• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  *  SSL server demonstration program using pthread for handling multiple
3  *  clients.
4  *
5  *  Copyright The Mbed TLS Contributors
6  *  SPDX-License-Identifier: Apache-2.0
7  *
8  *  Licensed under the Apache License, Version 2.0 (the "License"); you may
9  *  not use this file except in compliance with the License.
10  *  You may obtain a copy of the License at
11  *
12  *  http://www.apache.org/licenses/LICENSE-2.0
13  *
14  *  Unless required by applicable law or agreed to in writing, software
15  *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16  *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17  *  See the License for the specific language governing permissions and
18  *  limitations under the License.
19  */
20 
21 #include "mbedtls/build_info.h"
22 
23 #include "mbedtls/platform.h"
24 
25 #if !defined(MBEDTLS_BIGNUM_C)  || !defined(MBEDTLS_ENTROPY_C) ||         \
26     !defined(MBEDTLS_SSL_TLS_C) || !defined(MBEDTLS_SSL_SRV_C) ||         \
27     !defined(MBEDTLS_NET_C) || !defined(MBEDTLS_RSA_C) ||                 \
28     !defined(MBEDTLS_CTR_DRBG_C) || !defined(MBEDTLS_X509_CRT_PARSE_C) || \
29     !defined(MBEDTLS_FS_IO) || !defined(MBEDTLS_THREADING_C) ||           \
30     !defined(MBEDTLS_THREADING_PTHREAD) || !defined(MBEDTLS_PEM_PARSE_C)
main(void)31 int main( void )
32 {
33     mbedtls_printf("MBEDTLS_BIGNUM_C and/or MBEDTLS_ENTROPY_C "
34            "and/or MBEDTLS_SSL_TLS_C and/or MBEDTLS_SSL_SRV_C and/or "
35            "MBEDTLS_NET_C and/or MBEDTLS_RSA_C and/or "
36            "MBEDTLS_CTR_DRBG_C and/or MBEDTLS_X509_CRT_PARSE_C and/or "
37            "MBEDTLS_THREADING_C and/or MBEDTLS_THREADING_PTHREAD "
38            "and/or MBEDTLS_PEM_PARSE_C not defined.\n");
39     mbedtls_exit( 0 );
40 }
41 #else
42 
43 #include <stdlib.h>
44 #include <string.h>
45 
46 #if defined(_WIN32)
47 #include <windows.h>
48 #endif
49 
50 #include "mbedtls/entropy.h"
51 #include "mbedtls/ctr_drbg.h"
52 #include "mbedtls/x509.h"
53 #include "mbedtls/ssl.h"
54 #include "mbedtls/net_sockets.h"
55 #include "mbedtls/error.h"
56 #include "test/certs.h"
57 
58 #if defined(MBEDTLS_SSL_CACHE_C)
59 #include "mbedtls/ssl_cache.h"
60 #endif
61 
62 #if defined(MBEDTLS_MEMORY_BUFFER_ALLOC_C)
63 #include "mbedtls/memory_buffer_alloc.h"
64 #endif
65 
66 
67 #define HTTP_RESPONSE \
68     "HTTP/1.0 200 OK\r\nContent-Type: text/html\r\n\r\n" \
69     "<h2>mbed TLS Test Server</h2>\r\n" \
70     "<p>Successful connection using: %s</p>\r\n"
71 
72 #define DEBUG_LEVEL 0
73 
74 #define MAX_NUM_THREADS 5
75 
76 mbedtls_threading_mutex_t debug_mutex;
77 
my_mutexed_debug(void * ctx,int level,const char * file,int line,const char * str)78 static void my_mutexed_debug( void *ctx, int level,
79                       const char *file, int line,
80                       const char *str )
81 {
82     long int thread_id = (long int) pthread_self();
83 
84     mbedtls_mutex_lock( &debug_mutex );
85 
86     ((void) level);
87     mbedtls_fprintf( (FILE *) ctx, "%s:%04d: [ #%ld ] %s",
88                                     file, line, thread_id, str );
89     fflush(  (FILE *) ctx  );
90 
91     mbedtls_mutex_unlock( &debug_mutex );
92 }
93 
94 typedef struct {
95     mbedtls_net_context client_fd;
96     int thread_complete;
97     const mbedtls_ssl_config *config;
98 } thread_info_t;
99 
100 typedef struct {
101     int active;
102     thread_info_t   data;
103     pthread_t       thread;
104 } pthread_info_t;
105 
106 static thread_info_t    base_info;
107 static pthread_info_t   threads[MAX_NUM_THREADS];
108 
handle_ssl_connection(void * data)109 static void *handle_ssl_connection( void *data )
110 {
111     int ret, len;
112     thread_info_t *thread_info = (thread_info_t *) data;
113     mbedtls_net_context *client_fd = &thread_info->client_fd;
114     long int thread_id = (long int) pthread_self();
115     unsigned char buf[1024];
116     mbedtls_ssl_context ssl;
117 
118     /* Make sure memory references are valid */
119     mbedtls_ssl_init( &ssl );
120 
121     mbedtls_printf( "  [ #%ld ]  Setting up SSL/TLS data\n", thread_id );
122 
123     /*
124      * 4. Get the SSL context ready
125      */
126     if( ( ret = mbedtls_ssl_setup( &ssl, thread_info->config ) ) != 0 )
127     {
128         mbedtls_printf( "  [ #%ld ]  failed: mbedtls_ssl_setup returned -0x%04x\n",
129                 thread_id, ( unsigned int ) -ret );
130         goto thread_exit;
131     }
132 
133     mbedtls_ssl_set_bio( &ssl, client_fd, mbedtls_net_send, mbedtls_net_recv, NULL );
134 
135     /*
136      * 5. Handshake
137      */
138     mbedtls_printf( "  [ #%ld ]  Performing the SSL/TLS handshake\n", thread_id );
139 
140     while( ( ret = mbedtls_ssl_handshake( &ssl ) ) != 0 )
141     {
142         if( ret != MBEDTLS_ERR_SSL_WANT_READ && ret != MBEDTLS_ERR_SSL_WANT_WRITE )
143         {
144             mbedtls_printf( "  [ #%ld ]  failed: mbedtls_ssl_handshake returned -0x%04x\n",
145                     thread_id, ( unsigned int ) -ret );
146             goto thread_exit;
147         }
148     }
149 
150     mbedtls_printf( "  [ #%ld ]  ok\n", thread_id );
151 
152     /*
153      * 6. Read the HTTP Request
154      */
155     mbedtls_printf( "  [ #%ld ]  < Read from client\n", thread_id );
156 
157     do
158     {
159         len = sizeof( buf ) - 1;
160         memset( buf, 0, sizeof( buf ) );
161         ret = mbedtls_ssl_read( &ssl, buf, len );
162 
163         if( ret == MBEDTLS_ERR_SSL_WANT_READ || ret == MBEDTLS_ERR_SSL_WANT_WRITE )
164             continue;
165 
166         if( ret <= 0 )
167         {
168             switch( ret )
169             {
170                 case MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY:
171                     mbedtls_printf( "  [ #%ld ]  connection was closed gracefully\n",
172                             thread_id );
173                     goto thread_exit;
174 
175                 case MBEDTLS_ERR_NET_CONN_RESET:
176                     mbedtls_printf( "  [ #%ld ]  connection was reset by peer\n",
177                             thread_id );
178                     goto thread_exit;
179 
180                 default:
181                     mbedtls_printf( "  [ #%ld ]  mbedtls_ssl_read returned -0x%04x\n",
182                             thread_id, ( unsigned int ) -ret );
183                     goto thread_exit;
184             }
185         }
186 
187         len = ret;
188         mbedtls_printf( "  [ #%ld ]  %d bytes read\n=====\n%s\n=====\n",
189                 thread_id, len, (char *) buf );
190 
191         if( ret > 0 )
192             break;
193     }
194     while( 1 );
195 
196     /*
197      * 7. Write the 200 Response
198      */
199     mbedtls_printf( "  [ #%ld ]  > Write to client:\n", thread_id );
200 
201     len = sprintf( (char *) buf, HTTP_RESPONSE,
202                    mbedtls_ssl_get_ciphersuite( &ssl ) );
203 
204     while( ( ret = mbedtls_ssl_write( &ssl, buf, len ) ) <= 0 )
205     {
206         if( ret == MBEDTLS_ERR_NET_CONN_RESET )
207         {
208             mbedtls_printf( "  [ #%ld ]  failed: peer closed the connection\n",
209                     thread_id );
210             goto thread_exit;
211         }
212 
213         if( ret != MBEDTLS_ERR_SSL_WANT_READ && ret != MBEDTLS_ERR_SSL_WANT_WRITE )
214         {
215             mbedtls_printf( "  [ #%ld ]  failed: mbedtls_ssl_write returned -0x%04x\n",
216                     thread_id, ( unsigned int ) ret );
217             goto thread_exit;
218         }
219     }
220 
221     len = ret;
222     mbedtls_printf( "  [ #%ld ]  %d bytes written\n=====\n%s\n=====\n",
223             thread_id, len, (char *) buf );
224 
225     mbedtls_printf( "  [ #%ld ]  . Closing the connection...", thread_id );
226 
227     while( ( ret = mbedtls_ssl_close_notify( &ssl ) ) < 0 )
228     {
229         if( ret != MBEDTLS_ERR_SSL_WANT_READ &&
230             ret != MBEDTLS_ERR_SSL_WANT_WRITE )
231         {
232             mbedtls_printf( "  [ #%ld ]  failed: mbedtls_ssl_close_notify returned -0x%04x\n",
233                     thread_id, ( unsigned int ) ret );
234             goto thread_exit;
235         }
236     }
237 
238     mbedtls_printf( " ok\n" );
239 
240     ret = 0;
241 
242 thread_exit:
243 
244 #ifdef MBEDTLS_ERROR_C
245     if( ret != 0 )
246     {
247         char error_buf[100];
248         mbedtls_strerror( ret, error_buf, 100 );
249         mbedtls_printf("  [ #%ld ]  Last error was: -0x%04x - %s\n\n",
250                thread_id, ( unsigned int ) -ret, error_buf );
251     }
252 #endif
253 
254     mbedtls_net_free( client_fd );
255     mbedtls_ssl_free( &ssl );
256 
257     thread_info->thread_complete = 1;
258 
259     return( NULL );
260 }
261 
thread_create(mbedtls_net_context * client_fd)262 static int thread_create( mbedtls_net_context *client_fd )
263 {
264     int ret, i;
265 
266     /*
267      * Find in-active or finished thread slot
268      */
269     for( i = 0; i < MAX_NUM_THREADS; i++ )
270     {
271         if( threads[i].active == 0 )
272             break;
273 
274         if( threads[i].data.thread_complete == 1 )
275         {
276             mbedtls_printf( "  [ main ]  Cleaning up thread %d\n", i );
277             pthread_join(threads[i].thread, NULL );
278             memset( &threads[i], 0, sizeof(pthread_info_t) );
279             break;
280         }
281     }
282 
283     if( i == MAX_NUM_THREADS )
284         return( -1 );
285 
286     /*
287      * Fill thread-info for thread
288      */
289     memcpy( &threads[i].data, &base_info, sizeof(base_info) );
290     threads[i].active = 1;
291     memcpy( &threads[i].data.client_fd, client_fd, sizeof( mbedtls_net_context ) );
292 
293     if( ( ret = pthread_create( &threads[i].thread, NULL, handle_ssl_connection,
294                                 &threads[i].data ) ) != 0 )
295     {
296         return( ret );
297     }
298 
299     return( 0 );
300 }
301 
main(void)302 int main( void )
303 {
304     int ret;
305     mbedtls_net_context listen_fd, client_fd;
306     const char pers[] = "ssl_pthread_server";
307 
308     mbedtls_entropy_context entropy;
309     mbedtls_ctr_drbg_context ctr_drbg;
310     mbedtls_ssl_config conf;
311     mbedtls_x509_crt srvcert;
312     mbedtls_x509_crt cachain;
313     mbedtls_pk_context pkey;
314 #if defined(MBEDTLS_MEMORY_BUFFER_ALLOC_C)
315     unsigned char alloc_buf[100000];
316 #endif
317 #if defined(MBEDTLS_SSL_CACHE_C)
318     mbedtls_ssl_cache_context cache;
319 #endif
320 
321 #if defined(MBEDTLS_MEMORY_BUFFER_ALLOC_C)
322     mbedtls_memory_buffer_alloc_init( alloc_buf, sizeof(alloc_buf) );
323 #endif
324 
325 #if defined(MBEDTLS_SSL_CACHE_C)
326     mbedtls_ssl_cache_init( &cache );
327 #endif
328 
329     mbedtls_x509_crt_init( &srvcert );
330     mbedtls_x509_crt_init( &cachain );
331 
332     mbedtls_ssl_config_init( &conf );
333     mbedtls_ctr_drbg_init( &ctr_drbg );
334     memset( threads, 0, sizeof(threads) );
335     mbedtls_net_init( &listen_fd );
336     mbedtls_net_init( &client_fd );
337 
338     mbedtls_mutex_init( &debug_mutex );
339 
340     base_info.config = &conf;
341 
342     /*
343      * We use only a single entropy source that is used in all the threads.
