⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 auth_ssl.c

📁 mgcp协议源代码。支持多种编码:g711
💻 C
📖 第 1 页 / 共 2 页
字号:
				/* until request satisfied */  for (i = 0; size > 0; string += i,size -= i)				/* write as much as we can */    if ((i = SSL_write (stream->con,string,(int) min (maxposint,size))) < 0)      return ssl_abort (stream);/* write failed */  (*bn) (BLOCK_NONE,NIL);  return LONGT;			/* all done */}/* SSL close * Accepts: SSL stream */void ssl_close (SSLSTREAM *stream){  ssl_abort (stream);		/* nuke the stream */  fs_give ((void **) &stream);	/* flush the stream */}/* SSL abort stream * Accepts: SSL stream * Returns: NIL always */long ssl_abort (SSLSTREAM *stream){  blocknotify_t bn = (blocknotify_t) mail_parameters (NIL,GET_BLOCKNOTIFY,NIL);  if (stream->con) {		/* close SSL connection */    SSL_shutdown (stream->con);    SSL_free (stream->con);    stream->con = NIL;  }  if (stream->context) {	/* clean up context */    SSL_CTX_free (stream->context);    stream->context = NIL;  }  if (stream->tcpstream) {	/* close TCP stream */    tcp_close (stream->tcpstream);    stream->tcpstream = NIL;  }  (*bn) (BLOCK_NONE,NIL);  return NIL;}/* SSL get host name * Accepts: SSL stream * Returns: host name for this stream */char *ssl_host (SSLSTREAM *stream){  return tcp_host (stream->tcpstream);}/* SSL get remote host name * Accepts: SSL stream * Returns: host name for this stream */char *ssl_remotehost (SSLSTREAM *stream){  return tcp_remotehost (stream->tcpstream);}/* SSL return port for this stream * Accepts: SSL stream * Returns: port number for this stream */unsigned long ssl_port (SSLSTREAM *stream){  return tcp_port (stream->tcpstream);}/* SSL get local host name * Accepts: SSL stream * Returns: local host name */char *ssl_localhost (SSLSTREAM *stream){  return tcp_localhost (stream->tcpstream);}/* Client authenticator * Accepts: challenger function *	    responder function *	    parsed network mailbox structure *	    stream argument for functions *	    pointer to current trial count *	    returned user name * Returns: T if success, NIL otherwise, number of trials incremented if retry */long auth_plain_client (authchallenge_t challenger,authrespond_t responder,			NETMBX *mb,void *stream,unsigned long *trial,			char *user){  char *s,*t,*u,pwd[MAILTMPLEN];  void *chal;  unsigned long cl,sl;  if (!mb->altflag)		/* snarl if not secure session */    mm_log ("SECURITY PROBLEM: insecure server advertised AUTH=PLAIN",WARN);				/* get initial (empty) challenge */  if ((chal = (*challenger) (stream,&cl)) && !cl) {    fs_give ((void **) &chal);				/* prompt user */    mm_login (mb,user,pwd,*trial);    if (!pwd[0]) {		/* user requested abort */      (*responder) (stream,NIL,0);      *trial = 0;		/* don't retry */      return T;			/* will get a NO response back */    }    t = s = (char *) fs_get (sl = strlen (mb->authuser) + strlen (user) +			     strlen (pwd) + 2);				/* copy authorization id */    if (mb->authuser[0]) for (u = user; *u; *t++ = *u++);    *t++ = '\0';		/* delimiting NUL */				/* copy authentication id */    for (u = mb->authuser[0] ? mb->authuser : user; *u; *t++ = *u++);    *t++ = '\0';		/* delimiting NUL */				/* copy password */    for (u = pwd; *u; *t++ = *u++);				/* send credentials */    if ((*responder) (stream,s,sl) && !(chal = (*challenger) (stream,&cl))) {      fs_give ((void **) &s);	/* free response */      ++*trial;			/* can try again if necessary */      return T;			/* check the authentication */    }    fs_give ((void **) &s);	/* free response */  }  if (chal) fs_give ((void **) &chal);  *trial = 0;			/* don't retry */  return NIL;			/* failed */}/* Check if PLAIN valid on this system * Returns: T, always */long auth_plain_valid (void){  return T;			/* PLAIN is valid */}/* Server authenticator * Accepts: responder function *	    argument count *	    argument vector * Returns: authenticated user name or NIL */char *auth_plain_server (authresponse_t responder,int argc,char *argv[]){  char *ret = NIL;  char *user,*aid,*pass;  unsigned long len;				/* get user name */  if (aid = (*responder) ("",0,&len)) {				/* note: responders null-terminate */    if ((((unsigned long) ((user = aid + strlen (aid) + 1) - aid)) < len) &&	(((unsigned long) ((pass = user + strlen (user) + 1) - aid)) < len) &&	(((unsigned long) ((pass + strlen (pass)) - aid)) == len) &&	(*aid ? server_login (aid,pass,user,argc,argv) :	 server_login (user,pass,NIL,argc,argv))) ret = myusername ();    fs_give ((void **) &aid);  }  return ret;}/* Init server for SSL * Accepts: server name for syslog or NIL *	    /etc/services service name or NIL *	    alternate /etc/services service name or NIL *	    SASL service name or NIL *	    clock interrupt handler *	    kiss-of-death interrupt handler *	    hangup interrupt handler *	    termination interrupt handler */void server_init (char *server,char *service,char *altservice,char *sasl,                  void *clkint,void *kodint,void *hupint,void *trmint){  struct servent *sv;  long port;  if (server) {			/* set server name in syslog */    openlog (server,LOG_PID,LOG_MAIL);    fclose (stderr);		/* possibly save a process ID */  }  /* Use SSL if alt service, or if server starts with "s" and not service */  if (service && altservice && ((port = tcp_serverport ()) >= 0) &&      (((sv = getservbyname (altservice,"tcp")) &&	(port == ntohs (sv->s_port))) ||       ((*server == 's') && (!(sv = getservbyname (service,"tcp")) ||			     (port != ntohs (sv->s_port))))))    sslstdio = ssl_server_init (server);  else auth_ssl.server = NIL;	/* server forbids PLAIN if not SSL */				/* now call c-client's version */  Server_init (NIL,service,altservice,sasl,clkint,kodint,hupint,trmint);}				/* link to the real one */#define server_init Server_init/* Start TLS * Accepts: /etc/services service name * Returns: cpystr'd error string if TLS failed, else NIL for success */char *ssl_start_tls (char *server){  if (start_tls) return cpystr ("TLS already started");  if (sslstdio) return cpystr ("Already in an SSL session");  start_tls = server;		/* start TLS now */  return NIL;}/* Wait for stdin input * Accepts: timeout in seconds * Returns: T if have input on stdin, else NIL */long server_input_wait (long seconds){  int i,sock;  fd_set fds,efd;  struct timeval tmo;  SSLSTREAM *stream;  if (!sslstdio) return Server_input_wait (seconds);				/* input available in buffer */  if (((stream = sslstdio->sslstream)->ictr > 0) ||      !stream->con || ((sock = SSL_get_fd (stream->con)) < 0)) return LONGT;				/* input available from SSL */  if (SSL_pending (stream->con) &&      ((i = SSL_read (stream->con,stream->ibuf,SSLBUFLEN)) > 0)) {    stream->iptr = stream->ibuf;/* point at TCP buffer */    stream->ictr = i;		/* set new byte count */    return LONGT;  }  FD_ZERO (&fds);		/* initialize selection vector */  FD_ZERO (&efd);		/* initialize selection vector */  FD_SET (sock,&fds);		/* set bit in selection vector */  FD_SET (sock,&efd);		/* set bit in selection vector */  tmo.tv_sec = seconds; tmo.tv_usec = 0;				/* see if input available from the socket */  return select (sock+1,&fds,0,&efd,&tmo) ? LONGT : NIL;}				/* link to the other one */#define server_input_wait Server_input_wait/* Init server for SSL * Accepts: server name * Returns: SSL stdio stream on success, NIL on failure */SSLSTDIOSTREAM *ssl_server_init (char *server){  char tmp[MAILTMPLEN];  unsigned long i;  struct stat sbuf;  struct sockaddr_in sin;  int sinlen = sizeof (struct sockaddr_in);  SSLSTREAM *stream = (SSLSTREAM *) memset (fs_get (sizeof (SSLSTREAM)),0,					    sizeof (SSLSTREAM));  ssl_onceonlyinit ();		/* make sure algorithms added */  ERR_load_crypto_strings ();  SSL_load_error_strings ();				/* get socket address */  if (getsockname (0,(struct sockaddr *) &sin,(void *) &sinlen))    fatal ("Impossible getsockname failure!");				/* build specific certificate/key file name */  sprintf (tmp,"%s/%s-%s.pem",SSL_CERT_DIRECTORY,server,	   inet_ntoa (sin.sin_addr));				/* use non-specific name if no specific file */  if (stat (tmp,&sbuf)) sprintf (tmp,"%s/%s.pem",SSL_CERT_DIRECTORY,server);				/* create context */  if (stream->context = SSL_CTX_new (start_tls ?				     