aboutsummaryrefslogtreecommitdiffstats
path: root/package/mini_httpd/files
diff options
context:
space:
mode:
Diffstat (limited to 'package/mini_httpd/files')
-rw-r--r--package/mini_httpd/files/matrixssl_helper.c455
-rw-r--r--package/mini_httpd/files/matrixssl_helper.h39
-rw-r--r--package/mini_httpd/files/mini_httpd-ssl.conf7
-rw-r--r--package/mini_httpd/files/mini_httpd.conf5
-rw-r--r--package/mini_httpd/files/mini_httpd.default1
-rw-r--r--package/mini_httpd/files/mini_httpd.init26
-rw-r--r--package/mini_httpd/files/mini_httpd.pem29
7 files changed, 0 insertions, 562 deletions
diff --git a/package/mini_httpd/files/matrixssl_helper.c b/package/mini_httpd/files/matrixssl_helper.c
deleted file mode 100644
index e3fe3346c2..0000000000
--- a/package/mini_httpd/files/matrixssl_helper.c
+++ /dev/null
@@ -1,455 +0,0 @@
-/*
- * MatrixSSL helper functions
- *
- * Copyright (C) 2005 Nicolas Thill <nthill@free.fr>
- *
- * This program is free software; you can redistribute it and/or
- * modify it under the terms of the GNU General Public License
- * as published by the Free Software Foundation; either version 2
- * of the License, or (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * Portions borrowed from MatrixSSL example code
- *
- */
-
-#include <sys/socket.h>
-#include <netinet/in.h>
-#include <netinet/tcp.h>
-#include <arpa/inet.h>
-#include <fcntl.h>
-#include <unistd.h>
-#include <stdio.h>
-#include <string.h>
-#include <errno.h>
-
-#include "matrixssl_helper.h"
-
-#define SSL_SOCKET_EOF 0x0001
-#define SSL_SOCKET_CLOSE_NOTIFY 0x0002
-
-#define min(a, b) ( (a) < (b) ) ? (a) : (b)
-
-static int _ssl_read(SSL *ssl, char *buf, int len);
-static int _ssl_write(SSL *ssl, char *buf, int len);
-static void _ssl_setSocketBlock(int fd);
-static void _ssl_setSocketNonblock(int fd);
-static void _ssl_closeSocket(int fd);
-
-
-SSL * SSL_new(sslKeys_t *keys)
-{
- SSL * ssl;
- ssl = (SSL *)malloc(sizeof(SSL));
-
- if (!ssl) return 0;
-
- ssl->keys = keys;
- if ( matrixSslNewSession(&(ssl->ssl), ssl->keys, NULL, SSL_FLAGS_SERVER) < 0 ) {
- }
-
- ssl->insock.size = 1024;
- ssl->insock.buf = ssl->insock.start = ssl->insock.end =
- (unsigned char *)malloc(ssl->insock.size);
-
- ssl->outsock.size = 1024;
- ssl->outsock.buf = ssl->outsock.start = ssl->outsock.end =
- (unsigned char *)malloc(ssl->outsock.size);
-
- ssl->inbuf.size = 0;
- ssl->inbuf.buf = ssl->inbuf.start = ssl->inbuf.end = NULL;
-
- return ssl;
-}
-
-
-int SSL_accept(SSL *ssl) {
-
- unsigned char buf[1024];
- int status, rc;
-
-readMore:
- rc = _ssl_read(ssl, buf, sizeof(buf));
- if (rc == 0) {
- if (ssl->status == SSL_SOCKET_EOF || ssl->status == SSL_SOCKET_CLOSE_NOTIFY) {
- SSL_free(ssl);
- return -1;
- }
- if (matrixSslHandshakeIsComplete(ssl->ssl) == 0) {
- goto readMore;
- }
- } else if (rc > 0) {
- return 0;
- } else {
- SSL_free(ssl);
- return -1;
- }
-
- return 1;
-}
-
-
-void SSL_set_fd(SSL *ssl, int fd) {
- ssl->fd = fd;
-}
-
-
-int SSL_read(SSL *ssl, char *buf, int len) {
- int rc;
-readMore:
- rc = _ssl_read(ssl, buf, len);
- if (rc <= 0) {
- if (rc < 0 || ssl->status == SSL_SOCKET_EOF || ssl->status == SSL_SOCKET_CLOSE_NOTIFY) {
- _ssl_closeSocket(ssl->fd);
- return rc;
- }
- goto readMore;
- }
- return rc;
-}
-
-
-int SSL_write(SSL *ssl, char *buf, int len) {
- int rc;
-writeMore:
- rc = _ssl_write(ssl, buf, len);
- if (rc <= 0) {
- if (rc < 0) {
- return rc;
- }
- goto writeMore;
- }
- return rc;
-}
-
-
-void SSL_free(SSL * ssl)
-{
- matrixSslDeleteSession(ssl->ssl);
- if (ssl->insock.buf) {
- free(ssl->insock.buf);
- }
- if (ssl->outsock.buf) {
- free(ssl->outsock.buf);
- }
- if (ssl->inbuf.buf) {
- free(ssl->inbuf.buf);
- }
- free(ssl);
-}
-
-
-
-static void _ssl_setSocketBlock(int fd)
-{
- fcntl(fd, F_SETFL, fcntl(fd, F_GETFL) & ~O_NONBLOCK);
- fcntl(fd, F_SETFD, FD_CLOEXEC);
-}
-
-
-static void _ssl_setSocketNonblock(int fd)
-{
- fcntl(fd, F_SETFL, fcntl(fd, F_GETFL) | O_NONBLOCK);
-}
-
-
-static void _ssl_closeSocket(int fd)
-{
- char buf[32];
-
- if (fd != -1) {
- _ssl_setSocketNonblock(fd);
- if (shutdown(fd, 1) >= 0) {
- while (recv(fd, buf, sizeof(buf), 0) > 0);
- }
- close(fd);
- }
-}
-
-
-static int _ssl_read(SSL *ssl, char *buf, int len)
-{
- int bytes, rc, remaining;
- unsigned char error, alertLevel, alertDescription, performRead;
-
- ssl->status = 0;
-
- if (ssl->ssl == NULL || len <= 0) {
- return -1;
- }
-/*
- If inbuf is valid, then we have previously decoded data that must be
- returned, return as much as possible. Once all buffered data is
- returned, free the inbuf.
-*/
- if (ssl->inbuf.buf) {
- if (ssl->inbuf.start < ssl->inbuf.end) {
- remaining = (int)(ssl->inbuf.end - ssl->inbuf.start);
- bytes = (int)min(len, remaining);
- memcpy(buf, ssl->inbuf.start, bytes);
- ssl->inbuf.start += bytes;
- return bytes;
- }
- free(ssl->inbuf.buf);
- ssl->inbuf.buf = NULL;
- }
-/*
- Pack the buffered socket data (if any) so that start is at zero.
-*/
- if (ssl->insock.buf < ssl->insock.start) {
- if (ssl->insock.start == ssl->insock.end) {
- ssl->insock.start = ssl->insock.end = ssl->insock.buf;
- } else {
- memmove(ssl->insock.buf, ssl->insock.start, ssl->insock.end - ssl->insock.start);
- ssl->insock.end -= (ssl->insock.start - ssl->insock.buf);
- ssl->insock.start = ssl->insock.buf;
- }
- }
-/*
- Read up to as many bytes as there are remaining in the buffer. We could
- Have encrypted data already cached in conn->insock, but might as well read more
- if we can.
-*/
- performRead = 0;
-readMore:
- if (ssl->insock.end == ssl->insock.start || performRead) {
- performRead = 1;
- bytes = recv(ssl->fd, (char *)ssl->insock.end,
- (int)((ssl->insock.buf + ssl->insock.size) - ssl->insock.end), MSG_NOSIGNAL);
- if (bytes == -1) {
- ssl->status = errno;
- return -1;
- }
- if (bytes == 0) {
- ssl->status = SSL_SOCKET_EOF;
- return 0;
- }
- ssl->insock.end += bytes;
- }
-/*
- Define a temporary sslBuf
-*/
- ssl->inbuf.start = ssl->inbuf.end = ssl->inbuf.buf = (unsigned char *)malloc(len);
- ssl->inbuf.size = len;
-/*
- Decode the data we just read from the socket
-*/
-decodeMore:
- error = 0;
- alertLevel = 0;
- alertDescription = 0;
-
- rc = matrixSslDecode(ssl->ssl, &ssl->insock, &ssl->inbuf, &error, &alertLevel,
- &alertDescription);
- switch (rc) {
-/*
- Successfully decoded a record that did not return data or require a response.
-*/
- case SSL_SUCCESS:
- return 0;
-/*
- Successfully decoded an application data record, and placed in tmp buf
-*/
- case SSL_PROCESS_DATA:
-/*
- Copy as much as we can from the temp buffer into the caller's buffer
- and leave the remainder in conn->inbuf until the next call to read
- It is possible that len > data in buffer if the encoded record
- was longer than len, but the decoded record isn't!
-*/
- rc = (int)(ssl->inbuf.end - ssl->inbuf.start);
- rc = min(rc, len);
- memcpy(buf, ssl->inbuf.start, rc);
- ssl->inbuf.start += rc;
- return rc;
-/*
- We've decoded a record that requires a response into tmp
- If there is no data to be flushed in the out buffer, we can write out
- the contents of the tmp buffer. Otherwise, we need to append the data
- to the outgoing data buffer and flush it out.
-*/
- case SSL_SEND_RESPONSE:
- bytes = send(ssl->fd, (char *)ssl->inbuf.start,
- (int)(ssl->inbuf.end - ssl->inbuf.start), MSG_NOSIGNAL);
- if (bytes == -1) {
- ssl->status = errno;
- if (ssl->status != EAGAIN) {
- goto readError;
- }
- ssl->status = 0;
- }
- ssl->inbuf.start += bytes;
- if (ssl->inbuf.start < ssl->inbuf.end) {
-/*
- This must be a non-blocking socket since it didn't all get sent
- out and there was no error. We want to finish the send here
- simply because we are likely in the SSL handshake.
-*/
- _ssl_setSocketBlock(ssl->fd);
- bytes = send(ssl->fd, (char *)ssl->inbuf.start,
- (int)(ssl->inbuf.end - ssl->inbuf.start), MSG_NOSIGNAL);
- if (bytes == -1) {
- ssl->status = errno;
- goto readError;
- }
- ssl->inbuf.start += bytes;
-/*
- Can safely set back to non-blocking because we wouldn't
- have got here if this socket wasn't non-blocking to begin with.
-*/
- _ssl_setSocketNonblock(ssl->fd);
- }
- ssl->inbuf.start = ssl->inbuf.end = ssl->inbuf.buf;
- return 0;
-/*
- There was an error decoding the data, or encoding the out buffer.
- There may be a response data in the out buffer, so try to send.
- We try a single hail-mary send of the data, and then close the socket.
- Since we're closing on error, we don't worry too much about a clean flush.
-*/
- case SSL_ERROR:
- if (ssl->inbuf.start < ssl->inbuf.end) {
- _ssl_setSocketNonblock(ssl->fd);
- bytes = send(ssl->fd, (char *)ssl->inbuf.start,
- (int)(ssl->inbuf.end - ssl->inbuf.start), MSG_NOSIGNAL);
- }
- goto readError;
-/*
- We've decoded an alert. The level and description passed into
- matrixSslDecode are filled in with the specifics.
-*/
- case SSL_ALERT:
- if (alertDescription == SSL_ALERT_CLOSE_NOTIFY) {
- ssl->status = SSL_SOCKET_CLOSE_NOTIFY;
- goto readZero;
- }
- goto readError;
-/*
- We have a partial record, we need to read more data off the socket.
- If we have a completely full conn->insock buffer, we'll need to grow it
- here so that we CAN read more data when called the next time.
-*/
- case SSL_PARTIAL:
- if (ssl->insock.start == ssl->insock.buf && ssl->insock.end ==
- (ssl->insock.buf + ssl->insock.size)) {
- if (ssl->insock.size > SSL_MAX_BUF_SIZE) {
- goto readError;
- }
- ssl->insock.size *= 2;
- ssl->insock.start = ssl->insock.buf =
- (unsigned char *)realloc(ssl->insock.buf, ssl->insock.size);
- ssl->insock.end = ssl->insock.buf + (ssl->insock.size / 2);
- }
- if (!performRead) {
- performRead = 1;
- free(ssl->inbuf.buf);
- ssl->inbuf.buf = NULL;
- goto readMore;
- } else {
- goto readZero;
- }
-/*
- The out buffer is too small to fit the decoded or response
- data. Increase the size of the buffer and call decode again
-*/
- case SSL_FULL:
- ssl->inbuf.size *= 2;
- if (ssl->inbuf.buf != (unsigned char*)buf) {
- free(ssl->inbuf.buf);
- ssl->inbuf.buf = NULL;
- }
- ssl->inbuf.start = ssl->inbuf.end = ssl->inbuf.buf =
- (unsigned char *)malloc(ssl->inbuf.size);
- goto decodeMore;
- }
-/*
- We consolidated some of the returns here because we must ensure
- that conn->inbuf is cleared if pointing at caller's buffer, otherwise
- it will be freed later on.
-*/
-readZero:
- if (ssl->inbuf.buf == (unsigned char*)buf) {
- ssl->inbuf.buf = NULL;
- }
- return 0;
-readError:
- if (ssl->inbuf.buf == (unsigned char*)buf) {
- ssl->inbuf.buf = NULL;
- }
- return -1;
-}
-
-
-int _ssl_write(SSL *ssl, char *buf, int len)
-{
- int rc;
-
- ssl->status = 0;
-/*
- Pack the buffered socket data (if any) so that start is at zero.
-*/
- if (ssl->outsock.buf < ssl->outsock.start) {
- if (ssl->outsock.start == ssl->outsock.end) {
- ssl->outsock.start = ssl->outsock.end = ssl->outsock.buf;
- } else {
- memmove(ssl->outsock.buf, ssl->outsock.start, ssl->outsock.end - ssl->outsock.start);
- ssl->outsock.end -= (ssl->outsock.start - ssl->outsock.buf);
- ssl->outsock.start = ssl->outsock.buf;
- }
- }
-/*
- If there is buffered output data, the caller must be trying to
- send the same amount of data as last time. We don't support
- sending additional data until the original buffered request has
- been completely sent.
-*/
- if (ssl->outBufferCount > 0 && len != ssl->outBufferCount) {
- return -1;
- }
-/*
- If we don't have buffered data, encode the caller's data
-*/
- if (ssl->outBufferCount == 0) {
-retryEncode:
- rc = matrixSslEncode(ssl->ssl, (unsigned char *)buf, len, &ssl->outsock);
- switch (rc) {
- case SSL_ERROR:
- return -1;
- case SSL_FULL:
- if (ssl->outsock.size > SSL_MAX_BUF_SIZE) {
- return -1;
- }
- ssl->outsock.size *= 2;
- ssl->outsock.buf =
- (unsigned char *)realloc(ssl->outsock.buf, ssl->outsock.size);
- ssl->outsock.end = ssl->outsock.buf + (ssl->outsock.end - ssl->outsock.start);
- ssl->outsock.start = ssl->outsock.buf;
- goto retryEncode;
- }
- }
-/*
- We've got data to send.
-*/
- rc = send(ssl->fd, (char *)ssl->outsock.start,
- (int)(ssl->outsock.end - ssl->outsock.start), MSG_NOSIGNAL);
- if (rc == -1) {
- ssl->status = errno;
- return -1;
- }
- ssl->outsock.start += rc;
-/*
- If we wrote it all return the length, otherwise remember the number of
- bytes passed in, and return 0 to be called again later.
-*/
- if (ssl->outsock.start == ssl->outsock.end) {
- ssl->outBufferCount = 0;
- return len;
- }
- ssl->outBufferCount = len;
- return 0;
-}
-
diff --git a/package/mini_httpd/files/matrixssl_helper.h b/package/mini_httpd/files/matrixssl_helper.h
deleted file mode 100644
index e5854df64a..0000000000
--- a/package/mini_httpd/files/matrixssl_helper.h
+++ /dev/null
@@ -1,39 +0,0 @@
-/*
- * MatrixSSL helper functions
- *
- * Copyright (C) 2005 Nicolas Thill <nthill@free.fr>
- *
- * This program is free software; you can redistribute it and/or
- * modify it under the terms of the GNU General Public License
- * as published by the Free Software Foundation; either version 2
- * of the License, or (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- */
-
-#ifndef __MATRIXSSL_HELPER_H__
-#define __MATRIXSSL_HELPER_H__
-
-#include <matrixSsl/matrixSsl.h>
-
-typedef struct __SSL {
- int fd;
- ssl_t *ssl;
- sslKeys_t *keys;
- sslBuf_t insock, outsock, inbuf;
- int outBufferCount;
- int partial;
- int status;
-} SSL;
-
-SSL * SSL_new(sslKeys_t *keys);
-void SSL_set_fd(SSL *ssl, int fd);
-int SSL_accept(SSL *ssl);
-int SSL_read(SSL *ssl, char *b, int len);
-int SSL_write(SSL *ssl, char *buf, int len);
-void SSL_free(SSL *ssl);
-
-#endif /* __MATRIXSSL_HELPER_H__ */
diff --git a/package/mini_httpd/files/mini_httpd-ssl.conf b/package/mini_httpd/files/mini_httpd-ssl.conf
deleted file mode 100644
index 1cd7022d54..0000000000
--- a/package/mini_httpd/files/mini_httpd-ssl.conf
+++ /dev/null
@@ -1,7 +0,0 @@
-cgipat=cgi-bin/**|**.sh
-dir=/www
-nochroot
-pidfile=/var/run/mini_httpd.pid
-user=root
-ssl
-certfile=/etc/mini_httpd.pem
diff --git a/package/mini_httpd/files/mini_httpd.conf b/package/mini_httpd/files/mini_httpd.conf
deleted file mode 100644
index d636a4378b..0000000000
--- a/package/mini_httpd/files/mini_httpd.conf
+++ /dev/null
@@ -1,5 +0,0 @@
-cgipat=cgi-bin/**|**.sh
-dir=/www
-nochroot
-pidfile=/var/run/mini_httpd.pid
-user=root
diff --git a/package/mini_httpd/files/mini_httpd.default b/package/mini_httpd/files/mini_httpd.default
deleted file mode 100644
index 85b229e889..0000000000
--- a/package/mini_httpd/files/mini_httpd.default
+++ /dev/null
@@ -1 +0,0 @@
-OPTIONS="-C /etc/mini_httpd.conf"
diff --git a/package/mini_httpd/files/mini_httpd.init b/package/mini_httpd/files/mini_httpd.init
deleted file mode 100644
index 77bd6fd3b7..0000000000
--- a/package/mini_httpd/files/mini_httpd.init
+++ /dev/null
@@ -1,26 +0,0 @@
-#!/bin/sh
-
-BIN=mini_httpd
-DEFAULT=/etc/default/$BIN
-RUN_D=/var/run
-PID_F=$RUN_D/$BIN.pid
-[ -f $DEFAULT ] && . $DEFAULT
-
-case $1 in
- start)
- [ -d $RUN_D ] || mkdir -p $RUN_D
- $BIN $OPTIONS 2>/dev/null
- ;;
- stop)
- [ -f $PID_F ] && kill $(cat $PID_F)
- ;;
- restart)
- $0 stop
- $0 start
- ;;
- *)
- echo "usage: $0 (start|stop|restart)"
- exit 1
-esac
-
-exit $?
