XRootD
Loading...
Searching...
No Matches
XrdTlsContext Class Reference

#include <XrdTlsContext.hh>

Collaboration diagram for XrdTlsContext:

Classes

struct  CTX_Params

Public Member Functions

 XrdTlsContext (const char *cert=0, const char *key=0, const char *cadir=0, const char *cafile=0, uint64_t opts=0, std::string *eMsg=0)
 XrdTlsContext (const XrdTlsContext &ctx)=delete
 Disallow any copies of this object.
 XrdTlsContext (XrdTlsContext &&ctx)=delete
 ~XrdTlsContext ()
 Destructor.
XrdTlsContextClone (bool full=true, bool startCRLRefresh=false)
void * Context ()
const CTX_ParamsGetParams ()
bool isOK ()
bool newHostCertificateDetected ()
XrdTlsContextoperator= (const XrdTlsContext &ctx)=delete
XrdTlsContextoperator= (XrdTlsContext &&ctx)=delete
void * Session ()
int SessionCache (int opts=scNone, const char *id=0, int idlen=0)
bool SetContextCiphers (const char *ciphers)
bool SetCrlRefresh (int refsec=-1)
void SetTlsClientAuth (bool setting)
bool x509Verify ()

Static Public Member Functions

static const char * Init ()
static void SetDefaultCiphers (const char *ciphers)

Static Public Attributes

static const uint64_t artON = 0x0000002000000000
 Auto retry Handshake.
static const uint64_t clcOF = 0x0000010000000000
 Disable client certificate request.
static const uint64_t crlAM = 0x0000001000000000
 Allow CA validation when CRL is missing (CRL soft-fail).
static const uint64_t crlFC = 0x000000C000000000
 Full crl chain checking.
static const uint64_t crlON = 0x0000008000000000
 Enables crl checking.
static const uint64_t crlRF = 0x00000000ffff0000
 Mask to isolate crl refresh in min.
static const int crlRS = 16
 Bits to shift vdept.
static int ctxIndex = SSL_CTX_get_ex_new_index(0, NULL, NULL, NULL, NULL)
static const int DEFAULT_CRL_REF_INT_SEC = 8 * 60 * 60
 Default CRL refresh interval in seconds.
static const uint64_t dnsok = 0x0000000200000000
 Trust DNS for host name.
static const uint64_t hsto = 0x00000000000000ff
 Mask to isolate the hsto.
static const uint64_t logVF = 0x0000000800000000
 Log verify failures.
static const uint64_t nopxy = 0x0000000100000000
 Do not allow proxy certs.
static const uint64_t rfCRL = 0x0000004000000000
 Turn on the CRL refresh thread.
static const int scClnt = 0x00040000
 Turn on cache client mode.
static const int scFMax = 0x00007fff
static const int scIdErr = 0x80000000
 Info: Id not set, is too long.
static const int scKeep = 0x40000000
 Info: TLS-controlled flush disabled.
static const int scNone = 0x00000000
 Do not change any option settings.
static const int scOff = 0x00010000
 Turn off cache.
static const int scSrvr = 0x00020000
 Turn on cache server mode (default).
static const uint64_t servr = 0x0000000400000000
 This is a server context.
static const int vdepS = 8
 Bits to shift vdept.
static const uint64_t vdept = 0x000000000000ff00
 Mask to isolate vdept.

Detailed Description

Definition at line 36 of file XrdTlsContext.hh.

Constructor & Destructor Documentation

◆ XrdTlsContext() [1/3]

XrdTlsContext::XrdTlsContext ( const char * cert = 0,
const char * key = 0,
const char * cadir = 0,
const char * cafile = 0,
uint64_t opts = 0,
std::string * eMsg = 0 )

Definition at line 560 of file XrdTlsContext.cc.

563 : pImpl( new XrdTlsContextImpl(this) )
564{
565 class ctx_helper
566 {public:
567
568 void Keep() {ctxLoc = 0;}
569
570 ctx_helper(SSL_CTX **ctxP) : ctxLoc(ctxP) {}
571 ~ctx_helper() {if (ctxLoc && *ctxLoc)
572 {SSL_CTX_free(*ctxLoc); *ctxLoc = 0;}
573 }
574 private:
575 SSL_CTX **ctxLoc;
576 } ctx_tracker(&pImpl->ctx);
577
578 static const uint64_t sslOpts = SSL_OP_ALL
579 | SSL_OP_NO_SSLv2
580 | SSL_OP_NO_SSLv3
581 | SSL_OP_NO_COMPRESSION
582 | SSL_OP_NO_RENEGOTIATION
583#ifdef SSL_OP_IGNORE_UNEXPECTED_EOF
584 | SSL_OP_IGNORE_UNEXPECTED_EOF
585#endif
586 ;
587
588 std::string certFN, eText;
589 const char *emsg;
590
591// Assume we will fail
592//
593 pImpl->ctx = 0;
594
595// Verify that initialzation has occurred. This is not heavy weight as
596// there will usually be no more than two instances of this object.
597//
598 if (!initDbgDone)
599 {XrdSysMutexHelper dbgHelper(dbgMutex);
600 if (!initDbgDone)
601 {const char *dbg;
602 if (!(opts & servr) && (dbg = getenv("XRDTLS_DEBUG")))
603 {int dbgOpts = 0;
604 if (strstr(dbg, "ctx")) dbgOpts |= XrdTls::dbgCTX;
605 if (strstr(dbg, "sok")) dbgOpts |= XrdTls::dbgSOK;
606 if (strstr(dbg, "sio")) dbgOpts |= XrdTls::dbgSIO;
607 if (!dbgOpts) dbgOpts = XrdTls::dbgALL;
609 }
610 if ((emsg = Init())) FATAL(emsg);
611 initDbgDone = true;
612 }
613 }
614
615// If no CA cert information is specified and this is not a server context,
616// then get the paths from the environment. They must exist as we need to
617// verify peer certs in order to verify target host names client-side. We
618// also use this setupt to see if we should use a specific cert and key.
619//
620 if (!(opts & servr))
621 {if (!caDir && !caFile)
622 {caDir = getenv("X509_CERT_DIR");
623 caFile = getenv("X509_CERT_FILE");
624 if (!caDir && !caFile)
625 FATAL("No CA cert specified; host identity cannot be verified.");
626 }
627 if (!key) key = getenv("X509_USER_KEY");
628 if (!cert) cert = getenv("X509_USER_PROXY");
629 if (!cert)
630 {struct stat Stat;
631 long long int uid = static_cast<long long int>(getuid());
632 certFN = std::string("/tmp/x509up_u") + std::to_string(uid);
633 if (!stat(certFN.c_str(), &Stat)) cert = certFN.c_str();
634 }
635 }
636
637// Before we try to use any specified files, make sure they exist, are of
638// the right type and do not have excessive access privileges.
639// .a
640 if (!VerPaths(cert, key, caDir, caFile, eText)) FATAL( eText.c_str());
641
642// Copy parameters to out parm structure.
643//
644 if (cert) {
645 pImpl->Parm.cert = cert;
646 //This call should not fail as a stat is already performed in the call of VerPaths() above
647 XrdOucUtils::getModificationTime(pImpl->Parm.cert.c_str(),pImpl->lastCertModTime);
648 }
649 if (key) pImpl->Parm.pkey = key;
650 if (caDir) pImpl->Parm.cadir = caDir;
651 if (caFile) pImpl->Parm.cafile = caFile;
652 pImpl->Parm.opts = opts;
653 if (opts & crlRF) {
654 // What we store in crlRF is the time in minutes, convert it back to seconds
655 pImpl->Parm.crlRT = static_cast<int>((opts & crlRF) >> crlRS) * 60;
656 }
657
658// Get the correct method to use for TLS and check if successful create a
659// server context that uses the method.
660//
661 const SSL_METHOD *meth;
662 emsg = GetTlsMethod(meth);
663 if (emsg) FATAL(emsg);
664
665 pImpl->ctx = SSL_CTX_new(meth);
666
667// Make sure we have a context here
668//
669 if (pImpl->ctx == 0) FATAL_SSL("Unable to allocate TLS context!");
670
671 //Add the XrdTlsContext object as extra information for OpenSSL callback re-use
672 SSL_CTX_set_ex_data(pImpl->ctx, ctxIndex, this);
673
674// Always prohibit SSLv2 & SSLv3 as these are not secure.
675//
676 SSL_CTX_set_options(pImpl->ctx, sslOpts);
677
678// Handle session re-negotiation automatically
679//
680// SSL_CTX_set_mode(pImpl->ctx, sslMode);
681
682// Turn off the session cache as it's useless with peer cert chains
683//
684 SSL_CTX_set_session_cache_mode(pImpl->ctx, SSL_SESS_CACHE_OFF);
685
686// Establish the CA cert locations, if specified. Then set the verification
687// depth and turn on peer cert validation. For now, we don't set a callback.
688// In the future we may to grab debugging information.
689//
690 if ((caDir || caFile) && !(opts & clcOF))
691 {if (!SSL_CTX_load_verify_locations(pImpl->ctx, caFile, caDir))
692 FATAL_SSL("Unable to load the CA cert file or directory.");
693
694 int vDepth = (opts & vdept) >> vdepS;
695 SSL_CTX_set_verify_depth(pImpl->ctx, (vDepth ? vDepth : 9));
696
697 bool LogVF = (opts & logVF) != 0;
698 bool crlAllowMissingCA = (opts & crlAM) != 0;
699
700 if (crlAllowMissingCA || LogVF) {
701 SSL_CTX_set_verify(pImpl->ctx, SSL_VERIFY_PEER, verifyPeerCB);
702 } else {
703 SSL_CTX_set_verify(pImpl->ctx, SSL_VERIFY_PEER, 0);
704 }
705
706 unsigned long xFlags = (opts & nopxy ? 0 : X509_V_FLAG_ALLOW_PROXY_CERTS);
707 if (opts & crlON)
708 {xFlags |= X509_V_FLAG_CRL_CHECK;
709 if (opts & crlFC) xFlags |= X509_V_FLAG_CRL_CHECK_ALL;
710 }
711 if (opts) X509_STORE_set_flags(SSL_CTX_get_cert_store(pImpl->ctx),xFlags);
712 } else {
713 SSL_CTX_set_verify(pImpl->ctx, SSL_VERIFY_NONE, 0);
714 }
715
716// Set cipher list
717//
718 if (!SSL_CTX_set_cipher_list(pImpl->ctx, sslCiphers))
719 FATAL_SSL("Unable to set SSL cipher list; no supported ciphers.");
720
721// If we need to enable eliptic-curve support, do so now. Note that for
722// OpenSSL 1.1.0+ this is automatically done for us.
723//
724#if SSL_CTRL_SET_ECDH_AUTO
725 SSL_CTX_set_ecdh_auto(pImpl->ctx, 1);
726#endif
727
728// We normally handle renegotiation during reads and writes or selective
729// prohibit on a SSL socket basis. The calle may request this be applied
730// to all SSL's generated from this context. If so, do it here.
731//
732 if (opts & artON) SSL_CTX_set_mode(pImpl->ctx, SSL_MODE_AUTO_RETRY);
733
734// If there is no cert then assume this is a generic context for a client
735//
736 if (cert == 0)
737 {ctx_tracker.Keep();
738 return;
739 }
740
741// We have a cert. If the key is missing then we assume the key is in the
742// cert file (ssl will complain if it isn't).
743//
744 if (!key) key = cert;
745
746// Load certificate
747//
748 if (SSL_CTX_use_certificate_chain_file(pImpl->ctx, cert) != 1)
749 FATAL_SSL("Unable to create TLS context; invalid certificate.");
750
751// Load the private key
752//
753 if (SSL_CTX_use_PrivateKey_file(pImpl->ctx, key, SSL_FILETYPE_PEM) != 1 )
754 FATAL_SSL("Unable to create TLS context; invalid private key.");
755
756// Make sure the key and certificate file match.
757//
758 if (SSL_CTX_check_private_key(pImpl->ctx) != 1 )
759 FATAL_SSL("Unable to create TLS context; cert-key mismatch.");
760
761// All went well, start the CRL refresh thread and keep the context.
762//
763 if(opts & rfCRL) {
765 }
766 ctx_tracker.Keep();
767}
struct stat Stat
Definition XrdCks.cc:49
#define stat(a, b)
Definition XrdPosix.hh:101
struct myOpts opts
int emsg(int rc, char *msg)
#define FATAL_SSL(msg)
#define FATAL(msg)
static int getModificationTime(const char *path, time_t &modificationTime)
static const uint64_t vdept
Mask to isolate vdept.
static const int crlRS
Bits to shift vdept.
static const uint64_t clcOF
Disable client certificate request.
static const uint64_t servr
This is a server context.
static const uint64_t rfCRL
Turn on the CRL refresh thread.
static const uint64_t nopxy
Do not allow proxy certs.
static const uint64_t logVF
Log verify failures.
static const uint64_t crlFC
Full crl chain checking.
static int ctxIndex
static const uint64_t crlON
Enables crl checking.
static const uint64_t artON
Auto retry Handshake.
static const int vdepS
Bits to shift vdept.
static const char * Init()
static const uint64_t crlAM
Allow CA validation when CRL is missing (CRL soft-fail).
bool SetCrlRefresh(int refsec=-1)
static const uint64_t crlRF
Mask to isolate crl refresh in min.
static const int dbgSIO
Turn debugging in for socket I/O.
Definition XrdTls.hh:102
static const int dbgSOK
Turn debugging in for socket operations.
Definition XrdTls.hh:101
static const int dbgOUT
Force msgs to stderr for easier client debug.
Definition XrdTls.hh:104
static const int dbgALL
Turn debugging for everything.
Definition XrdTls.hh:103
static const int dbgCTX
Turn debugging in for context operations.
Definition XrdTls.hh:100
static void SetDebug(int opts, XrdSysLogger *logP=0)
Definition XrdTls.cc:177

