|  | @@ -444,7 +444,7 @@ CookieHandler(struct mg_connection *conn, void *cbdata)
 | 
	
		
			
				|  |  |  	mg_printf(conn, "Content-Type: text/html\r\n\r\n");
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  	mg_printf(conn, "<html><body>");
 | 
	
		
			
				|  |  | -	mg_printf(conn, "<h2>This is the CookieHandler.</h2>", cbdata);
 | 
	
		
			
				|  |  | +	mg_printf(conn, "<h2>This is the CookieHandler.</h2>");
 | 
	
		
			
				|  |  |  	mg_printf(conn, "<p>The actual uri is %s</p>", req_info->uri);
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  	if (first_str[0] == 0) {
 | 
	
	
		
			
				|  | @@ -634,12 +634,85 @@ InformWebsockets(struct mg_context *ctx)
 | 
	
		
			
				|  |  |  #endif
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | +#ifdef USE_SSL_DH
 | 
	
		
			
				|  |  | +#include "openssl/ssl.h"
 | 
	
		
			
				|  |  | +#include "openssl/dh.h"
 | 
	
		
			
				|  |  | +#include "openssl/ec.h"
 | 
	
		
			
				|  |  | +#include "openssl/evp.h"
 | 
	
		
			
				|  |  | +#include "openssl/ecdsa.h"
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +DH *
 | 
	
		
			
				|  |  | +get_dh2236()
 | 
	
		
			
				|  |  | +{
 | 
	
		
			
				|  |  | +	static unsigned char dh2236_p[] = {
 | 
	
		
			
				|  |  | +	    0x0E, 0x97, 0x6E, 0x6A, 0x88, 0x84, 0xD2, 0xD7, 0x55, 0x6A, 0x17, 0xB7,
 | 
	
		
			
				|  |  | +	    0x81, 0x9A, 0x98, 0xBC, 0x7E, 0xD1, 0x6A, 0x44, 0xB1, 0x18, 0xE6, 0x25,
 | 
	
		
			
				|  |  | +	    0x3A, 0x62, 0x35, 0xF0, 0x41, 0x91, 0xE2, 0x16, 0x43, 0x9D, 0x8F, 0x7D,
 | 
	
		
			
				|  |  | +	    0x5D, 0xDA, 0x85, 0x47, 0x25, 0xC4, 0xBA, 0x68, 0x0A, 0x87, 0xDC, 0x2C,
 | 
	
		
			
				|  |  | +	    0x33, 0xF9, 0x75, 0x65, 0x17, 0xCB, 0x8B, 0x80, 0xFE, 0xE0, 0xA8, 0xAF,
 | 
	
		
			
				|  |  | +	    0xC7, 0x9E, 0x82, 0xBE, 0x6F, 0x1F, 0x00, 0x04, 0xBD, 0x69, 0x50, 0x8D,
 | 
	
		
			
				|  |  | +	    0x9C, 0x3C, 0x41, 0x69, 0x21, 0x4E, 0x86, 0xC8, 0x2B, 0xCC, 0x07, 0x4D,
 | 
	
		
			
				|  |  | +	    0xCF, 0xE4, 0xA2, 0x90, 0x8F, 0x66, 0xA9, 0xEF, 0xF7, 0xFC, 0x6F, 0x5F,
 | 
	
		
			
				|  |  | +	    0x06, 0x22, 0x00, 0xCB, 0xCB, 0xC3, 0x98, 0x3F, 0x06, 0xB9, 0xEC, 0x48,
 | 
	
		
			
				|  |  | +	    0x3B, 0x70, 0x6E, 0x94, 0xE9, 0x16, 0xE1, 0xB7, 0x63, 0x2E, 0xAB, 0xB2,
 | 
	
		
			
				|  |  | +	    0xF3, 0x84, 0xB5, 0x3D, 0xD7, 0x74, 0xF1, 0x6A, 0xD1, 0xEF, 0xE8, 0x04,
 | 
	
		
			
				|  |  | +	    0x18, 0x76, 0xD2, 0xD6, 0xB0, 0xB7, 0x71, 0xB6, 0x12, 0x8F, 0xD1, 0x33,
 | 
	
		
			
				|  |  | +	    0xAB, 0x49, 0xAB, 0x09, 0x97, 0x35, 0x9D, 0x4B, 0xBB, 0x54, 0x22, 0x6E,
 | 
	
		
			
				|  |  | +	    0x1A, 0x33, 0x18, 0x02, 0x8A, 0xF4, 0x7C, 0x0A, 0xCE, 0x89, 0x75, 0x2D,
 | 
	
		
			
				|  |  | +	    0x10, 0x68, 0x25, 0xA9, 0x6E, 0xCD, 0x97, 0x49, 0xED, 0xAE, 0xE6, 0xA7,
 | 
	
		
			
				|  |  | +	    0xB0, 0x07, 0x26, 0x25, 0x60, 0x15, 0x2B, 0x65, 0x88, 0x17, 0xF2, 0x5D,
 | 
	
		
			
				|  |  | +	    0x2C, 0xF6, 0x2A, 0x7A, 0x8C, 0xAD, 0xB6, 0x0A, 0xA2, 0x57, 0xB0, 0xC1,
 | 
	
		
			
				|  |  | +	    0x0E, 0x5C, 0xA8, 0xA1, 0x96, 0x58, 0x9A, 0x2B, 0xD4, 0xC0, 0x8A, 0xCF,
 | 
	
		
			
				|  |  | +	    0x91, 0x25, 0x94, 0xB4, 0x14, 0xA7, 0xE4, 0xE2, 0x1B, 0x64, 0x5F, 0xD2,
 | 
	
		
			
				|  |  | +	    0xCA, 0x70, 0x46, 0xD0, 0x2C, 0x95, 0x6B, 0x9A, 0xFB, 0x83, 0xF9, 0x76,
 | 
	
		
			
				|  |  | +	    0xE6, 0xD4, 0xA4, 0xA1, 0x2B, 0x2F, 0xF5, 0x1D, 0xE4, 0x06, 0xAF, 0x7D,
 | 
	
		
			
				|  |  | +	    0x22, 0xF3, 0x04, 0x30, 0x2E, 0x4C, 0x64, 0x12, 0x5B, 0xB0, 0x55, 0x3E,
 | 
	
		
			
				|  |  | +	    0xC0, 0x5E, 0x56, 0xCB, 0x99, 0xBC, 0xA8, 0xD9, 0x23, 0xF5, 0x57, 0x40,
 | 
	
		
			
				|  |  | +	    0xF0, 0x52, 0x85, 0x9B,
 | 
	
		
			
				|  |  | +	};
 | 
	
		
			
				|  |  | +	static unsigned char dh2236_g[] = {
 | 
	
		
			
				|  |  | +	    0x02,
 | 
	
		
			
				|  |  | +	};
 | 
	
		
			
				|  |  | +	DH *dh;
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +	if ((dh = DH_new()) == NULL)
 | 
	
		
			
				|  |  | +		return (NULL);
 | 
	
		
			
				|  |  | +	dh->p = BN_bin2bn(dh2236_p, sizeof(dh2236_p), NULL);
 | 
	
		
			
				|  |  | +	dh->g = BN_bin2bn(dh2236_g, sizeof(dh2236_g), NULL);
 | 
	
		
			
				|  |  | +	if ((dh->p == NULL) || (dh->g == NULL)) {
 | 
	
		
			
				|  |  | +		DH_free(dh);
 | 
	
		
			
				|  |  | +		return (NULL);
 | 
	
		
			
				|  |  | +	}
 | 
	
		
			
				|  |  | +	return (dh);
 | 
	
		
			
				|  |  | +}
 | 
	
		
			
				|  |  | +#endif
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  |  #ifndef NO_SSL
 | 
	
		
			
				|  |  |  int
 | 
	
		
			
				|  |  |  init_ssl(void *ssl_context, void *user_data)
 | 
	
		
			
				|  |  |  {
 | 
	
		
			
				|  |  |  	/* Add application specific SSL initialization */
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | +	struct ssl_ctx_st *ctx = (struct ssl_ctx_st *)ssl_context;
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +#ifdef USE_SSL_DH
 | 
	
		
			
				|  |  | +	/* example from https://github.com/civetweb/civetweb/issues/347 */
 | 
	
		
			
				|  |  | +	DH *dh = get_dh2236();
 | 
	
		
			
				|  |  | +	if (!dh)
 | 
	
		
			
				|  |  | +		return -1;
 | 
	
		
			
				|  |  | +	if (1 != SSL_CTX_set_tmp_dh(ctx, dh))
 | 
	
		
			
				|  |  | +		return -1;
 | 
	
		
			
				|  |  | +	DH_free(dh);
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +	EC_KEY *ecdh = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
 | 
	
