1 | {==============================================================================|
|
---|
2 | | Project : Ararat Synapse | 001.001.000 |
|
---|
3 | |==============================================================================|
|
---|
4 | | Content: SSL/SSH support by Peter Gutmann's CryptLib |
|
---|
5 | |==============================================================================|
|
---|
6 | | Copyright (c)1999-2005, Lukas Gebauer |
|
---|
7 | | All rights reserved. |
|
---|
8 | | |
|
---|
9 | | Redistribution and use in source and binary forms, with or without |
|
---|
10 | | modification, are permitted provided that the following conditions are met: |
|
---|
11 | | |
|
---|
12 | | Redistributions of source code must retain the above copyright notice, this |
|
---|
13 | | list of conditions and the following disclaimer. |
|
---|
14 | | |
|
---|
15 | | Redistributions in binary form must reproduce the above copyright notice, |
|
---|
16 | | this list of conditions and the following disclaimer in the documentation |
|
---|
17 | | and/or other materials provided with the distribution. |
|
---|
18 | | |
|
---|
19 | | Neither the name of Lukas Gebauer nor the names of its contributors may |
|
---|
20 | | be used to endorse or promote products derived from this software without |
|
---|
21 | | specific prior written permission. |
|
---|
22 | | |
|
---|
23 | | THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" |
|
---|
24 | | AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
|
---|
25 | | IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
|
---|
26 | | ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR |
|
---|
27 | | ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
|
---|
28 | | DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR |
|
---|
29 | | SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER |
|
---|
30 | | CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
|
---|
31 | | LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
|
---|
32 | | OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH |
|
---|
33 | | DAMAGE. |
|
---|
34 | |==============================================================================|
|
---|
35 | | The Initial Developer of the Original Code is Lukas Gebauer (Czech Republic).|
|
---|
36 | | Portions created by Lukas Gebauer are Copyright (c)2005. |
|
---|
37 | | All Rights Reserved. |
|
---|
38 | |==============================================================================|
|
---|
39 | | Contributor(s): |
|
---|
40 | |==============================================================================|
|
---|
41 | | History: see HISTORY.HTM from distribution package |
|
---|
42 | | (Found at URL: http://www.ararat.cz/synapse/) |
|
---|
43 | |==============================================================================}
|
---|
44 |
|
---|
45 | {:@abstract(SSL/SSH plugin for CryptLib)
|
---|
46 |
|
---|
47 | This plugin requires cl32.dll at least version 3.2.0! It can be used on Win32
|
---|
48 | and Linux. This library is staticly linked - when you compile your application
|
---|
49 | with this plugin, you MUST distribute it with Cryptib library, otherwise you
|
---|
50 | cannot run your application!
|
---|
51 |
|
---|
52 | It can work with keys and certificates stored as PKCS#15 only! It must be stored
|
---|
53 | as disk file only, you cannot load them from memory! Each file can hold multiple
|
---|
54 | keys and certificates. You must identify it by 'label' stored in
|
---|
55 | @link(TSSLCryptLib.PrivateKeyLabel).
|
---|
56 |
|
---|
57 | If you need to use secure connection and authorize self by certificate
|
---|
58 | (each SSL/TLS server or client with client authorization), then use
|
---|
59 | @link(TCustomSSL.PrivateKeyFile), @link(TSSLCryptLib.PrivateKeyLabel) and
|
---|
60 | @link(TCustomSSL.KeyPassword) properties.
|
---|
61 |
|
---|
62 | If you need to use server what verifying client certificates, then use
|
---|
63 | @link(TCustomSSL.CertCAFile) as PKCS#15 file with public keyas of allowed clients. Clients
|
---|
64 | with non-matching certificates will be rejected by cryptLib.
|
---|
65 |
|
---|
66 | This plugin is capable to create Ad-Hoc certificates. When you start SSL/TLS
|
---|
67 | server without explicitly assigned key and certificate, then this plugin create
|
---|
68 | Ad-Hoc key and certificate for each incomming connection by self. It slowdown
|
---|
69 | accepting of new connections!
|
---|
70 |
|
---|
71 | You can use this plugin for SSHv2 connections too! You must explicitly set
|
---|
72 | @link(TCustomSSL.SSLType) to value LT_SSHv2 and set @link(TCustomSSL.username)
|
---|
73 | and @link(TCustomSSL.password). You can use special SSH channels too, see
|
---|
74 | @link(TCustomSSL).
|
---|
75 | }
|
---|
76 |
|
---|
77 | {$IFDEF FPC}
|
---|
78 | {$MODE DELPHI}
|
---|
79 | {$ENDIF}
|
---|
80 | {$H+}
|
---|
81 |
|
---|
82 | unit ssl_cryptlib;
|
---|
83 |
|
---|
84 | interface
|
---|
85 |
|
---|
86 | uses
|
---|
87 | SysUtils,
|
---|
88 | blcksock, synsock, synautil, synacode,
|
---|
89 | cryptlib;
|
---|
90 |
|
---|
91 | type
|
---|
92 | {:@abstract(class implementing CryptLib SSL/SSH plugin.)
|
---|
93 | Instance of this class will be created for each @link(TTCPBlockSocket).
|
---|
94 | You not need to create instance of this class, all is done by Synapse itself!}
|
---|
95 | TSSLCryptLib = class(TCustomSSL)
|
---|
96 | protected
|
---|
97 | FCryptSession: CRYPT_SESSION;
|
---|
98 | FPrivateKeyLabel: string;
|
---|
99 | FDelCert: Boolean;
|
---|
100 | FReadBuffer: string;
|
---|
101 | function SSLCheck(Value: integer): Boolean;
|
---|
102 | function Init(server:Boolean): Boolean;
|
---|
103 | function DeInit: Boolean;
|
---|
104 | function Prepare(server:Boolean): Boolean;
|
---|
105 | function GetString(const cryptHandle: CRYPT_HANDLE; const attributeType: CRYPT_ATTRIBUTE_TYPE): string;
|
---|
106 | function CreateSelfSignedCert(Host: string): Boolean; override;
|
---|
107 | function PopAll: string;
|
---|
108 | public
|
---|
109 | {:See @inherited}
|
---|
110 | constructor Create(const Value: TTCPBlockSocket); override;
|
---|
111 | destructor Destroy; override;
|
---|
112 | {:See @inherited}
|
---|
113 | function LibVersion: String; override;
|
---|
114 | {:See @inherited}
|
---|
115 | function LibName: String; override;
|
---|
116 | {:See @inherited}
|
---|
117 | procedure Assign(const Value: TCustomSSL); override;
|
---|
118 | {:See @inherited and @link(ssl_cryptlib) for more details.}
|
---|
119 | function Connect: boolean; override;
|
---|
120 | {:See @inherited and @link(ssl_cryptlib) for more details.}
|
---|
121 | function Accept: boolean; override;
|
---|
122 | {:See @inherited}
|
---|
123 | function Shutdown: boolean; override;
|
---|
124 | {:See @inherited}
|
---|
125 | function BiShutdown: boolean; override;
|
---|
126 | {:See @inherited}
|
---|
127 | function SendBuffer(Buffer: TMemory; Len: Integer): Integer; override;
|
---|
128 | {:See @inherited}
|
---|
129 | function RecvBuffer(Buffer: TMemory; Len: Integer): Integer; override;
|
---|
130 | {:See @inherited}
|
---|
131 | function WaitingData: Integer; override;
|
---|
132 | {:See @inherited}
|
---|
133 | function GetSSLVersion: string; override;
