亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? sslclientsocket.cpp

?? 實現了數字證書的制作、SSL安全通訊、加解密操作等功能
?? CPP
字號:
// SslClientSocket.cpp : implementation file
//

#include "stdafx.h"
#include "UsbKey.h"
//#include "winsock2.h"
#include "SslClientSocket.h"

#ifdef _DEBUG
#define new DEBUG_NEW
#undef THIS_FILE
static char THIS_FILE[] = __FILE__;
#endif

/////////////////////////////////////////////////////////////////////////////
// CSslClientSocket

CSslClientSocket::CSslClientSocket()
{
	m_Ctx=NULL;
	m_Ssl=NULL;
	m_pList=NULL;
}

CSslClientSocket::~CSslClientSocket()
{
}


// Do not edit the following lines, which are needed by ClassWizard.
#if 0
BEGIN_MESSAGE_MAP(CSslClientSocket, CAsyncSocket)
	//{{AFX_MSG_MAP(CSslClientSocket)
	//}}AFX_MSG_MAP
END_MESSAGE_MAP()
#endif	// 0

/////////////////////////////////////////////////////////////////////////////
// CSslClientSocket member functions
X509 * CSslClientSocket::load_cert(BIO *cert/*輸入BIO*/, int format/*格式*/,char * pwd,/*P12密碼*/char * outMsg)
{
	ASN1_HEADER *ah=NULL;
	BUF_MEM *buf=NULL;
	X509 *x=NULL;

	if 	(format == DER)
		x=d2i_X509_bio(cert,NULL);
	else if (format == PEM)
		x=PEM_read_bio_X509(cert,NULL,NULL,NULL);//PEM_read_bio_X509_AUX
	else if (format == P12)
	{
		PKCS12 *p12 = d2i_PKCS12_bio(cert, NULL);
		PKCS12_parse(p12, pwd, NULL, &x, NULL);
		PKCS12_free(p12);
		p12 = NULL;
	}
	else
	{
		sprintf(outMsg,"bad input format specified for input cert\n");
		goto end;
	}
end:
	if (x == NULL)
	{
		sprintf(outMsg,"unable to load certificate\n");
	}
	if (ah != NULL) ASN1_HEADER_free(ah);
	if (buf != NULL) BUF_MEM_free(buf);
	return(x);
}

X509 * CSslClientSocket::LoadCert(char * cert,int certlen,char * outMsg)//枚舉DER/PEM格式
{
	BIO * in=NULL;
	X509 * x509=NULL;

	if(certlen==0)//輸入為磁盤文件
	{
		if((in=BIO_new_file(cert, "r")) == NULL)
		{
			sprintf(outMsg,"open CA certificate file error");
			return NULL;
		}
	}
	else//輸入為內存中文件
	{
		if((in=BIO_new_mem_buf(cert,certlen))== NULL)//只讀類型
		{
			sprintf(outMsg,"Make Mem Bio Error");
			return NULL;
		}
	}
	if((x509=load_cert(in,DER,NULL,outMsg))==NULL)//嘗試DER
	{
		BIO_reset(in);//恢復bio
		x509=load_cert(in,PEM,NULL,outMsg);//嘗試PEM
	}
	if (in != NULL) BIO_free(in);
	return x509;
}

EVP_PKEY * CSslClientSocket::load_key(BIO *bio, int format, char *pass,char * outMsg)
{
	EVP_PKEY *pkey=NULL;

	if (format == DER)
	{
		pkey=d2i_PrivateKey_bio(bio, NULL);
	}
	else if (format == PEM)
	{
		pkey=PEM_read_bio_PrivateKey(bio,NULL,NULL,pass);
	}
	else if (format == P12)
	{
		PKCS12 *p12 = d2i_PKCS12_bio(bio, NULL);
		PKCS12_parse(p12, pass, &pkey, NULL, NULL);
		PKCS12_free(p12);
		p12 = NULL;
	}
	else
	{
		sprintf(outMsg,"bad input format specified for key\n");
		goto end;
	}
end:
	if (pkey == NULL)
		sprintf(outMsg,"unable to load Private Key\n");
	return(pkey);
}

EVP_PKEY * CSslClientSocket::LoadKey(char * key,int keylen,char * pass,char * outMsg)
{
	EVP_PKEY *pkey=NULL;
	BIO * in=NULL;

	if(keylen==0)//輸入為磁盤文件
	{
		if((in=BIO_new_file(key, "r")) == NULL)
		{
			sprintf(outMsg,"open CA certificate file error");
			return NULL;
		}
	}
	else//輸入為內存中文件
	{
		if((in=BIO_new_mem_buf(key,keylen))== NULL)//只讀類型
		{
			sprintf(outMsg,"Make Mem Bio Error");
			return NULL;
		}
	}

	if((pkey=load_key(in,DER,pass,outMsg))==NULL)//嘗試DER
	{
		BIO_reset(in);//BIO是可讀寫的,那么該BIO所有數據都會被清空;
						//如果該BIO是只讀的,那么該操作只會簡單將指
						//針指向原始位置,里面的數據可以再讀.
		pkey=load_key(in,PEM,pass,outMsg);//嘗試PEM
	}
	if (in != NULL) BIO_free(in);
	return pkey;
}

int CSslClientSocket::Rand(const char *file,int dont_warn,char * outMsg)
{
	int consider_randfile = (file == NULL);
	char buffer[200];
	
#ifdef WINDOWS
//	BIO_flush(bio_e);
	RAND_screen();
#endif
	
	if (file == NULL)
		file = RAND_file_name(buffer, sizeof buffer);
	else if (RAND_egd(file) > 0)
	{
	/* we try if the given filename is an EGD socket.
		if it is, we don't write anything back to the file. */
		return 1;
	}
	if (file == NULL || !RAND_load_file(file, -1))
	{
		if (RAND_status() == 0 && !dont_warn)
		{
			sprintf(outMsg,"unable to load 'random state'\n");
			sprintf(outMsg,"This means that the random number generator has not been seeded\n");
			if (consider_randfile) /* explanation does not apply when a file is explicitly named */
			{
				sprintf(outMsg,"Consider setting the RANDFILE environment variable to point at a file that\n");
				sprintf(outMsg,"'random' data can be kept in (the file will be overwritten).\n");
			}
		}
		return 0;
	}
	return 1;
}

void CSslClientSocket::GetPeerInfo(SSL * ssl,stuSERVERINFO * stu)
{
	
	X509 *peer=NULL;
	char *p;
	static char *space="                ";
	char buf[BUFSIZ];//512
	STACK_OF(X509) *sk;
	STACK_OF(X509_NAME) *sk2;
	SSL_CIPHER *c;
	X509_NAME *xn;
	int j,i;
	BIO *bio=BIO_new(BIO_s_mem());
	char bufout[1024]={0};
	
	int got_a_chain = 0;
	
	sk=SSL_get_peer_cert_chain(ssl);//returns a pointer to STACKOF(X509) certificates
	if (sk != NULL)
	{
		got_a_chain = 1; /* we don't have it for SSL2 (yet) */
		
		for (i=0; i<sk_X509_num(sk); i++)
		{
			X509_NAME_oneline(X509_get_subject_name(sk_X509_value(sk,i)),
				stu->peerChain.sub,BUFSIZ);
			X509_NAME_oneline(X509_get_issuer_name(sk_X509_value(sk,i)),
				stu->peerChain.iss,BUFSIZ);
			//	PEM_write_bio_X509(bio,sk_X509_value(sk,i));
			//	BIO_read(bio,bufout,4*BUFSIZ);
		}
	}
	
	peer=SSL_get_peer_certificate(ssl);
	if (peer != NULL)
	{
		//	Server certificate
		PEM_write_bio_X509(bio,peer);
		BIO_read(bio,stu->Cert,4*BUFSIZ);
		BIO_flush(bio);
		X509_NAME_oneline(X509_get_subject_name(peer),
			stu->peerCert.sub,BUFSIZ);
		X509_NAME_oneline(X509_get_issuer_name(peer),
			stu->peerCert.iss,BUFSIZ);
	}
	else
		strcpy(stu->Cert,"no peer certificate available");
	
