ssl_lib.c

来自「一个用于点对点传输加密的工具包源码」· C语言 代码 · 共 2,062 行 · 第 1/4 页

C
2,062
字号
		{		bio=SSL_get_wbio(s);		if (BIO_should_write(bio))			return(SSL_ERROR_WANT_WRITE);		else if (BIO_should_read(bio))			/* See above (SSL_want_read(s) with BIO_should_write(bio)) */			return(SSL_ERROR_WANT_READ);		else if (BIO_should_io_special(bio))			{			reason=BIO_get_retry_reason(bio);			if (reason == BIO_RR_CONNECT)				return(SSL_ERROR_WANT_CONNECT);			else				return(SSL_ERROR_SYSCALL);			}		}	if ((i < 0) && SSL_want_x509_lookup(s))		{		return(SSL_ERROR_WANT_X509_LOOKUP);		}	if (i == 0)		{		if (s->version == SSL2_VERSION)			{			/* assume it is the socket being closed */			return(SSL_ERROR_ZERO_RETURN);			}		else			{			if ((s->shutdown & SSL_RECEIVED_SHUTDOWN) &&				(s->s3->warn_alert == SSL_AD_CLOSE_NOTIFY))				return(SSL_ERROR_ZERO_RETURN);			}		}	return(SSL_ERROR_SYSCALL);	}int SSL_do_handshake(SSL *s)	{	int ret=1;	if (s->handshake_func == NULL)		{		SSLerr(SSL_F_SSL_DO_HANDSHAKE,SSL_R_CONNECTION_TYPE_NOT_SET);		return(-1);		}	s->method->ssl_renegotiate_check(s);	if (SSL_in_init(s) || SSL_in_before(s))		{		ret=s->handshake_func(s);		}	return(ret);	}/* For the next 2 functions, SSL_clear() sets shutdown and so * one of these calls will reset it */void SSL_set_accept_state(SSL *s)	{	s->server=1;	s->shutdown=0;	s->state=SSL_ST_ACCEPT|SSL_ST_BEFORE;	s->handshake_func=s->method->ssl_accept;	/* clear the current cipher */	ssl_clear_cipher_ctx(s);	}void SSL_set_connect_state(SSL *s)	{	s->server=0;	s->shutdown=0;	s->state=SSL_ST_CONNECT|SSL_ST_BEFORE;	s->handshake_func=s->method->ssl_connect;	/* clear the current cipher */	ssl_clear_cipher_ctx(s);	}int ssl_undefined_function(SSL *s)	{	SSLerr(SSL_F_SSL_UNDEFINED_FUNCTION,ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);	return(0);	}SSL_METHOD *ssl_bad_method(int ver)	{	SSLerr(SSL_F_SSL_BAD_METHOD,ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);	return(NULL);	}const char *SSL_get_version(SSL *s)	{	if (s->version == TLS1_VERSION)		return("TLSv1");	else if (s->version == SSL3_VERSION)		return("SSLv3");	else if (s->version == SSL2_VERSION)		return("SSLv2");	else		return("unknown");	}SSL *SSL_dup(SSL *s)	{	STACK_OF(X509_NAME) *sk;	X509_NAME *xn;	SSL *ret;	int i;		 	if ((ret=SSL_new(SSL_get_SSL_CTX(s))) == NULL)	    return(NULL);			  	if (s->session != NULL)		{		/* This copies session-id, SSL_METHOD, sid_ctx, and 'cert' */		SSL_copy_session_id(ret,s);		}	else		{		/* No session has been established yet, so we have to expect		 * that s->cert or ret->cert will be changed later --		 * they should not both point to the same object,		 * and thus we can't use SSL_copy_session_id. */		ret->method = s->method;		ret->method->ssl_new(ret);		if (s->cert != NULL)			{			ret->cert = ssl_cert_dup(s->cert);			if (ret->cert == NULL)				goto err;			}						SSL_set_session_id_context(ret,			s->sid_ctx, s->sid_ctx_length);		}	SSL_set_read_ahead(ret,SSL_get_read_ahead(s));	SSL_set_verify(ret,SSL_get_verify_mode(s),		SSL_get_verify_callback(s));	SSL_set_verify_depth(ret,SSL_get_verify_depth(s));	SSL_set_info_callback(ret,SSL_get_info_callback(s));		ret->debug=s->debug;	ret->options=s->options;	/* copy app data, a little dangerous perhaps */	if (!CRYPTO_dup_ex_data(ssl_meth,&ret->ex_data,&s->ex_data))		goto err;	/* setup rbio, and wbio */	if (s->rbio != NULL)		{		if (!BIO_dup_state(s->rbio,(char *)&ret->rbio))			goto err;		}	if (s->wbio != NULL)		{		if (s->wbio != s->rbio)			{			if (!BIO_dup_state(s->wbio,(char *)&ret->wbio))				goto err;			}		else			ret->wbio=ret->rbio;		}	/* dup the cipher_list and cipher_list_by_id stacks */	if (s->cipher_list != NULL)		{		if ((ret->cipher_list=sk_SSL_CIPHER_dup(s->cipher_list)) == NULL)			goto err;		}	if (s->cipher_list_by_id != NULL)		if ((ret->cipher_list_by_id=sk_SSL_CIPHER_dup(s->cipher_list_by_id))			== NULL)			goto err;	/* Dup the client_CA list */	if (s->client_CA != NULL)		{		if ((sk=sk_X509_NAME_dup(s->client_CA)) == NULL) goto err;		ret->client_CA=sk;		for (i=0; i<sk_X509_NAME_num(sk); i++)			{			xn=sk_X509_NAME_value(sk,i);			if (sk_X509_NAME_set(sk,i,X509_NAME_dup(xn)) == NULL)				{				X509_NAME_free(xn);				goto err;				}			}		}	ret->shutdown=s->shutdown;	ret->state=s->state;	ret->handshake_func=s->handshake_func;	ret->server=s->server;	if (0)		{err:		if (ret != NULL) SSL_free(ret);		ret=NULL;		}	return(ret);	}void ssl_clear_cipher_ctx(SSL *s)	{	if (s->enc_read_ctx != NULL)		{		EVP_CIPHER_CTX_cleanup(s->enc_read_ctx);		OPENSSL_free(s->enc_read_ctx);		s->enc_read_ctx=NULL;		}	if (s->enc_write_ctx != NULL)		{		EVP_CIPHER_CTX_cleanup(s->enc_write_ctx);		OPENSSL_free(s->enc_write_ctx);		s->enc_write_ctx=NULL;		}	if (s->expand != NULL)		{		COMP_CTX_free(s->expand);		s->expand=NULL;		}	if (s->compress != NULL)		{		COMP_CTX_free(s->compress);		s->compress=NULL;		}	}/* Fix this function so that it takes an optional type parameter */X509 *SSL_get_certificate(SSL *s)	{	if (s->cert != NULL)		return(s->cert->key->x509);	else		return(NULL);	}/* Fix this function so that it takes an optional type parameter */EVP_PKEY *SSL_get_privatekey(SSL *s)	{	if (s->cert != NULL)		return(s->cert->key->privatekey);	else		return(NULL);	}SSL_CIPHER *SSL_get_current_cipher(SSL *s)	{	if ((s->session != NULL) && (s->session->cipher != NULL))		return(s->session->cipher);	return(NULL);	}int ssl_init_wbio_buffer(SSL *s,int push)	{	BIO *bbio;	if (s->bbio == NULL)		{		bbio=BIO_new(BIO_f_buffer());		if (bbio == NULL) return(0);		s->bbio=bbio;		}	else		{		bbio=s->bbio;		if (s->bbio == s->wbio)			s->wbio=BIO_pop(s->wbio);		}	(void)BIO_reset(bbio);/*	if (!BIO_set_write_buffer_size(bbio,16*1024)) */	if (!BIO_set_read_buffer_size(bbio,1))		{		SSLerr(SSL_F_SSL_INIT_WBIO_BUFFER,ERR_R_BUF_LIB);		return(0);		}	if (push)		{		if (s->wbio != bbio)			s->wbio=BIO_push(bbio,s->wbio);		}	else		{		if (s->wbio == bbio)			s->wbio=BIO_pop(bbio);		}	return(1);	}void ssl_free_wbio_buffer(SSL *s)	{	if (s->bbio == NULL) return;	if (s->bbio == s->wbio)		{		/* remove buffering */		s->wbio=BIO_pop(s->wbio);#ifdef REF_CHECK /* not the usual REF_CHECK, but this avoids adding one more preprocessor symbol */		assert(s->wbio != NULL);#endif		}	BIO_free(s->bbio);	s->bbio=NULL;	}	void SSL_CTX_set_quiet_shutdown(SSL_CTX *ctx,int mode)	{	ctx->quiet_shutdown=mode;	}int SSL_CTX_get_quiet_shutdown(SSL_CTX *ctx)	{	return(ctx->quiet_shutdown);	}void SSL_set_quiet_shutdown(SSL *s,int mode)	{	s->quiet_shutdown=mode;	}int SSL_get_quiet_shutdown(SSL *s)	{	return(s->quiet_shutdown);	}void SSL_set_shutdown(SSL *s,int mode)	{	s->shutdown=mode;	}int SSL_get_shutdown(SSL *s)	{	return(s->shutdown);	}int SSL_version(SSL *s)	{	return(s->version);	}SSL_CTX *SSL_get_SSL_CTX(SSL *ssl)	{	return(ssl->ctx);	}#ifndef NO_STDIOint SSL_CTX_set_default_verify_paths(SSL_CTX *ctx)	{	return(X509_STORE_set_default_paths(ctx->cert_store));	}int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,		const char *CApath)	{	return(X509_STORE_load_locations(ctx->cert_store,CAfile,CApath));	}#endifvoid SSL_set_info_callback(SSL *ssl,void (*cb)())	{	ssl->info_callback=cb;	}void (*SSL_get_info_callback(SSL *ssl))(void)	{	return((void (*)())ssl->info_callback);	}int SSL_state(SSL *ssl)	{	return(ssl->state);	}void SSL_set_verify_result(SSL *ssl,long arg)	{	ssl->verify_result=arg;	}long SSL_get_verify_result(SSL *ssl)	{	return(ssl->verify_result);	}int SSL_get_ex_new_index(long argl,void *argp,CRYPTO_EX_new *new_func,			 CRYPTO_EX_dup *dup_func,CRYPTO_EX_free *free_func)	{	ssl_meth_num++;	return(CRYPTO_get_ex_new_index(ssl_meth_num-1,		&ssl_meth,argl,argp,new_func,dup_func,free_func));	}int SSL_set_ex_data(SSL *s,int idx,void *arg)	{	return(CRYPTO_set_ex_data(&s->ex_data,idx,arg));	}void *SSL_get_ex_data(SSL *s,int idx)	{	return(CRYPTO_get_ex_data(&s->ex_data,idx));	}int SSL_CTX_get_ex_new_index(long argl,void *argp,CRYPTO_EX_new *new_func,			     CRYPTO_EX_dup *dup_func,CRYPTO_EX_free *free_func)	{	ssl_ctx_meth_num++;	return(CRYPTO_get_ex_new_index(ssl_ctx_meth_num-1,		&ssl_ctx_meth,argl,argp,new_func,dup_func,free_func));	}int SSL_CTX_set_ex_data(SSL_CTX *s,int idx,void *arg)	{	return(CRYPTO_set_ex_data(&s->ex_data,idx,arg));	}void *SSL_CTX_get_ex_data(SSL_CTX *s,int idx)	{	return(CRYPTO_get_ex_data(&s->ex_data,idx));	}int ssl_ok(SSL *s)	{	return(1);	}X509_STORE *SSL_CTX_get_cert_store(SSL_CTX *ctx)	{	return(ctx->cert_store);	}void SSL_CTX_set_cert_store(SSL_CTX *ctx,X509_STORE *store)	{	if (ctx->cert_store != NULL)		X509_STORE_free(ctx->cert_store);	ctx->cert_store=store;	}int SSL_want(SSL *s)	{	return(s->rwstate);	}/*! * \brief Set the callback for generating temporary RSA keys. * \param ctx the SSL context. * \param cb the callback */#ifndef NO_RSAvoid SSL_CTX_set_tmp_rsa_callback(SSL_CTX *ctx,RSA *(*cb)(SSL *ssl,							  int is_export,							  int keylength))    {    SSL_CTX_callback_ctrl(ctx,SSL_CTRL_SET_TMP_RSA_CB,(void (*)())cb);    }void SSL_set_tmp_rsa_callback(SSL *ssl,RSA *(*cb)(SSL *ssl,						  int is_export,						  int keylength))    {    SSL_callback_ctrl(ssl,SSL_CTRL_SET_TMP_RSA_CB,(void (*)())cb);    }#endif#ifdef DOXYGEN/*! * \brief The RSA temporary key callback function. * \param ssl the SSL session. * \param is_export \c TRUE if the temp RSA key is for an export ciphersuite. * \param keylength if \c is_export is \c TRUE, then \c keylength is the size * of the required key in bits. * \return the temporary RSA key. * \sa SSL_CTX_set_tmp_rsa_callback, SSL_set_tmp_rsa_callback */RSA *cb(SSL *ssl,int is_export,int keylength)    {}#endif/*! * \brief Set the callback for generating temporary DH keys. * \param ctx the SSL context. * \param dh the callback */#ifndef NO_DHvoid SSL_CTX_set_tmp_dh_callback(SSL_CTX *ctx,DH *(*dh)(SSL *ssl,int is_export,							int keylength))    {    SSL_CTX_callback_ctrl(ctx,SSL_CTRL_SET_TMP_DH_CB,(void (*)())dh);    }void SSL_set_tmp_dh_callback(SSL *ssl,DH *(*dh)(SSL *ssl,int is_export,						int keylength))    {    SSL_callback_ctrl(ssl,SSL_CTRL_SET_TMP_DH_CB,(void (*)())dh);    }#endif#if defined(_WINDLL) && defined(WIN16)#include "../crypto/bio/bss_file.c"#endifIMPLEMENT_STACK_OF(SSL_CIPHER)IMPLEMENT_STACK_OF(SSL_COMP)

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?