📄 auth_ssl.c
字号:
/* until request satisfied */ for (i = 0; size > 0; string += i,size -= i) /* write as much as we can */ if ((i = SSL_write (stream->con,string,(int) min (maxposint,size))) < 0) return ssl_abort (stream);/* write failed */ (*bn) (BLOCK_NONE,NIL); return LONGT; /* all done */}/* SSL close * Accepts: SSL stream */void ssl_close (SSLSTREAM *stream){ ssl_abort (stream); /* nuke the stream */ fs_give ((void **) &stream); /* flush the stream */}/* SSL abort stream * Accepts: SSL stream * Returns: NIL always */long ssl_abort (SSLSTREAM *stream){ blocknotify_t bn = (blocknotify_t) mail_parameters (NIL,GET_BLOCKNOTIFY,NIL); if (stream->con) { /* close SSL connection */ SSL_shutdown (stream->con); SSL_free (stream->con); stream->con = NIL; } if (stream->context) { /* clean up context */ SSL_CTX_free (stream->context); stream->context = NIL; } if (stream->tcpstream) { /* close TCP stream */ tcp_close (stream->tcpstream); stream->tcpstream = NIL; } (*bn) (BLOCK_NONE,NIL); return NIL;}/* SSL get host name * Accepts: SSL stream * Returns: host name for this stream */char *ssl_host (SSLSTREAM *stream){ return tcp_host (stream->tcpstream);}/* SSL get remote host name * Accepts: SSL stream * Returns: host name for this stream */char *ssl_remotehost (SSLSTREAM *stream){ return tcp_remotehost (stream->tcpstream);}/* SSL return port for this stream * Accepts: SSL stream * Returns: port number for this stream */unsigned long ssl_port (SSLSTREAM *stream){ return tcp_port (stream->tcpstream);}/* SSL get local host name * Accepts: SSL stream * Returns: local host name */char *ssl_localhost (SSLSTREAM *stream){ return tcp_localhost (stream->tcpstream);}/* Client authenticator * Accepts: challenger function * responder function * parsed network mailbox structure * stream argument for functions * pointer to current trial count * returned user name * Returns: T if success, NIL otherwise, number of trials incremented if retry */long auth_plain_client (authchallenge_t challenger,authrespond_t responder, NETMBX *mb,void *stream,unsigned long *trial, char *user){ char *s,*t,*u,pwd[MAILTMPLEN]; void *chal; unsigned long cl,sl; if (!mb->altflag) /* snarl if not secure session */ mm_log ("SECURITY PROBLEM: insecure server advertised AUTH=PLAIN",WARN); /* get initial (empty) challenge */ if ((chal = (*challenger) (stream,&cl)) && !cl) { fs_give ((void **) &chal); /* prompt user */ mm_login (mb,user,pwd,*trial); if (!pwd[0]) { /* user requested abort */ (*responder) (stream,NIL,0); *trial = 0; /* don't retry */ return T; /* will get a NO response back */ } t = s = (char *) fs_get (sl = strlen (mb->authuser) + strlen (user) + strlen (pwd) + 2); /* copy authorization id */ if (mb->authuser[0]) for (u = user; *u; *t++ = *u++); *t++ = '\0'; /* delimiting NUL */ /* copy authentication id */ for (u = mb->authuser[0] ? mb->authuser : user; *u; *t++ = *u++); *t++ = '\0'; /* delimiting NUL */ /* copy password */ for (u = pwd; *u; *t++ = *u++); /* send credentials */ if ((*responder) (stream,s,sl) && !(chal = (*challenger) (stream,&cl))) { fs_give ((void **) &s); /* free response */ ++*trial; /* can try again if necessary */ return T; /* check the authentication */ } fs_give ((void **) &s); /* free response */ } if (chal) fs_give ((void **) &chal); *trial = 0; /* don't retry */ return NIL; /* failed */}/* Check if PLAIN valid on this system * Returns: T, always */long auth_plain_valid (void){ return T; /* PLAIN is valid */}/* Server authenticator * Accepts: responder function * argument count * argument vector * Returns: authenticated user name or NIL */char *auth_plain_server (authresponse_t responder,int argc,char *argv[]){ char *ret = NIL; char *user,*aid,*pass; unsigned long len; /* get user name */ if (aid = (*responder) ("",0,&len)) { /* note: responders null-terminate */ if ((((unsigned long) ((user = aid + strlen (aid) + 