gpt4 book ai didi

c - 如何在非阻塞上使用 SSL_read() 和 SSL_accept()

转载 作者:行者123 更新时间:2023-12-04 22:42:42 28 4
gpt4 key购买 nike

我有一个需要升级到 SSL 通信的客户端/服务器通信。目前我有一个发送和接收 tcp 数据的网络套接字。

  • 客户端向服务器发出一个 tcp connect()。
  • 服务器已经实现了接受部分,接受连接后服务器进入选择循环,等待进一步的操作。

  • 我尝试过的:
    tcp connect() 完成后,我得到的 fd 就是我用于 openssl SSL_set_fd(ssl,fd) 的。在网络接受后的服务器端,我将连接升级为非阻塞并执行 SSL_accept ,调用 SSL_connect() 客户端成功(我已经处理了所有证书和其他需要的东西)。
    我需要了解的:
  • SSL_accept() 使用 SSL_ERROR_WANT_READ 返回 -1,我收到的一些输入建议我将其放入“while”循环中,等待 ssl 接受完成。通过最终在 ssl_accept 上循环多次来解决它。困惑是我应该在这里循环还是回到选择循环。回到选择循环,我看到网络选择立即弹回可能是由于 ssl_connect 存在一些数据。这是正确的方法吗?
  • 我已经使用 SSL_write() 在客户端发送了 X 个字节,该字节已成功发送,当 select 弹出 read 时,我正在执行一个 SSL_read(),它执行读取操作但它小于 X,所以我再次迭代 SSL_read () 只看到在连续读取中返回 0 字节。同样的问题,我应该在 SSL_read() 周围循环多长时间,我必须这样做,还是必须选择并等待。
  • 如果我传递的 SSL_read(ssl,buf,bytes) 字节多于收到的字节会发生什么,如何处理

  • 我在第一次读取后尝试了 SSL_pending() 但它总是返回 0。因为显然缺少数据。
    客户端代码
        ssl = SSL_new(ctx);
    SSL_set_fd(ssl, fd);

    if (SSL_connect(ssl) < 0 )
    {
    /* Log failure */
    return(-1);
    } else {

    ssl_write_return = SSL_write(ssl, msg , req_len);

    switch(SSL_get_error(ssl, ssl_write_return))
    {

    case SSL_ERROR_NONE:
    ...
    default:
    ...
    SSL_free(ssl);
    }
    }
    SSL_CTX_free(ctx);
    服务器代码
     ssl = SSL_new(ctx);
    SSL_set_fd(ssl, session->fd);
    while(TRUE){
    if ((ssl_accept_ret =SSL_accept(ssl)) != 1){

    log ("ssl_accept failed with %d\n", ssl_accept_ret);
    switch(SSL_get_error(ssl,ssl_accept_ret )){
    case SSL_ERROR_NONE:
    ERR_error_string_n(ERR_get_error(), err_msg, sizeof(err_msg));
    break;
    case SSL_ERROR_SSL:
    ERR_error_string_n(ERR_get_error(), err_msg, sizeof(err_msg));
    break;
    case SSL_ERROR_WANT_READ:
    ERR_error_string_n(ERR_get_error(), err_msg, sizeof(err_msg));
    continue;
    case SSL_ERROR_WANT_WRITE:
    ERR_error_string_n(ERR_get_error(), err_msg, sizeof(err_msg));
    continue;
    case SSL_ERROR_SYSCALL:
    ERR_error_string_n(ERR_get_error(), err_msg, sizeof(err_msg));
    break;
    case SSL_ERROR_ZERO_RETURN:
    ERR_error_string_n(ERR_get_error(), err_msg, sizeof(err_msg));
    break;
    case SSL_ERROR_WANT_CONNECT:
    }
    return(-1);
    } else {
    log ("ssl_accept was successful with %d\n", ssl_accept_ret);
    return 0;
    }
    }
    服务器读取代码
    while(TRUE){
    ret = SSL_read(session->ssl, buf, sizeof(buf));
    if (ret<=0){


    switch(SSL_get_error(session->ssl,ret)){

    case SSL_ERROR_NONE:
    ERR_error_string_n(ERR_get_error(), err_msg, sizeof(err_msg));
    break;
    case SSL_ERROR_ZERO_RETURN:
    ERR_error_string_n(ERR_get_error(), err_msg, sizeof(err_msg));
    break;
    case SSL_ERROR_WANT_READ:
    ERR_error_string_n(ERR_get_error(), err_msg, sizeof(err_msg));
    continue;
    case SSL_ERROR_WANT_WRITE:
    ERR_error_string_n(ERR_get_error(), err_msg, sizeof(err_msg));
    continue;
    case SSL_ERROR_SYSCALL:
    ERR_error_string_n(ERR_get_error(), err_msg, sizeof(err_msg));
    break;
    case SSL_ERROR_SSL:
    ERR_error_string_n(ERR_get_error(), err_msg, sizeof(err_msg));
    break;
    default:
    ERR_error_string_n(ERR_get_error(), err_msg, sizeof(err_msg));
    break;
    }
    exit_select_loop()
    } else {

    log( "ssl_read was successful with %d and %s \n", ret,buf);
    do{
    ret = SSL_read(session->ssl, buf, sizeof(buf));

    log("ssl_read %d and %s \n", ret,buf);
    }while(SSL_pending(session->ssl)!=0 && (SSL_get_error(session->ssl, ret) == SSL_ERROR_WANT_WRITE || SSL_ERROR_WANT_READ));
    }
    }

    最佳答案

    我在网站上找到了一个有效的 ssl 代码,你可以试试:

    #include <stdio.h>
    #include <unistd.h>
    #include <string.h>
    #include <strings.h>
    #include <errno.h>
    #include <netinet/in.h>
    #include <netdb.h>
    #include <sys/socket.h>
    #include <sys/types.h>
    #include <sys/time.h>
    #include <sys/select.h>
    #include <netinet/tcp.h>
    #include <ctype.h>

    #include <openssl/ssl.h>
    #include <openssl/err.h>

    //#include "imapfilter.h"
    //#include "session.h"


    #define TCP_DEFAULTBACK_LOG 15
    #define HTTP_RESPON_TIMEOUT 15
    //#define FORMAT_HTTPCHECK_REQ(buf,serv,port) snprintf(buf,sizeof(buf)-1,"GET /api/v1/echo/ HTTP/1.1\r\nHost: %s:%d\r\n\r\n",serv,port)
    #define FORMAT_HTTPCHECK_REQ(buf,serv,port) snprintf(buf,sizeof(buf)-1,"CONNECT 192.168.1.1 HTTP/1.1\r\nHost: %s:%d\r\n\r\n",serv,port)

    #if OPENSSL_VERSION_NUMBER >= 0x1010000fL
    SSL_CTX *sslctx = NULL;
    #else
    SSL_CTX *ssl23ctx = NULL;
    #ifndef OPENSSL_NO_SSL3_METHOD
    SSL_CTX *ssl3ctx = NULL;
    #endif
    #ifndef OPENSSL_NO_TLS1_METHOD
    SSL_CTX *tls1ctx = NULL;
    #endif
    #ifndef OPENSSL_NO_TLS1_1_METHOD
    SSL_CTX *tls11ctx = NULL;
    #endif
    #ifndef OPENSSL_NO_TLS1_2_METHOD
    SSL_CTX *tls12ctx = NULL;
    #endif
    #endif



    /* IMAP session. */
    typedef struct session {
    int socket; /* Socket. */
    SSL *sslconn; /* SSL connection. */
    } session;
    #define error printf

    static int
    open_connection(session *ssn,const char* serv,uint16_t port,const char* sslproto);
    static int
    close_connection(session *ssn);
    static ssize_t
    socket_read(session *ssn, char *buf, size_t len, long timeout, int timeoutfail, int *interrupt);
    static ssize_t
    socket_write(session *ssn, const char *buf, size_t len);

    static int
    open_secure_connection(session *ssn,const char* serv,const char* sslproto);
    static int
    close_secure_connection(session *ssn);
    static ssize_t
    socket_secure_read(session *ssn, char *buf, size_t len);
    static ssize_t
    socket_secure_write(session *ssn, const char *buf, size_t len);



    /*
    * Connect to mail server.
    */
    static int
    open_connection(session *ssn,const char* serv,uint16_t port,const char* sslproto)
    {
    struct addrinfo hints, *res, *ressave;
    int n, sockfd;

    char portstr[32];
    sprintf(portstr,"%d",portstr);
    memset(&hints, 0, sizeof(struct addrinfo));

    hints.ai_family = AF_UNSPEC;
    hints.ai_socktype = SOCK_STREAM;

    n = getaddrinfo(serv, portstr, &hints, &res);

    if (n < 0) {
    error("gettaddrinfo; %s\n", gai_strerror(n));
    return -1;
    }

    ressave = res;

    sockfd = -1;

    while (res) {
    sockfd = socket(res->ai_family, res->ai_socktype,
    res->ai_protocol);

    if (sockfd >= 0) {
    if (connect(sockfd, res->ai_addr, res->ai_addrlen) == 0)
    break;

    sockfd = -1;
    }
    res = res->ai_next;
    }

    if (ressave)
    freeaddrinfo(ressave);

    if (sockfd == -1) {
    error("error while initiating connection to %s at port %d\n",
    serv, port);
    return -1;
    }

    ssn->socket = sockfd;

    if (sslproto) {
    if (open_secure_connection(ssn,serv,sslproto) == -1) {
    close_connection(ssn);
    return -1;
    }
    }

    return ssn->socket;
    }


    /*
    * Initialize SSL/TLS connection.
    */
    static int
    open_secure_connection(session *ssn,const char* serv,const char* sslproto)
    {
    int r, e;
    SSL_CTX *ctx = NULL;

    #if OPENSSL_VERSION_NUMBER >= 0x1010000fL
    if (sslctx)
    ctx = sslctx;
    #else
    if (ssl23ctx)
    ctx = ssl23ctx;

    if (sslproto) {
    #ifndef OPENSSL_NO_SSL3_METHOD
    if (ssl3ctx && !strcasecmp(sslproto, "ssl3"))
    ctx = ssl3ctx;
    #endif
    #ifndef OPENSSL_NO_TLS1_METHOD
    if (tls1ctx && !strcasecmp(sslproto, "tls1"))
    ctx = tls1ctx;
    #endif
    #ifndef OPENSSL_NO_TLS1_1_METHOD
    if (tls11ctx && !strcasecmp(sslproto, "tls1.1"))
    ctx = tls11ctx;
    #endif
    #ifndef OPENSSL_NO_TLS1_2_METHOD
    if (tls12ctx && !strcasecmp(sslproto, "tls1.2"))
    ctx = tls12ctx;
    #endif
    }
    #endif

    if (ctx == NULL) {
    error("initiating SSL connection to %s; protocol version "
    "not supported by current build", serv);
    goto fail;
    }

    if (!(ssn->sslconn = SSL_new(ctx)))
    goto fail;

    #if OPENSSL_VERSION_NUMBER >= 0x1000000fL
    r = SSL_set_tlsext_host_name(ssn->sslconn, serv);
    if (r == 0) {
    error("failed setting the Server Name Indication (SNI) to "
    "%s; %s\n", serv,
    ERR_error_string(ERR_get_error(), NULL));
    goto fail;
    }
    #endif

    SSL_set_fd(ssn->sslconn, ssn->socket);

    for (;;) {
    if ((r = SSL_connect(ssn->sslconn)) > 0)
    break;

    switch (SSL_get_error(ssn->sslconn, r)) {
    case SSL_ERROR_ZERO_RETURN:
    error("initiating SSL connection to %s; the "
    "connection has been closed cleanly\n",
    serv);
    goto fail;
    case SSL_ERROR_NONE:
    case SSL_ERROR_WANT_CONNECT:
    case SSL_ERROR_WANT_ACCEPT:
    case SSL_ERROR_WANT_X509_LOOKUP:
    case SSL_ERROR_WANT_READ:
    case SSL_ERROR_WANT_WRITE:
    break;
    case SSL_ERROR_SYSCALL:
    e = ERR_get_error();
    if (e == 0 && r == 0)
    error("initiating SSL connection to %s; EOF in "
    "violation of the protocol\n", serv);
    else if (e == 0 && r == -1)
    error("initiating SSL connection to %s; %s\n",
    serv, strerror(errno));
    else
    error("initiating SSL connection to %s; %s\n",
    serv, ERR_error_string(e, NULL));
    goto fail;
    case SSL_ERROR_SSL:
    error("initiating SSL connection to %s; %s\n",
    serv, ERR_error_string(ERR_get_error(),
    NULL));
    goto fail;
    default:
    break;
    }
    }
    // TODO: ignore cert if (get_option_boolean("certificates") && get_cert(ssn) == -1)
    // goto fail;

    return 0;

    fail:
    ssn->sslconn = NULL;

    return -1;
    }

    关于c - 如何在非阻塞上使用 SSL_read() 和 SSL_accept(),我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/64041863/

    28 4 0
    Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
    广告合作:1813099741@qq.com 6ren.com