mirror of
				https://github.com/ossrs/srs.git
				synced 2025-03-09 15:49:59 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			266 lines
		
	
	
	
		
			7.2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			266 lines
		
	
	
	
		
			7.2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Copyright 1995-2018 The OpenSSL Project Authors. All Rights Reserved.
 | |
|  *
 | |
|  * Licensed under the OpenSSL license (the "License").  You may not use
 | |
|  * this file except in compliance with the License.  You can obtain a copy
 | |
|  * in the file LICENSE in the source distribution or at
 | |
|  * https://www.openssl.org/source/license.html
 | |
|  */
 | |
| 
 | |
| #include <stdio.h>
 | |
| #include <stdlib.h>
 | |
| #include <string.h>
 | |
| #include "apps.h"
 | |
| #include "progs.h"
 | |
| #include <openssl/err.h>
 | |
| #include <openssl/ssl.h>
 | |
| 
 | |
| typedef enum OPTION_choice {
 | |
|     OPT_ERR = -1, OPT_EOF = 0, OPT_HELP,
 | |
|     OPT_STDNAME,
 | |
|     OPT_CONVERT,
 | |
|     OPT_SSL3,
 | |
|     OPT_TLS1,
 | |
|     OPT_TLS1_1,
 | |
|     OPT_TLS1_2,
 | |
|     OPT_TLS1_3,
 | |
|     OPT_PSK,
 | |
|     OPT_SRP,
 | |
|     OPT_CIPHERSUITES,
 | |
|     OPT_V, OPT_UPPER_V, OPT_S
 | |
| } OPTION_CHOICE;
 | |
| 
 | |
| const OPTIONS ciphers_options[] = {
 | |
|     {"help", OPT_HELP, '-', "Display this summary"},
 | |
|     {"v", OPT_V, '-', "Verbose listing of the SSL/TLS ciphers"},
 | |
|     {"V", OPT_UPPER_V, '-', "Even more verbose"},
 | |
|     {"s", OPT_S, '-', "Only supported ciphers"},
 | |
| #ifndef OPENSSL_NO_SSL3
 | |
|     {"ssl3", OPT_SSL3, '-', "SSL3 mode"},
 | |
| #endif
 | |
| #ifndef OPENSSL_NO_TLS1
 | |
|     {"tls1", OPT_TLS1, '-', "TLS1 mode"},
 | |
| #endif
 | |
| #ifndef OPENSSL_NO_TLS1_1
 | |
|     {"tls1_1", OPT_TLS1_1, '-', "TLS1.1 mode"},
 | |
| #endif
 | |
| #ifndef OPENSSL_NO_TLS1_2
 | |
|     {"tls1_2", OPT_TLS1_2, '-', "TLS1.2 mode"},
 | |
| #endif
 | |
| #ifndef OPENSSL_NO_TLS1_3
 | |
|     {"tls1_3", OPT_TLS1_3, '-', "TLS1.3 mode"},
 | |
| #endif
 | |
|     {"stdname", OPT_STDNAME, '-', "Show standard cipher names"},
 | |
| #ifndef OPENSSL_NO_PSK
 | |
|     {"psk", OPT_PSK, '-', "include ciphersuites requiring PSK"},
 | |
| #endif
 | |
| #ifndef OPENSSL_NO_SRP
 | |
|     {"srp", OPT_SRP, '-', "include ciphersuites requiring SRP"},
 | |
| #endif
 | |
|     {"convert", OPT_CONVERT, 's', "Convert standard name into OpenSSL name"},
 | |
|     {"ciphersuites", OPT_CIPHERSUITES, 's',
 | |
|      "Configure the TLSv1.3 ciphersuites to use"},
 | |
|     {NULL}
 | |
| };
 | |
| 
 | |
| #ifndef OPENSSL_NO_PSK
 | |
| static unsigned int dummy_psk(SSL *ssl, const char *hint, char *identity,
 | |
|                               unsigned int max_identity_len,
 | |
|                               unsigned char *psk,
 | |
|                               unsigned int max_psk_len)
 | |
| {
 | |
|     return 0;
 | |
| }
 | |
| #endif
 | |
| #ifndef OPENSSL_NO_SRP
 | |
| static char *dummy_srp(SSL *ssl, void *arg)
 | |
| {
 | |
|     return "";
 | |
| }
 | |
| #endif
 | |
| 
 | |
| int ciphers_main(int argc, char **argv)
 | |
| {
 | |
|     SSL_CTX *ctx = NULL;
 | |
|     SSL *ssl = NULL;
 | |
|     STACK_OF(SSL_CIPHER) *sk = NULL;
 | |
|     const SSL_METHOD *meth = TLS_server_method();
 | |
|     int ret = 1, i, verbose = 0, Verbose = 0, use_supported = 0;
 | |
|     int stdname = 0;
 | |
| #ifndef OPENSSL_NO_PSK
 | |
|     int psk = 0;
 | |
| #endif
 | |
| #ifndef OPENSSL_NO_SRP
 | |
|     int srp = 0;
 | |
| #endif
 | |
|     const char *p;
 | |
|     char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL;
 | |
|     char buf[512];
 | |
|     OPTION_CHOICE o;
 | |
|     int min_version = 0, max_version = 0;
 | |
| 
 | |
|     prog = opt_init(argc, argv, ciphers_options);
 | |
|     while ((o = opt_next()) != OPT_EOF) {
 | |
|         switch (o) {
 | |
|         case OPT_EOF:
 | |
|         case OPT_ERR:
 | |
|  opthelp:
 | |
|             BIO_printf(bio_err, "%s: Use -help for summary.\n", prog);
 | |
|             goto end;
 | |
|         case OPT_HELP:
 | |
|             opt_help(ciphers_options);
 | |
|             ret = 0;
 | |
|             goto end;
 | |
|         case OPT_V:
 | |
|             verbose = 1;
 | |
|             break;
 | |
|         case OPT_UPPER_V:
 | |
|             verbose = Verbose = 1;
 | |
|             break;
 | |
|         case OPT_S:
 | |
|             use_supported = 1;
 | |
|             break;
 | |
|         case OPT_STDNAME:
 | |
|             stdname = verbose = 1;
 | |
|             break;
 | |
|         case OPT_CONVERT:
 | |
|             convert = opt_arg();
 | |
|             break;
 | |
|         case OPT_SSL3:
 | |
|             min_version = SSL3_VERSION;
 | |
|             max_version = SSL3_VERSION;
 | |
|             break;
 | |
|         case OPT_TLS1:
 | |
|             min_version = TLS1_VERSION;
 | |
|             max_version = TLS1_VERSION;
 | |
|             break;
 | |
|         case OPT_TLS1_1:
 | |
|             min_version = TLS1_1_VERSION;
 | |
|             max_version = TLS1_1_VERSION;
 | |
|             break;
 | |
|         case OPT_TLS1_2:
 | |
|             min_version = TLS1_2_VERSION;
 | |
|             max_version = TLS1_2_VERSION;
 | |
|             break;
 | |
|         case OPT_TLS1_3:
 | |
|             min_version = TLS1_3_VERSION;
 | |
|             max_version = TLS1_3_VERSION;
 | |
|             break;
 | |
|         case OPT_PSK:
 | |
| #ifndef OPENSSL_NO_PSK
 | |
|             psk = 1;
 | |
| #endif
 | |
|             break;
 | |
|         case OPT_SRP:
 | |
| #ifndef OPENSSL_NO_SRP
 | |
|             srp = 1;
 | |
| #endif
 | |
|             break;
 | |
|         case OPT_CIPHERSUITES:
 | |
|             ciphersuites = opt_arg();
 | |
|             break;
 | |
|         }
 | |
|     }
 | |
|     argv = opt_rest();
 | |
|     argc = opt_num_rest();
 | |
| 
 | |
|     if (argc == 1)
 | |
|         ciphers = *argv;
 | |
|     else if (argc != 0)
 | |
|         goto opthelp;
 | |
| 
 | |
|     if (convert != NULL) {
 | |
|         BIO_printf(bio_out, "OpenSSL cipher name: %s\n",
 | |
|                    OPENSSL_cipher_name(convert));
 | |
|         goto end;
 | |
|     }
 | |
| 
 | |
|     ctx = SSL_CTX_new(meth);
 | |
|     if (ctx == NULL)
 | |
|         goto err;
 | |
|     if (SSL_CTX_set_min_proto_version(ctx, min_version) == 0)
 | |
|         goto err;
 | |
|     if (SSL_CTX_set_max_proto_version(ctx, max_version) == 0)
 | |
|         goto err;
 | |
| 
 | |
| #ifndef OPENSSL_NO_PSK
 | |
|     if (psk)
 | |
|         SSL_CTX_set_psk_client_callback(ctx, dummy_psk);
 | |
| #endif
 | |
| #ifndef OPENSSL_NO_SRP
 | |
|     if (srp)
 | |
|         SSL_CTX_set_srp_client_pwd_callback(ctx, dummy_srp);
 | |
| #endif
 | |
| 
 | |
|     if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) {
 | |
|         BIO_printf(bio_err, "Error setting TLSv1.3 ciphersuites\n");
 | |
|         goto err;
 | |
|     }
 | |
| 
 | |
|     if (ciphers != NULL) {
 | |
|         if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
 | |
|             BIO_printf(bio_err, "Error in cipher list\n");
 | |
|             goto err;
 | |
|         }
 | |
|     }
 | |
|     ssl = SSL_new(ctx);
 | |
|     if (ssl == NULL)
 | |
|         goto err;
 | |
| 
 | |
|     if (use_supported)
 | |
|         sk = SSL_get1_supported_ciphers(ssl);
 | |
|     else
 | |
|         sk = SSL_get_ciphers(ssl);
 | |
| 
 | |
|     if (!verbose) {
 | |
|         for (i = 0; i < sk_SSL_CIPHER_num(sk); i++) {
 | |
|             const SSL_CIPHER *c = sk_SSL_CIPHER_value(sk, i);
 | |
|             p = SSL_CIPHER_get_name(c);
 | |
|             if (p == NULL)
 | |
|                 break;
 | |
|             if (i != 0)
 | |
|                 BIO_printf(bio_out, ":");
 | |
|             BIO_printf(bio_out, "%s", p);
 | |
|         }
 | |
|         BIO_printf(bio_out, "\n");
 | |
|     } else {
 | |
| 
 | |
|         for (i = 0; i < sk_SSL_CIPHER_num(sk); i++) {
 | |
|             const SSL_CIPHER *c;
 | |
| 
 | |
|             c = sk_SSL_CIPHER_value(sk, i);
 | |
| 
 | |
|             if (Verbose) {
 | |
|                 unsigned long id = SSL_CIPHER_get_id(c);
 | |
|                 int id0 = (int)(id >> 24);
 | |
|                 int id1 = (int)((id >> 16) & 0xffL);
 | |
|                 int id2 = (int)((id >> 8) & 0xffL);
 | |
|                 int id3 = (int)(id & 0xffL);
 | |
| 
 | |
|                 if ((id & 0xff000000L) == 0x03000000L)
 | |
|                     BIO_printf(bio_out, "          0x%02X,0x%02X - ", id2, id3); /* SSL3
 | |
|                                                                                   * cipher */
 | |
|                 else
 | |
|                     BIO_printf(bio_out, "0x%02X,0x%02X,0x%02X,0x%02X - ", id0, id1, id2, id3); /* whatever */
 | |
|             }
 | |
|             if (stdname) {
 | |
|                 const char *nm = SSL_CIPHER_standard_name(c);
 | |
|                 if (nm == NULL)
 | |
|                     nm = "UNKNOWN";
 | |
|                 BIO_printf(bio_out, "%s - ", nm);
 | |
|             }
 | |
|             BIO_puts(bio_out, SSL_CIPHER_description(c, buf, sizeof(buf)));
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     ret = 0;
 | |
|     goto end;
 | |
|  err:
 | |
|     ERR_print_errors(bio_err);
 | |
|  end:
 | |
|     if (use_supported)
 | |
|         sk_SSL_CIPHER_free(sk);
 | |
|     SSL_CTX_free(ctx);
 | |
|     SSL_free(ssl);
 | |
|     return ret;
 | |
| }
 |