inetdsrv.cpp 2.7 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798
  1. /* inetdserv.cpp - Minimal ssleay server for Unix inetd.conf
  2. * 30.9.1996, Sampo Kellomaki <sampo@iki.fi>
  3. * From /etc/inetd.conf:
  4. * 1111 stream tcp nowait sampo /usr/users/sampo/demo/inetdserv inetdserv
  5. */
  6. #include <stdio.h>
  7. #include <errno.h>
  8. #include "rsa.h" /* SSLeay stuff */
  9. #include <openssl/crypto.h>
  10. #include <openssl/x509.h>
  11. #include <openssl/pem.h>
  12. #include <openssl/ssl.h>
  13. #include <openssl/err.h>
  14. #define HOME "/usr/users/sampo/demo/"
  15. #define CERTF HOME "plain-cert.pem"
  16. #define KEYF HOME "plain-key.pem"
  17. #define CHK_NULL(x) if ((x)==NULL) exit (1)
  18. #define CHK_ERR(err,s) if ((err)==-1) \
  19. { fprintf(log, "%s %d\n", (s), errno); exit(1); }
  20. #define CHK_SSL(err) if ((err)==-1) { ERR_print_errors_fp(log); exit(2); }
  21. void main ()
  22. {
  23. int err;
  24. SSL_CTX* ctx;
  25. SSL* ssl;
  26. X509* client_cert;
  27. char* str;
  28. char buf [4096];
  29. FILE* log;
  30. log = fopen ("/dev/console", "a"); CHK_NULL(log);
  31. fprintf (log, "inetdserv %ld\n", (long)getpid());
  32. SSL_load_error_strings();
  33. ctx = SSL_CTX_new (); CHK_NULL(ctx);
  34. err = SSL_CTX_use_RSAPrivateKey_file (ctx, KEYF, SSL_FILETYPE_PEM);
  35. CHK_SSL (err);
  36. err = SSL_CTX_use_certificate_file (ctx, CERTF, SSL_FILETYPE_PEM);
  37. CHK_SSL (err);
  38. /* inetd has already opened the TCP connection, so we can get right
  39. down to business. */
  40. ssl = SSL_new (ctx); CHK_NULL(ssl);
  41. SSL_set_fd (ssl, fileno(stdin));
  42. err = SSL_accept (ssl); CHK_SSL(err);
  43. /* Get the cipher - opt */
  44. fprintf (log, "SSL connection using %s\n", SSL_get_cipher (ssl));
  45. /* Get client's certificate (note: beware of dynamic allocation) - opt */
  46. client_cert = SSL_get_peer_certificate (ssl);
  47. if (client_cert != NULL) {
  48. fprintf (log, "Client certificate:\n");
  49. str = X509_NAME_oneline (X509_get_subject_name (client_cert));
  50. CHK_NULL(str);
  51. fprintf (log, "\t subject: %s\n", str);
  52. OPENSSL_free (str);
  53. str = X509_NAME_oneline (X509_get_issuer_name (client_cert));
  54. CHK_NULL(str);
  55. fprintf (log, "\t issuer: %s\n", str);
  56. OPENSSL_free (str);
  57. /* We could do all sorts of certificate verification stuff here before
  58. deallocating the certificate. */
  59. X509_free (client_cert);
  60. } else
  61. fprintf (log, "Client doe not have certificate.\n");
  62. /* ------------------------------------------------- */
  63. /* DATA EXCHANGE: Receive message and send reply */
  64. err = SSL_read (ssl, buf, sizeof(buf) - 1); CHK_SSL(err);
  65. buf[err] = '\0';
  66. fprintf (log, "Got %d chars:'%s'\n", err, buf);
  67. err = SSL_write (ssl, "Loud and clear.", strlen("Loud and clear."));
  68. CHK_SSL(err);
  69. /* Clean up. */
  70. fclose (log);
  71. SSL_free (ssl);
  72. SSL_CTX_free (ctx);
  73. }
  74. /* EOF - inetdserv.cpp */