Blame doc/examples/tlsauthentication.c

Packit 875988
/* Feel free to use this example code in any way
Packit 875988
   you see fit (Public Domain) */
Packit 875988
Packit 875988
#include <sys/types.h>
Packit 875988
#ifndef _WIN32
Packit 875988
#include <sys/select.h>
Packit 875988
#include <sys/socket.h>
Packit 875988
#else
Packit 875988
#include <winsock2.h>
Packit 875988
#endif
Packit 875988
#include <microhttpd.h>
Packit 875988
#include <string.h>
Packit 875988
#include <stdio.h>
Packit 875988
#include <stdlib.h>
Packit 875988
Packit 875988
#define PORT 8888
Packit 875988
Packit 875988
#define REALM     "\"Maintenance\""
Packit 875988
#define USER      "a legitimate user"
Packit 875988
#define PASSWORD  "and his password"
Packit 875988
Packit 875988
#define SERVERKEYFILE "server.key"
Packit 875988
#define SERVERCERTFILE "server.pem"
Packit 875988
Packit 875988
Packit 875988
static char *
Packit 875988
string_to_base64 (const char *message)
Packit 875988
{
Packit 875988
  const char *lookup =
Packit 875988
    "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
Packit 875988
  unsigned long l;
Packit 875988
  size_t i;
Packit 875988
  char *tmp;
Packit 875988
  size_t length = strlen (message);
Packit 875988
Packit 875988
  tmp = malloc (length * 2);
Packit 875988
  if (NULL == tmp)
Packit 875988
    return tmp;
Packit 875988
Packit 875988
  tmp[0] = 0;
Packit 875988
Packit 875988
  for (i = 0; i < length; i += 3)
Packit 875988
    {
Packit 875988
      l = (((unsigned long) message[i]) << 16)
Packit 875988
        | (((i + 1) < length) ? (((unsigned long) message[i + 1]) << 8) : 0)
Packit 875988
        | (((i + 2) < length) ? ((unsigned long) message[i + 2]) : 0);
Packit 875988
Packit 875988
Packit 875988
      strncat (tmp, &lookup[(l >> 18) & 0x3F], 1);
Packit 875988
      strncat (tmp, &lookup[(l >> 12) & 0x3F], 1);
Packit 875988
Packit 875988
      if (i + 1 < length)
Packit 875988
        strncat (tmp, &lookup[(l >> 6) & 0x3F], 1);
Packit 875988
      if (i + 2 < length)
Packit 875988
        strncat (tmp, &lookup[l & 0x3F], 1);
Packit 875988
    }
Packit 875988
Packit 875988
  if (length % 3)
Packit 875988
    strncat (tmp, "===", 3 - length % 3);
Packit 875988
Packit 875988
  return tmp;
Packit 875988
}
Packit 875988
Packit 875988
Packit 875988
static long
Packit 875988
get_file_size (const char *filename)
Packit 875988
{
Packit 875988
  FILE *fp;
Packit 875988
Packit 875988
  fp = fopen (filename, "rb");
Packit 875988
  if (fp)
Packit 875988
    {
Packit 875988
      long size;
Packit 875988
Packit 875988
      if ((0 != fseek (fp, 0, SEEK_END)) || (-1 == (size = ftell (fp))))
Packit 875988
        size = 0;
Packit 875988
Packit 875988
      fclose (fp);
Packit 875988
Packit 875988
      return size;
Packit 875988
    }
Packit 875988
  else
Packit 875988
    return 0;
Packit 875988
}
Packit 875988
Packit 875988
Packit 875988
static char *
Packit 875988
load_file (const char *filename)
Packit 875988
{
Packit 875988
  FILE *fp;
Packit 875988
  char *buffer;
Packit 875988
  long size;
Packit 875988
Packit 875988
  size = get_file_size (filename);
Packit 875988
  if (0 == size)
Packit 875988
    return NULL;
Packit 875988
Packit 875988
  fp = fopen (filename, "rb");
Packit 875988
  if (! fp)
Packit 875988
    return NULL;
Packit 875988
Packit 875988
  buffer = malloc (size + 1);
Packit 875988
  if (! buffer)
Packit 875988
    {
Packit 875988
      fclose (fp);
Packit 875988
      return NULL;
Packit 875988
    }
Packit 875988
  buffer[size] = '\0';
Packit 875988
Packit 875988
  if (size != (long)fread (buffer, 1, size, fp))
Packit 875988
    {
Packit 875988
      free (buffer);
Packit 875988
      buffer = NULL;
Packit 875988
    }
Packit 875988
Packit 875988
  fclose (fp);
Packit 875988
  return buffer;
Packit 875988
}
Packit 875988
Packit 875988
Packit 875988
static int
Packit 875988
ask_for_authentication (struct MHD_Connection *connection, const char *realm)
Packit 875988
{
Packit 875988
  int ret;
Packit 875988
  struct MHD_Response *response;
Packit 875988
  char *headervalue;
Packit 875988
  const char *strbase = "Basic realm=";
Packit 875988
Packit 875988
  response = MHD_create_response_from_buffer (0, NULL,
Packit 875988
					      MHD_RESPMEM_PERSISTENT);
Packit 875988
  if (!response)
Packit 875988
    return MHD_NO;
Packit 875988
Packit 875988
  headervalue = malloc (strlen (strbase) + strlen (realm) + 1);
Packit 875988
  if (!headervalue)
Packit 875988
    return MHD_NO;
Packit 875988
Packit 875988
  strcpy (headervalue, strbase);
Packit 875988
  strcat (headervalue, realm);
Packit 875988
Packit 875988
  ret = MHD_add_response_header (response, "WWW-Authenticate", headervalue);
Packit 875988
  free (headervalue);
Packit 875988
  if (!ret)
Packit 875988
    {
Packit 875988
      MHD_destroy_response (response);
Packit 875988
      return MHD_NO;
Packit 875988
    }
Packit 875988
Packit 875988
  ret = MHD_queue_response (connection, MHD_HTTP_UNAUTHORIZED, response);
Packit 875988
Packit 875988
  MHD_destroy_response (response);
Packit 875988
Packit 875988
  return ret;
Packit 875988
}
Packit 875988
Packit 875988
static int
Packit 875988
is_authenticated (struct MHD_Connection *connection,
Packit 875988
                  const char *username, const char *password)
Packit 875988
{
Packit 875988
  const char *headervalue;
Packit 875988
  char *expected_b64, *expected;
Packit 875988
  const char *strbase = "Basic ";
Packit 875988
  int authenticated;
Packit 875988
Packit 875988
  headervalue =
Packit 875988
    MHD_lookup_connection_value (connection, MHD_HEADER_KIND,
Packit 875988
                                 "Authorization");
Packit 875988
  if (NULL == headervalue)
Packit 875988
    return 0;
Packit 875988
  if (0 != strncmp (headervalue, strbase, strlen (strbase)))
Packit 875988
    return 0;
Packit 875988
Packit 875988
  expected = malloc (strlen (username) + 1 + strlen (password) + 1);
Packit 875988
  if (NULL == expected)
Packit 875988
    return 0;
Packit 875988
Packit 875988
  strcpy (expected, username);
Packit 875988
  strcat (expected, ":");
Packit 875988
  strcat (expected, password);
Packit 875988
Packit 875988
  expected_b64 = string_to_base64 (expected);
Packit 875988
  free (expected);
Packit 875988
  if (NULL == expected_b64)
Packit 875988
    return 0;
Packit 875988
Packit 875988
  authenticated =
Packit 875988
    (strcmp (headervalue + strlen (strbase), expected_b64) == 0);
Packit 875988
Packit 875988
  free (expected_b64);
Packit 875988
Packit 875988
  return authenticated;
Packit 875988
}
Packit 875988
Packit 875988
Packit 875988
static int
Packit 875988
secret_page (struct MHD_Connection *connection)
Packit 875988
{
Packit 875988
  int ret;
Packit 875988
  struct MHD_Response *response;
Packit 875988
  const char *page = "<html><body>A secret.</body></html>";
Packit 875988
Packit 875988
  response =
Packit 875988
    MHD_create_response_from_buffer (strlen (page), (void *) page,
Packit 875988
				     MHD_RESPMEM_PERSISTENT);
Packit 875988
  if (!response)
Packit 875988
    return MHD_NO;
Packit 875988
Packit 875988
  ret = MHD_queue_response (connection, MHD_HTTP_OK, response);
Packit 875988
  MHD_destroy_response (response);
Packit 875988
Packit 875988
  return ret;
Packit 875988
}
Packit 875988
Packit 875988
Packit 875988
static int
Packit 875988
answer_to_connection (void *cls, struct MHD_Connection *connection,
Packit 875988
                      const char *url, const char *method,
Packit 875988
                      const char *version, const char *upload_data,
Packit 875988
                      size_t *upload_data_size, void **con_cls)
Packit 875988
{
Packit 875988
  (void)cls;               /* Unused. Silent compiler warning. */
Packit 875988
  (void)url;               /* Unused. Silent compiler warning. */
Packit 875988
  (void)version;           /* Unused. Silent compiler warning. */
Packit 875988
  (void)upload_data;       /* Unused. Silent compiler warning. */
Packit 875988
  (void)upload_data_size;  /* Unused. Silent compiler warning. */
Packit 875988
Packit 875988
  if (0 != strcmp (method, "GET"))
Packit 875988
    return MHD_NO;
Packit 875988
  if (NULL == *con_cls)
Packit 875988
    {
Packit 875988
      *con_cls = connection;
Packit 875988
      return MHD_YES;
Packit 875988
    }
Packit 875988
Packit 875988
  if (!is_authenticated (connection, USER, PASSWORD))
Packit 875988
    return ask_for_authentication (connection, REALM);
Packit 875988
Packit 875988
  return secret_page (connection);
Packit 875988
}
Packit 875988
Packit 875988
Packit 875988
int
Packit 875988
main ()
Packit 875988
{
Packit 875988
  struct MHD_Daemon *daemon;
Packit 875988
  char *key_pem;
Packit 875988
  char *cert_pem;
Packit 875988
Packit 875988
  key_pem = load_file (SERVERKEYFILE);
Packit 875988
  cert_pem = load_file (SERVERCERTFILE);
Packit 875988
Packit 875988
  if ((key_pem == NULL) || (cert_pem == NULL))
Packit 875988
    {
Packit 875988
      printf ("The key/certificate files could not be read.\n");
Packit 875988
      if (NULL != key_pem)
Packit 875988
        free (key_pem);
Packit 875988
      if (NULL != cert_pem)
Packit 875988
        free (cert_pem);
Packit 875988
      return 1;
Packit 875988
    }
Packit 875988
Packit 875988
  daemon =
Packit 875988
    MHD_start_daemon (MHD_USE_INTERNAL_POLLING_THREAD | MHD_USE_TLS, PORT, NULL,
Packit 875988
                      NULL, &answer_to_connection, NULL,
Packit 875988
                      MHD_OPTION_HTTPS_MEM_KEY, key_pem,
Packit 875988
                      MHD_OPTION_HTTPS_MEM_CERT, cert_pem, MHD_OPTION_END);
Packit 875988
  if (NULL == daemon)
Packit 875988
    {
Packit 875988
      printf ("%s\n", cert_pem);
Packit 875988
Packit 875988
      free (key_pem);
Packit 875988
      free (cert_pem);
Packit 875988
Packit 875988
      return 1;
Packit 875988
    }
Packit 875988
Packit 875988
  (void) getchar ();
Packit 875988
Packit 875988
  MHD_stop_daemon (daemon);
Packit 875988
  free (key_pem);
Packit 875988
  free (cert_pem);
Packit 875988
Packit 875988
  return 0;
Packit 875988
}