/* server-tls-uart.c * * Copyright (C) 2006-2021 wolfSSL Inc. * * This file is part of wolfSSL. (formerly known as CyaSSL) * * wolfSSL is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * wolfSSL is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA * *============================================================================= * * Example for TLS server over UART */ #define _XOPEN_SOURCE 600 #include /* standard in/out procedures */ #include /* defines system calls */ #include /* necessary for memset */ #include #include /* used for all socket calls */ #include /* used for sockaddr_in6 */ #include #include #include #include #include #include #include #include #ifndef WOLFSSL_USER_SETTINGS #include #endif #include #include #include #define CERT_FILE "../certs/server-cert.pem" #define KEY_FILE "../certs/server-key.pem" /* build with: gcc -lwolfssl -o server-tls-uart server-tls-uart.c */ #ifndef UART_DEV #ifdef __MACH__ #define UART_DEV "/dev/cu.usbmodem14502" #else #define UART_DEV "/dev/ttyUSB0" #endif #endif #ifndef B115200 #define B115200 115200 #endif /* Max buffer for a single TLS frame */ #ifndef MAX_RECORD_SIZE #define MAX_RECORD_SIZE (16 * 1024) #endif typedef struct CbCtx { int portFd; byte buf[MAX_RECORD_SIZE]; int pos; } CbCtx_t; static int uartIORx(WOLFSSL *ssl, char *buf, int sz, void *ctx) { int ret, recvd = 0; CbCtx_t* cbCtx = (CbCtx_t*)ctx; #ifdef DEBUG_UART_IO printf("UART Read: In %d\n", sz); #endif /* Is there pending data, return it */ if (cbCtx->pos > 0) { recvd = cbCtx->pos; if (recvd > sz) recvd = sz; XMEMCPY(buf, cbCtx->buf, recvd); XMEMCPY(cbCtx->buf, cbCtx->buf + recvd, cbCtx->pos - recvd); cbCtx->pos -= recvd; } if (recvd < sz && cbCtx->pos == 0) { int avail, remain; /* Read remain */ do { remain = sz - recvd; ret = read(cbCtx->portFd, buf + recvd, remain); if (ret > 0) { recvd += ret; } } while (ret >= 0 && recvd < sz); /* Read until 0 or out of space */ do { avail = (int)sizeof(cbCtx->buf) - cbCtx->pos; ret = read(cbCtx->portFd, cbCtx->buf + cbCtx->pos, avail); if (ret > 0) cbCtx->pos += ret; } while (ret > 0); } if (recvd == 0) { recvd = WOLFSSL_CBIO_ERR_WANT_READ; } #ifdef DEBUG_UART_IO printf("UART Read: Out %d\n", recvd); #endif return recvd; } static int uartIOTx(WOLFSSL *ssl, char *buf, int sz, void *ctx) { int sent; CbCtx_t* cbCtx = (CbCtx_t*)ctx; #ifdef DEBUG_UART_IO printf("UART Write: In %d\n", sz); #endif sent = write(cbCtx->portFd, buf, sz); if (sent == 0) { return WOLFSSL_CBIO_ERR_WANT_WRITE; } #ifdef DEBUG_UART_IO printf("UART Write: Out %d\n", sent); #endif return sent; } int main(int argc, char** argv) { int ret = -1, err; WOLFSSL_CTX* ctx = NULL; WOLFSSL* ssl = NULL; CbCtx_t cBctx; struct termios tty; byte echoBuffer[100]; const char* uartDev = UART_DEV; if (argc >= 2) { uartDev = argv[1]; } /* Open UART file descriptor */ XMEMSET(&cBctx, 0, sizeof(cBctx)); cBctx.portFd = open(uartDev, O_RDWR | O_NOCTTY); if (cBctx.portFd < 0) { printf("Error opening %s: Error %i (%s)\n", uartDev, errno, strerror(errno)); ret = errno; goto done; } tcgetattr(cBctx.portFd, &tty); cfsetospeed(&tty, B115200); cfsetispeed(&tty, B115200); tty.c_cflag = (tty.c_cflag & ~CSIZE) | (CS8); tty.c_iflag &= ~(IGNBRK | IXON | IXOFF | IXANY| INLCR | ICRNL); tty.c_oflag &= ~OPOST; tty.c_oflag &= ~(ONLCR|OCRNL); tty.c_cflag &= ~(PARENB | PARODD | CSTOPB); tty.c_lflag &= ~(ICANON | ECHO | ECHOE | ISIG); tty.c_iflag &= ~ISTRIP; tty.c_cc[VMIN] = 0; tty.c_cc[VTIME] = 5; tcsetattr(cBctx.portFd, TCSANOW, &tty); /* Flush any data in the RX buffer */ ret = read(cBctx.portFd, echoBuffer, sizeof(echoBuffer)); if (ret < 0) { /* Ignore RX error on flush */ } #if 0 wolfSSL_Debugging_ON(); #endif ctx = wolfSSL_CTX_new(wolfTLSv1_3_server_method()); if (ctx == NULL) { printf("Error creating WOLFSSL_CTX\n"); goto done; } /* Register wolfSSL send/recv callbacks */ wolfSSL_CTX_SetIOSend(ctx, uartIOTx); wolfSSL_CTX_SetIORecv(ctx, uartIORx); /* For testing disable peer cert verification; the focus is on key * establishment via post-quantum KEM. */ wolfSSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, NULL); /* Set server key and certificate (required) */ if ((ret = wolfSSL_CTX_use_certificate_file(ctx, CERT_FILE, SSL_FILETYPE_PEM)) != WOLFSSL_SUCCESS) { fprintf(stderr, "ERROR: failed to load %s, please check the file.\n", CERT_FILE); goto done; } if ((ret = wolfSSL_CTX_use_PrivateKey_file(ctx, KEY_FILE, SSL_FILETYPE_PEM)) != WOLFSSL_SUCCESS) { fprintf(stderr, "ERROR: failed to load %s, please check the file.\n", KEY_FILE); goto done; } ssl = wolfSSL_new(ctx); if (ssl == NULL) { printf("Error creating WOLFSSL\n"); goto done; } /* Register wolfSSL read/write callback contexts */ wolfSSL_SetIOReadCtx(ssl, &cBctx); wolfSSL_SetIOWriteCtx(ssl, &cBctx); printf("Waiting for client\n"); do { ret = wolfSSL_accept(ssl); err = wolfSSL_get_error(ssl, ret); } while (err == WOLFSSL_ERROR_WANT_READ || err == WOLFSSL_ERROR_WANT_WRITE); if (ret != WOLFSSL_SUCCESS) { printf("TLS accept error %d\n", err); goto done; } printf("TLS Accept handshake done\n"); /* Waiting for data to echo */ XMEMSET(echoBuffer, 0, sizeof(echoBuffer)); do { ret = wolfSSL_read(ssl, echoBuffer, sizeof(echoBuffer)-1); err = wolfSSL_get_error(ssl, ret); } while (err == WOLFSSL_ERROR_WANT_READ || err == WOLFSSL_ERROR_WANT_WRITE); printf("Read (%d): %s\n", err, echoBuffer); do { ret = wolfSSL_write(ssl, echoBuffer, XSTRLEN((char*)echoBuffer)); err = wolfSSL_get_error(ssl, ret); } while (err == WOLFSSL_ERROR_WANT_READ || err == WOLFSSL_ERROR_WANT_WRITE); printf("Sent (%d): %s\n", err, echoBuffer); ret = 0; /* Success */ done: if (ssl) { wolfSSL_shutdown(ssl); wolfSSL_free(ssl); } if (ctx) { wolfSSL_CTX_free(ctx); } if (cBctx.portFd >= 0) close(cBctx.portFd); return ret; }