forked from aws/s2n-tls
-
Notifications
You must be signed in to change notification settings - Fork 0
/
https.c
128 lines (104 loc) · 4.59 KB
/
https.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
/*
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License").
* You may not use this file except in compliance with the License.
* A copy of the License is located at
*
* http://aws.amazon.com/apache2.0
*
* or in the "license" file accompanying this file. This file is distributed
* on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either
* express or implied. See the License for the specific language governing
* permissions and limitations under the License.
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include "api/s2n.h"
#include "error/s2n_errno.h"
#include "stuffer/s2n_stuffer.h"
#include "utils/s2n_safety.h"
#define STRING_LEN 1024
static char str_buffer[STRING_LEN];
static s2n_blocked_status blocked;
#define SEND(...) \
do { \
sprintf(str_buffer, __VA_ARGS__); \
POSIX_GUARD(s2n_send(conn, str_buffer, strlen(str_buffer), &blocked)); \
} while (0)
#define BUFFER(...) \
do { \
sprintf(str_buffer, __VA_ARGS__); \
POSIX_GUARD(s2n_stuffer_write_bytes(&stuffer, (const uint8_t *) str_buffer, strlen(str_buffer))); \
} while (0)
static int flush(uint32_t left, uint8_t *buffer, struct s2n_connection *conn, s2n_blocked_status *blocked_status)
{
uint32_t i = 0;
while (i < left) {
int out = s2n_send(conn, &buffer[i], left - i, blocked_status);
if (out < 0) {
fprintf(stderr, "Error writing to connection: '%s'\n", s2n_strerror(s2n_errno, "EN"));
s2n_print_stacktrace(stdout);
return S2N_FAILURE;
}
i += out;
}
return S2N_SUCCESS;
}
#define HEADERS(length) \
do { \
SEND("HTTP/1.1 200 OK\r\n"); \
SEND("Content-Length: %u\r\n", length); \
SEND("\r\n"); \
} while (0)
/* In bench mode, we send some binary output */
int bench_handler(struct s2n_connection *conn, uint32_t bench)
{
HEADERS(bench);
fprintf(stdout, "Sending %u bytes...\n", bench);
uint8_t big_buff[65536] = { 0 };
uint32_t len = sizeof(big_buff);
uint32_t bytes_remaining = bench;
while (bytes_remaining) {
uint32_t buffer_remaining = bytes_remaining < len ? bytes_remaining : len;
POSIX_GUARD(flush(buffer_remaining, big_buff, conn, &blocked));
bytes_remaining -= buffer_remaining;
}
fprintf(stdout, "Done. Closing connection.\n\n");
return 0;
}
/*
* simple https handler that allows https clients to connect
* but currently does not do any user parsing
*/
int https(struct s2n_connection *conn, uint32_t bench)
{
if (bench) {
return bench_handler(conn, bench);
}
DEFER_CLEANUP(struct s2n_stuffer stuffer, s2n_stuffer_free);
POSIX_GUARD(s2n_stuffer_growable_alloc(&stuffer, 1024));
BUFFER("<html><body><h1>Hello from s2n server</h1><pre>");
BUFFER("Client hello version: %d\n", s2n_connection_get_client_hello_version(conn));
BUFFER("Client protocol version: %d\n", s2n_connection_get_client_protocol_version(conn));
BUFFER("Server protocol version: %d\n", s2n_connection_get_server_protocol_version(conn));
BUFFER("Actual protocol version: %d\n", s2n_connection_get_actual_protocol_version(conn));
if (s2n_get_server_name(conn)) {
BUFFER("Server name: %s\n", s2n_get_server_name(conn));
}
if (s2n_get_application_protocol(conn)) {
BUFFER("Application protocol: %s\n", s2n_get_application_protocol(conn));
}
BUFFER("Curve: %s\n", s2n_connection_get_curve(conn));
BUFFER("KEM: %s\n", s2n_connection_get_kem_name(conn));
BUFFER("KEM Group: %s\n", s2n_connection_get_kem_group_name(conn));
BUFFER("Cipher negotiated: %s\n", s2n_connection_get_cipher(conn));
BUFFER("Session resumption: %s\n", s2n_connection_is_session_resumed(conn) ? "true" : "false");
uint32_t content_length = s2n_stuffer_data_available(&stuffer);
uint8_t *content = s2n_stuffer_raw_read(&stuffer, content_length);
POSIX_ENSURE_REF(content);
HEADERS(content_length);
POSIX_GUARD(flush(content_length, content, conn, &blocked));
return S2N_SUCCESS;
}