SSL_network_communication_C/src/vs2017+OpenSSL项目文件/client1/client1/client.cpp

144 lines
3.6 KiB
C++
Raw Permalink Normal View History

2021-10-19 01:38:43 +00:00
#include <stdio.h>
#include <stdlib.h>
#include <memory.h>
#include <errno.h>
#include <sys/types.h>
#include <winsock2.h>
#include "openssl/rsa.h"
#include "openssl/crypto.h"
#include "openssl/x509.h"
#include "openssl/pem.h"
#include "openssl/ssl.h"
#include "openssl/err.h"
#include "openssl/rand.h"
#pragma comment(lib,"ws2_32.lib")
#pragma comment(lib,"libeay32.lib")
#pragma comment(lib,"ssleay32.lib")
#define CERTF "client.crt" /*<2A>ͻ<EFBFBD><CDBB>˵<EFBFBD>֤<EFBFBD><D6A4>(<28>辭CAǩ<41><C7A9>)*/
#define KEYF "client.key" /*<2A>ͻ<EFBFBD><CDBB>˵<EFBFBD>˽Կ(<28><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ܴ洢)*/
#define CACERT "ca.crt" /*CA <20><>֤<EFBFBD><D6A4>*/
#define PORT 1111 /*<2A><><EFBFBD><EFBFBD><EFBFBD>˵Ķ˿<C4B6>*/
#define SERVER_ADDR "127.0.0.1" /*<2A><><EFBFBD><EFBFBD><EFBFBD>ε<EFBFBD>IP<49><50>ַ*/
#define CHK_NULL(x) if ((x)==NULL) exit (-1)
#define CHK_ERR(err,s) if ((err)==-1) { perror(s); exit(-2); }
#define CHK_SSL(err) if ((err)==-1) { ERR_print_errors_fp(stderr); exit(-3); }
int main()
{
int err;
int sd;
struct sockaddr_in sa;
SSL_CTX* ctx;
SSL* ssl;
X509* server_cert;
char buf[4096];
char* str;
const SSL_METHOD *meth;
int seed_int[100]; /*<2A><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>*/
WSADATA wsaData;
if (WSAStartup(MAKEWORD(2, 2), &wsaData) != 0) {
printf("WSAStartup()fail:%d\n", GetLastError());
return -1;
}
OpenSSL_add_ssl_algorithms(); /*<2A><>ʼ<EFBFBD><CABC>*/
SSL_load_error_strings(); /*Ϊ<><CEAA>ӡ<EFBFBD><D3A1><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ϣ<EFBFBD><CFA2>׼<EFBFBD><D7BC>*/
meth = TLSv1_client_method(); /*<2A><><EFBFBD><EFBFBD>ʲôЭ<C3B4><D0AD>(SSLv2/SSLv3/TLSv1)<29>ڴ<EFBFBD>ָ<EFBFBD><D6B8>*/
ctx = SSL_CTX_new(meth);
CHK_NULL(ctx);
SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, NULL); /*<2A><>֤<EFBFBD><D6A4><EFBFBD><EFBFBD>*/
SSL_CTX_load_verify_locations(ctx, CACERT, NULL); /*<2A><><EFBFBD><EFBFBD>֤,<2C><><EFBFBD><EFBFBD><EFBFBD><EFBFBD>CA֤<41><D6A4>*/
if (SSL_CTX_use_certificate_file(ctx, CERTF, SSL_FILETYPE_PEM) <= 0) {
ERR_print_errors_fp(stderr);
exit(-2);
}
if (SSL_CTX_use_PrivateKey_file(ctx, KEYF, SSL_FILETYPE_PEM) <= 0) {
ERR_print_errors_fp(stderr);
exit(-3);
}
if (!SSL_CTX_check_private_key(ctx)) {
printf("Private key does not match the certificate public key\n");
exit(-4);
}
/*<2A><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ɻ<EFBFBD><C9BB><EFBFBD>,WIN32ƽ̨<C6BD><CCA8><EFBFBD><EFBFBD>*/
srand((unsigned)time(NULL));
for (int i = 0; i < 100; i++)
seed_int[i] = rand();
RAND_seed(seed_int, sizeof(seed_int));
/*<2A><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>TCP socket<65><74><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> .............................. */
printf("Begin tcp socket...\n");
sd = socket(AF_INET, SOCK_STREAM, 0); CHK_ERR(sd, "socket");
memset(&sa, '\0', sizeof(sa));
sa.sin_family = AF_INET;
sa.sin_addr.s_addr = inet_addr(SERVER_ADDR); /* Server IP */
sa.sin_port = htons(PORT); /* Server Port number */
err = connect(sd, (struct sockaddr*) &sa,
sizeof(sa));
CHK_ERR(err, "connect");
/* TCP <20><><EFBFBD><EFBFBD><EFBFBD>ѽ<EFBFBD><D1BD><EFBFBD>.<2E><>ʼ SSL <20><><EFBFBD>ֹ<EFBFBD><D6B9><EFBFBD>.......................... */
printf("Begin SSL negotiation \n");
ssl = SSL_new(ctx);
CHK_NULL(ssl);
SSL_set_fd(ssl, sd);
err = SSL_connect(ssl);
CHK_SSL(err);
/*<2A><>ӡ<EFBFBD><D3A1><EFBFBD>м<EFBFBD><D0BC><EFBFBD><EFBFBD><EFBFBD><E3B7A8><EFBFBD><EFBFBD>Ϣ(<28><>ѡ)*/
printf("SSL connection using %s\n", SSL_get_cipher(ssl));
/*<2A>õ<EFBFBD><C3B5><EFBFBD><EFBFBD><EFBFBD><EFBFBD>˵<EFBFBD>֤<EFBFBD><EFBFBD><E9B2A2>ӡЩ<D3A1><D0A9>Ϣ(<28><>ѡ) */
server_cert = SSL_get_peer_certificate(ssl);
CHK_NULL(server_cert);
printf("<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>֤<EFBFBD><EFBFBD><EFBFBD><EFBFBD>:\n");
str = X509_NAME_oneline(X509_get_subject_name(server_cert), 0, 0);
CHK_NULL(str);
printf("\t subject: %s\n", str);
//free(str);
str = X509_NAME_oneline(X509_get_issuer_name(server_cert), 0, 0);
if (str == NULL)
printf("issuer null");
CHK_NULL(str);
printf("\t issuer: %s\n", str);
//free(str);
X509_free(server_cert); /*<2A><EFBFBD><E7B2BB><EFBFBD><EFBFBD>Ҫ,<2C>轫֤<E8BDAB><D6A4><EFBFBD>ͷ<EFBFBD> */
/* <20><><EFBFBD>ݽ<EFBFBD><DDBD><EFBFBD><EFBFBD><EFBFBD>ʼ,<2C><>SSL_write,SSL_read<61><64><EFBFBD><EFBFBD>write,read */
printf("Begin SSL data exchange\n");
err = SSL_write(ssl, "<EFBFBD><EFBFBD><EFBFBD>ǿͻ<EFBFBD><EFBFBD><EFBFBD>", strlen("<EFBFBD><EFBFBD><EFBFBD>ǿͻ<EFBFBD><EFBFBD><EFBFBD>"));
CHK_SSL(err);
err = SSL_read(ssl, buf, sizeof(buf) - 1);
CHK_SSL(err);
buf[err] = '\0';
printf("Got %d chars:'%s'\n", err, buf);
SSL_shutdown(ssl); /* send SSL/TLS close_notify */
/* <20><>β<EFBFBD><CEB2><EFBFBD><EFBFBD> */
shutdown(sd, 2);
SSL_free(ssl);
SSL_CTX_free(ctx);
system("pause");
return 0;
}