12.3.1 安全连接.htm

来自「Windows2000后台服务程序开发手册」· HTM 代码 · 共 352 行 · 第 1/5 页

HTM
352
字号
            INCOMPLETE_CREDENTIALS的回传值得知这个请求。</FONT></P>
            <HR style="LINE-HEIGHT: 25px">

            <P><FONT style="LINE-HEIGHT: 25px" face=Arial color=#3e77d7 size=3 
            Black><B style="LINE-HEIGHT: 25px">说明</B></FONT> </P>
            <P><FONT style="LINE-HEIGHT: 25px" face=arial color=#000000 
            size=2>实际状况中之客户端应用程序执行时,客户端可能不会搜寻凭证以及呼叫AcquireCredentialsHandle函数,直到它得知服务器要求彼此验证为止。我所列的范例函数皆假定使用客户端凭证的可能性,主要是简化范例之复杂逻辑的方法。</FONT></P>
            <HR style="LINE-HEIGHT: 25px">

            <HR style="LINE-HEIGHT: 25px">

            <P><FONT style="LINE-HEIGHT: 25px" face=Arial color=#3e77d7 size=3 
            Black><B style="LINE-HEIGHT: 25px">说明</B></FONT> </P>
            <P><FONT style="LINE-HEIGHT: 25px" face=arial color=#000000 
            size=2>如您所见的,SSL的细节使得情况更加复杂!然而,一旦您的验证程序完成后,通讯的一端或两端皆会持有另一端的凭证资讯。您可以经由呼叫QueryContextAttributes函数,使用完整的内容并传递SECPKG_ATTR_REMOTE_CERT_CONTEXT值及指标到PCCERT_CONTEXT结构中,以撷取凭证资讯。</FONT></P>
            <P><FONT style="LINE-HEIGHT: 25px" face=arial color=#000000 
            size=2>当您用完从SSL环境中撷取的凭证内容时,释放凭证内容是您的责任。可以使用CertFreeCertificateContext函数达成。</FONT></P>
            <HR style="LINE-HEIGHT: 25px">

            <P><FONT style="LINE-HEIGHT: 25px" face=arial color=#000000 
            size=2>在您撷取凭证内容后,可以使用前面章节中讨论的CryptoAPI函数从远端原则的凭证中取出资讯。</FONT></P>
            <P><FONT style="LINE-HEIGHT: 25px" face=arial color=#000000 
            size=2>以下所列之程序代码范例显示撷取凭证资讯的方法。此程序代码假定一个完整的内容,并且以存放在szNameBuf缓冲器中的远端凭证名称作为结束。</FONT></P>
            <DIV style="LINE-HEIGHT: 25px; BACKGROUND-COLOR: #d7d7d7"><FONT 
            style="LINE-HEIGHT: 25px" face=Arial size=3><PRE style="LINE-HEIGHT: 25px">// 取得服务器的凭证 <BR>PCCERT_CONTEXT pCertContext = NULL; <BR>ss = QueryContextAttributes(&amp;hContext, SECPKG_ATTR_REMOTE_CERT_CONTEXT, <BR> (PVOID)&amp;pCertContext); <BR>if(ss != SEC_E_OK){ <BR> // 错误 <BR>} <BR>// 找到我们从凭证解码的区块大小 <BR>ULONG lSize = 0; <BR>CryptDecodeObject( <BR> X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, <BR> X509_NAME, <BR> pCertContext-&gt;pCertInfo-&gt;Subject.pbData, // Data to decode <BR> pCertContext-&gt;pCertInfo-&gt;Subject.cbData, // Size of data <BR> 0, NULL, &amp;lSize); <BR>// 分配内存给区块 <BR>CERT_NAME_INFO* pcertNameInfo = (CERT_NAME_INFO*)alloca(lSize); <BR>// 实际从凭证中将主要区块解码 <BR>if(!CryptDecodeObject( <BR> X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, <BR> X509_NAME, <BR> pCertContext-&gt;pCertInfo-&gt;Subject.pbData, // Data to decode <BR> pCertContext-&gt;pCertInfo-&gt;Subject.cbData, // Size of data <BR> 0, pcertNameInfo, &amp;lSize)){ <BR> // 错误 <BR>} <BR>// 查询凭证的常见名称属性 <BR>PCERT_RDN_ATTR pcertRDNAttr = <BR> CertFindRDNAttr(szOID_COMMON_NAME, pcertNameInfo); <BR>if(pcertRDNAttr == NULL){ <BR> // 错误 <BR>} <BR>// 将CERT_RDN_ATTR结构中的资讯转换成为字串以便在您的应用程序中使用 <BR>TCHAR szNameBuf[1024]; <BR>if(CertRDNValueToStr(CERT_RDN_PRINTABLE_STRING, <BR> &amp;pcertRDNAttr-&gt;Value, szNameBuf, 1024) == 0){ <BR> // 错误 <BR>}</PRE></FONT></DIV>
            <P><FONT style="LINE-HEIGHT: 25px" face=arial color=#3e74d7 
            size=3><B style="LINE-HEIGHT: 25px">讯息的加密及解密<BR 
            style="LINE-HEIGHT: 25px">  </B></FONT></P>
            <P><FONT style="LINE-HEIGHT: 25px" face=arial color=#000000 
            size=2>如同您所猜想的,由于SSL的资料流导向方法,使得加密过程也有点复杂。然而,一旦您熟悉从一个接收函数组的末端接收附加资料的方法后,加密及解密即是可达成的任务。</FONT></P>
            <P><FONT style="LINE-HEIGHT: 25px" face=arial color=#000000 
            size=2>以下的两个函数说明了传送及接收加密讯息的方法。第一个函数为SendEncryptedMessage:</FONT></P>
            <DIV style="LINE-HEIGHT: 25px; BACKGROUND-COLOR: #d7d7d7"><FONT 
            style="LINE-HEIGHT: 25px" face=Arial size=3><PRE style="LINE-HEIGHT: 25px">BOOL SendEncryptedMessage(CtxtHandle*phContext,&nbsp;&nbsp;<BR> PVOID pvData, ULONG lSize){ <BR> BOOL fSuccess = FALSE; <BR> __try <BR> { <BR>&nbsp;&nbsp;SecPkgContext_StreamSizes Sizes; <BR>&nbsp;&nbsp;// 取得资料流资料的属性 <BR>&nbsp;&nbsp;SECURITY_STATUS ss = <BR>&nbsp;&nbsp; QueryContextAttributes( <BR>&nbsp;&nbsp;&nbsp;&nbsp;phContext, <BR>&nbsp;&nbsp;&nbsp;&nbsp;SECPKG_ATTR_STREAM_SIZES, <BR>&nbsp;&nbsp;&nbsp;&nbsp;&amp;Sizes); <BR>&nbsp;&nbsp;if (ss != SEC_E_OK){ <BR>&nbsp;&nbsp; __leave; <BR>&nbsp;&nbsp;} <BR>&nbsp;&nbsp;// 能够处理这么多的资料吗? <BR>&nbsp;&nbsp;if (lSize &gt; Sizes.cbMaximumMessage){ <BR>&nbsp;&nbsp; __leave; <BR>&nbsp;&nbsp;} <BR>&nbsp;&nbsp;// 这个缓冲器将成为标头,加上讯息及档尾的部份 <BR>&nbsp;&nbsp;ULONG lIOBufferLength = Sizes.cbHeader + <BR>&nbsp;&nbsp; Sizes.cbMaximumMessage + <BR>&nbsp;&nbsp; Sizes.cbTrailer;&nbsp;&nbsp;<BR>&nbsp;&nbsp;PBYTE pbIOBuffer = (PBYTE)alloca(lIOBufferLength); <BR>&nbsp;&nbsp;if (pbIOBuffer == NULL){ <BR>&nbsp;&nbsp; __leave; <BR>&nbsp;&nbsp;} <BR>&nbsp;&nbsp;// 这个资料在标头之后复制到缓冲器中 <BR>&nbsp;&nbsp;CopyMemory(pbIOBuffer+Sizes.cbHeader, (PBYTE)pvData, lSize); <BR>&nbsp;&nbsp;SecBuffer Buffers[3]; <BR>&nbsp;&nbsp;// 设定缓冲器中的标头 <BR>&nbsp;&nbsp;Buffers[0].BufferType = SECBUFFER_STREAM_HEADER; <BR>&nbsp;&nbsp;Buffers[0].pvBuffer = pbIOBuffer; <BR>&nbsp;&nbsp;Buffers[0].cbBuffer = Sizes.cbHeader; <BR>&nbsp;&nbsp;// 设定缓冲器中的资料 <BR>&nbsp;&nbsp;Buffers[1].BufferType = SECBUFFER_DATA; <BR>&nbsp;&nbsp;Buffers[1].pvBuffer = pbIOBuffer + Sizes.cbHeader; <BR>&nbsp;&nbsp;Buffers[1].cbBuffer = lSize; <BR>&nbsp;&nbsp;// 设定缓冲器中的档尾 <BR>&nbsp;&nbsp;Buffers[2].BufferType = SECBUFFER_STREAM_TRAILER; <BR>&nbsp;&nbsp;Buffers[2].pvBuffer = pbIOBuffer + Sizes.cbHeader + lSize; <BR>&nbsp;&nbsp;Buffers[2].cbBuffer = Sizes.cbTrailer; <BR>&nbsp;&nbsp;// 设定缓冲器描述项 <BR>&nbsp;&nbsp;SecBufferDesc secBufDescIn; <BR>&nbsp;&nbsp;secBufDescIn.ulVersion = SECBUFFER_VERSION; <BR>&nbsp;&nbsp;secBufDescIn.cBuffers = 3; <BR>&nbsp;&nbsp;secBufDescIn.pBuffers = Buffers; <BR>&nbsp;&nbsp;// 将资料加密 <BR>&nbsp;&nbsp;ss = EncryptMessage(phContext, 0, &amp;secBufDescIn, 0); <BR>&nbsp;&nbsp;if (ss != SEC_E_OK){ <BR>&nbsp;&nbsp; __leave; <BR>&nbsp;&nbsp;} <BR>&nbsp;&nbsp;// 在一个区块(Chunk)中传送叁个缓冲器 <BR>&nbsp;&nbsp;ULONG lOut = Buffers[0].cbBuffer + Buffers[1].cbBuffer + <BR>&nbsp;&nbsp; Buffers[2].cbBuffer; <BR>&nbsp;&nbsp;SendData(pbIOBuffer, lOut); <BR>&nbsp;&nbsp;fSuccess = TRUE; <BR> }__finally{} <BR> return (fSuccess); <BR>} <BR>&lt;/程序代码&gt; <BR>以下为GetEncryptedMessage函数的内容: <BR>&lt;程序代码&gt; <BR>PVOID GetEncryptedMessage( <BR> CtxtHandle* phContext, <BR> PULONG plSize, <BR> PBYTE* ppbExtraData, <BR> PULONG pcbExtraData, <BR> ULONG lSizeExtraDataBuf, <BR> BOOL* pfReneg){ <BR> PVOID pDecrypMsg = NULL; <BR> *pfReneg = FALSE; <BR> __try <BR> { <BR>&nbsp;&nbsp;// 宣告缓冲器描述项 <BR>&nbsp;&nbsp;SecBufferDesc SecBuffDesc = {0}; <BR>&nbsp;&nbsp;// 宣告缓冲器 <BR>&nbsp;&nbsp;SecBuffer&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Buffers[4] == {0}; <BR>&nbsp;&nbsp;// 附加到达的资料 <BR>&nbsp;&nbsp;PBYTE pbData = *ppbExtraData; <BR>&nbsp;&nbsp;ULONG cbData = *pcbExtraData; <BR>&nbsp;&nbsp;SECURITY_STATUS ss = SEC_E_INCOMPLETE_MESSAGE; <BR>&nbsp;&nbsp;do <BR>&nbsp;&nbsp;{ <BR>&nbsp;&nbsp; // 设定指向附加资料的初始资料缓冲器 <BR>&nbsp;&nbsp; Buffers[0].BufferType = SECBUFFER_DATA; <BR>&nbsp;&nbsp; Buffers[0].pvBuffer = pbData; <BR>&nbsp;&nbsp; Buffers[0].cbBuffer = cbData; <BR>&nbsp;&nbsp; // 设定叁个空的输出缓冲器 <BR>&nbsp;&nbsp; Buffers[1].BufferType = SECBUFFER_EMPTY; <BR>&nbsp;&nbsp; Buffers[2].BufferType = SECBUFFER_EMPTY; <BR>&nbsp;&nbsp; Buffers[3].BufferType = SECBUFFER_EMPTY; <BR>&nbsp;&nbsp; // 设定描述项 <BR>&nbsp;&nbsp; SecBuffDesc.ulVersion = SECBUFFER_VERSION; <BR>&nbsp;&nbsp; SecBuffDesc.cBuffers&nbsp;&nbsp;= 4; <BR>&nbsp;&nbsp; SecBuffDesc.pBuffers&nbsp;&nbsp; = Buffers; <BR>&nbsp;&nbsp; // 假如真的有任何资料存在,试着将资料解密 <BR>&nbsp;&nbsp; if (cbData) <BR>&nbsp;&nbsp;&nbsp;&nbsp;ss = DecryptMessage(phContext, &amp;SecBuffDesc, 0, NULL); <BR>&nbsp;&nbsp; if (ss == SEC_E_INCOMPLETE_MESSAGE || cbData == 0){ <BR>&nbsp;&nbsp;&nbsp;&nbsp;ULONG lReadSize; <BR>&nbsp;&nbsp;&nbsp;&nbsp;// 必须读进更多资料并且再试一次 <BR>&nbsp;&nbsp;&nbsp;&nbsp;lReadSize = lSizeExtraDataBuf - cbData; <BR>&nbsp;&nbsp;&nbsp;&nbsp;ReceiveData(pbData+cbData, &amp;lReadSize); <BR>&nbsp;&nbsp;&nbsp;&nbsp;cbData += lReadSize; <BR>&nbsp;&nbsp; } <BR>&nbsp;&nbsp;}while (ss == SEC_E_INCOMPLETE_MESSAGE); <BR>&nbsp;&nbsp;// 解密成功了吗? <BR>&nbsp;&nbsp;if (ss == SEC_E_OK){ <BR>&nbsp;&nbsp; // 分配缓冲器给呼叫者并且复制解密后的讯息给它 <BR>&nbsp;&nbsp; *plSize = Buffers[1].cbBuffer; <BR>&nbsp;&nbsp; pDecrypMsg = (PVOID)LocalAlloc(0, *plSize); <BR>&nbsp;&nbsp; if (pDecrypMsg == NULL){ <BR>&nbsp;&nbsp;&nbsp;&nbsp;__leave; <BR>&nbsp;&nbsp; } <BR>&nbsp;&nbsp; CopyMemory(pDecrypMsg,Buffers[1].pvBuffer,*plSize); <BR>&nbsp;&nbsp; // 假如有附加资料的话,把它移到缓冲器的开始处,然后再设定附 <BR>&nbsp;&nbsp; // 加资料传回的大小值 <BR>&nbsp;&nbsp; int nIndex = 3; <BR>&nbsp;&nbsp; while(Buffers[nIndex].BufferType <BR>&nbsp;&nbsp;&nbsp;&nbsp;!= SECBUFFER_EXTRA &amp;&amp; (nIndex-- != 0)); <BR>&nbsp;&nbsp; if (nIndex != -1){ <BR>&nbsp;&nbsp;&nbsp;&nbsp;// 有更多资料要处理。把它移到附加资料缓冲器的前端, <BR>&nbsp;&nbsp;&nbsp;&nbsp;// 呼叫者可以处理解密后的讯息然后再返回完成其馀的动 <BR>&nbsp;&nbsp;&nbsp;&nbsp;//作 <BR>&nbsp;&nbsp;&nbsp;&nbsp;*pcbExtraData = Buffers[nIndex].cbBuffer; <BR>&nbsp;&nbsp;&nbsp;&nbsp;MoveMemory(pbData, pbData + (cbData - *pcbExtraData), <BR>&nbsp;&nbsp;&nbsp;&nbsp; *pcbExtraData); <BR>&nbsp;&nbsp; } <BR>&nbsp;&nbsp;} <BR>&nbsp;&nbsp;if (ss == SEC_I_RENEGOTIATE){ <BR>&nbsp;&nbsp; *pfReneg = TRUE; <BR>&nbsp;&nbsp;} <BR> }__finally{} <BR> // 传回解密后的讯息 <BR> return (pDecrypMsg); <BR>}</PRE></FONT></DIV>
