Example TLS client with wolfSSL

Dependencies:   EthernetInterface-FRDM-k64F mbed-rtos mbed wolfSSL-TLS13-Beta Example-client-tls

Dependents:   Example-client-tls

Committer:
wolfSSL
Date:
Tue Aug 22 11:02:42 2017 +0000
Revision:
10:37e38ee43b8f
wolfSSL 3.12.0 - TLS1.3

Who changed what in which revision?

UserRevisionLine numberNew contents of line
wolfSSL 10:37e38ee43b8f 1 /* client-tcp.c
wolfSSL 10:37e38ee43b8f 2 *
wolfSSL 10:37e38ee43b8f 3 * Copyright (C) 2006-2017 wolfSSL Inc.
wolfSSL 10:37e38ee43b8f 4 *
wolfSSL 10:37e38ee43b8f 5 * This file is part of wolfSSL. (formerly known as CyaSSL)
wolfSSL 10:37e38ee43b8f 6 *
wolfSSL 10:37e38ee43b8f 7 * wolfSSL is free software; you can redistribute it and/or modify
wolfSSL 10:37e38ee43b8f 8 * it under the terms of the GNU General Public License as published by
wolfSSL 10:37e38ee43b8f 9 * the Free Software Foundation; either version 2 of the License, or
wolfSSL 10:37e38ee43b8f 10 * (at your option) any later version.
wolfSSL 10:37e38ee43b8f 11 *
wolfSSL 10:37e38ee43b8f 12 * wolfSSL is distributed in the hope that it will be useful,
wolfSSL 10:37e38ee43b8f 13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
wolfSSL 10:37e38ee43b8f 14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
wolfSSL 10:37e38ee43b8f 15 * GNU General Public License for more details.
wolfSSL 10:37e38ee43b8f 16 *
wolfSSL 10:37e38ee43b8f 17 * You should have received a copy of the GNU General Public License
wolfSSL 10:37e38ee43b8f 18 * along with this program; if not, write to the Free Software
wolfSSL 10:37e38ee43b8f 19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
wolfSSL 10:37e38ee43b8f 20 */
wolfSSL 10:37e38ee43b8f 21
wolfSSL 10:37e38ee43b8f 22 #include "mbed.h"
wolfSSL 10:37e38ee43b8f 23 #include "EthernetInterface.h"
wolfSSL 10:37e38ee43b8f 24 #include <stdio.h>
wolfSSL 10:37e38ee43b8f 25 #include <stdlib.h>
wolfSSL 10:37e38ee43b8f 26 #include <string.h>
wolfSSL 10:37e38ee43b8f 27 #include <wolfssl/ssl.h> /* wolfSSL security library */
wolfSSL 10:37e38ee43b8f 28 #include <wolfssl/wolfcrypt/error-crypt.h>
wolfSSL 10:37e38ee43b8f 29 #include <user_settings.h>
wolfSSL 10:37e38ee43b8f 30
wolfSSL 10:37e38ee43b8f 31 #define MAXDATASIZE (1024*4)
wolfSSL 10:37e38ee43b8f 32
wolfSSL 10:37e38ee43b8f 33 static int SocketReceive(WOLFSSL* ssl, char *buf, int sz, void *sock)
wolfSSL 10:37e38ee43b8f 34 {
wolfSSL 10:37e38ee43b8f 35 return ((TCPSocketConnection *)sock)->receive(buf, sz) ;
wolfSSL 10:37e38ee43b8f 36 }
wolfSSL 10:37e38ee43b8f 37
wolfSSL 10:37e38ee43b8f 38 static int SocketSend(WOLFSSL* ssl, char *buf, int sz, void *sock)
wolfSSL 10:37e38ee43b8f 39 {
wolfSSL 10:37e38ee43b8f 40 return ((TCPSocketConnection *)sock)->send(buf, sz);
wolfSSL 10:37e38ee43b8f 41 }
wolfSSL 10:37e38ee43b8f 42
wolfSSL 10:37e38ee43b8f 43 static int getline(char *prompt, char *buff, int size)
wolfSSL 10:37e38ee43b8f 44 {
wolfSSL 10:37e38ee43b8f 45 int sz ;
wolfSSL 10:37e38ee43b8f 46
wolfSSL 10:37e38ee43b8f 47 printf("%s", prompt) ;
wolfSSL 10:37e38ee43b8f 48 for(sz = 0 ; (sz < size) && ((*buff = getchar()) != '\r'); sz++, buff++) {
wolfSSL 10:37e38ee43b8f 49 putchar(*buff) ;
wolfSSL 10:37e38ee43b8f 50 if(*buff == '\\') {
wolfSSL 10:37e38ee43b8f 51 if(++sz >= size)break ;
wolfSSL 10:37e38ee43b8f 52 *buff = getchar() ;
wolfSSL 10:37e38ee43b8f 53 putchar(*buff) ;
wolfSSL 10:37e38ee43b8f 54 switch(*buff) {
wolfSSL 10:37e38ee43b8f 55 case 'n' :
wolfSSL 10:37e38ee43b8f 56 *buff = '\n' ;
wolfSSL 10:37e38ee43b8f 57 break ;
wolfSSL 10:37e38ee43b8f 58 case 'r' :
wolfSSL 10:37e38ee43b8f 59 *buff = '\r' ;
wolfSSL 10:37e38ee43b8f 60 break ;
wolfSSL 10:37e38ee43b8f 61 case 't' :
wolfSSL 10:37e38ee43b8f 62 *buff = '\t' ;
wolfSSL 10:37e38ee43b8f 63 break ;
wolfSSL 10:37e38ee43b8f 64 case '\\':
wolfSSL 10:37e38ee43b8f 65 *buff = '\\' ;
wolfSSL 10:37e38ee43b8f 66 break ;
wolfSSL 10:37e38ee43b8f 67 default:
wolfSSL 10:37e38ee43b8f 68 buff[1] = buff[0] ;
wolfSSL 10:37e38ee43b8f 69 buff[0] = '\\' ;
wolfSSL 10:37e38ee43b8f 70 buff++ ;
wolfSSL 10:37e38ee43b8f 71 }
wolfSSL 10:37e38ee43b8f 72 } else if(*buff == '\b') {
wolfSSL 10:37e38ee43b8f 73 if(sz >= 2) {
wolfSSL 10:37e38ee43b8f 74 buff-=2 ;
wolfSSL 10:37e38ee43b8f 75 sz-=2;
wolfSSL 10:37e38ee43b8f 76 }
wolfSSL 10:37e38ee43b8f 77 }
wolfSSL 10:37e38ee43b8f 78 } ;
wolfSSL 10:37e38ee43b8f 79 putchar('\n') ;
wolfSSL 10:37e38ee43b8f 80 *buff = '\0' ;
wolfSSL 10:37e38ee43b8f 81 return sz ;
wolfSSL 10:37e38ee43b8f 82 }
wolfSSL 10:37e38ee43b8f 83
wolfSSL 10:37e38ee43b8f 84 /*
wolfSSL 10:37e38ee43b8f 85 * clients initial contact with server. Socket to connect to: sock
wolfSSL 10:37e38ee43b8f 86 */
wolfSSL 10:37e38ee43b8f 87 int ClientGreet(TCPSocketConnection *socket, WOLFSSL *ssl)
wolfSSL 10:37e38ee43b8f 88 {
wolfSSL 10:37e38ee43b8f 89 /* data to send to the server, data recieved from the server */
wolfSSL 10:37e38ee43b8f 90 char sendBuff[MAXDATASIZE], rcvBuff[MAXDATASIZE] = {0};
wolfSSL 10:37e38ee43b8f 91 int ret ;
wolfSSL 10:37e38ee43b8f 92
wolfSSL 10:37e38ee43b8f 93 ret = getline("Message for server: ", sendBuff, MAXDATASIZE);
wolfSSL 10:37e38ee43b8f 94 printf("Send[%d]:\n%s\n", ret, sendBuff) ;
wolfSSL 10:37e38ee43b8f 95 if (wolfSSL_write(ssl, sendBuff, strlen(sendBuff)) < 0) {
wolfSSL 10:37e38ee43b8f 96 /* the message is not able to send, or error trying */
wolfSSL 10:37e38ee43b8f 97 ret = wolfSSL_get_error(ssl, 0);
wolfSSL 10:37e38ee43b8f 98 printf("Write error[%d]\n", ret, wc_GetErrorString(ret));
wolfSSL 10:37e38ee43b8f 99 return EXIT_FAILURE;
