void nano::rpc_secure::load_certs (boost::asio::ssl::context & context_a) { // This is called if the key is password protected context_a.set_password_callback ( [this](std::size_t, boost::asio::ssl::context_base::password_purpose) { return config.secure.server_key_passphrase; }); // The following two options disables the session cache and enables stateless session resumption. // This is necessary because of the way the RPC server abruptly terminate connections. SSL_CTX_set_session_cache_mode (context_a.native_handle (), SSL_SESS_CACHE_OFF); SSL_CTX_set_options (context_a.native_handle (), SSL_OP_NO_TICKET); context_a.set_options ( boost::asio::ssl::context::default_workarounds | boost::asio::ssl::context::no_sslv2 | boost::asio::ssl::context::no_sslv3 | boost::asio::ssl::context::single_dh_use); context_a.use_certificate_chain_file (config.secure.server_cert_path); context_a.use_private_key_file (config.secure.server_key_path, boost::asio::ssl::context::pem); context_a.use_tmp_dh_file (config.secure.server_dh_path); // Verify client certificates? if (config.secure.client_certs_path.size () > 0) { context_a.set_verify_mode (boost::asio::ssl::verify_fail_if_no_peer_cert | boost::asio::ssl::verify_peer); context_a.add_verify_path (config.secure.client_certs_path); context_a.set_verify_callback ([this](auto preverified, auto & ctx) { return this->on_verify_certificate (preverified, ctx); }); } }
void BaseClient::ssl_prepare(boost::asio::ssl::context &ssl_context) const { ssl_context.set_password_callback(boost::bind(&BaseClient::get_password,this)); ssl_context.set_verify_mode(boost::asio::ssl::context::verify_peer|boost::asio::ssl::context::verify_fail_if_no_peer_cert); ssl_context.load_verify_file(my_certs_name); ssl_context.use_certificate_chain_file(my_public_cert_name); ssl_context.use_private_key_file(my_private_key_name, boost::asio::ssl::context::pem); }