1) - aid)) < len) && (((unsigned long) ((pass = user + strlen (user) + 1) - aid)) < len) && (((unsigned long) ((pass + strlen (pass)) - aid)) == len) && (*aid ? server_login (aid,pass,user,argc,argv) : server_login (user,pass,NIL,argc,argv))) ret = myusername (); fs_give ((void **) &aid); } return ret;}/* Init server for SSL * Accepts: server name for syslog or NIL * /etc/services service name or NIL * alternate /etc/services service name or NIL * SASL service name or NIL * clock interrupt handler * kiss-of-death interrupt handler * hangup interrupt handler * termination interrupt handler */void server_init (char *server,char *service,char *altservice,char *sasl, void *clkint,void *kodint,void *hupint,void *trmint){ struct servent *sv; long port; if (server) { /* set server name in syslog */ openlog (server,LOG_PID,LOG_MAIL); fclose (stderr); /* possibly save a process ID */ } /* Use SSL if alt service, or if server starts with "s" and not service */ if (service && altservice && ((port = tcp_serverport ()) >= 0) && (((sv = getservbyname (altservice,"tcp")) && (port == ntohs (sv->s_port))) || ((*server == 's') && (!(sv = getservbyname (service,"tcp")) || (port != ntohs (sv->s_port)))))) sslstdio = ssl_server_init (server); else auth_ssl.server = NIL; /* server forbids PLAIN if not SSL */ /* now call c-client's version */ Server_init (NIL,service,altservice,sasl,clkint,kodint,hupint,trmint);} /* link to the real one */#define server_init Server_init/* Start TLS * Accepts: /etc/services service name * Returns: cpystr'd error string if TLS failed, else NIL for success */char *ssl_start_tls (char *server){ if (start_tls) return cpystr ("TLS already started"); if (sslstdio) return cpystr ("Already in an SSL session"); start_tls = server; /* start TLS now */ return NIL;}/* Wait for stdin input * Accepts: timeout in seconds * Returns: T if have input on stdin, else NIL */long server_input_wait (long seconds){ int i,sock; fd_set fds,efd; struct timeval tmo; SSLSTREAM *stream; if (!sslstdio) return Server_input_wait (seconds); /* input available in buffer */ if (((stream = sslstdio->sslstream)->ictr > 0) || !stream->con || ((sock = SSL_get_fd (stream->con)) < 0)) return LONGT; /* input available from SSL */ if (SSL_pending (stream->con) && ((i = SSL_read (stream->con,stream->ibuf,SSLBUFLEN)) > 0)) { stream->iptr = stream->ibuf;/* point at TCP buffer */ stream->ictr = i; /* set new byte count */ return LONGT; } FD_ZERO (&fds); /* initialize selection vector */ FD_ZERO (&efd); /* initialize selection vector */ FD_SET (sock,&fds); /* set bit in selection vector */ FD_SET (sock,&efd); /* set bit in selection vector */ tmo.tv_sec = seconds; tmo.tv_usec = 0; /* see if input available from the socket */ return select (sock+1,&fds,0,&efd,&tmo) ? LONGT : NIL;} /* link to the other one */#define server_input_wait Server_input_wait/* Init server for SSL * Accepts: server name * Returns: SSL stdio stream on success, NIL on failure */SSLSTDIOSTREAM *ssl_server_init (char *server){ char tmp[MAILTMPLEN]; unsigned long i; struct stat sbuf; struct sockaddr_in sin; int sinlen = sizeof (struct sockaddr_in); SSLSTREAM *stream = (SSLSTREAM *) memset (fs_get (sizeof (SSLSTREAM)),0, sizeof (SSLSTREAM)); ssl_onceonlyinit (); /* make sure algorithms added */ ERR_load_crypto_strings (); SSL_load_error_strings (); /* get socket address */ if (getsockname (0,(struct sockaddr *) &sin,(void *) &sinlen)) fatal ("Impossible getsockname failure!"); /* build specific certificate/key file name */ sprintf (tmp,"%s/%s-%s.pem",SSL_CERT_DIRECTORY,server, inet_ntoa (sin.sin_addr)); /* use non-specific name if no specific file */ if (stat (tmp,&sbuf)) sprintf (tmp,"%s/%s.pem",SSL_CERT_DIRECTORY,server); /* create context */ if (stream->context = SSL_CTX_new (start_tls ? TLSv1_server_method () : SSLv23_server_method ())) { SSL_CTX_set_options (stream->context,SSL_OP_ALL); /* set cipher list */ if (!SSL_CTX_set_cipher_list (stream->context,SSLCIPHERLIST)) syslog (LOG_ALERT,"Unable to set cipher list %s",SSLCIPHERLIST); /* load certificate */ if (!SSL_CTX_use_certificate_file (stream->context,tmp,SSL_FILETYPE_PEM)) syslog (LOG_ALERT,"Unable to load certificate from %s",tmp); /* load key */ else if (!