/* -*- Mode: C; indent-tabs-mode: t; c-basic-offset: 8; tab-width: 8 -*- */ /* gkr-tool-trust.c: Command line pinned certificates Copyright (C) 2010 Stefan Walter The Gnome Keyring Library is free software; you can redistribute it and/or modify it under the terms of the GNU Library General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. The Gnome Keyring Library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public License for more details. You should have received a copy of the GNU Library General Public License along with the Gnome Library; see the file COPYING.LIB. If not, . Author: Stef Walter */ #include "config.h" #include "gkr-tool.h" #include #include #include "egg/egg-hex.h" #if 0 static gchar **trust_files = NULL; #endif #if 0 struct { const gchar *name; const gchar *purpose; } purpose_names[] = { { "server", GCR_PURPOSE_SERVER_AUTH }, { "client", GCR_PURPOSE_CLIENT_AUTH }, { "code", GCR_PURPOSE_CODE_SIGNING }, { "email", GCR_PURPOSE_EMAIL }, }; enum { MODE_SHOW = 0, MODE_ADD = 1, MODE_REMOVE = 2 }; static gboolean purpose_for_string (const gchar *string, GcrPurpose *purpose) { guint i; g_assert (string); g_assert (purpose); for (i = 0; i < G_N_ELEMENTS (purpose_names); ++i) { if (g_str_equal (purpose_names[i].name, string)) { *purpose = purpose_names[i].purpose; return TRUE; } } return FALSE; } static gboolean trust_for_string (const gchar *string, GcrTrust *trust) { guint i; g_assert (string); g_assert (trust); for (i = 0; i < G_N_ELEMENTS (trust_names); ++i) { if (g_str_equal (trust_names[i].name, string)) { *trust = trust_names[i].trust; return TRUE; } } return FALSE; } static const gchar* purpose_to_string (GcrPurpose purpose) { guint i; for (i = 0; i < G_N_ELEMENTS (purpose_names); ++i) { if (purpose == purpose_names[i].purpose) return purpose_names[i].name; } return NULL; } static int get_pinned_certificate (GcrCertificate *certificate, GcrPurpose purpose) { GError *error = NULL; const gchar *string; GcrTrust trust; trust = gcr_trust_get_certificate_exception (certificate, purpose, NULL, &error); if (error != NULL) { gkr_tool_handle_error (&error, "retrieving trust exception failed"); return 1; } string = purpose_to_string (purpose); if (trust == GCR_TRUST_UNKNOWN && !gkr_tool_mode_quiet) g_print ("%s: no trust exception\n", string); else if (trust == GCR_TRUST_TRUSTED) g_print ("%s: certificate is explicitly trusted\n", string); else if (trust == GCR_TRUST_DISTRUSTED) g_print ("%s: certificate is explicitly distrusted\n", string); return 0; } static int set_certificate_exception (GcrCertificate *certificate, GcrPurpose purpose, GcrTrust trust) { GError *error = NULL; const gchar *string; if (!gcr_trust_set_certificate_exception (certificate, purpose, trust, NULL, &error)) { gkr_tool_handle_error (&error, "setting trust exception failed"); return 1; } if (!gkr_tool_mode_quiet) { string = purpose_to_string (purpose); if (trust == GCR_TRUST_UNKNOWN) g_print ("%s: no trust exception\n", string); else if (trust == GCR_TRUST_TRUSTED) g_print ("%s: certificate is explicitly trusted\n", string); else if (trust == GCR_TRUST_DISTRUSTED) g_print ("%s: certificate is explicitly distrusted\n", string); } return 0; } static gchar *add_trust = NULL; static gchar *remove_trust = NULL; static GOptionEntry trust_entries[] = { GKR_TOOL_BASIC_OPTIONS { "add", 0, 0, G_OPTION_ARG_STRING, &set_trust, "Add certificate trust exception", "purpose" }, { "remove", 0, 0, G_OPTION_ARG_STRING, &set_trust, "Remove certificate trust exception", "purpose" }, { NULL } }; #endif int gkr_tool_trust (int argc, char *argv[]) { g_assert_not_reached (); return 1; #if 0 GcrCertificate *certificate = NULL; const gchar *purpose; GError *error = NULL; GArray *purposes = NULL; GFile *file = NULL; gchar *contents; gsize length; TrustMode mode; int ret = 2; guint i; ret = gkr_tool_parse_options (&argc, &argv, trust_entries); if (ret != 0) return ret; if (argc < 3) { gkr_tool_handle_error (NULL, "specify certificate file followed by one or more purposes"); goto done; } purposes = g_array_new (FALSE, TRUE, sizeof (GcrPurpose)); for (i = 2; i < argc; ++i) { if (!purpose_for_string (argv[i], &purpose)) { gkr_tool_handle_error (NULL, "invalid purpose: %s", argv[i]); goto done; } g_array_append_val (purposes, purpose); } if (set_trust) { if (!trust_for_string (set_trust, &trust)) { gkr_tool_handle_error (NULL, "invalid trust string: %s", set_trust); goto done; } } ret = 1; file = g_file_new_for_commandline_arg (argv[1]); if (!g_file_load_contents (file, NULL, &contents, &length, NULL, &error)) { gkr_tool_handle_error (&error, "couldn't read file: %s", argv[1]); goto done; } certificate = gcr_simple_certificate_new (contents, length); g_free (contents); for (i = 0; i < purposes->len; ++i) { purpose = g_array_index (purposes, GcrPurpose, i); if (set_trust) ret = add_certificate_exception (certificate, purpose, trust); else ret = is_certificate_exception (certificate, purpose); if (ret != 0) break; } done: if (file != NULL) g_object_unref (file); if (purposes != NULL) g_array_free (purposes, TRUE); if (certificate != NULL) g_object_unref (certificate); g_free (set_trust); return ret; #endif }