1239 lines
32 KiB
C++
1239 lines
32 KiB
C++
//
|
|
// ssl/impl/context.ipp
|
|
// ~~~~~~~~~~~~~~~~~~~~
|
|
//
|
|
// Copyright (c) 2005 Voipster / Indrek dot Juhani at voipster dot com
|
|
// Copyright (c) 2005-2021 Christopher M. Kohlhoff (chris at kohlhoff dot com)
|
|
//
|
|
// Distributed under the Boost Software License, Version 1.0. (See accompanying
|
|
// file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt)
|
|
//
|
|
|
|
#ifndef ASIO_SSL_IMPL_CONTEXT_IPP
|
|
#define ASIO_SSL_IMPL_CONTEXT_IPP
|
|
|
|
#if defined(_MSC_VER) && (_MSC_VER >= 1200)
|
|
# pragma once
|
|
#endif // defined(_MSC_VER) && (_MSC_VER >= 1200)
|
|
|
|
#include "asio/detail/config.hpp"
|
|
|
|
#include <cstring>
|
|
#include "asio/detail/throw_error.hpp"
|
|
#include "asio/error.hpp"
|
|
#include "asio/ssl/context.hpp"
|
|
#include "asio/ssl/error.hpp"
|
|
|
|
#include "asio/detail/push_options.hpp"
|
|
|
|
namespace asio {
|
|
namespace ssl {
|
|
|
|
struct context::bio_cleanup
|
|
{
|
|
BIO* p;
|
|
~bio_cleanup() { if (p) ::BIO_free(p); }
|
|
};
|
|
|
|
struct context::x509_cleanup
|
|
{
|
|
X509* p;
|
|
~x509_cleanup() { if (p) ::X509_free(p); }
|
|
};
|
|
|
|
struct context::evp_pkey_cleanup
|
|
{
|
|
EVP_PKEY* p;
|
|
~evp_pkey_cleanup() { if (p) ::EVP_PKEY_free(p); }
|
|
};
|
|
|
|
struct context::rsa_cleanup
|
|
{
|
|
RSA* p;
|
|
~rsa_cleanup() { if (p) ::RSA_free(p); }
|
|
};
|
|
|
|
struct context::dh_cleanup
|
|
{
|
|
DH* p;
|
|
~dh_cleanup() { if (p) ::DH_free(p); }
|
|
};
|
|
|
|
context::context(context::method m)
|
|
: handle_(0)
|
|
{
|
|
::ERR_clear_error();
|
|
|
|
switch (m)
|
|
{
|
|
// SSL v2.
|
|
#if (OPENSSL_VERSION_NUMBER >= 0x10100000L) || defined(OPENSSL_NO_SSL2)
|
|
case context::sslv2:
|
|
case context::sslv2_client:
|
|
case context::sslv2_server:
|
|
asio::detail::throw_error(
|
|
asio::error::invalid_argument, "context");
|
|
break;
|
|
#else // (OPENSSL_VERSION_NUMBER >= 0x10100000L) || defined(OPENSSL_NO_SSL2)
|
|
case context::sslv2:
|
|
handle_ = ::SSL_CTX_new(::SSLv2_method());
|
|
break;
|
|
case context::sslv2_client:
|
|
handle_ = ::SSL_CTX_new(::SSLv2_client_method());
|
|
break;
|
|
case context::sslv2_server:
|
|
handle_ = ::SSL_CTX_new(::SSLv2_server_method());
|
|
break;
|
|
#endif // (OPENSSL_VERSION_NUMBER >= 0x10100000L) || defined(OPENSSL_NO_SSL2)
|
|
|
|
// SSL v3.
|
|
#if (OPENSSL_VERSION_NUMBER >= 0x10100000L) && !defined(LIBRESSL_VERSION_NUMBER)
|
|
case context::sslv3:
|
|
handle_ = ::SSL_CTX_new(::TLS_method());
|
|
if (handle_)
|
|
{
|
|
SSL_CTX_set_min_proto_version(handle_, SSL3_VERSION);
|
|
SSL_CTX_set_max_proto_version(handle_, SSL3_VERSION);
|
|
}
|
|
break;
|
|
case context::sslv3_client:
|
|
handle_ = ::SSL_CTX_new(::TLS_client_method());
|
|
if (handle_)
|
|
{
|
|
SSL_CTX_set_min_proto_version(handle_, SSL3_VERSION);
|
|
SSL_CTX_set_max_proto_version(handle_, SSL3_VERSION);
|
|
}
|
|
break;
|
|
case context::sslv3_server:
|
|
handle_ = ::SSL_CTX_new(::TLS_server_method());
|
|
if (handle_)
|
|
{
|
|
SSL_CTX_set_min_proto_version(handle_, SSL3_VERSION);
|
|
SSL_CTX_set_max_proto_version(handle_, SSL3_VERSION);
|
|
}
|
|
break;
|
|
#elif defined(OPENSSL_NO_SSL3)
|
|
case context::sslv3:
|
|
case context::sslv3_client:
|
|
case context::sslv3_server:
|
|
asio::detail::throw_error(
|
|
asio::error::invalid_argument, "context");
|
|
break;
|
|
#else // defined(OPENSSL_NO_SSL3)
|
|
case context::sslv3:
|
|
handle_ = ::SSL_CTX_new(::SSLv3_method());
|
|
break;
|
|
case context::sslv3_client:
|
|
handle_ = ::SSL_CTX_new(::SSLv3_client_method());
|
|
break;
|
|
case context::sslv3_server:
|
|
handle_ = ::SSL_CTX_new(::SSLv3_server_method());
|
|
break;
|
|
#endif // defined(OPENSSL_NO_SSL3)
|
|
|
|
// TLS v1.0.
|
|
#if (OPENSSL_VERSION_NUMBER >= 0x10100000L) && !defined(LIBRESSL_VERSION_NUMBER)
|
|
case context::tlsv1:
|
|
handle_ = ::SSL_CTX_new(::TLS_method());
|
|
if (handle_)
|
|
{
|
|
SSL_CTX_set_min_proto_version(handle_, TLS1_VERSION);
|
|
SSL_CTX_set_max_proto_version(handle_, TLS1_VERSION);
|
|
}
|
|
break;
|
|
case context::tlsv1_client:
|
|
handle_ = ::SSL_CTX_new(::TLS_client_method());
|
|
if (handle_)
|
|
{
|
|
SSL_CTX_set_min_proto_version(handle_, TLS1_VERSION);
|
|
SSL_CTX_set_max_proto_version(handle_, TLS1_VERSION);
|
|
}
|
|
break;
|
|
case context::tlsv1_server:
|
|
handle_ = ::SSL_CTX_new(::TLS_server_method());
|
|
if (handle_)
|
|
{
|
|
SSL_CTX_set_min_proto_version(handle_, TLS1_VERSION);
|
|
SSL_CTX_set_max_proto_version(handle_, TLS1_VERSION);
|
|
}
|
|
break;
|
|
#elif defined(SSL_TXT_TLSV1)
|
|
case context::tlsv1:
|
|
handle_ = ::SSL_CTX_new(::TLSv1_method());
|
|
break;
|
|
case context::tlsv1_client:
|
|
handle_ = ::SSL_CTX_new(::TLSv1_client_method());
|
|
break;
|
|
case context::tlsv1_server:
|
|
handle_ = ::SSL_CTX_new(::TLSv1_server_method());
|
|
break;
|
|
#else // defined(SSL_TXT_TLSV1)
|
|
case context::tlsv1:
|
|
case context::tlsv1_client:
|
|
case context::tlsv1_server:
|
|
asio::detail::throw_error(
|
|
asio::error::invalid_argument, "context");
|
|
break;
|
|
#endif // defined(SSL_TXT_TLSV1)
|
|
|
|
// TLS v1.1.
|
|
#if (OPENSSL_VERSION_NUMBER >= 0x10100000L) && !defined(LIBRESSL_VERSION_NUMBER)
|
|
case context::tlsv11:
|
|
handle_ = ::SSL_CTX_new(::TLS_method());
|
|
if (handle_)
|
|
{
|
|
SSL_CTX_set_min_proto_version(handle_, TLS1_1_VERSION);
|
|
SSL_CTX_set_max_proto_version(handle_, TLS1_1_VERSION);
|
|
}
|
|
break;
|
|
case context::tlsv11_client:
|
|
handle_ = ::SSL_CTX_new(::TLS_client_method());
|
|
if (handle_)
|
|
{
|
|
SSL_CTX_set_min_proto_version(handle_, TLS1_1_VERSION);
|
|
SSL_CTX_set_max_proto_version(handle_, TLS1_1_VERSION);
|
|
}
|
|
break;
|
|
case context::tlsv11_server:
|
|
handle_ = ::SSL_CTX_new(::TLS_server_method());
|
|
if (handle_)
|
|
{
|
|
SSL_CTX_set_min_proto_version(handle_, TLS1_1_VERSION);
|
|
SSL_CTX_set_max_proto_version(handle_, TLS1_1_VERSION);
|
|
}
|
|
break;
|
|
#elif defined(SSL_TXT_TLSV1_1)
|
|
case context::tlsv11:
|
|
handle_ = ::SSL_CTX_new(::TLSv1_1_method());
|
|
break;
|
|
case context::tlsv11_client:
|
|
handle_ = ::SSL_CTX_new(::TLSv1_1_client_method());
|
|
break;
|
|
case context::tlsv11_server:
|
|
handle_ = ::SSL_CTX_new(::TLSv1_1_server_method());
|
|
break;
|
|
#else // defined(SSL_TXT_TLSV1_1)
|
|
case context::tlsv11:
|
|
case context::tlsv11_client:
|
|
case context::tlsv11_server:
|
|
asio::detail::throw_error(
|
|
asio::error::invalid_argument, "context");
|
|
break;
|
|
#endif // defined(SSL_TXT_TLSV1_1)
|
|
|
|
// TLS v1.2.
|
|
#if (OPENSSL_VERSION_NUMBER >= 0x10100000L) && !defined(LIBRESSL_VERSION_NUMBER)
|
|
case context::tlsv12:
|
|
handle_ = ::SSL_CTX_new(::TLS_method());
|
|
if (handle_)
|
|
{
|
|
SSL_CTX_set_min_proto_version(handle_, TLS1_2_VERSION);
|
|
SSL_CTX_set_max_proto_version(handle_, TLS1_2_VERSION);
|
|
}
|
|
break;
|
|
case context::tlsv12_client:
|
|
handle_ = ::SSL_CTX_new(::TLS_client_method());
|
|
if (handle_)
|
|
{
|
|
SSL_CTX_set_min_proto_version(handle_, TLS1_2_VERSION);
|
|
SSL_CTX_set_max_proto_version(handle_, TLS1_2_VERSION);
|
|
}
|
|
break;
|
|
case context::tlsv12_server:
|
|
handle_ = ::SSL_CTX_new(::TLS_server_method());
|
|
if (handle_)
|
|
{
|
|
SSL_CTX_set_min_proto_version(handle_, TLS1_2_VERSION);
|
|
SSL_CTX_set_max_proto_version(handle_, TLS1_2_VERSION);
|
|
}
|
|
break;
|
|
#elif defined(SSL_TXT_TLSV1_2)
|
|
case context::tlsv12:
|
|
handle_ = ::SSL_CTX_new(::TLSv1_2_method());
|
|
break;
|
|
case context::tlsv12_client:
|
|
handle_ = ::SSL_CTX_new(::TLSv1_2_client_method());
|
|
break;
|
|
case context::tlsv12_server:
|
|
handle_ = ::SSL_CTX_new(::TLSv1_2_server_method());
|
|
break;
|
|
#else // defined(SSL_TXT_TLSV1_2)
|
|
case context::tlsv12:
|
|
case context::tlsv12_client:
|
|
case context::tlsv12_server:
|
|
asio::detail::throw_error(
|
|
asio::error::invalid_argument, "context");
|
|
break;
|
|
#endif // defined(SSL_TXT_TLSV1_2)
|
|
|
|
// TLS v1.3.