|
---|
134 | {:See @inherited}
|
---|
135 | function GetPeerSubject: string; override;
|
---|
136 | {:See @inherited}
|
---|
137 | function GetPeerIssuer: string; override;
|
---|
138 | {:See @inherited}
|
---|
139 | function GetPeerName: string; override;
|
---|
140 | {:See @inherited}
|
---|
141 | function GetPeerFingerprint: string; override;
|
---|
142 | published
|
---|
143 | {:name of certificate/key within PKCS#15 file. It can hold more then one
|
---|
144 | certificate/key and each certificate/key must have unique label within one file.}
|
---|
145 | property PrivateKeyLabel: string read FPrivateKeyLabel Write FPrivateKeyLabel;
|
---|
146 | end;
|
---|
147 |
|
---|
148 | implementation
|
---|
149 |
|
---|
150 | {==============================================================================}
|
---|
151 |
|
---|
152 | constructor TSSLCryptLib.Create(const Value: TTCPBlockSocket);
|
---|
153 | begin
|
---|
154 | inherited Create(Value);
|
---|
155 | FcryptSession := CRYPT_SESSION(CRYPT_SESSION_NONE);
|
---|
156 | FPrivateKeyLabel := 'synapse';
|
---|
157 | FDelCert := false;
|
---|
158 | end;
|
---|
159 |
|
---|
160 | destructor TSSLCryptLib.Destroy;
|
---|
161 | begin
|
---|
162 | DeInit;
|
---|
163 | inherited Destroy;
|
---|
164 | end;
|
---|
165 |
|
---|
166 | procedure TSSLCryptLib.Assign(const Value: TCustomSSL);
|
---|
167 | begin
|
---|
168 | inherited Assign(Value);
|
---|
169 | if Value is TSSLCryptLib then
|
---|
170 | begin
|
---|
171 | FPrivateKeyLabel := TSSLCryptLib(Value).privatekeyLabel;
|
---|
172 | end;
|
---|
173 | end;
|
---|
174 |
|
---|
175 | function TSSLCryptLib.GetString(const cryptHandle: CRYPT_HANDLE; const attributeType: CRYPT_ATTRIBUTE_TYPE): string;
|
---|
176 | var
|
---|
177 | l: integer;
|
---|
178 | begin
|
---|
179 | l := 0;
|
---|
180 | cryptGetAttributeString(cryptHandle, attributeType, nil, l);
|
---|
181 | setlength(Result, l);
|
---|
182 | cryptGetAttributeString(cryptHandle, attributeType, pointer(Result), l);
|
---|
183 | setlength(Result, l);
|
---|
184 | end;
|
---|
185 |
|
---|
186 | function TSSLCryptLib.LibVersion: String;
|
---|
187 | var
|
---|
188 | x: integer;
|
---|
189 | begin
|
---|
190 | Result := GetString(CRYPT_UNUSED, CRYPT_OPTION_INFO_DESCRIPTION);
|
---|
191 | cryptGetAttribute(CRYPT_UNUSED, CRYPT_OPTION_INFO_MAJORVERSION, x);
|
---|
192 | Result := Result + ' v' + IntToStr(x);
|
---|
193 | cryptGetAttribute(CRYPT_UNUSED, CRYPT_OPTION_INFO_MINORVERSION, x);
|
---|
194 | Result := Result + '.' + IntToStr(x);
|
---|
195 | cryptGetAttribute(CRYPT_UNUSED, CRYPT_OPTION_INFO_STEPPING, x);
|
---|
196 | Result := Result + '.' + IntToStr(x);
|
---|
197 | end;
|
---|
198 |
|
---|
199 | function TSSLCryptLib.LibName: String;
|
---|
200 | begin
|
---|
201 | Result := 'ssl_cryptlib';
|
---|
202 | end;
|
---|
203 |
|
---|
204 | function TSSLCryptLib.SSLCheck(Value: integer): Boolean;
|
---|
205 | begin
|
---|
206 | Result := true;
|
---|
207 | FLastErrorDesc := '';
|
---|
208 | if Value = CRYPT_ERROR_COMPLETE then
|
---|
209 | Value := 0;
|
---|
210 | FLastError := Value;
|
---|
211 | if FLastError <> 0 then
|
---|
212 | begin
|
---|
213 | Result := False;
|
---|
214 | FLastErrorDesc := GetString(FCryptSession, CRYPT_ATTRIBUTE_INT_ERRORMESSAGE);
|
---|
215 | end;
|
---|
216 | end;
|
---|
217 |
|
---|
218 | function TSSLCryptLib.CreateSelfSignedCert(Host: string): Boolean;
|
---|
219 | var
|
---|
220 | privateKey: CRYPT_CONTEXT;
|
---|
221 | keyset: CRYPT_KEYSET;
|
---|
222 | cert: CRYPT_CERTIFICATE;
|
---|
223 | publicKey: CRYPT_CONTEXT;
|
---|
224 | begin
|
---|
225 | Result := False;
|
---|
226 | if FPrivatekeyFile = '' then
|
---|
227 | FPrivatekeyFile := GetTempFile('', 'key');
|
---|
228 | cryptCreateContext(privateKey, CRYPT_UNUSED, CRYPT_ALGO_RSA);
|
---|
229 | cryptSetAttributeString(privateKey, CRYPT_CTXINFO_LABEL, Pointer(FPrivatekeyLabel),
|
---|
230 | Length(FPrivatekeyLabel));
|
---|
231 | cryptSetAttribute(privateKey, CRYPT_CTXINFO_KEYSIZE, 1024);
|
---|
232 | cryptGenerateKey(privateKey);
|
---|
233 | cryptKeysetOpen(keyset, CRYPT_UNUSED, CRYPT_KEYSET_FILE, PChar(FPrivatekeyFile), CRYPT_KEYOPT_CREATE);
|
---|
234 | FDelCert := True;
|
---|
235 | cryptAddPrivateKey(keyset, privateKey, PChar(FKeyPassword));
|
---|
236 | cryptCreateCert(cert, CRYPT_UNUSED, CRYPT_CERTTYPE_CERTIFICATE);
|
---|
237 | cryptSetAttribute(cert, CRYPT_CERTINFO_XYZZY, 1);
|
---|
238 | cryptGetPublicKey(keyset, publicKey, CRYPT_KEYID_NAME, PChar(FPrivatekeyLabel));
|
---|
239 | cryptSetAttribute(cert, CRYPT_CERTINFO_SUBJECTPUBLICKEYINFO, publicKey);
|
---|
240 | cryptSetAttributeString(cert, CRYPT_CERTINFO_COMMONNAME, Pointer(host), Length(host));
|
---|
241 | cryptSignCert(cert, privateKey);
|
---|
242 | cryptAddPublicKey(keyset, cert);
|
---|
243 | cryptKeysetClose(keyset);
|
---|
244 | cryptDestroyCert(cert);
|
---|
245 | cryptDestroyContext(privateKey);
|
---|
246 | cryptDestroyContext(publicKey);
|
---|
247 | Result := True;
|
---|
248 | end;
|
---|
249 |
|
---|
250 | function TSSLCryptLib.PopAll: string;
|
---|
251 | const
|
---|
252 | BufferMaxSize = 32768;
|
---|
253 | var
|
---|
254 | Outbuffer: string;
|
---|
255 | WriteLen: integer;
|
---|
256 | begin
|
---|
257 | Result := '';
|
---|
258 | repeat
|
---|
259 | setlength(outbuffer, BufferMaxSize);
|
---|
260 | Writelen := 0;
|
---|
261 | SSLCheck(CryptPopData(FCryptSession, @OutBuffer[1], BufferMaxSize, Writelen));
|
---|
262 | if FLastError <> 0 then
|
---|
263 | Break;
|
---|
264 | if WriteLen > 0 then
|
---|
265 | begin
|
---|
266 | setlength(outbuffer, WriteLen);
|
---|
267 | Result := Result + outbuffer;
|
---|
268 | end;
|
---|
269 | until WriteLen = 0;
|
---|
270 | end;
|
---|
271 |
|
---|
272 | function TSSLCryptLib.Init(server:Boolean): Boolean;
|
---|
273 | var
|
---|
274 | st: CRYPT_SESSION_TYPE;
|
---|
275 | keysetobj: CRYPT_KEYSET;
|
---|
276 | cryptContext: CRYPT_CONTEXT;
|
---|
277 | x: integer;
|
---|
278 | begin
|
---|
279 | Result := False;
|
---|
280 | FLastErrorDesc := '';
|
---|
281 | FLastError := 0;
|
---|
282 | FDelCert := false;
|
---|
283 | FcryptSession := CRYPT_SESSION(CRYPT_SESSION_NONE);
|
---|
284 | if server then
|
---|
285 | case FSSLType of
|
---|
286 | LT_all, LT_SSLv3, LT_TLSv1, LT_TLSv1_1:
|
---|
287 | st := CRYPT_SESSION_SSL_SERVER;
|
---|
288 | LT_SSHv2:
|
---|
289 | st := CRYPT_SESSION_SSH_SERVER;
|
---|
290 | else
|
---|
291 | Exit;
|
---|
292 | end
|
---|
293 | else
|
---|
294 | case FSSLType of
|
---|
295 | LT_all, LT_SSLv3, LT_TLSv1, LT_TLSv1_1:
|
---|
296 | st := CRYPT_SESSION_SSL;
|
---|
297 | LT_SSHv2:
|
---|
298 | st := CRYPT_SESSION_SSH;
|
---|
299 | else
|
---|
300 | Exit;
|
---|
301 | end;
|
---|
302 | if not SSLCheck(cryptCreateSession(FcryptSession, CRYPT_UNUSED, st)) then
|
---|
303 | Exit;
|
---|
304 | x := -1;
|
---|
305 | case FSSLType of
|
---|
306 | LT_SSLv3:
|
---|
307 | x := 0;
|
---|
308 | LT_TLSv1:
|
---|
309 | x := 1;
|
---|
310 | LT_TLSv1_1:
|
---|
311 | x := 2;
|
---|
312 | end;
|
---|
313 | if x >= 0 then
|
---|
314 | if not SSLCheck(cryptSetAttribute(FCryptSession, CRYPT_SESSINFO_VERSION, x)) then
|
---|
315 | Exit;
|
---|
316 | if FUsername <> '' then
|
---|
317 | begin
|
---|
318 | cryptSetAttributeString(FcryptSession, CRYPT_SESSINFO_USERNAME,
|
---|
319 | Pointer(FUsername), Length(FUsername));
|
---|
320 | cryptSetAttributeString(FcryptSession, CRYPT_SESSINFO_PASSWORD,
|
---|
321 | Pointer(FPassword), Length(FPassword));
|
---|
322 | end;
|
---|
323 | if FSSLType = LT_SSHv2 then
|
---|
324 | if FSSHChannelType <> '' then
|
---|
325 | begin
|
---|
326 | cryptSetAttribute(FCryptSession, CRYPT_SESSINFO_SSH_CHANNEL, CRYPT_UNUSED);
|
---|
327 | cryptSetAttributeString(FCryptSession, CRYPT_SESSINFO_SSH_CHANNEL_TYPE,
|
---|
328 | Pointer(FSSHChannelType), Length(FSSHChannelType));
|
---|
329 | if FSSHChannelArg1 <> '' then
|
---|
330 | cryptSetAttributeString(FCryptSession, CRYPT_SESSINFO_SSH_CHANNEL_ARG1,
|
---|
331 | Pointer(FSSHChannelArg1), Length(FSSHChannelArg1));
|
---|
332 | if FSSHChannelArg2 <> '' then
|
---|
333 | cryptSetAttributeString(FCryptSession, CRYPT_SESSINFO_SSH_CHANNEL_ARG2,
|
---|
334 | Pointer(FSSHChannelArg2), Length(FSSHChannelArg2));
|
---|
335 | end;
|
---|
336 |
|
---|
337 |
|
---|
338 | if server and (FPrivatekeyFile = '') then
|
---|
339 | begin
|
---|
340 | if FPrivatekeyLabel = '' then
|
---|
341 | FPrivatekeyLabel := 'synapse';
|
---|
342 | if FkeyPassword = '' then
|
---|
343 | FkeyPassword := 'synapse';
|
---|
344 | CreateSelfSignedcert(FSocket.ResolveIPToName(FSocket.GetRemoteSinIP));
|
---|
345 | end;
|
---|
346 |
|
---|
347 | if (FPrivatekeyLabel <> '') and (FPrivatekeyFile <> '') then
|
---|
348 | begin
|
---|
349 | if not SSLCheck(cryptKeysetOpen(KeySetObj, CRYPT_UNUSED, CRYPT_KEYSET_FILE,
|
---|
350 | PChar(FPrivatekeyFile), CRYPT_KEYOPT_READONLY)) then
|
---|
351 | Exit;
|
---|
352 | try
|
---|
353 | if not SSLCheck(cryptGetPrivateKey(KeySetObj, cryptcontext, CRYPT_KEYID_NAME,
|
---|
354 | PChar(FPrivatekeyLabel), PChar(FKeyPassword))) then
|
---|
355 | Exit;
|
---|
356 | if not SSLCheck(cryptSetAttribute(FcryptSession, CRYPT_SESSINFO_PRIVATEKEY,
|
---|
357 | cryptcontext)) then
|
---|
358 | Exit;
|
---|
359 | finally
|
---|
360 | cryptKeysetClose(keySetObj);
|
---|
361 | cryptDestroyContext(cryptcontext);
|
---|
362 | end;
|
---|
363 | end;
|
---|
364 | if server and FVerifyCert then
|
---|
365 | begin
|
---|
366 | if not SSLCheck(cryptKeysetOpen(KeySetObj, CRYPT_UNUSED, CRYPT_KEYSET_FILE,
|
---|
367 | PChar(FCertCAFile), CRYPT_KEYOPT_READONLY)) then
|
---|
368 | Exit;
|
---|
369 | try
|
---|
370 | if not SSLCheck(cryptSetAttribute(FcryptSession, CRYPT_SESSINFO_KEYSET,
|
---|
371 | keySetObj)) then
|
---|
372 | Exit;
|
---|
373 | finally
|
---|
374 | cryptKeysetClose(keySetObj);
|
---|
375 | end;
|
---|
376 | end;
|
---|
377 | Result := true;
|
---|
378 | end;
|
---|
379 |
|
---|
380 | function TSSLCryptLib.DeInit: Boolean;
|
---|
381 | begin
|
---|
382 | Result := True;
|
---|
383 | if FcryptSession <> CRYPT_SESSION(CRYPT_SESSION_NONE) then
|
---|
384 | CryptDestroySession(FcryptSession);
|
---|
385 | FcryptSession := CRYPT_SESSION(CRYPT_SESSION_NONE);
|
---|
386 | FSSLEnabled := False;
|
---|
387 | if FDelCert then
|
---|
388 | Deletefile(FPrivatekeyFile);
|
---|
389 | end;
|
---|
390 |
|
---|
391 | function TSSLCryptLib.Prepare(server:Boolean): Boolean;
|
---|
392 | begin
|
---|
393 | Result := false;
|
---|
394 | DeInit;
|
---|
395 | if Init(server) then
|
---|
396 | Result := true
|
---|
397 | else
|
---|
398 | DeInit;
|
---|
399 | end;
|
---|
400 |
|
---|
401 | function TSSLCryptLib.Connect: boolean;
|
---|
402 | begin
|
---|
403 | Result := False;
|
---|
404 | if FSocket.Socket = INVALID_SOCKET then
|
---|
405 | Exit;
|
---|
406 | if Prepare(false) then
|
---|
407 | begin
|
---|
408 | if not SSLCheck(cryptSetAttribute(FCryptSession, CRYPT_SESSINFO_NETWORKSOCKET, FSocket.Socket)) then
|
---|
409 | Exit;
|
---|
410 | if not SSLCheck(cryptSetAttribute(FCryptSession, CRYPT_SESSINFO_ACTIVE, 1)) then
|
---|
411 | Exit;
|
---|
412 | FSSLEnabled := True;
|
---|
413 | Result := True;
|
---|
414 | FReadBuffer := '';
|
---|
415 | end;
|
---|
416 | end;
|
---|
417 |
|
---|
418 | function TSSLCryptLib.Accept: boolean;
|
---|
419 | begin
|
---|
420 | Result := False;
|
---|
421 | if FSocket.Socket = INVALID_SOCKET then
|
---|
422 | Exit;
|
---|
423 | if Prepare(true) then
|
---|
424 | begin
|
---|
425 | if not SSLCheck(cryptSetAttribute(FCryptSession, CRYPT_SESSINFO_NETWORKSOCKET, FSocket.Socket)) then
|
---|
426 | Exit;
|
---|
427 | if not SSLCheck(cryptSetAttribute(FCryptSession, CRYPT_SESSINFO_ACTIVE, 1)) then
|
---|
428 | Exit;
|
---|
429 | FSSLEnabled := True;
|
---|
430 | Result := True;
|
---|
431 | FReadBuffer := '';
|
---|
432 | end;
|
---|
433 | end;
|
---|
434 |
|
---|
435 | function TSSLCryptLib.Shutdown: boolean;
|
---|
436 | begin
|
---|
437 | Result := BiShutdown;
|
---|
438 | end;
|
---|
439 |
|
---|
440 | function TSSLCryptLib.BiShutdown: boolean;
|
---|
441 | begin
|
---|
442 | if FcryptSession <> CRYPT_SESSION(CRYPT_SESSION_NONE) then
|
---|
443 | cryptSetAttribute(FCryptSession, CRYPT_SESSINFO_ACTIVE, 0);
|
---|
444 | DeInit;
|
---|
445 | FReadBuffer := '';
|
---|
446 | Result := True;
|
---|
447 | end;
|
---|
448 |
|
---|
449 | function TSSLCryptLib.SendBuffer(Buffer: TMemory; Len: Integer): Integer;
|
---|
450 | var
|
---|
451 | l: integer;
|
---|
452 | begin
|
---|
453 | FLastError := 0;
|
---|
454 | FLastErrorDesc := '';
|
---|
455 | SSLCheck(cryptPushData(FCryptSession, Buffer, Len, L));
|
---|
456 | cryptFlushData(FcryptSession);
|
---|
457 | Result := l;
|
---|
458 | end;
|
---|
459 |
|
---|
460 | function TSSLCryptLib.RecvBuffer(Buffer: TMemory; Len: Integer): Integer;
|
---|
461 | var
|
---|
462 | l: integer;
|
---|
463 | begin
|
---|
464 | FLastError := 0;
|
---|
465 | FLastErrorDesc := '';
|
---|
466 | if Length(FReadBuffer) = 0 then
|
---|
467 | FReadBuffer := PopAll;
|
---|
468 | if Len > Length(FReadBuffer) then
|
---|
469 | Len := Length(FReadBuffer);
|
---|
470 | Move(Pointer(FReadBuffer)^, buffer^, Len);
|
---|
471 | Delete(FReadBuffer, 1, Len);
|
---|
472 | Result := Len;
|
---|
473 | end;
|
---|
474 |
|
---|
475 | function TSSLCryptLib.WaitingData: Integer;
|
---|
476 | begin
|
---|
477 | Result := Length(FReadBuffer);
|
---|
478 | end;
|
---|
479 |
|
---|
480 | function TSSLCryptLib.GetSSLVersion: string;
|
---|
481 | var
|
---|
482 | x: integer;
|
---|
483 | begin
|
---|
484 | Result := '';
|
---|
485 | if FcryptSession = CRYPT_SESSION(CRYPT_SESSION_NONE) then
|
---|
486 | Exit;
|
---|
487 | cryptGetAttribute(FCryptSession, CRYPT_SESSINFO_VERSION, x);
|
---|
488 | if FSSLType in [LT_SSLv3, LT_TLSv1, LT_TLSv1_1, LT_all] then
|
---|
489 | case x of
|
---|
490 | 0:
|
---|
491 | Result := 'SSLv3';
|
---|
492 | 1:
|
---|
493 | Result := 'TLSv1';
|
---|
494 | 2:
|
---|
495 | Result := 'TLSv1.1';
|
---|
496 | end;
|
---|
497 | if FSSLType in [LT_SSHv2] then
|
---|
498 | case x of
|
---|
499 | 0:
|
---|
500 | Result := 'SSHv1';
|
---|
501 | 1:
|
---|
502 | Result := 'SSHv2';
|
---|
503 | end;
|
---|
504 | end;
|
---|
505 |
|
---|
506 | function TSSLCryptLib.GetPeerSubject: string;
|
---|
507 | var
|
---|
508 | cert: CRYPT_CERTIFICATE;
|
---|
509 | begin
|
---|
510 | Result := '';
|
---|
511 | if FcryptSession = CRYPT_SESSION(CRYPT_SESSION_NONE) then
|
---|
512 | Exit;
|
---|
513 | cryptGetAttribute(FCryptSession, CRYPT_SESSINFO_RESPONSE, cert);
|
---|
514 | cryptSetAttribute(cert, CRYPT_CERTINFO_SUBJECTNAME, CRYPT_UNUSED);
|
---|
515 | Result := GetString(cert, CRYPT_CERTINFO_DN);
|
---|
516 | cryptDestroyCert(cert);
|
---|
517 | end;
|
---|
518 |
|
---|
519 | function TSSLCryptLib.GetPeerName: string;
|
---|
520 | var
|
---|
521 | cert: CRYPT_CERTIFICATE;
|
---|
522 | begin
|
---|
523 | Result := '';
|
---|
524 | if FcryptSession = CRYPT_SESSION(CRYPT_SESSION_NONE) then
|
---|
525 | Exit;
|
---|
526 | cryptGetAttribute(FCryptSession, CRYPT_SESSINFO_RESPONSE, cert);
|
---|
527 | cryptSetAttribute(cert, CRYPT_CERTINFO_ISSUERNAME, CRYPT_UNUSED);
|
---|
528 | Result := GetString(cert, CRYPT_CERTINFO_COMMONNAME);
|
---|
529 | cryptDestroyCert(cert);
|
---|
530 | end;
|
---|
531 |
|
---|
532 | function TSSLCryptLib.GetPeerIssuer: string;
|
---|
533 | var
|
---|
534 | cert: CRYPT_CERTIFICATE;
|
---|
535 | begin
|
---|
536 | Result := '';
|
---|
537 | if FcryptSession = CRYPT_SESSION(CRYPT_SESSION_NONE) then
|
---|
538 | Exit;
|
---|
539 | cryptGetAttribute(FCryptSession, CRYPT_SESSINFO_RESPONSE, cert);
|
---|
540 | cryptSetAttribute(cert, CRYPT_CERTINFO_ISSUERNAME, CRYPT_UNUSED);
|
---|
541 | Result := GetString(cert, CRYPT_CERTINFO_DN);
|
---|
542 | cryptDestroyCert(cert);
|
---|
543 | end;
|
---|
544 |
|
---|
545 | function TSSLCryptLib.GetPeerFingerprint: string;
|
---|
546 | var
|
---|
547 | cert: CRYPT_CERTIFICATE;
|
---|
548 | begin
|
---|
549 | Result := '';
|
---|
550 | if FcryptSession = CRYPT_SESSION(CRYPT_SESSION_NONE) then
|
---|
551 | Exit;
|
---|
552 | cryptGetAttribute(FCryptSession, CRYPT_SESSINFO_RESPONSE, cert);
|
---|
553 | Result := GetString(cert, CRYPT_CERTINFO_FINGERPRINT);
|
---|
554 | Result := MD5(Result);
|
---|
555 | cryptDestroyCert(cert);
|
---|
556 | end;
|
---|
557 |
|
---|
558 | {==============================================================================}
|
---|
559 |
|
---|
560 | initialization
|
---|
561 | if cryptInit = CRYPT_OK then
|
---|
562 | SSLImplementation := TSSLCryptLib;
|
---|
563 | cryptAddRandom(nil, CRYPT_RANDOM_SLOWPOLL);
|
---|
564 |
|
---|
565 | finalization
|
---|
566 | cryptEnd;
|
---|
567 |
|
---|
568 | end.
|
---|
569 |
|
---|