mirror of
https://github.com/3proxy/3proxy.git
synced 2025-09-09 03:47:12 +08:00
Compare commits
No commits in common. "8fcc358e433180f818e83fd2a7ab0fe6b6a81d76" and "2966836dfaa87d2a19a60b9271d3572b7121c9fb" have entirely different histories.
8fcc358e43
...
2966836dfa
2
.github/workflows/c-cpp.yml
vendored
2
.github/workflows/c-cpp.yml
vendored
@ -37,7 +37,7 @@ jobs:
|
|||||||
run: cmd /C 'echo LIBS := -L "c:/program files/openssl/lib" $(LIBS) >>Makefile.win && echo CFLAGS := -I "c:/program files/openssl/include" $(CFLAGS) >>Makefile.win && type Makefile.win'
|
run: cmd /C 'echo LIBS := -L "c:/program files/openssl/lib" $(LIBS) >>Makefile.win && echo CFLAGS := -I "c:/program files/openssl/include" $(CFLAGS) >>Makefile.win && type Makefile.win'
|
||||||
- name: SSLPlugin Linux
|
- name: SSLPlugin Linux
|
||||||
if: ${{ startsWith(matrix.target, 'ubuntu') }}
|
if: ${{ startsWith(matrix.target, 'ubuntu') }}
|
||||||
run: "sed -i '/^PLUGIN/s/$/ SSLPlugin/' Makefile && sed -i '/^LIBS/s/$/ -lcrypto -lssl/' Makefile"
|
run: 'echo PLUGINS := $(PLUGINS) SSLPlugin >>Makefile & echo LIBS := $(LIBS) -lcrypto -lssl >>Makefile'
|
||||||
- name: make
|
- name: make
|
||||||
run: make
|
run: make
|
||||||
- name: mkdir
|
- name: mkdir
|
||||||
|
@ -103,7 +103,7 @@ install-chroot-dir:
|
|||||||
$(INSTALL_BIN) -d $(CHROOTDIR)/libexec
|
$(INSTALL_BIN) -d $(CHROOTDIR)/libexec
|
||||||
chmod -R o-rwx $(CHROOTDIR)
|
chmod -R o-rwx $(CHROOTDIR)
|
||||||
|
|
||||||
install-etc-default-config: install-chroot-dir
|
install-etc-default-config:
|
||||||
if [ ! -d $(INSTALL_CFG_DEST) ]; then \
|
if [ ! -d $(INSTALL_CFG_DEST) ]; then \
|
||||||
ln -s $(CHROOTREL)/conf $(INSTALL_CFG_DEST); \
|
ln -s $(CHROOTREL)/conf $(INSTALL_CFG_DEST); \
|
||||||
$(INSTALL_BIN) $(INSTALL_CFG) $(ETCDIR)/3proxy.cfg; \
|
$(INSTALL_BIN) $(INSTALL_CFG) $(ETCDIR)/3proxy.cfg; \
|
||||||
|
4
debian/postinst
vendored
4
debian/postinst
vendored
@ -19,8 +19,8 @@ fi
|
|||||||
echo ""
|
echo ""
|
||||||
echo 3proxy installed.
|
echo 3proxy installed.
|
||||||
if /bin/systemctl >/dev/null 2>&1; then \
|
if /bin/systemctl >/dev/null 2>&1; then \
|
||||||
/bin/systemctl stop 3proxy.service ;\
|
/bin/systemctl stop 3proxy.service \
|
||||||
/bin/systemctl start 3proxy.service ;\
|
/bin/systemctl start 3proxy.service \
|
||||||
echo use ;\
|
echo use ;\
|
||||||
echo " "systemctl start 3proxy.service ;\
|
echo " "systemctl start 3proxy.service ;\
|
||||||
echo to start proxy ;\
|
echo to start proxy ;\
|
||||||
|
@ -361,13 +361,11 @@ SSL_CTX * ssl_cli_ctx(SSL_CONFIG *config, X509 *server_cert, EVP_PKEY *server_ke
|
|||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
if(server_cert) {
|
err = SSL_CTX_use_certificate(ctx, (X509 *) server_cert);
|
||||||
err = SSL_CTX_use_certificate(ctx, (X509 *) server_cert);
|
if ( err <= 0 ) {
|
||||||
if ( err <= 0 ) {
|
*errSSL = getSSLErr();
|
||||||
*errSSL = getSSLErr();
|
SSL_CTX_free(ctx);
|
||||||
SSL_CTX_free(ctx);
|
return NULL;
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
err = SSL_CTX_use_PrivateKey(ctx, server_key);
|
err = SSL_CTX_use_PrivateKey(ctx, server_key);
|
||||||
@ -381,6 +379,8 @@ SSL_CTX * ssl_cli_ctx(SSL_CONFIG *config, X509 *server_cert, EVP_PKEY *server_ke
|
|||||||
if(config->server_cipher_list)SSL_CTX_set_cipher_list(ctx, config->server_cipher_list);
|
if(config->server_cipher_list)SSL_CTX_set_cipher_list(ctx, config->server_cipher_list);
|
||||||
if(config->server_ciphersuites)SSL_CTX_set_ciphersuites(ctx, config->server_ciphersuites);
|
if(config->server_ciphersuites)SSL_CTX_set_ciphersuites(ctx, config->server_ciphersuites);
|
||||||
if(config->server_verify){
|
if(config->server_verify){
|
||||||
|
fprintf(stderr, "server verify\n");
|
||||||
|
fflush(stderr);
|
||||||
if(config->server_ca_file || config->server_ca_dir){
|
if(config->server_ca_file || config->server_ca_dir){
|
||||||
SSL_CTX_load_verify_locations(ctx, config->server_ca_file, config->server_ca_dir);
|
SSL_CTX_load_verify_locations(ctx, config->server_ca_file, config->server_ca_dir);
|
||||||
}
|
}
|
||||||
@ -483,17 +483,18 @@ static void* ssl_filter_open(void * idata, struct srvparam * srv){
|
|||||||
}
|
}
|
||||||
if(serv){
|
if(serv){
|
||||||
if(!srvcert || !srvkey) return sc;
|
if(!srvcert || !srvkey) return sc;
|
||||||
|
sc->server_cert = getCert(srvcert);
|
||||||
|
if(!sc->server_cert){
|
||||||
|
fprintf(stderr, "failed to read: %s\n", srvcert);
|
||||||
|
return sc;
|
||||||
|
}
|
||||||
if(!sc->server_key){
|
if(!sc->server_key){
|
||||||
return sc;
|
return sc;
|
||||||
}
|
}
|
||||||
if(!(sc->cli_ctx = ssl_cli_ctx(sc, NULL, sc->server_key, &errSSL))){
|
if(!(sc->cli_ctx = ssl_cli_ctx(sc, sc->server_cert, sc->server_key, &errSSL))){
|
||||||
fprintf(stderr, "failed to create context: %s\n", errSSL);
|
fprintf(stderr, "failed to create context: %s\n", errSSL);
|
||||||
return sc;
|
return sc;
|
||||||
}
|
}
|
||||||
if(SSL_CTX_use_certificate_chain_file(sc->cli_ctx, srvcert) != 1){
|
|
||||||
fprintf(stderr, "failed to read server cert: %s\n", srvcert);
|
|
||||||
return sc;
|
|
||||||
}
|
|
||||||
sc->serv = 1;
|
sc->serv = 1;
|
||||||
}
|
}
|
||||||
if(mitm || cli || serv){
|
if(mitm || cli || serv){
|
||||||
@ -533,7 +534,7 @@ static void* ssl_filter_open(void * idata, struct srvparam * srv){
|
|||||||
#endif
|
#endif
|
||||||
else
|
else
|
||||||
SSL_CTX_set_default_verify_paths(sc->srv_ctx);
|
SSL_CTX_set_default_verify_paths(sc->srv_ctx);
|
||||||
SSL_CTX_set_verify(sc->srv_ctx, SSL_VERIFY_PEER|SSL_VERIFY_FAIL_IF_NO_PEER_CERT, NULL);
|
SSL_CTX_set_verify(sc->srv_ctx, SSL_VERIFY_PEER|SSL_VERIFY_FAIL_IF_NO_PEER_CERT, NULL);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
#ifdef WIWHSPLICE
|
#ifdef WIWHSPLICE
|
||||||
|
Loading…
Reference in New Issue
Block a user