OpenSSL DTLS通信(二)

说明

OpenSSL和Socket的初始化请参考“OpenSSL DTLS通信(一)”

OpenSSL DTLS Client端

#include <poll.h>

#include <openssl.h>
#include <inet_sock.h>

int main(int argc, char **argv)
{
    int sockfd = -1, len = -1;
    socklen_t socklen = sizeof(struct sockaddr_in);
    struct sockaddr_in my_addr, their_addr;
    SSL_CTX *ctx = NULL;
    SSL *ssl = NULL;
    int retval = -1;
    char readbuf[65535] = {"This is a DTLS client!"};
    struct pollfd fds = {0};
    struct timeval timeout;
    BIO *read_bio = NULL, *write_bio = NULL;
    int readbytes = -1;

    openssl_log_init();
    openssl_init();

    ctx = openssl_ctx_new(DTLS_client_method());
    if (NULL == ctx) {
        goto error;
    }

    if (openssl_load_cert_file(ctx, 0)) {
        goto error;
    }

    sockfd = init_sock(SOCK_AF_INET, SOCK_DGRAM);
    if (sockfd < 0) {
        goto error;
    }
    init_nonblock(sockfd);

    if (init_udp_sockaddr((struct sockaddr *)&my_addr, SOCK_AF_INET, sockfd, 0)) {
        goto error;
    }

    ssl = openssl_ssl_new(ctx);
    if (!ssl) {
        goto error;
    }

    read_bio = BIO_new(BIO_s_mem());
    if (!read_bio) {
        goto error;
    }
    BIO_set_mem_eof_return(read_bio, -1);

    
    write_bio = BIO_new(BIO_s_mem());
    if (!write_bio) {
        goto error;
    }
    BIO_set_mem_eof_return(write_bio, -1);

    SSL_set_bio(ssl, read_bio, write_bio);
    SSL_set_connect_state(ssl);
    SSL_write(ssl, readbuf, strlen(readbuf));

    while (1) {
        memset(&fds, 0, sizeof(fds));
        fds.fd = sockfd;
        fds.events = POLLIN | POLLOUT;

        retval = poll(&fds, 1, 10000);

        if (retval && (fds.revents & POLLIN)) {
            retval = recvfrom(sockfd, readbuf, sizeof(readbuf) - 1, 0, &their_addr, &socklen);
            if (retval > 0) {
                if ((readbuf[0] >= 20) && (readbuf[0] <= 63)) {
                    BIO_write(read_bio, readbuf, retval);

                    len = SSL_read(ssl, readbuf, sizeof(readbuf));
                    if ((len < 0) && (SSL_ERROR_SSL == SSL_get_error(ssl, len))) {
                        unsigned long errorstr = ERR_get_error();
                        openssl_log(OPENSSL_LOG_ERR, "DTLS failure occurred due to reason '%s', terminating\n", ERR_reason_error_string(errorstr));
                        break;
                    } else {
                        openssl_log(OPENSSL_LOG_DEB, "Read '%d' bytes from '%s:%d', first byte value: 0x%x(%d)\n",
                            retval, inet_ntoa(their_addr.sin_addr), ntohs(their_addr.sin_port), readbuf[0], readbuf[0]);
                    }
                }
            }
        } else if (retval && (fds.revents & POLLOUT)) {
            if (!SSL_is_init_finished(ssl)) {
                readbytes = BIO_read(write_bio, readbuf, sizeof(readbuf));
                if (readbytes > 0) {
                    readbytes = sendto(sockfd, readbuf, readbytes, 0, &my_addr, socklen);
                    openssl_log(OPENSSL_LOG_DEB, "Write '%d' bytes to '%s:%d', values: %d, first byte value: 0x%x(%d)\n",
                        readbytes, inet_ntoa(my_addr.sin_addr), ntohs(my_addr.sin_port), readbuf[0], readbuf[0]);
                }
            } else {
                snprintf(readbuf, sizeof(readbuf) - 1, "%s", "This is a DTLS client!");
                SSL_write(ssl, readbuf, strlen(readbuf));
                readbytes = BIO_read(write_bio, readbuf, sizeof(readbuf));
                if (readbytes > 0) {
                    readbytes = sendto(sockfd, readbuf, readbytes, 0, &my_addr, socklen);
                    openssl_log(OPENSSL_LOG_DEB, "Write '%d' bytes to '%s:%d', values: %d, first byte value: 0x%x(%d)\n",
                        readbytes, inet_ntoa(my_addr.sin_addr), ntohs(my_addr.sin_port), readbuf[0], readbuf[0]);
                }
            }
        }
    }

    return 0;

error:
    if (sockfd > 0) {
        close(sockfd);
    }

    if (ctx) {
        SSL_CTX_free(ctx);
    }
}

OpenSSL DTLS Server端

#include <poll.h>
#include <openssl.h>
#include <inet_sock.h>

int main(int argc, char **argv)
{
    int sockfd = -1, len = -1;
    socklen_t socklen = sizeof(struct sockaddr_in);
    struct sockaddr_in my_addr, their_addr;
    SSL_CTX *ctx = NULL;
    SSL *ssl = NULL;
    int retval = -1;
    char readbuf[65535] = {0};
    struct pollfd fds = {0};
    struct timeval timeout;
    BIO *read_bio = NULL, *write_bio = NULL;

    openssl_log_init();
    openssl_init();

    ctx = openssl_ctx_new(DTLS_server_method());
    if (NULL == ctx) {
        goto error;
    }

    if (openssl_load_cert_file(ctx, 1)) {
        goto error;
    }

    sockfd = init_sock(SOCK_AF_INET, SOCK_DGRAM);
    if (sockfd < 0) {
        goto error;
    }
    init_nonblock(sockfd);

    if (init_udp_sockaddr((struct sockaddr *)&my_addr, SOCK_AF_INET, sockfd, 1)) {
        goto error;
    }

    ssl = openssl_ssl_new(ctx);
    if (!ssl) {
        goto error;
    }

    read_bio = BIO_new(BIO_s_mem());
    if (!read_bio) {
        goto error;
    }
    BIO_set_mem_eof_return(read_bio, -1);

    
    write_bio = BIO_new(BIO_s_mem());
    if (!write_bio) {
        goto error;
    }
    BIO_set_mem_eof_return(write_bio, -1);

    SSL_set_bio(ssl, read_bio, write_bio);
    SSL_set_accept_state(ssl);

    while (1) {
        memset(&fds, 0, sizeof(fds));
        fds.fd = sockfd;
        fds.events = POLLIN | POLLOUT;

        retval = poll(&fds, 1, 10000);

        if (retval && (fds.revents & POLLIN)) {
            retval = recvfrom(sockfd, readbuf, sizeof(readbuf) - 1, 0, &their_addr, &socklen);
            if (retval > 0) {
                if ((readbuf[0] >= 20) && (readbuf[0] <= 63)) {
                    BIO_write(read_bio, readbuf, retval);

                    memset(readbuf, 0, sizeof(readbuf));
                    len = SSL_read(ssl, readbuf, sizeof(readbuf));
                    if ((len < 0) && (SSL_ERROR_SSL == SSL_get_error(ssl, len))) {
                        unsigned long errorstr = ERR_get_error();
                        openssl_log(OPENSSL_LOG_ERR, "DTLS failure occurred due to reason '%s', terminating\n", ERR_reason_error_string(errorstr));
                        break;
                    } else {
                        openssl_log(OPENSSL_LOG_DEB, "Read '%d' bytes from '%s:%d', first byte value: %s\n",
                            len, inet_ntoa(their_addr.sin_addr), ntohs(their_addr.sin_port), readbuf);
                    }
                }
            }
        } else if (retval && (fds.revents & POLLOUT)) {
            int readbytes = BIO_read(write_bio, readbuf, sizeof(readbuf));
            if (readbytes > 0) {
                readbytes = sendto(sockfd, readbuf, readbytes, 0, &their_addr, socklen);
                openssl_log(OPENSSL_LOG_DEB, "Write '%d' bytes to '%s:%d', first byte value: 0x%x(%d)\n",
                    readbytes, inet_ntoa(their_addr.sin_addr), ntohs(their_addr.sin_port), readbuf[0], readbuf[0]);
            }
        }
    }

    return 0;

error:
    if (sockfd > 0) {
        close(sockfd);
    }

    if (ctx) {
        SSL_CTX_free(ctx);
    }
}
  • 4
    点赞
  • 11
    收藏
    觉得还不错? 一键收藏
  • 2
    评论
要使用 OpenSSL 实现 SSL 通信,需要进行以下步骤: 1.安装 OpenSSL 库 在 Linux 系统下,可以使用以下命令来安装 OpenSSL 库: ``` sudo apt-get install openssl ``` 在 Windows 系统下,需要下载 OpenSSL 安装包并安装。 2.生成证书和私钥 使用 OpenSSL 可以生成自签名证书和私钥。可以使用以下命令生成证书和私钥: ``` openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -days 365 ``` 该命令会生成一个有效期为 1 年的自签名证书 cert.pem 和私钥 key.pem。 3.编写代码 接下来,可以使用 OpenSSL 库中的函数来实现 SSL 通信。具体可以参考 OpenSSL 的官方文档和示例代码。 以下是一个简单的示例代码,实现了 SSL 客户端和服务器之间的通信: ```c #include <openssl/ssl.h> #include <openssl/err.h> int main() { SSL_load_error_strings(); SSL_library_init(); SSL_CTX *ctx = SSL_CTX_new(SSLv23_server_method()); if (!ctx) { ERR_print_errors_fp(stderr); return 1; } if (SSL_CTX_use_certificate_file(ctx, "cert.pem", SSL_FILETYPE_PEM) <= 0) { ERR_print_errors_fp(stderr); return 1; } if (SSL_CTX_use_PrivateKey_file(ctx, "key.pem", SSL_FILETYPE_PEM) <= 0) { ERR_print_errors_fp(stderr); return 1; } SSL *ssl = SSL_new(ctx); // 创建 socket 并绑定端口 int sockfd = socket(AF_INET, SOCK_STREAM, 0); struct sockaddr_in addr; addr.sin_family = AF_INET; addr.sin_port = htons(8000); addr.sin_addr.s_addr = INADDR_ANY; bind(sockfd, (struct sockaddr*)&addr, sizeof(addr)); listen(sockfd, 5); while (1) { struct sockaddr_in client_addr; socklen_t client_len = sizeof(client_addr); int clientfd = accept(sockfd, (struct sockaddr*)&client_addr, &client_len); SSL_set_fd(ssl, clientfd); SSL_accept(ssl); char buf[1024]; int len = SSL_read(ssl, buf, sizeof(buf)); buf[len] = '\0'; printf("Received: %s\n", buf); SSL_write(ssl, "Hello, world!", 13); SSL_shutdown(ssl); SSL_free(ssl); close(clientfd); } SSL_CTX_free(ctx); return 0; } ``` 该示例代码实现了一个 SSL 服务器,监听在 8000 端口。客户端可以使用 OpenSSL 库中的函数来进行 SSL 通信

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 2
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值