/* client-psk-nonblocking.c * * Copyright (C) 2006-2014 wolfSSL Inc. * * This file is part of CyaSSL. * * CyaSSL is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * CyaSSL is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, * USA */ #include #include #include #include #include #include #include #include #include #include /* must include this to use CyaSSL security */ #define MAXLINE 256 /* max text line length */ #define SERV_PORT 11111 /* default port*/ /* * enum used for tcp_select function */ enum { TEST_SELECT_FAIL, TEST_TIMEOUT, TEST_RECV_READY, TEST_ERROR_READY }; static inline int tcp_select(int socketfd, int to_sec) { fd_set recvfds, errfds; int nfds = socketfd + 1; struct timeval timeout = { (to_sec > 0) ? to_sec : 0, 0}; int result; FD_ZERO(&recvfds); FD_SET(socketfd, &recvfds); FD_ZERO(&errfds); FD_SET(socketfd, &errfds); result = select(nfds, &recvfds, NULL, &errfds, &timeout); if (result == 0) return TEST_TIMEOUT; else if (result > 0) { if (FD_ISSET(socketfd, &recvfds)) return TEST_RECV_READY; else if(FD_ISSET(socketfd, &errfds)) return TEST_ERROR_READY; } return TEST_SELECT_FAIL; } /* * sets up and uses nonblocking protocols using cyassl */ static int NonBlockingSSL_Connect(CYASSL* ssl) { int ret, error, sockfd, select_ret, currTimeout; ret = CyaSSL_connect(ssl); error = CyaSSL_get_error(ssl, 0); sockfd = (int)CyaSSL_get_fd(ssl); while (ret != SSL_SUCCESS && (error == SSL_ERROR_WANT_READ || error == SSL_ERROR_WANT_WRITE)) { currTimeout = 1; if (error == SSL_ERROR_WANT_READ) printf("... client would read block\n"); else printf("... client would write block\n"); select_ret = tcp_select(sockfd, currTimeout); if ((select_ret == TEST_RECV_READY) || (select_ret == TEST_ERROR_READY)) { ret = CyaSSL_connect(ssl); error = CyaSSL_get_error(ssl, 0); } else if (select_ret == TEST_TIMEOUT) { error = SSL_ERROR_WANT_READ; } else { error = SSL_FATAL_ERROR; } } if (ret != SSL_SUCCESS){ printf("SSL_connect failed"); return 1; } return 0; } /* *psk client set up. */ static inline unsigned int My_Psk_Client_Cb(CYASSL* ssl, const char* hint, char* identity, unsigned int id_max_len, unsigned char* key, unsigned int key_max_len) { (void)ssl; (void)hint; (void)key_max_len; /* identity is OpenSSL testing default for openssl s_client, keep same*/ strncpy(identity, "Client_identity", id_max_len); /* test key n hex is 0x1a2b3c4d , in decimal 439,041,101, we're using * unsigned binary */ key[0] = 26; key[1] = 43; key[2] = 60; key[3] = 77; return 4; } /* * this function will send the inputted string to the server and then * recieve the string from the server outputing it to the termial */ int SendReceive(CYASSL* ssl) { char sendline[MAXLINE]="Hello Server"; /* string to send to the server */ char recvline[MAXLINE]; /* string received from the server */ /* write string to the server */ if (CyaSSL_write(ssl, sendline, MAXLINE) != sizeof(sendline)) { printf("Write Error to Server\n"); return 1; } /* flags if the Server stopped before the client could end */ if (CyaSSL_read(ssl, recvline, MAXLINE) < 0 ) { printf("Client: Server Terminated Prematurely!\n"); return 1; } /* show message from the server */ printf("Server Message: %s\n", recvline); return 0; } int main(int argc, char **argv) { int sockfd, ret; CYASSL_CTX* ctx; CYASSL* ssl; struct sockaddr_in servaddr;; /* must include an ip address of this will flag */ if (argc != 2) { printf("Usage: tcpClient \n"); return 1; } CyaSSL_Init(); /* initialize cyaSSL */ /* create and initialize CYASSL_CTX structure */ if ((ctx = CyaSSL_CTX_new(CyaTLSv1_2_client_method())) == NULL) { fprintf(stderr, "SSL_CTX_new error.\n"); return 1; } /* create a stream socket using tcp,internet protocal IPv4, * full-duplex stream */ sockfd = socket(AF_INET, SOCK_STREAM, 0); /* places n zero-valued bytes in the address servaddr */ memset(&servaddr, 0, sizeof(servaddr)); servaddr.sin_family = AF_INET; servaddr.sin_port = htons(SERV_PORT); /* converts IPv4 addresses from text to binary form */ ret = inet_pton(AF_INET, argv[1], &servaddr.sin_addr); if (ret != 1) { printf("inet_pton error\n"); return 1; } /* set up pre shared keys */ CyaSSL_CTX_set_psk_client_callback(ctx,My_Psk_Client_Cb); /* attempts to make a connection on a socket */ ret = connect(sockfd, (struct sockaddr *) &servaddr, sizeof(servaddr)); if (ret != 0) { printf("Connection Error\n"); return 1; } /* create CyaSSL object after each tcp connect */ if ((ssl = CyaSSL_new(ctx)) == NULL) { fprintf(stderr, "CyaSSL_new error.\n"); return 1; } /* associate the file descriptor with the session */ CyaSSL_set_fd(ssl, sockfd); /* tell CyaSSL that nonblocking is going to be used */ CyaSSL_set_using_nonblock(ssl, 1); /* invokes the fcntl callable service to get the file status * flags for a file. checks if it returns an error, if it does * stop program */ int flags = fcntl(sockfd, F_GETFL, 0); if (flags < 0) { printf("fcntl get failed\n"); return 1; } /* invokes the fcntl callable service to set file status flags. * Do not block an open, a read, or a write on the file * (do not wait for terminal input. If an error occurs, * stop program*/ flags = fcntl(sockfd, F_SETFL, flags | O_NONBLOCK); if (flags < 0) { printf("fcntl set failed\n"); return 1; } /* setting up and running nonblocking socket */ ret = NonBlockingSSL_Connect(ssl); if (ret != 0) { return 1; } /* takes inputting string and outputs it to the server */ ret = SendReceive(ssl); if (ret != 0) { return 1; } /* cleanup */ CyaSSL_free(ssl); /* when completely done using SSL/TLS, free the * cyassl_ctx object */ CyaSSL_CTX_free(ctx); CyaSSL_Cleanup(); return ret; }