|
Packit |
875988 |
/* Feel free to use this example code in any way
|
|
Packit |
875988 |
you see fit (Public Domain) */
|
|
Packit |
875988 |
|
|
Packit |
875988 |
#include <sys/types.h>
|
|
Packit |
875988 |
#ifndef _WIN32
|
|
Packit |
875988 |
#include <sys/select.h>
|
|
Packit |
875988 |
#include <sys/socket.h>
|
|
Packit |
875988 |
#else
|
|
Packit |
875988 |
#include <winsock2.h>
|
|
Packit |
875988 |
#endif
|
|
Packit |
875988 |
#include <microhttpd.h>
|
|
Packit |
875988 |
#include <string.h>
|
|
Packit |
875988 |
#include <stdio.h>
|
|
Packit |
875988 |
#include <stdlib.h>
|
|
Packit |
875988 |
|
|
Packit |
875988 |
#define PORT 8888
|
|
Packit |
875988 |
|
|
Packit |
875988 |
#define REALM "\"Maintenance\""
|
|
Packit |
875988 |
#define USER "a legitimate user"
|
|
Packit |
875988 |
#define PASSWORD "and his password"
|
|
Packit |
875988 |
|
|
Packit |
875988 |
#define SERVERKEYFILE "server.key"
|
|
Packit |
875988 |
#define SERVERCERTFILE "server.pem"
|
|
Packit |
875988 |
|
|
Packit |
875988 |
|
|
Packit |
875988 |
static char *
|
|
Packit |
875988 |
string_to_base64 (const char *message)
|
|
Packit |
875988 |
{
|
|
Packit |
875988 |
const char *lookup =
|
|
Packit |
875988 |
"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
|
|
Packit |
875988 |
unsigned long l;
|
|
Packit |
875988 |
size_t i;
|
|
Packit |
875988 |
char *tmp;
|
|
Packit |
875988 |
size_t length = strlen (message);
|
|
Packit |
875988 |
|
|
Packit |
875988 |
tmp = malloc (length * 2);
|
|
Packit |
875988 |
if (NULL == tmp)
|
|
Packit |
875988 |
return tmp;
|
|
Packit |
875988 |
|
|
Packit |
875988 |
tmp[0] = 0;
|
|
Packit |
875988 |
|
|
Packit |
875988 |
for (i = 0; i < length; i += 3)
|
|
Packit |
875988 |
{
|
|
Packit |
875988 |
l = (((unsigned long) message[i]) << 16)
|
|
Packit |
875988 |
| (((i + 1) < length) ? (((unsigned long) message[i + 1]) << 8) : 0)
|
|
Packit |
875988 |
| (((i + 2) < length) ? ((unsigned long) message[i + 2]) : 0);
|
|
Packit |
875988 |
|
|
Packit |
875988 |
|
|
Packit |
875988 |
strncat (tmp, &lookup[(l >> 18) & 0x3F], 1);
|
|
Packit |
875988 |
strncat (tmp, &lookup[(l >> 12) & 0x3F], 1);
|
|
Packit |
875988 |
|
|
Packit |
875988 |
if (i + 1 < length)
|
|
Packit |
875988 |
strncat (tmp, &lookup[(l >> 6) & 0x3F], 1);
|
|
Packit |
875988 |
if (i + 2 < length)
|
|
Packit |
875988 |
strncat (tmp, &lookup[l & 0x3F], 1);
|
|
Packit |
875988 |
}
|
|
Packit |
875988 |
|
|
Packit |
875988 |
if (length % 3)
|
|
Packit |
875988 |
strncat (tmp, "===", 3 - length % 3);
|
|
Packit |
875988 |
|
|
Packit |
875988 |
return tmp;
|
|
Packit |
875988 |
}
|
|
Packit |
875988 |
|
|
Packit |
875988 |
|
|
Packit |
875988 |
static long
|
|
Packit |
875988 |
get_file_size (const char *filename)
|
|
Packit |
875988 |
{
|
|
Packit |
875988 |
FILE *fp;
|
|
Packit |
875988 |
|
|
Packit |
875988 |
fp = fopen (filename, "rb");
|
|
Packit |
875988 |
if (fp)
|
|
Packit |
875988 |
{
|
|
Packit |
875988 |
long size;
|
|
Packit |
875988 |
|
|
Packit |
875988 |
if ((0 != fseek (fp, 0, SEEK_END)) || (-1 == (size = ftell (fp))))
|
|
Packit |
875988 |
size = 0;
|
|
Packit |
875988 |
|
|
Packit |
875988 |
fclose (fp);
|
|
Packit |
875988 |
|
|
Packit |
875988 |
return size;
|
|
Packit |
875988 |
}
|
|
Packit |
875988 |
else
|
|
Packit |
875988 |
return 0;
|
|
Packit |
875988 |
}
|
|
Packit |
875988 |
|
|
Packit |
875988 |
|
|
Packit |
875988 |
static char *
|
|
Packit |
875988 |
load_file (const char *filename)
|
|
Packit |
875988 |
{
|
|
Packit |
875988 |
FILE *fp;
|
|
Packit |
875988 |
char *buffer;
|
|
Packit |
875988 |
long size;
|
|
Packit |
875988 |
|
|
Packit |
875988 |
size = get_file_size (filename);
|
|
Packit |
875988 |
if (0 == size)
|
|
Packit |
875988 |
return NULL;
|
|
Packit |
875988 |
|
|
Packit |
875988 |
fp = fopen (filename, "rb");
|
|
Packit |
875988 |
if (! fp)
|
|
Packit |
875988 |
return NULL;
|
|
Packit |
875988 |
|
|
Packit |
875988 |
buffer = malloc (size + 1);
|
|
Packit |
875988 |
if (! buffer)
|
|
Packit |
875988 |
{
|
|
Packit |
875988 |
fclose (fp);
|
|
Packit |
875988 |
return NULL;
|
|
Packit |
875988 |
}
|
|
Packit |
875988 |
buffer[size] = '\0';
|
|
Packit |
875988 |
|
|
Packit |
875988 |
if (size != (long)fread (buffer, 1, size, fp))
|
|
Packit |
875988 |
{
|
|
Packit |
875988 |
free (buffer);
|
|
Packit |
875988 |
buffer = NULL;
|
|
Packit |
875988 |
}
|
|
Packit |
875988 |
|
|
Packit |
875988 |
fclose (fp);
|
|
Packit |
875988 |
return buffer;
|
|
Packit |
875988 |
}
|
|
Packit |
875988 |
|
|
Packit |
875988 |
|
|
Packit |
875988 |
static int
|
|
Packit |
875988 |
ask_for_authentication (struct MHD_Connection *connection, const char *realm)
|
|
Packit |
875988 |
{
|
|
Packit |
875988 |
int ret;
|
|
Packit |
875988 |
struct MHD_Response *response;
|
|
Packit |
875988 |
char *headervalue;
|
|
Packit |
875988 |
const char *strbase = "Basic realm=";
|
|
Packit |
875988 |
|
|
Packit |
875988 |
response = MHD_create_response_from_buffer (0, NULL,
|
|
Packit |
875988 |
MHD_RESPMEM_PERSISTENT);
|
|
Packit |
875988 |
if (!response)
|
|
Packit |
875988 |
return MHD_NO;
|
|
Packit |
875988 |
|
|
Packit |
875988 |
headervalue = malloc (strlen (strbase) + strlen (realm) + 1);
|
|
Packit |
875988 |
if (!headervalue)
|
|
Packit |
875988 |
return MHD_NO;
|
|
Packit |
875988 |
|
|
Packit |
875988 |
strcpy (headervalue, strbase);
|
|
Packit |
875988 |
strcat (headervalue, realm);
|
|
Packit |
875988 |
|
|
Packit |
875988 |
ret = MHD_add_response_header (response, "WWW-Authenticate", headervalue);
|
|
Packit |
875988 |
free (headervalue);
|
|
Packit |
875988 |
if (!ret)
|
|
Packit |
875988 |
{
|
|
Packit |
875988 |
MHD_destroy_response (response);
|
|
Packit |
875988 |
return MHD_NO;
|
|
Packit |
875988 |
}
|
|
Packit |
875988 |
|
|
Packit |
875988 |
ret = MHD_queue_response (connection, MHD_HTTP_UNAUTHORIZED, response);
|
|
Packit |
875988 |
|
|
Packit |
875988 |
MHD_destroy_response (response);
|
|
Packit |
875988 |
|
|
Packit |
875988 |
return ret;
|
|
Packit |
875988 |
}
|
|
Packit |
875988 |
|
|
Packit |
875988 |
static int
|
|
Packit |
875988 |
is_authenticated (struct MHD_Connection *connection,
|
|
Packit |
875988 |
const char *username, const char *password)
|
|
Packit |
875988 |
{
|
|
Packit |
875988 |
const char *headervalue;
|
|
Packit |
875988 |
char *expected_b64, *expected;
|
|
Packit |
875988 |
const char *strbase = "Basic ";
|
|
Packit |
875988 |
int authenticated;
|
|
Packit |
875988 |
|
|
Packit |
875988 |
headervalue =
|
|
Packit |
875988 |
MHD_lookup_connection_value (connection, MHD_HEADER_KIND,
|
|
Packit |
875988 |
"Authorization");
|
|
Packit |
875988 |
if (NULL == headervalue)
|
|
Packit |
875988 |
return 0;
|
|
Packit |
875988 |
if (0 != strncmp (headervalue, strbase, strlen (strbase)))
|
|
Packit |
875988 |
return 0;
|
|
Packit |
875988 |
|
|
Packit |
875988 |
expected = malloc (strlen (username) + 1 + strlen (password) + 1);
|
|
Packit |
875988 |
if (NULL == expected)
|
|
Packit |
875988 |
return 0;
|
|
Packit |
875988 |
|
|
Packit |
875988 |
strcpy (expected, username);
|
|
Packit |
875988 |
strcat (expected, ":");
|
|
Packit |
875988 |
strcat (expected, password);
|
|
Packit |
875988 |
|
|
Packit |
875988 |
expected_b64 = string_to_base64 (expected);
|
|
Packit |
875988 |
free (expected);
|
|
Packit |
875988 |
if (NULL == expected_b64)
|
|
Packit |
875988 |
return 0;
|
|
Packit |
875988 |
|
|
Packit |
875988 |
authenticated =
|
|
Packit |
875988 |
(strcmp (headervalue + strlen (strbase), expected_b64) == 0);
|
|
Packit |
875988 |
|
|
Packit |
875988 |
free (expected_b64);
|
|
Packit |
875988 |
|
|
Packit |
875988 |
return authenticated;
|
|
Packit |
875988 |
}
|
|
Packit |
875988 |
|
|
Packit |
875988 |
|
|
Packit |
875988 |
static int
|
|
Packit |
875988 |
secret_page (struct MHD_Connection *connection)
|
|
Packit |
875988 |
{
|
|
Packit |
875988 |
int ret;
|
|
Packit |
875988 |
struct MHD_Response *response;
|
|
Packit |
875988 |
const char *page = "<html><body>A secret.</body></html>";
|
|
Packit |
875988 |
|
|
Packit |
875988 |
response =
|
|
Packit |
875988 |
MHD_create_response_from_buffer (strlen (page), (void *) page,
|
|
Packit |
875988 |
MHD_RESPMEM_PERSISTENT);
|
|
Packit |
875988 |
if (!response)
|
|
Packit |
875988 |
return MHD_NO;
|
|
Packit |
875988 |
|
|
Packit |
875988 |
ret = MHD_queue_response (connection, MHD_HTTP_OK, response);
|
|
Packit |
875988 |
MHD_destroy_response (response);
|
|
Packit |
875988 |
|
|
Packit |
875988 |
return ret;
|
|
Packit |
875988 |
}
|
|
Packit |
875988 |
|
|
Packit |
875988 |
|
|
Packit |
875988 |
static int
|
|
Packit |
875988 |
answer_to_connection (void *cls, struct MHD_Connection *connection,
|
|
Packit |
875988 |
const char *url, const char *method,
|
|
Packit |
875988 |
const char *version, const char *upload_data,
|
|
Packit |
875988 |
size_t *upload_data_size, void **con_cls)
|
|
Packit |
875988 |
{
|
|
Packit |
875988 |
(void)cls; /* Unused. Silent compiler warning. */
|
|
Packit |
875988 |
(void)url; /* Unused. Silent compiler warning. */
|
|
Packit |
875988 |
(void)version; /* Unused. Silent compiler warning. */
|
|
Packit |
875988 |
(void)upload_data; /* Unused. Silent compiler warning. */
|
|
Packit |
875988 |
(void)upload_data_size; /* Unused. Silent compiler warning. */
|
|
Packit |
875988 |
|
|
Packit |
875988 |
if (0 != strcmp (method, "GET"))
|
|
Packit |
875988 |
return MHD_NO;
|
|
Packit |
875988 |
if (NULL == *con_cls)
|
|
Packit |
875988 |
{
|
|
Packit |
875988 |
*con_cls = connection;
|
|
Packit |
875988 |
return MHD_YES;
|
|
Packit |
875988 |
}
|
|
Packit |
875988 |
|
|
Packit |
875988 |
if (!is_authenticated (connection, USER, PASSWORD))
|
|
Packit |
875988 |
return ask_for_authentication (connection, REALM);
|
|
Packit |
875988 |
|
|
Packit |
875988 |
return secret_page (connection);
|
|
Packit |
875988 |
}
|
|
Packit |
875988 |
|
|
Packit |
875988 |
|
|
Packit |
875988 |
int
|
|
Packit |
875988 |
main ()
|
|
Packit |
875988 |
{
|
|
Packit |
875988 |
struct MHD_Daemon *daemon;
|
|
Packit |
875988 |
char *key_pem;
|
|
Packit |
875988 |
char *cert_pem;
|
|
Packit |
875988 |
|
|
Packit |
875988 |
key_pem = load_file (SERVERKEYFILE);
|
|
Packit |
875988 |
cert_pem = load_file (SERVERCERTFILE);
|
|
Packit |
875988 |
|
|
Packit |
875988 |
if ((key_pem == NULL) || (cert_pem == NULL))
|
|
Packit |
875988 |
{
|
|
Packit |
875988 |
printf ("The key/certificate files could not be read.\n");
|
|
Packit |
875988 |
if (NULL != key_pem)
|
|
Packit |
875988 |
free (key_pem);
|
|
Packit |
875988 |
if (NULL != cert_pem)
|
|
Packit |
875988 |
free (cert_pem);
|
|
Packit |
875988 |
return 1;
|
|
Packit |
875988 |
}
|
|
Packit |
875988 |
|
|
Packit |
875988 |
daemon =
|
|
Packit |
875988 |
MHD_start_daemon (MHD_USE_INTERNAL_POLLING_THREAD | MHD_USE_TLS, PORT, NULL,
|
|
Packit |
875988 |
NULL, &answer_to_connection, NULL,
|
|
Packit |
875988 |
MHD_OPTION_HTTPS_MEM_KEY, key_pem,
|
|
Packit |
875988 |
MHD_OPTION_HTTPS_MEM_CERT, cert_pem, MHD_OPTION_END);
|
|
Packit |
875988 |
if (NULL == daemon)
|
|
Packit |
875988 |
{
|
|
Packit |
875988 |
printf ("%s\n", cert_pem);
|
|
Packit |
875988 |
|
|
Packit |
875988 |
free (key_pem);
|
|
Packit |
875988 |
free (cert_pem);
|
|
Packit |
875988 |
|
|
Packit |
875988 |
return 1;
|
|
Packit |
875988 |
}
|
|
Packit |
875988 |
|
|
Packit |
875988 |
(void) getchar ();
|
|
Packit |
875988 |
|
|
Packit |
875988 |
MHD_stop_daemon (daemon);
|
|
Packit |
875988 |
free (key_pem);
|
|
Packit |
875988 |
free (cert_pem);
|
|
Packit |
875988 |
|
|
Packit |
875988 |
return 0;
|
|
Packit |
875988 |
}
|