123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264 |
- /*
- * This file is part of the Sofia-SIP package
- *
- * Copyright (C) 2005 Nokia Corporation.
- *
- * Contact: Pekka Pessi <pekka.pessi@nokia.com>
- *
- * This library is free software; you can redistribute it and/or
- * modify it under the terms of the GNU Lesser General Public License
- * as published by the Free Software Foundation; either version 2.1 of
- * the License, or (at your option) any later version.
- *
- * This library is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * Lesser General Public License for more details.
- *
- * You should have received a copy of the GNU Lesser General Public
- * License along with this library; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
- * 02110-1301 USA
- *
- */
- #include <sys/types.h>
- #include <sys/time.h>
- #include <unistd.h>
- #include <fcntl.h>
- #include <stdio.h>
- #include <string.h>
- #include "ssl.h"
- #include "tls.h"
- typedef int (*IO_HANDLER)(int i);
- typedef struct __tls_mngr {
- int sock;
- TLS_CONTEXT ctx;
- IO_HANDLER handler;
- } TLS_MNGR;
- static TLS_MNGR tls_mngr[100] = {{0}};
- static int mngr_size = 0;
- static int width = 0;
- static char *file_prefix = "";
- static fd_set regifds;
- static int master_socket = 0;
- void init_event_mngr (void)
- {
- mngr_size = 0;
- FD_ZERO (®ifds);
- }
- int tls_setblocking(int s, int blocking)
- {
- unsigned mode = fcntl(s, F_GETFL, 0);
- if (mode < 0)
- return -1;
- if (blocking)
- mode &= ~(O_NDELAY | O_NONBLOCK);
- else
- mode |= O_NDELAY | O_NONBLOCK;
- return fcntl(s, F_SETFL, mode);
- }
- void regi_sock (int sock, TLS_CONTEXT ctx, IO_HANDLER handler)
- {
- FD_SET (sock, ®ifds);
- if (sock + 1 > width)
- width = sock + 1;
- tls_mngr[mngr_size].sock = sock;
- tls_mngr[mngr_size].ctx = ctx;
- tls_mngr[mngr_size].handler = handler;
- mngr_size++;
- tls_setblocking(sock, 0);
- printf("socket %d registered, ctx = %p, mngr_size = %d, width = %d\n",
- sock, ctx, mngr_size, width);
- }
- int get_width (void)
- {
- int i;
- int lwidth = 1;
- for (i = 0; i < mngr_size; i++) {
- if (tls_mngr[i].sock + 1 > lwidth)
- lwidth = tls_mngr[i].sock + 1;
- }
- return lwidth;
- }
- int tls_read_buffer(TLS_MNGR mngr, char *buf, int size)
- {
- int bytes = 0;
- TLS_CONTEXT ctx = mngr.ctx;
- do {
- int ret = tls_read(ctx, buf + bytes, size - bytes);
- int err = tls_get_error(ctx, ret);
- printf("tls_read returned %d\n", ret);
- switch (err) {
- case SSL_ERROR_NONE:
- bytes += ret;
- break;
- case SSL_ERROR_WANT_READ:
- printf("ssl error want read\n");
- return bytes;
- break;
- case SSL_ERROR_WANT_WRITE:
- break;
- case SSL_ERROR_ZERO_RETURN:
- printf("shutdown\n");
- tls_shutdown(ctx);
- return bytes;
- case SSL_ERROR_SYSCALL:
- perror("tls_syscall");
- tls_shutdown(ctx);
- FD_CLR(mngr.sock, ®ifds);
- return bytes;
- default:
- printf("TLS error code %d\n", err);
- return bytes;
- }
- if (tls_pending(ctx)) {
- printf("read pending\n");
- }
- } while (tls_pending(ctx));
- printf("normal read %d bytes\n", bytes);
- return bytes;
- }
- int tls_slave_handler(int i)
- {
- unsigned char buf[50000];
- char fname[100];
- FILE *fp;
- int bytes = tls_read_buffer(tls_mngr[i], buf, sizeof(buf));
- printf("buffer read %d bytes\n", bytes);
- if (bytes > 0) {
- sprintf(fname, "%s%02d.txt", file_prefix, i);
- fp = fopen(fname, "a");
- if (fp == NULL)
- perror("tls_slave_handler fopen");
- else {
- int ret = fwrite(buf, sizeof(char), bytes, fp);
- if (ret != bytes)
- perror("tls_slave_handler write");
- fclose(fp);
- }
- }
- return 0;
- }
- int tls_master_handler(int i)
- {
- TLS_CONTEXT ctx_slave;
- TLS_ISSUES tls_issues = {0};
- int sock;
- printf("tls_master_handler\n");
- tls_issues.master_socket = master_socket;
- sock = init_tls_slave(tls_issues, tls_mngr[i].ctx, &ctx_slave);
- if (sock < 0) {
- perror("init_tls_slave");
- return -1;
- }
- regi_sock(sock, ctx_slave, tls_slave_handler);
- return 0;
- }
- int event_mngr ()
- {
- struct timeval tv;
- int retv;
- int i;
- fd_set readfds;
- tv.tv_sec = 5;
- tv.tv_usec = 0;
- readfds = regifds;
- retv = select(width, &readfds, NULL, NULL, &tv);
- printf("select returned %d\n", retv);
- if (retv > 0) {
- for (i=0; i < mngr_size; i++) {
- if (FD_ISSET(tls_mngr[i].sock, &readfds)) {
- tls_mngr[i].handler(i);
- }
- }
- }
- if (retv < 0)
- perror("select");
- return retv;
- }
- int main (int argc, char *argv[])
- {
- TLS_ISSUES tls_issues = {0};
- TLS_CONTEXT ctx;
- fd_set readfds;
- if (argc != 2) {
- printf("Usage: tls_test_server <file prefix>\n");
- exit(0);
- }
- file_prefix = strdup(argv[1]);
- init_event_mngr();
- if (init_tls_master(&master_socket,
- tls_issues,
- &ctx) < 0) {
- printf("init_tls_master failed\n");
- exit (1);
- }
- regi_sock(master_socket, ctx, tls_master_handler);
- for (;;) {
- readfds = regifds;
- event_mngr();
- usleep(100000L);
- }
- return 0;
- }
|