	sk2=SSL_get_client_CA_list(ssl);
	if ((sk2 != NULL) && (sk_X509_NAME_num(sk2) > 0))
	{
		//	BIO_printf(bio,"---\nAcceptable client certificate CA names\n");
		for (i=0; i<sk_X509_NAME_num(sk2); i++)
		{
			xn=sk_X509_NAME_value(sk2,i);
			X509_NAME_oneline(xn,stu->selfChain,BUFSIZ);
			//	BIO_write(bio,buf,strlen(buf));
			//	BIO_write(bio,"\n",1);
		}
	}
	else
	{
		strcpy(stu->selfChain,"No client certificate CA names sent");
	}
	
	p=SSL_get_shared_ciphers(ssl,buf,BUFSIZ);
	if (p != NULL)
	{
	/* This works only for SSL 2.  In later protocol
	* versions, the client does not know what other
	* ciphers (in addition to the one to be used
		* in the current connection) the server supports. */
		
		//	BIO_printf(bio,"---\nCiphers common between both SSL endpoints:\n");
		j=i=0;
		while (*p)
		{
			if (*p == ':')
			{
				BIO_write(bio,space,15-j%25);
				i++;
				j=0;
				BIO_write(bio,((i%3)?" ":"\n"),1);
			}
			else
			{
				BIO_write(bio,p,1);
				j++;
			}
			p++;
		}
		BIO_write(bio,"\n",1);
	}
	
	//SSL handshake has read %ld bytes and written %ld bytes\n",
	stu->read=BIO_number_read(SSL_get_rbio(ssl));
	stu->written=BIO_number_written(SSL_get_wbio(ssl));
	
	//	BIO_printf(bio,((s->hit)?"---\nReused, ":"---\nNew, "));
	c=SSL_get_current_cipher(ssl);
	//BIO_printf(bio,"%s, Cipher is %s\n",
	strcpy(stu->CiphersVer,SSL_CIPHER_get_version(c));
	strcpy(stu->CiphersName,SSL_CIPHER_get_name(c));
	if (peer != NULL)
	{
		EVP_PKEY *pktmp;
		pktmp = X509_get_pubkey(peer);
		//Server public key bit
		stu->CertBit=EVP_PKEY_bits(pktmp);
		EVP_PKEY_free(pktmp);
	}
	SSL_SESSION_print(bio,SSL_get_session(ssl));
	BIO_read(bio,stu->Session,4*BUFSIZ);
	/* flush, or debugging output gets mixed with http response */
	BIO_flush(bio);
	if (peer != NULL)
		X509_free(peer);
	BIO_free(bio);
}

BOOL CSslClientSocket::SockConnect(SSL_METHOD *meth,char *certfile,int certlen, char *keyfile,int keylen,
		char * cafile, char * capath,CColorListBox * plist,LPCTSTR lpszHostAddress, UINT nHostPort,char * out)
{
	EVP_PKEY *pkey=NULL;
	X509 *x509=NULL;
	CString str;
	unsigned long l=1;
	BIO * sbio=NULL;
	struct hostent *hp;
    struct sockaddr_in addr;
    int sock,i=0;

	m_pList=plist;/////////////////////

	OpenSSL_add_ssl_algorithms();

    m_Ctx=SSL_CTX_new(meth);
	if (m_Ctx == NULL)
	{
		strcpy(out,"Create ctx error");
		return FALSE;
	}
	SSL_CTX_set_options(m_Ctx,SSL_OP_ALL);
	
	pkey=LoadKey(keyfile,keylen,NULL,out);
	
	if (pkey == NULL)
	{
		sprintf(out,"unable to load CA private key\n");
		m_Ctx=NULL;
		goto err;
	}
	
    if(!(SSL_CTX_use_PrivateKey(m_Ctx,pkey)))
	{
		strcpy(out,"adds private key to ctx error");
		SSL_CTX_free(m_Ctx);
		m_Ctx=NULL;
		goto err;
	}
	
	x509=LoadCert(certfile,certlen,out);
	if (x509 == NULL)
	{
		sprintf(out,"unable to load CA certificate\n");
		SSL_CTX_free(m_Ctx);
		m_Ctx=NULL;
		goto err;
	}
	
    if(!(SSL_CTX_use_certificate(m_Ctx,x509)))
	{
		strcpy(out,"loads certificate into ctx error");
		SSL_CTX_free(m_Ctx);
		m_Ctx=NULL;
		goto err;
	}
	
	if (!SSL_CTX_check_private_key(m_Ctx))
	{
		strcpy(out,"Private key does not match the certificate public key");
		SSL_CTX_free(m_Ctx);
		m_Ctx=NULL;
		goto err;
	}
	
