From 233c3ef1b4099f2549a83ded3642bc910699c179 Mon Sep 17 00:00:00 2001 From: David Garske Date: Thu, 19 Sep 2019 06:52:30 -0700 Subject: [PATCH] Added TLS client example for using the BIO compatibility layer (thanks Jacob). --- .gitignore | 1 + tls/client-tls-bio.c | 161 +++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 162 insertions(+) create mode 100644 tls/client-tls-bio.c diff --git a/.gitignore b/.gitignore index 22e5a1c7..c323a97e 100644 --- a/.gitignore +++ b/.gitignore @@ -70,6 +70,7 @@ android/wolfssljni-ndk-sample/proguard-project.txt /tls/client-tcp /tls/client-tls +/tls/client-tls-bio /tls/client-tls-cacb /tls/client-tls-callback /tls/client-tls-ecdhe diff --git a/tls/client-tls-bio.c b/tls/client-tls-bio.c new file mode 100644 index 00000000..e392e3df --- /dev/null +++ b/tls/client-tls-bio.c @@ -0,0 +1,161 @@ +/* client-tls-bio.c + * + * Copyright (C) 2006-2019 wolfSSL Inc. + * + * This file is part of wolfSSL. (formerly known as CyaSSL) + * + * wolfSSL is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * wolfSSL is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA + */ + +/* standard library */ +#include +#include +#include + +/* socket includes */ +#include +#include +#include +#include + +/* wolfSSL */ +#include +#include + +#define DEFAULT_PORT 11111 +#define CERT_FILE "../certs/ca-cert.pem" + +/* Example Usage: + * ./examples/server/server -d + * + * ./client-tls-bio 127.0.0.1 + * creating new WOLFSSL BIO type to write and read with + * Message for server: asdf + * Server: I hear you fa shizzle! + */ + +int main(int argc, char** argv) +{ +#ifdef OPENSSL_EXTRA + int sockfd; + struct sockaddr_in servAddr; + char buff[256]; + size_t len; + + /* declare wolfSSL objects */ + WOLFSSL_CTX* ctx; + WOLFSSL* ssl; + WOLFSSL_BIO* bio; + + /* Check for proper calling convention */ + if (argc != 2) { + printf("usage: %s \n", argv[0]); + return 0; + } + + /* Initialize wolfSSL */ + wolfSSL_Init(); + + /* Create a socket that uses an internet IPv4 address, + * Sets the socket to be stream based (TCP), + * 0 means choose the default protocol. */ + if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1) { + fprintf(stderr, "ERROR: failed to create the socket\n"); + return -1; + } + + /* Create and initialize WOLFSSL_CTX */ + if ((ctx = wolfSSL_CTX_new(wolfTLSv1_2_client_method())) == NULL) { + fprintf(stderr, "ERROR: failed to create WOLFSSL_CTX\n"); + return -1; + } + + /* Load client certificates into WOLFSSL_CTX */ + if (wolfSSL_CTX_load_verify_locations(ctx, CERT_FILE, NULL)!= SSL_SUCCESS) { + fprintf(stderr, "ERROR: failed to load %s, please check the file.\n", + CERT_FILE); + return -1; + } + + /* Initialize the server address struct with zeros */ + memset(&servAddr, 0, sizeof(servAddr)); + + /* Fill in the server address */ + servAddr.sin_family = AF_INET; /* using IPv4 */ + servAddr.sin_port = htons(DEFAULT_PORT); /* on DEFAULT_PORT */ + + /* Get the server IPv4 address from the command line call */ + if (inet_pton(AF_INET, argv[1], &servAddr.sin_addr) != 1) { + fprintf(stderr, "ERROR: invalid address\n"); + return -1; + } + + /* Connect to the server */ + if (connect(sockfd, (struct sockaddr*) &servAddr, sizeof(servAddr)) + == -1) { + fprintf(stderr, "ERROR: failed to connect\n"); + return -1; + } + + /* Create a WOLFSSL object */ + if ((ssl = wolfSSL_new(ctx)) == NULL) { + fprintf(stderr, "ERROR: failed to create WOLFSSL object\n"); + return -1; + } + + /* Attach wolfSSL to the socket */ + wolfSSL_set_fd(ssl, sockfd); + + printf("creating new WOLFSSL BIO type to write and read with\n"); + bio = wolfSSL_BIO_new(wolfSSL_BIO_f_ssl()); + if (bio == NULL) { + return -1; + } + wolfSSL_BIO_set_ssl(bio, ssl, BIO_CLOSE); /* with BIO_CLOSE wolfSSL_BIO_free will free ssl */ + + /* Get a message for the server from stdin */ + printf("Message for server: "); + memset(buff, 0, sizeof(buff)); + fgets(buff, sizeof(buff), stdin); + len = strnlen(buff, sizeof(buff)); + + /* Send the message to the server */ + if (wolfSSL_BIO_write(bio, buff, len) != len) { + fprintf(stderr, "ERROR: failed to write\n"); + return -1; + } + + /* Read the server data into our buff array */ + memset(buff, 0, sizeof(buff)); + if (wolfSSL_BIO_read(bio, buff, sizeof(buff)-1) == -1) { + fprintf(stderr, "ERROR: failed to read\n"); + return -1; + } + + /* Print to stdout any data the server sends */ + printf("Server: %s\n", buff); + + /* Cleanup and return */ + wolfSSL_BIO_free(bio); /* Free the wolfSSL object */ + close(sockfd); /* Close the connection to the server */ + + wolfSSL_CTX_free(ctx); /* Free the wolfSSL context object */ + wolfSSL_Cleanup(); /* Cleanup the wolfSSL environment */ + +#else + printf("This example requires ./configure --enable-opensslextra or OPENSSL_EXTRA to be defined\n"); +#endif + return 0; /* Return reporting a success */ +}