2
0
mirror of https://gitlab.isc.org/isc-projects/kea synced 2025-08-22 18:08:16 +00:00
kea/src/lib/asiolink/openssl_tls.cc

119 lines
2.7 KiB
C++
Raw Normal View History

2021-02-24 14:45:54 +01:00
// Copyright (C) 2021 Internet Systems Consortium, Inc. ("ISC")
//
// This Source Code Form is subject to the terms of the Mozilla Public
// License, v. 2.0. If a copy of the MPL was not distributed with this
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
/// @file openssl_tls.cc OpenSSL implementation of the TLS API.
2021-02-24 14:45:54 +01:00
#include <config.h>
#ifdef WITH_OPENSSL
#include <asiolink/asio_wrapper.h>
#include <asiolink/crypto_tls.h>
#include <sys/stat.h>
#include <openssl/opensslv.h>
using namespace boost::asio;
using namespace boost::asio::ssl;
using namespace boost::system;
using namespace isc::cryptolink;
namespace isc {
namespace asiolink {
// Enforce TLS 1.2 when the generic TLS method is not available (i.e.
// the boost version is older than 1.64.0).
2021-02-24 14:45:54 +01:00
TlsContext::TlsContext(TlsRole role)
: TlsContextBase(role), cert_required_(true),
#ifdef HAVE_GENERIC_TLS_METHOD
context_(context::method::tls)
#else
2021-03-13 17:48:41 +01:00
#ifdef HAVE_TLS_1_2_METHOD
context_(context::method::tlsv12)
2021-03-13 17:48:41 +01:00
#else
context_(context::method::tlsv1)
#endif
#endif
{
2021-02-24 14:45:54 +01:00
// Not leave the verify mode to OpenSSL default.
setCertRequired(true);
}
boost::asio::ssl::context&
TlsContext::getContext() {
return (context_);
}
::SSL_CTX*
TlsContext::getNativeContext() {
return (context_.native_handle());
}
void
TlsContext::setCertRequired(bool cert_required) {
2021-03-25 11:02:37 +01:00
if (!cert_required && (getRole() == TlsRole::CLIENT)) {
isc_throw(BadValue,
"'cert-required' parameter must be true for a TLS client");
}
2021-02-24 14:45:54 +01:00
cert_required_ = cert_required;
error_code ec;
int mode = verify_peer | verify_fail_if_no_peer_cert;
if (!cert_required_) {
mode = verify_none;
}
context_.set_verify_mode(mode, ec);
if (ec) {
isc_throw(LibraryError, ec.message());
}
}
bool
TlsContext::getCertRequired() const {
return (cert_required_);
}
void
TlsContext::loadCaFile(const std::string& ca_file) {
error_code ec;
context_.load_verify_file(ca_file, ec);
if (ec) {
isc_throw(LibraryError, ec.message());
}
}
void
TlsContext::loadCaPath(const std::string& ca_path) {
error_code ec;
context_.add_verify_path(ca_path, ec);
if (ec) {
isc_throw(LibraryError, ec.message());
}
}
void
TlsContext::loadCertFile(const std::string& cert_file) {
error_code ec;
context_.use_certificate_chain_file(cert_file, ec);
if (ec) {
isc_throw(LibraryError, ec.message());
}
}
void
TlsContext::loadKeyFile(const std::string& key_file) {
error_code ec;
context_.use_private_key_file(key_file, context::file_format::pem, ec);
if (ec) {
isc_throw(LibraryError, ec.message());
}
}
} // namespace asiolink
} // namespace isc
#endif // WITH_OPENSSL