vn-verdnaturachat/ios/Pods/Flipper-Folly/folly/ssl/detail/SSLSessionImpl.cpp

111 lines
2.8 KiB
C++
Raw Normal View History

/*
* Copyright (c) Facebook, Inc. and its affiliates.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <folly/ssl/detail/SSLSessionImpl.h>
#include <glog/logging.h>
#include <folly/portability/OpenSSL.h>
#include <folly/ssl/OpenSSLVersionFinder.h>
namespace folly {
namespace ssl {
namespace detail {
//
// Wrapper OpenSSL 1.0.2 (and possibly 1.0.1)
//
SSLSessionImpl::SSLSessionImpl(SSL_SESSION* session, bool takeOwnership)
: session_(session) {
if (session_ == nullptr) {
throw std::runtime_error("SSL_SESSION is null");
}
// If we're not given ownership, we need to up the refcount so the SSL_SESSION
// object won't be freed while SSLSessionImpl is alive
if (!takeOwnership) {
upRef();
}
}
SSLSessionImpl::SSLSessionImpl(const std::string& serializedSession) {
auto sessionData =
reinterpret_cast<const unsigned char*>(serializedSession.data());
auto longLen = long(serializedSession.length());
if ((session_ = d2i_SSL_SESSION(nullptr, &sessionData, longLen)) == nullptr) {
throw std::runtime_error("Cannot deserialize SSLSession string");
}
}
SSLSessionImpl::~SSLSessionImpl() {
downRef();
}
std::string SSLSessionImpl::serialize() const {
std::string ret;
// Get the length first, then we know how much space to allocate.
auto len = i2d_SSL_SESSION(session_, nullptr);
if (len > 0) {
std::unique_ptr<unsigned char[]> uptr(new unsigned char[size_t(len)]);
auto p = uptr.get();
auto written = i2d_SSL_SESSION(session_, &p);
if (written <= 0) {
VLOG(2) << "Could not serialize SSL_SESSION!";
} else {
ret.assign(uptr.get(), uptr.get() + written);
}
}
return ret;
}
std::string SSLSessionImpl::getSessionID() const {
std::string ret;
if (session_) {
const unsigned char* ptr = nullptr;
unsigned int len = 0;
ptr = SSL_SESSION_get_id(session_, &len);
ret.assign(ptr, ptr + len);
}
return ret;
}
const SSL_SESSION* SSLSessionImpl::getRawSSLSession() const {
return const_cast<SSL_SESSION*>(session_);
}
SSL_SESSION* SSLSessionImpl::getRawSSLSessionDangerous() {
upRef();
return session_;
}
void SSLSessionImpl::upRef() {
if (session_) {
SSL_SESSION_up_ref(session_);
}
}
void SSLSessionImpl::downRef() {
if (session_) {
SSL_SESSION_free(session_);
}
}
} // namespace detail
} // namespace ssl
} // namespace folly