    /* Load the CAs we trust*/
   if(!(SSL_CTX_load_verify_locations(m_Ctx,cafile,/*capath*/NULL)))
	{
		strcpy(out,"Couldn't read CA list");
		SSL_CTX_free(m_Ctx);
		m_Ctx=NULL;
		goto err;
	}
	SSL_CTX_set_verify_depth(m_Ctx,1);
    SSL_CTX_set_client_CA_list(m_Ctx,SSL_load_client_CA_file(cafile));
    m_Ssl=SSL_new(m_Ctx);
	if(m_Ssl==NULL)
	{
		strcpy(out,"Make SSL Error");
		goto err;
	}
    /* Load randomness */
	Rand(NULL,1,out);

	/*連接服務器*/

    if(!(hp=gethostbyname(lpszHostAddress)))
	{
		strcpy(out,"Couldn't resolve host");
		return FALSE;
	}
    memset(&addr,0,sizeof(addr));
    addr.sin_addr=*(struct in_addr*)hp->h_addr_list[0];
    addr.sin_family=AF_INET;
    addr.sin_port=htons(nHostPort);
	
	sock=socket(AF_INET,SOCK_STREAM,IPPROTO_TCP);
	if (sock == INVALID_SOCKET) 
	{
		strcpy(out,"create socket error"); 
		return FALSE;
	}
	
	i=setsockopt(sock,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,sizeof(i));
	if (i < 0)
	{
		strcpy(out,"setsockopt error"); 
		return FALSE;
	}
	
	if (connect(sock,(struct sockaddr *)&addr,sizeof(addr)) == SOCKET_ERROR)
	{
		SSlShouDown();
		strcpy(out,"connect error"); 
		return FALSE; 
	}

    /* Connect the SSL socket */
	if (BIO_socket_ioctl(sock,FIONBIO,&l) < 0)
	{
		strcpy(out,"io set error");
		shutdown(sock,2);
		closesocket(sock);
		SSlShouDown();
		return FALSE;
	}
	
    sbio=BIO_new_socket(sock,BIO_NOCLOSE);
    SSL_set_bio(m_Ssl,sbio,sbio);
	SSL_set_connect_state(m_Ssl);
	Attach(sock,FD_WRITE|FD_CLOSE);
	str.Format("%d接入服務器%s,等待握手....",m_hSocket,inet_ntoa(addr.sin_addr));
	m_pList->AddMsg(str,M_WARING);
    return TRUE;

err:
	EVP_PKEY_free(pkey);
	X509_free(x509);
	SSlShouDown();
	return FALSE;
}

int CSslClientSocket::SSlConnect(stuSERVERINFO * stu,char * out)
{
	if(m_Ssl==NULL)
	{
		strcpy(out,"SSL沒有正確初始化");
		return -1;
	}
	int err=0;
	if ((err = SSL_connect(m_Ssl)) <= 0)
	{
		if (BIO_sock_should_retry(err))
		{
			return 0;//重試
		}
		else 
		{
			strcpy(out,"SSL連接失敗");//ERR_clear_error
			return -1;
		}
	}
	GetPeerInfo(m_Ssl,stu);
	return 1;
}

void CSslClientSocket::SSlShouDown()
{
	if(m_Ctx!=NULL)
	{
		SSL_CTX_free(m_Ctx);
		m_Ctx=NULL;
	}
	if(m_Ssl!=NULL)
	{
		SSL_shutdown(m_Ssl);
		SSL_free(m_Ssl);
		m_Ssl=NULL;
	}
	if(m_hSocket != INVALID_SOCKET)
	{
		ShutDown(0);//receives
		Close();
	}
}

int CSslClientSocket::SSlSend(char *buf, int len)
{
	if(m_Ssl==NULL)
		return -1;
	int k=0;
	for(;;)
	{
		k = SSL_write(m_Ssl,buf,len);
		if (k <= 0)
		{
			if (BIO_sock_should_retry(k))
			{
				Sleep(100);
				continue;//重試
			}
			return k;//出錯
		}
		break;
	}
	AsyncSelect(FD_READ|FD_CLOSE);
	return k;
}

int CSslClientSocket::SSlReceive(char *buf, int len)
{
	if(m_Ssl==NULL)
		return 0;
	int k=0;
	do
	{
		for(;;)
		{
			k = SSL_read(m_Ssl,buf,len);
			if (k <=0)
			{
				if (BIO_sock_should_retry(k))
				{
					Sleep(100);
					continue;//重試
				}
				return k;//錯誤退出				
			}
			m_pList->AddMsg(buf);
			break;
		}
	}while (SSL_pending(m_Ssl));

	return k;
}

void CSslClientSocket::OnClose(int nErrorCode) 
{
	// TODO: Add your specialized code here and/or call the base class
	CString serverIp,str;
	unsigned int port;
	GetPeerName(serverIp,port);//得到用戶ip,port
	str.Format("%d被服務器%s斷開",m_hSocket,serverIp);
	m_pList->AddMsg(str,M_WARING);
	SSlShouDown();
	CAsyncSocket::OnClose(nErrorCode);
}

void CSslClientSocket::OnReceive(int nErrorCode) 
{
	// TODO: Add your specialized code here and/or call the base class
	char buf[1024]={0};
	SSlReceive(buf,1024);
	CAsyncSocket::OnReceive(nErrorCode);
}

