在最近的工作中碰到了需要跟服务器创
建https连接并发送请求的问题,但之前已经写好的代码都是针对传统的tcp套接字来实现的。所以到处找一种比较简洁的方法可以不对原有的代码做太大的
改动而能根据需要处理https的需求。把一点结果分享给大家。本文提供的源代码只适用于Unix/Linux系统,Windows下的只要对套接字部分
进行修改即可。所有实现基于OpenSSL接口。
本文对于普通的套接字采用了non-blocking方式来进行连接,但似乎通过这样得到的套接字来创建一个ssl连接会得到连接失败的错误。目前偶还搞不清楚为什么,所以只好针对不同的传入参数来决定是否采用block方式创建socket连接。哪位大虾如果知道为什么,望不吝赐教。
另外如果你要进行纯粹的安全连接的话,可以使用BIO方式直接实现,而不需先创建传统的socket套接字再进行ssl层的处理。
关于BIO方式的实现,敝人不在此篇文章详细描述。有兴趣的网友可以去看一篇写的很不错的文章:使用 OpenSSL API 进行安全编程
源代码如下:
- /*
-
- * OpenSSL SSL/TLS Https Client example
-
- * Only for Unix/Linux:
-
- * cc -c https.c
-
- * cc -o https https.c -lssl
-
- * OpenSSL library needed.
-
- *
-
- * 同时支持普通的socket连接以及基于普通socket基础之上的ssl
-
- * 连接。这对于已有的socket程序修改来说会比较方便,不至于
-
- * 和原来的结构发生太大的冲突.
-
- * 要注意的一点,似乎当使用socket套接字来创建ssl连接的时候,
-
- * 如果套接字是采用非阻塞方式建立的话,会导致ssl会话失败,不
-
- * 知道为什么。所以这里对于提供给https的套接字采用了普通的
-
- * connect方法创建。
-
- *
-
- */
-
-
- #include <stdio.h>
-
- #include <stdlib.h>
-
- #include <string.h>
-
- #include <stdarg.h>
-
- #include <errno.h>
-
- #include <fcntl.h>
-
- #include <unistd.h>
-
- #include <sys/types.h>
-
- #include <sys/socket.h>
-
- #include <netinet/in.h>
-
- #include <arpa/inet.h>
-
- #include <netdb.h>
-
-
- #include <openssl/crypto.h>
-
- #include <openssl/ssl.h>
-
- #include <openssl/err.h>
-
- #include <openssl/rand.h>
-
-
- #define BUF_LEN 1024
-
- #define MAX_STRING_LEN 2048
-
-
- //xnet_select x defines
-
- #define READ_STATUS 0
-
- #define WRITE_STATUS 1
-
- #define EXCPT_STATUS 2
-
-
- /* flag to set request with ssl or not. */
-
- static int bIsHttps = 1;
-
-
- static int timeout_sec = 10;
-
- static int timeout_microsec = 0;
-
-
- void err_doit(int errnoflag, const char *fmt, va_list ap);
-
- void err_quit(const char *fmt, ...);
-
- int create_tcpsocket(const char *host, const unsigned short port);
-
- int xnet_select(int s, int sec, int usec, short x);
-
-
- int main(int argc, char* argv[]){
-
- char* host = "127.0.0.1";
-
- unsigned short port = 80;
-
-
- int fd;
-
-
-
- SSL *ssl;
-
- SSL_CTX *ctx;
-
-
- int n,ret;
-
-
- char buf[BUF_LEN];
-
- char* requestpath = "/";
-
-
- if( argc == 5 ){
-
- host = argv[1];
-
- port = atoi(argv[2]);
-
- requestpath = argv[3];
-
- bIsHttps = atoi(argv[4]);
-
- }
-
-
- /* make connection to the cache server */
-
- fd = create_tcpsocket(host, port);
-
-
- /* http request. */
-
- sprintf(buf, "GET %s HTTP/1.0\r\nHost: %s\r\n\r\n",requestpath, host);
-
-
- if(bIsHttps != 1){
-
- if(xnet_select(fd, timeout_sec, timeout_microsec, WRITE_STATUS)>0){
-
- /* send off the message */
-
- write(fd, buf, strlen(buf));
-
- }
-
- else{
-
- err_quit("Socket I/O Write Timeout %s:%d\n", host, port);
-
- }
-
- printf("Server response:\n");
-
- while (xnet_select(fd, timeout_sec, timeout_microsec, READ_STATUS)>0){
-
- if ((n = read(fd, buf, BUF_LEN-1)) > 0) {
-
- buf[n] = '\0';
-
- printf("%s", buf);
-
- }
-
- else{
-
- break;
-
- }
-
- }
-
- // close the plain socket handler.
-
- close(fd);
-
- }
-
- else{
-
- SSL_load_error_strings();
-
- SSL_library_init();
-
- ctx = SSL_CTX_new(SSLv23_client_method());
-
- if ( ctx == NULL ){
-
- err_quit("init SSL CTX failed:%s\n",
-
- ERR_reason_error_string(ERR_get_error()));
-
- }
-
-
-
- ssl = SSL_new(ctx);
-
- if ( ssl == NULL ){
-
- err_quit("new SSL with created CTX failed:%s\n",
-
- ERR_reason_error_string(ERR_get_error()));
-
- }
-
-
- ret = SSL_set_fd(ssl, fd);
-
- if ( ret == 0 ){
-
- err_quit("add SSL to tcp socket failed:%s\n",
-
- ERR_reason_error_string(ERR_get_error()));
-
- }
-
-
- /* PRNG */
-
- RAND_poll();
-
- while ( RAND_status() == 0 ){
-
- unsigned short rand_ret = rand() % 65536;
-
- RAND_seed(&rand_ret, sizeof(rand_ret));
-
- }
-
-
- /* SSL Connect */
-
- ret = SSL_connect(ssl);
-
- if( ret != 1 ){
-
- err_quit("SSL connection failed:%s\n",
-
- ERR_reason_error_string(ERR_get_error()));
-
- }
-
-
- // https socket write.
-
- SSL_write(ssl, buf, strlen(buf));
-
- while((n = SSL_read(ssl, buf, BUF_LEN-1)) > 0){
-
- buf[n] = '\0';
-
- write(1, buf, n);
-
- }
-
- if(n != 0){
-
- err_quit("SSL read failed:%s\n",
-
- ERR_reason_error_string(ERR_get_error()));
-
- }
-
- // close ssl tunnel.
-
- ret = SSL_shutdown(ssl);
-
- if( ret != 1 ){
-
- close(fd);
-
- err_quit("SSL shutdown failed:%s\n",
-
- ERR_reason_error_string(ERR_get_error()));
-
- }
-
-
-
- // close the plain socket handler.
-
- close(fd);
-
-
- // clear ssl resource.