344      */
345     mbedtls_entropy_init( &entropy );
346 
347     /*
348      * 1a. Seed the random number generator
349      */
350     mbedtls_printf( "  . Seeding the random number generator..." );
351 
352     if( ( ret = mbedtls_ctr_drbg_seed( &ctr_drbg, mbedtls_entropy_func, &entropy,
353                                (const unsigned char *) pers,
354                                strlen( pers ) ) ) != 0 )
355     {
356         mbedtls_printf( " failed: mbedtls_ctr_drbg_seed returned -0x%04x\n",
357                 ( unsigned int ) -ret );
358         goto exit;
359     }
360 
361     mbedtls_printf( " ok\n" );
362 
363     /*
364      * 1b. Load the certificates and private RSA key
365      */
366     mbedtls_printf( "\n  . Loading the server cert. and key..." );
367     fflush( stdout );
368 
369     /*
370      * This demonstration program uses embedded test certificates.
371      * Instead, you may want to use mbedtls_x509_crt_parse_file() to read the
372      * server and CA certificates, as well as mbedtls_pk_parse_keyfile().
373      */
374     ret = mbedtls_x509_crt_parse( &srvcert, (const unsigned char *) mbedtls_test_srv_crt,
375                           mbedtls_test_srv_crt_len );
376     if( ret != 0 )
377     {
378         mbedtls_printf( " failed\n  !  mbedtls_x509_crt_parse returned %d\n\n", ret );
379         goto exit;
380     }
381 
382     ret = mbedtls_x509_crt_parse( &cachain, (const unsigned char *) mbedtls_test_cas_pem,
383                           mbedtls_test_cas_pem_len );
384     if( ret != 0 )
385     {
386         mbedtls_printf( " failed\n  !  mbedtls_x509_crt_parse returned %d\n\n", ret );
387         goto exit;
388     }
389 
390     mbedtls_pk_init( &pkey );
391     ret =  mbedtls_pk_parse_key( &pkey, (const unsigned char *) mbedtls_test_srv_key,
392                          mbedtls_test_srv_key_len, NULL, 0,
393                          mbedtls_ctr_drbg_random, &ctr_drbg );
394     if( ret != 0 )
395     {
396         mbedtls_printf( " failed\n  !  mbedtls_pk_parse_key returned %d\n\n", ret );
397         goto exit;
398     }
399 
400     mbedtls_printf( " ok\n" );
401 
402     /*
403      * 1c. Prepare SSL configuration
404      */
405     mbedtls_printf( "  . Setting up the SSL data...." );
406 
407     if( ( ret = mbedtls_ssl_config_defaults( &conf,
408                     MBEDTLS_SSL_IS_SERVER,
409                     MBEDTLS_SSL_TRANSPORT_STREAM,
410                     MBEDTLS_SSL_PRESET_DEFAULT ) ) != 0 )
411     {
412         mbedtls_printf( " failed: mbedtls_ssl_config_defaults returned -0x%04x\n",
413                 ( unsigned int ) -ret );
414         goto exit;
415     }
416 
417     mbedtls_ssl_conf_rng( &conf, mbedtls_ctr_drbg_random, &ctr_drbg );
418     mbedtls_ssl_conf_dbg( &conf, my_mutexed_debug, stdout );
419 
420     /* mbedtls_ssl_cache_get() and mbedtls_ssl_cache_set() are thread-safe if
421      * MBEDTLS_THREADING_C is set.
422      */
423 #if defined(MBEDTLS_SSL_CACHE_C)
424     mbedtls_ssl_conf_session_cache( &conf, &cache,
425                                    mbedtls_ssl_cache_get,
426                                    mbedtls_ssl_cache_set );
427 #endif
428 
429     mbedtls_ssl_conf_ca_chain( &conf, &cachain, NULL );
430     if( ( ret = mbedtls_ssl_conf_own_cert( &conf, &srvcert, &pkey ) ) != 0 )
431     {
432         mbedtls_printf( " failed\n  ! mbedtls_ssl_conf_own_cert returned %d\n\n", ret );
433         goto exit;
434     }
435 
436     mbedtls_printf( " ok\n" );
437 
438     /*
439      * 2. Setup the listening TCP socket
440      */
441     mbedtls_printf( "  . Bind on https://localhost:4433/ ..." );
442     fflush( stdout );
443 
444     if( ( ret = mbedtls_net_bind( &listen_fd, NULL, "4433", MBEDTLS_NET_PROTO_TCP ) ) != 0 )
445     {
446         mbedtls_printf( " failed\n  ! mbedtls_net_bind returned %d\n\n", ret );
447         goto exit;
448     }
449 
450     mbedtls_printf( " ok\n" );
451 
452 reset:
453 #ifdef MBEDTLS_ERROR_C
454     if( ret != 0 )
455     {
456         char error_buf[100];
457         mbedtls_strerror( ret, error_buf, 100 );
458         mbedtls_printf( "  [ main ]  Last error was: -0x%04x - %s\n", ( unsigned int ) -ret,
459                         error_buf );
460     }
461 #endif
462 
463     /*
464      * 3. Wait until a client connects
465      */
466     mbedtls_printf( "  [ main ]  Waiting for a remote connection\n" );
467 
468     if( ( ret = mbedtls_net_accept( &listen_fd, &client_fd,
469                                     NULL, 0, NULL ) ) != 0 )
470     {
471         mbedtls_printf( "  [ main ] failed: mbedtls_net_accept returned -0x%04x\n",
472                         ( unsigned int ) ret );
473         goto exit;
474     }
475 
476     mbedtls_printf( "  [ main ]  ok\n" );
477     mbedtls_printf( "  [ main ]  Creating a new thread\n" );
478 
479     if( ( ret = thread_create( &client_fd ) ) != 0 )
480     {
481         mbedtls_printf( "  [ main ]  failed: thread_create returned %d\n", ret );
482         mbedtls_net_free( &client_fd );
483         goto reset;
484     }
485 
486     ret = 0;
487     goto reset;
488 
489 exit:
490     mbedtls_x509_crt_free( &srvcert );
491     mbedtls_pk_free( &pkey );
492 #if defined(MBEDTLS_SSL_CACHE_C)
493     mbedtls_ssl_cache_free( &cache );
494 #endif
495     mbedtls_ctr_drbg_free( &ctr_drbg );
496     mbedtls_entropy_free( &entropy );
497     mbedtls_ssl_config_free( &conf );
498 
499     mbedtls_net_free( &listen_fd );
500 
501     mbedtls_mutex_free( &debug_mutex );
502 
503 #if defined(MBEDTLS_MEMORY_BUFFER_ALLOC_C)
504     mbedtls_memory_buffer_alloc_free();
505 #endif
506 
507     mbedtls_exit( ret );
508 }
509 
510 #endif /* MBEDTLS_BIGNUM_C && MBEDTLS_ENTROPY_C &&
511           MBEDTLS_SSL_TLS_C && MBEDTLS_SSL_SRV_C && MBEDTLS_NET_C &&
512           MBEDTLS_RSA_C && MBEDTLS_CTR_DRBG_C && MBEDTLS_THREADING_C &&
513           MBEDTLS_THREADING_PTHREAD && MBEDTLS_PEM_PARSE_C */
514