151 lines
3.8 KiB
C
151 lines
3.8 KiB
C
/* App.c
|
|
*
|
|
* Copyright (C) 2006-2020 wolfSSL Inc.
|
|
*
|
|
* This file is part of wolfSSL.
|
|
*
|
|
* wolfSSL is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* wolfSSL is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
|
*/
|
|
|
|
|
|
#include "stdafx.h"
|
|
#include "App.h" /* contains include of Enclave_u.h which has wolfSSL header files */
|
|
#include "client-tls.h"
|
|
#include "server-tls.h"
|
|
|
|
/* Use Debug SGX ? */
|
|
#if _DEBUG
|
|
#define DEBUG_VALUE SGX_DEBUG_FLAG
|
|
#else
|
|
#define DEBUG_VALUE 1
|
|
#endif
|
|
|
|
typedef struct func_args {
|
|
int argc;
|
|
char** argv;
|
|
int return_code;
|
|
} func_args;
|
|
|
|
int main(int argc, char* argv[]) /* not using since just testing w/ wc_test */
|
|
{
|
|
sgx_enclave_id_t id;
|
|
sgx_launch_token_t t;
|
|
|
|
int ret = 0;
|
|
int sgxStatus = 0;
|
|
int updated = 0;
|
|
func_args args = { 0 };
|
|
|
|
/* only print off if no command line arguments were passed in */
|
|
if (argc != 2 || strlen(argv[1]) != 2) {
|
|
printf("Usage:\n"
|
|
"\t-c Run a TLS client in enclave\n"
|
|
"\t-s Run a TLS server in enclave\n"
|
|
#ifdef HAVE_WOLFSSL_TEST
|
|
"\t-t Run wolfCrypt tests only \n"
|
|
#endif /* HAVE_WOLFSSL_TEST */
|
|
|
|
#ifdef HAVE_WOLFSSL_BENCHMARK
|
|
"\t-b Run wolfCrypt benchmarks in enclave\n"
|
|
#endif /* HAVE_WOLFSSL_BENCHMARK */
|
|
);
|
|
return 0;
|
|
}
|
|
|
|
memset(t, 0, sizeof(sgx_launch_token_t));
|
|
memset(&args,0,sizeof(args));
|
|
|
|
ret = sgx_create_enclave(ENCLAVE_FILENAME, DEBUG_VALUE, &t, &updated, &id, NULL);
|
|
if (ret != SGX_SUCCESS) {
|
|
printf("Failed to create Enclave : error %d - %#x.\n", ret, ret);
|
|
return 1;
|
|
}
|
|
|
|
|
|
switch(argv[1][1]) {
|
|
case 'c':
|
|
printf("Client Test:\n");
|
|
client_connect(id);
|
|
break;
|
|
|
|
case 's':
|
|
printf("Server Test:\n");
|
|
server_connect(id);
|
|
break;
|
|
|
|
#ifdef HAVE_WOLFSSL_TEST
|
|
case 't':
|
|
printf("Crypt Test:\n");
|
|
wc_test(id, &sgxStatus, &args);
|
|
printf("Crypt Test: Return code %d\n", args.return_code);
|
|
break;
|
|
#endif /* HAVE_WOLFSSL_TEST */
|
|
|
|
#ifdef HAVE_WOLFSSL_BENCHMARK
|
|
case 'b':
|
|
printf("\nBenchmark Test:\n");
|
|
wc_benchmark_test(id, &sgxStatus, &args);
|
|
printf("Benchmark Test: Return code %d\n", args.return_code);
|
|
break;
|
|
#endif /* HAVE_WOLFSSL_BENCHMARK */
|
|
default:
|
|
printf("Unrecognized option set!\n");
|
|
break;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static double current_time()
|
|
{
|
|
struct timeval tv;
|
|
gettimeofday(&tv,NULL);
|
|
|
|
return (double)(1000000 * tv.tv_sec + tv.tv_usec)/1000000.0;
|
|
}
|
|
|
|
void ocall_print_string(const char *str)
|
|
{
|
|
/* Proxy/Bridge will check the length and null-terminate
|
|
* the input string to prevent buffer overflow.
|
|
*/ printf("%s", str);
|
|
}
|
|
|
|
void ocall_current_time(double* time)
|
|
{
|
|
if(!time) return;
|
|
*time = current_time();
|
|
return;
|
|
}
|
|
|
|
void ocall_low_res_time(int* time)
|
|
{
|
|
struct timeval tv;
|
|
if(!time) return;
|
|
*time = tv.tv_sec;
|
|
return;
|
|
}
|
|
|
|
size_t ocall_recv(int sockfd, void *buf, size_t len, int flags)
|
|
{
|
|
return recv(sockfd, buf, len, flags);
|
|
}
|
|
|
|
size_t ocall_send(int sockfd, const void *buf, size_t len, int flags)
|
|
{
|
|
return send(sockfd, buf, len, flags);
|
|
}
|
|
|