From fffd213c8cba2135afda493d797c41c10354770e Mon Sep 17 00:00:00 2001 From: Othmar Gsenger Date: Sat, 12 Apr 2008 11:38:42 +0000 Subject: big svn cleanup --- src/Sockets/SSLInitializer.cpp | 144 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 144 insertions(+) create mode 100644 src/Sockets/SSLInitializer.cpp (limited to 'src/Sockets/SSLInitializer.cpp') diff --git a/src/Sockets/SSLInitializer.cpp b/src/Sockets/SSLInitializer.cpp new file mode 100644 index 0000000..65218b1 --- /dev/null +++ b/src/Sockets/SSLInitializer.cpp @@ -0,0 +1,144 @@ +/** + ** \file SSLInitializer.cpp + ** \date 2007-04-30 + ** \author grymse@alhem.net +**/ +/* +Copyright (C) 2007 Anders Hedstrom + +This program is free software; you can redistribute it and/or +modify it under the terms of the GNU General Public License +as published by the Free Software Foundation; either version 2 +of the License, or (at your option) any later version. + +This program is distributed in the hope that it will be useful, +but WITHOUT ANY WARRANTY; without even the implied warranty of +MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +GNU General Public License for more details. + +You should have received a copy of the GNU General Public License +along with this program; if not, write to the Free Software +Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. +*/ +#ifdef _WIN32 +#ifdef _MSC_VER +#pragma warning(disable:4786) +#endif +#include +#endif +#include "SSLInitializer.h" +#ifdef HAVE_OPENSSL +#include +#include "Utility.h" +#include +#include "Mutex.h" + +#ifdef _DEBUG +#define DEB(x) x +#else +#define DEB(x) +#endif + + +#ifdef SOCKETS_NAMESPACE +namespace SOCKETS_NAMESPACE { +#endif + + + +SSLInitializer::SSLInitializer() +{ +DEB( fprintf(stderr, "SSLInitializer()\n");) + + bio_err = NULL; + m_rand_size = 1024; + + /* An error write context */ + bio_err = BIO_new_fp(stderr, BIO_NOCLOSE); + + /* Global system initialization*/ + SSL_library_init(); + SSL_load_error_strings(); + OpenSSL_add_all_algorithms(); + CRYPTO_set_locking_callback( SSL_locking_function ); + CRYPTO_set_id_callback( SSL_id_function ); + + char *randfile = getenv("RANDFILE"); + char *home = getenv("HOME"); + if (!randfile && !home) + { + char *homepath = getenv("HOMEPATH"); + if (homepath) + { + Utility::SetEnv("HOME", homepath); + } + } + char path[512]; + *path = 0; + RAND_file_name(path, 512); + if (*path) + { + m_rand_file = path; + m_rand_size = 1024; + RAND_write_file(path); + } + else + { +DEB( fprintf(stderr, "SSLInitializer: no random file generated\n");) + } + + /* Load randomness */ + if (!m_rand_file.size() || !RAND_load_file(m_rand_file.c_str(), m_rand_size)) + { +DEB( fprintf(stderr, "SSLInitializer: PRNG not initialized\n");) + } + +} + + +SSLInitializer::~SSLInitializer() +{ +DEB( fprintf(stderr, "~SSLInitializer()\n");) + DeleteRandFile(); + // %! delete mutexes +} + + +void SSLInitializer::DeleteRandFile() +{ + if (m_rand_file.size()) + { + unlink(m_rand_file.c_str()); + } +} + + +void SSLInitializer::SSL_locking_function(int mode, int n, const char *file, int line) +{ +static std::map mmap; + if (mmap.find(n) == mmap.end()) + { + mmap[n] = new Mutex; + } + if (mode & CRYPTO_LOCK) + { + mmap[n] -> Lock(); + } + else + { + mmap[n] -> Unlock(); + } +} + + +unsigned long SSLInitializer::SSL_id_function() +{ + return Utility::ThreadID(); +} + + +#ifdef SOCKETS_NAMESPACE +} // namespace SOCKETS_NAMESPACE { +#endif +#endif // HAVE_OPENSSL + -- cgit v1.2.3