kdelibs/kio/kssl/ksslkeygen.cpp
Ivailo Monev b30eda0d86 generic: fix khtml build regression
it was broken since b355dff9 and cd441bc5

Signed-off-by: Ivailo Monev <xakepa10@gmail.com>
2016-04-05 09:52:14 +00:00

295 lines
8 KiB
C++

/* This file is part of the KDE project
*
* Copyright (C) 2001 George Staikos <staikos@kde.org>
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Library General Public
* License as published by the Free Software Foundation; either
* version 2 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Library General Public License for more details.
*
* You should have received a copy of the GNU Library General Public License
* along with this library; see the file COPYING.LIB. If not, write to
* the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
* Boston, MA 02110-1301, USA.
*/
#include "ksslkeygen.h"
#include "ksslkeygen_p.h"
#include "ui_keygenwizard.h"
#include <kdebug.h>
#include <klocale.h>
#include <kmessagebox.h>
#include <kprogressdialog.h>
#include <kstandarddirs.h>
#include <ktemporaryfile.h>
#include <kwallet.h>
#include <assert.h>
KSSLKeyGenWizardPage2::KSSLKeyGenWizardPage2(QWidget* parent)
: QWizardPage(parent)
{
ui2 = new Ui_KGWizardPage2;
ui2->setupUi(this);
connect(ui2->_password1, SIGNAL(textChanged(QString)), this, SLOT(slotPassChanged()));
connect(ui2->_password2, SIGNAL(textChanged(QString)), this, SLOT(slotPassChanged()));
}
bool KSSLKeyGenWizardPage2::isComplete() const
{
return ui2->_password1->text() == ui2->_password2->text() && ui2->_password1->text().length() >= 4;
}
void KSSLKeyGenWizardPage2::slotPassChanged()
{
emit completeChanged(); // well maybe it hasn't changed, but it might have; QWizard calls isComplete() to find out
}
QString KSSLKeyGenWizardPage2::password() const
{
Q_ASSERT(isComplete());
return ui2->_password1->text();
}
////
class KSSLKeyGenPrivate
{
public:
KSSLKeyGenPrivate()
: idx(-1)
{
}
int idx;
Ui_KGWizardPage1 *ui1;
KSSLKeyGenWizardPage2* page2;
};
KSSLKeyGen::KSSLKeyGen(QWidget *parent)
: QWizard(parent), d(new KSSLKeyGenPrivate)
{
#ifdef KSSL_HAVE_SSL
QWizardPage* page1 = new QWizardPage(this);
page1->setTitle(i18n("KDE Certificate Request"));
d->ui1 = new Ui_KGWizardPage1;
d->ui1->setupUi(page1);
addPage(page1);
//setHelpEnabled(page1, false);
d->page2 = new KSSLKeyGenWizardPage2(this);
d->page2->setTitle(i18n("KDE Certificate Request - Password"));
addPage(d->page2);
#else
// tell him he doesn't have SSL
#endif
}
KSSLKeyGen::~KSSLKeyGen() {
delete d->ui1;
delete d;
}
bool KSSLKeyGen::validateCurrentPage() {
if (currentPage() != d->page2)
return true;
assert(d->idx >= 0 && d->idx <= 3); // for now
// Generate the CSR
int bits;
switch (d->idx) {
case 0:
bits = 2048;
break;
case 1:
bits = 1024;
break;
case 2:
bits = 768;
break;
case 3:
bits = 512;
break;
default:
KMessageBox::sorry(this, i18n("Unsupported key size."), i18n("KDE SSL Information"));
return false;
}
KProgressDialog *kpd = new KProgressDialog(this);
kpd->setObjectName("progress dialog");
kpd->setWindowTitle(i18n("KDE"));
kpd->setLabelText(i18n("Please wait while the encryption keys are generated..."));
kpd->progressBar()->setValue(0);
kpd->show();
// FIXME - progress dialog won't show this way
int rc = generateCSR("This CSR" /*FIXME */, d->page2->password(), bits, 0x10001 /* This is the traditional exponent used */);
if (rc != 0) // error
return false;
kpd->progressBar()->setValue(100);
#if 0 // TODO: implement
if (rc == 0 && KWallet::Wallet::isEnabled()) {
rc = KMessageBox::questionYesNo(this, i18n("Do you wish to store the passphrase in your wallet file?"), QString(), KGuiItem(i18n("Store")), KGuiItem(i18n("Do Not Store")));
if (rc == KMessageBox::Yes) {
KWallet::Wallet *w = KWallet::Wallet::openWallet(KWallet::Wallet::LocalWallet(), winId());
if (w) {
// FIXME: store passphrase in wallet
delete w;
}
}
}
#endif
kpd->deleteLater();
return true;
}
int KSSLKeyGen::generateCSR(const QString& name, const QString& pass, int bits, int e) {
#ifdef KSSL_HAVE_SSL
KOSSL *kossl = KOSSL::self();
X509_REQ *req = kossl->X509_REQ_new();
if (!req) {
return -2;
}
EVP_PKEY *pkey = kossl->EVP_PKEY_new();
if (!pkey) {
kossl->X509_REQ_free(req);
return -4;
}
RSA *rsakey = kossl->RSA_generate_key(bits, e, NULL, NULL);
if (!rsakey) {
kossl->X509_REQ_free(req);
kossl->EVP_PKEY_free(pkey);
return -3;
}
int rc;
rc = kossl->EVP_PKEY_assign(pkey, EVP_PKEY_RSA, (char *)rsakey);
if (!rc) {
kossl->X509_REQ_free(req);
kossl->EVP_PKEY_free(pkey);
return -6;
}
rc = kossl->X509_REQ_set_pubkey(req, pkey);
if (!rc) {
kossl->X509_REQ_free(req);
kossl->EVP_PKEY_free(pkey);
return -6;
}
// Set the subject
X509_NAME *n = kossl->X509_NAME_new();
kossl->X509_NAME_add_entry_by_txt(n, (char*)LN_countryName, MBSTRING_UTF8, (unsigned char*)name.toLocal8Bit().data(), -1, -1, 0);
kossl->X509_NAME_add_entry_by_txt(n, (char*)LN_organizationName, MBSTRING_UTF8, (unsigned char*)name.toLocal8Bit().data(), -1, -1, 0);
kossl->X509_NAME_add_entry_by_txt(n, (char*)LN_organizationalUnitName, MBSTRING_UTF8, (unsigned char*)name.toLocal8Bit().data(), -1, -1, 0);
kossl->X509_NAME_add_entry_by_txt(n, (char*)LN_localityName, MBSTRING_UTF8, (unsigned char*)name.toLocal8Bit().data(), -1, -1, 0);
kossl->X509_NAME_add_entry_by_txt(n, (char*)LN_stateOrProvinceName, MBSTRING_UTF8, (unsigned char*)name.toLocal8Bit().data(), -1, -1, 0);
kossl->X509_NAME_add_entry_by_txt(n, (char*)LN_commonName, MBSTRING_UTF8, (unsigned char*)name.toLocal8Bit().data(), -1, -1, 0);
kossl->X509_NAME_add_entry_by_txt(n, (char*)LN_pkcs9_emailAddress, MBSTRING_UTF8, (unsigned char*)name.toLocal8Bit().data(), -1, -1, 0);
rc = kossl->X509_REQ_set_subject_name(req, n);
if (!rc) {
kossl->X509_REQ_free(req);
kossl->EVP_PKEY_free(pkey);
return -6;
}
rc = kossl->X509_REQ_sign(req, pkey, kossl->EVP_md5());
if (!rc) {
kossl->X509_REQ_free(req);
kossl->EVP_PKEY_free(pkey);
return -6;
}
// We write it to the database and then the caller can obtain it
// back from there. Yes it's inefficient, but it doesn't happen
// often and this way things are uniform.
KGlobal::dirs()->addResourceType("kssl", "data", "kssl");
QString path = KGlobal::dirs()->saveLocation("kssl");
KTemporaryFile csrFile;
csrFile.setAutoRemove(false);
csrFile.setPrefix(path + "csr_");
csrFile.setSuffix(".der");
if (!csrFile.open()) {
kossl->X509_REQ_free(req);
kossl->EVP_PKEY_free(pkey);
return -5;
}
KTemporaryFile p8File;
p8File.setAutoRemove(false);
p8File.setPrefix(path + "pkey_");
p8File.setSuffix(".p8");
if (!p8File.open()) {
kossl->X509_REQ_free(req);
kossl->EVP_PKEY_free(pkey);
return -5;
}
FILE *csr_fs = fopen(QFile::encodeName(csrFile.fileName()), "r+");
FILE *p8_fs = fopen(QFile::encodeName(p8File.fileName()), "r+");
kossl->i2d_X509_REQ_fp(csr_fs, req);
kossl->i2d_PKCS8PrivateKey_fp(p8_fs, pkey,
kossl->EVP_bf_cbc(), pass.toLocal8Bit().data(),
pass.length(), 0L, 0L);
// FIXME Write kconfig entry to store the filenames under the md5 hash
kossl->X509_REQ_free(req);
kossl->EVP_PKEY_free(pkey);
fclose(csr_fs);
fclose(p8_fs);
return 0;
#else
return -1;
#endif
}
QStringList KSSLKeyGen::supportedKeySizes() {
QStringList x;
#ifdef KSSL_HAVE_SSL
x << i18n("2048 (High Grade)")
<< i18n("1024 (Medium Grade)")
<< i18n("768 (Low Grade)")
<< i18n("512 (Low Grade)");
#else
x << i18n("No SSL support.");
#endif
return x;
}
void KSSLKeyGen::setKeySize(int idx)
{
d->idx = idx;
}
#include "moc_ksslkeygen.cpp"
#include "moc_ksslkeygen_p.cpp"