(SSL_CTX_use_RSAPrivateKey_file (stream->context,tmp, SSL_FILETYPE_PEM))) syslog (LOG_ALERT,"Unable to load private key from %s",tmp); else { /* generate key if needed */ if (SSL_CTX_need_tmp_RSA (stream->context)) SSL_CTX_set_tmp_rsa_callback (stream->context,ssl_genkey); /* create new SSL connection */ if (stream->con = SSL_new (stream->context)) { /* set file descriptor */ SSL_set_fd (stream->con,0); /* all OK if accepted */ if (SSL_accept (stream->con) >= 0) { SSLSTDIOSTREAM *ret = (SSLSTDIOSTREAM *) memset (fs_get (sizeof(SSLSTDIOSTREAM)),0,sizeof(SSLSTDIOSTREAM)); ret->sslstream = stream; ret->octr = SSLBUFLEN;/* available space in output buffer */ ret->optr = ret->obuf;/* current output buffer pointer */ return ret; } } } } while (i = ERR_get_error ()) /* SSL failure */ syslog (LOG_ERR,"SSL error status: %s",ERR_error_string (i,NIL)); ssl_close (stream); /* punt stream */ exit (1); /* punt this program too */}/* Generate one-time key for server * Accepts: SSL connection * export flag * keylength * Returns: generated key, always */static RSA *ssl_genkey (SSL *con,int export,int keylength){ unsigned long i; static RSA *key = NIL; if (!key) { /* if don't have a key already */ /* generate key */ if (!(key = RSA_generate_key (export ? keylength : 1024,RSA_F4,NIL,NIL))) { syslog (LOG_ALERT,"Unable to generate temp key"); while (i = ERR_get_error ()) syslog (LOG_ALERT,"SSL error status: %s",ERR_error_string (i,NIL)); exit (1); } } return key;}/* Get character * Returns: character or EOF */int ssl_getchar (void){ if (!sslstdio) return getchar (); if (!ssl_getdata (sslstdio->sslstream)) return EOF; /* one last byte available */ sslstdio->sslstream->ictr--; return (int) *(sslstdio->sslstream->iptr)++;}/* Get string * Accepts: destination string pointer * number of bytes available * Returns: destination string pointer or NIL if EOF */char *ssl_gets (char *s,int n){ int i,c; if (start_tls) { /* doing a start TLS? */ /* yes, allow PLAIN authenticator again */ auth_ssl.server = auth_plain_server; /* enter the mode */ sslstdio = ssl_server_init (start_tls); start_tls = NIL; /* don't do this again */ } if (!sslstdio) return fgets (s,n,stdin); for (i = c = 0, n-- ; (c != '\n') && (i < n); sslstdio->sslstream->ictr--) { if ((sslstdio->sslstream->ictr <= 0) && !ssl_getdata (sslstdio->sslstream)) return NIL; /* read error */ c = s[i++] = *(sslstdio->sslstream->iptr)++; } s[i] = '\0'; /* tie off string */ return s;}/* Put character * Accepts: character * Returns: character written or EOF */int ssl_putchar (int c){ if (!sslstdio) return putchar (c); /* flush buffer if full */ if (!sslstdio->octr && ssl_flush ()) return EOF; sslstdio->octr--; /* count down one character */ *sslstdio->optr++ = c; /* write character */ return c; /* return that character */}/* Put string * Accepts: destination string pointer * Returns: 0 or EOF if error */int ssl_puts (char *s){ if (!sslstdio) return fputs (s,stdout); while (*s) { /* flush buffer if full */ if (!sslstdio->octr && ssl_flush ()) return EOF; *sslstdio->optr++ = *s++; /* write one more character */ sslstdio->octr--; /* count down one character */ } return 0; /* success */}/* Flush output * Returns: 0 or EOF if error */int ssl_flush (void){ if (!sslstdio) return fflush (stdout); /* force out buffer */ if (!ssl_sout (sslstdio->sslstream,sslstdio->obuf, SSLBUFLEN - sslstdio->octr)) return EOF; /* renew output buffer */ sslstdio->optr = sslstdio->obuf; sslstdio->octr = SSLBUFLEN; return 0; /* success */}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -