Skip to content
项目
群组
代码片段
帮助
正在加载...
登录
切换导航
F
freeswitch
项目
项目
详情
活动
周期分析
仓库
仓库
文件
提交
分支
标签
贡献者
分枝图
比较
统计图
议题
0
议题
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
CI / CD
CI / CD
流水线
作业
日程
统计图
Wiki
Wiki
代码片段
代码片段
成员
成员
折叠边栏
关闭边栏
活动
分枝图
统计图
创建新议题
作业
提交
议题看板
打开侧边栏
张华
freeswitch
Commits
e201bb01
提交
e201bb01
authored
7月 15, 2013
作者:
Anthony Minessale
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
FS-5610 --resolve
上级
acb33edc
隐藏空白字符变更
内嵌
并排
正在显示
3 个修改的文件
包含
71 行增加
和
6 行删除
+71
-6
.update
libs/iksemel/.update
+1
-1
iksemel.h
libs/iksemel/include/iksemel.h
+1
-0
stream.c
libs/iksemel/src/stream.c
+69
-5
没有找到文件。
libs/iksemel/.update
浏览文件 @
e201bb01
Tue May 14 07:44:2
1 CDT 2013
Mon Jul 15 16:57:1
1 CDT 2013
libs/iksemel/include/iksemel.h
浏览文件 @
e201bb01
...
@@ -226,6 +226,7 @@ void iks_disconnect (iksparser *prs);
...
@@ -226,6 +226,7 @@ void iks_disconnect (iksparser *prs);
int
iks_has_tls
(
void
);
int
iks_has_tls
(
void
);
int
iks_is_secure
(
iksparser
*
prs
);
int
iks_is_secure
(
iksparser
*
prs
);
int
iks_start_tls
(
iksparser
*
prs
);
int
iks_start_tls
(
iksparser
*
prs
);
int
iks_proceed_tls
(
iksparser
*
prs
,
const
char
*
cert_file
,
const
char
*
key_file
,
int
use_ssl
);
int
iks_start_sasl
(
iksparser
*
prs
,
enum
ikssasltype
type
,
char
*
username
,
char
*
pass
);
int
iks_start_sasl
(
iksparser
*
prs
,
enum
ikssasltype
type
,
char
*
username
,
char
*
pass
);
/***** jabber *****/
/***** jabber *****/
...
...
libs/iksemel/src/stream.c
浏览文件 @
e201bb01
...
@@ -35,6 +35,8 @@ typedef unsigned __int32 uint32_t;
...
@@ -35,6 +35,8 @@ typedef unsigned __int32 uint32_t;
#define SF_FOREIGN 1
#define SF_FOREIGN 1
#define SF_TRY_SECURE 2
#define SF_TRY_SECURE 2
#define SF_SECURE 4
#define SF_SECURE 4
#define SF_SERVER 8
#define SF_SSLv23 16
struct
stream_data
{
struct
stream_data
{
iksparser
*
prs
;
iksparser
*
prs
;
...
@@ -51,6 +53,8 @@ struct stream_data {
...
@@ -51,6 +53,8 @@ struct stream_data {
unsigned
int
flags
;
unsigned
int
flags
;
char
*
auth_username
;
char
*
auth_username
;
char
*
auth_pass
;
char
*
auth_pass
;
char
*
cert_file
;
char
*
key_file
;
#ifdef HAVE_GNUTLS
#ifdef HAVE_GNUTLS
gnutls_session
sess
;
gnutls_session
sess
;
gnutls_certificate_credentials
cred
;
gnutls_certificate_credentials
cred
;
...
@@ -201,6 +205,7 @@ handshake (struct stream_data *data)
...
@@ -201,6 +205,7 @@ handshake (struct stream_data *data)
gnutls_certificate_free_credentials
(
data
->
cred
);
gnutls_certificate_free_credentials
(
data
->
cred
);
return
IKS_NOMEM
;
return
IKS_NOMEM
;
}
}
gnutls_protocol_set_priority
(
data
->
sess
,
protocol_priority
);
gnutls_protocol_set_priority
(
data
->
sess
,
protocol_priority
);
gnutls_cipher_set_priority
(
data
->
sess
,
cipher_priority
);
gnutls_cipher_set_priority
(
data
->
sess
,
cipher_priority
);
gnutls_compression_set_priority
(
data
->
sess
,
comp_priority
);
gnutls_compression_set_priority
(
data
->
sess
,
comp_priority
);
...
@@ -224,7 +229,9 @@ handshake (struct stream_data *data)
...
@@ -224,7 +229,9 @@ handshake (struct stream_data *data)
data
->
flags
&=
(
~
SF_TRY_SECURE
);
data
->
flags
&=
(
~
SF_TRY_SECURE
);
data
->
flags
|=
SF_SECURE
;
data
->
flags
|=
SF_SECURE
;
iks_send_header
(
data
->
prs
,
data
->
server
);
if
(
!
(
data
->
flags
&
SF_SERVER
))
{
iks_send_header
(
data
->
prs
,
data
->
server
);
}
return
IKS_OK
;
return
IKS_OK
;
}
// HAVE_GNUTLS
}
// HAVE_GNUTLS
...
@@ -311,8 +318,25 @@ handshake (struct stream_data *data)
...