wolfSSL 10:37e38ee43b8f 100 }
wolfSSL 10:37e38ee43b8f 101 printf("Recieved:\n");
wolfSSL 10:37e38ee43b8f 102 while(1) {
wolfSSL 10:37e38ee43b8f 103 if ((ret = wolfSSL_read(ssl, rcvBuff, sizeof(rcvBuff)-1)) < 0) {
wolfSSL 10:37e38ee43b8f 104 if(ret == 0)break ;
wolfSSL 10:37e38ee43b8f 105 /* the server failed to send data, or error trying */
wolfSSL 10:37e38ee43b8f 106 ret = wolfSSL_get_error(ssl, 0);
wolfSSL 10:37e38ee43b8f 107 printf("Read error[%d], %s\n", ret, wc_GetErrorString(ret));
wolfSSL 10:37e38ee43b8f 108 return EXIT_FAILURE;
wolfSSL 10:37e38ee43b8f 109 }
wolfSSL 10:37e38ee43b8f 110 rcvBuff[ret] = '\0' ;
wolfSSL 10:37e38ee43b8f 111 printf("%s", rcvBuff);
wolfSSL 10:37e38ee43b8f 112 if((rcvBuff[ret-3] == '\n')&&
wolfSSL 10:37e38ee43b8f 113 (rcvBuff[ret-2] == '\n')&&
wolfSSL 10:37e38ee43b8f 114 (rcvBuff[ret-1] == '\n'))break ;
wolfSSL 10:37e38ee43b8f 115 }
wolfSSL 10:37e38ee43b8f 116 return ret;
wolfSSL 10:37e38ee43b8f 117 }
wolfSSL 10:37e38ee43b8f 118
wolfSSL 10:37e38ee43b8f 119
wolfSSL 10:37e38ee43b8f 120 /*
wolfSSL 10:37e38ee43b8f 121 * applies TLS 1.2 security layer to data being sent.
wolfSSL 10:37e38ee43b8f 122 */
wolfSSL 10:37e38ee43b8f 123 int Security(TCPSocketConnection *socket)
wolfSSL 10:37e38ee43b8f 124 {
wolfSSL 10:37e38ee43b8f 125 WOLFSSL_CTX* ctx;
wolfSSL 10:37e38ee43b8f 126 WOLFSSL* ssl; /* create WOLFSSL object */
wolfSSL 10:37e38ee43b8f 127 int ret = 0;
wolfSSL 10:37e38ee43b8f 128
wolfSSL 10:37e38ee43b8f 129 /* create and initiLize WOLFSSL_CTX structure */
wolfSSL 10:37e38ee43b8f 130 #ifdef WOLFSSL_TLS13
wolfSSL 10:37e38ee43b8f 131 if ((ctx = wolfSSL_CTX_new(wolfTLSv1_3_client_method())) == NULL) {
wolfSSL 10:37e38ee43b8f 132 #else
wolfSSL 10:37e38ee43b8f 133 if ((ctx = wolfSSL_CTX_new(wolfTLSv1_2_client_method())) == NULL) {
wolfSSL 10:37e38ee43b8f 134 #endif
wolfSSL 10:37e38ee43b8f 135 printf("SSL_CTX_new error.\n");
wolfSSL 10:37e38ee43b8f 136 return EXIT_FAILURE;
wolfSSL 10:37e38ee43b8f 137 }
wolfSSL 10:37e38ee43b8f 138 wolfSSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, 0);
wolfSSL 10:37e38ee43b8f 139 wolfSSL_SetIORecv(ctx, SocketReceive) ;
wolfSSL 10:37e38ee43b8f 140 wolfSSL_SetIOSend(ctx, SocketSend) ;
wolfSSL 10:37e38ee43b8f 141
wolfSSL 10:37e38ee43b8f 142 if ((ssl = wolfSSL_new(ctx)) == NULL) {
wolfSSL 10:37e38ee43b8f 143 printf("wolfSSL_new error.\n");
wolfSSL 10:37e38ee43b8f 144 return EXIT_FAILURE;
wolfSSL 10:37e38ee43b8f 145 }
wolfSSL 10:37e38ee43b8f 146
wolfSSL 10:37e38ee43b8f 147 wolfSSL_SetIOReadCtx(ssl, (void *)socket) ;
wolfSSL 10:37e38ee43b8f 148 wolfSSL_SetIOWriteCtx(ssl, (void *)socket) ;
wolfSSL 10:37e38ee43b8f 149
wolfSSL 10:37e38ee43b8f 150 ret = wolfSSL_connect(ssl);
wolfSSL 10:37e38ee43b8f 151 if (ret == SSL_SUCCESS) {
wolfSSL 10:37e38ee43b8f 152 printf("TLS Connected\n") ;
wolfSSL 10:37e38ee43b8f 153 ret = ClientGreet(socket, ssl);
wolfSSL 10:37e38ee43b8f 154 } else {
wolfSSL 10:37e38ee43b8f 155 ret = wolfSSL_get_error(ssl, 0);
wolfSSL 10:37e38ee43b8f 156 printf("TLS Connect error[%d], %s\n", ret, wc_GetErrorString(ret));
wolfSSL 10:37e38ee43b8f 157 return EXIT_FAILURE;
wolfSSL 10:37e38ee43b8f 158 }
wolfSSL 10:37e38ee43b8f 159 /* frees all data before client termination */
wolfSSL 10:37e38ee43b8f 160 wolfSSL_free(ssl);
wolfSSL 10:37e38ee43b8f 161 wolfSSL_CTX_free(ctx);
wolfSSL 10:37e38ee43b8f 162 wolfSSL_Cleanup();
wolfSSL 10:37e38ee43b8f 163
wolfSSL 10:37e38ee43b8f 164 return ret;
wolfSSL 10:37e38ee43b8f 165 }
wolfSSL 10:37e38ee43b8f 166
wolfSSL 10:37e38ee43b8f 167 /*
wolfSSL 10:37e38ee43b8f 168 * command line argumentCount and argumentValues
wolfSSL 10:37e38ee43b8f 169 */
wolfSSL 10:37e38ee43b8f 170 void net_main(const void *av)
wolfSSL 10:37e38ee43b8f 171 {
wolfSSL 10:37e38ee43b8f 172 char server_addr[40] ;
wolfSSL 10:37e38ee43b8f 173 char server_port[10] ;
wolfSSL 10:37e38ee43b8f 174
wolfSSL 10:37e38ee43b8f 175 printf("Starting TLS Client,...\n") ;
wolfSSL 10:37e38ee43b8f 176 wolfSSL_Init(); /* initialize wolfSSL */
wolfSSL 10:37e38ee43b8f 177 /* wolfSSL_Debugging_ON(); */
wolfSSL 10:37e38ee43b8f 178 EthernetInterface eth;
wolfSSL 10:37e38ee43b8f 179 TCPSocketConnection socket;
wolfSSL 10:37e38ee43b8f 180
wolfSSL 10:37e38ee43b8f 181 eth.init(); //Use DHCP
wolfSSL 10:37e38ee43b8f 182 while(1) {
wolfSSL 10:37e38ee43b8f 183 if(eth.connect() == 0)break ;
wolfSSL 10:37e38ee43b8f 184 printf("Retry\n") ;
wolfSSL 10:37e38ee43b8f 185 }
wolfSSL 10:37e38ee43b8f 186 printf("Client Addr: %s\n", eth.getIPAddress());
wolfSSL 10:37e38ee43b8f 187
wolfSSL 10:37e38ee43b8f 188 getline("Server Addr: ", server_addr, sizeof(server_addr)) ;
wolfSSL 10:37e38ee43b8f 189 getline("Server Port: ", server_port, sizeof(server_port)) ;
wolfSSL 10:37e38ee43b8f 190
wolfSSL 10:37e38ee43b8f 191 while (socket.connect(server_addr, atoi(server_port)) < 0) {
wolfSSL 10:37e38ee43b8f 192 printf("Unable to connect to (%s) on port (%s)\n", server_addr, server_port);
wolfSSL 10:37e38ee43b8f 193 wait(1.0);
wolfSSL 10:37e38ee43b8f 194 }
wolfSSL 10:37e38ee43b8f 195 printf("TCP Connected\n") ;
wolfSSL 10:37e38ee43b8f 196
wolfSSL 10:37e38ee43b8f 197 Security(&socket);
wolfSSL 10:37e38ee43b8f 198 return ;
wolfSSL 10:37e38ee43b8f 199 }
wolfSSL 10:37e38ee43b8f 200
wolfSSL 10:37e38ee43b8f 201 int main(void)
wolfSSL 10:37e38ee43b8f 202 {
wolfSSL 10:37e38ee43b8f 203
wolfSSL 10:37e38ee43b8f 204 #define STACK_SIZE 24000
wolfSSL 10:37e38ee43b8f 205 Thread t(net_main, NULL, osPriorityNormal, STACK_SIZE);
wolfSSL 10:37e38ee43b8f 206 while(1)wait(1.0) ;
wolfSSL 10:37e38ee43b8f 207 }