2019-02-25 14:48:22 +01:00
|
|
|
/* Icinga 2 | (c) 2012 Icinga GmbH | GPLv2+ */
|
2013-03-18 19:02:42 +01:00
|
|
|
|
|
|
|
#ifndef TLSUTILITY_H
|
|
|
|
#define TLSUTILITY_H
|
|
|
|
|
2014-05-25 16:23:35 +02:00
|
|
|
#include "base/i2-base.hpp"
|
2021-07-16 18:31:52 +02:00
|
|
|
#include "base/debuginfo.hpp"
|
2014-05-25 16:23:35 +02:00
|
|
|
#include "base/object.hpp"
|
2019-07-25 16:45:39 +02:00
|
|
|
#include "base/shared.hpp"
|
2020-02-17 17:42:20 +01:00
|
|
|
#include "base/array.hpp"
|
2014-10-19 14:48:19 +02:00
|
|
|
#include "base/string.hpp"
|
2013-03-18 19:02:42 +01:00
|
|
|
#include <openssl/ssl.h>
|
2013-09-03 14:05:03 +02:00
|
|
|
#include <openssl/bio.h>
|
2013-03-18 19:02:42 +01:00
|
|
|
#include <openssl/err.h>
|
2013-09-03 14:05:03 +02:00
|
|
|
#include <openssl/comp.h>
|
2013-09-04 15:47:15 +02:00
|
|
|
#include <openssl/sha.h>
|
2020-02-17 17:42:20 +01:00
|
|
|
#include <openssl/pem.h>
|
|
|
|
#include <openssl/x509.h>
|
2014-10-13 13:58:18 +02:00
|
|
|
#include <openssl/x509v3.h>
|
2014-10-16 13:36:25 +02:00
|
|
|
#include <openssl/evp.h>
|
2014-10-23 15:05:12 +02:00
|
|
|
#include <openssl/rand.h>
|
2019-02-08 14:23:10 +01:00
|
|
|
#include <boost/asio/ssl/context.hpp>
|
2014-12-15 10:16:06 +01:00
|
|
|
#include <boost/exception/info.hpp>
|
2013-03-18 19:02:42 +01:00
|
|
|
|
|
|
|
namespace icinga
|
|
|
|
{
|
|
|
|
|
2021-07-16 18:32:26 +02:00
|
|
|
const char * const DEFAULT_TLS_CIPHERS = "ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:AES256-GCM-SHA384:AES128-GCM-SHA256";
|
|
|
|
|
|
|
|
const char * const DEFAULT_TLS_PROTOCOLMIN = "TLSv1.2";
|
2021-07-26 16:13:24 +02:00
|
|
|
const unsigned int DEFAULT_CONNECT_TIMEOUT = 15;
|
2021-07-16 18:32:26 +02:00
|
|
|
|
2022-03-30 18:38:57 +02:00
|
|
|
const auto ROOT_VALID_FOR = 60 * 60 * 24 * 365 * 15;
|
|
|
|
const auto LEAF_VALID_FOR = 60 * 60 * 24 * 397;
|
|
|
|
const auto RENEW_THRESHOLD = 60 * 60 * 24 * 30;
|
|
|
|
const auto RENEW_INTERVAL = 60 * 60 * 24;
|
|
|
|
|
2018-01-04 04:25:35 +01:00
|
|
|
void InitializeOpenSSL();
|
2019-05-28 13:03:34 +02:00
|
|
|
|
2020-02-13 15:25:03 +01:00
|
|
|
String GetOpenSSLVersion();
|
|
|
|
|
2019-07-25 16:45:39 +02:00
|
|
|
Shared<boost::asio::ssl::context>::Ptr MakeAsioSslContext(const String& pubkey = String(), const String& privkey = String(), const String& cakey = String());
|
|
|
|
void AddCRLToSSLContext(const Shared<boost::asio::ssl::context>::Ptr& context, const String& crlPath);
|
2020-12-07 13:27:48 +01:00
|
|
|
void AddCRLToSSLContext(X509_STORE *x509_store, const String& crlPath);
|
2019-07-25 16:45:39 +02:00
|
|
|
void SetCipherListToSSLContext(const Shared<boost::asio::ssl::context>::Ptr& context, const String& cipherList);
|
|
|
|
void SetTlsProtocolminToSSLContext(const Shared<boost::asio::ssl::context>::Ptr& context, const String& tlsProtocolmin);
|
2021-04-14 15:35:54 +02:00
|
|
|
