forked from PsychoticNinja/irssi
95 lines
3.2 KiB
C
95 lines
3.2 KiB
C
/*
|
|
* Copyright (c) 2015 Alexander Færøy <ahf@irssi.org>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License as published by the Free
|
|
* Software Foundation; either version 2 of the License, or (at your option)
|
|
* any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
* more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License along with
|
|
* this program; if not, write to the Free Software Foundation, Inc., 51
|
|
* Franklin Street, Fifth Floor, Boston, MA 02110-1301,USA
|
|
*/
|
|
|
|
#include "module.h"
|
|
#include "signals.h"
|
|
#include "settings.h"
|
|
#include "levels.h"
|
|
#include "tls.h"
|
|
|
|
#include "module-formats.h"
|
|
#include "printtext.h"
|
|
|
|
#include "fe-tls.h"
|
|
|
|
static void tls_handshake_finished(SERVER_REC *server, TLS_REC *tls)
|
|
{
|
|
GSList *certs = NULL;
|
|
GSList *subject = NULL;
|
|
GSList *issuer = NULL;
|
|
GString *str = NULL;
|
|
TLS_CERT_ENTRY_REC *data = NULL;
|
|
|
|
if (! settings_get_bool("tls_verbose_connect"))
|
|
return;
|
|
|
|
printformat(server, NULL, MSGLEVEL_CLIENTNOTICE, TXT_TLS_CERT_HEADER);
|
|
|
|
for (certs = tls->certs; certs != NULL; certs = certs->next) {
|
|
TLS_CERT_REC *tls_cert_rec = certs->data;
|
|
str = g_string_new(NULL);
|
|
|
|
for (subject = tls_cert_rec->subject; subject != NULL; subject = subject->next) {
|
|
data = subject->data;
|
|
g_string_append_printf(str, "%s: %s, ", data->name, data->value);
|
|
}
|
|
|
|
if (str->len > 1)
|
|
g_string_truncate(str, str->len - 2);
|
|
|
|
printformat(server, NULL, MSGLEVEL_CLIENTNOTICE, TXT_TLS_CERT_SUBJECT, str->str);
|
|
g_string_free(str, TRUE);
|
|
|
|
str = g_string_new(NULL);
|
|
|
|
for (issuer = tls_cert_rec->issuer; issuer != NULL; issuer = issuer->next) {
|
|
data = issuer->data;
|
|
g_string_append_printf(str, "%s: %s, ", data->name, data->value);
|
|
}
|
|
|
|
if (str->len > 1)
|
|
g_string_truncate(str, str->len - 2);
|
|
|
|
printformat(server, NULL, MSGLEVEL_CLIENTNOTICE, TXT_TLS_CERT_ISSUER, str->str);
|
|
g_string_free(str, TRUE);
|
|
}
|
|
|
|
printformat(server, NULL, MSGLEVEL_CLIENTNOTICE, TXT_TLS_PROTOCOL_VERSION, tls->protocol_version, tls->cipher_size, tls->cipher);
|
|
|
|
if (tls->ephemeral_key_algorithm != NULL)
|
|
printformat(server, NULL, MSGLEVEL_CLIENTNOTICE, TXT_TLS_EPHEMERAL_KEY, tls->ephemeral_key_size, tls->ephemeral_key_algorithm);
|
|
else
|
|
printformat(server, NULL, MSGLEVEL_CLIENTNOTICE, TXT_TLS_EPHEMERAL_KEY_UNAVAILBLE);
|
|
|
|
printformat(server, NULL, MSGLEVEL_CLIENTNOTICE, TXT_TLS_PUBKEY, tls->public_key_size, tls->public_key_algorithm, tls->not_before, tls->not_after);
|
|
printformat(server, NULL, MSGLEVEL_CLIENTNOTICE, TXT_TLS_PUBKEY_FINGERPRINT, tls->public_key_fingerprint, tls->public_key_fingerprint_algorithm);
|
|
printformat(server, NULL, MSGLEVEL_CLIENTNOTICE, TXT_TLS_CERT_FINGERPRINT, tls->certificate_fingerprint, tls->certificate_fingerprint_algorithm);
|
|
}
|
|
|
|
void fe_tls_init(void)
|
|
{
|
|
settings_add_bool("lookandfeel", "tls_verbose_connect", TRUE);
|
|
|
|
signal_add("tls handshake finished", (SIGNAL_FUNC)tls_handshake_finished);
|
|
}
|
|
|
|
void fe_tls_deinit(void)
|
|
{
|
|
signal_remove("tls handshake finished", (SIGNAL_FUNC)tls_handshake_finished);
|
|
}
|