add GPIO management over etrhernet

This commit is contained in:
Edward Emelianov 2023-06-30 16:10:49 +03:00
parent b8b845c2f5
commit ad29c057ab
29 changed files with 1563 additions and 0 deletions

79
SSL_sockets_GPIO/Makefile Normal file
View File

@ -0,0 +1,79 @@
# run `make DEF=...` to add extra defines
CLIENT := sslclient
SERVER := sslserver
LDFLAGS += -fdata-sections -ffunction-sections -Wl,--gc-sections -Wl,--discard-all
LDFLAGS += -lusefull_macros -lssl -lcrypto -lm
DEFINES := $(DEF) -D_GNU_SOURCE -D_XOPEN_SOURCE=1111
SOBJDIR := mkserver
COBJDIR := mkclient
CFLAGS += -O2 -Wall -Wextra -Wno-trampolines -pthread
COMMSRCS := sslsock.c daemon.c cmdlnopts.c main.c gpio.c
SSRC := server.c $(COMMSRCS)
CSRC := client.c $(COMMSRCS)
SOBJS := $(addprefix $(SOBJDIR)/, $(SSRC:%.c=%.o))
COBJS := $(addprefix $(COBJDIR)/, $(CSRC:%.c=%.o))
SDEPS := $(SOBJS:.o=.d)
CDEPS := $(COBJS:.o=.d)
CC = gcc
TARGFILE := build.target
ifeq ($(shell test -e $(TARGFILE) && echo -n yes),yes)
TARGET := $(file < $(TARGFILE))
else
TARGET := RELEASE
endif
ifeq ($(TARGET), DEBUG)
.DEFAULT_GOAL := debug
endif
release: CFLAGS += -flto
release: LDFLAGS += -flto
release: $(TARGFILE) $(CLIENT) $(SERVER)
debug: CFLAGS += -DEBUG -Werror
debug: TARGET := DEBUG
debug: $(TARGFILE) $(CLIENT) $(SERVER)
$(TARGFILE):
@echo -e "\tTARGET: $(TARGET)\n"
@echo "$(TARGET)" > $(TARGFILE)
$(CLIENT) : DEFINES += -DCLIENT
$(CLIENT) : $(COBJDIR) $(COBJS)
@echo -e "\tLD $(CLIENT)"
$(CC) $(COBJS) $(LDFLAGS) -o $(CLIENT)
$(SERVER) : DEFINES += -DSERVER
$(SERVER) : $(SOBJDIR) $(SOBJS)
@echo -e "\tLD $(SERVER)"
$(CC) $(SOBJS) $(LDFLAGS) -o $(SERVER)
$(SOBJDIR):
@mkdir $(SOBJDIR)
$(COBJDIR):
@mkdir $(COBJDIR)
ifneq ($(MAKECMDGOALS),clean)
-include $(DEPS)
endif
$(COBJDIR)/%.o: %.c
@echo -e "\tCC $<"
$(CC) -MD -c $(LDFLAGS) $(CFLAGS) $(DEFINES) -o $@ $<
$(SOBJDIR)/%.o: %.c
@echo -e "\t\tCC $<"
$(CC) -MD -c $(LDFLAGS) $(CFLAGS) $(DEFINES) -o $@ $<
clean:
@echo -e "\t\tCLEAN"
@rm -rf $(SOBJDIR) $(COBJDIR) $(TARGFILE) 2>/dev/null || true
xclean: clean
@rm -f $(PROGRAM)
.PHONY: clean xclean

35
SSL_sockets_GPIO/Readme Normal file
View File

@ -0,0 +1,35 @@
Client/server GPIO monitoring using SSL-protected TCP-socket connection between client and server (check certs from both sides)
Both client and server monitors 6 GPIO inputs and send messages "UPxx" and "DOWNxx" when button was pressed (0) or released (1).
When receiving such messages client/server check by local table correspongind outputs and change their values. If all OK, return "OK",
if not - return "FAIL".
Usage: sslclient [args]
Where args are:
-C, --command don't run client as daemon, just send given commands to server
-P, --pidfile=arg pidfile (default: /tmp/sslsock.pid)
-a, --ca=arg path to SSL ca - base cert (default:ca_cert.pem)
-c, --certificate=arg path to SSL sertificate (default: client_cert.pem)
-h, --help show this help
-k, --key=arg path to SSL key (default: client_key.pem)
-l, --logfile=arg file to save logs
-p, --port=arg port to open (default: 4444)
-s, --server=arg server IP address or name
-v, --verbose increase log verbose level (default: LOG_WARN)
Usage: sslserver [args]
Where args are:
-P, --pidfile=arg pidfile (default: /tmp/sslsock.pid)
-a, --ca=arg path to SSL ca - base cert (default:ca_cert.pem)
-c, --certificate=arg path to SSL sertificate (default: server_cert.pem)
-h, --help show this help
-k, --key=arg path to SSL key (default: server_key.pem)
-l, --logfile=arg file to save logs
-p, --port=arg port to open (default: 4444)
-v, --verbose increase log verbose level (default: LOG_WARN)

View File

@ -0,0 +1 @@
RELEASE

49
SSL_sockets_GPIO/ca/gen.sh Executable file
View File

@ -0,0 +1,49 @@
#!/bin/sh
# https://gist.github.com/zapstar/4b51d7cfa74c7e709fcdaace19233443
mkdir -p ca/private
chmod 700 ca/private
# NOTE: I'm using -nodes, this means that once anybody gets
# their hands on this particular key, they can become this CA.
openssl req \
-x509 \
-nodes \
-days 36524 \
-newkey rsa:4096 \
-keyout ca/private/ca_key.pem \
-out ca/ca_cert.pem \
-subj "/C=RU/ST=KChR/L=Bukovo/O=SAO RAS/CN=sao.ru"
# Create server private key and certificate request
mkdir -p server/private
chmod 700 ca/private
openssl genrsa -out server/private/server_key.pem 4096
openssl req -new \
-key server/private/server_key.pem \
-out server/server.csr \
-subj "/C=RU/ST=KChR/L=Bukovo/O=SAO RAS"
# Create client private key and certificate request
mkdir -p client/private
chmod 700 client/private
openssl genrsa -out client/private/client_key.pem 4096
openssl req -new \
-key client/private/client_key.pem \
-out client/client.csr \
-subj "/C=RU/ST=KChR/L=Bukovo/O=SAO RAS"
# Generate certificates
openssl x509 -req -days 36524 -in server/server.csr \
-CA ca/ca_cert.pem -CAkey ca/private/ca_key.pem \
-CAcreateserial -out server/server_cert.pem
openssl x509 -req -days 36524 -in client/client.csr \
-CA ca/ca_cert.pem -CAkey ca/private/ca_key.pem \
-CAcreateserial -out client/client_cert.pem
# Now test both the server and the client
# On one shell, run the following
# openssl s_server -CAfile ca/ca_cert.pem -cert server/server_cert.pem -key server/private/server_key.pem -Verify 1
# On another shell, run the following
# openssl s_client -CAfile ca/ca_cert.pem -cert client/client_cert.pem -key client/private/client_key.pem
# Once the negotiation is complete, any line you type is sent over to the other side.
# By line, I mean some text followed by a keyboard return press.

View File

@ -0,0 +1 @@
ca/ca/ca_cert.pem

121
SSL_sockets_GPIO/client.c Normal file
View File

@ -0,0 +1,121 @@
/*
* This file is part of the sslsosk project.
* Copyright 2023 Edward V. Emelianov <edward.emelianoff@gmail.com>.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include <usefull_macros.h>
#include <string.h>
#include "client.h"
#include "cmdlnopts.h"
#include "sslsock.h"
#ifdef __arm__
#include "gpio.h"
#endif
static int SSL_nbread(SSL *ssl, char *buf, int bufsz){
struct pollfd fds = {0};
int fd = SSL_get_fd(ssl);
fds.fd = fd;
fds.events = POLLIN | POLLPRI;
if(poll(&fds, 1, 1) < 0){ // wait no more than 1ms
LOGWARN("SSL_nbread(): poll() failed");
WARNX("poll()");
return 0;
}
if(fds.revents & (POLLIN | POLLPRI)){
//DBG("Got info in fd #%d", fd);
int l = read_string(ssl, buf, bufsz);
//DBG("read %d bytes", l);
return l;
}
return 0;
}
static void readssl(SSL *ssl){
char buf[BUFSIZ];
int bytes = SSL_nbread(ssl, buf, BUFSIZ-1);
//int bytes = read_string(ssl, buf, BUFSIZ-1);
if(bytes > 0){
buf[bytes] = 0;
verbose(1, "Received: \"%s\"", buf);
#ifdef __arm__
handle_message(buf);
#endif
}else if(bytes < 0){
LOGWARN("Server disconnected or other error");
ERRX("Disconnected");
}
}
static void sendcommands(SSL *ssl){
char buf[BUFSIZ];
char **curdata = G.commands;
if(!curdata) return;
while(*curdata){
verbose(1, "Send: \"%s\"", *curdata);
int l = snprintf(buf, BUFSIZ-1, "%s\n", *curdata);
if(SSL_write(ssl, buf, l) <= 0) WARNX("SSL write error");
readssl(ssl);
++curdata;
}
double t0 = dtime();
while(dtime() - t0 < 2.) readssl(ssl);
}
void clientproc(SSL_CTX *ctx, int fd){
FNAME();
SSL *ssl;
ssl = SSL_new(ctx);
SSL_set_fd(ssl, fd);
int c = SSL_connect(ssl);
if(c < 0){
LOGERR("SSL_connect()");
ERRX("SSL_connect() error: %d", SSL_get_error(ssl, c));
}
int enable = 1;
if(ioctl(fd, FIONBIO, (void *)&enable) < 0){
LOGERR("Can't make socket nonblocking");
ERRX("ioctl()");
}
#ifndef __arm__
char buf[BUFSIZ];
double t0 = dtime();
#endif
if(G.commands){
sendcommands(ssl);
SSL_shutdown(ssl);
SSL_free(ssl);
return;
}
while(1){
#ifdef __arm__
poll_gpio(&ssl, 1);
#else
if(dtime() - t0 > 3.){
static int ctr = 0;
const char *msgs[2] = {"UP", "DOWN"};
int l = snprintf(buf, BUFSIZ-1, "%s18\n", msgs[ctr]);
ctr = !ctr;
verbose(1, "Send: %s", buf);
if(SSL_write(ssl, buf, l) <= 0) WARNX("SSL write error");
t0 = dtime();
}
#endif
readssl(ssl);
}
SSL_free(ssl);
}

23
SSL_sockets_GPIO/client.h Normal file
View File

@ -0,0 +1,23 @@
/*
* This file is part of the sslsosk project.
* Copyright 2023 Edward V. Emelianov <edward.emelianoff@gmail.com>.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#pragma once
#include "sslsock.h"
void clientproc(SSL_CTX *ctx, int fd);

View File

@ -0,0 +1 @@
ca/client/client_cert.pem

View File

@ -0,0 +1 @@
ca/client/private/client_key.pem

View File

@ -0,0 +1,115 @@
/*
* This file is part of the sslsosk project.
* Copyright 2023 Edward V. Emelianov <edward.emelianoff@gmail.com>.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include <assert.h>
#include <stdarg.h>
#include <stdio.h>
#include <string.h>
#include <strings.h>
#include <usefull_macros.h>
#include "cmdlnopts.h"
/*
* here are global parameters initialisation
*/
static int help;
#ifdef SERVER
#define DEFCERT "server_cert.pem"
#define DEFKEY "server_key.pem"
#else
#define DEFCERT "client_cert.pem"
#define DEFKEY "client_key.pem"
#endif
#define DEFCA "ca_cert.pem"
#define DEFGPIO "/dev/gpiochip0"
// default global parameters
glob_pars G = {
.pidfile = DEFAULT_PIDFILE,
.port = DEFAULT_PORT,
.cert = DEFCERT,
.key = DEFKEY,
.ca = DEFCA,
#ifdef __arm__
.gpiodevpath = DEFGPIO,
#endif
};
/*
* Define command line options by filling structure:
* name has_arg flag val type argptr help
*/
static myoption cmdlnopts[] = {
// common options
{"help", NO_ARGS, NULL, 'h', arg_int, APTR(&help), _("show this help")},
{"logfile", NEED_ARG, NULL, 'l', arg_string, APTR(&G.logfile), _("file to save logs")},
{"pidfile", NEED_ARG, NULL, 'P', arg_string, APTR(&G.pidfile), _("pidfile (default: " DEFAULT_PIDFILE ")")},
{"certificate",NEED_ARG,NULL, 'c', arg_string, APTR(&G.cert), _("path to SSL sertificate (default: " DEFCERT ")")},
{"key", NEED_ARG, NULL, 'k', arg_string, APTR(&G.key), _("path to SSL key (default: " DEFKEY ")")},
{"port", NEED_ARG, NULL, 'p', arg_string, APTR(&G.port), _("port to open (default: " DEFAULT_PORT ")")},
{"verbose", NO_ARGS, NULL, 'v', arg_none, APTR(&G.verbose), _("increase log verbose level (default: LOG_WARN)")},
{"ca", NEED_ARG, NULL, 'a', arg_string, APTR(&G.ca), _("path to SSL ca - base cert (default:" DEFCA ")")},
#ifdef __arm__
{"gpiopath",NEED_ARG, NULL, 'g', arg_string, APTR(&G.gpiodevpath),_("path to GPIO device (default:" DEFGPIO ")")},
#endif
#ifdef CLIENT
{"server", NEED_ARG, NULL, 's', arg_string, APTR(&G.serverhost), _("server IP address or name")},
{"command", MULT_PAR, NULL, 'C', arg_string, APTR(&G.commands), _("don't run client as daemon, just send given commands to server")},
#endif
end_option
};
/**
* Parse command line options and return dynamically allocated structure
* to global parameters
* @param argc - copy of argc from main
* @param argv - copy of argv from main
*/
void parse_args(int argc, char **argv){
int i;
size_t hlen = 1024;
char helpstring[1024], *hptr = helpstring;
snprintf(hptr, hlen, "Usage: %%s [args]\n\n\tWhere args are:\n");
// format of help: "Usage: progname [args]\n"
change_helpstring(helpstring);
// parse arguments
parseargs(&argc, &argv, cmdlnopts);
if(help) showhelp(-1, cmdlnopts);
if(argc > 0){
red("Ignored options:\n");
for (i = 0; i < argc; i++)
printf("\t%s\n", argv[i]);
}
}
/**
* @brief verbose - print additional messages depending of G.verbose (add '\n' at end)
* @param levl - message level
* @param fmt - message
*/
void verbose(int levl, const char *fmt, ...){
va_list ar;
if(levl > G.verbose) return;
va_start(ar, fmt);
vprintf(fmt, ar);
va_end(ar);
printf("\n");
}

View File

@ -0,0 +1,52 @@
/*
* This file is part of the sslsosk project.
* Copyright 2023 Edward V. Emelianov <edward.emelianoff@gmail.com>.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#pragma once
// default PID filename:
#ifndef DEFAULT_PIDFILE
#define DEFAULT_PIDFILE "/tmp/sslsock.pid"
#endif
#ifndef DEFAULT_PORT
#define DEFAULT_PORT "4444"
#endif
/*
* here are some typedef's for global data
*/
typedef struct{
char *pidfile; // name of PID file
char *logfile; // logging to this file
char *cert; // sertificate
char *key; // key
char *port; // port number
int verbose; // logfile verbose level
char *ca; // ca
#ifdef CLIENT
char *serverhost; // server IP address
char **commands; // don't run as daemon, just send given commands to server
#endif
#ifdef __arm__
char *gpiodevpath; // path to gpio device file
#endif
} glob_pars;
extern glob_pars G;
void parse_args(int argc, char **argv);
void verbose(int levl, const char *fmt, ...);

106
SSL_sockets_GPIO/daemon.c Normal file
View File

@ -0,0 +1,106 @@
/*
* This file is part of the sslsosk project.
* Copyright 2023 Edward V. Emelianov <edward.emelianoff@gmail.com>.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include <signal.h>
#include <stdio.h>
#include <sys/prctl.h> // prctl
#include <sys/wait.h> // wait
#include <unistd.h>
#include <usefull_macros.h>
#include "cmdlnopts.h"
#include "daemon.h"
#include "sslsock.h"
static pid_t childpid = -1;
void signals(int sig){
if(childpid == 0){
LOGWARN("Child killed with sig=%d", sig);
exit(sig); // slave process
}
// master process
if(sig){
signal(sig, SIG_IGN);
LOGERR("Exit with signal %d", sig);
}else LOGERR("Exit");
if(G.pidfile) unlink(G.pidfile);
exit(sig);
}
/**
* @brief start_daemon - daemonize
* @param self - self name of process
* @return error code or 0
*/
int start_daemon(_U_ char *self){
// check args
int port = atoi(G.port);
if(port < 1024 || port > 65535){
LOGERR("Wrong port value: %d", port);
return 1;
}
FILE *f = fopen(G.cert, "r");
if(!f) ERR("Can't open certificate file %s", G.cert);
fclose(f);
f = fopen(G.key, "r");
if(!f) ERR("Can't open certificate key file %s", G.key);
fclose(f);
#ifdef EBUG
printf("cert: %s, key: %s\n", G.cert, G.key);
#endif
#ifdef CLIENT
//DBG("server: %s", G.serverhost);
if(!G.serverhost) ERRX("Point server name");
#endif
if(G.logfile){
int lvl = LOGLEVEL_WARN + G.verbose;
DBG("level = %d", lvl);
if(lvl > LOGLEVEL_ANY) lvl = LOGLEVEL_ANY;
green("Log file %s @ level %d\n", G.logfile, lvl);
OPENLOG(G.logfile, lvl, 1);
}
signal(SIGTERM, signals); // kill (-15) - quit
signal(SIGHUP, SIG_IGN); // hup - ignore
signal(SIGINT, signals); // ctrl+C - quit
signal(SIGQUIT, signals); // ctrl+\ - quit
signal(SIGTSTP, SIG_IGN); // ignore ctrl+Z
#ifdef SERVER
check4running(self, G.pidfile);
#endif
LOGMSG("Started");
#ifndef EBUG
#ifdef CLIENT
if(G.commands) return open_socket();
#endif
while(1){
childpid = fork();
if(childpid){ // master
LOGMSG("Created child with pid %d", childpid);
wait(NULL);
LOGWARN("Child %d died", childpid);
sleep(1); // wait a little before respawn
}else{ // slave
prctl(PR_SET_PDEATHSIG, SIGTERM); // send SIGTERM to child when parent dies
break;
}
}
#endif
// parent should never reach this part of code
return open_socket();
}

22
SSL_sockets_GPIO/daemon.h Normal file
View File

@ -0,0 +1,22 @@
/*
* This file is part of the sslsosk project.
* Copyright 2023 Edward V. Emelianov <edward.emelianoff@gmail.com>.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#pragma once
int start_daemon(char *self);

199
SSL_sockets_GPIO/gpio.c Normal file
View File

@ -0,0 +1,199 @@
/*
* This file is part of the sslsosk project.
* Copyright 2023 Edward V. Emelianov <edward.emelianoff@gmail.com>.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include <errno.h>
#include <fcntl.h>
#include <inttypes.h>
#include <linux/gpio.h>
#include <stdio.h>
#include <string.h>
#include <sys/ioctl.h>
#include <sys/poll.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <usefull_macros.h>
#include "cmdlnopts.h"
#include "gpio.h"
static int gpiofd = -1;
static struct gpio_v2_line_request rq_in, rq_out;
// inputs and outputs
static const int gpio_inputs[GPIO_IN_NUMBER] = {18, 23, 24, 25, 8, 7};
static const int gpio_outputs[GPIO_OUT_NUMBER] = {17, 27, 22, 10, 9, 11};
/**
* @brief gpio_open_device - open GPIO device
* @param path - path to device
* @return device fd or -1 if error
*/
int gpio_open_device(const char *path){
FNAME();
gpiofd = open(path, O_RDONLY);
if(gpiofd < 0){
LOGERR("Unabled to open %s: %s", path, strerror(errno));
WARNX("Can't open GPIO device %s", path);
return -1;
}
struct gpiochip_info info;
// Query GPIO chip information
if(-1 == ioctl(gpiofd, GPIO_GET_CHIPINFO_IOCTL, &info)){
LOGERR("Unable to get chip info from ioctl: %s", strerror(errno));
WARNX("Unable to get chip info");
close(gpiofd);
return -1;
}
verbose(2, "Chip name: %s", info.name);
verbose(2, "Chip label: %s", info.label);
verbose(2, "Number of lines: %d", info.lines);
rq_in.fd = -1;
rq_out.fd = -1;
return gpiofd;
}
/**
* @brief gpio_set_outputs - set output pins
* @return rq.fd or -1 if failed
*/
int gpio_setup_outputs(){
FNAME();
bzero(&rq_out, sizeof(rq_out));
for(int i = 0; i < GPIO_OUT_NUMBER; ++i)
rq_out.offsets[i] = gpio_outputs[i];
snprintf(rq_out.consumer, GPIO_MAX_NAME_SIZE-1, "outputs");
rq_out.num_lines = GPIO_OUT_NUMBER;
rq_out.config.flags = GPIO_V2_LINE_FLAG_OUTPUT | GPIO_V2_LINE_FLAG_OPEN_DRAIN | GPIO_V2_LINE_FLAG_ACTIVE_LOW | GPIO_V2_LINE_FLAG_BIAS_DISABLED;
rq_out.config.num_attrs = 0;
if(-1 == ioctl(gpiofd, GPIO_V2_GET_LINE_IOCTL, &rq_out)){
LOGERR("Unable setup outputs: %s", strerror(errno));
WARNX("Can't setup outputs");
return -1;
}
return rq_out.fd;
}
static int gpio_setreset(int input, int set){
int idx = -1;
for(int i = 0; i < GPIO_IN_NUMBER; ++i){
if(gpio_inputs[i] == input){
idx = i; break;
}
}
DBG("idx = %d", idx);
if(idx < 0 || idx > GPIO_OUT_NUMBER) return FALSE;
struct gpio_v2_line_values values;
bzero(&values, sizeof(values));
uint64_t val = (1<<idx) & GPIO_OUT_MASK;
values.mask = val;
values.bits = set ? val : 0;
DBG("mask=%" PRIu64 ", val=%" PRIu64, values.mask, values.bits);
if(-1 == ioctl(rq_out.fd, GPIO_V2_LINE_SET_VALUES_IOCTL, &values)){
LOGERR("Unable to change GPIO values (mask=%" PRIu64 ", val=%" PRIu64 ": %s", values.mask, values.bits, strerror(errno));
WARNX("Can't change GPIO values");
return FALSE;
}
return TRUE;
}
/**
* @brief gpio_set_output - set to 1 out pin according to input number
* @param input - number of input pin
* @return true if all OK, false if failed
*/
int gpio_set_output(int input){
return gpio_setreset(input, 1);
}
/**
* @brief gpio_clear_output - clear to 0 output pin
* @param input - number of input pin
* @return true if all OK, false if failed
*/
int gpio_clear_output(int input){
return gpio_setreset(input, 0);
}
int gpio_setup_inputs(){
FNAME();
bzero(&rq_in, sizeof(rq_in));
for(int i = 0; i < GPIO_IN_NUMBER; ++i)
rq_in.offsets[i] = gpio_inputs[i];
snprintf(rq_in.consumer, GPIO_MAX_NAME_SIZE-1, "inputs");
rq_in.num_lines = GPIO_IN_NUMBER;
rq_in.config.flags = GPIO_V2_LINE_FLAG_INPUT | GPIO_V2_LINE_FLAG_BIAS_PULL_UP | GPIO_V2_LINE_FLAG_EDGE_FALLING | GPIO_V2_LINE_FLAG_EDGE_RISING;
rq_in.config.num_attrs = 0;
if(-1 == ioctl(gpiofd, GPIO_V2_GET_LINE_IOCTL, &rq_in)){
LOGERR("Unable to setup inputs: %s", strerror(errno));
WARNX("Can't setup inputs");
return -1;
}
return rq_in.fd;
}
/**
* @brief gpio_poll - poll inputs, return only last event
* @return bit mask of changing inputs (edge falling), 0 if nothing happen or -1 if error
*/
int gpio_poll(uint32_t *up, uint32_t *down){
struct pollfd pfd;
struct gpio_v2_line_event event;
bzero(&pfd, sizeof(pfd));
bzero(&event, sizeof(event));
if(up) *up = 0;
if(down) *down = 0;
do{
pfd.fd = rq_in.fd;
pfd.events = POLLIN | POLLPRI;
int p = poll(&pfd, 1, 1);
if(p == 0) break; // nothing happened
else if(p == -1){
LOGERR("poll() error: %s", strerror(errno));
WARNX("GPIO poll() error");
return -1;
}
DBG("Got GPIO event!");
int r = read(rq_in.fd, &event, sizeof(struct gpio_v2_line_event));
if(r != sizeof(struct gpio_v2_line_event)){
LOGERR("Error reading GPIO data");
WARNX("Error reading GPIO data");
return -1;
}
verbose(1, "Got event:\n\ttimestamp=%" PRIu64 "\n\tid=%d\n\toff=%d\n\tseqno=%d\n\tlineseqno=%d",
event.timestamp_ns, event.id, event.offset, event.seqno, event.line_seqno);
if(up){
if(event.id == GPIO_V2_LINE_EVENT_RISING_EDGE) *up = event.offset;
else *up = 0;
}
if(down){
if(event.id == GPIO_V2_LINE_EVENT_FALLING_EDGE) *down = event.offset;
else *down = 0;
}
}while(1);
return (int)event.offset;
}
void gpio_close(){
if(gpiofd > -1){
close(gpiofd);
if(rq_in.fd > -1) close(rq_in.fd);
if(rq_out.fd > -1) close(rq_out.fd);
}
}

44
SSL_sockets_GPIO/gpio.h Normal file
View File

@ -0,0 +1,44 @@
/*
* This file is part of the sslsosk project.
* Copyright 2023 Edward V. Emelianov <edward.emelianoff@gmail.com>.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#pragma once
#include <stdint.h>
// GPIO polling interval - 50ms
#define GPIO_POLL_INTERVAL (0.05)
// amount of in/out GPIO pins
#define GPIO_IN_NUMBER (6)
#define GPIO_OUT_NUMBER (6)
// maximal GPIO number
#define GPIO_MAX_NUMBER (32)
// 6 outputs
#define GPIO_OUT_MASK 0x3f
// 6 inputs
#define GPIO_IN_MASK 0x3f
int gpio_open_device(const char *path);
int gpio_setup_outputs();
int gpio_setup_inputs();
int gpio_poll(uint32_t *up, uint32_t *down);
int gpio_set_output(int input);
int gpio_clear_output(int input);
void gpio_close();

30
SSL_sockets_GPIO/main.c Normal file
View File

@ -0,0 +1,30 @@
/*
* This file is part of the sslsosk project.
* Copyright 2023 Edward V. Emelianov <edward.emelianoff@gmail.com>.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include <stdio.h>
#include <usefull_macros.h>
#include "daemon.h"
#include "cmdlnopts.h"
int main(int argc, char **argv){
char *self = argv[0];
initial_setup();
parse_args(argc, argv);
return start_daemon(self);
}

153
SSL_sockets_GPIO/server.c Normal file
View File

@ -0,0 +1,153 @@
/*
* This file is part of the sslsosk project.
* Copyright 2023 Edward V. Emelianov <edward.emelianoff@gmail.com>.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include <usefull_macros.h>
#include <stdlib.h>
#include <string.h>
#include "server.h"
static const char *maxcl = "Max client number reached, connect later\n";
static const char *sslerr = "SSL error occured\n";
// return 0 if client disconnected
static int handle_connection(SSL *ssl){
char buf[1024];
int r = read_string(ssl, buf, 1024);
if(r < 0) return 0;
int sd = SSL_get_fd(ssl);
int l = 0;
printf("Client %d msg: \"%s\"\n", sd, buf);
LOGDBG("fd=%d, message=%s", sd, buf);
#ifdef __arm__
const char *ans = "FAIL";
if(handle_message(buf)) ans = "OK";
l = snprintf(buf, 1023, "%s\n", ans);
#else
l = snprintf(buf, 1023, "Hello, your FD=%d\n", sd);
#endif
if(SSL_write(ssl, buf, l) <= 0) WARNX("SSL write error");
return 1;
}
/**
* @brief timeouted_sslaccept - SSL_accept with timeout
* @param ssl - SSL
* @return 1 if connection ready or 0 if error
*/
static int timeouted_sslaccept(SSL *ssl){
double t0 = dtime();
while(dtime() - t0 < ACCEPT_TIMEOUT){
int x = SSL_accept(ssl);
if(x < 0){
int sslerr = SSL_get_error(ssl, x);
if(SSL_ERROR_WANT_READ == sslerr ||
SSL_ERROR_WANT_WRITE == sslerr) continue;
DBG("SSL error %d", sslerr);
return FALSE;
}
else return TRUE;
}
DBG("Timeout");
return FALSE;
}
void serverproc(SSL_CTX *ctx, int fd){
int enable = 1;
if(ioctl(fd, FIONBIO, (void *)&enable) < 0){
LOGERR("Can't make socket nonblocking");
ERRX("ioctl()");
}
int nfd = 1; // only one listening socket @start
struct pollfd poll_set[BACKLOG+1];
memset(poll_set, 0, sizeof(poll_set));
poll_set[0].fd = fd;
poll_set[0].events = POLLIN | POLLPRI;
SSL *ssls[BACKLOG+1] = {0}; // !!! start from 1 - like in poll_set !!!
#ifndef __arm__
double t0 = dtime(), tstart = t0;
int P = 0;
#endif
while(1){
#ifdef __arm__
poll_gpio(ssls, nfd);
#else
char buf[64];
if(dtime() - t0 > 5. && nfd > 1){ // broadcasting messages
//DBG("send ping");
int l = snprintf(buf, 63, "ping #%d; t=%g\n", ++P, dtime() - tstart);
for(int i = nfd-1; i > 0; --i){
DBG("send test to fd[%d]=%d", i, poll_set[i].fd);
if(SSL_write(ssls[i], buf, l) <= 0) WARNX("SSL write error");
}
t0 = dtime();
}
#endif
poll(poll_set, nfd, 1); // max timeout - 1ms
// check for accept()
if(poll_set[0].revents & (POLLIN | POLLPRI)){
struct sockaddr_in addr;
socklen_t len = sizeof(addr);
int client = accept4(fd, (struct sockaddr*)&addr, &len, SOCK_NONBLOCK); // non-blocking for timeout of SSL_accept
DBG("Connection: %s @ %d (fd=%d)\n", inet_ntoa(addr.sin_addr), ntohs(addr.sin_port), client);
LOGMSG("Client %s connected to port %d (fd=%d)", inet_ntoa(addr.sin_addr), ntohs(addr.sin_port), client);
if(nfd == BACKLOG + 1){
LOGWARN("Max amount of connections: disconnect fd=%d", client);
WARNX("Limit of connections reached");
send(client, maxcl, sizeof(maxcl)-1, MSG_NOSIGNAL);
close(client);
}else{
DBG("New ssl");
SSL *ssl = SSL_new(ctx);
SSL_set_fd(ssl, client);
DBG("Accept");
if(timeouted_sslaccept(ssl)){
DBG("OK");
ssls[nfd] = ssl;
bzero(&poll_set[nfd], sizeof(struct pollfd));
poll_set[nfd].fd = client;
poll_set[nfd].events = POLLIN | POLLPRI;
DBG("nfd=%d, fd=%d, events=0x%x", nfd, poll_set[nfd].fd, poll_set[nfd].events);
++nfd;
}else{
LOGERR("SSL_accept()");
WARNX("SSL_accept()");
SSL_free(ssl);
send(client, sslerr, sizeof(sslerr)-1, MSG_NOSIGNAL);
close(client);
}
}
}
// scan connections
for(int fdidx = 1; fdidx < nfd; ++fdidx){
if(poll_set[fdidx].revents) DBG("%d, revents=0x%x", fdidx, poll_set[fdidx].revents);
if((poll_set[fdidx].revents & (POLLIN | POLLPRI)) == 0) continue;
DBG("%d poll", fdidx);
int fd = poll_set[fdidx].fd;
if(!handle_connection(ssls[fdidx])){ // socket closed
SSL_free(ssls[fdidx]);
DBG("Client fd=%d disconnected", fd);
LOGMSG("Client fd=%d disconnected", fd);
close(fd);
if(--nfd > fdidx){ // move last FD to current position
poll_set[fdidx] = poll_set[nfd];
ssls[fdidx] = ssls[nfd];
}
}
}
}
}

26
SSL_sockets_GPIO/server.h Normal file
View File

@ -0,0 +1,26 @@
/*
* This file is part of the sslsosk project.
* Copyright 2023 Edward V. Emelianov <edward.emelianoff@gmail.com>.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#pragma once
#include "sslsock.h"
// timeout of SSL_accept (seconds)
#define ACCEPT_TIMEOUT (10.)
void serverproc(SSL_CTX *ctx, int fd);

View File

@ -0,0 +1 @@
ca/server/server_cert.pem

View File

@ -0,0 +1 @@
ca/server/private/server_key.pem

272
SSL_sockets_GPIO/sslsock.c Normal file
View File

@ -0,0 +1,272 @@
/*
* This file is part of the sslsosk project.
* Copyright 2023 Edward V. Emelianov <edward.emelianoff@gmail.com>.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include <pthread.h>
#include <resolv.h>
#include <signal.h> // pthread_kill
#include <stdio.h>
#include <string.h>
#include <usefull_macros.h>
#include "cmdlnopts.h"
#include "sslsock.h"
#ifdef SERVER
#include "server.h"
#else
#include "client.h"
#endif
#ifdef __arm__
#include "gpio.h"
#endif
#ifdef SERVER
static int OpenConn(int port){
int sd = socket(PF_INET, SOCK_STREAM, 0);
if(sd < 0){
LOGERR("Can't open socket");
ERRX("socket()");
}
int enable = 1;
// allow reuse of descriptor
if(setsockopt(sd, SOL_SOCKET, SO_REUSEADDR, (void *)&enable, sizeof(int)) < 0){
LOGERR("Can't apply SO_REUSEADDR to socket");
ERRX("setsockopt()");
}
struct sockaddr_in addr = {0};
addr.sin_family = AF_INET;
addr.sin_port = htons(port);
addr.sin_addr.s_addr = INADDR_ANY;
if(bind(sd, (struct sockaddr*)&addr, sizeof(addr))){
LOGWARN("Can't bind port %d", port);
ERRX("bind()");
}
if(listen(sd, BACKLOG)){
LOGWARN("Can't listen()");
ERRX("listen()");
}
return sd;
}
#else
static int OpenConn(int port){
FNAME();
int sd;
struct hostent *host;
struct sockaddr_in addr;
if((host = gethostbyname(G.serverhost)) == NULL ){
LOGWARN("gethostbyname(%s) error", G.serverhost);
ERRX("gethostbyname()");
}
sd = socket(PF_INET, SOCK_STREAM, 0);
DBG("sd=%d", sd);
bzero(&addr, sizeof(addr));
addr.sin_family = AF_INET;
addr.sin_port = htons(port);
addr.sin_addr.s_addr = *(long*)(host->h_addr);
if(connect(sd, (struct sockaddr*)&addr, sizeof(addr))){
close(sd);
LOGWARN("Can't connect to %s", G.serverhost);
ERRX("Can't connect to %s", G.serverhost);
}
return sd;
}
#endif
static SSL_CTX* InitCTX(void){
const SSL_METHOD *method;
SSL_CTX *ctx;
OpenSSL_add_all_algorithms();
SSL_load_error_strings();
method =
#ifdef CLIENT
TLS_client_method();
#else
TLS_server_method();
#endif
ctx = SSL_CTX_new(method);
if(!ctx){
LOGWARN("Can't create SSL context");
ERRX("SSL_CTX_new()");
}
if(SSL_CTX_load_verify_locations(ctx, G.ca, NULL) != 1){
LOGWARN("Could not set the CA file location\n");
ERRX("Could not set the CA file location\n");
}
#ifdef SERVER
SSL_CTX_set_client_CA_list(ctx, SSL_load_client_CA_file(G.ca));
#endif
if(SSL_CTX_use_certificate_file(ctx, G.cert, SSL_FILETYPE_PEM) <= 0){
LOGWARN("Can't use SSL certificate %s", G.cert);
ERRX("Can't use SSL certificate %s", G.cert);
}
if(SSL_CTX_use_PrivateKey_file(ctx, G.key, SSL_FILETYPE_PEM) <= 0){
LOGWARN("Can't use SSL key %s", G.key);
ERRX("Can't use SSL key %s", G.key);
}
if(!SSL_CTX_check_private_key(ctx)){
LOGWARN("Private key does not match the public certificate\n");
ERRX("Private key does not match the public certificate\n");
}
SSL_CTX_set_mode(ctx, SSL_MODE_AUTO_RETRY);
#ifdef SERVER
SSL_CTX_set_verify(ctx, // Specify that we need to verify the client as well
SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT,
NULL);
#else
SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, NULL);
#endif
SSL_CTX_set_verify_depth(ctx, 1); // We accept only certificates signed only by the CA himself
return ctx;
}
int open_socket(){
int fd;
#ifdef __arm__
#ifndef SERVER
if(!G.commands){ // open devices if not client
#endif
if(-1 == gpio_open_device(G.gpiodevpath)) ERRX("Can't open GPIO device");
if(-1 == gpio_setup_outputs() || -1 == gpio_setup_inputs()) ERRX("Can't setup GPIO");
#ifndef SERVER
}
#endif
#endif
SSL_library_init();
SSL_CTX *ctx = InitCTX();
fd = OpenConn(atoi(G.port));
#ifdef SERVER
serverproc(ctx, fd);
#else
clientproc(ctx, fd);
#endif
// newer reached
#ifdef __arm__
gpio_close();
#endif
close(fd);
SSL_CTX_free(ctx);
return 0;
}
static int geterrcode(SSL *ssl, int errcode){
int sslerr = SSL_get_error(ssl, errcode);
if(SSL_ERROR_WANT_READ == sslerr ||
SSL_ERROR_WANT_WRITE == sslerr) return 0; // empty call
int sd = SSL_get_fd(ssl);
if(sslerr != SSL_ERROR_ZERO_RETURN){
LOGERR("SSL error %d @client %d", sslerr, sd);
WARNX("SSL error %d @client %d", sslerr, sd);
}
return -1;
}
/**
* @brief read_string - read '\n'-terminated string from SSL
* @param ssl - SSL
* @param buf - buffer for text
* @param l - max buf length (including zero)
* @return amount of bytes read or -1 if client disconnected
*/
int read_string(SSL *ssl, char *buf, int l){
if(!ssl || l < 1) return 0;
bzero(buf, l);
int bytes = SSL_peek(ssl, buf, l);
DBG("Peek: %d (bufsz %d); buf=%s", bytes, l, buf);
if(bytes < 1){ // nothing to read or error
return geterrcode(ssl, bytes);
}
if(bytes < l && buf[bytes-1] != '\n'){ // string not ready, no buffer overfull
return -1; // wait a rest of string
}
bytes = SSL_read(ssl, buf, l);
DBG("Read: %d", bytes);
if(bytes < 1){ // error
return geterrcode(ssl, bytes);
}
buf[bytes-1] = 0; // replace '\n' with 0
return bytes;
}
#ifdef __arm__
/**
* @brief getpin - get pin number from string
* @param str - received command
* @param idx - index of number in `str`
* @return number or -1 if not found
*/
static int getpin(const char *str, int idx){
char *eptr = NULL;
const char *start = str + idx;
long x = strtol(start, &eptr, 10);
if(eptr == start) return -1;
if(x < 0 || x > GPIO_MAX_NUMBER) return -1;
return (int)x;
}
/**
* @brief handle_message - parser or client/server messages
* @param msg - string command
*/
int handle_message(const char *msg){
int act = -1, pin = -1, ret = FALSE;
if(strncmp(msg, "UP", 2) == 0){
act = 1; pin = getpin(msg, 2);
}else if(strncmp(msg, "DOWN", 4) == 0){
act = 0; pin = getpin(msg, 4);
}
DBG("message: '%s', act=%d, pin=%d", msg, act, pin);
if(act != -1 && pin != -1){
int res = FALSE;
if(act == 1) res = gpio_set_output(pin);
else res = gpio_clear_output(pin);
if(!res) LOGERR("Can't change state according to pin %d", pin);
else{
LOGMSG("%s gpio %d", act == 1 ? "Set" : "Reset", pin);
verbose(1, "%s gpio %d", act == 1 ? "Set" : "Reset", pin);
ret = TRUE;
}
}
return ret;
}
/**
* @brief poll_gpio - GPIO polling
* @param ssl - ssl array to write
* @param nfd - amount of descriptors (+1 - starting frol ssls[1])
*/
void poll_gpio(SSL **ssls, int nfd){
static double t0 = 0.;
if(dtime() - t0 < GPIO_POLL_INTERVAL) return;
char buf[64];
uint32_t up, down;
if(gpio_poll(&up, &down) > 0){
if(up) snprintf(buf, 63, "UP%" PRIu32 "\n", up);
else snprintf(buf, 63, "DOWN%" PRIu32 "\n", down);
int l = strlen(buf);
if(nfd == 1){
if(SSL_write(ssls[0], buf, l) <= 0) WARNX("SSL write error");
}else{
for(int i = nfd-1; i > 0; --i){
if(SSL_write(ssls[i], buf, l) <= 0){
WARNX("SSL write error");
}
}
}
}
t0 = dtime();
}
#endif

View File

@ -0,0 +1,45 @@
/*
* This file is part of the sslsosk project.
* Copyright 2023 Edward V. Emelianov <edward.emelianoff@gmail.com>.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#pragma once
#include <arpa/inet.h> // inet_ntop
#include <fcntl.h>
#include <netdb.h> // addrinfo
#include <netinet/in.h>
#include <openssl/err.h>
#include <openssl/ssl.h>
#include <poll.h>
#include <sys/ioctl.h>
#include <sys/socket.h>
#if ! defined CLIENT && ! defined SERVER
#error "Define CLIENT or SERVER before including this file"
#endif
#if defined CLIENT && defined SERVER
#error "Both CLIENT and SERVER defined"
#endif
#define BACKLOG 10
int open_socket();
int read_string(SSL *ssl, char *buf, int l);
#ifdef __arm__
int handle_message(const char *msg);
void poll_gpio(SSL **ssls, int nfd);
#endif

View File

@ -0,0 +1 @@
-std=c17

View File

@ -0,0 +1,9 @@
#define _GNU_SOURCE
#define _XOPEN_SOURCE 1111
#define CLIENT
#define EBUG
#define __arm__ 1
//#define SERVER

View File

@ -0,0 +1 @@
[General]

View File

@ -0,0 +1,160 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE QtCreatorProject>
<!-- Written by QtCreator 8.0.2, 2023-06-27T09:41:54. -->
<qtcreator>
<data>
<variable>EnvironmentId</variable>
<value type="QByteArray">{cf63021e-ef53-49b0-b03b-2f2570cdf3b6}</value>
</data>
<data>
<variable>ProjectExplorer.Project.ActiveTarget</variable>
<value type="int">0</value>
</data>
<data>
<variable>ProjectExplorer.Project.EditorSettings</variable>
<valuemap type="QVariantMap">
<value type="bool" key="EditorConfiguration.AutoIndent">true</value>
<value type="bool" key="EditorConfiguration.AutoSpacesForTabs">false</value>
<value type="bool" key="EditorConfiguration.CamelCaseNavigation">true</value>
<valuemap type="QVariantMap" key="EditorConfiguration.CodeStyle.0">
<value type="QString" key="language">Cpp</value>
<valuemap type="QVariantMap" key="value">
<value type="QByteArray" key="CurrentPreferences">CppGlobal</value>
</valuemap>
</valuemap>
<valuemap type="QVariantMap" key="EditorConfiguration.CodeStyle.1">
<value type="QString" key="language">QmlJS</value>
<valuemap type="QVariantMap" key="value">
<value type="QByteArray" key="CurrentPreferences">QmlJSGlobal</value>
</valuemap>
</valuemap>
<value type="int" key="EditorConfiguration.CodeStyle.Count">2</value>
<value type="QByteArray" key="EditorConfiguration.Codec">KOI8-R</value>
<value type="bool" key="EditorConfiguration.ConstrainTooltips">false</value>
<value type="int" key="EditorConfiguration.IndentSize">4</value>
<value type="bool" key="EditorConfiguration.KeyboardTooltips">false</value>
<value type="int" key="EditorConfiguration.MarginColumn">80</value>
<value type="bool" key="EditorConfiguration.MouseHiding">true</value>
<value type="bool" key="EditorConfiguration.MouseNavigation">true</value>
<value type="int" key="EditorConfiguration.PaddingMode">1</value>
<value type="bool" key="EditorConfiguration.PreferSingleLineComments">false</value>
<value type="bool" key="EditorConfiguration.ScrollWheelZooming">false</value>
<value type="bool" key="EditorConfiguration.ShowMargin">false</value>
<value type="int" key="EditorConfiguration.SmartBackspaceBehavior">1</value>
<value type="bool" key="EditorConfiguration.SmartSelectionChanging">true</value>
<value type="bool" key="EditorConfiguration.SpacesForTabs">true</value>
<value type="int" key="EditorConfiguration.TabKeyBehavior">0</value>
<value type="int" key="EditorConfiguration.TabSize">8</value>
<value type="bool" key="EditorConfiguration.UseGlobal">true</value>
<value type="bool" key="EditorConfiguration.UseIndenter">false</value>
<value type="int" key="EditorConfiguration.Utf8BomBehavior">2</value>
<value type="bool" key="EditorConfiguration.addFinalNewLine">true</value>
<value type="bool" key="EditorConfiguration.cleanIndentation">true</value>
<value type="bool" key="EditorConfiguration.cleanWhitespace">true</value>
<value type="QString" key="EditorConfiguration.ignoreFileTypes">*.md, *.MD, Makefile</value>
<value type="bool" key="EditorConfiguration.inEntireDocument">true</value>
<value type="bool" key="EditorConfiguration.skipTrailingWhitespace">true</value>
</valuemap>
</data>
<data>
<variable>ProjectExplorer.Project.PluginSettings</variable>
<valuemap type="QVariantMap">
<valuemap type="QVariantMap" key="ClangTools">
<value type="bool" key="ClangTools.AnalyzeOpenFiles">true</value>
<value type="bool" key="ClangTools.BuildBeforeAnalysis">true</value>
<value type="QString" key="ClangTools.DiagnosticConfig">Builtin.DefaultTidyAndClazy</value>
<value type="int" key="ClangTools.ParallelJobs">4</value>
<valuelist type="QVariantList" key="ClangTools.SelectedDirs"/>
<valuelist type="QVariantList" key="ClangTools.SelectedFiles"/>
<valuelist type="QVariantList" key="ClangTools.SuppressedDiagnostics"/>
<value type="bool" key="ClangTools.UseGlobalSettings">true</value>
</valuemap>
</valuemap>
</data>
<data>
<variable>ProjectExplorer.Project.Target.0</variable>
<valuemap type="QVariantMap">
<value type="QString" key="DeviceType">Desktop</value>
<value type="QString" key="ProjectExplorer.ProjectConfiguration.DefaultDisplayName">Desktop</value>
<value type="QString" key="ProjectExplorer.ProjectConfiguration.DisplayName">Desktop</value>
<value type="QString" key="ProjectExplorer.ProjectConfiguration.Id">{91347f2c-5221-46a7-80b1-0a054ca02f79}</value>
<value type="int" key="ProjectExplorer.Target.ActiveBuildConfiguration">0</value>
<value type="int" key="ProjectExplorer.Target.ActiveDeployConfiguration">0</value>
<value type="int" key="ProjectExplorer.Target.ActiveRunConfiguration">0</value>
<valuemap type="QVariantMap" key="ProjectExplorer.Target.BuildConfiguration.0">
<value type="QString" key="ProjectExplorer.BuildConfiguration.BuildDirectory">/home/eddy/Docs/SAO/WEB/SSL_Socket_snippet</value>
<valuemap type="QVariantMap" key="ProjectExplorer.BuildConfiguration.BuildStepList.0">
<valuemap type="QVariantMap" key="ProjectExplorer.BuildStepList.Step.0">
<valuelist type="QVariantList" key="GenericProjectManager.GenericMakeStep.BuildTargets">
<value type="QString">all</value>
</valuelist>
<value type="bool" key="ProjectExplorer.BuildStep.Enabled">true</value>
<value type="QString" key="ProjectExplorer.ProjectConfiguration.Id">GenericProjectManager.GenericMakeStep</value>
</valuemap>
<value type="int" key="ProjectExplorer.BuildStepList.StepsCount">1</value>
<value type="QString" key="ProjectExplorer.ProjectConfiguration.DefaultDisplayName">Сборка</value>
<value type="QString" key="ProjectExplorer.ProjectConfiguration.DisplayName">Сборка</value>
<value type="QString" key="ProjectExplorer.ProjectConfiguration.Id">ProjectExplorer.BuildSteps.Build</value>
</valuemap>
<valuemap type="QVariantMap" key="ProjectExplorer.BuildConfiguration.BuildStepList.1">
<valuemap type="QVariantMap" key="ProjectExplorer.BuildStepList.Step.0">
<valuelist type="QVariantList" key="GenericProjectManager.GenericMakeStep.BuildTargets">
<value type="QString">clean</value>
</valuelist>
<value type="bool" key="ProjectExplorer.BuildStep.Enabled">true</value>
<value type="QString" key="ProjectExplorer.ProjectConfiguration.Id">GenericProjectManager.GenericMakeStep</value>
</valuemap>
<value type="int" key="ProjectExplorer.BuildStepList.StepsCount">1</value>
<value type="QString" key="ProjectExplorer.ProjectConfiguration.DefaultDisplayName">Очистка</value>
<value type="QString" key="ProjectExplorer.ProjectConfiguration.DisplayName">Очистка</value>
<value type="QString" key="ProjectExplorer.ProjectConfiguration.Id">ProjectExplorer.BuildSteps.Clean</value>
</valuemap>
<value type="int" key="ProjectExplorer.BuildConfiguration.BuildStepListCount">2</value>
<value type="bool" key="ProjectExplorer.BuildConfiguration.ClearSystemEnvironment">false</value>
<valuelist type="QVariantList" key="ProjectExplorer.BuildConfiguration.CustomParsers"/>
<value type="bool" key="ProjectExplorer.BuildConfiguration.ParseStandardOutput">false</value>
<valuelist type="QVariantList" key="ProjectExplorer.BuildConfiguration.UserEnvironmentChanges"/>
<value type="QString" key="ProjectExplorer.ProjectConfiguration.DisplayName">По умолчанию</value>
<value type="QString" key="ProjectExplorer.ProjectConfiguration.Id">GenericProjectManager.GenericBuildConfiguration</value>
</valuemap>
<value type="int" key="ProjectExplorer.Target.BuildConfigurationCount">1</value>
<valuemap type="QVariantMap" key="ProjectExplorer.Target.DeployConfiguration.0">
<valuemap type="QVariantMap" key="ProjectExplorer.BuildConfiguration.BuildStepList.0">
<value type="int" key="ProjectExplorer.BuildStepList.StepsCount">0</value>
<value type="QString" key="ProjectExplorer.ProjectConfiguration.DefaultDisplayName">Развёртывание</value>
<value type="QString" key="ProjectExplorer.ProjectConfiguration.DisplayName">Развёртывание</value>
<value type="QString" key="ProjectExplorer.ProjectConfiguration.Id">ProjectExplorer.BuildSteps.Deploy</value>
</valuemap>
<value type="int" key="ProjectExplorer.BuildConfiguration.BuildStepListCount">1</value>
<valuemap type="QVariantMap" key="ProjectExplorer.DeployConfiguration.CustomData"/>
<value type="bool" key="ProjectExplorer.DeployConfiguration.CustomDataEnabled">false</value>
<value type="QString" key="ProjectExplorer.ProjectConfiguration.Id">ProjectExplorer.DefaultDeployConfiguration</value>
</valuemap>
<value type="int" key="ProjectExplorer.Target.DeployConfigurationCount">1</value>
<valuemap type="QVariantMap" key="ProjectExplorer.Target.RunConfiguration.0">
<valuelist type="QVariantList" key="CustomOutputParsers"/>
<value type="int" key="PE.EnvironmentAspect.Base">2</value>
<valuelist type="QVariantList" key="PE.EnvironmentAspect.Changes"/>
<value type="QString" key="ProjectExplorer.ProjectConfiguration.Id">ProjectExplorer.CustomExecutableRunConfiguration</value>
<value type="QString" key="ProjectExplorer.RunConfiguration.BuildKey"></value>
<value type="bool" key="RunConfiguration.UseCppDebugger">false</value>
<value type="bool" key="RunConfiguration.UseCppDebuggerAuto">true</value>
<value type="bool" key="RunConfiguration.UseQmlDebugger">false</value>
<value type="bool" key="RunConfiguration.UseQmlDebuggerAuto">true</value>
</valuemap>
<value type="int" key="ProjectExplorer.Target.RunConfigurationCount">1</value>
</valuemap>
</data>
<data>
<variable>ProjectExplorer.Project.TargetCount</variable>
<value type="int">1</value>
</data>
<data>
<variable>ProjectExplorer.Project.Updater.FileVersion</variable>
<value type="int">22</value>
</data>
<data>
<variable>Version</variable>
<value type="int">22</value>
</data>
</qtcreator>

View File

@ -0,0 +1 @@
-std=c++17

View File

@ -0,0 +1,13 @@
client.c
client.h
cmdlnopts.c
cmdlnopts.h
daemon.c
daemon.h
gpio.c
gpio.h
main.c
server.c
server.h
sslsock.c
sslsock.h

View File

@ -0,0 +1 @@
.