|
|
#if (OPENSSL_VERSION_NUMBER >= 0x10101000L) \
|
|
&& !defined(LIBRESSL_VERSION_NUMBER)
|
|
case context::tlsv13:
|
|
handle_ = ::SSL_CTX_new(::TLS_method());
|
|
if (handle_)
|
|
{
|
|
SSL_CTX_set_min_proto_version(handle_, TLS1_3_VERSION);
|
|
SSL_CTX_set_max_proto_version(handle_, TLS1_3_VERSION);
|
|
}
|
|
break;
|
|
case context::tlsv13_client:
|
|
handle_ = ::SSL_CTX_new(::TLS_client_method());
|
|
if (handle_)
|
|
{
|
|
SSL_CTX_set_min_proto_version(handle_, TLS1_3_VERSION);
|
|
SSL_CTX_set_max_proto_version(handle_, TLS1_3_VERSION);
|
|
}
|
|
break;
|
|
case context::tlsv13_server:
|
|
handle_ = ::SSL_CTX_new(::TLS_server_method());
|
|
if (handle_)
|
|
{
|
|
SSL_CTX_set_min_proto_version(handle_, TLS1_3_VERSION);
|
|
SSL_CTX_set_max_proto_version(handle_, TLS1_3_VERSION);
|
|
}
|
|
break;
|
|
#else // (OPENSSL_VERSION_NUMBER >= 0x10101000L)
|
|
// && !defined(LIBRESSL_VERSION_NUMBER)
|
|
case context::tlsv13:
|
|
case context::tlsv13_client:
|
|
case context::tlsv13_server:
|
|
asio::detail::throw_error(
|
|
asio::error::invalid_argument, "context");
|
|
break;
|
|
#endif // (OPENSSL_VERSION_NUMBER >= 0x10101000L)
|
|
// && !defined(LIBRESSL_VERSION_NUMBER)
|
|
|
|
// Any supported SSL/TLS version.
|
|
case context::sslv23:
|
|
handle_ = ::SSL_CTX_new(::SSLv23_method());
|
|
break;
|
|
case context::sslv23_client:
|
|
handle_ = ::SSL_CTX_new(::SSLv23_client_method());
|
|
break;
|
|
case context::sslv23_server:
|
|
handle_ = ::SSL_CTX_new(::SSLv23_server_method());
|
|
break;
|
|
|
|
// Any supported TLS version.
|
|
#if (OPENSSL_VERSION_NUMBER >= 0x10100000L) && !defined(LIBRESSL_VERSION_NUMBER)
|
|
case context::tls:
|
|
handle_ = ::SSL_CTX_new(::TLS_method());
|
|
if (handle_)
|
|
SSL_CTX_set_min_proto_version(handle_, TLS1_VERSION);
|
|
break;
|
|
case context::tls_client:
|
|
handle_ = ::SSL_CTX_new(::TLS_client_method());
|
|
if (handle_)
|
|
SSL_CTX_set_min_proto_version(handle_, TLS1_VERSION);
|
|
break;
|
|
case context::tls_server:
|
|
handle_ = ::SSL_CTX_new(::TLS_server_method());
|
|
if (handle_)
|
|
SSL_CTX_set_min_proto_version(handle_, TLS1_VERSION);
|
|
break;
|
|
#else // (OPENSSL_VERSION_NUMBER >= 0x10100000L)
|
|
case context::tls:
|
|
handle_ = ::SSL_CTX_new(::SSLv23_method());
|
|
if (handle_)
|
|
SSL_CTX_set_options(handle_, SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3);
|
|
break;
|
|
case context::tls_client:
|
|
handle_ = ::SSL_CTX_new(::SSLv23_client_method());
|
|
if (handle_)
|
|
SSL_CTX_set_options(handle_, SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3);
|
|
break;
|
|
case context::tls_server:
|
|
handle_ = ::SSL_CTX_new(::SSLv23_server_method());
|
|
if (handle_)
|
|
SSL_CTX_set_options(handle_, SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3);
|
|
break;
|
|
#endif // (OPENSSL_VERSION_NUMBER >= 0x10100000L)
|
|
|
|
default:
|
|
handle_ = ::SSL_CTX_new(0);
|
|
break;
|
|
}
|
|
|
|
if (handle_ == 0)
|
|
{
|
|
asio::error_code ec(
|
|
static_cast<int>(::ERR_get_error()),
|
|
asio::error::get_ssl_category());
|
|
asio::detail::throw_error(ec, "context");
|
|
}
|
|
|
|
set_options(no_compression);
|
|
}
|
|
|
|
context::context(context::native_handle_type native_handle)
|
|
: handle_(native_handle)
|
|
{
|
|
if (!handle_)
|
|
{
|
|
asio::detail::throw_error(
|
|
asio::error::invalid_argument, "context");
|
|
}
|
|
}
|
|
|
|
#if defined(ASIO_HAS_MOVE) || defined(GENERATING_DOCUMENTATION)
|
|
context::context(context&& other)
|
|
{
|
|
handle_ = other.handle_;
|
|
other.handle_ = 0;
|
|
}
|
|
|
|
context& context::operator=(context&& other)
|
|
{
|
|
context tmp(ASIO_MOVE_CAST(context)(*this));
|
|
handle_ = other.handle_;
|
|
other.handle_ = 0;
|
|
return *this;
|
|
}
|
|
#endif // defined(ASIO_HAS_MOVE) || defined(GENERATING_DOCUMENTATION)
|
|
|
|
context::~context()
|
|
{
|
|
if (handle_)
|
|
{
|
|
#if ((OPENSSL_VERSION_NUMBER >= 0x10100000L) \
|
|
&& !defined(LIBRESSL_VERSION_NUMBER)) \
|
|
|| defined(ASIO_USE_WOLFSSL)
|
|
void* cb_userdata = ::SSL_CTX_get_default_passwd_cb_userdata(handle_);
|
|
#else // (OPENSSL_VERSION_NUMBER >= 0x10100000L)
|
|
void* cb_userdata = handle_->default_passwd_callback_userdata;
|
|
#endif // (OPENSSL_VERSION_NUMBER >= 0x10100000L)
|
|
if (cb_userdata)
|
|
{
|
|
detail::password_callback_base* callback =
|
|
static_cast<detail::password_callback_base*>(
|
|
cb_userdata);
|
|
delete callback;
|
|
#if ((OPENSSL_VERSION_NUMBER >= 0x10100000L) \
|
|
&& !defined(LIBRESSL_VERSION_NUMBER)) \
|
|
|| defined(ASIO_USE_WOLFSSL)
|
|
::SSL_CTX_set_default_passwd_cb_userdata(handle_, 0);
|
|
#else // (OPENSSL_VERSION_NUMBER >= 0x10100000L)
|
|
handle_->default_passwd_callback_userdata = 0;
|
|
#endif // (OPENSSL_VERSION_NUMBER >= 0x10100000L)
|
|
}
|
|
|
|
if (SSL_CTX_get_app_data(handle_))
|
|
{
|
|
detail::verify_callback_base* callback =
|
|
static_cast<detail::verify_callback_base*>(
|
|
SSL_CTX_get_app_data(handle_));
|
|
delete callback;
|
|
SSL_CTX_set_app_data(handle_, 0);
|
|
}
|
|
|
|
::SSL_CTX_free(handle_);
|
|
}
|
|
}
|
|
|
|
context::native_handle_type context::native_handle()
|
|
{
|
|
return handle_;
|
|
}
|
|
|
|
void context::clear_options(context::options o)
|
|
{
|
|
asio::error_code ec;
|
|
clear_options(o, ec);
|
|
asio::detail::throw_error(ec, "clear_options");
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::clear_options(
|
|
context::options o, asio::error_code& ec)
|
|
{
|
|
#if (OPENSSL_VERSION_NUMBER >= 0x009080DFL) \
|
|
&& (OPENSSL_VERSION_NUMBER != 0x00909000L)
|
|
# if !defined(SSL_OP_NO_COMPRESSION)
|
|
if ((o & context::no_compression) != 0)
|
|
{
|
|
# if (OPENSSL_VERSION_NUMBER >= 0x00908000L)
|
|
handle_->comp_methods = SSL_COMP_get_compression_methods();
|
|
# endif // (OPENSSL_VERSION_NUMBER >= 0x00908000L)
|
|
o ^= context::no_compression;
|
|
}
|
|
# endif // !defined(SSL_OP_NO_COMPRESSION)
|
|
|
|
::SSL_CTX_clear_options(handle_, o);
|
|
|
|
ec = asio::error_code();
|
|
#else // (OPENSSL_VERSION_NUMBER >= 0x009080DFL)
|
|
// && (OPENSSL_VERSION_NUMBER != 0x00909000L)
|
|
(void)o;
|
|
ec = asio::error::operation_not_supported;
|
|
#endif // (OPENSSL_VERSION_NUMBER >= 0x009080DFL)
|
|
// && (OPENSSL_VERSION_NUMBER != 0x00909000L)
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
void context::set_options(context::options o)
|
|
{
|
|
asio::error_code ec;
|
|
set_options(o, ec);
|
|
asio::detail::throw_error(ec, "set_options");
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::set_options(
|
|
context::options o, asio::error_code& ec)
|
|
{
|
|
#if !defined(SSL_OP_NO_COMPRESSION)
|
|
if ((o & context::no_compression) != 0)
|
|
{
|
|
#if (OPENSSL_VERSION_NUMBER >= 0x00908000L)
|
|
handle_->comp_methods =
|
|
asio::ssl::detail::openssl_init<>::get_null_compression_methods();
|
|
#endif // (OPENSSL_VERSION_NUMBER >= 0x00908000L)
|
|
o ^= context::no_compression;
|
|
}
|
|
#endif // !defined(SSL_OP_NO_COMPRESSION)
|
|
|
|
::SSL_CTX_set_options(handle_, o);
|
|
|
|
ec = asio::error_code();
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
void context::set_verify_mode(verify_mode v)
|
|
{
|
|
asio::error_code ec;
|
|
set_verify_mode(v, ec);
|
|
asio::detail::throw_error(ec, "set_verify_mode");
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::set_verify_mode(
|
|
verify_mode v, asio::error_code& ec)
|
|
{
|
|
::SSL_CTX_set_verify(handle_, v, ::SSL_CTX_get_verify_callback(handle_));
|
|
|
|
ec = asio::error_code();
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
void context::set_verify_depth(int depth)
|
|
{
|
|
asio::error_code ec;
|
|
set_verify_depth(depth, ec);
|
|
asio::detail::throw_error(ec, "set_verify_depth");
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::set_verify_depth(
|
|
int depth, asio::error_code& ec)
|
|
{
|
|
::SSL_CTX_set_verify_depth(handle_, depth);
|
|
|
|
ec = asio::error_code();
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
void context::load_verify_file(const std::string& filename)
|
|
{
|
|
asio::error_code ec;
|
|
load_verify_file(filename, ec);
|
|
asio::detail::throw_error(ec, "load_verify_file");
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::load_verify_file(
|
|
const std::string& filename, asio::error_code& ec)
|
|
{
|
|
::ERR_clear_error();
|
|
|
|
if (::SSL_CTX_load_verify_locations(handle_, filename.c_str(), 0) != 1)
|
|
{
|
|
ec = asio::error_code(
|
|
static_cast<int>(::ERR_get_error()),
|
|
asio::error::get_ssl_category());
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
ec = asio::error_code();
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
void context::add_certificate_authority(const const_buffer& ca)
|
|
{
|
|
asio::error_code ec;
|
|
add_certificate_authority(ca, ec);
|
|
asio::detail::throw_error(ec, "add_certificate_authority");
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::add_certificate_authority(
|
|
const const_buffer& ca, asio::error_code& ec)
|
|
{
|
|
::ERR_clear_error();
|
|
|
|
bio_cleanup bio = { make_buffer_bio(ca) };
|
|
if (bio.p)
|
|
{
|
|
if (X509_STORE* store = ::SSL_CTX_get_cert_store(handle_))
|
|
{
|
|
for (bool added = false;; added = true)
|
|
{
|
|
x509_cleanup cert = { ::PEM_read_bio_X509(bio.p, 0, 0, 0) };
|
|
if (!cert.p)
|
|
{
|
|
unsigned long err = ::ERR_get_error();
|
|
if (added && ERR_GET_LIB(err) == ERR_LIB_PEM
|
|
&& ERR_GET_REASON(err) == PEM_R_NO_START_LINE)
|
|
break;
|
|
|
|
ec = asio::error_code(
|
|
static_cast<int>(err),
|
|
asio::error::get_ssl_category());
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
if (::X509_STORE_add_cert(store, cert.p) != 1)
|
|
{
|
|
ec = asio::error_code(
|
|
static_cast<int>(::ERR_get_error()),
|
|
asio::error::get_ssl_category());
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
ec = asio::error_code();
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
void context::set_default_verify_paths()
|
|
{
|
|
asio::error_code ec;
|
|
set_default_verify_paths(ec);
|
|
asio::detail::throw_error(ec, "set_default_verify_paths");
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::set_default_verify_paths(
|
|
asio::error_code& ec)
|
|
{
|
|
::ERR_clear_error();
|
|
|
|
if (::SSL_CTX_set_default_verify_paths(handle_) != 1)
|
|
{
|
|
ec = asio::error_code(
|
|
static_cast<int>(::ERR_get_error()),
|
|
asio::error::get_ssl_category());
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
ec = asio::error_code();
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
void context::add_verify_path(const std::string& path)
|
|
{
|
|
asio::error_code ec;
|
|
add_verify_path(path, ec);
|
|
asio::detail::throw_error(ec, "add_verify_path");
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::add_verify_path(
|
|
const std::string& path, asio::error_code& ec)
|
|
{
|
|
::ERR_clear_error();
|
|
|
|
if (::SSL_CTX_load_verify_locations(handle_, 0, path.c_str()) != 1)
|
|
{
|
|
ec = asio::error_code(
|
|
static_cast<int>(::ERR_get_error()),
|
|
asio::error::get_ssl_category());
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
ec = asio::error_code();
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
void context::use_certificate(
|
|
const const_buffer& certificate, file_format format)
|
|
{
|
|
asio::error_code ec;
|
|
use_certificate(certificate, format, ec);
|
|
asio::detail::throw_error(ec, "use_certificate");
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::use_certificate(
|
|
const const_buffer& certificate, file_format format,
|
|
asio::error_code& ec)
|
|
{
|
|
::ERR_clear_error();
|
|
|
|
if (format == context_base::asn1)
|
|
{
|
|
if (::SSL_CTX_use_certificate_ASN1(handle_,
|
|
static_cast<int>(certificate.size()),
|
|
static_cast<const unsigned char*>(certificate.data())) == 1)
|
|
{
|
|
ec = asio::error_code();
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
}
|
|
else if (format == context_base::pem)
|
|
{
|
|
bio_cleanup bio = { make_buffer_bio(certificate) };
|
|
if (bio.p)
|
|
{
|
|
x509_cleanup cert = { ::PEM_read_bio_X509(bio.p, 0, 0, 0) };
|
|
if (cert.p)
|
|
{
|
|
if (::SSL_CTX_use_certificate(handle_, cert.p) == 1)
|
|
{
|
|
ec = asio::error_code();
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
ec = asio::error::invalid_argument;
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
ec = asio::error_code(
|
|
static_cast<int>(::ERR_get_error()),
|
|
asio::error::get_ssl_category());
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
void context::use_certificate_file(
|
|
const std::string& filename, file_format format)
|
|
{
|
|
asio::error_code ec;
|
|
use_certificate_file(filename, format, ec);
|
|
asio::detail::throw_error(ec, "use_certificate_file");
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::use_certificate_file(
|
|
const std::string& filename, file_format format,
|
|
asio::error_code& ec)
|
|
{
|
|
int file_type;
|
|
switch (format)
|
|
{
|
|
case context_base::asn1:
|
|
file_type = SSL_FILETYPE_ASN1;
|
|
break;
|
|
case context_base::pem:
|
|
file_type = SSL_FILETYPE_PEM;
|
|
break;
|
|
default:
|
|
{
|
|
ec = asio::error::invalid_argument;
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
}
|
|
|
|
::ERR_clear_error();
|
|
|
|
if (::SSL_CTX_use_certificate_file(handle_, filename.c_str(), file_type) != 1)
|
|
{
|
|
ec = asio::error_code(
|
|
static_cast<int>(::ERR_get_error()),
|
|
asio::error::get_ssl_category());
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
ec = asio::error_code();
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
void context::use_certificate_chain(const const_buffer& chain)
|
|
{
|
|
asio::error_code ec;
|
|
use_certificate_chain(chain, ec);
|
|
asio::detail::throw_error(ec, "use_certificate_chain");