TLSv1_server_method () :				     SSLv23_server_method ())) {    SSL_CTX_set_options (stream->context,SSL_OP_ALL);				/* set cipher list */    if (!SSL_CTX_set_cipher_list (stream->context,SSLCIPHERLIST))      syslog (LOG_ALERT,"Unable to set cipher list %s",SSLCIPHERLIST);				/* load certificate */    if (!SSL_CTX_use_certificate_file (stream->context,tmp,SSL_FILETYPE_PEM))      syslog (LOG_ALERT,"Unable to load certificate from %s",tmp);				/* load key */    else if (!(SSL_CTX_use_RSAPrivateKey_file (stream->context,tmp,					       SSL_FILETYPE_PEM)))      syslog (LOG_ALERT,"Unable to load private key from %s",tmp);    else {			/* generate key if needed */      if (SSL_CTX_need_tmp_RSA (stream->context))	SSL_CTX_set_tmp_rsa_callback (stream->context,ssl_genkey);				/* create new SSL connection */      if (stream->con = SSL_new (stream->context)) {				/* set file descriptor */	SSL_set_fd (stream->con,0);				/* all OK if accepted */	if (SSL_accept (stream->con) >= 0) {	  SSLSTDIOSTREAM *ret = (SSLSTDIOSTREAM *)	    memset (fs_get (sizeof(SSLSTDIOSTREAM)),0,sizeof(SSLSTDIOSTREAM));	  ret->sslstream = stream;	  ret->octr = SSLBUFLEN;/* available space in output buffer */	  ret->optr = ret->obuf;/* current output buffer pointer */	  return ret;	}      }    }    }  while (i = ERR_get_error ())	/* SSL failure */    syslog (LOG_ERR,"SSL error status: %s",ERR_error_string (i,NIL));  ssl_close (stream);		/* punt stream */  exit (1);			/* punt this program too */}/* Generate one-time key for server * Accepts: SSL connection *	    export flag *	    keylength * Returns: generated key, always */static RSA *ssl_genkey (SSL *con,int export,int keylength){  unsigned long i;  static RSA *key = NIL;  if (!key) {			/* if don't have a key already */				/* generate key */    if (!(key = RSA_generate_key (export ? keylength : 1024,RSA_F4,NIL,NIL))) {      syslog (LOG_ALERT,"Unable to generate temp key");      while (i = ERR_get_error ())	syslog (LOG_ALERT,"SSL error status: %s",ERR_error_string (i,NIL));      exit (1);    }  }  return key;}/* Get character * Returns: character or EOF */int ssl_getchar (void){  if (!sslstdio) return getchar ();  if (!ssl_getdata (sslstdio->sslstream)) return EOF;				/* one last byte available */  sslstdio->sslstream->ictr--;  return (int) *(sslstdio->sslstream->iptr)++;}/* Get string * Accepts: destination string pointer *	    number of bytes available * Returns: destination string pointer or NIL if EOF */char *ssl_gets (char *s,int n){  int i,c;  if (start_tls) {		/* doing a start TLS? */				/* yes, allow PLAIN authenticator again */    auth_ssl.server = auth_plain_server;				/* enter the mode */    sslstdio = ssl_server_init (start_tls);    start_tls = NIL;		/* don't do this again */  }  if (!sslstdio) return fgets (s,n,stdin);  for (i = c = 0, n-- ; (c != '\n') && (i < n); sslstdio->sslstream->ictr--) {    if ((sslstdio->sslstream->ictr <= 0) && !ssl_getdata (sslstdio->sslstream))      return NIL;		/* read error */    c = s[i++] = *(sslstdio->sslstream->iptr)++;  }  s[i] = '\0';			/* tie off string */  return s;}/* Put character * Accepts: character * Returns: character written or EOF */int ssl_putchar (int c){  if (!sslstdio) return putchar (c);				/* flush buffer if full */  if (!sslstdio->octr && ssl_flush ()) return EOF;  sslstdio->octr--;		/* count down one character */  *sslstdio->optr++ = c;	/* write character */  return c;			/* return that character */}/* Put string * Accepts: destination string pointer * Returns: 0 or EOF if error */int ssl_puts (char *s){  if (!sslstdio) return fputs (s,stdout);  while (*s) {			/* flush buffer if full */    if (!sslstdio->octr && ssl_flush ()) return EOF;    *sslstdio->optr++ = *s++;	/* write one more character */    sslstdio->octr--;		/* count down one character */  }  return 0;			/* success */}/* Flush output * Returns: 0 or EOF if error */int ssl_flush (void){  if (!sslstdio) return fflush (stdout);				/* force out buffer */  if (!ssl_sout (sslstdio->sslstream,sslstdio->obuf,		 SSLBUFLEN - sslstdio->octr)) return EOF;				/* renew output buffer */  sslstdio->optr = sslstdio->obuf;  sslstdio->octr = SSLBUFLEN;  return 0;			/* success */}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -