Fix FSF address (Tobias Mueller, #470445)
[platform/upstream/evolution-data-server.git] / camel / camel-tcp-stream-openssl.c
1 /* -*- Mode: C; tab-width: 8; indent-tabs-mode: t; c-basic-offset: 8 -*- */
2 /*
3  *  Authors: Jeffrey Stedfast <fejj@ximian.com>
4  *
5  *  Copyright 2001 Ximian, Inc. (www.ximian.com)
6  *
7  * This program is free software; you can redistribute it and/or
8  * modify it under the terms of version 2 of the GNU Lesser General Public
9  * License as published by the Free Software Foundation.
10  *
11  * This program is distributed in the hope that it will be useful,
12  * but WITHOUT ANY WARRANTY; without even the implied warranty of
13  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14  * General Public License for more details.
15  *
16  * You should have received a copy of the GNU Lesser General Public
17  * License along with this program; if not, write to the
18  * Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
19  * Boston, MA 02110-1301, USA.
20  *
21  */
22
23
24 #ifdef HAVE_CONFIG_H
25 #include <config.h>
26 #endif
27
28 #ifdef HAVE_OPENSSL
29
30 #include <errno.h>
31 #include <fcntl.h>
32 #include <string.h>
33 #include <unistd.h>
34 #include <sys/stat.h>
35 #include <sys/time.h>
36 #include <sys/types.h>
37
38 #include <openssl/err.h>
39 #include <openssl/ssl.h>
40 #include <openssl/x509.h>
41
42 #include "camel-certdb.h"
43 #include "camel-operation.h"
44 #include "camel-service.h"
45 #include "camel-session.h"
46
47 #include "camel-tcp-stream-ssl.h"
48
49 #define d(x)
50
51 #define TIMEOUT_USEC  (10000)
52
53 static CamelTcpStreamClass *parent_class = NULL;
54
55 /* Returns the class for a CamelTcpStreamSSL */
56 #define CTSR_CLASS(so) CAMEL_TCP_STREAM_SSL_CLASS (CAMEL_OBJECT_GET_CLASS (so))
57
58 static ssize_t stream_read (CamelStream *stream, char *buffer, size_t n);
59 static ssize_t stream_write (CamelStream *stream, const char *buffer, size_t n);
60 static int stream_flush  (CamelStream *stream);
61 static int stream_close  (CamelStream *stream);
62
63 static int stream_connect (CamelTcpStream *stream, struct hostent *host, int port);
64 static int stream_getsockopt (CamelTcpStream *stream, CamelSockOptData *data);
65 static int stream_setsockopt (CamelTcpStream *stream, const CamelSockOptData *data);
66 static CamelTcpAddress *stream_get_local_address (CamelTcpStream *stream);
67 static CamelTcpAddress *stream_get_remote_address (CamelTcpStream *stream);
68
69 static SSL *open_ssl_connection (CamelService *service, int sockfd, CamelTcpStreamSSL *openssl);
70
71 struct _CamelTcpStreamSSLPrivate {
72         int sockfd;
73         SSL *ssl;
74         
75         CamelService *service;
76         char *expected_host;
77         gboolean ssl_mode;
78         guint32 flags;
79 };
80
81 static void
82 camel_tcp_stream_ssl_class_init (CamelTcpStreamSSLClass *camel_tcp_stream_ssl_class)
83 {
84         CamelTcpStreamClass *camel_tcp_stream_class =
85                 CAMEL_TCP_STREAM_CLASS (camel_tcp_stream_ssl_class);
86         CamelStreamClass *camel_stream_class =
87                 CAMEL_STREAM_CLASS (camel_tcp_stream_ssl_class);
88         
89         parent_class = CAMEL_TCP_STREAM_CLASS (camel_type_get_global_classfuncs (camel_tcp_stream_get_type ()));
90         
91         /* virtual method overload */
92         camel_stream_class->read = stream_read;
93         camel_stream_class->write = stream_write;
94         camel_stream_class->flush = stream_flush;
95         camel_stream_class->close = stream_close;
96         
97         camel_tcp_stream_class->connect = stream_connect;
98         camel_tcp_stream_class->getsockopt = stream_getsockopt;
99         camel_tcp_stream_class->setsockopt = stream_setsockopt;
100         camel_tcp_stream_class->get_local_address  = stream_get_local_address;
101         camel_tcp_stream_class->get_remote_address = stream_get_remote_address;
102         
103         /* init OpenSSL stuff */
104         SSLeay_add_ssl_algorithms ();
105         SSL_load_error_strings ();
106 }
107
108 static void
109 camel_tcp_stream_ssl_init (gpointer object, gpointer klass)
110 {
111         CamelTcpStreamSSL *stream = CAMEL_TCP_STREAM_SSL (object);
112         
113         stream->priv = g_new0 (struct _CamelTcpStreamSSLPrivate, 1);
114         stream->priv->sockfd = -1;
115 }
116
117 static void
118 camel_tcp_stream_ssl_finalize (CamelObject *object)
119 {
120         CamelTcpStreamSSL *stream = CAMEL_TCP_STREAM_SSL (object);
121         
122         if (stream->priv->ssl) {
123                 SSL_shutdown (stream->priv->ssl);