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::use_certificate_chain(
|
|
const const_buffer& chain, asio::error_code& ec)
|
|
{
|
|
::ERR_clear_error();
|
|
|
|
bio_cleanup bio = { make_buffer_bio(chain) };
|
|
if (bio.p)
|
|
{
|
|
#if ((OPENSSL_VERSION_NUMBER >= 0x10100000L) \
|
|
&& !defined(LIBRESSL_VERSION_NUMBER)) \
|
|
|| defined(ASIO_USE_WOLFSSL)
|
|
pem_password_cb* callback = ::SSL_CTX_get_default_passwd_cb(handle_);
|
|
void* cb_userdata = ::SSL_CTX_get_default_passwd_cb_userdata(handle_);
|
|
#else // (OPENSSL_VERSION_NUMBER >= 0x10100000L)
|
|
pem_password_cb* callback = handle_->default_passwd_callback;
|
|
void* cb_userdata = handle_->default_passwd_callback_userdata;
|
|
#endif // (OPENSSL_VERSION_NUMBER >= 0x10100000L)
|
|
x509_cleanup cert = {
|
|
::PEM_read_bio_X509_AUX(bio.p, 0,
|
|
callback,
|
|
cb_userdata) };
|
|
if (!cert.p)
|
|
{
|
|
ec = asio::error_code(ERR_R_PEM_LIB,
|
|
asio::error::get_ssl_category());
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
int result = ::SSL_CTX_use_certificate(handle_, cert.p);
|
|
if (result == 0 || ::ERR_peek_error() != 0)
|
|
{
|
|
ec = asio::error_code(
|
|
static_cast<int>(::ERR_get_error()),
|
|
asio::error::get_ssl_category());
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
#if ((OPENSSL_VERSION_NUMBER >= 0x10002000L) \
|
|
&& !defined(LIBRESSL_VERSION_NUMBER)) \
|
|
|| defined(ASIO_USE_WOLFSSL)
|
|
::SSL_CTX_clear_chain_certs(handle_);
|
|
#else
|
|
if (handle_->extra_certs)
|
|
{
|
|
::sk_X509_pop_free(handle_->extra_certs, X509_free);
|
|
handle_->extra_certs = 0;
|
|
}
|
|
#endif // (OPENSSL_VERSION_NUMBER >= 0x10002000L)
|
|
|
|
while (X509* cacert = ::PEM_read_bio_X509(bio.p, 0,
|
|
callback,
|
|
cb_userdata))
|
|
{
|
|
if (!::SSL_CTX_add_extra_chain_cert(handle_, cacert))
|
|
{
|
|
ec = asio::error_code(
|
|
static_cast<int>(::ERR_get_error()),
|
|
asio::error::get_ssl_category());
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
}
|
|
|
|
result = ::ERR_peek_last_error();
|
|
if ((ERR_GET_LIB(result) == ERR_LIB_PEM)
|
|
&& (ERR_GET_REASON(result) == PEM_R_NO_START_LINE))
|
|
{
|
|
::ERR_clear_error();
|
|
ec = asio::error_code();
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
}
|
|
|
|
ec = asio::error_code(
|
|
static_cast<int>(::ERR_get_error()),
|
|
asio::error::get_ssl_category());
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
void context::use_certificate_chain_file(const std::string& filename)
|
|
{
|
|
asio::error_code ec;
|
|
use_certificate_chain_file(filename, ec);
|
|
asio::detail::throw_error(ec, "use_certificate_chain_file");
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::use_certificate_chain_file(
|
|
const std::string& filename, asio::error_code& ec)
|
|
{
|
|
::ERR_clear_error();
|
|
|
|
if (::SSL_CTX_use_certificate_chain_file(handle_, filename.c_str()) != 1)
|
|
{
|
|
ec = asio::error_code(
|
|
static_cast<int>(::ERR_get_error()),
|
|
asio::error::get_ssl_category());
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
ec = asio::error_code();
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
void context::use_private_key(
|
|
const const_buffer& private_key, context::file_format format)
|
|
{
|
|
asio::error_code ec;
|
|
use_private_key(private_key, format, ec);
|
|
asio::detail::throw_error(ec, "use_private_key");
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::use_private_key(
|
|
const const_buffer& private_key, context::file_format format,
|
|
asio::error_code& ec)
|
|
{
|
|
::ERR_clear_error();
|
|
|
|
#if ((OPENSSL_VERSION_NUMBER >= 0x10100000L) \
|
|
&& !defined(LIBRESSL_VERSION_NUMBER)) \
|
|
|| defined(ASIO_USE_WOLFSSL)
|
|
pem_password_cb* callback = ::SSL_CTX_get_default_passwd_cb(handle_);
|
|
void* cb_userdata = ::SSL_CTX_get_default_passwd_cb_userdata(handle_);
|
|
#else // (OPENSSL_VERSION_NUMBER >= 0x10100000L)
|
|
pem_password_cb* callback = handle_->default_passwd_callback;
|
|
void* cb_userdata = handle_->default_passwd_callback_userdata;
|
|
#endif // (OPENSSL_VERSION_NUMBER >= 0x10100000L)
|
|
|
|
bio_cleanup bio = { make_buffer_bio(private_key) };
|
|
if (bio.p)
|
|
{
|
|
evp_pkey_cleanup evp_private_key = { 0 };
|
|
switch (format)
|
|
{
|
|
case context_base::asn1:
|
|
evp_private_key.p = ::d2i_PrivateKey_bio(bio.p, 0);
|
|
break;
|
|
case context_base::pem:
|
|
evp_private_key.p = ::PEM_read_bio_PrivateKey(
|
|
bio.p, 0, callback,
|
|
cb_userdata);
|
|
break;
|
|
default:
|
|
{
|
|
ec = asio::error::invalid_argument;
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
}
|
|
|
|
if (evp_private_key.p)