            <P><FONT style="LINE-HEIGHT: 25px" face=arial color=#000000 
            size=2>从这个程序代码中可以看到,这些函数除了必须注意附加资料的可能性以外,其逻辑与本章其他的范例函数类似。反之,传送函数不用担心附加资料的部份,其接收或解密函数必须取得具有潜在附加资料的缓冲器,并能够传回这个相同缓冲器里的附加资料。这个接收动作可以与它之前、之后,或两者的接收动作重叠。</FONT></P>
            <P><FONT style="LINE-HEIGHT: 25px" face=arial color=#000000 
            size=2>SSL合并了加密及讯息签章的概念,所以不必为SSL实作MakeSignature及VerifySignature函数的部份。Schannel安全性套件不支援这个函数。您可能会注意到GetEncryptedMessage范例函数中测试了SEC_I_RENEGOTIATE的传回值,假如这个值是由DecryptMessage函数传回时,它会填入一个为TRUE值的Boolean变数。此回传值指出服务器要求重新协商凭证,而且通常表示它想把匿名的客户端验证提升为具有凭证的完整客户端验证。</FONT></P>
            <P><FONT style="LINE-HEIGHT: 25px" face=arial color=#000000 
            size=2>当DecryptMessage传回SEC_I_RENEGOTIATE值时,表示没有解密过的讯息,而且任何输出缓冲器中不会有解密资料存在。</FONT></P>
            <P><FONT style="LINE-HEIGHT: 25px" face=arial color=#3e74d7 
            size=3><B style="LINE-HEIGHT: 25px">重新协商的处理<BR 
            style="LINE-HEIGHT: 25px">  </B></FONT></P>
            <P><FONT style="LINE-HEIGHT: 25px" face=arial color=#000000 
            size=2>假如客户端对一个被保护的资源提出请求,此时您的服务器可能会想要把匿名的客户端验证提升为具有凭证的验证。如此一来,您的服务器就必须初始一个重新协商的程序。</FONT></P>
            <P><FONT style="LINE-HEIGHT: 25px" face=arial color=#000000 
            size=2>通常SSL的通讯中,客户端及服务器会经由传送及接收加密的资料缓冲器而互相通讯。然而,当服务器想要初始一个重新协商的程序而非加密及传送资讯时,服务器便会呼叫AcceptSecurityContext函数。在这种情况下,服务器没有传递输入缓冲器到函数中,而且函数会传回应该传送到客户端的Blob值。客户端会了解此Blob表示它应该开始一个重新协商的程序。以下的范例函数显示服务器实作这个程序代码的方法:</FONT></P>
            <DIV style="LINE-HEIGHT: 25px; BACKGROUND-COLOR: #d7d7d7"><FONT 
            style="LINE-HEIGHT: 25px" face=Arial size=3><PRE style="LINE-HEIGHT: 25px">BOOL SSLServerInitReneg( <BR> CredHandle* phCredentials, <BR> CtxtHandle* phContext) <BR>{ <BR> BOOL fSuccess = FALSE; <BR> __try <BR> { <BR>&nbsp;&nbsp;// 宣告输出缓冲器 <BR>&nbsp;&nbsp;SecBuffer secBufferOut; <BR>&nbsp;&nbsp;SecBufferDesc secBufDescriptorOut; <BR>&nbsp;&nbsp;// 设定输出缓冲器(经由SSPI分配) <BR>&nbsp;&nbsp;secBufferOut.BufferType = SECBUFFER_TOKEN; <BR>&nbsp;&nbsp;secBufferOut.cbBuffer = 0; <BR>&nbsp;&nbsp;secBufferOut.pvBuffer = NULL; <BR>&nbsp;&nbsp;// 设定输出缓冲器描述项 <BR>&nbsp;&nbsp;secBufDescriptorOut.cBuffers = 1; <BR>&nbsp;&nbsp;secBufDescriptorOut.pBuffers = &amp;secBufferOut; <BR>&nbsp;&nbsp;secBufDescriptorOut.ulVersion = SECBUFFER_VERSION; <BR>&nbsp;&nbsp;ULONG lAttrOut = 0; <BR>&nbsp;&nbsp;SECURITY_STATUS ss = <BR>&nbsp;&nbsp; AcceptSecurityContext( <BR>&nbsp;&nbsp;&nbsp;&nbsp;phCredentials, <BR>&nbsp;&nbsp;&nbsp;&nbsp;phContext, <BR>&nbsp;&nbsp;&nbsp;&nbsp;NULL, <BR>&nbsp;&nbsp;&nbsp;&nbsp;ASC_REQ_ALLOCATE_MEMORY|ASC_REQ_STREAM|ASC_REQ_MUTUAL_AUTH, <BR>&nbsp;&nbsp;&nbsp;&nbsp;SECURITY_NATIVE_DREP, <BR>&nbsp;&nbsp;&nbsp;&nbsp;phContext, <BR>&nbsp;&nbsp;&nbsp;&nbsp;&amp;secBufDescriptorOut, <BR>&nbsp;&nbsp;&nbsp;&nbsp;&amp;lAttrOut, <BR>&nbsp;&nbsp;&nbsp;&nbsp;NULL); <BR>&nbsp;&nbsp;if (ss != SEC_E_OK) <BR>&nbsp;&nbsp; __leave; <BR>&nbsp;&nbsp;// 有资料要传送吗? <BR>&nbsp;&nbsp;if (secBufferOut.cbBuffer!=0){ <BR>&nbsp;&nbsp; // 传送它 <BR>&nbsp;&nbsp; ULONG lOut = secBufferOut.cbBuffer; <BR>&nbsp;&nbsp; SendData(secBufferOut.pvBuffer, lOut); <BR>&nbsp;&nbsp; // 然后释放输出缓冲器 <BR>&nbsp;&nbsp; FreeContextBuffer(secBufferOut.pvBuffer ); <BR>&nbsp;&nbsp;} <BR>&nbsp;&nbsp;fSuccess = TRUE; <BR> }__finally{} <BR> return (fSuccess); <BR>}</PRE></FONT></DIV>
            <P><FONT style="LINE-HEIGHT: 25px" face=arial color=#000000 
            size=2>如同我们在DecryptMessage函数讨论中提到的,当DecryptMessage传回SEC_I_RENEGOTIATE值时,客户端首先会知道服务器要求重新协商的程序。这个时候,假如客户端同意重新协商,则它应该带着适当的凭证handle进入验证回圈的程序中。</FONT></P>
            <P><FONT style="LINE-HEIGHT: 25px" face=arial color=#000000 
            size=2>服务器也应该在要求重新协商后进入自己的重新协商验证程序。服务器的责任即是检验客户端是否已经提供适当的凭证。客户端很有可能只重新传送它的匿名凭证。</FONT></P>
            <P><FONT style="LINE-HEIGHT: 25px" face=arial color=#000000 
            size=2>以下列出的程序代码片段表示服务器在重新协商程序中所扮演的角色。</FONT></P>
            <DIV style="LINE-HEIGHT: 25px; BACKGROUND-COLOR: #d7d7d7"><FONT 
            style="LINE-HEIGHT: 25px" face=Arial size=3><PRE style="LINE-HEIGHT: 25px">// 服务器需要与客户端重新协商 <BR>if(!SSLServerInitReneg( <BR> &amp;hCredentials, <BR> &amp;hContext)){ <BR> // 错误情况 <BR>} <BR>// 设定验证交握的标记 <BR>dwSSPIFlags = ASC_REQ_SEQUENCE_DETECT&nbsp;&nbsp; | <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ASC_REQ_REPLAY_DETECT&nbsp;&nbsp;&nbsp;&nbsp; | <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ASC_REQ_CONFIDENTIALITY&nbsp;&nbsp; | <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;/* 指出要求客户端凭证 */ <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ASC_REQ_MUTUAL_AUTH&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; | <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ASC_RET_EXTENDED_ERROR; <BR>cbExtra = 0; <BR>// 再进入验证回圈 <BR>ss = SSLServerHandshakeAuth(&amp;hCredentials, <BR> &amp;dwSSPIFlags, &amp;hContext, pIOBuff, &amp;cbExtra, lIOBuffSize); <BR>if (ss == SEC_E_OK){ <BR> // 重新协商成功 <BR>}</PRE></FONT></DIV>
            <P><FONT style="LINE-HEIGHT: 25px" face=arial color=#000000 
            size=2>同样的,以下列出的程序代码片段显示在重新协商程序中客户端所扮演的角色(假设客户端拥有一个重新协商的凭证):</FONT></P>
            <DIV style="LINE-HEIGHT: 25px; BACKGROUND-COLOR: #d7d7d7"><FONT 
            style="LINE-HEIGHT: 25px" face=Arial size=3><PRE style="LINE-HEIGHT: 25px">// 照惯例取得解密讯息 <BR>cbMsg = 0; <BR>cbExtra = 0; <BR>pMsg = <BR> GetEncryptedMessage( <BR>&nbsp;&nbsp;&amp;hContext, <BR>&nbsp;&nbsp;&amp;cbMsg, <BR>&nbsp;&nbsp;&amp;pIOBuff, <BR>&nbsp;&nbsp;&amp;cbExtra, <BR>&nbsp;&nbsp;lIOBuffSize, <BR>&nbsp;&nbsp;&amp;fReneg); <BR>// 假如它执行失败,这是重新协商的请求吗? <BR>if ((pMsg == NULL) &amp;&amp; fReneg){ <BR> // 如果是,那么带着与凭证相关的凭证handle重新进入验证回圈 <BR> ULONG&nbsp;&nbsp; lSSPIFlags = ISC_REQ_SEQUENCE_DETECT | <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ISC_REQ_REPLAY_DETECT&nbsp;&nbsp;&nbsp;&nbsp; | <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ISC_REQ_CONFIDENTIALITY&nbsp;&nbsp; | <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ISC_RET_EXTENDED_ERROR; <BR> ss = <BR>&nbsp;&nbsp;SSLClientHandshakeAuth( <BR>&nbsp;&nbsp; &amp;hCertCredentials, <BR>&nbsp;&nbsp; &amp;hCertCredentials, <BR>&nbsp;&nbsp; &amp;lSSPIFlags, <BR>&nbsp;&nbsp; &amp;hContext, <BR>&nbsp;&nbsp; TEXT("Jason’s Test Server Certificate on Davemm"), <BR>&nbsp;&nbsp; pIOBuff, &amp;cbExtra, lIOBuffSize); <BR> if (ss == SEC_E_OK){ <BR>&nbsp;&nbsp;// 重新协商成功 <BR> } <BR>}</PRE></FONT></DIV>
            <HR style="LINE-HEIGHT: 25px">

            <P><FONT style="LINE-HEIGHT: 25px" face=Arial color=#3e77d7 size=3 
            Black><B style="LINE-HEIGHT: 25px">说明</B></FONT> </P>
            <P><FONT style="LINE-HEIGHT: 25px" face=arial color=#000000 
            size=2>如果您的客户端软件必须与要求重新协商的服务器通讯时,无论它什么时候会呼叫DecryptMessage函数,能够让您的客户端优雅地处理重新协商要求是很重要的。</FONT></P>

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?