C++ Can';t使用boost验证我的自签名证书

C++ Can';t使用boost验证我的自签名证书,c++,ssl,boost,ssl-certificate,boost-asio,C++,Ssl,Boost,Ssl Certificate,Boost Asio,我通过自签名证书(使用我自己的CA)生成,现在我正在尝试让boost ASIO客户端验证服务器的身份。我用openssl对这些进行了验证,验证似乎有效 服务器和客户端代码分别为和 我只修改了以下部分: class server { public: server(boost::asio::io_service& io_service, unsigned short port) : io_service_(io_service), acceptor_(io_servi

我通过自签名证书(使用我自己的CA)生成,现在我正在尝试让boost ASIO客户端验证服务器的身份。我用openssl对这些进行了验证,验证似乎有效

服务器和客户端代码分别为和

我只修改了以下部分:

class server
{
public:
  server(boost::asio::io_service& io_service, unsigned short port)
    : io_service_(io_service),
      acceptor_(io_service,
          boost::asio::ip::tcp::endpoint(boost::asio::ip::tcp::v4(), port)),
      context_(boost::asio::ssl::context::tlsv12_server)
  {
    context_.set_options(
        boost::asio::ssl::context::default_workarounds
        | boost::asio::ssl::context::no_sslv2
        | boost::asio::ssl::context::single_dh_use);
    context_.set_password_callback(boost::bind(&server::get_password, this));

    // Use the certificate for my website that I had generated        context_.use_certificate_file("/home/paul/ca/intermediate/certs/mywebsite.net.cert.pem", boost::asio::ssl::context::pem);

    // Not sure if I need this, probably not. I do have an intermediate CA though        
    //context_.use_certificate_chain_file("/home/paul/ca/intermediate/certs/ca-chain.cert.pem");

    // Use website private key        context_.use_private_key_file("/home/paul/ca/intermediate/private/mywebsite.net.key.pem", boost::asio::ssl::context::pem);
    context_.use_tmp_dh_file("/home/paul/SSLTest/dh512.pem");

    start_accept();
  }
在客户机中:

bool verify_certificate(bool preverified,
      boost::asio::ssl::verify_context& ctx)
  {
    // The verify callback can be used to check whether the certificate that is
    // being presented is valid for the peer. For example, RFC 2818 describes
    // the steps involved in doing this for HTTPS. Consult the OpenSSL
    // documentation for more details. Note that the callback is called once
    // for each certificate in the certificate chain, starting from the root
    // certificate authority.

    // In this example we will simply print the certificate's subject name.
    char subject_name[256];
    X509* cert = X509_STORE_CTX_get_current_cert(ctx.native_handle());
    X509_NAME_oneline(X509_get_subject_name(cert), subject_name, 256);
    std::cout << "Verifying " << subject_name << "\n";
    std::cout << "preverified: " << std::boolalpha << preverified << "\n";

    return preverified; 
  }

...

int main(int argc, char* argv[])
{
  try
  {
    boost::asio::io_service io_service;

    boost::asio::ip::tcp::resolver resolver(io_service);
    boost::asio::ip::tcp::resolver::query query("localhost", "3232");
    boost::asio::ip::tcp::resolver::iterator iterator = resolver.resolve(query);

    boost::asio::ssl::context ctx(boost::asio::ssl::context::tlsv12_client);


    std::ifstream ca_file("/home/paul/ca/certs/ca.cert.pem", std::ios::binary | std::ios::ate);
    std::vector<char> data;
    auto size = ca_file.tellg();
    data.resize(size);
    ca_file.seekg(0, std::ios::beg);
    ca_file.read(data.data(), size);
    ca_file.close();

    // Have my own CA added to the list of known CAs
    ctx.add_certificate_authority(boost::asio::buffer(data, data.size()));

    // Not sure if I need something here, the CA should be enough to
    // validate the server's certificate prompted (even if signed by the
    // intermediate CA)
    //ctx.load_verify_file("/home/paul/ca/private/ca.key.pem");

    //ctx.load_verify_file("/home/paul/ca/intermediate/private/intermediate.key.pem");

    client c(io_service, ctx, iterator);
我知道回调中没有执行任何验证,但我认为在预验证之后会调用中设置的回调(因此是
预验证的
参数)


我哪里出错了?

仅凭您提供的数据是行不通的。没有足够的信息使证书有效。你通常应该称这两个为

ctx.use_certificate_chain_file("path");
ctx.use_private_key_file("path", boost::asio::ssl::context::pem);

“自行分配”是指证书吗?@DanMašek是的,没错。对不起。@Dean的时间太短了19个小时,无法修改标题?@sehe我在这个网站之外生活,你知道吗?什么。其他人也是。
ctx.use_certificate_chain_file("path");
ctx.use_private_key_file("path", boost::asio::ssl::context::pem);