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩一区精品字幕| 一本大道久久a久久综合| 国产成人日日夜夜| 欧美性色综合网| 国产亚洲制服色| 日韩国产精品91| 色婷婷国产精品久久包臀| 久久久国际精品| 日韩成人精品视频| 在线精品视频免费播放| 国产精品三级在线观看| 国产一区欧美一区| 日韩美一区二区三区| 亚洲国产美国国产综合一区二区| 成人av在线影院| 久久蜜臀中文字幕| 九色综合狠狠综合久久| 91麻豆精品国产91久久久使用方法| 自拍偷拍亚洲综合| 成人免费看片app下载| 欧美精品一区二区三区四区| 久久狠狠亚洲综合| 欧美电影免费观看高清完整版在线观看| 伊人开心综合网| 色呦呦国产精品| 国产精品国产三级国产aⅴ无密码| 国产精品亚洲第一| 欧美激情综合在线| 风间由美中文字幕在线看视频国产欧美| 精品国产1区二区| 精品一区二区日韩| 欧美www视频| 国产成人精品一区二区三区网站观看| 精品福利在线导航| 国产电影一区二区三区| 国产欧美日韩精品一区| 不卡在线视频中文字幕| 日韩一区中文字幕| 欧美性猛交xxxxxx富婆| 日日夜夜精品视频天天综合网| 在线欧美日韩国产| 天天操天天综合网| 欧美成人激情免费网| 国产精品自拍一区| 国产精品久久久久久久久果冻传媒| 成人激情电影免费在线观看| 亚洲啪啪综合av一区二区三区| 在线亚洲一区二区| 日韩成人免费在线| 久久婷婷综合激情| 97精品国产露脸对白| 午夜精品一区在线观看| 日韩一级片网站| 成人免费av在线| 亚洲1区2区3区视频| 91精品国产色综合久久不卡蜜臀| 久久国产尿小便嘘嘘| 国产精品久久久久aaaa| 欧美日韩国产综合一区二区 | 亚洲人成在线播放网站岛国| 欧美在线一二三四区| 免费成人av在线播放| 中文字幕+乱码+中文字幕一区| 一本大道av伊人久久综合| 免费日本视频一区| 亚洲人亚洲人成电影网站色| 欧美另类videos死尸| 国产精品一二三在| 亚洲福利视频一区二区| 欧美激情一区二区三区不卡| 欧美视频在线观看一区二区| 国产精品夜夜爽| 亚洲一区二区三区中文字幕 | 欧美另类变人与禽xxxxx| 国产成人精品综合在线观看| 丝袜诱惑制服诱惑色一区在线观看 | 一区二区三区精品在线| 精品国内二区三区| 欧美日韩国产一级片| 波多野结衣91| 精品中文字幕一区二区小辣椒| 亚洲九九爱视频| 中文字幕欧美日本乱码一线二线| 91精品婷婷国产综合久久竹菊| 91丨porny丨中文| 国产精品2024| 欧美96一区二区免费视频| 亚洲影视在线观看| 国产精品久久毛片a| 久久免费视频色| 日韩欧美国产午夜精品| 欧美日韩高清一区| 色综合久久88色综合天天免费| 国产一区二区调教| 日本不卡免费在线视频| 亚洲成av人综合在线观看| 一区二区三区色| 中文字幕欧美一区| 国产精品乱人伦中文| 国产午夜精品久久久久久免费视| 欧美变态凌虐bdsm| 日韩一区二区三区在线视频| 欧美日韩国产首页在线观看| 欧美在线小视频| 欧美日韩在线一区二区| 日本韩国欧美一区二区三区| 91麻豆123| 91成人在线观看喷潮| 91黄视频在线观看| 欧美色手机在线观看| 欧美日韩日本视频| 制服视频三区第一页精品| 欧美日本视频在线| 欧美日本乱大交xxxxx| 91精品欧美一区二区三区综合在| 欧美日本在线播放| 日韩欧美123| 久久久精品国产免费观看同学| 久久这里只精品最新地址| 久久久91精品国产一区二区精品| 久久亚洲影视婷婷| 国产精品美女一区二区三区| 国产精品久久久爽爽爽麻豆色哟哟| 国产精品国产a级| 亚洲主播在线观看| 日本午夜一本久久久综合| 国产一区二区三区香蕉| 国产成人精品www牛牛影视| 成人黄色综合网站| 91黄视频在线| 日韩午夜三级在线| 国产日产欧美一区二区三区| 中文字幕一区二区三区蜜月| 亚洲一区在线观看免费| 免费视频一区二区| 国产成人精品免费网站| 91久久国产最好的精华液| 日韩一级成人av| 国产精品麻豆视频| 亚洲成a人在线观看| 国产一区福利在线| 在线观看网站黄不卡| 91精品久久久久久久91蜜桃| 久久精品综合网| 一片黄亚洲嫩模| 精品一区二区日韩| 色哟哟日韩精品| 2022国产精品视频| 亚洲一区二区三区美女| 国产一区二区视频在线| 色婷婷av一区二区三区之一色屋| 欧美一个色资源| 亚洲美女电影在线| 国产在线国偷精品免费看| 欧美综合视频在线观看| 久久久亚洲综合| 亚洲超碰97人人做人人爱| 粉嫩aⅴ一区二区三区四区| 欧美人伦禁忌dvd放荡欲情| 国产三级久久久| 三级久久三级久久| 成人av资源站| 精品久久人人做人人爽| 亚洲精品欧美激情| 国产精品乡下勾搭老头1| 欧美精品99久久久**| 一区二区三区在线观看动漫| 国产伦精品一区二区三区免费| 欧美日韩激情一区二区| 亚洲人成网站影音先锋播放| 国产最新精品免费| 91精品国产综合久久精品性色| 国产精品久久久久影视| 韩国av一区二区| 91精品在线观看入口| 亚洲免费视频中文字幕| 成人做爰69片免费看网站| 欧美成人vr18sexvr| 日韩精品国产欧美| 在线观看亚洲a| 亚洲黄一区二区三区| gogo大胆日本视频一区| 久久久久久久久久久99999| 免费成人在线观看视频| 欧美精选一区二区| 亚洲愉拍自拍另类高清精品| 日本久久电影网| 亚洲理论在线观看| 在线免费视频一区二区| 亚洲精品中文字幕在线观看| 91在线精品一区二区| 国产精品久久久久一区二区三区共| 国产精品影视天天线| 久久综合给合久久狠狠狠97色69| 另类小说视频一区二区| 日韩欧美色综合网站| 久久精品国产色蜜蜜麻豆| 欧美sm极限捆绑bd| 国内精品国产成人国产三级粉色 | 日韩手机在线导航|