mirror of
https://github.com/proxytunnel/proxytunnel.git
synced 2026-01-23 02:34:59 +00:00
- Applied (reworked) changes from Mark Cave-Ayland to support -E option
encrypting data to the proxy with SSL (untested by me) - Change version to 1.6.4 git-svn-id: https://proxytunnel.svn.sourceforge.net/svnroot/proxytunnel/trunk/proxytunnel@143 bc163920-b10d-0410-b2c5-a5491ca2ceef
This commit is contained in:
parent
42913f3c39
commit
bbda7f9734
13 changed files with 479 additions and 303 deletions
247
ptstream.c
Normal file
247
ptstream.c
Normal file
|
|
@ -0,0 +1,247 @@
|
|||
/* Proxytunnel - (C) 2001-2006 Jos Visser / Mark Janssen */
|
||||
/* Contact: josv@osp.nl / maniac@maniac.nl */
|
||||
|
||||
/*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
*/
|
||||
|
||||
/* ptstream.c */
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <unistd.h>
|
||||
#include <sys/types.h>
|
||||
#include <sys/socket.h>
|
||||
|
||||
#include "proxytunnel.h"
|
||||
|
||||
|
||||
/*
|
||||
* Open a stream for incoming and outgoing data with the specified fds
|
||||
*/
|
||||
|
||||
PTSTREAM *stream_open(int incoming_fd, int outgoing_fd)
|
||||
{
|
||||
PTSTREAM *pts;
|
||||
|
||||
/* Initialise the structure and store the file descriptor */
|
||||
pts = malloc(sizeof(PTSTREAM));
|
||||
pts->incoming_fd = incoming_fd;
|
||||
pts->outgoing_fd = outgoing_fd;
|
||||
pts->ssl = NULL;
|
||||
pts->ctx = NULL;
|
||||
|
||||
/* Return a pointer to the structure */
|
||||
return pts;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Close a stream
|
||||
*/
|
||||
|
||||
int stream_close(PTSTREAM *pts)
|
||||
{
|
||||
/* Close the incoming fd */
|
||||
if (pts->incoming_fd != 0)
|
||||
close(pts->incoming_fd);
|
||||
|
||||
/* Close the outgoing fd */
|
||||
if (pts->outgoing_fd != 0)
|
||||
close(pts->outgoing_fd);
|
||||
|
||||
/* Destroy the SSL context */
|
||||
if (pts->ssl)
|
||||
{
|
||||
#ifdef USE_SSL
|
||||
SSL_free (pts->ssl);
|
||||
SSL_CTX_free (pts->ctx);
|
||||
#endif
|
||||
}
|
||||
|
||||
/* Free the structure */
|
||||
free(pts);
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Read from a stream
|
||||
*/
|
||||
|
||||
int stream_read(PTSTREAM *pts, void *buf, size_t len)
|
||||
{
|
||||
/* Read up to the specified number of bytes into the buffer */
|
||||
int bytes_read;
|
||||
|
||||
if (!pts->ssl)
|
||||
{
|
||||
/* For a non-SSL stream... */
|
||||
bytes_read = read(pts->incoming_fd, buf, len);
|
||||
}
|
||||
else
|
||||
{
|
||||
#ifdef USE_SSL
|
||||
/* For an SSL stream... */
|
||||
bytes_read = SSL_read(pts->ssl, buf, len);
|
||||
#else
|
||||
/* No SSL support, so must use a non-SSL stream */
|
||||
bytes_read = read(pts->incoming_fd, buf, len);
|
||||
#endif
|
||||
}
|
||||
|
||||
return bytes_read;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Write to a stream
|
||||
*/
|
||||
|
||||
int stream_write(PTSTREAM *pts, void *buf, size_t len)
|
||||
{
|
||||
/* Write the specified number of bytes from the buffer */
|
||||
int bytes_written;
|
||||
|
||||
if (!pts->ssl)
|
||||
{
|
||||
/* For a non-SSL stream... */
|
||||
bytes_written = write(pts->outgoing_fd, buf, len);
|
||||
}
|
||||
else
|
||||
{
|
||||
#ifdef USE_SSL
|
||||
/* For an SSL stream... */
|
||||
bytes_written = SSL_write(pts->ssl, buf, len);
|
||||
#else
|
||||
/* No SSL support, so must use a non-SSL stream */
|
||||
bytes_written = write(pts->outgoing_fd, buf, len);
|
||||
#endif
|
||||
}
|
||||
|
||||
return bytes_written;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Copy a block of data from one stream to another. A true
|
||||
* return code signifies EOF on the from socket descriptor.
|
||||
*/
|
||||
|
||||
int stream_copy(PTSTREAM *pts_from, PTSTREAM *pts_to)
|
||||
{
|
||||
char buf[SIZE];
|
||||
int n;
|
||||
|
||||
/*
|
||||
* Read a buffer from the source socket
|
||||
*/
|
||||
if ( ( n = stream_read( pts_from, buf, SIZE ) ) < 0 )
|
||||
{
|
||||
my_perror( "Socket read error" );
|
||||
exit( 1 );
|
||||
}
|
||||
|
||||
/*
|
||||
* If we have read 0 bytes, there is an EOF on src
|
||||
*/
|
||||
if( n==0 )
|
||||
return 1;
|
||||
|
||||
/*
|
||||
* Write the buffer to the destination socket
|
||||
*/
|
||||
if ( stream_write( pts_to, buf, n ) != n )
|
||||
{
|
||||
my_perror( "Socket write error" );
|
||||
exit( 1 );
|
||||
}
|
||||
|
||||
/*
|
||||
* We're not yet at EOF
|
||||
*/
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Initiate an SSL handshake on this stream and encrypt all subsequent data
|
||||
*/
|
||||
|
||||
int stream_enable_ssl(PTSTREAM *pts)
|
||||
{
|
||||
#ifdef USE_SSL
|
||||
SSL_METHOD *meth;
|
||||
SSL *ssl;
|
||||
SSL_CTX *ctx;
|
||||
|
||||
/* Initialise the connection */
|
||||
SSLeay_add_ssl_algorithms();
|
||||
meth = SSLv2_client_method();
|
||||
SSL_load_error_strings();
|
||||
|
||||
ctx = SSL_CTX_new (meth);
|
||||
ssl = SSL_new (ctx);
|
||||
SSL_set_rfd (ssl, stream_get_incoming_fd(pts));
|
||||
SSL_set_wfd (ssl, stream_get_outgoing_fd(pts));
|
||||
SSL_connect (ssl);
|
||||
|
||||
/* Store ssl and ctx parameters */
|
||||
pts->ssl = ssl;
|
||||
pts->ctx = ctx;
|
||||
#else
|
||||
message("Warning: stream_open(): SSL stream requested but no SSL support available; using unencrypted connection");
|
||||
#endif
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Return the incoming_fd for a given stream
|
||||
*/
|
||||
|
||||
int stream_get_incoming_fd(PTSTREAM *pts)
|
||||
{
|
||||
|
||||
if (!pts->ssl)
|
||||
return pts->incoming_fd;
|
||||
else
|
||||
#ifdef USE_SSL
|
||||
return SSL_get_fd(pts->ssl);
|
||||
#else
|
||||
return pts->incoming_fd;
|
||||
#endif
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Return the outgoing_fd for a given stream
|
||||
*/
|
||||
|
||||
int stream_get_outgoing_fd(PTSTREAM *pts)
|
||||
{
|
||||
|
||||
if (!pts->ssl)
|
||||
return pts->outgoing_fd;
|
||||
else
|
||||
#ifdef USE_SSL
|
||||
return SSL_get_fd(pts->ssl);
|
||||
#else
|
||||
return pts->outgoing_fd;
|
||||
#endif
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue