Server and client dtls threaded examples.

pull/419/head
jordan 2024-01-16 23:31:38 -06:00
parent 6a34cb5d0c
commit cea1d0815e
4 changed files with 603 additions and 242 deletions

View File

@ -0,0 +1,269 @@
/*
* client-dtls-threaded.c
*
* Copyright (C) 2006-2024 wolfSSL Inc.
*
* This file is part of wolfSSL. (formerly known as CyaSSL)
*
* wolfSSL is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* wolfSSL is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
*
*=============================================================================
*
* A simple dtls client with configurable threadpool, for
* instructional/learning purposes. Utilizes DTLS 1.2.
*/
#include <wolfssl/options.h>
#include <unistd.h>
#include <wolfssl/ssl.h>
#include <netdb.h>
#include <signal.h>
#include <sys/socket.h>
#include <arpa/inet.h>
#include <netinet/in.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#define MSGLEN 4096
#define SERV_PORT 11111
#define DTLS_NUMTHREADS 16
typedef struct {
WOLFSSL * ssl;
int activefd;
WOLFSSL_CTX * ctx;
} thread_args_t;
static void safer_shutdown(thread_args_t * args);
static void * client_work(void * arg);
int
main(int argc,
char * argv[])
{
WOLFSSL_CTX * ctx = NULL; /* ctx shared by threads */
const char * certs = "../certs/ca-cert.pem";
int ret = 0;
int n_threads = 2;
pthread_t threads[DTLS_NUMTHREADS];
thread_args_t args[DTLS_NUMTHREADS];
int opt = 0;
memset(threads, 0, sizeof(threads));
memset(args, 0, sizeof(args));
while ((opt = getopt(argc, argv, "vt:n::?")) != -1) {
switch (opt) {
case 't':
n_threads = atoi(optarg);
break;
case '?':
default:
return EXIT_FAILURE;
}
}
if (n_threads <= 0 || n_threads > DTLS_NUMTHREADS) {
printf("error: invalid n_threads: %d\n", n_threads);
return EXIT_FAILURE;
}
/* Initialize wolfSSL before assigning ctx */
wolfSSL_Init();
ctx = wolfSSL_CTX_new(wolfDTLSv1_2_client_method());
if (ctx == NULL) {
printf("error: wolfSSL_CTX_new failed\n");
return EXIT_FAILURE;
}
/* Load certificates into ctx variable */
ret = wolfSSL_CTX_load_verify_locations(ctx, certs, 0);
if (ret != SSL_SUCCESS) {
printf("error: loading %s failed, please check the file\n", certs);
return EXIT_FAILURE;
}
for (size_t i = 0; i < n_threads; ++i) {
args[i].ctx = ctx;
ret = pthread_create(&threads[i], NULL, client_work, &args[i]);
if (ret == 0 ) {
printf("info: spawned thread: %ld\n", threads[i]);
}
else {
printf("error: pthread_create returned %d\n", ret);
threads[i] = 0;
}
sleep(1);
}
for (size_t i = 0; i < n_threads; ++i) {
if (threads[i]) {
pthread_join(threads[i], NULL);
printf("info: joined thread: %ld\n", threads[i]);
threads[i] = 0;
}
}
wolfSSL_CTX_free(ctx);
wolfSSL_Cleanup();
return EXIT_SUCCESS;
}
static void *
client_work(void * args)
{
thread_args_t * thread_args = (thread_args_t *) args;
int n_bytes = 0;
int err1;
struct sockaddr_in servAddr;
char send_msg[MSGLEN];
char recv_msg[MSGLEN];
int ret = 0;
const char * localhost_ip = "127.0.0.1";
/* Assign ssl variable */
thread_args->ssl = wolfSSL_new(thread_args->ctx);
if (thread_args->ssl == NULL) {
printf("error: wolfSSL_new failed\n");
return NULL;
}
/* servAddr setup */
memset(&servAddr, 0, sizeof(servAddr));
servAddr.sin_family = AF_INET;
servAddr.sin_port = htons(SERV_PORT);
ret = inet_pton(AF_INET, localhost_ip, &servAddr.sin_addr);
if (ret != 1) {
printf("error: inet_pton %s returned %d\n", localhost_ip, ret);
return NULL;
}
ret = wolfSSL_dtls_set_peer(thread_args->ssl, &servAddr, sizeof(servAddr));
if (ret != SSL_SUCCESS) {
printf("error: wolfSSL_dtls_set_peer returned %d\n", ret);
return NULL;
}
thread_args->activefd = socket(AF_INET, SOCK_DGRAM, 0);
if (thread_args->activefd <= 0) {
printf("error: socket returned %d\n", thread_args->activefd);
return NULL;
}
/* Set the file descriptor for ssl and connect with ssl variable */
wolfSSL_set_fd(thread_args->ssl, thread_args->activefd);
if (wolfSSL_connect(thread_args->ssl) != SSL_SUCCESS) {
err1 = wolfSSL_get_error(thread_args->ssl, 0);
printf("error: thread %ld: wolfSSL_connect returned = %d, %s\n",
pthread_self(), err1,
wolfSSL_ERR_reason_error_string(err1));
return NULL;
}
/* Simulate a simple protocol over DTLS that exchanges a
* sequence of records, and checks we get correct records
* from correct server threads. */
long int server_tid = 0;
const char * tid_str = NULL; /* Str to thread id in response. */
for (size_t i = 0; i < 4; ++i) {
char seq = '0' + (int) i;
sprintf(send_msg, "msg %zu from client thread %ld\n", i,
pthread_self());
n_bytes = wolfSSL_write(thread_args->ssl, send_msg, strlen(send_msg));
if (n_bytes != strlen(send_msg)) {
printf("error: wolfSSL_write returned %d", n_bytes);
break;
}
/* n is the # of bytes received */
n_bytes = wolfSSL_read(thread_args->ssl, recv_msg, sizeof(recv_msg)-1);
if (n_bytes < 0) {
printf("error: wolfSSL_read returned %d", n_bytes);
break;
}
recv_msg[n_bytes] = '\0';
fputs(recv_msg, stdout);
/* Check the server replied with the correct sequence record, e.g.:
* "msg 2 from server thread 140146322425536" */
if (recv_msg[4] != seq) {
printf("error: got msg %c, expected %c\n", recv_msg[5], seq);
break;
}
tid_str = &recv_msg[25];
if (server_tid == 0) {
/* Save the server thread id on message 0. */
server_tid = atol(tid_str);
}
else {
/* Compare saved thread id. */
if (server_tid != atol(tid_str)) {
printf("error: got rsp from server thread %ld, expected %ld\n",
server_tid, atol(tid_str));
break;
}
else {
printf("info: got response from server thread %ld\n",
server_tid);
}
}
sleep(1);
}
safer_shutdown(thread_args);
return NULL;
}
/* Small shutdown wrapper to safely clean up a thread's
* connection. */
static void
safer_shutdown(thread_args_t * args)
{
if (args == NULL) {
printf("error: safer_shutdown with null args\n");
return;
}
if (args->ssl != NULL) {
printf("info: closed tls session: %p\n", (void*) args->ssl);
wolfSSL_shutdown(args->ssl);
wolfSSL_free(args->ssl);
args->ssl = NULL;
}
if (args->activefd > 0) {
printf("info: closed socket: %d\n", args->activefd);
close(args->activefd);
args->activefd = 0;
}
return;
}

View File

@ -1,6 +1,6 @@
/* server-dtls-threaded.c /* server-dtls-threaded.c
* *
* Copyright (C) 2006-2020 wolfSSL Inc. * Copyright (C) 2006-2024 wolfSSL Inc.
* *
* This file is part of wolfSSL. (formerly known as CyaSSL) * This file is part of wolfSSL. (formerly known as CyaSSL)
* *
@ -20,8 +20,8 @@
* *
*============================================================================= *=============================================================================
* *
* Bare-bones example of a threaded DTLS server for instructional/learning * A simple dtls server example with configurable threadpool, for
* purposes. Utilizes DTLS 1.2 and multi-threading * instructional/learning purposes. Utilizes DTLS 1.2.
*/ */
#include <wolfssl/options.h> #include <wolfssl/options.h>
@ -36,118 +36,68 @@
#include <errno.h> #include <errno.h>
#include <signal.h> #include <signal.h>
#include <unistd.h> #include <unistd.h>
/* Uncomment if you want to build with the less portable
* non-blocking pthread_tryjoin_np.*/
/* #define USE_NONBLOCK_JOIN */
#ifdef USE_NONBLOCK_JOIN
#define _GNU_SOURCE
#endif
#include <pthread.h> #include <pthread.h>
#define SERV_PORT 11111 /* define our server port number */ #include "dtls-common.h"
#define MSGLEN 4096
static WOLFSSL_CTX* ctx; /* global for ThreadControl*/ #define MSGLEN 4096
static int cleanup; /* To handle shutdown */ #define DTLS_NUMTHREADS 32
static struct sockaddr_in cliAddr; /* the client's address */
static struct sockaddr_in servAddr; /* our server's address */
void sig_handler(const int sig);
void* ThreadControl(void*);
typedef struct { typedef struct {
int activefd; WOLFSSL * ssl;
int size; int activefd;
unsigned char b[MSGLEN]; int peer_port;
} threadArgs; int done;
} thread_args_t;
void sig_handler(const int sig) static WOLFSSL_CTX * ctx = NULL;
static volatile int stop_server = 0;
static int new_udp_listen_socket(void);
static void safer_shutdown(thread_args_t * args);
static void * server_work(void * thread_args);
static void sig_handler(const int sig);
int
main(int argc,
char* argv[])
{ {
printf("\nSIGINT %d handled\n", sig); char caCertLoc[] = "../certs/ca-cert.pem";
cleanup = 1; char servCertLoc[] = "../certs/server-cert.pem";
return; char servKeyLoc[] = "../certs/server-key.pem";
} int ret = 0;
/* Variables for awaiting datagram */
int listenfd = 0; /* Initialize our socket */
struct sockaddr_in cliaddr; /* the client's address */
socklen_t cliLen = sizeof(cliaddr);
/* variables needed for threading */
int n_threads = 2;
pthread_t threads[DTLS_NUMTHREADS];
thread_args_t args[DTLS_NUMTHREADS];
int opt = 0;
void* ThreadControl(void* openSock) memset(threads, 0, sizeof(threads));
{ memset(args, 0, sizeof(args));
pthread_detach(pthread_self());
threadArgs* args = (threadArgs*)openSock; while ((opt = getopt(argc, argv, "vt:n::?")) != -1) {
int recvLen = 0; /* length of message */ switch (opt) {
int activefd = args->activefd; /* the active descriptor */ case 't':
int msgLen = args->size; /* the size of message */ n_threads = atoi(optarg);
unsigned char buff[msgLen]; /* the incoming message */ break;
char ack[] = "I hear you fashizzle!\n";
WOLFSSL* ssl;
int e; /* error */
memcpy(buff, args->b, msgLen); case '?':
printf("usage:\n");
/* Create the WOLFSSL Object */ printf(" ./server-dtls-threaded [-t n]\n");
if ((ssl = wolfSSL_new(ctx)) == NULL) { default:
printf("wolfSSL_new error.\n"); return EXIT_FAILURE;
cleanup = 1;
return NULL;
}
/* set the session ssl to client connection port */
wolfSSL_set_fd(ssl, activefd);
if (wolfSSL_accept(ssl) != SSL_SUCCESS) {
e = wolfSSL_get_error(ssl, 0);
printf("error = %d, %s\n", e, wolfSSL_ERR_reason_error_string(e));
printf("SSL_accept failed.\n");
return NULL;
}
if ((recvLen = wolfSSL_read(ssl, buff, msgLen-1)) > 0) {
printf("heard %d bytes\n", recvLen);
buff[recvLen] = 0;
printf("I heard this: \"%s\"\n", buff);
}
else if (recvLen < 0) {
int readErr = wolfSSL_get_error(ssl, 0);
if(readErr != SSL_ERROR_WANT_READ) {
printf("SSL_read failed.\n");
cleanup = 1;
return NULL;
} }
} }
if (wolfSSL_write(ssl, ack, sizeof(ack)) < 0) {
printf("wolfSSL_write fail.\n");
cleanup = 1;
return NULL;
}
else {
printf("Sending reply.\n");
}
printf("reply sent \"%s\"\n", ack);
wolfSSL_shutdown(ssl);
wolfSSL_free(ssl);
close(activefd);
free(openSock); /* valgrind friendly free */
printf("Client left return to idle state\n");
printf("Exiting thread.\n\n");
pthread_exit(openSock);
}
int main(int argc, char** argv)
{
/* cont short for "continue?", Loc short for "location" */
int cont = 0;
char caCertLoc[] = "../certs/ca-cert.pem";
char servCertLoc[] = "../certs/server-cert.pem";
char servKeyLoc[] = "../certs/server-key.pem";
int on = 1;
int res = 1;
int bytesRcvd = 0;
int listenfd = 0; /* Initialize our socket */
socklen_t cliLen;
socklen_t len = sizeof(on);
unsigned char buf[MSGLEN]; /* watch for incoming messages */
/* variables needed for threading */
threadArgs* args;
pthread_t threadid;
/* Code for handling signals */ /* Code for handling signals */
struct sigaction act, oact; struct sigaction act, oact;
@ -156,161 +106,295 @@ int main(int argc, char** argv)
act.sa_flags = 0; act.sa_flags = 0;
sigaction(SIGINT, &act, &oact); sigaction(SIGINT, &act, &oact);
/* "./config --enable-debug" and uncomment next line for debugging */ /* Uncomment if you want debugging. */
/* wolfSSL_Debugging_ON(); */ /* wolfSSL_Debugging_ON(); */
/* Initialize wolfSSL */ /* Initialize wolfSSL */
wolfSSL_Init(); wolfSSL_Init();
/* Set ctx to DTLS 1.2 */ /* Set ctx to DTLS 1.2 */
if ((ctx = wolfSSL_CTX_new(wolfDTLSv1_2_server_method())) == NULL) { ctx = wolfSSL_CTX_new(wolfDTLSv1_2_server_method());
printf("wolfSSL_CTX_new error.\n"); if (ctx == NULL) {
return 1; printf("error: wolfSSL_CTX_new error.\n");
return EXIT_FAILURE;
} }
/* Load CA certificates */ /* Load CA certificates */
if (wolfSSL_CTX_load_verify_locations(ctx,caCertLoc,0) != ret = wolfSSL_CTX_load_verify_locations(ctx,caCertLoc,0);
SSL_SUCCESS) { if (ret != SSL_SUCCESS) {
printf("Error loading %s, please check the file.\n", caCertLoc); printf("error: error loading %s, please check the file.\n", caCertLoc);
return 1; return EXIT_FAILURE;
} }
/* Load server certificates */ /* Load server certificates */
if (wolfSSL_CTX_use_certificate_file(ctx, servCertLoc, SSL_FILETYPE_PEM) != ret = wolfSSL_CTX_use_certificate_file(ctx, servCertLoc, SSL_FILETYPE_PEM);
SSL_SUCCESS) { if (ret != SSL_SUCCESS) {
printf("Error loading %s, please check the file.\n", servCertLoc); printf("error: error loading %s, please check the file.\n", servCertLoc);
return 1; return EXIT_FAILURE;
} }
/* Load server Keys */ /* Load server Keys */
if (wolfSSL_CTX_use_PrivateKey_file(ctx, servKeyLoc, ret = wolfSSL_CTX_use_PrivateKey_file(ctx, servKeyLoc, SSL_FILETYPE_PEM);
SSL_FILETYPE_PEM) != SSL_SUCCESS) {
if (ret != SSL_SUCCESS) {
printf("Error loading %s, please check the file.\n", servKeyLoc); printf("Error loading %s, please check the file.\n", servKeyLoc);
return 1; return EXIT_FAILURE;
} }
/* Create a UDP/IP socket */ /* Create a UDP/IP socket */
if ((listenfd = socket(AF_INET, SOCK_DGRAM, 0)) < 0 ) { listenfd = new_udp_listen_socket();
printf("Cannot create socket.\n");
cleanup = 1;
}
printf("Socket allocated\n");
/* clear servAddr each loop */ if (listenfd <= 0 ) {
memset((char *)&servAddr, 0, sizeof(servAddr)); printf("error: cannot create socket: %d\n", listenfd);
return EXIT_FAILURE;
/* host-to-network-long conversion (htonl) */
/* host-to-network-short conversion (htons) */
servAddr.sin_family = AF_INET;
servAddr.sin_addr.s_addr = htonl(INADDR_ANY);
servAddr.sin_port = htons(SERV_PORT);
/* Eliminate socket already in use error */
res = setsockopt(listenfd, SOL_SOCKET, SO_REUSEADDR, &on, len);
if (res < 0) {
printf("Setsockopt SO_REUSEADDR failed.\n");
cleanup = 1;
return 1;
} }
/*Bind Socket*/ printf("info: awaiting client dtls on port %d\n", SERV_PORT);
if (bind(listenfd,
(struct sockaddr *)&servAddr, sizeof(servAddr)) < 0) {
printf("Bind failed.\n");
cleanup = 1;
return 1;
}
printf("Awaiting client connection on port %d\n", SERV_PORT); while (stop_server != 1) {
for (size_t i = 0; i < n_threads; ++i) {
while (cleanup != 1) { if (stop_server) {
break;
memset(&threadid, 0, sizeof(threadid));
args = (threadArgs *) malloc(sizeof(threadArgs));
cliLen = sizeof(cliAddr);
/* note argument 4 of recvfrom not MSG_PEEK as dtls will see
* handshake packets and think a message is arriving. Instead
* read any real message to struct and pass struct into thread
* for processing.
*/
bytesRcvd = (int)recvfrom(listenfd, (char *)buf, sizeof(buf), 0,
(struct sockaddr*)&cliAddr, &cliLen);
if (cleanup == 1) {
free(args);
return 1;
}
if (bytesRcvd < 0) {
printf("No clients in que, enter idle state\n");
continue;
}
else if (bytesRcvd > 0) {
/* put all the bytes from buf into args */
memcpy(args->b, buf, sizeof(buf));
args->size = bytesRcvd;
if ((args->activefd = socket(AF_INET, SOCK_DGRAM, 0)) < 0 ) {
printf("Cannot create socket.\n");
cleanup = 1;
} }
res = setsockopt(args->activefd, SOL_SOCKET, SO_REUSEADDR, &on, if (threads[i] != 0) {
len); /* Skip threads already spawned. */
continue;
if (res < 0) {
printf("Setsockopt SO_REUSEADDR failed.\n");
cleanup = 1;
return 1;
} }
#ifdef SO_REUSEPORT memset(&args[i], 0, sizeof(thread_args_t));
res = setsockopt(args->activefd, SOL_SOCKET, SO_REUSEPORT, &on,
len);
if (res < 0) {
printf("Setsockopt SO_REUSEPORT failed.\n");
cleanup = 1;
return 1;
}
#endif
if (connect(args->activefd, (const struct sockaddr *)&cliAddr, args[i].ssl = wolfSSL_new(ctx);
sizeof(cliAddr)) != 0) { if (args[i].ssl == NULL) {
printf("Udp connect failed.\n"); printf("error: wolfSSL_new returned null\n");
cleanup = 1; break;
return 1; }
/* set the session ssl to client connection port */
ret = wolfSSL_set_fd(args[i].ssl, listenfd);
if (ret != SSL_SUCCESS) {
printf("error: wolfSSL_set_fd returned %d\n", ret);
break;
}
ret = wolfSSL_accept(args[i].ssl);
if (ret != SSL_SUCCESS) {
printf("error: wolfSSL_accept returned %d\n", ret);
break;
}
ret = wolfSSL_dtls_get_peer(args[i].ssl, &cliaddr, &cliLen);
if (ret != WOLFSSL_SUCCESS) {
printf("error: wolfSSL_dtls_get_peer failed\n");
break;
}
args[i].peer_port = ntohs(cliaddr.sin_port);
printf("info: new dtls session: %p, %d\n", (void*) args[i].ssl,
args[i].peer_port);
/* Open new UDP socket. */
args[i].activefd = new_udp_listen_socket();
if (args[i].activefd <= 0 ) {
break;
}
ret = connect(args[i].activefd, (const struct sockaddr *)&cliaddr,
cliLen);
if (ret != 0) {
printf("error: connect returned: %d\n", ret);
break;
}
ret = wolfSSL_set_dtls_fd_connected(args[i].ssl, args[i].activefd);
if (ret != SSL_SUCCESS) {
printf("error: wolfSSL_set_dtls_fd_connected: %d\n", ret);
break;
}
ret = pthread_create(&threads[i], NULL, server_work, &args[i]);
if (ret == 0 ) {
printf("info: spawned thread: %ld\n", threads[i]);
}
else {
printf("error: pthread_create returned %d\n", ret);
threads[i] = 0;
}
}
#ifdef USE_NONBLOCK_JOIN
for (size_t i = 0; i < n_threads; ++i) {
if (threads[i]) {
pthread_tryjoin_np(threads[i], NULL);
printf("info: joined thread: %ld\n", threads[i]);
threads[i] = 0;
}
}
#else
for (size_t i = 0; i < n_threads; ++i) {
if (threads[i] && args[i].done == 1) {
pthread_join(threads[i], NULL);
printf("info: joined thread: %ld\n", threads[i]);
threads[i] = 0;
}
}
#endif
}
for (size_t i = 0; i < n_threads; ++i) {
safer_shutdown(&args[i]);
}
wolfSSL_CTX_free(ctx);
wolfSSL_Cleanup();
return EXIT_SUCCESS;
}
static int
new_udp_listen_socket(void)
{
struct sockaddr_in listen_addr; /* our server's address */
int sockfd = 0;
int ret = 0;
int on = 1;
sockfd = socket(AF_INET, SOCK_DGRAM, 0);
if (sockfd <= 0) {
int errsave = errno;
printf("error: socket returned %d\n", errsave);
return -1;
}
memset(&listen_addr, 0, sizeof(listen_addr));
listen_addr.sin_family = AF_INET;
listen_addr.sin_addr.s_addr = htonl(INADDR_ANY);
listen_addr.sin_port = htons(SERV_PORT);
if (setsockopt(sockfd, SOL_SOCKET, SO_REUSEADDR, (char*)&on, sizeof(on)) != 0) {
printf("error: setsockopt() with SO_REUSEADDR");
close(sockfd);
sockfd = 0;
return -1;
}
#ifdef SO_REUSEPORT
if (setsockopt(sockfd, SOL_SOCKET, SO_REUSEPORT, (char*)&on, sizeof(on)) != 0) {
printf("error: setsockopt() with SO_REUSEPORT");
close(sockfd);
sockfd = 0;
return -1;
}
#endif
ret = bind(sockfd, (const struct sockaddr *)&listen_addr,
sizeof(listen_addr));
if (ret != 0) {
int errsave = errno;
printf("error: bind returned %d\n", errsave);
close(sockfd);
sockfd = 0;
return -1;
}
printf("info: opened socket: %d\n", sockfd);
return sockfd;
}
static void *
server_work(void * args)
{
thread_args_t * thread_args = (thread_args_t *) args;
int n_bytes = 0;
char recv_msg[MSGLEN];
char send_msg[MSGLEN];
for (size_t i = 0; i < 4; ++i) {
if (stop_server) {
break;
}
sprintf(send_msg, "msg %zu from server thread %ld\n", i,
pthread_self());
n_bytes = wolfSSL_read(thread_args->ssl, recv_msg, sizeof(recv_msg) - 1);
if (n_bytes > 0) {
recv_msg[n_bytes] = 0;
printf("%s", recv_msg);
}
else {
printf("error: wolfSSL_read returned: %d\n", n_bytes);
int readErr = wolfSSL_get_error(thread_args->ssl, 0);
if(readErr != SSL_ERROR_WANT_READ) {
printf("SSL_read failed: %d\n", readErr);
break;
}
}
n_bytes = wolfSSL_write(thread_args->ssl, send_msg, strlen(send_msg));
if (n_bytes > 0) {
if (n_bytes != strlen(send_msg)) {
printf("error: sent %d, expected %zu bytes\n", n_bytes,
strlen(send_msg));
} }
} }
else { else {
/* else bytesRcvd = 0 */ printf("error: wolfSSL_write returned: %d\n", n_bytes);
printf("Recvfrom failed.\n");
cleanup = 1;
return 1;
}
printf("Connected!\n");
if (cleanup != 1) { int readErr = wolfSSL_get_error(thread_args->ssl, 0);
/* SPIN A THREAD HERE TO HANDLE "buff" and "reply/ack" */ if(readErr != SSL_ERROR_WANT_WRITE) {
pthread_create(&threadid, NULL, ThreadControl, args); printf("SSL_write failed: %d\n", readErr);
printf("control passed to ThreadControl.\n"); }
}
else if (cleanup == 1) {
return 1;
} else {
printf("I don't know what to tell ya man\n");
}
/* clear servAddr each loop */ break;
memset((char *)&servAddr, 0, sizeof(servAddr)); }
} }
if (cont == 1) { safer_shutdown(thread_args);
wolfSSL_CTX_free(ctx); printf("info: exiting thread %ld\n", pthread_self());
wolfSSL_Cleanup(); pthread_exit(NULL);
} }
return 0; /* Small shutdown wrapper to safely clean up a thread's
* connection. */
static void
safer_shutdown(thread_args_t * args)
{
if (args == NULL) {
printf("error: safer_shutdown with null args\n");
return;
}
if (args->ssl != NULL) {
printf("info: closed dtls session: %p\n", (void*) args->ssl);
wolfSSL_shutdown(args->ssl);
wolfSSL_free(args->ssl);
args->ssl = NULL;
}
if (args->activefd > 0) {
printf("info: closed socket: %d\n", args->activefd);
close(args->activefd);
args->activefd = 0;
}
args->done = 1;
return;
}
static void
sig_handler(const int sig)
{
printf("info: SIGINT %d handled\n", sig);
stop_server = 1;
return;
} }

View File

@ -25,6 +25,7 @@
*/ */
#include <wolfssl/options.h> #include <wolfssl/options.h>
#include <wolfssl/ssl.h>
#include <stdio.h> /* standard in/out procedures */ #include <stdio.h> /* standard in/out procedures */
#include <stdlib.h> /* defines system calls */ #include <stdlib.h> /* defines system calls */
#include <string.h> /* necessary for memset */ #include <string.h> /* necessary for memset */
@ -32,7 +33,6 @@
#include <sys/socket.h> /* used for all socket calls */ #include <sys/socket.h> /* used for all socket calls */
#include <netinet/in.h> /* used for sockaddr_in */ #include <netinet/in.h> /* used for sockaddr_in */
#include <arpa/inet.h> #include <arpa/inet.h>
#include <wolfssl/ssl.h>
#include <errno.h> #include <errno.h>
#include <signal.h> #include <signal.h>
#include <unistd.h> #include <unistd.h>
@ -41,8 +41,8 @@
#define MSGLEN 4096 #define MSGLEN 4096
static int cleanup = 0; /* To handle shutdown */ static int cleanup = 0; /* To handle shutdown */
struct sockaddr_in servAddr; /* our server's address */ static struct sockaddr_in servAddr; /* our server's address */
struct sockaddr_in cliaddr; /* the client's address */ static struct sockaddr_in cliaddr; /* the client's address */
void sig_handler(const int sig); void sig_handler(const int sig);
@ -52,6 +52,7 @@ int main(int argc, char** argv)
char caCertLoc[] = "../certs/ca-cert.pem"; char caCertLoc[] = "../certs/ca-cert.pem";
char servCertLoc[] = "../certs/server-cert.pem"; char servCertLoc[] = "../certs/server-cert.pem";
char servKeyLoc[] = "../certs/server-key.pem"; char servKeyLoc[] = "../certs/server-key.pem";
int ret = 0;
WOLFSSL_CTX* ctx; WOLFSSL_CTX* ctx;
/* Variables for awaiting datagram */ /* Variables for awaiting datagram */
int on = 1; int on = 1;
@ -73,25 +74,30 @@ int main(int argc, char** argv)
wolfSSL_Init(); wolfSSL_Init();
/* Set ctx to DTLS 1.2 */ /* Set ctx to DTLS 1.2 */
if ((ctx = wolfSSL_CTX_new(wolfDTLSv1_2_server_method())) == NULL) { ctx = wolfSSL_CTX_new(wolfDTLSv1_2_server_method());
if (ctx == NULL) {
printf("wolfSSL_CTX_new error.\n"); printf("wolfSSL_CTX_new error.\n");
return 1; return 1;
} }
/* Load CA certificates */ /* Load CA certificates */
if (wolfSSL_CTX_load_verify_locations(ctx,caCertLoc,0) != ret = wolfSSL_CTX_load_verify_locations(ctx,caCertLoc,0);
SSL_SUCCESS) { if (ret != SSL_SUCCESS) {
printf("Error loading %s, please check the file.\n", caCertLoc); printf("Error loading %s, please check the file.\n", caCertLoc);
return 1; return 1;
} }
/* Load server certificates */ /* Load server certificates */
if (wolfSSL_CTX_use_certificate_file(ctx, servCertLoc, SSL_FILETYPE_PEM) != ret = wolfSSL_CTX_use_certificate_file(ctx, servCertLoc, SSL_FILETYPE_PEM);
SSL_SUCCESS) { if (ret != SSL_SUCCESS) {
printf("Error loading %s, please check the file.\n", servCertLoc); printf("Error loading %s, please check the file.\n", servCertLoc);
return 1; return 1;
} }
/* Load server Keys */ /* Load server Keys */
if (wolfSSL_CTX_use_PrivateKey_file(ctx, servKeyLoc, ret = wolfSSL_CTX_use_PrivateKey_file(ctx, servKeyLoc, SSL_FILETYPE_PEM);
SSL_FILETYPE_PEM) != SSL_SUCCESS) {
if (ret != SSL_SUCCESS) {
printf("Error loading %s, please check the file.\n", servKeyLoc); printf("Error loading %s, please check the file.\n", servKeyLoc);
return 1; return 1;
} }
@ -101,11 +107,13 @@ int main(int argc, char** argv)
while (cleanup != 1) { while (cleanup != 1) {
/* Create a UDP/IP socket */ /* Create a UDP/IP socket */
if ((listenfd = socket(AF_INET, SOCK_DGRAM, 0)) < 0 ) { listenfd = socket(AF_INET, SOCK_DGRAM, 0);
printf("Cannot create socket.\n");
if (listenfd <= 0 ) {
printf("error: cannot create socket: %d\n", listenfd);
break; break;
} }
printf("Socket allocated\n"); printf("info: socket allocated: %d\n", listenfd);
/* clear servAddr each loop */ /* clear servAddr each loop */
memset((char *)&servAddr, 0, sizeof(servAddr)); memset((char *)&servAddr, 0, sizeof(servAddr));

View File

@ -42,7 +42,7 @@
#include <signal.h> #include <signal.h>
#include <unistd.h> #include <unistd.h>
/* Requires libevent */ /* Requires libevent-devel */
#include <event2/event.h> #include <event2/event.h>
#include "dtls-common.h" #include "dtls-common.h"