Fixes #296. Removes polarssl references

git-svn-id: file:///home/svn/framework3/trunk@6811 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2009-07-16 16:00:29 +00:00
parent 54973cf93b
commit 2c4acca92a
5 changed files with 31 additions and 29 deletions

View File

@ -3,6 +3,11 @@
extern VOID remote_register_core_dispatch_routines();
extern VOID remote_deregister_core_dispatch_routines();
// include the OpenSSL library
#pragma comment(lib,"libeay32.lib")
#pragma comment(lib,"ssleay32.lib")
HANDLE clientLock = NULL;
/*
@ -19,6 +24,9 @@ int main(int argc, char **argv)
WSAStartup(0x0202, &data);
printf("ERROR: This client is out of date and does not support SSL\n");
exit(0);
if (argc < 3)
{
printf("Usage: %s <host> <port>\n", argv[0]);

View File

@ -10,9 +10,7 @@
#include <windows.h>
#endif
#include "polarssl/net.h"
#include "polarssl/ssl.h"
#include "polarssl/havege.h"
#include <openssl/ssl.h>
#include "linkage.h"

View File

@ -1,8 +1,5 @@
#include "common.h"
// include the PolarSSL library
#pragma comment(lib,"polarssl.lib")
DWORD packet_find_tlv_buf(PUCHAR payload, DWORD payloadLength, DWORD index,
TlvType type, Tlv *tlv);
@ -708,13 +705,13 @@ DWORD packet_transmit(Remote *remote, Packet *packet,
idx = 0;
while( idx < sizeof(packet->header)) {
// Transmit the packet's header (length, type)
while( (res = ssl_write(
&remote->ssl,
(LPCSTR)(&packet->header) + idx,
sizeof(packet->header) - idx)) == POLARSSL_ERR_NET_TRY_AGAIN) {
dprintf("resending SSL header data on blocked socket");
}
if(res < 0) {
res = SSL_write(
remote->ssl,
(LPCSTR)(&packet->header) + idx,
sizeof(packet->header) - idx
);
if(res <= 0) {
dprintf("transmit header failed with return %d at index %d\n", res, idx);
break;
}
@ -725,13 +722,14 @@ DWORD packet_transmit(Remote *remote, Packet *packet,
idx = 0;
while( idx < packet->payloadLength) {
// Transmit the packet's payload (length, type)
while( (res = ssl_write(
&remote->ssl,
packet->payload + idx,
packet->payloadLength - idx)) == POLARSSL_ERR_NET_TRY_AGAIN) {
dprintf("resending SSL payload data on blocked socket");
}
res = SSL_write(
remote->ssl,
packet->payload + idx,
packet->payloadLength - idx
);
if(res < 0)
break;
idx += res;
}
if(res < 0) {
@ -786,12 +784,10 @@ DWORD packet_receive(Remote *remote, Packet **packet)
// Read the packet length
while (inHeader)
{
if ((bytesRead = ssl_read(&remote->ssl,
if ((bytesRead = SSL_read(remote->ssl,
((PUCHAR)&header + headerBytes),
sizeof(TlvHeader) - headerBytes)) <= 0)
{
if(bytesRead == POLARSSL_ERR_NET_TRY_AGAIN) continue;
if (!bytesRead)
SetLastError(ERROR_NOT_FOUND);
@ -830,11 +826,10 @@ DWORD packet_receive(Remote *remote, Packet **packet)
// Read the payload
while (payloadBytesLeft > 0)
{
if ((bytesRead = ssl_read(&remote->ssl,
if ((bytesRead = SSL_read(remote->ssl,
payload + payloadLength - payloadBytesLeft,
payloadBytesLeft)) <= 0)
{
if(bytesRead == POLARSSL_ERR_NET_TRY_AGAIN) continue;
if (GetLastError() == WSAEWOULDBLOCK)
continue;

View File

@ -170,7 +170,7 @@ void __stdcall sniffer_receive(DWORD_PTR Param, DWORD_PTR ThParam, HANDLE hPacke
ETHERNET_HEADER *eth;
IP_HEADER *ip;
TCP_HEADER *tcp;
UDP_HEADER *udp;
// UDP_HEADER *udp;
j = (CaptureJob *)Param;
@ -309,7 +309,6 @@ DWORD request_sniffer_capture_start(Remote *remote, Packet *packet) {
j->max_pkts = maxp;
j->cur_pkts = 0;
j->mtu = AdpCfgGetMaxPacketSize(AdpGetConfig(j->adp));
j->remote = remote;
AdpSetOnPacketRecv(j->adp, (FARPROC) sniffer_receive, (DWORD_PTR)j);
AdpSetMacFilter(j->adp, mfAll);

View File

@ -136,9 +136,11 @@ DWORD negotiate_ssl(Remote *remote)
SSL_library_init();
remote->meth = TLSv1_client_method();
remote->ctx = SSL_CTX_new(remote->meth);
remote->ssl = SSL_new(remote->ctx);
remote->ctx = SSL_CTX_new(remote->meth);
SSL_CTX_set_mode(remote->ctx, SSL_MODE_AUTO_RETRY);
remote->ssl = SSL_new(remote->ctx);
SSL_set_verify(remote->ssl, SSL_VERIFY_NONE, NULL);
SSL_set_fd(remote->ssl, remote->fd);