📄 kssl.cc
字号:
/* This file is part of the KDE project * * Copyright (C) 2000 George Staikos <staikos@kde.org> * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Library General Public * License as published by the Free Software Foundation; either * version 2 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Library General Public License for more details. * * You should have received a copy of the GNU Library General Public License * along with this library; see the file COPYING.LIB. If not, write to * the Free Software Foundation, Inc., 59 Temple Place - Suite 330, * Boston, MA 02111-1307, USA. */#ifdef HAVE_CONFIG_H#include <config.h>#endif// this hack provided by Malte Starostik to avoid glibc/openssl bug// on some systems#ifdef HAVE_SSL#include <unistd.h>#include <netinet/in.h>#include <sys/socket.h>#define crypt _openssl_crypt#include <openssl/ssl.h>#include <openssl/x509.h>#include <openssl/x509v3.h>#include <openssl/pem.h>#include <openssl/rand.h>#undef crypt#endif#include "kssl.h"#include <kdebug.h>#include <kstddirs.h>#include <ksock.h>#include <ksockaddr.h>#include <kopenssl.h>#include <ksslpkcs12.h>#include <klocale.h>#include <ksocks.h>#define sk_dup d->kossl->sk_dupclass KSSLPrivate {public: KSSLPrivate() { lastInitTLS = false; kossl = KOpenSSLProxy::self(); } ~KSSLPrivate() { } bool lastInitTLS; KSSLCertificate::KSSLValidation m_cert_vfy_res; bool proxying; QString proxyPeer;#ifdef HAVE_SSL SSL *m_ssl; SSL_CTX *m_ctx; SSL_METHOD *m_meth;#endif KOSSL *kossl;};KSSL::KSSL(bool init) { d = new KSSLPrivate; m_bInit = false; m_bAutoReconfig = true; m_cfg = new KSSLSettings(); d->proxying = false;#ifdef HAVE_SSL d->m_ssl = NULL;#endif if (init) initialize();}KSSL::~KSSL() { close(); delete m_cfg; delete d;}int KSSL::seedWithEGD() {int rc = 0; #ifdef HAVE_SSL if (m_cfg->useEGD() && !m_cfg->getEGDPath().isEmpty()) { rc = d->kossl->RAND_egd(m_cfg->getEGDPath().latin1()); if (rc < 0) kdDebug(7029) << "KSSL: Error seeding PRNG with the EGD." << endl; else kdDebug(7029) << "KSSL: PRNG was seeded with " << rc << " bytes from the EGD." << endl; } #endif return rc;}bool KSSL::TLSInit() {#ifdef HAVE_SSL // kdDebug(7029) << "KSSL TLS initialize" << endl; if (m_bInit) return false; if (m_bAutoReconfig) m_cfg->load(); if (!m_cfg->tlsv1()) return false; seedWithEGD(); d->m_meth = d->kossl->TLSv1_client_method(); d->lastInitTLS = true; d->m_ctx = d->kossl->SSL_CTX_new(d->m_meth); if (d->m_ctx == NULL) { return false; } // set cipher list QString clist = m_cfg->getCipherList(); kdDebug(7029) << "Cipher list: " << clist << endl; if (!clist.isEmpty()) d->kossl->SSL_CTX_set_cipher_list(d->m_ctx, const_cast<char *>(clist.ascii())); m_bInit = true;return true;#elsereturn false;#endif}bool KSSL::initialize() {#ifdef HAVE_SSL kdDebug(7029) << "KSSL initialize" << endl; if (m_bInit) return false; if (m_bAutoReconfig) m_cfg->load(); seedWithEGD(); // FIXME: we should be able to force SSL off entirely. // This logic here makes v2 a "default" if no other SSL // version is turned on. IMHO this is the safest one to // use as the default anyways, so I'm not changing it yet. d->lastInitTLS = false; if (m_cfg->sslv2() && m_cfg->sslv3()) d->m_meth = d->kossl->SSLv23_client_method(); else if (m_cfg->sslv3()) d->m_meth = d->kossl->SSLv3_client_method(); else d->m_meth = d->kossl->SSLv2_client_method(); /* if (m_cfg->sslv2() && m_cfg->sslv3()) kdDebug(7029) << "Double method" << endl; else if (m_cfg->sslv2()) kdDebug(7029) << "SSL2 method" << endl; else if (m_cfg->sslv3()) kdDebug(7029) << "SSL3 method" << endl; */ d->m_ctx = d->kossl->SSL_CTX_new(d->m_meth); if (d->m_ctx == NULL) { return false; } // set cipher list QString clist = m_cfg->getCipherList(); kdDebug(7029) << "Cipher list: " << clist << endl; if (!clist.isEmpty()) d->kossl->SSL_CTX_set_cipher_list(d->m_ctx, const_cast<char *>(clist.ascii())); m_bInit = true;return true;#elsereturn false;#endif}void KSSL::close() {#ifdef HAVE_SSL //kdDebug(7029) << "KSSL close" << endl; if (!m_bInit) return; if (d->m_ssl) { d->kossl->SSL_shutdown(d->m_ssl); d->kossl->SSL_free(d->m_ssl); d->m_ssl = NULL; } d->kossl->SSL_CTX_free(d->m_ctx); m_bInit = false;#endif}bool KSSL::reInitialize() { close(); return initialize();}// get the callback file - it's hidden away in here#include "ksslcallback.c"bool KSSL::setVerificationLogic() {#if 0#ifdef HAVE_SSL // SSL_set_verify_result(d->m_ssl, X509_V_OK); // SSL_CTX_set_verify(d->m_ctx, SSL_VERIFY_PEER, X509Callback);#endif#endif return true;}int KSSL::connect(int sock) {#ifdef HAVE_SSL // kdDebug(7029) << "KSSL connect" << endl; int rc; if (!m_bInit) return -1; d->m_ssl = d->kossl->SSL_new(d->m_ctx); if (!d->m_ssl) return -1; if (!setVerificationLogic()) return -1; if (!d->lastInitTLS) d->kossl->SSL_set_options(d->m_ssl, SSL_OP_NO_TLSv1); d->kossl->SSL_set_options(d->m_ssl, SSL_OP_ALL); rc = d->kossl->SSL_set_fd(d->m_ssl, sock); if (rc == 0) return rc; rc = d->kossl->SSL_connect(d->m_ssl); if (rc == 1) { setConnectionInfo(); setPeerInfo(sock); kdDebug(7029) << "KSSL connected OK" << endl; } else { kdDebug(7029) << "KSSL connect failed - rc = " << rc << endl; kdDebug(7029) << " ERROR = " << d->kossl->SSL_get_error(d->m_ssl, rc) << endl; return -1; } return rc;#else return -1;#endif}int KSSL::read(void *buf, int len) {#ifdef HAVE_SSL if (!m_bInit) return -1; return d->kossl->SSL_read(d->m_ssl, (char *)buf, len);#else return -1;#endif}int KSSL::write(const void *buf, int len) {#ifdef HAVE_SSL if (!m_bInit) return -1; return d->kossl->SSL_write(d->m_ssl, (const char *)buf, len);#else return -1;#endif}bool KSSL::reconfig() { return reInitialize();}void KSSL::setAutoReconfig(bool ar) { m_bAutoReconfig = ar;}bool KSSL::setSettings(KSSLSettings *settings) { delete m_cfg; m_cfg = settings; return reconfig();}#ifdef HAVE_SSLbool KSSL::m_bSSLWorks = true;#elsebool KSSL::m_bSSLWorks = false;#endifbool KSSL::doesSSLWork() { return m_bSSLWorks;}void KSSL::setConnectionInfo() {#ifdef HAVE_SSL SSL_CIPHER *sc; char buf[1024]; buf[0] = 0; // for safety. sc = d->kossl->SSL_get_current_cipher(d->m_ssl); if (!sc) { kdDebug(7029) << "KSSL get current cipher failed - we're probably gonna crash!" << endl; return; } // set the number of bits, bits used m_ci.m_iCipherUsedBits = d->kossl->SSL_CIPHER_get_bits(sc, &(m_ci.m_iCipherBits)); // set the cipher version m_ci.m_cipherVersion = d->kossl->SSL_CIPHER_get_version(sc); // set the cipher name m_ci.m_cipherName = d->kossl->SSL_CIPHER_get_name(sc); // set the cipher description m_ci.m_cipherDescription = d->kossl->SSL_CIPHER_description(sc, buf, 1023);#endif}void KSSL::setPeerHost(QString realHost) { d->proxyPeer = realHost;}void KSSL::setPeerInfo(int) {#ifdef HAVE_SSL m_pi.setPeerHost(d->proxyPeer); m_pi.m_cert.setCert(d->kossl->SSL_get_peer_certificate(d->m_ssl)); STACK_OF(X509) *xs = d->kossl->SSL_get_peer_cert_chain(d->m_ssl); if (xs) xs = sk_X509_dup(xs); // Leak? m_pi.m_cert.setChain((void *)xs);#endif}bool KSSL::pending() {#ifdef HAVE_SSL if (d->kossl->SSL_pending(d->m_ssl) > 0) return true;#endif return false;}KSSLConnectionInfo& KSSL::connectionInfo() { return m_ci;}void KSSL::setProxy(bool, QString) {}void KSSL::setProxyUse(bool, QString, int, QString) {}KSSLPeerInfo& KSSL::peerInfo() { return m_pi;}bool KSSL::setClientCertificate(KSSLPKCS12 *pkcs) {#ifdef HAVE_SSL int rc; X509 *x = pkcs->getCertificate()->getCert(); EVP_PKEY *k = pkcs->getPrivateKey(); if (!x || !k) return false; rc = d->kossl->SSL_CTX_use_certificate(d->m_ctx, x); if (rc <= 0) { kdDebug(7029) << "KSSL - SSL_CTX_use_certificate failed. rc = " << rc << endl; return false; } rc = d->kossl->SSL_CTX_use_PrivateKey(d->m_ctx, k); if (rc <= 0) { kdDebug(7029) << "KSSL - SSL_CTX_use_PrivateKey failed. rc = " << rc << endl; return false; } return true;#else return false;#endif}#undef sk_dup
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -