mirror of
https://bitbucket.org/smil3y/kdelibs.git
synced 2025-02-24 19:02:48 +00:00
141 lines
5.4 KiB
C++
141 lines
5.4 KiB
C++
/* This file is part of the KDE project
|
|
*
|
|
* Copyright (C) 2009 Andreas Hartmetz <ahartmetz@gmail.com>
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Library General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Library General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Library General Public License
|
|
* along with this library; see the file COPYING.LIB. If not, write to
|
|
* the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
|
* Boston, MA 02110-1301, USA.
|
|
*/
|
|
|
|
#include "sslui.h"
|
|
|
|
#include <kdebug.h>
|
|
#include <klocalizedstring.h>
|
|
#include <kmessagebox.h>
|
|
#include <ksslcertificatemanager.h>
|
|
#include <ksslinfodialog.h>
|
|
#include <ktcpsocket_p.h>
|
|
|
|
|
|
bool KIO::SslUi::askIgnoreSslErrors(const KTcpSocket *socket, RulesStorage storedRules)
|
|
{
|
|
KSslErrorUiData uiData(socket);
|
|
return askIgnoreSslErrors(uiData, storedRules);
|
|
}
|
|
|
|
|
|
bool KIO::SslUi::askIgnoreSslErrors(const KSslErrorUiData &uiData, RulesStorage storedRules)
|
|
{
|
|
const KSslErrorUiData::Private *ud = KSslErrorUiData::Private::get(&uiData);
|
|
if (ud->sslErrors.isEmpty()) {
|
|
return true;
|
|
}
|
|
|
|
QList<KSslError> fatalErrors = KSslCertificateManager::nonIgnorableErrors(ud->sslErrors);
|
|
if (!fatalErrors.isEmpty()) {
|
|
//TODO message "sorry, fatal error, you can't override it"
|
|
return false;
|
|
}
|
|
if (ud->certificateChain.isEmpty()) {
|
|
// SSL without certificates is quite useless and should never happen
|
|
KMessageBox::sorry(0, i18n("The remote host did not send any SSL certificates.\n"
|
|
"Aborting because the identity of the host cannot be established."));
|
|
return false;
|
|
}
|
|
|
|
KSslCertificateManager *const cm = KSslCertificateManager::self();
|
|
KSslCertificateRule rule(ud->certificateChain.first(), ud->host);
|
|
if (storedRules & RecallRules) {
|
|
rule = cm->rule(ud->certificateChain.first(), ud->host);
|
|
// remove previously seen and acknowledged errors
|
|
QList<KSslError> remainingErrors = rule.filterErrors(ud->sslErrors);
|
|
if (remainingErrors.isEmpty()) {
|
|
kDebug(7029) << "Error list empty after removing errors to be ignored. Continuing.";
|
|
return true;
|
|
}
|
|
}
|
|
|
|
//### We don't ask to permanently reject the certificate
|
|
|
|
QString message = i18n("The server failed the authenticity check (%1).\n\n", ud->host);
|
|
foreach (const KSslError &err, ud->sslErrors) {
|
|
message.append(err.errorString());
|
|
message.append('\n');
|
|
}
|
|
message = message.trimmed();
|
|
|
|
int msgResult;
|
|
do {
|
|
msgResult = KMessageBox::warningYesNoCancel(0, message, i18n("Server Authentication"),
|
|
KGuiItem(i18n("&Details"), "help-about"),
|
|
KGuiItem(i18n("Co&ntinue"), "arrow-right"));
|
|
if (msgResult == KMessageBox::Yes) {
|
|
//Details was chosen - show the certificate and error details
|
|
|
|
|
|
QList<QList<KSslError::Error> > meh; // parallel list to cert list :/
|
|
|
|
foreach (const QSslCertificate &cert, ud->certificateChain) {
|
|
QList<KSslError::Error> errors;
|
|
foreach(const KSslError &error, ud->sslErrors) {
|
|
if (error.certificate() == cert) {
|
|
// we keep only the error code enum here
|
|
errors.append(error.error());
|
|
}
|
|
}
|
|
meh.append(errors);
|
|
}
|
|
|
|
|
|
KSslInfoDialog *dialog = new KSslInfoDialog();
|
|
dialog->setSslInfo(ud->certificateChain, ud->ip, ud->host, ud->sslProtocol,
|
|
ud->cipher, ud->usedBits, ud->bits, meh);
|
|
dialog->exec();
|
|
} else if (msgResult == KMessageBox::Cancel) {
|
|
return false;
|
|
}
|
|
//fall through on KMessageBox::No
|
|
} while (msgResult == KMessageBox::Yes);
|
|
|
|
|
|
if (storedRules & StoreRules) {
|
|
//Save the user's choice to ignore the SSL errors.
|
|
|
|
msgResult = KMessageBox::warningYesNo(0,
|
|
i18n("Would you like to accept this "
|
|
"certificate forever without "
|
|
"being prompted?"),
|
|
i18n("Server Authentication"),
|
|
KGuiItem(i18n("&Forever"), "flag-green"),
|
|
KGuiItem(i18n("&Current Session only"), "chronometer"));
|
|
QDateTime ruleExpiry = QDateTime::currentDateTime();
|
|
if (msgResult == KMessageBox::Yes) {
|
|
//accept forever ("for a very long time")
|
|
ruleExpiry = ruleExpiry.addYears(1000);
|
|
} else {
|
|
//accept "for a short time", half an hour.
|
|
ruleExpiry = ruleExpiry.addSecs(30*60);
|
|
}
|
|
|
|
//TODO special cases for wildcard domain name in the certificate!
|
|
//rule = KSslCertificateRule(d->socket.peerCertificateChain().first(), whatever);
|
|
|
|
rule.setExpiryDateTime(ruleExpiry);
|
|
rule.setIgnoredErrors(ud->sslErrors);
|
|
cm->setRule(rule);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|