mirror of
https://github.com/QuasarApp/qca.git
synced 2025-04-26 19:44:32 +00:00
335 lines
8.3 KiB
C++
335 lines
8.3 KiB
C++
/*
|
|
Copyright (C) 2003-2005 Justin Karneges <justin@affinix.com>
|
|
|
|
Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
of this software and associated documentation files (the "Software"), to deal
|
|
in the Software without restriction, including without limitation the rights
|
|
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
copies of the Software, and to permit persons to whom the Software is
|
|
furnished to do so, subject to the following conditions:
|
|
|
|
The above copyright notice and this permission notice shall be included in
|
|
all copies or substantial portions of the Software.
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN
|
|
AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
*/
|
|
|
|
#include <QtCrypto>
|
|
|
|
#include <QCoreApplication>
|
|
#include <QTcpSocket>
|
|
|
|
#ifdef QT_STATICPLUGIN
|
|
#include "import_plugins.h"
|
|
#endif
|
|
|
|
char exampleCA_cert[] =
|
|
"-----BEGIN CERTIFICATE-----\n"
|
|
"MIICSzCCAbSgAwIBAgIBADANBgkqhkiG9w0BAQUFADA4MRMwEQYDVQQDEwpFeGFt\n"
|
|
"cGxlIENBMQswCQYDVQQGEwJVUzEUMBIGA1UEChMLRXhhbXBsZSBPcmcwHhcNMDYw\n"
|
|
"MzE1MDY1ODMyWhcNMDYwNDE1MDY1ODMyWjA4MRMwEQYDVQQDEwpFeGFtcGxlIENB\n"
|
|
"MQswCQYDVQQGEwJVUzEUMBIGA1UEChMLRXhhbXBsZSBPcmcwgZ8wDQYJKoZIhvcN\n"
|
|
"AQEBBQADgY0AMIGJAoGBAL6ULdOxmpeZ+G/ypV12eNO4qnHSVIPTrYPkQuweXqPy\n"
|
|
"atwGFheG+hLVsNIh9GGOS0tCe7a3hBBKN0BJg1ppfk2x39cDx7hefYqjBuZvp/0O\n"
|
|
"8Ja3qlQiJLezITZKLxMBrsibcvcuH8zpfUdys2yaN+YGeqNfjQuoNN3Byl1TwuGJ\n"
|
|
"AgMBAAGjZTBjMB0GA1UdDgQWBBSQKCUCLNM7uKrAt5o7qv/yQm6qEzASBgNVHRMB\n"
|
|
"Af8ECDAGAQEBAgEIMB4GA1UdEQQXMBWBE2V4YW1wbGVAZXhhbXBsZS5jb20wDgYD\n"
|
|
"VR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBBQUAA4GBAAh+SIeT1Ao5qInw8oMSoTdO\n"
|
|
"lQ6h67ec/Jk5KmK4OoskuimmHI0Sp0C5kOCLehXbsVWW8pXsNC2fv0d2HkdaSUcX\n"
|
|
"hwLzqgyZXd4mupIYlaOTZhuHDwWPCAOZS4LVsi2tndTRHKCP12441JjNKhmZRhkR\n"
|
|
"u5zzD60nWgM9dKTaxuZM\n"
|
|
"-----END CERTIFICATE-----\n";
|
|
|
|
void showCertInfo(const QCA::Certificate &cert)
|
|
{
|
|
printf("-- Cert --\n");
|
|
printf(" CN: %s\n", qPrintable(cert.commonName()));
|
|
printf(" Valid from: %s, until %s\n",
|
|
qPrintable(cert.notValidBefore().toString()),
|
|
qPrintable(cert.notValidAfter().toString()));
|
|
printf(" PEM:\n%s\n", qPrintable(cert.toPEM()));
|
|
}
|
|
|
|
static QString validityToString(QCA::Validity v)
|
|
{
|
|
QString s;
|
|
switch(v)
|
|
{
|
|
case QCA::ValidityGood:
|
|
s = "Validated";
|
|
break;
|
|
case QCA::ErrorRejected:
|
|
s = "Root CA is marked to reject the specified purpose";
|
|
break;
|
|
case QCA::ErrorUntrusted:
|
|
s = "Certificate not trusted for the required purpose";
|
|
break;
|
|
case QCA::ErrorSignatureFailed:
|
|
s = "Invalid signature";
|
|
break;
|
|
case QCA::ErrorInvalidCA:
|
|
s = "Invalid CA certificate";
|
|
break;
|
|
case QCA::ErrorInvalidPurpose:
|
|
s = "Invalid certificate purpose";
|
|
break;
|
|
case QCA::ErrorSelfSigned:
|
|
s = "Certificate is self-signed";
|
|
break;
|
|
case QCA::ErrorRevoked:
|
|
s = "Certificate has been revoked";
|
|
break;
|
|
case QCA::ErrorPathLengthExceeded:
|
|
s = "Maximum certificate chain length exceeded";
|
|
break;
|
|
case QCA::ErrorExpired:
|
|
s = "Certificate has expired";
|
|
break;
|
|
case QCA::ErrorExpiredCA:
|
|
s = "CA has expired";
|
|
break;
|
|
case QCA::ErrorValidityUnknown:
|
|
default:
|
|
s = "General certificate validation error";
|
|
break;
|
|
}
|
|
return s;
|
|
}
|
|
|
|
class SecureTest : public QObject
|
|
{
|
|
Q_OBJECT
|
|
public:
|
|
SecureTest()
|
|
{
|
|
sock_done = false;
|
|
ssl_done = false;
|
|
|
|
sock = new QTcpSocket;
|
|
connect(sock, &QTcpSocket::connected, this, &SecureTest::sock_connected);
|
|
connect(sock, &QTcpSocket::readyRead, this, &SecureTest::sock_readyRead);
|
|
connect(sock, QOverload<QAbstractSocket::SocketError>::of(&QTcpSocket::error), this, &SecureTest::sock_error);
|
|
|
|
ssl = new QCA::TLS;
|
|
connect(ssl, &QCA::TLS::certificateRequested, this, &SecureTest::ssl_certificateRequested);
|
|
connect(ssl, &QCA::TLS::handshaken, this, &SecureTest::ssl_handshaken);
|
|
connect(ssl, &QCA::TLS::readyRead, this, &SecureTest::ssl_readyRead);
|
|
connect(ssl, &QCA::TLS::readyReadOutgoing, this, &SecureTest::ssl_readyReadOutgoing);
|
|
connect(ssl, &QCA::TLS::closed, this, &SecureTest::ssl_closed);
|
|
connect(ssl, &QCA::TLS::error, this, &SecureTest::ssl_error);
|
|
}
|
|
|
|
~SecureTest()
|
|
{
|
|
delete ssl;
|
|
delete sock;
|
|
}
|
|
|
|
void start(const QString &_host)
|
|
{
|
|
int n = _host.indexOf(':');
|
|
int port;
|
|
if(n != -1)
|
|
{
|
|
host = _host.mid(0, n);
|
|
port = _host.midRef(n+1).toInt();
|
|
}
|
|
else
|
|
{
|
|
host = _host;
|
|
port = 443;
|
|
}
|
|
|
|
printf("Trying %s:%d...\n", qPrintable(host), port);
|
|
sock->connectToHost(host, port);
|
|
}
|
|
|
|
Q_SIGNALS:
|
|
void quit();
|
|
|
|
private Q_SLOTS:
|
|
void sock_connected()
|
|
{
|
|
// We just do this to help doxygen...
|
|
QCA::TLS *ssl = SecureTest::ssl;
|
|
|
|
printf("Connected, starting TLS handshake...\n");
|
|
|
|
QCA::CertificateCollection rootCerts = QCA::systemStore();
|
|
|
|
// We add this one to show how, and to make it work with
|
|
// the server example.
|
|
rootCerts.addCertificate(QCA::Certificate::fromPEM(exampleCA_cert));
|
|
|
|
if(!QCA::haveSystemStore())
|
|
printf("Warning: no root certs\n");
|
|
else
|
|
ssl->setTrustedCertificates(rootCerts);
|
|
|
|
ssl->startClient(host);
|
|
}
|
|
|
|
void sock_readyRead()
|
|
{
|
|
// We just do this to help doxygen...
|
|
QCA::TLS *ssl = SecureTest::ssl;
|
|
|
|
ssl->writeIncoming(sock->readAll());
|
|
}
|
|
|
|
void sock_connectionClosed()
|
|
{
|
|
printf("\nConnection closed.\n");
|
|
sock_done = true;
|
|
|
|
if(ssl_done && sock_done)
|
|
emit quit();
|
|
}
|
|
|
|
void sock_error(QAbstractSocket::SocketError x)
|
|
{
|
|
if(x == QAbstractSocket::RemoteHostClosedError)
|
|
{
|
|
sock_connectionClosed();
|
|
return;
|
|
}
|
|
|
|
printf("\nSocket error.\n");
|
|
emit quit();
|
|
}
|
|
|
|
void ssl_handshaken()
|
|
{
|
|
// We just do this to help doxygen...
|
|
QCA::TLS *ssl = SecureTest::ssl;
|
|
|
|
QCA::TLS::IdentityResult r = ssl->peerIdentityResult();
|
|
|
|
printf("Successful SSL handshake using %s (%i of %i bits)\n",
|
|
qPrintable(ssl->cipherSuite()),
|
|
ssl->cipherBits(),
|
|
ssl->cipherMaxBits() );
|
|
if(r != QCA::TLS::NoCertificate)
|
|
{
|
|
cert = ssl->peerCertificateChain().primary();
|
|
if(!cert.isNull())
|
|
showCertInfo(cert);
|
|
}
|
|
|
|
QString str = "Peer Identity: ";
|
|
if(r == QCA::TLS::Valid)
|
|
str += "Valid";
|
|
else if(r == QCA::TLS::HostMismatch)
|
|
str += "Error: Wrong certificate";
|
|
else if(r == QCA::TLS::InvalidCertificate)
|
|
str += "Error: Invalid certificate.\n -> Reason: " +
|
|
validityToString(ssl->peerCertificateValidity());
|
|
else
|
|
str += "Error: No certificate";
|
|
printf("%s\n", qPrintable(str));
|
|
|
|
ssl->continueAfterStep();
|
|
|
|
printf("Let's try a GET request now.\n");
|
|
QString req = "GET / HTTP/1.0\nHost: " + host + "\n\n";
|
|
ssl->write(req.toLatin1());
|
|
}
|
|
|
|
void ssl_certificateRequested()
|
|
{
|
|
// We just do this to help doxygen...
|
|
QCA::TLS *ssl = SecureTest::ssl;
|
|
|
|
printf("Server requested client certificate.\n");
|
|
QList<QCA::CertificateInfoOrdered> issuerList = ssl->issuerList();
|
|
if(!issuerList.isEmpty())
|
|
{
|
|
printf("Allowed issuers:\n");
|
|
foreach(QCA::CertificateInfoOrdered i, issuerList)
|
|
printf(" %s\n", qPrintable(i.toString()));
|
|
}
|
|
|
|
ssl->continueAfterStep();
|
|
}
|
|
|
|
void ssl_readyRead()
|
|
{
|
|
// We just do this to help doxygen...
|
|
QCA::TLS *ssl = SecureTest::ssl;
|
|
|
|
QByteArray a = ssl->read();
|
|
printf("%s", a.data());
|
|
}
|
|
|
|
void ssl_readyReadOutgoing()
|
|
{
|
|
// We just do this to help doxygen...
|
|
QCA::TLS *ssl = SecureTest::ssl;
|
|
|
|
sock->write(ssl->readOutgoing());
|
|
}
|
|
|
|
void ssl_closed()
|
|
{
|
|
printf("SSL session closed.\n");
|
|
ssl_done = true;
|
|
|
|
if(ssl_done && sock_done)
|
|
emit quit();
|
|
}
|
|
|
|
void ssl_error()
|
|
{
|
|
// We just do this to help doxygen...
|
|
QCA::TLS *ssl = SecureTest::ssl;
|
|
|
|
int x = ssl->errorCode();
|
|
if(x == QCA::TLS::ErrorHandshake)
|
|
{
|
|
printf("SSL Handshake Error!\n");
|
|
emit quit();
|
|
}
|
|
else
|
|
{
|
|
printf("SSL Error!\n");
|
|
emit quit();
|
|
}
|
|
}
|
|
|
|
private:
|
|
QString host;
|
|
QTcpSocket *sock;
|
|
QCA::TLS *ssl;
|
|
QCA::Certificate cert;
|
|
bool sock_done, ssl_done;
|
|
};
|
|
|
|
#include "ssltest.moc"
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
QCA::Initializer init;
|
|
|
|
QCoreApplication app(argc, argv);
|
|
QString host = argc > 1 ? argv[1] : "andbit.net";
|
|
|
|
if(!QCA::isSupported("tls"))
|
|
{
|
|
printf("TLS not supported!\n");
|
|
return 1;
|
|
}
|
|
|
|
SecureTest *s = new SecureTest;
|
|
QObject::connect(s, &SecureTest::quit, &app, &QCoreApplication::quit);
|
|
s->start(host);
|
|
app.exec();
|
|
delete s;
|
|
|
|
return 0;
|
|
}
|