aboutsummaryrefslogtreecommitdiffstats
path: root/library/cpp/openssl/io/stream.cpp
diff options
context:
space:
mode:
authorsvshevtsov <svshevtsov@yandex-team.ru>2022-02-10 16:49:37 +0300
committerDaniil Cherednik <dcherednik@yandex-team.ru>2022-02-10 16:49:37 +0300
commit657337012a264721d58c470b4e9e796611f3c492 (patch)
tree82753fd92cf7cc2dea4e522a945ed570131f920b /library/cpp/openssl/io/stream.cpp
parent44f31b316af517a4fbc6a82ebed8a1c51807deac (diff)
downloadydb-657337012a264721d58c470b4e9e796611f3c492.tar.gz
Restoring authorship annotation for <svshevtsov@yandex-team.ru>. Commit 1 of 2.
Diffstat (limited to 'library/cpp/openssl/io/stream.cpp')
-rw-r--r--library/cpp/openssl/io/stream.cpp66
1 files changed, 33 insertions, 33 deletions
diff --git a/library/cpp/openssl/io/stream.cpp b/library/cpp/openssl/io/stream.cpp
index 0b4be38c0e..c24a1cf254 100644
--- a/library/cpp/openssl/io/stream.cpp
+++ b/library/cpp/openssl/io/stream.cpp
@@ -131,39 +131,39 @@ namespace {
Connect();
}
- inline TSslContextPtr CreateClientContext() {
- TSslContextPtr ctx = CreateSslCtx(SSLv23_client_method());
- if (ClientCert_) {
- if (!ClientCert_->CertificateFile_ || !ClientCert_->PrivateKeyFile_) {
- ythrow yexception() << "both client certificate and private key are required";
- }
- if (ClientCert_->PrivateKeyPassword_) {
- SSL_CTX_set_default_passwd_cb(ctx.Get(), [](char* buf, int size, int rwflag, void* userData) -> int {
- Y_UNUSED(rwflag);
- auto io = static_cast<TSslIO*>(userData);
- if (!io) {
- return -1;
- }
- if (size < static_cast<int>(io->ClientCert_->PrivateKeyPassword_.size())) {
- return -1;
- }
- return io->ClientCert_->PrivateKeyPassword_.copy(buf, size, 0);
- });
- SSL_CTX_set_default_passwd_cb_userdata(ctx.Get(), this);
- }
- if (1 != SSL_CTX_use_certificate_chain_file(ctx.Get(), ClientCert_->CertificateFile_.c_str())) {
- ythrow TSslError() << "SSL_CTX_use_certificate_chain_file";
- }
- if (1 != SSL_CTX_use_PrivateKey_file(ctx.Get(), ClientCert_->PrivateKeyFile_.c_str(), SSL_FILETYPE_PEM)) {
- ythrow TSslError() << "SSL_CTX_use_PrivateKey_file";
- }
- if (1 != SSL_CTX_check_private_key(ctx.Get())) {
- ythrow TSslError() << "SSL_CTX_check_private_key (client)";
- }
- }
- return ctx;
- }
-
+ inline TSslContextPtr CreateClientContext() {
+ TSslContextPtr ctx = CreateSslCtx(SSLv23_client_method());
+ if (ClientCert_) {
+ if (!ClientCert_->CertificateFile_ || !ClientCert_->PrivateKeyFile_) {
+ ythrow yexception() << "both client certificate and private key are required";
+ }
+ if (ClientCert_->PrivateKeyPassword_) {
+ SSL_CTX_set_default_passwd_cb(ctx.Get(), [](char* buf, int size, int rwflag, void* userData) -> int {
+ Y_UNUSED(rwflag);
+ auto io = static_cast<TSslIO*>(userData);
+ if (!io) {
+ return -1;
+ }
+ if (size < static_cast<int>(io->ClientCert_->PrivateKeyPassword_.size())) {
+ return -1;
+ }
+ return io->ClientCert_->PrivateKeyPassword_.copy(buf, size, 0);
+ });
+ SSL_CTX_set_default_passwd_cb_userdata(ctx.Get(), this);
+ }
+ if (1 != SSL_CTX_use_certificate_chain_file(ctx.Get(), ClientCert_->CertificateFile_.c_str())) {
+ ythrow TSslError() << "SSL_CTX_use_certificate_chain_file";
+ }
+ if (1 != SSL_CTX_use_PrivateKey_file(ctx.Get(), ClientCert_->PrivateKeyFile_.c_str(), SSL_FILETYPE_PEM)) {
+ ythrow TSslError() << "SSL_CTX_use_PrivateKey_file";
+ }
+ if (1 != SSL_CTX_check_private_key(ctx.Get())) {
+ ythrow TSslError() << "SSL_CTX_check_private_key (client)";
+ }
+ }
+ return ctx;
+ }
+
inline TSslPtr ConstructSsl() {
TSslPtr ssl(SSL_new(Ctx.Get()));