124                 
125                 if (stream->priv->ssl->ctx) {
126                         SSL_CTX_free (stream->priv->ssl->ctx);
127                 }
128                 
129                 SSL_free (stream->priv->ssl);
130         }
131         
132         if (stream->priv->sockfd != -1)
133                 close (stream->priv->sockfd);
134         
135         g_free (stream->priv->expected_host);
136         
137         g_free (stream->priv);
138 }
139
140
141 CamelType
142 camel_tcp_stream_ssl_get_type (void)
143 {
144         static CamelType type = CAMEL_INVALID_TYPE;
145         
146         if (type == CAMEL_INVALID_TYPE) {
147                 type = camel_type_register (camel_tcp_stream_get_type (),
148                                             "CamelTcpStreamSSL",
149                                             sizeof (CamelTcpStreamSSL),
150                                             sizeof (CamelTcpStreamSSLClass),
151                                             (CamelObjectClassInitFunc) camel_tcp_stream_ssl_class_init,
152                                             NULL,
153                                             (CamelObjectInitFunc) camel_tcp_stream_ssl_init,
154                                             (CamelObjectFinalizeFunc) camel_tcp_stream_ssl_finalize);
155         }
156         
157         return type;
158 }
159
160
161 /**
162  * camel_tcp_stream_ssl_new:
163  * @service: camel service
164  * @expected_host: host that the stream is expecting to connect with.
165  * @flags: flags
166  *
167  * Since the SSL certificate authenticator may need to prompt the
168  * user, a CamelService is needed. @expected_host is needed as a
169  * protection against an MITM attack.
170  *
171  * Return value: a ssl stream (in ssl mode)
172  **/
173 CamelStream *
174 camel_tcp_stream_ssl_new (CamelService *service, const char *expected_host, guint32 flags)
175 {
176         CamelTcpStreamSSL *stream;
177         
178         stream = CAMEL_TCP_STREAM_SSL (camel_object_new (camel_tcp_stream_ssl_get_type ()));
179         
180         stream->priv->service = service;
181         stream->priv->expected_host = g_strdup (expected_host);
182         stream->priv->ssl_mode = TRUE;
183         stream->priv->flags = flags;
184         
185         return CAMEL_STREAM (stream);
186 }
187
188
189 /**
190  * camel_tcp_stream_ssl_new_raw:
191  * @service: camel service
192  * @expected_host: host that the stream is expecting to connect with.
193  * @flags: flags
194  *
195  * Since the SSL certificate authenticator may need to prompt the
196  * user, a CamelService is needed. @expected_host is needed as a
197  * protection against an MITM attack.
198  *
199  * Return value: a ssl-capable stream (in non ssl mode)
200  **/
201 CamelStream *
202 camel_tcp_stream_ssl_new_raw (CamelService *service, const char *expected_host, guint32 flags)
203 {
204         CamelTcpStreamSSL *stream;
205         
206         stream = CAMEL_TCP_STREAM_SSL (camel_object_new (camel_tcp_stream_ssl_get_type ()));
207         
208         stream->priv->service = service;
209         stream->priv->expected_host = g_strdup (expected_host);
210         stream->priv->ssl_mode = FALSE;
211         stream->priv->flags = flags;
212         
213         return CAMEL_STREAM (stream);
214 }
215
216
217 static int
218 ssl_errno (SSL *ssl, int ret)
219 {
220         switch (SSL_get_error (ssl, ret)) {
221         case SSL_ERROR_NONE:
222                 return 0;
223         case SSL_ERROR_ZERO_RETURN:
224                 /* this one does not map well at all */
225                 d(printf ("ssl_errno: SSL_ERROR_ZERO_RETURN\n"));
226                 return EINVAL;
227         case SSL_ERROR_WANT_READ:   /* non-fatal; retry */
228         case SSL_ERROR_WANT_WRITE:  /* non-fatal; retry */
229                 d(printf ("ssl_errno: SSL_ERROR_WANT_[READ,WRITE]\n"));
230                 return EAGAIN;
231         case SSL_ERROR_SYSCALL:
232                 d(printf ("ssl_errno: SSL_ERROR_SYSCALL\n"));
233                 return EINTR;
234         case SSL_ERROR_SSL:
235                 d(printf ("ssl_errno: SSL_ERROR_SSL  <-- very useful error...riiiiight\n"));
236                 return EINTR;
237         default:
238                 d(printf ("ssl_errno: default error\n"));
239                 return EINTR;
240         }
241 }
242
243
244 /**
245  * camel_tcp_stream_ssl_enable_ssl:
246  * @stream: ssl stream
247  *
248  * Toggles an ssl-capable stream into ssl mode (if it isn't already).
249  *
250  * Returns 0 on success or -1 on fail.
251  **/
252 int
253 camel_tcp_stream_ssl_enable_ssl (CamelTcpStreamSSL *stream)
254 {
255         SSL *ssl;
256         
257         g_return_val_if_fail (CAMEL_IS_TCP_STREAM_SSL (stream), -1);
258         
259         if (stream->priv->sockfd != -1 && !stream->priv->ssl_mode) {
260                 ssl = open_ssl_connection (stream->priv->service, stream->priv->sockfd, stream);
261                 if (ssl == NULL) {
262                         stream->priv->sockfd = -1;
263                         return -1;
264                 }
265                 
266                 stream->priv->ssl = ssl;
267         }
268         
269         stream->priv->ssl_mode = TRUE;
270         
271         return 0;
272 }
273
274
275 static ssize_t
276 stream_read (CamelStream *stream, char *buffer, size_t n)
277 {
278         CamelTcpStreamSSL *openssl = CAMEL_TCP_STREAM_SSL (stream);
279         SSL *ssl = openssl->priv->ssl;
280         ssize_t nread;
281         int cancel_fd;
282         
283         if (camel_operation_cancel_check (NULL)) {
284                 errno = EINTR;
285                 return -1;
286         }
287         
288         cancel_fd = camel_operation_cancel_fd (NULL);
289         if (cancel_fd == -1) {
290                 do {
291                         if (ssl) {
292                                 nread = SSL_read (ssl, buffer, n);
293                                 if (nread < 0)
294                                         errno = ssl_errno (ssl, nread);
295                         } else {
296                                 nread = read (openssl->priv->sockfd, buffer, n);
297                         }
298                 } while (nread < 0 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
299         } else {
300                 int error, flags, fdmax;
301                 struct timeval timeout;
302                 fd_set rdset;
303                 
304                 flags = fcntl (openssl->priv->sockfd, F_GETFL);
305                 fcntl (openssl->priv->sockfd, F_SETFL, flags | O_NONBLOCK);
306                 
307                 fdmax = MAX (openssl->priv->sockfd, cancel_fd) + 1;
308                 
309                 do {
310                         FD_ZERO (&rdset);
311                         FD_SET (openssl->priv->sockfd, &rdset);
312                         FD_SET (cancel_fd, &rdset);
313                         
314                         timeout.tv_sec = 0;
315                         timeout.tv_usec = TIMEOUT_USEC;
316                         select (fdmax, &rdset, 0, 0, &timeout);
317                         if (FD_ISSET (cancel_fd, &rdset)) {
318                                 fcntl (openssl->priv->sockfd, F_SETFL, flags);
319                                 errno = EINTR;
320                                 return -1;
321                         }
322                         
323                         do {
324                                 if (ssl) {
325                                         nread = SSL_read (ssl, buffer, n);
326                                         if (nread < 0)
327                                                 errno = ssl_errno (ssl, nread);
328                                 } else {
329                                         nread = read (openssl->priv->sockfd, buffer, n);
330                                 }
331                         } while (nread < 0 && errno == EINTR);
332                 } while (nread < 0 && (errno == EAGAIN || errno == EWOULDBLOCK));
333                 
334                 error = errno;
335                 fcntl (openssl->priv->sockfd, F_SETFL, flags);
336                 errno = error;
337         }
338         
339         return nread;
340 }
341
342 static ssize_t
343 stream_write (CamelStream *stream, const char *buffer, size_t n)
344 {
345         CamelTcpStreamSSL *openssl = CAMEL_TCP_STREAM_SSL (stream);
346         SSL *ssl = openssl->priv->ssl;
347         ssize_t w, written = 0;
348         int cancel_fd;
349         
350         if (camel_operation_cancel_check (NULL)) {
351                 errno = EINTR;
352                 return -1;
353         }
354         
355         cancel_fd = camel_operation_cancel_fd (NULL);
356         if (cancel_fd == -1) {
357                 do {
358                         do {
359                                 if (ssl) {
360                                         w = SSL_write (ssl, buffer + written, n - written);
361                                         if (w < 0)
362                                                 errno = ssl_errno (ssl, w);
363                                 } else {
364                                         w = write (openssl->priv->sockfd, buffer + written, n - written);
365                                 }
366                         } while (w < 0 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
367                         
368                         if (w > 0)
369                                 written += w;
370                 } while (w != -1 && written < n);
371         } else {
372                 int error, flags, fdmax;
373                 struct timeval timeout;
374                 fd_set rdset, wrset;
375                 
376                 flags = fcntl (openssl->priv->sockfd, F_GETFL);
377                 fcntl (openssl->priv->sockfd, F_SETFL, flags | O_NONBLOCK);
378                 
379                 fdmax = MAX (openssl->priv->sockfd, cancel_fd) + 1;
380                 do {
381                         FD_ZERO (&rdset);
382                         FD_ZERO (&wrset);
383                         FD_SET (openssl->priv->sockfd, &wrset);
384                         FD_SET (cancel_fd, &rdset);
385                         
386                         timeout.tv_sec = 0;
387                         timeout.tv_usec = TIMEOUT_USEC;
388                         select (fdmax, &rdset, &wrset, 0, &timeout);
389                         if (FD_ISSET (cancel_fd, &rdset)) {
390                                 fcntl (openssl->priv->sockfd, F_SETFL, flags);
391                                 errno = EINTR;
392                                 return -1;
393                         }
394                         
395                         do {
396                                 if (ssl) {
397                                         w = SSL_write (ssl, buffer + written, n - written);
398                                         if (w < 0)
399                                                 errno = ssl_errno (ssl, w);
400                                 } else {
401                                         w = write (openssl->priv->sockfd, buffer + written, n - written);
402                                 }
403                         } while (w < 0 && errno == EINTR);
404                         
405                         if (w < 0) {
406                                 if (errno == EAGAIN || errno == EWOULDBLOCK) {
407                                         w = 0;
408                                 } else {
409                                         error = errno;
410                                         fcntl (openssl->priv->sockfd, F_SETFL, flags);
411                                         errno = error;
412                                         return -1;
413                                 }
414                         } else
415                                 written += w;
416                 } while (w >= 0 && written < n);
417                 
418                 fcntl (openssl->priv->sockfd, F_SETFL, flags);
419         }
420         
421         return written;
422 }
423
424 static int
425 stream_flush (CamelStream *stream)
426 {
427         return 0;
428 }
429
430
431 static void
432 close_ssl_connection (SSL *ssl)
433 {
434         if (ssl) {
435                 SSL_shutdown (ssl);
436                 
437                 if (ssl->ctx)
438                         SSL_CTX_free (ssl->ctx);
439                 
440                 SSL_free (ssl);
441         }
442 }
443
444 static int
445 stream_close (CamelStream *stream)
446 {
447         close_ssl_connection (((CamelTcpStreamSSL *)stream)->priv->ssl);
448         ((CamelTcpStreamSSL *)stream)->priv->ssl = NULL;
449         
450         if (close (((CamelTcpStreamSSL *)stream)->priv->sockfd) == -1)
451                 return -1;
452         
453         ((CamelTcpStreamSSL *)stream)->priv->sockfd = -1;
454         return 0;
455 }
456
457 /* this is a 'cancellable' connect, cancellable from camel_operation_cancel etc */
458 /* returns -1 & errno == EINTR if the connection was cancelled */
459 static int
460 socket_connect (struct hostent *h, int port)
461 {
462 #ifdef ENABLE_IPv6
463         struct sockaddr_in6 sin6;
464 #endif
465         struct sockaddr_in sin;
466         struct sockaddr *saddr;
467         struct timeval tv;
468         socklen_t len;
469         int cancel_fd;
470         int ret, fd;
471         
472         /* see if we're cancelled yet */
473         if (camel_operation_cancel_check (NULL)) {
474                 errno = EINTR;
475                 return -1;
476         }
477         
478         /* setup connect, we do it using a nonblocking socket so we can poll it */
479 #ifdef ENABLE_IPv6
480         if (h->h_addrtype == AF_INET6) {
481                 sin6.sin6_port = htons (port);
482                 sin6.sin6_family = h->h_addrtype;
483                 memcpy (&sin6.sin6_addr, h->h_addr, sizeof (sin6.sin6_addr));
484                 saddr = (struct sockaddr *) &sin6;
485                 len = sizeof (sin6);
486         } else {
487 #endif
488                 sin.sin_port = htons (port);
489                 sin.sin_family = h->h_addrtype;
490                 memcpy (&sin.sin_addr, h->h_addr, sizeof (sin.sin_addr));
491                 saddr = (struct sockaddr *) &sin;
492                 len = sizeof (sin);
493 #ifdef ENABLE_IPv6
494         }
495 #endif
496         
497         fd = socket (h->h_addrtype, SOCK_STREAM, 0);
498         
499         cancel_fd = camel_operation_cancel_fd (NULL);
500         if (cancel_fd == -1) {
501                 ret = connect (fd, saddr, len);
502                 if (ret == -1) {
503                         close (fd);
504                         return -1;
505                 }
506                 
507                 return fd;
508         } else {
509                 fd_set rdset, wrset;
510                 int flags, fdmax;
511                 
512                 flags = fcntl (fd, F_GETFL);
513                 fcntl (fd, F_SETFL, flags | O_NONBLOCK);
514                 
515                 ret = connect (fd, saddr, len);
516                 if (ret == 0) {
517                         fcntl (fd, F_SETFL, flags);
518                         return fd;
519                 }
520                 
521                 if (errno != EINPROGRESS) {
522                         close (fd);
523                         return -1;
524                 }
525                 
526                 FD_ZERO (&rdset);
527                 FD_ZERO (&wrset);
528                 FD_SET (fd, &wrset);
529                 FD_SET (cancel_fd, &rdset);
530                 fdmax = MAX (fd, cancel_fd) + 1;
531                 tv.tv_usec = 0;
532                 tv.tv_sec = 60 * 4;
533                 
534                 if (select (fdmax, &rdset, &wrset, 0, &tv) == 0) {
535                         close (fd);
536                         errno = ETIMEDOUT;
537                         return -1;
538                 }
539                 
540                 if (cancel_fd != -1 && FD_ISSET (cancel_fd, &rdset)) {
541                         close (fd);
542                         errno = EINTR;
543                         return -1;
544                 } else {
545                         len = sizeof (int);
546                         
547                         if (getsockopt (fd, SOL_SOCKET, SO_ERROR, &ret, &len) == -1) {
548                                 close (fd);
549                                 return -1;
550                         }
551                         
552                         if (ret != 0) {
553                                 close (fd);
554                                 errno = ret;
555                                 return -1;
556                         }
557                 }
558                 
559                 fcntl (fd, F_SETFL, flags);
560         }
561         
562         return fd;
563 }
564
565 static const char *
566 x509_strerror (int err)
567 {
568         switch (err) {
569         case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT:
570                 return _("Unable to get issuer's certificate");
571         case X509_V_ERR_UNABLE_TO_GET_CRL:
572                 return _("Unable to get Certificate Revocation List");
573         case X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE:
574                 return _("Unable to decrypt certificate signature");
575         case X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE:
576                 return _("Unable to decrypt Certificate Revocation List signature");
577         case X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY:
578                 return _("Unable to decode issuer's public key");
579         case X509_V_ERR_CERT_SIGNATURE_FAILURE:
580                 return _("Certificate signature failure");
581         case X509_V_ERR_CRL_SIGNATURE_FAILURE:
582                 return _("Certificate Revocation List signature failure");
583         case X509_V_ERR_CERT_NOT_YET_VALID:
584                 return _("Certificate not yet valid");
585         case X509_V_ERR_CERT_HAS_EXPIRED:
586                 return _("Certificate has expired");
587         case X509_V_ERR_CRL_NOT_YET_VALID:
588                 return _("CRL not yet valid");
589         case X509_V_ERR_CRL_HAS_EXPIRED:
590                 return _("CRL has expired");
591         case X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD:
592         case X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD:
593         case X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD:
594         case X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD:
595                 return _("Error in CRL");
596         case X509_V_ERR_OUT_OF_MEM:
597                 return _("Out of memory");
598         case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT:
599                 return _("Zero-depth self-signed certificate");
600         case X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN:
601                 return _("Self-signed certificate in chain");
602         case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY:
603                 return _("Unable to get issuer's certificate locally");
604         case X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE:
605                 return _("Unable to verify leaf signature");
606         case X509_V_ERR_CERT_CHAIN_TOO_LONG:
607                 return _("Certificate chain too long");
608         case X509_V_ERR_CERT_REVOKED:
609                 return _("Certificate Revoked");
610         case X509_V_ERR_INVALID_CA:
611                 return _("Invalid Certificate Authority (CA)");
612         case X509_V_ERR_PATH_LENGTH_EXCEEDED:
613                 return _("Path length exceeded");
614         case X509_V_ERR_INVALID_PURPOSE:
615                 return _("Invalid purpose");
616         case X509_V_ERR_CERT_UNTRUSTED:
617                 return _("Certificate untrusted");
618         case X509_V_ERR_CERT_REJECTED:
619                 return _("Certificate rejected");
620                 /* These are 'informational' when looking for issuer cert */
621         case X509_V_ERR_SUBJECT_ISSUER_MISMATCH:
622                 return _("Subject/Issuer mismatch");
623         case X509_V_ERR_AKID_SKID_MISMATCH:
624                 return _("AKID/SKID mismatch");
625         case X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH:
626                 return _("AKID/Issuer serial mismatch");
627         case X509_V_ERR_KEYUSAGE_NO_CERTSIGN:
628                 return _("Key usage does not support certificate signing");
629                 /* The application is not happy */
630         case X509_V_ERR_APPLICATION_VERIFICATION:
631                 return _("Error in application verification");
632         default:
633                 return _("Unknown");
634         }
635 }
636
637 static int
638 ssl_verify (int ok, X509_STORE_CTX *ctx)
639 {
640         unsigned char md5sum[16], fingerprint[40], *f;
641         CamelTcpStreamSSL *stream;
642         CamelService *service;
643         CamelCertDB *certdb = NULL;
644         CamelCert *ccert = NULL;
645         char *prompt, *cert_str;
646         int err, md5len, i;
647         char buf[257];
648         X509 *cert;
649         SSL *ssl;
650         
651         if (ok)
652                 return TRUE;
653         
654         ssl = X509_STORE_CTX_get_ex_data (ctx, SSL_get_ex_data_X509_STORE_CTX_idx ());
655         
656         stream = SSL_CTX_get_app_data (ssl->ctx);
657         if (!stream)
658                 return FALSE;
659         
660         service = stream->priv->service;
661         
662         cert = X509_STORE_CTX_get_current_cert (ctx);
663         err = X509_STORE_CTX_get_error (ctx);
664         
665         /* calculate the MD5 hash of the raw certificate */
666         md5len = sizeof (md5sum);
667         X509_digest (cert, EVP_md5 (), md5sum, &md5len);
668         for (i = 0, f = fingerprint; i < 16; i++, f += 3)
669                 sprintf (f, "%.2x%c", md5sum[i], i != 15 ? ':' : '\0');
670         
671 #define GET_STRING(name) X509_NAME_oneline (name, buf, 256)
672         
673         certdb = camel_certdb_get_default ();
674         if (certdb) {
675                 ccert = camel_certdb_get_cert (certdb, fingerprint);
676                 if (ccert) {
677                         if (ccert->trust != CAMEL_CERT_TRUST_UNKNOWN) {
678                                 ok = ccert->trust != CAMEL_CERT_TRUST_NEVER;
679                                 camel_certdb_cert_unref (certdb, ccert);
680                                 camel_object_unref (certdb);
681                                 
682                                 return ok;
683                         }
684                 } else {
685                         /* create a new camel-cert */
686                         ccert = camel_certdb_cert_new (certdb);
687                         camel_cert_set_issuer (certdb, ccert, GET_STRING (X509_get_issuer_name (cert)));
688                         camel_cert_set_subject (certdb, ccert, GET_STRING (X509_get_subject_name (cert)));
689                         camel_cert_set_hostname (certdb, ccert, stream->priv->expected_host);
690                         camel_cert_set_fingerprint (certdb, ccert, fingerprint);
691                         camel_cert_set_trust (certdb, ccert, CAMEL_CERT_TRUST_UNKNOWN);
692                         
693                         /* Add the certificate to our db */
694                         camel_certdb_add (certdb, ccert);
695                 }
696         }
697         
698         cert_str = g_strdup_printf (_("Issuer:            %s\n"
699                                       "Subject:           %s\n"
700                                       "Fingerprint:       %s\n"
701                                       "Signature:         %s"),
702                                     GET_STRING (X509_get_issuer_name (cert)),
703                                     GET_STRING (X509_get_subject_name (cert)),
704                                     fingerprint, cert->valid ? _("GOOD") : _("BAD"));
705         
706         prompt = g_strdup_printf (_("Bad certificate from %s:\n\n%s\n\n%s\n\n"
707                                     "Do you wish to accept anyway?"),
708                                   service->url->host, cert_str, x509_strerror (err));
709         
710         ok = camel_session_alert_user (service->session, CAMEL_SESSION_ALERT_WARNING, prompt, TRUE);
711         g_free (prompt);
712         
713         if (ok && ccert) {
714                 camel_cert_set_trust (certdb, ccert, CAMEL_CERT_TRUST_FULLY);
715                 camel_certdb_touch (certdb);
716         }
717         
718         if (certdb) {
719                 camel_certdb_cert_unref (certdb, ccert);
720                 camel_object_unref (certdb);
721         }
722         
723         return ok;
724 }
725
726 static SSL *
727 open_ssl_connection (CamelService *service, int sockfd, CamelTcpStreamSSL *openssl)
728 {
729         SSL_CTX *ssl_ctx = NULL;
730         SSL *ssl = NULL;
731         int n;
732         
733         /* SSLv23_client_method will negotiate with SSL v2, v3, or TLS v1 */
734         ssl_ctx = SSL_CTX_new (SSLv23_client_method ());
735         g_return_val_if_fail (ssl_ctx != NULL, NULL);
736         
737         SSL_CTX_set_default_verify_paths (ssl_ctx);
738         SSL_CTX_set_verify (ssl_ctx, SSL_VERIFY_PEER, &ssl_verify);
739         ssl = SSL_new (ssl_ctx);
740         SSL_set_fd (ssl, sockfd);
741         
742         SSL_CTX_set_app_data (ssl_ctx, openssl);
743         
744         n = SSL_connect (ssl);
745         if (n != 1) {
746                 int errnosave = ssl_errno (ssl, n);
747                 
748                 SSL_shutdown (ssl);
749                 
750                 if (ssl->ctx)
751                         SSL_CTX_free (ssl->ctx);
752                 
753                 SSL_free (ssl);
754                 ssl = NULL;
755                 
756                 close (sockfd);
757                 
758                 errno = errnosave;
759         }
760         
761         return ssl;
762 }
763
764 static int
765 stream_connect (CamelTcpStream *stream, struct hostent *host, int port)
766 {
767         CamelTcpStreamSSL *openssl = CAMEL_TCP_STREAM_SSL (stream);
768         SSL *ssl = NULL;
769         int fd;
770         
771         g_return_val_if_fail (host != NULL, -1);
772         
773         fd = socket_connect (host, port);
774         if (fd == -1)
775                 return -1;
776         
777         if (openssl->priv->ssl_mode) {
778                 ssl = open_ssl_connection (openssl->priv->service, fd, openssl);
779                 if (!ssl)
780                         return -1;
781         }
782         
783         openssl->priv->sockfd = fd;
784         openssl->priv->ssl = ssl;
785         
786         return 0;
787 }
788
789
790 static int
791 get_sockopt_level (const CamelSockOptData *data)
792 {
793         switch (data->option) {
794         case CAMEL_SOCKOPT_MAXSEGMENT:
795         case CAMEL_SOCKOPT_NODELAY:
796                 return IPPROTO_TCP;
797         default:
798                 return SOL_SOCKET;
799         }
800 }
801
802 static int
803 get_sockopt_optname (const CamelSockOptData *data)
804 {
805         switch (data->option) {
806         case CAMEL_SOCKOPT_MAXSEGMENT:
807                 return TCP_MAXSEG;
808         case CAMEL_SOCKOPT_NODELAY:
809                 return TCP_NODELAY;
810         case CAMEL_SOCKOPT_BROADCAST:
811                 return SO_BROADCAST;
812         case CAMEL_SOCKOPT_KEEPALIVE:
813                 return SO_KEEPALIVE;
814         case CAMEL_SOCKOPT_LINGER:
815                 return SO_LINGER;
816         case CAMEL_SOCKOPT_RECVBUFFERSIZE:
817                 return SO_RCVBUF;
818         case CAMEL_SOCKOPT_SENDBUFFERSIZE:
819                 return SO_SNDBUF;
820         case CAMEL_SOCKOPT_REUSEADDR:
821                 return SO_REUSEADDR;
822         case CAMEL_SOCKOPT_IPTYPEOFSERVICE:
823                 return SO_TYPE;
824         default:
825                 return -1;
826         }
827 }
828
829 static int
830 stream_getsockopt (CamelTcpStream *stream, CamelSockOptData *data)
831 {
832         int optname, optlen;
833         
834         if ((optname = get_sockopt_optname (data)) == -1)
835                 return -1;
836         
837         if (data->option == CAMEL_SOCKOPT_NONBLOCKING) {
838                 int flags;
839                 
840                 flags = fcntl (((CamelTcpStreamSSL *) stream)->priv->sockfd, F_GETFL);
841                 if (flags == -1)
842                         return -1;
843                 
844                 data->value.non_blocking = flags & O_NONBLOCK ? TRUE : FALSE;
845                 
846                 return 0;
847         }
848         
849         return getsockopt (((CamelTcpStreamSSL *) stream)->priv->sockfd,
850                            get_sockopt_level (data),
851                            optname,
852                            (void *) &data->value,
853                            &optlen);
854 }
855
856 static int
857 stream_setsockopt (CamelTcpStream *stream, const CamelSockOptData *data)
858 {
859         int optname;
860         
861         if ((optname = get_sockopt_optname (data)) == -1)
862                 return -1;
863         
864         if (data->option == CAMEL_SOCKOPT_NONBLOCKING) {
865                 int flags, set;
866                 
867                 flags = fcntl (((CamelTcpStreamSSL *) stream)->priv->sockfd, F_GETFL);
868                 if (flags == -1)
869                         return -1;
870                 
871                 set = data->value.non_blocking ? O_NONBLOCK : 0;
872                 flags = (flags & ~O_NONBLOCK) | set;
873                 
874                 if (fcntl (((CamelTcpStreamSSL *) stream)->priv->sockfd, F_SETFL, flags) == -1)
875                         return -1;
876                 
877                 return 0;
878         }
879         
880         return setsockopt (((CamelTcpStreamSSL *) stream)->priv->sockfd,
881                            get_sockopt_level (data),
882                            optname,
883                            (void *) &data->value,
884                            sizeof (data->value));
885 }
886
887 #ifdef ENABLE_IPv6
888 #define MIN_SOCKADDR_BUFLEN  (sizeof (struct sockaddr_in6))
889 #else
890 #define MIN_SOCKADDR_BUFLEN  (sizeof (struct sockaddr_in))
891 #endif
892
893 static CamelTcpAddress *
894 stream_get_local_address (CamelTcpStream *stream)
895 {
896         unsigned char buf[MIN_SOCKADDR_BUFLEN];
897 #ifdef ENABLE_IPv6
898         struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *) buf;
899 #endif
900         struct sockaddr_in *sin = (struct sockaddr_in *) buf;
901         struct sockaddr *saddr = (struct sockaddr *) buf;
902         gpointer address;
903         socklen_t len;
904         int family;
905         
906         len = MIN_SOCKADDR_BUFLEN;
907         
908         if (getsockname (CAMEL_TCP_STREAM_SSL (stream)->priv->sockfd, saddr, &len) == -1)
909                 return NULL;
910         
911         if (saddr->sa_family == AF_INET) {
912                 family = CAMEL_TCP_ADDRESS_IPv4;
913                 address = &sin->sin_addr;
914 #ifdef ENABLE_IPv6
915         } else if (saddr->sa_family == AF_INET6) {
916                 family = CAMEL_TCP_ADDRESS_IPv6;
917                 address = &sin6->sin6_addr;
918 #endif
919         } else
920                 return NULL;
921         
922         return camel_tcp_address_new (family, sin->sin_port, len, address);
923 }
924
925 static CamelTcpAddress *
926 stream_get_remote_address (CamelTcpStream *stream)
927 {
928         unsigned char buf[MIN_SOCKADDR_BUFLEN];
929 #ifdef ENABLE_IPv6
930         struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *) buf;
931 #endif
932         struct sockaddr_in *sin = (struct sockaddr_in *) buf;
933         struct sockaddr *saddr = (struct sockaddr *) buf;
934         gpointer address;
935         socklen_t len;
936         int family;
937         
938         len = MIN_SOCKADDR_BUFLEN;
939         
940         if (getpeername (CAMEL_TCP_STREAM_SSL (stream)->priv->sockfd, saddr, &len) == -1)
941                 return NULL;
942         
943         if (saddr->sa_family == AF_INET) {
944                 family = CAMEL_TCP_ADDRESS_IPv4;
945                 address = &sin->sin_addr;
946 #ifdef ENABLE_IPv6
947         } else if (saddr->sa_family == AF_INET6) {
948                 family = CAMEL_TCP_ADDRESS_IPv6;
949                 address = &sin6->sin6_addr;
950 #endif
951         } else
952                 return NULL;
953         
954         return camel_tcp_address_new (family, sin->sin_port, len, address);
955 }
956
957 #endif /* HAVE_OPENSSL */