/src/irssi/src/core/tls.c
Line | Count | Source |
1 | | /* |
2 | | * Copyright (c) 2015 Alexander Færøy <ahf@irssi.org> |
3 | | * |
4 | | * This program is free software; you can redistribute it and/or modify it |
5 | | * under the terms of the GNU General Public License as published by the Free |
6 | | * Software Foundation; either version 2 of the License, or (at your option) |
7 | | * any later version. |
8 | | * |
9 | | * This program is distributed in the hope that it will be useful, but WITHOUT |
10 | | * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
11 | | * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for |
12 | | * more details. |
13 | | * |
14 | | * You should have received a copy of the GNU General Public License along with |
15 | | * this program; if not, write to the Free Software Foundation, Inc., 51 |
16 | | * Franklin Street, Fifth Floor, Boston, MA 02110-1301,USA |
17 | | */ |
18 | | |
19 | | #include "module.h" |
20 | | |
21 | | #include <irssi/src/core/tls.h> |
22 | | |
23 | | TLS_REC *tls_create_rec() |
24 | 0 | { |
25 | 0 | TLS_REC *rec = g_new0(TLS_REC, 1); |
26 | 0 | g_return_val_if_fail(rec != NULL, NULL); |
27 | | |
28 | 0 | return rec; |
29 | 0 | } |
30 | | |
31 | | void tls_rec_free(TLS_REC *tls_rec) |
32 | 0 | { |
33 | 0 | if (tls_rec == NULL) |
34 | 0 | return; |
35 | | |
36 | 0 | g_free_and_null(tls_rec->protocol_version); |
37 | 0 | g_free_and_null(tls_rec->cipher); |
38 | 0 | g_free_and_null(tls_rec->public_key_algorithm); |
39 | 0 | g_free_and_null(tls_rec->public_key_fingerprint); |
40 | 0 | g_free_and_null(tls_rec->public_key_fingerprint_algorithm); |
41 | 0 | g_free_and_null(tls_rec->certificate_fingerprint); |
42 | 0 | g_free_and_null(tls_rec->certificate_fingerprint_algorithm); |
43 | 0 | g_free_and_null(tls_rec->not_after); |
44 | 0 | g_free_and_null(tls_rec->not_before); |
45 | 0 | g_free_and_null(tls_rec->ephemeral_key_algorithm); |
46 | |
|
47 | 0 | if (tls_rec->certs != NULL) { |
48 | 0 | g_slist_foreach(tls_rec->certs, (GFunc)tls_cert_rec_free, NULL); |
49 | 0 | g_slist_free(tls_rec->certs); |
50 | 0 | tls_rec->certs = NULL; |
51 | 0 | } |
52 | |
|
53 | 0 | g_free(tls_rec); |
54 | 0 | } |
55 | | |
56 | | void tls_rec_set_protocol_version(TLS_REC *tls_rec, const char *protocol_version) |
57 | 0 | { |
58 | 0 | g_return_if_fail(tls_rec != NULL); |
59 | | |
60 | 0 | tls_rec->protocol_version = g_strdup(protocol_version); |
61 | 0 | } |
62 | | |
63 | | void tls_rec_set_cipher(TLS_REC *tls_rec, const char *cipher) |
64 | 0 | { |
65 | 0 | g_return_if_fail(tls_rec != NULL); |
66 | | |
67 | 0 | tls_rec->cipher = g_strdup(cipher); |
68 | 0 | } |
69 | | |
70 | | void tls_rec_set_cipher_size(TLS_REC *tls_rec, size_t size) |
71 | 0 | { |
72 | 0 | g_return_if_fail(tls_rec != NULL); |
73 | | |
74 | 0 | tls_rec->cipher_size = size; |
75 | 0 | } |
76 | | |
77 | | void tls_rec_set_public_key_algorithm(TLS_REC *tls_rec, const char *algorithm) |
78 | 0 | { |
79 | 0 | g_return_if_fail(tls_rec != NULL); |
80 | | |
81 | 0 | tls_rec->public_key_algorithm = g_strdup(algorithm); |
82 | 0 | } |
83 | | |
84 | | void tls_rec_set_public_key_fingerprint(TLS_REC *tls_rec, const char *fingerprint) |
85 | 0 | { |
86 | 0 | g_return_if_fail(tls_rec != NULL); |
87 | | |
88 | 0 | tls_rec->public_key_fingerprint = g_strdup(fingerprint); |
89 | 0 | } |
90 | | |
91 | | void tls_rec_set_public_key_fingerprint_algorithm(TLS_REC *tls_rec, const char *algorithm) |
92 | 0 | { |
93 | 0 | g_return_if_fail(tls_rec != NULL); |
94 | | |
95 | 0 | tls_rec->public_key_fingerprint_algorithm = g_strdup(algorithm); |
96 | 0 | } |
97 | | |
98 | | void tls_rec_set_public_key_size(TLS_REC *tls_rec, size_t size) |
99 | 0 | { |
100 | 0 | g_return_if_fail(tls_rec != NULL); |
101 | 0 | tls_rec->public_key_size = size; |
102 | 0 | } |
103 | | |
104 | | void tls_rec_set_certificate_fingerprint(TLS_REC *tls_rec, const char *fingerprint) |
105 | 0 | { |
106 | 0 | g_return_if_fail(tls_rec != NULL); |
107 | | |
108 | 0 | tls_rec->certificate_fingerprint = g_strdup(fingerprint); |
109 | 0 | } |
110 | | |
111 | | void tls_rec_set_certificate_fingerprint_algorithm(TLS_REC *tls_rec, const char *algorithm) |
112 | 0 | { |
113 | 0 | g_return_if_fail(tls_rec != NULL); |
114 | | |
115 | 0 | tls_rec->certificate_fingerprint_algorithm = g_strdup(algorithm); |
116 | 0 | } |
117 | | |
118 | | void tls_rec_set_not_after(TLS_REC *tls_rec, const char *not_after) |
119 | 0 | { |
120 | 0 | g_return_if_fail(tls_rec != NULL); |
121 | 0 | tls_rec->not_after = g_strdup(not_after); |
122 | 0 | } |
123 | | |
124 | | void tls_rec_set_not_before(TLS_REC *tls_rec, const char *not_before) |
125 | 0 | { |
126 | 0 | g_return_if_fail(tls_rec != NULL); |
127 | 0 | tls_rec->not_before = g_strdup(not_before); |
128 | 0 | } |
129 | | |
130 | | void tls_rec_set_ephemeral_key_algorithm(TLS_REC *tls_rec, const char *algorithm) |
131 | 0 | { |
132 | 0 | g_return_if_fail(tls_rec != NULL); |
133 | 0 | tls_rec->ephemeral_key_algorithm = g_strdup(algorithm); |
134 | 0 | } |
135 | | |
136 | | void tls_rec_set_ephemeral_key_size(TLS_REC *tls_rec, size_t size) |
137 | 0 | { |
138 | 0 | g_return_if_fail(tls_rec != NULL); |
139 | 0 | tls_rec->ephemeral_key_size = size; |
140 | 0 | } |
141 | | |
142 | | void tls_rec_append_cert(TLS_REC *tls_rec, TLS_CERT_REC *tls_cert_rec) |
143 | 0 | { |
144 | 0 | g_return_if_fail(tls_rec != NULL); |
145 | 0 | g_return_if_fail(tls_cert_rec != NULL); |
146 | | |
147 | 0 | tls_rec->certs = g_slist_append(tls_rec->certs, tls_cert_rec); |
148 | 0 | } |
149 | | |
150 | | TLS_CERT_REC *tls_cert_create_rec() |
151 | 0 | { |
152 | 0 | TLS_CERT_REC *rec = g_new0(TLS_CERT_REC, 1); |
153 | 0 | g_return_val_if_fail(rec != NULL, NULL); |
154 | | |
155 | 0 | return rec; |
156 | 0 | } |
157 | | |
158 | | void tls_cert_rec_append_subject_entry(TLS_CERT_REC *tls_cert_rec, TLS_CERT_ENTRY_REC *tls_cert_entry_rec) |
159 | 0 | { |
160 | 0 | g_return_if_fail(tls_cert_rec != NULL); |
161 | 0 | g_return_if_fail(tls_cert_entry_rec != NULL); |
162 | | |
163 | 0 | tls_cert_rec->subject = g_slist_append(tls_cert_rec->subject, tls_cert_entry_rec); |
164 | 0 | } |
165 | | |
166 | | void tls_cert_rec_append_issuer_entry(TLS_CERT_REC *tls_cert_rec, TLS_CERT_ENTRY_REC *tls_cert_entry_rec) |
167 | 0 | { |
168 | 0 | g_return_if_fail(tls_cert_rec != NULL); |
169 | 0 | g_return_if_fail(tls_cert_entry_rec != NULL); |
170 | | |
171 | 0 | tls_cert_rec->issuer = g_slist_append(tls_cert_rec->issuer, tls_cert_entry_rec); |
172 | 0 | } |
173 | | |
174 | | void tls_cert_rec_free(TLS_CERT_REC *tls_cert_rec) |
175 | 0 | { |
176 | 0 | if (tls_cert_rec == NULL) |
177 | 0 | return; |
178 | | |
179 | 0 | if (tls_cert_rec->subject != NULL) { |
180 | 0 | g_slist_foreach(tls_cert_rec->subject, (GFunc)tls_cert_entry_rec_free, NULL); |
181 | 0 | g_slist_free(tls_cert_rec->subject); |
182 | 0 | tls_cert_rec->subject = NULL; |
183 | 0 | } |
184 | |
|
185 | 0 | if (tls_cert_rec->issuer != NULL) { |
186 | 0 | g_slist_foreach(tls_cert_rec->issuer, (GFunc)tls_cert_entry_rec_free, NULL); |
187 | 0 | g_slist_free(tls_cert_rec->issuer); |
188 | 0 | tls_cert_rec->issuer = NULL; |
189 | 0 | } |
190 | |
|
191 | 0 | g_free(tls_cert_rec); |
192 | 0 | } |
193 | | |
194 | | TLS_CERT_ENTRY_REC *tls_cert_entry_create_rec(const char *name, const char *value) |
195 | 0 | { |
196 | 0 | TLS_CERT_ENTRY_REC *rec = g_new0(TLS_CERT_ENTRY_REC, 1); |
197 | 0 | g_return_val_if_fail(rec != NULL, NULL); |
198 | | |
199 | 0 | rec->name = g_strdup(name); |
200 | 0 | rec->value = g_strdup(value); |
201 | |
|
202 | 0 | return rec; |
203 | 0 | } |
204 | | |
205 | | void tls_cert_entry_rec_free(TLS_CERT_ENTRY_REC *tls_cert_entry) |
206 | 0 | { |
207 | 0 | if (tls_cert_entry == NULL) |
208 | 0 | return; |
209 | | |
210 | 0 | g_free_and_null(tls_cert_entry->name); |
211 | 0 | g_free_and_null(tls_cert_entry->value); |
212 | |
|
213 | 0 | g_free(tls_cert_entry); |
214 | 0 | } |