References artON, clcOF, crlAM, crlFC, crlON, crlRF, crlRS, ctxIndex, XrdTls::dbgALL, XrdTls::dbgCTX, XrdTls::dbgOUT, XrdTls::dbgSIO, XrdTls::dbgSOK, eMsg, emsg(), FATAL, FATAL_SSL, XrdOucUtils::getModificationTime(), Init(), logVF, nopxy, opts, rfCRL, servr, SetCrlRefresh(), XrdTls::SetDebug(), Stat, stat, vdepS, and vdept.

Referenced by XrdTlsContext(), XrdTlsContext(), Clone(), operator=(), operator=(), and Session().

Here is the call graph for this function:
Here is the caller graph for this function:

◆ ~XrdTlsContext()

XrdTlsContext::~XrdTlsContext ( )

Destructor.

Definition at line 773 of file XrdTlsContext.cc.

774{
775// We can delet eour implementation of there is no refresh thread running. If
776// there is then the refresh thread has to delete the implementation.
777//
778 if (pImpl->crlRunning | pImpl->flsRunning)
779 {pImpl->crlMutex.WriteLock();
780 pImpl->owner = 0;
781 pImpl->crlMutex.UnLock();
782 } else delete pImpl;
783}

◆ XrdTlsContext() [2/3]

XrdTlsContext::XrdTlsContext ( const XrdTlsContext & ctx)
delete

Disallow any copies of this object.

References XrdTlsContext().

