1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184
|
------------------------------------------------------------------------------
-- Ada Web Server --
-- --
-- Copyright (C) 2003-2016, AdaCore --
-- --
-- This is free software; you can redistribute it and/or modify it --
-- under terms of the GNU General Public License as published by the --
-- Free Software Foundation; either version 3, or (at your option) any --
-- later version. This software is distributed in the hope that it will --
-- be useful, but WITHOUT ANY WARRANTY; without even the implied warranty --
-- of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU --
-- General Public License for more details. --
-- --
-- You should have received a copy of the GNU General Public License --
-- distributed with this software; see file COPYING3. If not, go --
-- to http://www.gnu.org/licenses for a complete copy of the license. --
------------------------------------------------------------------------------
-- Test for server certificates with Server Name Identification (SNI).
with Ada.Exceptions;
with Ada.Text_IO;
with AWS.Client;
with AWS.Config.Set;
with AWS.Messages;
with AWS.MIME;
with AWS.Net.SSL.Certificate;
with AWS.Parameters;
with AWS.Response;
with AWS.Server.Status;
with AWS.Status;
with AWS.URL;
with AWS.Utils;
procedure Cert is
use Ada;
use Ada.Text_IO;
use AWS;
function CB (Request : Status.Data) return Response.Data;
procedure Display_Certificate (Socket : Net.SSL.Socket_Type);
procedure Display_Certificate (Cert : Net.SSL.Certificate.Object);
HTTP : Server.HTTP;
--------
-- CB --
--------
function CB (Request : Status.Data) return Response.Data is
URI : constant String := Status.URI (Request);
Sock : constant Net.Socket_Type'Class := Status.Socket (Request);
begin
if URI = "/simple" then
New_Line;
Put_Line ("Client certificate as received by the server:");
Display_Certificate (Net.SSL.Socket_Type (Sock));
return Response.Build (MIME.Text_HTML, "simple ok");
else
Put_Line ("Unknown URI " & URI);
return Response.Build
(MIME.Text_HTML, URI & " not found", Messages.S404);
end if;
end CB;
-------------------------
-- Display_Certificate --
-------------------------
procedure Display_Certificate (Cert : Net.SSL.Certificate.Object) is
use type Net.SSL.Certificate.Object;
begin
if Cert = Net.SSL.Certificate.Undefined then
Put_Line ("No certificate.");
else
Put_Line ("Name : " & Net.SSL.Certificate.Common_Name (Cert));
Put_Line ("Subject : " & Net.SSL.Certificate.Subject (Cert));
Put_Line ("Issuer : " & Net.SSL.Certificate.Issuer (Cert));
Put_Line ("Serial : " & Net.SSL.Certificate.Serial_Number (Cert));
end if;
end Display_Certificate;
procedure Display_Certificate (Socket : Net.SSL.Socket_Type) is
Cert : constant Net.SSL.Certificate.Object :=
Net.SSL.Certificate.Get (Socket);
begin
Display_Certificate (Cert);
end Display_Certificate;
-------------
-- Request --
-------------
procedure Request (URL : String) is
O_URL : constant AWS.URL.Object := AWS.URL.Parse (URL);
R : Response.Data;
C : Client.HTTP_Connection;
Cert : Net.SSL.Certificate.Object;
begin
Client.Create (C, URL, Certificate => "aws-client.pem");
Cert := Client.Get_Certificate (C);
New_Line;
Put_Line ("Server certificate as received by the client:");
Display_Certificate (Cert);
Client.Get (C, R, AWS.URL.Abs_Path (O_URL));
Put_Line ("=> " & Response.Message_Body (R));
New_Line;
Client.Close (C);
end Request;
Conf : Config.Object;
begin
Put_Line ("Start main, wait for server to start...");
Config.Set.Server_Port (Conf, 0);
Config.Set.Max_Connection (Conf, 5);
Config.Set.Security (Conf, True);
Config.Set.Exchange_Certificate (Conf, True);
Config.Set.Trusted_CA (Conf, "private-ca.crt");
Config.Set.Certificate (Conf, "aws-server.crt");
Config.Set.Key (Conf, "aws-server.key");
Config.Set.IPv6_Only (Conf, Net.IPv6_Available);
Config.Set.Protocol_Family
(Conf, (if Net.IPv6_Available then "Family_Inet6" else "Family_Inet"));
Server.Start (HTTP, CB'Unrestricted_Access, Conf);
if Net.IPv6_Available then
-- Additional Bind and Listen to localhost directly, because when IPv6
-- available localhost on server side and on client side could be in
-- different families.
Server.Add_Listening
(HTTP, "", Server.Status.Port (HTTP),
(if Server.Status.Is_IPv6 (HTTP)
then Net.Family_Inet else Net.Family_Inet6));
end if;
-- Connect to phisical IP, Net.Host_Name and to "localhost" lead to
-- different certificates.
Net.SSL.Add_Host_Certificate
(Server.SSL_Config (HTTP).all,
Net.Host_Name, "aws-server-2.crt", "aws-server-2.key");
-- aws-server-2.crt and aws-server-2.key is copied from
-- ../0226_client_cert/aws-server.crt and
-- ../0226_client_cert/aws-server.key
Net.SSL.Add_Host_Certificate
(Server.SSL_Config (HTTP).all,
"localhost", "chain-srv.crt", "test-srv.key");
-- chain-srv.crt and test-srv.key taken from ../0246_ctr_chain
Put_Line ("Server started");
Request (AWS.Server.Status.Local_URL (HTTP) & "/simple");
Request ("https://" & Net.Host_Name & ':'
& Utils.Image (Server.Status.Port (HTTP)) & "/simple");
Request ("https://localhost:"
& Utils.Image (Server.Status.Port (HTTP)) & "/simple");
Server.Shutdown (HTTP);
Display_Certificate (Net.SSL.Certificate.Load ("go-daddy.crt"));
exception
when E : others =>
Put_Line ("Main Error " & Exceptions.Exception_Information (E));
Server.Shutdown (HTTP);
end Cert;
|