• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  This file is part of libmicrohttpd
3  Copyright (C) 2007 Christian Grothoff
4 
5  libmicrohttpd is free software; you can redistribute it and/or modify
6  it under the terms of the GNU General Public License as published
7  by the Free Software Foundation; either version 2, or (at your
8  option) any later version.
9 
10  libmicrohttpd is distributed in the hope that it will be useful, but
11  WITHOUT ANY WARRANTY; without even the implied warranty of
12  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
13  General Public License for more details.
14 
15  You should have received a copy of the GNU General Public License
16  along with libmicrohttpd; see the file COPYING.  If not, write to the
17  Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18  Boston, MA 02111-1307, USA.
19  */
20 
21 /**
22  * @file mhds_multi_daemon_test.c
23  * @brief  Testcase for libmicrohttpd multiple HTTPS daemon scenario
24  * @author Sagie Amir
25  */
26 
27 #include "platform.h"
28 #include "microhttpd.h"
29 #include <curl/curl.h>
30 #include <limits.h>
31 #include <sys/stat.h>
32 #include <gcrypt.h>
33 #include "tls_test_common.h"
34 
35 extern int curl_check_version (const char *req_version, ...);
36 extern const char srv_key_pem[];
37 extern const char srv_self_signed_cert_pem[];
38 
39 /*
40  * assert initiating two separate daemons and having one shut down
41  * doesn't affect the other
42  */
43 static int
test_concurent_daemon_pair(void * cls,const char * cipher_suite,int proto_version)44 test_concurent_daemon_pair (void *cls,
45 			    const char *cipher_suite,
46                             int proto_version)
47 {
48 
49   int ret;
50   struct MHD_Daemon *d1;
51   struct MHD_Daemon *d2;
52 
53   d1 = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL |
54                          MHD_USE_DEBUG, DEAMON_TEST_PORT,
55                          NULL, NULL, &http_ahc, NULL,
56                          MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem,
57                          MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem,
58                          MHD_OPTION_END);
59 
60   if (d1 == NULL)
61     {
62       fprintf (stderr, MHD_E_SERVER_INIT);
63       return -1;
64     }
65 
66   d2 = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL |
67                          MHD_USE_DEBUG, DEAMON_TEST_PORT + 1,
68                          NULL, NULL, &http_ahc, NULL,
69                          MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem,
70                          MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem,
71                          MHD_OPTION_END);
72 
73   if (d2 == NULL)
74     {
75       MHD_stop_daemon (d1);
76       fprintf (stderr, MHD_E_SERVER_INIT);
77       return -1;
78     }
79 
80   ret =
81     test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0);
82   ret +=
83     test_daemon_get (NULL, cipher_suite, proto_version,
84                      DEAMON_TEST_PORT + 1, 0);
85 
86   MHD_stop_daemon (d2);
87   ret +=
88     test_daemon_get (NULL, cipher_suite, proto_version, DEAMON_TEST_PORT, 0);
89   MHD_stop_daemon (d1);
90   return ret;
91 }
92 
93 
94 int
main(int argc,char * const * argv)95 main (int argc, char *const *argv)
96 {
97   unsigned int errorCount = 0;
98   FILE *cert;
99 
100   gcry_control (GCRYCTL_ENABLE_QUICK_RANDOM, 0);
101 #ifdef GCRYCTL_INITIALIZATION_FINISHED
102   gcry_control (GCRYCTL_INITIALIZATION_FINISHED, 0);
103 #endif
104   if (0 != curl_global_init (CURL_GLOBAL_ALL))
105     {
106       fprintf (stderr, "Error (code: %u). l:%d f:%s\n", errorCount, __LINE__,
107                __FUNCTION__);
108       return -1;
109     }
110   if ((cert = setup_ca_cert ()) == NULL)
111     {
112       fprintf (stderr, MHD_E_TEST_FILE_CREAT);
113       return -1;
114     }
115 
116   const char *aes256_sha = "AES256-SHA";
117   if (curl_uses_nss_ssl() == 0)
118     {
119       aes256_sha = "rsa_aes_256_sha";
120     }
121 
122   errorCount +=
123     test_concurent_daemon_pair (NULL, aes256_sha, CURL_SSLVERSION_TLSv1);
124 
125   print_test_result (errorCount, "concurent_daemon_pair");
126 
127   curl_global_cleanup ();
128   fclose (cert);
129   if (0 != remove (ca_cert_file_name))
130     fprintf (stderr,
131 	     "Failed to remove `%s'\n",
132 	     ca_cert_file_name);
133   return errorCount != 0;
134 }
135