diff --git a/package/mini_httpd/files/mini_httpd.pem b/package/mini_httpd/files/mini_httpd.pem
deleted file mode 100644
index 8a1241a767..0000000000
--- a/package/mini_httpd/files/mini_httpd.pem
+++ /dev/null
@@ -1,29 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXgIBAAKBgQC5rFJOQakwMmF9aoVnAXaQLOOPoYOEk19/ls9VZt1ZqfzQuTbG
-GGrgMIDclB0kHMFvSbzeiVjMnrSdQTNe1gOQAGtHhHiqugrLqH9m3wqOerbf/Yir
-hic9U6X9RaWC6BzNgcYU1QtPn1sDtbMNFAB6jzF3W76EIlHEobgMtfqtxwIDAQAB
-AoGBAKJst9eToyDxgc1ICQlSA1kem7eDUF0C2xDvadLI2KxegzZIQD1NEPmsFJ5h
-x5hWu3TSabG3LwJZd6D1b63vxE6QRMhcDG3idb7kXzhOOZyfnlnrBtJ3VJC/UH5H
-O1pMMBxcu2fXrua+h7BW0gMoZhchvsArDoWaZPjNUNHiNRYBAkEA3Ngnge7njqlf
-/UlLkQHHfxgorQ78GjOzrrUvz86pFtW8RKCjAv55HIqAhWrSgxWF4yXkPO2XOHC9
-KTeVKccjAQJBANc63r3M3yP817cPzyo/8BJQD9nAzmolrsBf1YMxML20UmEbObax
-QdmxoYu/a8tOD4gT6EZDkauJU0yS69HGeMcCQQCvRmbkuuXQ1iC29+sfpVfeSSBP
-aaswaIRdTrQprA2LcAtCNHPsNmeM/WfPe96j5vsiMrqYmMECLIgVJGYgiEoBAkEA
-kzg1e+ZTC667bwBlWCT79crFzNDRYFH+QqBKz74p9NkPMFULGSgOPvX95jU9aocu
-oInda5J0Zb09OTeWDpuPqQJAUIeY36WUst7NaW40mZXkMjjR2QtWi7P4cmv7nLp0
-WdPQzkUW1Bv4sSUQ7svQqpmZPaFiyhXL1VSa1M5MPd3tbA==
------END RSA PRIVATE KEY-----
------BEGIN CERTIFICATE-----
-MIICOTCCAaKgAwIBAgIJANRuTbnzy8ObMA0GCSqGSIb3DQEBBAUAMFMxCzAJBgNV
-BAYTAkZSMQ4wDAYDVQQIEwVQYXJpczEOMAwGA1UEBxMFUGFyaXMxEDAOBgNVBAoT
-B015IEhvbWUxEjAQBgNVBAMTCU15IFJvdXRlcjAeFw0wNTAxMTQwMjQzMjdaFw0w
-NjAxMTQwMjQzMjdaMFMxCzAJBgNVBAYTAkZSMQ4wDAYDVQQIEwVQYXJpczEOMAwG
-A1UEBxMFUGFyaXMxEDAOBgNVBAoTB015IEhvbWUxEjAQBgNVBAMTCU15IFJvdXRl
-cjCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAuaxSTkGpMDJhfWqFZwF2kCzj
-j6GDhJNff5bPVWbdWan80Lk2xhhq4DCA3JQdJBzBb0m83olYzJ60nUEzXtYDkABr
-R4R4qroKy6h/Zt8Kjnq23/2Iq4YnPVOl/UWlgugczYHGFNULT59bA7WzDRQAeo8x
-d1u+hCJRxKG4DLX6rccCAwEAAaMVMBMwEQYJYIZIAYb4QgEBBAQDAgZAMA0GCSqG
-SIb3DQEBBAUAA4GBAErI3QmcZVzjxKcoPTO3z8cRJV87SVFp0qbIjbYCBDUWB1QY
-/bMkQPr2zJyfJmUYLEs4iKgHrmlaUCMHy9NZKOg9ZxrW42BtQ5QnOtDm3UifwzJW
-oCFC3uPWfTYsZn/FrUXlErds+xXXT63VJzBe6DdXwHcdcdxzl05oIyL9JIzI
------END CERTIFICATE-----