1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128
|
/*
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License").
* You may not use this file except in compliance with the License.
* A copy of the License is located at
*
* http://aws.amazon.com/apache2.0
*
* or in the "license" file accompanying this file. This file is distributed
* on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either
* express or implied. See the License for the specific language governing
* permissions and limitations under the License.
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include "api/s2n.h"
#include "error/s2n_errno.h"
#include "stuffer/s2n_stuffer.h"
#include "utils/s2n_safety.h"
#define STRING_LEN 1024
static char str_buffer[STRING_LEN];
static s2n_blocked_status blocked;
#define SEND(...) \
do { \
sprintf(str_buffer, __VA_ARGS__); \
POSIX_GUARD(s2n_send(conn, str_buffer, strlen(str_buffer), &blocked)); \
} while (0)
#define BUFFER(...) \
do { \
sprintf(str_buffer, __VA_ARGS__); \
POSIX_GUARD(s2n_stuffer_write_bytes(&stuffer, (const uint8_t *) str_buffer, strlen(str_buffer))); \
} while (0)
static int flush(uint32_t left, uint8_t *buffer, struct s2n_connection *conn, s2n_blocked_status *blocked_status)
{
uint32_t i = 0;
while (i < left) {
int out = s2n_send(conn, &buffer[i], left - i, blocked_status);
if (out < 0) {
fprintf(stderr, "Error writing to connection: '%s'\n", s2n_strerror(s2n_errno, "EN"));
s2n_print_stacktrace(stdout);
return S2N_FAILURE;
}
i += out;
}
return S2N_SUCCESS;
}
#define HEADERS(length) \
do { \
SEND("HTTP/1.1 200 OK\r\n"); \
SEND("Content-Length: %u\r\n", length); \
SEND("\r\n"); \
} while (0)
/* In bench mode, we send some binary output */
int bench_handler(struct s2n_connection *conn, uint32_t bench)
{
HEADERS(bench);
fprintf(stdout, "Sending %u bytes...\n", bench);
uint8_t big_buff[65536] = { 0 };
uint32_t len = sizeof(big_buff);
uint32_t bytes_remaining = bench;
while (bytes_remaining) {
uint32_t buffer_remaining = bytes_remaining < len ? bytes_remaining : len;
POSIX_GUARD(flush(buffer_remaining, big_buff, conn, &blocked));
bytes_remaining -= buffer_remaining;
}
fprintf(stdout, "Done. Closing connection.\n\n");
return 0;
}
/*
* simple https handler that allows https clients to connect
* but currently does not do any user parsing
*/
int https(struct s2n_connection *conn, uint32_t bench)
{
if (bench) {
return bench_handler(conn, bench);
}
DEFER_CLEANUP(struct s2n_stuffer stuffer, s2n_stuffer_free);
POSIX_GUARD(s2n_stuffer_growable_alloc(&stuffer, 1024));
BUFFER("<html><body><h1>Hello from s2n server</h1><pre>");
BUFFER("Client hello version: %d\n", s2n_connection_get_client_hello_version(conn));
BUFFER("Client protocol version: %d\n", s2n_connection_get_client_protocol_version(conn));
BUFFER("Server protocol version: %d\n", s2n_connection_get_server_protocol_version(conn));
BUFFER("Actual protocol version: %d\n", s2n_connection_get_actual_protocol_version(conn));
if (s2n_get_server_name(conn)) {
BUFFER("Server name: %s\n", s2n_get_server_name(conn));
}
if (s2n_get_application_protocol(conn)) {
BUFFER("Application protocol: %s\n", s2n_get_application_protocol(conn));
}
BUFFER("Curve: %s\n", s2n_connection_get_curve(conn));
BUFFER("KEM: %s\n", s2n_connection_get_kem_name(conn));
BUFFER("KEM Group: %s\n", s2n_connection_get_kem_group_name(conn));
BUFFER("Cipher negotiated: %s\n", s2n_connection_get_cipher(conn));
BUFFER("Session resumption: %s\n", s2n_connection_is_session_resumed(conn) ? "true" : "false");
uint32_t content_length = s2n_stuffer_data_available(&stuffer);
uint8_t *content = s2n_stuffer_raw_read(&stuffer, content_length);
POSIX_ENSURE_REF(content);
HEADERS(content_length);
POSIX_GUARD(flush(content_length, content, conn, &blocked));
return S2N_SUCCESS;
}
|