-
- SSL_free(ssl);
-
- SSL_CTX_free(ctx);
-
- ERR_free_strings();
-
- }
-
- }
-
-
- /* create common tcp socket connection */
-
- int create_tcpsocket(const char *host, const unsigned short port){
-
- int ret;
-
-
- char * transport = "tcp";
-
- struct hostent *phe; /* pointer to host information entry */
-
- struct protoent *ppe; /* pointer to protocol information entry */
-
- struct sockaddr_in sin; /* an Internet endpoint address */
-
- int s; /* socket descriptor and socket type */
-
-
-
- memset(&sin, 0, sizeof(sin));
-
- sin.sin_family = AF_INET;
-
-
-
- if ((sin.sin_port = htons(port)) == 0)
-
- err_quit("invalid port \"%d\"\n", port);
-
-
-
- /* Map host name to IP address, allowing for dotted decimal */
-
- if( phe = gethostbyname(host) )
-
- memcpy(&sin.sin_addr, phe->h_addr, phe->h_length);
-
- else if( (sin.sin_addr.s_addr = inet_addr(host)) == INADDR_NONE )
-
- err_quit("can't get \"%s\" host entry\n", host);
-
-
-
- /* Map transport protocol name to protocol number */
-
- if ( (ppe = getprotobyname(transport)) == 0)
-
- err_quit("can't get \"%s\" protocol entry\n", transport);
-
-
-
- /* Allocate a common TCP socket */
-
- s = socket(PF_INET, SOCK_STREAM, ppe->p_proto);
-
- if (s < 0)
-
- err_quit("can't create socket: %s\n", strerror(errno));
-
-
-
- if(bIsHttps != 1){
-
- /* Connect the socket with timeout */
-
- fcntl(s,F_SETFL, O_NONBLOCK);
-
- if (connect(s, (struct sockaddr *)&sin, sizeof(sin)) == -1){
-
- if (errno == EINPROGRESS){// it is in the connect process
-
- struct timeval tv;
-
- fd_set writefds;
-
- tv.tv_sec = timeout_sec;
-
- tv.tv_usec = timeout_microsec;
-
- FD_ZERO(&writefds);
-
- FD_SET(s, &writefds);
-
- if(select(s+1,NULL,&writefds,NULL,&tv)>0){
-
- int len=sizeof(int);
-
- //下面的一句一定要,主要针对防火墙
-
- getsockopt(s, SOL_SOCKET, SO_ERROR, &errno, &len);
-
- if(errno != 0)
-
- ret = 1;
-
- else
-
- ret = 0;
-
- }
-
- else
-
- ret = 2;//timeout or error happen
-
- }
-
- else ret = 1;
-
-
- }
-
- else{
-
- ret = 1;
-
- }
-
- }
-
- else{
-
- /* create common tcp socket.seems non-block type is not supported by ssl. */
-
- ret = connect(s, (struct sockaddr *)&sin, sizeof(sin));
-
- }
-
-
- if(ret != 0){
-
- close(s);
-
- err_quit("can't connect to %s:%d\n", host, port);
-
- }
-
-
- return s;
-
- }
-
-
- /*
-
- s - SOCKET
-
- sec - timeout seconds
-
- usec - timeout microseconds
-
- x - select status
-
- */
-
- int xnet_select(int s, int sec, int usec, short x){
-
- int st = errno;
-
- struct timeval to;
-
- fd_set fs;
-
- to.tv_sec = sec;
-
- to.tv_usec = usec;
-
- FD_ZERO(&fs);
-
- FD_SET(s, &fs);
-
- switch(x){
-
- case READ_STATUS:
-
- st = select(s+1, &fs, 0, 0, &to);
-
- break;
-
- case WRITE_STATUS:
-
- st = select(s+1, 0, &fs, 0, &to);
-
- break;
-
- case EXCPT_STATUS:
-
- st = select(s+1, 0, 0, &fs, &to);
-
- break;
-
- }
-
- return(st);
-
- }
-
-
- void err_doit(int errnoflag, const char *fmt, va_list ap){
-
- int errno_save;
-
- char buf[MAX_STRING_LEN];
-
-
- errno_save = errno;
-
- vsprintf(buf, fmt, ap);
-
- if (errnoflag)
-
- sprintf(buf + strlen(buf), ": %s", strerror(errno_save));
-
- strcat(buf, "\n");
-
- fflush(stdout);
-
- fputs(buf, stderr);
-
- fflush(NULL);
-
- return;
-
- }
-
-
- /* Print a message and terminate. */
-
- void err_quit(const char *fmt, ...){
-
- va_list ap;
-
- va_start(ap, fmt);
-
- err_doit(0, fmt, ap);
-
- va_end(ap);
-
- exit(1);
-
- }
转载于:
阅读(8514) | 评论(0) | 转发(0) |