be notified when entering an SSL "
" enabled site " ) ;
TQWhatsThis : : add ( mWarnOnEnter , whatstr ) ;
mWarnOnLeave = new TQCheckBox ( i18n ( " Warn on &leaving SSL mode " ) , tabSSL ) ;
connect ( mWarnOnLeave , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( configChanged ( ) ) ) ;
grid - > addWidget ( mWarnOnLeave , 5 , 1 ) ;
whatstr = i18n ( " If selected, you will be notified when leaving an SSL "
" based site. " ) ;
TQWhatsThis : : add ( mWarnOnLeave , whatstr ) ;
mWarnOnUnencrypted = new TQCheckBox ( i18n ( " Warn on sending &unencrypted data " ) , tabSSL ) ;
connect ( mWarnOnUnencrypted , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( configChanged ( ) ) ) ;
grid - > addWidget ( mWarnOnUnencrypted , 6 , 0 ) ;
whatstr = i18n ( " If selected, you will be notified before sending "
" unencrypted data via a web browser. " ) ;
TQWhatsThis : : add ( mWarnOnUnencrypted , whatstr ) ;
#if 0 // NOT IMPLEMENTED IN KDE 3.0
mWarnOnMixed = new TQCheckBox ( i18n ( " Warn on &mixed SSL/non-SSL pages " ) , tabSSL ) ;
connect ( mWarnOnMixed , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( configChanged ( ) ) ) ;
grid - > addWidget ( mWarnOnMixed , 6 , 1 ) ;
whatstr = i18n ( " If selected, you will be notified if you view a page "
" that has both encrypted and non-encrypted parts. " ) ;
TQWhatsThis : : add ( mWarnOnMixed , whatstr ) ;
# endif
///////////////////////////////////////////////////////////////////////////
// SECOND TAB
///////////////////////////////////////////////////////////////////////////
# ifdef HAVE_SSL
tabOSSL = new TQFrame ( this ) ;
TQBoxLayout * vbox = new TQVBoxLayout ( tabOSSL , KDialog : : marginHint ( ) , KDialog : : spacingHint ( ) ) ;
oInfo = new TQVGroupBox ( i18n ( " Path to OpenSSL Shared Libraries " ) , tabOSSL ) ;
vbox - > addWidget ( oInfo ) ;
oPath = new KURLRequester ( oInfo ) ;
oPath - > setMode ( KFile : : Directory ) ;
oTest = new TQPushButton ( i18n ( " &Test " ) , oInfo ) ;
connect ( oTest , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotTestOSSL ( ) ) ) ;
connect ( oPath , TQT_SIGNAL ( textChanged ( const TQString & ) ) , TQT_SLOT ( configChanged ( ) ) ) ;
//
// Settings for the EGD
//
TQFrame * eFrame = new TQFrame ( tabOSSL ) ;
TQVBoxLayout * egrid = new TQVBoxLayout ( eFrame ) ;
mUseEGD = new TQCheckBox ( i18n ( " Use EGD " ) , eFrame ) ;
connect ( mUseEGD , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotUseEGD ( ) ) ) ;
mUseEFile = new TQCheckBox ( i18n ( " Use entropy file " ) , eFrame ) ;
connect ( mUseEFile , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotUseEFile ( ) ) ) ;
vbox - > addWidget ( eFrame ) ;
egrid - > addWidget ( mUseEGD ) ;
egrid - > addWidget ( mUseEFile ) ;
TQFrame * egdframe = new TQFrame ( tabOSSL ) ;
TQGridLayout * grid2 = new TQGridLayout ( egdframe , 2 , 2 , KDialog : : marginHint ( ) ,
KDialog : : spacingHint ( ) ) ;
mEGDLabel = new TQLabel ( i18n ( " Path to EGD: " ) , egdframe ) ;
grid2 - > addWidget ( mEGDLabel , 0 , 0 ) ;
mEGDPath = new KURLRequester ( egdframe ) ;
grid2 - > addWidget ( mEGDPath , 0 , 1 ) ;
connect ( mEGDPath , TQT_SIGNAL ( textChanged ( const TQString & ) ) , TQT_SLOT ( configChanged ( ) ) ) ;
vbox - > addWidget ( egdframe ) ;
whatstr = i18n ( " If selected, OpenSSL will be asked to use the entropy gathering "
" daemon (EGD) for initializing the pseudo-random number generator. " ) ;
TQWhatsThis : : add ( mUseEGD , whatstr ) ;
whatstr = i18n ( " If selected, OpenSSL will be asked to use the given file "
" as entropy for initializing the pseudo-random number generator. " ) ;
TQWhatsThis : : add ( mUseEFile , whatstr ) ;
whatstr = i18n ( " Enter the path to the socket created by the entropy gathering "
" daemon (or the entropy file) here. " ) ;
TQWhatsThis : : add ( mEGDPath , whatstr ) ;
whatstr = i18n ( " Click here to browse for the EGD socket file. " ) ;
TQWhatsThis : : add ( mEGDPath , whatstr ) ;
vbox - > addStretch ( ) ;
# endif
///////////////////////////////////////////////////////////////////////////
// THIRD TAB
///////////////////////////////////////////////////////////////////////////
tabYourSSLCert = new TQFrame ( this ) ;
# ifdef HAVE_SSL
grid = new TQGridLayout ( tabYourSSLCert , 16 , 6 , KDialog : : marginHint ( ) , KDialog : : spacingHint ( ) ) ;
yourSSLBox = new TQListView ( tabYourSSLCert ) ;
yourSSLBox - > setAllColumnsShowFocus ( true ) ;
whatstr = i18n ( " This list box shows which certificates of yours KDE "
" knows about. You can easily manage them from here. " ) ;
TQWhatsThis : : add ( yourSSLBox , whatstr ) ;
grid - > addMultiCellWidget ( yourSSLBox , 0 , 5 , 0 , 4 ) ;
yourSSLBox - > addColumn ( i18n ( " Common Name " ) ) ;
yourSSLBox - > addColumn ( i18n ( " Email Address " ) ) ;
connect ( yourSSLBox , TQT_SIGNAL ( selectionChanged ( ) ) , TQT_SLOT ( slotYourCertSelect ( ) ) ) ;
yourSSLImport = new TQPushButton ( i18n ( " I&mport... " ) , tabYourSSLCert ) ;
connect ( yourSSLImport , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotYourImport ( ) ) ) ;
grid - > addWidget ( yourSSLImport , 0 , 5 ) ;
yourSSLExport = new TQPushButton ( i18n ( " &Export... " ) , tabYourSSLCert ) ;
yourSSLExport - > setEnabled ( false ) ;
connect ( yourSSLExport , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotYourExport ( ) ) ) ;
grid - > addWidget ( yourSSLExport , 1 , 5 ) ;
yourSSLRemove = new TQPushButton ( i18n ( " Remo&ve " ) , tabYourSSLCert ) ;
yourSSLRemove - > setEnabled ( false ) ;
connect ( yourSSLRemove , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotYourRemove ( ) ) ) ;
grid - > addWidget ( yourSSLRemove , 2 , 5 ) ;
yourSSLUnlock = new TQPushButton ( i18n ( " &Unlock " ) , tabYourSSLCert ) ;
yourSSLUnlock - > setEnabled ( false ) ;
connect ( yourSSLUnlock , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotYourUnlock ( ) ) ) ;
grid - > addWidget ( yourSSLUnlock , 3 , 5 ) ;
yourSSLVerify = new TQPushButton ( i18n ( " Verif&y " ) , tabYourSSLCert ) ;
yourSSLVerify - > setEnabled ( false ) ;
connect ( yourSSLVerify , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotYourVerify ( ) ) ) ;
grid - > addWidget ( yourSSLVerify , 4 , 5 ) ;
yourSSLPass = new TQPushButton ( i18n ( " Chan&ge Password... " ) , tabYourSSLCert ) ;
yourSSLPass - > setEnabled ( false ) ;
connect ( yourSSLPass , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotYourPass ( ) ) ) ;
grid - > addWidget ( yourSSLPass , 5 , 5 ) ;
grid - > addMultiCellWidget ( new KSeparator ( KSeparator : : HLine , tabYourSSLCert ) , 6 , 6 , 0 , 5 ) ;
ySubject = KSSLInfoDlg : : certInfoWidget ( tabYourSSLCert , TQString ( TQString ( ) ) ) ;
yIssuer = KSSLInfoDlg : : certInfoWidget ( tabYourSSLCert , TQString ( TQString ( ) ) ) ;
grid - > addMultiCellWidget ( ySubject , 7 , 11 , 0 , 2 ) ;
grid - > addMultiCellWidget ( yIssuer , 7 , 11 , 3 , 5 ) ;
whatstr = i18n ( " This is the information known about the owner of the certificate. " ) ;
TQWhatsThis : : add ( ySubject , whatstr ) ;
whatstr = i18n ( " This is the information known about the issuer of the certificate. " ) ;
TQWhatsThis : : add ( yIssuer , whatstr ) ;
grid - > addWidget ( new TQLabel ( i18n ( " Valid from: " ) , tabYourSSLCert ) , 12 , 0 ) ;
grid - > addWidget ( new TQLabel ( i18n ( " Valid until: " ) , tabYourSSLCert ) , 13 , 0 ) ;
yValidFrom = new TQLabel ( tabYourSSLCert ) ;
grid - > addWidget ( yValidFrom , 12 , 1 ) ;
yValidUntil = new TQLabel ( tabYourSSLCert ) ;
grid - > addWidget ( yValidUntil , 13 , 1 ) ;
whatstr = i18n ( " The certificate is valid starting at this date. " ) ;
TQWhatsThis : : add ( yValidFrom , whatstr ) ;
whatstr = i18n ( " The certificate is valid until this date. " ) ;
TQWhatsThis : : add ( yValidUntil , whatstr ) ;
grid - > addWidget ( new TQLabel ( i18n ( " MD5 digest: " ) , tabYourSSLCert ) , 14 , 0 ) ;
yHash = new TQLabel ( tabYourSSLCert ) ;
grid - > addWidget ( yHash , 14 , 1 ) ;
whatstr = i18n ( " A hash of the certificate used to identify it quickly. " ) ;
TQWhatsThis : : add ( yHash , whatstr ) ;
#if 0
TQHButtonGroup * ocbg = new TQHButtonGroup ( i18n ( " On SSL Connection... " ) , tabYourSSLCert ) ;
yourSSLUseDefault = new TQRadioButton ( i18n ( " &Use default certificate " ) , ocbg ) ;
yourSSLList = new TQRadioButton ( i18n ( " &List upon connection " ) , ocbg ) ;
yourSSLDont = new TQRadioButton ( i18n ( " &Do not use certificates " ) , ocbg ) ;
grid - > addMultiCellWidget ( ocbg , 14 , 14 , 0 , 5 ) ;
# endif
# else
nossllabel = new TQLabel ( i18n ( " SSL certificates cannot be managed "
" because this module was not linked "
" with OpenSSL. " ) , tabYourSSLCert ) ;
grid - > addMultiCellWidget ( nossllabel , 3 , 3 , 0 , 5 ) ;
# endif
///////////////////////////////////////////////////////////////////////////
// FOURTH TAB
///////////////////////////////////////////////////////////////////////////
tabAuth = new TQFrame ( this ) ;
# ifdef HAVE_SSL
grid = new TQGridLayout ( tabAuth , 20 , 6 , KDialog : : marginHint ( ) , KDialog : : spacingHint ( ) ) ;
grid - > addMultiCellWidget ( new TQLabel ( i18n ( " Default Authentication Certificate " ) , tabAuth ) , 0 , 0 , 0 , 2 ) ;
defCertBG = new TQVButtonGroup ( i18n ( " Default Action " ) , tabAuth ) ;
defSend = new TQRadioButton ( i18n ( " &Send " ) , defCertBG ) ;
defPrompt = new TQRadioButton ( i18n ( " &Prompt " ) , defCertBG ) ;
defDont = new TQRadioButton ( i18n ( " Do ¬ send " ) , defCertBG ) ;
grid - > addMultiCellWidget ( defCertBG , 1 , 3 , 0 , 2 ) ;
grid - > addMultiCellWidget ( new TQLabel ( i18n ( " Default certificate: " ) , tabAuth ) , 1 , 1 , 3 , 5 ) ;
defCertBox = new KComboBox ( false , tabAuth ) ;
grid - > addMultiCellWidget ( defCertBox , 2 , 2 , 3 , 5 ) ;
grid - > addMultiCellWidget ( new KSeparator ( KSeparator : : HLine , tabAuth ) , 4 , 4 , 0 , 5 ) ;
grid - > addMultiCellWidget ( new TQLabel ( i18n ( " Host authentication: " ) , tabAuth ) , 5 , 5 , 0 , 1 ) ;
hostAuthList = new TQListView ( tabAuth ) ;
hostAuthList - > setAllColumnsShowFocus ( true ) ;
grid - > addMultiCellWidget ( hostAuthList , 6 , 13 , 0 , 5 ) ;
hostAuthList - > addColumn ( i18n ( " Host " ) ) ;
hostAuthList - > addColumn ( i18n ( " Certificate " ) ) ;
hostAuthList - > addColumn ( i18n ( " Policy " ) ) ;
grid - > addWidget ( new TQLabel ( i18n ( " Host: " ) , tabAuth ) , 14 , 0 ) ;
grid - > addWidget ( new TQLabel ( i18n ( " Certificate: " ) , tabAuth ) , 15 , 0 ) ;
authHost = new TQLineEdit ( tabAuth ) ;
grid - > addMultiCellWidget ( authHost , 14 , 14 , 1 , 4 ) ;
hostCertBox = new KComboBox ( false , tabAuth ) ;
grid - > addMultiCellWidget ( hostCertBox , 15 , 15 , 1 , 4 ) ;
hostCertBG = new TQHButtonGroup ( i18n ( " Action " ) , tabAuth ) ;
hostSend = new TQRadioButton ( i18n ( " Send " ) , hostCertBG ) ;
hostPrompt = new TQRadioButton ( i18n ( " Prompt " ) , hostCertBG ) ;
hostDont = new TQRadioButton ( i18n ( " Do not send " ) , hostCertBG ) ;
grid - > addMultiCellWidget ( hostCertBG , 16 , 16 , 0 , 5 ) ;
authAdd = new TQPushButton ( i18n ( " Ne&w " ) , tabAuth ) ;
authRemove = new TQPushButton ( i18n ( " Remo&ve " ) , tabAuth ) ;
grid - > addWidget ( authAdd , 17 , 4 ) ;
grid - > addWidget ( authRemove , 17 , 5 ) ;
authHost - > setEnabled ( false ) ;
hostCertBox - > setEnabled ( false ) ;
hostCertBG - > setEnabled ( false ) ;
authRemove - > setEnabled ( false ) ;
connect ( defCertBox , TQT_SIGNAL ( activated ( int ) ) , this , TQT_SLOT ( configChanged ( ) ) ) ;
connect ( defCertBG , TQT_SIGNAL ( clicked ( int ) ) , this , TQT_SLOT ( configChanged ( ) ) ) ;
connect ( hostAuthList , TQT_SIGNAL ( selectionChanged ( ) ) , this , TQT_SLOT ( slotAuthItemChanged ( ) ) ) ;
connect ( authAdd , TQT_SIGNAL ( clicked ( ) ) , this , TQT_SLOT ( slotNewHostAuth ( ) ) ) ;
connect ( authRemove , TQT_SIGNAL ( clicked ( ) ) , this , TQT_SLOT ( slotRemoveHostAuth ( ) ) ) ;
connect ( authHost , TQT_SIGNAL ( textChanged ( const TQString & ) ) , this , TQT_SLOT ( slotAuthText ( const TQString & ) ) ) ;
connect ( hostCertBG , TQT_SIGNAL ( clicked ( int ) ) , this , TQT_SLOT ( slotAuthButtons ( ) ) ) ;
connect ( hostCertBox , TQT_SIGNAL ( activated ( int ) ) , this , TQT_SLOT ( slotAuthCombo ( ) ) ) ;
# else
nossllabel = new TQLabel ( i18n ( " SSL certificates cannot be managed "
" because this module was not linked "
" with OpenSSL. " ) , tabAuth ) ;
grid - > addMultiCellWidget ( nossllabel , 3 , 3 , 0 , 5 ) ;
# endif
///////////////////////////////////////////////////////////////////////////
// FIFTH TAB
///////////////////////////////////////////////////////////////////////////
tabOtherSSLCert = new TQFrame ( this ) ;
# ifdef HAVE_SSL
oGrid = grid = new TQGridLayout ( tabOtherSSLCert , 21 , 6 , KDialog : : marginHint ( ) , KDialog : : spacingHint ( ) ) ;
otherSSLBox = new TQListView ( tabOtherSSLCert ) ;
otherSSLBox - > setAllColumnsShowFocus ( true ) ;
connect ( otherSSLBox , TQT_SIGNAL ( selectionChanged ( ) ) , TQT_SLOT ( slotOtherCertSelect ( ) ) ) ;
whatstr = i18n ( " This list box shows which site and person certificates KDE "
" knows about. You can easily manage them from here. " ) ;
TQWhatsThis : : add ( otherSSLBox , whatstr ) ;
otherSSLBox - > addColumn ( i18n ( " Organization " ) ) ;
otherSSLBox - > addColumn ( i18n ( " Common Name " ) ) ;
grid - > addMultiCellWidget ( otherSSLBox , 0 , 7 , 0 , 4 ) ;
otherSSLExport = new TQPushButton ( i18n ( " &Export... " ) , tabOtherSSLCert ) ;
connect ( otherSSLExport , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotExportCert ( ) ) ) ;
grid - > addWidget ( otherSSLExport , 0 , 5 ) ;
whatstr = i18n ( " This button allows you to export the selected certificate "
" to a file of various formats. " ) ;
TQWhatsThis : : add ( otherSSLExport , whatstr ) ;
otherSSLRemove = new TQPushButton ( i18n ( " &Remove " ) , tabOtherSSLCert ) ;
connect ( otherSSLRemove , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotRemoveCert ( ) ) ) ;
grid - > addWidget ( otherSSLRemove , 1 , 5 ) ;
whatstr = i18n ( " This button removes the selected certificate "
" from the certificate cache. " ) ;
TQWhatsThis : : add ( otherSSLRemove , whatstr ) ;
otherSSLVerify = new TQPushButton ( i18n ( " &Verify " ) , tabOtherSSLCert ) ;
connect ( otherSSLVerify , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotVerifyCert ( ) ) ) ;
grid - > addWidget ( otherSSLVerify , 2 , 5 ) ;
whatstr = i18n ( " This button tests the selected certificate "
" for validity. " ) ;
TQWhatsThis : : add ( otherSSLVerify , whatstr ) ;
otherSSLExport - > setEnabled ( false ) ;
otherSSLVerify - > setEnabled ( false ) ;
otherSSLRemove - > setEnabled ( false ) ;
grid - > addMultiCellWidget ( new KSeparator ( KSeparator : : HLine , tabOtherSSLCert ) , 8 , 8 , 0 , 5 ) ;
oSubject = KSSLInfoDlg : : certInfoWidget ( tabOtherSSLCert , TQString ( TQString ( ) ) ) ;
oIssuer = KSSLInfoDlg : : certInfoWidget ( tabOtherSSLCert , TQString ( TQString ( ) ) ) ;
grid - > addMultiCellWidget ( oSubject , 9 , 13 , 0 , 2 ) ;
grid - > addMultiCellWidget ( oIssuer , 9 , 13 , 3 , 5 ) ;
whatstr = i18n ( " This is the information known about the owner of the certificate. " ) ;
TQWhatsThis : : add ( oSubject , whatstr ) ;
whatstr = i18n ( " This is the information known about the issuer of the certificate. " ) ;
TQWhatsThis : : add ( oIssuer , whatstr ) ;
fromLabel = new TQLabel ( i18n ( " Valid from: " ) , tabOtherSSLCert ) ;
untilLabel = new TQLabel ( i18n ( " Valid until: " ) , tabOtherSSLCert ) ;
grid - > addWidget ( fromLabel , 14 , 0 ) ;
grid - > addWidget ( untilLabel , 15 , 0 ) ;
fromLabel - > setEnabled ( false ) ;
untilLabel - > setEnabled ( false ) ;
validFrom = new TQLabel ( tabOtherSSLCert ) ;
grid - > addWidget ( validFrom , 14 , 1 ) ;
validUntil = new TQLabel ( tabOtherSSLCert ) ;
grid - > addWidget ( validUntil , 15 , 1 ) ;
whatstr = i18n ( " The certificate is valid starting at this date. " ) ;
TQWhatsThis : : add ( validFrom , whatstr ) ;
whatstr = i18n ( " The certificate is valid until this date. " ) ;
TQWhatsThis : : add ( validUntil , whatstr ) ;
cacheGroup = new TQVButtonGroup ( i18n ( " Cache " ) , tabOtherSSLCert ) ;
cachePerm = new TQRadioButton ( i18n ( " Permanentl&y " ) , cacheGroup ) ;
cacheUntil = new TQRadioButton ( i18n ( " &Until " ) , cacheGroup ) ;
untilDate = new KURLLabel ( TQString ( ) , TQString ( ) , cacheGroup ) ;
cacheGroup - > setEnabled ( false ) ;
grid - > addMultiCellWidget ( cacheGroup , 16 , 19 , 0 , 2 ) ;
cachePerm - > setEnabled ( false ) ;
cacheUntil - > setEnabled ( false ) ;
untilDate - > setEnabled ( false ) ;
connect ( cachePerm , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotPermanent ( ) ) ) ;
connect ( cacheUntil , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotUntil ( ) ) ) ;
connect ( untilDate , TQT_SIGNAL ( leftClickedURL ( ) ) , TQT_SLOT ( slotDatePick ( ) ) ) ;
whatstr = i18n ( " Select here to make the cache entry permanent. " ) ;
TQWhatsThis : : add ( cachePerm , whatstr ) ;
whatstr = i18n ( " Select here to make the cache entry temporary. " ) ;
TQWhatsThis : : add ( cacheUntil , whatstr ) ;
whatstr = i18n ( " The date and time until the certificate cache entry should expire. " ) ;
TQWhatsThis : : add ( untilDate , whatstr ) ;
policyGroup = new TQVButtonGroup ( i18n ( " Policy " ) , tabOtherSSLCert ) ;
policyAccept = new TQRadioButton ( i18n ( " Accep&t " ) , policyGroup ) ;
policyReject = new TQRadioButton ( i18n ( " Re&ject " ) , policyGroup ) ;
policyPrompt = new TQRadioButton ( i18n ( " &Prompt " ) , policyGroup ) ;
policyGroup - > setEnabled ( false ) ;
grid - > addMultiCellWidget ( policyGroup , 16 , 19 , 3 , 5 ) ;
connect ( policyGroup , TQT_SIGNAL ( clicked ( int ) ) , TQT_SLOT ( slotPolicyChanged ( int ) ) ) ;
whatstr = i18n ( " Select this to always accept this certificate. " ) ;
TQWhatsThis : : add ( policyAccept , whatstr ) ;
whatstr = i18n ( " Select this to always reject this certificate. " ) ;
TQWhatsThis : : add ( policyReject , whatstr ) ;
whatstr = i18n ( " Select this if you wish to be prompted for action when receiving this certificate. " ) ;
TQWhatsThis : : add ( policyPrompt , whatstr ) ;
grid - > addWidget ( new TQLabel ( i18n ( " MD5 digest: " ) , tabOtherSSLCert ) , 20 , 0 ) ;
pHash = new TQLabel ( tabOtherSSLCert ) ;
grid - > addWidget ( pHash , 20 , 1 ) ;
whatstr = i18n ( " A hash of the certificate used to identify it quickly. " ) ;
TQWhatsThis : : add ( pHash , whatstr ) ;
# else
nossllabel = new TQLabel ( i18n ( " SSL certificates cannot be managed "
" because this module was not linked "
" with OpenSSL. " ) , tabOtherSSLCert ) ;
grid - > addMultiCellWidget ( nossllabel , 1 , 1 , 0 , 1 ) ;
# endif
///////////////////////////////////////////////////////////////////////////
// SIXTH TAB
///////////////////////////////////////////////////////////////////////////
tabSSLCA = new TQFrame ( this ) ;
# ifdef HAVE_SSL
grid = new TQGridLayout ( tabSSLCA , 11 , 8 , KDialog : : marginHint ( ) , KDialog : : spacingHint ( ) ) ;
caList = new TQListView ( tabSSLCA ) ;
caList - > setAllColumnsShowFocus ( true ) ;
whatstr = i18n ( " This list box shows which certificate authorities KDE "
" knows about. You can easily manage them from here. " ) ;
TQWhatsThis : : add ( caList , whatstr ) ;
grid - > addMultiCellWidget ( caList , 0 , 3 , 0 , 6 ) ;
caList - > addColumn ( i18n ( " Organization " ) ) ;
caList - > addColumn ( i18n ( " Organizational Unit " ) ) ;
caList - > addColumn ( i18n ( " Common Name " ) ) ;
connect ( caList , TQT_SIGNAL ( selectionChanged ( ) ) , TQT_SLOT ( slotCAItemChanged ( ) ) ) ;
caSSLImport = new TQPushButton ( i18n ( " I&mport... " ) , tabSSLCA ) ;
connect ( caSSLImport , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotCAImport ( ) ) ) ;
grid - > addWidget ( caSSLImport , 0 , 7 ) ;
caSSLRemove = new TQPushButton ( i18n ( " &Remove " ) , tabSSLCA ) ;
connect ( caSSLRemove , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotCARemove ( ) ) ) ;
grid - > addWidget ( caSSLRemove , 1 , 7 ) ;
caSSLRemove - > setEnabled ( false ) ;
caSSLRestore = new TQPushButton ( i18n ( " Res&tore " ) , tabSSLCA ) ;
connect ( caSSLRestore , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotCARestore ( ) ) ) ;
grid - > addWidget ( caSSLRestore , 2 , 7 ) ;
caSubject = KSSLInfoDlg : : certInfoWidget ( tabSSLCA , TQString ( TQString ( ) ) ) ;
caIssuer = KSSLInfoDlg : : certInfoWidget ( tabSSLCA , TQString ( TQString ( ) ) ) ;
grid - > addMultiCellWidget ( caSubject , 4 , 6 , 0 , 3 ) ;
grid - > addMultiCellWidget ( caIssuer , 4 , 6 , 4 , 7 ) ;
// Accept for Web Site Signing, Email Signing, Code Signing
caSite = new TQCheckBox ( i18n ( " Accept for site signing " ) , tabSSLCA ) ;
caEmail = new TQCheckBox ( i18n ( " Accept for email signing " ) , tabSSLCA ) ;
caCode = new TQCheckBox ( i18n ( " Accept for code signing " ) , tabSSLCA ) ;
grid - > addMultiCellWidget ( caSite , 7 , 7 , 0 , 3 ) ;
connect ( caSite , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotCAChecked ( ) ) ) ;
grid - > addMultiCellWidget ( caEmail , 8 , 8 , 0 , 3 ) ;
connect ( caEmail , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotCAChecked ( ) ) ) ;
grid - > addMultiCellWidget ( caCode , 9 , 9 , 0 , 3 ) ;
connect ( caCode , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( slotCAChecked ( ) ) ) ;
caSite - > setEnabled ( false ) ;
caEmail - > setEnabled ( false ) ;
caCode - > setEnabled ( false ) ;
grid - > addWidget ( new TQLabel ( i18n ( " MD5 digest: " ) , tabSSLCA ) , 10 , 0 ) ;
cHash = new TQLabel ( tabSSLCA ) ;
grid - > addWidget ( cHash , 10 , 1 ) ;
whatstr = i18n ( " A hash of the certificate used to identify it quickly. " ) ;
TQWhatsThis : : add ( cHash , whatstr ) ;
# else
nossllabel = new TQLabel ( i18n ( " SSL certificates cannot be managed "
" because this module was not linked "
" with OpenSSL. " ) , tabSSLCA ) ;
grid - > addMultiCellWidget ( nossllabel , 1 , 1 , 0 , 1 ) ;
# endif
#if 0
///////////////////////////////////////////////////////////////////////////
// SEVENTH TAB
///////////////////////////////////////////////////////////////////////////
tabSSLCOpts = new TQFrame ( this ) ;
# ifdef HAVE_SSL
grid = new TQGridLayout ( tabSSLCOpts , 9 , 4 , KDialog : : marginHint ( ) , KDialog : : spacingHint ( ) ) ;
mWarnSelfSigned = new TQCheckBox ( i18n ( " Warn on &self-signed certificates or unknown CA's " ) , tabSSLCOpts ) ;
connect ( mWarnSelfSigned , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( configChanged ( ) ) ) ;
mWarnExpired = new TQCheckBox ( i18n ( " Warn on &expired certificates " ) , tabSSLCOpts ) ;
connect ( mWarnExpired , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( configChanged ( ) ) ) ;
mWarnRevoked = new TQCheckBox ( i18n ( " Warn on re&voked certificates " ) , tabSSLCOpts ) ;
connect ( mWarnRevoked , TQT_SIGNAL ( clicked ( ) ) , TQT_SLOT ( configChanged ( ) ) ) ;
grid - > addMultiCellWidget ( mWarnSelfSigned , 0 , 0 , 0 , 3 ) ;
grid - > addMultiCellWidget ( mWarnExpired , 1 , 1 , 0 , 3 ) ;
grid - > addMultiCellWidget ( mWarnRevoked , 2 , 2 , 0 , 3 ) ;
macCert = new TQLineEdit ( tabSSLCOpts ) ;
grid - > addMultiCellWidget ( macCert , 4 , 4 , 0 , 2 ) ;
macBox = new TQListBox ( tabSSLCOpts ) ;
whatstr = i18n ( " This list box shows which sites you have decided to accept "
" a certificate from even though the certificate might fail "
" the validation procedure. " ) ;
TQWhatsThis : : add ( macBox , whatstr ) ;
caSSLBox - > setSelectionMode ( TQListBox : : Single ) ;
caSSLBox - > setColumnMode ( TQListBox : : FixedNumber ) ;
grid - > addMultiCellWidget ( macBox , 5 , 8 , 0 , 2 ) ;
macAdd = new TQPushButton ( i18n ( " &Add " ) , tabSSLCOpts ) ;
//connect(macAdd, TQT_SIGNAL(), TQT_SLOT());
grid - > addWidget ( macAdd , 4 , 3 ) ;
macRemove = new TQPushButton ( i18n ( " &Remove " ) , tabSSLCOpts ) ;
//connect(macRemove, TQT_SIGNAL(), TQT_SLOT());
grid - > addWidget ( macRemove , 5 , 3 ) ;
macClear = new KPushButton ( KGuiItem : : clear ( ) , tabSSLCOpts ) ;
//connect(macAdd, TQT_SIGNAL(), TQT_SLOT());
grid - > addWidget ( macClear , 6 , 3 ) ;
# else
nossllabel = new TQLabel ( i18n ( " These options are not configurable "
" because this module was not linked "
" with OpenSSL. " ) , tabSSLCOpts ) ;
grid - > addMultiCellWidget ( nossllabel , 1 , 1 , 0 , 1 ) ;
# endif
# endif
///////////////////////////////////////////////////////////////////////////
// Add the tabs and startup
///////////////////////////////////////////////////////////////////////////
tabs - > addTab ( tabSSL , i18n ( " SSL " ) ) ;
# ifdef HAVE_SSL
tabs - > addTab ( tabOSSL , i18n ( " OpenSSL " ) ) ;
# endif
tabs - > addTab ( tabYourSSLCert , i18n ( " Your Certificates " ) ) ;
tabs - > addTab ( tabAuth , i18n ( " Authentication " ) ) ;
tabs - > addTab ( tabOtherSSLCert , i18n ( " Peer SSL Certificates " ) ) ;
tabs - > addTab ( tabSSLCA , i18n ( " SSL Signers " ) ) ;
#if 0
tabs - > addTab ( tabSSLCOpts , i18n ( " Validation Options " ) ) ;
# endif
tabs - > resize ( tabs - > tqsizeHint ( ) ) ;
load ( ) ;
}
KCryptoConfig : : ~ KCryptoConfig ( )
{
delete config ;
delete policies ;
delete pcerts ;
delete authcfg ;
delete _signers ;
}
void KCryptoConfig : : configChanged ( )
{
emit changed ( true ) ;
}
void KCryptoConfig : : load ( )
{
load ( false ) ;
}
void KCryptoConfig : : load ( bool useDefaults )
{
config - > setReadDefaults ( useDefaults ) ;
# ifdef HAVE_SSL
otherCertDelList . clear ( ) ;
yourCertDelList . clear ( ) ;
authDelList . clear ( ) ;
caDelList . clear ( ) ;
config - > setGroup ( " TLS " ) ;
mUseTLS - > setChecked ( config - > readBoolEntry ( " Enabled " , true ) ) ;
config - > setGroup ( " SSLv2 " ) ;
mUseSSLv2 - > setChecked ( config - > readBoolEntry ( " Enabled " , true ) ) ;
config - > setGroup ( " SSLv3 " ) ;
mUseSSLv3 - > setChecked ( config - > readBoolEntry ( " Enabled " , true ) ) ;
config - > setGroup ( " Warnings " ) ;
mWarnOnEnter - > setChecked ( config - > readBoolEntry ( " OnEnter " , false ) ) ;
mWarnOnLeave - > setChecked ( config - > readBoolEntry ( " OnLeave " , true ) ) ;
mWarnOnUnencrypted - > setChecked ( config - > readBoolEntry ( " OnUnencrypted " , true ) ) ;
#if 0 // NOT IMPLEMENTED IN KDE 2.0
mWarnOnMixed - > setChecked ( config - > readBoolEntry ( " OnMixed " , true ) ) ;
config - > setGroup ( " Validation " ) ;
mWarnSelfSigned - > setChecked ( config - > readBoolEntry ( " WarnSelfSigned " , true ) ) ;
mWarnExpired - > setChecked ( config - > readBoolEntry ( " WarnExpired " , true ) ) ;
mWarnRevoked - > setChecked ( config - > readBoolEntry ( " WarnRevoked " , true ) ) ;
# endif
config - > setGroup ( " EGD " ) ;
slotUseEGD ( ) ; // set the defaults
if ( config - > readBoolEntry ( " UseEGD " , false ) ) {
mUseEGD - > setChecked ( true ) ;
slotUseEGD ( ) ;
} else if ( config - > readBoolEntry ( " UseEFile " , false ) ) {
mUseEFile - > setChecked ( true ) ;
slotUseEFile ( ) ;
}
mEGDPath - > setURL ( config - > readPathEntry ( " EGDPath " ) ) ;
# ifdef HAVE_SSL
config - > setGroup ( " OpenSSL " ) ;
oPath - > setURL ( config - > readPathEntry ( " Path " ) ) ;
# endif
config - > setGroup ( " SSLv2 " ) ;
CipherItem * item = static_cast < CipherItem * > ( SSLv2Box - > firstChild ( ) ) ;
while ( item ) {
item - > setOn ( config - > readBoolEntry ( item - > configName ( ) ,
item - > bits ( ) > = 56 ) ) ;
item = static_cast < CipherItem * > ( item - > nextSibling ( ) ) ;
}
config - > setGroup ( " SSLv3 " ) ;
item = static_cast < CipherItem * > ( SSLv3Box - > firstChild ( ) ) ;
while ( item ) {
item - > setOn ( config - > readBoolEntry ( item - > configName ( ) ,
item - > bits ( ) > = 56 ) ) ;
item = static_cast < CipherItem * > ( item - > nextSibling ( ) ) ;
}
SSLv2Box - > setEnabled ( mUseSSLv2 - > isChecked ( ) ) ;
SSLv3Box - > setEnabled ( mUseSSLv3 - > isChecked ( ) ) ;
TQStringList groups = policies - > groupList ( ) ;
otherSSLBox - > clear ( ) ;
for ( TQStringList : : Iterator i = groups . begin ( ) ; i ! = groups . end ( ) ; + + i ) {
if ( ( * i ) . isEmpty ( ) | | * i = = " <default> " | | * i = = " General " ) continue ;
policies - > setGroup ( * i ) ;
KSSLCertificate * cert = KSSLCertificate : : fromString ( policies - > readEntry ( " Certificate " , TQString ( ) ) . local8Bit ( ) ) ;
if ( cert ) {
new OtherCertItem ( otherSSLBox , cert - > getSubject ( ) , * i ,
policies - > readBoolEntry ( " Permanent " , true ) ,
policies - > readNumEntry ( " Policy " , 3 ) ,
policies - > readDateTimeEntry ( " Expires " ) , this ) ;
delete cert ;
}
}
groups = pcerts - > groupList ( ) ;
yourSSLBox - > clear ( ) ;
for ( TQStringList : : Iterator i = groups . begin ( ) ; i ! = groups . end ( ) ; + + i ) {
if ( ( * i ) . isEmpty ( ) | | * i = = " <default> " ) continue ;
pcerts - > setGroup ( * i ) ;
YourCertItem * j = new YourCertItem ( yourSSLBox ,
pcerts - > readEntry ( " PKCS12Base64 " ) ,
pcerts - > readEntry ( " Password " ) ,
* i , this ) ;
j - > setPassCache ( TQString ( ) ) ;
}
setAuthCertLists ( ) ;
config - > setGroup ( " Auth " ) ;
TQString whichAuth = config - > readEntry ( " AuthMethod " , " none " ) ;
if ( whichAuth = = " send " )
defCertBG - > setButton ( defCertBG - > id ( defSend ) ) ;
else if ( whichAuth = = " prompt " )
defCertBG - > setButton ( defCertBG - > id ( defPrompt ) ) ;
else
defCertBG - > setButton ( defCertBG - > id ( defDont ) ) ;
TQString whichCert = config - > readEntry ( " DefaultCert " ) ;
defCertBox - > setCurrentItem ( 0 ) ;
for ( int i = 0 ; i < defCertBox - > count ( ) ; i + + ) {
if ( defCertBox - > text ( i ) = = whichCert ) {
defCertBox - > setCurrentItem ( i ) ;
break ;
}
}
hostAuthList - > clear ( ) ;
groups = authcfg - > groupList ( ) ;
for ( TQStringList : : Iterator i = groups . begin ( ) ;
i ! = groups . end ( ) ;
+ + i ) {
if ( ( * i ) . isEmpty ( ) | | * i = = " <default> " ) continue ;
authcfg - > setGroup ( * i ) ;
KSSLCertificateHome : : KSSLAuthAction aa = KSSLCertificateHome : : AuthDont ;
if ( authcfg - > readBoolEntry ( " send " , false ) = = true )
aa = KSSLCertificateHome : : AuthSend ;
else if ( authcfg - > readBoolEntry ( " prompt " , false ) = = true )
aa = KSSLCertificateHome : : AuthPrompt ;
HostAuthItem * j = new HostAuthItem ( hostAuthList ,
KResolver : : domainToAscii ( * i ) ,
authcfg - > readEntry ( " certificate " ) ,
this ) ;
j - > setAction ( aa ) ;
j - > setOriginalName ( * i ) ;
}
groups = _signers - > list ( ) ;
KConfig sigcfg ( " ksslcalist " , true , false ) ;
caList - > clear ( ) ;
for ( TQStringList : : Iterator i = groups . begin ( ) ;
i ! = groups . end ( ) ;
+ + i ) {
if ( ( * i ) . isEmpty ( ) | | * i = = " <default> " ) continue ;
if ( ! sigcfg . hasGroup ( * i ) ) continue ;
sigcfg . setGroup ( * i ) ;
if ( ! sigcfg . hasKey ( " x509 " ) ) continue ;
new CAItem ( caList ,
( * i ) ,
sigcfg . readEntry ( " x509 " ) ,
sigcfg . readBoolEntry ( " site " , false ) ,
sigcfg . readBoolEntry ( " email " , false ) ,
sigcfg . readBoolEntry ( " code " , false ) ,
this ) ;
}
slotCAItemChanged ( ) ;
slotOtherCertSelect ( ) ;
slotYourCertSelect ( ) ;
# endif
emit changed ( useDefaults ) ;
}
void KCryptoConfig : : save ( )
{
# ifdef HAVE_SSL
if ( ! mUseSSLv2 - > isChecked ( ) & &
! mUseSSLv3 - > isChecked ( ) )
KMessageBox : : information ( this , i18n ( " If you do not select at least one "
" SSL algorithm, either SSL will not "
" work or the application may be "
" forced to choose a suitable default. " ) ,
i18n ( " SSL " ) ) ;
config - > setGroup ( " TLS " ) ;
config - > writeEntry ( " Enabled " , mUseTLS - > isChecked ( ) ) ;
config - > setGroup ( " SSLv2 " ) ;
config - > writeEntry ( " Enabled " , mUseSSLv2 - > isChecked ( ) ) ;
config - > setGroup ( " SSLv3 " ) ;
config - > writeEntry ( " Enabled " , mUseSSLv3 - > isChecked ( ) ) ;
config - > setGroup ( " Warnings " ) ;
config - > writeEntry ( " OnEnter " , mWarnOnEnter - > isChecked ( ) ) ;
config - > writeEntry ( " OnLeave " , mWarnOnLeave - > isChecked ( ) ) ;
config - > writeEntry ( " OnUnencrypted " , mWarnOnUnencrypted - > isChecked ( ) ) ;
config - > setGroup ( " EGD " ) ;
config - > writeEntry ( " UseEGD " , mUseEGD - > isChecked ( ) ) ;
config - > writeEntry ( " UseEFile " , mUseEFile - > isChecked ( ) ) ;
config - > writePathEntry ( " EGDPath " , mEGDPath - > url ( ) ) ;
#if 0 // NOT IMPLEMENTED IN KDE 2.0
config - > writeEntry ( " OnMixed " , mWarnOnMixed - > isChecked ( ) ) ;
config - > setGroup ( " Validation " ) ;
config - > writeEntry ( " WarnSelfSigned " , mWarnSelfSigned - > isChecked ( ) ) ;
config - > writeEntry ( " WarnExpired " , mWarnExpired - > isChecked ( ) ) ;
config - > writeEntry ( " WarnRevoked " , mWarnRevoked - > isChecked ( ) ) ;
# endif
# ifdef HAVE_SSL
config - > setGroup ( " OpenSSL " ) ;
config - > writePathEntry ( " Path " , oPath - > url ( ) ) ;
# endif
int ciphercount = 0 ;
config - > setGroup ( " SSLv2 " ) ;
CipherItem * item = static_cast < CipherItem * > ( SSLv2Box - > firstChild ( ) ) ;
while ( item ) {
if ( item - > isOn ( ) ) {
config - > writeEntry ( item - > configName ( ) , true ) ;
ciphercount + + ;
} else config - > writeEntry ( item - > configName ( ) , false ) ;
item = static_cast < CipherItem * > ( item - > nextSibling ( ) ) ;
}
if ( mUseSSLv2 - > isChecked ( ) & & ciphercount = = 0 )
KMessageBox : : information ( this , i18n ( " If you do not select at least one "
" cipher, SSLv2 will not work. " ) ,
i18n ( " SSLv2 Ciphers " ) ) ;
ciphercount = 0 ;
config - > setGroup ( " SSLv3 " ) ;
item = static_cast < CipherItem * > ( SSLv3Box - > firstChild ( ) ) ;
while ( item ) {
if ( item - > isOn ( ) ) {
config - > writeEntry ( item - > configName ( ) , true ) ;
ciphercount + + ;
} else config - > writeEntry ( item - > configName ( ) , false ) ;
item = static_cast < CipherItem * > ( item - > nextSibling ( ) ) ;
}
KSSLCertificateCache _cc ;
if ( mUseSSLv3 - > isChecked ( ) & & ciphercount = = 0 )
KMessageBox : : information ( this , i18n ( " If you do not select at least one "
" cipher, SSLv3 will not work. " ) ,
i18n ( " SSLv3 Ciphers " ) ) ;
// SSL Policies code
for ( OtherCertItem * x = otherCertDelList . first ( ) ; x ! = 0 ; x = otherCertDelList . next ( ) ) {
KSSLX509Map cert ( x - > configName ( ) ) ;
TQString thisCN = cert . getValue ( " CN " ) ;
_cc . removeByCN ( thisCN ) ;
otherCertDelList . remove ( x ) ;
}
// Go through the non-deleted ones and save them
for ( OtherCertItem * x =
static_cast < OtherCertItem * > ( otherSSLBox - > firstChild ( ) ) ;
x ;
x = static_cast < OtherCertItem * > ( x - > nextSibling ( ) ) ) {
KSSLX509Map cert ( x - > configName ( ) ) ;
TQString thisCN = cert . getValue ( " CN " ) ;
TQDateTime expires = x - > getExpires ( ) ;
_cc . modifyByCN ( thisCN , ( KSSLCertificateCache : : KSSLCertificatePolicy ) x - > getPolicy ( ) , x - > isPermanent ( ) , expires ) ;
}
// SSL Personal certificates code
for ( YourCertItem * x = yourCertDelList . first ( ) ; x ! = 0 ; x = yourCertDelList . next ( ) ) {
pcerts - > deleteGroup ( x - > configName ( ) ) ;
yourCertDelList . remove ( x ) ;
}
// Go through the non-deleted ones and save them
for ( YourCertItem * x =
static_cast < YourCertItem * > ( yourSSLBox - > firstChild ( ) ) ;
x ;
x = static_cast < YourCertItem * > ( x - > nextSibling ( ) ) ) {
pcerts - > setGroup ( x - > configName ( ) ) ;
pcerts - > writeEntry ( " PKCS12Base64 " , x - > getPKCS ( ) ) ;
pcerts - > writeEntry ( " Password " , x - > getPass ( ) ) ;
}
bool doGen = false ;
// CA certificates code
for ( CAItem * x = caDelList . first ( ) ; x ! = 0 ; x = caDelList . next ( ) ) {
_signers - > remove ( x - > configName ( ) ) ;
caDelList . remove ( x ) ;
doGen = true ;
}
// Go through the non-deleted ones and save them
for ( CAItem * x = static_cast < CAItem * > ( caList - > firstChild ( ) ) ; x ;
x = static_cast < CAItem * > ( x - > nextSibling ( ) ) ) {
if ( ! x - > modified & & ! x - > isNew ) continue ;
if ( x - > isNew ) {
x - > isNew = false ;
_signers - > addCA ( x - > getCert ( ) ,
x - > getSite ( ) ,
x - > getEmail ( ) ,
x - > getCode ( ) ) ;
} else {
_signers - > setUse ( x - > configName ( ) ,
x - > getSite ( ) ,
x - > getEmail ( ) ,
x - > getCode ( ) ) ;
}
x - > modified = false ;
doGen = true ;
}
if ( doGen ) genCAList ( ) ;
config - > setGroup ( " Auth " ) ;
TQString whichAuth = config - > readEntry ( " AuthMethod " , " none " ) ;
if ( defCertBG - > selected ( ) = = defSend )
config - > writeEntry ( " AuthMethod " , " send " ) ;
else if ( defCertBG - > selected ( ) = = defPrompt )
config - > writeEntry ( " AuthMethod " , " prompt " ) ;
else
config - > writeEntry ( " AuthMethod " , " none " ) ;
if ( defCertBox - > currentItem ( ) = = 0 )
config - > writeEntry ( " DefaultCert " , TQString ( ) ) ;
else config - > writeEntry ( " DefaultCert " , defCertBox - > currentText ( ) ) ;
for ( HostAuthItem * x = authDelList . first ( ) ; x ! = 0 ; x = authDelList . next ( ) ) {
authcfg - > deleteGroup ( x - > configName ( ) ) ;
authDelList . remove ( x ) ;
}
for ( HostAuthItem * x =
static_cast < HostAuthItem * > ( hostAuthList - > firstChild ( ) ) ;
x ;
x = static_cast < HostAuthItem * > ( x - > nextSibling ( ) ) ) {
if ( ! x - > originalName ( ) . isNull ( ) )
authcfg - > deleteGroup ( x - > originalName ( ) ) ;
}
for ( HostAuthItem * x =
static_cast < HostAuthItem * > ( hostAuthList - > firstChild ( ) ) ;
x ;
x = static_cast < HostAuthItem * > ( x - > nextSibling ( ) ) ) {
authcfg - > setGroup ( KResolver : : domainToAscii ( x - > configName ( ) ) ) ;
authcfg - > writeEntry ( " certificate " , x - > getCertName ( ) ) ;
authcfg - > writeEntry ( " prompt " , ( x - > getAction ( ) = = KSSLCertificateHome : : AuthPrompt ) ) ;
authcfg - > writeEntry ( " send " , ( x - > getAction ( ) = = KSSLCertificateHome : : AuthSend ) ) ;
}
# endif
config - > sync ( ) ;
policies - > sync ( ) ;
pcerts - > sync ( ) ;
authcfg - > sync ( ) ;
// insure proper permissions -- contains sensitive data
TQString cfgName ( KGlobal : : dirs ( ) - > findResource ( " config " , " cryptodefaults " ) ) ;
if ( ! cfgName . isEmpty ( ) )
: : chmod ( TQFile : : encodeName ( cfgName ) , 0600 ) ;
emit changed ( false ) ;
}
void KCryptoConfig : : defaults ( )
{
load ( true ) ;
}
void KCryptoConfig : : genCAList ( ) {
_signers - > regenerate ( ) ;
}
void KCryptoConfig : : slotSelectCipher ( int id ) {
switch ( id ) {
case 1 :
cwCompatible ( ) ;
break ;
case 2 :
cwUS ( ) ;
break ;
case 3 :
cwExp ( ) ;
break ;
case 4 :
cwAll ( ) ;
}
}
void KCryptoConfig : : cwCompatible ( ) {
# ifdef HAVE_SSL
CipherItem * item ;
for ( item = static_cast < CipherItem * > ( SSLv2Box - > firstChild ( ) ) ; item ;
item = static_cast < CipherItem * > ( item - > nextSibling ( ) ) ) {
item - > setOn ( item - > bits ( ) > = 56 & & item - > bits ( ) < = 128 ) ;
}
for ( item = static_cast < CipherItem * > ( SSLv3Box - > firstChild ( ) ) ; item ;
item = static_cast < CipherItem * > ( item - > nextSibling ( ) ) ) {
item - > setOn ( item - > bits ( ) > = 56 & & item - > bits ( ) < = 128 ) ;
}
mUseTLS - > setChecked ( true ) ;
mUseSSLv2 - > setChecked ( true ) ;
mUseSSLv3 - > setChecked ( true ) ;
configChanged ( ) ;
# endif
}
void KCryptoConfig : : cwUS ( ) {
# ifdef HAVE_SSL
CipherItem * item ;
for ( item = static_cast < CipherItem * > ( SSLv2Box - > firstChild ( ) ) ; item ;
item = static_cast < CipherItem * > ( item - > nextSibling ( ) ) ) {
item - > setOn ( item - > bits ( ) > = 128 ) ;
}
for ( item = static_cast < CipherItem * > ( SSLv3Box - > firstChild ( ) ) ; item ;
item = static_cast < CipherItem * > ( item - > nextSibling ( ) ) ) {
item - > setOn ( item - > bits ( ) > = 128 ) ;
}
configChanged ( ) ;
# endif
}
void KCryptoConfig : : cwExp ( ) {
# ifdef HAVE_SSL
CipherItem * item ;
for ( item = static_cast < CipherItem * > ( SSLv2Box - > firstChild ( ) ) ; item ;
item = static_cast < CipherItem * > ( item - > nextSibling ( ) ) ) {
item - > setOn ( item - > bits ( ) < = 56 & & item - > bits ( ) > 0 ) ;
}
for ( item = static_cast < CipherItem * > ( SSLv3Box - > firstChild ( ) ) ; item ;
item = static_cast < CipherItem * > ( item - > nextSibling ( ) ) ) {
item - > setOn ( item - > bits ( ) < = 56 & & item - > bits ( ) > 0 ) ;
}
configChanged ( ) ;
# endif
}
void KCryptoConfig : : cwAll ( ) {
# ifdef HAVE_SSL
CipherItem * item ;
for ( item = static_cast < CipherItem * > ( SSLv2Box - > firstChild ( ) ) ; item ;
item = static_cast < CipherItem * > ( item - > nextSibling ( ) ) ) {
item - > setOn ( true ) ;
}
for ( item = static_cast < CipherItem * > ( SSLv3Box - > firstChild ( ) ) ; item ;
item = static_cast < CipherItem * > ( item - > nextSibling ( ) ) ) {
item - > setOn ( true ) ;
}
mUseTLS - > setChecked ( true ) ;
mUseSSLv2 - > setChecked ( true ) ;
mUseSSLv3 - > setChecked ( true ) ;
configChanged ( ) ;
# endif
}
void KCryptoConfig : : slotExportCert ( ) {
OtherCertItem * x = static_cast < OtherCertItem * > ( otherSSLBox - > selectedItem ( ) ) ;
if ( x ) {
policies - > setGroup ( x - > getMD5 ( ) ) ;
KSSLCertificate * cert = KSSLCertificate : : fromString ( policies - > readEntry ( " Certificate " , TQString ( ) ) . local8Bit ( ) ) ;
if ( cert ) {
KCertExport kce ;
kce . setCertificate ( cert ) ;
kce . exec ( ) ;
delete cert ;
} else KMessageBox : : sorry ( this , i18n ( " Could not open the certificate. " ) ,
i18n ( " SSL " ) ) ;
}
}
void KCryptoConfig : : slotRemoveCert ( ) {
TQListViewItem * act = otherSSLBox - > selectedItem ( ) ;
OtherCertItem * x = static_cast < OtherCertItem * > ( act ) ;
if ( x ) {
TQListViewItem * next = act - > itemBelow ( ) ;
if ( ! next ) next = act - > itemAbove ( ) ;
otherSSLBox - > takeItem ( x ) ;
otherCertDelList . append ( x ) ;
configChanged ( ) ;
if ( next ) otherSSLBox - > setSelected ( next , true ) ;
}
}
void KCryptoConfig : : slotVerifyCert ( ) {
OtherCertItem * x = static_cast < OtherCertItem * > ( otherSSLBox - > selectedItem ( ) ) ;
if ( ! x ) return ;
policies - > setGroup ( x - > getMD5 ( ) ) ;
KSSLCertificate * cert = KSSLCertificate : : fromString ( policies - > readEntry ( " Certificate " , TQString ( ) ) . local8Bit ( ) ) ;
if ( ! cert ) {
KMessageBox : : error ( this , i18n ( " Error obtaining the certificate. " ) , i18n ( " SSL " ) ) ;
return ;
}
cert - > chain ( ) . setCertChain ( policies - > readListEntry ( " Chain " ) ) ;
KSSLCertificate : : KSSLValidation v = cert - > revalidate ( KSSLCertificate : : SSLServer ) ;
/*
* Don ' t enable this until we keep this info in the cache
if ( v ! = KSSLCerticiate : : Ok )
v = cert - > revalidate ( KSSLCertificate : : SMIMESign ) ;
if ( v ! = KSSLCerticiate : : Ok )
v = cert - > revalidate ( KSSLCertificate : : SMIMEEncrypt ) ;
*/
if ( v = = KSSLCertificate : : Ok ) {
KMessageBox : : information ( this , i18n ( " This certificate passed the verification tests successfully. " ) , i18n ( " SSL " ) ) ;
} else {
KMessageBox : : detailedError ( this , i18n ( " This certificate has failed the tests and should be considered invalid. " ) , KSSLCertificate : : verifyText ( v ) , i18n ( " SSL " ) ) ;
}
delete cert ;
}
void KCryptoConfig : : slotUntil ( ) {
OtherCertItem * x = static_cast < OtherCertItem * > ( otherSSLBox - > selectedItem ( ) ) ;
cachePerm - > setChecked ( false ) ;
untilDate - > setEnabled ( true ) ;
if ( ! x ) return ;
x - > setPermanent ( false ) ;
configChanged ( ) ;
}
void KCryptoConfig : : slotPermanent ( ) {
OtherCertItem * x = static_cast < OtherCertItem * > ( otherSSLBox - > selectedItem ( ) ) ;
cacheUntil - > setChecked ( false ) ;
untilDate - > setEnabled ( false ) ;
if ( ! x ) return ;
x - > setPermanent ( true ) ;
configChanged ( ) ;
}
void KCryptoConfig : : slotPolicyChanged ( int id ) {
OtherCertItem * x = static_cast < OtherCertItem * > ( otherSSLBox - > selectedItem ( ) ) ;
if ( ! x ) return ;
if ( id = = policyGroup - > id ( policyAccept ) ) {
x - > setPolicy ( KSSLCertificateCache : : Accept ) ;
} else if ( id = = policyGroup - > id ( policyReject ) ) {
x - > setPolicy ( KSSLCertificateCache : : Reject ) ;
} else if ( id = = policyGroup - > id ( policyPrompt ) ) {
x - > setPolicy ( KSSLCertificateCache : : Prompt ) ;
}
configChanged ( ) ;
}
void KCryptoConfig : : slotDatePick ( ) {
KDateTimeDlg kdtd ;
OtherCertItem * x = static_cast < OtherCertItem * > ( otherSSLBox - > selectedItem ( ) ) ;
if ( ! x | | ! untilDate - > isEnabled ( ) ) return ;
TQDateTime qdt = x - > getExpires ( ) ;
kdtd . setDateTime ( qdt ) ;
int rc = kdtd . exec ( ) ;
if ( rc = = KDialog : : Accepted ) {
x - > setExpires ( kdtd . getDateTime ( ) ) ;
untilDate - > setText ( KGlobal : : locale ( ) - > formatDateTime ( x - > getExpires ( ) ) ) ;
configChanged ( ) ;
}
}
void KCryptoConfig : : slotOtherCertSelect ( ) {
OtherCertItem * x = static_cast < OtherCertItem * > ( otherSSLBox - > selectedItem ( ) ) ;
TQString iss = TQString ( ) ;
if ( x ) {
otherSSLExport - > setEnabled ( true ) ;
otherSSLVerify - > setEnabled ( true ) ;
otherSSLRemove - > setEnabled ( true ) ;
fromLabel - > setEnabled ( true ) ;
untilLabel - > setEnabled ( true ) ;
policyGroup - > setEnabled ( true ) ;
cacheGroup - > setEnabled ( true ) ;
cachePerm - > setEnabled ( true ) ;
cacheUntil - > setEnabled ( true ) ;
policies - > setGroup ( x - > getMD5 ( ) ) ;
KSSLCertificate * cert = KSSLCertificate : : fromString ( policies - > readEntry ( " Certificate " , TQString ( ) ) . local8Bit ( ) ) ;
if ( cert ) {
TQPalette cspl ;
iss = cert - > getIssuer ( ) ;
cspl = validFrom - > palette ( ) ;
if ( TQDateTime : : tqcurrentDateTime ( Qt : : UTC ) < cert - > getQDTNotBefore ( ) ) {
cspl . setColor ( TQColorGroup : : Foreground , TQColor ( 196 , 33 , 21 ) ) ;
} else {
cspl . setColor ( TQColorGroup : : Foreground , TQColor ( 42 , 153 , 59 ) ) ;
}
validFrom - > setPalette ( cspl ) ;
cspl = validUntil - > palette ( ) ;
if ( TQDateTime : : tqcurrentDateTime ( Qt : : UTC ) > cert - > getQDTNotAfter ( ) ) {
cspl . setColor ( TQColorGroup : : Foreground , TQColor ( 196 , 33 , 21 ) ) ;
} else {
cspl . setColor ( TQColorGroup : : Foreground , TQColor ( 42 , 153 , 59 ) ) ;
}
validUntil - > setPalette ( cspl ) ;
validFrom - > setText ( cert - > getNotBefore ( ) ) ;
validUntil - > setText ( cert - > getNotAfter ( ) ) ;
untilDate - > setText ( x ? KGlobal : : locale ( ) - > formatDateTime ( x - > getExpires ( ) )
: KGlobal : : locale ( ) - > formatDateTime ( TQDateTime : : tqcurrentDateTime ( Qt : : UTC ) ) ) ;
untilDate - > setEnabled ( x & & ! x - > isPermanent ( ) ) ;
pHash - > setText ( cert - > getMD5DigestText ( ) ) ;
delete cert ;
} else {
validFrom - > setText ( TQString ( ) ) ;
validUntil - > setText ( TQString ( ) ) ;
pHash - > clear ( ) ;
}
switch ( x - > getPolicy ( ) ) {
case KSSLCertificateCache : : Accept :
policyGroup - > setButton ( policyGroup - > id ( policyAccept ) ) ;
break ;
case KSSLCertificateCache : : Reject :
policyGroup - > setButton ( policyGroup - > id ( policyReject ) ) ;
break ;
case KSSLCertificateCache : : Prompt :
policyGroup - > setButton ( policyGroup - > id ( policyPrompt ) ) ;
break ;
}
cachePerm - > setChecked ( x - > isPermanent ( ) ) ;
cacheUntil - > setChecked ( ! x - > isPermanent ( ) ) ;
} else {
otherSSLExport - > setEnabled ( false ) ;
otherSSLVerify - > setEnabled ( false ) ;
otherSSLRemove - > setEnabled ( false ) ;
fromLabel - > setEnabled ( false ) ;
untilLabel - > setEnabled ( false ) ;
policyGroup - > setEnabled ( false ) ;
cacheGroup - > setEnabled ( false ) ;
cachePerm - > setChecked ( false ) ;
cacheUntil - > setChecked ( false ) ;
policyAccept - > setChecked ( false ) ;
policyReject - > setChecked ( false ) ;
policyPrompt - > setChecked ( false ) ;
cachePerm - > setEnabled ( false ) ;
cacheUntil - > setEnabled ( false ) ;
validFrom - > setText ( TQString ( ) ) ;
validUntil - > setText ( TQString ( ) ) ;
untilDate - > setText ( TQString ( ) ) ;
untilDate - > setEnabled ( false ) ;
pHash - > clear ( ) ;
}
oSubject - > setValues ( x ? x - > getSub ( ) : TQString ( TQString ( ) ) ) ;
oIssuer - > setValues ( iss ) ;
}
void KCryptoConfig : : slotYourImport ( ) {
TQString certFile = KFileDialog : : getOpenFileName ( TQString ( ) , " application/x-pkcs12 " ) ;
if ( certFile . isEmpty ( ) )
return ;
# ifdef HAVE_SSL
KSSLPKCS12 * cert = NULL ;
TQCString pass ;
TryImportPassAgain :
int rc = KPasswordDialog : : getPassword ( pass , i18n ( " Certificate password " ) ) ;
if ( rc ! = KPasswordDialog : : Accepted ) return ;
cert = KSSLPKCS12 : : loadCertFile ( certFile , TQString ( pass ) ) ;
if ( ! cert ) {
rc = KMessageBox : : warningYesNo ( this , i18n ( " The certificate file could not be loaded. Try a different password? " ) , i18n ( " SSL " ) , i18n ( " Try " ) , i18n ( " Do Not Try " ) ) ;
if ( rc = = KMessageBox : : Yes ) goto TryImportPassAgain ;
return ;
}
// At this point, we know that we can read the certificate in.