Here is the call graph for this function:

◆ XrdTlsContext() [3/3]

XrdTlsContext::XrdTlsContext ( XrdTlsContext && ctx)
delete

References XrdTlsContext().

Here is the call graph for this function:

Member Function Documentation

◆ Clone()

XrdTlsContext * XrdTlsContext::Clone ( bool full = true,
bool startCRLRefresh = false )

Clone a new context from this context.

Parameters
fullWhen true the complete context is cloned. When false, a context with no peer verification is cloned.
Returns
Upon success, the pointer to a new XrdTlsContext is returned. Upon failure, a nil pointer is returned.
Note
The cloned context is identical to the one created by the original constructor. Note that while the crl refresh interval is set, the refresh thread needs to be started by calling crlRefresh(). Also, the session cache is set to off with no identifier.

Definition at line 789 of file XrdTlsContext.cc.

790{
791 XrdTlsContext::CTX_Params &my = pImpl->Parm;
792 const char *cert = (my.cert.size() ? my.cert.c_str() : 0);
793 const char *pkey = (my.pkey.size() ? my.pkey.c_str() : 0);
794 const char *caD = (my.cadir.size() ? my.cadir.c_str() : 0);
795 const char *caF = (my.cafile.size() ? my.cafile.c_str() : 0);
796
797// If this is a non-full context, get rid of any verification
798//
799 if (!full) caD = caF = 0;
800
801// Cloning simply means getting a object with the old parameters.
802//
803 uint64_t myOpts = my.opts;
804 if(startCRLRefresh){
805 myOpts |= XrdTlsContext::rfCRL;
806 } else {
807 myOpts &= ~XrdTlsContext::rfCRL;
808 }
809 XrdTlsContext *xtc = new XrdTlsContext(cert, pkey, caD, caF, myOpts);
810
811// Verify that the context was built
812//
813 if (xtc->isOK()) {
814 if(pImpl->sessionCacheOpts != -1){
815 //A SessionCache() call was done for the current context, so apply it for this new cloned context
816 xtc->SessionCache(pImpl->sessionCacheOpts,pImpl->sessionCacheId.c_str(),pImpl->sessionCacheId.size());
817 }
818 return xtc;
819 }
820
821// We failed, cleanup.
822//
823 delete xtc;
824 return 0;
825}
int SessionCache(int opts=scNone, const char *id=0, int idlen=0)
XrdTlsContext(const char *cert=0, const char *key=0, const char *cadir=0, const char *cafile=0, uint64_t opts=0, std::string *eMsg=0)
std::string cafile
-> ca cert file.
uint64_t opts
Options as passed to the constructor.
std::string cadir
-> ca cert directory.
std::string pkey
-> private key path.
std::string cert
-> certificate path.

References XrdTlsContext(), XrdTlsContext::CTX_Params::cadir, XrdTlsContext::CTX_Params::cafile, XrdTlsContext::CTX_Params::cert, isOK(), XrdTlsContext::CTX_Params::opts, XrdTlsContext::CTX_Params::pkey, rfCRL, and SessionCache().

Referenced by XrdTlsCrl::Refresh().

Here is the call graph for this function:
Here is the caller graph for this function:

◆ Context()

void * XrdTlsContext::Context ( )

Get the underlying context (should not be used).

Returns
Pointer to the underlying context.

Definition at line 831 of file XrdTlsContext.cc.

832{
833 return pImpl->ctx;
834}

◆ GetParams()

const XrdTlsContext::CTX_Params * XrdTlsContext::GetParams ( )

Definition at line 840 of file XrdTlsContext.cc.

841{
842 return &pImpl->Parm;
843}

Referenced by XrdTlsSocket::Init().

Here is the caller graph for this function:

◆ Init()

const char * XrdTlsContext::Init ( )
static

Simply initialize the TLS library.

Returns
=0 Library initialized. !0 Library not initialized, return string indicates why.
Note
Init() is implicitly called by the contructor. Use this method to use the TLS libraries without instantiating a context.

Definition at line 849 of file XrdTlsContext.cc.

850{
851
852// Disallow use if this object unless SSL provides thread-safety!
853//
854#ifndef OPENSSL_THREADS
855 return "Installed OpenSSL lacks the required thread support!";
856#endif
857
858// Initialize the library (one time call)
859//
860 InitTLS();
861 return 0;
862}
bool InitTLS()
Definition XrdClTls.cc:96

Referenced by XrdCryptosslFactory::XrdCryptosslFactory(), and XrdTlsContext().

Here is the caller graph for this function:

◆ isOK()

bool XrdTlsContext::isOK ( )

Determine if this object was correctly built.

Returns
True if this object is usuable and false otherwise.

Definition at line 868 of file XrdTlsContext.cc.

869{
870 return pImpl->ctx != 0;
871}

Referenced by Clone(), and XrdTlsCrl::Refresh().

Here is the caller graph for this function:

◆ newHostCertificateDetected()

bool XrdTlsContext::newHostCertificateDetected ( )

Definition at line 1097 of file XrdTlsContext.cc.

