mirror of
https://github.com/3proxy/3proxy.git
synced 2025-09-07 10:57:12 +08:00
Compare commits
14 Commits
2966836dfa
...
8fcc358e43
Author | SHA1 | Date | |
---|---|---|---|
![]() |
8fcc358e43 | ||
![]() |
352b570413 | ||
![]() |
6d93ffec5d | ||
![]() |
613f51599b | ||
![]() |
24967c9e2b | ||
![]() |
a281c05259 | ||
![]() |
cc06d305d5 | ||
![]() |
012987eb1c | ||
![]() |
4eefe0ccff | ||
![]() |
b1233e580c | ||
![]() |
52cf4af0ac | ||
![]() |
d0ccaa07c3 | ||
![]() |
83e4f181b3 | ||
![]() |
724946a834 |
2
.github/workflows/c-cpp.yml
vendored
2
.github/workflows/c-cpp.yml
vendored
@ -37,7 +37,7 @@ jobs:
|
|||||||
run: cmd /C 'echo LIBS := -L "c:/program files/openssl/lib" $(LIBS) >>Makefile.win && echo CFLAGS := -I "c:/program files/openssl/include" $(CFLAGS) >>Makefile.win && type Makefile.win'
|
run: cmd /C 'echo LIBS := -L "c:/program files/openssl/lib" $(LIBS) >>Makefile.win && echo CFLAGS := -I "c:/program files/openssl/include" $(CFLAGS) >>Makefile.win && type Makefile.win'
|
||||||
- name: SSLPlugin Linux
|
- name: SSLPlugin Linux
|
||||||
if: ${{ startsWith(matrix.target, 'ubuntu') }}
|
if: ${{ startsWith(matrix.target, 'ubuntu') }}
|
||||||
run: 'echo PLUGINS := $(PLUGINS) SSLPlugin >>Makefile & echo LIBS := $(LIBS) -lcrypto -lssl >>Makefile'
|
run: "sed -i '/^PLUGIN/s/$/ SSLPlugin/' Makefile && sed -i '/^LIBS/s/$/ -lcrypto -lssl/' Makefile"
|
||||||
- name: make
|
- name: make
|
||||||
run: make
|
run: make
|
||||||
- name: mkdir
|
- name: mkdir
|
||||||
|
@ -103,7 +103,7 @@ install-chroot-dir:
|
|||||||
$(INSTALL_BIN) -d $(CHROOTDIR)/libexec
|
$(INSTALL_BIN) -d $(CHROOTDIR)/libexec
|
||||||
chmod -R o-rwx $(CHROOTDIR)
|
chmod -R o-rwx $(CHROOTDIR)
|
||||||
|
|
||||||
install-etc-default-config:
|
install-etc-default-config: install-chroot-dir
|
||||||
if [ ! -d $(INSTALL_CFG_DEST) ]; then \
|
if [ ! -d $(INSTALL_CFG_DEST) ]; then \
|
||||||
ln -s $(CHROOTREL)/conf $(INSTALL_CFG_DEST); \
|
ln -s $(CHROOTREL)/conf $(INSTALL_CFG_DEST); \
|
||||||
$(INSTALL_BIN) $(INSTALL_CFG) $(ETCDIR)/3proxy.cfg; \
|
$(INSTALL_BIN) $(INSTALL_CFG) $(ETCDIR)/3proxy.cfg; \
|
||||||
|
4
debian/postinst
vendored
4
debian/postinst
vendored
@ -19,8 +19,8 @@ fi
|
|||||||
echo ""
|
echo ""
|
||||||
echo 3proxy installed.
|
echo 3proxy installed.
|
||||||
if /bin/systemctl >/dev/null 2>&1; then \
|
if /bin/systemctl >/dev/null 2>&1; then \
|
||||||
/bin/systemctl stop 3proxy.service \
|
/bin/systemctl stop 3proxy.service ;\
|
||||||
/bin/systemctl start 3proxy.service \
|
/bin/systemctl start 3proxy.service ;\
|
||||||
echo use ;\
|
echo use ;\
|
||||||
echo " "systemctl start 3proxy.service ;\
|
echo " "systemctl start 3proxy.service ;\
|
||||||
echo to start proxy ;\
|
echo to start proxy ;\
|
||||||
|
@ -361,11 +361,13 @@ SSL_CTX * ssl_cli_ctx(SSL_CONFIG *config, X509 *server_cert, EVP_PKEY *server_ke
|
|||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
err = SSL_CTX_use_certificate(ctx, (X509 *) server_cert);
|
if(server_cert) {
|
||||||
if ( err <= 0 ) {
|
err = SSL_CTX_use_certificate(ctx, (X509 *) server_cert);
|
||||||
*errSSL = getSSLErr();
|
if ( err <= 0 ) {
|
||||||
SSL_CTX_free(ctx);
|
*errSSL = getSSLErr();
|
||||||
return NULL;
|
SSL_CTX_free(ctx);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
err = SSL_CTX_use_PrivateKey(ctx, server_key);
|
err = SSL_CTX_use_PrivateKey(ctx, server_key);
|
||||||
@ -379,8 +381,6 @@ SSL_CTX * ssl_cli_ctx(SSL_CONFIG *config, X509 *server_cert, EVP_PKEY *server_ke
|
|||||||
if(config->server_cipher_list)SSL_CTX_set_cipher_list(ctx, config->server_cipher_list);
|
if(config->server_cipher_list)SSL_CTX_set_cipher_list(ctx, config->server_cipher_list);
|
||||||
if(config->server_ciphersuites)SSL_CTX_set_ciphersuites(ctx, config->server_ciphersuites);
|
if(config->server_ciphersuites)SSL_CTX_set_ciphersuites(ctx, config->server_ciphersuites);
|
||||||
if(config->server_verify){
|
if(config->server_verify){
|
||||||
fprintf(stderr, "server verify\n");
|
|
||||||
fflush(stderr);
|
|
||||||
if(config->server_ca_file || config->server_ca_dir){
|
if(config->server_ca_file || config->server_ca_dir){
|
||||||
SSL_CTX_load_verify_locations(ctx, config->server_ca_file, config->server_ca_dir);
|
SSL_CTX_load_verify_locations(ctx, config->server_ca_file, config->server_ca_dir);
|
||||||
}
|
}
|
||||||
@ -483,18 +483,17 @@ static void* ssl_filter_open(void * idata, struct srvparam * srv){
|
|||||||
}
|
}
|
||||||
if(serv){
|
if(serv){
|
||||||
if(!srvcert || !srvkey) return sc;
|
if(!srvcert || !srvkey) return sc;
|
||||||
sc->server_cert = getCert(srvcert);
|
|
||||||
if(!sc->server_cert){
|
|
||||||
fprintf(stderr, "failed to read: %s\n", srvcert);
|
|
||||||
return sc;
|
|
||||||
}
|
|
||||||
if(!sc->server_key){
|
if(!sc->server_key){
|
||||||
return sc;
|
return sc;
|
||||||
}
|
}
|
||||||
if(!(sc->cli_ctx = ssl_cli_ctx(sc, sc->server_cert, sc->server_key, &errSSL))){
|
if(!(sc->cli_ctx = ssl_cli_ctx(sc, NULL, sc->server_key, &errSSL))){
|
||||||
fprintf(stderr, "failed to create context: %s\n", errSSL);
|
fprintf(stderr, "failed to create context: %s\n", errSSL);
|
||||||
return sc;
|
return sc;
|
||||||
}
|
}
|
||||||
|
if(SSL_CTX_use_certificate_chain_file(sc->cli_ctx, srvcert) != 1){
|
||||||
|
fprintf(stderr, "failed to read server cert: %s\n", srvcert);
|
||||||
|
return sc;
|
||||||
|
}
|
||||||
sc->serv = 1;
|
sc->serv = 1;
|
||||||
}
|
}
|
||||||
if(mitm || cli || serv){
|
if(mitm || cli || serv){
|
||||||
@ -534,7 +533,7 @@ static void* ssl_filter_open(void * idata, struct srvparam * srv){
|
|||||||
#endif
|
#endif
|
||||||
else
|
else
|
||||||
SSL_CTX_set_default_verify_paths(sc->srv_ctx);
|
SSL_CTX_set_default_verify_paths(sc->srv_ctx);
|
||||||
SSL_CTX_set_verify(sc->srv_ctx, SSL_VERIFY_PEER|SSL_VERIFY_FAIL_IF_NO_PEER_CERT, NULL);
|
SSL_CTX_set_verify(sc->srv_ctx, SSL_VERIFY_PEER|SSL_VERIFY_FAIL_IF_NO_PEER_CERT, NULL);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
#ifdef WIWHSPLICE
|
#ifdef WIWHSPLICE
|
||||||
|
Loading…
Reference in New Issue
Block a user