mirror of
https://github.com/ultimatepp/ultimatepp.git
synced 2026-05-15 06:05:58 -06:00
205 lines
6.9 KiB
C++
205 lines
6.9 KiB
C++
#include <Core/Core.h>
|
|
|
|
#include <openssl/ssl.h>
|
|
#include <openssl/conf.h>
|
|
#include <openssl/err.h>
|
|
#include <openssl/rand.h>
|
|
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
|
|
#include <openssl/kdf.h>
|
|
#endif
|
|
|
|
namespace Upp {
|
|
|
|
INITIALIZE(SSL);
|
|
INITIALIZE(SSLSocket);
|
|
INITIALIZE(P7S);
|
|
|
|
void SslInitThread();
|
|
|
|
class SslBuffer
|
|
{
|
|
public:
|
|
SslBuffer(BUF_MEM *m = NULL) : buf_mem(m) {}
|
|
~SslBuffer() { Clear(); }
|
|
|
|
bool IsEmpty() const { return !buf_mem; }
|
|
|
|
bool Set(BUF_MEM *b) { Clear(); return !!(buf_mem = b); }
|
|
bool Create() { return Set(BUF_MEM_new()); }
|
|
void Clear() { if(buf_mem) { BUF_MEM_free(buf_mem); buf_mem = NULL; } }
|
|
BUF_MEM *Detach() { BUF_MEM *b = buf_mem; buf_mem = NULL; return b; }
|
|
|
|
bool Grow(int length);
|
|
|
|
String Get() const;
|
|
bool Set(const String& d);
|
|
|
|
operator BUF_MEM * () const { return buf_mem; }
|
|
|
|
private:
|
|
BUF_MEM *buf_mem;
|
|
};
|
|
|
|
class SslStream
|
|
{
|
|
public:
|
|
SslStream(BIO *b = NULL) : bio(b) {}
|
|
~SslStream() { Clear(); }
|
|
|
|
bool IsEmpty() const { return !bio; }
|
|
|
|
bool Set(BIO *b) { Clear(); return !!(bio = b); }
|
|
#if OPENSSL_VERSION_NUMBER >= 0x10100000L
|
|
bool Create(const BIO_METHOD *meth) { return Set(BIO_new(meth)); }
|
|
#else
|
|
bool Create(BIO_METHOD *meth) { return Set(BIO_new(meth)); }
|
|
#endif
|
|
void Clear() { if(bio) { BIO_free(bio); bio = NULL; } }
|
|
|
|
bool OpenBuffer(const char *data, int length);
|
|
bool CreateBuffer();
|
|
String GetResult() const;
|
|
|
|
operator BIO * () const { return bio; }
|
|
|
|
private:
|
|
BIO *bio;
|
|
};
|
|
|
|
class SslKey
|
|
{
|
|
public:
|
|
SslKey(EVP_PKEY *k = NULL) : key(k) {}
|
|
~SslKey() { Clear(); }
|
|
|
|
bool IsEmpty() const { return !key; }
|
|
|
|
bool Set(EVP_PKEY *k) { Clear(); return !!(key = k); }
|
|
void Clear() { if(key) { EVP_PKEY_free(key); key = NULL; } }
|
|
EVP_PKEY *Detach() { EVP_PKEY *k = key; key = NULL; return k; }
|
|
|
|
operator EVP_PKEY * () const { return key; }
|
|
|
|
bool Load(const String& data);
|
|
|
|
private:
|
|
EVP_PKEY *key;
|
|
};
|
|
|
|
class SslCertificate
|
|
{
|
|
public:
|
|
SslCertificate(X509 *c = NULL) : cert(c) {}
|
|
~SslCertificate() { Clear(); }
|
|
|
|
bool IsEmpty() const { return !cert; }
|
|
|
|
bool Set(X509 *c) { Clear(); return !!(cert = c); }
|
|
bool Create() { return Set(X509_new()); }
|
|
void Clear() { if(cert) { X509_free(cert); cert = NULL; } }
|
|
X509 *Detach() { X509 *c = cert; cert = NULL; return c; }
|
|
|
|
bool Load(const String& data, bool asn1 = false);
|
|
String Save(bool asn1 = false) const;
|
|
|
|
String GetSubjectName() const;
|
|
String GetIssuerName() const;
|
|
Date GetNotBefore() const;
|
|
Date GetNotAfter() const;
|
|
int GetVersion() const;
|
|
String GetSerialNumber() const;
|
|
|
|
operator X509 * () const { return cert; }
|
|
|
|
private:
|
|
X509 *cert;
|
|
};
|
|
|
|
class SslContext
|
|
{
|
|
public:
|
|
SslContext(SSL_CTX *c = NULL);
|
|
~SslContext() { Clear(); }
|
|
|
|
bool IsEmpty() const { return !ssl_ctx; }
|
|
|
|
bool Set(SSL_CTX *c) { Clear(); return !!(ssl_ctx = c); }
|
|
bool Create(SSL_METHOD *meth);
|
|
void Clear();
|
|
SSL_CTX *Detach() { SSL_CTX *c = ssl_ctx; ssl_ctx = NULL; return c; }
|
|
|
|
operator SSL_CTX * () const { return ssl_ctx; }
|
|
|
|
bool CipherList(const char *list);
|
|
bool UseCertificate(String certificate, String private_key, bool cert_asn1 = false);
|
|
void VerifyPeer(bool verify = true, int depth = 2);
|
|
|
|
bool UseCAcert(String ca_cert, bool cert_asn1 = false);
|
|
|
|
private:
|
|
SSL_CTX *ssl_ctx;
|
|
};
|
|
|
|
String SslGetLastError(int& code);
|
|
String SslGetLastError();
|
|
String SslToString(X509_NAME *name);
|
|
Date Asn1ToDate(ASN1_STRING *time);
|
|
String Asn1ToString(ASN1_STRING *s);
|
|
|
|
constexpr const int AES_GCM_MIN_ITERATION = 10000;
|
|
constexpr const int AES_GCM_MAX_ITERATION = 1000000;
|
|
constexpr const int AES_GCM_DEFAULT_ITERATION = 100000;
|
|
|
|
class Aes256Gcm : NoCopy {
|
|
public:
|
|
Aes256Gcm();
|
|
virtual ~Aes256Gcm();
|
|
|
|
Aes256Gcm& Iteration(int n) { iteration = clamp(n, AES_GCM_MIN_ITERATION, AES_GCM_MAX_ITERATION); return *this; }
|
|
Aes256Gcm& ChunkSize(int sz) { chunksize = clamp(sz, 128, INT_MAX); return *this; }
|
|
|
|
bool Encrypt(Stream& in, const String& password, Stream& out);
|
|
bool Encrypt(const String& in, const String& password, String& out) { return EncDec(true, in, password, out); }
|
|
bool Decrypt(Stream& in, const String& password, Stream& out);
|
|
bool Decrypt(const String& in, const String& password, String& out) { return EncDec(false, in, password, out); }
|
|
|
|
Gate<int64, int64> WhenProgress;
|
|
|
|
String GetErrorDesc() const { return err; }
|
|
|
|
private:
|
|
bool EncDec(bool enc, const String& in, const String& pwd, String& out);
|
|
void SetError(const String& txt);
|
|
|
|
EVP_CIPHER_CTX* ctx;
|
|
EVP_CIPHER* cipher;
|
|
int chunksize;
|
|
int iteration;
|
|
String err;
|
|
};
|
|
|
|
String AES256Encrypt(const String& in, const String& password, Gate<int64, int64> WhenProgress = Null);
|
|
String AES256Decrypt(const String& in, const String& password, Gate<int64, int64> WhenProgress = Null);
|
|
bool AES256Encrypt(Stream& in, const String& password, Stream& out, Gate<int64, int64> WhenProgress = Null);
|
|
bool AES256Decrypt(Stream& in, const String& password, Stream& out, Gate<int64, int64> WhenProgress = Null);
|
|
|
|
// Secure buffer
|
|
#include "Buffer.hpp"
|
|
|
|
|
|
|
|
// Secure Random Generator
|
|
SecureBuffer<byte> SecureRandom(int n);
|
|
SecureBuffer<byte> SecureNonce(int n);
|
|
|
|
inline SecureBuffer<byte> GetAESGCMNonce() { return SecureNonce(12); } // 12 bytes, optimal for AES-GCM
|
|
inline SecureBuffer<byte> GetChaChaPoly1305Nonce() { return SecureNonce(12); } // 12 bytes, standard for ChaCha20-Poly1305
|
|
inline SecureBuffer<byte> GetTLSNonce() { return SecureNonce(12); } // 12 bytes, used in TLS 1.2/1.3
|
|
inline SecureBuffer<byte> GetAESCCMNonce() { return SecureNonce(13); } // 13 bytes, max size for AES-CCM
|
|
inline SecureBuffer<byte> GetJWTNonce() { return SecureNonce(16); } // 16 bytes, good for JWT
|
|
inline SecureBuffer<byte> GetOAuthNonce() { return SecureNonce(16); } // 16 bytes, common for OAuth
|
|
inline SecureBuffer<byte> GetOCSPNonce() { return SecureNonce(20); } // 20 bytes, OCSP nonce extension
|
|
inline SecureBuffer<byte> GetECDSANonce() { return SecureNonce(32); } // 32 bytes, for ECDSA signatures
|
|
inline SecureBuffer<byte> GetDTLSCookie() { return SecureNonce(32); } // 32 bytes, DTLS cookie
|
|
|
|
}
|