1097 {
1098 const std::string certPath = pImpl->Parm.cert;
1099 if(certPath.empty()) {
1100 //No certificate provided, should not happen though
1101 return false;
1102 }
1103 time_t modificationTime;
1104 if(!XrdOucUtils::getModificationTime(certPath.c_str(),modificationTime)){
1105 if (pImpl->lastCertModTime != modificationTime) {
1106 //The certificate file has changed
1107 pImpl->lastCertModTime = modificationTime;
1108 return true;
1109 }
1110 }
1111 return false;
1112}

References XrdOucUtils::getModificationTime().

Referenced by XrdTlsCrl::Refresh().

Here is the call graph for this function:
Here is the caller graph for this function:

◆ operator=() [1/2]

XrdTlsContext & XrdTlsContext::operator= ( const XrdTlsContext & ctx)
delete

References XrdTlsContext().

Here is the call graph for this function:

◆ operator=() [2/2]

XrdTlsContext & XrdTlsContext::operator= ( XrdTlsContext && ctx)
delete

References XrdTlsContext().

Here is the call graph for this function:

◆ Session()

void * XrdTlsContext::Session ( )

Apply this context to obtain a new SSL session.

Returns
A pointer to a new SSL session if successful and nil otherwise.

Definition at line 883 of file XrdTlsContext.cc.

884{
885 EPNAME("Session");
886 SSL *ssl;
887
888// Check if we have a refreshed context. If so, we need to replace the X509
889// store in the current context with the new one before we create the session.
890//
891 pImpl->crlMutex.ReadLock();
892 if (!(pImpl->ctxnew))
893 {ssl = SSL_new(pImpl->ctx);
894 pImpl->crlMutex.UnLock();
895 return ssl;
896 }
897
898// Things have changed, so we need to take the long route here. We need to
899// replace the x509 cache with the current cache. Get a R/W lock now.
900//
901 pImpl->crlMutex.UnLock();
902 pImpl->crlMutex.WriteLock();
903
904// If some other thread beat us to the punch, just return what we have.
905//
906 if (!(pImpl->ctxnew))
907 {ssl = SSL_new(pImpl->ctx);
908 pImpl->crlMutex.UnLock();
909 return ssl;
910 }
911
912// Do some tracing
913//
914 DBG_CTX("Replacing x509 store with new contents.");
915
916// Get the new store and set it in our context. Setting the store is black
917// magic. For OpenSSL < 1.1, Two stores need to be set with the "set1" variant.
918// Newer version only require SSL_CTX_set1_cert_store() to be used.
919//
920 //We have a new context generated by Refresh, so we must use it.
921 XrdTlsContext * ctxnew = pImpl->ctxnew;
922
923 /*X509_STORE *newX509 = SSL_CTX_get_cert_store(ctxnew->pImpl->ctx);
924 SSL_CTX_set1_verify_cert_store(pImpl->ctx, newX509);
925 SSL_CTX_set1_chain_cert_store(pImpl->ctx, newX509);*/
926 //The above two macros actually do not replace the certificate that has
927 //to be used for that SSL session, so we will create the session with the SSL_CTX * of
928 //the TlsContext created by Refresh()
929 //First, free the current SSL_CTX, if it is used by any transfer, it will just decrease
930 //the reference counter of it. There is therefore no risk of double free...
931 SSL_CTX_free(pImpl->ctx);
932 pImpl->ctx = ctxnew->pImpl->ctx;
933
934 //Update ex_data to point to this (the surviving owner), not the
935 //cloned context which is about to be deleted.
936 SSL_CTX_set_ex_data(pImpl->ctx, ctxIndex, this);
937
938 //In the destructor of XrdTlsContextImpl, SSL_CTX_Free() is
939 //called if ctx is != 0. As this new ctx is used by the session
940 //we just created, we don't want that to happen. We therefore set it to 0.
941 //The SSL_free called on the session will cleanup the context for us.
942 ctxnew->pImpl->ctx = 0;
943
944// Save the generated context and clear it's presence
945//
946 XrdTlsContext *ctxold = pImpl->ctxnew;
947 pImpl->ctxnew = 0;
948
949// Generate a new session (might as well to keep the lock we have)
950//
951 ssl = SSL_new(pImpl->ctx);
952
953// OK, now we can drop all the locks and get rid of the old context
954//
955 pImpl->crlMutex.UnLock();
956 delete ctxold;
957 return ssl;
958}
#define EPNAME(x)
#define DBG_CTX(y)

References XrdTlsContext(), XrdTlsContextImpl::ctx, ctxIndex, DBG_CTX, and EPNAME.

Referenced by XrdTlsSocket::Init().

Here is the call graph for this function:
Here is the caller graph for this function:

◆ SessionCache()

int XrdTlsContext::SessionCache ( int opts = scNone,
const char * id = 0,
int idlen = 0 )

Definition at line 964 of file XrdTlsContext.cc.