// The procedure will be to convert it to Base64 in it's raw form
// and add it to the ListView - eventually going into the SimpleConfig.
// FIXME: prompt if the user wants the password stored along with the
// certificate
TQString name = cert - > getCertificate ( ) - > getSubject ( ) ;
for ( YourCertItem * i =
static_cast < YourCertItem * > ( yourSSLBox - > firstChild ( ) ) ;
i ;
i = static_cast < YourCertItem * > ( i - > nextSibling ( ) ) ) {
if ( i - > configName ( ) = = name ) {
rc = KMessageBox : : warningContinueCancel ( this , i18n ( " A certificate with that name already exists. Are you sure that you wish to replace it? " ) , i18n ( " SSL " ) , i18n ( " Replace " ) ) ;
if ( rc = = KMessageBox : : Cancel ) {
delete cert ;
return ;
}
yourSSLBox - > takeItem ( i ) ;
yourCertDelList . append ( i ) ;
}
}
new YourCertItem ( yourSSLBox ,
cert - > toString ( ) ,
TQString ( ) , // the password - don't store it yet!
name ,
this ) ;
setAuthCertLists ( ) ;
configChanged ( ) ;
delete cert ;
# endif
offerImportToKMail ( certFile ) ;
}
void KCryptoConfig : : slotYourExport ( ) {
YourCertItem * x = static_cast < YourCertItem * > ( yourSSLBox - > selectedItem ( ) ) ;
if ( ! x ) return ;
KSSLPKCS12 * pkcs = KSSLPKCS12 : : fromString ( x - > getPKCS ( ) , x - > getPass ( ) ) ;
if ( ! pkcs )
pkcs = KSSLPKCS12 : : fromString ( x - > getPKCS ( ) , x - > getPassCache ( ) ) ;
if ( ! pkcs ) {
TQString pprompt = i18n ( " Enter the certificate password: " ) ;
TQCString oldpass ;
do {
int i = KPasswordDialog : : getPassword ( oldpass , pprompt ) ;
if ( i ! = KPasswordDialog : : Accepted ) return ;
pkcs = KSSLPKCS12 : : fromString ( x - > getPKCS ( ) , oldpass ) ;
pprompt = i18n ( " Decoding failed. Please try again: " ) ;
} while ( ! pkcs ) ;
x - > setPassCache ( oldpass ) ;
slotYourUnlock ( ) ;
}
// For now, we will only export to PKCS#12
TQString certFile = KFileDialog : : getSaveFileName ( TQString ( ) ,
" application/x-pkcs12 " ) ;
if ( certFile . isEmpty ( ) )
return ;
if ( ! pkcs - > toFile ( certFile ) )
KMessageBox : : sorry ( this , i18n ( " Export failed. " ) , i18n ( " SSL " ) ) ;
}
void KCryptoConfig : : slotYourVerify ( ) {
YourCertItem * x = static_cast < YourCertItem * > ( yourSSLBox - > selectedItem ( ) ) ;
TQString iss ;
if ( ! x ) return ;
KSSLPKCS12 * pkcs = KSSLPKCS12 : : fromString ( x - > getPKCS ( ) , x - > getPass ( ) ) ;
if ( ! pkcs )
pkcs = KSSLPKCS12 : : fromString ( x - > getPKCS ( ) , x - > getPassCache ( ) ) ;
if ( ! pkcs ) {
TQString pprompt = i18n ( " Enter the certificate password: " ) ;
TQCString oldpass ;
do {
int i = KPasswordDialog : : getPassword ( oldpass , pprompt ) ;
if ( i ! = KPasswordDialog : : Accepted ) return ;
pkcs = KSSLPKCS12 : : fromString ( x - > getPKCS ( ) , oldpass ) ;
pprompt = i18n ( " Decoding failed. Please try again: " ) ;
} while ( ! pkcs ) ;
x - > setPassCache ( oldpass ) ;
slotYourUnlock ( ) ;
}
KSSLCertificate : : KSSLValidation v = pkcs - > revalidate ( KSSLCertificate : : SSLClient ) ;
if ( v ! = KSSLCertificate : : Ok )
v = pkcs - > revalidate ( KSSLCertificate : : SMIMEEncrypt ) ;
if ( v ! = KSSLCertificate : : Ok )
v = pkcs - > revalidate ( KSSLCertificate : : SMIMESign ) ;
if ( v = = KSSLCertificate : : Ok ) {
KMessageBox : : information ( this , i18n ( " This certificate passed the verification tests successfully. " ) , i18n ( " SSL " ) ) ;
} else {
KMessageBox : : detailedError ( this , i18n ( " This certificate has failed the tests and should be considered invalid. " ) , KSSLCertificate : : verifyText ( v ) , i18n ( " SSL " ) ) ;
}
delete pkcs ;
}
void KCryptoConfig : : slotYourRemove ( ) {
YourCertItem * x = static_cast < YourCertItem * > ( yourSSLBox - > selectedItem ( ) ) ;
if ( x ) {
yourSSLBox - > takeItem ( x ) ;
yourCertDelList . append ( x ) ;
setAuthCertLists ( ) ;
configChanged ( ) ;
}
}
void KCryptoConfig : : slotYourUnlock ( ) {
YourCertItem * x = static_cast < YourCertItem * > ( yourSSLBox - > selectedItem ( ) ) ;
TQString iss ;
if ( ! x | | ! yourSSLUnlock - > isEnabled ( ) ) return ;
KSSLPKCS12 * pkcs = KSSLPKCS12 : : fromString ( x - > getPKCS ( ) , x - > getPass ( ) ) ;
if ( ! pkcs )
pkcs = KSSLPKCS12 : : fromString ( x - > getPKCS ( ) , x - > getPassCache ( ) ) ;
if ( ! pkcs ) {
TQString pprompt = i18n ( " Enter the certificate password: " ) ;
TQCString oldpass ;
do {
int i = KPasswordDialog : : getPassword ( oldpass , pprompt ) ;
if ( i ! = KPasswordDialog : : Accepted ) return ;
pkcs = KSSLPKCS12 : : fromString ( x - > getPKCS ( ) , oldpass ) ;
pprompt = i18n ( " Decoding failed. Please try again: " ) ;
} while ( ! pkcs ) ;
x - > setPassCache ( oldpass ) ;
}
// update the info
iss = pkcs - > getCertificate ( ) - > getIssuer ( ) ;
ySubject - > setValues ( x ? x - > getName ( ) : TQString ( TQString ( ) ) ) ;
yIssuer - > setValues ( iss ) ;
TQPalette cspl ;
KSSLCertificate * cert = pkcs - > getCertificate ( ) ;
cspl = yValidFrom - > palette ( ) ;
if ( TQDateTime : : tqcurrentDateTime ( Qt : : UTC ) < cert - > getQDTNotBefore ( ) ) {
cspl . setColor ( TQColorGroup : : Foreground , TQColor ( 196 , 33 , 21 ) ) ;
} else {
cspl . setColor ( TQColorGroup : : Foreground , TQColor ( 42 , 153 , 59 ) ) ;
}
yValidFrom - > setPalette ( cspl ) ;
cspl = yValidUntil - > palette ( ) ;
if ( TQDateTime : : tqcurrentDateTime ( Qt : : UTC ) > cert - > getQDTNotAfter ( ) ) {
cspl . setColor ( TQColorGroup : : Foreground , TQColor ( 196 , 33 , 21 ) ) ;
} else {
cspl . setColor ( TQColorGroup : : Foreground , TQColor ( 42 , 153 , 59 ) ) ;
}
yValidUntil - > setPalette ( cspl ) ;
yValidFrom - > setText ( cert - > getNotBefore ( ) ) ;
yValidUntil - > setText ( cert - > getNotAfter ( ) ) ;
yHash - > setText ( cert - > getMD5DigestText ( ) ) ;
yourSSLUnlock - > setEnabled ( false ) ;
delete pkcs ;
}
void KCryptoConfig : : slotYourCertSelect ( ) {
YourCertItem * x = static_cast < YourCertItem * > ( yourSSLBox - > selectedItem ( ) ) ;
TQString iss ;
yourSSLExport - > setEnabled ( x ! = NULL ) ;
yourSSLPass - > setEnabled ( x ! = NULL ) ;
yourSSLUnlock - > setEnabled ( false ) ;
yourSSLVerify - > setEnabled ( x ! = NULL ) ;
yourSSLRemove - > setEnabled ( x ! = NULL ) ;
if ( x ) {
KSSLPKCS12 * pkcs = KSSLPKCS12 : : fromString ( x - > getPKCS ( ) , x - > getPass ( ) ) ;
if ( pkcs ) {
TQPalette cspl ;
KSSLCertificate * cert = pkcs - > getCertificate ( ) ;
iss = cert - > getIssuer ( ) ;
cspl = yValidFrom - > palette ( ) ;
if ( TQDateTime : : tqcurrentDateTime ( Qt : : UTC ) < cert - > getQDTNotBefore ( ) ) {
cspl . setColor ( TQColorGroup : : Foreground , TQColor ( 196 , 33 , 21 ) ) ;
} else {
cspl . setColor ( TQColorGroup : : Foreground , TQColor ( 42 , 153 , 59 ) ) ;
}
yValidFrom - > setPalette ( cspl ) ;
cspl = yValidUntil - > palette ( ) ;
if ( TQDateTime : : tqcurrentDateTime ( Qt : : UTC ) > cert - > getQDTNotAfter ( ) ) {
cspl . setColor ( TQColorGroup : : Foreground , TQColor ( 196 , 33 , 21 ) ) ;
} else {
cspl . setColor ( TQColorGroup : : Foreground , TQColor ( 42 , 153 , 59 ) ) ;
}
yValidUntil - > setPalette ( cspl ) ;
yValidFrom - > setText ( cert - > getNotBefore ( ) ) ;
yValidUntil - > setText ( cert - > getNotAfter ( ) ) ;
yHash - > setText ( cert - > getMD5DigestText ( ) ) ;
delete pkcs ;
} else {
yourSSLUnlock - > setEnabled ( x ! = NULL ) ;
yHash - > clear ( ) ;
}
} else {
yHash - > clear ( ) ;
}
ySubject - > setValues ( x ? x - > getName ( ) : TQString ( TQString ( ) ) ) ;
yIssuer - > setValues ( iss ) ;
}
void KCryptoConfig : : slotYourPass ( ) {
YourCertItem * x = static_cast < YourCertItem * > ( yourSSLBox - > selectedItem ( ) ) ;
TQCString oldpass = " " ;
if ( ! x ) return ;
KSSLPKCS12 * pkcs = KSSLPKCS12 : : fromString ( x - > getPKCS ( ) , x - > getPass ( ) ) ;
if ( ! pkcs )
pkcs = KSSLPKCS12 : : fromString ( x - > getPKCS ( ) , x - > getPassCache ( ) ) ;
if ( ! pkcs ) {
TQString pprompt = i18n ( " Enter the OLD password for the certificate: " ) ;
do {
int i = KPasswordDialog : : getPassword ( oldpass , pprompt ) ;
if ( i ! = KPasswordDialog : : Accepted ) break ;
pkcs = KSSLPKCS12 : : fromString ( x - > getPKCS ( ) , oldpass ) ;
pprompt = i18n ( " Decoding failed. Please try again: " ) ;
} while ( ! pkcs ) ;
}
if ( pkcs ) {
x - > setPassCache ( oldpass ) ;
slotYourUnlock ( ) ;
KPasswordDialog * kpd = new KPasswordDialog ( KPasswordDialog : : NewPassword , false , 0 , this ) ;
kpd - > setPrompt ( i18n ( " Enter the new certificate password " ) ) ;
kpd - > setAllowEmptyPasswords ( true ) ;
int i = kpd - > exec ( ) ;
if ( i = = KPasswordDialog : : Accepted ) {
TQCString pass = kpd - > password ( ) ;
pkcs - > changePassword ( TQString ( oldpass ) , TQString ( pass ) ) ;
x - > setPKCS ( pkcs - > toString ( ) ) ;
x - > setPassCache ( pass ) ;
configChanged ( ) ;
}
delete kpd ;
delete pkcs ;
}
}
void KCryptoConfig : : slotCAImport ( ) {
TQString certFile = KFileDialog : : getOpenFileName ( TQString ( ) , " application/x-x509-ca-cert " ) ;
if ( certFile . isEmpty ( ) )
return ;
# ifdef HAVE_SSL
# define sk_free KOSSL::self()->sk_free
# define sk_num KOSSL::self()->sk_num
# define sk_value KOSSL::self()->sk_value
// First try to load using the OpenSSL method
X509_STORE * certStore = KOSSL : : self ( ) - > X509_STORE_new ( ) ;
X509_LOOKUP * certLookup = KOSSL : : self ( ) - > X509_STORE_add_lookup ( certStore , KOSSL : : self ( ) - > X509_LOOKUP_file ( ) ) ;
if ( certLookup & &
KOSSL : : self ( ) - > X509_LOOKUP_load_file ( certLookup ,
certFile . local8Bit ( ) ,
X509_FILETYPE_PEM ) ) {
for ( int i = 0 ; i < sk_X509_OBJECT_num ( certStore - > objs ) ; i + + ) {
X509_OBJECT * x5o = sk_X509_OBJECT_value ( certStore - > objs , i ) ;
if ( ! x5o ) continue ;
if ( x5o - > type ! = X509_LU_X509 ) continue ;
X509 * x5 = x5o - > data . x509 ;
if ( ! x5 ) continue ;
// Easier to use in this form
KSSLCertificate * x = KSSLCertificate : : fromX509 ( x5 ) ;
// Only import CA's
if ( ! x | | ! x - > x509V3Extensions ( ) . certTypeCA ( ) ) {
if ( x ) {
TQString emsg = x - > getSubject ( ) + " : \n " +
i18n ( " This is not a signer certificate. " ) ;
KMessageBox : : error ( this ,
emsg ,
i18n ( " SSL " ) ) ;
delete x ;
}
continue ;
}
TQString name = x - > getSubject ( ) ;
// search for dups
for ( CAItem * m = static_cast < CAItem * > ( caList - > firstChild ( ) ) ;
m ;
m = static_cast < CAItem * > ( m - > nextSibling ( ) ) ) {
if ( m - > configName ( ) = = name ) {
KSSLCertificate * y = KSSLCertificate : : fromString ( m - > getCert ( ) . local8Bit ( ) ) ;
if ( ! y ) continue ;
if ( * x = = * y ) {
TQString emsg = name + " : \n " +
i18n ( " You already have this signer certificate installed. " ) ;
KMessageBox : : error ( this ,
emsg ,
i18n ( " SSL " ) ) ;
delete x ;
delete y ;
x = NULL ;
break ;
}
delete y ;
}
}
if ( ! x ) continue ;
// Ok, add it to the list
( new CAItem ( caList ,
name ,
x - > toString ( ) ,
true , true , true , this )
) - > isNew = true ;
delete x ;
}
// Can the PEM code be wiped out now?
} else { // try to load it manually as a single X.509 DER encoded
// ASSUMPTION: we only read one certificate in this code
TQFile qf ( certFile ) ;
TQString name ;
TQString certtext ;
KSSLCertificate * x ;
qf . open ( IO_ReadOnly ) ;
qf . readLine ( certtext , qf . size ( ) ) ;
if ( certStore ) { KOSSL : : self ( ) - > X509_STORE_free ( certStore ) ;
certStore = NULL ; }
if ( certtext . contains ( " -----BEGIN CERTIFICATE----- " ) ) {
qf . reset ( ) ;
certtext = TQString ( ) ;
while ( ! qf . atEnd ( ) ) {
TQString xx ;
qf . readLine ( xx , qf . size ( ) ) ;
certtext + = xx ;
}
certtext = certtext . replace ( " -----BEGIN CERTIFICATE----- " , TQString ( ) ) ;
certtext = certtext . replace ( " -----END CERTIFICATE----- " , TQString ( ) ) ;
certtext = certtext . stripWhiteSpace ( ) ;
certtext = certtext . replace ( " \n " , TQString ( ) ) ;
} else {
// Must [could?] be DER
qf . close ( ) ;
qf . open ( IO_ReadOnly ) ;
char * cr ;
cr = new char [ qf . size ( ) + 1 ] ;
qf . readBlock ( cr , qf . size ( ) ) ;
TQByteArray qba ;
qba . duplicate ( cr , qf . size ( ) ) ;
certtext = KCodecs : : base64Encode ( qba ) ;
delete [ ] cr ;
}
qf . close ( ) ;
x = KSSLCertificate : : fromString ( certtext . latin1 ( ) ) ;
if ( ! x ) {
KMessageBox : : sorry ( this ,
i18n ( " The certificate file could not be loaded. " ) ,
i18n ( " SSL " ) ) ;
return ;
}
if ( ! x - > x509V3Extensions ( ) . certTypeCA ( ) ) {
KMessageBox : : sorry ( this ,
i18n ( " This is not a signer certificate. " ) ,
i18n ( " SSL " ) ) ;
return ;
}
name = x - > getSubject ( ) ;
for ( CAItem * i = static_cast < CAItem * > ( caList - > firstChild ( ) ) ;
i ;
i = static_cast < CAItem * > ( i - > nextSibling ( ) ) ) {
if ( i - > configName ( ) = = name ) {
KSSLCertificate * y = KSSLCertificate : : fromString ( i - > getCert ( ) . local8Bit ( ) ) ;
if ( ! y ) continue ;
if ( * x = = * y ) {
KMessageBox : : error ( this ,
i18n ( " You already have this signer certificate installed. " ) ,
i18n ( " SSL " ) ) ;
delete x ;
delete y ;
return ;
}
delete y ;
}
}
( new CAItem ( caList , name , x - > toString ( ) , true , true , true , this ) ) - > isNew = true ;
delete x ;
}
if ( certStore ) KOSSL : : self ( ) - > X509_STORE_free ( certStore ) ;
configChanged ( ) ;
# undef sk_free
# undef sk_num
# undef sk_value
# endif
offerImportToKMail ( certFile ) ;
}
void KCryptoConfig : : offerImportToKMail ( const TQString & certFile )
{
if ( KMessageBox : : questionYesNo ( this , i18n ( " Do you want to make this certificate available to KMail as well? " ) , TQString ( ) , i18n ( " Make Available " ) , i18n ( " Do Not Make Available " ) ) = = KMessageBox : : Yes ) {
KProcess proc ;
proc < < " kleopatra " ;
proc < < " --import-certificate " ;
proc < < certFile ;
if ( ! proc . start ( KProcess : : DontCare ) )
KMessageBox : : error ( this , i18n ( " Could not execute Kleopatra. You might have to install or update the kdepim package. " ) ) ;
}
}
void KCryptoConfig : : slotCARemove ( ) {
CAItem * x = static_cast < CAItem * > ( caList - > selectedItem ( ) ) ;
if ( x ) {
caList - > takeItem ( x ) ;
caDelList . append ( x ) ;
configChanged ( ) ;
slotCAItemChanged ( ) ;
}
}
void KCryptoConfig : : slotCARestore ( ) {
int rc = KMessageBox : : warningContinueCancel ( this , i18n ( " This will revert your certificate signers database to the KDE default. \n This operation cannot be undone. \n Are you sure you wish to continue? " ) , i18n ( " SSL " ) , i18n ( " Revert " ) ) ;
if ( rc = = KMessageBox : : Cancel ) {
return ;
}
// For now, we just rm the existing file and rebuild
TQString path = KGlobal : : dirs ( ) - > saveLocation ( " config " ) ;
path + = " /ksslcalist " ;
TQFile : : remove ( path ) ;
// Remove all our old work and rebuild the GUI/List
caDelList . clear ( ) ;
caList - > clear ( ) ;
TQStringList groups = _signers - > list ( ) ;
KConfig sigcfg ( " ksslcalist " , true , false ) ;
for ( TQStringList : : Iterator i = groups . begin ( ) ;
i ! = groups . end ( ) ;
+ + i ) {
if ( ( * i ) . isEmpty ( ) | | * i = = " <default> " ) continue ;
if ( ! sigcfg . hasGroup ( * i ) ) continue ;
sigcfg . setGroup ( * i ) ;
if ( ! sigcfg . hasKey ( " x509 " ) ) continue ;
new CAItem ( caList ,
( * i ) ,
sigcfg . readEntry ( " x509 " , TQString ( ) ) ,
sigcfg . readBoolEntry ( " site " , false ) ,
sigcfg . readBoolEntry ( " email " , false ) ,
sigcfg . readBoolEntry ( " code " , false ) ,
this ) ;
}
genCAList ( ) ;
slotCAItemChanged ( ) ;
}
void KCryptoConfig : : slotCAItemChanged ( ) {
CAItem * x = static_cast < CAItem * > ( caList - > selectedItem ( ) ) ;
if ( x ) {
caSSLRemove - > setEnabled ( true ) ;
caSubject - > setValues ( x ? x - > getName ( ) : TQString ( TQString ( ) ) ) ;
KSSLCertificate * cert = KSSLCertificate : : fromString ( x - > getCert ( ) . local8Bit ( ) ) ;
if ( ! cert ) {
caIssuer - > setValues ( TQString ( TQString ( ) ) ) ;
caSite - > setEnabled ( false ) ;
caEmail - > setEnabled ( false ) ;
caCode - > setEnabled ( false ) ;
caSite - > setChecked ( false ) ;
caEmail - > setChecked ( false ) ;
caCode - > setChecked ( false ) ;
cHash - > clear ( ) ;
} else {
caSite - > setEnabled ( cert - > x509V3Extensions ( ) . certTypeSSLCA ( ) ) ;
caEmail - > setEnabled ( cert - > x509V3Extensions ( ) . certTypeEmailCA ( ) ) ;
caCode - > setEnabled ( cert - > x509V3Extensions ( ) . certTypeCodeCA ( ) ) ;
caSite - > setChecked ( x - > getSite ( ) ) ;
caEmail - > setChecked ( x - > getEmail ( ) ) ;
caCode - > setChecked ( x - > getCode ( ) ) ;
caIssuer - > setValues ( cert - > getIssuer ( ) ) ;
cHash - > setText ( cert - > getMD5DigestText ( ) ) ;
delete cert ;
}
} else {
caSSLRemove - > setEnabled ( false ) ;
caSite - > setEnabled ( false ) ;
caEmail - > setEnabled ( false ) ;
caCode - > setEnabled ( false ) ;
caSubject - > setValues ( TQString ( TQString ( ) ) ) ;
caIssuer - > setValues ( TQString ( TQString ( ) ) ) ;
cHash - > clear ( ) ;
}
}
void KCryptoConfig : : slotCAChecked ( ) {
CAItem * x = static_cast < CAItem * > ( caList - > selectedItem ( ) ) ;
if ( x ) {
x - > setSite ( caSite - > isChecked ( ) ) ;
x - > setEmail ( caEmail - > isChecked ( ) ) ;
x - > setCode ( caCode - > isChecked ( ) ) ;
x - > modified = true ;
configChanged ( ) ;
}
}
void KCryptoConfig : : slotNewHostAuth ( ) {
HostAuthItem * j = new HostAuthItem ( hostAuthList ,
TQString ( ) ,
TQString ( ) ,
this ) ;
j - > setAction ( KSSLCertificateHome : : AuthSend ) ;
hostAuthList - > setSelected ( j , true ) ;
authHost - > setEnabled ( true ) ;
hostCertBox - > setEnabled ( true ) ;