		
			
				|  |  | +	if (!ecdh)
 | 
	
		
			
				|  |  | +		return -1;
 | 
	
		
			
				|  |  | +	if (1 != SSL_CTX_set_tmp_ecdh(ctx, ecdh))
 | 
	
		
			
				|  |  | +		return -1;
 | 
	
		
			
				|  |  | +	EC_KEY_free(ecdh);
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +	printf("ECDH ciphers initialized\n");
 | 
	
		
			
				|  |  | +#endif
 | 
	
		
			
				|  |  |  	return 0;
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  |  #endif
 | 
	
	
		
			
				|  | @@ -648,27 +721,32 @@ init_ssl(void *ssl_context, void *user_data)
 | 
	
		
			
				|  |  |  int
 | 
	
		
			
				|  |  |  main(int argc, char *argv[])
 | 
	
		
			
				|  |  |  {
 | 
	
		
			
				|  |  | -	const char *options[] = {"document_root",
 | 
	
		
			
				|  |  | -	                         DOCUMENT_ROOT,
 | 
	
		
			
				|  |  | -	                         "listening_ports",
 | 
	
		
			
				|  |  | -	                         PORT,
 | 
	
		
			
				|  |  | -	                         "request_timeout_ms",
 | 
	
		
			
				|  |  | -	                         "10000",
 | 
	
		
			
				|  |  | -	                         "error_log_file",
 | 
	
		
			
				|  |  | -	                         "error.log",
 | 
	
		
			
				|  |  | +	const char *options[] = {
 | 
	
		
			
				|  |  | +	    "document_root",
 | 
	
		
			
				|  |  | +	    DOCUMENT_ROOT,
 | 
	
		
			
				|  |  | +	    "listening_ports",
 | 
	
		
			
				|  |  | +	    PORT,
 | 
	
		
			
				|  |  | +	    "request_timeout_ms",
 | 
	
		
			
				|  |  | +	    "10000",
 | 
	
		
			
				|  |  | +	    "error_log_file",
 | 
	
		
			
				|  |  | +	    "error.log",
 | 
	
		
			
				|  |  |  #ifdef USE_WEBSOCKET
 | 
	
		
			
				|  |  | -	                         "websocket_timeout_ms",
 | 
	
		
			
				|  |  | -	                         "3600000",
 | 
	
		
			
				|  |  | +	    "websocket_timeout_ms",
 | 
	
		
			
				|  |  | +	    "3600000",
 | 
	
		
			
				|  |  |  #endif
 | 
	
		
			
				|  |  |  #ifndef NO_SSL
 | 
	
		
			
				|  |  | -	                         "ssl_certificate",
 | 
	
		
			
				|  |  | -	                         "../../resources/cert/server.pem",
 | 
	
		
			
				|  |  | -                             "ssl_protocol_version",
 | 
	
		
			
				|  |  | -                             "3",
 | 
	
		
			
				|  |  | -                             "ssl_cipher_list",
 | 
	
		
			
				|  |  | -                             "DES-CBC3-SHA:AES128-SHA:AES128-GCM-SHA256"
 | 
	
		
			
				|  |  | +	    "ssl_certificate",
 | 
	
		
			
				|  |  | +	    "../../resources/cert/server.pem",
 | 
	
		
			
				|  |  | +	    "ssl_protocol_version",
 | 
	
		
			
				|  |  | +	    "3",
 | 
	
		
			
				|  |  | +	    "ssl_cipher_list",
 | 
	
		
			
				|  |  | +#ifdef USE_SSL_DH
 | 
	
		
			
				|  |  | +	    "ECDHE-RSA-AES256-GCM-SHA384:DES-CBC3-SHA:AES128-SHA:AES128-GCM-SHA256",
 | 
	
		
			
				|  |  | +#else
 | 
	
		
			
				|  |  | +	    "DES-CBC3-SHA:AES128-SHA:AES128-GCM-SHA256",
 | 
	
		
			
				|  |  | +#endif
 | 
	
		
			
				|  |  |  #endif
 | 
	
		
			
				|  |  | -	                         0};
 | 
	
		
			
				|  |  | +	    0};
 | 
	
		
			
				|  |  |  	struct mg_callbacks callbacks;
 | 
	
		
			
				|  |  |  	struct mg_context *ctx;
 | 
	
		
			
				|  |  |  	struct mg_server_ports ports[32];
 | 
	
	
		
			
				|  | @@ -827,4 +905,3 @@ main(int argc, char *argv[])
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  	return EXIT_SUCCESS;
 | 
	
		
			
				|  |  |  }
 | 
	
		
			
				|  |  | -
 |