965{
966 static const int doSet = scSrvr | scClnt | scOff;
967 long sslopt = 0;
968 int flushT = opts & scFMax;
969
970 pImpl->sessionCacheOpts = opts;
971 pImpl->sessionCacheId = id;
972
973// If initialization failed there is nothing to do
974//
975 if (pImpl->ctx == 0) return 0;
976
977// Set options as appropriate
978//
979 if (opts & doSet)
980 {if (opts & scOff) sslopt = SSL_SESS_CACHE_OFF;
981 else {if (opts & scSrvr) sslopt = SSL_SESS_CACHE_SERVER;
982 if (opts & scClnt) sslopt |= SSL_SESS_CACHE_CLIENT;
983 }
984 }
985
986// Check if we should set any cache options or simply get them
987//
988 if (!(opts & doSet)) sslopt = SSL_CTX_get_session_cache_mode(pImpl->ctx);
989 else {sslopt = SSL_CTX_set_session_cache_mode(pImpl->ctx, sslopt);
990 if (opts & scOff) SSL_CTX_set_options(pImpl->ctx, SSL_OP_NO_TICKET);
991 }
992
993// Compute what he previous cache options were
994//
995 opts = scNone;
996 if (sslopt & SSL_SESS_CACHE_SERVER) opts |= scSrvr;
997 if (sslopt & SSL_SESS_CACHE_CLIENT) opts |= scClnt;
998 if (!opts) opts = scOff;
999 if (sslopt & SSL_SESS_CACHE_NO_AUTO_CLEAR) opts |= scKeep;
1000 opts |= (static_cast<int>(pImpl->flushT) & scFMax);
1001
1002// Set the id is so wanted
1003//
1004 if (id && idlen > 0)
1005 {if (!SSL_CTX_set_session_id_context(pImpl->ctx,
1006 (unsigned const char *)id,
1007 (unsigned int)idlen)) opts |= scIdErr;
1008 }
1009
1010// If a flush interval was specified and it is different from what we have
1011// then reset the flush interval.
1012//
1013 if (flushT && flushT != pImpl->flushT)
1014 XrdTlsFlush::Setup_Flusher(pImpl, flushT);
1015
1016// All done
1017//
1018 return opts;
1019}
static const int scIdErr
Info: Id not set, is too long.
static const int scClnt
Turn on cache client mode.
static const int scKeep
Info: TLS-controlled flush disabled.
static const int scNone
Do not change any option settings.
static const int scOff
Turn off cache.
static const int scFMax
static const int scSrvr
Turn on cache server mode (default).
bool Setup_Flusher(XrdTlsContextImpl *pImpl, int flushT)

References opts, scClnt, scFMax, scIdErr, scKeep, scNone, scOff, scSrvr, and XrdTlsFlush::Setup_Flusher().

Referenced by Clone().

Here is the call graph for this function:
Here is the caller graph for this function:

◆ SetContextCiphers()

bool XrdTlsContext::SetContextCiphers ( const char * ciphers)

Set allowed ciphers for this context.

Parameters
ciphersThe colon separated list of allowable ciphers.
Returns
True if at least one cipher can be used; false otherwise. When false is reurned, this context is no longer usable.

Definition at line 1025 of file XrdTlsContext.cc.

1026{
1027 if (pImpl->ctx && SSL_CTX_set_cipher_list(pImpl->ctx, ciphers)) return true;
1028
1029 char eBuff[2048];
1030 snprintf(eBuff,sizeof(eBuff),"Unable to set context ciphers '%s'",ciphers);
1031 Fatal(0, eBuff, true);
1032 return false;
1033}
void Fatal(const char *op, const char *target)
Definition XrdCrc32c.cc:58

References Fatal().

Here is the call graph for this function:

◆ SetCrlRefresh()

bool XrdTlsContext::SetCrlRefresh ( int refsec = -1)

Set CRL refresh time. By default, CRL's are not refreshed.

Parameters
refsec>0: The number of seconds between refreshes. A value less than 60 sets it to 60. =0: Stops automatic refreshing. <0: Starts automatic refreshing with the current setting if it has not already been started.
Returns
True if the CRL refresh thread was started; false otherwise.

Definition at line 1048 of file XrdTlsContext.cc.

1049{
1050 pthread_t tid;
1051 int rc;
1052
1053// If it's negative or equal to 0, use the current setting
1054//
1055 if (refsec <= 0)
1056 {pImpl->crlMutex.WriteLock();
1057 refsec = pImpl->Parm.crlRT;
1058 pImpl->crlMutex.UnLock();
1059 if (!refsec) refsec = XrdTlsContext::DEFAULT_CRL_REF_INT_SEC;
1060 }
1061
1062// Make sure this is at least 60 seconds between refreshes
1063//
1064// if (refsec < 60) refsec = 60;
1065
1066// We will set the new interval and start a refresh thread if not running.
1067//
1068 pImpl->crlMutex.WriteLock();
1069 pImpl->Parm.crlRT = refsec;
1070 if (!pImpl->crlRunning)
1071 {if ((rc = XrdSysThread::Run(&tid, XrdTlsCrl::Refresh, (void *)pImpl,
1072 0, "CRL Refresh")))
1073 {char eBuff[512];
1074 snprintf(eBuff, sizeof(eBuff),
1075 "Unable to start CRL refresh thread; rc=%d", rc);
1076 XrdTls::Emsg("CrlRefresh:", eBuff, false);
1077 pImpl->crlMutex.UnLock();
1078 return false;
1079 } else pImpl->crlRunning = true;
1080 pImpl->crlMutex.UnLock();
1081 }
1082
1083// All done
1084//
1085 return true;
1086}
static int Run(pthread_t *, void *(*proc)(void *), void *arg, int opts=0, const char *desc=0)
static const int DEFAULT_CRL_REF_INT_SEC
Default CRL refresh interval in seconds.
static void Emsg(const char *tid, const char *msg=0, bool flush=true)
Definition XrdTls.cc:104
void * Refresh(void *parg)

References DEFAULT_CRL_REF_INT_SEC, XrdTls::Emsg(), XrdTlsCrl::Refresh(), and XrdSysThread::Run().

Referenced by XrdTlsContext().

Here is the call graph for this function:
Here is the caller graph for this function:

◆ SetDefaultCiphers()

void XrdTlsContext::SetDefaultCiphers ( const char * ciphers)
static

Set allowed default ciphers.

Parameters
ciphersThe colon separated list of allowable ciphers.

Definition at line 1039 of file XrdTlsContext.cc.

1040{
1041 sslCiphers = ciphers;
1042}

◆ SetTlsClientAuth()

void XrdTlsContext::SetTlsClientAuth ( bool setting)

Indicate how the server should handle TLS client authentication.

Parameters
settingtrue: All clients will be asked to send a TLS client certificate. false: No clients will be asked to send a TLS client certificate.

Note the TLS connection will not fail if the client is asked for a cert but none are provided.

Definition at line 1114 of file XrdTlsContext.cc.

1114 {
1115 if (setting)
1116 {pImpl->Parm.opts &= ~clcOF;
1117 bool LogVF = (pImpl->Parm.opts & logVF) != 0;
1118 bool crlAllowMissingCA = (pImpl->Parm.opts & crlAM) != 0;
1119
1120 if (LogVF || crlAllowMissingCA)
1121 SSL_CTX_set_verify(pImpl->ctx, SSL_VERIFY_PEER, verifyPeerCB);
1122 else
1123 SSL_CTX_set_verify(pImpl->ctx, SSL_VERIFY_PEER, 0);
1124 } else
1125 {pImpl->Parm.opts |= clcOF;
1126 SSL_CTX_set_verify(pImpl->ctx, SSL_VERIFY_NONE, 0);
1127 }
1128}

References clcOF, crlAM, and logVF.

◆ x509Verify()

bool XrdTlsContext::x509Verify ( )

Check if certificates are being verified.

Returns
True if certificates are being verified, false otherwise.

Definition at line 1092 of file XrdTlsContext.cc.

1093{
1094 return !(pImpl->Parm.cadir.empty()) || !(pImpl->Parm.cafile.empty());
1095}

Referenced by XrdTlsSocket::Init(), and XrdTlsCrl::Refresh().

Here is the caller graph for this function:

Member Data Documentation

◆ artON

const uint64_t XrdTlsContext::artON = 0x0000002000000000
static

Auto retry Handshake.

Definition at line 257 of file XrdTlsContext.hh.

Referenced by XrdTlsContext().

◆ clcOF

const uint64_t XrdTlsContext::clcOF = 0x0000010000000000
static

Disable client certificate request.

Definition at line 258 of file XrdTlsContext.hh.

Referenced by XrdTlsContext(), and SetTlsClientAuth().

◆ crlAM

const uint64_t XrdTlsContext::crlAM = 0x0000001000000000
static

Allow CA validation when CRL is missing (CRL soft-fail).

Definition at line 255 of file XrdTlsContext.hh.

Referenced by XrdTlsContext(), and SetTlsClientAuth().

◆ crlFC

const uint64_t XrdTlsContext::crlFC = 0x000000C000000000
static

Full crl chain checking.

Definition at line 253 of file XrdTlsContext.hh.

Referenced by XrdTlsContext().

◆ crlON

const uint64_t XrdTlsContext::crlON = 0x0000008000000000
static

Enables crl checking.

Definition at line 252 of file XrdTlsContext.hh.

Referenced by XrdTlsContext().

◆ crlRF

const uint64_t XrdTlsContext::crlRF = 0x00000000ffff0000
static

Mask to isolate crl refresh in min.

Definition at line 254 of file XrdTlsContext.hh.

Referenced by XrdTlsContext().

◆ crlRS

const int XrdTlsContext::crlRS = 16
static

Bits to shift vdept.

Definition at line 256 of file XrdTlsContext.hh.

Referenced by XrdTlsContext().

◆ ctxIndex

int XrdTlsContext::ctxIndex = SSL_CTX_get_ex_new_index(0, NULL, NULL, NULL, NULL)
static

Definition at line 261 of file XrdTlsContext.hh.

Referenced by XrdTlsContext(), and Session().

◆ DEFAULT_CRL_REF_INT_SEC

const int XrdTlsContext::DEFAULT_CRL_REF_INT_SEC = 8 * 60 * 60
static

Default CRL refresh interval in seconds.

Definition at line 66 of file XrdTlsContext.hh.

Referenced by XrdTlsContext::CTX_Params::CTX_Params(), and SetCrlRefresh().

◆ dnsok

const uint64_t XrdTlsContext::dnsok = 0x0000000200000000
static

Trust DNS for host name.

Definition at line 249 of file XrdTlsContext.hh.

Referenced by XrdTlsSocket::Init().

◆ hsto

const uint64_t XrdTlsContext::hsto = 0x00000000000000ff
static

Mask to isolate the hsto.