hostCertBG - > setEnabled ( true ) ;
authRemove - > setEnabled ( true ) ;
hostCertBG - > setButton ( 0 ) ;
authHost - > setFocus ( ) ;
}
void KCryptoConfig : : slotRemoveHostAuth ( ) {
TQListViewItem * act = hostAuthList - > selectedItem ( ) ;
HostAuthItem * x = static_cast < HostAuthItem * > ( act ) ;
if ( x ) {
TQListViewItem * next = act - > itemBelow ( ) ;
if ( ! next ) next = act - > itemAbove ( ) ;
hostAuthList - > takeItem ( x ) ;
authDelList . append ( x ) ;
configChanged ( ) ;
if ( next ) hostAuthList - > setSelected ( next , true ) ;
}
}
void KCryptoConfig : : slotAuthItemChanged ( ) {
HostAuthItem * x = static_cast < HostAuthItem * > ( hostAuthList - > selectedItem ( ) ) ;
if ( x ) {
// Make sure the fields are enabled
authHost - > setEnabled ( true ) ;
hostCertBox - > setEnabled ( true ) ;
hostCertBG - > setEnabled ( true ) ;
authRemove - > setEnabled ( true ) ;
// Populate the fields
switch ( x - > getAction ( ) ) {
case KSSLCertificateHome : : AuthSend :
hostCertBG - > setButton ( hostCertBG - > id ( hostSend ) ) ;
break ;
case KSSLCertificateHome : : AuthPrompt :
hostCertBG - > setButton ( hostCertBG - > id ( hostPrompt ) ) ;
break ;
case KSSLCertificateHome : : AuthDont :
hostCertBG - > setButton ( hostCertBG - > id ( hostDont ) ) ;
break ;
default :
hostSend - > setChecked ( false ) ;
hostPrompt - > setChecked ( false ) ;
hostDont - > setChecked ( false ) ;
break ;
}
___lehack = true ;
authHost - > setText ( x - > configName ( ) ) ;
___lehack = false ;
hostCertBox - > setCurrentItem ( 0 ) ;
TQString theCert = x - > getCertName ( ) ;
for ( int i = 0 ; i < hostCertBox - > count ( ) ; i + + ) {
if ( hostCertBox - > text ( i ) = = theCert ) {
hostCertBox - > setCurrentItem ( i ) ;
break ;
}
}
} else {
authHost - > clear ( ) ;
authHost - > setEnabled ( false ) ;
hostCertBox - > setEnabled ( false ) ;
hostCertBG - > setEnabled ( false ) ;
authRemove - > setEnabled ( false ) ;
}
}
void KCryptoConfig : : slotAuthText ( const TQString & t ) {
if ( ___lehack ) return ;
HostAuthItem * x = static_cast < HostAuthItem * > ( hostAuthList - > selectedItem ( ) ) ;
if ( x ) {
x - > setHost ( t ) ;
configChanged ( ) ;
}
}
void KCryptoConfig : : slotAuthButtons ( ) {
HostAuthItem * x = static_cast < HostAuthItem * > ( hostAuthList - > selectedItem ( ) ) ;
if ( x ) {
KSSLCertificateHome : : KSSLAuthAction aa = KSSLCertificateHome : : AuthDont ;
int sel = hostCertBG - > id ( hostCertBG - > selected ( ) ) ;
if ( sel = = hostCertBG - > id ( hostSend ) )
aa = KSSLCertificateHome : : AuthSend ;
else if ( sel = = hostCertBG - > id ( hostPrompt ) )
aa = KSSLCertificateHome : : AuthPrompt ;
else
aa = KSSLCertificateHome : : AuthDont ;
x - > setAction ( aa ) ;
configChanged ( ) ;
}
}
void KCryptoConfig : : slotAuthCombo ( ) {
HostAuthItem * x = static_cast < HostAuthItem * > ( hostAuthList - > selectedItem ( ) ) ;
if ( x ) {
if ( hostCertBox - > currentItem ( ) = = 0 )
x - > setCertName ( TQString ( ) ) ;
else x - > setCertName ( hostCertBox - > currentText ( ) ) ;
configChanged ( ) ;
}
}
void KCryptoConfig : : slotTestOSSL ( ) {
KOSSL : : self ( ) - > destroy ( ) ;
if ( ! KOSSL : : self ( ) - > hasLibSSL ( ) ) {
KMessageBox : : detailedSorry ( this ,
i18n ( " Failed to load OpenSSL. " ) ,
i18n ( " libssl was not found or successfully loaded. " ) ,
i18n ( " OpenSSL " ) ) ;
return ;
}
if ( ! KOSSL : : self ( ) - > hasLibCrypto ( ) ) {
KMessageBox : : detailedSorry ( this ,
i18n ( " Failed to load OpenSSL. " ) ,
i18n ( " libcrypto was not found or successfully loaded. " ) ,
i18n ( " OpenSSL " ) ) ;
return ;
}
KMessageBox : : information ( this , i18n ( " OpenSSL was successfully loaded. " ) , i18n ( " OpenSSL " ) ) ;
}
void KCryptoConfig : : slotUseEGD ( ) {
if ( mUseEGD - > isChecked ( ) ) {
mUseEFile - > setChecked ( false ) ;
}
mEGDLabel - > setText ( i18n ( " Path to EGD: " ) ) ;
mEGDPath - > setEnabled ( mUseEGD - > isChecked ( ) ) ;
mEGDLabel - > setEnabled ( mUseEGD - > isChecked ( ) ) ;
configChanged ( ) ;
}
void KCryptoConfig : : slotUseEFile ( ) {
if ( mUseEFile - > isChecked ( ) ) {
mUseEGD - > setChecked ( false ) ;
}
mEGDLabel - > setText ( i18n ( " Path to entropy file: " ) ) ;
mEGDPath - > setEnabled ( mUseEFile - > isChecked ( ) ) ;
mEGDLabel - > setEnabled ( mUseEFile - > isChecked ( ) ) ;
configChanged ( ) ;
}
// Lets make this a separate module. it's a whole lot of work and can really be
// encompassed in a separate module quite nicely.
void KCryptoConfig : : slotGeneratePersonal ( ) {
#if 0
TQStringList qslCertTypes ;
qslCertTypes < < i18n ( " Personal SSL " )
< < i18n ( " Server SSL " )
< < i18n ( " S/MIME " )
< < i18n ( " PGP " )
< < i18n ( " GPG " )
< < i18n ( " SSL Personal Request " )
< < i18n ( " SSL Server Request " )
< < i18n ( " Netscape SSL " )
< < i18n ( " Server certificate authority " , " Server CA " )
< < i18n ( " Personal certificate authority " , " Personal CA " )
< < i18n ( " Secure MIME certificate authority " , " S/MIME CA " ) ;
# endif
}
# ifdef HAVE_SSL
# if OPENSSL_VERSION_NUMBER >= 0x10000000L
# define SSL_CONST const
# else
# define SSL_CONST
# endif
// This gets all the available ciphers from OpenSSL
bool KCryptoConfig : : loadCiphers ( ) {
unsigned int i ;
SSL_CTX * ctx ;
SSL * ssl ;
SSL_CONST SSL_METHOD * meth ;
SSLv2Box - > clear ( ) ;
SSLv3Box - > clear ( ) ;
meth = SSLv2_client_method ( ) ;
SSLeay_add_ssl_algorithms ( ) ;
ctx = SSL_CTX_new ( meth ) ;
if ( ctx = = NULL ) return false ;
ssl = SSL_new ( ctx ) ;
if ( ! ssl ) return false ;
CipherItem * item ;
for ( i = 0 ; ; i + + ) {
int j , k ;
SSL_CONST SSL_CIPHER * sc ;
sc = ( meth - > get_cipher ) ( i ) ;
if ( ! sc )
break ;
// Leak of sc*?
TQString scn ( sc - > name ) ;
if ( scn . contains ( " ADH- " ) | | scn . contains ( " NULL- " ) | | scn . contains ( " DES-CBC3-SHA " ) | | scn . contains ( " FZA- " ) ) {
continue ;
}
k = SSL_CIPHER_get_bits ( sc , & j ) ;
item = new CipherItem ( SSLv2Box , sc - > name , k , j , this ) ;
}
if ( ctx ) SSL_CTX_free ( ctx ) ;
if ( ssl ) SSL_free ( ssl ) ;
// We repeat for SSLv3
meth = SSLv3_client_method ( ) ;
SSLeay_add_ssl_algorithms ( ) ;
ctx = SSL_CTX_new ( meth ) ;
if ( ctx = = NULL ) return false ;
ssl = SSL_new ( ctx ) ;
if ( ! ssl ) return false ;
for ( i = 0 ; ; i + + ) {
int j , k ;
SSL_CONST SSL_CIPHER * sc ;
sc = ( meth - > get_cipher ) ( i ) ;
if ( ! sc )
break ;
// Leak of sc*?
TQString scn ( sc - > name ) ;
if ( scn . contains ( " ADH- " ) | | scn . contains ( " NULL- " ) | | scn . contains ( " DES-CBC3-SHA " ) | | scn . contains ( " FZA- " ) ) {
continue ;
}
k = SSL_CIPHER_get_bits ( sc , & j ) ;
item = new CipherItem ( SSLv3Box , sc - > name , k , j , this ) ;
}
if ( ctx ) SSL_CTX_free ( ctx ) ;
if ( ssl ) SSL_free ( ssl ) ;
return true ;
}
# endif
void KCryptoConfig : : setAuthCertLists ( ) {
TQString oldDef , oldHost ;
bool noneDef , noneHost ;
// get the old setting
oldDef = defCertBox - > currentText ( ) ;
oldHost = hostCertBox - > currentText ( ) ;
noneDef = ( 0 = = defCertBox - > currentItem ( ) ) ;
noneHost = ( 0 = = hostCertBox - > currentItem ( ) ) ;
// repopulate
defCertBox - > clear ( ) ;
hostCertBox - > clear ( ) ;
TQStringList defCertStrList ; // = KSSLCertificateHome::getCertificateList();
defCertStrList . append ( i18n ( " None " ) ) ;
for ( YourCertItem * x = static_cast < YourCertItem * > ( yourSSLBox - > firstChild ( ) ) ;
x ;
x = static_cast < YourCertItem * > ( x - > nextSibling ( ) ) ) {
defCertStrList . append ( x - > configName ( ) ) ;
}
defCertBox - > insertStringList ( defCertStrList ) ;
hostCertBox - > insertStringList ( defCertStrList ) ;
// try to restore it
defCertBox - > setCurrentItem ( 0 ) ;
if ( ! noneDef ) {
for ( int i = 0 ; i < defCertBox - > count ( ) ; i + + ) {
if ( defCertBox - > text ( i ) = = oldDef ) {
defCertBox - > setCurrentItem ( i ) ;
break ;
}
}
}
if ( ! noneDef & & defCertBox - > currentItem ( ) = = 0 ) configChanged ( ) ;
hostCertBox - > setCurrentItem ( 0 ) ;
if ( ! noneHost ) {
for ( int i = 0 ; i < hostCertBox - > count ( ) ; i + + ) {
if ( hostCertBox - > text ( i ) = = oldHost ) {
hostCertBox - > setCurrentItem ( i ) ;
break ;
}
}
}
if ( ! noneHost & & hostCertBox - > currentItem ( ) = = 0 ) configChanged ( ) ;
// Update the host entries too
for ( HostAuthItem * x =
static_cast < HostAuthItem * > ( hostAuthList - > firstChild ( ) ) ;
x ;
x = static_cast < HostAuthItem * > ( x - > nextSibling ( ) ) ) {
TQString newValue = TQString ( ) ;
for ( int i = 1 ; i < hostCertBox - > count ( ) ; i + + ) {
if ( hostCertBox - > text ( i ) = = x - > getCertName ( ) ) {
newValue = x - > getCertName ( ) ;
break ;
}
}
if ( newValue ! = x - > getCertName ( ) ) configChanged ( ) ;
x - > setCertName ( newValue ) ;
}
}
# include "crypto.moc"