shrpx_ssl.cc: Another code cleanup
This commit is contained in:
parent
bd55f9cf2a
commit
e5e1e9b76e
|
@ -133,7 +133,7 @@ SSL_CTX* create_ssl_context(const char *private_key_file,
|
||||||
SSL_CTX *ssl_ctx;
|
SSL_CTX *ssl_ctx;
|
||||||
ssl_ctx = SSL_CTX_new(SSLv23_server_method());
|
ssl_ctx = SSL_CTX_new(SSLv23_server_method());
|
||||||
if(!ssl_ctx) {
|
if(!ssl_ctx) {
|
||||||
LOG(FATAL) << ERR_error_string(ERR_get_error(), 0);
|
LOG(FATAL) << ERR_error_string(ERR_get_error(), nullptr);
|
||||||
DIE();
|
DIE();
|
||||||
}
|
}
|
||||||
SSL_CTX_set_options(ssl_ctx,
|
SSL_CTX_set_options(ssl_ctx,
|
||||||
|
@ -149,7 +149,7 @@ SSL_CTX* create_ssl_context(const char *private_key_file,
|
||||||
if(get_config()->ciphers) {
|
if(get_config()->ciphers) {
|
||||||
if(SSL_CTX_set_cipher_list(ssl_ctx, get_config()->ciphers) == 0) {
|
if(SSL_CTX_set_cipher_list(ssl_ctx, get_config()->ciphers) == 0) {
|
||||||
LOG(FATAL) << "SSL_CTX_set_cipher_list failed: "
|
LOG(FATAL) << "SSL_CTX_set_cipher_list failed: "
|
||||||
<< ERR_error_string(ERR_get_error(), NULL);
|
<< ERR_error_string(ERR_get_error(), nullptr);
|
||||||
DIE();
|
DIE();
|
||||||
}
|
}
|
||||||
SSL_CTX_set_options(ssl_ctx, SSL_OP_CIPHER_SERVER_PREFERENCE);
|
SSL_CTX_set_options(ssl_ctx, SSL_OP_CIPHER_SERVER_PREFERENCE);
|
||||||
|
@ -199,17 +199,17 @@ SSL_CTX* create_ssl_context(const char *private_key_file,
|
||||||
if(SSL_CTX_use_PrivateKey_file(ssl_ctx, private_key_file,
|
if(SSL_CTX_use_PrivateKey_file(ssl_ctx, private_key_file,
|
||||||
SSL_FILETYPE_PEM) != 1) {
|
SSL_FILETYPE_PEM) != 1) {
|
||||||
LOG(FATAL) << "SSL_CTX_use_PrivateKey_file failed: "
|
LOG(FATAL) << "SSL_CTX_use_PrivateKey_file failed: "
|
||||||
<< ERR_error_string(ERR_get_error(), NULL);
|
<< ERR_error_string(ERR_get_error(), nullptr);
|
||||||
DIE();
|
DIE();
|
||||||
}
|
}
|
||||||
if(SSL_CTX_use_certificate_chain_file(ssl_ctx, cert_file) != 1) {
|
if(SSL_CTX_use_certificate_chain_file(ssl_ctx, cert_file) != 1) {
|
||||||
LOG(FATAL) << "SSL_CTX_use_certificate_file failed: "
|
LOG(FATAL) << "SSL_CTX_use_certificate_file failed: "
|
||||||
<< ERR_error_string(ERR_get_error(), NULL);
|
<< ERR_error_string(ERR_get_error(), nullptr);
|
||||||
DIE();
|
DIE();
|
||||||
}
|
}
|
||||||
if(SSL_CTX_check_private_key(ssl_ctx) != 1) {
|
if(SSL_CTX_check_private_key(ssl_ctx) != 1) {
|
||||||
LOG(FATAL) << "SSL_CTX_check_private_key failed: "
|
LOG(FATAL) << "SSL_CTX_check_private_key failed: "
|
||||||
<< ERR_error_string(ERR_get_error(), NULL);
|
<< ERR_error_string(ERR_get_error(), nullptr);
|
||||||
DIE();
|
DIE();
|
||||||
}
|
}
|
||||||
if(get_config()->verify_client) {
|
if(get_config()->verify_client) {
|
||||||
|
@ -253,7 +253,7 @@ SSL_CTX* create_ssl_client_context()
|
||||||
SSL_CTX *ssl_ctx;
|
SSL_CTX *ssl_ctx;
|
||||||
ssl_ctx = SSL_CTX_new(SSLv23_client_method());
|
ssl_ctx = SSL_CTX_new(SSLv23_client_method());
|
||||||
if(!ssl_ctx) {
|
if(!ssl_ctx) {
|
||||||
LOG(FATAL) << ERR_error_string(ERR_get_error(), 0);
|
LOG(FATAL) << ERR_error_string(ERR_get_error(), nullptr);
|
||||||
DIE();
|
DIE();
|
||||||
}
|
}
|
||||||
SSL_CTX_set_options(ssl_ctx,
|
SSL_CTX_set_options(ssl_ctx,
|
||||||
|
@ -263,7 +263,7 @@ SSL_CTX* create_ssl_client_context()
|
||||||
if(get_config()->ciphers) {
|
if(get_config()->ciphers) {
|
||||||
if(SSL_CTX_set_cipher_list(ssl_ctx, get_config()->ciphers) == 0) {
|
if(SSL_CTX_set_cipher_list(ssl_ctx, get_config()->ciphers) == 0) {
|
||||||
LOG(FATAL) << "SSL_CTX_set_cipher_list failed: "
|
LOG(FATAL) << "SSL_CTX_set_cipher_list failed: "
|
||||||
<< ERR_error_string(ERR_get_error(), NULL);
|
<< ERR_error_string(ERR_get_error(), nullptr);
|
||||||
DIE();
|
DIE();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -274,19 +274,20 @@ SSL_CTX* create_ssl_client_context()
|
||||||
|
|
||||||
if(SSL_CTX_set_default_verify_paths(ssl_ctx) != 1) {
|
if(SSL_CTX_set_default_verify_paths(ssl_ctx) != 1) {
|
||||||
LOG(WARNING) << "Could not load system trusted ca certificates: "
|
LOG(WARNING) << "Could not load system trusted ca certificates: "
|
||||||
<< ERR_error_string(ERR_get_error(), NULL);
|
<< ERR_error_string(ERR_get_error(), nullptr);
|
||||||
}
|
}
|
||||||
|
|
||||||
if(get_config()->cacert) {
|
if(get_config()->cacert) {
|
||||||
if(SSL_CTX_load_verify_locations(ssl_ctx, get_config()->cacert, 0) != 1) {
|
if(SSL_CTX_load_verify_locations(ssl_ctx, get_config()->cacert, nullptr)
|
||||||
|
!= 1) {
|
||||||
LOG(FATAL) << "Could not load trusted ca certificates from "
|
LOG(FATAL) << "Could not load trusted ca certificates from "
|
||||||
<< get_config()->cacert << ": "
|
<< get_config()->cacert << ": "
|
||||||
<< ERR_error_string(ERR_get_error(), NULL);
|
<< ERR_error_string(ERR_get_error(), nullptr);
|
||||||
DIE();
|
DIE();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
SSL_CTX_set_next_proto_select_cb(ssl_ctx, select_next_proto_cb, 0);
|
SSL_CTX_set_next_proto_select_cb(ssl_ctx, select_next_proto_cb, nullptr);
|
||||||
return ssl_ctx;
|
return ssl_ctx;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -296,7 +297,8 @@ ClientHandler* accept_connection(event_base *evbase, SSL_CTX *ssl_ctx,
|
||||||
{
|
{
|
||||||
char host[NI_MAXHOST];
|
char host[NI_MAXHOST];
|
||||||
int rv;
|
int rv;
|
||||||
rv = getnameinfo(addr, addrlen, host, sizeof(host), 0, 0, NI_NUMERICHOST);
|
rv = getnameinfo(addr, addrlen, host, sizeof(host), nullptr, 0,
|
||||||
|
NI_NUMERICHOST);
|
||||||
if(rv == 0) {
|
if(rv == 0) {
|
||||||
if(get_config()->accesslog) {
|
if(get_config()->accesslog) {
|
||||||
upstream_connect(host);
|
upstream_connect(host);
|
||||||
|
@ -315,7 +317,7 @@ ClientHandler* accept_connection(event_base *evbase, SSL_CTX *ssl_ctx,
|
||||||
ssl = SSL_new(ssl_ctx);
|
ssl = SSL_new(ssl_ctx);
|
||||||
if(!ssl) {
|
if(!ssl) {
|
||||||
LOG(ERROR) << "SSL_new() failed: "
|
LOG(ERROR) << "SSL_new() failed: "
|
||||||
<< ERR_error_string(ERR_get_error(), NULL);
|
<< ERR_error_string(ERR_get_error(), nullptr);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
bev = bufferevent_openssl_socket_new
|
bev = bufferevent_openssl_socket_new
|
||||||
|
@ -338,7 +340,7 @@ bool numeric_host(const char *hostname)
|
||||||
memset(&hints, 0, sizeof(hints));
|
memset(&hints, 0, sizeof(hints));
|
||||||
hints.ai_family = AF_UNSPEC;
|
hints.ai_family = AF_UNSPEC;
|
||||||
hints.ai_flags = AI_NUMERICHOST;
|
hints.ai_flags = AI_NUMERICHOST;
|
||||||
if(getaddrinfo(hostname, 0, &hints, &res)) {
|
if(getaddrinfo(hostname, nullptr, &hints, &res)) {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
freeaddrinfo(res);
|
freeaddrinfo(res);
|
||||||
|
@ -429,7 +431,7 @@ void get_altnames(X509 *cert,
|
||||||
{
|
{
|
||||||
GENERAL_NAMES* altnames;
|
GENERAL_NAMES* altnames;
|
||||||
altnames = reinterpret_cast<GENERAL_NAMES*>
|
altnames = reinterpret_cast<GENERAL_NAMES*>
|
||||||
(X509_get_ext_d2i(cert, NID_subject_alt_name, 0, 0));
|
(X509_get_ext_d2i(cert, NID_subject_alt_name, nullptr, nullptr));
|
||||||
if(altnames) {
|
if(altnames) {
|
||||||
util::auto_delete<GENERAL_NAMES*> altnames_deleter(altnames,
|
util::auto_delete<GENERAL_NAMES*> altnames_deleter(altnames,
|
||||||
GENERAL_NAMES_free);
|
GENERAL_NAMES_free);
|
||||||
|
|
Loading…
Reference in New Issue