Constructor. Note that you should use isOK() to determine if construction was successful. A false return indicates failure.

Parameters
certPointer to the certificate file to be used. If nil, a generic context is created for client use.
keyPointer to the private key flle to be used. It must correspond to the certificate file. If nil, it is assumed that the key is contained in the cert file.
cadirpath to the directory containing the CA certificates.
cafilepath to the file containing the CA certificates.
optsProcessing options (or'd bitwise): artON - Auto retry handshakes (i.e. block on handshake) crlON - Perform crl check on the leaf node crlFC - Apply crl check to full chain crlRF - Initial crl refresh interval in minutes. dnsok - trust DNS when verifying hostname. hsto - the handshake timeout value in seconds. logVF - Turn on verification failure logging. nopxy - Do not allow proxy cert (normally allowed) servr - This is a server-side context and x509 peer certificate validation may be turned off. vdept - The maximum depth of the certificate chain that must be validated (max is 255).
eMsgIf non-zero, the reason for the failure is returned,
Note
a) If neither cadir nor cafile is specified, certificate validation is not performed if and only if the servr option is specified. Otherwise, the cadir value is obtained from the X509_CERT_DIR envar and the cafile value is obtained from the X509_CERT_File envar. If both are nil, context creation fails. b) Additionally for client-side contructions, if cert or key is not specified their locations come from X509_USER_PROXY and X509_USER_KEY. These may be nil in which case a generic context is created with a local key-pair and no certificate. c) You should immediately call isOK() after instantiating this object. A return value of false means that construction failed. d) Failure messages are routed to the message callback function during construction. e) While the crl refresh interval is set you must engage it by calling crlRefresh() so as to avoid unnecessary refresh threads.

Definition at line 244 of file XrdTlsContext.hh.

Referenced by XrdTlsSocket::Init().

◆ logVF

const uint64_t XrdTlsContext::logVF = 0x0000000800000000
static

Log verify failures.

Definition at line 247 of file XrdTlsContext.hh.

Referenced by XrdConfig::XrdConfig(), XrdTlsContext(), and SetTlsClientAuth().

◆ nopxy

const uint64_t XrdTlsContext::nopxy = 0x0000000100000000
static

Do not allow proxy certs.

Definition at line 250 of file XrdTlsContext.hh.

Referenced by XrdTlsContext().

◆ rfCRL

const uint64_t XrdTlsContext::rfCRL = 0x0000004000000000
static

Turn on the CRL refresh thread.

Definition at line 251 of file XrdTlsContext.hh.

Referenced by XrdTlsContext(), and Clone().

◆ scClnt

const int XrdTlsContext::scClnt = 0x00040000
static

Turn on cache client mode.

Definition at line 135 of file XrdTlsContext.hh.

Referenced by SessionCache().

◆ scFMax

const int XrdTlsContext::scFMax = 0x00007fff
static

Maximum flush interval in seconds When 0 keeps the current setting

Definition at line 138 of file XrdTlsContext.hh.

Referenced by SessionCache().

◆ scIdErr

const int XrdTlsContext::scIdErr = 0x80000000
static

Info: Id not set, is too long.

Definition at line 137 of file XrdTlsContext.hh.

Referenced by SessionCache().

◆ scKeep

const int XrdTlsContext::scKeep = 0x40000000
static

Info: TLS-controlled flush disabled.

Definition at line 136 of file XrdTlsContext.hh.

Referenced by SessionCache().

◆ scNone

const int XrdTlsContext::scNone = 0x00000000
static

Do not change any option settings.

Get or set session cache parameters for generated sessions.

Parameters
optsOne or more bit or'd options (see below).
idThe identifier to be used (may be nil to keep setting).
idlenThe length of the identifier (may be zero as above).
Returns
The cache settings prior to any changes are returned. When setting the id, the scIdErr may be returned if the name is too long. If the context has been pprroperly initialized, zero is returned. By default, the session cache is disabled as it is impossible to verify a peer certificate chain when a cached session is reused.

Definition at line 132 of file XrdTlsContext.hh.

Referenced by SessionCache().

◆ scOff

const int XrdTlsContext::scOff = 0x00010000
static

Turn off cache.

Definition at line 133 of file XrdTlsContext.hh.

Referenced by SessionCache().

◆ scSrvr

const int XrdTlsContext::scSrvr = 0x00020000
static

Turn on cache server mode (default).

Definition at line 134 of file XrdTlsContext.hh.

Referenced by SessionCache().

◆ servr

const uint64_t XrdTlsContext::servr = 0x0000000400000000
static

This is a server context.

Definition at line 248 of file XrdTlsContext.hh.

Referenced by XrdConfig::XrdConfig(), and XrdTlsContext().

◆ vdepS

const int XrdTlsContext::vdepS = 8
static

Bits to shift vdept.

Definition at line 246 of file XrdTlsContext.hh.

Referenced by XrdTlsContext().

◆ vdept

const uint64_t XrdTlsContext::vdept = 0x000000000000ff00
static

Mask to isolate vdept.

Definition at line 245 of file XrdTlsContext.hh.

Referenced by XrdTlsContext().


The documentation for this class was generated from the following files: