Important changes to repositories hosted on mbed.com
Mbed hosted mercurial repositories are deprecated and are due to be permanently deleted in July 2026.
To keep a copy of this software download the repository Zip archive or clone locally using Mercurial.
It is also possible to export all your personal repositories from the account settings page.
Dependencies: EthernetInterface-FRDM-k64F mbed-rtos mbed wolfSSL-TLS13-Beta Example-client-tls
Dependents: Example-client-tls
client-tls.cpp
- Committer:
- wolfSSL
- Date:
- 2016-04-28
- Revision:
- 5:76ad456ac3f0
- Parent:
- 4:0cd0d8c9af1e
- Child:
- 6:12068e6dc456
- Child:
- 8:4a483e3d805e
File content as of revision 5:76ad456ac3f0:
/* client-tcp.c
*
* Copyright (C) 2006-2015 wolfSSL Inc.
*
* This file is part of wolfSSL. (formerly known as CyaSSL)
*
* wolfSSL is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* wolfSSL is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
*/
#include "mbed.h"
#include "EthernetInterface.h"
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <wolfssl/ssl.h> /* wolfSSL security library */
#include <wolfssl/wolfcrypt/error-crypt.h>
#include <user_settings.h>
#define MAXDATASIZE (1024*4)
static int SocketReceive(WOLFSSL* ssl, char *buf, int sz, void *sock)
{
return ((TCPSocketConnection *)sock)->receive(buf, sz) ;
}
static int SocketSend(WOLFSSL* ssl, char *buf, int sz, void *sock)
{
return ((TCPSocketConnection *)sock)->send(buf, sz);
}
static int getline(char *prompt, char *buff, int size)
{
int sz ;
printf("%s", prompt) ;
for(sz = 0 ; (sz < size) && ((*buff = getchar()) != '\r'); sz++, buff++) {
putchar(*buff) ;
if(*buff == '\\') {
if(++sz >= size)break ;
*buff = getchar() ;
putchar(*buff) ;
switch(*buff) {
case 'n' :
*buff = '\n' ;
break ;
case 'r' :
*buff = '\r' ;
break ;
case 't' :
*buff = '\t' ;
break ;
case '\\':
*buff = '\\' ;
break ;
default:
buff[1] = buff[0] ;
buff[0] = '\\' ;
buff++ ;
}
} else if(*buff == '\b') {
if(sz >= 2) {
buff-=2 ;
sz-=2;
}
}
} ;
putchar('\n') ;
*buff = '\0' ;
return sz ;
}
/*
* clients initial contact with server. Socket to connect to: sock
*/
int ClientGreet(TCPSocketConnection *socket, WOLFSSL *ssl)
{
/* data to send to the server, data recieved from the server */
char sendBuff[MAXDATASIZE], rcvBuff[MAXDATASIZE] = {0};
int ret ;
ret = getline("Message for server: ", sendBuff, MAXDATASIZE);
printf("Send[%d]:\n%s\n", ret, sendBuff) ;
if (wolfSSL_write(ssl, sendBuff, strlen(sendBuff)) < 0) {
/* the message is not able to send, or error trying */
ret = wolfSSL_get_error(ssl, 0);
printf("Write error[%d]\n", ret, wc_GetErrorString(ret));
return EXIT_FAILURE;
}
printf("Recieved:\n");
while(1) {
if ((ret = wolfSSL_read(ssl, rcvBuff, sizeof(rcvBuff)-1)) < 0) {
if(ret == 0)break ;
/* the server failed to send data, or error trying */
ret = wolfSSL_get_error(ssl, 0);
printf("Read error[%d], %s\n", ret, wc_GetErrorString(ret));
return EXIT_FAILURE;
}
rcvBuff[ret] = '\0' ;
printf("%s", rcvBuff);
if((rcvBuff[ret-3] == '\n')&&
(rcvBuff[ret-2] == '\n')&&
(rcvBuff[ret-1] == '\n'))break ;
}
return ret;
}
/*
* applies TLS 1.2 security layer to data being sent.
*/
int Security(TCPSocketConnection *socket)
{
WOLFSSL_CTX* ctx;
WOLFSSL* ssl; /* create WOLFSSL object */
int ret = 0;
/* create and initiLize WOLFSSL_CTX structure */
if ((ctx = wolfSSL_CTX_new(wolfTLSv1_2_client_method())) == NULL) {
printf("SSL_CTX_new error.\n");
return EXIT_FAILURE;
}
wolfSSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, 0);
wolfSSL_SetIORecv(ctx, SocketReceive) ;
wolfSSL_SetIOSend(ctx, SocketSend) ;
if ((ssl = wolfSSL_new(ctx)) == NULL) {
printf("wolfSSL_new error.\n");
return EXIT_FAILURE;
}
wolfSSL_SetIOReadCtx(ssl, (void *)socket) ;
wolfSSL_SetIOWriteCtx(ssl, (void *)socket) ;
ret = wolfSSL_connect(ssl);
if (ret == SSL_SUCCESS) {
printf("TLS Connected\n") ;
ret = ClientGreet(socket, ssl);
} else {
ret = wolfSSL_get_error(ssl, 0);
printf("TLS Connect error[%d], %s\n", ret, wc_GetErrorString(ret));
return EXIT_FAILURE;
}
/* frees all data before client termination */
wolfSSL_free(ssl);
wolfSSL_CTX_free(ctx);
wolfSSL_Cleanup();
return ret;
}
/*
* command line argumentCount and argumentValues
*/
void net_main(const void *av)
{
char server_addr[40] ;
char server_port[10] ;
printf("Starting TLS Client,...\n") ;
wolfSSL_Init(); /* initialize wolfSSL */
/* wolfSSL_Debugging_ON(); */
EthernetInterface eth;
TCPSocketConnection socket;
eth.init(); //Use DHCP
while(1) {
if(eth.connect() == 0)break ;
printf("Retry\n") ;
}
printf("Client Addr: %s\n", eth.getIPAddress());
getline("Server Addr: ", server_addr, sizeof(server_addr)) ;
getline("Server Port: ", server_port, sizeof(server_port)) ;
while (socket.connect(server_addr, atoi(server_port)) < 0) {
printf("Unable to connect to (%s) on port (%s)\n", server_addr, server_port);
wait(1.0);
}
printf("TCP Connected\n") ;
Security(&socket);
return ;
}
int main(void)
{
#define STACK_SIZE 24000
Thread t(net_main, NULL, osPriorityNormal, STACK_SIZE);
while(1)wait(1.0) ;
}