wolfssl-examples/tirtos_ccs_examples/tcpEcho_Server_TivaTM4C1294.../tcpEcho.c

315 lines
9.4 KiB
C

/*
* Copyright (c) 2014, Texas Instruments Incorporated
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* * Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* * Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* * Neither the name of Texas Instruments Incorporated nor the names of
* its contributors may be used to endorse or promote products derived
* from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
* THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
* OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
* OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
/*
* ======== tcpEcho.c ========
*/
/* XDCtools Header files */
#include <xdc/std.h>
#include <xdc/cfg/global.h>
#include <xdc/runtime/Error.h>
#include <xdc/runtime/Memory.h>
#include <xdc/runtime/System.h>
/* BIOS Header files */
#include <ti/sysbios/BIOS.h>
#include <ti/sysbios/knl/Clock.h>
#include <ti/sysbios/knl/Task.h>
/* NDK Header files */
#include <sys/socket.h>
#include <ti/ndk/nettools/mytime/mytime.h>
/* TI-RTOS Header files */
#include <ti/drivers/GPIO.h>
/* Example/Board Header files */
#include "Board.h"
/* wolfSSL Header files */
#include <wolfssl/ssl.h>
#include <wolfssl/certs_test.h>
#define TCPPACKETSIZE 1024
#define TCPPORT 11111
#define NUMTCPWORKERS 3
void exitApp(WOLFSSL_CTX* ctx);
/*
* ======== tcpWorker ========
* Task to handle TCP connection. Can be multiple Tasks running
* this function.
*/
Void tcpWorker(UArg arg0, UArg arg1)
{
int clientfd = 0;
int nbytes;
bool flag = true;
char *buffer;
Error_Block eb;
WOLFSSL* ssl = (WOLFSSL *)arg0;
fdOpenSession(TaskSelf());
clientfd = wolfSSL_get_fd(ssl);
System_printf("tcpWorker: start clientfd = 0x%x\n", clientfd);
/* Make sure Error_Block is initialized */
Error_init(&eb);
/* Get a buffer to receive incoming packets. Use the default heap. */
buffer = Memory_alloc(NULL, TCPPACKETSIZE, 0, &eb);
if (buffer == NULL) {
System_printf("tcpWorker: failed to alloc memory\n");
Task_exit();
}
/* Loop while we receive data */
while (flag) {
char ack[] = "wolfSSL's Tiva C Series Connected Launchpad Heard you loud and clear!!! -Kaleb\n";
nbytes = wolfSSL_read(ssl, (char *)buffer, TCPPACKETSIZE);
if (nbytes > 0) {
/* Echo the data back */
wolfSSL_write(ssl, (char *)ack, strlen(ack));
}
else {
wolfSSL_free(ssl);
fdClose((SOCKET)clientfd);
flag = false;
}
}
System_printf("tcpWorker stop clientfd = 0x%x\n", clientfd);
/* Free the buffer back to the heap */
Memory_free(NULL, buffer, TCPPACKETSIZE);
fdCloseSession(TaskSelf());
/*
* Since deleteTerminatedTasks is set in the cfg file,
* the Task will be deleted when the idle task runs.
*/
Task_exit();
}
/*
* ======== tcpHandler ========
* Creates new Task to handle new TCP connections.
*/
Void tcpHandler(UArg arg0, UArg arg1)
{
int lSocket;
struct sockaddr_in sLocalAddr;
int clientfd;
struct sockaddr_in client_addr;
int addrlen=sizeof(client_addr);
int optval;
int optlen = sizeof(optval);
int status;
Task_Handle taskHandle;
Task_Params taskParams;
Error_Block eb;
fdOpenSession(TaskSelf());
wolfSSL_Init();
WOLFSSL_CTX* ctx = NULL;
if ((ctx = wolfSSL_CTX_new(wolfTLSv1_2_server_method())) == NULL) {
System_printf("tcpHandler: wolfSSL_CTX_new error.\n");
exitApp(ctx);
}
if (wolfSSL_CTX_load_verify_buffer(ctx, ca_cert_der_2048,
sizeof(ca_cert_der_2048)/sizeof(char),
SSL_FILETYPE_ASN1) != SSL_SUCCESS) {
System_printf("tcpHandler: Error loading ca_cert_der_2048"
" please check the wolfssl/certs_test.h file.\n");
exitApp(ctx);
}
if (wolfSSL_CTX_use_certificate_buffer(ctx, server_cert_der_2048,
sizeof(server_cert_der_2048)/sizeof(char),
SSL_FILETYPE_ASN1) != SSL_SUCCESS) {
System_printf("tcpHandler: Error loading server_cert_der_2048,"
" please check the wolfssl/certs_test.h file.\n");
exitApp(ctx);
}
if (wolfSSL_CTX_use_PrivateKey_buffer(ctx, server_key_der_2048,
sizeof(server_key_der_2048)/sizeof(char),
SSL_FILETYPE_ASN1) != SSL_SUCCESS) {
System_printf("tcpHandler: Error loading server_key_der_2048,"
" please check the wolfssl/certs_test.h file.\n");
exitApp(ctx);
}
lSocket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (lSocket == -1) {
System_printf("tcpHandler: socket failed\n");
Task_exit();
}
memset((char *)&sLocalAddr, 0, sizeof(sLocalAddr));
sLocalAddr.sin_family = AF_INET;
sLocalAddr.sin_len = sizeof(sLocalAddr);
sLocalAddr.sin_addr.s_addr = htonl(INADDR_ANY);
sLocalAddr.sin_port = htons(arg0);
status = bind(lSocket, (struct sockaddr *)&sLocalAddr, sizeof(sLocalAddr));
if (status < 0) {
System_printf("tcpHandler: bind failed\n");
fdClose((SOCKET)lSocket);
exitApp(ctx);
}
if (listen(lSocket, NUMTCPWORKERS) != 0){
System_printf("tcpHandler: listen failed\n");
fdClose((SOCKET)lSocket);
exitApp(ctx);
}
if (setsockopt(lSocket, SOL_SOCKET, SO_KEEPALIVE, &optval, optlen) < 0) {
System_printf("tcpHandler: setsockopt failed\n");
fdClose((SOCKET)lSocket);
exitApp(ctx);
}
while (true) {
WOLFSSL* ssl;
/* Wait for incoming request */
if ((clientfd = accept(lSocket, (struct sockaddr*)&client_addr,
&addrlen)) == -1) {
System_printf("tcpHandler: Accept failed %d\n");
exitApp(ctx);
}
/* Init the Error_Block */
Error_init(&eb);
if ((ssl = wolfSSL_new(ctx)) == NULL) {
System_printf("tcpHandler: wolfSSL_new error.\n");
exitApp(ctx);
}
wolfSSL_set_fd(ssl, clientfd);
/* Initialize the defaults and set the parameters. */
Task_Params_init(&taskParams);
taskParams.arg0 = (UArg)ssl;
taskParams.stackSize = 16384;
taskHandle = Task_create((Task_FuncPtr)tcpWorker, &taskParams, &eb);
if (taskHandle == NULL) {
System_printf("tcpHandler: Failed to create new Task\n");
}
}
}
/*
* ======== exitApp ========
* Cleans up the SSL context and exits the application
*/
void exitApp(WOLFSSL_CTX* ctx)
{
if (ctx != NULL) {
wolfSSL_CTX_free(ctx);
wolfSSL_Cleanup();
}
BIOS_exit(-1);
}
/*
* ======== main ========
*/
int main(void)
{
Task_Handle taskHandle;
Task_Params taskParams;
Error_Block eb;
#ifdef TIVAWARE
/*
* This is a work-around for EMAC initialization issues found on
* the TM4C129 devices. The bug number is:
* SDOCM00107378: NDK examples for EK-TM4C1294XL do not work
*
* The following disables the flash pre-fetch. It is enable within the
* EMAC driver (in the EMACSnow_NIMUInit() function).
*/
UInt32 ui32FlashConf;
ui32FlashConf = HWREG(0x400FDFC8);
ui32FlashConf &= ~(0x00020000);
ui32FlashConf |= 0x00010000;
HWREG(0x400FDFC8) = ui32FlashConf;
#endif
/* Call board init functions */
Board_initGeneral();
Board_initGPIO();
Board_initEMAC();
/*
* wolfSSL library needs time() for validating certificates.
* USER STEP: Set up the current time in seconds below.
*/
MYTIME_init();
MYTIME_settime(1398980099);
System_printf("Starting the TCP Echo example\nSystem provider is set to "
"SysMin. Halt the target to view any SysMin contents in"
" ROV.\n");
/* SysMin will only print to the console when you call flush or exit */
System_flush();
/*
* Create the Task that farms out incoming TCP connections.
* arg0 will be the port that this task listens to.
*/
Task_Params_init(&taskParams);
Error_init(&eb);
taskParams.stackSize = 8192;
taskParams.priority = 1;
taskParams.arg0 = TCPPORT;
taskHandle = Task_create((Task_FuncPtr)tcpHandler, &taskParams, &eb);
if (taskHandle == NULL) {
System_printf("main: Failed to create tcpHandler Task\n");
}
/* Start BIOS */
BIOS_start();
return (0);
}