| /*************************************************************************** |
| * _ _ ____ _ |
| * Project ___| | | | _ \| | |
| * / __| | | | |_) | | |
| * | (__| |_| | _ <| |___ |
| * \___|\___/|_| \_\_____| |
| * |
| * Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al. |
| * |
| * This software is licensed as described in the file COPYING, which |
| * you should have received as part of this distribution. The terms |
| * are also available at https://curl.se/docs/copyright.html. |
| * |
| * You may opt to use, copy, modify, merge, publish, distribute and/or sell |
| * copies of the Software, and permit persons to whom the Software is |
| * furnished to do so, under the terms of the COPYING file. |
| * |
| * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY |
| * KIND, either express or implied. |
| * |
| * SPDX-License-Identifier: curl |
| * |
| ***************************************************************************/ |
| /* <DESC> |
| * CA cert in memory with OpenSSL to get an HTTPS page. |
| * </DESC> |
| */ |
| |
| /* Requires: USE_OPENSSL */ |
| |
| #include <openssl/err.h> |
| #include <openssl/ssl.h> |
| |
| #include <stdio.h> |
| |
| #include <curl/curl.h> |
| |
| #if defined(__GNUC__) || defined(__clang__) |
| #pragma GCC diagnostic ignored "-Woverlength-strings" |
| #endif |
| /* Silence warning when calling sk_X509_INFO_pop_free() */ |
| #if defined(__clang__) && __clang_major__ >= 16 |
| #pragma clang diagnostic push |
| #pragma clang diagnostic ignored "-Wcast-function-type-strict" |
| #endif |
| |
| #if defined(OPENSSL_IS_BORINGSSL) || defined(OPENSSL_IS_AWSLC) |
| typedef size_t ossl_valsize_t; |
| #else |
| typedef int ossl_valsize_t; |
| #endif |
| |
| static size_t write_cb(void *ptr, size_t size, size_t nmemb, void *stream) |
| { |
| fwrite(ptr, size, nmemb, (FILE *)stream); |
| return nmemb * size; |
| } |
| |
| static CURLcode sslctx_function(CURL *curl, void *sslctx, void *pointer) |
| { |
| /** This example uses two (fake) certificates **/ |
| /* replace the XXX with the actual CA certificates */ |
| static const char mypem[] = |
| "-----BEGIN CERTIFICATE-----\n" |
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n" |
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n" |
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n" |
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n" |
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n" |
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n" |
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n" |
| "-----END CERTIFICATE-----\n" |
| "-----BEGIN CERTIFICATE-----\n" |
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n" |
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n" |
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n" |
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n" |
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n" |
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n" |
| "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n" |
| "-----END CERTIFICATE-----\n"; |
| |
| BIO *cbio = BIO_new_mem_buf(mypem, sizeof(mypem)); |
| X509_STORE *cts = SSL_CTX_get_cert_store((SSL_CTX *)sslctx); |
| ossl_valsize_t i; |
| STACK_OF(X509_INFO) * inf; |
| |
| (void)curl; |
| (void)pointer; |
| |
| if(!cts || !cbio) { |
| return CURLE_ABORTED_BY_CALLBACK; |
| } |
| |
| inf = PEM_X509_INFO_read_bio(cbio, NULL, NULL, NULL); |
| |
| if(!inf) { |
| BIO_free(cbio); |
| return CURLE_ABORTED_BY_CALLBACK; |
| } |
| |
| for(i = 0; i < sk_X509_INFO_num(inf); i++) { |
| X509_INFO *itmp = sk_X509_INFO_value(inf, i); |
| if(itmp->x509) { |
| X509_STORE_add_cert(cts, itmp->x509); |
| } |
| if(itmp->crl) { |
| X509_STORE_add_crl(cts, itmp->crl); |
| } |
| } |
| |
| sk_X509_INFO_pop_free(inf, X509_INFO_free); |
| BIO_free(cbio); |
| |
| return CURLE_OK; |
| } |
| |
| int main(void) |
| { |
| CURL *curl; |
| |
| CURLcode res = curl_global_init(CURL_GLOBAL_ALL); |
| if(res) |
| return (int)res; |
| |
| curl = curl_easy_init(); |
| if(curl) { |
| curl_easy_setopt(curl, CURLOPT_VERBOSE, 0L); |
| curl_easy_setopt(curl, CURLOPT_HEADER, 0L); |
| curl_easy_setopt(curl, CURLOPT_NOPROGRESS, 1L); |
| curl_easy_setopt(curl, CURLOPT_NOSIGNAL, 1L); |
| curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, write_cb); |
| curl_easy_setopt(curl, CURLOPT_WRITEDATA, stdout); |
| curl_easy_setopt(curl, CURLOPT_HEADERFUNCTION, write_cb); |
| curl_easy_setopt(curl, CURLOPT_HEADERDATA, stderr); |
| curl_easy_setopt(curl, CURLOPT_SSLCERTTYPE, "PEM"); |
| curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, 1L); |
| curl_easy_setopt(curl, CURLOPT_URL, "https://www.example.com/"); |
| |
| /* Turn off the default CA locations, otherwise libcurl loads CA |
| * certificates from the locations that were detected/specified at |
| * build-time |
| */ |
| curl_easy_setopt(curl, CURLOPT_CAINFO, NULL); |
| curl_easy_setopt(curl, CURLOPT_CAPATH, NULL); |
| |
| /* first try: retrieve page without ca certificates -> should fail |
| * unless libcurl was built --with-ca-fallback enabled at build-time |
| */ |
| res = curl_easy_perform(curl); |
| if(res == CURLE_OK) |
| printf("*** transfer succeeded ***\n"); |
| else |
| printf("*** transfer failed ***\n"); |
| |
| /* use a fresh connection (optional) this option seriously impacts |
| * performance of multiple transfers but it is necessary order to |
| * demonstrate this example. recall that the ssl ctx callback is only |
| * called _before_ an SSL connection is established, therefore it does not |
| * affect existing verified SSL connections already in the connection |
| * cache associated with this handle. normally you would set the ssl ctx |
| * function before making any transfers, and not use this option. |
| */ |
| curl_easy_setopt(curl, CURLOPT_FRESH_CONNECT, 1L); |
| |
| /* second try: retrieve page using cacerts' certificate -> succeeds to |
| * load the certificate by installing a function doing the necessary |
| * "modifications" to the SSL CONTEXT just before link init |
| */ |
| curl_easy_setopt(curl, CURLOPT_SSL_CTX_FUNCTION, sslctx_function); |
| res = curl_easy_perform(curl); |
| if(res == CURLE_OK) |
| printf("*** transfer succeeded ***\n"); |
| else |
| printf("*** transfer failed ***\n"); |
| |
| curl_easy_cleanup(curl); |
| } |
| curl_global_cleanup(); |
| return (int)res; |
| } |