@@ -311,8 +318,25 @@ handshake (struct stream_data *data)
SSL_library_init
();
SSL_library_init
();
SSL_load_error_strings
();
SSL_load_error_strings
();
data
->
ssl_ctx
=
SSL_CTX_new
(
TLSv1_method
());
if
(
data
->
flags
&
SF_SERVER
)
{
if
(
!
data
->
ssl_ctx
)
return
IKS_NOMEM
;
if
(
data
->
flags
&
SF_SSLv23
)
{
data
->
ssl_ctx
=
SSL_CTX_new
(
SSLv23_server_method
());
}
else
{
data
->
ssl_ctx
=
SSL_CTX_new
(
TLSv1_server_method
());
}
if
(
!
data
->
ssl_ctx
)
return
IKS_NOMEM
;
if
(
SSL_CTX_use_certificate_file
(
data
->
ssl_ctx
,
data
->
cert_file
,
SSL_FILETYPE_PEM
)
<=
0
)
{
return
IKS_NET_TLSFAIL
;
}
if
(
SSL_CTX_use_PrivateKey_file
(
data
->
ssl_ctx
,
data
->
key_file
,
SSL_FILETYPE_PEM
)
<=
0
)
{
return
IKS_NET_TLSFAIL
;
}
SSL_CTX_set_verify
(
data
->
ssl_ctx
,
SSL_VERIFY_NONE
,
NULL
);
}
else
{
data
->
ssl_ctx
=
SSL_CTX_new
(
TLSv1_method
());
if
(
!
data
->
ssl_ctx
)
return
IKS_NOMEM
;
}
data
->
ssl
=
SSL_new
(
data
->
ssl_ctx
);
data
->
ssl
=
SSL_new
(
data
->
ssl_ctx
);
if
(
!
data
->
ssl
)
return
IKS_NOMEM
;
if
(
!
data
->
ssl
)
return
IKS_NOMEM
;
...
@@ -329,7 +353,11 @@ handshake (struct stream_data *data)
...
@@ -329,7 +353,11 @@ handshake (struct stream_data *data)
do
do
{
{
ret
=
SSL_connect
(
data
->
ssl
);
if
(
data
->
flags
&
SF_SERVER
)
{
ret
=
SSL_accept
(
data
->
ssl
);
}
else
{
ret
=
SSL_connect
(
data
->
ssl
);
}
if
(
ret
!=
1
)
if
(
ret
!=
1
)
{
{
...
@@ -346,7 +374,9 @@ handshake (struct stream_data *data)
...
@@ -346,7 +374,9 @@ handshake (struct stream_data *data)
data
->
flags
&=
(
~
SF_TRY_SECURE
);
data
->
flags
&=
(
~
SF_TRY_SECURE
);
data
->
flags
|=
SF_SECURE
;
data
->
flags
|=
SF_SECURE
;
iks_send_header
(
data
->
prs
,
data
->
server
);
if
(
!
(
data
->
flags
&
SF_SERVER
))
{
iks_send_header
(
data
->
prs
,
data
->
server
);
}
}
}
return
ret
==
1
?
IKS_OK
:
IKS_NET_TLSFAIL
;
return
ret
==
1
?
IKS_OK
:
IKS_NET_TLSFAIL
;
...
@@ -954,6 +984,40 @@ iks_start_tls (iksparser *prs)
...
@@ -954,6 +984,40 @@ iks_start_tls (iksparser *prs)
#endif
#endif
}
}
int
iks_proceed_tls
(
iksparser
*
prs
,
const
char
*
cert_file
,
const
char
*
key_file
,
int
use_ssl
)
{
#ifdef HAVE_GNUTLS
int
ret
;
struct
stream_data
*
data
=
iks_user_data
(
prs
);
ret
=
iks_send_raw
(
prs
,
"<proceed xmlns='urn:ietf:params:xml:ns:xmpp-tls'/>"
);
if
(
ret
)
return
ret
;
data
->
cert_file
=
iks_stack_strdup
(
data
->
s
,
cert_file
,
0
);
data
->
key_file
=
iks_stack_strdup
(
data
->
s
,
key_file
,
0
);
data
->
flags
|=
SF_TRY_SECURE
|
SF_SERVER
;
if
(
use_ssl
)
{
data
->
flags
|=
SF_SSLv23
;
}
return
handshake
(
data
);
#elif HAVE_SSL
int
ret
;
struct
stream_data
*
data
=
iks_user_data
(
prs
);
ret
=
iks_send_raw
(
prs
,
"<proceed xmlns='urn:ietf:params:xml:ns:xmpp-tls'/>"
);
if
(
ret
)
return
ret
;
data
->
cert_file
=
iks_stack_strdup
(
data
->
s
,
cert_file
,
0
);
data
->
key_file
=
iks_stack_strdup
(
data
->
s
,
key_file
,
0
);
data
->
flags
|=
SF_TRY_SECURE
|
SF_SERVER
;
if
(
use_ssl
)
{
data
->
flags
|=
SF_SSLv23
;
}
return
handshake
(
data
);
#else
return
IKS_NET_NOTSUPP
;
#endif
}
/***** sasl *****/
/***** sasl *****/
int
int
...
...
编写
预览
Markdown
格式
0%
重试
或
添加新文件
添加附件
取消
您添加了
0
人
到此讨论。请谨慎行事。
请先完成此评论的编辑!
取消
请
注册
或者
登录
后发表评论