/* server-tls-threaded.c * * Copyright (C) 2006-2015 wolfSSL Inc. * * This file is part of wolfSSL. (formerly known as CyaSSL) * * wolfSSL is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * wolfSSL is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA *============================================================================= * * This is a super basic example of what a TCP Server secured with TLS 1.2 * might look like. This server can also resume the session if a client * inadvertantly disconnects. */ #include #include #include #include #include #include #include #include #include /* Include the wolfSSL library for our TLS 1.2 security */ #include #define DEFAULT_PORT 11111 int AcceptAndRead(socklen_t sockfd, struct sockaddr_in clientAddr); void *ThreadHandler(void* socketDesc); /* Create a ctx pointer for our ssl */ WOLFSSL_CTX* ctx; void *ThreadHandler(void* socketDesc) { int connd = *(int*)socketDesc; WOLFSSL* ssl; /* Create our reply message */ const char reply[] = "I hear ya fa shizzle!\n"; printf("Client connected successfully\n"); if ( (ssl = wolfSSL_new(ctx)) == NULL) { fprintf(stderr, "wolfSSL_new error.\n"); exit(EXIT_FAILURE); } /* Direct our ssl to our clients connection */ wolfSSL_set_fd(ssl, connd); for ( ; ; ) { char buff[256]; int ret = 0; /* Clear the buffer memory for anything possibly left over */ memset(&buff, 0, sizeof(buff)); /* Read the client data into our buff array */ if ((ret = wolfSSL_read(ssl, buff, sizeof(buff)-1)) > 0) { /* Print any data the client sends to the console */ printf("Client on Socket %d: %s\n", connd, buff); /* Reply back to the client */ if ((ret = wolfSSL_write(ssl, reply, sizeof(reply)-1)) < 0) { printf("wolfSSL_write error = %d\n", wolfSSL_get_error(ssl, ret)); } } /* if the client disconnects break the loop */ else { if (ret < 0) printf("wolfSSL_read error = %d\n", wolfSSL_get_error(ssl ,ret)); else if (ret == 0) printf("The client has closed the connection.\n"); wolfSSL_free(ssl); /* Free the WOLFSSL object */ close(connd); /* close the connected socket */ break; } } exit(EXIT_SUCCESS); } int AcceptAndRead(socklen_t sockfd, struct sockaddr_in clientAddr) { socklen_t size = sizeof(clientAddr); int connd; /* Identify and access the clients connection */ pthread_t thread_id; /* Wait until a client connects */ while ((connd = accept(sockfd, (struct sockaddr *)&clientAddr, &size))) { /* Pass the client into a new thread */ if (pthread_create(&thread_id, NULL, ThreadHandler, (void *) &connd) < 0) { perror("could not create thread"); } printf("Handler assigned\n"); } if (connd < 0) { perror("accept failed"); } return 0; } int main() { /* * Creates a socket that uses an internet IP address, * Sets the type to be Stream based (TCP), * 0 means choose the default protocol. */ socklen_t sockfd = socket(AF_INET, SOCK_STREAM, 0); int ret = 0; /* Return Variable */ int loopExit = 0; /* 0 = False, 1 = True */ /* Server and Client socket address structures */ struct sockaddr_in serverAddr, clientAddr; /* Initialize the server address struct to zero */ memset((char *)&serverAddr, 0, sizeof(serverAddr)); /* Fill the server's address family */ serverAddr.sin_family = AF_INET; serverAddr.sin_addr.s_addr = INADDR_ANY; serverAddr.sin_port = htons(DEFAULT_PORT); /* initialize wolfSSL */ wolfSSL_Init(); /* If positive value, the socket is valid */ if (sockfd == -1) { printf("ERROR: failed to create the socket\n"); return EXIT_FAILURE; } /* Create and initialize WOLFSSL_CTX structure */ if ((ctx = wolfSSL_CTX_new(wolfTLSv1_2_server_method())) == NULL) { fprintf(stderr, "wolfSSL_CTX_new error.\n"); return EXIT_FAILURE; } /* Load server certificate into WOLFSSL_CTX */ if (wolfSSL_CTX_use_certificate_file(ctx, "../certs/server-cert.pem", SSL_FILETYPE_PEM) != SSL_SUCCESS) { fprintf(stderr, "Error loading certs/server-cert.pem, please check" "the file.\n"); return EXIT_FAILURE; } /* Load server key into WOLFSSL_CTX */ if (wolfSSL_CTX_use_PrivateKey_file(ctx, "../certs/server-key.pem", SSL_FILETYPE_PEM) != SSL_SUCCESS) { fprintf(stderr, "Error loading certs/server-key.pem, please check" "the file.\n"); return EXIT_FAILURE; } /* Attach the server socket to our port */ if (bind(sockfd, (struct sockaddr *)&serverAddr, sizeof(serverAddr)) < 0) { printf("ERROR: failed to bind\n"); return EXIT_FAILURE; } printf("Waiting for a connection...\n"); /* Continuously accept connects while not currently in an active connection or told to quit */ while (loopExit == 0) { /* Listen for a new connection, allow 5 pending connections */ ret = listen(sockfd, 5); if (ret == 0) { /* Accept client connections and read from them */ loopExit = AcceptAndRead(sockfd, clientAddr); } } wolfSSL_CTX_free(ctx); /* Free WOLFSSL_CTX */ wolfSSL_Cleanup(); /* Free wolfSSL */ return EXIT_SUCCESS; }