Menu

[r3316]: / advanced / examples / ssl_server.c  Maximize  Restore  History

Download this file

271 lines (191 with data), 7.5 kB

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
/* A simple standalone XML-RPC server program based on Abyss that uses SSL
(Secure Sockets Layer) via OpenSSL.
This server is not sophisticated enough to do any actual verification of
client or server, but it works with a client that is willing to do an
HTTPS connection using a non-authenticating cipher. The 'curl_client'
example program is one way to run such a client.
Example:
$ ./ssl_server 8080 &
$ ./curl_client https://localhost:8080/RPC2
You can drive the most difficult part of this example (initial SSL
handshake) with the 'openssl' program that comes with OpenSSL, as follows.
$ ./ssl_server 8080 &
$ openssl s_client -connect localhost:8080 \
-cipher @SECLEVEL=0,aNULL+eNULL -state
The 'openssl' command connects and handshakes with the server, then waits
for you to type stuff to send to the server. You would have to type a
complete HTTP header followed by a valid XML-RPC call to complete the
demonstration.
Note that the examples above do no authentication, so you don't have to
supply certificates and keys to the server. See the 'ssl_secure_server'
example for that.
Set environment variable ABYSS_TRACE_SWITCH=1 for the server to see what it
is doing and even get error information from the OpenSSL library if it
doesn't work.
This uses the "provide your own Abyss server" mode of operation,
as opposed to other Xmlrpc-c facilities that create an Abyss server under
the covers, because this is the only way to get SSL.
NOTE: We deliberately don't check error indications here to make the code
easier to read. If you're having trouble getting this code to run, by all
means add checks of the "error" and "env" variables!
*/
#define _XOPEN_SOURCE 600
#define WIN32_LEAN_AND_MEAN /* required by xmlrpc-c/server_abyss.h */
#include <stdlib.h>
#include <stdio.h>
#include <signal.h>
#ifndef _WIN32
#include <sys/socket.h>
#include <netinet/in.h>
#endif
#include <openssl/ssl.h>
#include <xmlrpc-c/base.h>
#include <xmlrpc-c/abyss.h>
#include <xmlrpc-c/abyss_openssl.h>
#include <xmlrpc-c/server.h>
#include <xmlrpc-c/server_abyss.h>
#include "config.h" /* information about this build environment */
static void
sslInfoCallback(const SSL * const sslP,
int const where,
int const ret) {
int const state = where & ~SSL_ST_MASK;
const char * stateStr;
const char * eventStr;
if (state & SSL_ST_CONNECT)
stateStr = "CONNECT";
else if (state & SSL_ST_ACCEPT)
stateStr = "CONNECT";
else
stateStr = "???";
if (where & SSL_CB_LOOP)
eventStr = "LOOP";
else if (where & SSL_CB_READ_ALERT)
eventStr = "READ ALERT";
else if (where & SSL_CB_WRITE_ALERT)
eventStr = "WRITE ALERT";
else if (where & SSL_CB_EXIT)
eventStr = "HANDSHAKE ERROR EXIT";
else if (where & SSL_CB_HANDSHAKE_START)
eventStr = "HANDSHAKE START";
else if (where & SSL_CB_HANDSHAKE_DONE)
eventStr = "HANDSHAKE DONE";
else
eventStr = "???";
fprintf(stderr, "Callback from openssl. State = '%s'\n",
SSL_state_string_long(sslP));
fprintf(stderr, " Stage = %s; event = %s\n",
stateStr, eventStr);
if (where & SSL_CB_ALERT) {
fprintf(stderr, " Alert type: '%s'\n",
SSL_alert_type_string_long(ret));
fprintf(stderr, " Alert desc: '%s'\n",
SSL_alert_desc_string_long(ret));
}
if (where & SSL_CB_EXIT) {
if (ret == 0)
fprintf(stderr, " failed\n");
else if (ret < 0)
fprintf(stderr, " error %d\n", ret);
else
fprintf(stderr, " succeeded %d\n", ret);
}
}
static SSL_CTX *
newSslCtx(void) {
SSL_CTX * sslCtxP;
sslCtxP = SSL_CTX_new(TLS_server_method());
/* Make it willing to use a non-encrypting cipher (as we request below) */
SSL_CTX_set_security_level(sslCtxP, 0);
/* Make server able to use a null cipher for simplicity. A null cipher
doesn't do any encryption, which means you don't have to supply any
certificates. By default, Openssl servers refuse to use a null cipher.
*/
SSL_CTX_set_cipher_list(sslCtxP, "AECDH-NULL-SHA");
// Provide handy tracing to Standard Error of the SSL handshake
SSL_CTX_set_info_callback(sslCtxP, sslInfoCallback);
return sslCtxP;
}
static void
printPeerIpAddr(TSession * const abyssSessionP) {
#ifdef _WIN32
struct abyss_win_chaninfo * channelInfoP;
#else
struct abyss_unix_chaninfo * channelInfoP;
#endif
struct sockaddr_in * sockAddrInP;
unsigned char * ipAddr; /* 4 byte array */
SessionGetChannelInfo(abyssSessionP, (void*)&channelInfoP);
sockAddrInP = (struct sockaddr_in *) &channelInfoP->peerAddr;
ipAddr = (unsigned char *)&sockAddrInP->sin_addr.s_addr;
printf("RPC is from IP address %u.%u.%u.%u\n",
ipAddr[0], ipAddr[1], ipAddr[2], ipAddr[3]);
}
static xmlrpc_server_shutdown_fn requestShutdown;
static void
shutdownAbyss(xmlrpc_env * const faultP,
void * const context,
const char * const comment,
void * const callInfo) {
TServer * const abyssServerP = context;
xmlrpc_env_init(faultP);
ServerTerminate(abyssServerP);
}
static xmlrpc_value *
sample_add(xmlrpc_env * const envP,
xmlrpc_value * const paramArrayP,
void * const serverInfo,
void * const channelInfo) {
xmlrpc_int x, y, z;
printPeerIpAddr(channelInfo);
/* Parse our argument array. */
xmlrpc_decompose_value(envP, paramArrayP, "(ii)", &x, &y);
if (envP->fault_occurred)
return NULL;
/* Add our two numbers. */
z = x + y;
/* Return our result. */
return xmlrpc_build_value(envP, "i", z);
}
int
main(int const argc,
const char ** const argv) {
struct xmlrpc_method_info3 const methodInfo = {
.methodName = "sample.add",
.methodFunction = &sample_add,
.serverInfo = NULL
};
SSL_CTX * sslCtxP;
TChanSwitch * chanSwitchP;
TServer abyssServer;
xmlrpc_registry * registryP;
xmlrpc_env env;
const char * error;
if (argc-1 != 1) {
fprintf(stderr, "You must specify 1 argument: The TCP port number "
"on which to listen for XML-RPC calls. "
"You specified %d.\n", argc-1);
exit(1);
}
AbyssInit(&error);
xmlrpc_env_init(&env);
sslCtxP = newSslCtx();
ChanSwitchOpenSslCreateIpV4Port(atoi(argv[1]), sslCtxP,
&chanSwitchP, &error);
ServerCreateSwitch(&abyssServer, chanSwitchP, &error);
registryP = xmlrpc_registry_new(&env);
xmlrpc_registry_add_method3(&env, registryP, &methodInfo);
xmlrpc_registry_set_shutdown(registryP, &shutdownAbyss, &abyssServer);
xmlrpc_server_abyss_set_handlers2(&abyssServer, "/RPC2", registryP);
ServerInit(&abyssServer);
printf("Running server...\n");
ServerRun(&abyssServer);
/* This waits for TCP connections and processes them as XML-RPC
RPCs indefinitely (until system.shutdown method performed).
*/
ServerFree(&abyssServer);
ChanSwitchDestroy(chanSwitchP);
SSL_CTX_free(sslCtxP);
AbyssTerm();
return 0;
}
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.