Poco::Net

class Context

Library: NetSSL_OpenSSL
Package: SSLCore
Header: Poco/Net/Context.h

Description

This class encapsulates context information for an SSL server or client, such as the certificate verification mode and the location of certificates and private key files, as well as the list of supported ciphers.

The Context class is also used to control SSL session caching on the server and client side.

Inheritance

Direct Base Classes: Poco::RefCountedObject

All Base Classes: Poco::RefCountedObject

Member Summary

Member Functions: addChainCertificate, disableStatelessSessionResumption, enableExtendedCertificateVerification, enableSessionCache, extendedCertificateVerificationEnabled, flushSessionCache, getSessionCacheSize, getSessionTimeout, isForServerUse, sessionCacheEnabled, setSessionCacheSize, setSessionTimeout, sslContext, usage, useCertificate, usePrivateKey, verificationMode

Inherited Functions: duplicate, referenceCount, release

Types

Ptr

typedef Poco::AutoPtr < Context > Ptr;

Enumerations

Usage

CLIENT_USE

Context is used by a client.

SERVER_USE

Context is used by a server.

TLSV1_CLIENT_USE

Context is used by a client requiring TLSv1.

TLSV1_SERVER_USE

Context is used by a server requiring TLSv1.

TLSV1_1_CLIENT_USE

Context is used by a client requiring TLSv1.1 (OpenSSL 1.0.0 or newer).

TLSV1_1_SERVER_USE

Context is used by a server requiring TLSv1.1 (OpenSSL 1.0.0 or newer).

TLSV1_2_CLIENT_USE

Context is used by a client requiring TLSv1.2 (OpenSSL 1.0.1 or newer).

TLSV1_2_SERVER_USE

Context is used by a server requiring TLSv1.2 (OpenSSL 1.0.1 or newer).

VerificationMode

VERIFY_NONE = 0x00

Server: The server will not send a client certificate request to the client, so the client will not send a certificate.

Client: If not using an anonymous cipher (by default disabled), the server will send a certificate which will be checked, but the result of the check will be ignored.

VERIFY_RELAXED = 0x01

Server: The server sends a client certificate request to the client. The certificate returned (if any) is checked. If the verification process fails, the TLS/SSL handshake is immediately terminated with an alert message containing the reason for the verification failure.

Client: The server certificate is verified, if one is provided. If the verification process fails, the TLS/SSL handshake is immediately terminated with an alert message containing the reason for the verification failure.

VERIFY_STRICT = 0x01 | 0x02

Server: If the client did not return a certificate, the TLS/SSL handshake is immediately terminated with a handshake failure alert.

Client: Same as VERIFY_RELAXED.

VERIFY_ONCE = 0x01 | 0x04

Server: Only request a client certificate on the initial TLS/SSL handshake. Do not ask for a client certificate again in case of a renegotiation.

Client: Same as VERIFY_RELAXED.

Constructors

Context

Context(
    Usage usage,
    const std::string & caLocation,
    VerificationMode verificationMode = VERIFY_RELAXED,
    int verificationDepth = 9,
    bool loadDefaultCAs = false,
    const std::string & cipherList = "ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH"
);

Creates a Context.

  • usage specifies whether the context is used by a client or server.
  • caLocation contains the path to the file or directory containing the CA/root certificates. Can be empty if the OpenSSL builtin CA certificates are used (see loadDefaultCAs).
  • verificationMode specifies whether and how peer certificates are validated.
  • verificationDepth sets the upper limit for verification chain sizes. Verification will fail if a certificate chain larger than this is encountered.
  • loadDefaultCAs specifies wheter the builtin CA certificates from OpenSSL are used.
  • cipherList specifies the supported ciphers in OpenSSL notation.

Note that a private key and/or certificate must be specified with usePrivateKey()/useCertificate() before the Context can be used.

Context

Context(
    Usage usage,
    const std::string & privateKeyFile,
    const std::string & certificateFile,
    const std::string & caLocation,
    VerificationMode verificationMode = VERIFY_RELAXED,
    int verificationDepth = 9,
    bool loadDefaultCAs = false,
    const std::string & cipherList = "ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH"
);

Creates a Context.

  • usage specifies whether the context is used by a client or server.
  • privateKeyFile contains the path to the private key file used for encryption. Can be empty if no private key file is used.
  • certificateFile contains the path to the certificate file (in PEM format). If the private key and the certificate are stored in the same file, this can be empty if privateKeyFile is given.
  • caLocation contains the path to the file or directory containing the CA/root certificates. Can be empty if the OpenSSL builtin CA certificates are used (see loadDefaultCAs).
  • verificationMode specifies whether and how peer certificates are validated.
  • verificationDepth sets the upper limit for verification chain sizes. Verification will fail if a certificate chain larger than this is encountered.
  • loadDefaultCAs specifies wheter the builtin CA certificates from OpenSSL are used.
  • cipherList specifies the supported ciphers in OpenSSL notation.

Note: If the private key is protected by a passphrase, a PrivateKeyPassphraseHandler must have been setup with the SSLManager, or the SSLManager's PrivateKeyPassphraseRequired event must be handled.

Destructor

~Context virtual

~Context();

Destroys the Context.

Member Functions

addChainCertificate

void addChainCertificate(
    const Poco::Crypto::X509Certificate & certificate
);

Adds a certificate for certificate chain validation.

disableStatelessSessionResumption

void disableStatelessSessionResumption();

Newer versions of OpenSSL support RFC 4507 tickets for stateless session resumption.

The feature can be disabled by calling this method.

enableExtendedCertificateVerification

void enableExtendedCertificateVerification(
    bool flag = true
);

Enable or disable the automatic post-connection extended certificate verification.

See X509Certificate::verify() for more information.

enableSessionCache

void enableSessionCache(
    bool flag = true
);

Enable or disable SSL/TLS session caching. For session caching to work, it must be enabled on the server, as well as on the client side.

The default is disabled session caching.

To enable session caching on the server side, use the two-argument version of this method to specify a session ID context.

enableSessionCache

void enableSessionCache(
    bool flag,
    const std::string & sessionIdContext
);

Enables or disables SSL/TLS session caching on the server. For session caching to work, it must be enabled on the server, as well as on the client side.

SessionIdContext contains the application's unique session ID context, which becomes part of each session identifier generated by the server within this context. SessionIdContext can be an arbitrary sequence of bytes with a maximum length of SSL_MAX_SSL_SESSION_ID_LENGTH.

A non-empty sessionIdContext should be specified even if session caching is disabled to avoid problems with clients requesting to reuse a session (e.g. Firefox 3.6).

This method may only be called on SERVER_USE Context objects.

extendedCertificateVerificationEnabled inline

bool extendedCertificateVerificationEnabled() const;

Returns true if and only if automatic extended certificate verification is enabled.

flushSessionCache

void flushSessionCache();

Flushes the SSL session cache on the server.

This method may only be called on SERVER_USE Context objets.

getSessionCacheSize

std::size_t getSessionCacheSize() const;

Returns the current maximum size of the server session cache.

This method may only be called on SERVER_USE Context objets.

getSessionTimeout

long getSessionTimeout() const;

Returns the timeout (in seconds) of cached sessions on the server.

This method may only be called on SERVER_USE Context objets.

isForServerUse inline

bool isForServerUse() const;

Returns true if and only if the context is for use by a server.

sessionCacheEnabled

bool sessionCacheEnabled() const;

Returns true if and only if the session cache is enabled.

setSessionCacheSize

void setSessionCacheSize(
    std::size_t size
);

Sets the maximum size of the server session cache, in number of sessions. The default size (according to OpenSSL documentation) is 1024*20, which may be too large for many applications, especially on embedded platforms with limited memory.

Specifying a size of 0 will set an unlimited cache size.

This method may only be called on SERVER_USE Context objets.

setSessionTimeout

void setSessionTimeout(
    long seconds
);

Sets the timeout (in seconds) of cached sessions on the server. A cached session will be removed from the cache if it has not been used for the given number of seconds.

This method may only be called on SERVER_USE Context objets.

sslContext inline

SSL_CTX * sslContext() const;

Returns the underlying OpenSSL SSL Context object.

usage inline

Usage usage() const;

Returns whether the context is for use by a client or by a server and whether TLSv1 is required.

useCertificate

void useCertificate(
    const Poco::Crypto::X509Certificate & certificate
);

Sets the certificate to be used by the Context.

To set-up a complete certificate chain, it might be necessary to call addChainCertificate() to specify additional certificates.

Note that useCertificate() must always be called before usePrivateKey().

usePrivateKey

void usePrivateKey(
    const Poco::Crypto::RSAKey & key
);

Sets the private key to be used by the Context.

Note that useCertificate() must always be called before usePrivateKey().

Note: If the private key is protected by a passphrase, a PrivateKeyPassphraseHandler must have been setup with the SSLManager, or the SSLManager's PrivateKeyPassphraseRequired event must be handled.

verificationMode inline

Context::VerificationMode verificationMode() const;

Returns the verification mode.