|
1 | | -#include <openssl/evp.h> |
2 | | -#include <openssl/pem.h> |
| 1 | +#include <arpa/inet.h> |
| 2 | +#include <openssl/err.h> |
| 3 | +#include <openssl/ssl.h> |
| 4 | +#include <sys/socket.h> |
| 5 | +#include <unistd.h> |
| 6 | + |
| 7 | +#include <chrono> |
| 8 | +#include <thread> |
| 9 | +#include <vector> |
| 10 | + |
| 11 | +using namespace std; |
| 12 | + |
| 13 | +class client { |
| 14 | + public: |
| 15 | + class clsSock { |
| 16 | + public: |
| 17 | + int sock; |
| 18 | + SSL *ssl; |
| 19 | + void close() { |
| 20 | + SSL_shutdown(ssl); |
| 21 | + ::close(sock); |
| 22 | + SSL_free(ssl); |
| 23 | + } |
| 24 | + clsSock(SSL *ssl) : sock(socket(AF_INET, SOCK_STREAM, 0)), ssl(ssl) {} |
| 25 | + clsSock(int sock, SSL *ssl) : sock(sock), ssl(ssl) {} |
| 26 | + } sock; |
| 27 | + |
| 28 | + void testServer() { |
| 29 | + char buffer[1024]; |
| 30 | + SSL_read(sock.ssl, buffer, sizeof(buffer)); |
| 31 | + printf("%s\n", buffer); |
| 32 | + SSL_write(sock.ssl, buffer, strlen(buffer)); |
| 33 | + } |
| 34 | + void testClient() { |
| 35 | + const char *message = "Hello, Server!"; |
| 36 | + SSL_write(sock.ssl, message, strlen(message)); |
| 37 | + char buffer[1024]; |
| 38 | + SSL_read(sock.ssl, buffer, sizeof(buffer)); |
| 39 | + printf("%s\n", buffer); |
| 40 | + } |
| 41 | + |
| 42 | + client(SSL *ssl) : sock(ssl) {} |
| 43 | + client(int sock, SSL *ssl) : sock(sock, ssl) {} |
| 44 | +}; |
| 45 | + |
| 46 | +void handleClient(client client) { |
| 47 | + client.testServer(); |
| 48 | + client.sock.close(); |
| 49 | +} |
| 50 | +void serverSock() { |
| 51 | + SSL_library_init(); |
| 52 | + SSL_CTX *ctx = SSL_CTX_new(TLS_server_method()); |
| 53 | + |
| 54 | + SSL_CTX_use_certificate_file(ctx, "server.crt", SSL_FILETYPE_PEM); |
| 55 | + SSL_CTX_use_PrivateKey_file(ctx, "server.key", SSL_FILETYPE_PEM); |
| 56 | + |
| 57 | + int server_fd = socket(AF_INET, SOCK_STREAM, 0); |
| 58 | + sockaddr_in server_addr{}; |
| 59 | + server_addr.sin_family = AF_INET; |
| 60 | + server_addr.sin_port = htons(8080); |
| 61 | + server_addr.sin_addr.s_addr = INADDR_ANY; |
| 62 | + bind(server_fd, (struct sockaddr *)&server_addr, sizeof(server_addr)); |
| 63 | + |
| 64 | + listen(server_fd, 5); |
| 65 | + while (true) { |
| 66 | + client client(accept(server_fd, NULL, NULL), SSL_new(ctx)); |
| 67 | + SSL_set_fd(client.sock.ssl, client.sock.sock); |
| 68 | + SSL_accept(client.sock.ssl); |
| 69 | + } |
| 70 | + |
| 71 | + SSL_CTX_free(ctx); |
| 72 | +} |
| 73 | + |
| 74 | +void clientSock() { |
| 75 | + SSL_library_init(); |
| 76 | + SSL_CTX *ctx = SSL_CTX_new(TLS_client_method()); |
| 77 | + |
| 78 | + SSL_CTX_load_verify_locations(ctx, "server.crt", NULL); |
| 79 | + |
| 80 | + client client(SSL_new(ctx)); |
| 81 | + sockaddr_in server_addr{}; |
| 82 | + server_addr.sin_family = AF_INET; |
| 83 | + server_addr.sin_port = htons(8080); |
| 84 | + inet_pton(AF_INET, "127.0.0.1", &server_addr.sin_addr); |
| 85 | + connect(client.sock.sock, (struct sockaddr *)&server_addr, |
| 86 | + sizeof(server_addr)); |
| 87 | + |
| 88 | + SSL_set_fd(client.sock.ssl, client.sock.sock); |
| 89 | + SSL_connect(client.sock.ssl); |
| 90 | + |
| 91 | + client.testClient(); |
| 92 | + |
| 93 | + client.sock.close(); |
| 94 | + SSL_CTX_free(ctx); |
| 95 | +} |
3 | 96 |
|
4 | 97 | int main() { |
5 | | - EVP_PKEY *pkey = EVP_PKEY_new(); |
6 | | - EVP_PKEY_CTX *ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, NULL); |
7 | | - |
8 | | - // Generate keys |
9 | | - EVP_PKEY_keygen_init(ctx); |
10 | | - EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, 2048); |
11 | | - EVP_PKEY_generate(ctx, &pkey); |
12 | | - // The keys are now stored in memory in the 'pkey' variable |
13 | | - |
14 | | - // Copy public key to another variable |
15 | | - EVP_PKEY *public_key = EVP_PKEY_new(); |
16 | | - public_key = EVP_PKEY_dup(pkey); |
17 | | - |
18 | | - unsigned char msg[2048 / 8] = "Hello, World!"; |
19 | | - // printf("Original message: %s\n", msg); |
20 | | - |
21 | | - // Encrypt message |
22 | | - unsigned char enc[2048 / 8]; |
23 | | - size_t enc_len; |
24 | | - ctx = EVP_PKEY_CTX_new(public_key, NULL); |
25 | | - EVP_PKEY_encrypt_init(ctx); |
26 | | - EVP_PKEY_encrypt(ctx, enc, &enc_len, msg, strlen((char *)msg) + 1); |
27 | | - // printf("Encrypted message: %s\n", enc); |
28 | | - |
29 | | - // Decrypt message |
30 | | - unsigned char dec[2048 / 8]; |
31 | | - size_t dec_len; |
32 | | - ctx = EVP_PKEY_CTX_new(pkey, NULL); |
33 | | - EVP_PKEY_decrypt_init(ctx); |
34 | | - EVP_PKEY_decrypt(ctx, dec, &dec_len, enc, enc_len); |
35 | | - printf("Decrypted message: %s\n", dec); |
36 | | - |
37 | | - // Clean up |
38 | | - EVP_PKEY_free(pkey); |
39 | | - EVP_PKEY_CTX_free(ctx); |
40 | | - |
41 | | - return 0; |
| 98 | + thread serverThread(serverSock); |
| 99 | + this_thread::sleep_for(chrono::seconds(1)); |
| 100 | + |
| 101 | + int numClients = 1; |
| 102 | + vector<thread> clientThreads; |
| 103 | + for (int i = 0; i < numClients; i++) |
| 104 | + clientThreads.push_back(thread(clientSock)); |
| 105 | + |
| 106 | + serverThread.join(); |
| 107 | + for (auto &t : clientThreads) t.join(); |
42 | 108 | } |
0 commit comments