int ResolveTlsProtocolVersion(const std::string& version);
|
2019-05-28 13:03:34 +02:00
|
|
|
|
2021-07-16 18:31:52 +02:00
|
|
|
Shared<boost::asio::ssl::context>::Ptr SetupSslContext(String certPath, String keyPath,
|
|
|
|
String caPath, String crlPath, String cipherList, String protocolmin, DebugInfo di);
|
|
|
|
|
2017-12-31 07:22:16 +01:00
|
|
|
String GetCertificateCN(const std::shared_ptr<X509>& certificate);
|
|
|
|
std::shared_ptr<X509> GetX509Certificate(const String& pemfile);
|
|
|
|
int MakeX509CSR(const String& cn, const String& keyfile, const String& csrfile = String(), const String& certfile = String(), bool ca = false);
|
|
|
|
std::shared_ptr<X509> CreateCert(EVP_PKEY *pubkey, X509_NAME *subject, X509_NAME *issuer, EVP_PKEY *cakey, bool ca);
|
2019-05-28 13:03:34 +02:00
|
|
|
|
2018-01-04 04:25:35 +01:00
|
|
|
String GetIcingaCADir();
|
2017-12-31 07:22:16 +01:00
|
|
|
String CertificateToString(const std::shared_ptr<X509>& cert);
|
2019-05-28 13:03:34 +02:00
|
|
|
|
2017-12-31 07:22:16 +01:00
|
|
|
std::shared_ptr<X509> StringToCertificate(const String& cert);
|
|
|
|
std::shared_ptr<X509> CreateCertIcingaCA(EVP_PKEY *pubkey, X509_NAME *subject);
|
|
|
|
std::shared_ptr<X509> CreateCertIcingaCA(const std::shared_ptr<X509>& cert);
|
2022-03-29 15:47:16 +02:00
|
|
|
bool IsCertUptodate(const std::shared_ptr<X509>& cert);
|
2019-05-28 13:03:34 +02:00
|
|
|
|
2017-12-31 07:22:16 +01:00
|
|
|
String PBKDF2_SHA1(const String& password, const String& salt, int iterations);
|
2017-08-11 16:23:24 +02:00
|
|
|
String PBKDF2_SHA256(const String& password, const String& salt, int iterations);
|
2017-12-31 07:22:16 +01:00
|
|
|
String SHA1(const String& s, bool binary = false);
|
|
|
|
String SHA256(const String& s);
|
|
|
|
String RandomString(int length);
|
2021-09-21 12:56:10 +02:00
|
|
|
String BinaryToHex(const unsigned char* data, size_t length);
|
2019-05-28 13:03:34 +02:00
|
|
|
|
2020-12-07 13:27:48 +01:00
|
|
|
bool VerifyCertificate(const std::shared_ptr<X509>& caCertificate, const std::shared_ptr<X509>& certificate, const String& crlFile);
|
2020-02-13 16:03:43 +01:00
|
|
|
bool IsCa(const std::shared_ptr<X509>& cacert);
|
2020-02-17 17:42:20 +01:00
|
|
|
int GetCertificateVersion(const std::shared_ptr<X509>& cert);
|
|
|
|
String GetSignatureAlgorithm(const std::shared_ptr<X509>& cert);
|
|
|
|
Array::Ptr GetSubjectAltNames(const std::shared_ptr<X509>& cert);
|
2013-03-18 19:02:42 +01:00
|
|
|
|
2017-12-31 07:22:16 +01:00
|
|
|
class openssl_error : virtual public std::exception, virtual public boost::exception { };
|
2013-03-18 19:02:42 +01:00
|
|
|
|
|
|
|
struct errinfo_openssl_error_;
|
2014-09-09 15:28:55 +02:00
|
|
|
typedef boost::error_info<struct errinfo_openssl_error_, unsigned long> errinfo_openssl_error;
|
2013-03-18 19:02:42 +01:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* TLSUTILITY_H */
|