|
|
{
|
|
if (::SSL_CTX_use_PrivateKey(handle_, evp_private_key.p) == 1)
|
|
{
|
|
ec = asio::error_code();
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
}
|
|
}
|
|
|
|
ec = asio::error_code(
|
|
static_cast<int>(::ERR_get_error()),
|
|
asio::error::get_ssl_category());
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
void context::use_private_key_file(
|
|
const std::string& filename, context::file_format format)
|
|
{
|
|
asio::error_code ec;
|
|
use_private_key_file(filename, format, ec);
|
|
asio::detail::throw_error(ec, "use_private_key_file");
|
|
}
|
|
|
|
void context::use_rsa_private_key(
|
|
const const_buffer& private_key, context::file_format format)
|
|
{
|
|
asio::error_code ec;
|
|
use_rsa_private_key(private_key, format, ec);
|
|
asio::detail::throw_error(ec, "use_rsa_private_key");
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::use_rsa_private_key(
|
|
const const_buffer& private_key, context::file_format format,
|
|
asio::error_code& ec)
|
|
{
|
|
::ERR_clear_error();
|
|
|
|
#if ((OPENSSL_VERSION_NUMBER >= 0x10100000L) \
|
|
&& !defined(LIBRESSL_VERSION_NUMBER)) \
|
|
|| defined(ASIO_USE_WOLFSSL)
|
|
pem_password_cb* callback = ::SSL_CTX_get_default_passwd_cb(handle_);
|
|
void* cb_userdata = ::SSL_CTX_get_default_passwd_cb_userdata(handle_);
|
|
#else // (OPENSSL_VERSION_NUMBER >= 0x10100000L)
|
|
pem_password_cb* callback = handle_->default_passwd_callback;
|
|
void* cb_userdata = handle_->default_passwd_callback_userdata;
|
|
#endif // (OPENSSL_VERSION_NUMBER >= 0x10100000L)
|
|
|
|
bio_cleanup bio = { make_buffer_bio(private_key) };
|
|
if (bio.p)
|
|
{
|
|
rsa_cleanup rsa_private_key = { 0 };
|
|
switch (format)
|
|
{
|
|
case context_base::asn1:
|
|
rsa_private_key.p = ::d2i_RSAPrivateKey_bio(bio.p, 0);
|
|
break;
|
|
case context_base::pem:
|
|
rsa_private_key.p = ::PEM_read_bio_RSAPrivateKey(
|
|
bio.p, 0, callback,
|
|
cb_userdata);
|
|
break;
|
|
default:
|
|
{
|
|
ec = asio::error::invalid_argument;
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
}
|
|
|
|
if (rsa_private_key.p)
|
|
{
|
|
if (::SSL_CTX_use_RSAPrivateKey(handle_, rsa_private_key.p) == 1)
|
|
{
|
|
ec = asio::error_code();
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
}
|
|
}
|
|
|
|
ec = asio::error_code(
|
|
static_cast<int>(::ERR_get_error()),
|
|
asio::error::get_ssl_category());
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::use_private_key_file(
|
|
const std::string& filename, context::file_format format,
|
|
asio::error_code& ec)
|
|
{
|
|
int file_type;
|
|
switch (format)
|
|
{
|
|
case context_base::asn1:
|
|
file_type = SSL_FILETYPE_ASN1;
|
|
break;
|
|
case context_base::pem:
|
|
file_type = SSL_FILETYPE_PEM;
|
|
break;
|
|
default:
|
|
{
|
|
ec = asio::error::invalid_argument;
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
}
|
|
|
|
::ERR_clear_error();
|
|
|
|
if (::SSL_CTX_use_PrivateKey_file(handle_, filename.c_str(), file_type) != 1)
|
|
{
|
|
ec = asio::error_code(
|
|
static_cast<int>(::ERR_get_error()),
|
|
asio::error::get_ssl_category());
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
ec = asio::error_code();
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
void context::use_rsa_private_key_file(
|
|
const std::string& filename, context::file_format format)
|
|
{
|
|
asio::error_code ec;
|
|
use_rsa_private_key_file(filename, format, ec);
|
|
asio::detail::throw_error(ec, "use_rsa_private_key_file");
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::use_rsa_private_key_file(
|
|
const std::string& filename, context::file_format format,
|
|
asio::error_code& ec)
|
|
{
|
|
int file_type;
|
|
switch (format)
|
|
{
|
|
case context_base::asn1:
|
|
file_type = SSL_FILETYPE_ASN1;
|
|
break;
|
|
case context_base::pem:
|
|
file_type = SSL_FILETYPE_PEM;
|
|
break;
|
|
default:
|
|
{
|
|
ec = asio::error::invalid_argument;
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
}
|
|
|
|
::ERR_clear_error();
|
|
|
|
if (::SSL_CTX_use_RSAPrivateKey_file(
|
|
handle_, filename.c_str(), file_type) != 1)
|
|
{
|
|
ec = asio::error_code(
|
|
static_cast<int>(::ERR_get_error()),
|
|
asio::error::get_ssl_category());
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
ec = asio::error_code();
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
void context::use_tmp_dh(const const_buffer& dh)
|
|
{
|
|
asio::error_code ec;
|
|
use_tmp_dh(dh, ec);
|
|
asio::detail::throw_error(ec, "use_tmp_dh");
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::use_tmp_dh(
|
|
const const_buffer& dh, asio::error_code& ec)
|
|
{
|
|
::ERR_clear_error();
|
|
|
|
bio_cleanup bio = { make_buffer_bio(dh) };
|
|
if (bio.p)
|
|
{
|
|
return do_use_tmp_dh(bio.p, ec);
|
|
}
|
|
|
|
ec = asio::error_code(
|
|
static_cast<int>(::ERR_get_error()),
|
|
asio::error::get_ssl_category());
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
void context::use_tmp_dh_file(const std::string& filename)
|
|
{
|
|
asio::error_code ec;
|
|
use_tmp_dh_file(filename, ec);
|
|
asio::detail::throw_error(ec, "use_tmp_dh_file");
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::use_tmp_dh_file(
|
|
const std::string& filename, asio::error_code& ec)
|
|
{
|
|
::ERR_clear_error();
|
|
|
|
bio_cleanup bio = { ::BIO_new_file(filename.c_str(), "r") };
|
|
if (bio.p)
|
|
{
|
|
return do_use_tmp_dh(bio.p, ec);
|
|
}
|
|
|
|
ec = asio::error_code(
|
|
static_cast<int>(::ERR_get_error()),
|
|
asio::error::get_ssl_category());
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::do_use_tmp_dh(
|
|
BIO* bio, asio::error_code& ec)
|
|
{
|
|
::ERR_clear_error();
|
|
|
|
dh_cleanup dh = { ::PEM_read_bio_DHparams(bio, 0, 0, 0) };
|
|
if (dh.p)
|
|
{
|
|
if (::SSL_CTX_set_tmp_dh(handle_, dh.p) == 1)
|
|
{
|
|
ec = asio::error_code();
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
}
|
|
|
|
ec = asio::error_code(
|
|
static_cast<int>(::ERR_get_error()),
|
|
asio::error::get_ssl_category());
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::do_set_verify_callback(
|
|
detail::verify_callback_base* callback, asio::error_code& ec)
|
|
{
|
|
if (SSL_CTX_get_app_data(handle_))
|
|
{
|
|
delete static_cast<detail::verify_callback_base*>(
|
|
SSL_CTX_get_app_data(handle_));
|
|
}
|
|
|
|
SSL_CTX_set_app_data(handle_, callback);
|
|
|
|
::SSL_CTX_set_verify(handle_,
|
|
::SSL_CTX_get_verify_mode(handle_),
|
|
&context::verify_callback_function);
|
|
|
|
ec = asio::error_code();
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
int context::verify_callback_function(int preverified, X509_STORE_CTX* ctx)
|
|
{
|
|
if (ctx)
|
|
{
|
|
if (SSL* ssl = static_cast<SSL*>(
|
|
::X509_STORE_CTX_get_ex_data(
|
|
ctx, ::SSL_get_ex_data_X509_STORE_CTX_idx())))
|
|
{
|
|
if (SSL_CTX* handle = ::SSL_get_SSL_CTX(ssl))
|
|
{
|
|
if (SSL_CTX_get_app_data(handle))
|
|
{
|
|
detail::verify_callback_base* callback =
|
|
static_cast<detail::verify_callback_base*>(
|
|
SSL_CTX_get_app_data(handle));
|
|
|
|
verify_context verify_ctx(ctx);
|
|
return callback->call(preverified != 0, verify_ctx) ? 1 : 0;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
ASIO_SYNC_OP_VOID context::do_set_password_callback(
|
|
detail::password_callback_base* callback, asio::error_code& ec)
|
|
{
|
|
#if ((OPENSSL_VERSION_NUMBER >= 0x10100000L) \
|
|
&& !defined(LIBRESSL_VERSION_NUMBER)) \
|
|
|| defined(ASIO_USE_WOLFSSL)
|
|
void* old_callback = ::SSL_CTX_get_default_passwd_cb_userdata(handle_);
|
|
::SSL_CTX_set_default_passwd_cb_userdata(handle_, callback);
|
|
#else // (OPENSSL_VERSION_NUMBER >= 0x10100000L)
|
|
void* old_callback = handle_->default_passwd_callback_userdata;
|
|
handle_->default_passwd_callback_userdata = callback;
|
|
#endif // (OPENSSL_VERSION_NUMBER >= 0x10100000L)
|
|
|
|
if (old_callback)
|
|
delete static_cast<detail::password_callback_base*>(
|
|
old_callback);
|
|
|
|
SSL_CTX_set_default_passwd_cb(handle_, &context::password_callback_function);
|
|
|
|
ec = asio::error_code();
|
|
ASIO_SYNC_OP_VOID_RETURN(ec);
|
|
}
|
|
|
|
int context::password_callback_function(
|
|
char* buf, int size, int purpose, void* data)
|
|
{
|
|
using namespace std; // For strncat and strlen.
|
|
|
|
if (data)
|
|
{
|
|
detail::password_callback_base* callback =
|
|
static_cast<detail::password_callback_base*>(data);
|
|
|
|
std::string passwd = callback->call(static_cast<std::size_t>(size),
|
|
purpose ? context_base::for_writing : context_base::for_reading);
|
|
|
|
#if defined(ASIO_HAS_SECURE_RTL)
|
|
strcpy_s(buf, size, passwd.c_str());
|
|
#else // defined(ASIO_HAS_SECURE_RTL)
|
|
*buf = '\0';
|
|
if (size > 0)
|
|
strncat(buf, passwd.c_str(), size - 1);
|
|
#endif // defined(ASIO_HAS_SECURE_RTL)
|
|
|
|
return static_cast<int>(strlen(buf));
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
BIO* context::make_buffer_bio(const const_buffer& b)
|
|
{
|
|
return ::BIO_new_mem_buf(
|
|
const_cast<void*>(b.data()),
|
|
static_cast<int>(b.size()));
|
|
}
|
|
|
|
} // namespace ssl
|
|
} // namespace asio
|
|
|
|
#include "asio/detail/pop_options.hpp"
|
|
|
|
#endif // ASIO_SSL_IMPL_CONTEXT_IPP
|