⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 tlslayer.h

📁 转化为DIB位图再显示出来的dicom文件C++代码
💻 H
字号:
/* * *  Copyright (C) 1998-2005, OFFIS * *  This software and supporting documentation were developed by * *    Kuratorium OFFIS e.V. *    Healthcare Information and Communication Systems *    Escherweg 2 *    D-26121 Oldenburg, Germany * *  THIS SOFTWARE IS MADE AVAILABLE,  AS IS,  AND OFFIS MAKES NO  WARRANTY *  REGARDING  THE  SOFTWARE,  ITS  PERFORMANCE,  ITS  MERCHANTABILITY  OR *  FITNESS FOR ANY PARTICULAR USE, FREEDOM FROM ANY COMPUTER DISEASES  OR *  ITS CONFORMITY TO ANY SPECIFICATION. THE ENTIRE RISK AS TO QUALITY AND *  PERFORMANCE OF THE SOFTWARE IS WITH THE USER. * *  Module: dcmtls * *  Author: Marco Eichelberg * *  Purpose: *    classes: DcmTLSTransportLayer * *  Last Update:      $Author: meichel $ *  Update Date:      $Date: 2005/12/08 16:05:38 $ *  CVS/RCS Revision: $Revision: 1.6 $ *  Status:           $State: Exp $ * *  CVS/RCS Log at end of file * */#ifndef TLSLAYER_H#define TLSLAYER_H#include "dcmtk/config/osconfig.h"    /* make sure OS specific configuration is included first */#include "dcmtk/dcmnet/dcmlayer.h"    /* for DcmTransportLayer */#include "dcmtk/ofstd/ofstream.h"    /* for ostream */#ifdef WITH_OPENSSLBEGIN_EXTERN_C#include <openssl/ssl.h>END_EXTERN_C/** this enum describes how to handle X.509 certificates on a TLS based *  secure transport connection. They can be ignored, validated if present *  or validated and demanded. */enum DcmCertificateVerification{  /** check peer certificate, fail if no certificate is present   */  DCV_requireCertificate,  /** check peer certificate if present, succeed if no certificate is present   */  DCV_checkCertificate,  /** do not check peer certificate   */  DCV_ignoreCertificate};/** factory class which creates secure TLS transport layer connections *  and maintains the parameters common to all TLS transport connections *  in one application (e.g. the pool of trusted certificates, the key *  and certificate to be used for authentication and the list of *  ciphersuite to be used for association negotiation. */class DcmTLSTransportLayer: public DcmTransportLayer{public:  /** constructor.   *  @param networkRole network role to be used by the application, influences   *    the choice of the secure transport layer code.   *  @param randFile path to file used to feed the random generator   */  DcmTLSTransportLayer(int networkRole, const char *randFile);  /// destructor  virtual ~DcmTLSTransportLayer();  /** factory method that returns a new transport connection for the   *  given socket.  Depending on the second parameter, either a transparent   *  or a secure connection is established.  If the object cannot be created   *  (e. g. because no secure layer is available), returns NULL.   *  @param openSocket TCP/IP socket to be used for the transport connection.   *    the connection must already be establised on socket level. If a non-null   *    pointer is returned, the new connection object takes over control of the socket.   *  @param useSecureLayer if true, a secure layer is used. If false, a   *    transparent layer is used.   *  @return pointer to new connection object if successful, NULL otherwise.   */  virtual DcmTransportConnection *createConnection(int openSocket, OFBool useSecureLayer);  /** loads the private key used for authentication of this application from a file.   *  @param fileName path to the private key file   *  @param fileType, must be SSL_FILETYPE_PEM or SSL_FILETYPE_ASN1   *  @return TCS_ok if successful, an error code otherwise   */  DcmTransportLayerStatus setPrivateKeyFile(const char *fileName, int fileType);  /** loads the certificate (public key) used for authentication of this application from a file.   *  @param fileName path to the certificate file   *  @param fileType, must be SSL_FILETYPE_PEM or SSL_FILETYPE_ASN1   *  @return TCS_ok if successful, an error code otherwise   */  DcmTransportLayerStatus setCertificateFile(const char *fileName, int fileType);  /** checks if the private key and the certificate set using setPrivateKeyFile()   *  and setCertificateFile() match, i.e. if they establish a private/public key pair.   *  @return OFTrue if private key and certificate match, OFFalse otherwise.   */  OFBool checkPrivateKeyMatchesCertificate();  /** loads a certificate from a file and adds it to the pool of trusted certificates.   *  @param fileName path to the certificate file   *  @param fileType, must be SSL_FILETYPE_PEM or SSL_FILETYPE_ASN1   *  @return TCS_ok if successful, an error code otherwise   */  DcmTransportLayerStatus addTrustedCertificateFile(const char *fileName, int fileType);  /** loads all files as certificates from the specified directory and adds them   *  to the pool of trusted certificates.   *  @param fileName path to the directory containing certificate files   *  @param fileType, must be SSL_FILETYPE_PEM or SSL_FILETYPE_ASN1   *  @return TCS_ok if successful, an error code otherwise   */  DcmTransportLayerStatus addTrustedCertificateDir(const char *pathName, int fileType);  /** sets the list of ciphersuites to negotiate.   *  @param suites string containing the list of ciphersuites.   *    The list must be in OpenSSL syntax (use findOpenSSLCipherSuiteName to convert   *    from RFC 2246 ciphersuite names to OpenSSL names), with ciphersuites separated   *    by ':' characters.   *  @return TCS_ok if successful, an error code otherwise   */  DcmTransportLayerStatus setCipherSuites(const char *suites);  /** returns the number of known ciphersuites.   *  @return number of known ciphersuites   */  static unsigned long getNumberOfCipherSuites();  /** returns a ciphersuite name in RFC 2246 (TLS) form   *  @param idx index, must be < getNumberOfCipherSuites()   *  @return ciphersuite name   */  static const char *getTLSCipherSuiteName(unsigned long idx);  /** returns a ciphersuite name in OpenSSL form   *  @param idx index, must be < getNumberOfCipherSuites()   *  @return ciphersuite name   */  static const char *getOpenSSLCipherSuiteName(unsigned long idx);  /** finds the OpenSSL ciphersuite name for a given RFC 2246 ciphersuite name.   *  @param tlsCipherSuiteName ciphersuite name in RFC 2246 form   *  @returns ciphersuite name in OpenSSL form, NULL if unknown.   */  static const char *findOpenSSLCipherSuiteName(const char *tlsCipherSuiteName);  /** checks if enough entropy data is available to write back a modified   *  random seed file.   *  @return OFTrue if random seed file can be written, OFFalse otherwise.   */  OFBool canWriteRandomSeed() { return canWriteRandseed; }  /** writes a modified random seed to file.   *  @param randFile path of file to write   *  @return OFTrue if successful, OFFalse otherwise.   */  OFBool writeRandomSeed(const char *randFile);  /** adds the contents of a file to the seed for the cryptographic   *  pseudo-random number generator. The file should contain real   *  random entropy data gathered from keystrokes, system events,   *  /dev/random (on Linux) or something similar.   *  If the TLS layer object is not initialized with sufficient   *  random data, negotiation of TLS connections may fail.   *  @param randFile path of the file containing random data   */  void seedPRNG(const char *randFile);  /** modifies the PRNG by adding random data from the given buffer   *  to the PRNG state.   *  @param buf pointer to buffer containing random data   *  @bufSize number of bytes in buffer   */  void addPRNGseed(void *buf, size_t bufSize);  /** defines how peer certificates should be treated when   *  negotiating a TLS connection.   *  @param vtype certificate verification mode   */  void setCertificateVerification(DcmCertificateVerification vtype);  /** sets the password string to be used when loading an   *  encrypted private key file.   *  Must be called prior to setPrivateKeyFile() in order to be effective.   *  @param thePasswd password string, may be "" or NULL in which case an empty   *    password is assumed.   */  void setPrivateKeyPasswd(const char *thePasswd);  /** sets the password string to be used when loading an   *  encrypted private key file to be read from the console stdin.   */  void setPrivateKeyPasswdFromConsole();  /** loads a set of Diffie-Hellman parameters from file.   *  These parameters are required for DH, DHE or DSS ciphersuites.   *  @param filename path to the DH parameter file   *  @return OFTrue if successful, OFFalse otherwise.   */  OFBool setTempDHParameters(const char *filename);  /** prints the most important attributes of the given X.509 certificate   *  to the given output stream.   *  @param out output stream   *  @param peerCertificate X.509 certificate, may be NULL   */  static void printX509Certificate(ostream &out, X509 *peerCertificate);private:  /// private undefined copy constructor  DcmTLSTransportLayer(const DcmTLSTransportLayer&);  /// private undefined assignment operator  DcmTLSTransportLayer& operator=(const DcmTLSTransportLayer&);  /// OpenSSL context data, needed only once per application  SSL_CTX *transportLayerContext;  /// true if there is enough random data to write a new random seed file  OFBool canWriteRandseed;  /// contains the password for the private key if set on command line  OFString privateKeyPasswd;};#endif /* WITH_OPENSSL */#endif/* *  $Log: tlslayer.h,v $ *  Revision 1.6  2005/12/08 16:05:38  meichel *  Changed include path schema for all DCMTK header files * *  Revision 1.5  2003/12/05 10:38:55  joergr *  Removed leading underscore characters from preprocessor symbols (reserved *  symbols). * *  Revision 1.4  2003/07/04 13:28:32  meichel *  Added include for ofstream.h, to make sure ofstream is correctly defined * *  Revision 1.3  2001/06/01 15:51:12  meichel *  Updated copyright header * *  Revision 1.2  2000/10/10 12:13:31  meichel *  Added routines for printing certificates and connection parameters. * *  Revision 1.1  2000/08/10 14:50:26  meichel *  Added initial OpenSSL support. * * */

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -