rpm/neon/test/ssl.c

132 lines
3.0 KiB
C

/*
neon test suite
Copyright (C) 2002, Joe Orton <joe@manyfish.co.uk>
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
#include "config.h"
#include <sys/types.h>
#ifdef HAVE_STDLIB_H
#include <stdlib.h>
#endif
#ifdef HAVE_UNISTD_H
#include <unistd.h>
#endif
#include "ne_request.h"
#include "ne_socket.h"
#include "tests.h"
#include "child.h"
#include "utils.h"
#ifndef NEON_SSL
/* this file shouldn't be built if SSL is not enabled. */
#error SSL not supported
#endif
#include <openssl/ssl.h>
#include <openssl/err.h>
#include <openssl/evp.h>
#define ERROR_SSL_STRING (ERR_reason_error_string(ERR_get_error()))
SSL_CTX *server_ctx;
static int s_strwrite(SSL *s, const char *buf)
{
size_t len = strlen(buf);
ONV(SSL_write(s, buf, len) != (int)len,
("SSL_write failed: %s", ERROR_SSL_STRING));
return OK;
}
static int serve_ssl(nsocket *sock, void *ud)
{
int fd = sock_get_fd(sock);
/* we don't want OpenSSL to close this socket for us. */
BIO *bio = BIO_new_socket(fd, BIO_NOCLOSE);
SSL *ssl = SSL_new(server_ctx);
char buf[BUFSIZ];
ONN("SSL_new failed", ssl == NULL);
SSL_set_bio(ssl, bio, bio);
ONV(SSL_accept(ssl) != 1,
("SSL_accept failed: %s", ERROR_SSL_STRING));
SSL_read(ssl, buf, BUFSIZ);
CALL(s_strwrite(ssl, "HTTP/1.0 200 OK\r\n"
"Content-Length: 0\r\n"
"Connection: close\r\n\r\n"));
/* Erk, shutdown is messy! See Eric Rescorla's article:
* http://www.linuxjournal.com/article.php?sid=4822 ; we'll just
* hide our heads in the sand here. */
SSL_shutdown(ssl);
SSL_free(ssl);
return OK;
}
static int init(void)
{
ONN("sock_init failed.\n", sock_init());
server_ctx = SSL_CTX_new(SSLv23_server_method());
ONN("SSL_CTX_new failed", server_ctx == NULL);
ONN("failed to load private key",
!SSL_CTX_use_PrivateKey_file(server_ctx,
"server.key", SSL_FILETYPE_PEM));
ONN("failed to load certificate",
!SSL_CTX_use_certificate_file(server_ctx,
"server.pem", SSL_FILETYPE_PEM));
return OK;
}
static int simple(void)
{
ne_session *sess;
int ret;
CALL(make_session(&sess, serve_ssl, NULL));
ne_set_secure(sess, 1);
ret = any_request(sess, "/foo");
CALL(await_server());
ONREQ(ret);
ne_session_destroy(sess);
return OK;
}
ne_test tests[] = {
T(init),
T(simple),
T(NULL)
};